forked from rust-random/rand
-
Notifications
You must be signed in to change notification settings - Fork 2
Closed
Labels
Description
If my memory serves me well, the paper JitterRng was implemented according to was only really investigating the x86 platform and conclusions rely on some specific instructions working in a fairly specific way.
Since Rust supports targetting WASM now, we should make sure to check whether JitterRng produces quality entropy or, failing that, properly detects the failure and returns an error on hosted targets like wasm.
Specifically, of concern are:
- Jitter caused by JIT translation during initial probing of the jitter quality (possible failure to detect low quality jitter as JIT translation most likely increases the jitter entropy);
- Does jitter provide equally much of the entropy as on the bare-metal implementations in both "cold" (interpreted) and "warm" (JITed) states.
dhardy