diff options
author | Duncan Laurie <dlaurie@google.com> | 2020-06-12 10:41:32 -0700 |
---|---|---|
committer | Patrick Georgi <pgeorgi@google.com> | 2020-06-17 21:36:02 +0000 |
commit | ab673cee087fbf2915d42df0befe1742232da924 (patch) | |
tree | eb1bbe0248f66c0b854e331f579fcb13f5707dbc /src/security/tpm/tspi | |
parent | c7e2b6d140225dd0c76a38060b7ed8fb4ef10e02 (diff) | |
download | coreboot-ab673cee087fbf2915d42df0befe1742232da924.tar.xz |
security/tpm: Change wording of variable names
Change the name of these variables to 'allowlist'.
Change-Id: I9d5553988a1c9972b8f1ebaeee20878b23a8aa9b
Signed-off-by: Duncan Laurie <dlaurie@google.com>
Reviewed-on: https://review.coreboot.org/c/coreboot/+/42316
Reviewed-by: Angel Pons <th3fanbus@gmail.com>
Reviewed-by: Patrick Georgi <pgeorgi@google.com>
Reviewed-by: Paul Menzel <paulepanter@users.sourceforge.net>
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Diffstat (limited to 'src/security/tpm/tspi')
-rw-r--r-- | src/security/tpm/tspi/crtm.c | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/src/security/tpm/tspi/crtm.c b/src/security/tpm/tspi/crtm.c index 49daeb009b..f5c788c016 100644 --- a/src/security/tpm/tspi/crtm.c +++ b/src/security/tpm/tspi/crtm.c @@ -85,21 +85,21 @@ uint32_t tspi_init_crtm(void) static bool is_runtime_data(const char *name) { - const char *whitelist = CONFIG_TPM_MEASURED_BOOT_RUNTIME_DATA; - size_t whitelist_len = sizeof(CONFIG_TPM_MEASURED_BOOT_RUNTIME_DATA) - 1; + const char *allowlist = CONFIG_TPM_MEASURED_BOOT_RUNTIME_DATA; + size_t allowlist_len = sizeof(CONFIG_TPM_MEASURED_BOOT_RUNTIME_DATA) - 1; size_t name_len = strlen(name); const char *end; - if (!whitelist_len || !name_len) + if (!allowlist_len || !name_len) return false; - while ((end = strchr(whitelist, ' '))) { - if (end - whitelist == name_len && !strncmp(whitelist, name, name_len)) + while ((end = strchr(allowlist, ' '))) { + if (end - allowlist == name_len && !strncmp(allowlist, name, name_len)) return true; - whitelist = end + 1; + allowlist = end + 1; } - return !strcmp(whitelist, name); + return !strcmp(allowlist, name); } uint32_t tspi_measure_cbfs_hook(struct cbfsf *fh, const char *name) |