From 1b36afa2248e1ff03a34c4e082fa33e12dc0cdfc Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Henrik=20Grubbstr=C3=B6m=20=28Grubba=29?= <grubba@grubba.org> Date: Tue, 25 Feb 2020 13:39:26 +0100 Subject: [PATCH] Documentation [Standards.X509]: Fixed some typos. Fixes #10012. --- lib/modules/Standards.pmod/X509.pmod | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/lib/modules/Standards.pmod/X509.pmod b/lib/modules/Standards.pmod/X509.pmod index 904f147ca4..c7712bcf44 100644 --- a/lib/modules/Standards.pmod/X509.pmod +++ b/lib/modules/Standards.pmod/X509.pmod @@ -47,7 +47,7 @@ enum CertFailure //! another certificate. CERT_UNAUTHORIZED_CA = 1<<6, - //! The certificate is not allowed by it's key usage to sign data. + //! The certificate is not allowed by its key usage to sign data. CERT_UNAUTHORIZED_SIGNING = 1<<7, //! The certificate chain is longer than allowed by a certificate in @@ -1456,7 +1456,7 @@ TBSCertificate decode_certificate(string|object cert) } //! Decodes a certificate, checks the signature. Returns the -//! TBSCertificate structure, or 0 if decoding or verification failes. +//! TBSCertificate structure, or 0 if decoding or verification fails. //! The valid time range for the certificate is not checked. //! //! @param authorities @@ -1729,16 +1729,16 @@ mapping(string:array(Verifier)) load_authorities(string|array(string)|void root_ } //! @decl mapping verify_certificate_chain(array(string) cert_chain, @ -//! mapping(string:Verifier|array(Verifier)) authorities, @ -//! int|void require_trust, bool|void strict) +//! mapping(string:Verifier|array(Verifier)) authorities, @ +//! int|void require_trust, bool|void strict) //! @decl mapping verify_certificate_chain(array(string) cert_chain, @ -//! mapping(string:Verifier|array(Verifier)) authorities, @ -//! int|void require_trust, mapping(string:mixed) options) +//! mapping(string:Verifier|array(Verifier)) authorities, @ +//! int|void require_trust, mapping(string:mixed) options) //! -//! Decodes a certificate chain, oredered from leaf to root, and +//! Decodes a certificate chain, ordered from leaf to root, and //! checks the signatures. Verifies that the chain can be decoded //! correctly, is unbroken, and that all certificates are in effect -//! (time-wise.) and allowed to sign it's child certificate. +//! (time-wise.) and allowed to sign its child certificate. //! //! No verifications are done on the leaf certificate to determine //! what it can and can not be used for. @@ -1785,7 +1785,7 @@ mapping(string:array(Verifier)) load_authorities(string|array(string)|void root_ //! //! Some https-servers send extraneous intermediate certificates //! that aren't used to validate the leaf certificate. So strict -//! mode will be incompatible with those srevers. +//! mode will be incompatible with such servers. //! @param options //! @mapping //! @member mapping(Standards.ASN1.Types.Identifier:Crypto.Hash) "verifier_algorithm" -- GitLab