]> git.bitcoin.ninja Git - rust-lightning/commitdiff
Add missing test coverage for bogus err packet with valid hmac
authorValentine Wallace <vwallace@protonmail.com>
Thu, 20 Jul 2023 17:42:12 +0000 (13:42 -0400)
committerValentine Wallace <vwallace@protonmail.com>
Sat, 19 Aug 2023 22:55:34 +0000 (18:55 -0400)
lightning/src/ln/onion_route_tests.rs

index c6ac77ac378ee59722ec4272aac86d34e3b94be5..8550532c69edd9a886d4c5851432323dd57d4398 100644 (file)
@@ -31,7 +31,8 @@ use crate::util::errors::APIError;
 
 use bitcoin::hash_types::BlockHash;
 
-use bitcoin::hashes::Hash;
+use bitcoin::hashes::{Hash, HashEngine};
+use bitcoin::hashes::hmac::{Hmac, HmacEngine};
 use bitcoin::hashes::sha256::Hash as Sha256;
 
 use bitcoin::secp256k1;
@@ -57,7 +58,12 @@ fn run_onion_failure_test<F1,F2>(_name: &str, test_case: u8, nodes: &Vec<Node>,
 // 3: final node fails backward (but tamper onion payloads from node0)
 // 100: trigger error in the intermediate node and tamper returning fail_htlc
 // 200: trigger error in the final node and tamper returning fail_htlc
-fn run_onion_failure_test_with_fail_intercept<F1,F2,F3>(_name: &str, test_case: u8, nodes: &Vec<Node>, route: &Route, payment_hash: &PaymentHash, payment_secret: &PaymentSecret, mut callback_msg: F1, mut callback_fail: F2, mut callback_node: F3, expected_retryable: bool, expected_error_code: Option<u16>, expected_channel_update: Option<NetworkUpdate>, expected_short_channel_id: Option<u64>)
+fn run_onion_failure_test_with_fail_intercept<F1,F2,F3>(
+       _name: &str, test_case: u8, nodes: &Vec<Node>, route: &Route, payment_hash: &PaymentHash,
+       payment_secret: &PaymentSecret, mut callback_msg: F1, mut callback_fail: F2,
+       mut callback_node: F3, expected_retryable: bool, expected_error_code: Option<u16>,
+       expected_channel_update: Option<NetworkUpdate>, expected_short_channel_id: Option<u64>
+)
        where F1: for <'a> FnMut(&'a mut msgs::UpdateAddHTLC),
                                F2: for <'a> FnMut(&'a mut msgs::UpdateFailHTLC),
                                F3: FnMut(),
@@ -620,6 +626,25 @@ fn test_onion_failure() {
        }, ||{
                nodes[2].node.fail_htlc_backwards(&payment_hash);
        }, true, Some(23), None, None);
+
+       run_onion_failure_test_with_fail_intercept("bogus err packet with valid hmac", 200, &nodes,
+               &route, &payment_hash, &payment_secret, |_msg| {}, |msg| {
+                       let session_priv = SecretKey::from_slice(&[3; 32]).unwrap();
+                       let onion_keys = onion_utils::construct_onion_keys(&Secp256k1::new(), &route.paths[0], &session_priv).unwrap();
+                       let mut decoded_err_packet = msgs::DecodedOnionErrorPacket {
+                               failuremsg: vec![0],
+                               pad: vec![0; 255],
+                               hmac: [0; 32],
+                       };
+                       let um = onion_utils::gen_um_from_shared_secret(&onion_keys[1].shared_secret.as_ref());
+                       let mut hmac = HmacEngine::<Sha256>::new(&um);
+                       hmac.input(&decoded_err_packet.encode()[32..]);
+                       decoded_err_packet.hmac = Hmac::from_engine(hmac).into_inner();
+                       msg.reason = onion_utils::encrypt_failure_packet(
+                               &onion_keys[1].shared_secret.as_ref(), &decoded_err_packet.encode()[..])
+               }, || nodes[2].node.fail_htlc_backwards(&payment_hash), false, None,
+               Some(NetworkUpdate::NodeFailure { node_id: route.paths[0].hops[1].pubkey, is_permanent: true }),
+               Some(channels[1].0.contents.short_channel_id));
 }
 
 #[test]