X-Git-Url: http://git.bitcoin.ninja/index.cgi?a=blobdiff_plain;f=fuzz%2Ffuzz_targets%2Frouter_target.rs;h=25bf38274abe93b474a1f27b590d5262ca9209e7;hb=a30946b29200abb0c86bb45f0ca9a3e50e88f95f;hp=6476f812fb34dd2243ea1a585e6753eb44b3a52b;hpb=90b545ffe3e6855e09156361ecb1d5384add1e46;p=rust-lightning diff --git a/fuzz/fuzz_targets/router_target.rs b/fuzz/fuzz_targets/router_target.rs index 6476f812..25bf3827 100644 --- a/fuzz/fuzz_targets/router_target.rs +++ b/fuzz/fuzz_targets/router_target.rs @@ -1,20 +1,20 @@ extern crate bitcoin; +extern crate bitcoin_hashes; extern crate lightning; extern crate secp256k1; -use bitcoin::util::hash::Sha256dHash; +use bitcoin_hashes::sha256d::Hash as Sha256dHash; use bitcoin::blockdata::script::{Script, Builder}; use lightning::chain::chaininterface::{ChainError,ChainWatchInterface, ChainListener}; use lightning::ln::channelmanager::ChannelDetails; use lightning::ln::msgs; -use lightning::ln::msgs::{MsgDecodable, RoutingMessageHandler}; +use lightning::ln::msgs::{RoutingMessageHandler}; use lightning::ln::router::{Router, RouteHint}; -use lightning::util::reset_rng_state; use lightning::util::logger::Logger; +use lightning::util::ser::Readable; use secp256k1::key::PublicKey; -use secp256k1::Secp256k1; mod utils; @@ -95,8 +95,6 @@ impl ChainWatchInterface for DummyChainWatcher { #[inline] pub fn do_test(data: &[u8]) { - reset_rng_state(); - let input = Arc::new(InputData { data: data.to_vec(), read_pos: AtomicUsize::new(0), @@ -119,21 +117,21 @@ pub fn do_test(data: &[u8]) { } macro_rules! decode_msg { - ($MsgType: path, $len: expr) => { - match <($MsgType)>::decode(get_slice!($len)) { + ($MsgType: path, $len: expr) => {{ + let mut reader = ::std::io::Cursor::new(get_slice!($len)); + match <($MsgType)>::read(&mut reader) { Ok(msg) => msg, Err(e) => match e { - msgs::DecodeError::UnknownRealmByte => return, + msgs::DecodeError::UnknownVersion => return, msgs::DecodeError::UnknownRequiredFeature => return, - msgs::DecodeError::BadPublicKey => return, - msgs::DecodeError::BadSignature => return, - msgs::DecodeError::BadText => return, + msgs::DecodeError::InvalidValue => return, msgs::DecodeError::ExtraAddressesPerType => return, msgs::DecodeError::BadLengthDescriptor => return, msgs::DecodeError::ShortRead => panic!("We picked the length..."), + msgs::DecodeError::Io(e) => panic!(format!("{}", e)), } } - } + }} } macro_rules! decode_msg_with_len16 { @@ -145,17 +143,16 @@ pub fn do_test(data: &[u8]) { } } - let secp_ctx = Secp256k1::new(); macro_rules! get_pubkey { () => { - match PublicKey::from_slice(&secp_ctx, get_slice!(33)) { + match PublicKey::from_slice(get_slice!(33)) { Ok(key) => key, Err(_) => return, } } } - let logger: Arc = Arc::new(test_logger::TestLogger{}); + let logger: Arc = Arc::new(test_logger::TestLogger::new("".to_owned())); let chain_monitor = Arc::new(DummyChainWatcher { input: Arc::clone(&input), }); @@ -186,7 +183,7 @@ pub fn do_test(data: &[u8]) { }, 1 => { let short_channel_id = slice_to_be64(get_slice!(8)); - router.handle_htlc_fail_channel_update(&msgs::HTLCFailChannelUpdate::ChannelClosed {short_channel_id}); + router.handle_htlc_fail_channel_update(&msgs::HTLCFailChannelUpdate::ChannelClosed {short_channel_id, is_permanent: false}); }, _ => return, } @@ -205,6 +202,9 @@ pub fn do_test(data: &[u8]) { remote_network_id: get_pubkey!(), channel_value_satoshis: slice_to_be64(get_slice!(8)), user_id: 0, + inbound_capacity_msat: 0, + is_live: true, + outbound_capacity_msat: 0, }); } Some(&first_hops_vec[..])