/Linux-v6.1/security/integrity/ima/ |
D | ima_queue.c | 25 static struct tpm_digest *digests; variable 58 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, in ima_lookup_digest_entry() 111 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); in ima_add_digest_entry() 163 u8 *digest = entry->digests[ima_hash_algo_idx].digest; in ima_add_template_entry() 164 struct tpm_digest *digests_arg = entry->digests; in ima_add_template_entry() 188 digests_arg = digests; in ima_add_template_entry() 223 digests = kcalloc(ima_tpm_chip->nr_allocated_banks, sizeof(*digests), in ima_init_digests() 225 if (!digests) in ima_init_digests() 229 digests[i].alg_id = ima_tpm_chip->allocated_banks[i].alg_id; in ima_init_digests() 237 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
|
D | ima_api.c | 31 kfree(entry->digests); in ima_free_template_entry() 43 struct tpm_digest *digests; in ima_alloc_init_template() local 56 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, in ima_alloc_init_template() 57 sizeof(*digests), GFP_NOFS); in ima_alloc_init_template() 58 if (!digests) { in ima_alloc_init_template() 64 (*entry)->digests = digests; in ima_alloc_init_template()
|
D | ima_template.c | 358 struct tpm_digest *digests; in ima_restore_template_data() local 367 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, in ima_restore_template_data() 368 sizeof(*digests), GFP_NOFS); in ima_restore_template_data() 369 if (!digests) { in ima_restore_template_data() 374 (*entry)->digests = digests; in ima_restore_template_data() 381 kfree((*entry)->digests); in ima_restore_template_data()
|
D | ima_crypto.c | 622 rc = crypto_shash_final(shash, entry->digests[tfm_idx].digest); in ima_calc_field_array_hash_tfm() 637 entry->digests[ima_sha1_idx].alg_id = TPM_ALG_SHA1; in ima_calc_field_array_hash() 645 entry->digests[i].alg_id = alg_id; in ima_calc_field_array_hash() 650 memcpy(entry->digests[i].digest, in ima_calc_field_array_hash() 651 entry->digests[ima_sha1_idx].digest, in ima_calc_field_array_hash()
|
D | ima_fs.c | 154 ima_putc(m, e->digests[ima_sha1_idx].digest, TPM_DIGEST_SIZE); in ima_measurements_show() 237 ima_print_digest(m, e->digests[ima_sha1_idx].digest, TPM_DIGEST_SIZE); in ima_ascii_measurements_show()
|
D | ima.h | 100 struct tpm_digest *digests; member
|
D | Kconfig | 71 template permits both larger hash digests and longer
|
/Linux-v6.1/security/loadpin/ |
D | Kconfig | 28 digests it considers trusted. A verity backed filesystem is 30 of trusted digests. 34 expects a file descriptor of a file with verity digests as 40 This is followed by the verity digests, with one digest per
|
/Linux-v6.1/drivers/char/tpm/ |
D | tpm-interface.c | 315 struct tpm_digest *digests) in tpm_pcr_extend() argument 325 if (digests[i].alg_id != chip->allocated_banks[i].alg_id) { in tpm_pcr_extend() 332 rc = tpm2_pcr_extend(chip, pcr_idx, digests); in tpm_pcr_extend() 336 rc = tpm1_pcr_extend(chip, pcr_idx, digests[0].digest, in tpm_pcr_extend()
|
D | tpm2-cmd.c | 236 struct tpm_digest *digests) in tpm2_pcr_extend() argument 260 tpm_buf_append_u16(&buf, digests[i].alg_id); in tpm2_pcr_extend() 261 tpm_buf_append(&buf, (const unsigned char *)&digests[i].digest, in tpm2_pcr_extend()
|
D | tpm.h | 219 struct tpm_digest *digests);
|
/Linux-v6.1/security/keys/trusted-keys/ |
D | trusted_tpm1.c | 28 static struct tpm_digest *digests; variable 385 return tpm_pcr_extend(chip, pcrnum, digests) ? -EINVAL : 0; in pcrlock() 1019 digests = kcalloc(chip->nr_allocated_banks, sizeof(*digests), in init_digests() 1021 if (!digests) in init_digests() 1025 digests[i].alg_id = chip->allocated_banks[i].alg_id; in init_digests() 1051 kfree(digests); in trusted_tpm_init() 1061 kfree(digests); in trusted_tpm_exit()
|
/Linux-v6.1/include/linux/ |
D | tpm_eventlog.h | 114 struct tpm_digest digests[]; member 229 halg_size = sizeof(event->digests[i].alg_id); in __calc_tpm2_event_size()
|
D | tpm.h | 427 struct tpm_digest *digests); 444 struct tpm_digest *digests) in tpm_pcr_extend() argument
|
/Linux-v6.1/Documentation/scsi/ |
D | cxgb3i.rst | 33 from the host driver, computes and inserts the digests, decomposes 40 the digests, then forwarding the header to the host. The payload data,
|
/Linux-v6.1/Documentation/crypto/ |
D | architecture.rst | 24 and message digests. In addition, the kernel crypto API provides 26 block ciphers and message digests. Templates include all types of block 29 Single block ciphers and message digests can either be directly used by 31 or keyed message digests.
|
D | userspace-if.rst | 115 The salg_type value "hash" applies to message digests and keyed message 116 digests. Though, a keyed message digest is referenced by the appropriate 379 - the hash cipher type (keyed message digests)
|
/Linux-v6.1/Documentation/ABI/testing/ |
D | ima_policy | 165 Example of a 'measure' rule requiring fs-verity's digests
|
/Linux-v6.1/Documentation/admin-guide/device-mapper/ |
D | verity.rst | 24 The salt is appended when hashing, digests are stored continuously and
|
/Linux-v6.1/Documentation/filesystems/ |
D | fsverity.rst | 86 IMA supports including fs-verity file digests and signatures in the 365 compute fs-verity file digests itself, e.g. in order to sign files. 455 fs-verity file digests must be signed in the following format, which
|
/Linux-v6.1/crypto/ |
D | Kconfig | 898 menu "Hashes, digests, and MACs" 906 BLAKE2b is optimized for 64-bit platforms and can produce digests
|
/Linux-v6.1/drivers/md/ |
D | Kconfig | 533 You'll need to activate the digests you're going to use in the
|