Home
last modified time | relevance | path

Searched refs:IMA (Results 1 – 13 of 13) sorted by relevance

/linux-4.1.27/security/integrity/ima/
DKconfig3 config IMA config
4 bool "Integrity Measurement Architecture(IMA)"
16 Measurement Architecture(IMA) maintains a list of hash
22 If your system has a TPM chip, then IMA also maintains
27 to learn more about IMA.
32 depends on IMA
37 that IMA uses to maintain the integrity aggregate of the
42 depends on IMA && AUDIT && (SECURITY_SELINUX || SECURITY_SMACK)
50 depends on IMA
52 Select the default IMA measurement template.
[all …]
/linux-4.1.27/drivers/misc/sgi-gru/
Dgrukservices.c109 #define IMA IMA_CB_DELAY macro
598 gru_mesq(cb, mqd->mq_gpa, gru_get_tri(mhdr), 1, IMA); in send_noop_message()
624 IMA); in send_noop_message()
666 gru_gamir(cb, EOP_IR_CLR, HSTATUS(mqd->mq_gpa, half), XTYPE_DW, IMA); in send_message_queue_full()
678 XTYPE_DW, IMA); in send_message_queue_full()
689 IMA); in send_message_queue_full()
697 IMA); in send_message_queue_full()
721 gru_vset(cb, m, 0, XTYPE_CL, lines, 1, IMA); in send_message_put_nacked()
725 gru_vstore(cb, m, gru_get_tri(mesg), XTYPE_CL, lines, 1, IMA); in send_message_put_nacked()
743 gru_vstore_phys(cb, gpa, gru_get_tri(mesg), IAA_REGISTER, IMA); in send_message_put_nacked()
[all …]
/linux-4.1.27/Documentation/security/
D00-INDEX25 IMA-templates.txt
26 - documentation on the template management mechanism for IMA.
DIMA-templates.txt1 IMA Template Management Mechanism
10 necessary to extend the current version of IMA by defining additional
21 management from the remaining IMA code. The core of this solution is the
32 parameter. At boot time, IMA initializes the chosen template descriptor
36 After the initialization step, IMA will call ima_alloc_init_template()
/linux-4.1.27/security/integrity/
DKconfig9 Measurement Architecture (IMA), Extended Verification Module
10 (EVM), IMA-appraisal extension, digital signature verification
/linux-4.1.27/Documentation/ABI/testing/
Dima_policy6 Measurement Architecture(IMA) maintains a list of hash
15 IMA appraisal, if configured, uses these file measurements
/linux-4.1.27/Documentation/
Ddigsig.txt13 Currently digital signatures are used by the IMA/EVM integrity protection subsystem.
Dkernel-parameters.txt70 IMA Integrity measurement architecture is enabled.
1385 ima_appraise= [IMA] appraise integrity measurements
1389 ima_appraise_tcb [IMA]
1393 ima_hash= [IMA]
1401 ima_policy= [IMA]
1402 The builtin measurement policy to load during IMA
1409 ima_tcb [IMA] Deprecated. Use ima_policy= instead.
1411 Computing Base. This means IMA will measure all
1415 ima_template= [IMA]
1416 Select one of defined IMA measurements template formats.
[all …]
Dintel_txt.txt57 Measurement Architecture (IMA) and Linux Integrity Module interface
/linux-4.1.27/Documentation/tpm/
Dxen-tpmfront.txt110 In order to use features such as IMA that require a TPM to be loaded prior to
/linux-4.1.27/security/
DKconfig38 the TPM bios character driver and IMA, an integrity provider. It is
/linux-4.1.27/lib/
DKconfig490 which is used by IMA/EVM digital signature extension.
/linux-4.1.27/
DMAINTAINERS5039 INTEGRITY MEASUREMENT ARCHITECTURE (IMA)