You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Clean up error handling on onion keys construction
Onion keys construction can only fail if we have a key which is
the inverse of a hash containing a public key which we generated
(even indirectly). Because we prefer to panic if our RNG creates an
insecure key (as it indicates operating is incredibly unsafe), we
thus don't actually need to return an error from
`construct_onion_keys_generic_callback`, which we clean up here.
let trampoline_onion_keys = onion_utils::construct_trampoline_onion_keys(&secp_ctx,&route.paths[0].blinded_tail.as_ref().unwrap(),&trampoline_secret_key).unwrap();
2103
+
let trampoline_onion_keys = onion_utils::construct_trampoline_onion_keys(&secp_ctx,&route.paths[0].blinded_tail.as_ref().unwrap(),&trampoline_secret_key);
2104
2104
let trampoline_packet = onion_utils::construct_trampoline_onion_packet(
let trampoline_onion_keys = onion_utils::construct_trampoline_onion_keys(&secp_ctx,&route.paths[0].blinded_tail.as_ref().unwrap(),&trampoline_secret_key).unwrap();
2297
+
let trampoline_onion_keys = onion_utils::construct_trampoline_onion_keys(&secp_ctx,&route.paths[0].blinded_tail.as_ref().unwrap(),&trampoline_secret_key);
2298
2298
let trampoline_packet = onion_utils::construct_trampoline_onion_packet(
0 commit comments