You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
breakSome(("Forwarding node has tampered with the intended HTLC values or origin node has an obsolete cltv_expiry_delta",0x1000 | 13,Some(self.get_channel_update_for_unicast(chan).unwrap())));
1960
1960
}
1961
1961
let cur_height = self.best_block.read().unwrap().height() + 1;
1962
-
// Theoretically, channel counterparty shouldn't send us a HTLC expiring now, but we want to be robust wrt to counterparty
1963
-
// packet sanitization (see HTLC_FAIL_BACK_BUFFER rational)
1962
+
// Theoretically, channel counterparty shouldn't send us a HTLC expiring now,
1963
+
// but we want to be robust wrt to counterparty packet sanitization (see
1964
+
// HTLC_FAIL_BACK_BUFFER rationale).
1964
1965
if msg.cltv_expiry <= cur_height + HTLC_FAIL_BACK_BUFFERasu32{// expiry_too_soon
1965
1966
breakSome(("CLTV expiry is too close",0x1000 | 14,Some(self.get_channel_update_for_unicast(chan).unwrap())));
1966
1967
}
1967
1968
if msg.cltv_expiry > cur_height + CLTV_FAR_FAR_AWAYasu32{// expiry_too_far
1968
1969
breakSome(("CLTV expiry is too far in the future",21,None));
1969
1970
}
1970
-
// In theory, we would be safe against unintentional channel-closure, if we only required a margin of LATENCY_GRACE_PERIOD_BLOCKS.
1971
-
// But, to be safe against policy reception, we use a longer delay.
0 commit comments