summaryrefslogtreecommitdiff
path: root/src/security
diff options
context:
space:
mode:
Diffstat (limited to 'src/security')
-rw-r--r--src/security/intel/cbnt/logging.c2
-rw-r--r--src/security/intel/stm/SmmStm.c2
-rw-r--r--src/security/intel/txt/common.c2
-rw-r--r--src/security/memory/memory_clear.c2
-rw-r--r--src/security/tpm/tspi.h2
-rw-r--r--src/security/tpm/tss/tcg-2.0/tss.c4
-rw-r--r--src/security/tpm/tss/tcg-2.0/tss_marshaling.h2
7 files changed, 8 insertions, 8 deletions
diff --git a/src/security/intel/cbnt/logging.c b/src/security/intel/cbnt/logging.c
index 55354b4ce8..514e5ac666 100644
--- a/src/security/intel/cbnt/logging.c
+++ b/src/security/intel/cbnt/logging.c
@@ -123,7 +123,7 @@ void intel_cbnt_log_registers(void)
LOG("SACM INFO MSR (0x13A) raw: 0x%016llx\n", acm_info.raw);
LOG(" NEM status: %u\n", acm_info.nem_enabled);
LOG(" TPM type: %s\n", tpm_type[acm_info.tpm_type]);
- LOG(" TPM succes: %u\n", acm_info.tpm_success);
+ LOG(" TPM success: %u\n", acm_info.tpm_success);
LOG(" FACB: %u\n", acm_info.facb);
LOG(" measured boot: %u\n", acm_info.measured_boot);
LOG(" verified boot: %u\n", acm_info.verified_boot);
diff --git a/src/security/intel/stm/SmmStm.c b/src/security/intel/stm/SmmStm.c
index e2fab0c063..1ebe77d2f1 100644
--- a/src/security/intel/stm/SmmStm.c
+++ b/src/security/intel/stm/SmmStm.c
@@ -668,7 +668,7 @@ bool stm_check_stm_image(void *stm_image, uint32_t stm_imagesize)
/*
* This function return BIOS STM resource.
* Produced by SmmStm.
- * Comsumed by SmmMpService when Init.
+ * Consumed by SmmMpService when Init.
*
* @return BIOS STM resource
*/
diff --git a/src/security/intel/txt/common.c b/src/security/intel/txt/common.c
index 2b7d92627c..e3e2f5c469 100644
--- a/src/security/intel/txt/common.c
+++ b/src/security/intel/txt/common.c
@@ -150,7 +150,7 @@ static struct acm_info_table *find_info_table(const void *ptr)
}
/**
- * Validate that the provided ACM is useable on this platform.
+ * Validate that the provided ACM is usable on this platform.
*/
static int validate_acm(const void *ptr)
{
diff --git a/src/security/memory/memory_clear.c b/src/security/memory/memory_clear.c
index 557125dcf8..03c6f8bd75 100644
--- a/src/security/memory/memory_clear.c
+++ b/src/security/memory/memory_clear.c
@@ -98,7 +98,7 @@ static void clear_memory(void *unused)
__func__, (void *)pgtbl, (void *)vmem_addr);
}
- /* Now clear all useable DRAM */
+ /* Now clear all usable DRAM */
memranges_each_entry(r, &mem) {
if (range_entry_tag(r) != BM_MEM_RAM)
continue;
diff --git a/src/security/tpm/tspi.h b/src/security/tpm/tspi.h
index e040d80611..ed642c33b5 100644
--- a/src/security/tpm/tspi.h
+++ b/src/security/tpm/tspi.h
@@ -55,7 +55,7 @@ uint32_t tpm_extend_pcr(int pcr, enum vb2_hash_algorithm digest_algo,
const char *name);
/**
- * Issue a TPM_Clear and reenable/reactivate the TPM.
+ * Issue a TPM_Clear and re-enable/reactivate the TPM.
* @return TPM_SUCCESS on success. If not a tpm error is returned
*/
uint32_t tpm_clear_and_reenable(void);
diff --git a/src/security/tpm/tss/tcg-2.0/tss.c b/src/security/tpm/tss/tcg-2.0/tss.c
index f464fe19e7..cfa533b880 100644
--- a/src/security/tpm/tss/tcg-2.0/tss.c
+++ b/src/security/tpm/tss/tcg-2.0/tss.c
@@ -273,7 +273,7 @@ uint32_t tlcl_self_test_full(void)
uint32_t tlcl_lock_nv_write(uint32_t index)
{
struct tpm2_response *response;
- /* TPM Wll reject attempts to write at non-defined index. */
+ /* TPM Will reject attempts to write at non-defined index. */
struct tpm2_nv_write_lock_cmd nv_wl = {
.nvIndex = HR_NV_INDEX + index,
};
@@ -372,7 +372,7 @@ uint32_t tlcl_define_space(uint32_t space_index, size_t space_size,
if (!response)
return TPM_E_NO_DEVICE;
- /* Map TPM2 retrun codes into common vboot represenation. */
+ /* Map TPM2 return codes into common vboot representation. */
switch (response->hdr.tpm_code) {
case TPM2_RC_SUCCESS:
return TPM_SUCCESS;
diff --git a/src/security/tpm/tss/tcg-2.0/tss_marshaling.h b/src/security/tpm/tss/tcg-2.0/tss_marshaling.h
index ae0b7fdca5..3ae48eb484 100644
--- a/src/security/tpm/tss/tcg-2.0/tss_marshaling.h
+++ b/src/security/tpm/tss/tcg-2.0/tss_marshaling.h
@@ -28,7 +28,7 @@ int tpm_marshal_command(TPM_CC command, const void *tpm_command_body,
* tpm_unmarshal_response
*
* Given a buffer received from the TPM in response to a certain command,
- * deserialize the buffer into the expeced response structure.
+ * deserialize the buffer into the expected response structure.
*
* struct tpm2_response is a union of all possible responses.
*