linux/security/integrity
Dmitry Kasatkin c7c8bb237f ima: provide support for arbitrary hash algorithms
In preparation of supporting more hash algorithms with larger hash sizes
needed for signature verification, this patch replaces the 20 byte sized
digest, with a more flexible structure.  The new structure includes the
hash algorithm, digest size, and digest.

Changelog:
- recalculate filedata hash for the measurement list, if the signature
  hash digest size is greater than 20 bytes.
- use generic HASH_ALGO_
- make ima_calc_file_hash static
- scripts lindent and checkpatch fixes

Signed-off-by: Dmitry Kasatkin <d.kasatkin@samsung.com>
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
2013-10-25 17:16:58 -04:00
..
evm ima: fix script messages 2013-10-25 13:17:19 -04:00
ima ima: provide support for arbitrary hash algorithms 2013-10-25 17:16:58 -04:00
digsig_asymmetric.c ima: digital signature verification using asymmetric keys 2013-02-06 21:22:18 -05:00
digsig.c ima: fix script messages 2013-10-25 13:17:19 -04:00
iint.c ima: per hook cache integrity appraisal status 2013-01-22 16:10:36 -05:00
integrity_audit.c integrity: move integrity_audit_msg() 2013-06-20 07:47:49 -04:00
integrity.h ima: provide support for arbitrary hash algorithms 2013-10-25 17:16:58 -04:00
Kconfig integrity: move integrity_audit_msg() 2013-06-20 07:47:49 -04:00
Makefile integrity: move integrity_audit_msg() 2013-06-20 07:47:49 -04:00