Page MenuHomePhabricator

No OneTemporary

diff --git a/src/test/txvalidationcache_tests.cpp b/src/test/txvalidationcache_tests.cpp
index 55ccef0df..ab5c8a0dd 100644
--- a/src/test/txvalidationcache_tests.cpp
+++ b/src/test/txvalidationcache_tests.cpp
@@ -1,679 +1,683 @@
// Copyright (c) 2011-2019 The Bitcoin Core developers
// Distributed under the MIT software license, see the accompanying
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
#include <chain.h>
#include <config.h>
#include <consensus/validation.h>
#include <key.h>
#include <policy/policy.h>
#include <script/scriptcache.h>
#include <script/sighashtype.h>
#include <script/sign.h>
#include <script/signingprovider.h>
#include <txmempool.h>
#include <validation.h>
#include <test/lcg.h>
#include <test/sigutil.h>
#include <test/util/setup_common.h>
#include <boost/test/unit_test.hpp>
BOOST_AUTO_TEST_SUITE(txvalidationcache_tests)
BOOST_FIXTURE_TEST_CASE(tx_mempool_block_doublespend, TestChain100Setup) {
// Make sure skipping validation of transactions that were validated going
// into the memory pool does not allow double-spends in blocks to pass
// validation when they should not.
CScript scriptPubKey = CScript() << ToByteVector(coinbaseKey.GetPubKey())
<< OP_CHECKSIG;
const auto ToMemPool = [this](const CMutableTransaction &tx) {
LOCK(cs_main);
TxValidationState state;
return AcceptToMemoryPool(
::ChainstateActive(), GetConfig(), *m_node.mempool, state,
MakeTransactionRef(tx), true /* bypass_limits */);
};
// Create a double-spend of mature coinbase txn:
std::vector<CMutableTransaction> spends;
spends.resize(2);
for (int i = 0; i < 2; i++) {
spends[i].nVersion = 1;
spends[i].vin.resize(1);
spends[i].vin[0].prevout = COutPoint(m_coinbase_txns[0]->GetId(), 0);
spends[i].vout.resize(1);
spends[i].vout[0].nValue = 11 * CENT;
spends[i].vout[0].scriptPubKey = scriptPubKey;
// Sign:
std::vector<uint8_t> vchSig;
uint256 hash = SignatureHash(scriptPubKey, CTransaction(spends[i]), 0,
SigHashType().withForkId(),
m_coinbase_txns[0]->vout[0].nValue);
BOOST_CHECK(coinbaseKey.SignECDSA(hash, vchSig));
vchSig.push_back(uint8_t(SIGHASH_ALL | SIGHASH_FORKID));
spends[i].vin[0].scriptSig << vchSig;
}
CBlock block;
// Test 1: block with both of those transactions should be rejected.
block = CreateAndProcessBlock(spends, scriptPubKey);
{
LOCK(cs_main);
BOOST_CHECK(::ChainActive().Tip()->GetBlockHash() != block.GetHash());
}
// Test 2: ... and should be rejected if spend1 is in the memory pool
BOOST_CHECK(ToMemPool(spends[0]));
block = CreateAndProcessBlock(spends, scriptPubKey);
{
LOCK(cs_main);
BOOST_CHECK(::ChainActive().Tip()->GetBlockHash() != block.GetHash());
}
m_node.mempool->clear();
// Test 3: ... and should be rejected if spend2 is in the memory pool
BOOST_CHECK(ToMemPool(spends[1]));
block = CreateAndProcessBlock(spends, scriptPubKey);
{
LOCK(cs_main);
BOOST_CHECK(::ChainActive().Tip()->GetBlockHash() != block.GetHash());
}
m_node.mempool->clear();
// Final sanity test: first spend in mempool, second in block, that's OK:
std::vector<CMutableTransaction> oneSpend;
oneSpend.push_back(spends[0]);
BOOST_CHECK(ToMemPool(spends[1]));
block = CreateAndProcessBlock(oneSpend, scriptPubKey);
{
LOCK(cs_main);
BOOST_CHECK(::ChainActive().Tip()->GetBlockHash() == block.GetHash());
}
// spends[1] should have been removed from the mempool when the block with
// spends[0] is accepted:
BOOST_CHECK_EQUAL(m_node.mempool->size(), 0U);
}
static inline bool
CheckInputScripts(const CTransaction &tx, TxValidationState &state,
const CCoinsViewCache &view, const uint32_t flags,
bool sigCacheStore, bool scriptCacheStore,
const PrecomputedTransactionData &txdata, int &nSigChecksOut,
std::vector<CScriptCheck> *pvChecks,
CheckInputsLimiter *pBlockLimitSigChecks = nullptr)
EXCLUSIVE_LOCKS_REQUIRED(cs_main) {
// nSigChecksTxLimiter need to outlive this function call, because test
// cases are using pvChecks, so the verification is done asynchronously.
static TxSigCheckLimiter nSigChecksTxLimiter;
nSigChecksTxLimiter = TxSigCheckLimiter();
return CheckInputScripts(
tx, state, view, flags, sigCacheStore, scriptCacheStore, txdata,
nSigChecksOut, nSigChecksTxLimiter, pBlockLimitSigChecks, pvChecks);
}
// Run CheckInputScripts (using CoinsTip()) on the given transaction, for all
// script flags. Test that CheckInputScripts passes for all flags that don't
// overlap with the failing_flags argument, but otherwise fails.
// CHECKLOCKTIMEVERIFY and CHECKSEQUENCEVERIFY (and future NOP codes that may
// get reassigned) have an interaction with DISCOURAGE_UPGRADABLE_NOPS: if the
// script flags used contain DISCOURAGE_UPGRADABLE_NOPS but don't contain
// CHECKLOCKTIMEVERIFY (or CHECKSEQUENCEVERIFY), but the script does contain
// OP_CHECKLOCKTIMEVERIFY (or OP_CHECKSEQUENCEVERIFY), then script execution
// should fail.
// Capture this interaction with the upgraded_nop argument: set it when
// evaluating any script flag that is implemented as an upgraded NOP code.
-static void
-ValidateCheckInputsForAllFlags(const CTransaction &tx, uint32_t failing_flags,
- uint32_t required_flags, bool add_to_cache,
- int expected_sigchecks)
- EXCLUSIVE_LOCKS_REQUIRED(cs_main) {
+static void ValidateCheckInputsForAllFlags(
+ const CTransaction &tx, uint32_t failing_flags, uint32_t required_flags,
+ bool add_to_cache, CCoinsViewCache &active_coins_tip,
+ int expected_sigchecks) EXCLUSIVE_LOCKS_REQUIRED(cs_main) {
PrecomputedTransactionData txdata(tx);
MMIXLinearCongruentialGenerator lcg;
for (int i = 0; i < 4096; i++) {
uint32_t test_flags = lcg.next() | required_flags;
TxValidationState state;
// Filter out incompatible flag choices
if ((test_flags & SCRIPT_VERIFY_CLEANSTACK)) {
// CLEANSTACK requires P2SH, see VerifyScript() in
// script/interpreter.cpp
test_flags |= SCRIPT_VERIFY_P2SH;
}
int nSigChecksDirect = 0xf00d;
- bool ret = CheckInputScripts(
- tx, state, &::ChainstateActive().CoinsTip(), test_flags, true,
- add_to_cache, txdata, nSigChecksDirect);
+ bool ret =
+ CheckInputScripts(tx, state, &active_coins_tip, test_flags, true,
+ add_to_cache, txdata, nSigChecksDirect);
// CheckInputScripts should succeed iff test_flags doesn't intersect
// with failing_flags
bool expected_return_value = !(test_flags & failing_flags);
BOOST_CHECK_EQUAL(ret, expected_return_value);
if (ret) {
BOOST_CHECK(nSigChecksDirect == expected_sigchecks);
}
// Test the caching
if (ret && add_to_cache) {
// Check that we get a cache hit if the tx was valid
std::vector<CScriptCheck> scriptchecks;
int nSigChecksCached = 0xbeef;
BOOST_CHECK(CheckInputScripts(
- tx, state, &::ChainstateActive().CoinsTip(), test_flags, true,
- add_to_cache, txdata, nSigChecksCached, &scriptchecks));
+ tx, state, &active_coins_tip, test_flags, true, add_to_cache,
+ txdata, nSigChecksCached, &scriptchecks));
BOOST_CHECK(nSigChecksCached == nSigChecksDirect);
BOOST_CHECK(scriptchecks.empty());
} else {
// Check that we get script executions to check, if the transaction
// was invalid, or we didn't add to cache.
std::vector<CScriptCheck> scriptchecks;
int nSigChecksUncached = 0xbabe;
BOOST_CHECK(CheckInputScripts(
- tx, state, &::ChainstateActive().CoinsTip(), test_flags, true,
- add_to_cache, txdata, nSigChecksUncached, &scriptchecks));
+ tx, state, &active_coins_tip, test_flags, true, add_to_cache,
+ txdata, nSigChecksUncached, &scriptchecks));
BOOST_CHECK(!ret || nSigChecksUncached == 0);
BOOST_CHECK_EQUAL(scriptchecks.size(), tx.vin.size());
}
}
}
BOOST_FIXTURE_TEST_CASE(checkinputs_test, TestChain100Setup) {
// Test that passing CheckInputScripts with one set of script flags doesn't
// imply that we would pass again with a different set of flags.
{
LOCK(cs_main);
InitScriptExecutionCache();
}
CScript p2pk_scriptPubKey =
CScript() << ToByteVector(coinbaseKey.GetPubKey()) << OP_CHECKSIG;
CScript p2sh_scriptPubKey =
GetScriptForDestination(ScriptHash(p2pk_scriptPubKey));
CScript p2pkh_scriptPubKey =
GetScriptForDestination(PKHash(coinbaseKey.GetPubKey()));
FillableSigningProvider keystore;
BOOST_CHECK(keystore.AddKey(coinbaseKey));
BOOST_CHECK(keystore.AddCScript(p2pk_scriptPubKey));
CMutableTransaction funding_tx;
// Needed when spending the output of this transaction
CScript noppyScriptPubKey;
// Create a transaction output that can fail DISCOURAGE_UPGRADABLE_NOPS
// checks when spent. This is for testing consensus vs non-standard rules in
// `checkinputs_test`.
{
funding_tx.nVersion = 1;
funding_tx.vin.resize(1);
funding_tx.vin[0].prevout = COutPoint(m_coinbase_txns[0]->GetId(), 0);
funding_tx.vout.resize(1);
funding_tx.vout[0].nValue = 50 * COIN;
noppyScriptPubKey << OP_IF << OP_NOP10 << OP_ENDIF << OP_1;
funding_tx.vout[0].scriptPubKey = noppyScriptPubKey;
std::vector<uint8_t> fundingVchSig;
uint256 fundingSigHash = SignatureHash(
p2pk_scriptPubKey, CTransaction(funding_tx), 0,
SigHashType().withForkId(), m_coinbase_txns[0]->vout[0].nValue);
BOOST_CHECK(coinbaseKey.SignECDSA(fundingSigHash, fundingVchSig));
fundingVchSig.push_back(uint8_t(SIGHASH_ALL | SIGHASH_FORKID));
funding_tx.vin[0].scriptSig << fundingVchSig;
}
// Spend the funding transaction by mining it into a block
{
CBlock block = CreateAndProcessBlock({funding_tx}, p2pk_scriptPubKey);
BOOST_CHECK(::ChainActive().Tip()->GetBlockHash() == block.GetHash());
LOCK(cs_main);
BOOST_CHECK(::ChainstateActive().CoinsTip().GetBestBlock() ==
block.GetHash());
}
// flags to test: SCRIPT_VERIFY_CHECKLOCKTIMEVERIFY,
// SCRIPT_VERIFY_CHECKSEQUENCE_VERIFY,
// SCRIPT_VERIFY_DISCOURAGE_UPGRADABLE_NOPS, uncompressed pubkey thing
// Create 2 outputs that match the three scripts above, spending the first
// coinbase tx.
CMutableTransaction spend_tx;
spend_tx.nVersion = 1;
spend_tx.vin.resize(1);
spend_tx.vin[0].prevout = COutPoint(funding_tx.GetId(), 0);
spend_tx.vout.resize(4);
spend_tx.vout[0].nValue = 11 * CENT;
spend_tx.vout[0].scriptPubKey = p2sh_scriptPubKey;
spend_tx.vout[1].nValue = 11 * CENT;
spend_tx.vout[1].scriptPubKey =
CScript() << OP_CHECKLOCKTIMEVERIFY << OP_DROP
<< ToByteVector(coinbaseKey.GetPubKey()) << OP_CHECKSIG;
spend_tx.vout[2].nValue = 11 * CENT;
spend_tx.vout[2].scriptPubKey =
CScript() << OP_CHECKSEQUENCEVERIFY << OP_DROP
<< ToByteVector(coinbaseKey.GetPubKey()) << OP_CHECKSIG;
spend_tx.vout[3].nValue = 11 * CENT;
spend_tx.vout[3].scriptPubKey = p2sh_scriptPubKey;
// "Sign" the main transaction that we spend from.
{
// This will cause OP_NOP10 to execute.
spend_tx.vin[0].scriptSig << OP_1;
}
// Test that invalidity under a set of flags doesn't preclude validity under
// other (eg consensus) flags.
// spend_tx is invalid according to DISCOURAGE_UPGRADABLE_NOPS
{
const CTransaction tx(spend_tx);
LOCK(cs_main);
TxValidationState state;
PrecomputedTransactionData ptd_spend_tx(tx);
int nSigChecksDummy;
BOOST_CHECK(!CheckInputScripts(tx, state,
&::ChainstateActive().CoinsTip(),
STANDARD_SCRIPT_VERIFY_FLAGS, true, true,
ptd_spend_tx, nSigChecksDummy, nullptr));
// If we call again asking for scriptchecks (as happens in
// ConnectBlock), we should add a script check object for this -- we're
// not caching invalidity (if that changes, delete this test case).
std::vector<CScriptCheck> scriptchecks;
BOOST_CHECK(
CheckInputScripts(tx, state, &::ChainstateActive().CoinsTip(),
STANDARD_SCRIPT_VERIFY_FLAGS, true, true,
ptd_spend_tx, nSigChecksDummy, &scriptchecks));
BOOST_CHECK_EQUAL(scriptchecks.size(), 1U);
// Test that CheckInputScripts returns true iff cleanstack-enforcing
// flags are not present. Don't add these checks to the cache, so that
// we can test later that block validation works fine in the absence of
// cached successes.
ValidateCheckInputsForAllFlags(
- tx, SCRIPT_VERIFY_DISCOURAGE_UPGRADABLE_NOPS, 0, false, 0);
+ tx, SCRIPT_VERIFY_DISCOURAGE_UPGRADABLE_NOPS, 0, false,
+ ::ChainstateActive().CoinsTip(), 0);
}
// And if we produce a block with this tx, it should be valid, even though
// there's no cache entry.
CBlock block;
block = CreateAndProcessBlock({spend_tx}, p2pk_scriptPubKey);
LOCK(cs_main);
BOOST_CHECK(::ChainActive().Tip()->GetBlockHash() == block.GetHash());
BOOST_CHECK(::ChainstateActive().CoinsTip().GetBestBlock() ==
block.GetHash());
// Test P2SH: construct a transaction that is valid without P2SH, and then
// test validity with P2SH.
{
CMutableTransaction invalid_under_p2sh_tx;
invalid_under_p2sh_tx.nVersion = 1;
invalid_under_p2sh_tx.vin.resize(1);
invalid_under_p2sh_tx.vin[0].prevout = COutPoint(spend_tx.GetId(), 0);
invalid_under_p2sh_tx.vout.resize(1);
invalid_under_p2sh_tx.vout[0].nValue = 11 * CENT;
invalid_under_p2sh_tx.vout[0].scriptPubKey = p2pk_scriptPubKey;
std::vector<uint8_t> vchSig2(p2pk_scriptPubKey.begin(),
p2pk_scriptPubKey.end());
invalid_under_p2sh_tx.vin[0].scriptSig << vchSig2;
ValidateCheckInputsForAllFlags(CTransaction(invalid_under_p2sh_tx),
- SCRIPT_VERIFY_P2SH, 0, true, 0);
+ SCRIPT_VERIFY_P2SH, 0, true,
+ ::ChainstateActive().CoinsTip(), 0);
}
// Test CHECKLOCKTIMEVERIFY
{
CMutableTransaction invalid_with_cltv_tx;
invalid_with_cltv_tx.nVersion = 1;
invalid_with_cltv_tx.nLockTime = 100;
invalid_with_cltv_tx.vin.resize(1);
invalid_with_cltv_tx.vin[0].prevout = COutPoint(spend_tx.GetId(), 1);
invalid_with_cltv_tx.vin[0].nSequence = 0;
invalid_with_cltv_tx.vout.resize(1);
invalid_with_cltv_tx.vout[0].nValue = 11 * CENT;
invalid_with_cltv_tx.vout[0].scriptPubKey = p2pk_scriptPubKey;
// Sign
std::vector<uint8_t> vchSig;
uint256 hash = SignatureHash(
spend_tx.vout[1].scriptPubKey, CTransaction(invalid_with_cltv_tx),
0, SigHashType().withForkId(), spend_tx.vout[1].nValue);
BOOST_CHECK(coinbaseKey.SignECDSA(hash, vchSig));
vchSig.push_back(uint8_t(SIGHASH_ALL | SIGHASH_FORKID));
invalid_with_cltv_tx.vin[0].scriptSig = CScript() << vchSig << 101;
ValidateCheckInputsForAllFlags(CTransaction(invalid_with_cltv_tx),
SCRIPT_VERIFY_CHECKLOCKTIMEVERIFY |
SCRIPT_ENABLE_REPLAY_PROTECTION,
- SCRIPT_ENABLE_SIGHASH_FORKID, true, 1);
+ SCRIPT_ENABLE_SIGHASH_FORKID, true,
+ ::ChainstateActive().CoinsTip(), 1);
// Make it valid, and check again
invalid_with_cltv_tx.vin[0].scriptSig = CScript() << vchSig << 100;
TxValidationState state;
CTransaction transaction(invalid_with_cltv_tx);
PrecomputedTransactionData txdata(transaction);
int nSigChecksRet;
BOOST_CHECK(CheckInputScripts(transaction, state,
::ChainstateActive().CoinsTip(),
STANDARD_SCRIPT_VERIFY_FLAGS, true, true,
txdata, nSigChecksRet, nullptr));
BOOST_CHECK(nSigChecksRet == 1);
}
// TEST CHECKSEQUENCEVERIFY
{
CMutableTransaction invalid_with_csv_tx;
invalid_with_csv_tx.nVersion = 2;
invalid_with_csv_tx.vin.resize(1);
invalid_with_csv_tx.vin[0].prevout = COutPoint(spend_tx.GetId(), 2);
invalid_with_csv_tx.vin[0].nSequence = 100;
invalid_with_csv_tx.vout.resize(1);
invalid_with_csv_tx.vout[0].nValue = 11 * CENT;
invalid_with_csv_tx.vout[0].scriptPubKey = p2pk_scriptPubKey;
// Sign
std::vector<uint8_t> vchSig;
uint256 hash = SignatureHash(
spend_tx.vout[2].scriptPubKey, CTransaction(invalid_with_csv_tx), 0,
SigHashType().withForkId(), spend_tx.vout[2].nValue);
BOOST_CHECK(coinbaseKey.SignECDSA(hash, vchSig));
vchSig.push_back(uint8_t(SIGHASH_ALL | SIGHASH_FORKID));
invalid_with_csv_tx.vin[0].scriptSig = CScript() << vchSig << 101;
ValidateCheckInputsForAllFlags(CTransaction(invalid_with_csv_tx),
SCRIPT_VERIFY_CHECKSEQUENCEVERIFY |
SCRIPT_ENABLE_REPLAY_PROTECTION,
- SCRIPT_ENABLE_SIGHASH_FORKID, true, 1);
+ SCRIPT_ENABLE_SIGHASH_FORKID, true,
+ ::ChainstateActive().CoinsTip(), 1);
// Make it valid, and check again
invalid_with_csv_tx.vin[0].scriptSig = CScript() << vchSig << 100;
TxValidationState state;
CTransaction transaction(invalid_with_csv_tx);
PrecomputedTransactionData txdata(transaction);
int nSigChecksRet;
BOOST_CHECK(CheckInputScripts(transaction, state,
&::ChainstateActive().CoinsTip(),
STANDARD_SCRIPT_VERIFY_FLAGS, true, true,
txdata, nSigChecksRet, nullptr));
BOOST_CHECK(nSigChecksRet == 1);
}
// TODO: add tests for remaining script flags
{
// Test a transaction with multiple inputs.
CMutableTransaction tx;
tx.nVersion = 1;
tx.vin.resize(2);
tx.vin[0].prevout = COutPoint(spend_tx.GetId(), 0);
tx.vin[1].prevout = COutPoint(spend_tx.GetId(), 3);
tx.vout.resize(1);
tx.vout[0].nValue = 22 * CENT;
tx.vout[0].scriptPubKey = p2pk_scriptPubKey;
// Sign
{
SignatureData sigdata;
BOOST_CHECK(ProduceSignature(
keystore,
MutableTransactionSignatureCreator(&tx, 0, 11 * CENT,
SigHashType().withForkId()),
spend_tx.vout[0].scriptPubKey, sigdata));
UpdateInput(tx.vin[0], sigdata);
}
{
SignatureData sigdata;
BOOST_CHECK(ProduceSignature(
keystore,
MutableTransactionSignatureCreator(&tx, 1, 11 * CENT,
SigHashType().withForkId()),
spend_tx.vout[3].scriptPubKey, sigdata));
UpdateInput(tx.vin[1], sigdata);
}
// This should be valid under all script flags that support our sighash
// convention.
ValidateCheckInputsForAllFlags(
CTransaction(tx), SCRIPT_ENABLE_REPLAY_PROTECTION,
- SCRIPT_ENABLE_SIGHASH_FORKID | SCRIPT_VERIFY_P2SH, true, 2);
+ SCRIPT_ENABLE_SIGHASH_FORKID | SCRIPT_VERIFY_P2SH, true,
+ ::ChainstateActive().CoinsTip(), 2);
{
// Try checking this valid transaction with sigchecks limiter
// supplied. Each input consumes 1 sigcheck.
TxValidationState state;
CTransaction transaction(tx);
PrecomputedTransactionData txdata(transaction);
const uint32_t flags =
STANDARD_SCRIPT_VERIFY_FLAGS | SCRIPT_ENFORCE_SIGCHECKS;
int nSigChecksDummy;
/**
* Parallel validation initially works (no cached value), but
* evaluation of the script checks produces a failure.
*/
std::vector<CScriptCheck> scriptchecks1;
CheckInputsLimiter sigchecklimiter1(1);
BOOST_CHECK(CheckInputScripts(
transaction, state, &::ChainstateActive().CoinsTip(), flags,
true, true, txdata, nSigChecksDummy, &scriptchecks1,
&sigchecklimiter1));
// the first check passes but it did consume the limit.
BOOST_CHECK(scriptchecks1[1]());
BOOST_CHECK(sigchecklimiter1.check());
// the second check (the first input) fails due to the limiter.
BOOST_CHECK(!scriptchecks1[0]());
BOOST_CHECK_EQUAL(scriptchecks1[0].GetScriptError(),
ScriptError::SIGCHECKS_LIMIT_EXCEEDED);
BOOST_CHECK(!sigchecklimiter1.check());
// Serial validation fails with the limiter.
CheckInputsLimiter sigchecklimiter2(1);
TxValidationState state2;
BOOST_CHECK(!CheckInputScripts(
transaction, state2, &::ChainstateActive().CoinsTip(), flags,
true, true, txdata, nSigChecksDummy, nullptr,
&sigchecklimiter2));
BOOST_CHECK(!sigchecklimiter2.check());
BOOST_CHECK_EQUAL(state2.GetRejectReason(),
"non-mandatory-script-verify-flag (Validation "
"resources exceeded (SigChecks))");
/**
* A slightly more permissive limiter (just enough) passes, and
* allows caching the result.
*/
std::vector<CScriptCheck> scriptchecks3;
CheckInputsLimiter sigchecklimiter3(2);
// first in parallel
BOOST_CHECK(CheckInputScripts(
transaction, state, &::ChainstateActive().CoinsTip(), flags,
true, true, txdata, nSigChecksDummy, &scriptchecks3,
&sigchecklimiter3));
BOOST_CHECK(scriptchecks3[1]());
BOOST_CHECK(scriptchecks3[0]());
BOOST_CHECK(sigchecklimiter3.check());
// then in serial, caching the result.
CheckInputsLimiter sigchecklimiter4(2);
BOOST_CHECK(CheckInputScripts(
transaction, state, &::ChainstateActive().CoinsTip(), flags,
true, true, txdata, nSigChecksDummy, nullptr,
&sigchecklimiter4));
BOOST_CHECK(sigchecklimiter4.check());
// now in parallel again, grabbing the cached result.
std::vector<CScriptCheck> scriptchecks5;
CheckInputsLimiter sigchecklimiter5(2);
BOOST_CHECK(CheckInputScripts(
transaction, state, &::ChainstateActive().CoinsTip(), flags,
true, true, txdata, nSigChecksDummy, &scriptchecks5,
&sigchecklimiter5));
BOOST_CHECK(scriptchecks5.empty());
BOOST_CHECK(sigchecklimiter5.check());
/**
* Going back to the lower limit, we now fail immediately due to the
* caching.
*/
CheckInputsLimiter sigchecklimiter6(1);
TxValidationState state6;
BOOST_CHECK(!CheckInputScripts(
transaction, state6, &::ChainstateActive().CoinsTip(), flags,
true, true, txdata, nSigChecksDummy, nullptr,
&sigchecklimiter6));
BOOST_CHECK_EQUAL(state6.GetRejectReason(), "too-many-sigchecks");
BOOST_CHECK_EQUAL(state6.GetResult(),
TxValidationResult::TX_CONSENSUS);
BOOST_CHECK(!sigchecklimiter6.check());
// even in parallel validation, immediate fail from the cache.
std::vector<CScriptCheck> scriptchecks7;
CheckInputsLimiter sigchecklimiter7(1);
TxValidationState state7;
BOOST_CHECK(!CheckInputScripts(
transaction, state7, &::ChainstateActive().CoinsTip(), flags,
true, true, txdata, nSigChecksDummy, &scriptchecks7,
&sigchecklimiter7));
BOOST_CHECK_EQUAL(state7.GetRejectReason(), "too-many-sigchecks");
BOOST_CHECK_EQUAL(state6.GetResult(),
TxValidationResult::TX_CONSENSUS);
BOOST_CHECK(!sigchecklimiter7.check());
BOOST_CHECK(scriptchecks7.empty());
}
// Check that if the second input is invalid, but the first input is
// valid, the transaction is not cached.
// Invalidate vin[1]
tx.vin[1].scriptSig = CScript();
TxValidationState state;
CTransaction transaction(tx);
PrecomputedTransactionData txdata(transaction);
// This transaction is now invalid because the second signature is
// missing.
int nSigChecksDummy;
BOOST_CHECK(!CheckInputScripts(transaction, state,
&::ChainstateActive().CoinsTip(),
STANDARD_SCRIPT_VERIFY_FLAGS, true, true,
txdata, nSigChecksDummy, nullptr));
// Make sure this transaction was not cached (ie becausethe first input
// was valid)
std::vector<CScriptCheck> scriptchecks;
BOOST_CHECK(CheckInputScripts(
transaction, state, &::ChainstateActive().CoinsTip(),
STANDARD_SCRIPT_VERIFY_FLAGS | SCRIPT_ENFORCE_SIGCHECKS, true, true,
txdata, nSigChecksDummy, &scriptchecks));
// Should get 2 script checks back -- caching is on a whole-transaction
// basis.
BOOST_CHECK_EQUAL(scriptchecks.size(), 2U);
// Execute the first check, and check its result
BOOST_CHECK(scriptchecks[0]());
BOOST_CHECK_EQUAL(scriptchecks[0].GetScriptError(), ScriptError::OK);
BOOST_CHECK_EQUAL(
scriptchecks[0].GetScriptExecutionMetrics().nSigChecks, 1);
// The second check does fail
BOOST_CHECK(!scriptchecks[1]());
BOOST_CHECK_EQUAL(scriptchecks[1].GetScriptError(),
ScriptError::INVALID_STACK_OPERATION);
}
}
BOOST_AUTO_TEST_CASE(scriptcache_values) {
LOCK(cs_main);
// Test insertion and querying of keys&values from the script cache.
// Define a couple of macros (handier than functions since errors will print
// out the correct line number)
#define CHECK_CACHE_HAS(key, expected_sigchecks) \
{ \
int nSigChecksRet(0x12345678 ^ (expected_sigchecks)); \
BOOST_CHECK(IsKeyInScriptCache(key, false, nSigChecksRet)); \
BOOST_CHECK(nSigChecksRet == (expected_sigchecks)); \
}
#define CHECK_CACHE_MISSING(key) \
{ \
int dummy; \
BOOST_CHECK(!IsKeyInScriptCache(key, false, dummy)); \
}
InitScriptExecutionCache();
// construct four distinct keys from very slightly different data
CMutableTransaction tx1;
tx1.nVersion = 1;
CMutableTransaction tx2;
tx2.nVersion = 2;
uint32_t flagsA = 0x7fffffff;
uint32_t flagsB = 0xffffffff;
ScriptCacheKey key1A(CTransaction(tx1), flagsA);
ScriptCacheKey key1B(CTransaction(tx1), flagsB);
ScriptCacheKey key2A(CTransaction(tx2), flagsA);
ScriptCacheKey key2B(CTransaction(tx2), flagsB);
BOOST_CHECK(key1A == key1A);
BOOST_CHECK(!(key1A == key1B));
BOOST_CHECK(!(key1A == key2A));
BOOST_CHECK(!(key1A == key2B));
BOOST_CHECK(key1B == key1B);
BOOST_CHECK(!(key1B == key2A));
BOOST_CHECK(!(key1B == key2B));
BOOST_CHECK(key2A == key2A);
BOOST_CHECK(!(key2A == key2B));
BOOST_CHECK(key2B == key2B);
// Key is not yet inserted.
CHECK_CACHE_MISSING(key1A);
// Add the key and check it worked
AddKeyInScriptCache(key1A, 42);
CHECK_CACHE_HAS(key1A, 42);
CHECK_CACHE_MISSING(key1B);
CHECK_CACHE_MISSING(key2A);
CHECK_CACHE_MISSING(key2B);
// 0 may be stored
AddKeyInScriptCache(key1B, 0);
// Calculate the most possible transaction sigchecks that can occur in a
// standard transaction, and make sure the cache can hold it.
//
// To be pessimistic, use consensus (MAX_TX_SIZE) instead of policy
// (MAX_STANDARD_TX_SIZE) since that particular policy limit is bypassed on
// testnet.
//
// Assume that a standardness rule limiting density to ~33 bytes/sigcheck is
// in place.
const int max_standard_sigchecks = 1 + (MAX_TX_SIZE / 33);
AddKeyInScriptCache(key2A, max_standard_sigchecks);
// Read out values again.
CHECK_CACHE_HAS(key1A, 42);
CHECK_CACHE_HAS(key1B, 0);
CHECK_CACHE_HAS(key2A, max_standard_sigchecks);
CHECK_CACHE_MISSING(key2B);
// Try overwriting an existing entry with different value (should never
// happen in practice but see what happens).
AddKeyInScriptCache(key1A, 99);
// This succeeds without error, but (currently) no replacement is done.
// It would also be acceptable to overwrite, but if we ever come to a
// situation where this matters then neither alternative is better.
CHECK_CACHE_HAS(key1A, 42);
}
BOOST_AUTO_TEST_SUITE_END()

File Metadata

Mime Type
text/x-diff
Expires
Wed, May 21, 18:13 (21 h, 48 m)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
5865670
Default Alt Text
(30 KB)

Event Timeline