From b543f366efec8dc3b738dd79f4629ca90a6f8484 Mon Sep 17 00:00:00 2001 From: Sarah Jamie Lewis Date: Sat, 22 May 2021 12:54:17 -0700 Subject: [PATCH] idomatic OsRng documentation --- README.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/README.md b/README.md index 3f7417c..e8ce883 100644 --- a/README.md +++ b/README.md @@ -89,7 +89,7 @@ A party first needs to generate `RootSecret` use fuzzytags::RootSecret; use rand::rngs::OsRng; - let mut rng = OsRng::default(); + let mut rng = OsRng; let secret = RootSecret::<24>::generate(&mut rng); From the secret detection key a party can derive a `DetectionKey` which can be given to adversarial server to @@ -107,7 +107,7 @@ Once in possession of a tagging key, a party in a metadata resistant app can use use fuzzytags::RootSecret; use rand::rngs::OsRng; - let mut rng = OsRng::default(); + let mut rng = OsRng; let secret = RootSecret::<24>::generate(&mut rng); let tagging_key = secret.tagging_key(); @@ -125,7 +125,7 @@ This extracted key can then be given to an adversarial server. The server can th use fuzzytags::RootSecret; use rand::rngs::OsRng; - let mut rng = OsRng::default(); + let mut rng = OsRng; let secret = RootSecret::<24>::generate(&mut rng); let tagging_key = secret.tagging_key(); // extract a detection key @@ -151,7 +151,7 @@ opens up applications like **multiple broadcast** and **deniable sending**. use fuzzytags::{RootSecret, TaggingKey}; use rand::rngs::OsRng; - let mut rng = OsRng::default(); + let mut rng = OsRng; let secret_1 = RootSecret::<24>::generate(&mut rng); let secret_2 = RootSecret::<24>::generate(&mut rng); let tagging_key_1 = secret_1.tagging_key(); // give this to a sender @@ -171,7 +171,7 @@ of different approaches e.g.: use fuzzytags::Tag; use rand::rngs::OsRng; - let mut rng = OsRng::default(); + let mut rng = OsRng; let secret = RootSecret::<24>::generate(&mut rng); let tagging_key = secret.tagging_key();