From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga04.intel.com (mga04.intel.com [192.55.52.120]) (using TLSv1 with cipher CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 79E951A1E43 for ; Tue, 25 Oct 2016 17:53:19 -0700 (PDT) Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by fmsmga104.fm.intel.com with ESMTP; 25 Oct 2016 17:53:19 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.31,548,1473145200"; d="scan'208";a="23676544" Received: from fmsmsx107.amr.corp.intel.com ([10.18.124.205]) by fmsmga005.fm.intel.com with ESMTP; 25 Oct 2016 17:53:19 -0700 Received: from fmsmsx123.amr.corp.intel.com (10.18.125.38) by fmsmsx107.amr.corp.intel.com (10.18.124.205) with Microsoft SMTP Server (TLS) id 14.3.248.2; Tue, 25 Oct 2016 17:53:18 -0700 Received: from shsmsx101.ccr.corp.intel.com (10.239.4.153) by fmsmsx123.amr.corp.intel.com (10.18.125.38) with Microsoft SMTP Server (TLS) id 14.3.248.2; Tue, 25 Oct 2016 17:53:18 -0700 Received: from shsmsx102.ccr.corp.intel.com ([169.254.2.206]) by SHSMSX101.ccr.corp.intel.com ([169.254.1.104]) with mapi id 14.03.0248.002; Wed, 26 Oct 2016 08:53:15 +0800 From: "Fu, Siyuan" To: Gary Lin , "edk2-devel@lists.01.org" CC: "Wu, Jiaxin" Thread-Topic: [edk2] [PATCH 23/33] NetworkPkg: Fix typos in comments Thread-Index: AQHSKdbuLsqkitew20evyaw37/IAdqC58tPA Date: Wed, 26 Oct 2016 00:53:14 +0000 Message-ID: References: <20161019070138.16424-1-glin@suse.com> <20161019070138.16424-24-glin@suse.com> In-Reply-To: <20161019070138.16424-24-glin@suse.com> Accept-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ctpclassification: CTP_IC x-titus-metadata-40: eyJDYXRlZ29yeUxhYmVscyI6IiIsIk1ldGFkYXRhIjp7Im5zIjoiaHR0cDpcL1wvd3d3LnRpdHVzLmNvbVwvbnNcL0ludGVsMyIsImlkIjoiYjNhN2MzNjMtODgyOC00ODM4LTg5MWItNGI5MzI0YWQ0NGEyIiwicHJvcHMiOlt7Im4iOiJDVFBDbGFzc2lmaWNhdGlvbiIsInZhbHMiOlt7InZhbHVlIjoiQ1RQX0lDIn1dfV19LCJTdWJqZWN0TGFiZWxzIjpbXSwiVE1DVmVyc2lvbiI6IjE1LjkuNi42IiwiVHJ1c3RlZExhYmVsSGFzaCI6IjNwQ0RhUmI0VWwwUWQrU0UyUWFqaUdTRjNcL3l1ZEdLQms4Nm9iR0xsZUxrPSJ9 x-originating-ip: [10.239.127.40] MIME-Version: 1.0 Subject: Re: [PATCH 23/33] NetworkPkg: Fix typos in comments X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 26 Oct 2016 00:53:19 -0000 Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable NetworkPkg patch committed d1c85a17fa8623e3fe60a6fe398f01e46d427a96 BestRegards Fu Siyuan > -----Original Message----- > From: edk2-devel [mailto:edk2-devel-bounces@lists.01.org] On Behalf Of > Gary Lin > Sent: Wednesday, October 19, 2016 3:01 PM > To: edk2-devel@lists.01.org > Cc: Fu, Siyuan ; Wu, Jiaxin > Subject: [edk2] [PATCH 23/33] NetworkPkg: Fix typos in comments >=20 > - assocated -> associated > - malformated -> malformatted > - mal-formated -> mal-formatted > - formated -> formatted > - octects -> octets > - responsiblity -> responsibility > - enought -> enough > - immediatly -> immediately > - integar -> integer > - Alogrithem -> Algorithm > - Initializeion -> Initialization > - primelenght -> primelength > - Vlaue -> Value > - perfoms -> performs > - randome -> random > - verifed -> verified > - finallization -> finalization > - Intializes -> Initializes > - specifed -> specified > - if -> If > - Decrption -> Decryption > - Autahentication -> Authentication > - informatino -> information > - alogrithm -> algorithm > - Authenticaion -> Authentication > - Alogrithem -> Algorithm > - containning -> containing > - paramter -> parameter >=20 > Cc: Siyuan Fu > Cc: Jiaxin Wu > Contributed-under: TianoCore Contribution Agreement 1.0 > Signed-off-by: Gary Lin > --- > NetworkPkg/Application/Ping6/Ping6.c | 8 +-- > NetworkPkg/IScsiDxe/IScsiProto.c | 4 +- > NetworkPkg/Ip6Dxe/Ip6ConfigImpl.c | 2 +- > NetworkPkg/Ip6Dxe/Ip6Option.c | 16 ++--- > NetworkPkg/Ip6Dxe/Ip6Option.h | 10 +-- > NetworkPkg/Ip6Dxe/Ip6Output.c | 8 +-- > NetworkPkg/IpSecDxe/IpSecCryptIo.c | 50 +++++++-------- > NetworkPkg/IpSecDxe/IpSecCryptIo.h | 66 ++++++++++---------- > 8 files changed, 82 insertions(+), 82 deletions(-) >=20 > diff --git a/NetworkPkg/Application/Ping6/Ping6.c > b/NetworkPkg/Application/Ping6/Ping6.c > index 55314e5..66daac2 100644 > --- a/NetworkPkg/Application/Ping6/Ping6.c > +++ b/NetworkPkg/Application/Ping6/Ping6.c > @@ -1103,7 +1103,7 @@ InitializePing6 ( > BufferSize =3D 16; >=20 > // > - // Parse the paramter of count number. > + // Parse the parameter of count number. > // > ValueStr =3D ShellCommandLineGetValue (ParamPackage, L"-n"); > ValueStrPtr =3D ValueStr; > @@ -1120,7 +1120,7 @@ InitializePing6 ( > } > } > // > - // Parse the paramter of buffer size. > + // Parse the parameter of buffer size. > // > ValueStr =3D ShellCommandLineGetValue (ParamPackage, L"-l"); > ValueStrPtr =3D ValueStr; > @@ -1141,7 +1141,7 @@ InitializePing6 ( > ZeroMem (&DstAddress, sizeof (EFI_IPv6_ADDRESS)); >=20 > // > - // Parse the paramter of source ip address. > + // Parse the parameter of source ip address. > // > ValueStr =3D ShellCommandLineGetValue (ParamPackage, L"-s"); > ValueStrPtr =3D ValueStr; > @@ -1155,7 +1155,7 @@ InitializePing6 ( > } > } > // > - // Parse the paramter of destination ip address. > + // Parse the parameter of destination ip address. > // > NonOptionCount =3D ShellCommandLineGetCount(ParamPackage); > ValueStr =3D ShellCommandLineGetRawValue (ParamPackage, > (UINT32)(NonOptionCount-1)); > diff --git a/NetworkPkg/IScsiDxe/IScsiProto.c > b/NetworkPkg/IScsiDxe/IScsiProto.c > index 88d9bdd..eb77d75 100644 > --- a/NetworkPkg/IScsiDxe/IScsiProto.c > +++ b/NetworkPkg/IScsiDxe/IScsiProto.c > @@ -786,7 +786,7 @@ IScsiPrepareLoginReq ( >=20 > case ISCSI_LOGIN_OPERATIONAL_NEGOTIATION: > // > - // Only negotiate the paramter once. > + // Only negotiate the parameter once. > // > if (!Conn->ParamNegotiated) { > IScsiFillOpParams (Conn, Nbuf); > @@ -2117,7 +2117,7 @@ IScsiNewDataSegment ( >=20 > @param[in] Packet The EXT SCSI PASS THRU request packet containing th= e > SCSI command. > @param[in] Lun The LUN. > - @param[in] Tcb The tcb assocated with this SCSI command. > + @param[in] Tcb The tcb associated with this SCSI command. >=20 > @return The created iSCSI SCSI command PDU. > @retval NULL Other errors as indicated. > diff --git a/NetworkPkg/Ip6Dxe/Ip6ConfigImpl.c > b/NetworkPkg/Ip6Dxe/Ip6ConfigImpl.c > index 75ecec1..9b6a62e 100644 > --- a/NetworkPkg/Ip6Dxe/Ip6ConfigImpl.c > +++ b/NetworkPkg/Ip6Dxe/Ip6ConfigImpl.c > @@ -121,7 +121,7 @@ Ip6ConfigOnPolicyChanged ( >=20 > if (NewPolicy =3D=3D Ip6ConfigPolicyAutomatic) { > // > - // Set paramters to trigger router solicitation sending in timer > handler. > + // Set parameters to trigger router solicitation sending in timer > handler. > // > IpSb->RouterAdvertiseReceived =3D FALSE; > IpSb->SolicitTimer =3D IP6_MAX_RTR_SOLICITATIONS; > diff --git a/NetworkPkg/Ip6Dxe/Ip6Option.c b/NetworkPkg/Ip6Dxe/Ip6Option.= c > index 9a91fd7..21d28b6 100644 > --- a/NetworkPkg/Ip6Dxe/Ip6Option.c > +++ b/NetworkPkg/Ip6Dxe/Ip6Option.c > @@ -18,7 +18,7 @@ > /** > Validate the IP6 option format for both the packets we received > and that we will transmit. It will compute the ICMPv6 error message > fields > - if the option is malformated. > + if the option is malformatted. >=20 > @param[in] IpSb The IP6 service data. > @param[in] Packet The to be validated packet. > @@ -29,7 +29,7 @@ >=20 >=20 > @retval TRUE The option is properly formatted. > - @retval FALSE The option is malformated. > + @retval FALSE The option is malformatted. >=20 > **/ > BOOLEAN > @@ -126,7 +126,7 @@ Ip6IsOptionValid ( > @param[in] OptionLen The length of the whole option. >=20 > @retval TRUE The option is properly formatted. > - @retval FALSE The option is malformated. > + @retval FALSE The option is malformatted. >=20 > **/ > BOOLEAN > @@ -231,7 +231,7 @@ Ip6IsValidProtocol ( > /** > Validate the IP6 extension header format for both the packets we > received > and that we will transmit. It will compute the ICMPv6 error message > fields > - if the option is mal-formated. > + if the option is mal-formatted. >=20 > @param[in] IpSb The IP6 service instance. This is an optiona= l > parameter. > @param[in] Packet The data of the packet. Ignored if NULL. > @@ -252,8 +252,8 @@ Ip6IsValidProtocol ( > @param[out] Fragmented Indicate whether the packet is fragmented. > This is an optional parameter that may be > NULL. >=20 > - @retval TRUE The option is properly formated. > - @retval FALSE The option is malformated. > + @retval TRUE The option is properly formatted. > + @retval FALSE The option is malformatted. >=20 > **/ > BOOLEAN > @@ -436,7 +436,7 @@ Ip6IsExtsValid ( >=20 > // > // RFC2460, ICMP Parameter Problem message with code 0 should be > sent > - // if the length of a fragment is not a multiple of 8 octects and > the M > + // if the length of a fragment is not a multiple of 8 octets and > the M > // flag of that fragment is 1, pointing to the Payload length fiel= d > of the > // fragment packet. > // > @@ -606,7 +606,7 @@ Ip6FillHopByHop ( > @param[in] ExtHdrsLen The length of the extension headers. > @param[in] FragmentOffset The fragment offset of the data following > the header. > @param[out] UpdatedExtHdrs The updated ExtHdrs with Fragment header > inserted. > - It's caller's responsiblity to free this > buffer. > + It's caller's responsibility to free this > buffer. >=20 > @retval EFI_OUT_OF_RESOURCES Failed to finish the operation due to lak= e > of > resource. > diff --git a/NetworkPkg/Ip6Dxe/Ip6Option.h b/NetworkPkg/Ip6Dxe/Ip6Option.= h > index b62a042..242ec51 100644 > --- a/NetworkPkg/Ip6Dxe/Ip6Option.h > +++ b/NetworkPkg/Ip6Dxe/Ip6Option.h > @@ -51,7 +51,7 @@ typedef enum { > /** > Validate the IP6 extension header format for both the packets we > received > and that we will transmit. It will compute the ICMPv6 error message > fields > - if the option is mal-formated. > + if the option is mal-formatted. >=20 > @param[in] IpSb The IP6 service instance. This is an optiona= l > parameter. > @param[in] Packet The data of the packet. Ignored if NULL. > @@ -72,8 +72,8 @@ typedef enum { > @param[out] Fragmented Indicate whether the packet is fragmented. > This is an optional parameter that may be > NULL. >=20 > - @retval TRUE The option is properly formated. > - @retval FALSE The option is malformated. > + @retval TRUE The option is properly formatted. > + @retval FALSE The option is malformatted. >=20 > **/ > BOOLEAN > @@ -122,7 +122,7 @@ Ip6FillHopByHop ( > @param[in] ExtHdrsLen The length of the extension headers. > @param[in] FragmentOffset The fragment offset of the data following > the header. > @param[out] UpdatedExtHdrs The updated ExtHdrs with Fragment header > inserted. > - It's caller's responsiblity to free this > buffer. > + It's caller's responsibility to free this > buffer. >=20 > @retval EFI_OUT_OF_RESOURCES Failed to finish the operation due to lak= e > of > resource. > @@ -179,7 +179,7 @@ Ip6CopyExts ( > @param[in] OptionLen The length of the whole option. >=20 > @retval TRUE The option is properly formatted. > - @retval FALSE The option is malformated. > + @retval FALSE The option is malformatted. >=20 > **/ > BOOLEAN > diff --git a/NetworkPkg/Ip6Dxe/Ip6Output.c b/NetworkPkg/Ip6Dxe/Ip6Output.= c > index fe642d3..8330e37 100644 > --- a/NetworkPkg/Ip6Dxe/Ip6Output.c > +++ b/NetworkPkg/Ip6Dxe/Ip6Output.c > @@ -23,7 +23,7 @@ UINT32 mIp6Id; >=20 > @param[in] IpSb Points to an IP6 service binding > instance. > @param[out] SourceList The list entry head of all source > addresses. > - It is the caller's responsiblity to > free the > + It is the caller's responsibility to > free the > resources. > @param[out] SourceCount The number of source addresses. >=20 > @@ -364,7 +364,7 @@ Ip6SysPacketSent ( > @param[in] LastHeader The pointer of next header of last > extension header. > @param[in] HeadLen The length of the unfragmented part of th= e > IP6 header. >=20 > - @retval EFI_BAD_BUFFER_SIZE There is no enought room in the head spac= e > of > + @retval EFI_BAD_BUFFER_SIZE There is no enough room in the head space > of > Packet. > @retval EFI_SUCCESS The operation performed successfully. >=20 > @@ -726,7 +726,7 @@ Ip6Output ( > } >=20 > // > - // Send out multicast neighbor solicitation for address resolution > immediatly. > + // Send out multicast neighbor solicitation for address resolution > immediately. > // > Ip6CreateSNMulticastAddr (&NeighborCache->Neighbor, &Destination); > Status =3D Ip6SelectSourceAddress (IpSb, &NeighborCache->Neighbor, > &Source); > @@ -809,7 +809,7 @@ Ip6Output ( > // > // OK, selected the source and route, fragment the packet then send > // them. Tag each fragment other than the first one as spawn from it. > - // Each extension header is an integar multiple of 8 octets long, in > + // Each extension header is an integer multiple of 8 octets long, in > // order to retain 8-octet alignment for subsequent headers. > // > Mtu =3D IpSb->MaxPacketSize + sizeof (EFI_IP6_HEADER); > diff --git a/NetworkPkg/IpSecDxe/IpSecCryptIo.c > b/NetworkPkg/IpSecDxe/IpSecCryptIo.c > index dca4423..31fa4fb 100644 > --- a/NetworkPkg/IpSecDxe/IpSecCryptIo.c > +++ b/NetworkPkg/IpSecDxe/IpSecCryptIo.c > @@ -45,7 +45,7 @@ GLOBAL_REMOVE_IF_UNREFERENCED HASH_ALGORITHM > mIpsecHashAlgorithmList[IPSEC_HASH_ > BOOLEAN mInitialRandomSeed =3D FALSE; >=20 > /** > - Get the block size of specified encryption alogrithm. > + Get the block size of specified encryption algorithm. >=20 > @param[in] AlgorithmId The encryption algorithm ID. >=20 > @@ -69,7 +69,7 @@ IpSecGetEncryptBlockSize ( > } >=20 > /** > - Get the key length of the specified encryption alogrithm. > + Get the key length of the specified encryption algorithm. >=20 > @param[in] AlgorithmId The encryption algorithm ID. >=20 > @@ -93,7 +93,7 @@ IpSecGetEncryptKeyLength ( > } >=20 > /** > - Get the IV size of the specified encryption alogrithm. > + Get the IV size of the specified encryption algorithm. >=20 > @param[in] AlgorithmId The encryption algorithm ID. >=20 > @@ -144,7 +144,7 @@ IpSecGetHmacDigestLength ( > } >=20 > /** > - Get the ICV size of the specified Authenticaion alogrithm. > + Get the ICV size of the specified Authenticaion algorithm. >=20 > @param[in] AlgorithmId The Authentication algorithm ID. >=20 > @@ -191,7 +191,7 @@ IpSecGenerateIv ( > } >=20 > /** > - Get index of the specified encryption alogrithm from the > mIpsecEncryptAlgorithemList. > + Get index of the specified encryption algorithm from the > mIpsecEncryptAlgorithmList. >=20 > @param[in] AlgorithmId The encryption algorithm ID. >=20 > @@ -215,7 +215,7 @@ IpSecGetIndexFromEncList ( > } >=20 > /** > - Get index of the specified encryption alogrithm from the > mIpsecAuthAlgorithemList. > + Get index of the specified encryption algorithm from the > mIpsecAuthAlgorithmList. >=20 > @param[in] AlgorithmId The encryption algorithm ID. >=20 > @@ -245,14 +245,14 @@ IpSecGetIndexFromAuthList ( > Encrypt the buffer. >=20 > This function calls relevant encryption interface from CryptoLib > according to > - the input alogrithm ID. The InData should be multiple of block size. > This function > + the input algorithm ID. The InData should be multiple of block size. > This function > doesn't perform the padding. If it has the Ivec data, the length of it > should be > same with the block size. The block size is different from the > different algorithm. >=20 > - @param[in] AlgorithmId The Alogrithem identification defined > in RFC. > + @param[in] AlgorithmId The Algorithm identification defined i= n > RFC. > @param[in] Key Pointer to the buffer containing > encrypting key. > @param[in] KeyBits The length of the key in bits. > - @param[in] Ivec Point to the buffer containning the > Initializeion > + @param[in] Ivec Point to the buffer containing the > Initialization > Vector (IV) data. > @param[in] InData Point to the buffer containing the dat= a > to be > encrypted. > @@ -331,14 +331,14 @@ IpSecCryptoIoEncrypt ( > Decrypts the buffer. >=20 > This function calls relevant Decryption interface from CryptoLib > according to > - the input alogrithm ID. The InData should be multiple of block size. > This function > + the input algorithm ID. The InData should be multiple of block size. > This function > doesn't perform the padding. If it has the Ivec data, the length of it > should be > same with the block size. The block size is different from the > different algorithm. >=20 > - @param[in] AlgorithmId The Alogrithem identification defined > in RFC. > + @param[in] AlgorithmId The Algorithm identification defined i= n > RFC. > @param[in] Key Pointer to the buffer containing > encrypting key. > @param[in] KeyBits The length of the key in bits. > - @param[in] Ivec Point to the buffer containning the > Initializeion > + @param[in] Ivec Point to the buffer containing the > Initialization > Vector (IV) data. > @param[in] InData Point to the buffer containing the dat= a > to be > decrypted. > @@ -417,9 +417,9 @@ IpSecCryptoIoDecrypt ( > Digests the Payload with key and store the result into the OutData. >=20 > This function calls relevant Hmac interface from CryptoLib according t= o > - the input alogrithm ID. It computes all datas from InDataFragment and > output > + the input algorithm ID. It computes all datas from InDataFragment and > output > the result into the OutData buffer. If the OutDataSize is larger than > the related > - HMAC alogrithm output size, return EFI_INVALID_PARAMETER. > + HMAC algorithm output size, return EFI_INVALID_PARAMETER. >=20 > @param[in] AlgorithmId The authentication Identification. > @param[in] Key Pointer of the authentication key. > @@ -540,9 +540,9 @@ Exit: > Digests the Payload and store the result into the OutData. >=20 > This function calls relevant Hash interface from CryptoLib according t= o > - the input alogrithm ID. It computes all datas from InDataFragment and > output > + the input algorithm ID. It computes all datas from InDataFragment and > output > the result into the OutData buffer. If the OutDataSize is larger than > the related > - Hash alogrithm output size, return EFI_INVALID_PARAMETER. > + Hash algorithm output size, return EFI_INVALID_PARAMETER. >=20 > @param[in] AlgorithmId The authentication Identification. > @param[in] InDataFragment A list contains all data to be > authenticated. > @@ -657,14 +657,14 @@ Exit: > Generates the Diffie-Hellman public key. >=20 > This function first initiate a DHContext, then call the DhSetParameter= () > to set > - the prime and primelenght, at end call the DhGenerateKey() to generate= s > random > + the prime and primelength, at end call the DhGenerateKey() to generate= s > random > secret exponent, and computes the public key. The output returned via > parameter > PublicKey and PublicKeySize. DH context is updated accordingly. If the > PublicKey > buffer is too small to hold the public key, EFI_INVALID_PARAMETER is > returned > and PublicKeySize is set to the required buffer size to obtain the > public key. >=20 > @param[in, out] DhContext Pointer to the DH context. > - @param[in] Generator Vlaue of generator. > + @param[in] Generator Value of generator. > @param[in] PrimeLength Length in bits of prime to be generate= d. > @param[in] Prime Pointer to the buffer to receive the > generated > prime number. > @@ -673,7 +673,7 @@ Exit: > For out, the size of data returned in > PublicKey > buffer in bytes. >=20 > - @retval EFI_SUCCESS The operation perfoms successfully. > + @retval EFI_SUCCESS The operation performs successfully. > @retval Otherwise The operation is failed. >=20 > **/ > @@ -725,7 +725,7 @@ Exit: > For out, the size of data returned i= n > Key > buffer in bytes. >=20 > - @retval EFI_SUCCESS The operation perfoms successfully. > + @retval EFI_SUCCESS The operation performs successfully. > @retval Otherwise The operation is failed. >=20 > **/ > @@ -750,7 +750,7 @@ IpSecCryptoIoDhComputeKey ( >=20 > @param[in, out] DhContext Pointer to the DH context to be > freed. >=20 > - @retval EFI_SUCCESS The operation perfoms successfully. > + @retval EFI_SUCCESS The operation performs successfully. > @retval EFI_INVALID_PARAMETER The DhContext is NULL. >=20 > **/ > @@ -773,9 +773,9 @@ IpSecCryptoIoFreeDh ( > If the Random Generator wasn't initiated, initiate it first, then call > RandomBytes. >=20 > @param[out] OutBuffer Pointer to buffer to receive random valu= e. > - @param[in] Bytes Size of randome bytes to generate. > + @param[in] Bytes Size of random bytes to generate. >=20 > - @retval EFI_SUCCESS The operation perfoms successfully. > + @retval EFI_SUCCESS The operation performs successfully. > @retval Otherwise The operation is failed. >=20 > **/ > @@ -869,9 +869,9 @@ IpSecCryptoIoAuthDataWithCertificate ( > @param[in] CertLen The size of Certificate in bytes. > @param[in] InCa Pointer to the CA certificate > @param[in] CaLen The size of CA certificate in bytes. > - @param[in] InData Pointer to octect message hash to be > checked. > + @param[in] InData Pointer to octet message hash to be > checked. > @param[in] InDataSize Size of the message hash in bytes. > - @param[in] Singnature The pointer to the RSA PKCS1-V1_5 > signature to be verifed. > + @param[in] Singnature The pointer to the RSA PKCS1-V1_5 > signature to be verified. > @param[in] SigSize Size of signature in bytes. >=20 > @retval TRUE Valid signature encoded in PKCS1-v1_5. > diff --git a/NetworkPkg/IpSecDxe/IpSecCryptIo.h > b/NetworkPkg/IpSecDxe/IpSecCryptIo.h > index 0e106af..0ef83eb 100644 > --- a/NetworkPkg/IpSecDxe/IpSecCryptIo.h > +++ b/NetworkPkg/IpSecDxe/IpSecCryptIo.h > @@ -104,7 +104,7 @@ BOOLEAN > ); >=20 > /** > - Prototype of HMAC finallization. > + Prototype of HMAC finalization. > Terminate a HMAC message digest operation and output the message diges= t. >=20 > If Context is NULL, then ASSERT(). > @@ -139,7 +139,7 @@ UINTN >=20 > /** > Prototype of Block Cipher initiation. > - Intializes the user-supplied key as the specifed context (key material= s) > for both > + Initializes the user-supplied key as the specified context (key > materials) for both > encryption and decryption operations. >=20 > If Context is NULL, then ASSERT(). > @@ -165,7 +165,7 @@ BOOLEAN > Encrypts plaintext message with the specified cipher. >=20 > If Context is NULL, then ASSERT(). > - if InData is NULL, then ASSERT(). > + If InData is NULL, then ASSERT(). > If Size of input data is not multiple of Cipher algorithm related bloc= k > size, > then ASSERT(). >=20 > @@ -193,7 +193,7 @@ BOOLEAN > Decrypts cipher message with specified cipher. >=20 > If Context is NULL, then ASSERT(). > - if InData is NULL, then ASSERT(). > + If InData is NULL, then ASSERT(). > If Size of input data is not a multiple of a certaion block size , the= n > ASSERT(). >=20 > @param[in] Context The specified Context. > @@ -256,7 +256,7 @@ BOOLEAN >=20 > This function performs digest on a data buffer of the specified size. > It can be called multiple times to compute the digest of long or > discontinuous data streams. > - Context should be already correctly intialized by HashInit(), and > should not be finalized > + Context should be already correctly initialized by HashInit(), and > should not be finalized > by HashFinal(). Behavior with invalid context is undefined. >=20 > If Context is NULL, then ASSERT(). > @@ -285,7 +285,7 @@ BOOLEAN > This function completes hash computation and retrieves the digest valu= e > into > the specified memory. After this function has been called, the context > cannot > be used again. > - context should be already correctly intialized by HashInit(), and > should not be > + context should be already correctly initialized by HashInit(), and > should not be > finalized by HashFinal(). Behavior with invalid context is undefined. >=20 > If Context is NULL, then ASSERT(). > @@ -339,13 +339,13 @@ typedef struct _ENCRYPT_ALGORITHM { > // > CRYPTO_CIPHER_ENCRYPT CipherEncrypt; > // > - // The Function pointer of Cipher Decrption. > + // The Function pointer of Cipher Decryption. > // > CRYPTO_CIPHER_DECRYPT CipherDecrypt; > } ENCRYPT_ALGORITHM; >=20 > // > -// The struct used to store the information and operation of > Autahentication algorithm. > +// The struct used to store the information and operation of > Authentication algorithm. > // > typedef struct _AUTH_ALGORITHM { > // > @@ -383,7 +383,7 @@ typedef struct _AUTH_ALGORITHM { > } AUTH_ALGORITHM; >=20 > // > -// The struct used to store the informatino and operation of Hash > algorithm. > +// The struct used to store the information and operation of Hash > algorithm. > // > typedef struct _HASH_ALGORITHM { > // > @@ -421,7 +421,7 @@ typedef struct _HASH_ALGORITHM { > } HASH_ALGORITHM; >=20 > /** > - Get the IV size of specified encryption alogrithm. > + Get the IV size of specified encryption algorithm. >=20 > @param[in] AlgorithmId The encryption algorithm ID. >=20 > @@ -434,7 +434,7 @@ IpSecGetEncryptIvLength ( > ); >=20 > /** > - Get the block size of specified encryption alogrithm. > + Get the block size of specified encryption algorithm. >=20 > @param[in] AlgorithmId The encryption algorithm ID. >=20 > @@ -447,7 +447,7 @@ IpSecGetEncryptBlockSize ( > ); >=20 > /** > - Get the required key length of the specified encryption alogrithm. > + Get the required key length of the specified encryption algorithm. >=20 > @param[in] AlgorithmId The encryption algorithm ID. >=20 > @@ -460,7 +460,7 @@ IpSecGetEncryptKeyLength ( > ); >=20 > /** > - Get the ICV size of the specified Authenticaion alogrithm. > + Get the ICV size of the specified Authentication algorithm. >=20 > @param[in] AlgorithmId The Authentication algorithm ID. >=20 > @@ -475,7 +475,7 @@ IpSecGetIcvLength ( > /** > Get the HMAC digest length by the specified Algorithm ID. >=20 > - @param[in] AlgorithmId The specified Alogrithm ID. > + @param[in] AlgorithmId The specified Algorithm ID. >=20 > @return The digest length of the specified Authentication Algorithm ID= . >=20 > @@ -505,14 +505,14 @@ IpSecGenerateIv ( > Encrypt the buffer. >=20 > This function calls relevant encryption interface from CryptoLib > according to > - the input alogrithm ID. The InData should be multiple of block size. > This function > + the input algorithm ID. The InData should be multiple of block size. > This function > doesn't perform the padding. If it has the Ivec data, the length of it > should be > same with the block size. The block size is different from the > different algorithm. >=20 > - @param[in] AlgorithmId The Alogrithem identification defined > in RFC. > + @param[in] AlgorithmId The Algorithm identification defined i= n > RFC. > @param[in] Key Pointer to the buffer containing > encrypting key. > @param[in] KeyBits The length of the key in bits. > - @param[in] Ivec Point to the buffer containning the > Initializeion > + @param[in] Ivec Point to the buffer containing the > Initialization > Vector (IV) data. > @param[in] InData Point to the buffer containing the dat= a > to be > encrypted. > @@ -540,14 +540,14 @@ IpSecCryptoIoEncrypt ( > Decrypts the buffer. >=20 > This function calls relevant Decryption interface from CryptoLib > according to > - the input alogrithm ID. The InData should be multiple of block size. > This function > + the input algorithm ID. The InData should be multiple of block size. > This function > doesn't perform the padding. If it has the Ivec data, the length of it > should be > same with the block size. The block size is different from the > different algorithm. >=20 > - @param[in] AlgorithmId The Alogrithem identification defined > in RFC. > + @param[in] AlgorithmId The Algorithm identification defined i= n > RFC. > @param[in] Key Pointer to the buffer containing > encrypting key. > @param[in] KeyBits The length of the key in bits. > - @param[in] Ivec Point to the buffer containning the > Initializeion > + @param[in] Ivec Point to the buffer containing the > Initialization > Vector (IV) data. > @param[in] InData Point to the buffer containing the dat= a > to be > decrypted. > @@ -575,9 +575,9 @@ IpSecCryptoIoDecrypt ( > Digests the Payload with key and store the result into the OutData. >=20 > This function calls relevant Hmac interface from CryptoLib according t= o > - the input alogrithm ID. It computes all datas from InDataFragment and > output > + the input algorithm ID. It computes all datas from InDataFragment and > output > the result into the OutData buffer. If the OutDataSize is larger than > the related > - HMAC alogrithm output size, return EFI_INVALID_PARAMETER. > + HMAC algorithm output size, return EFI_INVALID_PARAMETER. >=20 > @param[in] AlgorithmId The authentication Identification. > @param[in] Key Pointer of the authentication key. > @@ -609,9 +609,9 @@ IpSecCryptoIoHmac ( > Digests the Payload and store the result into the OutData. >=20 > This function calls relevant Hash interface from CryptoLib according t= o > - the input alogrithm ID. It computes all datas from InDataFragment and > output > + the input algorithm ID. It computes all datas from InDataFragment and > output > the result into the OutData buffer. If the OutDataSize is larger than > the related > - Hash alogrithm output size, return EFI_INVALID_PARAMETER. > + Hash algorithm output size, return EFI_INVALID_PARAMETER. >=20 > @param[in] AlgorithmId The authentication Identification. > @param[in] InDataFragment A list contains all data to be > authenticated. > @@ -640,14 +640,14 @@ IpSecCryptoIoHash ( > Generates the Diffie-Hellman public key. >=20 > This function first initiate a DHContext, then call the DhSetParameter= () > to set > - the prime and primelenght, at end call the DhGenerateKey() to generate= s > random > + the prime and primelength, at end call the DhGenerateKey() to generate= s > random > secret exponent, and computes the public key. The output returned via > parameter > PublicKey and PublicKeySize. DH context is updated accordingly. If the > PublicKey > buffer is too small to hold the public key, EFI_INVALID_PARAMETER is > returned > and PublicKeySize is set to the required buffer size to obtain the > public key. >=20 > @param[in, out] DhContext Pointer to the DH context. > - @param[in] Generator Vlaue of generator. > + @param[in] Generator Value of generator. > @param[in] PrimeLength Length in bits of prime to be generate= d. > @param[in] Prime Pointer to the buffer to receive the > generated > prime number. > @@ -656,7 +656,7 @@ IpSecCryptoIoHash ( > For out, the size of data returned in > PublicKey > buffer in bytes. >=20 > - @retval EFI_SUCCESS The operation perfoms successfully. > + @retval EFI_SUCCESS The operation performs successfully. > @retval Otherwise The operation is failed. >=20 > **/ > @@ -684,7 +684,7 @@ IpSecCryptoIoDhGetPublicKey ( > For out, the size of data returned i= n > Key > buffer in bytes. >=20 > - @retval EFI_SUCCESS The operation perfoms successfully. > + @retval EFI_SUCCESS The operation performs successfully. > @retval Otherwise The operation is failed. >=20 > **/ > @@ -702,7 +702,7 @@ IpSecCryptoIoDhComputeKey ( >=20 > @param[in, out] DhContext Pointer to the DH context to be > freed. >=20 > - @retval EFI_SUCCESS The operation perfoms successfully. > + @retval EFI_SUCCESS The operation performs successfully. > @retval EFI_INVALID_PARAMETER The DhContext is NULL. >=20 > **/ > @@ -717,9 +717,9 @@ IpSecCryptoIoFreeDh ( > If the Random Generator wasn't initiated, initiate it first, then call > RandomBytes. >=20 > @param[out] OutBuffer Pointer to buffer to receive random valu= e. > - @param[in] Bytes Size of randome bytes to generate. > + @param[in] Bytes Size of random bytes to generate. >=20 > - @retval EFI_SUCCESS The operation perfoms successfully. > + @retval EFI_SUCCESS The operation performs successfully. > @retval Otherwise The operation is failed. >=20 > **/ > @@ -762,9 +762,9 @@ IpSecCryptoIoAuthDataWithCertificate ( > @param[in] CertLen The size of Certificate in bytes. > @param[in] InCa Pointer to the CA certificate > @param[in] CaLen The size of CA certificate in bytes. > - @param[in] InData Pointer to octect message hash to be > checked. > + @param[in] InData Pointer to octet message hash to be > checked. > @param[in] InDataSize Size of the message hash in bytes. > - @param[in] Singnature The pointer to the RSA PKCS1-V1_5 > signature to be verifed. > + @param[in] Singnature The pointer to the RSA PKCS1-V1_5 > signature to be verified. > @param[in] SigSize Size of signature in bytes. >=20 > @retval TRUE Valid signature encoded in PKCS1-v1_5. > -- > 2.10.1 >=20 > _______________________________________________ > edk2-devel mailing list > edk2-devel@lists.01.org > https://lists.01.org/mailman/listinfo/edk2-devel