mirror of
https://github.com/systemd/systemd
synced 2024-10-06 16:21:34 +00:00
tree-wide: fix typo
This commit is contained in:
parent
d0f69be793
commit
bcf04e9b27
2
TODO
2
TODO
|
@ -159,7 +159,7 @@ Features:
|
|||
these signatures into one object, and then include the result in the UKI.
|
||||
Then, if you bind a LUKS volume to public key X it really only can be
|
||||
unlocked during early boot, and you bind a LUKS volume to public key Y it
|
||||
realy only can be unlocked during later boot, and so on.
|
||||
really only can be unlocked during later boot, and so on.
|
||||
|
||||
* dissection policy should enforce that unlocking can only take place by
|
||||
certain means, i.e. only via pw, only via tpm2, or only via fido, or a
|
||||
|
|
|
@ -159,7 +159,7 @@ static EFI_STATUS install_security_override_one(EFI_GUID guid, SecurityOverride
|
|||
|
||||
/* This replaces the platform provided security arch protocols (defined in the UEFI Platform Initialization
|
||||
* Specification) with the provided override instances. If not running in secure boot or the protocols are
|
||||
* not available nothing happens. The override instances are provided with the neccessary info to undo this
|
||||
* not available nothing happens. The override instances are provided with the necessary info to undo this
|
||||
* in uninstall_security_override(). */
|
||||
void install_security_override(SecurityOverride *override, SecurityOverride *override2) {
|
||||
assert(override);
|
||||
|
|
Loading…
Reference in a new issue