@@ -4,7 +4,7 @@ use bitcoin::hashes::{Hash, HashEngine};
4
4
use bitcoin:: hashes:: sha256:: Hash as Sha256 ;
5
5
use bitcoin:: secp256k1:: { SecretKey , PublicKey } ;
6
6
7
- use ln:: peers:: { chacha, hkdf } ;
7
+ use ln:: peers:: { chacha, hkdf5869rfc } ;
8
8
use ln:: peers:: conduit:: { Conduit , SymmetricKey } ;
9
9
use ln:: peers:: handshake:: acts:: { Act , ActBuilder , ACT_ONE_LENGTH , ACT_TWO_LENGTH , ACT_THREE_LENGTH , EMPTY_ACT_ONE , EMPTY_ACT_TWO , EMPTY_ACT_THREE } ;
10
10
@@ -300,13 +300,13 @@ impl IHandshakeState for InitiatorAwaitingActTwoState {
300
300
let ecdh = ecdh ( & initiator_static_private_key, & responder_ephemeral_public_key) ;
301
301
302
302
// 4. ck, temp_k3 = HKDF(ck, se)
303
- let ( chaining_key, temporary_key) = hkdf :: derive ( & chaining_key, & ecdh) ;
303
+ let ( chaining_key, temporary_key) = hkdf5869rfc :: derive ( & chaining_key, & ecdh) ;
304
304
305
305
// 5. t = encryptWithAD(temp_k3, 0, h, zero)
306
306
chacha:: encrypt ( & temporary_key, 0 , & hash, & [ 0 ; 0 ] , & mut act_three[ 50 ..] ) ;
307
307
308
308
// 6. sk, rk = HKDF(ck, zero)
309
- let ( sending_key, receiving_key) = hkdf :: derive ( & chaining_key, & [ 0 ; 0 ] ) ;
309
+ let ( sending_key, receiving_key) = hkdf5869rfc :: derive ( & chaining_key, & [ 0 ; 0 ] ) ;
310
310
311
311
// 7. rn = 0, sn = 0
312
312
// - done by Conduit
@@ -377,13 +377,13 @@ impl IHandshakeState for ResponderAwaitingActThreeState {
377
377
let ecdh = ecdh ( & responder_ephemeral_private_key, & initiator_pubkey) ;
378
378
379
379
// 7. ck, temp_k3 = HKDF(ck, se)
380
- let ( chaining_key, temporary_key) = hkdf :: derive ( & chaining_key, & ecdh) ;
380
+ let ( chaining_key, temporary_key) = hkdf5869rfc :: derive ( & chaining_key, & ecdh) ;
381
381
382
382
// 8. p = decryptWithAD(temp_k3, 0, h, t)
383
383
chacha:: decrypt ( & temporary_key, 0 , & hash, & chacha_tag, & mut [ 0 ; 0 ] ) ?;
384
384
385
385
// 9. rk, sk = HKDF(ck, zero)
386
- let ( receiving_key, sending_key) = hkdf :: derive ( & chaining_key, & [ 0 ; 0 ] ) ;
386
+ let ( receiving_key, sending_key) = hkdf5869rfc :: derive ( & chaining_key, & [ 0 ; 0 ] ) ;
387
387
388
388
// 10. rn = 0, sn = 0
389
389
// - done by Conduit
@@ -436,7 +436,7 @@ fn calculate_act_message(local_private_ephemeral_key: &SecretKey, local_public_e
436
436
437
437
// 4. ACT1: ck, temp_k1 = HKDF(ck, es)
438
438
// 4. ACT2: ck, temp_k2 = HKDF(ck, ee)
439
- let ( chaining_key, temporary_key) = hkdf :: derive ( & chaining_key, & ecdh) ;
439
+ let ( chaining_key, temporary_key) = hkdf5869rfc :: derive ( & chaining_key, & ecdh) ;
440
440
441
441
// 5. ACT1: c = encryptWithAD(temp_k1, 0, h, zero)
442
442
// 5. ACT2: c = encryptWithAD(temp_k2, 0, h, zero)
@@ -487,7 +487,7 @@ fn process_act_message(act_bytes: &[u8], local_private_key: &SecretKey, chaining
487
487
488
488
// 6. Act1: ck, temp_k1 = HKDF(ck, es)
489
489
// 6. Act2: ck, temp_k2 = HKDF(ck, ee)
490
- let ( chaining_key, temporary_key) = hkdf :: derive ( & chaining_key, & ecdh) ;
490
+ let ( chaining_key, temporary_key) = hkdf5869rfc :: derive ( & chaining_key, & ecdh) ;
491
491
492
492
// 7. Act1: p = decryptWithAD(temp_k1, 0, h, c)
493
493
// 7. Act2: p = decryptWithAD(temp_k2, 0, h, c)
0 commit comments