Kconfig (2361f738b67ab7f1152187fa3d321a09b7c95c09) | Kconfig (20328b56cdf8fcc79f28c6c50ad8190fc0779e80) |
---|---|
1# IBM Integrity Measurement Architecture 2# 3config IMA 4 bool "Integrity Measurement Architecture(IMA)" 5 depends on SECURITY 6 select INTEGRITY 7 select SECURITYFS 8 select CRYPTO 9 select CRYPTO_HMAC 10 select CRYPTO_MD5 11 select CRYPTO_SHA1 12 select TCG_TPM if HAS_IOMEM && !UML 13 select TCG_TIS if TCG_TPM && X86 | 1# IBM Integrity Measurement Architecture 2# 3config IMA 4 bool "Integrity Measurement Architecture(IMA)" 5 depends on SECURITY 6 select INTEGRITY 7 select SECURITYFS 8 select CRYPTO 9 select CRYPTO_HMAC 10 select CRYPTO_MD5 11 select CRYPTO_SHA1 12 select TCG_TPM if HAS_IOMEM && !UML 13 select TCG_TIS if TCG_TPM && X86 |
14 select TCG_IBMVTPM if TCG_TPM && PPC64 |
|
14 help 15 The Trusted Computing Group(TCG) runtime Integrity 16 Measurement Architecture(IMA) maintains a list of hash 17 values of executables and other sensitive system files, 18 as they are read or executed. If an attacker manages 19 to change the contents of an important system file 20 being measured, we can tell. 21 --- 36 unchanged lines hidden --- | 15 help 16 The Trusted Computing Group(TCG) runtime Integrity 17 Measurement Architecture(IMA) maintains a list of hash 18 values of executables and other sensitive system files, 19 as they are read or executed. If an attacker manages 20 to change the contents of an important system file 21 being measured, we can tell. 22 --- 36 unchanged lines hidden --- |