-
Notifications
You must be signed in to change notification settings - Fork 20.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Align key and ecdsa nonce entropy #299
Align key and ecdsa nonce entropy #299
Conversation
* Move random entropy functions to new package randentropy * Add function to get n bytes entropy where up to first 32 bytes are mixed with OS entropy sources
c908bfa
to
8c056ae
Compare
While tests in crypto and secp256k1 works, we should verify the mixing of OS entropy in terms of security - is it guaranteed to never weaken what we get from crypto/rand? Also: I would suggest we move the Sha3 helper function to sha3 package (if it's in crypto it creates a circular dependency between crypto and the new randentropy package) |
"time" | ||
) | ||
|
||
type RandEntropy struct { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I suggest we make this an unexported type and export randentropy.Reader
and remove the new(randentropy.RandEntropy)
from the other files and pass in the Reader
directly.
…_error cmd/swarm: make sure swarm doesnt crash when requested missing hashes
Prioritize block with random seed by double the normal block weight
Co-authored-by: Banana-J <wjrjerome@gmail.com> Co-authored-by: Liam Lai <liam.lai@datameshgroup.com.au>
No description provided.