From nobody Sat Feb 7 06:20:49 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.12 as permitted sender) client-ip=66.175.222.12; envelope-from=bounce+27952+52799+1787277+3901457@groups.io; helo=web01.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+52799+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=redhat.com ARC-Seal: i=1; a=rsa-sha256; t=1578044514; cv=none; d=zohomail.com; s=zohoarc; b=Aq+35f7jtq1VkLSXWYuZ6xrZmbWVpRHza2NbscmzOUIkoXrKEvDW7zoIBKj4KJOaKFwIp6D7pGXqXVbKqmAuK42xoWvtVOy10lVOT+ZXKR8NA5n76T5HnsWf06Vw9eNR0t2L0HYs1MQz3xJkyE9CEjgZfXo5hkcVy2GiuonaEsE= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1578044514; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Id:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=FDWdQQcIfcGwLWIH0bmGc6n4HmgbZneSNMnkka1ozrQ=; b=WOLqe/v/FkNDLn+JuUGlYcHui7iXn85KT9OvEwTw3LRrgi+DaQXZnDbAscavOoWdjyUCEyLF5StQQVxb98qxf6Hn7E/sQ8EISLV5Qw6QwZpLWnlVrMKkINZZO4pIRzfvbkepm0FzPuiHAofbK6ih9B8Sr5YOHOErItYpRizQAt4= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.12 as permitted sender) smtp.mailfrom=bounce+27952+52799+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) header.from= Received: from web01.groups.io (web01.groups.io [66.175.222.12]) by mx.zohomail.com with SMTPS id 1578044514727415.9847386741301; Fri, 3 Jan 2020 01:41:54 -0800 (PST) Return-Path: X-Received: by 127.0.0.2 with SMTP id EhK1YY1788612xzFhFK0RbIk; Fri, 03 Jan 2020 01:41:54 -0800 X-Received: from us-smtp-1.mimecast.com (us-smtp-1.mimecast.com [205.139.110.61]) by mx.groups.io with SMTP id smtpd.web11.2047.1578044513676721451 for ; Fri, 03 Jan 2020 01:41:53 -0800 X-Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-22-3evepIODM3u8M4IZ8kt7Bg-1; Fri, 03 Jan 2020 04:41:51 -0500 X-Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 302BF63CCC; Fri, 3 Jan 2020 09:41:50 +0000 (UTC) X-Received: from x1w.redhat.com (ovpn-116-190.ams2.redhat.com [10.36.116.190]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 6A38160BF7; Fri, 3 Jan 2020 09:41:48 +0000 (UTC) From: =?UTF-8?B?UGhpbGlwcGUgTWF0aGlldS1EYXVkw6k=?= To: devel@edk2.groups.io Cc: Antoine Coeur , Jiewen Yao , Jian J Wang , Chao Zhang , Philippe Mathieu-Daude Subject: [edk2-devel] [PATCH v2 65/78] SecurityPkg/Tcg: Fix various typos Date: Fri, 3 Jan 2020 10:07:59 +0100 Message-Id: <20200103090812.10592-66-philmd@redhat.com> In-Reply-To: <20200103090812.10592-1-philmd@redhat.com> References: <20200103090812.10592-1-philmd@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-MC-Unique: 3evepIODM3u8M4IZ8kt7Bg-1 X-Mimecast-Spam-Score: 0 Precedence: Bulk List-Unsubscribe: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,philmd@redhat.com X-Gm-Message-State: Ffim8IYFvUp5TH52mp09Whxsx1787277AA= Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1578044514; bh=1UlfhxhdALXpLSvnZpHUOjMYu4fJhNZNzMX/YmP6qKk=; h=Cc:Content-Type:Date:From:Reply-To:Subject:To; b=XJMKV+nx2trttBU07Zo2jJpJsc2F/WNEr9GO43JET8pYYO9XW6TjMRuzoNogBNfjGTw 0xb+8gjByuXKHHsBl1+js+fcbjH/T1hjxxjFBJNUtkmbKo2gdpwwffkG/FZJobQL3thQt 4aIM8JIyM4V+Fy5HreYx+zmutOYElkSg4DA= X-ZohoMail-DKIM: pass (identity @groups.io) From: Antoine Coeur Fix various typos in documentation, comments and debug strings. Cc: Jiewen Yao Cc: Jian J Wang Cc: Chao Zhang Signed-off-by: Antoine Coeur Reviewed-by: Philippe Mathieu-Daude Signed-off-by: Philippe Mathieu-Daude Reviewed-by: jiewen.yao@intel.com --- SecurityPkg/Tcg/TcgSmm/TcgSmm.inf | 2 +- SecurityPkg/Include/Library/TcgStorageCoreLib.h | 4 ++-- SecurityPkg/Tcg/Opal/OpalPassword/OpalHii.h | 6 +++--- SecurityPkg/Library/TcgStorageCoreLib/TcgStorageCore.c | 2 +- SecurityPkg/Library/TcgStorageCoreLib/TcgStorageUtil.c | 2 +- SecurityPkg/Tcg/MemoryOverwriteControl/TcgMor.c | 10 +++++----- SecurityPkg/Tcg/Opal/OpalPassword/OpalDriver.c | 2 +- SecurityPkg/Tcg/Opal/OpalPassword/OpalHii.c | 8 ++++---- .../Tcg/PhysicalPresencePei/PhysicalPresencePei.c | 2 +- SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigPeim.c | 2 +- SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.c | 4 ++-- SecurityPkg/Tcg/TcgPei/TcgPei.c | 8 ++++---- SecurityPkg/Tcg/Tcg2Smm/Tcg2Smm.uni | 2 +- SecurityPkg/Tcg/TcgSmm/TcgSmm.uni | 2 +- 14 files changed, 28 insertions(+), 28 deletions(-) diff --git a/SecurityPkg/Tcg/TcgSmm/TcgSmm.inf b/SecurityPkg/Tcg/TcgSmm/Tcg= Smm.inf index 40827041cae4..29f9c15b0e02 100644 --- a/SecurityPkg/Tcg/TcgSmm/TcgSmm.inf +++ b/SecurityPkg/Tcg/TcgSmm/TcgSmm.inf @@ -1,5 +1,5 @@ ## @file -# Implements ACPI metholds for the TCG feature +# Implements ACPI methods for the TCG feature # # This driver implements TPM definition block in ACPI table and registers= SMI # callback functions for physical presence and MemoryClear to handle the = requests diff --git a/SecurityPkg/Include/Library/TcgStorageCoreLib.h b/SecurityPkg/= Include/Library/TcgStorageCoreLib.h index c25a56a14ca2..01a44c667c80 100644 --- a/SecurityPkg/Include/Library/TcgStorageCoreLib.h +++ b/SecurityPkg/Include/Library/TcgStorageCoreLib.h @@ -588,7 +588,7 @@ TcgAddEndTransaction( ); =20 /** - Initial the tcg parse stucture. + Initial the tcg parse structure. =20 @param ParseStruct Input parse structure. @param Buffer Input buffer data. @@ -1218,7 +1218,7 @@ TcgParseSyncSession( @param HostSession Host session data. @param AceRow Ace row info. @param Authority1 Authority 1 info. - @param LogicalOperator Logiccal operator info. + @param LogicalOperator Logical operator info. @param Authority2 Authority 2 info. =20 @retval Return the action result. diff --git a/SecurityPkg/Tcg/Opal/OpalPassword/OpalHii.h b/SecurityPkg/Tcg/= Opal/OpalPassword/OpalHii.h index 0543a2ce493d..557c1f8d68da 100644 --- a/SecurityPkg/Tcg/Opal/OpalPassword/OpalHii.h +++ b/SecurityPkg/Tcg/Opal/OpalPassword/OpalHii.h @@ -247,7 +247,7 @@ GetDiskNameStringId( =20 @param OpalDisk The Opal device. =20 - @retval EFI_SUCCESS Initialize the device success. + @retval EFI_SUCCESS Initialize the device success. @retval EFI_DEVICE_ERROR Get info from device failed. @retval EFI_INVALID_PARAMETER Not get Msid info before get ownership in= fo. =20 @@ -348,7 +348,7 @@ HiiUninstall( =20 @param Dev The Opal device. =20 - @retval EFI_SUCCESS Initialize the device success. + @retval EFI_SUCCESS Initialize the device success. @retval EFI_DEVICE_ERROR Get info from device failed. =20 **/ @@ -362,7 +362,7 @@ OpalDiskInitialize ( =20 @param OpalDisk The Opal device. =20 - @retval EFI_SUCCESS Get ownership success. + @retval EFI_SUCCESS Get ownership success. @retval EFI_ACCESS_DENIED Has send BlockSID command, can't change o= wnership. @retval EFI_INVALID_PARAMETER Not get Msid info before get ownership in= fo. =20 diff --git a/SecurityPkg/Library/TcgStorageCoreLib/TcgStorageCore.c b/Secur= ityPkg/Library/TcgStorageCoreLib/TcgStorageCore.c index f9c57a13f2e4..660f79effd53 100644 --- a/SecurityPkg/Library/TcgStorageCoreLib/TcgStorageCore.c +++ b/SecurityPkg/Library/TcgStorageCoreLib/TcgStorageCore.c @@ -837,7 +837,7 @@ TcgAddEndTransaction( } =20 /** - Initial the tcg parse stucture. + Initial the tcg parse structure. =20 @param ParseStruct Input parse structure. @param Buffer Input buffer data. diff --git a/SecurityPkg/Library/TcgStorageCoreLib/TcgStorageUtil.c b/Secur= ityPkg/Library/TcgStorageCoreLib/TcgStorageUtil.c index b6d5cf9890a0..ff331bfc8ad9 100644 --- a/SecurityPkg/Library/TcgStorageCoreLib/TcgStorageUtil.c +++ b/SecurityPkg/Library/TcgStorageCoreLib/TcgStorageUtil.c @@ -640,7 +640,7 @@ TcgSetAuthorityEnabled( @param HostSession Host session data. @param AceRow Ace row info. @param Authority1 Authority 1 info. - @param LogicalOperator Logiccal operator info. + @param LogicalOperator Logical operator info. @param Authority2 Authority 2 info. =20 @retval Return the action result. diff --git a/SecurityPkg/Tcg/MemoryOverwriteControl/TcgMor.c b/SecurityPkg/= Tcg/MemoryOverwriteControl/TcgMor.c index 97e819edf4d5..f2529fb9888b 100644 --- a/SecurityPkg/Tcg/MemoryOverwriteControl/TcgMor.c +++ b/SecurityPkg/Tcg/MemoryOverwriteControl/TcgMor.c @@ -61,7 +61,7 @@ OnReadyToBoot ( Typically, there are 2 mechanism for resetting eDrive. They are: 1. TPer Reset through IEEE 1667 protocol. 2. TPer Reset through native TCG protocol. - This routine will detect what protocol the attached eDrive comform to, T= CG or + This routine will detect what protocol the attached eDrive conform to, T= CG or IEEE 1667 protocol. Then send out TPer Reset command separately. =20 @param[in] Ssp The pointer to EFI_STORAGE_SECURITY_COMMAND_PROTOCOL= instance. @@ -109,7 +109,7 @@ InitiateTPerReset ( MediaId, 100000000, // Timeout 10-sec 0, // SecurityProtocol - 0, // SecurityProtocolSpecifc= Data + 0, // SecurityProtocolSpecifi= cData Len, // PayloadBufferSize, Buffer, // PayloadBuffer &XferSize @@ -145,7 +145,7 @@ InitiateTPerReset ( MediaId, 100000000, // Timeout 10-sec 0, // SecurityProtocol - 0, // SecurityProtocolSpecifc= Data + 0, // SecurityProtocolSpecifi= cData Len, // PayloadBufferSize, Buffer, // PayloadBuffer &XferSize @@ -197,7 +197,7 @@ InitiateTPerReset ( MediaId, 100000000, // Timeout 10-sec SECURITY_PROTOCOL_TCG, // SecurityProtocol - 0x0400, // SecurityProtocolSpeci= fcData + 0x0400, // SecurityProtocolSpeci= ficData 512, // PayloadBufferSize, Buffer // PayloadBuffer ); @@ -341,7 +341,7 @@ MorDriverEntryPoint ( // // Create a Ready To Boot Event and Clear the MorControl bit in the ca= ll back function. // - DEBUG ((DEBUG_INFO, "TcgMor: Create ReadyToBoot Event for MorControl B= it cleaning!\n")); + DEBUG ((EFI_D_INFO, "TcgMor: Create ReadyToBoot Event for MorControl B= it cleaning!\n")); Status =3D EfiCreateEventReadyToBootEx ( TPL_CALLBACK, OnReadyToBoot, diff --git a/SecurityPkg/Tcg/Opal/OpalPassword/OpalDriver.c b/SecurityPkg/T= cg/Opal/OpalPassword/OpalDriver.c index 6bec54b93217..b5b6aec98caf 100644 --- a/SecurityPkg/Tcg/Opal/OpalPassword/OpalDriver.c +++ b/SecurityPkg/Tcg/Opal/OpalPassword/OpalDriver.c @@ -2583,7 +2583,7 @@ OpalDriverGetDriverDeviceName( @param ImageHandle Image Handle this driver. @param SystemTable Pointer to SystemTable. =20 - @retval EFI_SUCCESS This function always complete successfully. + @retval EFI_SUCCESS This function always complete successfully. **/ EFI_STATUS EFIAPI diff --git a/SecurityPkg/Tcg/Opal/OpalPassword/OpalHii.c b/SecurityPkg/Tcg/= Opal/OpalPassword/OpalHii.c index ef117d3d031e..211e75537a07 100644 --- a/SecurityPkg/Tcg/Opal/OpalPassword/OpalHii.c +++ b/SecurityPkg/Tcg/Opal/OpalPassword/OpalHii.c @@ -1110,7 +1110,7 @@ OpalHiiGetBrowserData ( Set a string Value in a form. =20 @param DestStringId The stringid which need to update. - @param SrcAsciiStr The string nned to update. + @param SrcAsciiStr The string need to update. =20 @retval EFI_SUCCESS Do the required action success. @retval Others Other error occur. @@ -1164,7 +1164,7 @@ HiiSetFormString( =20 @param Dev The Opal device. =20 - @retval EFI_SUCCESS Initialize the device success. + @retval EFI_SUCCESS Initialize the device success. @retval EFI_DEVICE_ERROR Get info from device failed. =20 **/ @@ -1220,7 +1220,7 @@ OpalDiskInitialize ( =20 @param OpalDisk The Opal device. =20 - @retval EFI_SUCCESS Get ownership success. + @retval EFI_SUCCESS Get ownership success. @retval EFI_ACCESS_DENIED Has send BlockSID command, can't change o= wnership. @retval EFI_INVALID_PARAMETER Not get Msid info before get ownership in= fo. =20 @@ -1254,7 +1254,7 @@ OpalDiskUpdateOwnerShip ( =20 @param OpalDisk The Opal device. =20 - @retval EFI_SUCCESS Initialize the device success. + @retval EFI_SUCCESS Initialize the device success. @retval EFI_DEVICE_ERROR Get info from device failed. @retval EFI_INVALID_PARAMETER Not get Msid info before get ownership in= fo. @retval EFI_ACCESS_DENIED Has send BlockSID command, can't change o= wnership. diff --git a/SecurityPkg/Tcg/PhysicalPresencePei/PhysicalPresencePei.c b/Se= curityPkg/Tcg/PhysicalPresencePei/PhysicalPresencePei.c index 83c3ad50d1a2..89c1be0417ed 100644 --- a/SecurityPkg/Tcg/PhysicalPresencePei/PhysicalPresencePei.c +++ b/SecurityPkg/Tcg/PhysicalPresencePei/PhysicalPresencePei.c @@ -31,7 +31,7 @@ LockTpmPhysicalPresence ( ); =20 // -// Global defintions for lock physical presence PPI and its descriptor. +// Global definitions for lock physical presence PPI and its descriptor. // PEI_LOCK_PHYSICAL_PRESENCE_PPI mLockPhysicalPresencePpi =3D { LockTpmPhysicalPresence diff --git a/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigPeim.c b/SecurityPkg/Tcg/= Tcg2Config/Tcg2ConfigPeim.c index e0d0a207e1bf..0f9bad724ebf 100644 --- a/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigPeim.c +++ b/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigPeim.c @@ -141,7 +141,7 @@ Tcg2ConfigPeimEntryPoint ( ASSERT_EFI_ERROR (Status); =20 // - // Even if no TPM is selected or detected, we still need intall TpmIniti= alizationDonePpi. + // Even if no TPM is selected or detected, we still need install TpmInit= ializationDonePpi. // Because TcgPei or Tcg2Pei will not run, but we still need a way to no= tify other driver. // Other driver can know TPM initialization state by TpmInitializedPpi. // diff --git a/SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.c b/SecurityPkg/Tcg/Tcg2Pei/Tc= g2Pei.c index 1565d4e40219..e8a2b3f2b2ad 100644 --- a/SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.c +++ b/SecurityPkg/Tcg/Tcg2Pei/Tcg2Pei.c @@ -933,7 +933,7 @@ PeimEntryMA ( } =20 // - // Only intall TpmInitializedPpi on success + // Only install TpmInitializedPpi on success // Status =3D PeiServicesInstallPpi (&mTpmInitializedPpiList); ASSERT_EFI_ERROR (Status); @@ -954,7 +954,7 @@ Done: ); } // - // Always intall TpmInitializationDonePpi no matter success or fail. + // Always install TpmInitializationDonePpi no matter success or fail. // Other driver can know TPM initialization state by TpmInitializedPpi. // Status2 =3D PeiServicesInstallPpi (&mTpmInitializationDonePpiList); diff --git a/SecurityPkg/Tcg/TcgPei/TcgPei.c b/SecurityPkg/Tcg/TcgPei/TcgPe= i.c index 284fc394f063..a9a808c9ecf3 100644 --- a/SecurityPkg/Tcg/TcgPei/TcgPei.c +++ b/SecurityPkg/Tcg/TcgPei/TcgPei.c @@ -146,7 +146,7 @@ EFI_PEI_NOTIFY_DESCRIPTOR mNotifyList[] =3D { }; =20 /** - Record all measured Firmware Voluem Information into a Guid Hob + Record all measured Firmware Volume Information into a Guid Hob Guid Hob payload layout is =20 UINT32 *************************** FIRMWARE_BLOB number @@ -501,7 +501,7 @@ MeasureMainBios ( } =20 /** - Measure and record the Firmware Voluem Information once FvInfoPPI instal= l. + Measure and record the Firmware Volume Information once FvInfoPPI instal= l. =20 @param[in] PeiServices An indirect pointer to the EFI_PEI_SERVICES= table published by the PEI Foundation. @param[in] NotifyDescriptor Address of the notification descriptor data= structure. @@ -824,7 +824,7 @@ PeimEntryMA ( } =20 // - // Only intall TpmInitializedPpi on success + // Only install TpmInitializedPpi on success // Status =3D PeiServicesInstallPpi (&mTpmInitializedPpiList); ASSERT_EFI_ERROR (Status); @@ -845,7 +845,7 @@ Done: ); } // - // Always intall TpmInitializationDonePpi no matter success or fail. + // Always install TpmInitializationDonePpi no matter success or fail. // Other driver can know TPM initialization state by TpmInitializedPpi. // Status2 =3D PeiServicesInstallPpi (&mTpmInitializationDonePpiList); diff --git a/SecurityPkg/Tcg/Tcg2Smm/Tcg2Smm.uni b/SecurityPkg/Tcg/Tcg2Smm/= Tcg2Smm.uni index dbb4924c0d99..d6e047d74577 100644 --- a/SecurityPkg/Tcg/Tcg2Smm/Tcg2Smm.uni +++ b/SecurityPkg/Tcg/Tcg2Smm/Tcg2Smm.uni @@ -1,5 +1,5 @@ // /** @file -// Provides ACPI metholds for TPM 2.0 support +// Provides ACPI methods for TPM 2.0 support // // This driver implements TPM 2.0 definition block in ACPI table and // registers SMI callback functions for TCG2 physical presence and diff --git a/SecurityPkg/Tcg/TcgSmm/TcgSmm.uni b/SecurityPkg/Tcg/TcgSmm/Tcg= Smm.uni index 807163367023..a3abb3addf0c 100644 --- a/SecurityPkg/Tcg/TcgSmm/TcgSmm.uni +++ b/SecurityPkg/Tcg/TcgSmm/TcgSmm.uni @@ -1,5 +1,5 @@ // /** @file -// Implements ACPI metholds for the TCG feature +// Implements ACPI methods for the TCG feature // // This driver implements TPM definition block in ACPI table and registers= SMI // callback functions for physical presence and MemoryClear to handle the = requests --=20 2.21.0 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#52799): https://edk2.groups.io/g/devel/message/52799 Mute This Topic: https://groups.io/mt/69395964/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-