// Copyright (c) 2011-2016 The Bitcoin Core developers
// Copyright (c) 2017-2020 The Raven Core developers
// Distributed under the MIT software license, see the accompanying
// file COPYING or http://www.opensource.org/licenses/mit-license.php.

#include "data/tx_invalid.json.h"
#include "data/tx_valid.json.h"
#include "test/test_raven.h"

#include "clientversion.h"
#include "checkqueue.h"
#include "consensus/tx_verify.h"
#include "consensus/validation.h"
#include "core_io.h"
#include "key.h"
#include "keystore.h"
#include "validation.h"
#include "policy/policy.h"
#include "script/script.h"
#include "script/sign.h"
#include "script/script_error.h"
#include "script/standard.h"
#include "utilstrencodings.h"

#include <map>
#include <string>

#include <boost/algorithm/string/classification.hpp>
#include <boost/algorithm/string/split.hpp>
#include <boost/test/unit_test.hpp>

#include <univalue.h>

typedef std::vector<unsigned char> valtype;

// In script_tests.cpp
extern UniValue read_json(const std::string &jsondata);


static std::map<std::string, unsigned int> mapFlagNames = {
        {std::string("NONE"),                                  (unsigned int) SCRIPT_VERIFY_NONE},
        {std::string("P2SH"),                                  (unsigned int) SCRIPT_VERIFY_P2SH},
        {std::string("STRICTENC"),                             (unsigned int) SCRIPT_VERIFY_STRICTENC},
        {std::string("DERSIG"),                                (unsigned int) SCRIPT_VERIFY_DERSIG},
        {std::string("LOW_S"),                                 (unsigned int) SCRIPT_VERIFY_LOW_S},
        {std::string("SIGPUSHONLY"),                           (unsigned int) SCRIPT_VERIFY_SIGPUSHONLY},
        {std::string("MINIMALDATA"),                           (unsigned int) SCRIPT_VERIFY_MINIMALDATA},
        {std::string("NULLDUMMY"),                             (unsigned int) SCRIPT_VERIFY_NULLDUMMY},
        {std::string("DISCOURAGE_UPGRADABLE_NOPS"),            (unsigned int) SCRIPT_VERIFY_DISCOURAGE_UPGRADABLE_NOPS},
        {std::string("CLEANSTACK"),                            (unsigned int) SCRIPT_VERIFY_CLEANSTACK},
        {std::string("MINIMALIF"),                             (unsigned int) SCRIPT_VERIFY_MINIMALIF},
        {std::string("NULLFAIL"),                              (unsigned int) SCRIPT_VERIFY_NULLFAIL},
        {std::string("CHECKLOCKTIMEVERIFY"),                   (unsigned int) SCRIPT_VERIFY_CHECKLOCKTIMEVERIFY},
        {std::string("CHECKSEQUENCEVERIFY"),                   (unsigned int) SCRIPT_VERIFY_CHECKSEQUENCEVERIFY},
        {std::string("WITNESS"),                               (unsigned int) SCRIPT_VERIFY_WITNESS},
        {std::string("DISCOURAGE_UPGRADABLE_WITNESS_PROGRAM"), (unsigned int) SCRIPT_VERIFY_DISCOURAGE_UPGRADABLE_WITNESS_PROGRAM},
        {std::string("WITNESS_PUBKEYTYPE"),                    (unsigned int) SCRIPT_VERIFY_WITNESS_PUBKEYTYPE},
};

unsigned int ParseScriptFlags(std::string strFlags)
{
    if (strFlags.empty())
    {
        return 0;
    }
    unsigned int flags = 0;
    std::vector<std::string> words;
    boost::algorithm::split(words, strFlags, boost::algorithm::is_any_of(","));

    for (std::string word : words)
    {
        if (!mapFlagNames.count(word))
            BOOST_ERROR("Bad test: unknown verification flag '" << word << "'");
        flags |= mapFlagNames[word];
    }

    return flags;
}

std::string FormatScriptFlags(unsigned int flags)
{
    if (flags == 0)
    {
        return "";
    }
    std::string ret;
    std::map<std::string, unsigned int>::const_iterator it = mapFlagNames.begin();
    while (it != mapFlagNames.end())
    {
        if (flags & it->second)
        {
            ret += it->first + ",";
        }
        it++;
    }
    return ret.substr(0, ret.size() - 1);
}

BOOST_FIXTURE_TEST_SUITE(transaction_tests, BasicTestingSetup)

    BOOST_AUTO_TEST_CASE(tx_valid_test)
    {
        BOOST_TEST_MESSAGE("Running TX Valid Test");

        // Read tests from test/data/tx_valid.json
        // Format is an array of arrays
        // Inner arrays are either [ "comment" ]
        // or [[[prevout hash, prevout index, prevout scriptPubKey], [input 2], ...],"], serializedTransaction, verifyFlags
        // ... where all scripts are stringified scripts.
        //
        // verifyFlags is a comma separated list of script verification flags to apply, or "NONE"
        UniValue tests = read_json(std::string(json_tests::tx_valid, json_tests::tx_valid + sizeof(json_tests::tx_valid)));

        ScriptError err;
        for (unsigned int idx = 0; idx < tests.size(); idx++)
        {
            UniValue test = tests[idx];
            std::string strTest = test.write();
            if (test[0].isArray())
            {
                if (test.size() != 3 || !test[1].isStr() || !test[2].isStr())
                {
                    BOOST_ERROR("Bad test: " << strTest);
                    continue;
                }

                std::map<COutPoint, CScript> mapprevOutScriptPubKeys;
                std::map<COutPoint, int64_t> mapprevOutValues;
                UniValue inputs = test[0].get_array();
                bool fValid = true;
                for (unsigned int inpIdx = 0; inpIdx < inputs.size(); inpIdx++)
                {
                    const UniValue &input = inputs[inpIdx];
                    if (!input.isArray())
                    {
                        fValid = false;
                        break;
                    }
                    UniValue vinput = input.get_array();
                    if (vinput.size() < 3 || vinput.size() > 4)
                    {
                        fValid = false;
                        break;
                    }
                    COutPoint outpoint(uint256S(vinput[0].get_str()), vinput[1].get_int());
                    mapprevOutScriptPubKeys[outpoint] = ParseScript(vinput[2].get_str());
                    if (vinput.size() >= 4)
                    {
                        mapprevOutValues[outpoint] = vinput[3].get_int64();
                    }
                }
                if (!fValid)
                {
                    BOOST_ERROR("Bad test: " << strTest);
                    continue;
                }

                std::string transaction = test[1].get_str();
                CDataStream stream(ParseHex(transaction), SER_NETWORK, PROTOCOL_VERSION);
                CTransaction tx(deserialize, stream);

                CValidationState state;
                BOOST_CHECK_MESSAGE(CheckTransaction(tx, state), strTest);
                BOOST_CHECK(state.IsValid());

                PrecomputedTransactionData txdata(tx);
                for (unsigned int i = 0; i < tx.vin.size(); i++)
                {
                    if (!mapprevOutScriptPubKeys.count(tx.vin[i].prevout))
                    {
                        BOOST_ERROR("Bad test: " << strTest);
                        break;
                    }

                    CAmount amount = 0;
                    if (mapprevOutValues.count(tx.vin[i].prevout))
                    {
                        amount = mapprevOutValues[tx.vin[i].prevout];
                    }
                    unsigned int verify_flags = ParseScriptFlags(test[2].get_str());
                    const CScriptWitness *witness = &tx.vin[i].scriptWitness;
                    BOOST_CHECK_MESSAGE(VerifyScript(tx.vin[i].scriptSig, mapprevOutScriptPubKeys[tx.vin[i].prevout],
                                                     witness, verify_flags, TransactionSignatureChecker(&tx, i, amount, txdata), &err),
                                        strTest);
                    BOOST_CHECK_MESSAGE(err == SCRIPT_ERR_OK, ScriptErrorString(err));
                }
            }
        }
    }

    BOOST_AUTO_TEST_CASE(tx_invalid_test)
    {
        BOOST_TEST_MESSAGE("Running TX Invalid Test");

        // Read tests from test/data/tx_invalid.json
        // Format is an array of arrays
        // Inner arrays are either [ "comment" ]
        // or [[[prevout hash, prevout index, prevout scriptPubKey], [input 2], ...],"], serializedTransaction, verifyFlags
        // ... where all scripts are stringified scripts.
        //
        // verifyFlags is a comma separated list of script verification flags to apply, or "NONE"
        UniValue tests = read_json(std::string(json_tests::tx_invalid, json_tests::tx_invalid + sizeof(json_tests::tx_invalid)));

        // Initialize to SCRIPT_ERR_OK. The tests expect err to be changed to a
        // value other than SCRIPT_ERR_OK.
        ScriptError err = SCRIPT_ERR_OK;
        for (unsigned int idx = 0; idx < tests.size(); idx++)
        {
            UniValue test = tests[idx];
            std::string strTest = test.write();
            if (test[0].isArray())
            {
                if (test.size() != 3 || !test[1].isStr() || !test[2].isStr())
                {
                    BOOST_ERROR("Bad test: " << strTest);
                    continue;
                }

                std::map<COutPoint, CScript> mapprevOutScriptPubKeys;
                std::map<COutPoint, int64_t> mapprevOutValues;
                UniValue inputs = test[0].get_array();
                bool fValid = true;
                for (unsigned int inpIdx = 0; inpIdx < inputs.size(); inpIdx++)
                {
                    const UniValue &input = inputs[inpIdx];
                    if (!input.isArray())
                    {
                        fValid = false;
                        break;
                    }
                    UniValue vinput = input.get_array();
                    if (vinput.size() < 3 || vinput.size() > 4)
                    {
                        fValid = false;
                        break;
                    }
                    COutPoint outpoint(uint256S(vinput[0].get_str()), vinput[1].get_int());
                    mapprevOutScriptPubKeys[outpoint] = ParseScript(vinput[2].get_str());
                    if (vinput.size() >= 4)
                    {
                        mapprevOutValues[outpoint] = vinput[3].get_int64();
                    }
                }
                if (!fValid)
                {
                    BOOST_ERROR("Bad test: " << strTest);
                    continue;
                }

                std::string transaction = test[1].get_str();
                CDataStream stream(ParseHex(transaction), SER_NETWORK, PROTOCOL_VERSION);
                CTransaction tx(deserialize, stream);

                CValidationState state;
                fValid = CheckTransaction(tx, state) && state.IsValid();

                PrecomputedTransactionData txdata(tx);
                for (unsigned int i = 0; i < tx.vin.size() && fValid; i++)
                {
                    if (!mapprevOutScriptPubKeys.count(tx.vin[i].prevout))
                    {
                        BOOST_ERROR("Bad test: " << strTest);
                        break;
                    }

                    unsigned int verify_flags = ParseScriptFlags(test[2].get_str());
                    CAmount amount = 0;
                    if (mapprevOutValues.count(tx.vin[i].prevout))
                    {
                        amount = mapprevOutValues[tx.vin[i].prevout];
                    }
                    const CScriptWitness *witness = &tx.vin[i].scriptWitness;
                    fValid = VerifyScript(tx.vin[i].scriptSig, mapprevOutScriptPubKeys[tx.vin[i].prevout],
                                          witness, verify_flags, TransactionSignatureChecker(&tx, i, amount, txdata), &err);
                }
                BOOST_CHECK_MESSAGE(!fValid, strTest);
                BOOST_CHECK_MESSAGE(err != SCRIPT_ERR_OK, ScriptErrorString(err));
            }
        }
    }

    BOOST_AUTO_TEST_CASE(basic_transaction_test)
    {
        BOOST_TEST_MESSAGE("Running Basic Transaction Test");

        // Random real transaction (e2769b09e784f32f62ef849763d4f45b98e07ba658647343b915ff832b110436)
        unsigned char ch[] = {0x01, 0x00, 0x00, 0x00, 0x01, 0x6b, 0xff, 0x7f, 0xcd, 0x4f, 0x85, 0x65, 0xef, 0x40, 0x6d, 0xd5, 0xd6, 0x3d, 0x4f, 0xf9, 0x4f, 0x31, 0x8f, 0xe8, 0x20, 0x27, 0xfd, 0x4d, 0xc4, 0x51, 0xb0, 0x44, 0x74, 0x01, 0x9f, 0x74, 0xb4, 0x00, 0x00, 0x00, 0x00, 0x8c, 0x49, 0x30, 0x46, 0x02, 0x21, 0x00, 0xda, 0x0d, 0xc6, 0xae, 0xce, 0xfe, 0x1e, 0x06, 0xef, 0xdf, 0x05, 0x77, 0x37, 0x57, 0xde, 0xb1, 0x68, 0x82, 0x09, 0x30, 0xe3, 0xb0, 0xd0, 0x3f, 0x46, 0xf5, 0xfc, 0xf1, 0x50, 0xbf, 0x99, 0x0c, 0x02, 0x21, 0x00, 0xd2, 0x5b, 0x5c, 0x87, 0x04, 0x00, 0x76, 0xe4, 0xf2, 0x53, 0xf8, 0x26, 0x2e, 0x76, 0x3e, 0x2d, 0xd5, 0x1e, 0x7f, 0xf0, 0xbe, 0x15, 0x77, 0x27, 0xc4, 0xbc, 0x42, 0x80, 0x7f, 0x17, 0xbd, 0x39, 0x01, 0x41, 0x04, 0xe6, 0xc2, 0x6e, 0xf6, 0x7d, 0xc6, 0x10, 0xd2, 0xcd, 0x19, 0x24, 0x84, 0x78, 0x9a, 0x6c, 0xf9, 0xae, 0xa9, 0x93, 0x0b, 0x94, 0x4b, 0x7e, 0x2d, 0xb5, 0x34, 0x2b, 0x9d, 0x9e, 0x5b, 0x9f, 0xf7, 0x9a, 0xff, 0x9a, 0x2e, 0xe1, 0x97, 0x8d, 0xd7, 0xfd, 0x01, 0xdf, 0xc5, 0x22, 0xee, 0x02, 0x28, 0x3d, 0x3b, 0x06, 0xa9, 0xd0, 0x3a, 0xcf, 0x80, 0x96, 0x96, 0x8d, 0x7d, 0xbb, 0x0f, 0x91, 0x78, 0xff, 0xff, 0xff, 0xff, 0x02, 0x8b, 0xa7, 0x94, 0x0e, 0x00, 0x00, 0x00, 0x00, 0x19, 0x76, 0xa9, 0x14, 0xba, 0xde, 0xec, 0xfd, 0xef, 0x05, 0x07, 0x24, 0x7f, 0xc8, 0xf7, 0x42, 0x41, 0xd7, 0x3b, 0xc0, 0x39, 0x97, 0x2d, 0x7b, 0x88, 0xac, 0x40, 0x94, 0xa8, 0x02, 0x00, 0x00, 0x00, 0x00, 0x19, 0x76, 0xa9, 0x14, 0xc1, 0x09, 0x32, 0x48, 0x3f, 0xec, 0x93, 0xed, 0x51, 0xf5, 0xfe, 0x95, 0xe7, 0x25, 0x59, 0xf2, 0xcc, 0x70, 0x43, 0xf9, 0x88, 0xac, 0x00, 0x00, 0x00, 0x00, 0x00};
        std::vector<unsigned char> vch(ch, ch + sizeof(ch) - 1);
        CDataStream stream(vch, SER_DISK, CLIENT_VERSION);
        CMutableTransaction tx;
        stream >> tx;
        CValidationState state;
        BOOST_CHECK_MESSAGE(CheckTransaction(tx, state) && state.IsValid(), "Simple deserialized transaction should be valid.");

        // Check that duplicate txins fail
        tx.vin.push_back(tx.vin[0]);
        BOOST_CHECK_MESSAGE(!CheckTransaction(tx, state) || !state.IsValid(), "Transaction with duplicate txins should be invalid.");
    }

    //
    // Helper: create two dummy transactions, each with
    // two outputs.  The first has 11 and 50 CENT outputs
    // paid to a TX_PUBKEY, the second 21 and 22 CENT outputs
    // paid to a TX_PUBKEYHASH.
    //
    static std::vector<CMutableTransaction>
    SetupDummyInputs(CBasicKeyStore &keystoreRet, CCoinsViewCache &coinsRet)
    {
        std::vector<CMutableTransaction> dummyTransactions;
        dummyTransactions.resize(2);

        // Add some keys to the keystore:
        CKey key[4];
        for (int i = 0; i < 4; i++)
        {
            key[i].MakeNewKey(i % 2);
            keystoreRet.AddKey(key[i]);
        }

        // Create some dummy input transactions
        dummyTransactions[0].vout.resize(2);
        dummyTransactions[0].vout[0].nValue = 11 * CENT;
        dummyTransactions[0].vout[0].scriptPubKey << ToByteVector(key[0].GetPubKey()) << OP_CHECKSIG;
        dummyTransactions[0].vout[1].nValue = 50 * CENT;
        dummyTransactions[0].vout[1].scriptPubKey << ToByteVector(key[1].GetPubKey()) << OP_CHECKSIG;
        AddCoins(coinsRet, dummyTransactions[0], 0, uint256());

        dummyTransactions[1].vout.resize(2);
        dummyTransactions[1].vout[0].nValue = 21 * CENT;
        dummyTransactions[1].vout[0].scriptPubKey = GetScriptForDestination(key[2].GetPubKey().GetID());
        dummyTransactions[1].vout[1].nValue = 22 * CENT;
        dummyTransactions[1].vout[1].scriptPubKey = GetScriptForDestination(key[3].GetPubKey().GetID());
        AddCoins(coinsRet, dummyTransactions[1], 0, uint256());

        return dummyTransactions;
    }

    BOOST_AUTO_TEST_CASE(get_test)
    {
        BOOST_TEST_MESSAGE("Running Get Test");

        CBasicKeyStore keystore;
        CCoinsView coinsDummy;
        CCoinsViewCache coins(&coinsDummy);
        std::vector<CMutableTransaction> dummyTransactions = SetupDummyInputs(keystore, coins);

        CMutableTransaction t1;
        t1.vin.resize(3);
        t1.vin[0].prevout.hash = dummyTransactions[0].GetHash();
        t1.vin[0].prevout.n = 1;
        t1.vin[0].scriptSig << std::vector<unsigned char>(65, 0);
        t1.vin[1].prevout.hash = dummyTransactions[1].GetHash();
        t1.vin[1].prevout.n = 0;
        t1.vin[1].scriptSig << std::vector<unsigned char>(65, 0) << std::vector<unsigned char>(33, 4);
        t1.vin[2].prevout.hash = dummyTransactions[1].GetHash();
        t1.vin[2].prevout.n = 1;
        t1.vin[2].scriptSig << std::vector<unsigned char>(65, 0) << std::vector<unsigned char>(33, 4);
        t1.vout.resize(2);
        t1.vout[0].nValue = 90 * CENT;
        t1.vout[0].scriptPubKey << OP_1;

        BOOST_CHECK(AreInputsStandard(t1, coins));
        BOOST_CHECK_EQUAL(coins.GetValueIn(t1), (50 + 21 + 22) * CENT);
    }

    void CreateCreditAndSpend(const CKeyStore &keystore, const CScript &outscript, CTransactionRef &output, CMutableTransaction &input, bool success = true)
    {
        CMutableTransaction outputm;
        outputm.nVersion = 1;
        outputm.vin.resize(1);
        outputm.vin[0].prevout.SetNull();
        outputm.vin[0].scriptSig = CScript();
        outputm.vout.resize(1);
        outputm.vout[0].nValue = 1;
        outputm.vout[0].scriptPubKey = outscript;
        CDataStream ssout(SER_NETWORK, PROTOCOL_VERSION);
        ssout << outputm;
        ssout >> output;
        assert(output->vin.size() == 1);
        assert(output->vin[0] == outputm.vin[0]);
        assert(output->vout.size() == 1);
        assert(output->vout[0] == outputm.vout[0]);

        CMutableTransaction inputm;
        inputm.nVersion = 1;
        inputm.vin.resize(1);
        inputm.vin[0].prevout.hash = output->GetHash();
        inputm.vin[0].prevout.n = 0;
        inputm.vout.resize(1);
        inputm.vout[0].nValue = 1;
        inputm.vout[0].scriptPubKey = CScript();
        bool ret = SignSignature(keystore, *output, inputm, 0, SIGHASH_ALL);
        assert(ret == success);
        CDataStream ssin(SER_NETWORK, PROTOCOL_VERSION);
        ssin << inputm;
        ssin >> input;
        assert(input.vin.size() == 1);
        assert(input.vin[0] == inputm.vin[0]);
        assert(input.vout.size() == 1);
        assert(input.vout[0] == inputm.vout[0]);
        assert(input.vin[0].scriptWitness.stack == inputm.vin[0].scriptWitness.stack);
    }

    void CheckWithFlag(const CTransactionRef &output, const CMutableTransaction &input, int flags, bool success)
    {
        ScriptError error;
        CTransaction inputi(input);
        bool ret = VerifyScript(inputi.vin[0].scriptSig, output->vout[0].scriptPubKey, &inputi.vin[0].scriptWitness, flags, TransactionSignatureChecker(&inputi, 0, output->vout[0].nValue), &error);
        assert(ret == success);
    }

    static CScript PushAll(const std::vector<valtype> &values)
    {
        CScript result;
        for (const valtype &v : values)
        {
            if (v.size() == 0)
            {
                result << OP_0;
            } else if (v.size() == 1 && v[0] >= 1 && v[0] <= 16)
            {
                result << CScript::EncodeOP_N(v[0]);
            } else
            {
                result << v;
            }
        }
        return result;
    }

    void ReplaceRedeemScript(CScript &script, const CScript &redeemScript)
    {
        std::vector<valtype> stack;
        EvalScript(stack, script, SCRIPT_VERIFY_STRICTENC, BaseSignatureChecker(), SIGVERSION_BASE);
        assert(stack.size() > 0);
        stack.back() = std::vector<unsigned char>(redeemScript.begin(), redeemScript.end());
        script = PushAll(stack);
    }

    BOOST_AUTO_TEST_CASE(big_witness_transaction_test)
    {
        BOOST_TEST_MESSAGE("Running Big Witness Transaction Test");

        CMutableTransaction mtx;
        mtx.nVersion = 1;

        CKey key;
        key.MakeNewKey(true); // Need to use compressed keys in segwit or the signing will fail
        CBasicKeyStore keystore;
        keystore.AddKeyPubKey(key, key.GetPubKey());
        CKeyID hash = key.GetPubKey().GetID();
        CScript scriptPubKey = CScript() << OP_0 << std::vector<unsigned char>(hash.begin(), hash.end());

        std::vector<int> sigHashes;
        sigHashes.push_back(SIGHASH_NONE | SIGHASH_ANYONECANPAY);
        sigHashes.push_back(SIGHASH_SINGLE | SIGHASH_ANYONECANPAY);
        sigHashes.push_back(SIGHASH_ALL | SIGHASH_ANYONECANPAY);
        sigHashes.push_back(SIGHASH_NONE);
        sigHashes.push_back(SIGHASH_SINGLE);
        sigHashes.push_back(SIGHASH_ALL);

        // create a big transaction of 4500 inputs signed by the same key
        for (uint32_t ij = 0; ij < 4500; ij++)
        {
            uint32_t i = mtx.vin.size();
            uint256 prevId;
            prevId.SetHex("0000000000000000000000000000000000000000000000000000000000000100");
            COutPoint outpoint(prevId, i);

            mtx.vin.resize(mtx.vin.size() + 1);
            mtx.vin[i].prevout = outpoint;
            mtx.vin[i].scriptSig = CScript();

            mtx.vout.resize(mtx.vout.size() + 1);
            mtx.vout[i].nValue = 1000;
            mtx.vout[i].scriptPubKey = CScript() << OP_1;
        }

        // sign all inputs
        for (uint32_t i = 0; i < mtx.vin.size(); i++)
        {
            bool hashSigned = SignSignature(keystore, scriptPubKey, mtx, i, 1000, sigHashes.at(i % sigHashes.size()));
            assert(hashSigned);
        }

        CDataStream ssout(SER_NETWORK, PROTOCOL_VERSION);
        auto vstream = WithOrVersion(&ssout, 0);
        vstream << mtx;
        CTransaction tx(deserialize, vstream);

        // check all inputs concurrently, with the cache
        PrecomputedTransactionData txdata(tx);
        boost::thread_group threadGroup;
        CCheckQueue<CScriptCheck> scriptcheckqueue(128);
        CCheckQueueControl<CScriptCheck> control(&scriptcheckqueue);

        for (int i = 0; i < 20; i++)
            threadGroup.create_thread(boost::bind(&CCheckQueue<CScriptCheck>::Thread, boost::ref(scriptcheckqueue)));

        std::vector<Coin> coins;
        for (uint32_t i = 0; i < mtx.vin.size(); i++)
        {
            Coin coin;
            coin.nHeight = 1;
            coin.fCoinBase = false;
            coin.out.nValue = 1000;
            coin.out.scriptPubKey = scriptPubKey;
            coins.emplace_back(std::move(coin));
        }

        for (uint32_t i = 0; i < mtx.vin.size(); i++)
        {
            std::vector<CScriptCheck> vChecks;
            CScriptCheck check(coins[tx.vin[i].prevout.n].out, tx, i, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, false, &txdata);
            vChecks.push_back(CScriptCheck());
            check.swap(vChecks.back());
            control.Add(vChecks);
        }

        bool controlCheck = control.Wait();
        assert(controlCheck);

        threadGroup.interrupt_all();
        threadGroup.join_all();
    }

    BOOST_AUTO_TEST_CASE(witness_test)
    {
        BOOST_TEST_MESSAGE("Running Witness Test");

        CBasicKeyStore keystore, keystore2;
        CKey key1, key2, key3, key1L, key2L;
        CPubKey pubkey1, pubkey2, pubkey3, pubkey1L, pubkey2L;
        key1.MakeNewKey(true);
        key2.MakeNewKey(true);
        key3.MakeNewKey(true);
        key1L.MakeNewKey(false);
        key2L.MakeNewKey(false);
        pubkey1 = key1.GetPubKey();
        pubkey2 = key2.GetPubKey();
        pubkey3 = key3.GetPubKey();
        pubkey1L = key1L.GetPubKey();
        pubkey2L = key2L.GetPubKey();
        keystore.AddKeyPubKey(key1, pubkey1);
        keystore.AddKeyPubKey(key2, pubkey2);
        keystore.AddKeyPubKey(key1L, pubkey1L);
        keystore.AddKeyPubKey(key2L, pubkey2L);
        CScript scriptPubkey1, scriptPubkey2, scriptPubkey1L, scriptPubkey2L, scriptMulti;
        scriptPubkey1 << ToByteVector(pubkey1) << OP_CHECKSIG;
        scriptPubkey2 << ToByteVector(pubkey2) << OP_CHECKSIG;
        scriptPubkey1L << ToByteVector(pubkey1L) << OP_CHECKSIG;
        scriptPubkey2L << ToByteVector(pubkey2L) << OP_CHECKSIG;
        std::vector<CPubKey> oneandthree;
        oneandthree.push_back(pubkey1);
        oneandthree.push_back(pubkey3);
        scriptMulti = GetScriptForMultisig(2, oneandthree);
        keystore.AddCScript(scriptPubkey1);
        keystore.AddCScript(scriptPubkey2);
        keystore.AddCScript(scriptPubkey1L);
        keystore.AddCScript(scriptPubkey2L);
        keystore.AddCScript(scriptMulti);
        keystore.AddCScript(GetScriptForWitness(scriptPubkey1));
        keystore.AddCScript(GetScriptForWitness(scriptPubkey2));
        keystore.AddCScript(GetScriptForWitness(scriptPubkey1L));
        keystore.AddCScript(GetScriptForWitness(scriptPubkey2L));
        keystore.AddCScript(GetScriptForWitness(scriptMulti));
        keystore2.AddCScript(scriptMulti);
        keystore2.AddCScript(GetScriptForWitness(scriptMulti));
        keystore2.AddKeyPubKey(key3, pubkey3);

        CTransactionRef output1, output2;
        CMutableTransaction input1, input2;
        SignatureData sigdata;

        // Normal pay-to-compressed-pubkey.
        CreateCreditAndSpend(keystore, scriptPubkey1, output1, input1);
        CreateCreditAndSpend(keystore, scriptPubkey2, output2, input2);
        CheckWithFlag(output1, input1, 0, true);
        CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
        CheckWithFlag(output1, input1, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, true);
        CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
        CheckWithFlag(output1, input2, 0, false);
        CheckWithFlag(output1, input2, SCRIPT_VERIFY_P2SH, false);
        CheckWithFlag(output1, input2, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, false);
        CheckWithFlag(output1, input2, STANDARD_SCRIPT_VERIFY_FLAGS, false);

        // P2SH pay-to-compressed-pubkey.
        CreateCreditAndSpend(keystore, GetScriptForDestination(CScriptID(scriptPubkey1)), output1, input1);
        CreateCreditAndSpend(keystore, GetScriptForDestination(CScriptID(scriptPubkey2)), output2, input2);
        ReplaceRedeemScript(input2.vin[0].scriptSig, scriptPubkey1);
        CheckWithFlag(output1, input1, 0, true);
        CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
        CheckWithFlag(output1, input1, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, true);
        CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
        CheckWithFlag(output1, input2, 0, true);
        CheckWithFlag(output1, input2, SCRIPT_VERIFY_P2SH, false);
        CheckWithFlag(output1, input2, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, false);
        CheckWithFlag(output1, input2, STANDARD_SCRIPT_VERIFY_FLAGS, false);

        // Witness pay-to-compressed-pubkey (v0).
        CreateCreditAndSpend(keystore, GetScriptForWitness(scriptPubkey1), output1, input1);
        CreateCreditAndSpend(keystore, GetScriptForWitness(scriptPubkey2), output2, input2);
        CheckWithFlag(output1, input1, 0, true);
        CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
        CheckWithFlag(output1, input1, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, true);
        CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
        CheckWithFlag(output1, input2, 0, true);
        CheckWithFlag(output1, input2, SCRIPT_VERIFY_P2SH, true);
        CheckWithFlag(output1, input2, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, false);
        CheckWithFlag(output1, input2, STANDARD_SCRIPT_VERIFY_FLAGS, false);

        // P2SH witness pay-to-compressed-pubkey (v0).
        CreateCreditAndSpend(keystore, GetScriptForDestination(CScriptID(GetScriptForWitness(scriptPubkey1))), output1, input1);
        CreateCreditAndSpend(keystore, GetScriptForDestination(CScriptID(GetScriptForWitness(scriptPubkey2))), output2, input2);
        ReplaceRedeemScript(input2.vin[0].scriptSig, GetScriptForWitness(scriptPubkey1));
        CheckWithFlag(output1, input1, 0, true);
        CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
        CheckWithFlag(output1, input1, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, true);
        CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
        CheckWithFlag(output1, input2, 0, true);
        CheckWithFlag(output1, input2, SCRIPT_VERIFY_P2SH, true);
        CheckWithFlag(output1, input2, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, false);
        CheckWithFlag(output1, input2, STANDARD_SCRIPT_VERIFY_FLAGS, false);

        // Normal pay-to-uncompressed-pubkey.
        CreateCreditAndSpend(keystore, scriptPubkey1L, output1, input1);
        CreateCreditAndSpend(keystore, scriptPubkey2L, output2, input2);
        CheckWithFlag(output1, input1, 0, true);
        CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
        CheckWithFlag(output1, input1, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, true);
        CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
        CheckWithFlag(output1, input2, 0, false);
        CheckWithFlag(output1, input2, SCRIPT_VERIFY_P2SH, false);
        CheckWithFlag(output1, input2, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, false);
        CheckWithFlag(output1, input2, STANDARD_SCRIPT_VERIFY_FLAGS, false);

        // P2SH pay-to-uncompressed-pubkey.
        CreateCreditAndSpend(keystore, GetScriptForDestination(CScriptID(scriptPubkey1L)), output1, input1);
        CreateCreditAndSpend(keystore, GetScriptForDestination(CScriptID(scriptPubkey2L)), output2, input2);
        ReplaceRedeemScript(input2.vin[0].scriptSig, scriptPubkey1L);
        CheckWithFlag(output1, input1, 0, true);
        CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
        CheckWithFlag(output1, input1, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, true);
        CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
        CheckWithFlag(output1, input2, 0, true);
        CheckWithFlag(output1, input2, SCRIPT_VERIFY_P2SH, false);
        CheckWithFlag(output1, input2, SCRIPT_VERIFY_WITNESS | SCRIPT_VERIFY_P2SH, false);
        CheckWithFlag(output1, input2, STANDARD_SCRIPT_VERIFY_FLAGS, false);

        // Signing disabled for witness pay-to-uncompressed-pubkey (v1).
        CreateCreditAndSpend(keystore, GetScriptForWitness(scriptPubkey1L), output1, input1, false);
        CreateCreditAndSpend(keystore, GetScriptForWitness(scriptPubkey2L), output2, input2, false);

        // Signing disabled for P2SH witness pay-to-uncompressed-pubkey (v1).
        CreateCreditAndSpend(keystore, GetScriptForDestination(CScriptID(GetScriptForWitness(scriptPubkey1L))), output1, input1, false);
        CreateCreditAndSpend(keystore, GetScriptForDestination(CScriptID(GetScriptForWitness(scriptPubkey2L))), output2, input2, false);

        // Normal 2-of-2 multisig
        CreateCreditAndSpend(keystore, scriptMulti, output1, input1, false);
        CheckWithFlag(output1, input1, 0, false);
        CreateCreditAndSpend(keystore2, scriptMulti, output2, input2, false);
        CheckWithFlag(output2, input2, 0, false);
        BOOST_CHECK(*output1 == *output2);
        UpdateTransaction(input1, 0, CombineSignatures(output1->vout[0].scriptPubKey, MutableTransactionSignatureChecker(&input1, 0, output1->vout[0].nValue), DataFromTransaction(input1, 0), DataFromTransaction(input2, 0)));
        CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);

        // P2SH 2-of-2 multisig
        CreateCreditAndSpend(keystore, GetScriptForDestination(CScriptID(scriptMulti)), output1, input1, false);
        CheckWithFlag(output1, input1, 0, true);
        CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, false);
        CreateCreditAndSpend(keystore2, GetScriptForDestination(CScriptID(scriptMulti)), output2, input2, false);
        CheckWithFlag(output2, input2, 0, true);
        CheckWithFlag(output2, input2, SCRIPT_VERIFY_P2SH, false);
        BOOST_CHECK(*output1 == *output2);
        UpdateTransaction(input1, 0, CombineSignatures(output1->vout[0].scriptPubKey, MutableTransactionSignatureChecker(&input1, 0, output1->vout[0].nValue), DataFromTransaction(input1, 0), DataFromTransaction(input2, 0)));
        CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
        CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);

        // Witness 2-of-2 multisig
        CreateCreditAndSpend(keystore, GetScriptForWitness(scriptMulti), output1, input1, false);
        CheckWithFlag(output1, input1, 0, true);
        CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, false);
        CreateCreditAndSpend(keystore2, GetScriptForWitness(scriptMulti), output2, input2, false);
        CheckWithFlag(output2, input2, 0, true);
        CheckWithFlag(output2, input2, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, false);
        BOOST_CHECK(*output1 == *output2);
        UpdateTransaction(input1, 0, CombineSignatures(output1->vout[0].scriptPubKey, MutableTransactionSignatureChecker(&input1, 0, output1->vout[0].nValue), DataFromTransaction(input1, 0), DataFromTransaction(input2, 0)));
        CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, true);
        CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);

        // P2SH witness 2-of-2 multisig
        CreateCreditAndSpend(keystore, GetScriptForDestination(CScriptID(GetScriptForWitness(scriptMulti))), output1, input1, false);
        CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH, true);
        CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, false);
        CreateCreditAndSpend(keystore2, GetScriptForDestination(CScriptID(GetScriptForWitness(scriptMulti))), output2, input2, false);
        CheckWithFlag(output2, input2, SCRIPT_VERIFY_P2SH, true);
        CheckWithFlag(output2, input2, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, false);
        BOOST_CHECK(*output1 == *output2);
        UpdateTransaction(input1, 0, CombineSignatures(output1->vout[0].scriptPubKey, MutableTransactionSignatureChecker(&input1, 0, output1->vout[0].nValue), DataFromTransaction(input1, 0), DataFromTransaction(input2, 0)));
        CheckWithFlag(output1, input1, SCRIPT_VERIFY_P2SH | SCRIPT_VERIFY_WITNESS, true);
        CheckWithFlag(output1, input1, STANDARD_SCRIPT_VERIFY_FLAGS, true);
    }

    BOOST_AUTO_TEST_CASE(IsStandard_test)
    {
        BOOST_TEST_MESSAGE("Running IsStandard Test");

        LOCK(cs_main);
        CBasicKeyStore keystore;
        CCoinsView coinsDummy;
        CCoinsViewCache coins(&coinsDummy);
        std::vector<CMutableTransaction> dummyTransactions = SetupDummyInputs(keystore, coins);

        CMutableTransaction t;
        t.vin.resize(1);
        t.vin[0].prevout.hash = dummyTransactions[0].GetHash();
        t.vin[0].prevout.n = 1;
        t.vin[0].scriptSig << std::vector<unsigned char>(65, 0);
        t.vout.resize(1);
        t.vout[0].nValue = 90 * CENT;
        CKey key;
        key.MakeNewKey(true);
        t.vout[0].scriptPubKey = GetScriptForDestination(key.GetPubKey().GetID());

        std::string reason;
        BOOST_CHECK(IsStandardTx(t, reason));

        // Check dust with default relay fee:
        CAmount nDustThreshold = 182 * dustRelayFee.GetFeePerK() / 1000;
        BOOST_CHECK_EQUAL(nDustThreshold, 546);
        // dust:
        t.vout[0].nValue = nDustThreshold - 1;
        BOOST_CHECK(!IsStandardTx(t, reason));
        // not dust:
        t.vout[0].nValue = nDustThreshold;
        BOOST_CHECK(IsStandardTx(t, reason));

        // Check dust with odd relay fee to verify rounding:
        // nDustThreshold = 182 * 3702 / 1000
        dustRelayFee = CFeeRate(3702);
        // dust:
        t.vout[0].nValue = 673 - 1;
        BOOST_CHECK(!IsStandardTx(t, reason));
        // not dust:
        t.vout[0].nValue = 673;
        BOOST_CHECK(IsStandardTx(t, reason));
        dustRelayFee = CFeeRate(DUST_RELAY_TX_FEE);

        t.vout[0].scriptPubKey = CScript() << OP_1;
        BOOST_CHECK(!IsStandardTx(t, reason));

        // MAX_OP_RETURN_RELAY-byte TX_NULL_DATA (standard)
        t.vout[0].scriptPubKey = CScript() << OP_RETURN
                                           << ParseHex("04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef3804678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38");
        BOOST_CHECK_EQUAL(MAX_OP_RETURN_RELAY, t.vout[0].scriptPubKey.size());
        BOOST_CHECK(IsStandardTx(t, reason));

        // MAX_OP_RETURN_RELAY+1-byte TX_NULL_DATA (non-standard)
        t.vout[0].scriptPubKey = CScript() << OP_RETURN
                                           << ParseHex("04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef3804678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef3800");
        BOOST_CHECK_EQUAL(MAX_OP_RETURN_RELAY + 1, t.vout[0].scriptPubKey.size());
        BOOST_CHECK(!IsStandardTx(t, reason));

        // MAX_OP_RETURN_RELAY-byte TX_RESTRICTED_ASSET_DATA(standard)
        // The text after OP_RVN_ASSET, will be an address if it isn't another OP_RVN_ASSET
        t.vout[0].scriptPubKey = CScript() << OP_RVN_ASSET
                                           << ParseHex("04678fdab0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef3804678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38");
        BOOST_CHECK_EQUAL(MAX_OP_RETURN_RELAY, t.vout[0].scriptPubKey.size());
        BOOST_CHECK(IsStandardTx(t, reason));

        // MAX_OP_RETURN_RELAY+1-byte TX_RESTRICTED_ASSET_DATA (non-standard)
        t.vout[0].scriptPubKey = CScript() << OP_RVN_ASSET
                                           << ParseHex("04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef3804678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef3800");
        BOOST_CHECK_EQUAL(MAX_OP_RETURN_RELAY + 1, t.vout[0].scriptPubKey.size());
        BOOST_CHECK(!IsStandardTx(t, reason));

        // Data payload can be encoded in any way...
        t.vout[0].scriptPubKey = CScript() << OP_RETURN << ParseHex("");
        BOOST_CHECK(IsStandardTx(t, reason));
        t.vout[0].scriptPubKey = CScript() << OP_RETURN << ParseHex("00") << ParseHex("01");
        BOOST_CHECK(IsStandardTx(t, reason));
        // OP_RESERVED *is* considered to be a PUSHDATA type opcode by IsPushOnly()!
        t.vout[0].scriptPubKey =
                CScript() << OP_RETURN << OP_RESERVED << -1 << 0 << ParseHex("01") << 2 << 3 << 4 << 5 << 6 << 7 << 8
                          << 9 << 10 << 11 << 12 << 13 << 14 << 15 << 16;
        BOOST_CHECK(IsStandardTx(t, reason));
        t.vout[0].scriptPubKey = CScript() << OP_RETURN << 0 << ParseHex("01") << 2
                                           << ParseHex("ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff");
        BOOST_CHECK(IsStandardTx(t, reason));

        // ...so long as it only contains PUSHDATA's
        t.vout[0].scriptPubKey = CScript() << OP_RETURN << OP_RETURN;
        BOOST_CHECK(!IsStandardTx(t, reason));

        // TX_NULL_DATA w/o PUSHDATA
        t.vout.resize(1);
        t.vout[0].scriptPubKey = CScript() << OP_RETURN;
        BOOST_CHECK(IsStandardTx(t, reason));

        // Only one TX_NULL_DATA permitted in all cases
        t.vout.resize(2);
        t.vout[0].scriptPubKey = CScript() << OP_RETURN
                                           << ParseHex("04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38");
        t.vout[1].scriptPubKey = CScript() << OP_RETURN
                                           << ParseHex("04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38");
        BOOST_CHECK(!IsStandardTx(t, reason));

        t.vout[0].scriptPubKey = CScript() << OP_RETURN
                                           << ParseHex("04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38");
        t.vout[1].scriptPubKey = CScript() << OP_RETURN;
        BOOST_CHECK(!IsStandardTx(t, reason));

        t.vout[0].scriptPubKey = CScript() << OP_RETURN;
        t.vout[1].scriptPubKey = CScript() << OP_RETURN;
        BOOST_CHECK(!IsStandardTx(t, reason));

        // Asset data checks
        // Data payload can be encoded in any way...
        t.vout[0].scriptPubKey = CScript() << OP_RVN_ASSET << ParseHex("");
        BOOST_CHECK(IsStandardTx(t, reason));
        t.vout[0].scriptPubKey = CScript() << OP_RVN_ASSET << ParseHex("00") << ParseHex("01");
        BOOST_CHECK(IsStandardTx(t, reason));
        // OP_RESERVED *is* considered to be a PUSHDATA type opcode by IsPushOnly()!
        t.vout[0].scriptPubKey =
                CScript() << OP_RVN_ASSET << OP_RESERVED << -1 << 0 << ParseHex("01") << 2 << 3 << 4 << 5 << 6 << 7 << 8
                          << 9 << 10 << 11 << 12 << 13 << 14 << 15 << 16;
        BOOST_CHECK(IsStandardTx(t, reason));
        t.vout[0].scriptPubKey = CScript() << OP_RVN_ASSET << 0 << ParseHex("01") << 2
                                           << ParseHex("ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff");
        BOOST_CHECK(IsStandardTx(t, reason));

        // ...so long as it only contains PUSHDATA's don't check the first three bytes on OP_RVN_ASSET TX's
        t.vout[0].scriptPubKey = CScript() << OP_RVN_ASSET << OP_RESERVED;
        BOOST_CHECK(IsStandardTx(t, reason));

        t.vout[0].scriptPubKey = CScript() << OP_RVN_ASSET << OP_RESERVED << OP_RESERVED << OP_RVN_ASSET;
        BOOST_CHECK(!IsStandardTx(t, reason));

        // TX_RESTRICTED_ASSET_DATA w/o PUSHDATA
        t.vout.resize(1);
        t.vout[0].scriptPubKey = CScript() << OP_RVN_ASSET;
        BOOST_CHECK(IsStandardTx(t, reason));

        // Only one hundred TX_RESTRICTED_ASSET_DATA permitted in all cases
        t.vout.resize(101);
        for (int i = 0; i < 101; i++) {
            t.vout[i].scriptPubKey = CScript() << OP_RVN_ASSET
                                               << ParseHex(
                                                       "04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38");
        }
        BOOST_CHECK(!IsStandardTx(t, reason));

        t.vout[0].scriptPubKey = CScript() << OP_RVN_ASSET
                                           << ParseHex("04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38");
        for (int i = 1; i < 101; i++) {
            t.vout[i].scriptPubKey = CScript() << OP_RVN_ASSET;
        }
        BOOST_CHECK(!IsStandardTx(t, reason));

        t.vout.clear();
        t.vout.resize(99);
        for (int i = 0; i < 99; i++)
            t.vout[i].scriptPubKey = CScript() << OP_RVN_ASSET;
        BOOST_CHECK(IsStandardTx(t, reason));
    }

BOOST_AUTO_TEST_SUITE_END()
