summaryrefslogtreecommitdiffstats
path: root/security-utils
diff options
context:
space:
mode:
authorTor Brede Vekterli <vekterli@yahooinc.com>2023-06-06 13:21:07 +0200
committerTor Brede Vekterli <vekterli@yahooinc.com>2023-06-06 13:43:51 +0200
commit2e1dd2e4dde2bbb335bd1eedf545c5c19319372f (patch)
treefe074ffd16d033ab605e55e85302e9b7159d6dda /security-utils
parent071d65629215994094b580861e06edb760958af2 (diff)
Fix some silly typos
Diffstat (limited to 'security-utils')
-rw-r--r--security-utils/src/main/java/com/yahoo/security/HKDF.java6
1 files changed, 3 insertions, 3 deletions
diff --git a/security-utils/src/main/java/com/yahoo/security/HKDF.java b/security-utils/src/main/java/com/yahoo/security/HKDF.java
index ca9a111b5c4..3692937c797 100644
--- a/security-utils/src/main/java/com/yahoo/security/HKDF.java
+++ b/security-utils/src/main/java/com/yahoo/security/HKDF.java
@@ -97,7 +97,7 @@ public final class HKDF {
* "as if random". May not be empty, use {@link #unsaltedExtractedFrom(byte[])}
* if unsalted extraction is desired (though this is not recommended).
* @param ikm secret initial Input Keying Material value.
- * @return a new HDFK instance ready for deriving keys based on the salt and IKM.
+ * @return a new HKDF instance ready for deriving keys based on the salt and IKM.
*/
public static HKDF extractedFrom(byte[] salt, byte[] ikm) {
validateExtractionParams(salt, ikm);
@@ -122,7 +122,7 @@ public final class HKDF {
PRK = HMAC-Hash(salt, IKM)
*/
- var mac = createKeyedHmacSha256(salt); // Note: HDFK is initially keyed on the salt, _not_ on ikm!
+ var mac = createKeyedHmacSha256(salt); // Note: HKDF is initially keyed on the salt, _not_ on ikm!
mac.update(ikm);
return new HKDF(/*PRK = */ mac.doFinal());
}
@@ -133,7 +133,7 @@ public final class HKDF {
* <p>Prefer using the salted {@link #extractedFrom(byte[], byte[])} method if possible.</p>
*
* @param ikm secret initial Input Keying Material value.
- * @return a new HDFK instance ready for deriving keys based on the IKM and an all-zero salt.
+ * @return a new HKDF instance ready for deriving keys based on the IKM and an all-zero salt.
*/
public static HKDF unsaltedExtractedFrom(byte[] ikm) {
return extractedFrom(ALL_ZEROS_SALT, ikm);