2015-03-10 06:41:19 +01:00
|
|
|
// Copyright (c) 2013-2015 Conformal Systems LLC.
|
2013-07-18 16:49:28 +02:00
|
|
|
// Use of this source code is governed by an ISC
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
2015-01-30 21:54:30 +01:00
|
|
|
package blockchain
|
2013-07-18 16:49:28 +02:00
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/binary"
|
|
|
|
"fmt"
|
2014-07-02 18:04:59 +02:00
|
|
|
"math"
|
|
|
|
"math/big"
|
|
|
|
"time"
|
|
|
|
|
2015-02-06 06:18:27 +01:00
|
|
|
"github.com/btcsuite/btcd/chaincfg"
|
2015-01-27 22:00:49 +01:00
|
|
|
"github.com/btcsuite/btcd/database"
|
2015-01-30 19:08:47 +01:00
|
|
|
"github.com/btcsuite/btcd/txscript"
|
2015-02-05 22:16:39 +01:00
|
|
|
"github.com/btcsuite/btcd/wire"
|
2015-01-15 17:23:47 +01:00
|
|
|
"github.com/btcsuite/btcutil"
|
2013-07-18 16:49:28 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2014-02-28 19:23:50 +01:00
|
|
|
// MaxSigOpsPerBlock is the maximum number of signature operations
|
2013-07-18 16:49:28 +02:00
|
|
|
// allowed for a block. It is a fraction of the max block payload size.
|
2015-02-05 22:16:39 +01:00
|
|
|
MaxSigOpsPerBlock = wire.MaxBlockPayload / 50
|
2013-07-18 16:49:28 +02:00
|
|
|
|
|
|
|
// lockTimeThreshold is the number below which a lock time is
|
|
|
|
// interpreted to be a block number. Since an average of one block
|
|
|
|
// is generated per 10 minutes, this allows blocks for about 9,512
|
|
|
|
// years. However, if the field is interpreted as a timestamp, given
|
|
|
|
// the lock time is a uint32, the max is sometime around 2106.
|
|
|
|
lockTimeThreshold uint32 = 5e8 // Tue Nov 5 00:53:20 1985 UTC
|
|
|
|
|
2014-06-30 17:27:44 +02:00
|
|
|
// MaxTimeOffsetSeconds is the maximum number of seconds a block time
|
|
|
|
// is allowed to be ahead of the current time. This is currently 2
|
|
|
|
// hours.
|
|
|
|
MaxTimeOffsetSeconds = 2 * 60 * 60
|
|
|
|
|
2014-03-15 21:01:48 +01:00
|
|
|
// MinCoinbaseScriptLen is the minimum length a coinbase script can be.
|
|
|
|
MinCoinbaseScriptLen = 2
|
2013-07-18 16:49:28 +02:00
|
|
|
|
2014-03-15 21:01:48 +01:00
|
|
|
// MaxCoinbaseScriptLen is the maximum length a coinbase script can be.
|
|
|
|
MaxCoinbaseScriptLen = 100
|
2013-07-18 16:49:28 +02:00
|
|
|
|
|
|
|
// medianTimeBlocks is the number of previous blocks which should be
|
|
|
|
// used to calculate the median time used to validate block timestamps.
|
|
|
|
medianTimeBlocks = 11
|
|
|
|
|
|
|
|
// serializedHeightVersion is the block version which changed block
|
|
|
|
// coinbases to start with the serialized block height.
|
|
|
|
serializedHeightVersion = 2
|
|
|
|
|
|
|
|
// baseSubsidy is the starting subsidy amount for mined blocks. This
|
2014-02-23 21:25:15 +01:00
|
|
|
// value is halved every SubsidyHalvingInterval blocks.
|
2013-10-29 21:08:12 +01:00
|
|
|
baseSubsidy = 50 * btcutil.SatoshiPerBitcoin
|
2014-04-14 14:59:30 +02:00
|
|
|
|
|
|
|
// CoinbaseMaturity is the number of blocks required before newly
|
|
|
|
// mined bitcoins (coinbase transactions) can be spent.
|
|
|
|
CoinbaseMaturity = 100
|
2013-07-18 16:49:28 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2014-04-14 14:59:30 +02:00
|
|
|
// coinbaseMaturity is the internal variable used for validating the
|
|
|
|
// spending of coinbase outputs. A variable rather than the exported
|
|
|
|
// constant is used because the tests need the ability to modify it.
|
2014-06-26 23:10:10 +02:00
|
|
|
coinbaseMaturity = int64(CoinbaseMaturity)
|
2013-07-18 16:49:28 +02:00
|
|
|
|
2015-02-05 22:16:39 +01:00
|
|
|
// zeroHash is the zero value for a wire.ShaHash and is defined as
|
2013-07-18 16:49:28 +02:00
|
|
|
// a package level variable to avoid the need to create a new instance
|
|
|
|
// every time a check is needed.
|
2015-02-05 22:16:39 +01:00
|
|
|
zeroHash = &wire.ShaHash{}
|
2013-07-18 16:49:28 +02:00
|
|
|
|
|
|
|
// block91842Hash is one of the two nodes which violate the rules
|
|
|
|
// set forth in BIP0030. It is defined as a package level variable to
|
|
|
|
// avoid the need to create a new instance every time a check is needed.
|
|
|
|
block91842Hash = newShaHashFromStr("00000000000a4d0a398161ffc163c503763b1f4360639393e0e4c8e300e0caec")
|
|
|
|
|
|
|
|
// block91880Hash is one of the two nodes which violate the rules
|
|
|
|
// set forth in BIP0030. It is defined as a package level variable to
|
|
|
|
// avoid the need to create a new instance every time a check is needed.
|
|
|
|
block91880Hash = newShaHashFromStr("00000000000743f190a18c5577a3c2d2a1f610ae9601ac046a38084ccb7cd721")
|
|
|
|
)
|
|
|
|
|
|
|
|
// isNullOutpoint determines whether or not a previous transaction output point
|
|
|
|
// is set.
|
2015-02-05 22:16:39 +01:00
|
|
|
func isNullOutpoint(outpoint *wire.OutPoint) bool {
|
2013-07-18 16:49:28 +02:00
|
|
|
if outpoint.Index == math.MaxUint32 && outpoint.Hash.IsEqual(zeroHash) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2015-02-11 21:39:11 +01:00
|
|
|
// ShouldHaveSerializedBlockHeight determines if a block should have a
|
|
|
|
// serialized block height embedded within the scriptSig of its
|
|
|
|
// coinbase transaction. Judgement is based on the block version in the block
|
|
|
|
// header. Blocks with version 2 and above satisfy this criteria. See BIP0034
|
|
|
|
// for further information.
|
|
|
|
func ShouldHaveSerializedBlockHeight(header *wire.BlockHeader) bool {
|
|
|
|
return header.Version >= serializedHeightVersion
|
|
|
|
}
|
|
|
|
|
|
|
|
// IsCoinBaseTx determines whether or not a transaction is a coinbase. A coinbase
|
|
|
|
// is a special transaction created by miners that has no inputs. This is
|
|
|
|
// represented in the block chain by a transaction with a single input that has
|
|
|
|
// a previous output transaction index set to the maximum value along with a
|
2013-07-18 16:49:28 +02:00
|
|
|
// zero hash.
|
2015-03-10 06:41:19 +01:00
|
|
|
//
|
|
|
|
// This function only differs from IsCoinBase in that it works with a raw wire
|
|
|
|
// transaction as opposed to a higher level util transaction.
|
|
|
|
func IsCoinBaseTx(msgTx *wire.MsgTx) bool {
|
2013-07-18 16:49:28 +02:00
|
|
|
// A coin base must only have one transaction input.
|
|
|
|
if len(msgTx.TxIn) != 1 {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// The previous output of a coin base must have a max value index and
|
|
|
|
// a zero hash.
|
2015-03-10 06:41:19 +01:00
|
|
|
prevOut := &msgTx.TxIn[0].PreviousOutPoint
|
2013-07-18 16:49:28 +02:00
|
|
|
if prevOut.Index != math.MaxUint32 || !prevOut.Hash.IsEqual(zeroHash) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
2015-03-10 06:41:19 +01:00
|
|
|
// IsCoinBase determines whether or not a transaction is a coinbase. A coinbase
|
|
|
|
// is a special transaction created by miners that has no inputs. This is
|
|
|
|
// represented in the block chain by a transaction with a single input that has
|
|
|
|
// a previous output transaction index set to the maximum value along with a
|
|
|
|
// zero hash.
|
|
|
|
//
|
|
|
|
// This function only differs from IsCoinBaseTx in that it works with a higher
|
|
|
|
// level util transaction as opposed to a raw wire transaction.
|
|
|
|
func IsCoinBase(tx *btcutil.Tx) bool {
|
|
|
|
return IsCoinBaseTx(tx.MsgTx())
|
|
|
|
}
|
|
|
|
|
2013-09-30 23:40:07 +02:00
|
|
|
// IsFinalizedTransaction determines whether or not a transaction is finalized.
|
2013-10-28 21:17:53 +01:00
|
|
|
func IsFinalizedTransaction(tx *btcutil.Tx, blockHeight int64, blockTime time.Time) bool {
|
|
|
|
msgTx := tx.MsgTx()
|
|
|
|
|
2013-07-18 16:49:28 +02:00
|
|
|
// Lock time of zero means the transaction is finalized.
|
|
|
|
lockTime := msgTx.LockTime
|
|
|
|
if lockTime == 0 {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// The lock time field of a transaction is either a block height at
|
|
|
|
// which the transaction is finalized or a timestamp depending on if the
|
|
|
|
// value is before the lockTimeThreshold. When it is under the
|
|
|
|
// threshold it is a block height.
|
|
|
|
blockTimeOrHeight := int64(0)
|
|
|
|
if lockTime < lockTimeThreshold {
|
|
|
|
blockTimeOrHeight = blockHeight
|
|
|
|
} else {
|
|
|
|
blockTimeOrHeight = blockTime.Unix()
|
|
|
|
}
|
|
|
|
if int64(lockTime) < blockTimeOrHeight {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// At this point, the transaction's lock time hasn't occured yet, but
|
|
|
|
// the transaction might still be finalized if the sequence number
|
|
|
|
// for all transaction inputs is maxed out.
|
|
|
|
for _, txIn := range msgTx.TxIn {
|
|
|
|
if txIn.Sequence != math.MaxUint32 {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// isBIP0030Node returns whether or not the passed node represents one of the
|
|
|
|
// two blocks that violate the BIP0030 rule which prevents transactions from
|
|
|
|
// overwriting old ones.
|
|
|
|
func isBIP0030Node(node *blockNode) bool {
|
|
|
|
if node.height == 91842 && node.hash.IsEqual(block91842Hash) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
if node.height == 91880 && node.hash.IsEqual(block91880Hash) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2014-02-25 07:31:58 +01:00
|
|
|
// CalcBlockSubsidy returns the subsidy amount a block at the provided height
|
2013-07-18 16:49:28 +02:00
|
|
|
// should have. This is mainly used for determining how much the coinbase for
|
|
|
|
// newly generated blocks awards as well as validating the coinbase for blocks
|
|
|
|
// has the expected value.
|
|
|
|
//
|
2014-02-23 21:25:15 +01:00
|
|
|
// The subsidy is halved every SubsidyHalvingInterval blocks. Mathematically
|
2014-02-25 07:31:58 +01:00
|
|
|
// this is: baseSubsidy / 2^(height/subsidyHalvingInterval)
|
2013-07-18 16:49:28 +02:00
|
|
|
//
|
2014-02-25 07:31:58 +01:00
|
|
|
// At the target block generation rate for the main network, this is
|
|
|
|
// approximately every 4 years.
|
2015-02-06 06:18:27 +01:00
|
|
|
func CalcBlockSubsidy(height int64, chainParams *chaincfg.Params) int64 {
|
|
|
|
if chainParams.SubsidyHalvingInterval == 0 {
|
2014-05-26 17:27:50 +02:00
|
|
|
return baseSubsidy
|
|
|
|
}
|
|
|
|
|
2013-07-18 16:49:28 +02:00
|
|
|
// Equivalent to: baseSubsidy / 2^(height/subsidyHalvingInterval)
|
2015-02-06 06:18:27 +01:00
|
|
|
return baseSubsidy >> uint(height/int64(chainParams.SubsidyHalvingInterval))
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
2013-09-30 23:43:10 +02:00
|
|
|
// CheckTransactionSanity performs some preliminary checks on a transaction to
|
2013-07-18 16:49:28 +02:00
|
|
|
// ensure it is sane. These checks are context free.
|
2013-10-28 21:17:53 +01:00
|
|
|
func CheckTransactionSanity(tx *btcutil.Tx) error {
|
2013-07-18 16:49:28 +02:00
|
|
|
// A transaction must have at least one input.
|
2013-10-28 21:17:53 +01:00
|
|
|
msgTx := tx.MsgTx()
|
|
|
|
if len(msgTx.TxIn) == 0 {
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrNoTxInputs, "transaction has no inputs")
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// A transaction must have at least one output.
|
2013-10-28 21:17:53 +01:00
|
|
|
if len(msgTx.TxOut) == 0 {
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrNoTxOutputs, "transaction has no outputs")
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
2014-06-29 22:11:13 +02:00
|
|
|
// A transaction must not exceed the maximum allowed block payload when
|
|
|
|
// serialized.
|
|
|
|
serializedTxSize := tx.MsgTx().SerializeSize()
|
2015-02-05 22:16:39 +01:00
|
|
|
if serializedTxSize > wire.MaxBlockPayload {
|
2014-06-29 22:11:13 +02:00
|
|
|
str := fmt.Sprintf("serialized transaction is too big - got "+
|
2015-02-05 22:16:39 +01:00
|
|
|
"%d, max %d", serializedTxSize, wire.MaxBlockPayload)
|
2014-06-29 22:11:13 +02:00
|
|
|
return ruleError(ErrTxTooBig, str)
|
|
|
|
}
|
2013-07-18 16:49:28 +02:00
|
|
|
|
|
|
|
// Ensure the transaction amounts are in range. Each transaction
|
|
|
|
// output must not be negative or more than the max allowed per
|
|
|
|
// transaction. Also, the total of all outputs must abide by the same
|
|
|
|
// restrictions. All amounts in a transaction are in a unit value known
|
|
|
|
// as a satoshi. One bitcoin is a quantity of satoshi as defined by the
|
2013-10-29 19:57:31 +01:00
|
|
|
// SatoshiPerBitcoin constant.
|
2013-07-18 16:49:28 +02:00
|
|
|
var totalSatoshi int64
|
2013-10-28 21:17:53 +01:00
|
|
|
for _, txOut := range msgTx.TxOut {
|
2013-07-18 16:49:28 +02:00
|
|
|
satoshi := txOut.Value
|
|
|
|
if satoshi < 0 {
|
|
|
|
str := fmt.Sprintf("transaction output has negative "+
|
|
|
|
"value of %v", satoshi)
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrBadTxOutValue, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
2013-10-29 21:08:12 +01:00
|
|
|
if satoshi > btcutil.MaxSatoshi {
|
2013-07-18 16:49:28 +02:00
|
|
|
str := fmt.Sprintf("transaction output value of %v is "+
|
|
|
|
"higher than max allowed value of %v", satoshi,
|
2013-10-29 21:08:12 +01:00
|
|
|
btcutil.MaxSatoshi)
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrBadTxOutValue, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// TODO(davec): No need to check < 0 here as satoshi is
|
|
|
|
// guaranteed to be positive per the above check. Also need
|
|
|
|
// to add overflow checks.
|
|
|
|
totalSatoshi += satoshi
|
|
|
|
if totalSatoshi < 0 {
|
|
|
|
str := fmt.Sprintf("total value of all transaction "+
|
|
|
|
"outputs has negative value of %v", totalSatoshi)
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrBadTxOutValue, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
2013-10-29 21:08:12 +01:00
|
|
|
if totalSatoshi > btcutil.MaxSatoshi {
|
2013-07-18 16:49:28 +02:00
|
|
|
str := fmt.Sprintf("total value of all transaction "+
|
|
|
|
"outputs is %v which is higher than max "+
|
2013-10-29 21:08:12 +01:00
|
|
|
"allowed value of %v", totalSatoshi,
|
|
|
|
btcutil.MaxSatoshi)
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrBadTxOutValue, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for duplicate transaction inputs.
|
2015-02-05 22:16:39 +01:00
|
|
|
existingTxOut := make(map[wire.OutPoint]struct{})
|
2013-10-28 21:17:53 +01:00
|
|
|
for _, txIn := range msgTx.TxIn {
|
2014-10-01 14:53:47 +02:00
|
|
|
if _, exists := existingTxOut[txIn.PreviousOutPoint]; exists {
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrDuplicateTxInputs, "transaction "+
|
|
|
|
"contains duplicate inputs")
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
2014-10-01 14:53:47 +02:00
|
|
|
existingTxOut[txIn.PreviousOutPoint] = struct{}{}
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Coinbase script length must be between min and max length.
|
2013-09-30 23:41:51 +02:00
|
|
|
if IsCoinBase(tx) {
|
2013-10-28 21:17:53 +01:00
|
|
|
slen := len(msgTx.TxIn[0].SignatureScript)
|
2014-03-15 21:01:48 +01:00
|
|
|
if slen < MinCoinbaseScriptLen || slen > MaxCoinbaseScriptLen {
|
2013-07-18 16:49:28 +02:00
|
|
|
str := fmt.Sprintf("coinbase transaction script length "+
|
|
|
|
"of %d is out of range (min: %d, max: %d)",
|
2014-03-15 21:01:48 +01:00
|
|
|
slen, MinCoinbaseScriptLen, MaxCoinbaseScriptLen)
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrBadCoinbaseScriptLen, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// Previous transaction outputs referenced by the inputs to this
|
|
|
|
// transaction must not be null.
|
2013-10-28 21:17:53 +01:00
|
|
|
for _, txIn := range msgTx.TxIn {
|
2014-10-01 14:53:47 +02:00
|
|
|
prevOut := &txIn.PreviousOutPoint
|
2013-07-18 16:49:28 +02:00
|
|
|
if isNullOutpoint(prevOut) {
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrBadTxInput, "transaction "+
|
|
|
|
"input refers to previous output that "+
|
|
|
|
"is null")
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2014-06-26 22:50:13 +02:00
|
|
|
// checkProofOfWork ensures the block header bits which indicate the target
|
2013-07-18 16:49:28 +02:00
|
|
|
// difficulty is in min/max range and that the block hash is less than the
|
|
|
|
// target difficulty as claimed.
|
2014-06-26 22:50:13 +02:00
|
|
|
//
|
|
|
|
//
|
|
|
|
// The flags modify the behavior of this function as follows:
|
|
|
|
// - BFNoPoWCheck: The check to ensure the block hash is less than the target
|
|
|
|
// difficulty is not performed.
|
|
|
|
func checkProofOfWork(block *btcutil.Block, powLimit *big.Int, flags BehaviorFlags) error {
|
2013-07-18 16:49:28 +02:00
|
|
|
// The target difficulty must be larger than zero.
|
2014-01-19 19:38:31 +01:00
|
|
|
target := CompactToBig(block.MsgBlock().Header.Bits)
|
2013-07-18 16:49:28 +02:00
|
|
|
if target.Sign() <= 0 {
|
|
|
|
str := fmt.Sprintf("block target difficulty of %064x is too low",
|
|
|
|
target)
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrUnexpectedDifficulty, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// The target difficulty must be less than the maximum allowed.
|
|
|
|
if target.Cmp(powLimit) > 0 {
|
|
|
|
str := fmt.Sprintf("block target difficulty of %064x is "+
|
|
|
|
"higher than max of %064x", target, powLimit)
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrUnexpectedDifficulty, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
2014-06-26 22:50:13 +02:00
|
|
|
// The block hash must be less than the claimed target unless the flag
|
|
|
|
// to avoid proof of work checks is set.
|
|
|
|
if flags&BFNoPoWCheck != BFNoPoWCheck {
|
|
|
|
// The block hash must be less than the claimed target.
|
2015-04-17 07:44:15 +02:00
|
|
|
hashNum := ShaHashToBig(block.Sha())
|
2014-06-26 22:50:13 +02:00
|
|
|
if hashNum.Cmp(target) > 0 {
|
|
|
|
str := fmt.Sprintf("block hash of %064x is higher than "+
|
|
|
|
"expected max of %064x", hashNum, target)
|
|
|
|
return ruleError(ErrHighHash, str)
|
|
|
|
}
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2014-06-26 22:50:13 +02:00
|
|
|
// CheckProofOfWork ensures the block header bits which indicate the target
|
|
|
|
// difficulty is in min/max range and that the block hash is less than the
|
|
|
|
// target difficulty as claimed.
|
|
|
|
func CheckProofOfWork(block *btcutil.Block, powLimit *big.Int) error {
|
|
|
|
return checkProofOfWork(block, powLimit, BFNone)
|
|
|
|
}
|
|
|
|
|
2014-02-28 19:16:56 +01:00
|
|
|
// CountSigOps returns the number of signature operations for all transaction
|
2013-07-18 16:49:28 +02:00
|
|
|
// input and output scripts in the provided transaction. This uses the
|
|
|
|
// quicker, but imprecise, signature operation counting mechanism from
|
2015-01-30 19:08:47 +01:00
|
|
|
// txscript.
|
2014-02-28 19:16:56 +01:00
|
|
|
func CountSigOps(tx *btcutil.Tx) int {
|
2013-10-28 21:17:53 +01:00
|
|
|
msgTx := tx.MsgTx()
|
|
|
|
|
2013-07-18 16:49:28 +02:00
|
|
|
// Accumulate the number of signature operations in all transaction
|
2013-07-29 23:18:15 +02:00
|
|
|
// inputs.
|
2013-07-18 16:49:28 +02:00
|
|
|
totalSigOps := 0
|
2013-07-29 23:18:15 +02:00
|
|
|
for _, txIn := range msgTx.TxIn {
|
2015-01-30 19:08:47 +01:00
|
|
|
numSigOps := txscript.GetSigOpCount(txIn.SignatureScript)
|
2013-07-18 16:49:28 +02:00
|
|
|
totalSigOps += numSigOps
|
|
|
|
}
|
|
|
|
|
|
|
|
// Accumulate the number of signature operations in all transaction
|
|
|
|
// outputs.
|
|
|
|
for _, txOut := range msgTx.TxOut {
|
2015-01-30 19:08:47 +01:00
|
|
|
numSigOps := txscript.GetSigOpCount(txOut.PkScript)
|
2013-07-18 16:49:28 +02:00
|
|
|
totalSigOps += numSigOps
|
|
|
|
}
|
|
|
|
|
2013-07-29 23:18:15 +02:00
|
|
|
return totalSigOps
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
2014-03-02 04:50:11 +01:00
|
|
|
// CountP2SHSigOps returns the number of signature operations for all input
|
2013-07-18 16:49:28 +02:00
|
|
|
// transactions which are of the pay-to-script-hash type. This uses the
|
2015-01-30 19:08:47 +01:00
|
|
|
// precise, signature operation counting mechanism from the script engine which
|
|
|
|
// requires access to the input transaction scripts.
|
2014-03-02 04:50:11 +01:00
|
|
|
func CountP2SHSigOps(tx *btcutil.Tx, isCoinBaseTx bool, txStore TxStore) (int, error) {
|
2013-07-18 16:49:28 +02:00
|
|
|
// Coinbase transactions have no interesting inputs.
|
|
|
|
if isCoinBaseTx {
|
|
|
|
return 0, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Accumulate the number of signature operations in all transaction
|
|
|
|
// inputs.
|
2013-10-28 21:17:53 +01:00
|
|
|
msgTx := tx.MsgTx()
|
2013-07-18 16:49:28 +02:00
|
|
|
totalSigOps := 0
|
|
|
|
for _, txIn := range msgTx.TxIn {
|
|
|
|
// Ensure the referenced input transaction is available.
|
2014-10-01 14:53:47 +02:00
|
|
|
txInHash := &txIn.PreviousOutPoint.Hash
|
2013-07-18 16:49:28 +02:00
|
|
|
originTx, exists := txStore[*txInHash]
|
2013-09-30 23:21:35 +02:00
|
|
|
if !exists || originTx.Err != nil || originTx.Tx == nil {
|
2013-10-13 09:36:23 +02:00
|
|
|
str := fmt.Sprintf("unable to find input transaction "+
|
2013-08-28 20:46:17 +02:00
|
|
|
"%v referenced from transaction %v", txInHash,
|
2013-10-28 21:17:53 +01:00
|
|
|
tx.Sha())
|
2014-06-25 00:10:53 +02:00
|
|
|
return 0, ruleError(ErrMissingTx, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
2013-10-28 21:17:53 +01:00
|
|
|
originMsgTx := originTx.Tx.MsgTx()
|
2013-07-18 16:49:28 +02:00
|
|
|
|
|
|
|
// Ensure the output index in the referenced transaction is
|
|
|
|
// available.
|
2014-10-01 14:53:47 +02:00
|
|
|
originTxIndex := txIn.PreviousOutPoint.Index
|
2013-10-28 21:17:53 +01:00
|
|
|
if originTxIndex >= uint32(len(originMsgTx.TxOut)) {
|
2013-10-13 09:36:23 +02:00
|
|
|
str := fmt.Sprintf("out of bounds input index %d in "+
|
2013-07-18 16:49:28 +02:00
|
|
|
"transaction %v referenced from transaction %v",
|
2013-10-28 21:17:53 +01:00
|
|
|
originTxIndex, txInHash, tx.Sha())
|
2014-06-25 00:10:53 +02:00
|
|
|
return 0, ruleError(ErrBadTxInput, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// We're only interested in pay-to-script-hash types, so skip
|
|
|
|
// this input if it's not one.
|
2013-10-28 21:17:53 +01:00
|
|
|
pkScript := originMsgTx.TxOut[originTxIndex].PkScript
|
2015-01-30 19:08:47 +01:00
|
|
|
if !txscript.IsPayToScriptHash(pkScript) {
|
2013-07-18 16:49:28 +02:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// Count the precise number of signature operations in the
|
|
|
|
// referenced public key script.
|
|
|
|
sigScript := txIn.SignatureScript
|
2015-01-30 19:08:47 +01:00
|
|
|
numSigOps := txscript.GetPreciseSigOpCount(sigScript, pkScript,
|
2013-07-29 23:18:15 +02:00
|
|
|
true)
|
2013-07-18 16:49:28 +02:00
|
|
|
|
|
|
|
// We could potentially overflow the accumulator so check for
|
|
|
|
// overflow.
|
|
|
|
lastSigOps := totalSigOps
|
|
|
|
totalSigOps += numSigOps
|
|
|
|
if totalSigOps < lastSigOps {
|
2013-10-13 09:36:23 +02:00
|
|
|
str := fmt.Sprintf("the public key script from "+
|
2013-07-18 16:49:28 +02:00
|
|
|
"output index %d in transaction %v contains "+
|
|
|
|
"too many signature operations - overflow",
|
|
|
|
originTxIndex, txInHash)
|
2014-06-25 00:10:53 +02:00
|
|
|
return 0, ruleError(ErrTooManySigOps, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return totalSigOps, nil
|
|
|
|
}
|
|
|
|
|
2014-06-26 22:50:13 +02:00
|
|
|
// checkBlockSanity performs some preliminary checks on a block to ensure it is
|
2013-07-18 16:49:28 +02:00
|
|
|
// sane before continuing with block processing. These checks are context free.
|
2014-06-26 22:50:13 +02:00
|
|
|
//
|
|
|
|
// The flags do not modify the behavior of this function directly, however they
|
|
|
|
// are needed to pass along to checkProofOfWork.
|
2014-10-03 22:29:25 +02:00
|
|
|
func checkBlockSanity(block *btcutil.Block, powLimit *big.Int, timeSource MedianTimeSource, flags BehaviorFlags) error {
|
2014-06-29 22:11:13 +02:00
|
|
|
// A block must have at least one transaction.
|
|
|
|
msgBlock := block.MsgBlock()
|
|
|
|
numTx := len(msgBlock.Transactions)
|
|
|
|
if numTx == 0 {
|
|
|
|
return ruleError(ErrNoTransactions, "block does not contain "+
|
|
|
|
"any transactions")
|
|
|
|
}
|
|
|
|
|
|
|
|
// A block must not have more transactions than the max block payload.
|
2015-02-05 22:16:39 +01:00
|
|
|
if numTx > wire.MaxBlockPayload {
|
2014-06-29 22:11:13 +02:00
|
|
|
str := fmt.Sprintf("block contains too many transactions - "+
|
2015-02-05 22:16:39 +01:00
|
|
|
"got %d, max %d", numTx, wire.MaxBlockPayload)
|
2014-06-29 22:11:13 +02:00
|
|
|
return ruleError(ErrTooManyTransactions, str)
|
|
|
|
}
|
|
|
|
|
|
|
|
// A block must not exceed the maximum allowed block payload when
|
|
|
|
// serialized.
|
|
|
|
serializedSize := msgBlock.SerializeSize()
|
2015-02-05 22:16:39 +01:00
|
|
|
if serializedSize > wire.MaxBlockPayload {
|
2014-06-29 22:11:13 +02:00
|
|
|
str := fmt.Sprintf("serialized block is too big - got %d, "+
|
2015-02-05 22:16:39 +01:00
|
|
|
"max %d", serializedSize, wire.MaxBlockPayload)
|
2014-06-29 22:11:13 +02:00
|
|
|
return ruleError(ErrBlockTooBig, str)
|
|
|
|
}
|
2013-07-18 16:49:28 +02:00
|
|
|
|
|
|
|
// Ensure the proof of work bits in the block header is in min/max range
|
|
|
|
// and the block hash is less than the target value described by the
|
|
|
|
// bits.
|
2014-06-26 22:50:13 +02:00
|
|
|
err := checkProofOfWork(block, powLimit, flags)
|
2013-07-18 16:49:28 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2014-02-24 17:17:13 +01:00
|
|
|
// A block timestamp must not have a greater precision than one second.
|
|
|
|
// This check is necessary because Go time.Time values support
|
|
|
|
// nanosecond precision whereas the consensus rules only apply to
|
|
|
|
// seconds and it's much nicer to deal with standard Go time values
|
|
|
|
// instead of converting to seconds everywhere.
|
2013-10-28 21:17:53 +01:00
|
|
|
header := &block.MsgBlock().Header
|
2014-02-24 17:17:13 +01:00
|
|
|
if !header.Timestamp.Equal(time.Unix(header.Timestamp.Unix(), 0)) {
|
|
|
|
str := fmt.Sprintf("block timestamp of %v has a higher "+
|
|
|
|
"precision than one second", header.Timestamp)
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrInvalidTime, str)
|
2014-02-24 17:17:13 +01:00
|
|
|
}
|
|
|
|
|
2014-06-30 17:27:44 +02:00
|
|
|
// Ensure the block time is not too far in the future.
|
2014-10-03 22:29:25 +02:00
|
|
|
maxTimestamp := timeSource.AdjustedTime().Add(time.Second *
|
|
|
|
MaxTimeOffsetSeconds)
|
2014-06-30 17:27:44 +02:00
|
|
|
if header.Timestamp.After(maxTimestamp) {
|
2013-07-18 16:49:28 +02:00
|
|
|
str := fmt.Sprintf("block timestamp of %v is too far in the "+
|
|
|
|
"future", header.Timestamp)
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrTimeTooNew, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// The first transaction in a block must be a coinbase.
|
2014-06-29 22:11:13 +02:00
|
|
|
transactions := block.Transactions()
|
2013-09-30 23:41:51 +02:00
|
|
|
if !IsCoinBase(transactions[0]) {
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrFirstTxNotCoinbase, "first transaction in "+
|
|
|
|
"block is not a coinbase")
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// A block must not have more than one coinbase.
|
2013-07-30 00:02:42 +02:00
|
|
|
for i, tx := range transactions[1:] {
|
2013-09-30 23:41:51 +02:00
|
|
|
if IsCoinBase(tx) {
|
2013-07-30 00:02:42 +02:00
|
|
|
str := fmt.Sprintf("block contains second coinbase at "+
|
|
|
|
"index %d", i)
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrMultipleCoinbases, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Do some preliminary checks on each transaction to ensure they are
|
|
|
|
// sane before continuing.
|
|
|
|
for _, tx := range transactions {
|
2013-09-30 23:43:10 +02:00
|
|
|
err := CheckTransactionSanity(tx)
|
2013-07-18 16:49:28 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Build merkle tree and ensure the calculated merkle root matches the
|
|
|
|
// entry in the block header. This also has the effect of caching all
|
|
|
|
// of the transaction hashes in the block to speed up future hash
|
|
|
|
// checks. Bitcoind builds the tree here and checks the merkle root
|
|
|
|
// after the following checks, but there is no reason not to check the
|
|
|
|
// merkle root matches here.
|
2014-03-02 04:16:06 +01:00
|
|
|
merkles := BuildMerkleTreeStore(block.Transactions())
|
2013-07-18 16:49:28 +02:00
|
|
|
calculatedMerkleRoot := merkles[len(merkles)-1]
|
|
|
|
if !header.MerkleRoot.IsEqual(calculatedMerkleRoot) {
|
2013-07-30 02:50:00 +02:00
|
|
|
str := fmt.Sprintf("block merkle root is invalid - block "+
|
|
|
|
"header indicates %v, but calculated value is %v",
|
|
|
|
header.MerkleRoot, calculatedMerkleRoot)
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrBadMerkleRoot, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Check for duplicate transactions. This check will be fairly quick
|
|
|
|
// since the transaction hashes are already cached due to building the
|
|
|
|
// merkle tree above.
|
2015-02-05 22:16:39 +01:00
|
|
|
existingTxHashes := make(map[wire.ShaHash]struct{})
|
2013-10-28 21:17:53 +01:00
|
|
|
for _, tx := range transactions {
|
|
|
|
hash := tx.Sha()
|
2013-07-18 16:49:28 +02:00
|
|
|
if _, exists := existingTxHashes[*hash]; exists {
|
|
|
|
str := fmt.Sprintf("block contains duplicate "+
|
|
|
|
"transaction %v", hash)
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrDuplicateTx, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
2014-07-02 17:56:22 +02:00
|
|
|
existingTxHashes[*hash] = struct{}{}
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// The number of signature operations must be less than the maximum
|
|
|
|
// allowed per block.
|
|
|
|
totalSigOps := 0
|
2013-07-29 23:18:15 +02:00
|
|
|
for _, tx := range transactions {
|
2013-07-18 16:49:28 +02:00
|
|
|
// We could potentially overflow the accumulator so check for
|
|
|
|
// overflow.
|
|
|
|
lastSigOps := totalSigOps
|
2014-02-28 19:16:56 +01:00
|
|
|
totalSigOps += CountSigOps(tx)
|
2014-02-28 19:23:50 +01:00
|
|
|
if totalSigOps < lastSigOps || totalSigOps > MaxSigOpsPerBlock {
|
2013-07-18 16:49:28 +02:00
|
|
|
str := fmt.Sprintf("block contains too many signature "+
|
|
|
|
"operations - got %v, max %v", totalSigOps,
|
2014-02-28 19:23:50 +01:00
|
|
|
MaxSigOpsPerBlock)
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrTooManySigOps, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2014-06-26 22:50:13 +02:00
|
|
|
// CheckBlockSanity performs some preliminary checks on a block to ensure it is
|
|
|
|
// sane before continuing with block processing. These checks are context free.
|
2014-10-03 22:29:25 +02:00
|
|
|
func CheckBlockSanity(block *btcutil.Block, powLimit *big.Int, timeSource MedianTimeSource) error {
|
|
|
|
return checkBlockSanity(block, powLimit, timeSource, BFNone)
|
2014-06-26 22:50:13 +02:00
|
|
|
}
|
|
|
|
|
2015-02-11 21:39:11 +01:00
|
|
|
// ExtractCoinbaseHeight attempts to extract the height of the block
|
|
|
|
// from the scriptSig of a coinbase transaction. Coinbase heights
|
|
|
|
// are only present in blocks of version 2 or later. This was added as part of
|
|
|
|
// BIP0034.
|
|
|
|
func ExtractCoinbaseHeight(coinbaseTx *btcutil.Tx) (int64, error) {
|
2013-10-28 21:17:53 +01:00
|
|
|
sigScript := coinbaseTx.MsgTx().TxIn[0].SignatureScript
|
2013-10-06 20:01:54 +02:00
|
|
|
if len(sigScript) < 1 {
|
2013-07-18 16:49:28 +02:00
|
|
|
str := "the coinbase signature script for blocks of " +
|
|
|
|
"version %d or greater must start with the " +
|
2013-10-06 20:01:54 +02:00
|
|
|
"length of the serialized block height"
|
2013-07-18 16:49:28 +02:00
|
|
|
str = fmt.Sprintf(str, serializedHeightVersion)
|
2015-02-11 21:39:11 +01:00
|
|
|
return 0, ruleError(ErrMissingCoinbaseHeight, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
2013-10-06 20:01:54 +02:00
|
|
|
serializedLen := int(sigScript[0])
|
|
|
|
if len(sigScript[1:]) < serializedLen {
|
|
|
|
str := "the coinbase signature script for blocks of " +
|
|
|
|
"version %d or greater must start with the " +
|
|
|
|
"serialized block height"
|
|
|
|
str = fmt.Sprintf(str, serializedLen)
|
2015-02-11 21:39:11 +01:00
|
|
|
return 0, ruleError(ErrMissingCoinbaseHeight, str)
|
2013-10-06 20:01:54 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
serializedHeightBytes := make([]byte, 8, 8)
|
|
|
|
copy(serializedHeightBytes, sigScript[1:serializedLen+1])
|
|
|
|
serializedHeight := binary.LittleEndian.Uint64(serializedHeightBytes)
|
2015-02-11 21:39:11 +01:00
|
|
|
|
|
|
|
return int64(serializedHeight), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// checkSerializedHeight checks if the signature script in the passed
|
|
|
|
// transaction starts with the serialized block height of wantHeight.
|
|
|
|
func checkSerializedHeight(coinbaseTx *btcutil.Tx, wantHeight int64) error {
|
|
|
|
serializedHeight, err := ExtractCoinbaseHeight(coinbaseTx)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if serializedHeight != wantHeight {
|
2013-07-18 16:49:28 +02:00
|
|
|
str := fmt.Sprintf("the coinbase signature script serialized "+
|
|
|
|
"block height is %d when %d was expected",
|
|
|
|
serializedHeight, wantHeight)
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrBadCoinbaseHeight, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2013-09-30 23:21:35 +02:00
|
|
|
// isTransactionSpent returns whether or not the provided transaction data
|
|
|
|
// describes a fully spent transaction. A fully spent transaction is one where
|
|
|
|
// all outputs have been spent.
|
|
|
|
func isTransactionSpent(txD *TxData) bool {
|
|
|
|
for _, isOutputSpent := range txD.Spent {
|
2013-07-18 16:49:28 +02:00
|
|
|
if !isOutputSpent {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// checkBIP0030 ensures blocks do not contain duplicate transactions which
|
|
|
|
// 'overwrite' older transactions that are not fully spent. This prevents an
|
|
|
|
// attack where a coinbase and all of its dependent transactions could be
|
|
|
|
// duplicated to effectively revert the overwritten transactions to a single
|
|
|
|
// confirmation thereby making them vulnerable to a double spend.
|
|
|
|
//
|
|
|
|
// For more details, see https://en.bitcoin.it/wiki/BIP_0030 and
|
|
|
|
// http://r6.ca/blog/20120206T005236Z.html.
|
|
|
|
func (b *BlockChain) checkBIP0030(node *blockNode, block *btcutil.Block) error {
|
|
|
|
// Attempt to fetch duplicate transactions for all of the transactions
|
|
|
|
// in this block from the point of view of the parent node.
|
2015-02-05 22:16:39 +01:00
|
|
|
fetchSet := make(map[wire.ShaHash]struct{})
|
2014-03-24 19:14:04 +01:00
|
|
|
for _, tx := range block.Transactions() {
|
2014-07-02 17:56:22 +02:00
|
|
|
fetchSet[*tx.Sha()] = struct{}{}
|
2013-10-10 19:23:46 +02:00
|
|
|
}
|
|
|
|
txResults, err := b.fetchTxStore(node, fetchSet)
|
2013-07-18 16:49:28 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Examine the resulting data about the requested transactions.
|
|
|
|
for _, txD := range txResults {
|
2013-09-30 23:21:35 +02:00
|
|
|
switch txD.Err {
|
2013-07-18 16:49:28 +02:00
|
|
|
// A duplicate transaction was not found. This is the most
|
|
|
|
// common case.
|
2015-01-27 22:00:49 +01:00
|
|
|
case database.ErrTxShaMissing:
|
2013-07-18 16:49:28 +02:00
|
|
|
continue
|
|
|
|
|
|
|
|
// A duplicate transaction was found. This is only allowed if
|
|
|
|
// the duplicate transaction is fully spent.
|
|
|
|
case nil:
|
|
|
|
if !isTransactionSpent(txD) {
|
|
|
|
str := fmt.Sprintf("tried to overwrite "+
|
|
|
|
"transaction %v at block height %d "+
|
2013-09-30 23:21:35 +02:00
|
|
|
"that is not fully spent", txD.Hash,
|
|
|
|
txD.BlockHeight)
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrOverwriteTx, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Some other unexpected error occurred. Return it now.
|
|
|
|
default:
|
2013-09-30 23:21:35 +02:00
|
|
|
return txD.Err
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2013-09-30 23:44:01 +02:00
|
|
|
// CheckTransactionInputs performs a series of checks on the inputs to a
|
2013-07-18 16:49:28 +02:00
|
|
|
// transaction to ensure they are valid. An example of some of the checks
|
|
|
|
// include verifying all inputs exist, ensuring the coinbase seasoning
|
2013-07-26 18:50:20 +02:00
|
|
|
// requirements are met, detecting double spends, validating all values and fees
|
|
|
|
// are in the legal range and the total output amount doesn't exceed the input
|
|
|
|
// amount, and verifying the signatures to prove the spender was the owner of
|
|
|
|
// the bitcoins and therefore allowed to spend them. As it checks the inputs,
|
|
|
|
// it also calculates the total fees for the transaction and returns that value.
|
2013-10-28 21:17:53 +01:00
|
|
|
func CheckTransactionInputs(tx *btcutil.Tx, txHeight int64, txStore TxStore) (int64, error) {
|
2013-07-18 16:49:28 +02:00
|
|
|
// Coinbase transactions have no inputs.
|
2013-09-30 23:41:51 +02:00
|
|
|
if IsCoinBase(tx) {
|
2013-07-18 16:49:28 +02:00
|
|
|
return 0, nil
|
|
|
|
}
|
|
|
|
|
2013-10-28 21:17:53 +01:00
|
|
|
txHash := tx.Sha()
|
2013-07-18 16:49:28 +02:00
|
|
|
var totalSatoshiIn int64
|
2013-10-28 21:17:53 +01:00
|
|
|
for _, txIn := range tx.MsgTx().TxIn {
|
2013-07-18 16:49:28 +02:00
|
|
|
// Ensure the input is available.
|
2014-10-01 14:53:47 +02:00
|
|
|
txInHash := &txIn.PreviousOutPoint.Hash
|
2013-07-18 16:49:28 +02:00
|
|
|
originTx, exists := txStore[*txInHash]
|
2013-10-02 17:26:44 +02:00
|
|
|
if !exists || originTx.Err != nil || originTx.Tx == nil {
|
2013-07-18 16:49:28 +02:00
|
|
|
str := fmt.Sprintf("unable to find input transaction "+
|
2013-08-28 20:50:47 +02:00
|
|
|
"%v for transaction %v", txInHash, txHash)
|
2014-06-25 00:10:53 +02:00
|
|
|
return 0, ruleError(ErrMissingTx, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure the transaction is not spending coins which have not
|
|
|
|
// yet reached the required coinbase maturity.
|
2013-09-30 23:41:51 +02:00
|
|
|
if IsCoinBase(originTx.Tx) {
|
2013-09-30 23:21:35 +02:00
|
|
|
originHeight := originTx.BlockHeight
|
2013-07-18 16:49:28 +02:00
|
|
|
blocksSincePrev := txHeight - originHeight
|
|
|
|
if blocksSincePrev < coinbaseMaturity {
|
|
|
|
str := fmt.Sprintf("tried to spend coinbase "+
|
|
|
|
"transaction %v from height %v at "+
|
|
|
|
"height %v before required maturity "+
|
2014-03-28 19:07:26 +01:00
|
|
|
"of %v blocks", txInHash, originHeight,
|
2013-07-18 16:49:28 +02:00
|
|
|
txHeight, coinbaseMaturity)
|
2014-06-25 00:10:53 +02:00
|
|
|
return 0, ruleError(ErrImmatureSpend, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure the transaction is not double spending coins.
|
2014-10-01 14:53:47 +02:00
|
|
|
originTxIndex := txIn.PreviousOutPoint.Index
|
2013-09-30 23:21:35 +02:00
|
|
|
if originTxIndex >= uint32(len(originTx.Spent)) {
|
2014-06-25 00:10:53 +02:00
|
|
|
str := fmt.Sprintf("out of bounds input index %d in "+
|
2013-07-18 16:49:28 +02:00
|
|
|
"transaction %v referenced from transaction %v",
|
|
|
|
originTxIndex, txInHash, txHash)
|
2014-06-25 00:10:53 +02:00
|
|
|
return 0, ruleError(ErrBadTxInput, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
2013-09-30 23:21:35 +02:00
|
|
|
if originTx.Spent[originTxIndex] {
|
2013-07-18 16:49:28 +02:00
|
|
|
str := fmt.Sprintf("transaction %v tried to double "+
|
2015-01-07 01:20:25 +01:00
|
|
|
"spend output %v", txHash, txIn.PreviousOutPoint)
|
2014-06-25 00:10:53 +02:00
|
|
|
return 0, ruleError(ErrDoubleSpend, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure the transaction amounts are in range. Each of the
|
|
|
|
// output values of the input transactions must not be negative
|
|
|
|
// or more than the max allowed per transaction. All amounts in
|
|
|
|
// a transaction are in a unit value known as a satoshi. One
|
|
|
|
// bitcoin is a quantity of satoshi as defined by the
|
2013-10-29 19:57:31 +01:00
|
|
|
// SatoshiPerBitcoin constant.
|
2013-10-28 21:17:53 +01:00
|
|
|
originTxSatoshi := originTx.Tx.MsgTx().TxOut[originTxIndex].Value
|
2013-07-18 16:49:28 +02:00
|
|
|
if originTxSatoshi < 0 {
|
|
|
|
str := fmt.Sprintf("transaction output has negative "+
|
|
|
|
"value of %v", originTxSatoshi)
|
2014-06-25 00:10:53 +02:00
|
|
|
return 0, ruleError(ErrBadTxOutValue, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
2013-10-29 21:08:12 +01:00
|
|
|
if originTxSatoshi > btcutil.MaxSatoshi {
|
2013-07-18 16:49:28 +02:00
|
|
|
str := fmt.Sprintf("transaction output value of %v is "+
|
|
|
|
"higher than max allowed value of %v",
|
2013-10-29 21:08:12 +01:00
|
|
|
originTxSatoshi, btcutil.MaxSatoshi)
|
2014-06-25 00:10:53 +02:00
|
|
|
return 0, ruleError(ErrBadTxOutValue, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// The total of all outputs must not be more than the max
|
|
|
|
// allowed per transaction. Also, we could potentially overflow
|
|
|
|
// the accumulator so check for overflow.
|
|
|
|
lastSatoshiIn := totalSatoshiIn
|
|
|
|
totalSatoshiIn += originTxSatoshi
|
2013-10-29 21:08:12 +01:00
|
|
|
if totalSatoshiIn < lastSatoshiIn ||
|
|
|
|
totalSatoshiIn > btcutil.MaxSatoshi {
|
2013-07-18 16:49:28 +02:00
|
|
|
str := fmt.Sprintf("total value of all transaction "+
|
|
|
|
"inputs is %v which is higher than max "+
|
|
|
|
"allowed value of %v", totalSatoshiIn,
|
2013-10-29 21:08:12 +01:00
|
|
|
btcutil.MaxSatoshi)
|
2014-06-25 00:10:53 +02:00
|
|
|
return 0, ruleError(ErrBadTxOutValue, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
2013-07-26 18:50:20 +02:00
|
|
|
|
|
|
|
// Mark the referenced output as spent.
|
2013-09-30 23:21:35 +02:00
|
|
|
originTx.Spent[originTxIndex] = true
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Calculate the total output amount for this transaction. It is safe
|
|
|
|
// to ignore overflow and out of range errors here because those error
|
|
|
|
// conditions would have already been caught by checkTransactionSanity.
|
|
|
|
var totalSatoshiOut int64
|
2013-10-28 21:17:53 +01:00
|
|
|
for _, txOut := range tx.MsgTx().TxOut {
|
2013-07-18 16:49:28 +02:00
|
|
|
totalSatoshiOut += txOut.Value
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure the transaction does not spend more than its inputs.
|
|
|
|
if totalSatoshiIn < totalSatoshiOut {
|
|
|
|
str := fmt.Sprintf("total value of all transaction inputs for "+
|
|
|
|
"transaction %v is %v which is less than the amount "+
|
|
|
|
"spent of %v", txHash, totalSatoshiIn, totalSatoshiOut)
|
2014-06-25 00:10:53 +02:00
|
|
|
return 0, ruleError(ErrSpendTooHigh, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// NOTE: bitcoind checks if the transaction fees are < 0 here, but that
|
|
|
|
// is an impossible condition because of the check above that ensures
|
|
|
|
// the inputs are >= the outputs.
|
|
|
|
txFeeInSatoshi := totalSatoshiIn - totalSatoshiOut
|
|
|
|
return txFeeInSatoshi, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// checkConnectBlock performs several checks to confirm connecting the passed
|
|
|
|
// block to the main chain (including whatever reorganization might be necessary
|
|
|
|
// to get this node to the main chain) does not violate any rules.
|
2014-03-11 19:18:27 +01:00
|
|
|
//
|
|
|
|
// The CheckConnectBlock function makes use of this function to perform the
|
|
|
|
// bulk of its work. The only difference is this function accepts a node which
|
|
|
|
// may or may not require reorganization to connect it to the main chain whereas
|
|
|
|
// CheckConnectBlock creates a new node which specifically connects to the end
|
|
|
|
// of the current main chain and then calls this function with that node.
|
|
|
|
//
|
|
|
|
// See the comments for CheckConnectBlock for some examples of the type of
|
|
|
|
// checks performed by this function.
|
2013-07-18 16:49:28 +02:00
|
|
|
func (b *BlockChain) checkConnectBlock(node *blockNode, block *btcutil.Block) error {
|
|
|
|
// If the side chain blocks end up in the database, a call to
|
2014-06-25 00:10:53 +02:00
|
|
|
// CheckBlockSanity should be done here in case a previous version
|
2013-07-18 16:49:28 +02:00
|
|
|
// allowed a block that is no longer valid. However, since the
|
|
|
|
// implementation only currently uses memory for the side chain blocks,
|
|
|
|
// it isn't currently necessary.
|
|
|
|
|
|
|
|
// The coinbase for the Genesis block is not spendable, so just return
|
|
|
|
// now.
|
2015-02-06 06:18:27 +01:00
|
|
|
if node.hash.IsEqual(b.chainParams.GenesisHash) && b.bestChain == nil {
|
2013-07-18 16:49:28 +02:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// BIP0030 added a rule to prevent blocks which contain duplicate
|
|
|
|
// transactions that 'overwrite' older transactions which are not fully
|
|
|
|
// spent. See the documentation for checkBIP0030 for more details.
|
|
|
|
//
|
|
|
|
// There are two blocks in the chain which violate this
|
|
|
|
// rule, so the check must be skipped for those blocks. The
|
|
|
|
// isBIP0030Node function is used to determine if this block is one
|
|
|
|
// of the two blocks that must be skipped.
|
|
|
|
enforceBIP0030 := !isBIP0030Node(node)
|
|
|
|
if enforceBIP0030 {
|
|
|
|
err := b.checkBIP0030(node, block)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Request a map that contains all input transactions for the block from
|
|
|
|
// the point of view of its position within the block chain. These
|
|
|
|
// transactions are needed for verification of things such as
|
|
|
|
// transaction inputs, counting pay-to-script-hashes, and scripts.
|
|
|
|
txInputStore, err := b.fetchInputTransactions(node, block)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// BIP0016 describes a pay-to-script-hash type that is considered a
|
|
|
|
// "standard" type. The rules for this BIP only apply to transactions
|
2015-01-30 19:08:47 +01:00
|
|
|
// after the timestamp defined by txscript.Bip16Activation. See
|
2013-07-18 16:49:28 +02:00
|
|
|
// https://en.bitcoin.it/wiki/BIP_0016 for more details.
|
|
|
|
enforceBIP0016 := false
|
2015-01-30 19:08:47 +01:00
|
|
|
if node.timestamp.After(txscript.Bip16Activation) {
|
2013-07-18 16:49:28 +02:00
|
|
|
enforceBIP0016 = true
|
|
|
|
}
|
|
|
|
|
|
|
|
// The number of signature operations must be less than the maximum
|
|
|
|
// allowed per block. Note that the preliminary sanity checks on a
|
|
|
|
// block also include a check similar to this one, but this check
|
|
|
|
// expands the count to include a precise count of pay-to-script-hash
|
|
|
|
// signature operations in each of the input transaction public key
|
|
|
|
// scripts.
|
2013-10-28 21:17:53 +01:00
|
|
|
transactions := block.Transactions()
|
2013-07-18 16:49:28 +02:00
|
|
|
totalSigOps := 0
|
|
|
|
for i, tx := range transactions {
|
2014-02-28 19:16:56 +01:00
|
|
|
numsigOps := CountSigOps(tx)
|
2013-07-18 16:49:28 +02:00
|
|
|
if enforceBIP0016 {
|
2013-07-29 23:18:15 +02:00
|
|
|
// Since the first (and only the first) transaction has
|
|
|
|
// already been verified to be a coinbase transaction,
|
|
|
|
// use i == 0 as an optimization for the flag to
|
|
|
|
// countP2SHSigOps for whether or not the transaction is
|
|
|
|
// a coinbase transaction rather than having to do a
|
|
|
|
// full coinbase check again.
|
2014-03-02 04:50:11 +01:00
|
|
|
numP2SHSigOps, err := CountP2SHSigOps(tx, i == 0,
|
2013-07-18 16:49:28 +02:00
|
|
|
txInputStore)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
numsigOps += numP2SHSigOps
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check for overflow or going over the limits. We have to do
|
2013-10-11 17:24:13 +02:00
|
|
|
// this on every loop iteration to avoid overflow.
|
2013-07-18 16:49:28 +02:00
|
|
|
lastSigops := totalSigOps
|
|
|
|
totalSigOps += numsigOps
|
2014-02-28 19:23:50 +01:00
|
|
|
if totalSigOps < lastSigops || totalSigOps > MaxSigOpsPerBlock {
|
2013-07-18 16:49:28 +02:00
|
|
|
str := fmt.Sprintf("block contains too many "+
|
|
|
|
"signature operations - got %v, max %v",
|
2014-02-28 19:23:50 +01:00
|
|
|
totalSigOps, MaxSigOpsPerBlock)
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrTooManySigOps, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Perform several checks on the inputs for each transaction. Also
|
|
|
|
// accumulate the total fees. This could technically be combined with
|
|
|
|
// the loop above instead of running another loop over the transactions,
|
|
|
|
// but by separating it we can avoid running the more expensive (though
|
|
|
|
// still relatively cheap as compared to running the scripts) checks
|
|
|
|
// against all the inputs when the signature operations are out of
|
|
|
|
// bounds.
|
|
|
|
var totalFees int64
|
|
|
|
for _, tx := range transactions {
|
2013-09-30 23:44:01 +02:00
|
|
|
txFee, err := CheckTransactionInputs(tx, node.height, txInputStore)
|
2013-07-18 16:49:28 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Sum the total fees and ensure we don't overflow the
|
|
|
|
// accumulator.
|
|
|
|
lastTotalFees := totalFees
|
|
|
|
totalFees += txFee
|
|
|
|
if totalFees < lastTotalFees {
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrBadFees, "total fees for block "+
|
|
|
|
"overflows accumulator")
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// The total output values of the coinbase transaction must not exceed
|
|
|
|
// the expected subsidy value plus total transaction fees gained from
|
|
|
|
// mining the block. It is safe to ignore overflow and out of range
|
|
|
|
// errors here because those error conditions would have already been
|
|
|
|
// caught by checkTransactionSanity.
|
|
|
|
var totalSatoshiOut int64
|
2013-10-28 21:17:53 +01:00
|
|
|
for _, txOut := range transactions[0].MsgTx().TxOut {
|
2013-07-18 16:49:28 +02:00
|
|
|
totalSatoshiOut += txOut.Value
|
|
|
|
}
|
2015-02-06 06:18:27 +01:00
|
|
|
expectedSatoshiOut := CalcBlockSubsidy(node.height, b.chainParams) +
|
2014-05-26 17:27:50 +02:00
|
|
|
totalFees
|
2013-07-18 16:49:28 +02:00
|
|
|
if totalSatoshiOut > expectedSatoshiOut {
|
|
|
|
str := fmt.Sprintf("coinbase transaction for block pays %v "+
|
|
|
|
"which is more than expected value of %v",
|
|
|
|
totalSatoshiOut, expectedSatoshiOut)
|
2014-06-25 00:10:53 +02:00
|
|
|
return ruleError(ErrBadCoinbaseValue, str)
|
2013-07-18 16:49:28 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Don't run scripts if this node is before the latest known good
|
|
|
|
// checkpoint since the validity is verified via the checkpoints (all
|
|
|
|
// transactions are included in the merkle root hash and any changes
|
|
|
|
// will therefore be detected by the next checkpoint). This is a huge
|
|
|
|
// optimization because running the scripts is the most time consuming
|
|
|
|
// portion of block handling.
|
|
|
|
checkpoint := b.LatestCheckpoint()
|
|
|
|
runScripts := !b.noVerify
|
|
|
|
if checkpoint != nil && node.height <= checkpoint.Height {
|
|
|
|
runScripts = false
|
|
|
|
}
|
|
|
|
|
2015-02-25 21:32:37 +01:00
|
|
|
// Get the previous block node. This function is used over simply
|
|
|
|
// accessing node.parent directly as it will dynamically create previous
|
|
|
|
// block nodes as needed. This helps allow only the pieces of the chain
|
|
|
|
// that are needed to remain in memory.
|
|
|
|
prevNode, err := b.getPrevNodeFromNode(node)
|
|
|
|
if err != nil {
|
|
|
|
log.Errorf("getPrevNodeFromNode: %v", err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2015-02-25 21:31:46 +01:00
|
|
|
// Blocks created after the BIP0016 activation time need to have the
|
|
|
|
// pay-to-script-hash checks enabled.
|
|
|
|
var scriptFlags txscript.ScriptFlags
|
|
|
|
if block.MsgBlock().Header.Timestamp.After(txscript.Bip16Activation) {
|
|
|
|
scriptFlags |= txscript.ScriptBip16
|
|
|
|
}
|
|
|
|
|
2015-02-25 21:32:37 +01:00
|
|
|
// Enforce DER signatures for block versions 3+ once the majority of the
|
|
|
|
// network has upgraded to the enforcement threshold. This is part of
|
|
|
|
// BIP0066.
|
|
|
|
blockHeader := &block.MsgBlock().Header
|
|
|
|
if blockHeader.Version >= 3 && b.isMajorityVersion(3, prevNode,
|
|
|
|
b.chainParams.BlockEnforceNumRequired) {
|
|
|
|
|
|
|
|
scriptFlags |= txscript.ScriptVerifyDERSignatures
|
|
|
|
}
|
|
|
|
|
2013-07-18 16:49:28 +02:00
|
|
|
// Now that the inexpensive checks are done and have passed, verify the
|
|
|
|
// transactions are actually allowed to spend the coins by running the
|
|
|
|
// expensive ECDSA signature check scripts. Doing this last helps
|
|
|
|
// prevent CPU exhaustion attacks.
|
|
|
|
if runScripts {
|
2015-02-25 21:31:46 +01:00
|
|
|
err := checkBlockScripts(block, txInputStore, scriptFlags)
|
2013-07-18 16:49:28 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2014-03-11 19:18:27 +01:00
|
|
|
|
|
|
|
// CheckConnectBlock performs several checks to confirm connecting the passed
|
|
|
|
// block to the main chain does not violate any rules. An example of some of
|
|
|
|
// the checks performed are ensuring connecting the block would not cause any
|
|
|
|
// duplicate transaction hashes for old transactions that aren't already fully
|
|
|
|
// spent, double spends, exceeding the maximum allowed signature operations
|
2015-01-08 12:08:11 +01:00
|
|
|
// per block, invalid values in relation to the expected block subsidy, or fail
|
|
|
|
// transaction script validation.
|
2014-03-11 19:18:27 +01:00
|
|
|
//
|
|
|
|
// This function is NOT safe for concurrent access.
|
|
|
|
func (b *BlockChain) CheckConnectBlock(block *btcutil.Block) error {
|
|
|
|
prevNode := b.bestChain
|
2015-04-17 07:44:15 +02:00
|
|
|
newNode := newBlockNode(&block.MsgBlock().Header, block.Sha(),
|
|
|
|
block.Height())
|
2014-03-11 19:18:27 +01:00
|
|
|
if prevNode != nil {
|
|
|
|
newNode.parent = prevNode
|
|
|
|
newNode.workSum.Add(prevNode.workSum, newNode.workSum)
|
|
|
|
}
|
|
|
|
|
|
|
|
return b.checkConnectBlock(newNode, block)
|
|
|
|
}
|