|
25 | 25 | #![cfg_attr(not(feature = "sha2"), doc = "```ignore")] |
26 | 26 | //! use rsa::{RsaPrivateKey, RsaPublicKey, Oaep, sha2::Sha256}; |
27 | 27 | //! |
28 | | -//! let mut rng = rand::thread_rng(); |
| 28 | +//! let mut rng = rand::thread_rng(); // rand@0.8 |
29 | 29 | //! |
30 | 30 | //! let bits = 2048; |
31 | 31 | //! let private_key = RsaPrivateKey::new(&mut rng, bits).expect("failed to generate a key"); |
|
47 | 47 | //! ``` |
48 | 48 | //! use rsa::{RsaPrivateKey, RsaPublicKey, Pkcs1v15Encrypt}; |
49 | 49 | //! |
50 | | -//! let mut rng = rand::thread_rng(); |
| 50 | +//! let mut rng = rand::thread_rng(); // rand@0.8 |
51 | 51 | //! |
52 | 52 | //! let bits = 2048; |
53 | 53 | //! let private_key = RsaPrivateKey::new(&mut rng, bits).expect("failed to generate a key"); |
|
74 | 74 | //! use rsa::signature::{Keypair, RandomizedSigner, SignatureEncoding, Verifier}; |
75 | 75 | //! use rsa::sha2::{Digest, Sha256}; |
76 | 76 | //! |
77 | | -//! let mut rng = rand::thread_rng(); |
| 77 | +//! let mut rng = rand::thread_rng(); // rand@0.8 |
78 | 78 | //! |
79 | 79 | //! let bits = 2048; |
80 | 80 | //! let private_key = RsaPrivateKey::new(&mut rng, bits).expect("failed to generate a key"); |
|
101 | 101 | //! use rsa::signature::{Keypair,RandomizedSigner, SignatureEncoding, Verifier}; |
102 | 102 | //! use rsa::sha2::{Digest, Sha256}; |
103 | 103 | //! |
104 | | -//! let mut rng = rand::thread_rng(); |
| 104 | +//! let mut rng = rand::thread_rng(); // rand@0.8 |
105 | 105 | //! |
106 | 106 | //! let bits = 2048; |
107 | 107 | //! let private_key = RsaPrivateKey::new(&mut rng, bits).expect("failed to generate a key"); |
|
0 commit comments