diff --git a/crates/criticaltrust/src/keys/public.rs b/crates/criticaltrust/src/keys/public.rs index efe564b8..b6353212 100644 --- a/crates/criticaltrust/src/keys/public.rs +++ b/crates/criticaltrust/src/keys/public.rs @@ -29,7 +29,7 @@ impl PublicKey { /// Signature verification could fail if: /// * The signature is present in the `RevocationInfo`. /// * The `RevocationInfo` cannot be verified. - /// * [`verify_payload`](PublicKey::verify_payload) fails. + /// * [`verify_payload`](PublicKey::verify_without_checking_revocations) fails. pub fn verify( &self, role: KeyRole, @@ -63,7 +63,7 @@ impl PublicKey { } } - self.verify_payload(role, payload, signature)?; + self.verify_without_checking_revocations(role, payload, signature)?; Ok(()) } @@ -75,7 +75,7 @@ impl PublicKey { /// * The current key expired. /// * The signature doesn't match the payload. /// * The signature wasn't performed by the current key. - pub fn verify_payload( + pub fn verify_without_checking_revocations( &self, role: KeyRole, payload: &PayloadBytes<'_>, diff --git a/crates/criticaltrust/src/signatures/payload.rs b/crates/criticaltrust/src/signatures/payload.rs index e84b1c7d..178a1bab 100644 --- a/crates/criticaltrust/src/signatures/payload.rs +++ b/crates/criticaltrust/src/signatures/payload.rs @@ -106,7 +106,11 @@ fn verify_signature<T: Signable>( None => continue, }; - match key.verify_payload(T::SIGNED_BY_ROLE, &signed, &signature.signature) { + match key.verify_without_checking_revocations( + T::SIGNED_BY_ROLE, + &signed, + &signature.signature, + ) { Ok(()) => {} Err(Error::VerificationFailed) => continue, Err(other) => return Err(other),