示例#1
0
def test_p2pkh():
    pubkey = "038282263212C609D9EA2A6E3E172DE238D8C39CABD5AC1CA10646E23FD5F51508"
    signature = "304402206E05A6FE23C59196FFE176C9DDC31E73A9885638F9D1328D47C0C703863B8876022076FEB53811AA5B04E0E79F938EB19906CC5E67548BC555A8E8B8B0FC603D840C01"
    script_pubkey = script.serialize([
        "OP_DUP",
        "OP_HASH160",
        "1018853670F9F3B0582C5B9EE8CE93764AC32B93",
        "OP_EQUALVERIFY",
        "OP_CHECKSIG",
    ])
    script_sig = script.serialize([signature, pubkey])

    founding_tx_script = script.serialize([0, 0])
    founding_tx = Tx(
        1,
        0,
        vin=[
            TxIn(OutPoint(b"\x00" * 32, 0xFFFFFFFF), founding_tx_script,
                 0xFFFFFFFF, [])
        ],
        vout=[TxOut(0, script_pubkey)],
    )
    receiving_tx = Tx(
        1,
        0,
        vin=[TxIn(OutPoint(founding_tx.txid, 0), script_sig, 0xFFFFFFFF, [])],
        vout=[TxOut(0, b"")],
    )
    sighash = get_sighash(receiving_tx, founding_tx.vout[0], 0, 0x01)
    assert dsa._verify(sighash, bytes.fromhex(pubkey),
                       bytes.fromhex(signature)[:-1])
示例#2
0
def test_p2pk_anyonecanpay():
    pubkey = "048282263212c609d9ea2a6e3e172de238d8c39cabd5ac1ca10646e23fd5f5150811f8a8098557dfe45e8256e830b60ace62d613ac2f7b17bed31b6eaff6e26caf"
    signature = "304402204710a85181663b32d25c70ec2bbd14adff5ddfff6cb50d09e155ef5f541fc86c0220056b0cc949be9386ecc5f6c2ac0493269031dbb185781db90171b54ac127790281"
    script_pubkey = script.serialize([pubkey, "OP_CHECKSIG"])
    script_sig = script.serialize([signature])

    founding_tx_script = script.serialize([0, 0])
    founding_tx = Tx(
        1,
        0,
        vin=[
            TxIn(OutPoint(b"\x00" * 32, 0xFFFFFFFF), founding_tx_script,
                 0xFFFFFFFF, [])
        ],
        vout=[TxOut(0, script_pubkey)],
    )
    receiving_tx = Tx(
        1,
        0,
        vin=[TxIn(OutPoint(founding_tx.txid, 0), script_sig, 0xFFFFFFFF, [])],
        vout=[TxOut(0, b"")],
    )
    sighash = get_sighash(receiving_tx, founding_tx.vout[0], 0, 0x81)
    assert dsa._verify(sighash, bytes.fromhex(pubkey),
                       bytes.fromhex(signature)[:-1])
示例#3
0
def test_p2pk():
    pubkey = "0479BE667EF9DCBBAC55A06295CE870B07029BFCDB2DCE28D959F2815B16F81798483ADA7726A3C4655DA4FBFC0E1108A8FD17B448A68554199C47D08FFB10D4B8"
    signature = "304402200A5C6163F07B8D3B013C4D1D6DBA25E780B39658D79BA37AF7057A3B7F15FFA102201FD9B4EAA9943F734928B99A83592C2E7BF342EA2680F6A2BB705167966B742001"
    script_pubkey = script.serialize([pubkey, "OP_CHECKSIG"])
    script_sig = script.serialize([signature])

    founding_tx_script = script.serialize([0, 0])
    founding_tx = Tx(
        1,
        0,
        vin=[
            TxIn(OutPoint(b"\x00" * 32, 0xFFFFFFFF), founding_tx_script,
                 0xFFFFFFFF, [])
        ],
        vout=[TxOut(0, script_pubkey)],
    )
    receiving_tx = Tx(
        1,
        0,
        vin=[TxIn(OutPoint(founding_tx.txid, 0), script_sig, 0xFFFFFFFF, [])],
        vout=[TxOut(0, b"")],
    )
    sighash = get_sighash(receiving_tx, founding_tx.vout[0], 0, 0x01)
    assert dsa._verify(sighash, bytes.fromhex(pubkey),
                       bytes.fromhex(signature)[:-1])
示例#4
0
def generate_random_chain(length, start):
    # random.seed(42)
    chain = []
    for x in range(length):
        previous_block_hash = chain[-1].header.hash if chain else start
        coinbase_in = TxIn(
            prevout=OutPoint(),
            scriptSig=script.serialize(
                [random.randrange(256**32).to_bytes(32, "big").hex()]),
            sequence=0xFFFFFFFF,
            txinwitness=[],
        )
        coinbase_out = TxOut(
            value=50 * 10**8,
            scriptPubKey=script.serialize(
                [random.randrange(256**32).to_bytes(32, "big").hex()]),
        )
        coinbase = Tx(
            version=1,
            locktime=0,
            vin=[coinbase_in],
            vout=[coinbase_out],
        )
        transactions = [coinbase]
        if chain:
            tx_in = TxIn(
                prevout=OutPoint(chain[x - 1].transactions[0].txid, 0),
                scriptSig=script.serialize(
                    [random.randrange(256**32).to_bytes(32, "big").hex()]),
                sequence=0xFFFFFFFF,
                txinwitness=[],
            )
            tx_out = TxOut(
                value=50 * 10**8,
                scriptPubKey=script.serialize(
                    [random.randrange(256**32).to_bytes(32, "big").hex()]),
            )
            tx = Tx(
                version=1,
                locktime=0,
                vin=[tx_in],
                vout=[tx_out],
            )
            transactions.append(tx)
        header = BlockHeader(
            version=70015,
            previousblockhash=previous_block_hash,
            merkleroot=_generate_merkle_root(transactions),
            time=1,
            bits=b"\x23\x00\x00\x01",
            nonce=1,
        )
        block = Block(header, transactions)
        chain.append(block)
    return chain
示例#5
0
def test_creation() -> None:
    psbt_string = "cHNidP8BAJoCAAAAAljoeiG1ba8MI76OcHBFbDNvfLqlyHV5JPVFiHuyq911AAAAAAD/////g40EJ9DsZQpoqka7CwmK6kQiwHGyyng1Kgd5WdB86h0BAAAAAP////8CcKrwCAAAAAAWABTYXCtx0AYLCcmIauuBXlCZHdoSTQDh9QUAAAAAFgAUAK6pouXw+HaliN9VRuh0LR2HAI8AAAAAAAAAAAA="
    assert Psbt.decode(psbt_string).encode() == psbt_string

    output_1 = TxOut(
        149990000,
        bytes.fromhex("0014d85c2b71d0060b09c9886aeb815e50991dda124d"))
    output_2 = TxOut(
        100000000,
        bytes.fromhex("001400aea9a2e5f0f876a588df5546e8742d1d87008f"))
    input_1 = TxIn(
        OutPoint(
            bytes.fromhex(
                "75ddabb27b8845f5247975c8a5ba7c6f336c4570708ebe230caf6db5217ae858"
            ),
            0,
        ),
        b"",
        0xFFFFFFFF,
        [],
    )
    input_2 = TxIn(
        OutPoint(
            bytes.fromhex(
                "1dea7cd05979072a3578cab271c02244ea8a090bbb46aa680a65ecd027048d83"
            ),
            1,
        ),
        b"",
        0xFFFFFFFF,
        [],
    )
    transaction = Tx(2, 0, [input_1, input_2], [output_1, output_2])
    psbt = psbt_from_tx(transaction)
    assert psbt.encode() == psbt_string
示例#6
0
def test_output_scripts_serialization() -> None:
    input_1 = TxIn(
        OutPoint(
            bytes.fromhex(
                "75ddabb27b8845f5247975c8a5ba7c6f336c4570708ebe230caf6db5217ae858"
            ),
            0,
        ),
        b"",
        0xFFFFFFFF,
        [],
    )
    output_1 = TxOut(
        149990000,
        bytes.fromhex("a914256b3a9ae8145e5094329537dd4d7a25dbc9452087"))
    output_2 = TxOut(
        100000000,
        bytes.fromhex("001400aea9a2e5f0f876a588df5546e8742d1d87008f"))
    transaction = Tx(2, 0, [input_1], [output_1, output_2])

    psbt = psbt_from_tx(transaction)

    # p2sh-p2wsh
    psbt.outputs[0].redeem_script = bytes.fromhex(
        "003BD89EE628E6EB745F99DF1E4AEF64A0DAA814850DAA509F30C0F472E0563C7A")
    psbt.outputs[0].witness_script = bytes.fromhex(
        "522103dcea327ff7b2b4449413d9dc24cef0cc9e7864bad9d6291f3f1a04b639422c312103a2c5199b333adfaed4fea7ab65485b9e23a6cb317ddae7e8c1f2bd673414bdd352ae"
    )

    assert Psbt.decode(psbt.encode()) == psbt
示例#7
0
def test_native_p2wsh():
    transaction = Tx.deserialize(
        "0100000002fe3dc9208094f3ffd12645477b3dc56f60ec4fa8e6f5d67c565d1c6b9216b36e0000000000ffffffff0815cf020f013ed6cf91d29f4202e8a58726b1ac6c79da47c23d1bee0a6925f80000000000ffffffff0100f2052a010000001976a914a30741f8145e5acadf23f751864167f32e0963f788ac00000000"
    )
    transaction.vin[1].txinwitness = [
        bytes.fromhex(
            "21026dccc749adc2a9d0d89497ac511f760f45c47dc5ed9cf352a58ac706453880aeadab210255a9626aebf5e29c0e6538428ba0d1dcf6ca98ffdf086aa8ced5e0d0215ea465ac"
        )
    ]

    previous_txout = TxOut(
        value=4900000000,
        script_pubkey=bytes.fromhex(
            "00205d1b56b63d714eebe542309525f484b7e9d6f686b3781b6f61ef925d66d6f6a0"
        ),
    )

    sighash = get_sighash(transaction, previous_txout, 1, 0x03)

    assert (sighash.hex() ==
            "82dde6e4f1e94d02c2b7ad03d2115d691f48d064e9d52f58194a6637e4194391")

    script_code = _get_witness_v0_script_codes(
        transaction.vin[1].txinwitness[-1])[1]
    sighash = segwit_v0(script_code, transaction, 1, 0x03,
                        previous_txout.value)
    assert (sighash.hex() ==
            "fef7bd749cce710c5c052bd796df1af0d935e59cea63736268bcbe2d2134fc47")
示例#8
0
def test_wrapped_p2wsh():

    transaction = Tx.deserialize(
        "010000000136641869ca081e70f394c6948e8af409e18b619df2ed74aa106c1ca29787b96e0100000000ffffffff0200e9a435000000001976a914389ffce9cd9ae88dcc0631e88a821ffdbe9bfe2688acc0832f05000000001976a9147480a33f950689af511e6e84c138dbbd3c3ee41588ac00000000"
    )
    transaction.vin[0].txinwitness = [
        bytes.fromhex(
            "56210307b8ae49ac90a048e9b53357a2354b3334e9c8bee813ecb98e99a7e07e8c3ba32103b28f0c28bfab54554ae8c658ac5c3e0ce6e79ad336331f78c428dd43eea8449b21034b8113d703413d57761b8b9781957b8c0ac1dfe69f492580ca4195f50376ba4a21033400f6afecb833092a9a21cfdf1ed1376e58c5d1f47de74683123987e967a8f42103a6d48b1131e94ba04d9737d61acdaa1322008af9602b3b14862c07a1789aac162102d8b661b0b3302ee2f162b09e07a55ad5dfbe673a9f01d9f0c19617681024306b56ae"
        )
    ]

    previous_txout = TxOut(
        value=987654321,
        script_pubkey=bytes.fromhex(
            "0020a16b5755f7f6f96dbd65f5f0d6ab9418b89af4b1f14a1bb8a09062c35f0dcb54"
        ),
    )

    assert (get_sighash(transaction, previous_txout, 0, 0x01).hex() ==
            "185c0be5263dce5b4bb50a047973c1b6272bfbd0103a89444597dc40b248ee7c")

    assert (get_sighash(transaction, previous_txout, 0, 0x02).hex() ==
            "e9733bc60ea13c95c6527066bb975a2ff29a925e80aa14c213f686cbae5d2f36")

    assert (get_sighash(transaction, previous_txout, 0, 0x03).hex() ==
            "1e1f1c303dc025bd664acb72e583e933fae4cff9148bf78c157d1e8f78530aea")

    assert (get_sighash(transaction, previous_txout, 0, 0x81).hex() ==
            "2a67f03e63a6a422125878b40b82da593be8d4efaafe88ee528af6e5a9955c6e")

    assert (get_sighash(transaction, previous_txout, 0, 0x82).hex() ==
            "781ba15f3779d5542ce8ecb5c18716733a5ee42a6f51488ec96154934e2c890a")

    assert (get_sighash(transaction, previous_txout, 0, 0x83).hex() ==
            "511e8e52ed574121fc1b654970395502128263f62662e076dc6baf05c2e6a99b")
示例#9
0
 def deserialize(cls, data):
     stream = bytesio_from_binarydata(data)
     blockhash = stream.read(32)[::-1].hex()
     num_transactions = varint.decode(stream)
     transactions = []
     for x in range(num_transactions):
         transactions.append(TxData.deserialize(stream))
     return cls(blockhash=blockhash, transactions=transactions)
示例#10
0
def test_sighash_json():
    fname = "sighash_legacy.json"
    filename = path.join(path.dirname(__file__), "test_data", fname)
    with open(filename, "r") as file_:
        data = json.load(file_)
    data = data[1:]  # skip column headers
    for raw_transaction, raw_script, input_index, hashType, sighash in data:
        script_code = _get_legacy_script_codes(raw_script)[0]
        tx = Tx.deserialize(raw_transaction)
        if hashType < 0:
            hashType = 0xFFFFFFFF + 1 + hashType
        actual_sighash = legacy(script_code, tx, input_index, hashType)
        expected_sighash = bytes.fromhex(sighash)[::-1]
        assert expected_sighash == actual_sighash
示例#11
0
def test_native_p2wpkh():
    transaction = Tx.deserialize(
        "0100000002fff7f7881a8099afa6940d42d1e7f6362bec38171ea3edf433541db4e4ad969f0000000000eeffffffef51e1b804cc89d182d279655c3aa89e815b1b309fe287d9b2b55d57b90ec68a0100000000ffffffff02202cb206000000001976a9148280b37df378db99f66f85c95a783a76ac7a6d5988ac9093510d000000001976a9143bde42dbee7e4dbe6a21b2d50ce2f0167faa815988ac11000000"
    )

    previous_txout = TxOut(
        value=600000000,
        script_pubkey=bytes.fromhex(
            "00141d0f172a0ecb48aee1be1f2687d2963ae33f71a1"),
    )

    sighash = get_sighash(transaction, previous_txout, 1, 0x01)

    assert (sighash.hex() ==
            "c37af31116d1b27caf68aae9e3ac82f1477929014d5b917657d0eb49478cb670")
示例#12
0
def test_wrapped_p2wpkh():
    transaction = Tx.deserialize(
        "0100000001db6b1b20aa0fd7b23880be2ecbd4a98130974cf4748fb66092ac4d3ceb1a54770100000000feffffff02b8b4eb0b000000001976a914a457b684d7f0d539a46a45bbc043f35b59d0d96388ac0008af2f000000001976a914fd270b1ee6abcaea97fea7ad0402e8bd8ad6d77c88ac92040000"
    )
    transaction.vin[0].script_sig = bytes.fromhex(
        "001479091972186c449eb1ded22b78e40d009bdf0089")

    previous_txout = TxOut(
        value=1000000000,
        script_pubkey=bytes.fromhex(
            "a9144733f37cf4db86fbc2efed2500b4f4e49f31202387"),
    )

    sighash = get_sighash(transaction, previous_txout, 0, 0x01)

    assert (sighash.hex() ==
            "64f3b0f4dd2bb3aa1ce8566d220cc74dda9df97d8490cc81d89d735c92e59fb6")
示例#13
0
def test_legacy_p2pkh():
    pubkey = "04280c8f66bf2ccaeb3f60a19ad4a06365f8bd6178aab0e709df2173df8f553366549aec336aae8742a84702b6c7c3052d89f5d76d535ec3716e72187956351613"
    signature = "3045022100ea43c4800d1a860ec89b5273898a146cfb01d34ff4c364d24a110c480d0e3f7502201c82735577f932f1ca8e1c54bf653e0f8e74e408fe83666bc85cac4472ec950801"
    script_sig = [signature, pubkey]
    previous_txout = TxOut(
        value=1051173696,
        script_pubkey=script.serialize([
            "OP_DUP",
            "OP_HASH160",
            "82ac30f58baf99ec9d14e6181eee076f4e27f69c",
            "OP_EQUALVERIFY",
            "OP_CHECKSIG",
        ]),
    )
    tx = Tx(
        1,
        0,
        vin=[
            TxIn(
                OutPoint(
                    bytes.fromhex(
                        "d8343a35ba951684f2969eafe833d9e6fe436557b9707ae76802875952e860fc"
                    ),
                    1,
                ),
                script_sig,
                0xFFFFFFFF,
                [],
            )
        ],
        vout=[
            TxOut(
                2017682,
                bytes.fromhex(
                    "76a91413bd20236d0da56492c325dce289b4da35b4b5bd88ac"),
            ),
            TxOut(
                1049154982,
                bytes.fromhex(
                    "76a914da169b45781ca210f8c11617ba66bd843da76b1688ac"),
            ),
        ],
    )
    sighash = get_sighash(tx, previous_txout, 0, 0x01)
    assert dsa._verify(sighash, bytes.fromhex(pubkey),
                       bytes.fromhex(signature)[:-1])
示例#14
0
def test_first_transaction():
    transaction = Tx.deserialize(
        "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"
    )
    previous_txout = TxOut(
        value=5000000000,
        script_pubkey=bytes.fromhex(
            "410411db93e1dcdb8a016b49840f8c53bc1eb68a382e97b1482ecad7b148a6909a5cb2e0eaddfb84ccf9744464f82e160bfa9b8b64f9d4c03f999b8643f656b412a3ac"
        ),
    )
    sighash = get_sighash(transaction, previous_txout, 0, 0x01)
    assert (sighash.hex() ==
            "7a05c6145f10101e9d6325494245adf1297d80f8f38d4d576d57cdba220bcb19")
    pubkey = "0411db93e1dcdb8a016b49840f8c53bc1eb68a382e97b1482ecad7b148a6909a5cb2e0eaddfb84ccf9744464f82e160bfa9b8b64f9d4c03f999b8643f656b412a3"
    signature = "304402204E45E16932B8AF514961A1D3A1A25FDF3F4F7732E9D624C6C61548AB5FB8CD410220181522EC8ECA07DE4860A4ACDD12909D831CC56CBBAC4622082221A8768D1D0901"
    assert dsa._verify(sighash, bytes.fromhex(pubkey),
                       bytes.fromhex(signature)[:-1])
示例#15
0
def test_sighashsingle_bug():
    pubkey = "02D5C25ADB51B61339D2B05315791E21BBE80EA470A49DB0135720983C905AACE0"
    signature = "3045022100C9CDD08798A28AF9D1BAF44A6C77BCC7E279F47DC487C8C899911BC48FEAFFCC0220503C5C50AE3998A733263C5C0F7061B483E2B56C4C41B456E7D2F5A78A74C07703"
    script_pubkey = script.serialize([
        "OP_DUP",
        "OP_HASH160",
        "5b6462475454710f3c22f5fdf0b40704c92f25c3",
        "OP_EQUALVERIFY",
        "OP_CHECKSIGVERIFY",
        1,
    ])

    previous_txout = TxOut(0, script_pubkey)
    tx = Tx.deserialize(
        "01000000020002000000000000000000000000000000000000000000000000000000000000000000000151ffffffff0001000000000000000000000000000000000000000000000000000000000000000000006b483045022100c9cdd08798a28af9d1baf44a6c77bcc7e279f47dc487c8c899911bc48feaffcc0220503c5c50ae3998a733263c5c0f7061b483e2b56c4c41b456e7d2f5a78a74c077032102d5c25adb51b61339d2b05315791e21bbe80ea470a49db0135720983c905aace0ffffffff010000000000000000015100000000"
    )
    sighash = get_sighash(tx, previous_txout, 1, 0x03)
    assert dsa._verify(sighash, bytes.fromhex(pubkey),
                       bytes.fromhex(signature)[:-1])
示例#16
0
 def deserialize(cls, data):
     stream = bytesio_from_binarydata(data)
     header = BlockHeader.deserialize(stream)
     nonce = int.from_bytes(stream.read(8), "little")
     short_ids = []
     short_ids_length = varint.decode(stream)
     for x in range(short_ids_length):
         short_ids.append(stream.read(6)[::-1].hex())
     prefilled_tx_list = []
     prefilled_tx_num = varint.decode(stream)
     for x in range(prefilled_tx_num):
         tx_index = varint.decode(stream)
         tx = Tx.deserialize(stream)
         prefilled_tx_list.append((tx_index, tx))
     return cls(
         header=header,
         nonce=nonce,
         short_ids=short_ids,
         prefilled_tx_list=prefilled_tx_list,
     )
示例#17
0
def create_genesis(time, nonce, difficulty, version, reward):
    script_sig = script.serialize(
        [
            "FFFF001D",
            b"\x04",
            "The Times 03/Jan/2009 Chancellor on brink of second bailout for banks".encode(),
        ]
    )
    script_pub_key = script.serialize(
        [
            "04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38c4f35504e51ec112de5c384df7ba0b8d578a4c702b6bf11d5f",
            "OP_CHECKSIG",
        ]
    )
    tx_in = TxIn(
        prevout=OutPoint(),
        scriptSig=script_sig,
        sequence=0xFFFFFFFF,
        txinwitness=[],
    )
    tx_out = TxOut(
        value=reward,
        scriptPubKey=script_pub_key,
    )
    tx = Tx(
        version=1,
        locktime=0,
        vin=[tx_in],
        vout=[tx_out],
    )
    header = BlockHeader(
        version=version,
        previousblockhash="00" * 32,
        merkleroot="00" * 32,
        time=time,
        bits=difficulty.to_bytes(4, "big"),
        nonce=nonce,
    )
    header.merkleroot = _generate_merkle_root([tx])
    return header
示例#18
0
def test_valid_sign_2() -> None:
    psbt_string = "cHNidP8BAFUCAAAAASeaIyOl37UfxF8iD6WLD8E+HjNCeSqF1+Ns1jM7XLw5AAAAAAD/////AaBa6gsAAAAAGXapFP/pwAYQl8w7Y28ssEYPpPxCfStFiKwAAAAAAAEBIJVe6gsAAAAAF6kUY0UgD2jRieGtwN8cTRbqjxTA2+uHIgIDsTQcy6doO2r08SOM1ul+cWfVafrEfx5I1HVBhENVvUZGMEMCIAQktY7/qqaU4VWepck7v9SokGQiQFXN8HC2dxRpRC0HAh9cjrD+plFtYLisszrWTt5g6Hhb+zqpS5m9+GFR25qaAQEEIgAgdx/RitRZZm3Unz1WTj28QvTIR3TjYK2haBao7UiNVoEBBUdSIQOxNBzLp2g7avTxI4zW6X5xZ9Vp+sR/HkjUdUGEQ1W9RiED3lXR4drIBeP4pYwfv5uUwC89uq/hJ/78pJlfJvggg71SriIGA7E0HMunaDtq9PEjjNbpfnFn1Wn6xH8eSNR1QYRDVb1GELSmumcAAACAAAAAgAQAAIAiBgPeVdHh2sgF4/iljB+/m5TALz26r+En/vykmV8m+CCDvRC0prpnAAAAgAAAAIAFAACAAAA="
    psbt = Psbt.decode(psbt_string)
    transaction_input = TxIn(
        prevout=OutPoint(
            bytes.fromhex(
                "75ddabb27b8845f5247975c8a5ba7c6f336c4570708ebe230caf6db5217ae858"
            ),
            0,
        ),
        script_sig=b"",
        sequence=0xFFFFFFFF,
        txinwitness=[],
    )
    assert psbt.inputs[0].witness_utxo is not None
    transaction = Tx(0,
                     2,
                     vin=[transaction_input],
                     vout=[psbt.inputs[0].witness_utxo])
    psbt.tx.vin[0].prevout.txid = transaction.txid
    psbt.inputs[0].non_witness_utxo = transaction
    psbt.assert_signable()
示例#19
0
def test_native_p2wsh_2():
    transaction = Tx.deserialize(
        "0100000002e9b542c5176808107ff1df906f46bb1f2583b16112b95ee5380665ba7fcfc0010000000000ffffffff80e68831516392fcd100d186b3c2c7b95c80b53c77e77c35ba03a66b429a2a1b0000000000ffffffff0280969800000000001976a914de4b231626ef508c9a74a8517e6783c0546d6b2888ac80969800000000001976a9146648a8cd4531e1ec47f35916de8e259237294d1e88ac00000000"
    )
    transaction.vin[0].txinwitness = [
        bytes.fromhex(
            "0063ab68210392972e2eb617b2388771abe27235fd5ac44af8e61693261550447a4c3e39da98ac"
        )
    ]
    transaction.vin[1].txinwitness = [
        bytes.fromhex(
            "5163ab68210392972e2eb617b2388771abe27235fd5ac44af8e61693261550447a4c3e39da98ac"
        )
    ]

    previous_txout_1 = TxOut(
        value=16777215,
        script_pubkey=bytes.fromhex(
            "0020ba468eea561b26301e4cf69fa34bde4ad60c81e70f059f045ca9a79931004a4d"
        ),
    )
    sighash = get_sighash(transaction, previous_txout_1, 0, 0x83)
    assert (sighash.hex() ==
            "e9071e75e25b8a1e298a72f0d2e9f4f95a0f5cdf86a533cda597eb402ed13b3a")

    previous_txout_2 = TxOut(
        value=16777215,
        script_pubkey=bytes.fromhex(
            "0020d9bbfbe56af7c4b7f960a70d7ea107156913d9e5a26b0a71429df5e097ca6537"
        ),
    )

    script_code = _get_witness_v0_script_codes(
        transaction.vin[1].txinwitness[-1])[1]
    sighash = segwit_v0(script_code, transaction, 1, 0x83,
                        previous_txout_2.value)
    assert (sighash.hex() ==
            "cd72f1f1a433ee9df816857fad88d8ebd97e09a75cd481583eb841c330275e54")
示例#20
0
 def deserialize(cls, data):
     tx = TxData.deserialize(data)
     return cls(tx)