aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--docs/contributing.rst2
-rw-r--r--docs/glossary.rst2
-rw-r--r--docs/hazmat/primitives/symmetric-encryption.rst10
-rw-r--r--docs/security.rst2
-rw-r--r--tox.ini2
5 files changed, 9 insertions, 9 deletions
diff --git a/docs/contributing.rst b/docs/contributing.rst
index 8e5b1ced..97f31e0b 100644
--- a/docs/contributing.rst
+++ b/docs/contributing.rst
@@ -132,7 +132,7 @@ as much as possible. To that end:
* When giving prescriptive advice, always provide references and supporting
material.
* When there is real disagreement between cryptographic experts, represent both
- sides of the argument and describe the tradeoffs clearly.
+ sides of the argument and describe the trade-offs clearly.
When documenting a new module in the ``hazmat`` package, its documentation
should begin with the "Hazardous Materials" warning:
diff --git a/docs/glossary.rst b/docs/glossary.rst
index e4fc8283..b6f2d06f 100644
--- a/docs/glossary.rst
+++ b/docs/glossary.rst
@@ -27,4 +27,4 @@ Glossary
asymmetric cryptography
Cryptographic operations where encryption and decryption use different
- keys. There are seperate encryption and decryption keys.
+ keys. There are separate encryption and decryption keys.
diff --git a/docs/hazmat/primitives/symmetric-encryption.rst b/docs/hazmat/primitives/symmetric-encryption.rst
index 4ef15459..eef359d6 100644
--- a/docs/hazmat/primitives/symmetric-encryption.rst
+++ b/docs/hazmat/primitives/symmetric-encryption.rst
@@ -14,11 +14,11 @@ Symmetric Encryption
Symmetric encryption is a way to encrypt (hide the plaintext value) material
-where the encrypter and decrypter both use the same key. Note that symmetric
+where the sender and receiver both use the same key. Note that symmetric
encryption is **not** sufficient for most applications, because it only
provides secrecy (an attacker can't see the message) but not authenticity (an
attacker can create bogus messages and force the application to decrypt them).
-For this reason it is *strongly* reccomended to combine encryption with a
+For this reason it is *strongly* recommended to combine encryption with a
message authentication code, such as :doc:`HMAC </hazmat/primitives/hmac>`, in
an "encrypt-then-MAC" formulation as `described by Colin Percival`_.
@@ -121,10 +121,10 @@ Algorithms
.. class:: TripleDES(key)
- Triple DES (Data Encryption Standard), sometimes refered to as 3DES, is a
- block cipher standardized by NIST. Triple DES has known cryptoanalytic
+ Triple DES (Data Encryption Standard), sometimes referred to as 3DES, is a
+ block cipher standardized by NIST. Triple DES has known crypto-analytic
flaws, however none of them currently enable a practical attack.
- Nonetheless, Triples DES is not reccomended for new applications because it
+ Nonetheless, Triples DES is not recommended for new applications because it
is incredibly slow; old applications should consider moving away from it.
:param bytes key: The secret key, either ``64``, ``128``, or ``192`` bits
diff --git a/docs/security.rst b/docs/security.rst
index 36c8e0f7..88959709 100644
--- a/docs/security.rst
+++ b/docs/security.rst
@@ -5,7 +5,7 @@ We take the security of ``cryptography`` seriously. If you believe you've
identified a security issue in it, please report it to
``alex.gaynor@gmail.com``. Message may be encrypted with PGP using key
fingerprint ``E27D 4AA0 1651 72CB C5D2 AF2B 125F 5C67 DFE9 4084`` (this public
-key is available from most commonly-used keyservers).
+key is available from most commonly-used key servers).
Once you’ve submitted an issue via email, you should receive an acknowledgment
within 48 hours, and depending on the action to be taken, you may receive
diff --git a/tox.ini b/tox.ini
index 257275ce..56603da2 100644
--- a/tox.ini
+++ b/tox.ini
@@ -7,7 +7,7 @@ deps =
coverage
pretend
commands =
- coverage run --source=cryptography/,tests/ -m pytest
+ coverage run --source=cryptography/,tests/ -m pytest --strict
coverage report -m
[testenv:docs]