You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Merge #342: Change context objects for verification methods
21aa914 Change context objects for schnorr sig methods (sanket1729)
Pull request description:
- The current schnorrsig verify methods should operate on verify context
as is done throughout the bitcoin core
- Finally, and importantly the XonlyPublicKey::from_keypair now operates
without any context parameter.
ACKs for top commit:
apoelstra:
ACK 21aa914
Tree-SHA512: 035338f19839805a080eb262ae7b93ab187dabb63086c8b7f6015f3a6006986604dc2c6f329a99a20ddfa78c1ee518f44cd5eee2f73810fbdc83ff8df7d12506
let xpk = XOnlyPublicKey::from_keypair(&secp,&keypair);
401
+
let xpk = XOnlyPublicKey::from_keypair(&keypair);
397
402
assert_eq!(XOnlyPublicKey::from(pk), xpk);
398
403
}
399
404
@@ -433,13 +438,12 @@ mod tests {
433
438
0x63,0x63,0x63,0x63,
434
439
];
435
440
436
-
let s = Secp256k1::signing_only();
437
441
let sk = KeyPair::from_seckey_slice(&secp,&SK_BYTES).expect("sk");
438
442
439
443
// In fuzzing mode secret->public key derivation is different, so
440
444
// hard-code the epected result.
441
445
#[cfg(not(fuzzing))]
442
-
let pk = XOnlyPublicKey::from_keypair(&s,&sk);
446
+
let pk = XOnlyPublicKey::from_keypair(&sk);
443
447
#[cfg(fuzzing)]
444
448
let pk = XOnlyPublicKey::from_slice(&[0x18,0x84,0x57,0x81,0xf6,0x31,0xc4,0x8f,0x1c,0x97,0x09,0xe2,0x30,0x92,0x06,0x7d,0x06,0x83,0x7f,0x30,0xaa,0x0c,0xd0,0x54,0x4a,0xc8,0x87,0xfe,0x91,0xdd,0xd1,0x66]).expect("pk");
0 commit comments