@@ -25,7 +25,6 @@ impl Verifier<SimpleSignature> for SimpleVerifier {
25
25
SimpleSignature :: Ed25519 { .. } => Err ( SignatureError :: from_source (
26
26
"support for ed25519 is not enabled" ,
27
27
) ) ,
28
-
29
28
#[ cfg( feature = "secp256k1" ) ]
30
29
SimpleSignature :: Secp256k1 {
31
30
signature,
@@ -38,7 +37,6 @@ impl Verifier<SimpleSignature> for SimpleVerifier {
38
37
SimpleSignature :: Secp256k1 { .. } => Err ( SignatureError :: from_source (
39
38
"support for secp256k1 is not enabled" ,
40
39
) ) ,
41
-
42
40
#[ cfg( feature = "secp256r1" ) ]
43
41
SimpleSignature :: Secp256r1 {
44
42
signature,
@@ -157,7 +155,6 @@ mod keypair {
157
155
. map ( crate :: ed25519:: Ed25519PrivateKey :: from_dalek)
158
156
. map ( InnerKeypair :: Ed25519 )
159
157
. map_err ( SignatureError :: from_source) ,
160
-
161
158
#[ cfg( feature = "secp256r1" ) ]
162
159
(
163
160
p256:: elliptic_curve:: ALGORITHM_OID ,
@@ -167,7 +164,6 @@ mod keypair {
167
164
. map ( crate :: secp256r1:: Secp256r1PrivateKey :: from_p256)
168
165
. map ( InnerKeypair :: Secp256r1 )
169
166
. map_err ( SignatureError :: from_source) ,
170
-
171
167
#[ cfg( feature = "secp256k1" ) ]
172
168
(
173
169
k256:: elliptic_curve:: ALGORITHM_OID ,
@@ -177,7 +173,6 @@ mod keypair {
177
173
. map ( crate :: secp256k1:: Secp256k1PrivateKey :: from_k256)
178
174
. map ( InnerKeypair :: Secp256k1 )
179
175
. map_err ( SignatureError :: from_source) ,
180
-
181
176
_ => Err ( SignatureError :: from_source (
182
177
"unsupported or invalid private key type" ,
183
178
) ) ,
@@ -338,7 +333,6 @@ mod keypair {
338
333
. map ( crate :: ed25519:: Ed25519VerifyingKey :: from_dalek)
339
334
. map ( InnerVerifyingKey :: Ed25519 )
340
335
. map_err ( SignatureError :: from_source) ,
341
-
342
336
#[ cfg( feature = "secp256r1" ) ]
343
337
(
344
338
p256:: elliptic_curve:: ALGORITHM_OID ,
@@ -348,7 +342,6 @@ mod keypair {
348
342
. map ( crate :: secp256r1:: Secp256r1VerifyingKey :: from_p256)
349
343
. map ( InnerVerifyingKey :: Secp256r1 )
350
344
. map_err ( SignatureError :: from_source) ,
351
-
352
345
#[ cfg( feature = "secp256k1" ) ]
353
346
(
354
347
k256:: elliptic_curve:: ALGORITHM_OID ,
@@ -358,7 +351,6 @@ mod keypair {
358
351
. map ( crate :: secp256k1:: Secp256k1VerifyingKey :: from_k256)
359
352
. map ( InnerVerifyingKey :: Secp256k1 )
360
353
. map_err ( SignatureError :: from_source) ,
361
-
362
354
_ => Err ( SignatureError :: from_source (
363
355
"unsupported or invalid public key type" ,
364
356
) ) ,
0 commit comments