Lines Matching +full:key +full:- +full:enable
1 # SPDX-License-Identifier: GPL-2.0-only
36 bool "Enable carrying the IMA measurement list across a soft boot"
71 limited to 255 characters. The 'ima-ng' measurement list
77 bool "ima-ng (default)"
79 bool "ima-sig"
84 default "ima-ng" if IMA_NG_TEMPLATE
85 default "ima-sig" if IMA_SIG_TEMPLATE
126 bool "Enable multiple writes to the IMA policy"
136 bool "Enable reading back the current IMA policy"
151 the security extended attributes from offline attack, enable
155 <http://linux-ima.sourceforge.net>
159 bool "Enable loading an IMA architecture specific policy"
198 be signed and verified by a public key on the trusted IMA
211 and verified by a public key on the trusted IMA keyring.
213 Kernel module signatures can only be verified by IMA-appraisal,
223 and verified by a key on the trusted IMA keyring.
234 bool "Support module-style signatures for appraisal"
247 bool "Permit keys validly signed by a built-in, machine (if configured) or secondary"
255 key is validly signed by a CA cert in the system built-in,
257 key must also have the digitalSignature usage set.
261 provided they are validly signed by a key already resident in the
262 built-in, machine (if configured) or secondary trusted keyrings.
282 X509 certificates signed by a trusted key on the
294 bool "Require signed user-space initialization"
298 This option requires user-space init to be signed.
315 This option is selected by architectures to enable secure and/or