TsaCertSize = SigList->SignatureSize - sizeof (EFI_GUID);\r
\r
//\r
- // Each TSA Certificate will normally be in a seperate EFI_SIGNATURE_LIST\r
+ // Each TSA Certificate will normally be in a separate EFI_SIGNATURE_LIST\r
// Leverage ImageTimestampVerify interface for Timestamp counterSignature Verification\r
//\r
if (ImageTimestampVerify (SignedData, SignedDataSize, TsaCert, TsaCertSize, &SigningTime)) {\r
/**\r
Check whether the PKCS7 signedData is revoked by verifying with the revoked\r
certificates database, and if the signedData is timestamped, the embedded timestamp\r
- couterSignature will be checked with the supplied timestamp database.\r
+ counterSignature will be checked with the supplied timestamp database.\r
\r
@param[in] SignedData Pointer to buffer containing ASN.1 DER-encoded PKCS7\r
signature.\r
Status = EFI_SUCCESS;\r
if (IsValidTimestamp (SignedData, SignedDataSize, TimeStampDb, &RevocationTime)) {\r
//\r
- // Use EFI_NOT_READY to identify the P7Data is not reovked, because the timestamping\r
- // occured prior to the time of certificate revocation.\r
+ // Use EFI_NOT_READY to identify the P7Data is not revoked, because the timestamping\r
+ // occurred prior to the time of certificate revocation.\r
//\r
Status = EFI_NOT_READY;\r
}\r
/**\r
Check whether the PKCS7 signedData is revoked by verifying with the revoked\r
certificates database, and if the signedData is timestamped, the embedded timestamp\r
- couterSignature will be checked with the supplied timestamp database.\r
+ counterSignature will be checked with the supplied timestamp database.\r
\r
@param[in] SignedData Pointer to buffer containing ASN.1 DER-encoded PKCS7\r
signature.\r
Status = EFI_SUCCESS;\r
if (IsValidTimestamp (SignedData, SignedDataSize, TimeStampDb, &RevocationTime)) {\r
//\r
- // Use EFI_NOT_READY to identify the P7Data is not reovked, because the timestamping\r
- // occured prior to the time of certificate revocation.\r
+ // Use EFI_NOT_READY to identify the P7Data is not revoked, because the timestamping\r
+ // occurred prior to the time of certificate revocation.\r
//\r
Status = EFI_NOT_READY;\r
}\r
);\r
if (!EFI_ERROR (Status)) {\r
//\r
- // The PKCS7 SignedData is reovked\r
+ // The PKCS7 SignedData is revoked\r
//\r
Status = EFI_SECURITY_VIOLATION;\r
goto _Exit;\r
\r
if (!EFI_ERROR (Status)) {\r
//\r
- // The PKCS7 SignedData is reovked\r
+ // The PKCS7 SignedData is revoked\r
//\r
return EFI_SECURITY_VIOLATION;\r
}\r