)]}'
{
  "commit": "c18045ee7e3c3e79a250bb873904c1e4afba9718",
  "tree": "58338ec07940e2fcfb268c04250da4b180512f28",
  "parents": [
    "e57a8dceacf83062ca0631ba759aa2d121b5511f"
  ],
  "author": {
    "name": "Mimi Zohar",
    "email": "zohar@linux.vnet.ibm.com",
    "time": "Tue Apr 30 20:37:59 2013 -0400"
  },
  "committer": {
    "name": "Mimi Zohar",
    "email": "zohar@linux.vnet.ibm.com",
    "time": "Tue May 14 10:51:45 2013 -0400"
  },
  "message": "ima: support for larger default filedata hash algorithms\n\nThe IMA measurement list contains two hashes - a template data hash\nand a filedata hash.  The template data hash is committed to the TPM,\nwhich is limited, by the TPM v1.2 specification, to 20 bytes.  The\nfiledata hash is defined as 20 bytes as well.\n\nNow that support for variable length measurement list templates was\nadded, the filedata hash is not limited to 20 bytes.  This patch adds\nKconfig support for defining larger default filedata hash algorithms\nand replacing the builtin default with one specified on the kernel\ncommand line.\n\n\u003ccrypto/hash_info.h\u003e contains a list of hash algorithms.  The Kconfig\ndefault hash algorithm is a subset of this list, but any hash algorithm\nincluded in the list can be specified at boot, using the \u0027ima_hash\u003d\u0027\nkernel command line option.\n\nChangelog:\n- support hashes that are configured\n- use generic HASH_ALGO_ definitions\n- add Kconfig support\n- hash_setup must be called only once (Dmitry)\n\nSigned-off-by: Mimi Zohar \u003czohar@us.ibm.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "c3101b0c1814d3e04619cf85ff153c1e7a19441e",
      "old_mode": 33188,
      "old_path": "Documentation/kernel-parameters.txt",
      "new_id": "ad6d1549f3e4dbc8b43da9444bf232a4e20ae739",
      "new_mode": 33188,
      "new_path": "Documentation/kernel-parameters.txt"
    },
    {
      "type": "modify",
      "old_id": "7c29c91f2a8180da3f1957c20ce67679f2d43f25",
      "old_mode": 33188,
      "old_path": "security/integrity/ima/Kconfig",
      "new_id": "b7f4db9f6e9ba5b9cf2c17219881492f1a11cc38",
      "new_mode": 33188,
      "new_path": "security/integrity/ima/Kconfig"
    },
    {
      "type": "modify",
      "old_id": "538876089ad343239d1ea454761fe0639bebf332",
      "old_mode": 33188,
      "old_path": "security/integrity/ima/ima_main.c",
      "new_id": "ee187984e8a984eab419f217fbb55e606a701d98",
      "new_mode": 33188,
      "new_path": "security/integrity/ima/ima_main.c"
    }
  ]
}
