aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorfanquake <fanquake@gmail.com>2022-03-29 15:51:46 +0100
committerfanquake <fanquake@gmail.com>2022-04-07 22:24:44 +0100
commit404c53062bb80853d5967187bdb7b5f7e749de7f (patch)
tree7efc2ad55caed5a44935b103dbaae5650f82a955
parentee30bf7c01922938bcf861a57cdf2249edb36256 (diff)
key: use secp256k1_schnorrsig_sign32 over deprecated secp256k1_schnorrsig_sign
The renaming occured in https://github.com/bitcoin-core/secp256k1/pull/1089.
-rw-r--r--src/key.cpp2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/key.cpp b/src/key.cpp
index 354bd097ce..a54569b39e 100644
--- a/src/key.cpp
+++ b/src/key.cpp
@@ -288,7 +288,7 @@ bool CKey::SignSchnorr(const uint256& hash, Span<unsigned char> sig, const uint2
uint256 tweak = XOnlyPubKey(pubkey_bytes).ComputeTapTweakHash(merkle_root->IsNull() ? nullptr : merkle_root);
if (!secp256k1_keypair_xonly_tweak_add(GetVerifyContext(), &keypair, tweak.data())) return false;
}
- bool ret = secp256k1_schnorrsig_sign(secp256k1_context_sign, sig.data(), hash.data(), &keypair, aux.data());
+ bool ret = secp256k1_schnorrsig_sign32(secp256k1_context_sign, sig.data(), hash.data(), &keypair, aux.data());
if (ret) {
// Additional verification step to prevent using a potentially corrupted signature
secp256k1_xonly_pubkey pubkey_verify;