@@ -18,7 +18,7 @@ use crate::routing::gossip::NetworkUpdate;
18
18
use crate :: routing:: router:: { BlindedTail , Path , RouteHop , RouteParameters , TrampolineHop } ;
19
19
use crate :: sign:: NodeSigner ;
20
20
use crate :: types:: features:: { ChannelFeatures , NodeFeatures } ;
21
- use crate :: types:: payment:: { PaymentHash , PaymentPreimage , PaymentSecret } ;
21
+ use crate :: types:: payment:: { PaymentHash , PaymentPreimage } ;
22
22
use crate :: util:: errors:: { self , APIError } ;
23
23
use crate :: util:: logger:: Logger ;
24
24
use crate :: util:: ser:: { LengthCalculatingWriter , Readable , ReadableArgs , Writeable , Writer } ;
@@ -1478,7 +1478,6 @@ pub fn create_payment_onion<T: secp256k1::Signing>(
1478
1478
prng_seed,
1479
1479
None ,
1480
1480
None ,
1481
- None ,
1482
1481
)
1483
1482
}
1484
1483
@@ -1488,8 +1487,8 @@ pub(crate) fn create_payment_onion_internal<T: secp256k1::Signing>(
1488
1487
secp_ctx : & Secp256k1 < T > , path : & Path , session_priv : & SecretKey , total_msat : u64 ,
1489
1488
recipient_onion : & RecipientOnionFields , cur_block_height : u32 , payment_hash : & PaymentHash ,
1490
1489
keysend_preimage : & Option < PaymentPreimage > , invoice_request : Option < & InvoiceRequest > ,
1491
- prng_seed : [ u8 ; 32 ] , secondary_payment_secret : Option < PaymentSecret > ,
1492
- secondary_session_priv : Option < SecretKey > , secondary_prng_seed : Option < [ u8 ; 32 ] > ,
1490
+ prng_seed : [ u8 ; 32 ] , secondary_session_priv : Option < SecretKey > ,
1491
+ secondary_prng_seed : Option < [ u8 ; 32 ] > ,
1493
1492
) -> Result < ( msgs:: OnionPacket , u64 , u32 ) , APIError > {
1494
1493
let mut outer_total_msat = total_msat;
1495
1494
let mut outer_starting_htlc_offset = cur_block_height;
@@ -1525,54 +1524,23 @@ pub(crate) fn create_payment_onion_internal<T: secp256k1::Signing>(
1525
1524
} ) ?;
1526
1525
1527
1526
trampoline_packet_option = Some ( trampoline_packet) ;
1527
+
1528
+ outer_session_priv_override = Some ( secondary_session_priv. unwrap_or_else ( || {
1529
+ let session_priv_hash = Sha256 :: hash ( & session_priv. secret_bytes ( ) ) . to_byte_array ( ) ;
1530
+ SecretKey :: from_slice ( & session_priv_hash[ ..] ) . expect ( "You broke SHA-256!" )
1531
+ } ) ) ;
1528
1532
}
1529
1533
1530
- let ( mut onion_payloads, htlc_msat, htlc_cltv) = build_onion_payloads (
1534
+ let ( onion_payloads, htlc_msat, htlc_cltv) = build_onion_payloads (
1531
1535
& path,
1532
1536
outer_total_msat,
1533
1537
recipient_onion,
1534
1538
outer_starting_htlc_offset,
1535
1539
keysend_preimage,
1536
1540
invoice_request,
1541
+ trampoline_packet_option,
1537
1542
) ?;
1538
1543
1539
- if !path. trampoline_hops . is_empty ( ) {
1540
- let last_payload = onion_payloads. pop ( ) . ok_or ( APIError :: InvalidRoute {
1541
- err : "Non-Trampoline path needs at least one hop" . to_owned ( ) ,
1542
- } ) ?;
1543
-
1544
- match last_payload {
1545
- OutboundOnionPayload :: Receive { payment_data, .. } => {
1546
- let fee_delta = path. hops . last ( ) . map_or ( 0 , |h| h. fee_msat ) ;
1547
- let cltv_delta = path. hops . last ( ) . map_or ( 0 , |h| h. cltv_expiry_delta ) ;
1548
- let multipath_trampoline_data = payment_data. map ( |d| {
1549
- let trampoline_payment_secret = secondary_payment_secret. unwrap_or_else ( || {
1550
- PaymentSecret ( Sha256 :: hash ( & d. payment_secret . 0 ) . to_byte_array ( ) )
1551
- } ) ;
1552
- let total_msat = fee_delta;
1553
- FinalOnionHopData { payment_secret : trampoline_payment_secret, total_msat }
1554
- } ) ;
1555
- onion_payloads. push ( OutboundOnionPayload :: TrampolineEntrypoint {
1556
- amt_to_forward : fee_delta,
1557
- outgoing_cltv_value : outer_starting_htlc_offset + cltv_delta,
1558
- multipath_trampoline_data,
1559
- trampoline_packet : trampoline_packet_option. unwrap ( ) ,
1560
- } ) ;
1561
- } ,
1562
- _ => {
1563
- return Err ( APIError :: InvalidRoute {
1564
- err : "Last non-Trampoline hop must be of type OutboundOnionPayload::Receive"
1565
- . to_owned ( ) ,
1566
- } ) ;
1567
- } ,
1568
- } ;
1569
-
1570
- outer_session_priv_override = Some ( secondary_session_priv. unwrap_or_else ( || {
1571
- let session_priv_hash = Sha256 :: hash ( & session_priv. secret_bytes ( ) ) . to_byte_array ( ) ;
1572
- SecretKey :: from_slice ( & session_priv_hash[ ..] ) . expect ( "You broke SHA-256!" )
1573
- } ) ) ;
1574
- }
1575
-
1576
1544
let outer_session_priv = outer_session_priv_override. as_ref ( ) . unwrap_or ( session_priv) ;
1577
1545
let onion_keys = construct_onion_keys ( & secp_ctx, & path, outer_session_priv) . map_err ( |_| {
1578
1546
APIError :: InvalidRoute { err : "Pubkey along hop was maliciously selected" . to_owned ( ) }
0 commit comments