1use chacha20::{
83 cipher::{KeyIvInit as _, StreamCipher},
84 ChaCha20,
85};
86use hmac::{Hmac, Mac as _};
87use secp256k1::{
88 ecdh::SharedSecret, PublicKey, Scalar, Secp256k1, SecretKey, Signing, Verification,
89};
90use sha2::{Digest as _, Sha256};
91use thiserror::Error;
92
93const HMAC_KEY_RHO: &[u8] = b"rho";
94const HMAC_KEY_MU: &[u8] = b"mu";
95const HMAC_KEY_PAD: &[u8] = b"pad";
96const HMAC_KEY_UM: &[u8] = b"um";
97const HMAC_KEY_AMMAG: &[u8] = b"ammag";
98const CHACHA_NONCE: [u8; 12] = [0u8; 12];
99
100#[derive(Debug, Clone, Eq, PartialEq)]
102pub struct OnionPacket {
103 pub version: u8,
105 pub public_key: PublicKey,
107 pub packet_data: Vec<u8>,
109 pub hmac: [u8; 32],
111}
112
113#[derive(Debug, Clone, Eq, PartialEq)]
139pub struct OnionErrorPacket {
140 pub packet_data: Vec<u8>,
142}
143
144impl OnionPacket {
145 pub fn create<C: Signing>(
158 session_key: SecretKey,
159 hops_path: Vec<PublicKey>,
160 hops_data: Vec<Vec<u8>>,
161 assoc_data: Option<Vec<u8>>,
162 packet_data_len: usize,
163 secp_ctx: &Secp256k1<C>,
164 ) -> Result<OnionPacket, SphinxError> {
165 if hops_path.len() != hops_data.len() {
166 return Err(SphinxError::HopsLenMismatch);
167 }
168 if hops_path.is_empty() {
169 return Err(SphinxError::HopsIsEmpty);
170 }
171
172 let hops_keys = derive_hops_forward_keys(&hops_path, session_key, secp_ctx);
173 let pad_key = derive_key(HMAC_KEY_PAD, &session_key.secret_bytes());
174 let packet_data = generate_padding_data(packet_data_len, &pad_key);
175 let filler = generate_filler(packet_data_len, &hops_keys, &hops_data)?;
176
177 construct_onion_packet(
178 packet_data,
179 session_key.public_key(secp_ctx),
180 &hops_keys,
181 &hops_data,
182 assoc_data,
183 filler,
184 )
185 }
186
187 pub fn into_bytes(self) -> Vec<u8> {
189 let mut bytes = Vec::with_capacity(1 + 33 + self.packet_data.len() + 32);
190 bytes.push(self.version);
191 bytes.extend_from_slice(&self.public_key.serialize());
192 bytes.extend_from_slice(&self.packet_data);
193 bytes.extend_from_slice(&self.hmac);
194 bytes
195 }
196
197 pub fn from_bytes(bytes: Vec<u8>) -> Result<Self, SphinxError> {
199 if bytes.len() < 66 {
200 return Err(SphinxError::PacketDataLenTooSmall);
201 }
202 let version = bytes[0];
203 let public_key =
204 PublicKey::from_slice(&bytes[1..34]).map_err(|_| SphinxError::PublicKeyInvalid)?;
205 let packet_data = (&bytes[34..(bytes.len() - 32)]).into();
206 let mut hmac = [0u8; 32];
207 hmac.copy_from_slice(&bytes[(bytes.len() - 32)..]);
208
209 Ok(Self {
210 version,
211 public_key,
212 packet_data,
213 hmac,
214 })
215 }
216
217 pub fn extract_public_key_from_slice(bytes: &[u8]) -> Result<PublicKey, SphinxError> {
218 if bytes.len() < 66 {
219 return Err(SphinxError::PacketDataLenTooSmall);
220 }
221 PublicKey::from_slice(&bytes[1..34]).map_err(|_| SphinxError::PublicKeyInvalid)
222 }
223
224 pub fn shared_secret(&self, secret_key: &SecretKey) -> [u8; 32] {
226 SharedSecret::new(&self.public_key, secret_key).secret_bytes()
227 }
228
229 pub fn peel<C, F>(
238 self,
239 secret_key: &SecretKey,
240 assoc_data: Option<&[u8]>,
241 secp_ctx: &Secp256k1<C>,
242 get_hop_data_len: F,
243 ) -> Result<(Vec<u8>, Self), SphinxError>
244 where
245 C: Verification,
246 F: FnOnce(&[u8]) -> Option<usize>,
247 {
248 let packet_data_len = self.packet_data.len();
249 let shared_secret = self.shared_secret(secret_key);
250 let rho = derive_key(HMAC_KEY_RHO, shared_secret.as_ref());
251 let mu = derive_key(HMAC_KEY_MU, shared_secret.as_ref());
252
253 let expected_hmac = compute_hmac(&mu, &self.packet_data, assoc_data);
254
255 if expected_hmac != self.hmac {
257 return Err(SphinxError::HmacMismatch);
258 }
259
260 let mut chacha = ChaCha20::new(&rho.into(), &CHACHA_NONCE.into());
261 let mut packet_data = self.packet_data;
262 chacha.apply_keystream(&mut packet_data[..]);
263
264 let data_len = get_hop_data_len(&packet_data).ok_or(SphinxError::HopDataLenUnavailable)?;
266 if data_len > packet_data_len {
267 return Err(SphinxError::HopDataLenTooLarge);
268 }
269 let hop_data = (&packet_data[0..data_len]).to_vec();
270 let mut hmac = [0; 32];
271 hmac.copy_from_slice(&packet_data[data_len..(data_len + 32)]);
272 shift_slice_left(&mut packet_data[..], data_len + 32);
273 chacha.apply_keystream(&mut packet_data[(packet_data_len - data_len - 32)..]);
275
276 let public_key =
277 derive_next_hop_ephemeral_public_key(self.public_key, shared_secret.as_ref(), secp_ctx);
278
279 Ok((
280 hop_data,
281 OnionPacket {
282 version: self.version,
283 public_key,
284 packet_data,
285 hmac,
286 },
287 ))
288 }
289}
290
291impl OnionErrorPacket {
292 pub fn create(shared_secret: &[u8; 32], payload: Vec<u8>) -> Self {
299 let ReturnKeys { ammag, um } = ReturnKeys::new(shared_secret);
300 let hmac = compute_hmac(&um, &payload, None);
301 Self::concat(hmac, payload).xor_cipher_stream_with_ammag(ammag)
302 }
303
304 pub fn concat(hmac: [u8; 32], mut payload: Vec<u8>) -> Self {
306 let mut packet_data = hmac.to_vec();
307 packet_data.append(&mut payload);
308 OnionErrorPacket { packet_data }
309 }
310
311 fn xor_cipher_stream_with_ammag(self, ammag: [u8; 32]) -> Self {
312 let mut chacha = ChaCha20::new(&ammag.into(), &CHACHA_NONCE.into());
313 let mut packet_data = self.packet_data;
314 chacha.apply_keystream(&mut packet_data[..]);
315
316 Self { packet_data }
317 }
318
319 pub fn xor_cipher_stream(self, shared_secret: &[u8; 32]) -> Self {
323 let ammag = derive_ammag_key(shared_secret);
324 self.xor_cipher_stream_with_ammag(ammag)
325 }
326
327 pub fn parse<F, T>(
340 self,
341 hops_path: Vec<PublicKey>,
342 session_key: SecretKey,
343 parse_payload: F,
344 ) -> Option<(T, usize)>
345 where
346 F: Fn(&[u8]) -> Option<T>,
347 {
348 if self.packet_data.len() < 32 {
350 return None;
351 }
352
353 let secp_ctx = Secp256k1::new();
354 let mut packet = self;
355 for (index, shared_secret) in
356 OnionSharedSecretIter::new(hops_path.iter(), session_key, &secp_ctx).enumerate()
357 {
358 let ReturnKeys { ammag, um } = ReturnKeys::new(&shared_secret);
359 packet = packet.xor_cipher_stream_with_ammag(ammag);
360 if let Some(error) = parse_payload(&packet.packet_data[32..]) {
361 let hmac = compute_hmac(&um, &packet.packet_data[32..], None);
362 if hmac == packet.packet_data[..32] {
363 return Some((error, index));
364 }
365 }
366 }
367
368 None
369 }
370
371 pub fn split(self) -> ([u8; 32], Vec<u8>) {
373 let mut hmac = [0u8; 32];
374 if self.packet_data.len() >= 32 {
375 hmac.copy_from_slice(&self.packet_data[..32]);
376 let payload = self.packet_data[32..].to_vec();
377 (hmac, payload)
378 } else {
379 hmac.copy_from_slice(&self.packet_data[..]);
380 (hmac, Vec::new())
381 }
382 }
383
384 pub fn into_bytes(self) -> Vec<u8> {
386 self.packet_data
387 }
388
389 pub fn from_bytes(bytes: Vec<u8>) -> Self {
390 Self { packet_data: bytes }
391 }
392}
393
394#[derive(Error, Debug, Eq, PartialEq)]
395pub enum SphinxError {
396 #[error("The hops path does not match the hops data length")]
397 HopsLenMismatch,
398
399 #[error("The hops path is empty")]
400 HopsIsEmpty,
401
402 #[error("The HMAC does not match the packet data and optional assoc data")]
403 HmacMismatch,
404
405 #[error("Unable to parse the data len for the current hop")]
406 HopDataLenUnavailable,
407
408 #[error("The parsed data len is larger than the onion packet len")]
409 HopDataLenTooLarge,
410
411 #[error("The parsed data len is too small")]
412 PacketDataLenTooSmall,
413
414 #[error("Invalid public key")]
415 PublicKeyInvalid,
416}
417
418#[derive(Debug, Clone, Eq, PartialEq)]
420pub struct ForwardKeys {
421 pub rho: [u8; 32],
423 pub mu: [u8; 32],
425}
426
427impl ForwardKeys {
428 pub fn new(shared_secret: &[u8]) -> ForwardKeys {
430 ForwardKeys {
431 rho: derive_key(HMAC_KEY_RHO, shared_secret),
432 mu: derive_key(HMAC_KEY_MU, shared_secret),
433 }
434 }
435}
436
437#[derive(Debug, Clone, Eq, PartialEq)]
439pub struct ReturnKeys {
440 pub ammag: [u8; 32],
442 pub um: [u8; 32],
444}
445
446impl ReturnKeys {
447 pub fn new(shared_secret: &[u8]) -> ReturnKeys {
449 ReturnKeys {
450 ammag: derive_ammag_key(shared_secret),
451 um: derive_key(HMAC_KEY_UM, shared_secret),
452 }
453 }
454}
455
456#[inline]
457pub fn derive_ammag_key(shared_secret: &[u8]) -> [u8; 32] {
458 derive_key(HMAC_KEY_AMMAG, shared_secret)
459}
460
461#[derive(Clone)]
481pub struct OnionSharedSecretIter<'s, I, C: Signing> {
482 hops_path_iter: I,
484 ephemeral_secret_key: SecretKey,
485 secp_ctx: &'s Secp256k1<C>,
486}
487
488impl<'s, I, C: Signing> OnionSharedSecretIter<'s, I, C> {
489 pub fn new(
495 hops_path_iter: I,
496 session_key: SecretKey,
497 secp_ctx: &'s Secp256k1<C>,
498 ) -> OnionSharedSecretIter<I, C> {
499 OnionSharedSecretIter {
500 hops_path_iter,
501 secp_ctx,
502 ephemeral_secret_key: session_key,
503 }
504 }
505}
506
507impl<'s, 'i, I: Iterator<Item = &'i PublicKey>, C: Signing> Iterator
508 for OnionSharedSecretIter<'s, I, C>
509{
510 type Item = [u8; 32];
511
512 fn next(&mut self) -> Option<Self::Item> {
513 self.hops_path_iter.next().map(|pk| {
514 let shared_secret = SharedSecret::new(&pk, &self.ephemeral_secret_key);
515
516 let ephemeral_public_key = self.ephemeral_secret_key.public_key(self.secp_ctx);
517 self.ephemeral_secret_key = derive_next_hop_ephemeral_secret_key(
518 self.ephemeral_secret_key,
519 &ephemeral_public_key,
520 shared_secret.as_ref(),
521 );
522
523 shared_secret.secret_bytes()
524 })
525 }
526}
527
528fn derive_hops_forward_keys<C: Signing>(
530 hops_path: &Vec<PublicKey>,
531 session_key: SecretKey,
532 secp_ctx: &Secp256k1<C>,
533) -> Vec<ForwardKeys> {
534 OnionSharedSecretIter::new(hops_path.iter(), session_key, secp_ctx)
535 .map(|shared_secret| ForwardKeys::new(&shared_secret))
536 .collect()
537}
538
539#[inline]
540fn shift_slice_right(arr: &mut [u8], amt: usize) {
541 for i in (amt..arr.len()).rev() {
542 arr[i] = arr[i - amt];
543 }
544 for i in 0..amt {
545 arr[i] = 0;
546 }
547}
548
549#[inline]
550fn shift_slice_left(arr: &mut [u8], amt: usize) {
551 let pivot = arr.len() - amt;
552 for i in 0..pivot {
553 arr[i] = arr[i + amt];
554 }
555 for i in pivot..arr.len() {
556 arr[i] = 0;
557 }
558}
559
560fn compute_hmac(hmac_key: &[u8; 32], packet_data: &[u8], assoc_data: Option<&[u8]>) -> [u8; 32] {
562 let mut hmac_engine = Hmac::<Sha256>::new_from_slice(hmac_key).expect("valid hmac key");
563 hmac_engine.update(&packet_data);
564 if let Some(ref assoc_data) = assoc_data {
565 hmac_engine.update(assoc_data);
566 }
567 hmac_engine.finalize().into_bytes().into()
568}
569
570fn forward_stream_cipher<S: StreamCipher>(stream: &mut S, n: usize) {
572 for _ in 0..n {
573 let mut dummy = [0; 1];
574 stream.apply_keystream(&mut dummy);
575 }
576}
577
578fn derive_next_hop_ephemeral_secret_key(
592 ephemeral_secret_key: SecretKey,
593 ephemeral_public_key: &PublicKey,
594 shared_secret: &[u8],
595) -> SecretKey {
596 let blinding_factor: [u8; 32] = {
597 let mut sha = Sha256::new();
598 sha.update(&ephemeral_public_key.serialize()[..]);
599 sha.update(shared_secret.as_ref());
600 sha.finalize().into()
601 };
602
603 ephemeral_secret_key
604 .mul_tweak(&Scalar::from_be_bytes(blinding_factor).expect("valid scalar"))
605 .expect("valid mul tweak")
606}
607
608fn derive_next_hop_ephemeral_public_key<C: Verification>(
612 ephemeral_public_key: PublicKey,
613 shared_secret: &[u8],
614 secp_ctx: &Secp256k1<C>,
615) -> PublicKey {
616 let blinding_factor: [u8; 32] = {
617 let mut sha = Sha256::new();
618 sha.update(&ephemeral_public_key.serialize()[..]);
619 sha.update(shared_secret.as_ref());
620 sha.finalize().into()
621 };
622
623 ephemeral_public_key
624 .mul_tweak(
625 secp_ctx,
626 &Scalar::from_be_bytes(blinding_factor).expect("valid scalar"),
627 )
628 .expect("valid mul tweak")
629}
630
631fn derive_key(hmac_key: &[u8], shared_secret: &[u8]) -> [u8; 32] {
633 let mut mac = Hmac::<Sha256>::new_from_slice(hmac_key).expect("valid hmac key");
634 mac.update(shared_secret);
635 mac.finalize().into_bytes().into()
636}
637
638fn generate_padding_data(packet_data_len: usize, pad_key: &[u8]) -> Vec<u8> {
642 let mut cipher = ChaCha20::new(pad_key.into(), &CHACHA_NONCE.into());
643 let mut buffer = vec![0u8; packet_data_len];
644 cipher.apply_keystream(&mut buffer);
645 buffer
646}
647
648fn generate_filler(
650 packet_data_len: usize,
651 hops_keys: &[ForwardKeys],
652 hops_data: &[Vec<u8>],
653) -> Result<Vec<u8>, SphinxError> {
654 let mut filler = Vec::new();
655 let mut pos = 0;
656
657 for (i, (data, keys)) in hops_data.iter().zip(hops_keys.iter()).enumerate() {
658 let mut chacha = ChaCha20::new(&keys.rho.into(), &[0u8; 12].into());
659 forward_stream_cipher(&mut chacha, packet_data_len - pos);
660
661 pos += data.len() + 32;
663 if pos > packet_data_len {
664 return Err(SphinxError::HopDataLenTooLarge);
665 }
666
667 if i == hops_data.len() - 1 {
668 break;
669 }
670
671 filler.resize(pos, 0u8);
672 chacha.apply_keystream(&mut filler);
673 }
674
675 Ok(filler)
676}
677
678fn construct_onion_packet(
688 mut packet_data: Vec<u8>,
689 public_key: PublicKey,
690 hops_keys: &[ForwardKeys],
691 hops_data: &[Vec<u8>],
692 assoc_data: Option<Vec<u8>>,
693 filler: Vec<u8>,
694) -> Result<OnionPacket, SphinxError> {
695 let mut hmac = [0; 32];
696
697 for (i, (data, keys)) in hops_data.iter().zip(hops_keys.iter()).rev().enumerate() {
698 let data_len = data.len();
699 shift_slice_right(&mut packet_data, data_len + 32);
700 packet_data[0..data_len].copy_from_slice(&data);
701 packet_data[data_len..(data_len + 32)].copy_from_slice(&hmac);
702
703 let mut chacha = ChaCha20::new(&keys.rho.into(), &[0u8; 12].into());
704 chacha.apply_keystream(&mut packet_data);
705
706 if i == 0 {
707 let stop_index = packet_data.len();
708 let start_index = stop_index
709 .checked_sub(filler.len())
710 .ok_or(SphinxError::HopDataLenTooLarge)?;
711 packet_data[start_index..stop_index].copy_from_slice(&filler[..]);
712 }
713
714 hmac = compute_hmac(&keys.mu, &packet_data, assoc_data.as_deref());
715 }
716
717 Ok(OnionPacket {
718 version: 0,
719 public_key,
720 packet_data,
721 hmac,
722 })
723}
724
725#[cfg(test)]
726mod tests {
727 use super::*;
728 use hex_conservative::prelude::*;
729 use std::str::FromStr;
730 const PACKET_DATA_LEN: usize = 1300;
731
732 fn get_test_session_key() -> SecretKey {
733 SecretKey::from_slice(&[0x41; 32]).expect("32 bytes, within curve order")
734 }
735
736 fn get_test_hops_path() -> Vec<PublicKey> {
737 vec![
738 "02eec7245d6b7d2ccb30380bfbe2a3648cd7a942653f5aa340edcea1f283686619",
739 "0324653eac434488002cc06bbfb7f10fe18991e35f9fe4302dbea6d2353dc0ab1c",
740 "027f31ebc5462c1fdce1b737ecff52d37d75dea43ce11c74d25aa297165faa2007",
741 "032c0b7cf95324a07d05398b240174dc0c2be444d96b159aa6c7f7b1e668680991",
742 "02edabbd16b41c8371b92ef2f04c1185b4f03b6dcd52ba9b78d9d7c89c8f221145",
743 ]
744 .into_iter()
745 .map(|pk| PublicKey::from_str(pk).expect("33 bytes, valid pubkey"))
746 .collect()
747 }
748
749 fn get_test_hops_data() -> Vec<Vec<u8>> {
750 vec![
751 Vec::from_hex("1202023a98040205dc06080000000000000001").unwrap(),
752 Vec::from_hex("52020236b00402057806080000000000000002fd02013c0102030405060708090a0b0c0d0e0f0102030405060708090a0b0c0d0e0f0102030405060708090a0b0c0d0e0f0102030405060708090a0b0c0d0e0f").unwrap(),
753 Vec::from_hex("12020230d4040204e206080000000000000003").unwrap(),
754 Vec::from_hex("1202022710040203e806080000000000000004").unwrap(),
755 Vec::from_hex("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").unwrap(),
756 ]
757 }
758
759 #[test]
760 fn test_onion_packet_from_bytes() {
761 let public_key = PublicKey::from_slice(
762 Vec::from_hex("02eec7245d6b7d2ccb30380bfbe2a3648cd7a942653f5aa340edcea1f283686619")
763 .expect("valid hex")
764 .as_ref(),
765 )
766 .expect("valid public key");
767 let packet = OnionPacket {
768 version: 1,
769 public_key,
770 packet_data: vec![2],
771 hmac: [3; 32],
772 };
773 let packet_from_bytes_res = OnionPacket::from_bytes(packet.clone().into_bytes());
774 assert!(packet_from_bytes_res.is_ok());
775 let packet_from_bytes = packet_from_bytes_res.unwrap();
776 assert_eq!(packet_from_bytes, packet);
777 }
778
779 #[test]
780 fn test_derive_hops_keys() {
781 let hops_path = get_test_hops_path();
782 let session_key = get_test_session_key();
783 let hops_keys = derive_hops_forward_keys(&hops_path, session_key, &Secp256k1::new());
784
785 assert_eq!(hops_keys.len(), 5);
786
787 assert_eq!(
789 hops_keys[0].rho.to_lower_hex_string(),
790 "ce496ec94def95aadd4bec15cdb41a740c9f2b62347c4917325fcc6fb0453986",
791 );
792 assert_eq!(
793 hops_keys[0].mu.to_lower_hex_string(),
794 "b57061dc6d0a2b9f261ac410c8b26d64ac5506cbba30267a649c28c179400eba",
795 );
796
797 assert_eq!(
799 hops_keys[1].rho.to_lower_hex_string(),
800 "450ffcabc6449094918ebe13d4f03e433d20a3d28a768203337bc40b6e4b2c59",
801 );
802 assert_eq!(
803 hops_keys[1].mu.to_lower_hex_string(),
804 "05ed2b4a3fb023c2ff5dd6ed4b9b6ea7383f5cfe9d59c11d121ec2c81ca2eea9",
805 );
806
807 assert_eq!(
809 hops_keys[2].rho.to_lower_hex_string(),
810 "11bf5c4f960239cb37833936aa3d02cea82c0f39fd35f566109c41f9eac8deea",
811 );
812 assert_eq!(
813 hops_keys[2].mu.to_lower_hex_string(),
814 "caafe2820fa00eb2eeb78695ae452eba38f5a53ed6d53518c5c6edf76f3f5b78",
815 );
816
817 assert_eq!(
819 hops_keys[3].rho.to_lower_hex_string(),
820 "cbe784ab745c13ff5cffc2fbe3e84424aa0fd669b8ead4ee562901a4a4e89e9e",
821 );
822 assert_eq!(
823 hops_keys[3].mu.to_lower_hex_string(),
824 "5052aa1b3d9f0655a0932e50d42f0c9ba0705142c25d225515c45f47c0036ee9",
825 );
826
827 assert_eq!(
829 hops_keys[4].rho.to_lower_hex_string(),
830 "034e18b8cc718e8af6339106e706c52d8df89e2b1f7e9142d996acf88df8799b",
831 );
832 assert_eq!(
833 hops_keys[4].mu.to_lower_hex_string(),
834 "8e45e5c61c2b24cb6382444db6698727afb063adecd72aada233d4bf273d975a",
835 );
836 }
837
838 #[test]
839 fn test_derive_pad_key() {
840 let session_key = get_test_session_key();
841 let pad_key = derive_key(b"pad", &session_key.secret_bytes());
842 assert_eq!(
843 pad_key.to_lower_hex_string(),
844 "70fa47d28edc4faf3e733ae0f4d2a12b8c5f09cbd74408eb7bc6ba2f1ebf88a2",
845 );
846 }
847
848 #[test]
849 fn test_generate_padding_data() {
850 let pad_key = <[u8; 32]>::from_hex(
851 "70fa47d28edc4faf3e733ae0f4d2a12b8c5f09cbd74408eb7bc6ba2f1ebf88a2",
852 )
853 .unwrap();
854 let padding = generate_padding_data(PACKET_DATA_LEN, &pad_key);
855 let expected_hex = "77b5a170c57c6ff643fd6f46f5537c2fec4c5258f89fafbd722f9041f1cead9b2ab563384bc052ab9179e7d97defbee5324b29d5655f6816916310c4f08b69ad20a51ad7ffa2e07f5b28c30a2b3175adbf8d249c1fa55b02daa7c463eaf4b843ff9567afec9ef70cfc1d84ef29a802d1755c3cc6d04536744a71aa94a2419a6b5501ee8a8209191c1f43b357442a5c0847140db9c907bb2a325c414bfd1e72b1867526b071f96d718c176ff52894b45d1480149ad5d36614fb68b043d23aeb2806344832e8f925ed5428866912f4f1e7203ec73ec37fbb581e36b25fadc42bb4a5acf50d7ef1139a8482c7588bbfdfe5bde63ccb13b54d4368a4891e9c6c876814f189e9681a4efb59a91564e9f72e2047ce30840c06653ecc998ba216585cbeca617434a91a05bd8ae20b41ed84de5cfb0c3eb57ec721d4be57cf5f3223f99cfcb4250daee92b00b0de4c2d8e9e6cc6dafca49c136ef3b8ba7d983d52b079ef249f3c487ed6e982410bf86ab22636d22e06f3db5bbb887503167383f631e318ab71270528202994741264a40c69abe78eb0320ad420b229eca2335b928a3497cba182a427b0826260976608d5f50d35a5edc3574b532e28f114d21f93055f681f658fe9f6af8bac4ab5b1ec86dd575767501b6555963faba6766d70513c2cb8fbe6285f3ffea20b3b70b2e6960aca1633aa5368e19bec042ef32eacb5d326de1bc0e3120d9fe6da7f5407c7e77a66dac8f91ae11d727a5720a42ed152e6a95f61a61d80374fb0d6021d8f0a34e812bdba530bb4907b3192576a8021fae60615f89a420ada2f616fb9d006cc23621f72573e510417e91efe2335c246d614d105661866e878a1cae8dc29b92141b8d3e57479e73efa159e4a030531b54f0f9315a88e307bc0d152840166b88ed1afe6fbf159c3b74d04b7e9a31b93123fc5de7918eb1a8bd0a07ab4f07315ac5abbc36df06f613099d7f42d075366f42dd7ace9d975636363a5da4ea575a05c7114352a4b579b7aa129691e0b17934dd1146e34fa6246c953080503b9dfee62380669ebcb049e58bb259c6b1b64ff13891d0beb26dea5e624e5115ac1266e4facc65d5a0878066a253d1e9b3a2e465709ede22b312da118ad0446f2e725177452fd8f8b2eb743dbdbe3298e628c6910eb722415167eae745a28d15e2a0221db7ac7b684523b0af415acbcb9bed1d5a6fe74bb0e4e20543d684da1fad2199830e7ac421168acbc6ed547fd1ab4acd32adc34329af0a2ebfa80edeefb6fff2d6a4828b7b67da22f59ca68edcae4832be0ea856b075efbb4e14fad5e0ea5269cd75bac001acbc512833b44bbead8c861c8b2755ced0d594b7fd6b61f7f80341fe02549600298e1f68685f582d8bf5f51c01e2a68324456fd4cc342200252fd9a0025ce6b921bee965a350638830920a90f715959a936bc7cb6fef1fde4524c7eae46677efcd87be375ce25afa0d7c82bf445578ff6c49a3e461fcbe18faf4c6d711fd62a2a14e683f5919e7672deec93ccc0a843e90f7d88365bf469151793dbd9b15ef16a44909238f23cf84bcf11736089ab5ed0a0063c023cc0f90374dc37430e4279c05adb333e98cea0e650345d989b53653a1a3820410b7a1ad25bcfb39618c2b6ac29b2baa5325cc92647c9d13428d8be77b8c5f9c0492fc85a6d770ee6f123edc25b3009304c8691d90c2c54abf07413ac2ddd4d1abe34841739d4d88e865f7dda32bfe7a914400c7aa41a05745d9a4158641b26c510d671e4a539ac8d5f7a3ddb227d02788ba7b33222f2d1af605378636cddfa81825ebea6b68b0d8fca71277cdda7af17";
856 assert_eq!(padding.to_lower_hex_string(), expected_hex);
857 }
858
859 #[test]
860 fn test_generate_filler() {
861 let hops_path = get_test_hops_path();
862 let session_key = get_test_session_key();
863 let hops_keys = derive_hops_forward_keys(&hops_path, session_key, &Secp256k1::new());
864 let hops_data = get_test_hops_data();
865
866 let filler = generate_filler(PACKET_DATA_LEN, &hops_keys, &hops_data);
867 assert!(filler.is_ok());
868 let expected_hex = "51c30cc8f20da0153ca3839b850bcbc8fefc7fd84802f3e78cb35a660e747b57aa5b0de555cbcf1e6f044a718cc34219b96597f3684eee7a0232e1754f638006cb15a14788217abdf1bdd67910dc1ca74a05dcce8b5ad841b0f939fca8935f6a3ff660e0efb409f1a24ce4aa16fc7dc074cd84422c10cc4dd4fc150dd6d1e4f50b36ce10fef29248dd0cec85c72eb3e4b2f4a7c03b5c9e0c9dd12976553ede3d0e295f842187b33ff743e6d685075e98e1bcab8a46bff0102ca8b2098ae91798d370b01ca7076d3d626952a03663fe8dc700d1358263b73ba30e36731a0b72092f8d5bc8cd346762e93b2bf203d00264e4bc136fc142de8f7b69154deb05854ea88e2d7506222c95ba1aab06";
869 assert_eq!(filler.unwrap().to_lower_hex_string(), expected_hex);
870 }
871
872 #[test]
873 fn test_create_onion_packet() {
874 let secp = Secp256k1::new();
875 let hops_path = get_test_hops_path();
876 let session_key = get_test_session_key();
877 let hops_data = vec![
878 Vec::from_hex("1202023a98040205dc06080000000000000001").unwrap(),
879 Vec::from_hex("52020236b00402057806080000000000000002fd02013c0102030405060708090a0b0c0d0e0f0102030405060708090a0b0c0d0e0f0102030405060708090a0b0c0d0e0f0102030405060708090a0b0c0d0e0f").unwrap(),
880 Vec::from_hex("12020230d4040204e206080000000000000003").unwrap(),
881 Vec::from_hex("1202022710040203e806080000000000000004").unwrap(),
882 Vec::from_hex("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").unwrap(),
883 ];
884 let assoc_data = vec![0x42u8; 32];
885
886 let packet = OnionPacket::create(
887 session_key,
888 hops_path,
889 hops_data,
890 Some(assoc_data),
891 PACKET_DATA_LEN,
892 &secp,
893 )
894 .unwrap();
895 let packet_bytes = packet.into_bytes();
896 let expected_hex = "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";
897 assert_eq!(packet_bytes.len(), expected_hex.len() / 2);
898 assert_eq!(packet_bytes.to_lower_hex_string(), expected_hex);
899 }
900
901 #[test]
902 fn test_extract_public_key_from_slice() {
903 let secp = Secp256k1::new();
904 let hops_path = get_test_hops_path();
905 let session_key = get_test_session_key();
906 let hops_data = vec![
907 Vec::from_hex("1202023a98040205dc06080000000000000001").unwrap(),
908 Vec::from_hex("52020236b00402057806080000000000000002fd02013c0102030405060708090a0b0c0d0e0f0102030405060708090a0b0c0d0e0f0102030405060708090a0b0c0d0e0f0102030405060708090a0b0c0d0e0f").unwrap(),
909 Vec::from_hex("12020230d4040204e206080000000000000003").unwrap(),
910 Vec::from_hex("1202022710040203e806080000000000000004").unwrap(),
911 Vec::from_hex("fd011002022710040203e8082224a33562c54507a9334e79f0dc4f17d407e6d7c61f0e2f3d0d38599502f617042710fd012de02a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a").unwrap(),
912 ];
913 let assoc_data = vec![0x42u8; 32];
914
915 let packet = OnionPacket::create(
916 session_key,
917 hops_path,
918 hops_data,
919 Some(assoc_data),
920 PACKET_DATA_LEN,
921 &secp,
922 )
923 .unwrap();
924 let packet_bytes = packet.clone().into_bytes();
925 assert_eq!(
926 packet.public_key,
927 OnionPacket::extract_public_key_from_slice(&packet_bytes).expect("extract public key")
928 );
929 }
930
931 #[test]
932 fn test_packet_data_len_2000() {
933 let secp = Secp256k1::new();
934 let hops_keys = vec![
935 SecretKey::from_slice(&[0x20; 32]).expect("32 bytes, within curve order"),
936 SecretKey::from_slice(&[0x21; 32]).expect("32 bytes, within curve order"),
937 SecretKey::from_slice(&[0x22; 32]).expect("32 bytes, within curve order"),
938 ];
939 let hops_path = hops_keys.iter().map(|sk| sk.public_key(&secp)).collect();
940 let session_key = SecretKey::from_slice(&[0x41; 32]).expect("32 bytes, within curve order");
941 let hops_data = vec![vec![0], vec![1, 0], vec![5, 0, 1, 2, 3, 4]];
943 let get_length = |packet_data: &[u8]| Some(packet_data[0] as usize + 1);
944 let assoc_data = vec![0x42u8; 32];
945
946 let packet = OnionPacket::create(
947 session_key,
948 hops_path,
949 hops_data.clone(),
950 Some(assoc_data.clone()),
951 2000,
952 &secp,
953 )
954 .expect("new onion packet");
955
956 assert_eq!(packet.packet_data.len(), 2000);
957
958 {
960 let res = packet.clone().peel(&hops_keys[0], None, &secp, get_length);
962 assert_eq!(res, Err(SphinxError::HmacMismatch));
963 let res = packet
964 .clone()
965 .peel(&hops_keys[0], Some(&assoc_data), &secp, |_| None);
966 assert_eq!(res, Err(SphinxError::HopDataLenUnavailable));
967 }
968 let res = packet.peel(&hops_keys[0], Some(&assoc_data), &secp, get_length);
969 assert!(res.is_ok());
970 let (data, packet) = res.unwrap();
971 assert_eq!(data, hops_data[0]);
972
973 {
975 let res = packet.clone().peel(&hops_keys[1], None, &secp, get_length);
977 assert_eq!(res, Err(SphinxError::HmacMismatch));
978 let res = packet
979 .clone()
980 .peel(&hops_keys[1], Some(&assoc_data), &secp, |_| None);
981 assert_eq!(res, Err(SphinxError::HopDataLenUnavailable));
982 }
983 let res = packet.peel(&hops_keys[1], Some(&assoc_data), &secp, get_length);
984 assert!(res.is_ok());
985 let (data, packet) = res.unwrap();
986 assert_eq!(data, hops_data[1]);
987
988 {
990 let res = packet.clone().peel(&hops_keys[2], None, &secp, get_length);
992 assert_eq!(res, Err(SphinxError::HmacMismatch));
993 let res = packet
994 .clone()
995 .peel(&hops_keys[2], Some(&assoc_data), &secp, |_| None);
996 assert_eq!(res, Err(SphinxError::HopDataLenUnavailable));
997 }
998 let res = packet.peel(&hops_keys[2], Some(&assoc_data), &secp, get_length);
999 assert!(res.is_ok());
1000 let (data, _packet) = res.unwrap();
1001 assert_eq!(data, hops_data[2]);
1002 }
1003
1004 #[test]
1005 fn test_create_onion_error_packet() {
1006 let secp = Secp256k1::new();
1007 let hops_path = get_test_hops_path();
1008 let session_key = get_test_session_key();
1009 let hops_ss: Vec<_> =
1010 OnionSharedSecretIter::new(hops_path.iter(), session_key, &secp).collect();
1011 let error_payload = <Vec<u8>>::from_hex("0002200200fe0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000").expect("valid hex");
1012
1013 let onion_packet_1 = OnionErrorPacket::create(&hops_ss[4], error_payload);
1014 let expected_hex = "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";
1015 assert_eq!(
1016 onion_packet_1.clone().into_bytes().to_lower_hex_string(),
1017 expected_hex
1018 );
1019
1020 let onion_packet_2 = onion_packet_1.xor_cipher_stream(&hops_ss[3]);
1021 let expected_hex = "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";
1022 assert_eq!(
1023 onion_packet_2.clone().into_bytes().to_lower_hex_string(),
1024 expected_hex
1025 );
1026
1027 let onion_packet_3 = onion_packet_2.xor_cipher_stream(&hops_ss[2]);
1028 let expected_hex = "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";
1029 assert_eq!(
1030 onion_packet_3.clone().into_bytes().to_lower_hex_string(),
1031 expected_hex
1032 );
1033
1034 let onion_packet_4 = onion_packet_3.xor_cipher_stream(&hops_ss[1]);
1035 let expected_hex = "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";
1036 assert_eq!(
1037 onion_packet_4.clone().into_bytes().to_lower_hex_string(),
1038 expected_hex
1039 );
1040
1041 let onion_packet_5 = onion_packet_4.xor_cipher_stream(&hops_ss[0]);
1042 let expected_hex = "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";
1043 assert_eq!(
1044 onion_packet_5.into_bytes().to_lower_hex_string(),
1045 expected_hex
1046 );
1047 }
1048
1049 fn parse_lightning_error_packet_data(payload: &[u8]) -> Option<Vec<u8>> {
1050 (payload.len() >= 2).then_some(())?;
1051 let message_len = u16::from_be_bytes(payload[0..2].try_into().unwrap()) as usize;
1052
1053 (payload.len() >= message_len + 4).then_some(())?;
1054 let pad_len = u16::from_be_bytes(
1055 payload[(message_len + 2)..(message_len + 4)]
1056 .try_into()
1057 .unwrap(),
1058 ) as usize;
1059
1060 (payload.len() == message_len + pad_len + 4).then(|| payload[2..(2 + message_len)].to_vec())
1061 }
1062
1063 #[test]
1064 fn test_parse_onion_error_packet() {
1065 let secp = Secp256k1::new();
1066 let hops_path = get_test_hops_path();
1067 let session_key = get_test_session_key();
1068 let hops_ss: Vec<_> =
1069 OnionSharedSecretIter::new(hops_path.iter(), session_key, &secp).collect();
1070 let error_payload = <Vec<u8>>::from_hex("0002200200fe0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000").expect("valid hex");
1071
1072 {
1073 let packet = OnionErrorPacket::create(&hops_ss[0], error_payload.clone());
1075 let error = packet.parse(
1076 hops_path.clone(),
1077 session_key,
1078 parse_lightning_error_packet_data,
1079 );
1080 assert!(error.is_some());
1081 let (error, hops_index) = error.unwrap();
1082 assert_eq!(error, vec![0x20, 0x02]);
1083 assert_eq!(hops_index, 0);
1084 }
1085
1086 {
1087 let packet = OnionErrorPacket::create(&hops_ss[4], error_payload.clone())
1089 .xor_cipher_stream(&hops_ss[3])
1090 .xor_cipher_stream(&hops_ss[2])
1091 .xor_cipher_stream(&hops_ss[1])
1092 .xor_cipher_stream(&hops_ss[0]);
1093 let error = packet.parse(
1094 hops_path.clone(),
1095 session_key,
1096 parse_lightning_error_packet_data,
1097 );
1098 assert!(error.is_some());
1099 let (error, hops_index) = error.unwrap();
1100 assert_eq!(error, vec![0x20, 0x02]);
1101 assert_eq!(hops_index, 4);
1102 }
1103
1104 {
1105 let packet = OnionErrorPacket::create(&hops_ss[1], error_payload.clone());
1107 let error = packet.parse(
1108 hops_path.clone(),
1109 session_key,
1110 parse_lightning_error_packet_data,
1111 );
1112 assert!(error.is_none());
1113 }
1114 }
1115
1116 #[test]
1117 fn test_onion_error_packet_concat_split() {
1118 let expected_hmac = [0x11; 32];
1119 let expected_payload = vec![0x22];
1120 let packet = OnionErrorPacket::concat(expected_hmac.clone(), expected_payload.clone());
1121 let (hmac, payload) = packet.split();
1122
1123 assert_eq!(hmac, expected_hmac);
1124 assert_eq!(payload, expected_payload);
1125 }
1126}