openconnect-devel-7.08-lp152.9.4.2<>,*_u/=„Z,U' YU/@HUdـӡ]ƹC%ɮbY_Y}0m)%~|HcQarӪjDc*Ʉ-\hw; F\|,4<0*X:m5^Zj$#[A8aSO@Pńd%NJOلVȮ0&ZSch3;nTjLqG pw,E3s^bF#@q~^{gēf1u-nd>A!?!d % S  #Cms|    # @L[jR(}89:!FGHIXY\]^3bcc d e f l u v w x!y! z!@!P!T!_!`!d!j!Copenconnect-devel7.08lp152.9.4.2Development files and headers for openconnectThis package provides a client for Cisco's "AnyConnect" VPN, which uses HTTPS and DTLS protocols. AnyConnect is supported by the ASA5500 Series, by IOS 12.4(9)T or later on Cisco SR500, 870, 880, 1800, 2800, 3800, 7200 Series and Cisco 7301 Routers, and probably others. This packages provides development files and headers needed to build packages against openconnect_ucloud123iopenSUSE Leap 15.2openSUSELGPL-2.1-or-laterhttp://bugs.opensuse.orgDevelopment/Libraries/C and C++http://www.infradead.org/openconnect.htmllinuxx86_64h8_s_s_sf6613421dd6923d41a9711f39f72f246d4ad2f116fa8d3eb2f4b90c1684fe1276bf165cbad64e979e831fda1a44330f9c0441db850061f392a885c45dcf29fb2libopenconnect.so.5.4.0rootrootrootrootrootrootopenconnect-7.08-lp152.9.4.2.src.rpmopenconnect-developenconnect-devel(x86-64)pkgconfig(openconnect)@@@@@@@@@@    /usr/bin/pkg-configopenconnectpkgconfig(gnutls)pkgconfig(liblz4)pkgconfig(libpcsclite)pkgconfig(libproxy-1.0)pkgconfig(libpskc)pkgconfig(libxml-2.0)pkgconfig(p11-kit-1)pkgconfig(stoken)pkgconfig(zlib)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)7.083.0.4-14.6.0-14.0-15.2-14.14.1^@^]mZlZ*~YXS@WWU@U.@T,@TZ@T@T5TLJonathan Kang Jonathan Kang Jonathan Kang fcrozat@suse.comdimstar@opensuse.orgsckang@suse.comi@marguerite.sufativi@gmail.comfativi@gmail.comidonmez@suse.comidonmez@suse.comidonmez@suse.comidonmez@suse.comrsalevsky@suse.comrsalevsky@suse.comrsalevsky@suse.com- Add openconnect-CVE-2020-12823.patch: gnutls: prevent buffer overflow in get_cert_name(bsc#1171862, CVE-2020-12823, gl#openconnect/openconnect!108).- Add openconnect-CVE-2020-12105.patch: Use OpenSSL X509_check_host() and X509_check_ip() correctly(bsc#1170452, CVE-2020-12105).- Add openconnect-CVE-2019-16239.patch: Fix buffer overflow with chunked HTTP handling(bsc#1151178, CVE-2019-16239).- Add BuildRequires pkgconfig(libpcsclite/libpskc) to enable liboath (TOTP/HOTP) and yubikey support.- Add explicit python2-base and python2-xml BuildRequires: the buildsystem checks for python2 and disables building the documentation if not found. Buildinf the documentation in plus depends on the xml modules. So far we relied on other packages pulling in python2 for us.- Drop vpnc dependency by including vpnc-script from vpnc package (fate#323497).- update to version 7.08 (bsc#1056389) * Add SHA256 support for server cert hashes. * Enable DHE ciphers for Cisco DTLS. * Increase initial oNCP configuration buffer size. * Improve support for point-to-point routing on Windows. * Check for non-resumed DTLS sessions which may indicate a MiTM attack. * Fix compatibility with Pulse Secure 8.2R5. * Support DTLS automatic negotiation. * Support --key-password for GnuTLS PKCS#11 PIN. * Support automatic DTLS MTU detection with OpenSSL. * Update OpenSSL to allow TLSv1.2, improve compatibility options. * Remove --no-cert-check option. It was being (mis)used. * Fix OpenSSL support for PKCS#11 EC keys without public key. * Fix polling/retry on "tun" socket when buffers full. * Fix AnyConnect server-side MTU setting. * Fix ESP replay detection. * Add certificate torture test suite. * Support PKCS#11 PIN via pin-value= and --key-password for OpenSSL. * Fix integer overflow issues with ESP packet replay detection. * Add --pass-tos option as in OpenVPN. * Support role selection form in Juniper VPN. * Support DER-format certificates, add certificate format torture tests. * For OpenSSL >= 1.0.2, fix certificate validation when only an intermediate CA is specified with the --cafile option. * Support Juniper "Pre Sign-in Message". - dropped juniper-fix-for-upstream-sources.patch, upstreamed- Upgraded to 7.07, included fix for Juniper vpn- Update to version 7.0.7 * More fixes for OpenSSL 1.1 build. * Support Juniper "Post Sign-in Message". * Add --protocol option. * Fix ChaCha20-Poly1305 cipher suite to reflect final standard. * Add ability to disable IPv6 support via library API. * Set groups appropriately when using setuid(). * Automatic DTLS MTU detection. * Support SSL client certificate authentication with Juniper servers. * Revamp SSL certificate validation for OpenSSL and stop supporting OpenSSL older than 0.9.8. * Fix handling of multiple DNS search domains with Network Connect. * Fix handling of large configuration packets for Network Connect. * Enable SNI when built with OpenSSL (1.0.1g or later). * Add --resolve and --local-hostname options to command line. - juniper-fix-for-upstream-sources.patch included to fix upgraded Juniper servers * Submitted to upstream, not yet included in release- Update to version 7.0.6 * Fix openconnect.pc breakage after liboath removal. * Refactor Juniper Network Connect receive loop. * Fix some memory leaks. * Add Bosnian translation.- Update to version 7.0.5 * Fix alignment issue which broke LZS compression on ARM etc. * Support HTTP authentication to servers, not just proxies. * Add SHA256/SHA512 support for OATH. * Remove liboath dependency. * Support DTLS v1.2 and AES-GCM with OpenSSL 1.0.2. * Add OpenSSL 1.0.2 to known-broken releases (RT#3703, RT#3711). * Fix build with OpenSSL HEAD (OpenSSL 1.1.x). * Preliminary support for Juniper SSL VPN.- Update to Version 7.04 * Change default behaviour to enable only stateless compression. * Add --compression argument and openconnect_set_compression_mode(). * Add support for LZS compression * Add support for LZ4 compression - Add liblz4-devel dependency for LZ4 compression support.- Update to Version 7.03 * Clean up handling of incoming packets. * Fix issue with two-stage (i.e. NetworkManager) connection to servers with trick DNS (rh#1179681). * Stop using static variables for received packets.- Update to Version 7.02 * Add PKCS#11 support for OpenSSL. * Fix handling of select options in openconnect_set_option_value().- Update to Version 7.01 * Try harder to find a PKCS#11 key to match a given certificate. * Handle 'Connection: close' from proxies correctly. * Warn when MTU is set too low (<1280) to permit IPv6 connectivity. * Add support for X-CSTP-DynDNS, to trigger DNS lookup on each reconnec- Update to Version 7.00 * Add support for GnuTLS 3.4 system: keys including Windows certificate store. * Add support for HOTP/TOTP keys from Yubikey NEO devices. * Add ---no-system-trust option to disable default certificate authorities. * Improve libiconv and libintl detection. * Stop calling setenv() from library functions. * Support utun driver on OS X. * Change library API so string ownership is never transferred. * Support new NDIS6 TAP-Windows driver shipped with OpenVPN 2.3.4. * Support using PSKC (RFC6030) token files for HOTP/TOTP tokens. * Support for updating HOTP token storage when token is used. * Support for reading OTP token data from a file. * Add full character set handling for legacy non-UTF8 systems (including Windows). * Fix legacy (i.e. not XML POST) submission of non-ASCII form entries (even in UTF-8 locales). * Avoid retrying without XML POST, when we failed to even reach the server. * Fix off-by-one in parameter substitution in error messages. * Improve reporting when GSSAPI auth requested but not compiled in. * Fix parsing of split include routes on Windows. * Fix crash on invocation with --token-mode but no --token-secret.cloud123 15950042777.08-lp152.9.4.27.08-lp152.9.4.27.08openconnect.hlibopenconnect.soopenconnect.pc/usr/include//usr/lib64//usr/lib64/pkgconfig/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:13364/openSUSE_Leap_15.2_Update/9e90ec90a0fd09408ff948e6e92dd950-openconnect.openSUSE_Leap_15.2_Updatedrpmxz5x86_64-suse-linuxC source, UTF-8 Unicode textpkgconfig file PRRR RRRR RRR_ñŜIRpkg-configutf-84fd18564fa504a83d5e53821457113b1d0ec6e36f396572ef416425a3c721e9d?7zXZ !t/]"k%IN2jj[M `]3h1ˮrtKݡ {X+UQ%w$5r(%ˮjYTv;?bה>~֯HN YP8!W<_Fgâɾ8ZDا ZP/88%4fDjQ(%}KS"CִЯPUu䯇kR s]Om%Tܛ͘jX\2kprq WnɄkJ%G}qx O6gՏYuj;j6z6D]nqTBU%>*氶oJߎXPД,\G8g'_bX{_H&'5ԠtTROξ"S# &_߇v(۪3DPr3Ybּ [ U,h㮿tMȝ`L~il,W`BFצ^cD+q'j4Dk=Kʤ8689A .IB% ÝA4qyPK &uMRΚ/GZSCq|y`Tj$:;`_B;S#I:CƽS̢NXQ@65NgSiq6Q zCv,j tBRTSKlu6Kg. iXg)ihGOm6syqKO.4r3)\7#R ߕ"Sn+8-eVk^`W%8S,w2.!yz YZ