@@ -133,7 +133,7 @@ impl RecoverableSignature {
133133/// verify-capable context. 
134134#[ inline]  
135135    #[ cfg( feature = "global-context" ) ]  
136-     pub  fn  recover ( & self ,  msg :  & Message )  -> Result < key:: PublicKey ,  Error >  { 
136+     pub  fn  recover ( & self ,  msg :  impl   Into < Message > )  -> Result < key:: PublicKey ,  Error >  { 
137137        crate :: SECP256K1 . recover_ecdsa ( msg,  self ) 
138138    } 
139139} 
@@ -154,7 +154,7 @@ impl From<ffi::RecoverableSignature> for RecoverableSignature {
154154impl < C :  Signing >  Secp256k1 < C >  { 
155155    fn  sign_ecdsa_recoverable_with_noncedata_pointer ( 
156156        & self , 
157-         msg :  & Message , 
157+         msg :  impl   Into < Message > , 
158158        sk :  & key:: SecretKey , 
159159        noncedata_ptr :  * const  super_ffi:: types:: c_void , 
160160    )  -> RecoverableSignature  { 
@@ -166,7 +166,7 @@ impl<C: Signing> Secp256k1<C> {
166166                ffi:: secp256k1_ecdsa_sign_recoverable( 
167167                    self . ctx. as_ptr( ) , 
168168                    & mut  ret, 
169-                     msg. as_c_ptr( ) , 
169+                     msg. into ( ) . as_c_ptr( ) , 
170170                    sk. as_c_ptr( ) , 
171171                    super_ffi:: secp256k1_nonce_function_rfc6979, 
172172                    noncedata_ptr
@@ -182,7 +182,7 @@ impl<C: Signing> Secp256k1<C> {
182182/// Requires a signing-capable context. 
183183pub  fn  sign_ecdsa_recoverable ( 
184184        & self , 
185-         msg :  & Message , 
185+         msg :  impl   Into < Message > , 
186186        sk :  & key:: SecretKey , 
187187    )  -> RecoverableSignature  { 
188188        self . sign_ecdsa_recoverable_with_noncedata_pointer ( msg,  sk,  ptr:: null ( ) ) 
@@ -195,7 +195,7 @@ impl<C: Signing> Secp256k1<C> {
195195/// Requires a signing-capable context. 
196196pub  fn  sign_ecdsa_recoverable_with_noncedata ( 
197197        & self , 
198-         msg :  & Message , 
198+         msg :  impl   Into < Message > , 
199199        sk :  & key:: SecretKey , 
200200        noncedata :  & [ u8 ;  32 ] , 
201201    )  -> RecoverableSignature  { 
@@ -209,7 +209,7 @@ impl<C: Verification> Secp256k1<C> {
209209/// `msg`. Requires a verify-capable context. 
210210pub  fn  recover_ecdsa ( 
211211        & self , 
212-         msg :  & Message , 
212+         msg :  impl   Into < Message > , 
213213        sig :  & RecoverableSignature , 
214214    )  -> Result < key:: PublicKey ,  Error >  { 
215215        unsafe  { 
@@ -218,7 +218,7 @@ impl<C: Verification> Secp256k1<C> {
218218                self . ctx . as_ptr ( ) , 
219219                & mut  pk, 
220220                sig. as_c_ptr ( ) , 
221-                 msg. as_c_ptr ( ) , 
221+                 msg. into ( ) . as_c_ptr ( ) , 
222222            )  != 1 
223223            { 
224224                return  Err ( Error :: InvalidSignature ) ; 
@@ -252,15 +252,15 @@ mod tests {
252252        let  ( sk,  pk)  = full. generate_keypair ( & mut  rand:: thread_rng ( ) ) ; 
253253
254254        // Try signing 
255-         assert_eq ! ( sign. sign_ecdsa_recoverable( & msg,  & sk) ,  full. sign_ecdsa_recoverable( & msg,  & sk) ) ; 
256-         let  sigr = full. sign_ecdsa_recoverable ( & msg,  & sk) ; 
255+         assert_eq ! ( sign. sign_ecdsa_recoverable( msg,  & sk) ,  full. sign_ecdsa_recoverable( msg,  & sk) ) ; 
256+         let  sigr = full. sign_ecdsa_recoverable ( msg,  & sk) ; 
257257
258258        // Try pk recovery 
259-         assert ! ( vrfy. recover_ecdsa( & msg,  & sigr) . is_ok( ) ) ; 
260-         assert ! ( full. recover_ecdsa( & msg,  & sigr) . is_ok( ) ) ; 
259+         assert ! ( vrfy. recover_ecdsa( msg,  & sigr) . is_ok( ) ) ; 
260+         assert ! ( full. recover_ecdsa( msg,  & sigr) . is_ok( ) ) ; 
261261
262-         assert_eq ! ( vrfy. recover_ecdsa( & msg,  & sigr) ,  full. recover_ecdsa( & msg,  & sigr) ) ; 
263-         assert_eq ! ( full. recover_ecdsa( & msg,  & sigr) ,  Ok ( pk) ) ; 
262+         assert_eq ! ( vrfy. recover_ecdsa( msg,  & sigr) ,  full. recover_ecdsa( msg,  & sigr) ) ; 
263+         assert_eq ! ( full. recover_ecdsa( msg,  & sigr) ,  Ok ( pk) ) ; 
264264    } 
265265
266266    #[ test]  
@@ -280,7 +280,7 @@ mod tests {
280280        let  sk = SecretKey :: from_slice ( & ONE ) . unwrap ( ) ; 
281281        let  msg = Message :: from_digest_slice ( & ONE ) . unwrap ( ) ; 
282282
283-         let  sig = s. sign_ecdsa_recoverable ( & msg,  & sk) ; 
283+         let  sig = s. sign_ecdsa_recoverable ( msg,  & sk) ; 
284284
285285        assert_eq ! ( Ok ( sig) ,  RecoverableSignature :: from_compact( & [ 
286286            0x66 ,  0x73 ,  0xff ,  0xad ,  0x21 ,  0x47 ,  0x74 ,  0x1f , 
@@ -306,7 +306,7 @@ mod tests {
306306        let  msg = Message :: from_digest_slice ( & ONE ) . unwrap ( ) ; 
307307        let  noncedata = [ 42u8 ;  32 ] ; 
308308
309-         let  sig = s. sign_ecdsa_recoverable_with_noncedata ( & msg,  & sk,  & noncedata) ; 
309+         let  sig = s. sign_ecdsa_recoverable_with_noncedata ( msg,  & sk,  & noncedata) ; 
310310
311311        assert_eq ! ( Ok ( sig) ,  RecoverableSignature :: from_compact( & [ 
312312            0xb5 ,  0x0b ,  0xb6 ,  0x79 ,  0x5f ,  0x31 ,  0x74 ,  0x8a , 
@@ -331,14 +331,14 @@ mod tests {
331331
332332        let  ( sk,  pk)  = s. generate_keypair ( & mut  rand:: thread_rng ( ) ) ; 
333333
334-         let  sigr = s. sign_ecdsa_recoverable ( & msg,  & sk) ; 
334+         let  sigr = s. sign_ecdsa_recoverable ( msg,  & sk) ; 
335335        let  sig = sigr. to_standard ( ) ; 
336336
337337        let  msg = crate :: random_32_bytes ( & mut  rand:: thread_rng ( ) ) ; 
338338        let  msg = Message :: from_digest_slice ( & msg) . unwrap ( ) ; 
339-         assert_eq ! ( s. verify_ecdsa( & msg,  & sig,  & pk) ,  Err ( Error :: IncorrectSignature ) ) ; 
339+         assert_eq ! ( s. verify_ecdsa( msg,  & sig,  & pk) ,  Err ( Error :: IncorrectSignature ) ) ; 
340340
341-         let  recovered_key = s. recover_ecdsa ( & msg,  & sigr) . unwrap ( ) ; 
341+         let  recovered_key = s. recover_ecdsa ( msg,  & sigr) . unwrap ( ) ; 
342342        assert ! ( recovered_key != pk) ; 
343343    } 
344344
@@ -353,9 +353,9 @@ mod tests {
353353
354354        let  ( sk,  pk)  = s. generate_keypair ( & mut  rand:: thread_rng ( ) ) ; 
355355
356-         let  sig = s. sign_ecdsa_recoverable ( & msg,  & sk) ; 
356+         let  sig = s. sign_ecdsa_recoverable ( msg,  & sk) ; 
357357
358-         assert_eq ! ( s. recover_ecdsa( & msg,  & sig) ,  Ok ( pk) ) ; 
358+         assert_eq ! ( s. recover_ecdsa( msg,  & sig) ,  Ok ( pk) ) ; 
359359    } 
360360
361361    #[ test]  
@@ -371,9 +371,9 @@ mod tests {
371371
372372        let  ( sk,  pk)  = s. generate_keypair ( & mut  rand:: thread_rng ( ) ) ; 
373373
374-         let  sig = s. sign_ecdsa_recoverable_with_noncedata ( & msg,  & sk,  & noncedata) ; 
374+         let  sig = s. sign_ecdsa_recoverable_with_noncedata ( msg,  & sk,  & noncedata) ; 
375375
376-         assert_eq ! ( s. recover_ecdsa( & msg,  & sig) ,  Ok ( pk) ) ; 
376+         assert_eq ! ( s. recover_ecdsa( msg,  & sig) ,  Ok ( pk) ) ; 
377377    } 
378378
379379    #[ test]  
@@ -386,10 +386,10 @@ mod tests {
386386
387387        // Zero is not a valid sig 
388388        let  sig = RecoverableSignature :: from_compact ( & [ 0 ;  64 ] ,  RecoveryId :: Zero ) . unwrap ( ) ; 
389-         assert_eq ! ( s. recover_ecdsa( & msg,  & sig) ,  Err ( Error :: InvalidSignature ) ) ; 
389+         assert_eq ! ( s. recover_ecdsa( msg,  & sig) ,  Err ( Error :: InvalidSignature ) ) ; 
390390        // ...but 111..111 is 
391391        let  sig = RecoverableSignature :: from_compact ( & [ 1 ;  64 ] ,  RecoveryId :: Zero ) . unwrap ( ) ; 
392-         assert ! ( s. recover_ecdsa( & msg,  & sig) . is_ok( ) ) ; 
392+         assert ! ( s. recover_ecdsa( msg,  & sig) . is_ok( ) ) ; 
393393    } 
394394
395395    #[ test]  
0 commit comments