Kconfig (4286587dccd43d4f81fa227e413ed7e909895342) | Kconfig (e7a2ad7eb6f48ad80c70a22dd8167fb34b409466) |
---|---|
1# IBM Integrity Measurement Architecture 2# 3config IMA 4 bool "Integrity Measurement Architecture(IMA)" 5 depends on SECURITY 6 select INTEGRITY 7 select SECURITYFS 8 select CRYPTO --- 57 unchanged lines hidden (view full) --- 66endchoice 67 68config IMA_DEFAULT_TEMPLATE 69 string 70 depends on IMA 71 default "ima" if IMA_TEMPLATE 72 default "ima-ng" if IMA_NG_TEMPLATE 73 | 1# IBM Integrity Measurement Architecture 2# 3config IMA 4 bool "Integrity Measurement Architecture(IMA)" 5 depends on SECURITY 6 select INTEGRITY 7 select SECURITYFS 8 select CRYPTO --- 57 unchanged lines hidden (view full) --- 66endchoice 67 68config IMA_DEFAULT_TEMPLATE 69 string 70 depends on IMA 71 default "ima" if IMA_TEMPLATE 72 default "ima-ng" if IMA_NG_TEMPLATE 73 |
74choice 75 prompt "Default integrity hash algorithm" 76 default IMA_DEFAULT_HASH_SHA1 77 depends on IMA 78 help 79 Select the default hash algorithm used for the measurement 80 list, integrity appraisal and audit log. The compiled default 81 hash algorithm can be overwritten using the kernel command 82 line 'ima_hash=' option. 83 84 config IMA_DEFAULT_HASH_SHA1 85 bool "SHA1 (default)" 86 depends on CRYPTO_SHA1 87 88 config IMA_DEFAULT_HASH_SHA256 89 bool "SHA256" 90 depends on CRYPTO_SHA256 && !IMA_TEMPLATE 91 92 config IMA_DEFAULT_HASH_SHA512 93 bool "SHA512" 94 depends on CRYPTO_SHA512 && !IMA_TEMPLATE 95 96 config IMA_DEFAULT_HASH_WP512 97 bool "WP512" 98 depends on CRYPTO_WP512 && !IMA_TEMPLATE 99endchoice 100 101config IMA_DEFAULT_HASH 102 string 103 depends on IMA 104 default "sha1" if IMA_DEFAULT_HASH_SHA1 105 default "sha256" if IMA_DEFAULT_HASH_SHA256 106 default "sha512" if IMA_DEFAULT_HASH_SHA512 107 default "wp512" if IMA_DEFAULT_HASH_WP512 108 |
|
74config IMA_APPRAISE 75 bool "Appraise integrity measurements" 76 depends on IMA 77 default n 78 help 79 This option enables local measurement integrity appraisal. 80 It requires the system to be labeled with a security extended 81 attribute containing the file hash measurement. To protect 82 the security extended attributes from offline attack, enable 83 and configure EVM. 84 85 For more information on integrity appraisal refer to: 86 <http://linux-ima.sourceforge.net> 87 If unsure, say N. | 109config IMA_APPRAISE 110 bool "Appraise integrity measurements" 111 depends on IMA 112 default n 113 help 114 This option enables local measurement integrity appraisal. 115 It requires the system to be labeled with a security extended 116 attribute containing the file hash measurement. To protect 117 the security extended attributes from offline attack, enable 118 and configure EVM. 119 120 For more information on integrity appraisal refer to: 121 <http://linux-ima.sourceforge.net> 122 If unsure, say N. |