Home
last modified time | relevance | path

Searched refs:digests (Results 1 – 9 of 9) sorted by relevance

/security/integrity/ima/
A Dima_queue.c26 static struct tpm_digest *digests; variable
65 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, in ima_lookup_digest_entry()
118 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); in ima_add_digest_entry()
170 u8 *digest = entry->digests[ima_hash_algo_idx].digest; in ima_add_template_entry()
171 struct tpm_digest *digests_arg = entry->digests; in ima_add_template_entry()
207 digests_arg = digests; in ima_add_template_entry()
272 digests = kcalloc(ima_tpm_chip->nr_allocated_banks, sizeof(*digests), in ima_init_digests()
274 if (!digests) in ima_init_digests()
278 digests[i].alg_id = ima_tpm_chip->allocated_banks[i].alg_id; in ima_init_digests()
286 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
A Dima_api.c30 kfree(entry->digests); in ima_free_template_entry()
42 struct tpm_digest *digests; in ima_alloc_init_template() local
55 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, in ima_alloc_init_template()
56 sizeof(*digests), GFP_NOFS); in ima_alloc_init_template()
57 if (!digests) { in ima_alloc_init_template()
63 (*entry)->digests = digests; in ima_alloc_init_template()
A Dima_template.c361 struct tpm_digest *digests; in ima_restore_template_data() local
370 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, in ima_restore_template_data()
371 sizeof(*digests), GFP_NOFS); in ima_restore_template_data()
372 if (!digests) { in ima_restore_template_data()
377 (*entry)->digests = digests; in ima_restore_template_data()
384 kfree((*entry)->digests); in ima_restore_template_data()
A Dima_crypto.c617 rc = crypto_shash_final(shash, entry->digests[tfm_idx].digest); in ima_calc_field_array_hash_tfm()
632 entry->digests[ima_sha1_idx].alg_id = TPM_ALG_SHA1; in ima_calc_field_array_hash()
640 entry->digests[i].alg_id = alg_id; in ima_calc_field_array_hash()
645 memcpy(entry->digests[i].digest, in ima_calc_field_array_hash()
646 entry->digests[ima_sha1_idx].digest, in ima_calc_field_array_hash()
A Dima_fs.c163 ima_putc(m, e->digests[algo_idx].digest, hash_digest_size[algo]); in ima_measurements_show()
255 ima_print_digest(m, e->digests[algo_idx].digest, hash_digest_size[algo]); in ima_ascii_measurements_show()
A Dima.h108 struct tpm_digest *digests; member
A DKconfig72 template permits both larger hash digests and longer
/security/loadpin/
A DKconfig31 digests it considers trusted. A verity backed filesystem is
33 of trusted digests.
37 expects a file descriptor of a file with verity digests as
43 This is followed by the verity digests, with one digest per
/security/keys/trusted-keys/
A Dtrusted_tpm1.c28 static struct tpm_digest *digests; variable
396 return tpm_pcr_extend(chip, pcrnum, digests) ? -EINVAL : 0; in pcrlock()
1030 digests = kcalloc(chip->nr_allocated_banks, sizeof(*digests), in init_digests()
1032 if (!digests) in init_digests()
1036 digests[i].alg_id = chip->allocated_banks[i].alg_id; in init_digests()
1062 kfree(digests); in trusted_tpm_init()
1072 kfree(digests); in trusted_tpm_exit()

Completed in 14 milliseconds