Skip to content

Commit

Permalink
Merge pull request #16 from penumbra-zone/arkworks-0.4
Browse files Browse the repository at this point in the history
use 0.4.x series of Arkworks dependencies
  • Loading branch information
redshiftzero authored Apr 27, 2023
2 parents a5c0157 + 591a416 commit 10c9423
Show file tree
Hide file tree
Showing 3 changed files with 9 additions and 5 deletions.
4 changes: 4 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,10 @@

Entries are listed in reverse chronological order.

# 0.6.0

* Use 0.4 series of Arkworks dependencies.

# 0.5.0

* Add `Ord`, `PartialOrd` to `VerificationKey`, `VerificationKeyBytes` so they can be used with BTrees.
Expand Down
8 changes: 4 additions & 4 deletions Cargo.toml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
[package]
name = "decaf377-rdsa"
edition = "2018"
version = "0.5.0"
version = "0.6.0"
authors = ["Penumbra Labs <[email protected]>"]
readme = "README.md"
license = "MIT OR Apache-2.0"
Expand All @@ -11,13 +11,13 @@ repository = "https://github.com/penumbra-zone/decaf377-rdsa"
[dependencies]
blake2b_simd = "0.5"
byteorder = "1.3"
decaf377 = { version= "0.3", default-features=false }
decaf377 = { version= "0.4", default-features=false }
digest = "0.9"
rand_core = "0.6"
serde = { version = "1", optional = true, features = ["derive"] }
thiserror = "1.0"
ark-serialize = "0.3"
ark-ff = { version = "0.3", default-features=false }
ark-serialize = "0.4"
ark-ff = { version = "0.4", default-features=false }
hex = "0.4"

[dev-dependencies]
Expand Down
2 changes: 1 addition & 1 deletion src/signing_key.rs
Original file line number Diff line number Diff line change
Expand Up @@ -68,7 +68,7 @@ impl<D: Domain> TryFrom<[u8; 32]> for SigningKey<D> {

fn try_from(bytes: [u8; 32]) -> Result<Self, Self::Error> {
use ark_serialize::CanonicalDeserialize;
let sk = Fr::deserialize(&bytes[..]).map_err(|_| Error::MalformedSigningKey)?;
let sk = Fr::deserialize_compressed(&bytes[..]).map_err(|_| Error::MalformedSigningKey)?;
Ok(Self::new_from_field(sk))
}
}
Expand Down

0 comments on commit 10c9423

Please sign in to comment.