mirror of https://github.com/acidanthera/audk.git
SecurityPkg: Fix typo.
Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Shumin Qiu <shumin.qiu@intel.com> Reviewed-by: Guo Dong <guo.dong@intel.com> git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@17047 6f19259b-4bc3-4df7-8a09-765794883524
This commit is contained in:
parent
12e4c407ec
commit
69f8bb5288
|
@ -270,7 +270,7 @@ GetImageType (
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Caculate hash of Pe/Coff image based on the authenticode image hashing in
|
Calculate hash of Pe/Coff image based on the authenticode image hashing in
|
||||||
PE/COFF Specification 8.0 Appendix A
|
PE/COFF Specification 8.0 Appendix A
|
||||||
|
|
||||||
Caution: This function may receive untrusted input.
|
Caution: This function may receive untrusted input.
|
||||||
|
@ -609,7 +609,7 @@ Done:
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Recognize the Hash algorithm in PE/COFF Authenticode and caculate hash of
|
Recognize the Hash algorithm in PE/COFF Authenticode and calculate hash of
|
||||||
Pe/Coff image based on the authenticode image hashing in PE/COFF Specification
|
Pe/Coff image based on the authenticode image hashing in PE/COFF Specification
|
||||||
8.0 Appendix A
|
8.0 Appendix A
|
||||||
|
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
/** @file
|
/** @file
|
||||||
HII Config Access protocol implementation of SecureBoot configuration module.
|
HII Config Access protocol implementation of SecureBoot configuration module.
|
||||||
|
|
||||||
Copyright (c) 2011 - 2014, Intel Corporation. All rights reserved.<BR>
|
Copyright (c) 2011 - 2015, Intel Corporation. All rights reserved.<BR>
|
||||||
This program and the accompanying materials
|
This program and the accompanying materials
|
||||||
are licensed and made available under the terms and conditions of the BSD License
|
are licensed and made available under the terms and conditions of the BSD License
|
||||||
which accompanies this distribution. The full text of the license may be found at
|
which accompanies this distribution. The full text of the license may be found at
|
||||||
|
@ -1924,7 +1924,7 @@ Done:
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Recognize the Hash algorithm in PE/COFF Authenticode and caculate hash of
|
Recognize the Hash algorithm in PE/COFF Authenticode and calculate hash of
|
||||||
Pe/Coff image based on the authenticated image hashing in PE/COFF Specification
|
Pe/Coff image based on the authenticated image hashing in PE/COFF Specification
|
||||||
8.0 Appendix A
|
8.0 Appendix A
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue