Kconfig 2.3 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273
  1. #
  2. config INTEGRITY
  3. bool "Integrity subsystem"
  4. depends on SECURITY
  5. default y
  6. help
  7. This option enables the integrity subsystem, which is comprised
  8. of a number of different components including the Integrity
  9. Measurement Architecture (IMA), Extended Verification Module
  10. (EVM), IMA-appraisal extension, digital signature verification
  11. extension and audit measurement log support.
  12. Each of these components can be enabled/disabled separately.
  13. Refer to the individual components for additional details.
  14. if INTEGRITY
  15. config INTEGRITY_SIGNATURE
  16. bool "Digital signature verification using multiple keyrings"
  17. depends on KEYS
  18. default n
  19. select SIGNATURE
  20. help
  21. This option enables digital signature verification support
  22. using multiple keyrings. It defines separate keyrings for each
  23. of the different use cases - evm, ima, and modules.
  24. Different keyrings improves search performance, but also allow
  25. to "lock" certain keyring to prevent adding new keys.
  26. This is useful for evm and module keyrings, when keys are
  27. usually only added from initramfs.
  28. config INTEGRITY_ASYMMETRIC_KEYS
  29. bool "Enable asymmetric keys support"
  30. depends on INTEGRITY_SIGNATURE
  31. default n
  32. select ASYMMETRIC_KEY_TYPE
  33. select ASYMMETRIC_PUBLIC_KEY_SUBTYPE
  34. select CRYPTO_RSA
  35. select X509_CERTIFICATE_PARSER
  36. help
  37. This option enables digital signature verification using
  38. asymmetric keys.
  39. config INTEGRITY_TRUSTED_KEYRING
  40. bool "Require all keys on the integrity keyrings be signed"
  41. depends on SYSTEM_TRUSTED_KEYRING
  42. depends on INTEGRITY_ASYMMETRIC_KEYS
  43. default y
  44. help
  45. This option requires that all keys added to the .ima and
  46. .evm keyrings be signed by a key on the system trusted
  47. keyring.
  48. config INTEGRITY_AUDIT
  49. bool "Enables integrity auditing support "
  50. depends on AUDIT
  51. default y
  52. help
  53. In addition to enabling integrity auditing support, this
  54. option adds a kernel parameter 'integrity_audit', which
  55. controls the level of integrity auditing messages.
  56. 0 - basic integrity auditing messages (default)
  57. 1 - additional integrity auditing messages
  58. Additional informational integrity auditing messages would
  59. be enabled by specifying 'integrity_audit=1' on the kernel
  60. command line.
  61. source security/integrity/ima/Kconfig
  62. source security/integrity/evm/Kconfig
  63. endif # if INTEGRITY