Searched refs:ima (Results 1 – 15 of 15) sorted by relevance
/kernel/linux/linux-5.10/security/integrity/ima/ |
D | Makefile | 7 obj-$(CONFIG_IMA) += ima.o 9 ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \ 11 ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o 12 ima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o 13 ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o 14 ima-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o 15 ima-$(CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS) += ima_asymmetric_keys.o 16 ima-$(CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS) += ima_queue_keys.o
|
D | Kconfig | 68 The original 'ima' measurement list template contains a 70 limited to 255 characters. The 'ima-ng' measurement list 76 bool "ima-ng (default)" 78 bool "ima-sig" 84 default "ima-ng" if IMA_NG_TEMPLATE 85 default "ima-sig" if IMA_SIG_TEMPLATE 160 <http://linux-ima.sourceforge.net> 252 bool "Require all keys on the .ima keyring be signed (deprecated)" 258 This option requires that all keys added to the .ima 292 bool "Load X509 certificate onto the '.ima' trusted keyring" [all …]
|
/kernel/linux/linux-5.10/Documentation/ABI/testing/ |
D | ima_policy | 1 What: security/ima/policy 10 Policies are loaded into the securityfs file ima/policy 13 the file ima/policy is closed. 50 (eg, .builtin_trusted_keys|.ima). Only valid 53 (eg, ima-ng). Only valid when action is "measure". 131 keys added to .builtin_trusted_keys or .ima keyring: 133 measure func=KEY_CHECK keyrings=.builtin_trusted_keys|.ima
|
D | evm | 87 core/ima-setup) have support for loading keys at boot
|
/kernel/linux/linux-5.10/Documentation/security/ |
D | IMA-templates.rst | 9 The original ``ima`` template is fixed length, containing the filedata hash 51 The functions ``ima[_ascii]_measurements_show()`` retrieve, for each entry, 80 - "ima": its format is ``d|n``; 81 - "ima-ng" (default): its format is ``d-ng|n-ng``; 82 - "ima-sig": its format is ``d-ng|n-ng|sig``; 83 - "ima-buf": its format is ``d-ng|n-ng|buf``; 84 - "ima-modsig": its format is ``d-ng|n-ng|sig|d-modsig|modsig``; 94 configuration (``ima-ng`` is the default choice);
|
/kernel/linux/linux-5.10/security/integrity/ |
D | Kconfig | 27 of the different use cases - evm, ima, and modules. 51 This option requires that all keys added to the .ima and 99 source "security/integrity/ima/Kconfig"
|
D | Makefile | 20 obj-$(CONFIG_IMA) += ima/
|
/kernel/linux/linux-5.10/arch/powerpc/kexec/ |
D | Makefile | 14 obj-y += ima.o
|
/kernel/linux/linux-5.10/drivers/misc/sgi-gru/ |
D | gru_instructions.h | 100 unsigned char ima: 3; /* CB_DelRep, unmapped mode */ member 315 unsigned long idef2, unsigned char ima) in __opdword() argument 322 (ima << GRU_CB_IMA_SHFT) | in __opdword() 626 unsigned int ima :3; member
|
/kernel/linux/linux-5.10/tools/testing/selftests/kexec/ |
D | test_kexec_file_load.sh | 85 line=$(getfattr -n security.ima -e hex --absolute-names $KERNEL_IMAGE 2>&1)
|
D | kexec_common_lib.sh | 205 local ima_policy=$SECURITYFS/ima/policy
|
/kernel/linux/linux-5.10/security/integrity/evm/ |
D | Kconfig | 38 security.SMACK64, security.capability, and security.ima) included
|
/kernel/linux/linux-5.10/Documentation/powerpc/ |
D | imc.rst | 49 https://github.com/open-power/ima-catalog
|
/kernel/linux/linux-5.10/Documentation/admin-guide/ |
D | kernel-parameters.txt | 1785 Formats: { "ima" | "ima-ng" | "ima-sig" } 1786 Default: "ima-ng" 1792 ima.ahash_minsize= [IMA] Minimum file size for asynchronous hash usage 1801 ima.ahash_bufsize= [IMA] Asynchronous hash buffer size
|
/kernel/linux/linux-5.10/ |
D | MAINTAINERS | 8769 F: security/integrity/ima/
|