aboutsummaryrefslogtreecommitdiffstats
path: root/docs/hazmat/primitives/asymmetric/ec.rst
diff options
context:
space:
mode:
authorPaul Kehrer <paul.l.kehrer@gmail.com>2017-10-11 19:49:57 +0800
committerAlex Gaynor <alex.gaynor@gmail.com>2017-10-11 07:49:57 -0400
commit1aac78c4d036d20e8892f3861ea947cadf6ab739 (patch)
treebb432229f698e613a554f23b9ec95b8ff2d20a8a /docs/hazmat/primitives/asymmetric/ec.rst
parenta3facfae09c881b8a1953ffd7b192debc58bb5a0 (diff)
downloadcryptography-1aac78c4d036d20e8892f3861ea947cadf6ab739.tar.gz
cryptography-1aac78c4d036d20e8892f3861ea947cadf6ab739.tar.bz2
cryptography-1aac78c4d036d20e8892f3861ea947cadf6ab739.zip
let's talk about bits baby (#3956)
Diffstat (limited to 'docs/hazmat/primitives/asymmetric/ec.rst')
-rw-r--r--docs/hazmat/primitives/asymmetric/ec.rst14
1 files changed, 7 insertions, 7 deletions
diff --git a/docs/hazmat/primitives/asymmetric/ec.rst b/docs/hazmat/primitives/asymmetric/ec.rst
index 50c38e3e..0bb74c6f 100644
--- a/docs/hazmat/primitives/asymmetric/ec.rst
+++ b/docs/hazmat/primitives/asymmetric/ec.rst
@@ -268,7 +268,7 @@ is faster than diffie-hellman`_.
.. note::
Curves with a size of `less than 224 bits`_ should not be used. You should
- strongly consider using curves of at least 224 bits.
+ strongly consider using curves of at least 224 :term:`bits`.
Generally the NIST prime field ("P") curves are significantly faster than the
other types suggested by NIST at both signing and verifying with ECDSA.
@@ -415,8 +415,8 @@ Key Interfaces
:type: int
- Size (in bits) of a secret scalar for the curve (as generated by
- :func:`generate_private_key`).
+ Size (in :term:`bits`) of a secret scalar for the curve (as generated
+ by :func:`generate_private_key`).
.. class:: EllipticCurveSignatureAlgorithm
@@ -490,8 +490,8 @@ Key Interfaces
:type: int
- Size (in bits) of a secret scalar for the curve (as generated by
- :func:`generate_private_key`).
+ Size (in :term:`bits`) of a secret scalar for the curve (as generated
+ by :func:`generate_private_key`).
.. class:: EllipticCurvePrivateKeyWithSerialization
@@ -593,8 +593,8 @@ Key Interfaces
:type: int
- Size (in bits) of a secret scalar for the curve (as generated by
- :func:`generate_private_key`).
+ Size (in :term:`bits`) of a secret scalar for the curve (as generated
+ by :func:`generate_private_key`).
.. class:: EllipticCurvePublicKeyWithSerialization