Blame SOURCES/fapolicyd-openssl.patch

fa39dc
diff -up ./BUILD.md.openssl ./BUILD.md
fa39dc
--- ./BUILD.md.openssl	2022-06-21 16:55:47.000000000 +0200
fa39dc
+++ ./BUILD.md	2022-08-02 14:10:48.092466542 +0200
fa39dc
@@ -16,7 +16,8 @@ BUILD-TIME DEPENDENCIES (fedora and RHEL
fa39dc
 * libudev-devel
fa39dc
 * kernel-headers
fa39dc
 * systemd-devel
fa39dc
-* libgcrypt-devel
fa39dc
+* libgcrypt-devel ( <= fapolicyd-1.1.3)
fa39dc
+* openssl         ( >= fapolicyd-1.1.4)
fa39dc
 * rpm-devel (optional)
fa39dc
 * file
fa39dc
 * file-devel
fa39dc
diff -U0 ./ChangeLog.openssl ./ChangeLog
fa39dc
diff -up ./configure.ac.openssl ./configure.ac
fa39dc
--- ./configure.ac.openssl	2022-06-21 16:55:47.000000000 +0200
fa39dc
+++ ./configure.ac	2022-08-02 14:10:48.092466542 +0200
fa39dc
@@ -87,7 +87,7 @@ AC_CHECK_HEADER(uthash.h, , [AC_MSG_ERRO
fa39dc
 echo .
fa39dc
 echo Checking for required libraries
fa39dc
 AC_CHECK_LIB(udev, udev_device_get_devnode, , [AC_MSG_ERROR([libudev not found])], -ludev)
fa39dc
-AC_CHECK_LIB(gcrypt, gcry_md_open, , [AC_MSG_ERROR([libgcrypt not found])], -lgcrypt)
fa39dc
+AC_CHECK_LIB(crypto, SHA256, , [AC_MSG_ERROR([openssl libcrypto not found])], -lcrypto)
fa39dc
 AC_CHECK_LIB(magic, magic_descriptor, , [AC_MSG_ERROR([libmagic not found])], -lmagic)
fa39dc
 AC_CHECK_LIB(cap-ng, capng_change_id, , [AC_MSG_ERROR([libcap-ng not found])], -lcap-ng)
fa39dc
 AC_CHECK_LIB(seccomp, seccomp_rule_add, , [AC_MSG_ERROR([libseccomp not found])], -lseccomp)
fa39dc
diff -up ./fapolicyd.spec.openssl ./fapolicyd.spec
fa39dc
--- ./fapolicyd.spec.openssl	2022-06-21 16:55:47.000000000 +0200
fa39dc
+++ ./fapolicyd.spec	2022-08-02 14:10:48.092466542 +0200
fa39dc
@@ -8,7 +8,7 @@ Source0: https://people.redhat.com/sgrub
fa39dc
 BuildRequires: gcc
fa39dc
 BuildRequires: kernel-headers
fa39dc
 BuildRequires: autoconf automake make gcc libtool
fa39dc
-BuildRequires: systemd-devel libgcrypt-devel rpm-devel file-devel file
fa39dc
+BuildRequires: systemd-devel openssl-devel rpm-devel file-devel file
fa39dc
 BuildRequires: libcap-ng-devel libseccomp-devel lmdb-devel
fa39dc
 BuildRequires: python3-devel
fa39dc
 BuildRequires: uthash-devel
fa39dc
diff -up ./src/cli/fapolicyd-cli.c.openssl ./src/cli/fapolicyd-cli.c
fa39dc
--- ./src/cli/fapolicyd-cli.c.openssl	2022-06-21 16:55:47.000000000 +0200
fa39dc
+++ ./src/cli/fapolicyd-cli.c	2022-08-02 14:10:48.093466520 +0200
fa39dc
@@ -39,7 +39,6 @@
fa39dc
 #include <stdatomic.h>
fa39dc
 #include <lmdb.h>
fa39dc
 #include <limits.h>
fa39dc
-#include <gcrypt.h>
fa39dc
 #include "policy.h"
fa39dc
 #include "database.h"
fa39dc
 #include "file-cli.h"
fa39dc
@@ -670,11 +669,6 @@ static int check_trustdb(void)
fa39dc
 	if (rc)
fa39dc
 		return 1;
fa39dc
 
fa39dc
-	// Initialize libgcrypt
fa39dc
-	gcry_check_version(NULL);
fa39dc
-	gcry_control(GCRYCTL_DISABLE_SECMEM, 0);
fa39dc
-	gcry_control(GCRYCTL_INITIALIZATION_FINISHED, 0);
fa39dc
-
fa39dc
 	do {
fa39dc
 		unsigned int tsource; // unused
fa39dc
 		off_t size;
fa39dc
diff -up ./src/library/database.c.openssl ./src/library/database.c
fa39dc
--- ./src/library/database.c.openssl	2022-08-02 14:10:48.090466587 +0200
fa39dc
+++ ./src/library/database.c	2022-08-02 14:13:11.995236110 +0200
fa39dc
@@ -35,7 +35,7 @@
fa39dc
 #include <unistd.h>
fa39dc
 #include <fcntl.h>
fa39dc
 #include <ctype.h>
fa39dc
-#include <gcrypt.h>
fa39dc
+#include <openssl/sha.h>
fa39dc
 #include <signal.h>
fa39dc
 #include <sys/stat.h>
fa39dc
 #include <sys/types.h>
fa39dc
@@ -244,26 +244,18 @@ static void abort_transaction(MDB_txn *t
fa39dc
 static char *path_to_hash(const char *path, const size_t path_len) MALLOCLIKE;
fa39dc
 static char *path_to_hash(const char *path, const size_t path_len)
fa39dc
 {
fa39dc
-	gcry_md_hd_t h;
fa39dc
-	unsigned int len;
fa39dc
-	unsigned char *hptr;
fa39dc
+	unsigned char hptr[80];
fa39dc
 	char *digest;
fa39dc
 
fa39dc
-	if (gcry_md_open(&h, GCRY_MD_SHA512, GCRY_MD_FLAG_SECURE))
fa39dc
+	if (path_len == 0)
fa39dc
 		return NULL;
fa39dc
 
fa39dc
-	gcry_md_write(h, path, path_len);
fa39dc
-	hptr = gcry_md_read(h, GCRY_MD_SHA512);
fa39dc
-
fa39dc
-	len = gcry_md_get_algo_dlen(GCRY_MD_SHA512) * sizeof(char);
fa39dc
-	digest = malloc((2 * len) + 1);
fa39dc
-	if (digest == NULL) {
fa39dc
-		gcry_md_close(h);
fa39dc
+	SHA512((unsigned char *)path, path_len, (unsigned char *)&hptr);
fa39dc
+	digest = malloc((SHA512_LEN * 2) + 1);
fa39dc
+	if (digest == NULL)
fa39dc
 		return digest;
fa39dc
-	}
fa39dc
 
fa39dc
-	bytes2hex(digest, hptr, len);
fa39dc
-	gcry_md_close(h);
fa39dc
+	bytes2hex(digest, hptr, SHA512_LEN);
fa39dc
 
fa39dc
 	return digest;
fa39dc
 }
fa39dc
@@ -296,7 +288,7 @@ static int write_db(const char *idx, con
fa39dc
 		if (hash == NULL)
fa39dc
 			return 5;
fa39dc
 		key.mv_data = (void *)hash;
fa39dc
-		key.mv_size = gcry_md_get_algo_dlen(GCRY_MD_SHA512) * 2 + 1;
fa39dc
+		key.mv_size = (SHA512_LEN * 2) + 1;
fa39dc
 	} else {
fa39dc
 		key.mv_data = (void *)idx;
fa39dc
 		key.mv_size = len;
fa39dc
@@ -416,7 +408,7 @@ static char *lt_read_db(const char *inde
fa39dc
 		if (hash == NULL)
fa39dc
 			return NULL;
fa39dc
 		key.mv_data = (void *)hash;
fa39dc
-		key.mv_size = gcry_md_get_algo_dlen(GCRY_MD_SHA512) * 2 + 1;
fa39dc
+		key.mv_size = (SHA512_LEN * 2) + 1;
fa39dc
 	} else {
fa39dc
 		key.mv_data = (void *)index;
fa39dc
 		key.mv_size = len;
fa39dc
diff -up ./src/library/file.c.openssl ./src/library/file.c
fa39dc
--- ./src/library/file.c.openssl	2022-06-21 16:55:47.000000000 +0200
fa39dc
+++ ./src/library/file.c	2022-08-02 14:10:48.094466497 +0200
fa39dc
@@ -31,7 +31,7 @@
fa39dc
 #include <sys/stat.h>
fa39dc
 #include <string.h>
fa39dc
 #include <stdlib.h>
fa39dc
-#include <gcrypt.h>
fa39dc
+#include <openssl/sha.h>
fa39dc
 #include <magic.h>
fa39dc
 #include <libudev.h>
fa39dc
 #include <elf.h>
fa39dc
@@ -51,7 +51,6 @@ static struct udev *udev;
fa39dc
 magic_t magic_cookie;
fa39dc
 struct cache { dev_t device; const char *devname; };
fa39dc
 static struct cache c = { 0, NULL };
fa39dc
-static size_t hash_size = 32;	// init so cli doesn't need to call file_init
fa39dc
 
fa39dc
 // readelf -l path-to-app | grep 'Requesting' | cut -d':' -f2 | tr -d ' ]';
fa39dc
 static const char *interpreters[] = {
fa39dc
@@ -96,12 +95,6 @@ void file_init(void)
fa39dc
 		msg(LOG_ERR, "Unable to load magic database");
fa39dc
 		exit(1);
fa39dc
 	}
fa39dc
-
fa39dc
-	// Initialize libgcrypt
fa39dc
-	gcry_check_version(NULL);
fa39dc
-	gcry_control(GCRYCTL_DISABLE_SECMEM, 0);
fa39dc
-	gcry_control(GCRYCTL_INITIALIZATION_FINISHED, 0);
fa39dc
-	hash_size = gcry_md_get_algo_dlen(GCRY_MD_SHA256) * sizeof(char);
fa39dc
 }
fa39dc
 
fa39dc
 
fa39dc
@@ -445,12 +438,12 @@ char *get_hash_from_fd2(int fd, size_t s
fa39dc
 	if (mapped != MAP_FAILED) {
fa39dc
 		unsigned char hptr[40];
fa39dc
 
fa39dc
-		gcry_md_hash_buffer(GCRY_MD_SHA256, &hptr, mapped, size);
fa39dc
+		SHA256(mapped, size, (unsigned char *)&hptr);
fa39dc
 		munmap(mapped, size);
fa39dc
-		digest = malloc(65);
fa39dc
+		digest = malloc((SHA256_LEN * 2) + 1);
fa39dc
 
fa39dc
 		// Convert to ASCII string
fa39dc
-		bytes2hex(digest, hptr, hash_size);
fa39dc
+		bytes2hex(digest, hptr, SHA256_LEN);
fa39dc
 	}
fa39dc
 	return digest;
fa39dc
 }
fa39dc
@@ -476,7 +469,7 @@ int get_ima_hash(int fd, char *sha)
fa39dc
 	}
fa39dc
 
fa39dc
 	// Looks like it what we want...
fa39dc
-	bytes2hex(sha, &tmp[2], 32);
fa39dc
+	bytes2hex(sha, &tmp[2], SHA256_LEN);
fa39dc
 	return 1;
fa39dc
 }
fa39dc
 
fa39dc
diff -up ./src/library/file.h.openssl ./src/library/file.h
fa39dc
--- ./src/library/file.h.openssl	2022-06-21 16:55:47.000000000 +0200
fa39dc
+++ ./src/library/file.h	2022-08-02 14:10:48.094466497 +0200
fa39dc
@@ -40,6 +40,9 @@ struct file_info
fa39dc
 	struct timespec time;
fa39dc
 };
fa39dc
 
fa39dc
+#define SHA256_LEN	32
fa39dc
+#define SHA512_LEN	64
fa39dc
+
fa39dc
 void file_init(void);
fa39dc
 void file_close(void);
fa39dc
 struct file_info *stat_file_entry(int fd) MALLOCLIKE;