X-Git-Url: http://git.bitcoin.ninja/index.cgi?a=blobdiff_plain;f=fuzz%2Fsrc%2Fpeer_crypt.rs;h=f6df392fcef5407623b6c0f0cfcf9b8690cdbc75;hb=a1a2f2abc86b0015f05ca69b22ce27380d4d90aa;hp=8e61644644ec4a474f3e6c76184c0cd7a7f36967;hpb=be677dc4f44fb8ec793d9280fada8b9a0ea833f8;p=rust-lightning diff --git a/fuzz/src/peer_crypt.rs b/fuzz/src/peer_crypt.rs index 8e616446..f6df392f 100644 --- a/fuzz/src/peer_crypt.rs +++ b/fuzz/src/peer_crypt.rs @@ -1,6 +1,18 @@ +// This file is Copyright its original authors, visible in version control +// history. +// +// This file is licensed under the Apache License, Version 2.0 or the MIT license +// , at your option. +// You may not use this file except in accordance with one or both of these +// licenses. + use lightning::ln::peer_channel_encryptor::PeerChannelEncryptor; +use lightning::util::test_utils::TestNodeSigner; + +use bitcoin::secp256k1::{Secp256k1, PublicKey, SecretKey}; -use secp256k1::key::{PublicKey,SecretKey}; +use crate::utils::test_logger; #[inline] fn slice_to_be16(v: &[u8]) -> u16 { @@ -24,10 +36,13 @@ pub fn do_test(data: &[u8]) { } } + let secp_ctx = Secp256k1::signing_only(); + let our_network_key = match SecretKey::from_slice(get_slice!(32)) { Ok(key) => key, Err(_) => return, }; + let node_signer = TestNodeSigner::new(our_network_key); let ephemeral_key = match SecretKey::from_slice(get_slice!(32)) { Ok(key) => key, Err(_) => return, @@ -39,16 +54,16 @@ pub fn do_test(data: &[u8]) { Err(_) => return, }; let mut crypter = PeerChannelEncryptor::new_outbound(their_pubkey, ephemeral_key); - crypter.get_act_one(); - match crypter.process_act_two(get_slice!(50), &our_network_key) { + crypter.get_act_one(&secp_ctx); + match crypter.process_act_two(get_slice!(50), &&node_signer) { Ok(_) => {}, Err(_) => return, } assert!(crypter.is_ready_for_encryption()); crypter } else { - let mut crypter = PeerChannelEncryptor::new_inbound(&our_network_key); - match crypter.process_act_one_with_keys(get_slice!(50), &our_network_key, ephemeral_key) { + let mut crypter = PeerChannelEncryptor::new_inbound(&&node_signer); + match crypter.process_act_one_with_keys(get_slice!(50), &&node_signer, ephemeral_key, &secp_ctx) { Ok(_) => {}, Err(_) => return, } @@ -61,7 +76,7 @@ pub fn do_test(data: &[u8]) { }; loop { if get_slice!(1)[0] == 0 { - crypter.encrypt_message(get_slice!(slice_to_be16(get_slice!(2)))); + crypter.encrypt_buffer(get_slice!(slice_to_be16(get_slice!(2)))); } else { let len = match crypter.decrypt_length_header(get_slice!(16+2)) { Ok(len) => len, @@ -75,15 +90,11 @@ pub fn do_test(data: &[u8]) { } } +pub fn peer_crypt_test(data: &[u8], _out: Out) { + do_test(data); +} + #[no_mangle] pub extern "C" fn peer_crypt_run(data: *const u8, datalen: usize) { do_test(unsafe { std::slice::from_raw_parts(data, datalen) }); } - -#[cfg(test)] -mod tests { - #[test] - fn duplicate_crash() { - super::do_test(&::hex::decode("01").unwrap()); - } -}