You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- The current schnorrsig verify methods should operate on verify context
as is done throughout the bitcoin core
- Scondly, and importantly the XonlyPublicKey::from_keypair now operates
without any context objects.
let xpk = XOnlyPublicKey::from_keypair(&secp,&keypair);
401
+
let xpk = XOnlyPublicKey::from_keypair(&keypair);
397
402
assert_eq!(XOnlyPublicKey::from(pk), xpk);
398
403
}
399
404
@@ -433,13 +438,12 @@ mod tests {
433
438
0x63,0x63,0x63,0x63,
434
439
];
435
440
436
-
let s = Secp256k1::signing_only();
437
441
let sk = KeyPair::from_seckey_slice(&secp,&SK_BYTES).expect("sk");
438
442
439
443
// In fuzzing mode secret->public key derivation is different, so
440
444
// hard-code the epected result.
441
445
#[cfg(not(fuzzing))]
442
-
let pk = XOnlyPublicKey::from_keypair(&s,&sk);
446
+
let pk = XOnlyPublicKey::from_keypair(&sk);
443
447
#[cfg(fuzzing)]
444
448
let pk = XOnlyPublicKey::from_slice(&[0x18,0x84,0x57,0x81,0xf6,0x31,0xc4,0x8f,0x1c,0x97,0x09,0xe2,0x30,0x92,0x06,0x7d,0x06,0x83,0x7f,0x30,0xaa,0x0c,0xd0,0x54,0x4a,0xc8,0x87,0xfe,0x91,0xdd,0xd1,0x66]).expect("pk");
0 commit comments