Lines Matching refs:IMA

4 config IMA  config
5 bool "Integrity Measurement Architecture(IMA)"
18 Measurement Architecture(IMA) maintains a list of hash
24 If your system has a TPM chip, then IMA also maintains
29 to learn more about IMA.
32 if IMA
35 bool "Enable carrying the IMA measurement list across a soft boot"
40 a TPM's quote after a soft boot, the IMA measurement list of the
43 Depending on the IMA policy, the measurement list can grow to
52 that IMA uses to maintain the integrity aggregate of the
66 Select the default IMA measurement template.
125 bool "Enable multiple writes to the IMA policy"
128 IMA policy can now be updated multiple times. The new rules get
135 bool "Enable reading back the current IMA policy"
139 It is often useful to be able to read back the IMA policy. It is
158 bool "Enable loading an IMA architecture specific policy"
159 depends on (KEXEC_SIG && IMA) || IMA_APPRAISE \
163 This option enables loading an IMA architecture specific policy
167 bool "IMA build time configured policy rules"
171 This option defines an IMA appraisal policy at build time, which
177 modules, firmware, the kexec kernel image, and/or the IMA policy
197 be signed and verified by a public key on the trusted IMA
210 and verified by a public key on the trusted IMA keyring.
212 Kernel module signatures can only be verified by IMA-appraisal,
217 bool "Appraise IMA policy signature"
221 Enabling this rule will require the IMA policy to be signed and
222 and verified by a key on the trusted IMA keyring.
242 The modsig keyword can be used in the IMA policy to allow a hook
253 Keys may be added to the IMA or IMA blacklist keyrings, if the
259 IMA keys to be added may be added to the system secondary keyring,
264 bool "Create IMA machine owner blacklist keyrings (EXPERIMENTAL)"
269 This option creates an IMA blacklist keyring, which contains all
270 revoked IMA keys. It is consulted before any other keyring. If
286 string "IMA X509 certificate path"
290 This option defines IMA X509 certificate path.
315 trusted boot based on IMA runtime policies.