diff options
author | Paul Kehrer <paul.l.kehrer@gmail.com> | 2017-05-24 13:18:02 -0700 |
---|---|---|
committer | Alex Gaynor <alex.gaynor@gmail.com> | 2017-05-24 13:18:02 -0700 |
commit | 312d75dfde67bcd51fb9c51d4af5bceea3c6d1c1 (patch) | |
tree | dae9f2b4529c354dceb22cd38048b61240d2dfa3 /docs/hazmat/primitives | |
parent | adeaacfa567b32401d3bef848b78d078bf4393ec (diff) | |
download | cryptography-312d75dfde67bcd51fb9c51d4af5bceea3c6d1c1.tar.gz cryptography-312d75dfde67bcd51fb9c51d4af5bceea3c6d1c1.tar.bz2 cryptography-312d75dfde67bcd51fb9c51d4af5bceea3c6d1c1.zip |
Update the docs to not be redundant and wrong (#3593)
Diffstat (limited to 'docs/hazmat/primitives')
-rw-r--r-- | docs/hazmat/primitives/asymmetric/index.rst | 3 |
1 files changed, 0 insertions, 3 deletions
diff --git a/docs/hazmat/primitives/asymmetric/index.rst b/docs/hazmat/primitives/asymmetric/index.rst index 4242a0bd..e0080f0e 100644 --- a/docs/hazmat/primitives/asymmetric/index.rst +++ b/docs/hazmat/primitives/asymmetric/index.rst @@ -20,9 +20,6 @@ symmetric encryption. Someone with the public key is able to encrypt a message, providing confidentiality, and then only the person in possession of the private key is able to decrypt it. -Cryptography supports three different sets of asymmetric algorithms: RSA, DSA, -and Elliptic Curve. - .. toctree:: :maxdepth: 1 |