Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package tpm2-0-tss for openSUSE:Factory 
checked in at 2022-07-09 16:59:10
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/tpm2-0-tss (Old)
 and      /work/SRC/openSUSE:Factory/.tpm2-0-tss.new.1523 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "tpm2-0-tss"

Sat Jul  9 16:59:10 2022 rev:29 rq:987923 version:3.2.0

Changes:
--------
--- /work/SRC/openSUSE:Factory/tpm2-0-tss/tpm2-0-tss.changes    2021-12-13 
20:46:52.264503267 +0100
+++ /work/SRC/openSUSE:Factory/.tpm2-0-tss.new.1523/tpm2-0-tss.changes  
2022-07-09 16:59:15.716456347 +0200
@@ -1,0 +2,110 @@
+Fri Jul  8 11:52:40 UTC 2022 - Alberto Planas Dominguez <[email protected]>
+
+- Update to 3.2.0
+  + Fixed
+    * FAPI: fix curl_url_set call
+    * FAPI: Fix usage of curl url (Should fix Ubuntu 22.04)
+    * Fix buffer upcast leading to misalignment
+    * Fix check whether SM3 is available
+    * Update git.mk to support R/O src-dir
+    * Fixed file descriptor leak when tcti initialization failed.
+    * 32 Bit builds of the integration tests.
+    * Primary key creation, in some cases the unique field was not
+      cleared before calling create primary.
+    * Primary keys was used for signing the object were cleared after
+      loading. So access e.g. to the certificate did not work.
+    * Primary keys created with Fapi_Create with an auth value, the
+      auth_value was not used in inSensitive to recreate the primary
+      key. Now the auth value callback is used to initialize
+      inSensitive.
+    * The not possible usage of policies for primary keys generated
+      with Fapi_CreatePrimary has been fixed.
+    * An infinite loop when parsing erroneous JSON was fixed in FAPI.
+    * A buffer overflow in ESAPI xor parameter obfuscation was fixed.
+    * Certificates could be read only once in one application The
+      setting the init state of the state automaton for getting
+      certificates was fixed.
+    * A double free when executing policy action was fixed.
+    * A leak in Fapi_Quote was fixed.
+    * The wrong file locking in FAPI IO was fixed.
+    * Enable creation of tss group and user on systems with busybox
+      for fapi.
+    * One fapi integration test did change the auth value of the
+      storage hierarchy.
+    * A leak in fapi crypto with ossl3 was fixed.
+    * Add initial camelia support to FAPI
+    * Fix tests of fapi PCR
+    * Fix tests of ACT functionality if not supported by pTPM
+    * Fix compiler (unused) warning when building without debug
+      logging
+    * Fix leaks in error cases of integration tests
+    * Fix memory leak after ifapi_init_primary_finish failed
+    * Fix double-close of stream in FAPI
+    * Fix segfault when ESYS_TR_NONE is passed to Esys_TR_GetName
+    * Fix the authorization of hierarchy objects used in policy
+      secret.
+    * Fix check of qualifying data in Fapi_VerifyQuote.
+    * Fix some leaks in FAPI error cases.
+    * Make scripts compatible with non-posix shells where test does
+      not know -a and -o.
+    * Fix usage of variable not initialized when fapi keystore is
+      empty.
+  + Added
+    * Add additional IFX root CAs
+    * Added support for SM2, SM3 and SM4.
+    * Added support for OpenSSL 3.0.0.
+    * Added authPolicy field to the TPMU_CAPABILITIES union.
+    * Added actData field to the TPMU_CAPABILITIES union.
+    * Added TPM2_CAP_AUTH_POLICIES
+    * Added TPM2_CAP_ACT constants.
+    * Added updates to the marshalling and unmarshalling of the
+      TPMU_CAPABILITIES union.
+    * Added updated to the FAPI serializations and deserializations of
+      the TPMU_CAPABILITIES union and associated types.
+    * Add CODE_OF_CONDUCT
+    * tcti-mssim and tcti-swtpm gained support for UDX communication
+    * Missing constant for TPM2_RH_PW
+  + Removed
+    * Removed support for OpenSSL < 1.1.0.
+    * Marked TPMS_ALGORITHM_DESCRIPTION and corresponding MU routines
+      as deprecated.
+    * Those were errorous typedefs that are not use and not useful. So
+      we will remove this with 3.3
+    * Marked TPM2_RS_PW as deprecated. Use TPM2_RH_PW instead.
+
+- Update to 3.1.1
+  + Fixed
+    * Fixed file descriptor leak when tcti initialization failed.
+    * Primary key creation, in some cases the unique field was not
+      cleared before calling create primary.
+    * Primary keys was used for signing the object were cleared after
+      loading. So access e.g. to the certificate did not work.
+    * Primary keys created with Fapi_Create with an auth value, the
+      auth_value was not used in inSensitive to recreate the primary
+      key. Now the auth value callback is used to initialize
+      inSensitive.
+    * The not possible usage of policies for primary keys generated
+      with Fapi_CreatePrimary has been fixed.
+    * An infinite loop when parsing erroneous JSON was fixed in FAPI.
+    * A buffer overflow in ESAPI xor parameter obfuscation was fixed.
+    * Certificates could be read only once in one application The
+      setting the init state of the state automaton for getting
+      certificates was fixed.
+    * A double free when executing policy action was fixed.
+    * A leak in Fapi_Quote was fixed.
+    * The wrong file locking in FAPI IO was fixed.
+    * One fapi integration test did change the auth value of the
+      storage hierarchy.
+    * Fix test of FAPI PCR
+    * Fix leaks in error cases of integration tests
+    * Fix segfault when ESYS_TR_NONE is passed to Esys_TR_GetName
+    * Fix the authorization of hierarchy objects used in policy
+      secret.
+    * Fix check of qualifying data in Fapi_VerifyQuote.
+    * Fix some leaks in FAPI error cases.
+    * Fix usage of variable not initialized when fapi keystore is
+      empty.
+  + Added
+    * Add additional IFX root CAs
+
+-------------------------------------------------------------------

Old:
----
  tpm2-tss-3.1.0.tar.gz

New:
----
  tpm2-tss-3.2.0.tar.gz
  tpm2-tss-3.2.0.tar.gz.asc
  tpm2-tss.keyring

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ tpm2-0-tss.spec ++++++
--- /var/tmp/diff_new_pack.A1Bbgg/_old  2022-07-09 16:59:16.308457237 +0200
+++ /var/tmp/diff_new_pack.A1Bbgg/_new  2022-07-09 16:59:16.312457243 +0200
@@ -1,7 +1,7 @@
 #
 # spec file for package tpm2-0-tss
 #
-# Copyright (c) 2021 SUSE LLC
+# Copyright (c) 2022 SUSE LLC
 #
 # All modifications and additions to the file contributed by third parties
 # remain the property of their copyright owners, unless otherwise agreed
@@ -17,14 +17,17 @@
 
 
 Name:           tpm2-0-tss
-Version:        3.1.0
+Version:        3.2.0
 Release:        0
 Summary:        Intel's TCG Software Stack access libraries for TPM 2.0 chips
 License:        BSD-2-Clause
 Group:          Productivity/Security
 URL:            https://github.com/tpm2-software/tpm2-tss
 Source0:        
https://github.com/tpm2-software/tpm2-tss/releases/download/%{version}/tpm2-tss-%{version}.tar.gz
-Source2:        baselibs.conf
+Source1:        
https://github.com/tpm2-software/tpm2-tss/releases/download/%{version}/tpm2-tss-%{version}.tar.gz.asc
+# curl 
https://keyserver.ubuntu.com/pks/lookup?op=get&search=0xd6b4d8bac7e0cc97dcd4ac7272e88b53f7a95d84
 > tpm2-tss.keyring
+Source2:        tpm2-tss.keyring
+Source3:        baselibs.conf
 BuildRequires:  /usr/sbin/groupadd
 BuildRequires:  acl
 BuildRequires:  doxygen

++++++ tpm2-tss-3.1.0.tar.gz -> tpm2-tss-3.2.0.tar.gz ++++++
++++ 19177 lines of diff (skipped)

Reply via email to