aboutsummaryrefslogtreecommitdiffstats
path: root/testing/openscap/0003-Drop-bogus-VERIFY_SIGNATURE-and-VERIFY_DIGEST-checks.patch
diff options
context:
space:
mode:
authorLeo <thinkabit.ukim@gmail.com>2019-11-22 16:49:11 +0100
committerLeo <thinkabit.ukim@gmail.com>2019-11-22 17:09:21 +0100
commit875db1da67b9991c2e374417755cabf7ebc6a712 (patch)
treee26708c477c53adfdbf4304e592c6fb01489eb33 /testing/openscap/0003-Drop-bogus-VERIFY_SIGNATURE-and-VERIFY_DIGEST-checks.patch
parent36d78873d234395da1fb703c3fa4162af61bdb38 (diff)
downloadaports-875db1da67b9991c2e374417755cabf7ebc6a712.tar.bz2
aports-875db1da67b9991c2e374417755cabf7ebc6a712.tar.xz
testing/openscap: rebuild against new rpm
Diffstat (limited to 'testing/openscap/0003-Drop-bogus-VERIFY_SIGNATURE-and-VERIFY_DIGEST-checks.patch')
-rw-r--r--testing/openscap/0003-Drop-bogus-VERIFY_SIGNATURE-and-VERIFY_DIGEST-checks.patch56
1 files changed, 56 insertions, 0 deletions
diff --git a/testing/openscap/0003-Drop-bogus-VERIFY_SIGNATURE-and-VERIFY_DIGEST-checks.patch b/testing/openscap/0003-Drop-bogus-VERIFY_SIGNATURE-and-VERIFY_DIGEST-checks.patch
new file mode 100644
index 0000000000..cc2be0ad3f
--- /dev/null
+++ b/testing/openscap/0003-Drop-bogus-VERIFY_SIGNATURE-and-VERIFY_DIGEST-checks.patch
@@ -0,0 +1,56 @@
+From efd08dd9d8453583f1e801ddb5ac0af65cc86f69 Mon Sep 17 00:00:00 2001
+From: Panu Matilainen <pmatilai@redhat.com>
+Date: Tue, 11 Jun 2019 16:12:57 +0300
+Subject: [PATCH 3/3] Drop bogus VERIFY_SIGNATURE and VERIFY_DIGEST checks
+
+VERIFY_SIGNATURE and VERIFY_DIGEST are not independent verification
+checks, these checks are performed internally by rpm and failure in
+either will cause the entire header failing to load. These flags allow
+disabling that verification, but this doesn't make sense for openscap
+and doesn't work this way in rpm >= 4.15 anyway.
+---
+ .../probes/unix/linux/rpmverifypackage_probe.c | 14 --------------
+ 1 file changed, 14 deletions(-)
+
+diff --git a/src/OVAL/probes/unix/linux/rpmverifypackage_probe.c b/src/OVAL/probes/unix/linux/rpmverifypackage_probe.c
+index ed6c714d8..06059ae47 100644
+--- a/src/OVAL/probes/unix/linux/rpmverifypackage_probe.c
++++ b/src/OVAL/probes/unix/linux/rpmverifypackage_probe.c
+@@ -69,9 +69,7 @@ typedef struct {
+
+ const rpmverifypackage_bhmap_t rpmverifypackage_bhmap[] = {
+ { "nodeps", (uint64_t)VERIFY_DEPS , "--nodeps"},
+- { "nodigest", (uint64_t)VERIFY_DIGEST , "--nodigest"},
+ { "noscripts", (uint64_t)VERIFY_SCRIPT , "--noscript"},
+- { "nosignature", (uint64_t)VERIFY_SIGNATURE , "--nosignature"}
+ };
+
+ struct rpmverify_res {
+@@ -409,24 +407,12 @@ static int rpmverifypackage_additem(probe_ctx *ctx, struct rpmverify_res *res)
+ probe_item_ent_add(item, "dependency_check_passed", NULL, value);
+ SEXP_free(value);
+ }
+- if (res->vflags & VERIFY_DIGEST) {
+- dI("VERIFY_DIGEST %d", res->vresults & VERIFY_DIGEST);
+- value = probe_entval_from_cstr(OVAL_DATATYPE_BOOLEAN, (res->vresults & VERIFY_DIGEST ? "1" : "0"), 1);
+- probe_item_ent_add(item, "digest_check_passed", NULL, value);
+- SEXP_free(value);
+- }
+ if (res->vflags & VERIFY_SCRIPT) {
+ dI("VERIFY_SCRIPT %d", res->vresults & VERIFY_SCRIPT);
+ value = probe_entval_from_cstr(OVAL_DATATYPE_BOOLEAN, (res->vresults & VERIFY_SCRIPT ? "1" : "0"), 1);
+ probe_item_ent_add(item, "verification_script_successful", NULL, value);
+ SEXP_free(value);
+ }
+- if (res->vflags & VERIFY_SIGNATURE) {
+- dI("VERIFY_SIGNATURE %d", res->vresults & VERIFY_SIGNATURE);
+- value = probe_entval_from_cstr(OVAL_DATATYPE_BOOLEAN, (res->vresults & VERIFY_SIGNATURE ? "1" : "0"), 1);
+- probe_item_ent_add(item, "signature_check_passed", NULL, value);
+- SEXP_free(value);
+- }
+
+ return probe_item_collect(ctx, item) == 2 ? 1 : 0;
+ }
+--
+2.22.0
+