diff options
author | Pieter Wuille <pieter@wuille.net> | 2021-10-28 13:55:47 -0400 |
---|---|---|
committer | Pieter Wuille <pieter@wuille.net> | 2021-12-15 09:20:26 -0500 |
commit | 314195c8be3bd7db0d5817c4fb3aa85c84363ce9 (patch) | |
tree | d118a8630cdd197c84fb563b3f7c06c355e03d9c /src/key.cpp | |
parent | a1f76cdb22e3278a48d63dd23c1fe3308daedd8c (diff) |
Remove unnecessary cast in CKey::SignSchnorr
Diffstat (limited to 'src/key.cpp')
-rw-r--r-- | src/key.cpp | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/key.cpp b/src/key.cpp index 86081b3464..bf4dd49bb9 100644 --- a/src/key.cpp +++ b/src/key.cpp @@ -288,7 +288,7 @@ bool CKey::SignSchnorr(const uint256& hash, Span<unsigned char> sig, const uint2 uint256 tweak = XOnlyPubKey(pubkey_bytes).ComputeTapTweakHash(merkle_root->IsNull() ? nullptr : merkle_root); if (!secp256k1_keypair_xonly_tweak_add(GetVerifyContext(), &keypair, tweak.data())) return false; } - bool ret = secp256k1_schnorrsig_sign(secp256k1_context_sign, sig.data(), hash.data(), &keypair, (unsigned char*)aux.data()); + bool ret = secp256k1_schnorrsig_sign(secp256k1_context_sign, sig.data(), hash.data(), &keypair, aux.data()); if (ret) { // Additional verification step to prevent using a potentially corrupted signature secp256k1_xonly_pubkey pubkey_verify; |