Skip to content

Commit 06662f7

Browse files
authored
Merge pull request #235 from tomato42/typos
fix lie->lay typo
2 parents b1d5d35 + c07b36e commit 06662f7

File tree

3 files changed

+10
-10
lines changed

3 files changed

+10
-10
lines changed

src/ecdsa/ecdsa.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -118,7 +118,7 @@ def __init__(self, generator, point, verify=True):
118118
:param bool verify: if True check if point is valid point on curve
119119
120120
:raises InvalidPointError: if the point parameters are invalid or
121-
point does not lie on the curve
121+
point does not lay on the curve
122122
"""
123123

124124
self.curve = generator.curve()
@@ -131,7 +131,7 @@ def __init__(self, generator, point, verify=True):
131131
"The public point has x or y out of range."
132132
)
133133
if verify and not self.curve.contains_point(point.x(), point.y()):
134-
raise InvalidPointError("Point does not lie on the curve")
134+
raise InvalidPointError("Point does not lay on the curve")
135135
if not n:
136136
raise InvalidPointError("Generator point must have order.")
137137
# for curve parameters with base point with cofactor 1, all points

src/ecdsa/ellipticcurve.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -232,7 +232,7 @@ def __setstate__(self, state):
232232
def __eq__(self, other):
233233
"""Compare for equality two points with each-other.
234234
235-
Note: only points that lie on the same curve can be equal.
235+
Note: only points that lay on the same curve can be equal.
236236
"""
237237
try:
238238
self._update_lock.reader_acquire()
@@ -772,7 +772,7 @@ def __init__(self, curve, x, y, order=None):
772772
def __eq__(self, other):
773773
"""Return True if the points are identical, False otherwise.
774774
775-
Note: only points that lie on the same curve can be equal.
775+
Note: only points that lay on the same curve can be equal.
776776
"""
777777
if isinstance(other, Point):
778778
return (

src/ecdsa/keys.py

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -213,11 +213,11 @@ def from_public_point(
213213
verification, needs to implement the same interface
214214
as hashlib.sha1
215215
:type hashfunc: callable
216-
:type bool validate_point: whether to check if the point lies on curve
216+
:type bool validate_point: whether to check if the point lays on curve
217217
should always be used if the public point is not a result
218218
of our own calculation
219219
220-
:raises MalformedPointError: if the public point does not lie on the
220+
:raises MalformedPointError: if the public point does not lay on the
221221
curve
222222
223223
:return: Initialised VerifyingKey object
@@ -233,7 +233,7 @@ def from_public_point(
233233
curve.generator, point, validate_point
234234
)
235235
except ecdsa.InvalidPointError:
236-
raise MalformedPointError("Point does not lie on the curve")
236+
raise MalformedPointError("Point does not lay on the curve")
237237
self.pubkey.order = curve.order
238238
return self
239239

@@ -347,16 +347,16 @@ def from_string(
347347
348348
:param string: single point encoding of the public key
349349
:type string: :term:`bytes-like object`
350-
:param curve: the curve on which the public key is expected to lie
350+
:param curve: the curve on which the public key is expected to lay
351351
:type curve: ecdsa.curves.Curve
352352
:param hashfunc: The default hash function that will be used for
353353
verification, needs to implement the same interface as hashlib.sha1
354354
:type hashfunc: callable
355-
:param validate_point: whether to verify that the point lies on the
355+
:param validate_point: whether to verify that the point lays on the
356356
provided curve or not, defaults to True
357357
:type validate_point: bool
358358
359-
:raises MalformedPointError: if the public point does not lie on the
359+
:raises MalformedPointError: if the public point does not lay on the
360360
curve or the encoding is invalid
361361
362362
:return: Initialised VerifyingKey object

0 commit comments

Comments
 (0)