From nobody Tue Feb 10 22:17:49 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+93203+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+93203+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=arm.com ARC-Seal: i=1; a=rsa-sha256; t=1662452991; cv=none; d=zohomail.com; s=zohoarc; b=jBbFtWUxorXF+SPErrMyETdeUyFAlZOxl/UGJsT1AzpDJQYTQiqaMgoN0KbwwlVey5Y0gqbqVCvW7J3FbARPNJ/Qwx0S3KHgpwttAfbWDmKuyUDFvNvEcFwvo55UkyAfOqSo0kt0bjiLaTxxTeG7r5cCIG7X3uNdPhGKZj0Vq38= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1662452991; h=Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:References:Sender:Subject:To; bh=PehPwRiDrOJMJUSVPGO5JYIyma+3IKofSbYBBtI+FL8=; b=gIY+n6pgFW0P+r3d0h+ywmaRpkvhRJdw9Ya3dEQHhODQC3A0IDVl451qOrmvwSC99BhjihdymqEcey+dCcFX4sNIE1mhlblApf8t++0MjfWniHSwFDre32GblgOoXkC4Xffp5taPkL/RMj0nLp01LzKPFdaF2N/VsO9D0zMmjIc= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+93203+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1662452991792124.93912731019986; Tue, 6 Sep 2022 01:29:51 -0700 (PDT) Return-Path: X-Received: by 127.0.0.2 with SMTP id eaKAYY1788612xzkooYhGRu4; Tue, 06 Sep 2022 01:29:51 -0700 X-Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.web09.1560.1662452990739766240 for ; Tue, 06 Sep 2022 01:29:50 -0700 X-Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9E8F11A00; Tue, 6 Sep 2022 01:29:56 -0700 (PDT) X-Received: from cam-smtp0.cambridge.arm.com (pierre123.nice.arm.com [10.34.100.114]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 960493F73D; Tue, 6 Sep 2022 01:29:49 -0700 (PDT) From: "PierreGondois" To: devel@edk2.groups.io Cc: Pierre Gondois , Jiewen Yao , Jian J Wang Subject: [edk2-devel] [PATCH v2 12/17] SecurityPkg: Remove duplicated words Date: Tue, 6 Sep 2022 10:29:07 +0200 Message-Id: <20220906082912.81795-13-Pierre.Gondois@arm.com> In-Reply-To: <20220906082912.81795-1-Pierre.Gondois@arm.com> References: <20220906082912.81795-1-Pierre.Gondois@arm.com> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,pierre.gondois@arm.com X-Gm-Message-State: GLuwsYVeIAU9HY0AX03AHEVgx1787277AA= Content-Transfer-Encoding: quoted-printable DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=groups.io; q=dns/txt; s=20140610; t=1662452991; bh=jT7QXZZdB22g9U9JCoB4rEy0ZFYySoCCTa/m9URoGRs=; h=Cc:Date:From:Reply-To:Subject:To; b=u8YIefpZAGMQU3ZoNAlPpyvIEhQBZADFPnINJQUnIeKoA7FRP8hn34yxj62wB2CwhsU UUxzoeL8Vk5qe9Q2dfjAbMm+wmnHJvGWwDioFbuOorCCiNEoBMqISWqdbyP5oBb1J4tk3 VjJ00H0kptbHgwNoako1sZYb5gSPUomVAxk= X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1662452993843100058 Content-Type: text/plain; charset="utf-8" From: Pierre Gondois In an effort to clean the documentation of the above package, remove duplicated words. Cc: Jiewen Yao Cc: Jian J Wang Signed-off-by: Pierre Gondois Reviewed-by: Jiewen Yao --- SecurityPkg/Include/Library/Tpm2CommandLib.h | 2 +- .../Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.uni | 4 ++-- .../Library/PeiTpmMeasurementLib/PeiTpmMeasurementLib.uni | 4 ++-- .../SecureBootVariableProvisionLib.c | 2 +- SecurityPkg/Library/Tpm2CommandLib/Tpm2Hierarchy.c | 2 +- SecurityPkg/Tcg/Tcg2Acpi/Tcg2Acpi.c | 2 +- SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigImpl.c | 2 +- SecurityPkg/Tcg/TcgDxe/TcgDxe.c | 4 ++-- 8 files changed, 11 insertions(+), 11 deletions(-) diff --git a/SecurityPkg/Include/Library/Tpm2CommandLib.h b/SecurityPkg/Inc= lude/Library/Tpm2CommandLib.h index a2fb97f18dfe..1912f54c8416 100644 --- a/SecurityPkg/Include/Library/Tpm2CommandLib.h +++ b/SecurityPkg/Include/Library/Tpm2CommandLib.h @@ -136,7 +136,7 @@ Tpm2SelfTest ( =20 /** This command allows setting of the authorization policy for the platform= hierarchy (platformPolicy), the - storage hierarchy (ownerPolicy), and and the endorsement hierarchy (endo= rsementPolicy). + storage hierarchy (ownerPolicy), and the endorsement hierarchy (endorsem= entPolicy). =20 @param[in] AuthHandle TPM_RH_ENDORSEMENT, TPM_RH_OWNER or TP= M_RH_PLATFORM+{PP} parameters to be validated @param[in] AuthSession Auth Session context diff --git a/SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.= uni b/SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.uni index a1139810b1cb..ab043e8f5a1c 100644 --- a/SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.uni +++ b/SecurityPkg/Library/DxeTpmMeasurementLib/DxeTpmMeasurementLib.uni @@ -1,7 +1,7 @@ // /** @file // Provides TPM measurement functions for TPM1.2 and TPM 2.0 // -// This library provides TpmMeasureAndLogData() to to measure and log data= , and +// This library provides TpmMeasureAndLogData() to measure and log data, a= nd // extend the measurement result into a specific PCR. // // Copyright (c) 2012 - 2014, Intel Corporation. All rights reserved.
@@ -13,5 +13,5 @@ =20 #string STR_MODULE_ABSTRACT #language en-US "Provides TPM meas= urement functions for TPM1.2 and TPM 2.0" =20 -#string STR_MODULE_DESCRIPTION #language en-US "This library prov= ides TpmMeasureAndLogData() to to measure and log data, and extend the meas= urement result into a specific PCR." +#string STR_MODULE_DESCRIPTION #language en-US "This library prov= ides TpmMeasureAndLogData() to measure and log data, and extend the measure= ment result into a specific PCR." =20 diff --git a/SecurityPkg/Library/PeiTpmMeasurementLib/PeiTpmMeasurementLib.= uni b/SecurityPkg/Library/PeiTpmMeasurementLib/PeiTpmMeasurementLib.uni index 7b4341b449f4..4d0159d18ce3 100644 --- a/SecurityPkg/Library/PeiTpmMeasurementLib/PeiTpmMeasurementLib.uni +++ b/SecurityPkg/Library/PeiTpmMeasurementLib/PeiTpmMeasurementLib.uni @@ -1,7 +1,7 @@ // /** @file // Provides TPM measurement functions for TPM1.2 and TPM 2.0 // -// This library provides TpmMeasureAndLogData() to to measure and log data= , and +// This library provides TpmMeasureAndLogData() to measure and log data, a= nd // extend the measurement result into a specific PCR. // // Copyright (c) 2020, Intel Corporation. All rights reserved.
@@ -13,5 +13,5 @@ =20 #string STR_MODULE_ABSTRACT #language en-US "Provides TPM meas= urement functions for TPM1.2 and TPM 2.0" =20 -#string STR_MODULE_DESCRIPTION #language en-US "This library prov= ides TpmMeasureAndLogData() to to measure and log data, and extend the meas= urement result into a specific PCR." +#string STR_MODULE_DESCRIPTION #language en-US "This library prov= ides TpmMeasureAndLogData() to measure and log data, and extend the measure= ment result into a specific PCR." =20 diff --git a/SecurityPkg/Library/SecureBootVariableProvisionLib/SecureBootV= ariableProvisionLib.c b/SecurityPkg/Library/SecureBootVariableProvisionLib/= SecureBootVariableProvisionLib.c index bed1fe86205d..9e7b8946274d 100644 --- a/SecurityPkg/Library/SecureBootVariableProvisionLib/SecureBootVariable= ProvisionLib.c +++ b/SecurityPkg/Library/SecureBootVariableProvisionLib/SecureBootVariable= ProvisionLib.c @@ -28,7 +28,7 @@ Create a EFI Signature List with data fetched from section specified as = a argument. Found keys are verified using RsaGetPublicKeyFromX509(). =20 - @param[in] KeyFileGuid A pointer to to the FFS filename GUID + @param[in] KeyFileGuid A pointer to the FFS filename GUID @param[out] SigListsSize A pointer to size of signature list @param[out] SigListOut a pointer to a callee-allocated buffer w= ith signature lists =20 diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Hierarchy.c b/SecurityP= kg/Library/Tpm2CommandLib/Tpm2Hierarchy.c index 7144955be1a5..8e518317aa19 100644 --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Hierarchy.c +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Hierarchy.c @@ -116,7 +116,7 @@ typedef struct { =20 /** This command allows setting of the authorization policy for the platform= hierarchy (platformPolicy), the - storage hierarchy (ownerPolicy), and and the endorsement hierarchy (endo= rsementPolicy). + storage hierarchy (ownerPolicy), and the endorsement hierarchy (endorsem= entPolicy). =20 @param[in] AuthHandle TPM_RH_ENDORSEMENT, TPM_RH_OWNER or TP= M_RH_PLATFORM+{PP} parameters to be validated @param[in] AuthSession Auth Session context diff --git a/SecurityPkg/Tcg/Tcg2Acpi/Tcg2Acpi.c b/SecurityPkg/Tcg/Tcg2Acpi= /Tcg2Acpi.c index e8822cbeb015..36243321a6cc 100644 --- a/SecurityPkg/Tcg/Tcg2Acpi/Tcg2Acpi.c +++ b/SecurityPkg/Tcg/Tcg2Acpi/Tcg2Acpi.c @@ -97,7 +97,7 @@ EFI_TPM2_ACPI_TABLE_V4 mTpm2AcpiTemplate =3D { EFI_TPM2_ACPI_TABLE_REVISION, // // Compiler initializes the remaining bytes to 0 - // These fields should be filled in in production + // These fields should be filled in production // }, 0, // BIT0~15: PlatformClass diff --git a/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigImpl.c b/SecurityPkg/Tcg/= Tcg2Config/Tcg2ConfigImpl.c index 6eb04c014448..e7b74e8d399d 100644 --- a/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigImpl.c +++ b/SecurityPkg/Tcg/Tcg2Config/Tcg2ConfigImpl.c @@ -278,7 +278,7 @@ SaveTcg2PpRequestParameter ( } =20 /** - Save Tcg2 PCR Banks request request to variable space. + Save Tcg2 PCR Banks request to variable space. =20 @param[in] PCRBankIndex PCR Bank Index. @param[in] Enable Enable or disable this PCR Bank. diff --git a/SecurityPkg/Tcg/TcgDxe/TcgDxe.c b/SecurityPkg/Tcg/TcgDxe/TcgDx= e.c index ee6c6273033b..8b596a99262e 100644 --- a/SecurityPkg/Tcg/TcgDxe/TcgDxe.c +++ b/SecurityPkg/Tcg/TcgDxe/TcgDxe.c @@ -67,7 +67,7 @@ EFI_TCG_CLIENT_ACPI_TABLE mTcgClientAcpiTemplate =3D { 0x02 // Revision // // Compiler initializes the remaining bytes to 0 - // These fields should be filled in in production + // These fields should be filled in production // }, 0, // 0 for PC Client Platform Class @@ -88,7 +88,7 @@ EFI_TCG_SERVER_ACPI_TABLE mTcgServerAcpiTemplate =3D { 0x02 // Revision // // Compiler initializes the remaining bytes to 0 - // These fields should be filled in in production + // These fields should be filled in production // }, 1, // 1 for Server Platform Class --=20 2.25.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#93203): https://edk2.groups.io/g/devel/message/93203 Mute This Topic: https://groups.io/mt/93496610/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-