Mercurial > hg > bitcoin
view src/test/key_tests.cpp @ 3649:eb986f1e2e93 draft
Ultraprune
This switches bitcoin's transaction/block verification logic to use a
"coin database", which contains all unredeemed transaction output scripts,
amounts and heights.
The name ultraprune comes from the fact that instead of a full transaction
index, we only (need to) keep an index with unspent outputs. For now, the
blocks themselves are kept as usual, although they are only necessary for
serving, rescanning and reorganizing.
The basic datastructures are CCoins (representing the coins of a single
transaction), and CCoinsView (representing a state of the coins database).
There are several implementations for CCoinsView. A dummy, one backed by
the coins database (coins.dat), one backed by the memory pool, and one
that adds a cache on top of it. FetchInputs, ConnectInputs, ConnectBlock,
DisconnectBlock, ... now operate on a generic CCoinsView.
The block switching logic now builds a single cached CCoinsView with
changes to be committed to the database before any changes are made.
This means no uncommitted changes are ever read from the database, and
should ease the transition to another database layer which does not
support transactions (but does support atomic writes), like LevelDB.
For the getrawtransaction() RPC call, access to a txid-to-disk index
would be preferable. As this index is not necessary or even useful
for any other part of the implementation, it is not provided. Instead,
getrawtransaction() uses the coin database to find the block height,
and then scans that block to find the requested transaction. This is
slow, but should suffice for debug purposes.
author | Pieter Wuille <pieter.wuille@gmail.com> |
---|---|
date | Sun, 01 Jul 2012 18:54:00 +0200 (2012-07-01) |
parents | 2c65e5d626eb |
children |
line wrap: on
line source
#include <boost/test/unit_test.hpp> #include <string> #include <vector> #include "key.h" #include "base58.h" #include "uint256.h" #include "util.h" using namespace std; static const string strSecret1 ("5HxWvvfubhXpYYpS3tJkw6fq9jE9j18THftkZjHHfmFiWtmAbrj"); static const string strSecret2 ("5KC4ejrDjv152FGwP386VD1i2NYc5KkfSMyv1nGy1VGDxGHqVY3"); static const string strSecret1C ("Kwr371tjA9u2rFSMZjTNun2PXXP3WPZu2afRHTcta6KxEUdm1vEw"); static const string strSecret2C ("L3Hq7a8FEQwJkW1M2GNKDW28546Vp5miewcCzSqUD9kCAXrJdS3g"); static const CBitcoinAddress addr1 ("1QFqqMUD55ZV3PJEJZtaKCsQmjLT6JkjvJ"); static const CBitcoinAddress addr2 ("1F5y5E5FMc5YzdJtB9hLaUe43GDxEKXENJ"); static const CBitcoinAddress addr1C("1NoJrossxPBKfCHuJXT4HadJrXRE9Fxiqs"); static const CBitcoinAddress addr2C("1CRj2HyM1CXWzHAXLQtiGLyggNT9WQqsDs"); static const string strAddressBad("1HV9Lc3sNHZxwj4Zk6fB38tEmBryq2cBiF"); #ifdef KEY_TESTS_DUMPINFO void dumpKeyInfo(uint256 privkey) { CSecret secret; secret.resize(32); memcpy(&secret[0], &privkey, 32); vector<unsigned char> sec; sec.resize(32); memcpy(&sec[0], &secret[0], 32); printf(" * secret (hex): %s\n", HexStr(sec).c_str()); for (int nCompressed=0; nCompressed<2; nCompressed++) { bool fCompressed = nCompressed == 1; printf(" * %s:\n", fCompressed ? "compressed" : "uncompressed"); CBitcoinSecret bsecret; bsecret.SetSecret(secret, fCompressed); printf(" * secret (base58): %s\n", bsecret.ToString().c_str()); CKey key; key.SetSecret(secret, fCompressed); vector<unsigned char> vchPubKey = key.GetPubKey(); printf(" * pubkey (hex): %s\n", HexStr(vchPubKey).c_str()); printf(" * address (base58): %s\n", CBitcoinAddress(vchPubKey).ToString().c_str()); } } #endif BOOST_AUTO_TEST_SUITE(key_tests) BOOST_AUTO_TEST_CASE(key_test1) { CBitcoinSecret bsecret1, bsecret2, bsecret1C, bsecret2C, baddress1; BOOST_CHECK( bsecret1.SetString (strSecret1)); BOOST_CHECK( bsecret2.SetString (strSecret2)); BOOST_CHECK( bsecret1C.SetString(strSecret1C)); BOOST_CHECK( bsecret2C.SetString(strSecret2C)); BOOST_CHECK(!baddress1.SetString(strAddressBad)); bool fCompressed; CSecret secret1 = bsecret1.GetSecret (fCompressed); BOOST_CHECK(fCompressed == false); CSecret secret2 = bsecret2.GetSecret (fCompressed); BOOST_CHECK(fCompressed == false); CSecret secret1C = bsecret1C.GetSecret(fCompressed); BOOST_CHECK(fCompressed == true); CSecret secret2C = bsecret2C.GetSecret(fCompressed); BOOST_CHECK(fCompressed == true); BOOST_CHECK(secret1 == secret1C); BOOST_CHECK(secret2 == secret2C); CKey key1, key2, key1C, key2C; key1.SetSecret(secret1, false); key2.SetSecret(secret2, false); key1C.SetSecret(secret1, true); key2C.SetSecret(secret2, true); BOOST_CHECK(addr1.Get() == CTxDestination(key1.GetPubKey().GetID())); BOOST_CHECK(addr2.Get() == CTxDestination(key2.GetPubKey().GetID())); BOOST_CHECK(addr1C.Get() == CTxDestination(key1C.GetPubKey().GetID())); BOOST_CHECK(addr2C.Get() == CTxDestination(key2C.GetPubKey().GetID())); for (int n=0; n<16; n++) { string strMsg = strprintf("Very secret message %i: 11", n); uint256 hashMsg = Hash(strMsg.begin(), strMsg.end()); // normal signatures vector<unsigned char> sign1, sign2, sign1C, sign2C; BOOST_CHECK(key1.Sign (hashMsg, sign1)); BOOST_CHECK(key2.Sign (hashMsg, sign2)); BOOST_CHECK(key1C.Sign(hashMsg, sign1C)); BOOST_CHECK(key2C.Sign(hashMsg, sign2C)); BOOST_CHECK( key1.Verify(hashMsg, sign1)); BOOST_CHECK(!key1.Verify(hashMsg, sign2)); BOOST_CHECK( key1.Verify(hashMsg, sign1C)); BOOST_CHECK(!key1.Verify(hashMsg, sign2C)); BOOST_CHECK(!key2.Verify(hashMsg, sign1)); BOOST_CHECK( key2.Verify(hashMsg, sign2)); BOOST_CHECK(!key2.Verify(hashMsg, sign1C)); BOOST_CHECK( key2.Verify(hashMsg, sign2C)); BOOST_CHECK( key1C.Verify(hashMsg, sign1)); BOOST_CHECK(!key1C.Verify(hashMsg, sign2)); BOOST_CHECK( key1C.Verify(hashMsg, sign1C)); BOOST_CHECK(!key1C.Verify(hashMsg, sign2C)); BOOST_CHECK(!key2C.Verify(hashMsg, sign1)); BOOST_CHECK( key2C.Verify(hashMsg, sign2)); BOOST_CHECK(!key2C.Verify(hashMsg, sign1C)); BOOST_CHECK( key2C.Verify(hashMsg, sign2C)); // compact signatures (with key recovery) vector<unsigned char> csign1, csign2, csign1C, csign2C; BOOST_CHECK(key1.SignCompact (hashMsg, csign1)); BOOST_CHECK(key2.SignCompact (hashMsg, csign2)); BOOST_CHECK(key1C.SignCompact(hashMsg, csign1C)); BOOST_CHECK(key2C.SignCompact(hashMsg, csign2C)); CKey rkey1, rkey2, rkey1C, rkey2C; BOOST_CHECK(rkey1.SetCompactSignature (hashMsg, csign1)); BOOST_CHECK(rkey2.SetCompactSignature (hashMsg, csign2)); BOOST_CHECK(rkey1C.SetCompactSignature(hashMsg, csign1C)); BOOST_CHECK(rkey2C.SetCompactSignature(hashMsg, csign2C)); BOOST_CHECK(rkey1.GetPubKey() == key1.GetPubKey()); BOOST_CHECK(rkey2.GetPubKey() == key2.GetPubKey()); BOOST_CHECK(rkey1C.GetPubKey() == key1C.GetPubKey()); BOOST_CHECK(rkey2C.GetPubKey() == key2C.GetPubKey()); } } BOOST_AUTO_TEST_SUITE_END()