Skip to content

Commit 25ff7c0

Browse files
committed
Aligned to dependencies.
1 parent ae93090 commit 25ff7c0

File tree

4 files changed

+15
-15
lines changed

4 files changed

+15
-15
lines changed

Cargo.toml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
[package]
22
name = "sskr"
3-
version = "0.1.2"
3+
version = "0.2.0"
44
edition = "2021"
55
description = "Sharded Secret Key Reconstruction (SSKR) for Rust."
66
authors = ["Blockchain Commons"]
@@ -12,8 +12,8 @@ categories = ["cryptography"]
1212
documentation = "https://docs.rs/sskr"
1313

1414
[dependencies]
15-
bc-crypto = "0.1.2"
16-
bc-shamir = "0.1.2"
15+
bc-rand = "0.1.0"
16+
bc-shamir = "0.2.0"
1717

1818
[dev-dependencies]
1919
hex-literal = "0.4.1"

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Sharded Secret Key Reconstruction (SSKR) is a protocol for splitting a *secret*
1414

1515
```toml
1616
[dependencies]
17-
sskr = "0.1.2"
17+
sskr = "0.2.0"
1818
```
1919

2020
## Specification

src/encoding.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
use bc_crypto::RandomNumberGenerator;
1+
use bc_rand::RandomNumberGenerator;
22
use bc_shamir::{split_secret, recover_secret};
33
use crate::{Error, METADATA_SIZE_BYTES, Secret, Spec, share::SSKRShare};
44

@@ -12,7 +12,7 @@ pub fn sskr_generate(
1212
spec: &Spec,
1313
master_secret: &Secret
1414
) -> Result<Vec<Vec<Vec<u8>>>, Error> {
15-
let mut rng = bc_crypto::SecureRandomNumberGenerator;
15+
let mut rng = bc_rand::SecureRandomNumberGenerator;
1616
sskr_generate_using(spec, master_secret, &mut rng)
1717
}
1818

src/lib.rs

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
#![doc(html_root_url = "https://docs.rs/sskr/0.1.2")]
1+
#![doc(html_root_url = "https://docs.rs/sskr/0.2.0")]
22
#![warn(rust_2018_idioms)]
33

44
//! # Introduction
@@ -9,7 +9,7 @@
99
//!
1010
//! ```toml
1111
//! [dependencies]
12-
//! sskr = "0.1.2"
12+
//! sskr = "0.2.0"
1313
//! ```
1414
//!
1515
//! # Example
@@ -88,7 +88,7 @@ pub use error::Error;
8888
#[cfg(test)]
8989
mod tests {
9090
use super::*;
91-
use bc_crypto::RandomNumberGenerator;
91+
use bc_rand::RandomNumberGenerator;
9292
use hex_literal::hex;
9393

9494
struct FakeRandomNumberGenerator;
@@ -127,7 +127,7 @@ mod tests {
127127
println!("share: {}", hex::encode(share));
128128
}
129129

130-
let recovered_share_indexes = vec![1, 2, 4];
130+
let recovered_share_indexes = [1, 2, 4];
131131
let recovered_shares = recovered_share_indexes.iter().map(|index| flattened_shares[*index].clone()).collect::<Vec<_>>();
132132
let recovered_secret = sskr_combine(&recovered_shares).unwrap();
133133
assert_eq!(recovered_secret, secret);
@@ -150,7 +150,7 @@ mod tests {
150150
// println!("share: {}", hex::encode(share));
151151
}
152152

153-
let recovered_share_indexes = vec![3, 4];
153+
let recovered_share_indexes = [3, 4];
154154
let recovered_shares = recovered_share_indexes.iter().map(|index| flattened_shares[*index].clone()).collect::<Vec<_>>();
155155
let recovered_secret = sskr_combine(&recovered_shares).unwrap();
156156
assert_eq!(recovered_secret, secret);
@@ -175,7 +175,7 @@ mod tests {
175175
// println!("share: {}", hex::encode(share));
176176
}
177177

178-
let recovered_share_indexes = vec![0, 1, 3, 5];
178+
let recovered_share_indexes = [0, 1, 3, 5];
179179
let recovered_shares = recovered_share_indexes.iter().map(|index| flattened_shares[*index].clone()).collect::<Vec<_>>();
180180
let recovered_secret = sskr_combine(&recovered_shares).unwrap();
181181
assert_eq!(recovered_secret, secret);
@@ -192,7 +192,7 @@ mod tests {
192192

193193
#[test]
194194
fn test_shuffle() {
195-
let mut rng = bc_crypto::make_fake_random_number_generator();
195+
let mut rng = bc_rand::make_fake_random_number_generator();
196196
let mut v = (0..100).collect::<Vec<_>>();
197197
fisher_yates_shuffle(&mut v, &mut rng);
198198
assert_eq!(v.len(), 100);
@@ -296,8 +296,8 @@ mod tests {
296296

297297
#[test]
298298
fn fuzz_test() {
299-
let mut rng = bc_crypto::make_fake_random_number_generator();
300-
// let mut rng = bc_crypto::SecureRandomNumberGenerator;
299+
let mut rng = bc_rand::make_fake_random_number_generator();
300+
// let mut rng = bc_rand::SecureRandomNumberGenerator;
301301
for _ in 0..100 {
302302
one_fuzz_test(&mut rng);
303303
}

0 commit comments

Comments
 (0)