Bitcoin Core 28.99.0
P2P Digital Currency
key.cpp
Go to the documentation of this file.
1// Copyright (c) 2020-2022 The Bitcoin Core developers
2// Distributed under the MIT software license, see the accompanying
3// file COPYING or http://www.opensource.org/licenses/mit-license.php.
4
5#include <chainparams.h>
6#include <key.h>
7#include <key_io.h>
8#include <outputtype.h>
9#include <policy/policy.h>
10#include <pubkey.h>
11#include <rpc/util.h>
12#include <script/keyorigin.h>
13#include <script/script.h>
14#include <script/sign.h>
16#include <script/solver.h>
17#include <streams.h>
19#include <test/fuzz/fuzz.h>
20#include <test/fuzz/util.h>
21#include <test/util/random.h>
22#include <util/chaintype.h>
23#include <util/strencodings.h>
24
25#include <array>
26#include <cassert>
27#include <cstddef>
28#include <cstdint>
29#include <numeric>
30#include <optional>
31#include <string>
32#include <vector>
33
35{
36 static ECC_Context ecc_context{};
38}
39
41{
43 const CKey key = [&] {
44 CKey k;
45 k.Set(buffer.begin(), buffer.end(), true);
46 return k;
47 }();
48 if (!key.IsValid()) {
49 return;
50 }
51
52 {
53 assert(key.begin() + key.size() == key.end());
54 assert(key.IsCompressed());
55 assert(key.size() == 32);
56 assert(DecodeSecret(EncodeSecret(key)) == key);
57 }
58
59 {
60 CKey invalid_key;
61 assert(!(invalid_key == key));
62 assert(!invalid_key.IsCompressed());
63 assert(!invalid_key.IsValid());
64 assert(invalid_key.size() == 0);
65 }
66
67 {
68 CKey uncompressed_key;
69 uncompressed_key.Set(buffer.begin(), buffer.end(), false);
70 assert(!(uncompressed_key == key));
71 assert(!uncompressed_key.IsCompressed());
72 assert(key.size() == 32);
73 assert(uncompressed_key.begin() + uncompressed_key.size() == uncompressed_key.end());
74 assert(uncompressed_key.IsValid());
75 }
76
77 {
78 CKey copied_key;
79 copied_key.Set(key.begin(), key.end(), key.IsCompressed());
80 assert(copied_key == key);
81 }
82
83 const uint256 random_uint256 = Hash(buffer);
84
85 {
86 CKey child_key;
87 ChainCode child_chaincode;
88 const bool ok = key.Derive(child_key, child_chaincode, 0, random_uint256);
89 assert(ok);
90 assert(child_key.IsValid());
91 assert(!(child_key == key));
92 assert(child_chaincode != random_uint256);
93 }
94
95 const CPubKey pubkey = key.GetPubKey();
96
97 {
98 assert(pubkey.size() == 33);
99 assert(key.VerifyPubKey(pubkey));
100 assert(pubkey.GetHash() != random_uint256);
101 assert(pubkey.begin() + pubkey.size() == pubkey.end());
102 assert(pubkey.data() == pubkey.begin());
103 assert(pubkey.IsCompressed());
104 assert(pubkey.IsValid());
105 assert(pubkey.IsFullyValid());
106 assert(HexToPubKey(HexStr(pubkey)) == pubkey);
107 assert(GetAllDestinationsForKey(pubkey).size() == 3);
108 }
109
110 {
111 DataStream data_stream{};
112 pubkey.Serialize(data_stream);
113
114 CPubKey pubkey_deserialized;
115 pubkey_deserialized.Unserialize(data_stream);
116 assert(pubkey_deserialized == pubkey);
117 }
118
119 {
120 const CScript tx_pubkey_script = GetScriptForRawPubKey(pubkey);
121 assert(!tx_pubkey_script.IsPayToScriptHash());
122 assert(!tx_pubkey_script.IsPayToWitnessScriptHash());
123 assert(!tx_pubkey_script.IsPushOnly());
124 assert(!tx_pubkey_script.IsUnspendable());
125 assert(tx_pubkey_script.HasValidOps());
126 assert(tx_pubkey_script.size() == 35);
127
128 const CScript tx_multisig_script = GetScriptForMultisig(1, {pubkey});
129 assert(!tx_multisig_script.IsPayToScriptHash());
130 assert(!tx_multisig_script.IsPayToWitnessScriptHash());
131 assert(!tx_multisig_script.IsPushOnly());
132 assert(!tx_multisig_script.IsUnspendable());
133 assert(tx_multisig_script.HasValidOps());
134 assert(tx_multisig_script.size() == 37);
135
136 FillableSigningProvider fillable_signing_provider;
137 assert(!IsSegWitOutput(fillable_signing_provider, tx_pubkey_script));
138 assert(!IsSegWitOutput(fillable_signing_provider, tx_multisig_script));
139 assert(fillable_signing_provider.GetKeys().size() == 0);
140 assert(!fillable_signing_provider.HaveKey(pubkey.GetID()));
141
142 const bool ok_add_key = fillable_signing_provider.AddKey(key);
143 assert(ok_add_key);
144 assert(fillable_signing_provider.HaveKey(pubkey.GetID()));
145
146 FillableSigningProvider fillable_signing_provider_pub;
147 assert(!fillable_signing_provider_pub.HaveKey(pubkey.GetID()));
148
149 const bool ok_add_key_pubkey = fillable_signing_provider_pub.AddKeyPubKey(key, pubkey);
150 assert(ok_add_key_pubkey);
151 assert(fillable_signing_provider_pub.HaveKey(pubkey.GetID()));
152
153 TxoutType which_type_tx_pubkey;
154 const bool is_standard_tx_pubkey = IsStandard(tx_pubkey_script, std::nullopt, which_type_tx_pubkey);
155 assert(is_standard_tx_pubkey);
156 assert(which_type_tx_pubkey == TxoutType::PUBKEY);
157
158 TxoutType which_type_tx_multisig;
159 const bool is_standard_tx_multisig = IsStandard(tx_multisig_script, std::nullopt, which_type_tx_multisig);
160 assert(is_standard_tx_multisig);
161 assert(which_type_tx_multisig == TxoutType::MULTISIG);
162
163 std::vector<std::vector<unsigned char>> v_solutions_ret_tx_pubkey;
164 const TxoutType outtype_tx_pubkey = Solver(tx_pubkey_script, v_solutions_ret_tx_pubkey);
165 assert(outtype_tx_pubkey == TxoutType::PUBKEY);
166 assert(v_solutions_ret_tx_pubkey.size() == 1);
167 assert(v_solutions_ret_tx_pubkey[0].size() == 33);
168
169 std::vector<std::vector<unsigned char>> v_solutions_ret_tx_multisig;
170 const TxoutType outtype_tx_multisig = Solver(tx_multisig_script, v_solutions_ret_tx_multisig);
171 assert(outtype_tx_multisig == TxoutType::MULTISIG);
172 assert(v_solutions_ret_tx_multisig.size() == 3);
173 assert(v_solutions_ret_tx_multisig[0].size() == 1);
174 assert(v_solutions_ret_tx_multisig[1].size() == 33);
175 assert(v_solutions_ret_tx_multisig[2].size() == 1);
176
177 OutputType output_type{};
178 const CTxDestination tx_destination = GetDestinationForKey(pubkey, output_type);
179 assert(output_type == OutputType::LEGACY);
180 assert(IsValidDestination(tx_destination));
181 assert(PKHash{pubkey} == *std::get_if<PKHash>(&tx_destination));
182
183 const CScript script_for_destination = GetScriptForDestination(tx_destination);
184 assert(script_for_destination.size() == 25);
185
186 const std::string destination_address = EncodeDestination(tx_destination);
187 assert(DecodeDestination(destination_address) == tx_destination);
188
189 const CPubKey pubkey_from_address_string = AddrToPubKey(fillable_signing_provider, destination_address);
190 assert(pubkey_from_address_string == pubkey);
191
192 CKeyID key_id = pubkey.GetID();
193 assert(!key_id.IsNull());
194 assert(key_id == CKeyID{key_id});
195 assert(key_id == GetKeyForDestination(fillable_signing_provider, tx_destination));
196
197 CPubKey pubkey_out;
198 const bool ok_get_pubkey = fillable_signing_provider.GetPubKey(key_id, pubkey_out);
199 assert(ok_get_pubkey);
200
201 CKey key_out;
202 const bool ok_get_key = fillable_signing_provider.GetKey(key_id, key_out);
203 assert(ok_get_key);
204 assert(fillable_signing_provider.GetKeys().size() == 1);
205 assert(fillable_signing_provider.HaveKey(key_id));
206
207 KeyOriginInfo key_origin_info;
208 const bool ok_get_key_origin = fillable_signing_provider.GetKeyOrigin(key_id, key_origin_info);
209 assert(!ok_get_key_origin);
210 }
211
212 {
213 const std::vector<unsigned char> vch_pubkey{pubkey.begin(), pubkey.end()};
214 assert(CPubKey::ValidSize(vch_pubkey));
215 assert(!CPubKey::ValidSize({pubkey.begin(), pubkey.begin() + pubkey.size() - 1}));
216
217 const CPubKey pubkey_ctor_1{vch_pubkey};
218 assert(pubkey == pubkey_ctor_1);
219
220 const CPubKey pubkey_ctor_2{vch_pubkey.begin(), vch_pubkey.end()};
221 assert(pubkey == pubkey_ctor_2);
222
223 CPubKey pubkey_set;
224 pubkey_set.Set(vch_pubkey.begin(), vch_pubkey.end());
225 assert(pubkey == pubkey_set);
226 }
227
228 {
229 const CPubKey invalid_pubkey{};
230 assert(!invalid_pubkey.IsValid());
231 assert(!invalid_pubkey.IsFullyValid());
232 assert(!(pubkey == invalid_pubkey));
233 assert(pubkey != invalid_pubkey);
234 assert(pubkey < invalid_pubkey);
235 }
236
237 {
238 // Cover CPubKey's operator[](unsigned int pos)
239 unsigned int sum = 0;
240 for (size_t i = 0; i < pubkey.size(); ++i) {
241 sum += pubkey[i];
242 }
243 assert(std::accumulate(pubkey.begin(), pubkey.end(), 0U) == sum);
244 }
245
246 {
247 CPubKey decompressed_pubkey = pubkey;
248 assert(decompressed_pubkey.IsCompressed());
249
250 const bool ok = decompressed_pubkey.Decompress();
251 assert(ok);
252 assert(!decompressed_pubkey.IsCompressed());
253 assert(decompressed_pubkey.size() == 65);
254 }
255
256 {
257 std::vector<unsigned char> vch_sig;
258 const bool ok = key.Sign(random_uint256, vch_sig, false);
259 assert(ok);
260 assert(pubkey.Verify(random_uint256, vch_sig));
261 assert(CPubKey::CheckLowS(vch_sig));
262
263 const std::vector<unsigned char> vch_invalid_sig{vch_sig.begin(), vch_sig.begin() + vch_sig.size() - 1};
264 assert(!pubkey.Verify(random_uint256, vch_invalid_sig));
265 assert(!CPubKey::CheckLowS(vch_invalid_sig));
266 }
267
268 {
269 std::vector<unsigned char> vch_compact_sig;
270 const bool ok_sign_compact = key.SignCompact(random_uint256, vch_compact_sig);
271 assert(ok_sign_compact);
272
273 CPubKey recover_pubkey;
274 const bool ok_recover_compact = recover_pubkey.RecoverCompact(random_uint256, vch_compact_sig);
275 assert(ok_recover_compact);
276 assert(recover_pubkey == pubkey);
277 }
278
279 {
280 CPubKey child_pubkey;
281 ChainCode child_chaincode;
282 const bool ok = pubkey.Derive(child_pubkey, child_chaincode, 0, random_uint256);
283 assert(ok);
284 assert(child_pubkey != pubkey);
285 assert(child_pubkey.IsCompressed());
286 assert(child_pubkey.IsFullyValid());
287 assert(child_pubkey.IsValid());
288 assert(child_pubkey.size() == 33);
289 assert(child_chaincode != random_uint256);
290 }
291
292 const CPrivKey priv_key = key.GetPrivKey();
293
294 {
295 for (const bool skip_check : {true, false}) {
296 CKey loaded_key;
297 const bool ok = loaded_key.Load(priv_key, pubkey, skip_check);
298 assert(ok);
299 assert(key == loaded_key);
300 }
301 }
302}
303
304FUZZ_TARGET(ellswift_roundtrip, .init = initialize_key)
305{
306 FuzzedDataProvider fdp{buffer.data(), buffer.size()};
307
308 CKey key = ConsumePrivateKey(fdp, /*compressed=*/true);
309 if (!key.IsValid()) return;
310
311 auto ent32 = fdp.ConsumeBytes<std::byte>(32);
312 ent32.resize(32);
313
314 auto encoded_ellswift = key.EllSwiftCreate(ent32);
315 auto decoded_pubkey = encoded_ellswift.Decode();
316
317 uint256 hash{ConsumeUInt256(fdp)};
318 std::vector<unsigned char> sig;
319 key.Sign(hash, sig);
320 assert(decoded_pubkey.Verify(hash, sig));
321}
322
324{
325 FuzzedDataProvider fdp{buffer.data(), buffer.size()};
326
327 // We generate private key, k1.
328 CKey k1 = ConsumePrivateKey(fdp, /*compressed=*/true);
329 if (!k1.IsValid()) return;
330
331 // They generate private key, k2.
332 CKey k2 = ConsumePrivateKey(fdp, /*compressed=*/true);
333 if (!k2.IsValid()) return;
334
335 // We construct an ellswift encoding for our key, k1_ellswift.
336 auto ent32_1 = fdp.ConsumeBytes<std::byte>(32);
337 ent32_1.resize(32);
338 auto k1_ellswift = k1.EllSwiftCreate(ent32_1);
339
340 // They construct an ellswift encoding for their key, k2_ellswift.
341 auto ent32_2 = fdp.ConsumeBytes<std::byte>(32);
342 ent32_2.resize(32);
343 auto k2_ellswift = k2.EllSwiftCreate(ent32_2);
344
345 // They construct another (possibly distinct) ellswift encoding for their key, k2_ellswift_bad.
346 auto ent32_2_bad = fdp.ConsumeBytes<std::byte>(32);
347 ent32_2_bad.resize(32);
348 auto k2_ellswift_bad = k2.EllSwiftCreate(ent32_2_bad);
349 assert((ent32_2_bad == ent32_2) == (k2_ellswift_bad == k2_ellswift));
350
351 // Determine who is who.
352 bool initiating = fdp.ConsumeBool();
353
354 // We compute our shared secret using our key and their public key.
355 auto ecdh_secret_1 = k1.ComputeBIP324ECDHSecret(k2_ellswift, k1_ellswift, initiating);
356 // They compute their shared secret using their key and our public key.
357 auto ecdh_secret_2 = k2.ComputeBIP324ECDHSecret(k1_ellswift, k2_ellswift, !initiating);
358 // Those must match, as everyone is behaving correctly.
359 assert(ecdh_secret_1 == ecdh_secret_2);
360
361 if (k1_ellswift != k2_ellswift) {
362 // Unless the two keys are exactly identical, acting as the wrong party breaks things.
363 auto ecdh_secret_bad = k1.ComputeBIP324ECDHSecret(k2_ellswift, k1_ellswift, !initiating);
364 assert(ecdh_secret_bad != ecdh_secret_1);
365 }
366
367 if (k2_ellswift_bad != k2_ellswift) {
368 // Unless both encodings created by them are identical, using the second one breaks things.
369 auto ecdh_secret_bad = k1.ComputeBIP324ECDHSecret(k2_ellswift_bad, k1_ellswift, initiating);
370 assert(ecdh_secret_bad != ecdh_secret_1);
371 }
372}
bool IsValidDestination(const CTxDestination &dest)
Check whether a CTxDestination corresponds to one with an address.
CScript GetScriptForDestination(const CTxDestination &dest)
Generate a Bitcoin scriptPubKey for the given CTxDestination.
std::variant< CNoDestination, PubKeyDestination, PKHash, ScriptHash, WitnessV0ScriptHash, WitnessV0KeyHash, WitnessV1Taproot, PayToAnchor, WitnessUnknown > CTxDestination
A txout script categorized into standard templates.
Definition: addresstype.h:140
ECC_Context ecc_context
void SelectParams(const ChainType chain)
Sets the params returned by Params() to those for the given chain type.
An encapsulated private key.
Definition: key.h:35
unsigned int size() const
Simple read-only vector-like interface.
Definition: key.h:117
bool IsValid() const
Check whether this private key is valid.
Definition: key.h:123
bool Sign(const uint256 &hash, std::vector< unsigned char > &vchSig, bool grind=true, uint32_t test_case=0) const
Create a DER-serialized signature.
Definition: key.cpp:208
const std::byte * begin() const
Definition: key.h:119
ECDHSecret ComputeBIP324ECDHSecret(const EllSwiftPubKey &their_ellswift, const EllSwiftPubKey &our_ellswift, bool initiating) const
Compute a BIP324-style ECDH shared secret.
Definition: key.cpp:327
CPrivKey GetPrivKey() const
Convert the private key to a CPrivKey (serialized OpenSSL private key data).
Definition: key.cpp:169
bool IsCompressed() const
Check whether the public key corresponding to this private key is (to be) compressed.
Definition: key.h:126
CPubKey GetPubKey() const
Compute the public key from a private key.
Definition: key.cpp:182
const std::byte * end() const
Definition: key.h:120
void Set(const T pbegin, const T pend, bool fCompressedIn)
Initialize using begin and end iterators to byte data.
Definition: key.h:103
bool VerifyPubKey(const CPubKey &vchPubKey) const
Verify thoroughly whether a private key and a public key match.
Definition: key.cpp:236
EllSwiftPubKey EllSwiftCreate(Span< const std::byte > entropy) const
Create an ellswift-encoded public key for this key, with specified entropy.
Definition: key.cpp:311
bool Load(const CPrivKey &privkey, const CPubKey &vchPubKey, bool fSkipCheck)
Load private key and check that public key matches.
Definition: key.cpp:278
bool Derive(CKey &keyChild, ChainCode &ccChild, unsigned int nChild, const ChainCode &cc) const
Derive BIP32 child key.
Definition: key.cpp:292
bool SignCompact(const uint256 &hash, std::vector< unsigned char > &vchSig) const
Create a compact signature (65 bytes), which allows reconstructing the used public key.
Definition: key.cpp:249
A reference to a CKey: the Hash160 of its serialized public key.
Definition: pubkey.h:24
An encapsulated public key.
Definition: pubkey.h:34
const unsigned char * data() const
Definition: pubkey.h:113
bool RecoverCompact(const uint256 &hash, const std::vector< unsigned char > &vchSig)
Recover a public key from a compact signature.
Definition: pubkey.cpp:294
bool IsCompressed() const
Check whether this is a compressed public key.
Definition: pubkey.h:204
CKeyID GetID() const
Get the KeyID of this public key (hash of its serialization)
Definition: pubkey.h:164
static bool CheckLowS(const std::vector< unsigned char > &vchSig)
Check whether a signature is normalized (lower-S).
Definition: pubkey.cpp:415
bool IsValid() const
Definition: pubkey.h:189
bool Decompress()
Turn this public key into an uncompressed public key.
Definition: pubkey.cpp:321
const unsigned char * end() const
Definition: pubkey.h:115
bool Verify(const uint256 &hash, const std::vector< unsigned char > &vchSig) const
Verify a DER signature (~72 bytes).
Definition: pubkey.cpp:277
bool IsFullyValid() const
fully validate whether this is a valid public key (more expensive than IsValid())
Definition: pubkey.cpp:314
unsigned int size() const
Simple read-only vector-like interface to the pubkey data.
Definition: pubkey.h:112
const unsigned char * begin() const
Definition: pubkey.h:114
static bool ValidSize(const std::vector< unsigned char > &vch)
Definition: pubkey.h:77
void Serialize(Stream &s) const
Implement serialization, as if this was a byte vector.
Definition: pubkey.h:141
void Unserialize(Stream &s)
Definition: pubkey.h:148
uint256 GetHash() const
Get the 256-bit hash of this public key.
Definition: pubkey.h:170
bool Derive(CPubKey &pubkeyChild, ChainCode &ccChild, unsigned int nChild, const ChainCode &cc) const
Derive BIP32 child pubkey.
Definition: pubkey.cpp:335
void Set(const T pbegin, const T pend)
Initialize a public key using begin/end iterators to byte data.
Definition: pubkey.h:89
Serialized script, used inside transaction inputs and outputs.
Definition: script.h:415
bool IsPushOnly(const_iterator pc) const
Called by IsStandardTx and P2SH/BIP62 VerifyScript (which makes it consensus-critical).
Definition: script.cpp:259
bool IsPayToScriptHash() const
Definition: script.cpp:224
bool IsUnspendable() const
Returns whether the script is guaranteed to fail at execution, regardless of the initial stack.
Definition: script.h:571
bool IsPayToWitnessScriptHash() const
Definition: script.cpp:233
bool HasValidOps() const
Check if the script contains valid OP_CODES.
Definition: script.cpp:293
Double ended buffer combining vector and stream-like interfaces.
Definition: streams.h:147
RAII class initializing and deinitializing global state for elliptic curve support.
Definition: key.h:322
Fillable signing provider that keeps keys in an address->secret map.
virtual bool AddKeyPubKey(const CKey &key, const CPubKey &pubkey)
virtual bool GetPubKey(const CKeyID &address, CPubKey &vchPubKeyOut) const override
virtual bool GetKey(const CKeyID &address, CKey &keyOut) const override
virtual std::set< CKeyID > GetKeys() const
virtual bool AddKey(const CKey &key)
virtual bool HaveKey(const CKeyID &address) const override
virtual bool GetKeyOrigin(const CKeyID &keyid, KeyOriginInfo &info) const
constexpr bool IsNull() const
Definition: uint256.h:48
size_type size() const
Definition: prevector.h:294
256-bit opaque blob.
Definition: uint256.h:190
volatile double sum
Definition: examples.cpp:10
uint256 Hash(const T &in1)
Compute the 256-bit hash of an object.
Definition: hash.h:75
std::string HexStr(const Span< const uint8_t > s)
Convert a span of bytes to a lower-case hexadecimal string.
Definition: hex_base.cpp:29
std::vector< unsigned char, secure_allocator< unsigned char > > CPrivKey
CPrivKey is a serialized private key, with all parameters included (SIZE bytes)
Definition: key.h:23
CTxDestination DecodeDestination(const std::string &str, std::string &error_msg, std::vector< int > *error_locations)
Definition: key_io.cpp:299
std::string EncodeSecret(const CKey &key)
Definition: key_io.cpp:231
std::string EncodeDestination(const CTxDestination &dest)
Definition: key_io.cpp:294
CKey DecodeSecret(const std::string &str)
Definition: key_io.cpp:213
CTxDestination GetDestinationForKey(const CPubKey &key, OutputType type)
Get a destination of the requested type (if possible) to the specified key.
Definition: outputtype.cpp:50
std::vector< CTxDestination > GetAllDestinationsForKey(const CPubKey &key)
Get all destinations (potentially) supported by the wallet for the given key.
Definition: outputtype.cpp:71
OutputType
Definition: outputtype.h:17
bool IsStandard(const CScript &scriptPubKey, const std::optional< unsigned > &max_datacarrier_bytes, TxoutType &whichType)
Definition: policy.cpp:79
CPubKey HexToPubKey(const std::string &hex_in)
Definition: util.cpp:220
CPubKey AddrToPubKey(const FillableSigningProvider &keystore, const std::string &addr_in)
Definition: util.cpp:236
bool IsSegWitOutput(const SigningProvider &provider, const CScript &script)
Check whether a scriptPubKey is known to be segwit.
Definition: sign.cpp:747
CKeyID GetKeyForDestination(const SigningProvider &store, const CTxDestination &dest)
Return the CKeyID of the key involved in a script (if there is a unique one).
TxoutType Solver(const CScript &scriptPubKey, std::vector< std::vector< unsigned char > > &vSolutionsRet)
Parse a scriptPubKey and identify script type for standard scripts.
Definition: solver.cpp:141
CScript GetScriptForMultisig(int nRequired, const std::vector< CPubKey > &keys)
Generate a multisig script.
Definition: solver.cpp:218
CScript GetScriptForRawPubKey(const CPubKey &pubKey)
Generate a P2PK script for the given pubkey.
Definition: solver.cpp:213
TxoutType
Definition: solver.h:22
CPubKey Decode() const
Decode to normal compressed CPubKey (for debugging purposes).
Definition: pubkey.cpp:362
void initialize_key()
Definition: key.cpp:34
FUZZ_TARGET(key,.init=initialize_key)
Definition: key.cpp:40
CKey ConsumePrivateKey(FuzzedDataProvider &fuzzed_data_provider, std::optional< bool > compressed) noexcept
Definition: util.cpp:230
uint256 ConsumeUInt256(FuzzedDataProvider &fuzzed_data_provider) noexcept
Definition: util.h:171
void SeedRandomStateForTest(SeedRand seedtype)
Seed the global RNG state for testing and log the seed value.
Definition: random.cpp:19
@ ZEROS
Seed with a compile time constant of zeros.
assert(!tx.IsCoinBase())