@@ -426,8 +426,8 @@ SECP256K1_API SECP256K1_WARN_UNUSED_RESULT int secp256k1_ec_pubkey_cmp(
426
426
* encoding is invalid. R and S with value 0 are allowed in the encoding.
427
427
*
428
428
* After the call, sig will always be initialized. If parsing failed or R or
429
- * S are zero, the resulting sig value is guaranteed to fail validation for any
430
- * message and public key.
429
+ * S are zero, the resulting sig value is guaranteed to fail verification for
430
+ * any message and public key.
431
431
*/
432
432
SECP256K1_API int secp256k1_ecdsa_signature_parse_compact (
433
433
const secp256k1_context * ctx ,
@@ -447,7 +447,7 @@ SECP256K1_API int secp256k1_ecdsa_signature_parse_compact(
447
447
* encoded numbers are out of range.
448
448
*
449
449
* After the call, sig will always be initialized. If parsing failed or the
450
- * encoded numbers are out of range, signature validation with it is
450
+ * encoded numbers are out of range, signature verification with it is
451
451
* guaranteed to fail for every message and public key.
452
452
*/
453
453
SECP256K1_API int secp256k1_ecdsa_signature_parse_der (
@@ -511,7 +511,7 @@ SECP256K1_API int secp256k1_ecdsa_signature_serialize_compact(
511
511
*
512
512
* If you need to accept ECDSA signatures from sources that do not obey this
513
513
* rule, apply secp256k1_ecdsa_signature_normalize to the signature prior to
514
- * validation , but be aware that doing so results in malleable signatures.
514
+ * verification , but be aware that doing so results in malleable signatures.
515
515
*
516
516
* For details, see the comments for that function.
517
517
*/
0 commit comments