summaryrefslogtreecommitdiffstats
path: root/SecurityPkg/Pkcs7Verify
diff options
context:
space:
mode:
authorSean Brogan <sean.brogan@microsoft.com>2019-10-09 00:20:15 -0700
committerMichael D Kinney <michael.d.kinney@intel.com>2019-10-23 10:23:23 -0700
commitd6b926e76e3d639ac37610e97d33ff9e3a6281eb (patch)
tree8a4857fd6aa97e149cb6e14d7722136e2cd59223 /SecurityPkg/Pkcs7Verify
parent6e7e9b95782413b6e32eb7a7f79c0aecc8ec6a18 (diff)
downloadedk2-d6b926e76e3d639ac37610e97d33ff9e3a6281eb.tar.gz
edk2-d6b926e76e3d639ac37610e97d33ff9e3a6281eb.tar.bz2
edk2-d6b926e76e3d639ac37610e97d33ff9e3a6281eb.zip
SecurityPkg: Fix spelling errors
https://bugzilla.tianocore.org/show_bug.cgi?id=2265 Cc: Jiewen Yao <jiewen.yao@intel.com> Cc: Jian J Wang <jian.j.wang@intel.com> Cc: Chao Zhang <chao.b.zhang@intel.com> Signed-off-by: Michael D Kinney <michael.d.kinney@intel.com> Reviewed-by: Jiewen Yao <Jiewen.yao@intel.com> Reviewed-by: Jian J Wang <jian.j.wang@intel.com>
Diffstat (limited to 'SecurityPkg/Pkcs7Verify')
-rw-r--r--SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c18
1 files changed, 9 insertions, 9 deletions
diff --git a/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c b/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c
index a113df3718..a96862f937 100644
--- a/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c
+++ b/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c
@@ -494,7 +494,7 @@ IsValidTimestamp (
TsaCertSize = SigList->SignatureSize - sizeof (EFI_GUID);
//
- // Each TSA Certificate will normally be in a seperate EFI_SIGNATURE_LIST
+ // Each TSA Certificate will normally be in a separate EFI_SIGNATURE_LIST
// Leverage ImageTimestampVerify interface for Timestamp counterSignature Verification
//
if (ImageTimestampVerify (SignedData, SignedDataSize, TsaCert, TsaCertSize, &SigningTime)) {
@@ -514,7 +514,7 @@ IsValidTimestamp (
/**
Check whether the PKCS7 signedData is revoked by verifying with the revoked
certificates database, and if the signedData is timestamped, the embedded timestamp
- couterSignature will be checked with the supplied timestamp database.
+ counterSignature will be checked with the supplied timestamp database.
@param[in] SignedData Pointer to buffer containing ASN.1 DER-encoded PKCS7
signature.
@@ -657,8 +657,8 @@ P7CheckRevocationByHash (
Status = EFI_SUCCESS;
if (IsValidTimestamp (SignedData, SignedDataSize, TimeStampDb, &RevocationTime)) {
//
- // Use EFI_NOT_READY to identify the P7Data is not reovked, because the timestamping
- // occured prior to the time of certificate revocation.
+ // Use EFI_NOT_READY to identify the P7Data is not revoked, because the timestamping
+ // occurred prior to the time of certificate revocation.
//
Status = EFI_NOT_READY;
}
@@ -679,7 +679,7 @@ _Exit:
/**
Check whether the PKCS7 signedData is revoked by verifying with the revoked
certificates database, and if the signedData is timestamped, the embedded timestamp
- couterSignature will be checked with the supplied timestamp database.
+ counterSignature will be checked with the supplied timestamp database.
@param[in] SignedData Pointer to buffer containing ASN.1 DER-encoded PKCS7
signature.
@@ -822,8 +822,8 @@ P7CheckRevocation (
Status = EFI_SUCCESS;
if (IsValidTimestamp (SignedData, SignedDataSize, TimeStampDb, &RevocationTime)) {
//
- // Use EFI_NOT_READY to identify the P7Data is not reovked, because the timestamping
- // occured prior to the time of certificate revocation.
+ // Use EFI_NOT_READY to identify the P7Data is not revoked, because the timestamping
+ // occurred prior to the time of certificate revocation.
//
Status = EFI_NOT_READY;
}
@@ -1261,7 +1261,7 @@ VerifyBuffer (
);
if (!EFI_ERROR (Status)) {
//
- // The PKCS7 SignedData is reovked
+ // The PKCS7 SignedData is revoked
//
Status = EFI_SECURITY_VIOLATION;
goto _Exit;
@@ -1413,7 +1413,7 @@ VerifySignature (
if (!EFI_ERROR (Status)) {
//
- // The PKCS7 SignedData is reovked
+ // The PKCS7 SignedData is revoked
//
return EFI_SECURITY_VIOLATION;
}