Home
last modified time | relevance | path

Searched refs:ima (Results 1 – 15 of 15) sorted by relevance

/kernel/linux/linux-5.10/security/integrity/ima/
DMakefile7 obj-$(CONFIG_IMA) += ima.o
9 ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \
11 ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o
12 ima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o
13 ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o
14 ima-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o
15 ima-$(CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS) += ima_asymmetric_keys.o
16 ima-$(CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS) += ima_queue_keys.o
DKconfig68 The original 'ima' measurement list template contains a
70 limited to 255 characters. The 'ima-ng' measurement list
76 bool "ima-ng (default)"
78 bool "ima-sig"
84 default "ima-ng" if IMA_NG_TEMPLATE
85 default "ima-sig" if IMA_SIG_TEMPLATE
160 <http://linux-ima.sourceforge.net>
252 bool "Require all keys on the .ima keyring be signed (deprecated)"
258 This option requires that all keys added to the .ima
292 bool "Load X509 certificate onto the '.ima' trusted keyring"
[all …]
/kernel/linux/linux-5.10/Documentation/ABI/testing/
Dima_policy1 What: security/ima/policy
10 Policies are loaded into the securityfs file ima/policy
13 the file ima/policy is closed.
50 (eg, .builtin_trusted_keys|.ima). Only valid
53 (eg, ima-ng). Only valid when action is "measure".
131 keys added to .builtin_trusted_keys or .ima keyring:
133 measure func=KEY_CHECK keyrings=.builtin_trusted_keys|.ima
Devm87 core/ima-setup) have support for loading keys at boot
/kernel/linux/linux-5.10/Documentation/security/
DIMA-templates.rst9 The original ``ima`` template is fixed length, containing the filedata hash
51 The functions ``ima[_ascii]_measurements_show()`` retrieve, for each entry,
80 - "ima": its format is ``d|n``;
81 - "ima-ng" (default): its format is ``d-ng|n-ng``;
82 - "ima-sig": its format is ``d-ng|n-ng|sig``;
83 - "ima-buf": its format is ``d-ng|n-ng|buf``;
84 - "ima-modsig": its format is ``d-ng|n-ng|sig|d-modsig|modsig``;
94 configuration (``ima-ng`` is the default choice);
/kernel/linux/linux-5.10/security/integrity/
DKconfig27 of the different use cases - evm, ima, and modules.
51 This option requires that all keys added to the .ima and
99 source "security/integrity/ima/Kconfig"
DMakefile20 obj-$(CONFIG_IMA) += ima/
/kernel/linux/linux-5.10/arch/powerpc/kexec/
DMakefile14 obj-y += ima.o
/kernel/linux/linux-5.10/drivers/misc/sgi-gru/
Dgru_instructions.h100 unsigned char ima: 3; /* CB_DelRep, unmapped mode */ member
315 unsigned long idef2, unsigned char ima) in __opdword() argument
322 (ima << GRU_CB_IMA_SHFT) | in __opdword()
626 unsigned int ima :3; member
/kernel/linux/linux-5.10/tools/testing/selftests/kexec/
Dtest_kexec_file_load.sh85 line=$(getfattr -n security.ima -e hex --absolute-names $KERNEL_IMAGE 2>&1)
Dkexec_common_lib.sh205 local ima_policy=$SECURITYFS/ima/policy
/kernel/linux/linux-5.10/security/integrity/evm/
DKconfig38 security.SMACK64, security.capability, and security.ima) included
/kernel/linux/linux-5.10/Documentation/powerpc/
Dimc.rst49 https://github.com/open-power/ima-catalog
/kernel/linux/linux-5.10/Documentation/admin-guide/
Dkernel-parameters.txt1785 Formats: { "ima" | "ima-ng" | "ima-sig" }
1786 Default: "ima-ng"
1792 ima.ahash_minsize= [IMA] Minimum file size for asynchronous hash usage
1801 ima.ahash_bufsize= [IMA] Asynchronous hash buffer size
/kernel/linux/linux-5.10/
DMAINTAINERS8769 F: security/integrity/ima/