Version:  2.0.40 2.2.26 2.4.37 3.11 3.12 3.13 3.14 3.15 3.16 3.17 3.18 3.19 4.0 4.1 4.2 4.3 4.4 4.5 4.6 4.7 4.8

Linux/security/integrity/Kconfig

  1 #
  2 config INTEGRITY
  3         bool "Integrity subsystem"
  4         depends on SECURITY
  5         default y
  6         help
  7           This option enables the integrity subsystem, which is comprised
  8           of a number of different components including the Integrity
  9           Measurement Architecture (IMA), Extended Verification Module
 10           (EVM), IMA-appraisal extension, digital signature verification
 11           extension and audit measurement log support.
 12 
 13           Each of these components can be enabled/disabled separately.
 14           Refer to the individual components for additional details.
 15 
 16 if INTEGRITY
 17 
 18 config INTEGRITY_SIGNATURE
 19         bool "Digital signature verification using multiple keyrings"
 20         depends on KEYS
 21         default n
 22         select SIGNATURE
 23         help
 24           This option enables digital signature verification support
 25           using multiple keyrings. It defines separate keyrings for each
 26           of the different use cases - evm, ima, and modules.
 27           Different keyrings improves search performance, but also allow
 28           to "lock" certain keyring to prevent adding new keys.
 29           This is useful for evm and module keyrings, when keys are
 30           usually only added from initramfs.
 31 
 32 config INTEGRITY_ASYMMETRIC_KEYS
 33         bool "Enable asymmetric keys support"
 34         depends on INTEGRITY_SIGNATURE
 35         default n
 36         select ASYMMETRIC_KEY_TYPE
 37         select ASYMMETRIC_PUBLIC_KEY_SUBTYPE
 38         select CRYPTO_RSA
 39         select X509_CERTIFICATE_PARSER
 40         help
 41           This option enables digital signature verification using
 42           asymmetric keys.
 43 
 44 config INTEGRITY_TRUSTED_KEYRING
 45         bool "Require all keys on the integrity keyrings be signed"
 46         depends on SYSTEM_TRUSTED_KEYRING
 47         depends on INTEGRITY_ASYMMETRIC_KEYS
 48         default y
 49         help
 50            This option requires that all keys added to the .ima and
 51            .evm keyrings be signed by a key on the system trusted
 52            keyring.
 53 
 54 config INTEGRITY_AUDIT
 55         bool "Enables integrity auditing support "
 56         depends on AUDIT
 57         default y
 58         help
 59           In addition to enabling integrity auditing support, this
 60           option adds a kernel parameter 'integrity_audit', which
 61           controls the level of integrity auditing messages.
 62           0 - basic integrity auditing messages (default)
 63           1 - additional integrity auditing messages
 64 
 65           Additional informational integrity auditing messages would
 66           be enabled by specifying 'integrity_audit=1' on the kernel
 67           command line.
 68 
 69 source security/integrity/ima/Kconfig
 70 source security/integrity/evm/Kconfig
 71 
 72 endif   # if INTEGRITY

This page was automatically generated by LXR 0.3.1 (source).  •  Linux is a registered trademark of Linus Torvalds  •  Contact us