--- Log opened Thu Nov 05 00:00:07 2020 02:13 < elichai2> Hi, i'm trying to use schnorrsig with bip32, and there doesn't seem a way to tweak a privkey and pubkey separately in a way that will produce the same resulting pubkey 02:13 < elichai2> What am I missing here? code example with outputs: https://bpa.st/QJ4Q 02:13 < elichai2> nickler 02:21 < elichai2> hmm so it looks like I must treat the secret key always like a keypair? that means I pay twice for every operation :/ AND I can't get the secret key back after tweaking 02:21 < elichai2> (there's no `secp256k1_keypair_seckey`) 03:52 -!- belcher_ [~belcher@unaffiliated/belcher] has joined #secp256k1 03:56 -!- belcher [~belcher@unaffiliated/belcher] has quit [Ping timeout: 264 seconds] 06:25 < elichai2> I thought about it and you have to use a keypair(because you need to keep checking the parity of the point), so all that's missing is a way to serialize the seckey back from the keypair 08:40 < ja> elichai2: can't you use secp256k1_keypair_save to get out the secret key? 08:56 < nickler> ja: keypair_save isn't public 08:57 < nickler> elichai2: I don't understand the use case exactly. Why would you want to get the seckey from a keypair exactly? However, adding a seckey getter would be fine. 09:03 < elichai2> nickler: after tweaking I might want to backup the resulting keys 09:04 < elichai2> And I can't tweak the seckey directly because then it might result in a different pubkey 09:48 -!- roconnor [~roconnor@host-192.252-162-14.dyn.295.ca] has quit [Ping timeout: 258 seconds] 09:54 -!- roconnor [~roconnor@host-192.252-162-14.dyn.295.ca] has joined #secp256k1 11:13 < nickler> I see. We can not save the result of an xonly tweak because we don't allow serializing keypairs (for good reasons). A keypair seckey getter would achieve that and it'd be harmless. 11:13 < nickler> PR welcome :) 11:29 -!- lightningbot [~supybot@2400:8901::f03c:91ff:febb:bbc1] has quit [Remote host closed the connection] 11:40 -!- lightningbot [~supybot@2400:8901::f03c:91ff:febb:bbc1] has joined #secp256k1 11:42 -!- aj [aj@cerulean.erisian.com.au] has quit [Quit: leaving] 11:43 -!- aj [aj@cerulean.erisian.com.au] has joined #secp256k1 12:45 < nickler> oh just noticing you already opened the PR 14:52 -!- belcher_ is now known as belcher 17:08 -!- luke-jr [~luke-jr@unaffiliated/luke-jr] has quit [Quit: ZNC - http://znc.sourceforge.net] 17:08 -!- luke-jr [~luke-jr@unaffiliated/luke-jr] has joined #secp256k1 18:35 -!- sanket1729_ [~sanket172@ec2-100-24-255-95.compute-1.amazonaws.com] has joined #secp256k1 18:35 -!- sanket1729 [~sanket172@ec2-100-24-255-95.compute-1.amazonaws.com] has quit [Ping timeout: 256 seconds] 19:02 -!- belcher [~belcher@unaffiliated/belcher] has quit [Ping timeout: 246 seconds] 19:15 -!- belcher [~belcher@unaffiliated/belcher] has joined #secp256k1 19:53 -!- belcher_ [~belcher@unaffiliated/belcher] has joined #secp256k1 19:53 -!- belcher [~belcher@unaffiliated/belcher] has quit [Ping timeout: 256 seconds] --- Log closed Fri Nov 06 00:00:08 2020