diff --git a/lib/modules/Standards.pmod/X509.pmod b/lib/modules/Standards.pmod/X509.pmod index 904f147ca4aa9c366869c9ded06b28d0ae1b1e25..c7712bcf449e14a872386c222320806483098fb6 100644 --- a/lib/modules/Standards.pmod/X509.pmod +++ b/lib/modules/Standards.pmod/X509.pmod @@ -47,7 +47,7 @@ enum CertFailure //! another certificate. CERT_UNAUTHORIZED_CA = 1<<6, - //! The certificate is not allowed by it's key usage to sign data. + //! The certificate is not allowed by its key usage to sign data. CERT_UNAUTHORIZED_SIGNING = 1<<7, //! The certificate chain is longer than allowed by a certificate in @@ -1456,7 +1456,7 @@ TBSCertificate decode_certificate(string|object cert) } //! Decodes a certificate, checks the signature. Returns the -//! TBSCertificate structure, or 0 if decoding or verification failes. +//! TBSCertificate structure, or 0 if decoding or verification fails. //! The valid time range for the certificate is not checked. //! //! @param authorities @@ -1729,16 +1729,16 @@ mapping(string:array(Verifier)) load_authorities(string|array(string)|void root_ } //! @decl mapping verify_certificate_chain(array(string) cert_chain, @ -//! mapping(string:Verifier|array(Verifier)) authorities, @ -//! int|void require_trust, bool|void strict) +//! mapping(string:Verifier|array(Verifier)) authorities, @ +//! int|void require_trust, bool|void strict) //! @decl mapping verify_certificate_chain(array(string) cert_chain, @ -//! mapping(string:Verifier|array(Verifier)) authorities, @ -//! int|void require_trust, mapping(string:mixed) options) +//! mapping(string:Verifier|array(Verifier)) authorities, @ +//! int|void require_trust, mapping(string:mixed) options) //! -//! Decodes a certificate chain, oredered from leaf to root, and +//! Decodes a certificate chain, ordered from leaf to root, and //! checks the signatures. Verifies that the chain can be decoded //! correctly, is unbroken, and that all certificates are in effect -//! (time-wise.) and allowed to sign it's child certificate. +//! (time-wise.) and allowed to sign its child certificate. //! //! No verifications are done on the leaf certificate to determine //! what it can and can not be used for. @@ -1785,7 +1785,7 @@ mapping(string:array(Verifier)) load_authorities(string|array(string)|void root_ //! //! Some https-servers send extraneous intermediate certificates //! that aren't used to validate the leaf certificate. So strict -//! mode will be incompatible with those srevers. +//! mode will be incompatible with such servers. //! @param options //! @mapping //! @member mapping(Standards.ASN1.Types.Identifier:Crypto.Hash) "verifier_algorithm"