diff --git a/x/smart-account/authenticator/signature_authenticator.go b/x/smart-account/authenticator/signature_authenticator.go index 71081928259..3f96b004e13 100644 --- a/x/smart-account/authenticator/signature_authenticator.go +++ b/x/smart-account/authenticator/signature_authenticator.go @@ -89,7 +89,6 @@ func (sva SignatureVerification) ConfirmExecution(ctx sdk.Context, request Authe func (sva SignatureVerification) OnAuthenticatorAdded(ctx sdk.Context, account sdk.AccAddress, config []byte, authenticatorId string) error { // We allow users to pass no data or a valid public key for signature verification. - // Users can pass no data if the public key is already contained in the auth store. if len(config) != secp256k1.PubKeySize { return fmt.Errorf("invalid secp256k1 public key size, expected %d, got %d", secp256k1.PubKeySize, len(config)) } diff --git a/x/smart-account/keeper/keeper.go b/x/smart-account/keeper/keeper.go index 35d77229e90..c2914549b56 100644 --- a/x/smart-account/keeper/keeper.go +++ b/x/smart-account/keeper/keeper.go @@ -105,9 +105,8 @@ func (k Keeper) GetSelectedAuthenticatorData( return authenticatorFromStore, nil } -// GetInitializedAuthenticatorForAccount returns a single authenticator for the account -// this function relies in GetAuthenticatorDataForAccount, this function calls -// Initialize on the specific authenticator +// GetInitializedAuthenticatorForAccount returns a single initialized authenticator for the account. +// It fetches the authenticator data from the store, gets the authenticator struct from the manager, then calls initialize on the authenticator data func (k Keeper) GetInitializedAuthenticatorForAccount( ctx sdk.Context, account sdk.AccAddress,