diff options
| -rw-r--r-- | security/integrity/Kconfig | 2 | ||||
| -rw-r--r-- | security/integrity/Makefile | 2 | ||||
| -rw-r--r-- | security/integrity/integrity.h | 4 | 
3 files changed, 4 insertions, 4 deletions
| diff --git a/security/integrity/Kconfig b/security/integrity/Kconfig index ff60bf72881f..5bd1cc1b4a54 100644 --- a/security/integrity/Kconfig +++ b/security/integrity/Kconfig @@ -3,7 +3,7 @@ config INTEGRITY  	def_bool y  	depends on IMA || EVM -config INTEGRITY_DIGSIG +config INTEGRITY_SIGNATURE  	boolean "Digital signature verification using multiple keyrings"  	depends on INTEGRITY && KEYS  	default n diff --git a/security/integrity/Makefile b/security/integrity/Makefile index bece0563ee5e..d43799cc14f6 100644 --- a/security/integrity/Makefile +++ b/security/integrity/Makefile @@ -3,7 +3,7 @@  #  obj-$(CONFIG_INTEGRITY) += integrity.o -obj-$(CONFIG_INTEGRITY_DIGSIG) += digsig.o +obj-$(CONFIG_INTEGRITY_SIGNATURE) += digsig.o  integrity-y := iint.o diff --git a/security/integrity/integrity.h b/security/integrity/integrity.h index 4da6ba81d153..7a25ecec5aaa 100644 --- a/security/integrity/integrity.h +++ b/security/integrity/integrity.h @@ -51,7 +51,7 @@ struct integrity_iint_cache *integrity_iint_find(struct inode *inode);  #define INTEGRITY_KEYRING_IMA		2  #define INTEGRITY_KEYRING_MAX		3 -#ifdef CONFIG_INTEGRITY_DIGSIG +#ifdef CONFIG_INTEGRITY_SIGNATURE  int integrity_digsig_verify(const unsigned int id, const char *sig, int siglen,  					const char *digest, int digestlen); @@ -65,7 +65,7 @@ static inline int integrity_digsig_verify(const unsigned int id,  	return -EOPNOTSUPP;  } -#endif /* CONFIG_INTEGRITY_DIGSIG */ +#endif /* CONFIG_INTEGRITY_SIGNATURE */  /* set during initialization */  extern int iint_initialized; | 
