Date: Friday, November 20, 2020 @ 14:14:32
  Author: diabonas
Revision: 757899

archrelease: copy trunk to community-x86_64

Added:
  tpm2-tss-engine/repos/community-x86_64/PKGBUILD
    (from rev 757898, tpm2-tss-engine/trunk/PKGBUILD)
  
tpm2-tss-engine/repos/community-x86_64/tpm2-tss-engine-1.0.1-tpm2-tools-4.0.patch
    (from rev 757898, 
tpm2-tss-engine/trunk/tpm2-tss-engine-1.0.1-tpm2-tools-4.0.patch)
Deleted:
  tpm2-tss-engine/repos/community-x86_64/PKGBUILD
  
tpm2-tss-engine/repos/community-x86_64/tpm2-tss-engine-1.0.1-tpm2-tools-4.0.patch
  tpm2-tss-engine/repos/community-x86_64/tpm2-tss-engine_check.sh

--------------------------------------------+
 PKGBUILD                                   |   73 ++----
 tpm2-tss-engine-1.0.1-tpm2-tools-4.0.patch |  318 +++++++++++++--------------
 tpm2-tss-engine_check.sh                   |    9 
 3 files changed, 190 insertions(+), 210 deletions(-)

Deleted: PKGBUILD
===================================================================
--- PKGBUILD    2020-11-20 14:14:25 UTC (rev 757898)
+++ PKGBUILD    2020-11-20 14:14:32 UTC (rev 757899)
@@ -1,42 +0,0 @@
-# Maintainer: Jonas Witschel <diabo...@archlinux.org>
-pkgname=tpm2-tss-engine
-pkgver=1.0.1
-pkgrel=4
-pkgdesc='OpenSSL engine for Trusted Platform Module 2.0 devices'
-arch=('x86_64')
-url='https://github.com/tpm2-software/tpm2-tss-engine'
-license=('BSD')
-depends=('openssl' 'tpm2-tss' 'libtss2-esys.so' 'libtss2-mu.so')
-checkdepends=('cmocka' 'expect' 'ibm-sw-tpm2' 'tpm2-tools')
-source=("$url/releases/download/v$pkgver/$pkgname-$pkgver.tar.gz"{,.asc}
-        'tpm2-tss-engine_check.sh'
-        'tpm2-tss-engine-1.0.1-tpm2-tools-4.0.patch')
-sha512sums=('106fc6aadf0b4b27c3b38be596356aa59b4b76ec1602e8c5564aec6b4be7e2b5d6077006ee13d41e58402255b879aadaa966c758b5b326ae32742007ce2ef238'
-            'SKIP'
-            
'77d0d1789376e76b1f357edea59e5cd0953cfcf33c35069da6c4092c43e028dfb1e1593e3c85456e590f9da8252701519a06a5eb94adf8501cf4e5f21cc92cf1'
-            
'bf73ef8834fc92c1a85b590e0dd69e9d0a465533e631768652fdd0e316f590fa5a16fdcc7faf9af360b6b05a508d904f3657e7c476c136b2000e3374e2a3606d')
-validpgpkeys=('D6B4D8BAC7E0CC97DCD4AC7272E88B53F7A95D84') # Andreas Fuchs 
<andreas.fu...@sit.fraunhofer.de>
-
-prepare() {
-       cd "$pkgname-$pkgver"
-       # Use tpm2-tools 4.0 for tests (backport of GitHub PR #142)
-       patch --strip=1 
--input="$srcdir/tpm2-tss-engine-1.0.1-tpm2-tools-4.0.patch"
-}
-
-build() {
-       cd "$pkgname-$pkgver"
-       (( CHECKFUNC )) && _opts=('--enable-unit' '--enable-integration')
-       ./configure --prefix=/usr --enable-tctienvvar "${_opts[@]}"
-       make
-}
-
-check() {
-       cd "$pkgname-$pkgver"
-       "$srcdir/tpm2-tss-engine_check.sh"
-}
-
-package() {
-       cd "$pkgname-$pkgver"
-       make DESTDIR="$pkgdir" install
-       install -Dm644 LICENSE -t "$pkgdir/usr/share/licenses/$pkgname"
-}

Copied: tpm2-tss-engine/repos/community-x86_64/PKGBUILD (from rev 757898, 
tpm2-tss-engine/trunk/PKGBUILD)
===================================================================
--- PKGBUILD                            (rev 0)
+++ PKGBUILD    2020-11-20 14:14:32 UTC (rev 757899)
@@ -0,0 +1,31 @@
+# Maintainer: Jonas Witschel <diabo...@archlinux.org>
+pkgname=tpm2-tss-engine
+pkgver=1.1.0
+pkgrel=1
+pkgdesc='OpenSSL engine for Trusted Platform Module 2.0 devices'
+arch=('x86_64')
+url='https://github.com/tpm2-software/tpm2-tss-engine'
+license=('BSD')
+depends=('openssl' 'tpm2-tss' 'libtss2-esys.so' 'libtss2-mu.so' 
'libtss2-tctildr.so')
+checkdepends=('cmocka' 'expect' 'ibm-sw-tpm2' 'iproute2' 'tpm2-tools')
+source=("$url/releases/download/v$pkgver/$pkgname-$pkgver.tar.gz"{,.asc})
+sha512sums=('5d2e08178be54350e8672245023d601a0d9d520f8c49e977af49d7c59b91d033c14b4a347b71e042fe7c5ff12af9fcc43b69fd1dc83a9f0db12d47d43e1107f4'
+            'SKIP')
+validpgpkeys=('D6B4D8BAC7E0CC97DCD4AC7272E88B53F7A95D84') # Andreas Fuchs 
<andreas.fu...@sit.fraunhofer.de>
+
+build() {
+       cd "$pkgname-$pkgver"
+       ./configure --prefix=/usr $( ((CHECKFUNC)) && echo --enable-unit 
--enable-integration)
+       make
+}
+
+check() {
+       cd "$pkgname-$pkgver"
+       make check
+}
+
+package() {
+       cd "$pkgname-$pkgver"
+       make DESTDIR="$pkgdir" install
+       install -Dm644 LICENSE -t "$pkgdir/usr/share/licenses/$pkgname"
+}

Deleted: tpm2-tss-engine-1.0.1-tpm2-tools-4.0.patch
===================================================================
--- tpm2-tss-engine-1.0.1-tpm2-tools-4.0.patch  2020-11-20 14:14:25 UTC (rev 
757898)
+++ tpm2-tss-engine-1.0.1-tpm2-tools-4.0.patch  2020-11-20 14:14:32 UTC (rev 
757899)
@@ -1,159 +0,0 @@
-From 2baa572d28c826837d94114acf8e894030c65d67 Mon Sep 17 00:00:00 2001
-From: Jonas Witschel <diabo...@gmx.de>
-Date: Sun, 25 Aug 2019 00:18:03 +0200
-Subject: [PATCH] test: use tpm2-tools 4.X
-
-Since tpm2-tools 4.0 has been released, we can update our tests.
-tpm2-tools 4.0 also requires tpm2-tss 2.3, so bump that as well.
-
-Signed-off-by: Jonas Witschel <diabo...@gmx.de>
----
- test/rsasign_parent.sh               |  8 ++++----
- test/rsasign_persistent.sh           | 26 +++++++++++++-------------
- test/rsasign_persistent_emptyauth.sh | 24 ++++++++++++------------
- 3 files changed, 29 insertions(+), 29 deletions(-)
-
-diff --git a/test/rsasign_parent.sh b/test/rsasign_parent.sh
-index 238631d..ce0f494 100755
---- a/test/rsasign_parent.sh
-+++ b/test/rsasign_parent.sh
-@@ -15,12 +15,12 @@ PARENT_CTX=${DIR}/primary_owner_key.ctx
- 
- tpm2_startup -c || true
- 
--tpm2_createprimary --hierarchy=o --halg=sha256 --kalg=rsa \
--                   --context=${PARENT_CTX}
-+tpm2_createprimary --hierarchy=o --hash-algorithm=sha256 --key-algorithm=rsa \
-+                   --key-context=${PARENT_CTX}
- tpm2_flushcontext --transient-object
- 
- # Load primary key to persistent handle
--HANDLE=$(tpm2_evictcontrol --auth=o --context=${PARENT_CTX} 
--persistent=0x81010001 | cut -d ' ' -f 2 | head -n 1)
-+HANDLE=$(tpm2_evictcontrol --hierarchy=o --object-context=${PARENT_CTX} | cut 
-d ' ' -f 2 | head -n 1)
- tpm2_flushcontext --transient-object
- 
- # Generating a key underneath the persistent parent
-@@ -32,7 +32,7 @@ cat ${DIR}/mykey.pub
- echo "abc" | openssl pkeyutl -engine tpm2tss -keyform engine -inkey 
${DIR}/mykey -sign -in ${DIR}/mydata.txt -out ${DIR}/mysig -passin stdin
- 
- # Release persistent HANDLE
--tpm2_evictcontrol --auth=o --handle=${HANDLE} --persistent=${HANDLE}
-+tpm2_evictcontrol --hierarchy=o --object-context=${HANDLE}
- 
- cat ${DIR}/mysig
- 
-diff --git a/test/rsasign_persistent.sh b/test/rsasign_persistent.sh
-index d08809a..5dd749e 100755
---- a/test/rsasign_persistent.sh
-+++ b/test/rsasign_persistent.sh
-@@ -15,38 +15,38 @@ PARENT_CTX=${DIR}/primary_owner_key.ctx
- 
- tpm2_startup -c || true
- 
--tpm2_createprimary --hierarchy=o --halg=sha256 --kalg=rsa \
--                   --context=${PARENT_CTX}
-+tpm2_createprimary --hierarchy=o --hash-algorithm=sha256 --key-algorithm=rsa \
-+                   --key-context=${PARENT_CTX}
- tpm2_flushcontext --transient-object
- 
- # Create an RSA key pair
- echo "Generating RSA key pair"
- TPM_RSA_PUBKEY=${DIR}/rsakey.pub
- TPM_RSA_KEY=${DIR}/rsakey
--tpm2_create --pwdk=abc \
--            --context-parent=${PARENT_CTX} \
--            --halg=sha256 --kalg=rsa \
--            --pubfile=${TPM_RSA_PUBKEY} --privfile=${TPM_RSA_KEY} \
--            
--object-attributes=sign\|decrypt\|fixedtpm\|fixedparent\|sensitivedataorigin\|userwithauth\|noda
-+tpm2_create --key-auth=abc \
-+            --parent-context=${PARENT_CTX} \
-+            --hash-algorithm=sha256 --key-algorithm=rsa \
-+            --public=${TPM_RSA_PUBKEY} --private=${TPM_RSA_KEY} \
-+            
--attributes=sign\|decrypt\|fixedtpm\|fixedparent\|sensitivedataorigin\|userwithauth\|noda
- tpm2_flushcontext --transient-object
- 
- # Load Key to persistent handle
- RSA_CTX=${DIR}/rsakey.ctx
--tpm2_load --context-parent=${PARENT_CTX} \
--          --pubfile=${TPM_RSA_PUBKEY} --privfile=${TPM_RSA_KEY} \
--          --context=${RSA_CTX}
-+tpm2_load --parent-context=${PARENT_CTX} \
-+          --public=${TPM_RSA_PUBKEY} --private=${TPM_RSA_KEY} \
-+          --key-context=${RSA_CTX}
- tpm2_flushcontext --transient-object
- 
--HANDLE=$(tpm2_evictcontrol --auth=o --context=${RSA_CTX} 
--persistent=0x81010001 | cut -d ' ' -f 2 | head -n 1)
-+HANDLE=$(tpm2_evictcontrol --hierarchy=o --object-context=${RSA_CTX} | cut -d 
' ' -f 2 | head -n 1)
- tpm2_flushcontext --transient-object
- 
- # Signing Data
- echo "abc" | openssl pkeyutl -engine tpm2tss -keyform engine -inkey ${HANDLE} 
-sign -in ${DIR}/mydata.txt -out ${DIR}/mysig -passin stdin
- # Get public key of handle
--tpm2_readpublic --object=${HANDLE} --opu=${DIR}/mykey.pem --format=pem
-+tpm2_readpublic --object-context=${HANDLE} --output=${DIR}/mykey.pem 
--format=pem
- 
- # Release persistent HANDLE
--tpm2_evictcontrol --auth=o --handle=${HANDLE} --persistent=${HANDLE}
-+tpm2_evictcontrol --hierarchy=o --object-context=${HANDLE}
- 
- R="$(openssl pkeyutl -pubin -inkey ${DIR}/mykey.pem -verify -in 
${DIR}/mydata.txt -sigfile ${DIR}/mysig || true)"
- if ! echo $R | grep "Signature Verified Successfully" >/dev/null; then
-diff --git a/test/rsasign_persistent_emptyauth.sh 
b/test/rsasign_persistent_emptyauth.sh
-index eeded63..5a4c757 100755
---- a/test/rsasign_persistent_emptyauth.sh
-+++ b/test/rsasign_persistent_emptyauth.sh
-@@ -15,28 +15,28 @@ PARENT_CTX=${DIR}/primary_owner_key.ctx
- 
- tpm2_startup -c || true
- 
--tpm2_createprimary --hierarchy=o --halg=sha256 --kalg=rsa \
--                   --context=${PARENT_CTX}
-+tpm2_createprimary --hierarchy=o --hash-algorithm=sha256 --key-algorithm=rsa \
-+                   --key-context=${PARENT_CTX}
- tpm2_flushcontext --transient-object
- 
- # Create an RSA key pair
- echo "Generating RSA key pair"
- TPM_RSA_PUBKEY=${DIR}/rsakey.pub
- TPM_RSA_KEY=${DIR}/rsakey
--tpm2_create --context-parent=${PARENT_CTX} \
--            --halg=sha256 --kalg=rsa \
--            --pubfile=${TPM_RSA_PUBKEY} --privfile=${TPM_RSA_KEY} \
--            
--object-attributes=sign\|decrypt\|fixedtpm\|fixedparent\|sensitivedataorigin\|userwithauth\|noda
-+tpm2_create --parent-context=${PARENT_CTX} \
-+            --hash-algorithm=sha256 --key-algorithm=rsa \
-+            --public=${TPM_RSA_PUBKEY} --private=${TPM_RSA_KEY} \
-+            
--attributes=sign\|decrypt\|fixedtpm\|fixedparent\|sensitivedataorigin\|userwithauth\|noda
- tpm2_flushcontext --transient-object
- 
- # Load Key to persistent handle
- RSA_CTX=${DIR}/rsakey.ctx
--tpm2_load --context-parent=${PARENT_CTX} \
--          --pubfile=${TPM_RSA_PUBKEY} --privfile=${TPM_RSA_KEY} \
--          --context=${RSA_CTX}
-+tpm2_load --parent-context=${PARENT_CTX} \
-+          --public=${TPM_RSA_PUBKEY} --private=${TPM_RSA_KEY} \
-+          --key-context=${RSA_CTX}
- tpm2_flushcontext --transient-object
- 
--HANDLE=$(tpm2_evictcontrol --auth=o --context=${RSA_CTX} 
--persistent=0x81010001 | cut -d ' ' -f 2 | head -n 1)
-+HANDLE=$(tpm2_evictcontrol --hierarchy=o --object-context=${RSA_CTX} | cut -d 
' ' -f 2 | head -n 1)
- tpm2_flushcontext --transient-object
- 
- # Signing Data
-@@ -52,10 +52,10 @@ EOF
- fi
- 
- # Get public key of handle
--tpm2_readpublic --object=${HANDLE} --opu=${DIR}/mykey.pem --format=pem
-+tpm2_readpublic --object-context=${HANDLE} --output=${DIR}/mykey.pem 
--format=pem
- 
- # Release persistent HANDLE
--tpm2_evictcontrol --auth=o --handle=${HANDLE} --persistent=${HANDLE}
-+tpm2_evictcontrol --hierarchy=o --object-context=${HANDLE}
- 
- R="$(openssl pkeyutl -pubin -inkey ${DIR}/mykey.pem -verify -in 
${DIR}/mydata.txt -sigfile ${DIR}/mysig || true)"
- if ! echo $R | grep "Signature Verified Successfully" >/dev/null; then
--- 
-2.23.0
-

Copied: 
tpm2-tss-engine/repos/community-x86_64/tpm2-tss-engine-1.0.1-tpm2-tools-4.0.patch
 (from rev 757898, 
tpm2-tss-engine/trunk/tpm2-tss-engine-1.0.1-tpm2-tools-4.0.patch)
===================================================================
--- tpm2-tss-engine-1.0.1-tpm2-tools-4.0.patch                          (rev 0)
+++ tpm2-tss-engine-1.0.1-tpm2-tools-4.0.patch  2020-11-20 14:14:32 UTC (rev 
757899)
@@ -0,0 +1,159 @@
+From 2baa572d28c826837d94114acf8e894030c65d67 Mon Sep 17 00:00:00 2001
+From: Jonas Witschel <diabo...@gmx.de>
+Date: Sun, 25 Aug 2019 00:18:03 +0200
+Subject: [PATCH] test: use tpm2-tools 4.X
+
+Since tpm2-tools 4.0 has been released, we can update our tests.
+tpm2-tools 4.0 also requires tpm2-tss 2.3, so bump that as well.
+
+Signed-off-by: Jonas Witschel <diabo...@gmx.de>
+---
+ test/rsasign_parent.sh               |  8 ++++----
+ test/rsasign_persistent.sh           | 26 +++++++++++++-------------
+ test/rsasign_persistent_emptyauth.sh | 24 ++++++++++++------------
+ 3 files changed, 29 insertions(+), 29 deletions(-)
+
+diff --git a/test/rsasign_parent.sh b/test/rsasign_parent.sh
+index 238631d..ce0f494 100755
+--- a/test/rsasign_parent.sh
++++ b/test/rsasign_parent.sh
+@@ -15,12 +15,12 @@ PARENT_CTX=${DIR}/primary_owner_key.ctx
+ 
+ tpm2_startup -c || true
+ 
+-tpm2_createprimary --hierarchy=o --halg=sha256 --kalg=rsa \
+-                   --context=${PARENT_CTX}
++tpm2_createprimary --hierarchy=o --hash-algorithm=sha256 --key-algorithm=rsa \
++                   --key-context=${PARENT_CTX}
+ tpm2_flushcontext --transient-object
+ 
+ # Load primary key to persistent handle
+-HANDLE=$(tpm2_evictcontrol --auth=o --context=${PARENT_CTX} 
--persistent=0x81010001 | cut -d ' ' -f 2 | head -n 1)
++HANDLE=$(tpm2_evictcontrol --hierarchy=o --object-context=${PARENT_CTX} | cut 
-d ' ' -f 2 | head -n 1)
+ tpm2_flushcontext --transient-object
+ 
+ # Generating a key underneath the persistent parent
+@@ -32,7 +32,7 @@ cat ${DIR}/mykey.pub
+ echo "abc" | openssl pkeyutl -engine tpm2tss -keyform engine -inkey 
${DIR}/mykey -sign -in ${DIR}/mydata.txt -out ${DIR}/mysig -passin stdin
+ 
+ # Release persistent HANDLE
+-tpm2_evictcontrol --auth=o --handle=${HANDLE} --persistent=${HANDLE}
++tpm2_evictcontrol --hierarchy=o --object-context=${HANDLE}
+ 
+ cat ${DIR}/mysig
+ 
+diff --git a/test/rsasign_persistent.sh b/test/rsasign_persistent.sh
+index d08809a..5dd749e 100755
+--- a/test/rsasign_persistent.sh
++++ b/test/rsasign_persistent.sh
+@@ -15,38 +15,38 @@ PARENT_CTX=${DIR}/primary_owner_key.ctx
+ 
+ tpm2_startup -c || true
+ 
+-tpm2_createprimary --hierarchy=o --halg=sha256 --kalg=rsa \
+-                   --context=${PARENT_CTX}
++tpm2_createprimary --hierarchy=o --hash-algorithm=sha256 --key-algorithm=rsa \
++                   --key-context=${PARENT_CTX}
+ tpm2_flushcontext --transient-object
+ 
+ # Create an RSA key pair
+ echo "Generating RSA key pair"
+ TPM_RSA_PUBKEY=${DIR}/rsakey.pub
+ TPM_RSA_KEY=${DIR}/rsakey
+-tpm2_create --pwdk=abc \
+-            --context-parent=${PARENT_CTX} \
+-            --halg=sha256 --kalg=rsa \
+-            --pubfile=${TPM_RSA_PUBKEY} --privfile=${TPM_RSA_KEY} \
+-            
--object-attributes=sign\|decrypt\|fixedtpm\|fixedparent\|sensitivedataorigin\|userwithauth\|noda
++tpm2_create --key-auth=abc \
++            --parent-context=${PARENT_CTX} \
++            --hash-algorithm=sha256 --key-algorithm=rsa \
++            --public=${TPM_RSA_PUBKEY} --private=${TPM_RSA_KEY} \
++            
--attributes=sign\|decrypt\|fixedtpm\|fixedparent\|sensitivedataorigin\|userwithauth\|noda
+ tpm2_flushcontext --transient-object
+ 
+ # Load Key to persistent handle
+ RSA_CTX=${DIR}/rsakey.ctx
+-tpm2_load --context-parent=${PARENT_CTX} \
+-          --pubfile=${TPM_RSA_PUBKEY} --privfile=${TPM_RSA_KEY} \
+-          --context=${RSA_CTX}
++tpm2_load --parent-context=${PARENT_CTX} \
++          --public=${TPM_RSA_PUBKEY} --private=${TPM_RSA_KEY} \
++          --key-context=${RSA_CTX}
+ tpm2_flushcontext --transient-object
+ 
+-HANDLE=$(tpm2_evictcontrol --auth=o --context=${RSA_CTX} 
--persistent=0x81010001 | cut -d ' ' -f 2 | head -n 1)
++HANDLE=$(tpm2_evictcontrol --hierarchy=o --object-context=${RSA_CTX} | cut -d 
' ' -f 2 | head -n 1)
+ tpm2_flushcontext --transient-object
+ 
+ # Signing Data
+ echo "abc" | openssl pkeyutl -engine tpm2tss -keyform engine -inkey ${HANDLE} 
-sign -in ${DIR}/mydata.txt -out ${DIR}/mysig -passin stdin
+ # Get public key of handle
+-tpm2_readpublic --object=${HANDLE} --opu=${DIR}/mykey.pem --format=pem
++tpm2_readpublic --object-context=${HANDLE} --output=${DIR}/mykey.pem 
--format=pem
+ 
+ # Release persistent HANDLE
+-tpm2_evictcontrol --auth=o --handle=${HANDLE} --persistent=${HANDLE}
++tpm2_evictcontrol --hierarchy=o --object-context=${HANDLE}
+ 
+ R="$(openssl pkeyutl -pubin -inkey ${DIR}/mykey.pem -verify -in 
${DIR}/mydata.txt -sigfile ${DIR}/mysig || true)"
+ if ! echo $R | grep "Signature Verified Successfully" >/dev/null; then
+diff --git a/test/rsasign_persistent_emptyauth.sh 
b/test/rsasign_persistent_emptyauth.sh
+index eeded63..5a4c757 100755
+--- a/test/rsasign_persistent_emptyauth.sh
++++ b/test/rsasign_persistent_emptyauth.sh
+@@ -15,28 +15,28 @@ PARENT_CTX=${DIR}/primary_owner_key.ctx
+ 
+ tpm2_startup -c || true
+ 
+-tpm2_createprimary --hierarchy=o --halg=sha256 --kalg=rsa \
+-                   --context=${PARENT_CTX}
++tpm2_createprimary --hierarchy=o --hash-algorithm=sha256 --key-algorithm=rsa \
++                   --key-context=${PARENT_CTX}
+ tpm2_flushcontext --transient-object
+ 
+ # Create an RSA key pair
+ echo "Generating RSA key pair"
+ TPM_RSA_PUBKEY=${DIR}/rsakey.pub
+ TPM_RSA_KEY=${DIR}/rsakey
+-tpm2_create --context-parent=${PARENT_CTX} \
+-            --halg=sha256 --kalg=rsa \
+-            --pubfile=${TPM_RSA_PUBKEY} --privfile=${TPM_RSA_KEY} \
+-            
--object-attributes=sign\|decrypt\|fixedtpm\|fixedparent\|sensitivedataorigin\|userwithauth\|noda
++tpm2_create --parent-context=${PARENT_CTX} \
++            --hash-algorithm=sha256 --key-algorithm=rsa \
++            --public=${TPM_RSA_PUBKEY} --private=${TPM_RSA_KEY} \
++            
--attributes=sign\|decrypt\|fixedtpm\|fixedparent\|sensitivedataorigin\|userwithauth\|noda
+ tpm2_flushcontext --transient-object
+ 
+ # Load Key to persistent handle
+ RSA_CTX=${DIR}/rsakey.ctx
+-tpm2_load --context-parent=${PARENT_CTX} \
+-          --pubfile=${TPM_RSA_PUBKEY} --privfile=${TPM_RSA_KEY} \
+-          --context=${RSA_CTX}
++tpm2_load --parent-context=${PARENT_CTX} \
++          --public=${TPM_RSA_PUBKEY} --private=${TPM_RSA_KEY} \
++          --key-context=${RSA_CTX}
+ tpm2_flushcontext --transient-object
+ 
+-HANDLE=$(tpm2_evictcontrol --auth=o --context=${RSA_CTX} 
--persistent=0x81010001 | cut -d ' ' -f 2 | head -n 1)
++HANDLE=$(tpm2_evictcontrol --hierarchy=o --object-context=${RSA_CTX} | cut -d 
' ' -f 2 | head -n 1)
+ tpm2_flushcontext --transient-object
+ 
+ # Signing Data
+@@ -52,10 +52,10 @@ EOF
+ fi
+ 
+ # Get public key of handle
+-tpm2_readpublic --object=${HANDLE} --opu=${DIR}/mykey.pem --format=pem
++tpm2_readpublic --object-context=${HANDLE} --output=${DIR}/mykey.pem 
--format=pem
+ 
+ # Release persistent HANDLE
+-tpm2_evictcontrol --auth=o --handle=${HANDLE} --persistent=${HANDLE}
++tpm2_evictcontrol --hierarchy=o --object-context=${HANDLE}
+ 
+ R="$(openssl pkeyutl -pubin -inkey ${DIR}/mykey.pem -verify -in 
${DIR}/mydata.txt -sigfile ${DIR}/mysig || true)"
+ if ! echo $R | grep "Signature Verified Successfully" >/dev/null; then
+-- 
+2.23.0
+

Deleted: tpm2-tss-engine_check.sh
===================================================================
--- tpm2-tss-engine_check.sh    2020-11-20 14:14:25 UTC (rev 757898)
+++ tpm2-tss-engine_check.sh    2020-11-20 14:14:32 UTC (rev 757899)
@@ -1,9 +0,0 @@
-#!/bin/sh
-
-# Start TPM simulator
-tpm_server >/dev/null &
-trap "kill $!" EXIT
-
-export TPM2TSSENGINE_TCTI=libtss2-tcti-mssim.so
-export TPM2TOOLS_TCTI=mssim
-make --jobs=1 check

Reply via email to