chore: fix function names in comment

Signed-off-by: verytrap <wangqiuyue@outlook.com>
This commit is contained in:
verytrap 2024-04-09 17:48:50 +08:00
parent 1513152cb2
commit db92404342
6 changed files with 7 additions and 7 deletions

View File

@ -726,7 +726,7 @@ var (
oidTCGKpAIKCertificate = asn1.ObjectIdentifier{2, 23, 133, 8, 3} oidTCGKpAIKCertificate = asn1.ObjectIdentifier{2, 23, 133, 8, 3}
) )
// validateAKCertifiate validates the X.509 AK certificate to be // validateAKCertificate validates the X.509 AK certificate to be
// in accordance with the required properties. The requirements come from: // in accordance with the required properties. The requirements come from:
// https://www.w3.org/TR/webauthn-2/#sctn-tpm-cert-requirements. // https://www.w3.org/TR/webauthn-2/#sctn-tpm-cert-requirements.
// //
@ -735,7 +735,7 @@ var (
// - The Subject Alternative Name extension MUST be set as defined // - The Subject Alternative Name extension MUST be set as defined
// in [TPMv2-EK-Profile] section 3.2.9. // in [TPMv2-EK-Profile] section 3.2.9.
// - The Extended Key Usage extension MUST contain the OID 2.23.133.8.3 // - The Extended Key Usage extension MUST contain the OID 2.23.133.8.3
// ("joint-iso-itu-t(2) internationalorganizations(23) 133 tcg-kp(8) tcg-kp-AIKCertificate(3)"). // ("joint-iso-itu-t(2) international-organizations(23) 133 tcg-kp(8) tcg-kp-AIKCertificate(3)").
// - The Basic Constraints extension MUST have the CA component set to false. // - The Basic Constraints extension MUST have the CA component set to false.
// - An Authority Information Access (AIA) extension with entry id-ad-ocsp // - An Authority Information Access (AIA) extension with entry id-ad-ocsp
// and a CRL Distribution Point extension [RFC5280] are both OPTIONAL as // and a CRL Distribution Point extension [RFC5280] are both OPTIONAL as

View File

@ -130,7 +130,7 @@ func (m *MockProvisioner) GetName() string {
return m.Mret1.(string) return m.Mret1.(string)
} }
// AuthorizeOrderIdentifiers mock // AuthorizeOrderIdentifier mock
func (m *MockProvisioner) AuthorizeOrderIdentifier(ctx context.Context, identifier provisioner.ACMEIdentifier) error { func (m *MockProvisioner) AuthorizeOrderIdentifier(ctx context.Context, identifier provisioner.ACMEIdentifier) error {
if m.MauthorizeOrderIdentifier != nil { if m.MauthorizeOrderIdentifier != nil {
return m.MauthorizeOrderIdentifier(ctx, identifier) return m.MauthorizeOrderIdentifier(ctx, identifier)

View File

@ -127,7 +127,7 @@ func (o *Order) UpdateStatus(ctx context.Context, db DB) error {
return nil return nil
} }
// getKeyFingerprint returns a fingerprint from the list of authorizations. This // getAuthorizationFingerprint returns a fingerprint from the list of authorizations. This
// fingerprint is used on the device-attest-01 flow to verify the attestation // fingerprint is used on the device-attest-01 flow to verify the attestation
// certificate public key with the CSR public key. // certificate public key with the CSR public key.
// //

View File

@ -97,7 +97,7 @@ func (s *SCEP) AuthorizeSSHSign(context.Context, string) ([]provisioner.SignOpti
return nil, errDummyImplementation return nil, errDummyImplementation
} }
// AuthorizeRevoke returns an unimplemented error. Provisioners should overwrite // AuthorizeSSHRevoke returns an unimplemented error. Provisioners should overwrite
// this method if they will support authorizing tokens for revoking SSH Certificates. // this method if they will support authorizing tokens for revoking SSH Certificates.
func (s *SCEP) AuthorizeSSHRevoke(context.Context, string) error { func (s *SCEP) AuthorizeSSHRevoke(context.Context, string) error {
return errDummyImplementation return errDummyImplementation

View File

@ -35,7 +35,7 @@ type PolicyAdminResponder interface {
// policyAdminResponder implements PolicyAdminResponder. // policyAdminResponder implements PolicyAdminResponder.
type policyAdminResponder struct{} type policyAdminResponder struct{}
// NewACMEAdminResponder returns a new PolicyAdminResponder. // NewPolicyAdminResponder returns a new PolicyAdminResponder.
func NewPolicyAdminResponder() PolicyAdminResponder { func NewPolicyAdminResponder() PolicyAdminResponder {
return &policyAdminResponder{} return &policyAdminResponder{}
} }

View File

@ -320,7 +320,7 @@ func (b *base) AuthorizeSSHSign(context.Context, string) ([]SignOption, error) {
return nil, errs.Unauthorized("provisioner.AuthorizeSSHSign not implemented") return nil, errs.Unauthorized("provisioner.AuthorizeSSHSign not implemented")
} }
// AuthorizeRevoke returns an unimplemented error. Provisioners should overwrite // AuthorizeSSHRevoke returns an unimplemented error. Provisioners should overwrite
// this method if they will support authorizing tokens for revoking SSH Certificates. // this method if they will support authorizing tokens for revoking SSH Certificates.
func (b *base) AuthorizeSSHRevoke(context.Context, string) error { func (b *base) AuthorizeSSHRevoke(context.Context, string) error {
return errs.Unauthorized("provisioner.AuthorizeSSHRevoke not implemented") return errs.Unauthorized("provisioner.AuthorizeSSHRevoke not implemented")