Package Release Info

libsecp256k1-0.5.1-bp160.1.11

Update Info: Base Release
Available in Package Hub : 16.0

platforms

AArch64
ppc64le
s390x
x86-64

subpackages

libsecp256k1-2
libsecp256k1-devel

Change Logs

* Fri Aug 02 2024 Michael Vetter <mvetter@suse.com>
- Update to 0.5.1:
  * Added usage example for an ElligatorSwift key exchange.
  * The default size of the precomputed table for signing was changed
    from 22 KiB to 86 KiB. The size can be changed with the configure
    option --ecmult-gen-kb (SECP256K1_ECMULT_GEN_KB for CMake).
  * "auto" is no longer an accepted value for the --with-ecmult-window
    and --with-ecmult-gen-kb configure options (this also applies to
    SECP256K1_ECMULT_WINDOW_SIZE and SECP256K1_ECMULT_GEN_KB in CMake).
    To achieve the same configuration as previously provided by the
    "auto" value, omit setting the configure option explicitly.
  * Fixed compilation when the extrakeys module is disabled.
  * The ABI is backward compatible with versions 0.5.0, 0.4.x and 0.3.x.
* Tue May 07 2024 Michael Vetter <mvetter@suse.com>
- Update to 0.5.0:
  Added:
  * New function secp256k1_ec_pubkey_sort that sorts public keys
    using lexicographic (of compressed serialization) order.
  Changed:
  * The implementation of the point multiplication algorithm used
    for signing and public key generation was changed, resulting
    in improved performance for those operations. The related
    configure option --ecmult-gen-precision was replaced with
  - -ecmult-gen-kb (ECMULT_GEN_KB for CMake).
    This changes the supported precomputed table sizes for these
    operations. The new supported sizes are 2 KiB, 22 KiB, or 86
    KiB (while the old supported sizes were 32 KiB, 64 KiB, or 512 KiB).
  ABI Compatibility:
  * The ABI is backward compatible with versions 0.4.x and 0.3.x.
* Fri Dec 22 2023 Michael Vetter <mvetter@suse.com>
- Update to 0.4.1:
  * The point multiplication algorithm used for ECDH operations
    (module ecdh) was replaced with a slightly faster one.
  * Optional handwritten x86_64 assembly for field operations was
    removed because modern C compilers are able to output more efficient
    assembly. This change results in a significant speedup of some
    library functions when handwritten x86_64 assembly is enabled
    (--with-asm=x86_64 in GNU Autotools, -DSECP256K1_ASM=x86_64 in CMake),
    which is the default on x86_64. Benchmarks with GCC 10.5.0 show a
    10% speedup for secp256k1_ecdsa_verify and secp256k1_schnorrsig_verify.
* Thu Dec 07 2023 Michael Vetter <mvetter@suse.com>
- Update to 0.4.0:
  Added:
  * New module ellswift implements ElligatorSwift encoding for public
    keys and x-only Diffie-Hellman key exchange for them. ElligatorSwift
    permits representing secp256k1 public keys as 64-byte arrays which
    cannot be distinguished from uniformly random. See:
    + Header file include/secp256k1_ellswift.h which defines the new API.
    + Document doc/ellswift.md which explains the mathematical background
    of the scheme.
    + The paper on which the scheme is based.
  * We now test the library with unreleased development snapshots of GCC
    and Clang. This gives us an early chance to catch miscompilations and
    constant-time issues introduced by the compiler (such as those that
    led to the previous two releases).
  Fixed:
  * Fixed symbol visibility in Windows DLL builds, where three internal
    library symbols were wrongly exported.
  Changed:
  * When consuming libsecp256k1 as a static library on Windows, the user
    must now define the SECP256K1_STATIC macro before including secp256k1.h.
  ABI Compatibility:
  * This release is backward compatible with the ABI of 0.3.0, 0.3.1,
    and 0.3.2. Symbol visibility is now believed to be handled properly
    on supported platforms and is now considered to be part of the ABI.
- Drop Export_SHA256_functions.patch
- Drop _service file: no need with regular versioned releases
* Sun Jul 10 2022 Mark Stopka <mstopka@opensuse.org>
- Remove TODO file from %doc
* Sun Jul 10 2022 Mark Stopka <mstopka@opensuse.org>
- Bumped to the commit ac83be33d0956faf6b7f61a60ab524ef7d6a473a,
  used by cardano-node
* Sun Aug 02 2020 MichaƂ Rostecki <mrostecki@suse.com>
- Bumped to the commit dbd41db16a0e91b2566820898a3ab2d7dad4fe00,
  used by Electrum 4.0.2.
* Wed Feb 13 2019 Adam Mizerski <adam@mizerski.pl>
- spec file cleanup
- added patch Export_SHA256_functions.patch
* Tue Feb 05 2019 marec@detebe.org
- bumped to latest commit
* Mon Nov 26 2018 marec@detebe.org
- bumped to latest commit