aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAlex Gaynor <alex.gaynor@gmail.com>2016-06-04 15:53:34 -0700
committerPaul Kehrer <paul.l.kehrer@gmail.com>2016-06-04 15:53:34 -0700
commit8d15ba8070c977d9c48a87d34beefb0959ca091b (patch)
treeda84e698138deaa89836414432c2c6de32abfc75
parentfb5e7d4dfb599a5b6e49948e49fe8926694d12d7 (diff)
downloadcryptography-8d15ba8070c977d9c48a87d34beefb0959ca091b.tar.gz
cryptography-8d15ba8070c977d9c48a87d34beefb0959ca091b.tar.bz2
cryptography-8d15ba8070c977d9c48a87d34beefb0959ca091b.zip
Clean up some of the nonsense in our DSA docs. (#2969)
Fixes #1478
-rw-r--r--docs/hazmat/primitives/asymmetric/dsa.rst10
1 files changed, 5 insertions, 5 deletions
diff --git a/docs/hazmat/primitives/asymmetric/dsa.rst b/docs/hazmat/primitives/asymmetric/dsa.rst
index 1429cb09..93d0db6f 100644
--- a/docs/hazmat/primitives/asymmetric/dsa.rst
+++ b/docs/hazmat/primitives/asymmetric/dsa.rst
@@ -41,9 +41,9 @@ Generation
Generate DSA parameters using the provided ``backend``.
- :param int key_size: The length of the modulus in bits. It should be
- either 1024, 2048 or 3072. For keys generated in 2015 this should
- be `at least 2048`_ (See page 41). Note that some applications
+ :param int key_size: The length of :attr:`~DSAParameterNumbers.q`. It
+ should be either 1024, 2048 or 3072. For keys generated in 2015 this
+ should be `at least 2048`_ (See page 41). Note that some applications
(such as SSH) have not yet gained support for larger key sizes
specified in FIPS 186-3 and are still restricted to only the
1024-bit keys specified in FIPS 186-2.
@@ -287,7 +287,7 @@ Key interfaces
:type: int
- The bit length of the modulus.
+ The bit length of :attr:`~DSAParameterNumbers.q`.
.. class:: DSAPrivateKeyWithSerialization
@@ -344,7 +344,7 @@ Key interfaces
:type: int
- The bit length of the modulus.
+ The bit length of :attr:`~DSAParameterNumbers.q`.
.. method:: parameters()