[edk2-devel] [PATCH v2 62/78] SecurityPkg: Fix few typos

Yao, Jiewen jiewen.yao at intel.com
Fri Jan 3 09:56:38 UTC 2020


Reviewed-by: jiewen.yao at intel.com

> -----Original Message-----
> From: devel at edk2.groups.io <devel at edk2.groups.io> On Behalf Of Philippe
> Mathieu-Daudé
> Sent: Friday, January 3, 2020 5:08 PM
> To: devel at edk2.groups.io
> Cc: Antoine Coeur <coeur at gmx.fr>; Yao, Jiewen <jiewen.yao at intel.com>;
> Wang, Jian J <jian.j.wang at intel.com>; Zhang, Chao B
> <chao.b.zhang at intel.com>; Philippe Mathieu-Daude <philmd at redhat.com>
> Subject: [edk2-devel] [PATCH v2 62/78] SecurityPkg: Fix few typos
> 
> From: Antoine Coeur <coeur at gmx.fr>
> 
> Fix few typos in comments and documentation.
> 
> Cc: Jiewen Yao <jiewen.yao at intel.com>
> Cc: Jian J Wang <jian.j.wang at intel.com>
> Cc: Chao Zhang <chao.b.zhang at intel.com>
> Signed-off-by: Antoine Coeur <coeur at gmx.fr>
> Reviewed-by: Philippe Mathieu-Daude <philmd at redhat.com>
> Signed-off-by: Philippe Mathieu-Daude <philmd at redhat.com>
> ---
>  .../Library/PlatformSecureLibNull/PlatformSecureLibNull.inf     | 2 +-
>  .../DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceLib.c       | 2 +-
>  .../Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c       | 2 +-
>  SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c | 2 +-
>  .../HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.c        | 2 +-
>  .../HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.c        | 2 +-
>  SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c         | 2 +-
>  SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c               | 2 +-
>  .../Library/PlatformSecureLibNull/PlatformSecureLibNull.uni     | 2 +-
>  9 files changed, 9 insertions(+), 9 deletions(-)
> 
> diff --git a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf
> b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf
> index 9ae597d381fc..85607aa645a1 100644
> --- a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf
> +++ b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf
> @@ -1,5 +1,5 @@
>  ## @file
> -#  NULL platform secure library instance that alway returns TRUE for a user
> physical present
> +#  NULL platform secure library instance that always returns TRUE for a user
> physical present
>  #
>  #  NULL PlatformSecureLib instance does NOT really detect whether a physical
> present
>  #  user exists but returns TRUE directly. This instance can be used to verify
> security
> diff --git
> a/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceLib.c
> b/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceLib.c
> index 174172d5d7a5..1a9bd4659a65 100644
> ---
> a/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceLib.c
> +++
> b/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceLib.c
> @@ -175,7 +175,7 @@ TpmPhysicalPresence (
>    @param[in] TcgProtocol              EFI TCG Protocol instance.
>    @param[in] Ordinal                  TPM command code.
>    @param[in] AdditionalParameterSize  Additional parameter size.
> -  @param[in] AdditionalParameters     Pointer to the Additional paramaters.
> +  @param[in] AdditionalParameters     Pointer to the Additional parameters.
> 
>    @retval TCG_PP_OPERATION_RESPONSE_BIOS_FAILURE  Error occurred
> during sending command to TPM or
>                                                    receiving response from TPM.
> diff --git
> a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
> b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
> index 04b9b0d7fbf3..5ea2d3ba8ed1 100644
> --- a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
> +++
> b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c
> @@ -471,7 +471,7 @@ DxeTpm2MeasureBootHandler (
>    Status = gBS->LocateDevicePath (&gEfiBlockIoProtocolGuid,
> &DevicePathNode, &Handle);
>    if (!EFI_ERROR (Status) && !mTcg2MeasureGptTableFlag) {
>      //
> -    // Find the gpt partion on the given devicepath
> +    // Find the gpt partition on the given devicepath
>      //
>      DevicePathNode = OrigDevicePathNode;
>      ASSERT (DevicePathNode != NULL);
> diff --git
> a/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
> b/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
> index 1f2eed29a1df..d5aeb35eb72c 100644
> --- a/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
> +++ b/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c
> @@ -769,7 +769,7 @@ DxeTpmMeasureBootHandler (
>    Status = gBS->LocateDevicePath (&gEfiBlockIoProtocolGuid,
> &DevicePathNode, &Handle);
>    if (!EFI_ERROR (Status) && !mMeasureGptTableFlag) {
>      //
> -    // Find the gpt partion on the given devicepath
> +    // Find the gpt partition on the given devicepath
>      //
>      DevicePathNode = OrigDevicePathNode;
>      ASSERT (DevicePathNode != NULL);
> diff --git
> a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.
> c
> b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.
> c
> index a7cb05849c00..7a0f61efbb8c 100644
> ---
> a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.
> c
> +++
> b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.
> c
> @@ -1,6 +1,6 @@
>  /** @file
>    This library is BaseCrypto router. It will redirect hash request to each individual
> -  hash handler registerd, such as SHA1, SHA256.
> +  hash handler registered, such as SHA1, SHA256.
>    Platform can use PcdTpm2HashMask to mask some hash engines.
> 
>  Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved. <BR>
> diff --git
> a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.c
> b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.c
> index d31c8b0782d4..42cb562f67d3 100644
> ---
> a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.c
> +++
> b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.c
> @@ -1,6 +1,6 @@
>  /** @file
>    This library is BaseCrypto router. It will redirect hash request to each individual
> -  hash handler registerd, such as SHA1, SHA256.
> +  hash handler registered, such as SHA1, SHA256.
>    Platform can use PcdTpm2HashMask to mask some hash engines.
> 
>  Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved. <BR>
> diff --git a/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c
> b/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c
> index a96862f93733..42282e33a913 100644
> --- a/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c
> +++ b/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c
> @@ -519,7 +519,7 @@ IsValidTimestamp (
>    @param[in]  SignedData      Pointer to buffer containing ASN.1 DER-encoded
> PKCS7
>                                signature.
>    @param[in]  SignedDataSize  The size of SignedData buffer in bytes.
> -  @param[in]  InHash          Pointer to the buffer containing the hash of the
> mesage data
> +  @param[in]  InHash          Pointer to the buffer containing the hash of the
> message data
>                                previously signed and to be verified.
>    @param[in]  InHashSize      The size of InHash buffer in bytes.
>    @param[in]  RevokedDb       Pointer to a list of pointers to
> EFI_SIGNATURE_LIST
> diff --git a/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c
> b/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c
> index 90e54a89ce2b..13d3dbd0bfbe 100644
> --- a/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c
> +++ b/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c
> @@ -4,7 +4,7 @@
>    The driver will use the new RDRAND instruction to produce high-quality, high-
> performance
>    entropy and random number.
> 
> -  RNG Algoritnms defined in UEFI 2.4:
> +  RNG Algorithms defined in UEFI 2.4:
>     - EFI_RNG_ALGORITHM_SP800_90_CTR_256_GUID  - Supported
>       (RDRAND implements a hardware NIST SP800-90 AES-CTR-256 based DRBG)
>     - EFI_RNG_ALGORITHM_RAW                    - Supported
> diff --git a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.uni
> b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.uni
> index e5c9d1020ff9..860b8cbb5a05 100644
> --- a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.uni
> +++ b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.uni
> @@ -1,5 +1,5 @@
>  // /** @file
> -// NULL platform secure library instance that alway returns TRUE for a user
> physical present
> +// NULL platform secure library instance that always returns TRUE for a user
> physical present
>  //
>  // NULL PlatformSecureLib instance does NOT really detect whether a physical
> present
>  // user exists but returns TRUE directly. This instance can be used to verify
> security
> --
> 2.21.0
> 
> 
> 


-=-=-=-=-=-=-=-=-=-=-=-
Groups.io Links: You receive all messages sent to this group.

View/Reply Online (#52807): https://edk2.groups.io/g/devel/message/52807
Mute This Topic: https://groups.io/mt/69395961/1813853
Group Owner: devel+owner at edk2.groups.io
Unsubscribe: https://edk2.groups.io/g/devel/unsub  [edk2-devel-archive at redhat.com]
-=-=-=-=-=-=-=-=-=-=-=-





More information about the edk2-devel-archive mailing list