@@ -282,7 +282,7 @@ var digestInfoValidator = {
282282 constructed : false ,
283283 capture : 'algorithmIdentifier'
284284 } , {
285- // NULL paramters
285+ // NULL parameters
286286 name : 'DigestInfo.DigestAlgorithm.parameters' ,
287287 tagClass : asn1 . Class . UNIVERSAL ,
288288 type : asn1 . Type . NULL ,
@@ -316,7 +316,7 @@ var digestInfoValidator = {
316316 *
317317 * @param md the message digest object with the hash to sign.
318318 *
319- * @return the encoded message (ready for RSA encrytion )
319+ * @return the encoded message (ready for RSA encryption )
320320 */
321321var emsaPkcs1v15encode = function ( md ) {
322322 // get the oid for the algorithm
@@ -498,7 +498,7 @@ var _modPow = function(x, key, pub) {
498498 *
499499 * The parameter bt controls whether to put padding bytes before the
500500 * message passed in. Set bt to either true or false to disable padding
501- * completely (in order to handle e.g. EMSA-PSS encoding seperately before),
501+ * completely (in order to handle e.g. EMSA-PSS encoding separately before),
502502 * signaling whether the encryption operation is a public key operation
503503 * (i.e. encrypting data) or not, i.e. private key operation (data signing).
504504 *
@@ -1173,7 +1173,7 @@ pki.setRsaPublicKey = pki.rsa.setPublicKey = function(n, e) {
11731173 }
11741174 // check hash algorithm identifier
11751175 // see PKCS1-v1-5DigestAlgorithms in RFC 8017
1176- // FIXME: add support to vaidator for strict value choices
1176+ // FIXME: add support to validator for strict value choices
11771177 var oid = asn1 . derToOid ( capture . algorithmIdentifier ) ;
11781178 if ( ! ( oid === forge . oids . md2 ||
11791179 oid === forge . oids . md5 ||
@@ -1196,7 +1196,7 @@ pki.setRsaPublicKey = pki.rsa.setPublicKey = function(n, e) {
11961196 throw new Error (
11971197 'ASN.1 object does not contain a valid RSASSA-PKCS1-v1_5 ' +
11981198 'DigestInfo value. ' +
1199- 'Missing algorithm identifer NULL parameters.' ) ;
1199+ 'Missing algorithm identifier NULL parameters.' ) ;
12001200 }
12011201 }
12021202
@@ -1637,7 +1637,7 @@ function _decodePkcs1_v1_5(em, key, pub, ml) {
16371637
16381638 1. The encryption block EB cannot be parsed unambiguously.
16391639 2. The padding string PS consists of fewer than eight octets
1640- or is inconsisent with the block type BT.
1640+ or is inconsistent with the block type BT.
16411641 3. The decryption process is a public-key operation and the block
16421642 type BT is not 00 or 01, or the decryption process is a
16431643 private-key operation and the block type is not 02.
0 commit comments