@@ -56,7 +56,7 @@ mechanism. You can use this to acquire a byte array of the appropriate length
56
56
When you have a key in a file on your hard drive
57
57
................................................
58
58
59
- If you already has a key, like if you have a PEM encoded private RSA key in
59
+ If you already have a key, like if you have a PEM encoded private RSA key in
60
60
a file on your machine you can load it this way::
61
61
62
62
>>> from cryptojwt.jwk.rsa import RSAKey
@@ -96,7 +96,7 @@ Exporting keys
96
96
..............
97
97
98
98
When it comes to exporting keys, a :py:class: `cryptojwt.jwk.JWK ` instance
99
- only know how to serialize into the format described in JWK _.
99
+ only knows how to serialize into the format described in JWK _.
100
100
101
101
>>> from cryptojwt.jwk.rsa import new_rsa_key
102
102
>>> rsa_key = new_rsa_key()
@@ -234,12 +234,12 @@ keys in the key bundle::
234
234
>>> len(_keys)
235
235
2
236
236
237
- It turns out the key bundle now contains 2 keys. Both the keys that are in the
237
+ It turns out the key bundle now contains 2 keys; both the keys that are in the
238
238
file.
239
239
240
240
If the change is that one key is removed then something else happens.
241
- Assume we add one key and remove one of the ones that was there before.
242
- The file now contain 2 keys, and you might expect the key bundle to do the
241
+ Assume we add one key and remove one of the keys that was there before.
242
+ The file now contains 2 keys, and you might expect the key bundle to do the
243
243
same::
244
244
245
245
>>> _keys = kb.keys()
@@ -278,7 +278,7 @@ Creating a key jar with your own newly minted keys you would do:
278
278
**Note ** also that different RSA keys are minted for signing and for encryption.
279
279
280
280
You can also use :py:func: `cryptojwt.keyjar.init_key_jar ` which will
281
- load keys from disc if they are there and if not mint new.::
281
+ load keys from disk if they are there and if not mint new.::
282
282
283
283
>>> from cryptojwt.key_jar import build_keyjar
284
284
>>> import os
@@ -318,8 +318,8 @@ The last line can also be expressed as::
318
318
319
319
>>> keyjar[''] = kb
320
320
321
- **Note ** both variants adds a key bundle to the list of key bundles that
322
- belongs to '', it does not overwrite anything that was already there.
321
+ **Note ** both variants add a key bundle to the list of key bundles that
322
+ belong to '', it does not overwrite anything that was already there.
323
323
324
324
Adding a JWKS is such a common thing that there is a simpler way to do it::
325
325
@@ -346,7 +346,7 @@ When dealing with signed and/or encrypted JSON Web Tokens
346
346
:py:class: `cryptojwt.key_jar.KeyJar ` has these nice methods.
347
347
348
348
get_jwt_verify_keys
349
- :py:func: `cryptojwt.key_jar.KeyJar.get_jwt_verify_keys ` takes an
349
+ :py:func: `cryptojwt.key_jar.KeyJar.get_jwt_verify_keys ` takes a
350
350
signed JWT as input and returns a set of keys that
351
351
can be used to verify the signature. The set you get back is a best
352
352
estimate and might not contain **the ** key. How good the estimate is
0 commit comments