X-Git-Url: https://git.opendaylight.org/gerrit/gitweb?a=blobdiff_plain;f=netconf%2Fsal-netconf-connector%2Fsrc%2Fmain%2Fyang%2Fnetconf-keystore.yang;h=b4c1c5d0ec00156d1aff9734bf7ecb3d4dad299f;hb=1d9e997c99123013f4370172d33df882ff9847b4;hp=dba3b35ba5626b41d2a5f38016f59084ebb4027f;hpb=04467f3b89c536d611c54c1ecd6a8da24eb6beef;p=netconf.git diff --git a/netconf/sal-netconf-connector/src/main/yang/netconf-keystore.yang b/netconf/sal-netconf-connector/src/main/yang/netconf-keystore.yang index dba3b35ba5..b4c1c5d0ec 100644 --- a/netconf/sal-netconf-connector/src/main/yang/netconf-keystore.yang +++ b/netconf/sal-netconf-connector/src/main/yang/netconf-keystore.yang @@ -9,7 +9,7 @@ module netconf-keystore { description "Store used for key based Credentials for Netconf SBP. Before a connector with key based authentication is created it needs to have a record for the key pair it uses. All the records here need to be encrypted as they contain sensitive data. Therefore NEVER do direct writes and only use the provided - RPC's for adding/removing key entries."; + RPCs for adding/removing key entries."; grouping keystore-entry { list key-credential { @@ -22,16 +22,16 @@ module netconf-keystore { leaf private-key { description "Base64 encoded private key that should be used for authentication with a netconf device. Do not include a public key as that is calculated from the private key. - DO NOT write this directly into the datastore, use the provided rpc's as these will - encrypt the key before the entry is written into the datastore."; + DO NOT write this directly into the data store, use the provided RPCs as these will + encrypt the key before the entry is written into the data store."; type string; } leaf passphrase { description "If the provided key is encrypted by a passphrase this needs to be included. Leave empty if the key does not have a passphrase. - DO NOT write write this directly into the datastore, use the provided rpc's as these will - encrypt the passhprase before the entry is written into the datastore."; + DO NOT write write this directly into the data store, use the provided RPCs as these will + encrypt the passphrase before the entry is written into the data store."; type string; } } @@ -59,8 +59,8 @@ module netconf-keystore { grouping trusted-certificates { list trusted-certificate { key name; - description "A list of trusted certificate. These cerfitifcates can be used by a server to - authenticate clients, or by clients to authenticate servers."; + description "A list of trusted certificate. These certificates can be used by a server to authenticate + clients, or by clients to authenticate servers."; leaf name { type string; } @@ -79,15 +79,15 @@ module netconf-keystore { } rpc add-keystore-entry { - description "Use this rpc to add a single or multiple new keys into the keystore. The private key - and passphrase will both be encrypted before they are written into the datastore."; + description "Use this rpc to add a single or multiple new keys into the keystore. The private key and passphrase + will both be encrypted before they are written into the data store."; input { uses keystore-entry; } } rpc remove-keystore-entry { - description "Use this rpc to remove a single or multiple keys from the datastore."; + description "Use this rpc to remove a single or multiple keys from the data store."; input { leaf-list key-id { type string; @@ -103,7 +103,7 @@ module netconf-keystore { } rpc remove-private-key { - description "Remove a list of private keys from the datastore."; + description "Remove a list of private keys from the data store."; input { leaf-list name { type string; @@ -119,7 +119,7 @@ module netconf-keystore { } rpc remove-trusted-certificate { - description "Remove a list of trusted certificates from the datastore."; + description "Remove a list of trusted certificates from the data store."; input { leaf-list name { type string;