2018-03-19 17:45:58 -04:00
|
|
|
extern crate bitcoin;
|
|
|
|
extern crate lightning;
|
|
|
|
extern crate secp256k1;
|
|
|
|
|
|
|
|
use bitcoin::blockdata::block::BlockHeader;
|
2018-03-30 13:40:08 -04:00
|
|
|
use bitcoin::blockdata::transaction::{Transaction, TxOut};
|
2018-03-19 17:45:58 -04:00
|
|
|
use bitcoin::util::hash::Sha256dHash;
|
|
|
|
use bitcoin::network::serialize::{serialize, BitcoinHash};
|
|
|
|
|
2018-04-17 12:32:52 -04:00
|
|
|
use lightning::ln::channel::{Channel, ChannelKeys};
|
2018-04-04 11:56:54 -04:00
|
|
|
use lightning::ln::channelmanager::{HTLCFailReason, PendingForwardHTLCInfo};
|
2018-03-19 17:45:58 -04:00
|
|
|
use lightning::ln::msgs;
|
2018-07-25 12:26:03 -04:00
|
|
|
use lightning::ln::msgs::{MsgDecodable, ErrorAction};
|
2018-03-19 17:45:58 -04:00
|
|
|
use lightning::chain::chaininterface::{FeeEstimator, ConfirmationTarget};
|
2018-06-27 09:11:58 -04:00
|
|
|
use lightning::chain::transaction::OutPoint;
|
2018-03-27 11:34:22 -04:00
|
|
|
use lightning::util::reset_rng_state;
|
2018-03-19 17:45:58 -04:00
|
|
|
|
2018-04-17 12:32:52 -04:00
|
|
|
use secp256k1::key::{PublicKey, SecretKey};
|
2018-03-19 17:45:58 -04:00
|
|
|
use secp256k1::Secp256k1;
|
|
|
|
|
|
|
|
use std::sync::atomic::{AtomicUsize,Ordering};
|
|
|
|
|
|
|
|
#[inline]
|
|
|
|
pub fn slice_to_be16(v: &[u8]) -> u16 {
|
|
|
|
((v[0] as u16) << 8*1) |
|
|
|
|
((v[1] as u16) << 8*0)
|
|
|
|
}
|
|
|
|
|
|
|
|
#[inline]
|
|
|
|
pub fn slice_to_be32(v: &[u8]) -> u32 {
|
|
|
|
((v[0] as u32) << 8*3) |
|
|
|
|
((v[1] as u32) << 8*2) |
|
|
|
|
((v[2] as u32) << 8*1) |
|
|
|
|
((v[3] as u32) << 8*0)
|
|
|
|
}
|
|
|
|
|
|
|
|
#[inline]
|
|
|
|
pub fn slice_to_be64(v: &[u8]) -> u64 {
|
|
|
|
((v[0] as u64) << 8*7) |
|
|
|
|
((v[1] as u64) << 8*6) |
|
|
|
|
((v[2] as u64) << 8*5) |
|
|
|
|
((v[3] as u64) << 8*4) |
|
|
|
|
((v[4] as u64) << 8*3) |
|
|
|
|
((v[5] as u64) << 8*2) |
|
|
|
|
((v[6] as u64) << 8*1) |
|
|
|
|
((v[7] as u64) << 8*0)
|
|
|
|
}
|
|
|
|
|
|
|
|
#[inline]
|
|
|
|
fn slice_to_be24(v: &[u8]) -> u64 {
|
|
|
|
//TODO: We should probably be returning a Result for channel creation, not panic!()ing on
|
|
|
|
//>2**24 values...
|
|
|
|
((v[0] as u64) << 8*2) |
|
|
|
|
((v[1] as u64) << 8*1) |
|
|
|
|
((v[2] as u64) << 8*0)
|
|
|
|
}
|
|
|
|
|
|
|
|
struct InputData<'a> {
|
|
|
|
data: &'a [u8],
|
|
|
|
read_pos: AtomicUsize,
|
|
|
|
}
|
|
|
|
impl<'a> InputData<'a> {
|
|
|
|
fn get_slice(&self, len: usize) -> Option<&'a [u8]> {
|
|
|
|
let old_pos = self.read_pos.fetch_add(len, Ordering::AcqRel);
|
|
|
|
if self.data.len() < old_pos + len {
|
|
|
|
return None;
|
|
|
|
}
|
|
|
|
Some(&self.data[old_pos..old_pos + len])
|
|
|
|
}
|
|
|
|
fn get_slice_nonadvancing(&self, len: usize) -> Option<&'a [u8]> {
|
|
|
|
let old_pos = self.read_pos.load(Ordering::Acquire);
|
|
|
|
if self.data.len() < old_pos + len {
|
|
|
|
return None;
|
|
|
|
}
|
|
|
|
Some(&self.data[old_pos..old_pos + len])
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
struct FuzzEstimator<'a> {
|
|
|
|
input: &'a InputData<'a>,
|
|
|
|
}
|
|
|
|
impl<'a> FeeEstimator for FuzzEstimator<'a> {
|
2018-07-24 20:34:56 -04:00
|
|
|
fn get_est_sat_per_1000_weight(&self, _: ConfirmationTarget) -> u64 {
|
2018-03-19 17:45:58 -04:00
|
|
|
//TODO: We should actually be testing at least much more than 64k...
|
|
|
|
match self.input.get_slice(2) {
|
2018-07-24 20:34:56 -04:00
|
|
|
Some(slice) => slice_to_be16(slice) as u64 * 250,
|
2018-03-19 17:45:58 -04:00
|
|
|
None => 0
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[inline]
|
|
|
|
pub fn do_test(data: &[u8]) {
|
2018-03-27 11:34:22 -04:00
|
|
|
reset_rng_state();
|
|
|
|
|
2018-03-19 17:45:58 -04:00
|
|
|
let input = InputData {
|
|
|
|
data,
|
|
|
|
read_pos: AtomicUsize::new(0),
|
|
|
|
};
|
|
|
|
let fee_est = FuzzEstimator {
|
|
|
|
input: &input,
|
|
|
|
};
|
|
|
|
|
|
|
|
macro_rules! get_slice {
|
|
|
|
($len: expr) => {
|
|
|
|
match input.get_slice($len as usize) {
|
|
|
|
Some(slice) => slice,
|
|
|
|
None => return,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
macro_rules! decode_msg {
|
|
|
|
($MsgType: path, $len: expr) => {
|
|
|
|
match <($MsgType)>::decode(get_slice!($len)) {
|
|
|
|
Ok(msg) => msg,
|
|
|
|
Err(e) => match e {
|
|
|
|
msgs::DecodeError::UnknownRealmByte => return,
|
|
|
|
msgs::DecodeError::BadPublicKey => return,
|
|
|
|
msgs::DecodeError::BadSignature => return,
|
2018-07-23 00:59:16 +00:00
|
|
|
msgs::DecodeError::BadText => return,
|
2018-03-23 21:12:07 -04:00
|
|
|
msgs::DecodeError::ExtraAddressesPerType => return,
|
2018-07-25 15:27:19 -04:00
|
|
|
msgs::DecodeError::BadLengthDescriptor => return,
|
2018-07-25 15:48:44 -04:00
|
|
|
msgs::DecodeError::ShortRead => panic!("We picked the length..."),
|
2018-03-19 17:45:58 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
macro_rules! decode_msg_with_len16 {
|
|
|
|
($MsgType: path, $begin_len: expr, $factor: expr) => {
|
|
|
|
{
|
|
|
|
let extra_len = slice_to_be16(&match input.get_slice_nonadvancing($begin_len as usize + 2) {
|
|
|
|
Some(slice) => slice,
|
|
|
|
None => return,
|
|
|
|
}[$begin_len..$begin_len + 2]);
|
|
|
|
match <($MsgType)>::decode(get_slice!($begin_len as usize + 2 + (extra_len as usize)*$factor)) {
|
|
|
|
Ok(msg) => msg,
|
|
|
|
Err(e) => match e {
|
|
|
|
msgs::DecodeError::UnknownRealmByte => return,
|
|
|
|
msgs::DecodeError::BadPublicKey => return,
|
|
|
|
msgs::DecodeError::BadSignature => return,
|
2018-07-23 00:59:16 +00:00
|
|
|
msgs::DecodeError::BadText => return,
|
2018-03-23 21:12:07 -04:00
|
|
|
msgs::DecodeError::ExtraAddressesPerType => return,
|
2018-07-25 15:27:19 -04:00
|
|
|
msgs::DecodeError::BadLengthDescriptor => return,
|
2018-07-25 15:48:44 -04:00
|
|
|
msgs::DecodeError::ShortRead => panic!("We picked the length..."),
|
2018-03-19 17:45:58 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
let secp_ctx = Secp256k1::new();
|
|
|
|
macro_rules! get_pubkey {
|
|
|
|
() => {
|
|
|
|
match PublicKey::from_slice(&secp_ctx, get_slice!(33)) {
|
|
|
|
Ok(key) => key,
|
|
|
|
Err(_) => return,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
macro_rules! return_err {
|
|
|
|
($expr: expr) => {
|
|
|
|
match $expr {
|
2018-05-10 10:35:39 -04:00
|
|
|
Ok(r) => r,
|
2018-03-19 17:45:58 -04:00
|
|
|
Err(_) => return,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-04-17 12:32:52 -04:00
|
|
|
macro_rules! chan_keys {
|
|
|
|
() => {
|
|
|
|
ChannelKeys {
|
|
|
|
funding_key: SecretKey::from_slice(&secp_ctx, &[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]).unwrap(),
|
|
|
|
revocation_base_key: SecretKey::from_slice(&secp_ctx, &[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]).unwrap(),
|
|
|
|
payment_base_key: SecretKey::from_slice(&secp_ctx, &[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]).unwrap(),
|
|
|
|
delayed_payment_base_key: SecretKey::from_slice(&secp_ctx, &[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]).unwrap(),
|
|
|
|
htlc_base_key: SecretKey::from_slice(&secp_ctx, &[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]).unwrap(),
|
|
|
|
channel_close_key: SecretKey::from_slice(&secp_ctx, &[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]).unwrap(),
|
|
|
|
channel_monitor_claim_key: SecretKey::from_slice(&secp_ctx, &[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0]).unwrap(),
|
|
|
|
commitment_seed: [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0],
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-19 17:45:58 -04:00
|
|
|
let their_pubkey = get_pubkey!();
|
|
|
|
|
2018-03-30 13:40:08 -04:00
|
|
|
let mut tx = Transaction { version: 0, lock_time: 0, input: Vec::new(), output: Vec::new() };
|
2018-03-19 17:45:58 -04:00
|
|
|
|
|
|
|
let mut channel = if get_slice!(1)[0] != 0 {
|
2018-03-30 13:40:08 -04:00
|
|
|
let chan_value = slice_to_be24(get_slice!(3));
|
2018-04-17 12:32:52 -04:00
|
|
|
|
|
|
|
let mut chan = Channel::new_outbound(&fee_est, chan_keys!(), their_pubkey, chan_value, get_slice!(1)[0] == 0, slice_to_be64(get_slice!(8)));
|
2018-03-19 17:45:58 -04:00
|
|
|
chan.get_open_channel(Sha256dHash::from(get_slice!(32)), &fee_est).unwrap();
|
|
|
|
let accept_chan = if get_slice!(1)[0] == 0 {
|
|
|
|
decode_msg_with_len16!(msgs::AcceptChannel, 270, 1)
|
|
|
|
} else {
|
|
|
|
decode_msg!(msgs::AcceptChannel, 270)
|
|
|
|
};
|
|
|
|
return_err!(chan.accept_channel(&accept_chan));
|
2018-03-30 13:40:08 -04:00
|
|
|
|
|
|
|
tx.output.push(TxOut{ value: chan_value, script_pubkey: chan.get_funding_redeemscript().to_v0_p2wsh() });
|
2018-06-27 09:11:58 -04:00
|
|
|
let funding_output = OutPoint::new(Sha256dHash::from_data(&serialize(&tx).unwrap()[..]), 0);
|
2018-03-30 13:40:08 -04:00
|
|
|
|
2018-06-27 09:11:58 -04:00
|
|
|
chan.get_outbound_funding_created(funding_output).unwrap();
|
2018-03-19 17:45:58 -04:00
|
|
|
let funding_signed = decode_msg!(msgs::FundingSigned, 32+64);
|
|
|
|
return_err!(chan.funding_signed(&funding_signed));
|
|
|
|
chan
|
|
|
|
} else {
|
|
|
|
let open_chan = if get_slice!(1)[0] == 0 {
|
|
|
|
decode_msg_with_len16!(msgs::OpenChannel, 2*32+6*8+4+2*2+6*33+1, 1)
|
|
|
|
} else {
|
|
|
|
decode_msg!(msgs::OpenChannel, 2*32+6*8+4+2*2+6*33+1)
|
|
|
|
};
|
2018-07-26 14:33:01 -04:00
|
|
|
let mut chan = match Channel::new_from_req(&fee_est, chan_keys!(), their_pubkey, &open_chan, slice_to_be64(get_slice!(8)), false, get_slice!(1)[0] == 0) {
|
2018-03-19 17:45:58 -04:00
|
|
|
Ok(chan) => chan,
|
|
|
|
Err(_) => return,
|
|
|
|
};
|
|
|
|
chan.get_accept_channel().unwrap();
|
2018-03-30 13:40:08 -04:00
|
|
|
|
|
|
|
tx.output.push(TxOut{ value: open_chan.funding_satoshis, script_pubkey: chan.get_funding_redeemscript().to_v0_p2wsh() });
|
2018-06-27 09:11:58 -04:00
|
|
|
let funding_output = OutPoint::new(Sha256dHash::from_data(&serialize(&tx).unwrap()[..]), 0);
|
2018-03-30 13:40:08 -04:00
|
|
|
|
2018-03-19 17:45:58 -04:00
|
|
|
let mut funding_created = decode_msg!(msgs::FundingCreated, 32+32+2+64);
|
2018-06-27 09:11:58 -04:00
|
|
|
funding_created.funding_txid = funding_output.txid.clone();
|
|
|
|
funding_created.funding_output_index = funding_output.index;
|
2018-03-19 17:45:58 -04:00
|
|
|
return_err!(chan.funding_created(&funding_created));
|
|
|
|
chan
|
|
|
|
};
|
|
|
|
|
|
|
|
let mut header = BlockHeader { version: 0x20000000, prev_blockhash: Default::default(), merkle_root: Default::default(), time: 42, bits: 42, nonce: 42 };
|
|
|
|
channel.block_connected(&header, 1, &[&tx; 1], &[42; 1]);
|
|
|
|
for i in 2..100 {
|
|
|
|
header = BlockHeader { version: 0x20000000, prev_blockhash: header.bitcoin_hash(), merkle_root: Default::default(), time: 42, bits: 42, nonce: 42 };
|
|
|
|
channel.block_connected(&header, i, &[&tx; 0], &[0; 0]);
|
|
|
|
}
|
|
|
|
|
|
|
|
let funding_locked = decode_msg!(msgs::FundingLocked, 32+33);
|
|
|
|
return_err!(channel.funding_locked(&funding_locked));
|
|
|
|
|
2018-07-25 12:26:03 -04:00
|
|
|
macro_rules! test_err {
|
|
|
|
($expr: expr) => {
|
|
|
|
match $expr {
|
|
|
|
Ok(r) => Some(r),
|
|
|
|
Err(e) => match e.action {
|
|
|
|
None => return,
|
|
|
|
Some(ErrorAction::UpdateFailHTLC {..}) => None,
|
|
|
|
Some(ErrorAction::DisconnectPeer {..}) => return,
|
|
|
|
Some(ErrorAction::IgnoreError) => None,
|
|
|
|
Some(ErrorAction::SendErrorMessage {..}) => None,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-19 17:45:58 -04:00
|
|
|
loop {
|
|
|
|
match get_slice!(1)[0] {
|
|
|
|
0 => {
|
2018-07-25 12:26:03 -04:00
|
|
|
test_err!(channel.send_htlc(slice_to_be64(get_slice!(8)), [42; 32], slice_to_be32(get_slice!(4)), msgs::OnionPacket {
|
2018-03-19 17:45:58 -04:00
|
|
|
version: get_slice!(1)[0],
|
|
|
|
public_key: get_pubkey!(),
|
|
|
|
hop_data: [0; 20*65],
|
|
|
|
hmac: [0; 32],
|
|
|
|
}));
|
|
|
|
},
|
|
|
|
1 => {
|
2018-07-25 12:26:03 -04:00
|
|
|
test_err!(channel.send_commitment());
|
2018-03-19 17:45:58 -04:00
|
|
|
},
|
|
|
|
2 => {
|
|
|
|
let update_add_htlc = decode_msg!(msgs::UpdateAddHTLC, 32+8+8+32+4+4+33+20*65+32);
|
2018-07-25 12:26:03 -04:00
|
|
|
test_err!(channel.update_add_htlc(&update_add_htlc, PendingForwardHTLCInfo::dummy()));
|
2018-03-19 17:45:58 -04:00
|
|
|
},
|
|
|
|
3 => {
|
|
|
|
let update_fulfill_htlc = decode_msg!(msgs::UpdateFulfillHTLC, 32 + 8 + 32);
|
2018-07-25 12:26:03 -04:00
|
|
|
test_err!(channel.update_fulfill_htlc(&update_fulfill_htlc));
|
2018-03-19 17:45:58 -04:00
|
|
|
},
|
|
|
|
4 => {
|
|
|
|
let update_fail_htlc = decode_msg_with_len16!(msgs::UpdateFailHTLC, 32 + 8, 1);
|
2018-07-25 12:26:03 -04:00
|
|
|
test_err!(channel.update_fail_htlc(&update_fail_htlc, HTLCFailReason::dummy()));
|
2018-03-19 17:45:58 -04:00
|
|
|
},
|
|
|
|
5 => {
|
|
|
|
let update_fail_malformed_htlc = decode_msg!(msgs::UpdateFailMalformedHTLC, 32+8+32+2);
|
2018-07-25 12:26:03 -04:00
|
|
|
test_err!(channel.update_fail_malformed_htlc(&update_fail_malformed_htlc, HTLCFailReason::dummy()));
|
2018-03-19 17:45:58 -04:00
|
|
|
},
|
|
|
|
6 => {
|
|
|
|
let commitment_signed = decode_msg_with_len16!(msgs::CommitmentSigned, 32+64, 64);
|
2018-07-25 12:26:03 -04:00
|
|
|
test_err!(channel.commitment_signed(&commitment_signed));
|
2018-03-19 17:45:58 -04:00
|
|
|
},
|
|
|
|
7 => {
|
|
|
|
let revoke_and_ack = decode_msg!(msgs::RevokeAndACK, 32+32+33);
|
2018-07-25 12:26:03 -04:00
|
|
|
test_err!(channel.revoke_and_ack(&revoke_and_ack));
|
2018-03-19 17:45:58 -04:00
|
|
|
},
|
|
|
|
8 => {
|
|
|
|
let update_fee = decode_msg!(msgs::UpdateFee, 32+4);
|
2018-07-25 12:26:03 -04:00
|
|
|
test_err!(channel.update_fee(&fee_est, &update_fee));
|
2018-03-19 17:45:58 -04:00
|
|
|
},
|
2018-03-26 16:48:18 -04:00
|
|
|
9 => {
|
|
|
|
let shutdown = decode_msg_with_len16!(msgs::Shutdown, 32, 1);
|
2018-07-25 12:26:03 -04:00
|
|
|
test_err!(channel.shutdown(&fee_est, &shutdown));
|
2018-05-10 10:35:39 -04:00
|
|
|
if channel.is_shutdown() { return; }
|
2018-03-26 16:48:18 -04:00
|
|
|
},
|
|
|
|
10 => {
|
|
|
|
let closing_signed = decode_msg!(msgs::ClosingSigned, 32+8+64);
|
2018-07-25 12:26:03 -04:00
|
|
|
let sign_res = test_err!(channel.closing_signed(&fee_est, &closing_signed));
|
|
|
|
if sign_res.is_some() && sign_res.unwrap().1.is_some() {
|
2018-05-10 10:35:39 -04:00
|
|
|
assert!(channel.is_shutdown());
|
|
|
|
return;
|
|
|
|
}
|
2018-03-26 16:48:18 -04:00
|
|
|
},
|
2018-03-19 17:45:58 -04:00
|
|
|
_ => return,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(feature = "afl")]
|
|
|
|
extern crate afl;
|
|
|
|
#[cfg(feature = "afl")]
|
|
|
|
fn main() {
|
|
|
|
afl::read_stdio_bytes(|data| {
|
|
|
|
do_test(&data);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
|
|
|
|
#[cfg(feature = "honggfuzz")]
|
|
|
|
#[macro_use] extern crate honggfuzz;
|
|
|
|
#[cfg(feature = "honggfuzz")]
|
|
|
|
fn main() {
|
|
|
|
loop {
|
|
|
|
fuzz!(|data| {
|
|
|
|
do_test(data);
|
|
|
|
});
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-28 09:44:15 -07:00
|
|
|
extern crate hex;
|
2018-03-19 17:45:58 -04:00
|
|
|
#[cfg(test)]
|
|
|
|
mod tests {
|
|
|
|
#[test]
|
|
|
|
fn duplicate_crash() {
|
2018-07-28 09:44:15 -07:00
|
|
|
super::do_test(&::hex::decode("00").unwrap());
|
2018-03-19 17:45:58 -04:00
|
|
|
}
|
|
|
|
}
|