diff options
-rw-r--r-- | src/vendorcode/eltan/security/verified_boot/vboot_check.c | 6 |
1 files changed, 4 insertions, 2 deletions
diff --git a/src/vendorcode/eltan/security/verified_boot/vboot_check.c b/src/vendorcode/eltan/security/verified_boot/vboot_check.c index c58ace1cf6..f139449651 100644 --- a/src/vendorcode/eltan/security/verified_boot/vboot_check.c +++ b/src/vendorcode/eltan/security/verified_boot/vboot_check.c @@ -142,7 +142,8 @@ static void verified_boot_check_buffer(const char *name, void *start, size_t siz else hash_algorithm = VB2_HASH_SHA256; - status = cb_sha_little_endian(hash_algorithm, (const uint8_t *)start, size, digest); + status = cb_sha_little_endian(hash_algorithm, (const uint8_t *)start, size, + digest); if ((CONFIG(VENDORCODE_ELTAN_VBOOT) && memcmp((void *)( (uint8_t *)CONFIG_VENDORCODE_ELTAN_OEM_MANIFEST_LOC + sizeof(digest) * hash_index), digest, sizeof(digest))) || status) { @@ -156,7 +157,8 @@ static void verified_boot_check_buffer(const char *name, void *start, size_t siz } else { if (!ENV_BOOTBLOCK && CONFIG(VENDORCODE_ELTAN_MBOOT)) { if (pcr != -1) { - printk(BIOS_DEBUG, "%s: measuring %s\n", __func__, name); + printk(BIOS_DEBUG, "%s: measuring %s\n", __func__, + name); if (measure_item(pcr, digest, sizeof(digest), (int8_t *)name, 0)) printk(BIOS_DEBUG, "%s: measuring failed!\n", |