Skip to content

Commit b12dabf

Browse files
authored
Fix small typos (#908)
1 parent 26f5dc3 commit b12dabf

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

README.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -321,7 +321,7 @@ If you would like to help, but don't know where to start, please visit the
321321
ones there, and we'll be happy to discuss and answer questions in the issue comments.
322322

323323
If any of those don't appeal to you, no worries! Any help you would like to offer would be
324-
appreciated based on the above caveats concerning [contributing pull reqeuests](#contributing-pull-requests). Feel free
324+
appreciated based on the above caveats concerning [contributing pull requests](#contributing-pull-requests). Feel free
325325
to [discuss or ask questions first](https://github.com/jwtk/jjwt/discussions) if you're not sure. :)
326326

327327
<a name="overview"></a>
@@ -2282,7 +2282,7 @@ During JWE creation, these algorithms:
22822282
22832283
* Obtain the Content Encryption Key (CEK) used to encrypt the JWE payload as follows:
22842284
* Inspect the JWE recipient's Elliptic Curve public key and determine its Curve.
2285-
* Generate a new secure-random ephemeral Ellipic Curve public/private key pair on this same Curve.
2285+
* Generate a new secure-random ephemeral Elliptic Curve public/private key pair on this same Curve.
22862286
* Add the ephemeral EC public key to the JWE
22872287
[epk header](https://www.rfc-editor.org/rfc/rfc7518.html#section-4.6.1.1) for inclusion in the final JWE.
22882288
* Produce an ECDH shared secret with the ECDH Key Agreement algorithm using the JWE recipient's EC public key
@@ -2628,7 +2628,7 @@ OctetPrivateJwk edEcPrivJwk = Jwks.builder().octetKeyPair(edEcKeyPair).build();
26282628
```
26292629

26302630
Note that:
2631-
* An exception will thrown when calling `rsaKeyPair` if the specified `KeyPair` instance does not contain
2631+
* An exception will be thrown when calling `rsaKeyPair` if the specified `KeyPair` instance does not contain
26322632
`RSAPublicKey` and `RSAPrivateKey` instances.
26332633
* Similarly, an exception will be thrown when calling `ecKeyPair` if
26342634
the `KeyPair` instance does not contain `ECPublicKey` and `ECPrivateKey` instances.
@@ -2766,7 +2766,7 @@ For example, consider the following Secret JWK JSON example from
27662766
}
27672767
```
27682768
2769-
The `k` value (`AyAyM1SysPpby...`) reflects secure key material and should never be accidentially
2769+
The `k` value (`AyAyM1SysPpby...`) reflects secure key material and should never be accidentally
27702770
exposed.
27712771
27722772
If you were to parse this JSON as a `Jwk`, calling `toString()` will _NOT_ print this value. It will
@@ -2992,7 +2992,7 @@ Jwts.parser()
29922992
<a name="json-jackson-custom-types"></a>
29932993
#### Parsing of Custom Claim Types
29942994

2995-
By default JJWT will only convert simple claim types: String, Date, Long, Integer, Short and Byte. If you need to
2995+
By default, JJWT will only convert simple claim types: String, Date, Long, Integer, Short and Byte. If you need to
29962996
deserialize other types you can configure the `JacksonDeserializer` by passing a `Map` of claim names to types in
29972997
through a constructor. For example:
29982998

@@ -3211,7 +3211,7 @@ characters at the end of a Base64 string may not work and can often result in an
32113211
##### Adding Invalid Characters
32123212
32133213
JJWT's default Base64/Base64URL decoders automatically ignore illegal Base64 characters located in the beginning and
3214-
end of an encoded string. Therefore prepending or appending invalid characters like `{` or `]` or similar will also
3214+
end of an encoded string. Therefore, prepending or appending invalid characters like `{` or `]` or similar will also
32153215
not fail JJWT's signature checks either. Why?
32163216
32173217
Because such edits - whether changing a trailing character or two, or appending invalid characters - do not actually
@@ -3524,7 +3524,7 @@ assert "me".equals(issuer);
35243524
<a name="example-jwe-ecdhes"></a>
35253525
### JWT Encrypted with ECDH-ES
35263526

3527-
This is an example showing how to encrypt and decrypt a JWT using Elliptic Curve Diffie-Hellman Ephmeral Static
3527+
This is an example showing how to encrypt and decrypt a JWT using Elliptic Curve Diffie-Hellman Ephemeral Static
35283528
Key Agreement (ECDH-ES) algorithms.
35293529

35303530
These algorithms use ECDH-ES to encrypt and decrypt a secure-random key, and that

0 commit comments

Comments
 (0)