diff options
author | Donald Stufft <donald@stufft.io> | 2015-09-24 22:55:16 -0400 |
---|---|---|
committer | Donald Stufft <donald@stufft.io> | 2015-09-24 22:55:16 -0400 |
commit | 1bcc7dad52619e2ce9e56d1b2cc20ec195276f43 (patch) | |
tree | 7d13c85da2bb1e5058b36ef2490678cf387fcda1 /docs/hazmat/primitives | |
parent | 8208fe6a9b92bc7e7060448d75d1641bda62fc8a (diff) | |
parent | c79a81cb579551136e80d63a3479f619e2064618 (diff) | |
download | cryptography-1bcc7dad52619e2ce9e56d1b2cc20ec195276f43.tar.gz cryptography-1bcc7dad52619e2ce9e56d1b2cc20ec195276f43.tar.bz2 cryptography-1bcc7dad52619e2ce9e56d1b2cc20ec195276f43.zip |
Merge pull request #2365 from alex/grammar
some commas that look correct
Diffstat (limited to 'docs/hazmat/primitives')
-rw-r--r-- | docs/hazmat/primitives/asymmetric/ec.rst | 2 | ||||
-rw-r--r-- | docs/hazmat/primitives/asymmetric/rsa.rst | 2 |
2 files changed, 2 insertions, 2 deletions
diff --git a/docs/hazmat/primitives/asymmetric/ec.rst b/docs/hazmat/primitives/asymmetric/ec.rst index 01671d44..6356c278 100644 --- a/docs/hazmat/primitives/asymmetric/ec.rst +++ b/docs/hazmat/primitives/asymmetric/ec.rst @@ -138,7 +138,7 @@ Generally the NIST prime field ("P") curves are significantly faster than the other types suggested by NIST at both signing and verifying with ECDSA. Prime fields also `minimize the number of security concerns for elliptic-curve -cryptography`_. However there is `some concern`_ that both the prime field and +cryptography`_. However, there is `some concern`_ that both the prime field and binary field ("B") NIST curves may have been weakened during their generation. Currently `cryptography` only supports NIST curves, none of which are diff --git a/docs/hazmat/primitives/asymmetric/rsa.rst b/docs/hazmat/primitives/asymmetric/rsa.rst index e8bbf5ce..a67ea47f 100644 --- a/docs/hazmat/primitives/asymmetric/rsa.rst +++ b/docs/hazmat/primitives/asymmetric/rsa.rst @@ -421,7 +421,7 @@ Handling partial RSA private keys If you are trying to load RSA private keys yourself you may find that not all parameters required by ``RSAPrivateNumbers`` are available. In particular the `Chinese Remainder Theorem`_ (CRT) values ``dmp1``, ``dmq1``, ``iqmp`` may be -missing or present in a different form. For example `OpenPGP`_ does not include +missing or present in a different form. For example, `OpenPGP`_ does not include the ``iqmp``, ``dmp1`` or ``dmq1`` parameters. The following functions are provided for users who want to work with keys like |