Skip to content

Commit f419fe8

Browse files
Fix getting parity from keypair in fuzzing
This also enables a test that was failung due to the parity bug.
1 parent aba2663 commit f419fe8

File tree

2 files changed

+1
-3
lines changed

2 files changed

+1
-3
lines changed

secp256k1-sys/src/lib.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1169,7 +1169,7 @@ mod fuzz_dummy {
11691169
) -> c_int {
11701170
check_context_flags(cx, 0);
11711171
if !pk_parity.is_null() {
1172-
*pk_parity = ((*keypair).0[32] == 0).into();
1172+
*pk_parity = ((*keypair).0[64] == 0).into();
11731173
}
11741174
(*pubkey).0.copy_from_slice(&(*keypair).0[32..]);
11751175
1

src/key.rs

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2180,8 +2180,6 @@ mod test {
21802180
let (want_tweaked_xonly, tweaked_kp_parity) = XOnlyPublicKey::from_keypair(&tweaked_kp);
21812181

21822182
assert_eq!(tweaked_xonly, want_tweaked_xonly);
2183-
2184-
#[cfg(not(fuzzing))]
21852183
assert_eq!(parity, tweaked_kp_parity);
21862184

21872185
assert!(xonly.tweak_add_check(&s, &tweaked_xonly, parity, tweak));

0 commit comments

Comments
 (0)