@@ -23,16 +23,16 @@ extern "C" {
23
23
*
24
24
* Returns: 1 if a nonce was successfully generated. 0 will cause signing to
25
25
* return an error.
26
- * Out: nonce32: pointer to a 32-byte array to be filled by the function.
26
+ * Out: nonce32: pointer to a 32-byte array to be filled by the function
27
27
* In: msg: the message being verified (will not be NULL)
28
28
* msglen: the length of the message (will not be NULL)
29
29
* key32: pointer to a 32-byte secret key (will not be NULL)
30
30
* xonly_pk32: the 32-byte serialized xonly pubkey corresponding to key32
31
31
* (will not be NULL)
32
32
* algo: pointer to an array describing the signature
33
- * algorithm (will not be NULL).
33
+ * algorithm (will not be NULL)
34
34
* algolen: the length of the algo array
35
- * data: Arbitrary data pointer that is passed through.
35
+ * data: arbitrary data pointer that is passed through
36
36
*
37
37
* Except for test cases, this function should compute some cryptographic hash of
38
38
* the message, the key, the pubkey, the algorithm description, and data.
@@ -98,15 +98,16 @@ typedef struct {
98
98
* abort if it fails.
99
99
*
100
100
* This function only signs 32-byte messages. If you have messages of a
101
- * different size, it is recommended to create a 32-byte message hash with
101
+ * different size (or the same size but without an application-specific tag
102
+ * prefix), it is recommended to create a 32-byte message hash with
102
103
* secp256k1_tagged_sha256 and then sign the hash. Tagged hashing allows
103
104
* providing an application-specific tag for domain separation. This prevents
104
105
* signatures from being valid in multiple applications by accident.
105
106
*
106
107
* Returns 1 on success, 0 on failure.
107
108
* Args: ctx: pointer to a context object, initialized for signing (cannot be NULL)
108
109
* Out: sig64: pointer to a 64-byte array to store the serialized signature (cannot be NULL)
109
- * In: msg32: the 32-byte message hash being signed (cannot be NULL)
110
+ * In: msg32: the 32-byte message being signed (cannot be NULL)
110
111
* keypair: pointer to an initialized keypair (cannot be NULL)
111
112
* aux_rand32: 32 bytes of fresh randomness. While recommended to provide
112
113
* this, it is only supplemental to security and can be NULL. See
0 commit comments