39
39
//! let message = Message::from_digest(digest.to_byte_array());
40
40
//!
41
41
//! let sig = secp.sign_ecdsa(&message, &secret_key);
42
- //! assert!(secp.verify_ecdsa(&message , &sig , &public_key).is_ok());
42
+ //! assert!(secp.verify_ecdsa(&sig , &message , &public_key).is_ok());
43
43
//! # }
44
44
//! ```
45
45
//!
76
76
//! let message = Message::from_digest(compute_hash(b"CSW is not Satoshi"));
77
77
//!
78
78
//! let sig = secp.sign_ecdsa(&message, &secret_key);
79
- //! assert!(secp.verify_ecdsa(&message , &sig , &public_key).is_ok());
79
+ //! assert!(secp.verify_ecdsa(&sig , &message , &public_key).is_ok());
80
80
//! # }
81
81
//! ```
82
82
//!
115
115
//! ]).expect("compact signatures are 64 bytes; DER signatures are 68-72 bytes");
116
116
//!
117
117
//! # #[cfg(not(secp256k1_fuzz))]
118
- //! assert!(secp.verify_ecdsa(&message , &sig , &public_key).is_ok());
118
+ //! assert!(secp.verify_ecdsa(&sig , &message , &public_key).is_ok());
119
119
//! # }
120
120
//! ```
121
121
//!
@@ -547,8 +547,8 @@ mod tests {
547
547
let sig = full. sign_ecdsa ( & msg, & sk) ;
548
548
549
549
// Try verifying
550
- assert ! ( vrfy. verify_ecdsa( & msg , & sig , & pk) . is_ok( ) ) ;
551
- assert ! ( full. verify_ecdsa( & msg , & sig , & pk) . is_ok( ) ) ;
550
+ assert ! ( vrfy. verify_ecdsa( & sig , & msg , & pk) . is_ok( ) ) ;
551
+ assert ! ( full. verify_ecdsa( & sig , & msg , & pk) . is_ok( ) ) ;
552
552
553
553
// The following drop will have no effect; in fact, they will trigger a compiler
554
554
// error because manually dropping a `ManuallyDrop` is almost certainly incorrect.
@@ -614,8 +614,8 @@ mod tests {
614
614
let sig = full. sign_ecdsa ( & msg, & sk) ;
615
615
616
616
// Try verifying
617
- assert ! ( vrfy. verify_ecdsa( & msg , & sig , & pk) . is_ok( ) ) ;
618
- assert ! ( full. verify_ecdsa( & msg , & sig , & pk) . is_ok( ) ) ;
617
+ assert ! ( vrfy. verify_ecdsa( & sig , & msg , & pk) . is_ok( ) ) ;
618
+ assert ! ( full. verify_ecdsa( & sig , & msg , & pk) . is_ok( ) ) ;
619
619
}
620
620
621
621
#[ test]
@@ -636,8 +636,8 @@ mod tests {
636
636
let sig = full. sign_ecdsa ( & msg, & sk) ;
637
637
638
638
// Try verifying
639
- assert ! ( vrfy. verify_ecdsa( & msg , & sig , & pk) . is_ok( ) ) ;
640
- assert ! ( full. verify_ecdsa( & msg , & sig , & pk) . is_ok( ) ) ;
639
+ assert ! ( vrfy. verify_ecdsa( & sig , & msg , & pk) . is_ok( ) ) ;
640
+ assert ! ( full. verify_ecdsa( & sig , & msg , & pk) . is_ok( ) ) ;
641
641
642
642
// Check that we can produce keys from slices with no precomputation
643
643
let ( pk_slice, sk_slice) = ( & pk. serialize ( ) , & sk[ ..] ) ;
@@ -750,13 +750,13 @@ mod tests {
750
750
751
751
let ( sk, pk) = s. generate_keypair ( & mut rand:: thread_rng ( ) ) ;
752
752
let sig = s. sign_ecdsa ( & msg, & sk) ;
753
- assert_eq ! ( s. verify_ecdsa( & msg , & sig , & pk) , Ok ( ( ) ) ) ;
753
+ assert_eq ! ( s. verify_ecdsa( & sig , & msg , & pk) , Ok ( ( ) ) ) ;
754
754
let noncedata_sig = s. sign_ecdsa_with_noncedata ( & msg, & sk, & noncedata) ;
755
- assert_eq ! ( s. verify_ecdsa( & msg , & noncedata_sig , & pk) , Ok ( ( ) ) ) ;
755
+ assert_eq ! ( s. verify_ecdsa( & noncedata_sig , & msg , & pk) , Ok ( ( ) ) ) ;
756
756
let low_r_sig = s. sign_ecdsa_low_r ( & msg, & sk) ;
757
- assert_eq ! ( s. verify_ecdsa( & msg , & low_r_sig , & pk) , Ok ( ( ) ) ) ;
757
+ assert_eq ! ( s. verify_ecdsa( & low_r_sig , & msg , & pk) , Ok ( ( ) ) ) ;
758
758
let grind_r_sig = s. sign_ecdsa_grind_r ( & msg, & sk, 1 ) ;
759
- assert_eq ! ( s. verify_ecdsa( & msg , & grind_r_sig , & pk) , Ok ( ( ) ) ) ;
759
+ assert_eq ! ( s. verify_ecdsa( & grind_r_sig , & msg , & pk) , Ok ( ( ) ) ) ;
760
760
let compact = sig. serialize_compact ( ) ;
761
761
if compact[ 0 ] < 0x80 {
762
762
assert_eq ! ( sig, low_r_sig) ;
@@ -798,9 +798,9 @@ mod tests {
798
798
let low_r_sig = s. sign_ecdsa_low_r ( & msg, & key) ;
799
799
let grind_r_sig = s. sign_ecdsa_grind_r ( & msg, & key, 1 ) ;
800
800
let pk = PublicKey :: from_secret_key ( & s, & key) ;
801
- assert_eq ! ( s. verify_ecdsa( & msg , & sig , & pk) , Ok ( ( ) ) ) ;
802
- assert_eq ! ( s. verify_ecdsa( & msg , & low_r_sig , & pk) , Ok ( ( ) ) ) ;
803
- assert_eq ! ( s. verify_ecdsa( & msg , & grind_r_sig , & pk) , Ok ( ( ) ) ) ;
801
+ assert_eq ! ( s. verify_ecdsa( & sig , & msg , & pk) , Ok ( ( ) ) ) ;
802
+ assert_eq ! ( s. verify_ecdsa( & low_r_sig , & msg , & pk) , Ok ( ( ) ) ) ;
803
+ assert_eq ! ( s. verify_ecdsa( & grind_r_sig , & msg , & pk) , Ok ( ( ) ) ) ;
804
804
}
805
805
}
806
806
}
@@ -820,7 +820,7 @@ mod tests {
820
820
821
821
let msg = crate :: random_32_bytes ( & mut rand:: thread_rng ( ) ) ;
822
822
let msg = Message :: from_digest ( msg) ;
823
- assert_eq ! ( s. verify_ecdsa( & msg , & sig , & pk) , Err ( Error :: IncorrectSignature ) ) ;
823
+ assert_eq ! ( s. verify_ecdsa( & sig , & msg , & pk) , Err ( Error :: IncorrectSignature ) ) ;
824
824
}
825
825
826
826
#[ test]
@@ -913,10 +913,10 @@ mod tests {
913
913
let msg = Message :: from_digest ( msg) ;
914
914
915
915
// without normalization we expect this will fail
916
- assert_eq ! ( secp. verify_ecdsa( & msg , & sig , & pk) , Err ( Error :: IncorrectSignature ) ) ;
916
+ assert_eq ! ( secp. verify_ecdsa( & sig , & msg , & pk) , Err ( Error :: IncorrectSignature ) ) ;
917
917
// after normalization it should pass
918
918
sig. normalize_s ( ) ;
919
- assert_eq ! ( secp. verify_ecdsa( & msg , & sig , & pk) , Ok ( ( ) ) ) ;
919
+ assert_eq ! ( secp. verify_ecdsa( & sig , & msg , & pk) , Ok ( ( ) ) ) ;
920
920
}
921
921
922
922
#[ test]
@@ -1000,7 +1000,7 @@ mod tests {
1000
1000
1001
1001
// Check usage as self
1002
1002
let sig = SECP256K1 . sign_ecdsa ( & msg, & sk) ;
1003
- assert ! ( SECP256K1 . verify_ecdsa( & msg , & sig , & pk) . is_ok( ) ) ;
1003
+ assert ! ( SECP256K1 . verify_ecdsa( & sig , & msg , & pk) . is_ok( ) ) ;
1004
1004
}
1005
1005
}
1006
1006
@@ -1045,7 +1045,7 @@ mod benches {
1045
1045
let sig = s. sign_ecdsa ( & msg, & sk) ;
1046
1046
1047
1047
bh. iter ( || {
1048
- let res = s. verify_ecdsa ( & msg , & sig , & pk) . unwrap ( ) ;
1048
+ let res = s. verify_ecdsa ( & sig , & msg , & pk) . unwrap ( ) ;
1049
1049
black_box ( res) ;
1050
1050
} ) ;
1051
1051
}
0 commit comments