diff options
author | Salah Coronya <salah.coronya@gmail.com> | 2020-05-28 10:05:00 -0500 |
---|---|---|
committer | Joonas Niilola <juippis@gentoo.org> | 2020-06-24 18:33:57 +0300 |
commit | b80383ce163074e6c5ae6da62fc0070749a8af31 (patch) | |
tree | 2ecb0dd67a48d028ceb83243d7a80d6889c7650d /dev-libs | |
parent | dev-libs/libtpms: Bump to 0.7.2 (diff) | |
download | gentoo-b80383ce163074e6c5ae6da62fc0070749a8af31.tar.gz gentoo-b80383ce163074e6c5ae6da62fc0070749a8af31.tar.bz2 gentoo-b80383ce163074e6c5ae6da62fc0070749a8af31.zip |
dev-libs/libtpms: Remove old
Package-Manager: Portage-2.3.99, Repoman-2.3.22
Signed-off-by: Salah Coronya <salah.coronya@gmail.com>
Closes: https://github.com/gentoo/gentoo/pull/15939
Signed-off-by: Joonas Niilola <juippis@gentoo.org>
Diffstat (limited to 'dev-libs')
6 files changed, 0 insertions, 382 deletions
diff --git a/dev-libs/libtpms/Manifest b/dev-libs/libtpms/Manifest index 4ebba2ea7792..1ad68862d4db 100644 --- a/dev-libs/libtpms/Manifest +++ b/dev-libs/libtpms/Manifest @@ -1,2 +1 @@ -DIST libtpms-0.7.0.tar.gz 1203837 BLAKE2B ca5a3b78dc63c09c4ff084124838fedeb5be0580f709ad6165680159ba7ba4b1f751b9fbc67f6b5a8f39b82bdd420afb47087412a47b72cbe5b418a97a4860fe SHA512 92d1eb5d1a1cae08e97cceaca56fc9bc6d43c54a93edae2accf19807a4e93e19d88064a0b11db796c79d32c821e6b320ebbacb65cd20da3e5b1205f3b861cef2 DIST libtpms-0.7.2.tar.gz 1205662 BLAKE2B e549d94b6915b3a126aac76bc65c743acf9295fa4b4b836cfc34fb4cbe52e6da000d11d2995de377ccf5d0e2366d763dd1a881c4f4ab87631c52ad62b3792b7a SHA512 ddc1e00e01fe91977ac78e069a0005b7b6a4e34f41c2d53bfb24f3fdaea73945a83ae5aa344d01b6636fdd2f3dd30c4ec54b1ef58d0964700ba4cf688d436739 diff --git a/dev-libs/libtpms/files/libtpms-0.7.0-tpm12-Fix-potential-buffer-overflow-in-filename-creation.patch b/dev-libs/libtpms/files/libtpms-0.7.0-tpm12-Fix-potential-buffer-overflow-in-filename-creation.patch deleted file mode 100644 index 9e7af9e88ed3..000000000000 --- a/dev-libs/libtpms/files/libtpms-0.7.0-tpm12-Fix-potential-buffer-overflow-in-filename-creation.patch +++ /dev/null @@ -1,105 +0,0 @@ -From 1cdd950e7342240ed8edc695372365cf57fbc6cb Mon Sep 17 00:00:00 2001 -From: Stefan Berger <stefanb@linux.vnet.ibm.com> -Date: Thu, 17 Oct 2019 10:19:23 -0400 -Subject: [PATCH 2/2] tpm12: Fix potential buffer overflow in filename creation - -Fix a potential buffer overflow bug in the creation of filenames -that were using sprintf() rather than snprintf(). The buffer overflow -could occurr if the buffer is longer than 4096 bytes. The state path -may alone be 4096 bytes and could possibly trigger the overflow. - -Swtpm for example is not affected from this since it uses the callbacks -that are invoked before the faulty function is called. - -Signed-off-by: Stefan Berger <stefanb@linux.ibm.com> ---- - src/tpm12/tpm_nvfile.c | 43 ++++++++++++++++++++++++++++++++---------- - 1 file changed, 33 insertions(+), 10 deletions(-) - -diff --git a/src/tpm12/tpm_nvfile.c b/src/tpm12/tpm_nvfile.c -index c8e7bcf..0268bd0 100644 ---- a/src/tpm12/tpm_nvfile.c -+++ b/src/tpm12/tpm_nvfile.c -@@ -70,7 +70,8 @@ - - /* local prototypes */ - --static void TPM_NVRAM_GetFilenameForName(char *filename, -+static TPM_RESULT TPM_NVRAM_GetFilenameForName(char *filename, -+ size_t filename_len, - uint32_t tpm_number, - const char *name); - -@@ -189,7 +190,10 @@ TPM_RESULT TPM_NVRAM_LoadData(unsigned char **data, /* freed by caller */ - /* open the file */ - if (rc == 0) { - /* map name to the rooted filename */ -- TPM_NVRAM_GetFilenameForName(filename, tpm_number, name); -+ rc = TPM_NVRAM_GetFilenameForName(filename, sizeof(filename), -+ tpm_number, name); -+ } -+ if (rc == 0) { - printf(" TPM_NVRAM_LoadData: Opening file %s\n", filename); - file = fopen(filename, "rb"); /* closed @1 */ - if (file == NULL) { /* if failure, determine cause */ -@@ -297,7 +301,10 @@ TPM_RESULT TPM_NVRAM_StoreData(const unsigned char *data, - printf(" TPM_NVRAM_StoreData: To name %s\n", name); - if (rc == 0) { - /* map name to the rooted filename */ -- TPM_NVRAM_GetFilenameForName(filename, tpm_number, name); -+ rc = TPM_NVRAM_GetFilenameForName(filename, sizeof(filename), -+ tpm_number, name); -+ } -+ if (rc == 0) { - /* open the file */ - printf(" TPM_NVRAM_StoreData: Opening file %s\n", filename); - file = fopen(filename, "wb"); /* closed @1 */ -@@ -339,14 +346,27 @@ TPM_RESULT TPM_NVRAM_StoreData(const unsigned char *data, - state_directory/tpm_number.name - */ - --static void TPM_NVRAM_GetFilenameForName(char *filename, /* output: rooted filename */ -- uint32_t tpm_number, -- const char *name) /* input: abstract name */ -+static TPM_RESULT TPM_NVRAM_GetFilenameForName(char *filename, /* output: rooted filename */ -+ size_t filename_len, -+ uint32_t tpm_number, -+ const char *name) /* input: abstract name */ - { -+ int n; -+ TPM_RESULT rc = TPM_FAIL; -+ - printf(" TPM_NVRAM_GetFilenameForName: For name %s\n", name); -- sprintf(filename, "%s/%02lx.%s", state_directory, (unsigned long)tpm_number, name); -- printf(" TPM_NVRAM_GetFilenameForName: File name %s\n", filename); -- return; -+ n = snprintf(filename, filename_len, -+ "%s/%02lx.%s", state_directory, (unsigned long)tpm_number, -+ name); -+ if (n < 0) { -+ printf(" TPM_NVRAM_GetFilenameForName: Error (fatal), snprintf failed\n"); -+ } else if ((size_t)n >= filename_len) { -+ printf(" TPM_NVRAM_GetFilenameForName: Error (fatal), buffer too small\n"); -+ } else { -+ printf(" TPM_NVRAM_GetFilenameForName: File name %s\n", filename); -+ rc = TPM_SUCCESS; -+ } -+ return rc; - } - - /* TPM_NVRAM_DeleteName() deletes the 'name' from NVRAM -@@ -380,7 +400,10 @@ TPM_RESULT TPM_NVRAM_DeleteName(uint32_t tpm_number, - - printf(" TPM_NVRAM_DeleteName: Name %s\n", name); - /* map name to the rooted filename */ -- TPM_NVRAM_GetFilenameForName(filename, tpm_number, name); -+ if (rc == 0) { -+ rc = TPM_NVRAM_GetFilenameForName(filename, sizeof(filename), -+ tpm_number, name); -+ } - if (rc == 0) { - irc = remove(filename); - if ((irc != 0) && /* if the remove failed */ --- -2.26.2 - diff --git a/dev-libs/libtpms/files/libtpms-0.7.0-tpm12-Initialize-a-few-variables-for-x86-gcc-O3.patch b/dev-libs/libtpms/files/libtpms-0.7.0-tpm12-Initialize-a-few-variables-for-x86-gcc-O3.patch deleted file mode 100644 index e1c79875a02d..000000000000 --- a/dev-libs/libtpms/files/libtpms-0.7.0-tpm12-Initialize-a-few-variables-for-x86-gcc-O3.patch +++ /dev/null @@ -1,108 +0,0 @@ -From 464083396ae1d242fb2a26c1ab6e39971e82f47e Mon Sep 17 00:00:00 2001 -From: Stefan Berger <stefanb@linux.ibm.com> -Date: Fri, 17 Jan 2020 19:01:24 +0000 -Subject: [PATCH 3/3] tpm12: Initialize a few variables for x86 gcc -O3 -MIME-Version: 1.0 -Content-Type: text/plain; charset=UTF-8 -Content-Transfer-Encoding: 8bit - -gcc (Ubuntu 5.4.0-6ubuntu1~16.04.12) 5.4.0 20160609 - -The above gcc on x86 with -O3 reports the following false positives: - - gcc -DHAVE_CONFIG_H -I. -I.. -include tpm_library_conf.h -I../include/libtpms -I../include/libtpms -fstack-protector-strong -DTPM_V12 -DTPM_PCCLIENT -DTPM_VOLATILE_LOAD -DTPM_ENABLE_ACTIVATE -DTPM_AES -DTPM_LIBTPMS_CALLBACKS -DTPM_NV_DISK -DTPM_POSIX -DTPM_NOMAINTENANCE_COMMANDS -O3 -DUSE_OPENSSL_FUNCTIONS_SYMMETRIC=1 -DUSE_OPENSSL_FUNCTIONS_EC=1 -DUSE_OPENSSL_FUNCTIONS_ECDSA=0 -DUSE_OPENSSL_FUNCTIONS_RSA=0 -Wall -Werror -Wreturn-type -Wsign-compare -Wno-self-assign -MT tpm12/libtpms_tpm12_la-tpm_nvram.lo -MD -MP -MF tpm12/.deps/libtpms_tpm12_la-tpm_nvram.Tpo -c tpm12/tpm_nvram.c -o tpm12/libtpms_tpm12_la-tpm_nvram.o -tpm12/tpm_nvram.c: In function ‘TPM_Process_NVReadValue’: -tpm12/tpm_nvram.c:1539:38: error: ‘isGPIO’ may be used uninitialized in this function [-Werror=maybe-uninitialized] - if ((returnCode == TPM_SUCCESS) && !isGPIO) { - ^ -tpm12/tpm_nvram.c: In function ‘TPM_Process_NVWriteValue’: -tpm12/tpm_nvram.c:2323:6: error: ‘isGPIO’ may be used uninitialized in this function [-Werror=maybe-uninitialized] - if (!isGPIO) { - ^ - -gcc -DHAVE_CONFIG_H -I. -I.. -include tpm_library_conf.h -I../include/libtpms -I../include/libtpms -fstack-protector-strong -DTPM_V12 -DTPM_PCCLIENT -DTPM_VOLATILE_LOAD -DTPM_ENABLE_ACTIVATE -DTPM_AES -DTPM_LIBTPMS_CALLBACKS -DTPM_NV_DISK -DTPM_POSIX -DTPM_NOMAINTENANCE_COMMANDS -O3 -DUSE_OPENSSL_FUNCTIONS_SYMMETRIC=1 -DUSE_OPENSSL_FUNCTIONS_EC=1 -DUSE_OPENSSL_FUNCTIONS_ECDSA=0 -DUSE_OPENSSL_FUNCTIONS_RSA=0 -Wall -Werror -Wreturn-type -Wsign-compare -Wno-self-assign -MT tpm12/libtpms_tpm12_la-tpm_process.lo -MD -MP -MF tpm12/.deps/libtpms_tpm12_la-tpm_process.Tpo -c tpm12/tpm_process.c -o tpm12/libtpms_tpm12_la-tpm_process.o -tpm12/tpm_process.c: In function ‘TPM_Process_GetCapabilitySigned’: -tpm12/tpm_process.c:5089:19: error: ‘transportEncrypt’ may be used uninitialized in this function [-Werror=maybe-uninitialized] - returnCode = TPM_ProcessAudit(tpm_state, - ^ -tpm12/tpm_process.c: In function ‘TPM_Process_SetCapability’: -tpm12/tpm_process.c:5309:19: error: ‘transportEncrypt’ may be used uninitialized in this function [-Werror=maybe-uninitialized] - returnCode = TPM_ProcessAudit(tpm_state, - ^ -tpm12/tpm_process.c: At top level: - -gcc -DHAVE_CONFIG_H -I. -I.. -include tpm_library_conf.h -I../include/libtpms -I../include/libtpms -fstack-protector-strong -DTPM_V12 -DTPM_PCCLIENT -DTPM_VOLATILE_LOAD -DTPM_ENABLE_ACTIVATE -DTPM_AES -DTPM_LIBTPMS_CALLBACKS -DTPM_NV_DISK -DTPM_POSIX -DTPM_NOMAINTENANCE_COMMANDS -O3 -DUSE_OPENSSL_FUNCTIONS_SYMMETRIC=1 -DUSE_OPENSSL_FUNCTIONS_EC=1 -DUSE_OPENSSL_FUNCTIONS_ECDSA=0 -DUSE_OPENSSL_FUNCTIONS_RSA=0 -Wall -Werror -Wreturn-type -Wsign-compare -Wno-self-assign -MT tpm12/libtpms_tpm12_la-tpm_transport.lo -MD -MP -MF tpm12/.deps/libtpms_tpm12_la-tpm_transport.Tpo -c tpm12/tpm_transport.c -o tpm12/libtpms_tpm12_la-tpm_transport.o -tpm12/tpm_transport.c: In function ‘TPM_Process_ReleaseTransportSigned’: -tpm12/tpm_transport.c:2810:42: error: ‘t1TpmTransportInternal’ may be used uninitialized in this function [-Werror=maybe-uninitialized] - returnCode = TPM_TransportLogOut_Extend(t1TpmTransportInternal->transDigest, - ^ - -This patch initializes the variables. - -Signed-off-by: Stefan Berger <stefanb@linux.ibm.com> ---- - src/tpm12/tpm_nvram.c | 4 ++-- - src/tpm12/tpm_process.c | 4 ++-- - src/tpm12/tpm_transport.c | 2 +- - 3 files changed, 5 insertions(+), 5 deletions(-) - -diff --git a/src/tpm12/tpm_nvram.c b/src/tpm12/tpm_nvram.c -index 1b9c005..620944e 100644 ---- a/src/tpm12/tpm_nvram.c -+++ b/src/tpm12/tpm_nvram.c -@@ -1288,7 +1288,7 @@ TPM_RESULT TPM_Process_NVReadValue(tpm_state_t *tpm_state, - TPM_BOOL ignore_auth = FALSE; - TPM_BOOL dir = FALSE; - TPM_BOOL physicalPresence; -- TPM_BOOL isGPIO; -+ TPM_BOOL isGPIO = FALSE; - BYTE *gpioData = NULL; - TPM_NV_DATA_SENSITIVE *d1NvdataSensitive; - uint32_t s1Last; -@@ -2000,7 +2000,7 @@ TPM_RESULT TPM_Process_NVWriteValue(tpm_state_t *tpm_state, - TPM_NV_DATA_SENSITIVE *d1NvdataSensitive; - uint32_t s1Last; - TPM_BOOL physicalPresence; -- TPM_BOOL isGPIO; -+ TPM_BOOL isGPIO = FALSE; - uint32_t nv1 = tpm_state->tpm_permanent_data.noOwnerNVWrite; - /* temp for noOwnerNVWrite, initialize to - silence compiler */ -diff --git a/src/tpm12/tpm_process.c b/src/tpm12/tpm_process.c -index d6a3b8e..c433621 100644 ---- a/src/tpm12/tpm_process.c -+++ b/src/tpm12/tpm_process.c -@@ -4844,7 +4844,7 @@ TPM_RESULT TPM_Process_GetCapabilitySigned(tpm_state_t *tpm_state, - unsigned char * inParamEnd; /* ending point of inParam's */ - TPM_DIGEST inParamDigest; - TPM_BOOL auditStatus; /* audit the ordinal */ -- TPM_BOOL transportEncrypt; /* wrapped in encrypted transport session */ -+ TPM_BOOL transportEncrypt = FALSE;/* wrapped in encrypted transport session */ - TPM_BOOL authHandleValid = FALSE; - TPM_AUTH_SESSION_DATA *auth_session_data; /* session data for authHandle */ - TPM_SECRET *hmacKey; -@@ -5144,7 +5144,7 @@ TPM_RESULT TPM_Process_SetCapability(tpm_state_t *tpm_state, - unsigned char * inParamEnd; /* ending point of inParam's */ - TPM_DIGEST inParamDigest; - TPM_BOOL auditStatus; /* audit the ordinal */ -- TPM_BOOL transportEncrypt; /* wrapped in encrypted transport session */ -+ TPM_BOOL transportEncrypt = FALSE;/* wrapped in encrypted transport session */ - TPM_BOOL authHandleValid = FALSE; - TPM_AUTH_SESSION_DATA *auth_session_data; /* session data for authHandle */ - TPM_SECRET *hmacKey; -diff --git a/src/tpm12/tpm_transport.c b/src/tpm12/tpm_transport.c -index 2261670..7b9c520 100644 ---- a/src/tpm12/tpm_transport.c -+++ b/src/tpm12/tpm_transport.c -@@ -2599,7 +2599,7 @@ TPM_RESULT TPM_Process_ReleaseTransportSigned(tpm_state_t *tpm_state, - TPM_BOOL authHandleValid = FALSE; - TPM_BOOL transHandleValid = FALSE; - TPM_AUTH_SESSION_DATA *auth_session_data = NULL; /* session data for authHandle */ -- TPM_TRANSPORT_INTERNAL *t1TpmTransportInternal; -+ TPM_TRANSPORT_INTERNAL *t1TpmTransportInternal = NULL; - TPM_SECRET *hmacKey; - TPM_KEY *sigKey = NULL; /* the key specified by keyHandle */ - TPM_BOOL parentPCRStatus; --- -2.26.2 - diff --git a/dev-libs/libtpms/files/libtpms-0.7.0-tpm12-Initialize-some-variables-for-gcc.patch b/dev-libs/libtpms/files/libtpms-0.7.0-tpm12-Initialize-some-variables-for-gcc.patch deleted file mode 100644 index 309c78b3d1eb..000000000000 --- a/dev-libs/libtpms/files/libtpms-0.7.0-tpm12-Initialize-some-variables-for-gcc.patch +++ /dev/null @@ -1,74 +0,0 @@ -From aab357515eda564500290a4b3f542d2b4609af4f Mon Sep 17 00:00:00 2001 -From: Stefan Berger <stefanb@linux.ibm.com> -Date: Tue, 14 Jan 2020 18:05:06 -0500 -Subject: [PATCH] tpm12: Initialize some variables for gcc ppc64el compiler -MIME-Version: 1.0 -Content-Type: text/plain; charset=UTF-8 -Content-Transfer-Encoding: 8bit - -gcc (Ubuntu 9.2.1-21ubuntu1) 9.2.1 20191130 - -The gcc compiler on Ubuntu Focal reports several false positives for -potentially uninitialized variables: - -tpm12/tpm_session.c: In function ‘TPM_Process_SaveContext’: -tpm12/tpm_session.c:3229:19: error: ‘tpm_auth_session_data’ may be used uninitialized in this function [-Werror=maybe-uninitialized] - 3229 | returnCode = TPM_AuthSessionData_Store(&r1ContextSensitive, tpm_auth_session_data); - | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -tpm12/tpm_delegate.c: In function ‘TPM_Process_DelegateManage’: -tpm12/tpm_delegate.c:1787:49: error: ‘familyRow’ may be used uninitialized in this function [-Werror=maybe-uninitialized] - 1787 | if ((opCode != TPM_FAMILY_CREATE) && (familyRow->flags & TPM_DELEGATE_ADMIN_LOCK)) { - | ~~~~~~~~~^~~~~~~ -tpm12/tpm_delegate.c: In function ‘TPM_Process_DelegateUpdateVerification’: -tpm12/tpm_delegate.c:3575:48: error: ‘d1DelegateTableRow’ may be used uninitialized in this function [-Werror=maybe-uninitialized] - 3575 | d1DelegateTableRow->pub.verificationCount = familyRow->verificationCount; - | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -All of the variables are initialize under the same condition as they are -accessed. - -Signed-off-by: Stefan Berger <stefanb@linux.ibm.com> ---- - src/tpm12/tpm_delegate.c | 4 ++-- - src/tpm12/tpm_session.c | 2 +- - 2 files changed, 3 insertions(+), 3 deletions(-) - -diff --git a/src/tpm12/tpm_delegate.c b/src/tpm12/tpm_delegate.c -index 51d12f3..37ebc02 100644 ---- a/src/tpm12/tpm_delegate.c -+++ b/src/tpm12/tpm_delegate.c -@@ -1629,7 +1629,7 @@ TPM_RESULT TPM_Process_DelegateManage(tpm_state_t *tpm_state, - TPM_SECRET *hmacKey; - TPM_SECRET savedAuth; /* saved copy for response */ - TPM_DELEGATE_PUBLIC *delegatePublic; /* from DSAP session */ -- TPM_FAMILY_TABLE_ENTRY *familyRow; /* family table row containing familyID */ -+ TPM_FAMILY_TABLE_ENTRY *familyRow = NULL; /* family table row containing familyID */ - uint32_t nv1 = tpm_state->tpm_permanent_data.noOwnerNVWrite; - /* temp for noOwnerNVWrite, initialize to - silence compiler */ -@@ -3360,7 +3360,7 @@ TPM_RESULT TPM_Process_DelegateUpdateVerification(tpm_state_t *tpm_state, - TPM_DELEGATE_INDEX d1DelegateIndex; - TPM_DELEGATE_OWNER_BLOB d1DelegateOwnerBlob; - TPM_DELEGATE_KEY_BLOB d1DelegateKeyBlob; -- TPM_DELEGATE_TABLE_ROW *d1DelegateTableRow; -+ TPM_DELEGATE_TABLE_ROW *d1DelegateTableRow = NULL; - TPM_FAMILY_ID familyID = 0; - TPM_FAMILY_TABLE_ENTRY *familyRow; /* family table row containing familyID */ - TPM_DELEGATE_PUBLIC *delegatePublic; /* from DSAP session */ -diff --git a/src/tpm12/tpm_session.c b/src/tpm12/tpm_session.c -index 5e7b708..15b977f 100644 ---- a/src/tpm12/tpm_session.c -+++ b/src/tpm12/tpm_session.c -@@ -3044,7 +3044,7 @@ TPM_RESULT TPM_Process_SaveContext(tpm_state_t *tpm_state, - TPM_STORE_BUFFER b1_sbuffer; /* serialization of b1 */ - TPM_STCLEAR_DATA *v1StClearData = NULL; - TPM_KEY_HANDLE_ENTRY *tpm_key_handle_entry; /* key table entry for the handle */ -- TPM_AUTH_SESSION_DATA *tpm_auth_session_data; /* session table entry for the handle */ -+ TPM_AUTH_SESSION_DATA *tpm_auth_session_data = NULL; /* session table entry for the handle */ - TPM_TRANSPORT_INTERNAL *tpm_transport_internal; /* transport table entry for the handle */ - TPM_DAA_SESSION_DATA *tpm_daa_session_data; /* daa session table entry for the handle */ - TPM_NONCE *n1ContextNonce = NULL; --- -2.26.2 - diff --git a/dev-libs/libtpms/files/libtpms-0.7.0-tpm2-Fix-a-gcc-10.1.0-complaint.patch b/dev-libs/libtpms/files/libtpms-0.7.0-tpm2-Fix-a-gcc-10.1.0-complaint.patch deleted file mode 100644 index 539ddb243d07..000000000000 --- a/dev-libs/libtpms/files/libtpms-0.7.0-tpm2-Fix-a-gcc-10.1.0-complaint.patch +++ /dev/null @@ -1,53 +0,0 @@ -From f3f78c72a5b6ef42119188ac5af73bb3a0a8bbba Mon Sep 17 00:00:00 2001 -From: Stefan Berger <stefanb@linux.vnet.ibm.com> -Date: Tue, 12 May 2020 13:41:53 -0400 -Subject: [PATCH] tpm2: Fix a gcc 10.1.0 complaint - -This PR addresses issue 133: https://github.com/stefanberger/libtpms/issues/133 - -bin/sh ../libtool --tag=CC --mode=compile x86_64-pc-linux-gnu-gcc \ - -DHAVE_CONFIG_H -I. -I.. -include tpm_library_conf.h \ - -I../include/libtpms -I../include/libtpms -fstack-protector-strong \ - -D_POSIX_ -DTPM_POSIX -DTPM_LIBTPMS_CALLBACKS -I ./tpm2 \ - -I ./tpm2/crypto -I ./tpm2/crypto/openssl -g -O2 \ - -DUSE_OPENSSL_FUNCTIONS_SYMMETRIC=1 -DUSE_OPENSSL_FUNCTIONS_EC=1 \ - -DUSE_OPENSSL_FUNCTIONS_ECDSA=1 -DUSE_OPENSSL_FUNCTIONS_RSA=1 \ - -Wall -Werror -Wreturn-type -Wsign-compare -Wno-self-assign \ - -c -o tpm2/libtpms_tpm2_la-NVDynamic.lo `test -f 'tpm2/NVDynamic.c' \ - || echo './'`tpm2/NVDynamic.c -libtool: compile: x86_64-pc-linux-gnu-gcc -DHAVE_CONFIG_H -I. \ - -I.. -include tpm_library_conf.h -I../include/libtpms \ - -I../include/libtpms -fstack-protector-strong -D_POSIX_ -DTPM_POSIX \ - -DTPM_LIBTPMS_CALLBACKS -I ./tpm2 -I ./tpm2/crypto \ - -I ./tpm2/crypto/openssl -g -O2 -DUSE_OPENSSL_FUNCTIONS_SYMMETRIC=1 \ - -DUSE_OPENSSL_FUNCTIONS_EC=1 -DUSE_OPENSSL_FUNCTIONS_ECDSA=1 \ - -DUSE_OPENSSL_FUNCTIONS_RSA=1 -Wall -Werror -Wreturn-type -Wsign-compare \ - -Wno-self-assign -c tpm2/NVDynamic.c -fPIC -DPIC \ - -o tpm2/.libs/libtpms_tpm2_la-NVDynamic.o -tpm2/NVDynamic.c: In function ?NvNextByType?: -tpm2/NVDynamic.c:126:10: error: ?nvHandle? may be used uninitialized in this function [-Werror=maybe-uninitialized] - 126 | *handle = nvHandle; - | ~~~~~~~~^~~~~~~~~~ -tpm2/NVDynamic.c: At top level: - -Signed-off-by: Stefan Berger <stefanb@linux.ibm.com> ---- - src/tpm2/NVDynamic.c | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/src/tpm2/NVDynamic.c b/src/tpm2/NVDynamic.c -index 32f46bb..4381658 100644 ---- a/src/tpm2/NVDynamic.c -+++ b/src/tpm2/NVDynamic.c -@@ -114,7 +114,7 @@ NvNextByType( - ) - { - NV_REF addr; -- TPM_HANDLE nvHandle; -+ TPM_HANDLE nvHandle = 0; // libtpms changed: gcc 10.1.0 complaint - while((addr = NvNext(iter, &nvHandle)) != 0) - { - // addr: the address of the location containing the handle of the value --- -2.26.2 - diff --git a/dev-libs/libtpms/libtpms-0.7.0-r1.ebuild b/dev-libs/libtpms/libtpms-0.7.0-r1.ebuild deleted file mode 100644 index a64f5e30012b..000000000000 --- a/dev-libs/libtpms/libtpms-0.7.0-r1.ebuild +++ /dev/null @@ -1,41 +0,0 @@ -# Copyright 1999-2020 Gentoo Authors -# Distributed under the terms of the GNU General Public License v2 - -EAPI=7 - -inherit autotools - -DESCRIPTION="Library providing software emultion of a TPM" -HOMEPAGE="https://github.com/stefanberger/libtpms" -SRC_URI="https://github.com/stefanberger/libtpms/archive/v${PV}.tar.gz -> ${P}.tar.gz" -LICENSE="BSD" -SLOT="0" -KEYWORDS="~amd64" -IUSE="libressl" - -DEPEND=" !libressl? ( dev-libs/openssl:0= ) - libressl? ( dev-libs/libressl:0= )" -RDEPEND="${DEPEND}" - -PATCHES=( - "${FILESDIR}/${P}-tpm12-Initialize-some-variables-for-gcc.patch" - "${FILESDIR}/${P}-tpm12-Fix-potential-buffer-overflow-in-filename-creation.patch" - "${FILESDIR}/${P}-tpm12-Initialize-a-few-variables-for-x86-gcc-O3.patch" - "${FILESDIR}/${P}-tpm2-Fix-a-gcc-10.1.0-complaint.patch" - ) - -src_prepare() { - default - eautoreconf -} - -src_configure() { - econf \ - --with-openssl \ - --with-tpm2 -} - -src_install() { - default - find "${D}" -name '*.la' -delete || die -} |