@@ -217,7 +217,7 @@ BLAKE2 can be securely used in prefix-MAC mode thanks to the
217217indifferentiability property inherited from BLAKE.
218218
219219This example shows how to get a (hex-encoded) 128-bit authentication code for
220- message ``b'message data' `` with key ``b'pseudorandom key' ``:
220+ message ``b'message data' `` with key ``b'pseudorandom key' ``::
221221
222222 >>> from hashlib import blake2b
223223 >>> h = blake2b(key=b'pseudorandom key', digest_size=16)
@@ -227,7 +227,7 @@ message ``b'message data'`` with key ``b'pseudorandom key'``:
227227
228228
229229As a practical example, a web application can symmetrically sign cookies sent
230- to users and later verify them to make sure they weren't tampered with:
230+ to users and later verify them to make sure they weren't tampered with::
231231
232232 >>> from hashlib import blake2b
233233 >>> from hmac import compare_digest
@@ -251,7 +251,7 @@ to users and later verify them to make sure they weren't tampered with:
251251 False
252252
253253Even though there's a native keyed hashing mode, BLAKE2 can, of course, be used
254- in HMAC construction with :mod: `hmac ` module:
254+ in HMAC construction with :mod: `hmac ` module::
255255
256256 >>> import hmac, hashlib
257257 >>> m = hmac.new(b'secret key', digestmod=hashlib.blake2s)
@@ -334,7 +334,7 @@ function:
334334 <http://www.skein-hash.info/sites/default/files/skein1.3.pdf> `_,
335335 p. 21)
336336
337- BLAKE2 can be personalized by passing bytes to the *person * argument:
337+ BLAKE2 can be personalized by passing bytes to the *person * argument::
338338
339339 >>> from hashlib import blake2b
340340 >>> FILES_HASH_PERSON = b'MyApp Files Hash'
0 commit comments