diff options
author | lloyd <[email protected]> | 2013-07-10 15:11:43 +0000 |
---|---|---|
committer | lloyd <[email protected]> | 2013-07-10 15:11:43 +0000 |
commit | 2a9848fd18b1210a845d02efda38e398950bd76c (patch) | |
tree | aa3b9195a9e5158311e549aec192c5036ef2defc /doc/passhash.rst | |
parent | 2e0bd809db5b8af257a30d278f748e8906c662ee (diff) |
Fix ReST syntax
Diffstat (limited to 'doc/passhash.rst')
-rw-r--r-- | doc/passhash.rst | 5 |
1 files changed, 2 insertions, 3 deletions
diff --git a/doc/passhash.rst b/doc/passhash.rst index f6445e2f6..b40ac3d3f 100644 --- a/doc/passhash.rst +++ b/doc/passhash.rst @@ -113,9 +113,8 @@ Botan also provides a password hashing technique called passhash9, in RandomNumberGenerator& rng, u16bit work_factor = 10, byte alg_id = 1) Functions much like ``generate_bcrypt``. The last parameter, - ``alg_id``, specifies which PRF to use. Currently defined values - are 0: HMAC(SHA-1), 1: HMAC(SHA-256), 2: CMAC(Blowfish), - 3: HMAC(SHA-384), 4: HMAC(SHA-512) + ``alg_id``, specifies which PRF to use. Currently defined values are + 0: HMAC(SHA-1), 1: HMAC(SHA-256), 2: CMAC(Blowfish), 3: HMAC(SHA-384), 4: HMAC(SHA-512) Currently, this performs 10000 * ``work_factor`` PBKDF2 iterations, using 96 bits of salt taken from ``rng``. The iteration count is |