idomatic OsRng documentation

This commit is contained in:
Sarah Jamie Lewis 2021-05-22 12:54:17 -07:00
parent 557fa4f1d7
commit 78f780a389
1 changed files with 5 additions and 5 deletions

View File

@ -89,7 +89,7 @@ A party first needs to generate `RootSecret`
use fuzzytags::RootSecret;
use rand::rngs::OsRng;
let mut rng = OsRng::default();
let mut rng = OsRng;
let secret = RootSecret::<24>::generate(&mut rng);
From the secret detection key a party can derive a `DetectionKey` which can be given to adversarial server to
@ -107,7 +107,7 @@ Once in possession of a tagging key, a party in a metadata resistant app can use
use fuzzytags::RootSecret;
use rand::rngs::OsRng;
let mut rng = OsRng::default();
let mut rng = OsRng;
let secret = RootSecret::<24>::generate(&mut rng);
let tagging_key = secret.tagging_key();
@ -125,7 +125,7 @@ This extracted key can then be given to an adversarial server. The server can th
use fuzzytags::RootSecret;
use rand::rngs::OsRng;
let mut rng = OsRng::default();
let mut rng = OsRng;
let secret = RootSecret::<24>::generate(&mut rng);
let tagging_key = secret.tagging_key();
// extract a detection key
@ -151,7 +151,7 @@ opens up applications like **multiple broadcast** and **deniable sending**.
use fuzzytags::{RootSecret, TaggingKey};
use rand::rngs::OsRng;
let mut rng = OsRng::default();
let mut rng = OsRng;
let secret_1 = RootSecret::<24>::generate(&mut rng);
let secret_2 = RootSecret::<24>::generate(&mut rng);
let tagging_key_1 = secret_1.tagging_key(); // give this to a sender
@ -171,7 +171,7 @@ of different approaches e.g.:
use fuzzytags::Tag;
use rand::rngs::OsRng;
let mut rng = OsRng::default();
let mut rng = OsRng;
let secret = RootSecret::<24>::generate(&mut rng);
let tagging_key = secret.tagging_key();