swtpm-devel-0.5.2-1.20 >  A `ep9|a@2Sj0F/dVԲlܡwdv;EơvZ<Ӑo"$704iǴ/d#Kg,WG[`|^?UGa:,]6._䤵s"B}#s-cw:8wČ\3b^F\hO߲Xz  $0!I;f NHW?8Cw1iHJ\8h|K$| IXrI:Z_*1dee36a68d6d39534d7ec9fc700275ee9e8012927ffb027be2b700f4f66f89b5f94a066652b628782c840530c194dab5bb4bba0cH`ep9|vdZJ|C eI7Z4ˣNT,@N<ߋ; G2ufF;I5(1e8cWQ+d)|7wq Ҭy5'1f,9&}A>wXy-PqZ}-&PJl@ 4 j#wq%OhW/^0e~6ES3B"$0`#d\rc{έz%$|* ̗<+y_1jiK ]Ϫ=\p_CT>p>"?"d  5X\hl 0 : D X  <Pi $  (8 9( : F,G@HTIhXpY|\]^b =c d!=e!Bf!El!Gu!Xv!lw!x"y"$z"("8"<"B"Cswtpm-devel0.5.21.20Development files for swtpmThe development files for SWTPM`e`s390zp38?SUSE Linux Enterprise 15SUSE LLC BSD-3-Clausehttps://www.suse.com/Development/Libraries/C and C++https://github.com/stefanberger/swtpmlinuxs390x'-A큤`eV`eV`eZ`eZ`eVcaded6abcee58e3a7210506b90c53efdad41d0d384d2b36bceb0de76641099e8bed82b8f95ee3d0e5186f8fb157d83ba0ed4d83454ffe640525a8fea72d23a0fe5ca3ec9170085318c21518bb009dff05ab72c900e4dd301820ac3e69ba781d9libswtpm_libtpms.so.0.0.0rootrootrootrootrootrootrootrootrootrootswtpm-0.5.2-1.20.src.rpmlibtool(/usr/lib64/swtpm/libswtpm_libtpms.la)swtpm-develswtpm-devel(s390-64)    glib2-devellibopenssl-devellibseccomp-devellibtpms-develrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)swtpm3.0.4-14.6.0-14.0-15.2-10.5.24.14.1_w@___R__5+@_"@_ ^1^,]pZmeissner@suse.comglin@suse.comglin@suse.comkai.liu@suse.comkai.liu@suse.comkai.liu@suse.comkai.liu@suse.comkai.liu@suse.comglin@suse.comglin@suse.comglin@suse.comglin@suse.com- Update to version 0.5.2 - swtpm: - Fix potential buffer overflow related to largely unused data hashing function in control channel - swtpm: Unconditionally close fd if writing of pidfile fails (coverity) - swtpm_setup: - Increase timeout from 10s to 30s for slower machines - Travis: - Not building on OS X anymore due to additional costs- Use "Requires user(tss)" for the "tss" user and group- Create /var/lib/swtpm-localca to store the keys created by swtpm-localca (bsc#1179811) - Replace net-tools-deprecated with iproute2 since the scripts in swtpm now can use 'ss' instead of 'netstat'- Update to version 0.5.1 * swtpm & swtpm_setup: - Addressed potential symlink attack issue (CVE-2020-28407) * build-sys: - Fix configure python cryptography error message - Misc. spec file changes.- Update Requires and BuildRequires for changes since 0.4.0. - Remove patch files that are no longer needed: * swtpm-adjust-seccomp-path.patch * swtpm-setup-tcsd-path.patch * swtpm-tpm-tools-path.patch - Update to version 0.5.0 * swtpm: - Write files atomically using a temp file and then renaming * swtpm_setup: - Removed remaining 'c' wrapper program - Do not truncate logfile when testing write-access (regression) - Remove TPM state file in case error occurred * swtpm-localca: - Rewrite in python - Allow passing pkcs11 PIN using signingkey_password - Allow passing environment variables needed for pkcs11 modules using swtpm-localca.conf and format 'env:VARNAME=VALUE'. * build-sys: - Add python-install and python-uninstall targets - Add configure option to disable installation of Python module - Use -Wl,-z,relro and -Wl,-z,now only when linking (clang) - Use AC_LINK_IFELSE to check whether support for hardening flags - Changes from version 0.4.1 * swtpm_setup: - Do not hardcode '/etc' but use SYSCONFDIR - Fix support for -h and -? options - Add missing .config path when using ${HOME} * swtpm-localca: - Apply password for signing key when creating platform cert - Properly apply passwords for localca signing key - Changes from version 0.4.0 * swtpm: - Invoke print capabilities after choosing TPM version - Add some recent syscalls to seccomp blacklist * swtpm_cert: - Support --ecc-curveid option to pass curve id * swtpm_setup & related scripts: - Rewrite swtpm_setup.sh in python with TPM 1.2 not requiring tcsd and TPM tools anymore; new dependencies: - python3: pip, cryptography, setuptools dropped dependencies for swtpm_setup: - tcsd, expect, tpm-tools (some still needed for pkcs11 tests) - Added support for RSA 3072 keys (for libtpms-0.8.0) and moved to ECC NIST P384 curve; default RSA key size is still 2048 - Added support for --rsa-keysize option - Extend script to create a CA using a TPM 2 for signing * tests: - Use the IBM TSS2 v1.5.0's test suite - Add test case for loading of an NVRAM completely full with keys - Have softhsm_setup use temporary directory for softhsm config & state - various other improvements * man pages: - Improvements * build-sys: - clang: properly test for linker flag 'now' and 'relro' - Gentoo: explicitly link libswtpm_libtpms with -lcrypto - Ownership of /var/lib/swtpm-localca is now tss:root and mode flags 0750.- Update to version 0.3.4: * swtpm: - Fix compilation for cygwin * swtpm_setup & swtpm-localca: - Get rid of bash's eval when invoking external tools to avoid abuse. Only use eval for 'resolving' variables. * tests: - Various fixes of minor issues- Update to version 0.3.3: * swtpm_setup: - openSUSE: Support tcsd configuration where tss user != tss group, such as root/tss; Fedora & Ubuntu for example use tss/tss * build-sys: - Check whether tss user and group are available - Add tss user & group build flags per upstream instruction. This together with v0.3.3 fixed the bug with TPM 1.2 emulation. Related upstream bug: https://github.com/stefanberger/swtpm/issues/284- Update to 0.3.2: + swtpm: + Remove unnecessary #include (fixes SuSE build) + Make coverity happy by handling default case in case statement + swtpm_setup: + bugfix: Create ECC storage primary key in owner hierarchy + bugfix: remove tpm2_stirrandom and tpm2_changeeps + tests: + Adjusted pcrUpdateCounter in tests to succeed with PCR TCB group fixes in libtpms TPM 2 code- Update to 0.3.1 + swtpm: Fix vtpm proxy case without startup flags + swtpm: Only call memcpy if tocopy != 0 (coverity) + man: Document new startup options and capabilities advertisement + swtpm: Enable sending startup commands before processing commands + swtpm_cert: Accept serial numbers that use up to 64bits + swtpm_cert: Use getopt_long_only to parse options + swtpm_cert: Add support for --print-capabilities option + swtpm_cert: Allow passing signing key and parent key via new option + swtpm_setup: Enable spaces in paths and other variables + swtpm_ioctl: Calculate strlen(input) only once + swtpm_ioctl: Block SIGPIPE so we can get EPIPE on write() + swtpm_bios: Block SIGPIPE so we can get EPIPE on write() + swtpm: Only accept() new client ctrl connection if we have none + swtpm_setup: Do not fail on future PCR banks' hashes + swtpm_setup: Use 1st part of SWTPM_EXE/SWTPM_IOCTL to determine executable + swtpm_setup: Keep reserved range of file descriptors for swtpm_setup.sh + swtpm_setup: Log about encryption and fix c&p error in err msg + swtpm: Add --print-capabilities to help screen of 'swtpm chardev' + swtpm_ioctl: Fix uninitialized variable 'pgi' + swtpm_cert: Use gnutls_x509_crt_get_subject_key_id API call for subj keyId + swtpm_cert: Fix OIDs for TPM 2 platforms data + swtpm: Fix typo in error report: HMAC instead of hash + swtpm: Use writev_full rather than writev; fixes --vtpm-proxy EIO error - Refresh swtpm-setup-tcsd-path.patch- Amend swtpm-adjust-seccomp-path.patch to add the missing seccomp paths - Adjust the conditional check of net-tools-deprecated for SLE15 and SLE15-SP1- Update to 0.2.0 +Linux: swtpm now runs with a seccomp profile (blacklist) if compiled with libseccomp support + Added subpport for passing key and passphrase via file descriptor + TPM 2 commands can now be prefixed by 'the TCG header' and responses will have a 4-byte prefix and 4-byte suffix. + Added --print-capabilities command line option + Proper handling on EINTR on read, poll, and write - Patches to adjust the pathes + swtpm-tpm-tools-path.patch + swtpm-setup-tcsd-path.patch + swtpm-adjust-seccomp-path.patch- Initial import: 0.1.0-dev2s390zp38 16172895680.5.2-1.200.5.2-1.20swtpmtpm_ioctl.hlibswtpm_libtpms.lalibswtpm_libtpms.soswtpm_ioctls.3.gz/usr/include//usr/include/swtpm//usr/lib64/swtpm//usr/share/man/man3/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:SLE-15-SP3:GA/standard/edd5911dedb4c4f503c3803ac3a325cc-swtpmcpioxz5s390x-suse-linuxdirectoryC source, ASCII textlibtool library filetroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)P$ZP~v#9utf-8784573f536120edf63508a1af1758b2efcbd76a9913bf0c90bc53c59f2aff42e? 7zXZ !t/CS!] crt:bLL ܰTSKJf&ͱubHu2]"/T%7{<0`b%_IOh5$*0ʜW96`kM INO9ꇜyRoJ Gˬu(\hKCa#p 6 %ms-GL-lͫՊ%.029BDj_^#^(3s-0ߨ nu~+Е}\^)RPw08Q;a33ȵ=qP&lFI-XBB';fN5N/pڰ(o[_iS`Ơ"ÙC+lUɛۼ @A,Mp^1X)5G:kN'vno~{qBWiB2g1G0_Th*%EF#W79eKiH{p 8exiy!5JO 2!i&lD*=]gI-SDVObn@cpd6H0 &D|>kufslkxԧap=Gt8fvoU^ 5TNy@i<>A@lU(VCB1i9sYk$Zu, o/:,;oerҙ:]9Tx=[fExl/N"ʚg_,֑y^C!&E4võUИ+RUĦr_3|.FwxM5`(l(T҆<9M\j!8@2H* w `'ѧL8$`+&FJpv2D7+qtdGWp=61s{; (ӷ=Py-Y <vxӋD5Щt֙N|GQX:'QdBy BC%Lv"h{E%+$4$L]߉BjiC( eňáǩܒLOG1MGn _Gf7bfxbXbiv?X̫ϲ!^onДC~!#zEnmJ nvjF /+vjwQq@sv)i$:YIZb0:Ӷ[NU{.TJJ5=KJ#PE<k+|q:/UJIk'M+M1au1 5М*{ߗZP}4<|`  5>V.U$WG$JgCj"[&[ևKSajV۪`'!Ch 1^t)jw1pZ;:1E'WLdpE*&7@5͟]0m.!ȬUI'*IT~|UqVITpob7(g"Œ=m2RY.Qc>}[m̮0.IUCAVJLW̙7Z٭i[)餓?=fas蓈QN (瀆H|&9аl&[q0|x>񕾻 uVlFaJjRHGG2i M/р}S wzQ ~ eѵMy VVКdbISZcv:m"[L`xJo_R|qM@Ej-8tHT#z^n->mE/׸SPʸ0^6FF9ZZ(@p9[.<6c_W0,S bd0}Ba|Nvoc.0C P%#O`F8v87/risKcnsA;q"(߉ 5D 1!ɧotf:<垥$Ia]ő)N|;.(ʘ>L%pN]Ys7Nqy>4ܻ܈y700ֽN gp}Cf/v!){*KYW]z~h =+g{Oa5 {xs[o\ ?gxH4%oWrU"iᵜC@r|NnKΕp~}* Ë֜MCAI @(K!1?`S'~a'h{2lsDyhglF63ĉU-RKƝB'qCX!̍Į :Eͺ!8%~AI=R& ] '$;ֆ ;wN^Ry>|\h\[__Q%g4\Y!߷L<1 Mi5L"uTMST}e<>"~׿Tc===^eSBkW3!\r+=3P}hl=E^RYNjhI26cefݨhʬQ77q6^ c2EGl|@ &#fc sNZ͠eJ !,`[ZZѿ\lO'mLKVkk!R2 _X3l-Zĉ8CG7%`4}Ȩn[7CEKcJg 6>mYԏZheNd5kiFc\bB͒M4[= y1MBmfW|ξ4Pb^nd#s3f-O^7^#xg|mX27K=95xEj?5"UjteWc{s0Es1IK.Lbbq^=H-⮔.%,USjLȫ vCĦ裇a8sfNS. 1jUB>t -YĪܨߊe,bi#1[lk|Ǭ.]#qYgiJ'_;>Pϕּf) ]P:PI1k&~+WVP,raPw ,š5T%eL[ T/0 pKFyz`~Ph*,ٯo2j9ך\/o|h kbZf _+SDA,@nqԚuG_9ܽ15We7-LJ.=V ]PKA=P4 ˂ZXP~ P|Dx3M  s 1 M (S\-H>gx\unM W5,#l8{܉žn!^sT+~ 5mgb,).r̵@\ Q)bJA@ns)" %c CZc8V&y #RgM{50A3|W5\v4-c+L%Eva2kR_Uy(uμ p(O^MƯȶl?%Vf%7x%Rp=̺t폶uӧO4_uM5:Aʹa%~u 'l eC\툮3-(~C~ϙEJVPkC=`=?剏aQ{hsLNA)_@4<*GNy&>= TVM3_gտ_|ͺV1, tBL9 zVU Iy $j;n "hG=c~mCU9b+ie̜mGCM3T.^akjfK)j*4Yvt]wo(.)C^fҦQ7s \DҕIqz_ؖG.xa?"-k[~06cǃ,Z/B%V`с,B;-yJXeEJesnt*EIcڜjDQyV꽱nO4I_"\t..Av*$W׈Mg~V"(u*1%,z+@ٕU] Y,"Q9qԇH`ǩeVwvͶHVl y8C-(t ]"H15v[8kCx grhfu0ܬw DgUj<, l9,p'T//ZK j2RZ54ddƹL-:?Zje?Es>"_*׫G~6sT8'nZ`!yJ`M()#};poǢw܏jUOD[D%zqܓZ= 1#bZۤJVf&^Sg?WB;/X5Wm1!Zbl8 %ľa_lzps@E 1VH֒&= }h<~#ibᱱ#:U:4~NJBHKABWƣ#.w0b  Mįĺ6I\e(E\LU&G{Ǣ\@`(8<#5Q["M@4 YVhtqpN[15CJ&:$:XuKX# 's&aMgTg%wI>nƀ F~΂ '“L]*Ϋ͛o詄"FV鱚 S1|71uS.ZMQVMb~<)Md'R(j(tn{`}aWrz Sq#Uhƚ'c,|ƍjw1߶mxУG?w-8C[eDkˊO*HRYfg;9 68Æe[|)*-ߪEd٥QRwQ|lHPYHLxkw  6yπb-6?"y) d I6$g)hToݝaѓ,|Zgv%%+u#];fm˻?4YpA#L Ώl; &#冼k0"녋 0Sq=}r859_$i<8Qz>jO_.J t<ufPfF.u+W07e'~3h% vcgt^oq>J=!kuz8_;ݯeXP@a\@hF^~rwT/+w47˹[0~dN.p2/Mu~PX/:P(ܙ)$tmT-,QQq=oElkYDԆv8 YZ