-
Notifications
You must be signed in to change notification settings - Fork 227
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Release 2.0 TODO #245
Comments
Related: |
Is there anything stopping a full 2.0.0 release anymore? I recently had problems with the fixed dependency on zeroize I would be happy to contribute if anything is still left open for integration |
2.0.0-rc.2 should be perfectly usable - it's already released. We also have further breaking changes so there will be rc.3 at least before SemVer stabilisation period in the wild. |
@Chaostheorie there are still breaking changes happening, for example #293. In the meantime as @pinkforest the RCs should unblock you. |
Okay, thank you for the quick response. I'll try to patch it to the release candidate then and look forward to the new stable release. |
When can we expect a 2.0 release? This crate has the same zeroize issue of curve25519-dalek 3.0 dalek-cryptography/curve25519-dalek#452 |
crates.io already has the 2.0.0 release, but there is no tag yet. Maybe it was forgotten? |
Hi, indeed we've released 2.0! In addition, we moved this repo over to https://github.com/dalek-cryptography/curve25519-dalek, which is why you don't see the tag here. We're in the process of migrating the issues/PRs from here to there. |
Um... this is dalek-cryptography/ed25519, isn't it? Migrating tags is |
Indeed it is, but we moved all development to the monorepo mentioned above. Tags can be found there |
Ah, sorry... I mis-read your message to link to this same repo. Everything alright. |
- With the update to `2` `ed25519-dalek` not longer depends on `[email protected]`. - Bump `rand` dependency to `0.8` (from `0.7`). - `ed25519-dalek` now provide the feature `zeroize` that provide implementation around the crate `zeroize`. That improve the secrety of the private key slightly (and is free). - `*::generate` where put behind the feature `rand_core`. - `PublicKey` was renamed by `VerifyingKey`. - `SigningKey`: - Previously named `Keypair`. - Implement `Clone`. - No longer provide `as_bytes`. it was remplaced by `to_bytes`. - Implement `TryFrom<&[u8]>`. - Implement `From<[u8; 32]>`. - `Signature::from_bytes` no longer return an error (now it take reference to an `[u8; 32]` instead of `[u8]`). [Changelog](https://github.com/dalek-cryptography/curve25519-dalek/blob/e6675c67ceadecc3e22b561296490f4b7de9ff39/ed25519-dalek/CHANGELOG.md) > I can't provide the diff between `2.0.0` and `1.0.1` since the project > as migrate to a different repository. > C.F: dalek-cryptography/ed25519-dalek#245 (comment)
- With the update to `2` `ed25519-dalek` not longer depends on `[email protected]`. - Bump `rand` dependency to `0.8` (from `0.7`). - `ed25519-dalek` now provide the feature `zeroize` that provide implementation around the crate `zeroize`. That improve the secrety of the private key slightly (and is free). - `*::generate` where put behind the feature `rand_core`. - `PublicKey` was renamed by `VerifyingKey`. - `SigningKey`: - Previously named `Keypair`. - Implement `Clone`. - No longer provide `as_bytes`. it was remplaced by `to_bytes`. - Implement `TryFrom<&[u8]>`. - Implement `From<[u8; 32]>`. - `Signature::from_bytes` no longer return an error (now it take reference to an `[u8; 32]` instead of `[u8]`). [Changelog](https://github.com/dalek-cryptography/curve25519-dalek/blob/e6675c67ceadecc3e22b561296490f4b7de9ff39/ed25519-dalek/CHANGELOG.md) > I can't provide the diff between `2.0.0` and `1.0.1` since the project > as migrate to a different repository. > C.F: dalek-cryptography/ed25519-dalek#245 (comment)
- With the update to `2` `ed25519-dalek` not longer depends on `[email protected]`. - Bump `rand` dependency to `0.8` (from `0.7`). - `ed25519-dalek` now provide the feature `zeroize` that provide implementation around the crate `zeroize`. That improve the secrety of the private key slightly (and is free). - `*::generate` where put behind the feature `rand_core`. - `PublicKey` was renamed by `VerifyingKey`. - `SigningKey`: - Previously named `Keypair`. - Implement `Clone`. - No longer provide `as_bytes`. it was remplaced by `to_bytes`. - Implement `TryFrom<&[u8]>`. - Implement `From<[u8; 32]>`. - `Signature::from_bytes` no longer return an error (now it take reference to an `[u8; 32]` instead of `[u8]`). [Changelog](https://github.com/dalek-cryptography/curve25519-dalek/blob/e6675c67ceadecc3e22b561296490f4b7de9ff39/ed25519-dalek/CHANGELOG.md) > I can't provide the diff between `2.0.0` and `1.0.1` since the project > as migrate to a different repository. > C.F: dalek-cryptography/ed25519-dalek#245 (comment)
- With the update to `2` `ed25519-dalek` not longer depends on `[email protected]`. - Bump `rand` dependency to `0.8` (from `0.7`). - `ed25519-dalek` now provide the feature `zeroize` that provide implementation around the crate `zeroize`. That improve the secrety of the private key slightly (and is free). - `*::generate` where put behind the feature `rand_core`. - `PublicKey` was renamed by `VerifyingKey`. - `SigningKey`: - Previously named `Keypair`. - Implement `Clone`. - No longer provide `as_bytes`. it was remplaced by `to_bytes`. - Implement `TryFrom<&[u8]>`. - Implement `From<[u8; 32]>`. - `Signature::from_bytes` no longer return an error (now it take reference to an `[u8; 32]` instead of `[u8]`). [Changelog](https://github.com/dalek-cryptography/curve25519-dalek/blob/e6675c67ceadecc3e22b561296490f4b7de9ff39/ed25519-dalek/CHANGELOG.md) > I can't provide the diff between `2.0.0` and `1.0.1` since the project > as migrate to a different repository. > C.F: dalek-cryptography/ed25519-dalek#245 (comment)
- With the update to `2` `ed25519-dalek` not longer depends on `[email protected]`. - Bump `rand` dependency to `0.8` (from `0.7`). - `ed25519-dalek` now provide the feature `zeroize` that provide implementation around the crate `zeroize`. That improve the secrety of the private key slightly (and is free). - `*::generate` where put behind the feature `rand_core`. - `PublicKey` was renamed by `VerifyingKey`. - `SigningKey`: - Previously named `Keypair`. - Implement `Clone`. - No longer provide `as_bytes`. it was remplaced by `to_bytes`. - Implement `TryFrom<&[u8]>`. - Implement `From<[u8; 32]>`. - `Signature::from_bytes` no longer return an error (now it take reference to an `[u8; 32]` instead of `[u8]`). [Changelog](https://github.com/dalek-cryptography/curve25519-dalek/blob/e6675c67ceadecc3e22b561296490f4b7de9ff39/ed25519-dalek/CHANGELOG.md) > I can't provide the diff between `2.0.0` and `1.0.1` since the project > as migrate to a different repository. > C.F: dalek-cryptography/ed25519-dalek#245 (comment)
- With the update to `2` `ed25519-dalek` not longer depends on `[email protected]`. - Bump `rand` dependency to `0.8` (from `0.7`). - `ed25519-dalek` now provide the feature `zeroize` that provide implementation around the crate `zeroize`. That improve the secrety of the private key slightly (and is free). - `*::generate` where put behind the feature `rand_core`. - `PublicKey` was renamed by `VerifyingKey`. - `SigningKey`: - Previously named `Keypair`. - Implement `Clone`. - No longer provide `as_bytes`. it was remplaced by `to_bytes`. - Implement `TryFrom<&[u8]>`. - Implement `From<[u8; 32]>`. - `Signature::from_bytes` no longer return an error (now it take reference to an `[u8; 32]` instead of `[u8]`). [Changelog](https://github.com/dalek-cryptography/curve25519-dalek/blob/e6675c67ceadecc3e22b561296490f4b7de9ff39/ed25519-dalek/CHANGELOG.md) > I can't provide the diff between `2.0.0` and `1.0.1` since the project > as migrate to a different repository. > C.F: dalek-cryptography/ed25519-dalek#245 (comment)
Batching
verify_batch
deterministic #256Perf-on-Default
fast
crate feature for gating basepoint tables #251Documentation
SigningKey
from/to_bytes docs +coverage #243Testing/Validation
verify_permissive()
#229Signing/Verifying API Change
Drop
/ZeroizeOnDrop
forSigningKey
#247From<&SigningKey>
forVerifyingKey
#252Maintenance
rustfmt
#246..
The text was updated successfully, but these errors were encountered: