1 // SPDX-License-Identifier: GPL-2.0-only
3 * AppArmor security module
5 * This file contains AppArmor policy loading interface function definitions.
7 * Copyright 2013 Canonical Ltd.
9 * Fns to provide a checksum of policy that has been loaded this can be
10 * compared to userspace policy compiles to check loaded policy is what
14 #include <crypto/hash.h>
16 #include "include/apparmor.h"
17 #include "include/crypto.h"
19 static unsigned int apparmor_hash_size
;
21 static struct crypto_shash
*apparmor_tfm
;
23 unsigned int aa_hash_size(void)
25 return apparmor_hash_size
;
28 char *aa_calc_hash(void *data
, size_t len
)
30 SHASH_DESC_ON_STACK(desc
, apparmor_tfm
);
37 hash
= kzalloc(apparmor_hash_size
, GFP_KERNEL
);
41 desc
->tfm
= apparmor_tfm
;
43 error
= crypto_shash_init(desc
);
46 error
= crypto_shash_update(desc
, (u8
*) data
, len
);
49 error
= crypto_shash_final(desc
, hash
);
58 return ERR_PTR(error
);
61 int aa_calc_profile_hash(struct aa_profile
*profile
, u32 version
, void *start
,
64 SHASH_DESC_ON_STACK(desc
, apparmor_tfm
);
66 __le32 le32_version
= cpu_to_le32(version
);
68 if (!aa_g_hash_policy
)
74 profile
->hash
= kzalloc(apparmor_hash_size
, GFP_KERNEL
);
78 desc
->tfm
= apparmor_tfm
;
80 error
= crypto_shash_init(desc
);
83 error
= crypto_shash_update(desc
, (u8
*) &le32_version
, 4);
86 error
= crypto_shash_update(desc
, (u8
*) start
, len
);
89 error
= crypto_shash_final(desc
, profile
->hash
);
102 static int __init
init_profile_hash(void)
104 struct crypto_shash
*tfm
;
106 if (!apparmor_initialized
)
109 tfm
= crypto_alloc_shash("sha1", 0, 0);
111 int error
= PTR_ERR(tfm
);
112 AA_ERROR("failed to setup profile sha1 hashing: %d\n", error
);
116 apparmor_hash_size
= crypto_shash_digestsize(apparmor_tfm
);
118 aa_info_message("AppArmor sha1 policy hashing enabled");
123 late_initcall(init_profile_hash
);