mirror of https://github.com/acidanthera/audk.git
SecurityPkg: Fix typos in comments
This patch fixes the following typos: - intialized -> initialized - TURE -> TRUE - successull -> successfully - hanlder -> handler - funciton -> function - Seperator -> Separator - Sumbit -> Submit Also convert EFI_D_ERROR to DEBUG_ERROR for some debug messages. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Gary Lin <glin@suse.com> Reviewed-by: Chao Zhang <chao.b.zhang@intel.com>
This commit is contained in:
parent
7c7453b5d6
commit
0ab475c9a1
|
@ -64,7 +64,7 @@ BOOLEAN
|
|||
|
||||
This function performs Hash digest on a data buffer of the specified size.
|
||||
It can be called multiple times to compute the digest of long or discontinuous data streams.
|
||||
Hash context should be already correctly intialized by HashInit(), and should not be finalized
|
||||
Hash context should be already correctly initialized by HashInit(), and should not be finalized
|
||||
by HashFinal(). Behavior with invalid context is undefined.
|
||||
|
||||
If HashContext is NULL, then return FALSE.
|
||||
|
|
|
@ -42,8 +42,8 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
|||
#define TCG_PP_OPERATION_RESPONSE_BIOS_FAILURE 0xFFFFFFF1
|
||||
|
||||
//
|
||||
// The return code for Sumbit TPM Request to Pre-OS Environment
|
||||
// and Sumbit TPM Request to Pre-OS Environment 2
|
||||
// The return code for Submit TPM Request to Pre-OS Environment
|
||||
// and Submit TPM Request to Pre-OS Environment 2
|
||||
//
|
||||
#define TCG_PP_SUBMIT_REQUEST_TO_PREOS_SUCCESS 0
|
||||
#define TCG_PP_SUBMIT_REQUEST_TO_PREOS_NOT_IMPLEMENTED 1
|
||||
|
|
|
@ -290,7 +290,7 @@ OpalGlobalLockingRangeGenKey(
|
|||
/**
|
||||
|
||||
The function updates the ReadLocked and WriteLocked columns of the Global Locking Range.
|
||||
This funciton is required for a user1 authority, since a user1 authority shall only have access to ReadLocked and WriteLocked columns
|
||||
This function is required for a user1 authority, since a user1 authority shall only have access to ReadLocked and WriteLocked columns
|
||||
(not ReadLockEnabled and WriteLockEnabled columns).
|
||||
|
||||
@param[in] LockingSpSession OPAL_SESSION with OPAL_UID_LOCKING_SP to generate key
|
||||
|
|
|
@ -45,8 +45,8 @@ WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
|||
#define TREE_PP_OPERATION_RESPONSE_BIOS_FAILURE 0xFFFFFFF1
|
||||
|
||||
//
|
||||
// The return code for Sumbit TPM Request to Pre-OS Environment
|
||||
// and Sumbit TPM Request to Pre-OS Environment 2
|
||||
// The return code for Submit TPM Request to Pre-OS Environment
|
||||
// and Submit TPM Request to Pre-OS Environment 2
|
||||
//
|
||||
#define TREE_PP_SUBMIT_REQUEST_TO_PREOS_SUCCESS 0
|
||||
#define TREE_PP_SUBMIT_REQUEST_TO_PREOS_NOT_IMPLEMENTED 1
|
||||
|
|
|
@ -469,7 +469,7 @@ Done:
|
|||
@param[in] DevicePath Points to device path.
|
||||
@param[in] AccessType The type of user access control.
|
||||
|
||||
@retval TURE The DevicePath is in the specified List.
|
||||
@retval TRUE The DevicePath is in the specified List.
|
||||
@retval FALSE The DevicePath is not in the specified List.
|
||||
|
||||
**/
|
||||
|
@ -512,7 +512,7 @@ IsDevicePathInList (
|
|||
|
||||
@param[in] DevicePath Points to device path
|
||||
|
||||
@retval TURE The image pointed by DevicePath is permitted to load.
|
||||
@retval TRUE The image pointed by DevicePath is permitted to load.
|
||||
@retval FALSE The image pointed by DevicePath is forbidden to load.
|
||||
|
||||
**/
|
||||
|
@ -545,7 +545,7 @@ VerifyDevicePath (
|
|||
|
||||
@param[in] DevicePath Points to device path.
|
||||
|
||||
@retval TURE The image pointed by DevicePath is a boot option.
|
||||
@retval TRUE The image pointed by DevicePath is a boot option.
|
||||
@retval FALSE The image pointed by DevicePath is not a boot option.
|
||||
|
||||
**/
|
||||
|
|
|
@ -59,7 +59,7 @@ CONST UINT8 mRsaE[] = { 0x01, 0x00, 0x01 };
|
|||
@param SectionAttribute The attribute of the input guided section.
|
||||
|
||||
@retval EFI_SUCCESS The size of destination buffer, the size of scratch buffer and
|
||||
the attribute of the input section are successull retrieved.
|
||||
the attribute of the input section are successfully retrieved.
|
||||
@retval EFI_INVALID_PARAMETER The GUID in InputSection does not match this instance guid.
|
||||
|
||||
**/
|
||||
|
|
|
@ -57,7 +57,7 @@ CONST UINT8 mRsaE[] = { 0x01, 0x00, 0x01 };
|
|||
@param SectionAttribute The attribute of the input guided section.
|
||||
|
||||
@retval EFI_SUCCESS The size of destination buffer, the size of scratch buffer and
|
||||
the attribute of the input section are successull retrieved.
|
||||
the attribute of the input section are successfully retrieved.
|
||||
@retval EFI_INVALID_PARAMETER The GUID in InputSection does not match this instance guid.
|
||||
|
||||
**/
|
||||
|
|
|
@ -881,7 +881,7 @@ TcgIsProtocolSupported(
|
|||
|
||||
@param Discovery
|
||||
|
||||
@retval TURE if lock, FALSE if not lock.
|
||||
@retval TRUE if lock, FALSE if not lock.
|
||||
**/
|
||||
BOOLEAN
|
||||
EFIAPI
|
||||
|
|
|
@ -1055,7 +1055,7 @@ OpalGlobalLockingRangeGenKey(
|
|||
/**
|
||||
|
||||
The function updates the ReadLocked and WriteLocked columns of the Global Locking Range.
|
||||
This funciton is required for a user1 authority, since a user1 authority shall only have access to ReadLocked and WriteLocked columns
|
||||
This function is required for a user1 authority, since a user1 authority shall only have access to ReadLocked and WriteLocked columns
|
||||
(not ReadLockEnabled and WriteLockEnabled columns).
|
||||
|
||||
@param[in] LockingSpSession OPAL_SESSION with OPAL_UID_LOCKING_SP to generate key
|
||||
|
|
|
@ -406,7 +406,7 @@ OpalDriverGetDeviceList(
|
|||
ReadyToBoot callback to send BlockSid command.
|
||||
|
||||
@param Event Pointer to this event
|
||||
@param Context Event hanlder private Data
|
||||
@param Context Event handler private Data
|
||||
|
||||
**/
|
||||
VOID
|
||||
|
|
|
@ -2073,7 +2073,7 @@ OnReadyToBoot (
|
|||
for (PcrIndex = 0; PcrIndex < 7; PcrIndex++) {
|
||||
Status = MeasureSeparatorEvent (PcrIndex);
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((EFI_D_ERROR, "Seperator Event not Measured. Error!\n"));
|
||||
DEBUG ((DEBUG_ERROR, "Separator Event not Measured. Error!\n"));
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
@ -1160,7 +1160,7 @@ OnReadyToBoot (
|
|||
for (PcrIndex = 0; PcrIndex < 8; PcrIndex++) {
|
||||
Status = MeasureSeparatorEvent (PcrIndex);
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((EFI_D_ERROR, "Seperator Event not Measured. Error!\n"));
|
||||
DEBUG ((DEBUG_ERROR, "Separator Event not Measured. Error!\n"));
|
||||
}
|
||||
}
|
||||
|
||||
|
|
Loading…
Reference in New Issue