diff --git a/go.mod b/go.mod index 7435fe0fc450adc92439356079d986ace2a536cb..d235193b2a6e45b6c6437124133caf4a446bee9f 100644 --- a/go.mod +++ b/go.mod @@ -20,7 +20,7 @@ require ( github.com/spf13/viper v1.7.1 gitlab.com/elixxir/bloomfilter v0.0.0-20200930191214-10e9ac31b228 gitlab.com/elixxir/comms v0.0.4-0.20220104182551-5f9da6b4a832 - gitlab.com/elixxir/crypto v0.0.7-0.20220104182450-8ae43b36323a + gitlab.com/elixxir/crypto v0.0.7-0.20220107212555-7b80ecaff6d6 gitlab.com/elixxir/ekv v0.1.6 gitlab.com/elixxir/primitives v0.0.3-0.20220104173924-275cb9d7834f gitlab.com/xx_network/comms v0.0.4-0.20211227194445-c099754b3cda diff --git a/go.sum b/go.sum index 4a9d2a81379a3e0a65cd5b0749b098c877870410..cc2697392bb4908955ee59bde983636579cb30cc 100644 --- a/go.sum +++ b/go.sum @@ -276,6 +276,8 @@ gitlab.com/elixxir/crypto v0.0.0-20200804182833-984246dea2c4/go.mod h1:ucm9SFKJo gitlab.com/elixxir/crypto v0.0.3/go.mod h1:ZNgBOblhYToR4m8tj4cMvJ9UsJAUKq+p0gCp07WQmhA= gitlab.com/elixxir/crypto v0.0.7-0.20220104182450-8ae43b36323a h1:tnsmzW+NJuTJhda0/IYQa/RD41pH0TK36Z50cG0mdV4= gitlab.com/elixxir/crypto v0.0.7-0.20220104182450-8ae43b36323a/go.mod h1:qmW0OGPB21GcaGg1Jvt527/qUw7ke6W8DKCiYBfsx48= +gitlab.com/elixxir/crypto v0.0.7-0.20220107212555-7b80ecaff6d6 h1:/ZZzlUqeeN+VWnaU+MfOJ743VnkhrUrSWO9pdz9PJHU= +gitlab.com/elixxir/crypto v0.0.7-0.20220107212555-7b80ecaff6d6/go.mod h1:qmW0OGPB21GcaGg1Jvt527/qUw7ke6W8DKCiYBfsx48= gitlab.com/elixxir/ekv v0.1.6 h1:M2hUSNhH/ChxDd+s8xBqSEKgoPtmE6hOEBqQ73KbN6A= gitlab.com/elixxir/ekv v0.1.6/go.mod h1:e6WPUt97taFZe5PFLPb1Dupk7tqmDCTQu1kkstqJvw4= gitlab.com/elixxir/primitives v0.0.0-20200731184040-494269b53b4d/go.mod h1:OQgUZq7SjnE0b+8+iIAT2eqQF+2IFHn73tOo+aV11mg= diff --git a/network/node/register.go b/network/node/register.go index 3e19eb6750aa7bd040e12625ef1cf3bb0852ed0a..37cf86074cec920600e4f5fc90f3606c7d01a390 100644 --- a/network/node/register.go +++ b/network/node/register.go @@ -272,7 +272,7 @@ func requestKey(sender *gateway.Sender, comms RegisterNodeCommsInterface, // Verify the HMAC h.Reset() if !registration.VerifyClientHMAC(sessionKey.Bytes(), keyResponse.EncryptedClientKey, - h, keyResponse.EncryptedClientKeyHMAC) { + opts.Hash.New, keyResponse.EncryptedClientKeyHMAC) { return nil, nil, 0, errors.WithMessagef(err, "Failed to verify client HMAC") }