struct evm_ima_xattr_data xattr_data;
        int rc;
 
-       if (iint->hmac_status == INTEGRITY_PASS)
-               return iint->hmac_status;
+       if (iint->evm_status == INTEGRITY_PASS)
+               return iint->evm_status;
 
        /* if status is not PASS, try to check again - against -ENOMEM */
 
                           sizeof xattr_data, GFP_NOFS);
        if (rc < 0)
                goto err_out;
-       iint->hmac_status = INTEGRITY_PASS;
-       return iint->hmac_status;
+       iint->evm_status = INTEGRITY_PASS;
+       return iint->evm_status;
 
 err_out:
        switch (rc) {
        case -ENODATA:          /* file not labelled */
-               iint->hmac_status = INTEGRITY_NOLABEL;
+               iint->evm_status = INTEGRITY_NOLABEL;
                break;
        default:
-               iint->hmac_status = INTEGRITY_FAIL;
+               iint->evm_status = INTEGRITY_FAIL;
        }
-       return iint->hmac_status;
+       return iint->evm_status;
 }
 
 static int evm_protected_xattr(const char *req_xattr_name)
 
        iint->version = 0;
        iint->flags = 0UL;
        mutex_init(&iint->mutex);
-       iint->hmac_status = INTEGRITY_UNKNOWN;
+       iint->evm_status = INTEGRITY_UNKNOWN;
 }
 
 static int __init integrity_iintcache_init(void)
 
        unsigned char flags;
        u8 digest[SHA1_DIGEST_SIZE];
        struct mutex mutex;     /* protects: version, flags, digest */
-       enum integrity_status hmac_status;
+       enum integrity_status evm_status;
 };
 
 /* rbtree tree calls to lookup, insert, delete