@@ -39,12 +39,12 @@ func (*DecryptionKeyHandler) MessagePrototypes() []p2pmsg.Message {
3939}
4040
4141func (handler * DecryptionKeyHandler ) ValidateMessage (ctx context.Context , msg p2pmsg.Message ) (pubsub.ValidationResult , error ) {
42- key := msg .(* p2pmsg.DecryptionKeys )
43- if key .GetInstanceID () != handler .config .GetInstanceID () {
42+ decryptionKeys := msg .(* p2pmsg.DecryptionKeys )
43+ if decryptionKeys .GetInstanceID () != handler .config .GetInstanceID () {
4444 return pubsub .ValidationReject ,
45- errors .Errorf ("instance ID mismatch (want=%d, have=%d)" , handler .config .GetInstanceID (), key .GetInstanceID ())
45+ errors .Errorf ("instance ID mismatch (want=%d, have=%d)" , handler .config .GetInstanceID (), decryptionKeys .GetInstanceID ())
4646 }
47- eon , err := medley .Uint64ToInt64Safe (key .Eon )
47+ eon , err := medley .Uint64ToInt64Safe (decryptionKeys .Eon )
4848 if err != nil {
4949 return pubsub .ValidationReject , errors .Wrapf (err , "overflow error while converting eon to int64 %d" , eon )
5050 }
@@ -63,14 +63,14 @@ func (handler *DecryptionKeyHandler) ValidateMessage(ctx context.Context, msg p2
6363 return pubsub .ValidationReject , errors .Wrapf (err , "error while decoding pure DKG result for eon %d" , eon )
6464 }
6565
66- if len (key .Keys ) == 0 {
66+ if len (decryptionKeys .Keys ) == 0 {
6767 return pubsub .ValidationReject , errors .New ("no keys in message" )
6868 }
69- if len (key .Keys ) > MaxNumKeysPerMessage {
70- return pubsub .ValidationReject , errors .Errorf ("too many keys in message (%d > %d)" , len (key .Keys ), MaxNumKeysPerMessage )
69+ if len (decryptionKeys .Keys ) > MaxNumKeysPerMessage {
70+ return pubsub .ValidationReject , errors .Errorf ("too many keys in message (%d > %d)" , len (decryptionKeys .Keys ), MaxNumKeysPerMessage )
7171 }
7272
73- for i , k := range key .Keys {
73+ for i , k := range decryptionKeys .Keys {
7474 epochSecretKey , err := k .GetEpochSecretKey ()
7575 if err != nil {
7676 return pubsub .ValidationReject , err
@@ -89,7 +89,7 @@ func (handler *DecryptionKeyHandler) ValidateMessage(ctx context.Context, msg p2
8989 if ! ok {
9090 return pubsub .ValidationReject , errors .Errorf ("epoch secret key for identity %x is not valid" , k .Identity )
9191 }
92- if i > 0 && bytes .Compare (k .Identity , key .Keys [i - 1 ].Identity ) < 0 {
92+ if i > 0 && bytes .Compare (k .Identity , decryptionKeys .Keys [i - 1 ].Identity ) < 0 {
9393 return pubsub .ValidationReject , errors .Errorf ("keys not ordered" )
9494 }
9595 }
@@ -98,16 +98,16 @@ func (handler *DecryptionKeyHandler) ValidateMessage(ctx context.Context, msg p2
9898
9999func (handler * DecryptionKeyHandler ) HandleMessage (ctx context.Context , msg p2pmsg.Message ) ([]p2pmsg.Message , error ) {
100100 metricsEpochKGDecryptionKeysReceived .Inc ()
101- key := msg .(* p2pmsg.DecryptionKeys )
101+ decryptionKeys := msg .(* p2pmsg.DecryptionKeys )
102102 // We assume that it's valid as it already passed the libp2p validator.
103103 // Insert the key into the cache.
104- for _ , k := range key .Keys {
104+ for _ , k := range decryptionKeys .Keys {
105105 epochSecretKey , err := k .GetEpochSecretKey ()
106106 if err != nil {
107107 return nil , err
108108 }
109109 handler .cache .Add (* epochSecretKey , k .Identity )
110110 }
111111 // Insert the key into the db.
112- return nil , database .New (handler .dbpool ).InsertDecryptionKeysMsg (ctx , key )
112+ return nil , database .New (handler .dbpool ).InsertDecryptionKeysMsg (ctx , decryptionKeys )
113113}
0 commit comments