/kernel/linux/linux-5.10/security/integrity/ima/ |
D | ima_queue.c | 25 static struct tpm_digest *digests; variable 58 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, in ima_lookup_digest_entry() 111 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); in ima_add_digest_entry() 163 u8 *digest = entry->digests[ima_hash_algo_idx].digest; in ima_add_template_entry() 164 struct tpm_digest *digests_arg = entry->digests; in ima_add_template_entry() 187 digests_arg = digests; in ima_add_template_entry() 222 digests = kcalloc(ima_tpm_chip->nr_allocated_banks, sizeof(*digests), in ima_init_digests() 224 if (!digests) in ima_init_digests() 228 digests[i].alg_id = ima_tpm_chip->allocated_banks[i].alg_id; in ima_init_digests() 236 memset(digests[i].digest, 0xff, digest_size); in ima_init_digests()
|
D | ima_api.c | 30 kfree(entry->digests); in ima_free_template_entry() 42 struct tpm_digest *digests; in ima_alloc_init_template() local 55 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, in ima_alloc_init_template() 56 sizeof(*digests), GFP_NOFS); in ima_alloc_init_template() 57 if (!digests) { in ima_alloc_init_template() 63 (*entry)->digests = digests; in ima_alloc_init_template()
|
D | ima_template.c | 311 struct tpm_digest *digests; in ima_restore_template_data() local 320 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, in ima_restore_template_data() 321 sizeof(*digests), GFP_NOFS); in ima_restore_template_data() 322 if (!digests) { in ima_restore_template_data() 327 (*entry)->digests = digests; in ima_restore_template_data() 334 kfree((*entry)->digests); in ima_restore_template_data()
|
D | ima_crypto.c | 622 rc = crypto_shash_final(shash, entry->digests[tfm_idx].digest); in ima_calc_field_array_hash_tfm() 637 entry->digests[ima_sha1_idx].alg_id = TPM_ALG_SHA1; in ima_calc_field_array_hash() 645 entry->digests[i].alg_id = alg_id; in ima_calc_field_array_hash() 650 memcpy(entry->digests[i].digest, in ima_calc_field_array_hash() 651 entry->digests[ima_sha1_idx].digest, in ima_calc_field_array_hash()
|
D | ima_fs.c | 154 ima_putc(m, e->digests[ima_sha1_idx].digest, TPM_DIGEST_SIZE); in ima_measurements_show() 237 ima_print_digest(m, e->digests[ima_sha1_idx].digest, TPM_DIGEST_SIZE); in ima_ascii_measurements_show()
|
D | ima.h | 101 struct tpm_digest *digests; member
|
D | Kconfig | 71 template permits both larger hash digests and longer
|
/kernel/linux/linux-5.10/drivers/char/tpm/ |
D | tpm-interface.c | 315 struct tpm_digest *digests) in tpm_pcr_extend() argument 325 if (digests[i].alg_id != chip->allocated_banks[i].alg_id) { in tpm_pcr_extend() 332 rc = tpm2_pcr_extend(chip, pcr_idx, digests); in tpm_pcr_extend() 336 rc = tpm1_pcr_extend(chip, pcr_idx, digests[0].digest, in tpm_pcr_extend()
|
D | tpm2-cmd.c | 236 struct tpm_digest *digests) in tpm2_pcr_extend() argument 260 tpm_buf_append_u16(&buf, digests[i].alg_id); in tpm2_pcr_extend() 261 tpm_buf_append(&buf, (const unsigned char *)&digests[i].digest, in tpm2_pcr_extend()
|
D | tpm.h | 218 struct tpm_digest *digests);
|
/kernel/linux/linux-5.10/include/linux/ |
D | tpm_eventlog.h | 114 struct tpm_digest digests[]; member 229 halg_size = sizeof(event->digests[i].alg_id); in __calc_tpm2_event_size()
|
D | tpm.h | 408 struct tpm_digest *digests); 425 struct tpm_digest *digests) in tpm_pcr_extend() argument
|
/kernel/linux/linux-5.10/security/keys/trusted-keys/ |
D | trusted_tpm1.c | 35 static struct tpm_digest *digests; variable 392 return tpm_pcr_extend(chip, pcrnum, digests) ? -EINVAL : 0; in pcrlock() 1245 digests = kcalloc(chip->nr_allocated_banks, sizeof(*digests), in init_digests() 1247 if (!digests) in init_digests() 1251 digests[i].alg_id = chip->allocated_banks[i].alg_id; in init_digests() 1280 kfree(digests); in init_trusted() 1290 kfree(digests); in cleanup_trusted()
|
/kernel/linux/linux-5.10/Documentation/scsi/ |
D | cxgb3i.rst | 33 from the host driver, computes and inserts the digests, decomposes 40 the digests, then forwarding the header to the host. The payload data,
|
/kernel/linux/linux-5.10/Documentation/crypto/ |
D | architecture.rst | 24 and message digests. In addition, the kernel crypto API provides 26 block ciphers and message digests. Templates include all types of block 29 Single block ciphers and message digests can either be directly used by 31 or keyed message digests.
|
D | userspace-if.rst | 115 The salg_type value "hash" applies to message digests and keyed message 116 digests. Though, a keyed message digest is referenced by the appropriate 379 - the hash cipher type (keyed message digests)
|
/kernel/linux/linux-5.10/Documentation/admin-guide/device-mapper/ |
D | verity.rst | 24 The salt is appended when hashing, digests are stored continuously and
|
/kernel/linux/patches/linux-5.10/imx8mm_patch/patches/ |
D | 0003_linux_crypto.patch | 1117 + * Allow enough space for two digests. The two digests will be compared
|
/kernel/linux/linux-5.10/crypto/ |
D | Kconfig | 602 by iSCSI for header and data digests and by others. 680 optimized for 64bit platforms and can produce digests of any size 698 optimized for 8-32bit platforms and can produce digests of any size
|
/kernel/linux/linux-5.10/drivers/md/ |
D | Kconfig | 520 You'll need to activate the digests you're going to use in the
|