You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Sure, it's used to derive a secret for blinding, but it's also used to derive the key
for encrypted_recipient_data. It's not used as a blinding factor *directly*.
Signed-off-by: Rusty Russell <[email protected]>
Copy file name to clipboardExpand all lines: 02-peer-protocol.md
+8-6Lines changed: 8 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -1975,9 +1975,9 @@ is destined, is described in [BOLT #4](04-onion-routing.md).
1975
1975
1976
1976
1.`tlv_stream`: `update_add_htlc_tlvs`
1977
1977
2. types:
1978
-
1. type: 0 (`blinding_point`)
1978
+
1. type: 0 (`blinded_path`)
1979
1979
2. data:
1980
-
*[`point`:`blinding`]
1980
+
*[`point`:`path_key`]
1981
1981
1982
1982
#### Requirements
1983
1983
@@ -2015,7 +2015,7 @@ A sending node:
2015
2015
- MUST set `id` to 0.
2016
2016
- MUST increase the value of `id` by 1 for each successive offer.
2017
2017
- if it is relaying a payment inside a blinded route:
2018
-
- MUST set `blinding_point` (see [Route Blinding](04-onion-routing.md#route-blinding))
2018
+
- MUST set `path_key` (see [Route Blinding](04-onion-routing.md#route-blinding))
2019
2019
2020
2020
`id` MUST NOT be reset to 0 after the update is complete (i.e. after `revoke_and_ack` has
2021
2021
been received). It MUST continue incrementing instead.
@@ -2040,7 +2040,9 @@ A receiving node:
2040
2040
- if other `id` violations occur:
2041
2041
- MAY send a `warning` and close the connection, or send an
2042
2042
`error` and fail the channel.
2043
-
- MUST decrypt `onion_routing_packet` with `associated_data` set to `payment_hash`, and using `blinding` (if present) as described in [Onion Decryption](04-onion-routing.md#onion-decryption) to extract a `payload`.
2043
+
- MUST decrypt `onion_routing_packet` as described in [Onion Decryption](04-onion-routing.md#onion-decryption) to extract a `payload`.
2044
+
- MUST use `path_key` (if specified).
2045
+
- MUST use `payment_hash` as `associated_data`.
2044
2046
- If decryption fails, the result is not a valid `payload` TLV, or it contains unknown even types:
2045
2047
- MUST respond with an error as detailed in [Failure Messages](04-onion-routing.md#failure-messages)
2046
2048
- Otherwise:
@@ -2128,14 +2130,14 @@ A node:
2128
2130
- MUST NOT send an `update_fulfill_htlc`, `update_fail_htlc`, or
2129
2131
`update_fail_malformed_htlc`.
2130
2132
- When failing an incoming HTLC:
2131
-
- If `current_blinding_point` is set in the onion payload and it is not the
2133
+
- If `current_path_key_point` is set in the onion payload and it is not the
2132
2134
final node:
2133
2135
- MUST send an `update_fail_htlc` error using the `invalid_onion_blinding`
2134
2136
failure code for any local or downstream errors.
2135
2137
- SHOULD use the `sha256_of_onion` of the onion it received.
2136
2138
- MAY use an all zero `sha256_of_onion`.
2137
2139
- SHOULD add a random delay before sending `update_fail_htlc`.
2138
-
- If `blinding_point` is set in the incoming `update_add_htlc`:
2140
+
- If `path_key_point` is set in the incoming `update_add_htlc`:
2139
2141
- MUST send an `update_fail_malformed_htlc` error using the
2140
2142
`invalid_onion_blinding` failure code for any local or downstream errors.
2141
2143
- SHOULD use the `sha256_of_onion` of the onion it received.
0 commit comments