/Users/eugenesiegel/btc/bitcoin/src/script/sign.cpp
| Line | Count | Source (jump to first uncovered line) | 
| 1 |  | // Copyright (c) 2009-2010 Satoshi Nakamoto | 
| 2 |  | // Copyright (c) 2009-present The Bitcoin Core developers | 
| 3 |  | // Distributed under the MIT software license, see the accompanying | 
| 4 |  | // file COPYING or http://www.opensource.org/licenses/mit-license.php. | 
| 5 |  |  | 
| 6 |  | #include <script/sign.h> | 
| 7 |  |  | 
| 8 |  | #include <consensus/amount.h> | 
| 9 |  | #include <key.h> | 
| 10 |  | #include <policy/policy.h> | 
| 11 |  | #include <primitives/transaction.h> | 
| 12 |  | #include <script/keyorigin.h> | 
| 13 |  | #include <script/miniscript.h> | 
| 14 |  | #include <script/script.h> | 
| 15 |  | #include <script/signingprovider.h> | 
| 16 |  | #include <script/solver.h> | 
| 17 |  | #include <uint256.h> | 
| 18 |  | #include <util/translation.h> | 
| 19 |  | #include <util/vector.h> | 
| 20 |  |  | 
| 21 |  | typedef std::vector<unsigned char> valtype; | 
| 22 |  |  | 
| 23 |  | MutableTransactionSignatureCreator::MutableTransactionSignatureCreator(const CMutableTransaction& tx, unsigned int input_idx, const CAmount& amount, int hash_type) | 
| 24 | 0 |     : m_txto{tx}, nIn{input_idx}, nHashType{hash_type}, amount{amount}, checker{&m_txto, nIn, amount, MissingDataBehavior::FAIL}, | 
| 25 | 0 |       m_txdata(nullptr) | 
| 26 | 0 | { | 
| 27 | 0 | } | 
| 28 |  |  | 
| 29 |  | MutableTransactionSignatureCreator::MutableTransactionSignatureCreator(const CMutableTransaction& tx, unsigned int input_idx, const CAmount& amount, const PrecomputedTransactionData* txdata, int hash_type) | 
| 30 | 0 |     : m_txto{tx}, nIn{input_idx}, nHashType{hash_type}, amount{amount}, | 
| 31 | 0 |       checker{txdata ? MutableTransactionSignatureChecker{&m_txto, nIn, amount, *txdata, MissingDataBehavior::FAIL} : | 
| 32 | 0 |                        MutableTransactionSignatureChecker{&m_txto, nIn, amount, MissingDataBehavior::FAIL}}, | 
| 33 | 0 |       m_txdata(txdata) | 
| 34 | 0 | { | 
| 35 | 0 | } | 
| 36 |  |  | 
| 37 |  | bool MutableTransactionSignatureCreator::CreateSig(const SigningProvider& provider, std::vector<unsigned char>& vchSig, const CKeyID& address, const CScript& scriptCode, SigVersion sigversion) const | 
| 38 | 0 | { | 
| 39 | 0 |     assert(sigversion == SigVersion::BASE || sigversion == SigVersion::WITNESS_V0); | 
| 40 |  |  | 
| 41 | 0 |     CKey key; | 
| 42 | 0 |     if (!provider.GetKey(address, key)) | 
| 43 | 0 |         return false; | 
| 44 |  |  | 
| 45 |  |     // Signing with uncompressed keys is disabled in witness scripts | 
| 46 | 0 |     if (sigversion == SigVersion::WITNESS_V0 && !key.IsCompressed()) | 
| 47 | 0 |         return false; | 
| 48 |  |  | 
| 49 |  |     // Signing without known amount does not work in witness scripts. | 
| 50 | 0 |     if (sigversion == SigVersion::WITNESS_V0 && !MoneyRange(amount)) return false; | 
| 51 |  |  | 
| 52 |  |     // BASE/WITNESS_V0 signatures don't support explicit SIGHASH_DEFAULT, use SIGHASH_ALL instead. | 
| 53 | 0 |     const int hashtype = nHashType == SIGHASH_DEFAULT ? SIGHASH_ALL : nHashType; | 
| 54 |  | 
 | 
| 55 | 0 |     uint256 hash = SignatureHash(scriptCode, m_txto, nIn, hashtype, amount, sigversion, m_txdata); | 
| 56 | 0 |     if (!key.Sign(hash, vchSig)) | 
| 57 | 0 |         return false; | 
| 58 | 0 |     vchSig.push_back((unsigned char)hashtype); | 
| 59 | 0 |     return true; | 
| 60 | 0 | } | 
| 61 |  |  | 
| 62 |  | bool MutableTransactionSignatureCreator::CreateSchnorrSig(const SigningProvider& provider, std::vector<unsigned char>& sig, const XOnlyPubKey& pubkey, const uint256* leaf_hash, const uint256* merkle_root, SigVersion sigversion) const | 
| 63 | 0 | { | 
| 64 | 0 |     assert(sigversion == SigVersion::TAPROOT || sigversion == SigVersion::TAPSCRIPT); | 
| 65 |  |  | 
| 66 | 0 |     CKey key; | 
| 67 | 0 |     if (!provider.GetKeyByXOnly(pubkey, key)) return false; | 
| 68 |  |  | 
| 69 |  |     // BIP341/BIP342 signing needs lots of precomputed transaction data. While some | 
| 70 |  |     // (non-SIGHASH_DEFAULT) sighash modes exist that can work with just some subset | 
| 71 |  |     // of data present, for now, only support signing when everything is provided. | 
| 72 | 0 |     if (!m_txdata || !m_txdata->m_bip341_taproot_ready || !m_txdata->m_spent_outputs_ready) return false; | 
| 73 |  |  | 
| 74 | 0 |     ScriptExecutionData execdata; | 
| 75 | 0 |     execdata.m_annex_init = true; | 
| 76 | 0 |     execdata.m_annex_present = false; // Only support annex-less signing for now. | 
| 77 | 0 |     if (sigversion == SigVersion::TAPSCRIPT) { | 
| 78 | 0 |         execdata.m_codeseparator_pos_init = true; | 
| 79 | 0 |         execdata.m_codeseparator_pos = 0xFFFFFFFF; // Only support non-OP_CODESEPARATOR BIP342 signing for now. | 
| 80 | 0 |         if (!leaf_hash) return false; // BIP342 signing needs leaf hash. | 
| 81 | 0 |         execdata.m_tapleaf_hash_init = true; | 
| 82 | 0 |         execdata.m_tapleaf_hash = *leaf_hash; | 
| 83 | 0 |     } | 
| 84 | 0 |     uint256 hash; | 
| 85 | 0 |     if (!SignatureHashSchnorr(hash, execdata, m_txto, nIn, nHashType, sigversion, *m_txdata, MissingDataBehavior::FAIL)) return false; | 
| 86 | 0 |     sig.resize(64); | 
| 87 |  |     // Use uint256{} as aux_rnd for now. | 
| 88 | 0 |     if (!key.SignSchnorr(hash, sig, merkle_root, {})) return false; | 
| 89 | 0 |     if (nHashType) sig.push_back(nHashType); | 
| 90 | 0 |     return true; | 
| 91 | 0 | } | 
| 92 |  |  | 
| 93 |  | static bool GetCScript(const SigningProvider& provider, const SignatureData& sigdata, const CScriptID& scriptid, CScript& script) | 
| 94 | 0 | { | 
| 95 | 0 |     if (provider.GetCScript(scriptid, script)) { | 
| 96 | 0 |         return true; | 
| 97 | 0 |     } | 
| 98 |  |     // Look for scripts in SignatureData | 
| 99 | 0 |     if (CScriptID(sigdata.redeem_script) == scriptid) { | 
| 100 | 0 |         script = sigdata.redeem_script; | 
| 101 | 0 |         return true; | 
| 102 | 0 |     } else if (CScriptID(sigdata.witness_script) == scriptid) { | 
| 103 | 0 |         script = sigdata.witness_script; | 
| 104 | 0 |         return true; | 
| 105 | 0 |     } | 
| 106 | 0 |     return false; | 
| 107 | 0 | } | 
| 108 |  |  | 
| 109 |  | static bool GetPubKey(const SigningProvider& provider, const SignatureData& sigdata, const CKeyID& address, CPubKey& pubkey) | 
| 110 | 0 | { | 
| 111 |  |     // Look for pubkey in all partial sigs | 
| 112 | 0 |     const auto it = sigdata.signatures.find(address); | 
| 113 | 0 |     if (it != sigdata.signatures.end()) { | 
| 114 | 0 |         pubkey = it->second.first; | 
| 115 | 0 |         return true; | 
| 116 | 0 |     } | 
| 117 |  |     // Look for pubkey in pubkey lists | 
| 118 | 0 |     const auto& pk_it = sigdata.misc_pubkeys.find(address); | 
| 119 | 0 |     if (pk_it != sigdata.misc_pubkeys.end()) { | 
| 120 | 0 |         pubkey = pk_it->second.first; | 
| 121 | 0 |         return true; | 
| 122 | 0 |     } | 
| 123 | 0 |     const auto& tap_pk_it = sigdata.tap_pubkeys.find(address); | 
| 124 | 0 |     if (tap_pk_it != sigdata.tap_pubkeys.end()) { | 
| 125 | 0 |         pubkey = tap_pk_it->second.GetEvenCorrespondingCPubKey(); | 
| 126 | 0 |         return true; | 
| 127 | 0 |     } | 
| 128 |  |     // Query the underlying provider | 
| 129 | 0 |     return provider.GetPubKey(address, pubkey); | 
| 130 | 0 | } | 
| 131 |  |  | 
| 132 |  | static bool CreateSig(const BaseSignatureCreator& creator, SignatureData& sigdata, const SigningProvider& provider, std::vector<unsigned char>& sig_out, const CPubKey& pubkey, const CScript& scriptcode, SigVersion sigversion) | 
| 133 | 0 | { | 
| 134 | 0 |     CKeyID keyid = pubkey.GetID(); | 
| 135 | 0 |     const auto it = sigdata.signatures.find(keyid); | 
| 136 | 0 |     if (it != sigdata.signatures.end()) { | 
| 137 | 0 |         sig_out = it->second.second; | 
| 138 | 0 |         return true; | 
| 139 | 0 |     } | 
| 140 | 0 |     KeyOriginInfo info; | 
| 141 | 0 |     if (provider.GetKeyOrigin(keyid, info)) { | 
| 142 | 0 |         sigdata.misc_pubkeys.emplace(keyid, std::make_pair(pubkey, std::move(info))); | 
| 143 | 0 |     } | 
| 144 | 0 |     if (creator.CreateSig(provider, sig_out, keyid, scriptcode, sigversion)) { | 
| 145 | 0 |         auto i = sigdata.signatures.emplace(keyid, SigPair(pubkey, sig_out)); | 
| 146 | 0 |         assert(i.second); | 
| 147 | 0 |         return true; | 
| 148 | 0 |     } | 
| 149 |  |     // Could not make signature or signature not found, add keyid to missing | 
| 150 | 0 |     sigdata.missing_sigs.push_back(keyid); | 
| 151 | 0 |     return false; | 
| 152 | 0 | } | 
| 153 |  |  | 
| 154 |  | static bool CreateTaprootScriptSig(const BaseSignatureCreator& creator, SignatureData& sigdata, const SigningProvider& provider, std::vector<unsigned char>& sig_out, const XOnlyPubKey& pubkey, const uint256& leaf_hash, SigVersion sigversion) | 
| 155 | 0 | { | 
| 156 | 0 |     KeyOriginInfo info; | 
| 157 | 0 |     if (provider.GetKeyOriginByXOnly(pubkey, info)) { | 
| 158 | 0 |         auto it = sigdata.taproot_misc_pubkeys.find(pubkey); | 
| 159 | 0 |         if (it == sigdata.taproot_misc_pubkeys.end()) { | 
| 160 | 0 |             sigdata.taproot_misc_pubkeys.emplace(pubkey, std::make_pair(std::set<uint256>({leaf_hash}), info)); | 
| 161 | 0 |         } else { | 
| 162 | 0 |             it->second.first.insert(leaf_hash); | 
| 163 | 0 |         } | 
| 164 | 0 |     } | 
| 165 |  | 
 | 
| 166 | 0 |     auto lookup_key = std::make_pair(pubkey, leaf_hash); | 
| 167 | 0 |     auto it = sigdata.taproot_script_sigs.find(lookup_key); | 
| 168 | 0 |     if (it != sigdata.taproot_script_sigs.end()) { | 
| 169 | 0 |         sig_out = it->second; | 
| 170 | 0 |         return true; | 
| 171 | 0 |     } | 
| 172 | 0 |     if (creator.CreateSchnorrSig(provider, sig_out, pubkey, &leaf_hash, nullptr, sigversion)) { | 
| 173 | 0 |         sigdata.taproot_script_sigs[lookup_key] = sig_out; | 
| 174 | 0 |         return true; | 
| 175 | 0 |     } | 
| 176 | 0 |     return false; | 
| 177 | 0 | } | 
| 178 |  |  | 
| 179 |  | template<typename M, typename K, typename V> | 
| 180 |  | miniscript::Availability MsLookupHelper(const M& map, const K& key, V& value) | 
| 181 | 0 | { | 
| 182 | 0 |     auto it = map.find(key); | 
| 183 | 0 |     if (it != map.end()) { | 
| 184 | 0 |         value = it->second; | 
| 185 | 0 |         return miniscript::Availability::YES; | 
| 186 | 0 |     } | 
| 187 | 0 |     return miniscript::Availability::NO; | 
| 188 | 0 | } | 
| 189 |  |  | 
| 190 |  | /** | 
| 191 |  |  * Context for solving a Miniscript. | 
| 192 |  |  * If enough material (access to keys, hash preimages, ..) is given, produces a valid satisfaction. | 
| 193 |  |  */ | 
| 194 |  | template<typename Pk> | 
| 195 |  | struct Satisfier { | 
| 196 |  |     using Key = Pk; | 
| 197 |  |  | 
| 198 |  |     const SigningProvider& m_provider; | 
| 199 |  |     SignatureData& m_sig_data; | 
| 200 |  |     const BaseSignatureCreator& m_creator; | 
| 201 |  |     const CScript& m_witness_script; | 
| 202 |  |     //! The context of the script we are satisfying (either P2WSH or Tapscript). | 
| 203 |  |     const miniscript::MiniscriptContext m_script_ctx; | 
| 204 |  |  | 
| 205 |  |     explicit Satisfier(const SigningProvider& provider LIFETIMEBOUND, SignatureData& sig_data LIFETIMEBOUND, | 
| 206 |  |                        const BaseSignatureCreator& creator LIFETIMEBOUND, | 
| 207 |  |                        const CScript& witscript LIFETIMEBOUND, | 
| 208 | 0 |                        miniscript::MiniscriptContext script_ctx) : m_provider(provider), | 
| 209 | 0 |                                                                    m_sig_data(sig_data), | 
| 210 | 0 |                                                                    m_creator(creator), | 
| 211 | 0 |                                                                    m_witness_script(witscript), | 
| 212 | 0 |                                                                    m_script_ctx(script_ctx) {}Unexecuted instantiation: _ZN9SatisfierI11XOnlyPubKeyEC2ERK15SigningProviderR13SignatureDataRK20BaseSignatureCreatorRK7CScriptN10miniscript17MiniscriptContextEUnexecuted instantiation: _ZN9SatisfierI7CPubKeyEC2ERK15SigningProviderR13SignatureDataRK20BaseSignatureCreatorRK7CScriptN10miniscript17MiniscriptContextE | 
| 213 |  |  | 
| 214 | 0 |     static bool KeyCompare(const Key& a, const Key& b) { | 
| 215 | 0 |         return a < b; | 
| 216 | 0 |     } Unexecuted instantiation: _ZN9SatisfierI11XOnlyPubKeyE10KeyCompareERKS0_S3_Unexecuted instantiation: _ZN9SatisfierI7CPubKeyE10KeyCompareERKS0_S3_ | 
| 217 |  |  | 
| 218 |  |     //! Get a CPubKey from a key hash. Note the key hash may be of an xonly pubkey. | 
| 219 |  |     template<typename I> | 
| 220 | 0 |     std::optional<CPubKey> CPubFromPKHBytes(I first, I last) const { | 
| 221 | 0 |         assert(last - first == 20); | 
| 222 | 0 |         CPubKey pubkey; | 
| 223 | 0 |         CKeyID key_id; | 
| 224 | 0 |         std::copy(first, last, key_id.begin()); | 
| 225 | 0 |         if (GetPubKey(m_provider, m_sig_data, key_id, pubkey)) return pubkey; | 
| 226 | 0 |         m_sig_data.missing_pubkeys.push_back(key_id); | 
| 227 | 0 |         return {}; | 
| 228 | 0 |     } Unexecuted instantiation: _ZNK9SatisfierI11XOnlyPubKeyE16CPubFromPKHBytesINSt3__111__wrap_iterIPhEEEENS3_8optionalI7CPubKeyEET_SA_Unexecuted instantiation: _ZNK9SatisfierI7CPubKeyE16CPubFromPKHBytesINSt3__111__wrap_iterIPhEEEENS3_8optionalIS0_EET_S9_ | 
| 229 |  |  | 
| 230 |  |     //! Conversion to raw public key. | 
| 231 | 0 |     std::vector<unsigned char> ToPKBytes(const Key& key) const { return {key.begin(), key.end()}; }Unexecuted instantiation: _ZNK9SatisfierI11XOnlyPubKeyE9ToPKBytesERKS0_Unexecuted instantiation: _ZNK9SatisfierI7CPubKeyE9ToPKBytesERKS0_ | 
| 232 |  |  | 
| 233 |  |     //! Time lock satisfactions. | 
| 234 | 0 |     bool CheckAfter(uint32_t value) const { return m_creator.Checker().CheckLockTime(CScriptNum(value)); }Unexecuted instantiation: _ZNK9SatisfierI11XOnlyPubKeyE10CheckAfterEjUnexecuted instantiation: _ZNK9SatisfierI7CPubKeyE10CheckAfterEj | 
| 235 | 0 |     bool CheckOlder(uint32_t value) const { return m_creator.Checker().CheckSequence(CScriptNum(value)); }Unexecuted instantiation: _ZNK9SatisfierI11XOnlyPubKeyE10CheckOlderEjUnexecuted instantiation: _ZNK9SatisfierI7CPubKeyE10CheckOlderEj | 
| 236 |  |  | 
| 237 |  |     //! Hash preimage satisfactions. | 
| 238 | 0 |     miniscript::Availability SatSHA256(const std::vector<unsigned char>& hash, std::vector<unsigned char>& preimage) const { | 
| 239 | 0 |         return MsLookupHelper(m_sig_data.sha256_preimages, hash, preimage); | 
| 240 | 0 |     } Unexecuted instantiation: _ZNK9SatisfierI11XOnlyPubKeyE9SatSHA256ERKNSt3__16vectorIhNS2_9allocatorIhEEEERS6_Unexecuted instantiation: _ZNK9SatisfierI7CPubKeyE9SatSHA256ERKNSt3__16vectorIhNS2_9allocatorIhEEEERS6_ | 
| 241 | 0 |     miniscript::Availability SatRIPEMD160(const std::vector<unsigned char>& hash, std::vector<unsigned char>& preimage) const { | 
| 242 | 0 |         return MsLookupHelper(m_sig_data.ripemd160_preimages, hash, preimage); | 
| 243 | 0 |     } Unexecuted instantiation: _ZNK9SatisfierI11XOnlyPubKeyE12SatRIPEMD160ERKNSt3__16vectorIhNS2_9allocatorIhEEEERS6_Unexecuted instantiation: _ZNK9SatisfierI7CPubKeyE12SatRIPEMD160ERKNSt3__16vectorIhNS2_9allocatorIhEEEERS6_ | 
| 244 | 0 |     miniscript::Availability SatHASH256(const std::vector<unsigned char>& hash, std::vector<unsigned char>& preimage) const { | 
| 245 | 0 |         return MsLookupHelper(m_sig_data.hash256_preimages, hash, preimage); | 
| 246 | 0 |     } Unexecuted instantiation: _ZNK9SatisfierI11XOnlyPubKeyE10SatHASH256ERKNSt3__16vectorIhNS2_9allocatorIhEEEERS6_Unexecuted instantiation: _ZNK9SatisfierI7CPubKeyE10SatHASH256ERKNSt3__16vectorIhNS2_9allocatorIhEEEERS6_ | 
| 247 | 0 |     miniscript::Availability SatHASH160(const std::vector<unsigned char>& hash, std::vector<unsigned char>& preimage) const { | 
| 248 | 0 |         return MsLookupHelper(m_sig_data.hash160_preimages, hash, preimage); | 
| 249 | 0 |     } Unexecuted instantiation: _ZNK9SatisfierI11XOnlyPubKeyE10SatHASH160ERKNSt3__16vectorIhNS2_9allocatorIhEEEERS6_Unexecuted instantiation: _ZNK9SatisfierI7CPubKeyE10SatHASH160ERKNSt3__16vectorIhNS2_9allocatorIhEEEERS6_ | 
| 250 |  |  | 
| 251 | 0 |     miniscript::MiniscriptContext MsContext() const { | 
| 252 | 0 |         return m_script_ctx; | 
| 253 | 0 |     } Unexecuted instantiation: _ZNK9SatisfierI11XOnlyPubKeyE9MsContextEvUnexecuted instantiation: _ZNK9SatisfierI7CPubKeyE9MsContextEv | 
| 254 |  | }; | 
| 255 |  |  | 
| 256 |  | /** Miniscript satisfier specific to P2WSH context. */ | 
| 257 |  | struct WshSatisfier: Satisfier<CPubKey> { | 
| 258 |  |     explicit WshSatisfier(const SigningProvider& provider LIFETIMEBOUND, SignatureData& sig_data LIFETIMEBOUND, | 
| 259 |  |                           const BaseSignatureCreator& creator LIFETIMEBOUND, const CScript& witscript LIFETIMEBOUND) | 
| 260 | 0 |                           : Satisfier(provider, sig_data, creator, witscript, miniscript::MiniscriptContext::P2WSH) {} | 
| 261 |  |  | 
| 262 |  |     //! Conversion from a raw compressed public key. | 
| 263 |  |     template <typename I> | 
| 264 | 0 |     std::optional<CPubKey> FromPKBytes(I first, I last) const { | 
| 265 | 0 |         CPubKey pubkey{first, last}; | 
| 266 | 0 |         if (pubkey.IsValid()) return pubkey; | 
| 267 | 0 |         return {}; | 
| 268 | 0 |     } | 
| 269 |  |  | 
| 270 |  |     //! Conversion from a raw compressed public key hash. | 
| 271 |  |     template<typename I> | 
| 272 | 0 |     std::optional<CPubKey> FromPKHBytes(I first, I last) const { | 
| 273 | 0 |         return Satisfier::CPubFromPKHBytes(first, last); | 
| 274 | 0 |     } | 
| 275 |  |  | 
| 276 |  |     //! Satisfy an ECDSA signature check. | 
| 277 | 0 |     miniscript::Availability Sign(const CPubKey& key, std::vector<unsigned char>& sig) const { | 
| 278 | 0 |         if (CreateSig(m_creator, m_sig_data, m_provider, sig, key, m_witness_script, SigVersion::WITNESS_V0)) { | 
| 279 | 0 |             return miniscript::Availability::YES; | 
| 280 | 0 |         } | 
| 281 | 0 |         return miniscript::Availability::NO; | 
| 282 | 0 |     } | 
| 283 |  | }; | 
| 284 |  |  | 
| 285 |  | /** Miniscript satisfier specific to Tapscript context. */ | 
| 286 |  | struct TapSatisfier: Satisfier<XOnlyPubKey> { | 
| 287 |  |     const uint256& m_leaf_hash; | 
| 288 |  |  | 
| 289 |  |     explicit TapSatisfier(const SigningProvider& provider LIFETIMEBOUND, SignatureData& sig_data LIFETIMEBOUND, | 
| 290 |  |                           const BaseSignatureCreator& creator LIFETIMEBOUND, const CScript& script LIFETIMEBOUND, | 
| 291 |  |                           const uint256& leaf_hash LIFETIMEBOUND) | 
| 292 | 0 |                           : Satisfier(provider, sig_data, creator, script, miniscript::MiniscriptContext::TAPSCRIPT), | 
| 293 | 0 |                             m_leaf_hash(leaf_hash) {} | 
| 294 |  |  | 
| 295 |  |     //! Conversion from a raw xonly public key. | 
| 296 |  |     template <typename I> | 
| 297 | 0 |     std::optional<XOnlyPubKey> FromPKBytes(I first, I last) const { | 
| 298 | 0 |         if (last - first != 32) return {}; | 
| 299 | 0 |         XOnlyPubKey pubkey; | 
| 300 | 0 |         std::copy(first, last, pubkey.begin()); | 
| 301 | 0 |         return pubkey; | 
| 302 | 0 |     } | 
| 303 |  |  | 
| 304 |  |     //! Conversion from a raw xonly public key hash. | 
| 305 |  |     template<typename I> | 
| 306 | 0 |     std::optional<XOnlyPubKey> FromPKHBytes(I first, I last) const { | 
| 307 | 0 |         if (auto pubkey = Satisfier::CPubFromPKHBytes(first, last)) return XOnlyPubKey{*pubkey}; | 
| 308 | 0 |         return {}; | 
| 309 | 0 |     } | 
| 310 |  |  | 
| 311 |  |     //! Satisfy a BIP340 signature check. | 
| 312 | 0 |     miniscript::Availability Sign(const XOnlyPubKey& key, std::vector<unsigned char>& sig) const { | 
| 313 | 0 |         if (CreateTaprootScriptSig(m_creator, m_sig_data, m_provider, sig, key, m_leaf_hash, SigVersion::TAPSCRIPT)) { | 
| 314 | 0 |             return miniscript::Availability::YES; | 
| 315 | 0 |         } | 
| 316 | 0 |         return miniscript::Availability::NO; | 
| 317 | 0 |     } | 
| 318 |  | }; | 
| 319 |  |  | 
| 320 |  | static bool SignTaprootScript(const SigningProvider& provider, const BaseSignatureCreator& creator, SignatureData& sigdata, int leaf_version, std::span<const unsigned char> script_bytes, std::vector<valtype>& result) | 
| 321 | 0 | { | 
| 322 |  |     // Only BIP342 tapscript signing is supported for now. | 
| 323 | 0 |     if (leaf_version != TAPROOT_LEAF_TAPSCRIPT) return false; | 
| 324 |  |  | 
| 325 | 0 |     uint256 leaf_hash = ComputeTapleafHash(leaf_version, script_bytes); | 
| 326 | 0 |     CScript script = CScript(script_bytes.begin(), script_bytes.end()); | 
| 327 |  | 
 | 
| 328 | 0 |     TapSatisfier ms_satisfier{provider, sigdata, creator, script, leaf_hash}; | 
| 329 | 0 |     const auto ms = miniscript::FromScript(script, ms_satisfier); | 
| 330 | 0 |     return ms && ms->Satisfy(ms_satisfier, result) == miniscript::Availability::YES; | 
| 331 | 0 | } | 
| 332 |  |  | 
| 333 |  | static bool SignTaproot(const SigningProvider& provider, const BaseSignatureCreator& creator, const WitnessV1Taproot& output, SignatureData& sigdata, std::vector<valtype>& result) | 
| 334 | 0 | { | 
| 335 | 0 |     TaprootSpendData spenddata; | 
| 336 | 0 |     TaprootBuilder builder; | 
| 337 |  |  | 
| 338 |  |     // Gather information about this output. | 
| 339 | 0 |     if (provider.GetTaprootSpendData(output, spenddata)) { | 
| 340 | 0 |         sigdata.tr_spenddata.Merge(spenddata); | 
| 341 | 0 |     } | 
| 342 | 0 |     if (provider.GetTaprootBuilder(output, builder)) { | 
| 343 | 0 |         sigdata.tr_builder = builder; | 
| 344 | 0 |     } | 
| 345 |  |  | 
| 346 |  |     // Try key path spending. | 
| 347 | 0 |     { | 
| 348 | 0 |         KeyOriginInfo info; | 
| 349 | 0 |         if (provider.GetKeyOriginByXOnly(sigdata.tr_spenddata.internal_key, info)) { | 
| 350 | 0 |             auto it = sigdata.taproot_misc_pubkeys.find(sigdata.tr_spenddata.internal_key); | 
| 351 | 0 |             if (it == sigdata.taproot_misc_pubkeys.end()) { | 
| 352 | 0 |                 sigdata.taproot_misc_pubkeys.emplace(sigdata.tr_spenddata.internal_key, std::make_pair(std::set<uint256>(), info)); | 
| 353 | 0 |             } | 
| 354 | 0 |         } | 
| 355 |  | 
 | 
| 356 | 0 |         std::vector<unsigned char> sig; | 
| 357 | 0 |         if (sigdata.taproot_key_path_sig.size() == 0) { | 
| 358 | 0 |             if (creator.CreateSchnorrSig(provider, sig, sigdata.tr_spenddata.internal_key, nullptr, &sigdata.tr_spenddata.merkle_root, SigVersion::TAPROOT)) { | 
| 359 | 0 |                 sigdata.taproot_key_path_sig = sig; | 
| 360 | 0 |             } | 
| 361 | 0 |         } | 
| 362 | 0 |         if (sigdata.taproot_key_path_sig.size() == 0) { | 
| 363 | 0 |             if (creator.CreateSchnorrSig(provider, sig, output, nullptr, nullptr, SigVersion::TAPROOT)) { | 
| 364 | 0 |                 sigdata.taproot_key_path_sig = sig; | 
| 365 | 0 |             } | 
| 366 | 0 |         } | 
| 367 | 0 |         if (sigdata.taproot_key_path_sig.size()) { | 
| 368 | 0 |             result = Vector(sigdata.taproot_key_path_sig); | 
| 369 | 0 |             return true; | 
| 370 | 0 |         } | 
| 371 | 0 |     } | 
| 372 |  |  | 
| 373 |  |     // Try script path spending. | 
| 374 | 0 |     std::vector<std::vector<unsigned char>> smallest_result_stack; | 
| 375 | 0 |     for (const auto& [key, control_blocks] : sigdata.tr_spenddata.scripts) { | 
| 376 | 0 |         const auto& [script, leaf_ver] = key; | 
| 377 | 0 |         std::vector<std::vector<unsigned char>> result_stack; | 
| 378 | 0 |         if (SignTaprootScript(provider, creator, sigdata, leaf_ver, script, result_stack)) { | 
| 379 | 0 |             result_stack.emplace_back(std::begin(script), std::end(script)); // Push the script | 
| 380 | 0 |             result_stack.push_back(*control_blocks.begin()); // Push the smallest control block | 
| 381 | 0 |             if (smallest_result_stack.size() == 0 || | 
| 382 | 0 |                 GetSerializeSize(result_stack) < GetSerializeSize(smallest_result_stack)) { | 
| 383 | 0 |                 smallest_result_stack = std::move(result_stack); | 
| 384 | 0 |             } | 
| 385 | 0 |         } | 
| 386 | 0 |     } | 
| 387 | 0 |     if (smallest_result_stack.size() != 0) { | 
| 388 | 0 |         result = std::move(smallest_result_stack); | 
| 389 | 0 |         return true; | 
| 390 | 0 |     } | 
| 391 |  |  | 
| 392 | 0 |     return false; | 
| 393 | 0 | } | 
| 394 |  |  | 
| 395 |  | /** | 
| 396 |  |  * Sign scriptPubKey using signature made with creator. | 
| 397 |  |  * Signatures are returned in scriptSigRet (or returns false if scriptPubKey can't be signed), | 
| 398 |  |  * unless whichTypeRet is TxoutType::SCRIPTHASH, in which case scriptSigRet is the redemption script. | 
| 399 |  |  * Returns false if scriptPubKey could not be completely satisfied. | 
| 400 |  |  */ | 
| 401 |  | static bool SignStep(const SigningProvider& provider, const BaseSignatureCreator& creator, const CScript& scriptPubKey, | 
| 402 |  |                      std::vector<valtype>& ret, TxoutType& whichTypeRet, SigVersion sigversion, SignatureData& sigdata) | 
| 403 | 0 | { | 
| 404 | 0 |     CScript scriptRet; | 
| 405 | 0 |     ret.clear(); | 
| 406 | 0 |     std::vector<unsigned char> sig; | 
| 407 |  | 
 | 
| 408 | 0 |     std::vector<valtype> vSolutions; | 
| 409 | 0 |     whichTypeRet = Solver(scriptPubKey, vSolutions); | 
| 410 |  | 
 | 
| 411 | 0 |     switch (whichTypeRet) { | 
| 412 | 0 |     case TxoutType::NONSTANDARD: | 
| 413 | 0 |     case TxoutType::NULL_DATA: | 
| 414 | 0 |     case TxoutType::WITNESS_UNKNOWN: | 
| 415 | 0 |         return false; | 
| 416 | 0 |     case TxoutType::PUBKEY: | 
| 417 | 0 |         if (!CreateSig(creator, sigdata, provider, sig, CPubKey(vSolutions[0]), scriptPubKey, sigversion)) return false; | 
| 418 | 0 |         ret.push_back(std::move(sig)); | 
| 419 | 0 |         return true; | 
| 420 | 0 |     case TxoutType::PUBKEYHASH: { | 
| 421 | 0 |         CKeyID keyID = CKeyID(uint160(vSolutions[0])); | 
| 422 | 0 |         CPubKey pubkey; | 
| 423 | 0 |         if (!GetPubKey(provider, sigdata, keyID, pubkey)) { | 
| 424 |  |             // Pubkey could not be found, add to missing | 
| 425 | 0 |             sigdata.missing_pubkeys.push_back(keyID); | 
| 426 | 0 |             return false; | 
| 427 | 0 |         } | 
| 428 | 0 |         if (!CreateSig(creator, sigdata, provider, sig, pubkey, scriptPubKey, sigversion)) return false; | 
| 429 | 0 |         ret.push_back(std::move(sig)); | 
| 430 | 0 |         ret.push_back(ToByteVector(pubkey)); | 
| 431 | 0 |         return true; | 
| 432 | 0 |     } | 
| 433 | 0 |     case TxoutType::SCRIPTHASH: { | 
| 434 | 0 |         uint160 h160{vSolutions[0]}; | 
| 435 | 0 |         if (GetCScript(provider, sigdata, CScriptID{h160}, scriptRet)) { | 
| 436 | 0 |             ret.emplace_back(scriptRet.begin(), scriptRet.end()); | 
| 437 | 0 |             return true; | 
| 438 | 0 |         } | 
| 439 |  |         // Could not find redeemScript, add to missing | 
| 440 | 0 |         sigdata.missing_redeem_script = h160; | 
| 441 | 0 |         return false; | 
| 442 | 0 |     } | 
| 443 | 0 |     case TxoutType::MULTISIG: { | 
| 444 | 0 |         size_t required = vSolutions.front()[0]; | 
| 445 | 0 |         ret.emplace_back(); // workaround CHECKMULTISIG bug | 
| 446 | 0 |         for (size_t i = 1; i < vSolutions.size() - 1; ++i) { | 
| 447 | 0 |             CPubKey pubkey = CPubKey(vSolutions[i]); | 
| 448 |  |             // We need to always call CreateSig in order to fill sigdata with all | 
| 449 |  |             // possible signatures that we can create. This will allow further PSBT | 
| 450 |  |             // processing to work as it needs all possible signature and pubkey pairs | 
| 451 | 0 |             if (CreateSig(creator, sigdata, provider, sig, pubkey, scriptPubKey, sigversion)) { | 
| 452 | 0 |                 if (ret.size() < required + 1) { | 
| 453 | 0 |                     ret.push_back(std::move(sig)); | 
| 454 | 0 |                 } | 
| 455 | 0 |             } | 
| 456 | 0 |         } | 
| 457 | 0 |         bool ok = ret.size() == required + 1; | 
| 458 | 0 |         for (size_t i = 0; i + ret.size() < required + 1; ++i) { | 
| 459 | 0 |             ret.emplace_back(); | 
| 460 | 0 |         } | 
| 461 | 0 |         return ok; | 
| 462 | 0 |     } | 
| 463 | 0 |     case TxoutType::WITNESS_V0_KEYHASH: | 
| 464 | 0 |         ret.push_back(vSolutions[0]); | 
| 465 | 0 |         return true; | 
| 466 |  |  | 
| 467 | 0 |     case TxoutType::WITNESS_V0_SCRIPTHASH: | 
| 468 | 0 |         if (GetCScript(provider, sigdata, CScriptID{RIPEMD160(vSolutions[0])}, scriptRet)) { | 
| 469 | 0 |             ret.emplace_back(scriptRet.begin(), scriptRet.end()); | 
| 470 | 0 |             return true; | 
| 471 | 0 |         } | 
| 472 |  |         // Could not find witnessScript, add to missing | 
| 473 | 0 |         sigdata.missing_witness_script = uint256(vSolutions[0]); | 
| 474 | 0 |         return false; | 
| 475 |  |  | 
| 476 | 0 |     case TxoutType::WITNESS_V1_TAPROOT: | 
| 477 | 0 |         return SignTaproot(provider, creator, WitnessV1Taproot(XOnlyPubKey{vSolutions[0]}), sigdata, ret); | 
| 478 |  |  | 
| 479 | 0 |     case TxoutType::ANCHOR: | 
| 480 | 0 |         return true; | 
| 481 | 0 |     } // no default case, so the compiler can warn about missing cases | 
| 482 | 0 |     assert(false); | 
| 483 | 0 | } | 
| 484 |  |  | 
| 485 |  | static CScript PushAll(const std::vector<valtype>& values) | 
| 486 | 0 | { | 
| 487 | 0 |     CScript result; | 
| 488 | 0 |     for (const valtype& v : values) { | 
| 489 | 0 |         if (v.size() == 0) { | 
| 490 | 0 |             result << OP_0; | 
| 491 | 0 |         } else if (v.size() == 1 && v[0] >= 1 && v[0] <= 16) { | 
| 492 | 0 |             result << CScript::EncodeOP_N(v[0]); | 
| 493 | 0 |         } else if (v.size() == 1 && v[0] == 0x81) { | 
| 494 | 0 |             result << OP_1NEGATE; | 
| 495 | 0 |         } else { | 
| 496 | 0 |             result << v; | 
| 497 | 0 |         } | 
| 498 | 0 |     } | 
| 499 | 0 |     return result; | 
| 500 | 0 | } | 
| 501 |  |  | 
| 502 |  | bool ProduceSignature(const SigningProvider& provider, const BaseSignatureCreator& creator, const CScript& fromPubKey, SignatureData& sigdata) | 
| 503 | 0 | { | 
| 504 | 0 |     if (sigdata.complete) return true; | 
| 505 |  |  | 
| 506 | 0 |     std::vector<valtype> result; | 
| 507 | 0 |     TxoutType whichType; | 
| 508 | 0 |     bool solved = SignStep(provider, creator, fromPubKey, result, whichType, SigVersion::BASE, sigdata); | 
| 509 | 0 |     bool P2SH = false; | 
| 510 | 0 |     CScript subscript; | 
| 511 |  | 
 | 
| 512 | 0 |     if (solved && whichType == TxoutType::SCRIPTHASH) | 
| 513 | 0 |     { | 
| 514 |  |         // Solver returns the subscript that needs to be evaluated; | 
| 515 |  |         // the final scriptSig is the signatures from that | 
| 516 |  |         // and then the serialized subscript: | 
| 517 | 0 |         subscript = CScript(result[0].begin(), result[0].end()); | 
| 518 | 0 |         sigdata.redeem_script = subscript; | 
| 519 | 0 |         solved = solved && SignStep(provider, creator, subscript, result, whichType, SigVersion::BASE, sigdata) && whichType != TxoutType::SCRIPTHASH; | 
| 520 | 0 |         P2SH = true; | 
| 521 | 0 |     } | 
| 522 |  | 
 | 
| 523 | 0 |     if (solved && whichType == TxoutType::WITNESS_V0_KEYHASH) | 
| 524 | 0 |     { | 
| 525 | 0 |         CScript witnessscript; | 
| 526 | 0 |         witnessscript << OP_DUP << OP_HASH160 << ToByteVector(result[0]) << OP_EQUALVERIFY << OP_CHECKSIG; | 
| 527 | 0 |         TxoutType subType; | 
| 528 | 0 |         solved = solved && SignStep(provider, creator, witnessscript, result, subType, SigVersion::WITNESS_V0, sigdata); | 
| 529 | 0 |         sigdata.scriptWitness.stack = result; | 
| 530 | 0 |         sigdata.witness = true; | 
| 531 | 0 |         result.clear(); | 
| 532 | 0 |     } | 
| 533 | 0 |     else if (solved && whichType == TxoutType::WITNESS_V0_SCRIPTHASH) | 
| 534 | 0 |     { | 
| 535 | 0 |         CScript witnessscript(result[0].begin(), result[0].end()); | 
| 536 | 0 |         sigdata.witness_script = witnessscript; | 
| 537 |  | 
 | 
| 538 | 0 |         TxoutType subType{TxoutType::NONSTANDARD}; | 
| 539 | 0 |         solved = solved && SignStep(provider, creator, witnessscript, result, subType, SigVersion::WITNESS_V0, sigdata) && subType != TxoutType::SCRIPTHASH && subType != TxoutType::WITNESS_V0_SCRIPTHASH && subType != TxoutType::WITNESS_V0_KEYHASH; | 
| 540 |  |  | 
| 541 |  |         // If we couldn't find a solution with the legacy satisfier, try satisfying the script using Miniscript. | 
| 542 |  |         // Note we need to check if the result stack is empty before, because it might be used even if the Script | 
| 543 |  |         // isn't fully solved. For instance the CHECKMULTISIG satisfaction in SignStep() pushes partial signatures | 
| 544 |  |         // and the extractor relies on this behaviour to combine witnesses. | 
| 545 | 0 |         if (!solved && result.empty()) { | 
| 546 | 0 |             WshSatisfier ms_satisfier{provider, sigdata, creator, witnessscript}; | 
| 547 | 0 |             const auto ms = miniscript::FromScript(witnessscript, ms_satisfier); | 
| 548 | 0 |             solved = ms && ms->Satisfy(ms_satisfier, result) == miniscript::Availability::YES; | 
| 549 | 0 |         } | 
| 550 | 0 |         result.emplace_back(witnessscript.begin(), witnessscript.end()); | 
| 551 |  | 
 | 
| 552 | 0 |         sigdata.scriptWitness.stack = result; | 
| 553 | 0 |         sigdata.witness = true; | 
| 554 | 0 |         result.clear(); | 
| 555 | 0 |     } else if (whichType == TxoutType::WITNESS_V1_TAPROOT && !P2SH) { | 
| 556 | 0 |         sigdata.witness = true; | 
| 557 | 0 |         if (solved) { | 
| 558 | 0 |             sigdata.scriptWitness.stack = std::move(result); | 
| 559 | 0 |         } | 
| 560 | 0 |         result.clear(); | 
| 561 | 0 |     } else if (solved && whichType == TxoutType::WITNESS_UNKNOWN) { | 
| 562 | 0 |         sigdata.witness = true; | 
| 563 | 0 |     } | 
| 564 |  | 
 | 
| 565 | 0 |     if (!sigdata.witness) sigdata.scriptWitness.stack.clear(); | 
| 566 | 0 |     if (P2SH) { | 
| 567 | 0 |         result.emplace_back(subscript.begin(), subscript.end()); | 
| 568 | 0 |     } | 
| 569 | 0 |     sigdata.scriptSig = PushAll(result); | 
| 570 |  |  | 
| 571 |  |     // Test solution | 
| 572 | 0 |     sigdata.complete = solved && VerifyScript(sigdata.scriptSig, fromPubKey, &sigdata.scriptWitness, STANDARD_SCRIPT_VERIFY_FLAGS, creator.Checker()); | 
| 573 | 0 |     return sigdata.complete; | 
| 574 | 0 | } | 
| 575 |  |  | 
| 576 |  | namespace { | 
| 577 |  | class SignatureExtractorChecker final : public DeferringSignatureChecker | 
| 578 |  | { | 
| 579 |  | private: | 
| 580 |  |     SignatureData& sigdata; | 
| 581 |  |  | 
| 582 |  | public: | 
| 583 | 0 |     SignatureExtractorChecker(SignatureData& sigdata, BaseSignatureChecker& checker) : DeferringSignatureChecker(checker), sigdata(sigdata) {} | 
| 584 |  |  | 
| 585 |  |     bool CheckECDSASignature(const std::vector<unsigned char>& scriptSig, const std::vector<unsigned char>& vchPubKey, const CScript& scriptCode, SigVersion sigversion) const override | 
| 586 | 0 |     { | 
| 587 | 0 |         if (m_checker.CheckECDSASignature(scriptSig, vchPubKey, scriptCode, sigversion)) { | 
| 588 | 0 |             CPubKey pubkey(vchPubKey); | 
| 589 | 0 |             sigdata.signatures.emplace(pubkey.GetID(), SigPair(pubkey, scriptSig)); | 
| 590 | 0 |             return true; | 
| 591 | 0 |         } | 
| 592 | 0 |         return false; | 
| 593 | 0 |     } | 
| 594 |  | }; | 
| 595 |  |  | 
| 596 |  | struct Stacks | 
| 597 |  | { | 
| 598 |  |     std::vector<valtype> script; | 
| 599 |  |     std::vector<valtype> witness; | 
| 600 |  |  | 
| 601 |  |     Stacks() = delete; | 
| 602 |  |     Stacks(const Stacks&) = delete; | 
| 603 | 0 |     explicit Stacks(const SignatureData& data) : witness(data.scriptWitness.stack) { | 
| 604 | 0 |         EvalScript(script, data.scriptSig, SCRIPT_VERIFY_STRICTENC, BaseSignatureChecker(), SigVersion::BASE); | 
| 605 | 0 |     } | 
| 606 |  | }; | 
| 607 |  | } | 
| 608 |  |  | 
| 609 |  | // Extracts signatures and scripts from incomplete scriptSigs. Please do not extend this, use PSBT instead | 
| 610 |  | SignatureData DataFromTransaction(const CMutableTransaction& tx, unsigned int nIn, const CTxOut& txout) | 
| 611 | 0 | { | 
| 612 | 0 |     SignatureData data; | 
| 613 | 0 |     assert(tx.vin.size() > nIn); | 
| 614 | 0 |     data.scriptSig = tx.vin[nIn].scriptSig; | 
| 615 | 0 |     data.scriptWitness = tx.vin[nIn].scriptWitness; | 
| 616 | 0 |     Stacks stack(data); | 
| 617 |  |  | 
| 618 |  |     // Get signatures | 
| 619 | 0 |     MutableTransactionSignatureChecker tx_checker(&tx, nIn, txout.nValue, MissingDataBehavior::FAIL); | 
| 620 | 0 |     SignatureExtractorChecker extractor_checker(data, tx_checker); | 
| 621 | 0 |     if (VerifyScript(data.scriptSig, txout.scriptPubKey, &data.scriptWitness, STANDARD_SCRIPT_VERIFY_FLAGS, extractor_checker)) { | 
| 622 | 0 |         data.complete = true; | 
| 623 | 0 |         return data; | 
| 624 | 0 |     } | 
| 625 |  |  | 
| 626 |  |     // Get scripts | 
| 627 | 0 |     std::vector<std::vector<unsigned char>> solutions; | 
| 628 | 0 |     TxoutType script_type = Solver(txout.scriptPubKey, solutions); | 
| 629 | 0 |     SigVersion sigversion = SigVersion::BASE; | 
| 630 | 0 |     CScript next_script = txout.scriptPubKey; | 
| 631 |  | 
 | 
| 632 | 0 |     if (script_type == TxoutType::SCRIPTHASH && !stack.script.empty() && !stack.script.back().empty()) { | 
| 633 |  |         // Get the redeemScript | 
| 634 | 0 |         CScript redeem_script(stack.script.back().begin(), stack.script.back().end()); | 
| 635 | 0 |         data.redeem_script = redeem_script; | 
| 636 | 0 |         next_script = std::move(redeem_script); | 
| 637 |  |  | 
| 638 |  |         // Get redeemScript type | 
| 639 | 0 |         script_type = Solver(next_script, solutions); | 
| 640 | 0 |         stack.script.pop_back(); | 
| 641 | 0 |     } | 
| 642 | 0 |     if (script_type == TxoutType::WITNESS_V0_SCRIPTHASH && !stack.witness.empty() && !stack.witness.back().empty()) { | 
| 643 |  |         // Get the witnessScript | 
| 644 | 0 |         CScript witness_script(stack.witness.back().begin(), stack.witness.back().end()); | 
| 645 | 0 |         data.witness_script = witness_script; | 
| 646 | 0 |         next_script = std::move(witness_script); | 
| 647 |  |  | 
| 648 |  |         // Get witnessScript type | 
| 649 | 0 |         script_type = Solver(next_script, solutions); | 
| 650 | 0 |         stack.witness.pop_back(); | 
| 651 | 0 |         stack.script = std::move(stack.witness); | 
| 652 | 0 |         stack.witness.clear(); | 
| 653 | 0 |         sigversion = SigVersion::WITNESS_V0; | 
| 654 | 0 |     } | 
| 655 | 0 |     if (script_type == TxoutType::MULTISIG && !stack.script.empty()) { | 
| 656 |  |         // Build a map of pubkey -> signature by matching sigs to pubkeys: | 
| 657 | 0 |         assert(solutions.size() > 1); | 
| 658 | 0 |         unsigned int num_pubkeys = solutions.size()-2; | 
| 659 | 0 |         unsigned int last_success_key = 0; | 
| 660 | 0 |         for (const valtype& sig : stack.script) { | 
| 661 | 0 |             for (unsigned int i = last_success_key; i < num_pubkeys; ++i) { | 
| 662 | 0 |                 const valtype& pubkey = solutions[i+1]; | 
| 663 |  |                 // We either have a signature for this pubkey, or we have found a signature and it is valid | 
| 664 | 0 |                 if (data.signatures.count(CPubKey(pubkey).GetID()) || extractor_checker.CheckECDSASignature(sig, pubkey, next_script, sigversion)) { | 
| 665 | 0 |                     last_success_key = i + 1; | 
| 666 | 0 |                     break; | 
| 667 | 0 |                 } | 
| 668 | 0 |             } | 
| 669 | 0 |         } | 
| 670 | 0 |     } | 
| 671 |  |  | 
| 672 | 0 |     return data; | 
| 673 | 0 | } | 
| 674 |  |  | 
| 675 |  | void UpdateInput(CTxIn& input, const SignatureData& data) | 
| 676 | 0 | { | 
| 677 | 0 |     input.scriptSig = data.scriptSig; | 
| 678 | 0 |     input.scriptWitness = data.scriptWitness; | 
| 679 | 0 | } | 
| 680 |  |  | 
| 681 |  | void SignatureData::MergeSignatureData(SignatureData sigdata) | 
| 682 | 0 | { | 
| 683 | 0 |     if (complete) return; | 
| 684 | 0 |     if (sigdata.complete) { | 
| 685 | 0 |         *this = std::move(sigdata); | 
| 686 | 0 |         return; | 
| 687 | 0 |     } | 
| 688 | 0 |     if (redeem_script.empty() && !sigdata.redeem_script.empty()) { | 
| 689 | 0 |         redeem_script = sigdata.redeem_script; | 
| 690 | 0 |     } | 
| 691 | 0 |     if (witness_script.empty() && !sigdata.witness_script.empty()) { | 
| 692 | 0 |         witness_script = sigdata.witness_script; | 
| 693 | 0 |     } | 
| 694 | 0 |     signatures.insert(std::make_move_iterator(sigdata.signatures.begin()), std::make_move_iterator(sigdata.signatures.end())); | 
| 695 | 0 | } | 
| 696 |  |  | 
| 697 |  | namespace { | 
| 698 |  | /** Dummy signature checker which accepts all signatures. */ | 
| 699 |  | class DummySignatureChecker final : public BaseSignatureChecker | 
| 700 |  | { | 
| 701 |  | public: | 
| 702 | 0 |     DummySignatureChecker() = default; | 
| 703 | 0 |     bool CheckECDSASignature(const std::vector<unsigned char>& sig, const std::vector<unsigned char>& vchPubKey, const CScript& scriptCode, SigVersion sigversion) const override { return sig.size() != 0; } | 
| 704 | 0 |     bool CheckSchnorrSignature(std::span<const unsigned char> sig, std::span<const unsigned char> pubkey, SigVersion sigversion, ScriptExecutionData& execdata, ScriptError* serror) const override { return sig.size() != 0; } | 
| 705 | 0 |     bool CheckLockTime(const CScriptNum& nLockTime) const override { return true; } | 
| 706 | 0 |     bool CheckSequence(const CScriptNum& nSequence) const override { return true; } | 
| 707 |  | }; | 
| 708 |  | } | 
| 709 |  |  | 
| 710 |  | const BaseSignatureChecker& DUMMY_CHECKER = DummySignatureChecker(); | 
| 711 |  |  | 
| 712 |  | namespace { | 
| 713 |  | class DummySignatureCreator final : public BaseSignatureCreator { | 
| 714 |  | private: | 
| 715 |  |     char m_r_len = 32; | 
| 716 |  |     char m_s_len = 32; | 
| 717 |  | public: | 
| 718 | 0 |     DummySignatureCreator(char r_len, char s_len) : m_r_len(r_len), m_s_len(s_len) {} | 
| 719 | 0 |     const BaseSignatureChecker& Checker() const override { return DUMMY_CHECKER; } | 
| 720 |  |     bool CreateSig(const SigningProvider& provider, std::vector<unsigned char>& vchSig, const CKeyID& keyid, const CScript& scriptCode, SigVersion sigversion) const override | 
| 721 | 0 |     { | 
| 722 |  |         // Create a dummy signature that is a valid DER-encoding | 
| 723 | 0 |         vchSig.assign(m_r_len + m_s_len + 7, '\000'); | 
| 724 | 0 |         vchSig[0] = 0x30; | 
| 725 | 0 |         vchSig[1] = m_r_len + m_s_len + 4; | 
| 726 | 0 |         vchSig[2] = 0x02; | 
| 727 | 0 |         vchSig[3] = m_r_len; | 
| 728 | 0 |         vchSig[4] = 0x01; | 
| 729 | 0 |         vchSig[4 + m_r_len] = 0x02; | 
| 730 | 0 |         vchSig[5 + m_r_len] = m_s_len; | 
| 731 | 0 |         vchSig[6 + m_r_len] = 0x01; | 
| 732 | 0 |         vchSig[6 + m_r_len + m_s_len] = SIGHASH_ALL; | 
| 733 | 0 |         return true; | 
| 734 | 0 |     } | 
| 735 |  |     bool CreateSchnorrSig(const SigningProvider& provider, std::vector<unsigned char>& sig, const XOnlyPubKey& pubkey, const uint256* leaf_hash, const uint256* tweak, SigVersion sigversion) const override | 
| 736 | 0 |     { | 
| 737 | 0 |         sig.assign(64, '\000'); | 
| 738 | 0 |         return true; | 
| 739 | 0 |     } | 
| 740 |  | }; | 
| 741 |  |  | 
| 742 |  | } | 
| 743 |  |  | 
| 744 |  | const BaseSignatureCreator& DUMMY_SIGNATURE_CREATOR = DummySignatureCreator(32, 32); | 
| 745 |  | const BaseSignatureCreator& DUMMY_MAXIMUM_SIGNATURE_CREATOR = DummySignatureCreator(33, 32); | 
| 746 |  |  | 
| 747 |  | bool IsSegWitOutput(const SigningProvider& provider, const CScript& script) | 
| 748 | 0 | { | 
| 749 | 0 |     int version; | 
| 750 | 0 |     valtype program; | 
| 751 | 0 |     if (script.IsWitnessProgram(version, program)) return true; | 
| 752 | 0 |     if (script.IsPayToScriptHash()) { | 
| 753 | 0 |         std::vector<valtype> solutions; | 
| 754 | 0 |         auto whichtype = Solver(script, solutions); | 
| 755 | 0 |         if (whichtype == TxoutType::SCRIPTHASH) { | 
| 756 | 0 |             auto h160 = uint160(solutions[0]); | 
| 757 | 0 |             CScript subscript; | 
| 758 | 0 |             if (provider.GetCScript(CScriptID{h160}, subscript)) { | 
| 759 | 0 |                 if (subscript.IsWitnessProgram(version, program)) return true; | 
| 760 | 0 |             } | 
| 761 | 0 |         } | 
| 762 | 0 |     } | 
| 763 | 0 |     return false; | 
| 764 | 0 | } | 
| 765 |  |  | 
| 766 |  | bool SignTransaction(CMutableTransaction& mtx, const SigningProvider* keystore, const std::map<COutPoint, Coin>& coins, int nHashType, std::map<int, bilingual_str>& input_errors) | 
| 767 | 0 | { | 
| 768 | 0 |     bool fHashSingle = ((nHashType & ~SIGHASH_ANYONECANPAY) == SIGHASH_SINGLE); | 
| 769 |  |  | 
| 770 |  |     // Use CTransaction for the constant parts of the | 
| 771 |  |     // transaction to avoid rehashing. | 
| 772 | 0 |     const CTransaction txConst(mtx); | 
| 773 |  | 
 | 
| 774 | 0 |     PrecomputedTransactionData txdata; | 
| 775 | 0 |     std::vector<CTxOut> spent_outputs; | 
| 776 | 0 |     for (unsigned int i = 0; i < mtx.vin.size(); ++i) { | 
| 777 | 0 |         CTxIn& txin = mtx.vin[i]; | 
| 778 | 0 |         auto coin = coins.find(txin.prevout); | 
| 779 | 0 |         if (coin == coins.end() || coin->second.IsSpent()) { | 
| 780 | 0 |             txdata.Init(txConst, /*spent_outputs=*/{}, /*force=*/true); | 
| 781 | 0 |             break; | 
| 782 | 0 |         } else { | 
| 783 | 0 |             spent_outputs.emplace_back(coin->second.out.nValue, coin->second.out.scriptPubKey); | 
| 784 | 0 |         } | 
| 785 | 0 |     } | 
| 786 | 0 |     if (spent_outputs.size() == mtx.vin.size()) { | 
| 787 | 0 |         txdata.Init(txConst, std::move(spent_outputs), true); | 
| 788 | 0 |     } | 
| 789 |  |  | 
| 790 |  |     // Sign what we can: | 
| 791 | 0 |     for (unsigned int i = 0; i < mtx.vin.size(); ++i) { | 
| 792 | 0 |         CTxIn& txin = mtx.vin[i]; | 
| 793 | 0 |         auto coin = coins.find(txin.prevout); | 
| 794 | 0 |         if (coin == coins.end() || coin->second.IsSpent()) { | 
| 795 | 0 |             input_errors[i] = _("Input not found or already spent"); | 
| 796 | 0 |             continue; | 
| 797 | 0 |         } | 
| 798 | 0 |         const CScript& prevPubKey = coin->second.out.scriptPubKey; | 
| 799 | 0 |         const CAmount& amount = coin->second.out.nValue; | 
| 800 |  | 
 | 
| 801 | 0 |         SignatureData sigdata = DataFromTransaction(mtx, i, coin->second.out); | 
| 802 |  |         // Only sign SIGHASH_SINGLE if there's a corresponding output: | 
| 803 | 0 |         if (!fHashSingle || (i < mtx.vout.size())) { | 
| 804 | 0 |             ProduceSignature(*keystore, MutableTransactionSignatureCreator(mtx, i, amount, &txdata, nHashType), prevPubKey, sigdata); | 
| 805 | 0 |         } | 
| 806 |  | 
 | 
| 807 | 0 |         UpdateInput(txin, sigdata); | 
| 808 |  |  | 
| 809 |  |         // amount must be specified for valid segwit signature | 
| 810 | 0 |         if (amount == MAX_MONEY && !txin.scriptWitness.IsNull()) { | 
| 811 | 0 |             input_errors[i] = _("Missing amount"); | 
| 812 | 0 |             continue; | 
| 813 | 0 |         } | 
| 814 |  |  | 
| 815 | 0 |         ScriptError serror = SCRIPT_ERR_OK; | 
| 816 | 0 |         if (!sigdata.complete && !VerifyScript(txin.scriptSig, prevPubKey, &txin.scriptWitness, STANDARD_SCRIPT_VERIFY_FLAGS, TransactionSignatureChecker(&txConst, i, amount, txdata, MissingDataBehavior::FAIL), &serror)) { | 
| 817 | 0 |             if (serror == SCRIPT_ERR_INVALID_STACK_OPERATION) { | 
| 818 |  |                 // Unable to sign input and verification failed (possible attempt to partially sign). | 
| 819 | 0 |                 input_errors[i] = Untranslated("Unable to sign input, invalid stack size (possibly missing key)"); | 
| 820 | 0 |             } else if (serror == SCRIPT_ERR_SIG_NULLFAIL) { | 
| 821 |  |                 // Verification failed (possibly due to insufficient signatures). | 
| 822 | 0 |                 input_errors[i] = Untranslated("CHECK(MULTI)SIG failing with non-zero signature (possibly need more signatures)"); | 
| 823 | 0 |             } else { | 
| 824 | 0 |                 input_errors[i] = Untranslated(ScriptErrorString(serror)); | 
| 825 | 0 |             } | 
| 826 | 0 |         } else { | 
| 827 |  |             // If this input succeeds, make sure there is no error set for it | 
| 828 | 0 |             input_errors.erase(i); | 
| 829 | 0 |         } | 
| 830 | 0 |     } | 
| 831 | 0 |     return input_errors.empty(); | 
| 832 | 0 | } |