| /linux/security/integrity/ima/ |
| H A D | ima_queue.c | 26 static struct tpm_digest *digests; variable 65 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, in ima_lookup_digest_entry() 118 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); in ima_add_digest_entry() 170 u8 *digest = entry->digests[ima_hash_algo_idx].digest; in ima_add_template_entry() 171 struct tpm_digest *digests_arg = entry->digests; in ima_add_template_entry() 207 digests_arg = digests; in ima_add_template_entry() 272 digests = kzalloc_objs(*digests, ima_tpm_chip->nr_allocated_banks, in ima_init_digests() 274 if (!digests) in ima_init_digests() 278 digests[i].alg_id = ima_tpm_chip->allocated_banks[i].alg_id; in ima_init_digests() 286 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
|
| H A D | ima_api.c | 31 kfree(entry->digests); in ima_free_template_entry() 43 struct tpm_digest *digests; in ima_alloc_init_template() local 56 digests = kzalloc_objs(*digests, in ima_alloc_init_template() 59 if (!digests) { in ima_alloc_init_template() 65 (*entry)->digests = digests; in ima_alloc_init_template()
|
| H A D | ima_template.c | 361 struct tpm_digest *digests; in ima_restore_template_data() local 370 digests = kzalloc_objs(*digests, in ima_restore_template_data() 373 if (!digests) { in ima_restore_template_data() 378 (*entry)->digests = digests; in ima_restore_template_data() 385 kfree((*entry)->digests); in ima_restore_template_data()
|
| H A D | ima_crypto.c | 617 rc = crypto_shash_final(shash, entry->digests[tfm_idx].digest); in ima_calc_field_array_hash_tfm() 632 entry->digests[ima_sha1_idx].alg_id = TPM_ALG_SHA1; in ima_calc_field_array_hash() 640 entry->digests[i].alg_id = alg_id; in ima_calc_field_array_hash() 645 memcpy(entry->digests[i].digest, in ima_calc_field_array_hash() 646 entry->digests[ima_sha1_idx].digest, in ima_calc_field_array_hash()
|
| H A D | ima_fs.c | 163 ima_putc(m, e->digests[algo_idx].digest, hash_digest_size[algo]); in ima_measurements_show() 255 ima_print_digest(m, e->digests[algo_idx].digest, hash_digest_size[algo]); in ima_ascii_measurements_show()
|
| H A D | ima.h | 108 struct tpm_digest *digests; member
|
| H A D | Kconfig | 72 template permits both larger hash digests and longer
|
| /linux/tools/testing/selftests/bpf/prog_tests/ |
| H A D | sha256.c | 23 __u8 *data = NULL, *digests = NULL; in test_sha256() local 30 digests = malloc((MAX_LEN + 1) * SHA256_DIGEST_LENGTH); in test_sha256() 31 if (!ASSERT_OK_PTR(digests, "malloc")) in test_sha256() 42 libbpf_sha256(data, i, &digests[i * SHA256_DIGEST_LENGTH]); in test_sha256() 45 libbpf_sha256(digests, (MAX_LEN + 1) * SHA256_DIGEST_LENGTH, in test_sha256() 51 free(digests); in test_sha256()
|
| /linux/security/loadpin/ |
| H A D | Kconfig | 31 digests it considers trusted. A verity backed filesystem is 33 of trusted digests. 37 expects a file descriptor of a file with verity digests as 43 This is followed by the verity digests, with one digest per
|
| /linux/drivers/char/tpm/ |
| H A D | tpm-interface.c | 373 struct tpm_digest *digests) in tpm_pcr_extend() argument 386 if (digests[i].alg_id != chip->allocated_banks[i].alg_id) { in tpm_pcr_extend() 393 rc = tpm2_pcr_extend(chip, pcr_idx, digests); in tpm_pcr_extend() 397 rc = tpm1_pcr_extend(chip, pcr_idx, digests[0].digest, in tpm_pcr_extend()
|
| H A D | tpm2-cmd.c | 185 struct tpm_digest *digests) in tpm2_pcr_extend() argument 219 tpm_buf_append_u16(&buf, digests[i].alg_id); in tpm2_pcr_extend() 220 tpm_buf_append(&buf, (const unsigned char *)&digests[i].digest, in tpm2_pcr_extend()
|
| H A D | tpm.h | 294 struct tpm_digest *digests);
|
| /linux/security/keys/trusted-keys/ |
| H A D | trusted_tpm1.c | 26 static struct tpm_digest *digests; variable 352 return tpm_pcr_extend(chip, pcrnum, digests) ? -EINVAL : 0; in pcrlock() 949 digests = kzalloc_objs(*digests, chip->nr_allocated_banks); in init_digests() 950 if (!digests) in init_digests() 954 digests[i].alg_id = chip->allocated_banks[i].alg_id; in init_digests() 975 kfree(digests); in trusted_tpm_init() 985 kfree(digests); in trusted_tpm_exit()
|
| /linux/net/sunrpc/ |
| H A D | Kconfig | 47 SHA-1 digests. These include aes128-cts-hmac-sha1-96 and 58 that utilize Camellia ciphers (RFC 3713) and CMAC digests 72 SHA-2 digests. These include aes128-cts-hmac-sha256-128 and
|
| /linux/include/linux/ |
| H A D | tpm_eventlog.h | 114 struct tpm_digest digests[]; member 229 halg_size = sizeof(event->digests[i].alg_id); in __calc_tpm2_event_size()
|
| H A D | tpm.h | 476 struct tpm_digest *digests); 503 struct tpm_digest *digests) in tpm_pcr_extend() argument
|
| /linux/Documentation/scsi/ |
| H A D | cxgb3i.rst | 33 from the host driver, computes and inserts the digests, decomposes 40 the digests, then forwarding the header to the host. The payload data,
|
| /linux/Documentation/crypto/ |
| H A D | architecture.rst | 24 and message digests. In addition, the kernel crypto API provides 26 block ciphers and message digests. Templates include all types of block 29 Single block ciphers and message digests can either be directly used by 31 or keyed message digests.
|
| H A D | sha3.rst | 41 The following functions compute SHA-3 digests::
|
| H A D | userspace-if.rst | 115 The salg_type value "hash" applies to message digests and keyed message 116 digests. Though, a keyed message digest is referenced by the appropriate 378 - the hash cipher type (keyed message digests)
|
| /linux/Documentation/ABI/testing/ |
| H A D | ima_policy | 166 Example of a 'measure' rule requiring fs-verity's digests
|
| /linux/Documentation/admin-guide/device-mapper/ |
| H A D | verity.rst | 24 The salt is appended when hashing, digests are stored continuously and
|
| /linux/Documentation/filesystems/ |
| H A D | fsverity.rst | 84 file digests as an alternative to its traditional full file digests. 402 compute fs-verity file digests itself, e.g. in order to sign files.
|
| /linux/crypto/ |
| H A D | Kconfig | 861 menu "Hashes, digests, and MACs" 870 BLAKE2b is optimized for 64-bit platforms and can produce digests
|
| /linux/drivers/md/ |
| H A D | Kconfig | 560 You'll need to activate the digests you're going to use in the
|