From mboxrd@z Thu Jan 1 00:00:00 1970 Authentication-Results: mx.groups.io; dkim=missing; spf=pass (domain: redhat.com, ip: 209.132.183.28, mailfrom: lersek@redhat.com) Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by groups.io with SMTP; Fri, 26 Apr 2019 17:53:51 -0700 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 5C7112FE543; Sat, 27 Apr 2019 00:53:51 +0000 (UTC) Received: from lacos-laptop-7.usersys.redhat.com (ovpn-121-104.rdu2.redhat.com [10.10.121.104]) by smtp.corp.redhat.com (Postfix) with ESMTP id 310815D70A; Sat, 27 Apr 2019 00:53:48 +0000 (UTC) From: "Laszlo Ersek" To: edk2-devel-groups-io Cc: Anthony Perard , Ard Biesheuvel , Jordan Justen , Julien Grall Subject: [PATCH 05/16] OvmfPkg/EnrollDefaultKeys: clean up minor whitespace wart Date: Sat, 27 Apr 2019 02:53:17 +0200 Message-Id: <20190427005328.27005-6-lersek@redhat.com> In-Reply-To: <20190427005328.27005-1-lersek@redhat.com> References: <20190427005328.27005-1-lersek@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.29]); Sat, 27 Apr 2019 00:53:51 +0000 (UTC) Content-Transfer-Encoding: quoted-printable In edk2, we should spell "#pragma pack(...)" with a space character in front of the opening parenthesis. Fix up locations that suggest otherwise= . Cc: Anthony Perard Cc: Ard Biesheuvel Cc: Jordan Justen Cc: Julien Grall Bugzilla: https://bugzilla.tianocore.org/show_bug.cgi?id=3D1747 Signed-off-by: Laszlo Ersek --- OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c b/OvmfPkg/Enro= llDefaultKeys/EnrollDefaultKeys.c index b354ec6f81c8..aa827ac6aa81 100644 --- a/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c +++ b/OvmfPkg/EnrollDefaultKeys/EnrollDefaultKeys.c @@ -596,17 +596,17 @@ STATIC CONST EFI_GUID mMicrosoftOwnerGuid =3D { // }; | // // Given that the "struct hack" invokes undefined behavior (which is why= C99 // introduced the flexible array member), and because subtracting those = pesky // sizes of 1 is annoying, and because the format is fully specified in = the // UEFI specification, we'll introduce two matching convenience structur= es that // are customized for our X.509 purposes. // -#pragma pack(1) +#pragma pack (1) typedef struct { EFI_TIME TimeStamp; =20 // // dwLength covers data below // UINT32 dwLength; UINT16 wRevision; @@ -627,17 +627,17 @@ typedef struct { // SignatureSize covers data below // EFI_GUID SignatureOwner; =20 // // X.509 certificate follows // } REPEATING_HEADER; -#pragma pack() +#pragma pack () =20 /** Enroll a set of certificates in a global variable, overwriting it. =20 The variable will be rewritten with NV+BS+RT+AT attributes. =20 @param[in] VariableName The name of the variable to overwrite. =20 --=20 2.19.1.3.g30247aa5d201