From 5e62399844e0f63dc50f2517aefe5328088f4d5d Mon Sep 17 00:00:00 2001 From: Doug Hoyte Date: Tue, 10 Jan 2023 12:53:09 -0500 Subject: [PATCH] support old and new versions of libsecp256k1 --- src/events.cpp | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/src/events.cpp b/src/events.cpp index 4592aaf..255f05d 100644 --- a/src/events.cpp +++ b/src/events.cpp @@ -76,7 +76,15 @@ bool verifySig(secp256k1_context* ctx, std::string_view sig, std::string_view ha secp256k1_xonly_pubkey pubkeyParsed; if (!secp256k1_xonly_pubkey_parse(ctx, &pubkeyParsed, (const uint8_t*)pubkey.data())) throw herr("verify sig: bad pubkey"); - return secp256k1_schnorrsig_verify(ctx, (const uint8_t*)sig.data(), (const uint8_t*)hash.data(), &pubkeyParsed); + return secp256k1_schnorrsig_verify( + ctx, + (const uint8_t*)sig.data(), + (const uint8_t*)hash.data(), +#ifdef SECP256K1_SCHNORRSIG_EXTRAPARAMS_INIT // old versions of libsecp256k1 didn't take a msg size param, this define added just after + hash.size(), +#endif + &pubkeyParsed + ); } void verifyNostrEvent(secp256k1_context *secpCtx, const NostrIndex::Event *flat, const tao::json::value &origJson) {