diff options
author | Simo Sorce <simo@redhat.com> | 2015-03-18 14:14:00 -0400 |
---|---|---|
committer | Simo Sorce <simo@redhat.com> | 2015-03-18 14:14:45 -0400 |
commit | 9e1786f9c2700d907c7ebb99cd8e0f34822d5af7 (patch) | |
tree | d226994d9f229811490a3a806b393e27a8201522 | |
parent | 3481090ea41b4a04552da580f44d229735f5dd7e (diff) | |
download | jwcrypto-9e1786f9c2700d907c7ebb99cd8e0f34822d5af7.tar.gz jwcrypto-9e1786f9c2700d907c7ebb99cd8e0f34822d5af7.tar.xz jwcrypto-9e1786f9c2700d907c7ebb99cd8e0f34822d5af7.zip |
Fix typos
Signed-off-by: Simo Sorce <simo@redhat.com>
-rw-r--r-- | jwcrypto/jwe.py | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/jwcrypto/jwe.py b/jwcrypto/jwe.py index 8a9e4b6..b761ff9 100644 --- a/jwcrypto/jwe.py +++ b/jwcrypto/jwe.py @@ -61,7 +61,7 @@ class InvalidJWEData(Exception): class InvalidCEKeyLength(Exception): def __init__(self, expected, obtained): - msg = 'Expected key og length %d, got %d' % (expected, obtained) + msg = 'Expected key of length %d, got %d' % (expected, obtained) super(InvalidCEKeyLength, self).__init__(msg) @@ -133,7 +133,7 @@ class _aes_kw(_raw_key_mgmt): cek = os.urandom(keylen) rk = base64url_decode(key.get_op_key('encrypt')) - # Implement RFC 3994 Key Unwrap - 2.2.2 + # Implement RFC 3394 Key Unwrap - 2.2.2 # TODO: Use cryptography once issue #1733 is resolved iv = 'a6a6a6a6a6a6a6a6' A = iv.decode('hex') @@ -155,7 +155,7 @@ class _aes_kw(_raw_key_mgmt): self.check_key(key) rk = base64url_decode(key.get_op_key('decrypt')) - # Implement RFC 3994 Key Unwrap - 2.2.3 + # Implement RFC 3394 Key Unwrap - 2.2.3 # TODO: Use cryptography once issue #1733 is resolved iv = 'a6a6a6a6a6a6a6a6' Aiv = iv.decode('hex') |