Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

admit to the existence of nuance in HKDF #8987

Merged
merged 2 commits into from May 30, 2023
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
4 changes: 3 additions & 1 deletion docs/hazmat/primitives/key-derivation-functions.rst
Expand Up @@ -460,7 +460,8 @@ HKDF
to be secret, but may cause stronger security guarantees if secret; see
:rfc:`5869` and the `HKDF paper`_ for more details. If ``None`` is
explicitly passed a default salt of ``algorithm.digest_size // 8`` null
bytes will be used.
bytes will be used. See `understanding HKDF`_ for additional detail about
the salt and info parameters.

:param bytes info: Application specific context information. If ``None``
is explicitly passed an empty byte string will be used.
Expand Down Expand Up @@ -1037,3 +1038,4 @@ Interface
.. _`here`: https://stackoverflow.com/a/30308723/1170681
.. _`recommends`: https://tools.ietf.org/html/rfc7914#section-2
.. _`The scrypt paper`: https://www.tarsnap.com/scrypt/scrypt.pdf
.. _`Understanding HKDF`: https://soatok.blog/2021/11/17/understanding-hkdf/
reaperhulk marked this conversation as resolved.
Show resolved Hide resolved