[Python-checkins] cpython: properly introduce reST literal blocks
benjamin.peterson
python-checkins at python.org
Tue Sep 6 16:28:55 EDT 2016
https://hg.python.org/cpython/rev/323dacd4f253
changeset: 103139:323dacd4f253
user: Benjamin Peterson <benjamin at python.org>
date: Tue Sep 06 13:28:29 2016 -0700
summary:
properly introduce reST literal blocks
files:
Doc/library/hashlib-blake2.rst | 8 ++++----
1 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/Doc/library/hashlib-blake2.rst b/Doc/library/hashlib-blake2.rst
--- a/Doc/library/hashlib-blake2.rst
+++ b/Doc/library/hashlib-blake2.rst
@@ -217,7 +217,7 @@
indifferentiability property inherited from BLAKE.
This example shows how to get a (hex-encoded) 128-bit authentication code for
-message ``b'message data'`` with key ``b'pseudorandom key'``:
+message ``b'message data'`` with key ``b'pseudorandom key'``::
>>> from hashlib import blake2b
>>> h = blake2b(key=b'pseudorandom key', digest_size=16)
@@ -227,7 +227,7 @@
As a practical example, a web application can symmetrically sign cookies sent
-to users and later verify them to make sure they weren't tampered with:
+to users and later verify them to make sure they weren't tampered with::
>>> from hashlib import blake2b
>>> from hmac import compare_digest
@@ -251,7 +251,7 @@
False
Even though there's a native keyed hashing mode, BLAKE2 can, of course, be used
-in HMAC construction with :mod:`hmac` module:
+in HMAC construction with :mod:`hmac` module::
>>> import hmac, hashlib
>>> m = hmac.new(b'secret key', digestmod=hashlib.blake2s)
@@ -334,7 +334,7 @@
<http://www.skein-hash.info/sites/default/files/skein1.3.pdf>`_,
p. 21)
-BLAKE2 can be personalized by passing bytes to the *person* argument:
+BLAKE2 can be personalized by passing bytes to the *person* argument::
>>> from hashlib import blake2b
>>> FILES_HASH_PERSON = b'MyApp Files Hash'
--
Repository URL: https://hg.python.org/cpython
More information about the Python-checkins
mailing list