core-lightning/hsmd/hsmd_wire.csv
Rusty Russell 01161aac68 hsmd: derive an onion_reply secret.
We put this in reply paths, so we can tell if they are used.  This lets us
avoid responding unless the correct reply path is used.

Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2021-09-22 09:10:34 +09:30

8.6 KiB

1# Clients should not give a bad request but not the HSM's decision to crash.
2msgtype,hsmstatus_client_bad_request,1000
3msgdata,hsmstatus_client_bad_request,id,node_id,
4msgdata,hsmstatus_client_bad_request,description,wirestring,
5msgdata,hsmstatus_client_bad_request,len,u16,
6msgdata,hsmstatus_client_bad_request,msg,u8,len
7#include <bitcoin/chainparams.h>
8# Start the HSM.
9msgtype,hsmd_init,11
10msgdata,hsmd_init,bip32_key_version,bip32_key_version,
11msgdata,hsmd_init,chainparams,chainparams,
12msgdata,hsmd_init,hsm_encryption_key,?secret,
13msgdata,hsmd_init,dev_force_privkey,?privkey,
14msgdata,hsmd_init,dev_force_bip32_seed,?secret,
15msgdata,hsmd_init,dev_force_channel_secrets,?secrets,
16msgdata,hsmd_init,dev_force_channel_secrets_shaseed,?sha256,
17#include <common/bip32.h>
18msgtype,hsmd_init_reply,111
19msgdata,hsmd_init_reply,node_id,node_id,
20msgdata,hsmd_init_reply,bip32,ext_key,
21msgdata,hsmd_init_reply,bolt12,pubkey32,
22msgdata,hsmd_init_reply,onion_reply_secret,secret,
23# Get a new HSM FD, with the specified capabilities
24msgtype,hsmd_client_hsmfd,9
25# Which identity to use for requests
26msgdata,hsmd_client_hsmfd,id,node_id,
27# Database id for this client, if any.
28msgdata,hsmd_client_hsmfd,dbid,u64,
29msgdata,hsmd_client_hsmfd,capabilities,u64,
30# No content, just an fd.
31msgtype,hsmd_client_hsmfd_reply,109
32#include <common/derive_basepoints.h>
33# Get the basepoints and funding key for this specific channel.
34msgtype,hsmd_get_channel_basepoints,10
35msgdata,hsmd_get_channel_basepoints,peerid,node_id,
36msgdata,hsmd_get_channel_basepoints,dbid,u64,
37msgtype,hsmd_get_channel_basepoints_reply,110
38msgdata,hsmd_get_channel_basepoints_reply,basepoints,basepoints,
39msgdata,hsmd_get_channel_basepoints_reply,funding_pubkey,pubkey,
40# Return signature for a funding tx.
41#include <common/utxo.h>
42# Master asks the HSM to sign a node_announcement
43msgtype,hsmd_node_announcement_sig_req,6
44msgdata,hsmd_node_announcement_sig_req,annlen,u16,
45msgdata,hsmd_node_announcement_sig_req,announcement,u8,annlen
46msgtype,hsmd_node_announcement_sig_reply,106
47msgdata,hsmd_node_announcement_sig_reply,signature,secp256k1_ecdsa_signature,
48# Sign a withdrawal request
49#include <bitcoin/psbt.h>
50msgtype,hsmd_sign_withdrawal,7
51msgdata,hsmd_sign_withdrawal,num_inputs,u16,
52msgdata,hsmd_sign_withdrawal,inputs,utxo,num_inputs
53msgdata,hsmd_sign_withdrawal,psbt,wally_psbt,
54msgtype,hsmd_sign_withdrawal_reply,107
55msgdata,hsmd_sign_withdrawal_reply,psbt,wally_psbt,
56# Sign an invoice
57msgtype,hsmd_sign_invoice,8
58msgdata,hsmd_sign_invoice,len,u16,
59msgdata,hsmd_sign_invoice,u5bytes,u8,len
60msgdata,hsmd_sign_invoice,hrplen,u16,
61msgdata,hsmd_sign_invoice,hrp,u8,hrplen
62msgtype,hsmd_sign_invoice_reply,108
63msgdata,hsmd_sign_invoice_reply,sig,secp256k1_ecdsa_recoverable_signature,
64# Give me ECDH(node-id-secret,point)
65msgtype,hsmd_ecdh_req,1
66msgdata,hsmd_ecdh_req,point,pubkey,
67msgtype,hsmd_ecdh_resp,100
68msgdata,hsmd_ecdh_resp,ss,secret,
69msgtype,hsmd_cannouncement_sig_req,2
70msgdata,hsmd_cannouncement_sig_req,calen,u16,
71msgdata,hsmd_cannouncement_sig_req,ca,u8,calen
72msgtype,hsmd_cannouncement_sig_reply,102
73msgdata,hsmd_cannouncement_sig_reply,node_signature,secp256k1_ecdsa_signature,
74msgdata,hsmd_cannouncement_sig_reply,bitcoin_signature,secp256k1_ecdsa_signature,
75msgtype,hsmd_cupdate_sig_req,3
76msgdata,hsmd_cupdate_sig_req,culen,u16,
77msgdata,hsmd_cupdate_sig_req,cu,u8,culen
78msgtype,hsmd_cupdate_sig_reply,103
79msgdata,hsmd_cupdate_sig_reply,culen,u16,
80msgdata,hsmd_cupdate_sig_reply,cu,u8,culen
81# Master asks HSM to sign a commitment transaction.
82msgtype,hsmd_sign_commitment_tx,5
83msgdata,hsmd_sign_commitment_tx,peer_id,node_id,
84msgdata,hsmd_sign_commitment_tx,channel_dbid,u64,
85msgdata,hsmd_sign_commitment_tx,tx,bitcoin_tx,
86msgdata,hsmd_sign_commitment_tx,remote_funding_key,pubkey,
87msgtype,hsmd_sign_commitment_tx_reply,105
88msgdata,hsmd_sign_commitment_tx_reply,sig,bitcoin_signature,
89# Onchaind asks HSM to sign a spend to-us. Four variants, since each set
90# of keys is derived differently...
91# FIXME: Have master tell hsmd the keyindex, so it can validate output!
92msgtype,hsmd_sign_delayed_payment_to_us,12
93msgdata,hsmd_sign_delayed_payment_to_us,commit_num,u64,
94msgdata,hsmd_sign_delayed_payment_to_us,tx,bitcoin_tx,
95msgdata,hsmd_sign_delayed_payment_to_us,wscript_len,u16,
96msgdata,hsmd_sign_delayed_payment_to_us,wscript,u8,wscript_len
97msgtype,hsmd_sign_remote_htlc_to_us,13
98msgdata,hsmd_sign_remote_htlc_to_us,remote_per_commitment_point,pubkey,
99msgdata,hsmd_sign_remote_htlc_to_us,tx,bitcoin_tx,
100msgdata,hsmd_sign_remote_htlc_to_us,wscript_len,u16,
101msgdata,hsmd_sign_remote_htlc_to_us,wscript,u8,wscript_len
102msgdata,hsmd_sign_remote_htlc_to_us,option_anchor_outputs,bool,
103msgtype,hsmd_sign_penalty_to_us,14
104msgdata,hsmd_sign_penalty_to_us,revocation_secret,secret,
105msgdata,hsmd_sign_penalty_to_us,tx,bitcoin_tx,
106msgdata,hsmd_sign_penalty_to_us,wscript_len,u16,
107msgdata,hsmd_sign_penalty_to_us,wscript,u8,wscript_len
108# Onchaind asks HSM to sign a local HTLC success or HTLC timeout tx.
109msgtype,hsmd_sign_local_htlc_tx,16
110msgdata,hsmd_sign_local_htlc_tx,commit_num,u64,
111msgdata,hsmd_sign_local_htlc_tx,tx,bitcoin_tx,
112msgdata,hsmd_sign_local_htlc_tx,wscript_len,u16,
113msgdata,hsmd_sign_local_htlc_tx,wscript,u8,wscript_len
114msgdata,hsmd_sign_local_htlc_tx,option_anchor_outputs,bool,
115# Openingd/channeld asks HSM to sign the other sides' commitment tx.
116msgtype,hsmd_sign_remote_commitment_tx,19
117msgdata,hsmd_sign_remote_commitment_tx,tx,bitcoin_tx,
118msgdata,hsmd_sign_remote_commitment_tx,remote_funding_key,pubkey,
119msgdata,hsmd_sign_remote_commitment_tx,remote_per_commit,pubkey,
120msgdata,hsmd_sign_remote_commitment_tx,option_static_remotekey,bool,
121# channeld asks HSM to sign remote HTLC tx.
122msgtype,hsmd_sign_remote_htlc_tx,20
123msgdata,hsmd_sign_remote_htlc_tx,tx,bitcoin_tx,
124msgdata,hsmd_sign_remote_htlc_tx,len,u16,
125msgdata,hsmd_sign_remote_htlc_tx,wscript,u8,len
126msgdata,hsmd_sign_remote_htlc_tx,remote_per_commit_point,pubkey,
127msgdata,hsmd_sign_remote_htlc_tx,option_anchor_outputs,bool,
128# closingd asks HSM to sign mutual close tx.
129msgtype,hsmd_sign_mutual_close_tx,21
130msgdata,hsmd_sign_mutual_close_tx,tx,bitcoin_tx,
131msgdata,hsmd_sign_mutual_close_tx,remote_funding_key,pubkey,
132# Reply for all the above requests.
133msgtype,hsmd_sign_tx_reply,112
134msgdata,hsmd_sign_tx_reply,sig,bitcoin_signature,
135# Openingd/channeld/onchaind asks for Nth per_commitment_point, if > 2, gets N-2 secret.
136msgtype,hsmd_get_per_commitment_point,18
137msgdata,hsmd_get_per_commitment_point,n,u64,
138msgtype,hsmd_get_per_commitment_point_reply,118
139msgdata,hsmd_get_per_commitment_point_reply,per_commitment_point,pubkey,
140msgdata,hsmd_get_per_commitment_point_reply,old_commitment_secret,?secret,
141# master -> hsmd: do you have a memleak?
142msgtype,hsmd_dev_memleak,33
143msgtype,hsmd_dev_memleak_reply,133
144msgdata,hsmd_dev_memleak_reply,leak,bool,
145# channeld asks to check if claimed future commitment_secret is correct.
146msgtype,hsmd_check_future_secret,22
147msgdata,hsmd_check_future_secret,n,u64,
148msgdata,hsmd_check_future_secret,commitment_secret,secret,
149msgtype,hsmd_check_future_secret_reply,122
150msgdata,hsmd_check_future_secret_reply,correct,bool,
151# lightningd asks us to sign a string.
152msgtype,hsmd_sign_message,23
153msgdata,hsmd_sign_message,len,u16,
154msgdata,hsmd_sign_message,msg,u8,len
155msgtype,hsmd_sign_message_reply,123
156msgdata,hsmd_sign_message_reply,sig,secp256k1_ecdsa_recoverable_signature,
157# lightningd needs to get a scriptPubkey for a utxo with closeinfo
158msgtype,hsmd_get_output_scriptpubkey,24
159msgdata,hsmd_get_output_scriptpubkey,channel_id,u64,
160msgdata,hsmd_get_output_scriptpubkey,peer_id,node_id,
161msgdata,hsmd_get_output_scriptpubkey,commitment_point,?pubkey,
162msgtype,hsmd_get_output_scriptpubkey_reply,124
163msgdata,hsmd_get_output_scriptpubkey_reply,script_len,u16,
164msgdata,hsmd_get_output_scriptpubkey_reply,script,u8,script_len
165# Sign a bolt12-style merkle hash
166msgtype,hsmd_sign_bolt12,25
167msgdata,hsmd_sign_bolt12,messagename,wirestring,
168msgdata,hsmd_sign_bolt12,fieldname,wirestring,
169msgdata,hsmd_sign_bolt12,merkleroot,sha256,
170# This is for invreq payer_id (temporary keys)
171msgdata,hsmd_sign_bolt12,publictweaklen,u16,
172msgdata,hsmd_sign_bolt12,publictweak,u8,publictweaklen
173msgtype,hsmd_sign_bolt12_reply,125
174msgdata,hsmd_sign_bolt12_reply,sig,bip340sig,
175# Sign an option_will_fund offer hash
176msgtype,hsmd_sign_option_will_fund_offer,26
177msgdata,hsmd_sign_option_will_fund_offer,funding_pubkey,pubkey,
178msgdata,hsmd_sign_option_will_fund_offer,blockheight,u32,
179msgdata,hsmd_sign_option_will_fund_offer,channel_fee_base_max_msat,u32,
180msgdata,hsmd_sign_option_will_fund_offer,channel_fee_proportional_basis_max,u16,
181msgtype,hsmd_sign_option_will_fund_offer_reply,126
182msgdata,hsmd_sign_option_will_fund_offer_reply,rsig,secp256k1_ecdsa_signature,