paritytech / ink

@@ -386,7 +386,7 @@
Loading
386 386
        output: &mut [u8; 33],
387 387
    ) -> Result {
388 388
        use secp256k1::{
389 -
            recovery::{
389 +
            ecdsa::{
390 390
                RecoverableSignature,
391 391
                RecoveryId,
392 392
            },
@@ -415,7 +415,7 @@
Loading
415 415
                });
416 416
417 417
        let secp = Secp256k1::new();
418 -
        let pub_key = secp.recover(&message, &signature);
418 +
        let pub_key = secp.recover_ecdsa(&message, &signature);
419 419
        match pub_key {
420 420
            Ok(pub_key) => {
421 421
                *output = pub_key.serialize();

@@ -252,7 +252,7 @@
Loading
252 252
        output: &mut [u8; 33],
253 253
    ) -> Result<()> {
254 254
        use secp256k1::{
255 -
            recovery::{
255 +
            ecdsa::{
256 256
                RecoverableSignature,
257 257
                RecoveryId,
258 258
            },
@@ -279,7 +279,7 @@
Loading
279 279
                });
280 280
281 281
        let secp = Secp256k1::new();
282 -
        let pub_key = secp.recover(&message, &signature);
282 +
        let pub_key = secp.recover_ecdsa(&message, &signature);
283 283
        match pub_key {
284 284
            Ok(pub_key) => {
285 285
                *output = pub_key.serialize();

@@ -17,7 +17,7 @@
Loading
17 17
    Error,
18 18
};
19 19
use secp256k1::{
20 -
    recovery::RecoverableSignature,
20 +
    ecdsa::RecoverableSignature,
21 21
    Message,
22 22
    PublicKey,
23 23
    Secp256k1,
@@ -255,7 +255,7 @@
Loading
255 255
    let msg = Message::from_slice(&msg_hash).expect("message creation failed");
256 256
    let seckey = SecretKey::from_slice(&seckey).expect("secret key creation failed");
257 257
    let recoverable_signature: RecoverableSignature =
258 -
        secp.sign_recoverable(&msg, &seckey);
258 +
        secp.sign_ecdsa_recoverable(&msg, &seckey);
259 259
260 260
    let recovery_id = recoverable_signature.serialize_compact().0.to_i32() as u8;
261 261
    let mut signature = recoverable_signature.serialize_compact().1.to_vec();

@@ -198,7 +198,7 @@
Loading
198 198
        output: &mut [u8; 33],
199 199
    ) -> Result<()> {
200 200
        use secp256k1::{
201 -
            recovery::{
201 +
            ecdsa::{
202 202
                RecoverableSignature,
203 203
                RecoveryId,
204 204
            },
@@ -225,7 +225,7 @@
Loading
225 225
                });
226 226
227 227
        let secp = Secp256k1::new();
228 -
        let pub_key = secp.recover(&message, &signature);
228 +
        let pub_key = secp.recover_ecdsa(&message, &signature);
229 229
        match pub_key {
230 230
            Ok(pub_key) => {
231 231
                *output = pub_key.serialize();
Files Coverage
crates 79.00%
Project Totals (248 files) 79.00%
Sunburst
The inner-most circle is the entire project, moving away from the center are folders then, finally, a single file. The size and color of each slice is representing the number of statements and the coverage, respectively.
Icicle
The top section represents the entire project. Proceeding with folders and finally individual files. The size and color of each slice is representing the number of statements and the coverage, respectively.
Grid
Each block represents a single file in the project. The size and color of each block is represented by the number of statements and the coverage, respectively.
Loading