Conversation
dhardy
left a comment
There was a problem hiding this comment.
Do we want this? I'm still not convinced.
If we do:
- The
thread-rngname is not consistent withrand_coreetc. Probably should berand_thread_rng. - We switched to using explicit features (#1473)
rand::rng,rand::randometc. need their cfg updated
How about |
|
This PR is mostly ready for review. I will work on docs and readme after it's decided that we will move forward with it.
I do. :) My main motivation is to be able to use and recommend |
You can already. And if you're talking about the disclaimer, it applies to this just as much as it does to |
|
I can not fully recommend it now because it pulls the whole |
|
|
@newpavlov you were the only proponent in #716 while several people were against, and I haven't seen any change there. |
|
Having I guess the actual wording in the changes in #1514 is perhaps not as strong as "rand is not a crypto library":
I would argue a CSRNG is high-level cryptographic functionality. It is not uncommon for cryptography libraries to suggest the use of |
|
My POV is that #1514 is mostly a disclaimer: |
This was previously discussed in #716 and recently raised in #1514.
The main disadvantage of moving thread RNG into its own crates is that users of
rand(with default crate features) will have one additional dependency in their dependency tree. On the other hand,ThreadRngcan be now used without the rest ofrand(e.g. in cryptographic applications). It also results in simpler configuration flags and thread RNG code, since we don't need to deal with the generality ofReseedingRng.If
ReseedingRngis not used in practice (cursory search on GitHub shows mostly vendoredrandcode), we probably can remove it completely or move into a separate crate.