Searched refs:ima (Results 1 – 15 of 15) sorted by relevance
| /Linux-v5.10/security/integrity/ima/ |
| D | Makefile | 7 obj-$(CONFIG_IMA) += ima.o 9 ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \ 11 ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o 12 ima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o 13 ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o 14 ima-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o 15 ima-$(CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS) += ima_asymmetric_keys.o 16 ima-$(CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS) += ima_queue_keys.o
|
| D | Kconfig | 69 The original 'ima' measurement list template contains a 71 limited to 255 characters. The 'ima-ng' measurement list 76 bool "ima" 78 bool "ima-ng (default)" 80 bool "ima-sig" 86 default "ima" if IMA_TEMPLATE 87 default "ima-ng" if IMA_NG_TEMPLATE 88 default "ima-sig" if IMA_SIG_TEMPLATE 163 <http://linux-ima.sourceforge.net> 255 bool "Require all keys on the .ima keyring be signed (deprecated)" [all …]
|
| /Linux-v5.10/Documentation/ABI/testing/ |
| D | ima_policy | 1 What: security/ima/policy 10 Policies are loaded into the securityfs file ima/policy 13 the file ima/policy is closed. 50 (eg, .builtin_trusted_keys|.ima). Only valid 53 (eg, ima-ng). Only valid when action is "measure". 131 keys added to .builtin_trusted_keys or .ima keyring: 133 measure func=KEY_CHECK keyrings=.builtin_trusted_keys|.ima
|
| D | evm | 65 core/ima-setup) have support for loading keys at boot
|
| /Linux-v5.10/Documentation/security/ |
| D | IMA-templates.rst | 9 The original ``ima`` template is fixed length, containing the filedata hash 51 The functions ``ima[_ascii]_measurements_show()`` retrieve, for each entry, 80 - "ima": its format is ``d|n``; 81 - "ima-ng" (default): its format is ``d-ng|n-ng``; 82 - "ima-sig": its format is ``d-ng|n-ng|sig``; 83 - "ima-buf": its format is ``d-ng|n-ng|buf``; 84 - "ima-modsig": its format is ``d-ng|n-ng|sig|d-modsig|modsig``; 94 configuration (``ima-ng`` is the default choice);
|
| /Linux-v5.10/security/integrity/ |
| D | Kconfig | 27 of the different use cases - evm, ima, and modules. 51 This option requires that all keys added to the .ima and 99 source "security/integrity/ima/Kconfig"
|
| D | Makefile | 20 obj-$(CONFIG_IMA) += ima/
|
| /Linux-v5.10/arch/powerpc/kexec/ |
| D | Makefile | 14 obj-y += ima.o
|
| /Linux-v5.10/drivers/misc/sgi-gru/ |
| D | gru_instructions.h | 100 unsigned char ima: 3; /* CB_DelRep, unmapped mode */ member 315 unsigned long idef2, unsigned char ima) in __opdword() argument 322 (ima << GRU_CB_IMA_SHFT) | in __opdword() 626 unsigned int ima :3; member
|
| /Linux-v5.10/tools/testing/selftests/kexec/ |
| D | test_kexec_file_load.sh | 85 line=$(getfattr -n security.ima -e hex --absolute-names $KERNEL_IMAGE 2>&1)
|
| D | kexec_common_lib.sh | 205 local ima_policy=$SECURITYFS/ima/policy
|
| /Linux-v5.10/security/integrity/evm/ |
| D | Kconfig | 38 security.SMACK64, security.capability, and security.ima) included
|
| /Linux-v5.10/Documentation/powerpc/ |
| D | imc.rst | 49 https://github.com/open-power/ima-catalog
|
| /Linux-v5.10/Documentation/admin-guide/ |
| D | kernel-parameters.txt | 1776 Formats: { "ima" | "ima-ng" | "ima-sig" } 1777 Default: "ima-ng" 1783 ima.ahash_minsize= [IMA] Minimum file size for asynchronous hash usage 1792 ima.ahash_bufsize= [IMA] Asynchronous hash buffer size
|
| /Linux-v5.10/ |
| D | MAINTAINERS | 8770 F: security/integrity/ima/
|