tpm2-0-tss/tpm2-0-tss.spec
Alberto Planas Dominguez c4218a3a27 Accepting request 1066192 from home:aplanas:branches:security
- Drop 0001-tss2_rc-ensure-layer-number-is-in-bounds.patch as was
  already merged upstream
- Update to 4.0.1
  + Fixed:
    * A buffer overflow in tss2-rc as CVE-2023-22745.
- Update to 4.0.0
  + Fixed:
    * tcti-ldr: Use heap instead of stack when tcti initialize
    * Fix usage of NULL pointer if Esys_TR_SetAuth is calles with
      ESYS_TR_NONE.
    * Conditionally check user/group manipulation commands.
    * Store VERSION into the release tarball.
    * When using DESTDIR for make einstall, do not invoke
      systemd-sysusers and systemd-tmpfiles.
    * esys_iutil: fix possible NPD.
    * Tss2_Sys_Flushcontext: flushHandle was encoded as a handleArea
      handle and not as parameter one, this affected the contents of
      cpHash.
    * esys: fix allow usage of HMAC sessions for
      Esys_TR_FromTPMPublic.
    * fapi: fix usage of policy_nv with a TPM nv index.
    * linking tcti for libtpms against tss2-tctildr. It should be
      linked against tss2-mu.
    * build: Remove erroneous trailing comma in linker option. Bug
      #2391.
    * fapi: fix encoding of complex tpm2bs in authorize nv,
      duplication select and policy template policies. Now the complex
      and TPMT or TPMS representations can be used. Bug #2383
    * The error message for unsupported FAPI curves was in hex without
      a leading 0x, make it integer output to clarify.
    * Documentation that had various scalar out pointers as "callee
      allocated".
    * test: build with opaque FILE structure like in musl libc.
    * Transient endorsement keys were not recreated according to the
      EK credential profile.
    * Evict control for a persistent EK failed during provisioning if
      an auth value for the storage hierarchy was set.
    * The authorization of the storage hierarchy is now added. Fixes
      FAPI: Provisioning error if an auth value is needed for the
      storage hierarchy #2438.
    * Usage of a second profile in a path was not possible because the
      default profile was always used.
    * The setting of an empty auth value for Fapi_Provision was fixed.
    * JSON encoding of a structure TPMS_POLICYAUTHORIZATION used the
      field keyPEMhashAlg instead of hashAlg as defined in "TCG TSS
      2.0 JSON Data Types and Policy Language Specification". Rename
      to hashAlg but preserve support for reading keyPEMhashAlg for
      backwards compatibility.
    * fapi: PolicySecret did not work with keys as secret object.
    * Esys_PCR_SetAuthValue: remembers the auth like other SetAutg
      ESAPI functions.
    * tests: esys-pcr-auth-value.int moved to destructive tests.
    * FAPI: Fix double free if keystore is corrupted.
    * Marshaling of TPMU_CAPABILITIES data, only field
      intelPttProperty was broken before.a
    * Spec deviation in Fapi_GetDescription caused description to be
      NULL when it should be empty string. This is API breaking but
      considered a bug since it deviated from the FAPI spec.
    * FAPI: undefined reference to curl_url_strerror when using curl
      less than 7.80.0.
    * FAPI: Fixed support for EK templates in NV inidices per the
      spec, see #2518 for details.
    * FAPI: fix NPD in ifapi_curl logging.
    * FAPI: Improve documentation fapi-profile
    * FAPI: Fix CURL HTTP handling.
    * FAPI: Return FAPI_RC_IO_ERROR if a policy does not exist in
      keystore.
  + Added:
    * TPM version 1.59 support.
    * ci: ubuntu-22.04 added.
    * mbedTLS 3.0 is supported by ESAPI.
    * Add CreationHash to JSON output for usage between applications
      not using the FAPI keystore, like command line tools.
    * Reduced code size for SAPI.
    * Support for Runtime Switchable ESAPI Crypto Backend via
      Esys_SetCryptoCallbacks.
    * Testing for TCG EK Credential Profile TPM 2.0, Version 2.4
      Rev. 3, 2021 for the low and high address range of EK templates.
    * tss2-rc: Tss2_RC_DecodeInfo function for parsing TSS2_RC into
      the various bit fields.
    * FAPI support for P_ECC384 profile.
    * tss2-rc: Tss2_RC_DecodeInfoError: Function to get a human
      readable error from a TSS2_RC_INFO returned by
      Tss2_RC_DecodeInfo
    * tcti: Generic SPI driver, implementors only need to connect to
      acquire/release, transmit/receive, and sleep/timeout functions.
    * FAPI: Add event logging for Firmware and IMA Events. See #2170
      for details.
    * FAPI: Fix Fapi_ChangeAuth updates on hierarchy objects not being
      reflected across profiles.
    * FAPI: Allow keyedhash keys in PolicySigned.
    * ESAPI: Support sha512 for mbedtls crypto backend.
    * TPM2B_MAX_CAP_BUFFER and mu routines
    * vendor field to TPMU_CAPABILTIIES
    * FAPI: support for PolicyTemplate
  + Changed
    * libmu soname from 0:0:0 to 0:1:0.
    * tss2-sys soname from 1:0:0 to 1:1:0
    * tss2-esys: from 0:0:0 to 0:1:0
    * FAPI ignores vendor properties on Fapi_GetInfo
    * FAPI Event Logging JSON format, See #2170 for details.
  + Removed
    * Dead struct TPMS_ALGORITHM_DESCRIPTION
    * Dead field intelPttProperty from TPMU_CAPABILITIES
    * Dead code Tss2_MU_TPMS_ALGORITHM_DESCRIPTION_Marshal
    * Dead code Tss2_MU_TPMS_ALGORITHM_DESCRIPTION_Unmarshal

OBS-URL: https://build.opensuse.org/request/show/1066192
OBS-URL: https://build.opensuse.org/package/show/security/tpm2-0-tss?expand=0&rev=126
2023-02-16 15:00:57 +00:00

337 lines
12 KiB
RPMSpec

#
# spec file for package tpm2-0-tss
#
# Copyright (c) 2023 SUSE LLC
#
# All modifications and additions to the file contributed by third parties
# remain the property of their copyright owners, unless otherwise agreed
# upon. The license for this file, and modifications and additions to the
# file, is the same license as for the pristine package itself (unless the
# license for the pristine package is not an Open Source License, in which
# case the license is the MIT License). An "Open Source License" is a
# license that conforms to the Open Source Definition (Version 1.9)
# published by the Open Source Initiative.
# Please submit bugfixes or comments via https://bugs.opensuse.org/
#
Name: tpm2-0-tss
Version: 4.0.1
Release: 0
Summary: Intel's TCG Software Stack access libraries for TPM 2.0 chips
License: BSD-2-Clause
Group: Productivity/Security
URL: https://github.com/tpm2-software/tpm2-tss
Source0: https://github.com/tpm2-software/tpm2-tss/releases/download/%{version}/tpm2-tss-%{version}.tar.gz
Source1: https://github.com/tpm2-software/tpm2-tss/releases/download/%{version}/tpm2-tss-%{version}.tar.gz.asc
# curl https://github.com/williamcroberts.gpg > tpm2-tss.keyring
Source2: tpm2-tss.keyring
Source3: baselibs.conf
BuildRequires: /usr/sbin/groupadd
BuildRequires: acl
BuildRequires: doxygen
BuildRequires: gcc-c++
BuildRequires: libgcrypt-devel
BuildRequires: pkgconfig
BuildRequires: pkgconfig(json-c)
BuildRequires: pkgconfig(libcurl)
BuildRequires: pkgconfig(libopenssl)
BuildRequires: pkgconfig(udev)
BuildRequires: pkgconfig(uuid)
# The same user is employed by trousers (and was employed by the old
# resourcemgr shipped with the tpm2-0-tss package):
#
# trousers just needs those accounts for dropping privileges to. The service
# starts as root and uses set*id to drop to tss, after the tpm device has been
# opened.
#
# tpm2-abrmd has no set*id handling and thus requires /dev/tpm to be owned
# by the tss user. Therefore we also need to install a udev rule file.
#
# trousers was here first and created the user like this, also giving it a
# home in /var/lib/tpm. I don't think the home directory is used by either of
# the packages ATM. Trousers is keeping state there, but the directory is
# owned by root and files are opened before dropping privileges. The passwd
# entry seems not to be evaluated.
Requires(pre): user(tss)
%description
The tpm2-0-tss package provides a TPM 2.0 TSS implementation. This
implementation is developed by INTEL. This package contains the libraries,
see the tpm2.0-abrmd package for the resource manager daemon, tpm2.0-tools for
utilities.
%package devel
Summary: Development headers for the Intel TSS library for TPM 2.0 chips
Group: Development/Libraries/C and C++
Requires: glibc-devel
Requires: libtss2-esys0 = %{version}
Requires: libtss2-fapi1 = %{version}
Requires: libtss2-mu0 = %{version}
Requires: libtss2-policy0 = %{version}
Requires: libtss2-rc0 = %{version}
Requires: libtss2-sys1 = %{version}
Requires: libtss2-tcti-cmd0 = %{version}
Requires: libtss2-tcti-device0 = %{version}
Requires: libtss2-tcti-mssim0 = %{version}
Requires: libtss2-tcti-pcap0 = %{version}
Requires: libtss2-tcti-spi-helper0 = %{version}
Requires: libtss2-tcti-swtpm0 = %{version}
Requires: libtss2-tctildr0 = %{version}
Requires: tpm2-0-tss = %{version}
%description devel
This package provides the development files for the tpm2 stack's libraries for
accessing TPM 2.0 chips.
%package -n libtss2-esys0
Summary: TPM2 Enhanced System API (ESAPI)
Group: System/Libraries
%description -n libtss2-esys0
This API is a 1-to-1 mapping of the TPM2 commands documented in Part 3 of the
TPM2 specification. Additionally there are asynchronous versions of each
command. In addition to SAPI, the ESAPI performs tracking of meta data for
TPM object and automatic calculation of session based authorization and
encryption values. Both the synchronous and asynchronous API are exposed
through this library.
%package -n libtss2-sys1
Summary: TPM2 System API (SAPI)
Group: System/Libraries
%description -n libtss2-sys1
System API (SAPI) as described in the system level API and TPM command
transmission interface specification. This API is a 1-to-1 mapping of the TPM2
commands documented in Part 3 of the TPM2 specification. Additionally there
are asynchronous versions of each command. These asynchronous variants may be
useful for integration into event-driven programming environments. Both the
synchronous and asynchronous API are exposed through this library.
%package -n libtss2-mu0
Summary: TPM2 marshaling/unmarshaling library
Group: System/Libraries
%description -n libtss2-mu0
Marshaling/Unmarshaling (MU) as described in the TCG TSS 2.0
Marshaling/Unmarshaling API Specification. This API provides a set of
marshaling and unmarshaling functions for all data types defined by the TPM
library specification.
%package -n libtss2-rc0
Summary: TPM2 error code translation library
Group: System/Libraries
%description -n libtss2-rc0
This library can translate TPM error codes into human readable strings.
%package -n libtss2-tctildr0
Summary: TCTI interface loading library
Group: System/Libraries
%description -n libtss2-tctildr0
This is a helper library that simplifies loading other tcti libraries. It is
recommended over custom tcti loading code in applications.
%package -n libtss2-tcti-device0
Summary: TCTI interface library for using a native TPM device node
Group: System/Libraries
%description -n libtss2-tcti-device0
TPM Command Transmission Interface library for communicating with a
TPM device node. This provides direct access to the TPM through the Linux
kernel driver.
%package -n libtss2-tcti-mssim0
Summary: TCTI interface library for Microsoft software TPM2 simulator
Group: System/Libraries
%description -n libtss2-tcti-mssim0
TPM Command Transmission Interface library for communicating using the
protocol exposed by the Microsoft software TPM2 simulator.
%package -n libtss2-fapi1
Summary: FAPI interface library
Group: System/Libraries
%description -n libtss2-fapi1
This is the tpm2 Feature API (FAPI) library. This API is designed to be very
high-level API, intended to make programming with the TPM as simple as
possible.
%package -n libtss2-policy0
Summary: TPM2 FAPI policy library
Group: System/Libraries
%description -n libtss2-policy0
Library that exposes the internal FAPI policy engine as a consumable
library and stable API. Users can take arbitrary JSON policy strings
and implement the callbacks required to produce calculated policies
without a TPM as well as execute policies on an ESYS TR session for
satisfying access policies on an object.
%package -n libtss2-tcti-cmd0
Summary: TCTI cmd interface library
Group: System/Libraries
%description -n libtss2-tcti-cmd0
A TCTI for interaction with a subprocess. It abstracts the details of direct
communication with the interface and protocol exposed by a subprocess that can
receive and transmit raw TPM2 command and response buffers.
%package -n libtss2-tcti-swtpm0
Summary: TCTI swtpm interface library
Group: System/Libraries
%description -n libtss2-tcti-swtpm0
A TCTI for interaction with the TPM2 software simulator. It abstracts the
details of direct communication with the interface and protocol exposed by the
daemon hosting the TPM2 reference implementation.
%package -n libtss2-tcti-pcap0
Summary: TCTI pcap interface library
Group: System/Libraries
%description -n libtss2-tcti-pcap0
A TCTI which prints TPM commands and responses to a file in pcap-ng format. It abstracts the
details of direct communication with the interface and protocol exposed by the
daemon hosting the TPM2 reference implementation.
%package -n libtss2-tcti-spi-helper0
Summary: TCTI spi interface library
Group: System/Libraries
%description -n libtss2-tcti-spi-helper0
A TCTI module for communication via SPI TPM device driver. Abstracts
the details of communication with a TPM via SPI protocol. It uses user
supplied methods for SPI and timing operations in order to be platform
independent.
%prep
%autosetup -n tpm2-tss-%{version}
%build
# configure looks for groupadd on PATH
export PATH="$PATH:%{_sbindir}"
%configure --disable-static \
--with-udevrulesdir=%{_udevrulesdir} \
--with-runstatedir=%{_rundir} \
--with-tmpfilesdir=%{_tmpfilesdir} \
--with-sysusersdir=%{_sysusersdir}
%make_build PTHREAD_LDFLAGS=-pthread
%install
%make_install
find %{buildroot} -type f -name "*.la" -delete -print
# rename the rules file to have a numbered prefix as all others have, too
%define udev_rule_file 90-tpm.rules
mv %{buildroot}%{_udevrulesdir}/tpm-udev.rules %{buildroot}%{_udevrulesdir}/%{udev_rule_file}
# Conflicts with system-users
rm %{buildroot}%{_sysusersdir}/tpm2-tss.conf
%post
%{_bindir}/udevadm trigger -s tpm -s tpmrm || :
%post -n libtss2-esys0 -p /sbin/ldconfig
%postun -n libtss2-esys0 -p /sbin/ldconfig
%post -n libtss2-sys1 -p /sbin/ldconfig
%postun -n libtss2-sys1 -p /sbin/ldconfig
%post -n libtss2-tctildr0 -p /sbin/ldconfig
%postun -n libtss2-tctildr0 -p /sbin/ldconfig
%post -n libtss2-tcti-device0 -p /sbin/ldconfig
%postun -n libtss2-tcti-device0 -p /sbin/ldconfig
%post -n libtss2-tcti-mssim0 -p /sbin/ldconfig
%postun -n libtss2-tcti-mssim0 -p /sbin/ldconfig
%post -n libtss2-mu0 -p /sbin/ldconfig
%postun -n libtss2-mu0 -p /sbin/ldconfig
%post -n libtss2-rc0 -p /sbin/ldconfig
%postun -n libtss2-rc0 -p /sbin/ldconfig
%post -n libtss2-fapi1
/sbin/ldconfig
%tmpfiles_create %{_tmpfilesdir}/tpm2-tss-fapi-%{version}.conf
%postun -n libtss2-fapi1 -p /sbin/ldconfig
%post -n libtss2-policy0 -p /sbin/ldconfig
%postun -n libtss2-policy0 -p /sbin/ldconfig
%post -n libtss2-tcti-cmd0 -p /sbin/ldconfig
%postun -n libtss2-tcti-cmd0 -p /sbin/ldconfig
%post -n libtss2-tcti-swtpm0 -p /sbin/ldconfig
%postun -n libtss2-tcti-swtpm0 -p /sbin/ldconfig
%post -n libtss2-tcti-pcap0 -p /sbin/ldconfig
%postun -n libtss2-tcti-pcap0 -p /sbin/ldconfig
%post -n libtss2-tcti-spi-helper0 -p /sbin/ldconfig
%postun -n libtss2-tcti-spi-helper0 -p /sbin/ldconfig
%files
%doc *.md
%license LICENSE
%{_mandir}/man3/*
%{_mandir}/man5/*
%{_mandir}/man7/tss2-*
%{_udevrulesdir}/%{udev_rule_file}
%dir %{_sysconfdir}/tpm2-tss/
%config %{_sysconfdir}/tpm2-tss/fapi-config.json
%dir %{_sysconfdir}/tpm2-tss/fapi-profiles
%config %{_sysconfdir}/tpm2-tss/fapi-profiles/*.json
%files devel
%{_includedir}/tss2
%{_libdir}/*.so
%{_libdir}/pkgconfig/*.pc
%files -n libtss2-esys0
%{_libdir}/libtss2-esys.so.*
%files -n libtss2-sys1
%{_libdir}/libtss2-sys.so.*
%files -n libtss2-mu0
%{_libdir}/libtss2-mu.so.*
%files -n libtss2-rc0
%{_libdir}/libtss2-rc.so.*
%files -n libtss2-tctildr0
%{_libdir}/libtss2-tctildr.so.*
%files -n libtss2-tcti-device0
%{_libdir}/libtss2-tcti-device.so.*
%files -n libtss2-tcti-mssim0
%{_libdir}/libtss2-tcti-mssim.so.*
%files -n libtss2-fapi1
%{_libdir}/libtss2-fapi.so.*
%{_tmpfilesdir}/tpm2-tss-fapi.conf
# this would fix "tmpfile-not-in-filelist" warnings but when adding these
# entries then it complains about "directories not owned by a package:" for
# /run/tpm2-0-tss & friends. When adding them as %%ghost, too, then Leap15.1
# complains about "found conflict of libtss2-fapi1-3.0.1-lp152.103.1.x86_64
# with libtss2-fapi1-3.0.1-lp152.103.1.x86_64". Thus leave it be for the
# moment, some insane circle of errors is involved here.
#
# it seems the problem is that during `make install` the package runs
# systemd-tmpfiles --create, and the directories are created outside the
# package's install tree. It seems this is not expected by RPM.
# %%ghost %%{_sharedstatedir}/%%{name}/system/keystore
# %%ghost %%{_rundir}/%%{name}/eventlog
%files -n libtss2-policy0
%{_libdir}/libtss2-policy.so.*
%files -n libtss2-tcti-cmd0
%{_libdir}/libtss2-tcti-cmd.so.*
%files -n libtss2-tcti-swtpm0
%{_libdir}/libtss2-tcti-swtpm.so.*
%files -n libtss2-tcti-pcap0
%{_libdir}/libtss2-tcti-pcap.so.*
%files -n libtss2-tcti-spi-helper0
%{_libdir}/libtss2-tcti-spi-helper.so.*
%changelog