Open xelan opened 1 week ago
As all current usages of getRandomSeed() directly hash the seed, there should be no BC breaking changes.
The main source of entropy is more than enough on its own if random_bytes() or openssl_random_pseudo_bytes() are available.
As all current usages of getRandomSeed() directly hash the seed, there should be no BC breaking changes.
The main source of entropy is more than enough on its own if random_bytes() or openssl_random_pseudo_bytes() are available.