@@ -321,7 +321,7 @@ If you would like to help, but don't know where to start, please visit the
321
321
ones there, and we'll be happy to discuss and answer questions in the issue comments.
322
322
323
323
If any of those don't appeal to you, no worries! Any help you would like to offer would be
324
- appreciated based on the above caveats concerning [ contributing pull reqeuests ] ( #contributing-pull-requests ) . Feel free
324
+ appreciated based on the above caveats concerning [ contributing pull requests ] ( #contributing-pull-requests ) . Feel free
325
325
to [ discuss or ask questions first] ( https://github.com/jwtk/jjwt/discussions ) if you're not sure. :)
326
326
327
327
<a name =" overview " ></a >
@@ -2282,7 +2282,7 @@ During JWE creation, these algorithms:
2282
2282
2283
2283
* Obtain the Content Encryption Key (CEK) used to encrypt the JWE payload as follows:
2284
2284
* Inspect the JWE recipient' s Elliptic Curve public key and determine its Curve .
2285
- * Generate a new secure-random ephemeral Ellipic Curve public/private key pair on this same Curve.
2285
+ * Generate a new secure-random ephemeral Elliptic Curve public/private key pair on this same Curve.
2286
2286
* Add the ephemeral EC public key to the JWE
2287
2287
[epk header](https: // www.rfc-editor.org/rfc/rfc7518.html#section-4.6.1.1) for inclusion in the final JWE.
2288
2288
* Produce an ECDH shared secret with the ECDH Key Agreement algorithm using the JWE recipient' s EC public key
@@ -2628,7 +2628,7 @@ OctetPrivateJwk edEcPrivJwk = Jwks.builder().octetKeyPair(edEcKeyPair).build();
2628
2628
```
2629
2629
2630
2630
Note that:
2631
- * An exception will thrown when calling `rsaKeyPair` if the specified `KeyPair ` instance does not contain
2631
+ * An exception will be thrown when calling `rsaKeyPair` if the specified `KeyPair ` instance does not contain
2632
2632
`RSAPublicKey ` and `RSAPrivateKey ` instances.
2633
2633
* Similarly , an exception will be thrown when calling `ecKeyPair` if
2634
2634
the `KeyPair ` instance does not contain `ECPublicKey ` and `ECPrivateKey ` instances.
@@ -2766,7 +2766,7 @@ For example, consider the following Secret JWK JSON example from
2766
2766
}
2767
2767
```
2768
2768
2769
- The `k` value (`AyAyM1SysPpby...`) reflects secure key material and should never be accidentially
2769
+ The `k` value (`AyAyM1SysPpby...`) reflects secure key material and should never be accidentally
2770
2770
exposed.
2771
2771
2772
2772
If you were to parse this JSON as a `Jwk`, calling `toString()` will _NOT_ print this value. It will
@@ -2992,7 +2992,7 @@ Jwts.parser()
2992
2992
< a name= " json-jackson-custom-types" >< / a>
2993
2993
#### Parsing of Custom Claim Types
2994
2994
2995
- By default JJWT will only convert simple claim types: String , Date , Long , Integer , Short and Byte . If you need to
2995
+ By default , JJWT will only convert simple claim types: String , Date , Long , Integer , Short and Byte . If you need to
2996
2996
deserialize other types you can configure the `JacksonDeserializer ` by passing a `Map ` of claim names to types in
2997
2997
through a constructor. For example:
2998
2998
@@ -3211,7 +3211,7 @@ characters at the end of a Base64 string may not work and can often result in an
3211
3211
##### Adding Invalid Characters
3212
3212
3213
3213
JJWT' s default Base64 / Base64URL decoders automatically ignore illegal Base64 characters located in the beginning and
3214
- end of an encoded string. Therefore prepending or appending invalid characters like `{` or `]` or similar will also
3214
+ end of an encoded string. Therefore , prepending or appending invalid characters like `{` or `]` or similar will also
3215
3215
not fail JJWT ' s signature checks either. Why?
3216
3216
3217
3217
Because such edits - whether changing a trailing character or two, or appending invalid characters - do not actually
@@ -3524,7 +3524,7 @@ assert "me".equals(issuer);
3524
3524
< a name= " example-jwe-ecdhes" >< / a>
3525
3525
### JWT Encrypted with ECDH - ES
3526
3526
3527
- This is an example showing how to encrypt and decrypt a JWT using Elliptic Curve Diffie - Hellman Ephmeral Static
3527
+ This is an example showing how to encrypt and decrypt a JWT using Elliptic Curve Diffie - Hellman Ephemeral Static
3528
3528
Key Agreement (ECDH - ES ) algorithms.
3529
3529
3530
3530
These algorithms use ECDH - ES to encrypt and decrypt a secure- random key, and that
0 commit comments