diff options
author | Roberto Sassu <roberto.sassu@huawei.com> | 2020-03-25 11:53:50 +0100 |
---|---|---|
committer | Mimi Zohar <zohar@linux.ibm.com> | 2020-04-20 04:03:39 +0200 |
commit | 1ea973df6e2166d1a576cabe5d08925d3261ff9d (patch) | |
tree | 7e17b50d0a5cb7c630bd404c4a51727042f71438 /security/integrity/ima/ima.h | |
parent | ima: Allocate and initialize tfm for each PCR bank (diff) | |
download | linux-1ea973df6e2166d1a576cabe5d08925d3261ff9d.tar.xz linux-1ea973df6e2166d1a576cabe5d08925d3261ff9d.zip |
ima: Calculate and extend PCR with digests in ima_template_entry
This patch modifies ima_calc_field_array_hash() to calculate a template
digest for each allocated PCR bank and SHA1. It also passes the tpm_digest
array of the template entry to ima_pcr_extend() or in case of a violation,
the pre-initialized digests array filled with 0xff.
Padding with zeros is still done if the mapping between TPM algorithm ID
and crypto ID is unknown.
This patch calculates again the template digest when a measurement list is
restored. Copying only the SHA1 digest (due to the limitation of the
current measurement list format) is not sufficient, as hash collision
detection will be done on the digest calculated with the IMA default hash
algorithm.
Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com>
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Diffstat (limited to 'security/integrity/ima/ima.h')
0 files changed, 0 insertions, 0 deletions