From 5f5885063309b90fc86c1d6bace867790c002c9d Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?S=C3=A9bastien=20Duquette?= Date: Fri, 27 Feb 2026 15:42:22 -0500 Subject: [PATCH] docs: use derive_key_argon2 in examples, derive_key no longer exists --- README_RUST.md | 14 ++++++-------- 1 file changed, 6 insertions(+), 8 deletions(-) diff --git a/README_RUST.md b/README_RUST.md index d8cc05a27..8294021d2 100644 --- a/README_RUST.md +++ b/README_RUST.md @@ -212,17 +212,15 @@ assert_eq!(32, key.len()); ### Key Derivation -This is a method used to generate a key from a password or another key. Useful for password-dependant cryptography. Salt should be a random 16 bytes array if possible and iterations should be 10000 or configurable by the user. +Key derivation can be used to generate a key of a specific length from an input of arbitrary length such as a password. ```rust -use devolutions_crypto::utils::{generate_key, derive_key}; -let key = b"this is a secret password"; -let salt = generate_key(16); -let iterations = 10000; -let length = 32; - -let new_key = derive_key(key, &salt, iterations, length); +use devolutions_crypto::utils::derive_key_argon2; +use devolutions_crypto::Argon2Parameters; +let key = b"this is a secret password"; +let parameters = Argon2Parameters::default(); +let new_key = derive_key_argon2(key, ¶meters).expect("default parameters should not fail"); assert_eq!(32, new_key.len()); ```