libtspi1-0.3.14-lp151.4.7.1<>,4^\O/=„5ETU|T]tCv%.ש:5 I2{6!Skb}ad\i:Md,^YTzpD&3OxGk^~FZ?yW-{2&\EE_R(7NBs Vhf@L.=48aX2rVcx6W)IJS(:=gYŏáCC&Y<)@:deBL>'149ůaxË>@?d   T - F\}     4<d (J8T 9| :j >e@tFGHIXY\]^b cd\eafdlfuxvwxy$ zTdhnClibtspi10.3.14lp151.4.7.1TSS (TCG Software Stack) access daemon for a TPM chipThe trousers package provides a TSS implementation through the help of a user-space daemon, the tcsd, and a library Trousers aims to be compliant to the 1.1b and 1.2 TSS specifications as available from the Trusted Computing website http://www.trustedcomputinggroup.org/. The package needs the /dev/tpm device file to be present on your system. It is a character device file major 10 minor 224, 0600 tss:tss.^\Ocloud113topenSUSE Leap 15.1openSUSEBSD-3-Clausehttp://bugs.opensuse.orgProductivity/Securityhttp://trousers.sourceforge.net/linuxi586t^\G^\H3d16e638f596147f64763d51c4604362e8acabc7771cea1b8d9ff6bdfeef4dcdlibtspi.so.1.2.0rootrootrootroottrousers-0.3.14-lp151.4.7.1.src.rpmlibtspi.so.1libtspi1libtspi1(x86-32)@@@@@@@@@@@    /sbin/ldconfig/sbin/ldconfiglibc.so.6libc.so.6(GLIBC_2.0)libc.so.6(GLIBC_2.1)libc.so.6(GLIBC_2.1.2)libc.so.6(GLIBC_2.1.3)libc.so.6(GLIBC_2.3.4)libc.so.6(GLIBC_2.4)libcrypto.so.1.1libcrypto.so.1.1(OPENSSL_1_1_0)libpthread.so.0libpthread.so.0(GLIBC_2.0)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)trousers3.0.4-14.6.0-14.0-15.2-14.14.1^˳@][GXh@W,@U@U/@SS)R&Matthias Gerstner matthias.gerstner@suse.commatthias.gerstner@suse.commailaender@opensuse.orgjengelh@inai.decrrodriguez@opensuse.orgmpluskal@suse.commeissner@suse.commeissner@suse.commeissner@suse.com- fix a potential tss user to root privilege escalation when running tcsd (bsc#1164472). To do this run tcsd as the 'tss' user right away to prevent badly designed privilege drop and initialization code to run. - add bsc1164472.patch: additionally harden operation of tcsd when running as root. No longer follow symlinks in /var/lib/tpm. Drop gid to tss main group. require /etc/tcsd.conf to be owned by root:tss mode 0640.- Fix a local symlink attack problem with the %posttrans scriptlet (bsc#1157651, CVE-2019-18898). A rogue tss user could have used this attack to gain ownership of arbitrary files in the system during installation/update of the trousers package.- fix wrong installation of system.data.{auth,noauth} into /var/lib/tpm. These files are only sample files that *can* be used to fake that ownership was already taken by trousers, when other TPM stacks did that already. These files should not be there by default. Therefore install them into /usr/share/trousers instead, to allow the user to use them at his own discretion (fixes bsc#1111381). - implement a backup and restore logic for /var/lib/tpm/system.data.* to prevent removal of validly stored trousers state during update.- Update to version 0.3.14 (see ChangeLog) (FATE#321450)- Check for user/group existence before attempting to add them, and remove error suppression from these calls. - Avoid runtime dependency on systemd, the macros can all deal with its absence.- Force GNU inline semantics, fixes build with GCC5- Cleanup spec-file with spec-cleaner - Update prerequires - Use systemd unit file * replace tcsd.init with tcsd.service- updated to trousers 0.3.13 (bnc#881095 LTC#111124) - Changed exported functions which had a name too common, to avoid collision - Assessed daemon security using manual techniques and coverity - Fixed major security bugs and memory leaks - Added debug support to run tcsd with a different user/group - Daemon now properly closes sockets before shutting down * TROUSERS_0_3_12 - Added new network code for RPC, which supports IPv6 - Users of client applications can configure the hostname of the tcsd server they want to connect through the TSS_TCSD_HOSTNAME env var (only works if application didn't set a hostname in the context) - Added disable_ipv4 and disable_ipv6 config options for server - removed trousers-wrap_large_key_overflow.patch: upstream - removed trousers-0.3.11.2.diff: solved upstream now- trousers-wrap_large_key_overflow.patch: Do not wrap keys larger than 2048 bit, as the space on the TPM is limited to that amount. (bnc#868933)- Updated to trousers 0.3.11.2 - license changed to BSD-3-Clause - various bug and manpage fixes - trousers-0.3.10.diff renamed and rebased to trousers-0.3.11.2.diff/sbin/ldconfig/sbin/ldconfigcloud113 15905168150.3.14-lp151.4.7.10.3.14-lp151.4.7.1libtspi.so.1libtspi.so.1.2.0/lib/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:12745/openSUSE_Leap_15.1_Update/fb94ca4801ea98fa0f7c90ff96835d65-trousers.openSUSE_Leap_15.1_Updatedrpmxz5i586-suse-linuxELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=9703cb893f62ef716e9f9d32556db835fa7e6b33, stripped PRRRRRRR R R R R_MU?butf-841251bf890b40eb7b1c1e3c63da60900814ee0ef4437eabcbc02b272c8ec13d1?7zXZ !t/K]"k%{U}dQC>{u !dݣ1Siw8îr~C¡(`!VSs qMF2,@ ٪xȥDg@dw**CO6t. EyR_=/݀bBNiKu^~䙇Pv;3&X[wGqx}n ]MH_%lfg"f7^ 73{V\M|G5â-ZRr=ţ5Шɛ~zdZ9#n) "q&RMa缡_H6XTDža@hs^Fj 2;Ί0:x )+FcrAZtMn.Y}Q/\sܾtzȖFn.I .u2Y[By|dIe7oX2ڋ=Vi?׼Am1~.r9t#pJ"e̯T" j`a,WYܮ>ǕN~s6 Eu|h xvy廖2ƏNaZoX&3d *2#ZudOmU\^ĘE+q} ps/e<Y_*YϜjD"ś뒃tǠ [b~*>?Ϛ?ft ?-HR Iؚ0|]sQghX .12~N MUk]Q`!MA <6 C& FWk%Y QzHs+QBQH%*恾J r_οkۄPmAt);IYC(#&QC *\CKwVTJlζO?\ݍGܚ}k~U4\) tNrԭq>rE}Et"I {Hnb_=c} Cw)iDlVϵ1$+sK&\XT7b(-S|Ry)dvx~K3&?]{C3. YZ