aboutsummaryrefslogtreecommitdiffstats
path: root/docs
diff options
context:
space:
mode:
authorPaul Kehrer <paul.l.kehrer@gmail.com>2013-10-30 16:57:04 -0500
committerPaul Kehrer <paul.l.kehrer@gmail.com>2013-10-31 13:35:26 -0500
commit5df0abe1fe49c13d628a088c0caee2f6eed88a99 (patch)
tree1e9827409da2a88b4247b50a4563726cc1917e51 /docs
parent6b7610d240b99c93c3f41fa4868eb0bcc3fa8a2b (diff)
downloadcryptography-5df0abe1fe49c13d628a088c0caee2f6eed88a99.tar.gz
cryptography-5df0abe1fe49c13d628a088c0caee2f6eed88a99.tar.bz2
cryptography-5df0abe1fe49c13d628a088c0caee2f6eed88a99.zip
add bf docs
Diffstat (limited to 'docs')
-rw-r--r--docs/hazmat/primitives/symmetric-encryption.rst9
1 files changed, 9 insertions, 0 deletions
diff --git a/docs/hazmat/primitives/symmetric-encryption.rst b/docs/hazmat/primitives/symmetric-encryption.rst
index 1e047b7c..94d58eee 100644
--- a/docs/hazmat/primitives/symmetric-encryption.rst
+++ b/docs/hazmat/primitives/symmetric-encryption.rst
@@ -107,6 +107,15 @@ Ciphers
``56`` bits long), they can simply be concatenated to
produce the full key. This must be kept secret.
+.. class:: Blowfish(key)
+
+ Blowfish is a block cipher developed by Bruce Schneier. It is known to be
+ susceptible to attacks when using weak keys. The author has recommended
+ that users of Blowfish move to newer algorithms like AES.
+
+ :param bytes key: The secret key, 32-448 bits in length (in increments of
+ 8). This must be kept secret.
+
Modes
~~~~~