src/mainboard to src/security: Fix spelling errors

These issues were found and fixed by codespell, a useful tool for
finding spelling errors.

Signed-off-by: Martin Roth <martin@coreboot.org>
Change-Id: Ie34003a9fdfe9f3b1b8ec0789aeca8b9435c9c79
Reviewed-on: https://review.coreboot.org/c/coreboot/+/58081
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Felix Held <felix-coreboot@felixheld.de>
Reviewed-by: Angel Pons <th3fanbus@gmail.com>
This commit is contained in:
Martin Roth
2021-10-01 14:37:30 -06:00
committed by Martin Roth
parent 0949e73906
commit 50863daef8
58 changed files with 64 additions and 64 deletions

View File

@@ -123,7 +123,7 @@ void intel_cbnt_log_registers(void)
LOG("SACM INFO MSR (0x13A) raw: 0x%016llx\n", acm_info.raw);
LOG(" NEM status: %u\n", acm_info.nem_enabled);
LOG(" TPM type: %s\n", tpm_type[acm_info.tpm_type]);
LOG(" TPM succes: %u\n", acm_info.tpm_success);
LOG(" TPM success: %u\n", acm_info.tpm_success);
LOG(" FACB: %u\n", acm_info.facb);
LOG(" measured boot: %u\n", acm_info.measured_boot);
LOG(" verified boot: %u\n", acm_info.verified_boot);

View File

@@ -668,7 +668,7 @@ bool stm_check_stm_image(void *stm_image, uint32_t stm_imagesize)
/*
* This function return BIOS STM resource.
* Produced by SmmStm.
* Comsumed by SmmMpService when Init.
* Consumed by SmmMpService when Init.
*
* @return BIOS STM resource
*/

View File

@@ -150,7 +150,7 @@ static struct acm_info_table *find_info_table(const void *ptr)
}
/**
* Validate that the provided ACM is useable on this platform.
* Validate that the provided ACM is usable on this platform.
*/
static int validate_acm(const void *ptr)
{

View File

@@ -98,7 +98,7 @@ static void clear_memory(void *unused)
__func__, (void *)pgtbl, (void *)vmem_addr);
}
/* Now clear all useable DRAM */
/* Now clear all usable DRAM */
memranges_each_entry(r, &mem) {
if (range_entry_tag(r) != BM_MEM_RAM)
continue;

View File

@@ -55,7 +55,7 @@ uint32_t tpm_extend_pcr(int pcr, enum vb2_hash_algorithm digest_algo,
const char *name);
/**
* Issue a TPM_Clear and reenable/reactivate the TPM.
* Issue a TPM_Clear and re-enable/reactivate the TPM.
* @return TPM_SUCCESS on success. If not a tpm error is returned
*/
uint32_t tpm_clear_and_reenable(void);

View File

@@ -273,7 +273,7 @@ uint32_t tlcl_self_test_full(void)
uint32_t tlcl_lock_nv_write(uint32_t index)
{
struct tpm2_response *response;
/* TPM Wll reject attempts to write at non-defined index. */
/* TPM Will reject attempts to write at non-defined index. */
struct tpm2_nv_write_lock_cmd nv_wl = {
.nvIndex = HR_NV_INDEX + index,
};
@@ -372,7 +372,7 @@ uint32_t tlcl_define_space(uint32_t space_index, size_t space_size,
if (!response)
return TPM_E_NO_DEVICE;
/* Map TPM2 retrun codes into common vboot represenation. */
/* Map TPM2 return codes into common vboot representation. */
switch (response->hdr.tpm_code) {
case TPM2_RC_SUCCESS:
return TPM_SUCCESS;

View File

@@ -28,7 +28,7 @@ int tpm_marshal_command(TPM_CC command, const void *tpm_command_body,
* tpm_unmarshal_response
*
* Given a buffer received from the TPM in response to a certain command,
* deserialize the buffer into the expeced response structure.
* deserialize the buffer into the expected response structure.
*
* struct tpm2_response is a union of all possible responses.
*