/openbmc/linux/security/integrity/ima/ |
H A D | ima_queue.c | 25 static struct tpm_digest *digests; variable 58 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, in ima_lookup_digest_entry() 111 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); in ima_add_digest_entry() 163 u8 *digest = entry->digests[ima_hash_algo_idx].digest; in ima_add_template_entry() 164 struct tpm_digest *digests_arg = entry->digests; in ima_add_template_entry() 188 digests_arg = digests; in ima_add_template_entry() 223 digests = kcalloc(ima_tpm_chip->nr_allocated_banks, sizeof(*digests), in ima_init_digests() 225 if (!digests) in ima_init_digests() 229 digests[i].alg_id = ima_tpm_chip->allocated_banks[i].alg_id; in ima_init_digests() 237 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
|
H A D | ima_api.c | 30 kfree(entry->digests); in ima_free_template_entry() 42 struct tpm_digest *digests; in ima_alloc_init_template() local 55 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, in ima_alloc_init_template() 56 sizeof(*digests), GFP_NOFS); in ima_alloc_init_template() 57 if (!digests) { in ima_alloc_init_template() 63 (*entry)->digests = digests; in ima_alloc_init_template()
|
H A D | ima_template.c | 361 struct tpm_digest *digests; in ima_restore_template_data() local 370 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, in ima_restore_template_data() 371 sizeof(*digests), GFP_NOFS); in ima_restore_template_data() 372 if (!digests) { in ima_restore_template_data() 377 (*entry)->digests = digests; in ima_restore_template_data() 384 kfree((*entry)->digests); in ima_restore_template_data()
|
H A D | ima_crypto.c | 622 rc = crypto_shash_final(shash, entry->digests[tfm_idx].digest); in ima_calc_field_array_hash_tfm() 637 entry->digests[ima_sha1_idx].alg_id = TPM_ALG_SHA1; in ima_calc_field_array_hash() 645 entry->digests[i].alg_id = alg_id; in ima_calc_field_array_hash() 650 memcpy(entry->digests[i].digest, in ima_calc_field_array_hash() 651 entry->digests[ima_sha1_idx].digest, in ima_calc_field_array_hash()
|
H A D | ima_fs.c | 154 ima_putc(m, e->digests[ima_sha1_idx].digest, TPM_DIGEST_SIZE); in ima_measurements_show() 237 ima_print_digest(m, e->digests[ima_sha1_idx].digest, TPM_DIGEST_SIZE); in ima_ascii_measurements_show()
|
H A D | ima.h | 100 struct tpm_digest *digests; member
|
H A D | Kconfig | 71 template permits both larger hash digests and longer
|
/openbmc/u-boot/lib/ |
H A D | tpm-v2.c | 54 len = offsetof(struct tcg_pcr_event2, digests); in tcg2_event_get_size() 55 len += offsetof(struct tpml_digest_values, digests); in tcg2_event_get_size() 146 pos = offsetof(struct tcg_pcr_event2, digests) + in tcg2_log_append() 150 pos = offsetof(struct tcg_pcr_event2, digests) + in tcg2_log_append() 151 offsetof(struct tpml_digest_values, digests); in tcg2_log_append() 285 offsetof(struct tpml_digest_values, digests); in tcg2_replay_eventlog() 313 offsetof(struct tpml_digest_values, digests); in tcg2_replay_eventlog() 463 if (digest_list.digests[i].digest.sha512[j]) in tcg2_log_parse() 486 u32 alg = digest_list->digests[i].hash_alg; in tcg2_pcr_extend() 489 (u8 *)&digest_list->digests[i].digest, in tcg2_pcr_extend() [all …]
|
/openbmc/linux/security/loadpin/ |
H A D | Kconfig | 28 digests it considers trusted. A verity backed filesystem is 30 of trusted digests. 34 expects a file descriptor of a file with verity digests as 40 This is followed by the verity digests, with one digest per
|
/openbmc/linux/drivers/char/tpm/ |
H A D | tpm-interface.c | 315 struct tpm_digest *digests) in tpm_pcr_extend() argument 325 if (digests[i].alg_id != chip->allocated_banks[i].alg_id) { in tpm_pcr_extend() 332 rc = tpm2_pcr_extend(chip, pcr_idx, digests); in tpm_pcr_extend() 336 rc = tpm1_pcr_extend(chip, pcr_idx, digests[0].digest, in tpm_pcr_extend()
|
H A D | tpm2-cmd.c | 236 struct tpm_digest *digests) in tpm2_pcr_extend() argument 260 tpm_buf_append_u16(&buf, digests[i].alg_id); in tpm2_pcr_extend() 261 tpm_buf_append(&buf, (const unsigned char *)&digests[i].digest, in tpm2_pcr_extend()
|
H A D | tpm.h | 294 struct tpm_digest *digests);
|
/openbmc/linux/net/sunrpc/ |
H A D | Kconfig | 47 SHA-1 digests. These include aes128-cts-hmac-sha1-96 and 58 that utilize Camellia ciphers (RFC 3713) and CMAC digests 72 SHA-2 digests. These include aes128-cts-hmac-sha256-128 and
|
/openbmc/linux/security/keys/trusted-keys/ |
H A D | trusted_tpm1.c | 28 static struct tpm_digest *digests; variable 385 return tpm_pcr_extend(chip, pcrnum, digests) ? -EINVAL : 0; in pcrlock() 1019 digests = kcalloc(chip->nr_allocated_banks, sizeof(*digests), in init_digests() 1021 if (!digests) in init_digests() 1025 digests[i].alg_id = chip->allocated_banks[i].alg_id; in init_digests() 1051 kfree(digests); in trusted_tpm_init() 1061 kfree(digests); in trusted_tpm_exit()
|
/openbmc/linux/include/linux/ |
H A D | tpm_eventlog.h | 114 struct tpm_digest digests[]; member 229 halg_size = sizeof(event->digests[i].alg_id); in __calc_tpm2_event_size()
|
H A D | tpm.h | 431 struct tpm_digest *digests); 448 struct tpm_digest *digests) in tpm_pcr_extend() argument
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/md5deep/ |
H A D | md5deep_git.bb | 2 … of programs to compute MD5, SHA-1, SHA-256, Tiger, or Whirlpool message digests on an arbitrary n…
|
/openbmc/openbmc/meta-security/recipes-security/libmhash/ |
H A D | libmhash_0.9.9.9.bb | 6 message digests, and other signatures. \
|
/openbmc/linux/Documentation/scsi/ |
H A D | cxgb3i.rst | 33 from the host driver, computes and inserts the digests, decomposes 40 the digests, then forwarding the header to the host. The payload data,
|
/openbmc/u-boot/include/ |
H A D | tpm-v2.h | 199 struct tpmt_ha digests[TPM2_NUM_PCR_BANKS]; member 214 struct tpml_digest_values digests; member
|
/openbmc/linux/Documentation/crypto/ |
H A D | architecture.rst | 24 and message digests. In addition, the kernel crypto API provides 26 block ciphers and message digests. Templates include all types of block 29 Single block ciphers and message digests can either be directly used by 31 or keyed message digests.
|
H A D | userspace-if.rst | 115 The salg_type value "hash" applies to message digests and keyed message 116 digests. Though, a keyed message digest is referenced by the appropriate 379 - the hash cipher type (keyed message digests)
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | ima_policy | 165 Example of a 'measure' rule requiring fs-verity's digests
|
/openbmc/linux/Documentation/admin-guide/device-mapper/ |
H A D | verity.rst | 24 The salt is appended when hashing, digests are stored continuously and
|
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/ |
H A D | 0001-Forward-port-to-OpenSSL-1.1.x.patch | 500 * Superclass for all message digests.
|