Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package openssl_tpm2_engine for 
openSUSE:Factory checked in at 2025-03-01 19:16:28
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/openssl_tpm2_engine (Old)
 and      /work/SRC/openSUSE:Factory/.openssl_tpm2_engine.new.19136 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "openssl_tpm2_engine"

Sat Mar  1 19:16:28 2025 rev:20 rq:1249302 version:4.4.2

Changes:
--------
--- /work/SRC/openSUSE:Factory/openssl_tpm2_engine/openssl_tpm2_engine.changes  
2024-11-06 16:53:31.435978133 +0100
+++ 
/work/SRC/openSUSE:Factory/.openssl_tpm2_engine.new.19136/openssl_tpm2_engine.changes
       2025-03-01 19:16:47.093672698 +0100
@@ -1,0 +2,7 @@
+Fri Feb 28 15:10:33 UTC 2025 - James Bottomley 
<james.bottom...@hansenpartnership.com>
+
+- Update to version 4.4.2
+  * Fix TLS certificate signing challenges
+  * Fix openvpn using the tpm2 provider
+
+-------------------------------------------------------------------

Old:
----
  openssl_tpm2_engine-4.4.1.tar.gz

New:
----
  openssl_tpm2_engine-4.4.2.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ openssl_tpm2_engine.spec ++++++
--- /var/tmp/diff_new_pack.zoecHA/_old  2025-03-01 19:16:47.733699258 +0100
+++ /var/tmp/diff_new_pack.zoecHA/_new  2025-03-01 19:16:47.737699423 +0100
@@ -1,7 +1,7 @@
 #
 # spec file for package openssl_tpm2_engine
 #
-# Copyright (c) 2024 SUSE LLC
+# Copyright (c) 2025 SUSE LLC
 # Copyright (c) 2017 james.bottom...@hansenpartnership.com
 #
 # All modifications and additions to the file contributed by third parties
@@ -18,7 +18,7 @@
 
 
 Name:           openssl_tpm2_engine
-Version:        4.4.1
+Version:        4.4.2
 Release:        0
 Summary:        OpenSSL TPM 2.0 interface engine plugin
 License:        LGPL-2.1-only

++++++ openssl_tpm2_engine-4.4.1.tar.gz -> openssl_tpm2_engine-4.4.2.tar.gz 
++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openssl_tpm2_engine-4.4.1/configure.ac 
new/openssl_tpm2_engine-4.4.2/configure.ac
--- old/openssl_tpm2_engine-4.4.1/configure.ac  2024-11-05 15:15:24.000000000 
+0100
+++ new/openssl_tpm2_engine-4.4.2/configure.ac  2025-02-28 16:04:33.000000000 
+0100
@@ -2,7 +2,7 @@
 # configure.in for the OpenSSL TPM engine project
 #
 
-AC_INIT(openssl-tpm2-engine, 4.4.1, <openssl-tpm2-eng...@groups.io>)
+AC_INIT(openssl-tpm2-engine, 4.4.2, <openssl-tpm2-eng...@groups.io>)
 AM_INIT_AUTOMAKE([foreign 1.6.3])
 AC_CANONICAL_HOST
 AM_CONDITIONAL(NATIVE_BUILD, test "x$cross_compiling" = "xno")
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/openssl_tpm2_engine-4.4.1/src/opensslmissing/signature.c 
new/openssl_tpm2_engine-4.4.2/src/opensslmissing/signature.c
--- old/openssl_tpm2_engine-4.4.1/src/opensslmissing/signature.c        
2024-11-05 15:15:24.000000000 +0100
+++ new/openssl_tpm2_engine-4.4.2/src/opensslmissing/signature.c        
2025-02-28 16:04:33.000000000 +0100
@@ -248,10 +248,27 @@
 
        p = OSSL_PARAM_locate_const(params, OSSL_SIGNATURE_PARAM_PSS_SALTLEN);
        if (p) {
-               if (p->data_type != OSSL_PARAM_INTEGER)
-                       return 0;
-               if (!OSSL_PARAM_get_int(p, &ctx->salt_len))
+               fprintf(stderr, "LOCATED saltlen\n");
+               if (p->data_type == OSSL_PARAM_INTEGER) {
+                       if (!OSSL_PARAM_get_int(p, &ctx->salt_len))
+                               return 0;
+               } else if (p->data_type == OSSL_PARAM_UTF8_STRING) {
+                       if (strcmp(p->data, OSSL_PKEY_RSA_PSS_SALT_LEN_DIGEST)
+                           == 0)
+                               ctx->salt_len = RSA_PSS_SALTLEN_DIGEST;
+                       else if (strcmp(p->data, OSSL_PKEY_RSA_PSS_SALT_LEN_MAX)
+                                == 0)
+                               ctx->salt_len = RSA_PSS_SALTLEN_MAX;
+                       else if (strcmp(p->data, 
OSSL_PKEY_RSA_PSS_SALT_LEN_AUTO)
+                                == 0)
+                               ctx->salt_len = RSA_PSS_SALTLEN_AUTO;
+                       else if (strcmp(p->data, 
OSSL_PKEY_RSA_PSS_SALT_LEN_AUTO_DIGEST_MAX) == 0)
+                               ctx->salt_len = RSA_PSS_SALTLEN_AUTO_DIGEST_MAX;
+                       else
+                               ctx->salt_len = atoi(p->data);
+               } else {
                        return 0;
+               }
        }
 
        return 1;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/openssl_tpm2_engine-4.4.1/src/provider/decode_encode.c 
new/openssl_tpm2_engine-4.4.2/src/provider/decode_encode.c
--- old/openssl_tpm2_engine-4.4.1/src/provider/decode_encode.c  2024-11-05 
15:15:24.000000000 +0100
+++ new/openssl_tpm2_engine-4.4.2/src/provider/decode_encode.c  2025-02-28 
16:04:33.000000000 +0100
@@ -199,13 +199,13 @@
 
 /* only provide pretty print encoders.  All other key saves
  * are done by keymgmt export (which means only public keys) */
-const OSSL_ALGORITHM encoders[] = {
+const OSSL_ALGORITHM tpm2_encoders[] = {
        { "RSA", "provider=tpm2,output=text", encode_text_fns },
        { "EC", "provider=tpm2,output=text", encode_text_fns },
        { NULL, NULL, NULL }
 };
 
-const OSSL_ALGORITHM decoders[] = {
+const OSSL_ALGORITHM tpm2_decoders[] = {
        { "DER", "provider=tpm2,input=pem", decode_pem_fns },
        { "RSA", "provider=tpm2,input=der,structure=TPM2", decode_rsa_fns },
        { "EC", "provider=tpm2,input=der,structure=TPM2", decode_ec_fns },
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openssl_tpm2_engine-4.4.1/src/provider/decryption.c 
new/openssl_tpm2_engine-4.4.2/src/provider/decryption.c
--- old/openssl_tpm2_engine-4.4.1/src/provider/decryption.c     2024-11-05 
15:15:24.000000000 +0100
+++ new/openssl_tpm2_engine-4.4.2/src/provider/decryption.c     2025-02-28 
16:04:33.000000000 +0100
@@ -170,12 +170,12 @@
        { 0, NULL }
 };
 
-const OSSL_ALGORITHM asymciphers[] = {
+const OSSL_ALGORITHM tpm2_asymciphers[] = {
        { "RSA", "provider=tpm2", asymcipher_fns },
        { NULL, NULL, NULL }
 };
 
-const OSSL_ALGORITHM keyexchs[] = {
+const OSSL_ALGORITHM tpm2_keyexchs[] = {
        { "EC", "provider=tpm2", keyexch_fns },
        { NULL, NULL, NULL }
 };
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openssl_tpm2_engine-4.4.1/src/provider/keymgmt.c 
new/openssl_tpm2_engine-4.4.2/src/provider/keymgmt.c
--- old/openssl_tpm2_engine-4.4.1/src/provider/keymgmt.c        2024-11-05 
15:15:24.000000000 +0100
+++ new/openssl_tpm2_engine-4.4.2/src/provider/keymgmt.c        2025-02-28 
16:04:33.000000000 +0100
@@ -244,7 +244,7 @@
        { 0, NULL}
 };
 
-const OSSL_ALGORITHM keymgmts[]= {
+const OSSL_ALGORITHM tpm2_keymgmts[]= {
        { "RSA", "provider=tpm2", rsa_keymgmt_fns },
        { "EC", "provider=tpm2", ec_keymgmt_fns },
        { NULL, NULL, NULL}
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openssl_tpm2_engine-4.4.1/src/provider/provider.c 
new/openssl_tpm2_engine-4.4.2/src/provider/provider.c
--- old/openssl_tpm2_engine-4.4.1/src/provider/provider.c       2024-11-05 
15:15:24.000000000 +0100
+++ new/openssl_tpm2_engine-4.4.2/src/provider/provider.c       2025-02-28 
16:04:33.000000000 +0100
@@ -67,13 +67,13 @@
        const OSSL_ALGORITHM *alg;
        const char *desc;
 } queries[] = {
-       QOP(OSSL_OP_DECODER, decoders),
-       QOP(OSSL_OP_ENCODER, encoders),
-       QOP(OSSL_OP_KEYMGMT, keymgmts),
-       QOP(OSSL_OP_SIGNATURE, signatures),
-       QOP(OSSL_OP_ASYM_CIPHER, asymciphers),
-       QOP(OSSL_OP_KEYEXCH, keyexchs),
-       QOP(OSSL_OP_STORE, stores),
+       QOP(OSSL_OP_DECODER, tpm2_decoders),
+       QOP(OSSL_OP_ENCODER, tpm2_encoders),
+       QOP(OSSL_OP_KEYMGMT, tpm2_keymgmts),
+       QOP(OSSL_OP_SIGNATURE, tpm2_signatures),
+       QOP(OSSL_OP_ASYM_CIPHER, tpm2_asymciphers),
+       QOP(OSSL_OP_KEYEXCH, tpm2_keyexchs),
+       QOP(OSSL_OP_STORE, tpm2_stores),
 };
 
 static const OSSL_ALGORITHM *p_query(void *provctx, int operation_id,
@@ -132,7 +132,7 @@
                if (nvprefix[i] == ':')
                        nvprefix[i] = 0;
 
-       stores[0].algorithm_names = nvprefix;
+       tpm2_stores[0].algorithm_names = nvprefix;
 
        libctx = OSSL_LIB_CTX_new_from_dispatch(handle, in);
        if (libctx == NULL) {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openssl_tpm2_engine-4.4.1/src/provider/provider.h 
new/openssl_tpm2_engine-4.4.2/src/provider/provider.h
--- old/openssl_tpm2_engine-4.4.1/src/provider/provider.h       2024-11-05 
15:15:24.000000000 +0100
+++ new/openssl_tpm2_engine-4.4.2/src/provider/provider.h       2025-02-28 
16:04:33.000000000 +0100
@@ -25,28 +25,28 @@
                   int *size);
 
 /* decode_encode.c */
-extern const OSSL_ALGORITHM encoders[];
-extern const OSSL_ALGORITHM decoders[];
+extern const OSSL_ALGORITHM tpm2_encoders[];
+extern const OSSL_ALGORITHM tpm2_decoders[];
 
 /* keymgmt.c */
 
-extern const OSSL_ALGORITHM keymgmts[];
+extern const OSSL_ALGORITHM tpm2_keymgmts[];
 
 void *tpm2_keymgmt_new(void *pctx); /* needed by decode_encode.c */
 void tpm2_keymgmt_free(void *ref);  /* needed by decryption.c */
 
 /* signatures.c */
 
-extern const OSSL_ALGORITHM signatures[];
+extern const OSSL_ALGORITHM tpm2_signatures[];
 
 /* decryption.c */
 
-extern const OSSL_ALGORITHM asymciphers[];
-extern const OSSL_ALGORITHM keyexchs[];
+extern const OSSL_ALGORITHM tpm2_asymciphers[];
+extern const OSSL_ALGORITHM tpm2_keyexchs[];
 
 /* store.c */
 
-extern OSSL_ALGORITHM stores[];
+extern OSSL_ALGORITHM tpm2_stores[];
 
 
 #endif
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openssl_tpm2_engine-4.4.1/src/provider/signatures.c 
new/openssl_tpm2_engine-4.4.2/src/provider/signatures.c
--- old/openssl_tpm2_engine-4.4.1/src/provider/signatures.c     2024-11-05 
15:15:24.000000000 +0100
+++ new/openssl_tpm2_engine-4.4.2/src/provider/signatures.c     2025-02-28 
16:04:33.000000000 +0100
@@ -174,7 +174,7 @@
        { 0, NULL }
 };
 
-const OSSL_ALGORITHM signatures[] = {
+const OSSL_ALGORITHM tpm2_signatures[] = {
        { "RSA", "provider=tpm2", signature_fns },
        { "EC", "provider=tpm2", signature_fns },
        { NULL, NULL, NULL }
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/openssl_tpm2_engine-4.4.1/src/provider/store.c 
new/openssl_tpm2_engine-4.4.2/src/provider/store.c
--- old/openssl_tpm2_engine-4.4.1/src/provider/store.c  2024-11-05 
15:15:24.000000000 +0100
+++ new/openssl_tpm2_engine-4.4.2/src/provider/store.c  2025-02-28 
16:04:33.000000000 +0100
@@ -179,7 +179,7 @@
  * the scheme can be modified by a config file parameter, so set it NULL here
  * and then set it after we collect the parameters in OSSL_provider_init()
  */
-OSSL_ALGORITHM stores[] = {
+OSSL_ALGORITHM tpm2_stores[] = {
        { NULL, "provider=tpm2", store_fns },
        { NULL, NULL, NULL }
 };

Reply via email to