diff --git a/docs/receiving/process-and-acknowledge.mdx b/docs/receiving/process-and-acknowledge.mdx index fb79641e8eca53f322827aed168e881fa9df018e..60a35130886810454391b31f9744657522578303 100644 --- a/docs/receiving/process-and-acknowledge.mdx +++ b/docs/receiving/process-and-acknowledge.mdx @@ -71,7 +71,7 @@ public static void validateRSAKey(RSAKey RSAKey, boolean isPrivate){ if(isPrivate){ validateTrueOrElseThrow(RSAKey.getKeyOperations().size() == 1 && RSAKey.getKeyOperations().contains(KeyOperation.SIGN), - "The specified privatec key is not intended for 'sign' as specified through key operation.") + "The specified private key is not intended for 'sign' as specified through key operation.") } else{ validateTrueOrElseThrow(RSAKey.getKeyOperations().size() == 1 && diff --git a/docs/sending/encrypt.mdx b/docs/sending/encrypt.mdx index bb52f605f3c98ca509111914d101fdabea098c1d..a52e564737431180aa048d753fa071715e0a9172 100644 --- a/docs/sending/encrypt.mdx +++ b/docs/sending/encrypt.mdx @@ -58,7 +58,7 @@ Eine Prüfung der Zertifikate kann in diesem Fall zu Testzwecken entfallen. Weitere Informationen zur Gültigkeitsprüfung finden sich in der technischen Richtlinie [BSI TR-02103](https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Publikationen/TechnischeRichtlinien/TR02103/BSI-TR-02103.pdf?__blob=publicationFile&v=4) des BSI. -Der [folgende Code](https://git.fitko.de/fit-connect/examples/) kann zur validierung des Schlüssels benutzt werden. +Der [folgende Code](https://git.fitko.de/fit-connect/examples/) kann zur Validierung der Schlüssel benutzt werden. <Tabs defaultValue="js" @@ -123,7 +123,7 @@ public static void validateRSAKey(RSAKey RSAKey, boolean isPrivate){ if(isPrivate){ validateTrueOrElseThrow(RSAKey.getKeyOperations().size() == 1 && RSAKey.getKeyOperations().contains(KeyOperation.UNWRAP_KEY), - "The specified public key is not intended for 'wrapKey' as specified through key operation."); + "The specified private key is not intended for 'unwrapKey' as specified through key operation."); } else{ validateTrueOrElseThrow(RSAKey.getKeyOperations().size() == 1 &&