@@ -372,7 +372,7 @@ func (crypto *defaultCryptoBackend) GenerateSymKey() (string, error) {
372
372
return "" , fmt .Errorf ("error in GenerateSymKey: crypto/rand failed to generate random data" )
373
373
}
374
374
375
- id , err := generateRandomID ()
375
+ id , err := generateRandomKeyID ()
376
376
if err != nil {
377
377
return "" , fmt .Errorf ("failed to generate ID: %s" , err )
378
378
}
@@ -387,13 +387,13 @@ func (crypto *defaultCryptoBackend) GenerateSymKey() (string, error) {
387
387
return id , nil
388
388
}
389
389
390
- // Add a symmetric key ti the store generating an id and returning it
390
+ // Add a symmetric key to the store generating an id and returning it
391
391
func (crypto * defaultCryptoBackend ) AddSymKey (key []byte ) (string , error ) {
392
392
if len (key ) != aesKeyLength {
393
393
return "" , fmt .Errorf ("wrong key size: %d" , len (key ))
394
394
}
395
395
396
- id , err := generateRandomID ()
396
+ id , err := generateRandomKeyID ()
397
397
if err != nil {
398
398
return "" , fmt .Errorf ("failed to generate ID: %s" , err )
399
399
}
@@ -460,7 +460,7 @@ func (crypto *defaultCryptoBackend) encryptAsymmetric(rawBytes []byte, key *ecds
460
460
if ! validatePublicKey (key ) {
461
461
return nil , errInvalidPubkey
462
462
}
463
- encrypted , err := ecies .Encrypt (crand .Reader , crypto .importECDSAPublic (key ), rawBytes , nil , nil )
463
+ encrypted , err := ecies .Encrypt (crand .Reader , crypto .fromECDSAtoECIESPublic (key ), rawBytes , nil , nil )
464
464
if err == nil {
465
465
return encrypted , nil
466
466
}
@@ -497,25 +497,26 @@ func (crypto *defaultCryptoBackend) signHash(hash []byte, prv *ecdsa.PrivateKey)
497
497
return ethCrypto .Sign (hash , prv )
498
498
}
499
499
500
- // Obtain public key from the signed message and the signature
500
+ // sigToPub obtains public key from the signed message and the signature
501
501
func (crypto * defaultCryptoBackend ) sigToPub (signed , sig []byte ) (* ecdsa.PublicKey , error ) {
502
502
defer func () { recover () }() // in case of invalid signature
503
503
hash := crypto .keccak256 (signed )
504
504
return ethCrypto .SigToPub (hash , sig )
505
505
}
506
506
507
- func (crypto * defaultCryptoBackend ) importECDSAPublic (key * ecdsa.PublicKey ) * ecies.PublicKey {
507
+ // fromECDSAtoECIESPublic converts a ecdsa public key to the format needed by the crypti/ecies package
508
+ func (crypto * defaultCryptoBackend ) fromECDSAtoECIESPublic (key * ecdsa.PublicKey ) * ecies.PublicKey {
508
509
return ecies .ImportECDSAPublic (key )
509
510
}
510
511
511
- // GenerateRandomID generates a random string, which is then returned to be used as a key id
512
- func generateRandomID () (id string , err error ) {
512
+ // generateRandomKeyID generates a random string, which is then returned to be used as a key id
513
+ func generateRandomKeyID () (id string , err error ) {
513
514
buf , err := generateSecureRandomData (keyIDSize )
514
515
if err != nil {
515
516
return "" , err
516
517
}
517
518
if ! validateDataIntegrity (buf , keyIDSize ) {
518
- return "" , fmt .Errorf ("error in generateRandomID : crypto/rand failed to generate random data" )
519
+ return "" , fmt .Errorf ("error in generateRandomKeyID : crypto/rand failed to generate random data" )
519
520
}
520
521
id = common .Bytes2Hex (buf )
521
522
return id , err
0 commit comments