diff --git a/examples/sign_verify.rs b/examples/sign_verify.rs index 46d90e11d..fc5deaa5a 100644 --- a/examples/sign_verify.rs +++ b/examples/sign_verify.rs @@ -15,7 +15,7 @@ fn verify( let sig = ecdsa::Signature::from_compact(&sig)?; let pubkey = PublicKey::from_slice(&pubkey)?; - Ok(secp.verify_ecdsa(&msg, &sig, &pubkey).is_ok()) + Ok(secp.verify_ecdsa(msg, &sig, &pubkey).is_ok()) } fn sign( @@ -26,7 +26,7 @@ fn sign( let msg = sha256::Hash::hash(msg); let msg = Message::from_digest_slice(msg.as_ref())?; let seckey = SecretKey::from_slice(&seckey)?; - Ok(secp.sign_ecdsa(&msg, &seckey)) + Ok(secp.sign_ecdsa(msg, &seckey)) } fn main() { diff --git a/examples/sign_verify_recovery.rs b/examples/sign_verify_recovery.rs index d7f26f9d7..a82aa98a8 100644 --- a/examples/sign_verify_recovery.rs +++ b/examples/sign_verify_recovery.rs @@ -15,7 +15,7 @@ fn recover( let id = ecdsa::RecoveryId::try_from(i32::from(recovery_id))?; let sig = ecdsa::RecoverableSignature::from_compact(&sig, id)?; - secp.recover_ecdsa(&msg, &sig) + secp.recover_ecdsa(msg, &sig) } fn sign_recovery( @@ -26,7 +26,7 @@ fn sign_recovery( let msg = sha256::Hash::hash(msg); let msg = Message::from_digest_slice(msg.as_ref())?; let seckey = SecretKey::from_slice(&seckey)?; - Ok(secp.sign_ecdsa_recoverable(&msg, &seckey)) + Ok(secp.sign_ecdsa_recoverable(msg, &seckey)) } fn main() { diff --git a/no_std_test/src/main.rs b/no_std_test/src/main.rs index 53898873a..cda191490 100644 --- a/no_std_test/src/main.rs +++ b/no_std_test/src/main.rs @@ -94,12 +94,12 @@ fn start(_argc: isize, _argv: *const *const u8) -> isize { let public_key = PublicKey::from_secret_key(&secp, &secret_key); let message = Message::from_digest_slice(&[0xab; 32]).expect("32 bytes"); - let sig = secp.sign_ecdsa(&message, &secret_key); - assert!(secp.verify_ecdsa(&message, &sig, &public_key).is_ok()); + let sig = secp.sign_ecdsa(message, &secret_key); + assert!(secp.verify_ecdsa(message, &sig, &public_key).is_ok()); - let rec_sig = secp.sign_ecdsa_recoverable(&message, &secret_key); - assert!(secp.verify_ecdsa(&message, &rec_sig.to_standard(), &public_key).is_ok()); - assert_eq!(public_key, secp.recover_ecdsa(&message, &rec_sig).unwrap()); + let rec_sig = secp.sign_ecdsa_recoverable(message, &secret_key); + assert!(secp.verify_ecdsa(message, &rec_sig.to_standard(), &public_key).is_ok()); + assert_eq!(public_key, secp.recover_ecdsa(message, &rec_sig).unwrap()); let (rec_id, data) = rec_sig.serialize_compact(); let new_rec_sig = ecdsa::RecoverableSignature::from_compact(&data, rec_id).unwrap(); assert_eq!(rec_sig, new_rec_sig); @@ -121,8 +121,8 @@ fn start(_argc: isize, _argv: *const *const u8) -> isize { let public_key = PublicKey::from_secret_key(&secp_alloc, &secret_key); let message = Message::from_digest_slice(&[0xab; 32]).expect("32 bytes"); - let sig = secp_alloc.sign_ecdsa(&message, &secret_key); - assert!(secp_alloc.verify_ecdsa(&message, &sig, &public_key).is_ok()); + let sig = secp_alloc.sign_ecdsa(message, &secret_key); + assert!(secp_alloc.verify_ecdsa(message, &sig, &public_key).is_ok()); unsafe { libc::printf("Verified alloc Successfully!\n\0".as_ptr() as _) }; } diff --git a/src/ecdsa/mod.rs b/src/ecdsa/mod.rs index 39badb4c7..3fbaee19b 100644 --- a/src/ecdsa/mod.rs +++ b/src/ecdsa/mod.rs @@ -194,7 +194,7 @@ impl Signature { /// The signature must be normalized or verification will fail (see [`Signature::normalize_s`]). #[inline] #[cfg(feature = "global-context")] - pub fn verify(&self, msg: &Message, pk: &PublicKey) -> Result<(), Error> { + pub fn verify(&self, msg: impl Into, pk: &PublicKey) -> Result<(), Error> { SECP256K1.verify_ecdsa(msg, self, pk) } } @@ -243,7 +243,7 @@ impl<'de> serde::Deserialize<'de> for Signature { impl Secp256k1 { fn sign_ecdsa_with_noncedata_pointer( &self, - msg: &Message, + msg: impl Into, sk: &SecretKey, noncedata: Option<&[u8; 32]>, ) -> Signature { @@ -259,7 +259,7 @@ impl Secp256k1 { ffi::secp256k1_ecdsa_sign( self.ctx.as_ptr(), &mut ret, - msg.as_c_ptr(), + msg.into().as_c_ptr(), sk.as_c_ptr(), ffi::secp256k1_nonce_function_rfc6979, noncedata_ptr @@ -272,7 +272,7 @@ impl Secp256k1 { /// Constructs a signature for `msg` using the secret key `sk` and RFC6979 nonce /// Requires a signing-capable context. - pub fn sign_ecdsa(&self, msg: &Message, sk: &SecretKey) -> Signature { + pub fn sign_ecdsa(&self, msg: impl Into, sk: &SecretKey) -> Signature { self.sign_ecdsa_with_noncedata_pointer(msg, sk, None) } @@ -283,7 +283,7 @@ impl Secp256k1 { /// Requires a signing-capable context. pub fn sign_ecdsa_with_noncedata( &self, - msg: &Message, + msg: impl Into, sk: &SecretKey, noncedata: &[u8; 32], ) -> Signature { @@ -292,13 +292,14 @@ impl Secp256k1 { fn sign_grind_with_check( &self, - msg: &Message, + msg: impl Into, sk: &SecretKey, check: impl Fn(&ffi::Signature) -> bool, ) -> Signature { let mut entropy_p: *const ffi::types::c_void = ptr::null(); let mut counter: u32 = 0; let mut extra_entropy = [0u8; 32]; + let msg_c_ptr = msg.into().as_c_ptr(); loop { unsafe { let mut ret = ffi::Signature::new(); @@ -308,7 +309,7 @@ impl Secp256k1 { ffi::secp256k1_ecdsa_sign( self.ctx.as_ptr(), &mut ret, - msg.as_c_ptr(), + msg_c_ptr, sk.as_c_ptr(), ffi::secp256k1_nonce_function_rfc6979, entropy_p @@ -338,7 +339,7 @@ impl Secp256k1 { /// Requires a signing capable context. pub fn sign_ecdsa_grind_r( &self, - msg: &Message, + msg: impl Into, sk: &SecretKey, bytes_to_grind: usize, ) -> Signature { @@ -352,7 +353,7 @@ impl Secp256k1 { /// signature implementation of bitcoin core. In average, this function /// will perform two signing operations. /// Requires a signing capable context. - pub fn sign_ecdsa_low_r(&self, msg: &Message, sk: &SecretKey) -> Signature { + pub fn sign_ecdsa_low_r(&self, msg: impl Into, sk: &SecretKey) -> Signature { self.sign_grind_with_check(msg, sk, compact_sig_has_zero_first_bit) } } @@ -372,17 +373,17 @@ impl Secp256k1 { /// # let (secret_key, public_key) = secp.generate_keypair(&mut rand::thread_rng()); /// # /// let message = Message::from_digest_slice(&[0xab; 32]).expect("32 bytes"); - /// let sig = secp.sign_ecdsa(&message, &secret_key); - /// assert_eq!(secp.verify_ecdsa(&message, &sig, &public_key), Ok(())); + /// let sig = secp.sign_ecdsa(message, &secret_key); + /// assert_eq!(secp.verify_ecdsa(message, &sig, &public_key), Ok(())); /// /// let message = Message::from_digest_slice(&[0xcd; 32]).expect("32 bytes"); - /// assert_eq!(secp.verify_ecdsa(&message, &sig, &public_key), Err(Error::IncorrectSignature)); + /// assert_eq!(secp.verify_ecdsa(message, &sig, &public_key), Err(Error::IncorrectSignature)); /// # } /// ``` #[inline] pub fn verify_ecdsa( &self, - msg: &Message, + msg: impl Into, sig: &Signature, pk: &PublicKey, ) -> Result<(), Error> { @@ -390,7 +391,7 @@ impl Secp256k1 { if ffi::secp256k1_ecdsa_verify( self.ctx.as_ptr(), sig.as_c_ptr(), - msg.as_c_ptr(), + msg.into().as_c_ptr(), pk.as_c_ptr(), ) == 0 { diff --git a/src/ecdsa/recovery.rs b/src/ecdsa/recovery.rs index 33df0350e..a52b0ab91 100644 --- a/src/ecdsa/recovery.rs +++ b/src/ecdsa/recovery.rs @@ -133,7 +133,7 @@ impl RecoverableSignature { /// verify-capable context. #[inline] #[cfg(feature = "global-context")] - pub fn recover(&self, msg: &Message) -> Result { + pub fn recover(&self, msg: impl Into) -> Result { crate::SECP256K1.recover_ecdsa(msg, self) } } @@ -154,7 +154,7 @@ impl From for RecoverableSignature { impl Secp256k1 { fn sign_ecdsa_recoverable_with_noncedata_pointer( &self, - msg: &Message, + msg: impl Into, sk: &key::SecretKey, noncedata_ptr: *const super_ffi::types::c_void, ) -> RecoverableSignature { @@ -166,7 +166,7 @@ impl Secp256k1 { ffi::secp256k1_ecdsa_sign_recoverable( self.ctx.as_ptr(), &mut ret, - msg.as_c_ptr(), + msg.into().as_c_ptr(), sk.as_c_ptr(), super_ffi::secp256k1_nonce_function_rfc6979, noncedata_ptr @@ -182,7 +182,7 @@ impl Secp256k1 { /// Requires a signing-capable context. pub fn sign_ecdsa_recoverable( &self, - msg: &Message, + msg: impl Into, sk: &key::SecretKey, ) -> RecoverableSignature { self.sign_ecdsa_recoverable_with_noncedata_pointer(msg, sk, ptr::null()) @@ -195,7 +195,7 @@ impl Secp256k1 { /// Requires a signing-capable context. pub fn sign_ecdsa_recoverable_with_noncedata( &self, - msg: &Message, + msg: impl Into, sk: &key::SecretKey, noncedata: &[u8; 32], ) -> RecoverableSignature { @@ -209,7 +209,7 @@ impl Secp256k1 { /// `msg`. Requires a verify-capable context. pub fn recover_ecdsa( &self, - msg: &Message, + msg: impl Into, sig: &RecoverableSignature, ) -> Result { unsafe { @@ -218,7 +218,7 @@ impl Secp256k1 { self.ctx.as_ptr(), &mut pk, sig.as_c_ptr(), - msg.as_c_ptr(), + msg.into().as_c_ptr(), ) != 1 { return Err(Error::InvalidSignature); @@ -252,15 +252,15 @@ mod tests { let (sk, pk) = full.generate_keypair(&mut rand::thread_rng()); // Try signing - assert_eq!(sign.sign_ecdsa_recoverable(&msg, &sk), full.sign_ecdsa_recoverable(&msg, &sk)); - let sigr = full.sign_ecdsa_recoverable(&msg, &sk); + assert_eq!(sign.sign_ecdsa_recoverable(msg, &sk), full.sign_ecdsa_recoverable(msg, &sk)); + let sigr = full.sign_ecdsa_recoverable(msg, &sk); // Try pk recovery - assert!(vrfy.recover_ecdsa(&msg, &sigr).is_ok()); - assert!(full.recover_ecdsa(&msg, &sigr).is_ok()); + assert!(vrfy.recover_ecdsa(msg, &sigr).is_ok()); + assert!(full.recover_ecdsa(msg, &sigr).is_ok()); - assert_eq!(vrfy.recover_ecdsa(&msg, &sigr), full.recover_ecdsa(&msg, &sigr)); - assert_eq!(full.recover_ecdsa(&msg, &sigr), Ok(pk)); + assert_eq!(vrfy.recover_ecdsa(msg, &sigr), full.recover_ecdsa(msg, &sigr)); + assert_eq!(full.recover_ecdsa(msg, &sigr), Ok(pk)); } #[test] @@ -280,7 +280,7 @@ mod tests { let sk = SecretKey::from_slice(&ONE).unwrap(); let msg = Message::from_digest_slice(&ONE).unwrap(); - let sig = s.sign_ecdsa_recoverable(&msg, &sk); + let sig = s.sign_ecdsa_recoverable(msg, &sk); assert_eq!(Ok(sig), RecoverableSignature::from_compact(&[ 0x66, 0x73, 0xff, 0xad, 0x21, 0x47, 0x74, 0x1f, @@ -306,7 +306,7 @@ mod tests { let msg = Message::from_digest_slice(&ONE).unwrap(); let noncedata = [42u8; 32]; - let sig = s.sign_ecdsa_recoverable_with_noncedata(&msg, &sk, &noncedata); + let sig = s.sign_ecdsa_recoverable_with_noncedata(msg, &sk, &noncedata); assert_eq!(Ok(sig), RecoverableSignature::from_compact(&[ 0xb5, 0x0b, 0xb6, 0x79, 0x5f, 0x31, 0x74, 0x8a, @@ -331,14 +331,14 @@ mod tests { let (sk, pk) = s.generate_keypair(&mut rand::thread_rng()); - let sigr = s.sign_ecdsa_recoverable(&msg, &sk); + let sigr = s.sign_ecdsa_recoverable(msg, &sk); let sig = sigr.to_standard(); let msg = crate::random_32_bytes(&mut rand::thread_rng()); let msg = Message::from_digest_slice(&msg).unwrap(); - assert_eq!(s.verify_ecdsa(&msg, &sig, &pk), Err(Error::IncorrectSignature)); + assert_eq!(s.verify_ecdsa(msg, &sig, &pk), Err(Error::IncorrectSignature)); - let recovered_key = s.recover_ecdsa(&msg, &sigr).unwrap(); + let recovered_key = s.recover_ecdsa(msg, &sigr).unwrap(); assert!(recovered_key != pk); } @@ -353,9 +353,9 @@ mod tests { let (sk, pk) = s.generate_keypair(&mut rand::thread_rng()); - let sig = s.sign_ecdsa_recoverable(&msg, &sk); + let sig = s.sign_ecdsa_recoverable(msg, &sk); - assert_eq!(s.recover_ecdsa(&msg, &sig), Ok(pk)); + assert_eq!(s.recover_ecdsa(msg, &sig), Ok(pk)); } #[test] @@ -371,9 +371,9 @@ mod tests { let (sk, pk) = s.generate_keypair(&mut rand::thread_rng()); - let sig = s.sign_ecdsa_recoverable_with_noncedata(&msg, &sk, &noncedata); + let sig = s.sign_ecdsa_recoverable_with_noncedata(msg, &sk, &noncedata); - assert_eq!(s.recover_ecdsa(&msg, &sig), Ok(pk)); + assert_eq!(s.recover_ecdsa(msg, &sig), Ok(pk)); } #[test] @@ -386,10 +386,10 @@ mod tests { // Zero is not a valid sig let sig = RecoverableSignature::from_compact(&[0; 64], RecoveryId::Zero).unwrap(); - assert_eq!(s.recover_ecdsa(&msg, &sig), Err(Error::InvalidSignature)); + assert_eq!(s.recover_ecdsa(msg, &sig), Err(Error::InvalidSignature)); // ...but 111..111 is let sig = RecoverableSignature::from_compact(&[1; 64], RecoveryId::Zero).unwrap(); - assert!(s.recover_ecdsa(&msg, &sig).is_ok()); + assert!(s.recover_ecdsa(msg, &sig).is_ok()); } #[test] diff --git a/src/key.rs b/src/key.rs index 6c1d8b5f2..ae2b59393 100644 --- a/src/key.rs +++ b/src/key.rs @@ -338,7 +338,9 @@ impl SecretKey { /// Constructs an ECDSA signature for `msg` using the global [`SECP256K1`] context. #[inline] #[cfg(feature = "global-context")] - pub fn sign_ecdsa(&self, msg: Message) -> ecdsa::Signature { SECP256K1.sign_ecdsa(&msg, self) } + pub fn sign_ecdsa(&self, msg: impl Into) -> ecdsa::Signature { + SECP256K1.sign_ecdsa(msg, self) + } /// Returns the [`Keypair`] for this [`SecretKey`]. /// @@ -737,7 +739,7 @@ impl PublicKey { pub fn verify( &self, secp: &Secp256k1, - msg: &Message, + msg: impl Into, sig: &ecdsa::Signature, ) -> Result<(), Error> { secp.verify_ecdsa(msg, sig, self) diff --git a/src/lib.rs b/src/lib.rs index 9cfcb5c0a..f6d29d7d9 100644 --- a/src/lib.rs +++ b/src/lib.rs @@ -38,8 +38,8 @@ //! let digest = sha256::Hash::hash("Hello World!".as_bytes()); //! let message = Message::from_digest(digest.to_byte_array()); //! -//! let sig = secp.sign_ecdsa(&message, &secret_key); -//! assert!(secp.verify_ecdsa(&message, &sig, &public_key).is_ok()); +//! let sig = secp.sign_ecdsa(message, &secret_key); +//! assert!(secp.verify_ecdsa(message, &sig, &public_key).is_ok()); //! # } //! ``` //! @@ -55,7 +55,7 @@ //! let message = Message::from_digest(digest.to_byte_array()); //! //! let sig = secret_key.sign_ecdsa(message); -//! assert!(sig.verify(&message, &public_key).is_ok()); +//! assert!(sig.verify(message, &public_key).is_ok()); //! # } //! ``` //! @@ -75,8 +75,8 @@ //! // be cryptographically broken. It has been trivially used in the past to execute attacks. //! let message = Message::from_digest(compute_hash(b"CSW is not Satoshi")); //! -//! let sig = secp.sign_ecdsa(&message, &secret_key); -//! assert!(secp.verify_ecdsa(&message, &sig, &public_key).is_ok()); +//! let sig = secp.sign_ecdsa(message, &secret_key); +//! assert!(secp.verify_ecdsa(message, &sig, &public_key).is_ok()); //! # } //! ``` //! @@ -543,12 +543,12 @@ mod tests { let (sk, pk) = full.generate_keypair(&mut rand::thread_rng()); let msg = Message::from_digest([2u8; 32]); // Try signing - assert_eq!(sign.sign_ecdsa(&msg, &sk), full.sign_ecdsa(&msg, &sk)); - let sig = full.sign_ecdsa(&msg, &sk); + assert_eq!(sign.sign_ecdsa(msg, &sk), full.sign_ecdsa(msg, &sk)); + let sig = full.sign_ecdsa(msg, &sk); // Try verifying - assert!(vrfy.verify_ecdsa(&msg, &sig, &pk).is_ok()); - assert!(full.verify_ecdsa(&msg, &sig, &pk).is_ok()); + assert!(vrfy.verify_ecdsa(msg, &sig, &pk).is_ok()); + assert!(full.verify_ecdsa(msg, &sig, &pk).is_ok()); // The following drop will have no effect; in fact, they will trigger a compiler // error because manually dropping a `ManuallyDrop` is almost certainly incorrect. @@ -610,12 +610,12 @@ mod tests { let (sk, pk) = full.generate_keypair(&mut rand::thread_rng()); let msg = Message::from_digest([2u8; 32]); // Try signing - assert_eq!(sign.sign_ecdsa(&msg, &sk), full.sign_ecdsa(&msg, &sk)); - let sig = full.sign_ecdsa(&msg, &sk); + assert_eq!(sign.sign_ecdsa(msg, &sk), full.sign_ecdsa(msg, &sk)); + let sig = full.sign_ecdsa(msg, &sk); // Try verifying - assert!(vrfy.verify_ecdsa(&msg, &sig, &pk).is_ok()); - assert!(full.verify_ecdsa(&msg, &sig, &pk).is_ok()); + assert!(vrfy.verify_ecdsa(msg, &sig, &pk).is_ok()); + assert!(full.verify_ecdsa(msg, &sig, &pk).is_ok()); } #[test] @@ -632,12 +632,12 @@ mod tests { let (sk, pk) = full.generate_keypair(&mut rand::thread_rng()); // Try signing - assert_eq!(sign.sign_ecdsa(&msg, &sk), full.sign_ecdsa(&msg, &sk)); - let sig = full.sign_ecdsa(&msg, &sk); + assert_eq!(sign.sign_ecdsa(msg, &sk), full.sign_ecdsa(msg, &sk)); + let sig = full.sign_ecdsa(msg, &sk); // Try verifying - assert!(vrfy.verify_ecdsa(&msg, &sig, &pk).is_ok()); - assert!(full.verify_ecdsa(&msg, &sig, &pk).is_ok()); + assert!(vrfy.verify_ecdsa(msg, &sig, &pk).is_ok()); + assert!(full.verify_ecdsa(msg, &sig, &pk).is_ok()); // Check that we can produce keys from slices with no precomputation let (pk_slice, sk_slice) = (&pk.serialize(), &sk[..]); @@ -658,7 +658,7 @@ mod tests { let msg = Message::from_digest(msg); let (sk, _) = s.generate_keypair(&mut rand::thread_rng()); - let sig1 = s.sign_ecdsa(&msg, &sk); + let sig1 = s.sign_ecdsa(msg, &sk); let der = sig1.serialize_der(); let sig2 = ecdsa::Signature::from_der(&der[..]).unwrap(); assert_eq!(sig1, sig2); @@ -749,14 +749,14 @@ mod tests { let msg = Message::from_digest(msg); let (sk, pk) = s.generate_keypair(&mut rand::thread_rng()); - let sig = s.sign_ecdsa(&msg, &sk); - assert_eq!(s.verify_ecdsa(&msg, &sig, &pk), Ok(())); - let noncedata_sig = s.sign_ecdsa_with_noncedata(&msg, &sk, &noncedata); - assert_eq!(s.verify_ecdsa(&msg, &noncedata_sig, &pk), Ok(())); - let low_r_sig = s.sign_ecdsa_low_r(&msg, &sk); - assert_eq!(s.verify_ecdsa(&msg, &low_r_sig, &pk), Ok(())); - let grind_r_sig = s.sign_ecdsa_grind_r(&msg, &sk, 1); - assert_eq!(s.verify_ecdsa(&msg, &grind_r_sig, &pk), Ok(())); + let sig = s.sign_ecdsa(msg, &sk); + assert_eq!(s.verify_ecdsa(msg, &sig, &pk), Ok(())); + let noncedata_sig = s.sign_ecdsa_with_noncedata(msg, &sk, &noncedata); + assert_eq!(s.verify_ecdsa(msg, &noncedata_sig, &pk), Ok(())); + let low_r_sig = s.sign_ecdsa_low_r(msg, &sk); + assert_eq!(s.verify_ecdsa(msg, &low_r_sig, &pk), Ok(())); + let grind_r_sig = s.sign_ecdsa_grind_r(msg, &sk, 1); + assert_eq!(s.verify_ecdsa(msg, &grind_r_sig, &pk), Ok(())); let compact = sig.serialize_compact(); if compact[0] < 0x80 { assert_eq!(sig, low_r_sig); @@ -794,13 +794,13 @@ mod tests { for key in wild_keys.iter().map(|k| SecretKey::from_slice(&k[..]).unwrap()) { for msg in wild_msgs.into_iter().map(Message::from_digest) { - let sig = s.sign_ecdsa(&msg, &key); - let low_r_sig = s.sign_ecdsa_low_r(&msg, &key); - let grind_r_sig = s.sign_ecdsa_grind_r(&msg, &key, 1); + let sig = s.sign_ecdsa(msg, &key); + let low_r_sig = s.sign_ecdsa_low_r(msg, &key); + let grind_r_sig = s.sign_ecdsa_grind_r(msg, &key, 1); let pk = PublicKey::from_secret_key(&s, &key); - assert_eq!(s.verify_ecdsa(&msg, &sig, &pk), Ok(())); - assert_eq!(s.verify_ecdsa(&msg, &low_r_sig, &pk), Ok(())); - assert_eq!(s.verify_ecdsa(&msg, &grind_r_sig, &pk), Ok(())); + assert_eq!(s.verify_ecdsa(msg, &sig, &pk), Ok(())); + assert_eq!(s.verify_ecdsa(msg, &low_r_sig, &pk), Ok(())); + assert_eq!(s.verify_ecdsa(msg, &grind_r_sig, &pk), Ok(())); } } } @@ -816,11 +816,11 @@ mod tests { let (sk, pk) = s.generate_keypair(&mut rand::thread_rng()); - let sig = s.sign_ecdsa(&msg, &sk); + let sig = s.sign_ecdsa(msg, &sk); let msg = crate::random_32_bytes(&mut rand::thread_rng()); let msg = Message::from_digest(msg); - assert_eq!(s.verify_ecdsa(&msg, &sig, &pk), Err(Error::IncorrectSignature)); + assert_eq!(s.verify_ecdsa(msg, &sig, &pk), Err(Error::IncorrectSignature)); } #[test] @@ -891,7 +891,7 @@ mod tests { let expected_sig = hex!("24861b3edd4e7da43319c635091405feced6efa4ec99c3c3c35f6c3ba0ed8816116772e84994084db85a6c20589f6a85af569d42275c2a5dd900da5776b99d5d"); let expected_sig = ecdsa::Signature::from_compact(&expected_sig).unwrap(); - let sig = secp.sign_ecdsa_with_noncedata(&msg, &sk, &noncedata); + let sig = secp.sign_ecdsa_with_noncedata(msg, &sk, &noncedata); assert_eq!(expected_sig, sig); } @@ -913,10 +913,10 @@ mod tests { let msg = Message::from_digest(msg); // without normalization we expect this will fail - assert_eq!(secp.verify_ecdsa(&msg, &sig, &pk), Err(Error::IncorrectSignature)); + assert_eq!(secp.verify_ecdsa(msg, &sig, &pk), Err(Error::IncorrectSignature)); // after normalization it should pass sig.normalize_s(); - assert_eq!(secp.verify_ecdsa(&msg, &sig, &pk), Ok(())); + assert_eq!(secp.verify_ecdsa(msg, &sig, &pk), Ok(())); } #[test] @@ -932,7 +932,7 @@ mod tests { let expected_sig = hex!("047dd4d049db02b430d24c41c7925b2725bcd5a85393513bdec04b4dc363632b1054d0180094122b380f4cfa391e6296244da773173e78fc745c1b9c79f7b713"); let expected_sig = ecdsa::Signature::from_compact(&expected_sig).unwrap(); - let sig = secp.sign_ecdsa_low_r(&msg, &sk); + let sig = secp.sign_ecdsa_low_r(msg, &sk); assert_eq!(expected_sig, sig); } @@ -949,7 +949,7 @@ mod tests { .unwrap(); let expected_sig = ecdsa::Signature::from_str("304302202ffc447100d518c8ba643d11f3e6a83a8640488e7d2537b1954b942408be6ea3021f26e1248dd1e52160c3a38af9769d91a1a806cab5f9d508c103464d3c02d6e1").unwrap(); - let sig = secp.sign_ecdsa_grind_r(&msg, &sk, 2); + let sig = secp.sign_ecdsa_grind_r(msg, &sk, 2); assert_eq!(expected_sig, sig); } @@ -965,7 +965,7 @@ mod tests { let msg = Message::from_digest([1; 32]); let sk = SecretKey::from_slice(&[2; 32]).unwrap(); - let sig = s.sign_ecdsa(&msg, &sk); + let sig = s.sign_ecdsa(msg, &sk); static SIG_BYTES: [u8; 71] = [ 48, 69, 2, 33, 0, 157, 11, 173, 87, 103, 25, 211, 42, 231, 107, 237, 179, 76, 119, 72, 102, 103, 60, 189, 227, 244, 225, 41, 81, 85, 92, 148, 8, 230, 206, 119, 75, 2, 32, 40, @@ -999,8 +999,8 @@ mod tests { let pk = PublicKey::from_secret_key(SECP256K1, &sk); // Check usage as self - let sig = SECP256K1.sign_ecdsa(&msg, &sk); - assert!(SECP256K1.verify_ecdsa(&msg, &sig, &pk).is_ok()); + let sig = SECP256K1.sign_ecdsa(msg, &sk); + assert!(SECP256K1.verify_ecdsa(msg, &sig, &pk).is_ok()); } } @@ -1031,7 +1031,7 @@ mod benches { let (sk, _) = s.generate_keypair(&mut rand::thread_rng()); bh.iter(|| { - let sig = s.sign_ecdsa(&msg, &sk); + let sig = s.sign_ecdsa(msg, &sk); black_box(sig); }); } @@ -1042,10 +1042,10 @@ mod benches { let msg = crate::random_32_bytes(&mut rand::thread_rng()); let msg = Message::from_digest(msg); let (sk, pk) = s.generate_keypair(&mut rand::thread_rng()); - let sig = s.sign_ecdsa(&msg, &sk); + let sig = s.sign_ecdsa(msg, &sk); bh.iter(|| { - let res = s.verify_ecdsa(&msg, &sig, &pk).unwrap(); + let res = s.verify_ecdsa(msg, &sig, &pk).unwrap(); black_box(res); }); }