diff options
author | Alex Gaynor <alex.gaynor@gmail.com> | 2017-01-21 08:50:53 -0500 |
---|---|---|
committer | Paul Kehrer <paul.l.kehrer@gmail.com> | 2017-01-21 21:50:53 +0800 |
commit | 4e87cf4529ea374ddaf91152c89b409661086ddc (patch) | |
tree | 7dad8555f4de0b85180183130597a0d35a105ddc /docs/fernet.rst | |
parent | d078e546e2ebfaa37ebe92c446ff437183312530 (diff) | |
download | cryptography-4e87cf4529ea374ddaf91152c89b409661086ddc.tar.gz cryptography-4e87cf4529ea374ddaf91152c89b409661086ddc.tar.bz2 cryptography-4e87cf4529ea374ddaf91152c89b409661086ddc.zip |
Removed dead link from docs (#3360)
Diffstat (limited to 'docs/fernet.rst')
-rw-r--r-- | docs/fernet.rst | 5 |
1 files changed, 2 insertions, 3 deletions
diff --git a/docs/fernet.rst b/docs/fernet.rst index a2bab32a..0c1eb43d 100644 --- a/docs/fernet.rst +++ b/docs/fernet.rst @@ -113,7 +113,7 @@ Using passwords with Fernet It is possible to use passwords with Fernet. To do this, you need to run the password through a key derivation function such as :class:`~cryptography.hazmat.primitives.kdf.pbkdf2.PBKDF2HMAC`, bcrypt or -scrypt. +:class:`~cryptography.hazmat.primitives.kdf.scrypt.Scrypt`. .. doctest:: @@ -145,7 +145,7 @@ to derive the same key from the password in the future. The iteration count used should be adjusted to be as high as your server can tolerate. A good default is at least 100,000 iterations which is what Django -`recommends`_ in 2014. +recommended in 2014. Implementation -------------- @@ -166,4 +166,3 @@ For complete details consult the `specification`_. .. _`Fernet`: https://github.com/fernet/spec/ .. _`specification`: https://github.com/fernet/spec/blob/master/Spec.md -.. _`recommends`: https://github.com/django/django/blob/master/django/utils/crypto.py#L148 |