Branch data Line data Source code
1 : : // Copyright (c) 2011-present The Bitcoin Core developers
2 : : // Distributed under the MIT software license, see the accompanying
3 : : // file COPYING or http://www.opensource.org/licenses/mit-license.php.
4 : :
5 : : #include <test/data/tx_invalid.json.h>
6 : : #include <test/data/tx_valid.json.h>
7 : : #include <test/util/setup_common.h>
8 : :
9 : : #include <checkqueue.h>
10 : : #include <clientversion.h>
11 : : #include <consensus/amount.h>
12 : : #include <consensus/consensus.h>
13 : : #include <consensus/tx_check.h>
14 : : #include <consensus/tx_verify.h>
15 : : #include <consensus/validation.h>
16 : : #include <core_io.h>
17 : : #include <key.h>
18 : : #include <policy/policy.h>
19 : : #include <policy/settings.h>
20 : : #include <primitives/transaction_identifier.h>
21 : : #include <script/interpreter.h>
22 : : #include <script/script.h>
23 : : #include <script/script_error.h>
24 : : #include <script/sigcache.h>
25 : : #include <script/sign.h>
26 : : #include <script/signingprovider.h>
27 : : #include <script/solver.h>
28 : : #include <streams.h>
29 : : #include <test/util/common.h>
30 : : #include <test/util/json.h>
31 : : #include <test/util/random.h>
32 : : #include <test/util/script.h>
33 : : #include <test/util/transaction_utils.h>
34 : : #include <util/strencodings.h>
35 : : #include <util/string.h>
36 : : #include <validation.h>
37 : :
38 : : #include <functional>
39 : : #include <map>
40 : : #include <string>
41 : :
42 : : #include <boost/test/unit_test.hpp>
43 : :
44 : : #include <univalue.h>
45 : :
46 : : using namespace util::hex_literals;
47 : : using util::SplitString;
48 : : using util::ToString;
49 : :
50 : : typedef std::vector<unsigned char> valtype;
51 : :
52 : : static CFeeRate g_dust{DUST_RELAY_TX_FEE};
53 : : static bool g_bare_multi{DEFAULT_PERMIT_BAREMULTISIG};
54 : :
55 : : static const std::map<std::string, script_verify_flag_name>& mapFlagNames = ScriptFlagNamesToEnum();
56 : :
57 : 1427 : script_verify_flags ParseScriptFlags(std::string strFlags)
58 : : {
59 : 1427 : script_verify_flags flags = SCRIPT_VERIFY_NONE;
60 [ + + + + ]: 1427 : if (strFlags.empty() || strFlags == "NONE") return flags;
61 : :
62 [ - + ]: 1228 : std::vector<std::string> words = SplitString(strFlags, ',');
63 [ + + ]: 3503 : for (const std::string& word : words)
64 : : {
65 [ - + ]: 2275 : if (!mapFlagNames.contains(word)) {
66 [ # # # # ]: 0 : BOOST_ERROR("Bad test: unknown verification flag '" << word << "'");
67 : 0 : continue;
68 : : }
69 [ + - ]: 2275 : flags |= mapFlagNames.at(word);
70 : : }
71 : 1228 : return flags;
72 : 1228 : }
73 : :
74 : : // Check that all flags in STANDARD_SCRIPT_VERIFY_FLAGS are present in mapFlagNames.
75 : 1 : bool CheckMapFlagNames()
76 : : {
77 : 1 : script_verify_flags standard_flags_missing{STANDARD_SCRIPT_VERIFY_FLAGS};
78 [ + + ]: 22 : for (const auto& pair : mapFlagNames) {
79 : 21 : standard_flags_missing &= ~(pair.second);
80 : : }
81 : 1 : return standard_flags_missing == 0;
82 : : }
83 : :
84 : : /*
85 : : * Check that the input scripts of a transaction are valid/invalid as expected.
86 : : */
87 : 9006 : bool CheckTxScripts(const CTransaction& tx, const std::map<COutPoint, CScript>& map_prevout_scriptPubKeys,
88 : : const std::map<COutPoint, int64_t>& map_prevout_values, script_verify_flags flags,
89 : : const PrecomputedTransactionData& txdata, const std::string& strTest, bool expect_valid)
90 : : {
91 : 9006 : bool tx_valid = true;
92 [ + + ]: 9006 : ScriptError err = expect_valid ? SCRIPT_ERR_UNKNOWN_ERROR : SCRIPT_ERR_OK;
93 [ - + + + : 20711 : for (unsigned int i = 0; i < tx.vin.size() && tx_valid; ++i) {
+ + ]
94 : 11705 : const CTxIn input = tx.vin[i];
95 [ + - + + ]: 11705 : const CAmount amount = map_prevout_values.contains(input.prevout) ? map_prevout_values.at(input.prevout) : 0;
96 : 11705 : try {
97 [ + - + - ]: 11705 : tx_valid = VerifyScript(input.scriptSig, map_prevout_scriptPubKeys.at(input.prevout),
98 [ + - ]: 11705 : &input.scriptWitness, flags, TransactionSignatureChecker(&tx, i, amount, txdata, MissingDataBehavior::ASSERT_FAIL), &err);
99 : 0 : } catch (...) {
100 [ - - - - : 0 : BOOST_ERROR("Bad test: " << strTest);
- - ]
101 : 0 : return true; // The test format is bad and an error is thrown. Return true to silence further error.
102 [ - - ]: 0 : }
103 [ + + ]: 11705 : if (expect_valid) {
104 [ + - + - : 15366 : BOOST_CHECK_MESSAGE(tx_valid, strTest);
+ - ]
105 [ + - + - : 15366 : BOOST_CHECK_MESSAGE((err == SCRIPT_ERR_OK), ScriptErrorString(err));
+ - ]
106 : 7683 : err = SCRIPT_ERR_UNKNOWN_ERROR;
107 : : }
108 : 11705 : }
109 [ + + ]: 9006 : if (!expect_valid) {
110 [ + - ]: 7428 : BOOST_CHECK_MESSAGE(!tx_valid, strTest);
111 [ + - ]: 7428 : BOOST_CHECK_MESSAGE((err != SCRIPT_ERR_OK), ScriptErrorString(err));
112 : : }
113 : 9006 : return (tx_valid == expect_valid);
114 : : }
115 : :
116 : : /*
117 : : * Trim or fill flags to make the combination valid:
118 : : * WITNESS must be used with P2SH
119 : : * CLEANSTACK must be used WITNESS and P2SH
120 : : */
121 : :
122 : 9387 : script_verify_flags TrimFlags(script_verify_flags flags)
123 : : {
124 : : // WITNESS requires P2SH
125 [ + + ]: 9387 : if (!(flags & SCRIPT_VERIFY_P2SH)) flags &= ~SCRIPT_VERIFY_WITNESS;
126 : :
127 : : // CLEANSTACK requires WITNESS (and transitively CLEANSTACK requires P2SH)
128 [ + + ]: 9387 : if (!(flags & SCRIPT_VERIFY_WITNESS)) flags &= ~SCRIPT_VERIFY_CLEANSTACK;
129 [ - + ]: 9387 : Assert(IsValidFlagCombination(flags));
130 : 9387 : return flags;
131 : : }
132 : :
133 : 3733 : script_verify_flags FillFlags(script_verify_flags flags)
134 : : {
135 : : // CLEANSTACK implies WITNESS
136 [ + + ]: 3733 : if (flags & SCRIPT_VERIFY_CLEANSTACK) flags |= SCRIPT_VERIFY_WITNESS;
137 : :
138 : : // WITNESS implies P2SH (and transitively CLEANSTACK implies P2SH)
139 [ + + ]: 3733 : if (flags & SCRIPT_VERIFY_WITNESS) flags |= SCRIPT_VERIFY_P2SH;
140 [ - + ]: 3733 : Assert(IsValidFlagCombination(flags));
141 : 3733 : return flags;
142 : : }
143 : :
144 : : // Exclude each possible script verify flag from flags. Returns a set of these flag combinations
145 : : // that are valid and without duplicates. For example: if flags=1111 and the 4 possible flags are
146 : : // 0001, 0010, 0100, and 1000, this should return the set {0111, 1011, 1101, 1110}.
147 : : // Assumes that mapFlagNames contains all script verify flags.
148 : 205 : std::set<script_verify_flags> ExcludeIndividualFlags(script_verify_flags flags)
149 : : {
150 : 205 : std::set<script_verify_flags> flags_combos;
151 [ + + ]: 4510 : for (const auto& pair : mapFlagNames) {
152 [ + - ]: 4305 : script_verify_flags flags_excluding_one = TrimFlags(flags & ~(pair.second));
153 [ + + ]: 4305 : if (flags != flags_excluding_one) {
154 [ + - ]: 612 : flags_combos.insert(flags_excluding_one);
155 : : }
156 : : }
157 : 205 : return flags_combos;
158 : 0 : }
159 : :
160 : : BOOST_FIXTURE_TEST_SUITE(transaction_tests, BasicTestingSetup)
161 : :
162 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(tx_valid)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
163 : : {
164 [ + - ]: 2 : BOOST_CHECK_MESSAGE(CheckMapFlagNames(), "mapFlagNames is missing a script verification flag");
165 : : // Read tests from test/data/tx_valid.json
166 : 1 : UniValue tests = read_json(json_tests::tx_valid);
167 : :
168 [ - + + + ]: 251 : for (unsigned int idx = 0; idx < tests.size(); idx++) {
169 [ + - ]: 250 : const UniValue& test = tests[idx];
170 [ + - ]: 250 : std::string strTest = test.write();
171 [ + - + + ]: 250 : if (test[0].isArray())
172 : : {
173 [ - + + - : 121 : if (test.size() != 3 || !test[1].isStr() || !test[2].isStr())
+ - + - +
- - + ]
174 : : {
175 [ # # # # ]: 0 : BOOST_ERROR("Bad test: " << strTest);
176 : 0 : continue;
177 : : }
178 : :
179 [ + - ]: 121 : std::map<COutPoint, CScript> mapprevOutScriptPubKeys;
180 : 121 : std::map<COutPoint, int64_t> mapprevOutValues;
181 [ + - + - : 121 : UniValue inputs = test[0].get_array();
+ - ]
182 : 297 : bool fValid = true;
183 [ - + + + ]: 297 : for (unsigned int inpIdx = 0; inpIdx < inputs.size(); inpIdx++) {
184 [ + - ]: 176 : const UniValue& input = inputs[inpIdx];
185 [ + - ]: 176 : if (!input.isArray()) {
186 : : fValid = false;
187 : : break;
188 : : }
189 [ + - ]: 176 : const UniValue& vinput = input.get_array();
190 [ - + + - : 176 : if (vinput.size() < 3 || vinput.size() > 4)
+ - ]
191 : : {
192 : : fValid = false;
193 : : break;
194 : : }
195 [ + - + - : 352 : COutPoint outpoint{Txid::FromHex(vinput[0].get_str()).value(), uint32_t(vinput[1].getInt<int>())};
- + + - +
- + - +
- ]
196 [ + - + - : 176 : mapprevOutScriptPubKeys[outpoint] = ParseScript(vinput[2].get_str());
+ - + - ]
197 [ - + + + ]: 176 : if (vinput.size() >= 4)
198 : : {
199 [ + - + - : 81 : mapprevOutValues[outpoint] = vinput[3].getInt<int64_t>();
+ - ]
200 : : }
201 : : }
202 [ - + ]: 121 : if (!fValid)
203 : : {
204 [ # # # # ]: 0 : BOOST_ERROR("Bad test: " << strTest);
205 : 0 : continue;
206 : : }
207 : :
208 [ + - + - : 121 : std::string transaction = test[1].get_str();
- + ]
209 [ - + + - : 242 : DataStream stream(ParseHex(transaction));
+ - ]
210 [ + - ]: 121 : CTransaction tx(deserialize, TX_WITH_WITNESS, stream);
211 : :
212 [ + - ]: 121 : TxValidationState state;
213 [ + - + - : 242 : BOOST_CHECK_MESSAGE(CheckTransaction(tx, state), strTest);
+ - + - ]
214 [ + - + - : 242 : BOOST_CHECK(state.IsValid());
+ - ]
215 : :
216 [ + - ]: 121 : PrecomputedTransactionData txdata(tx);
217 [ + - + - : 242 : script_verify_flags verify_flags = ParseScriptFlags(test[2].get_str());
- + + - ]
218 : :
219 : : // Check that the test gives a valid combination of flags (otherwise VerifyScript will throw). Don't edit the flags.
220 [ + - - + ]: 121 : if (~verify_flags != FillFlags(~verify_flags)) {
221 [ # # # # ]: 0 : BOOST_ERROR("Bad test flags: " << strTest);
222 : : }
223 : :
224 [ + - + - : 242 : BOOST_CHECK_MESSAGE(CheckTxScripts(tx, mapprevOutScriptPubKeys, mapprevOutValues, ~verify_flags, txdata, strTest, /*expect_valid=*/true),
+ - ]
225 : : "Tx unexpectedly failed: " << strTest);
226 : :
227 : : // Backwards compatibility of script verification flags: Removing any flag(s) should not invalidate a valid transaction
228 [ + - + + ]: 2662 : for (const auto& [name, flag] : mapFlagNames) {
229 : : // Removing individual flags
230 [ + - ]: 2541 : script_verify_flags flags = TrimFlags(~(verify_flags | flag));
231 [ + - - + ]: 2541 : if (!CheckTxScripts(tx, mapprevOutScriptPubKeys, mapprevOutValues, flags, txdata, strTest, /*expect_valid=*/true)) {
232 [ # # # # ]: 0 : BOOST_ERROR("Tx unexpectedly failed with flag " << name << " unset: " << strTest);
233 : : }
234 : : // Removing random combinations of flags
235 [ + - ]: 2541 : flags = TrimFlags(~(verify_flags | script_verify_flags::from_int(m_rng.randbits(MAX_SCRIPT_VERIFY_FLAGS_BITS))));
236 [ + - - + ]: 2541 : if (!CheckTxScripts(tx, mapprevOutScriptPubKeys, mapprevOutValues, flags, txdata, strTest, /*expect_valid=*/true)) {
237 [ # # # # : 0 : BOOST_ERROR("Tx unexpectedly failed with random flags " << ToString(flags.as_int()) << ": " << strTest);
# # ]
238 : : }
239 : : }
240 : :
241 : : // Check that flags are maximal: transaction should fail if any unset flags are set.
242 [ + - + + ]: 223 : for (auto flags_excluding_one : ExcludeIndividualFlags(verify_flags)) {
243 [ + - - + ]: 102 : if (!CheckTxScripts(tx, mapprevOutScriptPubKeys, mapprevOutValues, ~flags_excluding_one, txdata, strTest, /*expect_valid=*/false)) {
244 [ # # # # ]: 0 : BOOST_ERROR("Too many flags unset: " << strTest);
245 : : }
246 : 121 : }
247 : 363 : }
248 : 250 : }
249 : 1 : }
250 : :
251 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(tx_invalid)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
252 : : {
253 : : // Read tests from test/data/tx_invalid.json
254 : 1 : UniValue tests = read_json(json_tests::tx_invalid);
255 : :
256 [ - + + + ]: 202 : for (unsigned int idx = 0; idx < tests.size(); idx++) {
257 [ + - ]: 201 : const UniValue& test = tests[idx];
258 [ + - ]: 201 : std::string strTest = test.write();
259 [ + - + + ]: 201 : if (test[0].isArray())
260 : : {
261 [ - + + - : 93 : if (test.size() != 3 || !test[1].isStr() || !test[2].isStr())
+ - + - +
- - + ]
262 : : {
263 [ # # # # ]: 0 : BOOST_ERROR("Bad test: " << strTest);
264 : 0 : continue;
265 : : }
266 : :
267 [ + - ]: 93 : std::map<COutPoint, CScript> mapprevOutScriptPubKeys;
268 : 93 : std::map<COutPoint, int64_t> mapprevOutValues;
269 [ + - + - : 93 : UniValue inputs = test[0].get_array();
+ - ]
270 : 203 : bool fValid = true;
271 [ - + + + ]: 203 : for (unsigned int inpIdx = 0; inpIdx < inputs.size(); inpIdx++) {
272 [ + - ]: 110 : const UniValue& input = inputs[inpIdx];
273 [ + - ]: 110 : if (!input.isArray()) {
274 : : fValid = false;
275 : : break;
276 : : }
277 [ + - ]: 110 : const UniValue& vinput = input.get_array();
278 [ - + + - : 110 : if (vinput.size() < 3 || vinput.size() > 4)
+ - ]
279 : : {
280 : : fValid = false;
281 : : break;
282 : : }
283 [ + - + - : 220 : COutPoint outpoint{Txid::FromHex(vinput[0].get_str()).value(), uint32_t(vinput[1].getInt<int>())};
- + + - +
- + - +
- ]
284 [ + - + - : 110 : mapprevOutScriptPubKeys[outpoint] = ParseScript(vinput[2].get_str());
+ - + - ]
285 [ - + + + ]: 110 : if (vinput.size() >= 4)
286 : : {
287 [ + - + - : 29 : mapprevOutValues[outpoint] = vinput[3].getInt<int64_t>();
+ - ]
288 : : }
289 : : }
290 [ - + ]: 93 : if (!fValid)
291 : : {
292 [ # # # # ]: 0 : BOOST_ERROR("Bad test: " << strTest);
293 : 0 : continue;
294 : : }
295 : :
296 [ + - + - : 93 : std::string transaction = test[1].get_str();
- + ]
297 [ - + + - : 186 : DataStream stream(ParseHex(transaction));
+ - ]
298 [ + - ]: 93 : CTransaction tx(deserialize, TX_WITH_WITNESS, stream);
299 : :
300 [ + - ]: 93 : TxValidationState state;
301 [ + - + + : 93 : if (!CheckTransaction(tx, state) || state.IsInvalid()) {
+ - ]
302 [ + - + - : 18 : BOOST_CHECK_MESSAGE(test[2].get_str() == "BADTX", strTest);
+ - + - ]
303 : 9 : continue;
304 : : }
305 : :
306 [ + - ]: 84 : PrecomputedTransactionData txdata(tx);
307 [ + - + - : 168 : script_verify_flags verify_flags = ParseScriptFlags(test[2].get_str());
- + + - ]
308 : :
309 : : // Check that the test gives a valid combination of flags (otherwise VerifyScript will throw). Don't edit the flags.
310 [ + - - + ]: 84 : if (verify_flags != FillFlags(verify_flags)) {
311 [ # # # # ]: 0 : BOOST_ERROR("Bad test flags: " << strTest);
312 : : }
313 : :
314 : : // Not using FillFlags() in the main test, in order to detect invalid verifyFlags combination
315 [ + - + - : 168 : BOOST_CHECK_MESSAGE(CheckTxScripts(tx, mapprevOutScriptPubKeys, mapprevOutValues, verify_flags, txdata, strTest, /*expect_valid=*/false),
+ - ]
316 : : "Tx unexpectedly passed: " << strTest);
317 : :
318 : : // Backwards compatibility of script verification flags: Adding any flag(s) should not validate an invalid transaction
319 [ + - + + ]: 1848 : for (const auto& [name, flag] : mapFlagNames) {
320 [ + - ]: 1764 : script_verify_flags flags = FillFlags(verify_flags | flag);
321 : : // Adding individual flags
322 [ + - - + ]: 1764 : if (!CheckTxScripts(tx, mapprevOutScriptPubKeys, mapprevOutValues, flags, txdata, strTest, /*expect_valid=*/false)) {
323 [ # # # # ]: 0 : BOOST_ERROR("Tx unexpectedly passed with flag " << name << " set: " << strTest);
324 : : }
325 : : // Adding random combinations of flags
326 [ + - ]: 1764 : flags = FillFlags(verify_flags | script_verify_flags::from_int(m_rng.randbits(MAX_SCRIPT_VERIFY_FLAGS_BITS)));
327 [ + - - + ]: 1764 : if (!CheckTxScripts(tx, mapprevOutScriptPubKeys, mapprevOutValues, flags, txdata, strTest, /*expect_valid=*/false)) {
328 [ # # # # ]: 0 : BOOST_ERROR("Tx unexpectedly passed with random flags " << name << ": " << strTest);
329 : : }
330 : : }
331 : :
332 : : // Check that flags are minimal: transaction should succeed if any set flags are unset.
333 [ + - + + ]: 173 : for (auto flags_excluding_one : ExcludeIndividualFlags(verify_flags)) {
334 [ + - - + ]: 89 : if (!CheckTxScripts(tx, mapprevOutScriptPubKeys, mapprevOutValues, flags_excluding_one, txdata, strTest, /*expect_valid=*/true)) {
335 [ # # # # ]: 0 : BOOST_ERROR("Too many flags set: " << strTest);
336 : : }
337 : 84 : }
338 : 270 : }
339 : 201 : }
340 : 1 : }
341 : :
342 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(tx_no_inputs)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
343 : : {
344 : 1 : CMutableTransaction empty;
345 : :
346 [ + - ]: 1 : TxValidationState state;
347 [ + - + - : 3 : BOOST_CHECK_MESSAGE(!CheckTransaction(CTransaction(empty), state), "Transaction with no inputs should be invalid.");
+ - + - +
- ]
348 [ + - - + : 3 : BOOST_CHECK(state.GetRejectReason() == "bad-txns-vin-empty");
+ - ]
349 : 2 : }
350 : :
351 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(tx_oversized)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
352 : : {
353 : 4 : auto createTransaction =[](size_t payloadSize) {
354 : 3 : CMutableTransaction tx;
355 [ + - ]: 3 : tx.vin.resize(1);
356 [ + - + - : 9 : tx.vout.emplace_back(1, CScript() << OP_RETURN << std::vector<unsigned char>(payloadSize));
+ - ]
357 [ + - ]: 3 : return CTransaction(tx);
358 : 3 : };
359 : 1 : const auto maxTransactionSize = MAX_BLOCK_WEIGHT / WITNESS_SCALE_FACTOR;
360 : 1 : const auto oversizedTransactionBaseSize = ::GetSerializeSize(TX_NO_WITNESS(createTransaction(maxTransactionSize))) - maxTransactionSize;
361 : :
362 : 1 : auto maxPayloadSize = maxTransactionSize - oversizedTransactionBaseSize;
363 : 1 : {
364 [ + - ]: 1 : TxValidationState state;
365 [ + - + - ]: 1 : CheckTransaction(createTransaction(maxPayloadSize), state);
366 [ + - - + : 3 : BOOST_CHECK(state.GetRejectReason() != "bad-txns-oversize");
+ - ]
367 : 0 : }
368 : :
369 : 1 : maxPayloadSize += 1;
370 : 1 : {
371 [ + - ]: 1 : TxValidationState state;
372 [ + - + - : 3 : BOOST_CHECK_MESSAGE(!CheckTransaction(createTransaction(maxPayloadSize), state), "Oversized transaction should be invalid");
+ - + - +
- ]
373 [ + - - + : 3 : BOOST_CHECK(state.GetRejectReason() == "bad-txns-oversize");
+ - ]
374 : 1 : }
375 : 1 : }
376 : :
377 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(basic_transaction_tests)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
378 : : {
379 : : // Random real transaction (e2769b09e784f32f62ef849763d4f45b98e07ba658647343b915ff832b110436)
380 : 1 : unsigned char ch[] = {0x01, 0x00, 0x00, 0x00, 0x01, 0x6b, 0xff, 0x7f, 0xcd, 0x4f, 0x85, 0x65, 0xef, 0x40, 0x6d, 0xd5, 0xd6, 0x3d, 0x4f, 0xf9, 0x4f, 0x31, 0x8f, 0xe8, 0x20, 0x27, 0xfd, 0x4d, 0xc4, 0x51, 0xb0, 0x44, 0x74, 0x01, 0x9f, 0x74, 0xb4, 0x00, 0x00, 0x00, 0x00, 0x8c, 0x49, 0x30, 0x46, 0x02, 0x21, 0x00, 0xda, 0x0d, 0xc6, 0xae, 0xce, 0xfe, 0x1e, 0x06, 0xef, 0xdf, 0x05, 0x77, 0x37, 0x57, 0xde, 0xb1, 0x68, 0x82, 0x09, 0x30, 0xe3, 0xb0, 0xd0, 0x3f, 0x46, 0xf5, 0xfc, 0xf1, 0x50, 0xbf, 0x99, 0x0c, 0x02, 0x21, 0x00, 0xd2, 0x5b, 0x5c, 0x87, 0x04, 0x00, 0x76, 0xe4, 0xf2, 0x53, 0xf8, 0x26, 0x2e, 0x76, 0x3e, 0x2d, 0xd5, 0x1e, 0x7f, 0xf0, 0xbe, 0x15, 0x77, 0x27, 0xc4, 0xbc, 0x42, 0x80, 0x7f, 0x17, 0xbd, 0x39, 0x01, 0x41, 0x04, 0xe6, 0xc2, 0x6e, 0xf6, 0x7d, 0xc6, 0x10, 0xd2, 0xcd, 0x19, 0x24, 0x84, 0x78, 0x9a, 0x6c, 0xf9, 0xae, 0xa9, 0x93, 0x0b, 0x94, 0x4b, 0x7e, 0x2d, 0xb5, 0x34, 0x2b, 0x9d, 0x9e, 0x5b, 0x9f, 0xf7, 0x9a, 0xff, 0x9a, 0x2e, 0xe1, 0x97, 0x8d, 0xd7, 0xfd, 0x01, 0xdf, 0xc5, 0x22, 0xee, 0x02, 0x28, 0x3d, 0x3b, 0x06, 0xa9, 0xd0, 0x3a, 0xcf, 0x80, 0x96, 0x96, 0x8d, 0x7d, 0xbb, 0x0f, 0x91, 0x78, 0xff, 0xff, 0xff, 0xff, 0x02, 0x8b, 0xa7, 0x94, 0x0e, 0x00, 0x00, 0x00, 0x00, 0x19, 0x76, 0xa9, 0x14, 0xba, 0xde, 0xec, 0xfd, 0xef, 0x05, 0x07, 0x24, 0x7f, 0xc8, 0xf7, 0x42, 0x41, 0xd7, 0x3b, 0xc0, 0x39, 0x97, 0x2d, 0x7b, 0x88, 0xac, 0x40, 0x94, 0xa8, 0x02, 0x00, 0x00, 0x00, 0x00, 0x19, 0x76, 0xa9, 0x14, 0xc1, 0x09, 0x32, 0x48, 0x3f, 0xec, 0x93, 0xed, 0x51, 0xf5, 0xfe, 0x95, 0xe7, 0x25, 0x59, 0xf2, 0xcc, 0x70, 0x43, 0xf9, 0x88, 0xac, 0x00, 0x00, 0x00, 0x00, 0x00};
381 : 1 : std::vector<unsigned char> vch(ch, ch + sizeof(ch) -1);
382 [ + - ]: 1 : CMutableTransaction tx;
383 [ - + + - ]: 1 : SpanReader{vch} >> TX_WITH_WITNESS(tx);
384 [ + - ]: 1 : TxValidationState state;
385 [ + - + - : 3 : BOOST_CHECK_MESSAGE(CheckTransaction(CTransaction(tx), state) && state.IsValid(), "Simple deserialized transaction should be valid.");
+ - + - -
+ + - +
- ]
386 : :
387 : : // Check that duplicate txins fail
388 [ + - ]: 1 : tx.vin.push_back(tx.vin[0]);
389 [ + - + - : 3 : BOOST_CHECK_MESSAGE(!CheckTransaction(CTransaction(tx), state) || !state.IsValid(), "Transaction with duplicate txins should be invalid.");
+ - - + -
- + - ]
390 : 2 : }
391 : :
392 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(test_Get)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
393 : : {
394 : 1 : FillableSigningProvider keystore;
395 : 1 : CCoinsView coinsDummy;
396 [ + - ]: 1 : CCoinsViewCache coins(&coinsDummy);
397 : 1 : std::vector<CMutableTransaction> dummyTransactions =
398 [ + - ]: 1 : SetupDummyInputs(keystore, coins, {11*CENT, 50*CENT, 21*CENT, 22*CENT});
399 : :
400 [ + - ]: 1 : CMutableTransaction t1;
401 [ + - ]: 1 : t1.vin.resize(3);
402 [ + - ]: 1 : t1.vin[0].prevout.hash = dummyTransactions[0].GetHash();
403 : 1 : t1.vin[0].prevout.n = 1;
404 [ + - + - ]: 2 : t1.vin[0].scriptSig << std::vector<unsigned char>(65, 0);
405 [ + - ]: 1 : t1.vin[1].prevout.hash = dummyTransactions[1].GetHash();
406 : 1 : t1.vin[1].prevout.n = 0;
407 [ + - + - : 3 : t1.vin[1].scriptSig << std::vector<unsigned char>(65, 0) << std::vector<unsigned char>(33, 4);
+ - ]
408 [ + - ]: 1 : t1.vin[2].prevout.hash = dummyTransactions[1].GetHash();
409 : 1 : t1.vin[2].prevout.n = 1;
410 [ + - + - : 3 : t1.vin[2].scriptSig << std::vector<unsigned char>(65, 0) << std::vector<unsigned char>(33, 4);
+ - ]
411 [ + - ]: 1 : t1.vout.resize(2);
412 [ + - ]: 1 : t1.vout[0].nValue = 90*CENT;
413 [ + - ]: 1 : t1.vout[0].scriptPubKey << OP_1;
414 : :
415 [ + - + - : 3 : BOOST_CHECK(AreInputsStandard(CTransaction(t1), coins));
+ - + - ]
416 : 1 : }
417 : :
418 : 24 : static void CreateCreditAndSpend(const FillableSigningProvider& keystore, const CScript& outscript, CTransactionRef& output, CMutableTransaction& input, bool success = true)
419 : : {
420 : 24 : CMutableTransaction outputm;
421 : 24 : outputm.version = 1;
422 [ + - ]: 24 : outputm.vin.resize(1);
423 : 24 : outputm.vin[0].prevout.SetNull();
424 : 24 : outputm.vin[0].scriptSig = CScript();
425 [ + - ]: 24 : outputm.vout.resize(1);
426 : 24 : outputm.vout[0].nValue = 1;
427 : 24 : outputm.vout[0].scriptPubKey = outscript;
428 : 24 : DataStream ssout;
429 [ + - ]: 24 : ssout << TX_WITH_WITNESS(outputm);
430 [ + - ]: 24 : ssout >> TX_WITH_WITNESS(output);
431 [ - + - + ]: 24 : assert(output->vin.size() == 1);
432 [ - + ]: 24 : assert(output->vin[0] == outputm.vin[0]);
433 [ - + - + ]: 24 : assert(output->vout.size() == 1);
434 [ - + ]: 24 : assert(output->vout[0] == outputm.vout[0]);
435 : :
436 [ + - ]: 24 : CMutableTransaction inputm;
437 : 24 : inputm.version = 1;
438 [ + - ]: 24 : inputm.vin.resize(1);
439 [ + - ]: 24 : inputm.vin[0].prevout.hash = output->GetHash();
440 : 24 : inputm.vin[0].prevout.n = 0;
441 [ + - ]: 24 : inputm.vout.resize(1);
442 : 24 : inputm.vout[0].nValue = 1;
443 : 24 : inputm.vout[0].scriptPubKey = CScript();
444 : 24 : SignatureData empty;
445 [ + - ]: 24 : bool ret = SignSignature(keystore, *output, inputm, 0, SIGHASH_ALL, empty);
446 [ - + ]: 24 : assert(ret == success);
447 : 24 : DataStream ssin;
448 [ + - ]: 24 : ssin << TX_WITH_WITNESS(inputm);
449 [ + - ]: 24 : ssin >> TX_WITH_WITNESS(input);
450 [ - + - + ]: 24 : assert(input.vin.size() == 1);
451 [ - + ]: 24 : assert(input.vin[0] == inputm.vin[0]);
452 [ - + - + ]: 24 : assert(input.vout.size() == 1);
453 [ - + ]: 24 : assert(input.vout[0] == inputm.vout[0]);
454 [ - + ]: 24 : assert(input.vin[0].scriptWitness.stack == inputm.vin[0].scriptWitness.stack);
455 : 72 : }
456 : :
457 : 69 : static void CheckWithFlag(const CTransactionRef& output, const CMutableTransaction& input, script_verify_flags flags, bool success)
458 : : {
459 : 69 : ScriptError error;
460 : 69 : CTransaction inputi(input);
461 [ + - ]: 69 : bool ret = VerifyScript(inputi.vin[0].scriptSig, output->vout[0].scriptPubKey, &inputi.vin[0].scriptWitness, flags, TransactionSignatureChecker(&inputi, 0, output->vout[0].nValue, MissingDataBehavior::ASSERT_FAIL), &error);
462 [ - + ]: 69 : assert(ret == success);
463 : 69 : }
464 : :
465 : 3 : static CScript PushAll(const std::vector<valtype>& values)
466 : : {
467 : 3 : CScript result;
468 [ + + ]: 8 : for (const valtype& v : values) {
469 [ - + - + ]: 5 : if (v.size() == 0) {
470 [ # # ]: 0 : result << OP_0;
471 [ - + - - : 5 : } else if (v.size() == 1 && v[0] >= 1 && v[0] <= 16) {
- - ]
472 [ # # ]: 0 : result << CScript::EncodeOP_N(v[0]);
473 [ - + - - ]: 5 : } else if (v.size() == 1 && v[0] == 0x81) {
474 [ # # ]: 0 : result << OP_1NEGATE;
475 : : } else {
476 : 5 : result << v;
477 : : }
478 : : }
479 : 3 : return result;
480 : 0 : }
481 : :
482 : 3 : static void ReplaceRedeemScript(CScript& script, const CScript& redeemScript)
483 : : {
484 : 3 : std::vector<valtype> stack;
485 [ + - ]: 3 : EvalScript(stack, script, SCRIPT_VERIFY_STRICTENC, BaseSignatureChecker(), SigVersion::BASE);
486 [ - + - + ]: 3 : assert(stack.size() > 0);
487 [ + + + - : 6 : stack.back() = std::vector<unsigned char>(redeemScript.begin(), redeemScript.end());
+ - ]
488 [ + - ]: 6 : script = PushAll(stack);
489 : 3 : }
490 : :
491 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(test_big_witness_transaction)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
492 : : {
493 : 1 : CMutableTransaction mtx;
494 : 1 : mtx.version = 1;
495 : :
496 : 1 : CKey key = GenerateRandomKey(); // Need to use compressed keys in segwit or the signing will fail
497 : 1 : FillableSigningProvider keystore;
498 [ + - + - : 2 : BOOST_CHECK(keystore.AddKeyPubKey(key, key.GetPubKey()));
+ - + - +
- ]
499 [ + - + - ]: 1 : CKeyID hash = key.GetPubKey().GetID();
500 [ + - + - ]: 2 : CScript scriptPubKey = CScript() << OP_0 << std::vector<unsigned char>(hash.begin(), hash.end());
501 : :
502 : 1 : std::vector<int> sigHashes;
503 [ + - ]: 1 : sigHashes.push_back(SIGHASH_NONE | SIGHASH_ANYONECANPAY);
504 [ + - ]: 1 : sigHashes.push_back(SIGHASH_SINGLE | SIGHASH_ANYONECANPAY);
505 [ + - ]: 1 : sigHashes.push_back(SIGHASH_ALL | SIGHASH_ANYONECANPAY);
506 [ + - ]: 1 : sigHashes.push_back(SIGHASH_NONE);
507 [ + - ]: 1 : sigHashes.push_back(SIGHASH_SINGLE);
508 [ + - ]: 1 : sigHashes.push_back(SIGHASH_ALL);
509 : :
510 : : // create a big transaction of 4500 inputs signed by the same key
511 [ + + ]: 4501 : for(uint32_t ij = 0; ij < 4500; ij++) {
512 [ - + ]: 4500 : uint32_t i = mtx.vin.size();
513 [ + - ]: 4500 : COutPoint outpoint{Txid{"0000000000000000000000000000000000000000000000000000000000000100"}, i};
514 : :
515 [ + - ]: 4500 : mtx.vin.resize(mtx.vin.size() + 1);
516 : 4500 : mtx.vin[i].prevout = outpoint;
517 : 4500 : mtx.vin[i].scriptSig = CScript();
518 : :
519 [ - + + - ]: 4500 : mtx.vout.resize(mtx.vout.size() + 1);
520 [ + - ]: 4500 : mtx.vout[i].nValue = 1000;
521 [ + - ]: 4500 : mtx.vout[i].scriptPubKey = CScript() << OP_1;
522 : : }
523 : :
524 : : // sign all inputs
525 [ - + + + ]: 4501 : for(uint32_t i = 0; i < mtx.vin.size(); i++) {
526 : 4500 : SignatureData empty;
527 [ - + + - : 4500 : bool hashSigned = SignSignature(keystore, scriptPubKey, mtx, i, 1000, sigHashes.at(i % sigHashes.size()), empty);
+ - ]
528 [ - + ]: 4500 : assert(hashSigned);
529 : 4500 : }
530 : :
531 : 1 : DataStream ssout;
532 [ + - ]: 1 : ssout << TX_WITH_WITNESS(mtx);
533 [ + - ]: 1 : CTransaction tx(deserialize, TX_WITH_WITNESS, ssout);
534 : :
535 : : // check all inputs concurrently, with the cache
536 [ + - ]: 1 : PrecomputedTransactionData txdata(tx);
537 [ + - ]: 1 : CCheckQueue<CScriptCheck> scriptcheckqueue(/*batch_size=*/128, /*worker_threads_num=*/20);
538 [ + - ]: 1 : CCheckQueueControl<CScriptCheck> control(scriptcheckqueue);
539 : :
540 : 1 : std::vector<Coin> coins;
541 [ - + + + ]: 4501 : for(uint32_t i = 0; i < mtx.vin.size(); i++) {
542 : 4500 : Coin coin;
543 : 4500 : coin.nHeight = 1;
544 : 4500 : coin.fCoinBase = false;
545 : 4500 : coin.out.nValue = 1000;
546 : 4500 : coin.out.scriptPubKey = scriptPubKey;
547 [ + - ]: 4500 : coins.emplace_back(std::move(coin));
548 : 4500 : }
549 : :
550 [ + - ]: 1 : SignatureCache signature_cache{DEFAULT_SIGNATURE_CACHE_BYTES};
551 : :
552 [ - + + + ]: 4501 : for(uint32_t i = 0; i < mtx.vin.size(); i++) {
553 : 4500 : std::vector<CScriptCheck> vChecks;
554 [ + - ]: 4500 : vChecks.emplace_back(coins[tx.vin[i].prevout.n].out, tx, signature_cache, i, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, false, &txdata);
555 [ + - ]: 4500 : control.Add(std::move(vChecks));
556 : 4500 : }
557 : :
558 [ + - ]: 1 : bool controlCheck = !control.Complete().has_value();
559 [ - + ]: 1 : assert(controlCheck);
560 : 3 : }
561 : :
562 : 4 : SignatureData CombineSignatures(const CMutableTransaction& input1, const CMutableTransaction& input2, const CTransactionRef tx)
563 : : {
564 : 4 : SignatureData sigdata;
565 [ + - ]: 4 : sigdata = DataFromTransaction(input1, 0, tx->vout[0]);
566 [ + - + - ]: 4 : sigdata.MergeSignatureData(DataFromTransaction(input2, 0, tx->vout[0]));
567 [ + - + - ]: 4 : ProduceSignature(DUMMY_SIGNING_PROVIDER, MutableTransactionSignatureCreator(input1, 0, tx->vout[0].nValue, SIGHASH_ALL), tx->vout[0].scriptPubKey, sigdata);
568 : 4 : return sigdata;
569 : 0 : }
570 : :
571 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(test_witness)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
572 : : {
573 : 1 : FillableSigningProvider keystore, keystore2;
574 : 1 : CKey key1 = GenerateRandomKey();
575 : 1 : CKey key2 = GenerateRandomKey();
576 : 1 : CKey key3 = GenerateRandomKey();
577 : 1 : CKey key1L = GenerateRandomKey(/*compressed=*/false);
578 : 1 : CKey key2L = GenerateRandomKey(/*compressed=*/false);
579 [ + - ]: 1 : CPubKey pubkey1 = key1.GetPubKey();
580 [ + - ]: 1 : CPubKey pubkey2 = key2.GetPubKey();
581 [ + - ]: 1 : CPubKey pubkey3 = key3.GetPubKey();
582 [ + - ]: 1 : CPubKey pubkey1L = key1L.GetPubKey();
583 [ + - ]: 1 : CPubKey pubkey2L = key2L.GetPubKey();
584 [ + - + - : 2 : BOOST_CHECK(keystore.AddKeyPubKey(key1, pubkey1));
+ - + - ]
585 [ + - + - : 2 : BOOST_CHECK(keystore.AddKeyPubKey(key2, pubkey2));
+ - + - ]
586 [ + - + - : 2 : BOOST_CHECK(keystore.AddKeyPubKey(key1L, pubkey1L));
+ - + - ]
587 [ + - + - : 2 : BOOST_CHECK(keystore.AddKeyPubKey(key2L, pubkey2L));
+ - + - ]
588 : 1 : CScript scriptPubkey1, scriptPubkey2, scriptPubkey1L, scriptPubkey2L, scriptMulti;
589 [ + - + - ]: 2 : scriptPubkey1 << ToByteVector(pubkey1) << OP_CHECKSIG;
590 [ + - + - ]: 2 : scriptPubkey2 << ToByteVector(pubkey2) << OP_CHECKSIG;
591 [ + - + - ]: 2 : scriptPubkey1L << ToByteVector(pubkey1L) << OP_CHECKSIG;
592 [ + - + - ]: 2 : scriptPubkey2L << ToByteVector(pubkey2L) << OP_CHECKSIG;
593 : 1 : std::vector<CPubKey> oneandthree;
594 [ + - ]: 1 : oneandthree.push_back(pubkey1);
595 [ + - ]: 1 : oneandthree.push_back(pubkey3);
596 [ + - ]: 2 : scriptMulti = GetScriptForMultisig(2, oneandthree);
597 [ + - + - : 2 : BOOST_CHECK(keystore.AddCScript(scriptPubkey1));
+ - + - ]
598 [ + - + - : 2 : BOOST_CHECK(keystore.AddCScript(scriptPubkey2));
+ - + - ]
599 [ + - + - : 2 : BOOST_CHECK(keystore.AddCScript(scriptPubkey1L));
+ - + - ]
600 [ + - + - : 2 : BOOST_CHECK(keystore.AddCScript(scriptPubkey2L));
+ - + - ]
601 [ + - + - : 2 : BOOST_CHECK(keystore.AddCScript(scriptMulti));
+ - + - ]
602 : 1 : CScript destination_script_1, destination_script_2, destination_script_1L, destination_script_2L, destination_script_multi;
603 [ + - + - ]: 2 : destination_script_1 = GetScriptForDestination(WitnessV0KeyHash(pubkey1));
604 [ + - + - ]: 2 : destination_script_2 = GetScriptForDestination(WitnessV0KeyHash(pubkey2));
605 [ + - + - ]: 2 : destination_script_1L = GetScriptForDestination(WitnessV0KeyHash(pubkey1L));
606 [ + - + - ]: 2 : destination_script_2L = GetScriptForDestination(WitnessV0KeyHash(pubkey2L));
607 [ + - + - ]: 2 : destination_script_multi = GetScriptForDestination(WitnessV0ScriptHash(scriptMulti));
608 [ + - + - : 2 : BOOST_CHECK(keystore.AddCScript(destination_script_1));
+ - + - ]
609 [ + - + - : 2 : BOOST_CHECK(keystore.AddCScript(destination_script_2));
+ - + - ]
610 [ + - + - : 2 : BOOST_CHECK(keystore.AddCScript(destination_script_1L));
+ - + - ]
611 [ + - + - : 2 : BOOST_CHECK(keystore.AddCScript(destination_script_2L));
+ - + - ]
612 [ + - + - : 2 : BOOST_CHECK(keystore.AddCScript(destination_script_multi));
+ - + - ]
613 [ + - + - : 2 : BOOST_CHECK(keystore2.AddCScript(scriptMulti));
+ - + - ]
614 [ + - + - : 2 : BOOST_CHECK(keystore2.AddCScript(destination_script_multi));
+ - + - ]
615 [ + - + - : 2 : BOOST_CHECK(keystore2.AddKeyPubKey(key3, pubkey3));
+ - + - ]
616 : :
617 : 1 : CTransactionRef output1, output2;
618 [ + - + - ]: 1 : CMutableTransaction input1, input2;
619 : :
620 : : // Normal pay-to-compressed-pubkey.
621 [ + - ]: 1 : CreateCreditAndSpend(keystore, scriptPubkey1, output1, input1);
622 [ + - ]: 1 : CreateCreditAndSpend(keystore, scriptPubkey2, output2, input2);
623 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_NONE, true);
624 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
625 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, true);
626 [ + - ]: 1 : CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
627 [ + - ]: 1 : CheckWithFlag(output1, input2, SCRIPT_VERIFY_NONE, false);
628 [ + - ]: 1 : CheckWithFlag(output1, input2, SCRIPT_VERIFY_P2SH, false);
629 [ + - ]: 1 : CheckWithFlag(output1, input2, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, false);
630 [ + - ]: 1 : CheckWithFlag(output1, input2, STANDARD_SCRIPT_VERIFY_FLAGS, false);
631 : :
632 : : // P2SH pay-to-compressed-pubkey.
633 [ + - + - : 2 : CreateCreditAndSpend(keystore, GetScriptForDestination(ScriptHash(scriptPubkey1)), output1, input1);
+ - ]
634 [ + - + - : 2 : CreateCreditAndSpend(keystore, GetScriptForDestination(ScriptHash(scriptPubkey2)), output2, input2);
+ - ]
635 [ + - ]: 1 : ReplaceRedeemScript(input2.vin[0].scriptSig, scriptPubkey1);
636 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_NONE, true);
637 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
638 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, true);
639 [ + - ]: 1 : CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
640 [ + - ]: 1 : CheckWithFlag(output1, input2, SCRIPT_VERIFY_NONE, true);
641 [ + - ]: 1 : CheckWithFlag(output1, input2, SCRIPT_VERIFY_P2SH, false);
642 [ + - ]: 1 : CheckWithFlag(output1, input2, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, false);
643 [ + - ]: 1 : CheckWithFlag(output1, input2, STANDARD_SCRIPT_VERIFY_FLAGS, false);
644 : :
645 : : // Witness pay-to-compressed-pubkey (v0).
646 [ + - ]: 1 : CreateCreditAndSpend(keystore, destination_script_1, output1, input1);
647 [ + - ]: 1 : CreateCreditAndSpend(keystore, destination_script_2, output2, input2);
648 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_NONE, true);
649 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
650 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, true);
651 [ + - ]: 1 : CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
652 [ + - ]: 1 : CheckWithFlag(output1, input2, SCRIPT_VERIFY_NONE, true);
653 [ + - ]: 1 : CheckWithFlag(output1, input2, SCRIPT_VERIFY_P2SH, true);
654 [ + - ]: 1 : CheckWithFlag(output1, input2, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, false);
655 [ + - ]: 1 : CheckWithFlag(output1, input2, STANDARD_SCRIPT_VERIFY_FLAGS, false);
656 : :
657 : : // P2SH witness pay-to-compressed-pubkey (v0).
658 [ + - + - : 2 : CreateCreditAndSpend(keystore, GetScriptForDestination(ScriptHash(destination_script_1)), output1, input1);
+ - ]
659 [ + - + - : 2 : CreateCreditAndSpend(keystore, GetScriptForDestination(ScriptHash(destination_script_2)), output2, input2);
+ - ]
660 [ + - ]: 1 : ReplaceRedeemScript(input2.vin[0].scriptSig, destination_script_1);
661 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_NONE, true);
662 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
663 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, true);
664 [ + - ]: 1 : CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
665 [ + - ]: 1 : CheckWithFlag(output1, input2, SCRIPT_VERIFY_NONE, true);
666 [ + - ]: 1 : CheckWithFlag(output1, input2, SCRIPT_VERIFY_P2SH, true);
667 [ + - ]: 1 : CheckWithFlag(output1, input2, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, false);
668 [ + - ]: 1 : CheckWithFlag(output1, input2, STANDARD_SCRIPT_VERIFY_FLAGS, false);
669 : :
670 : : // Normal pay-to-uncompressed-pubkey.
671 [ + - ]: 1 : CreateCreditAndSpend(keystore, scriptPubkey1L, output1, input1);
672 [ + - ]: 1 : CreateCreditAndSpend(keystore, scriptPubkey2L, output2, input2);
673 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_NONE, true);
674 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
675 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, true);
676 [ + - ]: 1 : CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
677 [ + - ]: 1 : CheckWithFlag(output1, input2, SCRIPT_VERIFY_NONE, false);
678 [ + - ]: 1 : CheckWithFlag(output1, input2, SCRIPT_VERIFY_P2SH, false);
679 [ + - ]: 1 : CheckWithFlag(output1, input2, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, false);
680 [ + - ]: 1 : CheckWithFlag(output1, input2, STANDARD_SCRIPT_VERIFY_FLAGS, false);
681 : :
682 : : // P2SH pay-to-uncompressed-pubkey.
683 [ + - + - : 2 : CreateCreditAndSpend(keystore, GetScriptForDestination(ScriptHash(scriptPubkey1L)), output1, input1);
+ - ]
684 [ + - + - : 2 : CreateCreditAndSpend(keystore, GetScriptForDestination(ScriptHash(scriptPubkey2L)), output2, input2);
+ - ]
685 [ + - ]: 1 : ReplaceRedeemScript(input2.vin[0].scriptSig, scriptPubkey1L);
686 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_NONE, true);
687 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
688 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, true);
689 [ + - ]: 1 : CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
690 [ + - ]: 1 : CheckWithFlag(output1, input2, SCRIPT_VERIFY_NONE, true);
691 [ + - ]: 1 : CheckWithFlag(output1, input2, SCRIPT_VERIFY_P2SH, false);
692 [ + - ]: 1 : CheckWithFlag(output1, input2, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, false);
693 [ + - ]: 1 : CheckWithFlag(output1, input2, STANDARD_SCRIPT_VERIFY_FLAGS, false);
694 : :
695 : : // Signing disabled for witness pay-to-uncompressed-pubkey (v1).
696 [ + - ]: 1 : CreateCreditAndSpend(keystore, destination_script_1L, output1, input1, false);
697 [ + - ]: 1 : CreateCreditAndSpend(keystore, destination_script_2L, output2, input2, false);
698 : :
699 : : // Signing disabled for P2SH witness pay-to-uncompressed-pubkey (v1).
700 [ + - + - : 2 : CreateCreditAndSpend(keystore, GetScriptForDestination(ScriptHash(destination_script_1L)), output1, input1, false);
+ - ]
701 [ + - + - : 2 : CreateCreditAndSpend(keystore, GetScriptForDestination(ScriptHash(destination_script_2L)), output2, input2, false);
+ - ]
702 : :
703 : : // Normal 2-of-2 multisig
704 [ + - ]: 1 : CreateCreditAndSpend(keystore, scriptMulti, output1, input1, false);
705 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_NONE, false);
706 [ + - ]: 1 : CreateCreditAndSpend(keystore2, scriptMulti, output2, input2, false);
707 [ + - ]: 1 : CheckWithFlag(output2, input2, SCRIPT_VERIFY_NONE, false);
708 [ + - + - : 2 : BOOST_CHECK(*output1 == *output2);
+ - ]
709 [ + - + - : 2 : UpdateInput(input1.vin[0], CombineSignatures(input1, input2, output1));
+ - + - ]
710 [ + - ]: 1 : CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
711 : :
712 : : // P2SH 2-of-2 multisig
713 [ + - + - : 2 : CreateCreditAndSpend(keystore, GetScriptForDestination(ScriptHash(scriptMulti)), output1, input1, false);
+ - ]
714 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_NONE, true);
715 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, false);
716 [ + - + - : 2 : CreateCreditAndSpend(keystore2, GetScriptForDestination(ScriptHash(scriptMulti)), output2, input2, false);
+ - ]
717 [ + - ]: 1 : CheckWithFlag(output2, input2, SCRIPT_VERIFY_NONE, true);
718 [ + - ]: 1 : CheckWithFlag(output2, input2, SCRIPT_VERIFY_P2SH, false);
719 [ + - + - : 2 : BOOST_CHECK(*output1 == *output2);
+ - ]
720 [ + - + - : 2 : UpdateInput(input1.vin[0], CombineSignatures(input1, input2, output1));
+ - + - ]
721 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
722 [ + - ]: 1 : CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
723 : :
724 : : // Witness 2-of-2 multisig
725 [ + - ]: 1 : CreateCreditAndSpend(keystore, destination_script_multi, output1, input1, false);
726 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_NONE, true);
727 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, false);
728 [ + - ]: 1 : CreateCreditAndSpend(keystore2, destination_script_multi, output2, input2, false);
729 [ + - ]: 1 : CheckWithFlag(output2, input2, SCRIPT_VERIFY_NONE, true);
730 [ + - ]: 1 : CheckWithFlag(output2, input2, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, false);
731 [ + - + - : 2 : BOOST_CHECK(*output1 == *output2);
+ - ]
732 [ + - + - : 2 : UpdateInput(input1.vin[0], CombineSignatures(input1, input2, output1));
+ - + - ]
733 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, true);
734 [ + - ]: 1 : CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
735 : :
736 : : // P2SH witness 2-of-2 multisig
737 [ + - + - : 2 : CreateCreditAndSpend(keystore, GetScriptForDestination(ScriptHash(destination_script_multi)), output1, input1, false);
+ - ]
738 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
739 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, false);
740 [ + - + - : 2 : CreateCreditAndSpend(keystore2, GetScriptForDestination(ScriptHash(destination_script_multi)), output2, input2, false);
+ - ]
741 [ + - ]: 1 : CheckWithFlag(output2, input2, SCRIPT_VERIFY_P2SH, true);
742 [ + - ]: 1 : CheckWithFlag(output2, input2, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, false);
743 [ + - + - : 2 : BOOST_CHECK(*output1 == *output2);
+ - ]
744 [ + - + - : 2 : UpdateInput(input1.vin[0], CombineSignatures(input1, input2, output1));
+ - + - ]
745 [ + - ]: 1 : CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, true);
746 [ + - ]: 1 : CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
747 [ + - + - ]: 4 : }
748 : :
749 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(test_IsStandard)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
750 : : {
751 : 1 : FillableSigningProvider keystore;
752 : 1 : CCoinsView coinsDummy;
753 [ + - ]: 1 : CCoinsViewCache coins(&coinsDummy);
754 : 1 : std::vector<CMutableTransaction> dummyTransactions =
755 [ + - ]: 1 : SetupDummyInputs(keystore, coins, {11*CENT, 50*CENT, 21*CENT, 22*CENT});
756 : :
757 [ + - ]: 1 : CMutableTransaction t;
758 [ + - ]: 1 : t.vin.resize(1);
759 [ + - ]: 1 : t.vin[0].prevout.hash = dummyTransactions[0].GetHash();
760 : 1 : t.vin[0].prevout.n = 1;
761 [ + - + - ]: 2 : t.vin[0].scriptSig << std::vector<unsigned char>(65, 0);
762 [ + - ]: 1 : t.vout.resize(1);
763 : 1 : t.vout[0].nValue = 90*CENT;
764 : 1 : CKey key = GenerateRandomKey();
765 [ + - + - : 1 : t.vout[0].scriptPubKey = GetScriptForDestination(PKHash(key.GetPubKey()));
+ - ]
766 : :
767 [ + - ]: 51 : constexpr auto CheckIsStandard = [](const auto& t, const unsigned int max_op_return_relay = MAX_OP_RETURN_RELAY) {
768 : 50 : std::string reason;
769 [ + - + - : 150 : BOOST_CHECK(IsStandardTx(CTransaction{t}, max_op_return_relay, g_bare_multi, g_dust, reason));
+ - + - +
- ]
770 [ + - + - ]: 100 : BOOST_CHECK(reason.empty());
771 : 50 : };
772 [ + - ]: 102 : constexpr auto CheckIsNotStandard = [](const auto& t, const std::string& reason_in, const unsigned int max_op_return_relay = MAX_OP_RETURN_RELAY) {
773 : 101 : std::string reason;
774 [ + - + - : 303 : BOOST_CHECK(!IsStandardTx(CTransaction{t}, max_op_return_relay, g_bare_multi, g_dust, reason));
+ - + - +
- ]
775 [ + - + - ]: 101 : BOOST_CHECK_EQUAL(reason_in, reason);
776 : 101 : };
777 : :
778 [ + - ]: 1 : CheckIsStandard(t);
779 : :
780 : : // Check dust with default relay fee:
781 [ + - ]: 1 : CAmount nDustThreshold = 182 * g_dust.GetFeePerK() / 1000;
782 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(nDustThreshold, 546);
783 : :
784 : : // Add dust outputs up to allowed maximum, still standard!
785 [ + + ]: 2 : for (size_t i{0}; i < MAX_DUST_OUTPUTS_PER_TX; ++i) {
786 [ + - ]: 1 : t.vout.emplace_back(0, t.vout[0].scriptPubKey);
787 [ + - ]: 1 : CheckIsStandard(t);
788 : : }
789 : :
790 : : // dust:
791 [ + - ]: 1 : t.vout[0].nValue = nDustThreshold - 1;
792 [ + - + - ]: 1 : CheckIsNotStandard(t, "dust");
793 : : // not dust:
794 [ + - ]: 1 : t.vout[0].nValue = nDustThreshold;
795 [ + - ]: 1 : CheckIsStandard(t);
796 : :
797 : : // Disallowed version
798 : 1 : t.version = std::numeric_limits<uint32_t>::max();
799 [ + - + - ]: 1 : CheckIsNotStandard(t, "version");
800 : :
801 : 1 : t.version = 0;
802 [ + - + - ]: 1 : CheckIsNotStandard(t, "version");
803 : :
804 : 1 : t.version = TX_MAX_STANDARD_VERSION + 1;
805 [ + - + - ]: 1 : CheckIsNotStandard(t, "version");
806 : :
807 : : // Allowed version
808 : 1 : t.version = 1;
809 [ + - ]: 1 : CheckIsStandard(t);
810 : :
811 : 1 : t.version = 2;
812 [ + - ]: 1 : CheckIsStandard(t);
813 : :
814 : : // Check dust with odd relay fee to verify rounding:
815 : : // nDustThreshold = 182 * 3702 / 1000
816 [ + - ]: 1 : g_dust = CFeeRate(3702);
817 : : // dust:
818 [ + - ]: 1 : t.vout[0].nValue = 674 - 1;
819 [ + - + - ]: 1 : CheckIsNotStandard(t, "dust");
820 : : // not dust:
821 [ + - ]: 1 : t.vout[0].nValue = 674;
822 [ + - ]: 1 : CheckIsStandard(t);
823 [ + - ]: 1 : g_dust = CFeeRate{DUST_RELAY_TX_FEE};
824 : :
825 [ + - ]: 1 : t.vout[0].scriptPubKey = CScript() << OP_1;
826 [ + - + - ]: 1 : CheckIsNotStandard(t, "scriptpubkey");
827 : :
828 : : // Custom 83-byte TxoutType::NULL_DATA (standard with max_op_return_relay of 83)
829 [ + - ]: 1 : t.vout[0].scriptPubKey = CScript() << OP_RETURN << "04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef3804678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38"_hex;
830 [ + - + - : 2 : BOOST_CHECK_EQUAL(83, t.vout[0].scriptPubKey.size());
+ - ]
831 [ + - ]: 1 : CheckIsStandard(t, /*max_op_return_relay=*/83);
832 : :
833 : : // Non-standard if max_op_return_relay datacarrier arg is one less
834 [ + - + - ]: 1 : CheckIsNotStandard(t, "datacarrier", /*max_op_return_relay=*/82);
835 : :
836 : : // Data payload can be encoded in any way...
837 [ + - ]: 1 : t.vout[0].scriptPubKey = CScript() << OP_RETURN << ""_hex;
838 [ + - ]: 1 : CheckIsStandard(t);
839 [ + - ]: 1 : t.vout[0].scriptPubKey = CScript() << OP_RETURN << "00"_hex << "01"_hex;
840 [ + - ]: 1 : CheckIsStandard(t);
841 : : // OP_RESERVED *is* considered to be a PUSHDATA type opcode by IsPushOnly()!
842 [ + - + - : 1 : t.vout[0].scriptPubKey = CScript() << OP_RETURN << OP_RESERVED << -1 << 0 << "01"_hex << 2 << 3 << 4 << 5 << 6 << 7 << 8 << 9 << 10 << 11 << 12 << 13 << 14 << 15 << 16;
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - +
- + - + -
+ - + - ]
843 [ + - ]: 1 : CheckIsStandard(t);
844 [ + - + - : 1 : t.vout[0].scriptPubKey = CScript() << OP_RETURN << 0 << "01"_hex << 2 << "ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"_hex;
+ - ]
845 [ + - ]: 1 : CheckIsStandard(t);
846 : :
847 : : // ...so long as it only contains PUSHDATA's
848 [ + - + - ]: 1 : t.vout[0].scriptPubKey = CScript() << OP_RETURN << OP_RETURN;
849 [ + - + - ]: 1 : CheckIsNotStandard(t, "scriptpubkey");
850 : :
851 : : // TxoutType::NULL_DATA w/o PUSHDATA
852 [ + - ]: 1 : t.vout.resize(1);
853 [ + - ]: 1 : t.vout[0].scriptPubKey = CScript() << OP_RETURN;
854 [ + - ]: 1 : CheckIsStandard(t);
855 : :
856 : : // Multiple TxoutType::NULL_DATA are permitted
857 [ + - ]: 1 : t.vout.resize(2);
858 [ + - ]: 1 : t.vout[0].scriptPubKey = CScript() << OP_RETURN << "04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38"_hex;
859 [ + - ]: 1 : t.vout[0].nValue = 0;
860 [ + - ]: 1 : t.vout[1].scriptPubKey = CScript() << OP_RETURN << "04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38"_hex;
861 [ + - ]: 1 : t.vout[1].nValue = 0;
862 [ + - ]: 1 : CheckIsStandard(t);
863 : :
864 [ + - ]: 1 : t.vout[0].scriptPubKey = CScript() << OP_RETURN << "04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38"_hex;
865 [ + - ]: 1 : t.vout[1].scriptPubKey = CScript() << OP_RETURN;
866 [ + - ]: 1 : CheckIsStandard(t);
867 : :
868 [ + - ]: 1 : t.vout[0].scriptPubKey = CScript() << OP_RETURN;
869 [ + - ]: 1 : t.vout[1].scriptPubKey = CScript() << OP_RETURN;
870 [ + - ]: 1 : CheckIsStandard(t);
871 : :
872 [ + - ]: 1 : t.vout[0].scriptPubKey = CScript() << OP_RETURN << "04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef3804678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38"_hex;
873 [ + - ]: 1 : t.vout[1].scriptPubKey = CScript() << OP_RETURN << "04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef3804678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38"_hex;
874 [ + - + - ]: 2 : const auto datacarrier_size = t.vout[0].scriptPubKey.size() + t.vout[1].scriptPubKey.size();
875 [ + - ]: 1 : CheckIsStandard(t); // Default max relay should never trigger
876 [ + - ]: 1 : CheckIsStandard(t, /*max_op_return_relay=*/datacarrier_size);
877 [ + - + - ]: 1 : CheckIsNotStandard(t, "datacarrier", /*max_op_return_relay=*/datacarrier_size-1);
878 : :
879 : : // Check large scriptSig (non-standard if size is >1650 bytes)
880 [ + - ]: 1 : t.vout.resize(1);
881 [ + - ]: 1 : t.vout[0].nValue = MAX_MONEY;
882 [ + - + - : 1 : t.vout[0].scriptPubKey = GetScriptForDestination(PKHash(key.GetPubKey()));
+ - ]
883 : : // OP_PUSHDATA2 with len (3 bytes) + data (1647 bytes) = 1650 bytes
884 [ + - ]: 2 : t.vin[0].scriptSig = CScript() << std::vector<unsigned char>(1647, 0); // 1650
885 [ + - ]: 1 : CheckIsStandard(t);
886 : :
887 [ + - ]: 2 : t.vin[0].scriptSig = CScript() << std::vector<unsigned char>(1648, 0); // 1651
888 [ + - + - ]: 1 : CheckIsNotStandard(t, "scriptsig-size");
889 : :
890 : : // Check scriptSig format (non-standard if there are any other ops than just PUSHs)
891 : 1 : t.vin[0].scriptSig = CScript()
892 [ + - + - : 1 : << OP_TRUE << OP_0 << OP_1NEGATE << OP_16 // OP_n (single byte pushes: n = 1, 0, -1, 16)
+ - + - ]
893 [ + - ]: 3 : << std::vector<unsigned char>(75, 0) // OP_PUSHx [...x bytes...]
894 [ + - ]: 3 : << std::vector<unsigned char>(235, 0) // OP_PUSHDATA1 x [...x bytes...]
895 [ + - ]: 3 : << std::vector<unsigned char>(1234, 0) // OP_PUSHDATA2 x [...x bytes...]
896 [ + - ]: 1 : << OP_9;
897 [ + - ]: 1 : CheckIsStandard(t);
898 : :
899 : 1 : const std::vector<unsigned char> non_push_ops = { // arbitrary set of non-push operations
900 : : OP_NOP, OP_VERIFY, OP_IF, OP_ROT, OP_3DUP, OP_SIZE, OP_EQUAL, OP_ADD, OP_SUB,
901 [ + - ]: 1 : OP_HASH256, OP_CODESEPARATOR, OP_CHECKSIG, OP_CHECKLOCKTIMEVERIFY };
902 : :
903 [ - + ]: 2 : CScript::const_iterator pc = t.vin[0].scriptSig.begin();
904 [ + + + + ]: 18 : while (pc < t.vin[0].scriptSig.end()) {
905 : 8 : opcodetype opcode;
906 : 8 : CScript::const_iterator prev_pc = pc;
907 [ + - ]: 8 : t.vin[0].scriptSig.GetOp(pc, opcode); // advance to next op
908 : : // for the sake of simplicity, we only replace single-byte push operations
909 [ + + ]: 8 : if (opcode >= 1 && opcode <= OP_PUSHDATA4)
910 : 3 : continue;
911 : :
912 [ - + ]: 10 : int index = prev_pc - t.vin[0].scriptSig.begin();
913 : 5 : unsigned char orig_op = *prev_pc; // save op
914 : : // replace current push-op with each non-push-op
915 [ + + ]: 70 : for (auto op : non_push_ops) {
916 [ - + ]: 65 : t.vin[0].scriptSig[index] = op;
917 [ + - + - ]: 130 : CheckIsNotStandard(t, "scriptsig-not-pushonly");
918 : : }
919 [ - + ]: 5 : t.vin[0].scriptSig[index] = orig_op; // restore op
920 [ + - ]: 5 : CheckIsStandard(t);
921 : : }
922 : :
923 : : // Check tx-size (non-standard if transaction weight is > MAX_STANDARD_TX_WEIGHT)
924 : 1 : t.vin.clear();
925 [ + - ]: 1 : t.vin.resize(2438); // size per input (empty scriptSig): 41 bytes
926 [ + - + - ]: 2 : t.vout[0].scriptPubKey = CScript() << OP_RETURN << std::vector<unsigned char>(19, 0); // output size: 30 bytes
927 : : // tx header: 12 bytes => 48 weight units
928 : : // 2438 inputs: 2438*41 = 99958 bytes => 399832 weight units
929 : : // 1 output: 30 bytes => 120 weight units
930 : : // ======================================
931 : : // total: 400000 weight units
932 [ + - + - : 1 : BOOST_CHECK_EQUAL(GetTransactionWeight(CTransaction(t)), 400000);
+ - ]
933 [ + - ]: 1 : CheckIsStandard(t);
934 : :
935 : : // increase output size by one byte, so we end up with 400004 weight units
936 [ + - + - ]: 2 : t.vout[0].scriptPubKey = CScript() << OP_RETURN << std::vector<unsigned char>(20, 0); // output size: 31 bytes
937 [ + - + - : 1 : BOOST_CHECK_EQUAL(GetTransactionWeight(CTransaction(t)), 400004);
+ - ]
938 [ + - + - ]: 1 : CheckIsNotStandard(t, "tx-size");
939 : :
940 : : // Check bare multisig (standard if policy flag g_bare_multi is set)
941 : 1 : g_bare_multi = true;
942 [ + - + - : 1 : t.vout[0].scriptPubKey = GetScriptForMultisig(1, {key.GetPubKey()}); // simple 1-of-1
+ - + - ]
943 [ + - ]: 1 : t.vin.resize(1);
944 [ + - ]: 2 : t.vin[0].scriptSig = CScript() << std::vector<unsigned char>(65, 0);
945 [ + - ]: 1 : CheckIsStandard(t);
946 : :
947 : 1 : g_bare_multi = false;
948 [ + - + - ]: 1 : CheckIsNotStandard(t, "bare-multisig");
949 : 1 : g_bare_multi = DEFAULT_PERMIT_BAREMULTISIG;
950 : :
951 : : // Add dust outputs up to allowed maximum
952 [ - + - + ]: 1 : assert(t.vout.size() == 1);
953 [ + - + - ]: 2 : t.vout.insert(t.vout.end(), MAX_DUST_OUTPUTS_PER_TX, {0, t.vout[0].scriptPubKey});
954 : :
955 : : // Check compressed P2PK outputs dust threshold (must have leading 02 or 03)
956 [ + - + - ]: 2 : t.vout[0].scriptPubKey = CScript() << std::vector<unsigned char>(33, 0x02) << OP_CHECKSIG;
957 [ + - ]: 1 : t.vout[0].nValue = 576;
958 [ + - ]: 1 : CheckIsStandard(t);
959 [ + - ]: 1 : t.vout[0].nValue = 575;
960 [ + - + - ]: 1 : CheckIsNotStandard(t, "dust");
961 : :
962 : : // Check uncompressed P2PK outputs dust threshold (must have leading 04/06/07)
963 [ + - + - ]: 2 : t.vout[0].scriptPubKey = CScript() << std::vector<unsigned char>(65, 0x04) << OP_CHECKSIG;
964 [ + - ]: 1 : t.vout[0].nValue = 672;
965 [ + - ]: 1 : CheckIsStandard(t);
966 [ + - ]: 1 : t.vout[0].nValue = 671;
967 [ + - + - ]: 1 : CheckIsNotStandard(t, "dust");
968 : :
969 : : // Check P2PKH outputs dust threshold
970 [ + - + - : 2 : t.vout[0].scriptPubKey = CScript() << OP_DUP << OP_HASH160 << std::vector<unsigned char>(20, 0) << OP_EQUALVERIFY << OP_CHECKSIG;
+ - + - +
- ]
971 [ + - ]: 1 : t.vout[0].nValue = 546;
972 [ + - ]: 1 : CheckIsStandard(t);
973 [ + - ]: 1 : t.vout[0].nValue = 545;
974 [ + - + - ]: 1 : CheckIsNotStandard(t, "dust");
975 : :
976 : : // Check P2SH outputs dust threshold
977 [ + - + - : 2 : t.vout[0].scriptPubKey = CScript() << OP_HASH160 << std::vector<unsigned char>(20, 0) << OP_EQUAL;
+ - ]
978 [ + - ]: 1 : t.vout[0].nValue = 540;
979 [ + - ]: 1 : CheckIsStandard(t);
980 [ + - ]: 1 : t.vout[0].nValue = 539;
981 [ + - + - ]: 1 : CheckIsNotStandard(t, "dust");
982 : :
983 : : // Check P2WPKH outputs dust threshold
984 [ + - + - ]: 2 : t.vout[0].scriptPubKey = CScript() << OP_0 << std::vector<unsigned char>(20, 0);
985 [ + - ]: 1 : t.vout[0].nValue = 294;
986 [ + - ]: 1 : CheckIsStandard(t);
987 [ + - ]: 1 : t.vout[0].nValue = 293;
988 [ + - + - ]: 1 : CheckIsNotStandard(t, "dust");
989 : :
990 : : // Check P2WSH outputs dust threshold
991 [ + - + - ]: 2 : t.vout[0].scriptPubKey = CScript() << OP_0 << std::vector<unsigned char>(32, 0);
992 [ + - ]: 1 : t.vout[0].nValue = 330;
993 [ + - ]: 1 : CheckIsStandard(t);
994 [ + - ]: 1 : t.vout[0].nValue = 329;
995 [ + - + - ]: 1 : CheckIsNotStandard(t, "dust");
996 : :
997 : : // Check P2TR outputs dust threshold (Invalid xonly key ok!)
998 [ + - + - ]: 2 : t.vout[0].scriptPubKey = CScript() << OP_1 << std::vector<unsigned char>(32, 0);
999 [ + - ]: 1 : t.vout[0].nValue = 330;
1000 [ + - ]: 1 : CheckIsStandard(t);
1001 [ + - ]: 1 : t.vout[0].nValue = 329;
1002 [ + - + - ]: 1 : CheckIsNotStandard(t, "dust");
1003 : :
1004 : : // Check future Witness Program versions dust threshold (non-32-byte pushes are undefined for version 1)
1005 [ + + ]: 17 : for (int op = OP_1; op <= OP_16; op += 1) {
1006 [ + - + - ]: 32 : t.vout[0].scriptPubKey = CScript() << (opcodetype)op << std::vector<unsigned char>(2, 0);
1007 [ + - ]: 16 : t.vout[0].nValue = 240;
1008 [ + - ]: 16 : CheckIsStandard(t);
1009 : :
1010 [ + - ]: 16 : t.vout[0].nValue = 239;
1011 [ + - + - ]: 32 : CheckIsNotStandard(t, "dust");
1012 : : }
1013 : :
1014 : : // Check anchor outputs
1015 [ + - - + ]: 1 : t.vout[0].scriptPubKey = CScript() << OP_1 << ANCHOR_BYTES;
1016 [ + - + - : 2 : BOOST_CHECK(t.vout[0].scriptPubKey.IsPayToAnchor());
+ - + - ]
1017 [ + - ]: 1 : t.vout[0].nValue = 240;
1018 [ + - ]: 1 : CheckIsStandard(t);
1019 [ + - ]: 1 : t.vout[0].nValue = 239;
1020 [ + - + - ]: 2 : CheckIsNotStandard(t, "dust");
1021 : 2 : }
1022 : :
1023 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(max_standard_legacy_sigops)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
1024 : : {
1025 : 1 : CCoinsView coins_dummy;
1026 [ + - ]: 1 : CCoinsViewCache coins(&coins_dummy);
1027 : 1 : CKey key;
1028 [ + - ]: 1 : key.MakeNewKey(true);
1029 : :
1030 : : // Create a pathological P2SH script padded with as many sigops as is standard.
1031 [ + - ]: 1 : CScript max_sigops_redeem_script{CScript() << std::vector<unsigned char>{} << key.GetPubKey()};
1032 [ + - + - : 15 : for (unsigned i{0}; i < MAX_P2SH_SIGOPS - 1; ++i) max_sigops_redeem_script << OP_2DUP << OP_CHECKSIG << OP_DROP;
+ - + + ]
1033 [ + - + - ]: 1 : max_sigops_redeem_script << OP_CHECKSIG << OP_NOT;
1034 [ + - + - ]: 1 : const CScript max_sigops_p2sh{GetScriptForDestination(ScriptHash(max_sigops_redeem_script))};
1035 : :
1036 : : // Create a transaction fanning out as many such P2SH outputs as is standard to spend in a
1037 : : // single transaction, and a transaction spending them.
1038 [ + - + - ]: 1 : CMutableTransaction tx_create, tx_max_sigops;
1039 : 1 : const unsigned p2sh_inputs_count{MAX_TX_LEGACY_SIGOPS / MAX_P2SH_SIGOPS};
1040 [ + - ]: 1 : tx_create.vout.reserve(p2sh_inputs_count);
1041 [ + + ]: 167 : for (unsigned i{0}; i < p2sh_inputs_count; ++i) {
1042 [ + - ]: 166 : tx_create.vout.emplace_back(424242 + i, max_sigops_p2sh);
1043 : : }
1044 [ + - ]: 1 : auto prev_txid{tx_create.GetHash()};
1045 [ + - ]: 1 : tx_max_sigops.vin.reserve(p2sh_inputs_count);
1046 [ + + ]: 167 : for (unsigned i{0}; i < p2sh_inputs_count; ++i) {
1047 [ + - + - ]: 498 : tx_max_sigops.vin.emplace_back(prev_txid, i, CScript() << ToByteVector(max_sigops_redeem_script));
1048 : : }
1049 : :
1050 : : // p2sh_inputs_count is truncated to 166 (from 166.6666..)
1051 [ + - + - ]: 1 : BOOST_CHECK_LT(p2sh_inputs_count * MAX_P2SH_SIGOPS, MAX_TX_LEGACY_SIGOPS);
1052 [ + - + - ]: 1 : AddCoins(coins, CTransaction(tx_create), 0, false);
1053 : :
1054 : : // 2490 sigops is below the limit.
1055 [ + - + - : 1 : BOOST_CHECK_EQUAL(GetP2SHSigOpCount(CTransaction(tx_max_sigops), coins), 2490);
+ - + - ]
1056 [ + - + - : 3 : BOOST_CHECK(::AreInputsStandard(CTransaction(tx_max_sigops), coins));
+ - + - +
- ]
1057 : :
1058 : : // Adding one more input will bump this to 2505, hitting the limit.
1059 [ + - ]: 1 : tx_create.vout.emplace_back(424242, max_sigops_p2sh);
1060 [ + - ]: 1 : prev_txid = tx_create.GetHash();
1061 [ + + ]: 167 : for (unsigned i{0}; i < p2sh_inputs_count; ++i) {
1062 [ + - + - ]: 498 : tx_max_sigops.vin[i] = CTxIn(COutPoint(prev_txid, i), CScript() << ToByteVector(max_sigops_redeem_script));
1063 : : }
1064 [ + - + - ]: 3 : tx_max_sigops.vin.emplace_back(prev_txid, p2sh_inputs_count, CScript() << ToByteVector(max_sigops_redeem_script));
1065 [ + - + - ]: 1 : AddCoins(coins, CTransaction(tx_create), 0, false);
1066 [ + - + - ]: 1 : BOOST_CHECK_GT((p2sh_inputs_count + 1) * MAX_P2SH_SIGOPS, MAX_TX_LEGACY_SIGOPS);
1067 [ + - + - : 1 : BOOST_CHECK_EQUAL(GetP2SHSigOpCount(CTransaction(tx_max_sigops), coins), 2505);
+ - + - ]
1068 [ + - + - : 3 : BOOST_CHECK(!::AreInputsStandard(CTransaction(tx_max_sigops), coins));
+ - + - +
- ]
1069 : :
1070 : : // Now, check the limit can be reached with regular P2PK outputs too. Use a separate
1071 : : // preparation transaction, to demonstrate spending coins from a single tx is irrelevant.
1072 [ + - ]: 1 : CMutableTransaction tx_create_p2pk;
1073 [ + - + - ]: 1 : const auto p2pk_script{CScript() << key.GetPubKey() << OP_CHECKSIG};
1074 : 1 : unsigned p2pk_inputs_count{10}; // From 2490 to 2500.
1075 [ + + ]: 11 : for (unsigned i{0}; i < p2pk_inputs_count; ++i) {
1076 [ + - ]: 10 : tx_create_p2pk.vout.emplace_back(212121 + i, p2pk_script);
1077 : : }
1078 [ + - ]: 1 : prev_txid = tx_create_p2pk.GetHash();
1079 [ + - ]: 1 : tx_max_sigops.vin.resize(p2sh_inputs_count); // Drop the extra input.
1080 [ + + ]: 11 : for (unsigned i{0}; i < p2pk_inputs_count; ++i) {
1081 [ + - ]: 10 : tx_max_sigops.vin.emplace_back(prev_txid, i);
1082 : : }
1083 [ + - + - ]: 1 : AddCoins(coins, CTransaction(tx_create_p2pk), 0, false);
1084 : :
1085 : : // The transaction now contains exactly 2500 sigops, the check should pass.
1086 [ + - + - ]: 1 : BOOST_CHECK_EQUAL(p2sh_inputs_count * MAX_P2SH_SIGOPS + p2pk_inputs_count * 1, MAX_TX_LEGACY_SIGOPS);
1087 [ + - + - : 3 : BOOST_CHECK(::AreInputsStandard(CTransaction(tx_max_sigops), coins));
+ - + - +
- ]
1088 : :
1089 : : // Now, add some Segwit inputs. We add one for each defined Segwit output type. The limit
1090 : : // is exclusively on non-witness sigops and therefore those should not be counted.
1091 [ + - ]: 1 : CMutableTransaction tx_create_segwit;
1092 [ + - + - ]: 1 : const auto witness_script{CScript() << key.GetPubKey() << OP_CHECKSIG};
1093 [ + - + - : 2 : tx_create_segwit.vout.emplace_back(121212, GetScriptForDestination(WitnessV0KeyHash(key.GetPubKey())));
+ - + - ]
1094 [ + - + - : 2 : tx_create_segwit.vout.emplace_back(131313, GetScriptForDestination(WitnessV0ScriptHash(witness_script)));
+ - ]
1095 [ + - + - : 2 : tx_create_segwit.vout.emplace_back(141414, GetScriptForDestination(WitnessV1Taproot{XOnlyPubKey(key.GetPubKey())}));
+ - ]
1096 [ + - ]: 1 : prev_txid = tx_create_segwit.GetHash();
1097 [ - + + + ]: 4 : for (unsigned i{0}; i < tx_create_segwit.vout.size(); ++i) {
1098 [ + - ]: 3 : tx_max_sigops.vin.emplace_back(prev_txid, i);
1099 : : }
1100 : :
1101 : : // The transaction now still contains exactly 2500 sigops, the check should pass.
1102 [ + - + - ]: 1 : AddCoins(coins, CTransaction(tx_create_segwit), 0, false);
1103 [ + - + - : 3 : BOOST_REQUIRE(::AreInputsStandard(CTransaction(tx_max_sigops), coins));
+ - + - +
- ]
1104 : :
1105 : : // Add one more P2PK input. We'll reach the limit.
1106 [ + - ]: 1 : tx_create_p2pk.vout.emplace_back(212121, p2pk_script);
1107 [ + - ]: 1 : prev_txid = tx_create_p2pk.GetHash();
1108 [ + - ]: 1 : tx_max_sigops.vin.resize(p2sh_inputs_count);
1109 : 1 : ++p2pk_inputs_count;
1110 [ + + ]: 12 : for (unsigned i{0}; i < p2pk_inputs_count; ++i) {
1111 [ + - ]: 11 : tx_max_sigops.vin.emplace_back(prev_txid, i);
1112 : : }
1113 [ + - + - ]: 1 : AddCoins(coins, CTransaction(tx_create_p2pk), 0, false);
1114 [ + - + - ]: 1 : BOOST_CHECK_GT(p2sh_inputs_count * MAX_P2SH_SIGOPS + p2pk_inputs_count * 1, MAX_TX_LEGACY_SIGOPS);
1115 [ + - + - : 3 : BOOST_CHECK(!::AreInputsStandard(CTransaction(tx_max_sigops), coins));
+ - + - ]
1116 : 5 : }
1117 : :
1118 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(checktxinputs_invalid_transactions_test)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
1119 : : {
1120 : 4 : auto check_invalid{[](CAmount input_value, CAmount output_value, bool coinbase, int spend_height, TxValidationResult expected_result, std::string_view expected_reason) {
1121 : 3 : CCoinsView coins_dummy;
1122 [ + - ]: 3 : CCoinsViewCache inputs(&coins_dummy);
1123 : :
1124 [ + - ]: 3 : const COutPoint prevout{Txid::FromUint256(uint256::ONE), 0};
1125 [ + - + - : 6 : inputs.AddCoin(prevout, Coin{{input_value, CScript() << OP_TRUE}, /*nHeightIn=*/1, coinbase}, /*possible_overwrite=*/false);
+ - ]
1126 : :
1127 [ + - ]: 3 : CMutableTransaction mtx;
1128 [ + - ]: 3 : mtx.vin.emplace_back(prevout);
1129 [ + - + - ]: 3 : mtx.vout.emplace_back(output_value, CScript() << OP_TRUE);
1130 : :
1131 [ + - ]: 3 : TxValidationState state;
1132 : 3 : CAmount txfee{0};
1133 [ + - + - : 9 : BOOST_CHECK(!Consensus::CheckTxInputs(CTransaction{mtx}, state, inputs, spend_height, txfee));
+ - + - +
- ]
1134 [ + - + - : 6 : BOOST_CHECK(state.IsInvalid());
+ - ]
1135 [ + - + - ]: 3 : BOOST_CHECK_EQUAL(state.GetResult(), expected_result);
1136 [ + - - + : 6 : BOOST_CHECK_EQUAL(state.GetRejectReason(), expected_reason);
+ - ]
1137 : 6 : }};
1138 : :
1139 : 1 : check_invalid(/*input_value=*/MAX_MONEY + 1,
1140 : : /*output_value=*/0,
1141 : : /*coinbase=*/false,
1142 : : /*spend_height=*/2,
1143 : : TxValidationResult::TX_CONSENSUS, /*expected_reason=*/"bad-txns-inputvalues-outofrange");
1144 : :
1145 : 1 : check_invalid(/*input_value=*/1 * COIN,
1146 : : /*output_value=*/2 * COIN,
1147 : : /*coinbase=*/false,
1148 : : /*spend_height=*/2,
1149 : : TxValidationResult::TX_CONSENSUS, /*expected_reason=*/"bad-txns-in-belowout");
1150 : :
1151 : 1 : check_invalid(/*input_value=*/1 * COIN,
1152 : : /*output_value=*/0,
1153 : : /*coinbase=*/true,
1154 : : /*spend_height=*/COINBASE_MATURITY,
1155 : : TxValidationResult::TX_PREMATURE_SPEND, /*expected_reason=*/"bad-txns-premature-spend-of-coinbase");
1156 : 1 : }
1157 : :
1158 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(getvalueout_out_of_range_throws)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
1159 : : {
1160 : 1 : CMutableTransaction mtx;
1161 [ + - + - ]: 1 : mtx.vout.emplace_back(MAX_MONEY + 1, CScript() << OP_TRUE);
1162 : :
1163 [ + - ]: 1 : const CTransaction tx{mtx};
1164 [ + - - + : 2 : BOOST_CHECK_EXCEPTION(tx.GetValueOut(), std::runtime_error, HasReason("GetValueOut: value out of range"));
- - - - -
+ + - + -
+ - ]
1165 : 2 : }
1166 : :
1167 : : /** Sanity check the return value of SpendsNonAnchorWitnessProg for various output types. */
1168 [ + - + - : 7 : BOOST_AUTO_TEST_CASE(spends_witness_prog)
+ - + - -
+ + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- + - + -
+ - + - +
- + - - +
+ - + - +
- + - + -
+ - - + +
- ]
1169 : : {
1170 : 1 : CCoinsView coins_dummy;
1171 [ + - ]: 1 : CCoinsViewCache coins(&coins_dummy);
1172 : 1 : CKey key;
1173 [ + - ]: 1 : key.MakeNewKey(true);
1174 [ + - ]: 1 : const CPubKey pubkey{key.GetPubKey()};
1175 [ + - + - ]: 1 : CMutableTransaction tx_create{}, tx_spend{};
1176 [ + - ]: 1 : tx_create.vout.emplace_back(0, CScript{});
1177 [ + - ]: 1 : tx_spend.vin.emplace_back(Txid{}, 0);
1178 : 1 : std::vector<std::vector<uint8_t>> sol_dummy;
1179 : :
1180 : : // CNoDestination, PubKeyDestination, PKHash, ScriptHash, WitnessV0ScriptHash, WitnessV0KeyHash,
1181 : : // WitnessV1Taproot, PayToAnchor, WitnessUnknown.
1182 : 1 : static_assert(std::variant_size_v<CTxDestination> == 9);
1183 : :
1184 : : // Go through all defined output types and sanity check SpendsNonAnchorWitnessProg.
1185 : :
1186 : : // P2PK
1187 [ + - ]: 1 : tx_create.vout[0].scriptPubKey = GetScriptForDestination(PubKeyDestination{pubkey});
1188 [ + - + - : 1 : BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::PUBKEY);
+ - ]
1189 [ + - ]: 1 : tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1190 [ + - + - ]: 1 : AddCoins(coins, CTransaction{tx_create}, 0, false);
1191 [ + - + - : 3 : BOOST_CHECK(!::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
+ - + - +
- ]
1192 : :
1193 : : // P2PKH
1194 [ + - + - ]: 1 : tx_create.vout[0].scriptPubKey = GetScriptForDestination(PKHash{pubkey});
1195 [ + - + - : 1 : BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::PUBKEYHASH);
+ - ]
1196 [ + - ]: 1 : tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1197 [ + - + - ]: 1 : AddCoins(coins, CTransaction{tx_create}, 0, false);
1198 [ + - + - : 3 : BOOST_CHECK(!::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
+ - + - +
- ]
1199 : :
1200 : : // P2SH
1201 [ + - + - ]: 1 : auto redeem_script{CScript{} << OP_1 << OP_CHECKSIG};
1202 [ + - + - ]: 1 : tx_create.vout[0].scriptPubKey = GetScriptForDestination(ScriptHash{redeem_script});
1203 [ + - + - : 1 : BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::SCRIPTHASH);
+ - ]
1204 [ + - ]: 1 : tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1205 [ + - + - ]: 2 : tx_spend.vin[0].scriptSig = CScript{} << OP_0 << ToByteVector(redeem_script);
1206 [ + - + - ]: 1 : AddCoins(coins, CTransaction{tx_create}, 0, false);
1207 [ + - + - : 3 : BOOST_CHECK(!::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
+ - + - ]
1208 : 1 : tx_spend.vin[0].scriptSig.clear();
1209 : :
1210 : : // native P2WSH
1211 [ + - + - : 1 : const auto witness_script{CScript{} << OP_12 << OP_HASH160 << OP_DUP << OP_EQUAL};
+ - + - ]
1212 [ + - + - ]: 1 : tx_create.vout[0].scriptPubKey = GetScriptForDestination(WitnessV0ScriptHash{witness_script});
1213 [ + - + - : 1 : BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::WITNESS_V0_SCRIPTHASH);
+ - ]
1214 [ + - ]: 1 : tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1215 [ + - + - ]: 1 : AddCoins(coins, CTransaction{tx_create}, 0, false);
1216 [ + - + - : 3 : BOOST_CHECK(::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
+ - + - ]
1217 : :
1218 : : // P2SH-wrapped P2WSH
1219 : 1 : redeem_script = tx_create.vout[0].scriptPubKey;
1220 [ + - + - ]: 1 : tx_create.vout[0].scriptPubKey = GetScriptForDestination(ScriptHash(redeem_script));
1221 [ + - + - : 1 : BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::SCRIPTHASH);
+ - ]
1222 [ + - ]: 1 : tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1223 [ + - ]: 2 : tx_spend.vin[0].scriptSig = CScript{} << ToByteVector(redeem_script);
1224 [ + - + - ]: 1 : AddCoins(coins, CTransaction{tx_create}, 0, false);
1225 [ + - + - : 3 : BOOST_CHECK(::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
+ - + - ]
1226 : 1 : tx_spend.vin[0].scriptSig.clear();
1227 [ + - + - : 3 : BOOST_CHECK(!::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
+ - + - +
- ]
1228 : :
1229 : : // native P2WPKH
1230 [ + - + - ]: 1 : tx_create.vout[0].scriptPubKey = GetScriptForDestination(WitnessV0KeyHash{pubkey});
1231 [ + - + - : 1 : BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::WITNESS_V0_KEYHASH);
+ - ]
1232 [ + - ]: 1 : tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1233 [ + - + - ]: 1 : AddCoins(coins, CTransaction{tx_create}, 0, false);
1234 [ + - + - : 3 : BOOST_CHECK(::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
+ - + - ]
1235 : :
1236 : : // P2SH-wrapped P2WPKH
1237 : 1 : redeem_script = tx_create.vout[0].scriptPubKey;
1238 [ + - + - ]: 1 : tx_create.vout[0].scriptPubKey = GetScriptForDestination(ScriptHash(redeem_script));
1239 [ + - + - : 1 : BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::SCRIPTHASH);
+ - ]
1240 [ + - ]: 1 : tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1241 [ + - ]: 2 : tx_spend.vin[0].scriptSig = CScript{} << ToByteVector(redeem_script);
1242 [ + - + - ]: 1 : AddCoins(coins, CTransaction{tx_create}, 0, false);
1243 [ + - + - : 3 : BOOST_CHECK(::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
+ - + - ]
1244 : 1 : tx_spend.vin[0].scriptSig.clear();
1245 [ + - + - : 3 : BOOST_CHECK(!::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
+ - + - ]
1246 : :
1247 : : // P2TR
1248 [ + - ]: 1 : tx_create.vout[0].scriptPubKey = GetScriptForDestination(WitnessV1Taproot{XOnlyPubKey{pubkey}});
1249 [ + - + - : 1 : BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::WITNESS_V1_TAPROOT);
+ - ]
1250 [ + - ]: 1 : tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1251 [ + - + - ]: 1 : AddCoins(coins, CTransaction{tx_create}, 0, false);
1252 [ + - + - : 3 : BOOST_CHECK(::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
+ - + - ]
1253 : :
1254 : : // P2SH-wrapped P2TR (undefined, non-standard)
1255 : 1 : redeem_script = tx_create.vout[0].scriptPubKey;
1256 [ + - + - ]: 1 : tx_create.vout[0].scriptPubKey = GetScriptForDestination(ScriptHash(redeem_script));
1257 [ + - + - : 1 : BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::SCRIPTHASH);
+ - ]
1258 [ + - ]: 1 : tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1259 [ + - ]: 2 : tx_spend.vin[0].scriptSig = CScript{} << ToByteVector(redeem_script);
1260 [ + - + - ]: 1 : AddCoins(coins, CTransaction{tx_create}, 0, false);
1261 [ + - + - : 3 : BOOST_CHECK(::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
+ - + - ]
1262 : 1 : tx_spend.vin[0].scriptSig.clear();
1263 [ + - + - : 3 : BOOST_CHECK(!::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
+ - + - +
- ]
1264 : :
1265 : : // P2A
1266 [ + - + - ]: 1 : tx_create.vout[0].scriptPubKey = GetScriptForDestination(PayToAnchor{});
1267 [ + - + - : 1 : BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::ANCHOR);
+ - ]
1268 [ + - ]: 1 : tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1269 [ + - + - ]: 1 : AddCoins(coins, CTransaction{tx_create}, 0, false);
1270 [ + - + - : 3 : BOOST_CHECK(!::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
+ - + - ]
1271 : :
1272 : : // P2SH-wrapped P2A (undefined, non-standard)
1273 : 1 : redeem_script = tx_create.vout[0].scriptPubKey;
1274 [ + - + - ]: 1 : tx_create.vout[0].scriptPubKey = GetScriptForDestination(ScriptHash(redeem_script));
1275 [ + - + - : 1 : BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::SCRIPTHASH);
+ - ]
1276 [ + - ]: 1 : tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1277 [ + - ]: 2 : tx_spend.vin[0].scriptSig = CScript{} << ToByteVector(redeem_script);
1278 [ + - + - ]: 1 : AddCoins(coins, CTransaction{tx_create}, 0, false);
1279 [ + - + - : 3 : BOOST_CHECK(::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
+ - + - ]
1280 : 1 : tx_spend.vin[0].scriptSig.clear();
1281 : :
1282 : : // Undefined version 1 witness program
1283 [ + - + - : 2 : tx_create.vout[0].scriptPubKey = GetScriptForDestination(WitnessUnknown{1, {0x42, 0x42}});
+ - ]
1284 [ + - + - : 1 : BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::WITNESS_UNKNOWN);
+ - ]
1285 [ + - ]: 1 : tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1286 [ + - + - ]: 1 : AddCoins(coins, CTransaction{tx_create}, 0, false);
1287 [ + - + - : 3 : BOOST_CHECK(::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
+ - + - ]
1288 : :
1289 : : // P2SH-wrapped undefined version 1 witness program
1290 : 1 : redeem_script = tx_create.vout[0].scriptPubKey;
1291 [ + - + - ]: 1 : tx_create.vout[0].scriptPubKey = GetScriptForDestination(ScriptHash(redeem_script));
1292 [ + - + - : 1 : BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::SCRIPTHASH);
+ - ]
1293 [ + - ]: 1 : tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1294 [ + - ]: 2 : tx_spend.vin[0].scriptSig = CScript{} << ToByteVector(redeem_script);
1295 [ + - + - ]: 1 : AddCoins(coins, CTransaction{tx_create}, 0, false);
1296 [ + - + - : 3 : BOOST_CHECK(::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
+ - + - ]
1297 : 1 : tx_spend.vin[0].scriptSig.clear();
1298 [ + - + - : 3 : BOOST_CHECK(!::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
+ - + - ]
1299 : :
1300 : : // Various undefined version >1 32-byte witness programs.
1301 [ + - ]: 1 : const auto program{ToByteVector(XOnlyPubKey{pubkey})};
1302 [ + + ]: 16 : for (int i{2}; i <= 16; ++i) {
1303 [ + - + - ]: 15 : tx_create.vout[0].scriptPubKey = GetScriptForDestination(WitnessUnknown{i, program});
1304 [ + - + - : 15 : BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::WITNESS_UNKNOWN);
+ - ]
1305 [ + - ]: 15 : tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1306 [ + - + - ]: 15 : AddCoins(coins, CTransaction{tx_create}, 0, false);
1307 [ + - + - : 45 : BOOST_CHECK(::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
+ - + - ]
1308 : :
1309 : : // It's also detected within P2SH.
1310 : 15 : redeem_script = tx_create.vout[0].scriptPubKey;
1311 [ + - + - ]: 15 : tx_create.vout[0].scriptPubKey = GetScriptForDestination(ScriptHash(redeem_script));
1312 [ + - + - : 15 : BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::SCRIPTHASH);
+ - ]
1313 [ + - ]: 15 : tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1314 [ + - ]: 30 : tx_spend.vin[0].scriptSig = CScript{} << ToByteVector(redeem_script);
1315 [ + - + - ]: 15 : AddCoins(coins, CTransaction{tx_create}, 0, false);
1316 [ + - + - : 45 : BOOST_CHECK(::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
+ - + - ]
1317 : 15 : tx_spend.vin[0].scriptSig.clear();
1318 [ + - + - : 45 : BOOST_CHECK(!::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
+ - + - ]
1319 : : }
1320 : 3 : }
1321 : :
1322 : : BOOST_AUTO_TEST_SUITE_END()
|