Bitcoin Core 30.99.0
P2P Digital Currency
interpreter.cpp
Go to the documentation of this file.
1// Copyright (c) 2009-2010 Satoshi Nakamoto
2// Copyright (c) 2009-present The Bitcoin Core developers
3// Distributed under the MIT software license, see the accompanying
4// file COPYING or http://www.opensource.org/licenses/mit-license.php.
5
7
8#include <crypto/ripemd160.h>
9#include <crypto/sha1.h>
10#include <crypto/sha256.h>
11#include <pubkey.h>
12#include <script/script.h>
13#include <tinyformat.h>
14#include <uint256.h>
15
16typedef std::vector<unsigned char> valtype;
17
18namespace {
19
20inline bool set_success(ScriptError* ret)
21{
22 if (ret)
24 return true;
25}
26
27inline bool set_error(ScriptError* ret, const ScriptError serror)
28{
29 if (ret)
30 *ret = serror;
31 return false;
32}
33
34} // namespace
35
36bool CastToBool(const valtype& vch)
37{
38 for (unsigned int i = 0; i < vch.size(); i++)
39 {
40 if (vch[i] != 0)
41 {
42 // Can be negative zero
43 if (i == vch.size()-1 && vch[i] == 0x80)
44 return false;
45 return true;
46 }
47 }
48 return false;
49}
50
55#define stacktop(i) (stack.at(size_t(int64_t(stack.size()) + int64_t{i})))
56#define altstacktop(i) (altstack.at(size_t(int64_t(altstack.size()) + int64_t{i})))
57static inline void popstack(std::vector<valtype>& stack)
58{
59 if (stack.empty())
60 throw std::runtime_error("popstack(): stack empty");
61 stack.pop_back();
62}
63
64bool static IsCompressedOrUncompressedPubKey(const valtype &vchPubKey) {
65 if (vchPubKey.size() < CPubKey::COMPRESSED_SIZE) {
66 // Non-canonical public key: too short
67 return false;
68 }
69 if (vchPubKey[0] == 0x04) {
70 if (vchPubKey.size() != CPubKey::SIZE) {
71 // Non-canonical public key: invalid length for uncompressed key
72 return false;
73 }
74 } else if (vchPubKey[0] == 0x02 || vchPubKey[0] == 0x03) {
75 if (vchPubKey.size() != CPubKey::COMPRESSED_SIZE) {
76 // Non-canonical public key: invalid length for compressed key
77 return false;
78 }
79 } else {
80 // Non-canonical public key: neither compressed nor uncompressed
81 return false;
82 }
83 return true;
84}
85
86bool static IsCompressedPubKey(const valtype &vchPubKey) {
87 if (vchPubKey.size() != CPubKey::COMPRESSED_SIZE) {
88 // Non-canonical public key: invalid length for compressed key
89 return false;
90 }
91 if (vchPubKey[0] != 0x02 && vchPubKey[0] != 0x03) {
92 // Non-canonical public key: invalid prefix for compressed key
93 return false;
94 }
95 return true;
96}
97
108bool static IsValidSignatureEncoding(const std::vector<unsigned char> &sig) {
109 // Format: 0x30 [total-length] 0x02 [R-length] [R] 0x02 [S-length] [S] [sighash]
110 // * total-length: 1-byte length descriptor of everything that follows,
111 // excluding the sighash byte.
112 // * R-length: 1-byte length descriptor of the R value that follows.
113 // * R: arbitrary-length big-endian encoded R value. It must use the shortest
114 // possible encoding for a positive integer (which means no null bytes at
115 // the start, except a single one when the next byte has its highest bit set).
116 // * S-length: 1-byte length descriptor of the S value that follows.
117 // * S: arbitrary-length big-endian encoded S value. The same rules apply.
118 // * sighash: 1-byte value indicating what data is hashed (not part of the DER
119 // signature)
120
121 // Minimum and maximum size constraints.
122 if (sig.size() < 9) return false;
123 if (sig.size() > 73) return false;
124
125 // A signature is of type 0x30 (compound).
126 if (sig[0] != 0x30) return false;
127
128 // Make sure the length covers the entire signature.
129 if (sig[1] != sig.size() - 3) return false;
130
131 // Extract the length of the R element.
132 unsigned int lenR = sig[3];
133
134 // Make sure the length of the S element is still inside the signature.
135 if (5 + lenR >= sig.size()) return false;
136
137 // Extract the length of the S element.
138 unsigned int lenS = sig[5 + lenR];
139
140 // Verify that the length of the signature matches the sum of the length
141 // of the elements.
142 if ((size_t)(lenR + lenS + 7) != sig.size()) return false;
143
144 // Check whether the R element is an integer.
145 if (sig[2] != 0x02) return false;
146
147 // Zero-length integers are not allowed for R.
148 if (lenR == 0) return false;
149
150 // Negative numbers are not allowed for R.
151 if (sig[4] & 0x80) return false;
152
153 // Null bytes at the start of R are not allowed, unless R would
154 // otherwise be interpreted as a negative number.
155 if (lenR > 1 && (sig[4] == 0x00) && !(sig[5] & 0x80)) return false;
156
157 // Check whether the S element is an integer.
158 if (sig[lenR + 4] != 0x02) return false;
159
160 // Zero-length integers are not allowed for S.
161 if (lenS == 0) return false;
162
163 // Negative numbers are not allowed for S.
164 if (sig[lenR + 6] & 0x80) return false;
165
166 // Null bytes at the start of S are not allowed, unless S would otherwise be
167 // interpreted as a negative number.
168 if (lenS > 1 && (sig[lenR + 6] == 0x00) && !(sig[lenR + 7] & 0x80)) return false;
169
170 return true;
171}
172
173bool static IsLowDERSignature(const valtype &vchSig, ScriptError* serror) {
174 if (!IsValidSignatureEncoding(vchSig)) {
175 return set_error(serror, SCRIPT_ERR_SIG_DER);
176 }
177 // https://bitcoin.stackexchange.com/a/12556:
178 // Also note that inside transaction signatures, an extra hashtype byte
179 // follows the actual signature data.
180 std::vector<unsigned char> vchSigCopy(vchSig.begin(), vchSig.begin() + vchSig.size() - 1);
181 // If the S value is above the order of the curve divided by two, its
182 // complement modulo the order could have been used instead, which is
183 // one byte shorter when encoded correctly.
184 if (!CPubKey::CheckLowS(vchSigCopy)) {
185 return set_error(serror, SCRIPT_ERR_SIG_HIGH_S);
186 }
187 return true;
188}
189
190bool static IsDefinedHashtypeSignature(const valtype &vchSig) {
191 if (vchSig.size() == 0) {
192 return false;
193 }
194 unsigned char nHashType = vchSig[vchSig.size() - 1] & (~(SIGHASH_ANYONECANPAY));
195 if (nHashType < SIGHASH_ALL || nHashType > SIGHASH_SINGLE)
196 return false;
197
198 return true;
199}
200
201bool CheckSignatureEncoding(const std::vector<unsigned char> &vchSig, script_verify_flags flags, ScriptError* serror) {
202 // Empty signature. Not strictly DER encoded, but allowed to provide a
203 // compact way to provide an invalid signature for use with CHECK(MULTI)SIG
204 if (vchSig.size() == 0) {
205 return true;
206 }
208 return set_error(serror, SCRIPT_ERR_SIG_DER);
209 } else if ((flags & SCRIPT_VERIFY_LOW_S) != 0 && !IsLowDERSignature(vchSig, serror)) {
210 // serror is set
211 return false;
212 } else if ((flags & SCRIPT_VERIFY_STRICTENC) != 0 && !IsDefinedHashtypeSignature(vchSig)) {
213 return set_error(serror, SCRIPT_ERR_SIG_HASHTYPE);
214 }
215 return true;
216}
217
218bool static CheckPubKeyEncoding(const valtype &vchPubKey, script_verify_flags flags, const SigVersion &sigversion, ScriptError* serror) {
220 return set_error(serror, SCRIPT_ERR_PUBKEYTYPE);
221 }
222 // Only compressed keys are accepted in segwit
223 if ((flags & SCRIPT_VERIFY_WITNESS_PUBKEYTYPE) != 0 && sigversion == SigVersion::WITNESS_V0 && !IsCompressedPubKey(vchPubKey)) {
224 return set_error(serror, SCRIPT_ERR_WITNESS_PUBKEYTYPE);
225 }
226 return true;
227}
228
230{
231 int nFound = 0;
232 if (b.empty())
233 return nFound;
234 CScript result;
235 CScript::const_iterator pc = script.begin(), pc2 = script.begin(), end = script.end();
236 opcodetype opcode;
237 do
238 {
239 result.insert(result.end(), pc2, pc);
240 while (static_cast<size_t>(end - pc) >= b.size() && std::equal(b.begin(), b.end(), pc))
241 {
242 pc = pc + b.size();
243 ++nFound;
244 }
245 pc2 = pc;
246 }
247 while (script.GetOp(pc, opcode));
248
249 if (nFound > 0) {
250 result.insert(result.end(), pc2, end);
251 script = std::move(result);
252 }
253
254 return nFound;
255}
256
257namespace {
273class ConditionStack {
274private:
276 static constexpr uint32_t NO_FALSE = std::numeric_limits<uint32_t>::max();
277
279 uint32_t m_stack_size = 0;
281 uint32_t m_first_false_pos = NO_FALSE;
282
283public:
284 bool empty() const { return m_stack_size == 0; }
285 bool all_true() const { return m_first_false_pos == NO_FALSE; }
286 void push_back(bool f)
287 {
288 if (m_first_false_pos == NO_FALSE && !f) {
289 // The stack consists of all true values, and a false is added.
290 // The first false value will appear at the current size.
291 m_first_false_pos = m_stack_size;
292 }
293 ++m_stack_size;
294 }
295 void pop_back()
296 {
297 assert(m_stack_size > 0);
298 --m_stack_size;
299 if (m_first_false_pos == m_stack_size) {
300 // When popping off the first false value, everything becomes true.
301 m_first_false_pos = NO_FALSE;
302 }
303 }
304 void toggle_top()
305 {
306 assert(m_stack_size > 0);
307 if (m_first_false_pos == NO_FALSE) {
308 // The current stack is all true values; the first false will be the top.
309 m_first_false_pos = m_stack_size - 1;
310 } else if (m_first_false_pos == m_stack_size - 1) {
311 // The top is the first false value; toggling it will make everything true.
312 m_first_false_pos = NO_FALSE;
313 } else {
314 // There is a false value, but not on top. No action is needed as toggling
315 // anything but the first false value is unobservable.
316 }
317 }
318};
319}
320
321static bool EvalChecksigPreTapscript(const valtype& vchSig, const valtype& vchPubKey, CScript::const_iterator pbegincodehash, CScript::const_iterator pend, script_verify_flags flags, const BaseSignatureChecker& checker, SigVersion sigversion, ScriptError* serror, bool& fSuccess)
322{
323 assert(sigversion == SigVersion::BASE || sigversion == SigVersion::WITNESS_V0);
324
325 // Subset of script starting at the most recent codeseparator
326 CScript scriptCode(pbegincodehash, pend);
327
328 // Drop the signature in pre-segwit scripts but not segwit scripts
329 if (sigversion == SigVersion::BASE) {
330 int found = FindAndDelete(scriptCode, CScript() << vchSig);
331 if (found > 0 && (flags & SCRIPT_VERIFY_CONST_SCRIPTCODE))
332 return set_error(serror, SCRIPT_ERR_SIG_FINDANDDELETE);
333 }
334
335 if (!CheckSignatureEncoding(vchSig, flags, serror) || !CheckPubKeyEncoding(vchPubKey, flags, sigversion, serror)) {
336 //serror is set
337 return false;
338 }
339 fSuccess = checker.CheckECDSASignature(vchSig, vchPubKey, scriptCode, sigversion);
340
341 if (!fSuccess && (flags & SCRIPT_VERIFY_NULLFAIL) && vchSig.size())
342 return set_error(serror, SCRIPT_ERR_SIG_NULLFAIL);
343
344 return true;
345}
346
347static bool EvalChecksigTapscript(const valtype& sig, const valtype& pubkey, ScriptExecutionData& execdata, script_verify_flags flags, const BaseSignatureChecker& checker, SigVersion sigversion, ScriptError* serror, bool& success)
348{
349 assert(sigversion == SigVersion::TAPSCRIPT);
350
351 /*
352 * The following validation sequence is consensus critical. Please note how --
353 * upgradable public key versions precede other rules;
354 * the script execution fails when using empty signature with invalid public key;
355 * the script execution fails when using non-empty invalid signature.
356 */
357 success = !sig.empty();
358 if (success) {
359 // Implement the sigops/witnesssize ratio test.
360 // Passing with an upgradable public key version is also counted.
363 if (execdata.m_validation_weight_left < 0) {
364 return set_error(serror, SCRIPT_ERR_TAPSCRIPT_VALIDATION_WEIGHT);
365 }
366 }
367 if (pubkey.size() == 0) {
368 return set_error(serror, SCRIPT_ERR_PUBKEYTYPE);
369 } else if (pubkey.size() == 32) {
370 if (success && !checker.CheckSchnorrSignature(sig, pubkey, sigversion, execdata, serror)) {
371 return false; // serror is set
372 }
373 } else {
374 /*
375 * New public key version softforks should be defined before this `else` block.
376 * Generally, the new code should not do anything but failing the script execution. To avoid
377 * consensus bugs, it should not modify any existing values (including `success`).
378 */
380 return set_error(serror, SCRIPT_ERR_DISCOURAGE_UPGRADABLE_PUBKEYTYPE);
381 }
382 }
383
384 return true;
385}
386
392static bool EvalChecksig(const valtype& sig, const valtype& pubkey, CScript::const_iterator pbegincodehash, CScript::const_iterator pend, ScriptExecutionData& execdata, script_verify_flags flags, const BaseSignatureChecker& checker, SigVersion sigversion, ScriptError* serror, bool& success)
393{
394 switch (sigversion) {
395 case SigVersion::BASE:
397 return EvalChecksigPreTapscript(sig, pubkey, pbegincodehash, pend, flags, checker, sigversion, serror, success);
399 return EvalChecksigTapscript(sig, pubkey, execdata, flags, checker, sigversion, serror, success);
401 // Key path spending in Taproot has no script, so this is unreachable.
402 break;
403 }
404 assert(false);
405}
406
407bool EvalScript(std::vector<std::vector<unsigned char> >& stack, const CScript& script, script_verify_flags flags, const BaseSignatureChecker& checker, SigVersion sigversion, ScriptExecutionData& execdata, ScriptError* serror)
408{
409 static const CScriptNum bnZero(0);
410 static const CScriptNum bnOne(1);
411 // static const CScriptNum bnFalse(0);
412 // static const CScriptNum bnTrue(1);
413 static const valtype vchFalse(0);
414 // static const valtype vchZero(0);
415 static const valtype vchTrue(1, 1);
416
417 // sigversion cannot be TAPROOT here, as it admits no script execution.
418 assert(sigversion == SigVersion::BASE || sigversion == SigVersion::WITNESS_V0 || sigversion == SigVersion::TAPSCRIPT);
419
420 CScript::const_iterator pc = script.begin();
421 CScript::const_iterator pend = script.end();
422 CScript::const_iterator pbegincodehash = script.begin();
423 opcodetype opcode;
424 valtype vchPushValue;
425 ConditionStack vfExec;
426 std::vector<valtype> altstack;
427 set_error(serror, SCRIPT_ERR_UNKNOWN_ERROR);
428 if ((sigversion == SigVersion::BASE || sigversion == SigVersion::WITNESS_V0) && script.size() > MAX_SCRIPT_SIZE) {
429 return set_error(serror, SCRIPT_ERR_SCRIPT_SIZE);
430 }
431 int nOpCount = 0;
432 bool fRequireMinimal = (flags & SCRIPT_VERIFY_MINIMALDATA) != 0;
433 uint32_t opcode_pos = 0;
434 execdata.m_codeseparator_pos = 0xFFFFFFFFUL;
435 execdata.m_codeseparator_pos_init = true;
436
437 try
438 {
439 for (; pc < pend; ++opcode_pos) {
440 bool fExec = vfExec.all_true();
441
442 //
443 // Read instruction
444 //
445 if (!script.GetOp(pc, opcode, vchPushValue))
446 return set_error(serror, SCRIPT_ERR_BAD_OPCODE);
447 if (vchPushValue.size() > MAX_SCRIPT_ELEMENT_SIZE)
448 return set_error(serror, SCRIPT_ERR_PUSH_SIZE);
449
450 if (sigversion == SigVersion::BASE || sigversion == SigVersion::WITNESS_V0) {
451 // Note how OP_RESERVED does not count towards the opcode limit.
452 if (opcode > OP_16 && ++nOpCount > MAX_OPS_PER_SCRIPT) {
453 return set_error(serror, SCRIPT_ERR_OP_COUNT);
454 }
455 }
456
457 if (opcode == OP_CAT ||
458 opcode == OP_SUBSTR ||
459 opcode == OP_LEFT ||
460 opcode == OP_RIGHT ||
461 opcode == OP_INVERT ||
462 opcode == OP_AND ||
463 opcode == OP_OR ||
464 opcode == OP_XOR ||
465 opcode == OP_2MUL ||
466 opcode == OP_2DIV ||
467 opcode == OP_MUL ||
468 opcode == OP_DIV ||
469 opcode == OP_MOD ||
470 opcode == OP_LSHIFT ||
471 opcode == OP_RSHIFT)
472 return set_error(serror, SCRIPT_ERR_DISABLED_OPCODE); // Disabled opcodes (CVE-2010-5137).
473
474 // With SCRIPT_VERIFY_CONST_SCRIPTCODE, OP_CODESEPARATOR in non-segwit script is rejected even in an unexecuted branch
475 if (opcode == OP_CODESEPARATOR && sigversion == SigVersion::BASE && (flags & SCRIPT_VERIFY_CONST_SCRIPTCODE))
476 return set_error(serror, SCRIPT_ERR_OP_CODESEPARATOR);
477
478 if (fExec && 0 <= opcode && opcode <= OP_PUSHDATA4) {
479 if (fRequireMinimal && !CheckMinimalPush(vchPushValue, opcode)) {
480 return set_error(serror, SCRIPT_ERR_MINIMALDATA);
481 }
482 stack.push_back(vchPushValue);
483 } else if (fExec || (OP_IF <= opcode && opcode <= OP_ENDIF))
484 switch (opcode)
485 {
486 //
487 // Push value
488 //
489 case OP_1NEGATE:
490 case OP_1:
491 case OP_2:
492 case OP_3:
493 case OP_4:
494 case OP_5:
495 case OP_6:
496 case OP_7:
497 case OP_8:
498 case OP_9:
499 case OP_10:
500 case OP_11:
501 case OP_12:
502 case OP_13:
503 case OP_14:
504 case OP_15:
505 case OP_16:
506 {
507 // ( -- value)
508 CScriptNum bn((int)opcode - (int)(OP_1 - 1));
509 stack.push_back(bn.getvch());
510 // The result of these opcodes should always be the minimal way to push the data
511 // they push, so no need for a CheckMinimalPush here.
512 }
513 break;
514
515
516 //
517 // Control
518 //
519 case OP_NOP:
520 break;
521
523 {
525 // not enabled; treat as a NOP2
526 break;
527 }
528
529 if (stack.size() < 1)
530 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
531
532 // Note that elsewhere numeric opcodes are limited to
533 // operands in the range -2**31+1 to 2**31-1, however it is
534 // legal for opcodes to produce results exceeding that
535 // range. This limitation is implemented by CScriptNum's
536 // default 4-byte limit.
537 //
538 // If we kept to that limit we'd have a year 2038 problem,
539 // even though the nLockTime field in transactions
540 // themselves is uint32 which only becomes meaningless
541 // after the year 2106.
542 //
543 // Thus as a special case we tell CScriptNum to accept up
544 // to 5-byte bignums, which are good until 2**39-1, well
545 // beyond the 2**32-1 limit of the nLockTime field itself.
546 const CScriptNum nLockTime(stacktop(-1), fRequireMinimal, 5);
547
548 // In the rare event that the argument may be < 0 due to
549 // some arithmetic being done first, you can always use
550 // 0 MAX CHECKLOCKTIMEVERIFY.
551 if (nLockTime < 0)
552 return set_error(serror, SCRIPT_ERR_NEGATIVE_LOCKTIME);
553
554 // Actually compare the specified lock time with the transaction.
555 if (!checker.CheckLockTime(nLockTime))
556 return set_error(serror, SCRIPT_ERR_UNSATISFIED_LOCKTIME);
557
558 break;
559 }
560
562 {
564 // not enabled; treat as a NOP3
565 break;
566 }
567
568 if (stack.size() < 1)
569 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
570
571 // nSequence, like nLockTime, is a 32-bit unsigned integer
572 // field. See the comment in CHECKLOCKTIMEVERIFY regarding
573 // 5-byte numeric operands.
574 const CScriptNum nSequence(stacktop(-1), fRequireMinimal, 5);
575
576 // In the rare event that the argument may be < 0 due to
577 // some arithmetic being done first, you can always use
578 // 0 MAX CHECKSEQUENCEVERIFY.
579 if (nSequence < 0)
580 return set_error(serror, SCRIPT_ERR_NEGATIVE_LOCKTIME);
581
582 // To provide for future soft-fork extensibility, if the
583 // operand has the disabled lock-time flag set,
584 // CHECKSEQUENCEVERIFY behaves as a NOP.
585 if ((nSequence & CTxIn::SEQUENCE_LOCKTIME_DISABLE_FLAG) != 0)
586 break;
587
588 // Compare the specified sequence number with the input.
589 if (!checker.CheckSequence(nSequence))
590 return set_error(serror, SCRIPT_ERR_UNSATISFIED_LOCKTIME);
591
592 break;
593 }
594
595 case OP_NOP1: case OP_NOP4: case OP_NOP5:
596 case OP_NOP6: case OP_NOP7: case OP_NOP8: case OP_NOP9: case OP_NOP10:
597 {
599 return set_error(serror, SCRIPT_ERR_DISCOURAGE_UPGRADABLE_NOPS);
600 }
601 break;
602
603 case OP_IF:
604 case OP_NOTIF:
605 {
606 // <expression> if [statements] [else [statements]] endif
607 bool fValue = false;
608 if (fExec)
609 {
610 if (stack.size() < 1)
611 return set_error(serror, SCRIPT_ERR_UNBALANCED_CONDITIONAL);
612 valtype& vch = stacktop(-1);
613 // Tapscript requires minimal IF/NOTIF inputs as a consensus rule.
614 if (sigversion == SigVersion::TAPSCRIPT) {
615 // The input argument to the OP_IF and OP_NOTIF opcodes must be either
616 // exactly 0 (the empty vector) or exactly 1 (the one-byte vector with value 1).
617 if (vch.size() > 1 || (vch.size() == 1 && vch[0] != 1)) {
618 return set_error(serror, SCRIPT_ERR_TAPSCRIPT_MINIMALIF);
619 }
620 }
621 // Under witness v0 rules it is only a policy rule, enabled through SCRIPT_VERIFY_MINIMALIF.
622 if (sigversion == SigVersion::WITNESS_V0 && (flags & SCRIPT_VERIFY_MINIMALIF)) {
623 if (vch.size() > 1)
624 return set_error(serror, SCRIPT_ERR_MINIMALIF);
625 if (vch.size() == 1 && vch[0] != 1)
626 return set_error(serror, SCRIPT_ERR_MINIMALIF);
627 }
628 fValue = CastToBool(vch);
629 if (opcode == OP_NOTIF)
630 fValue = !fValue;
631 popstack(stack);
632 }
633 vfExec.push_back(fValue);
634 }
635 break;
636
637 case OP_ELSE:
638 {
639 if (vfExec.empty())
640 return set_error(serror, SCRIPT_ERR_UNBALANCED_CONDITIONAL);
641 vfExec.toggle_top();
642 }
643 break;
644
645 case OP_ENDIF:
646 {
647 if (vfExec.empty())
648 return set_error(serror, SCRIPT_ERR_UNBALANCED_CONDITIONAL);
649 vfExec.pop_back();
650 }
651 break;
652
653 case OP_VERIFY:
654 {
655 // (true -- ) or
656 // (false -- false) and return
657 if (stack.size() < 1)
658 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
659 bool fValue = CastToBool(stacktop(-1));
660 if (fValue)
661 popstack(stack);
662 else
663 return set_error(serror, SCRIPT_ERR_VERIFY);
664 }
665 break;
666
667 case OP_RETURN:
668 {
669 return set_error(serror, SCRIPT_ERR_OP_RETURN);
670 }
671 break;
672
673
674 //
675 // Stack ops
676 //
677 case OP_TOALTSTACK:
678 {
679 if (stack.size() < 1)
680 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
681 altstack.push_back(stacktop(-1));
682 popstack(stack);
683 }
684 break;
685
686 case OP_FROMALTSTACK:
687 {
688 if (altstack.size() < 1)
689 return set_error(serror, SCRIPT_ERR_INVALID_ALTSTACK_OPERATION);
690 stack.push_back(altstacktop(-1));
691 popstack(altstack);
692 }
693 break;
694
695 case OP_2DROP:
696 {
697 // (x1 x2 -- )
698 if (stack.size() < 2)
699 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
700 popstack(stack);
701 popstack(stack);
702 }
703 break;
704
705 case OP_2DUP:
706 {
707 // (x1 x2 -- x1 x2 x1 x2)
708 if (stack.size() < 2)
709 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
710 valtype vch1 = stacktop(-2);
711 valtype vch2 = stacktop(-1);
712 stack.push_back(vch1);
713 stack.push_back(vch2);
714 }
715 break;
716
717 case OP_3DUP:
718 {
719 // (x1 x2 x3 -- x1 x2 x3 x1 x2 x3)
720 if (stack.size() < 3)
721 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
722 valtype vch1 = stacktop(-3);
723 valtype vch2 = stacktop(-2);
724 valtype vch3 = stacktop(-1);
725 stack.push_back(vch1);
726 stack.push_back(vch2);
727 stack.push_back(vch3);
728 }
729 break;
730
731 case OP_2OVER:
732 {
733 // (x1 x2 x3 x4 -- x1 x2 x3 x4 x1 x2)
734 if (stack.size() < 4)
735 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
736 valtype vch1 = stacktop(-4);
737 valtype vch2 = stacktop(-3);
738 stack.push_back(vch1);
739 stack.push_back(vch2);
740 }
741 break;
742
743 case OP_2ROT:
744 {
745 // (x1 x2 x3 x4 x5 x6 -- x3 x4 x5 x6 x1 x2)
746 if (stack.size() < 6)
747 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
748 valtype vch1 = stacktop(-6);
749 valtype vch2 = stacktop(-5);
750 stack.erase(stack.end()-6, stack.end()-4);
751 stack.push_back(vch1);
752 stack.push_back(vch2);
753 }
754 break;
755
756 case OP_2SWAP:
757 {
758 // (x1 x2 x3 x4 -- x3 x4 x1 x2)
759 if (stack.size() < 4)
760 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
761 swap(stacktop(-4), stacktop(-2));
762 swap(stacktop(-3), stacktop(-1));
763 }
764 break;
765
766 case OP_IFDUP:
767 {
768 // (x - 0 | x x)
769 if (stack.size() < 1)
770 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
771 valtype vch = stacktop(-1);
772 if (CastToBool(vch))
773 stack.push_back(vch);
774 }
775 break;
776
777 case OP_DEPTH:
778 {
779 // -- stacksize
780 CScriptNum bn(stack.size());
781 stack.push_back(bn.getvch());
782 }
783 break;
784
785 case OP_DROP:
786 {
787 // (x -- )
788 if (stack.size() < 1)
789 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
790 popstack(stack);
791 }
792 break;
793
794 case OP_DUP:
795 {
796 // (x -- x x)
797 if (stack.size() < 1)
798 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
799 valtype vch = stacktop(-1);
800 stack.push_back(vch);
801 }
802 break;
803
804 case OP_NIP:
805 {
806 // (x1 x2 -- x2)
807 if (stack.size() < 2)
808 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
809 stack.erase(stack.end() - 2);
810 }
811 break;
812
813 case OP_OVER:
814 {
815 // (x1 x2 -- x1 x2 x1)
816 if (stack.size() < 2)
817 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
818 valtype vch = stacktop(-2);
819 stack.push_back(vch);
820 }
821 break;
822
823 case OP_PICK:
824 case OP_ROLL:
825 {
826 // (xn ... x2 x1 x0 n - xn ... x2 x1 x0 xn)
827 // (xn ... x2 x1 x0 n - ... x2 x1 x0 xn)
828 if (stack.size() < 2)
829 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
830 int n = CScriptNum(stacktop(-1), fRequireMinimal).getint();
831 popstack(stack);
832 if (n < 0 || n >= (int)stack.size())
833 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
834 valtype vch = stacktop(-n-1);
835 if (opcode == OP_ROLL)
836 stack.erase(stack.end()-n-1);
837 stack.push_back(vch);
838 }
839 break;
840
841 case OP_ROT:
842 {
843 // (x1 x2 x3 -- x2 x3 x1)
844 // x2 x1 x3 after first swap
845 // x2 x3 x1 after second swap
846 if (stack.size() < 3)
847 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
848 swap(stacktop(-3), stacktop(-2));
849 swap(stacktop(-2), stacktop(-1));
850 }
851 break;
852
853 case OP_SWAP:
854 {
855 // (x1 x2 -- x2 x1)
856 if (stack.size() < 2)
857 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
858 swap(stacktop(-2), stacktop(-1));
859 }
860 break;
861
862 case OP_TUCK:
863 {
864 // (x1 x2 -- x2 x1 x2)
865 if (stack.size() < 2)
866 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
867 valtype vch = stacktop(-1);
868 stack.insert(stack.end()-2, vch);
869 }
870 break;
871
872
873 case OP_SIZE:
874 {
875 // (in -- in size)
876 if (stack.size() < 1)
877 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
878 CScriptNum bn(stacktop(-1).size());
879 stack.push_back(bn.getvch());
880 }
881 break;
882
883
884 //
885 // Bitwise logic
886 //
887 case OP_EQUAL:
888 case OP_EQUALVERIFY:
889 //case OP_NOTEQUAL: // use OP_NUMNOTEQUAL
890 {
891 // (x1 x2 - bool)
892 if (stack.size() < 2)
893 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
894 valtype& vch1 = stacktop(-2);
895 valtype& vch2 = stacktop(-1);
896 bool fEqual = (vch1 == vch2);
897 // OP_NOTEQUAL is disabled because it would be too easy to say
898 // something like n != 1 and have some wiseguy pass in 1 with extra
899 // zero bytes after it (numerically, 0x01 == 0x0001 == 0x000001)
900 //if (opcode == OP_NOTEQUAL)
901 // fEqual = !fEqual;
902 popstack(stack);
903 popstack(stack);
904 stack.push_back(fEqual ? vchTrue : vchFalse);
905 if (opcode == OP_EQUALVERIFY)
906 {
907 if (fEqual)
908 popstack(stack);
909 else
910 return set_error(serror, SCRIPT_ERR_EQUALVERIFY);
911 }
912 }
913 break;
914
915
916 //
917 // Numeric
918 //
919 case OP_1ADD:
920 case OP_1SUB:
921 case OP_NEGATE:
922 case OP_ABS:
923 case OP_NOT:
924 case OP_0NOTEQUAL:
925 {
926 // (in -- out)
927 if (stack.size() < 1)
928 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
929 CScriptNum bn(stacktop(-1), fRequireMinimal);
930 switch (opcode)
931 {
932 case OP_1ADD: bn += bnOne; break;
933 case OP_1SUB: bn -= bnOne; break;
934 case OP_NEGATE: bn = -bn; break;
935 case OP_ABS: if (bn < bnZero) bn = -bn; break;
936 case OP_NOT: bn = (bn == bnZero); break;
937 case OP_0NOTEQUAL: bn = (bn != bnZero); break;
938 default: assert(!"invalid opcode"); break;
939 }
940 popstack(stack);
941 stack.push_back(bn.getvch());
942 }
943 break;
944
945 case OP_ADD:
946 case OP_SUB:
947 case OP_BOOLAND:
948 case OP_BOOLOR:
949 case OP_NUMEQUAL:
951 case OP_NUMNOTEQUAL:
952 case OP_LESSTHAN:
953 case OP_GREATERTHAN:
956 case OP_MIN:
957 case OP_MAX:
958 {
959 // (x1 x2 -- out)
960 if (stack.size() < 2)
961 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
962 CScriptNum bn1(stacktop(-2), fRequireMinimal);
963 CScriptNum bn2(stacktop(-1), fRequireMinimal);
964 CScriptNum bn(0);
965 switch (opcode)
966 {
967 case OP_ADD:
968 bn = bn1 + bn2;
969 break;
970
971 case OP_SUB:
972 bn = bn1 - bn2;
973 break;
974
975 case OP_BOOLAND: bn = (bn1 != bnZero && bn2 != bnZero); break;
976 case OP_BOOLOR: bn = (bn1 != bnZero || bn2 != bnZero); break;
977 case OP_NUMEQUAL: bn = (bn1 == bn2); break;
978 case OP_NUMEQUALVERIFY: bn = (bn1 == bn2); break;
979 case OP_NUMNOTEQUAL: bn = (bn1 != bn2); break;
980 case OP_LESSTHAN: bn = (bn1 < bn2); break;
981 case OP_GREATERTHAN: bn = (bn1 > bn2); break;
982 case OP_LESSTHANOREQUAL: bn = (bn1 <= bn2); break;
983 case OP_GREATERTHANOREQUAL: bn = (bn1 >= bn2); break;
984 case OP_MIN: bn = (bn1 < bn2 ? bn1 : bn2); break;
985 case OP_MAX: bn = (bn1 > bn2 ? bn1 : bn2); break;
986 default: assert(!"invalid opcode"); break;
987 }
988 popstack(stack);
989 popstack(stack);
990 stack.push_back(bn.getvch());
991
992 if (opcode == OP_NUMEQUALVERIFY)
993 {
994 if (CastToBool(stacktop(-1)))
995 popstack(stack);
996 else
997 return set_error(serror, SCRIPT_ERR_NUMEQUALVERIFY);
998 }
999 }
1000 break;
1001
1002 case OP_WITHIN:
1003 {
1004 // (x min max -- out)
1005 if (stack.size() < 3)
1006 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
1007 CScriptNum bn1(stacktop(-3), fRequireMinimal);
1008 CScriptNum bn2(stacktop(-2), fRequireMinimal);
1009 CScriptNum bn3(stacktop(-1), fRequireMinimal);
1010 bool fValue = (bn2 <= bn1 && bn1 < bn3);
1011 popstack(stack);
1012 popstack(stack);
1013 popstack(stack);
1014 stack.push_back(fValue ? vchTrue : vchFalse);
1015 }
1016 break;
1017
1018
1019 //
1020 // Crypto
1021 //
1022 case OP_RIPEMD160:
1023 case OP_SHA1:
1024 case OP_SHA256:
1025 case OP_HASH160:
1026 case OP_HASH256:
1027 {
1028 // (in -- hash)
1029 if (stack.size() < 1)
1030 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
1031 valtype& vch = stacktop(-1);
1032 valtype vchHash((opcode == OP_RIPEMD160 || opcode == OP_SHA1 || opcode == OP_HASH160) ? 20 : 32);
1033 if (opcode == OP_RIPEMD160)
1034 CRIPEMD160().Write(vch.data(), vch.size()).Finalize(vchHash.data());
1035 else if (opcode == OP_SHA1)
1036 CSHA1().Write(vch.data(), vch.size()).Finalize(vchHash.data());
1037 else if (opcode == OP_SHA256)
1038 CSHA256().Write(vch.data(), vch.size()).Finalize(vchHash.data());
1039 else if (opcode == OP_HASH160)
1040 CHash160().Write(vch).Finalize(vchHash);
1041 else if (opcode == OP_HASH256)
1042 CHash256().Write(vch).Finalize(vchHash);
1043 popstack(stack);
1044 stack.push_back(vchHash);
1045 }
1046 break;
1047
1048 case OP_CODESEPARATOR:
1049 {
1050 // If SCRIPT_VERIFY_CONST_SCRIPTCODE flag is set, use of OP_CODESEPARATOR is rejected in pre-segwit
1051 // script, even in an unexecuted branch (this is checked above the opcode case statement).
1052
1053 // Hash starts after the code separator
1054 pbegincodehash = pc;
1055 execdata.m_codeseparator_pos = opcode_pos;
1056 }
1057 break;
1058
1059 case OP_CHECKSIG:
1060 case OP_CHECKSIGVERIFY:
1061 {
1062 // (sig pubkey -- bool)
1063 if (stack.size() < 2)
1064 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
1065
1066 valtype& vchSig = stacktop(-2);
1067 valtype& vchPubKey = stacktop(-1);
1068
1069 bool fSuccess = true;
1070 if (!EvalChecksig(vchSig, vchPubKey, pbegincodehash, pend, execdata, flags, checker, sigversion, serror, fSuccess)) return false;
1071 popstack(stack);
1072 popstack(stack);
1073 stack.push_back(fSuccess ? vchTrue : vchFalse);
1074 if (opcode == OP_CHECKSIGVERIFY)
1075 {
1076 if (fSuccess)
1077 popstack(stack);
1078 else
1079 return set_error(serror, SCRIPT_ERR_CHECKSIGVERIFY);
1080 }
1081 }
1082 break;
1083
1084 case OP_CHECKSIGADD:
1085 {
1086 // OP_CHECKSIGADD is only available in Tapscript
1087 if (sigversion == SigVersion::BASE || sigversion == SigVersion::WITNESS_V0) return set_error(serror, SCRIPT_ERR_BAD_OPCODE);
1088
1089 // (sig num pubkey -- num)
1090 if (stack.size() < 3) return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
1091
1092 const valtype& sig = stacktop(-3);
1093 const CScriptNum num(stacktop(-2), fRequireMinimal);
1094 const valtype& pubkey = stacktop(-1);
1095
1096 bool success = true;
1097 if (!EvalChecksig(sig, pubkey, pbegincodehash, pend, execdata, flags, checker, sigversion, serror, success)) return false;
1098 popstack(stack);
1099 popstack(stack);
1100 popstack(stack);
1101 stack.push_back((num + (success ? 1 : 0)).getvch());
1102 }
1103 break;
1104
1105 case OP_CHECKMULTISIG:
1107 {
1108 if (sigversion == SigVersion::TAPSCRIPT) return set_error(serror, SCRIPT_ERR_TAPSCRIPT_CHECKMULTISIG);
1109
1110 // ([sig ...] num_of_signatures [pubkey ...] num_of_pubkeys -- bool)
1111
1112 int i = 1;
1113 if ((int)stack.size() < i)
1114 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
1115
1116 int nKeysCount = CScriptNum(stacktop(-i), fRequireMinimal).getint();
1117 if (nKeysCount < 0 || nKeysCount > MAX_PUBKEYS_PER_MULTISIG)
1118 return set_error(serror, SCRIPT_ERR_PUBKEY_COUNT);
1119 nOpCount += nKeysCount;
1120 if (nOpCount > MAX_OPS_PER_SCRIPT)
1121 return set_error(serror, SCRIPT_ERR_OP_COUNT);
1122 int ikey = ++i;
1123 // ikey2 is the position of last non-signature item in the stack. Top stack item = 1.
1124 // With SCRIPT_VERIFY_NULLFAIL, this is used for cleanup if operation fails.
1125 int ikey2 = nKeysCount + 2;
1126 i += nKeysCount;
1127 if ((int)stack.size() < i)
1128 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
1129
1130 int nSigsCount = CScriptNum(stacktop(-i), fRequireMinimal).getint();
1131 if (nSigsCount < 0 || nSigsCount > nKeysCount)
1132 return set_error(serror, SCRIPT_ERR_SIG_COUNT);
1133 int isig = ++i;
1134 i += nSigsCount;
1135 if ((int)stack.size() < i)
1136 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
1137
1138 // Subset of script starting at the most recent codeseparator
1139 CScript scriptCode(pbegincodehash, pend);
1140
1141 // Drop the signature in pre-segwit scripts but not segwit scripts
1142 for (int k = 0; k < nSigsCount; k++)
1143 {
1144 valtype& vchSig = stacktop(-isig-k);
1145 if (sigversion == SigVersion::BASE) {
1146 int found = FindAndDelete(scriptCode, CScript() << vchSig);
1147 if (found > 0 && (flags & SCRIPT_VERIFY_CONST_SCRIPTCODE))
1148 return set_error(serror, SCRIPT_ERR_SIG_FINDANDDELETE);
1149 }
1150 }
1151
1152 bool fSuccess = true;
1153 while (fSuccess && nSigsCount > 0)
1154 {
1155 valtype& vchSig = stacktop(-isig);
1156 valtype& vchPubKey = stacktop(-ikey);
1157
1158 // Note how this makes the exact order of pubkey/signature evaluation
1159 // distinguishable by CHECKMULTISIG NOT if the STRICTENC flag is set.
1160 // See the script_(in)valid tests for details.
1161 if (!CheckSignatureEncoding(vchSig, flags, serror) || !CheckPubKeyEncoding(vchPubKey, flags, sigversion, serror)) {
1162 // serror is set
1163 return false;
1164 }
1165
1166 // Check signature
1167 bool fOk = checker.CheckECDSASignature(vchSig, vchPubKey, scriptCode, sigversion);
1168
1169 if (fOk) {
1170 isig++;
1171 nSigsCount--;
1172 }
1173 ikey++;
1174 nKeysCount--;
1175
1176 // If there are more signatures left than keys left,
1177 // then too many signatures have failed. Exit early,
1178 // without checking any further signatures.
1179 if (nSigsCount > nKeysCount)
1180 fSuccess = false;
1181 }
1182
1183 // Clean up stack of actual arguments
1184 while (i-- > 1) {
1185 // If the operation failed, we require that all signatures must be empty vector
1186 if (!fSuccess && (flags & SCRIPT_VERIFY_NULLFAIL) && !ikey2 && stacktop(-1).size())
1187 return set_error(serror, SCRIPT_ERR_SIG_NULLFAIL);
1188 if (ikey2 > 0)
1189 ikey2--;
1190 popstack(stack);
1191 }
1192
1193 // A bug causes CHECKMULTISIG to consume one extra argument
1194 // whose contents were not checked in any way.
1195 //
1196 // Unfortunately this is a potential source of mutability,
1197 // so optionally verify it is exactly equal to zero prior
1198 // to removing it from the stack.
1199 if (stack.size() < 1)
1200 return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
1201 if ((flags & SCRIPT_VERIFY_NULLDUMMY) && stacktop(-1).size())
1202 return set_error(serror, SCRIPT_ERR_SIG_NULLDUMMY);
1203 popstack(stack);
1204
1205 stack.push_back(fSuccess ? vchTrue : vchFalse);
1206
1207 if (opcode == OP_CHECKMULTISIGVERIFY)
1208 {
1209 if (fSuccess)
1210 popstack(stack);
1211 else
1212 return set_error(serror, SCRIPT_ERR_CHECKMULTISIGVERIFY);
1213 }
1214 }
1215 break;
1216
1217 default:
1218 return set_error(serror, SCRIPT_ERR_BAD_OPCODE);
1219 }
1220
1221 // Size limits
1222 if (stack.size() + altstack.size() > MAX_STACK_SIZE)
1223 return set_error(serror, SCRIPT_ERR_STACK_SIZE);
1224 }
1225 }
1226 catch (...)
1227 {
1228 return set_error(serror, SCRIPT_ERR_UNKNOWN_ERROR);
1229 }
1230
1231 if (!vfExec.empty())
1232 return set_error(serror, SCRIPT_ERR_UNBALANCED_CONDITIONAL);
1233
1234 return set_success(serror);
1235}
1236
1237bool EvalScript(std::vector<std::vector<unsigned char> >& stack, const CScript& script, script_verify_flags flags, const BaseSignatureChecker& checker, SigVersion sigversion, ScriptError* serror)
1238{
1239 ScriptExecutionData execdata;
1240 return EvalScript(stack, script, flags, checker, sigversion, execdata, serror);
1241}
1242
1243namespace {
1244
1249template <class T>
1250class CTransactionSignatureSerializer
1251{
1252private:
1253 const T& txTo;
1254 const CScript& scriptCode;
1255 const unsigned int nIn;
1256 const bool fAnyoneCanPay;
1257 // Temporary workaround for a clang-tidy bug fixed in version 22.
1258 // See: https://github.com/llvm/llvm-project/issues/160394.
1259 // NOLINTBEGIN(modernize-use-default-member-init)
1260 const bool fHashSingle;
1261 const bool fHashNone;
1262 // NOLINTEND(modernize-use-default-member-init)
1263
1264public:
1265 CTransactionSignatureSerializer(const T& txToIn, const CScript& scriptCodeIn, unsigned int nInIn, int nHashTypeIn) :
1266 txTo(txToIn), scriptCode(scriptCodeIn), nIn(nInIn),
1267 fAnyoneCanPay(!!(nHashTypeIn & SIGHASH_ANYONECANPAY)),
1268 fHashSingle((nHashTypeIn & 0x1f) == SIGHASH_SINGLE),
1269 fHashNone((nHashTypeIn & 0x1f) == SIGHASH_NONE) {}
1270
1272 template<typename S>
1273 void SerializeScriptCode(S &s) const {
1274 CScript::const_iterator it = scriptCode.begin();
1275 CScript::const_iterator itBegin = it;
1276 opcodetype opcode;
1277 unsigned int nCodeSeparators = 0;
1278 while (scriptCode.GetOp(it, opcode)) {
1279 if (opcode == OP_CODESEPARATOR)
1280 nCodeSeparators++;
1281 }
1282 ::WriteCompactSize(s, scriptCode.size() - nCodeSeparators);
1283 it = itBegin;
1284 while (scriptCode.GetOp(it, opcode)) {
1285 if (opcode == OP_CODESEPARATOR) {
1286 s.write(std::as_bytes(std::span{&itBegin[0], size_t(it - itBegin - 1)}));
1287 itBegin = it;
1288 }
1289 }
1290 if (itBegin != scriptCode.end())
1291 s.write(std::as_bytes(std::span{&itBegin[0], size_t(it - itBegin)}));
1292 }
1293
1295 template<typename S>
1296 void SerializeInput(S &s, unsigned int nInput) const {
1297 // In case of SIGHASH_ANYONECANPAY, only the input being signed is serialized
1298 if (fAnyoneCanPay)
1299 nInput = nIn;
1300 // Serialize the prevout
1301 ::Serialize(s, txTo.vin[nInput].prevout);
1302 // Serialize the script
1303 if (nInput != nIn)
1304 // Blank out other inputs' signatures
1305 ::Serialize(s, CScript());
1306 else
1307 SerializeScriptCode(s);
1308 // Serialize the nSequence
1309 if (nInput != nIn && (fHashSingle || fHashNone))
1310 // let the others update at will
1311 ::Serialize(s, int32_t{0});
1312 else
1313 ::Serialize(s, txTo.vin[nInput].nSequence);
1314 }
1315
1317 template<typename S>
1318 void SerializeOutput(S &s, unsigned int nOutput) const {
1319 if (fHashSingle && nOutput != nIn)
1320 // Do not lock-in the txout payee at other indices as txin
1321 ::Serialize(s, CTxOut());
1322 else
1323 ::Serialize(s, txTo.vout[nOutput]);
1324 }
1325
1327 template<typename S>
1328 void Serialize(S &s) const {
1329 // Serialize version
1330 ::Serialize(s, txTo.version);
1331 // Serialize vin
1332 unsigned int nInputs = fAnyoneCanPay ? 1 : txTo.vin.size();
1333 ::WriteCompactSize(s, nInputs);
1334 for (unsigned int nInput = 0; nInput < nInputs; nInput++)
1335 SerializeInput(s, nInput);
1336 // Serialize vout
1337 unsigned int nOutputs = fHashNone ? 0 : (fHashSingle ? nIn+1 : txTo.vout.size());
1338 ::WriteCompactSize(s, nOutputs);
1339 for (unsigned int nOutput = 0; nOutput < nOutputs; nOutput++)
1340 SerializeOutput(s, nOutput);
1341 // Serialize nLockTime
1342 ::Serialize(s, txTo.nLockTime);
1343 }
1344};
1345
1347template <class T>
1348uint256 GetPrevoutsSHA256(const T& txTo)
1349{
1350 HashWriter ss{};
1351 for (const auto& txin : txTo.vin) {
1352 ss << txin.prevout;
1353 }
1354 return ss.GetSHA256();
1355}
1356
1358template <class T>
1359uint256 GetSequencesSHA256(const T& txTo)
1360{
1361 HashWriter ss{};
1362 for (const auto& txin : txTo.vin) {
1363 ss << txin.nSequence;
1364 }
1365 return ss.GetSHA256();
1366}
1367
1369template <class T>
1370uint256 GetOutputsSHA256(const T& txTo)
1371{
1372 HashWriter ss{};
1373 for (const auto& txout : txTo.vout) {
1374 ss << txout;
1375 }
1376 return ss.GetSHA256();
1377}
1378
1380uint256 GetSpentAmountsSHA256(const std::vector<CTxOut>& outputs_spent)
1381{
1382 HashWriter ss{};
1383 for (const auto& txout : outputs_spent) {
1384 ss << txout.nValue;
1385 }
1386 return ss.GetSHA256();
1387}
1388
1390uint256 GetSpentScriptsSHA256(const std::vector<CTxOut>& outputs_spent)
1391{
1392 HashWriter ss{};
1393 for (const auto& txout : outputs_spent) {
1394 ss << txout.scriptPubKey;
1395 }
1396 return ss.GetSHA256();
1397}
1398
1399
1400} // namespace
1401
1402template <class T>
1403void PrecomputedTransactionData::Init(const T& txTo, std::vector<CTxOut>&& spent_outputs, bool force)
1404{
1406
1407 m_spent_outputs = std::move(spent_outputs);
1408 if (!m_spent_outputs.empty()) {
1409 assert(m_spent_outputs.size() == txTo.vin.size());
1410 m_spent_outputs_ready = true;
1411 }
1412
1413 // Determine which precomputation-impacting features this transaction uses.
1414 bool uses_bip143_segwit = force;
1415 bool uses_bip341_taproot = force;
1416 for (size_t inpos = 0; inpos < txTo.vin.size() && !(uses_bip143_segwit && uses_bip341_taproot); ++inpos) {
1417 if (!txTo.vin[inpos].scriptWitness.IsNull()) {
1418 if (m_spent_outputs_ready && m_spent_outputs[inpos].scriptPubKey.size() == 2 + WITNESS_V1_TAPROOT_SIZE &&
1419 m_spent_outputs[inpos].scriptPubKey[0] == OP_1) {
1420 // Treat every witness-bearing spend with 34-byte scriptPubKey that starts with OP_1 as a Taproot
1421 // spend. This only works if spent_outputs was provided as well, but if it wasn't, actual validation
1422 // will fail anyway. Note that this branch may trigger for scriptPubKeys that aren't actually segwit
1423 // but in that case validation will fail as SCRIPT_ERR_WITNESS_UNEXPECTED anyway.
1424 uses_bip341_taproot = true;
1425 } else {
1426 // Treat every spend that's not known to native witness v1 as a Witness v0 spend. This branch may
1427 // also be taken for unknown witness versions, but it is harmless, and being precise would require
1428 // P2SH evaluation to find the redeemScript.
1429 uses_bip143_segwit = true;
1430 }
1431 }
1432 if (uses_bip341_taproot && uses_bip143_segwit) break; // No need to scan further if we already need all.
1433 }
1434
1435 if (uses_bip143_segwit || uses_bip341_taproot) {
1436 // Computations shared between both sighash schemes.
1437 m_prevouts_single_hash = GetPrevoutsSHA256(txTo);
1438 m_sequences_single_hash = GetSequencesSHA256(txTo);
1439 m_outputs_single_hash = GetOutputsSHA256(txTo);
1440 }
1441 if (uses_bip143_segwit) {
1445 m_bip143_segwit_ready = true;
1446 }
1447 if (uses_bip341_taproot && m_spent_outputs_ready) {
1448 m_spent_amounts_single_hash = GetSpentAmountsSHA256(m_spent_outputs);
1449 m_spent_scripts_single_hash = GetSpentScriptsSHA256(m_spent_outputs);
1451 }
1452}
1453
1454template <class T>
1456{
1457 Init(txTo, {});
1458}
1459
1460// explicit instantiation
1461template void PrecomputedTransactionData::Init(const CTransaction& txTo, std::vector<CTxOut>&& spent_outputs, bool force);
1462template void PrecomputedTransactionData::Init(const CMutableTransaction& txTo, std::vector<CTxOut>&& spent_outputs, bool force);
1465
1469
1471{
1472 switch (mdb) {
1474 assert(!"Missing data");
1475 break;
1477 return false;
1478 }
1479 assert(!"Unknown MissingDataBehavior value");
1480}
1481
1482template<typename T>
1483bool SignatureHashSchnorr(uint256& hash_out, ScriptExecutionData& execdata, const T& tx_to, uint32_t in_pos, uint8_t hash_type, SigVersion sigversion, const PrecomputedTransactionData& cache, MissingDataBehavior mdb)
1484{
1485 uint8_t ext_flag, key_version;
1486 switch (sigversion) {
1488 ext_flag = 0;
1489 // key_version is not used and left uninitialized.
1490 break;
1492 ext_flag = 1;
1493 // key_version must be 0 for now, representing the current version of
1494 // 32-byte public keys in the tapscript signature opcode execution.
1495 // An upgradable public key version (with a size not 32-byte) may
1496 // request a different key_version with a new sigversion.
1497 key_version = 0;
1498 break;
1499 default:
1500 assert(false);
1501 }
1502 assert(in_pos < tx_to.vin.size());
1503 if (!(cache.m_bip341_taproot_ready && cache.m_spent_outputs_ready)) {
1504 return HandleMissingData(mdb);
1505 }
1506
1508
1509 // Epoch
1510 static constexpr uint8_t EPOCH = 0;
1511 ss << EPOCH;
1512
1513 // Hash type
1514 const uint8_t output_type = (hash_type == SIGHASH_DEFAULT) ? SIGHASH_ALL : (hash_type & SIGHASH_OUTPUT_MASK); // Default (no sighash byte) is equivalent to SIGHASH_ALL
1515 const uint8_t input_type = hash_type & SIGHASH_INPUT_MASK;
1516 if (!(hash_type <= 0x03 || (hash_type >= 0x81 && hash_type <= 0x83))) return false;
1517 ss << hash_type;
1518
1519 // Transaction level data
1520 ss << tx_to.version;
1521 ss << tx_to.nLockTime;
1522 if (input_type != SIGHASH_ANYONECANPAY) {
1523 ss << cache.m_prevouts_single_hash;
1524 ss << cache.m_spent_amounts_single_hash;
1525 ss << cache.m_spent_scripts_single_hash;
1526 ss << cache.m_sequences_single_hash;
1527 }
1528 if (output_type == SIGHASH_ALL) {
1529 ss << cache.m_outputs_single_hash;
1530 }
1531
1532 // Data about the input/prevout being spent
1533 assert(execdata.m_annex_init);
1534 const bool have_annex = execdata.m_annex_present;
1535 const uint8_t spend_type = (ext_flag << 1) + (have_annex ? 1 : 0); // The low bit indicates whether an annex is present.
1536 ss << spend_type;
1537 if (input_type == SIGHASH_ANYONECANPAY) {
1538 ss << tx_to.vin[in_pos].prevout;
1539 ss << cache.m_spent_outputs[in_pos];
1540 ss << tx_to.vin[in_pos].nSequence;
1541 } else {
1542 ss << in_pos;
1543 }
1544 if (have_annex) {
1545 ss << execdata.m_annex_hash;
1546 }
1547
1548 // Data about the output (if only one).
1549 if (output_type == SIGHASH_SINGLE) {
1550 if (in_pos >= tx_to.vout.size()) return false;
1551 if (!execdata.m_output_hash) {
1552 HashWriter sha_single_output{};
1553 sha_single_output << tx_to.vout[in_pos];
1554 execdata.m_output_hash = sha_single_output.GetSHA256();
1555 }
1556 ss << execdata.m_output_hash.value();
1557 }
1558
1559 // Additional data for BIP 342 signatures
1560 if (sigversion == SigVersion::TAPSCRIPT) {
1561 assert(execdata.m_tapleaf_hash_init);
1562 ss << execdata.m_tapleaf_hash;
1563 ss << key_version;
1565 ss << execdata.m_codeseparator_pos;
1566 }
1567
1568 hash_out = ss.GetSHA256();
1569 return true;
1570}
1571
1572int SigHashCache::CacheIndex(int32_t hash_type) const noexcept
1573{
1574 // Note that we do not distinguish between BASE and WITNESS_V0 to determine the cache index,
1575 // because no input can simultaneously use both.
1576 return 3 * !!(hash_type & SIGHASH_ANYONECANPAY) +
1577 2 * ((hash_type & 0x1f) == SIGHASH_SINGLE) +
1578 1 * ((hash_type & 0x1f) == SIGHASH_NONE);
1579}
1580
1581bool SigHashCache::Load(int32_t hash_type, const CScript& script_code, HashWriter& writer) const noexcept
1582{
1583 auto& entry = m_cache_entries[CacheIndex(hash_type)];
1584 if (entry.has_value()) {
1585 if (script_code == entry->first) {
1586 writer = HashWriter(entry->second);
1587 return true;
1588 }
1589 }
1590 return false;
1591}
1592
1593void SigHashCache::Store(int32_t hash_type, const CScript& script_code, const HashWriter& writer) noexcept
1594{
1595 auto& entry = m_cache_entries[CacheIndex(hash_type)];
1596 entry.emplace(script_code, writer);
1597}
1598
1599template <class T>
1600uint256 SignatureHash(const CScript& scriptCode, const T& txTo, unsigned int nIn, int32_t nHashType, const CAmount& amount, SigVersion sigversion, const PrecomputedTransactionData* cache, SigHashCache* sighash_cache)
1601{
1602 assert(nIn < txTo.vin.size());
1603
1604 if (sigversion != SigVersion::WITNESS_V0) {
1605 // Check for invalid use of SIGHASH_SINGLE
1606 if ((nHashType & 0x1f) == SIGHASH_SINGLE) {
1607 if (nIn >= txTo.vout.size()) {
1608 // nOut out of range
1609 return uint256::ONE;
1610 }
1611 }
1612 }
1613
1614 HashWriter ss{};
1615
1616 // Try to compute using cached SHA256 midstate.
1617 if (sighash_cache && sighash_cache->Load(nHashType, scriptCode, ss)) {
1618 // Add sighash type and hash.
1619 ss << nHashType;
1620 return ss.GetHash();
1621 }
1622
1623 if (sigversion == SigVersion::WITNESS_V0) {
1624 uint256 hashPrevouts;
1625 uint256 hashSequence;
1626 uint256 hashOutputs;
1627 const bool cacheready = cache && cache->m_bip143_segwit_ready;
1628
1629 if (!(nHashType & SIGHASH_ANYONECANPAY)) {
1630 hashPrevouts = cacheready ? cache->hashPrevouts : SHA256Uint256(GetPrevoutsSHA256(txTo));
1631 }
1632
1633 if (!(nHashType & SIGHASH_ANYONECANPAY) && (nHashType & 0x1f) != SIGHASH_SINGLE && (nHashType & 0x1f) != SIGHASH_NONE) {
1634 hashSequence = cacheready ? cache->hashSequence : SHA256Uint256(GetSequencesSHA256(txTo));
1635 }
1636
1637 if ((nHashType & 0x1f) != SIGHASH_SINGLE && (nHashType & 0x1f) != SIGHASH_NONE) {
1638 hashOutputs = cacheready ? cache->hashOutputs : SHA256Uint256(GetOutputsSHA256(txTo));
1639 } else if ((nHashType & 0x1f) == SIGHASH_SINGLE && nIn < txTo.vout.size()) {
1640 HashWriter inner_ss{};
1641 inner_ss << txTo.vout[nIn];
1642 hashOutputs = inner_ss.GetHash();
1643 }
1644
1645 // Version
1646 ss << txTo.version;
1647 // Input prevouts/nSequence (none/all, depending on flags)
1648 ss << hashPrevouts;
1649 ss << hashSequence;
1650 // The input being signed (replacing the scriptSig with scriptCode + amount)
1651 // The prevout may already be contained in hashPrevout, and the nSequence
1652 // may already be contain in hashSequence.
1653 ss << txTo.vin[nIn].prevout;
1654 ss << scriptCode;
1655 ss << amount;
1656 ss << txTo.vin[nIn].nSequence;
1657 // Outputs (none/one/all, depending on flags)
1658 ss << hashOutputs;
1659 // Locktime
1660 ss << txTo.nLockTime;
1661 } else {
1662 // Wrapper to serialize only the necessary parts of the transaction being signed
1663 CTransactionSignatureSerializer<T> txTmp(txTo, scriptCode, nIn, nHashType);
1664
1665 // Serialize
1666 ss << txTmp;
1667 }
1668
1669 // If a cache object was provided, store the midstate there.
1670 if (sighash_cache != nullptr) {
1671 sighash_cache->Store(nHashType, scriptCode, ss);
1672 }
1673
1674 // Add sighash type and hash.
1675 ss << nHashType;
1676 return ss.GetHash();
1677}
1678
1679template <class T>
1680bool GenericTransactionSignatureChecker<T>::VerifyECDSASignature(const std::vector<unsigned char>& vchSig, const CPubKey& pubkey, const uint256& sighash) const
1681{
1682 return pubkey.Verify(sighash, vchSig);
1683}
1684
1685template <class T>
1686bool GenericTransactionSignatureChecker<T>::VerifySchnorrSignature(std::span<const unsigned char> sig, const XOnlyPubKey& pubkey, const uint256& sighash) const
1687{
1688 return pubkey.VerifySchnorr(sighash, sig);
1689}
1690
1691template <class T>
1692bool GenericTransactionSignatureChecker<T>::CheckECDSASignature(const std::vector<unsigned char>& vchSigIn, const std::vector<unsigned char>& vchPubKey, const CScript& scriptCode, SigVersion sigversion) const
1693{
1694 CPubKey pubkey(vchPubKey);
1695 if (!pubkey.IsValid())
1696 return false;
1697
1698 // Hash type is one byte tacked on to the end of the signature
1699 std::vector<unsigned char> vchSig(vchSigIn);
1700 if (vchSig.empty())
1701 return false;
1702 int nHashType = vchSig.back();
1703 vchSig.pop_back();
1704
1705 // Witness sighashes need the amount.
1706 if (sigversion == SigVersion::WITNESS_V0 && amount < 0) return HandleMissingData(m_mdb);
1707
1708 uint256 sighash = SignatureHash(scriptCode, *txTo, nIn, nHashType, amount, sigversion, this->txdata, &m_sighash_cache);
1709
1710 if (!VerifyECDSASignature(vchSig, pubkey, sighash))
1711 return false;
1712
1713 return true;
1714}
1715
1716template <class T>
1717bool GenericTransactionSignatureChecker<T>::CheckSchnorrSignature(std::span<const unsigned char> sig, std::span<const unsigned char> pubkey_in, SigVersion sigversion, ScriptExecutionData& execdata, ScriptError* serror) const
1718{
1719 assert(sigversion == SigVersion::TAPROOT || sigversion == SigVersion::TAPSCRIPT);
1720 // Schnorr signatures have 32-byte public keys. The caller is responsible for enforcing this.
1721 assert(pubkey_in.size() == 32);
1722 // Note that in Tapscript evaluation, empty signatures are treated specially (invalid signature that does not
1723 // abort script execution). This is implemented in EvalChecksigTapscript, which won't invoke
1724 // CheckSchnorrSignature in that case. In other contexts, they are invalid like every other signature with
1725 // size different from 64 or 65.
1726 if (sig.size() != 64 && sig.size() != 65) return set_error(serror, SCRIPT_ERR_SCHNORR_SIG_SIZE);
1727
1728 XOnlyPubKey pubkey{pubkey_in};
1729
1730 uint8_t hashtype = SIGHASH_DEFAULT;
1731 if (sig.size() == 65) {
1732 hashtype = SpanPopBack(sig);
1733 if (hashtype == SIGHASH_DEFAULT) return set_error(serror, SCRIPT_ERR_SCHNORR_SIG_HASHTYPE);
1734 }
1735 uint256 sighash;
1736 if (!this->txdata) return HandleMissingData(m_mdb);
1737 if (!SignatureHashSchnorr(sighash, execdata, *txTo, nIn, hashtype, sigversion, *this->txdata, m_mdb)) {
1738 return set_error(serror, SCRIPT_ERR_SCHNORR_SIG_HASHTYPE);
1739 }
1740 if (!VerifySchnorrSignature(sig, pubkey, sighash)) return set_error(serror, SCRIPT_ERR_SCHNORR_SIG);
1741 return true;
1742}
1743
1744template <class T>
1746{
1747 // There are two kinds of nLockTime: lock-by-blockheight
1748 // and lock-by-blocktime, distinguished by whether
1749 // nLockTime < LOCKTIME_THRESHOLD.
1750 //
1751 // We want to compare apples to apples, so fail the script
1752 // unless the type of nLockTime being tested is the same as
1753 // the nLockTime in the transaction.
1754 if (!(
1755 (txTo->nLockTime < LOCKTIME_THRESHOLD && nLockTime < LOCKTIME_THRESHOLD) ||
1756 (txTo->nLockTime >= LOCKTIME_THRESHOLD && nLockTime >= LOCKTIME_THRESHOLD)
1757 ))
1758 return false;
1759
1760 // Now that we know we're comparing apples-to-apples, the
1761 // comparison is a simple numeric one.
1762 if (nLockTime > (int64_t)txTo->nLockTime)
1763 return false;
1764
1765 // Finally the nLockTime feature can be disabled in IsFinalTx()
1766 // and thus CHECKLOCKTIMEVERIFY bypassed if every txin has
1767 // been finalized by setting nSequence to maxint. The
1768 // transaction would be allowed into the blockchain, making
1769 // the opcode ineffective.
1770 //
1771 // Testing if this vin is not final is sufficient to
1772 // prevent this condition. Alternatively we could test all
1773 // inputs, but testing just this input minimizes the data
1774 // required to prove correct CHECKLOCKTIMEVERIFY execution.
1775 if (CTxIn::SEQUENCE_FINAL == txTo->vin[nIn].nSequence)
1776 return false;
1777
1778 return true;
1779}
1780
1781template <class T>
1783{
1784 // Relative lock times are supported by comparing the passed
1785 // in operand to the sequence number of the input.
1786 const int64_t txToSequence = (int64_t)txTo->vin[nIn].nSequence;
1787
1788 // Fail if the transaction's version number is not set high
1789 // enough to trigger BIP 68 rules.
1790 if (txTo->version < 2)
1791 return false;
1792
1793 // Sequence numbers with their most significant bit set are not
1794 // consensus constrained. Testing that the transaction's sequence
1795 // number do not have this bit set prevents using this property
1796 // to get around a CHECKSEQUENCEVERIFY check.
1797 if (txToSequence & CTxIn::SEQUENCE_LOCKTIME_DISABLE_FLAG)
1798 return false;
1799
1800 // Mask off any bits that do not have consensus-enforced meaning
1801 // before doing the integer comparisons
1803 const int64_t txToSequenceMasked = txToSequence & nLockTimeMask;
1804 const CScriptNum nSequenceMasked = nSequence & nLockTimeMask;
1805
1806 // There are two kinds of nSequence: lock-by-blockheight
1807 // and lock-by-blocktime, distinguished by whether
1808 // nSequenceMasked < CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG.
1809 //
1810 // We want to compare apples to apples, so fail the script
1811 // unless the type of nSequenceMasked being tested is the same as
1812 // the nSequenceMasked in the transaction.
1813 if (!(
1814 (txToSequenceMasked < CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG && nSequenceMasked < CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG) ||
1815 (txToSequenceMasked >= CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG && nSequenceMasked >= CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG)
1816 )) {
1817 return false;
1818 }
1819
1820 // Now that we know we're comparing apples-to-apples, the
1821 // comparison is a simple numeric one.
1822 if (nSequenceMasked > txToSequenceMasked)
1823 return false;
1824
1825 return true;
1826}
1827
1828// explicit instantiation
1831
1832static bool ExecuteWitnessScript(const std::span<const valtype>& stack_span, const CScript& exec_script, script_verify_flags flags, SigVersion sigversion, const BaseSignatureChecker& checker, ScriptExecutionData& execdata, ScriptError* serror)
1833{
1834 std::vector<valtype> stack{stack_span.begin(), stack_span.end()};
1835
1836 if (sigversion == SigVersion::TAPSCRIPT) {
1837 // OP_SUCCESSx processing overrides everything, including stack element size limits
1838 CScript::const_iterator pc = exec_script.begin();
1839 while (pc < exec_script.end()) {
1840 opcodetype opcode;
1841 if (!exec_script.GetOp(pc, opcode)) {
1842 // Note how this condition would not be reached if an unknown OP_SUCCESSx was found
1843 return set_error(serror, SCRIPT_ERR_BAD_OPCODE);
1844 }
1845 // New opcodes will be listed here. May use a different sigversion to modify existing opcodes.
1846 if (IsOpSuccess(opcode)) {
1848 return set_error(serror, SCRIPT_ERR_DISCOURAGE_OP_SUCCESS);
1849 }
1850 return set_success(serror);
1851 }
1852 }
1853
1854 // Tapscript enforces initial stack size limits (altstack is empty here)
1855 if (stack.size() > MAX_STACK_SIZE) return set_error(serror, SCRIPT_ERR_STACK_SIZE);
1856 }
1857
1858 // Disallow stack item size > MAX_SCRIPT_ELEMENT_SIZE in witness stack
1859 for (const valtype& elem : stack) {
1860 if (elem.size() > MAX_SCRIPT_ELEMENT_SIZE) return set_error(serror, SCRIPT_ERR_PUSH_SIZE);
1861 }
1862
1863 // Run the script interpreter.
1864 if (!EvalScript(stack, exec_script, flags, checker, sigversion, execdata, serror)) return false;
1865
1866 // Scripts inside witness implicitly require cleanstack behaviour
1867 if (stack.size() != 1) return set_error(serror, SCRIPT_ERR_CLEANSTACK);
1868 if (!CastToBool(stack.back())) return set_error(serror, SCRIPT_ERR_EVAL_FALSE);
1869 return true;
1870}
1871
1872uint256 ComputeTapleafHash(uint8_t leaf_version, std::span<const unsigned char> script)
1873{
1874 return (HashWriter{HASHER_TAPLEAF} << leaf_version << CompactSizeWriter(script.size()) << script).GetSHA256();
1875}
1876
1877uint256 ComputeTapbranchHash(std::span<const unsigned char> a, std::span<const unsigned char> b)
1878{
1879 HashWriter ss_branch{HASHER_TAPBRANCH};
1880 if (std::lexicographical_compare(a.begin(), a.end(), b.begin(), b.end())) {
1881 ss_branch << a << b;
1882 } else {
1883 ss_branch << b << a;
1884 }
1885 return ss_branch.GetSHA256();
1886}
1887
1888uint256 ComputeTaprootMerkleRoot(std::span<const unsigned char> control, const uint256& tapleaf_hash)
1889{
1890 assert(control.size() >= TAPROOT_CONTROL_BASE_SIZE);
1891 assert(control.size() <= TAPROOT_CONTROL_MAX_SIZE);
1893
1894 const int path_len = (control.size() - TAPROOT_CONTROL_BASE_SIZE) / TAPROOT_CONTROL_NODE_SIZE;
1895 uint256 k = tapleaf_hash;
1896 for (int i = 0; i < path_len; ++i) {
1897 std::span node{std::span{control}.subspan(TAPROOT_CONTROL_BASE_SIZE + TAPROOT_CONTROL_NODE_SIZE * i, TAPROOT_CONTROL_NODE_SIZE)};
1899 }
1900 return k;
1901}
1902
1903static bool VerifyTaprootCommitment(const std::vector<unsigned char>& control, const std::vector<unsigned char>& program, const uint256& tapleaf_hash)
1904{
1905 assert(control.size() >= TAPROOT_CONTROL_BASE_SIZE);
1906 assert(program.size() >= uint256::size());
1908 const XOnlyPubKey p{std::span{control}.subspan(1, TAPROOT_CONTROL_BASE_SIZE - 1)};
1910 const XOnlyPubKey q{program};
1911 // Compute the Merkle root from the leaf and the provided path.
1912 const uint256 merkle_root = ComputeTaprootMerkleRoot(control, tapleaf_hash);
1913 // Verify that the output pubkey matches the tweaked internal pubkey, after correcting for parity.
1914 return q.CheckTapTweak(p, merkle_root, control[0] & 1);
1915}
1916
1917static bool VerifyWitnessProgram(const CScriptWitness& witness, int witversion, const std::vector<unsigned char>& program, script_verify_flags flags, const BaseSignatureChecker& checker, ScriptError* serror, bool is_p2sh)
1918{
1919 CScript exec_script;
1920 std::span stack{witness.stack};
1921 ScriptExecutionData execdata;
1922
1923 if (witversion == 0) {
1924 if (program.size() == WITNESS_V0_SCRIPTHASH_SIZE) {
1925 // BIP141 P2WSH: 32-byte witness v0 program (which encodes SHA256(script))
1926 if (stack.size() == 0) {
1927 return set_error(serror, SCRIPT_ERR_WITNESS_PROGRAM_WITNESS_EMPTY);
1928 }
1929 const valtype& script_bytes = SpanPopBack(stack);
1930 exec_script = CScript(script_bytes.begin(), script_bytes.end());
1931 uint256 hash_exec_script;
1932 CSHA256().Write(exec_script.data(), exec_script.size()).Finalize(hash_exec_script.begin());
1933 if (memcmp(hash_exec_script.begin(), program.data(), 32)) {
1934 return set_error(serror, SCRIPT_ERR_WITNESS_PROGRAM_MISMATCH);
1935 }
1936 return ExecuteWitnessScript(stack, exec_script, flags, SigVersion::WITNESS_V0, checker, execdata, serror);
1937 } else if (program.size() == WITNESS_V0_KEYHASH_SIZE) {
1938 // BIP141 P2WPKH: 20-byte witness v0 program (which encodes Hash160(pubkey))
1939 if (stack.size() != 2) {
1940 return set_error(serror, SCRIPT_ERR_WITNESS_PROGRAM_MISMATCH); // 2 items in witness
1941 }
1942 exec_script << OP_DUP << OP_HASH160 << program << OP_EQUALVERIFY << OP_CHECKSIG;
1943 return ExecuteWitnessScript(stack, exec_script, flags, SigVersion::WITNESS_V0, checker, execdata, serror);
1944 } else {
1945 return set_error(serror, SCRIPT_ERR_WITNESS_PROGRAM_WRONG_LENGTH);
1946 }
1947 } else if (witversion == 1 && program.size() == WITNESS_V1_TAPROOT_SIZE && !is_p2sh) {
1948 // BIP341 Taproot: 32-byte non-P2SH witness v1 program (which encodes a P2C-tweaked pubkey)
1949 if (!(flags & SCRIPT_VERIFY_TAPROOT)) return set_success(serror);
1950 if (stack.size() == 0) return set_error(serror, SCRIPT_ERR_WITNESS_PROGRAM_WITNESS_EMPTY);
1951 if (stack.size() >= 2 && !stack.back().empty() && stack.back()[0] == ANNEX_TAG) {
1952 // Drop annex (this is non-standard; see IsWitnessStandard)
1953 const valtype& annex = SpanPopBack(stack);
1954 execdata.m_annex_hash = (HashWriter{} << annex).GetSHA256();
1955 execdata.m_annex_present = true;
1956 } else {
1957 execdata.m_annex_present = false;
1958 }
1959 execdata.m_annex_init = true;
1960 if (stack.size() == 1) {
1961 // Key path spending (stack size is 1 after removing optional annex)
1962 if (!checker.CheckSchnorrSignature(stack.front(), program, SigVersion::TAPROOT, execdata, serror)) {
1963 return false; // serror is set
1964 }
1965 return set_success(serror);
1966 } else {
1967 // Script path spending (stack size is >1 after removing optional annex)
1968 const valtype& control = SpanPopBack(stack);
1969 const valtype& script = SpanPopBack(stack);
1970 if (control.size() < TAPROOT_CONTROL_BASE_SIZE || control.size() > TAPROOT_CONTROL_MAX_SIZE || ((control.size() - TAPROOT_CONTROL_BASE_SIZE) % TAPROOT_CONTROL_NODE_SIZE) != 0) {
1971 return set_error(serror, SCRIPT_ERR_TAPROOT_WRONG_CONTROL_SIZE);
1972 }
1974 if (!VerifyTaprootCommitment(control, program, execdata.m_tapleaf_hash)) {
1975 return set_error(serror, SCRIPT_ERR_WITNESS_PROGRAM_MISMATCH);
1976 }
1977 execdata.m_tapleaf_hash_init = true;
1978 if ((control[0] & TAPROOT_LEAF_MASK) == TAPROOT_LEAF_TAPSCRIPT) {
1979 // Tapscript (leaf version 0xc0)
1980 exec_script = CScript(script.begin(), script.end());
1982 execdata.m_validation_weight_left_init = true;
1983 return ExecuteWitnessScript(stack, exec_script, flags, SigVersion::TAPSCRIPT, checker, execdata, serror);
1984 }
1986 return set_error(serror, SCRIPT_ERR_DISCOURAGE_UPGRADABLE_TAPROOT_VERSION);
1987 }
1988 return set_success(serror);
1989 }
1990 } else if (!is_p2sh && CScript::IsPayToAnchor(witversion, program)) {
1991 return true;
1992 } else {
1994 return set_error(serror, SCRIPT_ERR_DISCOURAGE_UPGRADABLE_WITNESS_PROGRAM);
1995 }
1996 // Other version/size/p2sh combinations return true for future softfork compatibility
1997 return true;
1998 }
1999 // There is intentionally no return statement here, to be able to use "control reaches end of non-void function" warnings to detect gaps in the logic above.
2000}
2001
2002bool VerifyScript(const CScript& scriptSig, const CScript& scriptPubKey, const CScriptWitness* witness, script_verify_flags flags, const BaseSignatureChecker& checker, ScriptError* serror)
2003{
2004 static const CScriptWitness emptyWitness;
2005 if (witness == nullptr) {
2006 witness = &emptyWitness;
2007 }
2008 bool hadWitness = false;
2009
2010 set_error(serror, SCRIPT_ERR_UNKNOWN_ERROR);
2011
2012 if ((flags & SCRIPT_VERIFY_SIGPUSHONLY) != 0 && !scriptSig.IsPushOnly()) {
2013 return set_error(serror, SCRIPT_ERR_SIG_PUSHONLY);
2014 }
2015
2016 // scriptSig and scriptPubKey must be evaluated sequentially on the same stack
2017 // rather than being simply concatenated (see CVE-2010-5141)
2018 std::vector<std::vector<unsigned char> > stack, stackCopy;
2019 if (!EvalScript(stack, scriptSig, flags, checker, SigVersion::BASE, serror))
2020 // serror is set
2021 return false;
2023 stackCopy = stack;
2024 if (!EvalScript(stack, scriptPubKey, flags, checker, SigVersion::BASE, serror))
2025 // serror is set
2026 return false;
2027 if (stack.empty())
2028 return set_error(serror, SCRIPT_ERR_EVAL_FALSE);
2029 if (CastToBool(stack.back()) == false)
2030 return set_error(serror, SCRIPT_ERR_EVAL_FALSE);
2031
2032 // Bare witness programs
2033 int witnessversion;
2034 std::vector<unsigned char> witnessprogram;
2036 if (scriptPubKey.IsWitnessProgram(witnessversion, witnessprogram)) {
2037 hadWitness = true;
2038 if (scriptSig.size() != 0) {
2039 // The scriptSig must be _exactly_ CScript(), otherwise we reintroduce malleability.
2040 return set_error(serror, SCRIPT_ERR_WITNESS_MALLEATED);
2041 }
2042 if (!VerifyWitnessProgram(*witness, witnessversion, witnessprogram, flags, checker, serror, /*is_p2sh=*/false)) {
2043 return false;
2044 }
2045 // Bypass the cleanstack check at the end. The actual stack is obviously not clean
2046 // for witness programs.
2047 stack.resize(1);
2048 }
2049 }
2050
2051 // Additional validation for spend-to-script-hash transactions:
2052 if ((flags & SCRIPT_VERIFY_P2SH) && scriptPubKey.IsPayToScriptHash())
2053 {
2054 // scriptSig must be literals-only or validation fails
2055 if (!scriptSig.IsPushOnly())
2056 return set_error(serror, SCRIPT_ERR_SIG_PUSHONLY);
2057
2058 // Restore stack.
2059 swap(stack, stackCopy);
2060
2061 // stack cannot be empty here, because if it was the
2062 // P2SH HASH <> EQUAL scriptPubKey would be evaluated with
2063 // an empty stack and the EvalScript above would return false.
2064 assert(!stack.empty());
2065
2066 const valtype& pubKeySerialized = stack.back();
2067 CScript pubKey2(pubKeySerialized.begin(), pubKeySerialized.end());
2068 popstack(stack);
2069
2070 if (!EvalScript(stack, pubKey2, flags, checker, SigVersion::BASE, serror))
2071 // serror is set
2072 return false;
2073 if (stack.empty())
2074 return set_error(serror, SCRIPT_ERR_EVAL_FALSE);
2075 if (!CastToBool(stack.back()))
2076 return set_error(serror, SCRIPT_ERR_EVAL_FALSE);
2077
2078 // P2SH witness program
2080 if (pubKey2.IsWitnessProgram(witnessversion, witnessprogram)) {
2081 hadWitness = true;
2082 if (scriptSig != CScript() << std::vector<unsigned char>(pubKey2.begin(), pubKey2.end())) {
2083 // The scriptSig must be _exactly_ a single push of the redeemScript. Otherwise we
2084 // reintroduce malleability.
2085 return set_error(serror, SCRIPT_ERR_WITNESS_MALLEATED_P2SH);
2086 }
2087 if (!VerifyWitnessProgram(*witness, witnessversion, witnessprogram, flags, checker, serror, /*is_p2sh=*/true)) {
2088 return false;
2089 }
2090 // Bypass the cleanstack check at the end. The actual stack is obviously not clean
2091 // for witness programs.
2092 stack.resize(1);
2093 }
2094 }
2095 }
2096
2097 // The CLEANSTACK check is only performed after potential P2SH evaluation,
2098 // as the non-P2SH evaluation of a P2SH script will obviously not result in
2099 // a clean stack (the P2SH inputs remain). The same holds for witness evaluation.
2100 if ((flags & SCRIPT_VERIFY_CLEANSTACK) != 0) {
2101 // Disallow CLEANSTACK without P2SH, as otherwise a switch CLEANSTACK->P2SH+CLEANSTACK
2102 // would be possible, which is not a softfork (and P2SH should be one).
2105 if (stack.size() != 1) {
2106 return set_error(serror, SCRIPT_ERR_CLEANSTACK);
2107 }
2108 }
2109
2111 // We can't check for correct unexpected witness data if P2SH was off, so require
2112 // that WITNESS implies P2SH. Otherwise, going from WITNESS->P2SH+WITNESS would be
2113 // possible, which is not a softfork.
2115 if (!hadWitness && !witness->IsNull()) {
2116 return set_error(serror, SCRIPT_ERR_WITNESS_UNEXPECTED);
2117 }
2118 }
2119
2120 return set_success(serror);
2121}
2122
2123size_t static WitnessSigOps(int witversion, const std::vector<unsigned char>& witprogram, const CScriptWitness& witness)
2124{
2125 if (witversion == 0) {
2126 if (witprogram.size() == WITNESS_V0_KEYHASH_SIZE)
2127 return 1;
2128
2129 if (witprogram.size() == WITNESS_V0_SCRIPTHASH_SIZE && witness.stack.size() > 0) {
2130 CScript subscript(witness.stack.back().begin(), witness.stack.back().end());
2131 return subscript.GetSigOpCount(true);
2132 }
2133 }
2134
2135 // Future flags may be implemented here.
2136 return 0;
2137}
2138
2139size_t CountWitnessSigOps(const CScript& scriptSig, const CScript& scriptPubKey, const CScriptWitness& witness, script_verify_flags flags)
2140{
2141 if ((flags & SCRIPT_VERIFY_WITNESS) == 0) {
2142 return 0;
2143 }
2145
2146 int witnessversion;
2147 std::vector<unsigned char> witnessprogram;
2148 if (scriptPubKey.IsWitnessProgram(witnessversion, witnessprogram)) {
2149 return WitnessSigOps(witnessversion, witnessprogram, witness);
2150 }
2151
2152 if (scriptPubKey.IsPayToScriptHash() && scriptSig.IsPushOnly()) {
2153 CScript::const_iterator pc = scriptSig.begin();
2154 std::vector<unsigned char> data;
2155 while (pc < scriptSig.end()) {
2156 opcodetype opcode;
2157 scriptSig.GetOp(pc, opcode, data);
2158 }
2159 CScript subscript(data.begin(), data.end());
2160 if (subscript.IsWitnessProgram(witnessversion, witnessprogram)) {
2161 return WitnessSigOps(witnessversion, witnessprogram, witness);
2162 }
2163 }
2164
2165 return 0;
2166}
2167
2168const std::map<std::string, script_verify_flag_name>& ScriptFlagNamesToEnum()
2169{
2170#define FLAG_NAME(flag) {std::string(#flag), SCRIPT_VERIFY_##flag}
2171 static const std::map<std::string, script_verify_flag_name> g_names_to_enum{
2172 FLAG_NAME(P2SH),
2173 FLAG_NAME(STRICTENC),
2174 FLAG_NAME(DERSIG),
2175 FLAG_NAME(LOW_S),
2176 FLAG_NAME(SIGPUSHONLY),
2177 FLAG_NAME(MINIMALDATA),
2178 FLAG_NAME(NULLDUMMY),
2179 FLAG_NAME(DISCOURAGE_UPGRADABLE_NOPS),
2180 FLAG_NAME(CLEANSTACK),
2181 FLAG_NAME(MINIMALIF),
2182 FLAG_NAME(NULLFAIL),
2183 FLAG_NAME(CHECKLOCKTIMEVERIFY),
2184 FLAG_NAME(CHECKSEQUENCEVERIFY),
2185 FLAG_NAME(WITNESS),
2186 FLAG_NAME(DISCOURAGE_UPGRADABLE_WITNESS_PROGRAM),
2187 FLAG_NAME(WITNESS_PUBKEYTYPE),
2188 FLAG_NAME(CONST_SCRIPTCODE),
2189 FLAG_NAME(TAPROOT),
2190 FLAG_NAME(DISCOURAGE_UPGRADABLE_PUBKEYTYPE),
2191 FLAG_NAME(DISCOURAGE_OP_SUCCESS),
2192 FLAG_NAME(DISCOURAGE_UPGRADABLE_TAPROOT_VERSION),
2193 };
2194#undef FLAG_NAME
2195 return g_names_to_enum;
2196}
2197
2199{
2200 std::vector<std::string> res;
2201 if (flags == SCRIPT_VERIFY_NONE) {
2202 return res;
2203 }
2204 script_verify_flags leftover = flags;
2205 for (const auto& [name, flag] : ScriptFlagNamesToEnum()) {
2206 if ((flags & flag) != 0) {
2207 res.push_back(name);
2208 leftover &= ~flag;
2209 }
2210 }
2211 if (leftover != 0) {
2212 res.push_back(strprintf("0x%08x", leftover.as_int()));
2213 }
2214 return res;
2215}
std::vector< unsigned char > valtype
Definition: addresstype.cpp:18
int64_t CAmount
Amount in satoshis (Can be negative)
Definition: amount.h:12
int ret
if(!SetupNetworking())
int flags
Definition: bitcoin-tx.cpp:529
virtual bool CheckLockTime(const CScriptNum &nLockTime) const
Definition: interpreter.h:287
virtual bool CheckSchnorrSignature(std::span< const unsigned char > sig, std::span< const unsigned char > pubkey, SigVersion sigversion, ScriptExecutionData &execdata, ScriptError *serror=nullptr) const
Definition: interpreter.h:282
virtual bool CheckSequence(const CScriptNum &nSequence) const
Definition: interpreter.h:292
virtual bool CheckECDSASignature(const std::vector< unsigned char > &scriptSig, const std::vector< unsigned char > &vchPubKey, const CScript &scriptCode, SigVersion sigversion) const
Definition: interpreter.h:277
A hasher class for Bitcoin's 160-bit hash (SHA-256 + RIPEMD-160).
Definition: hash.h:49
CHash160 & Write(std::span< const unsigned char > input)
Definition: hash.h:62
void Finalize(std::span< unsigned char > output)
Definition: hash.h:55
A hasher class for Bitcoin's 256-bit hash (double SHA-256).
Definition: hash.h:24
void Finalize(std::span< unsigned char > output)
Definition: hash.h:30
CHash256 & Write(std::span< const unsigned char > input)
Definition: hash.h:37
An encapsulated public key.
Definition: pubkey.h:34
static constexpr unsigned int COMPRESSED_SIZE
Definition: pubkey.h:40
static bool CheckLowS(const std::vector< unsigned char > &vchSig)
Check whether a signature is normalized (lower-S).
Definition: pubkey.cpp:424
bool IsValid() const
Definition: pubkey.h:189
bool Verify(const uint256 &hash, const std::vector< unsigned char > &vchSig) const
Verify a DER signature (~72 bytes).
Definition: pubkey.cpp:283
static constexpr unsigned int SIZE
secp256k1:
Definition: pubkey.h:39
A hasher class for RIPEMD-160.
Definition: ripemd160.h:13
CRIPEMD160 & Write(const unsigned char *data, size_t len)
Definition: ripemd160.cpp:247
void Finalize(unsigned char hash[OUTPUT_SIZE])
Definition: ripemd160.cpp:273
A hasher class for SHA1.
Definition: sha1.h:13
CSHA1 & Write(const unsigned char *data, size_t len)
Definition: sha1.cpp:154
void Finalize(unsigned char hash[OUTPUT_SIZE])
Definition: sha1.cpp:180
A hasher class for SHA-256.
Definition: sha256.h:14
void Finalize(unsigned char hash[OUTPUT_SIZE])
Definition: sha256.cpp:725
CSHA256 & Write(const unsigned char *data, size_t len)
Definition: sha256.cpp:699
Serialized script, used inside transaction inputs and outputs.
Definition: script.h:413
bool IsPushOnly(const_iterator pc) const
Called by IsStandardTx and P2SH/BIP62 VerifyScript (which makes it consensus-critical).
Definition: script.cpp:266
bool IsPayToScriptHash() const
Definition: script.cpp:224
unsigned int GetSigOpCount(bool fAccurate) const
Pre-version-0.6, Bitcoin always counted CHECKMULTISIGs as 20 sigops.
Definition: script.cpp:159
bool IsPayToAnchor() const
Definition: script.cpp:207
bool GetOp(const_iterator &pc, opcodetype &opcodeRet, std::vector< unsigned char > &vchRet) const
Definition: script.h:504
bool IsWitnessProgram(int &version, std::vector< unsigned char > &program) const
Definition: script.cpp:250
std::vector< unsigned char > getvch() const
Definition: script.h:344
int getint() const
Definition: script.h:333
The basic transaction that is broadcasted on the network and contained in blocks.
Definition: transaction.h:296
static const uint32_t SEQUENCE_LOCKTIME_DISABLE_FLAG
If this flag is set, CTxIn::nSequence is NOT interpreted as a relative lock-time.
Definition: transaction.h:98
static const uint32_t SEQUENCE_LOCKTIME_MASK
If CTxIn::nSequence encodes a relative lock-time, this mask is applied to extract that lock-time from...
Definition: transaction.h:109
static const uint32_t SEQUENCE_FINAL
Setting nSequence to this value for every input in a transaction disables nLockTime/IsFinalTx().
Definition: transaction.h:81
static const uint32_t SEQUENCE_LOCKTIME_TYPE_FLAG
If CTxIn::nSequence encodes a relative lock-time and this flag is set, the relative lock-time has uni...
Definition: transaction.h:104
An output of a transaction.
Definition: transaction.h:150
bool CheckSchnorrSignature(std::span< const unsigned char > sig, std::span< const unsigned char > pubkey, SigVersion sigversion, ScriptExecutionData &execdata, ScriptError *serror=nullptr) const override
bool CheckECDSASignature(const std::vector< unsigned char > &scriptSig, const std::vector< unsigned char > &vchPubKey, const CScript &scriptCode, SigVersion sigversion) const override
bool CheckLockTime(const CScriptNum &nLockTime) const override
virtual bool VerifySchnorrSignature(std::span< const unsigned char > sig, const XOnlyPubKey &pubkey, const uint256 &sighash) const
virtual bool VerifyECDSASignature(const std::vector< unsigned char > &vchSig, const CPubKey &vchPubKey, const uint256 &sighash) const
bool CheckSequence(const CScriptNum &nSequence) const override
A writer stream (for serialization) that computes a 256-bit hash.
Definition: hash.h:101
uint256 GetHash()
Compute the double-SHA256 hash of all data written to this object.
Definition: hash.h:115
uint256 GetSHA256()
Compute the SHA256 hash of all data written to this object.
Definition: hash.h:126
Data structure to cache SHA256 midstates for the ECDSA sighash calculations (bare,...
Definition: interpreter.h:255
void Store(int32_t hash_type, const CScript &script_code, const HashWriter &writer) noexcept
Store into this cache object the provided SHA256 midstate.
bool Load(int32_t hash_type, const CScript &script_code, HashWriter &writer) const noexcept
Load into writer the SHA256 midstate if found in this cache.
int CacheIndex(int32_t hash_type) const noexcept
Given a hash_type, find which of the 6 cache entries is to be used.
bool VerifySchnorr(const uint256 &msg, std::span< const unsigned char > sigbytes) const
Verify a Schnorr signature against this public key.
Definition: pubkey.cpp:236
static constexpr unsigned int size()
Definition: uint256.h:107
constexpr unsigned char * begin()
Definition: uint256.h:101
bool empty() const
Definition: prevector.h:259
size_type size() const
Definition: prevector.h:255
value_type * data()
Definition: prevector.h:489
iterator begin()
Definition: prevector.h:263
iterator end()
Definition: prevector.h:265
iterator insert(iterator pos, const T &value)
Definition: prevector.h:315
constexpr value_type as_int() const
Definition: verify_flags.h:36
256-bit opaque blob.
Definition: uint256.h:196
static const uint256 ONE
Definition: uint256.h:205
HashWriter TaggedHash(const std::string &tag)
Return a HashWriter primed for tagged hashes (as specified in BIP 340).
Definition: hash.cpp:85
uint256 SHA256Uint256(const uint256 &input)
Single-SHA256 a 32-byte input (represented as uint256).
Definition: hash.cpp:78
uint256 ComputeTapbranchHash(std::span< const unsigned char > a, std::span< const unsigned char > b)
Compute the BIP341 tapbranch hash from two branches.
const std::map< std::string, script_verify_flag_name > & ScriptFlagNamesToEnum()
static bool IsDefinedHashtypeSignature(const valtype &vchSig)
bool SignatureHashSchnorr(uint256 &hash_out, ScriptExecutionData &execdata, const T &tx_to, uint32_t in_pos, uint8_t hash_type, SigVersion sigversion, const PrecomputedTransactionData &cache, MissingDataBehavior mdb)
static bool EvalChecksigTapscript(const valtype &sig, const valtype &pubkey, ScriptExecutionData &execdata, script_verify_flags flags, const BaseSignatureChecker &checker, SigVersion sigversion, ScriptError *serror, bool &success)
static bool IsCompressedPubKey(const valtype &vchPubKey)
Definition: interpreter.cpp:86
static bool IsValidSignatureEncoding(const std::vector< unsigned char > &sig)
A canonical signature exists of: <30> <total len> <02> <len R> <R> <02> <len S> <hashtype> Where R a...
uint256 ComputeTaprootMerkleRoot(std::span< const unsigned char > control, const uint256 &tapleaf_hash)
Compute the BIP341 taproot script tree Merkle root from control block and leaf hash.
bool CastToBool(const valtype &vch)
Definition: interpreter.cpp:36
int FindAndDelete(CScript &script, const CScript &b)
static bool EvalChecksig(const valtype &sig, const valtype &pubkey, CScript::const_iterator pbegincodehash, CScript::const_iterator pend, ScriptExecutionData &execdata, script_verify_flags flags, const BaseSignatureChecker &checker, SigVersion sigversion, ScriptError *serror, bool &success)
Helper for OP_CHECKSIG, OP_CHECKSIGVERIFY, and (in Tapscript) OP_CHECKSIGADD.
const HashWriter HASHER_TAPBRANCH
Hasher with tag "TapBranch" pre-fed to it.
static void popstack(std::vector< valtype > &stack)
Definition: interpreter.cpp:57
static bool IsLowDERSignature(const valtype &vchSig, ScriptError *serror)
size_t CountWitnessSigOps(const CScript &scriptSig, const CScript &scriptPubKey, const CScriptWitness &witness, script_verify_flags flags)
uint256 ComputeTapleafHash(uint8_t leaf_version, std::span< const unsigned char > script)
Compute the BIP341 tapleaf hash from leaf version & script.
bool EvalScript(std::vector< std::vector< unsigned char > > &stack, const CScript &script, script_verify_flags flags, const BaseSignatureChecker &checker, SigVersion sigversion, ScriptExecutionData &execdata, ScriptError *serror)
uint256 SignatureHash(const CScript &scriptCode, const T &txTo, unsigned int nIn, int32_t nHashType, const CAmount &amount, SigVersion sigversion, const PrecomputedTransactionData *cache, SigHashCache *sighash_cache)
static bool ExecuteWitnessScript(const std::span< const valtype > &stack_span, const CScript &exec_script, script_verify_flags flags, SigVersion sigversion, const BaseSignatureChecker &checker, ScriptExecutionData &execdata, ScriptError *serror)
static size_t WitnessSigOps(int witversion, const std::vector< unsigned char > &witprogram, const CScriptWitness &witness)
std::vector< unsigned char > valtype
Definition: interpreter.cpp:16
static bool IsCompressedOrUncompressedPubKey(const valtype &vchPubKey)
Definition: interpreter.cpp:64
std::vector< std::string > GetScriptFlagNames(script_verify_flags flags)
bool CheckSignatureEncoding(const std::vector< unsigned char > &vchSig, script_verify_flags flags, ScriptError *serror)
#define stacktop(i)
Script is a stack machine (like Forth) that evaluates a predicate returning a bool indicating valid o...
Definition: interpreter.cpp:55
const HashWriter HASHER_TAPLEAF
Hasher with tag "TapLeaf" pre-fed to it.
#define altstacktop(i)
Definition: interpreter.cpp:56
static bool VerifyWitnessProgram(const CScriptWitness &witness, int witversion, const std::vector< unsigned char > &program, script_verify_flags flags, const BaseSignatureChecker &checker, ScriptError *serror, bool is_p2sh)
#define FLAG_NAME(flag)
bool VerifyScript(const CScript &scriptSig, const CScript &scriptPubKey, const CScriptWitness *witness, script_verify_flags flags, const BaseSignatureChecker &checker, ScriptError *serror)
static bool HandleMissingData(MissingDataBehavior mdb)
static bool CheckPubKeyEncoding(const valtype &vchPubKey, script_verify_flags flags, const SigVersion &sigversion, ScriptError *serror)
static bool EvalChecksigPreTapscript(const valtype &vchSig, const valtype &vchPubKey, CScript::const_iterator pbegincodehash, CScript::const_iterator pend, script_verify_flags flags, const BaseSignatureChecker &checker, SigVersion sigversion, ScriptError *serror, bool &fSuccess)
static bool VerifyTaprootCommitment(const std::vector< unsigned char > &control, const std::vector< unsigned char > &program, const uint256 &tapleaf_hash)
const HashWriter HASHER_TAPSIGHASH
Hasher with tag "TapSighash" pre-fed to it.
static constexpr size_t WITNESS_V0_KEYHASH_SIZE
Definition: interpreter.h:238
SigVersion
Definition: interpreter.h:201
@ TAPROOT
Witness v1 with 32-byte program, not BIP16 P2SH-wrapped, key path spending; see BIP 341.
@ BASE
Bare scripts and BIP16 P2SH-wrapped redeemscripts.
@ TAPSCRIPT
Witness v1 with 32-byte program, not BIP16 P2SH-wrapped, script path spending, leaf version 0xc0; see...
@ WITNESS_V0
Witness v0 (P2WPKH and P2WSH); see BIP 141.
static constexpr uint8_t TAPROOT_LEAF_MASK
Definition: interpreter.h:241
static constexpr uint8_t TAPROOT_LEAF_TAPSCRIPT
Definition: interpreter.h:242
static constexpr size_t WITNESS_V0_SCRIPTHASH_SIZE
Signature hash sizes.
Definition: interpreter.h:237
@ SIGHASH_INPUT_MASK
Definition: interpreter.h:38
@ SIGHASH_ANYONECANPAY
Definition: interpreter.h:34
@ SIGHASH_DEFAULT
Taproot only; implied when sighash byte is missing, and equivalent to SIGHASH_ALL.
Definition: interpreter.h:36
@ SIGHASH_ALL
Definition: interpreter.h:31
@ SIGHASH_NONE
Definition: interpreter.h:32
@ SIGHASH_OUTPUT_MASK
Definition: interpreter.h:37
@ SIGHASH_SINGLE
Definition: interpreter.h:33
static constexpr size_t TAPROOT_CONTROL_NODE_SIZE
Definition: interpreter.h:244
static constexpr size_t WITNESS_V1_TAPROOT_SIZE
Definition: interpreter.h:239
MissingDataBehavior
Enum to specify what *TransactionSignatureChecker's behavior should be when dealing with missing tran...
Definition: interpreter.h:304
@ ASSERT_FAIL
Abort execution through assertion failure (for consensus code)
@ FAIL
Just act as if the signature was invalid.
static constexpr size_t TAPROOT_CONTROL_MAX_SIZE
Definition: interpreter.h:246
@ SCRIPT_VERIFY_DISCOURAGE_UPGRADABLE_TAPROOT_VERSION
@ SCRIPT_VERIFY_DISCOURAGE_UPGRADABLE_WITNESS_PROGRAM
@ SCRIPT_VERIFY_DISCOURAGE_UPGRADABLE_PUBKEYTYPE
static constexpr script_verify_flags SCRIPT_VERIFY_NONE
Script verification flags.
Definition: interpreter.h:47
static constexpr size_t TAPROOT_CONTROL_BASE_SIZE
Definition: interpreter.h:243
Definition: messages.h:21
#define S(a, b, c, d, e, f, g, h, i, j, k, l, m, n, o, p)
const char * name
Definition: rest.cpp:48
bool CheckMinimalPush(const std::vector< unsigned char > &data, opcodetype opcode)
Definition: script.cpp:373
bool IsOpSuccess(const opcodetype &opcode)
Test for OP_SUCCESSx opcodes as defined by BIP342.
Definition: script.cpp:365
static constexpr int64_t VALIDATION_WEIGHT_PER_SIGOP_PASSED
Definition: script.h:61
static const unsigned int LOCKTIME_THRESHOLD
Definition: script.h:47
static const unsigned int MAX_SCRIPT_ELEMENT_SIZE
Definition: script.h:28
static const int MAX_SCRIPT_SIZE
Definition: script.h:40
opcodetype
Script opcodes.
Definition: script.h:74
@ OP_NUMNOTEQUAL
Definition: script.h:173
@ OP_2
Definition: script.h:85
@ OP_SHA256
Definition: script.h:186
@ OP_PUSHDATA4
Definition: script.h:80
@ OP_NOP5
Definition: script.h:202
@ OP_RIGHT
Definition: script.h:138
@ OP_BOOLAND
Definition: script.h:169
@ OP_CHECKMULTISIG
Definition: script.h:192
@ OP_NEGATE
Definition: script.h:156
@ OP_IF
Definition: script.h:104
@ OP_13
Definition: script.h:96
@ OP_ROT
Definition: script.h:130
@ OP_SWAP
Definition: script.h:131
@ OP_1NEGATE
Definition: script.h:81
@ OP_CHECKSIG
Definition: script.h:190
@ OP_CHECKLOCKTIMEVERIFY
Definition: script.h:197
@ OP_LESSTHAN
Definition: script.h:174
@ OP_16
Definition: script.h:99
@ OP_LEFT
Definition: script.h:137
@ OP_14
Definition: script.h:97
@ OP_NOP10
Definition: script.h:207
@ OP_2DIV
Definition: script.h:155
@ OP_NOT
Definition: script.h:158
@ OP_EQUAL
Definition: script.h:146
@ OP_NUMEQUAL
Definition: script.h:171
@ OP_MOD
Definition: script.h:165
@ OP_NOTIF
Definition: script.h:105
@ OP_4
Definition: script.h:87
@ OP_10
Definition: script.h:93
@ OP_SIZE
Definition: script.h:139
@ OP_3DUP
Definition: script.h:118
@ OP_ENDIF
Definition: script.h:109
@ OP_NOP1
Definition: script.h:196
@ OP_DUP
Definition: script.h:125
@ OP_GREATERTHAN
Definition: script.h:175
@ OP_NOP
Definition: script.h:102
@ OP_TOALTSTACK
Definition: script.h:114
@ OP_CODESEPARATOR
Definition: script.h:189
@ OP_RIPEMD160
Definition: script.h:184
@ OP_MIN
Definition: script.h:178
@ OP_HASH256
Definition: script.h:188
@ OP_MAX
Definition: script.h:179
@ OP_1SUB
Definition: script.h:153
@ OP_FROMALTSTACK
Definition: script.h:115
@ OP_SUB
Definition: script.h:162
@ OP_NUMEQUALVERIFY
Definition: script.h:172
@ OP_OVER
Definition: script.h:127
@ OP_NOP8
Definition: script.h:205
@ OP_DIV
Definition: script.h:164
@ OP_HASH160
Definition: script.h:187
@ OP_2DUP
Definition: script.h:117
@ OP_NIP
Definition: script.h:126
@ OP_2MUL
Definition: script.h:154
@ OP_NOP4
Definition: script.h:201
@ OP_1
Definition: script.h:83
@ OP_LESSTHANOREQUAL
Definition: script.h:176
@ OP_2DROP
Definition: script.h:116
@ OP_DEPTH
Definition: script.h:123
@ OP_NOP9
Definition: script.h:206
@ OP_VERIFY
Definition: script.h:110
@ OP_12
Definition: script.h:95
@ OP_ADD
Definition: script.h:161
@ OP_CHECKMULTISIGVERIFY
Definition: script.h:193
@ OP_NOP7
Definition: script.h:204
@ OP_8
Definition: script.h:91
@ OP_BOOLOR
Definition: script.h:170
@ OP_XOR
Definition: script.h:145
@ OP_DROP
Definition: script.h:124
@ OP_MUL
Definition: script.h:163
@ OP_WITHIN
Definition: script.h:181
@ OP_CHECKSIGADD
Definition: script.h:210
@ OP_ELSE
Definition: script.h:108
@ OP_15
Definition: script.h:98
@ OP_CHECKSIGVERIFY
Definition: script.h:191
@ OP_TUCK
Definition: script.h:132
@ OP_2OVER
Definition: script.h:119
@ OP_0NOTEQUAL
Definition: script.h:159
@ OP_9
Definition: script.h:92
@ OP_3
Definition: script.h:86
@ OP_11
Definition: script.h:94
@ OP_SHA1
Definition: script.h:185
@ OP_SUBSTR
Definition: script.h:136
@ OP_GREATERTHANOREQUAL
Definition: script.h:177
@ OP_RSHIFT
Definition: script.h:167
@ OP_2SWAP
Definition: script.h:121
@ OP_2ROT
Definition: script.h:120
@ OP_6
Definition: script.h:89
@ OP_INVERT
Definition: script.h:142
@ OP_ABS
Definition: script.h:157
@ OP_LSHIFT
Definition: script.h:166
@ OP_RETURN
Definition: script.h:111
@ OP_IFDUP
Definition: script.h:122
@ OP_PICK
Definition: script.h:128
@ OP_AND
Definition: script.h:143
@ OP_EQUALVERIFY
Definition: script.h:147
@ OP_CAT
Definition: script.h:135
@ OP_1ADD
Definition: script.h:152
@ OP_7
Definition: script.h:90
@ OP_OR
Definition: script.h:144
@ OP_ROLL
Definition: script.h:129
@ OP_NOP6
Definition: script.h:203
@ OP_5
Definition: script.h:88
@ OP_CHECKSEQUENCEVERIFY
Definition: script.h:199
static const int MAX_STACK_SIZE
Definition: script.h:43
static const int MAX_OPS_PER_SCRIPT
Definition: script.h:31
static constexpr int64_t VALIDATION_WEIGHT_OFFSET
Definition: script.h:64
static const int MAX_PUBKEYS_PER_MULTISIG
Definition: script.h:34
static constexpr unsigned int ANNEX_TAG
Definition: script.h:58
enum ScriptError_t ScriptError
@ SCRIPT_ERR_OP_CODESEPARATOR
Definition: script_error.h:82
@ SCRIPT_ERR_SIG_PUSHONLY
Definition: script_error.h:48
@ SCRIPT_ERR_OP_COUNT
Definition: script_error.h:21
@ SCRIPT_ERR_DISCOURAGE_UPGRADABLE_PUBKEYTYPE
Definition: script_error.h:61
@ SCRIPT_ERR_EVAL_FALSE
Definition: script_error.h:15
@ SCRIPT_ERR_NUMEQUALVERIFY
Definition: script_error.h:31
@ SCRIPT_ERR_VERIFY
Definition: script_error.h:27
@ SCRIPT_ERR_TAPSCRIPT_CHECKMULTISIG
Definition: script_error.h:78
@ SCRIPT_ERR_DISABLED_OPCODE
Definition: script_error.h:35
@ SCRIPT_ERR_DISCOURAGE_UPGRADABLE_TAPROOT_VERSION
Definition: script_error.h:59
@ SCRIPT_ERR_INVALID_ALTSTACK_OPERATION
Definition: script_error.h:37
@ SCRIPT_ERR_DISCOURAGE_UPGRADABLE_WITNESS_PROGRAM
Definition: script_error.h:58
@ SCRIPT_ERR_SCRIPT_SIZE
Definition: script_error.h:19
@ SCRIPT_ERR_TAPSCRIPT_MINIMALIF
Definition: script_error.h:79
@ SCRIPT_ERR_UNKNOWN_ERROR
Definition: script_error.h:14
@ SCRIPT_ERR_WITNESS_PROGRAM_WRONG_LENGTH
Definition: script_error.h:64
@ SCRIPT_ERR_SIG_HASHTYPE
Definition: script_error.h:45
@ SCRIPT_ERR_MINIMALDATA
Definition: script_error.h:47
@ SCRIPT_ERR_CHECKSIGVERIFY
Definition: script_error.h:30
@ SCRIPT_ERR_STACK_SIZE
Definition: script_error.h:22
@ SCRIPT_ERR_WITNESS_MALLEATED_P2SH
Definition: script_error.h:68
@ SCRIPT_ERR_SCHNORR_SIG_SIZE
Definition: script_error.h:73
@ SCRIPT_ERR_WITNESS_MALLEATED
Definition: script_error.h:67
@ SCRIPT_ERR_DISCOURAGE_UPGRADABLE_NOPS
Definition: script_error.h:57
@ SCRIPT_ERR_EQUALVERIFY
Definition: script_error.h:28
@ SCRIPT_ERR_TAPSCRIPT_VALIDATION_WEIGHT
Definition: script_error.h:77
@ SCRIPT_ERR_INVALID_STACK_OPERATION
Definition: script_error.h:36
@ SCRIPT_ERR_DISCOURAGE_OP_SUCCESS
Definition: script_error.h:60
@ SCRIPT_ERR_SIG_COUNT
Definition: script_error.h:23
@ SCRIPT_ERR_SIG_HIGH_S
Definition: script_error.h:49
@ SCRIPT_ERR_SIG_DER
Definition: script_error.h:46
@ SCRIPT_ERR_WITNESS_UNEXPECTED
Definition: script_error.h:69
@ SCRIPT_ERR_NEGATIVE_LOCKTIME
Definition: script_error.h:41
@ SCRIPT_ERR_WITNESS_PROGRAM_MISMATCH
Definition: script_error.h:66
@ SCRIPT_ERR_OP_RETURN
Definition: script_error.h:16
@ SCRIPT_ERR_PUSH_SIZE
Definition: script_error.h:20
@ SCRIPT_ERR_SIG_NULLFAIL
Definition: script_error.h:54
@ SCRIPT_ERR_OK
Definition: script_error.h:13
@ SCRIPT_ERR_SIG_NULLDUMMY
Definition: script_error.h:50
@ SCRIPT_ERR_PUBKEYTYPE
Definition: script_error.h:51
@ SCRIPT_ERR_CHECKMULTISIGVERIFY
Definition: script_error.h:29
@ SCRIPT_ERR_TAPROOT_WRONG_CONTROL_SIZE
Definition: script_error.h:76
@ SCRIPT_ERR_SCHNORR_SIG
Definition: script_error.h:75
@ SCRIPT_ERR_UNSATISFIED_LOCKTIME
Definition: script_error.h:42
@ SCRIPT_ERR_WITNESS_PUBKEYTYPE
Definition: script_error.h:70
@ SCRIPT_ERR_SIG_FINDANDDELETE
Definition: script_error.h:83
@ SCRIPT_ERR_BAD_OPCODE
Definition: script_error.h:34
@ SCRIPT_ERR_PUBKEY_COUNT
Definition: script_error.h:24
@ SCRIPT_ERR_WITNESS_PROGRAM_WITNESS_EMPTY
Definition: script_error.h:65
@ SCRIPT_ERR_SCHNORR_SIG_HASHTYPE
Definition: script_error.h:74
@ SCRIPT_ERR_CLEANSTACK
Definition: script_error.h:52
@ SCRIPT_ERR_UNBALANCED_CONDITIONAL
Definition: script_error.h:38
@ SCRIPT_ERR_MINIMALIF
Definition: script_error.h:53
size_t GetSerializeSize(const T &t)
Definition: serialize.h:1094
void Serialize(Stream &, V)=delete
void WriteCompactSize(SizeComputer &os, uint64_t nSize)
Definition: serialize.h:1088
T & SpanPopBack(std::span< T > &span)
A span is an object that can refer to a contiguous sequence of objects.
Definition: span.h:75
A mutable version of CTransaction.
Definition: transaction.h:378
std::vector< std::vector< unsigned char > > stack
Definition: script.h:588
bool IsNull() const
Definition: script.h:593
void Init(const T &tx, std::vector< CTxOut > &&spent_outputs, bool force=false)
Initialize this PrecomputedTransactionData with transaction data.
bool m_bip341_taproot_ready
Whether the 5 fields above are initialized.
Definition: interpreter.h:173
PrecomputedTransactionData()=default
bool m_bip143_segwit_ready
Whether the 3 fields above are initialized.
Definition: interpreter.h:178
bool m_spent_outputs_ready
Whether m_spent_outputs is initialized.
Definition: interpreter.h:182
std::vector< CTxOut > m_spent_outputs
Definition: interpreter.h:180
std::optional< uint256 > m_output_hash
The hash of the corresponding output.
Definition: interpreter.h:233
uint256 m_tapleaf_hash
The tapleaf hash.
Definition: interpreter.h:213
uint256 m_annex_hash
Hash of the annex data.
Definition: interpreter.h:225
int64_t m_validation_weight_left
How much validation weight is left (decremented for every successful non-empty signature check).
Definition: interpreter.h:230
bool m_annex_present
Whether an annex is present.
Definition: interpreter.h:223
bool m_annex_init
Whether m_annex_present and (when needed) m_annex_hash are initialized.
Definition: interpreter.h:221
bool m_codeseparator_pos_init
Whether m_codeseparator_pos is initialized.
Definition: interpreter.h:216
bool m_tapleaf_hash_init
Whether m_tapleaf_hash is initialized.
Definition: interpreter.h:211
bool m_validation_weight_left_init
Whether m_validation_weight_left is initialized.
Definition: interpreter.h:228
uint32_t m_codeseparator_pos
Opcode position of the last executed OP_CODESEPARATOR (or 0xFFFFFFFF if none executed).
Definition: interpreter.h:218
#define strprintf
Format arguments and return the string or write to given std::ostream (see tinyformat::format doc for...
Definition: tinyformat.h:1172
assert(!tx.IsCoinBase())