2 extern crate lightning;
3 extern crate secp256k1;
5 use bitcoin::util::hash::Sha256dHash;
6 use bitcoin::blockdata::script::{Script, Builder};
7 use bitcoin::blockdata::opcodes;
9 use lightning::chain::chaininterface::{ChainError,ChainWatchInterface, ChainListener};
10 use lightning::ln::channelmanager::ChannelDetails;
11 use lightning::ln::msgs;
12 use lightning::ln::msgs::{MsgDecodable, RoutingMessageHandler};
13 use lightning::ln::router::{Router, RouteHint};
14 use lightning::util::reset_rng_state;
15 use lightning::util::logger::Logger;
17 use secp256k1::key::PublicKey;
18 use secp256k1::Secp256k1;
22 use utils::test_logger;
24 use std::sync::{Weak, Arc};
25 use std::sync::atomic::{AtomicUsize, Ordering};
28 pub fn slice_to_be16(v: &[u8]) -> u16 {
29 ((v[0] as u16) << 8*1) |
30 ((v[1] as u16) << 8*0)
34 pub fn slice_to_be32(v: &[u8]) -> u32 {
35 ((v[0] as u32) << 8*3) |
36 ((v[1] as u32) << 8*2) |
37 ((v[2] as u32) << 8*1) |
38 ((v[3] as u32) << 8*0)
42 pub fn slice_to_be64(v: &[u8]) -> u64 {
43 ((v[0] as u64) << 8*7) |
44 ((v[1] as u64) << 8*6) |
45 ((v[2] as u64) << 8*5) |
46 ((v[3] as u64) << 8*4) |
47 ((v[4] as u64) << 8*3) |
48 ((v[5] as u64) << 8*2) |
49 ((v[6] as u64) << 8*1) |
50 ((v[7] as u64) << 8*0)
56 read_pos: AtomicUsize,
59 fn get_slice(&self, len: usize) -> Option<&[u8]> {
60 let old_pos = self.read_pos.fetch_add(len, Ordering::AcqRel);
61 if self.data.len() < old_pos + len {
64 Some(&self.data[old_pos..old_pos + len])
66 fn get_slice_nonadvancing(&self, len: usize) -> Option<&[u8]> {
67 let old_pos = self.read_pos.load(Ordering::Acquire);
68 if self.data.len() < old_pos + len {
71 Some(&self.data[old_pos..old_pos + len])
75 struct DummyChainWatcher {
76 input: Arc<InputData>,
79 impl ChainWatchInterface for DummyChainWatcher {
80 fn install_watch_script(&self, _script_pub_key: &Script) { }
81 fn install_watch_outpoint(&self, _outpoint: (Sha256dHash, u32), _out_script: &Script) { }
82 fn watch_all_txn(&self) { }
83 fn register_listener(&self, _listener: Weak<ChainListener>) { }
85 fn get_chain_utxo(&self, _genesis_hash: Sha256dHash, _unspent_tx_output_identifier: u64) -> Result<(Script, u64), ChainError> {
86 match self.input.get_slice(2) {
87 Some(&[0, _]) => Err(ChainError::NotSupported),
88 Some(&[1, _]) => Err(ChainError::NotWatched),
89 Some(&[2, _]) => Err(ChainError::UnknownTx),
90 Some(&[_, x]) => Ok((Builder::new().push_int(x as i64).into_script().to_v0_p2wsh(), 0)),
91 None => Err(ChainError::UnknownTx),
98 pub fn do_test(data: &[u8]) {
101 let input = Arc::new(InputData {
103 read_pos: AtomicUsize::new(0),
105 macro_rules! get_slice_nonadvancing {
107 match input.get_slice_nonadvancing($len as usize) {
108 Some(slice) => slice,
113 macro_rules! get_slice {
115 match input.get_slice($len as usize) {
116 Some(slice) => slice,
122 macro_rules! decode_msg {
123 ($MsgType: path, $len: expr) => {
124 match <($MsgType)>::decode(get_slice!($len)) {
127 msgs::DecodeError::UnknownRealmByte => return,
128 msgs::DecodeError::UnknownRequiredFeature => return,
129 msgs::DecodeError::BadPublicKey => return,
130 msgs::DecodeError::BadSignature => return,
131 msgs::DecodeError::BadText => return,
132 msgs::DecodeError::ExtraAddressesPerType => return,
133 msgs::DecodeError::BadLengthDescriptor => return,
134 msgs::DecodeError::ShortRead => panic!("We picked the length..."),
140 macro_rules! decode_msg_with_len16 {
141 ($MsgType: path, $begin_len: expr, $excess: expr) => {
143 let extra_len = slice_to_be16(&get_slice_nonadvancing!($begin_len as usize + 2)[$begin_len..$begin_len + 2]);
144 decode_msg!($MsgType, $begin_len as usize + 2 + (extra_len as usize) + $excess)
149 let secp_ctx = Secp256k1::new();
150 macro_rules! get_pubkey {
152 match PublicKey::from_slice(&secp_ctx, get_slice!(33)) {
159 let logger: Arc<Logger> = Arc::new(test_logger::TestLogger{});
160 let chain_monitor = Arc::new(DummyChainWatcher {
161 input: Arc::clone(&input),
164 let our_pubkey = get_pubkey!();
165 let router = Router::new(our_pubkey.clone(), chain_monitor, Arc::clone(&logger));
168 match get_slice!(1)[0] {
170 let start_len = slice_to_be16(&get_slice_nonadvancing!(64 + 2)[64..64 + 2]) as usize;
171 let addr_len = slice_to_be16(&get_slice_nonadvancing!(64+start_len+2 + 74)[64+start_len+2 + 72..64+start_len+2 + 74]);
172 if addr_len > (37+1)*4 {
175 let _ = router.handle_node_announcement(&decode_msg_with_len16!(msgs::NodeAnnouncement, 64, 288));
178 let _ = router.handle_channel_announcement(&decode_msg_with_len16!(msgs::ChannelAnnouncement, 64*4, 32+8+33*4));
181 let _ = router.handle_channel_update(&decode_msg!(msgs::ChannelUpdate, 128));
184 match get_slice!(1)[0] {
186 router.handle_htlc_fail_channel_update(&msgs::HTLCFailChannelUpdate::ChannelUpdateMessage {msg: decode_msg!(msgs::ChannelUpdate, 128)});
189 let short_channel_id = slice_to_be64(get_slice!(8));
190 router.handle_htlc_fail_channel_update(&msgs::HTLCFailChannelUpdate::ChannelClosed {short_channel_id});
196 let target = get_pubkey!();
197 let mut first_hops_vec = Vec::new();
198 let first_hops = match get_slice!(1)[0] {
201 let count = slice_to_be16(get_slice!(2));
203 first_hops_vec.push(ChannelDetails {
205 short_channel_id: Some(slice_to_be64(get_slice!(8))),
206 remote_network_id: get_pubkey!(),
207 channel_value_satoshis: slice_to_be64(get_slice!(8)),
211 Some(&first_hops_vec[..])
215 let mut last_hops_vec = Vec::new();
217 let count = slice_to_be16(get_slice!(2));
219 last_hops_vec.push(RouteHint {
220 src_node_id: get_pubkey!(),
221 short_channel_id: slice_to_be64(get_slice!(8)),
222 fee_base_msat: slice_to_be32(get_slice!(4)),
223 fee_proportional_millionths: slice_to_be32(get_slice!(4)),
224 cltv_expiry_delta: slice_to_be16(get_slice!(2)),
225 htlc_minimum_msat: slice_to_be64(get_slice!(8)),
230 let _ = router.get_route(&target, first_hops, last_hops, slice_to_be64(get_slice!(8)), slice_to_be32(get_slice!(4)));
237 #[cfg(feature = "afl")]
238 #[macro_use] extern crate afl;
239 #[cfg(feature = "afl")]
246 #[cfg(feature = "honggfuzz")]
247 #[macro_use] extern crate honggfuzz;
248 #[cfg(feature = "honggfuzz")]
262 fn duplicate_crash() {
263 super::do_test(&::hex::decode("00").unwrap());