Nonstandard witness when constructing a transaction


i attempt to spend a P2WSH 2of2 multisig enter in Python for studying functions.
When i verify my assembled TX with testmempoolaccept i get “bad-witness-nonstandard”.

That is my perform to assemble the witness:

def get_p2wsh_witness(privs: Listing[bytes], msg: bytes) -> bytes:
    sigs = [sign(priv, msg) for priv in privs]
    witness = bytes.fromhex("04")
    witness += bytes.fromhex("00")
    for sig in sigs:
        witness += len(sig).to_bytes(1, "little") + sig
    musig_script = b""
    op2 = bytes.fromhex("52")
    op_checkmultisig = bytes.fromhex("ae")
    musig_script += op2
    for key in privs:
        key = get_pub_from_priv(key)
        musig_script += bytes.fromhex("21")  # 33 bytes
        musig_script += key
    musig_script += op2
    musig_script += op_checkmultisig
    musig_script = len(musig_script).to_bytes(1, "little") + musig_script
    witness += musig_script
    return witness

That is how i assembled the dedication hash:

def get_commitment_hash(outpoint: bytes, scriptcode: bytes, worth: int, outputs: Listing[bytes]) -> bytes:
    def dsha256(knowledge: bytes) -> bytes:
        return hashlib.new("sha256", hashlib.new("sha256", knowledge).digest()).digest()
    end result = b""
    end result += (2).to_bytes(4, "little")
    end result += dsha256(outpoint)  # hashPrevouts
    end result += dsha256(bytes.fromhex("ffffffff"))
    end result += outpoint
    # Handed scriptcode (hex): 522103abd618be2d6e412bb31457bf416cf05138592da9ab4c9647a79577492710eacb2103bc2e2480bd8f5a66d45ceb333db45a980283a3c55df3c23eed22f30aa99e82e852ae 
    if len(scriptcode) > 30:
        end result += len(scriptcode).to_bytes(1, "little") + scriptcode
    else:
        end result += scriptcode
    end result += worth.to_bytes(8, "little")
    end result += bytes.fromhex("ffffffff")
    end result += dsha256(b"".be part of(outputs))
    end result += bytes.fromhex("00000000")
    end result += bytes.fromhex("01000000")
    return dsha256(end result)

That is the UTXO’s origin transaction:

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
0400483045022100ec7dfded7d97f8d990d8470b0855a705c118dff718aed9f5a6c5faa24c33a03402207919d822f44bb3a36ffb0771e2e4dc99688e002e26a71fc53224eba84aa526d6014830450221009535cda9d3533a8b95ab3cbd8004b1fc4d689d5104ae0c027b4e857a6345e54b022020b8df4231a2fb0fbcbf2d7593f0fbdb63d72feea04167afcd1708fba130dd8a0147522103abd618be2d6e412bb31457bf416cf05138592da9ab4c9647a79577492710eacb2103bc2e2480bd8f5a66d45ceb333db45a980283a3c55df3c23eed22f30aa99e82e852ae

These are the (non-public signet) non-public keys in hex to signal with:

3e2d99b06d1e763e8a208d0f2522432596fc1ae75825e777fb6b04ecf7260848 27d7edd524be491da6f5996e830e92b5477844800155e47f672cd5527f3a0e7d

Can anyone see an apparent mistake right here, assuming signal() and the given keys are appropriate, or give a touch on how one can confirm the output myself?

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles