Kconfig 2.0 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162
  1. #
  2. config INTEGRITY
  3. bool "Integrity subsystem"
  4. depends on SECURITY
  5. default y
  6. help
  7. This option enables the integrity subsystem, which is comprised
  8. of a number of different components including the Integrity
  9. Measurement Architecture (IMA), Extended Verification Module
  10. (EVM), IMA-appraisal extension, digital signature verification
  11. extension and audit measurement log support.
  12. Each of these components can be enabled/disabled separately.
  13. Refer to the individual components for additional details.
  14. if INTEGRITY
  15. config INTEGRITY_SIGNATURE
  16. bool "Digital signature verification using multiple keyrings"
  17. depends on KEYS
  18. default n
  19. select SIGNATURE
  20. help
  21. This option enables digital signature verification support
  22. using multiple keyrings. It defines separate keyrings for each
  23. of the different use cases - evm, ima, and modules.
  24. Different keyrings improves search performance, but also allow
  25. to "lock" certain keyring to prevent adding new keys.
  26. This is useful for evm and module keyrings, when keys are
  27. usually only added from initramfs.
  28. config INTEGRITY_ASYMMETRIC_KEYS
  29. bool "Enable asymmetric keys support"
  30. depends on INTEGRITY_SIGNATURE
  31. default n
  32. select ASYMMETRIC_KEY_TYPE
  33. select ASYMMETRIC_PUBLIC_KEY_SUBTYPE
  34. select PUBLIC_KEY_ALGO_RSA
  35. select X509_CERTIFICATE_PARSER
  36. help
  37. This option enables digital signature verification using
  38. asymmetric keys.
  39. config INTEGRITY_AUDIT
  40. bool "Enables integrity auditing support "
  41. depends on AUDIT
  42. default y
  43. help
  44. In addition to enabling integrity auditing support, this
  45. option adds a kernel parameter 'integrity_audit', which
  46. controls the level of integrity auditing messages.
  47. 0 - basic integrity auditing messages (default)
  48. 1 - additional integrity auditing messages
  49. Additional informational integrity auditing messages would
  50. be enabled by specifying 'integrity_audit=1' on the kernel
  51. command line.
  52. source security/integrity/ima/Kconfig
  53. source security/integrity/evm/Kconfig
  54. endif # if INTEGRITY