Lines Matching refs:on

37 	depends on TCG_TPM && HAVE_IMA_KEXEC
40 TPM PCRs are only reset on a hard reboot. In order to validate
42 running kernel must be saved and restored on boot.
44 Depending on the IMA policy, the measurement list can grow to
58 depends on AUDIT && (SECURITY_SELINUX || SECURITY_SMACK || SECURITY_APPARMOR)
74 by specifying "ima_template=" on the boot command line.
98 depends on CRYPTO_SHA1=y
102 depends on CRYPTO_SHA256=y
106 depends on CRYPTO_SHA512=y
110 depends on CRYPTO_WP512=y
114 depends on CRYPTO_SM3_GENERIC=y
154 For more information on integrity appraisal refer to:
160 depends on (KEXEC_SIG && IMA) || IMA_APPRAISE \
165 based on run time secure boot flags.
169 depends on IMA_APPRAISE && INTEGRITY_ASYMMETRIC_KEYS
174 policy name on the boot command line. The build time appraisal
177 Depending on the rules configured, this policy may require kernel
184 depends on IMA_APPRAISE_BUILD_POLICY
194 depends on IMA_APPRAISE_BUILD_POLICY
198 be signed and verified by a public key on the trusted IMA
207 depends on IMA_APPRAISE_BUILD_POLICY
211 and verified by a public key on the trusted IMA keyring.
219 depends on IMA_APPRAISE_BUILD_POLICY
223 and verified by a key on the trusted IMA keyring.
227 depends on IMA_APPRAISE
235 depends on IMA_APPRAISE
236 depends on INTEGRITY_ASYMMETRIC_KEYS
248 depends on SYSTEM_TRUSTED_KEYRING
249 depends on SECONDARY_TRUSTED_KEYRING
250 depends on INTEGRITY_ASYMMETRIC_KEYS
266 depends on SYSTEM_TRUSTED_KEYRING
267 depends on INTEGRITY_TRUSTED_KEYRING
277 depends on INTEGRITY_TRUSTED_KEYRING
280 File signature verification is based on the public keys
281 loaded on the .ima trusted keyring. These public keys are
282 X509 certificates signed by a trusted key on the
288 depends on IMA_LOAD_X509
295 depends on IMA_LOAD_X509
302 depends on ASYMMETRIC_PUBLIC_KEY_SUBTYPE=y
307 depends on IMA_MEASURE_ASYMMETRIC_KEYS
308 depends on SYSTEM_TRUSTED_KEYRING
313 depends on IMA_ARCH_POLICY
316 trusted boot based on IMA runtime policies.
327 depends on IMA_KEXEC