summaryrefslogtreecommitdiff
path: root/src/vendorcode
diff options
context:
space:
mode:
authorWim Vervoorn <wvervoorn@eltan.com>2019-11-14 11:06:35 +0100
committerPatrick Georgi <pgeorgi@google.com>2019-11-15 10:44:12 +0000
commitffe4eba38065d5acb8e74ceb3bddd21f1a0a9005 (patch)
treec6f4a7d078cb1736c8c3a481ba5ac6b19f34e382 /src/vendorcode
parent9fc8cf89e881f252ab95ce080046b3143aa0c734 (diff)
downloadcoreboot-ffe4eba38065d5acb8e74ceb3bddd21f1a0a9005.tar.xz
vendor/eltan/security: Removed long lines from vboot_check
Removed long lines from the verified_boot_check_buffer() function. BUG=N/A TEST=build Change-Id: I2ea0ae82bd531355111d6b45c67bdc2b1759b7bc Signed-off-by: Wim Vervoorn <wvervoorn@eltan.com> Reviewed-on: https://review.coreboot.org/c/coreboot/+/36849 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Frans Hendriks <fhendriks@eltan.com>
Diffstat (limited to 'src/vendorcode')
-rw-r--r--src/vendorcode/eltan/security/verified_boot/vboot_check.c6
1 files changed, 4 insertions, 2 deletions
diff --git a/src/vendorcode/eltan/security/verified_boot/vboot_check.c b/src/vendorcode/eltan/security/verified_boot/vboot_check.c
index c58ace1cf6..f139449651 100644
--- a/src/vendorcode/eltan/security/verified_boot/vboot_check.c
+++ b/src/vendorcode/eltan/security/verified_boot/vboot_check.c
@@ -142,7 +142,8 @@ static void verified_boot_check_buffer(const char *name, void *start, size_t siz
else
hash_algorithm = VB2_HASH_SHA256;
- status = cb_sha_little_endian(hash_algorithm, (const uint8_t *)start, size, digest);
+ status = cb_sha_little_endian(hash_algorithm, (const uint8_t *)start, size,
+ digest);
if ((CONFIG(VENDORCODE_ELTAN_VBOOT) && memcmp((void *)(
(uint8_t *)CONFIG_VENDORCODE_ELTAN_OEM_MANIFEST_LOC +
sizeof(digest) * hash_index), digest, sizeof(digest))) || status) {
@@ -156,7 +157,8 @@ static void verified_boot_check_buffer(const char *name, void *start, size_t siz
} else {
if (!ENV_BOOTBLOCK && CONFIG(VENDORCODE_ELTAN_MBOOT)) {
if (pcr != -1) {
- printk(BIOS_DEBUG, "%s: measuring %s\n", __func__, name);
+ printk(BIOS_DEBUG, "%s: measuring %s\n", __func__,
+ name);
if (measure_item(pcr, digest, sizeof(digest),
(int8_t *)name, 0))
printk(BIOS_DEBUG, "%s: measuring failed!\n",