From e47312f5936fc03d82a1b9f667594767784b097d Mon Sep 17 00:00:00 2001 From: Ramon Petgrave Date: Thu, 20 Jun 2024 19:56:21 +0000 Subject: [PATCH] literl hash algo Signed-off-by: Ramon Petgrave --- cli/slsa-verifier/verify/verify_vsa.go | 2 +- options/options.go | 2 +- verifiers/internal/vsa/verifier.go | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/cli/slsa-verifier/verify/verify_vsa.go b/cli/slsa-verifier/verify/verify_vsa.go index 530050d..2c2ddd7 100644 --- a/cli/slsa-verifier/verify/verify_vsa.go +++ b/cli/slsa-verifier/verify/verify_vsa.go @@ -81,7 +81,7 @@ func (c *VerifyVSACommand) Exec(ctx context.Context) (*utils.TrustedAttesterID, VerificationOpts := &options.VerificationOpts{ PublicKey: &pubKey, PublicKeyID: c.PublicKeyID, - PublicKeyHashAlgo: &hashHalgo, + PublicKeyHashAlgo: hashHalgo, } attestations, err := os.ReadFile(*c.AttestationsPath) if err != nil { diff --git a/options/options.go b/options/options.go index 761d376..c253119 100644 --- a/options/options.go +++ b/options/options.go @@ -63,5 +63,5 @@ type VerificationOpts struct { PublicKeyID *string // PublicKeyHashAlgo is the hash algorithm used to hash the signature - PublicKeyHashAlgo *crypto.Hash + PublicKeyHashAlgo crypto.Hash } diff --git a/verifiers/internal/vsa/verifier.go b/verifiers/internal/vsa/verifier.go index 4768806..e354f65 100644 --- a/verifiers/internal/vsa/verifier.go +++ b/verifiers/internal/vsa/verifier.go @@ -72,7 +72,7 @@ func VerifyVSA(ctx context.Context, // verifyEnvelopeSignature verifies the signature of the envelope. func verifyEnvelopeSignature(ctx context.Context, sigstoreEnvelope *sigstoreBundle.Envelope, verificationOpts *options.VerificationOpts) error { - signatureVerifier, err := sigstoreSignature.LoadVerifier(*verificationOpts.PublicKey, *verificationOpts.PublicKeyHashAlgo) + signatureVerifier, err := sigstoreSignature.LoadVerifier(*verificationOpts.PublicKey, verificationOpts.PublicKeyHashAlgo) if err != nil { return fmt.Errorf("%w: loading sigstore DSSE envolope verifier %w", serrors.ErrorInvalidPublicKey, err) }