2019-12-05 11:06:28 +01:00
|
|
|
#include "common/onion.h"
|
|
|
|
#include <assert.h>
|
|
|
|
#include <ccan/array_size/array_size.h>
|
2020-04-11 05:23:09 +02:00
|
|
|
#include <ccan/cast/cast.h>
|
2020-04-11 04:52:51 +02:00
|
|
|
#include <common/ecdh.h>
|
2021-09-16 06:50:02 +02:00
|
|
|
#include <common/onion.h>
|
2019-12-05 11:06:28 +01:00
|
|
|
#include <common/sphinx.h>
|
2020-04-11 04:52:51 +02:00
|
|
|
#include <sodium/crypto_aead_chacha20poly1305.h>
|
2020-09-07 23:06:50 +02:00
|
|
|
#include <wire/onion_wire.h>
|
2019-12-05 11:06:28 +01:00
|
|
|
|
|
|
|
/* BOLT #4:
|
|
|
|
*
|
|
|
|
* ## Legacy `hop_data` payload format
|
|
|
|
*
|
|
|
|
* The `hop_data` format is identified by a single `0x00`-byte length,
|
|
|
|
* for backward compatibility. Its payload is defined as:
|
|
|
|
*
|
|
|
|
* 1. type: `hop_data` (for `realm` 0)
|
|
|
|
* 2. data:
|
|
|
|
* * [`short_channel_id`:`short_channel_id`]
|
|
|
|
* * [`u64`:`amt_to_forward`]
|
|
|
|
* * [`u32`:`outgoing_cltv_value`]
|
|
|
|
* * [`12*byte`:`padding`]
|
|
|
|
*/
|
|
|
|
static u8 *make_v0_hop(const tal_t *ctx,
|
|
|
|
const struct short_channel_id *scid,
|
|
|
|
struct amount_msat forward, u32 outgoing_cltv)
|
|
|
|
{
|
|
|
|
const u8 padding[] = {0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00};
|
|
|
|
/* Prepend 0 byte for realm */
|
|
|
|
u8 *buf = tal_arrz(ctx, u8, 1);
|
|
|
|
towire_short_channel_id(&buf, scid);
|
2020-08-27 02:58:32 +02:00
|
|
|
towire_amount_msat(&buf, forward);
|
2019-12-05 11:06:28 +01:00
|
|
|
towire_u32(&buf, outgoing_cltv);
|
|
|
|
towire(&buf, padding, ARRAY_SIZE(padding));
|
|
|
|
assert(tal_bytelen(buf) == 1 + 32);
|
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
|
|
|
|
static u8 *make_tlv_hop(const tal_t *ctx,
|
|
|
|
const struct tlv_tlv_payload *tlv)
|
|
|
|
{
|
|
|
|
/* We can't have over 64k anyway */
|
|
|
|
u8 *tlvs = tal_arr(ctx, u8, 3);
|
|
|
|
|
|
|
|
towire_tlv_payload(&tlvs, tlv);
|
|
|
|
|
|
|
|
switch (bigsize_put(tlvs, tal_bytelen(tlvs) - 3)) {
|
|
|
|
case 1:
|
|
|
|
/* Move over two unused bytes */
|
|
|
|
memmove(tlvs + 1, tlvs + 3, tal_bytelen(tlvs) - 3);
|
|
|
|
tal_resize(&tlvs, tal_bytelen(tlvs) - 2);
|
|
|
|
return tlvs;
|
|
|
|
case 3:
|
|
|
|
return tlvs;
|
|
|
|
}
|
|
|
|
abort();
|
|
|
|
}
|
|
|
|
|
|
|
|
u8 *onion_nonfinal_hop(const tal_t *ctx,
|
|
|
|
bool use_tlv,
|
|
|
|
const struct short_channel_id *scid,
|
|
|
|
struct amount_msat forward,
|
2020-04-11 05:23:09 +02:00
|
|
|
u32 outgoing_cltv,
|
|
|
|
const struct pubkey *blinding,
|
|
|
|
const u8 *enctlv)
|
2019-12-05 11:06:28 +01:00
|
|
|
{
|
|
|
|
if (use_tlv) {
|
|
|
|
struct tlv_tlv_payload *tlv = tlv_tlv_payload_new(tmpctx);
|
|
|
|
|
|
|
|
/* BOLT #4:
|
|
|
|
*
|
|
|
|
* The writer:
|
2020-01-31 02:39:12 +01:00
|
|
|
*...
|
|
|
|
* - For every node:
|
|
|
|
* - MUST include `amt_to_forward` and `outgoing_cltv_value`.
|
|
|
|
* - For every non-final node:
|
|
|
|
* - MUST include `short_channel_id`
|
|
|
|
* - MUST NOT include `payment_data`
|
2019-12-05 11:06:28 +01:00
|
|
|
*/
|
2020-05-06 12:41:54 +02:00
|
|
|
tlv->amt_to_forward = &forward.millisatoshis; /* Raw: TLV convert */
|
|
|
|
tlv->outgoing_cltv_value = &outgoing_cltv;
|
|
|
|
tlv->short_channel_id = cast_const(struct short_channel_id *,
|
|
|
|
scid);
|
2020-04-11 05:23:09 +02:00
|
|
|
#if EXPERIMENTAL_FEATURES
|
2020-05-06 12:41:54 +02:00
|
|
|
tlv->blinding_seed = cast_const(struct pubkey *, blinding);
|
|
|
|
tlv->enctlv = cast_const(u8 *, enctlv);
|
2020-04-11 05:23:09 +02:00
|
|
|
#endif
|
2019-12-05 11:06:28 +01:00
|
|
|
return make_tlv_hop(ctx, tlv);
|
|
|
|
} else {
|
2020-04-11 05:23:09 +02:00
|
|
|
#if EXPERIMENTAL_FEATURES
|
|
|
|
if (blinding || enctlv)
|
|
|
|
return NULL;
|
|
|
|
#endif
|
2019-12-05 11:06:28 +01:00
|
|
|
return make_v0_hop(ctx, scid, forward, outgoing_cltv);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
u8 *onion_final_hop(const tal_t *ctx,
|
|
|
|
bool use_tlv,
|
|
|
|
struct amount_msat forward,
|
|
|
|
u32 outgoing_cltv,
|
|
|
|
struct amount_msat total_msat,
|
2020-04-11 05:23:09 +02:00
|
|
|
const struct pubkey *blinding,
|
|
|
|
const u8 *enctlv,
|
2019-12-05 11:06:28 +01:00
|
|
|
const struct secret *payment_secret)
|
|
|
|
{
|
|
|
|
/* These go together! */
|
|
|
|
if (!payment_secret)
|
|
|
|
assert(amount_msat_eq(total_msat, forward));
|
|
|
|
|
|
|
|
if (use_tlv) {
|
|
|
|
struct tlv_tlv_payload *tlv = tlv_tlv_payload_new(tmpctx);
|
|
|
|
struct tlv_tlv_payload_payment_data tlv_pdata;
|
|
|
|
|
|
|
|
/* BOLT #4:
|
|
|
|
*
|
|
|
|
* The writer:
|
|
|
|
*...
|
2020-01-31 02:39:12 +01:00
|
|
|
* - For every node:
|
|
|
|
* - MUST include `amt_to_forward` and `outgoing_cltv_value`.
|
|
|
|
*...
|
|
|
|
* - For the final node:
|
|
|
|
* - MUST NOT include `short_channel_id`
|
|
|
|
* - if the recipient provided `payment_secret`:
|
|
|
|
* - MUST include `payment_data`
|
|
|
|
* - MUST set `payment_secret` to the one provided
|
|
|
|
* - MUST set `total_msat` to the total amount it will send
|
2019-12-05 11:06:28 +01:00
|
|
|
*/
|
2020-05-06 12:41:54 +02:00
|
|
|
tlv->amt_to_forward = &forward.millisatoshis; /* Raw: TLV convert */
|
|
|
|
tlv->outgoing_cltv_value = &outgoing_cltv;
|
2019-12-05 11:06:28 +01:00
|
|
|
|
|
|
|
if (payment_secret) {
|
|
|
|
tlv_pdata.payment_secret = *payment_secret;
|
|
|
|
tlv_pdata.total_msat = total_msat.millisatoshis; /* Raw: TLV convert */
|
|
|
|
tlv->payment_data = &tlv_pdata;
|
|
|
|
}
|
2020-04-11 05:23:09 +02:00
|
|
|
#if EXPERIMENTAL_FEATURES
|
2020-05-06 12:41:54 +02:00
|
|
|
tlv->blinding_seed = cast_const(struct pubkey *, blinding);
|
|
|
|
tlv->enctlv = cast_const(u8 *, enctlv);
|
2020-04-11 05:23:09 +02:00
|
|
|
#endif
|
2019-12-05 11:06:28 +01:00
|
|
|
return make_tlv_hop(ctx, tlv);
|
|
|
|
} else {
|
|
|
|
static struct short_channel_id all_zero_scid;
|
|
|
|
/* No payment secrets in legacy format. */
|
|
|
|
if (payment_secret)
|
|
|
|
return NULL;
|
2020-04-11 05:23:09 +02:00
|
|
|
#if EXPERIMENTAL_FEATURES
|
|
|
|
if (blinding || enctlv)
|
|
|
|
return NULL;
|
|
|
|
#endif
|
2019-12-05 11:06:28 +01:00
|
|
|
return make_v0_hop(ctx, &all_zero_scid, forward, outgoing_cltv);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Returns true if valid, and fills in type. */
|
|
|
|
static bool pull_payload_length(const u8 **cursor,
|
|
|
|
size_t *max,
|
2020-03-12 00:59:01 +01:00
|
|
|
bool has_realm,
|
2019-12-05 11:06:28 +01:00
|
|
|
enum onion_payload_type *type,
|
|
|
|
size_t *len)
|
|
|
|
{
|
|
|
|
/* *len will incorporate bytes we read from cursor */
|
|
|
|
const u8 *start = *cursor;
|
|
|
|
|
|
|
|
/* BOLT #4:
|
|
|
|
*
|
|
|
|
* The `length` field determines both the length and the format of the
|
|
|
|
* `hop_payload` field; the following formats are defined:
|
|
|
|
*/
|
|
|
|
*len = fromwire_bigsize(cursor, max);
|
|
|
|
if (!cursor)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
/* BOLT #4:
|
|
|
|
* - Legacy `hop_data` format, identified by a single `0x00` byte for
|
|
|
|
* length. In this case the `hop_payload_length` is defined to be 32
|
|
|
|
* bytes.
|
|
|
|
*/
|
2020-03-12 00:59:01 +01:00
|
|
|
if (has_realm && *len == 0) {
|
2019-12-05 11:06:28 +01:00
|
|
|
if (type)
|
|
|
|
*type = ONION_V0_PAYLOAD;
|
|
|
|
assert(*cursor - start == 1);
|
|
|
|
*len = 1 + 32;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* BOLT #4:
|
|
|
|
* - `tlv_payload` format, identified by any length over `1`. In this
|
|
|
|
* case the `hop_payload_length` is equal to the numeric value of
|
|
|
|
* `length`.
|
|
|
|
*/
|
2020-03-12 00:59:01 +01:00
|
|
|
if (!has_realm || *len > 1) {
|
2019-12-05 11:06:28 +01:00
|
|
|
/* It's still invalid if it claims to be too long! */
|
2020-03-12 00:59:01 +01:00
|
|
|
if (has_realm) {
|
|
|
|
if (*len > ROUTING_INFO_SIZE - HMAC_SIZE)
|
|
|
|
return false;
|
|
|
|
} else {
|
|
|
|
if (*len > *max)
|
|
|
|
return false;
|
|
|
|
}
|
2019-12-05 11:06:28 +01:00
|
|
|
|
|
|
|
if (type)
|
|
|
|
*type = ONION_TLV_PAYLOAD;
|
|
|
|
*len += (*cursor - start);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-03-12 00:59:01 +01:00
|
|
|
size_t onion_payload_length(const u8 *raw_payload, size_t len, bool has_realm,
|
2019-12-05 11:06:28 +01:00
|
|
|
bool *valid,
|
|
|
|
enum onion_payload_type *type)
|
|
|
|
{
|
|
|
|
size_t max = len, payload_len;
|
2020-03-12 00:59:01 +01:00
|
|
|
*valid = pull_payload_length(&raw_payload, &max, has_realm, type, &payload_len);
|
2019-12-05 11:06:28 +01:00
|
|
|
|
|
|
|
/* If it's not valid, copy the entire thing. */
|
|
|
|
if (!*valid)
|
|
|
|
return len;
|
|
|
|
|
|
|
|
return payload_len;
|
|
|
|
}
|
|
|
|
|
2020-04-11 04:52:51 +02:00
|
|
|
#if EXPERIMENTAL_FEATURES
|
|
|
|
static struct tlv_tlv_payload *decrypt_tlv(const tal_t *ctx,
|
|
|
|
const struct secret *blinding_ss,
|
|
|
|
const u8 *enc)
|
|
|
|
{
|
|
|
|
const unsigned char npub[crypto_aead_chacha20poly1305_ietf_NPUBBYTES] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 };
|
|
|
|
struct secret rho;
|
|
|
|
u8 *dec;
|
|
|
|
const u8 *cursor;
|
|
|
|
size_t max;
|
|
|
|
int ret;
|
|
|
|
struct tlv_tlv_payload *tlv;
|
|
|
|
|
|
|
|
subkey_from_hmac("rho", blinding_ss, &rho);
|
|
|
|
if (tal_bytelen(enc) < crypto_aead_chacha20poly1305_ietf_ABYTES)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
dec = tal_arr(tmpctx, u8,
|
|
|
|
tal_bytelen(enc)
|
|
|
|
- crypto_aead_chacha20poly1305_ietf_ABYTES);
|
|
|
|
ret = crypto_aead_chacha20poly1305_ietf_decrypt(dec, NULL,
|
|
|
|
NULL,
|
|
|
|
enc,
|
|
|
|
tal_bytelen(enc),
|
|
|
|
NULL, 0,
|
|
|
|
npub,
|
|
|
|
rho.data);
|
|
|
|
if (ret != 0)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
tlv = tlv_tlv_payload_new(ctx);
|
|
|
|
cursor = dec;
|
|
|
|
max = tal_bytelen(dec);
|
|
|
|
if (!fromwire_tlv_payload(&cursor, &max, tlv))
|
|
|
|
return tal_free(tlv);
|
|
|
|
|
|
|
|
return tlv;
|
|
|
|
}
|
|
|
|
#endif /* EXPERIMENTAL_FEATURES */
|
|
|
|
|
2019-12-05 11:06:28 +01:00
|
|
|
struct onion_payload *onion_decode(const tal_t *ctx,
|
2020-03-04 14:20:59 +01:00
|
|
|
const struct route_step *rs,
|
2020-04-11 04:52:51 +02:00
|
|
|
const struct pubkey *blinding,
|
|
|
|
const struct secret *blinding_ss,
|
2021-06-17 13:00:24 +02:00
|
|
|
u64 *accepted_extra_tlvs,
|
2020-03-04 14:20:59 +01:00
|
|
|
u64 *failtlvtype,
|
|
|
|
size_t *failtlvpos)
|
2019-12-05 11:06:28 +01:00
|
|
|
{
|
|
|
|
struct onion_payload *p = tal(ctx, struct onion_payload);
|
|
|
|
const u8 *cursor = rs->raw_payload;
|
|
|
|
size_t max = tal_bytelen(cursor), len;
|
|
|
|
struct tlv_tlv_payload *tlv;
|
|
|
|
|
2020-03-12 00:59:01 +01:00
|
|
|
if (!pull_payload_length(&cursor, &max, true, &p->type, &len))
|
2019-12-05 11:06:28 +01:00
|
|
|
return tal_free(p);
|
|
|
|
|
|
|
|
switch (p->type) {
|
|
|
|
case ONION_V0_PAYLOAD:
|
|
|
|
p->type = ONION_V0_PAYLOAD;
|
|
|
|
p->forward_channel = tal(p, struct short_channel_id);
|
|
|
|
fromwire_short_channel_id(&cursor, &max, p->forward_channel);
|
|
|
|
p->amt_to_forward = fromwire_amount_msat(&cursor, &max);
|
|
|
|
p->outgoing_cltv = fromwire_u32(&cursor, &max);
|
|
|
|
p->payment_secret = NULL;
|
2020-04-11 04:52:51 +02:00
|
|
|
p->blinding = NULL;
|
|
|
|
/* We can't handle blinding with a legacy payload */
|
|
|
|
if (blinding)
|
|
|
|
return tal_free(p);
|
2019-12-05 11:06:28 +01:00
|
|
|
|
|
|
|
if (rs->nextcase == ONION_FORWARD) {
|
|
|
|
p->total_msat = NULL;
|
|
|
|
} else {
|
2020-01-31 02:40:36 +01:00
|
|
|
/* BOLT #4:
|
2019-12-05 11:06:28 +01:00
|
|
|
* - if it is the final node:
|
|
|
|
* - MUST treat `total_msat` as if it were equal to
|
|
|
|
* `amt_to_forward` if it is not present. */
|
|
|
|
p->total_msat = tal_dup(p, struct amount_msat,
|
|
|
|
&p->amt_to_forward);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If they somehow got an invalid onion this far, fail. */
|
|
|
|
if (!cursor)
|
|
|
|
return tal_free(p);
|
2021-06-17 15:16:55 +02:00
|
|
|
p->tlv = NULL;
|
2019-12-05 11:06:28 +01:00
|
|
|
return p;
|
|
|
|
|
|
|
|
case ONION_TLV_PAYLOAD:
|
|
|
|
tlv = tlv_tlv_payload_new(p);
|
|
|
|
if (!fromwire_tlv_payload(&cursor, &max, tlv))
|
2020-03-04 14:19:23 +01:00
|
|
|
goto fail;
|
|
|
|
|
2021-06-17 13:00:24 +02:00
|
|
|
if (!tlv_fields_valid(tlv->fields, accepted_extra_tlvs, failtlvpos)) {
|
2020-03-04 14:20:59 +01:00
|
|
|
*failtlvtype = tlv->fields[*failtlvpos].numtype;
|
2020-03-04 14:19:23 +01:00
|
|
|
goto fail;
|
2020-03-04 14:20:59 +01:00
|
|
|
}
|
2019-12-05 11:06:28 +01:00
|
|
|
|
|
|
|
/* BOLT #4:
|
|
|
|
*
|
|
|
|
* The reader:
|
|
|
|
* - MUST return an error if `amt_to_forward` or
|
|
|
|
* `outgoing_cltv_value` are not present.
|
|
|
|
*/
|
|
|
|
if (!tlv->amt_to_forward || !tlv->outgoing_cltv_value)
|
2020-03-04 14:19:23 +01:00
|
|
|
goto fail;
|
2019-12-05 11:06:28 +01:00
|
|
|
|
2020-08-05 05:55:15 +02:00
|
|
|
p->amt_to_forward = amount_msat(*tlv->amt_to_forward);
|
2020-05-06 12:41:54 +02:00
|
|
|
p->outgoing_cltv = *tlv->outgoing_cltv_value;
|
2019-12-05 11:06:28 +01:00
|
|
|
|
|
|
|
/* BOLT #4:
|
|
|
|
*
|
|
|
|
* The writer:
|
|
|
|
*...
|
2020-01-31 02:39:12 +01:00
|
|
|
* - For every non-final node:
|
|
|
|
* - MUST include `short_channel_id`
|
2019-12-05 11:06:28 +01:00
|
|
|
*/
|
|
|
|
if (rs->nextcase == ONION_FORWARD) {
|
|
|
|
if (!tlv->short_channel_id)
|
2020-03-04 14:19:23 +01:00
|
|
|
goto fail;
|
2020-05-06 12:41:54 +02:00
|
|
|
p->forward_channel = tal_dup(p, struct short_channel_id,
|
|
|
|
tlv->short_channel_id);
|
2019-12-05 11:06:28 +01:00
|
|
|
p->total_msat = NULL;
|
|
|
|
} else {
|
|
|
|
p->forward_channel = NULL;
|
2020-01-31 02:40:36 +01:00
|
|
|
/* BOLT #4:
|
2019-12-05 11:06:28 +01:00
|
|
|
* - if it is the final node:
|
|
|
|
* - MUST treat `total_msat` as if it were equal to
|
|
|
|
* `amt_to_forward` if it is not present. */
|
|
|
|
p->total_msat = tal_dup(p, struct amount_msat,
|
|
|
|
&p->amt_to_forward);
|
|
|
|
}
|
|
|
|
|
|
|
|
p->payment_secret = NULL;
|
2020-04-11 04:52:51 +02:00
|
|
|
if (blinding)
|
|
|
|
p->blinding = tal_dup(p, struct pubkey, blinding);
|
|
|
|
else
|
|
|
|
p->blinding = NULL;
|
|
|
|
|
|
|
|
#if EXPERIMENTAL_FEATURES
|
|
|
|
if (!p->blinding) {
|
|
|
|
/* If we have no blinding, it could be in TLV. */
|
|
|
|
if (tlv->blinding_seed) {
|
|
|
|
p->blinding =
|
|
|
|
tal_dup(p, struct pubkey,
|
2020-05-06 12:41:54 +02:00
|
|
|
tlv->blinding_seed);
|
2020-04-11 04:52:51 +02:00
|
|
|
ecdh(p->blinding, &p->blinding_ss);
|
|
|
|
}
|
|
|
|
} else
|
|
|
|
p->blinding_ss = *blinding_ss;
|
|
|
|
|
|
|
|
if (p->blinding) {
|
|
|
|
/* If they give us a blinding and we're not terminal,
|
|
|
|
* we must have an enctlv. */
|
|
|
|
if (rs->nextcase == ONION_FORWARD) {
|
|
|
|
struct tlv_tlv_payload *ntlv;
|
|
|
|
|
|
|
|
if (!tlv->enctlv)
|
|
|
|
goto fail;
|
|
|
|
|
|
|
|
ntlv = decrypt_tlv(tmpctx,
|
|
|
|
&p->blinding_ss,
|
2020-05-06 12:41:54 +02:00
|
|
|
tlv->enctlv);
|
2020-04-11 04:52:51 +02:00
|
|
|
if (!ntlv)
|
|
|
|
goto fail;
|
|
|
|
|
|
|
|
/* Must override short_channel_id */
|
|
|
|
if (!ntlv->short_channel_id)
|
|
|
|
goto fail;
|
|
|
|
|
|
|
|
*p->forward_channel
|
2020-05-06 12:41:54 +02:00
|
|
|
= *ntlv->short_channel_id;
|
2020-04-11 04:52:51 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* EXPERIMENTAL_FEATURES */
|
2019-12-05 11:06:28 +01:00
|
|
|
|
|
|
|
if (tlv->payment_data) {
|
|
|
|
p->payment_secret = tal_dup(p, struct secret,
|
|
|
|
&tlv->payment_data->payment_secret);
|
|
|
|
tal_free(p->total_msat);
|
|
|
|
p->total_msat = tal(p, struct amount_msat);
|
2020-08-05 05:55:30 +02:00
|
|
|
*p->total_msat
|
|
|
|
= amount_msat(tlv->payment_data->total_msat);
|
2019-12-05 11:06:28 +01:00
|
|
|
}
|
2021-06-17 15:16:55 +02:00
|
|
|
p->tlv = tal_steal(p, tlv);
|
2019-12-05 11:06:28 +01:00
|
|
|
return p;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* You said it was a valid type! */
|
|
|
|
abort();
|
2020-03-04 14:19:23 +01:00
|
|
|
fail:
|
|
|
|
tal_free(tlv);
|
|
|
|
tal_free(p);
|
|
|
|
return NULL;
|
2019-12-05 11:06:28 +01:00
|
|
|
}
|