nip46: only use nip44 for encrypting requests and responses (breaking).

This commit is contained in:
fiatjaf 2024-10-27 15:03:07 -03:00
parent 579172e5b7
commit 4346158f83
2 changed files with 2 additions and 4 deletions

View File

@ -54,7 +54,7 @@ func (s Session) MakeResponse(
}
jresp, _ := json.Marshal(resp)
ciphertext, err := nip04.Encrypt(string(jresp), s.SharedKey)
ciphertext, err := nip44.Encrypt(string(jresp), s.ConversationKey)
if err != nil {
return resp, evt, fmt.Errorf("failed to encrypt result: %w", err)
}

View File

@ -22,7 +22,6 @@ type BunkerClient struct {
pool *nostr.SimplePool
target string
relays []string
sharedSecret []byte // nip04
conversationKey [32]byte // nip44
listeners *xsync.MapOf[string, chan Response]
expectingAuth *xsync.MapOf[string, struct{}]
@ -103,7 +102,6 @@ func NewBunker(
clientSecretKey: clientSecretKey,
target: targetPublicKey,
relays: relays,
sharedSecret: sharedSecret,
conversationKey: conversationKey,
listeners: xsync.NewMapOf[string, chan Response](),
expectingAuth: xsync.NewMapOf[string, struct{}](),
@ -226,7 +224,7 @@ func (bunker *BunkerClient) RPC(ctx context.Context, method string, params []str
return "", err
}
content, err := nip04.Encrypt(string(req), bunker.sharedSecret)
content, err := nip44.Encrypt(string(req), bunker.conversationKey)
if err != nil {
return "", fmt.Errorf("error encrypting request: %w", err)
}