diff --git a/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceLib.c b/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceLib.c index 7cd3ddfc1b..ba1abe9e08 100644 --- a/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceLib.c +++ b/SecurityPkg/Library/DxeTcgPhysicalPresenceLib/DxeTcgPhysicalPresenceLib.c @@ -185,7 +185,7 @@ TpmPhysicalPresence ( @param[in] TcgProtocol EFI TCG Protocol instance. @param[in] Ordinal TPM command code. @param[in] AdditionalParameterSize Additional parameter size. - @param[in] AdditionalParameters Pointer to the Additional paramaters. + @param[in] AdditionalParameters Pointer to the Additional parameters. @retval TCG_PP_OPERATION_RESPONSE_BIOS_FAILURE Error occurred during sending command to TPM or receiving response from TPM. diff --git a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c index cabc0c6c75..f0e95e5ec0 100644 --- a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c +++ b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c @@ -478,7 +478,7 @@ DxeTpm2MeasureBootHandler ( Status = gBS->LocateDevicePath (&gEfiBlockIoProtocolGuid, &DevicePathNode, &Handle); if (!EFI_ERROR (Status) && !mTcg2MeasureGptTableFlag) { // - // Find the gpt partion on the given devicepath + // Find the gpt partition on the given devicepath // DevicePathNode = OrigDevicePathNode; ASSERT (DevicePathNode != NULL); diff --git a/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c b/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c index dfaaa0f0b3..d499371e7a 100644 --- a/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c +++ b/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c @@ -776,7 +776,7 @@ DxeTpmMeasureBootHandler ( Status = gBS->LocateDevicePath (&gEfiBlockIoProtocolGuid, &DevicePathNode, &Handle); if (!EFI_ERROR (Status) && !mMeasureGptTableFlag) { // - // Find the gpt partion on the given devicepath + // Find the gpt partition on the given devicepath // DevicePathNode = OrigDevicePathNode; ASSERT (DevicePathNode != NULL); diff --git a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.c b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.c index a7cb05849c..7a0f61efbb 100644 --- a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.c +++ b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterDxe.c @@ -1,6 +1,6 @@ /** @file This library is BaseCrypto router. It will redirect hash request to each individual - hash handler registerd, such as SHA1, SHA256. + hash handler registered, such as SHA1, SHA256. Platform can use PcdTpm2HashMask to mask some hash engines. Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.
diff --git a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.c b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.c index d31c8b0782..42cb562f67 100644 --- a/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.c +++ b/SecurityPkg/Library/HashLibBaseCryptoRouter/HashLibBaseCryptoRouterPei.c @@ -1,6 +1,6 @@ /** @file This library is BaseCrypto router. It will redirect hash request to each individual - hash handler registerd, such as SHA1, SHA256. + hash handler registered, such as SHA1, SHA256. Platform can use PcdTpm2HashMask to mask some hash engines. Copyright (c) 2013 - 2018, Intel Corporation. All rights reserved.
diff --git a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf index 9ae597d381..85607aa645 100644 --- a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf +++ b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.inf @@ -1,5 +1,5 @@ ## @file -# NULL platform secure library instance that alway returns TRUE for a user physical present +# NULL platform secure library instance that always returns TRUE for a user physical present # # NULL PlatformSecureLib instance does NOT really detect whether a physical present # user exists but returns TRUE directly. This instance can be used to verify security diff --git a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.uni b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.uni index e5c9d1020f..860b8cbb5a 100644 --- a/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.uni +++ b/SecurityPkg/Library/PlatformSecureLibNull/PlatformSecureLibNull.uni @@ -1,5 +1,5 @@ // /** @file -// NULL platform secure library instance that alway returns TRUE for a user physical present +// NULL platform secure library instance that always returns TRUE for a user physical present // // NULL PlatformSecureLib instance does NOT really detect whether a physical present // user exists but returns TRUE directly. This instance can be used to verify security diff --git a/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c b/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c index a96862f937..42282e33a9 100644 --- a/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c +++ b/SecurityPkg/Pkcs7Verify/Pkcs7VerifyDxe/Pkcs7VerifyDxe.c @@ -519,7 +519,7 @@ IsValidTimestamp ( @param[in] SignedData Pointer to buffer containing ASN.1 DER-encoded PKCS7 signature. @param[in] SignedDataSize The size of SignedData buffer in bytes. - @param[in] InHash Pointer to the buffer containing the hash of the mesage data + @param[in] InHash Pointer to the buffer containing the hash of the message data previously signed and to be verified. @param[in] InHashSize The size of InHash buffer in bytes. @param[in] RevokedDb Pointer to a list of pointers to EFI_SIGNATURE_LIST diff --git a/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c b/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c index 90e54a89ce..13d3dbd0bf 100644 --- a/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c +++ b/SecurityPkg/RandomNumberGenerator/RngDxe/RngDxe.c @@ -4,7 +4,7 @@ The driver will use the new RDRAND instruction to produce high-quality, high-performance entropy and random number. - RNG Algoritnms defined in UEFI 2.4: + RNG Algorithms defined in UEFI 2.4: - EFI_RNG_ALGORITHM_SP800_90_CTR_256_GUID - Supported (RDRAND implements a hardware NIST SP800-90 AES-CTR-256 based DRBG) - EFI_RNG_ALGORITHM_RAW - Supported