mirror of
https://github.com/acidanthera/audk.git
synced 2025-07-30 00:54:06 +02:00
OvmfPkg/EnrollDefaultKeys: clean up acronym capitalization in identifiers
According to the edk2 coding standards, "[w]hen all letters in an acronym are capitalized, it makes the prior and subsequent words visually difficult to distinguish". Fix the spellings of three acronyms, accordingly: - "KEK" (Key Exchange Key) should be written as "Kek", in "mMicrosoftKEK", - "CA" (Certificate Authority) should be written as "Ca", in "mMicrosoftUefiCA", - "PCA" (Production Certificate Authority) should be written as "Pca", in "mMicrosoftPCA". Generate the changes with: sed --regexp-extended --in-place \ --expression='s,\<mMicrosoftKEK\>,mMicrosoftKek,g' \ --expression='s,\<mMicrosoftUefiCA\>,mMicrosoftUefiCa,g' \ --expression='s,\<mMicrosoftPCA\>,mMicrosoftPca,g' \ OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c Cc: Anthony Perard <anthony.perard@citrix.com> Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org> Cc: Jordan Justen <jordan.l.justen@intel.com> Cc: Julien Grall <julien.grall@arm.com> Bugzilla: https://bugzilla.tianocore.org/show_bug.cgi?id=1747 Signed-off-by: Laszlo Ersek <lersek@redhat.com> Reviewed-by: Philippe Mathieu-Daude <philmd@redhat.com> Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org> Reviewed-by: Gary Lin <glin@suse.com>
This commit is contained in:
parent
32d1440aad
commit
e0d612356e
@ -103,7 +103,7 @@ STATIC CONST UINT8 mRedHatPkKek1[] = {
|
|||||||
//
|
//
|
||||||
// "dbx" updates in "dbxtool" are signed with a key derived from this KEK.
|
// "dbx" updates in "dbxtool" are signed with a key derived from this KEK.
|
||||||
//
|
//
|
||||||
STATIC CONST UINT8 mMicrosoftKEK[] = {
|
STATIC CONST UINT8 mMicrosoftKek[] = {
|
||||||
0x30, 0x82, 0x05, 0xe8, 0x30, 0x82, 0x03, 0xd0, 0xa0, 0x03, 0x02, 0x01, 0x02,
|
0x30, 0x82, 0x05, 0xe8, 0x30, 0x82, 0x03, 0xd0, 0xa0, 0x03, 0x02, 0x01, 0x02,
|
||||||
0x02, 0x0a, 0x61, 0x0a, 0xd1, 0x88, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x30,
|
0x02, 0x0a, 0x61, 0x0a, 0xd1, 0x88, 0x00, 0x00, 0x00, 0x00, 0x00, 0x03, 0x30,
|
||||||
0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05,
|
0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05,
|
||||||
@ -230,7 +230,7 @@ STATIC CONST UINT8 mMicrosoftKEK[] = {
|
|||||||
// Windows 8 and Windows Server 2012 R2 boot loaders are signed with a chain
|
// Windows 8 and Windows Server 2012 R2 boot loaders are signed with a chain
|
||||||
// rooted in this certificate.
|
// rooted in this certificate.
|
||||||
//
|
//
|
||||||
STATIC CONST UINT8 mMicrosoftPCA[] = {
|
STATIC CONST UINT8 mMicrosoftPca[] = {
|
||||||
0x30, 0x82, 0x05, 0xd7, 0x30, 0x82, 0x03, 0xbf, 0xa0, 0x03, 0x02, 0x01, 0x02,
|
0x30, 0x82, 0x05, 0xd7, 0x30, 0x82, 0x03, 0xbf, 0xa0, 0x03, 0x02, 0x01, 0x02,
|
||||||
0x02, 0x0a, 0x61, 0x07, 0x76, 0x56, 0x00, 0x00, 0x00, 0x00, 0x00, 0x08, 0x30,
|
0x02, 0x0a, 0x61, 0x07, 0x76, 0x56, 0x00, 0x00, 0x00, 0x00, 0x00, 0x08, 0x30,
|
||||||
0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05,
|
0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05,
|
||||||
@ -355,7 +355,7 @@ STATIC CONST UINT8 mMicrosoftPCA[] = {
|
|||||||
//
|
//
|
||||||
// To verify the "shim" binary and PCI expansion ROMs with.
|
// To verify the "shim" binary and PCI expansion ROMs with.
|
||||||
//
|
//
|
||||||
STATIC CONST UINT8 mMicrosoftUefiCA[] = {
|
STATIC CONST UINT8 mMicrosoftUefiCa[] = {
|
||||||
0x30, 0x82, 0x06, 0x10, 0x30, 0x82, 0x03, 0xf8, 0xa0, 0x03, 0x02, 0x01, 0x02,
|
0x30, 0x82, 0x06, 0x10, 0x30, 0x82, 0x03, 0xf8, 0xa0, 0x03, 0x02, 0x01, 0x02,
|
||||||
0x02, 0x0a, 0x61, 0x08, 0xd3, 0xc4, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, 0x30,
|
0x02, 0x0a, 0x61, 0x08, 0xd3, 0xc4, 0x00, 0x00, 0x00, 0x00, 0x00, 0x04, 0x30,
|
||||||
0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05,
|
0x0d, 0x06, 0x09, 0x2a, 0x86, 0x48, 0x86, 0xf7, 0x0d, 0x01, 0x01, 0x0b, 0x05,
|
||||||
@ -943,8 +943,8 @@ ShellAppMain (
|
|||||||
EFI_IMAGE_SECURITY_DATABASE,
|
EFI_IMAGE_SECURITY_DATABASE,
|
||||||
&gEfiImageSecurityDatabaseGuid,
|
&gEfiImageSecurityDatabaseGuid,
|
||||||
&gEfiCertX509Guid,
|
&gEfiCertX509Guid,
|
||||||
mMicrosoftPCA, sizeof mMicrosoftPCA, &mMicrosoftOwnerGuid,
|
mMicrosoftPca, sizeof mMicrosoftPca, &mMicrosoftOwnerGuid,
|
||||||
mMicrosoftUefiCA, sizeof mMicrosoftUefiCA, &mMicrosoftOwnerGuid,
|
mMicrosoftUefiCa, sizeof mMicrosoftUefiCa, &mMicrosoftOwnerGuid,
|
||||||
NULL);
|
NULL);
|
||||||
if (EFI_ERROR (Status)) {
|
if (EFI_ERROR (Status)) {
|
||||||
return 1;
|
return 1;
|
||||||
@ -965,7 +965,7 @@ ShellAppMain (
|
|||||||
&gEfiGlobalVariableGuid,
|
&gEfiGlobalVariableGuid,
|
||||||
&gEfiCertX509Guid,
|
&gEfiCertX509Guid,
|
||||||
mRedHatPkKek1, sizeof mRedHatPkKek1, &gEfiCallerIdGuid,
|
mRedHatPkKek1, sizeof mRedHatPkKek1, &gEfiCallerIdGuid,
|
||||||
mMicrosoftKEK, sizeof mMicrosoftKEK, &mMicrosoftOwnerGuid,
|
mMicrosoftKek, sizeof mMicrosoftKek, &mMicrosoftOwnerGuid,
|
||||||
NULL);
|
NULL);
|
||||||
if (EFI_ERROR (Status)) {
|
if (EFI_ERROR (Status)) {
|
||||||
return 1;
|
return 1;
|
||||||
|
Loading…
x
Reference in New Issue
Block a user