mirror of
https://github.com/Blah-IM/blahrs.git
synced 2025-09-13 05:55:22 +00:00
build(deps): update to rand 0.9 is possible
Except for code using ed25519-dalek, since we are blocked by them. Also tweak RNG source so only key generation uses `OsRng`. PoW nonce generation only need unpredictability thus `ThreadRng` suffices. See: https://github.com/dalek-cryptography/curve25519-dalek/issues/731
This commit is contained in:
parent
172559973b
commit
40e4a53886
8 changed files with 20 additions and 17 deletions
|
@ -19,7 +19,7 @@ bitflags = "2"
|
|||
ed25519-dalek = { version = "2", default-features = false }
|
||||
hex = { version = "0.4", features = ["serde"] }
|
||||
html-escape = "0.2"
|
||||
rand = "0.8"
|
||||
rand = { version = "0.9", default-features = false, features = ["thread_rng"] }
|
||||
serde = { version = "1", features = ["derive"] }
|
||||
serde_jcs = "0.1"
|
||||
serde_json = "1"
|
||||
|
@ -43,6 +43,8 @@ optional = true
|
|||
criterion = "0.5"
|
||||
ed25519-dalek = { version = "2", features = ["rand_core"] }
|
||||
expect-test = "1"
|
||||
# WAIT: https://github.com/dalek-cryptography/curve25519-dalek/issues/731
|
||||
rand08 = { package = "rand", version = "0.8" }
|
||||
sha2 = "0.10"
|
||||
|
||||
[lints]
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue