From bf8962a22b18e022085eec797ca64c1242564b21 Mon Sep 17 00:00:00 2001 From: Paul Kehrer Date: Mon, 28 Oct 2013 17:44:42 -0500 Subject: fix hmac docs to point to new hazmat location --- docs/hazmat/primitives/hmac.rst | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/hazmat/primitives/hmac.rst b/docs/hazmat/primitives/hmac.rst index 14aaf19f..702df2c7 100644 --- a/docs/hazmat/primitives/hmac.rst +++ b/docs/hazmat/primitives/hmac.rst @@ -18,7 +18,7 @@ message authentication codes using a cryptographic hash function coupled with a secret key. You can use an HMAC to verify integrity as well as authenticate a message. -.. class:: cryptography.primitives.hmac.HMAC(key, msg=None, digestmod=None) +.. class:: cryptography.hazmat.primitives.hmac.HMAC(key, msg=None, digestmod=None) HMAC objects take a ``key``, a hash class derived from :class:`~cryptography.primitives.hashes.BaseHash`, and optional msg. The ``key`` should be randomly generated bytes and @@ -26,7 +26,7 @@ message. .. doctest:: - >>> from cryptography.primitives import hashes, hmac + >>> from cryptography.hazmat.primitives import hashes, hmac >>> h = hmac.HMAC(key, digestmod=hashes.SHA256) >>> h.update(b"message to hash") >>> h.hexdigest() -- cgit v1.2.3