public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Long, Qin" <qin.long@intel.com>
To: Gary Lin <glin@suse.com>,
	"edk2-devel@lists.01.org" <edk2-devel@lists.01.org>
Cc: "Ye, Ting" <ting.ye@intel.com>
Subject: Re: [PATCH 05/33] CryptoPkg: Fix typos in comments
Date: Wed, 26 Oct 2016 03:00:33 +0000	[thread overview]
Message-ID: <BF2CCE9263284D428840004653A28B6E5154F5AF@SHSMSX103.ccr.corp.intel.com> (raw)
In-Reply-To: <20161019070138.16424-6-glin@suse.com>

Thanks. 
Reviewed-by: Qin Long <qin.long@intel.com> to CryptoPkg fixes.

Best Regards & Thanks,
LONG, Qin

> -----Original Message-----
> From: edk2-devel [mailto:edk2-devel-bounces@lists.01.org] On Behalf Of
> Gary Lin
> Sent: Wednesday, October 19, 2016 3:01 PM
> To: edk2-devel@lists.01.org
> Cc: Ye, Ting <ting.ye@intel.com>; Long, Qin <qin.long@intel.com>
> Subject: [edk2] [PATCH 05/33] CryptoPkg: Fix typos in comments
> 
> - intialized -> initialized
> - componenet -> component
> - compoents -> components
> - FAlSE -> FALSE
> - responsiblity -> responsibility
> - validility -> validity
> - procudure -> procedure
> - pamameter -> parameter
> - randome -> random
> - buiild -> build
> 
> Cc: Ting Ye <ting.ye@intel.com>
> Cc: Qin Long <qin.long@intel.com>
> Contributed-under: TianoCore Contribution Agreement 1.0
> Signed-off-by: Gary Lin <glin@suse.com>
> ---
>  CryptoPkg/Include/Library/BaseCryptLib.h                                      | 68
> ++++++++++----------
>  CryptoPkg/Include/OpenSslSupport.h                                            | 14 ++--
>  CryptoPkg/Library/BaseCryptLib/Hash/CryptMd4.c                                |  4 +-
>  CryptoPkg/Library/BaseCryptLib/Hash/CryptMd5.c                                |  4 +-
>  CryptoPkg/Library/BaseCryptLib/Hash/CryptSha1.c                               |  4 +-
>  CryptoPkg/Library/BaseCryptLib/Hash/CryptSha256.c                             |  4 +-
>  CryptoPkg/Library/BaseCryptLib/Hash/CryptSha512.c                             |  8 +--
>  CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacMd5.c                            |  4 +-
>  CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacSha1.c                           |  4 +-
>  CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticode.c                         |  4 +-
>  CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticodeNull.c                     |  4
> +-
>  CryptoPkg/Library/BaseCryptLib/Pk/CryptDh.c                                   |  4 +-
>  CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7Verify.c                          |  8 +--
>  CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7VerifyNull.c                      |  2 +-
>  CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaBasic.c                             |  4 +-
>  CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaExt.c                               |  2 +-
>  CryptoPkg/Library/BaseCryptLib/Pk/CryptTs.c                                   |  4 +-
>  CryptoPkg/Library/BaseCryptLib/Pk/CryptTsNull.c                               |  2 +-
>  CryptoPkg/Library/BaseCryptLib/Rand/CryptRand.c                               |  2 +-
>  CryptoPkg/Library/BaseCryptLib/Rand/CryptRandItc.c                            |  2 +-
>  CryptoPkg/Library/BaseCryptLib/Rand/CryptRandNull.c                           |  2 +-
>  CryptoPkg/Library/BaseCryptLib/Rand/CryptRandTsc.c                            |  2 +-
> 
> CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptAuthenticod
> eNull.c |  4 +-
> CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptPkcs7Verify
> Null.c  |  2 +-
> 
> CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Rand/CryptRandNull.
> c       |  2 +-
> 
> CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/RuntimeDxeIpfCryptL
> ib.c    |  4 +-
>  26 files changed, 84 insertions(+), 84 deletions(-)
> 
> diff --git a/CryptoPkg/Include/Library/BaseCryptLib.h
> b/CryptoPkg/Include/Library/BaseCryptLib.h
> index 0371d73..fc8c703 100644
> --- a/CryptoPkg/Include/Library/BaseCryptLib.h
> +++ b/CryptoPkg/Include/Library/BaseCryptLib.h
> @@ -140,7 +140,7 @@ Md4Duplicate (
> 
>    This function performs MD4 digest on a data buffer of the specified size.
>    It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> -  MD4 context should be already correctly intialized by Md4Init(), and should
> not be finalized
> +  MD4 context should be already correctly initialized by Md4Init(), and
> + should not be finalized
>    by Md4Final(). Behavior with invalid context is undefined.
> 
>    If Md4Context is NULL, then return FALSE.
> @@ -169,7 +169,7 @@ Md4Update (
>    This function completes MD4 hash computation and retrieves the digest
> value into
>    the specified memory. After this function has been called, the MD4 context
> cannot
>    be used again.
> -  MD4 context should be already correctly intialized by Md4Init(), and should
> not be
> +  MD4 context should be already correctly initialized by Md4Init(), and
> + should not be
>    finalized by Md4Final(). Behavior with invalid MD4 context is undefined.
> 
>    If Md4Context is NULL, then return FALSE.
> @@ -254,7 +254,7 @@ Md5Duplicate (
> 
>    This function performs MD5 digest on a data buffer of the specified size.
>    It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> -  MD5 context should be already correctly intialized by Md5Init(), and should
> not be finalized
> +  MD5 context should be already correctly initialized by Md5Init(), and
> + should not be finalized
>    by Md5Final(). Behavior with invalid context is undefined.
> 
>    If Md5Context is NULL, then return FALSE.
> @@ -283,7 +283,7 @@ Md5Update (
>    This function completes MD5 hash computation and retrieves the digest
> value into
>    the specified memory. After this function has been called, the MD5 context
> cannot
>    be used again.
> -  MD5 context should be already correctly intialized by Md5Init(), and should
> not be
> +  MD5 context should be already correctly initialized by Md5Init(), and
> + should not be
>    finalized by Md5Final(). Behavior with invalid MD5 context is undefined.
> 
>    If Md5Context is NULL, then return FALSE.
> @@ -368,7 +368,7 @@ Sha1Duplicate (
> 
>    This function performs SHA-1 digest on a data buffer of the specified size.
>    It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> -  SHA-1 context should be already correctly intialized by Sha1Init(), and
> should not be finalized
> +  SHA-1 context should be already correctly initialized by Sha1Init(),
> + and should not be finalized
>    by Sha1Final(). Behavior with invalid context is undefined.
> 
>    If Sha1Context is NULL, then return FALSE.
> @@ -397,7 +397,7 @@ Sha1Update (
>    This function completes SHA-1 hash computation and retrieves the digest
> value into
>    the specified memory. After this function has been called, the SHA-1
> context cannot
>    be used again.
> -  SHA-1 context should be already correctly intialized by Sha1Init(), and
> should not be
> +  SHA-1 context should be already correctly initialized by Sha1Init(),
> + and should not be
>    finalized by Sha1Final(). Behavior with invalid SHA-1 context is undefined.
> 
>    If Sha1Context is NULL, then return FALSE.
> @@ -477,7 +477,7 @@ Sha256Duplicate (
> 
>    This function performs SHA-256 digest on a data buffer of the specified size.
>    It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> -  SHA-256 context should be already correctly intialized by Sha256Init(), and
> should not be finalized
> +  SHA-256 context should be already correctly initialized by
> + Sha256Init(), and should not be finalized
>    by Sha256Final(). Behavior with invalid context is undefined.
> 
>    If Sha256Context is NULL, then return FALSE.
> @@ -504,7 +504,7 @@ Sha256Update (
>    This function completes SHA-256 hash computation and retrieves the digest
> value into
>    the specified memory. After this function has been called, the SHA-256
> context cannot
>    be used again.
> -  SHA-256 context should be already correctly intialized by Sha256Init(), and
> should not be
> +  SHA-256 context should be already correctly initialized by
> + Sha256Init(), and should not be
>    finalized by Sha256Final(). Behavior with invalid SHA-256 context is
> undefined.
> 
>    If Sha256Context is NULL, then return FALSE.
> @@ -582,7 +582,7 @@ Sha384Duplicate (
> 
>    This function performs SHA-384 digest on a data buffer of the specified size.
>    It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> -  SHA-384 context should be already correctly intialized by Sha384Init(), and
> should not be finalized
> +  SHA-384 context should be already correctly initialized by
> + Sha384Init(), and should not be finalized
>    by Sha384Final(). Behavior with invalid context is undefined.
> 
>    If Sha384Context is NULL, then return FALSE.
> @@ -609,7 +609,7 @@ Sha384Update (
>    This function completes SHA-384 hash computation and retrieves the digest
> value into
>    the specified memory. After this function has been called, the SHA-384
> context cannot
>    be used again.
> -  SHA-384 context should be already correctly intialized by Sha384Init(), and
> should not be
> +  SHA-384 context should be already correctly initialized by
> + Sha384Init(), and should not be
>    finalized by Sha384Final(). Behavior with invalid SHA-384 context is
> undefined.
> 
>    If Sha384Context is NULL, then return FALSE.
> @@ -687,7 +687,7 @@ Sha512Duplicate (
> 
>    This function performs SHA-512 digest on a data buffer of the specified size.
>    It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> -  SHA-512 context should be already correctly intialized by Sha512Init(), and
> should not be finalized
> +  SHA-512 context should be already correctly initialized by
> + Sha512Init(), and should not be finalized
>    by Sha512Final(). Behavior with invalid context is undefined.
> 
>    If Sha512Context is NULL, then return FALSE.
> @@ -714,7 +714,7 @@ Sha512Update (
>    This function completes SHA-512 hash computation and retrieves the digest
> value into
>    the specified memory. After this function has been called, the SHA-512
> context cannot
>    be used again.
> -  SHA-512 context should be already correctly intialized by Sha512Init(), and
> should not be
> +  SHA-512 context should be already correctly initialized by
> + Sha512Init(), and should not be
>    finalized by Sha512Final(). Behavior with invalid SHA-512 context is
> undefined.
> 
>    If Sha512Context is NULL, then return FALSE.
> @@ -805,7 +805,7 @@ HmacMd5Duplicate (
> 
>    This function performs HMAC-MD5 digest on a data buffer of the specified
> size.
>    It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> -  HMAC-MD5 context should be already correctly intialized by
> HmacMd5Init(), and should not be
> +  HMAC-MD5 context should be already correctly initialized by
> + HmacMd5Init(), and should not be
>    finalized by HmacMd5Final(). Behavior with invalid context is undefined.
> 
>    If HmacMd5Context is NULL, then return FALSE.
> @@ -834,7 +834,7 @@ HmacMd5Update (
>    This function completes HMAC-MD5 hash computation and retrieves the
> digest value into
>    the specified memory. After this function has been called, the HMAC-MD5
> context cannot
>    be used again.
> -  HMAC-MD5 context should be already correctly intialized by
> HmacMd5Init(), and should not be
> +  HMAC-MD5 context should be already correctly initialized by
> + HmacMd5Init(), and should not be
>    finalized by HmacMd5Final(). Behavior with invalid HMAC-MD5 context is
> undefined.
> 
>    If HmacMd5Context is NULL, then return FALSE.
> @@ -923,7 +923,7 @@ HmacSha1Duplicate (
> 
>    This function performs HMAC-SHA1 digest on a data buffer of the specified
> size.
>    It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> -  HMAC-SHA1 context should be already correctly intialized by
> HmacSha1Init(), and should not
> +  HMAC-SHA1 context should be already correctly initialized by
> + HmacSha1Init(), and should not
>    be finalized by HmacSha1Final(). Behavior with invalid context is undefined.
> 
>    If HmacSha1Context is NULL, then return FALSE.
> @@ -952,7 +952,7 @@ HmacSha1Update (
>    This function completes HMAC-SHA1 hash computation and retrieves the
> digest value into
>    the specified memory. After this function has been called, the HMAC-SHA1
> context cannot
>    be used again.
> -  HMAC-SHA1 context should be already correctly intialized by
> HmacSha1Init(), and should
> +  HMAC-SHA1 context should be already correctly initialized by
> + HmacSha1Init(), and should
>    not be finalized by HmacSha1Final(). Behavior with invalid HMAC-SHA1
> context is undefined.
> 
>    If HmacSha1Context is NULL, then return FALSE.
> @@ -1537,14 +1537,14 @@ RsaFree (
>    This function sets the tag-designated RSA key component into the
> established
>    RSA context from the user-specified non-negative integer (octet string
> format
>    represented in RSA PKCS#1).
> -  If BigNumber is NULL, then the specified key componenet in RSA context is
> cleared.
> +  If BigNumber is NULL, then the specified key component in RSA context is
> cleared.
> 
>    If RsaContext is NULL, then return FALSE.
> 
>    @param[in, out]  RsaContext  Pointer to RSA context being set.
>    @param[in]       KeyTag      Tag of RSA key component being set.
>    @param[in]       BigNumber   Pointer to octet integer buffer.
> -                               If NULL, then the specified key componenet in RSA
> +                               If NULL, then the specified key
> + component in RSA
>                                 context is cleared.
>    @param[in]       BnSize      Size of big number buffer in bytes.
>                                 If BigNumber is NULL, then it is ignored.
> @@ -1636,7 +1636,7 @@ RsaGenerateKey (
>    NOTE: This function performs integrity checks on all the RSA key material,
> so
>          the RSA key structure must contain all the private key data.
> 
> -  This function validates key compoents of RSA context in following aspects:
> +  This function validates key components of RSA context in following aspects:
>    - Whether p is a prime
>    - Whether q is a prime
>    - Whether n = p * q
> @@ -1942,16 +1942,16 @@ X509GetTBSCert (
>    in a ContentInfo structure.
> 
>    If P7Data, CertStack, StackLength, TrustedCert or CertLength is NULL, then
> -  return FALSE. If P7Length overflow, then return FAlSE.
> +  return FALSE. If P7Length overflow, then return FALSE.
>    If this interface is not supported, then return FALSE.
> 
>    @param[in]  P7Data       Pointer to the PKCS#7 message to verify.
>    @param[in]  P7Length     Length of the PKCS#7 message in bytes.
>    @param[out] CertStack    Pointer to Signer's certificates retrieved from
> P7Data.
> -                           It's caller's responsiblity to free the buffer.
> +                           It's caller's responsibility to free the buffer.
>    @param[out] StackLength  Length of signer's certificates in bytes.
>    @param[out] TrustedCert  Pointer to a trusted certificate from Signer's
> certificates.
> -                           It's caller's responsiblity to free the buffer.
> +                           It's caller's responsibility to free the buffer.
>    @param[out] CertLength   Length of the trusted certificate in bytes.
> 
>    @retval  TRUE            The operation is finished successfully.
> @@ -1993,10 +1993,10 @@ Pkcs7FreeSigners (
>    @param[in]  P7Data            Pointer to the PKCS#7 message.
>    @param[in]  P7Length          Length of the PKCS#7 message in bytes.
>    @param[out] SignerChainCerts  Pointer to the certificates list chained to
> signer's
> -                                certificate. It's caller's responsiblity to free the buffer.
> +                                certificate. It's caller's responsibility to free the buffer.
>    @param[out] ChainLength       Length of the chained certificates list buffer
> in bytes.
>    @param[out] UnchainCerts      Pointer to the unchained certificates lists. It's
> caller's
> -                                responsiblity to free the buffer.
> +                                responsibility to free the buffer.
>    @param[out] UnchainLength     Length of the unchained certificates list
> buffer in bytes.
> 
>    @retval  TRUE         The operation is finished successfully.
> @@ -2055,12 +2055,12 @@ Pkcs7Sign (
>    );
> 
>  /**
> -  Verifies the validility of a PKCS#7 signed data as described in "PKCS #7:
> +  Verifies the validity of a PKCS#7 signed data as described in "PKCS #7:
>    Cryptographic Message Syntax Standard". The input signed data could be
> wrapped
>    in a ContentInfo structure.
> 
>    If P7Data, TrustedCert or InData is NULL, then return FALSE.
> -  If P7Length, CertLength or DataLength overflow, then return FAlSE.
> +  If P7Length, CertLength or DataLength overflow, then return FALSE.
>    If this interface is not supported, then return FALSE.
> 
>    @param[in]  P7Data       Pointer to the PKCS#7 message to verify.
> @@ -2092,7 +2092,7 @@ Pkcs7Verify (
>    data could be wrapped in a ContentInfo structure.
> 
>    If P7Data, Content, or ContentSize is NULL, then return FALSE. If P7Length
> overflow,
> -  then return FAlSE. If the P7Data is not correctly formatted, then return
> FALSE.
> +  then return FALSE. If the P7Data is not correctly formatted, then return
> FALSE.
> 
>    Caution: This function may receive untrusted input. So this function will do
>             basic check for PKCS#7 data structure.
> @@ -2100,7 +2100,7 @@ Pkcs7Verify (
>    @param[in]   P7Data       Pointer to the PKCS#7 signed data to process.
>    @param[in]   P7Length     Length of the PKCS#7 signed data in bytes.
>    @param[out]  Content      Pointer to the extracted content from the PKCS#7
> signedData.
> -                            It's caller's responsiblity to free the buffer.
> +                            It's caller's responsibility to free the buffer.
>    @param[out]  ContentSize  The size of the extracted content in bytes.
> 
>    @retval     TRUE          The P7Data was correctly formatted for processing.
> @@ -2117,7 +2117,7 @@ Pkcs7GetAttachedContent (
>    );
> 
>  /**
> -  Verifies the validility of a PE/COFF Authenticode Signature as described in
> "Windows
> +  Verifies the validity of a PE/COFF Authenticode Signature as
> + described in "Windows
>    Authenticode Portable Executable Signature Format".
> 
>    If AuthData is NULL, then return FALSE.
> @@ -2130,7 +2130,7 @@ Pkcs7GetAttachedContent (
>    @param[in]  TrustedCert  Pointer to a trusted/root certificate encoded in
> DER, which
>                             is used for certificate chain verification.
>    @param[in]  CertSize     Size of the trusted certificate in bytes.
> -  @param[in]  ImageHash    Pointer to the original image file hash value. The
> procudure
> +  @param[in]  ImageHash    Pointer to the original image file hash value. The
> procedure
>                             for calculating the image hash value is described in
> Authenticode
>                             specification.
>    @param[in]  HashSize     Size of Image hash value in bytes.
> @@ -2152,7 +2152,7 @@ AuthenticodeVerify (
>    );
> 
>  /**
> -  Verifies the validility of a RFC3161 Timestamp CounterSignature embedded
> in PE/COFF Authenticode
> +  Verifies the validity of a RFC3161 Timestamp CounterSignature
> + embedded in PE/COFF Authenticode
>    signature.
> 
>    If AuthData is NULL, then return FALSE.
> @@ -2231,7 +2231,7 @@ DhFree (
>    @param[in]       PrimeLength  Length in bits of prime to be generated.
>    @param[out]      Prime        Pointer to the buffer to receive the generated
> prime number.
> 
> -  @retval TRUE   DH pamameter generation succeeded.
> +  @retval TRUE   DH parameter generation succeeded.
>    @retval FALSE  Value of Generator is not supported.
>    @retval FALSE  PRNG fails to generate random prime number with
> PrimeLength.
>    @retval FALSE  This interface is not supported.
> @@ -2261,7 +2261,7 @@ DhGenerateParameter (
>    @param[in]       PrimeLength  Length in bits of prime to be generated.
>    @param[in]       Prime        Pointer to the prime number.
> 
> -  @retval TRUE   DH pamameter setting succeeded.
> +  @retval TRUE   DH parameter setting succeeded.
>    @retval FALSE  Value of Generator is not supported.
>    @retval FALSE  Value of Generator is not suitable for the Prime.
>    @retval FALSE  Value of Prime is not a prime number.
> @@ -2382,7 +2382,7 @@ RandomSeed (
>    If this interface is not supported, then return FALSE.
> 
>    @param[out]  Output  Pointer to buffer to receive random value.
> -  @param[in]   Size    Size of randome bytes to generate.
> +  @param[in]   Size    Size of random bytes to generate.
> 
>    @retval TRUE   Pseudorandom byte stream generated successfully.
>    @retval FALSE  Pseudorandom number generator fails to generate due to
> lack of entropy.
> diff --git a/CryptoPkg/Include/OpenSslSupport.h
> b/CryptoPkg/Include/OpenSslSupport.h
> index 239ae8b..dad40e4 100644
> --- a/CryptoPkg/Include/OpenSslSupport.h
> +++ b/CryptoPkg/Include/OpenSslSupport.h
> @@ -69,7 +69,7 @@ typedef VOID  *FILE;
>  #endif
> 
>  //
> -// #defines from EFI Application Toolkit required to buiild Open SSL
> +// #defines from EFI Application Toolkit required to build Open SSL
>  //
>  #define ENOMEM       12               /* Cannot allocate memory */
>  #define EINVAL       22               /* Invalid argument */
> @@ -92,7 +92,7 @@ typedef VOID  *FILE;
>  #define LOG_CONS     0x02             /* log on the console if errors in sending */
> 
>  //
> -// Macros from EFI Application Toolkit required to buiild Open SSL
> +// Macros from EFI Application Toolkit required to build Open SSL
>  //
>  /* The offsetof() macro calculates the offset of a structure member
>     in its structure.  Unfortunately this cannot be written down @@ -102,7
> +102,7 @@ typedef VOID  *FILE;  #define offsetof(type, member)
> OFFSET_OF (type, member)
> 
>  //
> -// Basic types from EFI Application Toolkit required to buiild Open SSL
> +// Basic types from EFI Application Toolkit required to build Open SSL
>  //
>  typedef UINTN          size_t;
>  typedef INTN           ssize_t;
> @@ -120,7 +120,7 @@ typedef void           *DIR;
>  typedef void           __sighandler_t (int);
> 
>  //
> -// Structures from EFI Application Toolkit required to buiild Open SSL
> +// Structures from EFI Application Toolkit required to build Open SSL
>  //
>  struct tm {
>    int   tm_sec;     /* seconds after the minute [0-60] */
> @@ -173,12 +173,12 @@ struct stat {
>  };
> 
>  //
> -// Externs from EFI Application Toolkit required to buiild Open SSL
> +// Externs from EFI Application Toolkit required to build Open SSL
>  //
>  extern int errno;
> 
>  //
> -// Function prototypes from EFI Application Toolkit required to buiild Open
> SSL
> +// Function prototypes from EFI Application Toolkit required to build
> +Open SSL
>  //
>  void           *malloc     (size_t);
>  void           *realloc    (void *, size_t);
> @@ -247,7 +247,7 @@ void           abort       (void);
>  __sighandler_t *signal     (int, __sighandler_t *);
> 
>  //
> -// Global variables from EFI Application Toolkit required to buiild Open SSL
> +// Global variables from EFI Application Toolkit required to build Open
> +SSL
>  //
>  extern FILE  *stderr;
>  extern FILE  *stdin;
> diff --git a/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd4.c
> b/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd4.c
> index 633d343..148d0a9 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd4.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd4.c
> @@ -101,7 +101,7 @@ Md4Duplicate (
> 
>    This function performs MD4 digest on a data buffer of the specified size.
>    It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> -  MD4 context should be already correctly intialized by Md4Init(), and should
> not be finalized
> +  MD4 context should be already correctly initialized by Md4Init(), and
> + should not be finalized
>    by Md4Final(). Behavior with invalid context is undefined.
> 
>    If Md4Context is NULL, then return FALSE.
> @@ -148,7 +148,7 @@ Md4Update (
>    This function completes MD4 hash computation and retrieves the digest
> value into
>    the specified memory. After this function has been called, the MD4 context
> cannot
>    be used again.
> -  MD4 context should be already correctly intialized by Md4Init(), and should
> not be
> +  MD4 context should be already correctly initialized by Md4Init(), and
> + should not be
>    finalized by Md4Final(). Behavior with invalid MD4 context is undefined.
> 
>    If Md4Context is NULL, then return FALSE.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd5.c
> b/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd5.c
> index e1c10e3..809f06f 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd5.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd5.c
> @@ -103,7 +103,7 @@ Md5Duplicate (
> 
>    This function performs MD5 digest on a data buffer of the specified size.
>    It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> -  MD5 context should be already correctly intialized by Md5Init(), and should
> not be finalized
> +  MD5 context should be already correctly initialized by Md5Init(), and
> + should not be finalized
>    by Md5Final(). Behavior with invalid context is undefined.
> 
>    If Md5Context is NULL, then return FALSE.
> @@ -150,7 +150,7 @@ Md5Update (
>    This function completes MD5 hash computation and retrieves the digest
> value into
>    the specified memory. After this function has been called, the MD5 context
> cannot
>    be used again.
> -  MD5 context should be already correctly intialized by Md5Init(), and should
> not be
> +  MD5 context should be already correctly initialized by Md5Init(), and
> + should not be
>    finalized by Md5Final(). Behavior with invalid MD5 context is undefined.
> 
>    If Md5Context is NULL, then return FALSE.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha1.c
> b/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha1.c
> index 78c29c1..1a8ac6c 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha1.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha1.c
> @@ -102,7 +102,7 @@ Sha1Duplicate (
> 
>    This function performs SHA-1 digest on a data buffer of the specified size.
>    It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> -  SHA-1 context should be already correctly intialized by Sha1Init(), and
> should not be finalized
> +  SHA-1 context should be already correctly initialized by Sha1Init(),
> + and should not be finalized
>    by Sha1Final(). Behavior with invalid context is undefined.
> 
>    If Sha1Context is NULL, then return FALSE.
> @@ -149,7 +149,7 @@ Sha1Update (
>    This function completes SHA-1 hash computation and retrieves the digest
> value into
>    the specified memory. After this function has been called, the SHA-1
> context cannot
>    be used again.
> -  SHA-1 context should be already correctly intialized by Sha1Init(), and
> should not be
> +  SHA-1 context should be already correctly initialized by Sha1Init(),
> + and should not be
>    finalized by Sha1Final(). Behavior with invalid SHA-1 context is undefined.
> 
>    If Sha1Context is NULL, then return FALSE.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha256.c
> b/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha256.c
> index 56894ac..ec45d6a 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha256.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha256.c
> @@ -101,7 +101,7 @@ Sha256Duplicate (
> 
>    This function performs SHA-256 digest on a data buffer of the specified size.
>    It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> -  SHA-256 context should be already correctly intialized by Sha256Init(), and
> should not be finalized
> +  SHA-256 context should be already correctly initialized by
> + Sha256Init(), and should not be finalized
>    by Sha256Final(). Behavior with invalid context is undefined.
> 
>    If Sha256Context is NULL, then return FALSE.
> @@ -148,7 +148,7 @@ Sha256Update (
>    This function completes SHA-256 hash computation and retrieves the digest
> value into
>    the specified memory. After this function has been called, the SHA-256
> context cannot
>    be used again.
> -  SHA-256 context should be already correctly intialized by Sha256Init(), and
> should not be
> +  SHA-256 context should be already correctly initialized by
> + Sha256Init(), and should not be
>    finalized by Sha256Final(). Behavior with invalid SHA-256 context is
> undefined.
> 
>    If Sha256Context is NULL, then return FALSE.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha512.c
> b/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha512.c
> index 491f45d..e68a4bf 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha512.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha512.c
> @@ -103,7 +103,7 @@ Sha384Duplicate (
> 
>    This function performs SHA-384 digest on a data buffer of the specified size.
>    It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> -  SHA-384 context should be already correctly intialized by Sha384Init(), and
> should not be finalized
> +  SHA-384 context should be already correctly initialized by
> + Sha384Init(), and should not be finalized
>    by Sha384Final(). Behavior with invalid context is undefined.
> 
>    If Sha384Context is NULL, then return FALSE.
> @@ -150,7 +150,7 @@ Sha384Update (
>    This function completes SHA-384 hash computation and retrieves the digest
> value into
>    the specified memory. After this function has been called, the SHA-384
> context cannot
>    be used again.
> -  SHA-384 context should be already correctly intialized by Sha384Init(), and
> should not be
> +  SHA-384 context should be already correctly initialized by
> + Sha384Init(), and should not be
>    finalized by Sha384Final(). Behavior with invalid SHA-384 context is
> undefined.
> 
>    If Sha384Context is NULL, then return FALSE.
> @@ -272,7 +272,7 @@ Sha512Duplicate (
> 
>    This function performs SHA-512 digest on a data buffer of the specified size.
>    It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> -  SHA-512 context should be already correctly intialized by Sha512Init(), and
> should not be finalized
> +  SHA-512 context should be already correctly initialized by
> + Sha512Init(), and should not be finalized
>    by Sha512Final(). Behavior with invalid context is undefined.
> 
>    If Sha512Context is NULL, then return FALSE.
> @@ -319,7 +319,7 @@ Sha512Update (
>    This function completes SHA-512 hash computation and retrieves the digest
> value into
>    the specified memory. After this function has been called, the SHA-512
> context cannot
>    be used again.
> -  SHA-512 context should be already correctly intialized by Sha512Init(), and
> should not be
> +  SHA-512 context should be already correctly initialized by
> + Sha512Init(), and should not be
>    finalized by Sha512Final(). Behavior with invalid SHA-512 context is
> undefined.
> 
>    If Sha512Context is NULL, then return FALSE.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacMd5.c
> b/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacMd5.c
> index 693cd32..6175061 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacMd5.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacMd5.c
> @@ -108,7 +108,7 @@ HmacMd5Duplicate (
> 
>    This function performs HMAC-MD5 digest on a data buffer of the specified
> size.
>    It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> -  HMAC-MD5 context should be already correctly intialized by
> HmacMd5Init(), and should not be
> +  HMAC-MD5 context should be already correctly initialized by
> + HmacMd5Init(), and should not be
>    finalized by HmacMd5Final(). Behavior with invalid context is undefined.
> 
>    If HmacMd5Context is NULL, then return FALSE.
> @@ -157,7 +157,7 @@ HmacMd5Update (
>    This function completes HMAC-MD5 digest computation and retrieves the
> digest value into
>    the specified memory. After this function has been called, the HMAC-MD5
> context cannot
>    be used again.
> -  HMAC-MD5 context should be already correctly intialized by
> HmacMd5Init(), and should not be
> +  HMAC-MD5 context should be already correctly initialized by
> + HmacMd5Init(), and should not be
>    finalized by HmacMd5Final(). Behavior with invalid HMAC-MD5 context is
> undefined.
> 
>    If HmacMd5Context is NULL, then return FALSE.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacSha1.c
> b/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacSha1.c
> index 881d26c..e660258 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacSha1.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacSha1.c
> @@ -108,7 +108,7 @@ HmacSha1Duplicate (
> 
>    This function performs HMAC-SHA1 digest on a data buffer of the specified
> size.
>    It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> -  HMAC-SHA1 context should be already correctly intialized by
> HmacSha1Init(), and should not
> +  HMAC-SHA1 context should be already correctly initialized by
> + HmacSha1Init(), and should not
>    be finalized by HmacSha1Final(). Behavior with invalid context is undefined.
> 
>    If HmacSha1Context is NULL, then return FALSE.
> @@ -157,7 +157,7 @@ HmacSha1Update (
>    This function completes HMAC-SHA1 digest computation and retrieves the
> digest value into
>    the specified memory. After this function has been called, the HMAC-SHA1
> context cannot
>    be used again.
> -  HMAC-SHA1 context should be already correctly intialized by
> HmacSha1Init(), and should
> +  HMAC-SHA1 context should be already correctly initialized by
> + HmacSha1Init(), and should
>    not be finalized by HmacSha1Final(). Behavior with invalid HMAC-SHA1
> context is undefined.
> 
>    If HmacSha1Context is NULL, then return FALSE.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticode.c
> b/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticode.c
> index 857281d..74e50a2 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticode.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticode.c
> @@ -34,7 +34,7 @@ UINT8 mSpcIndirectOidValue[] = {
>    };
> 
>  /**
> -  Verifies the validility of a PE/COFF Authenticode Signature as described in
> "Windows
> +  Verifies the validity of a PE/COFF Authenticode Signature as
> + described in "Windows
>    Authenticode Portable Executable Signature Format".
> 
>    If AuthData is NULL, then return FALSE.
> @@ -50,7 +50,7 @@ UINT8 mSpcIndirectOidValue[] = {
>    @param[in]  TrustedCert  Pointer to a trusted/root certificate encoded in
> DER, which
>                             is used for certificate chain verification.
>    @param[in]  CertSize     Size of the trusted certificate in bytes.
> -  @param[in]  ImageHash    Pointer to the original image file hash value. The
> procudure
> +  @param[in]  ImageHash    Pointer to the original image file hash value. The
> procedure
>                             for calculating the image hash value is described in
> Authenticode
>                             specification.
>    @param[in]  HashSize     Size of Image hash value in bytes.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticodeNull.c
> b/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticodeNull.c
> index 5554486..afec025 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticodeNull.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticodeNull.c
> @@ -16,7 +16,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY
> KIND, EITHER EXPRESS OR IMPLIED.
>  #include "InternalCryptLib.h"
> 
>  /**
> -  Verifies the validility of a PE/COFF Authenticode Signature as described in
> "Windows
> +  Verifies the validity of a PE/COFF Authenticode Signature as
> + described in "Windows
>    Authenticode Portable Executable Signature Format".
> 
>    Return FALSE to indicate this interface is not supported.
> @@ -27,7 +27,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY
> KIND, EITHER EXPRESS OR IMPLIED.
>    @param[in]  TrustedCert  Pointer to a trusted/root certificate encoded in
> DER, which
>                             is used for certificate chain verification.
>    @param[in]  CertSize     Size of the trusted certificate in bytes.
> -  @param[in]  ImageHash    Pointer to the original image file hash value. The
> procudure
> +  @param[in]  ImageHash    Pointer to the original image file hash value. The
> procedure
>                             for calculating the image hash value is described in
> Authenticode
>                             specification.
>    @param[in]  HashSize     Size of Image hash value in bytes.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptDh.c
> b/CryptoPkg/Library/BaseCryptLib/Pk/CryptDh.c
> index 5e0447b..a5d6e49 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptDh.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptDh.c
> @@ -73,7 +73,7 @@ DhFree (
>    @param[in]       PrimeLength  Length in bits of prime to be generated.
>    @param[out]      Prime        Pointer to the buffer to receive the generated
> prime number.
> 
> -  @retval TRUE   DH pamameter generation succeeded.
> +  @retval TRUE   DH parameter generation succeeded.
>    @retval FALSE  Value of Generator is not supported.
>    @retval FALSE  PRNG fails to generate random prime number with
> PrimeLength.
> 
> @@ -124,7 +124,7 @@ DhGenerateParameter (
>    @param[in]       PrimeLength  Length in bits of prime to be generated.
>    @param[in]       Prime        Pointer to the prime number.
> 
> -  @retval TRUE   DH pamameter setting succeeded.
> +  @retval TRUE   DH parameter setting succeeded.
>    @retval FALSE  Value of Generator is not supported.
>    @retval FALSE  Value of Generator is not suitable for the Prime.
>    @retval FALSE  Value of Prime is not a prime number.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7Verify.c
> b/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7Verify.c
> index 4dd1625..dcaba43 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7Verify.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7Verify.c
> @@ -229,7 +229,7 @@ _Exit:
>    in a ContentInfo structure.
> 
>    If P7Data, CertStack, StackLength, TrustedCert or CertLength is NULL, then
> -  return FALSE. If P7Length overflow, then return FAlSE.
> +  return FALSE. If P7Length overflow, then return FALSE.
> 
>    Caution: This function may receive untrusted input.
>    UEFI Authenticated Variable is external input, so this function will do basic
> @@ -718,12 +718,12 @@ _Error:
>  }
> 
>  /**
> -  Verifies the validility of a PKCS#7 signed data as described in "PKCS #7:
> +  Verifies the validity of a PKCS#7 signed data as described in "PKCS #7:
>    Cryptographic Message Syntax Standard". The input signed data could be
> wrapped
>    in a ContentInfo structure.
> 
>    If P7Data, TrustedCert or InData is NULL, then return FALSE.
> -  If P7Length, CertLength or DataLength overflow, then return FAlSE.
> +  If P7Length, CertLength or DataLength overflow, then return FALSE.
> 
>    Caution: This function may receive untrusted input.
>    UEFI Authenticated Variable is external input, so this function will do basic
> @@ -897,7 +897,7 @@ _Exit:
>    data could be wrapped in a ContentInfo structure.
> 
>    If P7Data, Content, or ContentSize is NULL, then return FALSE. If P7Length
> overflow,
> -  then return FAlSE. If the P7Data is not correctly formatted, then return
> FALSE.
> +  then return FALSE. If the P7Data is not correctly formatted, then return
> FALSE.
> 
>    Caution: This function may receive untrusted input. So this function will do
>             basic check for PKCS#7 data structure.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7VerifyNull.c
> b/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7VerifyNull.c
> index d09fd54..06602ec 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7VerifyNull.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7VerifyNull.c
> @@ -101,7 +101,7 @@ Pkcs7GetCertificatesList (  }
> 
>  /**
> -  Verifies the validility of a PKCS#7 signed data as described in "PKCS #7:
> +  Verifies the validity of a PKCS#7 signed data as described in "PKCS #7:
>    Cryptographic Message Syntax Standard". The input signed data could be
> wrapped
>    in a ContentInfo structure.
> 
> diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaBasic.c
> b/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaBasic.c
> index e49db51..e68dd02 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaBasic.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaBasic.c
> @@ -67,14 +67,14 @@ RsaFree (
>    This function sets the tag-designated RSA key component into the
> established
>    RSA context from the user-specified non-negative integer (octet string
> format
>    represented in RSA PKCS#1).
> -  If BigNumber is NULL, then the specified key componenet in RSA context is
> cleared.
> +  If BigNumber is NULL, then the specified key component in RSA context is
> cleared.
> 
>    If RsaContext is NULL, then return FALSE.
> 
>    @param[in, out]  RsaContext  Pointer to RSA context being set.
>    @param[in]       KeyTag      Tag of RSA key component being set.
>    @param[in]       BigNumber   Pointer to octet integer buffer.
> -                               If NULL, then the specified key componenet in RSA
> +                               If NULL, then the specified key
> + component in RSA
>                                 context is cleared.
>    @param[in]       BnSize      Size of big number buffer in bytes.
>                                 If BigNumber is NULL, then it is ignored.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaExt.c
> b/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaExt.c
> index b941d6f..30552e4 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaExt.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaExt.c
> @@ -248,7 +248,7 @@ _Exit:
>    NOTE: This function performs integrity checks on all the RSA key material,
> so
>          the RSA key structure must contain all the private key data.
> 
> -  This function validates key compoents of RSA context in following aspects:
> +  This function validates key components of RSA context in following aspects:
>    - Whether p is a prime
>    - Whether q is a prime
>    - Whether n = p * q
> diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptTs.c
> b/CryptoPkg/Library/BaseCryptLib/Pk/CryptTs.c
> index d495812..1b78472 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptTs.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptTs.c
> @@ -323,7 +323,7 @@ _Exit:
>  }
> 
>  /**
> -  Verifies the validility of a TimeStamp Token as described in RFC 3161
> ("Internet
> +  Verifies the validity of a TimeStamp Token as described in RFC 3161
> + ("Internet
>    X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)").
> 
>    If TSToken is NULL, then return FALSE.
> @@ -497,7 +497,7 @@ _Exit:
>  }
> 
>  /**
> -  Verifies the validility of a RFC3161 Timestamp CounterSignature embedded
> in PE/COFF Authenticode
> +  Verifies the validity of a RFC3161 Timestamp CounterSignature
> + embedded in PE/COFF Authenticode
>    signature.
> 
>    If AuthData is NULL, then return FALSE.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptTsNull.c
> b/CryptoPkg/Library/BaseCryptLib/Pk/CryptTsNull.c
> index eb32aaf..a43f733 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptTsNull.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptTsNull.c
> @@ -16,7 +16,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY
> KIND, EITHER EXPRESS OR IMPLIED.
>  #include "InternalCryptLib.h"
> 
>  /**
> -  Verifies the validility of a RFC3161 Timestamp CounterSignature embedded
> in PE/COFF Authenticode
> +  Verifies the validity of a RFC3161 Timestamp CounterSignature
> + embedded in PE/COFF Authenticode
>    signature.
> 
>    Return FALSE to indicate this interface is not supported.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRand.c
> b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRand.c
> index 895ce83..fd3c6d4 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRand.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRand.c
> @@ -79,7 +79,7 @@ RandomSeed (
>    If Output is NULL, then return FALSE.
> 
>    @param[out]  Output  Pointer to buffer to receive random value.
> -  @param[in]   Size    Size of randome bytes to generate.
> +  @param[in]   Size    Size of random bytes to generate.
> 
>    @retval TRUE   Pseudorandom byte stream generated successfully.
>    @retval FALSE  Pseudorandom number generator fails to generate due to
> lack of entropy.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandItc.c
> b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandItc.c
> index 9f87087..3db5157 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandItc.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandItc.c
> @@ -87,7 +87,7 @@ RandomSeed (
>    If Output is NULL, then return FALSE.
> 
>    @param[out]  Output  Pointer to buffer to receive random value.
> -  @param[in]   Size    Size of randome bytes to generate.
> +  @param[in]   Size    Size of random bytes to generate.
> 
>    @retval TRUE   Pseudorandom byte stream generated successfully.
>    @retval FALSE  Pseudorandom number generator fails to generate due to
> lack of entropy.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandNull.c
> b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandNull.c
> index 8838e22..c292a23 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandNull.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandNull.c
> @@ -46,7 +46,7 @@ RandomSeed (
>    Return FALSE to indicate this interface is not supported.
> 
>    @param[out]  Output  Pointer to buffer to receive random value.
> -  @param[in]   Size    Size of randome bytes to generate.
> +  @param[in]   Size    Size of random bytes to generate.
> 
>    @retval FALSE  This interface is not supported.
> 
> diff --git a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandTsc.c
> b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandTsc.c
> index 9bd349d..15f0b3f 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandTsc.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandTsc.c
> @@ -87,7 +87,7 @@ RandomSeed (
>    If Output is NULL, then return FALSE.
> 
>    @param[out]  Output  Pointer to buffer to receive random value.
> -  @param[in]   Size    Size of randome bytes to generate.
> +  @param[in]   Size    Size of random bytes to generate.
> 
>    @retval TRUE   Pseudorandom byte stream generated successfully.
>    @retval FALSE  Pseudorandom number generator fails to generate due to
> lack of entropy.
> diff --git
> a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptAuthentic
> odeNull.c
> b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptAuthentic
> odeNull.c
> index 5554486..afec025 100644
> ---
> a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptAuthentic
> odeNull.c
> +++
> b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptAuthent
> +++ icodeNull.c
> @@ -16,7 +16,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY
> KIND, EITHER EXPRESS OR IMPLIED.
>  #include "InternalCryptLib.h"
> 
>  /**
> -  Verifies the validility of a PE/COFF Authenticode Signature as described in
> "Windows
> +  Verifies the validity of a PE/COFF Authenticode Signature as
> + described in "Windows
>    Authenticode Portable Executable Signature Format".
> 
>    Return FALSE to indicate this interface is not supported.
> @@ -27,7 +27,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY
> KIND, EITHER EXPRESS OR IMPLIED.
>    @param[in]  TrustedCert  Pointer to a trusted/root certificate encoded in
> DER, which
>                             is used for certificate chain verification.
>    @param[in]  CertSize     Size of the trusted certificate in bytes.
> -  @param[in]  ImageHash    Pointer to the original image file hash value. The
> procudure
> +  @param[in]  ImageHash    Pointer to the original image file hash value. The
> procedure
>                             for calculating the image hash value is described in
> Authenticode
>                             specification.
>    @param[in]  HashSize     Size of Image hash value in bytes.
> diff --git
> a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptPkcs7Verif
> yNull.c
> b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptPkcs7Verif
> yNull.c
> index d09fd54..06602ec 100644
> ---
> a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptPkcs7Verif
> yNull.c
> +++
> b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptPkcs7Ve
> +++ rifyNull.c
> @@ -101,7 +101,7 @@ Pkcs7GetCertificatesList (  }
> 
>  /**
> -  Verifies the validility of a PKCS#7 signed data as described in "PKCS #7:
> +  Verifies the validity of a PKCS#7 signed data as described in "PKCS #7:
>    Cryptographic Message Syntax Standard". The input signed data could be
> wrapped
>    in a ContentInfo structure.
> 
> diff --git
> a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Rand/CryptRandNu
> ll.c
> b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Rand/CryptRandNu
> ll.c
> index 8838e22..c292a23 100644
> ---
> a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Rand/CryptRandNu
> ll.c
> +++
> b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Rand/CryptRandN
> +++ ull.c
> @@ -46,7 +46,7 @@ RandomSeed (
>    Return FALSE to indicate this interface is not supported.
> 
>    @param[out]  Output  Pointer to buffer to receive random value.
> -  @param[in]   Size    Size of randome bytes to generate.
> +  @param[in]   Size    Size of random bytes to generate.
> 
>    @retval FALSE  This interface is not supported.
> 
> diff --git
> a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/RuntimeDxeIpfCry
> ptLib.c
> b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/RuntimeDxeIpfCry
> ptLib.c
> index cd40d16..9babc7e 100644
> ---
> a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/RuntimeDxeIpfCry
> ptLib.c
> +++
> b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/RuntimeDxeIpfCr
> +++ yptLib.c
> @@ -344,14 +344,14 @@ RsaFree (
>    This function sets the tag-designated RSA key component into the
> established
>    RSA context from the user-specified non-negative integer (octet string
> format
>    represented in RSA PKCS#1).
> -  If BigNumber is NULL, then the specified key componenet in RSA context is
> cleared.
> +  If BigNumber is NULL, then the specified key component in RSA context is
> cleared.
> 
>    If RsaContext is NULL, then return FALSE.
> 
>    @param[in, out]  RsaContext  Pointer to RSA context being set.
>    @param[in]       KeyTag      Tag of RSA key component being set.
>    @param[in]       BigNumber   Pointer to octet integer buffer.
> -                               If NULL, then the specified key componenet in RSA
> +                               If NULL, then the specified key
> + component in RSA
>                                 context is cleared.
>    @param[in]       BnSize      Size of big number buffer in bytes.
>                                 If BigNumber is NULL, then it is ignored.
> --
> 2.10.1
> 
> _______________________________________________
> edk2-devel mailing list
> edk2-devel@lists.01.org
> https://lists.01.org/mailman/listinfo/edk2-devel


  reply	other threads:[~2016-10-26  3:01 UTC|newest]

Thread overview: 79+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-10-19  7:01 [PATCH 00/33] Fix typos in comments and variables Gary Lin
2016-10-19  7:01 ` [PATCH 01/33] ArmPkg: Fix typos in comments Gary Lin
2016-10-19 15:09   ` Ard Biesheuvel
2016-10-19 15:15     ` Laszlo Ersek
2016-10-19 15:33       ` Leif Lindholm
2016-10-19  7:01 ` [PATCH 02/33] BaseTools: Fix typos in comments and variables Gary Lin
2016-10-19  7:30   ` Gao, Liming
2016-10-19  7:36   ` Zhu, Yonghong
2016-10-19  7:01 ` [PATCH 03/33] CorebootPayloadPkg: Fix typos in comments Gary Lin
2016-10-26 18:50   ` Ma, Maurice
2016-10-19  7:01 ` [PATCH 04/33] CorebootModulePkg: " Gary Lin
2016-10-26 18:41   ` Ma, Maurice
2016-10-19  7:01 ` [PATCH 05/33] CryptoPkg: " Gary Lin
2016-10-26  3:00   ` Long, Qin [this message]
2016-10-19  7:01 ` [PATCH 06/33] DuetPkg: " Gary Lin
2016-10-19  7:46   ` Ni, Ruiyu
2016-10-19  7:01 ` [PATCH 07/33] EdkCompatibilityPkg: " Gary Lin
2016-10-19  8:19   ` Gao, Liming
2016-10-19  7:01 ` [PATCH 08/33] EmulatorPkg: Fix typos in comments and variables Gary Lin
2016-10-19 20:37   ` Jordan Justen
2016-10-20  8:16     ` Laszlo Ersek
2016-10-19  7:01 ` [PATCH 09/33] EmbeddedPkg: Fix typos in comments Gary Lin
2016-10-19 15:09   ` Ard Biesheuvel
2016-10-19  7:01 ` [PATCH 10/33] IntelFrameworkModulePkg: " Gary Lin
2016-10-20  1:08   ` Fan, Jeff
2016-10-19  7:01 ` [PATCH 11/33] IntelFrameworkPkg: " Gary Lin
2016-10-20  1:08   ` Fan, Jeff
2016-10-19  7:01 ` [PATCH 12/33] IntelFspPkg: " Gary Lin
2016-10-19  7:06   ` Yao, Jiewen
2016-10-19  7:01 ` [PATCH 13/33] IntelFspWrapperPkg: " Gary Lin
2016-10-19  7:08   ` Yao, Jiewen
2016-10-19  7:01 ` [PATCH 14/33] IntelFsp2Pkg: " Gary Lin
2016-10-19  7:06   ` Yao, Jiewen
2016-10-19  7:12   ` Mudusuru, Giri P
2016-10-19  7:01 ` [PATCH 15/33] IntelFsp2WrapperPkg: Fix a typo in the comment Gary Lin
2016-10-19  7:07   ` Yao, Jiewen
2016-10-19  7:11   ` Mudusuru, Giri P
2016-10-19  7:01 ` [PATCH 16/33] MdeModulePkg: BootManagerMenuApp: Fix typos in comments Gary Lin
2016-10-19  8:20   ` Tian, Feng
2016-10-19  7:01 ` [PATCH 17/33] MdeModulePkg/Bus: " Gary Lin
2016-10-19  7:01 ` [PATCH 18/33] MdeModulePkg/Core: " Gary Lin
2016-10-19  8:20   ` Tian, Feng
2016-10-19  7:01 ` [PATCH 19/33] MdeModulePkg/Include: " Gary Lin
2016-10-19  7:01 ` [PATCH 20/33] MdeModulePkg/Library: Fix typos in comments and variables Gary Lin
2016-10-19  7:01 ` [PATCH 21/33] MdeModulePkg/Universal: Fix typos in comments Gary Lin
2016-10-19  7:01 ` [PATCH 22/33] MdePkg: " Gary Lin
2016-10-19  8:21   ` Gao, Liming
2016-10-19  7:01 ` [PATCH 23/33] NetworkPkg: " Gary Lin
2016-10-19  7:21   ` Fu, Siyuan
2016-10-26  0:53   ` Fu, Siyuan
2016-10-19  7:01 ` [PATCH 24/33] Nt32Pkg: Fix typos in comments and variables Gary Lin
2016-10-19  7:50   ` Ni, Ruiyu
2016-10-19  7:01 ` [PATCH 25/33] OptionRomPkg: Fix typos in comments Gary Lin
2016-10-19  7:51   ` Ni, Ruiyu
2016-10-19  7:01 ` [PATCH 26/33] OvmfPkg: " Gary Lin
2016-10-19  7:01 ` [PATCH 27/33] QuarkPlatformPkg: " Gary Lin
2016-10-25 20:53   ` Kinney, Michael D
2016-10-19  7:01 ` [PATCH 28/33] QuarkSocPkg: " Gary Lin
2016-10-25 21:00   ` Kinney, Michael D
2016-10-19  7:01 ` [PATCH 29/33] SecurityPkg: " Gary Lin
2016-10-27  1:29   ` Zhang, Chao B
2016-11-14  3:12   ` Zhang, Chao B
2016-11-14  4:03     ` Gary Lin
2016-11-14  6:24       ` Gao, Liming
2016-11-14  8:30         ` Gary Lin
2016-10-19  7:01 ` [PATCH 30/33] ShellPkg: Fix typos in comments and variables Gary Lin
2016-10-19  7:51   ` Ni, Ruiyu
2016-10-19 20:29     ` Carsey, Jaben
2016-10-20  1:55       ` Gary Lin
2016-10-19  7:01 ` [PATCH 31/33] SourceLevelDebugPkg: Fix typos in comments Gary Lin
2016-10-19  7:46   ` Wu, Hao A
2016-10-19  7:01 ` [PATCH 32/33] UefiCpuPkg: " Gary Lin
2016-10-20  1:58   ` Fan, Jeff
2016-10-20  2:08     ` Gary Lin
2016-10-20  2:45       ` Fan, Jeff
2016-10-19  7:01 ` [PATCH 33/33] Vlv2TbltDevicePkg: " Gary Lin
2016-10-24  1:33   ` Wei, David
2016-10-19  7:28 ` [PATCH 00/33] Fix typos in comments and variables Zeng, Star
2016-10-19 14:50 ` Leif Lindholm

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=BF2CCE9263284D428840004653A28B6E5154F5AF@SHSMSX103.ccr.corp.intel.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox