digests 314 drivers/char/tpm/tpm-interface.c struct tpm_digest *digests) digests 324 drivers/char/tpm/tpm-interface.c if (digests[i].alg_id != chip->allocated_banks[i].alg_id) { digests 331 drivers/char/tpm/tpm-interface.c rc = tpm2_pcr_extend(chip, pcr_idx, digests); digests 335 drivers/char/tpm/tpm-interface.c rc = tpm1_pcr_extend(chip, pcr_idx, digests[0].digest, digests 441 drivers/char/tpm/tpm.h struct tpm_digest *digests); digests 250 drivers/char/tpm/tpm2-cmd.c struct tpm_digest *digests) digests 274 drivers/char/tpm/tpm2-cmd.c tpm_buf_append_u16(&buf, digests[i].alg_id); digests 275 drivers/char/tpm/tpm2-cmd.c tpm_buf_append(&buf, (const unsigned char *)&digests[i].digest, digests 170 include/linux/tpm.h struct tpm_digest *digests); digests 193 include/linux/tpm.h struct tpm_digest *digests) digests 112 include/linux/tpm_eventlog.h struct tpm_digest digests[]; digests 210 include/linux/tpm_eventlog.h halg_size = sizeof(event->digests[i].alg_id); digests 27 security/integrity/ima/ima_queue.c static struct tpm_digest *digests; digests 148 security/integrity/ima/ima_queue.c memcpy(digests[i].digest, hash, TPM_DIGEST_SIZE); digests 150 security/integrity/ima/ima_queue.c result = tpm_pcr_extend(ima_tpm_chip, pcr, digests); digests 225 security/integrity/ima/ima_queue.c digests = kcalloc(ima_tpm_chip->nr_allocated_banks, sizeof(*digests), digests 227 security/integrity/ima/ima_queue.c if (!digests) digests 231 security/integrity/ima/ima_queue.c digests[i].alg_id = ima_tpm_chip->allocated_banks[i].alg_id; digests 35 security/keys/trusted.c static struct tpm_digest *digests; digests 392 security/keys/trusted.c return tpm_pcr_extend(chip, pcrnum, digests) ? -EINVAL : 0; digests 1223 security/keys/trusted.c digests = kcalloc(chip->nr_allocated_banks, sizeof(*digests), digests 1225 security/keys/trusted.c if (!digests) digests 1229 security/keys/trusted.c digests[i].alg_id = chip->allocated_banks[i].alg_id; digests 1258 security/keys/trusted.c kfree(digests); digests 1268 security/keys/trusted.c kfree(digests);