aboutsummaryrefslogtreecommitdiff
path: root/src/key.cpp
diff options
context:
space:
mode:
authorPieter Wuille <pieter@wuille.net>2021-10-28 13:55:47 -0400
committerPieter Wuille <pieter@wuille.net>2021-12-15 09:20:26 -0500
commit314195c8be3bd7db0d5817c4fb3aa85c84363ce9 (patch)
treed118a8630cdd197c84fb563b3f7c06c355e03d9c /src/key.cpp
parenta1f76cdb22e3278a48d63dd23c1fe3308daedd8c (diff)
Remove unnecessary cast in CKey::SignSchnorr
Diffstat (limited to 'src/key.cpp')
-rw-r--r--src/key.cpp2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/key.cpp b/src/key.cpp
index 86081b3464..bf4dd49bb9 100644
--- a/src/key.cpp
+++ b/src/key.cpp
@@ -288,7 +288,7 @@ bool CKey::SignSchnorr(const uint256& hash, Span<unsigned char> sig, const uint2
uint256 tweak = XOnlyPubKey(pubkey_bytes).ComputeTapTweakHash(merkle_root->IsNull() ? nullptr : merkle_root);
if (!secp256k1_keypair_xonly_tweak_add(GetVerifyContext(), &keypair, tweak.data())) return false;
}
- bool ret = secp256k1_schnorrsig_sign(secp256k1_context_sign, sig.data(), hash.data(), &keypair, (unsigned char*)aux.data());
+ bool ret = secp256k1_schnorrsig_sign(secp256k1_context_sign, sig.data(), hash.data(), &keypair, aux.data());
if (ret) {
// Additional verification step to prevent using a potentially corrupted signature
secp256k1_xonly_pubkey pubkey_verify;