diff options
author | Sean Brogan <sean.brogan@microsoft.com> | 2019-10-09 00:20:15 -0700 |
---|---|---|
committer | Michael D Kinney <michael.d.kinney@intel.com> | 2019-10-23 10:23:23 -0700 |
commit | d6b926e76e3d639ac37610e97d33ff9e3a6281eb (patch) | |
tree | 8a4857fd6aa97e149cb6e14d7722136e2cd59223 /SecurityPkg/Pkcs7Verify | |
parent | 6e7e9b95782413b6e32eb7a7f79c0aecc8ec6a18 (diff) | |
download | edk2-d6b926e76e3d639ac37610e97d33ff9e3a6281eb.tar.gz edk2-d6b926e76e3d639ac37610e97d33ff9e3a6281eb.tar.bz2 edk2-d6b926e76e3d639ac37610e97d33ff9e3a6281eb.zip |
SecurityPkg: Fix spelling errors
https://bugzilla.tianocore.org/show_bug.cgi?id=2265
Cc: Jiewen Yao <jiewen.yao@intel.com>
Cc: Jian J Wang <jian.j.wang@intel.com>
Cc: Chao Zhang <chao.b.zhang@intel.com>
Signed-off-by: Michael D Kinney <michael.d.kinney@intel.com>
Reviewed-by: Jiewen Yao <Jiewen.yao@intel.com>
Reviewed-by: Jian J Wang <jian.j.wang@intel.com>
Diffstat (limited to 'SecurityPkg/Pkcs7Verify')
-rw-r--r-- | SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c b/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c index a113df3718..a96862f937 100644 --- a/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c +++ b/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c @@ -494,7 +494,7 @@ IsValidTimestamp ( TsaCertSize = SigList->SignatureSize - sizeof (EFI_GUID);
//
- // Each TSA Certificate will normally be in a seperate EFI_SIGNATURE_LIST
+ // Each TSA Certificate will normally be in a separate EFI_SIGNATURE_LIST
// Leverage ImageTimestampVerify interface for Timestamp counterSignature Verification
//
if (ImageTimestampVerify (SignedData, SignedDataSize, TsaCert, TsaCertSize, &SigningTime)) {
@@ -514,7 +514,7 @@ IsValidTimestamp ( /**
Check whether the PKCS7 signedData is revoked by verifying with the revoked
certificates database, and if the signedData is timestamped, the embedded timestamp
- couterSignature will be checked with the supplied timestamp database.
+ counterSignature will be checked with the supplied timestamp database.
@param[in] SignedData Pointer to buffer containing ASN.1 DER-encoded PKCS7
signature.
@@ -657,8 +657,8 @@ P7CheckRevocationByHash ( Status = EFI_SUCCESS;
if (IsValidTimestamp (SignedData, SignedDataSize, TimeStampDb, &RevocationTime)) {
//
- // Use EFI_NOT_READY to identify the P7Data is not reovked, because the timestamping
- // occured prior to the time of certificate revocation.
+ // Use EFI_NOT_READY to identify the P7Data is not revoked, because the timestamping
+ // occurred prior to the time of certificate revocation.
//
Status = EFI_NOT_READY;
}
@@ -679,7 +679,7 @@ _Exit: /**
Check whether the PKCS7 signedData is revoked by verifying with the revoked
certificates database, and if the signedData is timestamped, the embedded timestamp
- couterSignature will be checked with the supplied timestamp database.
+ counterSignature will be checked with the supplied timestamp database.
@param[in] SignedData Pointer to buffer containing ASN.1 DER-encoded PKCS7
signature.
@@ -822,8 +822,8 @@ P7CheckRevocation ( Status = EFI_SUCCESS;
if (IsValidTimestamp (SignedData, SignedDataSize, TimeStampDb, &RevocationTime)) {
//
- // Use EFI_NOT_READY to identify the P7Data is not reovked, because the timestamping
- // occured prior to the time of certificate revocation.
+ // Use EFI_NOT_READY to identify the P7Data is not revoked, because the timestamping
+ // occurred prior to the time of certificate revocation.
//
Status = EFI_NOT_READY;
}
@@ -1261,7 +1261,7 @@ VerifyBuffer ( );
if (!EFI_ERROR (Status)) {
//
- // The PKCS7 SignedData is reovked
+ // The PKCS7 SignedData is revoked
//
Status = EFI_SECURITY_VIOLATION;
goto _Exit;
@@ -1413,7 +1413,7 @@ VerifySignature ( if (!EFI_ERROR (Status)) {
//
- // The PKCS7 SignedData is reovked
+ // The PKCS7 SignedData is revoked
//
return EFI_SECURITY_VIOLATION;
}
|