aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorPaul Kehrer <paul.l.kehrer@gmail.com>2013-10-28 17:44:42 -0500
committerPaul Kehrer <paul.l.kehrer@gmail.com>2013-10-28 17:44:42 -0500
commitbf8962a22b18e022085eec797ca64c1242564b21 (patch)
tree0273c9812fa33314d9fd8a61c005ba11c6de4803
parent30eabddbade7647e0fb53500356e252eed245c6a (diff)
downloadcryptography-bf8962a22b18e022085eec797ca64c1242564b21.tar.gz
cryptography-bf8962a22b18e022085eec797ca64c1242564b21.tar.bz2
cryptography-bf8962a22b18e022085eec797ca64c1242564b21.zip
fix hmac docs to point to new hazmat location
-rw-r--r--docs/hazmat/primitives/hmac.rst4
1 files changed, 2 insertions, 2 deletions
diff --git a/docs/hazmat/primitives/hmac.rst b/docs/hazmat/primitives/hmac.rst
index 14aaf19f..702df2c7 100644
--- a/docs/hazmat/primitives/hmac.rst
+++ b/docs/hazmat/primitives/hmac.rst
@@ -18,7 +18,7 @@ message authentication codes using a cryptographic hash function coupled with a
secret key. You can use an HMAC to verify integrity as well as authenticate a
message.
-.. class:: cryptography.primitives.hmac.HMAC(key, msg=None, digestmod=None)
+.. class:: cryptography.hazmat.primitives.hmac.HMAC(key, msg=None, digestmod=None)
HMAC objects take a ``key``, a hash class derived from :class:`~cryptography.primitives.hashes.BaseHash`,
and optional msg. The ``key`` should be randomly generated bytes and
@@ -26,7 +26,7 @@ message.
.. doctest::
- >>> from cryptography.primitives import hashes, hmac
+ >>> from cryptography.hazmat.primitives import hashes, hmac
>>> h = hmac.HMAC(key, digestmod=hashes.SHA256)
>>> h.update(b"message to hash")
>>> h.hexdigest()