summaryrefslogtreecommitdiff
path: root/src/security/tpm
diff options
context:
space:
mode:
authorMartin Roth <martin@coreboot.org>2021-10-01 14:37:30 -0600
committerMartin Roth <martinroth@google.com>2021-10-05 18:06:52 +0000
commit50863daef8ed75c0cb3dfd375e7622c898de5821 (patch)
treecbb2dea518524f8c9ce5edca5d57132ca9705086 /src/security/tpm
parent0949e739066c3509e05db2b9ed71cefaaa62205f (diff)
src/mainboard to src/security: Fix spelling errors
These issues were found and fixed by codespell, a useful tool for finding spelling errors. Signed-off-by: Martin Roth <martin@coreboot.org> Change-Id: Ie34003a9fdfe9f3b1b8ec0789aeca8b9435c9c79 Reviewed-on: https://review.coreboot.org/c/coreboot/+/58081 Tested-by: build bot (Jenkins) <no-reply@coreboot.org> Reviewed-by: Felix Held <felix-coreboot@felixheld.de> Reviewed-by: Angel Pons <th3fanbus@gmail.com>
Diffstat (limited to 'src/security/tpm')
-rw-r--r--src/security/tpm/tspi.h2
-rw-r--r--src/security/tpm/tss/tcg-2.0/tss.c4
-rw-r--r--src/security/tpm/tss/tcg-2.0/tss_marshaling.h2
3 files changed, 4 insertions, 4 deletions
diff --git a/src/security/tpm/tspi.h b/src/security/tpm/tspi.h
index e040d80611..ed642c33b5 100644
--- a/src/security/tpm/tspi.h
+++ b/src/security/tpm/tspi.h
@@ -55,7 +55,7 @@ uint32_t tpm_extend_pcr(int pcr, enum vb2_hash_algorithm digest_algo,
const char *name);
/**
- * Issue a TPM_Clear and reenable/reactivate the TPM.
+ * Issue a TPM_Clear and re-enable/reactivate the TPM.
* @return TPM_SUCCESS on success. If not a tpm error is returned
*/
uint32_t tpm_clear_and_reenable(void);
diff --git a/src/security/tpm/tss/tcg-2.0/tss.c b/src/security/tpm/tss/tcg-2.0/tss.c
index f464fe19e7..cfa533b880 100644
--- a/src/security/tpm/tss/tcg-2.0/tss.c
+++ b/src/security/tpm/tss/tcg-2.0/tss.c
@@ -273,7 +273,7 @@ uint32_t tlcl_self_test_full(void)
uint32_t tlcl_lock_nv_write(uint32_t index)
{
struct tpm2_response *response;
- /* TPM Wll reject attempts to write at non-defined index. */
+ /* TPM Will reject attempts to write at non-defined index. */
struct tpm2_nv_write_lock_cmd nv_wl = {
.nvIndex = HR_NV_INDEX + index,
};
@@ -372,7 +372,7 @@ uint32_t tlcl_define_space(uint32_t space_index, size_t space_size,
if (!response)
return TPM_E_NO_DEVICE;
- /* Map TPM2 retrun codes into common vboot represenation. */
+ /* Map TPM2 return codes into common vboot representation. */
switch (response->hdr.tpm_code) {
case TPM2_RC_SUCCESS:
return TPM_SUCCESS;
diff --git a/src/security/tpm/tss/tcg-2.0/tss_marshaling.h b/src/security/tpm/tss/tcg-2.0/tss_marshaling.h
index ae0b7fdca5..3ae48eb484 100644
--- a/src/security/tpm/tss/tcg-2.0/tss_marshaling.h
+++ b/src/security/tpm/tss/tcg-2.0/tss_marshaling.h
@@ -28,7 +28,7 @@ int tpm_marshal_command(TPM_CC command, const void *tpm_command_body,
* tpm_unmarshal_response
*
* Given a buffer received from the TPM in response to a certain command,
- * deserialize the buffer into the expeced response structure.
+ * deserialize the buffer into the expected response structure.
*
* struct tpm2_response is a union of all possible responses.
*