Browse Source

Merge pull request #1075 from BigTennEd223/typos

Nathan Fallet 1 month ago
parent
commit
b7a06ec98e
2 changed files with 2 additions and 2 deletions
  1. 1 1
      Sources/CryptoSwift/PKCS/PKCS1v15.swift
  2. 1 1
      Tests/CryptoSwiftTests/RSATests.swift

+ 1 - 1
Sources/CryptoSwift/PKCS/PKCS1v15.swift

@@ -58,7 +58,7 @@ struct EMSAPKCS1v15Padding: PaddingProtocol {
 
 /// EME PKCS1 v1.5 Padding Scheme
 ///
-/// The EME Version of the PKCS1 v1.5 padding scheme is **non deterministic** (it pads the messages contents with psuedo-random bytes)
+/// The EME Version of the PKCS1 v1.5 padding scheme is **non deterministic** (it pads the messages contents with pseudo-random bytes)
 /// ```
 /// // The returned structure
 /// // - PS is the applied padding

+ 1 - 1
Tests/CryptoSwiftTests/RSATests.swift

@@ -453,7 +453,7 @@ final class RSATests: XCTestCase {
             // Signing data requires access to the private key, therefore this should throw an error when called on a public key
             XCTAssertThrowsError(try rsa.sign(message.key.bytes, variant: variant), "Signature<\(test.key)>::Did not throw error")
 
-            // Sometimes the message is too long to be safely signed by our key. When this happens we should encouter an error and our test value should be empty.
+            // Sometimes the message is too long to be safely signed by our key. When this happens we should encounter an error and our test value should be empty.
             if test.value == "" {
               XCTAssertThrowsError(try rsa.verify(signature: Data(base64Encoded: test.value)!.bytes, for: message.key.bytes, variant: variant), "Signature<\(test.key)>::Did not throw error")
             } else {