libcryptopp8_6_0-32bit-8.6.0-150400.3.9.1<>,J$h9,p9| րZrx|W)(RXރ3xb'!Tՠop K x%$.c2R|VR`CloH$D^QDZGo@YJ%<̣,y‡B-lOl5 Ok(-l2(5HYx6m<Dl3,L0D 6JygK"M)",dP(9o'đ>r l>>&?&d , J(,8<Uv~     9 <@EJtx<( 89d:>#ZG#dH#hI#lX#pY#|\#]#^#b#c$d% e%f%l%u%(v%,w%x%y%&4&8&>&Clibcryptopp8_6_0-32bit8.6.0150400.3.9.1Cryptographic Library for C++The Crypto++ library provides authenticated encryption, stream and block ciphers, block cipher operation modes, message authentication codes, hash functions, PKI crypto, key agreement schemes and elliptic curve crypto.h9,h03-ch2cISUSE Linux Enterprise 15SUSE LLC BSL-1.0https://www.suse.com/Development/Libraries/C and C++https://www.cryptopp.comlinuxx86_64/sbin/ldconfigIh9,aa88666c0c89c4dc2ddec11a231933662fe914cd85273471835b375cdf26b229rootrootlibcryptopp-8.6.0-150400.3.9.1.src.rpmlibcryptopp.so.8.6.0libcryptopp8_6_0-32bitlibcryptopp8_6_0-32bit(x86-32)@@@@@@@@@@@@@@@@@@@@@@@@@    /bin/shlibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.11)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libgcc_s.so.1libgcc_s.so.1(GCC_3.0)libgcc_s.so.1(GLIBC_2.0)libgomp.so.1libgomp.so.1(GOMP_1.0)libgomp.so.1(GOMP_4.0)libgomp.so.1(OMP_1.0)libm.so.6libm.so.6(GLIBC_2.29)libpthread.so.0libpthread.so.0(GLIBC_2.0)libstdc++.so.6libstdc++.so.6(CXXABI_1.3)libstdc++.so.6(CXXABI_1.3.9)libstdc++.so.6(GLIBCXX_3.4)libstdc++.so.6(GLIBCXX_3.4.11)libstdc++.so.6(GLIBCXX_3.4.15)libstdc++.so.6(GLIBCXX_3.4.21)libstdc++.so.6(GLIBCXX_3.4.9)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3h8L@ee(ad'@aO@`Q@_`@^@]P@]3@[Y /XZXX@XXW֘WgUangel.yankov@suse.compgajdos@suse.compgajdos@suse.comjosef.moellers@suse.comdavejplater@gmail.comdmueller@suse.comdavejplater@gmail.comtchvatal@suse.comdavejplater@gmail.comdavejplater@gmail.comadam@mizerski.plbwiedemann@suse.comdavejplater@gmail.comadam@mizerski.pljengelh@inai.dejengelh@inai.dejengelh@inai.debwiedemann@suse.comi@marguerite.subwiedemann@suse.com- Security fix [bsc#1224280, CVE-2024-28285] * potential leak of secret key of ElGamal encryption via fault injection * Added patch libcryptopp-CVE-2024-28285.patch * https://github.com/weidai11/cryptopp/issues/1262- security update - added patches fix CVE-2023-50981 [bsc#1218222], issue on ModularSquareRoot function leads to potential DoS + libcryptopp-CVE-2023-50981.patch- security update - added patches fix CVE-2023-50980 [bsc#1218219], DoS via malformed DER public key file + libcryptopp-CVE-2023-50980.patch- Update SLE15-SP4 to 8.6.0. This obsoletes the following patches * cve-2019-14318-CryptoPP564.patch (aka cve-2019-14318.patch) * libcryptopp-CVE-2016-9939.patch [bsc#1190243]- Update to 8.6.0 -upstream changes: * This release clears CVE-2021-40530 and fixes a problem with ChaCha20 AVX2 implementation. * The CVE was due to ElGamal encryption using a work estimate to size encryption exponents instead subgroup order. * The ChaCha20 issue was due to mishandling a carry in the AVX2 code path. The ChaCha20 issue was difficult to duplicate, so most users should not experience it.- update to 8.5.0: * minor release, no recompile of programs required * expanded community input and support * 70 unique contributors as of this release * port to Apple M1 hardware- Update to version 8.4.0 and remove obsolete patches: 0001-Fix-TCXXFLAGS-using-openSUSE-standard-flags-GH-865.patch, 0001-Fix-missing-if-statement.patch and cve-2019-14318.patch - Upstream changes: * fix use of macro CRYPTOPP_ALIGN_DATA * fix potential out-of-bounds read in ECDSA * fix std::bad_alloc when using ByteQueue in pipeline * fix missing CRYPTOPP_CXX17_EXCEPTIONS with Clang * fix potential out-of-bounds read in GCM mode * add configure.sh when preprocessor macros fail * fix potential out-of-bounds read in SipHash * fix compile error on POWER9 due to vec_xl_be * fix K233 curve on POWER8 * add Cirrus CI testing * fix broken encryption for some 64-bit ciphers * disable RDRAND and RDSEED for some AMD processors * fix BLAKE2 hash calculation using Salt and Personalization * add XTS mode * fix circular dependency between misc.h and secblock.h * add Certificate interface * fix recursion in AES::Encryption without AESNI * add missing OID for ElGamal encryption * fix missing override in KeyDerivationFunction-derived classes * fix RDSEED assemble under MSVC * fix elliptic curve timing leaks (CVE-2019-14318) * add link-library variable to Makefiles * fix SIZE_MAX definition in misc.h * add GetWord64 and PutWord64 to BufferedTransformation * use HKDF in AutoSeededX917RNG::Reseed * fix Asan finding in VMAC on i686 in inline asm * fix undeclared identifier _mm_roti_epi64 on Gentoo * fix ECIES and GetSymmetricKeyLength * fix possible divide by zero in PKCS5_PBKDF2_HMAC * refine ASN.1 encoders and decoders * disable BMI2 code paths in Integer class * fix use of CRYPTOPP_CLANG_VERSION * add NEON SHA1, SHA256 and SHA512 from Cryptogams * add ARM SHA1, SHA256 and SHA512 from Cryptogams * fix reference binding to misaligned address in xed25519 * clear asserts in TestDataNameValuePairs * fix SIGILL on POWER8 when compiling with GCC 10 * fix potential out-of-bounds write in FixedSizeAllocatorWithCleanup * revert changes for constant-time elliptic curve algorithms- Simplify the baselibs creation - Do not BR unzip as the tarball is tar.gz - Generate the pc file with cat not bunch of echos- Added cve-2019-14318.patch which fixes (1)leak in ECDSA nonce length; and (2) leak in prime fields (ECP class). - See boo#1145187 - Disabled LTO for i586 to fix build failure.- Update to major version 8.2.0 - Filter out -flto= flag for arm7 see cryptopp issue#865 - Remove 0001-disable_os_rng_test.patch which is no longer needed. - Rebase libcryptopp-shared.patch - Added patchs from git which is indicated in cryptopp issue#865: 0001-Fix-TCXXFLAGS-using-openSUSE-standard-flags-GH-865.patch and 0001-Fix-missing-if-statement.patch. Upstream changes since 7.0.0: * use PowerPC unaligned loads and stores with Power8 * add SKIPJACK test vectors * fix SHAKE-128 and SHAKE-256 compile * removed IS_NEON from Makefile * fix Aarch64 build on Fedora 29 * fix missing GF2NT_233_Multiply_Reduce_CLMUL in FIPS DLL * add missing BLAKE2 constructors * fix missing BlockSize() in BLAKE2 classes * add CRYPTOPP_BUGGY_SIMD_LOAD_AND_STORE * add carryless multiplies for NIST b233 and k233 curves * fix OpenMP build due to use of OpenMP 4 with down-level compilers * add SignStream and VerifyStream for ed25519 and large files * fix missing AlgorithmProvider in PanamaHash * add SHAKE-128 and SHAKE-256 * fix AVX2 build due to _mm256_broadcastsi128_si256 * add IETF ChaCha, XChaCha, ChaChaPoly1305 and XChaChaPoly1305 * add x25519 key exchange and ed25519 signature scheme * add limited Asymmetric Key Package support from RFC 5958 * add Power9 DARN random number generator support * add CHAM, HC-128, HC-256, Hight, LEA, Rabbit, Simeck * fix FixedSizeAllocatorWithCleanup may be unaligned on some platforms * cutover to GNU Make-based cpu feature tests * rename files with dashes to underscores * fix LegacyDecryptor and LegacyDecryptorWithMAC use wrong MAC * avoid Singleton when possible, avoid std::call_once completely * fix SPARC alignment problems due to GetAlignmentOf() on word64 * add ARM AES asm implementation from Cryptogams * remove CRYPTOPP_ALLOW_UNALIGNED_DATA_ACCESS support- update to v7.0.0 * changelog available at https://cryptopp.com/release700.html and in packaged Readme.txt - Refreshed patches * 0001-disable_os_rng_test.patch * libcryptopp-shared.patch - Dropped patch reproducible.patch - merged upstream- Add reproducible.patch to sort input files to make build fully reproducible- Added patch field to soname due to library not following proper API/ABI versioning to fix boo#1027192. - Removed crypto.pc and generate it in the spec file to ensure proper version and directories. - Changed libcryptopp-shared.patch. - Renamed library package and obsoleted old name. - added precheckin_baselibs.sh and updated baselibs.conf- update to 5.6.5 * Rebase libcryptopp-shared.patch * Rebase 0001-disable_os_rng_test.patch - enable openmp usage- Add obsoletes tag for dropped static lib- Remove libcryptoo-devel-static, this seems unused in Factory.- Update descriptions- Update to 5.6.4 * Use proper openSUSE-style library naming * Drop upstream libcryptopp-s390.patch * Drop upstream libcryptopp-m68k.patch * Drop upstream libcryptopp-CVE-2015-2141.patch * Drop upstream cryptopp-gcc6.patch * Rebase libcryptopp-shared.patch * Rebase 0001-disable_os_rng_test.patch- add patch cryptopp-gcc6.patch * fix boo#985143 * fix narrowing conversion from unsigned int to int inside {}- prevent timing attack to get secret key (bnc#936435, CVE-2015-2141) add libcryptopp-CVE-2015-2141.patch/bin/sh8.6.0-150400.3.9.18.6.0-150400.3.9.1libcryptopp.so.8.6.0/usr/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:38921/SUSE_SLE-15-SP4_Update/20ba7216707f6ade39faa206a31a0610-libcryptopp.SUSE_SLE-15-SP4_Updatedrpmxz5x86_64-suse-linuxELF 32-bit LSB shared object, Intel 80386, version 1 (GNU/Linux), dynamically linked, BuildID[sha1]=811217c800b6adb8c1a7dcc9645d10068616b642, strippedPRR RRRRRRRRRRRRRRR R R R RRRRRutf-8af48836bfd552ff24b84ab98bc17a90199ded4e7e9035caae98cf2c12ee26362? 7zXZ !t/.&F]"k%- i"L tDÿxkR=ݸl]L-h=ƨ/diNN+z76hIaf;w?YU":5: ЌH:2M[RԦo$sۍ R_Yco$ p8:XHY<VOR)q`, h'JԖL`^7" mNc7n{Œ/XllzQs.׎kӯ~B&<'{@H>pEZs!U-q3K/5?&fF [y`qF%6ot@;e50oez$Q0;ZFeDSx͓:<1PS4- ]myة8/'xAIP]7f*R*7O4Q&8bO']6R~39>t.'K RBpj!IAJܭEbV6\3zzknޓ1kF_;jXfXhG _}$RԿvXDs7|^otk6Be&"sO?JҰ9`Y$O|mI\@i"zDH $x\A(],a0_`}zMXw^0+Vאl.98-8WY*RyO$#Sa4@{<7"~~ًgQh~4ˉ}9ո$[2|ě8O[7GuB?)pL% *(څDf%h4!@u_ݎIwdygZLܢrJRV>ES&9̀@(mO%eʹfaV ʹ-yv UVLC7ڲ{ٹgf2Z @ȲBj=e,PU/DCprI =vN%wMyK4Pf![uDvx >+RR{fY.<Vlֽy3C1X* %Җ6?*UeE-7Ƭ*?qܔ+ri\ IY:}. gpi/BEȹk|HgQW9ҟc~hgNL˿]:8BGbsg.DI K)CPX$La}SMCVs TUvǯZ<}WGb@ҝG~zυ^_@m 2B`ep!jrA}2! v!c! [= R1+?bn2d,XI[(C~xZ?Fl:霶MΚw.YՙV:{P_6tpdz "ZMIC [U,)vʃ&tbFz[V5~H|C2{Ha_Gqh E(*BTτƌJQL-l>Aق֒5 2 6%C"NNzdFbt(q2qzF@ɸy*$ 7Uc6Y:'Z=*&[_|g9&1Rcn0q(ޕXh:d @42yȤ`c*:)X焬7!oŊ)pC Bz6U#Y.sXGp33ԋ[0pGrN`@J3Y '*GE.hM99UI[ +r9~Tq;)Aؔ3>.0'A κ yW\b[FS_!!I mSQEULF^}zO9_2 P)ˤ^OW (X0<xY:?0 d v"]p|D&M$ojO0\hpk_(i?0It R9NU8J"EYM2*d =?lO܃65SK%뺼&; Memnvmzޗ! * ϙP5VRwAAa&8^}C . d{f鱏e [Ѝbs?2ǟtW9^/g֞^uӳmhStx:1`U{++~| RLan3]kin?jA'5Xv]X$dkb$]g"*q\_{'{A:U}0Up$ю+u*0?Q(jq8TD4L@j/Sd9` cazt9 (Pz~ςOڰpCVT -bc"daiYCkDM~ cJnNIMd]jPGc= FVa8lRo=\y{_歞&;z, %5+AYPdD$h;52B:#fmu`?ZXFx*u`u~WVj(i|;גɘ}Hߣ9:)pj( Ts2; m&5/sdG?%jn)s/S5pԑ$%PWw.ew-dF]9H%YZAڪvOP!I+F ~{.Zs4p KXH"B\m o,AȂb G'חWHN_JO}!xe hlvG*s#J/zeg1 {s3mP`BG$7 /v{X؏bWw2?yʈBDK1t?xP8!"C2wɧ~^Z  Wt8z%E(5h|u*Uz&qvnrwFAeV/TSU`f췝V;;]|bWS,/nؗhH8[~ˊ~.\A)UN Q:I9N#9p\zYY:?ʬ1*nHq dJS k.ȨC`hVZB&[sYl-]-Fq oiBQ;G-A ^ʆmюh E36e'Nߖ&L}bO2*[y>(AEe?:X}=FKU9ҰrvF5C,E)_uuU.;~ Ax+ x 諅DHH|fᦞ[q]0/kk59VeVx3_v )uzp̯@aJ7 W(~* t:}{wfG5\"cnB,j`Vr/ Qzj8TL $9h7]gte?!j"ʯ 4ظWĻYv11v/gtsVPw%G{ Q>P"/P@<VJM:})o6jbHD OY&u];Qg$X^%Ku*5M; ?g0-~~2B; hG;8W7:KAŖxfs|AVq) peN)Tc|FVx|XNq׼Q4 [Cv#Z%Q)MȖgeK{Z:"|~qa/? 2'.^BODղFj =~p C'!XAZz4yߝz>@Pr(V,u,FL%P)^ל6o?U=kHu8 2I&VN%0JHǻuWJTqw#)S)E"G#<|k/[CH"j^fR8,3n:Xc'˥E| b*޴z|{0ES2ƒZmBb.jfnMXa2uϡf65G7Vt_3pg9%?l1 {~g~v?jWM+f׊t\{< շdmRÁKЦhK6 Z)#Y[Rt 'QQ\I젱RE;lg9k .mm~ S@ތ2UT^XjSo[dDP6D_ϡen:E]iTeAFi!lfkT[ !k#hէ=4Y yGqoCSt檫yܸ߫ඍlM4(sF%uk(# pX(;H/W]GHawGV}ܶ_{뒑3_6"Stר&UUmu)iRnU6@[Ƕ]T0mMwo@R /|1(%UִZkYE{ J~s]( GWb5QD >%BN~G.pB"KaDϔf3q 5*/?]՘m}@Lh"&0EgU26ĈOxzȎfƟw*A&[W<L\PƫOT2Uoi ϡ$0(FߺZgȆ/`圽Ջ'Nzq?Hj@,ɎQPIt '[&a KZԨ"Ul%0z8N>MVТ`BuanB sC3s3eh!+dTj*1tN'P%UR+YڵlYq}ѹle<!)yAN7RF_o^dfF|ƕIf$ T5gvh95(<{HZ#4t91N&Iޚ7;MiMe<GJ=奮696Uhܗ-09|K5qt{rUFBs7sTlt!l9;Q64_Y|ləP Е_L4 Hڒ|!w#oB4qJ#qeLӘ :.$8h0FxDPY|JXG+ a@^#=t6 sʝTdW ndQ*4 &ė6uÍ_8s~_Rt I3hMT&uJc$hOpqp߈qk̔Eb׿%oflwamDx)hzÔEai>z'Fc$#1z1 5rTmF`T(~Dٝ˹\nFPmOfzD~03AxG![Μ; E4PJ񔢖b{ٲ{a[N)DKJ q<=ɰlXiHpy]-dޚ |1{i_v[5 Þ'Mο1#樷?RQ!2zf,l,mdJ2l}Gx'R1T[JQɪn|+PWJtN"[äǓInbI)yh c"xqV9Jբ[\?hVa¿1O4h cZ~qBp9^ؠ*Kh3ןhcvFJ/6wۺv%yW)_O'*?P =D&EGEys"BCzjD?( W% pdQe0d`"P]QX$#s(HkN\k+u攖EBO|@499gcd4 9l}ps>`(p*#l%pG54( :CP_'lfs56u3,k0S}eoOAVΪ*GzG cZ*86x喿ml s㚺&21ϖf^{$If]slE>ObC d.fZ#c]q*,XƥuC΋IX~^ HP&d[Y~ͅXJL#}]-ЂJ4þ[/9JU2vXq5Sz o~ҥXg~h</=Hdk'n 2MS}^#uʩHZD>kݰYl}w#2CL+p bpWFu6__˿Uv\a:-F|6,]95:3%W/V7r&v~\-Wܶ YZ