glib-networking-32bit-2.62.4-3.3.1<>,Waup9|)>Zn%HJk:^VX:?M^Z|~^,:"_!Kh?7iHȀE{yE[%ױpg|x[S0voUy>=m澛Y}/֌Em%DxvF~\ڊh:G'\Eږ2]',}]9Rc~z8z@(Ў 8WZ"hٶBNevm'~!lXHSs4PSڕ\]DM8[1`n &J)P$A>@D4?D$d % J  6Vlry      0D(8595: 5>>?>G?H?I?,X?4Y?H\?h]?|^?b?c@dA4eA9fA<lA>uAPvAdwC$xC8yCL"CCCD Cglib-networking-32bit2.62.43.3.1Network-related GIO modules for glibThis package contains network-related GIO modules for glib. Currently, there is only a proxy module based on libproxy.ausheep68fSUSE Linux Enterprise 15SUSE LLC LGPL-2.1-or-laterhttps://www.suse.com/Development/Libraries/C and C++https://www.gnome.orglinuxx86_64/sbin/ldconfig GIO_MODULES_DIR="/usr/lib/gio/modules" /usr/bin/gio-querymodules "${GIO_MODULES_DIR}" if [ $1 -eq 0 ]; then GIO_MODULES_DIR="/usr/lib/gio/modules" /usr/bin/gio-querymodules "${GIO_MODULES_DIR}" fiFT6AAauauauauaud5ae5e94ed71dce399d8feae46cee202af0fcf9ca647900e976779856c40c94b11a1ceaca808d41c9caf2b86563d35a74952d7b7d2b50bfab327b0d0b6acf13e162ebf5ea4e5285a8f7d12e84ab31690e7ec4cd8c4cb596e25132d97b6f3dd89rootrootrootrootrootrootrootrootrootrootglib-networking-2.62.4-3.3.1.src.rpmglib-networking-32bitglib-networking-32bit(x86-32)libgiognomeproxy.solibgiognutls.solibgiolibproxy.so @@@@@@@@@@@@@    /bin/sh/bin/shglib2-tools-32bitlibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.2)libc.so.6(GLIBC_2.4)libgio-2.0.so.0libglib-2.0.so.0libgnutls.so.30libgnutls.so.30(GNUTLS_3_4)libgobject-2.0.so.0libproxy.so.1libpthread.so.0libpthread.so.0(GLIBC_2.0)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.1^(@^,-^]]]s]m@]fl\\-@\C@\N\@\M\~d\n\eX@\4\0@[t[[qr[Y[[[@ZZ@ZZ@Z6\@Z%8Z YY@Y@Y@W@W@W;W0{WX@V3V@VTQ@VU@UCjU@U@T@Tp@Tp@mgorse@suse.comdimstar@opensuse.orgbjorn.lie@gmail.combjorn.lie@gmail.combjorn.lie@gmail.commgorse@suse.commgorse@suse.comkukuk@suse.debjorn.lie@gmail.combjorn.lie@gmail.comvcizek@suse.combjorn.lie@gmail.combjorn.lie@gmail.combjorn.lie@gmail.combjorn.lie@gmail.combjorn.lie@gmail.combjorn.lie@gmail.combjorn.lie@gmail.combjorn.lie@gmail.combjorn.lie@gmail.combjorn.lie@gmail.combjorn.lie@gmail.combjorn.lie@gmail.comluc14n0@linuxmail.orgluc14n0@linuxmail.orgbjorn.lie@gmail.comdimstar@opensuse.orgdimstar@opensuse.orgdimstar@opensuse.orgdimstar@opensuse.orgluc14n0@linuxmail.orgdimstar@opensuse.orgfezhang@suse.comluc14n0@linuxmail.orgluc14n0@linuxmail.orgjengelh@inai.dezaitor@opensuse.orgzaitor@opensuse.orgdimstar@opensuse.orgmgorse@suse.comzaitor@opensuse.orgzaitor@opensuse.orgdimstar@opensuse.orgdimstar@opensuse.orgzaitor@opensuse.orgzaitor@opensuse.orgdimstar@opensuse.orgzaitor@opensuse.orgdimstar@opensuse.orgdimstar@opensuse.orgdimstar@opensuse.orgzaitor@opensuse.orgzaitor@opensuse.org- Update to version 2.62.4: - Fix CVE-2020-13645, fail connections when server identity is unset (boo#1172460).- No longer recommend -lang: supplements are in use- Update to version 2.62.3: + Fix leak of base iostream (or base datagram socket), 2.62 regression. + Fix duplicate notifies of peer-certificate and peer-certificate-errors. + Fix obscure corner case where SNI might not work.- Update to version 2.62.2: + Fix handshake_context crashes.- Update to version 2.62.1: + Fix two memory leaks.- Update to version 2.62.0: + Revert broken queued data fix for glgo#GNOME/glib-networking#15.- Update to version 2.61.92: + Discard queued data after interrupted writes. + Verify socket timeouts are respected. + Fix a couple broken error messages. + Changes in version 2.61.90: + Fix translations of certain error messages + Changes in version 2.61.2: + Improve certain handshake error messages. + Fix regressions introduced in 2.61.1. + Changes in version 2.61.1: + This release contains a major refactoring of the TLS codebase. The GnuTLS backend now shares the same base classes as the OpenSSL backend, to avoid duplicating as much code as possible. The base classes, previously used only by the OpenSSL backend and originally forked from glib-networking several years ago, have been enhanced to achieve feature-parity with the current state of the GnuTLS backend. Please note that the OpenSSL backend remains experimental. Further planned work is required before this backend will be production-ready.- Move LICENSE_EXCEPTION to %license.- Update to version 2.60.3: + Fix clobbering of the thread-default main context after certificate verification failure during async handshakes since 2.60.1. + Fix GTlsDatabase initialization failures in OpenSSL backend due to uninitialized memory use. + Fix minor leak of ALPN protocols.- Update to version 2.60.2: + OpenSSL backend now defaults to system trust store. + Fix client auth failure error with GnuTLS 3.6.7 (bsc#1134795). - Drop 0001-gnutls-Handle-new-GNUTLS_E_CERTIFICATE_REQUIRED.patch: fixed upstream.- Handle new GnuTLS error GNUTLS_E_CERTIFICATE_REQUIRED + https://gitlab.gnome.org/GNOME/glib-networking/issues/70 + add 0001-gnutls-Handle-new-GNUTLS_E_CERTIFICATE_REQUIRED.patch- Update to version 2.60.1: + Improve reliability of client auth failure tests. + Fix excessive CPU usage after sync handshake.- Update to version 2.60.0.1: + Fix build with OpenSSL pkg-config unavailable.- Update to version 2.60.0: + This is the first stable release featuring the new OpenSSL backend. Please be advised that this new backend is still experimental and known to not work on some systems, including Debian. Linux distributions are encouraged to stick to the default build options, where OpenSSL is not yet enabled. + Fix build with GnuTLS disabled.- Update to version 2.59.92: + GnuTLS: reject sync operations during handshake to avoid deadlocks. + Temporarily disable DTLS and OpenSSL tests due to bugs.- Update to version 2.59.91: + Update OpenSSL SSL struct when certificate is changed. + Fix tests build when GnuTLS is disabled. + Remove Fedora-specific PROFILE=SYSTEM default cipher list. + Fix some problems with the connection tests.- Update to version 2.59.90: + This release adds an OpenSSL backend, obsoleting the glib-openssl project. + The OpenSSL backend seems to be mature, though it is less well-tested for desktop usage than the GnuTLS backend. It will remain disabled by default at build time due to the GPL-incompatible nature of the OpenSSL license -- and the GPLv2-incompatible nature of the Apache license that will be used by future versions of OpenSSL -- and because the GnuTLS backend is sufficient for Linux distros. + Use the OpenSSL backend if you are building an embedded system where (GPLv2+ or LGPLv3+) dependencies are unacceptable (e.g. nettle or GMP, both dependencies of GnuTLS) and you are OK with the GPL-incompatible OpenSSL license. If the OpenSSL backend is enabled at build time, you should probably disable build of the GnuTLS backend, or it will take precedence over the OpenSSL backend at runtime.- Update to version 2.59.2: + Add support for application layer protocol negotiation.- Update to version 2.59.1: + This release removes the gnutls-pkcs11 backend, which was disabled in 2.57.2, due to lack of any feedback whatsoever regarding its disablement. If you think it is still useful to you, given that the normal gnutls backend now supports PKCS#11, speak up now. + This release also includes several changes to properly support TLS 1.3. + Other changes: - Perform certificate verification during, not after, TLS handshake. - Dramatically improve the reliability of the non-DTLS tests. (DTLS is still having problems). - Regenerate test certificates to prepare for OpenSSL support. - Several meson build system improvements to prepare for OpenSSL support.- Update to version 2.58.0: + Updated translations.- Update to version 2.57.92: + Revert fixes for glgo#GNOME/glib-networking#4 and glgo#GNOME/glib-networking#6 due to regression glgo#GNOME/glib-networking#43. + Fix installed tests glgo#GNOME/glib-networking!7.- Update to version 2.57.90: + Properly check for server errors in connection tests. + Perform certificate verification during, not after, TLS handshake. + Avoid trailing dots in SNI hostnames. + Send fallback SCSV with fallback connection attempts. + Fail unsafe rehandshake attempts initiated by API request.- Update to version 2.57.3: + Fix memory leaks when calling g_tls_connection_gnutls_get_certificate(). + Use .so for modules on macOS instead of dylib. + Fix build with MSVCC.- Update to version 2.57.2: + No visible changes for the user. - Drop pkgconfig(p11-kit-1) BuildRequires: it's now not enabled by default, and even when it was being enabled the backend would only work if the env GIO_USE_TLS=gnutls-pkcs11 would be set.- Update to version 2.57.1: + Use GnuTLS system trust (bgo#753260). + Fix criticals when child streams outlast the parent GTlsConnection (bgo#792219). + Fix crash when setting client cert without private key (bgo#793712).- Update to version 2.56.1: + Fix build with PKCS#11 backend disabled (bgo#794292). + Various meson build system fixes (bgo#794358 and bgo#794372). + Tests are now compatible with GnuTLS 3.6 (bgo#794286).- Unconditionally enable translation-update-upstream: on Tumbleweed, this results in a NOP and for Leap in SLE paid translations being used (boo#1086036).- Update to version 2.56.0: + Updated translations.- Modernize spec-file by calling spec-cleaner- Update to version 2.55.90: + Fix unit tests when SSLv3 is unavailable (bgo#782853). + Allow static linking (bgo#791100). + Fix issues found by coverity (bgo#792402). + Remove TLS build option; it is now mandatory. + Try to ensure that GnuTLS is only initialized if TLS is actually used. + Update use of GObject to follow current best practices. + Use XDG_CURRENT_DESKTOP to determine which proxy module to load.- Update to version 2.55.2: + Fix glib-pacrunner.service installation directory (bgo#790367). + Updated translations. - Drop glib-networking-Fix-build-failure-on-64bit-platforms.patch: fixed upstream. - Drop intltool BuildRequires as this is no longer used anymore once upstream migrated to gettext long ago. - Add pkgconfig(glib-2.0) BuildRequires. Note that it was being pulled with gio-2.0 pkgconfig module and used already as both of them live in glib2-devel package.- Add pkgconfig(systemd) BuildRequires: new dependency after the port to meson.- Update to version 2.55.1: + Implement DTLS support (bgo#697908). + Port to Meson build system (bgo#786639). + Updated translations. - Add ca-certificates-mozilla BuildRequires: new dependency. - Add meson BuildRequires and switch autotools macros configure, make and makeinstall to meson, meson_build and meson_install following upstream switch to Meson build system. - Add glib-networking-Fix-build-failure-on-64bit-platforms.patch: Fix a build failure (bgo#790367).- Update to version 2.54.1: + gnutls: Fix using different client certs for different connections (bgo#781578). + Updated translations.- Update to version 2.54.0: + Updated translations.- Replace old macros and fixup RPM group.- Update to version 2.53.90: + gnutls: Stop using %LATEST_RECORD_VERSION in priority string, since that gives better compatibility with current gnutls / current real world (bgo#782218). + gnutls: Provide a better error message when a TLS alert is received (bgo#782218). + Updated translations. - Conditionally apply translations-update-upstream BuildRequires and macro for non-openSUSE only.- Update to version 2.50.0: + Updated translations.- Update to version 2.49.90: + Ported to use upstream gettext rather than intltool/glib-gettext (bgo#768708). + Updated po files for future gettext versions. + Fixed translation lookup on Windows (bgo#765466). + Updated translations.- Update to GNOME 3.20.2 Fate#318572- Update to version 2.48.2: + gnutls: Fixed an infinite loop if a server sent two identical copies of its CA certificate (bgo#765317). + Updated translations.- Update to version 2.48.1: + Fixed translations in non-UTF-8 domains (bgo#765466). + Fixed bash-ism in configure (bgo#765396). + Updated translations. - Stop passing V=1 to make, we do debugging locally. - Add default http://www.gnome.org as Url: Silence rpmlint.- Update to version 2.48.0: + New stable release. (No changes since 2.47.90).- Update to version 2.47.90: + gnutls: The non-PKCS#11 TLS plugin now uses gnutls's certificate validation code directly, rather than attempting to build a certificate chain itself first (bgo#753260 and others). + gnutls: Fixed a leak when closing a connection during an implicit handshake (bgo#736809). + gnutls: Fixed "make check" without PKCS#11 support (bgo#728977). + gnutls: Various changes in preparation for DTLS support (but not the actual DTLS support itself) (bgo#697908, bgo#735754). + Updated translations.- Update to version 2.47.1: + Added a systemd service file for glib-pacrunner (bgo#755740).- Update to version 2.46.1: + Fixed a certificate chain validation problem that affected Facebook in Epiphany (bgo#750457).- Update to version 2.46.0: + Various minor cleanups and small memory leak fixes. + Added a new test case for client certificate chain handling (bgo#754129). + Updated translations.- Update to version 2.45.1: + tls/gnutls: Implement g_tls_client_connection_copy_session_state(), to allow implementing FTP-over-TLS in gvfs (bgo#745255).- Update to version 2.44.0: + Stable release, no changes since 2.43.92.- Update to version 2.43.92: + Fix TLS session caching when using session tickets (bgo#745099). + Updated translations.- Update to version 2.43.91: + tls/gnutls: Removed a workaround for connecting to servers with weak DH parameters, which was apparently only needed because gnutls was prioritizing DHE over RSA (rh#1177964#c8). + tls/gnutls: We now require gnutls 3.x again. (In fact, 2.42.1 and 2.43.1 accidentally used a 3.x-only function, so we already required it, we were just failing to declare that fact). + tls/tests: Skip certain tests when running against old gnutls or GLib releases. (glib-networking 2.43.91 itself does not require GLib 2.43, but one of the test cases does). + Updated translations.- Update to version 2.43.1: + The GTlsClientConnection "use-ssl3" property now falls back to TLS 1.0 if SSL 3.0 has been disabled, rather than just failing. Also, we now use the gnutls %LATEST_RECORD_VERSION option by default (to allow connecting to certain servers that were incorrectly patched for the POODLE attack), but also make sure to remove that option in the fallback ("use-ssl3") mode (to allow connecting to other servers that are differently broken) (bgo#738633, bgo#740087). + tls/gnutls: Miscellaneous warning, debugging, and leak fixes (bgo#736757, bgo#736809, bgo#737106). + Updated translations.- Update to version 2.42.1: + The GTlsClientConnection "use-ssl3" property now falls back to TLS 1.0 if SSL 3.0 has been disabled, rather than just failing. Also, we now use the gnutls %LATEST_RECORD_VERSION option by default (to allow connecting to certain servers that were incorrectly patched for the POODLE attack), but also make sure to remove that option in the fallback ("use-ssl3") mode (to allow connecting to other servers that are differently broken). (bgo#738633, bgo#740087). + tls/gnutls: Miscellaneous warning, debugging, and leak fixes (bgo#736757, bgo#736809, bgo#737106). + Updated translations./bin/sh/bin/sh2.62.4-3.3.12.62.4-3.3.1giomoduleslibgiognomeproxy.solibgiognutls.solibgiolibproxy.so/usr/lib//usr/lib/gio//usr/lib/gio/modules/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:22031/SUSE_SLE-15-SP2_Update/bbdbe0a6f6d9333fa6d3346131c511e6-glib-networking.SUSE_SLE-15-SP2_Updatedrpmxz5x86_64-suse-linuxdirectoryELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=acd3522e5f9305b26c63373573c6d5b078494665, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=c6930b79ae545f965b8ab0a7f19108861c5346cd, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=02e3df1a4ce89cc39fecfad228b53a0881f29409, stripped  PRRRRRR R RRPRRRRRR RR R R RRPRRRRRR R R RRutf-8e107760ff66f5bcd841943378da9cd8ece1c629d3ed8ec69d242670434b306fe?7zXZ !t/!j\]"k%*MmRf90꾁WE -4]Aءd01n|(ڝ; y# y{9L/R'!X.{BFBs\0<5%)U'.ֻ4^ǿqO՛ȫX?S21r]T4`՜jX#_B:k^o?+sD96)Z& (U+X()R)wJP `4dw9o ` wi*oajiiӭ~~O@""pNZB1 {B} Zsp%K7S 39aEM:l#)?syFtCCyXc' UCvGtz wY"%I$$Nj<^kNʳ| SYS% \ 0Hh8 oѨ6ԢĮJq.ֲ%--5H9+93){U8ö}woYg6kFWr~ o3 и0^啃STFQ$4+1W(GD~Rc[g16 %:nN *)8ot.'<QwtJ %tQo` /+t=Z9T Mg/thT\-r͑+sM+͚>eK'ӝQeyhZ{u0HkpMBrMVk:ܷa;Ng m|w *G'e.yEGϿBȹr52!dSB׸7XxaLgMjk)%!Q~WIwh#Trh)yRVI XH !Ew0#['7*6U;W&SjYܧ HYdi\:Li݌g-|{eџT6zlu9;~WaWIJZ VIZ|$"bQ낈/H9u[% JQtTjio0yC#MqKs$&l]@hgqH4~|j+ki1TgПf&Nwr'kf_R12,UkcHW=H v8}]3/ DSKvm|Sp1JڤE| *ªJA 6MVX,v/RowE3N3|. [ nU$_N}ܺY|8p.VlIN= 6w]~c5F{co@lPѨܿur c VmU/*X4 *l QwEٽ4SYce+]1b-uռ5Gf: 䕜cS)4Ms*+¶N]ɮ _QME.ynI #b"U2A!4F9^G{sŭzw"&V(0چty@vڹVvArbR6]jGWӛ~:㉘`ţ#-ļ ˂B吱g3y&fl$&к؅Ek[#F "ko8eͱAX\ R1.FҳՃ,PT|/8-Nn Xr5h7o?Axcs07-" a {n+P l7΅Zי_HO,3}^ڤ\8U 1|;M=:wy?s-h F(5MҖ*EuL+D]̡y)52?+v橨T fn ہm.yDN)l3oX](ǧzeoZ+6TVvc=de6"Zw7N\IأS@yHn}:y#Ecګ[~oT,&aw &^ԯ4 ͬcu`5^5~Ǒ#8ĖЇmLRC=#L2b*6Vр^yXT'[aafx;3gc[&0y&%)?zǿ%2 6A蜔a_BYdwo}р@ʦ~S HKPw8traxŽ~_VjD5_D DOvb~<\ q4 )wcf쬼*=E`z .ګKD ztz.-|T񨃐׀\9g J˔"ɃdmU&ԕ;*ÕU ]2ѽOu8[]fO[cV8`<2X+G!- ;*/4f)UqϯsJ?•cWG^ݐCtv 1U%:#P,R681#xhfZ^ʓ㉌z^+F%1bz]de#3Ԙ%;gȌ떆Pn+(1wds#Z=ctp7d$5(ၩ " A|sWzXʌG~-l-ZldGӦ_C'3y '{R.h-Z6$"eKb!c#Ŕp~{3m۩Ip<@Yiŕ"yYc3EH{uq\hf)p*0@ix6t AQ'4"g a+:\ 0pa˶L(GV gPH'u`? \lYǻؐRz!W ^_Mnh:gm0oSOc+QsSl:dAV&5YhPl_\"9y78Q-s 版2NN_xGAIB j׽D> .jt+3Z);Tlm&f[T2(6c99Olט|!o*\OՔo:&&W‹Vl= ~fFXllK?vq[bO~Ӏ_UuE+W[o v<ތKx`D~=(iAcDqS/Bec=@ܥ Nkᅠw}ķxjrkZ[D"/;4GP`j/=w߀ 17;#둢T!@@v4jXl)Ȏ>0QpGdjXj }4A8U1R^$#o|RbOx0z\O){&{1_ Okt˶9F2/9t۸߱B o0}ye?2W"ƇϦÒr١-Yi R&`SXE39]R,uE[wxBZ]N YZ