{"diffoscope-json-version": 1, "source1": "/srv/reproducible-results/rbuild-debian/r-b-build.Fu5W5JY0/b1/bird3_3.1.0-1_arm64.changes", "source2": "/srv/reproducible-results/rbuild-debian/r-b-build.Fu5W5JY0/b2/bird3_3.1.0-1_arm64.changes", "unified_diff": null, "details": [{"source1": "Files", "source2": "Files", "unified_diff": "@@ -1,4 +1,4 @@\n \n c7e86ff8066eea4bbc82d19ef96c94c4 2111536 debug optional bird3-dbgsym_3.1.0-1_arm64.deb\n- fd1774684eff071976830d91f799cf3b 1580840 doc optional bird3-doc_3.1.0-1_all.deb\n+ 759597aefce26e27f60c74d7e9db079d 1581420 doc optional bird3-doc_3.1.0-1_all.deb\n e383281e9d4a26a10d708087a8fcaeea 988872 net optional bird3_3.1.0-1_arm64.deb\n"}, {"source1": "bird3-doc_3.1.0-1_all.deb", "source2": "bird3-doc_3.1.0-1_all.deb", "unified_diff": null, "details": [{"source1": "file list", "source2": "file list", "unified_diff": "@@ -1,3 +1,3 @@\n -rw-r--r-- 0 0 0 4 2025-04-03 21:14:39.000000 debian-binary\n -rw-r--r-- 0 0 0 1180 2025-04-03 21:14:39.000000 control.tar.xz\n--rw-r--r-- 0 0 0 1579468 2025-04-03 21:14:39.000000 data.tar.xz\n+-rw-r--r-- 0 0 0 1580048 2025-04-03 21:14:39.000000 data.tar.xz\n"}, {"source1": "control.tar.xz", "source2": "control.tar.xz", "unified_diff": null, "details": [{"source1": "control.tar", "source2": "control.tar", "unified_diff": null, "details": [{"source1": "./control", "source2": "./control", "unified_diff": "@@ -1,13 +1,13 @@\n Package: bird3-doc\n Source: bird3\n Version: 3.1.0-1\n Architecture: all\n Maintainer: Jakub Ru\u017ei\u010dka \n-Installed-Size: 2072\n+Installed-Size: 2073\n Section: doc\n Priority: optional\n Homepage: https://bird.network.cz/\n Description: Internet Routing Daemon - documentation\n BIRD is an Internet routing daemon with full support for all the major\n routing protocols. It allows redistribution between protocols with a\n powerful route filtering syntax and an easy-to-use configuration\n"}, {"source1": "./md5sums", "source2": "./md5sums", "unified_diff": null, "details": [{"source1": "./md5sums", "source2": "./md5sums", "comments": ["Files differ"], "unified_diff": null}]}]}]}, {"source1": "data.tar.xz", "source2": "data.tar.xz", "unified_diff": null, "details": [{"source1": "data.tar", "source2": "data.tar", "unified_diff": null, "details": [{"source1": "file list", "source2": "file list", "unified_diff": "@@ -14,17 +14,17 @@\n -rw-r--r-- 0 root (0) root (0) 478834 2025-04-03 21:14:39.000000 ./usr/share/doc/bird3/bird.pdf.gz\n -rw-r--r-- 0 root (0) root (0) 8865 2025-04-03 21:14:39.000000 ./usr/share/doc/bird3/prog-1.html\n -rw-r--r-- 0 root (0) root (0) 86441 2025-04-03 21:14:39.000000 ./usr/share/doc/bird3/prog-2.html\n -rw-r--r-- 0 root (0) root (0) 17657 2025-04-03 21:14:39.000000 ./usr/share/doc/bird3/prog-3.html\n -rw-r--r-- 0 root (0) root (0) 18835 2025-04-03 21:14:39.000000 ./usr/share/doc/bird3/prog-4.html\n -rw-r--r-- 0 root (0) root (0) 93255 2025-04-03 21:14:39.000000 ./usr/share/doc/bird3/prog-5.html\n -rw-r--r-- 0 root (0) root (0) 7484 2025-04-03 21:14:39.000000 ./usr/share/doc/bird3/prog-6.html\n--rw-r--r-- 0 root (0) root (0) 41900 2025-04-03 21:14:39.000000 ./usr/share/doc/bird3/prog-7.html\n+-rw-r--r-- 0 root (0) root (0) 41902 2025-04-03 21:14:39.000000 ./usr/share/doc/bird3/prog-7.html\n -rw-r--r-- 0 root (0) root (0) 25976 2025-04-03 21:14:39.000000 ./usr/share/doc/bird3/prog-8.html\n -rw-r--r-- 0 root (0) root (0) 4999 2025-04-03 21:14:39.000000 ./usr/share/doc/bird3/prog.html\n--rw-r--r-- 0 root (0) root (0) 503581 2025-04-03 21:14:39.000000 ./usr/share/doc/bird3/prog.pdf.gz\n+-rw-r--r-- 0 root (0) root (0) 503870 2025-04-03 21:14:39.000000 ./usr/share/doc/bird3/prog.pdf.gz\n drwxr-xr-x 0 root (0) root (0) 0 2025-04-03 21:14:39.000000 ./usr/share/doc/bird3-doc/\n -rw-r--r-- 0 root (0) root (0) 324 2025-04-03 21:14:39.000000 ./usr/share/doc/bird3-doc/changelog.Debian.gz\n -rw-r--r-- 0 root (0) root (0) 452034 2025-04-03 18:51:55.000000 ./usr/share/doc/bird3-doc/changelog.gz\n -rw-r--r-- 0 root (0) root (0) 4150 2025-04-03 21:11:54.000000 ./usr/share/doc/bird3-doc/copyright\n drwxr-xr-x 0 root (0) root (0) 0 2025-04-03 21:14:39.000000 ./usr/share/doc-base/\n -rw-r--r-- 0 root (0) root (0) 256 2025-04-03 21:11:54.000000 ./usr/share/doc-base/bird3-doc.bird3\n"}, {"source1": "./usr/share/doc/bird3/prog-7.html", "source2": "./usr/share/doc/bird3/prog-7.html", "unified_diff": "@@ -786,15 +786,15 @@\n

Arguments

\n

\n

\n
struct mac_context * ctx

MAC context\n

\n

Description

\n

Finish MAC computation and return a pointer to the result. No more\n-mac_update() calls could be done, but the context may be reinitialized\n+@mac_update() calls could be done, but the context may be reinitialized\n later.\n

Note that the returned pointer points into data in the ctx context. If it\n ceases to exist, the pointer becomes invalid.\n \n \n


Function

\n

void\n@@ -805,15 +805,15 @@\n

\n

\n
struct mac_context * ctx

MAC context\n

\n

Description

\n

Cleanup MAC context after computation (by filling with zeros). Not strictly\n necessary, just to erase sensitive data from stack. This also invalidates the\n-pointer returned by mac_final().\n+pointer returned by @mac_final().\n \n \n


Function

\n

void\n mac_fill\n (uint id, const byte * key, uint keylen, const byte * data, uint datalen, byte * mac) -- compute and fill MAC\n

\n", "details": [{"source1": "html2text {}", "source2": "html2text {}", "unified_diff": "@@ -541,28 +541,28 @@\n ===============================================================================\n *\b**\b**\b**\b* F\bFu\bun\bnc\bct\bti\bio\bon\bn *\b**\b**\b**\b*\n byte * m\bma\bac\bc_\b_f\bfi\bin\bna\bal\bl (struct mac_context * c\bct\btx\bx) -- finalize MAC algorithm\n *\b**\b**\b**\b* A\bAr\brg\bgu\bum\bme\ben\bnt\bts\bs *\b**\b**\b**\b*\n struct mac_context * c\bct\btx\bx\n MAC context\n *\b**\b**\b**\b* D\bDe\bes\bsc\bcr\bri\bip\bpt\bti\bio\bon\bn *\b**\b**\b**\b*\n-Finish MAC computation and return a pointer to the result. No more m\bma\bac\bc_\b_u\bup\bpd\bda\bat\bte\be()\n-calls could be done, but the context may be reinitialized later.\n+Finish MAC computation and return a pointer to the result. No more @m\bma\bac\bc_\b_u\bup\bpd\bda\bat\bte\be\n+(\b()\b) calls could be done, but the context may be reinitialized later.\n Note that the returned pointer points into data in the c\bct\btx\bx context. If it\n ceases to exist, the pointer becomes invalid.\n ===============================================================================\n *\b**\b**\b**\b* F\bFu\bun\bnc\bct\bti\bio\bon\bn *\b**\b**\b**\b*\n void m\bma\bac\bc_\b_c\bcl\ble\bea\ban\bnu\bup\bp (struct mac_context * c\bct\btx\bx) -- cleanup MAC context\n *\b**\b**\b**\b* A\bAr\brg\bgu\bum\bme\ben\bnt\bts\bs *\b**\b**\b**\b*\n struct mac_context * c\bct\btx\bx\n MAC context\n *\b**\b**\b**\b* D\bDe\bes\bsc\bcr\bri\bip\bpt\bti\bio\bon\bn *\b**\b**\b**\b*\n Cleanup MAC context after computation (by filling with zeros). Not strictly\n necessary, just to erase sensitive data from stack. This also invalidates the\n-pointer returned by m\bma\bac\bc_\b_f\bfi\bin\bna\bal\bl().\n+pointer returned by @m\bma\bac\bc_\b_f\bfi\bin\bna\bal\bl(\b()\b).\n ===============================================================================\n *\b**\b**\b**\b* F\bFu\bun\bnc\bct\bti\bio\bon\bn *\b**\b**\b**\b*\n void m\bma\bac\bc_\b_f\bfi\bil\bll\bl (uint i\bid\bd, const byte * k\bke\bey\by, uint k\bke\bey\byl\ble\ben\bn, const byte * d\bda\bat\bta\ba, uint\n d\bda\bat\bta\bal\ble\ben\bn, byte * m\bma\bac\bc) -- compute and fill MAC\n *\b**\b**\b**\b* A\bAr\brg\bgu\bum\bme\ben\bnt\bts\bs *\b**\b**\b**\b*\n uint i\bid\bd\n MAC algorithm ID\n"}]}, {"source1": "./usr/share/doc/bird3/prog.pdf.gz", "source2": "./usr/share/doc/bird3/prog.pdf.gz", "unified_diff": null, "details": [{"source1": "prog.pdf", "source2": "prog.pdf", "unified_diff": null, "details": [{"source1": "pdftotext {} -", "source2": "pdftotext {} -", "unified_diff": "@@ -4617,26 +4617,26 @@\n and passing them at once.\n Function\n byte * mac final (struct mac context * ctx ) \u2013 finalize MAC algorithm\n Arguments\n struct mac context * ctx\n MAC context\n Description\n-Finish MAC computation and return a pointer to the result. No more mac update() calls could be done, but\n-the context may be reinitialized later.\n+Finish MAC computation and return a pointer to the result. No more @mac update() calls could be done,\n+but the context may be reinitialized later.\n Note that the returned pointer points into data in the ctx context. If it ceases to exist, the pointer becomes\n invalid.\n Function\n void mac cleanup (struct mac context * ctx ) \u2013 cleanup MAC context\n Arguments\n struct mac context * ctx\n MAC context\n Description\n Cleanup MAC context after computation (by filling with zeros). Not strictly necessary, just to erase sensitive\n-data from stack. This also invalidates the pointer returned by mac final ().\n+data from stack. This also invalidates the pointer returned by @mac final().\n Function\n void mac fill (uint id , const byte * key, uint keylen, const byte * data, uint datalen, byte * mac) \u2013 compute\n and fill MAC\n Arguments\n uint id\n MAC algorithm ID\n const byte * key\n"}]}]}]}]}]}]}