From: "Michael D Kinney" <michael.d.kinney@intel.com>
To: devel@edk2.groups.io
Cc: Jiewen Yao <jiewen.yao@intel.com>,
Jian J Wang <jian.j.wang@intel.com>,
Chao Zhang <chao.b.zhang@intel.com>
Subject: [Patch V3 0/2] SecurityPkg: Fix spelling errors
Date: Tue, 22 Oct 2019 17:03:27 -0700 [thread overview]
Message-ID: <20191023000329.17968-1-michael.d.kinney@intel.com> (raw)
https://bugzilla.tianocore.org/show_bug.cgi?id=2265
Same as V1, with the EFI_D_INFO to DEBUG_INFO change split out into its
own patch. V2 is dropped.
Cc: Jiewen Yao <jiewen.yao@intel.com>
Cc: Jian J Wang <jian.j.wang@intel.com>
Cc: Chao Zhang <chao.b.zhang@intel.com>
Signed-off-by: Michael D Kinney <michael.d.kinney@intel.com>
Michael D Kinney (1):
SecurityPkg: Change EFI_D_INFO to DEBUG_INFO
Sean Brogan (1):
SecurityPkg: Fix spelling errors
SecurityPkg/FvReportPei/FvReportPei.c | 4 ++--
SecurityPkg/Hash2DxeCrypto/Driver.c | 6 ++---
SecurityPkg/Hash2DxeCrypto/Driver.h | 4 ++--
SecurityPkg/HddPassword/HddPasswordDxe.c | 10 ++++----
SecurityPkg/HddPassword/HddPasswordDxe.h | 2 +-
.../HddPassword/HddPasswordStrings.uni | 2 +-
.../Guid/AuthenticatedVariableFormat.h | 2 +-
.../Include/Library/Tcg2PhysicalPresenceLib.h | 4 ++--
.../Include/Library/TcgStorageCoreLib.h | 12 +++++-----
SecurityPkg/Include/Library/Tpm2CommandLib.h | 2 +-
SecurityPkg/Include/Library/TpmCommLib.h | 2 +-
.../Ppi/FirmwareVolumeInfoPrehashedFV.h | 4 ++--
.../Library/AuthVariableLib/AuthService.c | 4 ++--
.../AuthVariableLib/AuthServiceInternal.h | 2 +-
.../Library/AuthVariableLib/AuthVariableLib.c | 4 ++--
.../DxeImageAuthenticationStatusLib.c | 2 +-
.../DxeImageVerificationLib.c | 10 ++++----
.../DxeRsa2048Sha256GuidedSectionExtractLib.c | 4 ++--
...xeRsa2048Sha256GuidedSectionExtractLib.inf | 2 +-
...xeRsa2048Sha256GuidedSectionExtractLib.uni | 2 +-
.../DxeTpm2MeasureBootLib.c | 4 ++--
.../DxeTpmMeasureBootLib.c | 4 ++--
.../DxeTpmMeasurementLib.c | 2 +-
.../HashInstanceLibSha1/HashInstanceLibSha1.c | 2 +-
.../HashInstanceLibSha256.c | 2 +-
.../HashInstanceLibSha384.c | 2 +-
.../HashInstanceLibSha512.c | 2 +-
SecurityPkg/Library/HashLibTpm2/HashLibTpm2.c | 2 +-
.../PeiRsa2048Sha256GuidedSectionExtractLib.c | 4 ++--
...eiRsa2048Sha256GuidedSectionExtractLib.inf | 2 +-
...eiRsa2048Sha256GuidedSectionExtractLib.uni | 2 +-
.../TcgStorageCoreLib/TcgStorageCore.c | 10 ++++----
.../TcgStorageCoreLib/TcgStorageUtil.c | 2 +-
.../TcgStorageOpalLib/TcgStorageOpalUtil.c | 6 ++---
.../Library/Tpm12CommandLib/Tpm12NvStorage.c | 2 +-
.../Library/Tpm12DeviceLibDTpm/Tpm12Tis.c | 2 +-
.../Library/Tpm2CommandLib/Tpm2Capability.c | 4 ++--
.../Library/Tpm2CommandLib/Tpm2Hierarchy.c | 2 +-
.../Tpm2DeviceLibDTpm/Tpm2DeviceLibDTpm.c | 2 +-
.../Tpm2DeviceLibDTpm/Tpm2InstanceLibDTpm.c | 2 +-
.../Library/Tpm2DeviceLibDTpm/Tpm2Ptp.c | 4 ++--
.../Library/Tpm2DeviceLibDTpm/Tpm2Tis.c | 4 ++--
SecurityPkg/Library/TpmCommLib/CommonHeader.h | 2 +-
SecurityPkg/Library/TpmCommLib/TisPc.c | 2 +-
.../Pkcs7VerifyDxe/Pkcs7VerifyDxe.c | 18 +++++++-------
.../RandomNumberGenerator/RngDxe/RdRand.c | 2 +-
SecurityPkg/SecurityPkg.dec | 18 +++++++-------
SecurityPkg/SecurityPkg.dsc | 2 +-
SecurityPkg/SecurityPkg.uni | 12 +++++-----
.../Tcg/MemoryOverwriteControl/TcgMor.c | 6 ++---
.../Tcg/MemoryOverwriteControl/TcgMor.inf | 2 +-
.../Tcg/MemoryOverwriteControl/TcgMor.uni | 2 +-
.../TcgMorLock.c | 4 ++--
.../TcgMorLock.h | 2 +-
.../TcgMorLock.uni | 4 ++--
.../TcgMorLockSmm.inf | 2 +-
.../Tcg/Opal/OpalPassword/OpalDriver.c | 6 ++---
.../Tcg/Opal/OpalPassword/OpalDriver.h | 6 ++---
SecurityPkg/Tcg/Opal/OpalPassword/OpalHii.c | 10 ++++----
SecurityPkg/Tcg/Opal/OpalPassword/OpalHii.h | 8 +++----
.../PhysicalPresencePei/PhysicalPresencePei.c | 2 +-
SecurityPkg/Tcg/Tcg2Config/Tcg2Config.vfr | 6 ++---
SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigDriver.c | 2 +-
SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigPeim.c | 4 ++--
SecurityPkg/Tcg/Tcg2Dxe/MeasureBootPeCoff.c | 2 +-
SecurityPkg/Tcg/Tcg2Dxe/Tcg2Dxe.c | 2 +-
SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.c | 16 ++++++-------
SecurityPkg/Tcg/Tcg2Smm/Tcg2Smm.c | 22 ++++++++---------
SecurityPkg/Tcg/Tcg2Smm/Tpm.asl | 6 ++---
.../Tcg/TcgConfigDxe/TcgConfigDriver.c | 2 +-
SecurityPkg/Tcg/TcgDxe/TcgDxe.c | 6 ++---
SecurityPkg/Tcg/TcgPei/TcgPei.c | 18 +++++++-------
SecurityPkg/Tcg/TcgSmm/Tpm.asl | 6 ++---
.../SecureBootConfigDriver.c | 2 +-
.../SecureBootConfigDxe.inf | 2 +-
.../SecureBootConfigDxe.uni | 2 +-
.../SecureBootConfigImpl.c | 24 +++++++++----------
.../SecureBootConfigImpl.h | 10 ++++----
.../SecureBootConfigMisc.c | 8 +++----
.../SecureBootConfigNvData.h | 4 ++--
.../SecureBootConfigStrings.uni | 4 ++--
81 files changed, 205 insertions(+), 205 deletions(-)
--
2.21.0.windows.1
next reply other threads:[~2019-10-23 0:03 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-10-23 0:03 Michael D Kinney [this message]
2019-10-23 0:03 ` [Patch V3 1/2] SecurityPkg: Change EFI_D_INFO to DEBUG_INFO Michael D Kinney
2019-10-23 6:23 ` Wang, Jian J
2019-10-23 0:03 ` [Patch V3 2/2] SecurityPkg: Fix spelling errors Michael D Kinney
2019-10-23 7:09 ` Wang, Jian J
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20191023000329.17968-1-michael.d.kinney@intel.com \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox