SecurityPkg: Fix spelling errors

https://bugzilla.tianocore.org/show_bug.cgi?id=2265

Cc: Jiewen Yao <jiewen.yao@intel.com>
Cc: Jian J Wang <jian.j.wang@intel.com>
Cc: Chao Zhang <chao.b.zhang@intel.com>
Signed-off-by: Michael D Kinney <michael.d.kinney@intel.com>
Reviewed-by: Jiewen Yao <Jiewen.yao@intel.com>
Reviewed-by: Jian J Wang <jian.j.wang@intel.com>
This commit is contained in:
Sean Brogan
2019-10-09 00:20:15 -07:00
committed by Michael D Kinney
parent 6e7e9b9578
commit d6b926e76e
81 changed files with 205 additions and 205 deletions

View File

@@ -425,7 +425,7 @@ CheckSignatureListFormat(
RsaContext = NULL;
//
// Walk throuth the input signature list and check the data format.
// Walk through the input signature list and check the data format.
// If any signature is incorrectly formed, the whole check will fail.
//
while ((SigDataSize > 0) && (SigDataSize >= SigList->SignatureListSize)) {
@@ -1069,7 +1069,7 @@ AuthServiceInternalCompareTimeStamp (
@param[out] Sha256Digest Sha256 digest calculated.
@return EFI_ABORTED Digest process failed.
@return EFI_SUCCESS SHA256 Digest is succesfully calculated.
@return EFI_SUCCESS SHA256 Digest is successfully calculated.
**/
EFI_STATUS

View File

@@ -159,7 +159,7 @@ DeleteCertsFromDb (
/**
Clean up signer's certificates for common authenticated variable
by corresponding VariableName and VendorGuid from "certdb".
Sytem may break down during Timebased Variable update & certdb update,
System may break down during Timebased Variable update & certdb update,
make them inconsistent, this function is called in AuthVariable Init to ensure
consistency

View File

@@ -96,7 +96,7 @@ VOID **mAuthVarAddressPointer[9];
AUTH_VAR_LIB_CONTEXT_IN *mAuthVarLibContextIn = NULL;
/**
Initialization for authenticated varibale services.
Initialization for authenticated variable services.
If this initialization returns error status, other APIs will not work
and expect to be not called then.
@@ -382,7 +382,7 @@ AuthVariableLibInitialize (
@retval EFI_INVALID_PARAMETER Invalid parameter.
@retval EFI_WRITE_PROTECTED Variable is write-protected.
@retval EFI_OUT_OF_RESOURCES There is not enough resource.
@retval EFI_SECURITY_VIOLATION The variable is with EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACESS
@retval EFI_SECURITY_VIOLATION The variable is with EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS
set, but the AuthInfo does NOT pass the validation
check carried out by the firmware.
@retval EFI_UNSUPPORTED Unsupported to process authenticated variable.

View File

@@ -49,7 +49,7 @@ DxeImageAuthenticationStatusHandler (
/**
Register image authenticaion status check handler.
Register image authentication status check handler.
@param ImageHandle ImageHandle of the loaded driver.
@param SystemTable Pointer to the EFI System Table.

View File

@@ -745,7 +745,7 @@ AddImageExeInfo (
if (ImageExeInfoTable != NULL) {
//
// The table has been found!
// We must enlarge the table to accomodate the new exe info entry.
// We must enlarge the table to accommodate the new exe info entry.
//
ImageExeInfoTableSize = GetImageExeInfoTableSize (ImageExeInfoTable);
} else {
@@ -947,7 +947,7 @@ Done:
@param[in] VariableName Name of database variable that is searched in.
@param[in] Signature Pointer to signature that is searched for.
@param[in] CertType Pointer to hash algrithom.
@param[in] CertType Pointer to hash algorithm.
@param[in] SignatureSize Size of Signature.
@return TRUE Found the signature in the variable database.
@@ -992,7 +992,7 @@ IsSignatureFoundInDatabase (
goto Done;
}
//
// Enumerate all signature data in SigDB to check if executable's signature exists.
// Enumerate all signature data in SigDB to check if signature exists for executable.
//
CertList = (EFI_SIGNATURE_LIST *) Data;
while ((DataSize > 0) && (DataSize >= CertList->SignatureListSize)) {
@@ -1844,7 +1844,7 @@ DxeImageVerificationHandler (
if (OffSet != (SecDataDir->VirtualAddress + SecDataDir->Size)) {
//
// The Size in Certificate Table or the attribute certicate table is corrupted.
// The Size in Certificate Table or the attribute certificate table is corrupted.
//
VerifyStatus = EFI_ACCESS_DENIED;
}
@@ -1855,7 +1855,7 @@ DxeImageVerificationHandler (
Status = EFI_ACCESS_DENIED;
if (Action == EFI_IMAGE_EXECUTION_AUTH_SIG_FAILED || Action == EFI_IMAGE_EXECUTION_AUTH_SIG_FOUND) {
//
// Get image hash value as executable's signature.
// Get image hash value as signature of executable.
//
SignatureListSize = sizeof (EFI_SIGNATURE_LIST) + sizeof (EFI_SIGNATURE_DATA) - 1 + mImageDigestSize;
SignatureList = (EFI_SIGNATURE_LIST *) AllocateZeroPool (SignatureListSize);

View File

@@ -2,7 +2,7 @@
This library registers RSA 2048 SHA 256 guided section handler
to parse RSA 2048 SHA 256 encapsulation section and extract raw data.
It uses the BaseCrypyLib based on OpenSSL to authenticate the signature.
It uses the BaseCryptLib based on OpenSSL to authenticate the signature.
Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.<BR>
SPDX-License-Identifier: BSD-2-Clause-Patent
@@ -213,7 +213,7 @@ Rsa2048Sha256GuidedSectionHandler (
}
//
// All paths from here return EFI_SUCESS and result is returned in AuthenticationStatus
// All paths from here return EFI_SUCCESS and result is returned in AuthenticationStatus
//
Status = EFI_SUCCESS;

View File

@@ -3,7 +3,7 @@
# ExtractGuidedSectionLib service to register an RSA 2048 SHA 256 guided section handler
# that parses RSA 2048 SHA 256 encapsulation section and extracts raw data.
#
# It uses the BaseCrypyLib based on OpenSSL to authenticate the signature.
# It uses the BaseCryptLib based on OpenSSL to authenticate the signature.
#
# Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.<BR>
#

View File

@@ -4,7 +4,7 @@
// ExtractGuidedSectionLib service to register an RSA 2048 SHA 256 guided section handler
// that parses RSA 2048 SHA 256 encapsulation section and extracts raw data.
//
// It uses the BaseCrypyLib based on OpenSSL to authenticate the signature.
// It uses the BaseCryptLib based on OpenSSL to authenticate the signature.
//
// Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.<BR>
//

View File

@@ -362,7 +362,7 @@ Tcg2MeasurePeImage (
if (Status == EFI_VOLUME_FULL) {
//
// Volume full here means the image is hashed and its result is extended to PCR.
// But the event log cann't be saved since log area is full.
// But the event log can't be saved since log area is full.
// Just return EFI_SUCCESS in order not to block the image load.
//
Status = EFI_SUCCESS;
@@ -541,7 +541,7 @@ DxeTpm2MeasureBootHandler (
}
//
// The PE image from unmeasured Firmware volume need be measured
// The PE image from measured Firmware volume will be mearsured according to policy below.
// The PE image from measured Firmware volume will be measured according to policy below.
// If it is driver, do not measure
// If it is application, still measure.
//

View File

@@ -649,7 +649,7 @@ TcgMeasurePeImage (
if (Status == EFI_OUT_OF_RESOURCES) {
//
// Out of resource here means the image is hashed and its result is extended to PCR.
// But the event log cann't be saved since log area is full.
// But the event log can't be saved since log area is full.
// Just return EFI_SUCCESS in order not to block the image load.
//
Status = EFI_SUCCESS;
@@ -838,7 +838,7 @@ DxeTpmMeasureBootHandler (
}
//
// The PE image from unmeasured Firmware volume need be measured
// The PE image from measured Firmware volume will be mearsured according to policy below.
// The PE image from measured Firmware volume will be measured according to policy below.
// If it is driver, do not measure
// If it is application, still measure.
//

View File

@@ -56,7 +56,7 @@ Tpm12MeasureAndLogData (
TcgEvent = NULL;
//
// Tpm active/deactive state is checked in HashLogExtendEvent
// Tpm activation state is checked in HashLogExtendEvent
//
Status = gBS->LocateProtocol (&gEfiTcgProtocolGuid, NULL, (VOID **) &TcgProtocol);
if (EFI_ERROR(Status)){

View File

@@ -128,7 +128,7 @@ HASH_INTERFACE mSha1InternalHashInstance = {
/**
The function register SHA1 instance.
@retval EFI_SUCCESS SHA1 instance is registered, or system dose not surpport registr SHA1 instance
@retval EFI_SUCCESS SHA1 instance is registered, or system does not support register SHA1 instance
**/
EFI_STATUS
EFIAPI

View File

@@ -128,7 +128,7 @@ HASH_INTERFACE mSha256InternalHashInstance = {
/**
The function register SHA256 instance.
@retval EFI_SUCCESS SHA256 instance is registered, or system dose not surpport registr SHA256 instance
@retval EFI_SUCCESS SHA256 instance is registered, or system does not support register SHA256 instance
**/
EFI_STATUS
EFIAPI

View File

@@ -128,7 +128,7 @@ HASH_INTERFACE mSha384InternalHashInstance = {
/**
The function register SHA384 instance.
@retval EFI_SUCCESS SHA384 instance is registered, or system dose not surpport registr SHA384 instance
@retval EFI_SUCCESS SHA384 instance is registered, or system does not support register SHA384 instance
**/
EFI_STATUS
EFIAPI

View File

@@ -127,7 +127,7 @@ HASH_INTERFACE mSha512InternalHashInstance = {
/**
The function register SHA512 instance.
@retval EFI_SUCCESS SHA512 instance is registered, or system dose not surpport registr SHA512 instance
@retval EFI_SUCCESS SHA512 instance is registered, or system does not support register SHA512 instance
**/
EFI_STATUS
EFIAPI

View File

@@ -29,7 +29,7 @@ TPM2_HASH_MASK mTpm2HashMask[] = {
};
/**
The function get algorith from hash mask info.
The function get algorithm from hash mask info.
@return Hash algorithm
**/

View File

@@ -2,7 +2,7 @@
This library registers RSA 2048 SHA 256 guided section handler
to parse RSA 2048 SHA 256 encapsulation section and extract raw data.
It uses the BaseCrypyLib based on OpenSSL to authenticate the signature.
It uses the BaseCryptLib based on OpenSSL to authenticate the signature.
Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.<BR>
SPDX-License-Identifier: BSD-2-Clause-Patent
@@ -197,7 +197,7 @@ Rsa2048Sha256GuidedSectionHandler (
}
//
// All paths from here return EFI_SUCESS and result is returned in AuthenticationStatus
// All paths from here return EFI_SUCCESS and result is returned in AuthenticationStatus
//
Status = EFI_SUCCESS;

View File

@@ -3,7 +3,7 @@
# ExtractGuidedSectionLib service to register an RSA 2048 SHA 256 guided section handler
# that parses RSA 2048 SHA 256 encapsulation section and extracts raw data.
#
# It uses the BaseCrypyLib based on OpenSSL to authenticate the signature.
# It uses the BaseCryptLib based on OpenSSL to authenticate the signature.
#
# Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.<BR>
#

View File

@@ -4,7 +4,7 @@
// ExtractGuidedSectionLib service to register an RSA 2048 SHA 256 guided section handler
// that parses RSA 2048 SHA 256 encapsulation section and extracts raw data.
//
// It uses the BaseCrypyLib based on OpenSSL to authenticate the signature.
// It uses the BaseCryptLib based on OpenSSL to authenticate the signature.
//
// Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.<BR>
//

View File

@@ -1249,7 +1249,7 @@ TcgGetTokenByteSequence(
Get next specify value.
@param ParseStruct Input parse structure.
@param Value Return vlaue.
@param Value Return value.
@retval return the action result.
@@ -1282,7 +1282,7 @@ TcgGetNextUINT8(
Get next specify value.
@param ParseStruct Input parse structure.
@param Value Return vlaue.
@param Value Return value.
@retval return the action result.
@@ -1315,7 +1315,7 @@ TcgGetNextUINT16(
Get next specify value.
@param ParseStruct Input parse structure.
@param Value Return vlaue.
@param Value Return value.
@retval return the action result.
@@ -1348,7 +1348,7 @@ TcgGetNextUINT32(
Get next specify value.
@param ParseStruct Input parse structure.
@param Value Return vlaue.
@param Value Return value.
@retval return the action result.
@@ -1370,7 +1370,7 @@ TcgGetNextUINT64(
Get next specify value.
@param ParseStruct Input parse structure.
@param Value Return vlaue.
@param Value Return value.
@retval return the action result.

View File

@@ -810,7 +810,7 @@ TcgFindFeatureCallback(
Get Feature code from the header.
@param DiscoveryHeader The discovery header.
@param FeatureCode reutrn the Feature code.
@param FeatureCode return the Feature code.
@param FeatureSize return the Feature size.
@retval return the Feature code data.

View File

@@ -11,7 +11,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
#include <Library/TcgStorageOpalLib.h>
#include "TcgStorageOpalLibInternal.h"
#define OPAL_MSID_LENGHT 128
#define OPAL_MSID_LENGTH 128
/**
Creates a session with OPAL_UID_ADMIN_SP as OPAL_ADMIN_SP_PSID_AUTHORITY, then reverts device using Admin SP Revert method.
@@ -1095,7 +1095,7 @@ GetRevertTimeOut (
OPAL_DISK_SUPPORT_ATTRIBUTE SupportedAttributes;
UINT16 BaseComId;
UINT32 MsidLength;
UINT8 Msid[OPAL_MSID_LENGHT];
UINT8 Msid[OPAL_MSID_LENGTH];
UINT32 RemovalMechanishLists[ResearvedMechanism];
UINT8 ActiveDataRemovalMechanism;
@@ -1104,7 +1104,7 @@ GetRevertTimeOut (
return 0;
}
TcgResult = OpalUtilGetMsid (Session, Msid, OPAL_MSID_LENGHT, &MsidLength);
TcgResult = OpalUtilGetMsid (Session, Msid, OPAL_MSID_LENGTH, &MsidLength);
if (TcgResult != TcgResultSuccess) {
return 0;
}

View File

@@ -218,7 +218,7 @@ Tpm12NvWriteValue (
if (EFI_ERROR (Status)) {
return Status;
}
DEBUG ((DEBUG_INFO, "Tpm12NvWritedValue - ReturnCode = %x\n", SwapBytes32 (Response.returnCode)));
DEBUG ((DEBUG_INFO, "Tpm12NvWriteValue - ReturnCode = %x\n", SwapBytes32 (Response.returnCode)));
switch (SwapBytes32 (Response.returnCode)) {
case TPM_SUCCESS:
return EFI_SUCCESS;

View File

@@ -125,7 +125,7 @@ Tpm12TisPcWaitRegisterBits (
in the time of default TIS_TIMEOUT_D.
@param[in] TisReg Pointer to TIS register.
@param[out] BurstCount Pointer to a buffer to store the got BurstConut.
@param[out] BurstCount Pointer to a buffer to store the got BurstCount.
@retval EFI_SUCCESS Get BurstCount.
@retval EFI_INVALID_PARAMETER TisReg is NULL or BurstCount is NULL.

View File

@@ -53,7 +53,7 @@ typedef struct {
NOTE:
To simplify this function, leave returned CapabilityData for caller to unpack since there are
many capability categories and only few categories will be used in firmware. It means the caller
need swap the byte order for the feilds in CapabilityData.
need swap the byte order for the fields in CapabilityData.
@param[in] Capability Group selection; determines the format of the response.
@param[in] Property Further definition of information.
@@ -119,7 +119,7 @@ Tpm2GetCapability (
//
*MoreData = RecvBuffer.MoreData;
//
// Does not unpack all possiable property here, the caller should unpack it and note the byte order.
// Does not unpack all possible property here, the caller should unpack it and note the byte order.
//
CopyMem (CapabilityData, &RecvBuffer.CapabilityData, RecvBufferSize - sizeof (TPM2_RESPONSE_HEADER) - sizeof (UINT8));

View File

@@ -435,7 +435,7 @@ Tpm2HierarchyChangeAuth (
WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16(NewAuth->size));
Buffer += sizeof(UINT16);
// New Authorizeation
// New Authorization
CopyMem(Buffer, NewAuth->buffer, NewAuth->size);
Buffer += NewAuth->size;

View File

@@ -137,7 +137,7 @@ Tpm2RegisterTpm2DeviceLib (
/**
The function caches current active TPM interface type.
@retval EFI_SUCCESS DTPM2.0 instance is registered, or system dose not surpport registr DTPM2.0 instance
@retval EFI_SUCCESS DTPM2.0 instance is registered, or system does not support register DTPM2.0 instance
**/
EFI_STATUS
EFIAPI

View File

@@ -93,7 +93,7 @@ TPM2_DEVICE_INTERFACE mDTpm2InternalTpm2Device = {
/**
The function register DTPM2.0 instance and caches current active TPM interface type.
@retval EFI_SUCCESS DTPM2.0 instance is registered, or system dose not surpport registr DTPM2.0 instance
@retval EFI_SUCCESS DTPM2.0 instance is registered, or system does not support register DTPM2.0 instance
**/
EFI_STATUS
EFIAPI

View File

@@ -327,7 +327,7 @@ PtpCrbTpmCommand (
GoReady_Exit:
//
// Goto Ready State if command is completed succesfully and TPM support IdleBypass
// Goto Ready State if command is completed successfully and TPM support IdleBypass
// If not supported. flow down to GoIdle
//
if (PcdGet8(PcdCRBIdleByPass) == 1) {
@@ -347,7 +347,7 @@ GoIdle_Exit:
MmioWrite32((UINTN)&CrbReg->CrbControlRequest, PTP_CRB_CONTROL_AREA_REQUEST_GO_IDLE);
//
// Only enforce Idle state transition if execution fails when CRBIndleBypass==1
// Only enforce Idle state transition if execution fails when CRBIdleBypass==1
// Leave regular Idle delay at the beginning of next command execution
//
if (PcdGet8(PcdCRBIdleByPass) == 1){

View File

@@ -81,7 +81,7 @@ TisPcWaitRegisterBits (
in the time of default TIS_TIMEOUT_D.
@param[in] TisReg Pointer to TIS register.
@param[out] BurstCount Pointer to a buffer to store the got BurstConut.
@param[out] BurstCount Pointer to a buffer to store the got BurstCount.
@retval EFI_SUCCESS Get BurstCount.
@retval EFI_INVALID_PARAMETER TisReg is NULL or BurstCount is NULL.
@@ -303,7 +303,7 @@ Tpm2TisTpmCommand (
TIS_TIMEOUT_B
);
//
// Do not clear CANCEL bit here bicoz Writes of 0 to this bit are ignored
// Do not clear CANCEL bit here because Writes of 0 to this bit are ignored
//
if (EFI_ERROR (Status)) {
//

View File

@@ -1,5 +1,5 @@
/** @file
The intenal header file for TpmCommLib.
The internal header file for TpmCommLib.
Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.<BR>
SPDX-License-Identifier: BSD-2-Clause-Patent

View File

@@ -64,7 +64,7 @@ TisPcWaitRegisterBits (
in the time of default TIS_TIMEOUT_D.
@param[in] TisReg Pointer to TIS register.
@param[out] BurstCount Pointer to a buffer to store the got BurstConut.
@param[out] BurstCount Pointer to a buffer to store the got BurstCount.
@retval EFI_SUCCESS Get BurstCount.
@retval EFI_INVALID_PARAMETER TisReg is NULL or BurstCount is NULL.