diff options
author | Antoine Coeur <coeur@gmx.fr> | 2020-02-07 02:08:15 +0100 |
---|---|---|
committer | mergify[bot] <37929162+mergify[bot]@users.noreply.github.com> | 2020-02-10 22:30:07 +0000 |
commit | fc70522ffea725cb23b6366c1a2611312e38accb (patch) | |
tree | 013bf71102c6cee5470b1918aa2e97ef91b9d6fb /SecurityPkg | |
parent | aad15888d6d6193f5818eadfa29c2f3c28036cc3 (diff) | |
download | edk2-fc70522ffea725cb23b6366c1a2611312e38accb.tar.gz edk2-fc70522ffea725cb23b6366c1a2611312e38accb.tar.bz2 edk2-fc70522ffea725cb23b6366c1a2611312e38accb.zip |
SecurityPkg: Fix few typos
Fix few typos in comments and documentation.
Cc: Jiewen Yao <jiewen.yao@intel.com>
Cc: Jian J Wang <jian.j.wang@intel.com>
Cc: Chao Zhang <chao.b.zhang@intel.com>
Signed-off-by: Antoine Coeur <coeur@gmx.fr>
Reviewed-by: Philippe Mathieu-Daude <philmd@redhat.com>
Reviewed-by: Jiewen Yao <jiewen.yao@intel.com>
Signed-off-by: Philippe Mathieu-Daude <philmd@redhat.com>
Message-Id: <20200207010831.9046-63-philmd@redhat.com>
Diffstat (limited to 'SecurityPkg')
9 files changed, 9 insertions, 9 deletions
diff --git a/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceLib.c b/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceLib.c index 7cd3ddfc1b..ba1abe9e08 100644 --- a/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceLib.c +++ b/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceLib.c @@ -185,7 +185,7 @@ TpmPhysicalPresence ( @param[in] TcgProtocol EFI TCG Protocol instance.
@param[in] Ordinal TPM command code.
@param[in] AdditionalParameterSize Additional parameter size.
- @param[in] AdditionalParameters Pointer to the Additional paramaters.
+ @param[in] AdditionalParameters Pointer to the Additional parameters.
@retval TCG_PP_OPERATION_RESPONSE_BIOS_FAILURE Error occurred during sending command to TPM or
receiving response from TPM.
diff --git a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c index cabc0c6c75..f0e95e5ec0 100644 --- a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c +++ b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c @@ -478,7 +478,7 @@ DxeTpm2MeasureBootHandler ( Status = gBS->LocateDevicePath (&gEfiBlockIoProtocolGuid, &DevicePathNode, &Handle);
if (!EFI_ERROR (Status) && !mTcg2MeasureGptTableFlag) {
//
- // Find the gpt partion on the given devicepath
+ // Find the gpt partition on the given devicepath
//
DevicePathNode = OrigDevicePathNode;
ASSERT (DevicePathNode != NULL);
diff --git a/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c b/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c index dfaaa0f0b3..d499371e7a 100644 --- a/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c +++ b/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c @@ -776,7 +776,7 @@ DxeTpmMeasureBootHandler ( Status = gBS->LocateDevicePath (&gEfiBlockIoProtocolGuid, &DevicePathNode, &Handle);
if (!EFI_ERROR (Status) && !mMeasureGptTableFlag) {
//
- // Find the gpt partion on the given devicepath
+ // Find the gpt partition on the given devicepath
//
DevicePathNode = OrigDevicePathNode;
ASSERT (DevicePathNode != NULL);
diff --git a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.c b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.c index a7cb05849c..7a0f61efbb 100644 --- a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.c +++ b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.c @@ -1,6 +1,6 @@ /** @file
This library is BaseCrypto router. It will redirect hash request to each individual
- hash handler registerd, such as SHA1, SHA256.
+ hash handler registered, such as SHA1, SHA256.
Platform can use PcdTpm2HashMask to mask some hash engines.
Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved. <BR>
diff --git a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.c b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.c index d31c8b0782..42cb562f67 100644 --- a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.c +++ b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.c @@ -1,6 +1,6 @@ /** @file
This library is BaseCrypto router. It will redirect hash request to each individual
- hash handler registerd, such as SHA1, SHA256.
+ hash handler registered, such as SHA1, SHA256.
Platform can use PcdTpm2HashMask to mask some hash engines.
Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved. <BR>
diff --git a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf index 9ae597d381..85607aa645 100644 --- a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf +++ b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf @@ -1,5 +1,5 @@ ## @file
-# NULL platform secure library instance that alway returns TRUE for a user physical present
+# NULL platform secure library instance that always returns TRUE for a user physical present
#
# NULL PlatformSecureLib instance does NOT really detect whether a physical present
# user exists but returns TRUE directly. This instance can be used to verify security
diff --git a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.uni b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.uni index e5c9d1020f..860b8cbb5a 100644 --- a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.uni +++ b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.uni @@ -1,5 +1,5 @@ // /** @file
-// NULL platform secure library instance that alway returns TRUE for a user physical present
+// NULL platform secure library instance that always returns TRUE for a user physical present
//
// NULL PlatformSecureLib instance does NOT really detect whether a physical present
// user exists but returns TRUE directly. This instance can be used to verify security
diff --git a/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c b/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c index a96862f937..42282e33a9 100644 --- a/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c +++ b/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c @@ -519,7 +519,7 @@ IsValidTimestamp ( @param[in] SignedData Pointer to buffer containing ASN.1 DER-encoded PKCS7
signature.
@param[in] SignedDataSize The size of SignedData buffer in bytes.
- @param[in] InHash Pointer to the buffer containing the hash of the mesage data
+ @param[in] InHash Pointer to the buffer containing the hash of the message data
previously signed and to be verified.
@param[in] InHashSize The size of InHash buffer in bytes.
@param[in] RevokedDb Pointer to a list of pointers to EFI_SIGNATURE_LIST
diff --git a/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c b/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c index 90e54a89ce..13d3dbd0bf 100644 --- a/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c +++ b/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c @@ -4,7 +4,7 @@ The driver will use the new RDRAND instruction to produce high-quality, high-performance
entropy and random number.
- RNG Algoritnms defined in UEFI 2.4:
+ RNG Algorithms defined in UEFI 2.4:
- EFI_RNG_ALGORITHM_SP800_90_CTR_256_GUID - Supported
(RDRAND implements a hardware NIST SP800-90 AES-CTR-256 based DRBG)
- EFI_RNG_ALGORITHM_RAW - Supported
|