summaryrefslogtreecommitdiff
path: root/docs/lib/passlib.hash.oracle10.rst
diff options
context:
space:
mode:
Diffstat (limited to 'docs/lib/passlib.hash.oracle10.rst')
-rw-r--r--docs/lib/passlib.hash.oracle10.rst10
1 files changed, 5 insertions, 5 deletions
diff --git a/docs/lib/passlib.hash.oracle10.rst b/docs/lib/passlib.hash.oracle10.rst
index 540f086..5d878ba 100644
--- a/docs/lib/passlib.hash.oracle10.rst
+++ b/docs/lib/passlib.hash.oracle10.rst
@@ -16,18 +16,18 @@ a username for all encrypt/verify operations)::
>>> from passlib.hash import oracle10 as oracle10
- >>> #encrypt password using specified username
+ >>> # encrypt password using specified username
>>> hash = oracle10.encrypt("password", user="username")
>>> hash
'872805F3F4C83365'
- >>> #verify correct password
+ >>> # verify correct password
>>> oracle10.verify("password", hash, user="username")
True
- >>> #verify correct password w/ wrong username
+ >>> # verify correct password w/ wrong username
>>> oracle10.verify("password", hash, user="somebody")
False
- >>> #verify incorrect password
+ >>> # verify incorrect password
>>> oracle10.verify("letmein", hash, user="username")
False
@@ -75,7 +75,7 @@ This algorithm it not suitable for *any* use besides manipulating existing
Oracle10 account passwords, due to the following flaws [#flaws]_:
* It's use of the username as a salt value means that common usernames
- (eg ``system``) will occur more frequently as salts,
+ (e.g. ``system``) will occur more frequently as salts,
weakening the effectiveness of the salt in foiling pre-computed tables.
* The fact that it is case insensitive, and simply concatenates the username