--- Log opened Wed Apr 07 00:00:18 2021 00:07 -!- kiltzman [~k1ltzman@195.189.99.96] has quit [Ping timeout: 240 seconds] 00:08 -!- kiltzman [~k1ltzman@195.189.99.96] has joined #secp256k1 01:50 -!- elichai2 [sid212594@gateway/web/irccloud.com/x-jfgygubnaewcijny] has quit [Ping timeout: 248 seconds] 01:51 -!- dkrm [~dkrm@2001:41d0:8:3f7b::1] has quit [Ping timeout: 248 seconds] 01:52 -!- elichai2 [sid212594@gateway/web/irccloud.com/x-ezuxkekmentqtzba] has joined #secp256k1 01:53 -!- dkrm [~dkrm@2001:41d0:8:3f7b::1] has joined #secp256k1 02:37 -!- midnight [~midnight@unaffiliated/midnightmagic] has quit [Ping timeout: 252 seconds] 02:40 -!- midnight [~midnight@unaffiliated/midnightmagic] has joined #secp256k1 04:44 -!- belcher_ is now known as belcher 07:11 -!- sipa [~pw@gateway/tor-sasl/sipa1024] has quit [Remote host closed the connection] 07:16 -!- sipa [~pw@gateway/tor-sasl/sipa1024] has joined #secp256k1 07:38 < elichai2> sipa: do you want test vectors for BIP32 on X only pubkeys? 07:45 < sipa> elichai2: i don't think there is a need for that 07:45 < sipa> bip32 operates on full keys; they're converted to xonly in the last step 07:47 < elichai2> So you're saying they should use secp256k1_pubkey and only convert to XOnly at the end? wouldn't full separation between schnorr and ecdsa keys be preferable?(also, so what's the use case for the xonly pubkey tweak functions?) 07:51 < sipa> absolutely not 07:52 < sipa> being able to reuse all key generation functionality is a goal 07:52 < sipa> otherwise i'm sure it won't be adopted at all 07:52 < sipa> except in niche situations 07:52 < sipa> the xonly tweak functions are needed for taproot sign/verify on the key path 08:04 < elichai2> I guess you're right. it still feels like best practice would be full separation but I guess it doesn't do anything if no one will adopt it, so adoption is preferable over theoretical non-existing attacks or nonce collisions (especially with the domain separation it should never happen) 08:07 < sipa> there was some discussion on the ML about that a while ago 08:09 < sipa> https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-February/018384.html 08:13 -!- sipa [~pw@gateway/tor-sasl/sipa1024] has quit [Ping timeout: 240 seconds] 08:14 -!- sipa_ [~pw@gateway/tor-sasl/sipa1024] has joined #secp256k1 08:15 < elichai2> +1 08:22 -!- fjahr [sid374480@gateway/web/irccloud.com/x-ilpsykelulslvhrl] has quit [Ping timeout: 260 seconds] 08:22 -!- digi_james [sid281632@gateway/web/irccloud.com/x-qyguvkvdfjgkmxpb] has quit [Ping timeout: 260 seconds] 08:24 -!- zmanian_ [sid113594@gateway/web/irccloud.com/x-dolesdnqjefvrwnh] has quit [Ping timeout: 240 seconds] 08:24 -!- fjahr [sid374480@gateway/web/irccloud.com/x-bvvkqfeiyvkgcmqm] has joined #secp256k1 08:25 -!- digi_james [sid281632@gateway/web/irccloud.com/x-gjrjamphazsicukr] has joined #secp256k1 08:26 -!- zmanian_ [sid113594@gateway/web/irccloud.com/x-qvixygkunqewbdrw] has joined #secp256k1 11:39 -!- sipa_ [~pw@gateway/tor-sasl/sipa1024] has quit [Quit: Lost terminal] 11:50 -!- sipa [~pw@gateway/tor-sasl/sipa1024] has joined #secp256k1 11:53 -!- belcher is now known as belcher_ 12:09 -!- belcher_ [~belcher@unaffiliated/belcher] has quit [Quit: Leaving] 12:31 -!- kiltzman [~k1ltzman@195.189.99.96] has quit [Ping timeout: 265 seconds] 12:36 -!- kiltzman [~k1ltzman@5.206.224.243] has joined #secp256k1 15:59 -!- belcher [~belcher@unaffiliated/belcher] has joined #secp256k1 16:28 -!- deusexbeer [~deusexbee@080-250-076-051-dynamic-pool-adsl.wbt.ru] has quit [Read error: Connection reset by peer] 16:30 -!- deusexbeer [~deusexbee@080-250-076-051-dynamic-pool-adsl.wbt.ru] has joined #secp256k1 20:21 -!- belcher_ [~belcher@unaffiliated/belcher] has joined #secp256k1 20:25 -!- belcher [~belcher@unaffiliated/belcher] has quit [Ping timeout: 248 seconds] --- Log closed Thu Apr 08 00:00:19 2021