Bitcoin Core  31.0.0
P2P Digital Currency
transaction_tests.cpp
Go to the documentation of this file.
1 // Copyright (c) 2011-present The Bitcoin Core developers
2 // Distributed under the MIT software license, see the accompanying
3 // file COPYING or http://www.opensource.org/licenses/mit-license.php.
4 
5 #include <test/data/tx_invalid.json.h>
6 #include <test/data/tx_valid.json.h>
8 
9 #include <checkqueue.h>
10 #include <clientversion.h>
11 #include <consensus/amount.h>
12 #include <consensus/consensus.h>
13 #include <consensus/tx_check.h>
14 #include <consensus/tx_verify.h>
15 #include <consensus/validation.h>
16 #include <core_io.h>
17 #include <key.h>
18 #include <policy/policy.h>
19 #include <policy/settings.h>
21 #include <script/interpreter.h>
22 #include <script/script.h>
23 #include <script/script_error.h>
24 #include <script/sigcache.h>
25 #include <script/sign.h>
26 #include <script/signingprovider.h>
27 #include <script/solver.h>
28 #include <streams.h>
29 #include <test/util/common.h>
30 #include <test/util/json.h>
31 #include <test/util/random.h>
32 #include <test/util/script.h>
34 #include <util/strencodings.h>
35 #include <util/string.h>
36 #include <validation.h>
37 
38 #include <functional>
39 #include <map>
40 #include <string>
41 
42 #include <boost/test/unit_test.hpp>
43 
44 #include <univalue.h>
45 
46 using namespace util::hex_literals;
47 using util::SplitString;
48 using util::ToString;
49 
50 typedef std::vector<unsigned char> valtype;
51 
54 
55 static const std::map<std::string, script_verify_flag_name>& mapFlagNames = ScriptFlagNamesToEnum();
56 
58 {
60  if (strFlags.empty() || strFlags == "NONE") return flags;
61 
62  std::vector<std::string> words = SplitString(strFlags, ',');
63  for (const std::string& word : words)
64  {
65  if (!mapFlagNames.contains(word)) {
66  BOOST_ERROR("Bad test: unknown verification flag '" << word << "'");
67  continue;
68  }
69  flags |= mapFlagNames.at(word);
70  }
71  return flags;
72 }
73 
74 // Check that all flags in STANDARD_SCRIPT_VERIFY_FLAGS are present in mapFlagNames.
76 {
77  script_verify_flags standard_flags_missing{STANDARD_SCRIPT_VERIFY_FLAGS};
78  for (const auto& pair : mapFlagNames) {
79  standard_flags_missing &= ~(pair.second);
80  }
81  return standard_flags_missing == 0;
82 }
83 
84 /*
85 * Check that the input scripts of a transaction are valid/invalid as expected.
86 */
87 bool CheckTxScripts(const CTransaction& tx, const std::map<COutPoint, CScript>& map_prevout_scriptPubKeys,
88  const std::map<COutPoint, int64_t>& map_prevout_values, script_verify_flags flags,
89  const PrecomputedTransactionData& txdata, const std::string& strTest, bool expect_valid)
90 {
91  bool tx_valid = true;
92  ScriptError err = expect_valid ? SCRIPT_ERR_UNKNOWN_ERROR : SCRIPT_ERR_OK;
93  for (unsigned int i = 0; i < tx.vin.size() && tx_valid; ++i) {
94  const CTxIn input = tx.vin[i];
95  const CAmount amount = map_prevout_values.contains(input.prevout) ? map_prevout_values.at(input.prevout) : 0;
96  try {
97  tx_valid = VerifyScript(input.scriptSig, map_prevout_scriptPubKeys.at(input.prevout),
99  } catch (...) {
100  BOOST_ERROR("Bad test: " << strTest);
101  return true; // The test format is bad and an error is thrown. Return true to silence further error.
102  }
103  if (expect_valid) {
104  BOOST_CHECK_MESSAGE(tx_valid, strTest);
105  BOOST_CHECK_MESSAGE((err == SCRIPT_ERR_OK), ScriptErrorString(err));
107  }
108  }
109  if (!expect_valid) {
110  BOOST_CHECK_MESSAGE(!tx_valid, strTest);
111  BOOST_CHECK_MESSAGE((err != SCRIPT_ERR_OK), ScriptErrorString(err));
112  }
113  return (tx_valid == expect_valid);
114 }
115 
116 /*
117  * Trim or fill flags to make the combination valid:
118  * WITNESS must be used with P2SH
119  * CLEANSTACK must be used WITNESS and P2SH
120  */
121 
123 {
124  // WITNESS requires P2SH
126 
127  // CLEANSTACK requires WITNESS (and transitively CLEANSTACK requires P2SH)
130  return flags;
131 }
132 
134 {
135  // CLEANSTACK implies WITNESS
137 
138  // WITNESS implies P2SH (and transitively CLEANSTACK implies P2SH)
141  return flags;
142 }
143 
144 // Exclude each possible script verify flag from flags. Returns a set of these flag combinations
145 // that are valid and without duplicates. For example: if flags=1111 and the 4 possible flags are
146 // 0001, 0010, 0100, and 1000, this should return the set {0111, 1011, 1101, 1110}.
147 // Assumes that mapFlagNames contains all script verify flags.
148 std::set<script_verify_flags> ExcludeIndividualFlags(script_verify_flags flags)
149 {
150  std::set<script_verify_flags> flags_combos;
151  for (const auto& pair : mapFlagNames) {
152  script_verify_flags flags_excluding_one = TrimFlags(flags & ~(pair.second));
153  if (flags != flags_excluding_one) {
154  flags_combos.insert(flags_excluding_one);
155  }
156  }
157  return flags_combos;
158 }
159 
161 
163 {
164  BOOST_CHECK_MESSAGE(CheckMapFlagNames(), "mapFlagNames is missing a script verification flag");
165  // Read tests from test/data/tx_valid.json
166  UniValue tests = read_json(json_tests::tx_valid);
167 
168  for (unsigned int idx = 0; idx < tests.size(); idx++) {
169  const UniValue& test = tests[idx];
170  std::string strTest = test.write();
171  if (test[0].isArray())
172  {
173  if (test.size() != 3 || !test[1].isStr() || !test[2].isStr())
174  {
175  BOOST_ERROR("Bad test: " << strTest);
176  continue;
177  }
178 
179  std::map<COutPoint, CScript> mapprevOutScriptPubKeys;
180  std::map<COutPoint, int64_t> mapprevOutValues;
181  UniValue inputs = test[0].get_array();
182  bool fValid = true;
183  for (unsigned int inpIdx = 0; inpIdx < inputs.size(); inpIdx++) {
184  const UniValue& input = inputs[inpIdx];
185  if (!input.isArray()) {
186  fValid = false;
187  break;
188  }
189  const UniValue& vinput = input.get_array();
190  if (vinput.size() < 3 || vinput.size() > 4)
191  {
192  fValid = false;
193  break;
194  }
195  COutPoint outpoint{Txid::FromHex(vinput[0].get_str()).value(), uint32_t(vinput[1].getInt<int>())};
196  mapprevOutScriptPubKeys[outpoint] = ParseScript(vinput[2].get_str());
197  if (vinput.size() >= 4)
198  {
199  mapprevOutValues[outpoint] = vinput[3].getInt<int64_t>();
200  }
201  }
202  if (!fValid)
203  {
204  BOOST_ERROR("Bad test: " << strTest);
205  continue;
206  }
207 
208  std::string transaction = test[1].get_str();
209  DataStream stream(ParseHex(transaction));
211 
212  TxValidationState state;
213  BOOST_CHECK_MESSAGE(CheckTransaction(tx, state), strTest);
214  BOOST_CHECK(state.IsValid());
215 
216  PrecomputedTransactionData txdata(tx);
217  script_verify_flags verify_flags = ParseScriptFlags(test[2].get_str());
218 
219  // Check that the test gives a valid combination of flags (otherwise VerifyScript will throw). Don't edit the flags.
220  if (~verify_flags != FillFlags(~verify_flags)) {
221  BOOST_ERROR("Bad test flags: " << strTest);
222  }
223 
224  BOOST_CHECK_MESSAGE(CheckTxScripts(tx, mapprevOutScriptPubKeys, mapprevOutValues, ~verify_flags, txdata, strTest, /*expect_valid=*/true),
225  "Tx unexpectedly failed: " << strTest);
226 
227  // Backwards compatibility of script verification flags: Removing any flag(s) should not invalidate a valid transaction
228  for (const auto& [name, flag] : mapFlagNames) {
229  // Removing individual flags
230  script_verify_flags flags = TrimFlags(~(verify_flags | flag));
231  if (!CheckTxScripts(tx, mapprevOutScriptPubKeys, mapprevOutValues, flags, txdata, strTest, /*expect_valid=*/true)) {
232  BOOST_ERROR("Tx unexpectedly failed with flag " << name << " unset: " << strTest);
233  }
234  // Removing random combinations of flags
235  flags = TrimFlags(~(verify_flags | script_verify_flags::from_int(m_rng.randbits(MAX_SCRIPT_VERIFY_FLAGS_BITS))));
236  if (!CheckTxScripts(tx, mapprevOutScriptPubKeys, mapprevOutValues, flags, txdata, strTest, /*expect_valid=*/true)) {
237  BOOST_ERROR("Tx unexpectedly failed with random flags " << ToString(flags.as_int()) << ": " << strTest);
238  }
239  }
240 
241  // Check that flags are maximal: transaction should fail if any unset flags are set.
242  for (auto flags_excluding_one : ExcludeIndividualFlags(verify_flags)) {
243  if (!CheckTxScripts(tx, mapprevOutScriptPubKeys, mapprevOutValues, ~flags_excluding_one, txdata, strTest, /*expect_valid=*/false)) {
244  BOOST_ERROR("Too many flags unset: " << strTest);
245  }
246  }
247  }
248  }
249 }
250 
252 {
253  // Read tests from test/data/tx_invalid.json
254  UniValue tests = read_json(json_tests::tx_invalid);
255 
256  for (unsigned int idx = 0; idx < tests.size(); idx++) {
257  const UniValue& test = tests[idx];
258  std::string strTest = test.write();
259  if (test[0].isArray())
260  {
261  if (test.size() != 3 || !test[1].isStr() || !test[2].isStr())
262  {
263  BOOST_ERROR("Bad test: " << strTest);
264  continue;
265  }
266 
267  std::map<COutPoint, CScript> mapprevOutScriptPubKeys;
268  std::map<COutPoint, int64_t> mapprevOutValues;
269  UniValue inputs = test[0].get_array();
270  bool fValid = true;
271  for (unsigned int inpIdx = 0; inpIdx < inputs.size(); inpIdx++) {
272  const UniValue& input = inputs[inpIdx];
273  if (!input.isArray()) {
274  fValid = false;
275  break;
276  }
277  const UniValue& vinput = input.get_array();
278  if (vinput.size() < 3 || vinput.size() > 4)
279  {
280  fValid = false;
281  break;
282  }
283  COutPoint outpoint{Txid::FromHex(vinput[0].get_str()).value(), uint32_t(vinput[1].getInt<int>())};
284  mapprevOutScriptPubKeys[outpoint] = ParseScript(vinput[2].get_str());
285  if (vinput.size() >= 4)
286  {
287  mapprevOutValues[outpoint] = vinput[3].getInt<int64_t>();
288  }
289  }
290  if (!fValid)
291  {
292  BOOST_ERROR("Bad test: " << strTest);
293  continue;
294  }
295 
296  std::string transaction = test[1].get_str();
297  DataStream stream(ParseHex(transaction));
299 
300  TxValidationState state;
301  if (!CheckTransaction(tx, state) || state.IsInvalid()) {
302  BOOST_CHECK_MESSAGE(test[2].get_str() == "BADTX", strTest);
303  continue;
304  }
305 
306  PrecomputedTransactionData txdata(tx);
307  script_verify_flags verify_flags = ParseScriptFlags(test[2].get_str());
308 
309  // Check that the test gives a valid combination of flags (otherwise VerifyScript will throw). Don't edit the flags.
310  if (verify_flags != FillFlags(verify_flags)) {
311  BOOST_ERROR("Bad test flags: " << strTest);
312  }
313 
314  // Not using FillFlags() in the main test, in order to detect invalid verifyFlags combination
315  BOOST_CHECK_MESSAGE(CheckTxScripts(tx, mapprevOutScriptPubKeys, mapprevOutValues, verify_flags, txdata, strTest, /*expect_valid=*/false),
316  "Tx unexpectedly passed: " << strTest);
317 
318  // Backwards compatibility of script verification flags: Adding any flag(s) should not validate an invalid transaction
319  for (const auto& [name, flag] : mapFlagNames) {
320  script_verify_flags flags = FillFlags(verify_flags | flag);
321  // Adding individual flags
322  if (!CheckTxScripts(tx, mapprevOutScriptPubKeys, mapprevOutValues, flags, txdata, strTest, /*expect_valid=*/false)) {
323  BOOST_ERROR("Tx unexpectedly passed with flag " << name << " set: " << strTest);
324  }
325  // Adding random combinations of flags
327  if (!CheckTxScripts(tx, mapprevOutScriptPubKeys, mapprevOutValues, flags, txdata, strTest, /*expect_valid=*/false)) {
328  BOOST_ERROR("Tx unexpectedly passed with random flags " << name << ": " << strTest);
329  }
330  }
331 
332  // Check that flags are minimal: transaction should succeed if any set flags are unset.
333  for (auto flags_excluding_one : ExcludeIndividualFlags(verify_flags)) {
334  if (!CheckTxScripts(tx, mapprevOutScriptPubKeys, mapprevOutValues, flags_excluding_one, txdata, strTest, /*expect_valid=*/true)) {
335  BOOST_ERROR("Too many flags set: " << strTest);
336  }
337  }
338  }
339  }
340 }
341 
342 BOOST_AUTO_TEST_CASE(tx_no_inputs)
343 {
344  CMutableTransaction empty;
345 
346  TxValidationState state;
347  BOOST_CHECK_MESSAGE(!CheckTransaction(CTransaction(empty), state), "Transaction with no inputs should be invalid.");
348  BOOST_CHECK(state.GetRejectReason() == "bad-txns-vin-empty");
349 }
350 
351 BOOST_AUTO_TEST_CASE(tx_oversized)
352 {
353  auto createTransaction =[](size_t payloadSize) {
355  tx.vin.resize(1);
356  tx.vout.emplace_back(1, CScript() << OP_RETURN << std::vector<unsigned char>(payloadSize));
357  return CTransaction(tx);
358  };
359  const auto maxTransactionSize = MAX_BLOCK_WEIGHT / WITNESS_SCALE_FACTOR;
360  const auto oversizedTransactionBaseSize = ::GetSerializeSize(TX_NO_WITNESS(createTransaction(maxTransactionSize))) - maxTransactionSize;
361 
362  auto maxPayloadSize = maxTransactionSize - oversizedTransactionBaseSize;
363  {
364  TxValidationState state;
365  CheckTransaction(createTransaction(maxPayloadSize), state);
366  BOOST_CHECK(state.GetRejectReason() != "bad-txns-oversize");
367  }
368 
369  maxPayloadSize += 1;
370  {
371  TxValidationState state;
372  BOOST_CHECK_MESSAGE(!CheckTransaction(createTransaction(maxPayloadSize), state), "Oversized transaction should be invalid");
373  BOOST_CHECK(state.GetRejectReason() == "bad-txns-oversize");
374  }
375 }
376 
377 BOOST_AUTO_TEST_CASE(basic_transaction_tests)
378 {
379  // Random real transaction (e2769b09e784f32f62ef849763d4f45b98e07ba658647343b915ff832b110436)
380  unsigned char ch[] = {0x01, 0x00, 0x00, 0x00, 0x01, 0x6b, 0xff, 0x7f, 0xcd, 0x4f, 0x85, 0x65, 0xef, 0x40, 0x6d, 0xd5, 0xd6, 0x3d, 0x4f, 0xf9, 0x4f, 0x31, 0x8f, 0xe8, 0x20, 0x27, 0xfd, 0x4d, 0xc4, 0x51, 0xb0, 0x44, 0x74, 0x01, 0x9f, 0x74, 0xb4, 0x00, 0x00, 0x00, 0x00, 0x8c, 0x49, 0x30, 0x46, 0x02, 0x21, 0x00, 0xda, 0x0d, 0xc6, 0xae, 0xce, 0xfe, 0x1e, 0x06, 0xef, 0xdf, 0x05, 0x77, 0x37, 0x57, 0xde, 0xb1, 0x68, 0x82, 0x09, 0x30, 0xe3, 0xb0, 0xd0, 0x3f, 0x46, 0xf5, 0xfc, 0xf1, 0x50, 0xbf, 0x99, 0x0c, 0x02, 0x21, 0x00, 0xd2, 0x5b, 0x5c, 0x87, 0x04, 0x00, 0x76, 0xe4, 0xf2, 0x53, 0xf8, 0x26, 0x2e, 0x76, 0x3e, 0x2d, 0xd5, 0x1e, 0x7f, 0xf0, 0xbe, 0x15, 0x77, 0x27, 0xc4, 0xbc, 0x42, 0x80, 0x7f, 0x17, 0xbd, 0x39, 0x01, 0x41, 0x04, 0xe6, 0xc2, 0x6e, 0xf6, 0x7d, 0xc6, 0x10, 0xd2, 0xcd, 0x19, 0x24, 0x84, 0x78, 0x9a, 0x6c, 0xf9, 0xae, 0xa9, 0x93, 0x0b, 0x94, 0x4b, 0x7e, 0x2d, 0xb5, 0x34, 0x2b, 0x9d, 0x9e, 0x5b, 0x9f, 0xf7, 0x9a, 0xff, 0x9a, 0x2e, 0xe1, 0x97, 0x8d, 0xd7, 0xfd, 0x01, 0xdf, 0xc5, 0x22, 0xee, 0x02, 0x28, 0x3d, 0x3b, 0x06, 0xa9, 0xd0, 0x3a, 0xcf, 0x80, 0x96, 0x96, 0x8d, 0x7d, 0xbb, 0x0f, 0x91, 0x78, 0xff, 0xff, 0xff, 0xff, 0x02, 0x8b, 0xa7, 0x94, 0x0e, 0x00, 0x00, 0x00, 0x00, 0x19, 0x76, 0xa9, 0x14, 0xba, 0xde, 0xec, 0xfd, 0xef, 0x05, 0x07, 0x24, 0x7f, 0xc8, 0xf7, 0x42, 0x41, 0xd7, 0x3b, 0xc0, 0x39, 0x97, 0x2d, 0x7b, 0x88, 0xac, 0x40, 0x94, 0xa8, 0x02, 0x00, 0x00, 0x00, 0x00, 0x19, 0x76, 0xa9, 0x14, 0xc1, 0x09, 0x32, 0x48, 0x3f, 0xec, 0x93, 0xed, 0x51, 0xf5, 0xfe, 0x95, 0xe7, 0x25, 0x59, 0xf2, 0xcc, 0x70, 0x43, 0xf9, 0x88, 0xac, 0x00, 0x00, 0x00, 0x00, 0x00};
381  std::vector<unsigned char> vch(ch, ch + sizeof(ch) -1);
383  SpanReader{vch} >> TX_WITH_WITNESS(tx);
384  TxValidationState state;
385  BOOST_CHECK_MESSAGE(CheckTransaction(CTransaction(tx), state) && state.IsValid(), "Simple deserialized transaction should be valid.");
386 
387  // Check that duplicate txins fail
388  tx.vin.push_back(tx.vin[0]);
389  BOOST_CHECK_MESSAGE(!CheckTransaction(CTransaction(tx), state) || !state.IsValid(), "Transaction with duplicate txins should be invalid.");
390 }
391 
393 {
394  FillableSigningProvider keystore;
395  CCoinsView coinsDummy;
396  CCoinsViewCache coins(&coinsDummy);
397  std::vector<CMutableTransaction> dummyTransactions =
398  SetupDummyInputs(keystore, coins, {11*CENT, 50*CENT, 21*CENT, 22*CENT});
399 
401  t1.vin.resize(3);
402  t1.vin[0].prevout.hash = dummyTransactions[0].GetHash();
403  t1.vin[0].prevout.n = 1;
404  t1.vin[0].scriptSig << std::vector<unsigned char>(65, 0);
405  t1.vin[1].prevout.hash = dummyTransactions[1].GetHash();
406  t1.vin[1].prevout.n = 0;
407  t1.vin[1].scriptSig << std::vector<unsigned char>(65, 0) << std::vector<unsigned char>(33, 4);
408  t1.vin[2].prevout.hash = dummyTransactions[1].GetHash();
409  t1.vin[2].prevout.n = 1;
410  t1.vin[2].scriptSig << std::vector<unsigned char>(65, 0) << std::vector<unsigned char>(33, 4);
411  t1.vout.resize(2);
412  t1.vout[0].nValue = 90*CENT;
413  t1.vout[0].scriptPubKey << OP_1;
414 
416 }
417 
418 static void CreateCreditAndSpend(const FillableSigningProvider& keystore, const CScript& outscript, CTransactionRef& output, CMutableTransaction& input, bool success = true)
419 {
420  CMutableTransaction outputm;
421  outputm.version = 1;
422  outputm.vin.resize(1);
423  outputm.vin[0].prevout.SetNull();
424  outputm.vin[0].scriptSig = CScript();
425  outputm.vout.resize(1);
426  outputm.vout[0].nValue = 1;
427  outputm.vout[0].scriptPubKey = outscript;
428  DataStream ssout;
429  ssout << TX_WITH_WITNESS(outputm);
430  ssout >> TX_WITH_WITNESS(output);
431  assert(output->vin.size() == 1);
432  assert(output->vin[0] == outputm.vin[0]);
433  assert(output->vout.size() == 1);
434  assert(output->vout[0] == outputm.vout[0]);
435 
436  CMutableTransaction inputm;
437  inputm.version = 1;
438  inputm.vin.resize(1);
439  inputm.vin[0].prevout.hash = output->GetHash();
440  inputm.vin[0].prevout.n = 0;
441  inputm.vout.resize(1);
442  inputm.vout[0].nValue = 1;
443  inputm.vout[0].scriptPubKey = CScript();
444  SignatureData empty;
445  bool ret = SignSignature(keystore, *output, inputm, 0, SIGHASH_ALL, empty);
446  assert(ret == success);
447  DataStream ssin;
448  ssin << TX_WITH_WITNESS(inputm);
449  ssin >> TX_WITH_WITNESS(input);
450  assert(input.vin.size() == 1);
451  assert(input.vin[0] == inputm.vin[0]);
452  assert(input.vout.size() == 1);
453  assert(input.vout[0] == inputm.vout[0]);
454  assert(input.vin[0].scriptWitness.stack == inputm.vin[0].scriptWitness.stack);
455 }
456 
457 static void CheckWithFlag(const CTransactionRef& output, const CMutableTransaction& input, script_verify_flags flags, bool success)
458 {
459  ScriptError error;
460  CTransaction inputi(input);
461  bool ret = VerifyScript(inputi.vin[0].scriptSig, output->vout[0].scriptPubKey, &inputi.vin[0].scriptWitness, flags, TransactionSignatureChecker(&inputi, 0, output->vout[0].nValue, MissingDataBehavior::ASSERT_FAIL), &error);
462  assert(ret == success);
463 }
464 
465 static CScript PushAll(const std::vector<valtype>& values)
466 {
467  CScript result;
468  for (const valtype& v : values) {
469  if (v.size() == 0) {
470  result << OP_0;
471  } else if (v.size() == 1 && v[0] >= 1 && v[0] <= 16) {
472  result << CScript::EncodeOP_N(v[0]);
473  } else if (v.size() == 1 && v[0] == 0x81) {
474  result << OP_1NEGATE;
475  } else {
476  result << v;
477  }
478  }
479  return result;
480 }
481 
482 static void ReplaceRedeemScript(CScript& script, const CScript& redeemScript)
483 {
484  std::vector<valtype> stack;
486  assert(stack.size() > 0);
487  stack.back() = std::vector<unsigned char>(redeemScript.begin(), redeemScript.end());
488  script = PushAll(stack);
489 }
490 
491 BOOST_AUTO_TEST_CASE(test_big_witness_transaction)
492 {
494  mtx.version = 1;
495 
496  CKey key = GenerateRandomKey(); // Need to use compressed keys in segwit or the signing will fail
497  FillableSigningProvider keystore;
498  BOOST_CHECK(keystore.AddKeyPubKey(key, key.GetPubKey()));
499  CKeyID hash = key.GetPubKey().GetID();
500  CScript scriptPubKey = CScript() << OP_0 << std::vector<unsigned char>(hash.begin(), hash.end());
501 
502  std::vector<int> sigHashes;
504  sigHashes.push_back(SIGHASH_SINGLE | SIGHASH_ANYONECANPAY);
505  sigHashes.push_back(SIGHASH_ALL | SIGHASH_ANYONECANPAY);
506  sigHashes.push_back(SIGHASH_NONE);
507  sigHashes.push_back(SIGHASH_SINGLE);
508  sigHashes.push_back(SIGHASH_ALL);
509 
510  // create a big transaction of 4500 inputs signed by the same key
511  for(uint32_t ij = 0; ij < 4500; ij++) {
512  uint32_t i = mtx.vin.size();
513  COutPoint outpoint{Txid{"0000000000000000000000000000000000000000000000000000000000000100"}, i};
514 
515  mtx.vin.resize(mtx.vin.size() + 1);
516  mtx.vin[i].prevout = outpoint;
517  mtx.vin[i].scriptSig = CScript();
518 
519  mtx.vout.resize(mtx.vout.size() + 1);
520  mtx.vout[i].nValue = 1000;
521  mtx.vout[i].scriptPubKey = CScript() << OP_1;
522  }
523 
524  // sign all inputs
525  for(uint32_t i = 0; i < mtx.vin.size(); i++) {
526  SignatureData empty;
527  bool hashSigned = SignSignature(keystore, scriptPubKey, mtx, i, 1000, sigHashes.at(i % sigHashes.size()), empty);
528  assert(hashSigned);
529  }
530 
531  DataStream ssout;
532  ssout << TX_WITH_WITNESS(mtx);
534 
535  // check all inputs concurrently, with the cache
536  PrecomputedTransactionData txdata(tx);
537  CCheckQueue<CScriptCheck> scriptcheckqueue(/*batch_size=*/128, /*worker_threads_num=*/20);
538  CCheckQueueControl<CScriptCheck> control(scriptcheckqueue);
539 
540  std::vector<Coin> coins;
541  for(uint32_t i = 0; i < mtx.vin.size(); i++) {
542  Coin coin;
543  coin.nHeight = 1;
544  coin.fCoinBase = false;
545  coin.out.nValue = 1000;
546  coin.out.scriptPubKey = scriptPubKey;
547  coins.emplace_back(std::move(coin));
548  }
549 
551 
552  for(uint32_t i = 0; i < mtx.vin.size(); i++) {
553  std::vector<CScriptCheck> vChecks;
554  vChecks.emplace_back(coins[tx.vin[i].prevout.n].out, tx, signature_cache, i, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, false, &txdata);
555  control.Add(std::move(vChecks));
556  }
557 
558  bool controlCheck = !control.Complete().has_value();
559  assert(controlCheck);
560 }
561 
563 {
564  SignatureData sigdata;
565  sigdata = DataFromTransaction(input1, 0, tx->vout[0]);
566  sigdata.MergeSignatureData(DataFromTransaction(input2, 0, tx->vout[0]));
567  ProduceSignature(DUMMY_SIGNING_PROVIDER, MutableTransactionSignatureCreator(input1, 0, tx->vout[0].nValue, SIGHASH_ALL), tx->vout[0].scriptPubKey, sigdata);
568  return sigdata;
569 }
570 
571 BOOST_AUTO_TEST_CASE(test_witness)
572 {
573  FillableSigningProvider keystore, keystore2;
574  CKey key1 = GenerateRandomKey();
575  CKey key2 = GenerateRandomKey();
576  CKey key3 = GenerateRandomKey();
577  CKey key1L = GenerateRandomKey(/*compressed=*/false);
578  CKey key2L = GenerateRandomKey(/*compressed=*/false);
579  CPubKey pubkey1 = key1.GetPubKey();
580  CPubKey pubkey2 = key2.GetPubKey();
581  CPubKey pubkey3 = key3.GetPubKey();
582  CPubKey pubkey1L = key1L.GetPubKey();
583  CPubKey pubkey2L = key2L.GetPubKey();
584  BOOST_CHECK(keystore.AddKeyPubKey(key1, pubkey1));
585  BOOST_CHECK(keystore.AddKeyPubKey(key2, pubkey2));
586  BOOST_CHECK(keystore.AddKeyPubKey(key1L, pubkey1L));
587  BOOST_CHECK(keystore.AddKeyPubKey(key2L, pubkey2L));
588  CScript scriptPubkey1, scriptPubkey2, scriptPubkey1L, scriptPubkey2L, scriptMulti;
589  scriptPubkey1 << ToByteVector(pubkey1) << OP_CHECKSIG;
590  scriptPubkey2 << ToByteVector(pubkey2) << OP_CHECKSIG;
591  scriptPubkey1L << ToByteVector(pubkey1L) << OP_CHECKSIG;
592  scriptPubkey2L << ToByteVector(pubkey2L) << OP_CHECKSIG;
593  std::vector<CPubKey> oneandthree;
594  oneandthree.push_back(pubkey1);
595  oneandthree.push_back(pubkey3);
596  scriptMulti = GetScriptForMultisig(2, oneandthree);
597  BOOST_CHECK(keystore.AddCScript(scriptPubkey1));
598  BOOST_CHECK(keystore.AddCScript(scriptPubkey2));
599  BOOST_CHECK(keystore.AddCScript(scriptPubkey1L));
600  BOOST_CHECK(keystore.AddCScript(scriptPubkey2L));
601  BOOST_CHECK(keystore.AddCScript(scriptMulti));
602  CScript destination_script_1, destination_script_2, destination_script_1L, destination_script_2L, destination_script_multi;
603  destination_script_1 = GetScriptForDestination(WitnessV0KeyHash(pubkey1));
604  destination_script_2 = GetScriptForDestination(WitnessV0KeyHash(pubkey2));
605  destination_script_1L = GetScriptForDestination(WitnessV0KeyHash(pubkey1L));
606  destination_script_2L = GetScriptForDestination(WitnessV0KeyHash(pubkey2L));
607  destination_script_multi = GetScriptForDestination(WitnessV0ScriptHash(scriptMulti));
608  BOOST_CHECK(keystore.AddCScript(destination_script_1));
609  BOOST_CHECK(keystore.AddCScript(destination_script_2));
610  BOOST_CHECK(keystore.AddCScript(destination_script_1L));
611  BOOST_CHECK(keystore.AddCScript(destination_script_2L));
612  BOOST_CHECK(keystore.AddCScript(destination_script_multi));
613  BOOST_CHECK(keystore2.AddCScript(scriptMulti));
614  BOOST_CHECK(keystore2.AddCScript(destination_script_multi));
615  BOOST_CHECK(keystore2.AddKeyPubKey(key3, pubkey3));
616 
617  CTransactionRef output1, output2;
618  CMutableTransaction input1, input2;
619 
620  // Normal pay-to-compressed-pubkey.
621  CreateCreditAndSpend(keystore, scriptPubkey1, output1, input1);
622  CreateCreditAndSpend(keystore, scriptPubkey2, output2, input2);
623  CheckWithFlag(output1, input1, SCRIPT_VERIFY_NONE, true);
624  CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
625  CheckWithFlag(output1, input1, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, true);
626  CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
627  CheckWithFlag(output1, input2, SCRIPT_VERIFY_NONE, false);
628  CheckWithFlag(output1, input2, SCRIPT_VERIFY_P2SH, false);
629  CheckWithFlag(output1, input2, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, false);
630  CheckWithFlag(output1, input2, STANDARD_SCRIPT_VERIFY_FLAGS, false);
631 
632  // P2SH pay-to-compressed-pubkey.
633  CreateCreditAndSpend(keystore, GetScriptForDestination(ScriptHash(scriptPubkey1)), output1, input1);
634  CreateCreditAndSpend(keystore, GetScriptForDestination(ScriptHash(scriptPubkey2)), output2, input2);
635  ReplaceRedeemScript(input2.vin[0].scriptSig, scriptPubkey1);
636  CheckWithFlag(output1, input1, SCRIPT_VERIFY_NONE, true);
637  CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
638  CheckWithFlag(output1, input1, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, true);
639  CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
640  CheckWithFlag(output1, input2, SCRIPT_VERIFY_NONE, true);
641  CheckWithFlag(output1, input2, SCRIPT_VERIFY_P2SH, false);
642  CheckWithFlag(output1, input2, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, false);
643  CheckWithFlag(output1, input2, STANDARD_SCRIPT_VERIFY_FLAGS, false);
644 
645  // Witness pay-to-compressed-pubkey (v0).
646  CreateCreditAndSpend(keystore, destination_script_1, output1, input1);
647  CreateCreditAndSpend(keystore, destination_script_2, output2, input2);
648  CheckWithFlag(output1, input1, SCRIPT_VERIFY_NONE, true);
649  CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
650  CheckWithFlag(output1, input1, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, true);
651  CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
652  CheckWithFlag(output1, input2, SCRIPT_VERIFY_NONE, true);
653  CheckWithFlag(output1, input2, SCRIPT_VERIFY_P2SH, true);
654  CheckWithFlag(output1, input2, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, false);
655  CheckWithFlag(output1, input2, STANDARD_SCRIPT_VERIFY_FLAGS, false);
656 
657  // P2SH witness pay-to-compressed-pubkey (v0).
658  CreateCreditAndSpend(keystore, GetScriptForDestination(ScriptHash(destination_script_1)), output1, input1);
659  CreateCreditAndSpend(keystore, GetScriptForDestination(ScriptHash(destination_script_2)), output2, input2);
660  ReplaceRedeemScript(input2.vin[0].scriptSig, destination_script_1);
661  CheckWithFlag(output1, input1, SCRIPT_VERIFY_NONE, true);
662  CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
663  CheckWithFlag(output1, input1, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, true);
664  CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
665  CheckWithFlag(output1, input2, SCRIPT_VERIFY_NONE, true);
666  CheckWithFlag(output1, input2, SCRIPT_VERIFY_P2SH, true);
667  CheckWithFlag(output1, input2, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, false);
668  CheckWithFlag(output1, input2, STANDARD_SCRIPT_VERIFY_FLAGS, false);
669 
670  // Normal pay-to-uncompressed-pubkey.
671  CreateCreditAndSpend(keystore, scriptPubkey1L, output1, input1);
672  CreateCreditAndSpend(keystore, scriptPubkey2L, output2, input2);
673  CheckWithFlag(output1, input1, SCRIPT_VERIFY_NONE, true);
674  CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
675  CheckWithFlag(output1, input1, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, true);
676  CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
677  CheckWithFlag(output1, input2, SCRIPT_VERIFY_NONE, false);
678  CheckWithFlag(output1, input2, SCRIPT_VERIFY_P2SH, false);
679  CheckWithFlag(output1, input2, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, false);
680  CheckWithFlag(output1, input2, STANDARD_SCRIPT_VERIFY_FLAGS, false);
681 
682  // P2SH pay-to-uncompressed-pubkey.
683  CreateCreditAndSpend(keystore, GetScriptForDestination(ScriptHash(scriptPubkey1L)), output1, input1);
684  CreateCreditAndSpend(keystore, GetScriptForDestination(ScriptHash(scriptPubkey2L)), output2, input2);
685  ReplaceRedeemScript(input2.vin[0].scriptSig, scriptPubkey1L);
686  CheckWithFlag(output1, input1, SCRIPT_VERIFY_NONE, true);
687  CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
688  CheckWithFlag(output1, input1, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, true);
689  CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
690  CheckWithFlag(output1, input2, SCRIPT_VERIFY_NONE, true);
691  CheckWithFlag(output1, input2, SCRIPT_VERIFY_P2SH, false);
692  CheckWithFlag(output1, input2, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, false);
693  CheckWithFlag(output1, input2, STANDARD_SCRIPT_VERIFY_FLAGS, false);
694 
695  // Signing disabled for witness pay-to-uncompressed-pubkey (v1).
696  CreateCreditAndSpend(keystore, destination_script_1L, output1, input1, false);
697  CreateCreditAndSpend(keystore, destination_script_2L, output2, input2, false);
698 
699  // Signing disabled for P2SH witness pay-to-uncompressed-pubkey (v1).
700  CreateCreditAndSpend(keystore, GetScriptForDestination(ScriptHash(destination_script_1L)), output1, input1, false);
701  CreateCreditAndSpend(keystore, GetScriptForDestination(ScriptHash(destination_script_2L)), output2, input2, false);
702 
703  // Normal 2-of-2 multisig
704  CreateCreditAndSpend(keystore, scriptMulti, output1, input1, false);
705  CheckWithFlag(output1, input1, SCRIPT_VERIFY_NONE, false);
706  CreateCreditAndSpend(keystore2, scriptMulti, output2, input2, false);
707  CheckWithFlag(output2, input2, SCRIPT_VERIFY_NONE, false);
708  BOOST_CHECK(*output1 == *output2);
709  UpdateInput(input1.vin[0], CombineSignatures(input1, input2, output1));
710  CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
711 
712  // P2SH 2-of-2 multisig
713  CreateCreditAndSpend(keystore, GetScriptForDestination(ScriptHash(scriptMulti)), output1, input1, false);
714  CheckWithFlag(output1, input1, SCRIPT_VERIFY_NONE, true);
715  CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, false);
716  CreateCreditAndSpend(keystore2, GetScriptForDestination(ScriptHash(scriptMulti)), output2, input2, false);
717  CheckWithFlag(output2, input2, SCRIPT_VERIFY_NONE, true);
718  CheckWithFlag(output2, input2, SCRIPT_VERIFY_P2SH, false);
719  BOOST_CHECK(*output1 == *output2);
720  UpdateInput(input1.vin[0], CombineSignatures(input1, input2, output1));
721  CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
722  CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
723 
724  // Witness 2-of-2 multisig
725  CreateCreditAndSpend(keystore, destination_script_multi, output1, input1, false);
726  CheckWithFlag(output1, input1, SCRIPT_VERIFY_NONE, true);
727  CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, false);
728  CreateCreditAndSpend(keystore2, destination_script_multi, output2, input2, false);
729  CheckWithFlag(output2, input2, SCRIPT_VERIFY_NONE, true);
730  CheckWithFlag(output2, input2, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, false);
731  BOOST_CHECK(*output1 == *output2);
732  UpdateInput(input1.vin[0], CombineSignatures(input1, input2, output1));
733  CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, true);
734  CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
735 
736  // P2SH witness 2-of-2 multisig
737  CreateCreditAndSpend(keystore, GetScriptForDestination(ScriptHash(destination_script_multi)), output1, input1, false);
738  CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
739  CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, false);
740  CreateCreditAndSpend(keystore2, GetScriptForDestination(ScriptHash(destination_script_multi)), output2, input2, false);
741  CheckWithFlag(output2, input2, SCRIPT_VERIFY_P2SH, true);
742  CheckWithFlag(output2, input2, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, false);
743  BOOST_CHECK(*output1 == *output2);
744  UpdateInput(input1.vin[0], CombineSignatures(input1, input2, output1));
745  CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, true);
746  CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
747 }
748 
749 BOOST_AUTO_TEST_CASE(test_IsStandard)
750 {
751  FillableSigningProvider keystore;
752  CCoinsView coinsDummy;
753  CCoinsViewCache coins(&coinsDummy);
754  std::vector<CMutableTransaction> dummyTransactions =
755  SetupDummyInputs(keystore, coins, {11*CENT, 50*CENT, 21*CENT, 22*CENT});
756 
758  t.vin.resize(1);
759  t.vin[0].prevout.hash = dummyTransactions[0].GetHash();
760  t.vin[0].prevout.n = 1;
761  t.vin[0].scriptSig << std::vector<unsigned char>(65, 0);
762  t.vout.resize(1);
763  t.vout[0].nValue = 90*CENT;
764  CKey key = GenerateRandomKey();
765  t.vout[0].scriptPubKey = GetScriptForDestination(PKHash(key.GetPubKey()));
766 
767  constexpr auto CheckIsStandard = [](const auto& t, const unsigned int max_op_return_relay = MAX_OP_RETURN_RELAY) {
768  std::string reason;
769  BOOST_CHECK(IsStandardTx(CTransaction{t}, max_op_return_relay, g_bare_multi, g_dust, reason));
770  BOOST_CHECK(reason.empty());
771  };
772  constexpr auto CheckIsNotStandard = [](const auto& t, const std::string& reason_in, const unsigned int max_op_return_relay = MAX_OP_RETURN_RELAY) {
773  std::string reason;
774  BOOST_CHECK(!IsStandardTx(CTransaction{t}, max_op_return_relay, g_bare_multi, g_dust, reason));
775  BOOST_CHECK_EQUAL(reason_in, reason);
776  };
777 
778  CheckIsStandard(t);
779 
780  // Check dust with default relay fee:
781  CAmount nDustThreshold = 182 * g_dust.GetFeePerK() / 1000;
782  BOOST_CHECK_EQUAL(nDustThreshold, 546);
783 
784  // Add dust outputs up to allowed maximum, still standard!
785  for (size_t i{0}; i < MAX_DUST_OUTPUTS_PER_TX; ++i) {
786  t.vout.emplace_back(0, t.vout[0].scriptPubKey);
787  CheckIsStandard(t);
788  }
789 
790  // dust:
791  t.vout[0].nValue = nDustThreshold - 1;
792  CheckIsNotStandard(t, "dust");
793  // not dust:
794  t.vout[0].nValue = nDustThreshold;
795  CheckIsStandard(t);
796 
797  // Disallowed version
798  t.version = std::numeric_limits<uint32_t>::max();
799  CheckIsNotStandard(t, "version");
800 
801  t.version = 0;
802  CheckIsNotStandard(t, "version");
803 
804  t.version = TX_MAX_STANDARD_VERSION + 1;
805  CheckIsNotStandard(t, "version");
806 
807  // Allowed version
808  t.version = 1;
809  CheckIsStandard(t);
810 
811  t.version = 2;
812  CheckIsStandard(t);
813 
814  // Check dust with odd relay fee to verify rounding:
815  // nDustThreshold = 182 * 3702 / 1000
816  g_dust = CFeeRate(3702);
817  // dust:
818  t.vout[0].nValue = 674 - 1;
819  CheckIsNotStandard(t, "dust");
820  // not dust:
821  t.vout[0].nValue = 674;
822  CheckIsStandard(t);
824 
825  t.vout[0].scriptPubKey = CScript() << OP_1;
826  CheckIsNotStandard(t, "scriptpubkey");
827 
828  // Custom 83-byte TxoutType::NULL_DATA (standard with max_op_return_relay of 83)
829  t.vout[0].scriptPubKey = CScript() << OP_RETURN << "04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef3804678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38"_hex;
830  BOOST_CHECK_EQUAL(83, t.vout[0].scriptPubKey.size());
831  CheckIsStandard(t, /*max_op_return_relay=*/83);
832 
833  // Non-standard if max_op_return_relay datacarrier arg is one less
834  CheckIsNotStandard(t, "datacarrier", /*max_op_return_relay=*/82);
835 
836  // Data payload can be encoded in any way...
837  t.vout[0].scriptPubKey = CScript() << OP_RETURN << ""_hex;
838  CheckIsStandard(t);
839  t.vout[0].scriptPubKey = CScript() << OP_RETURN << "00"_hex << "01"_hex;
840  CheckIsStandard(t);
841  // OP_RESERVED *is* considered to be a PUSHDATA type opcode by IsPushOnly()!
842  t.vout[0].scriptPubKey = CScript() << OP_RETURN << OP_RESERVED << -1 << 0 << "01"_hex << 2 << 3 << 4 << 5 << 6 << 7 << 8 << 9 << 10 << 11 << 12 << 13 << 14 << 15 << 16;
843  CheckIsStandard(t);
844  t.vout[0].scriptPubKey = CScript() << OP_RETURN << 0 << "01"_hex << 2 << "ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff"_hex;
845  CheckIsStandard(t);
846 
847  // ...so long as it only contains PUSHDATA's
848  t.vout[0].scriptPubKey = CScript() << OP_RETURN << OP_RETURN;
849  CheckIsNotStandard(t, "scriptpubkey");
850 
851  // TxoutType::NULL_DATA w/o PUSHDATA
852  t.vout.resize(1);
853  t.vout[0].scriptPubKey = CScript() << OP_RETURN;
854  CheckIsStandard(t);
855 
856  // Multiple TxoutType::NULL_DATA are permitted
857  t.vout.resize(2);
858  t.vout[0].scriptPubKey = CScript() << OP_RETURN << "04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38"_hex;
859  t.vout[0].nValue = 0;
860  t.vout[1].scriptPubKey = CScript() << OP_RETURN << "04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38"_hex;
861  t.vout[1].nValue = 0;
862  CheckIsStandard(t);
863 
864  t.vout[0].scriptPubKey = CScript() << OP_RETURN << "04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38"_hex;
865  t.vout[1].scriptPubKey = CScript() << OP_RETURN;
866  CheckIsStandard(t);
867 
868  t.vout[0].scriptPubKey = CScript() << OP_RETURN;
869  t.vout[1].scriptPubKey = CScript() << OP_RETURN;
870  CheckIsStandard(t);
871 
872  t.vout[0].scriptPubKey = CScript() << OP_RETURN << "04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef3804678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38"_hex;
873  t.vout[1].scriptPubKey = CScript() << OP_RETURN << "04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef3804678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38"_hex;
874  const auto datacarrier_size = t.vout[0].scriptPubKey.size() + t.vout[1].scriptPubKey.size();
875  CheckIsStandard(t); // Default max relay should never trigger
876  CheckIsStandard(t, /*max_op_return_relay=*/datacarrier_size);
877  CheckIsNotStandard(t, "datacarrier", /*max_op_return_relay=*/datacarrier_size-1);
878 
879  // Check large scriptSig (non-standard if size is >1650 bytes)
880  t.vout.resize(1);
881  t.vout[0].nValue = MAX_MONEY;
882  t.vout[0].scriptPubKey = GetScriptForDestination(PKHash(key.GetPubKey()));
883  // OP_PUSHDATA2 with len (3 bytes) + data (1647 bytes) = 1650 bytes
884  t.vin[0].scriptSig = CScript() << std::vector<unsigned char>(1647, 0); // 1650
885  CheckIsStandard(t);
886 
887  t.vin[0].scriptSig = CScript() << std::vector<unsigned char>(1648, 0); // 1651
888  CheckIsNotStandard(t, "scriptsig-size");
889 
890  // Check scriptSig format (non-standard if there are any other ops than just PUSHs)
891  t.vin[0].scriptSig = CScript()
892  << OP_TRUE << OP_0 << OP_1NEGATE << OP_16 // OP_n (single byte pushes: n = 1, 0, -1, 16)
893  << std::vector<unsigned char>(75, 0) // OP_PUSHx [...x bytes...]
894  << std::vector<unsigned char>(235, 0) // OP_PUSHDATA1 x [...x bytes...]
895  << std::vector<unsigned char>(1234, 0) // OP_PUSHDATA2 x [...x bytes...]
896  << OP_9;
897  CheckIsStandard(t);
898 
899  const std::vector<unsigned char> non_push_ops = { // arbitrary set of non-push operations
902 
903  CScript::const_iterator pc = t.vin[0].scriptSig.begin();
904  while (pc < t.vin[0].scriptSig.end()) {
905  opcodetype opcode;
906  CScript::const_iterator prev_pc = pc;
907  t.vin[0].scriptSig.GetOp(pc, opcode); // advance to next op
908  // for the sake of simplicity, we only replace single-byte push operations
909  if (opcode >= 1 && opcode <= OP_PUSHDATA4)
910  continue;
911 
912  int index = prev_pc - t.vin[0].scriptSig.begin();
913  unsigned char orig_op = *prev_pc; // save op
914  // replace current push-op with each non-push-op
915  for (auto op : non_push_ops) {
916  t.vin[0].scriptSig[index] = op;
917  CheckIsNotStandard(t, "scriptsig-not-pushonly");
918  }
919  t.vin[0].scriptSig[index] = orig_op; // restore op
920  CheckIsStandard(t);
921  }
922 
923  // Check tx-size (non-standard if transaction weight is > MAX_STANDARD_TX_WEIGHT)
924  t.vin.clear();
925  t.vin.resize(2438); // size per input (empty scriptSig): 41 bytes
926  t.vout[0].scriptPubKey = CScript() << OP_RETURN << std::vector<unsigned char>(19, 0); // output size: 30 bytes
927  // tx header: 12 bytes => 48 weight units
928  // 2438 inputs: 2438*41 = 99958 bytes => 399832 weight units
929  // 1 output: 30 bytes => 120 weight units
930  // ======================================
931  // total: 400000 weight units
933  CheckIsStandard(t);
934 
935  // increase output size by one byte, so we end up with 400004 weight units
936  t.vout[0].scriptPubKey = CScript() << OP_RETURN << std::vector<unsigned char>(20, 0); // output size: 31 bytes
938  CheckIsNotStandard(t, "tx-size");
939 
940  // Check bare multisig (standard if policy flag g_bare_multi is set)
941  g_bare_multi = true;
942  t.vout[0].scriptPubKey = GetScriptForMultisig(1, {key.GetPubKey()}); // simple 1-of-1
943  t.vin.resize(1);
944  t.vin[0].scriptSig = CScript() << std::vector<unsigned char>(65, 0);
945  CheckIsStandard(t);
946 
947  g_bare_multi = false;
948  CheckIsNotStandard(t, "bare-multisig");
950 
951  // Add dust outputs up to allowed maximum
952  assert(t.vout.size() == 1);
953  t.vout.insert(t.vout.end(), MAX_DUST_OUTPUTS_PER_TX, {0, t.vout[0].scriptPubKey});
954 
955  // Check compressed P2PK outputs dust threshold (must have leading 02 or 03)
956  t.vout[0].scriptPubKey = CScript() << std::vector<unsigned char>(33, 0x02) << OP_CHECKSIG;
957  t.vout[0].nValue = 576;
958  CheckIsStandard(t);
959  t.vout[0].nValue = 575;
960  CheckIsNotStandard(t, "dust");
961 
962  // Check uncompressed P2PK outputs dust threshold (must have leading 04/06/07)
963  t.vout[0].scriptPubKey = CScript() << std::vector<unsigned char>(65, 0x04) << OP_CHECKSIG;
964  t.vout[0].nValue = 672;
965  CheckIsStandard(t);
966  t.vout[0].nValue = 671;
967  CheckIsNotStandard(t, "dust");
968 
969  // Check P2PKH outputs dust threshold
970  t.vout[0].scriptPubKey = CScript() << OP_DUP << OP_HASH160 << std::vector<unsigned char>(20, 0) << OP_EQUALVERIFY << OP_CHECKSIG;
971  t.vout[0].nValue = 546;
972  CheckIsStandard(t);
973  t.vout[0].nValue = 545;
974  CheckIsNotStandard(t, "dust");
975 
976  // Check P2SH outputs dust threshold
977  t.vout[0].scriptPubKey = CScript() << OP_HASH160 << std::vector<unsigned char>(20, 0) << OP_EQUAL;
978  t.vout[0].nValue = 540;
979  CheckIsStandard(t);
980  t.vout[0].nValue = 539;
981  CheckIsNotStandard(t, "dust");
982 
983  // Check P2WPKH outputs dust threshold
984  t.vout[0].scriptPubKey = CScript() << OP_0 << std::vector<unsigned char>(20, 0);
985  t.vout[0].nValue = 294;
986  CheckIsStandard(t);
987  t.vout[0].nValue = 293;
988  CheckIsNotStandard(t, "dust");
989 
990  // Check P2WSH outputs dust threshold
991  t.vout[0].scriptPubKey = CScript() << OP_0 << std::vector<unsigned char>(32, 0);
992  t.vout[0].nValue = 330;
993  CheckIsStandard(t);
994  t.vout[0].nValue = 329;
995  CheckIsNotStandard(t, "dust");
996 
997  // Check P2TR outputs dust threshold (Invalid xonly key ok!)
998  t.vout[0].scriptPubKey = CScript() << OP_1 << std::vector<unsigned char>(32, 0);
999  t.vout[0].nValue = 330;
1000  CheckIsStandard(t);
1001  t.vout[0].nValue = 329;
1002  CheckIsNotStandard(t, "dust");
1003 
1004  // Check future Witness Program versions dust threshold (non-32-byte pushes are undefined for version 1)
1005  for (int op = OP_1; op <= OP_16; op += 1) {
1006  t.vout[0].scriptPubKey = CScript() << (opcodetype)op << std::vector<unsigned char>(2, 0);
1007  t.vout[0].nValue = 240;
1008  CheckIsStandard(t);
1009 
1010  t.vout[0].nValue = 239;
1011  CheckIsNotStandard(t, "dust");
1012  }
1013 
1014  // Check anchor outputs
1015  t.vout[0].scriptPubKey = CScript() << OP_1 << ANCHOR_BYTES;
1016  BOOST_CHECK(t.vout[0].scriptPubKey.IsPayToAnchor());
1017  t.vout[0].nValue = 240;
1018  CheckIsStandard(t);
1019  t.vout[0].nValue = 239;
1020  CheckIsNotStandard(t, "dust");
1021 }
1022 
1023 BOOST_AUTO_TEST_CASE(max_standard_legacy_sigops)
1024 {
1025  CCoinsView coins_dummy;
1026  CCoinsViewCache coins(&coins_dummy);
1027  CKey key;
1028  key.MakeNewKey(true);
1029 
1030  // Create a pathological P2SH script padded with as many sigops as is standard.
1031  CScript max_sigops_redeem_script{CScript() << std::vector<unsigned char>{} << key.GetPubKey()};
1032  for (unsigned i{0}; i < MAX_P2SH_SIGOPS - 1; ++i) max_sigops_redeem_script << OP_2DUP << OP_CHECKSIG << OP_DROP;
1033  max_sigops_redeem_script << OP_CHECKSIG << OP_NOT;
1034  const CScript max_sigops_p2sh{GetScriptForDestination(ScriptHash(max_sigops_redeem_script))};
1035 
1036  // Create a transaction fanning out as many such P2SH outputs as is standard to spend in a
1037  // single transaction, and a transaction spending them.
1038  CMutableTransaction tx_create, tx_max_sigops;
1039  const unsigned p2sh_inputs_count{MAX_TX_LEGACY_SIGOPS / MAX_P2SH_SIGOPS};
1040  tx_create.vout.reserve(p2sh_inputs_count);
1041  for (unsigned i{0}; i < p2sh_inputs_count; ++i) {
1042  tx_create.vout.emplace_back(424242 + i, max_sigops_p2sh);
1043  }
1044  auto prev_txid{tx_create.GetHash()};
1045  tx_max_sigops.vin.reserve(p2sh_inputs_count);
1046  for (unsigned i{0}; i < p2sh_inputs_count; ++i) {
1047  tx_max_sigops.vin.emplace_back(prev_txid, i, CScript() << ToByteVector(max_sigops_redeem_script));
1048  }
1049 
1050  // p2sh_inputs_count is truncated to 166 (from 166.6666..)
1051  BOOST_CHECK_LT(p2sh_inputs_count * MAX_P2SH_SIGOPS, MAX_TX_LEGACY_SIGOPS);
1052  AddCoins(coins, CTransaction(tx_create), 0, false);
1053 
1054  // 2490 sigops is below the limit.
1055  BOOST_CHECK_EQUAL(GetP2SHSigOpCount(CTransaction(tx_max_sigops), coins), 2490);
1056  BOOST_CHECK(::AreInputsStandard(CTransaction(tx_max_sigops), coins));
1057 
1058  // Adding one more input will bump this to 2505, hitting the limit.
1059  tx_create.vout.emplace_back(424242, max_sigops_p2sh);
1060  prev_txid = tx_create.GetHash();
1061  for (unsigned i{0}; i < p2sh_inputs_count; ++i) {
1062  tx_max_sigops.vin[i] = CTxIn(COutPoint(prev_txid, i), CScript() << ToByteVector(max_sigops_redeem_script));
1063  }
1064  tx_max_sigops.vin.emplace_back(prev_txid, p2sh_inputs_count, CScript() << ToByteVector(max_sigops_redeem_script));
1065  AddCoins(coins, CTransaction(tx_create), 0, false);
1066  BOOST_CHECK_GT((p2sh_inputs_count + 1) * MAX_P2SH_SIGOPS, MAX_TX_LEGACY_SIGOPS);
1067  BOOST_CHECK_EQUAL(GetP2SHSigOpCount(CTransaction(tx_max_sigops), coins), 2505);
1068  BOOST_CHECK(!::AreInputsStandard(CTransaction(tx_max_sigops), coins));
1069 
1070  // Now, check the limit can be reached with regular P2PK outputs too. Use a separate
1071  // preparation transaction, to demonstrate spending coins from a single tx is irrelevant.
1072  CMutableTransaction tx_create_p2pk;
1073  const auto p2pk_script{CScript() << key.GetPubKey() << OP_CHECKSIG};
1074  unsigned p2pk_inputs_count{10}; // From 2490 to 2500.
1075  for (unsigned i{0}; i < p2pk_inputs_count; ++i) {
1076  tx_create_p2pk.vout.emplace_back(212121 + i, p2pk_script);
1077  }
1078  prev_txid = tx_create_p2pk.GetHash();
1079  tx_max_sigops.vin.resize(p2sh_inputs_count); // Drop the extra input.
1080  for (unsigned i{0}; i < p2pk_inputs_count; ++i) {
1081  tx_max_sigops.vin.emplace_back(prev_txid, i);
1082  }
1083  AddCoins(coins, CTransaction(tx_create_p2pk), 0, false);
1084 
1085  // The transaction now contains exactly 2500 sigops, the check should pass.
1086  BOOST_CHECK_EQUAL(p2sh_inputs_count * MAX_P2SH_SIGOPS + p2pk_inputs_count * 1, MAX_TX_LEGACY_SIGOPS);
1087  BOOST_CHECK(::AreInputsStandard(CTransaction(tx_max_sigops), coins));
1088 
1089  // Now, add some Segwit inputs. We add one for each defined Segwit output type. The limit
1090  // is exclusively on non-witness sigops and therefore those should not be counted.
1091  CMutableTransaction tx_create_segwit;
1092  const auto witness_script{CScript() << key.GetPubKey() << OP_CHECKSIG};
1093  tx_create_segwit.vout.emplace_back(121212, GetScriptForDestination(WitnessV0KeyHash(key.GetPubKey())));
1094  tx_create_segwit.vout.emplace_back(131313, GetScriptForDestination(WitnessV0ScriptHash(witness_script)));
1095  tx_create_segwit.vout.emplace_back(141414, GetScriptForDestination(WitnessV1Taproot{XOnlyPubKey(key.GetPubKey())}));
1096  prev_txid = tx_create_segwit.GetHash();
1097  for (unsigned i{0}; i < tx_create_segwit.vout.size(); ++i) {
1098  tx_max_sigops.vin.emplace_back(prev_txid, i);
1099  }
1100 
1101  // The transaction now still contains exactly 2500 sigops, the check should pass.
1102  AddCoins(coins, CTransaction(tx_create_segwit), 0, false);
1103  BOOST_REQUIRE(::AreInputsStandard(CTransaction(tx_max_sigops), coins));
1104 
1105  // Add one more P2PK input. We'll reach the limit.
1106  tx_create_p2pk.vout.emplace_back(212121, p2pk_script);
1107  prev_txid = tx_create_p2pk.GetHash();
1108  tx_max_sigops.vin.resize(p2sh_inputs_count);
1109  ++p2pk_inputs_count;
1110  for (unsigned i{0}; i < p2pk_inputs_count; ++i) {
1111  tx_max_sigops.vin.emplace_back(prev_txid, i);
1112  }
1113  AddCoins(coins, CTransaction(tx_create_p2pk), 0, false);
1114  BOOST_CHECK_GT(p2sh_inputs_count * MAX_P2SH_SIGOPS + p2pk_inputs_count * 1, MAX_TX_LEGACY_SIGOPS);
1115  BOOST_CHECK(!::AreInputsStandard(CTransaction(tx_max_sigops), coins));
1116 }
1117 
1118 BOOST_AUTO_TEST_CASE(checktxinputs_invalid_transactions_test)
1119 {
1120  auto check_invalid{[](CAmount input_value, CAmount output_value, bool coinbase, int spend_height, TxValidationResult expected_result, std::string_view expected_reason) {
1121  CCoinsView coins_dummy;
1122  CCoinsViewCache inputs(&coins_dummy);
1123 
1124  const COutPoint prevout{Txid::FromUint256(uint256::ONE), 0};
1125  inputs.AddCoin(prevout, Coin{{input_value, CScript() << OP_TRUE}, /*nHeightIn=*/1, coinbase}, /*possible_overwrite=*/false);
1126 
1127  CMutableTransaction mtx;
1128  mtx.vin.emplace_back(prevout);
1129  mtx.vout.emplace_back(output_value, CScript() << OP_TRUE);
1130 
1131  TxValidationState state;
1132  CAmount txfee{0};
1133  BOOST_CHECK(!Consensus::CheckTxInputs(CTransaction{mtx}, state, inputs, spend_height, txfee));
1134  BOOST_CHECK(state.IsInvalid());
1136  BOOST_CHECK_EQUAL(state.GetRejectReason(), expected_reason);
1137  }};
1138 
1139  check_invalid(/*input_value=*/MAX_MONEY + 1,
1140  /*output_value=*/0,
1141  /*coinbase=*/false,
1142  /*spend_height=*/2,
1143  TxValidationResult::TX_CONSENSUS, /*expected_reason=*/"bad-txns-inputvalues-outofrange");
1144 
1145  check_invalid(/*input_value=*/1 * COIN,
1146  /*output_value=*/2 * COIN,
1147  /*coinbase=*/false,
1148  /*spend_height=*/2,
1149  TxValidationResult::TX_CONSENSUS, /*expected_reason=*/"bad-txns-in-belowout");
1150 
1151  check_invalid(/*input_value=*/1 * COIN,
1152  /*output_value=*/0,
1153  /*coinbase=*/true,
1154  /*spend_height=*/COINBASE_MATURITY,
1155  TxValidationResult::TX_PREMATURE_SPEND, /*expected_reason=*/"bad-txns-premature-spend-of-coinbase");
1156 }
1157 
1158 BOOST_AUTO_TEST_CASE(getvalueout_out_of_range_throws)
1159 {
1160  CMutableTransaction mtx;
1161  mtx.vout.emplace_back(MAX_MONEY + 1, CScript() << OP_TRUE);
1162 
1163  const CTransaction tx{mtx};
1164  BOOST_CHECK_EXCEPTION(tx.GetValueOut(), std::runtime_error, HasReason("GetValueOut: value out of range"));
1165 }
1166 
1168 BOOST_AUTO_TEST_CASE(spends_witness_prog)
1169 {
1170  CCoinsView coins_dummy;
1171  CCoinsViewCache coins(&coins_dummy);
1172  CKey key;
1173  key.MakeNewKey(true);
1174  const CPubKey pubkey{key.GetPubKey()};
1175  CMutableTransaction tx_create{}, tx_spend{};
1176  tx_create.vout.emplace_back(0, CScript{});
1177  tx_spend.vin.emplace_back(Txid{}, 0);
1178  std::vector<std::vector<uint8_t>> sol_dummy;
1179 
1180  // CNoDestination, PubKeyDestination, PKHash, ScriptHash, WitnessV0ScriptHash, WitnessV0KeyHash,
1181  // WitnessV1Taproot, PayToAnchor, WitnessUnknown.
1182  static_assert(std::variant_size_v<CTxDestination> == 9);
1183 
1184  // Go through all defined output types and sanity check SpendsNonAnchorWitnessProg.
1185 
1186  // P2PK
1187  tx_create.vout[0].scriptPubKey = GetScriptForDestination(PubKeyDestination{pubkey});
1188  BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::PUBKEY);
1189  tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1190  AddCoins(coins, CTransaction{tx_create}, 0, false);
1191  BOOST_CHECK(!::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
1192 
1193  // P2PKH
1194  tx_create.vout[0].scriptPubKey = GetScriptForDestination(PKHash{pubkey});
1195  BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::PUBKEYHASH);
1196  tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1197  AddCoins(coins, CTransaction{tx_create}, 0, false);
1198  BOOST_CHECK(!::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
1199 
1200  // P2SH
1201  auto redeem_script{CScript{} << OP_1 << OP_CHECKSIG};
1202  tx_create.vout[0].scriptPubKey = GetScriptForDestination(ScriptHash{redeem_script});
1203  BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::SCRIPTHASH);
1204  tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1205  tx_spend.vin[0].scriptSig = CScript{} << OP_0 << ToByteVector(redeem_script);
1206  AddCoins(coins, CTransaction{tx_create}, 0, false);
1207  BOOST_CHECK(!::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
1208  tx_spend.vin[0].scriptSig.clear();
1209 
1210  // native P2WSH
1211  const auto witness_script{CScript{} << OP_12 << OP_HASH160 << OP_DUP << OP_EQUAL};
1212  tx_create.vout[0].scriptPubKey = GetScriptForDestination(WitnessV0ScriptHash{witness_script});
1213  BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::WITNESS_V0_SCRIPTHASH);
1214  tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1215  AddCoins(coins, CTransaction{tx_create}, 0, false);
1217 
1218  // P2SH-wrapped P2WSH
1219  redeem_script = tx_create.vout[0].scriptPubKey;
1220  tx_create.vout[0].scriptPubKey = GetScriptForDestination(ScriptHash(redeem_script));
1221  BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::SCRIPTHASH);
1222  tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1223  tx_spend.vin[0].scriptSig = CScript{} << ToByteVector(redeem_script);
1224  AddCoins(coins, CTransaction{tx_create}, 0, false);
1226  tx_spend.vin[0].scriptSig.clear();
1227  BOOST_CHECK(!::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
1228 
1229  // native P2WPKH
1230  tx_create.vout[0].scriptPubKey = GetScriptForDestination(WitnessV0KeyHash{pubkey});
1231  BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::WITNESS_V0_KEYHASH);
1232  tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1233  AddCoins(coins, CTransaction{tx_create}, 0, false);
1235 
1236  // P2SH-wrapped P2WPKH
1237  redeem_script = tx_create.vout[0].scriptPubKey;
1238  tx_create.vout[0].scriptPubKey = GetScriptForDestination(ScriptHash(redeem_script));
1239  BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::SCRIPTHASH);
1240  tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1241  tx_spend.vin[0].scriptSig = CScript{} << ToByteVector(redeem_script);
1242  AddCoins(coins, CTransaction{tx_create}, 0, false);
1244  tx_spend.vin[0].scriptSig.clear();
1245  BOOST_CHECK(!::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
1246 
1247  // P2TR
1248  tx_create.vout[0].scriptPubKey = GetScriptForDestination(WitnessV1Taproot{XOnlyPubKey{pubkey}});
1249  BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::WITNESS_V1_TAPROOT);
1250  tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1251  AddCoins(coins, CTransaction{tx_create}, 0, false);
1253 
1254  // P2SH-wrapped P2TR (undefined, non-standard)
1255  redeem_script = tx_create.vout[0].scriptPubKey;
1256  tx_create.vout[0].scriptPubKey = GetScriptForDestination(ScriptHash(redeem_script));
1257  BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::SCRIPTHASH);
1258  tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1259  tx_spend.vin[0].scriptSig = CScript{} << ToByteVector(redeem_script);
1260  AddCoins(coins, CTransaction{tx_create}, 0, false);
1262  tx_spend.vin[0].scriptSig.clear();
1263  BOOST_CHECK(!::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
1264 
1265  // P2A
1266  tx_create.vout[0].scriptPubKey = GetScriptForDestination(PayToAnchor{});
1267  BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::ANCHOR);
1268  tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1269  AddCoins(coins, CTransaction{tx_create}, 0, false);
1270  BOOST_CHECK(!::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
1271 
1272  // P2SH-wrapped P2A (undefined, non-standard)
1273  redeem_script = tx_create.vout[0].scriptPubKey;
1274  tx_create.vout[0].scriptPubKey = GetScriptForDestination(ScriptHash(redeem_script));
1275  BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::SCRIPTHASH);
1276  tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1277  tx_spend.vin[0].scriptSig = CScript{} << ToByteVector(redeem_script);
1278  AddCoins(coins, CTransaction{tx_create}, 0, false);
1280  tx_spend.vin[0].scriptSig.clear();
1281 
1282  // Undefined version 1 witness program
1283  tx_create.vout[0].scriptPubKey = GetScriptForDestination(WitnessUnknown{1, {0x42, 0x42}});
1284  BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::WITNESS_UNKNOWN);
1285  tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1286  AddCoins(coins, CTransaction{tx_create}, 0, false);
1288 
1289  // P2SH-wrapped undefined version 1 witness program
1290  redeem_script = tx_create.vout[0].scriptPubKey;
1291  tx_create.vout[0].scriptPubKey = GetScriptForDestination(ScriptHash(redeem_script));
1292  BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::SCRIPTHASH);
1293  tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1294  tx_spend.vin[0].scriptSig = CScript{} << ToByteVector(redeem_script);
1295  AddCoins(coins, CTransaction{tx_create}, 0, false);
1297  tx_spend.vin[0].scriptSig.clear();
1298  BOOST_CHECK(!::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
1299 
1300  // Various undefined version >1 32-byte witness programs.
1301  const auto program{ToByteVector(XOnlyPubKey{pubkey})};
1302  for (int i{2}; i <= 16; ++i) {
1303  tx_create.vout[0].scriptPubKey = GetScriptForDestination(WitnessUnknown{i, program});
1304  BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::WITNESS_UNKNOWN);
1305  tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1306  AddCoins(coins, CTransaction{tx_create}, 0, false);
1308 
1309  // It's also detected within P2SH.
1310  redeem_script = tx_create.vout[0].scriptPubKey;
1311  tx_create.vout[0].scriptPubKey = GetScriptForDestination(ScriptHash(redeem_script));
1312  BOOST_CHECK_EQUAL(Solver(tx_create.vout[0].scriptPubKey, sol_dummy), TxoutType::SCRIPTHASH);
1313  tx_spend.vin[0].prevout.hash = tx_create.GetHash();
1314  tx_spend.vin[0].scriptSig = CScript{} << ToByteVector(redeem_script);
1315  AddCoins(coins, CTransaction{tx_create}, 0, false);
1317  tx_spend.vin[0].scriptSig.clear();
1318  BOOST_CHECK(!::SpendsNonAnchorWitnessProg(CTransaction{tx_spend}, coins));
1319  }
1320 }
1321 
std::shared_ptr< const CTransaction > CTransactionRef
Definition: transaction.h:403
CAmount nValue
Definition: transaction.h:142
bool SpendsNonAnchorWitnessProg(const CTransaction &tx, const CCoinsViewCache &prevouts)
Check whether this transaction spends any witness program but P2A, including not-yet-defined ones...
Definition: policy.cpp:340
CScript GetScriptForMultisig(int nRequired, const std::vector< CPubKey > &keys)
Generate a multisig script.
Definition: solver.cpp:218
int ret
Valid signature cache, to avoid doing expensive ECDSA signature checking twice for every transaction ...
Definition: sigcache.h:38
static const uint256 ONE
Definition: uint256.h:204
invalid by consensus rules
bool CheckTxInputs(const CTransaction &tx, TxValidationState &state, const CCoinsViewCache &inputs, int nSpendHeight, CAmount &txfee)
Check whether all inputs of this transaction are valid (no double spends and amounts) This does not m...
Definition: tx_verify.cpp:164
std::vector< std::string > SplitString(std::string_view str, char sep)
Definition: string.h:149
const std::map< std::string, script_verify_flag_name > & ScriptFlagNamesToEnum()
std::vector< Byte > ParseHex(std::string_view hex_str)
Like TryParseHex, but returns an empty vector on invalid input.
Definition: strencodings.h:69
bool IsStandardTx(const CTransaction &tx, const std::optional< unsigned > &max_datacarrier_bytes, bool permit_bare_multisig, const CFeeRate &dust_relay_fee, std::string &reason)
Check for standard transaction types.
Definition: policy.cpp:99
static const int WITNESS_SCALE_FACTOR
Definition: consensus.h:21
assert(!tx.IsCoinBase())
enum ScriptError_t ScriptError
CScript scriptPubKey
Definition: transaction.h:143
bool IsValidFlagCombination(script_verify_flags flags)
Flags that are not forbidden by an assert in script validation.
Definition: script.cpp:8
A UTXO entry.
Definition: coins.h:34
static const unsigned int MAX_OP_RETURN_RELAY
Default setting for -datacarriersize in vbytes.
Definition: policy.h:83
Definition: script.h:125
CPubKey GetPubKey() const
Compute the public key from a private key.
Definition: key.cpp:183
std::vector< CTxIn > vin
Definition: transaction.h:359
TxoutType Solver(const CScript &scriptPubKey, std::vector< std::vector< unsigned char >> &vSolutionsRet)
Parse a scriptPubKey and identify script type for standard scripts.
Definition: solver.cpp:141
static bool g_bare_multi
CScriptWitness scriptWitness
Only serialized through CTransaction.
Definition: transaction.h:67
script_verify_flags TrimFlags(script_verify_flags flags)
Definition: script.h:161
virtual bool AddCScript(const CScript &redeemScript)
bool CheckMapFlagNames()
constexpr deserialize_type deserialize
Definition: serialize.h:49
CTxOut out
unspent transaction output
Definition: coins.h:38
unsigned int fCoinBase
whether containing transaction was a coinbase
Definition: coins.h:41
static const int COINBASE_MATURITY
Coinbase transaction outputs can only be spent after this number of new blocks (network rule) ...
Definition: consensus.h:19
const std::string & get_str() const
const UniValue & get_array() const
Bare scripts and BIP16 P2SH-wrapped redeemscripts.
bool isStr() const
Definition: univalue.h:85
static const std::vector< unsigned char > ANCHOR_BYTES
Witness program for Pay-to-Anchor output script type.
Definition: addresstype.h:121
Definition: script.h:162
static const int64_t values[]
A selection of numbers that do not trigger int64_t overflow when added/subtracted.
static constexpr int MAX_SCRIPT_VERIFY_FLAGS_BITS
Definition: interpreter.h:154
UniValue read_json(std::string_view jsondata)
Definition: json.cpp:12
RAII-style controller object for a CCheckQueue that guarantees the passed queue is finished before co...
Definition: checkqueue.h:208
static constexpr bool DEFAULT_PERMIT_BAREMULTISIG
Default for -permitbaremultisig.
Definition: policy.h:51
Definition: script.h:76
A signature creator for transactions.
Definition: sign.h:43
transaction spends a coinbase too early, or violates locktime/sequence locks
Int getInt() const
Definition: univalue.h:140
bool VerifyScript(const CScript &scriptSig, const CScript &scriptPubKey, const CScriptWitness *witness, script_verify_flags flags, const BaseSignatureChecker &checker, ScriptError *serror)
Definition: script.h:102
static int32_t GetTransactionWeight(const CTransaction &tx)
Definition: validation.h:132
CKeyID GetID() const
Get the KeyID of this public key (hash of its serialization)
Definition: pubkey.h:160
const std::vector< CTxIn > vin
Definition: transaction.h:291
static constexpr unsigned int MAX_DUST_OUTPUTS_PER_TX
Maximum number of ephemeral dust outputs allowed.
Definition: policy.h:94
std::vector< unsigned char > valtype
Basic testing setup.
Definition: setup_common.h:64
constexpr unsigned char * begin()
Definition: uint256.h:100
Minimal stream for reading from an existing byte array by std::span.
Definition: streams.h:82
bool CheckTxScripts(const CTransaction &tx, const std::map< COutPoint, CScript > &map_prevout_scriptPubKeys, const std::map< COutPoint, int64_t > &map_prevout_values, script_verify_flags flags, const PrecomputedTransactionData &txdata, const std::string &strTest, bool expect_valid)
static const unsigned int MAX_BLOCK_WEIGHT
The maximum allowed weight for a block, see BIP 141 (network rule)
Definition: consensus.h:15
Definition: script.h:83
CKey GenerateRandomKey(bool compressed) noexcept
Definition: key.cpp:475
constexpr std::array tests
Definition: unitester.cpp:101
int64_t CAmount
Amount in satoshis (Can be negative)
Definition: amount.h:12
static decltype(CTransaction::version) constexpr TX_MAX_STANDARD_VERSION
Definition: policy.h:152
bool AreInputsStandard(const CTransaction &tx, const CCoinsViewCache &mapInputs)
Check transaction inputs.
Definition: policy.cpp:213
Definition: script.h:104
void AddCoins(CCoinsViewCache &cache, const CTransaction &tx, int nHeight, bool check_for_overwrite)
Utility function to add all of a transaction&#39;s outputs to a cache.
Definition: coins.cpp:142
script_verify_flags FillFlags(script_verify_flags flags)
uint32_t nHeight
at which height this containing transaction was included in the active block chain ...
Definition: coins.h:44
bool IsValid() const
Definition: validation.h:105
iterator end()
Definition: prevector.h:257
anyone can spend script
void push_back(const T &value)
Definition: prevector.h:392
Abort execution through assertion failure (for consensus code)
Definition: script.h:84
Abstract view on the open txout dataset.
Definition: coins.h:307
script_verify_flags ParseScriptFlags(std::string strFlags)
BOOST_FIXTURE_TEST_SUITE(cuckoocache_tests, BasicTestingSetup)
Test Suite for CuckooCache.
An input of a transaction.
Definition: transaction.h:61
CTxDestination subtype to encode any future Witness version.
Definition: addresstype.h:95
const char * name
Definition: rest.cpp:48
Double ended buffer combining vector and stream-like interfaces.
Definition: streams.h:132
const SigningProvider & DUMMY_SIGNING_PROVIDER
BOOST_AUTO_TEST_SUITE_END()
An encapsulated public key.
Definition: pubkey.h:33
Fillable signing provider that keeps keys in an address->secret map.
std::string ScriptErrorString(const ScriptError serror)
std::vector< CMutableTransaction > SetupDummyInputs(FillableSigningProvider &keystoreRet, CCoinsViewCache &coinsRet, const std::array< CAmount, 4 > &nValues)
opcodetype
Script opcodes.
Definition: script.h:73
void MakeNewKey(bool fCompressed)
Generate a new private key using a cryptographic PRNG.
Definition: key.cpp:162
const std::vector< CTxOut > vout
Definition: transaction.h:292
uint64_t GetSerializeSize(const T &t)
Definition: serialize.h:1095
static constexpr unsigned int MAX_P2SH_SIGOPS
Maximum number of signature check operations in an IsStandard() P2SH script.
Definition: policy.h:41
static void CreateCreditAndSpend(const FillableSigningProvider &keystore, const CScript &outscript, CTransactionRef &output, CMutableTransaction &input, bool success=true)
BOOST_CHECK_EXCEPTION predicates to check the specific validation error.
Definition: common.h:17
std::string write(unsigned int prettyIndent=0, unsigned int indentLevel=0) const
Definition: script.h:130
Result GetResult() const
Definition: validation.h:108
static constexpr script_verify_flags STANDARD_SCRIPT_VERIFY_FLAGS
Standard script verification flags that standard transactions will comply with.
Definition: policy.h:118
""_hex is a compile-time user-defined literal returning a std::array<std::byte>, equivalent to ParseH...
Definition: strencodings.h:400
void MergeSignatureData(SignatureData sigdata)
Definition: sign.cpp:908
SignatureData CombineSignatures(const CMutableTransaction &input1, const CMutableTransaction &input2, const CTransactionRef tx)
Txid GetHash() const
Compute the hash of this CMutableTransaction.
Definition: transaction.cpp:69
An outpoint - a combination of a transaction hash and an index n into its vout.
Definition: transaction.h:28
std::vector< CTxOut > vout
Definition: transaction.h:360
static constexpr unsigned int MAX_TX_LEGACY_SIGOPS
The maximum number of potentially executed legacy signature operations in a single standard tx...
Definition: policy.h:45
void Add(std::vector< T > &&vChecks)
Definition: checkqueue.h:228
bool SignSignature(const SigningProvider &provider, const CScript &fromPubKey, CMutableTransaction &txTo, unsigned int nIn, const CAmount &amount, int nHashType, SignatureData &sig_data)
Produce a satisfying script (scriptSig or witness).
BOOST_AUTO_TEST_CASE(tx_valid)
void AddCoin(const COutPoint &outpoint, Coin &&coin, bool possible_overwrite)
Add a coin.
Definition: coins.cpp:89
static CScript PushAll(const std::vector< valtype > &values)
static const std::map< std::string, script_verify_flag_name > & mapFlagNames
static void CheckWithFlag(const CTransactionRef &output, const CMutableTransaction &input, script_verify_flags flags, bool success)
CScript GetScriptForDestination(const CTxDestination &dest)
Generate a Bitcoin scriptPubKey for the given CTxDestination.
CScript ParseScript(const std::string &s)
Definition: core_io.cpp:94
std::vector< unsigned char > valtype
Definition: addresstype.cpp:18
CScript scriptSig
Definition: transaction.h:65
int flags
Definition: bitcoin-tx.cpp:529
static constexpr unsigned int DUST_RELAY_TX_FEE
Min feerate for defining dust.
Definition: policy.h:67
std::vector< unsigned char > ToByteVector(const T &in)
Definition: script.h:67
static CFeeRate g_dust
auto result
Definition: common-types.h:74
static void ReplaceRedeemScript(CScript &script, const CScript &redeemScript)
static constexpr script_verify_flags from_int(value_type f)
Definition: verify_flags.h:35
static opcodetype EncodeOP_N(int n)
Definition: script.h:514
Definition: script.h:92
SignatureData DataFromTransaction(const CMutableTransaction &tx, unsigned int nIn, const CTxOut &txout)
Extract signature data from a transaction input, and insert it.
Definition: sign.cpp:837
#define BOOST_CHECK_EQUAL(v1, v2)
Definition: object.cpp:17
Serialized script, used inside transaction inputs and outputs.
Definition: script.h:404
static transaction_identifier FromUint256(const uint256 &id)
unsigned int GetP2SHSigOpCount(const CTransaction &tx, const CCoinsViewCache &inputs)
Count ECDSA signature operations in pay-to-script-hash inputs.
Definition: tx_verify.cpp:126
constexpr unsigned char * end()
Definition: uint256.h:101
A reference to a CKey: the Hash160 of its serialized public key.
Definition: pubkey.h:23
void UpdateInput(CTxIn &input, const SignatureData &data)
Definition: sign.cpp:902
GenericTransactionSignatureChecker< CTransaction > TransactionSignatureChecker
Definition: interpreter.h:336
Fee rate in satoshis per virtualbyte: CAmount / vB the feerate is represented internally as FeeFrac...
Definition: feerate.h:31
static constexpr CAmount MAX_MONEY
No amount larger than this (in satoshi) is valid.
Definition: amount.h:26
bool IsInvalid() const
Definition: validation.h:106
bool ProduceSignature(const SigningProvider &provider, const BaseSignatureCreator &creator, const CScript &fromPubKey, SignatureData &sigdata)
Produce a script signature using a generic signature creator.
Definition: sign.cpp:729
std::set< script_verify_flags > ExcludeIndividualFlags(script_verify_flags flags)
iterator begin()
Definition: prevector.h:255
A mutable version of CTransaction.
Definition: transaction.h:357
virtual bool AddKeyPubKey(const CKey &key, const CPubKey &pubkey)
static constexpr size_t DEFAULT_SIGNATURE_CACHE_BYTES
Definition: sigcache.h:29
static constexpr CAmount CENT
Definition: setup_common.h:47
Definition: script.h:99
size_t size() const
Definition: univalue.h:71
An encapsulated private key.
Definition: key.h:35
The basic transaction that is broadcasted on the network and contained in blocks. ...
Definition: transaction.h:280
CCoinsView that adds a memory cache for transactions to another CCoinsView.
Definition: coins.h:367
bool EvalScript(std::vector< std::vector< unsigned char > > &stack, const CScript &script, script_verify_flags flags, const BaseSignatureChecker &checker, SigVersion sigversion, ScriptExecutionData &execdata, ScriptError *serror)
std::string GetRejectReason() const
Definition: validation.h:109
static constexpr script_verify_flags SCRIPT_VERIFY_NONE
Script verification flags.
Definition: interpreter.h:47
std::optional< R > Complete()
Definition: checkqueue.h:221
COutPoint prevout
Definition: transaction.h:64
Only for Witness versions not already defined above.
bool CheckTransaction(const CTransaction &tx, TxValidationState &state)
Definition: tx_check.cpp:11
Definition: script.h:158
bool isArray() const
Definition: univalue.h:87
CAmount GetFeePerK() const
Return the fee in satoshis for a vsize of 1000 vbytes.
Definition: feerate.h:62
static std::optional< transaction_identifier > FromHex(std::string_view hex)
std::string ToString(const T &t)
Locale-independent version of std::to_string.
Definition: string.h:246
#define Assert(val)
Identity function.
Definition: check.h:113
void emplace_back(Args &&... args)
Definition: prevector.h:383
static constexpr TransactionSerParams TX_NO_WITNESS
Definition: transaction.h:181
static constexpr TransactionSerParams TX_WITH_WITNESS
Definition: transaction.h:180
#define BOOST_CHECK(expr)
Definition: object.cpp:16
Definition: script.h:95
static constexpr CAmount COIN
The amount of satoshis in one BTC.
Definition: amount.h:15
TxValidationResult
A "reason" why a transaction was invalid, suitable for determining whether the provider of the transa...
Definition: validation.h:23