You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
// CompoundError is an interface for accessing wrapped errors from an error type that
95
95
// wraps more than one error. The [RunChecks] and [RunChecksContext.Run] APIs may return
96
96
// multiple errors that are wrapped by a type implementing this interface, as an
97
-
// alternative to aborting early and returning individual errors as the occur. This is
97
+
// alternative to aborting early and returning individual errors as they occur. This is
98
98
// to ensure as much information is gathered as possible.
99
99
typeCompoundErrorinterface {
100
100
Unwrap() []error
@@ -185,7 +185,7 @@ func (e *EFIVariableAccessError) Unwrap() error {
185
185
var (
186
186
// ErrSystemNotEFI is returned unwrapped from RunChecks if the current host
187
187
// system does not appear to be an EFI system.
188
-
ErrSystemNotEFI=errors.New("host system is not a EFI system")
188
+
ErrSystemNotEFI=errors.New("host system is not an EFI system")
189
189
)
190
190
191
191
// Errors related to checking platform firmware protections.
@@ -263,7 +263,7 @@ var (
263
263
264
264
// ErrTPMStartupLocalityNotProtected is returned wrapped in HostSecurityError if access to
265
265
// the TPM's startup locality is available to platform firmware or privileged code. This
266
-
// means that it's not possible to provide a mitigation against reseet attacks (see the
266
+
// means that it's not possible to provide a mitigation against reset attacks (see the
267
267
// description of DiscreteTPMDetected). This error is only relevant for discrete TPMs.
268
268
// It can be permitted by passing the PermitNoDiscreteTPMResetMitigation flag to RunChecks.
269
269
ErrTPMStartupLocalityNotProtected=errors.New("access to the discrete TPM's startup locality is available to platform firmware and privileged OS code, preventing any mitigation against reset attacks")
@@ -331,7 +331,7 @@ var (
331
331
332
332
// ErrNoPCClientTPM is returned wrapped in TPM2DeviceError if a TPM2 device exists but
333
333
// it doesn't claim to be meet the requirements for PC-Client. Note that swtpm used
334
-
// by VM's don't behave correctly here, so we account for that instead of returning
334
+
// by VMs don't behave correctly here, so we account for that instead of returning
335
335
// an error.
336
336
ErrNoPCClientTPM=errors.New("TPM2 device is present but it is not a PC-Client TPM")
337
337
@@ -344,7 +344,7 @@ var (
344
344
// ErrTPMFailure is returned wrapped in TPM2DeviceError is the TPM device is in
345
345
// failure mode. A TPM device in failure mode can only execute commands to obtain
346
346
// test results, or fetch a limited set of permanent properties to determine the
347
-
// manufactuer, vendor name or firmware version. Resetting a device in failure mode
347
+
// manufacturer, vendor name or firmware version. Resetting a device in failure mode
348
348
// may clear it but it's possible that the failure may occur again during the next
349
349
// boot cycle, in which case, it's likely that there is a fault somewhere with the
350
350
// TPM's hardware (in the case of dTPMs) or the TPM's firmware.
@@ -507,7 +507,7 @@ func (e *MeasuredBootError) Unwrap() error {
507
507
// cannot be used to generate profiles for PCR 0.
508
508
//
509
509
// If an error occurs, this error will be returned wrapped in
510
-
// [NoSuitablePCRAlgorithmError] if the PermitNolatformFirmwareProfileSupport flag
510
+
// [NoSuitablePCRAlgorithmError] if the PermitNoPlatformFirmwareProfileSupport flag
511
511
// is not supplied to [RunChecks].
512
512
typePlatformFirmwarePCRErrorstruct {
513
513
errerror
@@ -523,7 +523,7 @@ func (e *PlatformFirmwarePCRError) Unwrap() error {
523
523
524
524
// Errors related to platform config PCR checks
525
525
526
-
// PlatformConfigPCR may be returned if the PCR 1 value is inconsistent with the
526
+
// PlatformConfigPCRError may be returned if the PCR 1 value is inconsistent with the
527
527
// value reconstructed from the TCG log.
528
528
//
529
529
// This error will currently always be returned as a warning in [CheckResult] if
@@ -553,7 +553,7 @@ func (e *PlatformConfigPCRError) Unwrap() error {
553
553
554
554
// Errors related to drivers and apps PCR checks.
555
555
556
-
// DriversAndAppsError may be returned if the PCR 2 value is inconsistent with the
556
+
// DriversAndAppsPCRError may be returned if the PCR 2 value is inconsistent with the
557
557
// value reconstructed from the TCG log.
558
558
//
559
559
// If an error occurs, this error will be returned as a warning in [CheckResult] if
@@ -631,7 +631,7 @@ func (e *DriversAndAppsConfigPCRError) Unwrap() error {
631
631
// - EV_EFI_BOOT_SERVICES_APPLICATION events that occur before secure boot policy
632
632
// is measured.
633
633
// - Unexpected event types before the OS-present phase.
634
-
// - The presence of system prepartion apps when the firmware indicates they are
634
+
// - The presence of system preparation apps when the firmware indicates they are
635
635
// not supported.
636
636
// - EV_EFI_BOOT_SERVICES_APPLICATION events that occur in the OS-present phase
637
637
// but aren't associated with the OS launch or Absolute.
@@ -823,7 +823,7 @@ var (
823
823
// indicates that pre-OS components were authenticated using Authenticode digests rather than a
824
824
// X.509 certificate. This makes PCR7 inherently fragile with regards to firmware updates because db
825
825
// has to be changed accordingly each time.
826
-
// This can be bypassed by supplying the PermitPreOSVeriricationUsingDigests flag to RunChecks, in
826
+
// This can be bypassed by supplying the PermitPreOSVerificationUsingDigests flag to RunChecks, in
827
827
// which case, the error is returned as a warning via CheckResult.
828
828
//
829
829
// The check for pre-OS components authenticated using a digest may not execute if a
0 commit comments