Skip to content

Commit 7d73676

Browse files
authored
Merge pull request #202 from Chandra158/fix-typos
2 parents c1b6c09 + 0c013c7 commit 7d73676

File tree

4 files changed

+6
-6
lines changed

4 files changed

+6
-6
lines changed

webauthn/helpers/decode_credential_public_key.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ def decode_credential_public_key(
4141
4242
Supports OKP, EC2, and RSA public keys
4343
"""
44-
# Occassionally we might be given a public key in an "uncompressed" format,
44+
# Occasionally we might be given a public key in an "uncompressed" format,
4545
# typically from older U2F security keys. As per the FIDO spec this is indicated by
4646
# a leading 0x04 "uncompressed point compression method" format byte. In that case
4747
# we need to fill in some blanks to turn it into a full EC2 key for signature

webauthn/helpers/structs.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -260,7 +260,7 @@ class CollectedClientData:
260260
`type`: Either `"webauthn.create"` or `"webauthn.get"`, for registration and authentication ceremonies respectively
261261
`challenge`: The challenge passed to the authenticator within the options
262262
`origin`: The base domain with protocol on which the registration or authentication ceremony took place (e.g. "https://foo.bar")
263-
(optional) `cross_origin`: Whether or not the the registration or authentication ceremony took place on a different origin (think within an <iframe>)
263+
(optional) `cross_origin`: Whether or not the registration or authentication ceremony took place on a different origin (think within an <iframe>)
264264
(optional) `token_binding`: Information on the state of the Token Binding protocol
265265
266266
https://www.w3.org/TR/webauthn-2/#dictdef-collectedclientdata
@@ -332,7 +332,7 @@ class RegistrationCredential:
332332
Attributes:
333333
`id`: The Base64URL-encoded representation of raw_id
334334
`raw_id`: A byte sequence representing the credential's unique identifier
335-
`response`: The authenticator's attesation data
335+
`response`: The authenticator's attestation data
336336
`type`: The literal string `"public-key"`
337337
338338
https://www.w3.org/TR/webauthn-2/#publickeycredential

webauthn/helpers/verify_signature.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -45,8 +45,8 @@ def verify_signature(
4545
`data`: Data signed by private key
4646
4747
Raises:
48-
`webauth.helpers.exceptions.UnsupportedAlgorithm` when the algorithm is not a recognized COSE algorithm ID
49-
`webauth.helpers.exceptions.UnsupportedPublicKey` when the public key is not a valid EC2, RSA, or OKP certificate
48+
`webauthn.helpers.exceptions.UnsupportedAlgorithm` when the algorithm is not a recognized COSE algorithm ID
49+
`webauthn.helpers.exceptions.UnsupportedPublicKey` when the public key is not a valid EC2, RSA, or OKP certificate
5050
`cryptography.exceptions.InvalidSignature` when the signature cannot be verified
5151
"""
5252
if isinstance(public_key, EllipticCurvePublicKey):

webauthn/registration/verify_registration_response.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ def verify_registration_response(
8181
stringified JSON object, a plain dict, or an instance of RegistrationCredential
8282
- `expected_challenge`: The challenge passed to the authenticator within the preceding
8383
registration options.
84-
- `expected_rp_id`: The Relying Party's unique identifier as specified in the precending
84+
- `expected_rp_id`: The Relying Party's unique identifier as specified in the preceding
8585
registration options.
8686
- `expected_origin`: The domain, with HTTP protocol (e.g. "https://domain.here"), on which
8787
the registration should have occurred. Can also be a list of expected origins.

0 commit comments

Comments
 (0)