We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent bad498b commit 84f5c92Copy full SHA for 84f5c92
mm2src/crypto/src/key_derivation.rs
@@ -133,7 +133,12 @@ pub(crate) fn derive_keys_for_mnemonic(
133
134
/// Splits a path into its components and derives a key for each component.
135
fn derive_key_from_path(master_node: &[u8], path: &str) -> MmResult<[u8; 32], KeyDerivationError> {
136
+ if master_node.len() < 64 {
137
+ return MmError::err(KeyDerivationError::InvalidKeyLength);
138
+ }
139
+
140
let mut current_key_material = master_node.to_vec();
141
142
for segment in path.split('/').filter(|s| !s.is_empty()) {
143
let mut mac = HmacSha512::new_from_slice(¤t_key_material[..32])
144
.map_err(|_| KeyDerivationError::HmacInitialization)?;
0 commit comments