Closed stefanberger closed 2 years ago
Describe how allow list entries with hashes of keys and the keyrings they are expected to be loaded onto are supposed to look like. Also describe the IMA policy rule that enables the reporting of keys and the keyrings they are loaded onto.
Signed-off-by: Stefan Berger stefanb@linux.ibm.com
Describe how allow list entries with hashes of keys and the keyrings they are expected to be loaded onto are supposed to look like. Also describe the IMA policy rule that enables the reporting of keys and the keyrings they are loaded onto.
Signed-off-by: Stefan Berger stefanb@linux.ibm.com