Zebra/zebra-chain/src/transaction
teor b600e82d6e
Security: Avoid silently corrupting invalid times during serialization (#2149)
* Security: panic if an internally generated time is out of range

If Zebra has a bug where it generates blocks, transactions, or meta
addresses with bad times, panic. This avoids sending bad data onto the
network.

(Previously, Zebra would truncate some of these times, silently
corrupting the underlying data.)

Make it clear that deserialization of these objects is infalliable.
2021-05-17 16:53:10 -04:00
..
tests Validate nConsensusBranchId (#2100) 2021-05-10 01:31:45 +00:00
arbitrary.rs Validate nConsensusBranchId (#2100) 2021-05-10 01:31:45 +00:00
hash.rs Call `zebra_test::init` where needed. (#1227) 2020-11-10 10:29:25 +10:00
joinsplit.rs Redesign Sapling data model for V5 shared anchor and spends (#2021) 2021-04-20 16:22:25 +10:00
lock_time.rs Security: Avoid silently corrupting invalid times during serialization (#2149) 2021-05-17 16:53:10 -04:00
memo.rs Fix a test failure due to ' debug format changes in Rust 2021-04-14 23:45:36 -04:00
serialize.rs Orchard: some Action (de)serialization fixes 2021-04-30 00:48:23 -04:00
sighash.rs Rename shielded_data to sapling_shielded_data as needed (#2072) 2021-04-27 10:37:53 -03:00
tests.rs Move the preallocate tests into their own files (#1977) 2021-04-07 12:32:27 +10:00