2022-01-06 17:39:55 -08:00
|
|
|
// Copyright (c) 2013-2022 The btcsuite developers
|
|
|
|
// Use of this source code is governed by an ISC
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package txscript
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"encoding/hex"
|
|
|
|
"testing"
|
2022-01-06 18:14:49 -08:00
|
|
|
"testing/quick"
|
2022-01-06 17:39:55 -08:00
|
|
|
|
2022-01-06 18:14:49 -08:00
|
|
|
"github.com/btcsuite/btcd/btcec/v2"
|
2022-01-06 17:39:55 -08:00
|
|
|
"github.com/btcsuite/btcd/btcec/v2/schnorr"
|
2022-01-06 18:14:49 -08:00
|
|
|
"github.com/btcsuite/btcd/btcutil"
|
|
|
|
"github.com/btcsuite/btcd/btcutil/hdkeychain"
|
|
|
|
"github.com/btcsuite/btcd/chaincfg"
|
2022-01-06 17:39:55 -08:00
|
|
|
secp "github.com/decred/dcrd/dcrec/secp256k1/v4"
|
2022-01-06 18:14:49 -08:00
|
|
|
"github.com/stretchr/testify/require"
|
2022-01-06 17:39:55 -08:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2022-01-06 18:14:49 -08:00
|
|
|
testPubBytes, _ = hex.DecodeString("F9308A019258C31049344F85F89D5229B" +
|
|
|
|
"531C845836F99B08601F113BCE036F9")
|
|
|
|
|
|
|
|
// rootKey is the test root key defined in the test vectors:
|
|
|
|
// https://github.com/bitcoin/bips/blob/master/bip-0086.mediawiki
|
|
|
|
rootKey, _ = hdkeychain.NewKeyFromString(
|
|
|
|
"xprv9s21ZrQH143K3GJpoapnV8SFfukcVBSfeCficPSGfubmSFDxo1kuHnLi" +
|
|
|
|
"sriDvSnRRuL2Qrg5ggqHKNVpxR86QEC8w35uxmGoggxtQTPvfUu",
|
|
|
|
)
|
|
|
|
|
|
|
|
// accountPath is the base path for BIP86 (m/86'/0'/0').
|
|
|
|
accountPath = []uint32{
|
|
|
|
86 + hdkeychain.HardenedKeyStart, hdkeychain.HardenedKeyStart,
|
|
|
|
hdkeychain.HardenedKeyStart,
|
|
|
|
}
|
|
|
|
expectedExternalAddresses = []string{
|
|
|
|
"bc1p5cyxnuxmeuwuvkwfem96lqzszd02n6xdcjrs20cac6yqjjwudpxqkedrcr",
|
|
|
|
"bc1p4qhjn9zdvkux4e44uhx8tc55attvtyu358kutcqkudyccelu0was9fqzwh",
|
|
|
|
}
|
|
|
|
expectedInternalAddresses = []string{
|
|
|
|
"bc1p3qkhfews2uk44qtvauqyr2ttdsw7svhkl9nkm9s9c3x4ax5h60wqwruhk7",
|
|
|
|
}
|
2022-01-06 17:39:55 -08:00
|
|
|
)
|
|
|
|
|
|
|
|
// TestControlBlockParsing tests that we're able to generate and parse a valid
|
|
|
|
// control block.
|
|
|
|
func TestControlBlockParsing(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
var testCases = []struct {
|
|
|
|
controlBlockGen func() []byte
|
|
|
|
valid bool
|
|
|
|
}{
|
|
|
|
// An invalid control block, it's only 5 bytes and needs to be
|
|
|
|
// at least 33 bytes.
|
|
|
|
{
|
|
|
|
controlBlockGen: func() []byte {
|
|
|
|
return bytes.Repeat([]byte{0x00}, 5)
|
|
|
|
},
|
|
|
|
valid: false,
|
|
|
|
},
|
|
|
|
|
|
|
|
// An invalid control block, it's greater than the largest
|
|
|
|
// accepted control block.
|
|
|
|
{
|
|
|
|
controlBlockGen: func() []byte {
|
|
|
|
return bytes.Repeat([]byte{0x00}, ControlBlockMaxSize+1)
|
|
|
|
},
|
|
|
|
valid: false,
|
|
|
|
},
|
|
|
|
|
|
|
|
// An invalid control block, it isn't a multiple of 32 bytes
|
|
|
|
// enough though it has a valid starting byte length.
|
|
|
|
{
|
|
|
|
controlBlockGen: func() []byte {
|
|
|
|
return bytes.Repeat([]byte{0x00}, ControlBlockBaseSize+34)
|
|
|
|
},
|
|
|
|
valid: false,
|
|
|
|
},
|
|
|
|
|
|
|
|
// A valid control block, of the largest possible size.
|
|
|
|
{
|
|
|
|
controlBlockGen: func() []byte {
|
|
|
|
privKey, _ := btcec.NewPrivateKey()
|
|
|
|
pubKey := privKey.PubKey()
|
|
|
|
|
|
|
|
yIsOdd := (pubKey.SerializeCompressed()[0] ==
|
|
|
|
secp.PubKeyFormatCompressedOdd)
|
|
|
|
|
|
|
|
ctrl := ControlBlock{
|
|
|
|
InternalKey: pubKey,
|
|
|
|
OutputKeyYIsOdd: yIsOdd,
|
|
|
|
LeafVersion: BaseLeafVersion,
|
|
|
|
InclusionProof: bytes.Repeat(
|
|
|
|
[]byte{0x00},
|
|
|
|
ControlBlockMaxSize-ControlBlockBaseSize,
|
|
|
|
),
|
|
|
|
}
|
|
|
|
|
|
|
|
ctrlBytes, _ := ctrl.ToBytes()
|
|
|
|
return ctrlBytes
|
|
|
|
},
|
|
|
|
valid: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
// A valid control block, only has a single element in the
|
|
|
|
// proof as the tree only has a single element.
|
|
|
|
{
|
|
|
|
controlBlockGen: func() []byte {
|
|
|
|
privKey, _ := btcec.NewPrivateKey()
|
|
|
|
pubKey := privKey.PubKey()
|
|
|
|
|
|
|
|
yIsOdd := (pubKey.SerializeCompressed()[0] ==
|
|
|
|
secp.PubKeyFormatCompressedOdd)
|
|
|
|
|
|
|
|
ctrl := ControlBlock{
|
|
|
|
InternalKey: pubKey,
|
|
|
|
OutputKeyYIsOdd: yIsOdd,
|
|
|
|
LeafVersion: BaseLeafVersion,
|
|
|
|
InclusionProof: bytes.Repeat(
|
|
|
|
[]byte{0x00}, ControlBlockNodeSize,
|
|
|
|
),
|
|
|
|
}
|
|
|
|
|
|
|
|
ctrlBytes, _ := ctrl.ToBytes()
|
|
|
|
return ctrlBytes
|
|
|
|
},
|
|
|
|
valid: true,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for i, testCase := range testCases {
|
|
|
|
ctrlBlockBytes := testCase.controlBlockGen()
|
|
|
|
|
|
|
|
ctrlBlock, err := ParseControlBlock(ctrlBlockBytes)
|
|
|
|
switch {
|
|
|
|
case testCase.valid && err != nil:
|
|
|
|
t.Fatalf("#%v: unable to parse valid control block: %v", i, err)
|
|
|
|
|
|
|
|
case !testCase.valid && err == nil:
|
|
|
|
t.Fatalf("#%v: invalid control block should have failed: %v", i, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !testCase.valid {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we serialize the control block, we should get the exact same
|
|
|
|
// set of bytes as the input.
|
|
|
|
ctrlBytes, err := ctrlBlock.ToBytes()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("#%v: unable to encode bytes: %v", i, err)
|
|
|
|
}
|
|
|
|
if !bytes.Equal(ctrlBytes, ctrlBlockBytes) {
|
|
|
|
t.Fatalf("#%v: encoding mismatch: expected %x, "+
|
|
|
|
"got %x", i, ctrlBlockBytes, ctrlBytes)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2022-01-06 18:14:49 -08:00
|
|
|
|
|
|
|
// TestTaprootScriptSpendTweak tests that for any 32-byte hypothetical script
|
|
|
|
// root, the resulting tweaked public key is the same as tweaking the private
|
|
|
|
// key, then generating a public key from that. This test a quickcheck test to
|
|
|
|
// assert the following invariant:
|
|
|
|
//
|
|
|
|
// * taproot_tweak_pubkey(pubkey_gen(seckey), h)[1] ==
|
|
|
|
// pubkey_gen(taproot_tweak_seckey(seckey, h))
|
|
|
|
func TestTaprootScriptSpendTweak(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
// Assert that if we use this x value as the hash of the script root,
|
|
|
|
// then if we generate a tweaked public key, it's the same key as if we
|
|
|
|
// used that key to generate the tweaked
|
|
|
|
// private key, and then generated the public key from that.
|
|
|
|
f := func(x [32]byte) bool {
|
|
|
|
privKey, err := btcec.NewPrivateKey()
|
|
|
|
if err != nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
// Generate the tweaked public key using the x value as the
|
|
|
|
// script root.
|
|
|
|
tweakedPub := ComputeTaprootOutputKey(privKey.PubKey(), x[:])
|
|
|
|
|
|
|
|
// Now we'll generate the corresponding tweaked private key.
|
|
|
|
tweakedPriv := TweakTaprootPrivKey(privKey, x[:])
|
|
|
|
|
|
|
|
// The public key for this private key should be the same as
|
|
|
|
// the tweaked public key we generate above.
|
|
|
|
return tweakedPub.IsEqual(tweakedPriv.PubKey()) &&
|
|
|
|
bytes.Equal(
|
|
|
|
schnorr.SerializePubKey(tweakedPub),
|
|
|
|
schnorr.SerializePubKey(tweakedPriv.PubKey()),
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := quick.Check(f, nil); err != nil {
|
|
|
|
t.Fatalf("tweaked public/private key mapping is "+
|
|
|
|
"incorrect: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
// TestTaprootConstructKeyPath tests the key spend only taproot construction.
|
|
|
|
func TestTaprootConstructKeyPath(t *testing.T) {
|
|
|
|
checkPath := func(branch uint32, expectedAddresses []string) {
|
|
|
|
path, err := derivePath(rootKey, append(accountPath, branch))
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
for index, expectedAddr := range expectedAddresses {
|
|
|
|
extendedKey, err := path.Derive(uint32(index))
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
pubKey, err := extendedKey.ECPubKey()
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
tapKey := ComputeTaprootKeyNoScript(pubKey)
|
|
|
|
|
|
|
|
addr, err := btcutil.NewAddressTaproot(
|
|
|
|
schnorr.SerializePubKey(tapKey),
|
|
|
|
&chaincfg.MainNetParams,
|
|
|
|
)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
require.Equal(t, expectedAddr, addr.String())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
checkPath(0, expectedExternalAddresses)
|
|
|
|
checkPath(1, expectedInternalAddresses)
|
|
|
|
}
|
|
|
|
|
|
|
|
func derivePath(key *hdkeychain.ExtendedKey, path []uint32) (
|
|
|
|
*hdkeychain.ExtendedKey, error) {
|
|
|
|
|
|
|
|
var (
|
|
|
|
currentKey = key
|
|
|
|
err error
|
|
|
|
)
|
|
|
|
for _, pathPart := range path {
|
|
|
|
currentKey, err = currentKey.Derive(pathPart)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return currentKey, nil
|
|
|
|
}
|