@@ -351,7 +351,7 @@ SECP256K1_API void secp256k1_context_destroy(
351
351
* the data pointer argument set to NULL.
352
352
*
353
353
* Args: ctx: pointer to a context object.
354
- * In: fun: a pointer to a function to call when an illegal argument is
354
+ * In: fun: pointer to a function to call when an illegal argument is
355
355
* passed to the API, taking a message and an opaque pointer.
356
356
* (NULL restores the default handler.)
357
357
* data: the opaque pointer to pass to fun above, must be NULL for the default handler.
@@ -378,7 +378,7 @@ SECP256K1_API void secp256k1_context_set_illegal_callback(
378
378
* crashing.
379
379
*
380
380
* Args: ctx: pointer to a context object.
381
- * In: fun: a pointer to a function to call when an internal error occurs,
381
+ * In: fun: pointer to a function to call when an internal error occurs,
382
382
* taking a message and an opaque pointer (NULL restores the
383
383
* default handler, see secp256k1_context_set_illegal_callback
384
384
* for details).
@@ -407,7 +407,7 @@ SECP256K1_API SECP256K1_WARN_UNUSED_RESULT secp256k1_scratch_space *secp256k1_sc
407
407
/** Destroy a secp256k1 scratch space.
408
408
*
409
409
* The pointer may not be used afterwards.
410
- * Args: ctx: a pointer to a context object.
410
+ * Args: ctx: pointer to a context object.
411
411
* scratch: space to destroy
412
412
*/
413
413
SECP256K1_API void secp256k1_scratch_space_destroy (
@@ -440,13 +440,13 @@ SECP256K1_API SECP256K1_WARN_UNUSED_RESULT int secp256k1_ec_pubkey_parse(
440
440
*
441
441
* Returns: 1 always.
442
442
* Args: ctx: pointer to a context object.
443
- * Out: output: a pointer to a 65-byte (if compressed==0) or 33-byte (if
443
+ * Out: output: pointer to a 65-byte (if compressed==0) or 33-byte (if
444
444
* compressed==1) byte array to place the serialized key
445
445
* in.
446
- * In/Out: outputlen: a pointer to an integer which is initially set to the
446
+ * In/Out: outputlen: pointer to an integer which is initially set to the
447
447
* size of output, and is overwritten with the written
448
448
* size.
449
- * In: pubkey: a pointer to a secp256k1_pubkey containing an
449
+ * In: pubkey: pointer to a secp256k1_pubkey containing an
450
450
* initialized public key.
451
451
* flags: SECP256K1_EC_COMPRESSED if serialization should be in
452
452
* compressed format, otherwise SECP256K1_EC_UNCOMPRESSED.
@@ -499,8 +499,8 @@ SECP256K1_API int secp256k1_ecdsa_signature_parse_compact(
499
499
*
500
500
* Returns: 1 when the signature could be parsed, 0 otherwise.
501
501
* Args: ctx: pointer to a context object
502
- * Out: sig: a pointer to a signature object
503
- * In: input: a pointer to the signature to be parsed
502
+ * Out: sig: pointer to a signature object
503
+ * In: input: pointer to the signature to be parsed
504
504
* inputlen: the length of the array pointed to be input
505
505
*
506
506
* This function will accept any valid DER encoded signature, even if the
@@ -521,12 +521,12 @@ SECP256K1_API int secp256k1_ecdsa_signature_parse_der(
521
521
*
522
522
* Returns: 1 if enough space was available to serialize, 0 otherwise
523
523
* Args: ctx: pointer to a context object
524
- * Out: output: a pointer to an array to store the DER serialization
525
- * In/Out: outputlen: a pointer to a length integer. Initially, this integer
524
+ * Out: output: pointer to an array to store the DER serialization
525
+ * In/Out: outputlen: pointer to a length integer. Initially, this integer
526
526
* should be set to the length of output. After the call
527
527
* it will be set to the length of the serialization (even
528
528
* if 0 was returned).
529
- * In: sig: a pointer to an initialized signature object
529
+ * In: sig: pointer to an initialized signature object
530
530
*/
531
531
SECP256K1_API int secp256k1_ecdsa_signature_serialize_der (
532
532
const secp256k1_context * ctx ,
@@ -586,11 +586,11 @@ SECP256K1_API SECP256K1_WARN_UNUSED_RESULT int secp256k1_ecdsa_verify(
586
586
*
587
587
* Returns: 1 if sigin was not normalized, 0 if it already was.
588
588
* Args: ctx: pointer to a context object
589
- * Out: sigout: a pointer to a signature to fill with the normalized form,
589
+ * Out: sigout: pointer to a signature to fill with the normalized form,
590
590
* or copy if the input was already normalized. (can be NULL if
591
591
* you're only interested in whether the input was already
592
592
* normalized).
593
- * In: sigin: a pointer to a signature to check/normalize (can be identical to sigout)
593
+ * In: sigin: pointer to a signature to check/normalize (can be identical to sigout)
594
594
*
595
595
* With ECDSA a third-party can forge a second distinct signature of the same
596
596
* message, given a single initial signature, but without knowing the key. This
0 commit comments