public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: "Yao, Jiewen" <jiewen.yao@intel.com>
To: "Pierre.Gondois@arm.com" <Pierre.Gondois@arm.com>,
	"devel@edk2.groups.io" <devel@edk2.groups.io>
Cc: "Wang, Jian J" <jian.j.wang@intel.com>
Subject: Re: [PATCH v2 12/17] SecurityPkg: Remove duplicated words
Date: Tue, 6 Sep 2022 08:37:44 +0000	[thread overview]
Message-ID: <MW4PR11MB5872B5F9F608B691A7EE35F68C7E9@MW4PR11MB5872.namprd11.prod.outlook.com> (raw)
In-Reply-To: <20220906082912.81795-13-Pierre.Gondois@arm.com>

Reviewed-by: Jiewen Yao <Jiewen.yao@intel.com>

> -----Original Message-----
> From: Pierre.Gondois@arm.com <Pierre.Gondois@arm.com>
> Sent: Tuesday, September 6, 2022 4:29 PM
> To: devel@edk2.groups.io
> Cc: Pierre Gondois <pierre.gondois@arm.com>; Yao, Jiewen
> <jiewen.yao@intel.com>; Wang, Jian J <jian.j.wang@intel.com>
> Subject: [PATCH v2 12/17] SecurityPkg: Remove duplicated words
> 
> From: Pierre Gondois <pierre.gondois@arm.com>
> 
> In an effort to clean the documentation of the above
> package, remove duplicated words.
> 
> Cc: Jiewen Yao <jiewen.yao@intel.com>
> Cc: Jian J Wang <jian.j.wang@intel.com>
> Signed-off-by: Pierre Gondois <pierre.gondois@arm.com>
> ---
>  SecurityPkg/Include/Library/Tpm2CommandLib.h                  | 2 +-
>  .../Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.uni     | 4 ++-
> -
>  .../Library/PeiTpmMeasurementLib/PeiTpmMeasurementLib.uni     | 4 ++--
>  .../SecureBootVariableProvisionLib.c                          | 2 +-
>  SecurityPkg/Library/Tpm2CommandLib/Tpm2Hierarchy.c            | 2 +-
>  SecurityPkg/Tcg/Tcg2Acpi/Tcg2Acpi.c                           | 2 +-
>  SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigImpl.c                   | 2 +-
>  SecurityPkg/Tcg/TcgDxe/TcgDxe.c                               | 4 ++--
>  8 files changed, 11 insertions(+), 11 deletions(-)
> 
> diff --git a/SecurityPkg/Include/Library/Tpm2CommandLib.h
> b/SecurityPkg/Include/Library/Tpm2CommandLib.h
> index a2fb97f18dfe..1912f54c8416 100644
> --- a/SecurityPkg/Include/Library/Tpm2CommandLib.h
> +++ b/SecurityPkg/Include/Library/Tpm2CommandLib.h
> @@ -136,7 +136,7 @@ Tpm2SelfTest (
> 
>  /**
>    This command allows setting of the authorization policy for the platform
> hierarchy (platformPolicy), the
> -  storage hierarchy (ownerPolicy), and and the endorsement hierarchy
> (endorsementPolicy).
> +  storage hierarchy (ownerPolicy), and the endorsement hierarchy
> (endorsementPolicy).
> 
>    @param[in]  AuthHandle            TPM_RH_ENDORSEMENT,
> TPM_RH_OWNER or TPM_RH_PLATFORM+{PP} parameters to be validated
>    @param[in]  AuthSession           Auth Session context
> diff --git
> a/SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.u
> ni
> b/SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.u
> ni
> index a1139810b1cb..ab043e8f5a1c 100644
> ---
> a/SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.u
> ni
> +++
> b/SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.u
> ni
> @@ -1,7 +1,7 @@
>  // /** @file
>  // Provides TPM measurement functions for TPM1.2 and TPM 2.0
>  //
> -// This library provides TpmMeasureAndLogData() to to measure and log
> data, and
> +// This library provides TpmMeasureAndLogData() to measure and log
> data, and
>  // extend the measurement result into a specific PCR.
>  //
>  // Copyright (c) 2012 - 2014, Intel Corporation. All rights reserved.<BR>
> @@ -13,5 +13,5 @@
> 
>  #string STR_MODULE_ABSTRACT             #language en-US "Provides TPM
> measurement functions for TPM1.2 and TPM 2.0"
> 
> -#string STR_MODULE_DESCRIPTION          #language en-US "This library
> provides TpmMeasureAndLogData() to to measure and log data, and extend
> the measurement result into a specific PCR."
> +#string STR_MODULE_DESCRIPTION          #language en-US "This library
> provides TpmMeasureAndLogData() to measure and log data, and extend
> the measurement result into a specific PCR."
> 
> diff --git
> a/SecurityPkg/Library/PeiTpmMeasurementLib/PeiTpmMeasurementLib.un
> i
> b/SecurityPkg/Library/PeiTpmMeasurementLib/PeiTpmMeasurementLib.un
> i
> index 7b4341b449f4..4d0159d18ce3 100644
> ---
> a/SecurityPkg/Library/PeiTpmMeasurementLib/PeiTpmMeasurementLib.un
> i
> +++
> b/SecurityPkg/Library/PeiTpmMeasurementLib/PeiTpmMeasurementLib.un
> i
> @@ -1,7 +1,7 @@
>  // /** @file
>  // Provides TPM measurement functions for TPM1.2 and TPM 2.0
>  //
> -// This library provides TpmMeasureAndLogData() to to measure and log
> data, and
> +// This library provides TpmMeasureAndLogData() to measure and log
> data, and
>  // extend the measurement result into a specific PCR.
>  //
>  // Copyright (c) 2020, Intel Corporation. All rights reserved.<BR>
> @@ -13,5 +13,5 @@
> 
>  #string STR_MODULE_ABSTRACT             #language en-US "Provides TPM
> measurement functions for TPM1.2 and TPM 2.0"
> 
> -#string STR_MODULE_DESCRIPTION          #language en-US "This library
> provides TpmMeasureAndLogData() to to measure and log data, and extend
> the measurement result into a specific PCR."
> +#string STR_MODULE_DESCRIPTION          #language en-US "This library
> provides TpmMeasureAndLogData() to measure and log data, and extend
> the measurement result into a specific PCR."
> 
> diff --git
> a/SecurityPkg/Library/SecureBootVariableProvisionLib/SecureBootVariable
> ProvisionLib.c
> b/SecurityPkg/Library/SecureBootVariableProvisionLib/SecureBootVariable
> ProvisionLib.c
> index bed1fe86205d..9e7b8946274d 100644
> ---
> a/SecurityPkg/Library/SecureBootVariableProvisionLib/SecureBootVariable
> ProvisionLib.c
> +++
> b/SecurityPkg/Library/SecureBootVariableProvisionLib/SecureBootVariable
> ProvisionLib.c
> @@ -28,7 +28,7 @@
>    Create a EFI Signature List with data fetched from section specified as a
> argument.
>    Found keys are verified using RsaGetPublicKeyFromX509().
> 
> -  @param[in]        KeyFileGuid    A pointer to to the FFS filename GUID
> +  @param[in]        KeyFileGuid    A pointer to the FFS filename GUID
>    @param[out]       SigListsSize   A pointer to size of signature list
>    @param[out]       SigListOut    a pointer to a callee-allocated buffer with
> signature lists
> 
> diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Hierarchy.c
> b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Hierarchy.c
> index 7144955be1a5..8e518317aa19 100644
> --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Hierarchy.c
> +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Hierarchy.c
> @@ -116,7 +116,7 @@ typedef struct {
> 
>  /**
>    This command allows setting of the authorization policy for the platform
> hierarchy (platformPolicy), the
> -  storage hierarchy (ownerPolicy), and and the endorsement hierarchy
> (endorsementPolicy).
> +  storage hierarchy (ownerPolicy), and the endorsement hierarchy
> (endorsementPolicy).
> 
>    @param[in]  AuthHandle            TPM_RH_ENDORSEMENT,
> TPM_RH_OWNER or TPM_RH_PLATFORM+{PP} parameters to be validated
>    @param[in]  AuthSession           Auth Session context
> diff --git a/SecurityPkg/Tcg/Tcg2Acpi/Tcg2Acpi.c
> b/SecurityPkg/Tcg/Tcg2Acpi/Tcg2Acpi.c
> index e8822cbeb015..36243321a6cc 100644
> --- a/SecurityPkg/Tcg/Tcg2Acpi/Tcg2Acpi.c
> +++ b/SecurityPkg/Tcg/Tcg2Acpi/Tcg2Acpi.c
> @@ -97,7 +97,7 @@ EFI_TPM2_ACPI_TABLE_V4  mTpm2AcpiTemplate = {
>      EFI_TPM2_ACPI_TABLE_REVISION,
>      //
>      // Compiler initializes the remaining bytes to 0
> -    // These fields should be filled in in production
> +    // These fields should be filled in production
>      //
>    },
>    0, // BIT0~15:  PlatformClass
> diff --git a/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigImpl.c
> b/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigImpl.c
> index 6eb04c014448..e7b74e8d399d 100644
> --- a/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigImpl.c
> +++ b/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigImpl.c
> @@ -278,7 +278,7 @@ SaveTcg2PpRequestParameter (
>  }
> 
>  /**
> -  Save Tcg2 PCR Banks request request to variable space.
> +  Save Tcg2 PCR Banks request to variable space.
> 
>    @param[in] PCRBankIndex     PCR Bank Index.
>    @param[in] Enable           Enable or disable this PCR Bank.
> diff --git a/SecurityPkg/Tcg/TcgDxe/TcgDxe.c
> b/SecurityPkg/Tcg/TcgDxe/TcgDxe.c
> index ee6c6273033b..8b596a99262e 100644
> --- a/SecurityPkg/Tcg/TcgDxe/TcgDxe.c
> +++ b/SecurityPkg/Tcg/TcgDxe/TcgDxe.c
> @@ -67,7 +67,7 @@ EFI_TCG_CLIENT_ACPI_TABLE
> mTcgClientAcpiTemplate = {
>      0x02                      // Revision
>      //
>      // Compiler initializes the remaining bytes to 0
> -    // These fields should be filled in in production
> +    // These fields should be filled in production
>      //
>    },
>    0,                                   // 0 for PC Client Platform Class
> @@ -88,7 +88,7 @@ EFI_TCG_SERVER_ACPI_TABLE
> mTcgServerAcpiTemplate = {
>      0x02                      // Revision
>      //
>      // Compiler initializes the remaining bytes to 0
> -    // These fields should be filled in in production
> +    // These fields should be filled in production
>      //
>    },
>    1,                                    // 1 for Server Platform Class
> --
> 2.25.1


  reply	other threads:[~2022-09-06  8:37 UTC|newest]

Thread overview: 27+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-09-06  8:28 [PATCH v2 00/17] Remove duplicated words PierreGondois
2022-09-06  8:28 ` [PATCH v2 01/17] .pytool: " PierreGondois
2022-09-06  8:28 ` [PATCH v2 02/17] BaseTools: " PierreGondois
2022-10-01 15:08   ` [edk2-devel] " Bob Feng
2022-10-03  7:59     ` PierreGondois
2022-10-08  2:22       ` 回复: " gaoliming
     [not found]   ` <1719FA81E323AB08.30932@groups.io>
2022-10-02  3:25     ` Bob Feng
2022-09-06  8:28 ` [PATCH v2 03/17] CryptoPkg: " PierreGondois
2022-09-06  8:28 ` [PATCH v2 04/17] DynamicTablesPkg: " PierreGondois
2022-12-13 14:37   ` Sami Mujawar
2022-09-06  8:29 ` [PATCH v2 05/17] EmulatorPkg: " PierreGondois
2022-09-06  8:29 ` [PATCH v2 06/17] FatPkg: " PierreGondois
2022-09-06  8:29 ` [PATCH v2 07/17] MdeModulePkg: " PierreGondois
2022-09-06  8:29 ` [PATCH v2 08/17] MdePkg: " PierreGondois
2022-09-06 18:50   ` Michael D Kinney
2022-09-06  8:29 ` [PATCH v2 09/17] NetworkPkg: " PierreGondois
2022-09-06  8:29 ` [PATCH v2 10/17] PcAtChipsetPkg: " PierreGondois
2022-09-06  8:29 ` [PATCH v2 11/17] RedfishPkg: " PierreGondois
2022-09-06  8:29 ` [PATCH v2 12/17] SecurityPkg: " PierreGondois
2022-09-06  8:37   ` Yao, Jiewen [this message]
2022-09-06  8:29 ` [PATCH v2 13/17] ShellPkg: " PierreGondois
2022-09-06  8:29 ` [PATCH v2 14/17] SourceLevelDebugPkg: " PierreGondois
2022-09-06  8:29 ` [PATCH v2 15/17] UefiCpuPkg: " PierreGondois
2022-09-06  8:29 ` [PATCH v2 16/17] UefiPayloadPkg: " PierreGondois
2022-09-12  4:26   ` [edk2-devel] " Guo, Gua
2022-09-06  8:29 ` [PATCH v2 17/17] UnitTestFrameworkPkg: " PierreGondois
2022-09-06 18:47   ` Michael D Kinney

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=MW4PR11MB5872B5F9F608B691A7EE35F68C7E9@MW4PR11MB5872.namprd11.prod.outlook.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox