cfa27ac2f0cd386e937710581e50b477e1cbdfb4
[rust-lightning] / fuzz / src / onion_message.rs
1 // Imports that need to be added manually
2 use bitcoin::bech32::u5;
3 use bitcoin::blockdata::script::Script;
4 use bitcoin::secp256k1::{PublicKey, Scalar, Secp256k1, SecretKey};
5 use bitcoin::secp256k1::ecdh::SharedSecret;
6 use bitcoin::secp256k1::ecdsa::RecoverableSignature;
7
8 use lightning::sign::{Recipient, KeyMaterial, EntropySource, NodeSigner, SignerProvider};
9 use lightning::ln::msgs::{self, DecodeError, OnionMessageHandler};
10 use lightning::ln::script::ShutdownScript;
11 use lightning::util::enforcing_trait_impls::EnforcingSigner;
12 use lightning::util::logger::Logger;
13 use lightning::util::ser::{Readable, Writeable, Writer};
14 use lightning::onion_message::{CustomOnionMessageContents, CustomOnionMessageHandler, Destination, MessageRouter, OffersMessage, OffersMessageHandler, OnionMessagePath, OnionMessenger};
15
16 use crate::utils::test_logger;
17
18 use std::io::{self, Cursor};
19 use std::sync::atomic::{AtomicU64, Ordering};
20
21 #[inline]
22 /// Actual fuzz test, method signature and name are fixed
23 pub fn do_test<L: Logger>(data: &[u8], logger: &L) {
24         if let Ok(msg) = <msgs::OnionMessage as Readable>::read(&mut Cursor::new(data)) {
25                 let mut secret_bytes = [1; 32];
26                 secret_bytes[31] = 2;
27                 let secret = SecretKey::from_slice(&secret_bytes).unwrap();
28                 let keys_manager = KeyProvider {
29                         node_secret: secret,
30                         counter: AtomicU64::new(0),
31                 };
32                 let message_router = TestMessageRouter {};
33                 let offers_msg_handler = TestOffersMessageHandler {};
34                 let custom_msg_handler = TestCustomMessageHandler {};
35                 let onion_messenger = OnionMessenger::new(
36                         &keys_manager, &keys_manager, logger, &message_router, &offers_msg_handler,
37                         &custom_msg_handler
38                 );
39                 let mut pk = [2; 33]; pk[1] = 0xff;
40                 let peer_node_id_not_used = PublicKey::from_slice(&pk).unwrap();
41                 onion_messenger.handle_onion_message(&peer_node_id_not_used, &msg);
42         }
43 }
44
45 /// Method that needs to be added manually, {name}_test
46 pub fn onion_message_test<Out: test_logger::Output>(data: &[u8], out: Out) {
47         let logger = test_logger::TestLogger::new("".to_owned(), out);
48         do_test(data, &logger);
49 }
50
51 /// Method that needs to be added manually, {name}_run
52 #[no_mangle]
53 pub extern "C" fn onion_message_run(data: *const u8, datalen: usize) {
54         let logger = test_logger::TestLogger::new("".to_owned(), test_logger::DevNull {});
55         do_test(unsafe { std::slice::from_raw_parts(data, datalen) }, &logger);
56 }
57
58 struct TestMessageRouter {}
59
60 impl MessageRouter for TestMessageRouter {
61         fn find_path(
62                 &self, _sender: PublicKey, _peers: Vec<PublicKey>, _destination: Destination
63         ) -> Result<OnionMessagePath, ()> {
64                 unreachable!()
65         }
66 }
67
68 struct TestOffersMessageHandler {}
69
70 impl OffersMessageHandler for TestOffersMessageHandler {
71         fn handle_message(&self, _message: OffersMessage) -> Option<OffersMessage> {
72                 None
73         }
74 }
75
76 struct TestCustomMessage {}
77
78 const CUSTOM_MESSAGE_TYPE: u64 = 4242;
79 const CUSTOM_MESSAGE_CONTENTS: [u8; 32] = [42; 32];
80
81 impl CustomOnionMessageContents for TestCustomMessage {
82         fn tlv_type(&self) -> u64 {
83                 CUSTOM_MESSAGE_TYPE
84         }
85 }
86
87 impl Writeable for TestCustomMessage {
88         fn write<W: Writer>(&self, w: &mut W) -> Result<(), io::Error> {
89                 Ok(CUSTOM_MESSAGE_CONTENTS.write(w)?)
90         }
91 }
92
93 struct TestCustomMessageHandler {}
94
95 impl CustomOnionMessageHandler for TestCustomMessageHandler {
96         type CustomMessage = TestCustomMessage;
97         fn handle_custom_message(&self, _msg: Self::CustomMessage) -> Option<Self::CustomMessage> {
98                 None
99         }
100         fn read_custom_message<R: io::Read>(&self, _message_type: u64, buffer: &mut R) -> Result<Option<Self::CustomMessage>, msgs::DecodeError> {
101                 let mut buf = Vec::new();
102                 buffer.read_to_end(&mut buf)?;
103                 return Ok(Some(TestCustomMessage {}))
104         }
105 }
106
107 pub struct VecWriter(pub Vec<u8>);
108 impl Writer for VecWriter {
109         fn write_all(&mut self, buf: &[u8]) -> Result<(), ::std::io::Error> {
110                 self.0.extend_from_slice(buf);
111                 Ok(())
112         }
113 }
114 struct KeyProvider {
115         node_secret: SecretKey,
116         counter: AtomicU64,
117 }
118
119 impl EntropySource for KeyProvider {
120         fn get_secure_random_bytes(&self) -> [u8; 32] {
121                 let ctr = self.counter.fetch_add(1, Ordering::Relaxed);
122                 [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
123                         (ctr >> 8*7) as u8, (ctr >> 8*6) as u8, (ctr >> 8*5) as u8, (ctr >> 8*4) as u8, (ctr >> 8*3) as u8, (ctr >> 8*2) as u8, (ctr >> 8*1) as u8, 14, (ctr >> 8*0) as u8]
124         }
125 }
126
127 impl NodeSigner for KeyProvider {
128         fn get_node_id(&self, recipient: Recipient) -> Result<PublicKey, ()> {
129                 let node_secret = match recipient {
130                         Recipient::Node => Ok(&self.node_secret),
131                         Recipient::PhantomNode => Err(())
132                 }?;
133                 Ok(PublicKey::from_secret_key(&Secp256k1::signing_only(), node_secret))
134         }
135
136         fn ecdh(&self, recipient: Recipient, other_key: &PublicKey, tweak: Option<&Scalar>) -> Result<SharedSecret, ()> {
137                 let mut node_secret = match recipient {
138                         Recipient::Node => Ok(self.node_secret.clone()),
139                         Recipient::PhantomNode => Err(())
140                 }?;
141                 if let Some(tweak) = tweak {
142                         node_secret = node_secret.mul_tweak(tweak).map_err(|_| ())?;
143                 }
144                 Ok(SharedSecret::new(other_key, &node_secret))
145         }
146
147         fn get_inbound_payment_key_material(&self) -> KeyMaterial { unreachable!() }
148
149         fn sign_invoice(&self, _hrp_bytes: &[u8], _invoice_data: &[u5], _recipient: Recipient) -> Result<RecoverableSignature, ()> {
150                 unreachable!()
151         }
152
153         fn sign_gossip_message(&self, _msg: lightning::ln::msgs::UnsignedGossipMessage) -> Result<bitcoin::secp256k1::ecdsa::Signature, ()> {
154                 unreachable!()
155         }
156 }
157
158 impl SignerProvider for KeyProvider {
159         type Signer = EnforcingSigner;
160
161         fn generate_channel_keys_id(&self, _inbound: bool, _channel_value_satoshis: u64, _user_channel_id: u128) -> [u8; 32] { unreachable!() }
162
163         fn derive_channel_signer(&self, _channel_value_satoshis: u64, _channel_keys_id: [u8; 32]) -> Self::Signer {
164                 unreachable!()
165         }
166
167         fn read_chan_signer(&self, _data: &[u8]) -> Result<EnforcingSigner, DecodeError> { unreachable!() }
168
169         fn get_destination_script(&self) -> Result<Script, ()> { unreachable!() }
170
171         fn get_shutdown_scriptpubkey(&self) -> Result<ShutdownScript, ()> { unreachable!() }
172 }
173
174 #[cfg(test)]
175 mod tests {
176         use lightning::util::logger::{Logger, Record};
177         use std::collections::HashMap;
178         use std::sync::Mutex;
179
180         struct TrackingLogger {
181                 /// (module, message) -> count
182                 pub lines: Mutex<HashMap<(String, String), usize>>,
183         }
184         impl Logger for TrackingLogger {
185                 fn log(&self, record: &Record) {
186                         *self.lines.lock().unwrap().entry((record.module_path.to_string(), format!("{}", record.args))).or_insert(0) += 1;
187                         println!("{:<5} [{} : {}, {}] {}", record.level.to_string(), record.module_path, record.file, record.line, record.args);
188                 }
189         }
190
191         #[test]
192         fn test_no_onion_message_breakage() {
193                 let one_hop_om = "020000000000000000000000000000000000000000000000000000000000000e01055600020000000000000000000000000000000000000000000000000000000000000e013604106d000000000000000000000000000000fd1092202a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000";
194                 let logger = TrackingLogger { lines: Mutex::new(HashMap::new()) };
195                 super::do_test(&::hex::decode(one_hop_om).unwrap(), &logger);
196                 {
197                         let log_entries = logger.lines.lock().unwrap();
198                         assert_eq!(log_entries.get(&("lightning::onion_message::messenger".to_string(),
199                                                 "Received an onion message with path_id None and no reply_path".to_string())), Some(&1));
200                 }
201
202                 let two_unblinded_hops_om = "020000000000000000000000000000000000000000000000000000000000000e01055600020000000000000000000000000000000000000000000000000000000000000e0135043304210202020202020202020202020202020202020202020202020202020202020202026d000000000000000000000000000000eb0000000000000000000000000000000000000000000000000000000000000036041096000000000000000000000000000000fd1092202a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004800000000000000000000000000000000000000000000000000000000000000";
203                 let logger = TrackingLogger { lines: Mutex::new(HashMap::new()) };
204                 super::do_test(&::hex::decode(two_unblinded_hops_om).unwrap(), &logger);
205                 {
206                         let log_entries = logger.lines.lock().unwrap();
207                         assert_eq!(log_entries.get(&("lightning::onion_message::messenger".to_string(), "Forwarding an onion message to peer 020202020202020202020202020202020202020202020202020202020202020202".to_string())), Some(&1));
208                 }
209
210                 let two_unblinded_two_blinded_om = "020000000000000000000000000000000000000000000000000000000000000e01055600020000000000000000000000000000000000000000000000000000000000000e0135043304210202020202020202020202020202020202020202020202020202020202020202026d0000000000000000000000000000009e0000000000000000000000000000000000000000000000000000000000000058045604210203030303030303030303030303030303030303030303030303030303030303020821020000000000000000000000000000000000000000000000000000000000000e0196000000000000000000000000000000e9000000000000000000000000000000000000000000000000000000000000003504330421020404040404040404040404040404040404040404040404040404040404040402ca00000000000000000000000000000042000000000000000000000000000000000000000000000000000000000000003604103f000000000000000000000000000000fd1092202a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004800000000000000000000000000000000000000000000000000000000000000";
211                 let logger = TrackingLogger { lines: Mutex::new(HashMap::new()) };
212                 super::do_test(&::hex::decode(two_unblinded_two_blinded_om).unwrap(), &logger);
213                 {
214                         let log_entries = logger.lines.lock().unwrap();
215                         assert_eq!(log_entries.get(&("lightning::onion_message::messenger".to_string(), "Forwarding an onion message to peer 020202020202020202020202020202020202020202020202020202020202020202".to_string())), Some(&1));
216                 }
217
218                 let three_blinded_om = "020000000000000000000000000000000000000000000000000000000000000e01055600020000000000000000000000000000000000000000000000000000000000000e0135043304210202020202020202020202020202020202020202020202020202020202020202026d000000000000000000000000000000b20000000000000000000000000000000000000000000000000000000000000035043304210203030303030303030303030303030303030303030303030303030303030303029600000000000000000000000000000033000000000000000000000000000000000000000000000000000000000000003604104e000000000000000000000000000000fd1092202a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004800000000000000000000000000000000000000000000000000000000000000";
219                 let logger = TrackingLogger { lines: Mutex::new(HashMap::new()) };
220                 super::do_test(&::hex::decode(three_blinded_om).unwrap(), &logger);
221                 {
222                         let log_entries = logger.lines.lock().unwrap();
223                         assert_eq!(log_entries.get(&("lightning::onion_message::messenger".to_string(), "Forwarding an onion message to peer 020202020202020202020202020202020202020202020202020202020202020202".to_string())), Some(&1));
224                 }
225         }
226 }