diff options
author | Alex Gaynor <alex.gaynor@gmail.com> | 2016-06-04 15:53:34 -0700 |
---|---|---|
committer | Paul Kehrer <paul.l.kehrer@gmail.com> | 2016-06-04 15:53:34 -0700 |
commit | 8d15ba8070c977d9c48a87d34beefb0959ca091b (patch) | |
tree | da84e698138deaa89836414432c2c6de32abfc75 /docs/hazmat/primitives | |
parent | fb5e7d4dfb599a5b6e49948e49fe8926694d12d7 (diff) | |
download | cryptography-8d15ba8070c977d9c48a87d34beefb0959ca091b.tar.gz cryptography-8d15ba8070c977d9c48a87d34beefb0959ca091b.tar.bz2 cryptography-8d15ba8070c977d9c48a87d34beefb0959ca091b.zip |
Clean up some of the nonsense in our DSA docs. (#2969)
Fixes #1478
Diffstat (limited to 'docs/hazmat/primitives')
-rw-r--r-- | docs/hazmat/primitives/asymmetric/dsa.rst | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/docs/hazmat/primitives/asymmetric/dsa.rst b/docs/hazmat/primitives/asymmetric/dsa.rst index 1429cb09..93d0db6f 100644 --- a/docs/hazmat/primitives/asymmetric/dsa.rst +++ b/docs/hazmat/primitives/asymmetric/dsa.rst @@ -41,9 +41,9 @@ Generation Generate DSA parameters using the provided ``backend``. - :param int key_size: The length of the modulus in bits. It should be - either 1024, 2048 or 3072. For keys generated in 2015 this should - be `at least 2048`_ (See page 41). Note that some applications + :param int key_size: The length of :attr:`~DSAParameterNumbers.q`. It + should be either 1024, 2048 or 3072. For keys generated in 2015 this + should be `at least 2048`_ (See page 41). Note that some applications (such as SSH) have not yet gained support for larger key sizes specified in FIPS 186-3 and are still restricted to only the 1024-bit keys specified in FIPS 186-2. @@ -287,7 +287,7 @@ Key interfaces :type: int - The bit length of the modulus. + The bit length of :attr:`~DSAParameterNumbers.q`. .. class:: DSAPrivateKeyWithSerialization @@ -344,7 +344,7 @@ Key interfaces :type: int - The bit length of the modulus. + The bit length of :attr:`~DSAParameterNumbers.q`. .. method:: parameters() |