From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from us-smtp-1.mimecast.com (us-smtp-1.mimecast.com [205.139.110.120]) by mx.groups.io with SMTP id smtpd.web09.2063.1578044505149353102 for ; Fri, 03 Jan 2020 01:41:45 -0800 Authentication-Results: mx.groups.io; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=bGZYyrHU; spf=pass (domain: redhat.com, ip: 205.139.110.120, mailfrom: philmd@redhat.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1578044504; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=R3f15Tw6BmQnZYRn3yiuHm5TjwyPzE0WvIoeEejDNjU=; b=bGZYyrHUTeoTvo3YArjhYyYTpox6qiI6+hvAXS2bX+VA7hNrDQl8ZJgaqkMjObXDvs9pf9 pREx+0IfVlQniIQYRkaXIRsCanxRQ+5qPo5QNAUYoHVYMU7jyyeBSc0IrQmlVQ4zXHUHZL SLW2kxq1IpLNxXn0x2TpK4jHOuVjGr8= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-330-i6Nn0Cq7NF2LmaBx37SCpg-1; Fri, 03 Jan 2020 04:41:42 -0500 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 8B42C801E7E; Fri, 3 Jan 2020 09:41:41 +0000 (UTC) Received: from x1w.redhat.com (ovpn-116-190.ams2.redhat.com [10.36.116.190]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 7D74C60BF7; Fri, 3 Jan 2020 09:41:39 +0000 (UTC) From: =?UTF-8?B?UGhpbGlwcGUgTWF0aGlldS1EYXVkw6k=?= To: devel@edk2.groups.io Cc: Antoine Coeur , Jiewen Yao , Jian J Wang , Chao Zhang , Philippe Mathieu-Daude Subject: [PATCH v2 62/78] SecurityPkg: Fix few typos Date: Fri, 3 Jan 2020 10:07:56 +0100 Message-Id: <20200103090812.10592-63-philmd@redhat.com> In-Reply-To: <20200103090812.10592-1-philmd@redhat.com> References: <20200103090812.10592-1-philmd@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-MC-Unique: i6Nn0Cq7NF2LmaBx37SCpg-1 X-Mimecast-Spam-Score: 0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable From: Antoine Coeur Fix few typos in comments and documentation. Cc: Jiewen Yao Cc: Jian J Wang Cc: Chao Zhang Signed-off-by: Antoine Coeur Reviewed-by: Philippe Mathieu-Daude Signed-off-by: Philippe Mathieu-Daude --- .../Library/PlatformSecureLibNull/PlatformSecureLibNull.inf | 2 +- .../DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceLib.c | 2 +- .../Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c | 2 +- SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c | 2 +- .../HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.c | 2 +- .../HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.c | 2 +- SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c | 2 +- SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c | 2 +- .../Library/PlatformSecureLibNull/PlatformSecureLibNull.uni | 2 +- 9 files changed, 9 insertions(+), 9 deletions(-) diff --git a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNul= l.inf b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf index 9ae597d381fc..85607aa645a1 100644 --- a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf +++ b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf @@ -1,5 +1,5 @@ ## @file -# NULL platform secure library instance that alway returns TRUE for a use= r physical present +# NULL platform secure library instance that always returns TRUE for a us= er physical present # # NULL PlatformSecureLib instance does NOT really detect whether a physic= al present # user exists but returns TRUE directly. This instance can be used to ver= ify security diff --git a/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPr= esenceLib.c b/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalP= resenceLib.c index 174172d5d7a5..1a9bd4659a65 100644 --- a/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceL= ib.c +++ b/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceL= ib.c @@ -175,7 +175,7 @@ TpmPhysicalPresence ( @param[in] TcgProtocol EFI TCG Protocol instance. @param[in] Ordinal TPM command code. @param[in] AdditionalParameterSize Additional parameter size. - @param[in] AdditionalParameters Pointer to the Additional paramaters= . + @param[in] AdditionalParameters Pointer to the Additional parameters= . =20 @retval TCG_PP_OPERATION_RESPONSE_BIOS_FAILURE Error occurred during se= nding command to TPM or receiving response from = TPM. diff --git a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLi= b.c b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c index 04b9b0d7fbf3..5ea2d3ba8ed1 100644 --- a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c +++ b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c @@ -471,7 +471,7 @@ DxeTpm2MeasureBootHandler ( Status =3D gBS->LocateDevicePath (&gEfiBlockIoProtocolGuid, &DevicePathN= ode, &Handle); if (!EFI_ERROR (Status) && !mTcg2MeasureGptTableFlag) { // - // Find the gpt partion on the given devicepath + // Find the gpt partition on the given devicepath // DevicePathNode =3D OrigDevicePathNode; ASSERT (DevicePathNode !=3D NULL); diff --git a/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.= c b/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c index 1f2eed29a1df..d5aeb35eb72c 100644 --- a/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c +++ b/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c @@ -769,7 +769,7 @@ DxeTpmMeasureBootHandler ( Status =3D gBS->LocateDevicePath (&gEfiBlockIoProtocolGuid, &DevicePathN= ode, &Handle); if (!EFI_ERROR (Status) && !mMeasureGptTableFlag) { // - // Find the gpt partion on the given devicepath + // Find the gpt partition on the given devicepath // DevicePathNode =3D OrigDevicePathNode; ASSERT (DevicePathNode !=3D NULL); diff --git a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoR= outerDxe.c b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoR= outerDxe.c index a7cb05849c00..7a0f61efbb8c 100644 --- a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDx= e.c +++ b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDx= e.c @@ -1,6 +1,6 @@ /** @file This library is BaseCrypto router. It will redirect hash request to each= individual - hash handler registerd, such as SHA1, SHA256. + hash handler registered, such as SHA1, SHA256. Platform can use PcdTpm2HashMask to mask some hash engines. =20 Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.
diff --git a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoR= outerPei.c b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoR= outerPei.c index d31c8b0782d4..42cb562f67d3 100644 --- a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPe= i.c +++ b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPe= i.c @@ -1,6 +1,6 @@ /** @file This library is BaseCrypto router. It will redirect hash request to each= individual - hash handler registerd, such as SHA1, SHA256. + hash handler registered, such as SHA1, SHA256. Platform can use PcdTpm2HashMask to mask some hash engines. =20 Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.
diff --git a/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c b/Secu= rityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c index a96862f93733..42282e33a913 100644 --- a/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c +++ b/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c @@ -519,7 +519,7 @@ IsValidTimestamp ( @param[in] SignedData Pointer to buffer containing ASN.1 DER-encod= ed PKCS7 signature. @param[in] SignedDataSize The size of SignedData buffer in bytes. - @param[in] InHash Pointer to the buffer containing the hash of= the mesage data + @param[in] InHash Pointer to the buffer containing the hash of= the message data previously signed and to be verified. @param[in] InHashSize The size of InHash buffer in bytes. @param[in] RevokedDb Pointer to a list of pointers to EFI_SIGNATU= RE_LIST diff --git a/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c b/SecurityPk= g/RandomNumberGenerator/RngDxe/RngDxe.c index 90e54a89ce2b..13d3dbd0bfbe 100644 --- a/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c +++ b/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c @@ -4,7 +4,7 @@ The driver will use the new RDRAND instruction to produce high-quality, = high-performance entropy and random number. =20 - RNG Algoritnms defined in UEFI 2.4: + RNG Algorithms defined in UEFI 2.4: - EFI_RNG_ALGORITHM_SP800_90_CTR_256_GUID - Supported (RDRAND implements a hardware NIST SP800-90 AES-CTR-256 based DRBG) - EFI_RNG_ALGORITHM_RAW - Supported diff --git a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNul= l.uni b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.uni index e5c9d1020ff9..860b8cbb5a05 100644 --- a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.uni +++ b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.uni @@ -1,5 +1,5 @@ // /** @file -// NULL platform secure library instance that alway returns TRUE for a use= r physical present +// NULL platform secure library instance that always returns TRUE for a us= er physical present // // NULL PlatformSecureLib instance does NOT really detect whether a physic= al present // user exists but returns TRUE directly. This instance can be used to ver= ify security --=20 2.21.0