File tree Expand file tree Collapse file tree 2 files changed +5
-5
lines changed
Expand file tree Collapse file tree 2 files changed +5
-5
lines changed Original file line number Diff line number Diff line change @@ -166,7 +166,7 @@ Any domain specific validation such as parsing the decoded body and
166166validating the payload type is left out to the caller.
167167Verify returns a list of accepted keys each including a keyid, public and signiture of the accepted provider keys.
168168*/
169- func (es * envelopeSigner ) Verify (e * Envelope ) ([]AccesptedKey , error ) {
169+ func (es * envelopeSigner ) Verify (e * Envelope ) ([]AcceptedKeys , error ) {
170170 return es .ev .Verify (e )
171171}
172172
Original file line number Diff line number Diff line change @@ -23,13 +23,13 @@ type envelopeVerifier struct {
2323 threshold int
2424}
2525
26- type AccesptedKey struct {
26+ type AcceptedKeys struct {
2727 Public crypto.PublicKey
2828 KeyID string
2929 Sig Signature
3030}
3131
32- func (ev * envelopeVerifier ) Verify (e * Envelope ) ([]AccesptedKey , error ) {
32+ func (ev * envelopeVerifier ) Verify (e * Envelope ) ([]AcceptedKeys , error ) {
3333 if len (e .Signatures ) == 0 {
3434 return nil , ErrNoSignature
3535 }
@@ -43,7 +43,7 @@ func (ev *envelopeVerifier) Verify(e *Envelope) ([]AccesptedKey, error) {
4343 paeEnc := PAE (e .PayloadType , string (body ))
4444
4545 // If *any* signature is found to be incorrect, it is skipped
46- var accepted_keys []AccesptedKey
46+ var accepted_keys []AcceptedKeys
4747 for _ , s := range e .Signatures {
4848 sig , err := b64Decode (s .Sig )
4949 if err != nil {
@@ -68,7 +68,7 @@ func (ev *envelopeVerifier) Verify(e *Envelope) ([]AccesptedKey, error) {
6868 continue
6969 }
7070
71- acceptedKey := AccesptedKey {
71+ acceptedKey := AcceptedKeys {
7272 Public : v .Public (),
7373 KeyID : keyID ,
7474 Sig : s ,
You can’t perform that action at this time.
0 commit comments