-
Notifications
You must be signed in to change notification settings - Fork 133
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
On the usage os OsRng #86
Comments
The secret itself requires There is a pr for version bump and everything should be fine and you can use StdRng or OsRng from rand_core 0.6 or whatever (hopefully, but nobody review or merge the pr) |
Can I use something other than OsRng? I've been trying to substitute other cores but I'm getting trait not satisfied errors. |
Hi, this is more of a question than a issue.
In the example that you give of creating keypairs, you use the rand_core Osrng:
After reading a bit up on the osrng, I read that it was not a cryptographically secure source of randomness, and that I should use a resource that specifcally had a focus on that.
The most common option for a csprg, seems to be the StdRng in the rand crate. That I was advised to use.
Is it possible to use
use rand::{rngs::StdRng};
to create keypairs in your crate? or is the use of osrng completely unproblematic?The text was updated successfully, but these errors were encountered: