Searched refs:IMA (Results 1 – 13 of 13) sorted by relevance
/linux-4.4.14/security/integrity/ima/ |
D | Kconfig | 3 config IMA config 4 bool "Integrity Measurement Architecture(IMA)" 16 Measurement Architecture(IMA) maintains a list of hash 22 If your system has a TPM chip, then IMA also maintains 27 to learn more about IMA. 32 depends on IMA 37 that IMA uses to maintain the integrity aggregate of the 42 depends on IMA && AUDIT && (SECURITY_SELINUX || SECURITY_SMACK) 50 depends on IMA 52 Select the default IMA measurement template. [all …]
|
/linux-4.4.14/drivers/misc/sgi-gru/ |
D | grukservices.c | 109 #define IMA IMA_CB_DELAY macro 603 gru_mesq(cb, mqd->mq_gpa, gru_get_tri(mhdr), 1, IMA); in send_noop_message() 629 IMA); in send_noop_message() 671 gru_gamir(cb, EOP_IR_CLR, HSTATUS(mqd->mq_gpa, half), XTYPE_DW, IMA); in send_message_queue_full() 683 XTYPE_DW, IMA); in send_message_queue_full() 694 IMA); in send_message_queue_full() 702 IMA); in send_message_queue_full() 726 gru_vset(cb, m, 0, XTYPE_CL, lines, 1, IMA); in send_message_put_nacked() 730 gru_vstore(cb, m, gru_get_tri(mesg), XTYPE_CL, lines, 1, IMA); in send_message_put_nacked() 748 gru_vstore_phys(cb, gpa, gru_get_tri(mesg), IAA_REGISTER, IMA); in send_message_put_nacked() [all …]
|
/linux-4.4.14/Documentation/security/ |
D | 00-INDEX | 25 IMA-templates.txt 26 - documentation on the template management mechanism for IMA.
|
D | IMA-templates.txt | 1 IMA Template Management Mechanism 10 necessary to extend the current version of IMA by defining additional 21 management from the remaining IMA code. The core of this solution is the 32 parameter. At boot time, IMA initializes the chosen template descriptor 36 After the initialization step, IMA will call ima_alloc_init_template()
|
/linux-4.4.14/security/integrity/ |
D | Kconfig | 9 Measurement Architecture (IMA), Extended Verification Module 10 (EVM), IMA-appraisal extension, digital signature verification
|
/linux-4.4.14/Documentation/ABI/testing/ |
D | ima_policy | 6 Measurement Architecture(IMA) maintains a list of hash 15 IMA appraisal, if configured, uses these file measurements
|
/linux-4.4.14/Documentation/ |
D | digsig.txt | 13 Currently digital signatures are used by the IMA/EVM integrity protection subsystem.
|
D | kernel-parameters.txt | 70 IMA Integrity measurement architecture is enabled. 1449 ima_appraise= [IMA] appraise integrity measurements 1453 ima_appraise_tcb [IMA] 1457 ima_hash= [IMA] 1465 ima_policy= [IMA] 1466 The builtin measurement policy to load during IMA 1473 ima_tcb [IMA] Deprecated. Use ima_policy= instead. 1475 Computing Base. This means IMA will measure all 1479 ima_template= [IMA] 1480 Select one of defined IMA measurements template formats. [all …]
|
D | intel_txt.txt | 57 Measurement Architecture (IMA) and Linux Integrity Module interface
|
/linux-4.4.14/Documentation/tpm/ |
D | xen-tpmfront.txt | 110 In order to use features such as IMA that require a TPM to be loaded prior to
|
/linux-4.4.14/security/ |
D | Kconfig | 38 the TPM bios character driver and IMA, an integrity provider. It is
|
/linux-4.4.14/lib/ |
D | Kconfig | 486 which is used by IMA/EVM digital signature extension.
|
/linux-4.4.14/ |
D | MAINTAINERS | 5424 INTEGRITY MEASUREMENT ARCHITECTURE (IMA)
|