Kconfig (f1f2f614d535564992f32e720739cb53cf03489f) Kconfig (aefcf2f4b58155d27340ba5f9ddbe9513da8286d)
1# SPDX-License-Identifier: GPL-2.0-only
2# IBM Integrity Measurement Architecture
3#
4config IMA
5 bool "Integrity Measurement Architecture(IMA)"
6 select SECURITYFS
7 select CRYPTO
8 select CRYPTO_HMAC

--- 146 unchanged lines hidden (view full) ---

155 and configure EVM.
156
157 For more information on integrity appraisal refer to:
158 <http://linux-ima.sourceforge.net>
159 If unsure, say N.
160
161config IMA_ARCH_POLICY
162 bool "Enable loading an IMA architecture specific policy"
1# SPDX-License-Identifier: GPL-2.0-only
2# IBM Integrity Measurement Architecture
3#
4config IMA
5 bool "Integrity Measurement Architecture(IMA)"
6 select SECURITYFS
7 select CRYPTO
8 select CRYPTO_HMAC

--- 146 unchanged lines hidden (view full) ---

155 and configure EVM.
156
157 For more information on integrity appraisal refer to:
158 <http://linux-ima.sourceforge.net>
159 If unsure, say N.
160
161config IMA_ARCH_POLICY
162 bool "Enable loading an IMA architecture specific policy"
163 depends on (KEXEC_VERIFY_SIG && IMA) || IMA_APPRAISE \
163 depends on (KEXEC_SIG && IMA) || IMA_APPRAISE \
164 && INTEGRITY_ASYMMETRIC_KEYS
165 default n
166 help
167 This option enables loading an IMA architecture specific policy
168 based on run time secure boot flags.
169
170config IMA_APPRAISE_BUILD_POLICY
171 bool "IMA build time configured policy rules"

--- 141 unchanged lines hidden ---
164 && INTEGRITY_ASYMMETRIC_KEYS
165 default n
166 help
167 This option enables loading an IMA architecture specific policy
168 based on run time secure boot flags.
169
170config IMA_APPRAISE_BUILD_POLICY
171 bool "IMA build time configured policy rules"

--- 141 unchanged lines hidden ---