diff options
| author | Russ Cox <rsc@golang.org> | 2022-04-11 13:06:45 -0400 |
|---|---|---|
| committer | Gopher Robot <gobot@golang.org> | 2022-04-11 22:02:26 +0000 |
| commit | 7b82a4e95df4499652dca2c0d4185de9fffbdc8f (patch) | |
| tree | 7c7fe98a006a759abd61e5b0c4e4b7b0a6102e28 /argon2/argon2.go | |
| parent | 5352b09029215197cc109b46f0560d05ffab29db (diff) | |
| download | go-x-crypto-7b82a4e95df4499652dca2c0d4185de9fffbdc8f.tar.xz | |
all: gofmt
Gofmt to update doc comments to the new formatting.
For golang/go#51082.
Change-Id: I076031b6613691eefbb0f21739366e3fd2011ec9
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/399356
Run-TryBot: Russ Cox <rsc@golang.org>
TryBot-Result: Gopher Robot <gobot@golang.org>
Auto-Submit: Russ Cox <rsc@golang.org>
Reviewed-by: Ian Lance Taylor <iant@google.com>
Diffstat (limited to 'argon2/argon2.go')
| -rw-r--r-- | argon2/argon2.go | 10 |
1 files changed, 4 insertions, 6 deletions
diff --git a/argon2/argon2.go b/argon2/argon2.go index b423fea..29f0a2d 100644 --- a/argon2/argon2.go +++ b/argon2/argon2.go @@ -11,8 +11,7 @@ // If you aren't sure which function you need, use Argon2id (IDKey) and // the parameter recommendations for your scenario. // -// -// Argon2i +// # Argon2i // // Argon2i (implemented by Key) is the side-channel resistant version of Argon2. // It uses data-independent memory access, which is preferred for password @@ -21,8 +20,7 @@ // parameters (taken from [2]) for non-interactive operations are time=3 and to // use the maximum available memory. // -// -// Argon2id +// # Argon2id // // Argon2id (implemented by IDKey) is a hybrid version of Argon2 combining // Argon2i and Argon2d. It uses data-independent memory access for the first @@ -59,7 +57,7 @@ const ( // For example, you can get a derived key for e.g. AES-256 (which needs a // 32-byte key) by doing: // -// key := argon2.Key([]byte("some password"), salt, 3, 32*1024, 4, 32) +// key := argon2.Key([]byte("some password"), salt, 3, 32*1024, 4, 32) // // The draft RFC recommends[2] time=3, and memory=32*1024 is a sensible number. // If using that amount of memory (32 MB) is not possible in some contexts then @@ -83,7 +81,7 @@ func Key(password, salt []byte, time, memory uint32, threads uint8, keyLen uint3 // For example, you can get a derived key for e.g. AES-256 (which needs a // 32-byte key) by doing: // -// key := argon2.IDKey([]byte("some password"), salt, 1, 64*1024, 4, 32) +// key := argon2.IDKey([]byte("some password"), salt, 1, 64*1024, 4, 32) // // The draft RFC recommends[2] time=1, and memory=64*1024 is a sensible number. // If using that amount of memory (64 MB) is not possible in some contexts then |
