Skip to content

Commit 9338550

Browse files
authored
Remove bincode dev-dependency (#190)
`bincode` is unmaintained. See https://crates.io/crates/bincode/3.0.0
1 parent f1cb8c9 commit 9338550

File tree

3 files changed

+0
-59
lines changed

3 files changed

+0
-59
lines changed

Cargo.lock

Lines changed: 0 additions & 10 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

crypto_box/Cargo.toml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,6 @@ salsa20 = { version = "0.11.0-rc.1", optional = true }
3131
serdect = { version = "0.4", optional = true, default-features = false }
3232

3333
[dev-dependencies]
34-
bincode = "1"
3534
hex-literal = "0.4"
3635
rand = "0.9"
3736
rmp-serde = "1"

crypto_box/src/lib.rs

Lines changed: 0 additions & 48 deletions
Original file line numberDiff line numberDiff line change
@@ -336,54 +336,6 @@ fn get_seal_nonce(ephemeral_pk: &PublicKey, recipient_pk: &PublicKey) -> Nonce {
336336
mod tests {
337337
use super::*;
338338

339-
#[cfg(feature = "serde")]
340-
#[test]
341-
fn test_public_key_serialization() {
342-
use aead::rand_core::RngCore;
343-
344-
// Random PK bytes
345-
let mut public_key_bytes = [0; 32];
346-
let mut rng = rand::rng();
347-
rng.fill_bytes(&mut public_key_bytes);
348-
349-
// Create public key
350-
let public_key = PublicKey::from(public_key_bytes);
351-
352-
// Round-trip serialize with bincode
353-
let serialized = bincode::serialize(&public_key).unwrap();
354-
let deserialized: PublicKey = bincode::deserialize(&serialized).unwrap();
355-
assert_eq!(deserialized, public_key,);
356-
357-
// Round-trip serialize with rmp (msgpack)
358-
let serialized = rmp_serde::to_vec_named(&public_key).unwrap();
359-
let deserialized: PublicKey = rmp_serde::from_slice(&serialized).unwrap();
360-
assert_eq!(deserialized, public_key,);
361-
}
362-
363-
#[cfg(feature = "serde")]
364-
#[test]
365-
fn test_secret_key_serialization() {
366-
use aead::rand_core::RngCore;
367-
368-
// Random SK bytes
369-
let mut secret_key_bytes = [0; 32];
370-
let mut rng = rand::rng();
371-
rng.fill_bytes(&mut secret_key_bytes);
372-
373-
// Create secret key
374-
let secret_key = SecretKey::from(secret_key_bytes);
375-
376-
// Round-trip serialize with bincode
377-
let serialized = bincode::serialize(&secret_key).unwrap();
378-
let deserialized: SecretKey = bincode::deserialize(&serialized).unwrap();
379-
assert_eq!(deserialized.to_bytes(), secret_key.to_bytes());
380-
381-
// Round-trip serialize with rmp (msgpack)
382-
let serialized = rmp_serde::to_vec_named(&secret_key).unwrap();
383-
let deserialized: SecretKey = rmp_serde::from_slice(&serialized).unwrap();
384-
assert_eq!(deserialized.to_bytes(), secret_key.to_bytes());
385-
}
386-
387339
#[test]
388340
fn test_public_key_from_slice() {
389341
let array = [0; 40];

0 commit comments

Comments
 (0)