Index: net/cert/ev_root_ca_metadata.cc |
diff --git a/net/cert/ev_root_ca_metadata.cc b/net/cert/ev_root_ca_metadata.cc |
index 26f9773d3263b6b2fa70851f77ecacbe1562218d..3c1f859d3dd7b20ebb982423ed45a2a9f154f908 100644 |
--- a/net/cert/ev_root_ca_metadata.cc |
+++ b/net/cert/ev_root_ca_metadata.cc |
@@ -25,7 +25,7 @@ namespace net { |
// Raw metadata. |
struct EVMetadata { |
// kMaxOIDsPerCA is the number of OIDs that we can support per root CA. At |
- // least one CA has different EV policies for businuss vs government |
+ // least one CA has different EV policies for business vs government |
// entities and, in the case of cross-signing, we might need to list another |
// CA's policy OID under the cross-signing root. |
static const size_t kMaxOIDsPerCA = 2; |
@@ -48,8 +48,7 @@ static const EVMetadata ev_root_ca_metadata[] = { |
0x30, 0x50, 0xba, 0x9e, 0xa8, 0x7e, 0xfe, 0x9a, 0xce, 0x3c}}, |
{ |
// AC Camerfirma uses the last two arcs to track how the private key |
- // is |
- // managed - the effective verification policy is the same. |
+ // is managed - the effective verification policy is the same. |
"1.3.6.1.4.1.17326.10.14.2.1.2", "1.3.6.1.4.1.17326.10.14.2.2.2", |
}, |
}, |
@@ -60,8 +59,7 @@ static const EVMetadata ev_root_ca_metadata[] = { |
0xc7, 0x52, 0xa1, 0x2c, 0x5b, 0x29, 0xf6, 0xd6, 0xaa, 0x0c}}, |
{ |
// AC Camerfirma uses the last two arcs to track how the private key |
- // is |
- // managed - the effective verification policy is the same. |
+ // is managed - the effective verification policy is the same. |
"1.3.6.1.4.1.17326.10.8.12.1.2", "1.3.6.1.4.1.17326.10.8.12.2.2", |
}, |
}, |