bf6cc94a3c
* use external rng instead of nimcrypto allows passing in different RNG's to generate keys * pass in array of random data to random keygen function * back to a proc * docs * gcsafe rng callback needed * introduce foolproofrng that can't fail * silence compiler warning * hint at random not being good enough in defect |
||
---|---|---|
.. | ||
all_tests.nim | ||
test_secp256k1.nim | ||
test_secp256k1_abi.nim |