refactor
This commit is contained in:
@@ -15,5 +15,5 @@ pub fn decode_typed_key(typed_key: &veilid_capnp::typed_key::Reader) -> Result<T
|
||||
pub fn encode_typed_key(typed_key: &TypedKey, builder: &mut veilid_capnp::typed_key::Builder) {
|
||||
builder.set_kind(u32::from_be_bytes(typed_key.kind.0));
|
||||
let mut key_builder = builder.reborrow().init_key();
|
||||
encode_key256(&typed_key.key, &mut key_builder);
|
||||
encode_key256(&typed_key.value, &mut key_builder);
|
||||
}
|
||||
|
@@ -20,5 +20,5 @@ pub fn encode_typed_signature(
|
||||
) {
|
||||
builder.set_kind(u32::from_be_bytes(typed_signature.kind.0));
|
||||
let mut sig_builder = builder.reborrow().init_signature();
|
||||
encode_signature512(&typed_signature.signature, &mut sig_builder);
|
||||
encode_signature512(&typed_signature.value, &mut sig_builder);
|
||||
}
|
||||
|
@@ -223,12 +223,12 @@ impl RPCProcessor {
|
||||
|
||||
// Determine if we can use optimized nodeinfo
|
||||
let route_node = if rss
|
||||
.has_remote_private_route_seen_our_node_info(&private_route.public_key.key)
|
||||
.has_remote_private_route_seen_our_node_info(&private_route.public_key.value)
|
||||
{
|
||||
if !routing_table.has_valid_own_node_info(RoutingDomain::PublicInternet) {
|
||||
return Ok(NetworkResult::no_connection_other("Own node info must be valid to use private route"));
|
||||
}
|
||||
RouteNode::NodeId(routing_table.node_id(crypto_kind).key)
|
||||
RouteNode::NodeId(routing_table.node_id(crypto_kind).value)
|
||||
} else {
|
||||
let Some(own_peer_info) =
|
||||
routing_table.get_own_peer_info(RoutingDomain::PublicInternet) else {
|
||||
@@ -245,11 +245,11 @@ impl RPCProcessor {
|
||||
// Sent to a private route via a safety route, respond to private route
|
||||
|
||||
// Check for loopback test
|
||||
let opt_private_route_id = rss.get_route_id_for_key(&private_route.public_key.key);
|
||||
let opt_private_route_id = rss.get_route_id_for_key(&private_route.public_key.value);
|
||||
let pr_key = if opt_private_route_id.is_some() && safety_spec.preferred_route == opt_private_route_id
|
||||
{
|
||||
// Private route is also safety route during loopback test
|
||||
private_route.public_key.key
|
||||
private_route.public_key.value
|
||||
} else {
|
||||
// Get the private route to respond to that matches the safety route spec we sent the request with
|
||||
let Some(pr_key) = rss
|
||||
|
@@ -505,7 +505,7 @@ impl RPCProcessor {
|
||||
// Get useful private route properties
|
||||
let pr_is_stub = remote_private_route.is_stub();
|
||||
let pr_hop_count = remote_private_route.hop_count;
|
||||
let pr_pubkey = remote_private_route.public_key.key;
|
||||
let pr_pubkey = remote_private_route.public_key.value;
|
||||
let crypto_kind = remote_private_route.crypto_kind();
|
||||
let Some(vcrypto) = self.crypto.get(crypto_kind) else {
|
||||
return Err(RPCError::internal("crypto not available for selected private route"));
|
||||
@@ -524,7 +524,7 @@ impl RPCProcessor {
|
||||
}
|
||||
};
|
||||
let sr_is_stub = compiled_route.safety_route.is_stub();
|
||||
let sr_pubkey = compiled_route.safety_route.public_key.key;
|
||||
let sr_pubkey = compiled_route.safety_route.public_key.value;
|
||||
|
||||
// Encrypt routed operation
|
||||
// Xmsg + ENC(Xmsg, DH(PKapr, SKbsr))
|
||||
@@ -599,7 +599,7 @@ impl RPCProcessor {
|
||||
let reply_private_route = match operation.kind() {
|
||||
RPCOperationKind::Question(q) => match q.respond_to() {
|
||||
RespondTo::Sender => None,
|
||||
RespondTo::PrivateRoute(pr) => Some(pr.public_key.key),
|
||||
RespondTo::PrivateRoute(pr) => Some(pr.public_key.value),
|
||||
},
|
||||
RPCOperationKind::Statement(_) | RPCOperationKind::Answer(_) => None,
|
||||
};
|
||||
|
@@ -60,7 +60,7 @@ impl RPCProcessor {
|
||||
let sender = msg
|
||||
.opt_sender_nr
|
||||
.as_ref()
|
||||
.map(|nr| nr.node_ids().get(crypto_kind).unwrap().key);
|
||||
.map(|nr| nr.node_ids().get(crypto_kind).unwrap().value);
|
||||
|
||||
// Register a waiter for this app call
|
||||
let id = msg.operation.op_id();
|
||||
|
@@ -37,7 +37,7 @@ impl RPCProcessor {
|
||||
let sender = msg
|
||||
.opt_sender_nr
|
||||
.as_ref()
|
||||
.map(|nr| nr.node_ids().get(crypto_kind).unwrap().key);
|
||||
.map(|nr| nr.node_ids().get(crypto_kind).unwrap().value);
|
||||
|
||||
// Pass the message up through the update callback
|
||||
let message = app_message.message;
|
||||
|
@@ -111,7 +111,7 @@ impl RPCProcessor {
|
||||
// xxx: punish nodes that send messages that fail to decrypt eventually? How to do this for safety routes?
|
||||
let node_id_secret = self.routing_table.node_id_secret(remote_sr_pubkey.kind);
|
||||
let dh_secret = vcrypto
|
||||
.cached_dh(&remote_sr_pubkey.key, &node_id_secret)
|
||||
.cached_dh(&remote_sr_pubkey.value, &node_id_secret)
|
||||
.map_err(RPCError::protocol)?;
|
||||
let body = match vcrypto.decrypt_aead(
|
||||
&routed_operation.data,
|
||||
@@ -131,7 +131,7 @@ impl RPCProcessor {
|
||||
// Pass message to RPC system
|
||||
self.enqueue_safety_routed_message(
|
||||
detail,
|
||||
remote_sr_pubkey.key,
|
||||
remote_sr_pubkey.value,
|
||||
routed_operation.sequencing,
|
||||
body,
|
||||
)
|
||||
@@ -166,7 +166,7 @@ impl RPCProcessor {
|
||||
(
|
||||
rsd.secret_key,
|
||||
SafetySpec {
|
||||
preferred_route: rss.get_route_id_for_key(&pr_pubkey.key),
|
||||
preferred_route: rss.get_route_id_for_key(&pr_pubkey.value),
|
||||
hop_count: rssd.hop_count(),
|
||||
stability: rssd.get_stability(),
|
||||
sequencing: routed_operation.sequencing,
|
||||
@@ -181,7 +181,7 @@ impl RPCProcessor {
|
||||
// Now that things are valid, decrypt the routed operation with DEC(nonce, DH(the SR's public key, the PR's (or node's) secret)
|
||||
// xxx: punish nodes that send messages that fail to decrypt eventually. How to do this for private routes?
|
||||
let dh_secret = vcrypto
|
||||
.cached_dh(&remote_sr_pubkey.key, &secret_key)
|
||||
.cached_dh(&remote_sr_pubkey.value, &secret_key)
|
||||
.map_err(RPCError::protocol)?;
|
||||
let body = vcrypto
|
||||
.decrypt_aead(
|
||||
@@ -197,8 +197,8 @@ impl RPCProcessor {
|
||||
// Pass message to RPC system
|
||||
self.enqueue_private_routed_message(
|
||||
detail,
|
||||
remote_sr_pubkey.key,
|
||||
pr_pubkey.key,
|
||||
remote_sr_pubkey.value,
|
||||
pr_pubkey.value,
|
||||
safety_spec,
|
||||
body,
|
||||
)
|
||||
@@ -315,7 +315,7 @@ impl RPCProcessor {
|
||||
// Decrypt the blob with DEC(nonce, DH(the PR's public key, this hop's secret)
|
||||
let node_id_secret = self.routing_table.node_id_secret(crypto_kind);
|
||||
let dh_secret = vcrypto
|
||||
.cached_dh(&pr_pubkey.key, &node_id_secret)
|
||||
.cached_dh(&pr_pubkey.value, &node_id_secret)
|
||||
.map_err(RPCError::protocol)?;
|
||||
let dec_blob_data = match vcrypto.decrypt_aead(
|
||||
&route_hop_data.blob,
|
||||
@@ -347,7 +347,7 @@ impl RPCProcessor {
|
||||
let node_id = self.routing_table.node_id(crypto_kind);
|
||||
let node_id_secret = self.routing_table.node_id_secret(crypto_kind);
|
||||
let sig = vcrypto
|
||||
.sign(&node_id.key, &node_id_secret, &route_operation.data)
|
||||
.sign(&node_id.value, &node_id_secret, &route_operation.data)
|
||||
.map_err(RPCError::internal)?;
|
||||
route_operation.signatures.push(sig);
|
||||
}
|
||||
@@ -394,7 +394,7 @@ impl RPCProcessor {
|
||||
// Decrypt the blob with DEC(nonce, DH(the SR's public key, this hop's secret)
|
||||
let node_id_secret = self.routing_table.node_id_secret(crypto_kind);
|
||||
let dh_secret = vcrypto
|
||||
.cached_dh(&route.safety_route.public_key.key, &node_id_secret)
|
||||
.cached_dh(&route.safety_route.public_key.value, &node_id_secret)
|
||||
.map_err(RPCError::protocol)?;
|
||||
let mut dec_blob_data = vcrypto
|
||||
.decrypt_aead(
|
||||
|
Reference in New Issue
Block a user