Home
last modified time | relevance | path

Searched refs:ima (Results 1 – 15 of 15) sorted by relevance

/Linux-v5.10/security/integrity/ima/
DMakefile7 obj-$(CONFIG_IMA) += ima.o
9 ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \
11 ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o
12 ima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o
13 ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o
14 ima-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o
15 ima-$(CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS) += ima_asymmetric_keys.o
16 ima-$(CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS) += ima_queue_keys.o
DKconfig69 The original 'ima' measurement list template contains a
71 limited to 255 characters. The 'ima-ng' measurement list
76 bool "ima"
78 bool "ima-ng (default)"
80 bool "ima-sig"
86 default "ima" if IMA_TEMPLATE
87 default "ima-ng" if IMA_NG_TEMPLATE
88 default "ima-sig" if IMA_SIG_TEMPLATE
163 <http://linux-ima.sourceforge.net>
255 bool "Require all keys on the .ima keyring be signed (deprecated)"
[all …]
/Linux-v5.10/Documentation/ABI/testing/
Dima_policy1 What: security/ima/policy
10 Policies are loaded into the securityfs file ima/policy
13 the file ima/policy is closed.
50 (eg, .builtin_trusted_keys|.ima). Only valid
53 (eg, ima-ng). Only valid when action is "measure".
131 keys added to .builtin_trusted_keys or .ima keyring:
133 measure func=KEY_CHECK keyrings=.builtin_trusted_keys|.ima
Devm65 core/ima-setup) have support for loading keys at boot
/Linux-v5.10/Documentation/security/
DIMA-templates.rst9 The original ``ima`` template is fixed length, containing the filedata hash
51 The functions ``ima[_ascii]_measurements_show()`` retrieve, for each entry,
80 - "ima": its format is ``d|n``;
81 - "ima-ng" (default): its format is ``d-ng|n-ng``;
82 - "ima-sig": its format is ``d-ng|n-ng|sig``;
83 - "ima-buf": its format is ``d-ng|n-ng|buf``;
84 - "ima-modsig": its format is ``d-ng|n-ng|sig|d-modsig|modsig``;
94 configuration (``ima-ng`` is the default choice);
/Linux-v5.10/security/integrity/
DKconfig27 of the different use cases - evm, ima, and modules.
51 This option requires that all keys added to the .ima and
99 source "security/integrity/ima/Kconfig"
DMakefile20 obj-$(CONFIG_IMA) += ima/
/Linux-v5.10/arch/powerpc/kexec/
DMakefile14 obj-y += ima.o
/Linux-v5.10/drivers/misc/sgi-gru/
Dgru_instructions.h100 unsigned char ima: 3; /* CB_DelRep, unmapped mode */ member
315 unsigned long idef2, unsigned char ima) in __opdword() argument
322 (ima << GRU_CB_IMA_SHFT) | in __opdword()
626 unsigned int ima :3; member
/Linux-v5.10/tools/testing/selftests/kexec/
Dtest_kexec_file_load.sh85 line=$(getfattr -n security.ima -e hex --absolute-names $KERNEL_IMAGE 2>&1)
Dkexec_common_lib.sh205 local ima_policy=$SECURITYFS/ima/policy
/Linux-v5.10/security/integrity/evm/
DKconfig38 security.SMACK64, security.capability, and security.ima) included
/Linux-v5.10/Documentation/powerpc/
Dimc.rst49 https://github.com/open-power/ima-catalog
/Linux-v5.10/Documentation/admin-guide/
Dkernel-parameters.txt1776 Formats: { "ima" | "ima-ng" | "ima-sig" }
1777 Default: "ima-ng"
1783 ima.ahash_minsize= [IMA] Minimum file size for asynchronous hash usage
1792 ima.ahash_bufsize= [IMA] Asynchronous hash buffer size
/Linux-v5.10/
DMAINTAINERS8770 F: security/integrity/ima/