summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorEli Collins <elic@assurancetechnologies.com>2017-06-06 12:02:52 -0400
committerEli Collins <elic@assurancetechnologies.com>2017-06-06 12:02:52 -0400
commitc8fb988565ecd80873c124c3f38d38b015fe5a48 (patch)
tree930d431bf4b86dd0604f3c186b7e0bbc98fcc5c5
parent54de92308b187bc677759db28d4173019ba77549 (diff)
downloadpasslib-c8fb988565ecd80873c124c3f38d38b015fe5a48.tar.gz
docs: updated rounds in bcrypt examples (fixes issue #91)
-rw-r--r--docs/lib/passlib.hash.bcrypt.rst4
-rw-r--r--docs/lib/passlib.hash.bcrypt_sha256.rst8
2 files changed, 6 insertions, 6 deletions
diff --git a/docs/lib/passlib.hash.bcrypt.rst b/docs/lib/passlib.hash.bcrypt.rst
index c7c5951..e116983 100644
--- a/docs/lib/passlib.hash.bcrypt.rst
+++ b/docs/lib/passlib.hash.bcrypt.rst
@@ -19,8 +19,8 @@ for new applications. This class can be used directly as follows::
'$2a$12$NT0I31Sa7ihGEWpka9ASYrEFkhuTNeBQ2xfZskIiiJeyFXhRgS.Sy'
>>> # the same, but with an explicit number of rounds
- >>> bcrypt.using(rounds=8).hash("password")
- '$2a$08$8wmNsdCH.M21f.LSBSnYjQrZ9l1EmtBc9uNPGL.9l75YE8D8FlnZC'
+ >>> bcrypt.using(rounds=13).hash("password")
+ '$2b$13$HMQTprwhaUwmir.g.ZYoXuRJhtsbra4uj.qJPHrKsX5nGlhpts0jm'
>>> # verify password
>>> bcrypt.verify("password", h)
diff --git a/docs/lib/passlib.hash.bcrypt_sha256.rst b/docs/lib/passlib.hash.bcrypt_sha256.rst
index c9d2870..20ef5ab 100644
--- a/docs/lib/passlib.hash.bcrypt_sha256.rst
+++ b/docs/lib/passlib.hash.bcrypt_sha256.rst
@@ -21,13 +21,13 @@ This class can be used directly as follows::
'$bcrypt-sha256$2a,12$LrmaIX5x4TRtAwEfwJZa1.$2ehnw6LvuIUTM0iz4iz9hTxv21B6KFO'
>>> # the same, but with an explicit number of rounds
- >>> bcrypt.using(rounds=8).hash("password")
- '$bcrypt-sha256$2a,8$UE3dIZ.0I6XZtA/LdMrrle$Ag04/5zYu./12.OSqInXZnJ.WZoh1ua'
+ >>> bcrypt_sha256.using(rounds=13).hash("password")
+ '$bcrypt-sha256$2b,13$Mant9jKTadXYyFh7xp1W5.$J8xpPZR/HxH7f1vRCNUjBI7Ev1al0hu'
>>> # verify password
- >>> bcrypt.verify("password", h)
+ >>> bcrypt_sha256.verify("password", h)
True
- >>> bcrypt.verify("wrong", h)
+ >>> bcrypt_sha256.verify("wrong", h)
False
.. note::