28a5e6fc65
Co-authored-by: Brannon King <countprimes@gmail.com>
880 lines
24 KiB
Go
880 lines
24 KiB
Go
// Copyright (c) 2013-2017 The btcsuite developers
|
|
// Use of this source code is governed by an ISC
|
|
// license that can be found in the LICENSE file.
|
|
|
|
package txscript
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/hex"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"strconv"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/lbryio/lbcd/chaincfg/chainhash"
|
|
"github.com/lbryio/lbcd/wire"
|
|
btcutil "github.com/lbryio/lbcutil"
|
|
)
|
|
|
|
// scriptTestName returns a descriptive test name for the given reference script
|
|
// test data.
|
|
func scriptTestName(test []interface{}) (string, error) {
|
|
// Account for any optional leading witness data.
|
|
var witnessOffset int
|
|
if _, ok := test[0].([]interface{}); ok {
|
|
witnessOffset++
|
|
}
|
|
|
|
// In addition to the optional leading witness data, the test must
|
|
// consist of at least a signature script, public key script, flags,
|
|
// and expected error. Finally, it may optionally contain a comment.
|
|
if len(test) < witnessOffset+4 || len(test) > witnessOffset+5 {
|
|
return "", fmt.Errorf("invalid test length %d", len(test))
|
|
}
|
|
|
|
// Use the comment for the test name if one is specified, otherwise,
|
|
// construct the name based on the signature script, public key script,
|
|
// and flags.
|
|
var name string
|
|
if len(test) == witnessOffset+5 {
|
|
name = fmt.Sprintf("test (%s)", test[witnessOffset+4])
|
|
} else {
|
|
name = fmt.Sprintf("test ([%s, %s, %s])", test[witnessOffset],
|
|
test[witnessOffset+1], test[witnessOffset+2])
|
|
}
|
|
return name, nil
|
|
}
|
|
|
|
// parse hex string into a []byte.
|
|
func parseHex(tok string) ([]byte, error) {
|
|
if !strings.HasPrefix(tok, "0x") {
|
|
return nil, errors.New("not a hex number")
|
|
}
|
|
return hex.DecodeString(tok[2:])
|
|
}
|
|
|
|
// parseWitnessStack parses a json array of witness items encoded as hex into a
|
|
// slice of witness elements.
|
|
func parseWitnessStack(elements []interface{}) ([][]byte, error) {
|
|
witness := make([][]byte, len(elements))
|
|
for i, e := range elements {
|
|
witElement, err := hex.DecodeString(e.(string))
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
witness[i] = witElement
|
|
}
|
|
|
|
return witness, nil
|
|
}
|
|
|
|
// shortFormOps holds a map of opcode names to values for use in short form
|
|
// parsing. It is declared here so it only needs to be created once.
|
|
var shortFormOps map[string]byte
|
|
|
|
// parseShortForm parses a string as as used in the Bitcoin Core reference tests
|
|
// into the script it came from.
|
|
//
|
|
// The format used for these tests is pretty simple if ad-hoc:
|
|
// - Opcodes other than the push opcodes and unknown are present as
|
|
// either OP_NAME or just NAME
|
|
// - Plain numbers are made into push operations
|
|
// - Numbers beginning with 0x are inserted into the []byte as-is (so
|
|
// 0x14 is OP_DATA_20)
|
|
// - Single quoted strings are pushed as data
|
|
// - Anything else is an error
|
|
func parseShortForm(script string) ([]byte, error) {
|
|
// Only create the short form opcode map once.
|
|
if shortFormOps == nil {
|
|
ops := make(map[string]byte)
|
|
for opcodeName, opcodeValue := range OpcodeByName {
|
|
if strings.Contains(opcodeName, "OP_UNKNOWN") {
|
|
continue
|
|
}
|
|
ops[opcodeName] = opcodeValue
|
|
|
|
// The opcodes named OP_# can't have the OP_ prefix
|
|
// stripped or they would conflict with the plain
|
|
// numbers. Also, since OP_FALSE and OP_TRUE are
|
|
// aliases for the OP_0, and OP_1, respectively, they
|
|
// have the same value, so detect those by name and
|
|
// allow them.
|
|
if (opcodeName == "OP_FALSE" || opcodeName == "OP_TRUE") ||
|
|
(opcodeValue != OP_0 && (opcodeValue < OP_1 ||
|
|
opcodeValue > OP_16)) {
|
|
|
|
ops[strings.TrimPrefix(opcodeName, "OP_")] = opcodeValue
|
|
}
|
|
}
|
|
shortFormOps = ops
|
|
}
|
|
|
|
// Split only does one separator so convert all \n and tab into space.
|
|
script = strings.Replace(script, "\n", " ", -1)
|
|
script = strings.Replace(script, "\t", " ", -1)
|
|
tokens := strings.Split(script, " ")
|
|
builder := NewScriptBuilder()
|
|
|
|
for _, tok := range tokens {
|
|
if len(tok) == 0 {
|
|
continue
|
|
}
|
|
// if parses as a plain number
|
|
if num, err := strconv.ParseInt(tok, 10, 64); err == nil {
|
|
builder.AddInt64(num)
|
|
continue
|
|
} else if bts, err := parseHex(tok); err == nil {
|
|
// Concatenate the bytes manually since the test code
|
|
// intentionally creates scripts that are too large and
|
|
// would cause the builder to error otherwise.
|
|
if builder.err == nil {
|
|
builder.script = append(builder.script, bts...)
|
|
}
|
|
} else if len(tok) >= 2 &&
|
|
tok[0] == '\'' && tok[len(tok)-1] == '\'' {
|
|
builder.AddFullData([]byte(tok[1 : len(tok)-1]))
|
|
} else if opcode, ok := shortFormOps[tok]; ok {
|
|
builder.AddOp(opcode)
|
|
} else {
|
|
return nil, fmt.Errorf("bad token %q", tok)
|
|
}
|
|
|
|
}
|
|
return builder.Script()
|
|
}
|
|
|
|
// parseScriptFlags parses the provided flags string from the format used in the
|
|
// reference tests into ScriptFlags suitable for use in the script engine.
|
|
func parseScriptFlags(flagStr string) (ScriptFlags, error) {
|
|
var flags ScriptFlags
|
|
|
|
sFlags := strings.Split(flagStr, ",")
|
|
for _, flag := range sFlags {
|
|
switch flag {
|
|
case "":
|
|
// Nothing.
|
|
case "CHECKLOCKTIMEVERIFY":
|
|
flags |= ScriptVerifyCheckLockTimeVerify
|
|
case "CHECKSEQUENCEVERIFY":
|
|
flags |= ScriptVerifyCheckSequenceVerify
|
|
case "CLEANSTACK":
|
|
flags |= ScriptVerifyCleanStack
|
|
case "DERSIG":
|
|
flags |= ScriptVerifyDERSignatures
|
|
case "DISCOURAGE_UPGRADABLE_NOPS":
|
|
flags |= ScriptDiscourageUpgradableNops
|
|
case "LOW_S":
|
|
flags |= ScriptVerifyLowS
|
|
case "MINIMALDATA":
|
|
flags |= ScriptVerifyMinimalData
|
|
case "NONE":
|
|
// Nothing.
|
|
case "NULLDUMMY":
|
|
flags |= ScriptStrictMultiSig
|
|
case "NULLFAIL":
|
|
flags |= ScriptVerifyNullFail
|
|
case "P2SH":
|
|
flags |= ScriptBip16
|
|
case "SIGPUSHONLY":
|
|
flags |= ScriptVerifySigPushOnly
|
|
case "STRICTENC":
|
|
flags |= ScriptVerifyStrictEncoding
|
|
case "WITNESS":
|
|
flags |= ScriptVerifyWitness
|
|
case "DISCOURAGE_UPGRADABLE_WITNESS_PROGRAM":
|
|
flags |= ScriptVerifyDiscourageUpgradeableWitnessProgram
|
|
case "MINIMALIF":
|
|
flags |= ScriptVerifyMinimalIf
|
|
case "WITNESS_PUBKEYTYPE":
|
|
flags |= ScriptVerifyWitnessPubKeyType
|
|
default:
|
|
return flags, fmt.Errorf("invalid flag: %s", flag)
|
|
}
|
|
}
|
|
return flags, nil
|
|
}
|
|
|
|
// parseExpectedResult parses the provided expected result string into allowed
|
|
// script error codes. An error is returned if the expected result string is
|
|
// not supported.
|
|
func parseExpectedResult(expected string) ([]ErrorCode, error) {
|
|
switch expected {
|
|
case "OK":
|
|
return nil, nil
|
|
case "UNKNOWN_ERROR":
|
|
return []ErrorCode{ErrNumberTooBig, ErrMinimalData}, nil
|
|
case "PUBKEYTYPE":
|
|
return []ErrorCode{ErrPubKeyType}, nil
|
|
case "SIG_DER":
|
|
return []ErrorCode{ErrSigTooShort, ErrSigTooLong,
|
|
ErrSigInvalidSeqID, ErrSigInvalidDataLen, ErrSigMissingSTypeID,
|
|
ErrSigMissingSLen, ErrSigInvalidSLen,
|
|
ErrSigInvalidRIntID, ErrSigZeroRLen, ErrSigNegativeR,
|
|
ErrSigTooMuchRPadding, ErrSigInvalidSIntID,
|
|
ErrSigZeroSLen, ErrSigNegativeS, ErrSigTooMuchSPadding,
|
|
ErrInvalidSigHashType}, nil
|
|
case "EVAL_FALSE":
|
|
return []ErrorCode{ErrEvalFalse, ErrEmptyStack}, nil
|
|
case "EQUALVERIFY":
|
|
return []ErrorCode{ErrEqualVerify}, nil
|
|
case "NULLFAIL":
|
|
return []ErrorCode{ErrNullFail}, nil
|
|
case "SIG_HIGH_S":
|
|
return []ErrorCode{ErrSigHighS}, nil
|
|
case "SIG_HASHTYPE":
|
|
return []ErrorCode{ErrInvalidSigHashType}, nil
|
|
case "SIG_NULLDUMMY":
|
|
return []ErrorCode{ErrSigNullDummy}, nil
|
|
case "SIG_PUSHONLY":
|
|
return []ErrorCode{ErrNotPushOnly}, nil
|
|
case "CLEANSTACK":
|
|
return []ErrorCode{ErrCleanStack}, nil
|
|
case "BAD_OPCODE":
|
|
return []ErrorCode{ErrReservedOpcode, ErrMalformedPush}, nil
|
|
case "UNBALANCED_CONDITIONAL":
|
|
return []ErrorCode{ErrUnbalancedConditional,
|
|
ErrInvalidStackOperation}, nil
|
|
case "OP_RETURN":
|
|
return []ErrorCode{ErrEarlyReturn}, nil
|
|
case "VERIFY":
|
|
return []ErrorCode{ErrVerify}, nil
|
|
case "INVALID_STACK_OPERATION", "INVALID_ALTSTACK_OPERATION":
|
|
return []ErrorCode{ErrInvalidStackOperation}, nil
|
|
case "DISABLED_OPCODE":
|
|
return []ErrorCode{ErrDisabledOpcode}, nil
|
|
case "DISCOURAGE_UPGRADABLE_NOPS":
|
|
return []ErrorCode{ErrDiscourageUpgradableNOPs}, nil
|
|
case "PUSH_SIZE":
|
|
return []ErrorCode{ErrElementTooBig}, nil
|
|
case "OP_COUNT":
|
|
return []ErrorCode{ErrTooManyOperations}, nil
|
|
case "STACK_SIZE":
|
|
return []ErrorCode{ErrStackOverflow}, nil
|
|
case "SCRIPT_SIZE":
|
|
return []ErrorCode{ErrScriptTooBig}, nil
|
|
case "PUBKEY_COUNT":
|
|
return []ErrorCode{ErrInvalidPubKeyCount}, nil
|
|
case "SIG_COUNT":
|
|
return []ErrorCode{ErrInvalidSignatureCount}, nil
|
|
case "MINIMALDATA":
|
|
return []ErrorCode{ErrMinimalData}, nil
|
|
case "NEGATIVE_LOCKTIME":
|
|
return []ErrorCode{ErrNegativeLockTime}, nil
|
|
case "UNSATISFIED_LOCKTIME":
|
|
return []ErrorCode{ErrUnsatisfiedLockTime}, nil
|
|
case "MINIMALIF":
|
|
return []ErrorCode{ErrMinimalIf}, nil
|
|
case "DISCOURAGE_UPGRADABLE_WITNESS_PROGRAM":
|
|
return []ErrorCode{ErrDiscourageUpgradableWitnessProgram}, nil
|
|
case "WITNESS_PROGRAM_WRONG_LENGTH":
|
|
return []ErrorCode{ErrWitnessProgramWrongLength}, nil
|
|
case "WITNESS_PROGRAM_WITNESS_EMPTY":
|
|
return []ErrorCode{ErrWitnessProgramEmpty}, nil
|
|
case "WITNESS_PROGRAM_MISMATCH":
|
|
return []ErrorCode{ErrWitnessProgramMismatch}, nil
|
|
case "WITNESS_MALLEATED":
|
|
return []ErrorCode{ErrWitnessMalleated}, nil
|
|
case "WITNESS_MALLEATED_P2SH":
|
|
return []ErrorCode{ErrWitnessMalleatedP2SH}, nil
|
|
case "WITNESS_UNEXPECTED":
|
|
return []ErrorCode{ErrWitnessUnexpected}, nil
|
|
case "WITNESS_PUBKEYTYPE":
|
|
return []ErrorCode{ErrWitnessPubKeyType}, nil
|
|
}
|
|
|
|
return nil, fmt.Errorf("unrecognized expected result in test data: %v",
|
|
expected)
|
|
}
|
|
|
|
// createSpendTx generates a basic spending transaction given the passed
|
|
// signature, witness and public key scripts.
|
|
func createSpendingTx(witness [][]byte, sigScript, pkScript []byte,
|
|
outputValue int64) *wire.MsgTx {
|
|
|
|
coinbaseTx := wire.NewMsgTx(wire.TxVersion)
|
|
|
|
outPoint := wire.NewOutPoint(&chainhash.Hash{}, ^uint32(0))
|
|
txIn := wire.NewTxIn(outPoint, []byte{OP_0, OP_0}, nil)
|
|
txOut := wire.NewTxOut(outputValue, pkScript)
|
|
coinbaseTx.AddTxIn(txIn)
|
|
coinbaseTx.AddTxOut(txOut)
|
|
|
|
spendingTx := wire.NewMsgTx(wire.TxVersion)
|
|
coinbaseTxSha := coinbaseTx.TxHash()
|
|
outPoint = wire.NewOutPoint(&coinbaseTxSha, 0)
|
|
txIn = wire.NewTxIn(outPoint, sigScript, witness)
|
|
txOut = wire.NewTxOut(outputValue, nil)
|
|
|
|
spendingTx.AddTxIn(txIn)
|
|
spendingTx.AddTxOut(txOut)
|
|
|
|
return spendingTx
|
|
}
|
|
|
|
// scriptWithInputVal wraps a target pkScript with the value of the output in
|
|
// which it is contained. The inputVal is necessary in order to properly
|
|
// validate inputs which spend nested, or native witness programs.
|
|
type scriptWithInputVal struct {
|
|
inputVal int64
|
|
pkScript []byte
|
|
}
|
|
|
|
// testScripts ensures all of the passed script tests execute with the expected
|
|
// results with or without using a signature cache, as specified by the
|
|
// parameter.
|
|
func testScripts(t *testing.T, tests [][]interface{}, useSigCache bool) {
|
|
// Create a signature cache to use only if requested.
|
|
var sigCache *SigCache
|
|
if useSigCache {
|
|
sigCache = NewSigCache(10)
|
|
}
|
|
|
|
for i, test := range tests {
|
|
// "Format is: [[wit..., amount]?, scriptSig, scriptPubKey,
|
|
// flags, expected_scripterror, ... comments]"
|
|
|
|
// Skip single line comments.
|
|
if len(test) == 1 {
|
|
continue
|
|
}
|
|
|
|
// Construct a name for the test based on the comment and test
|
|
// data.
|
|
name, err := scriptTestName(test)
|
|
if err != nil {
|
|
t.Errorf("TestScripts: invalid test #%d: %v", i, err)
|
|
continue
|
|
}
|
|
|
|
var (
|
|
witness wire.TxWitness
|
|
inputAmt btcutil.Amount
|
|
)
|
|
|
|
// When the first field of the test data is a slice it contains
|
|
// witness data and everything else is offset by 1 as a result.
|
|
witnessOffset := 0
|
|
if witnessData, ok := test[0].([]interface{}); ok {
|
|
witnessOffset++
|
|
|
|
// If this is a witness test, then the final element
|
|
// within the slice is the input amount, so we ignore
|
|
// all but the last element in order to parse the
|
|
// witness stack.
|
|
strWitnesses := witnessData[:len(witnessData)-1]
|
|
witness, err = parseWitnessStack(strWitnesses)
|
|
if err != nil {
|
|
t.Errorf("%s: can't parse witness; %v", name, err)
|
|
continue
|
|
}
|
|
|
|
inputAmt, err = btcutil.NewAmount(witnessData[len(witnessData)-1].(float64))
|
|
if err != nil {
|
|
t.Errorf("%s: can't parse input amt: %v",
|
|
name, err)
|
|
continue
|
|
}
|
|
|
|
}
|
|
|
|
// Extract and parse the signature script from the test fields.
|
|
scriptSigStr, ok := test[witnessOffset].(string)
|
|
if !ok {
|
|
t.Errorf("%s: signature script is not a string", name)
|
|
continue
|
|
}
|
|
scriptSig, err := parseShortForm(scriptSigStr)
|
|
if err != nil {
|
|
t.Errorf("%s: can't parse signature script: %v", name,
|
|
err)
|
|
continue
|
|
}
|
|
|
|
// Extract and parse the public key script from the test fields.
|
|
scriptPubKeyStr, ok := test[witnessOffset+1].(string)
|
|
if !ok {
|
|
t.Errorf("%s: public key script is not a string", name)
|
|
continue
|
|
}
|
|
scriptPubKey, err := parseShortForm(scriptPubKeyStr)
|
|
if err != nil {
|
|
t.Errorf("%s: can't parse public key script: %v", name,
|
|
err)
|
|
continue
|
|
}
|
|
|
|
// Extract and parse the script flags from the test fields.
|
|
flagsStr, ok := test[witnessOffset+2].(string)
|
|
if !ok {
|
|
t.Errorf("%s: flags field is not a string", name)
|
|
continue
|
|
}
|
|
flags, err := parseScriptFlags(flagsStr)
|
|
if err != nil {
|
|
t.Errorf("%s: %v", name, err)
|
|
continue
|
|
}
|
|
|
|
// Extract and parse the expected result from the test fields.
|
|
//
|
|
// Convert the expected result string into the allowed script
|
|
// error codes. This is necessary because txscript is more
|
|
// fine grained with its errors than the reference test data, so
|
|
// some of the reference test data errors map to more than one
|
|
// possibility.
|
|
resultStr, ok := test[witnessOffset+3].(string)
|
|
if !ok {
|
|
t.Errorf("%s: result field is not a string", name)
|
|
continue
|
|
}
|
|
allowedErrorCodes, err := parseExpectedResult(resultStr)
|
|
if err != nil {
|
|
t.Errorf("%s: %v", name, err)
|
|
continue
|
|
}
|
|
|
|
// Generate a transaction pair such that one spends from the
|
|
// other and the provided signature and public key scripts are
|
|
// used, then create a new engine to execute the scripts.
|
|
tx := createSpendingTx(witness, scriptSig, scriptPubKey,
|
|
int64(inputAmt))
|
|
vm, err := NewEngine(scriptPubKey, tx, 0, flags, sigCache, nil,
|
|
int64(inputAmt))
|
|
if err == nil {
|
|
err = vm.Execute()
|
|
}
|
|
|
|
// Ensure there were no errors when the expected result is OK.
|
|
if resultStr == "OK" {
|
|
if err != nil {
|
|
t.Errorf("%s failed to execute: %v", name, err)
|
|
}
|
|
continue
|
|
}
|
|
|
|
// At this point an error was expected so ensure the result of
|
|
// the execution matches it.
|
|
success := false
|
|
for _, code := range allowedErrorCodes {
|
|
if IsErrorCode(err, code) {
|
|
success = true
|
|
break
|
|
}
|
|
}
|
|
if !success {
|
|
if serr, ok := err.(Error); ok {
|
|
t.Errorf("%s: want error codes %v, got %v", name,
|
|
allowedErrorCodes, serr.ErrorCode)
|
|
continue
|
|
}
|
|
t.Errorf("%s: want error codes %v, got err: %v (%T)",
|
|
name, allowedErrorCodes, err, err)
|
|
continue
|
|
}
|
|
}
|
|
}
|
|
|
|
// TestScripts ensures all of the tests in script_tests.json execute with the
|
|
// expected results as defined in the test data.
|
|
func TestScripts(t *testing.T) {
|
|
file, err := ioutil.ReadFile("data/script_tests.json")
|
|
if err != nil {
|
|
t.Fatalf("TestScripts: %v\n", err)
|
|
}
|
|
|
|
var tests [][]interface{}
|
|
err = json.Unmarshal(file, &tests)
|
|
if err != nil {
|
|
t.Fatalf("TestScripts couldn't Unmarshal: %v", err)
|
|
}
|
|
|
|
// Run all script tests with and without the signature cache.
|
|
testScripts(t, tests, true)
|
|
testScripts(t, tests, false)
|
|
}
|
|
|
|
// testVecF64ToUint32 properly handles conversion of float64s read from the JSON
|
|
// test data to unsigned 32-bit integers. This is necessary because some of the
|
|
// test data uses -1 as a shortcut to mean max uint32 and direct conversion of a
|
|
// negative float to an unsigned int is implementation dependent and therefore
|
|
// doesn't result in the expected value on all platforms. This function woks
|
|
// around that limitation by converting to a 32-bit signed integer first and
|
|
// then to a 32-bit unsigned integer which results in the expected behavior on
|
|
// all platforms.
|
|
func testVecF64ToUint32(f float64) uint32 {
|
|
return uint32(int32(f))
|
|
}
|
|
|
|
// TestTxInvalidTests ensures all of the tests in tx_invalid.json fail as
|
|
// expected.
|
|
func TestTxInvalidTests(t *testing.T) {
|
|
file, err := ioutil.ReadFile("data/tx_invalid.json")
|
|
if err != nil {
|
|
t.Fatalf("TestTxInvalidTests: %v\n", err)
|
|
}
|
|
|
|
var tests [][]interface{}
|
|
err = json.Unmarshal(file, &tests)
|
|
if err != nil {
|
|
t.Fatalf("TestTxInvalidTests couldn't Unmarshal: %v\n", err)
|
|
}
|
|
|
|
// form is either:
|
|
// ["this is a comment "]
|
|
// or:
|
|
// [[[previous hash, previous index, previous scriptPubKey]...,]
|
|
// serializedTransaction, verifyFlags]
|
|
testloop:
|
|
for i, test := range tests {
|
|
inputs, ok := test[0].([]interface{})
|
|
if !ok {
|
|
continue
|
|
}
|
|
|
|
if len(test) != 3 {
|
|
t.Errorf("bad test (bad length) %d: %v", i, test)
|
|
continue
|
|
|
|
}
|
|
serializedhex, ok := test[1].(string)
|
|
if !ok {
|
|
t.Errorf("bad test (arg 2 not string) %d: %v", i, test)
|
|
continue
|
|
}
|
|
serializedTx, err := hex.DecodeString(serializedhex)
|
|
if err != nil {
|
|
t.Errorf("bad test (arg 2 not hex %v) %d: %v", err, i,
|
|
test)
|
|
continue
|
|
}
|
|
|
|
tx, err := btcutil.NewTxFromBytes(serializedTx)
|
|
if err != nil {
|
|
t.Errorf("bad test (arg 2 not msgtx %v) %d: %v", err,
|
|
i, test)
|
|
continue
|
|
}
|
|
|
|
verifyFlags, ok := test[2].(string)
|
|
if !ok {
|
|
t.Errorf("bad test (arg 3 not string) %d: %v", i, test)
|
|
continue
|
|
}
|
|
|
|
flags, err := parseScriptFlags(verifyFlags)
|
|
if err != nil {
|
|
t.Errorf("bad test %d: %v", i, err)
|
|
continue
|
|
}
|
|
|
|
prevOuts := make(map[wire.OutPoint]scriptWithInputVal)
|
|
for j, iinput := range inputs {
|
|
input, ok := iinput.([]interface{})
|
|
if !ok {
|
|
t.Errorf("bad test (%dth input not array)"+
|
|
"%d: %v", j, i, test)
|
|
continue testloop
|
|
}
|
|
|
|
if len(input) < 3 || len(input) > 4 {
|
|
t.Errorf("bad test (%dth input wrong length)"+
|
|
"%d: %v", j, i, test)
|
|
continue testloop
|
|
}
|
|
|
|
previoustx, ok := input[0].(string)
|
|
if !ok {
|
|
t.Errorf("bad test (%dth input hash not string)"+
|
|
"%d: %v", j, i, test)
|
|
continue testloop
|
|
}
|
|
|
|
prevhash, err := chainhash.NewHashFromStr(previoustx)
|
|
if err != nil {
|
|
t.Errorf("bad test (%dth input hash not hash %v)"+
|
|
"%d: %v", j, err, i, test)
|
|
continue testloop
|
|
}
|
|
|
|
idxf, ok := input[1].(float64)
|
|
if !ok {
|
|
t.Errorf("bad test (%dth input idx not number)"+
|
|
"%d: %v", j, i, test)
|
|
continue testloop
|
|
}
|
|
idx := testVecF64ToUint32(idxf)
|
|
|
|
oscript, ok := input[2].(string)
|
|
if !ok {
|
|
t.Errorf("bad test (%dth input script not "+
|
|
"string) %d: %v", j, i, test)
|
|
continue testloop
|
|
}
|
|
|
|
script, err := parseShortForm(oscript)
|
|
if err != nil {
|
|
t.Errorf("bad test (%dth input script doesn't "+
|
|
"parse %v) %d: %v", j, err, i, test)
|
|
continue testloop
|
|
}
|
|
|
|
var inputValue float64
|
|
if len(input) == 4 {
|
|
inputValue, ok = input[3].(float64)
|
|
if !ok {
|
|
t.Errorf("bad test (%dth input value not int) "+
|
|
"%d: %v", j, i, test)
|
|
continue
|
|
}
|
|
}
|
|
|
|
v := scriptWithInputVal{
|
|
inputVal: int64(inputValue),
|
|
pkScript: script,
|
|
}
|
|
prevOuts[*wire.NewOutPoint(prevhash, idx)] = v
|
|
}
|
|
|
|
for k, txin := range tx.MsgTx().TxIn {
|
|
prevOut, ok := prevOuts[txin.PreviousOutPoint]
|
|
if !ok {
|
|
t.Errorf("bad test (missing %dth input) %d:%v",
|
|
k, i, test)
|
|
continue testloop
|
|
}
|
|
// These are meant to fail, so as soon as the first
|
|
// input fails the transaction has failed. (some of the
|
|
// test txns have good inputs, too..
|
|
vm, err := NewEngine(prevOut.pkScript, tx.MsgTx(), k,
|
|
flags, nil, nil, prevOut.inputVal)
|
|
if err != nil {
|
|
continue testloop
|
|
}
|
|
|
|
err = vm.Execute()
|
|
if err != nil {
|
|
continue testloop
|
|
}
|
|
|
|
}
|
|
t.Errorf("test (%d:%v) succeeded when should fail",
|
|
i, test)
|
|
}
|
|
}
|
|
|
|
// TestTxValidTests ensures all of the tests in tx_valid.json pass as expected.
|
|
func TestTxValidTests(t *testing.T) {
|
|
file, err := ioutil.ReadFile("data/tx_valid.json")
|
|
if err != nil {
|
|
t.Fatalf("TestTxValidTests: %v\n", err)
|
|
}
|
|
|
|
var tests [][]interface{}
|
|
err = json.Unmarshal(file, &tests)
|
|
if err != nil {
|
|
t.Fatalf("TestTxValidTests couldn't Unmarshal: %v\n", err)
|
|
}
|
|
|
|
// form is either:
|
|
// ["this is a comment "]
|
|
// or:
|
|
// [[[previous hash, previous index, previous scriptPubKey, input value]...,]
|
|
// serializedTransaction, verifyFlags]
|
|
testloop:
|
|
for i, test := range tests {
|
|
inputs, ok := test[0].([]interface{})
|
|
if !ok {
|
|
continue
|
|
}
|
|
|
|
if len(test) != 3 {
|
|
t.Errorf("bad test (bad length) %d: %v", i, test)
|
|
continue
|
|
}
|
|
serializedhex, ok := test[1].(string)
|
|
if !ok {
|
|
t.Errorf("bad test (arg 2 not string) %d: %v", i, test)
|
|
continue
|
|
}
|
|
serializedTx, err := hex.DecodeString(serializedhex)
|
|
if err != nil {
|
|
t.Errorf("bad test (arg 2 not hex %v) %d: %v", err, i,
|
|
test)
|
|
continue
|
|
}
|
|
|
|
tx, err := btcutil.NewTxFromBytes(serializedTx)
|
|
if err != nil {
|
|
t.Errorf("bad test (arg 2 not msgtx %v) %d: %v", err,
|
|
i, test)
|
|
continue
|
|
}
|
|
|
|
verifyFlags, ok := test[2].(string)
|
|
if !ok {
|
|
t.Errorf("bad test (arg 3 not string) %d: %v", i, test)
|
|
continue
|
|
}
|
|
|
|
flags, err := parseScriptFlags(verifyFlags)
|
|
if err != nil {
|
|
t.Errorf("bad test %d: %v", i, err)
|
|
continue
|
|
}
|
|
|
|
prevOuts := make(map[wire.OutPoint]scriptWithInputVal)
|
|
for j, iinput := range inputs {
|
|
input, ok := iinput.([]interface{})
|
|
if !ok {
|
|
t.Errorf("bad test (%dth input not array)"+
|
|
"%d: %v", j, i, test)
|
|
continue
|
|
}
|
|
|
|
if len(input) < 3 || len(input) > 4 {
|
|
t.Errorf("bad test (%dth input wrong length)"+
|
|
"%d: %v", j, i, test)
|
|
continue
|
|
}
|
|
|
|
previoustx, ok := input[0].(string)
|
|
if !ok {
|
|
t.Errorf("bad test (%dth input hash not string)"+
|
|
"%d: %v", j, i, test)
|
|
continue
|
|
}
|
|
|
|
prevhash, err := chainhash.NewHashFromStr(previoustx)
|
|
if err != nil {
|
|
t.Errorf("bad test (%dth input hash not hash %v)"+
|
|
"%d: %v", j, err, i, test)
|
|
continue
|
|
}
|
|
|
|
idxf, ok := input[1].(float64)
|
|
if !ok {
|
|
t.Errorf("bad test (%dth input idx not number)"+
|
|
"%d: %v", j, i, test)
|
|
continue
|
|
}
|
|
idx := testVecF64ToUint32(idxf)
|
|
|
|
oscript, ok := input[2].(string)
|
|
if !ok {
|
|
t.Errorf("bad test (%dth input script not "+
|
|
"string) %d: %v", j, i, test)
|
|
continue
|
|
}
|
|
|
|
script, err := parseShortForm(oscript)
|
|
if err != nil {
|
|
t.Errorf("bad test (%dth input script doesn't "+
|
|
"parse %v) %d: %v", j, err, i, test)
|
|
continue
|
|
}
|
|
|
|
var inputValue float64
|
|
if len(input) == 4 {
|
|
inputValue, ok = input[3].(float64)
|
|
if !ok {
|
|
t.Errorf("bad test (%dth input value not int) "+
|
|
"%d: %v", j, i, test)
|
|
continue
|
|
}
|
|
}
|
|
|
|
v := scriptWithInputVal{
|
|
inputVal: int64(inputValue),
|
|
pkScript: script,
|
|
}
|
|
prevOuts[*wire.NewOutPoint(prevhash, idx)] = v
|
|
}
|
|
|
|
for k, txin := range tx.MsgTx().TxIn {
|
|
prevOut, ok := prevOuts[txin.PreviousOutPoint]
|
|
if !ok {
|
|
t.Errorf("bad test (missing %dth input) %d:%v",
|
|
k, i, test)
|
|
continue testloop
|
|
}
|
|
vm, err := NewEngine(prevOut.pkScript, tx.MsgTx(), k,
|
|
flags, nil, nil, prevOut.inputVal)
|
|
if err != nil {
|
|
t.Errorf("test (%d:%v:%d) failed to create "+
|
|
"script: %v", i, test, k, err)
|
|
continue
|
|
}
|
|
|
|
err = vm.Execute()
|
|
if err != nil {
|
|
t.Errorf("test (%d:%v:%d) failed to execute: "+
|
|
"%v", i, test, k, err)
|
|
continue
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// TestCalcSignatureHash runs the Bitcoin Core signature hash calculation tests
|
|
// in sighash.json.
|
|
// https://github.com/bitcoin/bitcoin/blob/master/src/test/data/sighash.json
|
|
func TestCalcSignatureHash(t *testing.T) {
|
|
file, err := ioutil.ReadFile("data/sighash.json")
|
|
if err != nil {
|
|
t.Fatalf("TestCalcSignatureHash: %v\n", err)
|
|
}
|
|
|
|
var tests [][]interface{}
|
|
err = json.Unmarshal(file, &tests)
|
|
if err != nil {
|
|
t.Fatalf("TestCalcSignatureHash couldn't Unmarshal: %v\n",
|
|
err)
|
|
}
|
|
|
|
const scriptVersion = 0
|
|
for i, test := range tests {
|
|
if i == 0 {
|
|
// Skip first line -- contains comments only.
|
|
continue
|
|
}
|
|
if len(test) != 5 {
|
|
t.Fatalf("TestCalcSignatureHash: Test #%d has "+
|
|
"wrong length.", i)
|
|
}
|
|
var tx wire.MsgTx
|
|
rawTx, _ := hex.DecodeString(test[0].(string))
|
|
err := tx.Deserialize(bytes.NewReader(rawTx))
|
|
if err != nil {
|
|
t.Errorf("TestCalcSignatureHash failed test #%d: "+
|
|
"Failed to parse transaction: %v", i, err)
|
|
continue
|
|
}
|
|
|
|
subScript, _ := hex.DecodeString(test[1].(string))
|
|
if err := checkScriptParses(scriptVersion, subScript); err != nil {
|
|
t.Errorf("TestCalcSignatureHash failed test #%d: "+
|
|
"Failed to parse sub-script: %v", i, err)
|
|
continue
|
|
}
|
|
|
|
hashType := SigHashType(testVecF64ToUint32(test[3].(float64)))
|
|
hash, err := CalcSignatureHash(subScript, hashType, &tx,
|
|
int(test[2].(float64)))
|
|
if err != nil {
|
|
t.Errorf("TestCalcSignatureHash failed test #%d: "+
|
|
"Failed to compute sighash: %v", i, err)
|
|
continue
|
|
}
|
|
|
|
expectedHash, _ := chainhash.NewHashFromStr(test[4].(string))
|
|
if !bytes.Equal(hash, expectedHash[:]) {
|
|
t.Errorf("TestCalcSignatureHash failed test #%d: "+
|
|
"Signature hash mismatch.", i)
|
|
}
|
|
}
|
|
}
|