-
Notifications
You must be signed in to change notification settings - Fork 224
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[parity-crypto] Release 0.6.1 #373
[parity-crypto] Release 0.6.1 #373
Conversation
…and fix construction of `ZeroesAllowedMessage`
@@ -44,7 +44,7 @@ use secp256k1::ThirtyTwoByteHash; | |||
/// converted to a `[u8; 32]` which in turn can be cast to a | |||
/// `secp256k1::Message` by the `ThirtyTwoByteHash` and satisfy the API for | |||
/// `recover()`. | |||
pub struct ZeroesAllowedMessage(H256); | |||
pub struct ZeroesAllowedMessage(pub H256); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Forgot this. :/
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
An alternative would be to implement From<H256> for ZeroesAllowedMessage
, but this is also fine
@@ -44,7 +44,7 @@ use secp256k1::ThirtyTwoByteHash; | |||
/// converted to a `[u8; 32]` which in turn can be cast to a | |||
/// `secp256k1::Message` by the `ThirtyTwoByteHash` and satisfy the API for | |||
/// `recover()`. | |||
pub struct ZeroesAllowedMessage(H256); | |||
pub struct ZeroesAllowedMessage(pub H256); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
An alternative would be to implement From<H256> for ZeroesAllowedMessage
, but this is also fine
Published 0.6.1 |
* master: kvdb-rocksdb: optimize and rename iter_from_prefix (#365) bump parity-util-mem (#376) parity-util-mem: fix for windows (#375) keccak-hash: fix bench and add one for range (#372) [parity-crypto] Release 0.6.1 (#373) keccak-hash: bump version to 0.5.1 (#371) keccak-hash: add keccak256_range and keccak512_range functions (#370) Allow pubkey recovery for all-zero messages (#369) Delete by prefix operator in kvdb (#360) kvdb: no overlay (#313) Ban duplicates of parity-uil-mem from being linked into the same program (#363) Use correct license ID (#362) Memtest example for Rocksdb (#349) Prep for release (#361) parity-util-mem: prepare release for 0.5.2 (#359) travis: test parity-util-mem on android (#358) parity-util-mem: update mimalloc feature (#352) kvdb: remove parity-bytes dependency (#351) parity-util-mem: use malloc for usable_size on android (#355) CI: troubleshoot macOS build (#356)
* master: (56 commits) primitive-types: add no_std support for serde feature (#385) Add Rocksdb Secondary Instance Api (#384) kvdb-rocksdb: update rocksdb to 0.14 (#379) prepare releases for a few crates (#382) uint: fix UB in uint::from_big_endian (#381) Fix limit prefix delete case (#368) Add arbitrary trait implementation (#378) kvdb-rocksdb: optimize and rename iter_from_prefix (#365) bump parity-util-mem (#376) parity-util-mem: fix for windows (#375) keccak-hash: fix bench and add one for range (#372) [parity-crypto] Release 0.6.1 (#373) keccak-hash: bump version to 0.5.1 (#371) keccak-hash: add keccak256_range and keccak512_range functions (#370) Allow pubkey recovery for all-zero messages (#369) Delete by prefix operator in kvdb (#360) kvdb: no overlay (#313) Ban duplicates of parity-uil-mem from being linked into the same program (#363) Use correct license ID (#362) Memtest example for Rocksdb (#349) ...
…and fix construction of
ZeroesAllowedMessage