@@ -18,7 +18,7 @@ use crate::routing::gossip::NetworkUpdate;
1818use crate :: routing:: router:: { BlindedTail , Path , RouteHop , RouteParameters , TrampolineHop } ;
1919use crate :: sign:: NodeSigner ;
2020use crate :: types:: features:: { ChannelFeatures , NodeFeatures } ;
21- use crate :: types:: payment:: { PaymentHash , PaymentPreimage , PaymentSecret } ;
21+ use crate :: types:: payment:: { PaymentHash , PaymentPreimage } ;
2222use crate :: util:: errors:: { self , APIError } ;
2323use crate :: util:: logger:: Logger ;
2424use crate :: util:: ser:: { LengthCalculatingWriter , Readable , ReadableArgs , Writeable , Writer } ;
@@ -1478,7 +1478,6 @@ pub fn create_payment_onion<T: secp256k1::Signing>(
14781478 prng_seed,
14791479 None ,
14801480 None ,
1481- None ,
14821481 )
14831482}
14841483
@@ -1488,8 +1487,8 @@ pub(crate) fn create_payment_onion_internal<T: secp256k1::Signing>(
14881487 secp_ctx : & Secp256k1 < T > , path : & Path , session_priv : & SecretKey , total_msat : u64 ,
14891488 recipient_onion : & RecipientOnionFields , cur_block_height : u32 , payment_hash : & PaymentHash ,
14901489 keysend_preimage : & Option < PaymentPreimage > , invoice_request : Option < & InvoiceRequest > ,
1491- prng_seed : [ u8 ; 32 ] , secondary_payment_secret : Option < PaymentSecret > ,
1492- secondary_session_priv : Option < SecretKey > , secondary_prng_seed : Option < [ u8 ; 32 ] > ,
1490+ prng_seed : [ u8 ; 32 ] , secondary_session_priv : Option < SecretKey > ,
1491+ secondary_prng_seed : Option < [ u8 ; 32 ] > ,
14931492) -> Result < ( msgs:: OnionPacket , u64 , u32 ) , APIError > {
14941493 let mut outer_total_msat = total_msat;
14951494 let mut outer_starting_htlc_offset = cur_block_height;
@@ -1525,54 +1524,23 @@ pub(crate) fn create_payment_onion_internal<T: secp256k1::Signing>(
15251524 } ) ?;
15261525
15271526 trampoline_packet_option = Some ( trampoline_packet) ;
1527+
1528+ outer_session_priv_override = Some ( secondary_session_priv. unwrap_or_else ( || {
1529+ let session_priv_hash = Sha256 :: hash ( & session_priv. secret_bytes ( ) ) . to_byte_array ( ) ;
1530+ SecretKey :: from_slice ( & session_priv_hash[ ..] ) . expect ( "You broke SHA-256!" )
1531+ } ) ) ;
15281532 }
15291533
1530- let ( mut onion_payloads, htlc_msat, htlc_cltv) = build_onion_payloads (
1534+ let ( onion_payloads, htlc_msat, htlc_cltv) = build_onion_payloads (
15311535 & path,
15321536 outer_total_msat,
15331537 recipient_onion,
15341538 outer_starting_htlc_offset,
15351539 keysend_preimage,
15361540 invoice_request,
1541+ trampoline_packet_option,
15371542 ) ?;
15381543
1539- if !path. trampoline_hops . is_empty ( ) {
1540- let last_payload = onion_payloads. pop ( ) . ok_or ( APIError :: InvalidRoute {
1541- err : "Non-Trampoline path needs at least one hop" . to_owned ( ) ,
1542- } ) ?;
1543-
1544- match last_payload {
1545- OutboundOnionPayload :: Receive { payment_data, .. } => {
1546- let fee_delta = path. hops . last ( ) . map_or ( 0 , |h| h. fee_msat ) ;
1547- let cltv_delta = path. hops . last ( ) . map_or ( 0 , |h| h. cltv_expiry_delta ) ;
1548- let multipath_trampoline_data = payment_data. map ( |d| {
1549- let trampoline_payment_secret = secondary_payment_secret. unwrap_or_else ( || {
1550- PaymentSecret ( Sha256 :: hash ( & d. payment_secret . 0 ) . to_byte_array ( ) )
1551- } ) ;
1552- let total_msat = fee_delta;
1553- FinalOnionHopData { payment_secret : trampoline_payment_secret, total_msat }
1554- } ) ;
1555- onion_payloads. push ( OutboundOnionPayload :: TrampolineEntrypoint {
1556- amt_to_forward : fee_delta,
1557- outgoing_cltv_value : outer_starting_htlc_offset + cltv_delta,
1558- multipath_trampoline_data,
1559- trampoline_packet : trampoline_packet_option. unwrap ( ) ,
1560- } ) ;
1561- } ,
1562- _ => {
1563- return Err ( APIError :: InvalidRoute {
1564- err : "Last non-Trampoline hop must be of type OutboundOnionPayload::Receive"
1565- . to_owned ( ) ,
1566- } ) ;
1567- } ,
1568- } ;
1569-
1570- outer_session_priv_override = Some ( secondary_session_priv. unwrap_or_else ( || {
1571- let session_priv_hash = Sha256 :: hash ( & session_priv. secret_bytes ( ) ) . to_byte_array ( ) ;
1572- SecretKey :: from_slice ( & session_priv_hash[ ..] ) . expect ( "You broke SHA-256!" )
1573- } ) ) ;
1574- }
1575-
15761544 let outer_session_priv = outer_session_priv_override. as_ref ( ) . unwrap_or ( session_priv) ;
15771545 let onion_keys = construct_onion_keys ( & secp_ctx, & path, outer_session_priv) . map_err ( |_| {
15781546 APIError :: InvalidRoute { err : "Pubkey along hop was maliciously selected" . to_owned ( ) }
0 commit comments