Skip Menu |

This queue is for tickets about the Net_SSLeay.pm CPAN distribution.

Report information
The Basics
Id: 2105
Status: resolved
Priority: 0/
Queue: Net_SSLeay.pm

People
Owner: Nobody in particular
Requestors: sampo [...] symlabs.com
Cc:
AdminCc:

Bug Information
Severity: (no value)
Broken in: (no value)
Fixed in: (no value)



From: sampo [...] symlabs.com
To: bug-Net_SSLeay.pm [...] rt.cpan.org
CC: "AdminCc of cpan Ticket #2095:" [...] fsck.com
Subject: Re: pod typos
Date: Thu, 13 Feb 2003 19:10:59 -0800
Guest via RT writes: Show quoted text
> > This message about Net_SSLeay.pm was sent to you by guest <> via rt.cpan.org > > Full context and any attached attachments can be found at: > <URL: https://rt.cpan.org/Ticket/Display.html?id=2095 > > > This patch fixes a couple of typos in the POD documentation: > > --- SSLeay.pm 2003/02/13 04:38:57 1.1 > +++ SSLeay.pm 2003/02/13 04:43:08 > @@ -719,9 +719,9 @@ > =head2 Certificate verification and Certificate Revoocation Lists (CRLs) > > OpenSSL supports the ability to verify peer certificates. It can also optionally > -check peer certificate against a Certificate Revocation List (CRL) from teh certificates > +check a peer certificate against a Certificate Revocation List (CRL) from the certificate's > issuer. A CRL is a file, created by the certificate issuer that lists all the > -certificates that ir previously signed, but which it now revokes. CRLs are in PEM format. > +certificates that it previously signed, but which it now revokes. CRLs are in PEM format. > > You can enable Net::SSLeay CRL checking like this: > > @@ -732,7 +732,7 @@ > After setting this flag, if OpenSSL checks a peer's certificate, then it will attempt > to find a CRL for the issuer. It does this by looking for a specially named file in > the sercah directory specified by CTX_load_verify_locations. > -CRL files are named with the hash of the issuers subject name, followed by .r0, .r1 etc. > +CRL files are named with the hash of the issuer's subject name, followed by .r0, .r1 etc. > For example ab1331b2.r0, ab1331b2.r1. It will read all the .r files for the issuer, > and then check for a revocation of the peer cerificate in all of them. > (You can also force it to look in a specific named CRL file., see below). > @@ -1582,7 +1582,7 @@ > > #$found = index($got, $delim); # Old and broken > > - # the delimeter may be split across two gets, so we prepend > + # the delimiter may be split across two gets, so we prepend > # a little from the last get onto this one before we check > # for a match > my $match; > @@ -1599,7 +1599,7 @@ > > if ($found > -1) { > #$got = Net::SSLeay::read($ssl, $found+$len_delim); > - #read up to the end of the delimeter > + #read up to the end of the delimiter > $got = Net::SSLeay::read($ssl, > $found + $len_delim > - ((blength $match) - (blength $got))); > > > I hope the wrapping doesn't get too messed up. Also, what does "sercah" mean in this paragraph? >
Search. Your patch has been applied. Thanks. --Sampo Show quoted text
> After setting this flag, if OpenSSL checks a peer's > certificate, then it will attempt to find a CRL for the > issuer. It does this by looking for a specially named file > in the sercah directory specified by > CTX_load_verify_locations. CRL files are named with the hash > of the issuer's subject name, followed by .r0, .r1 etc. For > example ab1331b2.r0, ab1331b2.r1. It will read all the .r > files for the issuer, and then check for a revocation of the
Show quoted text
__________________________________________________________________ Symlabs DirectoryScript www.symlabs.com Home of triggers and stored m: +351-918.731.007 DirectoryScript procedures for LDAP f: +351-214.222.637