aboutsummaryrefslogtreecommitdiffstats
path: root/doc-src/ssl.html
diff options
context:
space:
mode:
authorAldo Cortesi <aldo@nullcube.com>2011-03-30 12:05:50 +1300
committerAldo Cortesi <aldo@nullcube.com>2011-03-30 12:05:50 +1300
commitf12510d9794c155657e80864529e0198872e7d7d (patch)
tree8d393ac81ef8929821e4e587af8fe59bd2d2cba5 /doc-src/ssl.html
parent60aa16fc56d67506886315818773d6fedddb2d4f (diff)
downloadmitmproxy-f12510d9794c155657e80864529e0198872e7d7d.tar.gz
mitmproxy-f12510d9794c155657e80864529e0198872e7d7d.tar.bz2
mitmproxy-f12510d9794c155657e80864529e0198872e7d7d.zip
Spell-check docs, setup.py fixes, add missing files to manifest.
Diffstat (limited to 'doc-src/ssl.html')
-rw-r--r--doc-src/ssl.html2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc-src/ssl.html b/doc-src/ssl.html
index a8004082..7ee9438e 100644
--- a/doc-src/ssl.html
+++ b/doc-src/ssl.html
@@ -27,7 +27,7 @@ a browser, just accepting the bogus SSL cert manually is not too much trouble,
but there are a number of cases where you will want to configure your testing
system or browser to trust the __mitmproxy__ CA as a signing root authority:
-- If you are testing non-browser software that checks SSL cert validiy using
+- If you are testing non-browser software that checks SSL cert validity using
the system certificate store.
- You are testing an app that makes non-interactive (JSONP, script src, etc.)
requests to SSL resources. Another workaround in this case is to manually visit