-
Notifications
You must be signed in to change notification settings - Fork 409
Remove get_node_secret from NodeSigner #1951
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
f3a6ca4
aee9952
db0d6ec
19c4468
9133bea
acd2ae6
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -26,6 +26,7 @@ use bitcoin::network::constants::Network; | |
use bitcoin::hashes::Hash as TraitImport; | ||
use bitcoin::hashes::HashEngine as TraitImportEngine; | ||
use bitcoin::hashes::sha256::Hash as Sha256; | ||
use bitcoin::hashes::sha256d::Hash as Sha256dHash; | ||
use bitcoin::hash_types::{Txid, BlockHash, WPubkeyHash}; | ||
|
||
use lightning::chain; | ||
|
@@ -47,15 +48,14 @@ use lightning::util::errors::APIError; | |
use lightning::util::events::Event; | ||
use lightning::util::enforcing_trait_impls::{EnforcingSigner, EnforcementState}; | ||
use lightning::util::logger::Logger; | ||
use lightning::util::ser::ReadableArgs; | ||
use lightning::util::ser::{Readable, Writeable}; | ||
|
||
use crate::utils::test_logger; | ||
use crate::utils::test_persister::TestPersister; | ||
|
||
use bitcoin::secp256k1::{PublicKey, SecretKey, Scalar}; | ||
use bitcoin::secp256k1::{Message, PublicKey, SecretKey, Scalar, Secp256k1}; | ||
use bitcoin::secp256k1::ecdh::SharedSecret; | ||
use bitcoin::secp256k1::ecdsa::RecoverableSignature; | ||
use bitcoin::secp256k1::Secp256k1; | ||
use bitcoin::secp256k1::ecdsa::{RecoverableSignature, Signature}; | ||
|
||
use std::cell::RefCell; | ||
use hashbrown::{HashMap, hash_map}; | ||
|
@@ -183,7 +183,7 @@ impl<'a> std::hash::Hash for Peer<'a> { | |
type ChannelMan<'a> = ChannelManager< | ||
Arc<chainmonitor::ChainMonitor<EnforcingSigner, Arc<dyn chain::Filter>, Arc<TestBroadcaster>, Arc<FuzzEstimator>, Arc<dyn Logger>, Arc<TestPersister>>>, | ||
Arc<TestBroadcaster>, Arc<KeyProvider>, Arc<KeyProvider>, Arc<KeyProvider>, Arc<FuzzEstimator>, &'a FuzzRouter, Arc<dyn Logger>>; | ||
type PeerMan<'a> = PeerManager<Peer<'a>, Arc<ChannelMan<'a>>, Arc<P2PGossipSync<Arc<NetworkGraph<Arc<dyn Logger>>>, Arc<dyn chain::Access>, Arc<dyn Logger>>>, IgnoringMessageHandler, Arc<dyn Logger>, IgnoringMessageHandler>; | ||
type PeerMan<'a> = PeerManager<Peer<'a>, Arc<ChannelMan<'a>>, Arc<P2PGossipSync<Arc<NetworkGraph<Arc<dyn Logger>>>, Arc<dyn chain::Access>, Arc<dyn Logger>>>, IgnoringMessageHandler, Arc<dyn Logger>, IgnoringMessageHandler, Arc<KeyProvider>>; | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. this technically has nothing to do with this PR and I know that this is just a fuzz test, but There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. It's just a peer, man. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
|
||
|
||
struct MoneyLossDetector<'a> { | ||
manager: Arc<ChannelMan<'a>>, | ||
|
@@ -293,19 +293,21 @@ impl EntropySource for KeyProvider { | |
} | ||
|
||
impl NodeSigner for KeyProvider { | ||
fn get_node_secret(&self, _recipient: Recipient) -> Result<SecretKey, ()> { | ||
Ok(self.node_secret.clone()) | ||
} | ||
|
||
fn get_node_id(&self, recipient: Recipient) -> Result<PublicKey, ()> { | ||
let secp_ctx = Secp256k1::signing_only(); | ||
Ok(PublicKey::from_secret_key(&secp_ctx, &self.get_node_secret(recipient)?)) | ||
let node_secret = match recipient { | ||
Recipient::Node => Ok(&self.node_secret), | ||
Recipient::PhantomNode => Err(()) | ||
}?; | ||
Ok(PublicKey::from_secret_key(&Secp256k1::signing_only(), node_secret)) | ||
} | ||
|
||
fn ecdh(&self, recipient: Recipient, other_key: &PublicKey, tweak: Option<&Scalar>) -> Result<SharedSecret, ()> { | ||
let mut node_secret = self.get_node_secret(recipient)?; | ||
let mut node_secret = match recipient { | ||
Recipient::Node => Ok(self.node_secret.clone()), | ||
Recipient::PhantomNode => Err(()) | ||
}?; | ||
if let Some(tweak) = tweak { | ||
node_secret = node_secret.mul_tweak(tweak).unwrap(); | ||
node_secret = node_secret.mul_tweak(tweak).map_err(|_| ())?; | ||
} | ||
Ok(SharedSecret::new(other_key, &node_secret)) | ||
} | ||
|
@@ -317,6 +319,12 @@ impl NodeSigner for KeyProvider { | |
fn sign_invoice(&self, _hrp_bytes: &[u8], _invoice_data: &[u5], _recipient: Recipient) -> Result<RecoverableSignature, ()> { | ||
unreachable!() | ||
} | ||
|
||
fn sign_gossip_message(&self, msg: lightning::ln::msgs::UnsignedGossipMessage) -> Result<Signature, ()> { | ||
let msg_hash = Message::from_slice(&Sha256dHash::hash(&msg.encode()[..])[..]).map_err(|_| ())?; | ||
let secp_ctx = Secp256k1::signing_only(); | ||
Ok(secp_ctx.sign_ecdsa(&msg_hash, &self.node_secret)) | ||
} | ||
} | ||
|
||
impl SignerProvider for KeyProvider { | ||
|
@@ -335,7 +343,6 @@ impl SignerProvider for KeyProvider { | |
EnforcingSigner::new_with_revoked(if inbound { | ||
InMemorySigner::new( | ||
&secp_ctx, | ||
self.node_secret.clone(), | ||
SecretKey::from_slice(&[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, ctr]).unwrap(), | ||
SecretKey::from_slice(&[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2, ctr]).unwrap(), | ||
SecretKey::from_slice(&[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 3, ctr]).unwrap(), | ||
|
@@ -348,7 +355,6 @@ impl SignerProvider for KeyProvider { | |
} else { | ||
InMemorySigner::new( | ||
&secp_ctx, | ||
self.node_secret.clone(), | ||
SecretKey::from_slice(&[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 7, ctr]).unwrap(), | ||
SecretKey::from_slice(&[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 8, ctr]).unwrap(), | ||
SecretKey::from_slice(&[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 9, ctr]).unwrap(), | ||
|
@@ -362,7 +368,7 @@ impl SignerProvider for KeyProvider { | |
} | ||
|
||
fn read_chan_signer(&self, mut data: &[u8]) -> Result<EnforcingSigner, DecodeError> { | ||
let inner: InMemorySigner = ReadableArgs::read(&mut data, self.node_secret.clone())?; | ||
let inner: InMemorySigner = Readable::read(&mut data)?; | ||
let state = Arc::new(Mutex::new(EnforcementState::new())); | ||
|
||
Ok(EnforcingSigner::new_with_revoked( | ||
|
@@ -446,7 +452,7 @@ pub fn do_test(data: &[u8], logger: &Arc<dyn Logger>) { | |
// keys subsequently generated in this test. Rather than regenerating all the messages manually, | ||
// it's easier to just increment the counter here so the keys don't change. | ||
keys_manager.counter.fetch_sub(3, Ordering::AcqRel); | ||
let our_id = PublicKey::from_secret_key(&Secp256k1::signing_only(), &keys_manager.get_node_secret(Recipient::Node).unwrap()); | ||
let our_id = &keys_manager.get_node_id(Recipient::Node).unwrap(); | ||
let network_graph = Arc::new(NetworkGraph::new(genesis_block(network).block_hash(), Arc::clone(&logger))); | ||
let gossip_sync = Arc::new(P2PGossipSync::new(Arc::clone(&network_graph), None, Arc::clone(&logger))); | ||
let scorer = FixedPenaltyScorer::with_penalty(0); | ||
|
@@ -456,7 +462,7 @@ pub fn do_test(data: &[u8], logger: &Arc<dyn Logger>) { | |
chan_handler: channelmanager.clone(), | ||
route_handler: gossip_sync.clone(), | ||
onion_message_handler: IgnoringMessageHandler {}, | ||
}, our_network_key, 0, &[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 15, 0], Arc::clone(&logger), IgnoringMessageHandler{})); | ||
}, 0, &[0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 15, 0], Arc::clone(&logger), IgnoringMessageHandler{}, keys_manager.clone())); | ||
|
||
let mut should_forward = false; | ||
let mut payments_received: Vec<PaymentHash> = Vec::new(); | ||
|
Uh oh!
There was an error while loading. Please reload this page.