Skip to content

Commit 82f6726

Browse files
committed
review: rename hkdf -> hkdf5869rfc.rs
Follow existing pattern used in util/ for consistency.
1 parent 9e20f98 commit 82f6726

File tree

4 files changed

+11
-11
lines changed

4 files changed

+11
-11
lines changed

lightning/src/ln/peers/conduit.rs

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
//! Handles all over the wire message encryption and decryption upon handshake completion.
22
3-
use ln::peers::{chacha, hkdf};
3+
use ln::peers::{chacha, hkdf5869rfc};
44
use util::byte_utils;
55

66
pub(super) type SymmetricKey = [u8; 32];
@@ -111,7 +111,7 @@ impl Conduit {
111111
}
112112

113113
fn rotate_key(chaining_key: &mut SymmetricKey, key: &mut SymmetricKey) {
114-
let (new_chaining_key, new_key) = hkdf::derive(chaining_key, key);
114+
let (new_chaining_key, new_key) = hkdf5869rfc::derive(chaining_key, key);
115115
chaining_key.copy_from_slice(&new_chaining_key);
116116
key.copy_from_slice(&new_key);
117117
}

lightning/src/ln/peers/handshake/states.rs

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ use bitcoin::hashes::{Hash, HashEngine};
44
use bitcoin::hashes::sha256::Hash as Sha256;
55
use bitcoin::secp256k1::{SecretKey, PublicKey};
66

7-
use ln::peers::{chacha, hkdf};
7+
use ln::peers::{chacha, hkdf5869rfc};
88
use ln::peers::conduit::{Conduit, SymmetricKey};
99
use ln::peers::handshake::acts::{Act, ActBuilder, ACT_ONE_LENGTH, ACT_TWO_LENGTH, ACT_THREE_LENGTH, EMPTY_ACT_ONE, EMPTY_ACT_TWO, EMPTY_ACT_THREE};
1010

@@ -300,13 +300,13 @@ impl IHandshakeState for InitiatorAwaitingActTwoState {
300300
let ecdh = ecdh(&initiator_static_private_key, &responder_ephemeral_public_key);
301301

302302
// 4. ck, temp_k3 = HKDF(ck, se)
303-
let (chaining_key, temporary_key) = hkdf::derive(&chaining_key, &ecdh);
303+
let (chaining_key, temporary_key) = hkdf5869rfc::derive(&chaining_key, &ecdh);
304304

305305
// 5. t = encryptWithAD(temp_k3, 0, h, zero)
306306
chacha::encrypt(&temporary_key, 0, &hash, &[0; 0], &mut act_three[50..]);
307307

308308
// 6. sk, rk = HKDF(ck, zero)
309-
let (sending_key, receiving_key) = hkdf::derive(&chaining_key, &[0; 0]);
309+
let (sending_key, receiving_key) = hkdf5869rfc::derive(&chaining_key, &[0; 0]);
310310

311311
// 7. rn = 0, sn = 0
312312
// - done by Conduit
@@ -377,13 +377,13 @@ impl IHandshakeState for ResponderAwaitingActThreeState {
377377
let ecdh = ecdh(&responder_ephemeral_private_key, &initiator_pubkey);
378378

379379
// 7. ck, temp_k3 = HKDF(ck, se)
380-
let (chaining_key, temporary_key) = hkdf::derive(&chaining_key, &ecdh);
380+
let (chaining_key, temporary_key) = hkdf5869rfc::derive(&chaining_key, &ecdh);
381381

382382
// 8. p = decryptWithAD(temp_k3, 0, h, t)
383383
chacha::decrypt(&temporary_key, 0, &hash, &chacha_tag, &mut [0; 0])?;
384384

385385
// 9. rk, sk = HKDF(ck, zero)
386-
let (receiving_key, sending_key) = hkdf::derive(&chaining_key, &[0; 0]);
386+
let (receiving_key, sending_key) = hkdf5869rfc::derive(&chaining_key, &[0; 0]);
387387

388388
// 10. rn = 0, sn = 0
389389
// - done by Conduit
@@ -436,7 +436,7 @@ fn calculate_act_message(local_private_ephemeral_key: &SecretKey, local_public_e
436436

437437
// 4. ACT1: ck, temp_k1 = HKDF(ck, es)
438438
// 4. ACT2: ck, temp_k2 = HKDF(ck, ee)
439-
let (chaining_key, temporary_key) = hkdf::derive(&chaining_key, &ecdh);
439+
let (chaining_key, temporary_key) = hkdf5869rfc::derive(&chaining_key, &ecdh);
440440

441441
// 5. ACT1: c = encryptWithAD(temp_k1, 0, h, zero)
442442
// 5. ACT2: c = encryptWithAD(temp_k2, 0, h, zero)
@@ -487,7 +487,7 @@ fn process_act_message(act_bytes: &[u8], local_private_key: &SecretKey, chaining
487487

488488
// 6. Act1: ck, temp_k1 = HKDF(ck, es)
489489
// 6. Act2: ck, temp_k2 = HKDF(ck, ee)
490-
let (chaining_key, temporary_key) = hkdf::derive(&chaining_key, &ecdh);
490+
let (chaining_key, temporary_key) = hkdf5869rfc::derive(&chaining_key, &ecdh);
491491

492492
// 7. Act1: p = decryptWithAD(temp_k1, 0, h, c)
493493
// 7. Act2: p = decryptWithAD(temp_k2, 0, h, c)

lightning/src/ln/peers/hkdf.rs renamed to lightning/src/ln/peers/hkdf5869rfc.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ pub(super) fn derive(salt: &[u8], ikm: &[u8]) -> ([u8; 32], [u8; 32]) {
5353
#[cfg(test)]
5454
mod test {
5555
use hex;
56-
use ln::peers::hkdf::derive;
56+
use ln::peers::hkdf5869rfc::derive;
5757

5858
// Test with SHA-256 and zero-length salt/info
5959
// Our implementation uses a zero-length info field and returns the first 64 octets. As a result,

lightning/src/ln/peers/mod.rs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
66
mod chacha;
77
pub mod handler;
8-
mod hkdf;
8+
mod hkdf5869rfc;
99

1010
#[cfg(feature = "fuzztarget")]
1111
pub mod conduit;

0 commit comments

Comments
 (0)