diff options
author | Georg Brandl <georg@python.org> | 2013-10-06 16:26:36 (GMT) |
---|---|---|
committer | Georg Brandl <georg@python.org> | 2013-10-06 16:26:36 (GMT) |
commit | 917bb8cb34dc6660f117a7249ea86752d33b7565 (patch) | |
tree | 40ce18412f1f331e2839edb0d5fbc7a90ae97fb6 | |
parent | 4e8534e2aebef95bb656ff1136b5bce60e587724 (diff) | |
download | cpython-917bb8cb34dc6660f117a7249ea86752d33b7565.zip cpython-917bb8cb34dc6660f117a7249ea86752d33b7565.tar.gz cpython-917bb8cb34dc6660f117a7249ea86752d33b7565.tar.bz2 |
The "FAQ" link at the end was changed to a Wikipedia link; reflect that.
-rw-r--r-- | Doc/library/hashlib.rst | 6 |
1 files changed, 4 insertions, 2 deletions
diff --git a/Doc/library/hashlib.rst b/Doc/library/hashlib.rst index 063ad59..aa8e6e8 100644 --- a/Doc/library/hashlib.rst +++ b/Doc/library/hashlib.rst @@ -25,12 +25,14 @@ digest are interchangeable. Older algorithms were called message digests. The modern term is secure hash. .. note:: - If you want the adler32 or crc32 hash functions they are available in + + If you want the adler32 or crc32 hash functions, they are available in the :mod:`zlib` module. .. warning:: - Some algorithms have known hash collision weaknesses, see the FAQ at the end. + Some algorithms have known hash collision weaknesses, refer to the "See + also" section at the end. There is one constructor method named for each type of :dfn:`hash`. All return a hash object with the same simple interface. For example: use :func:`sha1` to |