linux/security/integrity/ima
Dmitry Kasatkin d3634d0f42 ima: read and use signature hash algorithm
All files on the filesystem, currently, are hashed using the same hash
algorithm.  In preparation for files from different packages being
signed using different hash algorithms, this patch adds support for
reading the signature hash algorithm from the 'security.ima' extended
attribute and calculates the appropriate file data hash based on it.

Changelog:
- fix scripts Lindent and checkpatch msgs - Mimi
- fix md5 support for older version, which occupied 20 bytes in the
  xattr, not the expected 16 bytes.  Fix the comparison to compare
  only the first 16 bytes.

Signed-off-by: Dmitry Kasatkin <d.kasatkin@samsung.com>
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
2013-10-25 17:16:59 -04:00
..
ima_api.c ima: read and use signature hash algorithm 2013-10-25 17:16:59 -04:00
ima_appraise.c ima: read and use signature hash algorithm 2013-10-25 17:16:59 -04:00
ima_crypto.c ima: provide support for arbitrary hash algorithms 2013-10-25 17:16:58 -04:00
ima_fs.c ima: fix script messages 2013-10-25 13:17:19 -04:00
ima_init.c ima: use new crypto_shash API instead of old crypto_hash 2013-02-06 10:41:12 -05:00
ima_main.c ima: read and use signature hash algorithm 2013-10-25 17:16:59 -04:00
ima_policy.c Revert "ima: policy for RAMFS" 2013-10-25 13:17:19 -04:00
ima_queue.c hlist: drop the node parameter from iterators 2013-02-27 19:10:24 -08:00
ima.h ima: read and use signature hash algorithm 2013-10-25 17:16:59 -04:00
Kconfig ima: provide support for arbitrary hash algorithms 2013-10-25 17:16:58 -04:00
Makefile integrity: move integrity_audit_msg() 2013-06-20 07:47:49 -04:00