Home
last modified time | relevance | path

Searched refs:ima (Results 1 – 13 of 13) sorted by relevance

/Linux-v5.4/security/integrity/ima/
DMakefile7 obj-$(CONFIG_IMA) += ima.o
9 ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \
11 ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o
12 ima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o
13 ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o
DKconfig69 The original 'ima' measurement list template contains a
71 limited to 255 characters. The 'ima-ng' measurement list
76 bool "ima"
78 bool "ima-ng (default)"
80 bool "ima-sig"
86 default "ima" if IMA_TEMPLATE
87 default "ima-ng" if IMA_NG_TEMPLATE
88 default "ima-sig" if IMA_SIG_TEMPLATE
158 <http://linux-ima.sourceforge.net>
250 bool "Require all keys on the .ima keyring be signed (deprecated)"
[all …]
/Linux-v5.4/Documentation/security/
DIMA-templates.rst9 The original ``ima`` template is fixed length, containing the filedata hash
51 The functions ``ima[_ascii]_measurements_show()`` retrieve, for each entry,
80 - "ima": its format is ``d|n``;
81 - "ima-ng" (default): its format is ``d-ng|n-ng``;
82 - "ima-sig": its format is ``d-ng|n-ng|sig``;
83 - "ima-buf": its format is ``d-ng|n-ng|buf``;
84 - "ima-modsig": its format is ``d-ng|n-ng|sig|d-modsig|modsig``;
94 configuration (``ima-ng`` is the default choice);
/Linux-v5.4/Documentation/ABI/testing/
Dima_policy1 What: security/ima/policy
10 Policies are loaded into the securityfs file ima/policy
13 the file ima/policy is closed.
42 (eg, ima-ng). Only valid when action is "measure".
Devm58 core/ima-setup) have support for loading keys at boot
/Linux-v5.4/security/integrity/
DKconfig27 of the different use cases - evm, ima, and modules.
51 This option requires that all keys added to the .ima and
90 source "security/integrity/ima/Kconfig"
DMakefile17 obj-$(CONFIG_IMA) += ima/
/Linux-v5.4/drivers/misc/sgi-gru/
Dgru_instructions.h100 unsigned char ima: 3; /* CB_DelRep, unmapped mode */ member
315 unsigned long idef2, unsigned char ima) in __opdword() argument
322 (ima << GRU_CB_IMA_SHFT) | in __opdword()
626 unsigned int ima :3; member
/Linux-v5.4/tools/testing/selftests/kexec/
Dtest_kexec_file_load.sh85 line=$(getfattr -n security.ima -e hex --absolute-names $KERNEL_IMAGE 2>&1)
Dkexec_common_lib.sh205 local ima_policy=$SECURITYFS/ima/policy
/Linux-v5.4/security/integrity/evm/
DKconfig38 security.SMACK64, security.capability, and security.ima) included
/Linux-v5.4/Documentation/admin-guide/
Dkernel-parameters.txt1642 Formats: { "ima" | "ima-ng" | "ima-sig" }
1643 Default: "ima-ng"
1649 ima.ahash_minsize= [IMA] Minimum file size for asynchronous hash usage
1658 ima.ahash_bufsize= [IMA] Asynchronous hash buffer size
/Linux-v5.4/
DMAINTAINERS8159 F: security/integrity/ima/