1 // This file is Copyright its original authors, visible in version control
4 // This file is licensed under the Apache License, Version 2.0 <LICENSE-APACHE
5 // or http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
6 // <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your option.
7 // You may not use this file except in accordance with one or both of these
10 use lightning::ln::peer_channel_encryptor::{MessageBuf, PeerChannelEncryptor};
11 use lightning::util::test_utils::TestNodeSigner;
13 use bitcoin::secp256k1::{PublicKey, Secp256k1, SecretKey};
15 use crate::utils::test_logger;
18 fn slice_to_be16(v: &[u8]) -> u16 {
19 ((v[0] as u16) << 8 * 1) | ((v[1] as u16) << 8 * 0)
23 pub fn do_test(data: &[u8]) {
25 macro_rules! get_slice {
27 let slice_len = $len as usize;
28 if data.len() < read_pos + slice_len {
31 read_pos += slice_len;
32 &data[read_pos - slice_len..read_pos]
36 let secp_ctx = Secp256k1::signing_only();
38 let our_network_key = match SecretKey::from_slice(get_slice!(32)) {
42 let node_signer = TestNodeSigner::new(our_network_key);
43 let ephemeral_key = match SecretKey::from_slice(get_slice!(32)) {
48 let mut crypter = if get_slice!(1)[0] != 0 {
49 let their_pubkey = match PublicKey::from_slice(get_slice!(33)) {
53 let mut crypter = PeerChannelEncryptor::new_outbound(their_pubkey, ephemeral_key);
54 crypter.get_act_one(&secp_ctx);
55 match crypter.process_act_two(get_slice!(50), &&node_signer) {
59 assert!(crypter.is_ready_for_encryption());
62 let mut crypter = PeerChannelEncryptor::new_inbound(&&node_signer);
63 match crypter.process_act_one_with_keys(
72 match crypter.process_act_three(get_slice!(66)) {
76 assert!(crypter.is_ready_for_encryption());
79 let mut buf = [0; 65536 + 16];
81 if get_slice!(1)[0] == 0 {
82 crypter.encrypt_buffer(MessageBuf::from_encoded(&get_slice!(slice_to_be16(
86 let len = match crypter.decrypt_length_header(get_slice!(16 + 2)) {
90 buf[..len as usize + 16].copy_from_slice(&get_slice!(len as usize + 16));
91 match crypter.decrypt_message(&mut buf[..len as usize + 16]) {
99 pub fn peer_crypt_test<Out: test_logger::Output>(data: &[u8], _out: Out) {
104 pub extern "C" fn peer_crypt_run(data: *const u8, datalen: usize) {
105 do_test(unsafe { std::slice::from_raw_parts(data, datalen) });