@@ -28,11 +28,12 @@ import (
28
28
"encoding/binary"
29
29
"errors"
30
30
"fmt"
31
+
31
32
".com/cisco/go-hpke"
32
33
)
33
34
34
35
const (
35
- ODOH_VERSION = uint16 (0xff03 )
36
+ ODOH_VERSION = uint16 (0xff04 )
36
37
ODOH_SECRET_LENGTH = 32
37
38
ODOH_PADDING_BYTE = uint8 (0 )
38
39
ODOH_LABEL_KEY_ID = "odoh key id"
@@ -58,7 +59,7 @@ func CreateObliviousDoHConfigContents(kemID hpke.KEMID, kdfID hpke.KDFID, aeadID
58
59
return ObliviousDoHConfigContents {}, err
59
60
}
60
61
61
- _ , err = suite .KEM .Deserialize (publicKeyBytes )
62
+ _ , err = suite .KEM .DeserializePublicKey (publicKeyBytes )
62
63
if err != nil {
63
64
return ObliviousDoHConfigContents {}, err
64
65
}
@@ -177,7 +178,7 @@ func UnmarshalObliviousDoHConfigContents(buffer []byte) (ObliviousDoHConfigConte
177
178
return ObliviousDoHConfigContents {}, errors .New (fmt .Sprintf ("Unsupported HPKE ciphersuite" ))
178
179
}
179
180
180
- _ , err = suite .KEM .Deserialize (publicKeyBytes )
181
+ _ , err = suite .KEM .DeserializePublicKey (publicKeyBytes )
181
182
if err != nil {
182
183
return ObliviousDoHConfigContents {}, errors .New (fmt .Sprintf ("Invalid HPKE public key bytes" ))
183
184
}
@@ -338,7 +339,7 @@ func CreateKeyPairFromSeed(kemID hpke.KEMID, kdfID hpke.KDFID, aeadID hpke.AEADI
338
339
return ObliviousDoHKeyPair {}, err
339
340
}
340
341
341
- configContents , err := CreateObliviousDoHConfigContents (kemID , kdfID , aeadID , suite .KEM .Serialize (pk ))
342
+ configContents , err := CreateObliviousDoHConfigContents (kemID , kdfID , aeadID , suite .KEM .SerializePublicKey (pk ))
342
343
if err != nil {
343
344
return ObliviousDoHKeyPair {}, err
344
345
}
@@ -369,7 +370,7 @@ func CreateKeyPair(kemID hpke.KEMID, kdfID hpke.KDFID, aeadID hpke.AEADID) (Obli
369
370
return ObliviousDoHKeyPair {}, err
370
371
}
371
372
372
- configContents , err := CreateObliviousDoHConfigContents (kemID , kdfID , aeadID , suite .KEM .Serialize (pk ))
373
+ configContents , err := CreateObliviousDoHConfigContents (kemID , kdfID , aeadID , suite .KEM .SerializePublicKey (pk ))
373
374
if err != nil {
374
375
return ObliviousDoHKeyPair {}, err
375
376
}
@@ -444,7 +445,7 @@ func (targetKey ObliviousDoHConfigContents) EncryptQuery(query *ObliviousDNSQuer
444
445
return ObliviousDNSMessage {}, QueryContext {}, err
445
446
}
446
447
447
- pkR , err := suite .KEM .Deserialize (targetKey .PublicKeyBytes )
448
+ pkR , err := suite .KEM .DeserializePublicKey (targetKey .PublicKeyBytes )
448
449
if err != nil {
449
450
return ObliviousDNSMessage {}, QueryContext {}, err
450
451
}
0 commit comments