return 0;
}
- r = efi_stub_measured(LOG_WARNING);
+ r = efi_measured_uki(LOG_WARNING);
if (r < 0)
return r;
if (r == 0) {
}
if (flags & MOUNT_PCRFS) {
- r = efi_stub_measured(LOG_WARNING);
+ r = efi_measured_uki(LOG_WARNING);
if (r == 0)
log_debug("Kernel stub did not measure kernel image into PCR, skipping userspace measurement, too.");
else if (r > 0) {
* assignment, under the assumption that people who are fine to use sd-stub with its PCR
* assignments are also OK with our PCR 15 use here. */
- r = efi_stub_measured(LOG_WARNING);
+ r = efi_measured_uki(LOG_WARNING);
if (r == 0)
log_debug("Will not measure volume key of volume '%s', not booted via systemd-stub with measurements enabled.", id);
else if (r > 0) {
length = strlen(word);
/* Skip logic if sd-stub is not used, after all PCR 11 might have a very different purpose then. */
- r = efi_stub_measured(LOG_ERR);
+ r = efi_measured_uki(LOG_ERR);
if (r < 0)
return r;
if (r == 0) {
return 0;
}
-int efi_stub_measured(int log_level) {
+int efi_measured_uki(int log_level) {
_cleanup_free_ char *pcr_string = NULL;
unsigned pcr_nr;
int r;
int efi_loader_get_features(uint64_t *ret);
int efi_stub_get_features(uint64_t *ret);
-int efi_stub_measured(int log_level);
+int efi_measured_uki(int log_level);
int efi_loader_get_config_timeout_one_shot(usec_t *ret);
int efi_loader_update_entry_one_shot_cache(char **cache, struct stat *cache_stat);
return -EOPNOTSUPP;
}
-static inline int efi_stub_measured(int log_level) {
+static inline int efi_measured_uki(int log_level) {
return log_full_errno(log_level, SYNTHETIC_ERRNO(EOPNOTSUPP),
"Compiled without support for EFI");
}