Home
last modified time | relevance | path

Searched refs:digests (Results 1 – 25 of 30) sorted by relevance

12

/openbmc/linux/security/integrity/ima/
H A Dima_queue.c25 static struct tpm_digest *digests; variable
58 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, in ima_lookup_digest_entry()
111 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); in ima_add_digest_entry()
163 u8 *digest = entry->digests[ima_hash_algo_idx].digest; in ima_add_template_entry()
164 struct tpm_digest *digests_arg = entry->digests; in ima_add_template_entry()
188 digests_arg = digests; in ima_add_template_entry()
223 digests = kcalloc(ima_tpm_chip->nr_allocated_banks, sizeof(*digests), in ima_init_digests()
225 if (!digests) in ima_init_digests()
229 digests[i].alg_id = ima_tpm_chip->allocated_banks[i].alg_id; in ima_init_digests()
237 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
H A Dima_api.c30 kfree(entry->digests); in ima_free_template_entry()
42 struct tpm_digest *digests; in ima_alloc_init_template() local
55 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, in ima_alloc_init_template()
56 sizeof(*digests), GFP_NOFS); in ima_alloc_init_template()
57 if (!digests) { in ima_alloc_init_template()
63 (*entry)->digests = digests; in ima_alloc_init_template()
H A Dima_template.c361 struct tpm_digest *digests; in ima_restore_template_data() local
370 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, in ima_restore_template_data()
371 sizeof(*digests), GFP_NOFS); in ima_restore_template_data()
372 if (!digests) { in ima_restore_template_data()
377 (*entry)->digests = digests; in ima_restore_template_data()
384 kfree((*entry)->digests); in ima_restore_template_data()
H A Dima_crypto.c622 rc = crypto_shash_final(shash, entry->digests[tfm_idx].digest); in ima_calc_field_array_hash_tfm()
637 entry->digests[ima_sha1_idx].alg_id = TPM_ALG_SHA1; in ima_calc_field_array_hash()
645 entry->digests[i].alg_id = alg_id; in ima_calc_field_array_hash()
650 memcpy(entry->digests[i].digest, in ima_calc_field_array_hash()
651 entry->digests[ima_sha1_idx].digest, in ima_calc_field_array_hash()
H A Dima_fs.c154 ima_putc(m, e->digests[ima_sha1_idx].digest, TPM_DIGEST_SIZE); in ima_measurements_show()
237 ima_print_digest(m, e->digests[ima_sha1_idx].digest, TPM_DIGEST_SIZE); in ima_ascii_measurements_show()
H A Dima.h100 struct tpm_digest *digests; member
H A DKconfig71 template permits both larger hash digests and longer
/openbmc/u-boot/lib/
H A Dtpm-v2.c54 len = offsetof(struct tcg_pcr_event2, digests); in tcg2_event_get_size()
55 len += offsetof(struct tpml_digest_values, digests); in tcg2_event_get_size()
146 pos = offsetof(struct tcg_pcr_event2, digests) + in tcg2_log_append()
150 pos = offsetof(struct tcg_pcr_event2, digests) + in tcg2_log_append()
151 offsetof(struct tpml_digest_values, digests); in tcg2_log_append()
285 offsetof(struct tpml_digest_values, digests); in tcg2_replay_eventlog()
313 offsetof(struct tpml_digest_values, digests); in tcg2_replay_eventlog()
463 if (digest_list.digests[i].digest.sha512[j]) in tcg2_log_parse()
486 u32 alg = digest_list->digests[i].hash_alg; in tcg2_pcr_extend()
489 (u8 *)&digest_list->digests[i].digest, in tcg2_pcr_extend()
[all …]
/openbmc/linux/security/loadpin/
H A DKconfig28 digests it considers trusted. A verity backed filesystem is
30 of trusted digests.
34 expects a file descriptor of a file with verity digests as
40 This is followed by the verity digests, with one digest per
/openbmc/linux/drivers/char/tpm/
H A Dtpm-interface.c315 struct tpm_digest *digests) in tpm_pcr_extend() argument
325 if (digests[i].alg_id != chip->allocated_banks[i].alg_id) { in tpm_pcr_extend()
332 rc = tpm2_pcr_extend(chip, pcr_idx, digests); in tpm_pcr_extend()
336 rc = tpm1_pcr_extend(chip, pcr_idx, digests[0].digest, in tpm_pcr_extend()
H A Dtpm2-cmd.c236 struct tpm_digest *digests) in tpm2_pcr_extend() argument
260 tpm_buf_append_u16(&buf, digests[i].alg_id); in tpm2_pcr_extend()
261 tpm_buf_append(&buf, (const unsigned char *)&digests[i].digest, in tpm2_pcr_extend()
H A Dtpm.h294 struct tpm_digest *digests);
/openbmc/linux/net/sunrpc/
H A DKconfig47 SHA-1 digests. These include aes128-cts-hmac-sha1-96 and
58 that utilize Camellia ciphers (RFC 3713) and CMAC digests
72 SHA-2 digests. These include aes128-cts-hmac-sha256-128 and
/openbmc/linux/security/keys/trusted-keys/
H A Dtrusted_tpm1.c28 static struct tpm_digest *digests; variable
385 return tpm_pcr_extend(chip, pcrnum, digests) ? -EINVAL : 0; in pcrlock()
1019 digests = kcalloc(chip->nr_allocated_banks, sizeof(*digests), in init_digests()
1021 if (!digests) in init_digests()
1025 digests[i].alg_id = chip->allocated_banks[i].alg_id; in init_digests()
1051 kfree(digests); in trusted_tpm_init()
1061 kfree(digests); in trusted_tpm_exit()
/openbmc/linux/include/linux/
H A Dtpm_eventlog.h114 struct tpm_digest digests[]; member
229 halg_size = sizeof(event->digests[i].alg_id); in __calc_tpm2_event_size()
H A Dtpm.h431 struct tpm_digest *digests);
448 struct tpm_digest *digests) in tpm_pcr_extend() argument
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-extended/md5deep/
H A Dmd5deep_git.bb2 … of programs to compute MD5, SHA-1, SHA-256, Tiger, or Whirlpool message digests on an arbitrary n…
/openbmc/openbmc/meta-security/recipes-security/libmhash/
H A Dlibmhash_0.9.9.9.bb6 message digests, and other signatures. \
/openbmc/linux/Documentation/scsi/
H A Dcxgb3i.rst33 from the host driver, computes and inserts the digests, decomposes
40 the digests, then forwarding the header to the host. The payload data,
/openbmc/u-boot/include/
H A Dtpm-v2.h199 struct tpmt_ha digests[TPM2_NUM_PCR_BANKS]; member
214 struct tpml_digest_values digests; member
/openbmc/linux/Documentation/crypto/
H A Darchitecture.rst24 and message digests. In addition, the kernel crypto API provides
26 block ciphers and message digests. Templates include all types of block
29 Single block ciphers and message digests can either be directly used by
31 or keyed message digests.
H A Duserspace-if.rst115 The salg_type value "hash" applies to message digests and keyed message
116 digests. Though, a keyed message digest is referenced by the appropriate
379 - the hash cipher type (keyed message digests)
/openbmc/linux/Documentation/ABI/testing/
H A Dima_policy165 Example of a 'measure' rule requiring fs-verity's digests
/openbmc/linux/Documentation/admin-guide/device-mapper/
H A Dverity.rst24 The salt is appended when hashing, digests are stored continuously and
/openbmc/openbmc/meta-openembedded/meta-oe/recipes-connectivity/wvdial/wvstreams/
H A D0001-Forward-port-to-OpenSSL-1.1.x.patch500 * Superclass for all message digests.

12