| Index: net/cert/ev_root_ca_metadata.cc
|
| diff --git a/net/cert/ev_root_ca_metadata.cc b/net/cert/ev_root_ca_metadata.cc
|
| index 26f9773d3263b6b2fa70851f77ecacbe1562218d..3c1f859d3dd7b20ebb982423ed45a2a9f154f908 100644
|
| --- a/net/cert/ev_root_ca_metadata.cc
|
| +++ b/net/cert/ev_root_ca_metadata.cc
|
| @@ -25,7 +25,7 @@ namespace net {
|
| // Raw metadata.
|
| struct EVMetadata {
|
| // kMaxOIDsPerCA is the number of OIDs that we can support per root CA. At
|
| - // least one CA has different EV policies for businuss vs government
|
| + // least one CA has different EV policies for business vs government
|
| // entities and, in the case of cross-signing, we might need to list another
|
| // CA's policy OID under the cross-signing root.
|
| static const size_t kMaxOIDsPerCA = 2;
|
| @@ -48,8 +48,7 @@ static const EVMetadata ev_root_ca_metadata[] = {
|
| 0x30, 0x50, 0xba, 0x9e, 0xa8, 0x7e, 0xfe, 0x9a, 0xce, 0x3c}},
|
| {
|
| // AC Camerfirma uses the last two arcs to track how the private key
|
| - // is
|
| - // managed - the effective verification policy is the same.
|
| + // is managed - the effective verification policy is the same.
|
| "1.3.6.1.4.1.17326.10.14.2.1.2", "1.3.6.1.4.1.17326.10.14.2.2.2",
|
| },
|
| },
|
| @@ -60,8 +59,7 @@ static const EVMetadata ev_root_ca_metadata[] = {
|
| 0xc7, 0x52, 0xa1, 0x2c, 0x5b, 0x29, 0xf6, 0xd6, 0xaa, 0x0c}},
|
| {
|
| // AC Camerfirma uses the last two arcs to track how the private key
|
| - // is
|
| - // managed - the effective verification policy is the same.
|
| + // is managed - the effective verification policy is the same.
|
| "1.3.6.1.4.1.17326.10.8.12.1.2", "1.3.6.1.4.1.17326.10.8.12.2.2",
|
| },
|
| },
|
|
|