trousers-0.3.14-lp151.4.7.1<>,Zԉ^\Z/=„ :Q{UZCU 6 j6Y6,lKׂ̀kd1]#}Q:ط]4gP|}[<ȺoWЛ5B"qQY=.DTwNmPo/$]]\Po:yhFݢ%t\1H'Mv ,㖲.P໣} _/wJl@[ 63[oB=na_I{6)TIGjq"IWjŨ .ƞ <$tG'Ϩw$t׈'>H4?4pd   T$1 J` , X   r U@l(=8D 9l :Z =(U>(]?(e@(mF(uG(H(I)@X)XY)d\)])^+ b+c,d-e-f-"l-$u-8v-w/x/ty/z//44 4$4*4lCtrousers0.3.14lp151.4.7.1TSS (TCG Software Stack) access daemon for a TPM chipThe trousers package provides a TSS implementation through the help of a user-space daemon, the tcsd, and a library Trousers aims to be compliant to the 1.1b and 1.2 TSS specifications as available from the Trusted Computing website http://www.trustedcomputinggroup.org/. The package needs the /dev/tpm device file to be present on your system. It is a character device file major 10 minor 224, 0600 tss:tss.^\Zobs-power8-03'openSUSE Leap 15.1openSUSEBSD-3-Clausehttp://bugs.opensuse.orgProductivity/Securityhttp://trousers.sourceforge.net/linuxppc64le/usr/bin/getent group tss >/dev/null || /usr/sbin/groupadd -g 98 tss || : /usr/bin/getent passwd tss >/dev/null || \ /usr/sbin/useradd -u 98 -o -g tss -s /bin/false -c "TSS daemon" \ -d /var/lib/tpm tss || : test -n "$FIRST_ARG" || FIRST_ARG="$1" # disable migration if initial install under systemd [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$FIRST_ARG" -eq 1 ]; then for service in tcsd.service ; do sysv_service="${service%.*}" touch "/var/lib/systemd/migrated/$sysv_service" || : done else for service in tcsd.service ; do # The tag file might have been left by a preceding # update (see 1059627) rm -f "/run/rpm-trousers-update-$service-new-in-upgrade" if [ ! -e "/usr/lib/systemd/system/$service" ]; then touch "/run/rpm-trousers-update-$service-new-in-upgrade" fi done for service in tcsd.service ; do sysv_service="${service%.*}" if [ -e /var/lib/systemd/migrated/$sysv_service ]; then continue fi if [ ! -x /usr/sbin/systemd-sysv-convert ]; then continue fi /usr/sbin/systemd-sysv-convert --save $sysv_service || : done fi test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$YAST_IS_RUNNING" != "instsys" -a -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi if [ "$FIRST_ARG" -eq 1 ]; then if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl preset tcsd.service || : fi elif [ "$FIRST_ARG" -gt 1 ]; then for service in tcsd.service ; do if [ ! -e "/run/rpm-trousers-update-$service-new-in-upgrade" ]; then continue fi rm -f "/run/rpm-trousers-update-$service-new-in-upgrade" if [ ! -x /usr/bin/systemctl ]; then continue fi /usr/bin/systemctl preset "$service" || : done for service in tcsd.service ; do sysv_service=${service%.*} if [ -e /var/lib/systemd/migrated/$sysv_service ]; then continue fi if [ ! -x /usr/sbin/systemd-sysv-convert ]; then continue fi /usr/sbin/systemd-sysv-convert --apply $sysv_service || : touch /var/lib/systemd/migrated/$sysv_service || : done fi /usr/bin/udevadm trigger -s tpm || : # bsc#1164472: adjust potential root ownership to allow tcsd to open the file # as unprivileged user. Be careful not to follow a symlink target. system_data=/var/lib/tpm/system.data if [ -e "${system_data}" ]; then chown --no-dereference tss:tss /var/lib/tpm/system.data fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -eq 0 -a -x /usr/bin/systemctl ]; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable tcsd.service || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_STOP_ON_REMOVAL" && . /etc/sysconfig/services test "$DISABLE_STOP_ON_REMOVAL" = yes -o \ "$DISABLE_STOP_ON_REMOVAL" = 1 && exit 0 /usr/bin/systemctl stop tcsd.service ) || : fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -ge 1 ]; then # Package upgrade, not uninstall if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_RESTART_ON_UPDATE" && . /etc/sysconfig/services test "$DISABLE_RESTART_ON_UPDATE" = yes -o \ "$DISABLE_RESTART_ON_UPDATE" = 1 && exit 0 /usr/bin/systemctl try-restart tcsd.service ) || : fi else # package uninstall for service in tcsd.service ; do sysv_service="${service%.*}" rm -f "/var/lib/systemd/migrated/$sysv_service" || : done if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi fi.W"#]~^^A큤A큤A^\T^\T^\T^\V^\T^\WX<X<S4S4S4S4X<S4S4S4^\S^\S^\TS4S4^\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-0.3.14-lp151.4.7.1.src.rpmconfig(trousers)trouserstrousers(ppc-64) @@@@@@    /bin/sh/bin/sh/bin/sh/bin/sh/bin/shconfig(trousers)libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.17)(64bit)pwdutilsrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)0.3.14-lp151.4.7.13.0.4-14.6.0-14.0-15.2-14.14.1^˳@][GXh@W,@U@U/@SS)R&Matthias Gerstner matthias.gerstner@suse.commatthias.gerstner@suse.commailaender@opensuse.orgjengelh@inai.decrrodriguez@opensuse.orgmpluskal@suse.commeissner@suse.commeissner@suse.commeissner@suse.com- fix a potential tss user to root privilege escalation when running tcsd (bsc#1164472). To do this run tcsd as the 'tss' user right away to prevent badly designed privilege drop and initialization code to run. - add bsc1164472.patch: additionally harden operation of tcsd when running as root. No longer follow symlinks in /var/lib/tpm. Drop gid to tss main group. require /etc/tcsd.conf to be owned by root:tss mode 0640.- Fix a local symlink attack problem with the %posttrans scriptlet (bsc#1157651, CVE-2019-18898). A rogue tss user could have used this attack to gain ownership of arbitrary files in the system during installation/update of the trousers package.- fix wrong installation of system.data.{auth,noauth} into /var/lib/tpm. These files are only sample files that *can* be used to fake that ownership was already taken by trousers, when other TPM stacks did that already. These files should not be there by default. Therefore install them into /usr/share/trousers instead, to allow the user to use them at his own discretion (fixes bsc#1111381). - implement a backup and restore logic for /var/lib/tpm/system.data.* to prevent removal of validly stored trousers state during update.- Update to version 0.3.14 (see ChangeLog) (FATE#321450)- Check for user/group existence before attempting to add them, and remove error suppression from these calls. - Avoid runtime dependency on systemd, the macros can all deal with its absence.- Force GNU inline semantics, fixes build with GCC5- Cleanup spec-file with spec-cleaner - Update prerequires - Use systemd unit file * replace tcsd.init with tcsd.service- updated to trousers 0.3.13 (bnc#881095 LTC#111124) - Changed exported functions which had a name too common, to avoid collision - Assessed daemon security using manual techniques and coverity - Fixed major security bugs and memory leaks - Added debug support to run tcsd with a different user/group - Daemon now properly closes sockets before shutting down * TROUSERS_0_3_12 - Added new network code for RPC, which supports IPv6 - Users of client applications can configure the hostname of the tcsd server they want to connect through the TSS_TCSD_HOSTNAME env var (only works if application didn't set a hostname in the context) - Added disable_ipv4 and disable_ipv6 config options for server - removed trousers-wrap_large_key_overflow.patch: upstream - removed trousers-0.3.11.2.diff: solved upstream now- trousers-wrap_large_key_overflow.patch: Do not wrap keys larger than 2048 bit, as the space on the TPM is limited to that amount. (bnc#868933)- Updated to trousers 0.3.11.2 - license changed to BSD-3-Clause - various bug and manpage fixes - trousers-0.3.10.diff renamed and rebased to trousers-0.3.11.2.diff/bin/sh/bin/sh/bin/sh/bin/shobs-power8-03 1590516826 0.3.14-lp151.4.7.10.3.14-lp151.4.7.10.3.14-lp151.4.7.1 tcsd.conftcsd.service91-trousers.rulesrctcsdtcsdtrousersAUTHORSChangeLogLICENSELTC-TSS_LLD_08_r2.pdfLTC-TSS_LLD_08_r2.sxwNICETOHAVESREADMEREADME.selinuxTODOTSS_programming_SNAFUs.txttcsd.conf.5.gztcsd.8.gztrouserssystem.data.authsystem.data.noauthtpm/etc//usr/lib/systemd/system//usr/lib/udev/rules.d//usr/sbin//usr/share/doc/packages//usr/share/doc/packages/trousers//usr/share/man/man5//usr/share/man/man8//usr/share//usr/share/trousers//var/lib/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:12745/openSUSE_Leap_15.1_Update_ports/fb94ca4801ea98fa0f7c90ff96835d65-trousers.openSUSE_Leap_15.1_Updatedrpmxz5ppc64le-suse-linuxASCII textELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/l, BuildID[sha1]=395b410792791e37c59793c576245b240fd45e91, for GNU/Linux 3.10.0, strippeddirectoryASCII text, with no line terminators (OpenOffice.org 1.x Writer document)troff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)R R RR RR-l&cS0# this scriplet and the counterpart in %posttrans work around a packaging bug # that was present in all trousers packages since around 2008 until 2018. # /var/lib/tpm/system.data.* was wrongly packaged as runtime state data # instead of package resource data in /usr/share. After removal of these files # from packaging, during updating they will be deleted. Since users could have # created their own versions of the files already (by taking ownership of a # TPM) we want to keep those files in place. # # to achieve this we use the ownership of /var/lib/tpm as an indicator. # Versions that still wrongly package those files also had the ownership of # the directory wrong. Therefore if the directory is not owned by the tss user # we apply a backup and restore logic. [ ! -d "/var/lib/tpm" ] && exit 0 OWNER=`/usr/bin/stat -c "%U" "/var/lib/tpm"` [ "$OWNER" = "tss" ] && exit 0 for data in system.data.auth system.data.noauth; do file="/var/lib/tpm/${data}" [ ! -e "$file" ] && continue cp -p $file ${file}.rpmsave echo "saving backup of $file" done/bin/shutf-872563621e6802e84346948943e08d0b29182c8ac8b2127fef0efad20af9136dc?7zXZ !t/H!j]"k%{f60c>ͱ8e-ZJz){22WU{qbQa,cYabsCuRҺhoOf޳JtVHK3PV%&V [ණScȑ#q_E6_05I+BG64.yj"^AB'C$Z9Xt.*D- ʓ㧟sA8mTp_QM\LJ ; P0f( q2ѶMudwdF v(n8^sF{|ln|9PL"SlףּjF ~Fz{ 2OF"DWWK߱u;f",_V_AhQ.3/2^1@C.-Gh3i, !N86jT%0lSwue)beڶK骥0}4% jXr:VyA)(+_3 i蚚 `ѧ aUKFF.gda".10-mZNKP5Am>U4Ճ~s]7ᄉډ0\( ¥4G7N]@Fb~W|P`A_ njٮ㱿'GTSrTOA3y!UZj\wR-7Y#iDMmd*-9Rc _zKT? lJ,uMGl^vV{tGBgyRy$ MX@hu7_VUBV*Pkz2^N)y 4y xB#ehD9\roD0U i#*he‹IZi߂z;Z RiqW`M}SCܙO#iHMA29_2LQAdύG0Ǩ D&QMw\Meɿ(i%b9S5p"VGqfI$4#zto)-dIiW͈նR>pw)*Rڀ{]+>b #ǨѮ$1Y;/1yĈr1cDrBԧ݁##赗 zZ?aHtzNG3GC!:9COdA?7`W.×qq?6r)|3$ HsBA&jlpǾe>VuF}ӖIOu=Nzd[aݷ3 bAE[Xx~K *vh[z)A$-ETNǫ psLR|EY؄מ76xՃ`s`F;P@ߘU9&|p7F i'z L]5_/jg@Z'ɣ7I,(C5 DLf)"*A;It ?la^![:vomC|MVm"7}<DŽv3"e!F @YD[ Tm'܈2;G.-['2ʯ0u)*"6+eh)3@~?*ga'|6/>%=ueklnJ%Pv> Vt_sddӺeThZ;/DՋ0 k9N 祣owy^q8ZJ}sgNJgS9:)z Vȶ9`8l}e!J1`7o n37{KN -cxjZ fV ~̚v8}M4J;3)QFwK^~Ó|(Gx4׮`̇?!ӻҧn -ȓKDFvzo iS#넄Zb, 5*.ޟ*=doBG_Xc=f2H,z+qA»S{7wcGr4mֲ9P޽Tū~Iqr+DnKE vV);!c LTǬQELy "峐_ ԋw՛ Y(xFoz0b4%gf0Ҝsg{<$Tb0W:wJťĹ0\;L}UUdD"a]/c8]qXr`ۄwK rU E>?t$eF194,|n4އC,\}X5$ٗ LM'Q!wD(iyQbB*9PBf$xƍ(S. #@2}mV@V#Z뉢cZ=,*j7[zQB½ӌmœP1./3UoM@wmTM ԙEB1=ęhpI;VcXJ\9+_vai8\&s?8ƖJ!;G{Yy c:D-T}R r|Ɲb .6l%Q.U*59DmifA1Yva].:: Rn*W{t3q3415=L5 _Y:kوJwr5yt3Z.XyKxB~U#%tT4%p1HhƠ5 Oۉ娵5ʲ*Wy(fKx6s_ا@s)XeI[r gλXa#zWH>~/:*iO~M[P -̺N[ef@ HmjR<\f#8@ E]$۴$-N '|1:8m8b皳J2c! ~fp`pi,\AX\R^ @Y(Lӣ If8Q>VKϵ$.P:wdU{ 7U$"Oabˆ݄;d-}Α]a"`,K=EFB ra??Zo&z{!ҩ|VzӬ3= :4&S' Ouг?]u1_b-= }jO !ڪ;Vj-@= S*rݻM_pnTRo&28jT ۸p:Oق+pW1ݍfp:u{<~*Z6ҪD{F>^~QM6ϖxTp_ROɪs`ʭ ($-qQяZJ#^URW2 Fv\M[N`/cx"z6h>/xNjy@7k2`We,E#.`ʣնmK׷3Eל bʢ,_| 0UXT7# 6z3:8^/5M{Op$L7\&_ 6_[.){KN凵T[1h3;>>@C弍WVPUQ}XFdd]s [&pv|7>w-Բr N߅ 2aI?LDV{%)Q rNJ9lv6I9Gӏ;KzލrY̤nC)+<@c/bXRg!n"CJ$al9&|E~bɑ,;aO紳X9N?rZ+KERlӄw$^̅QOyH'jJ,e.ِGHgeK9rU+fGO;'63C{n%~ES*pG(ALq;) h镊:䆡'ە^Brf^Kld&l8yyS@i3"g3Rdrx &2,1{(O mg쨕_B۞6cAM4 5}o|k?E%&նAakIbK^ 5QʽLB- Ms|,,' w“>)"ˍvf=И-cC,챙c瘁v΋4q5Vɚ{\T _9"U6n( *vjSo:ĵwyE7J`qgMB@#INk vay^Ai\/%ޗx`(1]Ѕ! m.?ϊ [ C 'Q_*q爽:Yλ'O,S'1AF&!w2I-l ucDcELk璢MџDCt#|GOZ1W|Mk'D_zc1CHvW9 Mcc)HNؾ_RڊDD9ͮ˙H2gTL9L^CƀB5O槤Ȝ 13O&{3NbhӒ Jb.`V u܋AuX|9'^ Q^p`z^cZDu$s ]QB-9|.'M:jz#iLqm?BєB9e${"V*ԍe*bȢETIwDP=`/4݌+k-$(¥&̍f)n=?0+n { Y|q~>ZKs:s=ȸ3I=qUݍ84$8L?—JrՌ7lT< /ah ``Ym}X\C95u: OXʺ_ͼ'SOfuF=,e^K~j#&Gؼ2w\Li4@zpk c!٠,5$3< ehXMzKq7WzP⪟V=GǙvf ւ ]A&fyN]tKxeSx&ent\ )b{ǘ#ƫ*T%E$w,[]ѐ˖`=Ic]ZՃ[&ng%mMPP@%A21 /Yb+M6(X<\qxּY*\v͙FxGmy|#DP2pzfnD]-y\.#!B1ˉR{nW57N."sPGz/zF;>xi`k경B_[0tM@@smSaТ \Z_klٴ\ a+uti-UlXPCZ4d?́*,m ]@i;gH8ŊZ佦+~FzH9)