1 use lightning::ln::peer_channel_encryptor::PeerChannelEncryptor;
3 use secp256k1::key::{PublicKey,SecretKey};
6 fn slice_to_be16(v: &[u8]) -> u16 {
7 ((v[0] as u16) << 8*1) |
12 pub fn do_test(data: &[u8]) {
14 macro_rules! get_slice {
17 let slice_len = $len as usize;
18 if data.len() < read_pos + slice_len {
21 read_pos += slice_len;
22 &data[read_pos - slice_len..read_pos]
27 let our_network_key = match SecretKey::from_slice(get_slice!(32)) {
31 let ephemeral_key = match SecretKey::from_slice(get_slice!(32)) {
36 let mut crypter = if get_slice!(1)[0] != 0 {
37 let their_pubkey = match PublicKey::from_slice(get_slice!(33)) {
41 let mut crypter = PeerChannelEncryptor::new_outbound(their_pubkey, ephemeral_key);
42 crypter.get_act_one();
43 match crypter.process_act_two(get_slice!(50), &our_network_key) {
47 assert!(crypter.is_ready_for_encryption());
50 let mut crypter = PeerChannelEncryptor::new_inbound(&our_network_key);
51 match crypter.process_act_one_with_keys(get_slice!(50), &our_network_key, ephemeral_key) {
55 match crypter.process_act_three(get_slice!(66)) {
59 assert!(crypter.is_ready_for_encryption());
63 if get_slice!(1)[0] == 0 {
64 crypter.encrypt_message(get_slice!(slice_to_be16(get_slice!(2))));
66 let len = match crypter.decrypt_length_header(get_slice!(16+2)) {
70 match crypter.decrypt_message(get_slice!(len as usize + 16)) {
79 pub extern "C" fn peer_crypt_run(data: *const u8, datalen: usize) {
80 do_test(unsafe { std::slice::from_raw_parts(data, datalen) });
86 fn duplicate_crash() {
87 super::do_test(&::hex::decode("01").unwrap());