@@ -1318,7 +1318,6 @@ def sign_deterministic(
13181318 hashfunc = None ,
13191319 sigencode = sigencode_string ,
13201320 extra_entropy = b"" ,
1321- accelerate = False ,
13221321 ):
13231322 """
13241323 Create signature over data.
@@ -1355,10 +1354,6 @@ def sign_deterministic(
13551354 number generator used in the RFC6979 process. Entirely optional.
13561355 Ignored with EdDSA.
13571356 :type extra_entropy: :term:`bytes-like object`
1358- :param accelerate: an indicator for ECDSA sign operation to return
1359- an ECPoint instead of a number of "r" parameter.
1360- Applicable only for ECDSA key.
1361- :type accelerate: boolean
13621357
13631358 :return: encoded signature over `data`
13641359 :rtype: bytes or sigencode function dependent type
@@ -1378,7 +1373,6 @@ def sign_deterministic(
13781373 sigencode = sigencode ,
13791374 extra_entropy = extra_entropy ,
13801375 allow_truncate = True ,
1381- accelerate = accelerate ,
13821376 )
13831377
13841378 def sign_digest_deterministic (
@@ -1388,7 +1382,6 @@ def sign_digest_deterministic(
13881382 sigencode = sigencode_string ,
13891383 extra_entropy = b"" ,
13901384 allow_truncate = False ,
1391- accelerate = False ,
13921385 ):
13931386 """
13941387 Create signature for digest using the deterministic RFC6979 algorithm.
@@ -1424,10 +1417,6 @@ def sign_digest_deterministic(
14241417 bigger bit-size than the order of the curve, the extra bits (at
14251418 the end of the digest) will be truncated. Use it when signing
14261419 SHA-384 output using NIST256p or in similar situations.
1427- :param accelerate: an indicator for ECDSA sign operation to return
1428- an ECPoint instead of a number of "r" parameter.
1429- Applicable only for ECDSA key.
1430- :type accelerate: boolean
14311420
14321421 :return: encoded signature for the `digest` hash
14331422 :rtype: bytes or sigencode function dependent type
@@ -1458,7 +1447,6 @@ def simple_r_s(r, s, order):
14581447 sigencode = simple_r_s ,
14591448 k = k ,
14601449 allow_truncate = allow_truncate ,
1461- accelerate = accelerate ,
14621450 )
14631451 break
14641452 except RSZeroError :
@@ -1474,7 +1462,6 @@ def sign(
14741462 sigencode = sigencode_string ,
14751463 k = None ,
14761464 allow_truncate = True ,
1477- accelerate = False ,
14781465 ):
14791466 """
14801467 Create signature over data.
@@ -1538,10 +1525,6 @@ def sign(
15381525 leak the key. Caller should try a better entropy source, retry with
15391526 different ``k``, or use the
15401527 :func:`~SigningKey.sign_deterministic` in such case.
1541- :param accelerate: an indicator for ECDSA sign operation to return
1542- an ECPoint instead of a number of "r" parameter.
1543- Applicable only for ECDSA key.
1544- :type accelerate: boolean
15451528
15461529 :return: encoded signature of the hash of `data`
15471530 :rtype: bytes or sigencode function dependent type
@@ -1551,9 +1534,7 @@ def sign(
15511534 if isinstance (self .curve .curve , CurveEdTw ):
15521535 return self .sign_deterministic (data )
15531536 h = hashfunc (data ).digest ()
1554- return self .sign_digest (
1555- h , entropy , sigencode , k , allow_truncate , accelerate
1556- )
1537+ return self .sign_digest (h , entropy , sigencode , k , allow_truncate )
15571538
15581539 def sign_digest (
15591540 self ,
@@ -1562,7 +1543,6 @@ def sign_digest(
15621543 sigencode = sigencode_string ,
15631544 k = None ,
15641545 allow_truncate = False ,
1565- accelerate = False ,
15661546 ):
15671547 """
15681548 Create signature over digest using the probabilistic ECDSA algorithm.
@@ -1599,10 +1579,6 @@ def sign_digest(
15991579 leak the key. Caller should try a better entropy source, retry with
16001580 different 'k', or use the
16011581 :func:`~SigningKey.sign_digest_deterministic` in such case.
1602- :param accelerate: an indicator for ECDSA sign operation to return
1603- an ECPoint instead of a number of "r" parameter.
1604- Applicable only for ECDSA key.
1605- :type accelerate: boolean
16061582
16071583 :return: encoded signature for the `digest` hash
16081584 :rtype: bytes or sigencode function dependent type
@@ -1615,10 +1591,10 @@ def sign_digest(
16151591 self .curve ,
16161592 allow_truncate ,
16171593 )
1618- r , s = self .sign_number (number , entropy , k , accelerate )
1594+ r , s = self .sign_number (number , entropy , k )
16191595 return sigencode (r , s , self .privkey .order )
16201596
1621- def sign_number (self , number , entropy = None , k = None , accelerate = False ):
1597+ def sign_number (self , number , entropy = None , k = None ):
16221598 """
16231599 Sign an integer directly.
16241600
@@ -1637,10 +1613,6 @@ def sign_number(self, number, entropy=None, k=None, accelerate=False):
16371613 leak the key. Caller should try a better entropy source, retry with
16381614 different 'k', or use the
16391615 :func:`~SigningKey.sign_digest_deterministic` in such case.
1640- :param accelerate: an indicator for ECDSA sign operation to return
1641- an ECPoint instead of a number of "r" parameter.
1642- Applicable only for ECDSA key.
1643- :type accelerate: boolean
16441616
16451617 :return: the "r" and "s" parameters of the signature
16461618 :rtype: tuple of ints
@@ -1655,5 +1627,5 @@ def sign_number(self, number, entropy=None, k=None, accelerate=False):
16551627 _k = randrange (order , entropy )
16561628
16571629 assert 1 <= _k < order
1658- sig = self .privkey .sign (number , _k , accelerate )
1630+ sig = self .privkey .sign (number , _k )
16591631 return sig .r , sig .s
0 commit comments