Namespace

Fwupd – 2.0

Functionality exported by libfwupd for client applications

Version1.9.10
Authorsfwupd Development Team
LicenseLGPL-2.1-or-later
Websitehttps://www.fwupd.org
Sourcehttps://github.com/fwupd/fwupd

Build

C headersfwupd.h
pkg-config filesfwupd

Dependencies

GObject—2.0 The base type system library
Browse documentation
Gio—2.0 A modern, easy-to-use VFS API
Browse documentation
Json—1.0 API for efficient parsing and writing of JSON (JavaScript Object Notation) streams
Browse documentation

Additional documentation

Classes

BiosSetting

A BIOS setting that represents a setting in the firmware.

Client

Allow client code to call the daemon methods.

Device

A physical device on the host with optionally updatable firmware.

Plugin

A plugin which is used by fwupd to enumerate and update devices.

Release

A firmware release with a specific version.

Remote

A source of metadata that provides firmware.

Report

A firmware report from a vendor.

Request

A user request from the device.

SecurityAttr

A Host Security ID attribute that represents something that was measured.

Aliases

_guid_t

DeviceFlags

Flags used to represent device attributes.

DeviceProblem

Problems are reasons why the device is not updatable.

PluginFlags

Flags used to represent plugin attributes.

ReleaseFlags

Flags used to represent release attributes.

ReportFlags

Flags used to represent report attributes.

RequestFlags

Flags used to represent request attributes.

Enumerations

BiosSettingKind

The type of BIOS setting.

KeyringKind

Type of keyring used on a remote.

ReleaseUrgency

The release urgency.

RemoteKind

The kind of remote.

RequestKind

The kind of request we are asking of the user.

SecurityAttrLevel

The HSI level.

SecurityAttrResult

The HSI result.

Status

The flags to show daemon status.

UpdateState

The update state.

VersionFormat

The flags used when parsing version numbers.

Bitfields

ClientDownloadFlags

The options to use for downloading.

ClientUploadFlags

The options to use for uploading.

FeatureFlags

The flags to the feature capabilities of the front-end client.

GuidFlags

The flags to show how the data should be converted.

InstallFlags

Flags to set when performing the firmware update or install.

RemoteFlags

The flags available for the remote.

SecurityAttrFlags

The flags available for HSI attributes.

SelfSignFlags

Flags to set when performing the firmware update or install.

TrustFlags

The flags to show the level of trust.

Error Domains

Error

The error code.

Functions

build_history_report_json

Builds a JSON report for the list of devices. No filtering is done on the devices array, and it is expected that the caller will filter to something sane, e.g. FWUPD_DEVICE_FLAG_REPORTED at the bare minimum.

since: 1.0.4

build_machine_id

Gets a salted hash of the /etc/machine-id contents. This can be used to identify a specific machine. It is not possible to recover the original machine-id from the machine-hash.

since: 1.0.4

build_user_agent

Builds a user-agent to use for the download.

since: 1.0.3

checksum_format_for_display

Formats a checksum for display.

since: 0.9.3

checksum_get_best

Gets a the best possible checksum kind.

since: 0.9.4

checksum_get_by_kind

Gets a specific checksum kind.

since: 0.9.4

checksum_guess_kind

Guesses the checksum kind based on the length of the hash.

since: 0.9.3

checksum_type_to_string_display

Formats a checksum type for display.

since: 1.9.6

common_json_add_boolean

common_json_add_int

common_json_add_string

common_json_add_stringv

error_from_string

Converts a string to an enumerated error.

since: 0.7.0

error_quark

An error quark.

since: 0.1.1

error_to_string

Converts an enumerated error to a string.

since: 0.7.0

feature_flag_from_string

Converts a string to an enumerated feature flag.

since: 1.4.5

feature_flag_to_string

Converts a feature flag to a string.

since: 1.4.5

get_os_release

Loads information from the system os-release file.

since: 1.0.7

get_os_release_full

Loads information from a defined system os-release file.

since: 1.8.8

guid_from_string

Converts a string GUID into its binary encoding. All string GUIDs are formatted as big endian but on-disk can be encoded in different ways.

since: 1.2.5

guid_hash_data

Returns a GUID for some data. This uses a hash and so even small differences in the data will produce radically different return values.

since: 1.2.5

guid_hash_string

Returns a GUID for a given string. This uses a hash and so even small differences in the str will produce radically different return values.

since: 1.2.5

guid_is_valid

Checks the string is a valid GUID.

since: 1.2.5

guid_to_string

Returns a text GUID of mixed or BE endian for a packed buffer.

since: 1.2.5

keyring_kind_from_string

Converts an printable string to an enumerated keyring kind.

since: 0.9.7

keyring_kind_to_string

Converts an enumerated keyring kind to a printable string.

since: 0.9.7

pad_kv_int

pad_kv_str

pad_kv_unx

status_from_string

Converts a string to an enumerated status.

since: 0.1.1

status_to_string

Converts an enumerated status to a string.

since: 0.1.1

trust_flag_from_string

Converts a string to an enumerated trust flag.

since: 0.7.0

trust_flag_to_string

Converts an enumerated trust flag to a string.

since: 0.7.0

update_state_from_string

Converts a string to an enumerated update state.

since: 0.7.0

update_state_to_string

Converts an enumerated update state to a string.

since: 0.7.0

version_format_from_string

Converts text to a display version type.

since: 1.2.9

version_format_to_string

Converts an enumerated version format to text.

since: 1.2.9

version_string

Gets the libfwupd installed runtime version.

since: 1.6.1

Function Macros

CHECK_VERSION

Check whether a fwupd version equal to or greater than major.minor.micro.

Constants

BATTERY_LEVEL_INVALID

This value signifies the battery level is either unset, or the value cannot be discovered.

BIOS_SETTING_DEBUG_CMD

BIOS_SETTING_PENDING_REBOOT

BIOS_SETTING_RESET_BIOS

DBUS_INTERFACE

The dbus interface.

DBUS_P2P_SOCKET_ADDRESS

The D-Bus socket address when using point-to-point connections.

DBUS_PATH

The dbus path.

DBUS_SERVICE

The dbus service.

DEVICE_FLAG_ADD_COUNTERPART_GUIDS

The device will add counterpart GUIDs from an alternate mode like bootloader. This flag is typically specified in a quirk.

DEVICE_FLAG_AFFECTS_FDE

The device is warning that a volume with full-disk-encryption was found on this machine, typically a Windows NTFS partition with BitLocker. Updating the firmware on this device may invalidate secrets used to decrypt the volume, and the recovery key may be required.

DEVICE_FLAG_ANOTHER_WRITE_REQUIRED

The device requires the update to be retried, possibly with a different plugin.

DEVICE_FLAG_BACKUP_BEFORE_INSTALL

The device firmware should be saved before installing firmware.

DEVICE_FLAG_CAN_VERIFY

The device checksums can be compared against metadata.

DEVICE_FLAG_CAN_VERIFY_IMAGE

The device application firmware image can be dumped from device for verification.

DEVICE_FLAG_DUAL_IMAGE

The device firmware update architecture uses a redundancy mechanism such as A/B partitions for updates.

DEVICE_FLAG_EMULATED

The device is emulated and should not be recorded by the backend.

DEVICE_FLAG_EMULATION_TAG

The device should be recorded by the backend, allowing emulation.

DEVICE_FLAG_END_OF_LIFE

The device is no longer supported by the original hardware vendor as it is considered end-of-life. It it unlikely to receive firmware updates, even for security issues.

DEVICE_FLAG_ENSURE_SEMVER

Deprecated, no not use.

DEVICE_FLAG_HAS_MULTIPLE_BRANCHES

The device supports switching to a different stream of firmware.

DEVICE_FLAG_HISTORICAL

The device is used for historical data only.

DEVICE_FLAG_IGNORE_VALIDATION

When processing an update for the device, plugins should ignore all validation safety checks.

DEVICE_FLAG_INSTALL_ALL_RELEASES

Install each intermediate releases for the device rather than jumping directly to the newest.

DEVICE_FLAG_INSTALL_PARENT_FIRST

The composite device requires installation of composite firmware on the parent before the child. Normally the child is installed before the parent.

DEVICE_FLAG_INTERNAL

Device is internal to the platform and cannot be removed easily.

DEVICE_FLAG_IS_BOOTLOADER

The device is currently in a read-only bootloader mode and not running application code.

DEVICE_FLAG_LOCKED

The device can not be updated without manual user interaction.

DEVICE_FLAG_MD_SET_ICON

Deprecated, no not use.

DEVICE_FLAG_MD_SET_NAME

Deprecated, no not use.

DEVICE_FLAG_MD_SET_NAME_CATEGORY

Deprecated, no not use.

DEVICE_FLAG_MD_SET_VERFMT

Deprecated, no not use.

DEVICE_FLAG_NEEDS_ACTIVATION

The device update needs to be separately activated. This process may occur automatically on shutdown in some operating systems or when the device is unplugged with some devices.

DEVICE_FLAG_NEEDS_BOOTLOADER

The device requires entering a bootloader mode to be manually.

DEVICE_FLAG_NEEDS_REBOOT

The device requires a system reboot to apply firmware or to reload hardware.

DEVICE_FLAG_NEEDS_SHUTDOWN

The device requires the system to be shutdown to finish application of new firmware.

DEVICE_FLAG_NO_AUTO_INSTANCE_IDS

Deprecated, no not use.

DEVICE_FLAG_NO_GUID_MATCHING

Deprecated, no not use.

DEVICE_FLAG_NONE

No flags set.

DEVICE_FLAG_NOTIFIED

The user has been notified about a change in the device state.

DEVICE_FLAG_ONLY_EXPLICIT_UPDATES

The device should stay on one firmware version unless the new version is explicitly specified.

DEVICE_FLAG_ONLY_OFFLINE

Update can only be done from a limited functionality OS (offline mode).

DEVICE_FLAG_ONLY_SUPPORTED

Deprecated, no not use.

DEVICE_FLAG_ONLY_VERSION_UPGRADE

The device firmware can only be updated to a newer version and never downgraded or reinstalled.

DEVICE_FLAG_REGISTERED

The device has been registered with other plugins.

DEVICE_FLAG_REPORTED

The success or failure of a previous update has been reported to a metadata server.

DEVICE_FLAG_REQUIRE_AC

Device requires an external power source to be connected or the battery level at a minimum threshold to update.

DEVICE_FLAG_SELF_RECOVERY

In flashing mode, the device will only accept intended payloads and will revert back to a valid firmware image if an invalid or incomplete payload was sent.

DEVICE_FLAG_SIGNED_PAYLOAD

The firmware payload is verified on-device the payload using strong cryptography such as RSA, AES or ECC.

DEVICE_FLAG_SKIPS_RESTART

The device relies upon activation or power cycle to load firmware.

DEVICE_FLAG_SUPPORTED

The device is found in metadata loaded into the daemon.

DEVICE_FLAG_TRUSTED

A trusted client is reading information about the device. Extra metadata such as serial number can be exposed about this device.

DEVICE_FLAG_UNREACHABLE

The device is currently unreachable, perhaps because it is in a lower power state or is out of wireless range.

DEVICE_FLAG_UNSIGNED_PAYLOAD

The firmware payload is unsigned and it is possible to modify and flash custom firmware.

DEVICE_FLAG_UPDATABLE

Device has the ability to be updated in this or any other mode.

DEVICE_FLAG_UPDATABLE_HIDDEN

The device is updatable but is currently inhibited from updates in the client. Reasons include but are not limited to low power or requiring reboot from a previous update.

DEVICE_FLAG_USABLE_DURING_UPDATE

The device remains usable while the update flashes or schedules the update. The update will implicitly be applied next time the device is power cycled or possibly activated.

DEVICE_FLAG_USE_RUNTIME_VERSION

The device will always display use the runtime version rather than the bootloader version.

DEVICE_FLAG_VERSION_CHECK_REQUIRED

All firmware updates for this device require a firmware version check.

DEVICE_FLAG_WAIT_FOR_REPLUG

The device is in the middle of and update and the hardware is waiting to be probed/replugged.

DEVICE_FLAG_WILDCARD_INSTALL

All devices with matching GUIDs will be updated at the same time.

DEVICE_FLAG_WILL_DISAPPEAR

The device will disappear after the update is complete and success or failure can’t be verified.

DEVICE_ID_ANY

Wildcard used for matching all device ids in fwupd.

DEVICE_PROBLEM_DISPLAY_REQUIRED

The device cannot be used while there are no displays plugged in.

DEVICE_PROBLEM_IN_USE

The device is in use and cannot be interrupted, for instance taking a phone call.

DEVICE_PROBLEM_IS_EMULATED

The device is emulated from a different host.

DEVICE_PROBLEM_LID_IS_CLOSED

The device cannot be used while the laptop lid is closed.

DEVICE_PROBLEM_MISSING_LICENSE

The device cannot be updated due to missing vendor’s license.

DEVICE_PROBLEM_NONE

No device problems detected.

DEVICE_PROBLEM_POWER_TOO_LOW

The device battery power is too low.

DEVICE_PROBLEM_REQUIRE_AC_POWER

The device requires AC power to be connected.

DEVICE_PROBLEM_SYSTEM_INHIBIT

The device cannot be updated due to a system-wide inhibit.

DEVICE_PROBLEM_SYSTEM_POWER_TOO_LOW

The system power is too low to perform the update.

DEVICE_PROBLEM_UNREACHABLE

The device is unreachable, or out of wireless range.

DEVICE_PROBLEM_UPDATE_IN_PROGRESS

The device cannot be updated as it is already being updated.

DEVICE_PROBLEM_UPDATE_PENDING

The device is waiting for the update to be applied.

MAJOR_VERSION

The compile-time major version.

MICRO_VERSION

The compile-time micro version.

MINOR_VERSION

The compile-time minor version.

PLUGIN_FLAG_AUTH_REQUIRED

The plugin requires the user to provide authentication details. Supported clients will display this information to a user.

PLUGIN_FLAG_CAPSULES_UNSUPPORTED

The plugin discovered that UEFI UpdateCapsule are unsupported. Supported clients will display this information to a user.

PLUGIN_FLAG_CLEAR_UPDATABLE

When the plugin loads it should clear the UPDATABLE flag from any devices. This typically happens when the device requires a system restart.

PLUGIN_FLAG_DISABLED

The plugin has been disabled, either by daemon configuration or a problem.

PLUGIN_FLAG_EFIVAR_NOT_MOUNTED

The plugin discovered the efivar filesystem is not found and is required for this plugin. Supported clients will display this information to a user.

PLUGIN_FLAG_ESP_NOT_FOUND

The plugins discovered that the EFI system partition was not found. Supported clients will display this information to a user.

PLUGIN_FLAG_ESP_NOT_VALID

The plugins discovered that the EFI system partition may not be valid. Supported clients will display this information to a user.

PLUGIN_FLAG_FAILED_OPEN

Failed to open plugin (missing dependency). Supported clients will display this information to a user.

PLUGIN_FLAG_KERNEL_TOO_OLD

The feature is not supported as the kernel is too old.

PLUGIN_FLAG_LEGACY_BIOS

The plugin discovered the system is running in legacy CSM mode. Supported clients will display this information to a user.

PLUGIN_FLAG_MEASURE_SYSTEM_INTEGRITY

The plugin will be checked that it preserves system state such as KEK, PK, BOOT#### etc.

PLUGIN_FLAG_MODULAR

The plugin is loaded from an external module.

PLUGIN_FLAG_NO_HARDWARE

The plugin won’t load because no supported hardware was found. This typically happens with plugins designed for a specific platform design (such as the dell plugin only works on Dell systems).

PLUGIN_FLAG_NONE

No plugin flags are set.

PLUGIN_FLAG_READY

The plugin is ready for use and all devices have been coldplugged.

PLUGIN_FLAG_REQUIRE_HWID

A specific HWID is required to use this plugin.

PLUGIN_FLAG_SECURE_CONFIG

The plugin requires the config file to be saved with permissions that only allow the root user to read.

PLUGIN_FLAG_UNLOCK_REQUIRED

The plugin discovered that hardware unlock is required. Supported clients will display this information to a user.

PLUGIN_FLAG_USER_WARNING

The plugin has a problem and would like to show a user warning to a supported client.

RELEASE_FLAG_BLOCKED_APPROVAL

The installation of the release is blocked as release not approved by an administrator.

RELEASE_FLAG_BLOCKED_VERSION

The installation of the release is blocked as below device version-lowest.

RELEASE_FLAG_IS_ALTERNATE_BRANCH

The release is an alternate branch of firmware.

RELEASE_FLAG_IS_COMMUNITY

The release is supported by the community and not the hardware vendor.

RELEASE_FLAG_IS_DOWNGRADE

The release is older than the device version.

RELEASE_FLAG_IS_UPGRADE

The release is newer than the device version.

RELEASE_FLAG_NONE

No flags are set.

RELEASE_FLAG_TRUSTED_METADATA

The payload metadata is trusted.

RELEASE_FLAG_TRUSTED_PAYLOAD

The payload binary is trusted.

RELEASE_FLAG_TRUSTED_REPORT

The payload has been tested by a report we trust.

REPORT_FLAG_FROM_OEM

The report was generated by the OEM.

REPORT_FLAG_NONE

No report flags are set.

REQUEST_FLAG_ALLOW_GENERIC_IMAGE

Use a generic (translated) request image.

REQUEST_FLAG_ALLOW_GENERIC_MESSAGE

Use a generic (translated) request message.

REQUEST_FLAG_NON_GENERIC_IMAGE

Device requires to show the user a custom image for the action to make sense.

REQUEST_FLAG_NON_GENERIC_MESSAGE

Device requires a non-generic interaction with custom non-translatable text.

REQUEST_FLAG_NONE

No flags are set.

REQUEST_ID_DO_NOT_POWER_OFF

Show the user a message not to unplug the machine from the AC power, e.g. “Do not turn off your computer or remove the AC adaptor until you are sure the update has completed.”

REQUEST_ID_INSERT_USB_CABLE

The user needs to insert the cable to complete the update, e.g. “The update will continue when the device USB cable has been re-inserted.”

REQUEST_ID_PRESS_UNLOCK

The user needs to press unlock on the device to continue, e.g. “Press unlock on the device to continue the update process.”

REQUEST_ID_REMOVE_REPLUG

The user needs to remove and reinsert the device to complete the update, e.g. “The update will continue when the device USB cable has been unplugged and then re-inserted.”

REQUEST_ID_REMOVE_USB_CABLE

The user needs to remove the device to complete the update, e.g. “The update will continue when the device USB cable has been unplugged.”

REQUEST_ID_REPLUG_INSTALL

Show the user a message to replug the device and then install the firmware, e.g. “Unplug and replug the device, to continue the update process.”

REQUEST_ID_REPLUG_POWER

Show the user a message to replug the power connector, e.g. “The update will continue when the device power cable has been unplugged and then re-inserted.”

RESULT_KEY_APPSTREAM_ID

Result key to represent AppstreamId.

RESULT_KEY_BATTERY_LEVEL

Result key to represent the current battery level in percent. Expressed from 0-100%, or 101 for invalid or unset.

RESULT_KEY_BATTERY_THRESHOLD

Result key to represent the minimum battery level required to perform an update. Expressed from 0-100%, or 101 for invalid or unset.

RESULT_KEY_BIOS_SETTING_CURRENT_VALUE

Result key to represent the current value of BIOS setting.

RESULT_KEY_BIOS_SETTING_ID

Result key to represent the unique identifier of the BIOS setting.

RESULT_KEY_BIOS_SETTING_LOWER_BOUND

Result key to represent the upper bound for an integer BIOS setting. or minimum length for string BIOS setting. The D-Bus type signature string is ‘t’ i.e. a unsigned 64 bit integer.

RESULT_KEY_BIOS_SETTING_POSSIBLE_VALUES

Result key to represent possible values.

RESULT_KEY_BIOS_SETTING_READ_ONLY

Result key to represent whether BIOS setting is read only.

RESULT_KEY_BIOS_SETTING_SCALAR_INCREMENT

Result key to represent the scalar increment for an integer BIOS setting.

RESULT_KEY_BIOS_SETTING_TARGET_VALUE

Result key to represent the value that would enable this attribute.

RESULT_KEY_BIOS_SETTING_TYPE

Result key to represent the type of BIOS setting. 0 is invalid, 1+ represent an attribute type.

RESULT_KEY_BIOS_SETTING_UPPER_BOUND

Result key to represent the lower bound for an integer BIOS setting or maximum length for string BIOS setting.

RESULT_KEY_BRANCH

Result key to represent Branch.

RESULT_KEY_CATEGORIES

Result key to represent Categories.

RESULT_KEY_CHECKSUM

Result key to represent Checksum.

RESULT_KEY_COMPOSITE_ID

Result key to represent CompositeId.

RESULT_KEY_CREATED

Result key to represent Created.

RESULT_KEY_DESCRIPTION

Result key to represent Description.

RESULT_KEY_DETACH_CAPTION

Result key to represent DetachCaption.

RESULT_KEY_DETACH_IMAGE

Result key to represent DetachImage.

RESULT_KEY_DETAILS_URL

Result key to represent DetailsUrl.

RESULT_KEY_DEVICE_ID

Result key to represent DeviceId.

RESULT_KEY_DEVICE_NAME

Result key to represent the device name.

RESULT_KEY_DISTRO_ID

Result key to represent the distribution ID.

RESULT_KEY_DISTRO_VARIANT

Result key to represent the distribution variant.

RESULT_KEY_DISTRO_VERSION

Result key to represent the distribution version.

RESULT_KEY_FILENAME

Result key to represent Filename.

RESULT_KEY_FLAGS

Result key to represent Flags.

RESULT_KEY_FLASHES_LEFT

Result key to represent FlashesLeft.

RESULT_KEY_GUID

Result key to represent Guid.

RESULT_KEY_HOMEPAGE

Result key to represent Homepage.

RESULT_KEY_HSI_LEVEL

Result key to represent HsiLevel.

RESULT_KEY_HSI_RESULT

Result key to represent HsiResult.

RESULT_KEY_HSI_RESULT_FALLBACK

Result key to represent the fallback HsiResult.

RESULT_KEY_HSI_RESULT_SUCCESS

Result key to represent the desired HsiResult.

RESULT_KEY_ICON

Result key to represent Icon.

RESULT_KEY_INSTALL_DURATION

Result key to represent InstallDuration.

RESULT_KEY_INSTANCE_IDS

Result key to represent InstanceIds.

RESULT_KEY_ISSUES

Result key to represent Issues.

RESULT_KEY_KERNEL_CURRENT_VALUE

Result key to represent the current kernel setting.

RESULT_KEY_KERNEL_TARGET_VALUE

Result key to represent the target kernel setting.

RESULT_KEY_LICENSE

Result key to represent License.

RESULT_KEY_LOCATIONS

Result key to represent Locations.

RESULT_KEY_METADATA

Result key to represent Metadata.

RESULT_KEY_MODIFIED

Result key to represent Modified.

RESULT_KEY_NAME

Result key to represent Name.

RESULT_KEY_NAME_VARIANT_SUFFIX

Result key to represent NameVariantSuffix.

RESULT_KEY_PARENT_DEVICE_ID

Result key to represent ParentDeviceId.

RESULT_KEY_PERCENTAGE

Result key to represent progress percentage, typically installation or verification.

RESULT_KEY_PLUGIN

Result key to represent Plugin.

RESULT_KEY_PROBLEMS

Result key to represent problems.

RESULT_KEY_PROTOCOL

Result key to represent Protocol.

RESULT_KEY_RELEASE

Result key to represent Release.

RESULT_KEY_RELEASE_ID

Result key to represent the release ID.

RESULT_KEY_REMOTE_ID

Result key to represent RemoteId.

RESULT_KEY_REPORTS

Result key to represent an array of reports.

RESULT_KEY_REQUEST_FLAGS

Result key to represent RequestFlags.

RESULT_KEY_REQUEST_KIND

Result key to represent RequestKind.

RESULT_KEY_SERIAL

Result key to represent Serial.

RESULT_KEY_SIZE

Result key to represent Size.

RESULT_KEY_SOURCE_URL

Result key to represent SourceUrl.

RESULT_KEY_STATUS

Result key to represent Status.

RESULT_KEY_SUMMARY

Result key to represent Summary.

RESULT_KEY_TAGS

Result key to represent release tags.

RESULT_KEY_TRUST_FLAGS

Result key to represent TrustFlags.

RESULT_KEY_UPDATE_ERROR

Result key to represent UpdateError.

RESULT_KEY_UPDATE_IMAGE

Result key to represent UpdateImage.

RESULT_KEY_UPDATE_MESSAGE

Result key to represent UpdateMessage.

RESULT_KEY_UPDATE_STATE

Result key to represent UpdateState.

RESULT_KEY_URGENCY

Result key to represent Urgency.

RESULT_KEY_URI

Result key to represent Uri.

RESULT_KEY_VENDOR

Result key to represent Vendor.

RESULT_KEY_VENDOR_ID

Result key to represent VendorId.

RESULT_KEY_VERSION

Result key to represent Version.

RESULT_KEY_VERSION_BOOTLOADER

Result key to represent VersionBootloader.

RESULT_KEY_VERSION_BOOTLOADER_RAW

Result key to represent VersionBootloaderRaw.

RESULT_KEY_VERSION_BUILD_DATE

Result key to represent VersionBuildDate.

RESULT_KEY_VERSION_FORMAT

Result key to represent VersionFormat.

RESULT_KEY_VERSION_LOWEST

Result key to represent VersionLowest.

RESULT_KEY_VERSION_LOWEST_RAW

Result key to represent VersionLowestRaw.

RESULT_KEY_VERSION_OLD

Result key to represent the old version string.

RESULT_KEY_VERSION_RAW

Result key to represent VersionRaw.

SECURITY_ATTR_ID_AMD_ROLLBACK_PROTECTION

Host Security ID attribute for Rollback protection of AMD platform firmware.

SECURITY_ATTR_ID_AMD_SPI_REPLAY_PROTECTION

Host Security ID attribute for SPI replay protection.

SECURITY_ATTR_ID_AMD_SPI_WRITE_PROTECTION

Host Security ID attribute for SPI Write protection.

SECURITY_ATTR_ID_BIOS_CAPSULE_UPDATES

Host Security ID attribute indicating Capsule updates are supported by the BIOS.

SECURITY_ATTR_ID_BIOS_ROLLBACK_PROTECTION

Host Security ID attribute for Rollback protection of BIOS firmware.

SECURITY_ATTR_ID_ENCRYPTED_RAM

Host Security ID attribute indicating encrypted RAM available.

SECURITY_ATTR_ID_FWUPD_ATTESTATION

Host Security ID attribute for attestation.

SECURITY_ATTR_ID_FWUPD_PLUGINS

Host Security ID attribute for plugins.

SECURITY_ATTR_ID_FWUPD_UPDATES

Host Security ID attribute for updates.

SECURITY_ATTR_ID_HOST_EMULATION

Host Security ID attribute for host emulation.

SECURITY_ATTR_ID_INTEL_BOOTGUARD_ACM

Host Security ID attribute for Intel Bootguard ACM.

SECURITY_ATTR_ID_INTEL_BOOTGUARD_ENABLED

Host Security ID attribute for Intel Bootguard enabled.

SECURITY_ATTR_ID_INTEL_BOOTGUARD_OTP

Host Security ID attribute for Intel Bootguard OTP fuse.

SECURITY_ATTR_ID_INTEL_BOOTGUARD_POLICY

Host Security ID attribute for Intel Bootguard policy.

SECURITY_ATTR_ID_INTEL_BOOTGUARD_VERIFIED

Host Security ID attribute for Intel Bootguard verified.

SECURITY_ATTR_ID_INTEL_CET_ACTIVE

Host Security ID attribute for Intel CET active.

SECURITY_ATTR_ID_INTEL_CET_ENABLED

Host Security ID attribute for Intel CET enabled.

SECURITY_ATTR_ID_INTEL_GDS

Host Security ID attribute indicating the processor is safe against Gather Data Sampling.

SECURITY_ATTR_ID_INTEL_SMAP

Host Security ID attribute for Intel SMAP.

SECURITY_ATTR_ID_IOMMU

Host Security ID attribute for IOMMU.

SECURITY_ATTR_ID_KERNEL_LOCKDOWN

Host Security ID attribute for kernel lockdown.

SECURITY_ATTR_ID_KERNEL_SWAP

Host Security ID attribute for kernel swap.

SECURITY_ATTR_ID_KERNEL_TAINTED

Host Security ID attribute for kernel taint.

SECURITY_ATTR_ID_MEI_KEY_MANIFEST

Host Security ID attribute for Intel ME Key Manifest.

SECURITY_ATTR_ID_MEI_MANUFACTURING_MODE

Host Security ID attribute for Intel ME manufacturing mode.

SECURITY_ATTR_ID_MEI_OVERRIDE_STRAP

Host Security ID attribute for Intel ME override strap.

SECURITY_ATTR_ID_MEI_VERSION

Host Security ID attribute for Intel ME version.

SECURITY_ATTR_ID_PLATFORM_DEBUG_ENABLED

Host Security ID attribute for parts with debugging capabilities enabled.

SECURITY_ATTR_ID_PLATFORM_DEBUG_LOCKED

Host Security ID attribute for parts locked from debugging.

SECURITY_ATTR_ID_PLATFORM_FUSED

Host Security ID attribute for fused parts.

SECURITY_ATTR_ID_PREBOOT_DMA_PROTECTION

Host Security ID attribute for Pre-boot DMA protection.

SECURITY_ATTR_ID_SPI_BIOSWE

Host Security ID attribute for Intel SPI BIOSWE configuration.

SECURITY_ATTR_ID_SPI_BLE

Host Security ID attribute for Intel SPI BLE configuration.

SECURITY_ATTR_ID_SPI_DESCRIPTOR

Host Security ID attribute for Intel SPI descriptor.

SECURITY_ATTR_ID_SPI_SMM_BWP

Host Security ID attribute for Intel SPI SMM BWP.

SECURITY_ATTR_ID_SUPPORTED_CPU

Host Security ID attribute for Supported CPU.

SECURITY_ATTR_ID_SUSPEND_TO_IDLE

Host Security ID attribute for Suspend to Idle.

SECURITY_ATTR_ID_SUSPEND_TO_RAM

Host Security ID attribute for Suspend to RAM.

SECURITY_ATTR_ID_TPM_EMPTY_PCR

Host Security ID attribute for empty PCR.

SECURITY_ATTR_ID_TPM_RECONSTRUCTION_PCR0

Host Security ID attribute for TPM PCR0 reconstruction.

SECURITY_ATTR_ID_TPM_VERSION_20

Host Security ID attribute for TPM 2.0

SECURITY_ATTR_ID_UEFI_BOOTSERVICE_VARS

Host Security ID attribute indicating if Bootservice-only variables are hidden.

SECURITY_ATTR_ID_UEFI_PK

Host Security ID attribute for UEFI PK.

SECURITY_ATTR_ID_UEFI_SECUREBOOT

Host Security ID attribute for UEFI secure boot.