From cf1d7f3a955c4dff40bf5b1b27576ea9713569a8 Mon Sep 17 00:00:00 2001 From: "Jeff R. Allen" Date: Mon, 25 Nov 2019 16:23:03 +0100 Subject: [PATCH] Go back to v3. --- .travis.yml | 4 ++-- encrypt/ecies/ecies.go | 4 ++-- encrypt/ecies/ecies_test.go | 4 ++-- examples/dh_test.go | 4 ++-- examples/enc_test.go | 6 +++--- examples/sig_test.go | 4 ++-- go.mod | 4 ++-- go.sum | 4 ++++ group/curve25519/basic.go | 6 +++--- group/curve25519/basic_test.go | 2 +- group/curve25519/curve.go | 6 +++--- group/curve25519/curve_test.go | 4 ++-- group/curve25519/ext.go | 6 +++--- group/curve25519/param.go | 2 +- group/curve25519/proj.go | 6 +++--- group/curve25519/suite.go | 10 +++++----- group/edwards25519/allowvt_test.go | 2 +- group/edwards25519/curve.go | 4 ++-- group/edwards25519/curve_test.go | 2 +- group/edwards25519/point.go | 4 ++-- group/edwards25519/scalar.go | 8 ++++---- group/edwards25519/scalar_test.go | 4 ++-- group/edwards25519/suite.go | 12 ++++++------ group/internal/marshalling/marshal.go | 2 +- group/mod/int.go | 6 +++--- group/nist/curve.go | 8 ++++---- group/nist/group_test.go | 2 +- group/nist/qrsuite.go | 10 +++++----- group/nist/residue.go | 8 ++++---- group/nist/suite.go | 10 +++++----- pairing/adapter.go | 4 ++-- pairing/adapter_test.go | 2 +- pairing/bn256/group.go | 4 ++-- pairing/bn256/point.go | 4 ++-- pairing/bn256/suite.go | 6 +++--- pairing/bn256/suite_test.go | 6 +++--- pairing/pairing.go | 2 +- proof/clique.go | 2 +- proof/deniable.go | 2 +- proof/deniable_test.go | 6 +++--- proof/dleq/dleq.go | 2 +- proof/dleq/dleq_test.go | 6 +++--- proof/hash.go | 2 +- proof/hash_test.go | 6 +++--- proof/proof.go | 2 +- proof/proof_test.go | 6 +++--- share/dkg/pedersen/dkg.go | 10 +++++----- share/dkg/pedersen/dkg_test.go | 8 ++++---- share/dkg/pedersen/structs.go | 6 +++--- share/dkg/rabin/dkg.go | 8 ++++---- share/dkg/rabin/dkg_test.go | 10 +++++----- share/poly.go | 2 +- share/poly_test.go | 4 ++-- share/pvss/pvss.go | 6 +++--- share/pvss/pvss_test.go | 4 ++-- share/vss/pedersen/dh.go | 2 +- share/vss/pedersen/vss.go | 6 +++--- share/vss/pedersen/vss_test.go | 8 ++++---- share/vss/rabin/dh.go | 2 +- share/vss/rabin/vss.go | 6 +++--- share/vss/rabin/vss_test.go | 6 +++--- shuffle/biffle.go | 6 +++--- shuffle/biffle_test.go | 8 ++++---- shuffle/pair.go | 6 +++--- shuffle/shuffle_test.go | 8 ++++---- shuffle/simple.go | 4 ++-- shuffle/vartime_test.go | 2 +- sign/anon/anon.go | 2 +- sign/anon/enc.go | 4 ++-- sign/anon/enc_test.go | 6 +++--- sign/anon/sig.go | 2 +- sign/anon/sig_test.go | 8 ++++---- sign/anon/suite.go | 2 +- sign/bdn/bdn.go | 10 +++++----- sign/bdn/bdn_test.go | 12 ++++++------ sign/bls/bls.go | 4 ++-- sign/bls/bls_test.go | 6 +++--- sign/cosi/cosi.go | 2 +- sign/cosi/cosi_test.go | 10 +++++----- sign/cosi/suite.go | 2 +- sign/dss/dss.go | 8 ++++---- sign/dss/dss_test.go | 10 +++++----- sign/eddsa/eddsa.go | 4 ++-- sign/eddsa/eddsa_test.go | 2 +- sign/mask.go | 4 ++-- sign/mask_test.go | 6 +++--- sign/schnorr/schnorr.go | 2 +- sign/schnorr/schnorr_test.go | 6 +++--- sign/tbls/tbls.go | 6 +++--- sign/tbls/tbls_test.go | 6 +++--- suites/all.go | 8 ++++---- suites/suites.go | 2 +- util/encoding/encoding.go | 2 +- util/encoding/encoding_test.go | 2 +- util/key/key.go | 2 +- util/key/key_test.go | 4 ++-- util/random/rand.go | 2 +- util/test/group.go | 4 ++-- util/test/test.go | 6 +++--- xof/blake2xb/blake.go | 2 +- xof/blake2xs/blake.go | 2 +- xof/keccak/keccak.go | 2 +- xof/xof_test.go | 6 +++--- 103 files changed, 257 insertions(+), 253 deletions(-) diff --git a/.travis.yml b/.travis.yml index 72006553a..c832ded20 100644 --- a/.travis.yml +++ b/.travis.yml @@ -1,9 +1,9 @@ language: go go: - - "1.11.x" + - "1.13.x" -go_import_path: go.dedis.ch/kyber/v4 +go_import_path: go.dedis.ch/kyber/v3 script: GO111MODULE=on make test diff --git a/encrypt/ecies/ecies.go b/encrypt/ecies/ecies.go index 56f66d9f9..eabc28f7a 100644 --- a/encrypt/ecies/ecies.go +++ b/encrypt/ecies/ecies.go @@ -9,8 +9,8 @@ import ( "errors" "hash" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/util/random" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/util/random" "golang.org/x/crypto/hkdf" ) diff --git a/encrypt/ecies/ecies_test.go b/encrypt/ecies/ecies_test.go index 82aaa3252..9668a6e34 100644 --- a/encrypt/ecies/ecies_test.go +++ b/encrypt/ecies/ecies_test.go @@ -4,8 +4,8 @@ import ( "testing" "github.com/stretchr/testify/require" - "go.dedis.ch/kyber/v4/group/edwards25519" - "go.dedis.ch/kyber/v4/util/random" + "go.dedis.ch/kyber/v3/group/edwards25519" + "go.dedis.ch/kyber/v3/util/random" ) func TestECIES(t *testing.T) { diff --git a/examples/dh_test.go b/examples/dh_test.go index 97d338044..7e47b53cd 100644 --- a/examples/dh_test.go +++ b/examples/dh_test.go @@ -3,8 +3,8 @@ package examples import ( "fmt" - "go.dedis.ch/kyber/v4/group/edwards25519" - "go.dedis.ch/kyber/v4/xof/blake2xb" + "go.dedis.ch/kyber/v3/group/edwards25519" + "go.dedis.ch/kyber/v3/xof/blake2xb" ) /* diff --git a/examples/enc_test.go b/examples/enc_test.go index b3527851a..701820a1a 100644 --- a/examples/enc_test.go +++ b/examples/enc_test.go @@ -3,9 +3,9 @@ package examples import ( "fmt" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/edwards25519" - "go.dedis.ch/kyber/v4/util/random" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/edwards25519" + "go.dedis.ch/kyber/v3/util/random" ) func ElGamalEncrypt(group kyber.Group, pubkey kyber.Point, message []byte) ( diff --git a/examples/sig_test.go b/examples/sig_test.go index b225f5b16..34878c962 100644 --- a/examples/sig_test.go +++ b/examples/sig_test.go @@ -7,8 +7,8 @@ import ( "errors" "fmt" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/edwards25519" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/edwards25519" ) type Suite interface { diff --git a/go.mod b/go.mod index a9ad2e8d9..ffe9aaaff 100644 --- a/go.mod +++ b/go.mod @@ -1,9 +1,9 @@ -module go.dedis.ch/kyber/v4 +module go.dedis.ch/kyber/v3 require ( github.com/stretchr/testify v1.3.0 go.dedis.ch/fixbuf v1.0.3 - go.dedis.ch/protobuf v1.0.7 + go.dedis.ch/protobuf v1.0.10 golang.org/x/crypto v0.0.0-20190123085648-057139ce5d2b golang.org/x/sys v0.0.0-20190124100055-b90733256f2e ) diff --git a/go.sum b/go.sum index 26c2299d1..dcae93e46 100644 --- a/go.sum +++ b/go.sum @@ -9,10 +9,14 @@ go.dedis.ch/fixbuf v1.0.3 h1:hGcV9Cd/znUxlusJ64eAlExS+5cJDIyTyEG+otu5wQs= go.dedis.ch/fixbuf v1.0.3/go.mod h1:yzJMt34Wa5xD37V5RTdmp38cz3QhMagdGoem9anUalw= go.dedis.ch/kyber/v3 v3.0.4 h1:FDuC/S3STkvwxZ0ooo3gcp56QkUKsN7Jy7cpzBxL+vQ= go.dedis.ch/kyber/v3 v3.0.4/go.mod h1:OzvaEnPvKlyrWyp3kGXlFdp7ap1VC6RkZDTaPikqhsQ= +go.dedis.ch/kyber/v4 v4.0.0-pre1 h1:1f5OPESkyxK6kPaCSV3J9BlpnoysIpbGLNujX9Ov8m4= +go.dedis.ch/kyber/v4 v4.0.0-pre1/go.mod h1:cFStqSeD4d3Y7mal8kCRSq7I7QPeTBA0f5cRl1pqEWA= go.dedis.ch/protobuf v1.0.5 h1:EbF1czEKICxf5KY8Tm7wMF28hcOQbB6yk4IybIFWTYE= go.dedis.ch/protobuf v1.0.5/go.mod h1:eIV4wicvi6JK0q/QnfIEGeSFNG0ZeB24kzut5+HaRLo= go.dedis.ch/protobuf v1.0.7 h1:wRUEiq3u0/vBhLjcw9CmAVrol+BnDyq2M0XLukdphyI= go.dedis.ch/protobuf v1.0.7/go.mod h1:pv5ysfkDX/EawiPqcW3ikOxsL5t+BqnV6xHSmE79KI4= +go.dedis.ch/protobuf v1.0.10 h1:/8plWfioYRf9sBQdCvoNfLf+XHuQWF1ctC1gWzzmojk= +go.dedis.ch/protobuf v1.0.10/go.mod h1:oIXBd4PkP3jxrN9t/eslifGU2tTeG9JuMUjMFrgfcEc= golang.org/x/crypto v0.0.0-20190123085648-057139ce5d2b h1:Elez2XeF2p9uyVj0yEUDqQ56NFcDtcBNkYP7yv8YbUE= golang.org/x/crypto v0.0.0-20190123085648-057139ce5d2b/go.mod h1:6SG95UA2DQfeDnfUPMdvaQW0Q7yPrPDi9nlGo2tz2b4= golang.org/x/sys v0.0.0-20190124100055-b90733256f2e h1:3GIlrlVLfkoipSReOMNAgApI0ajnalyLa/EZHHca/XI= diff --git a/group/curve25519/basic.go b/group/curve25519/basic.go index f8070d000..9eefb431e 100644 --- a/group/curve25519/basic.go +++ b/group/curve25519/basic.go @@ -7,9 +7,9 @@ import ( "io" "math/big" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/internal/marshalling" - "go.dedis.ch/kyber/v4/group/mod" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/internal/marshalling" + "go.dedis.ch/kyber/v3/group/mod" ) type basicPoint struct { diff --git a/group/curve25519/basic_test.go b/group/curve25519/basic_test.go index b0db123a7..7667de15a 100644 --- a/group/curve25519/basic_test.go +++ b/group/curve25519/basic_test.go @@ -5,7 +5,7 @@ package curve25519 import ( "testing" - "go.dedis.ch/kyber/v4/util/test" + "go.dedis.ch/kyber/v3/util/test" ) // Test the basic implementation of the Ed25519 curve. diff --git a/group/curve25519/curve.go b/group/curve25519/curve.go index 2a9ee0185..4333cf92d 100644 --- a/group/curve25519/curve.go +++ b/group/curve25519/curve.go @@ -7,9 +7,9 @@ import ( "fmt" "math/big" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/mod" - "go.dedis.ch/kyber/v4/util/random" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/mod" + "go.dedis.ch/kyber/v3/util/random" ) var zero = big.NewInt(0) diff --git a/group/curve25519/curve_test.go b/group/curve25519/curve_test.go index 35eaccec7..033274823 100644 --- a/group/curve25519/curve_test.go +++ b/group/curve25519/curve_test.go @@ -3,8 +3,8 @@ package curve25519 import ( "testing" - "go.dedis.ch/kyber/v4/group/edwards25519" - "go.dedis.ch/kyber/v4/util/test" + "go.dedis.ch/kyber/v3/group/edwards25519" + "go.dedis.ch/kyber/v3/util/test" ) var testSuite = NewBlakeSHA256Curve25519(false) diff --git a/group/curve25519/ext.go b/group/curve25519/ext.go index 2d5c09056..c3bd0d17a 100644 --- a/group/curve25519/ext.go +++ b/group/curve25519/ext.go @@ -6,9 +6,9 @@ import ( "io" "math/big" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/internal/marshalling" - "go.dedis.ch/kyber/v4/group/mod" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/internal/marshalling" + "go.dedis.ch/kyber/v3/group/mod" ) type extPoint struct { diff --git a/group/curve25519/param.go b/group/curve25519/param.go index 73c2cbc0e..f59624e29 100644 --- a/group/curve25519/param.go +++ b/group/curve25519/param.go @@ -15,7 +15,7 @@ package curve25519 import ( "math/big" - "go.dedis.ch/kyber/v4/group/mod" + "go.dedis.ch/kyber/v3/group/mod" ) // Param defines a Twisted Edwards curve (TEC). diff --git a/group/curve25519/proj.go b/group/curve25519/proj.go index f111b4152..4efee7f6c 100644 --- a/group/curve25519/proj.go +++ b/group/curve25519/proj.go @@ -5,9 +5,9 @@ import ( "io" "math/big" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/internal/marshalling" - "go.dedis.ch/kyber/v4/group/mod" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/internal/marshalling" + "go.dedis.ch/kyber/v3/group/mod" ) type projPoint struct { diff --git a/group/curve25519/suite.go b/group/curve25519/suite.go index bac251a82..4b0249e1d 100644 --- a/group/curve25519/suite.go +++ b/group/curve25519/suite.go @@ -8,10 +8,10 @@ import ( "reflect" "go.dedis.ch/fixbuf" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/internal/marshalling" - "go.dedis.ch/kyber/v4/util/random" - "go.dedis.ch/kyber/v4/xof/blake2xb" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/internal/marshalling" + "go.dedis.ch/kyber/v3/util/random" + "go.dedis.ch/kyber/v3/xof/blake2xb" ) // SuiteCurve25519 is the suite for the 25519 curve @@ -49,7 +49,7 @@ func (s *SuiteCurve25519) RandomStream() cipher.Stream { } // NewBlakeSHA256Curve25519 returns a cipher suite based on package -// go.dedis.ch/kyber/v4/xof/blake2xb, SHA-256, and Curve25519. +// go.dedis.ch/kyber/v3/xof/blake2xb, SHA-256, and Curve25519. // // If fullGroup is false, then the group is the prime-order subgroup. // diff --git a/group/edwards25519/allowvt_test.go b/group/edwards25519/allowvt_test.go index 3dee3a573..54955b76d 100644 --- a/group/edwards25519/allowvt_test.go +++ b/group/edwards25519/allowvt_test.go @@ -3,7 +3,7 @@ package edwards25519 import ( "testing" - "go.dedis.ch/kyber/v4" + "go.dedis.ch/kyber/v3" ) func TestVartime(t *testing.T) { diff --git a/group/edwards25519/curve.go b/group/edwards25519/curve.go index 2e0815370..379801ab3 100644 --- a/group/edwards25519/curve.go +++ b/group/edwards25519/curve.go @@ -4,8 +4,8 @@ import ( "crypto/cipher" "crypto/sha512" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/util/random" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/util/random" ) // Curve represents the Ed25519 group. diff --git a/group/edwards25519/curve_test.go b/group/edwards25519/curve_test.go index a783750c5..853e46e85 100644 --- a/group/edwards25519/curve_test.go +++ b/group/edwards25519/curve_test.go @@ -5,7 +5,7 @@ import ( "testing" "github.com/stretchr/testify/assert" - "go.dedis.ch/kyber/v4/util/test" + "go.dedis.ch/kyber/v3/util/test" ) var tSuite = NewBlakeSHA256Ed25519() diff --git a/group/edwards25519/point.go b/group/edwards25519/point.go index c52e62125..0ed839dd0 100644 --- a/group/edwards25519/point.go +++ b/group/edwards25519/point.go @@ -20,8 +20,8 @@ import ( "errors" "io" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/internal/marshalling" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/internal/marshalling" ) var marshalPointID = [8]byte{'e', 'd', '.', 'p', 'o', 'i', 'n', 't'} diff --git a/group/edwards25519/scalar.go b/group/edwards25519/scalar.go index 21b7264f4..30caa0253 100644 --- a/group/edwards25519/scalar.go +++ b/group/edwards25519/scalar.go @@ -12,10 +12,10 @@ import ( "io" "math/big" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/internal/marshalling" - "go.dedis.ch/kyber/v4/group/mod" - "go.dedis.ch/kyber/v4/util/random" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/internal/marshalling" + "go.dedis.ch/kyber/v3/group/mod" + "go.dedis.ch/kyber/v3/util/random" ) // This code is a port of the public domain, "ref10" implementation of ed25519 diff --git a/group/edwards25519/scalar_test.go b/group/edwards25519/scalar_test.go index 7df309328..0e8459c9a 100644 --- a/group/edwards25519/scalar_test.go +++ b/group/edwards25519/scalar_test.go @@ -5,8 +5,8 @@ import ( "testing" "github.com/stretchr/testify/require" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/util/random" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/util/random" ) // SimpleCTScalar implements the scalar operations only using `ScMulAdd` by diff --git a/group/edwards25519/suite.go b/group/edwards25519/suite.go index fd15f80bc..aadf8ffdd 100644 --- a/group/edwards25519/suite.go +++ b/group/edwards25519/suite.go @@ -8,10 +8,10 @@ import ( "reflect" "go.dedis.ch/fixbuf" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/internal/marshalling" - "go.dedis.ch/kyber/v4/util/random" - "go.dedis.ch/kyber/v4/xof/blake2xb" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/internal/marshalling" + "go.dedis.ch/kyber/v3/util/random" + "go.dedis.ch/kyber/v3/xof/blake2xb" ) // SuiteEd25519 implements some basic functionalities such as Group, HashFactory, @@ -54,7 +54,7 @@ func (s *SuiteEd25519) RandomStream() cipher.Stream { } // NewBlakeSHA256Ed25519 returns a cipher suite based on package -// go.dedis.ch/kyber/v4/xof/blake2xb, SHA-256, and the Ed25519 curve. +// go.dedis.ch/kyber/v3/xof/blake2xb, SHA-256, and the Ed25519 curve. // It produces cryptographically random numbers via package crypto/rand. func NewBlakeSHA256Ed25519() *SuiteEd25519 { suite := new(SuiteEd25519) @@ -62,7 +62,7 @@ func NewBlakeSHA256Ed25519() *SuiteEd25519 { } // NewBlakeSHA256Ed25519WithRand returns a cipher suite based on package -// go.dedis.ch/kyber/v4/xof/blake2xb, SHA-256, and the Ed25519 curve. +// go.dedis.ch/kyber/v3/xof/blake2xb, SHA-256, and the Ed25519 curve. // It produces cryptographically random numbers via the provided stream r. func NewBlakeSHA256Ed25519WithRand(r cipher.Stream) *SuiteEd25519 { suite := new(SuiteEd25519) diff --git a/group/internal/marshalling/marshal.go b/group/internal/marshalling/marshal.go index 2858912a3..457b328db 100644 --- a/group/internal/marshalling/marshal.go +++ b/group/internal/marshalling/marshal.go @@ -7,7 +7,7 @@ import ( "io" "reflect" - "go.dedis.ch/kyber/v4" + "go.dedis.ch/kyber/v3" ) // PointMarshalTo provides a generic implementation of Point.EncodeTo diff --git a/group/mod/int.go b/group/mod/int.go index 172e79a4d..ba898f2fd 100644 --- a/group/mod/int.go +++ b/group/mod/int.go @@ -9,9 +9,9 @@ import ( "io" "math/big" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/internal/marshalling" - "go.dedis.ch/kyber/v4/util/random" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/internal/marshalling" + "go.dedis.ch/kyber/v3/util/random" ) var one = big.NewInt(1) diff --git a/group/nist/curve.go b/group/nist/curve.go index 23541822c..6888d9fc0 100644 --- a/group/nist/curve.go +++ b/group/nist/curve.go @@ -7,10 +7,10 @@ import ( "io" "math/big" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/internal/marshalling" - "go.dedis.ch/kyber/v4/group/mod" - "go.dedis.ch/kyber/v4/util/random" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/internal/marshalling" + "go.dedis.ch/kyber/v3/group/mod" + "go.dedis.ch/kyber/v3/util/random" ) type curvePoint struct { diff --git a/group/nist/group_test.go b/group/nist/group_test.go index 568d60026..e60de4198 100644 --- a/group/nist/group_test.go +++ b/group/nist/group_test.go @@ -3,7 +3,7 @@ package nist import ( "testing" - "go.dedis.ch/kyber/v4/util/test" + "go.dedis.ch/kyber/v3/util/test" ) var testQR512 = NewBlakeSHA256QR512() diff --git a/group/nist/qrsuite.go b/group/nist/qrsuite.go index 73e15f7c0..2b1fc9107 100644 --- a/group/nist/qrsuite.go +++ b/group/nist/qrsuite.go @@ -9,10 +9,10 @@ import ( "reflect" "go.dedis.ch/fixbuf" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/internal/marshalling" - "go.dedis.ch/kyber/v4/util/random" - "go.dedis.ch/kyber/v4/xof/blake2xb" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/internal/marshalling" + "go.dedis.ch/kyber/v3/util/random" + "go.dedis.ch/kyber/v3/xof/blake2xb" ) // QrSuite is a quadratic residue suite @@ -50,7 +50,7 @@ func (s *QrSuite) New(t reflect.Type) interface{} { } // NewBlakeSHA256QR512 returns a cipher suite based on package -// go.dedis.ch/kyber/v4/xof/blake2xb, SHA-256, and a residue group of +// go.dedis.ch/kyber/v3/xof/blake2xb, SHA-256, and a residue group of // quadratic residues modulo a 512-bit prime. // // This group size should be used only for testing and experimentation. diff --git a/group/nist/residue.go b/group/nist/residue.go index 5b2c4a60d..27b845b07 100644 --- a/group/nist/residue.go +++ b/group/nist/residue.go @@ -8,10 +8,10 @@ import ( "io" "math/big" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/internal/marshalling" - "go.dedis.ch/kyber/v4/group/mod" - "go.dedis.ch/kyber/v4/util/random" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/internal/marshalling" + "go.dedis.ch/kyber/v3/group/mod" + "go.dedis.ch/kyber/v3/util/random" ) var one = big.NewInt(1) diff --git a/group/nist/suite.go b/group/nist/suite.go index aba2211f9..04f6bdd83 100644 --- a/group/nist/suite.go +++ b/group/nist/suite.go @@ -8,10 +8,10 @@ import ( "reflect" "go.dedis.ch/fixbuf" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/internal/marshalling" - "go.dedis.ch/kyber/v4/util/random" - "go.dedis.ch/kyber/v4/xof/blake2xb" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/internal/marshalling" + "go.dedis.ch/kyber/v3/util/random" + "go.dedis.ch/kyber/v3/xof/blake2xb" ) // Suite128 is the suite for P256 curve @@ -49,7 +49,7 @@ func (s *Suite128) New(t reflect.Type) interface{} { } // NewBlakeSHA256P256 returns a cipher suite based on package -// go.dedis.ch/kyber/v4/xof/blake2xb, SHA-256, and the NIST P-256 +// go.dedis.ch/kyber/v3/xof/blake2xb, SHA-256, and the NIST P-256 // elliptic curve. It returns random streams from Go's crypto/rand. // // The scalars created by this group implement kyber.Scalar's SetBytes diff --git a/pairing/adapter.go b/pairing/adapter.go index f5f7e4fcf..ade840742 100644 --- a/pairing/adapter.go +++ b/pairing/adapter.go @@ -1,8 +1,8 @@ package pairing import ( - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/pairing/bn256" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/pairing/bn256" ) // SuiteBn256 is an adapter that implements the suites.Suite interface so that diff --git a/pairing/adapter_test.go b/pairing/adapter_test.go index 4a50f1aa1..97bbbb728 100644 --- a/pairing/adapter_test.go +++ b/pairing/adapter_test.go @@ -4,7 +4,7 @@ import ( "testing" "github.com/stretchr/testify/require" - "go.dedis.ch/kyber/v4/util/key" + "go.dedis.ch/kyber/v3/util/key" ) func TestAdapter_SuiteBn256(t *testing.T) { diff --git a/pairing/bn256/group.go b/pairing/bn256/group.go index f4ec560bd..9ed3039cd 100644 --- a/pairing/bn256/group.go +++ b/pairing/bn256/group.go @@ -3,8 +3,8 @@ package bn256 import ( "crypto/cipher" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/mod" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/mod" ) type groupG1 struct { diff --git a/pairing/bn256/point.go b/pairing/bn256/point.go index 35a89c068..28316b6a2 100644 --- a/pairing/bn256/point.go +++ b/pairing/bn256/point.go @@ -8,8 +8,8 @@ import ( "io" "math/big" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/mod" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/mod" ) var marshalPointID1 = [8]byte{'b', 'n', '2', '5', '6', '.', 'g', '1'} diff --git a/pairing/bn256/suite.go b/pairing/bn256/suite.go index ff333111f..8f46bf721 100644 --- a/pairing/bn256/suite.go +++ b/pairing/bn256/suite.go @@ -24,9 +24,9 @@ import ( "reflect" "go.dedis.ch/fixbuf" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/util/random" - "go.dedis.ch/kyber/v4/xof/blake2xb" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/util/random" + "go.dedis.ch/kyber/v3/xof/blake2xb" ) // Suite implements the pairing.Suite interface for the BN256 bilinear pairing. diff --git a/pairing/bn256/suite_test.go b/pairing/bn256/suite_test.go index 9ba825254..66fa5bb60 100644 --- a/pairing/bn256/suite_test.go +++ b/pairing/bn256/suite_test.go @@ -6,9 +6,9 @@ import ( "testing" "github.com/stretchr/testify/require" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/mod" - "go.dedis.ch/kyber/v4/util/random" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/mod" + "go.dedis.ch/kyber/v3/util/random" "go.dedis.ch/protobuf" "golang.org/x/crypto/bn256" ) diff --git a/pairing/pairing.go b/pairing/pairing.go index e047d4990..d0e70707b 100644 --- a/pairing/pairing.go +++ b/pairing/pairing.go @@ -1,6 +1,6 @@ package pairing -import "go.dedis.ch/kyber/v4" +import "go.dedis.ch/kyber/v3" // Suite interface represents a triplet of elliptic curve groups (G₁, G₂ // and GT) such that there exists a function e(g₁ˣ,g₂ʸ)=gTˣʸ (where gₓ is a diff --git a/proof/clique.go b/proof/clique.go index c445b8d7d..0fbf1c061 100644 --- a/proof/clique.go +++ b/proof/clique.go @@ -10,7 +10,7 @@ package proof // assumes that nodes are always "live" and never go offline, // but we can achieve availability via threshold kyber. -import "go.dedis.ch/kyber/v4" +import "go.dedis.ch/kyber/v3" // Protocol represents the role of a participant in a clique protocol. // A participant is represented as a higher-order function taking a StarContext, diff --git a/proof/deniable.go b/proof/deniable.go index c76bb5650..0208a393d 100644 --- a/proof/deniable.go +++ b/proof/deniable.go @@ -5,7 +5,7 @@ import ( "errors" "fmt" - "go.dedis.ch/kyber/v4" + "go.dedis.ch/kyber/v3" ) // DeniableProver is a Protocol implementing an interactive Sigma-protocol diff --git a/proof/deniable_test.go b/proof/deniable_test.go index b7533cfc4..d654baef9 100644 --- a/proof/deniable_test.go +++ b/proof/deniable_test.go @@ -5,9 +5,9 @@ import ( "fmt" "testing" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/edwards25519" - "go.dedis.ch/kyber/v4/util/random" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/edwards25519" + "go.dedis.ch/kyber/v3/util/random" ) var testSuite = edwards25519.NewBlakeSHA256Ed25519() diff --git a/proof/dleq/dleq.go b/proof/dleq/dleq.go index 190ab8654..e610ccc87 100644 --- a/proof/dleq/dleq.go +++ b/proof/dleq/dleq.go @@ -8,7 +8,7 @@ package dleq import ( "errors" - "go.dedis.ch/kyber/v4" + "go.dedis.ch/kyber/v3" ) // Suite wraps the functionalities needed by the dleq package. diff --git a/proof/dleq/dleq_test.go b/proof/dleq/dleq_test.go index a33df8cbf..e6683aa37 100644 --- a/proof/dleq/dleq_test.go +++ b/proof/dleq/dleq_test.go @@ -4,9 +4,9 @@ import ( "testing" "github.com/stretchr/testify/require" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/edwards25519" - "go.dedis.ch/kyber/v4/util/random" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/edwards25519" + "go.dedis.ch/kyber/v3/util/random" ) var rng = random.New() diff --git a/proof/hash.go b/proof/hash.go index 95790c852..8f1aa508e 100644 --- a/proof/hash.go +++ b/proof/hash.go @@ -6,7 +6,7 @@ import ( "fmt" "io" - "go.dedis.ch/kyber/v4" + "go.dedis.ch/kyber/v3" ) // Hash-based noninteractive Sigma-protocol prover context diff --git a/proof/hash_test.go b/proof/hash_test.go index fa2a861c9..4fb355ffb 100644 --- a/proof/hash_test.go +++ b/proof/hash_test.go @@ -4,9 +4,9 @@ import ( "encoding/hex" "fmt" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/edwards25519" - "go.dedis.ch/kyber/v4/xof/blake2xb" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/edwards25519" + "go.dedis.ch/kyber/v3/xof/blake2xb" ) // This example shows how to build classic ElGamal-style digital signatures diff --git a/proof/proof.go b/proof/proof.go index c9061d6ec..ec343f45b 100644 --- a/proof/proof.go +++ b/proof/proof.go @@ -8,7 +8,7 @@ package proof import ( "errors" - "go.dedis.ch/kyber/v4" + "go.dedis.ch/kyber/v3" ) // Suite defines the functionalities needed for this package to operate diff --git a/proof/proof_test.go b/proof/proof_test.go index 94884280c..6ca8d1797 100644 --- a/proof/proof_test.go +++ b/proof/proof_test.go @@ -5,9 +5,9 @@ import ( "fmt" "testing" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/edwards25519" - "go.dedis.ch/kyber/v4/xof/blake2xb" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/edwards25519" + "go.dedis.ch/kyber/v3/xof/blake2xb" ) func TestRep(t *testing.T) { diff --git a/share/dkg/pedersen/dkg.go b/share/dkg/pedersen/dkg.go index f7c8f113d..76a88cced 100644 --- a/share/dkg/pedersen/dkg.go +++ b/share/dkg/pedersen/dkg.go @@ -15,12 +15,12 @@ import ( "fmt" "io" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/util/random" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/util/random" - "go.dedis.ch/kyber/v4/share" - vss "go.dedis.ch/kyber/v4/share/vss/pedersen" - "go.dedis.ch/kyber/v4/sign/schnorr" + "go.dedis.ch/kyber/v3/share" + vss "go.dedis.ch/kyber/v3/share/vss/pedersen" + "go.dedis.ch/kyber/v3/sign/schnorr" ) // Suite wraps the functionalities needed by the dkg package diff --git a/share/dkg/pedersen/dkg_test.go b/share/dkg/pedersen/dkg_test.go index 2df20415f..ac42610a7 100644 --- a/share/dkg/pedersen/dkg_test.go +++ b/share/dkg/pedersen/dkg_test.go @@ -8,10 +8,10 @@ import ( "testing" "github.com/stretchr/testify/require" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/edwards25519" - "go.dedis.ch/kyber/v4/share" - vss "go.dedis.ch/kyber/v4/share/vss/pedersen" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/edwards25519" + "go.dedis.ch/kyber/v3/share" + vss "go.dedis.ch/kyber/v3/share/vss/pedersen" ) var suite = edwards25519.NewBlakeSHA256Ed25519() diff --git a/share/dkg/pedersen/structs.go b/share/dkg/pedersen/structs.go index efbeba631..6ffab89af 100644 --- a/share/dkg/pedersen/structs.go +++ b/share/dkg/pedersen/structs.go @@ -4,9 +4,9 @@ import ( "bytes" "encoding/binary" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/share" - vss "go.dedis.ch/kyber/v4/share/vss/pedersen" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/share" + vss "go.dedis.ch/kyber/v3/share/vss/pedersen" ) // DistKeyShare holds the share of a distributed key for a participant. diff --git a/share/dkg/rabin/dkg.go b/share/dkg/rabin/dkg.go index 161da833f..376d1e1a4 100644 --- a/share/dkg/rabin/dkg.go +++ b/share/dkg/rabin/dkg.go @@ -41,12 +41,12 @@ import ( "errors" "fmt" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/sign/schnorr" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/sign/schnorr" "go.dedis.ch/protobuf" - "go.dedis.ch/kyber/v4/share" - vss "go.dedis.ch/kyber/v4/share/vss/rabin" + "go.dedis.ch/kyber/v3/share" + vss "go.dedis.ch/kyber/v3/share/vss/rabin" ) // Suite wraps the functionalities needed by the dkg package diff --git a/share/dkg/rabin/dkg_test.go b/share/dkg/rabin/dkg_test.go index 710fd636f..a90e0a03a 100644 --- a/share/dkg/rabin/dkg_test.go +++ b/share/dkg/rabin/dkg_test.go @@ -6,11 +6,11 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/edwards25519" - "go.dedis.ch/kyber/v4/share" - vss "go.dedis.ch/kyber/v4/share/vss/rabin" - "go.dedis.ch/kyber/v4/sign/schnorr" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/edwards25519" + "go.dedis.ch/kyber/v3/share" + vss "go.dedis.ch/kyber/v3/share/vss/rabin" + "go.dedis.ch/kyber/v3/sign/schnorr" ) var suite = edwards25519.NewBlakeSHA256Ed25519() diff --git a/share/poly.go b/share/poly.go index aec1ded44..5a0b01bfd 100644 --- a/share/poly.go +++ b/share/poly.go @@ -18,7 +18,7 @@ import ( "sort" "strings" - "go.dedis.ch/kyber/v4" + "go.dedis.ch/kyber/v3" ) // Some error definitions diff --git a/share/poly_test.go b/share/poly_test.go index 199e00271..ed1a439ea 100644 --- a/share/poly_test.go +++ b/share/poly_test.go @@ -5,8 +5,8 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/edwards25519" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/edwards25519" ) func TestSecretRecovery(test *testing.T) { diff --git a/share/pvss/pvss.go b/share/pvss/pvss.go index c9f06e9dc..8c8fc8cfe 100644 --- a/share/pvss/pvss.go +++ b/share/pvss/pvss.go @@ -15,9 +15,9 @@ package pvss import ( "errors" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/proof/dleq" - "go.dedis.ch/kyber/v4/share" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/proof/dleq" + "go.dedis.ch/kyber/v3/share" ) // Suite describes the functionalities needed by this package in order to diff --git a/share/pvss/pvss_test.go b/share/pvss/pvss_test.go index 5c4bf9531..e9dfe32b5 100644 --- a/share/pvss/pvss_test.go +++ b/share/pvss/pvss_test.go @@ -4,8 +4,8 @@ import ( "testing" "github.com/stretchr/testify/require" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/edwards25519" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/edwards25519" ) func TestPVSS(test *testing.T) { diff --git a/share/vss/pedersen/dh.go b/share/vss/pedersen/dh.go index 2fc3c6b48..c4e34ddce 100644 --- a/share/vss/pedersen/dh.go +++ b/share/vss/pedersen/dh.go @@ -5,7 +5,7 @@ import ( "crypto/cipher" "hash" - "go.dedis.ch/kyber/v4" + "go.dedis.ch/kyber/v3" "golang.org/x/crypto/hkdf" ) diff --git a/share/vss/pedersen/vss.go b/share/vss/pedersen/vss.go index 1aee17a36..91c9ec637 100644 --- a/share/vss/pedersen/vss.go +++ b/share/vss/pedersen/vss.go @@ -12,9 +12,9 @@ import ( "fmt" "reflect" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/share" - "go.dedis.ch/kyber/v4/sign/schnorr" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/share" + "go.dedis.ch/kyber/v3/sign/schnorr" "go.dedis.ch/protobuf" ) diff --git a/share/vss/pedersen/vss_test.go b/share/vss/pedersen/vss_test.go index 305d31921..e97efdd51 100644 --- a/share/vss/pedersen/vss_test.go +++ b/share/vss/pedersen/vss_test.go @@ -6,10 +6,10 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/edwards25519" - "go.dedis.ch/kyber/v4/sign/schnorr" - "go.dedis.ch/kyber/v4/xof/blake2xb" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/edwards25519" + "go.dedis.ch/kyber/v3/sign/schnorr" + "go.dedis.ch/kyber/v3/xof/blake2xb" "go.dedis.ch/protobuf" ) diff --git a/share/vss/rabin/dh.go b/share/vss/rabin/dh.go index 201d0f9ab..345c397d1 100644 --- a/share/vss/rabin/dh.go +++ b/share/vss/rabin/dh.go @@ -5,7 +5,7 @@ import ( "crypto/cipher" "hash" - "go.dedis.ch/kyber/v4" + "go.dedis.ch/kyber/v3" "golang.org/x/crypto/hkdf" ) diff --git a/share/vss/rabin/vss.go b/share/vss/rabin/vss.go index f0b283ba5..d9e8f06e9 100644 --- a/share/vss/rabin/vss.go +++ b/share/vss/rabin/vss.go @@ -36,9 +36,9 @@ import ( "fmt" "reflect" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/share" - "go.dedis.ch/kyber/v4/sign/schnorr" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/share" + "go.dedis.ch/kyber/v3/sign/schnorr" "go.dedis.ch/protobuf" ) diff --git a/share/vss/rabin/vss_test.go b/share/vss/rabin/vss_test.go index 073307369..87c4c5fc3 100644 --- a/share/vss/rabin/vss_test.go +++ b/share/vss/rabin/vss_test.go @@ -6,9 +6,9 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/edwards25519" - "go.dedis.ch/kyber/v4/sign/schnorr" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/edwards25519" + "go.dedis.ch/kyber/v3/sign/schnorr" "go.dedis.ch/protobuf" ) diff --git a/shuffle/biffle.go b/shuffle/biffle.go index 035b98e4a..af0ec72d3 100644 --- a/shuffle/biffle.go +++ b/shuffle/biffle.go @@ -3,9 +3,9 @@ package shuffle import ( "crypto/cipher" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/proof" - "go.dedis.ch/kyber/v4/util/random" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/proof" + "go.dedis.ch/kyber/v3/util/random" ) func bifflePred() proof.Predicate { diff --git a/shuffle/biffle_test.go b/shuffle/biffle_test.go index 38675201a..2b73cde33 100644 --- a/shuffle/biffle_test.go +++ b/shuffle/biffle_test.go @@ -3,10 +3,10 @@ package shuffle import ( "testing" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/edwards25519" - "go.dedis.ch/kyber/v4/proof" - "go.dedis.ch/kyber/v4/xof/blake2xb" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/edwards25519" + "go.dedis.ch/kyber/v3/proof" + "go.dedis.ch/kyber/v3/xof/blake2xb" ) func TestBiffle(t *testing.T) { diff --git a/shuffle/pair.go b/shuffle/pair.go index 9e904bbf0..9be69550f 100644 --- a/shuffle/pair.go +++ b/shuffle/pair.go @@ -24,9 +24,9 @@ import ( "encoding/binary" "errors" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/proof" - "go.dedis.ch/kyber/v4/util/random" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/proof" + "go.dedis.ch/kyber/v3/util/random" ) // Suite wraps the functionalities needed by the shuffle/ package. These are the diff --git a/shuffle/shuffle_test.go b/shuffle/shuffle_test.go index b7694d624..c46fb1323 100644 --- a/shuffle/shuffle_test.go +++ b/shuffle/shuffle_test.go @@ -3,10 +3,10 @@ package shuffle import ( "testing" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/edwards25519" - "go.dedis.ch/kyber/v4/proof" - "go.dedis.ch/kyber/v4/xof/blake2xb" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/edwards25519" + "go.dedis.ch/kyber/v3/proof" + "go.dedis.ch/kyber/v3/xof/blake2xb" ) var k = 5 diff --git a/shuffle/simple.go b/shuffle/simple.go index b2fbe99ba..7f7149815 100644 --- a/shuffle/simple.go +++ b/shuffle/simple.go @@ -4,8 +4,8 @@ import ( "crypto/cipher" "errors" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/proof" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/proof" ) // XX the Zs in front of some field names are a kludge to make them diff --git a/shuffle/vartime_test.go b/shuffle/vartime_test.go index 61f34246b..f996a7fd1 100644 --- a/shuffle/vartime_test.go +++ b/shuffle/vartime_test.go @@ -3,7 +3,7 @@ package shuffle import ( "testing" - "go.dedis.ch/kyber/v4/group/nist" + "go.dedis.ch/kyber/v3/group/nist" ) func BenchmarkBiffleP256(b *testing.B) { diff --git a/sign/anon/anon.go b/sign/anon/anon.go index 6f2afc896..a22168b68 100644 --- a/sign/anon/anon.go +++ b/sign/anon/anon.go @@ -2,7 +2,7 @@ package anon import ( - "go.dedis.ch/kyber/v4" + "go.dedis.ch/kyber/v3" ) // Set represents an explicit anonymity set diff --git a/sign/anon/enc.go b/sign/anon/enc.go index f5dd0bf38..dc1d4f674 100644 --- a/sign/anon/enc.go +++ b/sign/anon/enc.go @@ -4,8 +4,8 @@ import ( "crypto/subtle" "errors" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/util/key" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/util/key" ) func header(suite Suite, X kyber.Point, x kyber.Scalar, diff --git a/sign/anon/enc_test.go b/sign/anon/enc_test.go index e7d29c94d..7c3fbe4fa 100644 --- a/sign/anon/enc_test.go +++ b/sign/anon/enc_test.go @@ -5,9 +5,9 @@ import ( "encoding/hex" "fmt" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/edwards25519" - "go.dedis.ch/kyber/v4/xof/blake2xb" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/edwards25519" + "go.dedis.ch/kyber/v3/xof/blake2xb" ) func ExampleEncrypt_one() { diff --git a/sign/anon/sig.go b/sign/anon/sig.go index a7ad91cea..cd0a2e594 100644 --- a/sign/anon/sig.go +++ b/sign/anon/sig.go @@ -4,7 +4,7 @@ import ( "bytes" "errors" - "go.dedis.ch/kyber/v4" + "go.dedis.ch/kyber/v3" ) // unlinkable ring signature diff --git a/sign/anon/sig_test.go b/sign/anon/sig_test.go index 672d8bed2..7b0ffce31 100644 --- a/sign/anon/sig_test.go +++ b/sign/anon/sig_test.go @@ -6,10 +6,10 @@ import ( "fmt" "testing" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/edwards25519" - "go.dedis.ch/kyber/v4/util/random" - "go.dedis.ch/kyber/v4/xof/blake2xb" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/edwards25519" + "go.dedis.ch/kyber/v3/util/random" + "go.dedis.ch/kyber/v3/xof/blake2xb" ) // This example demonstrates signing and signature verification diff --git a/sign/anon/suite.go b/sign/anon/suite.go index 263d25a1f..b84013941 100644 --- a/sign/anon/suite.go +++ b/sign/anon/suite.go @@ -1,7 +1,7 @@ package anon import ( - "go.dedis.ch/kyber/v4" + "go.dedis.ch/kyber/v3" ) // Suite represents the set of functionalities needed by the package anon. diff --git a/sign/bdn/bdn.go b/sign/bdn/bdn.go index 2bcba0d83..7f8aa78f9 100644 --- a/sign/bdn/bdn.go +++ b/sign/bdn/bdn.go @@ -14,11 +14,11 @@ import ( "errors" "math/big" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/mod" - "go.dedis.ch/kyber/v4/pairing" - "go.dedis.ch/kyber/v4/sign" - "go.dedis.ch/kyber/v4/sign/bls" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/mod" + "go.dedis.ch/kyber/v3/pairing" + "go.dedis.ch/kyber/v3/sign" + "go.dedis.ch/kyber/v3/sign/bls" "golang.org/x/crypto/blake2s" ) diff --git a/sign/bdn/bdn_test.go b/sign/bdn/bdn_test.go index 5f6cf0dca..d2542b458 100644 --- a/sign/bdn/bdn_test.go +++ b/sign/bdn/bdn_test.go @@ -5,12 +5,12 @@ import ( "testing" "github.com/stretchr/testify/require" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/pairing" - "go.dedis.ch/kyber/v4/pairing/bn256" - "go.dedis.ch/kyber/v4/sign" - "go.dedis.ch/kyber/v4/sign/bls" - "go.dedis.ch/kyber/v4/util/random" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/pairing" + "go.dedis.ch/kyber/v3/pairing/bn256" + "go.dedis.ch/kyber/v3/sign" + "go.dedis.ch/kyber/v3/sign/bls" + "go.dedis.ch/kyber/v3/util/random" ) var suite = pairing.NewSuiteBn256() diff --git a/sign/bls/bls.go b/sign/bls/bls.go index a8dc69bbd..f2abb3c0a 100644 --- a/sign/bls/bls.go +++ b/sign/bls/bls.go @@ -17,8 +17,8 @@ import ( "errors" "fmt" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/pairing" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/pairing" ) type hashablePoint interface { diff --git a/sign/bls/bls_test.go b/sign/bls/bls_test.go index 82ea539b6..0f7f3cfa9 100644 --- a/sign/bls/bls_test.go +++ b/sign/bls/bls_test.go @@ -5,9 +5,9 @@ import ( "testing" "github.com/stretchr/testify/require" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/pairing/bn256" - "go.dedis.ch/kyber/v4/util/random" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/pairing/bn256" + "go.dedis.ch/kyber/v3/util/random" ) func TestBLS(t *testing.T) { diff --git a/sign/cosi/cosi.go b/sign/cosi/cosi.go index 4499372d7..6aa340608 100644 --- a/sign/cosi/cosi.go +++ b/sign/cosi/cosi.go @@ -43,7 +43,7 @@ import ( "errors" "fmt" - "go.dedis.ch/kyber/v4" + "go.dedis.ch/kyber/v3" ) // Commit returns a random scalar v, generated from the given suite, diff --git a/sign/cosi/cosi_test.go b/sign/cosi/cosi_test.go index 55aa9d5ac..437e11e98 100644 --- a/sign/cosi/cosi_test.go +++ b/sign/cosi/cosi_test.go @@ -7,11 +7,11 @@ import ( "hash" "testing" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/edwards25519" - "go.dedis.ch/kyber/v4/sign/eddsa" - "go.dedis.ch/kyber/v4/util/key" - "go.dedis.ch/kyber/v4/xof/blake2xb" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/edwards25519" + "go.dedis.ch/kyber/v3/sign/eddsa" + "go.dedis.ch/kyber/v3/util/key" + "go.dedis.ch/kyber/v3/xof/blake2xb" ) // Specify cipher suite using AES-128, SHA512, and the Edwards25519 curve. diff --git a/sign/cosi/suite.go b/sign/cosi/suite.go index d562cc9b0..91529379b 100644 --- a/sign/cosi/suite.go +++ b/sign/cosi/suite.go @@ -1,6 +1,6 @@ package cosi -import "go.dedis.ch/kyber/v4" +import "go.dedis.ch/kyber/v3" // Suite specifies the cryptographic building blocks required for the cosi package. type Suite interface { diff --git a/sign/dss/dss.go b/sign/dss/dss.go index 536e6a647..4a899d5b7 100644 --- a/sign/dss/dss.go +++ b/sign/dss/dss.go @@ -19,10 +19,10 @@ import ( "crypto/sha512" "errors" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/share" - "go.dedis.ch/kyber/v4/sign/eddsa" - "go.dedis.ch/kyber/v4/sign/schnorr" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/share" + "go.dedis.ch/kyber/v3/sign/eddsa" + "go.dedis.ch/kyber/v3/sign/schnorr" ) // Suite represents the functionalities needed by the dss package diff --git a/sign/dss/dss_test.go b/sign/dss/dss_test.go index b5c488175..4dc891a13 100644 --- a/sign/dss/dss_test.go +++ b/sign/dss/dss_test.go @@ -6,11 +6,11 @@ import ( "github.com/stretchr/testify/assert" "github.com/stretchr/testify/require" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/edwards25519" - dkg "go.dedis.ch/kyber/v4/share/dkg/rabin" - "go.dedis.ch/kyber/v4/sign/eddsa" - "go.dedis.ch/kyber/v4/sign/schnorr" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/edwards25519" + dkg "go.dedis.ch/kyber/v3/share/dkg/rabin" + "go.dedis.ch/kyber/v3/sign/eddsa" + "go.dedis.ch/kyber/v3/sign/schnorr" ) var suite = edwards25519.NewBlakeSHA256Ed25519() diff --git a/sign/eddsa/eddsa.go b/sign/eddsa/eddsa.go index a4fa989d3..00cc0141e 100644 --- a/sign/eddsa/eddsa.go +++ b/sign/eddsa/eddsa.go @@ -8,8 +8,8 @@ import ( "errors" "fmt" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/edwards25519" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/edwards25519" ) var group = new(edwards25519.Curve) diff --git a/sign/eddsa/eddsa_test.go b/sign/eddsa/eddsa_test.go index 07abb95a7..07b0d61d5 100644 --- a/sign/eddsa/eddsa_test.go +++ b/sign/eddsa/eddsa_test.go @@ -11,7 +11,7 @@ import ( "strings" "testing" - "go.dedis.ch/kyber/v4/group/edwards25519" + "go.dedis.ch/kyber/v3/group/edwards25519" "github.com/stretchr/testify/assert" ) diff --git a/sign/mask.go b/sign/mask.go index ffc8c9809..3ae255f57 100644 --- a/sign/mask.go +++ b/sign/mask.go @@ -5,8 +5,8 @@ import ( "errors" "fmt" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/pairing" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/pairing" ) // Mask is a bitmask of the participation to a collective signature. diff --git a/sign/mask_test.go b/sign/mask_test.go index cb0347c1d..5308f31db 100644 --- a/sign/mask_test.go +++ b/sign/mask_test.go @@ -5,9 +5,9 @@ import ( "testing" "github.com/stretchr/testify/require" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/pairing" - "go.dedis.ch/kyber/v4/util/key" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/pairing" + "go.dedis.ch/kyber/v3/util/key" ) const n = 17 diff --git a/sign/schnorr/schnorr.go b/sign/schnorr/schnorr.go index 3d09c7108..def76095b 100644 --- a/sign/schnorr/schnorr.go +++ b/sign/schnorr/schnorr.go @@ -17,7 +17,7 @@ import ( "errors" "fmt" - "go.dedis.ch/kyber/v4" + "go.dedis.ch/kyber/v3" ) // Suite represents the set of functionalities needed by the package schnorr. diff --git a/sign/schnorr/schnorr_test.go b/sign/schnorr/schnorr_test.go index 594c70fcc..43d9855ba 100644 --- a/sign/schnorr/schnorr_test.go +++ b/sign/schnorr/schnorr_test.go @@ -7,9 +7,9 @@ import ( "testing/quick" "github.com/stretchr/testify/assert" - "go.dedis.ch/kyber/v4/group/edwards25519" - "go.dedis.ch/kyber/v4/sign/eddsa" - "go.dedis.ch/kyber/v4/util/key" + "go.dedis.ch/kyber/v3/group/edwards25519" + "go.dedis.ch/kyber/v3/sign/eddsa" + "go.dedis.ch/kyber/v3/util/key" ) func TestSchnorrSignature(t *testing.T) { diff --git a/sign/tbls/tbls.go b/sign/tbls/tbls.go index 163bec671..8d12511e3 100644 --- a/sign/tbls/tbls.go +++ b/sign/tbls/tbls.go @@ -14,9 +14,9 @@ import ( "bytes" "encoding/binary" - "go.dedis.ch/kyber/v4/pairing" - "go.dedis.ch/kyber/v4/share" - "go.dedis.ch/kyber/v4/sign/bls" + "go.dedis.ch/kyber/v3/pairing" + "go.dedis.ch/kyber/v3/share" + "go.dedis.ch/kyber/v3/sign/bls" ) // SigShare encodes a threshold BLS signature share Si = i || v where the 2-byte diff --git a/sign/tbls/tbls_test.go b/sign/tbls/tbls_test.go index ee6bc034a..5254bb7f6 100644 --- a/sign/tbls/tbls_test.go +++ b/sign/tbls/tbls_test.go @@ -4,9 +4,9 @@ import ( "testing" "github.com/stretchr/testify/require" - "go.dedis.ch/kyber/v4/pairing/bn256" - "go.dedis.ch/kyber/v4/share" - "go.dedis.ch/kyber/v4/sign/bls" + "go.dedis.ch/kyber/v3/pairing/bn256" + "go.dedis.ch/kyber/v3/share" + "go.dedis.ch/kyber/v3/sign/bls" ) func TestTBLS(test *testing.T) { diff --git a/suites/all.go b/suites/all.go index c50f62803..616235d3e 100644 --- a/suites/all.go +++ b/suites/all.go @@ -1,10 +1,10 @@ package suites import ( - "go.dedis.ch/kyber/v4/group/edwards25519" - "go.dedis.ch/kyber/v4/group/nist" - "go.dedis.ch/kyber/v4/pairing" - "go.dedis.ch/kyber/v4/pairing/bn256" + "go.dedis.ch/kyber/v3/group/edwards25519" + "go.dedis.ch/kyber/v3/group/nist" + "go.dedis.ch/kyber/v3/pairing" + "go.dedis.ch/kyber/v3/pairing/bn256" ) func init() { diff --git a/suites/suites.go b/suites/suites.go index 36a9d567b..ab95395c4 100644 --- a/suites/suites.go +++ b/suites/suites.go @@ -8,7 +8,7 @@ import ( "errors" "strings" - "go.dedis.ch/kyber/v4" + "go.dedis.ch/kyber/v3" ) // Suite is the sum of all suites mix-ins in Kyber. diff --git a/util/encoding/encoding.go b/util/encoding/encoding.go index 792c088be..f1f86b6d1 100644 --- a/util/encoding/encoding.go +++ b/util/encoding/encoding.go @@ -8,7 +8,7 @@ import ( "io" "strings" - "go.dedis.ch/kyber/v4" + "go.dedis.ch/kyber/v3" ) // ReadHexPoint reads a point from r in hex representation. diff --git a/util/encoding/encoding_test.go b/util/encoding/encoding_test.go index 41230b77b..f1a0cccdc 100644 --- a/util/encoding/encoding_test.go +++ b/util/encoding/encoding_test.go @@ -5,7 +5,7 @@ import ( "testing" "github.com/stretchr/testify/require" - "go.dedis.ch/kyber/v4/group/edwards25519" + "go.dedis.ch/kyber/v3/group/edwards25519" ) var s = edwards25519.NewBlakeSHA256Ed25519() diff --git a/util/key/key.go b/util/key/key.go index 48c291798..f77c2d20e 100644 --- a/util/key/key.go +++ b/util/key/key.go @@ -4,7 +4,7 @@ package key import ( "crypto/cipher" - "go.dedis.ch/kyber/v4" + "go.dedis.ch/kyber/v3" ) // Generator is a type that needs to implement a special case in order diff --git a/util/key/key_test.go b/util/key/key_test.go index 56ef6b20b..406032d7b 100644 --- a/util/key/key_test.go +++ b/util/key/key_test.go @@ -4,8 +4,8 @@ import ( "crypto/cipher" "testing" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/group/edwards25519" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/group/edwards25519" ) func TestNewKeyPair(t *testing.T) { diff --git a/util/random/rand.go b/util/random/rand.go index 08ad30dc1..b7e9a7e7c 100644 --- a/util/random/rand.go +++ b/util/random/rand.go @@ -10,7 +10,7 @@ import ( "io" "math/big" - "go.dedis.ch/kyber/v4/xof/blake2xb" + "go.dedis.ch/kyber/v3/xof/blake2xb" ) // Bits chooses a uniform random BigInt with a given maximum BitLen. diff --git a/util/test/group.go b/util/test/group.go index 5621dc030..1aa4cf6ba 100644 --- a/util/test/group.go +++ b/util/test/group.go @@ -1,8 +1,8 @@ package test import ( - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/util/random" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/util/random" ) // GroupBench is a generic benchmark suite for kyber.groups. diff --git a/util/test/test.go b/util/test/test.go index dfb453f97..f63a436c4 100644 --- a/util/test/test.go +++ b/util/test/test.go @@ -5,9 +5,9 @@ import ( "crypto/cipher" "testing" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/util/key" - "go.dedis.ch/kyber/v4/util/random" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/util/key" + "go.dedis.ch/kyber/v3/util/random" ) // Suite represents the functionalities that this package can test diff --git a/xof/blake2xb/blake.go b/xof/blake2xb/blake.go index f7c34edca..9fdfeb049 100644 --- a/xof/blake2xb/blake.go +++ b/xof/blake2xb/blake.go @@ -3,7 +3,7 @@ package blake2xb import ( - "go.dedis.ch/kyber/v4" + "go.dedis.ch/kyber/v3" "golang.org/x/crypto/blake2b" ) diff --git a/xof/blake2xs/blake.go b/xof/blake2xs/blake.go index 5728fbbe2..8a91862d3 100644 --- a/xof/blake2xs/blake.go +++ b/xof/blake2xs/blake.go @@ -3,7 +3,7 @@ package blake2xs import ( - "go.dedis.ch/kyber/v4" + "go.dedis.ch/kyber/v3" "golang.org/x/crypto/blake2s" ) diff --git a/xof/keccak/keccak.go b/xof/keccak/keccak.go index 96530e7d6..d29e48c02 100644 --- a/xof/keccak/keccak.go +++ b/xof/keccak/keccak.go @@ -3,7 +3,7 @@ package keccak import ( - "go.dedis.ch/kyber/v4" + "go.dedis.ch/kyber/v3" "golang.org/x/crypto/sha3" ) diff --git a/xof/xof_test.go b/xof/xof_test.go index c123c20c4..e1e844ee1 100644 --- a/xof/xof_test.go +++ b/xof/xof_test.go @@ -6,9 +6,9 @@ import ( "testing" "github.com/stretchr/testify/require" - "go.dedis.ch/kyber/v4" - "go.dedis.ch/kyber/v4/xof/blake2xb" - "go.dedis.ch/kyber/v4/xof/keccak" + "go.dedis.ch/kyber/v3" + "go.dedis.ch/kyber/v3/xof/blake2xb" + "go.dedis.ch/kyber/v3/xof/keccak" ) type blakeF struct{}