From nobody Sat Feb 7 06:21:15 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.12 as permitted sender) client-ip=66.175.222.12; envelope-from=bounce+27952+52796+1787277+3901457@groups.io; helo=web01.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+52796+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1578044506; cv=none; d=zohomail.com; s=zohoarc; b=QxjWCbMq+rWqF0N3TnEAn5F+6Qrr/kfXNiEE61KG3o6XnE8h/jo2cH0471Vbnjse2lzCbt7Mr+pdGGZRXRE235TiH+ITBZxM257yigNpnzEu/cfF0FF3TCAkBNbC3yVOimopiiDVVzHRax/DuC/o1eVl6gV6LD8u9ul2i/HujZc= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1578044506; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Id:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=GhiiROhCc0e6A44IpmopqVZOuam1dMrimCOzBhCnjv8=; b=HFD1Kwkueu/Cr5rnTeGaaiRxF9+A0Z6dsROhCEIPM1w1Un/UP4++oEdw4sVFXFB65tTcMaO+Opme8zWusdDO4KIu216zhrnwh/h9DjvQn5y1O1JhvMz35hhaNJM5wR3VOYdLEkLR7b9rlX4XFEpl3eWS9gsaxVEiW6SjXZUw94o= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+52796+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) header.from= Received: from web01.groups.io (web01.groups.io [66.175.222.12]) by mx.zohomail.com with SMTPS id 1578044506338383.03612604489774; Fri, 3 Jan 2020 01:41:46 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id XVVIYY1788612xg6Vvpxngth; Fri, 03 Jan 2020 01:41:46 -0800 X-Received: from us-smtp-1.mimecast.com (us-smtp-1.mimecast.com [205.139.110.120]) by mx.groups.io with SMTP id smtpd.web09.2063.1578044505149353102 for ; Fri, 03 Jan 2020 01:41:45 -0800 X-Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-330-i6Nn0Cq7NF2LmaBx37SCpg-1; Fri, 03 Jan 2020 04:41:42 -0500 X-Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 8B42C801E7E; Fri, 3 Jan 2020 09:41:41 +0000 (UTC) X-Received: from x1w.redhat.com (ovpn-116-190.ams2.redhat.com [10.36.116.190]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 7D74C60BF7; Fri, 3 Jan 2020 09:41:39 +0000 (UTC) From: =?UTF-8?B?UGhpbGlwcGUgTWF0aGlldS1EYXVkw6k=?= To: devel@edk2.groups.io Cc: Antoine Coeur , Jiewen Yao , Jian J Wang , Chao Zhang , Philippe Mathieu-Daude Subject: [edk2-devel] [PATCH v2 62/78] SecurityPkg: Fix few typos Date: Fri, 3 Jan 2020 10:07:56 +0100 Message-Id: <20200103090812.10592-63-philmd@redhat.com> In-Reply-To: <20200103090812.10592-1-philmd@redhat.com> References: <20200103090812.10592-1-philmd@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-MC-Unique: i6Nn0Cq7NF2LmaBx37SCpg-1 X-Mimecast-Spam-Score: 0 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,philmd@redhat.com X-Gm-Message-State: qci8UznoUnhDgs4JVwxryLDYx1787277AA= Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1578044506; bh=cyAFO5F0funAzwqqTqzSZQyD+2D8Nd0xk9/X6lWQxtY=; h=Cc:Content-Type:Date:From:Reply-To:Subject:To; b=fI8c7v2PgF8A9XLMa3YNPukLjGjfm0uO9fn8F5f1AD/HxB+dUWeuRuPpjqZpE43rqH/ h+mfJT0oZ4Opt7GNUpObNJgCdzkZryf/JqFOzfL0cocQlW3/MFpHK3Ctk2NgXT3pe/b9h 1BeKWgbRfrfQYHph72z35YpZGJ/5WJQxH0I= X-ZohoMail-DKIM: pass (identity @groups.io) From: Antoine Coeur Fix few typos in comments and documentation. Cc: Jiewen Yao Cc: Jian J Wang Cc: Chao Zhang Signed-off-by: Antoine Coeur Reviewed-by: Philippe Mathieu-Daude Signed-off-by: Philippe Mathieu-Daude Reviewed-by: jiewen.yao@intel.com --- .../Library/PlatformSecureLibNull/PlatformSecureLibNull.inf | 2 +- .../DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceLib.c | 2 +- .../Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c | 2 +- SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c | 2 +- .../HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.c | 2 +- .../HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.c | 2 +- SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c | 2 +- SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c | 2 +- .../Library/PlatformSecureLibNull/PlatformSecureLibNull.uni | 2 +- 9 files changed, 9 insertions(+), 9 deletions(-) diff --git a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNul= l.inf b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf index 9ae597d381fc..85607aa645a1 100644 --- a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf +++ b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf @@ -1,5 +1,5 @@ ## @file -# NULL platform secure library instance that alway returns TRUE for a use= r physical present +# NULL platform secure library instance that always returns TRUE for a us= er physical present # # NULL PlatformSecureLib instance does NOT really detect whether a physic= al present # user exists but returns TRUE directly. This instance can be used to ver= ify security diff --git a/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPr= esenceLib.c b/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalP= resenceLib.c index 174172d5d7a5..1a9bd4659a65 100644 --- a/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceL= ib.c +++ b/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceL= ib.c @@ -175,7 +175,7 @@ TpmPhysicalPresence ( @param[in] TcgProtocol EFI TCG Protocol instance. @param[in] Ordinal TPM command code. @param[in] AdditionalParameterSize Additional parameter size. - @param[in] AdditionalParameters Pointer to the Additional paramaters. + @param[in] AdditionalParameters Pointer to the Additional parameters. =20 @retval TCG_PP_OPERATION_RESPONSE_BIOS_FAILURE Error occurred during se= nding command to TPM or receiving response from = TPM. diff --git a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLi= b.c b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c index 04b9b0d7fbf3..5ea2d3ba8ed1 100644 --- a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c +++ b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c @@ -471,7 +471,7 @@ DxeTpm2MeasureBootHandler ( Status =3D gBS->LocateDevicePath (&gEfiBlockIoProtocolGuid, &DevicePathN= ode, &Handle); if (!EFI_ERROR (Status) && !mTcg2MeasureGptTableFlag) { // - // Find the gpt partion on the given devicepath + // Find the gpt partition on the given devicepath // DevicePathNode =3D OrigDevicePathNode; ASSERT (DevicePathNode !=3D NULL); diff --git a/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.= c b/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c index 1f2eed29a1df..d5aeb35eb72c 100644 --- a/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c +++ b/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c @@ -769,7 +769,7 @@ DxeTpmMeasureBootHandler ( Status =3D gBS->LocateDevicePath (&gEfiBlockIoProtocolGuid, &DevicePathN= ode, &Handle); if (!EFI_ERROR (Status) && !mMeasureGptTableFlag) { // - // Find the gpt partion on the given devicepath + // Find the gpt partition on the given devicepath // DevicePathNode =3D OrigDevicePathNode; ASSERT (DevicePathNode !=3D NULL); diff --git a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoR= outerDxe.c b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoR= outerDxe.c index a7cb05849c00..7a0f61efbb8c 100644 --- a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDx= e.c +++ b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDx= e.c @@ -1,6 +1,6 @@ /** @file This library is BaseCrypto router. It will redirect hash request to each= individual - hash handler registerd, such as SHA1, SHA256. + hash handler registered, such as SHA1, SHA256. Platform can use PcdTpm2HashMask to mask some hash engines. =20 Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.
diff --git a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoR= outerPei.c b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoR= outerPei.c index d31c8b0782d4..42cb562f67d3 100644 --- a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPe= i.c +++ b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPe= i.c @@ -1,6 +1,6 @@ /** @file This library is BaseCrypto router. It will redirect hash request to each= individual - hash handler registerd, such as SHA1, SHA256. + hash handler registered, such as SHA1, SHA256. Platform can use PcdTpm2HashMask to mask some hash engines. =20 Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.
diff --git a/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c b/Secu= rityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c index a96862f93733..42282e33a913 100644 --- a/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c +++ b/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c @@ -519,7 +519,7 @@ IsValidTimestamp ( @param[in] SignedData Pointer to buffer containing ASN.1 DER-encod= ed PKCS7 signature. @param[in] SignedDataSize The size of SignedData buffer in bytes. - @param[in] InHash Pointer to the buffer containing the hash of= the mesage data + @param[in] InHash Pointer to the buffer containing the hash of= the message data previously signed and to be verified. @param[in] InHashSize The size of InHash buffer in bytes. @param[in] RevokedDb Pointer to a list of pointers to EFI_SIGNATU= RE_LIST diff --git a/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c b/SecurityPk= g/RandomNumberGenerator/RngDxe/RngDxe.c index 90e54a89ce2b..13d3dbd0bfbe 100644 --- a/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c +++ b/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c @@ -4,7 +4,7 @@ The driver will use the new RDRAND instruction to produce high-quality, = high-performance entropy and random number. =20 - RNG Algoritnms defined in UEFI 2.4: + RNG Algorithms defined in UEFI 2.4: - EFI_RNG_ALGORITHM_SP800_90_CTR_256_GUID - Supported (RDRAND implements a hardware NIST SP800-90 AES-CTR-256 based DRBG) - EFI_RNG_ALGORITHM_RAW - Supported diff --git a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNul= l.uni b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.uni index e5c9d1020ff9..860b8cbb5a05 100644 --- a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.uni +++ b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.uni @@ -1,5 +1,5 @@ // /** @file -// NULL platform secure library instance that alway returns TRUE for a use= r physical present +// NULL platform secure library instance that always returns TRUE for a us= er physical present // // NULL PlatformSecureLib instance does NOT really detect whether a physic= al present // user exists but returns TRUE directly. This instance can be used to ver= ify security --=20 2.21.0 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#52796): https://edk2.groups.io/g/devel/message/52796 Mute This Topic: https://groups.io/mt/69395961/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-