@@ -44,7 +44,7 @@ fn exec_generate<'a>(matches: &clap::ArgMatches<'a>) {
4444 let privkey = bitcoin:: PrivateKey {
4545 compressed : true ,
4646 network : network,
47- key : secret_key,
47+ inner : secret_key,
4848 } ;
4949 let pubkey = privkey. public_key ( & secp) ;
5050
@@ -76,7 +76,7 @@ fn exec_inspect<'a>(matches: &clap::ArgMatches<'a>) {
7676 let pubkey = privkey. public_key ( & secp256k1:: Secp256k1 :: new ( ) ) ;
7777
7878 hal:: key:: KeyInfo {
79- raw_private_key : ( & privkey. key [ ..] ) . into ( ) ,
79+ raw_private_key : ( & privkey. inner [ ..] ) . into ( ) ,
8080 wif_private_key : Some ( privkey) ,
8181 public_key : pubkey,
8282 uncompressed_public_key : {
@@ -90,7 +90,7 @@ fn exec_inspect<'a>(matches: &clap::ArgMatches<'a>) {
9090 let pubkey = secp256k1:: PublicKey :: from_secret_key ( & secp256k1:: Secp256k1 :: new ( ) , & sk) ;
9191 let btc_pubkey = PublicKey {
9292 compressed : true ,
93- key : pubkey. clone ( ) ,
93+ inner : pubkey. clone ( ) ,
9494 } ;
9595 let network = cmd:: network ( matches) ;
9696 hal:: key:: KeyInfo {
@@ -99,7 +99,7 @@ fn exec_inspect<'a>(matches: &clap::ArgMatches<'a>) {
9999 public_key : btc_pubkey,
100100 uncompressed_public_key : PublicKey {
101101 compressed : false ,
102- key : pubkey,
102+ inner : pubkey,
103103 } ,
104104 addresses : hal:: address:: Addresses :: from_pubkey ( & btc_pubkey, network) ,
105105 }
@@ -132,12 +132,12 @@ fn exec_sign<'a>(matches: &clap::ArgMatches<'a>) {
132132 if let Ok ( sk) = secp256k1:: SecretKey :: from_str ( & pk) {
133133 sk
134134 } else {
135- bitcoin:: PrivateKey :: from_wif ( & pk) . expect ( "invalid private key provided" ) . key
135+ bitcoin:: PrivateKey :: from_wif ( & pk) . expect ( "invalid private key provided" ) . inner
136136 }
137137 } ;
138138
139139 let secp = secp256k1:: Secp256k1 :: signing_only ( ) ;
140- let signature = secp. sign ( & msg, & privkey) ;
140+ let signature = secp. sign_ecdsa ( & msg, & privkey) ;
141141
142142 let info = hal:: key:: SignatureInfo {
143143 der : signature. serialize_der ( ) . as_ref ( ) . into ( ) ,
@@ -147,14 +147,14 @@ fn exec_sign<'a>(matches: &clap::ArgMatches<'a>) {
147147}
148148
149149fn cmd_verify < ' a > ( ) -> clap:: App < ' a , ' a > {
150- cmd:: subcommand ( "verify" , "verify signatures\n \n NOTE!! For SHA-256-d hashes, the --reverse \
150+ cmd:: subcommand ( "verify" , "verify ecdsa signatures\n \n NOTE!! For SHA-256-d hashes, the --reverse \
151151 flag must be used because Bitcoin Core reverses the hex order for those!") . args ( & [
152152 cmd:: opt_yaml ( ) ,
153153 cmd:: opt ( "reverse" , "reverse the message" ) ,
154154 cmd:: opt ( "no-try-reverse" , "don't try to verify for reversed message" ) ,
155155 cmd:: arg ( "message" , "the message to be signed in hex (must be 32 bytes)" ) . required ( true ) ,
156156 cmd:: arg ( "pubkey" , "the public key in hex" ) . required ( true ) ,
157- cmd:: arg ( "signature" , "the signature in hex" ) . required ( true ) ,
157+ cmd:: arg ( "signature" , "the ecdsa signature in hex" ) . required ( true ) ,
158158 ] )
159159}
160160
@@ -171,20 +171,20 @@ fn exec_verify<'a>(matches: &clap::ArgMatches<'a>) {
171171 let hex = matches. value_of ( "signature" ) . expect ( "no signature provided" ) ;
172172 let bytes = hex:: decode ( & hex) . expect ( "invalid signature: not hex" ) ;
173173 if bytes. len ( ) == 64 {
174- secp256k1:: Signature :: from_compact ( & bytes) . expect ( "invalid signature" )
174+ secp256k1:: ecdsa :: Signature :: from_compact ( & bytes) . expect ( "invalid signature" )
175175 } else {
176- secp256k1:: Signature :: from_der ( & bytes) . expect ( "invalid DER signature" )
176+ secp256k1:: ecdsa :: Signature :: from_der ( & bytes) . expect ( "invalid DER signature" )
177177 }
178178 } ;
179179
180180 let secp = secp256k1:: Secp256k1 :: verification_only ( ) ;
181- let valid = secp. verify ( & msg, & sig, & pubkey. key ) . is_ok ( ) ;
181+ let valid = secp. verify_ecdsa ( & msg, & sig, & pubkey. inner ) . is_ok ( ) ;
182182
183183 // Perhaps the user should have passed --reverse.
184184 if !valid && !matches. is_present ( "no-try-reverse" ) {
185185 msg_bytes. reverse ( ) ;
186186 let msg = secp256k1:: Message :: from_slice ( & msg_bytes[ ..] ) . expect ( "invalid message to be signed" ) ;
187- if secp. verify ( & msg, & sig, & pubkey. key ) . is_ok ( ) {
187+ if secp. verify_ecdsa ( & msg, & sig, & pubkey. inner ) . is_ok ( ) {
188188 eprintln ! ( "Signature is valid for the reverse message." ) ;
189189 if matches. is_present ( "reverse" ) {
190190 eprintln ! ( "Try dropping the --reverse" ) ;
0 commit comments