@@ -39,13 +39,13 @@ func TestPAE(t *testing.T) {
39
39
})
40
40
}
41
41
42
- type nilsignerverifier int
42
+ type nilSignerVerifier int
43
43
44
- func (n nilsignerverifier ) Sign (ctx context.Context , data []byte ) ([]byte , error ) {
44
+ func (n nilSignerVerifier ) Sign (ctx context.Context , data []byte ) ([]byte , error ) {
45
45
return data , nil
46
46
}
47
47
48
- func (n nilsignerverifier ) Verify (ctx context.Context , data , sig []byte ) error {
48
+ func (n nilSignerVerifier ) Verify (ctx context.Context , data , sig []byte ) error {
49
49
if len (data ) != len (sig ) {
50
50
return errLength
51
51
}
@@ -59,21 +59,21 @@ func (n nilsignerverifier) Verify(ctx context.Context, data, sig []byte) error {
59
59
return nil
60
60
}
61
61
62
- func (n nilsignerverifier ) KeyID () (string , error ) {
62
+ func (n nilSignerVerifier ) KeyID () (string , error ) {
63
63
return "nil" , nil
64
64
}
65
65
66
- func (n nilsignerverifier ) Public () crypto.PublicKey {
66
+ func (n nilSignerVerifier ) Public () crypto.PublicKey {
67
67
return "nil-public"
68
68
}
69
69
70
- type nullsignerverifier int
70
+ type nullSignerVerifier int
71
71
72
- func (n nullsignerverifier ) Sign (ctx context.Context , data []byte ) ([]byte , error ) {
72
+ func (n nullSignerVerifier ) Sign (ctx context.Context , data []byte ) ([]byte , error ) {
73
73
return data , nil
74
74
}
75
75
76
- func (n nullsignerverifier ) Verify (ctx context.Context , data , sig []byte ) error {
76
+ func (n nullSignerVerifier ) Verify (ctx context.Context , data , sig []byte ) error {
77
77
if len (data ) != len (sig ) {
78
78
return errLength
79
79
}
@@ -87,11 +87,11 @@ func (n nullsignerverifier) Verify(ctx context.Context, data, sig []byte) error
87
87
return nil
88
88
}
89
89
90
- func (n nullsignerverifier ) KeyID () (string , error ) {
90
+ func (n nullSignerVerifier ) KeyID () (string , error ) {
91
91
return "null" , nil
92
92
}
93
93
94
- func (n nullsignerverifier ) Public () crypto.PublicKey {
94
+ func (n nullSignerVerifier ) Public () crypto.PublicKey {
95
95
return "null-public"
96
96
}
97
97
@@ -113,24 +113,24 @@ func (n errsigner) Public() crypto.PublicKey {
113
113
return "err-public"
114
114
}
115
115
116
- type errsignerverifier int
116
+ type errSignerVerifier int
117
117
118
118
var errVerify = fmt .Errorf ("accepted signatures do not match threshold, Found: 0, Expected 1" )
119
119
var errThreshold = fmt .Errorf ("invalid threshold" )
120
120
121
- func (n errsignerverifier ) Sign (ctx context.Context , data []byte ) ([]byte , error ) {
121
+ func (n errSignerVerifier ) Sign (ctx context.Context , data []byte ) ([]byte , error ) {
122
122
return data , nil
123
123
}
124
124
125
- func (n errsignerverifier ) Verify (ctx context.Context , data , sig []byte ) error {
125
+ func (n errSignerVerifier ) Verify (ctx context.Context , data , sig []byte ) error {
126
126
return errVerify
127
127
}
128
128
129
- func (n errsignerverifier ) KeyID () (string , error ) {
129
+ func (n errSignerVerifier ) KeyID () (string , error ) {
130
130
return "err" , nil
131
131
}
132
132
133
- func (n errsignerverifier ) Public () crypto.PublicKey {
133
+ func (n errSignerVerifier ) Public () crypto.PublicKey {
134
134
return "err-public"
135
135
}
136
136
@@ -196,7 +196,7 @@ func TestNilSign(t *testing.T) {
196
196
},
197
197
}
198
198
199
- var ns nilsignerverifier
199
+ var ns nilSignerVerifier
200
200
signer , err := NewEnvelopeSigner (ns )
201
201
assert .Nil (t , err , "unexpected error" )
202
202
@@ -246,14 +246,14 @@ func newEcdsaKey() *ecdsa.PrivateKey {
246
246
return & private
247
247
}
248
248
249
- type EcdsaSignerVerifier struct {
249
+ type ecdsaSignerVerifier struct {
250
250
keyID string
251
251
key * ecdsa.PrivateKey
252
252
rLen int
253
253
verified bool
254
254
}
255
255
256
- func (es * EcdsaSignerVerifier ) Sign (ctx context.Context , data []byte ) ([]byte , error ) {
256
+ func (es * ecdsaSignerVerifier ) Sign (ctx context.Context , data []byte ) ([]byte , error ) {
257
257
// Data is complete message, hash it and sign the digest
258
258
digest := sha256 .Sum256 (data )
259
259
r , s , err := rfc6979 .SignECDSA (es .key , digest [:], sha256 .New )
@@ -269,7 +269,7 @@ func (es *EcdsaSignerVerifier) Sign(ctx context.Context, data []byte) ([]byte, e
269
269
return rawSig , nil
270
270
}
271
271
272
- func (es * EcdsaSignerVerifier ) Verify (ctx context.Context , data , sig []byte ) error {
272
+ func (es * ecdsaSignerVerifier ) Verify (ctx context.Context , data , sig []byte ) error {
273
273
var r big.Int
274
274
var s big.Int
275
275
digest := sha256 .Sum256 (data )
@@ -288,11 +288,11 @@ func (es *EcdsaSignerVerifier) Verify(ctx context.Context, data, sig []byte) err
288
288
return errVerify
289
289
}
290
290
291
- func (es * EcdsaSignerVerifier ) KeyID () (string , error ) {
291
+ func (es * ecdsaSignerVerifier ) KeyID () (string , error ) {
292
292
return es .keyID , nil
293
293
}
294
294
295
- func (es * EcdsaSignerVerifier ) Public () crypto.PublicKey {
295
+ func (es * ecdsaSignerVerifier ) Public () crypto.PublicKey {
296
296
return es .key .Public ()
297
297
}
298
298
@@ -302,7 +302,7 @@ func TestEcdsaSign(t *testing.T) {
302
302
var keyID = "test key 123"
303
303
var payloadType = "http://example.com/HelloWorld"
304
304
var payload = "hello world"
305
- var ecdsa = & EcdsaSignerVerifier {
305
+ var ecdsa = & ecdsaSignerVerifier {
306
306
keyID : keyID ,
307
307
key : newEcdsaKey (),
308
308
}
@@ -383,7 +383,7 @@ func TestVerifyOneProvider(t *testing.T) {
383
383
var payloadType = "http://example.com/HelloWorld"
384
384
var payload = "hello world"
385
385
386
- var ns nilsignerverifier
386
+ var ns nilSignerVerifier
387
387
signer , err := NewEnvelopeSigner (ns )
388
388
assert .Nil (t , err , "unexpected error" )
389
389
@@ -402,8 +402,8 @@ func TestVerifyMultipleProvider(t *testing.T) {
402
402
var payloadType = "http://example.com/HelloWorld"
403
403
var payload = "hello world"
404
404
405
- var ns nilsignerverifier
406
- var null nullsignerverifier
405
+ var ns nilSignerVerifier
406
+ var null nullSignerVerifier
407
407
signer , err := NewEnvelopeSigner (ns , null )
408
408
assert .Nil (t , err , "unexpected error" )
409
409
@@ -421,8 +421,8 @@ func TestVerifyMultipleProviderThreshold(t *testing.T) {
421
421
var payloadType = "http://example.com/HelloWorld"
422
422
var payload = "hello world"
423
423
424
- var ns nilsignerverifier
425
- var null nullsignerverifier
424
+ var ns nilSignerVerifier
425
+ var null nullSignerVerifier
426
426
signer , err := NewMultiEnvelopeSigner (2 , ns , null )
427
427
assert .Nil (t , err )
428
428
env , err := signer .SignPayload (context .TODO (), payloadType , []byte (payload ))
@@ -436,8 +436,8 @@ func TestVerifyMultipleProviderThreshold(t *testing.T) {
436
436
}
437
437
438
438
func TestVerifyMultipleProviderThresholdErr (t * testing.T ) {
439
- var ns nilsignerverifier
440
- var null nullsignerverifier
439
+ var ns nilSignerVerifier
440
+ var null nullSignerVerifier
441
441
_ , err := NewMultiEnvelopeVerifier (3 , ns , null )
442
442
assert .Equal (t , errThreshold , err , "wrong error" )
443
443
_ , err = NewMultiEnvelopeVerifier (0 , ns , null )
@@ -448,7 +448,7 @@ func TestVerifyErr(t *testing.T) {
448
448
var payloadType = "http://example.com/HelloWorld"
449
449
var payload = "hello world"
450
450
451
- var errsv errsignerverifier
451
+ var errsv errSignerVerifier
452
452
signer , err := NewEnvelopeSigner (errsv )
453
453
assert .Nil (t , err , "unexpected error" )
454
454
@@ -524,8 +524,8 @@ func TestVerifyBadBase64(t *testing.T) {
524
524
func TestVerifyNoMatch (t * testing.T ) {
525
525
var payloadType = "http://example.com/HelloWorld"
526
526
527
- var ns nilsignerverifier
528
- var null nullsignerverifier
527
+ var ns nilSignerVerifier
528
+ var null nullSignerVerifier
529
529
verifier , err := NewEnvelopeVerifier (ns , null )
530
530
assert .Nil (t , err , "unexpected error" )
531
531
@@ -663,12 +663,12 @@ func TestVerifyPublicKeyID(t *testing.T) {
663
663
var keyID = "SHA256:f4AuBLdH4Lj/dIuwAUXXebzoI9B/cJ4iSQ3/qByIl4M"
664
664
// var keyID = "test key 123"
665
665
666
- var s1 = & EcdsaSignerVerifier {
666
+ var s1 = & ecdsaSignerVerifier {
667
667
keyID : "" ,
668
668
key : newEcdsaKey (),
669
669
}
670
670
671
- var s2 = & EcdsaSignerVerifier {
671
+ var s2 = & ecdsaSignerVerifier {
672
672
keyID : "" ,
673
673
key : newEcdsaKey (),
674
674
}
0 commit comments