lib/noise/state/handshake_state.rb in noise-ruby-0.8.4 vs lib/noise/state/handshake_state.rb in noise-ruby-0.9.4

- old
+ new

@@ -44,41 +44,41 @@ end # Sets message_patterns to the message patterns from handshake_pattern @message_patterns = @protocol.pattern.tokens.dup - @protocol.pattern.initiator_pre_messages&.map do |message| - keypair = initiator_keypair_getter.call(message) + @protocol.pattern.initiator_pre_messages&.map do |token| + keypair = initiator_keypair_getter.call(token) @symmetric_state.mix_hash(keypair) end if @protocol.pattern.fallback message = @message_patterns.delete_at(0).first public_key = initiator_keypair_getter.call(message) @symmetric_state.mix_hash(public_key) end - @protocol.pattern.responder_pre_messages&.map do |message| - keypair = responder_keypair_getter.call(message) + @protocol.pattern.responder_pre_messages&.map do |token| + keypair = responder_keypair_getter.call(token) @symmetric_state.mix_hash(keypair) end end def expected_message_length(payload_size) has_key = @symmetric_state.cipher_state.key? pattern = @message_patterns.first - len = pattern.inject(0) do |len, token| + len = pattern.inject(0) do |l, token| case token when 'e' - len += @protocol.dh_fn.dhlen + l += @protocol.dh_fn.dhlen has_key = true if @protocol.psk_handshake? when 's' - len += @protocol.dh_fn.dhlen - len += 16 if has_key + l += @protocol.dh_fn.dhlen + l += 16 if has_key when 'ee', 'es', 'se', 'ss', 'psk' has_key = true end - len + l end len += payload_size len += 16 if has_key len end