From 8befd34bbc68028669ad5c215c65f5393867ae9f5bf19ea81c2dc3e90b8c9d5f Mon Sep 17 00:00:00 2001 From: Daniel Molkentin Date: Fri, 29 Mar 2019 08:09:19 +0000 Subject: [PATCH 1/2] Accepting request 689411 from home:dmolkentin:branches:devel:libraries:c_c++ - Update to Botan 2.9 * Bump SONAME * CVE-2018-20187 Address a side channel during ECC key generation, which used an unblinded Montgomery ladder. As a result, a timing attack can reveal information about the high bits of the secret key. * Fix bugs in TLS which caused negotiation failures when the client used an unknown signature algorithm or version (GH #1711 #1709 #1708) * Fix bug affecting GCM, EAX and ChaCha20Poly1305 where if the associated data was set after starting a message, the new AD was not reflected in the produced tag. Now with these modes setting an AD after beginning a message throws an exception. * Use a smaller sieve which improves performance of prime generation. * Fixed a bug that caused ChaCha to produce incorrect output after encrypting 256 GB. (GH #1728) * Add NEON and AltiVec implementations of ChaCha (GH #1719 #1728 #1729) * Optimize AVX2 ChaCha (GH #1730) * Many more operations in BigInt, ECC and RSA code paths are either fully const time or avoid problematic branches that could potentially be exploited in a side channel attack. (GH #1738 #1750 #1754 #1755 #1757 #1758 #1759 #1762 #1765 #1770 #1773 #1774 #1779 #1780 #1794 #1795 #1796 #1797) * Several optimizations for BigInt and ECC, improving ECDSA performance by as much as 30%. (GH #1734 #1737 #1777 #1750 #1737 #1788) OBS-URL: https://build.opensuse.org/request/show/689411 OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/Botan?expand=0&rev=89 --- Botan-2.7.0.tgz | 3 - Botan-2.7.0.tgz.asc | 11 --- Botan-2.9.0.tgz | 3 + Botan-2.9.0.tgz.asc | 11 +++ Botan.changes | 189 ++++++++++++++++++++++++++++++++++++++++++++ Botan.spec | 8 +- baselibs.conf | 2 +- 7 files changed, 208 insertions(+), 19 deletions(-) delete mode 100644 Botan-2.7.0.tgz delete mode 100644 Botan-2.7.0.tgz.asc create mode 100644 Botan-2.9.0.tgz create mode 100644 Botan-2.9.0.tgz.asc diff --git a/Botan-2.7.0.tgz b/Botan-2.7.0.tgz deleted file mode 100644 index 62ae869..0000000 --- a/Botan-2.7.0.tgz +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:e42df91556317588c6ca0e41bf796f9bd5ec5c70e0668e6c97c608c697c24a90 -size 7021654 diff --git a/Botan-2.7.0.tgz.asc b/Botan-2.7.0.tgz.asc deleted file mode 100644 index 45d6f52..0000000 --- a/Botan-2.7.0.tgz.asc +++ /dev/null @@ -1,11 +0,0 @@ ------BEGIN PGP SIGNATURE----- - -iQEzBAABCAAdFiEEYh2vZBHhhRxM+aLhYhHr8e+637wFAls6K+sACgkQYhHr8e+6 -37yyPgf/Xcn08HUPP1tHLWsgVbhHdKUsoPyk8voQD1C1RRhS0pMPT8wq1sI0Ctws -QgF7iEk26UvXLrC99Ab29wivuN1AkBdx0D6g9AiTOEQII1uv5t5SXjXlO3z4W44+ -MS310sLnvQ2F2UUOzbEENh/nuFZragh6UGr5cIFGV+T2gCJQ+WKHMDMvOz2rYj5V -01fnTKzuAzm+9ym/R/0q4apfy9XoRZd5PXZil35xGfIZMlkkQ4cPm+fOx5RQJVZY -QHkakmiK6GJZmbJM1/fsh/IXEbCACQalrdtJxTXBWwWe5ngmBv/VeaKyf8UDR54s -il3+LFjya+xMvvUG4BGqKWWgiTOwRw== -=JXvm ------END PGP SIGNATURE----- diff --git a/Botan-2.9.0.tgz b/Botan-2.9.0.tgz new file mode 100644 index 0000000..14e69b6 --- /dev/null +++ b/Botan-2.9.0.tgz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:305564352334dd63ae63db039077d96ae52dfa57a3248871081719b6a9f2d119 +size 7216373 diff --git a/Botan-2.9.0.tgz.asc b/Botan-2.9.0.tgz.asc new file mode 100644 index 0000000..bed13a2 --- /dev/null +++ b/Botan-2.9.0.tgz.asc @@ -0,0 +1,11 @@ +-----BEGIN PGP SIGNATURE----- + +iQEzBAABCAAdFiEEYh2vZBHhhRxM+aLhYhHr8e+637wFAlwvhrIACgkQYhHr8e+6 +37wBRwgAnguyxaItqDq9pXGwBgBmTCqowRs4eMW9F9UQlvxSANxNlQWb5Aocoo4L +7GYHAFusznMlXle5fs4PF5Viu3Vu+piF6RSWt9AzHxoKExeQHgAkot5ffm3ycAgB +R2xIbHnvX5EPK+BtOuTsDgK9iAocW99ZfvdSVbVNBPSenHZCyh29CbfOtBJnJ/RQ +rQULL/h2GJUGXjOIaGAfE9BPqiSGrITkm7NLfJ/YCY50RvhFbC5LBdeNrc33AfAy +C4p/kRKcQu0s4T0J3EuJxqd+EWykCcjrBH5rKUh0Gz1qSM2Sa+mc/q9t+Htyaj5m +NzHXFLeE49U/MEDwEQeLMVfSQvGrkQ== +=jN+6 +-----END PGP SIGNATURE----- diff --git a/Botan.changes b/Botan.changes index 2b78499..edf71ed 100644 --- a/Botan.changes +++ b/Botan.changes @@ -1,3 +1,192 @@ +------------------------------------------------------------------- +Thu Jan 10 10:04:33 UTC 2019 - Daniel Molkentin + +- Update to Botan 2.9 + + * Bump SONAME + + * CVE-2018-20187 Address a side channel during ECC key generation, which used an + unblinded Montgomery ladder. As a result, a timing attack can reveal + information about the high bits of the secret key. + + * Fix bugs in TLS which caused negotiation failures when the client used an + unknown signature algorithm or version (GH #1711 #1709 #1708) + + * Fix bug affecting GCM, EAX and ChaCha20Poly1305 where if the associated data + was set after starting a message, the new AD was not reflected in the produced + tag. Now with these modes setting an AD after beginning a message throws an + exception. + + * Use a smaller sieve which improves performance of prime generation. + + * Fixed a bug that caused ChaCha to produce incorrect output after encrypting 256 + GB. (GH #1728) + + * Add NEON and AltiVec implementations of ChaCha (GH #1719 #1728 #1729) + + * Optimize AVX2 ChaCha (GH #1730) + + * Many more operations in BigInt, ECC and RSA code paths are either fully const + time or avoid problematic branches that could potentially be exploited in a + side channel attack. (GH #1738 #1750 #1754 #1755 #1757 #1758 #1759 #1762 #1765 + #1770 #1773 #1774 #1779 #1780 #1794 #1795 #1796 #1797) + + * Several optimizations for BigInt and ECC, improving ECDSA performance by as + much as 30%. (GH #1734 #1737 #1777 #1750 #1737 #1788) + + * Support recovering an ECDSA public key from a message/signature pair (GH #664 + #1784) + + * Add base58 encoding/decoding functions (GH #1783) + + * In the command line interface, add support for reading passphrases from the + terminal with echo disabled (GH #1756) + + * Add CT::Mask type to simplify const-time programming (GH #1751) + + * Add new configure options --disable-bmi2, --disable-rdrand, and + --disable-rdseed to prevent use of those instruction sets. + + * Add error_type and error_code functions to Exception type (GH #1744) + + * Now on POSIX systems posix_memalign is used instead of mmap for allocating the + page-locked memory pool. This avoids issues with fork. (GH #602 #1798) + + * When available, use RDRAND to generate the additional data in + Stateful_RNG::randomize_with_ts_input + + * Use vzeroall/vzeroupper intrinsics to avoid AVX2/SSE transition penalties. + + * Support for Visual C++ 2013 has been removed (GH #1557 #1697) + + * Resolve a memory leak when verifying ECDSA signatures with versions of OpenSSL + before 1.1.0 (GH #1698) + + * Resolve a memory leak using ECDH via OpenSSL (GH #1767) + + * Fix an error in XTS which prohibited encrypting values which were exactly the + same length as the underlying block size. Messages of this size are allowed by + the standard and other XTS implementations. (GH #1706) + + * Resolve a bug in TSS which resulted in it using an incorrect length field in + the shares. Now the correct length is encoded, but either correct or buggy + lengths are accepted when decoding. (GH #1722) + + * Correct a bug when reducing a negative BigInt modulo a small power of 2. (GH + #1755) + + * Add CLI utils for threshold secret splitting. (GH #1722) + + * Fix a bug introduced in 2.8.0 that caused compilation failure if using a single + amalgamation file with AVX2 enabled. (GH #1700) + + * Add an explicit OS target for Emscripten and improve support for it. (GH #1702) + + * Fix small issues when building for QNX + + * Switch the Travis CI build to using Ubuntu 16.04 (GH #1767) + + * Add options to configure.py to disable generation of pkg-config file, and (for + systems where pkg-config support defaults to off, like Windows), to enable + generating it. (GH #1268) + + * Modify configure.py to accept empty lists or trailing/extra commas. (GH #1705) + +- Update to Botan 2.8 + + * Add support for using Apple CommonCrypto library for hashing (GH #1667), + cipher modes (GH #1674) and block ciphers (GH #1673). + + * Support for negotiating TLS versions 1.0 and 1.1 is disabled in the default + TLS policy. In addition, support for negotiating TLS ciphersuites using CBC + or CCM mode is disabled by default. Applications which need to interop with + old peers must enable these in their TLS policy object. (GH #1651) + + * During primality testing, use a Lucas test in addition to Miller-Rabin. It + is possible to construct a composite integer which passes n Miller-Rabin + tests with probability (1/4)^n. So for a incautious verifier using a small + number of tests (under 16 or so) it is possible if unlikely they would + accept such a composite as prime. Adding a Lucas test precludes such an + attack. (GH #1636) + + * Add XChaCha and XChaCha20Poly1305 (GH #1640) + + * Add AVX2 implementations of ChaCha (GH #1662) and Serpent (GH #1660) + + * Add a new password hashing interface in pwdhash.h (GH #1670) + + * C binding improvements. Added functions to get name and supported + keylengths of cipher, hash and MAC objects, support for FE1 format + preserving encryption (GH #1625 #1646), functions to load and save RSA keys + in PKCS #1 format (GH #1621), HOTP and TOTP algorithms, scrypt, certificate + verification (GH #1647), functions to get the output length of public key + operations (GH #1642), and functions for loading and serializing X25519 + keys (GH #1681) + + * Support for building with BOTAN_MP_WORD_BITS set to 8 or 16 has been removed. + + * Previously SM2 had two distinct key types, one for signatures and another + for encryption. They have now been merged into a single key type since in + practice it seems the same key is at times used for both operations. (GH + #1637) + + * The Cipher_Mode class now derives from SymmetricAlgorithm (GH #1639) + + * Add support for using the ARMv8 instructions for SM4 encryption (GH #1622) + + * The entropy source using SecRandomCopyBytes has been removed as it was + redundant with other entropy sources (GH #1668) + + * The Python module has much better error checking and reporting, and offers + new functionality such as scrypt, MPI and FPE. (GH #1643 #1646) + + * Fixed a bug that caused CCM to fail with an exception when used with L=8 (GH #1631 #1632) + + * The default bcrypt work factor has been increased from 10 to 12. + + * The default algorithm used in passhash9 has changed from SHA-256 to + SHA-512, and the default work factor increased from 10 to 15. + + * In ECC private keys, include the public key data for compatibility with GnuTLS (GH #1634 #1635) + + * Add support for using Linux getrandom syscall to access the system PRNG. + This is disabled by default, use --with-os-feature=getrandom to enable. + + * It is now possible to encrypt private keys using SIV mode. + + * The FFI function botan_privkey_load now ignores its rng argument. + + * Resolve a problem when building under Visual C++ 15.8 (GH #1624) + + * Fix a bug in XSalsa20 (192-bit Salsa nonces) where if set_iv was called + twice without calling set_key, the resulting encryption was incorrect. (GH + #1640) + + * Handle an error seen when verifying invalid ECDSA signatures using LibreSSL + on non x86-64 platforms (GH #1627 #1628) + + * Fix bugs in PKCS7 and X9.23 CBC padding schemes, which would ignore the + first byte in the event the padding took up the entire block. (GH #1690) + + * Correct bugs which would cause CFB, OCB, and GCM modes to crash when they + were used in an unkeyed state. (GH #1639) + + * Optimizations for SM4 and Poly1305 + + * Avoid a cache side channel in the AES key schedule + + * Add pk_encrypt and pk_decrypt CLI operations + + * Now asn1print CLI defaults to printing context-specific fields. + + * Use codec_base for Base64, which matches how Base32 is implemented (GH #1597) + + * The cast module has been split up into cast128 and cast256 (GH #1685) + + * When building under Visual C++ 2013, the user must acknowledge the upcoming + removal of support using the configure.py flag --ack-vc2013-deprecated (GH + #1557) + ------------------------------------------------------------------- Tue Jul 31 10:44:02 UTC 2018 - daniel.molkentin@suse.com diff --git a/Botan.spec b/Botan.spec index 7270256..08f7ff5 100644 --- a/Botan.spec +++ b/Botan.spec @@ -1,7 +1,7 @@ # # spec file for package Botan # -# Copyright (c) 2018 SUSE LINUX GmbH, Nuernberg, Germany. +# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany. # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -12,14 +12,14 @@ # license that conforms to the Open Source Definition (Version 1.9) # published by the Open Source Initiative. -# Please submit bugfixes or comments via http://bugs.opensuse.org/ +# Please submit bugfixes or comments via https://bugs.opensuse.org/ # -%define version_suffix 2-7 +%define version_suffix 2-9 %define short_version 2 Name: Botan -Version: 2.7.0 +Version: 2.9.0 Release: 0 Summary: A C++ Crypto Library License: BSD-2-Clause diff --git a/baselibs.conf b/baselibs.conf index a6651b2..63e278c 100644 --- a/baselibs.conf +++ b/baselibs.conf @@ -1,4 +1,4 @@ -libbotan-2-7 +libbotan-2-9 libbotan-devel requires -libbotan- = requires "libbotan-2-7- = " From 42e270e1b32573c75475ffc1577fe983c28a61a040bfc5ea064573c23645b762 Mon Sep 17 00:00:00 2001 From: Daniel Molkentin Date: Tue, 2 Apr 2019 13:28:17 +0000 Subject: [PATCH 2/2] Accepting request 690656 from home:dmolkentin:branches:devel:libraries:c_c++ MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit - Update to Botan 2.10 * Bump SONAME * Warning: XMSS currently implements draft-06 which is not compatible with the final RFC 8391 specification. A PR is open to fix this, however it will break all current uses of XMSS. If you are currently using XMSS please comment at https://github.com/randombit/botan/pull/1858. Otherwise the PR will be merged and support for draft-06 will be removed starting in 2.11. * Added a new certificate store implementation that can access the MacOS keychain certificate store. (GH #1830) * Redesigned Memory_Pool class, which services allocations out of a set of pages locked into memory (using mlock/VirtualLock). It is now faster and with improved exploit mitigations. (GH #1800) * Add BMI2 implementations of SHA-512 and SHA-3 which improve performance by 25-35% on common CPUs. (GH #1815) * Unroll SHA-3 computation improving performance by 10-12% (GH #1838) * Add a Thread_Pool class. It is now possible to run the tests in multiple threads with --test-threads=N flag to select the number of threads to use. Use --test-threads=0 to run with as many CPU cores as are available on the current system. The default remains single threaded. (GH #1819) * XMSS signatures now uses a global thread pool instead of spawning new threads for each usage. This improves signature generation performance by between 10% and 60% depending on architecture and core count. (GH #1864) * Some functions related to encoding and decoding BigInts have been deprecated. (GH #1817) * Binary encoding and decoding of BigInts has been optimized by performing word-size operations when possible. (GH #1817) * Rename the exception Integrity_Failure to Invalid_Authentication_Tag to make its meaning and usage more clear. The old name remains as a typedef. (GH #1816) * Support for using Boost filesystem and MSVC’s std::filesystem have been OBS-URL: https://build.opensuse.org/request/show/690656 OBS-URL: https://build.opensuse.org/package/show/devel:libraries:c_c++/Botan?expand=0&rev=90 --- Botan-2.10.0.tgz | 3 ++ Botan-2.10.0.tgz.asc | 11 +++++ Botan-2.9.0.tgz | 3 -- Botan-2.9.0.tgz.asc | 11 ----- Botan.changes | 107 +++++++++++++++++++++++++++++++++++++++++++ Botan.spec | 4 +- baselibs.conf | 4 +- 7 files changed, 125 insertions(+), 18 deletions(-) create mode 100644 Botan-2.10.0.tgz create mode 100644 Botan-2.10.0.tgz.asc delete mode 100644 Botan-2.9.0.tgz delete mode 100644 Botan-2.9.0.tgz.asc diff --git a/Botan-2.10.0.tgz b/Botan-2.10.0.tgz new file mode 100644 index 0000000..c2547c3 --- /dev/null +++ b/Botan-2.10.0.tgz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:88481997578c27924724fea76610d43d9f59c99edfe561d41803bbc98871ad31 +size 7240021 diff --git a/Botan-2.10.0.tgz.asc b/Botan-2.10.0.tgz.asc new file mode 100644 index 0000000..8e45eb9 --- /dev/null +++ b/Botan-2.10.0.tgz.asc @@ -0,0 +1,11 @@ +-----BEGIN PGP SIGNATURE----- + +iQEzBAABCAAdFiEEYh2vZBHhhRxM+aLhYhHr8e+637wFAlyfY5gACgkQYhHr8e+6 +37zznAgAslYskgijfn0oGg43GtaPga3qq04iUxLH+MYLCOaBiIPz5AFDHULAVg1P +CVRpYvkglxDYgZVNbWRgbHUrnFju01KU9DwbTD96mcjvKq0dYbpAIn5Sp80iQ8Sr +0ApydPU0sdsrwKAz3vu7NG14rlz935uH05AiRw1WtnAG+42Y0qEbqjcCSvkhFhcn +iSzqBZwMIlyaIH0HTSiZTNLp/WFx5c9bIVpqSb1USBuJ+KM55HgvNGhaesGupkkQ +Nm2ZYNHw3hG8O194Q9HXOlwWtl2OWVsPYofei14ld99ToUvlX4sJzL722zRGzDHY +q2x1pquYuuhbVZBpSTnNHh2xo61oaA== +=YxW6 +-----END PGP SIGNATURE----- diff --git a/Botan-2.9.0.tgz b/Botan-2.9.0.tgz deleted file mode 100644 index 14e69b6..0000000 --- a/Botan-2.9.0.tgz +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:305564352334dd63ae63db039077d96ae52dfa57a3248871081719b6a9f2d119 -size 7216373 diff --git a/Botan-2.9.0.tgz.asc b/Botan-2.9.0.tgz.asc deleted file mode 100644 index bed13a2..0000000 --- a/Botan-2.9.0.tgz.asc +++ /dev/null @@ -1,11 +0,0 @@ ------BEGIN PGP SIGNATURE----- - -iQEzBAABCAAdFiEEYh2vZBHhhRxM+aLhYhHr8e+637wFAlwvhrIACgkQYhHr8e+6 -37wBRwgAnguyxaItqDq9pXGwBgBmTCqowRs4eMW9F9UQlvxSANxNlQWb5Aocoo4L -7GYHAFusznMlXle5fs4PF5Viu3Vu+piF6RSWt9AzHxoKExeQHgAkot5ffm3ycAgB -R2xIbHnvX5EPK+BtOuTsDgK9iAocW99ZfvdSVbVNBPSenHZCyh29CbfOtBJnJ/RQ -rQULL/h2GJUGXjOIaGAfE9BPqiSGrITkm7NLfJ/YCY50RvhFbC5LBdeNrc33AfAy -C4p/kRKcQu0s4T0J3EuJxqd+EWykCcjrBH5rKUh0Gz1qSM2Sa+mc/q9t+Htyaj5m -NzHXFLeE49U/MEDwEQeLMVfSQvGrkQ== -=jN+6 ------END PGP SIGNATURE----- diff --git a/Botan.changes b/Botan.changes index edf71ed..e660149 100644 --- a/Botan.changes +++ b/Botan.changes @@ -1,3 +1,110 @@ +------------------------------------------------------------------- +Tue Apr 2 12:54:40 UTC 2019 - Daniel Molkentin + +- Update to Botan 2.10 + + * Bump SONAME + + * Warning: XMSS currently implements draft-06 which is not compatible with + the final RFC 8391 specification. A PR is open to fix this, however it will + break all current uses of XMSS. If you are currently using XMSS please + comment at https://github.com/randombit/botan/pull/1858. Otherwise the PR + will be merged and support for draft-06 will be removed starting in 2.11. + + * Added a new certificate store implementation that can access the MacOS + keychain certificate store. (GH #1830) + + * Redesigned Memory_Pool class, which services allocations out of a set of + pages locked into memory (using mlock/VirtualLock). It is now faster and + with improved exploit mitigations. (GH #1800) + + * Add BMI2 implementations of SHA-512 and SHA-3 which improve performance by + 25-35% on common CPUs. (GH #1815) + + * Unroll SHA-3 computation improving performance by 10-12% (GH #1838) + + * Add a Thread_Pool class. It is now possible to run the tests in multiple + threads with --test-threads=N flag to select the number of threads to use. + Use --test-threads=0 to run with as many CPU cores as are available on the + current system. The default remains single threaded. (GH #1819) + + * XMSS signatures now uses a global thread pool instead of spawning new + threads for each usage. This improves signature generation performance by + between 10% and 60% depending on architecture and core count. (GH #1864) + + * Some functions related to encoding and decoding BigInts have been + deprecated. (GH #1817) + + * Binary encoding and decoding of BigInts has been optimized by performing + word-size operations when possible. (GH #1817) + + * Rename the exception Integrity_Failure to Invalid_Authentication_Tag to + make its meaning and usage more clear. The old name remains as a typedef. + (GH #1816) + + * Support for using Boost filesystem and MSVC’s std::filesystem have been + removed, since already POSIX and Win32 versions had to be maintained for + portability. (GH #1814) + + * Newly generated McEliece and XMSS keys now default to being encrypted using + SIV mode, support for which was added in 2.8.0. Previously GCM was used by + default for these algorithms. + + * Use arc4random on Android systems (GH #1851) + + * Fix the encoding of PGP-S2K iteration counts (GH #1853 #1854) + + * Add a facility for sandboxing the command line util. Currently FreeBSD + (Capsicum) and OpenBSD (pledge) sandboxes are supported. (GH #1808) + + * Use if constexpr when available. + + * Disable building shared libs on iOS as it was broken and it is not clear + shared libraries are ever useful on iOS (GH #1865) + + * Renamed the darwin build target to macos. This should not cause any + user-visible change. (GH #1866) + + * Add support for using sccache to cache the Windows CI build (GH #1807) + + * Add --extra-cxxflags option which allows adding compilation flags without + overriding the default set. (GH #1826) + + * Add --format= option to the hash cli which allows formatting the output as + base64 or base58, default output remains hex. + + * Add base58_enc and base58_dec cli utils for base58 encoding/decoding. (GH #1848) + + * Enable getentropy by default on macOS (GH #1862) + + * Avoid using -momit-leaf-frame-pointer flags, since -fomit-frame-pointer is + already the default with recent versions of GCC. + + * Fix XLC sanitizer flags. + + * Rename Blake2b class to BLAKE2b to match the official name. There is a typedef for compat. + + * Fix a bug where loading a raw Ed25519_PublicKey of incorrect length would + lead to a crash. (GH #1850) + + * Fix a bug that caused compilation problems using CryptoNG PRNG. (GH #1832) + + * Extended SHAKE-128 cipher to support any key between 1 and 160 bytes, + instead of only multiples of 8 bytes. + + * Minor HMAC optimizations. + + * Build fixes for GNU/Hurd. + + * Fix a bug that prevented generating or verifying Ed25519 signatures in the + CLI (GH #1828 #1829) + + * Fix a compilation error when building the amalgamation outside of the + original source directory when AVX2 was enabled. (GH #1812) + + * Fix a crash when creating the amalgamation if a header file was edited on + Windows but then the amalgamation was built on Linux (GH #1763) + ------------------------------------------------------------------- Thu Jan 10 10:04:33 UTC 2019 - Daniel Molkentin diff --git a/Botan.spec b/Botan.spec index 08f7ff5..62b5d24 100644 --- a/Botan.spec +++ b/Botan.spec @@ -16,10 +16,10 @@ # -%define version_suffix 2-9 +%define version_suffix 2-10 %define short_version 2 Name: Botan -Version: 2.9.0 +Version: 2.10.0 Release: 0 Summary: A C++ Crypto Library License: BSD-2-Clause diff --git a/baselibs.conf b/baselibs.conf index 63e278c..7cd82b6 100644 --- a/baselibs.conf +++ b/baselibs.conf @@ -1,4 +1,4 @@ -libbotan-2-9 +libbotan-2-10 libbotan-devel requires -libbotan- = - requires "libbotan-2-7- = " + requires "libbotan-2-10- = "