diff options
author | Tor Brede Vekterli <vekterli@yahooinc.com> | 2023-06-06 13:21:07 +0200 |
---|---|---|
committer | Tor Brede Vekterli <vekterli@yahooinc.com> | 2023-06-06 13:43:51 +0200 |
commit | 2e1dd2e4dde2bbb335bd1eedf545c5c19319372f (patch) | |
tree | fe074ffd16d033ab605e55e85302e9b7159d6dda /security-utils/src | |
parent | 071d65629215994094b580861e06edb760958af2 (diff) |
Fix some silly typos
Diffstat (limited to 'security-utils/src')
-rw-r--r-- | security-utils/src/main/java/com/yahoo/security/HKDF.java | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/security-utils/src/main/java/com/yahoo/security/HKDF.java b/security-utils/src/main/java/com/yahoo/security/HKDF.java index ca9a111b5c4..3692937c797 100644 --- a/security-utils/src/main/java/com/yahoo/security/HKDF.java +++ b/security-utils/src/main/java/com/yahoo/security/HKDF.java @@ -97,7 +97,7 @@ public final class HKDF { * "as if random". May not be empty, use {@link #unsaltedExtractedFrom(byte[])} * if unsalted extraction is desired (though this is not recommended). * @param ikm secret initial Input Keying Material value. - * @return a new HDFK instance ready for deriving keys based on the salt and IKM. + * @return a new HKDF instance ready for deriving keys based on the salt and IKM. */ public static HKDF extractedFrom(byte[] salt, byte[] ikm) { validateExtractionParams(salt, ikm); @@ -122,7 +122,7 @@ public final class HKDF { PRK = HMAC-Hash(salt, IKM) */ - var mac = createKeyedHmacSha256(salt); // Note: HDFK is initially keyed on the salt, _not_ on ikm! + var mac = createKeyedHmacSha256(salt); // Note: HKDF is initially keyed on the salt, _not_ on ikm! mac.update(ikm); return new HKDF(/*PRK = */ mac.doFinal()); } @@ -133,7 +133,7 @@ public final class HKDF { * <p>Prefer using the salted {@link #extractedFrom(byte[], byte[])} method if possible.</p> * * @param ikm secret initial Input Keying Material value. - * @return a new HDFK instance ready for deriving keys based on the IKM and an all-zero salt. + * @return a new HKDF instance ready for deriving keys based on the IKM and an all-zero salt. */ public static HKDF unsaltedExtractedFrom(byte[] ikm) { return extractedFrom(ALL_ZEROS_SALT, ikm); |