-
Notifications
You must be signed in to change notification settings - Fork 220
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
no_std
API
#275
Comments
Doesn't this equally apply to |
I'd vote for not depriving std-users from having As of footguns, i think it's enough that the safer-to-use API is (1) shorter-named (2) takes fewer arguments. |
I would prefer not to have a |
Unfortunately, verification involves merging multiple statements in one with a random factor. Here are the available options to make
I'd personally go with option 2 for |
Hi! It was briefly discussed in the dalek-cryptography slack that this crate currently cannot be used in
no_std
environments due to its internal usage ofrand::thread_rng()
, which obviously requires thread-local storage and thus thestd
library. @oleganza proposed exposing an API such asverify_with_rng()
, which then the currentverify()
would be a backwards-compatible wrapper for by passing in arand::thread_rng()
.verify_with_rng()
should have a trait bound forRng + CryptoRng
(and possibly alsoSeedableRng
? since theFromEntropy
trait also requiresstd
).Questions:
So that explicitly only
no_std
users are trusted with passing in their own correctly-seeded PRNG?The text was updated successfully, but these errors were encountered: