You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- The current schnorrsig verify methods should operate on verify context
as is done throughout the bitcoin core
- The API for convinience method is now slightly awkard as it requires
both signing and verification contexts
- Finally, and importantly the XonlyPublicKey::from_keypair now operates
on Verification conetxt instead of signing.
let xpk = XOnlyPublicKey::from_keypair(&secp,&keypair);
398
+
let xpk = XOnlyPublicKey::from_keypair(&keypair);
397
399
assert_eq!(XOnlyPublicKey::from(pk), xpk);
398
400
}
399
401
@@ -433,13 +435,12 @@ mod tests {
433
435
0x63,0x63,0x63,0x63,
434
436
];
435
437
436
-
let s = Secp256k1::signing_only();
437
438
let sk = KeyPair::from_seckey_slice(&secp,&SK_BYTES).expect("sk");
438
439
439
440
// In fuzzing mode secret->public key derivation is different, so
440
441
// hard-code the epected result.
441
442
#[cfg(not(fuzzing))]
442
-
let pk = XOnlyPublicKey::from_keypair(&s,&sk);
443
+
let pk = XOnlyPublicKey::from_keypair(&sk);
443
444
#[cfg(fuzzing)]
444
445
let pk = XOnlyPublicKey::from_slice(&[0x18,0x84,0x57,0x81,0xf6,0x31,0xc4,0x8f,0x1c,0x97,0x09,0xe2,0x30,0x92,0x06,0x7d,0x06,0x83,0x7f,0x30,0xaa,0x0c,0xd0,0x54,0x4a,0xc8,0x87,0xfe,0x91,0xdd,0xd1,0x66]).expect("pk");
0 commit comments