Searched refs:digests (Results 1 – 9 of 9) sorted by relevance
| /security/integrity/ima/ |
| A D | ima_queue.c | 26 static struct tpm_digest *digests; variable 65 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, in ima_lookup_digest_entry() 118 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); in ima_add_digest_entry() 170 u8 *digest = entry->digests[ima_hash_algo_idx].digest; in ima_add_template_entry() 171 struct tpm_digest *digests_arg = entry->digests; in ima_add_template_entry() 207 digests_arg = digests; in ima_add_template_entry() 272 digests = kcalloc(ima_tpm_chip->nr_allocated_banks, sizeof(*digests), in ima_init_digests() 274 if (!digests) in ima_init_digests() 278 digests[i].alg_id = ima_tpm_chip->allocated_banks[i].alg_id; in ima_init_digests() 286 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
|
| A D | ima_api.c | 30 kfree(entry->digests); in ima_free_template_entry() 42 struct tpm_digest *digests; in ima_alloc_init_template() local 55 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, in ima_alloc_init_template() 56 sizeof(*digests), GFP_NOFS); in ima_alloc_init_template() 57 if (!digests) { in ima_alloc_init_template() 63 (*entry)->digests = digests; in ima_alloc_init_template()
|
| A D | ima_template.c | 361 struct tpm_digest *digests; in ima_restore_template_data() local 370 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, in ima_restore_template_data() 371 sizeof(*digests), GFP_NOFS); in ima_restore_template_data() 372 if (!digests) { in ima_restore_template_data() 377 (*entry)->digests = digests; in ima_restore_template_data() 384 kfree((*entry)->digests); in ima_restore_template_data()
|
| A D | ima_crypto.c | 617 rc = crypto_shash_final(shash, entry->digests[tfm_idx].digest); in ima_calc_field_array_hash_tfm() 632 entry->digests[ima_sha1_idx].alg_id = TPM_ALG_SHA1; in ima_calc_field_array_hash() 640 entry->digests[i].alg_id = alg_id; in ima_calc_field_array_hash() 645 memcpy(entry->digests[i].digest, in ima_calc_field_array_hash() 646 entry->digests[ima_sha1_idx].digest, in ima_calc_field_array_hash()
|
| A D | ima_fs.c | 163 ima_putc(m, e->digests[algo_idx].digest, hash_digest_size[algo]); in ima_measurements_show() 255 ima_print_digest(m, e->digests[algo_idx].digest, hash_digest_size[algo]); in ima_ascii_measurements_show()
|
| A D | ima.h | 108 struct tpm_digest *digests; member
|
| A D | Kconfig | 72 template permits both larger hash digests and longer
|
| /security/loadpin/ |
| A D | Kconfig | 31 digests it considers trusted. A verity backed filesystem is 33 of trusted digests. 37 expects a file descriptor of a file with verity digests as 43 This is followed by the verity digests, with one digest per
|
| /security/keys/trusted-keys/ |
| A D | trusted_tpm1.c | 28 static struct tpm_digest *digests; variable 396 return tpm_pcr_extend(chip, pcrnum, digests) ? -EINVAL : 0; in pcrlock() 1030 digests = kcalloc(chip->nr_allocated_banks, sizeof(*digests), in init_digests() 1032 if (!digests) in init_digests() 1036 digests[i].alg_id = chip->allocated_banks[i].alg_id; in init_digests() 1062 kfree(digests); in trusted_tpm_init() 1072 kfree(digests); in trusted_tpm_exit()
|
Completed in 14 milliseconds