Relicense as dual Apache-2.0 + MIT
[rust-lightning] / fuzz / src / peer_crypt.rs
1 // This file is Copyright its original authors, visible in version control
2 // history.
3 //
4 // This file is licensed under the Apache License, Version 2.0 <LICENSE-APACHE
5 // or http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
6 // <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your option.
7 // You may not use this file except in accordance with one or both of these
8 // licenses.
9
10 use lightning::ln::peer_channel_encryptor::PeerChannelEncryptor;
11
12 use bitcoin::secp256k1::key::{PublicKey,SecretKey};
13
14 use utils::test_logger;
15
16 #[inline]
17 fn slice_to_be16(v: &[u8]) -> u16 {
18         ((v[0] as u16) << 8*1) |
19         ((v[1] as u16) << 8*0)
20 }
21
22 #[inline]
23 pub fn do_test(data: &[u8]) {
24         let mut read_pos = 0;
25         macro_rules! get_slice {
26                 ($len: expr) => {
27                         {
28                                 let slice_len = $len as usize;
29                                 if data.len() < read_pos + slice_len {
30                                         return;
31                                 }
32                                 read_pos += slice_len;
33                                 &data[read_pos - slice_len..read_pos]
34                         }
35                 }
36         }
37
38         let our_network_key = match SecretKey::from_slice(get_slice!(32)) {
39                 Ok(key) => key,
40                 Err(_) => return,
41         };
42         let ephemeral_key = match SecretKey::from_slice(get_slice!(32)) {
43                 Ok(key) => key,
44                 Err(_) => return,
45         };
46
47         let mut crypter = if get_slice!(1)[0] != 0 {
48                 let their_pubkey = match PublicKey::from_slice(get_slice!(33)) {
49                         Ok(key) => key,
50                         Err(_) => return,
51                 };
52                 let mut crypter = PeerChannelEncryptor::new_outbound(their_pubkey, ephemeral_key);
53                 crypter.get_act_one();
54                 match crypter.process_act_two(get_slice!(50), &our_network_key) {
55                         Ok(_) => {},
56                         Err(_) => return,
57                 }
58                 assert!(crypter.is_ready_for_encryption());
59                 crypter
60         } else {
61                 let mut crypter = PeerChannelEncryptor::new_inbound(&our_network_key);
62                 match crypter.process_act_one_with_keys(get_slice!(50), &our_network_key, ephemeral_key) {
63                         Ok(_) => {},
64                         Err(_) => return,
65                 }
66                 match crypter.process_act_three(get_slice!(66)) {
67                         Ok(_) => {},
68                         Err(_) => return,
69                 }
70                 assert!(crypter.is_ready_for_encryption());
71                 crypter
72         };
73         loop {
74                 if get_slice!(1)[0] == 0 {
75                         crypter.encrypt_message(get_slice!(slice_to_be16(get_slice!(2))));
76                 } else {
77                         let len = match crypter.decrypt_length_header(get_slice!(16+2)) {
78                                 Ok(len) => len,
79                                 Err(_) => return,
80                         };
81                         match crypter.decrypt_message(get_slice!(len as usize + 16)) {
82                                 Ok(_) => {},
83                                 Err(_) => return,
84                         }
85                 }
86         }
87 }
88
89 pub fn peer_crypt_test<Out: test_logger::Output>(data: &[u8], _out: Out) {
90         do_test(data);
91 }
92
93 #[no_mangle]
94 pub extern "C" fn peer_crypt_run(data: *const u8, datalen: usize) {
95         do_test(unsafe { std::slice::from_raw_parts(data, datalen) });
96 }