/linux-master/drivers/char/tpm/ |
H A D | tpm-interface.c | 308 * @digests: array of tpm_digest structures used to extend PCRs 316 struct tpm_digest *digests) 326 if (digests[i].alg_id != chip->allocated_banks[i].alg_id) { 333 rc = tpm2_pcr_extend(chip, pcr_idx, digests); 337 rc = tpm1_pcr_extend(chip, pcr_idx, digests[0].digest, 315 tpm_pcr_extend(struct tpm_chip *chip, u32 pcr_idx, struct tpm_digest *digests) argument
|
H A D | tpm.h | 294 struct tpm_digest *digests);
|
H A D | tpm2-cmd.c | 224 * @digests: list of pcr banks and corresponding digest values to extend. 229 struct tpm_digest *digests) 251 tpm_buf_append_u16(&buf, digests[i].alg_id); 252 tpm_buf_append(&buf, (const unsigned char *)&digests[i].digest, 228 tpm2_pcr_extend(struct tpm_chip *chip, u32 pcr_idx, struct tpm_digest *digests) argument
|
/linux-master/include/linux/ |
H A D | tpm.h | 465 struct tpm_digest *digests); 491 struct tpm_digest *digests) 490 tpm_pcr_extend(struct tpm_chip *chip, u32 pcr_idx, struct tpm_digest *digests) argument
|
H A D | tpm_eventlog.h | 114 struct tpm_digest digests[]; member in struct:tcg_pcr_event2_head 147 * The TPM2 event log format can contain multiple digests corresponding to 229 halg_size = sizeof(event->digests[i].alg_id);
|
/linux-master/security/integrity/ima/ |
H A D | ima.h | 49 /* bitset of digests algorithms allowed in the setxattr hook */ 108 struct tpm_digest *digests; member in struct:ima_template_entry
|
H A D | ima_api.c | 30 kfree(entry->digests); 42 struct tpm_digest *digests; local 55 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, 56 sizeof(*digests), GFP_NOFS); 57 if (!digests) { 63 (*entry)->digests = digests;
|
H A D | ima_crypto.c | 617 rc = crypto_shash_final(shash, entry->digests[tfm_idx].digest); 632 entry->digests[ima_sha1_idx].alg_id = TPM_ALG_SHA1; 640 entry->digests[i].alg_id = alg_id; 645 memcpy(entry->digests[i].digest, 646 entry->digests[ima_sha1_idx].digest, 825 * non-SHA1 boot_aggregate digests to avoid ambiguity.
|
H A D | ima_fs.c | 184 ima_putc(m, e->digests[algo_idx].digest, hash_digest_size[algo]); 275 ima_print_digest(m, e->digests[algo_idx].digest, hash_digest_size[algo]);
|
H A D | ima_queue.c | 25 static struct tpm_digest *digests; variable in typeref:struct:tpm_digest 58 rc = memcmp(qe->entry->digests[ima_hash_algo_idx].digest, 111 key = ima_hash_key(entry->digests[ima_hash_algo_idx].digest); 163 u8 *digest = entry->digests[ima_hash_algo_idx].digest; 164 struct tpm_digest *digests_arg = entry->digests; 188 digests_arg = digests; 223 digests = kcalloc(ima_tpm_chip->nr_allocated_banks, sizeof(*digests), 225 if (!digests) 229 digests[ [all...] |
H A D | ima_template.c | 361 struct tpm_digest *digests; local 370 digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots, 371 sizeof(*digests), GFP_NOFS); 372 if (!digests) { 377 (*entry)->digests = digests; 384 kfree((*entry)->digests);
|
/linux-master/security/keys/trusted-keys/ |
H A D | trusted_tpm1.c | 28 static struct tpm_digest *digests; variable in typeref:struct:tpm_digest 396 return tpm_pcr_extend(chip, pcrnum, digests) ? -EINVAL : 0; 1030 digests = kcalloc(chip->nr_allocated_banks, sizeof(*digests), 1032 if (!digests) 1036 digests[i].alg_id = chip->allocated_banks[i].alg_id; 1062 kfree(digests); 1072 kfree(digests);
|