secure_fw: Fix spelling typos

Signed-off-by: Antonio de Angelis <antonio.deangelis@arm.com>
Change-Id: I58da18eb39f746c169e7e401d921b84e13d70345
diff --git a/secure_fw/partitions/CMakeLists.txt b/secure_fw/partitions/CMakeLists.txt
index da74b16..1cc21a8 100644
--- a/secure_fw/partitions/CMakeLists.txt
+++ b/secure_fw/partitions/CMakeLists.txt
@@ -34,7 +34,7 @@
 
 list(APPEND TEMP_TFM_EXTRA_PARTITION_PATHS ${TFM_EXTRA_PARTITION_PATHS})
 
-# Remove any duplicate entries to prevent same path appended twice in case of mulitiple runs
+# Remove any duplicate entries to prevent same path appended twice in case of multiple runs
 list(REMOVE_DUPLICATES TEMP_TFM_EXTRA_PARTITION_PATHS)
 
 if (TEMP_TFM_EXTRA_PARTITION_PATHS)
diff --git a/secure_fw/partitions/crypto/crypto_init.c b/secure_fw/partitions/crypto/crypto_init.c
index 031e3ba..46f913c 100644
--- a/secure_fw/partitions/crypto/crypto_init.c
+++ b/secure_fw/partitions/crypto/crypto_init.c
@@ -377,7 +377,7 @@
 }
 
 /*!
- * \defgroup init This group implements the partition initilisation
+ * \defgroup init This group implements the partition initialisation
  *                function to be called during TF-M boot, and the SFN
  *                servicing call to be called when a SFN request needs
  *                to be handled by the SPM. When built in IPC mode, the
diff --git a/secure_fw/partitions/firmware_update/bootloader/mcuboot/tfm_mcuboot_fwu.c b/secure_fw/partitions/firmware_update/bootloader/mcuboot/tfm_mcuboot_fwu.c
index 6029047..af9104b 100644
--- a/secure_fw/partitions/firmware_update/bootloader/mcuboot/tfm_mcuboot_fwu.c
+++ b/secure_fw/partitions/firmware_update/bootloader/mcuboot/tfm_mcuboot_fwu.c
@@ -385,7 +385,7 @@
      * does not need to be confirmed explicitly in these two upgrade strategies.
      * Image revert is supported in SWAP upgrade strategy and DIRECT_XIP upgrade
      * strategy when MCUBOOT_DIRECT_XIP_REVERT is true. In these cases, the
-     * image needs to be set as a permanent image explicitly. Then the accpeted
+     * image needs to be set as a permanent image explicitly. Then the accepted
      * image can still be selected as the running image during next time reboot
      * up. Otherwise, the image will be reverted and the previous one will be
      * chosen as the running image.
diff --git a/secure_fw/partitions/firmware_update/bootloader/tfm_bootloader_fwu_abstraction.h b/secure_fw/partitions/firmware_update/bootloader/tfm_bootloader_fwu_abstraction.h
index 571f61b..599ccc3 100644
--- a/secure_fw/partitions/firmware_update/bootloader/tfm_bootloader_fwu_abstraction.h
+++ b/secure_fw/partitions/firmware_update/bootloader/tfm_bootloader_fwu_abstraction.h
@@ -85,7 +85,7 @@
  * The components are in CANDIDATE state. Check the authenticity and integrity of
  * the staged image in the components. If a reboot is required to complete the
  * check, then mark this image as a candidate so that the next time bootloader
- * runs it will take this image as a candidate one to bootup. Return the error
+ * runs it will take this image as a candidate one to boot-up. Return the error
  * code PSA_SUCCESS_REBOOT.
  *
  * \param[in] candidates A list of components in CANDIDATE state.
@@ -112,7 +112,7 @@
  * \brief Mark the TRIAL(running) image in component as confirmed.
  *
  * Call this API to mark the running images as permanent/accepted to avoid
- * revert when next time bootup. Usually, this API is called after the running
+ * revert when next time boot-up. Usually, this API is called after the running
  * images have been verified as valid.
  *
  * \param[in] candidates A list of components in TRIAL state.
@@ -131,7 +131,7 @@
  * \brief Uninstall the staged image in the component.
  *
  * The component is in STAGED state. Uninstall the staged image in the component
- * so that this image will not be treated as a candidate next time bootup.
+ * so that this image will not be treated as a candidate next time boot-up.
  *
  * \return PSA_SUCCESS         On success
  *         PSA_ERROR_INSUFFICIENT_MEMORY
diff --git a/secure_fw/partitions/idle_partition/idle_partition.c b/secure_fw/partitions/idle_partition/idle_partition.c
index 999a27a..2e56e9e 100644
--- a/secure_fw/partitions/idle_partition/idle_partition.c
+++ b/secure_fw/partitions/idle_partition/idle_partition.c
@@ -16,7 +16,7 @@
 {
     while (1) {
         /*
-         * There could be other Partitions becoming RUNABLE after wake up.
+         * There could be other Partitions becoming RUNNABLE after wake up.
          * This is a dummy psa_wait to let SPM check possible scheduling.
          * It does not expect any signals.
          */
@@ -35,7 +35,7 @@
 
     while (1) {
         /*
-         * There could be other Partitions becoming RUNABLE after wake up.
+         * There could be other Partitions becoming RUNNABLE after wake up.
          * This is a dummy psa_wait to let SPM check possible scheduling.
          * It does not expect any signals.
          */
diff --git a/secure_fw/partitions/initial_attestation/Kconfig b/secure_fw/partitions/initial_attestation/Kconfig
index 6bf4ddb..5eefb0a 100644
--- a/secure_fw/partitions/initial_attestation/Kconfig
+++ b/secure_fw/partitions/initial_attestation/Kconfig
@@ -16,7 +16,7 @@
     bool "Symmetric key algorithm based Initial Attestation"
     default n
     help
-      Use symmetric crypto for inital attestation
+      Use symmetric crypto for initial attestation
 
 config ATTEST_INCLUDE_TEST_CODE
     bool "Include test code"
diff --git a/secure_fw/partitions/initial_attestation/attest.h b/secure_fw/partitions/initial_attestation/attest.h
index 660075f..4d8212b 100644
--- a/secure_fw/partitions/initial_attestation/attest.h
+++ b/secure_fw/partitions/initial_attestation/attest.h
@@ -49,7 +49,7 @@
  *
  * \param[in]   major_type  Major type of TLV entries to copy
  * \param[out]  ptr         Pointer to the buffer to store the boot data
- * \parma[in]   len         Size of the buffer to store the boot data
+ * \param[in]   len         Size of the buffer to store the boot data
  *
  * \return Returns error code as specified in \ref psa_attest_err_t
  */
diff --git a/secure_fw/partitions/internal_trusted_storage/flash/its_flash_nand.c b/secure_fw/partitions/internal_trusted_storage/flash/its_flash_nand.c
index 425f194..8fa8be1 100644
--- a/secure_fw/partitions/internal_trusted_storage/flash/its_flash_nand.c
+++ b/secure_fw/partitions/internal_trusted_storage/flash/its_flash_nand.c
@@ -122,7 +122,7 @@
             }
         }
 
-        /* Read the last data item if there is still remaing data. */
+        /* Read the last data item if there is still remaining data. */
         if (remaining_len) {
             ret = flash_dev->driver->ReadData(addr + read_length,
                                               temp_buffer, 1);
diff --git a/secure_fw/partitions/internal_trusted_storage/flash/its_flash_nor.c b/secure_fw/partitions/internal_trusted_storage/flash/its_flash_nor.c
index 912af9b..9e425e7 100644
--- a/secure_fw/partitions/internal_trusted_storage/flash/its_flash_nor.c
+++ b/secure_fw/partitions/internal_trusted_storage/flash/its_flash_nor.c
@@ -107,7 +107,7 @@
         }
     }
 
-    /* Read the last data item if there is still remaing data. */
+    /* Read the last data item if there is still remaining data. */
     if (remaining_len) {
         ret = ((ARM_DRIVER_FLASH *)cfg->flash_dev)->ReadData(
                                                             addr + read_length,
@@ -161,7 +161,7 @@
 static psa_status_t its_flash_nor_flush(const struct its_flash_fs_config_t *cfg,
                                         uint32_t block_id)
 {
-    /* Nothing needs to be done for NOR flash, as writes are commited to flash
+    /* Nothing needs to be done for NOR flash, as writes are committed to flash
      * immediately.
      */
     (void)cfg;
diff --git a/secure_fw/partitions/internal_trusted_storage/flash/its_flash_ram.c b/secure_fw/partitions/internal_trusted_storage/flash/its_flash_ram.c
index 91c9bcd..cd4e8fd 100644
--- a/secure_fw/partitions/internal_trusted_storage/flash/its_flash_ram.c
+++ b/secure_fw/partitions/internal_trusted_storage/flash/its_flash_ram.c
@@ -58,7 +58,7 @@
 
 {
     /* Nothing needs to be done for flash emulated in RAM, as writes are
-     * commited immediately.
+     * committed immediately.
      */
     (void)cfg;
     (void)block_id;
diff --git a/secure_fw/partitions/internal_trusted_storage/flash_fs/its_flash_fs_mblock.c b/secure_fw/partitions/internal_trusted_storage/flash_fs/its_flash_fs_mblock.c
index 0416a77..be5dcf8 100644
--- a/secure_fw/partitions/internal_trusted_storage/flash_fs/its_flash_fs_mblock.c
+++ b/secure_fw/partitions/internal_trusted_storage/flash_fs/its_flash_fs_mblock.c
@@ -74,7 +74,7 @@
 }
 
 /**
- * \brief Gets the number of blocks that are dedicated wholely for data, for the
+ * \brief Gets the number of blocks that are dedicated wholly for data, for the
  *        current context.
  *
  * \param[in,out] fs_ctx  Filesystem context
@@ -925,7 +925,7 @@
 
     /* First two blocks are reserved for metadata */
 
-    /* Read the header of both the metdata blocks. If the read succeeds, then
+    /* Read the header of both the metadata blocks. If the read succeeds, then
      * attempt to validate the metadata header, otherwise assume that the block
      * update was incomplete
      */
diff --git a/secure_fw/partitions/internal_trusted_storage/flash_fs/its_flash_fs_mblock.h b/secure_fw/partitions/internal_trusted_storage/flash_fs/its_flash_fs_mblock.h
index fe443f4..1d2fe42 100644
--- a/secure_fw/partitions/internal_trusted_storage/flash_fs/its_flash_fs_mblock.h
+++ b/secure_fw/partitions/internal_trusted_storage/flash_fs/its_flash_fs_mblock.h
@@ -89,7 +89,7 @@
 /*!
  * \struct its_metadata_block_header_comp_t
  *
- * \brief The struture of metadata block header in
+ * \brief The structure of metadata block header in
  *        ITS_BACKWARD_SUPPORTED_VERSION.
  *
  * \note The active_swap_count must be the last member to allow it to be
@@ -278,7 +278,7 @@
  * \note The files data in the logical block 0 is stored in same physical
  *       block where the metadata is stored. A change in the metadata requires a
  *       swap of physical blocks. So, the files data stored in the current
- *       medadata block needs to be copied in the scratch block, unless
+ *       metadata block needs to be copied in the scratch block, unless
  *       the data of the file processed is located in the logical block 0.
  *
  * \param[in,out] fs_ctx  Filesystem context
diff --git a/secure_fw/partitions/internal_trusted_storage/its_crypto_interface.c b/secure_fw/partitions/internal_trusted_storage/its_crypto_interface.c
index 8ca642d..715ddcc 100644
--- a/secure_fw/partitions/internal_trusted_storage/its_crypto_interface.c
+++ b/secure_fw/partitions/internal_trusted_storage/its_crypto_interface.c
@@ -20,9 +20,9 @@
 /**
  * \brief Fills the AEAD additional data used for the encryption/decryption
  *
- * \details The additional data are not encypted their integrity is checked.
+ * \details The additional data are not encrypted their integrity is checked.
  *          For the ITS encryption we use the file id, the file flags and the
- *          data size of the file as addditional data.
+ *          data size of the file as additional data.
  *
  * \param[out]  add       Additional data
  * \param[in]   add_size  Additional data size in bytes
@@ -32,7 +32,7 @@
  * \param[in]   data_size Data size in bytes
  *
  * \retval PSA_SUCCESS                On success
- * \retval PSA_ERROR_INVALID_ARGUMENT When the addditional data buffer does not
+ * \retval PSA_ERROR_INVALID_ARGUMENT When the additional data buffer does not
  *                                    have the correct size of the add/fid
  *                                    buffers are NULL
  *
diff --git a/secure_fw/partitions/ns_agent_tz/CMakeLists.txt b/secure_fw/partitions/ns_agent_tz/CMakeLists.txt
index f9d7b10..05ea8a4 100644
--- a/secure_fw/partitions/ns_agent_tz/CMakeLists.txt
+++ b/secure_fw/partitions/ns_agent_tz/CMakeLists.txt
@@ -20,7 +20,7 @@
 
 set(ARM_V80M_ARCH armv8-m.base armv8-m.main)
 
-# Trustzone NS Agent is tighly coupled with SPM
+# Trustzone NS Agent is tightly coupled with SPM
 target_sources(tfm_spm
     PRIVATE
         "$<$<IN_LIST:${TFM_SYSTEM_ARCHITECTURE},${ARM_V80M_ARCH}>:${CMAKE_CURRENT_SOURCE_DIR}/ns_agent_tz_v80m.c>"