diff --git a/crypto.go b/crypto.go index 0fb4cee..15aafa0 100644 --- a/crypto.go +++ b/crypto.go @@ -206,11 +206,11 @@ func blindBaseElement(blindingFactor btcec.ModNScalar) *btcec.PublicKey { type sharedSecretGenerator interface { // generateSharedSecret given a public key, generates a shared secret // using private data of the underlying sharedSecretGenerator. - generateSharedSecret(dhKey *btcec.PublicKey) (Hash256, error) + GenerateSharedSecret(dhKey *btcec.PublicKey) (Hash256, error) } // generateSharedSecret generates the shared secret by given ephemeral key. -func (r *Router) generateSharedSecret(dhKey *btcec.PublicKey) (Hash256, error) { +func (r *Router) GenerateSharedSecret(dhKey *btcec.PublicKey) (Hash256, error) { var sharedSecret Hash256 // Ensure that the public key is on our curve. diff --git a/sphinx.go b/sphinx.go index 36e9a81..d59d0e1 100644 --- a/sphinx.go +++ b/sphinx.go @@ -534,7 +534,7 @@ func (r *Router) ProcessOnionPacket(onionPkt *OnionPacket, assocData []byte, incomingCltv uint32) (*ProcessedPacket, error) { // Compute the shared secret for this onion packet. - sharedSecret, err := r.generateSharedSecret(onionPkt.EphemeralKey) + sharedSecret, err := r.GenerateSharedSecret(onionPkt.EphemeralKey) if err != nil { return nil, err } @@ -568,7 +568,7 @@ func (r *Router) ReconstructOnionPacket(onionPkt *OnionPacket, assocData []byte) (*ProcessedPacket, error) { // Compute the shared secret for this onion packet. - sharedSecret, err := r.generateSharedSecret(onionPkt.EphemeralKey) + sharedSecret, err := r.GenerateSharedSecret(onionPkt.EphemeralKey) if err != nil { return nil, err } @@ -731,7 +731,7 @@ func (t *Tx) ProcessOnionPacket(seqNum uint16, onionPkt *OnionPacket, assocData []byte, incomingCltv uint32) error { // Compute the shared secret for this onion packet. - sharedSecret, err := t.router.generateSharedSecret( + sharedSecret, err := t.router.GenerateSharedSecret( onionPkt.EphemeralKey, ) if err != nil {