2016-12-31 19:01:21 +01:00
|
|
|
// Copyright (c) 2011-2016 The Bitcoin Core developers
|
2014-12-13 05:09:33 +01:00
|
|
|
// Distributed under the MIT software license, see the accompanying
|
2014-03-18 10:11:00 +01:00
|
|
|
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
|
|
|
|
|
2011-09-06 22:09:04 +02:00
|
|
|
// Unit tests for denial-of-service detection/prevention code
|
2013-04-13 07:13:08 +02:00
|
|
|
|
2015-07-05 14:17:46 +02:00
|
|
|
#include "chainparams.h"
|
2013-04-13 07:13:08 +02:00
|
|
|
#include "keystore.h"
|
2011-10-12 01:50:06 +02:00
|
|
|
#include "net.h"
|
2016-12-02 00:45:50 +01:00
|
|
|
#include "net_processing.h"
|
2014-03-10 16:46:53 +01:00
|
|
|
#include "pow.h"
|
2014-08-27 17:22:33 +02:00
|
|
|
#include "script/sign.h"
|
2013-04-13 07:13:08 +02:00
|
|
|
#include "serialize.h"
|
Split up util.cpp/h
Split up util.cpp/h into:
- string utilities (hex, base32, base64): no internal dependencies, no dependency on boost (apart from foreach)
- money utilities (parsesmoney, formatmoney)
- time utilities (gettime*, sleep, format date):
- and the rest (logging, argument parsing, config file parsing)
The latter is basically the environment and OS handling,
and is stripped of all utility functions, so we may want to
rename it to something else than util.cpp/h for clarity (Matt suggested
osinterface).
Breaks dependency of sha256.cpp on all the things pulled in by util.
2014-08-21 16:11:09 +02:00
|
|
|
#include "util.h"
|
2016-12-24 17:28:44 +01:00
|
|
|
#include "validation.h"
|
2011-09-06 22:09:04 +02:00
|
|
|
|
2015-03-03 16:49:12 +01:00
|
|
|
#include "test/test_bitcoin.h"
|
|
|
|
|
2012-01-03 23:33:31 +01:00
|
|
|
#include <stdint.h>
|
|
|
|
|
2013-04-13 07:13:08 +02:00
|
|
|
#include <boost/test/unit_test.hpp>
|
|
|
|
|
2017-02-15 08:00:04 +01:00
|
|
|
// Tests these internal-to-net_processing.cpp methods:
|
2016-12-05 09:15:33 +01:00
|
|
|
extern bool AddOrphanTx(const CTransactionRef& tx, NodeId peer);
|
2014-08-28 19:23:24 +02:00
|
|
|
extern void EraseOrphansFor(NodeId peer);
|
2012-04-23 20:14:03 +02:00
|
|
|
extern unsigned int LimitOrphanTxSize(unsigned int nMaxOrphans);
|
2014-09-20 09:53:50 +02:00
|
|
|
struct COrphanTx {
|
2016-12-05 09:15:33 +01:00
|
|
|
CTransactionRef tx;
|
2014-09-20 09:53:50 +02:00
|
|
|
NodeId fromPeer;
|
2016-12-03 04:24:23 +01:00
|
|
|
int64_t nTimeExpire;
|
2014-09-20 09:53:50 +02:00
|
|
|
};
|
|
|
|
extern std::map<uint256, COrphanTx> mapOrphanTransactions;
|
2012-02-29 16:14:18 +01:00
|
|
|
|
2012-01-03 23:33:31 +01:00
|
|
|
CService ip(uint32_t i)
|
|
|
|
{
|
|
|
|
struct in_addr s;
|
|
|
|
s.s_addr = i;
|
2013-05-07 15:16:25 +02:00
|
|
|
return CService(CNetAddr(s), Params().GetDefaultPort());
|
2012-01-03 23:33:31 +01:00
|
|
|
}
|
2011-09-06 22:09:04 +02:00
|
|
|
|
2016-04-18 02:20:34 +02:00
|
|
|
static NodeId id = 0;
|
|
|
|
|
2017-10-26 16:32:46 +02:00
|
|
|
void UpdateLastBlockAnnounceTime(NodeId node, int64_t time_in_seconds);
|
|
|
|
|
2015-03-03 16:49:12 +01:00
|
|
|
BOOST_FIXTURE_TEST_SUITE(DoS_tests, TestingSetup)
|
2011-09-06 22:09:04 +02:00
|
|
|
|
2017-10-19 17:42:47 +02:00
|
|
|
// Test eviction of an outbound peer whose chain never advances
|
|
|
|
// Mock a node connection, and use mocktime to simulate a peer
|
|
|
|
// which never sends any headers messages. PeerLogic should
|
|
|
|
// decide to evict that outbound peer, after the appropriate timeouts.
|
|
|
|
// Note that we protect 4 outbound nodes from being subject to
|
|
|
|
// this logic; this test takes advantage of that protection only
|
|
|
|
// being applied to nodes which send headers with sufficient
|
|
|
|
// work.
|
|
|
|
BOOST_AUTO_TEST_CASE(outbound_slow_chain_eviction)
|
|
|
|
{
|
|
|
|
std::atomic<bool> interruptDummy(false);
|
|
|
|
|
|
|
|
// Mock an outbound peer
|
|
|
|
CAddress addr1(ip(0xa0b0c001), NODE_NONE);
|
|
|
|
CNode dummyNode1(id++, ServiceFlags(NODE_NETWORK|NODE_WITNESS), 0, INVALID_SOCKET, addr1, 0, 0, CAddress(), "", /*fInboundIn=*/ false);
|
|
|
|
dummyNode1.SetSendVersion(PROTOCOL_VERSION);
|
|
|
|
|
|
|
|
peerLogic->InitializeNode(&dummyNode1);
|
|
|
|
dummyNode1.nVersion = 1;
|
|
|
|
dummyNode1.fSuccessfullyConnected = true;
|
|
|
|
|
|
|
|
// This test requires that we have a chain with non-zero work.
|
2017-11-06 23:08:55 +01:00
|
|
|
LOCK(cs_main);
|
2017-10-19 17:42:47 +02:00
|
|
|
BOOST_CHECK(chainActive.Tip() != nullptr);
|
|
|
|
BOOST_CHECK(chainActive.Tip()->nChainWork > 0);
|
|
|
|
|
|
|
|
// Test starts here
|
2017-11-06 23:08:55 +01:00
|
|
|
LOCK(dummyNode1.cs_sendProcessing);
|
2017-10-19 17:42:47 +02:00
|
|
|
peerLogic->SendMessages(&dummyNode1, interruptDummy); // should result in getheaders
|
2017-11-06 23:08:55 +01:00
|
|
|
LOCK(dummyNode1.cs_vSend);
|
2017-10-19 17:42:47 +02:00
|
|
|
BOOST_CHECK(dummyNode1.vSendMsg.size() > 0);
|
|
|
|
dummyNode1.vSendMsg.clear();
|
|
|
|
|
|
|
|
int64_t nStartTime = GetTime();
|
|
|
|
// Wait 21 minutes
|
|
|
|
SetMockTime(nStartTime+21*60);
|
|
|
|
peerLogic->SendMessages(&dummyNode1, interruptDummy); // should result in getheaders
|
|
|
|
BOOST_CHECK(dummyNode1.vSendMsg.size() > 0);
|
|
|
|
// Wait 3 more minutes
|
|
|
|
SetMockTime(nStartTime+24*60);
|
|
|
|
peerLogic->SendMessages(&dummyNode1, interruptDummy); // should result in disconnect
|
|
|
|
BOOST_CHECK(dummyNode1.fDisconnect == true);
|
|
|
|
SetMockTime(0);
|
|
|
|
|
|
|
|
bool dummy;
|
|
|
|
peerLogic->FinalizeNode(dummyNode1.GetId(), dummy);
|
|
|
|
}
|
|
|
|
|
2017-10-26 16:32:46 +02:00
|
|
|
void AddRandomOutboundPeer(std::vector<CNode *> &vNodes, PeerLogicValidation &peerLogic)
|
|
|
|
{
|
|
|
|
CAddress addr(ip(GetRandInt(0xffffffff)), NODE_NONE);
|
|
|
|
vNodes.emplace_back(new CNode(id++, ServiceFlags(NODE_NETWORK|NODE_WITNESS), 0, INVALID_SOCKET, addr, 0, 0, CAddress(), "", /*fInboundIn=*/ false));
|
|
|
|
CNode &node = *vNodes.back();
|
|
|
|
node.SetSendVersion(PROTOCOL_VERSION);
|
|
|
|
|
|
|
|
peerLogic.InitializeNode(&node);
|
|
|
|
node.nVersion = 1;
|
|
|
|
node.fSuccessfullyConnected = true;
|
|
|
|
|
|
|
|
CConnmanTest::AddNode(node);
|
|
|
|
}
|
|
|
|
|
|
|
|
BOOST_AUTO_TEST_CASE(stale_tip_peer_management)
|
|
|
|
{
|
|
|
|
const Consensus::Params& consensusParams = Params().GetConsensus();
|
|
|
|
constexpr int nMaxOutbound = 8;
|
|
|
|
CConnman::Options options;
|
|
|
|
options.nMaxConnections = 125;
|
|
|
|
options.nMaxOutbound = nMaxOutbound;
|
|
|
|
options.nMaxFeeler = 1;
|
|
|
|
|
|
|
|
connman->Init(options);
|
|
|
|
std::vector<CNode *> vNodes;
|
|
|
|
|
|
|
|
// Mock some outbound peers
|
|
|
|
for (int i=0; i<nMaxOutbound; ++i) {
|
|
|
|
AddRandomOutboundPeer(vNodes, *peerLogic);
|
|
|
|
}
|
|
|
|
|
|
|
|
peerLogic->CheckForStaleTipAndEvictPeers(consensusParams);
|
|
|
|
|
|
|
|
// No nodes should be marked for disconnection while we have no extra peers
|
|
|
|
for (const CNode *node : vNodes) {
|
|
|
|
BOOST_CHECK(node->fDisconnect == false);
|
|
|
|
}
|
|
|
|
|
|
|
|
SetMockTime(GetTime() + 3*consensusParams.nPowTargetSpacing + 1);
|
|
|
|
|
|
|
|
// Now tip should definitely be stale, and we should look for an extra
|
|
|
|
// outbound peer
|
|
|
|
peerLogic->CheckForStaleTipAndEvictPeers(consensusParams);
|
|
|
|
BOOST_CHECK(connman->GetTryNewOutboundPeer());
|
|
|
|
|
|
|
|
// Still no peers should be marked for disconnection
|
|
|
|
for (const CNode *node : vNodes) {
|
|
|
|
BOOST_CHECK(node->fDisconnect == false);
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we add one more peer, something should get marked for eviction
|
|
|
|
// on the next check (since we're mocking the time to be in the future, the
|
|
|
|
// required time connected check should be satisfied).
|
|
|
|
AddRandomOutboundPeer(vNodes, *peerLogic);
|
|
|
|
|
|
|
|
peerLogic->CheckForStaleTipAndEvictPeers(consensusParams);
|
|
|
|
for (int i=0; i<nMaxOutbound; ++i) {
|
|
|
|
BOOST_CHECK(vNodes[i]->fDisconnect == false);
|
|
|
|
}
|
|
|
|
// Last added node should get marked for eviction
|
|
|
|
BOOST_CHECK(vNodes.back()->fDisconnect == true);
|
|
|
|
|
|
|
|
vNodes.back()->fDisconnect = false;
|
|
|
|
|
|
|
|
// Update the last announced block time for the last
|
|
|
|
// peer, and check that the next newest node gets evicted.
|
|
|
|
UpdateLastBlockAnnounceTime(vNodes.back()->GetId(), GetTime());
|
|
|
|
|
|
|
|
peerLogic->CheckForStaleTipAndEvictPeers(consensusParams);
|
|
|
|
for (int i=0; i<nMaxOutbound-1; ++i) {
|
|
|
|
BOOST_CHECK(vNodes[i]->fDisconnect == false);
|
|
|
|
}
|
|
|
|
BOOST_CHECK(vNodes[nMaxOutbound-1]->fDisconnect == true);
|
|
|
|
BOOST_CHECK(vNodes.back()->fDisconnect == false);
|
|
|
|
|
|
|
|
bool dummy;
|
|
|
|
for (const CNode *node : vNodes) {
|
|
|
|
peerLogic->FinalizeNode(node->GetId(), dummy);
|
|
|
|
}
|
|
|
|
|
|
|
|
CConnmanTest::ClearNodes();
|
|
|
|
}
|
|
|
|
|
2011-09-06 22:09:04 +02:00
|
|
|
BOOST_AUTO_TEST_CASE(DoS_banning)
|
|
|
|
{
|
2016-12-27 23:13:04 +01:00
|
|
|
std::atomic<bool> interruptDummy(false);
|
|
|
|
|
2016-04-16 23:43:11 +02:00
|
|
|
connman->ClearBanned();
|
2016-06-08 19:12:22 +02:00
|
|
|
CAddress addr1(ip(0xa0b0c001), NODE_NONE);
|
2017-05-30 11:59:42 +02:00
|
|
|
CNode dummyNode1(id++, NODE_NETWORK, 0, INVALID_SOCKET, addr1, 0, 0, CAddress(), "", true);
|
2016-09-13 02:00:33 +02:00
|
|
|
dummyNode1.SetSendVersion(PROTOCOL_VERSION);
|
2017-07-06 20:08:23 +02:00
|
|
|
peerLogic->InitializeNode(&dummyNode1);
|
2013-11-18 01:25:17 +01:00
|
|
|
dummyNode1.nVersion = 1;
|
2017-01-26 18:35:49 +01:00
|
|
|
dummyNode1.fSuccessfullyConnected = true;
|
2017-11-06 23:08:55 +01:00
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
Misbehaving(dummyNode1.GetId(), 100); // Should get banned
|
|
|
|
}
|
|
|
|
LOCK(dummyNode1.cs_sendProcessing);
|
2017-07-06 20:08:23 +02:00
|
|
|
peerLogic->SendMessages(&dummyNode1, interruptDummy);
|
2016-04-16 23:43:11 +02:00
|
|
|
BOOST_CHECK(connman->IsBanned(addr1));
|
|
|
|
BOOST_CHECK(!connman->IsBanned(ip(0xa0b0c001|0x0000ff00))); // Different IP, not banned
|
2011-09-06 22:09:04 +02:00
|
|
|
|
2016-06-08 19:12:22 +02:00
|
|
|
CAddress addr2(ip(0xa0b0c002), NODE_NONE);
|
2017-05-30 11:59:42 +02:00
|
|
|
CNode dummyNode2(id++, NODE_NETWORK, 0, INVALID_SOCKET, addr2, 1, 1, CAddress(), "", true);
|
2016-09-13 02:00:33 +02:00
|
|
|
dummyNode2.SetSendVersion(PROTOCOL_VERSION);
|
2017-07-06 20:08:23 +02:00
|
|
|
peerLogic->InitializeNode(&dummyNode2);
|
2013-11-18 01:25:17 +01:00
|
|
|
dummyNode2.nVersion = 1;
|
2017-01-26 18:35:49 +01:00
|
|
|
dummyNode2.fSuccessfullyConnected = true;
|
2017-11-06 23:08:55 +01:00
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
Misbehaving(dummyNode2.GetId(), 50);
|
|
|
|
}
|
|
|
|
LOCK(dummyNode2.cs_sendProcessing);
|
2017-07-06 20:08:23 +02:00
|
|
|
peerLogic->SendMessages(&dummyNode2, interruptDummy);
|
2016-04-16 23:43:11 +02:00
|
|
|
BOOST_CHECK(!connman->IsBanned(addr2)); // 2 not banned yet...
|
|
|
|
BOOST_CHECK(connman->IsBanned(addr1)); // ... but 1 still should be
|
2017-11-06 23:08:55 +01:00
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
Misbehaving(dummyNode2.GetId(), 50);
|
|
|
|
}
|
2017-07-06 20:08:23 +02:00
|
|
|
peerLogic->SendMessages(&dummyNode2, interruptDummy);
|
2016-04-16 23:43:11 +02:00
|
|
|
BOOST_CHECK(connman->IsBanned(addr2));
|
2017-10-19 17:42:47 +02:00
|
|
|
|
|
|
|
bool dummy;
|
|
|
|
peerLogic->FinalizeNode(dummyNode1.GetId(), dummy);
|
|
|
|
peerLogic->FinalizeNode(dummyNode2.GetId(), dummy);
|
2012-10-05 19:22:21 +02:00
|
|
|
}
|
2011-09-06 22:09:04 +02:00
|
|
|
|
|
|
|
BOOST_AUTO_TEST_CASE(DoS_banscore)
|
|
|
|
{
|
2016-12-27 23:13:04 +01:00
|
|
|
std::atomic<bool> interruptDummy(false);
|
|
|
|
|
2016-04-16 23:43:11 +02:00
|
|
|
connman->ClearBanned();
|
2017-08-01 21:17:40 +02:00
|
|
|
gArgs.ForceSetArg("-banscore", "111"); // because 11 is my favorite number
|
2016-06-08 19:12:22 +02:00
|
|
|
CAddress addr1(ip(0xa0b0c001), NODE_NONE);
|
2017-05-30 11:59:42 +02:00
|
|
|
CNode dummyNode1(id++, NODE_NETWORK, 0, INVALID_SOCKET, addr1, 3, 1, CAddress(), "", true);
|
2016-09-13 02:00:33 +02:00
|
|
|
dummyNode1.SetSendVersion(PROTOCOL_VERSION);
|
2017-07-06 20:08:23 +02:00
|
|
|
peerLogic->InitializeNode(&dummyNode1);
|
2013-11-18 01:25:17 +01:00
|
|
|
dummyNode1.nVersion = 1;
|
2017-01-26 18:35:49 +01:00
|
|
|
dummyNode1.fSuccessfullyConnected = true;
|
2017-11-06 23:08:55 +01:00
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
Misbehaving(dummyNode1.GetId(), 100);
|
|
|
|
}
|
|
|
|
LOCK(dummyNode1.cs_sendProcessing);
|
2017-07-06 20:08:23 +02:00
|
|
|
peerLogic->SendMessages(&dummyNode1, interruptDummy);
|
2016-04-16 23:43:11 +02:00
|
|
|
BOOST_CHECK(!connman->IsBanned(addr1));
|
2017-11-06 23:08:55 +01:00
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
Misbehaving(dummyNode1.GetId(), 10);
|
|
|
|
}
|
2017-07-06 20:08:23 +02:00
|
|
|
peerLogic->SendMessages(&dummyNode1, interruptDummy);
|
2016-04-16 23:43:11 +02:00
|
|
|
BOOST_CHECK(!connman->IsBanned(addr1));
|
2017-11-06 23:08:55 +01:00
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
Misbehaving(dummyNode1.GetId(), 1);
|
|
|
|
}
|
2017-07-06 20:08:23 +02:00
|
|
|
peerLogic->SendMessages(&dummyNode1, interruptDummy);
|
2016-04-16 23:43:11 +02:00
|
|
|
BOOST_CHECK(connman->IsBanned(addr1));
|
2017-08-01 21:17:40 +02:00
|
|
|
gArgs.ForceSetArg("-banscore", std::to_string(DEFAULT_BANSCORE_THRESHOLD));
|
2017-10-19 17:42:47 +02:00
|
|
|
|
|
|
|
bool dummy;
|
|
|
|
peerLogic->FinalizeNode(dummyNode1.GetId(), dummy);
|
2011-09-06 22:09:04 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
BOOST_AUTO_TEST_CASE(DoS_bantime)
|
|
|
|
{
|
2016-12-27 23:13:04 +01:00
|
|
|
std::atomic<bool> interruptDummy(false);
|
|
|
|
|
2016-04-16 23:43:11 +02:00
|
|
|
connman->ClearBanned();
|
2013-04-13 07:13:08 +02:00
|
|
|
int64_t nStartTime = GetTime();
|
2011-09-06 22:09:04 +02:00
|
|
|
SetMockTime(nStartTime); // Overrides future calls to GetTime()
|
|
|
|
|
2016-06-08 19:12:22 +02:00
|
|
|
CAddress addr(ip(0xa0b0c001), NODE_NONE);
|
2017-05-30 11:59:42 +02:00
|
|
|
CNode dummyNode(id++, NODE_NETWORK, 0, INVALID_SOCKET, addr, 4, 4, CAddress(), "", true);
|
2016-09-13 02:00:33 +02:00
|
|
|
dummyNode.SetSendVersion(PROTOCOL_VERSION);
|
2017-07-06 20:08:23 +02:00
|
|
|
peerLogic->InitializeNode(&dummyNode);
|
2013-11-18 01:25:17 +01:00
|
|
|
dummyNode.nVersion = 1;
|
2017-01-26 18:35:49 +01:00
|
|
|
dummyNode.fSuccessfullyConnected = true;
|
2011-09-06 22:09:04 +02:00
|
|
|
|
2017-11-06 23:08:55 +01:00
|
|
|
{
|
|
|
|
LOCK(cs_main);
|
|
|
|
Misbehaving(dummyNode.GetId(), 100);
|
|
|
|
}
|
|
|
|
LOCK(dummyNode.cs_sendProcessing);
|
2017-07-06 20:08:23 +02:00
|
|
|
peerLogic->SendMessages(&dummyNode, interruptDummy);
|
2016-04-16 23:43:11 +02:00
|
|
|
BOOST_CHECK(connman->IsBanned(addr));
|
2011-09-06 22:09:04 +02:00
|
|
|
|
|
|
|
SetMockTime(nStartTime+60*60);
|
2016-04-16 23:43:11 +02:00
|
|
|
BOOST_CHECK(connman->IsBanned(addr));
|
2011-09-06 22:09:04 +02:00
|
|
|
|
|
|
|
SetMockTime(nStartTime+60*60*24+1);
|
2016-04-16 23:43:11 +02:00
|
|
|
BOOST_CHECK(!connman->IsBanned(addr));
|
2017-10-19 17:42:47 +02:00
|
|
|
|
|
|
|
bool dummy;
|
|
|
|
peerLogic->FinalizeNode(dummyNode.GetId(), dummy);
|
2012-01-03 23:33:31 +01:00
|
|
|
}
|
2011-09-06 22:09:04 +02:00
|
|
|
|
2016-12-05 09:15:33 +01:00
|
|
|
CTransactionRef RandomOrphan()
|
2012-02-29 16:14:18 +01:00
|
|
|
{
|
2014-09-20 09:53:50 +02:00
|
|
|
std::map<uint256, COrphanTx>::iterator it;
|
2017-11-06 23:08:55 +01:00
|
|
|
LOCK(cs_main);
|
2017-06-07 21:03:17 +02:00
|
|
|
it = mapOrphanTransactions.lower_bound(InsecureRand256());
|
2012-02-29 16:14:18 +01:00
|
|
|
if (it == mapOrphanTransactions.end())
|
|
|
|
it = mapOrphanTransactions.begin();
|
2014-09-20 09:53:50 +02:00
|
|
|
return it->second.tx;
|
2012-02-29 16:14:18 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
BOOST_AUTO_TEST_CASE(DoS_mapOrphans)
|
|
|
|
{
|
|
|
|
CKey key;
|
|
|
|
key.MakeNewKey(true);
|
|
|
|
CBasicKeyStore keystore;
|
|
|
|
keystore.AddKey(key);
|
|
|
|
|
|
|
|
// 50 orphan transactions:
|
|
|
|
for (int i = 0; i < 50; i++)
|
|
|
|
{
|
2014-06-07 13:53:27 +02:00
|
|
|
CMutableTransaction tx;
|
2012-02-29 16:14:18 +01:00
|
|
|
tx.vin.resize(1);
|
|
|
|
tx.vin[0].prevout.n = 0;
|
2017-06-07 21:03:17 +02:00
|
|
|
tx.vin[0].prevout.hash = InsecureRand256();
|
2012-02-29 16:14:18 +01:00
|
|
|
tx.vin[0].scriptSig << OP_1;
|
|
|
|
tx.vout.resize(1);
|
|
|
|
tx.vout[0].nValue = 1*CENT;
|
2014-09-11 19:15:29 +02:00
|
|
|
tx.vout[0].scriptPubKey = GetScriptForDestination(key.GetPubKey().GetID());
|
2012-02-29 16:14:18 +01:00
|
|
|
|
2016-12-05 09:15:33 +01:00
|
|
|
AddOrphanTx(MakeTransactionRef(tx), i);
|
2012-02-29 16:14:18 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// ... and 50 that depend on other orphans:
|
|
|
|
for (int i = 0; i < 50; i++)
|
|
|
|
{
|
2016-12-05 09:15:33 +01:00
|
|
|
CTransactionRef txPrev = RandomOrphan();
|
2012-02-29 16:14:18 +01:00
|
|
|
|
2014-06-07 13:53:27 +02:00
|
|
|
CMutableTransaction tx;
|
2012-02-29 16:14:18 +01:00
|
|
|
tx.vin.resize(1);
|
|
|
|
tx.vin[0].prevout.n = 0;
|
2016-12-05 09:15:33 +01:00
|
|
|
tx.vin[0].prevout.hash = txPrev->GetHash();
|
2012-02-29 16:14:18 +01:00
|
|
|
tx.vout.resize(1);
|
|
|
|
tx.vout[0].nValue = 1*CENT;
|
2014-09-11 19:15:29 +02:00
|
|
|
tx.vout[0].scriptPubKey = GetScriptForDestination(key.GetPubKey().GetID());
|
2016-12-05 09:15:33 +01:00
|
|
|
SignSignature(keystore, *txPrev, tx, 0, SIGHASH_ALL);
|
2012-02-29 16:14:18 +01:00
|
|
|
|
2016-12-05 09:15:33 +01:00
|
|
|
AddOrphanTx(MakeTransactionRef(tx), i);
|
2012-02-29 16:14:18 +01:00
|
|
|
}
|
|
|
|
|
2012-05-15 21:53:30 +02:00
|
|
|
// This really-big orphan should be ignored:
|
|
|
|
for (int i = 0; i < 10; i++)
|
|
|
|
{
|
2016-12-05 09:15:33 +01:00
|
|
|
CTransactionRef txPrev = RandomOrphan();
|
2012-05-15 21:53:30 +02:00
|
|
|
|
2014-06-07 13:53:27 +02:00
|
|
|
CMutableTransaction tx;
|
2012-05-15 21:53:30 +02:00
|
|
|
tx.vout.resize(1);
|
|
|
|
tx.vout[0].nValue = 1*CENT;
|
2014-09-11 19:15:29 +02:00
|
|
|
tx.vout[0].scriptPubKey = GetScriptForDestination(key.GetPubKey().GetID());
|
2016-06-11 02:28:48 +02:00
|
|
|
tx.vin.resize(2777);
|
2012-05-24 18:18:50 +02:00
|
|
|
for (unsigned int j = 0; j < tx.vin.size(); j++)
|
2012-05-15 21:53:30 +02:00
|
|
|
{
|
|
|
|
tx.vin[j].prevout.n = j;
|
2016-12-05 09:15:33 +01:00
|
|
|
tx.vin[j].prevout.hash = txPrev->GetHash();
|
2012-05-15 21:53:30 +02:00
|
|
|
}
|
2016-12-05 09:15:33 +01:00
|
|
|
SignSignature(keystore, *txPrev, tx, 0, SIGHASH_ALL);
|
2012-05-15 21:53:30 +02:00
|
|
|
// Re-use same signature for other inputs
|
|
|
|
// (they don't have to be valid for this test)
|
2012-05-24 18:18:50 +02:00
|
|
|
for (unsigned int j = 1; j < tx.vin.size(); j++)
|
2012-05-15 21:53:30 +02:00
|
|
|
tx.vin[j].scriptSig = tx.vin[0].scriptSig;
|
|
|
|
|
2016-12-05 09:15:33 +01:00
|
|
|
BOOST_CHECK(!AddOrphanTx(MakeTransactionRef(tx), i));
|
2014-08-28 19:23:24 +02:00
|
|
|
}
|
|
|
|
|
2017-11-06 23:08:55 +01:00
|
|
|
LOCK(cs_main);
|
2014-08-28 19:23:24 +02:00
|
|
|
// Test EraseOrphansFor:
|
|
|
|
for (NodeId i = 0; i < 3; i++)
|
|
|
|
{
|
|
|
|
size_t sizeBefore = mapOrphanTransactions.size();
|
|
|
|
EraseOrphansFor(i);
|
|
|
|
BOOST_CHECK(mapOrphanTransactions.size() < sizeBefore);
|
2012-05-15 21:53:30 +02:00
|
|
|
}
|
|
|
|
|
2012-02-29 16:14:18 +01:00
|
|
|
// Test LimitOrphanTxSize() function:
|
|
|
|
LimitOrphanTxSize(40);
|
|
|
|
BOOST_CHECK(mapOrphanTransactions.size() <= 40);
|
|
|
|
LimitOrphanTxSize(10);
|
|
|
|
BOOST_CHECK(mapOrphanTransactions.size() <= 10);
|
|
|
|
LimitOrphanTxSize(0);
|
|
|
|
BOOST_CHECK(mapOrphanTransactions.empty());
|
|
|
|
}
|
|
|
|
|
2011-09-06 22:09:04 +02:00
|
|
|
BOOST_AUTO_TEST_SUITE_END()
|