Merge bitcoin-core/secp256k1#1550: fix: typos in secp256k1.c

0e2fadb20c fix: typos in secp256k1.c (Elliot Lee)

Pull request description:

ACKs for top commit:
  real-or-random:
    utACK 0e2fadb20c

Tree-SHA512: a57c8237def1887b5ee3b3a3ba50aad16b2bcb4a5ef6850abaefca1cacd5ee6a153ca1cebc85d31b9d2202dfe0ee869709659ac932508ca5c4520823a450ada9
This commit is contained in:
merge-script
2024-06-25 09:59:22 +02:00

View File

@@ -76,7 +76,7 @@ const secp256k1_context *secp256k1_context_no_precomp = &secp256k1_context_stati
/* Helper function that determines if a context is proper, i.e., is not the static context or a copy thereof.
*
* This is intended for "context" functions such as secp256k1_context_clone. Function which need specific
* This is intended for "context" functions such as secp256k1_context_clone. Functions that need specific
* features of a context should still check for these features directly. For example, a function that needs
* ecmult_gen should directly check for the existence of the ecmult_gen context. */
static int secp256k1_context_is_proper(const secp256k1_context* ctx) {
@@ -544,7 +544,7 @@ static int secp256k1_ecdsa_sign_inner(const secp256k1_context* ctx, secp256k1_sc
break;
}
is_nonce_valid = secp256k1_scalar_set_b32_seckey(&non, nonce32);
/* The nonce is still secret here, but it being invalid is is less likely than 1:2^255. */
/* The nonce is still secret here, but it being invalid is less likely than 1:2^255. */
secp256k1_declassify(ctx, &is_nonce_valid, sizeof(is_nonce_valid));
if (is_nonce_valid) {
ret = secp256k1_ecdsa_sig_sign(&ctx->ecmult_gen_ctx, r, s, &sec, &msg, &non, recid);