mokutil-0.3.0-lp151.6.4.1<>,&H^ú/=„)[~5EBCM\־&>?d   F) BXw}     4H`(8 9$ : F }G H I X Y \ ]^1bc+defluvw0xDyXzCmokutil0.3.0lp151.6.4.1Tools for manipulating machine owner keysThis program provides the means to enroll and erase the machine owner keys (MOK) stored in the database of shim. Authors: -------- Gary Lin ^úcloud120JGary Ching-Pang Lin glin@suse.comkukuk@suse.deglin@suse.comglin@suse.comglin@suse.comglin@suse.comglin@suse.comglin@suse.com- Add mokutil-bsc1170889-check-errno-correctly.patch to fix the errono check when listing keys (bsc#1170889)- Add modhash to calculate the hash of kernel module (jsc#SLE-5661, jsc#SLE-6094, bsc#1148494) + Also add openssl to Requires since the script needs it- Enable AArch64 build (bsc#1119769, fate#326541)- Use %license instead of %doc [bsc#1082318]- Patches for efivar 0.24 + Add mokutil-set-efi-variable-file-mode.patch to set the file mode explicitly. + Add mokutil-constify-efi-guid.patch to make all efi_guild_t variables const. + Refresh mokutil-support-revoke-builtin-cert.patch for the change of efi_set_variable()- Add mokutil-fshort-wchar.patch to make sure the UEFI strings are UCS-2 encoding.- Update to 0.3.0 - Add mokutil-fix-overflow.patch to fix the buffer overflow - Drop upstreamed patches + mokutil-upstream-fixes.patch + mokutil-mokx-support.patch + mokutil-check-corrupted-key-list.patch + mokutil-check-secure-boot-support.patch + mokutil-clean-request.patch + mokutil-fix-hash-file-read.patch + mokutil-fix-hash-list-size.patch + mokutil-more-details-for-skipped-keys.patch + mokutil-no-invalid-x509.patch - Refresh mokutil-support-revoke-builtin-cert.patch- Add mokutil-fix-hash-file-read.patch to fix the error handling of reading a hash file- Add mokutil-check-corrupted-key-list.patch to check whether the key list is corrupted or not - Add mokutil-no-invalid-x509.patch to avoid importing an invalid x509 certificate- Add mokutil-more-details-for-skipped-keys.patch to show the reason to skip the key - Add mokutil-check-secure-boot-support.patch to check whether the system supports Secure Boot or notcloud120 15900845380.3.0-lp151.6.4.10.3.0-lp151.6.4.1modhashmokutilmokutilCOPYINGmokutil.1.gz/usr/bin//usr/share/licenses//usr/share/licenses/mokutil//usr/share/man/man1/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:12675/openSUSE_Leap_15.1_Update/147f5d0b1c1c4b14e323e0816dba0bcf-mokutil.openSUSE_Leap_15.1_Updatedrpmxz5x86_64-suse-linuxPerl script text executableELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/l, BuildID[sha1]=b3bd85fee16d0d4abd1a16d0c223c36f9c3b2730, for GNU/Linux 3.2.0, strippeddirectoryASCII texttroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)RR R R RRRRRRRR R RR\ F¥K2mF utf-88e73032bee9ead733f5a528d68ae75f13e527953899018c01973b356ebf8de35? 7zXZ !t/,S]"k%jm1V L2ػ/q0KMö74W;(YP3_'%arRQۇn΂pY!#K~РD￷q1vҗ{iU):~ 3]&4uHBQf!% ns?A֑p 1Mdg| 4bn*Yu~/5hMA;؛`( :="[0 YGi&y@ٛ)C A\O_F&Ȩt,ggb&^}24|P$\g gV`Sqdm7uJUĵR@ 9׭!1Cƒ[]:[@ WP/;v{څєNfo7d[}Ї=$i3O X k Tߣ)(r%ǖbSBA1' .ر-9r¢Cydc{G.&,_jƠ ōI7Tɠщˌ'bIM';ݘ ~7sz-b b j[>bnvOTzW:B X!ƹo\Ci]mA.\{b~ rt7ڂj%2TAT|>'և1@MWe}ל(yDˋrRC'pdSU7t5Qᖑ^Qaې}[ړ(Ql'Pz#bʂӉ{љJৣ7lk>~3h[8ҹ#c97 ,﬒z[9xC4;G h̚ +mHݽUUg͹`Z3Y ~T G[=p~3H'ZրF#9B_cGϐG )lЏϨxG*㰀Vy W=qK_?<$sJ4'`U j\i:"r7(q1B ([;^\ewk4qi1<`pXc 9=^(uCpc_/Y9qi=/Jx,^'<]A&H8ycۡU8f4tER ;C޴PKS@L9"w713q7 U%`0F~pt7ADHIDfJoKΕ-3M [^7lbCzԠ66J$x4˪17W$ՒSw|2P]g炔 ZVU R9{ iKʔ1-͌ns:.ͣͫw>̲PgO+=0v=畫D&}Z𧍴l25QϧJћ [:"V#$](7)+sr&a3 ~Y亹ٙ`mwۯpA^;ASg60`k.i?߲!d3. 9!{ @l8(^3D!J_0!?"^7 Mvׁ4<'0 XjӶ YZ