diff options
author | Ayrx <terrycwk1994@gmail.com> | 2014-02-22 19:11:35 +0800 |
---|---|---|
committer | Ayrx <terrycwk1994@gmail.com> | 2014-02-25 10:36:32 +0800 |
commit | cec584caa9b857da35b8e8a8f0b1f7295ddf661f (patch) | |
tree | bb9098e2e7d6da32802e5836ce87796f19c551a2 | |
parent | 341399d1ed7237568d3a2a7016e671700be9d627 (diff) | |
download | cryptography-cec584caa9b857da35b8e8a8f0b1f7295ddf661f.tar.gz cryptography-cec584caa9b857da35b8e8a8f0b1f7295ddf661f.tar.bz2 cryptography-cec584caa9b857da35b8e8a8f0b1f7295ddf661f.zip |
Updated secret key description
-rw-r--r-- | docs/hazmat/primitives/twofactor.rst | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/docs/hazmat/primitives/twofactor.rst b/docs/hazmat/primitives/twofactor.rst index 18bf4c01..3951a1cc 100644 --- a/docs/hazmat/primitives/twofactor.rst +++ b/docs/hazmat/primitives/twofactor.rst @@ -36,9 +36,9 @@ codes (HMAC). '755224' >>> hotp.verify(b"755224", 0) # doctest: +SKIP - :param bytes key: Secret key. This value must be generated in a - cryptographically secure fashion and be at least 128 bits. - It is recommended that the key be 160 bits. + :param bytes key: Per-user secret key. This value must be kept secret + and be at least 128 bits. It is recommended that the + key be 160 bits. :param int length: Length of generated one time password as ``int``. :param algorithm: A :class:`~cryptography.hazmat.primitives.hashes` @@ -124,9 +124,9 @@ This can be accomplished with something similar to the following code. '94287082' >>> totp.verify(b"94287082", 59) # doctest: +SKIP - :param bytes key: Secret key. This value must be generated in a - cryptographically secure fashion and be as long as your hash - function's output (e.g 256-bit for SHA256). + :param bytes key: Per-user secret key. This value must be kept secret + and be at least 128 bits. It is recommended that the + key be 160 bits. :param int length: Length of generated one time password as ``int``. :param algorithm: A :class:`~cryptography.hazmat.primitives.hashes` |