linux/security/integrity/ima
Roberto Sassu add1c05dce ima: defer determining the appraisal hash algorithm for 'ima' template
The same hash algorithm should be used for calculating the file
data hash for the IMA measurement list, as for appraising the file
data integrity.  (The appraise hash algorithm is stored in the
'security.ima' extended attribute.)  The exception is when the
reference file data hash digest, stored in the extended attribute,
is larger than the one supported by the template.  In this case,
the file data hash needs to be calculated twice, once for the
measurement list and, again, for appraisal.

Signed-off-by: Roberto Sassu <roberto.sassu@polito.it>
Signed-off-by: Mimi Zohar <zohar@linux.vnet.ibm.com>
2013-10-26 21:32:53 -04:00
..
ima_api.c ima: add audit log support for larger hashes 2013-10-26 21:32:46 -04:00
ima_appraise.c ima: use dynamically allocated hash storage 2013-10-25 17:17:00 -04:00
ima_crypto.c ima: switch to new template management mechanism 2013-10-25 17:17:06 -04:00
ima_fs.c ima: switch to new template management mechanism 2013-10-25 17:17:06 -04:00
ima_init.c ima: new templates management mechanism 2013-10-25 17:17:04 -04:00
ima_main.c ima: defer determining the appraisal hash algorithm for 'ima' template 2013-10-26 21:32:53 -04:00
ima_policy.c Revert "ima: policy for RAMFS" 2013-10-25 13:17:19 -04:00
ima_queue.c ima: pass the filename argument up to ima_add_template_entry() 2013-10-25 17:17:03 -04:00
ima_template_lib.c ima: define new template ima-ng and template fields d-ng and n-ng 2013-10-25 17:17:05 -04:00
ima_template_lib.h ima: define new template ima-ng and template fields d-ng and n-ng 2013-10-25 17:17:05 -04:00
ima_template.c ima: switch to new template management mechanism 2013-10-25 17:17:06 -04:00
ima.h ima: switch to new template management mechanism 2013-10-25 17:17:06 -04:00
Kconfig ima: provide support for arbitrary hash algorithms 2013-10-25 17:16:58 -04:00
Makefile ima: define template fields library and new helpers 2013-10-25 17:17:05 -04:00