Skip to content

Commit e7a1c71

Browse files
authored
Update README.md
1 parent 8361135 commit e7a1c71

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

README.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -59,14 +59,14 @@ sequenceDiagram
5959
use kychacha_crypto::{generate_keypair, Keypair, decrypt, encrypt, PublicKey};
6060

6161
// Generate a ML-KEM-1024 keypair
62-
let server_kp: Keypair = generate_keypair()?;
62+
let server_kp: Keypair = generate_keypair();
6363

6464
let message = b"Secret message";
6565
// Encrypt the message using the server's public key
66-
let encrypted_data: Vec<u8> = encrypt(&server_kp.public, message)?;
66+
let encrypted_data = encrypt(&server_kp.public, message)?;
6767

6868
// Receive encrypted_data as &[u8] from the client
69-
let decrypted_message = decrypt(&encrypted_data, &server_kp)?;
69+
let decrypted_message = decrypt(&encrypted_data, &server_kp);
7070
assert_eq!(decrypted_message, "Secret message");
7171
```
7272
> **Note**: The decrypt function assumes the original message is a valid UTF-8 string and returns a String. If the message contains non-UTF-8 binary data, decryption will fail.
@@ -76,8 +76,8 @@ assert_eq!(decrypted_message, "Secret message");
7676
use kychacha_crypto::{public_key_to_bytes, secret_key_to_bytes};
7777

7878
// Convert keys to byte vectors
79-
let pk_bytes: Vec<u8> = public_key_to_bytes(&server_kp.public);
80-
let sk_bytes: Vec<u8> = secret_key_to_bytes(&server_kp.secret);
79+
let pk_bytes = public_key_to_bytes(&server_kp.public);
80+
let sk_bytes = secret_key_to_bytes(&server_kp.secret);
8181

8282
// Reconstruct keys from bytes
8383
let public_key = PublicKey::from(pk_bytes.as_slice());

0 commit comments

Comments
 (0)