7
7
// You may not use this file except in accordance with one or both of these
8
8
// licenses.
9
9
10
- use lightning:: ln:: peer_channel_encryptor:: { PeerChannelEncryptor , MessageBuf } ;
10
+ use lightning:: ln:: peer_channel_encryptor:: { MessageBuf , PeerChannelEncryptor } ;
11
11
use lightning:: util:: test_utils:: TestNodeSigner ;
12
12
13
- use bitcoin:: secp256k1:: { Secp256k1 , PublicKey , SecretKey } ;
13
+ use bitcoin:: secp256k1:: { PublicKey , Secp256k1 , SecretKey } ;
14
14
15
15
use crate :: utils:: test_logger;
16
16
17
17
#[ inline]
18
18
fn slice_to_be16 ( v : & [ u8 ] ) -> u16 {
19
- ( ( v[ 0 ] as u16 ) << 8 * 1 ) |
20
- ( ( v[ 1 ] as u16 ) << 8 * 0 )
19
+ ( ( v[ 0 ] as u16 ) << 8 * 1 ) | ( ( v[ 1 ] as u16 ) << 8 * 0 )
21
20
}
22
21
23
22
#[ inline]
24
23
pub fn do_test ( data : & [ u8 ] ) {
25
24
let mut read_pos = 0 ;
26
25
macro_rules! get_slice {
27
- ( $len: expr) => {
28
- {
29
- let slice_len = $len as usize ;
30
- if data. len( ) < read_pos + slice_len {
31
- return ;
32
- }
33
- read_pos += slice_len;
34
- & data[ read_pos - slice_len..read_pos]
26
+ ( $len: expr) => { {
27
+ let slice_len = $len as usize ;
28
+ if data. len( ) < read_pos + slice_len {
29
+ return ;
35
30
}
36
- }
31
+ read_pos += slice_len;
32
+ & data[ read_pos - slice_len..read_pos]
33
+ } } ;
37
34
}
38
35
39
36
let secp_ctx = Secp256k1 :: signing_only ( ) ;
@@ -63,7 +60,12 @@ pub fn do_test(data: &[u8]) {
63
60
crypter
64
61
} else {
65
62
let mut crypter = PeerChannelEncryptor :: new_inbound ( & & node_signer) ;
66
- match crypter. process_act_one_with_keys ( get_slice ! ( 50 ) , & & node_signer, ephemeral_key, & secp_ctx) {
63
+ match crypter. process_act_one_with_keys (
64
+ get_slice ! ( 50 ) ,
65
+ & & node_signer,
66
+ ephemeral_key,
67
+ & secp_ctx,
68
+ ) {
67
69
Ok ( _) => { } ,
68
70
Err ( _) => return ,
69
71
}
@@ -77,9 +79,11 @@ pub fn do_test(data: &[u8]) {
77
79
let mut buf = [ 0 ; 65536 + 16 ] ;
78
80
loop {
79
81
if get_slice ! ( 1 ) [ 0 ] == 0 {
80
- crypter. encrypt_buffer ( MessageBuf :: from_encoded ( & get_slice ! ( slice_to_be16( get_slice!( 2 ) ) ) ) ) ;
82
+ crypter. encrypt_buffer ( MessageBuf :: from_encoded ( & get_slice ! ( slice_to_be16(
83
+ get_slice!( 2 )
84
+ ) ) ) ) ;
81
85
} else {
82
- let len = match crypter. decrypt_length_header ( get_slice ! ( 16 + 2 ) ) {
86
+ let len = match crypter. decrypt_length_header ( get_slice ! ( 16 + 2 ) ) {
83
87
Ok ( len) => len,
84
88
Err ( _) => return ,
85
89
} ;
0 commit comments