Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package tpm2.0-tools for openSUSE:Factory 
checked in at 2022-12-10 21:17:41
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/tpm2.0-tools (Old)
 and      /work/SRC/openSUSE:Factory/.tpm2.0-tools.new.1835 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "tpm2.0-tools"

Sat Dec 10 21:17:41 2022 rev:36 rq:1041885 version:5.4

Changes:
--------
--- /work/SRC/openSUSE:Factory/tpm2.0-tools/tpm2.0-tools.changes        
2022-07-14 16:33:33.488587695 +0200
+++ /work/SRC/openSUSE:Factory/.tpm2.0-tools.new.1835/tpm2.0-tools.changes      
2022-12-10 21:17:58.501607951 +0100
@@ -1,0 +2,189 @@
+Thu Dec  8 12:51:17 UTC 2022 - Alberto Planas Dominguez <apla...@suse.com>
+
+- Update to version 5.4
+  + Added:
+    * tpm2_policyrestart: Added option --cphash to output the cpHash
+      for the command PM2_CC_PolicyRestart.
+    * tpm2_policynvwritten: Added option --cphash to output the cpHash
+      for the command TPM2_CC_PolicyNvWritten.
+    * tpm2_policylocality: Added option --cphash to output the cpHash
+      for the command TPM2_CC_PolicyLocality.
+    * tpm2_policycountertimer: Added option --cphash to output the
+      cpHash for the command TPM2_CC_PolicyCounterTimer.
+    * tpm2_policycommandcode: Added option --cphash to output the
+      cpHash for the command TPM2_CC_PolicyCommandCode.
+    * tpm2_policypassword: Added option --cphash to output the cpHash
+      for the command TPM2_CC_PolicyPassword.
+    * tpm2_policyauthvalue: Added option --cphash to output the cpHash
+      for the command TPM2_CC_PolicyAuthValue.
+    * tpm2_policyauthorize: Added option --cphash to output the cpHash
+      for the command TPM2_CC_PolicyAuthorize.
+    * tpm2_print: Support printing serialized ESYS_TR's
+    * tpm2_create: Add a clarifying message to usage of -c when
+      TPM2_CreateLoaded is not supported.
+    * tpm2_getcap: Add support for vendor agnostic
+      capabilites. Requires tpm2-tss version 4.0 and higher to enable.
+    * Add a script, check_endorsement_cert.sh, to validate the
+      endorsement certificate chain. It takes two inputs - A
+      TPM2B_PUBLIC format EKpublic and a PEM format EKcertificate
+      specified in that order as arguments.
+
+- Update to version 5.3
+  +  Features:
+    * lib/tpm2_tool.c: add --help=no-man for tpm2 option. Prior to
+      this change the tool parsed no-man as an unrecognized option and
+      errored out. Now it lists all the available tool options.
+    * tpm2_encodeobject: New tool to encode TPM2 object. It takes
+      public and private portions of an object and encode them in a
+      combined PEM form called tssprivkey used by tpm2-tss-engine and
+      other applications.
+    * Support alternative ECC curves for which default EK templates
+      exist (NIST_P256, NIST_P384, NIST_P521, and SM2_P256).
+    * tools/misc/tpm2_checkquote: add sm2 verification of signature.
+    * crypto: support the TPM2_ECC_SM2_P256 curveID.
+    * fapi: add new command to enable the use of fapi objects for tpm2
+      tools. The new command tss2_gettpm2object was added. With this
+      command context files which can be used for tpm2 tool commands
+      can be created.
+    * Support for sign and verify with sm2 algorithms.
+    * tools/tpm2_startauthsession: add sym-algorithm argument for
+      supported symmetric algorithm.
+    * Attestation (certify, command audit, sessionaudit and quote):
+      add scheme argument for supported signature schemes. This also
+      enable support for SM signing.
+    * tpm2_flushcontext: support all options at a time. Support the
+      -t/-l/-s options all at once so folks don't have to call it
+      multiple times.
+    * tools/tpm2_nvread: add human readable output for NV content
+      Enable parsing and YAML-style output for the different NV index
+      types.
+    * New event types in tpm2_eventlog:
+      EV_EFI_PLATFORM_FIRMWARE_BLOB2, EV_EFI_HANDOFF_TABLES2,
+      EV_EFI_VARIABLE_BOOT2
+    * VERSION: add version file - Generate the version file with
+      bootstrap and include in the DIST tarball so endusers can call
+      autoreconf on a dist tarball which doesn't have git. This
+      alleviates git describe errors on release tarballs in the
+      autoreconf case.
+    * import: support restricted parents - Support a restricted parent
+      with an aes128cfb symmetric parameter.
+    * tpm2_load - Added capability to load pem files in
+      TSS2-Private-Key format for interoperability with
+      tpm2-tss-engine, tpm2-openssl provider tpm2-pkcs11, and
+      tpm2-pytss.
+    * tpm2_print - Added capability to parse out and print the public
+      portion of a TSS Private Key in the PEM format with the arg
+      option TSSPRIVKEY_OBJ.
+    * tpm2_loadexternal: Added support to tpm2_loadexternal for
+      parsing and loading the public portion of a TSS2 Privkey PEM
+      file. The path to the PEM file must be specified using the -r
+      option while skipping the -G option for key type.
+    * Support added for calculating cpHash, rpHash, sessions for
+      parameter encryption and auditing in: tpm2_nvwrite,
+      tpm2_nvcertify, tpm2_nvincrement, tpm2_nvwritelock,
+      tpm2_nvreadlock, tpm2_nvundefine and tpm2_nvreadpublic.
+    * Support added for calculating cpHash in: tpm2_clear,
+      tpm2_dictionarylockout, tpm2_clearcontrol, tpm2_sign,
+      tpm2_setprimarypolicy, tpm2_setclock, tpm2_rsadecrypt,
+      tpm2_duplicate, tpm2_clockrateadjust, tpm2_createprimary,
+      tpm2_quote, tpm2_policysecret, tpm2_policynv,
+      tpm2_policyauthorizenv, tpm2_import, tpm2_hmac,
+      tpm2_hierarchycontrol, tpm2_load, tpm2_gettime,
+      tpm2_evictcontrol, tpm2_encryptdecrypt, tpm2_getpolicydigest,
+      tpm2_loadexternal, tpm2_commit, tpm2_ecdhkeygen, tpm2_ecdhzgen,
+      tpm2_ecephemeral, tpm2_geteccparameters, tpm2_flushcontext,
+      tpm2_pcrallocate, tpm2_pcrevent, tpm2_pcrreset, tpm2_pcrread.
+    * Support for using tcti=none for cpHash calculations to avoid
+      invoking checks for active TPM in: tpm2_nvreadpublic,
+      tpm2_nvundefine, tpm2_nvreadlock, tpm2_nvwritelock,
+      tpm2_nvincrement, tpm2_nvcertify, tpm2_nvdefine, tpm2_nvwrite.
+  + Known issue:
+    * FAPI tools will not work on 32bit user-static qemu on 64bit host
+      because readdir returns NULL. Follow the issue on
+      https://gitlab.com/qemu-project/qemu/-/issues/263
+  + Bug fixes:
+    * tools/tpm2_pcrreset.c: fix build errors in 32bit systems.
+    * Fix tssprivkey formatted PEM generation and load errors on 32
+      bit systems.
+    * CI: Add testing of 32bit systems with multiarch/qemu-user-static
+      containers.
+    * tools/tpm2_evictcontrol: fix for calls to Esys_TR_Close on bad
+      handles.
+    * tools/tpm2_nvextend: fix for ESYS_TR handle not being used in
+      calculating the object name.
+    * tools/tpm2_nvwrite, tools/tpm2_nvread: Policy authorization must
+      be re-instantiated on each iteration of the read/ write when
+      size exceeds the allowed operating size
+      (TPM2_PT_NV_BUFFER_MAX). However, information on the compounded
+      policies cannot be retrieved from the only policy digest read
+      from the session and hence the session cannot be
+      re-instantiated. To avoid this scenario only a single iteration
+      is allowed when policy authorization is in use.
+    * Fix argument parsing in tpm2_policylocality to fix an issue
+      causing almost always to generate PolicyLocality(0). There was a
+      logical inversion that caused almost any argument (including
+      invalid ones) to be interpreted as zero, except “zero" would be
+      interpreted as one.
+    * test/fapi/fapi-quote-verify.sh Fix check of qualifying
+      data. Because of a bug in Fapi_VerifyQuote the qualifying data
+      was not checked correctly. Errors that were not recognized
+      before occur now. The order of the tests was cleaned up and for
+      every quote and verify quote now the correct combination of the
+      qualifying data and quote info containing the nonce is used.
+    * tpm2_nvdefine: set TPMA_NV_PLATFORMCREATE when authenticating
+      with the platform hierarchy.
+    * tools/tpm2_getekcertificate: fixed the url link to
+      ekop.intel.com. There were two places where the fix was needed:
+      o In the tool source code where a forward slash was always
+        appended irrespective of it already being part of the link
+        specified by the user and
+      o In the integration test where curl tests the link to the
+        ekop.intel.com backend. It now requires the full link to
+        include the base64 encoded ek pub hash.
+    * tools/tpm2_tool.c: Fix an issue where LOG_WARN is always
+      displayed Despite setting the 'quiet' flag with -Q.
+    * fapi: fix usage of parameter pcrLog for tss2_quote. pcrLog is an
+      optional parameter. If pcrLog is not used as parameter currently
+      the pcr log is still calculated in Fapi_Quote. To avoid this
+      calculation a NULL pointer will be passed to Fapi_Quote if the
+      parameter pcrLog is not passed. So tss2_quote can be executed
+      for a user which has no access rights to the files with the
+      system measurements.
+    * import: fix bug on using scheme wherein if scheme is specified
+      in the template, the openssl load functions clobber the scheme
+      value and set it to TPM2_ALG_NULL.
+    * tools/tpm2_sign and tpm2_verifysignature: fix sm2 sign and
+      verifysignature bugs : (1.) sm2 sign could not get output
+      signature. (2.) sm2 verify tss format signature failed.
+    * lib/tpm2.c: added workaround for a system api bug where in the
+      flush handle is erroneously placed in the handle area instead of
+      the parameter area.
+    * nvreadpublic: drop ntoh on attributes The attributes get
+      marshalled to correct endianess by libmu and don’t need to be
+      changed again.
+    * Removing unused '-i' option from tpm2_print
+    * tpm2_policyor: fix unallocated policy list The TPML_DIGEST
+      policy list was calloc'd for some reason, however it could just
+      be statically allocated in the context. The side effect is that
+      when no options or arguments were given a NPD occured when
+      checking the count of the policy list.
+    * tools/tpm2_certify: fix man page for short options and add tests
+      The short options for the signing-key-auth and
+      certified-key-auth were swapped. The case fix in the man page
+      makes it less intuitive but have to go through with the change
+      so that we don't break any existing scripts. This change does
+      not affect the long options. Tests have been added to ensure the
+      functionality.
+  + CI:
+    * ci: add ubuntu-22.04. This also requires the min tpm2-tss
+      version to be at 3.2.0 to support the openSSL major version 3.
+    * cirrus.yml: update freebsd version to 13.1
+    * .ci/download-deps.sh: update tpm2-abrmd dependency version to
+      2.4.1
+- Drop 0001-tests-getekcertificate.sh-Skip-the-test-if-curl-is-n.patch
+  (merged)
+- Drop add_missing_shut_down_call_on_cleanup.patch (merged)
+- Drop fix_check_of_qualifying_data.patch (merged)
+- Add echo_tcti_call_python3_binary.patch (upstreamed)
+
+-------------------------------------------------------------------

Old:
----
  0001-tests-getekcertificate.sh-Skip-the-test-if-curl-is-n.patch
  add_missing_shut_down_call_on_cleanup.patch
  fix_check_of_qualifying_data.patch
  tpm2-tools-5.2.tar.gz
  tpm2-tools-5.2.tar.gz.asc

New:
----
  echo_tcti_call_python3_binary.patch
  tpm2-tools-5.4.tar.gz
  tpm2-tools-5.4.tar.gz.asc

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ tpm2.0-tools.spec ++++++
--- /var/tmp/diff_new_pack.UMhX3R/_old  2022-12-10 21:17:59.185611951 +0100
+++ /var/tmp/diff_new_pack.UMhX3R/_new  2022-12-10 21:17:59.189611974 +0100
@@ -17,14 +17,9 @@
 
 
 %define _lto_cflags %{nil}
-%ifarch %{ix86} x86_64 aarch64 %{arm} ppc64le
 %bcond_without  test
-%else
-# ppc ppc64 s390x
-%bcond_with     test
-%endif
 Name:           tpm2.0-tools
-Version:        5.2
+Version:        5.4
 Release:        0
 Summary:        Trusted Platform Module (TPM) 2.0 administration tools
 License:        BSD-3-Clause
@@ -35,12 +30,8 @@
 # git show william-roberts-pub javier-martinez-pub joshua-lock-pub idesai-pub 
> tpm2-tools.keyring
 Source2:        tpm2-tools.keyring
 Patch0:         fix_bogus_warning.patch
-# PATCH-FIX-UPSTREAM 
0001-tests-getekcertificate.sh-Skip-the-test-if-curl-is-n.patch -- based on 
PR#3041
-Patch1:         0001-tests-getekcertificate.sh-Skip-the-test-if-curl-is-n.patch
-# PATCH-FIX-UPSTREAM add_missing_shut_down_call_on_cleanup.patch -- based on 
PR#3047
-Patch2:         add_missing_shut_down_call_on_cleanup.patch
-# PATCH-FIX-UPSTREAM fix_check_of_qualifying_data.patch -- already merged
-Patch3:         fix_check_of_qualifying_data.patch
+# PATCH-FIX-UPSTREAM add_missing_shut_down_call_on_cleanup.patch -- based on 
PR#3176
+Patch1:         echo_tcti_call_python3_binary.patch
 BuildRequires:  gcc-c++
 BuildRequires:  libcurl-devel
 BuildRequires:  libopenssl-devel
@@ -97,8 +88,8 @@
 find %{buildroot} -type f -name "*.la" -delete -print
 
 %files
-%doc doc/README.md doc/CHANGELOG.md
-%license doc/LICENSE
+%doc docs/README.md docs/CHANGELOG.md
+%license docs/LICENSE
 %{_bindir}/tpm2*
 %{_bindir}/tss2*
 %{_mandir}/man1/tpm2*

++++++ echo_tcti_call_python3_binary.patch ++++++
>From d191b1f3cd66e9334d000c622bc6cc4bdc63304e Mon Sep 17 00:00:00 2001
From: Alberto Planas <apla...@suse.com>
Date: Thu, 8 Dec 2022 15:23:50 +0100
Subject: [PATCH] echo_tcti: call python3 binary

Most distributions are now in Python3.  The binary for Python3 is still
called `python3`.

Signed-off-by: Alberto Planas <apla...@suse.com>
---
 test/scripts/echo_tcti.py | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/test/scripts/echo_tcti.py b/test/scripts/echo_tcti.py
index 3e4c1f462..325e35315 100755
--- a/test/scripts/echo_tcti.py
+++ b/test/scripts/echo_tcti.py
@@ -1,4 +1,4 @@
-#!/usr/bin/env python
+#!/usr/bin/env python3
 
 #
 # This TCTI is designed to use with the subprocess TCTI and echo the contents

++++++ tpm2-tools-5.2.tar.gz -> tpm2-tools-5.4.tar.gz ++++++
++++ 52744 lines of diff (skipped)

Reply via email to