linux/security/integrity
Dmitry Kasatkin 09ef54359c ima: ima_calc_boot_agregate must use SHA1
With multiple hash algorithms, ima_hash_tfm is no longer guaranteed to be sha1.
Need to force to use sha1.

Changelog:
- pass ima_digest_data to ima_calc_boot_aggregate() instead of char *
  (Roberto Sassu);
- create an ima_digest_data structure in ima_add_boot_aggregate()
  (Roberto Sassu);
- pass hash->algo to ima_alloc_tfm() (Roberto Sassu, reported by Dmitry).
- "move hash definition in ima_add_boot_aggregate()" commit hunk to here.
- sparse warning fix - Fengguang Wu

Signed-off-by: Dmitry Kasatkin <d.kasatkin@samsung.com>
Signed-off-by: Roberto Sassu <roberto.sassu@polito.it>
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
2013-10-25 17:17:02 -04:00
..
evm ima: pass full xattr with the signature 2013-10-25 17:16:59 -04:00
ima ima: ima_calc_boot_agregate must use SHA1 2013-10-25 17:17:02 -04:00
digsig_asymmetric.c ima: read and use signature hash algorithm 2013-10-25 17:16:59 -04:00
digsig.c ima: pass full xattr with the signature 2013-10-25 17:16:59 -04:00
iint.c ima: use dynamically allocated hash storage 2013-10-25 17:17:00 -04:00
integrity_audit.c integrity: move integrity_audit_msg() 2013-06-20 07:47:49 -04:00
integrity.h ima: use dynamically allocated hash storage 2013-10-25 17:17:00 -04:00
Kconfig integrity: move integrity_audit_msg() 2013-06-20 07:47:49 -04:00
Makefile integrity: move integrity_audit_msg() 2013-06-20 07:47:49 -04:00