def test_p2pkh(): pubkey = "038282263212C609D9EA2A6E3E172DE238D8C39CABD5AC1CA10646E23FD5F51508" signature = "304402206E05A6FE23C59196FFE176C9DDC31E73A9885638F9D1328D47C0C703863B8876022076FEB53811AA5B04E0E79F938EB19906CC5E67548BC555A8E8B8B0FC603D840C01" script_pubkey = script.serialize([ "OP_DUP", "OP_HASH160", "1018853670F9F3B0582C5B9EE8CE93764AC32B93", "OP_EQUALVERIFY", "OP_CHECKSIG", ]) script_sig = script.serialize([signature, pubkey]) founding_tx_script = script.serialize([0, 0]) founding_tx = Tx( 1, 0, vin=[ TxIn(OutPoint(b"\x00" * 32, 0xFFFFFFFF), founding_tx_script, 0xFFFFFFFF, []) ], vout=[TxOut(0, script_pubkey)], ) receiving_tx = Tx( 1, 0, vin=[TxIn(OutPoint(founding_tx.txid, 0), script_sig, 0xFFFFFFFF, [])], vout=[TxOut(0, b"")], ) sighash = get_sighash(receiving_tx, founding_tx.vout[0], 0, 0x01) assert dsa._verify(sighash, bytes.fromhex(pubkey), bytes.fromhex(signature)[:-1])
def test_p2pk_anyonecanpay(): pubkey = "048282263212c609d9ea2a6e3e172de238d8c39cabd5ac1ca10646e23fd5f5150811f8a8098557dfe45e8256e830b60ace62d613ac2f7b17bed31b6eaff6e26caf" signature = "304402204710a85181663b32d25c70ec2bbd14adff5ddfff6cb50d09e155ef5f541fc86c0220056b0cc949be9386ecc5f6c2ac0493269031dbb185781db90171b54ac127790281" script_pubkey = script.serialize([pubkey, "OP_CHECKSIG"]) script_sig = script.serialize([signature]) founding_tx_script = script.serialize([0, 0]) founding_tx = Tx( 1, 0, vin=[ TxIn(OutPoint(b"\x00" * 32, 0xFFFFFFFF), founding_tx_script, 0xFFFFFFFF, []) ], vout=[TxOut(0, script_pubkey)], ) receiving_tx = Tx( 1, 0, vin=[TxIn(OutPoint(founding_tx.txid, 0), script_sig, 0xFFFFFFFF, [])], vout=[TxOut(0, b"")], ) sighash = get_sighash(receiving_tx, founding_tx.vout[0], 0, 0x81) assert dsa._verify(sighash, bytes.fromhex(pubkey), bytes.fromhex(signature)[:-1])
def test_p2pk(): pubkey = "0479BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798483ADA7726A3C4655DA4FBFC0E1108A8FD17B448A68554199C47D08FFB10D4B8" signature = "304402200A5C6163F07B8D3B013C4D1D6DBA25E780B39658D79BA37AF7057A3B7F15FFA102201FD9B4EAA9943F734928B99A83592C2E7BF342EA2680F6A2BB705167966B742001" script_pubkey = script.serialize([pubkey, "OP_CHECKSIG"]) script_sig = script.serialize([signature]) founding_tx_script = script.serialize([0, 0]) founding_tx = Tx( 1, 0, vin=[ TxIn(OutPoint(b"\x00" * 32, 0xFFFFFFFF), founding_tx_script, 0xFFFFFFFF, []) ], vout=[TxOut(0, script_pubkey)], ) receiving_tx = Tx( 1, 0, vin=[TxIn(OutPoint(founding_tx.txid, 0), script_sig, 0xFFFFFFFF, [])], vout=[TxOut(0, b"")], ) sighash = get_sighash(receiving_tx, founding_tx.vout[0], 0, 0x01) assert dsa._verify(sighash, bytes.fromhex(pubkey), bytes.fromhex(signature)[:-1])
def generate_random_chain(length, start): # random.seed(42) chain = [] for x in range(length): previous_block_hash = chain[-1].header.hash if chain else start coinbase_in = TxIn( prevout=OutPoint(), scriptSig=script.serialize( [random.randrange(256**32).to_bytes(32, "big").hex()]), sequence=0xFFFFFFFF, txinwitness=[], ) coinbase_out = TxOut( value=50 * 10**8, scriptPubKey=script.serialize( [random.randrange(256**32).to_bytes(32, "big").hex()]), ) coinbase = Tx( version=1, locktime=0, vin=[coinbase_in], vout=[coinbase_out], ) transactions = [coinbase] if chain: tx_in = TxIn( prevout=OutPoint(chain[x - 1].transactions[0].txid, 0), scriptSig=script.serialize( [random.randrange(256**32).to_bytes(32, "big").hex()]), sequence=0xFFFFFFFF, txinwitness=[], ) tx_out = TxOut( value=50 * 10**8, scriptPubKey=script.serialize( [random.randrange(256**32).to_bytes(32, "big").hex()]), ) tx = Tx( version=1, locktime=0, vin=[tx_in], vout=[tx_out], ) transactions.append(tx) header = BlockHeader( version=70015, previousblockhash=previous_block_hash, merkleroot=_generate_merkle_root(transactions), time=1, bits=b"\x23\x00\x00\x01", nonce=1, ) block = Block(header, transactions) chain.append(block) return chain
def test_creation() -> None: psbt_string = "cHNidP8BAJoCAAAAAljoeiG1ba8MI76OcHBFbDNvfLqlyHV5JPVFiHuyq911AAAAAAD/////g40EJ9DsZQpoqka7CwmK6kQiwHGyyng1Kgd5WdB86h0BAAAAAP////8CcKrwCAAAAAAWABTYXCtx0AYLCcmIauuBXlCZHdoSTQDh9QUAAAAAFgAUAK6pouXw+HaliN9VRuh0LR2HAI8AAAAAAAAAAAA=" assert Psbt.decode(psbt_string).encode() == psbt_string output_1 = TxOut( 149990000, bytes.fromhex("0014d85c2b71d0060b09c9886aeb815e50991dda124d")) output_2 = TxOut( 100000000, bytes.fromhex("001400aea9a2e5f0f876a588df5546e8742d1d87008f")) input_1 = TxIn( OutPoint( bytes.fromhex( "75ddabb27b8845f5247975c8a5ba7c6f336c4570708ebe230caf6db5217ae858" ), 0, ), b"", 0xFFFFFFFF, [], ) input_2 = TxIn( OutPoint( bytes.fromhex( "1dea7cd05979072a3578cab271c02244ea8a090bbb46aa680a65ecd027048d83" ), 1, ), b"", 0xFFFFFFFF, [], ) transaction = Tx(2, 0, [input_1, input_2], [output_1, output_2]) psbt = psbt_from_tx(transaction) assert psbt.encode() == psbt_string
def test_output_scripts_serialization() -> None: input_1 = TxIn( OutPoint( bytes.fromhex( "75ddabb27b8845f5247975c8a5ba7c6f336c4570708ebe230caf6db5217ae858" ), 0, ), b"", 0xFFFFFFFF, [], ) output_1 = TxOut( 149990000, bytes.fromhex("a914256b3a9ae8145e5094329537dd4d7a25dbc9452087")) output_2 = TxOut( 100000000, bytes.fromhex("001400aea9a2e5f0f876a588df5546e8742d1d87008f")) transaction = Tx(2, 0, [input_1], [output_1, output_2]) psbt = psbt_from_tx(transaction) # p2sh-p2wsh psbt.outputs[0].redeem_script = bytes.fromhex( "003BD89EE628E6EB745F99DF1E4AEF64A0DAA814850DAA509F30C0F472E0563C7A") psbt.outputs[0].witness_script = bytes.fromhex( "522103dcea327ff7b2b4449413d9dc24cef0cc9e7864bad9d6291f3f1a04b639422c312103a2c5199b333adfaed4fea7ab65485b9e23a6cb317ddae7e8c1f2bd673414bdd352ae" ) assert Psbt.decode(psbt.encode()) == psbt
def test_native_p2wsh(): transaction = Tx.deserialize( "0100000002fe3dc9208094f3ffd12645477b3dc56f60ec4fa8e6f5d67c565d1c6b9216b36e0000000000ffffffff0815cf020f013ed6cf91d29f4202e8a58726b1ac6c79da47c23d1bee0a6925f80000000000ffffffff0100f2052a010000001976a914a30741f8145e5acadf23f751864167f32e0963f788ac00000000" ) transaction.vin[1].txinwitness = [ bytes.fromhex( "21026dccc749adc2a9d0d89497ac511f760f45c47dc5ed9cf352a58ac706453880aeadab210255a9626aebf5e29c0e6538428ba0d1dcf6ca98ffdf086aa8ced5e0d0215ea465ac" ) ] previous_txout = TxOut( value=4900000000, script_pubkey=bytes.fromhex( "00205d1b56b63d714eebe542309525f484b7e9d6f686b3781b6f61ef925d66d6f6a0" ), ) sighash = get_sighash(transaction, previous_txout, 1, 0x03) assert (sighash.hex() == "82dde6e4f1e94d02c2b7ad03d2115d691f48d064e9d52f58194a6637e4194391") script_code = _get_witness_v0_script_codes( transaction.vin[1].txinwitness[-1])[1] sighash = segwit_v0(script_code, transaction, 1, 0x03, previous_txout.value) assert (sighash.hex() == "fef7bd749cce710c5c052bd796df1af0d935e59cea63736268bcbe2d2134fc47")
def test_wrapped_p2wsh(): transaction = Tx.deserialize( "010000000136641869ca081e70f394c6948e8af409e18b619df2ed74aa106c1ca29787b96e0100000000ffffffff0200e9a435000000001976a914389ffce9cd9ae88dcc0631e88a821ffdbe9bfe2688acc0832f05000000001976a9147480a33f950689af511e6e84c138dbbd3c3ee41588ac00000000" ) transaction.vin[0].txinwitness = [ bytes.fromhex( "56210307b8ae49ac90a048e9b53357a2354b3334e9c8bee813ecb98e99a7e07e8c3ba32103b28f0c28bfab54554ae8c658ac5c3e0ce6e79ad336331f78c428dd43eea8449b21034b8113d703413d57761b8b9781957b8c0ac1dfe69f492580ca4195f50376ba4a21033400f6afecb833092a9a21cfdf1ed1376e58c5d1f47de74683123987e967a8f42103a6d48b1131e94ba04d9737d61acdaa1322008af9602b3b14862c07a1789aac162102d8b661b0b3302ee2f162b09e07a55ad5dfbe673a9f01d9f0c19617681024306b56ae" ) ] previous_txout = TxOut( value=987654321, script_pubkey=bytes.fromhex( "0020a16b5755f7f6f96dbd65f5f0d6ab9418b89af4b1f14a1bb8a09062c35f0dcb54" ), ) assert (get_sighash(transaction, previous_txout, 0, 0x01).hex() == "185c0be5263dce5b4bb50a047973c1b6272bfbd0103a89444597dc40b248ee7c") assert (get_sighash(transaction, previous_txout, 0, 0x02).hex() == "e9733bc60ea13c95c6527066bb975a2ff29a925e80aa14c213f686cbae5d2f36") assert (get_sighash(transaction, previous_txout, 0, 0x03).hex() == "1e1f1c303dc025bd664acb72e583e933fae4cff9148bf78c157d1e8f78530aea") assert (get_sighash(transaction, previous_txout, 0, 0x81).hex() == "2a67f03e63a6a422125878b40b82da593be8d4efaafe88ee528af6e5a9955c6e") assert (get_sighash(transaction, previous_txout, 0, 0x82).hex() == "781ba15f3779d5542ce8ecb5c18716733a5ee42a6f51488ec96154934e2c890a") assert (get_sighash(transaction, previous_txout, 0, 0x83).hex() == "511e8e52ed574121fc1b654970395502128263f62662e076dc6baf05c2e6a99b")
def deserialize(cls, data): stream = bytesio_from_binarydata(data) blockhash = stream.read(32)[::-1].hex() num_transactions = varint.decode(stream) transactions = [] for x in range(num_transactions): transactions.append(TxData.deserialize(stream)) return cls(blockhash=blockhash, transactions=transactions)
def test_sighash_json(): fname = "sighash_legacy.json" filename = path.join(path.dirname(__file__), "test_data", fname) with open(filename, "r") as file_: data = json.load(file_) data = data[1:] # skip column headers for raw_transaction, raw_script, input_index, hashType, sighash in data: script_code = _get_legacy_script_codes(raw_script)[0] tx = Tx.deserialize(raw_transaction) if hashType < 0: hashType = 0xFFFFFFFF + 1 + hashType actual_sighash = legacy(script_code, tx, input_index, hashType) expected_sighash = bytes.fromhex(sighash)[::-1] assert expected_sighash == actual_sighash
def test_native_p2wpkh(): transaction = Tx.deserialize( "0100000002fff7f7881a8099afa6940d42d1e7f6362bec38171ea3edf433541db4e4ad969f0000000000eeffffffef51e1b804cc89d182d279655c3aa89e815b1b309fe287d9b2b55d57b90ec68a0100000000ffffffff02202cb206000000001976a9148280b37df378db99f66f85c95a783a76ac7a6d5988ac9093510d000000001976a9143bde42dbee7e4dbe6a21b2d50ce2f0167faa815988ac11000000" ) previous_txout = TxOut( value=600000000, script_pubkey=bytes.fromhex( "00141d0f172a0ecb48aee1be1f2687d2963ae33f71a1"), ) sighash = get_sighash(transaction, previous_txout, 1, 0x01) assert (sighash.hex() == "c37af31116d1b27caf68aae9e3ac82f1477929014d5b917657d0eb49478cb670")
def test_wrapped_p2wpkh(): transaction = Tx.deserialize( "0100000001db6b1b20aa0fd7b23880be2ecbd4a98130974cf4748fb66092ac4d3ceb1a54770100000000feffffff02b8b4eb0b000000001976a914a457b684d7f0d539a46a45bbc043f35b59d0d96388ac0008af2f000000001976a914fd270b1ee6abcaea97fea7ad0402e8bd8ad6d77c88ac92040000" ) transaction.vin[0].script_sig = bytes.fromhex( "001479091972186c449eb1ded22b78e40d009bdf0089") previous_txout = TxOut( value=1000000000, script_pubkey=bytes.fromhex( "a9144733f37cf4db86fbc2efed2500b4f4e49f31202387"), ) sighash = get_sighash(transaction, previous_txout, 0, 0x01) assert (sighash.hex() == "64f3b0f4dd2bb3aa1ce8566d220cc74dda9df97d8490cc81d89d735c92e59fb6")
def test_legacy_p2pkh(): pubkey = "04280c8f66bf2ccaeb3f60a19ad4a06365f8bd6178aab0e709df2173df8f553366549aec336aae8742a84702b6c7c3052d89f5d76d535ec3716e72187956351613" signature = "3045022100ea43c4800d1a860ec89b5273898a146cfb01d34ff4c364d24a110c480d0e3f7502201c82735577f932f1ca8e1c54bf653e0f8e74e408fe83666bc85cac4472ec950801" script_sig = [signature, pubkey] previous_txout = TxOut( value=1051173696, script_pubkey=script.serialize([ "OP_DUP", "OP_HASH160", "82ac30f58baf99ec9d14e6181eee076f4e27f69c", "OP_EQUALVERIFY", "OP_CHECKSIG", ]), ) tx = Tx( 1, 0, vin=[ TxIn( OutPoint( bytes.fromhex( "d8343a35ba951684f2969eafe833d9e6fe436557b9707ae76802875952e860fc" ), 1, ), script_sig, 0xFFFFFFFF, [], ) ], vout=[ TxOut( 2017682, bytes.fromhex( "76a91413bd20236d0da56492c325dce289b4da35b4b5bd88ac"), ), TxOut( 1049154982, bytes.fromhex( "76a914da169b45781ca210f8c11617ba66bd843da76b1688ac"), ), ], ) sighash = get_sighash(tx, previous_txout, 0, 0x01) assert dsa._verify(sighash, bytes.fromhex(pubkey), bytes.fromhex(signature)[:-1])
def test_first_transaction(): transaction = Tx.deserialize( "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" ) previous_txout = TxOut( value=5000000000, script_pubkey=bytes.fromhex( "410411db93e1dcdb8a016b49840f8c53bc1eb68a382e97b1482ecad7b148a6909a5cb2e0eaddfb84ccf9744464f82e160bfa9b8b64f9d4c03f999b8643f656b412a3ac" ), ) sighash = get_sighash(transaction, previous_txout, 0, 0x01) assert (sighash.hex() == "7a05c6145f10101e9d6325494245adf1297d80f8f38d4d576d57cdba220bcb19") pubkey = "0411db93e1dcdb8a016b49840f8c53bc1eb68a382e97b1482ecad7b148a6909a5cb2e0eaddfb84ccf9744464f82e160bfa9b8b64f9d4c03f999b8643f656b412a3" signature = "304402204E45E16932B8AF514961A1D3A1A25FDF3F4F7732E9D624C6C61548AB5FB8CD410220181522EC8ECA07DE4860A4ACDD12909D831CC56CBBAC4622082221A8768D1D0901" assert dsa._verify(sighash, bytes.fromhex(pubkey), bytes.fromhex(signature)[:-1])
def test_sighashsingle_bug(): pubkey = "02D5C25ADB51B61339D2B05315791E21BBE80EA470A49DB0135720983C905AACE0" signature = "3045022100C9CDD08798A28AF9D1BAF44A6C77BCC7E279F47DC487C8C899911BC48FEAFFCC0220503C5C50AE3998A733263C5C0F7061B483E2B56C4C41B456E7D2F5A78A74C07703" script_pubkey = script.serialize([ "OP_DUP", "OP_HASH160", "5b6462475454710f3c22f5fdf0b40704c92f25c3", "OP_EQUALVERIFY", "OP_CHECKSIGVERIFY", 1, ]) previous_txout = TxOut(0, script_pubkey) tx = Tx.deserialize( "01000000020002000000000000000000000000000000000000000000000000000000000000000000000151ffffffff0001000000000000000000000000000000000000000000000000000000000000000000006b483045022100c9cdd08798a28af9d1baf44a6c77bcc7e279f47dc487c8c899911bc48feaffcc0220503c5c50ae3998a733263c5c0f7061b483e2b56c4c41b456e7d2f5a78a74c077032102d5c25adb51b61339d2b05315791e21bbe80ea470a49db0135720983c905aace0ffffffff010000000000000000015100000000" ) sighash = get_sighash(tx, previous_txout, 1, 0x03) assert dsa._verify(sighash, bytes.fromhex(pubkey), bytes.fromhex(signature)[:-1])
def deserialize(cls, data): stream = bytesio_from_binarydata(data) header = BlockHeader.deserialize(stream) nonce = int.from_bytes(stream.read(8), "little") short_ids = [] short_ids_length = varint.decode(stream) for x in range(short_ids_length): short_ids.append(stream.read(6)[::-1].hex()) prefilled_tx_list = [] prefilled_tx_num = varint.decode(stream) for x in range(prefilled_tx_num): tx_index = varint.decode(stream) tx = Tx.deserialize(stream) prefilled_tx_list.append((tx_index, tx)) return cls( header=header, nonce=nonce, short_ids=short_ids, prefilled_tx_list=prefilled_tx_list, )
def create_genesis(time, nonce, difficulty, version, reward): script_sig = script.serialize( [ "FFFF001D", b"\x04", "The Times 03/Jan/2009 Chancellor on brink of second bailout for banks".encode(), ] ) script_pub_key = script.serialize( [ "04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38c4f35504e51ec112de5c384df7ba0b8d578a4c702b6bf11d5f", "OP_CHECKSIG", ] ) tx_in = TxIn( prevout=OutPoint(), scriptSig=script_sig, sequence=0xFFFFFFFF, txinwitness=[], ) tx_out = TxOut( value=reward, scriptPubKey=script_pub_key, ) tx = Tx( version=1, locktime=0, vin=[tx_in], vout=[tx_out], ) header = BlockHeader( version=version, previousblockhash="00" * 32, merkleroot="00" * 32, time=time, bits=difficulty.to_bytes(4, "big"), nonce=nonce, ) header.merkleroot = _generate_merkle_root([tx]) return header
def test_valid_sign_2() -> None: psbt_string = "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" psbt = Psbt.decode(psbt_string) transaction_input = TxIn( prevout=OutPoint( bytes.fromhex( "75ddabb27b8845f5247975c8a5ba7c6f336c4570708ebe230caf6db5217ae858" ), 0, ), script_sig=b"", sequence=0xFFFFFFFF, txinwitness=[], ) assert psbt.inputs[0].witness_utxo is not None transaction = Tx(0, 2, vin=[transaction_input], vout=[psbt.inputs[0].witness_utxo]) psbt.tx.vin[0].prevout.txid = transaction.txid psbt.inputs[0].non_witness_utxo = transaction psbt.assert_signable()
def test_native_p2wsh_2(): transaction = Tx.deserialize( "0100000002e9b542c5176808107ff1df906f46bb1f2583b16112b95ee5380665ba7fcfc0010000000000ffffffff80e68831516392fcd100d186b3c2c7b95c80b53c77e77c35ba03a66b429a2a1b0000000000ffffffff0280969800000000001976a914de4b231626ef508c9a74a8517e6783c0546d6b2888ac80969800000000001976a9146648a8cd4531e1ec47f35916de8e259237294d1e88ac00000000" ) transaction.vin[0].txinwitness = [ bytes.fromhex( "0063ab68210392972e2eb617b2388771abe27235fd5ac44af8e61693261550447a4c3e39da98ac" ) ] transaction.vin[1].txinwitness = [ bytes.fromhex( "5163ab68210392972e2eb617b2388771abe27235fd5ac44af8e61693261550447a4c3e39da98ac" ) ] previous_txout_1 = TxOut( value=16777215, script_pubkey=bytes.fromhex( "0020ba468eea561b26301e4cf69fa34bde4ad60c81e70f059f045ca9a79931004a4d" ), ) sighash = get_sighash(transaction, previous_txout_1, 0, 0x83) assert (sighash.hex() == "e9071e75e25b8a1e298a72f0d2e9f4f95a0f5cdf86a533cda597eb402ed13b3a") previous_txout_2 = TxOut( value=16777215, script_pubkey=bytes.fromhex( "0020d9bbfbe56af7c4b7f960a70d7ea107156913d9e5a26b0a71429df5e097ca6537" ), ) script_code = _get_witness_v0_script_codes( transaction.vin[1].txinwitness[-1])[1] sighash = segwit_v0(script_code, transaction, 1, 0x83, previous_txout_2.value) assert (sighash.hex() == "cd72f1f1a433ee9df816857fad88d8ebd97e09a75cd481583eb841c330275e54")
def deserialize(cls, data): tx = TxData.deserialize(data) return cls(tx)