Searched refs:IMA (Results 1 – 14 of 14) sorted by relevance
/Linux-v4.19/security/integrity/ima/ |
D | Kconfig | 3 config IMA config 4 bool "Integrity Measurement Architecture(IMA)" 18 Measurement Architecture(IMA) maintains a list of hash 24 If your system has a TPM chip, then IMA also maintains 29 to learn more about IMA. 33 bool "Enable carrying the IMA measurement list across a soft boot" 34 depends on IMA && TCG_TPM && HAVE_IMA_KEXEC 38 a TPM's quote after a soft boot, the IMA measurement list of the 41 Depending on the IMA policy, the measurement list can grow to 46 depends on IMA [all …]
|
/Linux-v4.19/drivers/misc/sgi-gru/ |
D | grukservices.c | 109 #define IMA IMA_CB_DELAY macro 603 gru_mesq(cb, mqd->mq_gpa, gru_get_tri(mhdr), 1, IMA); in send_noop_message() 629 IMA); in send_noop_message() 671 gru_gamir(cb, EOP_IR_CLR, HSTATUS(mqd->mq_gpa, half), XTYPE_DW, IMA); in send_message_queue_full() 683 XTYPE_DW, IMA); in send_message_queue_full() 694 IMA); in send_message_queue_full() 702 IMA); in send_message_queue_full() 726 gru_vset(cb, m, 0, XTYPE_CL, lines, 1, IMA); in send_message_put_nacked() 730 gru_vstore(cb, m, gru_get_tri(mesg), XTYPE_CL, lines, 1, IMA); in send_message_put_nacked() 833 gru_mesq(cb, mqd->mq_gpa, gru_get_tri(mhdr), clines, IMA); in gru_send_message_gpa() [all …]
|
/Linux-v4.19/Documentation/security/ |
D | IMA-templates.rst | 2 IMA Template Management Mechanism 13 necessary to extend the current version of IMA by defining additional 24 management from the remaining IMA code. The core of this solution is the 35 parameter. At boot time, IMA initializes the chosen template descriptor 39 After the initialization step, IMA will call ``ima_alloc_init_template()``
|
D | index.rst | 9 IMA-templates
|
/Linux-v4.19/security/integrity/ |
D | Kconfig | 9 Measurement Architecture (IMA), Extended Verification Module 10 (EVM), IMA-appraisal extension, digital signature verification
|
/Linux-v4.19/Documentation/ABI/testing/ |
D | ima_policy | 6 Measurement Architecture(IMA) maintains a list of hash 15 IMA appraisal, if configured, uses these file measurements
|
/Linux-v4.19/Documentation/ |
D | digsig.txt | 20 Currently digital signatures are used by the IMA/EVM integrity protection subsystem.
|
D | intel_txt.txt | 64 Measurement Architecture (IMA) and Linux Integrity Module interface
|
/Linux-v4.19/Documentation/security/tpm/ |
D | xen-tpmfront.txt | 110 In order to use features such as IMA that require a TPM to be loaded prior to
|
/Linux-v4.19/Documentation/admin-guide/ |
D | kernel-parameters.rst | 105 IMA Integrity measurement architecture is enabled.
|
D | kernel-parameters.txt | 1540 ima_appraise= [IMA] appraise integrity measurements 1544 ima_appraise_tcb [IMA] 1548 ima_canonical_fmt [IMA] 1552 ima_hash= [IMA] 1560 ima_policy= [IMA] 1561 The builtin policies to load during IMA setup. 1583 ima_tcb [IMA] Deprecated. Use ima_policy= instead. 1585 Computing Base. This means IMA will measure all 1589 ima_template= [IMA] 1590 Select one of defined IMA measurements template formats. [all …]
|
/Linux-v4.19/security/ |
D | Kconfig | 43 the TPM bios character driver and IMA, an integrity provider. It is
|
/Linux-v4.19/lib/ |
D | Kconfig | 531 which is used by IMA/EVM digital signature extension.
|
/Linux-v4.19/ |
D | MAINTAINERS | 7301 INTEGRITY MEASUREMENT ARCHITECTURE (IMA)
|