def test_empty_stack() -> None: utxo = TxOut( 100000000, serialize([ "OP_1", "cc71eb30d653c0c3163990c47b976f3fb3f37cccdcbedb169a1dfef58bbfbfaf" ]), ) tx_in = TxIn(OutPoint(), "", 1, Witness([])) tx = Tx(vin=[tx_in], vout=[TxOut(100000000, "")]) err_msg = "Empty stack" with pytest.raises(BTClibValueError, match=err_msg): sig_hash.from_tx([utxo], tx, 0, 0)
def test_legacy_p2pkh() -> None: pub_key = "04280c8f66bf2ccaeb3f60a19ad4a06365f8bd6178aab0e709df2173df8f553366549aec336aae8742a84702b6c7c3052d89f5d76d535ec3716e72187956351613" signature = "3045022100ea43c4800d1a860ec89b5273898a146cfb01d34ff4c364d24a110c480d0e3f7502201c82735577f932f1ca8e1c54bf653e0f8e74e408fe83666bc85cac4472ec950801" script_sig = serialize([signature, pub_key]) out_point = OutPoint( "d8343a35ba951684f2969eafe833d9e6fe436557b9707ae76802875952e860fc", 1) tx_in = TxIn(out_point, script_sig, 0xFFFFFFFF) tx_out1 = TxOut( 2017682, bytes.fromhex("76a91413bd20236d0da56492c325dce289b4da35b4b5bd88ac")) tx_out2 = TxOut( 1049154982, bytes.fromhex("76a914da169b45781ca210f8c11617ba66bd843da76b1688ac")) tx = Tx(1, 0, [tx_in], [tx_out1, tx_out2]) script_pub_key = serialize([ "OP_DUP", "OP_HASH160", "82ac30f58baf99ec9d14e6181eee076f4e27f69c", "OP_EQUALVERIFY", "OP_CHECKSIG", ]) utxo = TxOut(1051173696, script_pub_key) hash_ = sig_hash.from_tx([utxo], tx, 0, sig_hash.ALL) assert dsa.verify_(hash_, pub_key, bytes.fromhex(signature)[:-1])
def test_wrapped_p2tr() -> None: script = [ "OP_1", "cc71eb30d653c0c3163990c47b976f3fb3f37cccdcbedb169a1dfef58bbfbfaf", ] utxo = TxOut( 100000000, serialize(["OP_HASH160", hash160(serialize(script)), "OP_EQUAL"])) tx_in = TxIn(OutPoint(), serialize(script), 1, Witness(["0A" * 32])) tx = Tx(vin=[tx_in], vout=[TxOut(100000000, "")]) err_msg = "Taproot scripts cannot be wrapped in p2sh" with pytest.raises(BTClibValueError, match=err_msg): sig_hash.from_tx([utxo], tx, 0, 0)
def test_valid_taproot_script_path() -> None: tx_data = "26dc279d02d8b1a203b653fc4e0f27f408432f3f540136d33f8f930eaeba655910095142980402000000fd697cd4eb5278f1e34545cd57b6670df806fa3a0a064fd8e385a19f1a53d9ce8d8971a30f02000000378d5fb502335dbe02000000001976a9140053a23441c8478caac4c6b769c51f8476cd4b4b88ac58020000000000001976a914f2aae94a43e0d173354201d7832b46c5269c8a2488ac4a08671e" prevouts_data = [ "91ca4c010000000017a9145658b58602cdf7b7e962cfe44e024cb0e366f27087", "cb127401000000002251201ebe8b90363bd097aa9f352c8b21914e1886bc09fe9e70c09f33ef2d2abdf4bc", ] witness_data = [ "9675a9982c6398ea9d441cb7a943bcd6ff033cc3a2e01a0178a7d3be4575be863871c6bf3eef5ecd34721c784259385ca9101c3a313e010ac942c99de05aaaa602", "5799cf4b193b730fb99580b186f7477c2cca4d28957326f6f1a5d14116438530e7ec0ce1cd465ad96968ae8a6a09d4d37a060a115919f56fcfebe7b2277cc2df5cc08fb6cda9105ee2512b2e22635aba", "7520c7b5db9562078049719228db2ac80cb9643ec96c8055aa3b29c2c03d4d99edb0ac", "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", ] tx = Tx.parse(tx_data) prevouts = [TxOut.parse(prevout) for prevout in prevouts_data] index = 1 witness = Witness(witness_data) tx.vin[index].script_witness = witness sighash_type = 0 # all signature = witness.stack[0][:64] if len(witness.stack[0]) == 65: sighash_type = witness.stack[0][-1] assert sighash_type != 0 msg_hash = sig_hash.from_tx(prevouts, tx, index, sighash_type) tapscript = parse(witness.stack[-2]) pub_key = bytes.fromhex(str(tapscript[1])) ssa.assert_as_valid_(msg_hash, pub_key, signature)
def test_native_p2wsh_2() -> None: tx_bytes = "0100000002e9b542c5176808107ff1df906f46bb1f2583b16112b95ee5380665ba7fcfc0010000000000ffffffff80e68831516392fcd100d186b3c2c7b95c80b53c77e77c35ba03a66b429a2a1b0000000000ffffffff0280969800000000001976a914de4b231626ef508c9a74a8517e6783c0546d6b2888ac80969800000000001976a9146648a8cd4531e1ec47f35916de8e259237294d1e88ac00000000" tx = Tx.parse(tx_bytes) tx.vin[0].script_witness = Witness([ "0063ab68210392972e2eb617b2388771abe27235fd5ac44af8e61693261550447a4c3e39da98ac" ]) tx.vin[1].script_witness = Witness([ "5163ab68210392972e2eb617b2388771abe27235fd5ac44af8e61693261550447a4c3e39da98ac" ]) previous_txout_1 = TxOut( 16777215, "0020ba468eea561b26301e4cf69fa34bde4ad60c81e70f059f045ca9a79931004a4d") previous_txout_2 = TxOut( 16777215, "0020d9bbfbe56af7c4b7f960a70d7ea107156913d9e5a26b0a71429df5e097ca6537") hash_ = sig_hash.from_tx( [previous_txout_1, previous_txout_2], tx, 0, sig_hash.ANYONECANPAY | sig_hash.SINGLE, ) assert hash_ == bytes.fromhex( "e9071e75e25b8a1e298a72f0d2e9f4f95a0f5cdf86a533cda597eb402ed13b3a") script_ = sig_hash.witness_v0_script(tx.vin[1].script_witness.stack[-1])[1] hash_ = sig_hash.segwit_v0( script_, tx, 1, sig_hash.ANYONECANPAY | sig_hash.SINGLE, previous_txout_2.value, ) assert hash_ == bytes.fromhex( "cd72f1f1a433ee9df816857fad88d8ebd97e09a75cd481583eb841c330275e54")
def test_wrapped_p2wpkh() -> None: tx_bytes = "0100000001db6b1b20aa0fd7b23880be2ecbd4a98130974cf4748fb66092ac4d3ceb1a54770100000000feffffff02b8b4eb0b000000001976a914a457b684d7f0d539a46a45bbc043f35b59d0d96388ac0008af2f000000001976a914fd270b1ee6abcaea97fea7ad0402e8bd8ad6d77c88ac92040000" tx = Tx.parse(tx_bytes) tx.vin[0].script_sig = bytes.fromhex( "001479091972186c449eb1ded22b78e40d009bdf0089") utxo = TxOut(1000000000, "a9144733f37cf4db86fbc2efed2500b4f4e49f31202387") hash_ = sig_hash.from_tx([utxo], tx, 0, sig_hash.ALL) assert hash_ == bytes.fromhex( "64f3b0f4dd2bb3aa1ce8566d220cc74dda9df97d8490cc81d89d735c92e59fb6")
def test_wrapped_p2wsh() -> None: tx_bytes = "010000000136641869ca081e70f394c6948e8af409e18b619df2ed74aa106c1ca29787b96e0100000000ffffffff0200e9a435000000001976a914389ffce9cd9ae88dcc0631e88a821ffdbe9bfe2688acc0832f05000000001976a9147480a33f950689af511e6e84c138dbbd3c3ee41588ac00000000" tx = Tx.parse(tx_bytes) stack = [ "56210307b8ae49ac90a048e9b53357a2354b3334e9c8bee813ecb98e99a7e07e8c3ba32103b28f0c28bfab54554ae8c658ac5c3e0ce6e79ad336331f78c428dd43eea8449b21034b8113d703413d57761b8b9781957b8c0ac1dfe69f492580ca4195f50376ba4a21033400f6afecb833092a9a21cfdf1ed1376e58c5d1f47de74683123987e967a8f42103a6d48b1131e94ba04d9737d61acdaa1322008af9602b3b14862c07a1789aac162102d8b661b0b3302ee2f162b09e07a55ad5dfbe673a9f01d9f0c19617681024306b56ae" ] tx.vin[0].script_witness = Witness(stack) utxo = TxOut( 987654321, "0020a16b5755f7f6f96dbd65f5f0d6ab9418b89af4b1f14a1bb8a09062c35f0dcb54", ) hash_ = sig_hash.from_tx([utxo], tx, 0, sig_hash.ALL) assert hash_ == bytes.fromhex( "185c0be5263dce5b4bb50a047973c1b6272bfbd0103a89444597dc40b248ee7c") hash_ = sig_hash.from_tx([utxo], tx, 0, sig_hash.NONE) assert hash_ == bytes.fromhex( "e9733bc60ea13c95c6527066bb975a2ff29a925e80aa14c213f686cbae5d2f36") hash_ = sig_hash.from_tx([utxo], tx, 0, sig_hash.SINGLE) assert hash_ == bytes.fromhex( "1e1f1c303dc025bd664acb72e583e933fae4cff9148bf78c157d1e8f78530aea") hash_ = sig_hash.from_tx([utxo], tx, 0, sig_hash.ANYONECANPAY | sig_hash.ALL) assert hash_ == bytes.fromhex( "2a67f03e63a6a422125878b40b82da593be8d4efaafe88ee528af6e5a9955c6e") hash_ = sig_hash.from_tx([utxo], tx, 0, sig_hash.ANYONECANPAY | sig_hash.NONE) assert hash_ == bytes.fromhex( "781ba15f3779d5542ce8ecb5c18716733a5ee42a6f51488ec96154934e2c890a") hash_ = sig_hash.from_tx([utxo], tx, 0, sig_hash.ANYONECANPAY | sig_hash.SINGLE) assert hash_ == bytes.fromhex( "511e8e52ed574121fc1b654970395502128263f62662e076dc6baf05c2e6a99b")
def test_native_p2wpkh() -> None: tx_bytes = "0100000002fff7f7881a8099afa6940d42d1e7f6362bec38171ea3edf433541db4e4ad969f0000000000eeffffffef51e1b804cc89d182d279655c3aa89e815b1b309fe287d9b2b55d57b90ec68a0100000000ffffffff02202cb206000000001976a9148280b37df378db99f66f85c95a783a76ac7a6d5988ac9093510d000000001976a9143bde42dbee7e4dbe6a21b2d50ce2f0167faa815988ac11000000" tx = Tx.parse(tx_bytes) utxo_0 = TxOut( 625000000, "2103c9f4836b9a4f77fc0d81f7bcb01b7f1b35916864b9476c241ce9fc198bd25432ac", ) utxo_1 = TxOut(600000000, "00141d0f172a0ecb48aee1be1f2687d2963ae33f71a1") hash_ = sig_hash.from_tx([utxo_0, utxo_1], tx, 1, sig_hash.ALL) assert hash_ == bytes.fromhex( "c37af31116d1b27caf68aae9e3ac82f1477929014d5b917657d0eb49478cb670")
def test_p2pk() -> None: pub_key = "0479BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798483ADA7726A3C4655DA4FBFC0E1108A8FD17B448A68554199C47D08FFB10D4B8" signature = "304402200A5C6163F07B8D3B013C4D1D6DBA25E780B39658D79BA37AF7057A3B7F15FFA102201FD9B4EAA9943F734928B99A83592C2E7BF342EA2680F6A2BB705167966B742001" script_pub_key = serialize([pub_key, "OP_CHECKSIG"]) script_sig = serialize([signature]) founding_tx_script = serialize(["OP_0", "OP_0"]) tx_in = TxIn(OutPoint(b"\x00" * 32, 0xFFFFFFFF), founding_tx_script, 0xFFFFFFFF) funding_tx = Tx(1, 0, [tx_in], [TxOut(0, script_pub_key)]) tx_in = TxIn(OutPoint(funding_tx.id, 0), script_sig, 0xFFFFFFFF) receiving_tx = Tx(1, 0, [tx_in], [TxOut(0, b"")]) hash_ = sig_hash.from_tx(funding_tx.vout, receiving_tx, 0, sig_hash.ALL) assert dsa.verify_(hash_, pub_key, bytes.fromhex(signature)[:-1])
def test_first_transaction() -> None: tx_bytes = "0100000001c997a5e56e104102fa209c6a852dd90660a20b2d9c352423edce25857fcd3704000000004847304402204e45e16932b8af514961a1d3a1a25fdf3f4f7732e9d624c6c61548ab5fb8cd410220181522ec8eca07de4860a4acdd12909d831cc56cbbac4622082221a8768d1d0901ffffffff0200ca9a3b00000000434104ae1a62fe09c5f51b13905f07f06b99a2f7159b2225f374cd378d71302fa28414e7aab37397f554a7df5f142c21c1b7303b8a0626f1baded5c72a704f7e6cd84cac00286bee0000000043410411db93e1dcdb8a016b49840f8c53bc1eb68a382e97b1482ecad7b148a6909a5cb2e0eaddfb84ccf9744464f82e160bfa9b8b64f9d4c03f999b8643f656b412a3ac00000000" tx = Tx.parse(tx_bytes) utxo = TxOut( value=5000000000, script_pub_key=bytes.fromhex( "410411db93e1dcdb8a016b49840f8c53bc1eb68a382e97b1482ecad7b148a6909a5cb2e0eaddfb84ccf9744464f82e160bfa9b8b64f9d4c03f999b8643f656b412a3ac" ), ) hash_ = sig_hash.from_tx([utxo], tx, 0, sig_hash.ALL) assert hash_ == bytes.fromhex( "7a05c6145f10101e9d6325494245adf1297d80f8f38d4d576d57cdba220bcb19") pub_key = "0411db93e1dcdb8a016b49840f8c53bc1eb68a382e97b1482ecad7b148a6909a5cb2e0eaddfb84ccf9744464f82e160bfa9b8b64f9d4c03f999b8643f656b412a3" signature = "304402204E45E16932B8AF514961A1D3A1A25FDF3F4F7732E9D624C6C61548AB5FB8CD410220181522EC8ECA07DE4860A4ACDD12909D831CC56CBBAC4622082221A8768D1D0901" assert dsa.verify_(hash_, pub_key, bytes.fromhex(signature)[:-1])
def test_p2pk_anyonecanpay() -> None: pub_key = "048282263212c609d9ea2a6e3e172de238d8c39cabd5ac1ca10646e23fd5f5150811f8a8098557dfe45e8256e830b60ace62d613ac2f7b17bed31b6eaff6e26caf" signature = "304402204710a85181663b32d25c70ec2bbd14adff5ddfff6cb50d09e155ef5f541fc86c0220056b0cc949be9386ecc5f6c2ac0493269031dbb185781db90171b54ac127790281" script_pub_key = serialize([pub_key, "OP_CHECKSIG"]) script_sig = serialize([signature]) founding_tx_script = serialize(["OP_0", "OP_0"]) tx_in = TxIn(OutPoint(b"\x00" * 32, 0xFFFFFFFF), founding_tx_script, 0xFFFFFFFF) funding_tx = Tx(1, 0, [tx_in], [TxOut(0, script_pub_key)]) tx_in = TxIn(OutPoint(funding_tx.id, 0), script_sig, 0xFFFFFFFF) receiving_tx = Tx(1, 0, [tx_in], [TxOut(0, b"")]) hash_ = sig_hash.from_tx(funding_tx.vout, receiving_tx, 0, sig_hash.ANYONECANPAY | sig_hash.ALL) assert dsa.verify_(hash_, pub_key, bytes.fromhex(signature)[:-1])
def test_sig_hashsingle_bug() -> None: pub_key = "02D5C25ADB51B61339D2B05315791E21BBE80EA470A49DB0135720983C905AACE0" signature = "3045022100C9CDD08798A28AF9D1BAF44A6C77BCC7E279F47DC487C8C899911BC48FEAFFCC0220503C5C50AE3998A733263C5C0F7061B483E2B56C4C41B456E7D2F5A78A74C07703" script_pub_key = serialize([ "OP_DUP", "OP_HASH160", "5b6462475454710f3c22f5fdf0b40704c92f25c3", "OP_EQUALVERIFY", "OP_CHECKSIGVERIFY", "OP_1", ]) utxo = TxOut(0, script_pub_key) tx_bytes = "01000000020002000000000000000000000000000000000000000000000000000000000000000000000151ffffffff0001000000000000000000000000000000000000000000000000000000000000000000006b483045022100c9cdd08798a28af9d1baf44a6c77bcc7e279f47dc487c8c899911bc48feaffcc0220503c5c50ae3998a733263c5c0f7061b483e2b56c4c41b456e7d2f5a78a74c077032102d5c25adb51b61339d2b05315791e21bbe80ea470a49db0135720983c905aace0ffffffff010000000000000000015100000000" tx = Tx.parse(tx_bytes) hash_ = sig_hash.from_tx([TxOut(0, ""), utxo], tx, 1, sig_hash.SINGLE) assert dsa.verify_(hash_, pub_key, bytes.fromhex(signature)[:-1])
def test_invalid_taproot_key_path() -> None: fname = "tapscript_test_vector.json" filename = path.join(path.dirname(__file__), "_data", fname) with open(filename, "r", encoding="ascii") as file_: data = json.load(file_) for x in filter(lambda x: "failure" in x.keys(), data): tx = Tx.parse(x["tx"]) prevouts = [TxOut.parse(prevout) for prevout in x["prevouts"]] index = x["index"] if not is_p2tr(prevouts[index].script_pub_key.script): continue witness = Witness(x["failure"]["witness"]) tx.vin[index].script_witness = witness # check only key paths if (len(witness.stack) == 1 or len(witness.stack) == 2 and witness.stack[-1][0] == 0x50): with pytest.raises( (BTClibRuntimeError, BTClibValueError, AssertionError)): assert not x["failure"]["scriptSig"] sighash_type = 0 # all signature = witness.stack[0][:64] if len(witness.stack[0]) == 65: sighash_type = witness.stack[0][-1] if sighash_type == 0: raise BTClibValueError( "invalid sighash 0 in 65 bytes signature") msg_hash = sig_hash.from_tx(prevouts, tx, index, sighash_type) pub_key = type_and_payload( prevouts[index].script_pub_key.script)[1] ssa.assert_as_valid_(msg_hash, pub_key, signature)
def test_bip_test_vector(): fname = "taproot_test_vector.json" filename = path.join(path.dirname(__file__), "_data", fname) with open(filename, "r", encoding="ascii") as file_: data = json.load(file_)["keyPathSpending"][0] unsigned_tx = Tx.parse(data["given"]["rawUnsignedTx"]) utxos = [] for utxo in data["given"]["utxosSpent"]: utxos.append(TxOut(utxo["amountSats"], utxo["scriptPubKey"])) for vin in unsigned_tx.vin: vin.script_witness.stack.append(["00"]) for test in data["inputSpending"]: index = test["given"]["txinIndex"] hash_type = test["given"]["hashType"] signature_hash = sig_hash.from_tx(utxos, unsigned_tx, index, hash_type) assert signature_hash.hex() == test["intermediary"]["sigHash"]
def test_p2pkh() -> None: pub_key = "038282263212C609D9EA2A6E3E172DE238D8C39CABD5AC1CA10646E23FD5F51508" signature = "304402206E05A6FE23C59196FFE176C9DDC31E73A9885638F9D1328D47C0C703863B8876022076FEB53811AA5B04E0E79F938EB19906CC5E67548BC555A8E8B8B0FC603D840C01" script_pub_key = serialize([ "OP_DUP", "OP_HASH160", "1018853670F9F3B0582C5B9EE8CE93764AC32B93", "OP_EQUALVERIFY", "OP_CHECKSIG", ]) script_sig = serialize([signature, pub_key]) founding_tx_script = serialize(["OP_0", "OP_0"]) tx_in = TxIn(OutPoint(b"\x00" * 32, 0xFFFFFFFF), founding_tx_script, 0xFFFFFFFF) funding_tx = Tx(1, 0, [tx_in], [TxOut(0, script_pub_key)]) tx_in = TxIn(OutPoint(funding_tx.id, 0), script_sig, 0xFFFFFFFF) receiving_tx = Tx(1, 0, [tx_in], [TxOut(0, b"")]) hash_ = sig_hash.from_tx(funding_tx.vout, receiving_tx, 0, sig_hash.ALL) assert dsa.verify_(hash_, pub_key, bytes.fromhex(signature)[:-1])
def test_native_p2wsh() -> None: tx_bytes = "0100000002fe3dc9208094f3ffd12645477b3dc56f60ec4fa8e6f5d67c565d1c6b9216b36e0000000000ffffffff0815cf020f013ed6cf91d29f4202e8a58726b1ac6c79da47c23d1bee0a6925f80000000000ffffffff0100f2052a010000001976a914a30741f8145e5acadf23f751864167f32e0963f788ac00000000" tx = Tx.parse(tx_bytes) tx.vin[1].script_witness = Witness([ "21026dccc749adc2a9d0d89497ac511f760f45c47dc5ed9cf352a58ac706453880aeadab210255a9626aebf5e29c0e6538428ba0d1dcf6ca98ffdf086aa8ced5e0d0215ea465ac" ]) utxo_0 = TxOut( 156250000, "21036d5c20fa14fb2f635474c1dc4ef5909d4568e5569b79fc94d3448486e14685f8ac", ) utxo_1 = TxOut( 4900000000, "00205d1b56b63d714eebe542309525f484b7e9d6f686b3781b6f61ef925d66d6f6a0", ) hash_ = sig_hash.from_tx([utxo_0, utxo_1], tx, 1, sig_hash.SINGLE) assert hash_ == bytes.fromhex( "82dde6e4f1e94d02c2b7ad03d2115d691f48d064e9d52f58194a6637e4194391") script_ = sig_hash.witness_v0_script(tx.vin[1].script_witness.stack[-1])[1] hash_ = sig_hash.segwit_v0(script_, tx, 1, sig_hash.SINGLE, utxo_1.value) assert hash_ == bytes.fromhex( "fef7bd749cce710c5c052bd796df1af0d935e59cea63736268bcbe2d2134fc47")
def test_valid_taproot_key_path() -> None: fname = "tapscript_test_vector.json" filename = path.join(path.dirname(__file__), "_data", fname) with open(filename, "r", encoding="ascii") as file_: data = json.load(file_) for x in filter(lambda x: "TAPROOT" in x["flags"], data): tx = Tx.parse(x["tx"]) prevouts = [TxOut.parse(prevout) for prevout in x["prevouts"]] index = x["index"] if not is_p2tr(prevouts[index].script_pub_key.script): continue assert not x["success"]["scriptSig"] witness = Witness(x["success"]["witness"]) tx.vin[index].script_witness = witness if (len(witness.stack) == 1 or len(witness.stack) == 2 and witness.stack[-1][0] == 0x50): sighash_type = 0 # all signature = witness.stack[0][:64] if len(witness.stack[0]) == 65: sighash_type = witness.stack[0][-1] assert sighash_type != 0 msg_hash = sig_hash.from_tx(prevouts, tx, index, sighash_type) pub_key = type_and_payload( prevouts[index].script_pub_key.script)[1] ssa.assert_as_valid_(msg_hash, pub_key, signature)