summaryrefslogtreecommitdiffstats
path: root/security/integrity/ima/ima.h
diff options
context:
space:
mode:
authorRoberto Sassu <roberto.sassu@huawei.com>2020-03-25 11:53:50 +0100
committerMimi Zohar <zohar@linux.ibm.com>2020-04-20 04:03:39 +0200
commit1ea973df6e2166d1a576cabe5d08925d3261ff9d (patch)
tree7e17b50d0a5cb7c630bd404c4a51727042f71438 /security/integrity/ima/ima.h
parentima: Allocate and initialize tfm for each PCR bank (diff)
downloadlinux-1ea973df6e2166d1a576cabe5d08925d3261ff9d.tar.xz
linux-1ea973df6e2166d1a576cabe5d08925d3261ff9d.zip
ima: Calculate and extend PCR with digests in ima_template_entry
This patch modifies ima_calc_field_array_hash() to calculate a template digest for each allocated PCR bank and SHA1. It also passes the tpm_digest array of the template entry to ima_pcr_extend() or in case of a violation, the pre-initialized digests array filled with 0xff. Padding with zeros is still done if the mapping between TPM algorithm ID and crypto ID is unknown. This patch calculates again the template digest when a measurement list is restored. Copying only the SHA1 digest (due to the limitation of the current measurement list format) is not sufficient, as hash collision detection will be done on the digest calculated with the IMA default hash algorithm. Signed-off-by: Roberto Sassu <roberto.sassu@huawei.com> Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Diffstat (limited to 'security/integrity/ima/ima.h')
0 files changed, 0 insertions, 0 deletions