73 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
			
		
		
	
	
			73 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			Plaintext
		
	
	
	
	
	
| #
 | |
| config INTEGRITY
 | |
| 	bool "Integrity subsystem"
 | |
| 	depends on SECURITY
 | |
| 	default y
 | |
| 	help
 | |
| 	  This option enables the integrity subsystem, which is comprised
 | |
| 	  of a number of different components including the Integrity
 | |
| 	  Measurement Architecture (IMA), Extended Verification Module
 | |
| 	  (EVM), IMA-appraisal extension, digital signature verification
 | |
| 	  extension and audit measurement log support.
 | |
| 
 | |
| 	  Each of these components can be enabled/disabled separately.
 | |
| 	  Refer to the individual components for additional details.
 | |
| 
 | |
| if INTEGRITY
 | |
| 
 | |
| config INTEGRITY_SIGNATURE
 | |
| 	bool "Digital signature verification using multiple keyrings"
 | |
| 	depends on KEYS
 | |
| 	default n
 | |
| 	select SIGNATURE
 | |
| 	help
 | |
| 	  This option enables digital signature verification support
 | |
| 	  using multiple keyrings. It defines separate keyrings for each
 | |
| 	  of the different use cases - evm, ima, and modules.
 | |
| 	  Different keyrings improves search performance, but also allow
 | |
| 	  to "lock" certain keyring to prevent adding new keys.
 | |
| 	  This is useful for evm and module keyrings, when keys are
 | |
| 	  usually only added from initramfs.
 | |
| 
 | |
| config INTEGRITY_ASYMMETRIC_KEYS
 | |
| 	bool "Enable asymmetric keys support"
 | |
| 	depends on INTEGRITY_SIGNATURE
 | |
| 	default n
 | |
|         select ASYMMETRIC_KEY_TYPE
 | |
|         select ASYMMETRIC_PUBLIC_KEY_SUBTYPE
 | |
|         select CRYPTO_RSA
 | |
|         select X509_CERTIFICATE_PARSER
 | |
| 	help
 | |
| 	  This option enables digital signature verification using
 | |
| 	  asymmetric keys.
 | |
| 
 | |
| config INTEGRITY_TRUSTED_KEYRING
 | |
| 	bool "Require all keys on the integrity keyrings be signed"
 | |
| 	depends on SYSTEM_TRUSTED_KEYRING
 | |
| 	depends on INTEGRITY_ASYMMETRIC_KEYS
 | |
| 	default y
 | |
| 	help
 | |
| 	   This option requires that all keys added to the .ima and
 | |
| 	   .evm keyrings be signed by a key on the system trusted
 | |
| 	   keyring.
 | |
| 
 | |
| config INTEGRITY_AUDIT
 | |
| 	bool "Enables integrity auditing support "
 | |
| 	depends on AUDIT
 | |
| 	default y
 | |
| 	help
 | |
| 	  In addition to enabling integrity auditing support, this
 | |
| 	  option adds a kernel parameter 'integrity_audit', which
 | |
| 	  controls the level of integrity auditing messages.
 | |
| 	  0 - basic integrity auditing messages (default)
 | |
| 	  1 - additional integrity auditing messages
 | |
| 
 | |
| 	  Additional informational integrity auditing messages would
 | |
| 	  be enabled by specifying 'integrity_audit=1' on the kernel
 | |
| 	  command line.
 | |
| 
 | |
| source security/integrity/ima/Kconfig
 | |
| source security/integrity/evm/Kconfig
 | |
| 
 | |
| endif   # if INTEGRITY
 | 
