swtpm-devel-0.5.2-1.20 >  A `ep9|[cե9KU><|');vvHJ}*zLmp| 7fbd7tz%t'7a yW2ʏ{?C̽RԽ<*T)BLGB@4=NcҸvJqܾ{pPPH 0{`K`~CW8@5ݙAru BN{"F;mP& -5'X68113150af713544ddf0f793fe06354133f03014f03f6561c74f91659737333a438352de152306a68a9d5d5f7416134ab9f9d0a7H`ep9| )9YBz~]wQ-k]e^x$޾%+ksHb, <_v<=1 GI("HW6^ ᢫}0:$BR0cWr lEv|*dd L Ӂh2N M%г@&ʏj u#||Tsen1y(*,j}.8^:.+RӋ [|zH{yEcy'!(% L?CT>p>"?"d  5X\dh  , 6 @ T  8Le~   (8 9$ : F(G<HPIdXlYx\]^b 9c d!9e!>f!Al!Cu!Xv!lw!x"y"$z"("8"<"B"Cswtpm-devel0.5.21.20Development files for swtpmThe development files for SWTPM`esheep16?SUSE Linux Enterprise 15SUSE LLC BSD-3-Clausehttps://www.suse.com/Development/Libraries/C and C++https://github.com/stefanberger/swtpmlinuxx86_64'-A큤`e`e`e`e`ecaded6abcee58e3a7210506b90c53efdad41d0d384d2b36bceb0de76641099e8bed82b8f95ee3d0e5186f8fb157d83ba0ed4d83454ffe640525a8fea72d23a0fe5ca3ec9170085318c21518bb009dff05ab72c900e4dd301820ac3e69ba781d9libswtpm_libtpms.so.0.0.0rootrootrootrootrootrootrootrootrootrootswtpm-0.5.2-1.20.src.rpmlibtool(/usr/lib64/swtpm/libswtpm_libtpms.la)swtpm-develswtpm-devel(x86-64)    glib2-devellibopenssl-devellibseccomp-devellibtpms-develrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)swtpm3.0.4-14.6.0-14.0-15.2-10.5.24.14.1_w@___R__5+@_"@_ ^1^,]pZmeissner@suse.comglin@suse.comglin@suse.comkai.liu@suse.comkai.liu@suse.comkai.liu@suse.comkai.liu@suse.comkai.liu@suse.comglin@suse.comglin@suse.comglin@suse.comglin@suse.com- Update to version 0.5.2 - swtpm: - Fix potential buffer overflow related to largely unused data hashing function in control channel - swtpm: Unconditionally close fd if writing of pidfile fails (coverity) - swtpm_setup: - Increase timeout from 10s to 30s for slower machines - Travis: - Not building on OS X anymore due to additional costs- Use "Requires user(tss)" for the "tss" user and group- Create /var/lib/swtpm-localca to store the keys created by swtpm-localca (bsc#1179811) - Replace net-tools-deprecated with iproute2 since the scripts in swtpm now can use 'ss' instead of 'netstat'- Update to version 0.5.1 * swtpm & swtpm_setup: - Addressed potential symlink attack issue (CVE-2020-28407) * build-sys: - Fix configure python cryptography error message - Misc. spec file changes.- Update Requires and BuildRequires for changes since 0.4.0. - Remove patch files that are no longer needed: * swtpm-adjust-seccomp-path.patch * swtpm-setup-tcsd-path.patch * swtpm-tpm-tools-path.patch - Update to version 0.5.0 * swtpm: - Write files atomically using a temp file and then renaming * swtpm_setup: - Removed remaining 'c' wrapper program - Do not truncate logfile when testing write-access (regression) - Remove TPM state file in case error occurred * swtpm-localca: - Rewrite in python - Allow passing pkcs11 PIN using signingkey_password - Allow passing environment variables needed for pkcs11 modules using swtpm-localca.conf and format 'env:VARNAME=VALUE'. * build-sys: - Add python-install and python-uninstall targets - Add configure option to disable installation of Python module - Use -Wl,-z,relro and -Wl,-z,now only when linking (clang) - Use AC_LINK_IFELSE to check whether support for hardening flags - Changes from version 0.4.1 * swtpm_setup: - Do not hardcode '/etc' but use SYSCONFDIR - Fix support for -h and -? options - Add missing .config path when using ${HOME} * swtpm-localca: - Apply password for signing key when creating platform cert - Properly apply passwords for localca signing key - Changes from version 0.4.0 * swtpm: - Invoke print capabilities after choosing TPM version - Add some recent syscalls to seccomp blacklist * swtpm_cert: - Support --ecc-curveid option to pass curve id * swtpm_setup & related scripts: - Rewrite swtpm_setup.sh in python with TPM 1.2 not requiring tcsd and TPM tools anymore; new dependencies: - python3: pip, cryptography, setuptools dropped dependencies for swtpm_setup: - tcsd, expect, tpm-tools (some still needed for pkcs11 tests) - Added support for RSA 3072 keys (for libtpms-0.8.0) and moved to ECC NIST P384 curve; default RSA key size is still 2048 - Added support for --rsa-keysize option - Extend script to create a CA using a TPM 2 for signing * tests: - Use the IBM TSS2 v1.5.0's test suite - Add test case for loading of an NVRAM completely full with keys - Have softhsm_setup use temporary directory for softhsm config & state - various other improvements * man pages: - Improvements * build-sys: - clang: properly test for linker flag 'now' and 'relro' - Gentoo: explicitly link libswtpm_libtpms with -lcrypto - Ownership of /var/lib/swtpm-localca is now tss:root and mode flags 0750.- Update to version 0.3.4: * swtpm: - Fix compilation for cygwin * swtpm_setup & swtpm-localca: - Get rid of bash's eval when invoking external tools to avoid abuse. Only use eval for 'resolving' variables. * tests: - Various fixes of minor issues- Update to version 0.3.3: * swtpm_setup: - openSUSE: Support tcsd configuration where tss user != tss group, such as root/tss; Fedora & Ubuntu for example use tss/tss * build-sys: - Check whether tss user and group are available - Add tss user & group build flags per upstream instruction. This together with v0.3.3 fixed the bug with TPM 1.2 emulation. Related upstream bug: https://github.com/stefanberger/swtpm/issues/284- Update to 0.3.2: + swtpm: + Remove unnecessary #include (fixes SuSE build) + Make coverity happy by handling default case in case statement + swtpm_setup: + bugfix: Create ECC storage primary key in owner hierarchy + bugfix: remove tpm2_stirrandom and tpm2_changeeps + tests: + Adjusted pcrUpdateCounter in tests to succeed with PCR TCB group fixes in libtpms TPM 2 code- Update to 0.3.1 + swtpm: Fix vtpm proxy case without startup flags + swtpm: Only call memcpy if tocopy != 0 (coverity) + man: Document new startup options and capabilities advertisement + swtpm: Enable sending startup commands before processing commands + swtpm_cert: Accept serial numbers that use up to 64bits + swtpm_cert: Use getopt_long_only to parse options + swtpm_cert: Add support for --print-capabilities option + swtpm_cert: Allow passing signing key and parent key via new option + swtpm_setup: Enable spaces in paths and other variables + swtpm_ioctl: Calculate strlen(input) only once + swtpm_ioctl: Block SIGPIPE so we can get EPIPE on write() + swtpm_bios: Block SIGPIPE so we can get EPIPE on write() + swtpm: Only accept() new client ctrl connection if we have none + swtpm_setup: Do not fail on future PCR banks' hashes + swtpm_setup: Use 1st part of SWTPM_EXE/SWTPM_IOCTL to determine executable + swtpm_setup: Keep reserved range of file descriptors for swtpm_setup.sh + swtpm_setup: Log about encryption and fix c&p error in err msg + swtpm: Add --print-capabilities to help screen of 'swtpm chardev' + swtpm_ioctl: Fix uninitialized variable 'pgi' + swtpm_cert: Use gnutls_x509_crt_get_subject_key_id API call for subj keyId + swtpm_cert: Fix OIDs for TPM 2 platforms data + swtpm: Fix typo in error report: HMAC instead of hash + swtpm: Use writev_full rather than writev; fixes --vtpm-proxy EIO error - Refresh swtpm-setup-tcsd-path.patch- Amend swtpm-adjust-seccomp-path.patch to add the missing seccomp paths - Adjust the conditional check of net-tools-deprecated for SLE15 and SLE15-SP1- Update to 0.2.0 +Linux: swtpm now runs with a seccomp profile (blacklist) if compiled with libseccomp support + Added subpport for passing key and passphrase via file descriptor + TPM 2 commands can now be prefixed by 'the TCG header' and responses will have a 4-byte prefix and 4-byte suffix. + Added --print-capabilities command line option + Proper handling on EINTR on read, poll, and write - Patches to adjust the pathes + swtpm-tpm-tools-path.patch + swtpm-setup-tcsd-path.patch + swtpm-adjust-seccomp-path.patch- Initial import: 0.1.0-dev2sheep16 16172953320.5.2-1.200.5.2-1.20swtpmtpm_ioctl.hlibswtpm_libtpms.lalibswtpm_libtpms.soswtpm_ioctls.3.gz/usr/include//usr/include/swtpm//usr/lib64/swtpm//usr/share/man/man3/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:SLE-15-SP3:GA/standard/edd5911dedb4c4f503c3803ac3a325cc-swtpmcpioxz5x86_64-suse-linuxdirectoryC source, ASCII textlibtool library filetroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)P"!lluEutf-836ec389338bd47e79fc4712f56f20eea21b978ef0283b640e8ab9959810a5403? 7zXZ !t/CS!] crt:bLL ܰN۬7k|b(od~E^(3V 7jQ NL~h2W1Agu ٽ5Zr@6C+1:X$: Z<_"=Kmg(UI 彩*\V=R>7LC%`ܐ0u~ 8ag7Ch6G@e5q8v$ӊVݣF(|Y,D>٘"By;2koǸ_iق?hơ"d@-(CX7ThmCY64<1)Xv?}C/iF-],>(jC`@(쟻ܲyP3NZD& VJ}C?:"r)pjg͋,2Ї4 =:RgҶVPĜJ(חTh ?EYD#JU> X]en|]s HeqQ vcb}tg&D{&%C\vB]R#p]S([3^<",Π1Nhp>RC-]TSQ="--V4NkH"̡Gd&#K>29,{ `(2Ż28N#}`} ]> PS&ܧ=?i0Ay ]f3qii5C[jFYƹ:<>BY1l/EC%[ha53.gZOVq8)' c1>qA] /sy:u8UveM|S4ޖ?qbݒ=p%֋C;1B_OLqQvDnT-6ޣCw"j/Z \{\%} l(tt(ni:\ eScPdJfZ{ oQ~ޢjhnJ#f螬|јWިY.Vys̛Q/ę< i 1>q.A!p0N!fosr>+ށᨐʎel"`Pj $M^wQ3Rib )6N깶OfP>kmCj)HD$7/+hvBS 5 wBo XFˍJ~F2+5]/٘JY6rrY>(@5 [.7Znt/?kILJʏ͒'.hքž0~7HG!i~l&OE&U%TQCOvNv٢ fҲ腷ݱ­hui|jfiQ)D~cn"bzdK+T|7hWZ(%I>EY݌zQxtx;r-d6Iu UԀ؏LjS-UGg?Q$'2 &4-q@#,2`#޷GY@zcW [YC@7qYd%uB OQ3,D C #dq4_`\#d`R}A! 'N @iJOPE*MKbY dYeJE]a㵥in瓝RS1kyBMPxt'EDh_#ǿ`vqB ߒrU"m6c_8$ПzuA'F%N06w{MC>FA0uJyQi[U}tS/Ԑ, |(B~;Rl>﫸JqHXQnfKt>Pc`m̴HuɚFęJiVoy}kMH>`' n8\R!C*G[Dpzq[,Dhkl_iW~l,.m*eSQ`*f\_׸2SNO;}vBķz1 Jc&8" `}Q' bGy$`umN d5p-FIr:+Gd~[F<ޘ%W37ԶԴ78*}|Tv`Jc/B+?y&Uޏ :3nU`ZL!\MU ]defg\_{kJi:pt5FO7U[Z鞐BlVPIR4}Kg/^/I$DcvО!F"⡬];S+CCd=E.Qu#vT~0HZyy BC<6v]I{ĭGcԩP*?2q,OCy8 P W,$hMYn,K%&nZ',0tyɊ+;Ò(еfE]7"Kx+Fb8 Ej/acAjLBAGȊSy&yA(|1IYϐJ P4Y.[8$L kAZOuXR!7IVmxq")gr_ARߚ]mk=dJӡwl$y"C:"Mbn{BxS!&!:Y {'48S һ$ϟ@#rDSS!ȱf!MfޫdqF; .uD !k *NJi j4acn%Ҷץ#H$j( 4EMʹ< T!3ڷ16t́0 k LTIQZQR"ڇgQ# ~2w%N >emGKPY'ϟ\l=nEiDCTk\υYv1^=c"rpT '/B;Ẃr!FX`eM%[Qx%Es0.O dBv$ ]^8-yW3ep|:yN;]f+TDAk> Z>0ڊ7+֢@{ǽ|cK9Aw'a!ٻ_Z^ _P [Y܄\EΣ9gi+`2w$\?S]2Д3ؓE$<@""@\#FeuݵQg XyR4/E2~nB˓ ͐?ߑ|ձD)mF+(( _VaROL`4'6Pg)Su6zW{߮a<⥠a*Ƭ >4+8:[7wr$Eo%nue vUN!:IaeiqR dow$qliAXshw2UE 5vQtw{Vl#o^g\i+s QLbpE :l;!sC[Ll<*OpfgV_@1 0YT䍭0(4znݕSA?G]nWZ sKO[ۂ$GeP:{;NU 4TD יnxMLWk !w56hXmRo6Ч̽hّs8P˟ UaJ&F|V'yV*D Q|>mגYގrū@@xDTXC@rs0>ڠVVȲ>m][U))1Ǐ,/kV3( lp='<]‘)#YcV`M=7'b|,O5X:ME.uTHäVvيW3Nr`ISЕHhH{*-?r4߆,)($Z`S<sɰn8$[b'kj DV݊n"@/aĎ0t#]Ew(R ]GJzWz`)T !&E2ƫ{mkeML/ pa,Y.r*,ʻocQiP snC89簞S5(KydTvFa捎8/Qj'Y'*)ʸ׈B>xdrXj|fd[dՏ~Kd'qыbN3s@eԱ2?h,d6;RJwPs飚 2os6pΠcU(Rb"wph˕9ȊPa} А]X?}JG=le+$xex/mY<e6@x)LwcU|ϭIĕNE5!s|Ը5Z8=Ѡ[D_qb/6wI=Β҉xX ɇ;,ڀfdbR}"叆 Y˜20it,b^tnr<@w=XM֞e,GOPI@#ڼ8PcWRgdB эH&K^Cw-&m:j<2hM;Ћz47Oʤ1 /&v 8N2ëÐ"̍y/"B.-R6r@:*EpcP[ߟKh'*7iH>'sI!dnqG͵CCb 5u]dJ4^<7t*b<wvYyL:cϷ]y*Wkv-5Z<yck"~$>-M/caSңSY3|^, O麑&ya yX=J!Oið$-f;V̍/(=z]E-ŀ?N1cS1\[ݼ9'HVB}$3+wV>G^Mաjȵe A.(hbNj($( # _9vME 5>|P<t4lW"VQ@*nkR/SIe.eU$6/5#nj(lESgC\{UӖ6)#K\HX|Vfi-K 'jM@-qTU28V4.Pv]|FD>8]-/oQUG@z<˳$3AF]D>f:<62-.u ;g0hɯ[kjG8O|^܃m(! ~3G={~qkdwɠzz65տUd]ۤFvL8R_pux6.T t-҄DuyKBwXDW6&;U{{@xX~&/F p2 pRV ׆] XxXH,{Rcvƿ?0\R`TpZ5tZSB]pF>)|*C+\Wh(NȐbᵽJck|U o+81n)徒}$*^̶q{g#k)+ʕvH%2#sdh;"|Z!ZFnߖQW5ZBbadj|U{焥U^uȮIc;\3LMo׋xF+gXX +8?RYUS* 6%羪T6