tpm2-0-tss/tpm2-0-tss.spec
Alberto Planas Dominguez 71131875bd Accepting request 987905 from home:aplanas:branches:security
- Update to 3.2.0
  + Fixed
    * FAPI: fix curl_url_set call
    * FAPI: Fix usage of curl url (Should fix Ubuntu 22.04)
    * Fix buffer upcast leading to misalignment
    * Fix check whether SM3 is available
    * Update git.mk to support R/O src-dir
    * Fixed file descriptor leak when tcti initialization failed.
    * 32 Bit builds of the integration tests.
    * Primary key creation, in some cases the unique field was not
      cleared before calling create primary.
    * Primary keys was used for signing the object were cleared after
      loading. So access e.g. to the certificate did not work.
    * Primary keys created with Fapi_Create with an auth value, the
      auth_value was not used in inSensitive to recreate the primary
      key. Now the auth value callback is used to initialize
      inSensitive.
    * The not possible usage of policies for primary keys generated
      with Fapi_CreatePrimary has been fixed.
    * An infinite loop when parsing erroneous JSON was fixed in FAPI.
    * A buffer overflow in ESAPI xor parameter obfuscation was fixed.
    * Certificates could be read only once in one application The
      setting the init state of the state automaton for getting
      certificates was fixed.
    * A double free when executing policy action was fixed.
    * A leak in Fapi_Quote was fixed.
    * The wrong file locking in FAPI IO was fixed.
    * Enable creation of tss group and user on systems with busybox
      for fapi.
    * One fapi integration test did change the auth value of the
      storage hierarchy.
    * A leak in fapi crypto with ossl3 was fixed.
    * Add initial camelia support to FAPI
    * Fix tests of fapi PCR
    * Fix tests of ACT functionality if not supported by pTPM
    * Fix compiler (unused) warning when building without debug
      logging
    * Fix leaks in error cases of integration tests
    * Fix memory leak after ifapi_init_primary_finish failed
    * Fix double-close of stream in FAPI
    * Fix segfault when ESYS_TR_NONE is passed to Esys_TR_GetName
    * Fix the authorization of hierarchy objects used in policy
      secret.
    * Fix check of qualifying data in Fapi_VerifyQuote.
    * Fix some leaks in FAPI error cases.
    * Make scripts compatible with non-posix shells where test does
      not know -a and -o.
    * Fix usage of variable not initialized when fapi keystore is
      empty.
  + Added
    * Add additional IFX root CAs
    * Added support for SM2, SM3 and SM4.
    * Added support for OpenSSL 3.0.0.
    * Added authPolicy field to the TPMU_CAPABILITIES union.
    * Added actData field to the TPMU_CAPABILITIES union.
    * Added TPM2_CAP_AUTH_POLICIES
    * Added TPM2_CAP_ACT constants.
    * Added updates to the marshalling and unmarshalling of the
      TPMU_CAPABILITIES union.
    * Added updated to the FAPI serializations and deserializations of
      the TPMU_CAPABILITIES union and associated types.
    * Add CODE_OF_CONDUCT
    * tcti-mssim and tcti-swtpm gained support for UDX communication
    * Missing constant for TPM2_RH_PW
  + Removed
    * Removed support for OpenSSL < 1.1.0.
    * Marked TPMS_ALGORITHM_DESCRIPTION and corresponding MU routines
      as deprecated.
    * Those were errorous typedefs that are not use and not useful. So
      we will remove this with 3.3
    * Marked TPM2_RS_PW as deprecated. Use TPM2_RH_PW instead.
- Update to 3.1.1
  + Fixed
    * Fixed file descriptor leak when tcti initialization failed.
    * Primary key creation, in some cases the unique field was not
      cleared before calling create primary.
    * Primary keys was used for signing the object were cleared after
      loading. So access e.g. to the certificate did not work.
    * Primary keys created with Fapi_Create with an auth value, the
      auth_value was not used in inSensitive to recreate the primary
      key. Now the auth value callback is used to initialize
      inSensitive.
    * The not possible usage of policies for primary keys generated
      with Fapi_CreatePrimary has been fixed.
    * An infinite loop when parsing erroneous JSON was fixed in FAPI.
    * A buffer overflow in ESAPI xor parameter obfuscation was fixed.
    * Certificates could be read only once in one application The
      setting the init state of the state automaton for getting
      certificates was fixed.
    * A double free when executing policy action was fixed.
    * A leak in Fapi_Quote was fixed.
    * The wrong file locking in FAPI IO was fixed.
    * One fapi integration test did change the auth value of the
      storage hierarchy.
    * Fix test of FAPI PCR
    * Fix leaks in error cases of integration tests
    * Fix segfault when ESYS_TR_NONE is passed to Esys_TR_GetName
    * Fix the authorization of hierarchy objects used in policy
      secret.
    * Fix check of qualifying data in Fapi_VerifyQuote.
    * Fix some leaks in FAPI error cases.
    * Fix usage of variable not initialized when fapi keystore is
      empty.
  + Added
    * Add additional IFX root CAs

OBS-URL: https://build.opensuse.org/request/show/987905
OBS-URL: https://build.opensuse.org/package/show/security/tpm2-0-tss?expand=0&rev=119
2022-07-08 12:20:43 +00:00

305 lines
11 KiB
RPMSpec

#
# spec file for package tpm2-0-tss
#
# Copyright (c) 2022 SUSE LLC
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.
# Please submit bugfixes or comments via https://bugs.opensuse.org/
#
Name: tpm2-0-tss
Version: 3.2.0
Release: 0
Summary: Intel's TCG Software Stack access libraries for TPM 2.0 chips
License: BSD-2-Clause
Group: Productivity/Security
URL: https://github.com/tpm2-software/tpm2-tss
Source0: https://github.com/tpm2-software/tpm2-tss/releases/download/%{version}/tpm2-tss-%{version}.tar.gz
Source1: https://github.com/tpm2-software/tpm2-tss/releases/download/%{version}/tpm2-tss-%{version}.tar.gz.asc
# curl https://keys.openpgp.org/vks/v1/by-fingerprint/D6B4D8BAC7E0CC97DCD4AC7272E88B53F7A95D84 > tpm2-tss.keyring
Source2: tpm2-tss.keyring
Source3: baselibs.conf
BuildRequires: /usr/sbin/groupadd
BuildRequires: acl
BuildRequires: doxygen
BuildRequires: gcc-c++
BuildRequires: libgcrypt-devel
BuildRequires: pkgconfig
BuildRequires: pkgconfig(json-c)
BuildRequires: pkgconfig(libcurl)
BuildRequires: pkgconfig(libopenssl)
BuildRequires: pkgconfig(udev)
# The same user is employed by trousers (and was employed by the old
# resourcemgr shipped with the tpm2-0-tss package):
#
# trousers just needs those accounts for dropping privileges to. The service
# starts as root and uses set*id to drop to tss, after the tpm device has been
# opened.
#
# tpm2-abrmd has no set*id handling and thus requires /dev/tpm to be owned
# by the tss user. Therefore we also need to install a udev rule file.
#
# trousers was here first and created the user like this, also giving it a
# home in /var/lib/tpm. I don't think the home directory is used by either of
# the packages ATM. Trousers is keeping state there, but the directory is
# owned by root and files are opened before dropping privileges. The passwd
# entry seems not to be evaluated.
Requires(pre): user(tss)
%description
The tpm2-0-tss package provides a TPM 2.0 TSS implementation. This
implementation is developed by INTEL. This package contains the libraries,
see the tpm2.0-abrmd package for the resource manager daemon, tpm2.0-tools for
utilities.
%package devel
Summary: Development headers for the Intel TSS library for TPM 2.0 chips
Group: Development/Libraries/C and C++
Requires: glibc-devel
Requires: libtss2-esys0 = %{version}
Requires: libtss2-fapi1 = %{version}
Requires: libtss2-mu0 = %{version}
Requires: libtss2-rc0 = %{version}
Requires: libtss2-sys1 = %{version}
Requires: libtss2-tcti-cmd0 = %{version}
Requires: libtss2-tcti-device0 = %{version}
Requires: libtss2-tcti-mssim0 = %{version}
Requires: libtss2-tcti-pcap0 = %{version}
Requires: libtss2-tcti-swtpm0 = %{version}
Requires: libtss2-tctildr0 = %{version}
Requires: tpm2-0-tss = %{version}
%description devel
This package provides the development files for the tpm2 stack's libraries for
accessing TPM 2.0 chips.
%package -n libtss2-esys0
Summary: TPM2 Enhanced System API (ESAPI)
Group: System/Libraries
%description -n libtss2-esys0
This API is a 1-to-1 mapping of the TPM2 commands documented in Part 3 of the
TPM2 specification. Additionally there are asynchronous versions of each
command. In addition to SAPI, the ESAPI performs tracking of meta data for
TPM object and automatic calculation of session based authorization and
encryption values. Both the synchronous and asynchronous API are exposed
through this library.
%package -n libtss2-sys1
Summary: TPM2 System API (SAPI)
Group: System/Libraries
%description -n libtss2-sys1
System API (SAPI) as described in the system level API and TPM command
transmission interface specification. This API is a 1-to-1 mapping of the TPM2
commands documented in Part 3 of the TPM2 specification. Additionally there
are asynchronous versions of each command. These asynchronous variants may be
useful for integration into event-driven programming environments. Both the
synchronous and asynchronous API are exposed through this library.
%package -n libtss2-mu0
Summary: TPM2 marshaling/unmarshaling library
Group: System/Libraries
%description -n libtss2-mu0
Marshaling/Unmarshaling (MU) as described in the TCG TSS 2.0
Marshaling/Unmarshaling API Specification. This API provides a set of
marshaling and unmarshaling functions for all data types defined by the TPM
library specification.
%package -n libtss2-rc0
Summary: TPM2 error code translation library
Group: System/Libraries
%description -n libtss2-rc0
This library can translate TPM error codes into human readable strings.
%package -n libtss2-tctildr0
Summary: TCTI interface loading library
Group: System/Libraries
%description -n libtss2-tctildr0
This is a helper library that simplifies loading other tcti libraries. It is
recommended over custom tcti loading code in applications.
%package -n libtss2-tcti-device0
Summary: TCTI interface library for using a native TPM device node
Group: System/Libraries
%description -n libtss2-tcti-device0
TPM Command Transmission Interface library for communicating with a
TPM device node. This provides direct access to the TPM through the Linux
kernel driver.
%package -n libtss2-tcti-mssim0
Summary: TCTI interface library for Microsoft software TPM2 simulator
Group: System/Libraries
%description -n libtss2-tcti-mssim0
TPM Command Transmission Interface library for communicating using the
protocol exposed by the Microsoft software TPM2 simulator.
%package -n libtss2-fapi1
Summary: FAPI interface library
Group: System/Libraries
%description -n libtss2-fapi1
This is the tpm2 Feature API (FAPI) library. This API is designed to be very
high-level API, intended to make programming with the TPM as simple as
possible.
%package -n libtss2-tcti-cmd0
Summary: TCTI cmd interface library
Group: System/Libraries
%description -n libtss2-tcti-cmd0
A TCTI for interaction with a subprocess. It abstracts the details of direct
communication with the interface and protocol exposed by a subprocess that can
receive and transmit raw TPM2 command and response buffers.
%package -n libtss2-tcti-swtpm0
Summary: TCTI swtpm interface library
Group: System/Libraries
%description -n libtss2-tcti-swtpm0
A TCTI for interaction with the TPM2 software simulator. It abstracts the
details of direct communication with the interface and protocol exposed by the
daemon hosting the TPM2 reference implementation.
%package -n libtss2-tcti-pcap0
Summary: TCTI pcap interface library
Group: System/Libraries
%description -n libtss2-tcti-pcap0
A TCTI which prints TPM commands and responses to a file in pcap-ng format. It abstracts the
details of direct communication with the interface and protocol exposed by the
daemon hosting the TPM2 reference implementation.
%prep
%autosetup -n tpm2-tss-%{version}
%build
# configure looks for groupadd on PATH
export PATH="$PATH:%{_sbindir}"
%configure --disable-static \
--with-udevrulesdir=%{_udevrulesdir} \
--with-runstatedir=%{_rundir} \
--with-tmpfilesdir=%{_tmpfilesdir} \
--with-sysusersdir=%{_sysusersdir}
%make_build PTHREAD_LDFLAGS=-pthread
%install
%make_install
find %{buildroot} -type f -name "*.la" -delete -print
# rename the rules file to have a numbered prefix as all others have, too
%define udev_rule_file 90-tpm.rules
mv %{buildroot}%{_udevrulesdir}/tpm-udev.rules %{buildroot}%{_udevrulesdir}/%{udev_rule_file}
# Conflicts with system-users
rm %{buildroot}%{_sysusersdir}/tpm2-tss.conf
# Add version into the configuration tmpfiles.d configuration file
mv %{buildroot}%{_tmpfilesdir}/tpm2-tss-fapi.conf %{buildroot}%{_tmpfilesdir}/tpm2-tss-fapi-%{version}.conf
%post
%{_bindir}/udevadm trigger -s tpm -s tpmrm || :
%post -n libtss2-esys0 -p /sbin/ldconfig
%postun -n libtss2-esys0 -p /sbin/ldconfig
%post -n libtss2-sys1 -p /sbin/ldconfig
%postun -n libtss2-sys1 -p /sbin/ldconfig
%post -n libtss2-tctildr0 -p /sbin/ldconfig
%postun -n libtss2-tctildr0 -p /sbin/ldconfig
%post -n libtss2-tcti-device0 -p /sbin/ldconfig
%postun -n libtss2-tcti-device0 -p /sbin/ldconfig
%post -n libtss2-tcti-mssim0 -p /sbin/ldconfig
%postun -n libtss2-tcti-mssim0 -p /sbin/ldconfig
%post -n libtss2-mu0 -p /sbin/ldconfig
%postun -n libtss2-mu0 -p /sbin/ldconfig
%post -n libtss2-rc0 -p /sbin/ldconfig
%postun -n libtss2-rc0 -p /sbin/ldconfig
%post -n libtss2-fapi1
/sbin/ldconfig
%tmpfiles_create %{_tmpfilesdir}/tpm2-tss-fapi-%{version}.conf
%postun -n libtss2-fapi1 -p /sbin/ldconfig
%post -n libtss2-tcti-cmd0 -p /sbin/ldconfig
%postun -n libtss2-tcti-cmd0 -p /sbin/ldconfig
%post -n libtss2-tcti-swtpm0 -p /sbin/ldconfig
%postun -n libtss2-tcti-swtpm0 -p /sbin/ldconfig
%post -n libtss2-tcti-pcap0 -p /sbin/ldconfig
%postun -n libtss2-tcti-pcap0 -p /sbin/ldconfig
%files
%doc *.md
%license LICENSE
%{_mandir}/man3/*
%{_mandir}/man5/*
%{_mandir}/man7/tss2-*
%{_udevrulesdir}/%{udev_rule_file}
%dir %{_sysconfdir}/tpm2-tss/
%config %{_sysconfdir}/tpm2-tss/fapi-config.json
%dir %{_sysconfdir}/tpm2-tss/fapi-profiles
%config %{_sysconfdir}/tpm2-tss/fapi-profiles/*.json
%files devel
%{_includedir}/tss2
%{_libdir}/*.so
%{_libdir}/pkgconfig/*.pc
%files -n libtss2-esys0
%{_libdir}/libtss2-esys.so.*
%files -n libtss2-sys1
%{_libdir}/libtss2-sys.so.*
%files -n libtss2-mu0
%{_libdir}/libtss2-mu.so.*
%files -n libtss2-rc0
%{_libdir}/libtss2-rc.so.*
%files -n libtss2-tctildr0
%{_libdir}/libtss2-tctildr.so.*
%files -n libtss2-tcti-device0
%{_libdir}/libtss2-tcti-device.so.*
%files -n libtss2-tcti-mssim0
%{_libdir}/libtss2-tcti-mssim.so.*
%files -n libtss2-fapi1
%{_libdir}/libtss2-fapi.so.*
%{_tmpfilesdir}/tpm2-tss-fapi-%{version}.conf
# this would fix "tmpfile-not-in-filelist" warnings but when adding these
# entries then it complains about "directories not owned by a package:" for
# /run/tpm2-0-tss & friends. When adding them as %%ghost, too, then Leap15.1
# complains about "found conflict of libtss2-fapi1-3.0.1-lp152.103.1.x86_64
# with libtss2-fapi1-3.0.1-lp152.103.1.x86_64". Thus leave it be for the
# moment, some insane circle of errors is involved here.
#
# it seems the problem is that during `make install` the package runs
# systemd-tmpfiles --create, and the directories are created outside the
# package's install tree. It seems this is not expected by RPM.
# %%ghost %%{_sharedstatedir}/%%{name}/system/keystore
# %%ghost %%{_rundir}/%%{name}/eventlog
%files -n libtss2-tcti-cmd0
%{_libdir}/libtss2-tcti-cmd.so.*
%files -n libtss2-tcti-swtpm0
%{_libdir}/libtss2-tcti-swtpm.so.*
%files -n libtss2-tcti-pcap0
%{_libdir}/libtss2-tcti-pcap.so.*
%changelog