@@ -63,8 +63,8 @@ type WrapParams struct {
63
63
// For asymmetric encryption Receiver is needed.
64
64
// For symmetric, SymmetricKey is needed. Sender is not mandatory but used to sign the message in both schemes.
65
65
type UnwrapParams struct {
66
- Sender * ecdsa.PublicKey // Private key of sender used for signature validation
67
- Receiver * ecdsa.PrivateKey // Public key of receiver for decryption
66
+ Sender * ecdsa.PublicKey // Public key of sender used for signature validation
67
+ Receiver * ecdsa.PrivateKey // Private key of receiver for decryption
68
68
SymmetricKey []byte // Symmetric key for decryption
69
69
}
70
70
@@ -89,10 +89,10 @@ type Message interface {
89
89
// KeyStore contains key manipulation methods
90
90
type KeyStore interface {
91
91
92
- // Asymmetric key management
93
- GetSymKey (id string ) ([]byte , error )
94
- GenerateSymKey () (string , error )
95
- AddSymKey (bytes []byte ) (string , error )
92
+ // Symmetric key management
93
+ GetSymmetricKey (id string ) ([]byte , error )
94
+ GenerateSymmetricKey () (string , error )
95
+ AddSymmetricKey (bytes []byte ) (string , error )
96
96
97
97
// Key serialization
98
98
SerializePublicKey (pub * ecdsa.PublicKey ) []byte
@@ -336,7 +336,7 @@ func (crypto *defaultCryptoBackend) sign(rawBytes []byte, key *ecdsa.PrivateKey)
336
336
}
337
337
rawBytes [0 ] |= signatureFlag // it is important to set this flag before signing
338
338
339
- hash := crypto . keccak256 (rawBytes )
339
+ hash := ethCrypto . Keccak256 (rawBytes )
340
340
signature , err := crypto .signHash (hash , key )
341
341
342
342
if err != nil {
@@ -353,8 +353,8 @@ func isMessageSigned(flags byte) bool {
353
353
354
354
// === Key store functions ===
355
355
356
- // GetSymKey retrieves symmetric key by id from the store
357
- func (crypto * defaultCryptoBackend ) GetSymKey (id string ) ([]byte , error ) {
356
+ // GetSymmetricKey retrieves symmetric key by id from the store
357
+ func (crypto * defaultCryptoBackend ) GetSymmetricKey (id string ) ([]byte , error ) {
358
358
crypto .keyMu .RLock ()
359
359
defer crypto .keyMu .RUnlock ()
360
360
if crypto .symKeys [id ] != nil {
@@ -363,13 +363,13 @@ func (crypto *defaultCryptoBackend) GetSymKey(id string) ([]byte, error) {
363
363
return nil , fmt .Errorf ("non-existent key ID" )
364
364
}
365
365
366
- // GenerateSymKey creates a new symmetric, stores it and return its id
367
- func (crypto * defaultCryptoBackend ) GenerateSymKey () (string , error ) {
366
+ // GenerateSymmetricKey creates a new symmetric, stores it and return its id
367
+ func (crypto * defaultCryptoBackend ) GenerateSymmetricKey () (string , error ) {
368
368
key , err := generateSecureRandomData (aesKeyLength )
369
369
if err != nil {
370
370
return "" , err
371
371
} else if ! validateDataIntegrity (key , aesKeyLength ) {
372
- return "" , fmt .Errorf ("error in GenerateSymKey : crypto/rand failed to generate random data" )
372
+ return "" , fmt .Errorf ("error in GenerateSymmetricKey : crypto/rand failed to generate random data" )
373
373
}
374
374
375
375
id , err := generateRandomKeyID ()
@@ -388,7 +388,7 @@ func (crypto *defaultCryptoBackend) GenerateSymKey() (string, error) {
388
388
}
389
389
390
390
// Add a symmetric key to the store generating an id and returning it
391
- func (crypto * defaultCryptoBackend ) AddSymKey (key []byte ) (string , error ) {
391
+ func (crypto * defaultCryptoBackend ) AddSymmetricKey (key []byte ) (string , error ) {
392
392
if len (key ) != aesKeyLength {
393
393
return "" , fmt .Errorf ("wrong key size: %d" , len (key ))
394
394
}
@@ -500,7 +500,7 @@ func (crypto *defaultCryptoBackend) signHash(hash []byte, prv *ecdsa.PrivateKey)
500
500
// sigToPub obtains public key from the signed message and the signature
501
501
func (crypto * defaultCryptoBackend ) sigToPub (signed , sig []byte ) (* ecdsa.PublicKey , error ) {
502
502
defer func () { recover () }() // in case of invalid signature
503
- hash := crypto . keccak256 (signed )
503
+ hash := ethCrypto . Keccak256 (signed )
504
504
return ethCrypto .SigToPub (hash , sig )
505
505
}
506
506
@@ -522,11 +522,6 @@ func generateRandomKeyID() (id string, err error) {
522
522
return id , err
523
523
}
524
524
525
- // keccak256 calculates and returns the keccak256 hash of the input data.
526
- func (crypto * defaultCryptoBackend ) keccak256 (data ... []byte ) []byte {
527
- return ethCrypto .Keccak256 (data ... )
528
- }
529
-
530
525
// generateSecureRandomData generates random data where extra security is required.
531
526
// The purpose of this function is to prevent some bugs in software or in hardware
532
527
// from delivering not-very-random data. This is especially useful for AES nonce,
0 commit comments