-
Notifications
You must be signed in to change notification settings - Fork 218
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use EntropyRng instead of OsRng #130
Conversation
The objective of this is paritytech/substrate#2416 |
I suggest merging this anyway. |
@tomaka just to be sure I understand the intent here: What do you make of the issues @ordian mentions? Seems like |
LGTM but I'll let @ordian press the green button here first. |
Yes |
I think one of the reasons |
Oh, that's interesting. I had concerns as well, but considering that it was marked as |
But as mentioned in rust-random/rand#760, we can assume that the In other words, this PR is basically a quickfix while waiting for rand 0.7. |
* master: Bump fixed-hash to 0.3.2 (#134) Use EntropyRng instead of OsRng (#130) Bump parity-crypto to 0.3.1 (#132) rust-crypto dependency removal (#85) Use newly stablized TryFrom trait for primitive-types (#127) change dependencies of `keccak-hash`and `trie-standardmap` (#111) bring appveyor back (#118) Extract `should_replace` from Scoring and supply pooled txs from same sender (#116)
* master: uint: faster mul by u64 (#125) fix rocksdb block cache size (#122) uint: convert benchmarks to criterion (#123) Bump fixed-hash to 0.3.2 (#134) Use EntropyRng instead of OsRng (#130) Bump parity-crypto to 0.3.1 (#132) rust-crypto dependency removal (#85) Use newly stablized TryFrom trait for primitive-types (#127)
EntropyRng
is also cryptographically secure, but will use jitter RNG (http://www.chronox.de/jent/doc/CPU-Jitter-NPTRNG.html) if theOsRng
isn't available.