Skip to content

Commit 22525c6

Browse files
committed
improve naming of variable key
1 parent 9dd443a commit 22525c6

File tree

1 file changed

+12
-12
lines changed
  • rolling-shutter/keyper/epochkghandler

1 file changed

+12
-12
lines changed

rolling-shutter/keyper/epochkghandler/key.go

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -39,12 +39,12 @@ func (*DecryptionKeyHandler) MessagePrototypes() []p2pmsg.Message {
3939
}
4040

4141
func (handler *DecryptionKeyHandler) ValidateMessage(ctx context.Context, msg p2pmsg.Message) (pubsub.ValidationResult, error) {
42-
key := msg.(*p2pmsg.DecryptionKeys)
43-
if key.GetInstanceID() != handler.config.GetInstanceID() {
42+
decryptionKeys := msg.(*p2pmsg.DecryptionKeys)
43+
if decryptionKeys.GetInstanceID() != handler.config.GetInstanceID() {
4444
return pubsub.ValidationReject,
45-
errors.Errorf("instance ID mismatch (want=%d, have=%d)", handler.config.GetInstanceID(), key.GetInstanceID())
45+
errors.Errorf("instance ID mismatch (want=%d, have=%d)", handler.config.GetInstanceID(), decryptionKeys.GetInstanceID())
4646
}
47-
eon, err := medley.Uint64ToInt64Safe(key.Eon)
47+
eon, err := medley.Uint64ToInt64Safe(decryptionKeys.Eon)
4848
if err != nil {
4949
return pubsub.ValidationReject, errors.Wrapf(err, "overflow error while converting eon to int64 %d", eon)
5050
}
@@ -63,14 +63,14 @@ func (handler *DecryptionKeyHandler) ValidateMessage(ctx context.Context, msg p2
6363
return pubsub.ValidationReject, errors.Wrapf(err, "error while decoding pure DKG result for eon %d", eon)
6464
}
6565

66-
if len(key.Keys) == 0 {
66+
if len(decryptionKeys.Keys) == 0 {
6767
return pubsub.ValidationReject, errors.New("no keys in message")
6868
}
69-
if len(key.Keys) > MaxNumKeysPerMessage {
70-
return pubsub.ValidationReject, errors.Errorf("too many keys in message (%d > %d)", len(key.Keys), MaxNumKeysPerMessage)
69+
if len(decryptionKeys.Keys) > MaxNumKeysPerMessage {
70+
return pubsub.ValidationReject, errors.Errorf("too many keys in message (%d > %d)", len(decryptionKeys.Keys), MaxNumKeysPerMessage)
7171
}
7272

73-
for i, k := range key.Keys {
73+
for i, k := range decryptionKeys.Keys {
7474
epochSecretKey, err := k.GetEpochSecretKey()
7575
if err != nil {
7676
return pubsub.ValidationReject, err
@@ -89,7 +89,7 @@ func (handler *DecryptionKeyHandler) ValidateMessage(ctx context.Context, msg p2
8989
if !ok {
9090
return pubsub.ValidationReject, errors.Errorf("epoch secret key for identity %x is not valid", k.Identity)
9191
}
92-
if i > 0 && bytes.Compare(k.Identity, key.Keys[i-1].Identity) < 0 {
92+
if i > 0 && bytes.Compare(k.Identity, decryptionKeys.Keys[i-1].Identity) < 0 {
9393
return pubsub.ValidationReject, errors.Errorf("keys not ordered")
9494
}
9595
}
@@ -98,16 +98,16 @@ func (handler *DecryptionKeyHandler) ValidateMessage(ctx context.Context, msg p2
9898

9999
func (handler *DecryptionKeyHandler) HandleMessage(ctx context.Context, msg p2pmsg.Message) ([]p2pmsg.Message, error) {
100100
metricsEpochKGDecryptionKeysReceived.Inc()
101-
key := msg.(*p2pmsg.DecryptionKeys)
101+
decryptionKeys := msg.(*p2pmsg.DecryptionKeys)
102102
// We assume that it's valid as it already passed the libp2p validator.
103103
// Insert the key into the cache.
104-
for _, k := range key.Keys {
104+
for _, k := range decryptionKeys.Keys {
105105
epochSecretKey, err := k.GetEpochSecretKey()
106106
if err != nil {
107107
return nil, err
108108
}
109109
handler.cache.Add(*epochSecretKey, k.Identity)
110110
}
111111
// Insert the key into the db.
112-
return nil, database.New(handler.dbpool).InsertDecryptionKeysMsg(ctx, key)
112+
return nil, database.New(handler.dbpool).InsertDecryptionKeysMsg(ctx, decryptionKeys)
113113
}

0 commit comments

Comments
 (0)