Searched refs:ima (Results 1 – 13 of 13) sorted by relevance
/Linux-v5.4/security/integrity/ima/ |
D | Makefile | 7 obj-$(CONFIG_IMA) += ima.o 9 ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \ 11 ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o 12 ima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o 13 ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o
|
D | Kconfig | 69 The original 'ima' measurement list template contains a 71 limited to 255 characters. The 'ima-ng' measurement list 76 bool "ima" 78 bool "ima-ng (default)" 80 bool "ima-sig" 86 default "ima" if IMA_TEMPLATE 87 default "ima-ng" if IMA_NG_TEMPLATE 88 default "ima-sig" if IMA_SIG_TEMPLATE 158 <http://linux-ima.sourceforge.net> 250 bool "Require all keys on the .ima keyring be signed (deprecated)" [all …]
|
/Linux-v5.4/Documentation/security/ |
D | IMA-templates.rst | 9 The original ``ima`` template is fixed length, containing the filedata hash 51 The functions ``ima[_ascii]_measurements_show()`` retrieve, for each entry, 80 - "ima": its format is ``d|n``; 81 - "ima-ng" (default): its format is ``d-ng|n-ng``; 82 - "ima-sig": its format is ``d-ng|n-ng|sig``; 83 - "ima-buf": its format is ``d-ng|n-ng|buf``; 84 - "ima-modsig": its format is ``d-ng|n-ng|sig|d-modsig|modsig``; 94 configuration (``ima-ng`` is the default choice);
|
/Linux-v5.4/Documentation/ABI/testing/ |
D | ima_policy | 1 What: security/ima/policy 10 Policies are loaded into the securityfs file ima/policy 13 the file ima/policy is closed. 42 (eg, ima-ng). Only valid when action is "measure".
|
D | evm | 58 core/ima-setup) have support for loading keys at boot
|
/Linux-v5.4/security/integrity/ |
D | Kconfig | 27 of the different use cases - evm, ima, and modules. 51 This option requires that all keys added to the .ima and 90 source "security/integrity/ima/Kconfig"
|
D | Makefile | 17 obj-$(CONFIG_IMA) += ima/
|
/Linux-v5.4/drivers/misc/sgi-gru/ |
D | gru_instructions.h | 100 unsigned char ima: 3; /* CB_DelRep, unmapped mode */ member 315 unsigned long idef2, unsigned char ima) in __opdword() argument 322 (ima << GRU_CB_IMA_SHFT) | in __opdword() 626 unsigned int ima :3; member
|
/Linux-v5.4/tools/testing/selftests/kexec/ |
D | test_kexec_file_load.sh | 85 line=$(getfattr -n security.ima -e hex --absolute-names $KERNEL_IMAGE 2>&1)
|
D | kexec_common_lib.sh | 205 local ima_policy=$SECURITYFS/ima/policy
|
/Linux-v5.4/security/integrity/evm/ |
D | Kconfig | 38 security.SMACK64, security.capability, and security.ima) included
|
/Linux-v5.4/Documentation/admin-guide/ |
D | kernel-parameters.txt | 1642 Formats: { "ima" | "ima-ng" | "ima-sig" } 1643 Default: "ima-ng" 1649 ima.ahash_minsize= [IMA] Minimum file size for asynchronous hash usage 1658 ima.ahash_bufsize= [IMA] Asynchronous hash buffer size
|
/Linux-v5.4/ |
D | MAINTAINERS | 8159 F: security/integrity/ima/
|