Commit 7b5c3086 authored by Prasad Pandit's avatar Prasad Pandit Committed by Mimi Zohar

integrity: fix indentation of config attributes

Fix indentation of config attributes. Attributes are generally
indented with a leading tab(\t) character.
Signed-off-by: default avatarPrasad Pandit <pjp@fedoraproject.org>
Signed-off-by: default avatarMimi Zohar <zohar@linux.ibm.com>
parent e044374a
...@@ -34,10 +34,10 @@ config INTEGRITY_ASYMMETRIC_KEYS ...@@ -34,10 +34,10 @@ config INTEGRITY_ASYMMETRIC_KEYS
bool "Enable asymmetric keys support" bool "Enable asymmetric keys support"
depends on INTEGRITY_SIGNATURE depends on INTEGRITY_SIGNATURE
default n default n
select ASYMMETRIC_KEY_TYPE select ASYMMETRIC_KEY_TYPE
select ASYMMETRIC_PUBLIC_KEY_SUBTYPE select ASYMMETRIC_PUBLIC_KEY_SUBTYPE
select CRYPTO_RSA select CRYPTO_RSA
select X509_CERTIFICATE_PARSER select X509_CERTIFICATE_PARSER
help help
This option enables digital signature verification using This option enables digital signature verification using
asymmetric keys. asymmetric keys.
...@@ -53,14 +53,14 @@ config INTEGRITY_TRUSTED_KEYRING ...@@ -53,14 +53,14 @@ config INTEGRITY_TRUSTED_KEYRING
keyring. keyring.
config INTEGRITY_PLATFORM_KEYRING config INTEGRITY_PLATFORM_KEYRING
bool "Provide keyring for platform/firmware trusted keys" bool "Provide keyring for platform/firmware trusted keys"
depends on INTEGRITY_ASYMMETRIC_KEYS depends on INTEGRITY_ASYMMETRIC_KEYS
depends on SYSTEM_BLACKLIST_KEYRING depends on SYSTEM_BLACKLIST_KEYRING
help help
Provide a separate, distinct keyring for platform trusted keys, which Provide a separate, distinct keyring for platform trusted keys, which
the kernel automatically populates during initialization from values the kernel automatically populates during initialization from values
provided by the platform for verifying the kexec'ed kerned image provided by the platform for verifying the kexec'ed kerned image
and, possibly, the initramfs signature. and, possibly, the initramfs signature.
config INTEGRITY_MACHINE_KEYRING config INTEGRITY_MACHINE_KEYRING
bool "Provide a keyring to which Machine Owner Keys may be added" bool "Provide a keyring to which Machine Owner Keys may be added"
...@@ -71,10 +71,10 @@ config INTEGRITY_MACHINE_KEYRING ...@@ -71,10 +71,10 @@ config INTEGRITY_MACHINE_KEYRING
select INTEGRITY_CA_MACHINE_KEYRING if LOAD_PPC_KEYS select INTEGRITY_CA_MACHINE_KEYRING if LOAD_PPC_KEYS
select INTEGRITY_CA_MACHINE_KEYRING_MAX if LOAD_PPC_KEYS select INTEGRITY_CA_MACHINE_KEYRING_MAX if LOAD_PPC_KEYS
help help
If set, provide a keyring to which Machine Owner Keys (MOK) may If set, provide a keyring to which Machine Owner Keys (MOK) may
be added. This keyring shall contain just MOK keys. Unlike keys be added. This keyring shall contain just MOK keys. Unlike keys
in the platform keyring, keys contained in the .machine keyring will in the platform keyring, keys contained in the .machine keyring will
be trusted within the kernel. be trusted within the kernel.
config INTEGRITY_CA_MACHINE_KEYRING config INTEGRITY_CA_MACHINE_KEYRING
bool "Enforce Machine Keyring CA Restrictions" bool "Enforce Machine Keyring CA Restrictions"
...@@ -99,14 +99,14 @@ config INTEGRITY_CA_MACHINE_KEYRING_MAX ...@@ -99,14 +99,14 @@ config INTEGRITY_CA_MACHINE_KEYRING_MAX
.platform keyring. .platform keyring.
config LOAD_UEFI_KEYS config LOAD_UEFI_KEYS
depends on INTEGRITY_PLATFORM_KEYRING depends on INTEGRITY_PLATFORM_KEYRING
depends on EFI depends on EFI
def_bool y def_bool y
config LOAD_IPL_KEYS config LOAD_IPL_KEYS
depends on INTEGRITY_PLATFORM_KEYRING depends on INTEGRITY_PLATFORM_KEYRING
depends on S390 depends on S390
def_bool y def_bool y
config LOAD_PPC_KEYS config LOAD_PPC_KEYS
bool "Enable loading of platform and blacklisted keys for POWER" bool "Enable loading of platform and blacklisted keys for POWER"
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment