aboutsummaryrefslogtreecommitdiffstats
path: root/docs
diff options
context:
space:
mode:
authorPaul Kehrer <paul.l.kehrer@gmail.com>2015-04-01 22:39:02 -0500
committerPaul Kehrer <paul.l.kehrer@gmail.com>2015-04-01 22:39:02 -0500
commit738407ba87472f7f474c164e2fd33ab037bab93f (patch)
treed93bfd399e978e237af4c3a4b874b697a2f45a5f /docs
parentde3412cd5add7adda508532694c6187d35969585 (diff)
downloadcryptography-738407ba87472f7f474c164e2fd33ab037bab93f.tar.gz
cryptography-738407ba87472f7f474c164e2fd33ab037bab93f.tar.bz2
cryptography-738407ba87472f7f474c164e2fd33ab037bab93f.zip
update doc language
Diffstat (limited to 'docs')
-rw-r--r--docs/x509.rst45
1 files changed, 22 insertions, 23 deletions
diff --git a/docs/x509.rst b/docs/x509.rst
index 39df4a0b..afc9620a 100644
--- a/docs/x509.rst
+++ b/docs/x509.rst
@@ -460,7 +460,7 @@ X.509 Extensions
:type: bool
- This is asserted when the subject public key is used for verifying
+ This purpose is set to true when the subject public key is used for verifying
digital signatures, other than signatures on certificates
(``key_cert_sign``) and CRLs (``crl_sign``).
@@ -468,7 +468,7 @@ X.509 Extensions
:type: bool
- This is asserted when the subject public key is used for verifying
+ This purpose is set to true when the subject public key is used for verifying
digital signatures, other than signatures on certificates
(``key_cert_sign``) and CRLs (``crl_sign``). It is used to provide a
non-repudiation service that protects against the signing entity
@@ -481,48 +481,48 @@ X.509 Extensions
:type: bool
- This is asserted when the subject public key is used for enciphering
- private or secret keys.
+ This purpose is set to true when the subject public key is used for
+ enciphering private or secret keys.
.. attribute:: data_encipherment
:type: bool
- This is asserted when the subject public key is used for directly
- enciphering raw user data without the use of an intermediate symmetric
- cipher.
+ This purpose is set to true when the subject public key is used for
+ directly enciphering raw user data without the use of an intermediate
+ symmetric cipher.
.. attribute:: key_agreement
:type: bool
- This is asserted when the subject public key is used for key agreement.
- For example, when a Diffie-Hellman key is to be used for key
- management, then this bit is set.
+ This purpose is set to true when the subject public key is used for key
+ agreement. For example, when a Diffie-Hellman key is to be used for
+ key management, then this purpose is set to true.
.. attribute:: key_cert_sign
:type: bool
- This is asserted when the subject public key is used for verifying
- signatures on public key certificates. If this bit is asserted then
- ``ca`` must be true in the :class:`BasicConstraints` extension.
+ This purpose is set to true when the subject public key is used for
+ verifying signatures on public key certificates. If this purpose is set
+ to true then ``ca`` must be true in the :class:`BasicConstraints`
+ extension.
.. attribute:: crl_sign
:type: bool
- This is asserted when the subject public key is used for verifying
- signatures on certificate revocation lists.
+ This purpose is set to true when the subject public key is used for
+ verifying signatures on certificate revocation lists.
.. attribute:: encipher_only
:type: bool
- The meaning of this bit is undefined in the absence of the
- ``key_agreement`` bit. When this bit is asserted and the
- ``key_agreement`` bit is also set, the subject public key may be
- used only for enciphering data while performing key agreement.
+ When this purposes is set to true and the ``key_agreement`` purpose is
+ also set, the subject public key may be used only for enciphering data
+ while performing key agreement.
:raises ValueError: This is raised if accessed when ``key_agreement``
is false.
@@ -531,10 +531,9 @@ X.509 Extensions
:type: bool
- The meaning of this bit is undefined in the absence of the
- ``key_agreement`` bit. When this bit is asserted and the
- ``key_agreement`` bit is also set, the subject public key may be
- used only for deciphering data while performing key agreement.
+ When this purposes is set to true and the ``key_agreement`` purpose is
+ also set, the subject public key may be used only for deciphering data
+ while performing key agreement.
:raises ValueError: This is raised if accessed when ``key_agreement``
is false.