1b2441318SGreg Kroah-Hartman# SPDX-License-Identifier: GPL-2.0 23323eec9SMimi Zohar# 33323eec9SMimi Zohar# Makefile for building Trusted Computing Group's(TCG) runtime Integrity 43323eec9SMimi Zohar# Measurement Architecture(IMA). 53323eec9SMimi Zohar# 63323eec9SMimi Zohar 7*4de2f084SRoberto Sassuobj-$(CONFIG_IMA) += ima.o ima_iint.o 83323eec9SMimi Zohar 9bab73937SMimi Zoharima-y := ima_fs.o ima_queue.o ima_init.o ima_main.o ima_crypto.o ima_api.o \ 103ce1217dSRoberto Sassu ima_policy.o ima_template.o ima_template_lib.o 112fe5d6deSMimi Zoharima-$(CONFIG_IMA_APPRAISE) += ima_appraise.o 129044d627SThiago Jung Bauermannima-$(CONFIG_IMA_APPRAISE_MODSIG) += ima_modsig.o 1394c3aac5SMimi Zoharima-$(CONFIG_HAVE_IMA_KEXEC) += ima_kexec.o 14e2bf6814STushar Sugandhiima-$(CONFIG_IMA_BLACKLIST_KEYRING) += ima_mok.o 15e2bf6814STushar Sugandhiima-$(CONFIG_IMA_MEASURE_ASYMMETRIC_KEYS) += ima_asymmetric_keys.o 16e2bf6814STushar Sugandhiima-$(CONFIG_IMA_QUEUE_EARLY_BOOT_KEYS) += ima_queue_keys.o 1725519d68SChester Lin 1825519d68SChester Linifeq ($(CONFIG_EFI),y) 1925519d68SChester Linima-$(CONFIG_IMA_SECURE_AND_OR_TRUSTED_BOOT) += ima_efi.o 2025519d68SChester Linendif 21