From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) (using TLSv1 with cipher CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 2DC621A1E31 for ; Tue, 25 Oct 2016 20:01:07 -0700 (PDT) Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by orsmga103.jf.intel.com with ESMTP; 25 Oct 2016 20:01:06 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.31,548,1473145200"; d="scan'208";a="23710249" Received: from fmsmsx105.amr.corp.intel.com ([10.18.124.203]) by fmsmga005.fm.intel.com with ESMTP; 25 Oct 2016 20:01:06 -0700 Received: from fmsmsx101.amr.corp.intel.com (10.18.124.199) by FMSMSX105.amr.corp.intel.com (10.18.124.203) with Microsoft SMTP Server (TLS) id 14.3.248.2; Tue, 25 Oct 2016 20:01:06 -0700 Received: from shsmsx152.ccr.corp.intel.com (10.239.6.52) by fmsmsx101.amr.corp.intel.com (10.18.124.199) with Microsoft SMTP Server (TLS) id 14.3.248.2; Tue, 25 Oct 2016 20:01:05 -0700 Received: from shsmsx103.ccr.corp.intel.com ([169.254.4.139]) by SHSMSX152.ccr.corp.intel.com ([169.254.6.2]) with mapi id 14.03.0248.002; Wed, 26 Oct 2016 11:00:33 +0800 From: "Long, Qin" To: Gary Lin , "edk2-devel@lists.01.org" CC: "Ye, Ting" Thread-Topic: [edk2] [PATCH 05/33] CryptoPkg: Fix typos in comments Thread-Index: AQHSKdbRHgZJ8Dz0PU2S/AdDgoJzHaC6FOYA Date: Wed, 26 Oct 2016 03:00:33 +0000 Message-ID: References: <20161019070138.16424-1-glin@suse.com> <20161019070138.16424-6-glin@suse.com> In-Reply-To: <20161019070138.16424-6-glin@suse.com> Accept-Language: zh-CN, en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.239.127.40] MIME-Version: 1.0 Subject: Re: [PATCH 05/33] CryptoPkg: Fix typos in comments X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.21 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 26 Oct 2016 03:01:07 -0000 Content-Language: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Thanks.=20 Reviewed-by: Qin Long to CryptoPkg fixes. Best Regards & Thanks, LONG, Qin > -----Original Message----- > From: edk2-devel [mailto:edk2-devel-bounces@lists.01.org] On Behalf Of > Gary Lin > Sent: Wednesday, October 19, 2016 3:01 PM > To: edk2-devel@lists.01.org > Cc: Ye, Ting ; Long, Qin > Subject: [edk2] [PATCH 05/33] CryptoPkg: Fix typos in comments >=20 > - intialized -> initialized > - componenet -> component > - compoents -> components > - FAlSE -> FALSE > - responsiblity -> responsibility > - validility -> validity > - procudure -> procedure > - pamameter -> parameter > - randome -> random > - buiild -> build >=20 > Cc: Ting Ye > Cc: Qin Long > Contributed-under: TianoCore Contribution Agreement 1.0 > Signed-off-by: Gary Lin > --- > CryptoPkg/Include/Library/BaseCryptLib.h = | 68 > ++++++++++---------- > CryptoPkg/Include/OpenSslSupport.h = | 14 ++-- > CryptoPkg/Library/BaseCryptLib/Hash/CryptMd4.c = | 4 +- > CryptoPkg/Library/BaseCryptLib/Hash/CryptMd5.c = | 4 +- > CryptoPkg/Library/BaseCryptLib/Hash/CryptSha1.c = | 4 +- > CryptoPkg/Library/BaseCryptLib/Hash/CryptSha256.c = | 4 +- > CryptoPkg/Library/BaseCryptLib/Hash/CryptSha512.c = | 8 +-- > CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacMd5.c = | 4 +- > CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacSha1.c = | 4 +- > CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticode.c = | 4 +- > CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticodeNull.c = | 4 > +- > CryptoPkg/Library/BaseCryptLib/Pk/CryptDh.c = | 4 +- > CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7Verify.c = | 8 +-- > CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7VerifyNull.c = | 2 +- > CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaBasic.c = | 4 +- > CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaExt.c = | 2 +- > CryptoPkg/Library/BaseCryptLib/Pk/CryptTs.c = | 4 +- > CryptoPkg/Library/BaseCryptLib/Pk/CryptTsNull.c = | 2 +- > CryptoPkg/Library/BaseCryptLib/Rand/CryptRand.c = | 2 +- > CryptoPkg/Library/BaseCryptLib/Rand/CryptRandItc.c = | 2 +- > CryptoPkg/Library/BaseCryptLib/Rand/CryptRandNull.c = | 2 +- > CryptoPkg/Library/BaseCryptLib/Rand/CryptRandTsc.c = | 2 +- >=20 > CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptAuthenticod > eNull.c | 4 +- > CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptPkcs7Verify > Null.c | 2 +- >=20 > CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Rand/CryptRandNull. > c | 2 +- >=20 > CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/RuntimeDxeIpfCryptL > ib.c | 4 +- > 26 files changed, 84 insertions(+), 84 deletions(-) >=20 > diff --git a/CryptoPkg/Include/Library/BaseCryptLib.h > b/CryptoPkg/Include/Library/BaseCryptLib.h > index 0371d73..fc8c703 100644 > --- a/CryptoPkg/Include/Library/BaseCryptLib.h > +++ b/CryptoPkg/Include/Library/BaseCryptLib.h > @@ -140,7 +140,7 @@ Md4Duplicate ( >=20 > This function performs MD4 digest on a data buffer of the specified si= ze. > It can be called multiple times to compute the digest of long or > discontinuous data streams. > - MD4 context should be already correctly intialized by Md4Init(), and s= hould > not be finalized > + MD4 context should be already correctly initialized by Md4Init(), and > + should not be finalized > by Md4Final(). Behavior with invalid context is undefined. >=20 > If Md4Context is NULL, then return FALSE. > @@ -169,7 +169,7 @@ Md4Update ( > This function completes MD4 hash computation and retrieves the digest > value into > the specified memory. After this function has been called, the MD4 con= text > cannot > be used again. > - MD4 context should be already correctly intialized by Md4Init(), and s= hould > not be > + MD4 context should be already correctly initialized by Md4Init(), and > + should not be > finalized by Md4Final(). Behavior with invalid MD4 context is undefine= d. >=20 > If Md4Context is NULL, then return FALSE. > @@ -254,7 +254,7 @@ Md5Duplicate ( >=20 > This function performs MD5 digest on a data buffer of the specified si= ze. > It can be called multiple times to compute the digest of long or > discontinuous data streams. > - MD5 context should be already correctly intialized by Md5Init(), and s= hould > not be finalized > + MD5 context should be already correctly initialized by Md5Init(), and > + should not be finalized > by Md5Final(). Behavior with invalid context is undefined. >=20 > If Md5Context is NULL, then return FALSE. > @@ -283,7 +283,7 @@ Md5Update ( > This function completes MD5 hash computation and retrieves the digest > value into > the specified memory. After this function has been called, the MD5 con= text > cannot > be used again. > - MD5 context should be already correctly intialized by Md5Init(), and s= hould > not be > + MD5 context should be already correctly initialized by Md5Init(), and > + should not be > finalized by Md5Final(). Behavior with invalid MD5 context is undefine= d. >=20 > If Md5Context is NULL, then return FALSE. > @@ -368,7 +368,7 @@ Sha1Duplicate ( >=20 > This function performs SHA-1 digest on a data buffer of the specified = size. > It can be called multiple times to compute the digest of long or > discontinuous data streams. > - SHA-1 context should be already correctly intialized by Sha1Init(), an= d > should not be finalized > + SHA-1 context should be already correctly initialized by Sha1Init(), > + and should not be finalized > by Sha1Final(). Behavior with invalid context is undefined. >=20 > If Sha1Context is NULL, then return FALSE. > @@ -397,7 +397,7 @@ Sha1Update ( > This function completes SHA-1 hash computation and retrieves the diges= t > value into > the specified memory. After this function has been called, the SHA-1 > context cannot > be used again. > - SHA-1 context should be already correctly intialized by Sha1Init(), an= d > should not be > + SHA-1 context should be already correctly initialized by Sha1Init(), > + and should not be > finalized by Sha1Final(). Behavior with invalid SHA-1 context is undef= ined. >=20 > If Sha1Context is NULL, then return FALSE. > @@ -477,7 +477,7 @@ Sha256Duplicate ( >=20 > This function performs SHA-256 digest on a data buffer of the specifie= d size. > It can be called multiple times to compute the digest of long or > discontinuous data streams. > - SHA-256 context should be already correctly intialized by Sha256Init()= , and > should not be finalized > + SHA-256 context should be already correctly initialized by > + Sha256Init(), and should not be finalized > by Sha256Final(). Behavior with invalid context is undefined. >=20 > If Sha256Context is NULL, then return FALSE. > @@ -504,7 +504,7 @@ Sha256Update ( > This function completes SHA-256 hash computation and retrieves the dig= est > value into > the specified memory. After this function has been called, the SHA-256 > context cannot > be used again. > - SHA-256 context should be already correctly intialized by Sha256Init()= , and > should not be > + SHA-256 context should be already correctly initialized by > + Sha256Init(), and should not be > finalized by Sha256Final(). Behavior with invalid SHA-256 context is > undefined. >=20 > If Sha256Context is NULL, then return FALSE. > @@ -582,7 +582,7 @@ Sha384Duplicate ( >=20 > This function performs SHA-384 digest on a data buffer of the specifie= d size. > It can be called multiple times to compute the digest of long or > discontinuous data streams. > - SHA-384 context should be already correctly intialized by Sha384Init()= , and > should not be finalized > + SHA-384 context should be already correctly initialized by > + Sha384Init(), and should not be finalized > by Sha384Final(). Behavior with invalid context is undefined. >=20 > If Sha384Context is NULL, then return FALSE. > @@ -609,7 +609,7 @@ Sha384Update ( > This function completes SHA-384 hash computation and retrieves the dig= est > value into > the specified memory. After this function has been called, the SHA-384 > context cannot > be used again. > - SHA-384 context should be already correctly intialized by Sha384Init()= , and > should not be > + SHA-384 context should be already correctly initialized by > + Sha384Init(), and should not be > finalized by Sha384Final(). Behavior with invalid SHA-384 context is > undefined. >=20 > If Sha384Context is NULL, then return FALSE. > @@ -687,7 +687,7 @@ Sha512Duplicate ( >=20 > This function performs SHA-512 digest on a data buffer of the specifie= d size. > It can be called multiple times to compute the digest of long or > discontinuous data streams. > - SHA-512 context should be already correctly intialized by Sha512Init()= , and > should not be finalized > + SHA-512 context should be already correctly initialized by > + Sha512Init(), and should not be finalized > by Sha512Final(). Behavior with invalid context is undefined. >=20 > If Sha512Context is NULL, then return FALSE. > @@ -714,7 +714,7 @@ Sha512Update ( > This function completes SHA-512 hash computation and retrieves the dig= est > value into > the specified memory. After this function has been called, the SHA-512 > context cannot > be used again. > - SHA-512 context should be already correctly intialized by Sha512Init()= , and > should not be > + SHA-512 context should be already correctly initialized by > + Sha512Init(), and should not be > finalized by Sha512Final(). Behavior with invalid SHA-512 context is > undefined. >=20 > If Sha512Context is NULL, then return FALSE. > @@ -805,7 +805,7 @@ HmacMd5Duplicate ( >=20 > This function performs HMAC-MD5 digest on a data buffer of the specifi= ed > size. > It can be called multiple times to compute the digest of long or > discontinuous data streams. > - HMAC-MD5 context should be already correctly intialized by > HmacMd5Init(), and should not be > + HMAC-MD5 context should be already correctly initialized by > + HmacMd5Init(), and should not be > finalized by HmacMd5Final(). Behavior with invalid context is undefine= d. >=20 > If HmacMd5Context is NULL, then return FALSE. > @@ -834,7 +834,7 @@ HmacMd5Update ( > This function completes HMAC-MD5 hash computation and retrieves the > digest value into > the specified memory. After this function has been called, the HMAC-MD= 5 > context cannot > be used again. > - HMAC-MD5 context should be already correctly intialized by > HmacMd5Init(), and should not be > + HMAC-MD5 context should be already correctly initialized by > + HmacMd5Init(), and should not be > finalized by HmacMd5Final(). Behavior with invalid HMAC-MD5 context is > undefined. >=20 > If HmacMd5Context is NULL, then return FALSE. > @@ -923,7 +923,7 @@ HmacSha1Duplicate ( >=20 > This function performs HMAC-SHA1 digest on a data buffer of the specif= ied > size. > It can be called multiple times to compute the digest of long or > discontinuous data streams. > - HMAC-SHA1 context should be already correctly intialized by > HmacSha1Init(), and should not > + HMAC-SHA1 context should be already correctly initialized by > + HmacSha1Init(), and should not > be finalized by HmacSha1Final(). Behavior with invalid context is unde= fined. >=20 > If HmacSha1Context is NULL, then return FALSE. > @@ -952,7 +952,7 @@ HmacSha1Update ( > This function completes HMAC-SHA1 hash computation and retrieves the > digest value into > the specified memory. After this function has been called, the HMAC-SH= A1 > context cannot > be used again. > - HMAC-SHA1 context should be already correctly intialized by > HmacSha1Init(), and should > + HMAC-SHA1 context should be already correctly initialized by > + HmacSha1Init(), and should > not be finalized by HmacSha1Final(). Behavior with invalid HMAC-SHA1 > context is undefined. >=20 > If HmacSha1Context is NULL, then return FALSE. > @@ -1537,14 +1537,14 @@ RsaFree ( > This function sets the tag-designated RSA key component into the > established > RSA context from the user-specified non-negative integer (octet string > format > represented in RSA PKCS#1). > - If BigNumber is NULL, then the specified key componenet in RSA context= is > cleared. > + If BigNumber is NULL, then the specified key component in RSA context = is > cleared. >=20 > If RsaContext is NULL, then return FALSE. >=20 > @param[in, out] RsaContext Pointer to RSA context being set. > @param[in] KeyTag Tag of RSA key component being set. > @param[in] BigNumber Pointer to octet integer buffer. > - If NULL, then the specified key componene= t in RSA > + If NULL, then the specified key > + component in RSA > context is cleared. > @param[in] BnSize Size of big number buffer in bytes. > If BigNumber is NULL, then it is ignored. > @@ -1636,7 +1636,7 @@ RsaGenerateKey ( > NOTE: This function performs integrity checks on all the RSA key mater= ial, > so > the RSA key structure must contain all the private key data. >=20 > - This function validates key compoents of RSA context in following aspe= cts: > + This function validates key components of RSA context in following asp= ects: > - Whether p is a prime > - Whether q is a prime > - Whether n =3D p * q > @@ -1942,16 +1942,16 @@ X509GetTBSCert ( > in a ContentInfo structure. >=20 > If P7Data, CertStack, StackLength, TrustedCert or CertLength is NULL, = then > - return FALSE. If P7Length overflow, then return FAlSE. > + return FALSE. If P7Length overflow, then return FALSE. > If this interface is not supported, then return FALSE. >=20 > @param[in] P7Data Pointer to the PKCS#7 message to verify. > @param[in] P7Length Length of the PKCS#7 message in bytes. > @param[out] CertStack Pointer to Signer's certificates retrieved fr= om > P7Data. > - It's caller's responsiblity to free the buffe= r. > + It's caller's responsibility to free the buff= er. > @param[out] StackLength Length of signer's certificates in bytes. > @param[out] TrustedCert Pointer to a trusted certificate from Signer'= s > certificates. > - It's caller's responsiblity to free the buffe= r. > + It's caller's responsibility to free the buff= er. > @param[out] CertLength Length of the trusted certificate in bytes. >=20 > @retval TRUE The operation is finished successfully. > @@ -1993,10 +1993,10 @@ Pkcs7FreeSigners ( > @param[in] P7Data Pointer to the PKCS#7 message. > @param[in] P7Length Length of the PKCS#7 message in bytes. > @param[out] SignerChainCerts Pointer to the certificates list chained= to > signer's > - certificate. It's caller's responsiblity= to free the buffer. > + certificate. It's caller's responsibilit= y to free the buffer. > @param[out] ChainLength Length of the chained certificates list = buffer > in bytes. > @param[out] UnchainCerts Pointer to the unchained certificates li= sts. It's > caller's > - responsiblity to free the buffer. > + responsibility to free the buffer. > @param[out] UnchainLength Length of the unchained certificates lis= t > buffer in bytes. >=20 > @retval TRUE The operation is finished successfully. > @@ -2055,12 +2055,12 @@ Pkcs7Sign ( > ); >=20 > /** > - Verifies the validility of a PKCS#7 signed data as described in "PKCS = #7: > + Verifies the validity of a PKCS#7 signed data as described in "PKCS #7= : > Cryptographic Message Syntax Standard". The input signed data could be > wrapped > in a ContentInfo structure. >=20 > If P7Data, TrustedCert or InData is NULL, then return FALSE. > - If P7Length, CertLength or DataLength overflow, then return FAlSE. > + If P7Length, CertLength or DataLength overflow, then return FALSE. > If this interface is not supported, then return FALSE. >=20 > @param[in] P7Data Pointer to the PKCS#7 message to verify. > @@ -2092,7 +2092,7 @@ Pkcs7Verify ( > data could be wrapped in a ContentInfo structure. >=20 > If P7Data, Content, or ContentSize is NULL, then return FALSE. If P7Le= ngth > overflow, > - then return FAlSE. If the P7Data is not correctly formatted, then retu= rn > FALSE. > + then return FALSE. If the P7Data is not correctly formatted, then retu= rn > FALSE. >=20 > Caution: This function may receive untrusted input. So this function w= ill do > basic check for PKCS#7 data structure. > @@ -2100,7 +2100,7 @@ Pkcs7Verify ( > @param[in] P7Data Pointer to the PKCS#7 signed data to process= . > @param[in] P7Length Length of the PKCS#7 signed data in bytes. > @param[out] Content Pointer to the extracted content from the PK= CS#7 > signedData. > - It's caller's responsiblity to free the buff= er. > + It's caller's responsibility to free the buf= fer. > @param[out] ContentSize The size of the extracted content in bytes. >=20 > @retval TRUE The P7Data was correctly formatted for proce= ssing. > @@ -2117,7 +2117,7 @@ Pkcs7GetAttachedContent ( > ); >=20 > /** > - Verifies the validility of a PE/COFF Authenticode Signature as describ= ed in > "Windows > + Verifies the validity of a PE/COFF Authenticode Signature as > + described in "Windows > Authenticode Portable Executable Signature Format". >=20 > If AuthData is NULL, then return FALSE. > @@ -2130,7 +2130,7 @@ Pkcs7GetAttachedContent ( > @param[in] TrustedCert Pointer to a trusted/root certificate encoded= in > DER, which > is used for certificate chain verification. > @param[in] CertSize Size of the trusted certificate in bytes. > - @param[in] ImageHash Pointer to the original image file hash value= . The > procudure > + @param[in] ImageHash Pointer to the original image file hash value= . The > procedure > for calculating the image hash value is descr= ibed in > Authenticode > specification. > @param[in] HashSize Size of Image hash value in bytes. > @@ -2152,7 +2152,7 @@ AuthenticodeVerify ( > ); >=20 > /** > - Verifies the validility of a RFC3161 Timestamp CounterSignature embedd= ed > in PE/COFF Authenticode > + Verifies the validity of a RFC3161 Timestamp CounterSignature > + embedded in PE/COFF Authenticode > signature. >=20 > If AuthData is NULL, then return FALSE. > @@ -2231,7 +2231,7 @@ DhFree ( > @param[in] PrimeLength Length in bits of prime to be generated. > @param[out] Prime Pointer to the buffer to receive the gen= erated > prime number. >=20 > - @retval TRUE DH pamameter generation succeeded. > + @retval TRUE DH parameter generation succeeded. > @retval FALSE Value of Generator is not supported. > @retval FALSE PRNG fails to generate random prime number with > PrimeLength. > @retval FALSE This interface is not supported. > @@ -2261,7 +2261,7 @@ DhGenerateParameter ( > @param[in] PrimeLength Length in bits of prime to be generated. > @param[in] Prime Pointer to the prime number. >=20 > - @retval TRUE DH pamameter setting succeeded. > + @retval TRUE DH parameter setting succeeded. > @retval FALSE Value of Generator is not supported. > @retval FALSE Value of Generator is not suitable for the Prime. > @retval FALSE Value of Prime is not a prime number. > @@ -2382,7 +2382,7 @@ RandomSeed ( > If this interface is not supported, then return FALSE. >=20 > @param[out] Output Pointer to buffer to receive random value. > - @param[in] Size Size of randome bytes to generate. > + @param[in] Size Size of random bytes to generate. >=20 > @retval TRUE Pseudorandom byte stream generated successfully. > @retval FALSE Pseudorandom number generator fails to generate due to > lack of entropy. > diff --git a/CryptoPkg/Include/OpenSslSupport.h > b/CryptoPkg/Include/OpenSslSupport.h > index 239ae8b..dad40e4 100644 > --- a/CryptoPkg/Include/OpenSslSupport.h > +++ b/CryptoPkg/Include/OpenSslSupport.h > @@ -69,7 +69,7 @@ typedef VOID *FILE; > #endif >=20 > // > -// #defines from EFI Application Toolkit required to buiild Open SSL > +// #defines from EFI Application Toolkit required to build Open SSL > // > #define ENOMEM 12 /* Cannot allocate memory */ > #define EINVAL 22 /* Invalid argument */ > @@ -92,7 +92,7 @@ typedef VOID *FILE; > #define LOG_CONS 0x02 /* log on the console if errors in= sending */ >=20 > // > -// Macros from EFI Application Toolkit required to buiild Open SSL > +// Macros from EFI Application Toolkit required to build Open SSL > // > /* The offsetof() macro calculates the offset of a structure member > in its structure. Unfortunately this cannot be written down @@ -102,= 7 > +102,7 @@ typedef VOID *FILE; #define offsetof(type, member) > OFFSET_OF (type, member) >=20 > // > -// Basic types from EFI Application Toolkit required to buiild Open SSL > +// Basic types from EFI Application Toolkit required to build Open SSL > // > typedef UINTN size_t; > typedef INTN ssize_t; > @@ -120,7 +120,7 @@ typedef void *DIR; > typedef void __sighandler_t (int); >=20 > // > -// Structures from EFI Application Toolkit required to buiild Open SSL > +// Structures from EFI Application Toolkit required to build Open SSL > // > struct tm { > int tm_sec; /* seconds after the minute [0-60] */ > @@ -173,12 +173,12 @@ struct stat { > }; >=20 > // > -// Externs from EFI Application Toolkit required to buiild Open SSL > +// Externs from EFI Application Toolkit required to build Open SSL > // > extern int errno; >=20 > // > -// Function prototypes from EFI Application Toolkit required to buiild O= pen > SSL > +// Function prototypes from EFI Application Toolkit required to build > +Open SSL > // > void *malloc (size_t); > void *realloc (void *, size_t); > @@ -247,7 +247,7 @@ void abort (void); > __sighandler_t *signal (int, __sighandler_t *); >=20 > // > -// Global variables from EFI Application Toolkit required to buiild Open= SSL > +// Global variables from EFI Application Toolkit required to build Open > +SSL > // > extern FILE *stderr; > extern FILE *stdin; > diff --git a/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd4.c > b/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd4.c > index 633d343..148d0a9 100644 > --- a/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd4.c > +++ b/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd4.c > @@ -101,7 +101,7 @@ Md4Duplicate ( >=20 > This function performs MD4 digest on a data buffer of the specified si= ze. > It can be called multiple times to compute the digest of long or > discontinuous data streams. > - MD4 context should be already correctly intialized by Md4Init(), and s= hould > not be finalized > + MD4 context should be already correctly initialized by Md4Init(), and > + should not be finalized > by Md4Final(). Behavior with invalid context is undefined. >=20 > If Md4Context is NULL, then return FALSE. > @@ -148,7 +148,7 @@ Md4Update ( > This function completes MD4 hash computation and retrieves the digest > value into > the specified memory. After this function has been called, the MD4 con= text > cannot > be used again. > - MD4 context should be already correctly intialized by Md4Init(), and s= hould > not be > + MD4 context should be already correctly initialized by Md4Init(), and > + should not be > finalized by Md4Final(). Behavior with invalid MD4 context is undefine= d. >=20 > If Md4Context is NULL, then return FALSE. > diff --git a/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd5.c > b/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd5.c > index e1c10e3..809f06f 100644 > --- a/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd5.c > +++ b/CryptoPkg/Library/BaseCryptLib/Hash/CryptMd5.c > @@ -103,7 +103,7 @@ Md5Duplicate ( >=20 > This function performs MD5 digest on a data buffer of the specified si= ze. > It can be called multiple times to compute the digest of long or > discontinuous data streams. > - MD5 context should be already correctly intialized by Md5Init(), and s= hould > not be finalized > + MD5 context should be already correctly initialized by Md5Init(), and > + should not be finalized > by Md5Final(). Behavior with invalid context is undefined. >=20 > If Md5Context is NULL, then return FALSE. > @@ -150,7 +150,7 @@ Md5Update ( > This function completes MD5 hash computation and retrieves the digest > value into > the specified memory. After this function has been called, the MD5 con= text > cannot > be used again. > - MD5 context should be already correctly intialized by Md5Init(), and s= hould > not be > + MD5 context should be already correctly initialized by Md5Init(), and > + should not be > finalized by Md5Final(). Behavior with invalid MD5 context is undefine= d. >=20 > If Md5Context is NULL, then return FALSE. > diff --git a/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha1.c > b/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha1.c > index 78c29c1..1a8ac6c 100644 > --- a/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha1.c > +++ b/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha1.c > @@ -102,7 +102,7 @@ Sha1Duplicate ( >=20 > This function performs SHA-1 digest on a data buffer of the specified = size. > It can be called multiple times to compute the digest of long or > discontinuous data streams. > - SHA-1 context should be already correctly intialized by Sha1Init(), an= d > should not be finalized > + SHA-1 context should be already correctly initialized by Sha1Init(), > + and should not be finalized > by Sha1Final(). Behavior with invalid context is undefined. >=20 > If Sha1Context is NULL, then return FALSE. > @@ -149,7 +149,7 @@ Sha1Update ( > This function completes SHA-1 hash computation and retrieves the diges= t > value into > the specified memory. After this function has been called, the SHA-1 > context cannot > be used again. > - SHA-1 context should be already correctly intialized by Sha1Init(), an= d > should not be > + SHA-1 context should be already correctly initialized by Sha1Init(), > + and should not be > finalized by Sha1Final(). Behavior with invalid SHA-1 context is undef= ined. >=20 > If Sha1Context is NULL, then return FALSE. > diff --git a/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha256.c > b/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha256.c > index 56894ac..ec45d6a 100644 > --- a/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha256.c > +++ b/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha256.c > @@ -101,7 +101,7 @@ Sha256Duplicate ( >=20 > This function performs SHA-256 digest on a data buffer of the specifie= d size. > It can be called multiple times to compute the digest of long or > discontinuous data streams. > - SHA-256 context should be already correctly intialized by Sha256Init()= , and > should not be finalized > + SHA-256 context should be already correctly initialized by > + Sha256Init(), and should not be finalized > by Sha256Final(). Behavior with invalid context is undefined. >=20 > If Sha256Context is NULL, then return FALSE. > @@ -148,7 +148,7 @@ Sha256Update ( > This function completes SHA-256 hash computation and retrieves the dig= est > value into > the specified memory. After this function has been called, the SHA-256 > context cannot > be used again. > - SHA-256 context should be already correctly intialized by Sha256Init()= , and > should not be > + SHA-256 context should be already correctly initialized by > + Sha256Init(), and should not be > finalized by Sha256Final(). Behavior with invalid SHA-256 context is > undefined. >=20 > If Sha256Context is NULL, then return FALSE. > diff --git a/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha512.c > b/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha512.c > index 491f45d..e68a4bf 100644 > --- a/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha512.c > +++ b/CryptoPkg/Library/BaseCryptLib/Hash/CryptSha512.c > @@ -103,7 +103,7 @@ Sha384Duplicate ( >=20 > This function performs SHA-384 digest on a data buffer of the specifie= d size. > It can be called multiple times to compute the digest of long or > discontinuous data streams. > - SHA-384 context should be already correctly intialized by Sha384Init()= , and > should not be finalized > + SHA-384 context should be already correctly initialized by > + Sha384Init(), and should not be finalized > by Sha384Final(). Behavior with invalid context is undefined. >=20 > If Sha384Context is NULL, then return FALSE. > @@ -150,7 +150,7 @@ Sha384Update ( > This function completes SHA-384 hash computation and retrieves the dig= est > value into > the specified memory. After this function has been called, the SHA-384 > context cannot > be used again. > - SHA-384 context should be already correctly intialized by Sha384Init()= , and > should not be > + SHA-384 context should be already correctly initialized by > + Sha384Init(), and should not be > finalized by Sha384Final(). Behavior with invalid SHA-384 context is > undefined. >=20 > If Sha384Context is NULL, then return FALSE. > @@ -272,7 +272,7 @@ Sha512Duplicate ( >=20 > This function performs SHA-512 digest on a data buffer of the specifie= d size. > It can be called multiple times to compute the digest of long or > discontinuous data streams. > - SHA-512 context should be already correctly intialized by Sha512Init()= , and > should not be finalized > + SHA-512 context should be already correctly initialized by > + Sha512Init(), and should not be finalized > by Sha512Final(). Behavior with invalid context is undefined. >=20 > If Sha512Context is NULL, then return FALSE. > @@ -319,7 +319,7 @@ Sha512Update ( > This function completes SHA-512 hash computation and retrieves the dig= est > value into > the specified memory. After this function has been called, the SHA-512 > context cannot > be used again. > - SHA-512 context should be already correctly intialized by Sha512Init()= , and > should not be > + SHA-512 context should be already correctly initialized by > + Sha512Init(), and should not be > finalized by Sha512Final(). Behavior with invalid SHA-512 context is > undefined. >=20 > If Sha512Context is NULL, then return FALSE. > diff --git a/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacMd5.c > b/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacMd5.c > index 693cd32..6175061 100644 > --- a/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacMd5.c > +++ b/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacMd5.c > @@ -108,7 +108,7 @@ HmacMd5Duplicate ( >=20 > This function performs HMAC-MD5 digest on a data buffer of the specifi= ed > size. > It can be called multiple times to compute the digest of long or > discontinuous data streams. > - HMAC-MD5 context should be already correctly intialized by > HmacMd5Init(), and should not be > + HMAC-MD5 context should be already correctly initialized by > + HmacMd5Init(), and should not be > finalized by HmacMd5Final(). Behavior with invalid context is undefine= d. >=20 > If HmacMd5Context is NULL, then return FALSE. > @@ -157,7 +157,7 @@ HmacMd5Update ( > This function completes HMAC-MD5 digest computation and retrieves the > digest value into > the specified memory. After this function has been called, the HMAC-MD= 5 > context cannot > be used again. > - HMAC-MD5 context should be already correctly intialized by > HmacMd5Init(), and should not be > + HMAC-MD5 context should be already correctly initialized by > + HmacMd5Init(), and should not be > finalized by HmacMd5Final(). Behavior with invalid HMAC-MD5 context is > undefined. >=20 > If HmacMd5Context is NULL, then return FALSE. > diff --git a/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacSha1.c > b/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacSha1.c > index 881d26c..e660258 100644 > --- a/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacSha1.c > +++ b/CryptoPkg/Library/BaseCryptLib/Hmac/CryptHmacSha1.c > @@ -108,7 +108,7 @@ HmacSha1Duplicate ( >=20 > This function performs HMAC-SHA1 digest on a data buffer of the specif= ied > size. > It can be called multiple times to compute the digest of long or > discontinuous data streams. > - HMAC-SHA1 context should be already correctly intialized by > HmacSha1Init(), and should not > + HMAC-SHA1 context should be already correctly initialized by > + HmacSha1Init(), and should not > be finalized by HmacSha1Final(). Behavior with invalid context is unde= fined. >=20 > If HmacSha1Context is NULL, then return FALSE. > @@ -157,7 +157,7 @@ HmacSha1Update ( > This function completes HMAC-SHA1 digest computation and retrieves the > digest value into > the specified memory. After this function has been called, the HMAC-SH= A1 > context cannot > be used again. > - HMAC-SHA1 context should be already correctly intialized by > HmacSha1Init(), and should > + HMAC-SHA1 context should be already correctly initialized by > + HmacSha1Init(), and should > not be finalized by HmacSha1Final(). Behavior with invalid HMAC-SHA1 > context is undefined. >=20 > If HmacSha1Context is NULL, then return FALSE. > diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticode.c > b/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticode.c > index 857281d..74e50a2 100644 > --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticode.c > +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticode.c > @@ -34,7 +34,7 @@ UINT8 mSpcIndirectOidValue[] =3D { > }; >=20 > /** > - Verifies the validility of a PE/COFF Authenticode Signature as describ= ed in > "Windows > + Verifies the validity of a PE/COFF Authenticode Signature as > + described in "Windows > Authenticode Portable Executable Signature Format". >=20 > If AuthData is NULL, then return FALSE. > @@ -50,7 +50,7 @@ UINT8 mSpcIndirectOidValue[] =3D { > @param[in] TrustedCert Pointer to a trusted/root certificate encoded= in > DER, which > is used for certificate chain verification. > @param[in] CertSize Size of the trusted certificate in bytes. > - @param[in] ImageHash Pointer to the original image file hash value= . The > procudure > + @param[in] ImageHash Pointer to the original image file hash value= . The > procedure > for calculating the image hash value is descr= ibed in > Authenticode > specification. > @param[in] HashSize Size of Image hash value in bytes. > diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticodeNull.c > b/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticodeNull.c > index 5554486..afec025 100644 > --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticodeNull.c > +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptAuthenticodeNull.c > @@ -16,7 +16,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY > KIND, EITHER EXPRESS OR IMPLIED. > #include "InternalCryptLib.h" >=20 > /** > - Verifies the validility of a PE/COFF Authenticode Signature as describ= ed in > "Windows > + Verifies the validity of a PE/COFF Authenticode Signature as > + described in "Windows > Authenticode Portable Executable Signature Format". >=20 > Return FALSE to indicate this interface is not supported. > @@ -27,7 +27,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY > KIND, EITHER EXPRESS OR IMPLIED. > @param[in] TrustedCert Pointer to a trusted/root certificate encoded= in > DER, which > is used for certificate chain verification. > @param[in] CertSize Size of the trusted certificate in bytes. > - @param[in] ImageHash Pointer to the original image file hash value= . The > procudure > + @param[in] ImageHash Pointer to the original image file hash value= . The > procedure > for calculating the image hash value is descr= ibed in > Authenticode > specification. > @param[in] HashSize Size of Image hash value in bytes. > diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptDh.c > b/CryptoPkg/Library/BaseCryptLib/Pk/CryptDh.c > index 5e0447b..a5d6e49 100644 > --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptDh.c > +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptDh.c > @@ -73,7 +73,7 @@ DhFree ( > @param[in] PrimeLength Length in bits of prime to be generated. > @param[out] Prime Pointer to the buffer to receive the gen= erated > prime number. >=20 > - @retval TRUE DH pamameter generation succeeded. > + @retval TRUE DH parameter generation succeeded. > @retval FALSE Value of Generator is not supported. > @retval FALSE PRNG fails to generate random prime number with > PrimeLength. >=20 > @@ -124,7 +124,7 @@ DhGenerateParameter ( > @param[in] PrimeLength Length in bits of prime to be generated. > @param[in] Prime Pointer to the prime number. >=20 > - @retval TRUE DH pamameter setting succeeded. > + @retval TRUE DH parameter setting succeeded. > @retval FALSE Value of Generator is not supported. > @retval FALSE Value of Generator is not suitable for the Prime. > @retval FALSE Value of Prime is not a prime number. > diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7Verify.c > b/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7Verify.c > index 4dd1625..dcaba43 100644 > --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7Verify.c > +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7Verify.c > @@ -229,7 +229,7 @@ _Exit: > in a ContentInfo structure. >=20 > If P7Data, CertStack, StackLength, TrustedCert or CertLength is NULL, = then > - return FALSE. If P7Length overflow, then return FAlSE. > + return FALSE. If P7Length overflow, then return FALSE. >=20 > Caution: This function may receive untrusted input. > UEFI Authenticated Variable is external input, so this function will d= o basic > @@ -718,12 +718,12 @@ _Error: > } >=20 > /** > - Verifies the validility of a PKCS#7 signed data as described in "PKCS = #7: > + Verifies the validity of a PKCS#7 signed data as described in "PKCS #7= : > Cryptographic Message Syntax Standard". The input signed data could be > wrapped > in a ContentInfo structure. >=20 > If P7Data, TrustedCert or InData is NULL, then return FALSE. > - If P7Length, CertLength or DataLength overflow, then return FAlSE. > + If P7Length, CertLength or DataLength overflow, then return FALSE. >=20 > Caution: This function may receive untrusted input. > UEFI Authenticated Variable is external input, so this function will d= o basic > @@ -897,7 +897,7 @@ _Exit: > data could be wrapped in a ContentInfo structure. >=20 > If P7Data, Content, or ContentSize is NULL, then return FALSE. If P7Le= ngth > overflow, > - then return FAlSE. If the P7Data is not correctly formatted, then retu= rn > FALSE. > + then return FALSE. If the P7Data is not correctly formatted, then retu= rn > FALSE. >=20 > Caution: This function may receive untrusted input. So this function w= ill do > basic check for PKCS#7 data structure. > diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7VerifyNull.c > b/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7VerifyNull.c > index d09fd54..06602ec 100644 > --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7VerifyNull.c > +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptPkcs7VerifyNull.c > @@ -101,7 +101,7 @@ Pkcs7GetCertificatesList ( } >=20 > /** > - Verifies the validility of a PKCS#7 signed data as described in "PKCS = #7: > + Verifies the validity of a PKCS#7 signed data as described in "PKCS #7= : > Cryptographic Message Syntax Standard". The input signed data could be > wrapped > in a ContentInfo structure. >=20 > diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaBasic.c > b/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaBasic.c > index e49db51..e68dd02 100644 > --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaBasic.c > +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaBasic.c > @@ -67,14 +67,14 @@ RsaFree ( > This function sets the tag-designated RSA key component into the > established > RSA context from the user-specified non-negative integer (octet string > format > represented in RSA PKCS#1). > - If BigNumber is NULL, then the specified key componenet in RSA context= is > cleared. > + If BigNumber is NULL, then the specified key component in RSA context = is > cleared. >=20 > If RsaContext is NULL, then return FALSE. >=20 > @param[in, out] RsaContext Pointer to RSA context being set. > @param[in] KeyTag Tag of RSA key component being set. > @param[in] BigNumber Pointer to octet integer buffer. > - If NULL, then the specified key componene= t in RSA > + If NULL, then the specified key > + component in RSA > context is cleared. > @param[in] BnSize Size of big number buffer in bytes. > If BigNumber is NULL, then it is ignored. > diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaExt.c > b/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaExt.c > index b941d6f..30552e4 100644 > --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaExt.c > +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptRsaExt.c > @@ -248,7 +248,7 @@ _Exit: > NOTE: This function performs integrity checks on all the RSA key mater= ial, > so > the RSA key structure must contain all the private key data. >=20 > - This function validates key compoents of RSA context in following aspe= cts: > + This function validates key components of RSA context in following asp= ects: > - Whether p is a prime > - Whether q is a prime > - Whether n =3D p * q > diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptTs.c > b/CryptoPkg/Library/BaseCryptLib/Pk/CryptTs.c > index d495812..1b78472 100644 > --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptTs.c > +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptTs.c > @@ -323,7 +323,7 @@ _Exit: > } >=20 > /** > - Verifies the validility of a TimeStamp Token as described in RFC 3161 > ("Internet > + Verifies the validity of a TimeStamp Token as described in RFC 3161 > + ("Internet > X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)"). >=20 > If TSToken is NULL, then return FALSE. > @@ -497,7 +497,7 @@ _Exit: > } >=20 > /** > - Verifies the validility of a RFC3161 Timestamp CounterSignature embedd= ed > in PE/COFF Authenticode > + Verifies the validity of a RFC3161 Timestamp CounterSignature > + embedded in PE/COFF Authenticode > signature. >=20 > If AuthData is NULL, then return FALSE. > diff --git a/CryptoPkg/Library/BaseCryptLib/Pk/CryptTsNull.c > b/CryptoPkg/Library/BaseCryptLib/Pk/CryptTsNull.c > index eb32aaf..a43f733 100644 > --- a/CryptoPkg/Library/BaseCryptLib/Pk/CryptTsNull.c > +++ b/CryptoPkg/Library/BaseCryptLib/Pk/CryptTsNull.c > @@ -16,7 +16,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY > KIND, EITHER EXPRESS OR IMPLIED. > #include "InternalCryptLib.h" >=20 > /** > - Verifies the validility of a RFC3161 Timestamp CounterSignature embedd= ed > in PE/COFF Authenticode > + Verifies the validity of a RFC3161 Timestamp CounterSignature > + embedded in PE/COFF Authenticode > signature. >=20 > Return FALSE to indicate this interface is not supported. > diff --git a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRand.c > b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRand.c > index 895ce83..fd3c6d4 100644 > --- a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRand.c > +++ b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRand.c > @@ -79,7 +79,7 @@ RandomSeed ( > If Output is NULL, then return FALSE. >=20 > @param[out] Output Pointer to buffer to receive random value. > - @param[in] Size Size of randome bytes to generate. > + @param[in] Size Size of random bytes to generate. >=20 > @retval TRUE Pseudorandom byte stream generated successfully. > @retval FALSE Pseudorandom number generator fails to generate due to > lack of entropy. > diff --git a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandItc.c > b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandItc.c > index 9f87087..3db5157 100644 > --- a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandItc.c > +++ b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandItc.c > @@ -87,7 +87,7 @@ RandomSeed ( > If Output is NULL, then return FALSE. >=20 > @param[out] Output Pointer to buffer to receive random value. > - @param[in] Size Size of randome bytes to generate. > + @param[in] Size Size of random bytes to generate. >=20 > @retval TRUE Pseudorandom byte stream generated successfully. > @retval FALSE Pseudorandom number generator fails to generate due to > lack of entropy. > diff --git a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandNull.c > b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandNull.c > index 8838e22..c292a23 100644 > --- a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandNull.c > +++ b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandNull.c > @@ -46,7 +46,7 @@ RandomSeed ( > Return FALSE to indicate this interface is not supported. >=20 > @param[out] Output Pointer to buffer to receive random value. > - @param[in] Size Size of randome bytes to generate. > + @param[in] Size Size of random bytes to generate. >=20 > @retval FALSE This interface is not supported. >=20 > diff --git a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandTsc.c > b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandTsc.c > index 9bd349d..15f0b3f 100644 > --- a/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandTsc.c > +++ b/CryptoPkg/Library/BaseCryptLib/Rand/CryptRandTsc.c > @@ -87,7 +87,7 @@ RandomSeed ( > If Output is NULL, then return FALSE. >=20 > @param[out] Output Pointer to buffer to receive random value. > - @param[in] Size Size of randome bytes to generate. > + @param[in] Size Size of random bytes to generate. >=20 > @retval TRUE Pseudorandom byte stream generated successfully. > @retval FALSE Pseudorandom number generator fails to generate due to > lack of entropy. > diff --git > a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptAuthentic > odeNull.c > b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptAuthentic > odeNull.c > index 5554486..afec025 100644 > --- > a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptAuthentic > odeNull.c > +++ > b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptAuthent > +++ icodeNull.c > @@ -16,7 +16,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY > KIND, EITHER EXPRESS OR IMPLIED. > #include "InternalCryptLib.h" >=20 > /** > - Verifies the validility of a PE/COFF Authenticode Signature as describ= ed in > "Windows > + Verifies the validity of a PE/COFF Authenticode Signature as > + described in "Windows > Authenticode Portable Executable Signature Format". >=20 > Return FALSE to indicate this interface is not supported. > @@ -27,7 +27,7 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY > KIND, EITHER EXPRESS OR IMPLIED. > @param[in] TrustedCert Pointer to a trusted/root certificate encoded= in > DER, which > is used for certificate chain verification. > @param[in] CertSize Size of the trusted certificate in bytes. > - @param[in] ImageHash Pointer to the original image file hash value= . The > procudure > + @param[in] ImageHash Pointer to the original image file hash value= . The > procedure > for calculating the image hash value is descr= ibed in > Authenticode > specification. > @param[in] HashSize Size of Image hash value in bytes. > diff --git > a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptPkcs7Verif > yNull.c > b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptPkcs7Verif > yNull.c > index d09fd54..06602ec 100644 > --- > a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptPkcs7Verif > yNull.c > +++ > b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Pk/CryptPkcs7Ve > +++ rifyNull.c > @@ -101,7 +101,7 @@ Pkcs7GetCertificatesList ( } >=20 > /** > - Verifies the validility of a PKCS#7 signed data as described in "PKCS = #7: > + Verifies the validity of a PKCS#7 signed data as described in "PKCS #7= : > Cryptographic Message Syntax Standard". The input signed data could be > wrapped > in a ContentInfo structure. >=20 > diff --git > a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Rand/CryptRandNu > ll.c > b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Rand/CryptRandNu > ll.c > index 8838e22..c292a23 100644 > --- > a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Rand/CryptRandNu > ll.c > +++ > b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/Rand/CryptRandN > +++ ull.c > @@ -46,7 +46,7 @@ RandomSeed ( > Return FALSE to indicate this interface is not supported. >=20 > @param[out] Output Pointer to buffer to receive random value. > - @param[in] Size Size of randome bytes to generate. > + @param[in] Size Size of random bytes to generate. >=20 > @retval FALSE This interface is not supported. >=20 > diff --git > a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/RuntimeDxeIpfCry > ptLib.c > b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/RuntimeDxeIpfCry > ptLib.c > index cd40d16..9babc7e 100644 > --- > a/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/RuntimeDxeIpfCry > ptLib.c > +++ > b/CryptoPkg/Library/BaseCryptLibRuntimeCryptProtocol/RuntimeDxeIpfCr > +++ yptLib.c > @@ -344,14 +344,14 @@ RsaFree ( > This function sets the tag-designated RSA key component into the > established > RSA context from the user-specified non-negative integer (octet string > format > represented in RSA PKCS#1). > - If BigNumber is NULL, then the specified key componenet in RSA context= is > cleared. > + If BigNumber is NULL, then the specified key component in RSA context = is > cleared. >=20 > If RsaContext is NULL, then return FALSE. >=20 > @param[in, out] RsaContext Pointer to RSA context being set. > @param[in] KeyTag Tag of RSA key component being set. > @param[in] BigNumber Pointer to octet integer buffer. > - If NULL, then the specified key componene= t in RSA > + If NULL, then the specified key > + component in RSA > context is cleared. > @param[in] BnSize Size of big number buffer in bytes. > If BigNumber is NULL, then it is ignored. > -- > 2.10.1 >=20 > _______________________________________________ > edk2-devel mailing list > edk2-devel@lists.01.org > https://lists.01.org/mailman/listinfo/edk2-devel