@@ -143,23 +143,23 @@ void test_schnorrsig_api(void) {
143
143
144
144
/** main test body **/
145
145
ecount = 0 ;
146
- CHECK (secp256k1_schnorrsig_sign (none , sig , msg , & keypairs [0 ], NULL , NULL ) == 0 );
146
+ CHECK (secp256k1_schnorrsig_sign (none , sig , msg , & keypairs [0 ], NULL ) == 0 );
147
147
CHECK (ecount == 1 );
148
- CHECK (secp256k1_schnorrsig_sign (vrfy , sig , msg , & keypairs [0 ], NULL , NULL ) == 0 );
148
+ CHECK (secp256k1_schnorrsig_sign (vrfy , sig , msg , & keypairs [0 ], NULL ) == 0 );
149
149
CHECK (ecount == 2 );
150
- CHECK (secp256k1_schnorrsig_sign (sign , sig , msg , & keypairs [0 ], NULL , NULL ) == 1 );
150
+ CHECK (secp256k1_schnorrsig_sign (sign , sig , msg , & keypairs [0 ], NULL ) == 1 );
151
151
CHECK (ecount == 2 );
152
- CHECK (secp256k1_schnorrsig_sign (sign , NULL , msg , & keypairs [0 ], NULL , NULL ) == 0 );
152
+ CHECK (secp256k1_schnorrsig_sign (sign , NULL , msg , & keypairs [0 ], NULL ) == 0 );
153
153
CHECK (ecount == 3 );
154
- CHECK (secp256k1_schnorrsig_sign (sign , sig , NULL , & keypairs [0 ], NULL , NULL ) == 0 );
154
+ CHECK (secp256k1_schnorrsig_sign (sign , sig , NULL , & keypairs [0 ], NULL ) == 0 );
155
155
CHECK (ecount == 4 );
156
- CHECK (secp256k1_schnorrsig_sign (sign , sig , msg , NULL , NULL , NULL ) == 0 );
156
+ CHECK (secp256k1_schnorrsig_sign (sign , sig , msg , NULL , NULL ) == 0 );
157
157
CHECK (ecount == 5 );
158
- CHECK (secp256k1_schnorrsig_sign (sign , sig , msg , & invalid_keypair , NULL , NULL ) == 0 );
158
+ CHECK (secp256k1_schnorrsig_sign (sign , sig , msg , & invalid_keypair , NULL ) == 0 );
159
159
CHECK (ecount == 6 );
160
160
161
161
ecount = 0 ;
162
- CHECK (secp256k1_schnorrsig_sign (sign , sig , msg , & keypairs [0 ], NULL , NULL ) == 1 );
162
+ CHECK (secp256k1_schnorrsig_sign (sign , sig , msg , & keypairs [0 ], NULL ) == 1 );
163
163
CHECK (secp256k1_schnorrsig_verify (none , sig , msg , & pk [0 ]) == 0 );
164
164
CHECK (ecount == 1 );
165
165
CHECK (secp256k1_schnorrsig_verify (sign , sig , msg , & pk [0 ]) == 0 );
@@ -201,7 +201,7 @@ void test_schnorrsig_bip_vectors_check_signing(const unsigned char *sk, const un
201
201
secp256k1_xonly_pubkey pk , pk_expected ;
202
202
203
203
CHECK (secp256k1_keypair_create (ctx , & keypair , sk ));
204
- CHECK (secp256k1_schnorrsig_sign (ctx , sig , msg , & keypair , NULL , aux_rand ));
204
+ CHECK (secp256k1_schnorrsig_sign (ctx , sig , msg , & keypair , aux_rand ));
205
205
CHECK (secp256k1_memcmp_var (sig , expected_sig , 64 ) == 0 );
206
206
207
207
CHECK (secp256k1_xonly_pubkey_parse (ctx , & pk_expected , pk_serialized ));
@@ -685,16 +685,16 @@ void test_schnorrsig_sign(void) {
685
685
686
686
secp256k1_testrand256 (sk );
687
687
CHECK (secp256k1_keypair_create (ctx , & keypair , sk ));
688
- CHECK (secp256k1_schnorrsig_sign (ctx , sig , msg , & keypair , NULL , NULL ) == 1 );
688
+ CHECK (secp256k1_schnorrsig_sign (ctx , sig , msg , & keypair , NULL ) == 1 );
689
689
690
690
/* Test different nonce functions */
691
691
memset (sig , 1 , sizeof (sig ));
692
- CHECK (secp256k1_schnorrsig_sign (ctx , sig , msg , & keypair , nonce_function_failing , NULL ) == 0 );
692
+ CHECK (secp256k1_schnorrsig_sign_custom (ctx , sig , msg , & keypair , nonce_function_failing , NULL ) == 0 );
693
693
CHECK (secp256k1_memcmp_var (sig , zeros64 , sizeof (sig )) == 0 );
694
694
memset (& sig , 1 , sizeof (sig ));
695
- CHECK (secp256k1_schnorrsig_sign (ctx , sig , msg , & keypair , nonce_function_0 , NULL ) == 0 );
695
+ CHECK (secp256k1_schnorrsig_sign_custom (ctx , sig , msg , & keypair , nonce_function_0 , NULL ) == 0 );
696
696
CHECK (secp256k1_memcmp_var (sig , zeros64 , sizeof (sig )) == 0 );
697
- CHECK (secp256k1_schnorrsig_sign (ctx , sig , msg , & keypair , nonce_function_overflowing , NULL ) == 1 );
697
+ CHECK (secp256k1_schnorrsig_sign_custom (ctx , sig , msg , & keypair , nonce_function_overflowing , NULL ) == 1 );
698
698
CHECK (secp256k1_memcmp_var (sig , zeros64 , sizeof (sig )) != 0 );
699
699
}
700
700
@@ -717,7 +717,7 @@ void test_schnorrsig_sign_verify(void) {
717
717
718
718
for (i = 0 ; i < N_SIGS ; i ++ ) {
719
719
secp256k1_testrand256 (msg [i ]);
720
- CHECK (secp256k1_schnorrsig_sign (ctx , sig [i ], msg [i ], & keypair , NULL , NULL ));
720
+ CHECK (secp256k1_schnorrsig_sign (ctx , sig [i ], msg [i ], & keypair , NULL ));
721
721
CHECK (secp256k1_schnorrsig_verify (ctx , sig [i ], msg [i ], & pk ));
722
722
}
723
723
@@ -746,13 +746,13 @@ void test_schnorrsig_sign_verify(void) {
746
746
}
747
747
748
748
/* Test overflowing s */
749
- CHECK (secp256k1_schnorrsig_sign (ctx , sig [0 ], msg [0 ], & keypair , NULL , NULL ));
749
+ CHECK (secp256k1_schnorrsig_sign (ctx , sig [0 ], msg [0 ], & keypair , NULL ));
750
750
CHECK (secp256k1_schnorrsig_verify (ctx , sig [0 ], msg [0 ], & pk ));
751
751
memset (& sig [0 ][32 ], 0xFF , 32 );
752
752
CHECK (!secp256k1_schnorrsig_verify (ctx , sig [0 ], msg [0 ], & pk ));
753
753
754
754
/* Test negative s */
755
- CHECK (secp256k1_schnorrsig_sign (ctx , sig [0 ], msg [0 ], & keypair , NULL , NULL ));
755
+ CHECK (secp256k1_schnorrsig_sign (ctx , sig [0 ], msg [0 ], & keypair , NULL ));
756
756
CHECK (secp256k1_schnorrsig_verify (ctx , sig [0 ], msg [0 ], & pk ));
757
757
secp256k1_scalar_set_b32 (& s , & sig [0 ][32 ], NULL );
758
758
secp256k1_scalar_negate (& s , & s );
@@ -785,7 +785,7 @@ void test_schnorrsig_taproot(void) {
785
785
786
786
/* Key spend */
787
787
secp256k1_testrand256 (msg );
788
- CHECK (secp256k1_schnorrsig_sign (ctx , sig , msg , & keypair , NULL , NULL ) == 1 );
788
+ CHECK (secp256k1_schnorrsig_sign (ctx , sig , msg , & keypair , NULL ) == 1 );
789
789
/* Verify key spend */
790
790
CHECK (secp256k1_xonly_pubkey_parse (ctx , & output_pk , output_pk_bytes ) == 1 );
791
791
CHECK (secp256k1_schnorrsig_verify (ctx , sig , msg , & output_pk ) == 1 );
0 commit comments