/linux-master/security/integrity/ima/ |
H A D | ima_queue.c | 25 static struct tpm_digest *digests; variable in typeref:struct:tpm_digest 58 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, 111 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); 163 u8 *digest = entry->digests[ima_hash_algo_idx].digest; 164 struct tpm_digest *digests_arg = entry->digests; 188 digests_arg = digests; 223 digests = kcalloc(ima_tpm_chip->nr_allocated_banks, sizeof(*digests), 225 if (!digests) 229 digests[ [all...] |
H A D | ima_api.c | 30 kfree(entry->digests); 42 struct tpm_digest *digests; local 55 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, 56 sizeof(*digests), GFP_NOFS); 57 if (!digests) { 63 (*entry)->digests = digests;
|
H A D | ima_template.c | 361 struct tpm_digest *digests; local 370 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, 371 sizeof(*digests), GFP_NOFS); 372 if (!digests) { 377 (*entry)->digests = digests; 384 kfree((*entry)->digests);
|
H A D | ima_crypto.c | 622 rc = crypto_shash_final(shash, entry->digests[tfm_idx].digest); 637 entry->digests[ima_sha1_idx].alg_id = TPM_ALG_SHA1; 645 entry->digests[i].alg_id = alg_id; 650 memcpy(entry->digests[i].digest, 651 entry->digests[ima_sha1_idx].digest, 830 * non-SHA1 boot_aggregate digests to avoid ambiguity.
|
H A D | ima_fs.c | 154 ima_putc(m, e->digests[ima_sha1_idx].digest, TPM_DIGEST_SIZE); 237 ima_print_digest(m, e->digests[ima_sha1_idx].digest, TPM_DIGEST_SIZE);
|
H A D | ima.h | 49 /* bitset of digests algorithms allowed in the setxattr hook */ 100 struct tpm_digest *digests; member in struct:ima_template_entry
|
/linux-master/drivers/char/tpm/ |
H A D | tpm-interface.c | 307 * @digests: array of tpm_digest structures used to extend PCRs 315 struct tpm_digest *digests) 325 if (digests[i].alg_id != chip->allocated_banks[i].alg_id) { 332 rc = tpm2_pcr_extend(chip, pcr_idx, digests); 336 rc = tpm1_pcr_extend(chip, pcr_idx, digests[0].digest, 314 tpm_pcr_extend(struct tpm_chip *chip, u32 pcr_idx, struct tpm_digest *digests) argument
|
H A D | tpm2-cmd.c | 231 * @digests: list of pcr banks and corresponding digest values to extend. 236 struct tpm_digest *digests) 260 tpm_buf_append_u16(&buf, digests[i].alg_id); 261 tpm_buf_append(&buf, (const unsigned char *)&digests[i].digest, 235 tpm2_pcr_extend(struct tpm_chip *chip, u32 pcr_idx, struct tpm_digest *digests) argument
|
H A D | tpm.h | 294 struct tpm_digest *digests);
|
/linux-master/security/keys/trusted-keys/ |
H A D | trusted_tpm1.c | 28 static struct tpm_digest *digests; variable in typeref:struct:tpm_digest 385 return tpm_pcr_extend(chip, pcrnum, digests) ? -EINVAL : 0; 1019 digests = kcalloc(chip->nr_allocated_banks, sizeof(*digests), 1021 if (!digests) 1025 digests[i].alg_id = chip->allocated_banks[i].alg_id; 1051 kfree(digests); 1061 kfree(digests);
|
/linux-master/include/linux/ |
H A D | tpm_eventlog.h | 114 struct tpm_digest digests[]; member in struct:tcg_pcr_event2_head 147 * The TPM2 event log format can contain multiple digests corresponding to 229 halg_size = sizeof(event->digests[i].alg_id);
|
H A D | tpm.h | 431 struct tpm_digest *digests); 448 struct tpm_digest *digests) 447 tpm_pcr_extend(struct tpm_chip *chip, u32 pcr_idx, struct tpm_digest *digests) argument
|