Skip to content

Commit 7b5c308

Browse files
Prasad Panditmimizohar
authored andcommitted
integrity: fix indentation of config attributes
Fix indentation of config attributes. Attributes are generally indented with a leading tab(\t) character. Signed-off-by: Prasad Pandit <[email protected]> Signed-off-by: Mimi Zohar <[email protected]>
1 parent e044374 commit 7b5c308

File tree

1 file changed

+22
-22
lines changed

1 file changed

+22
-22
lines changed

security/integrity/Kconfig

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -34,10 +34,10 @@ config INTEGRITY_ASYMMETRIC_KEYS
3434
bool "Enable asymmetric keys support"
3535
depends on INTEGRITY_SIGNATURE
3636
default n
37-
select ASYMMETRIC_KEY_TYPE
38-
select ASYMMETRIC_PUBLIC_KEY_SUBTYPE
39-
select CRYPTO_RSA
40-
select X509_CERTIFICATE_PARSER
37+
select ASYMMETRIC_KEY_TYPE
38+
select ASYMMETRIC_PUBLIC_KEY_SUBTYPE
39+
select CRYPTO_RSA
40+
select X509_CERTIFICATE_PARSER
4141
help
4242
This option enables digital signature verification using
4343
asymmetric keys.
@@ -53,14 +53,14 @@ config INTEGRITY_TRUSTED_KEYRING
5353
keyring.
5454

5555
config INTEGRITY_PLATFORM_KEYRING
56-
bool "Provide keyring for platform/firmware trusted keys"
57-
depends on INTEGRITY_ASYMMETRIC_KEYS
58-
depends on SYSTEM_BLACKLIST_KEYRING
59-
help
60-
Provide a separate, distinct keyring for platform trusted keys, which
61-
the kernel automatically populates during initialization from values
62-
provided by the platform for verifying the kexec'ed kerned image
63-
and, possibly, the initramfs signature.
56+
bool "Provide keyring for platform/firmware trusted keys"
57+
depends on INTEGRITY_ASYMMETRIC_KEYS
58+
depends on SYSTEM_BLACKLIST_KEYRING
59+
help
60+
Provide a separate, distinct keyring for platform trusted keys, which
61+
the kernel automatically populates during initialization from values
62+
provided by the platform for verifying the kexec'ed kerned image
63+
and, possibly, the initramfs signature.
6464

6565
config INTEGRITY_MACHINE_KEYRING
6666
bool "Provide a keyring to which Machine Owner Keys may be added"
@@ -71,10 +71,10 @@ config INTEGRITY_MACHINE_KEYRING
7171
select INTEGRITY_CA_MACHINE_KEYRING if LOAD_PPC_KEYS
7272
select INTEGRITY_CA_MACHINE_KEYRING_MAX if LOAD_PPC_KEYS
7373
help
74-
If set, provide a keyring to which Machine Owner Keys (MOK) may
75-
be added. This keyring shall contain just MOK keys. Unlike keys
76-
in the platform keyring, keys contained in the .machine keyring will
77-
be trusted within the kernel.
74+
If set, provide a keyring to which Machine Owner Keys (MOK) may
75+
be added. This keyring shall contain just MOK keys. Unlike keys
76+
in the platform keyring, keys contained in the .machine keyring will
77+
be trusted within the kernel.
7878

7979
config INTEGRITY_CA_MACHINE_KEYRING
8080
bool "Enforce Machine Keyring CA Restrictions"
@@ -99,14 +99,14 @@ config INTEGRITY_CA_MACHINE_KEYRING_MAX
9999
.platform keyring.
100100

101101
config LOAD_UEFI_KEYS
102-
depends on INTEGRITY_PLATFORM_KEYRING
103-
depends on EFI
104-
def_bool y
102+
depends on INTEGRITY_PLATFORM_KEYRING
103+
depends on EFI
104+
def_bool y
105105

106106
config LOAD_IPL_KEYS
107-
depends on INTEGRITY_PLATFORM_KEYRING
108-
depends on S390
109-
def_bool y
107+
depends on INTEGRITY_PLATFORM_KEYRING
108+
depends on S390
109+
def_bool y
110110

111111
config LOAD_PPC_KEYS
112112
bool "Enable loading of platform and blacklisted keys for POWER"

0 commit comments

Comments
 (0)