libbotan-devel-3.5.0-bp157.2.3.1<>,?Љi׫I%z R {֎=$8uƉ 8rA2(?2d # ? (DJT8     7y 8H;,>BfBElE E F (F8F-9G-:L-BFGHIXYZ[\]^&? b' c'd(Ue(Zf(]l(_u(tv+Xw+x.y1z11112Clibbotan-devel3.5.0bp157.2.3.1Development files for BotanThis package contains the header files and libraries needed to develop programs that use the Botan library.i׫i01-armsrv3SUSE Linux Enterprise 15openSUSEBSD-2-Clausehttp://bugs.opensuse.orgDevelopment/Libraries/C and C++https://botan.randombit.netlinuxaarch64J6G 5 U3;j %9",4 y  |*gI=0~  *E vD (Z<"S z }Uos<2!';$^.! $'{1D:N"GXj%VWwy$ *>TA^S!F !jP5/_h ( AF/+  m v @F : (rOvL57 Wg\,}s ' *AA큤AA큤A큤iׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiׅiת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.so.5.5.0rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootBotan-3.5.0-bp157.2.3.1.src.rpmBotan-devellibbotan-devellibbotan-devel(aarch-64)pkgconfig(botan-3)@    /usr/bin/pkg-configlibbotan-3-5libbz2-develpkgconfig(liblzma)pkgconfig(sqlite3)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)trousers-devel3.5.03.0.4-14.6.0-14.0-15.2-14.14.3iۉ@ff@eWUcv"@b@aC@a)@` @`y|@_1@_u@_@_ _9^\N\73[`O@[DZJ@Z̧@ZlZZ$ZZZ0@Z|;ZWQZS]@Y@Y@YA@YéXX@Xc@X(UW5VV{@U@UULucas Mulling Andreas Stieger Angel Yankov Marcus Meissner Jason Sikes Dirk Müller Andreas Stieger Dirk Müller Andreas Stieger Ferdinand Thiessen Andreas Stieger Andreas Stieger Andreas Stieger Pedro Monreal Dirk Mueller Paolo Stivanin Daniel Molkentin Daniel Molkentin daniel.molkentin@suse.comdaniel.molkentin@suse.comkasimir_@outlook.dedaniel.molkentin@suse.comdaniel.molkentin@suse.comsleep_walker@opensuse.orgsleep_walker@opensuse.orgadam.majer@suse.deadam.majer@suse.desleep_walker@opensuse.orgsleep_walker@opensuse.orgi@marguerite.sui@marguerite.sumimi.vx@gmail.comdaniel.molkentin@suse.comdaniel.molkentin@suse.comvcizek@suse.comdaniel.molkentin@suse.comdaniel.molkentin@suse.compth@suse.denetsroth@opensuse.orgfaure@kde.orgmichael@stroeder.commpluskal@suse.commvyskocil@opensuse.orgnetsroth@opensuse.orgliujianfeng1994@gmail.com- Security fix: * CVE-2026-34582: client authentication bypass in TLS 1.3 implementation (bsc#1261880) * Add patch Botan-CVE-2026-34582.patch- Botan 3.5.0, the latest stable release of the Botan 3 series * TLS 1.3 supported * large header cleanup compared to v2 * start support of Post Quantum Crypto * removed: CAST-256, MISTY1, Kasumi, DESX, XTEA, PBKDF1, MCEIES, CBC-MAC, Tiger, CECPQ1, and NewHope - The legacy Botan 2 series moved to Botan2 source package. It is EOL at the end of 2024.- Update to 2.19.5: * Fix multiple Denial of service attacks due to X.509 cert processing: * CVE-2024-34702 - bsc#1227238 * CVE-2024-34703 - bsc#1227607 * CVE-2024-39312 - bsc#1227608 * Fix a crash in OCB * Fix a test failure in compression with certain versions of zlib * Fix some iterator debugging errors in TLS CBC decryption. * Avoid a miscompilation in ARIA when using XCode 14- remove botan binary (moves to Botan3)- Update to 2.19.3: * validate that an embedded certificate was issued by the end-entity issuing certificate authority when checking OCSP responses. * CVE-2022-43705 * bsc#1205509- update to 2.19.2: * Add support for parallel computation in Argon2 * Add SSSE3 implementation of Argon2 * The OpenSSL provider was incompatible with OpenSSL 3.0. It has been removed * Avoid using reserve in secure_vector appending, which caused a performance problem * Fix TLS::Text_Policy behavior when X25519 is disabled at build time * Fix several warnings from Clang- update to 2.19.1: * Add a forward error correction code compatible with the zfec library- update to 2.18.2: * Avoid using short exponents when encrypting in ElGamal, as some PGP implementations generate keys with parameters that are weak when short exponents are used CVE-2021-40529 boo#1190244 * Fix a low risk OAEP decryption side channel * Work around a miscompilation of SHA-3 caused by a bug in Clang 12 and XCode 13 * Remove support in OpenSSL provider for algorithms which are disabled by default in OpenSSL 3.0 * Add CI based on GitHub actions to replace Travis CI * Fix the online OCSP test, as the certificate involved had expired. * Fix some test failures induced by the expiration of the trust root "DST Root CA X3"- Botan 2.18.1: * Fix a build regression in 2.18.0 which caused linker flags which contain -l within them (such as -fuse-linker-plugin) to be misinterpreted * Fix a bug which caused decoding a certificate which contained more than one name in a single RDN * Fix a bug which caused OID lookup failures when run in a locale which uses thousands separators (pt_BR was reported as having this issue) * DNS names in name constraints were compared with case sensitivity, which could cause valid certificates to be rejected * X.509 name constraint extensions were rejected if non-critical. RFC 5280 requires conforming CAs issue such extensions as critical, but not all certificates are compliant, and all other known implementations do not require this * X.509 name constraints were incorrectly applied to the certificate which included the constraint - build with lzma compression support - build with SQLite support - build with TPM support - fix SLE 12 build- Botan 2.18.0 * Add support for implementing custom RNG objects through the FFI interface * Improve safegcd bounds, improving runtime performance * Reject non-TLS messages as quickly as possible without waiting for a full record. * Fixes for TLS::Stream::async_shutdown - Removed unneeded GNU MP build requirement, support was dropped with version 1.11.10 - Enabled check target, verify integrity of build library- Botan 2.17.3: * Harden against side-channels from decoding secret values by changing the base64, base58, base32, and hex encoding and decoding opearations to run in constant time- Botan 2.17.2: * Fix build problem on ppc64 * Resolve an issue in the modular square root algorithm- Botan 2.17.1: * Fix bugs in ECDSA signature generation and verifications under specific circumstances * developer visible changes, including deprecation with warnings * optimization in the non-hardware assisted AES key generation * Add more detection logic for AVX-512 features * Fix a bug parsing deeply nested cipher names * Prevent requesting DER encoding of signatures when the algorithm did not support it- Update to 2.16.0: * Now userspace PRNG objects (such as AutoSeeded_RNG and HMAC_DRBG) use an internal lock, which allows safe concurrent use. This however is purely a precaution in case of accidental sharing of such RNG objects; for performance reasons it is always preferable to use a RNG per thread if a userspace RNG is needed. * DL_Group and EC_Group objects now track if they were created from a known trusted group (such as P-256 or an IPsec DH parameter). If so, then verification tests can be relaxed, as compared to parameters which may have been maliciously constructed in order to pass primality checks. * RandomNumberGenerator::add_entropy_T assumed its input was a POD type but did not verify this. * Support OCSP responders that live on a non-standard port. * Add support for Solaris sandbox. * Support suffixes on release numbers for alpha/beta releases. * Fix a bug in EAX which allowed requesting a 0 length tag, which had the effect of using a full length tag. Instead omit the length field, or request the full tag length explicitly. * Fix a memory leak in GCM where if passed an unsuitable block cipher (eg not 128 bit) it would throw an exception and leak the cipher object.- update to 2.15: Fix a bug where the name constraint extension did not constrain the alternative DN field which can be included in a subject alternative name. This would allow a corrupted sub-CA which was otherwise constrained by a name constraint to issue a certificate with a prohibited DN. Fix a bug in the TLS server during client authentication where where if a (disabled by default) static RSA ciphersuite was selected, then no certificate request would be sent. This would have an equivalent effect to a client which simply replied with an empty Certificate message. (GH #2367) Replace the T-Tables implementation of AES with a 32-bit bitsliced version. As a result AES is now constant time on all processors. (GH #2346 #2348 #2353 [#2329] #2355) In TLS, enforce that the key usage given in the server certificate allows the operation being performed in the ciphersuite. (GH #2367) In X.509 certificates, verify that the algorithm parameters are the expected NULL or empty. (GH #2367) Change the HMAC key schedule to attempt to reduce the information leaked from the key schedule with regards to the length of the key, as this is at times (as for example in PBKDF2) sensitive information. (GH #2362) Add Processor_RNG which wraps RDRAND or the POWER DARN RNG instructions. The previous RDRAND_RNG interface is deprecated. (GH #2352) The documentation claimed that mlocked pages were created with a guard page both before and after. However only a trailing guard page was used. Add a leading guard page. (GH #2334) Add support for generating and verifying DER-encoded ECDSA signatures in the C and Python interfaces. (GH #2357 #2356) Workaround a bug in GCC’s UbSan which triggered on a code sequence in XMSS (GH [#2322]) When building documentation using Sphinx avoid parallel builds with version 3.0 due to a bug in that version (GH #2326 #2324) Fix a memory leak in the CommonCrypto block cipher calls (GH #2371) Fix a flaky test that would occasionally fail when running the tests with a large number of threads. (GH #2325 #2197) Additional algorithms are now deprecated: XTEA, GOST, and Tiger. They will be removed in a future major release.- Update to Botan 2.14: * Add support for using POWER8+ VPSUMD instruction to accelerate GCM (GH #2247) * Optimize the vector permute AES implementation, especially improving performance on ARMv7, Aarch64, and POWER. (GH #2243) * Use a new algorithm for modular inversions which is both faster and more resistant to side channel attacks. (GH #2287 #2296 #2301) * Address an issue in CBC padding which would leak the length of the plaintext which was being padded. Unpadding during decryption was not affected. * Optimize NIST prime field reductions, improving ECDSA by 3-9% (GH #2295) * Increase the size of the ECC blinding mask and scale it based on the size of the group order. (GH #880 #893 #2308) * Add server side support for the TLS asio wrapper. (GH #2229) * Add support for using Windows certificate store on MinGW (GH #2280) * Add a CLI utility cpu_clock which estimates the speed of the processor cycle counter. * Add Roughtime client (GH #2143 #1842) * Add support for XMSS X.509 certificates (GH #2172) * Add support for X.509 CRLs in FFI layer and Python wrapper (GH #2213) * Add AVX2 implementation of SHACAL2 (GH #2196) * Support more functionality for X.509 in the Python API (GH #2165) * Add generic CPU target useful when building for some new or unusual platform. * Disable MD5 in BSI or NIST modes (GH #2188) * Many currently public headers are being deprecated. If any such header is included by an application, a warning is issued at compile time. Headers issuing this warning will be made internal in a future major release. * RSA signature performance improvements (GH #2068 #2070) * Performance improvements for GCM (GH #2024 #2099 #2119), OCB (#2122), XTS (#2123) and ChaCha20Poly1305 (GH #2117), especially for small messages. * Add support for constant time AES using NEON and AltiVec (GH #2093 #2095 #2100) * Improve performance of POWER8 AES instructions (GH #2096) * Add support for the POWER9 hardware random number generator (GH #2026) * Add support for 64-bit version of RDRAND, doubling performance on x86-64 (GH #934 #2022) * In DTLS server, support a client crashing and then reconnecting from the same source port, as described in RFC 6347 sec 4.2.8 (GH #2029) * Optimize DTLS MTU splitting to split precisely to the set MTU (GH #2042) * Add support for the TLS v1.3 downgrade indicator. (GH #2027) * Add Argon2 PBKDF and password hash (GH #459 #1981 #1987) * Add Bcrypt-PBKDF (GH #1990) * Add server side support for issuing DTLS HelloVerifyRequest messages (GH #1999) * Add support for the TLS v1.3 supported_versions extension. (GH #1976) * Add Ed25519ph compatible with RFC 8032 (GH #1699 #2000) * Add support for OCSP stapling on server side. (GH #1703 #1967) * Add a boost::asio TLS stream compatible with boost::asio::ssl. (GH #1839 #1927 #1992) * Add a certificate store for Linux/Unix systems. (GH #1885 #1936) * Various Fixes- Update to Botan 2.10 * Bump SONAME * Warning: XMSS currently implements draft-06 which is not compatible with the final RFC 8391 specification. A PR is open to fix this, however it will break all current uses of XMSS. If you are currently using XMSS please comment at https://github.com/randombit/botan/pull/1858. Otherwise the PR will be merged and support for draft-06 will be removed starting in 2.11. * Added a new certificate store implementation that can access the MacOS keychain certificate store. (GH #1830) * Redesigned Memory_Pool class, which services allocations out of a set of pages locked into memory (using mlock/VirtualLock). It is now faster and with improved exploit mitigations. (GH #1800) * Add BMI2 implementations of SHA-512 and SHA-3 which improve performance by 25-35% on common CPUs. (GH #1815) * Unroll SHA-3 computation improving performance by 10-12% (GH #1838) * Add a Thread_Pool class. It is now possible to run the tests in multiple threads with --test-threads=N flag to select the number of threads to use. Use --test-threads=0 to run with as many CPU cores as are available on the current system. The default remains single threaded. (GH #1819) * XMSS signatures now uses a global thread pool instead of spawning new threads for each usage. This improves signature generation performance by between 10% and 60% depending on architecture and core count. (GH #1864) * Some functions related to encoding and decoding BigInts have been deprecated. (GH #1817) * Binary encoding and decoding of BigInts has been optimized by performing word-size operations when possible. (GH #1817) * Rename the exception Integrity_Failure to Invalid_Authentication_Tag to make its meaning and usage more clear. The old name remains as a typedef. (GH #1816) * Support for using Boost filesystem and MSVC’s std::filesystem have been removed, since already POSIX and Win32 versions had to be maintained for portability. (GH #1814) * Newly generated McEliece and XMSS keys now default to being encrypted using SIV mode, support for which was added in 2.8.0. Previously GCM was used by default for these algorithms. * Use arc4random on Android systems (GH #1851) * Fix the encoding of PGP-S2K iteration counts (GH #1853 #1854) * Add a facility for sandboxing the command line util. Currently FreeBSD (Capsicum) and OpenBSD (pledge) sandboxes are supported. (GH #1808) * Use if constexpr when available. * Disable building shared libs on iOS as it was broken and it is not clear shared libraries are ever useful on iOS (GH #1865) * Renamed the darwin build target to macos. This should not cause any user-visible change. (GH #1866) * Add support for using sccache to cache the Windows CI build (GH #1807) * Add --extra-cxxflags option which allows adding compilation flags without overriding the default set. (GH #1826) * Add --format= option to the hash cli which allows formatting the output as base64 or base58, default output remains hex. * Add base58_enc and base58_dec cli utils for base58 encoding/decoding. (GH #1848) * Enable getentropy by default on macOS (GH #1862) * Avoid using -momit-leaf-frame-pointer flags, since -fomit-frame-pointer is already the default with recent versions of GCC. * Fix XLC sanitizer flags. * Rename Blake2b class to BLAKE2b to match the official name. There is a typedef for compat. * Fix a bug where loading a raw Ed25519_PublicKey of incorrect length would lead to a crash. (GH #1850) * Fix a bug that caused compilation problems using CryptoNG PRNG. (GH #1832) * Extended SHAKE-128 cipher to support any key between 1 and 160 bytes, instead of only multiples of 8 bytes. * Minor HMAC optimizations. * Build fixes for GNU/Hurd. * Fix a bug that prevented generating or verifying Ed25519 signatures in the CLI (GH #1828 #1829) * Fix a compilation error when building the amalgamation outside of the original source directory when AVX2 was enabled. (GH #1812) * Fix a crash when creating the amalgamation if a header file was edited on Windows but then the amalgamation was built on Linux (GH #1763)- Update to Botan 2.9 * Bump SONAME * CVE-2018-20187 Address a side channel during ECC key generation, which used an unblinded Montgomery ladder. As a result, a timing attack can reveal information about the high bits of the secret key. * Fix bugs in TLS which caused negotiation failures when the client used an unknown signature algorithm or version (GH #1711 #1709 #1708) * Fix bug affecting GCM, EAX and ChaCha20Poly1305 where if the associated data was set after starting a message, the new AD was not reflected in the produced tag. Now with these modes setting an AD after beginning a message throws an exception. * Use a smaller sieve which improves performance of prime generation. * Fixed a bug that caused ChaCha to produce incorrect output after encrypting 256 GB. (GH #1728) * Add NEON and AltiVec implementations of ChaCha (GH #1719 #1728 #1729) * Optimize AVX2 ChaCha (GH #1730) * Many more operations in BigInt, ECC and RSA code paths are either fully const time or avoid problematic branches that could potentially be exploited in a side channel attack. (GH #1738 #1750 #1754 #1755 #1757 #1758 #1759 #1762 #1765 [#1770] #1773 #1774 #1779 #1780 #1794 #1795 #1796 #1797) * Several optimizations for BigInt and ECC, improving ECDSA performance by as much as 30%. (GH #1734 #1737 #1777 #1750 #1737 #1788) * Support recovering an ECDSA public key from a message/signature pair (GH #664 [#1784]) * Add base58 encoding/decoding functions (GH #1783) * In the command line interface, add support for reading passphrases from the terminal with echo disabled (GH #1756) * Add CT::Mask type to simplify const-time programming (GH #1751) * Add new configure options --disable-bmi2, --disable-rdrand, and - -disable-rdseed to prevent use of those instruction sets. * Add error_type and error_code functions to Exception type (GH #1744) * Now on POSIX systems posix_memalign is used instead of mmap for allocating the page-locked memory pool. This avoids issues with fork. (GH #602 #1798) * When available, use RDRAND to generate the additional data in Stateful_RNG::randomize_with_ts_input * Use vzeroall/vzeroupper intrinsics to avoid AVX2/SSE transition penalties. * Support for Visual C++ 2013 has been removed (GH #1557 #1697) * Resolve a memory leak when verifying ECDSA signatures with versions of OpenSSL before 1.1.0 (GH #1698) * Resolve a memory leak using ECDH via OpenSSL (GH #1767) * Fix an error in XTS which prohibited encrypting values which were exactly the same length as the underlying block size. Messages of this size are allowed by the standard and other XTS implementations. (GH #1706) * Resolve a bug in TSS which resulted in it using an incorrect length field in the shares. Now the correct length is encoded, but either correct or buggy lengths are accepted when decoding. (GH #1722) * Correct a bug when reducing a negative BigInt modulo a small power of 2. (GH [#1755]) * Add CLI utils for threshold secret splitting. (GH #1722) * Fix a bug introduced in 2.8.0 that caused compilation failure if using a single amalgamation file with AVX2 enabled. (GH #1700) * Add an explicit OS target for Emscripten and improve support for it. (GH #1702) * Fix small issues when building for QNX * Switch the Travis CI build to using Ubuntu 16.04 (GH #1767) * Add options to configure.py to disable generation of pkg-config file, and (for systems where pkg-config support defaults to off, like Windows), to enable generating it. (GH #1268) * Modify configure.py to accept empty lists or trailing/extra commas. (GH #1705) - Update to Botan 2.8 * Add support for using Apple CommonCrypto library for hashing (GH #1667), cipher modes (GH #1674) and block ciphers (GH #1673). * Support for negotiating TLS versions 1.0 and 1.1 is disabled in the default TLS policy. In addition, support for negotiating TLS ciphersuites using CBC or CCM mode is disabled by default. Applications which need to interop with old peers must enable these in their TLS policy object. (GH #1651) * During primality testing, use a Lucas test in addition to Miller-Rabin. It is possible to construct a composite integer which passes n Miller-Rabin tests with probability (1/4)^n. So for a incautious verifier using a small number of tests (under 16 or so) it is possible if unlikely they would accept such a composite as prime. Adding a Lucas test precludes such an attack. (GH #1636) * Add XChaCha and XChaCha20Poly1305 (GH #1640) * Add AVX2 implementations of ChaCha (GH #1662) and Serpent (GH #1660) * Add a new password hashing interface in pwdhash.h (GH #1670) * C binding improvements. Added functions to get name and supported keylengths of cipher, hash and MAC objects, support for FE1 format preserving encryption (GH #1625 #1646), functions to load and save RSA keys in PKCS #1 format (GH #1621), HOTP and TOTP algorithms, scrypt, certificate verification (GH #1647), functions to get the output length of public key operations (GH #1642), and functions for loading and serializing X25519 keys (GH #1681) * Support for building with BOTAN_MP_WORD_BITS set to 8 or 16 has been removed. * Previously SM2 had two distinct key types, one for signatures and another for encryption. They have now been merged into a single key type since in practice it seems the same key is at times used for both operations. (GH [#1637]) * The Cipher_Mode class now derives from SymmetricAlgorithm (GH #1639) * Add support for using the ARMv8 instructions for SM4 encryption (GH #1622) * The entropy source using SecRandomCopyBytes has been removed as it was redundant with other entropy sources (GH #1668) * The Python module has much better error checking and reporting, and offers new functionality such as scrypt, MPI and FPE. (GH #1643 #1646) * Fixed a bug that caused CCM to fail with an exception when used with L=8 (GH #1631 #1632) * The default bcrypt work factor has been increased from 10 to 12. * The default algorithm used in passhash9 has changed from SHA-256 to SHA-512, and the default work factor increased from 10 to 15. * In ECC private keys, include the public key data for compatibility with GnuTLS (GH #1634 #1635) * Add support for using Linux getrandom syscall to access the system PRNG. This is disabled by default, use --with-os-feature=getrandom to enable. * It is now possible to encrypt private keys using SIV mode. * The FFI function botan_privkey_load now ignores its rng argument. * Resolve a problem when building under Visual C++ 15.8 (GH #1624) * Fix a bug in XSalsa20 (192-bit Salsa nonces) where if set_iv was called twice without calling set_key, the resulting encryption was incorrect. (GH [#1640]) * Handle an error seen when verifying invalid ECDSA signatures using LibreSSL on non x86-64 platforms (GH #1627 #1628) * Fix bugs in PKCS7 and X9.23 CBC padding schemes, which would ignore the first byte in the event the padding took up the entire block. (GH #1690) * Correct bugs which would cause CFB, OCB, and GCM modes to crash when they were used in an unkeyed state. (GH #1639) * Optimizations for SM4 and Poly1305 * Avoid a cache side channel in the AES key schedule * Add pk_encrypt and pk_decrypt CLI operations * Now asn1print CLI defaults to printing context-specific fields. * Use codec_base for Base64, which matches how Base32 is implemented (GH #1597) * The cast module has been split up into cast128 and cast256 (GH #1685) * When building under Visual C++ 2013, the user must acknowledge the upcoming removal of support using the configure.py flag --ack-vc2013-deprecated (GH [#1557])- Fix version in baselibs.conf- Update to Botan 2.7 * CVE-2018-12435 Avoid a side channel in ECDSA signature generation (GH [#1604]) * Avoid a side channel in RSA key generation due to use of a non-constant time gcd algorithm. (GH #1542 #1556) * Optimize prime generation, especially improving RSA key generation. (GH [#1542]) * Make Karatsuba multiplication, Montgomery field operations, Barrett reduction and Montgomery exponentiation const time (GH #1540 #1606 #1609 [#1610]) * Optimizations for elliptic curve operations especially improving reductions and inversions modulo NIST primes (GH #1534 #1538 #1545 #1546 #1547 #1550) * Add 24 word wide Comba multiplication, improving 3072-bit RSA and DH by ~25%. (GH #1564) * Unroll Montgomery reduction for specific sizes (GH #1603) * Improved performance of signature verification in ECGDSA, ECKCDSA, SM2 and GOST by 10-15%. * XMSS optimizations (GH #1583 #1585) * Fix an error that meant XMSS would only sign half as many signatures as is allowed (GH #1582) * Add support for base32 encoding/decoding (GH #1541) * Add BMI2 optimized version of SHA-256, 40% faster on Skylake (GH #1584) * Allow the year to be up to 2200 in ASN.1 time objects. Previously this was limited to 2100. (GH #1536) * Add support for Scrypt password hashing (GH #1570) * Add support for using Scrypt for private key encryption (GH #1574) * Optimizations for DES/3DES, approx 50% faster when used in certain modes such as CBC decrypt or CTR. * XMSS signature verification did not check that the signature was of the expected length which could lead to a crash. (GH #1537) * The bcrypt variants 2b and 2y are now supported. * Support for 192-bit Suite B TLS profile is now implemented, as the 128-bit Suite B is since 2015 not allowed anymore. * Previously botan allowed GCM to be used with an empty nonce, which is not allowed by the specification. Now such nonces are rejected. * Avoid problems on Windows when compiling in Unicode mode (GH #1615 #1616) * Previously for ASN.1 encoded signatures (eg ECDSA) Botan would accept any valid BER encoding. Now only the single valid DER encoding is accepted. * Correct an error that could in rare cases cause an internal error exception when doing computations with the P-224 curve. * Optimizations to reduce allocations/copies during DER encoding and BER decoding (GH #1571 #1572 #1600) * Botan generates X.509 subject key IDs by hashing the public key with whatever hash function is being used to sign the certificate. However especially for SHA-512 this caused SKIDs that were far longer than necessary. Now all SKIDs are truncated to 192 bits. * In the test suite use mkstemp to create temporary files instead of creating them in the current working directory. (GH #1533 #1530) * It is now possible to safely override CXX when invoking make in addition to when configure.py is run. (GH #1579) * OIDs for Camellia and SM4 in CBC and GCM mode are now defined, making it possible to use this algorithms for private key encryption. * Avoid creating symlinks to the shared object on OpenBSD (#1535) * The factor command runs much faster on larger inputs now. * Support for Windows Phone/UWP was deprecated starting in 2.5. This deprecation has been reversed as it seems UWP is still actively used. (GH [#1586] #1587) * Support for Visual C++ 2013 is deprecated, and will be removed in Jan 2019. * Added support for GCC’s –sysroot option to configure.py for cross-compiling.- fixed to build on armv6 and armv7- Update to Botan 2.6 * CVE-2018-9860 Fix a bug decrypting TLS CBC ciphertexts which could for a malformed ciphertext cause the decryptor to read and HMAC an additional 64K bytes of data which is not part of the record. This could cause a crash if the read went into unmapped memory. No information leak or out of bounds write occurs. * Add support for OAEP labels (GH #1508) * RSA signing is about 15% faster (GH #1523) and RSA verification is about 50% faster. * Add exponent blinding to RSA (GH #1523) * Add Cipher_Mode::create and AEAD_Mode::create (GH #1527) * Fix bug in TLS server introduced in 2.5 which caused connection to fail if the client offered any signature algorithm not known to the server (for example RSA/SHA-224). * Fix a bug in inline asm that would with GCC 7.3 cause incorrect computations and an infinite loop during the tests. (GH #1524 #1529)- Update to Botan 2.5 * Fix error in certificate wildcard matching (CVE-2018-9127), where a wildcard cert for b*.example.com would be accepted as a match for any host with name *b*.example.com (GH #1519) * Add support for RSA-PSS signatures in TLS (GH #1285) * Ed25519 certificates are now supported (GH #1501) * Many optimizations in ECC operations. ECDSA signatures are 8-10 times faster. ECDSA verification is about twice as fast. ECDH key agreement is 3-4 times faster. (GH #1457 #1478) * Implement product scanning Montgomery reduction, which improves Diffie-Hellman and RSA performance by 10 to 20% on most platforms. (GH [#1472]) * DSA signing and verification performance has improved by 30-50%. * Add a new Credentials_Manager callback that specifies which CAs the server has indicated it trusts (GH #1395 fixing #1261) * Add new TLS::Callbacks methods that allow creating or removing extensions, as well as examining extensions sent by the peer (GH #1394 #1186) * Add new TLS::Callbacks methods that allow an application to negotiate use of custom elliptic curves. (GH #1448) * Add ability to create custom elliptic curves (GH #1441 #1444) * Add support for POWER8 AES instructions (GH #1459 #1393 #1206) * Fix DSA/ECDSA handling of hashes longer than the group order (GH #1502 [#986]) * The default encoding of ECC public keys has changed from compressed to uncompressed point representation. This improves compatability with some common software packages including Golang’s standard library. (GH #1480 [#1483]) * It is now possible to create DNs with custom components. (GH #1490 #1492) * It is now possible to specify the serial number of created certificates, instead of using the default 128-bit random integer. (GH #1489 #1491) * Change DL_Group and EC_Group to store their data as shared_ptr for fast copying. Also both classes precompute additional useful values (eg for modular reductions). (GH #1435 #1454) * Make it possible for PKCS10 requests to include custom extensions. This also makes it possible to use muliple SubjectAlternativeNames of a single type in a request, which was previously not possible. (GH #1429 #1428) * Add new optimized interface for FE1 format preserving encryption. By caching a number of values computed in the course of the FPE calculation, it provides a 6-7x speedup versus the old API. (GH #1469) * Add DSA and ElGamal keygen functions to FFI (#1426) * Add Pipe::prepend_filter to replace Pipe::prepend (GH #1402) * Fix a memory leak in the OpenSSL block cipher integration, introduced in * 2.2.0 * Use an improved algorithm for generating safe primes which is several tens of times faster. Also, fix a bug in the prime sieving algorithm which caused standard prime generation (like for RSA keys) to be slower than necessary. (GH #1413 #1411) * Correct the return value of PK_Encryptor::maximum_input_size which reported a much too small value (GH #1410) * Remove use of CPU specific optimization flags, instead the user should set these via CXXFLAGS if desired. (GH #1392) * Resolve an issue that would cause a crash in the tests if they were run on a machine without SSE2/NEON/VMX instructions. (GH #1495) * The Python module now tries to load DLLs from a list of names and uses the first one which successfully loads and indicates it supports the desired API level. (GH #1497) * Various minor optimizations for SHA-3 (GH #1433 #1434) * The output of botan --help has been improved (GH #1387) * Add --der-format flag to command line utils, making it possible verify DSA/ECDSA signatures generated by OpenSSL command line (GH #1409) * Add support for --library-suffix option to configure.py (GH #1405 #1404) * Use feature flags to enable/disable system specific code (GH #1378) * Add --msvc-runtime option to allow using static runtime (GH #1499 #210) * Add –enable-sanitizers= option to allow specifying which sanitizers to enable. The existing --with-sanitizers option just enables some default set which is known to work with the minimum required compiler versions. * Use either rst2man or rst2man.py for generating man page as distributions differ on where this program is installed (GH #1516) * The threefish module has been renamed threefish_512 since that is the algorithm it provides. (GH #1477) * The Perl XS based wrapper has been removed, as it was unmaintained and broken. (GH #1412) * The sqlite3 encryption patch under contrib has been removed. It is still maintained by the original author at https://github.com/OlivierJG/botansqlite3- drop explicit package requirements - split binary package and documentation from dynamic library package and make documentation package noarch - merge back Botan2 package to Botan with changelog history - drop Botan patches aarch64-support.patch - doesn't seem to be required anymore Botan-fix_install_paths.patch - doesn't seem to be required no-cpuid-header.patch - SLE11 not target anymore Botan-fix_pkgconfig.patch - this seem to be wrong Botan-no-buildtime.patch - not needed anymore dont-set-mach-value.diff - doesn't apply, unclear and undocumented why it is there Botan-inttypes.patch - not required Botan-ull_constants.patch.bz2 - no reason anymore- change group of libbotan-%{version_suffix} to 'System/Libraries' as requested on review- Don't drop -fstack-clash-protection for openSUSE 42.3 - we just need the Update repository present.- Rename libbotan-devel to libbotan2-devel. We can't have clashing packages in the archive because Botan1 and Botan2 provide the same -devel binary. Botan2 is also no API compatible with Botan.- fix expected version after bump in baselibs.conf too- fix unknown flag -fstack-clash-protection for openSUSE 42.3 - rename to Botan2 - drop Botan2-INT_MAX.patch as not needed anymore - Bump to libbotan 2.4 Changes and new features: * Several build improvements requested by downstream packagers, including the ability to disable building the static library. All makefile constructs that were specific to nmake or GNU make have been eliminated, thus the option ``--makefile-style`` which was previously used to select the makefile type has also been removed. (GH #1230 #1237 #1300 #1318 #1319 #1324 #1325 #1346) * Support for negotiating the DH group as specified in RFC 7919 is now available in TLS (GH #1263) * Support for ARIA-GCM ciphersuites are now available in TLS. They are disabled by default. (GH #1284) * Add support for generating and verifying X.509 objects (certificates, CRLs, etc) using RSA-PSS signatures (GH #1270 and [#1368]) * Add support for AES key wrapping with padding, as specified in RFC 5649 and NIST SP 800-38F (GH #1301) * OCSP requests made during certificate verification had the potential to hang forever. Now the sockets are non-blocking and a timeout is enforced. (GH #1360 fixing GH #1326) * Add ``Public_Key::fingerprint_public`` which allows fingerprinting the public key. The previously available ``Private_Key::fingerprint`` is deprecated, now ``Private_Key::fingerprint_private`` should be used if this is required. (GH #1357) * ECC certificates generated by Botan used an invalid encoding for the parameters field, which was rejected by some certificate validation libraries notably BouncyCastle. (GH #1367) * Loading an ECC key which used OID encoding for the domain parameters, then saving it, would result in a key using the explicit parameters encoding. Now the OID encoding is retained. (GH #1365) * Correct various problems in certificate path validation that arose when multiple paths could be constructed leading to a trusted root but due to other constraints only some of them validated. (GH [#1363]) * It is now possible for certificate validation to return warning indicators, such as that the distinguished name is not within allowed limits or that a certificate with a negative serial number was observed. (GH #1363 #1359) * XMSS signatures now are multi-threaded for improved performance (GH #1267) * Fix a bug that caused the TLS peer cert list to be empty on a resumed session. (GH #1303 #1342) * Increase the maximum HMAC key length from 512 bytes to 4096 bytes. This allows using a DH key exchange in TLS with a group greater than 4096 bits. (GH #1316) * Fix a bug in the TLS server where, on receiving an SSLv3 client hello, it would attempt to negotiate TLS v1.2. Now a protocol_version alert is sent. Found with tlsfuzzer. (GH #1316) * Fix several bugs related to sending the wrong TLS alert type in various error scenarios, caught with tlsfuzzer. * Add support for a ``tls_http_server`` command line utility which responds to simple GET requests. This is useful for testing against a browser, or various TLS test tools which expect the underlying protocol to be HTTP. (GH #1315) * Add an interface for generic PSK data stores, as well as an implementation which encrypts stored values with AES key wrapping. (GH #1302) * Optimize GCM mode on systems both with and without carryless multiply support. This includes a new base case implementation (still constant time), a new SSSE3 implementation for systems with SSSE3 but not clmul, and better algorithms for systems with clmul and pmull. (GH #1253 #1263) * Various optimizations for OCB, CFB, CTR, SM3, SM4, GMAC, BLAKE2b, Blowfish, Twofish, CAST-128, and CRC24 (GH #1281) * Salsa20 now supports the seek operation. * Add ``EC_Group::known_named_groups`` (GH #1339) * Symmetric algorithms (block ciphers, stream ciphers, MACs) now verify that a key was set before accepting data. Previously attempting to use an unkeyed object would instead result in either a crash or invalid outputs. (GH #1279) * The X509 certificate, CRL and PKCS10 types have been heavily refactored internally. Previously all data of these types was serialized to strings, then in the event a more complicated data structure (such as X509_DN) was needed, it would be recreated from the string representation. However the round trip process was not perfect and could cause fields to become lost. This approach is no longer used, fixing several bugs (GH #1010 #1089 #1242 #1252). The internal data is now stored in a ``shared_ptr``, so copying such objects is now very cheap. (GH #884) * ASN.1 string objects previously held their contents as ISO 8859-1 codepoints. However this led to certificates which contained strings outside of this character set (eg in Cyrillic, Greek, or Chinese) being rejected. Now the strings are always converted to UTF-8, which allows representing any character. In addition, UCS-4 strings are now supported. (GH #1113 #1250 #1287 #1289) * It is now possible to create an uninitialized X509_Certificate object. Such an object will throw if any attempt to access its members is made. (GH #1335) * In BER decoder, avoid unbounded stack recursion when parsing nested indefinite length values. Now at most 16 nested indefinite length values are accepted, anything deeper resulting in a decoding error. (GH #1304 OSS-Fuzz 4353). * A new ASN.1 printer API allows generating a string representation of arbitrary BER data. This is used in the ``asn1print`` command line utility and may be useful in other applications, for instance for debugging. * New functions for bit rotations that distinguish rotating by a compile-time constant vs a runtime variable rotation. This allows better optimizations in both cases. Notably performance of CAST-128 and CAST-256 are substantially improved. (GH #1247) * TLS CBC ciphersuites now are implemented using the standard CBC code, instead of reimplementing CBC inside the TLS stack. This allows for parallel decryption of TLS CBC ciphertexts, and improves performance especially when using AES hardware support. (GH #1269) * Add callbacks to make it possible for an application using TLS to provide custom implementations of signature schemes, eg when offloading the computations to another device. (GH #1332) * Use a direct calculation for calendar computations instead of relying on non-portable operating system interfaces. (GH #1336) * Fix a bug in the amalgamation generation which could cause build failures on some systems including macOS. (GH #1264 #1265) * A particular code sequence in TLS handshake would always (with an ECC ciphersuite) result in an exception being thrown and then caught. This has changed so no exception is thrown. (GH #1275) * The code for byteswapping has been improved for ARMv7 and for Windows x86-64 systems using MSVC. (GH #1274) * The GMAC class no longer derives from GHASH. This should not cause any noticeable change for applications. (GH #1253) * The base implementation of AES now uses a single 4K table, instead of 4 such tables. This offers a significant improvement against cache-based side channels without hurting performance too much. In addition the table is now guaranteed to be aligned on a cache line, which ensures the additional countermeasure of reading each cache line works as expected. (GH #1255) * In TLS client resumption, avoid sending a OCSP stapling request. This caused resumption failures with some servers. (GH [#1276]) * The overhead of making a call through the FFI layer has been reduced. * The IDs for SHA-3 PKCSv1.5 signatures added in 2.3.0 were incorrect. They have been changed to use the correct encoding, and a test added to ensure such errors do not recur. * Counter mode allows setting a configurable width of the counter. Previously it was allowed for a counter of even 8 bits wide, which would mean the keystream would repeat after just 256 blocks. Now it requires the width be at least 32 bits. The only way this feature could be used was by manually constructing a ``CTR_BE`` object and setting the second parameter to something in the range of 1 to 3. * A new mechanism for formatting ASN.1 data is included in ``asn1_print.h``. This is the same functionality used by the command line ``asn1print`` util, now cleaned up and moved to the library. * Add ``Pipe::append_filter``. This is like the existing (deprecated) ``Pipe::append``, the difference being that ``append_filter`` only allows modification before the first call to ``start_msg``. (GH #1306 #1307) * The size of ASN1_Tag is increased to 32 bits. This avoids a problem with UbSan (GH #751) * Fix a bug affecting bzip2 compression. In certain circumstances, compression would fail with ``BZ_SEQUENCE_ERROR`` due to calling bzlib in an way it does not support. (GH #1308 #1309) * In 2.3.0, final annotations were added to many classes including the TLS policies (like ``Strict_Policy`` and ``BSI_TR_02102_2``). However it is reasonable and useful for an application to derive from one of these policies, so as to create an application specific policy that is based on a library-provided policy, but with a few tweaks. So the final annotations have been removed on these classes. (GH #1292) * A new option ``--with-pdf`` enables building a PDF copy of the handbook. (GH #1337) * A new option ``--with-rst2man`` enables building a man page for the command line util using Docutils rst2man. (GH #1349) * Support for NEON is now enabled under Clang. * Now the compiler version is detected using the preprocessor, instead of trying to parse the output of the compiler's version string, which was subject to problems with localization. (GH [#1358]) * By default the gzip compressor will not include a timestamp in the header. The timestamp can be set by passing it to the ``Gzip_Compression`` constructor. * Add an OID for RIPEMD-160 * Fixes for CMake build (GH #1251) * Avoid some signed overflow warnings (GH #1220 #1245) * As upstream support for Native Client has been deprecated by Google, support is now also deprecated in Botan and will be removed in a future release. * The Perl-XS wrapper has not been maintained in many years. It is now deprecated, and if no attempts are made to revive it, it will be removed in a future release. * Support for building on IRIX has been removed.- add Botan2-INT_MAX.patch * Fix “INT_MAX was not declared in this scope” in openSUSE Leap 42.1- fix build. python3 configure itself is useless, we should make package python3 too.- configure Botan explicitly with python3- Update to 1.10.17 - Address a side channel affecting modular exponentiation. An attacker capable of a local or cross-VM cache analysis attack may be able to recover bits of secret exponents as used in RSA, DH, etc. CVE-2017-14737 Workaround a miscompilation bug in GCC 7 on x86-32 affecting GOST-34.11 hash function. (GH #1192 #1148 #882, bsc#1060433) - Add SecureVector::data() function which returns the start of the buffer. This makes it slightly simpler to support both 1.10 and 2.x APIs in the same codebase. When compiled by a C++11 (or later) compiler, a template typedef of SecureVector, secure_vector, is added. In 2.x this class is a std::vector with a custom allocator, so has a somewhat different interface than SecureVector in 1.10. But this makes it slightly simpler to support both 1.10 and 2.x APIs in the same codebase. - Fix a bug that prevented configure.py from running under Python3 - Botan 1.10.x does not support the OpenSSL 1.1 API. Now the build will [#]error if OpenSSL 1.1 is detected. Avoid –with-openssl if compiling against 1.1 or later. (GH #753) - Import patches from Debian adding basic support for building on aarch64, ppc64le, or1k, and mipsn32 platforms. * obsoletes CVE-2017-14737.patch * refreshes aarch64-support.patch * drop ppc64le-support.patch for upstream version (disables altivec support as per concerns by upstream)- Fix for CVE-2017-14737: A cryptographic cache-based side channel in the RSA implementation allows local attacker to recover information about RSA secret keys. * add CVE-2017-14737.patch- Explicitly require libopenssl-1_0_0-devel (bsc#1055322) * Botan 1.x won't support OpenSSL 1.1 (https://github.com/randombit/botan/issues/753)- Add patch to build SLES11 (allows for simplified backporting, e.g. bsc#968030) * add no-cpuid-header.patch - Clean up spec file- Update to 1.10.16 (Fixes CVE-2017-2801, bsc#1033605) * Fix a bug in X509 DN string comparisons that could result in out of bound reads. This could result in information leakage, denial of service, or potentially incorrect certificate validation results. (CVE-2017-2801) * Avoid use of C++11 std::to_string in some code added in 1.10.14 (GH #747 #834) - Changes from 1.10.15: * Change an unintended behavior of 2.0.0, which named the include directory botan-2.0. Since future release of Botan-2 should be compatible with code written against old versions, there does not seem to be any reason to * version the include directory with the minor number. (GH #830 #833) * Fix a bug which caused an error when building on Cygwin or other platforms where shared libraries are not supported. (GH #821) * Enable use of readdir on Cygwin, which allows the tests to run (GH #824) * Switch to readthedocs Sphinx theme by default (GH #822 #823)- Update to 1.10.14 * Fix integer overflow during BER decoding, found by Falko Strenzke. This bug is not thought to be directly exploitable but upgrading ASAP is advised. (CVE-2016-9132) * Fix two cases where (in error situations) an exception would be thrown from a destructor, causing a call to std::terminate. * When RC4 is disabled in the build, also prevent it from being included in the OpenSSL provider. (GH #638)- Update to 1.10.13 * Use constant time modular inverse algorithm to avoid possible side channel attack against ECDSA (CVE-2016-2849) * Use constant time PKCS #1 unpadding to avoid possible side channel attack against RSA decryption (CVE-2015-7827) * Avoid a compilation problem in OpenSSL engine when ECDSA was disabled. Gentoo bug 542010- Remove Qt5 dependency, since nothing is using it anymore. - Fix double-prefix in botan-config and pkgconfig file.- Update to 1.10.12 - Version 1.10.12, 2016-02-03 * In 1.10.11, the check in PointGFp intended to check the affine y argument actually checked the affine x again. Reported by Remi Gacogne * The CVE-2016-2195 overflow is not exploitable in 1.10.11 due to an additional check in the multiplication function itself which was also added in that release, so there are no security implications from the missed check. However to avoid confusion the change was pushed in a new release immediately. * The 1.10.11 release notes incorrectly identified CVE-2016-2195 as CVE-2016-2915 - Version 1.10.11, 2016-02-01 * Resolve heap overflow in ECC point decoding. CVE-2016-2195 Resolve infinite loop in modular square root algorithm. CVE-2016-2194 Correct BigInt::to_u32bit to not fail on integers of exactly 32 bits. GH #239- Add gpg signature - Cleanup spec file with spec-cleaner- Fix Source0 URL- bump SONAME to libbotan-1_10-1 - Update to 1.10.10 * SECURITY: The BER decoder would crash due to reading from offset 0 of an empty vector if it encountered a BIT STRING which did not contain any data at all. As the type requires a 1 byte field this is not valid BER but could occur in malformed data. Found with afl. CVE-2015-5726 * SECURITY: The BER decoder would allocate a fairly arbitrary amount of memory in a length field, even if there was no chance the read request would succeed. This might cause the process to run out of memory or invoke the OOM killer. Found with afl. CVE-2015-5727 * Due to an ABI incompatible (though not API incompatible) change in this release, the version number of the shared object has been increased. * The default TLS policy no longer allows RC4. * Fix a signed integer overflow in Blue Midnight Wish that may cause incorrect computations or undefined behavior. - Update to 1.10.9 * Fixed EAX tag verification to run in constant time * The default TLS policy now disables SSLv3. * A crash could occur when reading from a blocking random device if the device initially indicated that entropy was available but a concurrent process drained the entropy pool before the read was initiated. * Fix decoding indefinite length BER constructs that contain a context sensitive tag of zero. Github pull 26 from Janusz Chorko. * The botan-config script previously tried to guess its prefix from the location of the binary. However this was error prone, and now the script assumes the final installation prefix matches the value set during the build. Github issue 29.- Change build dependence "libqt4-devel" to "libqt5-qtbase-devel".Botan-develi01-armsrv3 1776670635  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~3.5.03.5.0-bp157.2.3.13.5.0-bp157.2.3.13.5.03.5.0botan-3botanaead.hallocator.hargon2.hargon2fmt.hasn1_obj.hasn1_print.hassert.hauto_rng.hbase32.hbase58.hbase64.hbcrypt.hbcrypt_pbkdf.hber_dec.hbigint.hblock_cipher.hbuf_comp.hbuild.hbzip2.hcertstor.hcertstor_flatfile.hcertstor_sql.hcertstor_sqlite.hcertstor_system.hchacha_rng.hcipher_mode.hcompiler.hcompression.hconcepts.hcredentials_manager.hcryptobox.hcurve25519.hcurve_gfp.hdata_snk.hdata_src.hdatabase.hder_enc.hdh.hdilithium.hdl_group.hdlies.hdsa.hec_group.hec_point.hecc_key.hecdh.hecdsa.hecgdsa.hecies.heckcdsa.hed25519.hed448.helgamal.hentropy_src.hexceptn.hfd_unix.hffi.hfilter.hfilters.hfpe_fe1.hfrodo_mode.hfrodokem.hgost_3410.hhash.hhex.hhmac_drbg.hhss_lms.hkdf.hkyber.hlzma.hmac.hmceliece.hmem_ops.hmutex.hnist_keywrap.hnumthry.hocsp.hoids.hotp.hp11.hp11_ecc_key.hp11_ecdh.hp11_ecdsa.hp11_object.hp11_randomgenerator.hp11_rsa.hp11_types.hp11_x509.hpasshash9.hpbkdf.hpbkdf2.hpem.hpgp_s2k.hpipe.hpk_algs.hpk_keys.hpk_ops.hpk_ops_fwd.hpkcs10.hpkcs11.hpkcs11f.hpkcs11t.hpkcs8.hpkix_enums.hpkix_types.hpsk_db.hpubkey.hpwdhash.hreducer.hrfc3394.hrfc4880.hrng.hroughtime.hrsa.hscrypt.hsecmem.hsm2.hsodium.hsp_parameters.hsphincsplus.hsqlite3.hsrp6.hstateful_rng.hstream_cipher.hstrong_type.hsym_algo.hsymkey.hsystem_rng.htls.htls_alert.htls_algos.htls_callbacks.htls_channel.htls_ciphersuite.htls_client.htls_exceptn.htls_extensions.htls_external_psk.htls_handshake_msg.htls_magic.htls_messages.htls_policy.htls_psk_identity_13.htls_server.htls_server_info.htls_session.htls_session_manager.htls_session_manager_hybrid.htls_session_manager_memory.htls_session_manager_noop.htls_session_manager_sql.htls_session_manager_sqlite.htls_session_manager_stateless.htls_signature_scheme.htls_version.htpm.htss.htypes.huuid.hversion.hx25519.hx448.hx509_ca.hx509_crl.hx509_ext.hx509_key.hx509_obj.hx509cert.hx509path.hx509self.hxmss.hxmss_parameters.hxof.hzfec.hzlib.hcmakeBotan-3.5.0botan-config-version.cmakebotan-config.cmakelibbotan-3.sobotan-3.pclibbotan-devellicense.txt/usr/include//usr/include/botan-3//usr/include/botan-3/botan//usr/lib64//usr/lib64/cmake//usr/lib64/cmake/Botan-3.5.0//usr/lib64/pkgconfig//usr/share/licenses//usr/share/licenses/libbotan-devel/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protectionobs://build.opensuse.org/openSUSE:Maintenance:19461/openSUSE_Backports_SLE-15-SP7_Update/019034f269f810135d6597049b183774-Botan.openSUSE_Backports_SLE-15-SP7_Updatedrpmxz5aarch64-suse-linuxdirectoryC++ source, ASCII textC source, ASCII textC++ source, UTF-8 Unicode textC source, UTF-8 Unicode textASCII textpkgconfig filePR&Zbutf-84b0585d211f5aeea816dec7e09ee55b4a8463376cedcfd9ab6277f85dc9895f3?7zXZ !t/ -]"k%]e8YA6SۀJ9fҿ$y2'A{1An11A]:Lyh%VEI?Է KzÇ!&)8vx=ԑpxLP;^cO>QKP{+D:cAM3NZ`g𚘬[ Bklڑ!ZkFuHgix_\y7D[힬0z|i@فkDry;#@0ഈVu6&:2W~:d1<<lXpZ//eaQ|WOmm8JTBZ-LBB*CcY a_Mi^ hϰg|sՌ} =?:8c30~˿-P#OvCnB~ڑ@zö]}WMwpI9ٳӼ>u-C8e>%@QG^aapj8Ut vFmW(GE:Kޅi9ǔ LN8^.Vrc+oq\#l>?f6 4 Pb4%2Co-Mljۅ>&-Qϋd݄_YQɅ/f{.3oɧPr 5U;(a51T @XF.T_3ΤwPܵ\d 䝷/r9}Y'N>?6HIflkEy7gHfM=^R·VMpS.bXұ*KRR#M{_%/SMӆnt{q`IohY`OS6 ƈK~2#| HL/bf.c^gK?WHL2ɏSwPgd?L Юf.f+SCaqgn@婟na .ҠYTKb}'~/LZ$X0 /}|{ooL*EsLSڞ-2#؛-}BFOD4R-(n3[A/3-\T|;\6>0sUz:lϾ{4v tj|4Pf$4"Q^;Ec"pEYLJ[2M%{I<0h .8JJ3iãL.6%aQ' 03 qD\:LRפ{{rB)!o@D)TZ !؊'ח#".6W{cDĦ2}$4aIQ8\B#zf^tӮkwOOFXN ^FnA{ev:#~+L:E@geO=5Hoh~obgUcɘ!%!8C[KV865ӟ}ԨB 0k" GFXaҿ_wɹ`֗@ ~3 {W=)B~YT@Zt`iym'I6ߨ(ʧM/JM T)\3%MQNN6ޛOkR^KtQ1D{ N9OIW_)FW!yǎm`qоvMt;s=WadnGiӵ'~BQ887 U^q0L-7Vg"Ez!;*;Ml/ g򲽀Wm۬x,]YfRҷ1N0v3HL-͸eA4s?=l"o_XdM]ᾶl;^C}dNM!U,TVȺVZȰ~$z$&>M@[Zg$~ ({Ԍ(iE%'ϥE!)EZ\X^Zŵ.A|f*[W+qHsZ V=g1be3|fbxC »}0+ܬ YZ