Skip to content

Commit cdd1c94

Browse files
committed
chore: update secp256k1 to 0.22.1
1 parent 961747f commit cdd1c94

File tree

4 files changed

+17
-17
lines changed

4 files changed

+17
-17
lines changed

Cargo.lock

Lines changed: 4 additions & 4 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

crypto/Cargo.toml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ hmac = "0.7.1"
2222
memzero = "0.1.0"
2323
rand = "0.7.3"
2424
ring = "0.16.11"
25-
secp256k1 = "0.20.3"
25+
secp256k1 = "0.22.1"
2626
serde = { version = "1.0.104", optional = true }
2727
sha2 = "0.8.1"
2828
tiny-bip39 = "0.7.0"

crypto/src/signature.rs

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ use crate::key::CryptoEngine;
44
use secp256k1::{Error, Message, SecretKey};
55

66
/// Signature
7-
pub type Signature = secp256k1::Signature;
7+
pub type Signature = secp256k1::ecdsa::Signature;
88

99
/// PublicKey
1010
pub type PublicKey = secp256k1::PublicKey;
@@ -15,7 +15,7 @@ pub type PublicKey = secp256k1::PublicKey;
1515
pub fn sign(secp: &CryptoEngine, secret_key: SecretKey, data: &[u8]) -> Result<Signature, Error> {
1616
let msg = Message::from_slice(data)?;
1717

18-
Ok(secp.sign(&msg, &secret_key))
18+
Ok(secp.sign_ecdsa(&msg, &secret_key))
1919
}
2020
/// Verify signature with a provided public key.
2121
/// - Returns an Error if data is not a 32-byte array
@@ -27,14 +27,14 @@ pub fn verify(
2727
) -> Result<(), Error> {
2828
let msg = Message::from_slice(data)?;
2929

30-
secp.verify(&msg, sig, public_key)
30+
secp.verify_ecdsa(&msg, sig, public_key)
3131
}
3232

3333
#[cfg(test)]
3434
mod tests {
3535
use crate::hash::{calculate_sha256, Sha256};
3636
use crate::signature::{sign, verify};
37-
use secp256k1::{PublicKey, Secp256k1, SecretKey, Signature};
37+
use secp256k1::{ecdsa::Signature, PublicKey, Secp256k1, SecretKey};
3838

3939
#[test]
4040
fn test_sign_and_verify() {

data_structures/src/chain/mod.rs

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ use witnet_crypto::{
2626
key::ExtendedSK,
2727
merkle::merkle_tree_root as crypto_merkle_tree_root,
2828
secp256k1::{
29-
PublicKey as Secp256k1_PublicKey, SecretKey as Secp256k1_SecretKey,
30-
Signature as Secp256k1_Signature,
29+
ecdsa::Signature as Secp256k1_Signature, PublicKey as Secp256k1_PublicKey,
30+
SecretKey as Secp256k1_SecretKey,
3131
},
3232
};
3333
use witnet_protected::Protected;
@@ -4397,16 +4397,16 @@ mod tests {
43974397
fn secp256k1_from_into_secpk256k1_signatures() {
43984398
use crate::chain::Secp256k1Signature;
43994399
use witnet_crypto::secp256k1::{
4400-
Message as Secp256k1_Message, Secp256k1, SecretKey as Secp256k1_SecretKey,
4401-
Signature as Secp256k1_Signature,
4400+
ecdsa::Signature as Secp256k1_Signature, Message as Secp256k1_Message, Secp256k1,
4401+
SecretKey as Secp256k1_SecretKey,
44024402
};
44034403

44044404
let data = [0xab; 32];
44054405
let secp = Secp256k1::new();
44064406
let secret_key =
44074407
Secp256k1_SecretKey::from_slice(&[0xcd; 32]).expect("32 bytes, within curve order");
44084408
let msg = Secp256k1_Message::from_slice(&data).unwrap();
4409-
let signature = secp.sign(&msg, &secret_key);
4409+
let signature = secp.sign_ecdsa(&msg, &secret_key);
44104410

44114411
let witnet_signature = Secp256k1Signature::from(signature);
44124412
let signature_into: Secp256k1_Signature = witnet_signature.try_into().unwrap();
@@ -4418,16 +4418,16 @@ mod tests {
44184418
fn secp256k1_from_into_signatures() {
44194419
use crate::chain::Signature;
44204420
use witnet_crypto::secp256k1::{
4421-
Message as Secp256k1_Message, Secp256k1, SecretKey as Secp256k1_SecretKey,
4422-
Signature as Secp256k1_Signature,
4421+
ecdsa::Signature as Secp256k1_Signature, Message as Secp256k1_Message, Secp256k1,
4422+
SecretKey as Secp256k1_SecretKey,
44234423
};
44244424

44254425
let data = [0xab; 32];
44264426
let secp = Secp256k1::new();
44274427
let secret_key =
44284428
Secp256k1_SecretKey::from_slice(&[0xcd; 32]).expect("32 bytes, within curve order");
44294429
let msg = Secp256k1_Message::from_slice(&data).unwrap();
4430-
let signature = secp.sign(&msg, &secret_key);
4430+
let signature = secp.sign_ecdsa(&msg, &secret_key);
44314431

44324432
let witnet_signature = Signature::from(signature);
44334433
let signature_into: Secp256k1_Signature = witnet_signature.try_into().unwrap();

0 commit comments

Comments
 (0)