diff options
| author | Mathieu Trudel-Lapierre <mathieu.trudel-lapierre@canonical.com> | 2017-08-07 17:34:45 -0400 |
|---|---|---|
| committer | Mathieu Trudel-Lapierre <mathieu.trudel-lapierre@canonical.com> | 2017-08-07 17:34:45 -0400 |
| commit | f4173af1ad45a270a5d8b2283f8018582484a553 (patch) | |
| tree | 08a4e5efd254b4acdc3e524f1624e2c6be972e7b /lib/security_policy.c | |
| parent | 62f0afa2ecead02b1258dabab8097ca278a22f8f (diff) | |
| download | efi-boot-shim-f4173af1ad45a270a5d8b2283f8018582484a553.tar.gz efi-boot-shim-f4173af1ad45a270a5d8b2283f8018582484a553.zip | |
New upstream version 12+1501864225.b586175
Diffstat (limited to 'lib/security_policy.c')
| -rw-r--r-- | lib/security_policy.c | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/lib/security_policy.c b/lib/security_policy.c index 9af3a107..53a2580a 100644 --- a/lib/security_policy.c +++ b/lib/security_policy.c @@ -55,14 +55,14 @@ static SecurityHook extra_check = NULL; static EFI_SECURITY_FILE_AUTHENTICATION_STATE esfas = NULL; static EFI_SECURITY2_FILE_AUTHENTICATION es2fa = NULL; -static EFI_STATUS thunk_security_policy_authentication( +extern EFI_STATUS thunk_security_policy_authentication( const EFI_SECURITY_PROTOCOL *This, UINT32 AuthenticationStatus, const EFI_DEVICE_PATH_PROTOCOL *DevicePath ) __attribute__((unused)); -static EFI_STATUS thunk_security2_policy_authentication( +extern EFI_STATUS thunk_security2_policy_authentication( const EFI_SECURITY2_PROTOCOL *This, const EFI_DEVICE_PATH_PROTOCOL *DevicePath, VOID *FileBuffer, @@ -276,11 +276,11 @@ security_policy_install(SecurityHook hook) * If it fails, use security2_protocol == NULL as indicator */ uefi_call_wrapper(BS->LocateProtocol, 3, &SECURITY2_PROTOCOL_GUID, NULL, - &security2_protocol); + (VOID **) &security2_protocol); status = uefi_call_wrapper(BS->LocateProtocol, 3, &SECURITY_PROTOCOL_GUID, NULL, - &security_protocol); + (VOID **) &security_protocol); if (status != EFI_SUCCESS) /* This one is mandatory, so there's a serious problem */ return status; @@ -288,12 +288,12 @@ security_policy_install(SecurityHook hook) if (security2_protocol) { es2fa = security2_protocol->FileAuthentication; security2_protocol->FileAuthentication = - thunk_security2_policy_authentication; + (EFI_SECURITY2_FILE_AUTHENTICATION) thunk_security2_policy_authentication; } esfas = security_protocol->FileAuthenticationState; security_protocol->FileAuthenticationState = - thunk_security_policy_authentication; + (EFI_SECURITY_FILE_AUTHENTICATION_STATE) thunk_security_policy_authentication; if (hook) extra_check = hook; @@ -311,7 +311,7 @@ security_policy_uninstall(void) status = uefi_call_wrapper(BS->LocateProtocol, 3, &SECURITY_PROTOCOL_GUID, NULL, - &security_protocol); + (VOID **) &security_protocol); if (status != EFI_SUCCESS) return status; @@ -328,7 +328,7 @@ security_policy_uninstall(void) status = uefi_call_wrapper(BS->LocateProtocol, 3, &SECURITY2_PROTOCOL_GUID, NULL, - &security2_protocol); + (VOID **) &security2_protocol); if (status != EFI_SUCCESS) return status; |
