|
11 | 11 | * it should be.
|
12 | 12 | */
|
13 | 13 |
|
14 |
| -#include <crypto/sha2.h> |
| 14 | +#include <crypto/hash.h> |
15 | 15 |
|
16 | 16 | #include "include/apparmor.h"
|
17 | 17 | #include "include/crypto.h"
|
18 | 18 |
|
| 19 | +static unsigned int apparmor_hash_size; |
| 20 | + |
| 21 | +static struct crypto_shash *apparmor_tfm; |
| 22 | + |
19 | 23 | unsigned int aa_hash_size(void)
|
20 | 24 | {
|
21 |
| - return SHA256_DIGEST_SIZE; |
| 25 | + return apparmor_hash_size; |
22 | 26 | }
|
23 | 27 |
|
24 | 28 | char *aa_calc_hash(void *data, size_t len)
|
25 | 29 | {
|
| 30 | + SHASH_DESC_ON_STACK(desc, apparmor_tfm); |
26 | 31 | char *hash;
|
| 32 | + int error; |
| 33 | + |
| 34 | + if (!apparmor_tfm) |
| 35 | + return NULL; |
27 | 36 |
|
28 |
| - hash = kzalloc(SHA256_DIGEST_SIZE, GFP_KERNEL); |
| 37 | + hash = kzalloc(apparmor_hash_size, GFP_KERNEL); |
29 | 38 | if (!hash)
|
30 | 39 | return ERR_PTR(-ENOMEM);
|
31 | 40 |
|
32 |
| - sha256(data, len, hash); |
| 41 | + desc->tfm = apparmor_tfm; |
| 42 | + |
| 43 | + error = crypto_shash_init(desc); |
| 44 | + if (error) |
| 45 | + goto fail; |
| 46 | + error = crypto_shash_update(desc, (u8 *) data, len); |
| 47 | + if (error) |
| 48 | + goto fail; |
| 49 | + error = crypto_shash_final(desc, hash); |
| 50 | + if (error) |
| 51 | + goto fail; |
| 52 | + |
33 | 53 | return hash;
|
| 54 | + |
| 55 | +fail: |
| 56 | + kfree(hash); |
| 57 | + |
| 58 | + return ERR_PTR(error); |
34 | 59 | }
|
35 | 60 |
|
36 | 61 | int aa_calc_profile_hash(struct aa_profile *profile, u32 version, void *start,
|
37 | 62 | size_t len)
|
38 | 63 | {
|
39 |
| - struct sha256_state state; |
| 64 | + SHASH_DESC_ON_STACK(desc, apparmor_tfm); |
| 65 | + int error; |
40 | 66 | __le32 le32_version = cpu_to_le32(version);
|
41 | 67 |
|
42 | 68 | if (!aa_g_hash_policy)
|
43 | 69 | return 0;
|
44 | 70 |
|
45 |
| - profile->hash = kzalloc(SHA256_DIGEST_SIZE, GFP_KERNEL); |
| 71 | + if (!apparmor_tfm) |
| 72 | + return 0; |
| 73 | + |
| 74 | + profile->hash = kzalloc(apparmor_hash_size, GFP_KERNEL); |
46 | 75 | if (!profile->hash)
|
47 | 76 | return -ENOMEM;
|
48 | 77 |
|
49 |
| - sha256_init(&state); |
50 |
| - sha256_update(&state, (u8 *)&le32_version, 4); |
51 |
| - sha256_update(&state, (u8 *)start, len); |
52 |
| - sha256_final(&state, profile->hash); |
| 78 | + desc->tfm = apparmor_tfm; |
| 79 | + |
| 80 | + error = crypto_shash_init(desc); |
| 81 | + if (error) |
| 82 | + goto fail; |
| 83 | + error = crypto_shash_update(desc, (u8 *) &le32_version, 4); |
| 84 | + if (error) |
| 85 | + goto fail; |
| 86 | + error = crypto_shash_update(desc, (u8 *) start, len); |
| 87 | + if (error) |
| 88 | + goto fail; |
| 89 | + error = crypto_shash_final(desc, profile->hash); |
| 90 | + if (error) |
| 91 | + goto fail; |
| 92 | + |
53 | 93 | return 0;
|
| 94 | + |
| 95 | +fail: |
| 96 | + kfree(profile->hash); |
| 97 | + profile->hash = NULL; |
| 98 | + |
| 99 | + return error; |
54 | 100 | }
|
55 | 101 |
|
56 | 102 | static int __init init_profile_hash(void)
|
57 | 103 | {
|
58 |
| - if (apparmor_initialized) |
59 |
| - aa_info_message("AppArmor sha256 policy hashing enabled"); |
| 104 | + struct crypto_shash *tfm; |
| 105 | + |
| 106 | + if (!apparmor_initialized) |
| 107 | + return 0; |
| 108 | + |
| 109 | + tfm = crypto_alloc_shash("sha256", 0, 0); |
| 110 | + if (IS_ERR(tfm)) { |
| 111 | + int error = PTR_ERR(tfm); |
| 112 | + AA_ERROR("failed to setup profile sha256 hashing: %d\n", error); |
| 113 | + return error; |
| 114 | + } |
| 115 | + apparmor_tfm = tfm; |
| 116 | + apparmor_hash_size = crypto_shash_digestsize(apparmor_tfm); |
| 117 | + |
| 118 | + aa_info_message("AppArmor sha256 policy hashing enabled"); |
| 119 | + |
60 | 120 | return 0;
|
61 | 121 | }
|
| 122 | + |
62 | 123 | late_initcall(init_profile_hash);
|
0 commit comments