77// You may not use this file except in accordance with one or both of these
88// licenses.
99
10- use lightning:: ln:: peer_channel_encryptor:: { PeerChannelEncryptor , MessageBuf } ;
10+ use lightning:: ln:: peer_channel_encryptor:: { MessageBuf , PeerChannelEncryptor } ;
1111use lightning:: util:: test_utils:: TestNodeSigner ;
1212
13- use bitcoin:: secp256k1:: { Secp256k1 , PublicKey , SecretKey } ;
13+ use bitcoin:: secp256k1:: { PublicKey , Secp256k1 , SecretKey } ;
1414
1515use crate :: utils:: test_logger;
1616
1717#[ inline]
1818fn slice_to_be16 ( v : & [ u8 ] ) -> u16 {
19- ( ( v[ 0 ] as u16 ) << 8 * 1 ) |
20- ( ( v[ 1 ] as u16 ) << 8 * 0 )
19+ ( ( v[ 0 ] as u16 ) << 8 * 1 ) | ( ( v[ 1 ] as u16 ) << 8 * 0 )
2120}
2221
2322#[ inline]
2423pub fn do_test ( data : & [ u8 ] ) {
2524 let mut read_pos = 0 ;
2625 macro_rules! get_slice {
27- ( $len: expr) => {
28- {
29- let slice_len = $len as usize ;
30- if data. len( ) < read_pos + slice_len {
31- return ;
32- }
33- read_pos += slice_len;
34- & data[ read_pos - slice_len..read_pos]
26+ ( $len: expr) => { {
27+ let slice_len = $len as usize ;
28+ if data. len( ) < read_pos + slice_len {
29+ return ;
3530 }
36- }
31+ read_pos += slice_len;
32+ & data[ read_pos - slice_len..read_pos]
33+ } } ;
3734 }
3835
3936 let secp_ctx = Secp256k1 :: signing_only ( ) ;
@@ -63,7 +60,12 @@ pub fn do_test(data: &[u8]) {
6360 crypter
6461 } else {
6562 let mut crypter = PeerChannelEncryptor :: new_inbound ( & & node_signer) ;
66- match crypter. process_act_one_with_keys ( get_slice ! ( 50 ) , & & node_signer, ephemeral_key, & secp_ctx) {
63+ match crypter. process_act_one_with_keys (
64+ get_slice ! ( 50 ) ,
65+ & & node_signer,
66+ ephemeral_key,
67+ & secp_ctx,
68+ ) {
6769 Ok ( _) => { } ,
6870 Err ( _) => return ,
6971 }
@@ -77,9 +79,11 @@ pub fn do_test(data: &[u8]) {
7779 let mut buf = [ 0 ; 65536 + 16 ] ;
7880 loop {
7981 if get_slice ! ( 1 ) [ 0 ] == 0 {
80- crypter. encrypt_buffer ( MessageBuf :: from_encoded ( & get_slice ! ( slice_to_be16( get_slice!( 2 ) ) ) ) ) ;
82+ crypter. encrypt_buffer ( MessageBuf :: from_encoded ( & get_slice ! ( slice_to_be16(
83+ get_slice!( 2 )
84+ ) ) ) ) ;
8185 } else {
82- let len = match crypter. decrypt_length_header ( get_slice ! ( 16 + 2 ) ) {
86+ let len = match crypter. decrypt_length_header ( get_slice ! ( 16 + 2 ) ) {
8387 Ok ( len) => len,
8488 Err ( _) => return ,
8589 } ;
0 commit comments