2016-11-29 20:51:50 +01:00
|
|
|
#include "wire.h"
|
2017-03-29 12:56:15 +02:00
|
|
|
#include <bitcoin/preimage.h>
|
2017-02-21 05:45:28 +01:00
|
|
|
#include <bitcoin/shadouble.h>
|
2017-12-18 07:41:52 +01:00
|
|
|
#include <bitcoin/tx.h>
|
2017-08-18 06:43:52 +02:00
|
|
|
#include <ccan/crypto/ripemd160/ripemd160.h>
|
2018-02-26 03:32:58 +01:00
|
|
|
#include <ccan/crypto/siphash24/siphash24.h>
|
2016-11-29 20:51:50 +01:00
|
|
|
#include <ccan/endian/endian.h>
|
|
|
|
#include <ccan/mem/mem.h>
|
|
|
|
#include <ccan/tal/tal.h>
|
2017-08-28 18:02:01 +02:00
|
|
|
#include <common/utils.h>
|
2016-11-29 20:51:50 +01:00
|
|
|
|
|
|
|
void towire(u8 **pptr, const void *data, size_t len)
|
|
|
|
{
|
|
|
|
size_t oldsize = tal_count(*pptr);
|
|
|
|
|
|
|
|
tal_resize(pptr, oldsize + len);
|
|
|
|
memcpy(*pptr + oldsize, memcheck(data, len), len);
|
|
|
|
}
|
|
|
|
|
|
|
|
void towire_u8(u8 **pptr, u8 v)
|
|
|
|
{
|
|
|
|
towire(pptr, &v, sizeof(v));
|
|
|
|
}
|
|
|
|
|
|
|
|
void towire_u16(u8 **pptr, u16 v)
|
|
|
|
{
|
|
|
|
be16 l = cpu_to_be16(v);
|
|
|
|
towire(pptr, &l, sizeof(l));
|
|
|
|
}
|
|
|
|
|
|
|
|
void towire_u32(u8 **pptr, u32 v)
|
|
|
|
{
|
|
|
|
be32 l = cpu_to_be32(v);
|
|
|
|
towire(pptr, &l, sizeof(l));
|
|
|
|
}
|
|
|
|
|
|
|
|
void towire_u64(u8 **pptr, u64 v)
|
|
|
|
{
|
|
|
|
be64 l = cpu_to_be64(v);
|
|
|
|
towire(pptr, &l, sizeof(l));
|
|
|
|
}
|
|
|
|
|
2018-02-21 12:48:32 +01:00
|
|
|
void towire_double(u8 **pptr, const double *v)
|
|
|
|
{
|
|
|
|
towire(pptr, v, sizeof(*v));
|
|
|
|
}
|
|
|
|
|
2017-01-04 04:39:21 +01:00
|
|
|
void towire_bool(u8 **pptr, bool v)
|
|
|
|
{
|
2017-09-26 23:02:48 +02:00
|
|
|
u8 val = v;
|
2017-01-04 04:39:21 +01:00
|
|
|
towire(pptr, &val, sizeof(val));
|
|
|
|
}
|
|
|
|
|
2016-12-02 08:41:06 +01:00
|
|
|
void towire_pubkey(u8 **pptr, const struct pubkey *pubkey)
|
2016-11-29 20:51:50 +01:00
|
|
|
{
|
|
|
|
u8 output[PUBKEY_DER_LEN];
|
|
|
|
size_t outputlen = sizeof(output);
|
|
|
|
|
2018-01-10 03:43:23 +01:00
|
|
|
secp256k1_ec_pubkey_serialize(secp256k1_ctx, output, &outputlen,
|
|
|
|
&pubkey->pubkey,
|
|
|
|
SECP256K1_EC_COMPRESSED);
|
2017-05-05 08:41:44 +02:00
|
|
|
|
2016-11-29 20:51:50 +01:00
|
|
|
towire(pptr, output, outputlen);
|
|
|
|
}
|
|
|
|
|
2017-05-06 04:19:44 +02:00
|
|
|
void towire_secret(u8 **pptr, const struct secret *secret)
|
|
|
|
{
|
|
|
|
towire(pptr, secret->data, sizeof(secret->data));
|
|
|
|
}
|
|
|
|
|
2017-02-21 05:45:28 +01:00
|
|
|
void towire_privkey(u8 **pptr, const struct privkey *privkey)
|
|
|
|
{
|
2017-05-06 04:19:44 +02:00
|
|
|
towire_secret(pptr, &privkey->secret);
|
2017-02-21 05:45:28 +01:00
|
|
|
}
|
|
|
|
|
2017-01-25 00:33:42 +01:00
|
|
|
void towire_secp256k1_ecdsa_signature(u8 **pptr,
|
|
|
|
const secp256k1_ecdsa_signature *sig)
|
2016-11-29 20:51:50 +01:00
|
|
|
{
|
|
|
|
u8 compact[64];
|
|
|
|
|
2016-12-02 08:41:06 +01:00
|
|
|
secp256k1_ecdsa_signature_serialize_compact(secp256k1_ctx,
|
2017-01-25 00:33:42 +01:00
|
|
|
compact, sig);
|
2016-11-29 20:51:50 +01:00
|
|
|
towire(pptr, compact, sizeof(compact));
|
|
|
|
}
|
|
|
|
|
2017-10-26 05:01:19 +02:00
|
|
|
void towire_secp256k1_ecdsa_recoverable_signature(u8 **pptr,
|
|
|
|
const secp256k1_ecdsa_recoverable_signature *rsig)
|
|
|
|
{
|
|
|
|
u8 compact[64];
|
|
|
|
int recid;
|
|
|
|
|
|
|
|
secp256k1_ecdsa_recoverable_signature_serialize_compact(secp256k1_ctx,
|
|
|
|
compact,
|
|
|
|
&recid,
|
|
|
|
rsig);
|
|
|
|
towire(pptr, compact, sizeof(compact));
|
|
|
|
towire_u8(pptr, recid);
|
|
|
|
}
|
|
|
|
|
2016-11-29 20:51:50 +01:00
|
|
|
void towire_channel_id(u8 **pptr, const struct channel_id *channel_id)
|
|
|
|
{
|
2017-03-02 13:21:49 +01:00
|
|
|
towire(pptr, channel_id, sizeof(*channel_id));
|
|
|
|
}
|
|
|
|
|
|
|
|
void towire_short_channel_id(u8 **pptr,
|
|
|
|
const struct short_channel_id *short_channel_id)
|
|
|
|
{
|
2018-03-01 10:22:24 +01:00
|
|
|
towire_u64(pptr, short_channel_id->u64);
|
2016-11-29 20:51:50 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void towire_sha256(u8 **pptr, const struct sha256 *sha256)
|
|
|
|
{
|
|
|
|
towire(pptr, sha256, sizeof(*sha256));
|
|
|
|
}
|
|
|
|
|
2017-02-21 05:45:28 +01:00
|
|
|
void towire_sha256_double(u8 **pptr, const struct sha256_double *sha256d)
|
|
|
|
{
|
|
|
|
towire_sha256(pptr, &sha256d->sha);
|
|
|
|
}
|
|
|
|
|
2017-12-18 07:41:52 +01:00
|
|
|
void towire_bitcoin_txid(u8 **pptr, const struct bitcoin_txid *txid)
|
|
|
|
{
|
|
|
|
towire_sha256_double(pptr, &txid->shad);
|
|
|
|
}
|
|
|
|
|
2017-12-18 07:44:10 +01:00
|
|
|
void towire_bitcoin_blkid(u8 **pptr, const struct bitcoin_blkid *blkid)
|
|
|
|
{
|
|
|
|
towire_sha256_double(pptr, &blkid->shad);
|
|
|
|
}
|
|
|
|
|
2017-03-29 12:56:15 +02:00
|
|
|
void towire_preimage(u8 **pptr, const struct preimage *preimage)
|
|
|
|
{
|
|
|
|
towire(pptr, preimage, sizeof(*preimage));
|
|
|
|
}
|
|
|
|
|
2017-08-18 06:43:52 +02:00
|
|
|
void towire_ripemd160(u8 **pptr, const struct ripemd160 *ripemd)
|
|
|
|
{
|
|
|
|
towire(pptr, ripemd, sizeof(*ripemd));
|
|
|
|
}
|
|
|
|
|
2016-11-29 20:51:50 +01:00
|
|
|
void towire_u8_array(u8 **pptr, const u8 *arr, size_t num)
|
|
|
|
{
|
|
|
|
towire(pptr, arr, num);
|
|
|
|
}
|
|
|
|
|
2017-01-04 04:39:20 +01:00
|
|
|
void towire_pad(u8 **pptr, size_t num)
|
2016-11-29 20:51:50 +01:00
|
|
|
{
|
|
|
|
/* Simply insert zeros. */
|
|
|
|
size_t oldsize = tal_count(*pptr);
|
|
|
|
|
|
|
|
tal_resize(pptr, oldsize + num);
|
|
|
|
memset(*pptr + oldsize, 0, num);
|
|
|
|
}
|
2018-01-04 18:19:02 +01:00
|
|
|
|
2018-02-08 02:25:12 +01:00
|
|
|
void towire_wirestring(u8 **pptr, const char *str)
|
|
|
|
{
|
|
|
|
towire(pptr, str, strlen(str) + 1);
|
|
|
|
}
|
|
|
|
|
2018-01-04 18:19:02 +01:00
|
|
|
void towire_bitcoin_tx(u8 **pptr, const struct bitcoin_tx *tx)
|
|
|
|
{
|
|
|
|
tal_t *tmpctx = tal_tmpctx(NULL);
|
|
|
|
u8 *lin = linearize_tx(tmpctx, tx);
|
|
|
|
towire_u8_array(pptr, lin, tal_len(lin));
|
|
|
|
tal_free(tmpctx);
|
|
|
|
}
|
2018-02-26 03:32:58 +01:00
|
|
|
|
|
|
|
void towire_siphash_seed(u8 **pptr, const struct siphash_seed *seed)
|
|
|
|
{
|
|
|
|
towire(pptr, seed, sizeof(*seed));
|
|
|
|
}
|