From ebb1cb96e4401a2636b1e8a07e896d2f2771a137 Mon Sep 17 00:00:00 2001 From: Alex Gaynor Date: Tue, 10 Jun 2014 09:36:39 -0700 Subject: Fixed a few typos --- docs/hazmat/primitives/asymmetric/serialization.rst | 2 +- docs/hazmat/primitives/symmetric-encryption.rst | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/hazmat/primitives/asymmetric/serialization.rst b/docs/hazmat/primitives/asymmetric/serialization.rst index e53d0d1f..874fce83 100644 --- a/docs/hazmat/primitives/asymmetric/serialization.rst +++ b/docs/hazmat/primitives/asymmetric/serialization.rst @@ -10,7 +10,7 @@ keys to bytes. They generally support encryption of private keys and additional key metadata. Many serialization formats support multiple different types of asymmetric keys -and will return an an instance of the appropriate type. You should check that +and will return an instance of the appropriate type. You should check that the returned key matches the type your application expects when using these methods. diff --git a/docs/hazmat/primitives/symmetric-encryption.rst b/docs/hazmat/primitives/symmetric-encryption.rst index bca78354..bcb1fb35 100644 --- a/docs/hazmat/primitives/symmetric-encryption.rst +++ b/docs/hazmat/primitives/symmetric-encryption.rst @@ -337,7 +337,7 @@ Modes # Generate a random 96-bit IV. iv = os.urandom(12) - # Construct a AES-GCM Cipher object with the given key and a + # Construct an AES-GCM Cipher object with the given key and a # randomly generated IV. encryptor = Cipher( algorithms.AES(key), -- cgit v1.2.3