Skip to content

Commit 6943d92

Browse files
committed
improve naming in decryption keys message validation
1 parent 101f4d3 commit 6943d92

File tree

1 file changed

+16
-16
lines changed
  • rolling-shutter/keyper/epochkghandler

1 file changed

+16
-16
lines changed

rolling-shutter/keyper/epochkghandler/key.go

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -32,15 +32,15 @@ func (*DecryptionKeyHandler) MessagePrototypes() []p2pmsg.Message {
3232
}
3333

3434
func (handler *DecryptionKeyHandler) ValidateMessage(ctx context.Context, msg p2pmsg.Message) (pubsub.ValidationResult, error) {
35-
key := msg.(*p2pmsg.DecryptionKeys)
36-
if key.GetInstanceID() != handler.config.GetInstanceID() {
35+
decryptionKeys := msg.(*p2pmsg.DecryptionKeys)
36+
if decryptionKeys.GetInstanceID() != handler.config.GetInstanceID() {
3737
return pubsub.ValidationReject,
38-
errors.Errorf("instance ID mismatch (want=%d, have=%d)", handler.config.GetInstanceID(), key.GetInstanceID())
38+
errors.Errorf("instance ID mismatch (want=%d, have=%d)", handler.config.GetInstanceID(), decryptionKeys.GetInstanceID())
3939
}
4040

41-
eon, err := medley.Uint64ToInt64Safe(key.Eon)
41+
eon, err := medley.Uint64ToInt64Safe(decryptionKeys.Eon)
4242
if err != nil {
43-
return pubsub.ValidationReject, errors.Wrapf(err, "overflow error while converting eon to int64 %d", key.Eon)
43+
return pubsub.ValidationReject, errors.Wrapf(err, "overflow error while converting eon to int64 %d", decryptionKeys.Eon)
4444
}
4545

4646
queries := database.New(handler.dbpool)
@@ -69,40 +69,40 @@ func (handler *DecryptionKeyHandler) ValidateMessage(ctx context.Context, msg p2
6969
return pubsub.ValidationReject, errors.Wrapf(err, "error while decoding pure DKG result for eon %d", eon)
7070
}
7171

72-
if len(key.Keys) == 0 {
72+
if len(decryptionKeys.Keys) == 0 {
7373
return pubsub.ValidationReject, errors.New("no keys in message")
7474
}
75-
if len(key.Keys) > int(handler.config.GetMaxNumKeysPerMessage()) {
75+
if len(decryptionKeys.Keys) > int(handler.config.GetMaxNumKeysPerMessage()) {
7676
return pubsub.ValidationReject, errors.Errorf(
7777
"too many keys in message (%d > %d)",
78-
len(key.Keys),
78+
len(decryptionKeys.Keys),
7979
handler.config.GetMaxNumKeysPerMessage(),
8080
)
8181
}
8282

83-
validationResult, err := checkKeysErrors(ctx, key, pureDKGResult, queries)
83+
validationResult, err := checkKeysErrors(ctx, decryptionKeys, pureDKGResult, queries)
8484
return validationResult, err
8585
}
8686

87-
func checkKeysErrors(ctx context.Context, msg *p2pmsg.DecryptionKeys, pureDKGResult *puredkg.Result, queries *database.Queries) (pubsub.ValidationResult, error) {
87+
func checkKeysErrors(ctx context.Context, decryptionKeys *p2pmsg.DecryptionKeys, pureDKGResult *puredkg.Result, queries *database.Queries) (pubsub.ValidationResult, error) {
8888

89-
for i, k := range msg.Keys {
89+
for i, k := range decryptionKeys.Keys {
9090
epochSecretKey, err := k.GetEpochSecretKey()
9191
if err != nil {
9292
return pubsub.ValidationReject, err
9393
}
94-
eon, err := medley.Uint64ToInt64Safe(msg.Eon)
94+
eon, err := medley.Uint64ToInt64Safe(decryptionKeys.Eon)
9595
if err != nil {
96-
return pubsub.ValidationReject, errors.Wrapf(err, "overflow error while converting eon to int64 %d", msg.Eon)
96+
return pubsub.ValidationReject, errors.Wrapf(err, "overflow error while converting eon to int64 %d", decryptionKeys.Eon)
9797
}
98-
decryptionKey, err := queries.GetDecryptionKey(ctx, database.GetDecryptionKeyParams{
98+
existingDecryptionKey, err := queries.GetDecryptionKey(ctx, database.GetDecryptionKeyParams{
9999
Eon: eon,
100100
EpochID: k.GetIdentity(),
101101
})
102102
if err != nil && !errors.Is(err, pgx.ErrNoRows) {
103103
return pubsub.ValidationReject, errors.Wrapf(err, "failed to get decryption key for identity %x from db", k.Identity)
104104
}
105-
if bytes.Equal(k.Key, decryptionKey.DecryptionKey) {
105+
if bytes.Equal(k.Key, existingDecryptionKey.DecryptionKey) {
106106
continue
107107
}
108108
ok, err := shcrypto.VerifyEpochSecretKey(epochSecretKey, pureDKGResult.PublicKey, k.Identity)
@@ -113,7 +113,7 @@ func checkKeysErrors(ctx context.Context, msg *p2pmsg.DecryptionKeys, pureDKGRes
113113
return pubsub.ValidationReject, errors.Errorf("epoch secret key for identity %x is not valid", k.Identity)
114114
}
115115

116-
if i > 0 && bytes.Compare(k.Identity, msg.Keys[i-1].Identity) < 0 {
116+
if i > 0 && bytes.Compare(k.Identity, decryptionKeys.Keys[i-1].Identity) < 0 {
117117
return pubsub.ValidationReject, errors.Errorf("keys not ordered")
118118
}
119119
}

0 commit comments

Comments
 (0)