A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://github.com/cloudflare/cfssl/commit/c1bf7b99b33c754afc837dc43d4619de162dee5f below:

Merge pull request #1119 from jbampton/fix-spelling · cloudflare/cfssl@c1bf7b9 · GitHub

File tree Expand file treeCollapse file tree 15 files changed

+18

-18

lines changed

Filter options

Expand file treeCollapse file tree 15 files changed

+18

-18

lines changed Original file line number Diff line number Diff line change

@@ -30,7 +30,7 @@ services:

30 30 31 31

# Only build pull requests, pushes to the master branch, and branches

32 32

# starting with `test-`. This is a convenient way to push branches to

33 -

# your own fork of the repostiory to ensure Travis passes before submitting

33 +

# your own fork of the repository to ensure Travis passes before submitting

34 34

# a PR. For instance, you might run:

35 35

# git push myremote branchname:test-branchname

36 36

branches:

Original file line number Diff line number Diff line change

@@ -176,7 +176,7 @@ type Response struct {

176 176

Messages []ResponseMessage `json:"messages"`

177 177

}

178 178 179 -

// NewSuccessResponse is a shortcut for creating new successul API

179 +

// NewSuccessResponse is a shortcut for creating new successful API

180 180

// responses.

181 181

func NewSuccessResponse(result interface{}) Response {

182 182

return Response{

Original file line number Diff line number Diff line change

@@ -62,7 +62,7 @@ func (h *Handler) Handle(w http.ResponseWriter, r *http.Request) error {

62 62

case "certificate":

63 63

bundle, err := h.bundler.BundleFromPEMorDER([]byte(blob["certificate"]), []byte(blob["private_key"]), bf, "")

64 64

if err != nil {

65 -

log.Warning("bad PEM certifcate or private key")

65 +

log.Warning("bad PEM certificate or private key")

66 66

return err

67 67

}

68 68 Original file line number Diff line number Diff line change

@@ -58,7 +58,7 @@ func (h *Handler) Handle(w http.ResponseWriter, r *http.Request) (err error) {

58 58

}

59 59

case "certificate":

60 60

if cert, err = certinfo.ParseCertificatePEM([]byte(blob["certificate"])); err != nil {

61 -

log.Warningf("bad PEM certifcate: %v", err)

61 +

log.Warningf("bad PEM certificate: %v", err)

62 62

return err

63 63

}

64 64

case "serial", "authority_key_id":

Original file line number Diff line number Diff line change

@@ -328,7 +328,7 @@ func (ar *AuthRemote) Sign(req []byte) ([]byte, error) {

328 328

return ar.AuthSign(req, nil, ar.provider)

329 329

}

330 330 331 -

// nomalizeURL checks for http/https protocol, appends "http" as default protocol if not defiend in url

331 +

// normalizeURL checks for http/https protocol, appends "http" as default protocol if not defined in url

332 332

func normalizeURL(addr string) (*url.URL, error) {

333 333

addr = strings.TrimSpace(addr)

334 334 Original file line number Diff line number Diff line change

@@ -44,7 +44,7 @@ const (

44 44

// by the most platforms.

45 45

Ubiquitous BundleFlavor = "ubiquitous"

46 46 47 -

// Force means the bundler only verfiies the input as a valid bundle, not optimization is done.

47 +

// Force means the bundler only verifies the input as a valid bundle, not optimization is done.

48 48

Force BundleFlavor = "force"

49 49

)

50 50

@@ -470,7 +470,7 @@ func constructCertFileName(cert *x509.Certificate) string {

470 470

// intermediate pool, the certificate is saved to file and added to

471 471

// the list of intermediates to be used for verification. This will

472 472

// not add any new certificates to the root pool; if the ultimate

473 -

// issuer is not trusted, fetching the certicate here will not change

473 +

// issuer is not trusted, fetching the certificate here will not change

474 474

// that.

475 475

func (b *Bundler) fetchIntermediates(certs []*x509.Certificate) (err error) {

476 476

if IntermediateStash != "" {

Original file line number Diff line number Diff line change

@@ -774,7 +774,7 @@ func newBundlerFromPEM(t *testing.T, caBundlePEM, intBundlePEM []byte) (b *Bundl

774 774

}

775 775 776 776

// newCustomizedBundleCreator is a helper function that returns a new Bundler

777 -

// takes specified CA bundle, intermediate bundle, and any additional intermdiate certs to generate a bundler.

777 +

// takes specified CA bundle, intermediate bundle, and any additional intermediate certs to generate a bundler.

778 778

func newCustomizedBundlerFromFile(t *testing.T, caBundle, intBundle, adhocInters string) (b *Bundler) {

779 779

b, err := NewBundler(caBundle, intBundle)

780 780

if err != nil {

Original file line number Diff line number Diff line change

@@ -327,7 +327,7 @@ func (d *Accessor) UpdateOCSP(serial, aki, body string, expiry time.Time) error

327 327

// We didn't implement 'upsert' with SQL statement and we lost race condition

328 328

// prevention provided by underlying DBMS.

329 329

// Reasoning:

330 -

// 1. it's diffcult to support multiple DBMS backends in the same time, the

330 +

// 1. it's difficult to support multiple DBMS backends in the same time, the

331 331

// SQL syntax differs from one to another.

332 332

// 2. we don't need a strict simultaneous consistency between OCSP and certificate

333 333

// status. It's OK that a OCSP response still shows 'good' while the

Original file line number Diff line number Diff line change

@@ -124,7 +124,7 @@ func registerFlags(c *Config, f *flag.FlagSet) {

124 124

f.StringVar(&c.Password, "password", "0", "Password for accessing PKCS #12 data passed to bundler")

125 125

f.StringVar(&c.Usage, "usage", "", "usage of private key")

126 126

f.StringVar(&c.PGPPrivate, "pgp-private", "", "file to load a PGP Private key decryption")

127 -

f.StringVar(&c.PGPName, "pgp-name", "", "PGP public key name, can be a comma-sepearted key name list")

127 +

f.StringVar(&c.PGPName, "pgp-name", "", "PGP public key name, can be a comma-separated key name list")

128 128

f.StringVar(&c.Serial, "serial", "", "certificate serial number")

129 129

f.StringVar(&c.CNOverride, "cn", "", "certificate common name (CN)")

130 130

f.StringVar(&c.AKI, "aki", "", "certificate issuer (authority) key identifier")

Original file line number Diff line number Diff line change

@@ -81,7 +81,7 @@

81 81

'scan.tlshandshake.title': 'TLS Handshake',

82 82

'scan.tlshandshake.description': 'Scans for host\'s SSL and TLS versions and cipher suite negotiation.',

83 83

'scan.tlshandshake.CipherSuite.title': 'Cipher Suite Matrix',

84 -

'scan.tlshandshake.CipherSuite.body': 'Determines host\'s cipher suite accepted and prefered order.',

84 +

'scan.tlshandshake.CipherSuite.body': 'Determines host\'s cipher suite accepted and preferred order.',

85 85

'scan.tlssession.title': 'TLS Session',

86 86

'scan.tlssession.description': 'Scans host\'s implementation of TLS session resumption using session ticket and session IDs.',

87 87

'scan.tlssession.SessionResume.title': 'Session Resumption',

You can’t perform that action at this time.


RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4