From 1436aea4d5707e672672a11bda72be2c63c936c3 Mon Sep 17 00:00:00 2001 From: Michael Kubacki Date: Sun, 5 Dec 2021 14:54:02 -0800 Subject: MdeModulePkg: Apply uncrustify changes REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3737 Apply uncrustify changes to .c/.h files in the MdeModulePkg package Cc: Andrew Fish Cc: Leif Lindholm Cc: Michael D Kinney Signed-off-by: Michael Kubacki Reviewed-by: Liming Gao --- MdeModulePkg/Include/Library/AuthVariableLib.h | 58 ++++---- MdeModulePkg/Include/Library/BootLogoLib.h | 13 +- MdeModulePkg/Include/Library/CapsuleLib.h | 16 +-- .../Include/Library/CpuExceptionHandlerLib.h | 46 +++--- .../Include/Library/CustomizedDisplayLib.h | 49 +++---- MdeModulePkg/Include/Library/DebugAgentLib.h | 33 +++-- .../Include/Library/FmpAuthenticationLib.h | 2 - MdeModulePkg/Include/Library/HiiLib.h | 12 +- MdeModulePkg/Include/Library/IpmiLib.h | 13 +- MdeModulePkg/Include/Library/LockBoxLib.h | 28 ++-- MdeModulePkg/Include/Library/MemoryProfileLib.h | 12 +- .../Include/Library/OemHookStatusCodeLib.h | 10 +- MdeModulePkg/Include/Library/PciHostBridgeLib.h | 69 ++++----- .../Include/Library/PlatformBootManagerLib.h | 3 +- MdeModulePkg/Include/Library/PlatformHookLib.h | 1 - .../Include/Library/PlatformVarCleanupLib.h | 5 +- MdeModulePkg/Include/Library/ResetSystemLib.h | 12 +- MdeModulePkg/Include/Library/ResetUtilityLib.h | 19 +-- .../Include/Library/SecurityManagementLib.h | 34 ++--- .../Include/Library/SmmCorePlatformHookLib.h | 1 - MdeModulePkg/Include/Library/SortLib.h | 22 +-- MdeModulePkg/Include/Library/TpmMeasurementLib.h | 12 +- MdeModulePkg/Include/Library/UefiBootManagerLib.h | 157 ++++++++++----------- MdeModulePkg/Include/Library/VarCheckLib.h | 36 ++--- .../Include/Library/VariablePolicyHelperLib.h | 39 +++-- MdeModulePkg/Include/Library/VariablePolicyLib.h | 28 ++-- 26 files changed, 355 insertions(+), 375 deletions(-) (limited to 'MdeModulePkg/Include/Library') diff --git a/MdeModulePkg/Include/Library/AuthVariableLib.h b/MdeModulePkg/Include/Library/AuthVariableLib.h index 76a8c8bd50..37aceba699 100644 --- a/MdeModulePkg/Include/Library/AuthVariableLib.h +++ b/MdeModulePkg/Include/Library/AuthVariableLib.h @@ -14,25 +14,25 @@ SPDX-License-Identifier: BSD-2-Clause-Patent /// /// Size of AuthInfo prior to the data payload. /// -#define AUTHINFO_SIZE ((OFFSET_OF (EFI_VARIABLE_AUTHENTICATION, AuthInfo)) + \ +#define AUTHINFO_SIZE ((OFFSET_OF (EFI_VARIABLE_AUTHENTICATION, AuthInfo)) +\ (OFFSET_OF (WIN_CERTIFICATE_UEFI_GUID, CertData)) + \ sizeof (EFI_CERT_BLOCK_RSA_2048_SHA256)) -#define AUTHINFO2_SIZE(VarAuth2) ((OFFSET_OF (EFI_VARIABLE_AUTHENTICATION_2, AuthInfo)) + \ +#define AUTHINFO2_SIZE(VarAuth2) ((OFFSET_OF (EFI_VARIABLE_AUTHENTICATION_2, AuthInfo)) +\ (UINTN) ((EFI_VARIABLE_AUTHENTICATION_2 *) (VarAuth2))->AuthInfo.Hdr.dwLength) -#define OFFSET_OF_AUTHINFO2_CERT_DATA ((OFFSET_OF (EFI_VARIABLE_AUTHENTICATION_2, AuthInfo)) + \ +#define OFFSET_OF_AUTHINFO2_CERT_DATA ((OFFSET_OF (EFI_VARIABLE_AUTHENTICATION_2, AuthInfo)) +\ (OFFSET_OF (WIN_CERTIFICATE_UEFI_GUID, CertData))) typedef struct { - CHAR16 *VariableName; - EFI_GUID *VendorGuid; - UINT32 Attributes; - UINTN DataSize; - VOID *Data; - UINT32 PubKeyIndex; - UINT64 MonotonicCount; - EFI_TIME *TimeStamp; + CHAR16 *VariableName; + EFI_GUID *VendorGuid; + UINT32 Attributes; + UINTN DataSize; + VOID *Data; + UINT32 PubKeyIndex; + UINT64 MonotonicCount; + EFI_TIME *TimeStamp; } AUTH_VARIABLE_INFO; /** @@ -55,7 +55,7 @@ typedef struct { **/ typedef EFI_STATUS -(EFIAPI *AUTH_VAR_LIB_FIND_VARIABLE) ( +(EFIAPI *AUTH_VAR_LIB_FIND_VARIABLE)( IN CHAR16 *VariableName, IN EFI_GUID *VendorGuid, OUT AUTH_VARIABLE_INFO *AuthVariableInfo @@ -81,7 +81,7 @@ EFI_STATUS **/ typedef EFI_STATUS -(EFIAPI *AUTH_VAR_LIB_FIND_NEXT_VARIABLE) ( +(EFIAPI *AUTH_VAR_LIB_FIND_NEXT_VARIABLE)( IN CHAR16 *VariableName, IN EFI_GUID *VendorGuid, OUT AUTH_VARIABLE_INFO *AuthVariableInfo @@ -101,7 +101,7 @@ EFI_STATUS **/ typedef EFI_STATUS -(EFIAPI *AUTH_VAR_LIB_UPDATE_VARIABLE) ( +(EFIAPI *AUTH_VAR_LIB_UPDATE_VARIABLE)( IN AUTH_VARIABLE_INFO *AuthVariableInfo ); @@ -119,7 +119,7 @@ EFI_STATUS **/ typedef EFI_STATUS -(EFIAPI *AUTH_VAR_LIB_GET_SCRATCH_BUFFER) ( +(EFIAPI *AUTH_VAR_LIB_GET_SCRATCH_BUFFER)( IN OUT UINTN *ScratchBufferSize, OUT VOID **ScratchBuffer ); @@ -145,7 +145,7 @@ EFI_STATUS **/ typedef BOOLEAN -(EFIAPI *AUTH_VAR_LIB_CHECK_REMAINING_SPACE) ( +(EFIAPI *AUTH_VAR_LIB_CHECK_REMAINING_SPACE)( IN UINT32 Attributes, ... ); @@ -159,7 +159,7 @@ BOOLEAN **/ typedef BOOLEAN -(EFIAPI *AUTH_VAR_LIB_AT_RUNTIME) ( +(EFIAPI *AUTH_VAR_LIB_AT_RUNTIME)( VOID ); @@ -183,21 +183,21 @@ typedef struct { AUTH_VAR_LIB_AT_RUNTIME AtRuntime; } AUTH_VAR_LIB_CONTEXT_IN; -#define AUTH_VAR_LIB_CONTEXT_OUT_STRUCT_VERSION 0x01 +#define AUTH_VAR_LIB_CONTEXT_OUT_STRUCT_VERSION 0x01 typedef struct { - UINTN StructVersion; - UINTN StructSize; + UINTN StructVersion; + UINTN StructSize; // // Caller needs to set variable property for the variables. // - VARIABLE_ENTRY_PROPERTY *AuthVarEntry; - UINTN AuthVarEntryCount; + VARIABLE_ENTRY_PROPERTY *AuthVarEntry; + UINTN AuthVarEntryCount; // // Caller needs to ConvertPointer() for the pointers. // - VOID ***AddressPointer; - UINTN AddressPointerCount; + VOID ***AddressPointer; + UINTN AddressPointerCount; } AUTH_VAR_LIB_CONTEXT_OUT; /** @@ -244,11 +244,11 @@ AuthVariableLibInitialize ( EFI_STATUS EFIAPI AuthVariableLibProcessVariable ( - IN CHAR16 *VariableName, - IN EFI_GUID *VendorGuid, - IN VOID *Data, - IN UINTN DataSize, - IN UINT32 Attributes + IN CHAR16 *VariableName, + IN EFI_GUID *VendorGuid, + IN VOID *Data, + IN UINTN DataSize, + IN UINT32 Attributes ); #endif diff --git a/MdeModulePkg/Include/Library/BootLogoLib.h b/MdeModulePkg/Include/Library/BootLogoLib.h index afd895b257..2d6209a278 100644 --- a/MdeModulePkg/Include/Library/BootLogoLib.h +++ b/MdeModulePkg/Include/Library/BootLogoLib.h @@ -22,7 +22,6 @@ BootLogoEnableLogo ( VOID ); - /** Use SystemTable ConOut to turn on video based Simple Text Out consoles. The Simple Text Out screens will now be synced up with all non-video output devices. @@ -53,12 +52,12 @@ BootLogoDisableLogo ( EFI_STATUS EFIAPI BootLogoUpdateProgress ( - IN EFI_GRAPHICS_OUTPUT_BLT_PIXEL TitleForeground, - IN EFI_GRAPHICS_OUTPUT_BLT_PIXEL TitleBackground, - IN CHAR16 *Title, - IN EFI_GRAPHICS_OUTPUT_BLT_PIXEL ProgressColor, - IN UINTN Progress, - IN UINTN PreviousValue + IN EFI_GRAPHICS_OUTPUT_BLT_PIXEL TitleForeground, + IN EFI_GRAPHICS_OUTPUT_BLT_PIXEL TitleBackground, + IN CHAR16 *Title, + IN EFI_GRAPHICS_OUTPUT_BLT_PIXEL ProgressColor, + IN UINTN Progress, + IN UINTN PreviousValue ); #endif diff --git a/MdeModulePkg/Include/Library/CapsuleLib.h b/MdeModulePkg/Include/Library/CapsuleLib.h index 0f41642576..92904ebfb6 100644 --- a/MdeModulePkg/Include/Library/CapsuleLib.h +++ b/MdeModulePkg/Include/Library/CapsuleLib.h @@ -13,7 +13,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent // // BOOLEAN Variable to indicate whether system is in the capsule on disk state. // -#define COD_RELOCATION_INFO_VAR_NAME L"CodRelocationInfo" +#define COD_RELOCATION_INFO_VAR_NAME L"CodRelocationInfo" /** The firmware checks whether the capsule image is supported @@ -30,7 +30,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent EFI_STATUS EFIAPI SupportCapsuleImage ( - IN EFI_CAPSULE_HEADER *CapsuleHeader + IN EFI_CAPSULE_HEADER *CapsuleHeader ); /** @@ -47,7 +47,7 @@ SupportCapsuleImage ( EFI_STATUS EFIAPI ProcessCapsuleImage ( - IN EFI_CAPSULE_HEADER *CapsuleHeader + IN EFI_CAPSULE_HEADER *CapsuleHeader ); /** @@ -96,7 +96,7 @@ ProcessCapsules ( **/ BOOLEAN EFIAPI -CoDCheckCapsuleOnDiskFlag( +CoDCheckCapsuleOnDiskFlag ( VOID ); @@ -108,7 +108,7 @@ CoDCheckCapsuleOnDiskFlag( **/ EFI_STATUS EFIAPI -CoDClearCapsuleOnDiskFlag( +CoDClearCapsuleOnDiskFlag ( VOID ); @@ -136,8 +136,8 @@ CoDClearCapsuleOnDiskFlag( **/ EFI_STATUS EFIAPI -CoDRelocateCapsule( - UINTN MaxRetry +CoDRelocateCapsule ( + UINTN MaxRetry ); /** @@ -154,7 +154,7 @@ CoDRelocateCapsule( EFI_STATUS EFIAPI CoDRemoveTempFile ( - UINTN MaxRetry + UINTN MaxRetry ); #endif diff --git a/MdeModulePkg/Include/Library/CpuExceptionHandlerLib.h b/MdeModulePkg/Include/Library/CpuExceptionHandlerLib.h index 2c18dacf5c..22a4408f9f 100644 --- a/MdeModulePkg/Include/Library/CpuExceptionHandlerLib.h +++ b/MdeModulePkg/Include/Library/CpuExceptionHandlerLib.h @@ -13,70 +13,70 @@ #include #include -#define CPU_EXCEPTION_INIT_DATA_REV 1 +#define CPU_EXCEPTION_INIT_DATA_REV 1 typedef union { struct { // // Revision number of this structure. // - UINT32 Revision; + UINT32 Revision; // // The address of top of known good stack reserved for *ALL* exceptions // listed in field StackSwitchExceptions. // - UINTN KnownGoodStackTop; + UINTN KnownGoodStackTop; // // The size of known good stack for *ONE* exception only. // - UINTN KnownGoodStackSize; + UINTN KnownGoodStackSize; // // Buffer of exception vector list for stack switch. // - UINT8 *StackSwitchExceptions; + UINT8 *StackSwitchExceptions; // // Number of exception vectors in StackSwitchExceptions. // - UINTN StackSwitchExceptionNumber; + UINTN StackSwitchExceptionNumber; // // Buffer of IDT table. It must be type of IA32_IDT_GATE_DESCRIPTOR. // Normally there's no need to change IDT table size. // - VOID *IdtTable; + VOID *IdtTable; // // Size of buffer for IdtTable. // - UINTN IdtTableSize; + UINTN IdtTableSize; // // Buffer of GDT table. It must be type of IA32_SEGMENT_DESCRIPTOR. // - VOID *GdtTable; + VOID *GdtTable; // // Size of buffer for GdtTable. // - UINTN GdtTableSize; + UINTN GdtTableSize; // // Pointer to start address of descriptor of exception task gate in the // GDT table. It must be type of IA32_TSS_DESCRIPTOR. // - VOID *ExceptionTssDesc; + VOID *ExceptionTssDesc; // // Size of buffer for ExceptionTssDesc. // - UINTN ExceptionTssDescSize; + UINTN ExceptionTssDescSize; // // Buffer of task-state segment for exceptions. It must be type of // IA32_TASK_STATE_SEGMENT. // - VOID *ExceptionTss; + VOID *ExceptionTss; // // Size of buffer for ExceptionTss. // - UINTN ExceptionTssSize; + UINTN ExceptionTssSize; // // Flag to indicate if default handlers should be initialized or not. // - BOOLEAN InitDefaultHandlers; + BOOLEAN InitDefaultHandlers; } Ia32, X64; } CPU_EXCEPTION_INIT_DATA; @@ -99,7 +99,7 @@ typedef union { EFI_STATUS EFIAPI InitializeCpuExceptionHandlers ( - IN EFI_VECTOR_HANDOFF_INFO *VectorInfo OPTIONAL + IN EFI_VECTOR_HANDOFF_INFO *VectorInfo OPTIONAL ); /** @@ -128,8 +128,8 @@ InitializeCpuExceptionHandlers ( EFI_STATUS EFIAPI InitializeCpuExceptionHandlersEx ( - IN EFI_VECTOR_HANDOFF_INFO *VectorInfo OPTIONAL, - IN CPU_EXCEPTION_INIT_DATA *InitData OPTIONAL + IN EFI_VECTOR_HANDOFF_INFO *VectorInfo OPTIONAL, + IN CPU_EXCEPTION_INIT_DATA *InitData OPTIONAL ); /** @@ -151,7 +151,7 @@ InitializeCpuExceptionHandlersEx ( EFI_STATUS EFIAPI InitializeCpuInterruptHandlers ( - IN EFI_VECTOR_HANDOFF_INFO *VectorInfo OPTIONAL + IN EFI_VECTOR_HANDOFF_INFO *VectorInfo OPTIONAL ); /** @@ -180,8 +180,8 @@ InitializeCpuInterruptHandlers ( EFI_STATUS EFIAPI RegisterCpuInterruptHandler ( - IN EFI_EXCEPTION_TYPE InterruptType, - IN EFI_CPU_INTERRUPT_HANDLER InterruptHandler + IN EFI_EXCEPTION_TYPE InterruptType, + IN EFI_CPU_INTERRUPT_HANDLER InterruptHandler ); /** @@ -193,8 +193,8 @@ RegisterCpuInterruptHandler ( VOID EFIAPI DumpCpuContext ( - IN EFI_EXCEPTION_TYPE ExceptionType, - IN EFI_SYSTEM_CONTEXT SystemContext + IN EFI_EXCEPTION_TYPE ExceptionType, + IN EFI_SYSTEM_CONTEXT SystemContext ); #endif diff --git a/MdeModulePkg/Include/Library/CustomizedDisplayLib.h b/MdeModulePkg/Include/Library/CustomizedDisplayLib.h index 8898350d6b..0607dd1a61 100644 --- a/MdeModulePkg/Include/Library/CustomizedDisplayLib.h +++ b/MdeModulePkg/Include/Library/CustomizedDisplayLib.h @@ -45,8 +45,8 @@ Statement EFI_STATUS EFIAPI DisplayPageFrame ( - IN FORM_DISPLAY_ENGINE_FORM *FormData, - OUT EFI_SCREEN_DESCRIPTOR *ScreenForStatement + IN FORM_DISPLAY_ENGINE_FORM *FormData, + OUT EFI_SCREEN_DESCRIPTOR *ScreenForStatement ); /** @@ -70,9 +70,9 @@ ClearDisplayPage ( VOID EFIAPI RefreshKeyHelp ( - IN FORM_DISPLAY_ENGINE_FORM *FormData, - IN FORM_DISPLAY_ENGINE_STATEMENT *Statement, - IN BOOLEAN Selected + IN FORM_DISPLAY_ENGINE_FORM *FormData, + IN FORM_DISPLAY_ENGINE_STATEMENT *Statement, + IN BOOLEAN Selected ); /** @@ -87,8 +87,8 @@ RefreshKeyHelp ( VOID EFIAPI UpdateStatusBar ( - IN UINTN MessageType, - IN BOOLEAN State + IN UINTN MessageType, + IN BOOLEAN State ); /** @@ -147,12 +147,13 @@ FormExitPolicy ( UINT64 EFIAPI FormExitTimeout ( - IN FORM_DISPLAY_ENGINE_FORM *FormData + IN FORM_DISPLAY_ENGINE_FORM *FormData ); // // Print Functions // + /** Prints a unicode string to the default console, at the supplied cursor position, using L"%s" format. @@ -167,12 +168,11 @@ FormExitTimeout ( UINTN EFIAPI PrintStringAt ( - IN UINTN Column, - IN UINTN Row, - IN CHAR16 *String + IN UINTN Column, + IN UINTN Row, + IN CHAR16 *String ); - /** Prints a unicode string with the specified width to the default console, at the supplied cursor position, using L"%s" format. @@ -189,10 +189,10 @@ PrintStringAt ( UINTN EFIAPI PrintStringAtWithWidth ( - IN UINTN Column, - IN UINTN Row, - IN CHAR16 *String, - IN UINTN Width + IN UINTN Column, + IN UINTN Row, + IN CHAR16 *String, + IN UINTN Width ); /** @@ -209,9 +209,9 @@ PrintStringAtWithWidth ( UINTN EFIAPI PrintCharAt ( - IN UINTN Column, - IN UINTN Row, - CHAR16 Character + IN UINTN Column, + IN UINTN Row, + CHAR16 Character ); /** @@ -227,16 +227,17 @@ PrintCharAt ( VOID EFIAPI ClearLines ( - IN UINTN LeftColumn, - IN UINTN RightColumn, - IN UINTN TopRow, - IN UINTN BottomRow, - IN UINTN TextAttribute + IN UINTN LeftColumn, + IN UINTN RightColumn, + IN UINTN TopRow, + IN UINTN BottomRow, + IN UINTN TextAttribute ); // // Color Setting Functions // + /** Get OEM/Vendor specific popup attribute colors. diff --git a/MdeModulePkg/Include/Library/DebugAgentLib.h b/MdeModulePkg/Include/Library/DebugAgentLib.h index 262a156b76..f44bc5c563 100644 --- a/MdeModulePkg/Include/Library/DebugAgentLib.h +++ b/MdeModulePkg/Include/Library/DebugAgentLib.h @@ -9,25 +9,25 @@ SPDX-License-Identifier: BSD-2-Clause-Patent #ifndef __DEBUG_AGENT_LIB_H__ #define __DEBUG_AGENT_LIB_H__ -#define DEBUG_AGENT_INIT_PREMEM_SEC 1 -#define DEBUG_AGENT_INIT_POSTMEM_SEC 2 -#define DEBUG_AGENT_INIT_DXE_CORE 3 -#define DEBUG_AGENT_INIT_SMM 4 -#define DEBUG_AGENT_INIT_ENTER_SMI 5 -#define DEBUG_AGENT_INIT_EXIT_SMI 6 -#define DEBUG_AGENT_INIT_S3 7 -#define DEBUG_AGENT_INIT_DXE_AP 8 -#define DEBUG_AGENT_INIT_PEI 9 -#define DEBUG_AGENT_INIT_DXE_LOAD 10 -#define DEBUG_AGENT_INIT_DXE_UNLOAD 11 -#define DEBUG_AGENT_INIT_THUNK_PEI_IA32TOX64 12 +#define DEBUG_AGENT_INIT_PREMEM_SEC 1 +#define DEBUG_AGENT_INIT_POSTMEM_SEC 2 +#define DEBUG_AGENT_INIT_DXE_CORE 3 +#define DEBUG_AGENT_INIT_SMM 4 +#define DEBUG_AGENT_INIT_ENTER_SMI 5 +#define DEBUG_AGENT_INIT_EXIT_SMI 6 +#define DEBUG_AGENT_INIT_S3 7 +#define DEBUG_AGENT_INIT_DXE_AP 8 +#define DEBUG_AGENT_INIT_PEI 9 +#define DEBUG_AGENT_INIT_DXE_LOAD 10 +#define DEBUG_AGENT_INIT_DXE_UNLOAD 11 +#define DEBUG_AGENT_INIT_THUNK_PEI_IA32TOX64 12 // // Context for DEBUG_AGENT_INIT_POSTMEM_SEC // typedef struct { - UINTN HeapMigrateOffset; - UINTN StackMigrateOffset; + UINTN HeapMigrateOffset; + UINTN StackMigrateOffset; } DEBUG_AGENT_CONTEXT_POSTMEM_SEC; /** @@ -40,11 +40,10 @@ typedef struct { **/ typedef VOID -(EFIAPI * DEBUG_AGENT_CONTINUE)( +(EFIAPI *DEBUG_AGENT_CONTINUE)( IN VOID *Context ); - /** Initialize debug agent. @@ -91,7 +90,7 @@ InitializeDebugAgent ( BOOLEAN EFIAPI SaveAndSetDebugTimerInterrupt ( - IN BOOLEAN EnableStatus + IN BOOLEAN EnableStatus ); #endif diff --git a/MdeModulePkg/Include/Library/FmpAuthenticationLib.h b/MdeModulePkg/Include/Library/FmpAuthenticationLib.h index 480e6a101c..7b07b13984 100644 --- a/MdeModulePkg/Include/Library/FmpAuthenticationLib.h +++ b/MdeModulePkg/Include/Library/FmpAuthenticationLib.h @@ -6,7 +6,6 @@ SPDX-License-Identifier: BSD-2-Clause-Patent **/ - #ifndef __FMP_AUTHENTICATION_LIB_H__ #define __FMP_AUTHENTICATION_LIB_H__ @@ -57,4 +56,3 @@ AuthenticateFmpImage ( ); #endif - diff --git a/MdeModulePkg/Include/Library/HiiLib.h b/MdeModulePkg/Include/Library/HiiLib.h index 5d16358412..2439cd0472 100644 --- a/MdeModulePkg/Include/Library/HiiLib.h +++ b/MdeModulePkg/Include/Library/HiiLib.h @@ -71,7 +71,7 @@ HiiAddPackages ( VOID EFIAPI HiiRemovePackages ( - IN EFI_HII_HANDLE HiiHandle + IN EFI_HII_HANDLE HiiHandle ) ; @@ -269,10 +269,10 @@ HiiGetHiiHandles ( **/ EFI_STATUS EFIAPI -HiiGetFormSetFromHiiHandle( - IN EFI_HII_HANDLE Handle, - OUT EFI_IFR_FORM_SET **Buffer, - OUT UINTN *BufferSize +HiiGetFormSetFromHiiHandle ( + IN EFI_HII_HANDLE Handle, + OUT EFI_IFR_FORM_SET **Buffer, + OUT UINTN *BufferSize ); /** @@ -296,7 +296,7 @@ HiiGetFormSetFromHiiHandle( CHAR8 * EFIAPI HiiGetSupportedLanguages ( - IN EFI_HII_HANDLE HiiHandle + IN EFI_HII_HANDLE HiiHandle ) ; diff --git a/MdeModulePkg/Include/Library/IpmiLib.h b/MdeModulePkg/Include/Library/IpmiLib.h index 4b5c11bcfe..d3129d230b 100644 --- a/MdeModulePkg/Include/Library/IpmiLib.h +++ b/MdeModulePkg/Include/Library/IpmiLib.h @@ -12,7 +12,6 @@ SPDX-License-Identifier: BSD-2-Clause-Patent #include #include - /** This service enables submitting commands via Ipmi. @@ -34,12 +33,12 @@ SPDX-License-Identifier: BSD-2-Clause-Patent EFI_STATUS EFIAPI IpmiSubmitCommand ( - IN UINT8 NetFunction, - IN UINT8 Command, - IN UINT8 *RequestData, - IN UINT32 RequestDataSize, - OUT UINT8 *ResponseData, - IN OUT UINT32 *ResponseDataSize + IN UINT8 NetFunction, + IN UINT8 Command, + IN UINT8 *RequestData, + IN UINT32 RequestDataSize, + OUT UINT8 *ResponseData, + IN OUT UINT32 *ResponseDataSize ); #endif diff --git a/MdeModulePkg/Include/Library/LockBoxLib.h b/MdeModulePkg/Include/Library/LockBoxLib.h index cab50da527..ab0eb942d3 100644 --- a/MdeModulePkg/Include/Library/LockBoxLib.h +++ b/MdeModulePkg/Include/Library/LockBoxLib.h @@ -29,9 +29,9 @@ SPDX-License-Identifier: BSD-2-Clause-Patent RETURN_STATUS EFIAPI SaveLockBox ( - IN GUID *Guid, - IN VOID *Buffer, - IN UINTN Length + IN GUID *Guid, + IN VOID *Buffer, + IN UINTN Length ); /** @@ -50,22 +50,22 @@ SaveLockBox ( RETURN_STATUS EFIAPI SetLockBoxAttributes ( - IN GUID *Guid, - IN UINT64 Attributes + IN GUID *Guid, + IN UINT64 Attributes ); // // With this flag, this LockBox can be restored to this Buffer // with RestoreAllLockBoxInPlace() // -#define LOCK_BOX_ATTRIBUTE_RESTORE_IN_PLACE BIT0 +#define LOCK_BOX_ATTRIBUTE_RESTORE_IN_PLACE BIT0 // // With this flag, this LockBox can be restored in S3 resume only. // This LockBox can not be restored after SmmReadyToLock in normal boot // and after EndOfS3Resume in S3 resume. // It can not be set together with LOCK_BOX_ATTRIBUTE_RESTORE_IN_PLACE. // -#define LOCK_BOX_ATTRIBUTE_RESTORE_IN_S3_ONLY BIT1 +#define LOCK_BOX_ATTRIBUTE_RESTORE_IN_S3_ONLY BIT1 /** This function will update confidential information to lockbox. @@ -89,10 +89,10 @@ SetLockBoxAttributes ( RETURN_STATUS EFIAPI UpdateLockBox ( - IN GUID *Guid, - IN UINTN Offset, - IN VOID *Buffer, - IN UINTN Length + IN GUID *Guid, + IN UINTN Offset, + IN VOID *Buffer, + IN UINTN Length ); /** @@ -116,9 +116,9 @@ UpdateLockBox ( RETURN_STATUS EFIAPI RestoreLockBox ( - IN GUID *Guid, - IN VOID *Buffer OPTIONAL, - IN OUT UINTN *Length OPTIONAL + IN GUID *Guid, + IN VOID *Buffer OPTIONAL, + IN OUT UINTN *Length OPTIONAL ); /** diff --git a/MdeModulePkg/Include/Library/MemoryProfileLib.h b/MdeModulePkg/Include/Library/MemoryProfileLib.h index beb637e1a6..f87f245158 100644 --- a/MdeModulePkg/Include/Library/MemoryProfileLib.h +++ b/MdeModulePkg/Include/Library/MemoryProfileLib.h @@ -36,12 +36,12 @@ EFI_STATUS EFIAPI MemoryProfileLibRecord ( - IN PHYSICAL_ADDRESS CallerAddress, - IN MEMORY_PROFILE_ACTION Action, - IN EFI_MEMORY_TYPE MemoryType, - IN VOID *Buffer, - IN UINTN Size, - IN CHAR8 *ActionString OPTIONAL + IN PHYSICAL_ADDRESS CallerAddress, + IN MEMORY_PROFILE_ACTION Action, + IN EFI_MEMORY_TYPE MemoryType, + IN VOID *Buffer, + IN UINTN Size, + IN CHAR8 *ActionString OPTIONAL ); #endif diff --git a/MdeModulePkg/Include/Library/OemHookStatusCodeLib.h b/MdeModulePkg/Include/Library/OemHookStatusCodeLib.h index 9aeff52b81..c12f61f4f9 100644 --- a/MdeModulePkg/Include/Library/OemHookStatusCodeLib.h +++ b/MdeModulePkg/Include/Library/OemHookStatusCodeLib.h @@ -62,11 +62,11 @@ OemHookStatusCodeInitialize ( EFI_STATUS EFIAPI OemHookStatusCodeReport ( - IN EFI_STATUS_CODE_TYPE CodeType, - IN EFI_STATUS_CODE_VALUE Value, - IN UINT32 Instance, - IN EFI_GUID *CallerId OPTIONAL, - IN EFI_STATUS_CODE_DATA *Data OPTIONAL + IN EFI_STATUS_CODE_TYPE CodeType, + IN EFI_STATUS_CODE_VALUE Value, + IN UINT32 Instance, + IN EFI_GUID *CallerId OPTIONAL, + IN EFI_STATUS_CODE_DATA *Data OPTIONAL ); #endif // __OEM_HOOK_STATUSCODE_LIB__ diff --git a/MdeModulePkg/Include/Library/PciHostBridgeLib.h b/MdeModulePkg/Include/Library/PciHostBridgeLib.h index 1606589354..54b5a14243 100644 --- a/MdeModulePkg/Include/Library/PciHostBridgeLib.h +++ b/MdeModulePkg/Include/Library/PciHostBridgeLib.h @@ -6,6 +6,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent **/ + #ifndef __PCI_HOST_BRIDGE_LIB_H__ #define __PCI_HOST_BRIDGE_LIB_H__ @@ -17,8 +18,8 @@ typedef struct { // Base and Limit are the device address instead of host address when // Translation is not zero // - UINT64 Base; - UINT64 Limit; + UINT64 Base; + UINT64 Limit; // // According to UEFI 2.7, Device Address = Host Address + Translation, // so Translation = Device Address - Host Address. @@ -33,36 +34,36 @@ typedef struct { // situation and makes the current resource allocation code in generic PCI // host bridge driver still work. // - UINT64 Translation; + UINT64 Translation; } PCI_ROOT_BRIDGE_APERTURE; typedef struct { - UINT32 Segment; ///< Segment number. - UINT64 Supports; ///< Supported attributes. - ///< Refer to EFI_PCI_ATTRIBUTE_xxx used by GetAttributes() - ///< and SetAttributes() in EFI_PCI_ROOT_BRIDGE_IO_PROTOCOL. - UINT64 Attributes; ///< Initial attributes. - ///< Refer to EFI_PCI_ATTRIBUTE_xxx used by GetAttributes() - ///< and SetAttributes() in EFI_PCI_ROOT_BRIDGE_IO_PROTOCOL. - BOOLEAN DmaAbove4G; ///< DMA above 4GB memory. - ///< Set to TRUE when root bridge supports DMA above 4GB memory. - BOOLEAN NoExtendedConfigSpace; ///< When FALSE, the root bridge supports - ///< Extended (4096-byte) Configuration Space. - ///< When TRUE, the root bridge supports - ///< 256-byte Configuration Space only. - BOOLEAN ResourceAssigned; ///< Resource assignment status of the root bridge. - ///< Set to TRUE if Bus/IO/MMIO resources for root bridge have been assigned. - UINT64 AllocationAttributes; ///< Allocation attributes. - ///< Refer to EFI_PCI_HOST_BRIDGE_COMBINE_MEM_PMEM and - ///< EFI_PCI_HOST_BRIDGE_MEM64_DECODE used by GetAllocAttributes() - ///< in EFI_PCI_HOST_BRIDGE_RESOURCE_ALLOCATION_PROTOCOL. - PCI_ROOT_BRIDGE_APERTURE Bus; ///< Bus aperture which can be used by the root bridge. - PCI_ROOT_BRIDGE_APERTURE Io; ///< IO aperture which can be used by the root bridge. - PCI_ROOT_BRIDGE_APERTURE Mem; ///< MMIO aperture below 4GB which can be used by the root bridge. - PCI_ROOT_BRIDGE_APERTURE MemAbove4G; ///< MMIO aperture above 4GB which can be used by the root bridge. - PCI_ROOT_BRIDGE_APERTURE PMem; ///< Prefetchable MMIO aperture below 4GB which can be used by the root bridge. - PCI_ROOT_BRIDGE_APERTURE PMemAbove4G; ///< Prefetchable MMIO aperture above 4GB which can be used by the root bridge. - EFI_DEVICE_PATH_PROTOCOL *DevicePath; ///< Device path. + UINT32 Segment; ///< Segment number. + UINT64 Supports; ///< Supported attributes. + ///< Refer to EFI_PCI_ATTRIBUTE_xxx used by GetAttributes() + ///< and SetAttributes() in EFI_PCI_ROOT_BRIDGE_IO_PROTOCOL. + UINT64 Attributes; ///< Initial attributes. + ///< Refer to EFI_PCI_ATTRIBUTE_xxx used by GetAttributes() + ///< and SetAttributes() in EFI_PCI_ROOT_BRIDGE_IO_PROTOCOL. + BOOLEAN DmaAbove4G; ///< DMA above 4GB memory. + ///< Set to TRUE when root bridge supports DMA above 4GB memory. + BOOLEAN NoExtendedConfigSpace; ///< When FALSE, the root bridge supports + ///< Extended (4096-byte) Configuration Space. + ///< When TRUE, the root bridge supports + ///< 256-byte Configuration Space only. + BOOLEAN ResourceAssigned; ///< Resource assignment status of the root bridge. + ///< Set to TRUE if Bus/IO/MMIO resources for root bridge have been assigned. + UINT64 AllocationAttributes; ///< Allocation attributes. + ///< Refer to EFI_PCI_HOST_BRIDGE_COMBINE_MEM_PMEM and + ///< EFI_PCI_HOST_BRIDGE_MEM64_DECODE used by GetAllocAttributes() + ///< in EFI_PCI_HOST_BRIDGE_RESOURCE_ALLOCATION_PROTOCOL. + PCI_ROOT_BRIDGE_APERTURE Bus; ///< Bus aperture which can be used by the root bridge. + PCI_ROOT_BRIDGE_APERTURE Io; ///< IO aperture which can be used by the root bridge. + PCI_ROOT_BRIDGE_APERTURE Mem; ///< MMIO aperture below 4GB which can be used by the root bridge. + PCI_ROOT_BRIDGE_APERTURE MemAbove4G; ///< MMIO aperture above 4GB which can be used by the root bridge. + PCI_ROOT_BRIDGE_APERTURE PMem; ///< Prefetchable MMIO aperture below 4GB which can be used by the root bridge. + PCI_ROOT_BRIDGE_APERTURE PMemAbove4G; ///< Prefetchable MMIO aperture above 4GB which can be used by the root bridge. + EFI_DEVICE_PATH_PROTOCOL *DevicePath; ///< Device path. } PCI_ROOT_BRIDGE; /** @@ -77,7 +78,7 @@ typedef struct { PCI_ROOT_BRIDGE * EFIAPI PciHostBridgeGetRootBridges ( - UINTN *Count + UINTN *Count ); /** @@ -89,8 +90,8 @@ PciHostBridgeGetRootBridges ( VOID EFIAPI PciHostBridgeFreeRootBridges ( - PCI_ROOT_BRIDGE *Bridges, - UINTN Count + PCI_ROOT_BRIDGE *Bridges, + UINTN Count ); /** @@ -108,8 +109,8 @@ PciHostBridgeFreeRootBridges ( VOID EFIAPI PciHostBridgeResourceConflict ( - EFI_HANDLE HostBridgeHandle, - VOID *Configuration + EFI_HANDLE HostBridgeHandle, + VOID *Configuration ); #endif diff --git a/MdeModulePkg/Include/Library/PlatformBootManagerLib.h b/MdeModulePkg/Include/Library/PlatformBootManagerLib.h index 5d3062e9dd..9dd590c9e0 100644 --- a/MdeModulePkg/Include/Library/PlatformBootManagerLib.h +++ b/MdeModulePkg/Include/Library/PlatformBootManagerLib.h @@ -7,7 +7,6 @@ SPDX-License-Identifier: BSD-2-Clause-Patent **/ - #ifndef __PLATFORM_BOOT_MANAGER_LIB_H_ #define __PLATFORM_BOOT_MANAGER_LIB_H_ #include @@ -50,7 +49,7 @@ PlatformBootManagerAfterConsole ( VOID EFIAPI PlatformBootManagerWaitCallback ( - UINT16 TimeoutRemain + UINT16 TimeoutRemain ); /** diff --git a/MdeModulePkg/Include/Library/PlatformHookLib.h b/MdeModulePkg/Include/Library/PlatformHookLib.h index bc80355704..04cccd9bba 100644 --- a/MdeModulePkg/Include/Library/PlatformHookLib.h +++ b/MdeModulePkg/Include/Library/PlatformHookLib.h @@ -29,4 +29,3 @@ PlatformHookSerialPortInitialize ( ); #endif // __PLATFORM_HOOK_LIB__ - diff --git a/MdeModulePkg/Include/Library/PlatformVarCleanupLib.h b/MdeModulePkg/Include/Library/PlatformVarCleanupLib.h index bf0ad06be7..ac530ff867 100644 --- a/MdeModulePkg/Include/Library/PlatformVarCleanupLib.h +++ b/MdeModulePkg/Include/Library/PlatformVarCleanupLib.h @@ -48,9 +48,8 @@ GetLastBootVarErrorFlag ( EFI_STATUS EFIAPI PlatformVarCleanup ( - IN VAR_ERROR_FLAG Flag, - IN VAR_CLEANUP_TYPE Type + IN VAR_ERROR_FLAG Flag, + IN VAR_CLEANUP_TYPE Type ); #endif - diff --git a/MdeModulePkg/Include/Library/ResetSystemLib.h b/MdeModulePkg/Include/Library/ResetSystemLib.h index 09ee14540c..472a9355ea 100644 --- a/MdeModulePkg/Include/Library/ResetSystemLib.h +++ b/MdeModulePkg/Include/Library/ResetSystemLib.h @@ -65,8 +65,8 @@ ResetShutdown ( VOID EFIAPI ResetPlatformSpecific ( - IN UINTN DataSize, - IN VOID *ResetData + IN UINTN DataSize, + IN VOID *ResetData ); /** @@ -84,10 +84,10 @@ ResetPlatformSpecific ( VOID EFIAPI ResetSystem ( - IN EFI_RESET_TYPE ResetType, - IN EFI_STATUS ResetStatus, - IN UINTN DataSize, - IN VOID *ResetData OPTIONAL + IN EFI_RESET_TYPE ResetType, + IN EFI_STATUS ResetStatus, + IN UINTN DataSize, + IN VOID *ResetData OPTIONAL ); #endif diff --git a/MdeModulePkg/Include/Library/ResetUtilityLib.h b/MdeModulePkg/Include/Library/ResetUtilityLib.h index 656703e782..27aca52490 100644 --- a/MdeModulePkg/Include/Library/ResetUtilityLib.h +++ b/MdeModulePkg/Include/Library/ResetUtilityLib.h @@ -7,6 +7,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent **/ + #ifndef _RESET_UTILITY_LIB_H_ #define _RESET_UTILITY_LIB_H_ @@ -32,8 +33,8 @@ VOID EFIAPI ResetSystemWithSubtype ( - IN EFI_RESET_TYPE ResetType, - IN CONST GUID *ResetSubtype + IN EFI_RESET_TYPE ResetType, + IN CONST GUID *ResetSubtype ); /** @@ -55,7 +56,7 @@ ResetSystemWithSubtype ( VOID EFIAPI ResetPlatformSpecificGuid ( - IN CONST GUID *ResetSubtype + IN CONST GUID *ResetSubtype ); /** @@ -119,12 +120,12 @@ GetResetPlatformSpecificGuid ( RETURN_STATUS EFIAPI BuildResetData ( - IN OUT UINTN *ResetDataSize, - IN OUT VOID *ResetData, - IN CONST GUID *ResetSubtype OPTIONAL, - IN CONST CHAR16 *ResetString OPTIONAL, - IN UINTN ExtraDataSize OPTIONAL, - IN CONST VOID *ExtraData OPTIONAL + IN OUT UINTN *ResetDataSize, + IN OUT VOID *ResetData, + IN CONST GUID *ResetSubtype OPTIONAL, + IN CONST CHAR16 *ResetString OPTIONAL, + IN UINTN ExtraDataSize OPTIONAL, + IN CONST VOID *ExtraData OPTIONAL ); #endif // _RESET_UTILITY_LIB_H_ diff --git a/MdeModulePkg/Include/Library/SecurityManagementLib.h b/MdeModulePkg/Include/Library/SecurityManagementLib.h index 8efe3117c7..e10a4cdd02 100644 --- a/MdeModulePkg/Include/Library/SecurityManagementLib.h +++ b/MdeModulePkg/Include/Library/SecurityManagementLib.h @@ -14,11 +14,11 @@ SPDX-License-Identifier: BSD-2-Clause-Patent // // Authentication Operation defintions for User Identity (UID), Measured and Secure boot. // -#define EFI_AUTH_OPERATION_NONE 0x00 -#define EFI_AUTH_OPERATION_VERIFY_IMAGE 0x01 -#define EFI_AUTH_OPERATION_DEFER_IMAGE_LOAD 0x02 -#define EFI_AUTH_OPERATION_MEASURE_IMAGE 0x04 -#define EFI_AUTH_OPERATION_CONNECT_POLICY 0x08 +#define EFI_AUTH_OPERATION_NONE 0x00 +#define EFI_AUTH_OPERATION_VERIFY_IMAGE 0x01 +#define EFI_AUTH_OPERATION_DEFER_IMAGE_LOAD 0x02 +#define EFI_AUTH_OPERATION_MEASURE_IMAGE 0x04 +#define EFI_AUTH_OPERATION_CONNECT_POLICY 0x08 // // Authentication State Operation will check the authentication status of a file. // @@ -27,7 +27,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent /// /// Image buffer is required by the security handler. /// -#define EFI_AUTH_OPERATION_IMAGE_REQUIRED 0x80000000 +#define EFI_AUTH_OPERATION_IMAGE_REQUIRED 0x80000000 /** The security handler is used to abstract platform-specific policy @@ -141,8 +141,8 @@ RegisterSecurityHandler ( EFI_STATUS EFIAPI ExecuteSecurityHandlers ( - IN UINT32 AuthenticationStatus, - IN CONST EFI_DEVICE_PATH_PROTOCOL *FilePath + IN UINT32 AuthenticationStatus, + IN CONST EFI_DEVICE_PATH_PROTOCOL *FilePath ); /** @@ -184,7 +184,7 @@ ExecuteSecurityHandlers ( **/ typedef EFI_STATUS -(EFIAPI *SECURITY2_FILE_AUTHENTICATION_HANDLER) ( +(EFIAPI *SECURITY2_FILE_AUTHENTICATION_HANDLER)( IN UINT32 AuthenticationStatus, IN CONST EFI_DEVICE_PATH_PROTOCOL *File, IN VOID *FileBuffer, @@ -210,8 +210,8 @@ EFI_STATUS EFI_STATUS EFIAPI RegisterSecurity2Handler ( - IN SECURITY2_FILE_AUTHENTICATION_HANDLER Security2Handler, - IN UINT32 AuthenticationOperation + IN SECURITY2_FILE_AUTHENTICATION_HANDLER Security2Handler, + IN UINT32 AuthenticationOperation ); /** @@ -259,12 +259,12 @@ RegisterSecurity2Handler ( EFI_STATUS EFIAPI ExecuteSecurity2Handlers ( - IN UINT32 AuthenticationOperation, - IN UINT32 AuthenticationStatus, - IN CONST EFI_DEVICE_PATH_PROTOCOL *File OPTIONAL, - IN VOID *FileBuffer, - IN UINTN FileSize, - IN BOOLEAN BootPolicy + IN UINT32 AuthenticationOperation, + IN UINT32 AuthenticationStatus, + IN CONST EFI_DEVICE_PATH_PROTOCOL *File OPTIONAL, + IN VOID *FileBuffer, + IN UINTN FileSize, + IN BOOLEAN BootPolicy ); #endif diff --git a/MdeModulePkg/Include/Library/SmmCorePlatformHookLib.h b/MdeModulePkg/Include/Library/SmmCorePlatformHookLib.h index ca4180aa26..6a76c1de39 100644 --- a/MdeModulePkg/Include/Library/SmmCorePlatformHookLib.h +++ b/MdeModulePkg/Include/Library/SmmCorePlatformHookLib.h @@ -25,7 +25,6 @@ PlatformHookBeforeSmmDispatch ( VOID ); - /** Performs platform specific tasks after invoking registered SMI handlers. diff --git a/MdeModulePkg/Include/Library/SortLib.h b/MdeModulePkg/Include/Library/SortLib.h index 70789709a7..8d5045fc7f 100644 --- a/MdeModulePkg/Include/Library/SortLib.h +++ b/MdeModulePkg/Include/Library/SortLib.h @@ -5,6 +5,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent **/ + #ifndef __SORT_LIB_H__ #define __SORT_LIB_H__ @@ -46,13 +47,12 @@ INTN VOID EFIAPI PerformQuickSort ( - IN OUT VOID *BufferToSort, - IN CONST UINTN Count, - IN CONST UINTN ElementSize, - IN SORT_COMPARE CompareFunction + IN OUT VOID *BufferToSort, + IN CONST UINTN Count, + IN CONST UINTN ElementSize, + IN SORT_COMPARE CompareFunction ); - /** Function to compare 2 device paths for use as CompareFunction. @@ -66,8 +66,8 @@ PerformQuickSort ( INTN EFIAPI DevicePathCompare ( - IN CONST VOID *Buffer1, - IN CONST VOID *Buffer2 + IN CONST VOID *Buffer1, + IN CONST VOID *Buffer2 ); /** @@ -83,8 +83,8 @@ DevicePathCompare ( INTN EFIAPI StringNoCaseCompare ( - IN CONST VOID *Buffer1, - IN CONST VOID *Buffer2 + IN CONST VOID *Buffer1, + IN CONST VOID *Buffer2 ); /** @@ -100,8 +100,8 @@ StringNoCaseCompare ( INTN EFIAPI StringCompare ( - IN CONST VOID *Buffer1, - IN CONST VOID *Buffer2 + IN CONST VOID *Buffer1, + IN CONST VOID *Buffer2 ); #endif //__SORT_LIB_H__ diff --git a/MdeModulePkg/Include/Library/TpmMeasurementLib.h b/MdeModulePkg/Include/Library/TpmMeasurementLib.h index ddf6723f03..a38072b5bd 100644 --- a/MdeModulePkg/Include/Library/TpmMeasurementLib.h +++ b/MdeModulePkg/Include/Library/TpmMeasurementLib.h @@ -27,12 +27,12 @@ SPDX-License-Identifier: BSD-2-Clause-Patent EFI_STATUS EFIAPI TpmMeasureAndLogData ( - IN UINT32 PcrIndex, - IN UINT32 EventType, - IN VOID *EventLog, - IN UINT32 LogLen, - IN VOID *HashData, - IN UINT64 HashDataLen + IN UINT32 PcrIndex, + IN UINT32 EventType, + IN VOID *EventLog, + IN UINT32 LogLen, + IN VOID *HashData, + IN UINT64 HashDataLen ); #endif diff --git a/MdeModulePkg/Include/Library/UefiBootManagerLib.h b/MdeModulePkg/Include/Library/UefiBootManagerLib.h index 41a4c2b498..34e217707e 100644 --- a/MdeModulePkg/Include/Library/UefiBootManagerLib.h +++ b/MdeModulePkg/Include/Library/UefiBootManagerLib.h @@ -7,7 +7,6 @@ SPDX-License-Identifier: BSD-2-Clause-Patent **/ - #ifndef _UEFI_BOOT_MANAGER_LIB_H_ #define _UEFI_BOOT_MANAGER_LIB_H_ @@ -30,7 +29,7 @@ typedef enum { } EFI_BOOT_MANAGER_LOAD_OPTION_TYPE; typedef enum { - LoadOptionNumberMax = 0x10000, + LoadOptionNumberMax = 0x10000, LoadOptionNumberUnassigned = LoadOptionNumberMax } EFI_BOOT_MANAGER_LOAD_OPTION_NUMBER; @@ -41,21 +40,21 @@ typedef struct { // // Data read from UEFI NV variables // - UINTN OptionNumber; // #### numerical value, could be LoadOptionNumberUnassigned - EFI_BOOT_MANAGER_LOAD_OPTION_TYPE OptionType; // LoadOptionTypeBoot or LoadOptionTypeDriver - UINT32 Attributes; // Load Option Attributes - CHAR16 *Description; // Load Option Description - EFI_DEVICE_PATH_PROTOCOL *FilePath; // Load Option Device Path - UINT8 *OptionalData; // Load Option optional data to pass into image - UINT32 OptionalDataSize; // Load Option size of OptionalData - EFI_GUID VendorGuid; + UINTN OptionNumber; // #### numerical value, could be LoadOptionNumberUnassigned + EFI_BOOT_MANAGER_LOAD_OPTION_TYPE OptionType; // LoadOptionTypeBoot or LoadOptionTypeDriver + UINT32 Attributes; // Load Option Attributes + CHAR16 *Description; // Load Option Description + EFI_DEVICE_PATH_PROTOCOL *FilePath; // Load Option Device Path + UINT8 *OptionalData; // Load Option optional data to pass into image + UINT32 OptionalDataSize; // Load Option size of OptionalData + EFI_GUID VendorGuid; // // Used at runtime // - EFI_STATUS Status; // Status returned from boot attempt gBS->StartImage () - CHAR16 *ExitData; // Exit data returned from gBS->StartImage () - UINTN ExitDataSize; // Size of ExitData + EFI_STATUS Status; // Status returned from boot attempt gBS->StartImage () + CHAR16 *ExitData; // Exit data returned from gBS->StartImage () + UINTN ExitDataSize; // Size of ExitData } EFI_BOOT_MANAGER_LOAD_OPTION; /** @@ -73,8 +72,8 @@ typedef struct { EFI_BOOT_MANAGER_LOAD_OPTION * EFIAPI EfiBootManagerGetLoadOptions ( - OUT UINTN *LoadOptionCount, - IN EFI_BOOT_MANAGER_LOAD_OPTION_TYPE LoadOptionType + OUT UINTN *LoadOptionCount, + IN EFI_BOOT_MANAGER_LOAD_OPTION_TYPE LoadOptionType ); /** @@ -111,14 +110,14 @@ EfiBootManagerFreeLoadOptions ( EFI_STATUS EFIAPI EfiBootManagerInitializeLoadOption ( - IN OUT EFI_BOOT_MANAGER_LOAD_OPTION *Option, - IN UINTN OptionNumber, - IN EFI_BOOT_MANAGER_LOAD_OPTION_TYPE OptionType, - IN UINT32 Attributes, - IN CHAR16 *Description, - IN EFI_DEVICE_PATH_PROTOCOL *FilePath, - IN UINT8 *OptionalData, - IN UINT32 OptionalDataSize + IN OUT EFI_BOOT_MANAGER_LOAD_OPTION *Option, + IN UINTN OptionNumber, + IN EFI_BOOT_MANAGER_LOAD_OPTION_TYPE OptionType, + IN UINT32 Attributes, + IN CHAR16 *Description, + IN EFI_DEVICE_PATH_PROTOCOL *FilePath, + IN UINT8 *OptionalData, + IN UINT32 OptionalDataSize ); /** @@ -151,8 +150,8 @@ EfiBootManagerFreeLoadOption ( EFI_STATUS EFIAPI EfiBootManagerVariableToLoadOption ( - IN CHAR16 *VariableName, - IN OUT EFI_BOOT_MANAGER_LOAD_OPTION *LoadOption + IN CHAR16 *VariableName, + IN OUT EFI_BOOT_MANAGER_LOAD_OPTION *LoadOption ); /** @@ -166,7 +165,7 @@ EfiBootManagerVariableToLoadOption ( EFI_STATUS EFIAPI EfiBootManagerLoadOptionToVariable ( - IN CONST EFI_BOOT_MANAGER_LOAD_OPTION *LoadOption + IN CONST EFI_BOOT_MANAGER_LOAD_OPTION *LoadOption ); /** @@ -192,8 +191,8 @@ EfiBootManagerLoadOptionToVariable ( EFI_STATUS EFIAPI EfiBootManagerAddLoadOptionVariable ( - IN OUT EFI_BOOT_MANAGER_LOAD_OPTION *Option, - IN UINTN Position + IN OUT EFI_BOOT_MANAGER_LOAD_OPTION *Option, + IN UINTN Position ); /** @@ -224,8 +223,8 @@ EfiBootManagerDeleteLoadOptionVariable ( VOID EFIAPI EfiBootManagerSortLoadOptionVariable ( - IN EFI_BOOT_MANAGER_LOAD_OPTION_TYPE OptionType, - IN SORT_COMPARE CompareFunction + IN EFI_BOOT_MANAGER_LOAD_OPTION_TYPE OptionType, + IN SORT_COMPARE CompareFunction ); /** @@ -244,9 +243,9 @@ EfiBootManagerSortLoadOptionVariable ( INTN EFIAPI EfiBootManagerFindLoadOption ( - IN CONST EFI_BOOT_MANAGER_LOAD_OPTION *Key, - IN CONST EFI_BOOT_MANAGER_LOAD_OPTION *Array, - IN UINTN Count + IN CONST EFI_BOOT_MANAGER_LOAD_OPTION *Key, + IN CONST EFI_BOOT_MANAGER_LOAD_OPTION *Array, + IN UINTN Count ); // @@ -261,25 +260,25 @@ typedef struct { /// /// Specifies options about how the key will be processed. /// - EFI_BOOT_KEY_DATA KeyData; + EFI_BOOT_KEY_DATA KeyData; /// /// The CRC-32 which should match the CRC-32 of the entire EFI_LOAD_OPTION to /// which BootOption refers. If the CRC-32s do not match this value, then this key /// option is ignored. /// - UINT32 BootOptionCrc; + UINT32 BootOptionCrc; /// /// The Boot#### option which will be invoked if this key is pressed and the boot option /// is active (LOAD_OPTION_ACTIVE is set). /// - UINT16 BootOption; + UINT16 BootOption; /// /// The key codes to compare against those returned by the /// EFI_SIMPLE_TEXT_INPUT and EFI_SIMPLE_TEXT_INPUT_EX protocols. /// The number of key codes (0-3) is specified by the EFI_KEY_CODE_COUNT field in KeyOptions. /// - EFI_INPUT_KEY Keys[3]; - UINT16 OptionNumber; + EFI_INPUT_KEY Keys[3]; + UINT16 OptionNumber; } EFI_BOOT_MANAGER_KEY_OPTION; #pragma pack() @@ -294,18 +293,18 @@ typedef struct { EFI_STATUS EFIAPI EfiBootManagerStartHotkeyService ( - IN EFI_EVENT *HotkeyTriggered + IN EFI_EVENT *HotkeyTriggered ); // // Modifier for EfiBootManagerAddKeyOptionVariable and EfiBootManagerDeleteKeyOptionVariable // -#define EFI_BOOT_MANAGER_SHIFT_PRESSED 0x00000001 -#define EFI_BOOT_MANAGER_CONTROL_PRESSED 0x00000002 -#define EFI_BOOT_MANAGER_ALT_PRESSED 0x00000004 -#define EFI_BOOT_MANAGER_LOGO_PRESSED 0x00000008 -#define EFI_BOOT_MANAGER_MENU_KEY_PRESSED 0x00000010 -#define EFI_BOOT_MANAGER_SYS_REQ_PRESSED 0x00000020 +#define EFI_BOOT_MANAGER_SHIFT_PRESSED 0x00000001 +#define EFI_BOOT_MANAGER_CONTROL_PRESSED 0x00000002 +#define EFI_BOOT_MANAGER_ALT_PRESSED 0x00000004 +#define EFI_BOOT_MANAGER_LOGO_PRESSED 0x00000008 +#define EFI_BOOT_MANAGER_MENU_KEY_PRESSED 0x00000010 +#define EFI_BOOT_MANAGER_SYS_REQ_PRESSED 0x00000020 /** Add the key option. @@ -322,9 +321,9 @@ EfiBootManagerStartHotkeyService ( EFI_STATUS EFIAPI EfiBootManagerAddKeyOptionVariable ( - OUT EFI_BOOT_MANAGER_KEY_OPTION *AddedOption OPTIONAL, - IN UINT16 BootOptionNumber, - IN UINT32 Modifier, + OUT EFI_BOOT_MANAGER_KEY_OPTION *AddedOption OPTIONAL, + IN UINT16 BootOptionNumber, + IN UINT32 Modifier, ... ); @@ -341,8 +340,8 @@ EfiBootManagerAddKeyOptionVariable ( EFI_STATUS EFIAPI EfiBootManagerDeleteKeyOptionVariable ( - IN EFI_BOOT_MANAGER_KEY_OPTION *DeletedOption OPTIONAL, - IN UINT32 Modifier, + IN EFI_BOOT_MANAGER_KEY_OPTION *DeletedOption OPTIONAL, + IN UINT32 Modifier, ... ); @@ -360,7 +359,7 @@ EfiBootManagerDeleteKeyOptionVariable ( EFI_STATUS EFIAPI EfiBootManagerRegisterContinueKeyOption ( - IN UINT32 Modifier, + IN UINT32 Modifier, ... ); @@ -372,6 +371,7 @@ EFIAPI EfiBootManagerHotkeyBoot ( VOID ); + // // Boot Manager boot library functions. // @@ -436,7 +436,7 @@ EfiBootManagerBoot ( EFI_STATUS EFIAPI EfiBootManagerGetBootManagerMenu ( - EFI_BOOT_MANAGER_LOAD_OPTION *BootOption + EFI_BOOT_MANAGER_LOAD_OPTION *BootOption ); /** @@ -456,8 +456,8 @@ EfiBootManagerGetBootManagerMenu ( EFI_DEVICE_PATH_PROTOCOL * EFIAPI EfiBootManagerGetNextLoadOptionDevicePath ( - IN EFI_DEVICE_PATH_PROTOCOL *FilePath, - IN EFI_DEVICE_PATH_PROTOCOL *FullPath + IN EFI_DEVICE_PATH_PROTOCOL *FilePath, + IN EFI_DEVICE_PATH_PROTOCOL *FullPath ); /** @@ -475,9 +475,9 @@ EfiBootManagerGetNextLoadOptionDevicePath ( VOID * EFIAPI EfiBootManagerGetLoadOptionBuffer ( - IN EFI_DEVICE_PATH_PROTOCOL *FilePath, - OUT EFI_DEVICE_PATH_PROTOCOL **FullPath, - OUT UINTN *FileSize + IN EFI_DEVICE_PATH_PROTOCOL *FilePath, + OUT EFI_DEVICE_PATH_PROTOCOL **FullPath, + OUT UINTN *FileSize ); /** @@ -486,7 +486,7 @@ EfiBootManagerGetLoadOptionBuffer ( **/ typedef VOID -(EFIAPI *EFI_BOOT_MANAGER_REFRESH_LEGACY_BOOT_OPTION) ( +(EFIAPI *EFI_BOOT_MANAGER_REFRESH_LEGACY_BOOT_OPTION)( VOID ); @@ -495,7 +495,7 @@ VOID **/ typedef VOID -(EFIAPI *EFI_BOOT_MANAGER_LEGACY_BOOT) ( +(EFIAPI *EFI_BOOT_MANAGER_LEGACY_BOOT)( IN EFI_BOOT_MANAGER_LOAD_OPTION *BootOption ); @@ -508,8 +508,8 @@ VOID VOID EFIAPI EfiBootManagerRegisterLegacyBootSupport ( - EFI_BOOT_MANAGER_REFRESH_LEGACY_BOOT_OPTION RefreshLegacyBootOption, - EFI_BOOT_MANAGER_LEGACY_BOOT LegacyBoot + EFI_BOOT_MANAGER_REFRESH_LEGACY_BOOT_OPTION RefreshLegacyBootOption, + EFI_BOOT_MANAGER_LEGACY_BOOT LegacyBoot ); /** @@ -523,7 +523,7 @@ EfiBootManagerRegisterLegacyBootSupport ( **/ typedef CHAR16 * -(EFIAPI *EFI_BOOT_MANAGER_BOOT_DESCRIPTION_HANDLER) ( +(EFIAPI *EFI_BOOT_MANAGER_BOOT_DESCRIPTION_HANDLER)( IN EFI_HANDLE Handle, IN CONST CHAR16 *DefaultDescription ); @@ -597,7 +597,6 @@ EfiBootManagerDisconnectAll ( VOID ); - // // Boot Manager console library functions // @@ -666,7 +665,7 @@ EfiBootManagerUpdateConsoleVariable ( EFI_STATUS EFIAPI EfiBootManagerConnectConsoleVariable ( - IN CONSOLE_TYPE ConsoleType + IN CONSOLE_TYPE ConsoleType ); /** @@ -680,7 +679,7 @@ EfiBootManagerConnectConsoleVariable ( EFI_DEVICE_PATH_PROTOCOL * EFIAPI EfiBootManagerGetGopDevicePath ( - IN EFI_HANDLE VideoController + IN EFI_HANDLE VideoController ); /** @@ -694,7 +693,7 @@ EfiBootManagerGetGopDevicePath ( EFI_STATUS EFIAPI EfiBootManagerConnectVideoController ( - EFI_HANDLE VideoController OPTIONAL + EFI_HANDLE VideoController OPTIONAL ); // @@ -702,29 +701,29 @@ EfiBootManagerConnectVideoController ( // typedef struct { - EFI_DRIVER_HEALTH_PROTOCOL *DriverHealth; + EFI_DRIVER_HEALTH_PROTOCOL *DriverHealth; /// /// Driver relative handles /// - EFI_HANDLE DriverHealthHandle; - EFI_HANDLE ControllerHandle; - EFI_HANDLE ChildHandle; + EFI_HANDLE DriverHealthHandle; + EFI_HANDLE ControllerHandle; + EFI_HANDLE ChildHandle; /// /// Driver health messages of the specify Driver /// - EFI_DRIVER_HEALTH_HII_MESSAGE *MessageList; + EFI_DRIVER_HEALTH_HII_MESSAGE *MessageList; /// /// HII relative handles /// - EFI_HII_HANDLE HiiHandle; + EFI_HII_HANDLE HiiHandle; /// /// Driver Health status /// - EFI_DRIVER_HEALTH_STATUS HealthStatus; + EFI_DRIVER_HEALTH_STATUS HealthStatus; } EFI_BOOT_MANAGER_DRIVER_HEALTH_INFO; /** @@ -746,7 +745,7 @@ typedef struct { EFI_BOOT_MANAGER_DRIVER_HEALTH_INFO * EFIAPI EfiBootManagerGetDriverHealthInfo ( - UINTN *Count + UINTN *Count ); /** @@ -778,7 +777,7 @@ EfiBootManagerFreeDriverHealthInfo ( EFI_STATUS EFIAPI EfiBootManagerProcessLoadOption ( - EFI_BOOT_MANAGER_LOAD_OPTION *LoadOption + EFI_BOOT_MANAGER_LOAD_OPTION *LoadOption ); /** @@ -796,12 +795,11 @@ EfiBootManagerProcessLoadOption ( BOOLEAN EFIAPI EfiBootManagerIsValidLoadOptionVariableName ( - IN CHAR16 *VariableName, - OUT EFI_BOOT_MANAGER_LOAD_OPTION_TYPE *OptionType OPTIONAL, - OUT UINT16 *OptionNumber OPTIONAL + IN CHAR16 *VariableName, + OUT EFI_BOOT_MANAGER_LOAD_OPTION_TYPE *OptionType OPTIONAL, + OUT UINT16 *OptionNumber OPTIONAL ); - /** Dispatch the deferred images that are returned from all DeferredImageLoad instances. @@ -814,4 +812,5 @@ EFIAPI EfiBootManagerDispatchDeferredImages ( VOID ); + #endif diff --git a/MdeModulePkg/Include/Library/VarCheckLib.h b/MdeModulePkg/Include/Library/VarCheckLib.h index b2b296506c..155fcd0223 100644 --- a/MdeModulePkg/Include/Library/VarCheckLib.h +++ b/MdeModulePkg/Include/Library/VarCheckLib.h @@ -14,13 +14,13 @@ SPDX-License-Identifier: BSD-2-Clause-Patent typedef enum { VarCheckRequestReserved0 = 0, VarCheckRequestReserved1 = 1, - VarCheckFromTrusted = 2, - VarCheckFromUntrusted = 3, + VarCheckFromTrusted = 2, + VarCheckFromUntrusted = 3, } VAR_CHECK_REQUEST_SOURCE; typedef VOID -(EFIAPI *VAR_CHECK_END_OF_DXE_CALLBACK) ( +(EFIAPI *VAR_CHECK_END_OF_DXE_CALLBACK)( VOID ); @@ -58,7 +58,7 @@ VarCheckLibRegisterEndOfDxeCallback ( VOID *** EFIAPI VarCheckLibInitializeAtEndOfDxe ( - IN OUT UINTN *AddressPointerCount OPTIONAL + IN OUT UINTN *AddressPointerCount OPTIONAL ); /** @@ -77,7 +77,7 @@ VarCheckLibInitializeAtEndOfDxe ( EFI_STATUS EFIAPI VarCheckLibRegisterAddressPointer ( - IN VOID **AddressPointer + IN VOID **AddressPointer ); /** @@ -97,7 +97,7 @@ VarCheckLibRegisterAddressPointer ( EFI_STATUS EFIAPI VarCheckLibRegisterSetVariableCheckHandler ( - IN VAR_CHECK_SET_VARIABLE_CHECK_HANDLER Handler + IN VAR_CHECK_SET_VARIABLE_CHECK_HANDLER Handler ); /** @@ -118,9 +118,9 @@ VarCheckLibRegisterSetVariableCheckHandler ( EFI_STATUS EFIAPI VarCheckLibVariablePropertySet ( - IN CHAR16 *Name, - IN EFI_GUID *Guid, - IN VAR_CHECK_VARIABLE_PROPERTY *VariableProperty + IN CHAR16 *Name, + IN EFI_GUID *Guid, + IN VAR_CHECK_VARIABLE_PROPERTY *VariableProperty ); /** @@ -138,9 +138,9 @@ VarCheckLibVariablePropertySet ( EFI_STATUS EFIAPI VarCheckLibVariablePropertyGet ( - IN CHAR16 *Name, - IN EFI_GUID *Guid, - OUT VAR_CHECK_VARIABLE_PROPERTY *VariableProperty + IN CHAR16 *Name, + IN EFI_GUID *Guid, + OUT VAR_CHECK_VARIABLE_PROPERTY *VariableProperty ); /** @@ -163,12 +163,12 @@ VarCheckLibVariablePropertyGet ( EFI_STATUS EFIAPI VarCheckLibSetVariableCheck ( - IN CHAR16 *VariableName, - IN EFI_GUID *VendorGuid, - IN UINT32 Attributes, - IN UINTN DataSize, - IN VOID *Data, - IN VAR_CHECK_REQUEST_SOURCE RequestSource + IN CHAR16 *VariableName, + IN EFI_GUID *VendorGuid, + IN UINT32 Attributes, + IN UINTN DataSize, + IN VOID *Data, + IN VAR_CHECK_REQUEST_SOURCE RequestSource ); #endif diff --git a/MdeModulePkg/Include/Library/VariablePolicyHelperLib.h b/MdeModulePkg/Include/Library/VariablePolicyHelperLib.h index 3b75e97860..e471ed78f3 100644 --- a/MdeModulePkg/Include/Library/VariablePolicyHelperLib.h +++ b/MdeModulePkg/Include/Library/VariablePolicyHelperLib.h @@ -40,17 +40,16 @@ SPDX-License-Identifier: BSD-2-Clause-Patent EFI_STATUS EFIAPI CreateBasicVariablePolicy ( - IN CONST EFI_GUID *Namespace, - IN CONST CHAR16 *Name OPTIONAL, - IN UINT32 MinSize, - IN UINT32 MaxSize, - IN UINT32 AttributesMustHave, - IN UINT32 AttributesCantHave, - IN UINT8 LockPolicyType, - OUT VARIABLE_POLICY_ENTRY **NewEntry + IN CONST EFI_GUID *Namespace, + IN CONST CHAR16 *Name OPTIONAL, + IN UINT32 MinSize, + IN UINT32 MaxSize, + IN UINT32 AttributesMustHave, + IN UINT32 AttributesCantHave, + IN UINT8 LockPolicyType, + OUT VARIABLE_POLICY_ENTRY **NewEntry ); - /** This helper function will allocate and populate a new VariablePolicy structure for a policy with a lock type of VARIABLE_POLICY_TYPE_LOCK_ON_VAR_STATE. @@ -79,19 +78,18 @@ CreateBasicVariablePolicy ( EFI_STATUS EFIAPI CreateVarStateVariablePolicy ( - IN CONST EFI_GUID *Namespace, - IN CONST CHAR16 *Name OPTIONAL, - IN UINT32 MinSize, - IN UINT32 MaxSize, - IN UINT32 AttributesMustHave, - IN UINT32 AttributesCantHave, - IN CONST EFI_GUID *VarStateNamespace, - IN UINT8 VarStateValue, - IN CONST CHAR16 *VarStateName, - OUT VARIABLE_POLICY_ENTRY **NewEntry + IN CONST EFI_GUID *Namespace, + IN CONST CHAR16 *Name OPTIONAL, + IN UINT32 MinSize, + IN UINT32 MaxSize, + IN UINT32 AttributesMustHave, + IN UINT32 AttributesCantHave, + IN CONST EFI_GUID *VarStateNamespace, + IN UINT8 VarStateValue, + IN CONST CHAR16 *VarStateName, + OUT VARIABLE_POLICY_ENTRY **NewEntry ); - /** This helper function does everything that CreateBasicVariablePolicy() does, but also uses the passed in protocol to register the policy with the infrastructure. @@ -124,7 +122,6 @@ RegisterBasicVariablePolicy ( IN UINT8 LockPolicyType ); - /** This helper function does everything that CreateBasicVariablePolicy() does, but also uses the passed in protocol to register the policy with the infrastructure. diff --git a/MdeModulePkg/Include/Library/VariablePolicyLib.h b/MdeModulePkg/Include/Library/VariablePolicyLib.h index efd1840112..63c49fbca1 100644 --- a/MdeModulePkg/Include/Library/VariablePolicyLib.h +++ b/MdeModulePkg/Include/Library/VariablePolicyLib.h @@ -30,10 +30,9 @@ SPDX-License-Identifier: BSD-2-Clause-Patent EFI_STATUS EFIAPI RegisterVariablePolicy ( - IN CONST VARIABLE_POLICY_ENTRY *NewPolicy + IN CONST VARIABLE_POLICY_ENTRY *NewPolicy ); - /** This API function checks to see whether the parameters to SetVariable would be allowed according to the current variable policies. @@ -56,14 +55,13 @@ RegisterVariablePolicy ( EFI_STATUS EFIAPI ValidateSetVariable ( - IN CHAR16 *VariableName, - IN EFI_GUID *VendorGuid, - IN UINT32 Attributes, - IN UINTN DataSize, - IN VOID *Data + IN CHAR16 *VariableName, + IN EFI_GUID *VendorGuid, + IN UINT32 Attributes, + IN UINTN DataSize, + IN VOID *Data ); - /** This API function disables the variable policy enforcement. If it's already been called once, will return EFI_ALREADY_STARTED. @@ -81,7 +79,6 @@ DisableVariablePolicy ( VOID ); - /** This API function will dump the entire contents of the variable policy table. @@ -101,11 +98,10 @@ DisableVariablePolicy ( EFI_STATUS EFIAPI DumpVariablePolicy ( - OUT UINT8 *Policy, - IN OUT UINT32 *Size + OUT UINT8 *Policy, + IN OUT UINT32 *Size ); - /** This API function returns whether or not the policy engine is currently being enforced. @@ -121,7 +117,6 @@ IsVariablePolicyEnabled ( VOID ); - /** This API function locks the interface so that no more policy updates can be performed or changes made to the enforcement until the next boot. @@ -136,7 +131,6 @@ LockVariablePolicy ( VOID ); - /** This API function returns whether or not the policy interface is locked for the remainder of the boot. @@ -152,7 +146,6 @@ IsVariablePolicyInterfaceLocked ( VOID ); - /** This helper function initializes the library and sets up any required internal structures or handlers. @@ -170,10 +163,9 @@ IsVariablePolicyInterfaceLocked ( EFI_STATUS EFIAPI InitVariablePolicyLib ( - IN EFI_GET_VARIABLE GetVariableHelper + IN EFI_GET_VARIABLE GetVariableHelper ); - /** This helper function returns whether or not the library is currently initialized. @@ -187,7 +179,6 @@ IsVariablePolicyLibInitialized ( VOID ); - /** This helper function tears down the library. @@ -203,5 +194,4 @@ DeinitVariablePolicyLib ( VOID ); - #endif // _VARIABLE_POLICY_LIB_H_ -- cgit v1.2.3