MdePkg: Apply uncrustify changes

REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3737

Apply uncrustify changes to .c/.h files in the MdePkg package

Cc: Andrew Fish <afish@apple.com>
Cc: Leif Lindholm <leif@nuviainc.com>
Cc: Michael D Kinney <michael.d.kinney@intel.com>
Signed-off-by: Michael Kubacki <michael.kubacki@microsoft.com>
Reviewed-by: Liming Gao <gaoliming@byosoft.com.cn>
This commit is contained in:
Michael Kubacki
2021-12-05 14:54:05 -08:00
committed by mergify[bot]
parent 1436aea4d5
commit 2f88bd3a12
975 changed files with 55681 additions and 57790 deletions

View File

@@ -114,8 +114,8 @@ typedef enum {
/// SSL2.0 is obsolete and should not be used.
///
typedef struct {
UINT8 Major;
UINT8 Minor;
UINT8 Major;
UINT8 Minor;
} EFI_TLS_VERSION;
///
@@ -134,8 +134,8 @@ typedef enum {
///
#pragma pack (1)
typedef struct {
UINT8 Data1;
UINT8 Data2;
UINT8 Data1;
UINT8 Data2;
} EFI_TLS_CIPHER;
#pragma pack ()
@@ -152,9 +152,9 @@ typedef UINT8 EFI_TLS_COMPRESSION;
///
#pragma pack (1)
typedef struct {
UINT16 ExtensionType;
UINT16 Length;
UINT8 Data[1];
UINT16 ExtensionType;
UINT16 Length;
UINT8 Data[1];
} EFI_TLS_EXTENSION;
#pragma pack ()
@@ -163,17 +163,17 @@ typedef struct {
/// Use either EFI_TLS_VERIFY_NONE or EFI_TLS_VERIFY_PEER, the last two options
/// are 'ORed' with EFI_TLS_VERIFY_PEER if they are desired.
///
typedef UINT32 EFI_TLS_VERIFY;
typedef UINT32 EFI_TLS_VERIFY;
///
/// No certificates will be sent or the TLS/SSL handshake will be continued regardless
/// of the certificate verification result.
///
#define EFI_TLS_VERIFY_NONE 0x0
#define EFI_TLS_VERIFY_NONE 0x0
///
/// The TLS/SSL handshake is immediately terminated with an alert message containing
/// the reason for the certificate verification failure.
///
#define EFI_TLS_VERIFY_PEER 0x1
#define EFI_TLS_VERIFY_PEER 0x1
///
/// EFI_TLS_VERIFY_FAIL_IF_NO_PEER_CERT is only meaningful in the server mode.
/// TLS session will fail if client certificate is absent.
@@ -183,7 +183,7 @@ typedef UINT32 EFI_TLS_VERIFY;
/// TLS session only verify client once, and doesn't request certificate during
/// re-negotiation.
///
#define EFI_TLS_VERIFY_CLIENT_ONCE 0x4
#define EFI_TLS_VERIFY_CLIENT_ONCE 0x4
///
/// EFI_TLS_VERIFY_HOST_FLAG
@@ -193,43 +193,43 @@ typedef UINT32 EFI_TLS_VERIFY_HOST_FLAG;
/// There is no additional flags set for hostname validation.
/// Wildcards are supported and they match only in the left-most label.
///
#define EFI_TLS_VERIFY_FLAG_NONE 0x00
#define EFI_TLS_VERIFY_FLAG_NONE 0x00
///
/// Always check the Subject Distinguished Name (DN) in the peer certificate even if the
/// certificate contains Subject Alternative Name (SAN).
///
#define EFI_TLS_VERIFY_FLAG_ALWAYS_CHECK_SUBJECT 0x01
#define EFI_TLS_VERIFY_FLAG_ALWAYS_CHECK_SUBJECT 0x01
///
/// Disable the match of all wildcards.
///
#define EFI_TLS_VERIFY_FLAG_NO_WILDCARDS 0x02
#define EFI_TLS_VERIFY_FLAG_NO_WILDCARDS 0x02
///
/// Disable the "*" as wildcard in labels that have a prefix or suffix (e.g. "www*" or "*www").
///
#define EFI_TLS_VERIFY_FLAG_NO_PARTIAL_WILDCARDS 0x04
#define EFI_TLS_VERIFY_FLAG_NO_PARTIAL_WILDCARDS 0x04
///
/// Allow the "*" to match more than one labels. Otherwise, only matches a single label.
///
#define EFI_TLS_VERIFY_FLAG_MULTI_LABEL_WILDCARDS 0x08
#define EFI_TLS_VERIFY_FLAG_MULTI_LABEL_WILDCARDS 0x08
///
/// Restrict to only match direct child sub-domains which start with ".".
/// For example, a name of ".example.com" would match "www.example.com" with this flag,
/// but would not match "www.sub.example.com".
///
#define EFI_TLS_VERIFY_FLAG_SINGLE_LABEL_SUBDOMAINS 0x10
#define EFI_TLS_VERIFY_FLAG_SINGLE_LABEL_SUBDOMAINS 0x10
///
/// Never check the Subject Distinguished Name (DN) even there is no
/// Subject Alternative Name (SAN) in the certificate.
///
#define EFI_TLS_VERIFY_FLAG_NEVER_CHECK_SUBJECT 0x20
#define EFI_TLS_VERIFY_FLAG_NEVER_CHECK_SUBJECT 0x20
///
/// EFI_TLS_VERIFY_HOST
///
#pragma pack (1)
typedef struct {
EFI_TLS_VERIFY_HOST_FLAG Flags;
CHAR8 *HostName;
EFI_TLS_VERIFY_HOST_FLAG Flags;
CHAR8 *HostName;
} EFI_TLS_VERIFY_HOST;
#pragma pack ()
@@ -240,8 +240,8 @@ typedef struct {
///
#pragma pack (1)
typedef struct {
UINT32 GmtUnixTime;
UINT8 RandomBytes[28];
UINT32 GmtUnixTime;
UINT8 RandomBytes[28];
} EFI_TLS_RANDOM;
#pragma pack ()
@@ -252,7 +252,7 @@ typedef struct {
///
#pragma pack (1)
typedef struct {
UINT8 Data[48];
UINT8 Data[48];
} EFI_TLS_MASTER_SECRET;
#pragma pack ()
@@ -263,8 +263,8 @@ typedef struct {
#define MAX_TLS_SESSION_ID_LENGTH 32
#pragma pack (1)
typedef struct {
UINT16 Length;
UINT8 Data[MAX_TLS_SESSION_ID_LENGTH];
UINT16 Length;
UINT8 Data[MAX_TLS_SESSION_ID_LENGTH];
} EFI_TLS_SESSION_ID;
#pragma pack ()
@@ -305,7 +305,6 @@ typedef enum {
EfiTlsSessionError,
EfiTlsSessionStateMaximum
} EFI_TLS_SESSION_STATE;
///
@@ -315,11 +314,11 @@ typedef struct {
///
/// Length of data buffer in the fragment.
///
UINT32 FragmentLength;
UINT32 FragmentLength;
///
/// Pointer to the data buffer in the fragment.
///
VOID *FragmentBuffer;
VOID *FragmentBuffer;
} EFI_TLS_FRAGMENT_DATA;
///
@@ -363,7 +362,7 @@ typedef enum {
**/
typedef
EFI_STATUS
(EFIAPI *EFI_TLS_SET_SESSION_DATA) (
(EFIAPI *EFI_TLS_SET_SESSION_DATA)(
IN EFI_TLS_PROTOCOL *This,
IN EFI_TLS_SESSION_DATA_TYPE DataType,
IN VOID *Data,
@@ -395,7 +394,7 @@ EFI_STATUS
**/
typedef
EFI_STATUS
(EFIAPI *EFI_TLS_GET_SESSION_DATA) (
(EFIAPI *EFI_TLS_GET_SESSION_DATA)(
IN EFI_TLS_PROTOCOL *This,
IN EFI_TLS_SESSION_DATA_TYPE DataType,
IN OUT VOID *Data OPTIONAL,
@@ -442,7 +441,7 @@ EFI_STATUS
**/
typedef
EFI_STATUS
(EFIAPI *EFI_TLS_BUILD_RESPONSE_PACKET) (
(EFIAPI *EFI_TLS_BUILD_RESPONSE_PACKET)(
IN EFI_TLS_PROTOCOL *This,
IN UINT8 *RequestBuffer OPTIONAL,
IN UINTN RequestSize OPTIONAL,
@@ -486,7 +485,7 @@ EFI_STATUS
**/
typedef
EFI_STATUS
(EFIAPI *EFI_TLS_PROCESS_PACKET) (
(EFIAPI *EFI_TLS_PROCESS_PACKET)(
IN EFI_TLS_PROTOCOL *This,
IN OUT EFI_TLS_FRAGMENT_DATA **FragmentTable,
IN UINT32 *FragmentCount,
@@ -498,13 +497,13 @@ EFI_STATUS
/// For detail of TLS, please refer to TLS related RFC.
///
struct _EFI_TLS_PROTOCOL {
EFI_TLS_SET_SESSION_DATA SetSessionData;
EFI_TLS_GET_SESSION_DATA GetSessionData;
EFI_TLS_BUILD_RESPONSE_PACKET BuildResponsePacket;
EFI_TLS_PROCESS_PACKET ProcessPacket;
EFI_TLS_SET_SESSION_DATA SetSessionData;
EFI_TLS_GET_SESSION_DATA GetSessionData;
EFI_TLS_BUILD_RESPONSE_PACKET BuildResponsePacket;
EFI_TLS_PROCESS_PACKET ProcessPacket;
};
extern EFI_GUID gEfiTlsServiceBindingProtocolGuid;
extern EFI_GUID gEfiTlsProtocolGuid;
extern EFI_GUID gEfiTlsServiceBindingProtocolGuid;
extern EFI_GUID gEfiTlsProtocolGuid;
#endif // __EFI_TLS_PROTOCOL_H__
#endif // __EFI_TLS_PROTOCOL_H__