| /linux/security/integrity/ima/ |
| A D | ima_queue.c | 25 static struct tpm_digest *digests; variable 58 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, in ima_lookup_digest_entry() 111 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); in ima_add_digest_entry() 163 u8 *digest = entry->digests[ima_hash_algo_idx].digest; in ima_add_template_entry() 164 struct tpm_digest *digests_arg = entry->digests; in ima_add_template_entry() 188 digests_arg = digests; in ima_add_template_entry() 223 digests = kcalloc(ima_tpm_chip->nr_allocated_banks, sizeof(*digests), in ima_init_digests() 225 if (!digests) in ima_init_digests() 229 digests[i].alg_id = ima_tpm_chip->allocated_banks[i].alg_id; in ima_init_digests() 237 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
|
| A D | ima_api.c | 30 kfree(entry->digests); in ima_free_template_entry() 42 struct tpm_digest *digests; in ima_alloc_init_template() local 55 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, in ima_alloc_init_template() 56 sizeof(*digests), GFP_NOFS); in ima_alloc_init_template() 57 if (!digests) { in ima_alloc_init_template() 63 (*entry)->digests = digests; in ima_alloc_init_template()
|
| A D | ima_template.c | 361 struct tpm_digest *digests; in ima_restore_template_data() local 370 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, in ima_restore_template_data() 371 sizeof(*digests), GFP_NOFS); in ima_restore_template_data() 372 if (!digests) { in ima_restore_template_data() 377 (*entry)->digests = digests; in ima_restore_template_data() 384 kfree((*entry)->digests); in ima_restore_template_data()
|
| A D | ima_crypto.c | 617 rc = crypto_shash_final(shash, entry->digests[tfm_idx].digest); in ima_calc_field_array_hash_tfm() 632 entry->digests[ima_sha1_idx].alg_id = TPM_ALG_SHA1; in ima_calc_field_array_hash() 640 entry->digests[i].alg_id = alg_id; in ima_calc_field_array_hash() 645 memcpy(entry->digests[i].digest, in ima_calc_field_array_hash() 646 entry->digests[ima_sha1_idx].digest, in ima_calc_field_array_hash()
|
| A D | ima_fs.c | 184 ima_putc(m, e->digests[algo_idx].digest, hash_digest_size[algo]); in ima_measurements_show() 275 ima_print_digest(m, e->digests[algo_idx].digest, hash_digest_size[algo]); in ima_ascii_measurements_show()
|
| A D | ima.h | 108 struct tpm_digest *digests; member
|
| A D | Kconfig | 72 template permits both larger hash digests and longer
|
| /linux/security/loadpin/ |
| A D | Kconfig | 31 digests it considers trusted. A verity backed filesystem is 33 of trusted digests. 37 expects a file descriptor of a file with verity digests as 43 This is followed by the verity digests, with one digest per
|
| /linux/drivers/char/tpm/ |
| A D | tpm-interface.c | 316 struct tpm_digest *digests) in tpm_pcr_extend() argument 326 if (digests[i].alg_id != chip->allocated_banks[i].alg_id) { in tpm_pcr_extend() 333 rc = tpm2_pcr_extend(chip, pcr_idx, digests); in tpm_pcr_extend() 337 rc = tpm1_pcr_extend(chip, pcr_idx, digests[0].digest, in tpm_pcr_extend()
|
| A D | tpm2-cmd.c | 233 struct tpm_digest *digests) in tpm2_pcr_extend() argument 263 tpm_buf_append_u16(&buf, digests[i].alg_id); in tpm2_pcr_extend() 264 tpm_buf_append(&buf, (const unsigned char *)&digests[i].digest, in tpm2_pcr_extend()
|
| A D | tpm.h | 294 struct tpm_digest *digests);
|
| /linux/net/sunrpc/ |
| A D | Kconfig | 47 SHA-1 digests. These include aes128-cts-hmac-sha1-96 and 58 that utilize Camellia ciphers (RFC 3713) and CMAC digests 72 SHA-2 digests. These include aes128-cts-hmac-sha256-128 and
|
| /linux/security/keys/trusted-keys/ |
| A D | trusted_tpm1.c | 28 static struct tpm_digest *digests; variable 396 return tpm_pcr_extend(chip, pcrnum, digests) ? -EINVAL : 0; in pcrlock() 1030 digests = kcalloc(chip->nr_allocated_banks, sizeof(*digests), in init_digests() 1032 if (!digests) in init_digests() 1036 digests[i].alg_id = chip->allocated_banks[i].alg_id; in init_digests() 1062 kfree(digests); in trusted_tpm_init() 1072 kfree(digests); in trusted_tpm_exit()
|
| /linux/include/linux/ |
| A D | tpm_eventlog.h | 114 struct tpm_digest digests[]; member 229 halg_size = sizeof(event->digests[i].alg_id); in __calc_tpm2_event_size()
|
| A D | tpm.h | 449 struct tpm_digest *digests); 475 struct tpm_digest *digests) in tpm_pcr_extend() argument
|
| /linux/Documentation/scsi/ |
| A D | cxgb3i.rst | 33 from the host driver, computes and inserts the digests, decomposes 40 the digests, then forwarding the header to the host. The payload data,
|
| /linux/Documentation/crypto/ |
| A D | architecture.rst | 24 and message digests. In addition, the kernel crypto API provides 26 block ciphers and message digests. Templates include all types of block 29 Single block ciphers and message digests can either be directly used by 31 or keyed message digests.
|
| A D | userspace-if.rst | 115 The salg_type value "hash" applies to message digests and keyed message 116 digests. Though, a keyed message digest is referenced by the appropriate 379 - the hash cipher type (keyed message digests)
|
| /linux/Documentation/ABI/testing/ |
| A D | ima_policy | 165 Example of a 'measure' rule requiring fs-verity's digests
|
| /linux/Documentation/admin-guide/device-mapper/ |
| A D | verity.rst | 24 The salt is appended when hashing, digests are stored continuously and
|
| /linux/Documentation/filesystems/ |
| A D | fsverity.rst | 84 file digests as an alternative to its traditional full file digests. 381 compute fs-verity file digests itself, e.g. in order to sign files.
|
| /linux/crypto/ |
| A D | Kconfig | 863 menu "Hashes, digests, and MACs" 871 BLAKE2b is optimized for 64-bit platforms and can produce digests
|
| /linux/drivers/md/ |
| A D | Kconfig | 513 You'll need to activate the digests you're going to use in the
|
| /linux/Documentation/admin-guide/LSM/ |
| A D | ipe.rst | 645 enabled files, identified via their fsverity digests.
|