From e7ee3f57844fe7586534d700fd462e179c27a583 Mon Sep 17 00:00:00 2001 From: Stas Dm Date: Fri, 20 Sep 2024 11:26:54 +0200 Subject: [PATCH] fix: lint --- dataintegrity/suite/eddsa2022/eddsa2022.go | 4 ++-- dataintegrity/suite/eddsa2022/integration_test.go | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/dataintegrity/suite/eddsa2022/eddsa2022.go b/dataintegrity/suite/eddsa2022/eddsa2022.go index 10c5886..2df0e38 100644 --- a/dataintegrity/suite/eddsa2022/eddsa2022.go +++ b/dataintegrity/suite/eddsa2022/eddsa2022.go @@ -169,7 +169,7 @@ const ( ldCtxKey = "@context" ) -// CreateProof implements the eddsa-2022 cryptographic suite for Add Proof: +// CreateProof implements the eddsa-2022 cryptographic suite for Add Proof. func (s *Suite) CreateProof(doc []byte, opts *models.ProofOptions) (*models.Proof, error) { docHash, vmKey, _, err := s.transformAndHash(doc, opts) if err != nil { @@ -244,7 +244,7 @@ func (s *Suite) transformAndHash(doc []byte, opts *models.ProofOptions) ([]byte, return docHash, &pubkey.PublicKey{Type: keyType, JWK: vmKey}, verifier, nil } -// VerifyProof implements the eddsa-2022 cryptographic suite for CheckJWTProof Proof: +// VerifyProof implements the eddsa-2022 cryptographic suite for CheckJWTProof Proof. func (s *Suite) VerifyProof(doc []byte, proof *models.Proof, opts *models.ProofOptions) error { message, vmKey, verifier, err := s.transformAndHash(doc, opts) if err != nil { diff --git a/dataintegrity/suite/eddsa2022/integration_test.go b/dataintegrity/suite/eddsa2022/integration_test.go index 32cd923..645d51f 100644 --- a/dataintegrity/suite/eddsa2022/integration_test.go +++ b/dataintegrity/suite/eddsa2022/integration_test.go @@ -101,7 +101,7 @@ func TestIntegration(t *testing.T) { err = verifier.VerifyProof(validCredential, proof, verifyOpts) require.Error(t, err) - require.Contains(t, err.Error(), "failed to verify ecdsa-2022 DI proof") + require.Contains(t, err.Error(), "failed to verify eddsa-2022 DI proof") }) }) }