Skip to content

Commit 7eee6ee

Browse files
committed
Run the formatter
1 parent a9487d0 commit 7eee6ee

File tree

9 files changed

+248
-315
lines changed

9 files changed

+248
-315
lines changed

examples/sign_verify.rs

Lines changed: 2 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -17,22 +17,15 @@ extern crate secp256k1;
1717

1818
use secp256k1::{ecdsa, Error, Message, PublicKey, SecretKey};
1919

20-
fn verify(
21-
sig: [u8; 64],
22-
msg_digest: [u8; 32],
23-
pubkey: [u8; 33],
24-
) -> Result<bool, Error> {
20+
fn verify(sig: [u8; 64], msg_digest: [u8; 32], pubkey: [u8; 33]) -> Result<bool, Error> {
2521
let msg = Message::from_digest(msg_digest);
2622
let sig = ecdsa::Signature::from_compact(&sig)?;
2723
let pubkey = PublicKey::from_slice(&pubkey)?;
2824

2925
Ok(ecdsa::verify(&sig, msg, &pubkey).is_ok())
3026
}
3127

32-
fn sign(
33-
msg_digest: [u8; 32],
34-
seckey: [u8; 32],
35-
) -> Result<ecdsa::Signature, Error> {
28+
fn sign(msg_digest: [u8; 32], seckey: [u8; 32]) -> Result<ecdsa::Signature, Error> {
3629
let msg = Message::from_digest(msg_digest);
3730
let seckey = SecretKey::from_secret_bytes(seckey)?;
3831
Ok(ecdsa::sign(msg, &seckey))

secp256k1-sys/src/lib.rs

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,3 @@
1-
2-
31
//! # secp256k1-sys FFI bindings
42
//! Direct bindings to the underlying C library functions. These should
53
//! not be needed for most users.

src/ecdsa/mod.rs

Lines changed: 33 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,7 @@ use core::{fmt, ptr, str};
1313
pub use self::recovery::{RecoverableSignature, RecoveryId};
1414
pub use self::serialized_signature::SerializedSignature;
1515
use crate::ffi::CPtr;
16-
use crate::{
17-
ecdsa, ffi, from_hex, Error, Message, PublicKey, Secp256k1, SecretKey,
18-
};
16+
use crate::{ecdsa, ffi, from_hex, Error, Message, PublicKey, Secp256k1, SecretKey};
1917

2018
/// An ECDSA signature
2119
#[derive(Copy, Clone, PartialOrd, Ord, PartialEq, Eq, Hash)]
@@ -253,19 +251,21 @@ fn sign_ecdsa_with_noncedata_pointer(
253251
// We can assume the return value because it's not possible to construct
254252
// an invalid signature from a valid `Message` and `SecretKey`
255253
let res = crate::with_global_context(
256-
|secp: &Secp256k1<crate::AllPreallocated>| ffi::secp256k1_ecdsa_sign(
257-
secp.ctx.as_ptr(),
258-
&mut ret,
259-
msg.as_c_ptr(),
260-
sk.as_c_ptr(),
261-
ffi::secp256k1_nonce_function_rfc6979,
262-
noncedata_ptr
263-
),
254+
|secp: &Secp256k1<crate::AllPreallocated>| {
255+
ffi::secp256k1_ecdsa_sign(
256+
secp.ctx.as_ptr(),
257+
&mut ret,
258+
msg.as_c_ptr(),
259+
sk.as_c_ptr(),
260+
ffi::secp256k1_nonce_function_rfc6979,
261+
noncedata_ptr,
262+
)
263+
},
264264
Some(&sk.to_secret_bytes()),
265265
);
266266

267267
assert_eq!(res, 1);
268-
268+
269269
Signature::from(ret)
270270
}
271271
}
@@ -304,14 +304,16 @@ fn sign_grind_with_check(
304304
// We can assume the return value because it's not possible to construct
305305
// an invalid signature from a valid `Message` and `SecretKey`
306306
let res = crate::with_global_context(
307-
|secp: &Secp256k1<crate::AllPreallocated>| ffi::secp256k1_ecdsa_sign(
308-
secp.ctx.as_ptr(),
309-
&mut ret,
310-
msg.as_c_ptr(),
311-
sk.as_c_ptr(),
312-
ffi::secp256k1_nonce_function_rfc6979,
313-
entropy_p
314-
),
307+
|secp: &Secp256k1<crate::AllPreallocated>| {
308+
ffi::secp256k1_ecdsa_sign(
309+
secp.ctx.as_ptr(),
310+
&mut ret,
311+
msg.as_c_ptr(),
312+
sk.as_c_ptr(),
313+
ffi::secp256k1_nonce_function_rfc6979,
314+
entropy_p,
315+
)
316+
},
315317
Some(&sk.to_secret_bytes()),
316318
);
317319
assert_eq!(res, 1);
@@ -337,11 +339,7 @@ fn sign_grind_with_check(
337339
/// of signing operation performed by this function is exponential in the
338340
/// number of bytes grinded.
339341
/// Requires a signing capable context.
340-
pub fn sign_grind_r(
341-
msg: impl Into<Message>,
342-
sk: &SecretKey,
343-
bytes_to_grind: usize,
344-
) -> Signature {
342+
pub fn sign_grind_r(msg: impl Into<Message>, sk: &SecretKey, bytes_to_grind: usize) -> Signature {
345343
let len_check = |s: &ffi::Signature| der_length_check(s, 71 - bytes_to_grind);
346344
sign_grind_with_check(msg, sk, len_check)
347345
}
@@ -377,21 +375,19 @@ pub fn sign_low_r(msg: impl Into<Message>, sk: &SecretKey) -> Signature {
377375
/// # }
378376
/// ```
379377
#[inline]
380-
pub fn verify(
381-
sig: &Signature,
382-
msg: impl Into<Message>,
383-
pk: &PublicKey,
384-
) -> Result<(), Error> {
378+
pub fn verify(sig: &Signature, msg: impl Into<Message>, pk: &PublicKey) -> Result<(), Error> {
385379
let msg = msg.into();
386380
unsafe {
387381
let res = crate::with_global_context(
388-
|secp: &Secp256k1<crate::AllPreallocated>| ffi::secp256k1_ecdsa_verify(
389-
secp.ctx.as_ptr(),
390-
sig.as_c_ptr(),
391-
msg.as_c_ptr(),
392-
pk.as_c_ptr(),
393-
),
394-
None, // FIXME: What goes here?
382+
|secp: &Secp256k1<crate::AllPreallocated>| {
383+
ffi::secp256k1_ecdsa_verify(
384+
secp.ctx.as_ptr(),
385+
sig.as_c_ptr(),
386+
msg.as_c_ptr(),
387+
pk.as_c_ptr(),
388+
)
389+
},
390+
None, // FIXME: What goes here?
395391
);
396392
if res == 0 {
397393
Err(Error::IncorrectSignature)

src/ellswift.rs

Lines changed: 12 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -114,21 +114,20 @@ impl ElligatorSwift {
114114
/// let es = ElligatorSwift::from_seckey(sk, None);
115115
/// # }
116116
/// ```
117-
pub fn from_seckey(
118-
sk: SecretKey,
119-
aux_rand: Option<[u8; 32]>,
120-
) -> ElligatorSwift {
117+
pub fn from_seckey(sk: SecretKey, aux_rand: Option<[u8; 32]>) -> ElligatorSwift {
121118
let mut es_out = [0u8; constants::ELLSWIFT_ENCODING_SIZE];
122119
let aux_rand_ptr = aux_rand.as_c_ptr();
123120
unsafe {
124121
let ret = crate::with_global_context(
125-
|secp: &Secp256k1<crate::AllPreallocated>| ffi::secp256k1_ellswift_create(
126-
secp.ctx().as_ptr(),
127-
es_out.as_mut_c_ptr(),
128-
sk.as_c_ptr(),
129-
aux_rand_ptr,
130-
),
131-
Some(&sk.to_secret_bytes()),
122+
|secp: &Secp256k1<crate::AllPreallocated>| {
123+
ffi::secp256k1_ellswift_create(
124+
secp.ctx().as_ptr(),
125+
es_out.as_mut_c_ptr(),
126+
sk.as_c_ptr(),
127+
aux_rand_ptr,
128+
)
129+
},
130+
Some(&sk.to_secret_bytes()),
132131
);
133132
debug_assert_eq!(ret, 1);
134133
}
@@ -386,11 +385,9 @@ mod tests {
386385
// Test that we can round trip an ElligatorSwift created from a secret key
387386
let rand32 = [1u8; 32];
388387
let priv32 = [1u8; 32];
389-
let ell =
390-
ElligatorSwift::from_seckey(SecretKey::from_secret_bytes(rand32).unwrap(), None);
388+
let ell = ElligatorSwift::from_seckey(SecretKey::from_secret_bytes(rand32).unwrap(), None);
391389
let pk = PublicKey::from_ellswift(ell);
392-
let expected =
393-
PublicKey::from_secret_key(&SecretKey::from_secret_bytes(priv32).unwrap());
390+
let expected = PublicKey::from_secret_key(&SecretKey::from_secret_bytes(priv32).unwrap());
394391

395392
assert_eq!(pk, expected);
396393
}

0 commit comments

Comments
 (0)