version 0.12.0

* Deprecations and removals:
  * Bumped minimal RSA key size to 1024 bits
* New functionality:
  * Add support for hybrid key exchange mechanisms using Quantum Resistant
    cryptography for all backends. These are now preferred:
    * sntrup761x25519-sha512, sntrup761x25519-sha512@openssh.com
    * mlkem768nistp256-sha256
    * mlkem768x25519-sha256
    * mlkem1024nistp384-sha384 (only OpenSSL 3.5+ and libgcrypt)
  * New cmake option WITH_HERMETIC_USR
  * Added support for Ed25519 keys through PKCS#11
  * Support for host-bound public key authentication
    (publickey-hostbound-v00@openssh.com)
  * Use curve25519 implementation from mbedTLS and libgcrypt
  * New functions for signing arbitrary data (commits) with SSH keys
    * sshsig_sign()
    * sshsig_verify()
  * Support for FIDO/U2F keys (internal implementation using libfido2)
    * Compatible with OpenSSH: should work out of the box
    * Extensible with callbacks
  * Add support for GSSAPI Key Exchange (RFC 4462, RFC 8732)
  * Add support for new configuration options (client and server):
    * RequiredRsaSize
    * AddressFamily (client)
    * GSSAPIKeyExchange
    * GSSAPIKexAlgorithms
  * New option to get list of configured identities (SSH_OPTIONS_NEXT_IDENTITY)
  * More OpenSSH compatible percent expansion characters
  * Add new server auth_kbdint_function() callback
  * New PKI Context structure for key operations
  * Stability and compatibility improvements of ProxyJump
* SFTP
  * Prevent failures when SFTP status message does not contain error message
  * Fix possible timeouts while waiting for SFTP messages
  * Support for users-groups-by-id@openssh.com extension in client
  * Support for SSH_FXF_TRUNC in server