Skip to content

Commit 2721637

Browse files
Fuzz test onion messages
1 parent 28c9b56 commit 2721637

File tree

6 files changed

+223
-0
lines changed

6 files changed

+223
-0
lines changed

fuzz/src/bin/gen_target.sh

+1
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ GEN_TEST() {
99
GEN_TEST chanmon_deser
1010
GEN_TEST chanmon_consistency
1111
GEN_TEST full_stack
12+
GEN_TEST onion_message
1213
GEN_TEST peer_crypt
1314
GEN_TEST process_network_graph
1415
GEN_TEST router

fuzz/src/bin/onion_message_target.rs

+113
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,113 @@
1+
// This file is Copyright its original authors, visible in version control
2+
// history.
3+
//
4+
// This file is licensed under the Apache License, Version 2.0 <LICENSE-APACHE
5+
// or http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
6+
// <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your option.
7+
// You may not use this file except in accordance with one or both of these
8+
// licenses.
9+
10+
// This file is auto-generated by gen_target.sh based on target_template.txt
11+
// To modify it, modify target_template.txt and run gen_target.sh instead.
12+
13+
#![cfg_attr(feature = "libfuzzer_fuzz", no_main)]
14+
15+
#[cfg(not(fuzzing))]
16+
compile_error!("Fuzz targets need cfg=fuzzing");
17+
18+
extern crate lightning_fuzz;
19+
use lightning_fuzz::onion_message::*;
20+
21+
#[cfg(feature = "afl")]
22+
#[macro_use] extern crate afl;
23+
#[cfg(feature = "afl")]
24+
fn main() {
25+
fuzz!(|data| {
26+
onion_message_run(data.as_ptr(), data.len());
27+
});
28+
}
29+
30+
#[cfg(feature = "honggfuzz")]
31+
#[macro_use] extern crate honggfuzz;
32+
#[cfg(feature = "honggfuzz")]
33+
fn main() {
34+
loop {
35+
fuzz!(|data| {
36+
onion_message_run(data.as_ptr(), data.len());
37+
});
38+
}
39+
}
40+
41+
#[cfg(feature = "libfuzzer_fuzz")]
42+
#[macro_use] extern crate libfuzzer_sys;
43+
#[cfg(feature = "libfuzzer_fuzz")]
44+
fuzz_target!(|data: &[u8]| {
45+
onion_message_run(data.as_ptr(), data.len());
46+
});
47+
48+
#[cfg(feature = "stdin_fuzz")]
49+
fn main() {
50+
use std::io::Read;
51+
52+
let mut data = Vec::with_capacity(8192);
53+
std::io::stdin().read_to_end(&mut data).unwrap();
54+
onion_message_run(data.as_ptr(), data.len());
55+
}
56+
57+
#[test]
58+
fn run_test_cases() {
59+
use std::fs;
60+
use std::io::Read;
61+
use lightning_fuzz::utils::test_logger::StringBuffer;
62+
63+
use std::sync::{atomic, Arc};
64+
{
65+
let data: Vec<u8> = vec![0];
66+
onion_message_run(data.as_ptr(), data.len());
67+
}
68+
let mut threads = Vec::new();
69+
let threads_running = Arc::new(atomic::AtomicUsize::new(0));
70+
if let Ok(tests) = fs::read_dir("test_cases/onion_message") {
71+
for test in tests {
72+
let mut data: Vec<u8> = Vec::new();
73+
let path = test.unwrap().path();
74+
fs::File::open(&path).unwrap().read_to_end(&mut data).unwrap();
75+
threads_running.fetch_add(1, atomic::Ordering::AcqRel);
76+
77+
let thread_count_ref = Arc::clone(&threads_running);
78+
let main_thread_ref = std::thread::current();
79+
threads.push((path.file_name().unwrap().to_str().unwrap().to_string(),
80+
std::thread::spawn(move || {
81+
let string_logger = StringBuffer::new();
82+
83+
let panic_logger = string_logger.clone();
84+
let res = if ::std::panic::catch_unwind(move || {
85+
onion_message_test(&data, panic_logger);
86+
}).is_err() {
87+
Some(string_logger.into_string())
88+
} else { None };
89+
thread_count_ref.fetch_sub(1, atomic::Ordering::AcqRel);
90+
main_thread_ref.unpark();
91+
res
92+
})
93+
));
94+
while threads_running.load(atomic::Ordering::Acquire) > 32 {
95+
std::thread::park();
96+
}
97+
}
98+
}
99+
let mut failed_outputs = Vec::new();
100+
for (test, thread) in threads.drain(..) {
101+
if let Some(output) = thread.join().unwrap() {
102+
println!("\nOutput of {}:\n{}\n", test, output);
103+
failed_outputs.push(test);
104+
}
105+
}
106+
if !failed_outputs.is_empty() {
107+
println!("Test cases which failed: ");
108+
for case in failed_outputs {
109+
println!("{}", case);
110+
}
111+
panic!();
112+
}
113+
}

fuzz/src/lib.rs

+1
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ pub mod utils;
1717
pub mod chanmon_deser;
1818
pub mod chanmon_consistency;
1919
pub mod full_stack;
20+
pub mod onion_message;
2021
pub mod peer_crypt;
2122
pub mod process_network_graph;
2223
pub mod router;

fuzz/src/onion_message.rs

+104
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,104 @@
1+
// Imports that need to be added manually
2+
use bitcoin::bech32::u5;
3+
use bitcoin::blockdata::script::Script;
4+
use bitcoin::secp256k1::{PublicKey, SecretKey};
5+
use bitcoin::secp256k1::ecdh::SharedSecret;
6+
use bitcoin::secp256k1::ecdsa::RecoverableSignature;
7+
8+
use lightning::chain::keysinterface::{Recipient, KeyMaterial, KeysInterface};
9+
use lightning::ln::msgs::{self, DecodeError};
10+
use lightning::ln::script::ShutdownScript;
11+
use lightning::util::enforcing_trait_impls::EnforcingSigner;
12+
use lightning::util::ser::{Readable, Writeable, Writer};
13+
use lightning::onion_message::OnionMessenger;
14+
15+
use utils::test_logger;
16+
17+
use std::io::Cursor;
18+
use std::sync::atomic::{AtomicU64, Ordering};
19+
20+
/// Actual fuzz test, method signature and name are fixed
21+
fn do_test<Out: test_logger::Output>(data: &[u8], out: Out) {
22+
if let Ok(msg) = <msgs::OnionMessage as Readable>::read(&mut Cursor::new(data)) {
23+
// Serialization checking adapted from `msg_targets::utils::test_msg_simple`
24+
let mut w = VecWriter(Vec::new());
25+
msg.write(&mut w).unwrap();
26+
assert_eq!(msg.serialized_length(), w.0.len());
27+
28+
let onion_message = <msgs::OnionMessage as Readable>::read(&mut Cursor::new(&w.0)).unwrap();
29+
let mut w_two = VecWriter(Vec::new());
30+
msg.write(&mut w_two).unwrap();
31+
assert_eq!(&w.0[..], &w_two.0[..]);
32+
33+
// Finally, make sure we can handle the onion message in OnionMessenger
34+
let secret = SecretKey::from_slice(&[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1]).unwrap();
35+
let logger = test_logger::TestLogger::new("".to_owned(), out);
36+
let keys_manager = KeyProvider {
37+
node_secret: secret,
38+
counter: AtomicU64::new(0),
39+
};
40+
let onion_messenger = OnionMessenger::new(&keys_manager, &logger);
41+
let peer_node_id_not_used = PublicKey::from_slice(&[0; 33]).unwrap();
42+
onion_messenger.handle_onion_message(&peer_node_id_not_used, &onion_message);
43+
}
44+
}
45+
46+
/// Method that needs to be added manually, {name}_test
47+
pub fn onion_message_test<Out: test_logger::Output>(data: &[u8], out: Out) {
48+
do_test(data, out);
49+
}
50+
51+
/// Method that needs to be added manually, {name}_run
52+
#[no_mangle]
53+
pub extern "C" fn onion_message_run(data: *const u8, datalen: usize) {
54+
do_test(unsafe { std::slice::from_raw_parts(data, datalen) }, test_logger::DevNull {});
55+
}
56+
57+
pub struct VecWriter(pub Vec<u8>);
58+
impl Writer for VecWriter {
59+
fn write_all(&mut self, buf: &[u8]) -> Result<(), ::std::io::Error> {
60+
self.0.extend_from_slice(buf);
61+
Ok(())
62+
}
63+
}
64+
struct KeyProvider {
65+
node_secret: SecretKey,
66+
counter: AtomicU64,
67+
}
68+
impl KeysInterface for KeyProvider {
69+
type Signer = EnforcingSigner;
70+
71+
fn get_node_secret(&self, _recipient: Recipient) -> Result<SecretKey, ()> {
72+
Ok(self.node_secret.clone())
73+
}
74+
75+
fn ecdh(&self, recipient: Recipient, other_key: &PublicKey, tweak: Option<&[u8; 32]>) -> Result<SharedSecret, ()> {
76+
let mut node_secret = self.get_node_secret(recipient)?;
77+
if let Some(tweak) = tweak {
78+
node_secret.mul_assign(tweak).map_err(|_| ())?;
79+
}
80+
Ok(SharedSecret::new(other_key, &node_secret))
81+
}
82+
83+
fn get_inbound_payment_key_material(&self) -> KeyMaterial { unreachable!() }
84+
85+
fn get_destination_script(&self) -> Script { unreachable!() }
86+
87+
fn get_shutdown_scriptpubkey(&self) -> ShutdownScript { unreachable!() }
88+
89+
fn get_channel_signer(&self, _inbound: bool, _channel_value_satoshis: u64) -> EnforcingSigner {
90+
unreachable!()
91+
}
92+
93+
fn get_secure_random_bytes(&self) -> [u8; 32] {
94+
let ctr = self.counter.fetch_add(1, Ordering::Relaxed);
95+
[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
96+
(ctr >> 8*7) as u8, (ctr >> 8*6) as u8, (ctr >> 8*5) as u8, (ctr >> 8*4) as u8, (ctr >> 8*3) as u8, (ctr >> 8*2) as u8, (ctr >> 8*1) as u8, 14, (ctr >> 8*0) as u8]
97+
}
98+
99+
fn read_chan_signer(&self, _data: &[u8]) -> Result<EnforcingSigner, DecodeError> { unreachable!() }
100+
101+
fn sign_invoice(&self, _hrp_bytes: &[u8], _invoice_data: &[u5], _recipient: Recipient) -> Result<RecoverableSignature, ()> {
102+
unreachable!()
103+
}
104+
}

fuzz/targets.h

+1
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,7 @@
22
void chanmon_deser_run(const unsigned char* data, size_t data_len);
33
void chanmon_consistency_run(const unsigned char* data, size_t data_len);
44
void full_stack_run(const unsigned char* data, size_t data_len);
5+
void onion_message_run(const unsigned char* data, size_t data_len);
56
void peer_crypt_run(const unsigned char* data, size_t data_len);
67
void process_network_graph_run(const unsigned char* data, size_t data_len);
78
void router_run(const unsigned char* data, size_t data_len);

lightning/src/lib.rs

+3
Original file line numberDiff line numberDiff line change
@@ -76,6 +76,9 @@ pub mod util;
7676
pub mod chain;
7777
pub mod ln;
7878
pub mod routing;
79+
#[cfg(fuzzing)]
80+
pub mod onion_message;
81+
#[cfg(not(fuzzing))]
7982
#[allow(unused)]
8083
mod onion_message; // To be exposed after sending/receiving OMs is supported in PeerManager.
8184

0 commit comments

Comments
 (0)