aboutsummaryrefslogtreecommitdiff
path: root/src/key.cpp
diff options
context:
space:
mode:
authorPieter Wuille <pieter.wuille@gmail.com>2014-11-05 10:53:59 -0800
committerPieter Wuille <pieter.wuille@gmail.com>2014-11-10 05:03:24 -0800
commitf4e0aefadcc9f37611a6d5a13e3f7b4b9a37bf76 (patch)
tree2850672169ed04c051d3d70f65b3d29aadfc8027 /src/key.cpp
parent5406f61373fe93326ab1f546e4da9f4528236cc7 (diff)
downloadbitcoin-f4e0aefadcc9f37611a6d5a13e3f7b4b9a37bf76.tar.xz
Do signature-s negation inside the tests
To avoid the need for libsecp256k1 to expose such functionality.
Diffstat (limited to 'src/key.cpp')
-rw-r--r--src/key.cpp4
1 files changed, 2 insertions, 2 deletions
diff --git a/src/key.cpp b/src/key.cpp
index 1b539d073a..0ca9a681a3 100644
--- a/src/key.cpp
+++ b/src/key.cpp
@@ -102,7 +102,7 @@ CPubKey CKey::GetPubKey() const {
return result;
}
-bool CKey::Sign(const uint256 &hash, std::vector<unsigned char>& vchSig, bool lowS) const {
+bool CKey::Sign(const uint256 &hash, std::vector<unsigned char>& vchSig) const {
if (!fValid)
return false;
#ifdef USE_SECP256K1
@@ -119,7 +119,7 @@ bool CKey::Sign(const uint256 &hash, std::vector<unsigned char>& vchSig, bool lo
#else
CECKey key;
key.SetSecretBytes(vch);
- return key.Sign(hash, vchSig, lowS);
+ return key.Sign(hash, vchSig);
#endif
}