summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBenjamin Peterson <benjamin@python.org>2015-09-27 08:23:10 (GMT)
committerBenjamin Peterson <benjamin@python.org>2015-09-27 08:23:10 (GMT)
commitc402d8dceae14925bba22df773ed2224fa191665 (patch)
tree5e0f04f02cf0a74b433957333bff8d9cda9ad32f
parent6aa1564e9cdc89d97ede740d65af4c61968d4725 (diff)
downloadcpython-c402d8dceae14925bba22df773ed2224fa191665.zip
cpython-c402d8dceae14925bba22df773ed2224fa191665.tar.gz
cpython-c402d8dceae14925bba22df773ed2224fa191665.tar.bz2
shorten and fix casing of title
-rw-r--r--Doc/library/hashlib.rst4
1 files changed, 2 insertions, 2 deletions
diff --git a/Doc/library/hashlib.rst b/Doc/library/hashlib.rst
index e0a877a..8492422 100644
--- a/Doc/library/hashlib.rst
+++ b/Doc/library/hashlib.rst
@@ -176,8 +176,8 @@ A hash object has the following methods:
compute the digests of data sharing a common initial substring.
-Key Derivation Function
------------------------
+Key derivation
+--------------
Key derivation and key stretching algorithms are designed for secure password
hashing. Naive algorithms such as ``sha1(password)`` are not resistant against