3939//! let message = Message::from_digest(digest.to_byte_array());
4040//!
4141//! let sig = secp.sign_ecdsa(message, &secret_key);
42- //! assert!(secp.verify_ecdsa(message, &sig, &public_key).is_ok());
42+ //! assert!(secp.verify_ecdsa(&sig, message , &public_key).is_ok());
4343//! # }
4444//! ```
4545//!
7676//! let message = Message::from_digest(compute_hash(b"CSW is not Satoshi"));
7777//!
7878//! let sig = secp.sign_ecdsa(message, &secret_key);
79- //! assert!(secp.verify_ecdsa(message, &sig, &public_key).is_ok());
79+ //! assert!(secp.verify_ecdsa(&sig, message , &public_key).is_ok());
8080//! # }
8181//! ```
8282//!
115115//! ]).expect("compact signatures are 64 bytes; DER signatures are 68-72 bytes");
116116//!
117117//! # #[cfg(not(secp256k1_fuzz))]
118- //! assert!(secp.verify_ecdsa(message, &sig, &public_key).is_ok());
118+ //! assert!(secp.verify_ecdsa(&sig, message , &public_key).is_ok());
119119//! # }
120120//! ```
121121//!
@@ -548,8 +548,8 @@ mod tests {
548548 let sig = full. sign_ecdsa ( msg, & sk) ;
549549
550550 // Try verifying
551- assert ! ( vrfy. verify_ecdsa( msg , & sig, & pk) . is_ok( ) ) ;
552- assert ! ( full. verify_ecdsa( msg , & sig, & pk) . is_ok( ) ) ;
551+ assert ! ( vrfy. verify_ecdsa( & sig, msg , & pk) . is_ok( ) ) ;
552+ assert ! ( full. verify_ecdsa( & sig, msg , & pk) . is_ok( ) ) ;
553553
554554 // The following drop will have no effect; in fact, they will trigger a compiler
555555 // error because manually dropping a `ManuallyDrop` is almost certainly incorrect.
@@ -615,8 +615,8 @@ mod tests {
615615 let sig = full. sign_ecdsa ( msg, & sk) ;
616616
617617 // Try verifying
618- assert ! ( vrfy. verify_ecdsa( msg , & sig, & pk) . is_ok( ) ) ;
619- assert ! ( full. verify_ecdsa( msg , & sig, & pk) . is_ok( ) ) ;
618+ assert ! ( vrfy. verify_ecdsa( & sig, msg , & pk) . is_ok( ) ) ;
619+ assert ! ( full. verify_ecdsa( & sig, msg , & pk) . is_ok( ) ) ;
620620 }
621621
622622 #[ test]
@@ -637,8 +637,8 @@ mod tests {
637637 let sig = full. sign_ecdsa ( msg, & sk) ;
638638
639639 // Try verifying
640- assert ! ( vrfy. verify_ecdsa( msg , & sig, & pk) . is_ok( ) ) ;
641- assert ! ( full. verify_ecdsa( msg , & sig, & pk) . is_ok( ) ) ;
640+ assert ! ( vrfy. verify_ecdsa( & sig, msg , & pk) . is_ok( ) ) ;
641+ assert ! ( full. verify_ecdsa( & sig, msg , & pk) . is_ok( ) ) ;
642642
643643 // Check that we can produce keys from slices with no precomputation
644644 let ( pk_slice, sk_slice) = ( & pk. serialize ( ) , & sk[ ..] ) ;
@@ -751,13 +751,13 @@ mod tests {
751751
752752 let ( sk, pk) = s. generate_keypair ( & mut rand:: rng ( ) ) ;
753753 let sig = s. sign_ecdsa ( msg, & sk) ;
754- assert_eq ! ( s. verify_ecdsa( msg , & sig, & pk) , Ok ( ( ) ) ) ;
754+ assert_eq ! ( s. verify_ecdsa( & sig, msg , & pk) , Ok ( ( ) ) ) ;
755755 let noncedata_sig = s. sign_ecdsa_with_noncedata ( msg, & sk, & noncedata) ;
756- assert_eq ! ( s. verify_ecdsa( msg , & noncedata_sig, & pk) , Ok ( ( ) ) ) ;
756+ assert_eq ! ( s. verify_ecdsa( & noncedata_sig, msg , & pk) , Ok ( ( ) ) ) ;
757757 let low_r_sig = s. sign_ecdsa_low_r ( msg, & sk) ;
758- assert_eq ! ( s. verify_ecdsa( msg , & low_r_sig, & pk) , Ok ( ( ) ) ) ;
758+ assert_eq ! ( s. verify_ecdsa( & low_r_sig, msg , & pk) , Ok ( ( ) ) ) ;
759759 let grind_r_sig = s. sign_ecdsa_grind_r ( msg, & sk, 1 ) ;
760- assert_eq ! ( s. verify_ecdsa( msg , & grind_r_sig, & pk) , Ok ( ( ) ) ) ;
760+ assert_eq ! ( s. verify_ecdsa( & grind_r_sig, msg , & pk) , Ok ( ( ) ) ) ;
761761 let compact = sig. serialize_compact ( ) ;
762762 if compact[ 0 ] < 0x80 {
763763 assert_eq ! ( sig, low_r_sig) ;
@@ -799,9 +799,9 @@ mod tests {
799799 let low_r_sig = s. sign_ecdsa_low_r ( msg, & key) ;
800800 let grind_r_sig = s. sign_ecdsa_grind_r ( msg, & key, 1 ) ;
801801 let pk = PublicKey :: from_secret_key ( & s, & key) ;
802- assert_eq ! ( s. verify_ecdsa( msg , & sig, & pk) , Ok ( ( ) ) ) ;
803- assert_eq ! ( s. verify_ecdsa( msg , & low_r_sig, & pk) , Ok ( ( ) ) ) ;
804- assert_eq ! ( s. verify_ecdsa( msg , & grind_r_sig, & pk) , Ok ( ( ) ) ) ;
802+ assert_eq ! ( s. verify_ecdsa( & sig, msg , & pk) , Ok ( ( ) ) ) ;
803+ assert_eq ! ( s. verify_ecdsa( & low_r_sig, msg , & pk) , Ok ( ( ) ) ) ;
804+ assert_eq ! ( s. verify_ecdsa( & grind_r_sig, msg , & pk) , Ok ( ( ) ) ) ;
805805 }
806806 }
807807 }
@@ -821,7 +821,7 @@ mod tests {
821821
822822 let msg = crate :: random_32_bytes ( & mut rand:: rng ( ) ) ;
823823 let msg = Message :: from_digest ( msg) ;
824- assert_eq ! ( s. verify_ecdsa( msg , & sig, & pk) , Err ( Error :: IncorrectSignature ) ) ;
824+ assert_eq ! ( s. verify_ecdsa( & sig, msg , & pk) , Err ( Error :: IncorrectSignature ) ) ;
825825 }
826826
827827 #[ test]
@@ -914,10 +914,10 @@ mod tests {
914914 let msg = Message :: from_digest ( msg) ;
915915
916916 // without normalization we expect this will fail
917- assert_eq ! ( secp. verify_ecdsa( msg , & sig, & pk) , Err ( Error :: IncorrectSignature ) ) ;
917+ assert_eq ! ( secp. verify_ecdsa( & sig, msg , & pk) , Err ( Error :: IncorrectSignature ) ) ;
918918 // after normalization it should pass
919919 sig. normalize_s ( ) ;
920- assert_eq ! ( secp. verify_ecdsa( msg , & sig, & pk) , Ok ( ( ) ) ) ;
920+ assert_eq ! ( secp. verify_ecdsa( & sig, msg , & pk) , Ok ( ( ) ) ) ;
921921 }
922922
923923 #[ test]
@@ -1001,7 +1001,7 @@ mod tests {
10011001
10021002 // Check usage as self
10031003 let sig = SECP256K1 . sign_ecdsa ( msg, & sk) ;
1004- assert ! ( SECP256K1 . verify_ecdsa( msg , & sig, & pk) . is_ok( ) ) ;
1004+ assert ! ( SECP256K1 . verify_ecdsa( & sig, msg , & pk) . is_ok( ) ) ;
10051005 }
10061006}
10071007
@@ -1046,7 +1046,7 @@ mod benches {
10461046 let sig = s. sign_ecdsa ( msg, & sk) ;
10471047
10481048 bh. iter ( || {
1049- let res = s. verify_ecdsa ( msg , & sig, & pk) . unwrap ( ) ;
1049+ let res = s. verify_ecdsa ( & sig, msg , & pk) . unwrap ( ) ;
10501050 black_box ( res) ;
10511051 } ) ;
10521052 }
0 commit comments