38
38
extern crate crypto;
39
39
40
40
extern crate libc;
41
+ extern crate rand;
41
42
extern crate serialize;
42
43
extern crate test;
43
44
44
45
use std:: intrinsics:: copy_nonoverlapping;
45
46
use std:: io;
46
- use std:: rand:: { OsRng , Rng , SeedableRng } ;
47
+ use std:: rand:: OsRng ;
47
48
use std:: sync:: { Once , ONCE_INIT } ;
48
49
use libc:: c_int;
50
+ use rand:: { Rng , SeedableRng } ;
49
51
50
52
use crypto:: fortuna:: Fortuna ;
51
53
@@ -272,8 +274,8 @@ impl Secp256k1 {
272
274
#[ cfg( test) ]
273
275
mod tests {
274
276
use std:: iter:: repeat;
275
- use std:: rand;
276
- use std :: rand:: Rng ;
277
+ use std:: rand:: thread_rng ;
278
+ use rand:: Rng ;
277
279
278
280
use test:: { Bencher , black_box} ;
279
281
@@ -287,7 +289,7 @@ mod tests {
287
289
let sig = Signature :: from_slice ( & [ 0 ; 72 ] ) . unwrap ( ) ;
288
290
let pk = PublicKey :: new ( true ) ;
289
291
290
- rand :: thread_rng ( ) . fill_bytes ( msg. as_mut_slice ( ) ) ;
292
+ thread_rng ( ) . fill_bytes ( msg. as_mut_slice ( ) ) ;
291
293
292
294
assert_eq ! ( Secp256k1 :: verify( msg. as_mut_slice( ) , & sig, & pk) , Err ( InvalidPublicKey ) ) ;
293
295
}
@@ -301,7 +303,7 @@ mod tests {
301
303
let mut msg: Vec < u8 > = repeat ( 0 ) . take ( 32 ) . collect ( ) ;
302
304
let sig = Signature :: from_slice ( & [ 0 ; 72 ] ) . unwrap ( ) ;
303
305
304
- rand :: thread_rng ( ) . fill_bytes ( msg. as_mut_slice ( ) ) ;
306
+ thread_rng ( ) . fill_bytes ( msg. as_mut_slice ( ) ) ;
305
307
306
308
assert_eq ! ( Secp256k1 :: verify( msg. as_mut_slice( ) , & sig, & pk) , Err ( InvalidSignature ) ) ;
307
309
}
@@ -314,7 +316,7 @@ mod tests {
314
316
let mut msg: Vec < u8 > = repeat ( 0 ) . take ( 32 ) . collect ( ) ;
315
317
let sig = Signature :: from_slice ( & [ 0 ; 72 ] ) . unwrap ( ) ;
316
318
317
- rand :: thread_rng ( ) . fill_bytes ( msg. as_mut_slice ( ) ) ;
319
+ thread_rng ( ) . fill_bytes ( msg. as_mut_slice ( ) ) ;
318
320
319
321
assert_eq ! ( Secp256k1 :: verify( msg. as_mut_slice( ) , & sig, & pk) , Err ( InvalidSignature ) ) ;
320
322
}
@@ -324,7 +326,7 @@ mod tests {
324
326
let mut s = Secp256k1 :: new ( ) . unwrap ( ) ;
325
327
326
328
let mut msg = [ 0u8 ; 32 ] ;
327
- rand :: thread_rng ( ) . fill_bytes ( & mut msg) ;
329
+ thread_rng ( ) . fill_bytes ( & mut msg) ;
328
330
329
331
let ( sk, _) = s. generate_keypair ( false ) ;
330
332
let nonce = s. generate_nonce ( ) ;
@@ -337,7 +339,7 @@ mod tests {
337
339
let mut s = Secp256k1 :: new ( ) . unwrap ( ) ;
338
340
339
341
let mut msg: Vec < u8 > = repeat ( 0 ) . take ( 32 ) . collect ( ) ;
340
- rand :: thread_rng ( ) . fill_bytes ( msg. as_mut_slice ( ) ) ;
342
+ thread_rng ( ) . fill_bytes ( msg. as_mut_slice ( ) ) ;
341
343
342
344
let ( sk, pk) = s. generate_keypair ( false ) ;
343
345
let nonce = s. generate_nonce ( ) ;
@@ -352,14 +354,14 @@ mod tests {
352
354
let mut s = Secp256k1 :: new ( ) . unwrap ( ) ;
353
355
354
356
let mut msg: Vec < u8 > = repeat ( 0 ) . take ( 32 ) . collect ( ) ;
355
- rand :: thread_rng ( ) . fill_bytes ( msg. as_mut_slice ( ) ) ;
357
+ thread_rng ( ) . fill_bytes ( msg. as_mut_slice ( ) ) ;
356
358
357
359
let ( sk, pk) = s. generate_keypair ( false ) ;
358
360
let nonce = s. generate_nonce ( ) ;
359
361
360
362
let sig = s. sign ( msg. as_slice ( ) , & sk, & nonce) . unwrap ( ) ;
361
363
362
- rand :: thread_rng ( ) . fill_bytes ( msg. as_mut_slice ( ) ) ;
364
+ thread_rng ( ) . fill_bytes ( msg. as_mut_slice ( ) ) ;
363
365
assert_eq ! ( Secp256k1 :: verify( msg. as_slice( ) , & sig, & pk) , Err ( IncorrectSignature ) ) ;
364
366
}
365
367
@@ -368,7 +370,7 @@ mod tests {
368
370
let mut s = Secp256k1 :: new ( ) . unwrap ( ) ;
369
371
370
372
let mut msg = [ 0u8 ; 32 ] ;
371
- rand :: thread_rng ( ) . fill_bytes ( msg. as_mut_slice ( ) ) ;
373
+ thread_rng ( ) . fill_bytes ( msg. as_mut_slice ( ) ) ;
372
374
373
375
let ( sk, pk) = s. generate_keypair ( false ) ;
374
376
let nonce = s. generate_nonce ( ) ;
@@ -381,7 +383,7 @@ mod tests {
381
383
#[ test]
382
384
fn deterministic_sign ( ) {
383
385
let mut msg = [ 0u8 ; 32 ] ;
384
- rand :: thread_rng ( ) . fill_bytes ( msg. as_mut_slice ( ) ) ;
386
+ thread_rng ( ) . fill_bytes ( msg. as_mut_slice ( ) ) ;
385
387
386
388
let mut s = Secp256k1 :: new ( ) . unwrap ( ) ;
387
389
let ( sk, pk) = s. generate_keypair ( true ) ;
0 commit comments