summaryrefslogtreecommitdiff
path: root/NetworkPkg/IpSecDxe/IpSecCryptIo.c
diff options
context:
space:
mode:
authorGary Lin <glin@suse.com>2016-10-19 15:01:28 +0800
committerFu Siyuan <siyuan.fu@intel.com>2016-10-26 08:50:03 +0800
commitd1c85a17fa8623e3fe60a6fe398f01e46d427a96 (patch)
tree0b7f82f6c7c21487ffdff032520513dc8fcc345b /NetworkPkg/IpSecDxe/IpSecCryptIo.c
parent74c6a1031d36430f99ca7799520f960b4a66e7fe (diff)
downloadedk2-platforms-d1c85a17fa8623e3fe60a6fe398f01e46d427a96.tar.xz
NetworkPkg: Fix typos in comments
- assocated -> associated - malformated -> malformatted - mal-formated -> mal-formatted - formated -> formatted - octects -> octets - responsiblity -> responsibility - enought -> enough - immediatly -> immediately - integar -> integer - Alogrithem -> Algorithm - Initializeion -> Initialization - primelenght -> primelength - Vlaue -> Value - perfoms -> performs - randome -> random - verifed -> verified - finallization -> finalization - Intializes -> Initializes - specifed -> specified - if -> If - Decrption -> Decryption - Autahentication -> Authentication - informatino -> information - alogrithm -> algorithm - Authenticaion -> Authentication - Alogrithem -> Algorithm - containning -> containing - paramter -> parameter Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Gary Lin <glin@suse.com> Reviewed-By: Siyuan Fu <siyuan.fu@intel.com> Reviewed-By: Jiaxin Wu <jiaxin.wu@intel.com>
Diffstat (limited to 'NetworkPkg/IpSecDxe/IpSecCryptIo.c')
-rw-r--r--NetworkPkg/IpSecDxe/IpSecCryptIo.c50
1 files changed, 25 insertions, 25 deletions
diff --git a/NetworkPkg/IpSecDxe/IpSecCryptIo.c b/NetworkPkg/IpSecDxe/IpSecCryptIo.c
index dca44231be..31fa4fb447 100644
--- a/NetworkPkg/IpSecDxe/IpSecCryptIo.c
+++ b/NetworkPkg/IpSecDxe/IpSecCryptIo.c
@@ -45,7 +45,7 @@ GLOBAL_REMOVE_IF_UNREFERENCED HASH_ALGORITHM mIpsecHashAlgorithmList[IPSEC_HASH_
BOOLEAN mInitialRandomSeed = FALSE;
/**
- Get the block size of specified encryption alogrithm.
+ Get the block size of specified encryption algorithm.
@param[in] AlgorithmId The encryption algorithm ID.
@@ -69,7 +69,7 @@ IpSecGetEncryptBlockSize (
}
/**
- Get the key length of the specified encryption alogrithm.
+ Get the key length of the specified encryption algorithm.
@param[in] AlgorithmId The encryption algorithm ID.
@@ -93,7 +93,7 @@ IpSecGetEncryptKeyLength (
}
/**
- Get the IV size of the specified encryption alogrithm.
+ Get the IV size of the specified encryption algorithm.
@param[in] AlgorithmId The encryption algorithm ID.
@@ -144,7 +144,7 @@ IpSecGetHmacDigestLength (
}
/**
- Get the ICV size of the specified Authenticaion alogrithm.
+ Get the ICV size of the specified Authenticaion algorithm.
@param[in] AlgorithmId The Authentication algorithm ID.
@@ -191,7 +191,7 @@ IpSecGenerateIv (
}
/**
- Get index of the specified encryption alogrithm from the mIpsecEncryptAlgorithemList.
+ Get index of the specified encryption algorithm from the mIpsecEncryptAlgorithmList.
@param[in] AlgorithmId The encryption algorithm ID.
@@ -215,7 +215,7 @@ IpSecGetIndexFromEncList (
}
/**
- Get index of the specified encryption alogrithm from the mIpsecAuthAlgorithemList.
+ Get index of the specified encryption algorithm from the mIpsecAuthAlgorithmList.
@param[in] AlgorithmId The encryption algorithm ID.
@@ -245,14 +245,14 @@ IpSecGetIndexFromAuthList (
Encrypt the buffer.
This function calls relevant encryption interface from CryptoLib according to
- the input alogrithm ID. The InData should be multiple of block size. This function
+ the input algorithm ID. The InData should be multiple of block size. This function
doesn't perform the padding. If it has the Ivec data, the length of it should be
same with the block size. The block size is different from the different algorithm.
- @param[in] AlgorithmId The Alogrithem identification defined in RFC.
+ @param[in] AlgorithmId The Algorithm identification defined in RFC.
@param[in] Key Pointer to the buffer containing encrypting key.
@param[in] KeyBits The length of the key in bits.
- @param[in] Ivec Point to the buffer containning the Initializeion
+ @param[in] Ivec Point to the buffer containing the Initialization
Vector (IV) data.
@param[in] InData Point to the buffer containing the data to be
encrypted.
@@ -331,14 +331,14 @@ IpSecCryptoIoEncrypt (
Decrypts the buffer.
This function calls relevant Decryption interface from CryptoLib according to
- the input alogrithm ID. The InData should be multiple of block size. This function
+ the input algorithm ID. The InData should be multiple of block size. This function
doesn't perform the padding. If it has the Ivec data, the length of it should be
same with the block size. The block size is different from the different algorithm.
- @param[in] AlgorithmId The Alogrithem identification defined in RFC.
+ @param[in] AlgorithmId The Algorithm identification defined in RFC.
@param[in] Key Pointer to the buffer containing encrypting key.
@param[in] KeyBits The length of the key in bits.
- @param[in] Ivec Point to the buffer containning the Initializeion
+ @param[in] Ivec Point to the buffer containing the Initialization
Vector (IV) data.
@param[in] InData Point to the buffer containing the data to be
decrypted.
@@ -417,9 +417,9 @@ IpSecCryptoIoDecrypt (
Digests the Payload with key and store the result into the OutData.
This function calls relevant Hmac interface from CryptoLib according to
- the input alogrithm ID. It computes all datas from InDataFragment and output
+ the input algorithm ID. It computes all datas from InDataFragment and output
the result into the OutData buffer. If the OutDataSize is larger than the related
- HMAC alogrithm output size, return EFI_INVALID_PARAMETER.
+ HMAC algorithm output size, return EFI_INVALID_PARAMETER.
@param[in] AlgorithmId The authentication Identification.
@param[in] Key Pointer of the authentication key.
@@ -540,9 +540,9 @@ Exit:
Digests the Payload and store the result into the OutData.
This function calls relevant Hash interface from CryptoLib according to
- the input alogrithm ID. It computes all datas from InDataFragment and output
+ the input algorithm ID. It computes all datas from InDataFragment and output
the result into the OutData buffer. If the OutDataSize is larger than the related
- Hash alogrithm output size, return EFI_INVALID_PARAMETER.
+ Hash algorithm output size, return EFI_INVALID_PARAMETER.
@param[in] AlgorithmId The authentication Identification.
@param[in] InDataFragment A list contains all data to be authenticated.
@@ -657,14 +657,14 @@ Exit:
Generates the Diffie-Hellman public key.
This function first initiate a DHContext, then call the DhSetParameter() to set
- the prime and primelenght, at end call the DhGenerateKey() to generates random
+ the prime and primelength, at end call the DhGenerateKey() to generates random
secret exponent, and computes the public key. The output returned via parameter
PublicKey and PublicKeySize. DH context is updated accordingly. If the PublicKey
buffer is too small to hold the public key, EFI_INVALID_PARAMETER is returned
and PublicKeySize is set to the required buffer size to obtain the public key.
@param[in, out] DhContext Pointer to the DH context.
- @param[in] Generator Vlaue of generator.
+ @param[in] Generator Value of generator.
@param[in] PrimeLength Length in bits of prime to be generated.
@param[in] Prime Pointer to the buffer to receive the generated
prime number.
@@ -673,7 +673,7 @@ Exit:
For out, the size of data returned in PublicKey
buffer in bytes.
- @retval EFI_SUCCESS The operation perfoms successfully.
+ @retval EFI_SUCCESS The operation performs successfully.
@retval Otherwise The operation is failed.
**/
@@ -725,7 +725,7 @@ Exit:
For out, the size of data returned in Key
buffer in bytes.
- @retval EFI_SUCCESS The operation perfoms successfully.
+ @retval EFI_SUCCESS The operation performs successfully.
@retval Otherwise The operation is failed.
**/
@@ -750,7 +750,7 @@ IpSecCryptoIoDhComputeKey (
@param[in, out] DhContext Pointer to the DH context to be freed.
- @retval EFI_SUCCESS The operation perfoms successfully.
+ @retval EFI_SUCCESS The operation performs successfully.
@retval EFI_INVALID_PARAMETER The DhContext is NULL.
**/
@@ -773,9 +773,9 @@ IpSecCryptoIoFreeDh (
If the Random Generator wasn't initiated, initiate it first, then call RandomBytes.
@param[out] OutBuffer Pointer to buffer to receive random value.
- @param[in] Bytes Size of randome bytes to generate.
+ @param[in] Bytes Size of random bytes to generate.
- @retval EFI_SUCCESS The operation perfoms successfully.
+ @retval EFI_SUCCESS The operation performs successfully.
@retval Otherwise The operation is failed.
**/
@@ -869,9 +869,9 @@ IpSecCryptoIoAuthDataWithCertificate (
@param[in] CertLen The size of Certificate in bytes.
@param[in] InCa Pointer to the CA certificate
@param[in] CaLen The size of CA certificate in bytes.
- @param[in] InData Pointer to octect message hash to be checked.
+ @param[in] InData Pointer to octet message hash to be checked.
@param[in] InDataSize Size of the message hash in bytes.
- @param[in] Singnature The pointer to the RSA PKCS1-V1_5 signature to be verifed.
+ @param[in] Singnature The pointer to the RSA PKCS1-V1_5 signature to be verified.
@param[in] SigSize Size of signature in bytes.
@retval TRUE Valid signature encoded in PKCS1-v1_5.