SecurityPkg: Fix spelling errors
https://bugzilla.tianocore.org/show_bug.cgi?id=2265 Cc: Jiewen Yao <jiewen.yao@intel.com> Cc: Jian J Wang <jian.j.wang@intel.com> Cc: Chao Zhang <chao.b.zhang@intel.com> Signed-off-by: Michael D Kinney <michael.d.kinney@intel.com> Reviewed-by: Jiewen Yao <Jiewen.yao@intel.com> Reviewed-by: Jian J Wang <jian.j.wang@intel.com>
This commit is contained in:
committed by
Michael D Kinney
parent
6e7e9b9578
commit
d6b926e76e
@@ -425,7 +425,7 @@ CheckSignatureListFormat(
|
||||
RsaContext = NULL;
|
||||
|
||||
//
|
||||
// Walk throuth the input signature list and check the data format.
|
||||
// Walk through the input signature list and check the data format.
|
||||
// If any signature is incorrectly formed, the whole check will fail.
|
||||
//
|
||||
while ((SigDataSize > 0) && (SigDataSize >= SigList->SignatureListSize)) {
|
||||
@@ -1069,7 +1069,7 @@ AuthServiceInternalCompareTimeStamp (
|
||||
@param[out] Sha256Digest Sha256 digest calculated.
|
||||
|
||||
@return EFI_ABORTED Digest process failed.
|
||||
@return EFI_SUCCESS SHA256 Digest is succesfully calculated.
|
||||
@return EFI_SUCCESS SHA256 Digest is successfully calculated.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
|
@@ -159,7 +159,7 @@ DeleteCertsFromDb (
|
||||
/**
|
||||
Clean up signer's certificates for common authenticated variable
|
||||
by corresponding VariableName and VendorGuid from "certdb".
|
||||
Sytem may break down during Timebased Variable update & certdb update,
|
||||
System may break down during Timebased Variable update & certdb update,
|
||||
make them inconsistent, this function is called in AuthVariable Init to ensure
|
||||
consistency
|
||||
|
||||
|
@@ -96,7 +96,7 @@ VOID **mAuthVarAddressPointer[9];
|
||||
AUTH_VAR_LIB_CONTEXT_IN *mAuthVarLibContextIn = NULL;
|
||||
|
||||
/**
|
||||
Initialization for authenticated varibale services.
|
||||
Initialization for authenticated variable services.
|
||||
If this initialization returns error status, other APIs will not work
|
||||
and expect to be not called then.
|
||||
|
||||
@@ -382,7 +382,7 @@ AuthVariableLibInitialize (
|
||||
@retval EFI_INVALID_PARAMETER Invalid parameter.
|
||||
@retval EFI_WRITE_PROTECTED Variable is write-protected.
|
||||
@retval EFI_OUT_OF_RESOURCES There is not enough resource.
|
||||
@retval EFI_SECURITY_VIOLATION The variable is with EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACESS
|
||||
@retval EFI_SECURITY_VIOLATION The variable is with EFI_VARIABLE_TIME_BASED_AUTHENTICATED_WRITE_ACCESS
|
||||
set, but the AuthInfo does NOT pass the validation
|
||||
check carried out by the firmware.
|
||||
@retval EFI_UNSUPPORTED Unsupported to process authenticated variable.
|
||||
|
@@ -49,7 +49,7 @@ DxeImageAuthenticationStatusHandler (
|
||||
|
||||
|
||||
/**
|
||||
Register image authenticaion status check handler.
|
||||
Register image authentication status check handler.
|
||||
|
||||
@param ImageHandle ImageHandle of the loaded driver.
|
||||
@param SystemTable Pointer to the EFI System Table.
|
||||
|
@@ -745,7 +745,7 @@ AddImageExeInfo (
|
||||
if (ImageExeInfoTable != NULL) {
|
||||
//
|
||||
// The table has been found!
|
||||
// We must enlarge the table to accomodate the new exe info entry.
|
||||
// We must enlarge the table to accommodate the new exe info entry.
|
||||
//
|
||||
ImageExeInfoTableSize = GetImageExeInfoTableSize (ImageExeInfoTable);
|
||||
} else {
|
||||
@@ -947,7 +947,7 @@ Done:
|
||||
|
||||
@param[in] VariableName Name of database variable that is searched in.
|
||||
@param[in] Signature Pointer to signature that is searched for.
|
||||
@param[in] CertType Pointer to hash algrithom.
|
||||
@param[in] CertType Pointer to hash algorithm.
|
||||
@param[in] SignatureSize Size of Signature.
|
||||
|
||||
@return TRUE Found the signature in the variable database.
|
||||
@@ -992,7 +992,7 @@ IsSignatureFoundInDatabase (
|
||||
goto Done;
|
||||
}
|
||||
//
|
||||
// Enumerate all signature data in SigDB to check if executable's signature exists.
|
||||
// Enumerate all signature data in SigDB to check if signature exists for executable.
|
||||
//
|
||||
CertList = (EFI_SIGNATURE_LIST *) Data;
|
||||
while ((DataSize > 0) && (DataSize >= CertList->SignatureListSize)) {
|
||||
@@ -1844,7 +1844,7 @@ DxeImageVerificationHandler (
|
||||
|
||||
if (OffSet != (SecDataDir->VirtualAddress + SecDataDir->Size)) {
|
||||
//
|
||||
// The Size in Certificate Table or the attribute certicate table is corrupted.
|
||||
// The Size in Certificate Table or the attribute certificate table is corrupted.
|
||||
//
|
||||
VerifyStatus = EFI_ACCESS_DENIED;
|
||||
}
|
||||
@@ -1855,7 +1855,7 @@ DxeImageVerificationHandler (
|
||||
Status = EFI_ACCESS_DENIED;
|
||||
if (Action == EFI_IMAGE_EXECUTION_AUTH_SIG_FAILED || Action == EFI_IMAGE_EXECUTION_AUTH_SIG_FOUND) {
|
||||
//
|
||||
// Get image hash value as executable's signature.
|
||||
// Get image hash value as signature of executable.
|
||||
//
|
||||
SignatureListSize = sizeof (EFI_SIGNATURE_LIST) + sizeof (EFI_SIGNATURE_DATA) - 1 + mImageDigestSize;
|
||||
SignatureList = (EFI_SIGNATURE_LIST *) AllocateZeroPool (SignatureListSize);
|
||||
|
@@ -2,7 +2,7 @@
|
||||
|
||||
This library registers RSA 2048 SHA 256 guided section handler
|
||||
to parse RSA 2048 SHA 256 encapsulation section and extract raw data.
|
||||
It uses the BaseCrypyLib based on OpenSSL to authenticate the signature.
|
||||
It uses the BaseCryptLib based on OpenSSL to authenticate the signature.
|
||||
|
||||
Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
@@ -213,7 +213,7 @@ Rsa2048Sha256GuidedSectionHandler (
|
||||
}
|
||||
|
||||
//
|
||||
// All paths from here return EFI_SUCESS and result is returned in AuthenticationStatus
|
||||
// All paths from here return EFI_SUCCESS and result is returned in AuthenticationStatus
|
||||
//
|
||||
Status = EFI_SUCCESS;
|
||||
|
||||
|
@@ -3,7 +3,7 @@
|
||||
# ExtractGuidedSectionLib service to register an RSA 2048 SHA 256 guided section handler
|
||||
# that parses RSA 2048 SHA 256 encapsulation section and extracts raw data.
|
||||
#
|
||||
# It uses the BaseCrypyLib based on OpenSSL to authenticate the signature.
|
||||
# It uses the BaseCryptLib based on OpenSSL to authenticate the signature.
|
||||
#
|
||||
# Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
#
|
||||
|
@@ -4,7 +4,7 @@
|
||||
// ExtractGuidedSectionLib service to register an RSA 2048 SHA 256 guided section handler
|
||||
// that parses RSA 2048 SHA 256 encapsulation section and extracts raw data.
|
||||
//
|
||||
// It uses the BaseCrypyLib based on OpenSSL to authenticate the signature.
|
||||
// It uses the BaseCryptLib based on OpenSSL to authenticate the signature.
|
||||
//
|
||||
// Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
//
|
||||
|
@@ -362,7 +362,7 @@ Tcg2MeasurePeImage (
|
||||
if (Status == EFI_VOLUME_FULL) {
|
||||
//
|
||||
// Volume full here means the image is hashed and its result is extended to PCR.
|
||||
// But the event log cann't be saved since log area is full.
|
||||
// But the event log can't be saved since log area is full.
|
||||
// Just return EFI_SUCCESS in order not to block the image load.
|
||||
//
|
||||
Status = EFI_SUCCESS;
|
||||
@@ -541,7 +541,7 @@ DxeTpm2MeasureBootHandler (
|
||||
}
|
||||
//
|
||||
// The PE image from unmeasured Firmware volume need be measured
|
||||
// The PE image from measured Firmware volume will be mearsured according to policy below.
|
||||
// The PE image from measured Firmware volume will be measured according to policy below.
|
||||
// If it is driver, do not measure
|
||||
// If it is application, still measure.
|
||||
//
|
||||
|
@@ -649,7 +649,7 @@ TcgMeasurePeImage (
|
||||
if (Status == EFI_OUT_OF_RESOURCES) {
|
||||
//
|
||||
// Out of resource here means the image is hashed and its result is extended to PCR.
|
||||
// But the event log cann't be saved since log area is full.
|
||||
// But the event log can't be saved since log area is full.
|
||||
// Just return EFI_SUCCESS in order not to block the image load.
|
||||
//
|
||||
Status = EFI_SUCCESS;
|
||||
@@ -838,7 +838,7 @@ DxeTpmMeasureBootHandler (
|
||||
}
|
||||
//
|
||||
// The PE image from unmeasured Firmware volume need be measured
|
||||
// The PE image from measured Firmware volume will be mearsured according to policy below.
|
||||
// The PE image from measured Firmware volume will be measured according to policy below.
|
||||
// If it is driver, do not measure
|
||||
// If it is application, still measure.
|
||||
//
|
||||
|
@@ -56,7 +56,7 @@ Tpm12MeasureAndLogData (
|
||||
TcgEvent = NULL;
|
||||
|
||||
//
|
||||
// Tpm active/deactive state is checked in HashLogExtendEvent
|
||||
// Tpm activation state is checked in HashLogExtendEvent
|
||||
//
|
||||
Status = gBS->LocateProtocol (&gEfiTcgProtocolGuid, NULL, (VOID **) &TcgProtocol);
|
||||
if (EFI_ERROR(Status)){
|
||||
|
@@ -128,7 +128,7 @@ HASH_INTERFACE mSha1InternalHashInstance = {
|
||||
/**
|
||||
The function register SHA1 instance.
|
||||
|
||||
@retval EFI_SUCCESS SHA1 instance is registered, or system dose not surpport registr SHA1 instance
|
||||
@retval EFI_SUCCESS SHA1 instance is registered, or system does not support register SHA1 instance
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
|
@@ -128,7 +128,7 @@ HASH_INTERFACE mSha256InternalHashInstance = {
|
||||
/**
|
||||
The function register SHA256 instance.
|
||||
|
||||
@retval EFI_SUCCESS SHA256 instance is registered, or system dose not surpport registr SHA256 instance
|
||||
@retval EFI_SUCCESS SHA256 instance is registered, or system does not support register SHA256 instance
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
|
@@ -128,7 +128,7 @@ HASH_INTERFACE mSha384InternalHashInstance = {
|
||||
/**
|
||||
The function register SHA384 instance.
|
||||
|
||||
@retval EFI_SUCCESS SHA384 instance is registered, or system dose not surpport registr SHA384 instance
|
||||
@retval EFI_SUCCESS SHA384 instance is registered, or system does not support register SHA384 instance
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
|
@@ -127,7 +127,7 @@ HASH_INTERFACE mSha512InternalHashInstance = {
|
||||
/**
|
||||
The function register SHA512 instance.
|
||||
|
||||
@retval EFI_SUCCESS SHA512 instance is registered, or system dose not surpport registr SHA512 instance
|
||||
@retval EFI_SUCCESS SHA512 instance is registered, or system does not support register SHA512 instance
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
|
@@ -29,7 +29,7 @@ TPM2_HASH_MASK mTpm2HashMask[] = {
|
||||
};
|
||||
|
||||
/**
|
||||
The function get algorith from hash mask info.
|
||||
The function get algorithm from hash mask info.
|
||||
|
||||
@return Hash algorithm
|
||||
**/
|
||||
|
@@ -2,7 +2,7 @@
|
||||
|
||||
This library registers RSA 2048 SHA 256 guided section handler
|
||||
to parse RSA 2048 SHA 256 encapsulation section and extract raw data.
|
||||
It uses the BaseCrypyLib based on OpenSSL to authenticate the signature.
|
||||
It uses the BaseCryptLib based on OpenSSL to authenticate the signature.
|
||||
|
||||
Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
@@ -197,7 +197,7 @@ Rsa2048Sha256GuidedSectionHandler (
|
||||
}
|
||||
|
||||
//
|
||||
// All paths from here return EFI_SUCESS and result is returned in AuthenticationStatus
|
||||
// All paths from here return EFI_SUCCESS and result is returned in AuthenticationStatus
|
||||
//
|
||||
Status = EFI_SUCCESS;
|
||||
|
||||
|
@@ -3,7 +3,7 @@
|
||||
# ExtractGuidedSectionLib service to register an RSA 2048 SHA 256 guided section handler
|
||||
# that parses RSA 2048 SHA 256 encapsulation section and extracts raw data.
|
||||
#
|
||||
# It uses the BaseCrypyLib based on OpenSSL to authenticate the signature.
|
||||
# It uses the BaseCryptLib based on OpenSSL to authenticate the signature.
|
||||
#
|
||||
# Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
#
|
||||
|
@@ -4,7 +4,7 @@
|
||||
// ExtractGuidedSectionLib service to register an RSA 2048 SHA 256 guided section handler
|
||||
// that parses RSA 2048 SHA 256 encapsulation section and extracts raw data.
|
||||
//
|
||||
// It uses the BaseCrypyLib based on OpenSSL to authenticate the signature.
|
||||
// It uses the BaseCryptLib based on OpenSSL to authenticate the signature.
|
||||
//
|
||||
// Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
//
|
||||
|
@@ -1249,7 +1249,7 @@ TcgGetTokenByteSequence(
|
||||
Get next specify value.
|
||||
|
||||
@param ParseStruct Input parse structure.
|
||||
@param Value Return vlaue.
|
||||
@param Value Return value.
|
||||
|
||||
@retval return the action result.
|
||||
|
||||
@@ -1282,7 +1282,7 @@ TcgGetNextUINT8(
|
||||
Get next specify value.
|
||||
|
||||
@param ParseStruct Input parse structure.
|
||||
@param Value Return vlaue.
|
||||
@param Value Return value.
|
||||
|
||||
@retval return the action result.
|
||||
|
||||
@@ -1315,7 +1315,7 @@ TcgGetNextUINT16(
|
||||
Get next specify value.
|
||||
|
||||
@param ParseStruct Input parse structure.
|
||||
@param Value Return vlaue.
|
||||
@param Value Return value.
|
||||
|
||||
@retval return the action result.
|
||||
|
||||
@@ -1348,7 +1348,7 @@ TcgGetNextUINT32(
|
||||
Get next specify value.
|
||||
|
||||
@param ParseStruct Input parse structure.
|
||||
@param Value Return vlaue.
|
||||
@param Value Return value.
|
||||
|
||||
@retval return the action result.
|
||||
|
||||
@@ -1370,7 +1370,7 @@ TcgGetNextUINT64(
|
||||
Get next specify value.
|
||||
|
||||
@param ParseStruct Input parse structure.
|
||||
@param Value Return vlaue.
|
||||
@param Value Return value.
|
||||
|
||||
@retval return the action result.
|
||||
|
||||
|
@@ -810,7 +810,7 @@ TcgFindFeatureCallback(
|
||||
Get Feature code from the header.
|
||||
|
||||
@param DiscoveryHeader The discovery header.
|
||||
@param FeatureCode reutrn the Feature code.
|
||||
@param FeatureCode return the Feature code.
|
||||
@param FeatureSize return the Feature size.
|
||||
|
||||
@retval return the Feature code data.
|
||||
|
@@ -11,7 +11,7 @@ SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
#include <Library/TcgStorageOpalLib.h>
|
||||
#include "TcgStorageOpalLibInternal.h"
|
||||
|
||||
#define OPAL_MSID_LENGHT 128
|
||||
#define OPAL_MSID_LENGTH 128
|
||||
|
||||
/**
|
||||
Creates a session with OPAL_UID_ADMIN_SP as OPAL_ADMIN_SP_PSID_AUTHORITY, then reverts device using Admin SP Revert method.
|
||||
@@ -1095,7 +1095,7 @@ GetRevertTimeOut (
|
||||
OPAL_DISK_SUPPORT_ATTRIBUTE SupportedAttributes;
|
||||
UINT16 BaseComId;
|
||||
UINT32 MsidLength;
|
||||
UINT8 Msid[OPAL_MSID_LENGHT];
|
||||
UINT8 Msid[OPAL_MSID_LENGTH];
|
||||
UINT32 RemovalMechanishLists[ResearvedMechanism];
|
||||
UINT8 ActiveDataRemovalMechanism;
|
||||
|
||||
@@ -1104,7 +1104,7 @@ GetRevertTimeOut (
|
||||
return 0;
|
||||
}
|
||||
|
||||
TcgResult = OpalUtilGetMsid (Session, Msid, OPAL_MSID_LENGHT, &MsidLength);
|
||||
TcgResult = OpalUtilGetMsid (Session, Msid, OPAL_MSID_LENGTH, &MsidLength);
|
||||
if (TcgResult != TcgResultSuccess) {
|
||||
return 0;
|
||||
}
|
||||
|
@@ -218,7 +218,7 @@ Tpm12NvWriteValue (
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
DEBUG ((DEBUG_INFO, "Tpm12NvWritedValue - ReturnCode = %x\n", SwapBytes32 (Response.returnCode)));
|
||||
DEBUG ((DEBUG_INFO, "Tpm12NvWriteValue - ReturnCode = %x\n", SwapBytes32 (Response.returnCode)));
|
||||
switch (SwapBytes32 (Response.returnCode)) {
|
||||
case TPM_SUCCESS:
|
||||
return EFI_SUCCESS;
|
||||
|
@@ -125,7 +125,7 @@ Tpm12TisPcWaitRegisterBits (
|
||||
in the time of default TIS_TIMEOUT_D.
|
||||
|
||||
@param[in] TisReg Pointer to TIS register.
|
||||
@param[out] BurstCount Pointer to a buffer to store the got BurstConut.
|
||||
@param[out] BurstCount Pointer to a buffer to store the got BurstCount.
|
||||
|
||||
@retval EFI_SUCCESS Get BurstCount.
|
||||
@retval EFI_INVALID_PARAMETER TisReg is NULL or BurstCount is NULL.
|
||||
|
@@ -53,7 +53,7 @@ typedef struct {
|
||||
NOTE:
|
||||
To simplify this function, leave returned CapabilityData for caller to unpack since there are
|
||||
many capability categories and only few categories will be used in firmware. It means the caller
|
||||
need swap the byte order for the feilds in CapabilityData.
|
||||
need swap the byte order for the fields in CapabilityData.
|
||||
|
||||
@param[in] Capability Group selection; determines the format of the response.
|
||||
@param[in] Property Further definition of information.
|
||||
@@ -119,7 +119,7 @@ Tpm2GetCapability (
|
||||
//
|
||||
*MoreData = RecvBuffer.MoreData;
|
||||
//
|
||||
// Does not unpack all possiable property here, the caller should unpack it and note the byte order.
|
||||
// Does not unpack all possible property here, the caller should unpack it and note the byte order.
|
||||
//
|
||||
CopyMem (CapabilityData, &RecvBuffer.CapabilityData, RecvBufferSize - sizeof (TPM2_RESPONSE_HEADER) - sizeof (UINT8));
|
||||
|
||||
|
@@ -435,7 +435,7 @@ Tpm2HierarchyChangeAuth (
|
||||
WriteUnaligned16 ((UINT16 *)Buffer, SwapBytes16(NewAuth->size));
|
||||
Buffer += sizeof(UINT16);
|
||||
|
||||
// New Authorizeation
|
||||
// New Authorization
|
||||
CopyMem(Buffer, NewAuth->buffer, NewAuth->size);
|
||||
Buffer += NewAuth->size;
|
||||
|
||||
|
@@ -137,7 +137,7 @@ Tpm2RegisterTpm2DeviceLib (
|
||||
/**
|
||||
The function caches current active TPM interface type.
|
||||
|
||||
@retval EFI_SUCCESS DTPM2.0 instance is registered, or system dose not surpport registr DTPM2.0 instance
|
||||
@retval EFI_SUCCESS DTPM2.0 instance is registered, or system does not support register DTPM2.0 instance
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
|
@@ -93,7 +93,7 @@ TPM2_DEVICE_INTERFACE mDTpm2InternalTpm2Device = {
|
||||
/**
|
||||
The function register DTPM2.0 instance and caches current active TPM interface type.
|
||||
|
||||
@retval EFI_SUCCESS DTPM2.0 instance is registered, or system dose not surpport registr DTPM2.0 instance
|
||||
@retval EFI_SUCCESS DTPM2.0 instance is registered, or system does not support register DTPM2.0 instance
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFIAPI
|
||||
|
@@ -327,7 +327,7 @@ PtpCrbTpmCommand (
|
||||
|
||||
GoReady_Exit:
|
||||
//
|
||||
// Goto Ready State if command is completed succesfully and TPM support IdleBypass
|
||||
// Goto Ready State if command is completed successfully and TPM support IdleBypass
|
||||
// If not supported. flow down to GoIdle
|
||||
//
|
||||
if (PcdGet8(PcdCRBIdleByPass) == 1) {
|
||||
@@ -347,7 +347,7 @@ GoIdle_Exit:
|
||||
MmioWrite32((UINTN)&CrbReg->CrbControlRequest, PTP_CRB_CONTROL_AREA_REQUEST_GO_IDLE);
|
||||
|
||||
//
|
||||
// Only enforce Idle state transition if execution fails when CRBIndleBypass==1
|
||||
// Only enforce Idle state transition if execution fails when CRBIdleBypass==1
|
||||
// Leave regular Idle delay at the beginning of next command execution
|
||||
//
|
||||
if (PcdGet8(PcdCRBIdleByPass) == 1){
|
||||
|
@@ -81,7 +81,7 @@ TisPcWaitRegisterBits (
|
||||
in the time of default TIS_TIMEOUT_D.
|
||||
|
||||
@param[in] TisReg Pointer to TIS register.
|
||||
@param[out] BurstCount Pointer to a buffer to store the got BurstConut.
|
||||
@param[out] BurstCount Pointer to a buffer to store the got BurstCount.
|
||||
|
||||
@retval EFI_SUCCESS Get BurstCount.
|
||||
@retval EFI_INVALID_PARAMETER TisReg is NULL or BurstCount is NULL.
|
||||
@@ -303,7 +303,7 @@ Tpm2TisTpmCommand (
|
||||
TIS_TIMEOUT_B
|
||||
);
|
||||
//
|
||||
// Do not clear CANCEL bit here bicoz Writes of 0 to this bit are ignored
|
||||
// Do not clear CANCEL bit here because Writes of 0 to this bit are ignored
|
||||
//
|
||||
if (EFI_ERROR (Status)) {
|
||||
//
|
||||
|
@@ -1,5 +1,5 @@
|
||||
/** @file
|
||||
The intenal header file for TpmCommLib.
|
||||
The internal header file for TpmCommLib.
|
||||
|
||||
Copyright (c) 2006 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
SPDX-License-Identifier: BSD-2-Clause-Patent
|
||||
|
@@ -64,7 +64,7 @@ TisPcWaitRegisterBits (
|
||||
in the time of default TIS_TIMEOUT_D.
|
||||
|
||||
@param[in] TisReg Pointer to TIS register.
|
||||
@param[out] BurstCount Pointer to a buffer to store the got BurstConut.
|
||||
@param[out] BurstCount Pointer to a buffer to store the got BurstCount.
|
||||
|
||||
@retval EFI_SUCCESS Get BurstCount.
|
||||
@retval EFI_INVALID_PARAMETER TisReg is NULL or BurstCount is NULL.
|
||||
|
Reference in New Issue
Block a user