From 6a6f74414ab5d9232cc62a31d6171aa3ed4f114f Mon Sep 17 00:00:00 2001 From: Andrew Ayer Date: Thu, 9 Feb 2023 11:26:34 -0500 Subject: [PATCH] Fix typos Closes: #3 --- README.md | 2 +- cmd/certspotter/main.go | 2 +- ct/client/logclient.go | 6 +++--- ct/types.go | 6 +++--- 4 files changed, 8 insertions(+), 8 deletions(-) diff --git a/README.md b/README.md index 99cacf6..6eb49a0 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,7 @@ # Cert Spotter - Certificate Transparency Monitor **Cert Spotter** is a Certificate Transparency log monitor from SSLMate that -alerts you when a SSL/TLS certificate is issued for one of your domains. +alerts you when an SSL/TLS certificate is issued for one of your domains. Cert Spotter is easier to use than other open source CT monitors, since it does not require a database. It's also more robust, since it uses a special certificate parser that ensures it won't miss certificates. diff --git a/cmd/certspotter/main.go b/cmd/certspotter/main.go index be69607..feae565 100644 --- a/cmd/certspotter/main.go +++ b/cmd/certspotter/main.go @@ -123,7 +123,7 @@ func main() { } flag.IntVar(&flags.batchSize, "batch_size", 1000, "Max number of entries to request per call to get-entries (advanced)") flag.Func("email", "Email address to contact when matching certificate is discovered (repeatable)", appendFunc(&flags.email)) - flag.DurationVar(&flags.healthcheck, "healthcheck", 24*time.Hour, "How frequently to perform a healt check") + flag.DurationVar(&flags.healthcheck, "healthcheck", 24*time.Hour, "How frequently to perform a health check") flag.StringVar(&flags.logs, "logs", defaultLogList, "File path or URL of JSON list of logs to monitor") flag.BoolVar(&flags.noSave, "no_save", false, "Do not save a copy of matching certificates in state directory") flag.StringVar(&flags.script, "script", "", "Program to execute when a matching certificate is discovered") diff --git a/ct/client/logclient.go b/ct/client/logclient.go index 9e6c86f..b0d294a 100644 --- a/ct/client/logclient.go +++ b/ct/client/logclient.go @@ -77,7 +77,7 @@ type LogClient struct { // These represent the structures returned by the CT Log server. ////////////////////////////////////////////////////////////////////////////////// -// getSTHResponse respresents the JSON response to the get-sth CT method +// getSTHResponse represents the JSON response to the get-sth CT method type getSTHResponse struct { TreeSize uint64 `json:"tree_size"` // Number of certs in the current tree Timestamp uint64 `json:"timestamp"` // Time that the tree was created @@ -85,13 +85,13 @@ type getSTHResponse struct { TreeHeadSignature []byte `json:"tree_head_signature"` // Log signature for this STH } -// base64LeafEntry respresents a Base64 encoded leaf entry +// base64LeafEntry represents a Base64 encoded leaf entry type base64LeafEntry struct { LeafInput []byte `json:"leaf_input"` ExtraData []byte `json:"extra_data"` } -// getEntriesReponse respresents the JSON response to the CT get-entries method +// getEntriesReponse represents the JSON response to the CT get-entries method type getEntriesResponse struct { Entries []base64LeafEntry `json:"entries"` // the list of returned entries } diff --git a/ct/types.go b/ct/types.go index b366fe4..a79f405 100644 --- a/ct/types.go +++ b/ct/types.go @@ -156,7 +156,7 @@ func (h HashAlgorithm) String() string { } } -// SignatureAlgorithm from the the DigitallySigned struct +// SignatureAlgorithm from the DigitallySigned struct type SignatureAlgorithm byte // SignatureAlgorithm constants @@ -301,7 +301,7 @@ type SignedCertificateTimestamp struct { SCTVersion Version `json:"sct_version"` // The version of the protocol to which the SCT conforms LogID SHA256Hash `json:"id"` // the SHA-256 hash of the log's public key, calculated over // the DER encoding of the key represented as SubjectPublicKeyInfo. - Timestamp uint64 `json:"timestamp"` // Timestamp (in ms since unix epoc) at which the SCT was issued + Timestamp uint64 `json:"timestamp"` // Timestamp (in ms since unix epoch) at which the SCT was issued Extensions CTExtensions `json:"extensions"` // For future extensions to the protocol Signature DigitallySigned `json:"signature"` // The Log's signature for this SCT } @@ -324,7 +324,7 @@ type TimestampedEntry struct { Extensions CTExtensions } -// MerkleTreeLeaf represents the deserialized sructure of the hash input for the +// MerkleTreeLeaf represents the deserialized structure of the hash input for the // leaves of a log's Merkle tree. See RFC section 3.4 type MerkleTreeLeaf struct { Version Version // the version of the protocol to which the MerkleTreeLeaf corresponds