@@ -351,7 +351,7 @@ SECP256K1_API void secp256k1_context_destroy(
351351 * the data pointer argument set to NULL.
352352 *
353353 * Args: ctx: pointer to a context object.
354- * In: fun: a pointer to a function to call when an illegal argument is
354+ * In: fun: pointer to a function to call when an illegal argument is
355355 * passed to the API, taking a message and an opaque pointer.
356356 * (NULL restores the default handler.)
357357 * data: the opaque pointer to pass to fun above, must be NULL for the default handler.
@@ -378,7 +378,7 @@ SECP256K1_API void secp256k1_context_set_illegal_callback(
378378 * crashing.
379379 *
380380 * Args: ctx: pointer to a context object.
381- * In: fun: a pointer to a function to call when an internal error occurs,
381+ * In: fun: pointer to a function to call when an internal error occurs,
382382 * taking a message and an opaque pointer (NULL restores the
383383 * default handler, see secp256k1_context_set_illegal_callback
384384 * for details).
@@ -407,7 +407,7 @@ SECP256K1_API SECP256K1_WARN_UNUSED_RESULT secp256k1_scratch_space *secp256k1_sc
407407/** Destroy a secp256k1 scratch space.
408408 *
409409 * The pointer may not be used afterwards.
410- * Args: ctx: a pointer to a context object.
410+ * Args: ctx: pointer to a context object.
411411 * scratch: space to destroy
412412 */
413413SECP256K1_API void secp256k1_scratch_space_destroy (
@@ -440,13 +440,13 @@ SECP256K1_API SECP256K1_WARN_UNUSED_RESULT int secp256k1_ec_pubkey_parse(
440440 *
441441 * Returns: 1 always.
442442 * Args: ctx: pointer to a context object.
443- * Out: output: a pointer to a 65-byte (if compressed==0) or 33-byte (if
443+ * Out: output: pointer to a 65-byte (if compressed==0) or 33-byte (if
444444 * compressed==1) byte array to place the serialized key
445445 * in.
446- * In/Out: outputlen: a pointer to an integer which is initially set to the
446+ * In/Out: outputlen: pointer to an integer which is initially set to the
447447 * size of output, and is overwritten with the written
448448 * size.
449- * In: pubkey: a pointer to a secp256k1_pubkey containing an
449+ * In: pubkey: pointer to a secp256k1_pubkey containing an
450450 * initialized public key.
451451 * flags: SECP256K1_EC_COMPRESSED if serialization should be in
452452 * compressed format, otherwise SECP256K1_EC_UNCOMPRESSED.
@@ -499,8 +499,8 @@ SECP256K1_API int secp256k1_ecdsa_signature_parse_compact(
499499 *
500500 * Returns: 1 when the signature could be parsed, 0 otherwise.
501501 * Args: ctx: pointer to a context object
502- * Out: sig: a pointer to a signature object
503- * In: input: a pointer to the signature to be parsed
502+ * Out: sig: pointer to a signature object
503+ * In: input: pointer to the signature to be parsed
504504 * inputlen: the length of the array pointed to be input
505505 *
506506 * This function will accept any valid DER encoded signature, even if the
@@ -521,12 +521,12 @@ SECP256K1_API int secp256k1_ecdsa_signature_parse_der(
521521 *
522522 * Returns: 1 if enough space was available to serialize, 0 otherwise
523523 * Args: ctx: pointer to a context object
524- * Out: output: a pointer to an array to store the DER serialization
525- * In/Out: outputlen: a pointer to a length integer. Initially, this integer
524+ * Out: output: pointer to an array to store the DER serialization
525+ * In/Out: outputlen: pointer to a length integer. Initially, this integer
526526 * should be set to the length of output. After the call
527527 * it will be set to the length of the serialization (even
528528 * if 0 was returned).
529- * In: sig: a pointer to an initialized signature object
529+ * In: sig: pointer to an initialized signature object
530530 */
531531SECP256K1_API int secp256k1_ecdsa_signature_serialize_der (
532532 const secp256k1_context * ctx ,
@@ -586,11 +586,11 @@ SECP256K1_API SECP256K1_WARN_UNUSED_RESULT int secp256k1_ecdsa_verify(
586586 *
587587 * Returns: 1 if sigin was not normalized, 0 if it already was.
588588 * Args: ctx: pointer to a context object
589- * Out: sigout: a pointer to a signature to fill with the normalized form,
589+ * Out: sigout: pointer to a signature to fill with the normalized form,
590590 * or copy if the input was already normalized. (can be NULL if
591591 * you're only interested in whether the input was already
592592 * normalized).
593- * In: sigin: a pointer to a signature to check/normalize (can be identical to sigout)
593+ * In: sigin: pointer to a signature to check/normalize (can be identical to sigout)
594594 *
595595 * With ECDSA a third-party can forge a second distinct signature of the same
596596 * message, given a single initial signature, but without knowing the key. This
0 commit comments