Skip to content

Commit c126f0b

Browse files
committed
public create_payment_onion in onion_utils
1 parent d2242f6 commit c126f0b

File tree

4 files changed

+35
-11
lines changed

4 files changed

+35
-11
lines changed

lightning/src/ln/channelmanager.rs

+4-6
Original file line numberDiff line numberDiff line change
@@ -3420,12 +3420,10 @@ where
34203420
let prng_seed = self.entropy_source.get_secure_random_bytes();
34213421
let session_priv = SecretKey::from_slice(&session_priv_bytes[..]).expect("RNG is busted");
34223422

3423-
let onion_keys = onion_utils::construct_onion_keys(&self.secp_ctx, &path, &session_priv)
3424-
.map_err(|_| APIError::InvalidRoute{err: "Pubkey along hop was maliciously selected".to_owned()})?;
3425-
let (onion_payloads, htlc_msat, htlc_cltv) = onion_utils::build_onion_payloads(path, total_value, recipient_onion, cur_height, keysend_preimage)?;
3426-
3427-
let onion_packet = onion_utils::construct_onion_packet(onion_payloads, onion_keys, prng_seed, payment_hash)
3428-
.map_err(|_| APIError::InvalidRoute { err: "Route size too large considering onion data".to_owned()})?;
3423+
let (onion_packet, htlc_msat, htlc_cltv) = onion_utils::create_payment_onion(
3424+
&self.secp_ctx, &path, &session_priv, total_value, recipient_onion, cur_height,
3425+
payment_hash, keysend_preimage, prng_seed
3426+
)?;
34293427

34303428
let err: Result<(), _> = loop {
34313429
let (counterparty_node_id, id) = match self.short_to_chan_info.read().unwrap().get(&path.hops.first().unwrap().short_channel_id) {

lightning/src/ln/mod.rs

+1
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,7 @@ pub(crate) mod onion_utils;
3939
mod outbound_payment;
4040
pub mod wire;
4141

42+
pub use onion_utils::create_payment_onion;
4243
// Older rustc (which we support) refuses to let us call the get_payment_preimage_hash!() macro
4344
// without the node parameter being mut. This is incorrect, and thus newer rustcs will complain
4445
// about an unnecessary mut. Thus, we silence the unused_mut warning in two test modules below.

lightning/src/ln/msgs.rs

+9-5
Original file line numberDiff line numberDiff line change
@@ -1674,17 +1674,21 @@ pub use self::fuzzy_internal_msgs::*;
16741674
#[cfg(not(fuzzing))]
16751675
pub(crate) use self::fuzzy_internal_msgs::*;
16761676

1677+
/// BOLT 4 onion packet including hop data for the next peer.
16771678
#[derive(Clone)]
1678-
pub(crate) struct OnionPacket {
1679-
pub(crate) version: u8,
1679+
pub struct OnionPacket {
1680+
/// BOLT 4 version number.
1681+
pub version: u8,
16801682
/// In order to ensure we always return an error on onion decode in compliance with [BOLT
16811683
/// #4](https://github.com/lightning/bolts/blob/master/04-onion-routing.md), we have to
16821684
/// deserialize `OnionPacket`s contained in [`UpdateAddHTLC`] messages even if the ephemeral
16831685
/// public key (here) is bogus, so we hold a [`Result`] instead of a [`PublicKey`] as we'd
16841686
/// like.
1685-
pub(crate) public_key: Result<PublicKey, secp256k1::Error>,
1686-
pub(crate) hop_data: [u8; 20*65],
1687-
pub(crate) hmac: [u8; 32],
1687+
pub public_key: Result<PublicKey, secp256k1::Error>,
1688+
/// 1300 bytes encrypted payload for the next hop.
1689+
pub hop_data: [u8; 20*65],
1690+
/// HMAC to verify the integrity of hop_data.
1691+
pub hmac: [u8; 32],
16881692
}
16891693

16901694
impl onion_utils::Packet for OnionPacket {

lightning/src/ln/onion_utils.rs

+21
Original file line numberDiff line numberDiff line change
@@ -935,6 +935,27 @@ pub(crate) fn decode_next_payment_hop<NS: Deref>(
935935
}
936936
}
937937

938+
/// Build a payment onion, returning the first hop msat and cltv values as well.
939+
/// `cur_block_height` should be set to the best known block height + 1.
940+
pub fn create_payment_onion<T: secp256k1::Signing>(
941+
secp_ctx: &Secp256k1<T>, path: &Path, session_priv: &SecretKey, total_msat: u64,
942+
recipient_onion: RecipientOnionFields, cur_block_height: u32, payment_hash: &PaymentHash,
943+
keysend_preimage: &Option<PaymentPreimage>, prng_seed: [u8; 32]
944+
) -> Result<(msgs::OnionPacket, u64, u32), APIError> {
945+
let onion_keys = construct_onion_keys(&secp_ctx, &path, &session_priv)
946+
.map_err(|_| APIError::InvalidRoute{
947+
err: "Pubkey along hop was maliciously selected".to_owned()
948+
})?;
949+
let (onion_payloads, htlc_msat, htlc_cltv) = build_onion_payloads(
950+
&path, total_msat, recipient_onion, cur_block_height, keysend_preimage
951+
)?;
952+
let onion_packet = construct_onion_packet(onion_payloads, onion_keys, prng_seed, payment_hash)
953+
.map_err(|_| APIError::InvalidRoute{
954+
err: "Route size too large considering onion data".to_owned()
955+
})?;
956+
Ok((onion_packet, htlc_msat, htlc_cltv))
957+
}
958+
938959
pub(crate) fn decode_next_untagged_hop<T, R: ReadableArgs<T>, N: NextPacketBytes>(shared_secret: [u8; 32], hop_data: &[u8], hmac_bytes: [u8; 32], read_args: T) -> Result<(R, Option<([u8; 32], N)>), OnionDecodeErr> {
939960
decode_next_hop(shared_secret, hop_data, hmac_bytes, None, read_args)
940961
}

0 commit comments

Comments
 (0)