linux-stable/security/integrity/ima
Dmitry Kasatkin 09ef54359c ima: ima_calc_boot_agregate must use SHA1
With multiple hash algorithms, ima_hash_tfm is no longer guaranteed to be sha1.
Need to force to use sha1.

Changelog:
- pass ima_digest_data to ima_calc_boot_aggregate() instead of char *
  (Roberto Sassu);
- create an ima_digest_data structure in ima_add_boot_aggregate()
  (Roberto Sassu);
- pass hash->algo to ima_alloc_tfm() (Roberto Sassu, reported by Dmitry).
- "move hash definition in ima_add_boot_aggregate()" commit hunk to here.
- sparse warning fix - Fengguang Wu

Signed-off-by: Dmitry Kasatkin <d.kasatkin@samsung.com>
Signed-off-by: Roberto Sassu <roberto.sassu@polito.it>
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
2013-10-25 17:17:02 -04:00
..
ima.h ima: ima_calc_boot_agregate must use SHA1 2013-10-25 17:17:02 -04:00
ima_api.c ima: support arbitrary hash algorithms in ima_calc_buffer_hash 2013-10-25 17:17:01 -04:00
ima_appraise.c ima: use dynamically allocated hash storage 2013-10-25 17:17:00 -04:00
ima_crypto.c ima: ima_calc_boot_agregate must use SHA1 2013-10-25 17:17:02 -04:00
ima_fs.c ima: differentiate between template hash and file data hash sizes 2013-10-25 17:17:00 -04:00
ima_init.c ima: ima_calc_boot_agregate must use SHA1 2013-10-25 17:17:02 -04:00
ima_main.c ima: read and use signature hash algorithm 2013-10-25 17:16:59 -04:00
ima_policy.c Revert "ima: policy for RAMFS" 2013-10-25 13:17:19 -04:00
ima_queue.c ima: differentiate between template hash and file data hash sizes 2013-10-25 17:17:00 -04:00
Kconfig ima: provide support for arbitrary hash algorithms 2013-10-25 17:16:58 -04:00
Makefile integrity: move integrity_audit_msg() 2013-06-20 07:47:49 -04:00