diff options
author | Eric Biggers <ebiggers@google.com> | 2018-09-07 22:22:23 +0200 |
---|---|---|
committer | Mimi Zohar <zohar@linux.ibm.com> | 2018-10-10 18:56:15 +0200 |
commit | b2724d5802a77b7fb47e84d9b88b80370eccbc64 (patch) | |
tree | 59917073de892c95ac1b59b3ae8c31f2ecf76749 /security/integrity/evm | |
parent | vfs: require i_size <= SIZE_MAX in kernel_read_file() (diff) | |
download | linux-b2724d5802a77b7fb47e84d9b88b80370eccbc64.tar.xz linux-b2724d5802a77b7fb47e84d9b88b80370eccbc64.zip |
security/integrity: constify some read-only data
Constify some static data that is never modified,
so that it is placed in .rodata.
Signed-off-by: Eric Biggers <ebiggers@google.com>
Signed-off-by: Mimi Zohar <zohar@linux.ibm.com>
Diffstat (limited to 'security/integrity/evm')
-rw-r--r-- | security/integrity/evm/evm_crypto.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/security/integrity/evm/evm_crypto.c b/security/integrity/evm/evm_crypto.c index 8a3905bb02c7..8c25f949ebdb 100644 --- a/security/integrity/evm/evm_crypto.c +++ b/security/integrity/evm/evm_crypto.c @@ -27,7 +27,7 @@ #define EVMKEY "evm-key" #define MAX_KEY_SIZE 128 static unsigned char evmkey[MAX_KEY_SIZE]; -static int evmkey_len = MAX_KEY_SIZE; +static const int evmkey_len = MAX_KEY_SIZE; struct crypto_shash *hmac_tfm; static struct crypto_shash *evm_tfm[HASH_ALGO__LAST]; @@ -38,7 +38,7 @@ static DEFINE_MUTEX(mutex); static unsigned long evm_set_key_flags; -static char * const evm_hmac = "hmac(sha1)"; +static const char evm_hmac[] = "hmac(sha1)"; /** * evm_set_key() - set EVM HMAC key from the kernel |