Skip to content

Commit

Permalink
Merge pull request #202 from Chandra158/fix-typos
Browse files Browse the repository at this point in the history
  • Loading branch information
MasterKale committed Feb 19, 2024
2 parents c1b6c09 + 0c013c7 commit 7d73676
Show file tree
Hide file tree
Showing 4 changed files with 6 additions and 6 deletions.
2 changes: 1 addition & 1 deletion webauthn/helpers/decode_credential_public_key.py
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ def decode_credential_public_key(
Supports OKP, EC2, and RSA public keys
"""
# Occassionally we might be given a public key in an "uncompressed" format,
# Occasionally we might be given a public key in an "uncompressed" format,
# typically from older U2F security keys. As per the FIDO spec this is indicated by
# a leading 0x04 "uncompressed point compression method" format byte. In that case
# we need to fill in some blanks to turn it into a full EC2 key for signature
Expand Down
4 changes: 2 additions & 2 deletions webauthn/helpers/structs.py
Original file line number Diff line number Diff line change
Expand Up @@ -260,7 +260,7 @@ class CollectedClientData:
`type`: Either `"webauthn.create"` or `"webauthn.get"`, for registration and authentication ceremonies respectively
`challenge`: The challenge passed to the authenticator within the options
`origin`: The base domain with protocol on which the registration or authentication ceremony took place (e.g. "https://foo.bar")
(optional) `cross_origin`: Whether or not the the registration or authentication ceremony took place on a different origin (think within an <iframe>)
(optional) `cross_origin`: Whether or not the registration or authentication ceremony took place on a different origin (think within an <iframe>)
(optional) `token_binding`: Information on the state of the Token Binding protocol
https://www.w3.org/TR/webauthn-2/#dictdef-collectedclientdata
Expand Down Expand Up @@ -332,7 +332,7 @@ class RegistrationCredential:
Attributes:
`id`: The Base64URL-encoded representation of raw_id
`raw_id`: A byte sequence representing the credential's unique identifier
`response`: The authenticator's attesation data
`response`: The authenticator's attestation data
`type`: The literal string `"public-key"`
https://www.w3.org/TR/webauthn-2/#publickeycredential
Expand Down
4 changes: 2 additions & 2 deletions webauthn/helpers/verify_signature.py
Original file line number Diff line number Diff line change
Expand Up @@ -45,8 +45,8 @@ def verify_signature(
`data`: Data signed by private key
Raises:
`webauth.helpers.exceptions.UnsupportedAlgorithm` when the algorithm is not a recognized COSE algorithm ID
`webauth.helpers.exceptions.UnsupportedPublicKey` when the public key is not a valid EC2, RSA, or OKP certificate
`webauthn.helpers.exceptions.UnsupportedAlgorithm` when the algorithm is not a recognized COSE algorithm ID
`webauthn.helpers.exceptions.UnsupportedPublicKey` when the public key is not a valid EC2, RSA, or OKP certificate
`cryptography.exceptions.InvalidSignature` when the signature cannot be verified
"""
if isinstance(public_key, EllipticCurvePublicKey):
Expand Down
2 changes: 1 addition & 1 deletion webauthn/registration/verify_registration_response.py
Original file line number Diff line number Diff line change
Expand Up @@ -81,7 +81,7 @@ def verify_registration_response(
stringified JSON object, a plain dict, or an instance of RegistrationCredential
- `expected_challenge`: The challenge passed to the authenticator within the preceding
registration options.
- `expected_rp_id`: The Relying Party's unique identifier as specified in the precending
- `expected_rp_id`: The Relying Party's unique identifier as specified in the preceding
registration options.
- `expected_origin`: The domain, with HTTP protocol (e.g. "https://domain.here"), on which
the registration should have occurred. Can also be a list of expected origins.
Expand Down

0 comments on commit 7d73676

Please sign in to comment.