@@ -260,11 +260,11 @@ mod tests {
260
260
let vrfy = Secp256k1 :: verification_only ( ) ;
261
261
let full = Secp256k1 :: new ( ) ;
262
262
263
- let msg = crate :: random_32_bytes ( & mut rand:: thread_rng ( ) ) ;
263
+ let msg = crate :: random_32_bytes ( & mut rand:: rng ( ) ) ;
264
264
let msg = Message :: from_digest_slice ( & msg) . unwrap ( ) ;
265
265
266
266
// Try key generation
267
- let ( sk, pk) = full. generate_keypair ( & mut rand:: thread_rng ( ) ) ;
267
+ let ( sk, pk) = full. generate_keypair ( & mut rand:: rng ( ) ) ;
268
268
269
269
// Try signing
270
270
assert_eq ! ( sign. sign_ecdsa_recoverable( msg, & sk) , full. sign_ecdsa_recoverable( msg, & sk) ) ;
@@ -290,7 +290,7 @@ mod tests {
290
290
#[ rustfmt:: skip]
291
291
fn sign ( ) {
292
292
let mut s = Secp256k1 :: new ( ) ;
293
- s. randomize ( & mut rand:: thread_rng ( ) ) ;
293
+ s. randomize ( & mut rand:: rng ( ) ) ;
294
294
295
295
let sk = SecretKey :: from_slice ( & ONE ) . unwrap ( ) ;
296
296
let msg = Message :: from_digest_slice ( & ONE ) . unwrap ( ) ;
@@ -315,7 +315,7 @@ mod tests {
315
315
#[ rustfmt:: skip]
316
316
fn sign_with_noncedata ( ) {
317
317
let mut s = Secp256k1 :: new ( ) ;
318
- s. randomize ( & mut rand:: thread_rng ( ) ) ;
318
+ s. randomize ( & mut rand:: rng ( ) ) ;
319
319
320
320
let sk = SecretKey :: from_slice ( & ONE ) . unwrap ( ) ;
321
321
let msg = Message :: from_digest_slice ( & ONE ) . unwrap ( ) ;
@@ -339,17 +339,17 @@ mod tests {
339
339
#[ cfg( all( feature = "rand" , feature = "std" ) ) ]
340
340
fn sign_and_verify_fail ( ) {
341
341
let mut s = Secp256k1 :: new ( ) ;
342
- s. randomize ( & mut rand:: thread_rng ( ) ) ;
342
+ s. randomize ( & mut rand:: rng ( ) ) ;
343
343
344
- let msg = crate :: random_32_bytes ( & mut rand:: thread_rng ( ) ) ;
344
+ let msg = crate :: random_32_bytes ( & mut rand:: rng ( ) ) ;
345
345
let msg = Message :: from_digest_slice ( & msg) . unwrap ( ) ;
346
346
347
- let ( sk, pk) = s. generate_keypair ( & mut rand:: thread_rng ( ) ) ;
347
+ let ( sk, pk) = s. generate_keypair ( & mut rand:: rng ( ) ) ;
348
348
349
349
let sigr = s. sign_ecdsa_recoverable ( msg, & sk) ;
350
350
let sig = sigr. to_standard ( ) ;
351
351
352
- let msg = crate :: random_32_bytes ( & mut rand:: thread_rng ( ) ) ;
352
+ let msg = crate :: random_32_bytes ( & mut rand:: rng ( ) ) ;
353
353
let msg = Message :: from_digest_slice ( & msg) . unwrap ( ) ;
354
354
assert_eq ! ( s. verify_ecdsa( msg, & sig, & pk) , Err ( Error :: IncorrectSignature ) ) ;
355
355
@@ -361,12 +361,12 @@ mod tests {
361
361
#[ cfg( all( feature = "rand" , feature = "std" ) ) ]
362
362
fn sign_with_recovery ( ) {
363
363
let mut s = Secp256k1 :: new ( ) ;
364
- s. randomize ( & mut rand:: thread_rng ( ) ) ;
364
+ s. randomize ( & mut rand:: rng ( ) ) ;
365
365
366
- let msg = crate :: random_32_bytes ( & mut rand:: thread_rng ( ) ) ;
366
+ let msg = crate :: random_32_bytes ( & mut rand:: rng ( ) ) ;
367
367
let msg = Message :: from_digest_slice ( & msg) . unwrap ( ) ;
368
368
369
- let ( sk, pk) = s. generate_keypair ( & mut rand:: thread_rng ( ) ) ;
369
+ let ( sk, pk) = s. generate_keypair ( & mut rand:: rng ( ) ) ;
370
370
371
371
let sig = s. sign_ecdsa_recoverable ( msg, & sk) ;
372
372
@@ -377,14 +377,14 @@ mod tests {
377
377
#[ cfg( all( feature = "rand" , feature = "std" ) ) ]
378
378
fn sign_with_recovery_and_noncedata ( ) {
379
379
let mut s = Secp256k1 :: new ( ) ;
380
- s. randomize ( & mut rand:: thread_rng ( ) ) ;
380
+ s. randomize ( & mut rand:: rng ( ) ) ;
381
381
382
- let msg = crate :: random_32_bytes ( & mut rand:: thread_rng ( ) ) ;
382
+ let msg = crate :: random_32_bytes ( & mut rand:: rng ( ) ) ;
383
383
let msg = Message :: from_digest_slice ( & msg) . unwrap ( ) ;
384
384
385
385
let noncedata = [ 42u8 ; 32 ] ;
386
386
387
- let ( sk, pk) = s. generate_keypair ( & mut rand:: thread_rng ( ) ) ;
387
+ let ( sk, pk) = s. generate_keypair ( & mut rand:: rng ( ) ) ;
388
388
389
389
let sig = s. sign_ecdsa_recoverable_with_noncedata ( msg, & sk, & noncedata) ;
390
390
@@ -395,7 +395,7 @@ mod tests {
395
395
#[ cfg( all( feature = "rand" , feature = "std" ) ) ]
396
396
fn bad_recovery ( ) {
397
397
let mut s = Secp256k1 :: new ( ) ;
398
- s. randomize ( & mut rand:: thread_rng ( ) ) ;
398
+ s. randomize ( & mut rand:: rng ( ) ) ;
399
399
400
400
let msg = Message :: from_digest_slice ( & [ 0x55 ; 32 ] ) . unwrap ( ) ;
401
401
@@ -467,9 +467,9 @@ mod benches {
467
467
#[ bench]
468
468
pub fn bench_recover ( bh : & mut Bencher ) {
469
469
let s = Secp256k1 :: new ( ) ;
470
- let msg = crate :: random_32_bytes ( & mut rand:: thread_rng ( ) ) ;
470
+ let msg = crate :: random_32_bytes ( & mut rand:: rng ( ) ) ;
471
471
let msg = Message :: from_digest_slice ( & msg) . unwrap ( ) ;
472
- let ( sk, _) = s. generate_keypair ( & mut rand:: thread_rng ( ) ) ;
472
+ let ( sk, _) = s. generate_keypair ( & mut rand:: rng ( ) ) ;
473
473
let sig = s. sign_ecdsa_recoverable ( & msg, & sk) ;
474
474
475
475
bh. iter ( || {
0 commit comments