Searched refs:ima (Results 1 – 11 of 11) sorted by relevance
7 obj-$(CONFIG_IMA) += ima.o9 ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \11 ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o12 ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o
68 The original 'ima' measurement list template contains a70 limited to 255 characters. The 'ima-ng' measurement list75 bool "ima"77 bool "ima-ng (default)"79 bool "ima-sig"85 default "ima" if IMA_TEMPLATE86 default "ima-ng" if IMA_NG_TEMPLATE87 default "ima-sig" if IMA_SIG_TEMPLATE157 <http://linux-ima.sourceforge.net>227 bool "Require all keys on the .ima keyring be signed (deprecated)"[all …]
13 subdir-$(CONFIG_IMA) += ima14 obj-$(CONFIG_IMA) += ima/
26 of the different use cases - evm, ima, and modules.50 This option requires that all keys added to the .ima and69 source security/integrity/ima/Kconfig
9 The original ``ima`` template is fixed length, containing the filedata hash51 The functions ``ima[_ascii]_measurements_show()`` retrieve, for each entry,77 - "ima": its format is ``d|n``;78 - "ima-ng" (default): its format is ``d-ng|n-ng``;79 - "ima-sig": its format is ``d-ng|n-ng|sig``.90 configuration (``ima-ng`` is the default choice);
1 What: security/ima/policy10 Policies are loaded into the securityfs file ima/policy13 the file ima/policy is closed.
58 core/ima-setup) have support for loading keys at boot
100 unsigned char ima: 3; /* CB_DelRep, unmapped mode */ member315 unsigned long idef2, unsigned char ima) in __opdword() argument322 (ima << GRU_CB_IMA_SHFT) | in __opdword()626 unsigned int ima :3; member
37 security.SMACK64, security.capability, and security.ima) included
1591 Formats: { "ima" | "ima-ng" | "ima-sig" }1592 Default: "ima-ng"1598 ima.ahash_minsize= [IMA] Minimum file size for asynchronous hash usage1607 ima.ahash_bufsize= [IMA] Asynchronous hash buffer size
7307 F: security/integrity/ima/