39
39
//! let message = Message::from_digest(digest.to_byte_array());
40
40
//!
41
41
//! let sig = secp.sign_ecdsa(message, &secret_key);
42
- //! assert!(secp.verify_ecdsa(message, &sig, &public_key).is_ok());
42
+ //! assert!(secp.verify_ecdsa(&sig, message , &public_key).is_ok());
43
43
//! # }
44
44
//! ```
45
45
//!
76
76
//! let message = Message::from_digest(compute_hash(b"CSW is not Satoshi"));
77
77
//!
78
78
//! let sig = secp.sign_ecdsa(message, &secret_key);
79
- //! assert!(secp.verify_ecdsa(message, &sig, &public_key).is_ok());
79
+ //! assert!(secp.verify_ecdsa(&sig, message , &public_key).is_ok());
80
80
//! # }
81
81
//! ```
82
82
//!
115
115
//! ]).expect("compact signatures are 64 bytes; DER signatures are 68-72 bytes");
116
116
//!
117
117
//! # #[cfg(not(secp256k1_fuzz))]
118
- //! assert!(secp.verify_ecdsa(message, &sig, &public_key).is_ok());
118
+ //! assert!(secp.verify_ecdsa(&sig, message , &public_key).is_ok());
119
119
//! # }
120
120
//! ```
121
121
//!
@@ -548,8 +548,8 @@ mod tests {
548
548
let sig = full. sign_ecdsa ( msg, & sk) ;
549
549
550
550
// Try verifying
551
- assert ! ( vrfy. verify_ecdsa( msg , & sig, & pk) . is_ok( ) ) ;
552
- assert ! ( full. verify_ecdsa( msg , & sig, & pk) . is_ok( ) ) ;
551
+ assert ! ( vrfy. verify_ecdsa( & sig, msg , & pk) . is_ok( ) ) ;
552
+ assert ! ( full. verify_ecdsa( & sig, msg , & pk) . is_ok( ) ) ;
553
553
554
554
// The following drop will have no effect; in fact, they will trigger a compiler
555
555
// error because manually dropping a `ManuallyDrop` is almost certainly incorrect.
@@ -615,8 +615,8 @@ mod tests {
615
615
let sig = full. sign_ecdsa ( msg, & sk) ;
616
616
617
617
// Try verifying
618
- assert ! ( vrfy. verify_ecdsa( msg , & sig, & pk) . is_ok( ) ) ;
619
- assert ! ( full. verify_ecdsa( msg , & sig, & pk) . is_ok( ) ) ;
618
+ assert ! ( vrfy. verify_ecdsa( & sig, msg , & pk) . is_ok( ) ) ;
619
+ assert ! ( full. verify_ecdsa( & sig, msg , & pk) . is_ok( ) ) ;
620
620
}
621
621
622
622
#[ test]
@@ -637,8 +637,8 @@ mod tests {
637
637
let sig = full. sign_ecdsa ( msg, & sk) ;
638
638
639
639
// Try verifying
640
- assert ! ( vrfy. verify_ecdsa( msg , & sig, & pk) . is_ok( ) ) ;
641
- assert ! ( full. verify_ecdsa( msg , & sig, & pk) . is_ok( ) ) ;
640
+ assert ! ( vrfy. verify_ecdsa( & sig, msg , & pk) . is_ok( ) ) ;
641
+ assert ! ( full. verify_ecdsa( & sig, msg , & pk) . is_ok( ) ) ;
642
642
643
643
// Check that we can produce keys from slices with no precomputation
644
644
let ( pk_slice, sk_slice) = ( & pk. serialize ( ) , & sk[ ..] ) ;
@@ -751,13 +751,13 @@ mod tests {
751
751
752
752
let ( sk, pk) = s. generate_keypair ( & mut rand:: rng ( ) ) ;
753
753
let sig = s. sign_ecdsa ( msg, & sk) ;
754
- assert_eq ! ( s. verify_ecdsa( msg , & sig, & pk) , Ok ( ( ) ) ) ;
754
+ assert_eq ! ( s. verify_ecdsa( & sig, msg , & pk) , Ok ( ( ) ) ) ;
755
755
let noncedata_sig = s. sign_ecdsa_with_noncedata ( msg, & sk, & noncedata) ;
756
- assert_eq ! ( s. verify_ecdsa( msg , & noncedata_sig, & pk) , Ok ( ( ) ) ) ;
756
+ assert_eq ! ( s. verify_ecdsa( & noncedata_sig, msg , & pk) , Ok ( ( ) ) ) ;
757
757
let low_r_sig = s. sign_ecdsa_low_r ( msg, & sk) ;
758
- assert_eq ! ( s. verify_ecdsa( msg , & low_r_sig, & pk) , Ok ( ( ) ) ) ;
758
+ assert_eq ! ( s. verify_ecdsa( & low_r_sig, msg , & pk) , Ok ( ( ) ) ) ;
759
759
let grind_r_sig = s. sign_ecdsa_grind_r ( msg, & sk, 1 ) ;
760
- assert_eq ! ( s. verify_ecdsa( msg , & grind_r_sig, & pk) , Ok ( ( ) ) ) ;
760
+ assert_eq ! ( s. verify_ecdsa( & grind_r_sig, msg , & pk) , Ok ( ( ) ) ) ;
761
761
let compact = sig. serialize_compact ( ) ;
762
762
if compact[ 0 ] < 0x80 {
763
763
assert_eq ! ( sig, low_r_sig) ;
@@ -799,9 +799,9 @@ mod tests {
799
799
let low_r_sig = s. sign_ecdsa_low_r ( msg, & key) ;
800
800
let grind_r_sig = s. sign_ecdsa_grind_r ( msg, & key, 1 ) ;
801
801
let pk = PublicKey :: from_secret_key ( & s, & key) ;
802
- assert_eq ! ( s. verify_ecdsa( msg , & sig, & pk) , Ok ( ( ) ) ) ;
803
- assert_eq ! ( s. verify_ecdsa( msg , & low_r_sig, & pk) , Ok ( ( ) ) ) ;
804
- assert_eq ! ( s. verify_ecdsa( msg , & grind_r_sig, & pk) , Ok ( ( ) ) ) ;
802
+ assert_eq ! ( s. verify_ecdsa( & sig, msg , & pk) , Ok ( ( ) ) ) ;
803
+ assert_eq ! ( s. verify_ecdsa( & low_r_sig, msg , & pk) , Ok ( ( ) ) ) ;
804
+ assert_eq ! ( s. verify_ecdsa( & grind_r_sig, msg , & pk) , Ok ( ( ) ) ) ;
805
805
}
806
806
}
807
807
}
@@ -821,7 +821,7 @@ mod tests {
821
821
822
822
let msg = crate :: random_32_bytes ( & mut rand:: rng ( ) ) ;
823
823
let msg = Message :: from_digest ( msg) ;
824
- assert_eq ! ( s. verify_ecdsa( msg , & sig, & pk) , Err ( Error :: IncorrectSignature ) ) ;
824
+ assert_eq ! ( s. verify_ecdsa( & sig, msg , & pk) , Err ( Error :: IncorrectSignature ) ) ;
825
825
}
826
826
827
827
#[ test]
@@ -914,10 +914,10 @@ mod tests {
914
914
let msg = Message :: from_digest ( msg) ;
915
915
916
916
// without normalization we expect this will fail
917
- assert_eq ! ( secp. verify_ecdsa( msg , & sig, & pk) , Err ( Error :: IncorrectSignature ) ) ;
917
+ assert_eq ! ( secp. verify_ecdsa( & sig, msg , & pk) , Err ( Error :: IncorrectSignature ) ) ;
918
918
// after normalization it should pass
919
919
sig. normalize_s ( ) ;
920
- assert_eq ! ( secp. verify_ecdsa( msg , & sig, & pk) , Ok ( ( ) ) ) ;
920
+ assert_eq ! ( secp. verify_ecdsa( & sig, msg , & pk) , Ok ( ( ) ) ) ;
921
921
}
922
922
923
923
#[ test]
@@ -1001,7 +1001,7 @@ mod tests {
1001
1001
1002
1002
// Check usage as self
1003
1003
let sig = SECP256K1 . sign_ecdsa ( msg, & sk) ;
1004
- assert ! ( SECP256K1 . verify_ecdsa( msg , & sig, & pk) . is_ok( ) ) ;
1004
+ assert ! ( SECP256K1 . verify_ecdsa( & sig, msg , & pk) . is_ok( ) ) ;
1005
1005
}
1006
1006
}
1007
1007
@@ -1046,7 +1046,7 @@ mod benches {
1046
1046
let sig = s. sign_ecdsa ( msg, & sk) ;
1047
1047
1048
1048
bh. iter ( || {
1049
- let res = s. verify_ecdsa ( msg , & sig, & pk) . unwrap ( ) ;
1049
+ let res = s. verify_ecdsa ( & sig, msg , & pk) . unwrap ( ) ;
1050
1050
black_box ( res) ;
1051
1051
} ) ;
1052
1052
}
0 commit comments