http://bugzilla.opensuse.org/show_bug.cgi?id=934751 http://bugzilla.opensuse.org/show_bug.cgi?id=934751#c12 --- Comment #12 from James Rome <jamesrome@alum.mit.edu> --- Created attachment 638961 --> http://bugzilla.opensuse.org/attachment.cgi?id=638961&action=edit zip of the repo jarfx:~ # zypper patch Retrieving repository 'Packman Repository' metadata ..............................[done] Building repository 'Packman Repository' cache ...................................[done] Retrieving repository 'Main Update Repository' metadata ..........................[done] Building repository 'Main Update Repository' cache ...............................[done] Retrieving repository 'google-chrome' metadata ...................................[done] Building repository 'google-chrome' cache ........................................[done] Retrieving repository 'openSUSE:13.2:Update' metadata -------------------------------[-] Warning: Digest verification failed for file '03f8cec0b5ba52d39c90891a512c6d2ca7d7b125aa1bed572372463bcbe37c5f-appdata.xml.gz' [/var/cache/zypp/raw/openSUSE:13.2:UpdatevL0pFR/repodata/03f8cec0b5ba52d39c90891a512c6d2ca7d7b125aa1bed572372463bcbe37c5f-appdata.xml.gz] expected 33949d687153a3ab9e5e39713a1768690fa6c672df9cbc30e28af69414f95c6c but got 4df95663ea673827c548aaeeebddbf34d8566edd08b58ca052a5cd6c96cbf509 Accepting packages with wrong checksums can lead to a corrupted system and in extreme cases even to a system compromise. However if you made certain that the file with checksum '4df9..' is secure, correct and should be used within this operation, enter the first 4 characters of the checksum to unblock using this file on your own risk. Empty input will discard the file. Unblock or discard? [4df9/? shows all options] (discard): -- You are receiving this mail because: You are on the CC list for the bug.