/linux/security/integrity/ima/ |
A D | ima_queue.c | 25 static struct tpm_digest *digests; variable 58 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, in ima_lookup_digest_entry() 111 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); in ima_add_digest_entry() 163 u8 *digest = entry->digests[ima_hash_algo_idx].digest; in ima_add_template_entry() 164 struct tpm_digest *digests_arg = entry->digests; in ima_add_template_entry() 188 digests_arg = digests; in ima_add_template_entry() 223 digests = kcalloc(ima_tpm_chip->nr_allocated_banks, sizeof(*digests), in ima_init_digests() 225 if (!digests) in ima_init_digests() 229 digests[i].alg_id = ima_tpm_chip->allocated_banks[i].alg_id; in ima_init_digests() 237 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
|
A D | ima_api.c | 30 kfree(entry->digests); in ima_free_template_entry() 42 struct tpm_digest *digests; in ima_alloc_init_template() local 55 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, in ima_alloc_init_template() 56 sizeof(*digests), GFP_NOFS); in ima_alloc_init_template() 57 if (!digests) { in ima_alloc_init_template() 63 (*entry)->digests = digests; in ima_alloc_init_template()
|
A D | ima_template.c | 350 struct tpm_digest *digests; in ima_restore_template_data() local 359 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, in ima_restore_template_data() 360 sizeof(*digests), GFP_NOFS); in ima_restore_template_data() 361 if (!digests) { in ima_restore_template_data() 366 (*entry)->digests = digests; in ima_restore_template_data() 373 kfree((*entry)->digests); in ima_restore_template_data()
|
A D | ima_crypto.c | 621 rc = crypto_shash_final(shash, entry->digests[tfm_idx].digest); in ima_calc_field_array_hash_tfm() 636 entry->digests[ima_sha1_idx].alg_id = TPM_ALG_SHA1; in ima_calc_field_array_hash() 644 entry->digests[i].alg_id = alg_id; in ima_calc_field_array_hash() 649 memcpy(entry->digests[i].digest, in ima_calc_field_array_hash() 650 entry->digests[ima_sha1_idx].digest, in ima_calc_field_array_hash()
|
A D | ima_fs.c | 154 ima_putc(m, e->digests[ima_sha1_idx].digest, TPM_DIGEST_SIZE); in ima_measurements_show() 237 ima_print_digest(m, e->digests[ima_sha1_idx].digest, TPM_DIGEST_SIZE); in ima_ascii_measurements_show()
|
A D | ima.h | 100 struct tpm_digest *digests; member
|
A D | Kconfig | 71 template permits both larger hash digests and longer
|
/linux/drivers/char/tpm/ |
A D | tpm-interface.c | 315 struct tpm_digest *digests) in tpm_pcr_extend() argument 325 if (digests[i].alg_id != chip->allocated_banks[i].alg_id) { in tpm_pcr_extend() 332 rc = tpm2_pcr_extend(chip, pcr_idx, digests); in tpm_pcr_extend() 336 rc = tpm1_pcr_extend(chip, pcr_idx, digests[0].digest, in tpm_pcr_extend()
|
A D | tpm2-cmd.c | 236 struct tpm_digest *digests) in tpm2_pcr_extend() argument 260 tpm_buf_append_u16(&buf, digests[i].alg_id); in tpm2_pcr_extend() 261 tpm_buf_append(&buf, (const unsigned char *)&digests[i].digest, in tpm2_pcr_extend()
|
A D | tpm.h | 218 struct tpm_digest *digests);
|
/linux/security/keys/trusted-keys/ |
A D | trusted_tpm1.c | 28 static struct tpm_digest *digests; variable 385 return tpm_pcr_extend(chip, pcrnum, digests) ? -EINVAL : 0; in pcrlock() 1019 digests = kcalloc(chip->nr_allocated_banks, sizeof(*digests), in init_digests() 1021 if (!digests) in init_digests() 1025 digests[i].alg_id = chip->allocated_banks[i].alg_id; in init_digests() 1051 kfree(digests); in trusted_tpm_init() 1061 kfree(digests); in trusted_tpm_exit()
|
/linux/include/linux/ |
A D | tpm_eventlog.h | 114 struct tpm_digest digests[]; member 229 halg_size = sizeof(event->digests[i].alg_id); in __calc_tpm2_event_size()
|
A D | tpm.h | 417 struct tpm_digest *digests); 434 struct tpm_digest *digests) in tpm_pcr_extend() argument
|
/linux/Documentation/scsi/ |
A D | cxgb3i.rst | 33 from the host driver, computes and inserts the digests, decomposes 40 the digests, then forwarding the header to the host. The payload data,
|
/linux/Documentation/crypto/ |
A D | architecture.rst | 24 and message digests. In addition, the kernel crypto API provides 26 block ciphers and message digests. Templates include all types of block 29 Single block ciphers and message digests can either be directly used by 31 or keyed message digests.
|
A D | userspace-if.rst | 115 The salg_type value "hash" applies to message digests and keyed message 116 digests. Though, a keyed message digest is referenced by the appropriate 379 - the hash cipher type (keyed message digests)
|
/linux/Documentation/admin-guide/device-mapper/ |
A D | verity.rst | 24 The salt is appended when hashing, digests are stored continuously and
|
/linux/crypto/ |
A D | Kconfig | 596 by iSCSI for header and data digests and by others. 674 optimized for 64bit platforms and can produce digests of any size 692 optimized for 8-32bit platforms and can produce digests of any size
|
/linux/Documentation/filesystems/ |
A D | fsverity.rst | 354 compute fs-verity file digests itself, e.g. in order to sign files. 444 fs-verity file digests must be signed in the following format, which
|
/linux/drivers/md/ |
A D | Kconfig | 532 You'll need to activate the digests you're going to use in the
|
/linux/ |
A D | System.map | 161456 ffff80001212ea88 b digests
|
A D | .tmp_System.map | 161456 ffff80001212ea88 b digests
|