From: "Long, Qin" <qin.long@intel.com>
To: Gary Lin <glin@suse.com>,
"edk2-devel@lists.01.org" <edk2-devel@lists.01.org>
Cc: "Ye, Ting" <ting.ye@intel.com>
Subject: Re: [PATCH 05/33] CryptoPkg: Fix typos in comments
Date: Wed, 26 Oct 2016 03:00:33 +0000 [thread overview]
Message-ID: <BF2CCE9263284D428840004653A28B6E5154F5AF@SHSMSX103.ccr.corp.intel.com> (raw)
In-Reply-To: <20161019070138.16424-6-glin@suse.com>
Thanks.
Reviewed-by: Qin Long <qin.long@intel.com> to CryptoPkg fixes.
Best Regards & Thanks,
LONG, Qin
> -----Original Message-----
> From: edk2-devel [mailto:edk2-devel-bounces@lists.01.org] On Behalf Of
> Gary Lin
> Sent: Wednesday, October 19, 2016 3:01 PM
> To: edk2-devel@lists.01.org
> Cc: Ye, Ting <ting.ye@intel.com>; Long, Qin <qin.long@intel.com>
> Subject: [edk2] [PATCH 05/33] CryptoPkg: Fix typos in comments
>
> - intialized -> initialized
> - componenet -> component
> - compoents -> components
> - FAlSE -> FALSE
> - responsiblity -> responsibility
> - validility -> validity
> - procudure -> procedure
> - pamameter -> parameter
> - randome -> random
> - buiild -> build
>
> Cc: Ting Ye <ting.ye@intel.com>
> Cc: Qin Long <qin.long@intel.com>
> Contributed-under: TianoCore Contribution Agreement 1.0
> Signed-off-by: Gary Lin <glin@suse.com>
> ---
> CryptoPkg/Include/Library/BaseCryptLib.h | 68
> ++++++++++----------
> CryptoPkg/Include/OpenSslSupport.h | 14 ++--
> CryptoPkg/Library/BaseCryptLib/Hash/CryptMd4.c | 4 +-
> CryptoPkg/Library/BaseCryptLib/Hash/CryptMd5.c | 4 +-
> CryptoPkg/Library/BaseCryptLib/Hash/CryptSha1.c | 4 +-
> CryptoPkg/Library/BaseCryptLib/Hash/CryptSha256.c | 4 +-
> CryptoPkg/Library/BaseCryptLib/Hash/CryptSha512.c | 8 +--
> CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacMd5.c | 4 +-
> CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacSha1.c | 4 +-
> CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticode.c | 4 +-
> CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticodeNull.c | 4
> +-
> CryptoPkg/Library/BaseCryptLib/Pk/CryptDh.c | 4 +-
> CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7Verify.c | 8 +--
> CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7VerifyNull.c | 2 +-
> CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaBasic.c | 4 +-
> CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaExt.c | 2 +-
> CryptoPkg/Library/BaseCryptLib/Pk/CryptTs.c | 4 +-
> CryptoPkg/Library/BaseCryptLib/Pk/CryptTsNull.c | 2 +-
> CryptoPkg/Library/BaseCryptLib/Rand/CryptRand.c | 2 +-
> CryptoPkg/Library/BaseCryptLib/Rand/CryptRandItc.c | 2 +-
> CryptoPkg/Library/BaseCryptLib/Rand/CryptRandNull.c | 2 +-
> CryptoPkg/Library/BaseCryptLib/Rand/CryptRandTsc.c | 2 +-
>
> CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptAuthenticod
> eNull.c | 4 +-
> CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptPkcs7Verify
> Null.c | 2 +-
>
> CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Rand/CryptRandNull.
> c | 2 +-
>
> CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/RuntimeDxeIpfCryptL
> ib.c | 4 +-
> 26 files changed, 84 insertions(+), 84 deletions(-)
>
> diff --git a/CryptoPkg/Include/Library/BaseCryptLib.h
> b/CryptoPkg/Include/Library/BaseCryptLib.h
> index 0371d73..fc8c703 100644
> --- a/CryptoPkg/Include/Library/BaseCryptLib.h
> +++ b/CryptoPkg/Include/Library/BaseCryptLib.h
> @@ -140,7 +140,7 @@ Md4Duplicate (
>
> This function performs MD4 digest on a data buffer of the specified size.
> It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> - MD4 context should be already correctly intialized by Md4Init(), and should
> not be finalized
> + MD4 context should be already correctly initialized by Md4Init(), and
> + should not be finalized
> by Md4Final(). Behavior with invalid context is undefined.
>
> If Md4Context is NULL, then return FALSE.
> @@ -169,7 +169,7 @@ Md4Update (
> This function completes MD4 hash computation and retrieves the digest
> value into
> the specified memory. After this function has been called, the MD4 context
> cannot
> be used again.
> - MD4 context should be already correctly intialized by Md4Init(), and should
> not be
> + MD4 context should be already correctly initialized by Md4Init(), and
> + should not be
> finalized by Md4Final(). Behavior with invalid MD4 context is undefined.
>
> If Md4Context is NULL, then return FALSE.
> @@ -254,7 +254,7 @@ Md5Duplicate (
>
> This function performs MD5 digest on a data buffer of the specified size.
> It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> - MD5 context should be already correctly intialized by Md5Init(), and should
> not be finalized
> + MD5 context should be already correctly initialized by Md5Init(), and
> + should not be finalized
> by Md5Final(). Behavior with invalid context is undefined.
>
> If Md5Context is NULL, then return FALSE.
> @@ -283,7 +283,7 @@ Md5Update (
> This function completes MD5 hash computation and retrieves the digest
> value into
> the specified memory. After this function has been called, the MD5 context
> cannot
> be used again.
> - MD5 context should be already correctly intialized by Md5Init(), and should
> not be
> + MD5 context should be already correctly initialized by Md5Init(), and
> + should not be
> finalized by Md5Final(). Behavior with invalid MD5 context is undefined.
>
> If Md5Context is NULL, then return FALSE.
> @@ -368,7 +368,7 @@ Sha1Duplicate (
>
> This function performs SHA-1 digest on a data buffer of the specified size.
> It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> - SHA-1 context should be already correctly intialized by Sha1Init(), and
> should not be finalized
> + SHA-1 context should be already correctly initialized by Sha1Init(),
> + and should not be finalized
> by Sha1Final(). Behavior with invalid context is undefined.
>
> If Sha1Context is NULL, then return FALSE.
> @@ -397,7 +397,7 @@ Sha1Update (
> This function completes SHA-1 hash computation and retrieves the digest
> value into
> the specified memory. After this function has been called, the SHA-1
> context cannot
> be used again.
> - SHA-1 context should be already correctly intialized by Sha1Init(), and
> should not be
> + SHA-1 context should be already correctly initialized by Sha1Init(),
> + and should not be
> finalized by Sha1Final(). Behavior with invalid SHA-1 context is undefined.
>
> If Sha1Context is NULL, then return FALSE.
> @@ -477,7 +477,7 @@ Sha256Duplicate (
>
> This function performs SHA-256 digest on a data buffer of the specified size.
> It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> - SHA-256 context should be already correctly intialized by Sha256Init(), and
> should not be finalized
> + SHA-256 context should be already correctly initialized by
> + Sha256Init(), and should not be finalized
> by Sha256Final(). Behavior with invalid context is undefined.
>
> If Sha256Context is NULL, then return FALSE.
> @@ -504,7 +504,7 @@ Sha256Update (
> This function completes SHA-256 hash computation and retrieves the digest
> value into
> the specified memory. After this function has been called, the SHA-256
> context cannot
> be used again.
> - SHA-256 context should be already correctly intialized by Sha256Init(), and
> should not be
> + SHA-256 context should be already correctly initialized by
> + Sha256Init(), and should not be
> finalized by Sha256Final(). Behavior with invalid SHA-256 context is
> undefined.
>
> If Sha256Context is NULL, then return FALSE.
> @@ -582,7 +582,7 @@ Sha384Duplicate (
>
> This function performs SHA-384 digest on a data buffer of the specified size.
> It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> - SHA-384 context should be already correctly intialized by Sha384Init(), and
> should not be finalized
> + SHA-384 context should be already correctly initialized by
> + Sha384Init(), and should not be finalized
> by Sha384Final(). Behavior with invalid context is undefined.
>
> If Sha384Context is NULL, then return FALSE.
> @@ -609,7 +609,7 @@ Sha384Update (
> This function completes SHA-384 hash computation and retrieves the digest
> value into
> the specified memory. After this function has been called, the SHA-384
> context cannot
> be used again.
> - SHA-384 context should be already correctly intialized by Sha384Init(), and
> should not be
> + SHA-384 context should be already correctly initialized by
> + Sha384Init(), and should not be
> finalized by Sha384Final(). Behavior with invalid SHA-384 context is
> undefined.
>
> If Sha384Context is NULL, then return FALSE.
> @@ -687,7 +687,7 @@ Sha512Duplicate (
>
> This function performs SHA-512 digest on a data buffer of the specified size.
> It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> - SHA-512 context should be already correctly intialized by Sha512Init(), and
> should not be finalized
> + SHA-512 context should be already correctly initialized by
> + Sha512Init(), and should not be finalized
> by Sha512Final(). Behavior with invalid context is undefined.
>
> If Sha512Context is NULL, then return FALSE.
> @@ -714,7 +714,7 @@ Sha512Update (
> This function completes SHA-512 hash computation and retrieves the digest
> value into
> the specified memory. After this function has been called, the SHA-512
> context cannot
> be used again.
> - SHA-512 context should be already correctly intialized by Sha512Init(), and
> should not be
> + SHA-512 context should be already correctly initialized by
> + Sha512Init(), and should not be
> finalized by Sha512Final(). Behavior with invalid SHA-512 context is
> undefined.
>
> If Sha512Context is NULL, then return FALSE.
> @@ -805,7 +805,7 @@ HmacMd5Duplicate (
>
> This function performs HMAC-MD5 digest on a data buffer of the specified
> size.
> It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> - HMAC-MD5 context should be already correctly intialized by
> HmacMd5Init(), and should not be
> + HMAC-MD5 context should be already correctly initialized by
> + HmacMd5Init(), and should not be
> finalized by HmacMd5Final(). Behavior with invalid context is undefined.
>
> If HmacMd5Context is NULL, then return FALSE.
> @@ -834,7 +834,7 @@ HmacMd5Update (
> This function completes HMAC-MD5 hash computation and retrieves the
> digest value into
> the specified memory. After this function has been called, the HMAC-MD5
> context cannot
> be used again.
> - HMAC-MD5 context should be already correctly intialized by
> HmacMd5Init(), and should not be
> + HMAC-MD5 context should be already correctly initialized by
> + HmacMd5Init(), and should not be
> finalized by HmacMd5Final(). Behavior with invalid HMAC-MD5 context is
> undefined.
>
> If HmacMd5Context is NULL, then return FALSE.
> @@ -923,7 +923,7 @@ HmacSha1Duplicate (
>
> This function performs HMAC-SHA1 digest on a data buffer of the specified
> size.
> It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> - HMAC-SHA1 context should be already correctly intialized by
> HmacSha1Init(), and should not
> + HMAC-SHA1 context should be already correctly initialized by
> + HmacSha1Init(), and should not
> be finalized by HmacSha1Final(). Behavior with invalid context is undefined.
>
> If HmacSha1Context is NULL, then return FALSE.
> @@ -952,7 +952,7 @@ HmacSha1Update (
> This function completes HMAC-SHA1 hash computation and retrieves the
> digest value into
> the specified memory. After this function has been called, the HMAC-SHA1
> context cannot
> be used again.
> - HMAC-SHA1 context should be already correctly intialized by
> HmacSha1Init(), and should
> + HMAC-SHA1 context should be already correctly initialized by
> + HmacSha1Init(), and should
> not be finalized by HmacSha1Final(). Behavior with invalid HMAC-SHA1
> context is undefined.
>
> If HmacSha1Context is NULL, then return FALSE.
> @@ -1537,14 +1537,14 @@ RsaFree (
> This function sets the tag-designated RSA key component into the
> established
> RSA context from the user-specified non-negative integer (octet string
> format
> represented in RSA PKCS#1).
> - If BigNumber is NULL, then the specified key componenet in RSA context is
> cleared.
> + If BigNumber is NULL, then the specified key component in RSA context is
> cleared.
>
> If RsaContext is NULL, then return FALSE.
>
> @param[in, out] RsaContext Pointer to RSA context being set.
> @param[in] KeyTag Tag of RSA key component being set.
> @param[in] BigNumber Pointer to octet integer buffer.
> - If NULL, then the specified key componenet in RSA
> + If NULL, then the specified key
> + component in RSA
> context is cleared.
> @param[in] BnSize Size of big number buffer in bytes.
> If BigNumber is NULL, then it is ignored.
> @@ -1636,7 +1636,7 @@ RsaGenerateKey (
> NOTE: This function performs integrity checks on all the RSA key material,
> so
> the RSA key structure must contain all the private key data.
>
> - This function validates key compoents of RSA context in following aspects:
> + This function validates key components of RSA context in following aspects:
> - Whether p is a prime
> - Whether q is a prime
> - Whether n = p * q
> @@ -1942,16 +1942,16 @@ X509GetTBSCert (
> in a ContentInfo structure.
>
> If P7Data, CertStack, StackLength, TrustedCert or CertLength is NULL, then
> - return FALSE. If P7Length overflow, then return FAlSE.
> + return FALSE. If P7Length overflow, then return FALSE.
> If this interface is not supported, then return FALSE.
>
> @param[in] P7Data Pointer to the PKCS#7 message to verify.
> @param[in] P7Length Length of the PKCS#7 message in bytes.
> @param[out] CertStack Pointer to Signer's certificates retrieved from
> P7Data.
> - It's caller's responsiblity to free the buffer.
> + It's caller's responsibility to free the buffer.
> @param[out] StackLength Length of signer's certificates in bytes.
> @param[out] TrustedCert Pointer to a trusted certificate from Signer's
> certificates.
> - It's caller's responsiblity to free the buffer.
> + It's caller's responsibility to free the buffer.
> @param[out] CertLength Length of the trusted certificate in bytes.
>
> @retval TRUE The operation is finished successfully.
> @@ -1993,10 +1993,10 @@ Pkcs7FreeSigners (
> @param[in] P7Data Pointer to the PKCS#7 message.
> @param[in] P7Length Length of the PKCS#7 message in bytes.
> @param[out] SignerChainCerts Pointer to the certificates list chained to
> signer's
> - certificate. It's caller's responsiblity to free the buffer.
> + certificate. It's caller's responsibility to free the buffer.
> @param[out] ChainLength Length of the chained certificates list buffer
> in bytes.
> @param[out] UnchainCerts Pointer to the unchained certificates lists. It's
> caller's
> - responsiblity to free the buffer.
> + responsibility to free the buffer.
> @param[out] UnchainLength Length of the unchained certificates list
> buffer in bytes.
>
> @retval TRUE The operation is finished successfully.
> @@ -2055,12 +2055,12 @@ Pkcs7Sign (
> );
>
> /**
> - Verifies the validility of a PKCS#7 signed data as described in "PKCS #7:
> + Verifies the validity of a PKCS#7 signed data as described in "PKCS #7:
> Cryptographic Message Syntax Standard". The input signed data could be
> wrapped
> in a ContentInfo structure.
>
> If P7Data, TrustedCert or InData is NULL, then return FALSE.
> - If P7Length, CertLength or DataLength overflow, then return FAlSE.
> + If P7Length, CertLength or DataLength overflow, then return FALSE.
> If this interface is not supported, then return FALSE.
>
> @param[in] P7Data Pointer to the PKCS#7 message to verify.
> @@ -2092,7 +2092,7 @@ Pkcs7Verify (
> data could be wrapped in a ContentInfo structure.
>
> If P7Data, Content, or ContentSize is NULL, then return FALSE. If P7Length
> overflow,
> - then return FAlSE. If the P7Data is not correctly formatted, then return
> FALSE.
> + then return FALSE. If the P7Data is not correctly formatted, then return
> FALSE.
>
> Caution: This function may receive untrusted input. So this function will do
> basic check for PKCS#7 data structure.
> @@ -2100,7 +2100,7 @@ Pkcs7Verify (
> @param[in] P7Data Pointer to the PKCS#7 signed data to process.
> @param[in] P7Length Length of the PKCS#7 signed data in bytes.
> @param[out] Content Pointer to the extracted content from the PKCS#7
> signedData.
> - It's caller's responsiblity to free the buffer.
> + It's caller's responsibility to free the buffer.
> @param[out] ContentSize The size of the extracted content in bytes.
>
> @retval TRUE The P7Data was correctly formatted for processing.
> @@ -2117,7 +2117,7 @@ Pkcs7GetAttachedContent (
> );
>
> /**
> - Verifies the validility of a PE/COFF Authenticode Signature as described in
> "Windows
> + Verifies the validity of a PE/COFF Authenticode Signature as
> + described in "Windows
> Authenticode Portable Executable Signature Format".
>
> If AuthData is NULL, then return FALSE.
> @@ -2130,7 +2130,7 @@ Pkcs7GetAttachedContent (
> @param[in] TrustedCert Pointer to a trusted/root certificate encoded in
> DER, which
> is used for certificate chain verification.
> @param[in] CertSize Size of the trusted certificate in bytes.
> - @param[in] ImageHash Pointer to the original image file hash value. The
> procudure
> + @param[in] ImageHash Pointer to the original image file hash value. The
> procedure
> for calculating the image hash value is described in
> Authenticode
> specification.
> @param[in] HashSize Size of Image hash value in bytes.
> @@ -2152,7 +2152,7 @@ AuthenticodeVerify (
> );
>
> /**
> - Verifies the validility of a RFC3161 Timestamp CounterSignature embedded
> in PE/COFF Authenticode
> + Verifies the validity of a RFC3161 Timestamp CounterSignature
> + embedded in PE/COFF Authenticode
> signature.
>
> If AuthData is NULL, then return FALSE.
> @@ -2231,7 +2231,7 @@ DhFree (
> @param[in] PrimeLength Length in bits of prime to be generated.
> @param[out] Prime Pointer to the buffer to receive the generated
> prime number.
>
> - @retval TRUE DH pamameter generation succeeded.
> + @retval TRUE DH parameter generation succeeded.
> @retval FALSE Value of Generator is not supported.
> @retval FALSE PRNG fails to generate random prime number with
> PrimeLength.
> @retval FALSE This interface is not supported.
> @@ -2261,7 +2261,7 @@ DhGenerateParameter (
> @param[in] PrimeLength Length in bits of prime to be generated.
> @param[in] Prime Pointer to the prime number.
>
> - @retval TRUE DH pamameter setting succeeded.
> + @retval TRUE DH parameter setting succeeded.
> @retval FALSE Value of Generator is not supported.
> @retval FALSE Value of Generator is not suitable for the Prime.
> @retval FALSE Value of Prime is not a prime number.
> @@ -2382,7 +2382,7 @@ RandomSeed (
> If this interface is not supported, then return FALSE.
>
> @param[out] Output Pointer to buffer to receive random value.
> - @param[in] Size Size of randome bytes to generate.
> + @param[in] Size Size of random bytes to generate.
>
> @retval TRUE Pseudorandom byte stream generated successfully.
> @retval FALSE Pseudorandom number generator fails to generate due to
> lack of entropy.
> diff --git a/CryptoPkg/Include/OpenSslSupport.h
> b/CryptoPkg/Include/OpenSslSupport.h
> index 239ae8b..dad40e4 100644
> --- a/CryptoPkg/Include/OpenSslSupport.h
> +++ b/CryptoPkg/Include/OpenSslSupport.h
> @@ -69,7 +69,7 @@ typedef VOID *FILE;
> #endif
>
> //
> -// #defines from EFI Application Toolkit required to buiild Open SSL
> +// #defines from EFI Application Toolkit required to build Open SSL
> //
> #define ENOMEM 12 /* Cannot allocate memory */
> #define EINVAL 22 /* Invalid argument */
> @@ -92,7 +92,7 @@ typedef VOID *FILE;
> #define LOG_CONS 0x02 /* log on the console if errors in sending */
>
> //
> -// Macros from EFI Application Toolkit required to buiild Open SSL
> +// Macros from EFI Application Toolkit required to build Open SSL
> //
> /* The offsetof() macro calculates the offset of a structure member
> in its structure. Unfortunately this cannot be written down @@ -102,7
> +102,7 @@ typedef VOID *FILE; #define offsetof(type, member)
> OFFSET_OF (type, member)
>
> //
> -// Basic types from EFI Application Toolkit required to buiild Open SSL
> +// Basic types from EFI Application Toolkit required to build Open SSL
> //
> typedef UINTN size_t;
> typedef INTN ssize_t;
> @@ -120,7 +120,7 @@ typedef void *DIR;
> typedef void __sighandler_t (int);
>
> //
> -// Structures from EFI Application Toolkit required to buiild Open SSL
> +// Structures from EFI Application Toolkit required to build Open SSL
> //
> struct tm {
> int tm_sec; /* seconds after the minute [0-60] */
> @@ -173,12 +173,12 @@ struct stat {
> };
>
> //
> -// Externs from EFI Application Toolkit required to buiild Open SSL
> +// Externs from EFI Application Toolkit required to build Open SSL
> //
> extern int errno;
>
> //
> -// Function prototypes from EFI Application Toolkit required to buiild Open
> SSL
> +// Function prototypes from EFI Application Toolkit required to build
> +Open SSL
> //
> void *malloc (size_t);
> void *realloc (void *, size_t);
> @@ -247,7 +247,7 @@ void abort (void);
> __sighandler_t *signal (int, __sighandler_t *);
>
> //
> -// Global variables from EFI Application Toolkit required to buiild Open SSL
> +// Global variables from EFI Application Toolkit required to build Open
> +SSL
> //
> extern FILE *stderr;
> extern FILE *stdin;
> diff --git a/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd4.c
> b/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd4.c
> index 633d343..148d0a9 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd4.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd4.c
> @@ -101,7 +101,7 @@ Md4Duplicate (
>
> This function performs MD4 digest on a data buffer of the specified size.
> It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> - MD4 context should be already correctly intialized by Md4Init(), and should
> not be finalized
> + MD4 context should be already correctly initialized by Md4Init(), and
> + should not be finalized
> by Md4Final(). Behavior with invalid context is undefined.
>
> If Md4Context is NULL, then return FALSE.
> @@ -148,7 +148,7 @@ Md4Update (
> This function completes MD4 hash computation and retrieves the digest
> value into
> the specified memory. After this function has been called, the MD4 context
> cannot
> be used again.
> - MD4 context should be already correctly intialized by Md4Init(), and should
> not be
> + MD4 context should be already correctly initialized by Md4Init(), and
> + should not be
> finalized by Md4Final(). Behavior with invalid MD4 context is undefined.
>
> If Md4Context is NULL, then return FALSE.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd5.c
> b/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd5.c
> index e1c10e3..809f06f 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd5.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd5.c
> @@ -103,7 +103,7 @@ Md5Duplicate (
>
> This function performs MD5 digest on a data buffer of the specified size.
> It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> - MD5 context should be already correctly intialized by Md5Init(), and should
> not be finalized
> + MD5 context should be already correctly initialized by Md5Init(), and
> + should not be finalized
> by Md5Final(). Behavior with invalid context is undefined.
>
> If Md5Context is NULL, then return FALSE.
> @@ -150,7 +150,7 @@ Md5Update (
> This function completes MD5 hash computation and retrieves the digest
> value into
> the specified memory. After this function has been called, the MD5 context
> cannot
> be used again.
> - MD5 context should be already correctly intialized by Md5Init(), and should
> not be
> + MD5 context should be already correctly initialized by Md5Init(), and
> + should not be
> finalized by Md5Final(). Behavior with invalid MD5 context is undefined.
>
> If Md5Context is NULL, then return FALSE.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha1.c
> b/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha1.c
> index 78c29c1..1a8ac6c 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha1.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha1.c
> @@ -102,7 +102,7 @@ Sha1Duplicate (
>
> This function performs SHA-1 digest on a data buffer of the specified size.
> It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> - SHA-1 context should be already correctly intialized by Sha1Init(), and
> should not be finalized
> + SHA-1 context should be already correctly initialized by Sha1Init(),
> + and should not be finalized
> by Sha1Final(). Behavior with invalid context is undefined.
>
> If Sha1Context is NULL, then return FALSE.
> @@ -149,7 +149,7 @@ Sha1Update (
> This function completes SHA-1 hash computation and retrieves the digest
> value into
> the specified memory. After this function has been called, the SHA-1
> context cannot
> be used again.
> - SHA-1 context should be already correctly intialized by Sha1Init(), and
> should not be
> + SHA-1 context should be already correctly initialized by Sha1Init(),
> + and should not be
> finalized by Sha1Final(). Behavior with invalid SHA-1 context is undefined.
>
> If Sha1Context is NULL, then return FALSE.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha256.c
> b/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha256.c
> index 56894ac..ec45d6a 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha256.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha256.c
> @@ -101,7 +101,7 @@ Sha256Duplicate (
>
> This function performs SHA-256 digest on a data buffer of the specified size.
> It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> - SHA-256 context should be already correctly intialized by Sha256Init(), and
> should not be finalized
> + SHA-256 context should be already correctly initialized by
> + Sha256Init(), and should not be finalized
> by Sha256Final(). Behavior with invalid context is undefined.
>
> If Sha256Context is NULL, then return FALSE.
> @@ -148,7 +148,7 @@ Sha256Update (
> This function completes SHA-256 hash computation and retrieves the digest
> value into
> the specified memory. After this function has been called, the SHA-256
> context cannot
> be used again.
> - SHA-256 context should be already correctly intialized by Sha256Init(), and
> should not be
> + SHA-256 context should be already correctly initialized by
> + Sha256Init(), and should not be
> finalized by Sha256Final(). Behavior with invalid SHA-256 context is
> undefined.
>
> If Sha256Context is NULL, then return FALSE.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha512.c
> b/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha512.c
> index 491f45d..e68a4bf 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha512.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha512.c
> @@ -103,7 +103,7 @@ Sha384Duplicate (
>
> This function performs SHA-384 digest on a data buffer of the specified size.
> It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> - SHA-384 context should be already correctly intialized by Sha384Init(), and
> should not be finalized
> + SHA-384 context should be already correctly initialized by
> + Sha384Init(), and should not be finalized
> by Sha384Final(). Behavior with invalid context is undefined.
>
> If Sha384Context is NULL, then return FALSE.
> @@ -150,7 +150,7 @@ Sha384Update (
> This function completes SHA-384 hash computation and retrieves the digest
> value into
> the specified memory. After this function has been called, the SHA-384
> context cannot
> be used again.
> - SHA-384 context should be already correctly intialized by Sha384Init(), and
> should not be
> + SHA-384 context should be already correctly initialized by
> + Sha384Init(), and should not be
> finalized by Sha384Final(). Behavior with invalid SHA-384 context is
> undefined.
>
> If Sha384Context is NULL, then return FALSE.
> @@ -272,7 +272,7 @@ Sha512Duplicate (
>
> This function performs SHA-512 digest on a data buffer of the specified size.
> It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> - SHA-512 context should be already correctly intialized by Sha512Init(), and
> should not be finalized
> + SHA-512 context should be already correctly initialized by
> + Sha512Init(), and should not be finalized
> by Sha512Final(). Behavior with invalid context is undefined.
>
> If Sha512Context is NULL, then return FALSE.
> @@ -319,7 +319,7 @@ Sha512Update (
> This function completes SHA-512 hash computation and retrieves the digest
> value into
> the specified memory. After this function has been called, the SHA-512
> context cannot
> be used again.
> - SHA-512 context should be already correctly intialized by Sha512Init(), and
> should not be
> + SHA-512 context should be already correctly initialized by
> + Sha512Init(), and should not be
> finalized by Sha512Final(). Behavior with invalid SHA-512 context is
> undefined.
>
> If Sha512Context is NULL, then return FALSE.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacMd5.c
> b/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacMd5.c
> index 693cd32..6175061 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacMd5.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacMd5.c
> @@ -108,7 +108,7 @@ HmacMd5Duplicate (
>
> This function performs HMAC-MD5 digest on a data buffer of the specified
> size.
> It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> - HMAC-MD5 context should be already correctly intialized by
> HmacMd5Init(), and should not be
> + HMAC-MD5 context should be already correctly initialized by
> + HmacMd5Init(), and should not be
> finalized by HmacMd5Final(). Behavior with invalid context is undefined.
>
> If HmacMd5Context is NULL, then return FALSE.
> @@ -157,7 +157,7 @@ HmacMd5Update (
> This function completes HMAC-MD5 digest computation and retrieves the
> digest value into
> the specified memory. After this function has been called, the HMAC-MD5
> context cannot
> be used again.
> - HMAC-MD5 context should be already correctly intialized by
> HmacMd5Init(), and should not be
> + HMAC-MD5 context should be already correctly initialized by
> + HmacMd5Init(), and should not be
> finalized by HmacMd5Final(). Behavior with invalid HMAC-MD5 context is
> undefined.
>
> If HmacMd5Context is NULL, then return FALSE.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacSha1.c
> b/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacSha1.c
> index 881d26c..e660258 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacSha1.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacSha1.c
> @@ -108,7 +108,7 @@ HmacSha1Duplicate (
>
> This function performs HMAC-SHA1 digest on a data buffer of the specified
> size.
> It can be called multiple times to compute the digest of long or
> discontinuous data streams.
> - HMAC-SHA1 context should be already correctly intialized by
> HmacSha1Init(), and should not
> + HMAC-SHA1 context should be already correctly initialized by
> + HmacSha1Init(), and should not
> be finalized by HmacSha1Final(). Behavior with invalid context is undefined.
>
> If HmacSha1Context is NULL, then return FALSE.
> @@ -157,7 +157,7 @@ HmacSha1Update (
> This function completes HMAC-SHA1 digest computation and retrieves the
> digest value into
> the specified memory. After this function has been called, the HMAC-SHA1
> context cannot
> be used again.
> - HMAC-SHA1 context should be already correctly intialized by
> HmacSha1Init(), and should
> + HMAC-SHA1 context should be already correctly initialized by
> + HmacSha1Init(), and should
> not be finalized by HmacSha1Final(). Behavior with invalid HMAC-SHA1
> context is undefined.
>
> If HmacSha1Context is NULL, then return FALSE.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticode.c
> b/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticode.c
> index 857281d..74e50a2 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticode.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticode.c
> @@ -34,7 +34,7 @@ UINT8 mSpcIndirectOidValue[] = {
> };
>
> /**
> - Verifies the validility of a PE/COFF Authenticode Signature as described in
> "Windows
> + Verifies the validity of a PE/COFF Authenticode Signature as
> + described in "Windows
> Authenticode Portable Executable Signature Format".
>
> If AuthData is NULL, then return FALSE.
> @@ -50,7 +50,7 @@ UINT8 mSpcIndirectOidValue[] = {
> @param[in] TrustedCert Pointer to a trusted/root certificate encoded in
> DER, which
> is used for certificate chain verification.
> @param[in] CertSize Size of the trusted certificate in bytes.
> - @param[in] ImageHash Pointer to the original image file hash value. The
> procudure
> + @param[in] ImageHash Pointer to the original image file hash value. The
> procedure
> for calculating the image hash value is described in
> Authenticode
> specification.
> @param[in] HashSize Size of Image hash value in bytes.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticodeNull.c
> b/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticodeNull.c
> index 5554486..afec025 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticodeNull.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticodeNull.c
> @@ -16,7 +16,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY
> KIND, EITHER EXPRESS OR IMPLIED.
> #include "InternalCryptLib.h"
>
> /**
> - Verifies the validility of a PE/COFF Authenticode Signature as described in
> "Windows
> + Verifies the validity of a PE/COFF Authenticode Signature as
> + described in "Windows
> Authenticode Portable Executable Signature Format".
>
> Return FALSE to indicate this interface is not supported.
> @@ -27,7 +27,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY
> KIND, EITHER EXPRESS OR IMPLIED.
> @param[in] TrustedCert Pointer to a trusted/root certificate encoded in
> DER, which
> is used for certificate chain verification.
> @param[in] CertSize Size of the trusted certificate in bytes.
> - @param[in] ImageHash Pointer to the original image file hash value. The
> procudure
> + @param[in] ImageHash Pointer to the original image file hash value. The
> procedure
> for calculating the image hash value is described in
> Authenticode
> specification.
> @param[in] HashSize Size of Image hash value in bytes.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptDh.c
> b/CryptoPkg/Library/BaseCryptLib/Pk/CryptDh.c
> index 5e0447b..a5d6e49 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptDh.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptDh.c
> @@ -73,7 +73,7 @@ DhFree (
> @param[in] PrimeLength Length in bits of prime to be generated.
> @param[out] Prime Pointer to the buffer to receive the generated
> prime number.
>
> - @retval TRUE DH pamameter generation succeeded.
> + @retval TRUE DH parameter generation succeeded.
> @retval FALSE Value of Generator is not supported.
> @retval FALSE PRNG fails to generate random prime number with
> PrimeLength.
>
> @@ -124,7 +124,7 @@ DhGenerateParameter (
> @param[in] PrimeLength Length in bits of prime to be generated.
> @param[in] Prime Pointer to the prime number.
>
> - @retval TRUE DH pamameter setting succeeded.
> + @retval TRUE DH parameter setting succeeded.
> @retval FALSE Value of Generator is not supported.
> @retval FALSE Value of Generator is not suitable for the Prime.
> @retval FALSE Value of Prime is not a prime number.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7Verify.c
> b/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7Verify.c
> index 4dd1625..dcaba43 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7Verify.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7Verify.c
> @@ -229,7 +229,7 @@ _Exit:
> in a ContentInfo structure.
>
> If P7Data, CertStack, StackLength, TrustedCert or CertLength is NULL, then
> - return FALSE. If P7Length overflow, then return FAlSE.
> + return FALSE. If P7Length overflow, then return FALSE.
>
> Caution: This function may receive untrusted input.
> UEFI Authenticated Variable is external input, so this function will do basic
> @@ -718,12 +718,12 @@ _Error:
> }
>
> /**
> - Verifies the validility of a PKCS#7 signed data as described in "PKCS #7:
> + Verifies the validity of a PKCS#7 signed data as described in "PKCS #7:
> Cryptographic Message Syntax Standard". The input signed data could be
> wrapped
> in a ContentInfo structure.
>
> If P7Data, TrustedCert or InData is NULL, then return FALSE.
> - If P7Length, CertLength or DataLength overflow, then return FAlSE.
> + If P7Length, CertLength or DataLength overflow, then return FALSE.
>
> Caution: This function may receive untrusted input.
> UEFI Authenticated Variable is external input, so this function will do basic
> @@ -897,7 +897,7 @@ _Exit:
> data could be wrapped in a ContentInfo structure.
>
> If P7Data, Content, or ContentSize is NULL, then return FALSE. If P7Length
> overflow,
> - then return FAlSE. If the P7Data is not correctly formatted, then return
> FALSE.
> + then return FALSE. If the P7Data is not correctly formatted, then return
> FALSE.
>
> Caution: This function may receive untrusted input. So this function will do
> basic check for PKCS#7 data structure.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7VerifyNull.c
> b/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7VerifyNull.c
> index d09fd54..06602ec 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7VerifyNull.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7VerifyNull.c
> @@ -101,7 +101,7 @@ Pkcs7GetCertificatesList ( }
>
> /**
> - Verifies the validility of a PKCS#7 signed data as described in "PKCS #7:
> + Verifies the validity of a PKCS#7 signed data as described in "PKCS #7:
> Cryptographic Message Syntax Standard". The input signed data could be
> wrapped
> in a ContentInfo structure.
>
> diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaBasic.c
> b/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaBasic.c
> index e49db51..e68dd02 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaBasic.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaBasic.c
> @@ -67,14 +67,14 @@ RsaFree (
> This function sets the tag-designated RSA key component into the
> established
> RSA context from the user-specified non-negative integer (octet string
> format
> represented in RSA PKCS#1).
> - If BigNumber is NULL, then the specified key componenet in RSA context is
> cleared.
> + If BigNumber is NULL, then the specified key component in RSA context is
> cleared.
>
> If RsaContext is NULL, then return FALSE.
>
> @param[in, out] RsaContext Pointer to RSA context being set.
> @param[in] KeyTag Tag of RSA key component being set.
> @param[in] BigNumber Pointer to octet integer buffer.
> - If NULL, then the specified key componenet in RSA
> + If NULL, then the specified key
> + component in RSA
> context is cleared.
> @param[in] BnSize Size of big number buffer in bytes.
> If BigNumber is NULL, then it is ignored.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaExt.c
> b/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaExt.c
> index b941d6f..30552e4 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaExt.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaExt.c
> @@ -248,7 +248,7 @@ _Exit:
> NOTE: This function performs integrity checks on all the RSA key material,
> so
> the RSA key structure must contain all the private key data.
>
> - This function validates key compoents of RSA context in following aspects:
> + This function validates key components of RSA context in following aspects:
> - Whether p is a prime
> - Whether q is a prime
> - Whether n = p * q
> diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptTs.c
> b/CryptoPkg/Library/BaseCryptLib/Pk/CryptTs.c
> index d495812..1b78472 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptTs.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptTs.c
> @@ -323,7 +323,7 @@ _Exit:
> }
>
> /**
> - Verifies the validility of a TimeStamp Token as described in RFC 3161
> ("Internet
> + Verifies the validity of a TimeStamp Token as described in RFC 3161
> + ("Internet
> X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)").
>
> If TSToken is NULL, then return FALSE.
> @@ -497,7 +497,7 @@ _Exit:
> }
>
> /**
> - Verifies the validility of a RFC3161 Timestamp CounterSignature embedded
> in PE/COFF Authenticode
> + Verifies the validity of a RFC3161 Timestamp CounterSignature
> + embedded in PE/COFF Authenticode
> signature.
>
> If AuthData is NULL, then return FALSE.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptTsNull.c
> b/CryptoPkg/Library/BaseCryptLib/Pk/CryptTsNull.c
> index eb32aaf..a43f733 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptTsNull.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptTsNull.c
> @@ -16,7 +16,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY
> KIND, EITHER EXPRESS OR IMPLIED.
> #include "InternalCryptLib.h"
>
> /**
> - Verifies the validility of a RFC3161 Timestamp CounterSignature embedded
> in PE/COFF Authenticode
> + Verifies the validity of a RFC3161 Timestamp CounterSignature
> + embedded in PE/COFF Authenticode
> signature.
>
> Return FALSE to indicate this interface is not supported.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRand.c
> b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRand.c
> index 895ce83..fd3c6d4 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRand.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRand.c
> @@ -79,7 +79,7 @@ RandomSeed (
> If Output is NULL, then return FALSE.
>
> @param[out] Output Pointer to buffer to receive random value.
> - @param[in] Size Size of randome bytes to generate.
> + @param[in] Size Size of random bytes to generate.
>
> @retval TRUE Pseudorandom byte stream generated successfully.
> @retval FALSE Pseudorandom number generator fails to generate due to
> lack of entropy.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandItc.c
> b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandItc.c
> index 9f87087..3db5157 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandItc.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandItc.c
> @@ -87,7 +87,7 @@ RandomSeed (
> If Output is NULL, then return FALSE.
>
> @param[out] Output Pointer to buffer to receive random value.
> - @param[in] Size Size of randome bytes to generate.
> + @param[in] Size Size of random bytes to generate.
>
> @retval TRUE Pseudorandom byte stream generated successfully.
> @retval FALSE Pseudorandom number generator fails to generate due to
> lack of entropy.
> diff --git a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandNull.c
> b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandNull.c
> index 8838e22..c292a23 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandNull.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandNull.c
> @@ -46,7 +46,7 @@ RandomSeed (
> Return FALSE to indicate this interface is not supported.
>
> @param[out] Output Pointer to buffer to receive random value.
> - @param[in] Size Size of randome bytes to generate.
> + @param[in] Size Size of random bytes to generate.
>
> @retval FALSE This interface is not supported.
>
> diff --git a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandTsc.c
> b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandTsc.c
> index 9bd349d..15f0b3f 100644
> --- a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandTsc.c
> +++ b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandTsc.c
> @@ -87,7 +87,7 @@ RandomSeed (
> If Output is NULL, then return FALSE.
>
> @param[out] Output Pointer to buffer to receive random value.
> - @param[in] Size Size of randome bytes to generate.
> + @param[in] Size Size of random bytes to generate.
>
> @retval TRUE Pseudorandom byte stream generated successfully.
> @retval FALSE Pseudorandom number generator fails to generate due to
> lack of entropy.
> diff --git
> a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptAuthentic
> odeNull.c
> b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptAuthentic
> odeNull.c
> index 5554486..afec025 100644
> ---
> a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptAuthentic
> odeNull.c
> +++
> b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptAuthent
> +++ icodeNull.c
> @@ -16,7 +16,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY
> KIND, EITHER EXPRESS OR IMPLIED.
> #include "InternalCryptLib.h"
>
> /**
> - Verifies the validility of a PE/COFF Authenticode Signature as described in
> "Windows
> + Verifies the validity of a PE/COFF Authenticode Signature as
> + described in "Windows
> Authenticode Portable Executable Signature Format".
>
> Return FALSE to indicate this interface is not supported.
> @@ -27,7 +27,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY
> KIND, EITHER EXPRESS OR IMPLIED.
> @param[in] TrustedCert Pointer to a trusted/root certificate encoded in
> DER, which
> is used for certificate chain verification.
> @param[in] CertSize Size of the trusted certificate in bytes.
> - @param[in] ImageHash Pointer to the original image file hash value. The
> procudure
> + @param[in] ImageHash Pointer to the original image file hash value. The
> procedure
> for calculating the image hash value is described in
> Authenticode
> specification.
> @param[in] HashSize Size of Image hash value in bytes.
> diff --git
> a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptPkcs7Verif
> yNull.c
> b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptPkcs7Verif
> yNull.c
> index d09fd54..06602ec 100644
> ---
> a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptPkcs7Verif
> yNull.c
> +++
> b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptPkcs7Ve
> +++ rifyNull.c
> @@ -101,7 +101,7 @@ Pkcs7GetCertificatesList ( }
>
> /**
> - Verifies the validility of a PKCS#7 signed data as described in "PKCS #7:
> + Verifies the validity of a PKCS#7 signed data as described in "PKCS #7:
> Cryptographic Message Syntax Standard". The input signed data could be
> wrapped
> in a ContentInfo structure.
>
> diff --git
> a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Rand/CryptRandNu
> ll.c
> b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Rand/CryptRandNu
> ll.c
> index 8838e22..c292a23 100644
> ---
> a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Rand/CryptRandNu
> ll.c
> +++
> b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Rand/CryptRandN
> +++ ull.c
> @@ -46,7 +46,7 @@ RandomSeed (
> Return FALSE to indicate this interface is not supported.
>
> @param[out] Output Pointer to buffer to receive random value.
> - @param[in] Size Size of randome bytes to generate.
> + @param[in] Size Size of random bytes to generate.
>
> @retval FALSE This interface is not supported.
>
> diff --git
> a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/RuntimeDxeIpfCry
> ptLib.c
> b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/RuntimeDxeIpfCry
> ptLib.c
> index cd40d16..9babc7e 100644
> ---
> a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/RuntimeDxeIpfCry
> ptLib.c
> +++
> b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/RuntimeDxeIpfCr
> +++ yptLib.c
> @@ -344,14 +344,14 @@ RsaFree (
> This function sets the tag-designated RSA key component into the
> established
> RSA context from the user-specified non-negative integer (octet string
> format
> represented in RSA PKCS#1).
> - If BigNumber is NULL, then the specified key componenet in RSA context is
> cleared.
> + If BigNumber is NULL, then the specified key component in RSA context is
> cleared.
>
> If RsaContext is NULL, then return FALSE.
>
> @param[in, out] RsaContext Pointer to RSA context being set.
> @param[in] KeyTag Tag of RSA key component being set.
> @param[in] BigNumber Pointer to octet integer buffer.
> - If NULL, then the specified key componenet in RSA
> + If NULL, then the specified key
> + component in RSA
> context is cleared.
> @param[in] BnSize Size of big number buffer in bytes.
> If BigNumber is NULL, then it is ignored.
> --
> 2.10.1
>
> _______________________________________________
> edk2-devel mailing list
> edk2-devel@lists.01.org
> https://lists.01.org/mailman/listinfo/edk2-devel
next prev parent reply other threads:[~2016-10-26 3:01 UTC|newest]
Thread overview: 79+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-10-19 7:01 [PATCH 00/33] Fix typos in comments and variables Gary Lin
2016-10-19 7:01 ` [PATCH 01/33] ArmPkg: Fix typos in comments Gary Lin
2016-10-19 15:09 ` Ard Biesheuvel
2016-10-19 15:15 ` Laszlo Ersek
2016-10-19 15:33 ` Leif Lindholm
2016-10-19 7:01 ` [PATCH 02/33] BaseTools: Fix typos in comments and variables Gary Lin
2016-10-19 7:30 ` Gao, Liming
2016-10-19 7:36 ` Zhu, Yonghong
2016-10-19 7:01 ` [PATCH 03/33] CorebootPayloadPkg: Fix typos in comments Gary Lin
2016-10-26 18:50 ` Ma, Maurice
2016-10-19 7:01 ` [PATCH 04/33] CorebootModulePkg: " Gary Lin
2016-10-26 18:41 ` Ma, Maurice
2016-10-19 7:01 ` [PATCH 05/33] CryptoPkg: " Gary Lin
2016-10-26 3:00 ` Long, Qin [this message]
2016-10-19 7:01 ` [PATCH 06/33] DuetPkg: " Gary Lin
2016-10-19 7:46 ` Ni, Ruiyu
2016-10-19 7:01 ` [PATCH 07/33] EdkCompatibilityPkg: " Gary Lin
2016-10-19 8:19 ` Gao, Liming
2016-10-19 7:01 ` [PATCH 08/33] EmulatorPkg: Fix typos in comments and variables Gary Lin
2016-10-19 20:37 ` Jordan Justen
2016-10-20 8:16 ` Laszlo Ersek
2016-10-19 7:01 ` [PATCH 09/33] EmbeddedPkg: Fix typos in comments Gary Lin
2016-10-19 15:09 ` Ard Biesheuvel
2016-10-19 7:01 ` [PATCH 10/33] IntelFrameworkModulePkg: " Gary Lin
2016-10-20 1:08 ` Fan, Jeff
2016-10-19 7:01 ` [PATCH 11/33] IntelFrameworkPkg: " Gary Lin
2016-10-20 1:08 ` Fan, Jeff
2016-10-19 7:01 ` [PATCH 12/33] IntelFspPkg: " Gary Lin
2016-10-19 7:06 ` Yao, Jiewen
2016-10-19 7:01 ` [PATCH 13/33] IntelFspWrapperPkg: " Gary Lin
2016-10-19 7:08 ` Yao, Jiewen
2016-10-19 7:01 ` [PATCH 14/33] IntelFsp2Pkg: " Gary Lin
2016-10-19 7:06 ` Yao, Jiewen
2016-10-19 7:12 ` Mudusuru, Giri P
2016-10-19 7:01 ` [PATCH 15/33] IntelFsp2WrapperPkg: Fix a typo in the comment Gary Lin
2016-10-19 7:07 ` Yao, Jiewen
2016-10-19 7:11 ` Mudusuru, Giri P
2016-10-19 7:01 ` [PATCH 16/33] MdeModulePkg: BootManagerMenuApp: Fix typos in comments Gary Lin
2016-10-19 8:20 ` Tian, Feng
2016-10-19 7:01 ` [PATCH 17/33] MdeModulePkg/Bus: " Gary Lin
2016-10-19 7:01 ` [PATCH 18/33] MdeModulePkg/Core: " Gary Lin
2016-10-19 8:20 ` Tian, Feng
2016-10-19 7:01 ` [PATCH 19/33] MdeModulePkg/Include: " Gary Lin
2016-10-19 7:01 ` [PATCH 20/33] MdeModulePkg/Library: Fix typos in comments and variables Gary Lin
2016-10-19 7:01 ` [PATCH 21/33] MdeModulePkg/Universal: Fix typos in comments Gary Lin
2016-10-19 7:01 ` [PATCH 22/33] MdePkg: " Gary Lin
2016-10-19 8:21 ` Gao, Liming
2016-10-19 7:01 ` [PATCH 23/33] NetworkPkg: " Gary Lin
2016-10-19 7:21 ` Fu, Siyuan
2016-10-26 0:53 ` Fu, Siyuan
2016-10-19 7:01 ` [PATCH 24/33] Nt32Pkg: Fix typos in comments and variables Gary Lin
2016-10-19 7:50 ` Ni, Ruiyu
2016-10-19 7:01 ` [PATCH 25/33] OptionRomPkg: Fix typos in comments Gary Lin
2016-10-19 7:51 ` Ni, Ruiyu
2016-10-19 7:01 ` [PATCH 26/33] OvmfPkg: " Gary Lin
2016-10-19 7:01 ` [PATCH 27/33] QuarkPlatformPkg: " Gary Lin
2016-10-25 20:53 ` Kinney, Michael D
2016-10-19 7:01 ` [PATCH 28/33] QuarkSocPkg: " Gary Lin
2016-10-25 21:00 ` Kinney, Michael D
2016-10-19 7:01 ` [PATCH 29/33] SecurityPkg: " Gary Lin
2016-10-27 1:29 ` Zhang, Chao B
2016-11-14 3:12 ` Zhang, Chao B
2016-11-14 4:03 ` Gary Lin
2016-11-14 6:24 ` Gao, Liming
2016-11-14 8:30 ` Gary Lin
2016-10-19 7:01 ` [PATCH 30/33] ShellPkg: Fix typos in comments and variables Gary Lin
2016-10-19 7:51 ` Ni, Ruiyu
2016-10-19 20:29 ` Carsey, Jaben
2016-10-20 1:55 ` Gary Lin
2016-10-19 7:01 ` [PATCH 31/33] SourceLevelDebugPkg: Fix typos in comments Gary Lin
2016-10-19 7:46 ` Wu, Hao A
2016-10-19 7:01 ` [PATCH 32/33] UefiCpuPkg: " Gary Lin
2016-10-20 1:58 ` Fan, Jeff
2016-10-20 2:08 ` Gary Lin
2016-10-20 2:45 ` Fan, Jeff
2016-10-19 7:01 ` [PATCH 33/33] Vlv2TbltDevicePkg: " Gary Lin
2016-10-24 1:33 ` Wei, David
2016-10-19 7:28 ` [PATCH 00/33] Fix typos in comments and variables Zeng, Star
2016-10-19 14:50 ` Leif Lindholm
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=BF2CCE9263284D428840004653A28B6E5154F5AF@SHSMSX103.ccr.corp.intel.com \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox