@@ -86,7 +86,6 @@ static void run_batch_schnorrsig_randomizer_gen_tests(void) {
8686static void test_schnorrsig_sign_verify_check_batch (secp256k1_batch * batch , unsigned char * sig64 , unsigned char * msg , size_t msglen , secp256k1_xonly_pubkey * pk ) {
8787 int ret ;
8888
89- CHECK (secp256k1_batch_usable (CTX , batch ));
9089 /* filling a random byte (in msg or sig) can cause the following:
9190 * 1. unparsable msg or sig - here, batch_add_schnorrsig fails and batch_verify passes
9291 * 2. invalid schnorr eqn - here, batch_verify fails and batch_add_schnorrsig passes
@@ -132,7 +131,6 @@ static void test_schnorrsig_sign_batch_verify_internal(void) {
132131 for (i = 0 ; i < N_SIGS ; i ++ ) {
133132 testrand256 (msg [i ]);
134133 CHECK (secp256k1_schnorrsig_sign32 (CTX , sig [i ], msg [i ], & keypair , NULL ));
135- CHECK (secp256k1_batch_usable (CTX , batch [0 ]));
136134 CHECK (secp256k1_batch_add_schnorrsig (CTX , batch [0 ], sig [i ], msg [i ], sizeof (msg [i ]), & pk ));
137135 }
138136 CHECK (secp256k1_batch_verify (CTX , batch [0 ]));
@@ -179,7 +177,6 @@ static void test_schnorrsig_sign_batch_verify_internal(void) {
179177
180178 /* The empty message can be signed & verified */
181179 CHECK (secp256k1_schnorrsig_sign_custom (CTX , sig [0 ], NULL , 0 , & keypair , NULL ) == 1 );
182- CHECK (secp256k1_batch_usable (CTX , batch [0 ]) == 1 );
183180 CHECK (secp256k1_batch_add_schnorrsig (CTX , batch [0 ], sig [0 ], NULL , 0 , & pk ) == 1 );
184181 CHECK (secp256k1_batch_verify (CTX , batch [0 ]) == 1 );
185182
@@ -191,12 +188,10 @@ static void test_schnorrsig_sign_batch_verify_internal(void) {
191188 testrand256 (& msg_large [i ]);
192189 }
193190 CHECK (secp256k1_schnorrsig_sign_custom (CTX , sig [0 ], msg_large , msglen , & keypair , NULL ) == 1 );
194- CHECK (secp256k1_batch_usable (CTX , batch [0 ]) == 1 );
195191 CHECK (secp256k1_batch_add_schnorrsig (CTX , batch [0 ], sig [0 ], msg_large , msglen , & pk ) == 1 );
196192 CHECK (secp256k1_batch_verify (CTX , batch [0 ]) == 1 );
197193 /* batch_add fails for a random wrong message length */
198194 msglen = (msglen + (sizeof (msg_large ) - 1 )) % sizeof (msg_large );
199- CHECK (secp256k1_batch_usable (CTX , batch_fail2 ) == 1 );
200195 CHECK (secp256k1_batch_add_schnorrsig (CTX , batch_fail2 , sig [0 ], msg_large , msglen , & pk ) == 1 );
201196 CHECK (secp256k1_batch_verify (CTX , batch_fail2 ) == 0 );
202197 }
@@ -251,17 +246,14 @@ static void test_batch_add_schnorrsig_api(void) {
251246
252247 /** NULL msg with valid signature **/
253248 CHECK (secp256k1_schnorrsig_sign_custom (CTX , nullmsg_sig , NULL , 0 , & keypair , NULL ) == 1 );
254- CHECK (secp256k1_batch_usable (CTX , batch1 ) == 1 );
255249 CHECK (secp256k1_batch_add_schnorrsig (CTX , batch1 , nullmsg_sig , NULL , 0 , & pk ) == 1 );
256250 CHECK (secp256k1_batch_verify (CTX , batch1 ) == 1 );
257251
258252 /** NULL msg with invalid signature **/
259- CHECK (secp256k1_batch_usable (CTX , batch2 ) == 1 );
260253 CHECK (secp256k1_batch_add_schnorrsig (CTX , batch2 , sig , NULL , 0 , & pk ) == 1 );
261254 CHECK (secp256k1_batch_verify (CTX , batch2 ) == 0 );
262255
263256 /** batch_add_ should ignore unusable batch object (i.e, batch->result = 0) **/
264- CHECK (secp256k1_batch_usable (CTX , batch2 ) == 0 );
265257 CHECK (secp256k1_batch_add_schnorrsig (CTX , batch2 , sig , msg , sizeof (msg ), & pk ) == 0 );
266258
267259 secp256k1_batch_destroy (CTX , batch1 );
0 commit comments