We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 4beae32 commit 5e8b836Copy full SHA for 5e8b836
src/lib.rs
@@ -650,10 +650,9 @@ mod tests {
650
#[ignore] // Panicking from C may trap (SIGILL) intentionally, so we test this manually.
651
#[cfg(any(feature = "alloc", feature = "std"))]
652
fn test_panic_raw_ctx_should_terminate_abnormally() {
653
- let ctx_vrfy = Secp256k1::verification_only();
654
- let raw_ctx_verify_as_full = unsafe {Secp256k1::from_raw_all(ctx_vrfy.ctx)};
655
- // Generating a key pair in verify context will panic (ARG_CHECK).
656
- raw_ctx_verify_as_full.generate_keypair(&mut thread_rng());
+ // Trying to use an all-zeros public key should cause an ARG_CHECK to trigger.
+ let pk = PublicKey::from(unsafe { ffi::PublicKey::new() });
+ pk.serialize();
657
}
658
659
#[test]
0 commit comments