Kconfig (2361f738b67ab7f1152187fa3d321a09b7c95c09) Kconfig (20328b56cdf8fcc79f28c6c50ad8190fc0779e80)
1# IBM Integrity Measurement Architecture
2#
3config IMA
4 bool "Integrity Measurement Architecture(IMA)"
5 depends on SECURITY
6 select INTEGRITY
7 select SECURITYFS
8 select CRYPTO
9 select CRYPTO_HMAC
10 select CRYPTO_MD5
11 select CRYPTO_SHA1
12 select TCG_TPM if HAS_IOMEM && !UML
13 select TCG_TIS if TCG_TPM && X86
1# IBM Integrity Measurement Architecture
2#
3config IMA
4 bool "Integrity Measurement Architecture(IMA)"
5 depends on SECURITY
6 select INTEGRITY
7 select SECURITYFS
8 select CRYPTO
9 select CRYPTO_HMAC
10 select CRYPTO_MD5
11 select CRYPTO_SHA1
12 select TCG_TPM if HAS_IOMEM && !UML
13 select TCG_TIS if TCG_TPM && X86
14 select TCG_IBMVTPM if TCG_TPM && PPC64
14 help
15 The Trusted Computing Group(TCG) runtime Integrity
16 Measurement Architecture(IMA) maintains a list of hash
17 values of executables and other sensitive system files,
18 as they are read or executed. If an attacker manages
19 to change the contents of an important system file
20 being measured, we can tell.
21

--- 36 unchanged lines hidden ---
15 help
16 The Trusted Computing Group(TCG) runtime Integrity
17 Measurement Architecture(IMA) maintains a list of hash
18 values of executables and other sensitive system files,
19 as they are read or executed. If an attacker manages
20 to change the contents of an important system file
21 being measured, we can tell.
22

--- 36 unchanged lines hidden ---