@@ -265,7 +265,7 @@ SECP256K1_API void secp256k1_selftest(void);
265
265
* memory allocation entirely, see secp256k1_context_static and the functions in
266
266
* secp256k1_preallocated.h.
267
267
*
268
- * Returns: a newly created context object.
268
+ * Returns: pointer to a newly created context object.
269
269
* In: flags: Always set to SECP256K1_CONTEXT_NONE (see below).
270
270
*
271
271
* The only valid non-deprecated flag in recent library versions is
@@ -296,8 +296,8 @@ SECP256K1_API secp256k1_context *secp256k1_context_create(
296
296
* Cloning secp256k1_context_static is not possible, and should not be emulated by
297
297
* the caller (e.g., using memcpy). Create a new context instead.
298
298
*
299
- * Returns: a newly created context object.
300
- * Args: ctx: an existing context to copy (not secp256k1_context_static)
299
+ * Returns: pointer to a newly created context object.
300
+ * Args: ctx: pointer to a context to copy (not secp256k1_context_static).
301
301
*/
302
302
SECP256K1_API secp256k1_context * secp256k1_context_clone (
303
303
const secp256k1_context * ctx
@@ -313,7 +313,7 @@ SECP256K1_API secp256k1_context *secp256k1_context_clone(
313
313
* behaviour is undefined. In that case, secp256k1_context_preallocated_destroy must
314
314
* be used instead.
315
315
*
316
- * Args: ctx: an existing context to destroy, constructed using
316
+ * Args: ctx: pointer to a context to destroy, constructed using
317
317
* secp256k1_context_create or secp256k1_context_clone
318
318
* (i.e., not secp256k1_context_static).
319
319
*/
@@ -350,8 +350,8 @@ SECP256K1_API void secp256k1_context_destroy(
350
350
* fails. In this case, the corresponding default handler will be called with
351
351
* the data pointer argument set to NULL.
352
352
*
353
- * Args: ctx: an existing context object.
354
- * In: fun: a pointer to a function to call when an illegal argument is
353
+ * Args: ctx: pointer to a context object.
354
+ * In: fun: pointer to a function to call when an illegal argument is
355
355
* passed to the API, taking a message and an opaque pointer.
356
356
* (NULL restores the default handler.)
357
357
* data: the opaque pointer to pass to fun above, must be NULL for the default handler.
@@ -377,8 +377,8 @@ SECP256K1_API void secp256k1_context_set_illegal_callback(
377
377
* for that). After this callback returns, anything may happen, including
378
378
* crashing.
379
379
*
380
- * Args: ctx: an existing context object.
381
- * In: fun: a pointer to a function to call when an internal error occurs,
380
+ * Args: ctx: pointer to a context object.
381
+ * In: fun: pointer to a function to call when an internal error occurs,
382
382
* taking a message and an opaque pointer (NULL restores the
383
383
* default handler, see secp256k1_context_set_illegal_callback
384
384
* for details).
@@ -395,7 +395,7 @@ SECP256K1_API void secp256k1_context_set_error_callback(
395
395
/** Create a secp256k1 scratch space object.
396
396
*
397
397
* Returns: a newly created scratch space.
398
- * Args: ctx: an existing context object.
398
+ * Args: ctx: pointer to a context object.
399
399
* In: size: amount of memory to be available as scratch space. Some extra
400
400
* (<100 bytes) will be allocated for extra accounting.
401
401
*/
@@ -407,7 +407,7 @@ SECP256K1_API SECP256K1_WARN_UNUSED_RESULT secp256k1_scratch_space *secp256k1_sc
407
407
/** Destroy a secp256k1 scratch space.
408
408
*
409
409
* The pointer may not be used afterwards.
410
- * Args: ctx: a secp256k1 context object.
410
+ * Args: ctx: pointer to a context object.
411
411
* scratch: space to destroy
412
412
*/
413
413
SECP256K1_API void secp256k1_scratch_space_destroy (
@@ -419,7 +419,7 @@ SECP256K1_API void secp256k1_scratch_space_destroy(
419
419
*
420
420
* Returns: 1 if the public key was fully valid.
421
421
* 0 if the public key could not be parsed or is invalid.
422
- * Args: ctx: a secp256k1 context object.
422
+ * Args: ctx: pointer to a context object.
423
423
* Out: pubkey: pointer to a pubkey object. If 1 is returned, it is set to a
424
424
* parsed version of input. If not, its value is undefined.
425
425
* In: input: pointer to a serialized public key
@@ -439,14 +439,14 @@ SECP256K1_API SECP256K1_WARN_UNUSED_RESULT int secp256k1_ec_pubkey_parse(
439
439
/** Serialize a pubkey object into a serialized byte sequence.
440
440
*
441
441
* Returns: 1 always.
442
- * Args: ctx: a secp256k1 context object.
443
- * Out: output: a pointer to a 65-byte (if compressed==0) or 33-byte (if
442
+ * Args: ctx: pointer to a context object.
443
+ * Out: output: pointer to a 65-byte (if compressed==0) or 33-byte (if
444
444
* compressed==1) byte array to place the serialized key
445
445
* in.
446
- * In/Out: outputlen: a pointer to an integer which is initially set to the
446
+ * In/Out: outputlen: pointer to an integer which is initially set to the
447
447
* size of output, and is overwritten with the written
448
448
* size.
449
- * In: pubkey: a pointer to a secp256k1_pubkey containing an
449
+ * In: pubkey: pointer to a secp256k1_pubkey containing an
450
450
* initialized public key.
451
451
* flags: SECP256K1_EC_COMPRESSED if serialization should be in
452
452
* compressed format, otherwise SECP256K1_EC_UNCOMPRESSED.
@@ -464,7 +464,7 @@ SECP256K1_API int secp256k1_ec_pubkey_serialize(
464
464
* Returns: <0 if the first public key is less than the second
465
465
* >0 if the first public key is greater than the second
466
466
* 0 if the two public keys are equal
467
- * Args: ctx: a secp256k1 context object.
467
+ * Args: ctx: pointer to a context object
468
468
* In: pubkey1: first public key to compare
469
469
* pubkey2: second public key to compare
470
470
*/
@@ -477,9 +477,9 @@ SECP256K1_API SECP256K1_WARN_UNUSED_RESULT int secp256k1_ec_pubkey_cmp(
477
477
/** Parse an ECDSA signature in compact (64 bytes) format.
478
478
*
479
479
* Returns: 1 when the signature could be parsed, 0 otherwise.
480
- * Args: ctx: a secp256k1 context object
481
- * Out: sig: a pointer to a signature object
482
- * In: input64: a pointer to the 64-byte array to parse
480
+ * Args: ctx: pointer to a context object
481
+ * Out: sig: pointer to a signature object
482
+ * In: input64: pointer to the 64-byte array to parse
483
483
*
484
484
* The signature must consist of a 32-byte big endian R value, followed by a
485
485
* 32-byte big endian S value. If R or S fall outside of [0..order-1], the
@@ -498,9 +498,9 @@ SECP256K1_API int secp256k1_ecdsa_signature_parse_compact(
498
498
/** Parse a DER ECDSA signature.
499
499
*
500
500
* Returns: 1 when the signature could be parsed, 0 otherwise.
501
- * Args: ctx: a secp256k1 context object
502
- * Out: sig: a pointer to a signature object
503
- * In: input: a pointer to the signature to be parsed
501
+ * Args: ctx: pointer to a context object
502
+ * Out: sig: pointer to a signature object
503
+ * In: input: pointer to the signature to be parsed
504
504
* inputlen: the length of the array pointed to be input
505
505
*
506
506
* This function will accept any valid DER encoded signature, even if the
@@ -520,13 +520,13 @@ SECP256K1_API int secp256k1_ecdsa_signature_parse_der(
520
520
/** Serialize an ECDSA signature in DER format.
521
521
*
522
522
* Returns: 1 if enough space was available to serialize, 0 otherwise
523
- * Args: ctx: a secp256k1 context object
524
- * Out: output: a pointer to an array to store the DER serialization
525
- * In/Out: outputlen: a pointer to a length integer. Initially, this integer
523
+ * Args: ctx: pointer to a context object
524
+ * Out: output: pointer to an array to store the DER serialization
525
+ * In/Out: outputlen: pointer to a length integer. Initially, this integer
526
526
* should be set to the length of output. After the call
527
527
* it will be set to the length of the serialization (even
528
528
* if 0 was returned).
529
- * In: sig: a pointer to an initialized signature object
529
+ * In: sig: pointer to an initialized signature object
530
530
*/
531
531
SECP256K1_API int secp256k1_ecdsa_signature_serialize_der (
532
532
const secp256k1_context * ctx ,
@@ -538,9 +538,9 @@ SECP256K1_API int secp256k1_ecdsa_signature_serialize_der(
538
538
/** Serialize an ECDSA signature in compact (64 byte) format.
539
539
*
540
540
* Returns: 1
541
- * Args: ctx: a secp256k1 context object
542
- * Out: output64: a pointer to a 64-byte array to store the compact serialization
543
- * In: sig: a pointer to an initialized signature object
541
+ * Args: ctx: pointer to a context object
542
+ * Out: output64: pointer to a 64-byte array to store the compact serialization
543
+ * In: sig: pointer to an initialized signature object
544
544
*
545
545
* See secp256k1_ecdsa_signature_parse_compact for details about the encoding.
546
546
*/
@@ -554,7 +554,7 @@ SECP256K1_API int secp256k1_ecdsa_signature_serialize_compact(
554
554
*
555
555
* Returns: 1: correct signature
556
556
* 0: incorrect or unparseable signature
557
- * Args: ctx: a secp256k1 context object.
557
+ * Args: ctx: pointer to a context object
558
558
* In: sig: the signature being verified.
559
559
* msghash32: the 32-byte message hash being verified.
560
560
* The verifier must make sure to apply a cryptographic
@@ -585,12 +585,12 @@ SECP256K1_API SECP256K1_WARN_UNUSED_RESULT int secp256k1_ecdsa_verify(
585
585
/** Convert a signature to a normalized lower-S form.
586
586
*
587
587
* Returns: 1 if sigin was not normalized, 0 if it already was.
588
- * Args: ctx: a secp256k1 context object
589
- * Out: sigout: a pointer to a signature to fill with the normalized form,
588
+ * Args: ctx: pointer to a context object
589
+ * Out: sigout: pointer to a signature to fill with the normalized form,
590
590
* or copy if the input was already normalized. (can be NULL if
591
591
* you're only interested in whether the input was already
592
592
* normalized).
593
- * In: sigin: a pointer to a signature to check/normalize (can be identical to sigout)
593
+ * In: sigin: pointer to a signature to check/normalize (can be identical to sigout)
594
594
*
595
595
* With ECDSA a third-party can forge a second distinct signature of the same
596
596
* message, given a single initial signature, but without knowing the key. This
0 commit comments