| /OK3568_Linux_fs/kernel/security/integrity/ima/ |
| H A D | Makefile | 7 obj-$(CONFIG_IMA) += ima.o 9 ima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \ 11 ima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o 12 ima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o 13 ima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o 14 ima-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o 15 ima-$(CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS) += ima_asymmetric_keys.o 16 ima-$(CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS) += ima_queue_keys.o
|
| H A D | Kconfig | 68 The original 'ima' measurement list template contains a 70 limited to 255 characters. The 'ima-ng' measurement list 76 bool "ima-ng (default)" 78 bool "ima-sig" 84 default "ima-ng" if IMA_NG_TEMPLATE 85 default "ima-sig" if IMA_SIG_TEMPLATE 160 <http://linux-ima.sourceforge.net> 252 bool "Require all keys on the .ima keyring be signed (deprecated)" 258 This option requires that all keys added to the .ima 292 bool "Load X509 certificate onto the '.ima' trusted keyring" [all …]
|
| /OK3568_Linux_fs/kernel/Documentation/ABI/testing/ |
| H A D | ima_policy | 1 What: security/ima/policy 10 Policies are loaded into the securityfs file ima/policy 13 the file ima/policy is closed. 50 (eg, .builtin_trusted_keys|.ima). Only valid 53 (eg, ima-ng). Only valid when action is "measure". 131 keys added to .builtin_trusted_keys or .ima keyring: 133 measure func=KEY_CHECK keyrings=.builtin_trusted_keys|.ima
|
| H A D | evm | 87 core/ima-setup) have support for loading keys at boot
|
| /OK3568_Linux_fs/buildroot/package/ima-evm-utils/ |
| H A D | Config.in | 2 bool "ima-evm-utils" 12 https://sourceforge.net/p/linux-ima/wiki/Home/ 14 comment "ima-evm-utils needs dynamic library support"
|
| H A D | ima-evm-utils.hash | 2 sha1 034d163533ae5f9c06001b375ec7e5a1b09a3853 ima-evm-utils-1.3.2.tar.gz 3 sha256 c2b206e7f9fbe62a938b7ae59e31906fefae4d5351fe01db739bd8346b75d4a7 ima-evm-utils-1.3.2.tar.gz
|
| H A D | ima-evm-utils.mk | 8 IMA_EVM_UTILS_SITE = http://downloads.sourceforge.net/project/linux-ima/ima-evm-utils
|
| /OK3568_Linux_fs/kernel/Documentation/security/ |
| H A D | IMA-templates.rst | 9 The original ``ima`` template is fixed length, containing the filedata hash 51 The functions ``ima[_ascii]_measurements_show()`` retrieve, for each entry, 80 - "ima": its format is ``d|n``; 81 - "ima-ng" (default): its format is ``d-ng|n-ng``; 82 - "ima-sig": its format is ``d-ng|n-ng|sig``; 83 - "ima-buf": its format is ``d-ng|n-ng|buf``; 84 - "ima-modsig": its format is ``d-ng|n-ng|sig|d-modsig|modsig``; 94 configuration (``ima-ng`` is the default choice);
|
| /OK3568_Linux_fs/kernel/security/integrity/ |
| H A D | Kconfig | 27 of the different use cases - evm, ima, and modules. 51 This option requires that all keys added to the .ima and 99 source "security/integrity/ima/Kconfig"
|
| H A D | Makefile | 20 obj-$(CONFIG_IMA) += ima/
|
| /OK3568_Linux_fs/kernel/drivers/misc/sgi-gru/ |
| H A D | gru_instructions.h | 100 unsigned char ima: 3; /* CB_DelRep, unmapped mode */ member 315 unsigned long idef2, unsigned char ima) in __opdword() argument 322 (ima << GRU_CB_IMA_SHFT) | in __opdword() 626 unsigned int ima :3; member
|
| /OK3568_Linux_fs/buildroot/dl/sox/git/src/ |
| H A D | ima-fmt.c | 22 LSX_FORMAT_HANDLER(ima) in LSX_FORMAT_HANDLER() argument
|
| H A D | tests.sh | 164 format1=ima 165 convertToAndFrom ima s16 u16 s24 u24 s32 u32 f32 f64 dat au aiff aifc flac caf # FIXME: wav
|
| H A D | formats.h | 35 FORMAT(ima)
|
| H A D | Makefile.am | 113 sounder.c soundtool.c sphere.c tx16w.c voc.c vox-fmt.c ima-fmt.c adpcm.c adpcm.h \
|
| /OK3568_Linux_fs/kernel/arch/powerpc/kexec/ |
| H A D | Makefile | 14 obj-y += ima.o
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-devtools/tclap/files/ |
| H A D | 0001-tclap-add-pkg-config-file.patch | 7 pkg-config file tclap.pc. Some projects (e.g. ima-inspect) still require
|
| /OK3568_Linux_fs/kernel/tools/testing/selftests/kexec/ |
| H A D | test_kexec_file_load.sh | 85 line=$(getfattr -n security.ima -e hex --absolute-names $KERNEL_IMAGE 2>&1)
|
| H A D | kexec_common_lib.sh | 205 local ima_policy=$SECURITYFS/ima/policy
|
| /OK3568_Linux_fs/kernel/security/integrity/evm/ |
| H A D | Kconfig | 38 security.SMACK64, security.capability, and security.ima) included
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-support/strongswan/ |
| H A D | strongswan_5.9.6.bb | 30 …${@bb.utils.contains('DISTRO_FEATURES', 'ima', 'tnc-imc imc-hcd imc-os imc-scanner imc-attestation… 31 …${@bb.utils.contains('DISTRO_FEATURES', 'ima', 'tnc-imv imv-hcd imv-os imv-scanner imv-attestation…
|
| /OK3568_Linux_fs/kernel/Documentation/powerpc/ |
| H A D | imc.rst | 49 https://github.com/open-power/ima-catalog
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-devtools/rpm/ |
| H A D | rpm_4.17.1.bb | 79 PACKAGECONFIG[imaevm] = "--with-imaevm,,ima-evm-utils"
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/systemd/ |
| H A D | systemd_250.5.bb | 78 ima \ 152 PACKAGECONFIG[ima] = "-Dima=true,-Dima=false"
|
| /OK3568_Linux_fs/kernel/Documentation/admin-guide/ |
| H A D | kernel-parameters.txt | 1825 Formats: { "ima" | "ima-ng" | "ima-sig" } 1826 Default: "ima-ng" 1832 ima.ahash_minsize= [IMA] Minimum file size for asynchronous hash usage 1841 ima.ahash_bufsize= [IMA] Asynchronous hash buffer size
|