diff --git a/library/core/src/lib.rs b/library/core/src/lib.rs index b4393889e75..d9b03c97072 100644 --- a/library/core/src/lib.rs +++ b/library/core/src/lib.rs @@ -394,7 +394,7 @@ pub mod assert_matches { #[unstable(feature = "core_pattern_types", issue = "123646")] pub mod pat; pub mod pin; -#[unstable(feature = "random", issue = "none")] +#[unstable(feature = "random", issue = "130703")] pub mod random; #[unstable(feature = "new_range_api", issue = "125687")] pub mod range; diff --git a/library/core/src/random.rs b/library/core/src/random.rs index 9e0d0d0c58b..051fe260863 100644 --- a/library/core/src/random.rs +++ b/library/core/src/random.rs @@ -4,7 +4,7 @@ //! given [`RandomSource`]. /// A source of randomness. -#[unstable(feature = "random", issue = "none")] +#[unstable(feature = "random", issue = "130703")] pub trait RandomSource { /// Fills `bytes` with random bytes. fn fill_bytes(&mut self, bytes: &mut [u8]); @@ -17,7 +17,7 @@ pub trait RandomSource { /// distribution, so a value of 1 is just as likely as [`i32::MAX`]. By using /// modulo operations, some of the resulting values can become more likely than /// others. Use audited crates when in doubt. -#[unstable(feature = "random", issue = "none")] +#[unstable(feature = "random", issue = "130703")] pub trait Random: Sized { /// Generates a random value. fn random(source: &mut (impl RandomSource + ?Sized)) -> Self; diff --git a/library/std/src/lib.rs b/library/std/src/lib.rs index ce05d816604..e6b2f15a7a6 100644 --- a/library/std/src/lib.rs +++ b/library/std/src/lib.rs @@ -597,7 +597,7 @@ #[unstable(feature = "anonymous_pipe", issue = "127154")] pub mod pipe; pub mod process; -#[unstable(feature = "random", issue = "none")] +#[unstable(feature = "random", issue = "130703")] pub mod random; pub mod sync; pub mod time; diff --git a/library/std/src/random.rs b/library/std/src/random.rs index 48b55a55b2f..ecbf02eee84 100644 --- a/library/std/src/random.rs +++ b/library/std/src/random.rs @@ -3,7 +3,7 @@ //! The [`Random`] trait allows generating a random value for a type using a //! given [`RandomSource`]. -#[unstable(feature = "random", issue = "none")] +#[unstable(feature = "random", issue = "130703")] pub use core::random::*; use crate::sys::random as sys; @@ -15,9 +15,9 @@ /// documentation below for the specific guarantees your target provides. /// /// The high quality of randomness provided by this source means it can be quite -/// slow. If you need a large quantity of random numbers and security is not a -/// concern, consider using an alternative random number generator (potentially -/// seeded from this one). +/// slow on some targets. If you need a large quantity of random numbers and +/// security is not a concern, consider using an alternative random number +/// generator (potentially seeded from this one). /// /// # Underlying sources /// @@ -26,9 +26,9 @@ /// Linux | [`getrandom`] or [`/dev/urandom`] after polling `/dev/random` /// Windows | [`ProcessPrng`](https://learn.microsoft.com/en-us/windows/win32/seccng/processprng) /// Apple | `CCRandomGenerateBytes` -/// DragonFly | [`arc4random_buf`](https://man.dragonflybsd.org/?command=arc4random§ion=ANY) +/// DragonFly | [`arc4random_buf`](https://man.dragonflybsd.org/?command=arc4random) /// ESP-IDF | [`esp_fill_random`](https://docs.espressif.com/projects/esp-idf/en/latest/esp32/api-reference/system/random.html#_CPPv415esp_fill_randomPv6size_t) -/// FreeBSD | [`arc4random_buf`](https://man.freebsd.org/cgi/man.cgi?query=arc4random&apropos=0&sektion=0&manpath=FreeBSD+15.0-CURRENT&arch=default&format=html) +/// FreeBSD | [`arc4random_buf`](https://man.freebsd.org/cgi/man.cgi?query=arc4random) /// Fuchsia | [`cprng_draw`](https://fuchsia.dev/reference/syscalls/cprng_draw) /// Haiku | `arc4random_buf` /// Illumos | [`arc4random_buf`](https://www.illumos.org/man/3C/arc4random) @@ -48,15 +48,19 @@ /// WASI | [`random_get`](https://github.com/WebAssembly/WASI/blob/main/legacy/preview1/docs.md#-random_getbuf-pointeru8-buf_len-size---result-errno) /// ZKVM | `sys_rand` /// -/// **Disclaimer:** The sources used might change over time. +/// Note that the sources used might change over time. +/// +/// Consult the documentation for the underlying operations on your supported +/// targets to determine whether they provide any particular desired properties, +/// such as support for reseeding on VM fork operations. /// /// [`getrandom`]: https://www.man7.org/linux/man-pages/man2/getrandom.2.html /// [`/dev/urandom`]: https://www.man7.org/linux/man-pages/man4/random.4.html #[derive(Default, Debug, Clone, Copy)] -#[unstable(feature = "random", issue = "none")] +#[unstable(feature = "random", issue = "130703")] pub struct DefaultRandomSource; -#[unstable(feature = "random", issue = "none")] +#[unstable(feature = "random", issue = "130703")] impl RandomSource for DefaultRandomSource { fn fill_bytes(&mut self, bytes: &mut [u8]) { sys::fill_bytes(bytes) @@ -83,7 +87,7 @@ fn fill_bytes(&mut self, bytes: &mut [u8]) { /// /// use std::random::random; /// -/// let bits = random::(); +/// let bits: u128 = random(); /// let g1 = (bits >> 96) as u32; /// let g2 = (bits >> 80) as u16; /// let g3 = (0x4000 | (bits >> 64) & 0x0fff) as u16; @@ -94,6 +98,7 @@ fn fill_bytes(&mut self, bytes: &mut [u8]) { /// ``` /// /// [version 4/variant 1 UUID]: https://en.wikipedia.org/wiki/Universally_unique_identifier#Version_4_(random) +#[unstable(feature = "random", issue = "130703")] pub fn random() -> T { T::random(&mut DefaultRandomSource) }