@@ -426,8 +426,8 @@ SECP256K1_API SECP256K1_WARN_UNUSED_RESULT int secp256k1_ec_pubkey_cmp(
426426 * encoding is invalid. R and S with value 0 are allowed in the encoding.
427427 *
428428 * After the call, sig will always be initialized. If parsing failed or R or
429- * S are zero, the resulting sig value is guaranteed to fail validation for any
430- * message and public key.
429+ * S are zero, the resulting sig value is guaranteed to fail verification for
430+ * any message and public key.
431431 */
432432SECP256K1_API int secp256k1_ecdsa_signature_parse_compact (
433433 const secp256k1_context * ctx ,
@@ -447,7 +447,7 @@ SECP256K1_API int secp256k1_ecdsa_signature_parse_compact(
447447 * encoded numbers are out of range.
448448 *
449449 * After the call, sig will always be initialized. If parsing failed or the
450- * encoded numbers are out of range, signature validation with it is
450+ * encoded numbers are out of range, signature verification with it is
451451 * guaranteed to fail for every message and public key.
452452 */
453453SECP256K1_API int secp256k1_ecdsa_signature_parse_der (
@@ -511,7 +511,7 @@ SECP256K1_API int secp256k1_ecdsa_signature_serialize_compact(
511511 *
512512 * If you need to accept ECDSA signatures from sources that do not obey this
513513 * rule, apply secp256k1_ecdsa_signature_normalize to the signature prior to
514- * validation , but be aware that doing so results in malleable signatures.
514+ * verification , but be aware that doing so results in malleable signatures.
515515 *
516516 * For details, see the comments for that function.
517517 */
0 commit comments