Home
last modified time | relevance | path

Searched refs:digests (Results 1 – 25 of 27) sorted by relevance

12

/linux/security/integrity/ima/
H A Dima_queue.c26 static struct tpm_digest *digests; variable
65 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, in ima_lookup_digest_entry()
118 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); in ima_add_digest_entry()
170 u8 *digest = entry->digests[ima_hash_algo_idx].digest; in ima_add_template_entry()
171 struct tpm_digest *digests_arg = entry->digests; in ima_add_template_entry()
207 digests_arg = digests; in ima_add_template_entry()
272 digests = kzalloc_objs(*digests, ima_tpm_chip->nr_allocated_banks, in ima_init_digests()
274 if (!digests) in ima_init_digests()
278 digests[i].alg_id = ima_tpm_chip->allocated_banks[i].alg_id; in ima_init_digests()
286 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
H A Dima_api.c31 kfree(entry->digests); in ima_free_template_entry()
43 struct tpm_digest *digests; in ima_alloc_init_template() local
56 digests = kzalloc_objs(*digests, in ima_alloc_init_template()
59 if (!digests) { in ima_alloc_init_template()
65 (*entry)->digests = digests; in ima_alloc_init_template()
H A Dima_template.c361 struct tpm_digest *digests; in ima_restore_template_data() local
370 digests = kzalloc_objs(*digests, in ima_restore_template_data()
373 if (!digests) { in ima_restore_template_data()
378 (*entry)->digests = digests; in ima_restore_template_data()
385 kfree((*entry)->digests); in ima_restore_template_data()
H A Dima_crypto.c617 rc = crypto_shash_final(shash, entry->digests[tfm_idx].digest); in ima_calc_field_array_hash_tfm()
632 entry->digests[ima_sha1_idx].alg_id = TPM_ALG_SHA1; in ima_calc_field_array_hash()
640 entry->digests[i].alg_id = alg_id; in ima_calc_field_array_hash()
645 memcpy(entry->digests[i].digest, in ima_calc_field_array_hash()
646 entry->digests[ima_sha1_idx].digest, in ima_calc_field_array_hash()
H A Dima_fs.c163 ima_putc(m, e->digests[algo_idx].digest, hash_digest_size[algo]); in ima_measurements_show()
255 ima_print_digest(m, e->digests[algo_idx].digest, hash_digest_size[algo]); in ima_ascii_measurements_show()
H A Dima.h108 struct tpm_digest *digests; member
H A DKconfig72 template permits both larger hash digests and longer
/linux/tools/testing/selftests/bpf/prog_tests/
H A Dsha256.c23 __u8 *data = NULL, *digests = NULL; in test_sha256() local
30 digests = malloc((MAX_LEN + 1) * SHA256_DIGEST_LENGTH); in test_sha256()
31 if (!ASSERT_OK_PTR(digests, "malloc")) in test_sha256()
42 libbpf_sha256(data, i, &digests[i * SHA256_DIGEST_LENGTH]); in test_sha256()
45 libbpf_sha256(digests, (MAX_LEN + 1) * SHA256_DIGEST_LENGTH, in test_sha256()
51 free(digests); in test_sha256()
/linux/security/loadpin/
H A DKconfig31 digests it considers trusted. A verity backed filesystem is
33 of trusted digests.
37 expects a file descriptor of a file with verity digests as
43 This is followed by the verity digests, with one digest per
/linux/drivers/char/tpm/
H A Dtpm-interface.c373 struct tpm_digest *digests) in tpm_pcr_extend() argument
386 if (digests[i].alg_id != chip->allocated_banks[i].alg_id) { in tpm_pcr_extend()
393 rc = tpm2_pcr_extend(chip, pcr_idx, digests); in tpm_pcr_extend()
397 rc = tpm1_pcr_extend(chip, pcr_idx, digests[0].digest, in tpm_pcr_extend()
H A Dtpm2-cmd.c185 struct tpm_digest *digests) in tpm2_pcr_extend() argument
219 tpm_buf_append_u16(&buf, digests[i].alg_id); in tpm2_pcr_extend()
220 tpm_buf_append(&buf, (const unsigned char *)&digests[i].digest, in tpm2_pcr_extend()
H A Dtpm.h294 struct tpm_digest *digests);
/linux/security/keys/trusted-keys/
H A Dtrusted_tpm1.c26 static struct tpm_digest *digests; variable
352 return tpm_pcr_extend(chip, pcrnum, digests) ? -EINVAL : 0; in pcrlock()
949 digests = kzalloc_objs(*digests, chip->nr_allocated_banks); in init_digests()
950 if (!digests) in init_digests()
954 digests[i].alg_id = chip->allocated_banks[i].alg_id; in init_digests()
975 kfree(digests); in trusted_tpm_init()
985 kfree(digests); in trusted_tpm_exit()
/linux/net/sunrpc/
H A DKconfig47 SHA-1 digests. These include aes128-cts-hmac-sha1-96 and
58 that utilize Camellia ciphers (RFC 3713) and CMAC digests
72 SHA-2 digests. These include aes128-cts-hmac-sha256-128 and
/linux/include/linux/
H A Dtpm_eventlog.h114 struct tpm_digest digests[]; member
229 halg_size = sizeof(event->digests[i].alg_id); in __calc_tpm2_event_size()
H A Dtpm.h476 struct tpm_digest *digests);
503 struct tpm_digest *digests) in tpm_pcr_extend() argument
/linux/Documentation/scsi/
H A Dcxgb3i.rst33 from the host driver, computes and inserts the digests, decomposes
40 the digests, then forwarding the header to the host. The payload data,
/linux/Documentation/crypto/
H A Darchitecture.rst24 and message digests. In addition, the kernel crypto API provides
26 block ciphers and message digests. Templates include all types of block
29 Single block ciphers and message digests can either be directly used by
31 or keyed message digests.
H A Dsha3.rst41 The following functions compute SHA-3 digests::
H A Duserspace-if.rst115 The salg_type value "hash" applies to message digests and keyed message
116 digests. Though, a keyed message digest is referenced by the appropriate
378 - the hash cipher type (keyed message digests)
/linux/Documentation/ABI/testing/
H A Dima_policy166 Example of a 'measure' rule requiring fs-verity's digests
/linux/Documentation/admin-guide/device-mapper/
H A Dverity.rst24 The salt is appended when hashing, digests are stored continuously and
/linux/Documentation/filesystems/
H A Dfsverity.rst84 file digests as an alternative to its traditional full file digests.
402 compute fs-verity file digests itself, e.g. in order to sign files.
/linux/crypto/
H A DKconfig861 menu "Hashes, digests, and MACs"
870 BLAKE2b is optimized for 64-bit platforms and can produce digests
/linux/drivers/md/
H A DKconfig560 You'll need to activate the digests you're going to use in the

12