Split JoinSplit proof verification out of CheckTransaction.
This commit is contained in:
parent
cea9f58791
commit
948d4e6c10
|
@ -30,9 +30,8 @@ private:
|
||||||
std::string strRejectReason;
|
std::string strRejectReason;
|
||||||
unsigned char chRejectCode;
|
unsigned char chRejectCode;
|
||||||
bool corruptionPossible;
|
bool corruptionPossible;
|
||||||
bool pourVerify;
|
|
||||||
public:
|
public:
|
||||||
CValidationState() : mode(MODE_VALID), nDoS(0), chRejectCode(0), corruptionPossible(false), pourVerify(true) {}
|
CValidationState() : mode(MODE_VALID), nDoS(0), chRejectCode(0), corruptionPossible(false) {}
|
||||||
virtual bool DoS(int level, bool ret = false,
|
virtual bool DoS(int level, bool ret = false,
|
||||||
unsigned char chRejectCodeIn=0, std::string strRejectReasonIn="",
|
unsigned char chRejectCodeIn=0, std::string strRejectReasonIn="",
|
||||||
bool corruptionIn=false) {
|
bool corruptionIn=false) {
|
||||||
|
@ -45,12 +44,6 @@ public:
|
||||||
mode = MODE_INVALID;
|
mode = MODE_INVALID;
|
||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
virtual bool SetPerformPourVerification(bool pourVerifyIn) {
|
|
||||||
pourVerify = pourVerifyIn;
|
|
||||||
}
|
|
||||||
virtual bool PerformPourVerification() {
|
|
||||||
return pourVerify;
|
|
||||||
}
|
|
||||||
virtual bool Invalid(bool ret = false,
|
virtual bool Invalid(bool ret = false,
|
||||||
unsigned char _chRejectCode=0, std::string _strRejectReason="") {
|
unsigned char _chRejectCode=0, std::string _strRejectReason="") {
|
||||||
return DoS(0, ret, _chRejectCode, _strRejectReason);
|
return DoS(0, ret, _chRejectCode, _strRejectReason);
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
#include <gtest/gtest.h>
|
#include <gtest/gtest.h>
|
||||||
#include <gmock/gmock.h>
|
#include <gmock/gmock.h>
|
||||||
|
#include <sodium.h>
|
||||||
|
|
||||||
#include "main.h"
|
#include "main.h"
|
||||||
#include "primitives/transaction.h"
|
#include "primitives/transaction.h"
|
||||||
|
@ -13,7 +14,6 @@ TEST(checktransaction_tests, check_vpub_not_both_nonzero) {
|
||||||
// Ensure that values within the pour are well-formed.
|
// Ensure that values within the pour are well-formed.
|
||||||
CMutableTransaction newTx(tx);
|
CMutableTransaction newTx(tx);
|
||||||
CValidationState state;
|
CValidationState state;
|
||||||
state.SetPerformPourVerification(false); // don't verify the snark
|
|
||||||
|
|
||||||
newTx.vpour.push_back(CPourTx());
|
newTx.vpour.push_back(CPourTx());
|
||||||
|
|
||||||
|
@ -21,7 +21,7 @@ TEST(checktransaction_tests, check_vpub_not_both_nonzero) {
|
||||||
pourtx->vpub_old = 1;
|
pourtx->vpub_old = 1;
|
||||||
pourtx->vpub_new = 1;
|
pourtx->vpub_new = 1;
|
||||||
|
|
||||||
EXPECT_FALSE(CheckTransaction(newTx, state));
|
EXPECT_FALSE(CheckTransactionWithoutProofVerification(newTx, state));
|
||||||
EXPECT_EQ(state.GetRejectReason(), "bad-txns-vpubs-both-nonzero");
|
EXPECT_EQ(state.GetRejectReason(), "bad-txns-vpubs-both-nonzero");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -31,8 +31,6 @@ public:
|
||||||
MOCK_METHOD5(DoS, bool(int level, bool ret,
|
MOCK_METHOD5(DoS, bool(int level, bool ret,
|
||||||
unsigned char chRejectCodeIn, std::string strRejectReasonIn,
|
unsigned char chRejectCodeIn, std::string strRejectReasonIn,
|
||||||
bool corruptionIn));
|
bool corruptionIn));
|
||||||
MOCK_METHOD1(SetPerformPourVerification, bool(bool pourVerifyIn));
|
|
||||||
MOCK_METHOD0(PerformPourVerification, bool());
|
|
||||||
MOCK_METHOD3(Invalid, bool(bool ret,
|
MOCK_METHOD3(Invalid, bool(bool ret,
|
||||||
unsigned char _chRejectCode, std::string _strRejectReason));
|
unsigned char _chRejectCode, std::string _strRejectReason));
|
||||||
MOCK_METHOD1(Error, bool(std::string strRejectReasonIn));
|
MOCK_METHOD1(Error, bool(std::string strRejectReasonIn));
|
||||||
|
@ -62,6 +60,30 @@ CMutableTransaction GetValidTransaction() {
|
||||||
mtx.vpour[0].serials.at(1) = uint256S("0000000000000000000000000000000000000000000000000000000000000001");
|
mtx.vpour[0].serials.at(1) = uint256S("0000000000000000000000000000000000000000000000000000000000000001");
|
||||||
mtx.vpour[1].serials.at(0) = uint256S("0000000000000000000000000000000000000000000000000000000000000002");
|
mtx.vpour[1].serials.at(0) = uint256S("0000000000000000000000000000000000000000000000000000000000000002");
|
||||||
mtx.vpour[1].serials.at(1) = uint256S("0000000000000000000000000000000000000000000000000000000000000003");
|
mtx.vpour[1].serials.at(1) = uint256S("0000000000000000000000000000000000000000000000000000000000000003");
|
||||||
|
|
||||||
|
|
||||||
|
// Generate an ephemeral keypair.
|
||||||
|
uint256 joinSplitPubKey;
|
||||||
|
unsigned char joinSplitPrivKey[crypto_sign_SECRETKEYBYTES];
|
||||||
|
crypto_sign_keypair(joinSplitPubKey.begin(), joinSplitPrivKey);
|
||||||
|
mtx.joinSplitPubKey = joinSplitPubKey;
|
||||||
|
|
||||||
|
// Compute the correct hSig.
|
||||||
|
// TODO: #966.
|
||||||
|
static const uint256 one(uint256S("0000000000000000000000000000000000000000000000000000000000000001"));
|
||||||
|
// Empty output script.
|
||||||
|
CScript scriptCode;
|
||||||
|
CTransaction signTx(mtx);
|
||||||
|
uint256 dataToBeSigned = SignatureHash(scriptCode, signTx, NOT_AN_INPUT, SIGHASH_ALL);
|
||||||
|
if (dataToBeSigned == one) {
|
||||||
|
throw std::runtime_error("SignatureHash failed");
|
||||||
|
}
|
||||||
|
|
||||||
|
// Add the signature
|
||||||
|
assert(crypto_sign_detached(&mtx.joinSplitSig[0], NULL,
|
||||||
|
dataToBeSigned.begin(), 32,
|
||||||
|
joinSplitPrivKey
|
||||||
|
) == 0);
|
||||||
return mtx;
|
return mtx;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -69,7 +91,7 @@ TEST(checktransaction_tests, valid_transaction) {
|
||||||
CMutableTransaction mtx = GetValidTransaction();
|
CMutableTransaction mtx = GetValidTransaction();
|
||||||
CTransaction tx(mtx);
|
CTransaction tx(mtx);
|
||||||
MockCValidationState state;
|
MockCValidationState state;
|
||||||
EXPECT_TRUE(CheckTransaction(tx, state));
|
EXPECT_TRUE(CheckTransactionWithoutProofVerification(tx, state));
|
||||||
}
|
}
|
||||||
|
|
||||||
TEST(checktransaction_tests, bad_txns_vin_empty) {
|
TEST(checktransaction_tests, bad_txns_vin_empty) {
|
||||||
|
@ -80,7 +102,7 @@ TEST(checktransaction_tests, bad_txns_vin_empty) {
|
||||||
CTransaction tx(mtx);
|
CTransaction tx(mtx);
|
||||||
MockCValidationState state;
|
MockCValidationState state;
|
||||||
EXPECT_CALL(state, DoS(10, false, REJECT_INVALID, "bad-txns-vin-empty", false)).Times(1);
|
EXPECT_CALL(state, DoS(10, false, REJECT_INVALID, "bad-txns-vin-empty", false)).Times(1);
|
||||||
CheckTransaction(tx, state);
|
CheckTransactionWithoutProofVerification(tx, state);
|
||||||
}
|
}
|
||||||
|
|
||||||
TEST(checktransaction_tests, bad_txns_vout_empty) {
|
TEST(checktransaction_tests, bad_txns_vout_empty) {
|
||||||
|
@ -92,7 +114,7 @@ TEST(checktransaction_tests, bad_txns_vout_empty) {
|
||||||
|
|
||||||
MockCValidationState state;
|
MockCValidationState state;
|
||||||
EXPECT_CALL(state, DoS(10, false, REJECT_INVALID, "bad-txns-vout-empty", false)).Times(1);
|
EXPECT_CALL(state, DoS(10, false, REJECT_INVALID, "bad-txns-vout-empty", false)).Times(1);
|
||||||
CheckTransaction(tx, state);
|
CheckTransactionWithoutProofVerification(tx, state);
|
||||||
}
|
}
|
||||||
|
|
||||||
TEST(checktransaction_tests, bad_txns_oversize) {
|
TEST(checktransaction_tests, bad_txns_oversize) {
|
||||||
|
@ -109,7 +131,7 @@ TEST(checktransaction_tests, bad_txns_oversize) {
|
||||||
|
|
||||||
MockCValidationState state;
|
MockCValidationState state;
|
||||||
EXPECT_CALL(state, DoS(100, false, REJECT_INVALID, "bad-txns-oversize", false)).Times(1);
|
EXPECT_CALL(state, DoS(100, false, REJECT_INVALID, "bad-txns-oversize", false)).Times(1);
|
||||||
CheckTransaction(tx, state);
|
CheckTransactionWithoutProofVerification(tx, state);
|
||||||
}
|
}
|
||||||
|
|
||||||
TEST(checktransaction_tests, bad_txns_vout_negative) {
|
TEST(checktransaction_tests, bad_txns_vout_negative) {
|
||||||
|
@ -120,7 +142,7 @@ TEST(checktransaction_tests, bad_txns_vout_negative) {
|
||||||
|
|
||||||
MockCValidationState state;
|
MockCValidationState state;
|
||||||
EXPECT_CALL(state, DoS(100, false, REJECT_INVALID, "bad-txns-vout-negative", false)).Times(1);
|
EXPECT_CALL(state, DoS(100, false, REJECT_INVALID, "bad-txns-vout-negative", false)).Times(1);
|
||||||
CheckTransaction(tx, state);
|
CheckTransactionWithoutProofVerification(tx, state);
|
||||||
}
|
}
|
||||||
|
|
||||||
TEST(checktransaction_tests, bad_txns_vout_toolarge) {
|
TEST(checktransaction_tests, bad_txns_vout_toolarge) {
|
||||||
|
@ -131,7 +153,7 @@ TEST(checktransaction_tests, bad_txns_vout_toolarge) {
|
||||||
|
|
||||||
MockCValidationState state;
|
MockCValidationState state;
|
||||||
EXPECT_CALL(state, DoS(100, false, REJECT_INVALID, "bad-txns-vout-toolarge", false)).Times(1);
|
EXPECT_CALL(state, DoS(100, false, REJECT_INVALID, "bad-txns-vout-toolarge", false)).Times(1);
|
||||||
CheckTransaction(tx, state);
|
CheckTransactionWithoutProofVerification(tx, state);
|
||||||
}
|
}
|
||||||
|
|
||||||
TEST(checktransaction_tests, bad_txns_txouttotal_toolarge_outputs) {
|
TEST(checktransaction_tests, bad_txns_txouttotal_toolarge_outputs) {
|
||||||
|
@ -143,7 +165,7 @@ TEST(checktransaction_tests, bad_txns_txouttotal_toolarge_outputs) {
|
||||||
|
|
||||||
MockCValidationState state;
|
MockCValidationState state;
|
||||||
EXPECT_CALL(state, DoS(100, false, REJECT_INVALID, "bad-txns-txouttotal-toolarge", false)).Times(1);
|
EXPECT_CALL(state, DoS(100, false, REJECT_INVALID, "bad-txns-txouttotal-toolarge", false)).Times(1);
|
||||||
CheckTransaction(tx, state);
|
CheckTransactionWithoutProofVerification(tx, state);
|
||||||
}
|
}
|
||||||
|
|
||||||
TEST(checktransaction_tests, bad_txns_txouttotal_toolarge_joinsplit) {
|
TEST(checktransaction_tests, bad_txns_txouttotal_toolarge_joinsplit) {
|
||||||
|
@ -155,7 +177,7 @@ TEST(checktransaction_tests, bad_txns_txouttotal_toolarge_joinsplit) {
|
||||||
|
|
||||||
MockCValidationState state;
|
MockCValidationState state;
|
||||||
EXPECT_CALL(state, DoS(100, false, REJECT_INVALID, "bad-txns-txouttotal-toolarge", false)).Times(1);
|
EXPECT_CALL(state, DoS(100, false, REJECT_INVALID, "bad-txns-txouttotal-toolarge", false)).Times(1);
|
||||||
CheckTransaction(tx, state);
|
CheckTransactionWithoutProofVerification(tx, state);
|
||||||
}
|
}
|
||||||
|
|
||||||
TEST(checktransaction_tests, bad_txns_vpub_old_negative) {
|
TEST(checktransaction_tests, bad_txns_vpub_old_negative) {
|
||||||
|
@ -166,7 +188,7 @@ TEST(checktransaction_tests, bad_txns_vpub_old_negative) {
|
||||||
|
|
||||||
MockCValidationState state;
|
MockCValidationState state;
|
||||||
EXPECT_CALL(state, DoS(100, false, REJECT_INVALID, "bad-txns-vpub_old-negative", false)).Times(1);
|
EXPECT_CALL(state, DoS(100, false, REJECT_INVALID, "bad-txns-vpub_old-negative", false)).Times(1);
|
||||||
CheckTransaction(tx, state);
|
CheckTransactionWithoutProofVerification(tx, state);
|
||||||
}
|
}
|
||||||
|
|
||||||
TEST(checktransaction_tests, bad_txns_vpub_new_negative) {
|
TEST(checktransaction_tests, bad_txns_vpub_new_negative) {
|
||||||
|
@ -177,7 +199,7 @@ TEST(checktransaction_tests, bad_txns_vpub_new_negative) {
|
||||||
|
|
||||||
MockCValidationState state;
|
MockCValidationState state;
|
||||||
EXPECT_CALL(state, DoS(100, false, REJECT_INVALID, "bad-txns-vpub_new-negative", false)).Times(1);
|
EXPECT_CALL(state, DoS(100, false, REJECT_INVALID, "bad-txns-vpub_new-negative", false)).Times(1);
|
||||||
CheckTransaction(tx, state);
|
CheckTransactionWithoutProofVerification(tx, state);
|
||||||
}
|
}
|
||||||
|
|
||||||
TEST(checktransaction_tests, bad_txns_vpub_old_toolarge) {
|
TEST(checktransaction_tests, bad_txns_vpub_old_toolarge) {
|
||||||
|
@ -188,7 +210,7 @@ TEST(checktransaction_tests, bad_txns_vpub_old_toolarge) {
|
||||||
|
|
||||||
MockCValidationState state;
|
MockCValidationState state;
|
||||||
EXPECT_CALL(state, DoS(100, false, REJECT_INVALID, "bad-txns-vpub_old-toolarge", false)).Times(1);
|
EXPECT_CALL(state, DoS(100, false, REJECT_INVALID, "bad-txns-vpub_old-toolarge", false)).Times(1);
|
||||||
CheckTransaction(tx, state);
|
CheckTransactionWithoutProofVerification(tx, state);
|
||||||
}
|
}
|
||||||
|
|
||||||
TEST(checktransaction_tests, bad_txns_vpub_new_toolarge) {
|
TEST(checktransaction_tests, bad_txns_vpub_new_toolarge) {
|
||||||
|
@ -199,7 +221,7 @@ TEST(checktransaction_tests, bad_txns_vpub_new_toolarge) {
|
||||||
|
|
||||||
MockCValidationState state;
|
MockCValidationState state;
|
||||||
EXPECT_CALL(state, DoS(100, false, REJECT_INVALID, "bad-txns-vpub_new-toolarge", false)).Times(1);
|
EXPECT_CALL(state, DoS(100, false, REJECT_INVALID, "bad-txns-vpub_new-toolarge", false)).Times(1);
|
||||||
CheckTransaction(tx, state);
|
CheckTransactionWithoutProofVerification(tx, state);
|
||||||
}
|
}
|
||||||
|
|
||||||
TEST(checktransaction_tests, bad_txns_vpubs_both_nonzero) {
|
TEST(checktransaction_tests, bad_txns_vpubs_both_nonzero) {
|
||||||
|
@ -211,5 +233,5 @@ TEST(checktransaction_tests, bad_txns_vpubs_both_nonzero) {
|
||||||
|
|
||||||
MockCValidationState state;
|
MockCValidationState state;
|
||||||
EXPECT_CALL(state, DoS(100, false, REJECT_INVALID, "bad-txns-vpubs-both-nonzero", false)).Times(1);
|
EXPECT_CALL(state, DoS(100, false, REJECT_INVALID, "bad-txns-vpubs-both-nonzero", false)).Times(1);
|
||||||
CheckTransaction(tx, state);
|
CheckTransactionWithoutProofVerification(tx, state);
|
||||||
}
|
}
|
||||||
|
|
27
src/main.cpp
27
src/main.cpp
|
@ -870,8 +870,23 @@ crypto_sign_check_S_lt_l(const unsigned char *S)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
bool CheckTransaction(const CTransaction& tx, CValidationState &state)
|
bool CheckTransaction(const CTransaction& tx, CValidationState &state)
|
||||||
|
{
|
||||||
|
if (!CheckTransactionWithoutProofVerification(tx, state)) {
|
||||||
|
return false;
|
||||||
|
} else {
|
||||||
|
// Ensure that zk-SNARKs verify
|
||||||
|
BOOST_FOREACH(const CPourTx &pour, tx.vpour) {
|
||||||
|
if (!pour.Verify(*pzcashParams, tx.joinSplitPubKey)) {
|
||||||
|
return state.DoS(100, error("CheckTransaction(): pour does not verify"),
|
||||||
|
REJECT_INVALID, "bad-txns-pour-verification-failed");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
bool CheckTransactionWithoutProofVerification(const CTransaction& tx, CValidationState &state)
|
||||||
{
|
{
|
||||||
// Basic checks that don't depend on any context
|
// Basic checks that don't depend on any context
|
||||||
|
|
||||||
|
@ -1008,16 +1023,6 @@ bool CheckTransaction(const CTransaction& tx, CValidationState &state)
|
||||||
return state.DoS(100, error("CheckTransaction(): non-canonical ed25519 signature"),
|
return state.DoS(100, error("CheckTransaction(): non-canonical ed25519 signature"),
|
||||||
REJECT_INVALID, "non-canonical-ed25519-signature");
|
REJECT_INVALID, "non-canonical-ed25519-signature");
|
||||||
}
|
}
|
||||||
|
|
||||||
if (state.PerformPourVerification()) {
|
|
||||||
// Ensure that zk-SNARKs verify
|
|
||||||
BOOST_FOREACH(const CPourTx &pour, tx.vpour) {
|
|
||||||
if (!pour.Verify(*pzcashParams, tx.joinSplitPubKey)) {
|
|
||||||
return state.DoS(100, error("CheckTransaction(): pour does not verify"),
|
|
||||||
REJECT_INVALID, "bad-txns-pour-verification-failed");
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -333,6 +333,7 @@ void UpdateCoins(const CTransaction& tx, CValidationState &state, CCoinsViewCach
|
||||||
|
|
||||||
/** Context-independent validity checks */
|
/** Context-independent validity checks */
|
||||||
bool CheckTransaction(const CTransaction& tx, CValidationState& state);
|
bool CheckTransaction(const CTransaction& tx, CValidationState& state);
|
||||||
|
bool CheckTransactionWithoutProofVerification(const CTransaction& tx, CValidationState &state);
|
||||||
|
|
||||||
/** Check for standard transaction types
|
/** Check for standard transaction types
|
||||||
* @return True if all outputs (scriptPubKeys) use only standard transaction forms
|
* @return True if all outputs (scriptPubKeys) use only standard transaction forms
|
||||||
|
|
|
@ -244,8 +244,7 @@ BOOST_AUTO_TEST_CASE(sighash_from_data)
|
||||||
stream >> tx;
|
stream >> tx;
|
||||||
|
|
||||||
CValidationState state;
|
CValidationState state;
|
||||||
state.SetPerformPourVerification(false); // don't verify the snark
|
BOOST_CHECK_MESSAGE(CheckTransactionWithoutProofVerification(tx, state), strTest);
|
||||||
BOOST_CHECK_MESSAGE(CheckTransaction(tx, state), strTest);
|
|
||||||
BOOST_CHECK(state.IsValid());
|
BOOST_CHECK(state.IsValid());
|
||||||
|
|
||||||
std::vector<unsigned char> raw = ParseHex(raw_script);
|
std::vector<unsigned char> raw = ParseHex(raw_script);
|
||||||
|
|
|
@ -384,15 +384,13 @@ BOOST_AUTO_TEST_CASE(test_simple_pour_invalidity)
|
||||||
unsigned char joinSplitPrivKey[crypto_sign_SECRETKEYBYTES];
|
unsigned char joinSplitPrivKey[crypto_sign_SECRETKEYBYTES];
|
||||||
crypto_sign_keypair(newTx.joinSplitPubKey.begin(), joinSplitPrivKey);
|
crypto_sign_keypair(newTx.joinSplitPubKey.begin(), joinSplitPrivKey);
|
||||||
|
|
||||||
state.SetPerformPourVerification(false); // don't verify the snark
|
|
||||||
|
|
||||||
// No pours, vin and vout, means it should be invalid.
|
// No pours, vin and vout, means it should be invalid.
|
||||||
BOOST_CHECK(!CheckTransaction(newTx, state));
|
BOOST_CHECK(!CheckTransactionWithoutProofVerification(newTx, state));
|
||||||
BOOST_CHECK(state.GetRejectReason() == "bad-txns-vin-empty");
|
BOOST_CHECK(state.GetRejectReason() == "bad-txns-vin-empty");
|
||||||
|
|
||||||
newTx.vin.push_back(CTxIn(uint256S("0000000000000000000000000000000000000000000000000000000000000001"), 0));
|
newTx.vin.push_back(CTxIn(uint256S("0000000000000000000000000000000000000000000000000000000000000001"), 0));
|
||||||
|
|
||||||
BOOST_CHECK(!CheckTransaction(newTx, state));
|
BOOST_CHECK(!CheckTransactionWithoutProofVerification(newTx, state));
|
||||||
BOOST_CHECK(state.GetRejectReason() == "bad-txns-vout-empty");
|
BOOST_CHECK(state.GetRejectReason() == "bad-txns-vout-empty");
|
||||||
|
|
||||||
newTx.vpour.push_back(CPourTx());
|
newTx.vpour.push_back(CPourTx());
|
||||||
|
@ -401,7 +399,7 @@ BOOST_AUTO_TEST_CASE(test_simple_pour_invalidity)
|
||||||
pourtx->serials[0] = GetRandHash();
|
pourtx->serials[0] = GetRandHash();
|
||||||
pourtx->serials[1] = GetRandHash();
|
pourtx->serials[1] = GetRandHash();
|
||||||
|
|
||||||
BOOST_CHECK(!CheckTransaction(newTx, state));
|
BOOST_CHECK(!CheckTransactionWithoutProofVerification(newTx, state));
|
||||||
BOOST_CHECK(state.GetRejectReason() == "bad-txns-invalid-joinsplit-signature");
|
BOOST_CHECK(state.GetRejectReason() == "bad-txns-invalid-joinsplit-signature");
|
||||||
|
|
||||||
// TODO: #966.
|
// TODO: #966.
|
||||||
|
@ -417,7 +415,7 @@ BOOST_AUTO_TEST_CASE(test_simple_pour_invalidity)
|
||||||
joinSplitPrivKey
|
joinSplitPrivKey
|
||||||
) == 0);
|
) == 0);
|
||||||
|
|
||||||
BOOST_CHECK(CheckTransaction(newTx, state));
|
BOOST_CHECK(CheckTransactionWithoutProofVerification(newTx, state));
|
||||||
}
|
}
|
||||||
{
|
{
|
||||||
// Ensure that values within the pour are well-formed.
|
// Ensure that values within the pour are well-formed.
|
||||||
|
|
Loading…
Reference in New Issue