@@ -38,7 +38,7 @@ thread_local! {
3838
3939#[ update]
4040async fn vetkd_public_key ( request : VetKDPublicKeyRequest ) -> VetKDPublicKeyReply {
41- ensure_bls12_381_test_key_1 ( request. key_id ) ;
41+ ensure_bls12_381_g2_test_key_1 ( request. key_id ) ;
4242 ensure_derivation_path_is_valid ( & request. derivation_path ) ;
4343 let derivation_path = {
4444 let canister_id = request. canister_id . unwrap_or_else ( ic_cdk:: caller) ;
@@ -51,13 +51,13 @@ async fn vetkd_public_key(request: VetKDPublicKeyRequest) -> VetKDPublicKeyReply
5151}
5252
5353#[ update]
54- async fn vetkd_encrypted_key ( request : VetKDEncryptedKeyRequest ) -> VetKDEncryptedKeyReply {
54+ async fn vetkd_derive_encrypted_key ( request : VetKDEncryptedKeyRequest ) -> VetKDEncryptedKeyReply {
5555 ensure_call_is_paid ( ENCRYPTED_KEY_CYCLE_COSTS ) ;
56- ensure_bls12_381_test_key_1 ( request. key_id ) ;
57- ensure_derivation_path_is_valid ( & request. public_key_derivation_path ) ;
56+ ensure_bls12_381_g2_test_key_1 ( request. key_id ) ;
57+ ensure_derivation_path_is_valid ( & request. derivation_path ) ;
5858 let derivation_path = DerivationPath :: new (
5959 ic_cdk:: caller ( ) . as_slice ( ) ,
60- & request. public_key_derivation_path ,
60+ & request. derivation_path ,
6161 ) ;
6262 let tpk =
6363 TransportPublicKey :: deserialize ( & request. encryption_public_key ) . unwrap_or_else (
@@ -93,8 +93,8 @@ async fn vetkd_encrypted_key(request: VetKDEncryptedKeyRequest) -> VetKDEncrypte
9393 }
9494}
9595
96- fn ensure_bls12_381_test_key_1 ( key_id : VetKDKeyId ) {
97- if key_id. curve != VetKDCurve :: Bls12_381 {
96+ fn ensure_bls12_381_g2_test_key_1 ( key_id : VetKDKeyId ) {
97+ if key_id. curve != VetKDCurve :: Bls12_381_G2 {
9898 ic_cdk:: trap ( "unsupported key ID curve" ) ;
9999 }
100100 if key_id. name . as_str ( ) != "test_key_1" {
0 commit comments