From 28923474401051a9aa0bddd60904b9be64943dba Mon Sep 17 00:00:00 2001 From: jcalabro Date: Mon, 1 May 2023 12:57:05 -0400 Subject: [PATCH] Fix PBKDF2 docstring comment --- lib/std/crypto/pbkdf2.zig | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/lib/std/crypto/pbkdf2.zig b/lib/std/crypto/pbkdf2.zig index 7c6df5444d..115fd38b3d 100644 --- a/lib/std/crypto/pbkdf2.zig +++ b/lib/std/crypto/pbkdf2.zig @@ -49,7 +49,7 @@ const WeakParametersError = std.crypto.errors.WeakParametersError; /// Larger iteration counts improve security by increasing the time required to compute /// the dk. It is common to tune this parameter to achieve approximately 100ms. /// -/// Prf: Pseudo-random function to use. A common choice is `std.crypto.auth.hmac.HmacSha256`. +/// Prf: Pseudo-random function to use. A common choice is `std.crypto.auth.hmac.sha2.HmacSha256`. pub fn pbkdf2(dk: []u8, password: []const u8, salt: []const u8, rounds: u32, comptime Prf: type) (WeakParametersError || OutputTooLongError)!void { if (rounds < 1) return error.WeakParameters;