diff options
author | Eli Collins <elic@assurancetechnologies.com> | 2017-06-06 12:02:52 -0400 |
---|---|---|
committer | Eli Collins <elic@assurancetechnologies.com> | 2017-06-06 12:02:52 -0400 |
commit | c8fb988565ecd80873c124c3f38d38b015fe5a48 (patch) | |
tree | 930d431bf4b86dd0604f3c186b7e0bbc98fcc5c5 | |
parent | 54de92308b187bc677759db28d4173019ba77549 (diff) | |
download | passlib-c8fb988565ecd80873c124c3f38d38b015fe5a48.tar.gz |
docs: updated rounds in bcrypt examples (fixes issue #91)
-rw-r--r-- | docs/lib/passlib.hash.bcrypt.rst | 4 | ||||
-rw-r--r-- | docs/lib/passlib.hash.bcrypt_sha256.rst | 8 |
2 files changed, 6 insertions, 6 deletions
diff --git a/docs/lib/passlib.hash.bcrypt.rst b/docs/lib/passlib.hash.bcrypt.rst index c7c5951..e116983 100644 --- a/docs/lib/passlib.hash.bcrypt.rst +++ b/docs/lib/passlib.hash.bcrypt.rst @@ -19,8 +19,8 @@ for new applications. This class can be used directly as follows:: '$2a$12$NT0I31Sa7ihGEWpka9ASYrEFkhuTNeBQ2xfZskIiiJeyFXhRgS.Sy' >>> # the same, but with an explicit number of rounds - >>> bcrypt.using(rounds=8).hash("password") - '$2a$08$8wmNsdCH.M21f.LSBSnYjQrZ9l1EmtBc9uNPGL.9l75YE8D8FlnZC' + >>> bcrypt.using(rounds=13).hash("password") + '$2b$13$HMQTprwhaUwmir.g.ZYoXuRJhtsbra4uj.qJPHrKsX5nGlhpts0jm' >>> # verify password >>> bcrypt.verify("password", h) diff --git a/docs/lib/passlib.hash.bcrypt_sha256.rst b/docs/lib/passlib.hash.bcrypt_sha256.rst index c9d2870..20ef5ab 100644 --- a/docs/lib/passlib.hash.bcrypt_sha256.rst +++ b/docs/lib/passlib.hash.bcrypt_sha256.rst @@ -21,13 +21,13 @@ This class can be used directly as follows:: '$bcrypt-sha256$2a,12$LrmaIX5x4TRtAwEfwJZa1.$2ehnw6LvuIUTM0iz4iz9hTxv21B6KFO' >>> # the same, but with an explicit number of rounds - >>> bcrypt.using(rounds=8).hash("password") - '$bcrypt-sha256$2a,8$UE3dIZ.0I6XZtA/LdMrrle$Ag04/5zYu./12.OSqInXZnJ.WZoh1ua' + >>> bcrypt_sha256.using(rounds=13).hash("password") + '$bcrypt-sha256$2b,13$Mant9jKTadXYyFh7xp1W5.$J8xpPZR/HxH7f1vRCNUjBI7Ev1al0hu' >>> # verify password - >>> bcrypt.verify("password", h) + >>> bcrypt_sha256.verify("password", h) True - >>> bcrypt.verify("wrong", h) + >>> bcrypt_sha256.verify("wrong", h) False .. note:: |