Skip to content

Commit 3b40bff

Browse files
committed
Descriptor checksum
1 parent 743c2f4 commit 3b40bff

File tree

6 files changed

+251
-20
lines changed

6 files changed

+251
-20
lines changed

src/script/descriptor.cpp

Lines changed: 141 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,125 @@
2020

2121
namespace {
2222

23+
////////////////////////////////////////////////////////////////////////////
24+
// Checksum //
25+
////////////////////////////////////////////////////////////////////////////
26+
27+
// This section implements a checksum algorithm for descriptors with the
28+
// following properties:
29+
// * Mistakes in a descriptor string are measured in "symbol errors". The higher
30+
// the number of symbol errors, the harder it is to detect:
31+
// * An error substituting a character from 0123456789()[],'/*abcdefgh@:$%{} for
32+
// another in that set always counts as 1 symbol error.
33+
// * Note that hex encoded keys are covered by these characters. Xprvs and
34+
// xpubs use other characters too, but already have their own checksum
35+
// mechanism.
36+
// * Function names like "multi()" use other characters, but mistakes in
37+
// these would generally result in an unparseable descriptor.
38+
// * A case error always counts as 1 symbol error.
39+
// * Any other 1 character substitution error counts as 1 or 2 symbol errors.
40+
// * Any 1 symbol error is always detected.
41+
// * Any 2 or 3 symbol error in a descriptor of up to 49154 characters is always detected.
42+
// * Any 4 symbol error in a descriptor of up to 507 characters is always detected.
43+
// * Any 5 symbol error in a descriptor of up to 77 characters is always detected.
44+
// * Is optimized to minimize the chance a 5 symbol error in a descriptor up to 387 characters is undetected
45+
// * Random errors have a chance of 1 in 2**40 of being undetected.
46+
//
47+
// These properties are achieved by expanding every group of 3 (non checksum) characters into
48+
// 4 GF(32) symbols, over which a cyclic code is defined.
49+
50+
/*
51+
* Interprets c as 8 groups of 5 bits which are the coefficients of a degree 8 polynomial over GF(32),
52+
* multiplies that polynomial by x, computes its remainder modulo a generator, and adds the constant term val.
53+
*
54+
* This generator is G(x) = x^8 + {30}x^7 + {23}x^6 + {15}x^5 + {14}x^4 + {10}x^3 + {6}x^2 + {12}x + {9}.
55+
* It is chosen to define an cyclic error detecting code which is selected by:
56+
* - Starting from all BCH codes over GF(32) of degree 8 and below, which by construction guarantee detecting
57+
* 3 errors in windows up to 19000 symbols.
58+
* - Taking all those generators, and for degree 7 ones, extend them to degree 8 by adding all degree-1 factors.
59+
* - Selecting just the set of generators that guarantee detecting 4 errors in a window of length 512.
60+
* - Selecting one of those with best worst-case behavior for 5 errors in windows of length up to 512.
61+
*
62+
* The generator and the constants to implement it can be verified using this Sage code:
63+
* B = GF(2) # Binary field
64+
* BP.<b> = B[] # Polynomials over the binary field
65+
* F_mod = b**5 + b**3 + 1
66+
* F.<f> = GF(32, modulus=F_mod, repr='int') # GF(32) definition
67+
* FP.<x> = F[] # Polynomials over GF(32)
68+
* E_mod = x**3 + x + F.fetch_int(8)
69+
* E.<e> = F.extension(E_mod) # Extension field definition
70+
* alpha = e**2743 # Choice of an element in extension field
71+
* for p in divisors(E.order() - 1): # Verify alpha has order 32767.
72+
* assert((alpha**p == 1) == (p % 32767 == 0))
73+
* G = lcm([(alpha**i).minpoly() for i in [1056,1057,1058]] + [x + 1])
74+
* print(G) # Print out the generator
75+
* for i in [1,2,4,8,16]: # Print out {1,2,4,8,16}*(G mod x^8), packed in hex integers.
76+
* v = 0
77+
* for coef in reversed((F.fetch_int(i)*(G % x**8)).coefficients(sparse=True)):
78+
* v = v*32 + coef.integer_representation()
79+
* print("0x%x" % v)
80+
*/
81+
uint64_t PolyMod(uint64_t c, int val)
82+
{
83+
uint8_t c0 = c >> 35;
84+
c = ((c & 0x7ffffffff) << 5) ^ val;
85+
if (c0 & 1) c ^= 0xf5dee51989;
86+
if (c0 & 2) c ^= 0xa9fdca3312;
87+
if (c0 & 4) c ^= 0x1bab10e32d;
88+
if (c0 & 8) c ^= 0x3706b1677a;
89+
if (c0 & 16) c ^= 0x644d626ffd;
90+
return c;
91+
}
92+
93+
std::string DescriptorChecksum(const Span<const char>& span)
94+
{
95+
/** A character set designed such that:
96+
* - The most common 'unprotected' descriptor characters (hex, keypaths) are in the first group of 32.
97+
* - Case errors cause an offset that's a multiple of 32.
98+
* - As many alphabetic characters are in the same group (while following the above restrictions).
99+
*
100+
* If p(x) gives the position of a character c in this character set, every group of 3 characters
101+
* (a,b,c) is encoded as the 4 symbols (p(a) & 31, p(b) & 31, p(c) & 31, (p(a) / 32) + 3 * (p(b) / 32) + 9 * (p(c) / 32).
102+
* This means that changes that only affect the lower 5 bits of the position, or only the higher 2 bits, will just
103+
* affect a single symbol.
104+
*
105+
* As a result, within-group-of-32 errors count as 1 symbol, as do cross-group errors that don't affect
106+
* the position within the groups.
107+
*/
108+
static std::string INPUT_CHARSET =
109+
"0123456789()[],'/*abcdefgh@:$%{}"
110+
"IJKLMNOPQRSTUVWXYZ&+-.;<=>?!^_|~"
111+
"ijklmnopqrstuvwxyzABCDEFGH`#\"\\ ";
112+
113+
/** The character set for the checksum itself (same as bech32). */
114+
static std::string CHECKSUM_CHARSET = "qpzry9x8gf2tvdw0s3jn54khce6mua7l";
115+
116+
uint64_t c = 1;
117+
int cls = 0;
118+
int clscount = 0;
119+
for (auto ch : span) {
120+
auto pos = INPUT_CHARSET.find(ch);
121+
if (pos == std::string::npos) return "";
122+
c = PolyMod(c, pos & 31); // Emit a symbol for the position inside the group, for every character.
123+
cls = cls * 3 + (pos >> 5); // Accumulate the group numbers
124+
if (++clscount == 3) {
125+
// Emit an extra symbol representing the group numbers, for every 3 characters.
126+
c = PolyMod(c, cls);
127+
cls = 0;
128+
clscount = 0;
129+
}
130+
}
131+
if (clscount > 0) c = PolyMod(c, cls);
132+
for (int j = 0; j < 8; ++j) c = PolyMod(c, 0); // Shift further to determine the checksum.
133+
c ^= 1; // Prevent appending zeroes from not affecting the checksum.
134+
135+
std::string ret(8, ' ');
136+
for (int j = 0; j < 8; ++j) ret[j] = CHECKSUM_CHARSET[(c >> (5 * (7 - j))) & 31];
137+
return ret;
138+
}
139+
140+
std::string AddChecksum(const std::string& str) { return str + "#" + DescriptorChecksum(MakeSpan(str)); }
141+
23142
////////////////////////////////////////////////////////////////////////////
24143
// Internal representation //
25144
////////////////////////////////////////////////////////////////////////////
@@ -273,10 +392,15 @@ class DescriptorImpl : public Descriptor
273392
{
274393
std::string ret;
275394
ToStringHelper(nullptr, ret, false);
276-
return ret;
395+
return AddChecksum(ret);
277396
}
278397

279-
bool ToPrivateString(const SigningProvider& arg, std::string& out) const override final { return ToStringHelper(&arg, out, true); }
398+
bool ToPrivateString(const SigningProvider& arg, std::string& out) const override final
399+
{
400+
bool ret = ToStringHelper(&arg, out, true);
401+
out = AddChecksum(out);
402+
return ret;
403+
}
280404

281405
bool ExpandHelper(int pos, const SigningProvider& arg, Span<const unsigned char>* cache_read, std::vector<CScript>& output_scripts, FlatSigningProvider& out, std::vector<unsigned char>* cache_write) const
282406
{
@@ -751,11 +875,25 @@ std::unique_ptr<DescriptorImpl> InferScript(const CScript& script, ParseScriptCo
751875
return MakeUnique<RawDescriptor>(script);
752876
}
753877

878+
754879
} // namespace
755880

756-
std::unique_ptr<Descriptor> Parse(const std::string& descriptor, FlatSigningProvider& out)
881+
std::unique_ptr<Descriptor> Parse(const std::string& descriptor, FlatSigningProvider& out, bool require_checksum)
757882
{
758883
Span<const char> sp(descriptor.data(), descriptor.size());
884+
885+
// Checksum checks
886+
auto check_split = Split(sp, '#');
887+
if (check_split.size() > 2) return nullptr; // Multiple '#' symbols
888+
if (check_split.size() == 1 && require_checksum) return nullptr; // Missing checksum
889+
if (check_split.size() == 2) {
890+
if (check_split[1].size() != 8) return nullptr; // Unexpected length for checksum
891+
auto checksum = DescriptorChecksum(check_split[0]);
892+
if (checksum.empty()) return nullptr; // Invalid characters in payload
893+
if (!std::equal(checksum.begin(), checksum.end(), check_split[1].begin())) return nullptr; // Checksum mismatch
894+
}
895+
sp = check_split[0];
896+
759897
auto ret = ParseScript(sp, ParseScriptContext::TOP, out);
760898
if (sp.size() == 0 && ret) return std::unique_ptr<Descriptor>(std::move(ret));
761899
return nullptr;

src/script/descriptor.h

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,8 +62,15 @@ struct Descriptor {
6262
virtual bool ExpandFromCache(int pos, const std::vector<unsigned char>& cache, std::vector<CScript>& output_scripts, FlatSigningProvider& out) const = 0;
6363
};
6464

65-
/** Parse a descriptor string. Included private keys are put in out. Returns nullptr if parsing fails. */
66-
std::unique_ptr<Descriptor> Parse(const std::string& descriptor, FlatSigningProvider& out);
65+
/** Parse a descriptor string. Included private keys are put in out.
66+
*
67+
* If the descriptor has a checksum, it must be valid. If require_checksum
68+
* is set, the checksum is mandatory - otherwise it is optional.
69+
*
70+
* If a parse error occurs, or the checksum is missing/invalid, or anything
71+
* else is wrong, nullptr is returned.
72+
*/
73+
std::unique_ptr<Descriptor> Parse(const std::string& descriptor, FlatSigningProvider& out, bool require_checksum = false);
6774

6875
/** Find a descriptor for the specified script, using information from provider where possible.
6976
*

src/test/descriptor_tests.cpp

Lines changed: 28 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,8 @@ void CheckUnparsable(const std::string& prv, const std::string& pub)
1818
FlatSigningProvider keys_priv, keys_pub;
1919
auto parse_priv = Parse(prv, keys_priv);
2020
auto parse_pub = Parse(pub, keys_pub);
21-
BOOST_CHECK(!parse_priv);
22-
BOOST_CHECK(!parse_pub);
21+
BOOST_CHECK_MESSAGE(!parse_priv, prv);
22+
BOOST_CHECK_MESSAGE(!parse_pub, pub);
2323
}
2424

2525
constexpr int DEFAULT = 0;
@@ -28,13 +28,26 @@ constexpr int HARDENED = 2; // Derivation needs access to private keys
2828
constexpr int UNSOLVABLE = 4; // This descriptor is not expected to be solvable
2929
constexpr int SIGNABLE = 8; // We can sign with this descriptor (this is not true when actual BIP32 derivation is used, as that's not integrated in our signing code)
3030

31+
/** Compare two descriptors. If only one of them has a checksum, the checksum is ignored. */
32+
bool EqualDescriptor(std::string a, std::string b)
33+
{
34+
bool a_check = (a.size() > 9 && a[a.size() - 9] == '#');
35+
bool b_check = (b.size() > 9 && b[b.size() - 9] == '#');
36+
if (a_check != b_check) {
37+
if (a_check) a = a.substr(0, a.size() - 9);
38+
if (b_check) b = b.substr(0, b.size() - 9);
39+
}
40+
return a == b;
41+
}
42+
3143
std::string MaybeUseHInsteadOfApostrophy(std::string ret)
3244
{
3345
if (InsecureRandBool()) {
3446
while (true) {
3547
auto it = ret.find("'");
3648
if (it != std::string::npos) {
3749
ret[it] = 'h';
50+
if (ret.size() > 9 && ret[ret.size() - 9] == '#') ret = ret.substr(0, ret.size() - 9); // Changing apostrophe to h breaks the checksum
3851
} else {
3952
break;
4053
}
@@ -63,16 +76,16 @@ void Check(const std::string& prv, const std::string& pub, int flags, const std:
6376
// Check that both versions serialize back to the public version.
6477
std::string pub1 = parse_priv->ToString();
6578
std::string pub2 = parse_pub->ToString();
66-
BOOST_CHECK_EQUAL(pub, pub1);
67-
BOOST_CHECK_EQUAL(pub, pub2);
79+
BOOST_CHECK(EqualDescriptor(pub, pub1));
80+
BOOST_CHECK(EqualDescriptor(pub, pub2));
6881

6982
// Check that both can be serialized with private key back to the private version, but not without private key.
7083
std::string prv1;
7184
BOOST_CHECK(parse_priv->ToPrivateString(keys_priv, prv1));
72-
BOOST_CHECK_EQUAL(prv, prv1);
85+
BOOST_CHECK(EqualDescriptor(prv, prv1));
7386
BOOST_CHECK(!parse_priv->ToPrivateString(keys_pub, prv1));
7487
BOOST_CHECK(parse_pub->ToPrivateString(keys_priv, prv1));
75-
BOOST_CHECK_EQUAL(prv, prv1);
88+
BOOST_CHECK(EqualDescriptor(prv, prv1));
7689
BOOST_CHECK(!parse_pub->ToPrivateString(keys_pub, prv1));
7790

7891
// Check whether IsRange on both returns the expected result
@@ -210,6 +223,15 @@ BOOST_AUTO_TEST_CASE(descriptor_test)
210223
CheckUnparsable("wsh(sh(pk(L4rK1yDtCWekvXuE6oXD9jCYfFNV2cWRpVuPLBcCU2z8TrisoyY1)))", "wsh(sh(pk(03a34b99f22c790c4e36b2b3c2c35a36db06226e41c692fc82b8b56ac1c540c5bd)))"); // Cannot embed P2SH inside P2WSH
211224
CheckUnparsable("sh(sh(pk(L4rK1yDtCWekvXuE6oXD9jCYfFNV2cWRpVuPLBcCU2z8TrisoyY1)))", "sh(sh(pk(03a34b99f22c790c4e36b2b3c2c35a36db06226e41c692fc82b8b56ac1c540c5bd)))"); // Cannot embed P2SH inside P2SH
212225
CheckUnparsable("wsh(wsh(pk(L4rK1yDtCWekvXuE6oXD9jCYfFNV2cWRpVuPLBcCU2z8TrisoyY1)))", "wsh(wsh(pk(03a34b99f22c790c4e36b2b3c2c35a36db06226e41c692fc82b8b56ac1c540c5bd)))"); // Cannot embed P2WSH inside P2WSH
226+
227+
// Checksums
228+
Check("sh(multi(2,[00000000/111'/222]xprvA1RpRA33e1JQ7ifknakTFpgNXPmW2YvmhqLQYMmrj4xJXXWYpDPS3xz7iAxn8L39njGVyuoseXzU6rcxFLJ8HFsTjSyQbLYnMpCqE2VbFWc,xprv9uPDJpEQgRQfDcW7BkF7eTya6RPxXeJCqCJGHuCJ4GiRVLzkTXBAJMu2qaMWPrS7AANYqdq6vcBcBUdJCVVFceUvJFjaPdGZ2y9WACViL4L/0))#ggrsrxfy", "sh(multi(2,[00000000/111'/222]xpub6ERApfZwUNrhLCkDtcHTcxd75RbzS1ed54G1LkBUHQVHQKqhMkhgbmJbZRkrgZw4koxb5JaHWkY4ALHY2grBGRjaDMzQLcgJvLJuZZvRcEL,xpub68NZiKmJWnxxS6aaHmn81bvJeTESw724CRDs6HbuccFQN9Ku14VQrADWgqbhhTHBaohPX4CjNLf9fq9MYo6oDaPPLPxSb7gwQN3ih19Zm4Y/0))#tjg09x5t", DEFAULT, {{"a91445a9a622a8b0a1269944be477640eedc447bbd8487"}}, {{0x8000006FUL,222},{0}});
229+
Check("sh(multi(2,[00000000/111'/222]xprvA1RpRA33e1JQ7ifknakTFpgNXPmW2YvmhqLQYMmrj4xJXXWYpDPS3xz7iAxn8L39njGVyuoseXzU6rcxFLJ8HFsTjSyQbLYnMpCqE2VbFWc,xprv9uPDJpEQgRQfDcW7BkF7eTya6RPxXeJCqCJGHuCJ4GiRVLzkTXBAJMu2qaMWPrS7AANYqdq6vcBcBUdJCVVFceUvJFjaPdGZ2y9WACViL4L/0))", "sh(multi(2,[00000000/111'/222]xpub6ERApfZwUNrhLCkDtcHTcxd75RbzS1ed54G1LkBUHQVHQKqhMkhgbmJbZRkrgZw4koxb5JaHWkY4ALHY2grBGRjaDMzQLcgJvLJuZZvRcEL,xpub68NZiKmJWnxxS6aaHmn81bvJeTESw724CRDs6HbuccFQN9Ku14VQrADWgqbhhTHBaohPX4CjNLf9fq9MYo6oDaPPLPxSb7gwQN3ih19Zm4Y/0))", DEFAULT, {{"a91445a9a622a8b0a1269944be477640eedc447bbd8487"}}, {{0x8000006FUL,222},{0}});
230+
CheckUnparsable("sh(multi(2,[00000000/111'/222]xprvA1RpRA33e1JQ7ifknakTFpgNXPmW2YvmhqLQYMmrj4xJXXWYpDPS3xz7iAxn8L39njGVyuoseXzU6rcxFLJ8HFsTjSyQbLYnMpCqE2VbFWc,xprv9uPDJpEQgRQfDcW7BkF7eTya6RPxXeJCqCJGHuCJ4GiRVLzkTXBAJMu2qaMWPrS7AANYqdq6vcBcBUdJCVVFceUvJFjaPdGZ2y9WACViL4L/0))#", "sh(multi(2,[00000000/111'/222]xpub6ERApfZwUNrhLCkDtcHTcxd75RbzS1ed54G1LkBUHQVHQKqhMkhgbmJbZRkrgZw4koxb5JaHWkY4ALHY2grBGRjaDMzQLcgJvLJuZZvRcEL,xpub68NZiKmJWnxxS6aaHmn81bvJeTESw724CRDs6HbuccFQN9Ku14VQrADWgqbhhTHBaohPX4CjNLf9fq9MYo6oDaPPLPxSb7gwQN3ih19Zm4Y/0))#"); // Empty checksum
231+
CheckUnparsable("sh(multi(2,[00000000/111'/222]xprvA1RpRA33e1JQ7ifknakTFpgNXPmW2YvmhqLQYMmrj4xJXXWYpDPS3xz7iAxn8L39njGVyuoseXzU6rcxFLJ8HFsTjSyQbLYnMpCqE2VbFWc,xprv9uPDJpEQgRQfDcW7BkF7eTya6RPxXeJCqCJGHuCJ4GiRVLzkTXBAJMu2qaMWPrS7AANYqdq6vcBcBUdJCVVFceUvJFjaPdGZ2y9WACViL4L/0))#ggrsrxfyq", "sh(multi(2,[00000000/111'/222]xpub6ERApfZwUNrhLCkDtcHTcxd75RbzS1ed54G1LkBUHQVHQKqhMkhgbmJbZRkrgZw4koxb5JaHWkY4ALHY2grBGRjaDMzQLcgJvLJuZZvRcEL,xpub68NZiKmJWnxxS6aaHmn81bvJeTESw724CRDs6HbuccFQN9Ku14VQrADWgqbhhTHBaohPX4CjNLf9fq9MYo6oDaPPLPxSb7gwQN3ih19Zm4Y/0))#tjg09x5tq"); // Too long checksum
232+
CheckUnparsable("sh(multi(2,[00000000/111'/222]xprvA1RpRA33e1JQ7ifknakTFpgNXPmW2YvmhqLQYMmrj4xJXXWYpDPS3xz7iAxn8L39njGVyuoseXzU6rcxFLJ8HFsTjSyQbLYnMpCqE2VbFWc,xprv9uPDJpEQgRQfDcW7BkF7eTya6RPxXeJCqCJGHuCJ4GiRVLzkTXBAJMu2qaMWPrS7AANYqdq6vcBcBUdJCVVFceUvJFjaPdGZ2y9WACViL4L/0))#ggrsrxf", "sh(multi(2,[00000000/111'/222]xpub6ERApfZwUNrhLCkDtcHTcxd75RbzS1ed54G1LkBUHQVHQKqhMkhgbmJbZRkrgZw4koxb5JaHWkY4ALHY2grBGRjaDMzQLcgJvLJuZZvRcEL,xpub68NZiKmJWnxxS6aaHmn81bvJeTESw724CRDs6HbuccFQN9Ku14VQrADWgqbhhTHBaohPX4CjNLf9fq9MYo6oDaPPLPxSb7gwQN3ih19Zm4Y/0))#tjg09x5"); // Too short checksum
233+
CheckUnparsable("sh(multi(3,[00000000/111'/222]xprvA1RpRA33e1JQ7ifknakTFpgNXPmW2YvmhqLQYMmrj4xJXXWYpDPS3xz7iAxn8L39njGVyuoseXzU6rcxFLJ8HFsTjSyQbLYnMpCqE2VbFWc,xprv9uPDJpEQgRQfDcW7BkF7eTya6RPxXeJCqCJGHuCJ4GiRVLzkTXBAJMu2qaMWPrS7AANYqdq6vcBcBUdJCVVFceUvJFjaPdGZ2y9WACViL4L/0))#ggrsrxfy", "sh(multi(3,[00000000/111'/222]xpub6ERApfZwUNrhLCkDtcHTcxd75RbzS1ed54G1LkBUHQVHQKqhMkhgbmJbZRkrgZw4koxb5JaHWkY4ALHY2grBGRjaDMzQLcgJvLJuZZvRcEL,xpub68NZiKmJWnxxS6aaHmn81bvJeTESw724CRDs6HbuccFQN9Ku14VQrADWgqbhhTHBaohPX4CjNLf9fq9MYo6oDaPPLPxSb7gwQN3ih19Zm4Y/0))#tjg09x5t"); // Error in payload
234+
CheckUnparsable("sh(multi(2,[00000000/111'/222]xprvA1RpRA33e1JQ7ifknakTFpgNXPmW2YvmhqLQYMmrj4xJXXWYpDPS3xz7iAxn8L39njGVyuoseXzU6rcxFLJ8HFsTjSyQbLYnMpCqE2VbFWc,xprv9uPDJpEQgRQfDcW7BkF7eTya6RPxXeJCqCJGHuCJ4GiRVLzkTXBAJMu2qaMWPrS7AANYqdq6vcBcBUdJCVVFceUvJFjaPdGZ2y9WACViL4L/0))#ggssrxfy", "sh(multi(2,[00000000/111'/222]xpub6ERApfZwUNrhLCkDtcHTcxd75RbzS1ed54G1LkBUHQVHQKqhMkhgbmJbZRkrgZw4koxb5JaHWkY4ALHY2grBGRjaDMzQLcgJvLJuZZvRcEL,xpub68NZiKmJWnxxS6aaHmn81bvJeTESw724CRDs6HbuccFQN9Ku14VQrADWgqbhhTHBaohPX4CjNLf9fq9MYo6oDaPPLPxSb7gwQN3ih19Zm4Y/0))#tjq09x4t"); // Error in checksum
213235
}
214236

215237
BOOST_AUTO_TEST_SUITE_END()

test/functional/rpc_scantxoutset.py

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -97,9 +97,9 @@ def run_test(self):
9797
assert_equal(self.nodes[0].scantxoutset("start", [ {"desc": "combo(tpubD6NzVbkrYhZ4WaWSyoBvQwbpLkojyoTZPRsgXELWz3Popb3qkjcJyJUGLnL4qHHoQvao8ESaAstxYSnhyswJ76uZPStJRJCTKvosUCJZL5B/1/1/*)", "range": 1500}])['total_amount'], Decimal("28.672"))
9898

9999
# Test the reported descriptors for a few matches
100-
assert_equal(descriptors(self.nodes[0].scantxoutset("start", [ {"desc": "combo(tprv8ZgxMBicQKsPd7Uf69XL1XwhmjHopUGep8GuEiJDZmbQz6o58LninorQAfcKZWARbtRtfnLcJ5MQ2AtHcQJCCRUcMRvmDUjyEmNUWwx8UbK/0h/0'/*)", "range": 1499}])), ["pkh([0c5f9a1e/0'/0'/0]026dbd8b2315f296d36e6b6920b1579ca75569464875c7ebe869b536a7d9503c8c)", "pkh([0c5f9a1e/0'/0'/1]033e6f25d76c00bedb3a8993c7d5739ee806397f0529b1b31dda31ef890f19a60c)"])
101-
assert_equal(descriptors(self.nodes[0].scantxoutset("start", [ "combo(tprv8ZgxMBicQKsPd7Uf69XL1XwhmjHopUGep8GuEiJDZmbQz6o58LninorQAfcKZWARbtRtfnLcJ5MQ2AtHcQJCCRUcMRvmDUjyEmNUWwx8UbK/1/1/0)"])), ["pkh([0c5f9a1e/1/1/0]03e1c5b6e650966971d7e71ef2674f80222752740fc1dfd63bbbd220d2da9bd0fb)"])
102-
assert_equal(descriptors(self.nodes[0].scantxoutset("start", [ {"desc": "combo(tpubD6NzVbkrYhZ4WaWSyoBvQwbpLkojyoTZPRsgXELWz3Popb3qkjcJyJUGLnL4qHHoQvao8ESaAstxYSnhyswJ76uZPStJRJCTKvosUCJZL5B/1/1/*)", "range": 1500}])), ['pkh([0c5f9a1e/1/1/0]03e1c5b6e650966971d7e71ef2674f80222752740fc1dfd63bbbd220d2da9bd0fb)', 'pkh([0c5f9a1e/1/1/1500]03832901c250025da2aebae2bfb38d5c703a57ab66ad477f9c578bfbcd78abca6f)', 'pkh([0c5f9a1e/1/1/1]030d820fc9e8211c4169be8530efbc632775d8286167afd178caaf1089b77daba7)'])
100+
assert_equal(descriptors(self.nodes[0].scantxoutset("start", [ {"desc": "combo(tprv8ZgxMBicQKsPd7Uf69XL1XwhmjHopUGep8GuEiJDZmbQz6o58LninorQAfcKZWARbtRtfnLcJ5MQ2AtHcQJCCRUcMRvmDUjyEmNUWwx8UbK/0h/0'/*)", "range": 1499}])), ["pkh([0c5f9a1e/0'/0'/0]026dbd8b2315f296d36e6b6920b1579ca75569464875c7ebe869b536a7d9503c8c)#dzxw429x", "pkh([0c5f9a1e/0'/0'/1]033e6f25d76c00bedb3a8993c7d5739ee806397f0529b1b31dda31ef890f19a60c)#43rvceed"])
101+
assert_equal(descriptors(self.nodes[0].scantxoutset("start", [ "combo(tprv8ZgxMBicQKsPd7Uf69XL1XwhmjHopUGep8GuEiJDZmbQz6o58LninorQAfcKZWARbtRtfnLcJ5MQ2AtHcQJCCRUcMRvmDUjyEmNUWwx8UbK/1/1/0)"])), ["pkh([0c5f9a1e/1/1/0]03e1c5b6e650966971d7e71ef2674f80222752740fc1dfd63bbbd220d2da9bd0fb)#cxmct4w8"])
102+
assert_equal(descriptors(self.nodes[0].scantxoutset("start", [ {"desc": "combo(tpubD6NzVbkrYhZ4WaWSyoBvQwbpLkojyoTZPRsgXELWz3Popb3qkjcJyJUGLnL4qHHoQvao8ESaAstxYSnhyswJ76uZPStJRJCTKvosUCJZL5B/1/1/*)", "range": 1500}])), ['pkh([0c5f9a1e/1/1/0]03e1c5b6e650966971d7e71ef2674f80222752740fc1dfd63bbbd220d2da9bd0fb)#cxmct4w8', 'pkh([0c5f9a1e/1/1/1500]03832901c250025da2aebae2bfb38d5c703a57ab66ad477f9c578bfbcd78abca6f)#vchwd07g', 'pkh([0c5f9a1e/1/1/1]030d820fc9e8211c4169be8530efbc632775d8286167afd178caaf1089b77daba7)#z2t3ypsa'])
103103

104104
if __name__ == '__main__':
105105
ScantxoutsetTest().main()

0 commit comments

Comments
 (0)