@@ -35,9 +35,7 @@ func TestOnionFailure(t *testing.T) {
3535 }
3636
3737 // Emulate creation of the obfuscator on node where error have occurred.
38- obfuscator := & OnionErrorEncrypter {
39- sharedSecret : sharedSecrets [len (errorPath )- 1 ],
40- }
38+ obfuscator := NewOnionErrorEncrypter (sharedSecrets [len (errorPath )- 1 ])
4139
4240 // Emulate the situation when last hop creates the onion failure
4341 // message and send it back.
@@ -47,9 +45,7 @@ func TestOnionFailure(t *testing.T) {
4745 for i := len (errorPath ) - 2 ; i >= 0 ; i -- {
4846 // Emulate creation of the obfuscator on forwarding node which
4947 // propagates the onion failure.
50- obfuscator = & OnionErrorEncrypter {
51- sharedSecret : sharedSecrets [i ],
52- }
48+ obfuscator = NewOnionErrorEncrypter (sharedSecrets [i ])
5349 obfuscatedData = obfuscator .EncryptError (false , obfuscatedData )
5450 }
5551
@@ -208,16 +204,16 @@ func TestOnionFailureSpecVector(t *testing.T) {
208204 t .Fatalf ("unable to decode spec shared secret: %v" ,
209205 err )
210206 }
211- obfuscator := & OnionErrorEncrypter {
212- sharedSecret : sharedSecrets [len (sharedSecrets )- 1 - i ],
213- }
207+ obfuscator := NewOnionErrorEncrypter (
208+ sharedSecrets [len (sharedSecrets )- 1 - i ],
209+ )
214210
215211 var b bytes.Buffer
216212 if err := obfuscator .Encode (& b ); err != nil {
217213 t .Fatalf ("unable to encode obfuscator: %v" , err )
218214 }
219215
220- obfuscator2 := & OnionErrorEncrypter {}
216+ obfuscator2 := NewOnionErrorEncrypter ( Hash256 {})
221217 obfuscatorReader := bytes .NewReader (b .Bytes ())
222218 if err := obfuscator2 .Decode (obfuscatorReader ); err != nil {
223219 t .Fatalf ("unable to decode obfuscator: %v" , err )
0 commit comments