Home
last modified time | relevance | path

Searched refs:IMA (Results 1 – 13 of 13) sorted by relevance

/linux-4.4.14/security/integrity/ima/
DKconfig3 config IMA config
4 bool "Integrity Measurement Architecture(IMA)"
16 Measurement Architecture(IMA) maintains a list of hash
22 If your system has a TPM chip, then IMA also maintains
27 to learn more about IMA.
32 depends on IMA
37 that IMA uses to maintain the integrity aggregate of the
42 depends on IMA && AUDIT && (SECURITY_SELINUX || SECURITY_SMACK)
50 depends on IMA
52 Select the default IMA measurement template.
[all …]
/linux-4.4.14/drivers/misc/sgi-gru/
Dgrukservices.c109 #define IMA IMA_CB_DELAY macro
603 gru_mesq(cb, mqd->mq_gpa, gru_get_tri(mhdr), 1, IMA); in send_noop_message()
629 IMA); in send_noop_message()
671 gru_gamir(cb, EOP_IR_CLR, HSTATUS(mqd->mq_gpa, half), XTYPE_DW, IMA); in send_message_queue_full()
683 XTYPE_DW, IMA); in send_message_queue_full()
694 IMA); in send_message_queue_full()
702 IMA); in send_message_queue_full()
726 gru_vset(cb, m, 0, XTYPE_CL, lines, 1, IMA); in send_message_put_nacked()
730 gru_vstore(cb, m, gru_get_tri(mesg), XTYPE_CL, lines, 1, IMA); in send_message_put_nacked()
748 gru_vstore_phys(cb, gpa, gru_get_tri(mesg), IAA_REGISTER, IMA); in send_message_put_nacked()
[all …]
/linux-4.4.14/Documentation/security/
D00-INDEX25 IMA-templates.txt
26 - documentation on the template management mechanism for IMA.
DIMA-templates.txt1 IMA Template Management Mechanism
10 necessary to extend the current version of IMA by defining additional
21 management from the remaining IMA code. The core of this solution is the
32 parameter. At boot time, IMA initializes the chosen template descriptor
36 After the initialization step, IMA will call ima_alloc_init_template()
/linux-4.4.14/security/integrity/
DKconfig9 Measurement Architecture (IMA), Extended Verification Module
10 (EVM), IMA-appraisal extension, digital signature verification
/linux-4.4.14/Documentation/ABI/testing/
Dima_policy6 Measurement Architecture(IMA) maintains a list of hash
15 IMA appraisal, if configured, uses these file measurements
/linux-4.4.14/Documentation/
Ddigsig.txt13 Currently digital signatures are used by the IMA/EVM integrity protection subsystem.
Dkernel-parameters.txt70 IMA Integrity measurement architecture is enabled.
1449 ima_appraise= [IMA] appraise integrity measurements
1453 ima_appraise_tcb [IMA]
1457 ima_hash= [IMA]
1465 ima_policy= [IMA]
1466 The builtin measurement policy to load during IMA
1473 ima_tcb [IMA] Deprecated. Use ima_policy= instead.
1475 Computing Base. This means IMA will measure all
1479 ima_template= [IMA]
1480 Select one of defined IMA measurements template formats.
[all …]
Dintel_txt.txt57 Measurement Architecture (IMA) and Linux Integrity Module interface
/linux-4.4.14/Documentation/tpm/
Dxen-tpmfront.txt110 In order to use features such as IMA that require a TPM to be loaded prior to
/linux-4.4.14/security/
DKconfig38 the TPM bios character driver and IMA, an integrity provider. It is
/linux-4.4.14/lib/
DKconfig486 which is used by IMA/EVM digital signature extension.
/linux-4.4.14/
DMAINTAINERS5424 INTEGRITY MEASUREMENT ARCHITECTURE (IMA)