python3-sss-murmur-2.9.5-4.el9_5.4> M Mv ĉJ4!!%joLne)Ip-Bm5 ']gbPreleng@rockylinux.org p-Bm5 ']\ ZA&(4CmWuŔ|upOO~{,SzĮrApFO/qUx@C_97]>+^Pi4r9V8JSh4(m@QP42O!-YRRkhD6$܉ub^[6W.fB%z,'ۗnա 01iXLWctn~uQRUcH;2R>rI40u\Wa>@)?)d % O  HTrx     8H\p ( J (t89: B%pG%H%I%X%Y%Z& [&\&4]&D^&b&d(+e(0f(5l(8t(Tu(dv(tw)x)$y)4 )X)\)b))Cpython3-sss-murmur2.9.54.el9_5.4Python3 bindings for murmur hash functionProvides python3 module for calculating the murmur hash version 3gbMpb-3d2848ff-4713-4ffd-ba92-8462c1b0a65a-b-aarch64 =Rocky Linux 9.5Rocky Enterprise Software FoundationLGPLv3+Rocky Linux Build System (Peridot) Unspecifiedhttps://github.com/SSSD/sssd/linuxaarch64= AAgbNgbNgbNgbNe5dc9001c64f515358204c9e3d03e84d2b2cca9f72f06f9d4bbdde6717b57c74../../../../usr/lib64/python3.9/site-packages/pysss_murmur.sorootrootrootrootrootrootrootrootsssd-2.9.5-4.el9_5.4.src.rpmpython-sss-murmurpython3-sss-murmurpython3-sss-murmur(aarch-64)python3.9-sss-murmur@@@@@@@    @ld-linux-aarch64.so.1()(64bit)ld-linux-aarch64.so.1(GLIBC_2.17)(64bit)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libcrypt.so.2()(64bit)libm.so.6()(64bit)python(abi)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsZstd)rtld(GNU_HASH)3.93.0.4-14.6.0-14.0-15.4.18-14.16.1.3g@r@g;,@g-@ffffy_fE@f/f! @fg@e!@e@e@e)eReRe@d dd@ddu@doMdbc<@c]Alexey Tikhonov - 2.9.5-4.4Alexey Tikhonov - 2.9.5-4.3Alexey Tikhonov - 2.9.5-4.2Alexey Tikhonov - 2.9.5-4.1Alexey Tikhonov - 2.9.5-4Alexey Tikhonov - 2.9.5-3Alexey Tikhonov - 2.9.5-2Alexey Tikhonov - 2.9.5-1Alexey Tikhonov - 2.9.4-7Alexey Tikhonov - 2.9.4-6Alexey Tikhonov - 2.9.4-5Alexey Tikhonov - 2.9.4-4Alexey Tikhonov - 2.9.4-3Alexey Tikhonov - 2.9.4-2Alexey Tikhonov - 2.9.4-1Alexey Tikhonov - 2.9.3-2Alexey Tikhonov - 2.9.3-1Alexey Tikhonov - 2.9.2-2Alexey Tikhonov - 2.9.2-1Alexey Tikhonov - 2.9.1-2Alexey Tikhonov - 2.9.1-1Alexey Tikhonov - 2.9.0-5Alexey Tikhonov - 2.9.0-4Alexey Tikhonov - 2.9.0-3Alexey Tikhonov - 2.9.0-1Alexey Tikhonov - 2.8.2-2Alexey Tikhonov - 2.8.2-1- Resolves: RHEL-68508 - sssd backend process segfaults when krb5.conf is invalid [rhel-9.5.z]- Resolves: RHEL-67673 - Label DP_OPT_DYNDNS_REFRESH_OFFSET has no corresponding option [rhel-9.5.z]- Resolves: RHEL-66268 - SSSD needs an option to indicate if the LDAP server can run the exop with an anonymous bind or not [rhel-9.5.z]- Resolves: RHEL-59876 - EL9/CentOS Stream 9 lost offline smart card authentication - Resolves: RHEL-50912 - possible regression of rhbz#2196521- Resolves: RHEL-49711 - SYSDB: remove index on dataExpireTimestamp - Resolves: RHEL-49811 - 2FA is being enforced after upgrading 2.9.1->2.9.4- Resolves: RHEL-40742 - passkey_child with wrong owner- Resolves: RHEL-40742 - passkey_child with wrong owner - Resolves: RHEL-41047 - sssd is skipping GPO evaluation with auto_private_groups - Resolves: RHEL-40570 - GPO access the wrong memory location- Resolves: RHEL-36586 - Rebase SSSD for RHEL 9.5 - Resolves: RHEL-27716 - SSSD fails to process AD groups with 'Global Scope' correctly causing incomplete group-membership on RHEL if cache is empty - Resolves: RHEL-17659 - [RfE] SSSD Failover Enhancements - Resolves: RHEL-35781 - Passkey errors when handling multiple altSecurityIdentities values - Resolves: RHEL-30142 - sssd_pac is crashing - Resolves: RHEL-22206 - Errors in krb5_child.log every time a user authenticates - Pre-authentication failed: No pkinit_anchors supplied - Resolves: RHEL-32595 - Excessive "Domain not found' messages logged to sssd_nss & sssd_be in multidomain AD forest - Resolves: RHEL-28666 - sssctl config-check is reporting false positive error msg - Resolves: RHEL-29454 - NULL dereference in inotify handling - Resolves: RHEL-1654 - Improve documentation for allowing e-mail address as username- Relates: RHEL-33645 - Rebase Samba to the latest 4.20.x release- Resolves: RHEL-27209 - Race condition during authorization leads to GPO policies functioning inconsistently [rhel-9.4.0]- Resolves: RHEL-28161 - Passkey cannot fall back to password- Resolves: RHEL-28161 - Passkey cannot fall back to password- Resolves: RHEL-22340 - socket leak - Resolves: RHEL-28161 - Passkey cannot fall back to password- Resolves: RHEL-12503 - AD users are unable to log in due to case sensitivity of user because the domain is found as an alias to the email address. - Resolves: RHEL-22288 - ssh pubkey stored in ldap/AD no longer works to authenticate via sssd - Resolves: RHEL-22194 - gdm smartcard login fails with sssd-2.9.3 in case of multiple identities- Resolves: RHEL-2632 - Rebase SSSD for RHEL 9.4 - Resolves: RHEL-18395 - latest sssd breaks logging in via XDMCP for LDAP/Kerberos users - Resolves: RHEL-17498 - New sssd.conf seems not to be backwards compatible (wrt SmartCard auth of local users using 'files provider') [rhel-9] - Resolves: RHEL-21079 - SSSD GPO lacks group resolution on hosts [rhel-9] - Resolves: RHEL-19211 - Excessive logging to sssd_nss and sssd_be in multi-domain AD forest [rhel-9]- Resolves: RHEL-2632 - Rebase SSSD for RHEL 9.4- Resolves: RHEL-2632 - Rebase SSSD for RHEL 9.4 - Resolves: RHEL-14427 - Expected cn in RDN, got uid - Resolves: RHEL-12229 - HANA validation on RHEL 9.2 issue possibly related to libc/nss_sss behaviour - Resolves: RHEL-3925 - SSSD goes offline when, while reading a single user, misses a required attribute (i.e. SID) - Resolves: RHEL-2319 - Passkey authentication for centrally managed users - Resolves: RHEL-4146 - Incorrect handling of reverse IPv6 update results in update failure - Resolves: RHEL-4971 - sssd-kcm does not appear to expire Kerberos tickets (RFE: sssd_kcm should have the option to automatically delete the expired tickets)- Resolves: RHEL-2319 - Passkey authentication for centrally managed users- Resolves: RHEL-2632 - Rebase SSSD for RHEL 9.4 - Resolves: RHEL-2319 - Passkey authentication for centrally managed users - Resolves: rhbz#2234829 - SSSD runs multiples lookup search for each NFS request (SBUS req chaining stopped working) - Resolves: rhbz#2236119 - dbus and crond getting terminated with SIGBUS in sss_client code- Resolves: rhbz#2218858 - [sssd] SSSD enters failed state after heavy load in the system- Resolves: rhbz#2167837 - Rebase SSSD for RHEL 9.3 - Resolves: rhbz#2196816 - [RHEL9] [sssd] User lookup on IPA client fails with 's2n get_fqlist request failed' - Resolves: rhbz#2162552 - sssd client caches old data after removing netgroup member on IDM - Resolves: rhbz#2189542 - [sssd] RHEL 9.3 Tier 0 Localization - Resolves: rhbz#2133854 - [RHEL9] In some cases when `sdap_add_incomplete_groups()` is called with `ignore_group_members = true`, groups should be treated as complete - Resolves: rhbz#1765354 - [RFE] - Show password expiration warning when IdM users login with SSH keys- Related: rhbz#2190415 - Rebase Samba to the latest 4.18.x release Rebuild against rebased Samba libs.- Related: rhbz#2190415 - Rebase Samba to the latest 4.18.x release Rebuild against rebased Samba libs.- Resolves: rhbz#2167837 - Rebase SSSD for RHEL 9.3- Resolves: rhbz#2167837 - Rebase SSSD for RHEL 9.3 - Resolves: rhbz#1765354 - [RFE] - Show password expiration warning when IdM users login with SSH keys - Resolves: rhbz#1913839 - filter_groups doesn't filter GID from 'id' output: AD + 'ldap_id_mapping = True' corner case - Resolves: rhbz#2100789 - [Improvement] sssctl config-check command does not show an error when we don't have id_provider in the domain section - Resolves: rhbz#2152177 - [RFE] Add support for ldapi:// URLs - Resolves: rhbz#2164852 - man page entry should make clear that a nested group needs a name - Resolves: rhbz#2166627 - Improvement: sss_client: add 'getsidbyusername()' and 'getsidbygroupname()' and corresponding python bindings - Resolves: rhbz#2166943 - kinit switches KCM away from the newly issued ticket - Resolves: rhbz#2167728 - [sssd] Auth fails if client cannot speak to forest root domain (ldap_sasl_interactive_bind_s failed)- Resolves: rhbz#2160001 - Reference to 'sssd-ldap-attributes' man page is missing in 'sssd-ldap', etc man pages - Resolves: rhbz#2143159 - automount killed by SIGSEGV- Resolves: rhbz#2127510 - Rebase SSSD for RHEL 9.2 - Resolves: rhbz#1608496 - sssd failing to register dynamic DNS addresses against an AD server due to unnecessary DNS search - Resolves: rhbz#2110091 - SSSD doesn't handle changes in 'resolv.conf' properly (when started right before network service) - Resolves: rhbz#2136791 - Lower the severity of the log message for SSSD so that it is not shown at the default debug level. - Resolves: rhbz#2139684 - [sssd] RHEL 9.2 Tier 0 Localization - Resolves: rhbz#2139837 - Analyzer: Optimize and remove duplicate messages in verbose list - Resolves: rhbz#2142794 - SSSD: `sssctl analyze` command shouldn't require 'root' privileged - Resolves: rhbz#2144893 - changing password with ldap_password_policy = shadow does not take effect immediately - Resolves: rhbz#2148737 - UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-aroundpython-sss-murmurpython39-sss-murmur2.9.5-4.el9_5.42.9.5-4.el9_5.42.9.5-4.el9_5.42.9.5-4.el9_5.4@2.9.5-4.el9_5.42.9.5-4.el9_5.4.build-id8997eff776e6a081e6054ddc391b9de6e05bc884pysss_murmur.so/usr/lib//usr/lib/.build-id//usr/lib/.build-id/89//usr/lib64/python3.9/site-packages/-O2 -flto=auto -ffat-lto-objects -fexceptions -g -grecord-gcc-switches -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -fstack-protector-strong -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -fasynchronous-unwind-tables -fstack-clash-protectioncpiozstd19aarch64-redhat-linux-gnudirectoryELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, BuildID[sha1]=8997eff776e6a081e6054ddc391b9de6e05bc884, strippedORRRRRRRR utf-884e188942dbf3e7034505e06c11cc7cac6e039526d8f2bca647600604ff558015ab3cd8f8ffac6f726bd735cf96fc11a8b2ff9b92f9021f6c3e5bb7a80998819?(/hei$'I@Kk v_ (=ScvE>m!hS`;Eoޖ2ecɑT!:i?U4*:o֤)1A.Lg ߓϜѻ#'Ƈ( -F#1.b(@0<н,%`hǮHH3d[OOgOw᷋6WŭHǂB7DEr8,?DS9ah]%zi^Q&XrFvGm vg;{U6Z۠cURKj5Mfhql]o{lTں&{[7m_l zk ۺ]fX딮Ǣ}\66{u[j߶>MozY0*M=j\,Invg|\ !S l9?t5<{}oDQdbʼn אq%{ bPU%OOGx+0`s^~|7?_;plUceR65Y-ZVkShdod n’KfٌBl-*Ri+L5fBAM6TTv:MQ$TuIzr$zMZndZBe%)H> 6|v!@_Ɉ8%·#ԱFGJL߯0C&|c?`w̐+8 T ? d"X[JbZ.qz[2qitf;ho+7zmS-zZMNGKGR>*_HmXKzŰ0_zT\Sc{]Q7 `Z?j䝯 Hw坃6ޙgKJlc.?cM?x/;{*E݇ E6>퇻R,IwQJby8egB{q"ɊMq<(>{ּ<ώ7ά r7^O%1Pi ;>;\hD w˗,ŝ(C-gN"3gNᙳ{aJt,lYvu$`;#9I4"pBh đ3Eb9'ڏyH OG4U=r^AeCWsg@025HHԗsL~) X{>*1_ *""qyD7qkΌ̌ieͭʚeߓ` D*C֐òf8-p`gv&Ԯ`IH25Bb5%ihAyYJ,<ud 8lP>HüslɁŃ7ɟ-irXQDbQ lz~cL,_N!rZKhVhT6$9f3pN0YB踀l]; ̖ 7S=*bYdll0d氠͎n0G yrE-PԶb@0<|;#:M0O_R]֤]eQna`b3@)蠅!]#.1 Cu[9,'M%CJL?R%0&AVA(p xtf1trbv0-fC'TӦl*afEɗ_;95 ciQUJ=-k&.zl5ELU%81B %򉎺2 ٴ׉o}w8g:XI"v7LPQIt0b1$j 8u 2D($~_TT҂1PM#5e<~qkk'ˏkydxxyÉsqX#â:O\`$NCֱ\:xaoֺDfhHCpJ_XjoQ+X}kVitFtZVװj#bɤȟ"m<[mU ˡ"6p~"?4IRXHsnTb< X) &4M\-ef3A#5l,(6꧳텤܏Y>Lh(_: åIg l7Lir R;rgEZqL+Rp./?ʜg!An 32@S\LTc00nVdL"lP dJ M[cV$J`I[nP"31%7bhM AқᔔqY=.xJpl!ZAEӕ0T9Th1R; ¥"K K\RwH,"CNOI -z + I:wBL 1g+2XnOoNfk^MW5aǃ8yBLžxO)uNz~kyIO,pW,|`u?W.؆f eHwnq8S}dEgZdOy\`{Y)O,ٯ]x5om UqAX07)Cs:.q}P'#9!p?SjJWH8T0)Mk4n XSP6`3$ sC= YF?uZX ;m0֮#, ŸƧgux|Ҝ`FGl5<ۮaʻ&*'7zi KgLVJ]a  [ 3Ѧ=Z/4<֤J*jQy$>/n^7/}=WN!D6D09Δԭ r=}'Jgl{dA(c˺bFk_w[\4J|Cl'FջrEV