+18
-18
lines changedFilter options
+18
-18
lines changed Original file line number Diff line number Diff line change
@@ -30,7 +30,7 @@ services:
30
30
31
31
# Only build pull requests, pushes to the master branch, and branches
32
32
# starting with `test-`. This is a convenient way to push branches to
33
-
# your own fork of the repostiory to ensure Travis passes before submitting
33
+
# your own fork of the repository to ensure Travis passes before submitting
34
34
# a PR. For instance, you might run:
35
35
# git push myremote branchname:test-branchname
36
36
branches:
Original file line number Diff line number Diff line change
@@ -176,7 +176,7 @@ type Response struct {
176
176
Messages []ResponseMessage `json:"messages"`
177
177
}
178
178
179
-
// NewSuccessResponse is a shortcut for creating new successul API
179
+
// NewSuccessResponse is a shortcut for creating new successful API
180
180
// responses.
181
181
func NewSuccessResponse(result interface{}) Response {
182
182
return Response{
Original file line number Diff line number Diff line change
@@ -62,7 +62,7 @@ func (h *Handler) Handle(w http.ResponseWriter, r *http.Request) error {
62
62
case "certificate":
63
63
bundle, err := h.bundler.BundleFromPEMorDER([]byte(blob["certificate"]), []byte(blob["private_key"]), bf, "")
64
64
if err != nil {
65
-
log.Warning("bad PEM certifcate or private key")
65
+
log.Warning("bad PEM certificate or private key")
66
66
return err
67
67
}
68
68
Original file line number Diff line number Diff line change
@@ -58,7 +58,7 @@ func (h *Handler) Handle(w http.ResponseWriter, r *http.Request) (err error) {
58
58
}
59
59
case "certificate":
60
60
if cert, err = certinfo.ParseCertificatePEM([]byte(blob["certificate"])); err != nil {
61
-
log.Warningf("bad PEM certifcate: %v", err)
61
+
log.Warningf("bad PEM certificate: %v", err)
62
62
return err
63
63
}
64
64
case "serial", "authority_key_id":
Original file line number Diff line number Diff line change
@@ -328,7 +328,7 @@ func (ar *AuthRemote) Sign(req []byte) ([]byte, error) {
328
328
return ar.AuthSign(req, nil, ar.provider)
329
329
}
330
330
331
-
// nomalizeURL checks for http/https protocol, appends "http" as default protocol if not defiend in url
331
+
// normalizeURL checks for http/https protocol, appends "http" as default protocol if not defined in url
332
332
func normalizeURL(addr string) (*url.URL, error) {
333
333
addr = strings.TrimSpace(addr)
334
334
Original file line number Diff line number Diff line change
@@ -44,7 +44,7 @@ const (
44
44
// by the most platforms.
45
45
Ubiquitous BundleFlavor = "ubiquitous"
46
46
47
-
// Force means the bundler only verfiies the input as a valid bundle, not optimization is done.
47
+
// Force means the bundler only verifies the input as a valid bundle, not optimization is done.
48
48
Force BundleFlavor = "force"
49
49
)
50
50
@@ -470,7 +470,7 @@ func constructCertFileName(cert *x509.Certificate) string {
470
470
// intermediate pool, the certificate is saved to file and added to
471
471
// the list of intermediates to be used for verification. This will
472
472
// not add any new certificates to the root pool; if the ultimate
473
-
// issuer is not trusted, fetching the certicate here will not change
473
+
// issuer is not trusted, fetching the certificate here will not change
474
474
// that.
475
475
func (b *Bundler) fetchIntermediates(certs []*x509.Certificate) (err error) {
476
476
if IntermediateStash != "" {
Original file line number Diff line number Diff line change
@@ -774,7 +774,7 @@ func newBundlerFromPEM(t *testing.T, caBundlePEM, intBundlePEM []byte) (b *Bundl
774
774
}
775
775
776
776
// newCustomizedBundleCreator is a helper function that returns a new Bundler
777
-
// takes specified CA bundle, intermediate bundle, and any additional intermdiate certs to generate a bundler.
777
+
// takes specified CA bundle, intermediate bundle, and any additional intermediate certs to generate a bundler.
778
778
func newCustomizedBundlerFromFile(t *testing.T, caBundle, intBundle, adhocInters string) (b *Bundler) {
779
779
b, err := NewBundler(caBundle, intBundle)
780
780
if err != nil {
Original file line number Diff line number Diff line change
@@ -327,7 +327,7 @@ func (d *Accessor) UpdateOCSP(serial, aki, body string, expiry time.Time) error
327
327
// We didn't implement 'upsert' with SQL statement and we lost race condition
328
328
// prevention provided by underlying DBMS.
329
329
// Reasoning:
330
-
// 1. it's diffcult to support multiple DBMS backends in the same time, the
330
+
// 1. it's difficult to support multiple DBMS backends in the same time, the
331
331
// SQL syntax differs from one to another.
332
332
// 2. we don't need a strict simultaneous consistency between OCSP and certificate
333
333
// status. It's OK that a OCSP response still shows 'good' while the
Original file line number Diff line number Diff line change
@@ -124,7 +124,7 @@ func registerFlags(c *Config, f *flag.FlagSet) {
124
124
f.StringVar(&c.Password, "password", "0", "Password for accessing PKCS #12 data passed to bundler")
125
125
f.StringVar(&c.Usage, "usage", "", "usage of private key")
126
126
f.StringVar(&c.PGPPrivate, "pgp-private", "", "file to load a PGP Private key decryption")
127
-
f.StringVar(&c.PGPName, "pgp-name", "", "PGP public key name, can be a comma-sepearted key name list")
127
+
f.StringVar(&c.PGPName, "pgp-name", "", "PGP public key name, can be a comma-separated key name list")
128
128
f.StringVar(&c.Serial, "serial", "", "certificate serial number")
129
129
f.StringVar(&c.CNOverride, "cn", "", "certificate common name (CN)")
130
130
f.StringVar(&c.AKI, "aki", "", "certificate issuer (authority) key identifier")
Original file line number Diff line number Diff line change
@@ -81,7 +81,7 @@
81
81
'scan.tlshandshake.title': 'TLS Handshake',
82
82
'scan.tlshandshake.description': 'Scans for host\'s SSL and TLS versions and cipher suite negotiation.',
83
83
'scan.tlshandshake.CipherSuite.title': 'Cipher Suite Matrix',
84
-
'scan.tlshandshake.CipherSuite.body': 'Determines host\'s cipher suite accepted and prefered order.',
84
+
'scan.tlshandshake.CipherSuite.body': 'Determines host\'s cipher suite accepted and preferred order.',
85
85
'scan.tlssession.title': 'TLS Session',
86
86
'scan.tlssession.description': 'Scans host\'s implementation of TLS session resumption using session ticket and session IDs.',
87
87
'scan.tlssession.SessionResume.title': 'Session Resumption',
You can’t perform that action at this time.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4