Skip to content

Commit db221e2

Browse files
committedMar 10, 2025·
fixup! Refactor onion_utils to encrypt/decrypt OnionErrorPacket types
1 parent 9fbbcdc commit db221e2

File tree

2 files changed

+9
-4
lines changed

2 files changed

+9
-4
lines changed
 

‎lightning/src/ln/onion_route_tests.rs

+3-3
Original file line numberDiff line numberDiff line change
@@ -686,7 +686,7 @@ fn test_onion_failure() {
686686
let mut onion_error = OnionErrorPacket {
687687
data: decoded_err_packet.encode(),
688688
};
689-
onion_utils::crypt_failure_packet(
689+
onion_utils::test_crypt_failure_packet(
690690
&onion_keys[1].shared_secret.as_ref(), &mut onion_error);
691691
msg.reason = onion_error.data;
692692
}, || nodes[2].node.fail_htlc_backwards(&payment_hash), false, None,
@@ -713,7 +713,7 @@ fn test_onion_failure() {
713713
let mut onion_error = OnionErrorPacket{
714714
data: decoded_err_packet.encode(),
715715
};
716-
onion_utils::crypt_failure_packet(
716+
onion_utils::test_crypt_failure_packet(
717717
&onion_keys[0].shared_secret.as_ref(), &mut onion_error);
718718
msg.reason = onion_error.data;
719719
}, || {}, true, Some(0x1000|7),
@@ -741,7 +741,7 @@ fn test_onion_failure() {
741741
let mut onion_error = OnionErrorPacket{
742742
data: decoded_err_packet.encode(),
743743
};
744-
onion_utils::crypt_failure_packet(
744+
onion_utils::test_crypt_failure_packet(
745745
&onion_keys[1].shared_secret.as_ref(), &mut onion_error);
746746
msg.reason = onion_error.data;
747747
}, || nodes[2].node.fail_htlc_backwards(&payment_hash), true, Some(0x1000|7),

‎lightning/src/ln/onion_utils.rs

+6-1
Original file line numberDiff line numberDiff line change
@@ -871,11 +871,16 @@ fn construct_onion_packet_with_init_noise<HD: Writeable, P: Packet>(
871871
}
872872

873873
/// Encrypts/decrypts a failure packet.
874-
pub(super) fn crypt_failure_packet(shared_secret: &[u8], packet: &mut OnionErrorPacket) {
874+
fn crypt_failure_packet(shared_secret: &[u8], packet: &mut OnionErrorPacket) {
875875
let ammag = gen_ammag_from_shared_secret(&shared_secret);
876876
process_chacha(&ammag, &mut packet.data);
877877
}
878878

879+
#[cfg(test)]
880+
pub(super) fn test_crypt_failure_packet(shared_secret: &[u8], packet: &mut OnionErrorPacket) {
881+
crypt_failure_packet(shared_secret, packet)
882+
}
883+
879884
fn process_chacha(key: &[u8; 32], packet: &mut [u8]) {
880885
let mut chacha = ChaCha20::new(key, &[0u8; 8]);
881886
chacha.process_in_place(packet);

0 commit comments

Comments
 (0)