Skip to content

Commit bd3575b

Browse files
Add comment to specify the rand version (#473)
1 parent 551f6e5 commit bd3575b

File tree

6 files changed

+10
-18
lines changed

6 files changed

+10
-18
lines changed

Cargo.lock

Lines changed: 1 addition & 1 deletion
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ A portable RSA implementation in pure Rust.
1414
```rust
1515
use rsa::{Pkcs1v15Encrypt, RsaPrivateKey, RsaPublicKey};
1616

17-
let mut rng = rand::thread_rng();
17+
let mut rng = rand::thread_rng(); // [email protected]
1818
let bits = 2048;
1919
let priv_key = RsaPrivateKey::new(&mut rng, bits).expect("failed to generate a key");
2020
let pub_key = RsaPublicKey::from(&priv_key);

src/lib.rs

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@
2525
#![cfg_attr(not(feature = "sha2"), doc = "```ignore")]
2626
//! use rsa::{RsaPrivateKey, RsaPublicKey, Oaep, sha2::Sha256};
2727
//!
28-
//! let mut rng = rand::thread_rng();
28+
//! let mut rng = rand::thread_rng(); // [email protected]
2929
//!
3030
//! let bits = 2048;
3131
//! let private_key = RsaPrivateKey::new(&mut rng, bits).expect("failed to generate a key");
@@ -47,7 +47,7 @@
4747
//! ```
4848
//! use rsa::{RsaPrivateKey, RsaPublicKey, Pkcs1v15Encrypt};
4949
//!
50-
//! let mut rng = rand::thread_rng();
50+
//! let mut rng = rand::thread_rng(); // [email protected]
5151
//!
5252
//! let bits = 2048;
5353
//! let private_key = RsaPrivateKey::new(&mut rng, bits).expect("failed to generate a key");
@@ -74,7 +74,7 @@
7474
//! use rsa::signature::{Keypair, RandomizedSigner, SignatureEncoding, Verifier};
7575
//! use rsa::sha2::{Digest, Sha256};
7676
//!
77-
//! let mut rng = rand::thread_rng();
77+
//! let mut rng = rand::thread_rng(); // [email protected]
7878
//!
7979
//! let bits = 2048;
8080
//! let private_key = RsaPrivateKey::new(&mut rng, bits).expect("failed to generate a key");
@@ -101,7 +101,7 @@
101101
//! use rsa::signature::{Keypair,RandomizedSigner, SignatureEncoding, Verifier};
102102
//! use rsa::sha2::{Digest, Sha256};
103103
//!
104-
//! let mut rng = rand::thread_rng();
104+
//! let mut rng = rand::thread_rng(); // [email protected]
105105
//!
106106
//! let bits = 2048;
107107
//! let private_key = RsaPrivateKey::new(&mut rng, bits).expect("failed to generate a key");

src/oaep.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ impl Oaep {
6161
/// let n = Base64::decode_vec("ALHgDoZmBQIx+jTmgeeHW6KsPOrj11f6CvWsiRleJlQpW77AwSZhd21ZDmlTKfaIHBSUxRUsuYNh7E2SHx8rkFVCQA2/gXkZ5GK2IUbzSTio9qXA25MWHvVxjMfKSL8ZAxZyKbrG94FLLszFAFOaiLLY8ECs7g+dXOriYtBwLUJK+lppbd+El+8ZA/zH0bk7vbqph5pIoiWggxwdq3mEz4LnrUln7r6dagSQzYErKewY8GADVpXcq5mfHC1xF2DFBub7bFjMVM5fHq7RK+pG5xjNDiYITbhLYrbVv3X0z75OvN0dY49ITWjM7xyvMWJXVJS7sJlgmCCL6RwWgP8PhcE=").unwrap();
6262
/// let e = Base64::decode_vec("AQAB").unwrap();
6363
///
64-
/// let mut rng = rand::thread_rng();
64+
/// let mut rng = rand::thread_rng(); // [email protected]
6565
/// let key = RsaPublicKey::new(BigUint::from_bytes_be(&n), BigUint::from_bytes_be(&e)).unwrap();
6666
/// let padding = Oaep::new::<Sha256>();
6767
/// let encrypted_data = key.encrypt(&mut rng, padding, b"secret").unwrap();
@@ -98,7 +98,7 @@ impl Oaep {
9898
/// let n = Base64::decode_vec("ALHgDoZmBQIx+jTmgeeHW6KsPOrj11f6CvWsiRleJlQpW77AwSZhd21ZDmlTKfaIHBSUxRUsuYNh7E2SHx8rkFVCQA2/gXkZ5GK2IUbzSTio9qXA25MWHvVxjMfKSL8ZAxZyKbrG94FLLszFAFOaiLLY8ECs7g+dXOriYtBwLUJK+lppbd+El+8ZA/zH0bk7vbqph5pIoiWggxwdq3mEz4LnrUln7r6dagSQzYErKewY8GADVpXcq5mfHC1xF2DFBub7bFjMVM5fHq7RK+pG5xjNDiYITbhLYrbVv3X0z75OvN0dY49ITWjM7xyvMWJXVJS7sJlgmCCL6RwWgP8PhcE=").unwrap();
9999
/// let e = Base64::decode_vec("AQAB").unwrap();
100100
///
101-
/// let mut rng = rand::thread_rng();
101+
/// let mut rng = rand::thread_rng(); // [email protected]
102102
/// let key = RsaPublicKey::new(BigUint::from_bytes_be(&n), BigUint::from_bytes_be(&e)).unwrap();
103103
/// let padding = Oaep::new_with_mgf_hash::<Sha256, Sha1>();
104104
/// let encrypted_data = key.encrypt(&mut rng, padding, b"secret").unwrap();

src/pkcs1v15/signature.rs

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,4 @@
1-
pub use ::signature::{
2-
hazmat::{PrehashSigner, PrehashVerifier},
3-
DigestSigner, DigestVerifier, Error, Keypair, RandomizedDigestSigner, RandomizedSigner, Result,
4-
SignatureEncoding, Signer, Verifier,
5-
};
1+
pub use ::signature::SignatureEncoding;
62
use spki::{
73
der::{asn1::BitString, Result as DerResult},
84
SignatureBitStringEncoding,

src/pss/signature.rs

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,4 @@
1-
pub use ::signature::{
2-
hazmat::{PrehashSigner, PrehashVerifier},
3-
DigestSigner, DigestVerifier, Error, Keypair, RandomizedDigestSigner, RandomizedSigner, Result,
4-
SignatureEncoding, Signer, Verifier,
5-
};
1+
pub use ::signature::SignatureEncoding;
62
use spki::{
73
der::{asn1::BitString, Result as DerResult},
84
SignatureBitStringEncoding,

0 commit comments

Comments
 (0)