reformat with latest settings
Reformat with the latest settings from openbmc-build-scripts (and
copy latest config files where appropriate). Fix a few minor
markdownlint issues.
Signed-off-by: Patrick Williams <patrick@stwcx.xyz>
Change-Id: I55205817c29dc3f182a165ddf9cd5d4e07b90063
diff --git a/yaml/org/open_power/Control/Host.interface.yaml b/yaml/org/open_power/Control/Host.interface.yaml
index 86dcde1..86014c4 100644
--- a/yaml/org/open_power/Control/Host.interface.yaml
+++ b/yaml/org/open_power/Control/Host.interface.yaml
@@ -1,10 +1,10 @@
description: >
- Implement to provide host interface support.
- This will define the interfaces using which, a OpenPower
- machine can communicate with host on agreed commands.
+ Implement to provide host interface support. This will define the interfaces
+ using which, a OpenPower machine can communicate with host on agreed
+ commands.
- This is for Internal use by the Firmware only. The D-Bus object
- is visible for the REST but it must not be used.
+ This is for Internal use by the Firmware only. The D-Bus object is visible
+ for the REST but it must not be used.
methods:
- name: Execute
@@ -39,11 +39,10 @@
values:
- name: OCCReset
description: >
- Host firmware should reset the OCC. This is invoked by
- OCC error monitor application on detecting the error.
- Sensor ID of the failing OCC will be sent as data.
- This command will return once the command has been placed
- in command Queue.
+ Host firmware should reset the OCC. This is invoked by OCC error
+ monitor application on detecting the error. Sensor ID of the
+ failing OCC will be sent as data. This command will return once
+ the command has been placed in command Queue.
- name: Result
description: >
diff --git a/yaml/org/open_power/Control/TPM/SecurityKeys.interface.yaml b/yaml/org/open_power/Control/TPM/SecurityKeys.interface.yaml
index 89f46a4..459c5cc 100644
--- a/yaml/org/open_power/Control/TPM/SecurityKeys.interface.yaml
+++ b/yaml/org/open_power/Control/TPM/SecurityKeys.interface.yaml
@@ -5,15 +5,15 @@
- name: ClearHostSecurityKeys
type: byte
description: >
- This is a bit mask used to specify clearing different security keys
- or resetting those values back to default by the host. Setting this
+ This is a bit mask used to specify clearing different security keys or
+ resetting those values back to default by the host. Setting this
property does not guarantee a successful operation as additional
conditions will be checked by the host to clear/reset the sensitive
data. This property will be mapped to a new IPMI sensor.
- The new property is having an integer value and the default value
- will be zero. The end operation is determined by the bit value set
- and some of the customer use cases which maps to bit value are
+ The new property is having an integer value and the default value will
+ be zero. The end operation is determined by the bit value set and some
+ of the customer use cases which maps to bit value are
Bit 0 - Clear All : Clear/reset all the sensitive data controlled by
platform firmware from the system. System can generate new