8
8
// licenses.
9
9
10
10
use bitcoin:: hashes:: hex:: FromHex ;
11
+ use bitcoin:: hashes:: sha256:: Hash as Sha256 ;
12
+ use bitcoin:: hashes:: Hash ;
11
13
use bitcoin:: hex:: DisplayHex ;
12
14
use bitcoin:: secp256k1:: { PublicKey , Scalar , Secp256k1 , SecretKey , schnorr} ;
13
15
use bitcoin:: secp256k1:: ecdh:: SharedSecret ;
@@ -2004,6 +2006,7 @@ fn do_test_trampoline_single_hop_receive(success: bool) {
2004
2006
let ( payment_preimage, payment_hash, payment_secret) = get_payment_preimage_hash ( & nodes[ 2 ] , Some ( amt_msat) , None ) ;
2005
2007
2006
2008
let carol_alice_trampoline_session_priv = secret_from_hex ( "a0f4b8d7b6c2d0ffdfaf718f76e9decaef4d9fb38a8c4addb95c4007cc3eee03" ) ;
2009
+
2007
2010
let carol_blinding_point = PublicKey :: from_secret_key ( & secp_ctx, & carol_alice_trampoline_session_priv) ;
2008
2011
let carol_blinded_hops = if success {
2009
2012
let payee_tlvs = UnauthenticatedReceiveTlvs {
@@ -2091,6 +2094,10 @@ fn do_test_trampoline_single_hop_receive(success: bool) {
2091
2094
route_params : None ,
2092
2095
} ;
2093
2096
2097
+ // We need the session priv to construct an invalid onion packet later.
2098
+ let override_random_bytes = [ 3 ; 32 ] ;
2099
+ * nodes[ 0 ] . keys_manager . override_random_bytes . lock ( ) . unwrap ( ) = Some ( override_random_bytes) ;
2100
+
2094
2101
nodes[ 0 ] . node . send_payment_with_route ( route. clone ( ) , payment_hash, RecipientOnionFields :: spontaneous_empty ( ) , PaymentId ( payment_hash. 0 ) ) . unwrap ( ) ;
2095
2102
2096
2103
check_added_monitors ! ( & nodes[ 0 ] , 1 ) ;
@@ -2101,8 +2108,7 @@ fn do_test_trampoline_single_hop_receive(success: bool) {
2101
2108
} else {
2102
2109
let replacement_onion = {
2103
2110
// create a substitute onion where the last Trampoline hop is a forward
2104
- let trampoline_secret_key = secret_from_hex ( "0134928f7b7ca6769080d70f16be84c812c741f545b49a34db47ce338a205799" ) ;
2105
- let prng_seed = secret_from_hex ( "fe02b4b9054302a3ddf4e1e9f7c411d644aebbd295218ab009dca94435f775a9" ) ;
2111
+ let trampoline_secret_key = SecretKey :: from_slice ( & override_random_bytes) . unwrap ( ) ;
2106
2112
let recipient_onion_fields = RecipientOnionFields :: spontaneous_empty ( ) ;
2107
2113
2108
2114
let mut blinded_tail = route. paths [ 0 ] . blinded_tail . clone ( ) . unwrap ( ) ;
@@ -2122,19 +2128,22 @@ fn do_test_trampoline_single_hop_receive(success: bool) {
2122
2128
let trampoline_packet = onion_utils:: construct_trampoline_onion_packet (
2123
2129
trampoline_payloads,
2124
2130
trampoline_onion_keys,
2125
- prng_seed . secret_bytes ( ) ,
2131
+ override_random_bytes ,
2126
2132
& payment_hash,
2127
2133
None ,
2128
2134
) . unwrap ( ) ;
2129
2135
2130
- let outer_session_priv = secret_from_hex ( "e52c20461ed7acd46c4e7b591a37610519179482887bd73bf3b94617f8f03677" ) ;
2136
+ let outer_session_priv = {
2137
+ let session_priv_hash = Sha256 :: hash ( & override_random_bytes) . to_byte_array ( ) ;
2138
+ SecretKey :: from_slice ( & session_priv_hash[ ..] ) . expect ( "You broke SHA-256!" )
2139
+ } ;
2131
2140
2132
2141
let ( outer_payloads, _, _) = onion_utils:: build_onion_payloads ( & route. paths [ 0 ] , outer_total_msat, & recipient_onion_fields, outer_starting_htlc_offset, & None , None , Some ( trampoline_packet) ) . unwrap ( ) ;
2133
2142
let outer_onion_keys = onion_utils:: construct_onion_keys ( & secp_ctx, & route. clone ( ) . paths [ 0 ] , & outer_session_priv) ;
2134
2143
let outer_packet = onion_utils:: construct_onion_packet (
2135
2144
outer_payloads,
2136
2145
outer_onion_keys,
2137
- prng_seed . secret_bytes ( ) ,
2146
+ override_random_bytes ,
2138
2147
& payment_hash,
2139
2148
) . unwrap ( ) ;
2140
2149
0 commit comments