MdePkg: Trim trailing whitespaces for ESRT related files
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Hao Wu <hao.a.wu@intel.com> Reviewed-by: Liming Gao <liming.gao@intel.com> Reviewed-by: Chao Zhang <chao.b.zhang@intel.com> git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@17236 6f19259b-4bc3-4df7-8a09-765794883524
This commit is contained in:
parent
2ca32f8d90
commit
6e746540c3
@ -39,7 +39,7 @@ typedef struct _EFI_FIRMWARE_MANAGEMENT_PROTOCOL EFI_FIRMWARE_MANAGEMENT_PROTOCO
|
||||
///
|
||||
typedef struct {
|
||||
///
|
||||
/// A unique number identifying the firmware image within the device. The number is
|
||||
/// A unique number identifying the firmware image within the device. The number is
|
||||
/// between 1 and DescriptorCount.
|
||||
///
|
||||
UINT8 ImageIndex;
|
||||
@ -65,24 +65,24 @@ typedef struct {
|
||||
///
|
||||
CHAR16 *VersionName;
|
||||
///
|
||||
/// Size of the image in bytes. If size=0, then only ImageIndex and ImageTypeId are valid.
|
||||
/// Size of the image in bytes. If size=0, then only ImageIndex and ImageTypeId are valid.
|
||||
///
|
||||
UINTN Size;
|
||||
///
|
||||
/// Image attributes that are supported by this device. See 'Image Attribute Definitions'
|
||||
/// for possible returned values of this parameter. A value of 1 indicates the attribute is
|
||||
/// supported and the current setting value is indicated in AttributesSetting. A
|
||||
/// Image attributes that are supported by this device. See 'Image Attribute Definitions'
|
||||
/// for possible returned values of this parameter. A value of 1 indicates the attribute is
|
||||
/// supported and the current setting value is indicated in AttributesSetting. A
|
||||
/// value of 0 indicates the attribute is not supported and the current setting value in
|
||||
/// AttributesSetting is meaningless.
|
||||
///
|
||||
UINT64 AttributesSupported;
|
||||
///
|
||||
/// Image attributes. See 'Image Attribute Definitions' for possible returned values of
|
||||
/// Image attributes. See 'Image Attribute Definitions' for possible returned values of
|
||||
/// this parameter.
|
||||
///
|
||||
UINT64 AttributesSetting;
|
||||
///
|
||||
/// Image compatibilities. See 'Image Compatibility Definitions' for possible returned
|
||||
/// Image compatibilities. See 'Image Compatibility Definitions' for possible returned
|
||||
/// values of this parameter.
|
||||
///
|
||||
UINT64 Compatibilities;
|
||||
@ -130,7 +130,7 @@ typedef struct {
|
||||
#define IMAGE_ATTRIBUTE_IMAGE_UPDATABLE 0x0000000000000001
|
||||
///
|
||||
/// The attribute IMAGE_ATTRIBUTE_RESET_REQUIRED indicates a reset of the device is required
|
||||
/// for the new firmware image to take effect after a firmware update. The device is the device hosting
|
||||
/// for the new firmware image to take effect after a firmware update. The device is the device hosting
|
||||
/// the firmware image.
|
||||
///
|
||||
#define IMAGE_ATTRIBUTE_RESET_REQUIRED 0x0000000000000002
|
||||
@ -171,13 +171,13 @@ typedef struct {
|
||||
///
|
||||
typedef struct {
|
||||
///
|
||||
/// It is included in the signature of AuthInfo. It is used to ensure freshness/no replay.
|
||||
/// It is included in the signature of AuthInfo. It is used to ensure freshness/no replay.
|
||||
/// It is incremented during each firmware image operation.
|
||||
///
|
||||
UINT64 MonotonicCount;
|
||||
///
|
||||
/// Provides the authorization for the firmware image operations. It is a signature across
|
||||
/// the image data and the Monotonic Count value. Caller uses the private key that is
|
||||
/// Provides the authorization for the firmware image operations. It is a signature across
|
||||
/// the image data and the Monotonic Count value. Caller uses the private key that is
|
||||
/// associated with a public key that has been provisioned via the key exchange.
|
||||
/// Because this is defined as a signature, WIN_CERTIFICATE_UEFI_GUID.CertType must
|
||||
/// be EFI_CERT_TYPE_PKCS7_GUID.
|
||||
@ -342,17 +342,17 @@ EFI_STATUS
|
||||
If the firmware image is updatable, the function should perform the following minimal validations
|
||||
before proceeding to do the firmware image update.
|
||||
- Validate the image authentication if image has attribute
|
||||
IMAGE_ATTRIBUTE_AUTHENTICATION_REQUIRED. The function returns
|
||||
IMAGE_ATTRIBUTE_AUTHENTICATION_REQUIRED. The function returns
|
||||
EFI_SECURITY_VIOLATION if the validation fails.
|
||||
- Validate the image is a supported image for this device. The function returns EFI_ABORTED if
|
||||
the image is unsupported. The function can optionally provide more detailed information on
|
||||
- Validate the image is a supported image for this device. The function returns EFI_ABORTED if
|
||||
the image is unsupported. The function can optionally provide more detailed information on
|
||||
why the image is not a supported image.
|
||||
- Validate the data from VendorCode if not null. Image validation must be performed before
|
||||
VendorCode data validation. VendorCode data is ignored or considered invalid if image
|
||||
validation failed. The function returns EFI_ABORTED if the data is invalid.
|
||||
- Validate the data from VendorCode if not null. Image validation must be performed before
|
||||
VendorCode data validation. VendorCode data is ignored or considered invalid if image
|
||||
validation failed. The function returns EFI_ABORTED if the data is invalid.
|
||||
|
||||
VendorCode enables vendor to implement vendor-specific firmware image update policy. Null if
|
||||
the caller did not specify the policy or use the default policy. As an example, vendor can implement
|
||||
VendorCode enables vendor to implement vendor-specific firmware image update policy. Null if
|
||||
the caller did not specify the policy or use the default policy. As an example, vendor can implement
|
||||
a policy to allow an option to force a firmware image update when the abort reason is due to the new
|
||||
firmware image version is older than the current firmware image version or bad image checksum.
|
||||
Sensitive operations such as those wiping the entire firmware image and render the device to be
|
||||
|
Loading…
x
Reference in New Issue
Block a user