Migrate internal module imports to unified package path.

Replaced legacy `*.orly` module imports with `next.orly.dev/pkg` paths across the codebase for consistency. Removed legacy `go.mod` files from sub-packages, consolidating dependency management. Added Dockerfiles and configurations for benchmarking environments.
This commit is contained in:
2025-09-12 16:12:31 +01:00
parent 2dd119401b
commit 110223fc4e
236 changed files with 4098 additions and 1253 deletions

View File

@@ -8,8 +8,8 @@ import (
"encoding/hex"
"testing"
"crypto.orly/ec/base58"
"utils.orly"
"next.orly.dev/pkg/crypto/ec/base58"
"next.orly.dev/pkg/utils"
)
var stringTests = []struct {

View File

@@ -8,7 +8,7 @@ import (
"bytes"
"testing"
"crypto.orly/ec/base58"
"next.orly.dev/pkg/crypto/ec/base58"
)
var (

View File

@@ -7,7 +7,7 @@ package base58
import (
"errors"
"crypto.orly/sha256"
"next.orly.dev/pkg/crypto/sha256"
)
// ErrChecksum indicates that the checksum of a check-encoded string does not verify against

View File

@@ -7,7 +7,7 @@ package base58_test
import (
"testing"
"crypto.orly/ec/base58"
"next.orly.dev/pkg/crypto/ec/base58"
)
var checkEncodingStringTests = []struct {

View File

@@ -7,7 +7,7 @@ package base58_test
import (
"fmt"
"crypto.orly/ec/base58"
"next.orly.dev/pkg/crypto/ec/base58"
)
// This example demonstrates how to decode modified base58 encoded data.

View File

@@ -13,7 +13,7 @@ import (
"strings"
"testing"
"utils.orly"
"next.orly.dev/pkg/utils"
)
// TestBech32 tests whether decoding and re-encoding the valid BIP-173 test

View File

@@ -8,8 +8,8 @@ import (
"math/big"
"testing"
"crypto.orly/ec/secp256k1"
"encoders.orly/hex"
"next.orly.dev/pkg/crypto/ec/secp256k1"
"next.orly.dev/pkg/encoders/hex"
)
// setHex decodes the passed big-endian hex string into the internal field value

View File

@@ -20,7 +20,7 @@ package btcec
// reverse the transform than to operate in affine coordinates.
import (
"crypto.orly/ec/secp256k1"
"next.orly.dev/pkg/crypto/ec/secp256k1"
)
// KoblitzCurve provides an implementation for secp256k1 that fits the ECC

View File

@@ -4,7 +4,7 @@ import (
"fmt"
"time"
"crypto.orly/ec/wire"
"next.orly.dev/pkg/crypto/ec/wire"
)
var (

View File

@@ -3,8 +3,8 @@ package chaincfg
import (
"time"
"crypto.orly/ec/chainhash"
"crypto.orly/ec/wire"
"next.orly.dev/pkg/crypto/ec/chainhash"
"next.orly.dev/pkg/crypto/ec/wire"
)
var (

View File

@@ -5,8 +5,8 @@ import (
"math/big"
"time"
"crypto.orly/ec/chainhash"
"crypto.orly/ec/wire"
"next.orly.dev/pkg/crypto/ec/chainhash"
"next.orly.dev/pkg/crypto/ec/wire"
)
var (

View File

@@ -9,8 +9,8 @@ import (
"encoding/json"
"fmt"
"crypto.orly/sha256"
"encoders.orly/hex"
"next.orly.dev/pkg/crypto/sha256"
"next.orly.dev/pkg/encoders/hex"
)
const (

View File

@@ -7,7 +7,7 @@ package chainhash
import (
"testing"
"utils.orly"
"next.orly.dev/pkg/utils"
)
// mainNetGenesisHash is the hash of the first block in the block chain for the

View File

@@ -6,7 +6,7 @@
package chainhash
import (
"crypto.orly/sha256"
"next.orly.dev/pkg/crypto/sha256"
)
// HashB calculates hash(b) and returns the resulting bytes.

View File

@@ -5,7 +5,7 @@
package btcec
import (
"crypto.orly/ec/secp256k1"
"next.orly.dev/pkg/crypto/ec/secp256k1"
)
// GenerateSharedSecret generates a shared secret based on a secret key and a

View File

@@ -7,7 +7,7 @@ package btcec
import (
"testing"
"utils.orly"
"next.orly.dev/pkg/utils"
)
func TestGenerateSharedSecret(t *testing.T) {

View File

@@ -6,7 +6,7 @@ package btcec
import (
"fmt"
"crypto.orly/ec/secp256k1"
"next.orly.dev/pkg/crypto/ec/secp256k1"
)
// JacobianPoint is an element of the group formed by the secp256k1 curve in

View File

@@ -8,8 +8,8 @@ package ecdsa
import (
"testing"
"crypto.orly/ec/secp256k1"
"encoders.orly/hex"
"next.orly.dev/pkg/crypto/ec/secp256k1"
"next.orly.dev/pkg/encoders/hex"
)
// hexToModNScalar converts the passed hex string into a ModNScalar and will

View File

@@ -8,7 +8,7 @@ package ecdsa
import (
"fmt"
"crypto.orly/ec/secp256k1"
"next.orly.dev/pkg/crypto/ec/secp256k1"
)
// References:

View File

@@ -14,10 +14,10 @@ import (
"testing"
"time"
"crypto.orly/ec/secp256k1"
"encoders.orly/hex"
"lol.mleku.dev/chk"
"utils.orly"
"next.orly.dev/pkg/crypto/ec/secp256k1"
"next.orly.dev/pkg/encoders/hex"
"next.orly.dev/pkg/utils"
)
// hexToBytes converts the passed hex string into bytes and will panic if there

View File

@@ -4,7 +4,7 @@
package btcec
import (
"crypto.orly/ec/secp256k1"
"next.orly.dev/pkg/crypto/ec/secp256k1"
)
// Error identifies an error related to public key cryptography using a

View File

@@ -1,7 +1,7 @@
package btcec
import (
"crypto.orly/ec/secp256k1"
"next.orly.dev/pkg/crypto/ec/secp256k1"
)
// FieldVal implements optimized fixed-precision arithmetic over the secp256k1

View File

@@ -9,8 +9,8 @@ import (
"math/rand"
"testing"
"encoders.orly/hex"
"lol.mleku.dev/chk"
"next.orly.dev/pkg/encoders/hex"
)
// TestIsZero ensures that checking if a field IsZero works as expected.

View File

@@ -11,7 +11,7 @@ package btcec
import (
"testing"
"encoders.orly/hex"
"next.orly.dev/pkg/encoders/hex"
)
func FuzzParsePubKey(f *testing.F) {

View File

@@ -4,7 +4,7 @@
package btcec
import (
"crypto.orly/ec/secp256k1"
"next.orly.dev/pkg/crypto/ec/secp256k1"
)
// ModNScalar implements optimized 256-bit constant-time fixed-precision

View File

@@ -8,9 +8,9 @@ import (
"fmt"
"testing"
"crypto.orly/ec"
"crypto.orly/ec/schnorr"
"encoders.orly/hex"
"next.orly.dev/pkg/crypto/ec"
"next.orly.dev/pkg/crypto/ec/schnorr"
"next.orly.dev/pkg/encoders/hex"
)
var (

View File

@@ -5,9 +5,9 @@ package musig2
import (
"fmt"
"crypto.orly/ec"
"crypto.orly/ec/schnorr"
"lol.mleku.dev/chk"
"next.orly.dev/pkg/crypto/ec"
"next.orly.dev/pkg/crypto/ec/schnorr"
)
var (

View File

@@ -7,12 +7,12 @@ import (
"fmt"
"sort"
"utils.orly"
"next.orly.dev/pkg/utils"
"crypto.orly/ec"
"crypto.orly/ec/chainhash"
"crypto.orly/ec/schnorr"
"crypto.orly/ec/secp256k1"
"next.orly.dev/pkg/crypto/ec"
"next.orly.dev/pkg/crypto/ec/chainhash"
"next.orly.dev/pkg/crypto/ec/schnorr"
"next.orly.dev/pkg/crypto/ec/secp256k1"
)
var (

View File

@@ -10,10 +10,10 @@ import (
"strings"
"testing"
"crypto.orly/ec"
"crypto.orly/ec/schnorr"
"crypto.orly/ec/secp256k1"
"encoders.orly/hex"
"next.orly.dev/pkg/crypto/ec"
"next.orly.dev/pkg/crypto/ec/schnorr"
"next.orly.dev/pkg/crypto/ec/secp256k1"
"next.orly.dev/pkg/encoders/hex"
"github.com/stretchr/testify/require"
)

View File

@@ -8,9 +8,9 @@ import (
"sync"
"testing"
"crypto.orly/ec"
"crypto.orly/sha256"
"encoders.orly/hex"
"next.orly.dev/pkg/crypto/ec"
"next.orly.dev/pkg/crypto/sha256"
"next.orly.dev/pkg/encoders/hex"
)
const (

View File

@@ -9,10 +9,10 @@ import (
"errors"
"io"
"crypto.orly/ec"
"crypto.orly/ec/chainhash"
"crypto.orly/ec/schnorr"
"lol.mleku.dev/chk"
"next.orly.dev/pkg/crypto/ec"
"next.orly.dev/pkg/crypto/ec/chainhash"
"next.orly.dev/pkg/crypto/ec/schnorr"
)
const (

View File

@@ -9,9 +9,9 @@ import (
"path"
"testing"
"encoders.orly/hex"
"github.com/stretchr/testify/require"
"utils.orly"
"next.orly.dev/pkg/encoders/hex"
"next.orly.dev/pkg/utils"
)
type nonceGenTestCase struct {

View File

@@ -7,12 +7,12 @@ import (
"fmt"
"io"
"crypto.orly/ec"
"crypto.orly/ec/chainhash"
"crypto.orly/ec/schnorr"
"crypto.orly/ec/secp256k1"
"lol.mleku.dev/chk"
"utils.orly"
"next.orly.dev/pkg/crypto/ec"
"next.orly.dev/pkg/crypto/ec/chainhash"
"next.orly.dev/pkg/crypto/ec/schnorr"
"next.orly.dev/pkg/crypto/ec/secp256k1"
"next.orly.dev/pkg/utils"
)
var (

View File

@@ -11,10 +11,10 @@ import (
"strings"
"testing"
"crypto.orly/ec"
"crypto.orly/ec/secp256k1"
"encoders.orly/hex"
"github.com/stretchr/testify/require"
"next.orly.dev/pkg/crypto/ec"
"next.orly.dev/pkg/crypto/ec/secp256k1"
"next.orly.dev/pkg/encoders/hex"
)
const (

View File

@@ -5,7 +5,7 @@
package btcec
import (
"crypto.orly/ec/secp256k1"
"next.orly.dev/pkg/crypto/ec/secp256k1"
)
// These constants define the lengths of serialized public keys.

View File

@@ -7,7 +7,7 @@ package btcec
import (
"testing"
"utils.orly"
"next.orly.dev/pkg/utils"
"github.com/davecgh/go-spew/spew"
)

View File

@@ -9,10 +9,10 @@ import (
"math/big"
"testing"
"crypto.orly/ec"
"crypto.orly/ec/secp256k1"
"crypto.orly/sha256"
"encoders.orly/hex"
"next.orly.dev/pkg/crypto/ec"
"next.orly.dev/pkg/crypto/ec/secp256k1"
"next.orly.dev/pkg/crypto/sha256"
"next.orly.dev/pkg/encoders/hex"
)
// hexToBytes converts the passed hex string into bytes and will panic if there

View File

@@ -8,8 +8,8 @@ package schnorr
import (
"fmt"
"crypto.orly/ec"
"crypto.orly/ec/secp256k1"
"next.orly.dev/pkg/crypto/ec"
"next.orly.dev/pkg/crypto/ec/secp256k1"
)
// These constants define the lengths of serialized public keys.

View File

@@ -5,10 +5,10 @@ package schnorr
import (
"fmt"
"crypto.orly/ec"
"crypto.orly/ec/chainhash"
"crypto.orly/ec/secp256k1"
"lol.mleku.dev/chk"
"next.orly.dev/pkg/crypto/ec"
"next.orly.dev/pkg/crypto/ec/chainhash"
"next.orly.dev/pkg/crypto/ec/secp256k1"
)
const (

View File

@@ -11,10 +11,10 @@ import (
"testing"
"testing/quick"
"crypto.orly/ec"
"crypto.orly/ec/secp256k1"
"encoders.orly/hex"
"lol.mleku.dev/chk"
"next.orly.dev/pkg/crypto/ec"
"next.orly.dev/pkg/crypto/ec/secp256k1"
"next.orly.dev/pkg/encoders/hex"
"github.com/davecgh/go-spew/spew"
)

View File

@@ -5,7 +5,7 @@
package btcec
import (
"crypto.orly/ec/secp256k1"
"next.orly.dev/pkg/crypto/ec/secp256k1"
)
// SecretKey wraps an ecdsa.SecretKey as a convenience mainly for signing things with the secret key without having to

View File

@@ -8,7 +8,7 @@ package secp256k1
import (
"math/bits"
"encoders.orly/hex"
"next.orly.dev/pkg/encoders/hex"
)
// References:

View File

@@ -8,7 +8,7 @@ package secp256k1
import (
"testing"
"utils.orly"
"next.orly.dev/pkg/utils"
)
func TestGenerateSharedSecret(t *testing.T) {

View File

@@ -11,9 +11,9 @@ import (
"encoding/binary"
"fmt"
"crypto.orly/ec/secp256k1"
"crypto.orly/sha256"
"encoders.orly/hex"
"next.orly.dev/pkg/crypto/ec/secp256k1"
"next.orly.dev/pkg/crypto/sha256"
"next.orly.dev/pkg/encoders/hex"
)
// This example demonstrates use of GenerateSharedSecret to encrypt a message

View File

@@ -52,7 +52,7 @@ package secp256k1
// ordinarily would. See the documentation for FieldVal for more details.
import (
"encoders.orly/hex"
"next.orly.dev/pkg/encoders/hex"
)
// Constants used to make the code more readable.

View File

@@ -14,9 +14,9 @@ import (
"testing"
"time"
"encoders.orly/hex"
"lol.mleku.dev/chk"
"utils.orly"
"next.orly.dev/pkg/encoders/hex"
"next.orly.dev/pkg/utils"
)
// SetHex decodes the passed big-endian hex string into the internal field value

View File

@@ -7,7 +7,7 @@ package secp256k1
import (
"math/big"
"encoders.orly/hex"
"next.orly.dev/pkg/encoders/hex"
)
// References:

View File

@@ -12,9 +12,9 @@ import (
"testing"
"time"
"encoders.orly/hex"
"lol.mleku.dev/chk"
"utils.orly"
"next.orly.dev/pkg/encoders/hex"
"next.orly.dev/pkg/utils"
)
// SetHex interprets the provided hex string as a 256-bit big-endian unsigned

View File

@@ -9,7 +9,7 @@ import (
"bytes"
"hash"
"crypto.orly/sha256"
"next.orly.dev/pkg/crypto/sha256"
)
// References:

View File

@@ -8,9 +8,9 @@ package secp256k1
import (
"testing"
"crypto.orly/sha256"
"encoders.orly/hex"
"utils.orly"
"next.orly.dev/pkg/crypto/sha256"
"next.orly.dev/pkg/encoders/hex"
"next.orly.dev/pkg/utils"
)
// hexToBytes converts the passed hex string into bytes and will panic if there

View File

@@ -13,9 +13,9 @@ import (
"math/big"
"os"
"crypto.orly/ec/secp256k1"
"lol.mleku.dev/chk"
"lol.mleku.dev/log"
"next.orly.dev/pkg/crypto/ec/secp256k1"
)
// curveParams houses the secp256k1 curve parameters for convenient access.

View File

@@ -9,7 +9,7 @@ import (
"errors"
"testing"
"utils.orly"
"next.orly.dev/pkg/utils"
)
// TestParsePubKey ensures that public keys are properly parsed according

View File

@@ -12,7 +12,7 @@ import (
"math/big"
"testing"
"utils.orly"
"next.orly.dev/pkg/utils"
)
// TestGenerateSecretKey ensures the key generation works as expected.

View File

@@ -7,10 +7,10 @@ import (
"errors"
"fmt"
"crypto.orly/ec/bech32"
"crypto.orly/ec/chaincfg"
"lol.mleku.dev/chk"
"utils.orly"
"next.orly.dev/pkg/crypto/ec/bech32"
"next.orly.dev/pkg/crypto/ec/chaincfg"
"next.orly.dev/pkg/utils"
)
// AddressSegWit is the base address type for all SegWit addresses.

View File

@@ -3,7 +3,7 @@ package wire
import (
"time"
"crypto.orly/ec/chainhash"
"next.orly.dev/pkg/crypto/ec/chainhash"
)
// BlockHeader defines information about a block and is used in the bitcoin

View File

@@ -1,7 +1,7 @@
package wire
import (
"crypto.orly/ec/chainhash"
"next.orly.dev/pkg/crypto/ec/chainhash"
)
// OutPoint defines a bitcoin data type that is used to track previous