tpm2.0-tools-5.2-150400.6.3.1<>,"f8pp9|eMwB?I魵&@{з>u,261Gq#zTuΐһ'PHHR&དྷ)3r҅G<74#\:Kչ< '{@^BA1L%I{YLHV 2lR҅!K?bSY |\C c"If3'F1C#v :=qEN"C1䶹o >H;'!8V|#=DE @>A?d  W| 8>HALA  A  PA TA ?A C AHANUATTAYYZH\(]8]'9]':aE'FbpGbAHgAIlAXmYm\mA]sA^* bcd?eDfGlIu\Av`wAxAy!z(8<ILPVCtpm2.0-tools5.2150400.6.3.1Trusted Platform Module (TPM) 2.0 administration toolsTrusted Computing is a set of specifications published by the Trusted Computing Group (TCG). The Trusted Platform Module (TPM) is the hardware component for Trusted Computing. The tpm2.0-tools package provides tools for enablement and configuration of the TPM 2.0 and associated interfaces.f8ph04-ch1cUSUSE Linux Enterprise 15SUSE LLC BSD-3-Clausehttps://www.suse.com/Productivity/Securityhttps://github.com/tpm2-software/tpm2-tools/releaseslinuxx86_64 mH(O j9-D#F[waJK f]l rt)#1Gu ue  !G1J E'6   & ;l H D   a h  O O$ B~   <B%M\RY~L@%#́AAA큤A큤f8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8pf8paSOBaMf8pa#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.bashrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootroottpm2.0-tools-5.2-150400.6.3.1.src.rpmtpm2.0-toolstpm2.0-tools(x86-64)@@@@@@@@@@@@@@@@@@@@    libc.so.6()(64bit)libc.so.6(GLIBC_2.14)(64bit)libc.so.6(GLIBC_2.16)(64bit)libc.so.6(GLIBC_2.2.5)(64bit)libc.so.6(GLIBC_2.3)(64bit)libc.so.6(GLIBC_2.3.4)(64bit)libc.so.6(GLIBC_2.4)(64bit)libc.so.6(GLIBC_2.7)(64bit)libcrypto.so.1.1()(64bit)libcrypto.so.1.1(OPENSSL_1_1_0)(64bit)libcrypto.so.1.1(OPENSSL_1_1_1)(64bit)libcurl.so.4()(64bit)libefivar.so.1()(64bit)libefivar.so.1(libefivar.so.0)(64bit)libtss2-esys.so.0()(64bit)libtss2-fapi.so.1()(64bit)libtss2-mu.so.0()(64bit)libtss2-rc.so.0()(64bit)libtss2-sys.so.1()(64bit)libtss2-tctildr.so.0()(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3f4a@aapa@``ٹ`̊`9@`Ȗ@` @`@`7@`@_t@]@]@]c\@[t[}P@[6@[{@Z@Z@Z@Z@ZZC@Y@Yp@YTYI@Y1S@YXO@XW@Vmatthias.gerstner@suse.comaplanas@suse.comaplanas@suse.comaplanas@suse.comaplanas@suse.commatthias.gerstner@suse.comfvogt@suse.comaplanas@suse.comaplanas@suse.comaplanas@suse.comdimstar@opensuse.orgmatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.comvcizek@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commatthias.gerstner@suse.commeissner@suse.commatthias.gerstner@suse.commeissner@suse.commeissner@suse.commeissner@suse.commeissner@suse.com- Add 0001-tpm2_checkquote-Fix-check-of-magic-number.patch: tpm2_checkquote did not check whether the magic number in the attest is equal to TPM2_GENERATED_VALUE, which might allow a malicious actor to generate arbitrary quote data, undetected by tpm2_checkquote (bsc#1223687, CVE-2024-29038). - Add 0001-tpm2_checkquote-Add-comparison-of-pcr-selection.patch: tpm2_checkquote did not compare the --pcr parameter passed to the tool with the attest. A malicious actor might thus be able to fake a valid attestation (bsc#1223689, CVE-2024-29039).- The update to 5.2 fill also jsc#SLE-9515 (4.1) and jsc#SLE-17366 (4.3.0)- Fix python3-PyYAML requirement - Move the tests inside a bcond. Disabled by default.- Update to version 5.2: + tpm2_nvextend: * Added option -n, --name to specify the name of the nvindex in hex bytes. This is used when cpHash ought to be calculated without dispatching the TPM2_NV_Extend command to the TPM. + tpm2_nvread: * Added option --rphash=FILE to specify ile path to record the hash of the response parameters. This is commonly termed as rpHash. * Added option -n, --name to specify the name of the nvindex in hex bytes. This is used when cpHash ought to be calculated without dispatching the TPM2_NVRead command to the TPM. * Added option -S, --session to specify to specify an auxiliary session for auditing and or encryption/decryption of the parameters. + tpm2_nvsetbits: * Added option --rphash=FILE to specify file path to record the hash of the response parameters. This is commonly termed as rpHash. * Added option -S, --session to specify to specify an auxiliary session for auditing and or encryption/decryption of the parameters. * Added option -n, --name to specify the name of the nvindex in hex bytes. This is used when cpHash ought to be calculated without dispatching the TPM2_NV_SetBits command to the TPM. + tpm2_createprimary: * Support public-key output at creation time in various public-key formats. + tpm2_create: * Support public-key output at creation time in various public-key formats. + tpm2_print: * Support outputing public key in various public key formats over the default YAML output. Supports taking -u output from tpm2_create and converting it to a PEM or DER file format. + tpm2_import: * Add support for importing keys with sealed-data-blobs. + tpm2_rsaencrypt, tpm2_rsadecrypt: * Add support for specifying the hash algorithm with oaep. + tpm2_pcrread, tpm2_quote: * Add option -F, --pcrs_format to specify PCR format selection for the binary blob in the PCR output file. 'values' will output a binary blob of the PCR values. 'serialized' will output a binary blob of the PCR values in the form of serialized data structure in little endian format. + tpm2_eventlog: * Add support for decoding StartupLocality. * Add support for printing the partition information. * Add support for reading eventlogs longer than 64kb including from /sys/kernel/security/tpm0/binary_bios-measurements. + tpm2_duplicate: * Add option -L, --policy to specify an authorization policy to be associated with the duplicated object. * Added support for external key duplication without needing the TCTI. + tools: * Enhance error message on invalid passwords when sessions cannot be used. + lib/tpm2_options: * Add option to specify fake tcti which is required in cases where sapi ctx is required to be initialized for retrieving command parameters without invoking the tcti to talk to the TPM. + openssl: * Dropped support for OpenSSL < 1.1.0 * Add support for OpenSSL 3.0.0 + Support added to make the repository documentation and man pages available live on readthedocs. + Bug-fixes: * tpm2_import: Don't allow setting passwords for imported object with -p option as the tool doesn't modify the TPM2B_SENSITIVE structure. Added appropriate logging to indicate using tpm2_changeauth after import. * lib/tpm2_util.c: The function to calculate pHash algorithm returned error when input session is a password session and the only session in the command. * lib/tpm2_alg_util.c: Fix an error where oaep was parsed under ECC. * tpm2_sign: Fix segfaults when tool does not find TPM resources (TPM or RM). * tpm2_makecredential: Fix an issue where reading input from stdin could result in unsupported data size larger than the largest digest size. * tpm2_loadexternal: Fix an issue where restricted attribute could not be set. * lib/tpm2_nv_util.h: The NV index size is dependent on different data sets read from the GetCapability structures because there is a dependency on the NV operation type: Define vs Read vs Write vs Extend. Fix a sane default in the case where GetCapability fails or fails to report the specific property/ data set. This is especially true because some properties are TPM implementation dependent. * tpm2_createpolicy: Fix an issue where tool exited silently without reporting an error if wrong pcr string is specified. * lib/tpm2_alg_util: add error message on public init to prevent tools from dying silently, add an error message. * tpm2_import: fix an issue where an imported hmac object scheme was NULL. While allowed, it was inconsistent with other tools like tpm2_create which set the scheme as hmac->sha256 when generating a keyedhash object. - Drop patches already in upstream: + 0001-tpm2_checkquote-fix-uninitialized-variable.patch + 0001-tpm2_eventlog-fix-buffer-offset-when-reading-the-eve.patch + 0001-tpm2_eventlog-read-eventlog-file-in-chunks.patch- Add 0001-tpm2_eventlog-fix-buffer-offset-when-reading-the-eve.patch to fix the offset of the read buffer- prepare running the test suite via %check, but leave it commented out, because it is broken due to LTO linking.- update to version 5.1.1: - tpm2_import: fix fixed AES key CVE-2021-3565 - tpm2_import used a fixed AES key for the inner wrapper, which means that a MITM attack would be able to unwrap the imported key. To fix this, ensure the key size is 16 bytes or bigger and use OpenSSL to generate a secure random AES key. - Avoid pandoc build dependency, use prebuilt man pages everywhere - Drop 0001-tpm2_import-fix-fixed-AES-key-CVE-2021-3565.patch, now upstream - Drop _service, unused - Drop unused unzip build dependency - Drop autoreconfigure call, no longer necessary - Use %autosetup - Verify tarball signature - Build against efivar - Drop %check section, tests weren't built, so that was a noop- Add 0001-tpm2_eventlog-read-eventlog-file-in-chunks.patch to fix the tpm2_eventlog command (boo#1187360)- Add 0001-tpm2_checkquote-fix-uninitialized-variable.patch for a better fix of boo#1187316 - Re-enable lto- Disable lto to fix tpm2_checkquote error (boo#1187316) - Update service file to point to the correct revision- Do not BuildRequire pandoc on ix86 architectures: the haskell stack is not supported on intel 32bit archs.- add 0001-tpm2_import-fix-fixed-AES-key-CVE-2021-3565.patch: no longer use a fixed AES key in the context of the tpm2_import command. Fixes CVE-2021-3565 (bsc#1186490). - drop fix_pie_linking.patch: now contained in upstream tarball - drop fix_warnings.patch: now contained in upstream tarball - update to upstream version 5.1: - Minimum tpm2-tss version dependency bumped to 3.1.0 - Minimum tpm2-abrmd version dependency bumped to 2.4.0 - tss2: - Support in tools for PolicyRef inclusion in policy search per latest TSS. - Support to use TPM objects protected by a policy with PolicySigned. - Enable backward compatibility to old Fapi callback API. - Fix PCR selection for tss2 quote. - Support policy signed policies by implementing Fapi_SetSignCB. - Command/ response parameter support for auditing and pHash policies: - lib/tpm2_util.c: Add method to determine hashing alg for cp/rphash - Add support to calculate rphash for tpm2_create, tpm2_activatecredential, tpm2_certify, tpm2_certifycreation, tpm2_changeauth, tpm2_changeeps, tpm2_changepps, tpm2_nvdefine, tpm2_nvextend, tpm2_unseal - Add support to calculate cphash for tpm2_changeeps, tpm2_changepps. - Session-support: - tpm2_sessionconfig: Add tool to display and configure session attributes. - tpm2_getrandom: Fix— session input was hardcoded for audit-only - tpm2_startauthsession: Add option to specify the bind object and its authorization value. - tpm2_startauthsession: support for bounded-only session. - tpm2_startauthsession: support for salted-only session. - tpm2_startauthsession: add option to specify an hmac session type. - Add support for specifying non-authorization sessions for audit and parameter encryption for tpm2_getrandom, tpm2_create, tpm2_nvextend, tpm2_nvdefine, tpm2_unseal, tpm2_activatecredential, tpm2_certify, tpm2_certifycreation, tpm2_changeauth, tpm2_changeeps, tpm2_changepps. - tpm2_eventlog: - Support for event type: EV_IPL extensively used by the Shim and Grub. - Support for event type: EV_EFI_GPT_EVENT to parse. UEFI_PARTITION_TABLE_HEADER and UEFI_PARTITION_ENTRY. - Support for event type: EFI_SIGNATURE_LIST, which contains one or more EFI_SIGNATURE_DATA. - Support for event type EV_EFI_VARIABLE_AUTHORITY. - Parse UEFI_PLATFORM_FIRMWARE_BLOB structure that the CRTM MUST put into the Event Log entry TCG_PCR_EVENT2.event field for event types EV_POST_CODE, EV_S_CRTM_CONTENTS, and EV_EFI_PLATFORM_FIRMWARE_BLOB. - Parse secureboot variable to indicate enable as 'Yes'. - Parse BootOrder variable to a more readable format. - Parse Boot variables per EFI_LOAD_OPTION described in more details in UEFI Spec Section 3.1.3 - Parse Device-path in a readable format using the efivar library. - Support for logs longer than 64 kilobytes. - Perform verification for event types where digest can be verified from their event payload. - Better support for multiline strings. - Fix handling of event log EV_POST_CODE data where field is empty and len is specified. - scripts/utils: Add a utility to read the cert chain of embedded CA. - tpm2_getekcertificate: Fix tool failing to return error/non-zero for HTTP 404. - tpm2_nvdefine: allow setting hash algorithm by command line parameter for NV indices set in extend mode. - tpm2_duplicate, tpm2_import: support duplicating non-TPM keys to a remote TPM without first requiring them to be loaded to a local TPM. - tpm2_dictionarylockout: Fix issue where setting value for one parameter caused to reset the others. - tpm2_getpolicydigest: Add new tool to enable TPM2_CC_PolicyGetDigest. - Fix segfault where optind > argc. - tools/tpm2_checkquote: fix missing initializer - tpm2_convert: fix EVP_EncodeUpdate usage for OSSL < 1.1.0 - openssl: fix EVP_ENCODE_CTX_(new|free) - test: Add support for swTPM simulator to the testing framework and make it the default if mssim isn't available. - tpm2_unseal: - Added option **\--rphash**=_FILE_ to specify ile path to record the hash of the response parameters. This is commonly termed as rpHash. - tpm2_nvextend: - Added option **\--rphash**=_FILE_ to specify ile path to record the hash of the response parameters. This is commonly termed as rpHash. - tpm2_nvdefine: - Added option **\--rphash**=_FILE_ to specify ile path to record the hash of the response parameters. This is commonly termed as rpHash. - tpm2_changepps: - Added option **\--cphash**=_FILE_ to specify ile path to record the hash of the command parameters. This is commonly termed as cpHash. - Added option **\--rphash**=_FILE_ to specify ile path to record the hash - Added option **-S**, **\--session** to specify to specify an auxiliary session for auditing and or encryption/decryption of the parameters. - tpm2_changeeps: - Added option **\--cphash**=_FILE_ to specify ile path to record the hash of the command parameters. This is commonly termed as cpHash. - Added option **\--rphash**=_FILE_ to specify ile path to record the hash of the response parameters. This is commonly termed as rpHash. - Added option **-S**, **\--session** to specify to specify an auxiliary session for auditing and or encryption/decryption of the parameters. - tpm2_changeauth: - Added option **\--rphash**=_FILE_ to specify ile path to record the hash of the response parameters. This is commonly termed as rpHash. - Added option **-S**, **\--session** to specify to specify an auxiliary session for auditing and or encryption/decryption of the parameters. - tpm2_certifycreation: - Added option **\--rphash**=_FILE_ to specify ile path to record the hash of the response parameters. This is commonly termed as rpHash. - Added option **-S**, **\--session** to specify to specify an auxiliary session for auditing and or encryption/decryption of the parameters. - tpm2_certify: - Added option **\--rphash**=_FILE_ to specify ile path to record the hash of the response parameters. This is commonly termed as rpHash. - Added option **-S**, **\--session** to specify to specify an auxiliary session for auditing and or encryption/decryption of the parameters. - tpm2_activatecredential: - Added option **\--rphash**=_FILE_ to specify ile path to record the hash of the response parameters. This is commonly termed as rpHash. - Added option **-S**, **\--session** to specify to specify an auxiliary session for auditing and or encryption/decryption of the parameters. - tpm2_create: - Added option **\--rphash**=_FILE_ to specify ile path to record the hash of the response parameters. This is commonly termed as rpHash. - tpm2_unseal: - Added option **-S**, **--session** to specify auxiliary sessions for audit and encryption. - tpm2_nvdefine: - Added option **-S**, **--session** to specify auxiliary sessions for audit and encryption. - tpm2_nvextend: - Added option **-S**, **--session** to specify auxilary sessions for audit and encryption.- fix `--version` output of tools. Since now autoreconf is called and configure.ac attempts to fetch the version from git (which we don't have during building), the version was empty. Fix this by replacing the git invocation in configure.ac.- add fix_warnings.patch: fixes a couple of build errors resulting from LTO linking and -Werror. - add fix_pie_linking.patch: fixes an error in the build system that causes the tss2 binary to be linked without passed LDFLAGS (like -pie), which causes the binary not to be position independent. - update to major version 5.0: - Non Backwards Compatible Changes * Default hash algorithm is now sha256. Prior versions claimed sha1, but were inconsistent in choice. Best practice is to specify the hash algorithm to avoid surprises. * tpm2_tools and tss2_tools are now a busybox style commandlet. Ie tpm2_getrandom becomes tpm2 getrandom. make install will install symlinks to the old tool names and the tpm2 commandlet will interrogate argv[0] for the command to run. This will provide backwards compatibility if they are installed. If you wish to use the old names not installed system wide, set DESTDIR during install to a separate path and set the proper directory on PATH. * tpm2_eventlog's output changed to be YAML compliant. The output before was intended to be YAML compliant but was never properly checked and tested. * umask set to 0117 for all tools. * tpm2_getekcertificate now outputs the INTC EK certificates in PEM format by default. In order to output the URL safe variant of base64 encoded output of the INTC EK certificate use the added option --raw. - Dependency update * Update tpm2-tss dependency version to 3.0.1 * Update tpm2-abrmd dependency version to 2.3.3 - New tools and features * tpm2_zgen2phase: Add new tool to support command TPM2_CC_ZGen_2Phase. * tpm2_ecdhzgen: Add new tool to support command TPM2_CC_ECDH_ZGen. * tpm2_ecdhkeygen: Add new tool to support command TPM2_CC_ECDH_KeyGen. * tpm2_commit: Add new tool to support command TPM2_CC_Commit. * tpm2_ecephemeral: Add new tool to support command TPM2_CC_EC_Ephemeral. * tpm2_geteccparameters: Add new tool to support command TPM2_CC_ECC_Parameters. * tpm2_setcommandauditstatus: Added new tool to support command TPM2_CC_SetCommandCodeAuditStatus. * tpm2_getcommandauditstatus: Added new tool to support command TPM2_CC_GetCommandAuditDigest. * tpm2_getsessionauditdigest: Added new tool to support command TPM2_CC_GetSessionAuditDigest. * tpm2_certifyX509certutil: Added new tool for creating partial x509 certificates required to support the TPM2_CC_CertifyX509 command. * tpm2_policysigned: Added option --cphash-input to specify the command parameter hash (cpHashA), enforcing the TPM command to be authorized as well as its handle and parameter values. * tpm2_createprimary: Added option to specify the unique data from the stdin by adding provision for specifying the option value for unique file as -. * tpm2_startauthsession: Added new feature/option --audit-session to start an HMAC session to be used as an audit session. * tpm2_getrandom: - Added new feature/option -S, --session to specify a HMAC session to be used as an audit session. This adds support for auditing the command using an audit session. - Added new feature/option --rphash to specify file path to record the hash of the response parameters. This is commonly termed as rpHash. - Added new feature/option --cphash to specify a file path to record the hash of the command parameters. This is commonly termed as cpHash. NOTE: In absence of --rphash option, when this option is selected, The tool will not actually execute the command, it simply returns a cpHash. * tpm2_getcap: tpm2_getcap was missing raw on a property TPM2_PT_REVISION, and it should always be specified. * tpm2_sign: - Add option --commit-index to specify the commit index to use when performing an ECDAA signature. - Add support for ECDAA signature. * tpm2_getekcertificate: - Add option --raw to output EK certificate in URL safe variant base64 encoded format. By default it outputs a PEM formatted certificate. - The tool can now output INTC and non INTC EK certificates from NV indices specified by the TCG EK profile specification. * tpm2_activatecredential: - The secret data input can now be specified as stdin with -s option. - The public key used for encryption can be specified as -u to make it similar to rest of the tools specifying a public key. The old -e option is retained for backwards compatibility. - Add option to specify the key algorithm when the input public key is in PEM format using the new option -G, --key-algorithm. Can specify either RSA/ECC. When this option is used, input public key is expected to be in PEM format and the default TCG EK template is used for the key properties. * tpm2_checkqoute: - Add EC support. - Support loading tss signatures. - Support loading tpm2 pcrread PCR values by specifying the PCR selection using the new option -l, --pcr-list. - Added support for automatically detecting the signature format. With this -F, --format option is retained for backwards compatibility but it is deprecated. * tpm2_createak: add option to output qualified name with new option - q, --ak-qualified-name. * tpm2_policypcr: Add option for specifying cumulative hash of PCR's as an argument. * tpm2_readpublic: Add option to output qualified name using the new option - q, --qualified-name. * tpm2_print: - Support printing TPM2B_PUBLIC data structures. - Support printing TPMT_PUBLIC data structures. * tpm2_send: Add support for handling sending and receiving command and response buffer for multiple commands. * tpm2_verifysignature: Added support for verifying RSA-PSS signatures. * tpm2_eventlog: - Add handling of sha1 log format. - Add fixes for eventlog output to be proper YAML. - Add support for sha384, sha512, sm3_256 PCR hash algorithms. - Add support for computing PCR values based on the events. * tpm2_tools (all): - Set stdin/stdout to non-buffering. - Added changes for FreeBSD portability. - Bug fixes * Fix printing short options when no ascii character is used. * OpenSSL: Fix deprecated OpenSSL functions. ECC Functions with suffix GFp will become deprecated (DEPRECATED_1_2_0). * tpm2_eventlog: output EV_POST_CODE as string not firmware blob to be compliant with TCG PC Client FPF section 2.3.4.1 and 9.4.12.3.4.1 * Fix missing handle maps for ESY3 handle breaks. See #1994. * tpm2_rsaencrypt: fix OAEP RSA encryption failing to invalid hash selection. * tpm2_rsadecrypt: fix OAEP RSA decryption failing to invalid hash selection. * tpm2_sign: fix for signing failures with restricted signing keys when input data to sign is not a digest, rather the full message. The validation ticket creation process defaults to the owner hierarchy and so in order to choose other hierarchies the tpm2_hash tool should be used instead. * tpm2_print: fix segfault when -t option is omitted by appropriately warning of the required option. * tpm2_nvdefine: fix for default size when size is not specified by invoking TPM2_CC_GetCapability. * Fix for an issue where the return code for unsupported algorithms was tool_rc_general instead of tool_rc_unsupported in tpm2_create and tpm2_createprimary tools. * Fix for an issue where RSA_PSS signature verification caused failures. * tpm2_nvreadpublic, tpm2_kdfa, tpm2_checkquote, tpm2_quote: Fixes for issues with interoperability of the attestation tools between big and little endian platforms. * tss2_*: - Fix bash-completion for tss2_pcrextend and tss2_verifysignature - Add force option to tss2_list - Make force option consistent in all fapi tools - Do not decode non-TPM errors - Enhance integration tests to test changes of optional/mandatory parameters - Add --hex parameter to tss2_getrandom - Fix autocompletion issue - Switch tss2_* to with-"="-style - Add size parameter to tss2_createseal - References to the cryptographic profile (fapi-profile(5)) and config file - (fapi-config(5)) man pages from all relevant tss2_* man pages. - Fix policy branch selection menu item from 1 to 0. - Documentation * wiki pages have been removed and data has been migrated to tpm2-software.github.io portal's tutorial section. * Fix the problem with man and no-man help output for tools were not correctly displayed. * man: - tpm2_create: Correct max seal data size from 256 bytes to 128 bytes. - tpm2_nvread: Fix manpage example. - tpm2_nvwrite: Added missing information on how to specify the NV index as an argument. - tpm2_unseal: Add end-to-end example. - tpm2_nvincrement: Fix incorrect commands in example section. - tpm2_hmac: Fix the example section.- update to version 4.3: - changes in version 4.3: - tss2_*: Fix double-free errors in commands asking for password authorization - tss2_*: Fix shorthand command -f that was falsely requiring an argument - tss2_*: Update tss2_encrypt to the new FAPI interface - The argument 'policyPath' is removed which was never read anyway - tss2_*: Remove the additional '\n' that was appended when redirecting to stdout - tss2_*: Update mandatory vs optional treatment of arguments according to latest Fapi spec - tss2_*: tss2_getinfo now retrieves the correct FAPI version from Fapi_GetInfo - tss2_*: Fix the error handling in case of multiple inputs and/or outputs from stdin/stdout - tss2_*: Fix syntax errors and update content of man pages according to latest Fapi spec - tss2_*: Add parameter types to all man page - tss2_*: tss2_setappdata now reads from file or stdin allowing to store also binary data - tss2_*: Memory leaks are fixed in cases when a returned empty non-char output value was passed to file output - tss2_pcrextend: fix extending PCR 0 - tss2_quote: fix unused TSS2_RC in LOG_ERR - changes in 4.2.1: - Fix missing handle maps for ESY3 handle breaks. See #1994. - Bump ESYS minimum dependency version from 2.3.0 to 2.4.0. - Fix for loop declarations build error. - changes in 4.2: - Fix various issues reported by static analysis tools. - Add integration test for ECC based getekcertificate. - Fix for issue #1959 where ARM builds were failing. - Add a check in autotools to add "expect" as a package dependency for fapi tools. - tpm2_createek: Drop the unused -p or --ek-auth option - tpm2_policyor: List of policy files should be specified as an argument - instead of -l option. The -l option is still retained for backwards - compatibility. See issue#1894. - tpm2_eventlog: add a tool for parsing and displaying the event log. - tpm2_createek: Fix an issue where the template option looked for args - tpm2_hierarchycontrol: Fixed bug where tool operation failed silently - tpm2_nvdefine: Fixed an issue where text output suggested failures as passes - tpm2_certify: Add an example usage in man page - tpm2_policyor: Fix a bug where tool failed silently when no input were given - tpm2_getekcertificate: Intel (R) PTT EK cert web portal is set as default address - tpm2_alg_util.c: Fix a bug where string rsa3072 was not parsed - .ci/download-deps.sh: Change tss dependency to 2.4.0 to acquire SAPI handles for cpHash calculations - tpm2_policycphash: Add a tool to implement enhanced authorization with cpHash of a command - Add options to tools to enable cpHash outputs: tpm2_nvsetbits, tpm2_nvextend, tpm2_nvincrement, tpm2_nvread, tpm2_nvreadlock, tpm2_writelock, tpm2_nvdefine, tpm2_nvundefine, tpm2_nvcertify, tpm2_policynv, tpm2_policyauthorizenv, tpm2_policysecret, tpm2_create, tpm2_load, tpm2_activatecredential, tpm2_unseal, tpm2_changeauth, tpm2_duplicate, tpm2_import, tpm2_rsadecrypt, tpm2_certify, tpm2_certifycreation, tpm2_hierarchycontrol, tpm2_setprimarypolicy, tpm2_clearcontrol, tpm2_dictionarylockout, tpm2_evictcontrol, tpm2_setclock, tpm2_clockrateadjust, tpm2_clear, tpm2_nvwrite, tpm2_encryptdecrypt, tpm2_hmac. - tpm2_import: Fix an issue where the imported key always required to have a policy - tpm2_policysecret: Fix an issue where authorization model was fixed to password only - Feature API (FAPI) tools added. These additional set of tools implement utilities - using the FAPI which was added to the tpm2-tss v2.4.4: tss2_decrypt, tss2_encrypt, tss2_list, tss2_changeauth, tss2_delete, tss2_import, tss2_getinfo, tss2_createkey, tss2_createseal, tss2_exportkey, tss2_getcertificate, tss2_getplatformcertificates, tss2_gettpmblobs, tss2_getappdata, tss2_setappdata, tss2_setcertificate, tss2_sign, tss2_verifysignature, tss2_verifyquote, tss2_createnv, tss2_nvextend, tss2_nvincrement, tss2_nvread, tss2_nvsetbits, tss2_nvwrite, tss2_getdescription, tss2_setdescription, tss2_pcrextend, tss2_quote, tss2_pcrread, tss2_authorizepolicy, tss2_exportpolicy, tss2_import, tss2_provision, tss2_getrandom, tss2_unseal, tss2_writeauthorizenv - tpm2_policycountertimer: Fix an issue where operandB array was reversed causing faulty comparisons. - changes in 4.1.1: - tpm2_certify: Fix output of attestation data including size field. Now outputs just bytes. - tpm2_certifycreation: Fix tool to match manpage where the code had the -C and -c options reversed. - tpm2_gettime: Fix output of attestation data including size field. Now outputs just bytes. - tpm2_nvcertify: Fix output of attestation data including size field. Now outputs just bytes. - tpm2_nvreadpublic: add name hash output. - tpm2_import: Support object policies when importing raw key material. - Fix overflow in pcrs.h where sizeof() was used instead of ARRAY_LEN(). - build: - Fix compilation issue: lib/tpm2_hash.c:17:19: note: 'left' was declared here. - man: - Fix manpage examples that have "sha" instead of "sha1" - tpm2_shutdown manpage was missing, add it to build. - Fix manpage example for tpm2_createak's tpm2_evictcontrol example. - Remove fix_bad_bufsize.patch: is now contained in upstream tarball - Adjust fix_bogus_warning.patch: one hunk no longer applies, upstream code changed.- add fix_bad_bufsize.patch: fixes findings from compile time fread() checks that indicate bad buffer size specification. - add fix_bogus_warning.patch: fixes `maybe-unitialized` warnings that are bogus, since the variables in questions will be initialized in any case later on.- update to major version 4.1: - changes in version 4.1: * tpm2_certifycreation: New tool enabling command TPM2_CertifyCreation. * tpm2_checkquote: - Fix YAML output bug. - -g option for specifying hash algorithm is optional and defaults to sha256. * tpm2_changeeps: A new tool for changing the Endorsement hierarchy primary seed. * tpm2_changepps: A new tool for changing the Platform hierarchy primary seed. * tpm2_clockrateadjust: Add a new tool for modifying the period on the TPM. * tpm2_create: Add tool options for specifying output data for use in certification - --creation-data to save the creation data - --creation-ticket or -t to save the creation ticket - --creation-hash or -d to save the creation hash - --template-data for saving the template data of the key - --outside-info or -q for specifying unique data to include in creation data. - --pcr-list or -l Add option to specify pcr list to add to creation data. * tpm2_createprimary: Add tool options for specifying output data for use in certification - --creation-data to save the creation data - --creation-ticket or -t to save the creation ticket - --creation-hash or -d to save the creation hash - --template-data for saving the template data of the key - --outside-info or -q for specifying unique data to include in creation data. - --pcr-list or -l Add option to specify pcr list to add to creation data. * tpm2_evictcontrol: - Fix bug in automatic persistent handle selection when hierarchy is platform. - Fix bug in YAML key action where action was wrong when using ESYS_TR. * tpm2_getcap: clean up remanenats of -c option in manpages and tool output. * tpm2_gettime: Add a new tool for retrieving a signed timestamp from a TPM. * tpm2_nvcertify: Add a new tool for certifying the contents of an NV index. * tpm2_nvdefine: - Support default set of attributes so -a is not mandatory. - Support searching for free index if an index isn't specified. * tpm2_nvextend: Add a new tool for extending an NV index similair to a PCR. * tpm2_nvreadpublic: - Support specifying nv index to read public data from as argument. * tpm2_nvsetbits: Add a new tool for setting the values of PCR with type "bits". * tpm2_nvundefine: Add support for deleting NV indices with attribute `TPMA_NV_POLICY_DELETE` set using NV Undefine Special command. * tpm2_nvwritelock: Add a new tool for setting a write lock on an NV index or globally locking nv indices with TPMA_NV_GLOBALLOCK. * tpm2_policyauthorizenv: New tool enabling signed, revocable policies. * tpm2_policyauthvalue: New tool enabling authorization to be bound to the authorization of another object. * tpm2_policycountertimer: Add a new tool for enabling policy bound to TPM clock or timer values. * tpm2_policynamehash: Add a new tool for specifying policy based on object name. * tpm2_policynv: Add a new tool for specifying policy based on NV contents. * tpm2_nvwritten: Add a new tool for specifying policy based on whether or not an NV index was written to. * tpm2_policysecret: Add tool options for specifying - --expiration or -t - --ticket - --timeout - --nonce-tpm or -x - --qualification or -q * tpm2_policysigned: New tool enabling policy command TPM2_PolicySigned. * tpm2_policytemplate: New tool enabling policy command TPM2_PolicyTemplate. * tpm2_policyticket: New tool enabling policy command TPM2_PolicyTicket. * tpm2_readclock: Add a new tool for reading the TPM clock. * tpm2_setclock: Add a new tool for setting the TPM clock. * tpm2_setprimarypolicy: New tool setting policy on hierarchies. * tpm2_shutdown: Add a new tool for issuing a TPM shutdown command. * misc: - Support "tpmt" as a public key output format that only saves the TPMT structure. - Qualifying data or extra data in many tools can be hex array string or binary file. - Add support for specifying NV index type when specifying NV attributes. - Support added for tools to run on FreeBSD. - Skip and notify of action that man pages will not install if the package pandoc is missing. - Fix precedence issue with bitwise operator order int tpm2_getcap - travis: bump abrmd version 2.3.0 - tpm2_util.c: Fix an issue int variable size was checked against uint - pcr.c: Fix buffer length issue to support all defined hash algorithm - changes in version 4.0.1: * tpm2_checkquote: Fix YAML output bug. - changes in version 4.0: * tpm2_activatecredential: - --context is now --credentialedkey-context. - --key-context is now --credentialkey-context. - --Password is now --credentialedkey-auth. - --endorse-passwd is now --credentialkey-auth. - --in-file is now --credential-secret. - --out-file is now --certinfo-data. - -f becomes -i. - -k becomes -C. - -e becomes -E. * tpm2_certify: - --halg is now --hash-algorithm. - --obj-context is now --certifiedkey-context. - --key-context is now --signingkey-context. - --pwdo is now --certifiedkey-auth. - --pwdk is now --signingkey-auth. - -a becomes -o. - -k becomes -p. - -c becomes -C. - -k becomes -K. * tpm2_changeauth: - New tool for changing the authorization values of: - Hierarchies - NV - Objects - Replaces tpm2_takeownership with more generic functionality. * tpm2_checkquote: - --halg is now --hash-algorithm. - --pcr-input-file is now --pcr. - --pubfile is now --public. - --qualify-data is now --qualification. - -f becomes -F. - -F becomes -f. - -G becomes -g. * tpm2_clear: - --lockout-passwd is now --auth-lockout. * tpm2_clearcontrol: - New tool for enabling or disabling tpm2_clear commands. * tpm2_create - --object-attributes is now --attributes. - --pwdp is now --parent-auth. - --pwdo is now --key-auth. - --in-file is now --sealing-input. - --policy-file is now --policy. - --pubfile is now --public. - --privfile is now --private. - --out-context is now --key-context. - --halg is now --hash-algorithm. - --kalg is now --key-algorithm. - -o becomes -c. - -K becomes -p. - -A becomes -b. - -I becomes -i. - -g becomes an optional option. - -G becomes an optional option. - Supports TPM command CreateLoaded via -c. * tpm2_createak: - Renamed from tpm2_getpubak * tpm2_createek: - renamed from tpm2_getpubek * tpm2_createpolicy: - --out-policy-file is now --policy. - --policy-digest-alg is now --policy-algorithm. - --auth-policy-session is now --policy-session. - -L becomes -l. - -F becomes -f. - -f becomes -o. - Removed option --set-list with short option -L. - Removed option --pcr-input-file with short option -F. - Pcr policy options replaced with pcr password mini language. - Removed short option a for specifying auth session. Use long option --policy-session. - Removed short option -P for specifying pcr policy. Use long option --policy-pcr. * tpm2_createprimary: - --object-attributes is now --attributes. - -o is now -c - --pwdp is now --hierarchy-auth. - --pwdk is now --key-auth. - --halg is now --hash-algorithm. - --kalg is now --key-algorithm. - --context-object is now --key-context. - --policy-file is now --policy. - support for unique field when creating objects via -u - saves a context file for the generated primary's handle to disk via -c. - -A becomes -a. - -K becomes -p. - -H becomes -C. - -g becomes optional. - -G becomes optional. * tpm2_dictionarylockout: - --lockout-passwd is now --auth. - -P becomes -p. * tpm2_duplicate: - New tool for duplicating TPM objects. * tpm2_encryptdecrypt: - --pwdk is now --auth. - --out-file is now --output. - -D becomes -d. - -I becomes an argument. - -P becomes -p. - Support IVs via -t or --iv. - Support modes via -G. - Support padding via -e or --pad. - Supports input and output to stdin and stdout respectively. * tpm2_evictcontrol: - --auth is now --hierarchy. - --context is now --object-context. - --pwda is now --auth. - --persistent with short option -S is now an argument. - -A becomes -C. - Added option --output -o to serialize handle to disk. - Removed option --handle with short option -H. - Raw object-handles and object-contexts are commonly handled with object handling logic. - Removed option --input-session-handle with short option -i. - Authorization session is now part of password mini language. * tpm2_getcap: - -c becomes an argument. - Most instances of value replaced with raw in YAML output. - TPM2_PT_MANUFACTURER displays string value and raw value. - Supports --pcr option for listing hash algorithms and bank numbers. * tpm2_getekcertificate: - Renamed from tpm2_getmanufec * tpm2_getmanufec: - Renamed the tool to tpm2_getekcertificate. - Removed ek key creation and management logic. - Added option for getting ek cert for offline platform via -x. - Support for ECC keys. - --ec-cert is now --ek-certificate, - --untrusted is now --allow-unverified, - --output is now --ek-public, - -U is now -X. - -O is now -x. - -f becomes -o. - Removed option -P or --endorse-passwd. - Removed option -p or --ek-passwd. - Removed option -w or --owner-passwd. - Removed option -H or --persistent-handle. - Removed option -G or --key-algorithm. - Removed option -N or --non-persistent. - Removed option -O or --offline. * tpm2_getpubak: - renamed to tpm2_createak. - -f becomes -p and -f is used for format of public key output. - --auth-endorse is now --eh-auth. - --auth-ak is now --ak-auth. - --halg is now --hash-algorithm. - --kalg is now --key-algorithm. - -e becomes -P. - -P becomes -p. - -D becomes -g. - -p becomes -u. - --context becomes --ak-context. - --algorithm becomes --kalg. - --digest-alg becomes --halg. - --privfile becomes --private. - remove -k persistant option. Use tpm2_evictcontrol. - Fix -o option to -w. - now saves a context file for the generated primary's handle to disk. - -E becomes -e. - -g changes to -G. - support for non-persistent AK generation. * tpm2_getpubek: - renamed to tpm2_createek - --endorse-passwd is now --eh-auth. - --owner-passwd is now --owner-auth. - --ek-passwd is now --ek-auth. - --file is now --public. - --context is now --ek-context. - --algorithm is now --key-algorithm. - -e is now -P. - -P is now -p. - -p is now -u. - -o is now -w. - -g is now -G. - Support for saving a context file for the generated primary keys handle to disk. - support for non-persistent EK generation. - -f is now -p. - -f support for format of public key output. * tpm2_getrandom: - change default output to binary. - add --hex option for output to hex format. - --out-file is now --output. - bound input request on max hash size per spec, allow -f to override this. * tpm_gettestresult: - new tool for getting test results. * tpm2_hash: - add --hex for specifying hex output. - default output of hash to stdout. - default output of hash as binary. - remove output of ticket to stdout. - --halg is now --hash-algorithm. - --out-file is now --output. - -a is now -C. - -H is now -a. * tpm2_hmac: - add -t option for specifying ticket result. - --out-file is now --output. - --auth-key is now --auth. - --algorithm is now --hash-algorithm. - --pwdk is now --auth-key. - -C is now -c. - -P is now -p. * tpm2_hierarchycontrol: - new tool added for enabling or disabling the use of a hierarchy and its associated NV storage. * tpm2_import: - --object-attributes is now --attributes. - --auth-parent is now --parent-auth. - --auth-key is now --key-auth. - --algorithm is now --key-algorithm. - --in-file is now --input. - --parent-key is now --parent-context. - --privfile is now --private. - --pubfile is now --public. - --halg is now --hash-algorithm. - --policy-file is now --policy. - --sym-alg-file is now --encryption-key. - -A is now -b. - -k is now -i. - support OSSL style -passin argument as --passin for PEM file passwords. - support additional import key types: - RSA1024/2048. - AES128/192/256. - -q changes to -u to align with tpm2_loads public/private output arguments. - Supports setting object name algorithm via -g. - support specifying parent key with a context file. - --parent-key-handle/-H becomes --parent-key/-C - Parent public data option is optional and changes from `-K` to `-U`. - Supports importing external RSA 2048 keys via pem files. - Supports ECC Parent keys. * tpm2_incrementalselftest: - Add tool to test support of specific algorithms. * tpm2_listpersistent: - deleted as tpm2_getcap and tpm2_readpublic can be used instead. * tpm2_load: - -o is now -c. - --context-parent is now --parent-context. - --auth-parent is now --auth. - --pubfile is now --public. - --privfile is now --private. - --out-context is now --key-context. - now saves a context file for the generated primary's handle to disk. - Option `--pwdp` changes to `--auth-parent`. * tpm2_loadexternal: - --object-attributes is now --attributes. - -o is now -c - --key-alg is now --key-algorithm. - --pubfile is now --public. - --privfile is now --private. - --auth-key is now --auth. - --policy-file is now --policy. - --halg is now --hash-algorithm. - --out-context is now --key-context. - Remove unused -P option. - -H is now -a. - Fix -A option to -b for attributes. - now saves a context file for the generated primary's handle to disk. - support OSSL style -passin argument as --passin for PEM file passwords. - name output to file and stdout. Changes YAML stdout output. - ECC Public and Private PEM support. - AES Public and Private "raw file" support. - RSA Public and Private PEM support. - Object Attribute support. - Object authorization support. - Default hierarchy changes to the *null* hierarchy. * tpm2_makecredential: - --out-file is now --credential-blob - --enckey is now --encryption-key. - Option `--sec` changes to `--secret`. * tpm2_nvdefine: - --handle-passwd is now --hierarchy-auth. - --index-passwd is now --index-auth. - --policy-file is now --policy. - --auth-handle is now --hierarchy. - -a becomes -C. - -t becomes -a. - -I becomes -p. - Removed option --index with short option -x. It is now an argument. - Removed option --input-session-handle with short option -S. - Authorization session is now part of password mini language. * tpm2_nvincrement: - New tool to increment value of a Non-Volatile (NV) index setup as a counter. * tpm2_nvlist: - tpm2_nvlist is now tpm2_nvreadpublic. * tpm2_nvread: - --handle-passwd is now --auth. - --auth-handle is now --hierarchy. - -a becomes -C. - Removed option --index with short option -x. It is now an argument. - Removed short option -o for specifying offset. Use long option --offset. - Removed option --input-session-handle with short option -S. - Authorization session is now part of password mini language. - Removed option --set-list with short option -L. - Removed option --pcr-input-file with short option -F. - Pcr policy options replaced with pcr password mini language. - fix a buffer overflow. * tpm2_nvreadlock: - --handle-passwd is now --auth. - --auth-handle is now --hierarchy. - -a becomes -C. - Removed option --index with short option -x. It is now an argument. - Removed option --input-session-handle with short option -S. - Authorization session is now part of password mini language. * tpm2_nvwrite: - --handle-passwd is now --auth. - --auth-handle is now --hierarchy. - -a becomes -C. - Removed option --index with short option -x. It is now an argument. - Removed short option -o for specifying offset. Use long option --offset. - Removed option --input-session-handle with short option -S. - Authorization session is now part of password mini language. - Removed option --set-list with short option -L. - Removed option --pcr-input-file with short option -F. - Pcr policy options replaced with pcr password mini language. * tpm2_nvrelease: - --handle-passwd is now --auth. - --auth-handle is now --hierarchy. - -a becomes -C. - Removed option --index with short option -x. It is now an argument. - Removed option --input-session-handle with short option -S. - Authorization session is now part of password mini language. * tpm2_nvundefine: - Renamed from tpm2_nvrelease. * tpm2_pcrallocate: - New tool for changing the allocated PCRs of a TPM. * tpm2_pcrevent: - --password is now --auth. - Removed option --pcr-index with short option -i. - PCR index is now specified as an argument. - Removed option --input-session-handle with short option -S. - Authorization session is now part of password mini language. * tpm2_pcrlist: - -gls options go away with -g and -l becoming a single argument. * tpm2_pcrread: - Renamed from tpm2_pcrlist. * tpm2_print: - New tool that decodes a TPM data structure and prints enclosed elements to stdout as YAML. * tpm2_policyauthorize: - New tool that allows for policies to change by associating the policy to a signing authority essentially allowing the auth policy to change. * tpm2_policycommandcode: - New tool to restricts TPM object authorization to specific TPM commands. * tpm2_policyduplicationselect: - New tool for creating a policy to restrict duplication to a new parent and or duplicable object. * tpm2_policylocality: - New tool for creating a policy restricted to a locality. * tpm2_policypcr: - New tool to generate a pcr policy event that bounds auth to specific PCR values in user defined pcr banks and indices. * tpm2_policyor: - New tool to compound multiple policies in a logical OR fashion to allow multiple auth methods using a policy session. * tpm2_policypassword: - New tool to mandate specifying of the object password in clear using a policy session. * tpm2_policysecret: - New tool to associate auth of a reference object as the auth of the new object using a policy session. * tpm2_quote: - --ak-context is now --key-context. - --ak-password is now --auth. - --sel-list is now --pcr-list. - --qualify-data is now --qualification-data. - --pcrs is now --pcr. - --sig-hash-algorithm is now --hash-algorithm. - -P becomes -p - -L becomes -l. - -p becomes -o. - -G becomes -g. - -g becomes optional. - Removed option --id-list with short option -l. - Removed option --ak-handle with short option -k. - Raw object-handles and object-contexts are commonly handled with object handling logic. * tpm2_readpublic: - --opu is now --output. - --context-object is now --object-context. - Removed option --object with short option -H. - Raw object-handles and object-contexts are commonly handled with object handling logic. - Added --serialized-handle for saving serialized ESYS_TR handle to disk. - Added --name with short option -n for saving the binary name. - Supports ECC pem and der file generation. * tpm2_rsadecrypt: - --pwdk is now --auth. - --out-file is now --output. - -P becomes -p. - Added --label with short option -l for specifying label. - Added --scheme with short option -s for specifying encryption scheme. - Removed option -I or in-file input option and make argument. - Removed option --key-handle with short option -k. - Raw object-handles and object-contexts are commonly handled with object handling logic. - Removed option --input-session-handle with short option -S. - Authorization session is now part of password mini language. * tpm2_rsaencrypt: - --out-file is now --output. - Added --scheme with short option -s for specifying encryption scheme. - Added --label with -l for specifying label. - Removed option --key-handle with short option -k. - Raw object-handles and object-contexts are commonly handled with object handling logic. - make output binary either stdout or file based on -o. * tpm2_selftest: - New tool for invoking tpm selftest. * tpm2_send: - --out-file is now --output. * tpm2_sign: - --pwdk is now --auth. - --halg is now --hash-algorithm. - --sig is now --signature. - -P becomes -p. - -s becomes -o. - Added --digest with short option -d. - Added --scheme with short option -s. - Supports rsapss. - Removed option --key-handle with short option -k. - Raw object-handles and object-contexts are commonly handled with object handling logic. - Removed option --msg with short option -m. - Make -d toggle if input is a digest. - Removed option --input-session-handle with short option -S. - Authorization session is now part of password mini language. - Supports signing a pre-computed hash via -d. * tpm2_startauthsession: - New tool to start/save a trial-policy-session (default) or policy- authorization-session with command line option --policy-session. * tpm2_stirrandom: - new command for injecting entropy into the TPM. * tpm2_takeownership: - split into tpm2_clear and tpm2_changeauth * tpm2_testparms: - new tool for querying tpm for supported algorithms. * tpm2_unseal: - --pwdk is now --auth. - --outfile is now --output. - --item-context is now --object-context. - -P becomes -p - Removed option --item with short option -H. - Raw object-handles and object-contexts are commonly handled with object handling logic. - Removed option --input-session-handle with short option -S. - Authorization session is now part of password mini language. - Removed option --set-list with short option -L. - Removed option --pcr-input-file with short option -F. - Pcr policy options replaced with pcr password mini language. * tpm2_verifysignature: - --halg is now --hash-algorithm. - --msg is now --message. - --sig is now --signature. - -D becomes -d. - -t becomes optional. - Issue warning when ticket is specified for a NULL hierarchy. - Added option --format with short option -f. - Removed option --raw with short option -r. - Removed option --key-handle with short option -k. - Raw object-handles and object-contexts are commonly handled with object handling logic. - Support routines for OpenSSL compatible format of public keys (PEM, DER) and plain signature data without TSS specific headers. * misc: - cmac algorithm support. - Add support for reading authorisation passwords from a file. - Ported all tools from SAPI to ESAPI. - Load TCTI's by SONAME, not raw .so file. - system tests are now run with make check when --enable-unit is used in configure. - Libre SSL builds fixed. - Dynamic TCTIS. Support for pluggable TCTI modules via the -T or --tcti options. - test: system testing scripts moved into subordinate test directory. - configure: enable code coverage option. - env: add TPM2TOOLS_ENABLE_ERRATA to control the -Z or errata option. affects all tools. - Fix parsing bug in PCR mini-language. - Fix misspelling of TPM2_PT_HR constants which effects tpm2_getcap output. - configure option --with-bashcompdir for specifying bash completion directory. - changes in version 3.2.1: * Fix invalid memcpy when extracting ECDSA plain signatures. * Fix resource leak on FILE * in hashing routine. * Correct PCR logic to prevent memory corruption bug. * Errata handler fix. - changes in version 3.2.0: * fix configure bug for linking against libmu. * tpm2_changeauth: Support changing platform hierarchy auth. * tpm2_flushcontext: Introduce new tool for flushing handles from the TPM. * tpm2_checkquote: Introduce new tool for checking validity of quotes. * tpm2_quote: Add ability to output PCR values for quotes. * tpm2_makecredential: add support for executing tool off-TPM. * tpm2_pcrreset: introduce new tool for resetting PCRs. * tpm2_quote: Fix AK auth password not being used.- update to minor version 3.1.4: * Fix various man pages * tpm2_getmanufec: fix OSSL build warnings * Fix broken -T option * Various build compatibility fixes * Fix some unit tests * Update build for recent autoconf-archive versions * Install m4 files- update to minor version 3.1.3: - Restore support for the TPM2TOOLS_* env vars for TCTI configuration, in addition to supporting the new unified TPM2TOOLS_ENV_TCTI - Fix tpm2_getcap to print properties with the TPM_PT prefix, rather than TPM2_PT - Make test_tpm2_activecredential Python 3 compatible - Fix tpm2_takeownership to only attempt to change the specified hierarchies - use a _service file to sync with upstream tags- update to minor version 3.1.2 (FATE#326270): - Revert the change to use user supplied object attributes exclusively. This is an inappropriate behavioural change for a MINOR version number increment. - Fix inclusion of object attribute specifiers section in tpm2_create and tpm2_createprimary man pages. - Use better object attribute defaults for authentication, preventing an empty password being used for authentication when a policy is set.- update to minor version 3.1.1: - Allow man page installation without pandoc being available- update to major version 3.1.0: - the tpm2 stack introduces an incompatible ABI to the previous version with this update. There is no compatibility layer, libraries have new names - install-man.patch: dropped, because we don't really need it - tpm2.0-tools-fix-hardening.patch: contained in upstream tarball now s etc. - upstream changelog: * tpm2_unseal: -P becomes -p * tpm2_sign: -P becomes -p * tpm2_nvreadlock: long form for -P is now --auth-hierarchy * tpm2_rsadecrypt: -P becomes -p * tpm2_nvrelease: long-form of -P becomes --auth-hierarchy * tpm2_nvdefine: -I becomes -p * tpm2_encryptdecrypt: -P becomes -p * tpm2_dictionarylockout: -P becomes -p * tpm2_createprimary: -K becomes -p * tpm2_createak: -E becomes -e * tpm2_certify: -k becomes -p * tpm2_hash: -g changes to -G * tpm2_encryptdecrypt: Support IVs via -i and algorithm modes via -G. * tpm2_hmac: drop -g, just use the algorithm associated with the object. * tpm2_getmanufec: -g changes to -G * tpm2_createek: -g changes to -G * tpm2_createak: -g changes to -G * tpm2_verifysignature: -g becomes -G * tpm2_sign: -g becomes -G * tpm2_import: support specifying parent key with a context file, - -parent-key-handle/-H becomes --parent-key/-C * tpm2_nvwrite and tpm2_nvread: when -P is "index" -a is optional and defaults to the NV_INDEX value passed to -x. * Load TCTI's by SONAME, not raw .so file * tpm2_activatecredential: -e becomes -E * tpm2_activatecredential: -e becomes -E * tpm2_certify: -c and -C are swapped, -k becomes -K * tpm2_createprimary: -K becomes -k * tpm2_encryptdecrypt: supports input and output to stdin and stdout respectively. * tpm2_create: -g/-G become optional options. * tpm2_createprimary: -g/-G become optional options. * tpm2_verifysignature - Option `-r` changes to `-f` and supports signature format "rsa". * tpm2_import - Parent public data option, `-K` is optional. * tpm2_import - Supports importing external RSA 2048 keys via pem files. * tpm2_pcrlist: Option `--algorithm` changes to `--halg`, which is in line with other tools. * tpm2_verifysignature: Option `-r` and `--raw` have been removed. This were unused within the tool. * tpm2_hmac: Option `--algorithm` changes to `--halg`, which is in line with the manpage. * tpm2_makecredential: Option `--sec` changes to `--secret`. * tpm2_activatecredential: Option `--Password` changes to `--auth-key`. * system tests are now run with make check when --enable-unit is used in configure. * tpm2_unseal: Option `--pwdk` changes to `--auth-key`. * tpm2_sign: Option `--pwdk` changes to `--auth-key`. * tpm2_rsadecrypt: Option `--pwdk` changes to `--auth-key`. * tpm2_quote: Option `--ak-passwd` changes to `--auth-ak` * tpm2_pcrevent: Option `--passwd` changes to `--auth-pcr` * tpm2_nvwrite: Options `--authhandle` and `--handle-passwd` changes to `--hierarchy` and `--auth-hierarchy` respectively. * tpm2_nvread: Options `--authhandle` and `--handle-passwd` changes to `--hierarchy` and `--auth-hierarchy` respectively. * tpm2_nvdefine: Options `--authhandle`, `--handle-passwd` and `--index-passwd` changes to `--hierarchy`, `--auth-hierarchy` and `--auth-index` respectively. * tpm2_loadexternal: `-H` changes to `-a` for specifying hierarchy. * tpm2_load: Option `--pwdp` changes to `--auth-parent`. * tpm2_hmac: Option `--pwdk` changes to `--auth-key`. * tpm2_hash: `-H` changes to `-a` for specifying hierarchy. * tpm2_getmanufec: Options `--owner-passwd`, `--endorse-passwd` * and `--ek-passwd`change to `--auth-owner`, `--auth-endorse` and `--auth-ek` respectively. * tpm2_evictcontrol: Option group `-A` and `--auth` changes to `-a` and `--hierarchy` Option `--pwda` changes to `--auth-hierarchy` * tpm2_encryptdecrypt: Option `--pwdk` changes to `--auth-key`. * tpm2_dictionarylockout: Option `--lockout-passwd` changes to `--auth-lockout` * tpm2_createprimary: Options `--pwdp` and `--pwdk` change to `--auth-hierarchy` and `--auth-object` respectively. * tpm2_createek: Options `--owner-passwd`, `--endorse-passwd` * and `--ek-passwd`change to `--auth-owner`, `--auth-endorse` and `--auth-ek` respectively. * tpm2_createak: Options `--owner-passwd`, `--endorse-passwd` * and `--ak-passwd`change to `--auth-owner`, `--auth-endorse` and `--auth-ak` respectively. * tpm2_create: Options `--pwdo` and `--pwdk` change to `--auth-object` and `--auth-key` respectively. * tpm2_clearlock: Option `--lockout-passwd` changes to `--auth-lockout` * tpm2_clear: Option `--lockout-passwd` changes to `--auth-lockout` * tpm2_changeauth: Options, `--old-owner-passwd`, `--old-endorse-passwd`, and `--old-lockout-passwd` go to `--old-auth-owner`, `--old-auth-endorse`, and `--old-auth-lockout` respectively. * tpm2_certify: Options `--pwdo` and `--pwdk` change to `--auth-object` and `--auth-key` respectively. * tpm2_createprimary: `-H` changes to `-a` for specifying hierarchy. * tpm2_createak: support for non-persistent AK generation. * tpm2_createek: support for non-persistent EK generation. * tpm2_getpubak renamed to tpm2_createak, -f becomes -p and -f is used for format of public key output. * tpm2_getpubek renamed to tpm2_createek, -f becomes -p and -f is used for format of public key output. * Libre SSL builds fixed. * Dynamic TCTIS. Support for pluggable TCTI modules via the -T or --tcti options. * tpm2_sign: supports signing a pre-computed hash via -D * tpm2_clearlock: tool added * test: system testing scripts moved into subordinate test directory. * fix a buffer overflow in nvread/write tools. * configure: enable code coverage option. * tpm2_takeownership: split into tpm2_clear and tpm2_changeauth * env: add TPM2TOOLS_ENABLE_ERRATA to control the -Z or errata option.- fix build after adding install-man.patch: autoreconf is needed again (sigh!)- install-man.patch: even after update to 3.0.4 the man pages are not installed correctly. This patch fixes it locally.- update to version 3.0.4: - Fix save and load for TPM2B_PRIVATE object. - Use a default buffer size for tpm2_nv{read,write} if the TPM reports a 0 size. - Fix --verbose and --version options crossover. - Generate man pages from markdown and include them in the distribution tarball. - Print usage summary if tools are executed with no options or man page can't be displayed. - man pages will be shipped for SLE version now, too (pandoc dependency was removed)- disable pandoc for all but openSUSE, since pandoc never was on SLE- disable pandoc/man pages generation on SLE-15, because pandoc is not available there (and adding it would require two dozen additional haskell packages)- update to version 3.0.3: - various changes in tool options - man pages are now in section 1 (formerly in section 8) - tools are now installed in /usr/bin (formerly /usr/sbin)- update to version 2.1.1 * Potential memory leak fix when tcti/sapi initialization fails. * tpm2_listpcrs: use TPM2_GetCapability to determine PCRs to read * listpcrs: remove one redundant call to tpm get cap * listpcrs: fix for unsupported/disabled alg in -L * build: use supported comment to suppress GCC7 fallthrough warning * kdfa: allow to build with OpenSSL 1.1.x (bsc#1067392) - drop patches (upstream) * 0001-tpm2_listpcrs-use-TPM2_GetCapability-to-determine-PC.patch * tpm2.0-tools-fix-gcc7.patch- update to version 2.1.0: - dropped 0002-kdfa-use-openssl-for-hmac-not-tpm.patch, was backported upstream in commit 788a17abbe0000c560935ef9f31c9a6892d9ea33 - this version now can interact with the new resource manager tpm2.0-abrmd - Upstream changes: * Fix readx and writex on multiple EINTR returns. * Add support for the tabrmd TCTI. This is the new default. * Change default socket port from 2323 (the old resourcemgr) to 2321 (default simulator port). * Cherry-pick fix for CVE-2017-7524. * Fix tpm2_listpcr command line option handling. * Fix tpm2_getmanufec memory issues.- added the new abrmd package to recommends, because the tools will otherwise not function- 0002-kdfa-use-openssl-for-hmac-not-tpm.patch: fixed unexpected leak of cleartext password into the tpm when generating an HMAC in the context of tpm_kdfa() (key derivation function) (bnc#1046402, CVE-2017-7524)- 0001-tpm2_listpcrs-use-TPM2_GetCapability-to-determine-PC.patch: fixed tpm2_listpcrs aborting saying "too much pcrs to get!" (bnc#1044419)- tpm2.0-tools-fix-hardening.patch: do not disable fortify, do not use -Wstack-protector as it warns also for non-utilized functions and then -Werror fails. - tpm2.0-tools-fix-gcc7.patch: fixed gcc7 case fallthrough errors- Major update to 2.0.0 - dropped fixes.patch, now part of the upstream version - a set of man pages have been added to the package - Upstream changes: * Tracked on the milestone: https://github.com/01org/tpm2.0-tools/milestone/2 * Reworked all the tools to support configurable TCTIs, based on build time configuration, one can specify the tcti via the --tcti (-T) option to all tools. * tpm2_getrandom interface made -s a positional argument. * Numerous bug fixes.- buildrequire pkgconfig- Updated to 1.1.0 / 016-11-04 (FATE#321509) - Added * travis ci support. * Allow for unit tests to be enabled selectively. * tpm2_rc_decode tool: Decode TPM_RC error codes. * Android Make file * tpm2_listpersistent: list all persistent objects * test scripts for tpm2-tools * tpm2_nvreadlock * tpm2_getmanufec: retrieve EC from tpm manufacturer server. * Copy 'common' and 'sample' code from the TPM2.0-TSS repo. - Modified * tpm2_takeownership: update option -c to use lockout password to clear. * tpm2_listpcrs: add options -L and -s, rewrite to increase performance. * tpm2_quote: added -L option to support selection of multiple banks. * tpm2_quote: add -q option to get qualifying data. * configure: Use pkg-config to get info about libcurl and libcrypto. * configure: Use pkg-config to locate SAPI and TCTI headers / libraries. * tpm2_x: Add -X option to enable password input in Hex format. * tpm2_nvdefine: Change -X option to -I. * tpm2-nvwrite: fix for unable to write 1024B+ data. * tpm2_getmanufec: Fix base64 encoding. * tpm2_x: fixed a lot of TPM2B failures caused by wrong initialization. * tpm2_getmanufec: let configure handle libs. * tpm2_getmanufec: Convert from dos to unix format. * build: Check for TSS2 library @ configure time. * build: Detect required TSS2 and TCTI headers. * build: Use libtool to build the common library * build: Install all binaries into sbin. * build: Build common sources into library. * build: Move all source files to 'src'. * Makefile.am: Move all build rules into single Makefile.am. * everything: Use new TCTI headers and fixup API calls. * everything: Update source to cope with sapi header cleanup. * tpm2_activatecredential: Updated to support TCG compatible EK * tpm2_getpubak: Updated to use TCG compatible EK * tpm2_getpubek: fix ek creation to follow TCG EK profile spec. - Removed * Windows related code * depenedency on the TPM2.0-TSS repo source code - 1.0-alpha_0.zip: removed, use tpm2-0-tss directly. - tpm2-install-binaries.patch: not needed anymore. - fixes.patch: fixed random return build errors.- update description- initial import of tpm2.0-toolsh04-ch1c 1714974901  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@A5.2-150400.6.3.15.2-150400.6.3.1tpm2tpm2_activatecredentialtpm2_certifytpm2_certifyX509certutiltpm2_certifycreationtpm2_changeauthtpm2_changeepstpm2_changeppstpm2_checkquotetpm2_cleartpm2_clearcontroltpm2_clockrateadjusttpm2_committpm2_createtpm2_createaktpm2_createektpm2_createpolicytpm2_createprimarytpm2_dictionarylockouttpm2_duplicatetpm2_ecdhkeygentpm2_ecdhzgentpm2_ecephemeraltpm2_encryptdecrypttpm2_eventlogtpm2_evictcontroltpm2_flushcontexttpm2_getcaptpm2_getcommandauditdigesttpm2_geteccparameterstpm2_getekcertificatetpm2_getpolicydigesttpm2_getrandomtpm2_getsessionauditdigesttpm2_gettestresulttpm2_gettimetpm2_hashtpm2_hierarchycontroltpm2_hmactpm2_importtpm2_incrementalselftesttpm2_loadtpm2_loadexternaltpm2_makecredentialtpm2_nvcertifytpm2_nvdefinetpm2_nvextendtpm2_nvincrementtpm2_nvreadtpm2_nvreadlocktpm2_nvreadpublictpm2_nvsetbitstpm2_nvundefinetpm2_nvwritetpm2_nvwritelocktpm2_pcrallocatetpm2_pcreventtpm2_pcrextendtpm2_pcrreadtpm2_pcrresettpm2_policyauthorizetpm2_policyauthorizenvtpm2_policyauthvaluetpm2_policycommandcodetpm2_policycountertimertpm2_policycphashtpm2_policyduplicationselecttpm2_policylocalitytpm2_policynamehashtpm2_policynvtpm2_policynvwrittentpm2_policyortpm2_policypasswordtpm2_policypcrtpm2_policyrestarttpm2_policysecrettpm2_policysignedtpm2_policytemplatetpm2_policytickettpm2_printtpm2_quotetpm2_rc_decodetpm2_readclocktpm2_readpublictpm2_rsadecrypttpm2_rsaencrypttpm2_selftesttpm2_sendtpm2_sessionconfigtpm2_setclocktpm2_setcommandauditstatustpm2_setprimarypolicytpm2_shutdowntpm2_signtpm2_startauthsessiontpm2_startuptpm2_stirrandomtpm2_testparmstpm2_unsealtpm2_verifysignaturetpm2_zgen2phasetss2tss2_authorizepolicytss2_changeauthtss2_createkeytss2_createnvtss2_createsealtss2_decrypttss2_deletetss2_encrypttss2_exportkeytss2_exportpolicytss2_getappdatatss2_getcertificatetss2_getdescriptiontss2_getinfotss2_getplatformcertificatestss2_getrandomtss2_gettpmblobstss2_importtss2_listtss2_nvextendtss2_nvincrementtss2_nvreadtss2_nvsetbitstss2_nvwritetss2_pcrextendtss2_pcrreadtss2_provisiontss2_quotetss2_setappdatatss2_setcertificatetss2_setdescriptiontss2_signtss2_unsealtss2_verifyquotetss2_verifysignaturetss2_writeauthorizenvbash-completioncompletionstpm2tpm2_completion.bashtss2tss2_authorizepolicytss2_changeauthtss2_createkeytss2_createnvtss2_createsealtss2_decrypttss2_deletetss2_encrypttss2_exportkeytss2_exportpolicytss2_getappdatatss2_getcertificatetss2_getdescriptiontss2_getinfotss2_getplatformcertificatestss2_getrandomtss2_gettpmblobstss2_importtss2_listtss2_nvextendtss2_nvincrementtss2_nvreadtss2_nvsetbitstss2_nvwritetss2_pcrextendtss2_pcrreadtss2_provisiontss2_quotetss2_setappdatatss2_setcertificatetss2_setdescriptiontss2_signtss2_unsealtss2_verifyquotetss2_verifysignaturetss2_writeauthorizenvtpm2.0-toolsCHANGELOG.mdREADME.mdtpm2.0-toolsLICENSEtpm2.1.gztpm2_activatecredential.1.gztpm2_certify.1.gztpm2_certifyX509certutil.1.gztpm2_certifycreation.1.gztpm2_changeauth.1.gztpm2_changeeps.1.gztpm2_changepps.1.gztpm2_checkquote.1.gztpm2_clear.1.gztpm2_clearcontrol.1.gztpm2_clockrateadjust.1.gztpm2_commit.1.gztpm2_create.1.gztpm2_createak.1.gztpm2_createek.1.gztpm2_createpolicy.1.gztpm2_createprimary.1.gztpm2_dictionarylockout.1.gztpm2_duplicate.1.gztpm2_ecdhkeygen.1.gztpm2_ecdhzgen.1.gztpm2_ecephemeral.1.gztpm2_encryptdecrypt.1.gztpm2_eventlog.1.gztpm2_evictcontrol.1.gztpm2_flushcontext.1.gztpm2_getcap.1.gztpm2_getcommandauditdigest.1.gztpm2_geteccparameters.1.gztpm2_getekcertificate.1.gztpm2_getpolicydigest.1.gztpm2_getrandom.1.gztpm2_getsessionauditdigest.1.gztpm2_gettestresult.1.gztpm2_gettime.1.gztpm2_hash.1.gztpm2_hierarchycontrol.1.gztpm2_hmac.1.gztpm2_import.1.gztpm2_incrementalselftest.1.gztpm2_load.1.gztpm2_loadexternal.1.gztpm2_makecredential.1.gztpm2_nvcertify.1.gztpm2_nvdefine.1.gztpm2_nvextend.1.gztpm2_nvincrement.1.gztpm2_nvread.1.gztpm2_nvreadlock.1.gztpm2_nvreadpublic.1.gztpm2_nvsetbits.1.gztpm2_nvundefine.1.gztpm2_nvwrite.1.gztpm2_nvwritelock.1.gztpm2_pcrallocate.1.gztpm2_pcrevent.1.gztpm2_pcrextend.1.gztpm2_pcrread.1.gztpm2_pcrreset.1.gztpm2_policyauthorize.1.gztpm2_policyauthorizenv.1.gztpm2_policyauthvalue.1.gztpm2_policycommandcode.1.gztpm2_policycountertimer.1.gztpm2_policycphash.1.gztpm2_policyduplicationselect.1.gztpm2_policylocality.1.gztpm2_policynamehash.1.gztpm2_policynv.1.gztpm2_policynvwritten.1.gztpm2_policyor.1.gztpm2_policypassword.1.gztpm2_policypcr.1.gztpm2_policyrestart.1.gztpm2_policysecret.1.gztpm2_policysigned.1.gztpm2_policytemplate.1.gztpm2_policyticket.1.gztpm2_print.1.gztpm2_quote.1.gztpm2_rc_decode.1.gztpm2_readclock.1.gztpm2_readpublic.1.gztpm2_rsadecrypt.1.gztpm2_rsaencrypt.1.gztpm2_selftest.1.gztpm2_send.1.gztpm2_sessionconfig.1.gztpm2_setclock.1.gztpm2_setcommandauditstatus.1.gztpm2_setprimarypolicy.1.gztpm2_shutdown.1.gztpm2_sign.1.gztpm2_startauthsession.1.gztpm2_startup.1.gztpm2_stirrandom.1.gztpm2_testparms.1.gztpm2_unseal.1.gztpm2_verifysignature.1.gztpm2_zgen2phase.1.gztss2_authorizepolicy.1.gztss2_changeauth.1.gztss2_createkey.1.gztss2_createnv.1.gztss2_createseal.1.gztss2_decrypt.1.gztss2_delete.1.gztss2_encrypt.1.gztss2_exportkey.1.gztss2_exportpolicy.1.gztss2_getappdata.1.gztss2_getcertificate.1.gztss2_getdescription.1.gztss2_getinfo.1.gztss2_getplatformcertificates.1.gztss2_getrandom.1.gztss2_gettpmblobs.1.gztss2_import.1.gztss2_list.1.gztss2_nvextend.1.gztss2_nvincrement.1.gztss2_nvread.1.gztss2_nvsetbits.1.gztss2_nvwrite.1.gztss2_pcrextend.1.gztss2_pcrread.1.gztss2_provision.1.gztss2_quote.1.gztss2_setappdata.1.gztss2_setcertificate.1.gztss2_setdescription.1.gztss2_sign.1.gztss2_unseal.1.gztss2_verifyquote.1.gztss2_verifysignature.1.gztss2_writeauthorizenv.1.gz/usr/bin//usr/share//usr/share/bash-completion//usr/share/bash-completion/completions//usr/share/doc/packages//usr/share/doc/packages/tpm2.0-tools//usr/share/licenses//usr/share/licenses/tpm2.0-tools//usr/share/man/man1/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:33669/SUSE_SLE-15-SP4_Update/fdc566eaafba8feb5aa6ef05b94e0d5e-tpm2.0-tools.SUSE_SLE-15-SP4_Updatedrpmxz5x86_64-suse-linuxELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=170f8b1cde157f0259a243b36b82d2f2d5884316, for GNU/Linux 3.2.0, strippedELF 64-bit LSB shared object, x86-64, version 1 (SYSV), dynamically linked, interpreter /lib64/ld-linux-x86-64.so.2, BuildID[sha1]=0687cc06d6bb1af67e5c64616259957e1accd2cc, for GNU/Linux 3.2.0, strippeddirectoryASCII text, with very long linesASCII textUTF-8 Unicode texttroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)R R R RRRRRRRRRRRRR R RR RRRRRRRRRRRRRRuy:˵K tpm2.0-abrmdutf-8db9e5632fcf1577f40af36aff84f2af92ce3c2850e05ff3b729082568d5f8122?7zXZ !t/l]"k%{f>6).; pC1]f&ʺ}߈1X.vSn*d$|y+~h% j鈑~lpYrh*N!6 Y5,t< ̫@q D[()F> nߚm|,S"ݮ4S>R[Qĩr)'lրyd5eͩ.}+UļiDQߗ\̚21,#@dk76ʜaT! ,%aKÍA όt=yY 0]A|^wZ Jt38 -pm@0c8b !S }e;>ATZx40TN-~‚ M;Ԥgu4.H"F'v>vW|J#|yF\'jț~"#6NQ>EyZt<Q^r9` ,&5]vOSYJa9Cx[G7T`Y>HF'^Gw;.Xs.T-t\i Y'+#DtN8Hj߼1K,+ `:ms0ڥ?3r O=غ/BaX ;Ok0c.j#!RHwA! ْ"n]we7.XRxP ҿBWF IrgMuZyPV,4D06 L$NjC=(ݚo)w0u]Ԫ i>L07p0"(W"4X`.T_U߲8yj #NBW,g,m/ `\'uFj:C#.Tx/(+x ғv14`Z(lD7huJ3xͺL,\3쳳"rfm`Um\/N[as  RZ`=#-z5T/(J<'=~A(u kP̪=c@+cECh_V Rw)LW駡`6C9:fg" wѱ˦}V8 ?ȧcWF7Bz ˿2S-k22ytMM9[ nNoڨ)8.w=v^VL܃ssO9 |n<99 `a&*= Z_.8tO]CT;<== #eFA: k,t.K#z:DG(TEZ]@ ޱI,"a3[v;g[(!e,~, ;VR9prm|" <6EҽڌrVR$ГM84!ӖVc i\W&&skv$y3n\h?(sBepJ!f}1L 0 /)O-2!!j8 輚V,\2Tˁ*İm4Pt czR"7Y,I tN ׼rW;,J] BZc*뵘~D%d`Z"+рaӱ718@ԇxw2ւ8\,,=n  so7a!+}Y`*-hՄKb[#} mG}x< αrÔy^ʼnWK| }mgW^w[$ `Ch$Qߦ]HrQuƷKk.j8>}k7XL4\ק4D)ۉ(a*_4_ud҂EA@%`T I" Ԗ,wk0Wĝ@}2^9u))d 8 -R~N:#I|V!|F cޚP5Β8tCHLRfS[,#/6hzKVvc&j/xo/#%,EyRւl[~$r"bl F> Dܜw1Ϙv׉-Zaow\rTqLX{B]i4g$N\uvbT1)a԰ K'.Ty yVȎ2h?hl353J?@O0-sM"|,y3 *,7pȰMIGe-iM%X(ukRsO~2/;Y6CcuO2wni֍z{7Ya}-D߹anoȻ"Ln?M~C"͠[|m и.]J#H>SDJ ~PC)aTv5Yie &ͩD?7 wj{I \iq+}ݚ  y9ұ6Qdg?RQy!Lc! AF.UCAz-B (rdJǝ<Lj|09;~a N$#oNZqRrbB,y[(%#Dst[}E#nɬmc0/Tۿ9XŻ6s+Ec"IՅ:SݗΏ" iMrڦ s \c%rw8yJ=kJs^2^68952V <,~;tG'kz pȓ7ct1v]Փh_. osoމ_mM8MJ̹) :#9_E-v6JS)ΏZmM/Dx;qOuå^1)Ld0ƍ`#UHW6kĊES3>0dj:nt@EJ=䶁1Qp<4뭕ɍ{tQ zg)sn gWXPXE182|A ?<~LGm0( =s2B>z*Vn-t}i0!Biwku̪x۔ ~-`QdLr=ռ|bb>F2v :No)jۿ6'-`q`yhO8(\5*DGRO$7 ;yѹW0efnTUYO .kcF;)݊EA#tNeA'|Ē;SYXxD,öL+. aZޭfbL1 TW-a_sV쩯CSpjD ^$Y~R'p;<3u3qshy9|PRIrQ -e.Z$6ʾ@8$~*» GteBÉ+t<8b(4˅u3($5D3?(myŵߣl+v\1zԃYWA_ @}=C1rJ ߑ%ߦm,4įHO쁦+ā$6GtoԮ.Tb_v`QnG4ὰzn] >NA:IC R8MCu Ҍb bL6Olt_FӑHD*59UYR Oou=a B{l^Y$"#Ɯ)*X \CL5~J ;,# r G7JvΈ¼cpFrVTP0r˪(' !`>OZu͏'Px7Xز#x; ivk5F6t/{9R|[g2 Za!-խ<3@4~( _-C-mJcdݹO$Jvэ#ǭ?  ]RĈcI,Mx{VdSc|GgfB T<#!fx-Zՠ(Hg뻥9ժؒ,t %d~X67pR[-v$dVo~oݞUvZW30s7M7oNk0A ơv/o3m|Z7uB~!o}z_V=[.7Gfȷ[әR%˚1qw?w+ +:r,+jJZ5u/@[Ze/3H-mBĻ?*#QʳJ%`c'@i{n@\е"qp5t8%wthG>TtjJ%}i6"5fq:7W,ͥ}"g#XaNXGi-_*{߼cE4W :Mf̟N9qrzZUf#f榨پC% ⒔حqF]7H}b{4_u"<Ȥ}Ģ5sbJm!X}$j^cXc־ Pb#Luszm[q0E=0mR Q7ȃ(JP{l2LjLMdWhT|T|p2?sgVEmaGg6~4S1e/ 4*?+yg/Kx6|m'!ӿH-e(eIY|*(0`QdJ4e;@o Α*ahMf@̴>+>U y g7HI=ƃ}nwfQaOȷԽ:D^dlFt,N&Hj%oz$ 178$VMXG=7QLVG\7[ȴ`2iNA\`ˍهm?$oYJ@B%YiW+TLP{rINfX`gojs|`\7-n3߬YIT NрeP>0RpмXP$;2$r+}ױ+,U bJߥQ!r 9u>!Cgw~ >21 !EDW7JXi>O;Il q7#2P7 L.^)gZ?zZxޘau&R-L$ORŹ4FPVlLw1[F~qy[k=@"Dv{0wLw(]Hwͅ;6W9~WP-A,a ;n`7ƩgΤC~ZqPl`l >+kZsXy`#lO7Rx}! vէշiZCz< 4ۇp*afC Q;o#g6zH>%XqXv! [4&Uԧ; >B7+62l m QKܿq'rqJOS6K_;iAM74Iro#$N5@[5&ry"OfE<*:"H˅ߩй;99dIS%=.p)k3чh5cQ)4zHJ 86A-HBJը\. :(3gf N?'':gL=)(eZ!ґEx~yZ`{̿ 2PblcU9'/V`H dr={0jns}A uŏ:2aX*t}S590Y|Q5sНe\Log$Z''|iִ8izHTw-JS-{mJ#9]M6B|p4g9Ib˔.=Xs3Z B$.&2Y йxb1&$~DR< +vH zd|[5i#-_:R.n, CIBf :qH_zmJGlKSR^dAqŗ]\\5PZ#G>3%^fc";{j|qpWc/[BvB(>BuZM,505ŠDq{8ﰍ3O"7FC{kTu09PJ:" dL@tu_/ׇR`ܪ`.qm|pK`';;dʖa PPD2GWb+?.0Q7&[Z !4]ߊUt-[8 ßDOB+ 4_ _:KnIC)&sd 5 #zcgs=巌Ac?\7p}؍ſ[^Tܓ)G}Es_f_ I C # /$!p˱vojSiv%Ov1Ko:7k~BK"\yOiG:F"Qt\R<)up6ivF]'6-?;gi;6DɘH6F8Ҁ!Li}x,l9/6#U`/1d/_`.2%{h&l'>z\Ww' צא=%8\(1K!4)7Kyl*Wі0hfβ9~i>(I+1[@N 3JN;bm.D;)oERi Bi]2XyHREJHY\ͷN6M3!d̹DLDw vpFu9(LI:Vmp97fԭAܟ7D,\E ua4+@7_RڪZ^lv]A{=dT*b <!bu{\ L%bZ `r9uu;ێ?l9ӸȆrfou)&m8˨99Q SYȃ{q @ d w  2H 6+2rZ,,ۂ#Nt!g1NbtG! vgf:l%4hhE<|0BlA>GU\ (mH(Scxw]4PH&#o@g(p= a^aSþ3eOR ےnqұlO)f2&>ctaFܝГʅWכ cs::/Wp95KD*}$! 0/V61 3\' =ES4shJ17+qP+9,z!(AT4MUq(KwM0;Z;$fV2 I')0~kB9Me-i)9i\!2{3>|\6?UHEbp {.$oߵQ[&bh7lP#@ġx -w[aIͮRRO1cW!lGN)d˪hg]/تPe?p\|at$5ؚ<-w?ӚK>Y] )]2!)2tdwwY7T?y]s' "cX>k/u2)Sn6ty t&L;cQZmJr]"X3]/rJ>R>XiQINnC@8lAqb$W)\ dCew*k2@&iz)CwKz鑂htMNs_]<?ӟ&ztSi!<­@| ̙/;h[r8SNp)g2>I7k&);)%S簹e*l;̸Ia4CruA6ԸT<" vN^Jtז\dseKA8.1v+ɞ:Z̃Pk4ji7EĽ X xo's]H,mN[R5B/ (C]6xILNF|(ހ )0xR elWZ{*lDE-;Ocryx>^PuiMX\[`SBE{Q/s{!,)kqn[OQh}9ŢX+GҸL?j8e2Zabsa |@bpV]pƿ4p 1#[6>ߵ#l/+2q&bR3H ܦRJŋ`6*hR}h1&f2pZACδT5!Ѷ;P03d{ϲ5ܟwXaa1G9 jkX]5nJvf9Hsƚ!?(4k* s4OڣorUPZ}f9Mk5T \z 㫎yp5*ċ£]9%de-"[v䧠V:pjkYYCE/ Tɴ}e¤7&~7>OfBc)U$` #ͦٛNeRѷ"Md- Br'O {UYL_/퉛vIbQ,=P|x̻ǻTQY_řޜWl$ƒ_zUafkc@"XMCrc,M{IDfb~X@ʹxS!u=s  vQR*tYMQ?!*"*#I#Q4s03]Z^aۋ>Jʜn\*9/;ؠWf%ʬ*XϠ߭/ Wua,@8bv']tFpS{حw~qP 'j1c³LUR9dӄRʭYnW(g$Cm,-YuK`O76OLnQI c߽g@Ycͨ hU=rJܹxpwݷ:&A,[yFj*|hFku[kWD27T;Uc~TZ?H6W$N3dbPPĝ\Oj,DVa'BXN ϣGBTvSW_`\ܸ9#1o0>:fDT(D|% GtAܐ9-Cd5=gz{Jۙ'y3v6\cQ Gjn Ӣp{ Ev N"' /IM=7ʵFqq5etƛeE\*8yDT~,~|W~ ij6%0.^p :DM]S ,Crs0^"xz: YW Dܱd, \QBirMTs#曹Ր.φxS1 "LW͛ wݚE6&X*[Umeѭ˼7Ŏ\0,&Qb=!0][,*sl͓6jb?sY;HY4|V \(ĽfKEnnB|X$5JDL?CfbtU#ni(vEktLH\fmVh%6=`2W2/(+?To'i/aGQ L;VJ,8UQstMA*}VVeފJ+  >x\IkN{eIW~#hr8i&3qp]Z|@}EKG,Ö Ye)bJ_r4o%K;/oK&Nn`6c1o"5q׌N% fJ5UI)n^>0x- hr7o&R$DrnL.rg`7Z< -s=t\*g(FR/Am@ &Py/30ס|@e`ƌ[щVj?xȿ.ݠH#+ y+n9HG{Ospu-c >R-ׄ7' A1_.|u WsM}?Ω4Cs^}h zO7Sfݘ-܉lqR.\%wݙ |˔d1[TX^N3r٨PSp|r2?42DwdoF򊰞4*5;q;i:qU$Py2s.hE~ R?j7սcM[W!2&e#=T@aOpFnaҰ u;1Q~@[S>rj3liX9Ht|TS̈? )Z5cj&gvjr-<#^QXXGIw۪a-z6($ѭJcʏA ,hRge4MΧF5* Q&q[!. `ڡP:He'N>@RaBaF gRΉ[tF .8 7"R}ǘ$ۉ\v %r½ v*>¨a[OLF,3 AAg` u׎1ttT+ F!dݘ 4( /2#ތZl4̷B8=TOzU\d8x蹤>C\4U 2O^1]Ϧ*άoIwRNNѧzf!}g` ` ζHNŒ:2lIRr{-$MJ52,3⨍(Of5$o -f|,:Q6*9VL1^Spכ`I>iL !y;L:)oLbsw-}6T2AsQeڤ~Λ i4'Hk.XcsmJtXAI(L FGFjЯgBQ +~W~ev[ZK|w-/$'N7 /(;:$RҿԞ wljCIE4O'4Wt(G~\>M=jI!ln'=D5YKƌٿv‚%hr[n&ۋM㷈*Ɩ;eWCXP )Qyp @v:sQ7K7@>=ktp狯빌dLM\ǹ#}\fOzFԻf+-G19&޷d_w27m(vX`ҰC0ڍ$]5,/Uh%td>}',khr<> /*Rdt e'XpΈ!-Ly+TqDKArIȈ7OHnLo,@ 718|aι޾:sZю0Ԍ Q o~^X]=a鷂I0ՒkFfqfEv7lKΥ#j4P7! >(&xs(m`GDۤiS]ɐZ)o^+۴9 Ww|"$H;sy(fq@!sx4nrob(ðLlq +9n,8&E@"bA?7C ʂ6p! 1#9pgvb:=Zp&J3Z< 䘊 EM2\f6`#xq/SbY9f"dy.S?;6U&!P*RPΔk\{++MDF(}~TȖ"77C [r*IؚGN:ej/קh!^"[(kU^V˦ƹ{+ކR>]ݬ (Pr r|Bl4k5Y[zfXXY _Xg7F3% &u, ë3>,D-e%лc %[1˔#v\ {K[}h)FuV7\I SHZ狋3i46(OϮ2zY[b;9YZeUE)`}s`#_4 Uhy[lߓ?6+#M,*)$>ڂ;+eKE"@Ș"&|$z/e>Q=?/ [XxK-j9*tvKGom Q<i*{oINy>Enr*A2K~( O6ō9Jn!s|^|o,et`x*PU-;jC1' T .gl0^%@n|.θ H}D9j^ ϹPwܭ( xf6226H?[0[ ϼו _LA7#Vv@6M~חYZR`A +#NǥruqWpSN%:e-A %z90wd8H̦ -'uMmuxW5{J:*[J'5>>Y¸, ڞJy)_Y!P>C8^QNӣ~"MN =kX*x'oz5N<;p:YeR#|\<u %̴ byYOx2O\aUʟ]Oa|)N~ذ4W]]D?_<[#Sȧ. n~#C8y6iuLIxj+GRJ8Lku(~㹭DVJȜ u2zhG\U@?S& ˖;9K(0wcjbM~1mx.*Lݦ9F:Se)?rAbhR($$J%/2 5o V[澏\3u GҚlq$WϦ`E’Ą b fZ^L*paW⟳_MlӡheBeo$Wm\k$dY;16-":6+lTl>0{7AH~B#a=);y( F\i7uN^ Mg\3`c˻ҮǖݪUX1x>G(Zkd^gc⬨~QP|%/kNI G⡖zkA~<;kX8D}TO vXUPccdm g RhcqӸ:;1Db4K2="p3]AI{+ovHɗ,,R3lov_aDs ;._~SI|,\s(!'j[7X g*Q@tTcj&4`RZJqUkng<VgsJy]~$r@~ppg^ o0W6?՛ٝ-Ɗi U>` W svf.0L^x!3y-g ^@U鬎c-A]o(#$tN 5B_e3Шl_s Qx2j  F/%;d)Re9Ə 2Ny|_Y@}'/fY+Y°R؉O"?zo{dD+LyMc 9~zo0 ]lă:~ELc8( $%l!\{s)CpsyLnC"q9M*B@7.K05={un!ga- '\]Ssn,r3JP m1VDZBd$@`^tlM$sf&{i7‡ozN%W G-g0Б h u7?mR@R|A^`р>D% p;PZK8?ن? )m :ALBvOEf2 ǃ HD Q&ءŅDvRu7f 5$8v~q2$K+<Q.Kr\%WOPw@rQ#S~HUA]?6HR3Khw/7iP(\$$0wYj.az4^%? ʼ 8A18+d^ VH r8Ͼr*qsO#Je`y3pFq6]<-{G'smdZugޒ cɊZ'Nqt4)VJ-Um:CH'*L%8!纸^`'^37͗axèh^ݣ~0(0 ao8'XZŊóh)ܠ#e7y8虈/pƦe{\fnki0B(+op@}w8\ C!waJ~NgPSTG\^М2LAdx^ - Ai\av+;r'.BD|[jw2ik~˖JHFkvћ6cvTj T_h `1F\C6u4Ɣ=g)=u/>@A pygD_n#2MB)Zm5)3r:* vQ?qeKY"3MlO0;_3ï]j:  =%kx>ALh4CWެ">^"q?飡4pMuC54"qϋ? R5L8|% H9ƿ4n b&0kc@!<|##c%(Cvpf%(v }B]yP9 hʰB]d0mP>g`|/j>0Y-!c Ng-v0/u0I &u)v;{l[3q!S}bNfcy^-h1`GuR;S+PP01=7+3pQz6y߾0KԲIV7Ɩk֪Cҵq!r]ӏ;aTr2fh LJwyDH&?ـNx}Q~I|;ee9L;vkz (E= Np%كIS@T`=ZE,>~!3-Oa c앿2 z$9Ɏ-\ǧ/ʬ8‡*;nnVP&{\KZ&GԳG.;z)drUi! Ƀ LCֻ-#*,<^aU x̃ 0"~T ?ќLz"&*Ƴt.-Hfg2cmm8/徱.ܟu3!'pLڑO Fo bƝR_O(䒕OpI3-5Y$:3 MYߡ^9Y>s؃yUKmtڕxS'N:PgR)3!o{䖰ڴ8"L]_~N1ql/R|~9s rDZk 4jt ^}@=q}ybQyp`=7T`-)땃t=Ծ vWuTNᑏsZ氏2|&.$ɎFfUڭ_oGR(K5yg*V1ak1 jnf0_r= `ٽ }NaQ:K+.v*cY\dV,tshxXI"͗=la]7|[FVOqr۠* _4M'ͧfq Q^ }kR/-6:V<o͏1 ˷zPVVؖ#ɏ,叙fyTQZ[xԆl !Kt,8jAl$hl߻pRS˴1:АtN!< ܧT!Ve`u|.SU$o%$A;P)pik٤$swďAfq"L QȆeX6Us%Q()C+|Fo0rNtsT}5πTHk{2sz 263TPO9{,r JԂ'ssuBvvD(s[)Z)z9oqv>akv;KGN) ɷ$,=iKEN+W # jPQ~_"Y)h k"kI@HĞ(aK:&!s_m"'YNru=堏Q3]͉MGA1+J ,%=)AaדԎśyaZݟhPE+[{7C3’K%arHzŔ*|`.?O(<)Y}حt},it1{(u a5 5XAbUmdY4ȡ+5\ rXٱa6EUDDWO`Q{!:pVQ|޽N* ~=;Lc,lm!0ڊ!W4Q767gW$V$` Tӝz)_0jk6SxA]vZP'<0#yLϼ%Әa|m}A^u:((*%`;r6Ll+Zi\+e͓&g=^$@Y|D\rijgG{vhWd|.C؋Z[~ 04Jsmƻ{ dͬ{y4me)u+WR~O}5p# ۊ.-w}Vk-S u%|KR$j*#rFnrA:ˤdwYK$[eX/L@.[3I{*! a}ZWdeeadn}^ C==99@IAӦHx/g5#aNs0nKcu\k '^2fcF@ZۑAx-CբV^9o>OUaN.i1P#"v3(%M0on S[5޾[b 9ڞY ࠽`y C#K&$}eA-?(Bƥhh)r=0%ǍqrF5zOc6%?"}:zk%R:"'BGF);}mHE"r4Y"+} Lczn}I¹W :c\/Et }{r!2YA5t&?Z ۘ`*'\7)]/҆VD6]rEmq懩1^P,<(ۍxy V\'!G@!Dc\›v<,"JU% mp }rEvVսձMl8˜#Ԛ*Y~d>쨪8!"m 1g.5q1:G&_uпɅ 75DUxv]w Թ$̢"*m8AX' j) i8)N2Iu?VvX4tZ鷕ٽ={P|bȯ,SG\F3BPnF_I<HzX5l*qbRxg*V 6=ϓQq*86Ho1`D||alt{@U8 ?zYfn|b]HM輍CZRO"udob𗀡 ,hco0ԔS!^ǟCb0SA3JZEWaȊe.] quG89Kd2 8qg ҙDoI * R.@rO;/K\Q|')(1gGD]pr݂M du+'F]澖PWL-ՉW*iRwD)u4@T+zBϬl?W2IsdO[G5nD:fbee#%ABkr2?AzKyrIDpcc/龤$wlvʉd.X}YuuNj⛳'8,,~`(m~M F#dkuMDrm*[Z>I hHXNndK&vqrþlI[=qR]bdԆqUvbSZgF@WҍK=PX;"iֈh%q _ Sc*zJ9 l,^S;󴧤W7ԇ`svܱcx':j-YZYE~В\)f82U[zVQLfwԉ:j2/;H$%KorgbXh%"cT )(H}EH @)%'=n ,X{#j@|./: Ԡ?y03sԷ>(G*F,*hTΔ3 EMLtlՂ33v1@ uò e6,ta;½Z8_~fEoFDf7QY&Ij%%E2Rȴ{ 5ιkAhv;㢯m, 9 B~ Qp^֘OGi# E)>,,ID-Z%^oGv&mS^_MM/^\;;s:K|oʆdSy뎂؍ÖIu9*,l+C;%&!e.6yԖk`j.sD}+^S9e㺱!r[U7"6>S=E9+O ̌HnWy*Ŭ(c 6?cQ.יܽǬ8U; P#}(ʝlchθ]WnM?^I՜y\8?CffgCj+Sn^S?xN5#pS Aa]f,>WܓFk)#8BUzQ_2-/ihh| lZ|fa!0Ndkja+"CA)*, SE>(~t[)8 کD[@44$X_ˉ6ֶۘ!jo fO>[gjHhcً]k; W |@GnhuQi{RX?;RxOW$LV>/_ 5\){v![fekdQy5Qs͎B4xI!Y%ٯTb~k}䟪etI^4r8LS3ħ>2GXа/rfH(e3Cd Jlf~ dFD Uś Ѩy;˫!06 ږiyAY4S O);R<w޻k` s; 13~ׂz=+%Gl)Bfg~n屠DGd]A^Pʜ?F -S >tiO6kŲwnVSmp:8bwm0%ijO4MθUfr]LfDE6N m!Q'WVٍ- f8L ge\R0u`e{.(g3 ߀U겔A\؃$] 4Hҙz3a?u=$$U&p#.cˬ!,jMPQmȤ8XGh''80պ%dDҋ&0 /BѯM\x˒qEv79QeuzuVnmG+/d}BI#h =J*D{?ACN]n?Ӟ CV.v0F_TVg~-:/ev%2„WWrlASo]&%,&tB :S|3byB(>2er-GÜwͥt[ѕoWekMVcVh:P+- 'aUE%d#V]֪PX(>' '-a1B8ɗ$*7TNAIވ ﺺa@$јV#5J:p4a %58s#C( US#3p_SZ oAq| SMLyFFJ= D7ƷtZI/0!s~V!TNS\ Q.Wh ޑ.9ks/],_WsVg8zI-] X뼫NƵox\݄BӰF ̡'t$m=w2Qb}ƹ?O>2Y|Gm&RM&prУPZk=F<NR(}Lʓ&z>-8j֧ä&_u^=ɂ{xmQeL0arܽɵ6 Y}Z$g 0Is:9M$C6} U&(1D!_=G(yA;?R-䔶 36ixjb}A\Ӡ?xW]|)T?ZOp\ĬLF܈^Uj۳bBs`:f-{/wd>{ Y޴DZ|ﵬtCy.cB&'6E.f0.>/eD zAzoJMHK, Eu⇛]- R}pטe=Jݓ Mij.vc͐؝(}R Y}!0y}ìV"-wp6]K2 LLcU*Ix\R؀ 6LMzjp@"6g-vHV\SACAiŃ2VSNQXW>{߫|eb_5LDt'B_E1pt,E`z~) }iu*Lq/Ș-_0nxY0ǦdK,Vw %ybمc];2@tmvEQ ɽ[hY _piFtGjT;X@kŀ14E*<` ǟ3)>ΧD_5i#ln`]⢳bw^$:U:V'RJ`-}3<&/=xy~Hˁ"V*rQsxY@Hex>ٰ.H҇4qc"'.npe8w>[O\^5 /5㕸<Pz氎;V,ț52]n+;nH,a!hogOp*'YAJ08ǖjm.NEfފa$?M׳V#6`1x>&*.D\>\i%˫5 Eh}EtGHns4)kIajmC/P(ʹ'E!5nFz/ԃPnnuݳ/_`'v(TS=C+짴$h@!0wX;Vlv;v95Y+e_3;-?˜eu z#B3` $S'_.wY |ylH7>&qEmyv]:#78n ȸD N5cƪFHǐ9TsaBzuSz&϶H r5]k+ee.+e>6v\ot(^7V7k XAvn%]Ϛy.&8?0 ~G;te-`_i3(L^;﨏MO"BMd=ByP^/#WqFM~v6˙Tw5ސ>Lw]r<$x_l@z &%#Wxo?FT*C.<V8zN*3KŠNǽ=͒ /0kNuH\ ;KʱVkm<3!AX\҂ꉅ;lK/bE}XlH2-"mb H2WYP ǘ|V*%U"+CC6xЫ̙9 @;S]!$sK\cU8S6 YZ