|
26 | 26 | #![cfg_attr(not(feature = "sha2"), doc = "```ignore")] |
27 | 27 | //! use rsa::{RsaPrivateKey, RsaPublicKey, Oaep, sha2::Sha256}; |
28 | 28 | //! |
29 | | -//! let mut rng = rand::thread_rng(); |
| 29 | +//! let mut rng = rand::thread_rng(); // [email protected] |
30 | 30 | //! |
31 | 31 | //! let bits = 2048; |
32 | 32 | //! let private_key = RsaPrivateKey::new(&mut rng, bits).expect("failed to generate a key"); |
|
48 | 48 | //! ``` |
49 | 49 | //! use rsa::{RsaPrivateKey, RsaPublicKey, Pkcs1v15Encrypt}; |
50 | 50 | //! |
51 | | -//! let mut rng = rand::thread_rng(); |
| 51 | +//! let mut rng = rand::thread_rng(); // [email protected] |
52 | 52 | //! |
53 | 53 | //! let bits = 2048; |
54 | 54 | //! let private_key = RsaPrivateKey::new(&mut rng, bits).expect("failed to generate a key"); |
|
75 | 75 | //! use rsa::signature::{Keypair, RandomizedSigner, SignatureEncoding, Verifier}; |
76 | 76 | //! use rsa::sha2::{Digest, Sha256}; |
77 | 77 | //! |
78 | | -//! let mut rng = rand::thread_rng(); |
| 78 | +//! let mut rng = rand::thread_rng(); // [email protected] |
79 | 79 | //! |
80 | 80 | //! let bits = 2048; |
81 | 81 | //! let private_key = RsaPrivateKey::new(&mut rng, bits).expect("failed to generate a key"); |
|
102 | 102 | //! use rsa::signature::{Keypair,RandomizedSigner, SignatureEncoding, Verifier}; |
103 | 103 | //! use rsa::sha2::{Digest, Sha256}; |
104 | 104 | //! |
105 | | -//! let mut rng = rand::thread_rng(); |
| 105 | +//! let mut rng = rand::thread_rng(); // [email protected] |
106 | 106 | //! |
107 | 107 | //! let bits = 2048; |
108 | 108 | //! let private_key = RsaPrivateKey::new(&mut rng, bits).expect("failed to generate a key"); |
|
0 commit comments