From cdc536704443c31b238e0b5aad5ad27b43965aec Mon Sep 17 00:00:00 2001 From: n4n5 Date: Fri, 21 Feb 2025 14:37:54 +0100 Subject: [PATCH] add comment to specify the rand version --- README.md | 2 +- src/lib.rs | 8 ++++---- src/oaep.rs | 4 ++-- 3 files changed, 7 insertions(+), 7 deletions(-) diff --git a/README.md b/README.md index 6f191df0..cba176a5 100644 --- a/README.md +++ b/README.md @@ -14,7 +14,7 @@ A portable RSA implementation in pure Rust. ```rust use rsa::{Pkcs1v15Encrypt, RsaPrivateKey, RsaPublicKey}; -let mut rng = rand::thread_rng(); +let mut rng = rand::thread_rng(); // rand@0.8 let bits = 2048; let priv_key = RsaPrivateKey::new(&mut rng, bits).expect("failed to generate a key"); let pub_key = RsaPublicKey::from(&priv_key); diff --git a/src/lib.rs b/src/lib.rs index 2232f37a..7b3943f3 100644 --- a/src/lib.rs +++ b/src/lib.rs @@ -25,7 +25,7 @@ #![cfg_attr(not(feature = "sha2"), doc = "```ignore")] //! use rsa::{RsaPrivateKey, RsaPublicKey, Oaep, sha2::Sha256}; //! -//! let mut rng = rand::thread_rng(); +//! let mut rng = rand::thread_rng(); // rand@0.8 //! //! let bits = 2048; //! let private_key = RsaPrivateKey::new(&mut rng, bits).expect("failed to generate a key"); @@ -47,7 +47,7 @@ //! ``` //! use rsa::{RsaPrivateKey, RsaPublicKey, Pkcs1v15Encrypt}; //! -//! let mut rng = rand::thread_rng(); +//! let mut rng = rand::thread_rng(); // rand@0.8 //! //! let bits = 2048; //! let private_key = RsaPrivateKey::new(&mut rng, bits).expect("failed to generate a key"); @@ -74,7 +74,7 @@ //! use rsa::signature::{Keypair, RandomizedSigner, SignatureEncoding, Verifier}; //! use rsa::sha2::{Digest, Sha256}; //! -//! let mut rng = rand::thread_rng(); +//! let mut rng = rand::thread_rng(); // rand@0.8 //! //! let bits = 2048; //! let private_key = RsaPrivateKey::new(&mut rng, bits).expect("failed to generate a key"); @@ -101,7 +101,7 @@ //! use rsa::signature::{Keypair,RandomizedSigner, SignatureEncoding, Verifier}; //! use rsa::sha2::{Digest, Sha256}; //! -//! let mut rng = rand::thread_rng(); +//! let mut rng = rand::thread_rng(); // rand@0.8 //! //! let bits = 2048; //! let private_key = RsaPrivateKey::new(&mut rng, bits).expect("failed to generate a key"); diff --git a/src/oaep.rs b/src/oaep.rs index 0cbd1e3b..c2bfac64 100644 --- a/src/oaep.rs +++ b/src/oaep.rs @@ -61,7 +61,7 @@ impl Oaep { /// let n = Base64::decode_vec("ALHgDoZmBQIx+jTmgeeHW6KsPOrj11f6CvWsiRleJlQpW77AwSZhd21ZDmlTKfaIHBSUxRUsuYNh7E2SHx8rkFVCQA2/gXkZ5GK2IUbzSTio9qXA25MWHvVxjMfKSL8ZAxZyKbrG94FLLszFAFOaiLLY8ECs7g+dXOriYtBwLUJK+lppbd+El+8ZA/zH0bk7vbqph5pIoiWggxwdq3mEz4LnrUln7r6dagSQzYErKewY8GADVpXcq5mfHC1xF2DFBub7bFjMVM5fHq7RK+pG5xjNDiYITbhLYrbVv3X0z75OvN0dY49ITWjM7xyvMWJXVJS7sJlgmCCL6RwWgP8PhcE=").unwrap(); /// let e = Base64::decode_vec("AQAB").unwrap(); /// - /// let mut rng = rand::thread_rng(); + /// let mut rng = rand::thread_rng(); // rand@0.8 /// let key = RsaPublicKey::new(BigUint::from_bytes_be(&n), BigUint::from_bytes_be(&e)).unwrap(); /// let padding = Oaep::new::(); /// let encrypted_data = key.encrypt(&mut rng, padding, b"secret").unwrap(); @@ -98,7 +98,7 @@ impl Oaep { /// let n = Base64::decode_vec("ALHgDoZmBQIx+jTmgeeHW6KsPOrj11f6CvWsiRleJlQpW77AwSZhd21ZDmlTKfaIHBSUxRUsuYNh7E2SHx8rkFVCQA2/gXkZ5GK2IUbzSTio9qXA25MWHvVxjMfKSL8ZAxZyKbrG94FLLszFAFOaiLLY8ECs7g+dXOriYtBwLUJK+lppbd+El+8ZA/zH0bk7vbqph5pIoiWggxwdq3mEz4LnrUln7r6dagSQzYErKewY8GADVpXcq5mfHC1xF2DFBub7bFjMVM5fHq7RK+pG5xjNDiYITbhLYrbVv3X0z75OvN0dY49ITWjM7xyvMWJXVJS7sJlgmCCL6RwWgP8PhcE=").unwrap(); /// let e = Base64::decode_vec("AQAB").unwrap(); /// - /// let mut rng = rand::thread_rng(); + /// let mut rng = rand::thread_rng(); // rand@0.8 /// let key = RsaPublicKey::new(BigUint::from_bytes_be(&n), BigUint::from_bytes_be(&e)).unwrap(); /// let padding = Oaep::new_with_mgf_hash::(); /// let encrypted_data = key.encrypt(&mut rng, padding, b"secret").unwrap();