Bitcoin Core  31.0.0
P2P Digital Currency
signingprovider.cpp
Go to the documentation of this file.
1 // Copyright (c) 2009-2010 Satoshi Nakamoto
2 // Copyright (c) 2009-present The Bitcoin Core developers
3 // Distributed under the MIT software license, see the accompanying
4 // file COPYING or http://www.opensource.org/licenses/mit-license.php.
5 
6 #include <script/keyorigin.h>
7 #include <script/interpreter.h>
9 
10 #include <logging.h>
11 
13 
14 template<typename M, typename K, typename V>
15 bool LookupHelper(const M& map, const K& key, V& value)
16 {
17  auto it = map.find(key);
18  if (it != map.end()) {
19  value = it->second;
20  return true;
21  }
22  return false;
23 }
24 
26 {
27  return m_provider->GetCScript(scriptid, script);
28 }
29 
30 bool HidingSigningProvider::GetPubKey(const CKeyID& keyid, CPubKey& pubkey) const
31 {
32  return m_provider->GetPubKey(keyid, pubkey);
33 }
34 
35 bool HidingSigningProvider::GetKey(const CKeyID& keyid, CKey& key) const
36 {
37  if (m_hide_secret) return false;
38  return m_provider->GetKey(keyid, key);
39 }
40 
42 {
43  if (m_hide_origin) return false;
44  return m_provider->GetKeyOrigin(keyid, info);
45 }
46 
48 {
49  return m_provider->GetTaprootSpendData(output_key, spenddata);
50 }
52 {
53  return m_provider->GetTaprootBuilder(output_key, builder);
54 }
55 std::vector<CPubKey> HidingSigningProvider::GetMuSig2ParticipantPubkeys(const CPubKey& pubkey) const
56 {
57  if (m_hide_origin) return {};
59 }
60 
61 std::map<CPubKey, std::vector<CPubKey>> HidingSigningProvider::GetAllMuSig2ParticipantPubkeys() const
62 {
64 }
65 
67 {
68  m_provider->SetMuSig2SecNonce(id, std::move(nonce));
69 }
70 
71 std::optional<std::reference_wrapper<MuSig2SecNonce>> HidingSigningProvider::GetMuSig2SecNonce(const uint256& session_id) const
72 {
73  return m_provider->GetMuSig2SecNonce(session_id);
74 }
75 
77 {
78  m_provider->DeleteMuSig2Session(session_id);
79 }
80 
81 bool FlatSigningProvider::GetCScript(const CScriptID& scriptid, CScript& script) const { return LookupHelper(scripts, scriptid, script); }
82 bool FlatSigningProvider::GetPubKey(const CKeyID& keyid, CPubKey& pubkey) const { return LookupHelper(pubkeys, keyid, pubkey); }
84 {
85  std::pair<CPubKey, KeyOriginInfo> out;
86  bool ret = LookupHelper(origins, keyid, out);
87  if (ret) info = std::move(out.second);
88  return ret;
89 }
90 bool FlatSigningProvider::HaveKey(const CKeyID &keyid) const
91 {
92  CKey key;
93  return LookupHelper(keys, keyid, key);
94 }
95 bool FlatSigningProvider::GetKey(const CKeyID& keyid, CKey& key) const { return LookupHelper(keys, keyid, key); }
97 {
98  TaprootBuilder builder;
99  if (LookupHelper(tr_trees, output_key, builder)) {
100  spenddata = builder.GetSpendData();
101  return true;
102  }
103  return false;
104 }
106 {
107  return LookupHelper(tr_trees, output_key, builder);
108 }
109 
110 std::vector<CPubKey> FlatSigningProvider::GetMuSig2ParticipantPubkeys(const CPubKey& pubkey) const
111 {
112  std::vector<CPubKey> participant_pubkeys;
113  LookupHelper(aggregate_pubkeys, pubkey, participant_pubkeys);
114  return participant_pubkeys;
115 }
116 
117 std::map<CPubKey, std::vector<CPubKey>> FlatSigningProvider::GetAllMuSig2ParticipantPubkeys() const
118 {
119  return aggregate_pubkeys;
120 }
121 
123 {
124  if (!Assume(musig2_secnonces)) return;
125  auto [it, inserted] = musig2_secnonces->try_emplace(session_id, std::move(nonce));
126  // No secnonce should exist for this session yet.
127  Assert(inserted);
128 }
129 
130 std::optional<std::reference_wrapper<MuSig2SecNonce>> FlatSigningProvider::GetMuSig2SecNonce(const uint256& session_id) const
131 {
132  if (!Assume(musig2_secnonces)) return std::nullopt;
133  const auto& it = musig2_secnonces->find(session_id);
134  if (it == musig2_secnonces->end()) return std::nullopt;
135  return it->second;
136 }
137 
139 {
140  if (!Assume(musig2_secnonces)) return;
141  musig2_secnonces->erase(session_id);
142 }
143 
145 {
146  scripts.merge(b.scripts);
147  pubkeys.merge(b.pubkeys);
148  keys.merge(b.keys);
149  origins.merge(b.origins);
150  tr_trees.merge(b.tr_trees);
151  aggregate_pubkeys.merge(b.aggregate_pubkeys);
152  // We shouldn't be merging 2 different sessions, just overwrite with b's sessions.
153  if (!musig2_secnonces) musig2_secnonces = b.musig2_secnonces;
154  return *this;
155 }
156 
158 {
160  CKeyID key_id = pubkey.GetID();
161  // This adds the redeemscripts necessary to detect P2WPKH and P2SH-P2WPKH
162  // outputs. Technically P2WPKH outputs don't have a redeemscript to be
163  // spent. However, our current IsMine logic requires the corresponding
164  // P2SH-P2WPKH redeemscript to be present in the wallet in order to accept
165  // payment even to P2WPKH outputs.
166  // Also note that having superfluous scripts in the keystore never hurts.
167  // They're only used to guide recursion in signing and IsMine logic - if
168  // a script is present but we can't do anything with it, it has no effect.
169  // "Implicitly" refers to fact that scripts are derived automatically from
170  // existing keys, and are present in memory, even without being explicitly
171  // loaded (e.g. from a file).
172  if (pubkey.IsCompressed()) {
174  // This does not use AddCScript, as it may be overridden.
175  CScriptID id(script);
176  mapScripts[id] = std::move(script);
177  }
178 }
179 
180 bool FillableSigningProvider::GetPubKey(const CKeyID &address, CPubKey &vchPubKeyOut) const
181 {
182  CKey key;
183  if (!GetKey(address, key)) {
184  return false;
185  }
186  vchPubKeyOut = key.GetPubKey();
187  return true;
188 }
189 
190 bool FillableSigningProvider::AddKeyPubKey(const CKey& key, const CPubKey &pubkey)
191 {
192  LOCK(cs_KeyStore);
193  mapKeys[pubkey.GetID()] = key;
195  return true;
196 }
197 
198 bool FillableSigningProvider::HaveKey(const CKeyID &address) const
199 {
200  LOCK(cs_KeyStore);
201  return mapKeys.contains(address);
202 }
203 
204 std::set<CKeyID> FillableSigningProvider::GetKeys() const
205 {
206  LOCK(cs_KeyStore);
207  std::set<CKeyID> set_address;
208  for (const auto& mi : mapKeys) {
209  set_address.insert(mi.first);
210  }
211  return set_address;
212 }
213 
214 bool FillableSigningProvider::GetKey(const CKeyID &address, CKey &keyOut) const
215 {
216  LOCK(cs_KeyStore);
217  KeyMap::const_iterator mi = mapKeys.find(address);
218  if (mi != mapKeys.end()) {
219  keyOut = mi->second;
220  return true;
221  }
222  return false;
223 }
224 
226 {
227  if (redeemScript.size() > MAX_SCRIPT_ELEMENT_SIZE) {
228  LogError("FillableSigningProvider::AddCScript(): redeemScripts > %i bytes are invalid\n", MAX_SCRIPT_ELEMENT_SIZE);
229  return false;
230  }
231 
232  LOCK(cs_KeyStore);
233  mapScripts[CScriptID(redeemScript)] = redeemScript;
234  return true;
235 }
236 
238 {
239  LOCK(cs_KeyStore);
240  return mapScripts.contains(hash);
241 }
242 
243 std::set<CScriptID> FillableSigningProvider::GetCScripts() const
244 {
245  LOCK(cs_KeyStore);
246  std::set<CScriptID> set_script;
247  for (const auto& mi : mapScripts) {
248  set_script.insert(mi.first);
249  }
250  return set_script;
251 }
252 
253 bool FillableSigningProvider::GetCScript(const CScriptID &hash, CScript& redeemScriptOut) const
254 {
255  LOCK(cs_KeyStore);
256  ScriptMap::const_iterator mi = mapScripts.find(hash);
257  if (mi != mapScripts.end())
258  {
259  redeemScriptOut = (*mi).second;
260  return true;
261  }
262  return false;
263 }
264 
266 {
267  // Only supports destinations which map to single public keys:
268  // P2PKH, P2WPKH, P2SH-P2WPKH, P2TR
269  if (auto id = std::get_if<PKHash>(&dest)) {
270  return ToKeyID(*id);
271  }
272  if (auto witness_id = std::get_if<WitnessV0KeyHash>(&dest)) {
273  return ToKeyID(*witness_id);
274  }
275  if (auto script_hash = std::get_if<ScriptHash>(&dest)) {
276  CScript script;
277  CScriptID script_id = ToScriptID(*script_hash);
278  CTxDestination inner_dest;
279  if (store.GetCScript(script_id, script) && ExtractDestination(script, inner_dest)) {
280  if (auto inner_witness_id = std::get_if<WitnessV0KeyHash>(&inner_dest)) {
281  return ToKeyID(*inner_witness_id);
282  }
283  }
284  }
285  if (auto output_key = std::get_if<WitnessV1Taproot>(&dest)) {
286  TaprootSpendData spenddata;
287  CPubKey pub;
288  if (store.GetTaprootSpendData(*output_key, spenddata)
289  && !spenddata.internal_key.IsNull()
290  && spenddata.merkle_root.IsNull()
291  && store.GetPubKeyByXOnly(spenddata.internal_key, pub)) {
292  return pub.GetID();
293  }
294  }
295  return CKeyID();
296 }
297 
298 void MultiSigningProvider::AddProvider(std::unique_ptr<SigningProvider> provider)
299 {
300  m_providers.push_back(std::move(provider));
301 }
302 
304 {
305  for (const auto& provider: m_providers) {
306  if (provider->GetCScript(scriptid, script)) return true;
307  }
308  return false;
309 }
310 
311 bool MultiSigningProvider::GetPubKey(const CKeyID& keyid, CPubKey& pubkey) const
312 {
313  for (const auto& provider: m_providers) {
314  if (provider->GetPubKey(keyid, pubkey)) return true;
315  }
316  return false;
317 }
318 
319 
321 {
322  for (const auto& provider: m_providers) {
323  if (provider->GetKeyOrigin(keyid, info)) return true;
324  }
325  return false;
326 }
327 
328 bool MultiSigningProvider::GetKey(const CKeyID& keyid, CKey& key) const
329 {
330  for (const auto& provider: m_providers) {
331  if (provider->GetKey(keyid, key)) return true;
332  }
333  return false;
334 }
335 
337 {
338  for (const auto& provider: m_providers) {
339  if (provider->GetTaprootSpendData(output_key, spenddata)) return true;
340  }
341  return false;
342 }
343 
345 {
346  for (const auto& provider: m_providers) {
347  if (provider->GetTaprootBuilder(output_key, builder)) return true;
348  }
349  return false;
350 }
351 
353 {
354  NodeInfo ret;
355  /* Iterate over all tracked leaves in a, add b's hash to their Merkle branch, and move them to ret. */
356  for (auto& leaf : a.leaves) {
357  leaf.merkle_branch.push_back(b.hash);
358  ret.leaves.emplace_back(std::move(leaf));
359  }
360  /* Iterate over all tracked leaves in b, add a's hash to their Merkle branch, and move them to ret. */
361  for (auto& leaf : b.leaves) {
362  leaf.merkle_branch.push_back(a.hash);
363  ret.leaves.emplace_back(std::move(leaf));
364  }
365  ret.hash = ComputeTapbranchHash(a.hash, b.hash);
366  return ret;
367 }
368 
370 {
371  // TODO: figure out how to better deal with conflicting information
372  // being merged.
373  if (internal_key.IsNull() && !other.internal_key.IsNull()) {
374  internal_key = other.internal_key;
375  }
376  if (merkle_root.IsNull() && !other.merkle_root.IsNull()) {
377  merkle_root = other.merkle_root;
378  }
379  for (auto& [key, control_blocks] : other.scripts) {
380  scripts[key].merge(std::move(control_blocks));
381  }
382 }
383 
385 {
386  assert(depth >= 0 && (size_t)depth <= TAPROOT_CONTROL_MAX_NODE_COUNT);
387  /* We cannot insert a leaf at a lower depth while a deeper branch is unfinished. Doing
388  * so would mean the Add() invocations do not correspond to a DFS traversal of a
389  * binary tree. */
390  if ((size_t)depth + 1 < m_branch.size()) {
391  m_valid = false;
392  return;
393  }
394  /* As long as an entry in the branch exists at the specified depth, combine it and propagate up.
395  * The 'node' variable is overwritten here with the newly combined node. */
396  while (m_valid && m_branch.size() > (size_t)depth && m_branch[depth].has_value()) {
397  node = Combine(std::move(node), std::move(*m_branch[depth]));
398  m_branch.pop_back();
399  if (depth == 0) m_valid = false; /* Can't propagate further up than the root */
400  --depth;
401  }
402  if (m_valid) {
403  /* Make sure the branch is big enough to place the new node. */
404  if (m_branch.size() <= (size_t)depth) m_branch.resize((size_t)depth + 1);
405  assert(!m_branch[depth].has_value());
406  m_branch[depth] = std::move(node);
407  }
408 }
409 
410 /*static*/ bool TaprootBuilder::ValidDepths(const std::vector<int>& depths)
411 {
412  std::vector<bool> branch;
413  for (int depth : depths) {
414  // This inner loop corresponds to effectively the same logic on branch
415  // as what Insert() performs on the m_branch variable. Instead of
416  // storing a NodeInfo object, just remember whether or not there is one
417  // at that depth.
418  if (depth < 0 || (size_t)depth > TAPROOT_CONTROL_MAX_NODE_COUNT) return false;
419  if ((size_t)depth + 1 < branch.size()) return false;
420  while (branch.size() > (size_t)depth && branch[depth]) {
421  branch.pop_back();
422  if (depth == 0) return false;
423  --depth;
424  }
425  if (branch.size() <= (size_t)depth) branch.resize((size_t)depth + 1);
426  assert(!branch[depth]);
427  branch[depth] = true;
428  }
429  // And this check corresponds to the IsComplete() check on m_branch.
430  return branch.size() == 0 || (branch.size() == 1 && branch[0]);
431 }
432 
433 TaprootBuilder& TaprootBuilder::Add(int depth, std::span<const unsigned char> script, int leaf_version, bool track)
434 {
435  assert((leaf_version & ~TAPROOT_LEAF_MASK) == 0);
436  if (!IsValid()) return *this;
437  /* Construct NodeInfo object with leaf hash and (if track is true) also leaf information. */
438  NodeInfo node;
439  node.hash = ComputeTapleafHash(leaf_version, script);
440  if (track) node.leaves.emplace_back(LeafInfo{std::vector<unsigned char>(script.begin(), script.end()), leaf_version, {}});
441  /* Insert into the branch. */
442  Insert(std::move(node), depth);
443  return *this;
444 }
445 
447 {
448  if (!IsValid()) return *this;
449  /* Construct NodeInfo object with the hash directly, and insert it into the branch. */
450  NodeInfo node;
451  node.hash = hash;
452  Insert(std::move(node), depth);
453  return *this;
454 }
455 
457 {
458  /* Can only call this function when IsComplete() is true. */
459  assert(IsComplete());
460  m_internal_key = internal_key;
461  auto ret = m_internal_key.CreateTapTweak(m_branch.size() == 0 ? nullptr : &m_branch[0]->hash);
462  assert(ret.has_value());
463  std::tie(m_output_key, m_parity) = *ret;
464  return *this;
465 }
466 
468 
470 {
471  assert(IsComplete());
473  TaprootSpendData spd;
474  spd.merkle_root = m_branch.size() == 0 ? uint256() : m_branch[0]->hash;
475  spd.internal_key = m_internal_key;
476  if (m_branch.size()) {
477  // If any script paths exist, they have been combined into the root m_branch[0]
478  // by now. Compute the control block for each of its tracked leaves, and put them in
479  // spd.scripts.
480  for (const auto& leaf : m_branch[0]->leaves) {
481  std::vector<unsigned char> control_block;
482  control_block.resize(TAPROOT_CONTROL_BASE_SIZE + TAPROOT_CONTROL_NODE_SIZE * leaf.merkle_branch.size());
483  control_block[0] = leaf.leaf_version | (m_parity ? 1 : 0);
484  std::copy(m_internal_key.begin(), m_internal_key.end(), control_block.begin() + 1);
485  if (leaf.merkle_branch.size()) {
486  std::copy(leaf.merkle_branch[0].begin(),
487  leaf.merkle_branch[0].begin() + TAPROOT_CONTROL_NODE_SIZE * leaf.merkle_branch.size(),
488  control_block.begin() + TAPROOT_CONTROL_BASE_SIZE);
489  }
490  spd.scripts[{leaf.script, leaf.leaf_version}].insert(std::move(control_block));
491  }
492  }
493  return spd;
494 }
495 
496 std::optional<std::vector<std::tuple<int, std::vector<unsigned char>, int>>> InferTaprootTree(const TaprootSpendData& spenddata, const XOnlyPubKey& output)
497 {
498  // Verify that the output matches the assumed Merkle root and internal key.
499  auto tweak = spenddata.internal_key.CreateTapTweak(spenddata.merkle_root.IsNull() ? nullptr : &spenddata.merkle_root);
500  if (!tweak || tweak->first != output) return std::nullopt;
501  // If the Merkle root is 0, the tree is empty, and we're done.
502  std::vector<std::tuple<int, std::vector<unsigned char>, int>> ret;
503  if (spenddata.merkle_root.IsNull()) return ret;
504 
506  struct TreeNode {
508  uint256 hash;
510  std::unique_ptr<TreeNode> sub[2];
513  const std::pair<std::vector<unsigned char>, int>* leaf = nullptr;
515  bool explored = false;
517  bool inner;
519  bool done = false;
520  };
521 
522  // Build tree from the provided branches.
523  TreeNode root;
524  root.hash = spenddata.merkle_root;
525  for (const auto& [key, control_blocks] : spenddata.scripts) {
526  const auto& [script, leaf_ver] = key;
527  for (const auto& control : control_blocks) {
528  // Skip script records with nonsensical leaf version.
529  if (leaf_ver < 0 || leaf_ver >= 0x100 || leaf_ver & 1) continue;
530  // Skip script records with invalid control block sizes.
531  if (control.size() < TAPROOT_CONTROL_BASE_SIZE || control.size() > TAPROOT_CONTROL_MAX_SIZE ||
532  ((control.size() - TAPROOT_CONTROL_BASE_SIZE) % TAPROOT_CONTROL_NODE_SIZE) != 0) continue;
533  // Skip script records that don't match the control block.
534  if ((control[0] & TAPROOT_LEAF_MASK) != leaf_ver) continue;
535  // Skip script records that don't match the provided Merkle root.
536  const uint256 leaf_hash = ComputeTapleafHash(leaf_ver, script);
537  const uint256 merkle_root = ComputeTaprootMerkleRoot(control, leaf_hash);
538  if (merkle_root != spenddata.merkle_root) continue;
539 
540  TreeNode* node = &root;
541  size_t levels = (control.size() - TAPROOT_CONTROL_BASE_SIZE) / TAPROOT_CONTROL_NODE_SIZE;
542  for (size_t depth = 0; depth < levels; ++depth) {
543  // Can't descend into a node which we already know is a leaf.
544  if (node->explored && !node->inner) return std::nullopt;
545 
546  // Extract partner hash from Merkle branch in control block.
547  uint256 hash;
548  std::copy(control.begin() + TAPROOT_CONTROL_BASE_SIZE + (levels - 1 - depth) * TAPROOT_CONTROL_NODE_SIZE,
549  control.begin() + TAPROOT_CONTROL_BASE_SIZE + (levels - depth) * TAPROOT_CONTROL_NODE_SIZE,
550  hash.begin());
551 
552  if (node->sub[0]) {
553  // Descend into the existing left or right branch.
554  bool desc = false;
555  for (int i = 0; i < 2; ++i) {
556  if (node->sub[i]->hash == hash || (node->sub[i]->hash.IsNull() && node->sub[1-i]->hash != hash)) {
557  node->sub[i]->hash = hash;
558  node = &*node->sub[1-i];
559  desc = true;
560  break;
561  }
562  }
563  if (!desc) return std::nullopt; // This probably requires a hash collision to hit.
564  } else {
565  // We're in an unexplored node. Create subtrees and descend.
566  node->explored = true;
567  node->inner = true;
568  node->sub[0] = std::make_unique<TreeNode>();
569  node->sub[1] = std::make_unique<TreeNode>();
570  node->sub[1]->hash = hash;
571  node = &*node->sub[0];
572  }
573  }
574  // Cannot turn a known inner node into a leaf.
575  if (node->sub[0]) return std::nullopt;
576  node->explored = true;
577  node->inner = false;
578  node->leaf = &key;
579  node->hash = leaf_hash;
580  }
581  }
582 
583  // Recursive processing to turn the tree into flattened output. Use an explicit stack here to avoid
584  // overflowing the call stack (the tree may be 128 levels deep).
585  std::vector<TreeNode*> stack{&root};
586  while (!stack.empty()) {
587  TreeNode& node = *stack.back();
588  if (!node.explored) {
589  // Unexplored node, which means the tree is incomplete.
590  return std::nullopt;
591  } else if (!node.inner) {
592  // Leaf node; produce output.
593  ret.emplace_back(stack.size() - 1, node.leaf->first, node.leaf->second);
594  node.done = true;
595  stack.pop_back();
596  } else if (node.sub[0]->done && !node.sub[1]->done && !node.sub[1]->explored && !node.sub[1]->hash.IsNull() &&
597  ComputeTapbranchHash(node.sub[1]->hash, node.sub[1]->hash) == node.hash) {
598  // Whenever there are nodes with two identical subtrees under it, we run into a problem:
599  // the control blocks for the leaves underneath those will be identical as well, and thus
600  // they will all be matched to the same path in the tree. The result is that at the location
601  // where the duplicate occurred, the left child will contain a normal tree that can be explored
602  // and processed, but the right one will remain unexplored.
603  //
604  // This situation can be detected, by encountering an inner node with unexplored right subtree
605  // with known hash, and H_TapBranch(hash, hash) is equal to the parent node (this node)'s hash.
606  //
607  // To deal with this, simply process the left tree a second time (set its done flag to false;
608  // noting that the done flag of its children have already been set to false after processing
609  // those). To avoid ending up in an infinite loop, set the done flag of the right (unexplored)
610  // subtree to true.
611  node.sub[0]->done = false;
612  node.sub[1]->done = true;
613  } else if (node.sub[0]->done && node.sub[1]->done) {
614  // An internal node which we're finished with.
615  node.sub[0]->done = false;
616  node.sub[1]->done = false;
617  node.done = true;
618  stack.pop_back();
619  } else if (!node.sub[0]->done) {
620  // An internal node whose left branch hasn't been processed yet. Do so first.
621  stack.push_back(&*node.sub[0]);
622  } else if (!node.sub[1]->done) {
623  // An internal node whose right branch hasn't been processed yet. Do so first.
624  stack.push_back(&*node.sub[1]);
625  }
626  }
627 
628  return ret;
629 }
630 
631 std::vector<std::tuple<uint8_t, uint8_t, std::vector<unsigned char>>> TaprootBuilder::GetTreeTuples() const
632 {
633  assert(IsComplete());
634  std::vector<std::tuple<uint8_t, uint8_t, std::vector<unsigned char>>> tuples;
635  if (m_branch.size()) {
636  const auto& leaves = m_branch[0]->leaves;
637  for (const auto& leaf : leaves) {
638  assert(leaf.merkle_branch.size() <= TAPROOT_CONTROL_MAX_NODE_COUNT);
639  uint8_t depth = (uint8_t)leaf.merkle_branch.size();
640  uint8_t leaf_ver = (uint8_t)leaf.leaf_version;
641  tuples.emplace_back(depth, leaf_ver, leaf.script);
642  }
643  }
644  return tuples;
645 }
virtual bool GetPubKey(const CKeyID &address, CPubKey &vchPubKeyOut) const override
void SetMuSig2SecNonce(const uint256 &id, MuSig2SecNonce &&nonce) const override
int ret
bool GetPubKey(const CKeyID &keyid, CPubKey &pubkey) const override
AssertLockHeld(pool.cs)
virtual bool GetCScript(const CScriptID &hash, CScript &redeemScriptOut) const override
assert(!tx.IsCoinBase())
bool GetPubKeyByXOnly(const XOnlyPubKey &pubkey, CPubKey &out) const
bool IsNull() const
Test whether this is the 0 key (the result of default construction).
Definition: pubkey.h:250
std::vector< CPubKey > GetMuSig2ParticipantPubkeys(const CPubKey &pubkey) const override
unsigned int nonce
Definition: miner_tests.cpp:82
const SigningProvider * m_provider
RecursiveMutex cs_KeyStore
std::optional< std::reference_wrapper< MuSig2SecNonce > > GetMuSig2SecNonce(const uint256 &session_id) const override
CPubKey GetPubKey() const
Compute the public key from a private key.
Definition: key.cpp:183
virtual std::vector< CPubKey > GetMuSig2ParticipantPubkeys(const CPubKey &pubkey) const
std::map< CKeyID, CKey > keys
bool GetKeyOrigin(const CKeyID &keyid, KeyOriginInfo &info) const override
virtual bool AddCScript(const CScript &redeemScript)
Information associated with a node in the Merkle tree.
TaprootBuilder & AddOmitted(int depth, const uint256 &hash)
Like Add(), but for a Merkle node with a given hash to the tree.
virtual std::set< CScriptID > GetCScripts() const
std::vector< std::unique_ptr< SigningProvider > > m_providers
virtual std::set< CKeyID > GetKeys() const
std::map< CKeyID, std::pair< CPubKey, KeyOriginInfo > > origins
CKeyID GetKeyForDestination(const SigningProvider &store, const CTxDestination &dest)
Return the CKeyID of the key involved in a script (if there is a unique one).
MuSig2SecNonce encapsulates a secret nonce in use in a MuSig2 signing session.
Definition: musig.h:39
virtual void DeleteMuSig2Session(const uint256 &session_id) const
bool GetTaprootSpendData(const XOnlyPubKey &output_key, TaprootSpendData &spenddata) const override
std::vector< std::tuple< uint8_t, uint8_t, std::vector< unsigned char > > > GetTreeTuples() const
Returns a vector of tuples representing the depth, leaf version, and script.
static constexpr size_t TAPROOT_CONTROL_BASE_SIZE
Definition: interpreter.h:243
void AddProvider(std::unique_ptr< SigningProvider > provider)
static int tweak(const secp256k1_context *ctx, secp256k1_xonly_pubkey *agg_pk, secp256k1_musig_keyagg_cache *cache)
Definition: musig.c:64
bool GetCScript(const CScriptID &scriptid, CScript &script) const override
virtual std::optional< std::reference_wrapper< MuSig2SecNonce > > GetMuSig2SecNonce(const uint256 &session_id) const
CKeyID GetID() const
Get the KeyID of this public key (hash of its serialization)
Definition: pubkey.h:160
bool GetKeyOrigin(const CKeyID &keyid, KeyOriginInfo &info) const override
constexpr unsigned char * begin()
Definition: uint256.h:100
std::vector< std::optional< NodeInfo > > m_branch
The current state of the builder.
void DeleteMuSig2Session(const uint256 &session_id) const override
static constexpr size_t TAPROOT_CONTROL_NODE_SIZE
Definition: interpreter.h:244
std::optional< std::vector< std::tuple< int, std::vector< unsigned char >, int > > > InferTaprootTree(const TaprootSpendData &spenddata, const XOnlyPubKey &output)
Given a TaprootSpendData and the output key, reconstruct its script tree.
XOnlyPubKey m_internal_key
The internal key, set when finalizing.
virtual bool GetTaprootSpendData(const XOnlyPubKey &output_key, TaprootSpendData &spenddata) const
std::map< uint256, MuSig2SecNonce > * musig2_secnonces
MuSig2 aggregate pubkeys.
const unsigned char * begin() const
Definition: pubkey.h:295
std::map< std::pair< std::vector< unsigned char >, int >, std::set< std::vector< unsigned char >, ShortestVectorFirstComparator > > scripts
Map from (script, leaf_version) to (sets of) control blocks.
virtual bool GetPubKey(const CKeyID &address, CPubKey &pubkey) const
bool ExtractDestination(const CScript &scriptPubKey, CTxDestination &addressRet)
Parse a scriptPubKey for the destination.
Definition: addresstype.cpp:49
std::map< CScriptID, CScript > scripts
bool HaveKey(const CKeyID &keyid) const override
virtual bool GetKeyOrigin(const CKeyID &keyid, KeyOriginInfo &info) const
#define LOCK(cs)
Definition: sync.h:258
bool GetPubKey(const CKeyID &keyid, CPubKey &pubkey) const override
const SigningProvider & DUMMY_SIGNING_PROVIDER
uint256 ComputeTaprootMerkleRoot(std::span< const unsigned char > control, const uint256 &tapleaf_hash)
Compute the BIP341 taproot script tree Merkle root from control block and leaf hash.
static constexpr uint8_t TAPROOT_LEAF_MASK
Definition: interpreter.h:241
TaprootBuilder & Finalize(const XOnlyPubKey &internal_key)
Finalize the construction.
XOnlyPubKey m_output_key
The output key, computed when finalizing.
An encapsulated public key.
Definition: pubkey.h:33
bool GetKey(const CKeyID &keyid, CKey &key) const override
uint256 ComputeTapbranchHash(std::span< const unsigned char > a, std::span< const unsigned char > b)
Compute the BIP341 tapbranch hash from two branches.
std::map< CKeyID, CPubKey > pubkeys
WitnessV1Taproot GetOutput()
Compute scriptPubKey (after Finalize()).
virtual std::map< CPubKey, std::vector< CPubKey > > GetAllMuSig2ParticipantPubkeys() const
void SetMuSig2SecNonce(const uint256 &id, MuSig2SecNonce &&nonce) const override
void ImplicitlyLearnRelatedKeyScripts(const CPubKey &pubkey) EXCLUSIVE_LOCKS_REQUIRED(cs_KeyStore)
uint256 merkle_root
The Merkle root of the script tree (0 if no scripts).
constexpr bool IsNull() const
Definition: uint256.h:48
static constexpr size_t TAPROOT_CONTROL_MAX_SIZE
Definition: interpreter.h:246
#define Assume(val)
Assume is the identity function.
Definition: check.h:125
virtual bool GetCScript(const CScriptID &scriptid, CScript &script) const
bool IsFullyValid() const
Determine if this pubkey is fully valid.
Definition: pubkey.cpp:230
virtual bool GetKey(const CKeyID &address, CKey &key) const
virtual bool GetKey(const CKeyID &address, CKey &keyOut) const override
CScript GetScriptForDestination(const CTxDestination &dest)
Generate a Bitcoin scriptPubKey for the given CTxDestination.
FlatSigningProvider & Merge(FlatSigningProvider &&b) LIFETIMEBOUND
std::map< CPubKey, std::vector< CPubKey > > GetAllMuSig2ParticipantPubkeys() const override
std::map< CPubKey, std::vector< CPubKey > > aggregate_pubkeys
Map from output key to Taproot tree (which can then make the TaprootSpendData.
TaprootSpendData GetSpendData() const
Compute spending data (after Finalize()).
Definition: messages.h:21
bool GetTaprootBuilder(const XOnlyPubKey &output_key, TaprootBuilder &builder) const override
Utility class to construct Taproot outputs from internal key and script tree.
bool m_parity
The tweak parity, computed when finalizing.
void Insert(NodeInfo &&node, int depth)
Insert information about a node at a certain depth, and propagate information up. ...
256-bit opaque blob.
Definition: uint256.h:195
TaprootBuilder & Add(int depth, std::span< const unsigned char > script, int leaf_version, bool track=true)
Add a new script at a certain depth in the tree.
static constexpr size_t TAPROOT_CONTROL_MAX_NODE_COUNT
Definition: interpreter.h:245
bool GetCScript(const CScriptID &scriptid, CScript &script) const override
bool GetKey(const CKeyID &keyid, CKey &key) const override
static bool ValidDepths(const std::vector< int > &depths)
Check if a list of depths is legal (will lead to IsComplete()).
bool GetTaprootBuilder(const XOnlyPubKey &output_key, TaprootBuilder &builder) const override
An interface to be implemented by keystores that support signing.
Serialized script, used inside transaction inputs and outputs.
Definition: script.h:404
XOnlyPubKey internal_key
The BIP341 internal key.
bool GetTaprootBuilder(const XOnlyPubKey &output_key, TaprootBuilder &builder) const override
std::variant< CNoDestination, PubKeyDestination, PKHash, ScriptHash, WitnessV0ScriptHash, WitnessV0KeyHash, WitnessV1Taproot, PayToAnchor, WitnessUnknown > CTxDestination
A txout script categorized into standard templates.
Definition: addresstype.h:143
bool GetKeyOrigin(const CKeyID &keyid, KeyOriginInfo &info) const override
static const unsigned int MAX_SCRIPT_ELEMENT_SIZE
Definition: script.h:28
A reference to a CKey: the Hash160 of its serialized public key.
Definition: pubkey.h:23
std::optional< std::reference_wrapper< MuSig2SecNonce > > GetMuSig2SecNonce(const uint256 &session_id) const override
virtual bool HaveCScript(const CScriptID &hash) const override
CScriptID ToScriptID(const ScriptHash &script_hash)
Definition: addresstype.cpp:39
A reference to a CScript: the Hash160 of its serialization.
Definition: script.h:593
size_type size() const
Definition: prevector.h:247
virtual bool AddKeyPubKey(const CKey &key, const CPubKey &pubkey)
bool IsComplete() const
Return whether there were either no leaves, or the leaves form a Huffman tree.
std::vector< CPubKey > GetMuSig2ParticipantPubkeys(const CPubKey &pubkey) const override
An encapsulated private key.
Definition: key.h:35
bool GetKey(const CKeyID &keyid, CKey &key) const override
virtual void SetMuSig2SecNonce(const uint256 &id, MuSig2SecNonce &&nonce) const
static NodeInfo Combine(NodeInfo &&a, NodeInfo &&b)
Combine information about a parent Merkle tree node from its child nodes.
bool IsValid() const
Return true if so far all input was valid.
std::map< CPubKey, std::vector< CPubKey > > GetAllMuSig2ParticipantPubkeys() const override
uint256 ComputeTapleafHash(uint8_t leaf_version, std::span< const unsigned char > script)
Compute the BIP341 tapleaf hash from leaf version & script.
const unsigned char * end() const
Definition: pubkey.h:296
std::optional< std::pair< XOnlyPubKey, bool > > CreateTapTweak(const uint256 *merkle_root) const
Construct a Taproot tweaked output point with this point as internal key.
Definition: pubkey.cpp:265
bool LookupHelper(const M &map, const K &key, V &value)
virtual bool GetTaprootBuilder(const XOnlyPubKey &output_key, TaprootBuilder &builder) const
bool GetPubKey(const CKeyID &keyid, CPubKey &pubkey) const override
bool GetCScript(const CScriptID &scriptid, CScript &script) const override
Information about a tracked leaf in the Merkle tree.
bool GetTaprootSpendData(const XOnlyPubKey &output_key, TaprootSpendData &spenddata) const override
CKeyID ToKeyID(const PKHash &key_hash)
Definition: addresstype.cpp:29
#define Assert(val)
Identity function.
Definition: check.h:113
#define LogError(...)
Definition: log.h:97
std::map< XOnlyPubKey, TaprootBuilder > tr_trees
void Merge(TaprootSpendData other)
Merge other TaprootSpendData (for the same scriptPubKey) into this.
bool GetTaprootSpendData(const XOnlyPubKey &output_key, TaprootSpendData &spenddata) const override
bool m_valid
Whether the builder is in a valid state so far.
void DeleteMuSig2Session(const uint256 &session_id) const override
bool IsCompressed() const
Check whether this is a compressed public key.
Definition: pubkey.h:200
virtual bool HaveKey(const CKeyID &address) const override