) -> Result<Vec<BlindedHop>, secp256k1::Error>
where
T: secp256k1::Signing + secp256k1::Verification,
- I1: ExactSizeIterator<Item=&'a PublicKey>,
+ I1: Iterator<Item=&'a PublicKey>,
I2: Iterator,
I2::Item: Writeable
{
- let mut blinded_hops = Vec::with_capacity(unblinded_pks.len());
+ let mut blinded_hops = Vec::with_capacity(unblinded_pks.size_hint().0);
construct_keys_callback(
secp_ctx, unblinded_pks, None, session_priv,
|blinded_node_id, _, _, encrypted_payload_rho, _, _| {
}
/// Encrypt TLV payload to be used as a [`crate::blinded_path::BlindedHop::encrypted_payload`].
-fn encrypt_payload<P: Writeable>(payload: P, encrypted_tlvs_ss: [u8; 32]) -> Vec<u8> {
+fn encrypt_payload<P: Writeable>(payload: P, encrypted_tlvs_rho: [u8; 32]) -> Vec<u8> {
let mut writer = VecWriter(Vec::new());
- let write_adapter = ChaChaPolyWriteAdapter::new(encrypted_tlvs_ss, &payload);
+ let write_adapter = ChaChaPolyWriteAdapter::new(encrypted_tlvs_rho, &payload);
write_adapter.write(&mut writer).expect("In-memory writes cannot fail");
writer.0
}