Searched refs:IMA (Results 1 – 13 of 13) sorted by relevance
/linux-4.1.27/security/integrity/ima/ |
D | Kconfig | 3 config IMA config 4 bool "Integrity Measurement Architecture(IMA)" 16 Measurement Architecture(IMA) maintains a list of hash 22 If your system has a TPM chip, then IMA also maintains 27 to learn more about IMA. 32 depends on IMA 37 that IMA uses to maintain the integrity aggregate of the 42 depends on IMA && AUDIT && (SECURITY_SELINUX || SECURITY_SMACK) 50 depends on IMA 52 Select the default IMA measurement template. [all …]
|
/linux-4.1.27/drivers/misc/sgi-gru/ |
D | grukservices.c | 109 #define IMA IMA_CB_DELAY macro 598 gru_mesq(cb, mqd->mq_gpa, gru_get_tri(mhdr), 1, IMA); in send_noop_message() 624 IMA); in send_noop_message() 666 gru_gamir(cb, EOP_IR_CLR, HSTATUS(mqd->mq_gpa, half), XTYPE_DW, IMA); in send_message_queue_full() 678 XTYPE_DW, IMA); in send_message_queue_full() 689 IMA); in send_message_queue_full() 697 IMA); in send_message_queue_full() 721 gru_vset(cb, m, 0, XTYPE_CL, lines, 1, IMA); in send_message_put_nacked() 725 gru_vstore(cb, m, gru_get_tri(mesg), XTYPE_CL, lines, 1, IMA); in send_message_put_nacked() 743 gru_vstore_phys(cb, gpa, gru_get_tri(mesg), IAA_REGISTER, IMA); in send_message_put_nacked() [all …]
|
/linux-4.1.27/Documentation/security/ |
D | 00-INDEX | 25 IMA-templates.txt 26 - documentation on the template management mechanism for IMA.
|
D | IMA-templates.txt | 1 IMA Template Management Mechanism 10 necessary to extend the current version of IMA by defining additional 21 management from the remaining IMA code. The core of this solution is the 32 parameter. At boot time, IMA initializes the chosen template descriptor 36 After the initialization step, IMA will call ima_alloc_init_template()
|
/linux-4.1.27/security/integrity/ |
D | Kconfig | 9 Measurement Architecture (IMA), Extended Verification Module 10 (EVM), IMA-appraisal extension, digital signature verification
|
/linux-4.1.27/Documentation/ABI/testing/ |
D | ima_policy | 6 Measurement Architecture(IMA) maintains a list of hash 15 IMA appraisal, if configured, uses these file measurements
|
/linux-4.1.27/Documentation/ |
D | digsig.txt | 13 Currently digital signatures are used by the IMA/EVM integrity protection subsystem.
|
D | kernel-parameters.txt | 70 IMA Integrity measurement architecture is enabled. 1385 ima_appraise= [IMA] appraise integrity measurements 1389 ima_appraise_tcb [IMA] 1393 ima_hash= [IMA] 1401 ima_policy= [IMA] 1402 The builtin measurement policy to load during IMA 1409 ima_tcb [IMA] Deprecated. Use ima_policy= instead. 1411 Computing Base. This means IMA will measure all 1415 ima_template= [IMA] 1416 Select one of defined IMA measurements template formats. [all …]
|
D | intel_txt.txt | 57 Measurement Architecture (IMA) and Linux Integrity Module interface
|
/linux-4.1.27/Documentation/tpm/ |
D | xen-tpmfront.txt | 110 In order to use features such as IMA that require a TPM to be loaded prior to
|
/linux-4.1.27/security/ |
D | Kconfig | 38 the TPM bios character driver and IMA, an integrity provider. It is
|
/linux-4.1.27/lib/ |
D | Kconfig | 490 which is used by IMA/EVM digital signature extension.
|
/linux-4.1.27/ |
D | MAINTAINERS | 5039 INTEGRITY MEASUREMENT ARCHITECTURE (IMA)
|