mirror of
https://github.com/smallstep/certificates.git
synced 2024-10-31 03:20:16 +00:00
chore: fix function names in comment
Signed-off-by: verytrap <wangqiuyue@outlook.com>
This commit is contained in:
parent
1513152cb2
commit
db92404342
@ -726,7 +726,7 @@ var (
|
|||||||
oidTCGKpAIKCertificate = asn1.ObjectIdentifier{2, 23, 133, 8, 3}
|
oidTCGKpAIKCertificate = asn1.ObjectIdentifier{2, 23, 133, 8, 3}
|
||||||
)
|
)
|
||||||
|
|
||||||
// validateAKCertifiate validates the X.509 AK certificate to be
|
// validateAKCertificate validates the X.509 AK certificate to be
|
||||||
// in accordance with the required properties. The requirements come from:
|
// in accordance with the required properties. The requirements come from:
|
||||||
// https://www.w3.org/TR/webauthn-2/#sctn-tpm-cert-requirements.
|
// https://www.w3.org/TR/webauthn-2/#sctn-tpm-cert-requirements.
|
||||||
//
|
//
|
||||||
@ -735,7 +735,7 @@ var (
|
|||||||
// - The Subject Alternative Name extension MUST be set as defined
|
// - The Subject Alternative Name extension MUST be set as defined
|
||||||
// in [TPMv2-EK-Profile] section 3.2.9.
|
// in [TPMv2-EK-Profile] section 3.2.9.
|
||||||
// - The Extended Key Usage extension MUST contain the OID 2.23.133.8.3
|
// - The Extended Key Usage extension MUST contain the OID 2.23.133.8.3
|
||||||
// ("joint-iso-itu-t(2) internationalorganizations(23) 133 tcg-kp(8) tcg-kp-AIKCertificate(3)").
|
// ("joint-iso-itu-t(2) international-organizations(23) 133 tcg-kp(8) tcg-kp-AIKCertificate(3)").
|
||||||
// - The Basic Constraints extension MUST have the CA component set to false.
|
// - The Basic Constraints extension MUST have the CA component set to false.
|
||||||
// - An Authority Information Access (AIA) extension with entry id-ad-ocsp
|
// - An Authority Information Access (AIA) extension with entry id-ad-ocsp
|
||||||
// and a CRL Distribution Point extension [RFC5280] are both OPTIONAL as
|
// and a CRL Distribution Point extension [RFC5280] are both OPTIONAL as
|
||||||
|
@ -130,7 +130,7 @@ func (m *MockProvisioner) GetName() string {
|
|||||||
return m.Mret1.(string)
|
return m.Mret1.(string)
|
||||||
}
|
}
|
||||||
|
|
||||||
// AuthorizeOrderIdentifiers mock
|
// AuthorizeOrderIdentifier mock
|
||||||
func (m *MockProvisioner) AuthorizeOrderIdentifier(ctx context.Context, identifier provisioner.ACMEIdentifier) error {
|
func (m *MockProvisioner) AuthorizeOrderIdentifier(ctx context.Context, identifier provisioner.ACMEIdentifier) error {
|
||||||
if m.MauthorizeOrderIdentifier != nil {
|
if m.MauthorizeOrderIdentifier != nil {
|
||||||
return m.MauthorizeOrderIdentifier(ctx, identifier)
|
return m.MauthorizeOrderIdentifier(ctx, identifier)
|
||||||
|
@ -127,7 +127,7 @@ func (o *Order) UpdateStatus(ctx context.Context, db DB) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
// getKeyFingerprint returns a fingerprint from the list of authorizations. This
|
// getAuthorizationFingerprint returns a fingerprint from the list of authorizations. This
|
||||||
// fingerprint is used on the device-attest-01 flow to verify the attestation
|
// fingerprint is used on the device-attest-01 flow to verify the attestation
|
||||||
// certificate public key with the CSR public key.
|
// certificate public key with the CSR public key.
|
||||||
//
|
//
|
||||||
|
@ -97,7 +97,7 @@ func (s *SCEP) AuthorizeSSHSign(context.Context, string) ([]provisioner.SignOpti
|
|||||||
return nil, errDummyImplementation
|
return nil, errDummyImplementation
|
||||||
}
|
}
|
||||||
|
|
||||||
// AuthorizeRevoke returns an unimplemented error. Provisioners should overwrite
|
// AuthorizeSSHRevoke returns an unimplemented error. Provisioners should overwrite
|
||||||
// this method if they will support authorizing tokens for revoking SSH Certificates.
|
// this method if they will support authorizing tokens for revoking SSH Certificates.
|
||||||
func (s *SCEP) AuthorizeSSHRevoke(context.Context, string) error {
|
func (s *SCEP) AuthorizeSSHRevoke(context.Context, string) error {
|
||||||
return errDummyImplementation
|
return errDummyImplementation
|
||||||
|
@ -35,7 +35,7 @@ type PolicyAdminResponder interface {
|
|||||||
// policyAdminResponder implements PolicyAdminResponder.
|
// policyAdminResponder implements PolicyAdminResponder.
|
||||||
type policyAdminResponder struct{}
|
type policyAdminResponder struct{}
|
||||||
|
|
||||||
// NewACMEAdminResponder returns a new PolicyAdminResponder.
|
// NewPolicyAdminResponder returns a new PolicyAdminResponder.
|
||||||
func NewPolicyAdminResponder() PolicyAdminResponder {
|
func NewPolicyAdminResponder() PolicyAdminResponder {
|
||||||
return &policyAdminResponder{}
|
return &policyAdminResponder{}
|
||||||
}
|
}
|
||||||
|
@ -320,7 +320,7 @@ func (b *base) AuthorizeSSHSign(context.Context, string) ([]SignOption, error) {
|
|||||||
return nil, errs.Unauthorized("provisioner.AuthorizeSSHSign not implemented")
|
return nil, errs.Unauthorized("provisioner.AuthorizeSSHSign not implemented")
|
||||||
}
|
}
|
||||||
|
|
||||||
// AuthorizeRevoke returns an unimplemented error. Provisioners should overwrite
|
// AuthorizeSSHRevoke returns an unimplemented error. Provisioners should overwrite
|
||||||
// this method if they will support authorizing tokens for revoking SSH Certificates.
|
// this method if they will support authorizing tokens for revoking SSH Certificates.
|
||||||
func (b *base) AuthorizeSSHRevoke(context.Context, string) error {
|
func (b *base) AuthorizeSSHRevoke(context.Context, string) error {
|
||||||
return errs.Unauthorized("provisioner.AuthorizeSSHRevoke not implemented")
|
return errs.Unauthorized("provisioner.AuthorizeSSHRevoke not implemented")
|
||||||
|
Loading…
Reference in New Issue
Block a user