diff options
author | moneromooo-monero <moneromooo-monero@users.noreply.github.com> | 2019-05-10 14:09:11 +0000 |
---|---|---|
committer | moneromooo-monero <moneromooo-monero@users.noreply.github.com> | 2019-05-10 14:15:35 +0000 |
commit | de27651f809256cd601bdc5d8015e5fe5fdd3556 (patch) | |
tree | 641a91a3704c2791cdae00dcc1010cfa74999343 /tests/unit_tests/output_selection.cpp | |
parent | Merge pull request #5509 (diff) | |
download | monero-de27651f809256cd601bdc5d8015e5fe5fdd3556.tar.xz |
use crypto::rand instead of libc rand in a few tests
We don't need secure randomness here, but it should shut coverity up
Diffstat (limited to 'tests/unit_tests/output_selection.cpp')
-rw-r--r-- | tests/unit_tests/output_selection.cpp | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/tests/unit_tests/output_selection.cpp b/tests/unit_tests/output_selection.cpp index 0094fc765..e89805dc3 100644 --- a/tests/unit_tests/output_selection.cpp +++ b/tests/unit_tests/output_selection.cpp @@ -138,7 +138,7 @@ TEST(select_outputs, density) static const size_t NPICKS = 1000000; std::vector<uint64_t> offsets; - MKOFFSETS(300000, 1 + (rand() & 0x1f)); + MKOFFSETS(300000, 1 + (crypto::rand<size_t>() & 0x1f)); tools::gamma_picker picker(offsets); std::vector<int> picks(/*n_outs*/offsets.size(), 0); @@ -181,7 +181,7 @@ TEST(select_outputs, same_distribution) static const size_t NPICKS = 1000000; std::vector<uint64_t> offsets; - MKOFFSETS(300000, 1 + (rand() & 0x1f)); + MKOFFSETS(300000, 1 + (crypto::rand<size_t>() & 0x1f)); tools::gamma_picker picker(offsets); std::vector<int> chain_picks(offsets.size(), 0); |