@@ -24,7 +24,8 @@ extern "C" {
24
24
* Returns: 1 if a nonce was successfully generated. 0 will cause signing to
25
25
* return an error.
26
26
* Out: nonce32: pointer to a 32-byte array to be filled by the function
27
- * In: msg: the message being verified. Can be NULL iff msglen is 0.
27
+ * In: msg: the message being verified. Is NULL if and only if msglen
28
+ * is 0.
28
29
* msglen: the length of the message
29
30
* key32: pointer to a 32-byte secret key (will not be NULL)
30
31
* xonly_pk32: the 32-byte serialized xonly pubkey corresponding to key32
@@ -98,7 +99,7 @@ typedef struct {
98
99
* abort if it fails.
99
100
*
100
101
* This function only signs 32-byte messages. If you have messages of a
101
- * different size (or the same size but without an context-specific tag
102
+ * different size (or the same size but without a context-specific tag
102
103
* prefix), it is recommended to create a 32-byte message hash with
103
104
* secp256k1_tagged_sha256 and then sign the hash. Tagged hashing allows
104
105
* providing an context-specific tag for domain separation. This prevents
@@ -111,8 +112,8 @@ typedef struct {
111
112
* keypair: pointer to an initialized keypair (cannot be NULL)
112
113
* aux_rand32: 32 bytes of fresh randomness. While recommended to provide
113
114
* this, it is only supplemental to security and can be NULL. See
114
- * BIP-340 for a full explanation of this argument and for
115
- * guidance if randomness is expensive.
115
+ * BIP-340 "Default Signing" for a full explanation of this
116
+ * argument and for guidance if randomness is expensive.
116
117
*/
117
118
SECP256K1_API int secp256k1_schnorrsig_sign (
118
119
const secp256k1_context * ctx ,
0 commit comments