tpm2.0-abrmd-2.0.2-lp151.4.6.1<>,G@^S/=„# K0ԧzK/N|J6NA1&mPyc(w"fJGZ3gb!aRz^`Kt٣$INH=TXQ޼lRRJ#mFJ{LA>Ny}mM). z×gCk*<5_ xC[|h$*jR=詔wWV}Wq1SKszMpg!W{Q۬Fe%Fds4m|{`HG ':b`YO&>I8?8d ! o$(48KTa z  @ t            5 v  hY(89:=2>2?2@2&F2.G2D H2x I2 X2Y2\3 ]34 ^3b4c5id5e6f6l6 u6 v6Pw7 x7 y8 z848D8H8r8t8|88Ctpm2.0-abrmd2.0.2lp151.4.6.1Intel's TCG Software Stack Access Broker & Resource Manager for TPM 2.0 chipsThe tpm2.0-abrmd package provides the TPM2 Access Broker & Resource Manager. This is a daemon service that coordinates requests to the TPM2 chip via Intel's TPM 2.0 software stack.^Scloud125HopenSUSE Leap 15.1openSUSEBSD-2-Clausehttp://bugs.opensuse.orgProductivity/Securityhttps://github.com/tpm2-software/tpm2-abrmdlinuxx86_64 test -n "$FIRST_ARG" || FIRST_ARG="$1" # disable migration if initial install under systemd [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$FIRST_ARG" -eq 1 ]; then for service in tpm2-abrmd.service ; do sysv_service="${service%.*}" touch "/var/lib/systemd/migrated/$sysv_service" || : done else for service in tpm2-abrmd.service ; do # The tag file might have been left by a preceding # update (see 1059627) rm -f "/run/rpm-tpm2.0-abrmd-update-$service-new-in-upgrade" if [ ! -e "/usr/lib/systemd/system/$service" ]; then touch "/run/rpm-tpm2.0-abrmd-update-$service-new-in-upgrade" fi done for service in tpm2-abrmd.service ; do sysv_service="${service%.*}" if [ -e /var/lib/systemd/migrated/$sysv_service ]; then continue fi if [ ! -x /usr/sbin/systemd-sysv-convert ]; then continue fi /usr/sbin/systemd-sysv-convert --save $sysv_service || : done fi test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$YAST_IS_RUNNING" != "instsys" -a -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi if [ "$FIRST_ARG" -eq 1 ]; then if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl preset tpm2-abrmd.service || : fi elif [ "$FIRST_ARG" -gt 1 ]; then for service in tpm2-abrmd.service ; do if [ ! -e "/run/rpm-tpm2.0-abrmd-update-$service-new-in-upgrade" ]; then continue fi rm -f "/run/rpm-tpm2.0-abrmd-update-$service-new-in-upgrade" if [ ! -x /usr/bin/systemctl ]; then continue fi /usr/bin/systemctl preset "$service" || : done for service in tpm2-abrmd.service ; do sysv_service=${service%.*} if [ -e /var/lib/systemd/migrated/$sysv_service ]; then continue fi if [ ! -x /usr/sbin/systemd-sysv-convert ]; then continue fi /usr/sbin/systemd-sysv-convert --apply $sysv_service || : touch /var/lib/systemd/migrated/$sysv_service || : done fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -eq 0 -a -x /usr/bin/systemctl ]; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable tpm2-abrmd.service || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_STOP_ON_REMOVAL" && . /etc/sysconfig/services test "$DISABLE_STOP_ON_REMOVAL" = yes -o \ "$DISABLE_STOP_ON_REMOVAL" = 1 && exit 0 /usr/bin/systemctl stop tpm2-abrmd.service ) || : fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -ge 1 ]; then # Package upgrade, not uninstall if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_RESTART_ON_UPDATE" && . /etc/sysconfig/services test "$DISABLE_RESTART_ON_UPDATE" = yes -o \ "$DISABLE_RESTART_ON_UPDATE" = 1 && exit 0 /usr/bin/systemctl try-restart tpm2-abrmd.service ) || : fi else # package uninstall for service in tpm2-abrmd.service ; do sysv_service="${service%.*}" rm -f "/var/lib/systemd/migrated/$sysv_service" || : done if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi fi"]3 E)(큤A큤^S^S^S^S^S^S[;[;[;[,b[;^S^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.0-abrmd-2.0.2-lp151.4.6.1.src.rpmconfig(tpm2.0-abrmd)tpm2.0-abrmdtpm2.0-abrmd(x86-64) @@@@@@@@@@@@    /bin/sh/bin/sh/bin/sh/bin/shconfig(tpm2.0-abrmd)libc.so.6()(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libdl.so.2()(64bit)libdl.so.2(GLIBC_2.2.5)(64bit)libgio-2.0.so.0()(64bit)libglib-2.0.so.0()(64bit)libgobject-2.0.so.0()(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.2.5)(64bit)libtss2-sys.so.0()(64bit)pwdutilsrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)tpm2-0-tss2.0.2-lp151.4.6.13.0.4-14.6.0-14.0-15.2-14.14.1^@]}@[Ѱ@[ @[t[[m~@[;e@[:[6@ZZ ,@YKYYp@Matthias Gerstner mgerstner matthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.com- 0001-build-disable-unloading-of-libtss2-tcti-tabrmd.so.patch: fix bsc#1166936 a segmentation fault when the libtcti-tabrmd library is unloaded and loaded again. This caused a crash in the context of the tpm2-tss-engine.- fix_dlopen.patch: remove this patch to fix tcti loading using shorthand names like `--tcti=mssim`. Upstream already has an appropriate patch included in the packaged version that works for both shorthand and full version specificaton (bsc#1159176).- add a Requires towards tpm2-0-tss, because that main package holds the udev rules and logic for setting up the tss user. Without this the daemon can't start up correctly.- fix broken build due to newer glib dependency that reports a full path for gdbus-codegen, breaking the configure check.- update to version 2.0.2 (FATE#326270): - --enable-integration option to configure script now works as documented. - Format specifier with wrong size in util module. - Initialize TCTI context to 0 before setting values. This will cause all members that aren't explicitly initialized by be 0.- add recommends to the tcti-device and tcti-abrmd. Otherwise they're not installed right away, rendering the abrmd quite unusable.- Update to version 2.0.1: * SessionList: Fix Connection object reference leak. * source/sink: Organize ControlMessage processing. * CommandSource: Replace 'connection-removed' signal with ControlMessage. * SessionList: Remove all locking. * ConnectionManager: Remove 'connection-removed' signal. * ci: Build 'check' target when CC is gcc. * build: Fix bad URLs in configure script. * CHANGELOG.md: Add version number and date for 2.0.1 release. * Replace references to drand48_r family of functions for portability * Fix for type-punned pointer reported in newer compilers that enforce strict aliasing- Trying to fix build on older distros that fail because of a missing or broken autoconf valgrind detection macro. Removing autoreconf to hopefully fix this.- add fix_dlopen.patch: fixes an issue with dlopen()'ing the tcti-device library from tpm2-0-tss. See https://github.com/tpm2-software/tpm2-abrmd/issues/486.- update to major version 2.0.0: - support_dbus_activation.diff: removed, is not contained upstream - the tpm2 stack introduces an incompatible ABI to the previous version with this update. There is no compatibility layer, libraries have new names etc. - upstream changelog: [#]# 2.0.0 - 2018-06-22 [#]## Added - Integration test script and build support to execute integration tests against a physical TPM2 device on the build platform. - Implementation of dynamic TCTI initialization mechanism. - configure option `--enable-integration` to enable integration tests. The simulator executable must be on PATH. - Support for version 2.0 of tpm2-tss libraries. [#]## Changed - 'max-transient-objects' command line option renamted to 'max-transients'. - Added -Wextra for more strict checks at compile time. - Install location of headers to $(includedir)/tss2. [#]## Fixed - Added missing checks for NULL parameters identified by the check-build. - Bug in session continuation logic. - Off by one error in HandleMap. - Memory leak and uninitialized variable issues in unit tests. [#]## Removed - Command line option --fail-on-loaded-trans. - udev rules for TPM device node. This now lives in the tpm2-tss repo. - Remove legacy TCTI initialization functions. - configure option `--with-simulatorbin`. [#]# 1.3.1 - 2018-03-18 [#]## Fixed - Distribute systemd preset template instead of the generated file. [#]# 1.3.0 - 2018-03-02 [#]## Added - New configure option (--test-hwtpm) to run integration tests against a physical TPM2 device on the build platform. - Install systemd service file to allow on-demand systemd unit activation. [#]## Changed - Converted some inappropriate uses of g_error to critical / warning instead. - Removed use of gen_require from SELinux policy, use dbus_stub instead. - udev rules now give tss group read / write access to the TPM device node. - udev rules now give tss user and group read / write access to kernel RM node. [#]## Fixed - Memory leak on an error path in the AccessBroker.- update to upstream version 1.2.0: - Limit maximum number of active sessions per connection with '--max-sessions'. - Flush all transient objects and sessions on daemon start with '--flush-all'. - Allow passing of sessions across connections with ContextSave / Load. - Unref the GUnixFDList returned by GIO / dbus in the TCTI init function. This fixes a memory leak in the TCTI library. - correctly trigger udev to update /dev/tpm* permissions after package installation. (bnc#1078687) - prepared support_dbus_activation.diff patch which adds D-Bus activation, but can't use it yet due to rpmlint- fix_service_paths.diff: fixed broken systemd service unit (bnc#1066123). the service unit file in the upstream distribution tarball is already configured and looks for binaries and configuration files in the /usr/local prefix which is wrong.- package version symlink correctly, belongs into the lib package itself, not the -devel.- update to upstream version 1.1.1 which fixes some local denial-of-service security issues among other things: - Replace use of sigaction with g_unix_signal_* stuff from glib. - Rewrite of INSTALL.md including info on custom configure script options. - Default value for --with-simulatorbin configure option has been removed. New default behavior is to disable integration tests. - CommandSource will no longer reject commands without parameters. - Unit tests updated to use cmocka v1.0.0 API. - Integration tests now run daemon under valgrind memcheck and fail when errors are found. - CommandSource now tracks max FD in set of client FDs to prevent unnecessary iterations over FD_SETSIZE fds. - no longer call bootstrap and switch to the release upstream tarball which has now been fixed to contain all necessary files- first version of the new arbmd resource manager from Intel's tpm2 stack. This will replace the old resourcemgr previously shipped with the tpm2-0-tss package./bin/sh/bin/sh/bin/sh/bin/shcloud125 1588155325 2.0.2-lp151.4.6.12.0.2-lp151.4.6.12.0.2-lp151.4.6.1tpm2-abrmd.conftpm2-abrmd.servicerctpm2-abrmdtpm2-abrmdcom.intel.tss2.Tabrmd.servicetpm2.0-abrmdCHANGELOG.mdCONTRIBUTING.mdINSTALL.mdLICENSEREADME.mdtss2-tcti-tabrmd.7.gztpm2-abrmd.8.gz/etc/dbus-1/system.d//usr/lib/systemd/system//usr/sbin//usr/share/dbus-1/system-services//usr/share/doc/packages//usr/share/doc/packages/tpm2.0-abrmd//usr/share/man/man7//usr/share/man/man8/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:12488/openSUSE_Leap_15.1_Update/b44159a5c7139b8c9d54b70597d89bc5-tpm2.0-abrmd.openSUSE_Leap_15.1_Updatedrpmxz5x86_64-suse-linuxexported SGML document, ASCII textASCII textELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/l, BuildID[sha1]=77c6047d6571065683ebf4550b931a0587076d3e, for GNU/Linux 3.2.0, strippeddirectorytroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix) R RRRRR R R RR RR9UY+Ylibtss2-tcti-device0libtss2-tcti-tabrmd0utf-853a671a28937082f50e2195b78554301ccac4602a319a164457652a3b85e6602?p7zXZ !t/ o]"k%>6"0KMq.B"e_0;R%mH-cOk"Zs_#^cn"HEJ(Tbpc8kLr*mAS{e׀$ž9cN(p 5XaեenʨT4iP#;"cgH+Ng[~*%dPn%72M$gA̤9;9 ew$Fo>Uҥe䃎MԚF%cNYK'w,qF Y%R_ڂ .NL:c+CS\]BDMލme_](yO!&kߡ]/KGoVSzMʦmNS`Hyuo[0 )/z{ 駑Juf !$ZDz\NTM$hXF]RB)2Kq{ß#0y1<:߿baf {C{4 } Pѡ(!1$4m*O|,v&%љ6rAɹ'j 2D !9I-#~yd/AjҟVEÒɿ .Ht<{ dg[ LO/XCa:GdMd',LiyѸMۗ/6#=JppSnodcGg& Nyj|/4wjZؠY]4'Hujo[Q3 M;VJ[-b֩Oƶ5qu< OOoO> \UV`/n _I8+o ۭuwS߹l"i2ҿKW}U9Y9R5o¿Eh=-it= H˜J>XЎZDH2<[EtI#ڙM/A\bNg^ Џzi (a `3..*7S #iٕHBgZ,/ɫ)(R|D[`nMP!ު=S=/\\TXPXhYsY1Azҙp9$Ol>@0IWvnYyhcȢƲFe; `7Mzfs#* 3$U%xO RSKI:I\Hl؈#v7{+P@x5,v˘(kY8i+0ְٖ;!R}V:"MS)QG$5PۚAaKxw63^d/P;]4(@#1}+5_IN Q8FL`&v@}0]2i '4z =nk{ְ%ML`]Y0^67~X'Ud[re_ڐ]9!xYvx/\?b/믔@d/2$^1'4 Xk]4kJ*f%$we=ҦryxԎ 3]"\p.I0F>"e6"'Rvie1l7GG4P2iFMhF<@~z Ӳ`vӍtRD{q ey֫Q`ax7x,}7IYDo!*e ǘWQ?0ަb#Yelܛvd||W\=FvE2 sT `!wۧytWl觲A[f?S-(e\;&dCy>c7ΖK)(H/vzv"n 42+QX|: Bsۨy5J*!w