mirror of
https://github.com/dalek-cryptography/ed25519-dalek.git
synced 2026-01-08 18:57:54 -05:00
The original v2.0.0 release has been yanked. This release includes a different infallible parsing API which can be used to eliminate some usages of `unwrap()`.
75 lines
2.9 KiB
TOML
75 lines
2.9 KiB
TOML
[package]
|
|
name = "ed25519-dalek"
|
|
version = "1.0.1"
|
|
edition = "2021"
|
|
authors = ["isis lovecruft <isis@patternsinthevoid.net>"]
|
|
readme = "README.md"
|
|
license = "BSD-3-Clause"
|
|
repository = "https://github.com/dalek-cryptography/ed25519-dalek"
|
|
homepage = "https://dalek.rs"
|
|
documentation = "https://docs.rs/ed25519-dalek"
|
|
keywords = ["cryptography", "ed25519", "curve25519", "signature", "ECC"]
|
|
categories = ["cryptography", "no-std"]
|
|
description = "Fast and efficient ed25519 EdDSA key generations, signing, and verification in pure Rust."
|
|
exclude = [ ".gitignore", "TESTVECTORS", "VALIDATIONVECTORS", "res/*" ]
|
|
rust-version = "1.60"
|
|
|
|
[badges]
|
|
travis-ci = { repository = "dalek-cryptography/ed25519-dalek", branch = "master"}
|
|
|
|
[package.metadata.docs.rs]
|
|
# Disabled for now since this is borked; tracking https://github.com/rust-lang/docs.rs/issues/302
|
|
# rustdoc-args = ["--html-in-header", ".cargo/registry/src/github.com-1ecc6299db9ec823/curve25519-dalek-0.13.2/rustdoc-include-katex-header.html"]
|
|
rustdoc-args = ["--cfg", "docsrs"]
|
|
features = ["nightly", "batch", "pkcs8"]
|
|
|
|
[dependencies]
|
|
curve25519-dalek = { version = "=4.0.0-pre.5", default-features = false, features = ["digest"] }
|
|
ed25519 = { version = "2.1", default-features = false }
|
|
signature = { version = ">=2.0, <2.1", optional = true, default-features = false }
|
|
sha2 = { version = "0.10", default-features = false }
|
|
|
|
# optional features
|
|
merlin = { version = "3", default-features = false, optional = true }
|
|
rand_core = { version = "0.6.4", default-features = false, optional = true }
|
|
serde = { version = "1.0", default-features = false, optional = true }
|
|
serde_bytes = { version = "0.11", optional = true }
|
|
zeroize = { version = "1.5", default-features = false, optional = true }
|
|
|
|
[dev-dependencies]
|
|
curve25519-dalek = { version = "=4.0.0-pre.5", default-features = false, features = ["digest", "rand_core"] }
|
|
hex = "0.4"
|
|
bincode = "1.0"
|
|
serde_json = "1.0"
|
|
criterion = { version = "0.4", features = ["html_reports"] }
|
|
hex-literal = "0.3"
|
|
rand = "0.8"
|
|
rand_core = { version = "0.6.4", default-features = false }
|
|
serde = { version = "1.0", features = ["derive"] }
|
|
toml = { version = "0.5" }
|
|
|
|
[[bench]]
|
|
name = "ed25519_benchmarks"
|
|
harness = false
|
|
required-features = ["rand_core"]
|
|
|
|
[features]
|
|
default = ["fast", "std", "zeroize"]
|
|
alloc = ["curve25519-dalek/alloc", "ed25519/alloc", "serde?/alloc", "zeroize/alloc"]
|
|
std = ["alloc", "ed25519/std", "serde?/std", "sha2/std"]
|
|
|
|
asm = ["sha2/asm"]
|
|
batch = ["alloc", "merlin", "rand_core"]
|
|
fast = ["curve25519-dalek/precomputed-tables"]
|
|
digest = ["signature/digest"]
|
|
# This features turns off stricter checking for scalar malleability in signatures
|
|
legacy_compatibility = []
|
|
pkcs8 = ["ed25519/pkcs8"]
|
|
pem = ["alloc", "ed25519/pem", "pkcs8"]
|
|
rand_core = ["dep:rand_core"]
|
|
serde = ["dep:serde", "serde_bytes", "ed25519/serde"]
|
|
zeroize = ["dep:zeroize", "curve25519-dalek/zeroize"]
|
|
|
|
[patch.crates-io.curve25519-dalek]
|
|
git = "https://github.com/dalek-cryptography/curve25519-dalek.git"
|