src/mainboard to src/security: Fix spelling errors
These issues were found and fixed by codespell, a useful tool for finding spelling errors. Signed-off-by: Martin Roth <martin@coreboot.org> Change-Id: Ie34003a9fdfe9f3b1b8ec0789aeca8b9435c9c79 Reviewed-on: https://review.coreboot.org/c/coreboot/+/58081 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Felix Held <felix-coreboot@felixheld.de> Reviewed-by: Angel Pons <th3fanbus@gmail.com>
This commit is contained in:
@@ -123,7 +123,7 @@ void intel_cbnt_log_registers(void)
|
||||
LOG("SACM INFO MSR (0x13A) raw: 0x%016llx\n", acm_info.raw);
|
||||
LOG(" NEM status: %u\n", acm_info.nem_enabled);
|
||||
LOG(" TPM type: %s\n", tpm_type[acm_info.tpm_type]);
|
||||
LOG(" TPM succes: %u\n", acm_info.tpm_success);
|
||||
LOG(" TPM success: %u\n", acm_info.tpm_success);
|
||||
LOG(" FACB: %u\n", acm_info.facb);
|
||||
LOG(" measured boot: %u\n", acm_info.measured_boot);
|
||||
LOG(" verified boot: %u\n", acm_info.verified_boot);
|
||||
|
@@ -668,7 +668,7 @@ bool stm_check_stm_image(void *stm_image, uint32_t stm_imagesize)
|
||||
/*
|
||||
* This function return BIOS STM resource.
|
||||
* Produced by SmmStm.
|
||||
* Comsumed by SmmMpService when Init.
|
||||
* Consumed by SmmMpService when Init.
|
||||
*
|
||||
* @return BIOS STM resource
|
||||
*/
|
||||
|
@@ -150,7 +150,7 @@ static struct acm_info_table *find_info_table(const void *ptr)
|
||||
}
|
||||
|
||||
/**
|
||||
* Validate that the provided ACM is useable on this platform.
|
||||
* Validate that the provided ACM is usable on this platform.
|
||||
*/
|
||||
static int validate_acm(const void *ptr)
|
||||
{
|
||||
|
@@ -98,7 +98,7 @@ static void clear_memory(void *unused)
|
||||
__func__, (void *)pgtbl, (void *)vmem_addr);
|
||||
}
|
||||
|
||||
/* Now clear all useable DRAM */
|
||||
/* Now clear all usable DRAM */
|
||||
memranges_each_entry(r, &mem) {
|
||||
if (range_entry_tag(r) != BM_MEM_RAM)
|
||||
continue;
|
||||
|
@@ -55,7 +55,7 @@ uint32_t tpm_extend_pcr(int pcr, enum vb2_hash_algorithm digest_algo,
|
||||
const char *name);
|
||||
|
||||
/**
|
||||
* Issue a TPM_Clear and reenable/reactivate the TPM.
|
||||
* Issue a TPM_Clear and re-enable/reactivate the TPM.
|
||||
* @return TPM_SUCCESS on success. If not a tpm error is returned
|
||||
*/
|
||||
uint32_t tpm_clear_and_reenable(void);
|
||||
|
@@ -273,7 +273,7 @@ uint32_t tlcl_self_test_full(void)
|
||||
uint32_t tlcl_lock_nv_write(uint32_t index)
|
||||
{
|
||||
struct tpm2_response *response;
|
||||
/* TPM Wll reject attempts to write at non-defined index. */
|
||||
/* TPM Will reject attempts to write at non-defined index. */
|
||||
struct tpm2_nv_write_lock_cmd nv_wl = {
|
||||
.nvIndex = HR_NV_INDEX + index,
|
||||
};
|
||||
@@ -372,7 +372,7 @@ uint32_t tlcl_define_space(uint32_t space_index, size_t space_size,
|
||||
if (!response)
|
||||
return TPM_E_NO_DEVICE;
|
||||
|
||||
/* Map TPM2 retrun codes into common vboot represenation. */
|
||||
/* Map TPM2 return codes into common vboot representation. */
|
||||
switch (response->hdr.tpm_code) {
|
||||
case TPM2_RC_SUCCESS:
|
||||
return TPM_SUCCESS;
|
||||
|
@@ -28,7 +28,7 @@ int tpm_marshal_command(TPM_CC command, const void *tpm_command_body,
|
||||
* tpm_unmarshal_response
|
||||
*
|
||||
* Given a buffer received from the TPM in response to a certain command,
|
||||
* deserialize the buffer into the expeced response structure.
|
||||
* deserialize the buffer into the expected response structure.
|
||||
*
|
||||
* struct tpm2_response is a union of all possible responses.
|
||||
*
|
||||
|
Reference in New Issue
Block a user