diff options
author | Wim Vervoorn <wvervoorn@eltan.com> | 2019-11-14 11:06:35 +0100 |
---|---|---|
committer | Patrick Georgi <pgeorgi@google.com> | 2019-11-15 10:44:12 +0000 |
commit | ffe4eba38065d5acb8e74ceb3bddd21f1a0a9005 (patch) | |
tree | c6f4a7d078cb1736c8c3a481ba5ac6b19f34e382 /src/vendorcode/eltan/security | |
parent | 9fc8cf89e881f252ab95ce080046b3143aa0c734 (diff) | |
download | coreboot-ffe4eba38065d5acb8e74ceb3bddd21f1a0a9005.tar.xz |
vendor/eltan/security: Removed long lines from vboot_check
Removed long lines from the verified_boot_check_buffer() function.
BUG=N/A
TEST=build
Change-Id: I2ea0ae82bd531355111d6b45c67bdc2b1759b7bc
Signed-off-by: Wim Vervoorn <wvervoorn@eltan.com>
Reviewed-on: https://review.coreboot.org/c/coreboot/+/36849
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Frans Hendriks <fhendriks@eltan.com>
Diffstat (limited to 'src/vendorcode/eltan/security')
-rw-r--r-- | src/vendorcode/eltan/security/verified_boot/vboot_check.c | 6 |
1 files changed, 4 insertions, 2 deletions
diff --git a/src/vendorcode/eltan/security/verified_boot/vboot_check.c b/src/vendorcode/eltan/security/verified_boot/vboot_check.c index c58ace1cf6..f139449651 100644 --- a/src/vendorcode/eltan/security/verified_boot/vboot_check.c +++ b/src/vendorcode/eltan/security/verified_boot/vboot_check.c @@ -142,7 +142,8 @@ static void verified_boot_check_buffer(const char *name, void *start, size_t siz else hash_algorithm = VB2_HASH_SHA256; - status = cb_sha_little_endian(hash_algorithm, (const uint8_t *)start, size, digest); + status = cb_sha_little_endian(hash_algorithm, (const uint8_t *)start, size, + digest); if ((CONFIG(VENDORCODE_ELTAN_VBOOT) && memcmp((void *)( (uint8_t *)CONFIG_VENDORCODE_ELTAN_OEM_MANIFEST_LOC + sizeof(digest) * hash_index), digest, sizeof(digest))) || status) { @@ -156,7 +157,8 @@ static void verified_boot_check_buffer(const char *name, void *start, size_t siz } else { if (!ENV_BOOTBLOCK && CONFIG(VENDORCODE_ELTAN_MBOOT)) { if (pcr != -1) { - printk(BIOS_DEBUG, "%s: measuring %s\n", __func__, name); + printk(BIOS_DEBUG, "%s: measuring %s\n", __func__, + name); if (measure_item(pcr, digest, sizeof(digest), (int8_t *)name, 0)) printk(BIOS_DEBUG, "%s: measuring failed!\n", |