-
Notifications
You must be signed in to change notification settings - Fork 107
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
go/worker/keymanager/churp: Orchestrate handoffs #5640
Conversation
✅ Deploy Preview for oasisprotocol-oasis-core canceled.
|
fcc9101
to
be0b850
Compare
|
||
/// Encoded secret share. | ||
#[derive(Clone, Default, cbor::Encode, cbor::Decode)] | ||
pub struct EncodedSecretShare { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should probably derive Zeroize
with #[zeroize(drop)]
as it contains secret data. Possibly elsewhere as well (e.g. SecretShare
).
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Agree. Working on this.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Will be done in another PR.
be0b850
to
38f8930
Compare
2f4cac6
to
d07e5df
Compare
d07e5df
to
8af7e05
Compare
The enclave call will always fail with the error 'unknown peer id' if the nodes to which the call should be directed are not part of the committee. To prevent the call from being directed to a random key manager node, an error should be returned instead.
Support storing the secret share of a player to prevent its loss during restarts or failures.
Generalizes the initialization request so that it can also be used for other requests with the same parameters.
8af7e05
to
7673734
Compare
No description provided.