summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorBenjamin Peterson <benjamin@python.org>2014-05-26 22:42:29 (GMT)
committerBenjamin Peterson <benjamin@python.org>2014-05-26 22:42:29 (GMT)
commit0d81d80f6e4c61f008e5e379da0fbcbd41b3a3c5 (patch)
tree9392b75318c6d47f4bdb4855f804d63e88c1fa6e
parent0ccff4d3e10af0d1c7ddba8e1b60526578c6718a (diff)
downloadcpython-0d81d80f6e4c61f008e5e379da0fbcbd41b3a3c5.zip
cpython-0d81d80f6e4c61f008e5e379da0fbcbd41b3a3c5.tar.gz
cpython-0d81d80f6e4c61f008e5e379da0fbcbd41b3a3c5.tar.bz2
link to wikipedia description of cryptographic salt
-rw-r--r--Doc/library/hashlib.rst2
1 files changed, 1 insertions, 1 deletions
diff --git a/Doc/library/hashlib.rst b/Doc/library/hashlib.rst
index 661338e..cc982f6 100644
--- a/Doc/library/hashlib.rst
+++ b/Doc/library/hashlib.rst
@@ -182,7 +182,7 @@ Key Derivation Function
Key derivation and key stretching algorithms are designed for secure password
hashing. Naive algorithms such as ``sha1(password)`` are not resistant against
brute-force attacks. A good password hashing function must be tunable, slow, and
-include a salt.
+include a `salt <https://en.wikipedia.org/wiki/Salt_%28cryptography%29>`_.
.. function:: pbkdf2_hmac(name, password, salt, rounds, dklen=None)