| /OK3568_Linux_fs/kernel/security/integrity/ima/ |
| H A D | Kconfig | 4 config IMA config 5 bool "Integrity Measurement Architecture(IMA)" 18 Measurement Architecture(IMA) maintains a list of hash 24 If your system has a TPM chip, then IMA also maintains 29 to learn more about IMA. 33 bool "Enable carrying the IMA measurement list across a soft boot" 34 depends on IMA && TCG_TPM && HAVE_IMA_KEXEC 38 a TPM's quote after a soft boot, the IMA measurement list of the 41 Depending on the IMA policy, the measurement list can grow to 46 depends on IMA [all …]
|
| /OK3568_Linux_fs/kernel/drivers/misc/sgi-gru/ |
| H A D | grukservices.c | 97 #define IMA IMA_CB_DELAY macro 591 gru_mesq(cb, mqd->mq_gpa, gru_get_tri(mhdr), 1, IMA); in send_noop_message() 617 IMA); in send_noop_message() 659 gru_gamir(cb, EOP_IR_CLR, HSTATUS(mqd->mq_gpa, half), XTYPE_DW, IMA); in send_message_queue_full() 671 XTYPE_DW, IMA); in send_message_queue_full() 682 IMA); in send_message_queue_full() 690 IMA); in send_message_queue_full() 714 gru_vset(cb, m, 0, XTYPE_CL, lines, 1, IMA); in send_message_put_nacked() 718 gru_vstore(cb, m, gru_get_tri(mesg), XTYPE_CL, lines, 1, IMA); in send_message_put_nacked() 821 gru_mesq(cb, mqd->mq_gpa, gru_get_tri(mhdr), clines, IMA); in gru_send_message_gpa() [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/security/ |
| H A D | IMA-templates.rst | 2 IMA Template Management Mechanism 13 necessary to extend the current version of IMA by defining additional 24 management from the remaining IMA code. The core of this solution is the 35 parameter. At boot time, IMA initializes the chosen template descriptor 39 After the initialization step, IMA will call ``ima_alloc_init_template()``
|
| H A D | index.rst | 9 IMA-templates
|
| H A D | digsig.rst | 20 Currently digital signatures are used by the IMA/EVM integrity protection subsystem.
|
| /OK3568_Linux_fs/kernel/Documentation/ABI/testing/ |
| H A D | ima_policy | 6 Measurement Architecture(IMA) maintains a list of hash 15 IMA appraisal, if configured, uses these file measurements 52 template:= name of a defined IMA template type
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-graphics/libsdl/libsdl-1.2.15/ |
| H A D | CVE-2019-7578.patch | 9 If IMA ADPCM format chunk was too short, InitIMA_ADPCM() parsing it 51 + SDL_SetError("Unexpected length of a chunk with an IMA ADPCM format");
|
| H A D | CVE-2019-7574.patch | 63 + SDL_SetError("Unexpected chunk length for an IMA ADPCM decoder");
|
| H A D | CVE-2019-7572.patch | 29 If an IMA ADPCM block contained an initial index out of step table
|
| /OK3568_Linux_fs/kernel/security/integrity/ |
| H A D | Kconfig | 10 Measurement Architecture (IMA), Extended Verification Module 11 (EVM), IMA-appraisal extension, digital signature verification
|
| /OK3568_Linux_fs/buildroot/package/ima-evm-utils/ |
| H A D | Config.in | 9 Linux Integrity Measurement Architecture (IMA)
|
| /OK3568_Linux_fs/yocto/meta-rockchip/recipes-multimedia/gstreamer/gstreamer1.0-plugins-base_1.22/ |
| H A D | 0014-riff-Fix-bps-caculation-error-for-ADPCM.patch | 38 GST_DEBUG ("fixing av_bps to calculated value %d of IMA DVI ADPCM",
|
| /OK3568_Linux_fs/yocto/meta-rockchip/recipes-multimedia/gstreamer/gstreamer1.0-plugins-base_1.20/ |
| H A D | 0014-riff-Fix-bps-caculation-error-for-ADPCM.patch | 38 GST_DEBUG ("fixing av_bps to calculated value %d of IMA DVI ADPCM",
|
| /OK3568_Linux_fs/buildroot/package/gstreamer1/gst1-plugins-base/ |
| H A D | 0014-riff-Fix-bps-caculation-error-for-ADPCM.patch | 38 GST_DEBUG ("fixing av_bps to calculated value %d of IMA DVI ADPCM",
|
| /OK3568_Linux_fs/kernel/fs/verity/ |
| H A D | Kconfig | 55 an alternative to IMA appraisal. Userspace programs still
|
| /OK3568_Linux_fs/buildroot/dl/sox/git/test/ |
| H A D | README | 34 -i Use sox IMA ADPCM
|
| /OK3568_Linux_fs/kernel/Documentation/filesystems/ |
| H A D | fsverity.rst | 78 in IMA (Integrity Measurement Architecture) policies is also planned. 457 the signature verification in userspace or using IMA-appraisal. 648 :Q: Why isn't fs-verity part of IMA? 649 :A: fs-verity and IMA (Integrity Measurement Architecture) have 651 hashing individual files using a Merkle tree. In contrast, IMA 656 IMA is planned to support the fs-verity hashing mechanism as an 660 through IMA. As a standalone filesystem feature, fs-verity
|
| /OK3568_Linux_fs/kernel/Documentation/security/tpm/ |
| H A D | xen-tpmfront.rst | 121 In order to use features such as IMA that require a TPM to be loaded prior to
|
| /OK3568_Linux_fs/buildroot/dl/sox/git/ |
| H A D | FEATURES.in | 37 ** u-law, A-law, MS ADPCM, IMA (DMI) ADPCM
|
| H A D | ChangeLog | 725 o Fix trim when first effect with IMA-ADPCM input wav file. (robs) 830 o New .ima file format for raw IMA ADPCM. (robs) 1497 o Changed the default block alignement for IMA ADPCM WAV files to use 1585 o Fixed bug in determining length of IMA and MS ADPCM WAVE files. cbagwell 1598 o Added support for MS ADPCM and IMA (or DVI) ADPCM for .wav files.
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/ |
| H A D | kernel-parameters.rst | 106 IMA Integrity measurement architecture is enabled.
|
| H A D | kernel-parameters.txt | 1775 ima_appraise= [IMA] appraise integrity measurements 1779 ima_appraise_tcb [IMA] Deprecated. Use ima_policy= instead. 1783 ima_canonical_fmt [IMA] 1787 ima_hash= [IMA] 1795 ima_policy= [IMA] 1796 The builtin policies to load during IMA setup. 1817 ima_tcb [IMA] Deprecated. Use ima_policy= instead. 1819 Computing Base. This means IMA will measure all 1823 ima_template= [IMA] 1824 Select one of defined IMA measurements template formats. [all …]
|
| /OK3568_Linux_fs/kernel/security/ |
| H A D | Kconfig | 44 various security modules (AppArmor, IMA, SafeSetID, TOMOYO, TPM).
|
| /OK3568_Linux_fs/kernel/Documentation/x86/ |
| H A D | intel_txt.rst | 64 Measurement Architecture (IMA) and Linux Integrity Module interface
|
| /OK3568_Linux_fs/kernel/lib/ |
| H A D | Kconfig | 565 which is used by IMA/EVM digital signature extension.
|