You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
let session_priv = secp_call!(SecretKey::from_slice(&self.secp_ctx,&{
912
+
let session_priv = SecretKey::from_slice(&self.secp_ctx,&{
914
913
letmut session_key = [0;32];
915
914
rng::fill_bytes(&mut session_key);
916
915
session_key
917
-
}));
916
+
}).expect("RNG is bad!");
918
917
919
918
let cur_height = self.latest_block_height.load(Ordering::Acquire)asu32 + 1;
920
919
921
-
let onion_keys = ChannelManager::construct_onion_keys(&self.secp_ctx,&route,&session_priv)?;
920
+
//TODO: This should return something other than HandleError, that's really intended for
921
+
//p2p-returns only.
922
+
let onion_keys = secp_call!(ChannelManager::construct_onion_keys(&self.secp_ctx,&route,&session_priv),"Pubkey along hop was maliciously selected", msgs::ErrorAction::IgnoreError);
let bad_sig_action = msgs::ErrorAction::SendErrorMessage{msg: msgs::ErrorMessage{channel_id: msg.channel_id.clone(),data:"Invalid signature in announcement_signatures".to_string()}};
0 commit comments