@@ -97,7 +97,7 @@ pub struct Decrypter {
97
97
/// Worker task handle.
98
98
worker : JoinHandle < EndOfPlay > ,
99
99
/// Pending threshold encryption key material
100
- enc_key : DecryptionKeyCell ,
100
+ dec_key : DecryptionKeyCell ,
101
101
/// Key stores (shared with Worker)
102
102
key_stores : Arc < RwLock < KeyStoreVec < 2 > > > ,
103
103
/// Current committee.
@@ -169,7 +169,7 @@ impl Decrypter {
169
169
. state ( state)
170
170
. tx ( dec_tx)
171
171
. rx ( cmd_rx)
172
- . enc_key ( cfg. threshold_enc_key . clone ( ) )
172
+ . dec_key ( cfg. threshold_dec_key . clone ( ) )
173
173
. retain ( cfg. retain )
174
174
. build ( ) ;
175
175
@@ -179,7 +179,7 @@ impl Decrypter {
179
179
worker_tx : cmd_tx,
180
180
worker_rx : dec_rx,
181
181
worker : spawn ( worker. go ( ) ) ,
182
- enc_key : cfg. threshold_enc_key ,
182
+ dec_key : cfg. threshold_dec_key ,
183
183
key_stores : key_stores. clone ( ) ,
184
184
current,
185
185
metrics : seq_metrics,
@@ -193,7 +193,7 @@ impl Decrypter {
193
193
194
194
/// Garbage collect cached state of `r` and prior rounds.
195
195
pub async fn gc ( & mut self , r : RoundNumber ) -> StdResult < ( ) , DecrypterDown > {
196
- if self . enc_key . get_ref ( ) . is_some ( ) {
196
+ if self . dec_key . get_ref ( ) . is_some ( ) {
197
197
self . worker_tx
198
198
. send ( Command :: Gc ( r) )
199
199
. await
@@ -273,7 +273,7 @@ impl Decrypter {
273
273
return None ;
274
274
} ;
275
275
276
- let Some ( dec_sk) = self . enc_key . get ( ) else {
276
+ let Some ( dec_sk) = self . dec_key . get ( ) else {
277
277
warn ! ( node = %self . label, committee = %committee_id, "no existing key to reshare" ) ;
278
278
return None ;
279
279
} ;
@@ -429,8 +429,8 @@ struct Worker {
429
429
/// Channel for receiving commands from the parent.
430
430
rx : Receiver < Command > ,
431
431
432
- /// Pending encryption key that will be updated after DKG/resharing is done.
433
- enc_key : DecryptionKeyCell ,
432
+ /// Pending decryption key that will be updated after DKG/resharing is done.
433
+ dec_key : DecryptionKeyCell ,
434
434
435
435
/// First round where an inclusion list was received (ignore shares for earlier rounds).
436
436
first_requested_round : Option < RoundNumber > ,
@@ -735,7 +735,7 @@ impl Worker {
735
735
. result ( )
736
736
. map_err ( |e| DecrypterError :: Dkg ( e. to_string ( ) ) ) ?;
737
737
738
- self . enc_key . set ( dec_sk. clone ( ) ) ;
738
+ self . dec_key . set ( dec_sk. clone ( ) ) ;
739
739
self . state = WorkerState :: Running ;
740
740
info ! ( node = %self . label, committee_id = %committee. id( ) , "dkg finished (catchup successful)" ) ;
741
741
}
@@ -805,7 +805,7 @@ impl Worker {
805
805
806
806
info ! ( committee_id = %committee. id( ) , node = %self . label, "handover finished" ) ;
807
807
self . state = WorkerState :: HandoverComplete ;
808
- self . enc_key . set ( next_dec_key) ;
808
+ self . dec_key . set ( next_dec_key) ;
809
809
self . dkg_completed . insert ( committee. id ( ) ) ;
810
810
}
811
811
@@ -885,7 +885,7 @@ impl Worker {
885
885
. result ( )
886
886
. map_err ( |e| DecrypterError :: Dkg ( e. to_string ( ) ) ) ?;
887
887
888
- self . enc_key . set ( dec_sk) ;
888
+ self . dec_key . set ( dec_sk) ;
889
889
self . state = WorkerState :: Running ;
890
890
self . dkg_completed . insert ( committee. id ( ) ) ;
891
891
info ! ( committee_id = %committee. id( ) , node = %self . label, "dkg finished" ) ;
@@ -904,7 +904,7 @@ impl Worker {
904
904
) ;
905
905
return Ok ( ( ) ) ;
906
906
}
907
- let Some ( dec_key) = self . enc_key . get ( ) else {
907
+ let Some ( dec_key) = self . dec_key . get ( ) else {
908
908
warn ! (
909
909
node = %self . label,
910
910
committee_id = %cid,
@@ -1127,7 +1127,7 @@ impl Worker {
1127
1127
incl. round( )
1128
1128
) ) ) ;
1129
1129
}
1130
- _ => self . enc_key . get ( ) . ok_or_else ( || {
1130
+ _ => self . dec_key . get ( ) . ok_or_else ( || {
1131
1131
DecrypterError :: Internal ( "Worker running without dec key" . to_string ( ) )
1132
1132
} ) ?,
1133
1133
} ;
@@ -1219,7 +1219,7 @@ impl Worker {
1219
1219
let dec_sk = match & self . state {
1220
1220
WorkerState :: Running
1221
1221
| WorkerState :: ResharingComplete ( _)
1222
- | WorkerState :: ShuttingDown => self . enc_key . get ( ) . ok_or_else ( || {
1222
+ | WorkerState :: ShuttingDown => self . dec_key . get ( ) . ok_or_else ( || {
1223
1223
DecrypterError :: Internal ( "Worker running without dec key" . to_string ( ) )
1224
1224
} ) ?,
1225
1225
_ => {
@@ -1436,7 +1436,7 @@ impl Worker {
1436
1436
}
1437
1437
WorkerState :: ResharingComplete ( next_key) => {
1438
1438
info ! ( node = %self . label, committee = %self . current, "(old node) successful committee switch" ) ;
1439
- self . enc_key . set ( next_key. clone ( ) ) ;
1439
+ self . dec_key . set ( next_key. clone ( ) ) ;
1440
1440
WorkerState :: Running
1441
1441
}
1442
1442
WorkerState :: ShuttingDown => {
@@ -1862,7 +1862,7 @@ mod tests {
1862
1862
// Verify all committee members derive the same public encryption keys
1863
1863
let generated_keys = try_join_all (
1864
1864
setup
1865
- . enc_keys ( )
1865
+ . dec_keys ( )
1866
1866
. iter ( )
1867
1867
. map ( |cell| async { Ok :: < _ , ( ) > ( cell. read ( ) . await ) } ) ,
1868
1868
)
@@ -1928,11 +1928,11 @@ mod tests {
1928
1928
1929
1929
enqueue_all_dkg_bundles ( & mut com1_decrypters, None ) . await ;
1930
1930
1931
- for cell in com1_setup. enc_keys ( ) {
1931
+ for cell in com1_setup. dec_keys ( ) {
1932
1932
cell. read ( ) . await ;
1933
1933
}
1934
1934
1935
- let encryption_key = com1_setup. enc_keys ( ) [ 0 ]
1935
+ let encryption_key = com1_setup. dec_keys ( ) [ 0 ]
1936
1936
. get ( )
1937
1937
. expect ( "encryption key should be generated after DKG" ) ;
1938
1938
@@ -1951,7 +1951,7 @@ mod tests {
1951
1951
enqueue_all_dkg_bundles ( & mut com1_decrypters, Some ( com2_setup. key_store ( ) . clone ( ) ) ) . await ;
1952
1952
1953
1953
// make sure that all nodes in COM2 consider resharing complete
1954
- for cell in com2_setup. enc_keys ( ) {
1954
+ for cell in com2_setup. dec_keys ( ) {
1955
1955
cell. read ( ) . await ;
1956
1956
}
1957
1957
@@ -2059,11 +2059,11 @@ mod tests {
2059
2059
enqueue_all_dkg_bundles ( & mut decrypters, None ) . await ;
2060
2060
}
2061
2061
2062
- for cell in setup. enc_keys ( ) {
2062
+ for cell in setup. dec_keys ( ) {
2063
2063
cell. read ( ) . await ;
2064
2064
}
2065
2065
2066
- let encryption_key = setup. enc_keys ( ) [ 0 ]
2066
+ let encryption_key = setup. dec_keys ( ) [ 0 ]
2067
2067
. get ( )
2068
2068
. expect ( "encryption key should be generated after DKG" ) ;
2069
2069
@@ -2269,29 +2269,29 @@ mod tests {
2269
2269
2270
2270
#[ derive( Clone ) ]
2271
2271
struct DecrypterSetup {
2272
- enc_keys : Vec < DecryptionKeyCell > ,
2272
+ dec_keys : Vec < DecryptionKeyCell > ,
2273
2273
addr_comm : AddressableCommittee ,
2274
2274
key_store : KeyStore ,
2275
2275
sig_keys : Vec < SecretKey > ,
2276
2276
}
2277
2277
2278
2278
impl DecrypterSetup {
2279
2279
pub fn new (
2280
- enc_keys : Vec < DecryptionKeyCell > ,
2280
+ dec_keys : Vec < DecryptionKeyCell > ,
2281
2281
addr_comm : AddressableCommittee ,
2282
2282
key_store : KeyStore ,
2283
2283
sig_keys : Vec < SecretKey > ,
2284
2284
) -> Self {
2285
2285
Self {
2286
- enc_keys ,
2286
+ dec_keys ,
2287
2287
addr_comm,
2288
2288
key_store,
2289
2289
sig_keys,
2290
2290
}
2291
2291
}
2292
2292
2293
- pub fn enc_keys ( & self ) -> & Vec < DecryptionKeyCell > {
2294
- & self . enc_keys
2293
+ pub fn dec_keys ( & self ) -> & Vec < DecryptionKeyCell > {
2294
+ & self . dec_keys
2295
2295
}
2296
2296
2297
2297
pub fn addr_comm ( & self ) -> & AddressableCommittee {
@@ -2389,7 +2389,7 @@ mod tests {
2389
2389
. map ( |s| ( s. addr_comm ( ) . clone ( ) , s. key_store ( ) . clone ( ) ) ) ,
2390
2390
)
2391
2391
. retain ( RETAIN_ROUNDS )
2392
- . threshold_enc_key ( encryption_key_cell. clone ( ) )
2392
+ . threshold_dec_key ( encryption_key_cell. clone ( ) )
2393
2393
. build ( ) ;
2394
2394
2395
2395
let decrypter = Decrypter :: new (
0 commit comments