Skip to content

Commit 90307dc

Browse files
authored
k256 v0.11.0 (#548)
1 parent f381d51 commit 90307dc

5 files changed

Lines changed: 22 additions & 15 deletions

File tree

Cargo.lock

Lines changed: 1 addition & 1 deletion
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

k256/CHANGELOG.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,24 @@ All notable changes to this project will be documented in this file.
44
The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
55
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).
66

7+
## 0.11.0 (2022-05-09)
8+
### Changed
9+
- Make `AffinePoint` to `VerifyingKey` conversion fallible ([#535])
10+
- Rename `recover_verify_key` => `recover_verifying_key` ([#537])
11+
- Rename `recover_verify_key_from_digest` => `recover_verifying_key_from_digest` ([#537])
12+
- Have `pkcs8` feature activate `ecdsa/pkcs8` ([#538])
13+
- Bump `elliptic-curve` to v0.12 ([#544])
14+
- Bump `ecdsa` to v0.14 ([#544])
15+
16+
### Fixed
17+
- `hash2curve` crate feature ([#519])
18+
19+
[#519]: https://github.com/RustCrypto/elliptic-curves/pull/519
20+
[#535]: https://github.com/RustCrypto/elliptic-curves/pull/535
21+
[#537]: https://github.com/RustCrypto/elliptic-curves/pull/537
22+
[#538]: https://github.com/RustCrypto/elliptic-curves/pull/538
23+
[#544]: https://github.com/RustCrypto/elliptic-curves/pull/544
24+
725
## 0.10.4 (2022-03-15)
826
### Fixed
927
- Normalize before calling `is_odd()` in `sng0()` ([#533])

k256/Cargo.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[package]
22
name = "k256"
3-
version = "0.11.0-pre.0"
3+
version = "0.11.0"
44
description = """
55
secp256k1 elliptic curve library written in pure Rust with support for ECDSA
66
signing/verification (including Ethereum-style signatures with public-key

k256/src/ecdsa/recoverable.rs

Lines changed: 1 addition & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ pub const SIZE: usize = 65;
7272
/// - `r`: 32-byte integer, big endian
7373
/// - `s`: 32-byte integer, big endian
7474
/// - `v`: 1-byte recovery [`Id`]
75-
#[derive(Copy, Clone)]
75+
#[derive(Copy, Clone, Eq, PartialEq)]
7676
pub struct Signature {
7777
bytes: [u8; SIZE],
7878
}
@@ -228,16 +228,6 @@ impl Debug for Signature {
228228
}
229229
}
230230

231-
// TODO(tarcieri): derive `Eq` after const generics are available
232-
impl Eq for Signature {}
233-
234-
// TODO(tarcieri): derive `PartialEq` after const generics are available
235-
impl PartialEq for Signature {
236-
fn eq(&self, other: &Self) -> bool {
237-
self.as_ref().eq(other.as_ref())
238-
}
239-
}
240-
241231
impl TryFrom<&[u8]> for Signature {
242232
type Error = Error;
243233

k256/src/ecdsa/sign.rs

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -240,8 +240,7 @@ impl ConstantTimeEq for SigningKey {
240240

241241
impl Debug for SigningKey {
242242
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
243-
// TODO(tarcieri): use `finish_non_exhaustive` when stable
244-
f.debug_tuple("SigningKey").field(&"...").finish()
243+
f.debug_struct("SigningKey").finish_non_exhaustive()
245244
}
246245
}
247246

0 commit comments

Comments
 (0)