1 extern crate lightning;
2 extern crate secp256k1;
4 use lightning::ln::peer_channel_encryptor::PeerChannelEncryptor;
5 use lightning::util::reset_rng_state;
7 use secp256k1::key::{PublicKey,SecretKey};
8 use secp256k1::Secp256k1;
11 fn slice_to_be16(v: &[u8]) -> u16 {
12 ((v[0] as u16) << 8*1) |
13 ((v[1] as u16) << 8*0)
17 pub fn do_test(data: &[u8]) {
21 macro_rules! get_slice {
24 let slice_len = $len as usize;
25 if data.len() < read_pos + slice_len {
28 read_pos += slice_len;
29 &data[read_pos - slice_len..read_pos]
34 let secp_ctx = Secp256k1::new();
35 let our_network_key = match SecretKey::from_slice(&secp_ctx, get_slice!(32)) {
40 let mut crypter = if get_slice!(1)[0] != 0 {
41 let their_pubkey = match PublicKey::from_slice(&secp_ctx, get_slice!(33)) {
45 let mut crypter = PeerChannelEncryptor::new_outbound(their_pubkey);
46 crypter.get_act_one();
47 match crypter.process_act_two(get_slice!(50), &our_network_key) {
51 assert!(crypter.is_ready_for_encryption());
54 let mut crypter = PeerChannelEncryptor::new_inbound(&our_network_key);
55 match crypter.process_act_one_with_key(get_slice!(50), &our_network_key) {
59 match crypter.process_act_three(get_slice!(66)) {
63 assert!(crypter.is_ready_for_encryption());
67 if get_slice!(1)[0] == 0 {
68 crypter.encrypt_message(get_slice!(slice_to_be16(get_slice!(2))));
70 let len = match crypter.decrypt_length_header(get_slice!(16+2)) {
74 match crypter.decrypt_message(get_slice!(len as usize + 16)) {
82 #[cfg(feature = "afl")]
84 #[cfg(feature = "afl")]
86 afl::read_stdio_bytes(|data| {
91 #[cfg(feature = "honggfuzz")]
92 #[macro_use] extern crate honggfuzz;
93 #[cfg(feature = "honggfuzz")]
104 fn extend_vec_from_hex(hex: &str, out: &mut Vec<u8>) {
106 for (idx, c) in hex.as_bytes().iter().enumerate() {
109 b'A'...b'F' => b |= c - b'A' + 10,
110 b'a'...b'f' => b |= c - b'a' + 10,
111 b'0'...b'9' => b |= c - b'0',
112 _ => panic!("Bad hex"),
122 fn duplicate_crash() {
123 let mut a = Vec::new();
124 extend_vec_from_hex("01", &mut a);