From b9280fb9cc2ccf0afd8145d778552d05a161dff1 Mon Sep 17 00:00:00 2001 From: Hayden Blauzvern Date: Tue, 26 Apr 2022 22:15:29 +0000 Subject: [PATCH] Remove requirement that key is ECDSA Signed-off-by: Hayden Blauzvern --- cmd/cosign/cli/fulcio/fulcioverifier/ctl/verify.go | 9 ++------- 1 file changed, 2 insertions(+), 7 deletions(-) diff --git a/cmd/cosign/cli/fulcio/fulcioverifier/ctl/verify.go b/cmd/cosign/cli/fulcio/fulcioverifier/ctl/verify.go index 02324ac65c6..c2af470cc21 100644 --- a/cmd/cosign/cli/fulcio/fulcioverifier/ctl/verify.go +++ b/cmd/cosign/cli/fulcio/fulcioverifier/ctl/verify.go @@ -17,7 +17,6 @@ package ctl import ( "context" "crypto" - "crypto/ecdsa" "crypto/sha256" "crypto/x509" "encoding/json" @@ -93,15 +92,11 @@ func VerifySCT(ctx context.Context, certPEM, chainPEM, rawSCT []byte) error { if err != nil { return err } - ctPub, ok := pub.(*ecdsa.PublicKey) - if !ok { - return fmt.Errorf("invalid public key: was %T, require *ecdsa.PublicKey", pub) - } - keyID, err := ctutil.GetCTLogID(ctPub) + keyID, err := ctutil.GetCTLogID(pub) if err != nil { return errors.Wrap(err, "error getting CTFE public key hash") } - pubKeys[keyID] = logIDMetadata{ctPub, t.Status} + pubKeys[keyID] = logIDMetadata{pub, t.Status} } } else { fmt.Fprintf(os.Stderr, "**Warning** Using a non-standard public key for verifying SCT: %s\n", rootEnv)