File tree Expand file tree Collapse file tree 2 files changed +5
-5
lines changed Expand file tree Collapse file tree 2 files changed +5
-5
lines changed Original file line number Diff line number Diff line change @@ -166,7 +166,7 @@ Any domain specific validation such as parsing the decoded body and
166
166
validating the payload type is left out to the caller.
167
167
Verify returns a list of accepted keys each including a keyid, public and signiture of the accepted provider keys.
168
168
*/
169
- func (es * envelopeSigner ) Verify (e * Envelope ) ([]AccesptedKey , error ) {
169
+ func (es * envelopeSigner ) Verify (e * Envelope ) ([]AcceptedKeys , error ) {
170
170
return es .ev .Verify (e )
171
171
}
172
172
Original file line number Diff line number Diff line change @@ -23,13 +23,13 @@ type envelopeVerifier struct {
23
23
threshold int
24
24
}
25
25
26
- type AccesptedKey struct {
26
+ type AcceptedKeys struct {
27
27
Public crypto.PublicKey
28
28
KeyID string
29
29
Sig Signature
30
30
}
31
31
32
- func (ev * envelopeVerifier ) Verify (e * Envelope ) ([]AccesptedKey , error ) {
32
+ func (ev * envelopeVerifier ) Verify (e * Envelope ) ([]AcceptedKeys , error ) {
33
33
if len (e .Signatures ) == 0 {
34
34
return nil , ErrNoSignature
35
35
}
@@ -43,7 +43,7 @@ func (ev *envelopeVerifier) Verify(e *Envelope) ([]AccesptedKey, error) {
43
43
paeEnc := PAE (e .PayloadType , string (body ))
44
44
45
45
// If *any* signature is found to be incorrect, it is skipped
46
- var accepted_keys []AccesptedKey
46
+ var accepted_keys []AcceptedKeys
47
47
for _ , s := range e .Signatures {
48
48
sig , err := b64Decode (s .Sig )
49
49
if err != nil {
@@ -68,7 +68,7 @@ func (ev *envelopeVerifier) Verify(e *Envelope) ([]AccesptedKey, error) {
68
68
continue
69
69
}
70
70
71
- acceptedKey := AccesptedKey {
71
+ acceptedKey := AcceptedKeys {
72
72
Public : v .Public (),
73
73
KeyID : keyID ,
74
74
Sig : s ,
You can’t perform that action at this time.
0 commit comments