Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump rand_pcg from 0.2.1 to 0.3.1 #2

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github Oct 3, 2022

Bumps rand_pcg from 0.2.1 to 0.3.1.

Changelog

Sourced from rand_pcg's changelog.

[0.3.19] - 2017-12-27

Changed

  • Require log <= 0.3.8 for dev builds
  • Update fuchsia-zircon dependency to 0.3
  • Fix broken links in docs (to unblock compiler docs testing CI)

[0.3.18] - 2017-11-06

Changed

  • thread_rng is seeded from the system time if OsRng fails
  • weak_rng now uses thread_rng internally

[0.3.17] - 2017-10-07

Changed

  • Fuchsia: Magenta was renamed Zircon

[0.3.16] - 2017-07-27

Added

  • Implement Debug for mote non-public types
  • implement Rand for (i|u)i128
  • Support for Fuchsia

Changed

  • Add inline attribute to SampleRange::construct_range. This improves the benchmark for sample in 11% and for shuffle in 16%.
  • Use RtlGenRandom instead of CryptGenRandom

[0.3.15] - 2016-11-26

Added

  • Add Rng trait method choose_mut
  • Redox support

Changed

  • Use arc4rand for OsRng on FreeBSD.
  • Use arc4random(3) for OsRng on OpenBSD.

Fixed

  • Fix filling buffers 4 GiB or larger with OsRng::fill_bytes on Windows

[0.3.14] - 2016-02-13

Fixed

  • Inline definitions from winapi/advapi32, which decreases build times

[0.3.13] - 2016-01-09

Fixed

  • Compatible with Rust 1.7.0-nightly (needed some extra type annotations)

... (truncated)

Commits
  • 8792268 Merge pull request #1137 from rust-random/work2
  • 1bfc53d Update changelogs and bump version numbers
  • 4534311 Merge pull request #1133 from rust-random/work2
  • 81f1af8 Correct usage of reserve
  • fa17d1c Add comment to append_string for Standard
  • b4c1d66 Add DistString
  • 1947c89 Move Distribution trait and associates to sub-module
  • 98a0339 Merge pull request #1135 from dhardy/work
  • a7f8fb7 Prepare rand_chacha v0.3.1 release
  • 09d3df3 Merge pull request #1130 from dhardy/work
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [rand_pcg](https://github.com/rust-random/rand) from 0.2.1 to 0.3.1.
- [Release notes](https://github.com/rust-random/rand/releases)
- [Changelog](https://github.com/rust-random/rand/blob/master/CHANGELOG.md)
- [Commits](rust-random/rand@rand_pcg-0.2.1...rand_pcg-0.3.1)

---
updated-dependencies:
- dependency-name: rand_pcg
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot @github
Copy link
Author

dependabot bot commented on behalf of github Oct 3, 2022

The following labels could not be found: A2-insubstantial, B0-silent, C1-low 📌.

kostiask pushed a commit that referenced this pull request Feb 14, 2024
* Cherry pick all crypto related changes from pull-request paritytech#13311
applied to master's head

* Import some stuff just if 'full_crypto' is on

* Remove copyright year

* Cleanup

* First generic BLS draft

* Finalize generic implementation

* Restore tests

* Fix rust docs

* Fix after master merge

* Fix after master merge

* Use double bls with G1 as signature group and verify individual signatures using DLEQ proof.

* Fix inclusions and types used within substrate

* Remove unused cruft

* Restore usage of upstream crates

* Fix test

* Reduce the diff by aligning Cargo.lock to master

* Application-crypto provides bls381

* Implement bls381 for local keystore

* Use new generic keystore features

* import DoublePublickey[Scheme] from the bls-like root to be less confusing.

* fix compilation

* Apply suggestions from code review

Co-authored-by: Robert Hambrock <[email protected]>

* Clean leftovers

* - update bls test vector after applying spec change recommendation.
- send message as ref.

* Different hard junction ids for different bls12 types

* update to new bls-like

* bls-like → w3f-bls

* Make clippy happy

* update test vector after replacing hash and crop with hash to field.

* cargo fmt

* account for paritytech#13972

* hide BLS behind "bls_non_production" feature flag

* Remove Cargo.lock entries duplicated in merge

* add bls377 to primitives/keystore and client/keystore
add bls377 to primitives/application-crypto/
add bls_non_production to primitives/keystore and client/keystore
bump up w3f-bls version

* rename feature `bls_non_production` to `bls-experimental`

---------

Co-authored-by: Davide Galassi <[email protected]>
Co-authored-by: André Silva <[email protected]>
Co-authored-by: Robert Hambrock <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants