diff --git a/Botan-2.14.0.tar.xz b/Botan-2.14.0.tar.xz deleted file mode 100644 index d4b45a8..0000000 --- a/Botan-2.14.0.tar.xz +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:0c10f12b424a40ee19bde00292098e201d7498535c062d8d5b586d07861a54b5 -size 5958948 diff --git a/Botan-2.14.0.tar.xz.asc b/Botan-2.14.0.tar.xz.asc deleted file mode 100644 index 053b8e6..0000000 --- a/Botan-2.14.0.tar.xz.asc +++ /dev/null @@ -1,11 +0,0 @@ ------BEGIN PGP SIGNATURE----- - -iQEzBAABCAAdFiEEYh2vZBHhhRxM+aLhYhHr8e+637wFAl6LEUEACgkQYhHr8e+6 -37zeyAf/XR0IcWdTE5mW7yRmkYMm+1kDkmiTk4Zow+kTZhRegX691PX3jAMNCi0A -Gxp7waf0bYT0Qu6LvncqXINCPaSTsjilO6WCDcfIe4FOJzCLRc+TCVNwGxImCxzr -Zhs4d3YtaQk7Qh4+eu9nwJ1K9N0AC9QfdCMY2DPVEBMYm2PxrXl19WhLzCJQi+tP -+Rju2N3SQPCeGkgY3PCQfIX2N8GqVRa4MhacUD3hcUhTPngI+z5Fchbm/BdKo1qW -YDFh1Se8SvdxGzaCB6iIHayGTueyzUzCzc5fIElbo4vZ+VMKinxY8I/Ly5VOdZNy -IHlGHk+vKJkklnW/Wf1WQgrYfqETOQ== -=Okhl ------END PGP SIGNATURE----- diff --git a/Botan-2.15.0.tar.xz b/Botan-2.15.0.tar.xz new file mode 100644 index 0000000..dcdaba5 --- /dev/null +++ b/Botan-2.15.0.tar.xz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:d88af1307f1fefac79aa4f2f524699478d69ce15a857cf2d0a90ac6bf2a50009 +size 5920688 diff --git a/Botan-2.15.0.tar.xz.asc b/Botan-2.15.0.tar.xz.asc new file mode 100644 index 0000000..975b198 --- /dev/null +++ b/Botan-2.15.0.tar.xz.asc @@ -0,0 +1,11 @@ +-----BEGIN PGP SIGNATURE----- + +iQEzBAABCAAdFiEEYh2vZBHhhRxM+aLhYhHr8e+637wFAl8EZW8ACgkQYhHr8e+6 +37ziJQf/WyGSyiSOT97oF2vfYZKzEIbSauIjAZX8EsLzFp0tW0fTA+WOeBixio1B +i7nT3o/ntOyJTjDuavUfzam9PTNfluklsNjX/xQH/+G3dgz7Vit6Bzam3h9yFOJI +UHw0AsUSpnVesWwEEiUPz9EFD40ExafH+jkE8xxTItWUGz3qEqTdUJGATQAcUsaq +jCw+Lxy0TSNkdbLTOUcU38Ds9paysSxKI9GSzlBR0etZNrXHT97HT1iwneGn64qu +NMjt+XmHP/7nYw6+vmM2FWvrOYViV60UaMfDqPtyDwd22XHkkw6YpkVscIkfc9ZE +0cSn1bY/+tLAkpK885cxA3DtYd+IWg== +=kUJO +-----END PGP SIGNATURE----- diff --git a/Botan.changes b/Botan.changes index 6d2369c..944c2f9 100644 --- a/Botan.changes +++ b/Botan.changes @@ -1,3 +1,55 @@ +------------------------------------------------------------------- +Sun Aug 16 01:57:13 UTC 2020 - Dirk Mueller + +- update to 2.15: + Fix a bug where the name constraint extension did not constrain the alternative + DN field which can be included in a subject alternative name. This would allow + a corrupted sub-CA which was otherwise constrained by a name constraint to + issue a certificate with a prohibited DN. + + Fix a bug in the TLS server during client authentication where where if a + (disabled by default) static RSA ciphersuite was selected, then no certificate + request would be sent. This would have an equivalent effect to a client which + simply replied with an empty Certificate message. (GH #2367) + + Replace the T-Tables implementation of AES with a 32-bit bitsliced version. As + a result AES is now constant time on all processors. (GH #2346 #2348 #2353 + #2329 #2355) + + In TLS, enforce that the key usage given in the server certificate allows the + operation being performed in the ciphersuite. (GH #2367) + + In X.509 certificates, verify that the algorithm parameters are the expected + NULL or empty. (GH #2367) + + Change the HMAC key schedule to attempt to reduce the information leaked from + the key schedule with regards to the length of the key, as this is at times (as + for example in PBKDF2) sensitive information. (GH #2362) + + Add Processor_RNG which wraps RDRAND or the POWER DARN RNG instructions. The + previous RDRAND_RNG interface is deprecated. (GH #2352) + + The documentation claimed that mlocked pages were created with a guard page + both before and after. However only a trailing guard page was used. Add a + leading guard page. (GH #2334) + + Add support for generating and verifying DER-encoded ECDSA signatures in the C + and Python interfaces. (GH #2357 #2356) + + Workaround a bug in GCC’s UbSan which triggered on a code sequence in XMSS (GH + #2322) + + When building documentation using Sphinx avoid parallel builds with version 3.0 + due to a bug in that version (GH #2326 #2324) + + Fix a memory leak in the CommonCrypto block cipher calls (GH #2371) + + Fix a flaky test that would occasionally fail when running the tests with a + large number of threads. (GH #2325 #2197) + + Additional algorithms are now deprecated: XTEA, GOST, and Tiger. They will be + removed in a future major release. + ------------------------------------------------------------------- Wed Apr 8 08:19:50 UTC 2020 - Paolo Stivanin diff --git a/Botan.spec b/Botan.spec index 6768fc7..704791a 100644 --- a/Botan.spec +++ b/Botan.spec @@ -16,10 +16,10 @@ # -%define version_suffix 2-13 +%define version_suffix 2-15 %define short_version 2 Name: Botan -Version: 2.14.0 +Version: 2.15.0 Release: 0 Summary: A C++ Crypto Library License: BSD-2-Clause diff --git a/baselibs.conf b/baselibs.conf index 0ec628d..5e37b43 100644 --- a/baselibs.conf +++ b/baselibs.conf @@ -1,4 +1,4 @@ -libbotan-2-13 +libbotan-2-15 libbotan-devel requires -libbotan- = - requires "libbotan-2-13- = " + requires "libbotan-2-15- = "