linux/security/integrity/ima
Dmitry Kasatkin c7c8bb237f ima: provide support for arbitrary hash algorithms
In preparation of supporting more hash algorithms with larger hash sizes
needed for signature verification, this patch replaces the 20 byte sized
digest, with a more flexible structure.  The new structure includes the
hash algorithm, digest size, and digest.

Changelog:
- recalculate filedata hash for the measurement list, if the signature
  hash digest size is greater than 20 bytes.
- use generic HASH_ALGO_
- make ima_calc_file_hash static
- scripts lindent and checkpatch fixes

Signed-off-by: Dmitry Kasatkin <d.kasatkin@samsung.com>
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
2013-10-25 17:16:58 -04:00
..
ima_api.c ima: provide support for arbitrary hash algorithms 2013-10-25 17:16:58 -04:00
ima_appraise.c ima: provide support for arbitrary hash algorithms 2013-10-25 17:16:58 -04:00
ima_crypto.c ima: provide support for arbitrary hash algorithms 2013-10-25 17:16:58 -04:00
ima_fs.c ima: fix script messages 2013-10-25 13:17:19 -04:00
ima_init.c ima: use new crypto_shash API instead of old crypto_hash 2013-02-06 10:41:12 -05:00
ima_main.c ima: provide support for arbitrary hash algorithms 2013-10-25 17:16:58 -04:00
ima_policy.c Revert "ima: policy for RAMFS" 2013-10-25 13:17:19 -04:00
ima_queue.c hlist: drop the node parameter from iterators 2013-02-27 19:10:24 -08:00
ima.h ima: provide support for arbitrary hash algorithms 2013-10-25 17:16:58 -04:00
Kconfig ima: provide support for arbitrary hash algorithms 2013-10-25 17:16:58 -04:00
Makefile integrity: move integrity_audit_msg() 2013-06-20 07:47:49 -04:00