Bitcoin Core Fuzz Coverage Report

Coverage Report

Created: 2026-03-24 13:57

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/root/bitcoin/src/script/sign.cpp
Line
Count
Source
1
// Copyright (c) 2009-2010 Satoshi Nakamoto
2
// Copyright (c) 2009-present The Bitcoin Core developers
3
// Distributed under the MIT software license, see the accompanying
4
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
5
6
#include <script/sign.h>
7
8
#include <consensus/amount.h>
9
#include <key.h>
10
#include <musig.h>
11
#include <policy/policy.h>
12
#include <primitives/transaction.h>
13
#include <random.h>
14
#include <script/keyorigin.h>
15
#include <script/miniscript.h>
16
#include <script/script.h>
17
#include <script/signingprovider.h>
18
#include <script/solver.h>
19
#include <uint256.h>
20
#include <util/translation.h>
21
#include <util/vector.h>
22
23
typedef std::vector<unsigned char> valtype;
24
25
MutableTransactionSignatureCreator::MutableTransactionSignatureCreator(const CMutableTransaction& tx, unsigned int input_idx, const CAmount& amount, int hash_type)
26
0
    : m_txto{tx}, nIn{input_idx}, nHashType{hash_type}, amount{amount}, checker{&m_txto, nIn, amount, MissingDataBehavior::FAIL},
27
0
      m_txdata(nullptr)
28
0
{
29
0
}
30
31
MutableTransactionSignatureCreator::MutableTransactionSignatureCreator(const CMutableTransaction& tx, unsigned int input_idx, const CAmount& amount, const PrecomputedTransactionData* txdata, int hash_type)
32
0
    : m_txto{tx}, nIn{input_idx}, nHashType{hash_type}, amount{amount},
33
0
      checker{txdata ? MutableTransactionSignatureChecker{&m_txto, nIn, amount, *txdata, MissingDataBehavior::FAIL} :
34
0
                       MutableTransactionSignatureChecker{&m_txto, nIn, amount, MissingDataBehavior::FAIL}},
35
0
      m_txdata(txdata)
36
0
{
37
0
}
38
39
bool MutableTransactionSignatureCreator::CreateSig(const SigningProvider& provider, std::vector<unsigned char>& vchSig, const CKeyID& address, const CScript& scriptCode, SigVersion sigversion) const
40
0
{
41
0
    assert(sigversion == SigVersion::BASE || sigversion == SigVersion::WITNESS_V0);
42
43
0
    CKey key;
44
0
    if (!provider.GetKey(address, key))
45
0
        return false;
46
47
    // Signing with uncompressed keys is disabled in witness scripts
48
0
    if (sigversion == SigVersion::WITNESS_V0 && !key.IsCompressed())
49
0
        return false;
50
51
    // Signing without known amount does not work in witness scripts.
52
0
    if (sigversion == SigVersion::WITNESS_V0 && !MoneyRange(amount)) return false;
53
54
    // BASE/WITNESS_V0 signatures don't support explicit SIGHASH_DEFAULT, use SIGHASH_ALL instead.
55
0
    const int hashtype = nHashType == SIGHASH_DEFAULT ? SIGHASH_ALL : nHashType;
56
57
0
    uint256 hash = SignatureHash(scriptCode, m_txto, nIn, hashtype, amount, sigversion, m_txdata);
58
0
    if (!key.Sign(hash, vchSig))
59
0
        return false;
60
0
    vchSig.push_back((unsigned char)hashtype);
61
0
    return true;
62
0
}
63
64
std::optional<uint256> MutableTransactionSignatureCreator::ComputeSchnorrSignatureHash(const uint256* leaf_hash, SigVersion sigversion) const
65
0
{
66
0
    assert(sigversion == SigVersion::TAPROOT || sigversion == SigVersion::TAPSCRIPT);
67
68
    // BIP341/BIP342 signing needs lots of precomputed transaction data. While some
69
    // (non-SIGHASH_DEFAULT) sighash modes exist that can work with just some subset
70
    // of data present, for now, only support signing when everything is provided.
71
0
    if (!m_txdata || !m_txdata->m_bip341_taproot_ready || !m_txdata->m_spent_outputs_ready) return std::nullopt;
72
73
0
    ScriptExecutionData execdata;
74
0
    execdata.m_annex_init = true;
75
0
    execdata.m_annex_present = false; // Only support annex-less signing for now.
76
0
    if (sigversion == SigVersion::TAPSCRIPT) {
77
0
        execdata.m_codeseparator_pos_init = true;
78
0
        execdata.m_codeseparator_pos = 0xFFFFFFFF; // Only support non-OP_CODESEPARATOR BIP342 signing for now.
79
0
        if (!leaf_hash) return std::nullopt; // BIP342 signing needs leaf hash.
80
0
        execdata.m_tapleaf_hash_init = true;
81
0
        execdata.m_tapleaf_hash = *leaf_hash;
82
0
    }
83
0
    uint256 hash;
84
0
    if (!SignatureHashSchnorr(hash, execdata, m_txto, nIn, nHashType, sigversion, *m_txdata, MissingDataBehavior::FAIL)) return std::nullopt;
85
0
    return hash;
86
0
}
87
88
bool MutableTransactionSignatureCreator::CreateSchnorrSig(const SigningProvider& provider, std::vector<unsigned char>& sig, const XOnlyPubKey& pubkey, const uint256* leaf_hash, const uint256* merkle_root, SigVersion sigversion) const
89
0
{
90
0
    CKey key;
91
0
    if (!provider.GetKeyByXOnly(pubkey, key)) return false;
92
93
0
    std::optional<uint256> hash = ComputeSchnorrSignatureHash(leaf_hash, sigversion);
94
0
    if (!hash.has_value()) return false;
95
96
0
    sig.resize(64);
97
    // Use uint256{} as aux_rnd for now.
98
0
    if (!key.SignSchnorr(*hash, sig, merkle_root, {})) return false;
99
0
    if (nHashType) sig.push_back(nHashType);
100
0
    return true;
101
0
}
102
103
std::vector<uint8_t> MutableTransactionSignatureCreator::CreateMuSig2Nonce(const SigningProvider& provider, const CPubKey& aggregate_pubkey, const CPubKey& script_pubkey, const CPubKey& part_pubkey, const uint256* leaf_hash, const uint256* merkle_root, SigVersion sigversion, const SignatureData& sigdata) const
104
0
{
105
0
    assert(sigversion == SigVersion::TAPROOT || sigversion == SigVersion::TAPSCRIPT);
106
107
    // Retrieve the private key
108
0
    CKey key;
109
0
    if (!provider.GetKey(part_pubkey.GetID(), key)) return {};
110
111
    // Retrieve participant pubkeys
112
0
    auto it = sigdata.musig2_pubkeys.find(aggregate_pubkey);
113
0
    if (it == sigdata.musig2_pubkeys.end()) return {};
114
0
    const std::vector<CPubKey>& pubkeys = it->second;
115
0
    if (std::find(pubkeys.begin(), pubkeys.end(), part_pubkey) == pubkeys.end()) return {};
116
117
    // Compute sighash
118
0
    std::optional<uint256> sighash = ComputeSchnorrSignatureHash(leaf_hash, sigversion);
119
0
    if (!sighash.has_value()) return {};
120
121
0
    MuSig2SecNonce secnonce;
122
0
    std::vector<uint8_t> out = key.CreateMuSig2Nonce(secnonce, *sighash, aggregate_pubkey, pubkeys);
123
0
    if (out.empty()) return {};
124
125
    // Store the secnonce in the SigningProvider
126
0
    provider.SetMuSig2SecNonce(MuSig2SessionID(script_pubkey, part_pubkey, *sighash), std::move(secnonce));
127
128
0
    return out;
129
0
}
130
131
bool MutableTransactionSignatureCreator::CreateMuSig2PartialSig(const SigningProvider& provider, uint256& partial_sig, const CPubKey& aggregate_pubkey, const CPubKey& script_pubkey, const CPubKey& part_pubkey, const uint256* leaf_hash, const std::vector<std::pair<uint256, bool>>& tweaks, SigVersion sigversion, const SignatureData& sigdata) const
132
0
{
133
0
    assert(sigversion == SigVersion::TAPROOT || sigversion == SigVersion::TAPSCRIPT);
134
135
    // Retrieve private key
136
0
    CKey key;
137
0
    if (!provider.GetKey(part_pubkey.GetID(), key)) return false;
138
139
    // Retrieve participant pubkeys
140
0
    auto it = sigdata.musig2_pubkeys.find(aggregate_pubkey);
141
0
    if (it == sigdata.musig2_pubkeys.end()) return false;
142
0
    const std::vector<CPubKey>& pubkeys = it->second;
143
0
    if (std::find(pubkeys.begin(), pubkeys.end(), part_pubkey) == pubkeys.end()) return {};
144
145
    // Retrieve pubnonces
146
0
    auto this_leaf_aggkey = std::make_pair(script_pubkey, leaf_hash ? *leaf_hash : uint256());
147
0
    auto pubnonce_it = sigdata.musig2_pubnonces.find(this_leaf_aggkey);
148
0
    if (pubnonce_it == sigdata.musig2_pubnonces.end()) return false;
149
0
    const std::map<CPubKey, std::vector<uint8_t>>& pubnonces = pubnonce_it->second;
150
151
    // Check if enough pubnonces
152
0
    if (pubnonces.size() != pubkeys.size()) return false;
153
154
    // Compute sighash
155
0
    std::optional<uint256> sighash = ComputeSchnorrSignatureHash(leaf_hash, sigversion);
156
0
    if (!sighash.has_value()) return false;
157
158
    // Retrieve the secnonce
159
0
    uint256 session_id = MuSig2SessionID(script_pubkey, part_pubkey, *sighash);
160
0
    std::optional<std::reference_wrapper<MuSig2SecNonce>> secnonce = provider.GetMuSig2SecNonce(session_id);
161
0
    if (!secnonce || !secnonce->get().IsValid()) return false;
162
163
    // Compute the sig
164
0
    std::optional<uint256> sig = key.CreateMuSig2PartialSig(*sighash, aggregate_pubkey, pubkeys, pubnonces, *secnonce, tweaks);
165
0
    if (!sig) return false;
166
0
    partial_sig = std::move(*sig);
167
168
    // Delete the secnonce now that we're done with it
169
0
    assert(!secnonce->get().IsValid());
170
0
    provider.DeleteMuSig2Session(session_id);
171
172
0
    return true;
173
0
}
174
175
bool MutableTransactionSignatureCreator::CreateMuSig2AggregateSig(const std::vector<CPubKey>& participants, std::vector<uint8_t>& sig, const CPubKey& aggregate_pubkey, const CPubKey& script_pubkey, const uint256* leaf_hash, const std::vector<std::pair<uint256, bool>>& tweaks, SigVersion sigversion, const SignatureData& sigdata) const
176
0
{
177
0
    assert(sigversion == SigVersion::TAPROOT || sigversion == SigVersion::TAPSCRIPT);
178
0
    if (!participants.size()) return false;
179
180
    // Retrieve pubnonces and partial sigs
181
0
    auto this_leaf_aggkey = std::make_pair(script_pubkey, leaf_hash ? *leaf_hash : uint256());
182
0
    auto pubnonce_it = sigdata.musig2_pubnonces.find(this_leaf_aggkey);
183
0
    if (pubnonce_it == sigdata.musig2_pubnonces.end()) return false;
184
0
    const std::map<CPubKey, std::vector<uint8_t>>& pubnonces = pubnonce_it->second;
185
0
    auto partial_sigs_it = sigdata.musig2_partial_sigs.find(this_leaf_aggkey);
186
0
    if (partial_sigs_it == sigdata.musig2_partial_sigs.end()) return false;
187
0
    const std::map<CPubKey, uint256>& partial_sigs = partial_sigs_it->second;
188
189
    // Check if enough pubnonces and partial sigs
190
0
    if (pubnonces.size() != participants.size()) return false;
191
0
    if (partial_sigs.size() != participants.size()) return false;
192
193
    // Compute sighash
194
0
    std::optional<uint256> sighash = ComputeSchnorrSignatureHash(leaf_hash, sigversion);
195
0
    if (!sighash.has_value()) return false;
196
197
0
    std::optional<std::vector<uint8_t>> res = ::CreateMuSig2AggregateSig(participants, aggregate_pubkey, tweaks, *sighash, pubnonces, partial_sigs);
198
0
    if (!res) return false;
199
0
    sig = res.value();
200
0
    if (nHashType) sig.push_back(nHashType);
201
202
0
    return true;
203
0
}
204
205
static bool GetCScript(const SigningProvider& provider, const SignatureData& sigdata, const CScriptID& scriptid, CScript& script)
206
0
{
207
0
    if (provider.GetCScript(scriptid, script)) {
208
0
        return true;
209
0
    }
210
    // Look for scripts in SignatureData
211
0
    if (CScriptID(sigdata.redeem_script) == scriptid) {
212
0
        script = sigdata.redeem_script;
213
0
        return true;
214
0
    } else if (CScriptID(sigdata.witness_script) == scriptid) {
215
0
        script = sigdata.witness_script;
216
0
        return true;
217
0
    }
218
0
    return false;
219
0
}
220
221
static bool GetPubKey(const SigningProvider& provider, const SignatureData& sigdata, const CKeyID& address, CPubKey& pubkey)
222
0
{
223
    // Look for pubkey in all partial sigs
224
0
    const auto it = sigdata.signatures.find(address);
225
0
    if (it != sigdata.signatures.end()) {
226
0
        pubkey = it->second.first;
227
0
        return true;
228
0
    }
229
    // Look for pubkey in pubkey lists
230
0
    const auto& pk_it = sigdata.misc_pubkeys.find(address);
231
0
    if (pk_it != sigdata.misc_pubkeys.end()) {
232
0
        pubkey = pk_it->second.first;
233
0
        return true;
234
0
    }
235
0
    const auto& tap_pk_it = sigdata.tap_pubkeys.find(address);
236
0
    if (tap_pk_it != sigdata.tap_pubkeys.end()) {
237
0
        pubkey = tap_pk_it->second.GetEvenCorrespondingCPubKey();
238
0
        return true;
239
0
    }
240
    // Query the underlying provider
241
0
    return provider.GetPubKey(address, pubkey);
242
0
}
243
244
static bool CreateSig(const BaseSignatureCreator& creator, SignatureData& sigdata, const SigningProvider& provider, std::vector<unsigned char>& sig_out, const CPubKey& pubkey, const CScript& scriptcode, SigVersion sigversion)
245
0
{
246
0
    CKeyID keyid = pubkey.GetID();
247
0
    const auto it = sigdata.signatures.find(keyid);
248
0
    if (it != sigdata.signatures.end()) {
249
0
        sig_out = it->second.second;
250
0
        return true;
251
0
    }
252
0
    KeyOriginInfo info;
253
0
    if (provider.GetKeyOrigin(keyid, info)) {
254
0
        sigdata.misc_pubkeys.emplace(keyid, std::make_pair(pubkey, std::move(info)));
255
0
    }
256
0
    if (creator.CreateSig(provider, sig_out, keyid, scriptcode, sigversion)) {
257
0
        auto i = sigdata.signatures.emplace(keyid, SigPair(pubkey, sig_out));
258
0
        assert(i.second);
259
0
        return true;
260
0
    }
261
    // Could not make signature or signature not found, add keyid to missing
262
0
    sigdata.missing_sigs.push_back(keyid);
263
0
    return false;
264
0
}
265
266
static bool SignMuSig2(const BaseSignatureCreator& creator, SignatureData& sigdata, const SigningProvider& provider, std::vector<unsigned char>& sig_out, const XOnlyPubKey& script_pubkey, const uint256* merkle_root, const uint256* leaf_hash, SigVersion sigversion)
267
0
{
268
0
    Assert(sigversion == SigVersion::TAPROOT || sigversion == SigVersion::TAPSCRIPT);
Line
Count
Source
113
0
#define Assert(val) inline_assertion_check<true>(val, std::source_location::current(), #val)
269
270
    // Lookup derivation paths for the script pubkey
271
0
    KeyOriginInfo agg_info;
272
0
    auto misc_pk_it = sigdata.taproot_misc_pubkeys.find(script_pubkey);
273
0
    if (misc_pk_it != sigdata.taproot_misc_pubkeys.end()) {
274
0
        agg_info = misc_pk_it->second.second;
275
0
    }
276
277
0
    for (const auto& [agg_pub, part_pks] : sigdata.musig2_pubkeys) {
278
0
        if (part_pks.empty()) continue;
279
280
        // Fill participant derivation path info
281
0
        for (const auto& part_pk : part_pks) {
282
0
            KeyOriginInfo part_info;
283
0
            if (provider.GetKeyOrigin(part_pk.GetID(), part_info)) {
284
0
                XOnlyPubKey xonly_part(part_pk);
285
0
                auto it = sigdata.taproot_misc_pubkeys.find(xonly_part);
286
0
                if (it == sigdata.taproot_misc_pubkeys.end()) {
287
0
                    it = sigdata.taproot_misc_pubkeys.emplace(xonly_part, std::make_pair(std::set<uint256>(), part_info)).first;
288
0
                }
289
0
                if (leaf_hash) it->second.first.insert(*leaf_hash);
290
0
            }
291
0
        }
292
293
        // The pubkey in the script may not be the actual aggregate of the participants, but derived from it.
294
        // Check the derivation, and compute the BIP 32 derivation tweaks
295
0
        std::vector<std::pair<uint256, bool>> tweaks;
296
0
        CPubKey plain_pub = agg_pub;
297
0
        if (XOnlyPubKey(agg_pub) != script_pubkey) {
298
0
            if (agg_info.path.empty()) continue;
299
            // Compute and compare fingerprint
300
0
            CKeyID keyid = agg_pub.GetID();
301
0
            if (!std::equal(agg_info.fingerprint, agg_info.fingerprint + sizeof(agg_info.fingerprint), keyid.data())) {
302
0
                continue;
303
0
            }
304
            // Get the BIP32 derivation tweaks
305
0
            CExtPubKey extpub = CreateMuSig2SyntheticXpub(agg_pub);
306
0
            for (const int i : agg_info.path) {
307
0
                auto& [t, xonly] = tweaks.emplace_back();
308
0
                xonly = false;
309
0
                if (!extpub.Derive(extpub, i, &t)) {
310
0
                    return false;
311
0
                }
312
0
            }
313
0
            Assert(XOnlyPubKey(extpub.pubkey) == script_pubkey);
Line
Count
Source
113
0
#define Assert(val) inline_assertion_check<true>(val, std::source_location::current(), #val)
314
0
            plain_pub = extpub.pubkey;
315
0
        }
316
317
        // Add the merkle root tweak
318
0
        if (sigversion == SigVersion::TAPROOT && merkle_root) {
319
0
            tweaks.emplace_back(script_pubkey.ComputeTapTweakHash(merkle_root->IsNull() ? nullptr : merkle_root), true);
320
0
            std::optional<std::pair<XOnlyPubKey, bool>> tweaked = script_pubkey.CreateTapTweak(merkle_root->IsNull() ? nullptr : merkle_root);
321
0
            if (!Assume(tweaked)) return false;
Line
Count
Source
125
0
#define Assume(val) inline_assertion_check<false>(val, std::source_location::current(), #val)
322
0
            plain_pub = tweaked->first.GetCPubKeys().at(tweaked->second ? 1 : 0);
323
0
        }
324
325
        // First try to aggregate
326
0
        if (creator.CreateMuSig2AggregateSig(part_pks, sig_out, agg_pub, plain_pub, leaf_hash, tweaks, sigversion, sigdata)) {
327
0
            if (sigversion == SigVersion::TAPROOT) {
328
0
                sigdata.taproot_key_path_sig = sig_out;
329
0
            } else {
330
0
                auto lookup_key = std::make_pair(script_pubkey, leaf_hash ? *leaf_hash : uint256());
331
0
                sigdata.taproot_script_sigs[lookup_key] = sig_out;
332
0
            }
333
0
            continue;
334
0
        }
335
        // Cannot aggregate, try making partial sigs for every participant
336
0
        auto pub_key_leaf_hash = std::make_pair(plain_pub, leaf_hash ? *leaf_hash : uint256());
337
0
        for (const CPubKey& part_pk : part_pks) {
338
0
            uint256 partial_sig;
339
0
            if (creator.CreateMuSig2PartialSig(provider, partial_sig, agg_pub, plain_pub, part_pk, leaf_hash, tweaks, sigversion, sigdata) && Assume(!partial_sig.IsNull())) {
Line
Count
Source
125
0
#define Assume(val) inline_assertion_check<false>(val, std::source_location::current(), #val)
340
0
                sigdata.musig2_partial_sigs[pub_key_leaf_hash].emplace(part_pk, partial_sig);
341
0
            }
342
0
        }
343
        // If there are any partial signatures, continue with next aggregate pubkey
344
0
        auto partial_sigs_it = sigdata.musig2_partial_sigs.find(pub_key_leaf_hash);
345
0
        if (partial_sigs_it != sigdata.musig2_partial_sigs.end() && !partial_sigs_it->second.empty()) {
346
0
            continue;
347
0
        }
348
        // No partial sigs, try to make pubnonces
349
0
        std::map<CPubKey, std::vector<uint8_t>>& pubnonces = sigdata.musig2_pubnonces[pub_key_leaf_hash];
350
0
        for (const CPubKey& part_pk : part_pks) {
351
0
            if (pubnonces.contains(part_pk)) continue;
352
0
            std::vector<uint8_t> pubnonce = creator.CreateMuSig2Nonce(provider, agg_pub, plain_pub, part_pk, leaf_hash, merkle_root, sigversion, sigdata);
353
0
            if (pubnonce.empty()) continue;
354
0
            pubnonces[part_pk] = std::move(pubnonce);
355
0
        }
356
0
    }
357
0
    return true;
358
0
}
359
360
static bool CreateTaprootScriptSig(const BaseSignatureCreator& creator, SignatureData& sigdata, const SigningProvider& provider, std::vector<unsigned char>& sig_out, const XOnlyPubKey& pubkey, const uint256& leaf_hash, SigVersion sigversion)
361
0
{
362
0
    KeyOriginInfo info;
363
0
    if (provider.GetKeyOriginByXOnly(pubkey, info)) {
364
0
        auto it = sigdata.taproot_misc_pubkeys.find(pubkey);
365
0
        if (it == sigdata.taproot_misc_pubkeys.end()) {
366
0
            sigdata.taproot_misc_pubkeys.emplace(pubkey, std::make_pair(std::set<uint256>({leaf_hash}), info));
367
0
        } else {
368
0
            it->second.first.insert(leaf_hash);
369
0
        }
370
0
    }
371
372
0
    auto lookup_key = std::make_pair(pubkey, leaf_hash);
373
0
    auto it = sigdata.taproot_script_sigs.find(lookup_key);
374
0
    if (it != sigdata.taproot_script_sigs.end()) {
375
0
        sig_out = it->second;
376
0
        return true;
377
0
    }
378
379
0
    if (creator.CreateSchnorrSig(provider, sig_out, pubkey, &leaf_hash, nullptr, sigversion)) {
380
0
        sigdata.taproot_script_sigs[lookup_key] = sig_out;
381
0
    } else if (!SignMuSig2(creator, sigdata, provider, sig_out, pubkey, /*merkle_root=*/nullptr, &leaf_hash, sigversion)) {
382
0
        return false;
383
0
    }
384
385
0
    return sigdata.taproot_script_sigs.contains(lookup_key);
386
0
}
387
388
template<typename M, typename K, typename V>
389
miniscript::Availability MsLookupHelper(const M& map, const K& key, V& value)
390
0
{
391
0
    auto it = map.find(key);
392
0
    if (it != map.end()) {
393
0
        value = it->second;
394
0
        return miniscript::Availability::YES;
395
0
    }
396
0
    return miniscript::Availability::NO;
397
0
}
398
399
/**
400
 * Context for solving a Miniscript.
401
 * If enough material (access to keys, hash preimages, ..) is given, produces a valid satisfaction.
402
 */
403
template<typename Pk>
404
struct Satisfier {
405
    using Key = Pk;
406
407
    const SigningProvider& m_provider;
408
    SignatureData& m_sig_data;
409
    const BaseSignatureCreator& m_creator;
410
    const CScript& m_witness_script;
411
    //! The context of the script we are satisfying (either P2WSH or Tapscript).
412
    const miniscript::MiniscriptContext m_script_ctx;
413
414
    explicit Satisfier(const SigningProvider& provider LIFETIMEBOUND, SignatureData& sig_data LIFETIMEBOUND,
415
                       const BaseSignatureCreator& creator LIFETIMEBOUND,
416
                       const CScript& witscript LIFETIMEBOUND,
417
0
                       miniscript::MiniscriptContext script_ctx) : m_provider(provider),
418
0
                                                                   m_sig_data(sig_data),
419
0
                                                                   m_creator(creator),
420
0
                                                                   m_witness_script(witscript),
421
0
                                                                   m_script_ctx(script_ctx) {}
Unexecuted instantiation: Satisfier<XOnlyPubKey>::Satisfier(SigningProvider const&, SignatureData&, BaseSignatureCreator const&, CScript const&, miniscript::MiniscriptContext)
Unexecuted instantiation: Satisfier<CPubKey>::Satisfier(SigningProvider const&, SignatureData&, BaseSignatureCreator const&, CScript const&, miniscript::MiniscriptContext)
422
423
0
    static bool KeyCompare(const Key& a, const Key& b) {
424
0
        return a < b;
425
0
    }
Unexecuted instantiation: Satisfier<XOnlyPubKey>::KeyCompare(XOnlyPubKey const&, XOnlyPubKey const&)
Unexecuted instantiation: Satisfier<CPubKey>::KeyCompare(CPubKey const&, CPubKey const&)
426
427
    //! Get a CPubKey from a key hash. Note the key hash may be of an xonly pubkey.
428
    template<typename I>
429
0
    std::optional<CPubKey> CPubFromPKHBytes(I first, I last) const {
430
0
        assert(last - first == 20);
431
0
        CPubKey pubkey;
432
0
        CKeyID key_id;
433
0
        std::copy(first, last, key_id.begin());
434
0
        if (GetPubKey(m_provider, m_sig_data, key_id, pubkey)) return pubkey;
435
0
        m_sig_data.missing_pubkeys.push_back(key_id);
436
0
        return {};
437
0
    }
Unexecuted instantiation: std::optional<CPubKey> Satisfier<XOnlyPubKey>::CPubFromPKHBytes<__gnu_cxx::__normal_iterator<unsigned char*, std::vector<unsigned char, std::allocator<unsigned char> > > >(__gnu_cxx::__normal_iterator<unsigned char*, std::vector<unsigned char, std::allocator<unsigned char> > >, __gnu_cxx::__normal_iterator<unsigned char*, std::vector<unsigned char, std::allocator<unsigned char> > >) const
Unexecuted instantiation: std::optional<CPubKey> Satisfier<CPubKey>::CPubFromPKHBytes<__gnu_cxx::__normal_iterator<unsigned char*, std::vector<unsigned char, std::allocator<unsigned char> > > >(__gnu_cxx::__normal_iterator<unsigned char*, std::vector<unsigned char, std::allocator<unsigned char> > >, __gnu_cxx::__normal_iterator<unsigned char*, std::vector<unsigned char, std::allocator<unsigned char> > >) const
438
439
    //! Conversion to raw public key.
440
0
    std::vector<unsigned char> ToPKBytes(const Key& key) const { return {key.begin(), key.end()}; }
Unexecuted instantiation: Satisfier<XOnlyPubKey>::ToPKBytes(XOnlyPubKey const&) const
Unexecuted instantiation: Satisfier<CPubKey>::ToPKBytes(CPubKey const&) const
441
442
    //! Time lock satisfactions.
443
0
    bool CheckAfter(uint32_t value) const { return m_creator.Checker().CheckLockTime(CScriptNum(value)); }
Unexecuted instantiation: Satisfier<XOnlyPubKey>::CheckAfter(unsigned int) const
Unexecuted instantiation: Satisfier<CPubKey>::CheckAfter(unsigned int) const
444
0
    bool CheckOlder(uint32_t value) const { return m_creator.Checker().CheckSequence(CScriptNum(value)); }
Unexecuted instantiation: Satisfier<XOnlyPubKey>::CheckOlder(unsigned int) const
Unexecuted instantiation: Satisfier<CPubKey>::CheckOlder(unsigned int) const
445
446
    //! Hash preimage satisfactions.
447
0
    miniscript::Availability SatSHA256(const std::vector<unsigned char>& hash, std::vector<unsigned char>& preimage) const {
448
0
        return MsLookupHelper(m_sig_data.sha256_preimages, hash, preimage);
449
0
    }
Unexecuted instantiation: Satisfier<XOnlyPubKey>::SatSHA256(std::vector<unsigned char, std::allocator<unsigned char> > const&, std::vector<unsigned char, std::allocator<unsigned char> >&) const
Unexecuted instantiation: Satisfier<CPubKey>::SatSHA256(std::vector<unsigned char, std::allocator<unsigned char> > const&, std::vector<unsigned char, std::allocator<unsigned char> >&) const
450
0
    miniscript::Availability SatRIPEMD160(const std::vector<unsigned char>& hash, std::vector<unsigned char>& preimage) const {
451
0
        return MsLookupHelper(m_sig_data.ripemd160_preimages, hash, preimage);
452
0
    }
Unexecuted instantiation: Satisfier<XOnlyPubKey>::SatRIPEMD160(std::vector<unsigned char, std::allocator<unsigned char> > const&, std::vector<unsigned char, std::allocator<unsigned char> >&) const
Unexecuted instantiation: Satisfier<CPubKey>::SatRIPEMD160(std::vector<unsigned char, std::allocator<unsigned char> > const&, std::vector<unsigned char, std::allocator<unsigned char> >&) const
453
0
    miniscript::Availability SatHASH256(const std::vector<unsigned char>& hash, std::vector<unsigned char>& preimage) const {
454
0
        return MsLookupHelper(m_sig_data.hash256_preimages, hash, preimage);
455
0
    }
Unexecuted instantiation: Satisfier<XOnlyPubKey>::SatHASH256(std::vector<unsigned char, std::allocator<unsigned char> > const&, std::vector<unsigned char, std::allocator<unsigned char> >&) const
Unexecuted instantiation: Satisfier<CPubKey>::SatHASH256(std::vector<unsigned char, std::allocator<unsigned char> > const&, std::vector<unsigned char, std::allocator<unsigned char> >&) const
456
0
    miniscript::Availability SatHASH160(const std::vector<unsigned char>& hash, std::vector<unsigned char>& preimage) const {
457
0
        return MsLookupHelper(m_sig_data.hash160_preimages, hash, preimage);
458
0
    }
Unexecuted instantiation: Satisfier<XOnlyPubKey>::SatHASH160(std::vector<unsigned char, std::allocator<unsigned char> > const&, std::vector<unsigned char, std::allocator<unsigned char> >&) const
Unexecuted instantiation: Satisfier<CPubKey>::SatHASH160(std::vector<unsigned char, std::allocator<unsigned char> > const&, std::vector<unsigned char, std::allocator<unsigned char> >&) const
459
460
0
    miniscript::MiniscriptContext MsContext() const {
461
0
        return m_script_ctx;
462
0
    }
Unexecuted instantiation: Satisfier<XOnlyPubKey>::MsContext() const
Unexecuted instantiation: Satisfier<CPubKey>::MsContext() const
463
};
464
465
/** Miniscript satisfier specific to P2WSH context. */
466
struct WshSatisfier: Satisfier<CPubKey> {
467
    explicit WshSatisfier(const SigningProvider& provider LIFETIMEBOUND, SignatureData& sig_data LIFETIMEBOUND,
468
                          const BaseSignatureCreator& creator LIFETIMEBOUND, const CScript& witscript LIFETIMEBOUND)
469
0
                          : Satisfier(provider, sig_data, creator, witscript, miniscript::MiniscriptContext::P2WSH) {}
470
471
    //! Conversion from a raw compressed public key.
472
    template <typename I>
473
0
    std::optional<CPubKey> FromPKBytes(I first, I last) const {
474
0
        CPubKey pubkey{first, last};
475
0
        if (pubkey.IsValid()) return pubkey;
476
0
        return {};
477
0
    }
478
479
    //! Conversion from a raw compressed public key hash.
480
    template<typename I>
481
0
    std::optional<CPubKey> FromPKHBytes(I first, I last) const {
482
0
        return Satisfier::CPubFromPKHBytes(first, last);
483
0
    }
484
485
    //! Satisfy an ECDSA signature check.
486
0
    miniscript::Availability Sign(const CPubKey& key, std::vector<unsigned char>& sig) const {
487
0
        if (CreateSig(m_creator, m_sig_data, m_provider, sig, key, m_witness_script, SigVersion::WITNESS_V0)) {
488
0
            return miniscript::Availability::YES;
489
0
        }
490
0
        return miniscript::Availability::NO;
491
0
    }
492
};
493
494
/** Miniscript satisfier specific to Tapscript context. */
495
struct TapSatisfier: Satisfier<XOnlyPubKey> {
496
    const uint256& m_leaf_hash;
497
498
    explicit TapSatisfier(const SigningProvider& provider LIFETIMEBOUND, SignatureData& sig_data LIFETIMEBOUND,
499
                          const BaseSignatureCreator& creator LIFETIMEBOUND, const CScript& script LIFETIMEBOUND,
500
                          const uint256& leaf_hash LIFETIMEBOUND)
501
0
                          : Satisfier(provider, sig_data, creator, script, miniscript::MiniscriptContext::TAPSCRIPT),
502
0
                            m_leaf_hash(leaf_hash) {}
503
504
    //! Conversion from a raw xonly public key.
505
    template <typename I>
506
0
    std::optional<XOnlyPubKey> FromPKBytes(I first, I last) const {
507
0
        if (last - first != 32) return {};
508
0
        XOnlyPubKey pubkey;
509
0
        std::copy(first, last, pubkey.begin());
510
0
        return pubkey;
511
0
    }
512
513
    //! Conversion from a raw xonly public key hash.
514
    template<typename I>
515
0
    std::optional<XOnlyPubKey> FromPKHBytes(I first, I last) const {
516
0
        if (auto pubkey = Satisfier::CPubFromPKHBytes(first, last)) return XOnlyPubKey{*pubkey};
517
0
        return {};
518
0
    }
519
520
    //! Satisfy a BIP340 signature check.
521
0
    miniscript::Availability Sign(const XOnlyPubKey& key, std::vector<unsigned char>& sig) const {
522
0
        if (CreateTaprootScriptSig(m_creator, m_sig_data, m_provider, sig, key, m_leaf_hash, SigVersion::TAPSCRIPT)) {
523
0
            return miniscript::Availability::YES;
524
0
        }
525
0
        return miniscript::Availability::NO;
526
0
    }
527
};
528
529
static bool SignTaprootScript(const SigningProvider& provider, const BaseSignatureCreator& creator, SignatureData& sigdata, int leaf_version, std::span<const unsigned char> script_bytes, std::vector<valtype>& result)
530
0
{
531
    // Only BIP342 tapscript signing is supported for now.
532
0
    if (leaf_version != TAPROOT_LEAF_TAPSCRIPT) return false;
533
534
0
    uint256 leaf_hash = ComputeTapleafHash(leaf_version, script_bytes);
535
0
    CScript script = CScript(script_bytes.begin(), script_bytes.end());
536
537
0
    TapSatisfier ms_satisfier{provider, sigdata, creator, script, leaf_hash};
538
0
    const auto ms = miniscript::FromScript(script, ms_satisfier);
539
0
    return ms && ms->Satisfy(ms_satisfier, result) == miniscript::Availability::YES;
540
0
}
541
542
static bool SignTaproot(const SigningProvider& provider, const BaseSignatureCreator& creator, const WitnessV1Taproot& output, SignatureData& sigdata, std::vector<valtype>& result)
543
0
{
544
0
    TaprootSpendData spenddata;
545
0
    TaprootBuilder builder;
546
547
    // Gather information about this output.
548
0
    if (provider.GetTaprootSpendData(output, spenddata)) {
549
0
        sigdata.tr_spenddata.Merge(spenddata);
550
0
    }
551
0
    if (provider.GetTaprootBuilder(output, builder)) {
552
0
        sigdata.tr_builder = builder;
553
0
    }
554
0
    if (auto agg_keys = provider.GetAllMuSig2ParticipantPubkeys(); !agg_keys.empty()) {
555
0
        sigdata.musig2_pubkeys.insert(agg_keys.begin(), agg_keys.end());
556
0
    }
557
558
559
    // Try key path spending.
560
0
    {
561
0
        KeyOriginInfo internal_key_info;
562
0
        if (provider.GetKeyOriginByXOnly(sigdata.tr_spenddata.internal_key, internal_key_info)) {
563
0
            auto it = sigdata.taproot_misc_pubkeys.find(sigdata.tr_spenddata.internal_key);
564
0
            if (it == sigdata.taproot_misc_pubkeys.end()) {
565
0
                sigdata.taproot_misc_pubkeys.emplace(sigdata.tr_spenddata.internal_key, std::make_pair(std::set<uint256>(), internal_key_info));
566
0
            }
567
0
        }
568
569
0
        KeyOriginInfo output_key_info;
570
0
        if (provider.GetKeyOriginByXOnly(output, output_key_info)) {
571
0
            auto it = sigdata.taproot_misc_pubkeys.find(output);
572
0
            if (it == sigdata.taproot_misc_pubkeys.end()) {
573
0
                sigdata.taproot_misc_pubkeys.emplace(output, std::make_pair(std::set<uint256>(), output_key_info));
574
0
            }
575
0
        }
576
577
0
        auto make_keypath_sig = [&](const XOnlyPubKey& pk, const uint256* merkle_root) {
578
0
            std::vector<unsigned char> sig;
579
0
            if (creator.CreateSchnorrSig(provider, sig, pk, nullptr, merkle_root, SigVersion::TAPROOT)) {
580
0
                sigdata.taproot_key_path_sig = sig;
581
0
            } else {
582
0
                SignMuSig2(creator, sigdata, provider, sig, pk, merkle_root, /*leaf_hash=*/nullptr, SigVersion::TAPROOT);
583
0
            }
584
0
        };
585
586
        // First try signing with internal key
587
0
        if (sigdata.taproot_key_path_sig.size() == 0) {
588
0
            make_keypath_sig(sigdata.tr_spenddata.internal_key, &sigdata.tr_spenddata.merkle_root);
589
0
        }
590
        // Try signing with output key if still no signature
591
0
        if (sigdata.taproot_key_path_sig.size() == 0) {
592
0
            make_keypath_sig(output, nullptr);
593
0
        }
594
0
        if (sigdata.taproot_key_path_sig.size()) {
595
0
            result = Vector(sigdata.taproot_key_path_sig);
596
0
            return true;
597
0
        }
598
0
    }
599
600
    // Try script path spending.
601
0
    std::vector<std::vector<unsigned char>> smallest_result_stack;
602
0
    for (const auto& [key, control_blocks] : sigdata.tr_spenddata.scripts) {
603
0
        const auto& [script, leaf_ver] = key;
604
0
        std::vector<std::vector<unsigned char>> result_stack;
605
0
        if (SignTaprootScript(provider, creator, sigdata, leaf_ver, script, result_stack)) {
606
0
            result_stack.emplace_back(std::begin(script), std::end(script)); // Push the script
607
0
            result_stack.push_back(*control_blocks.begin()); // Push the smallest control block
608
0
            if (smallest_result_stack.size() == 0 ||
609
0
                GetSerializeSize(result_stack) < GetSerializeSize(smallest_result_stack)) {
610
0
                smallest_result_stack = std::move(result_stack);
611
0
            }
612
0
        }
613
0
    }
614
0
    if (smallest_result_stack.size() != 0) {
615
0
        result = std::move(smallest_result_stack);
616
0
        return true;
617
0
    }
618
619
0
    return false;
620
0
}
621
622
/**
623
 * Sign scriptPubKey using signature made with creator.
624
 * Signatures are returned in scriptSigRet (or returns false if scriptPubKey can't be signed),
625
 * unless whichTypeRet is TxoutType::SCRIPTHASH, in which case scriptSigRet is the redemption script.
626
 * Returns false if scriptPubKey could not be completely satisfied.
627
 */
628
static bool SignStep(const SigningProvider& provider, const BaseSignatureCreator& creator, const CScript& scriptPubKey,
629
                     std::vector<valtype>& ret, TxoutType& whichTypeRet, SigVersion sigversion, SignatureData& sigdata)
630
0
{
631
0
    CScript scriptRet;
632
0
    ret.clear();
633
0
    std::vector<unsigned char> sig;
634
635
0
    std::vector<valtype> vSolutions;
636
0
    whichTypeRet = Solver(scriptPubKey, vSolutions);
637
638
0
    switch (whichTypeRet) {
639
0
    case TxoutType::NONSTANDARD:
640
0
    case TxoutType::NULL_DATA:
641
0
    case TxoutType::WITNESS_UNKNOWN:
642
0
        return false;
643
0
    case TxoutType::PUBKEY:
644
0
        if (!CreateSig(creator, sigdata, provider, sig, CPubKey(vSolutions[0]), scriptPubKey, sigversion)) return false;
645
0
        ret.push_back(std::move(sig));
646
0
        return true;
647
0
    case TxoutType::PUBKEYHASH: {
648
0
        CKeyID keyID = CKeyID(uint160(vSolutions[0]));
649
0
        CPubKey pubkey;
650
0
        if (!GetPubKey(provider, sigdata, keyID, pubkey)) {
651
            // Pubkey could not be found, add to missing
652
0
            sigdata.missing_pubkeys.push_back(keyID);
653
0
            return false;
654
0
        }
655
0
        if (!CreateSig(creator, sigdata, provider, sig, pubkey, scriptPubKey, sigversion)) return false;
656
0
        ret.push_back(std::move(sig));
657
0
        ret.push_back(ToByteVector(pubkey));
658
0
        return true;
659
0
    }
660
0
    case TxoutType::SCRIPTHASH: {
661
0
        uint160 h160{vSolutions[0]};
662
0
        if (GetCScript(provider, sigdata, CScriptID{h160}, scriptRet)) {
663
0
            ret.emplace_back(scriptRet.begin(), scriptRet.end());
664
0
            return true;
665
0
        }
666
        // Could not find redeemScript, add to missing
667
0
        sigdata.missing_redeem_script = h160;
668
0
        return false;
669
0
    }
670
0
    case TxoutType::MULTISIG: {
671
0
        size_t required = vSolutions.front()[0];
672
0
        ret.emplace_back(); // workaround CHECKMULTISIG bug
673
0
        for (size_t i = 1; i < vSolutions.size() - 1; ++i) {
674
0
            CPubKey pubkey = CPubKey(vSolutions[i]);
675
            // We need to always call CreateSig in order to fill sigdata with all
676
            // possible signatures that we can create. This will allow further PSBT
677
            // processing to work as it needs all possible signature and pubkey pairs
678
0
            if (CreateSig(creator, sigdata, provider, sig, pubkey, scriptPubKey, sigversion)) {
679
0
                if (ret.size() < required + 1) {
680
0
                    ret.push_back(std::move(sig));
681
0
                }
682
0
            }
683
0
        }
684
0
        bool ok = ret.size() == required + 1;
685
0
        for (size_t i = 0; i + ret.size() < required + 1; ++i) {
686
0
            ret.emplace_back();
687
0
        }
688
0
        return ok;
689
0
    }
690
0
    case TxoutType::WITNESS_V0_KEYHASH:
691
0
        ret.push_back(vSolutions[0]);
692
0
        return true;
693
694
0
    case TxoutType::WITNESS_V0_SCRIPTHASH:
695
0
        if (GetCScript(provider, sigdata, CScriptID{RIPEMD160(vSolutions[0])}, scriptRet)) {
696
0
            ret.emplace_back(scriptRet.begin(), scriptRet.end());
697
0
            return true;
698
0
        }
699
        // Could not find witnessScript, add to missing
700
0
        sigdata.missing_witness_script = uint256(vSolutions[0]);
701
0
        return false;
702
703
0
    case TxoutType::WITNESS_V1_TAPROOT:
704
0
        return SignTaproot(provider, creator, WitnessV1Taproot(XOnlyPubKey{vSolutions[0]}), sigdata, ret);
705
706
0
    case TxoutType::ANCHOR:
707
0
        return true;
708
0
    } // no default case, so the compiler can warn about missing cases
709
0
    assert(false);
710
0
}
711
712
static CScript PushAll(const std::vector<valtype>& values)
713
0
{
714
0
    CScript result;
715
0
    for (const valtype& v : values) {
716
0
        if (v.size() == 0) {
717
0
            result << OP_0;
718
0
        } else if (v.size() == 1 && v[0] >= 1 && v[0] <= 16) {
719
0
            result << CScript::EncodeOP_N(v[0]);
720
0
        } else if (v.size() == 1 && v[0] == 0x81) {
721
0
            result << OP_1NEGATE;
722
0
        } else {
723
0
            result << v;
724
0
        }
725
0
    }
726
0
    return result;
727
0
}
728
729
bool ProduceSignature(const SigningProvider& provider, const BaseSignatureCreator& creator, const CScript& fromPubKey, SignatureData& sigdata)
730
0
{
731
0
    if (sigdata.complete) return true;
732
733
0
    std::vector<valtype> result;
734
0
    TxoutType whichType;
735
0
    bool solved = SignStep(provider, creator, fromPubKey, result, whichType, SigVersion::BASE, sigdata);
736
0
    bool P2SH = false;
737
0
    CScript subscript;
738
739
0
    if (solved && whichType == TxoutType::SCRIPTHASH)
740
0
    {
741
        // Solver returns the subscript that needs to be evaluated;
742
        // the final scriptSig is the signatures from that
743
        // and then the serialized subscript:
744
0
        subscript = CScript(result[0].begin(), result[0].end());
745
0
        sigdata.redeem_script = subscript;
746
0
        solved = solved && SignStep(provider, creator, subscript, result, whichType, SigVersion::BASE, sigdata) && whichType != TxoutType::SCRIPTHASH;
747
0
        P2SH = true;
748
0
    }
749
750
0
    if (solved && whichType == TxoutType::WITNESS_V0_KEYHASH)
751
0
    {
752
0
        CScript witnessscript;
753
0
        witnessscript << OP_DUP << OP_HASH160 << ToByteVector(result[0]) << OP_EQUALVERIFY << OP_CHECKSIG;
754
0
        TxoutType subType;
755
0
        solved = solved && SignStep(provider, creator, witnessscript, result, subType, SigVersion::WITNESS_V0, sigdata);
756
0
        sigdata.scriptWitness.stack = result;
757
0
        sigdata.witness = true;
758
0
        result.clear();
759
0
    }
760
0
    else if (solved && whichType == TxoutType::WITNESS_V0_SCRIPTHASH)
761
0
    {
762
0
        CScript witnessscript(result[0].begin(), result[0].end());
763
0
        sigdata.witness_script = witnessscript;
764
765
0
        TxoutType subType{TxoutType::NONSTANDARD};
766
0
        solved = solved && SignStep(provider, creator, witnessscript, result, subType, SigVersion::WITNESS_V0, sigdata) && subType != TxoutType::SCRIPTHASH && subType != TxoutType::WITNESS_V0_SCRIPTHASH && subType != TxoutType::WITNESS_V0_KEYHASH;
767
768
        // If we couldn't find a solution with the legacy satisfier, try satisfying the script using Miniscript.
769
        // Note we need to check if the result stack is empty before, because it might be used even if the Script
770
        // isn't fully solved. For instance the CHECKMULTISIG satisfaction in SignStep() pushes partial signatures
771
        // and the extractor relies on this behaviour to combine witnesses.
772
0
        if (!solved && result.empty()) {
773
0
            WshSatisfier ms_satisfier{provider, sigdata, creator, witnessscript};
774
0
            const auto ms = miniscript::FromScript(witnessscript, ms_satisfier);
775
0
            solved = ms && ms->Satisfy(ms_satisfier, result) == miniscript::Availability::YES;
776
0
        }
777
0
        result.emplace_back(witnessscript.begin(), witnessscript.end());
778
779
0
        sigdata.scriptWitness.stack = result;
780
0
        sigdata.witness = true;
781
0
        result.clear();
782
0
    } else if (whichType == TxoutType::WITNESS_V1_TAPROOT && !P2SH) {
783
0
        sigdata.witness = true;
784
0
        if (solved) {
785
0
            sigdata.scriptWitness.stack = std::move(result);
786
0
        }
787
0
        result.clear();
788
0
    } else if (solved && whichType == TxoutType::WITNESS_UNKNOWN) {
789
0
        sigdata.witness = true;
790
0
    }
791
792
0
    if (!sigdata.witness) sigdata.scriptWitness.stack.clear();
793
0
    if (P2SH) {
794
0
        result.emplace_back(subscript.begin(), subscript.end());
795
0
    }
796
0
    sigdata.scriptSig = PushAll(result);
797
798
    // Test solution
799
0
    sigdata.complete = solved && VerifyScript(sigdata.scriptSig, fromPubKey, &sigdata.scriptWitness, STANDARD_SCRIPT_VERIFY_FLAGS, creator.Checker());
800
0
    return sigdata.complete;
801
0
}
802
803
namespace {
804
class SignatureExtractorChecker final : public DeferringSignatureChecker
805
{
806
private:
807
    SignatureData& sigdata;
808
809
public:
810
0
    SignatureExtractorChecker(SignatureData& sigdata, BaseSignatureChecker& checker) : DeferringSignatureChecker(checker), sigdata(sigdata) {}
811
812
    bool CheckECDSASignature(const std::vector<unsigned char>& scriptSig, const std::vector<unsigned char>& vchPubKey, const CScript& scriptCode, SigVersion sigversion) const override
813
0
    {
814
0
        if (m_checker.CheckECDSASignature(scriptSig, vchPubKey, scriptCode, sigversion)) {
815
0
            CPubKey pubkey(vchPubKey);
816
0
            sigdata.signatures.emplace(pubkey.GetID(), SigPair(pubkey, scriptSig));
817
0
            return true;
818
0
        }
819
0
        return false;
820
0
    }
821
};
822
823
struct Stacks
824
{
825
    std::vector<valtype> script;
826
    std::vector<valtype> witness;
827
828
    Stacks() = delete;
829
    Stacks(const Stacks&) = delete;
830
0
    explicit Stacks(const SignatureData& data) : witness(data.scriptWitness.stack) {
831
0
        EvalScript(script, data.scriptSig, SCRIPT_VERIFY_STRICTENC, BaseSignatureChecker(), SigVersion::BASE);
832
0
    }
833
};
834
}
835
836
// Extracts signatures and scripts from incomplete scriptSigs. Please do not extend this, use PSBT instead
837
SignatureData DataFromTransaction(const CMutableTransaction& tx, unsigned int nIn, const CTxOut& txout)
838
0
{
839
0
    SignatureData data;
840
0
    assert(tx.vin.size() > nIn);
841
0
    data.scriptSig = tx.vin[nIn].scriptSig;
842
0
    data.scriptWitness = tx.vin[nIn].scriptWitness;
843
0
    Stacks stack(data);
844
845
    // Get signatures
846
0
    MutableTransactionSignatureChecker tx_checker(&tx, nIn, txout.nValue, MissingDataBehavior::FAIL);
847
0
    SignatureExtractorChecker extractor_checker(data, tx_checker);
848
0
    if (VerifyScript(data.scriptSig, txout.scriptPubKey, &data.scriptWitness, STANDARD_SCRIPT_VERIFY_FLAGS, extractor_checker)) {
849
0
        data.complete = true;
850
0
        return data;
851
0
    }
852
853
    // Get scripts
854
0
    std::vector<std::vector<unsigned char>> solutions;
855
0
    TxoutType script_type = Solver(txout.scriptPubKey, solutions);
856
0
    SigVersion sigversion = SigVersion::BASE;
857
0
    CScript next_script = txout.scriptPubKey;
858
859
0
    if (script_type == TxoutType::SCRIPTHASH && !stack.script.empty() && !stack.script.back().empty()) {
860
        // Get the redeemScript
861
0
        CScript redeem_script(stack.script.back().begin(), stack.script.back().end());
862
0
        data.redeem_script = redeem_script;
863
0
        next_script = std::move(redeem_script);
864
865
        // Get redeemScript type
866
0
        script_type = Solver(next_script, solutions);
867
0
        stack.script.pop_back();
868
0
    }
869
0
    if (script_type == TxoutType::WITNESS_V0_SCRIPTHASH && !stack.witness.empty() && !stack.witness.back().empty()) {
870
        // Get the witnessScript
871
0
        CScript witness_script(stack.witness.back().begin(), stack.witness.back().end());
872
0
        data.witness_script = witness_script;
873
0
        next_script = std::move(witness_script);
874
875
        // Get witnessScript type
876
0
        script_type = Solver(next_script, solutions);
877
0
        stack.witness.pop_back();
878
0
        stack.script = std::move(stack.witness);
879
0
        stack.witness.clear();
880
0
        sigversion = SigVersion::WITNESS_V0;
881
0
    }
882
0
    if (script_type == TxoutType::MULTISIG && !stack.script.empty()) {
883
        // Build a map of pubkey -> signature by matching sigs to pubkeys:
884
0
        assert(solutions.size() > 1);
885
0
        unsigned int num_pubkeys = solutions.size()-2;
886
0
        unsigned int last_success_key = 0;
887
0
        for (const valtype& sig : stack.script) {
888
0
            for (unsigned int i = last_success_key; i < num_pubkeys; ++i) {
889
0
                const valtype& pubkey = solutions[i+1];
890
                // We either have a signature for this pubkey, or we have found a signature and it is valid
891
0
                if (data.signatures.contains(CPubKey(pubkey).GetID()) || extractor_checker.CheckECDSASignature(sig, pubkey, next_script, sigversion)) {
892
0
                    last_success_key = i + 1;
893
0
                    break;
894
0
                }
895
0
            }
896
0
        }
897
0
    }
898
899
0
    return data;
900
0
}
901
902
void UpdateInput(CTxIn& input, const SignatureData& data)
903
0
{
904
0
    input.scriptSig = data.scriptSig;
905
0
    input.scriptWitness = data.scriptWitness;
906
0
}
907
908
void SignatureData::MergeSignatureData(SignatureData sigdata)
909
0
{
910
0
    if (complete) return;
911
0
    if (sigdata.complete) {
912
0
        *this = std::move(sigdata);
913
0
        return;
914
0
    }
915
0
    if (redeem_script.empty() && !sigdata.redeem_script.empty()) {
916
0
        redeem_script = sigdata.redeem_script;
917
0
    }
918
0
    if (witness_script.empty() && !sigdata.witness_script.empty()) {
919
0
        witness_script = sigdata.witness_script;
920
0
    }
921
0
    signatures.insert(std::make_move_iterator(sigdata.signatures.begin()), std::make_move_iterator(sigdata.signatures.end()));
922
0
}
923
924
namespace {
925
/** Dummy signature checker which accepts all signatures. */
926
class DummySignatureChecker final : public BaseSignatureChecker
927
{
928
public:
929
0
    DummySignatureChecker() = default;
930
0
    bool CheckECDSASignature(const std::vector<unsigned char>& sig, const std::vector<unsigned char>& vchPubKey, const CScript& scriptCode, SigVersion sigversion) const override { return sig.size() != 0; }
931
0
    bool CheckSchnorrSignature(std::span<const unsigned char> sig, std::span<const unsigned char> pubkey, SigVersion sigversion, ScriptExecutionData& execdata, ScriptError* serror) const override { return sig.size() != 0; }
932
0
    bool CheckLockTime(const CScriptNum& nLockTime) const override { return true; }
933
0
    bool CheckSequence(const CScriptNum& nSequence) const override { return true; }
934
};
935
}
936
937
const BaseSignatureChecker& DUMMY_CHECKER = DummySignatureChecker();
938
939
namespace {
940
class DummySignatureCreator final : public BaseSignatureCreator {
941
private:
942
    char m_r_len = 32;
943
    char m_s_len = 32;
944
public:
945
0
    DummySignatureCreator(char r_len, char s_len) : m_r_len(r_len), m_s_len(s_len) {}
946
0
    const BaseSignatureChecker& Checker() const override { return DUMMY_CHECKER; }
947
    bool CreateSig(const SigningProvider& provider, std::vector<unsigned char>& vchSig, const CKeyID& keyid, const CScript& scriptCode, SigVersion sigversion) const override
948
0
    {
949
        // Create a dummy signature that is a valid DER-encoding
950
0
        vchSig.assign(m_r_len + m_s_len + 7, '\000');
951
0
        vchSig[0] = 0x30;
952
0
        vchSig[1] = m_r_len + m_s_len + 4;
953
0
        vchSig[2] = 0x02;
954
0
        vchSig[3] = m_r_len;
955
0
        vchSig[4] = 0x01;
956
0
        vchSig[4 + m_r_len] = 0x02;
957
0
        vchSig[5 + m_r_len] = m_s_len;
958
0
        vchSig[6 + m_r_len] = 0x01;
959
0
        vchSig[6 + m_r_len + m_s_len] = SIGHASH_ALL;
960
0
        return true;
961
0
    }
962
    bool CreateSchnorrSig(const SigningProvider& provider, std::vector<unsigned char>& sig, const XOnlyPubKey& pubkey, const uint256* leaf_hash, const uint256* tweak, SigVersion sigversion) const override
963
0
    {
964
0
        sig.assign(64, '\000');
965
0
        return true;
966
0
    }
967
    std::vector<uint8_t> CreateMuSig2Nonce(const SigningProvider& provider, const CPubKey& aggregate_pubkey, const CPubKey& script_pubkey, const CPubKey& part_pubkey, const uint256* leaf_hash, const uint256* merkle_root, SigVersion sigversion, const SignatureData& sigdata) const override
968
0
    {
969
0
        std::vector<uint8_t> out;
970
0
        out.assign(MUSIG2_PUBNONCE_SIZE, '\000');
971
0
        return out;
972
0
    }
973
    bool CreateMuSig2PartialSig(const SigningProvider& provider, uint256& partial_sig, const CPubKey& aggregate_pubkey, const CPubKey& script_pubkey, const CPubKey& part_pubkey, const uint256* leaf_hash, const std::vector<std::pair<uint256, bool>>& tweaks, SigVersion sigversion, const SignatureData& sigdata) const override
974
0
    {
975
0
        partial_sig = uint256::ONE;
976
0
        return true;
977
0
    }
978
    bool CreateMuSig2AggregateSig(const std::vector<CPubKey>& participants, std::vector<uint8_t>& sig, const CPubKey& aggregate_pubkey, const CPubKey& script_pubkey, const uint256* leaf_hash, const std::vector<std::pair<uint256, bool>>& tweaks, SigVersion sigversion, const SignatureData& sigdata) const override
979
0
    {
980
0
        sig.assign(64, '\000');
981
0
        return true;
982
0
    }
983
};
984
985
}
986
987
const BaseSignatureCreator& DUMMY_SIGNATURE_CREATOR = DummySignatureCreator(32, 32);
988
const BaseSignatureCreator& DUMMY_MAXIMUM_SIGNATURE_CREATOR = DummySignatureCreator(33, 32);
989
990
bool IsSegWitOutput(const SigningProvider& provider, const CScript& script)
991
0
{
992
0
    int version;
993
0
    valtype program;
994
0
    if (script.IsWitnessProgram(version, program)) return true;
995
0
    if (script.IsPayToScriptHash()) {
996
0
        std::vector<valtype> solutions;
997
0
        auto whichtype = Solver(script, solutions);
998
0
        if (whichtype == TxoutType::SCRIPTHASH) {
999
0
            auto h160 = uint160(solutions[0]);
1000
0
            CScript subscript;
1001
0
            if (provider.GetCScript(CScriptID{h160}, subscript)) {
1002
0
                if (subscript.IsWitnessProgram(version, program)) return true;
1003
0
            }
1004
0
        }
1005
0
    }
1006
0
    return false;
1007
0
}
1008
1009
bool SignTransaction(CMutableTransaction& mtx, const SigningProvider* keystore, const std::map<COutPoint, Coin>& coins, int nHashType, std::map<int, bilingual_str>& input_errors)
1010
0
{
1011
0
    bool fHashSingle = ((nHashType & ~SIGHASH_ANYONECANPAY) == SIGHASH_SINGLE);
1012
1013
    // Use CTransaction for the constant parts of the
1014
    // transaction to avoid rehashing.
1015
0
    const CTransaction txConst(mtx);
1016
1017
0
    PrecomputedTransactionData txdata;
1018
0
    std::vector<CTxOut> spent_outputs;
1019
0
    for (unsigned int i = 0; i < mtx.vin.size(); ++i) {
1020
0
        CTxIn& txin = mtx.vin[i];
1021
0
        auto coin = coins.find(txin.prevout);
1022
0
        if (coin == coins.end() || coin->second.IsSpent()) {
1023
0
            txdata.Init(txConst, /*spent_outputs=*/{}, /*force=*/true);
1024
0
            break;
1025
0
        } else {
1026
0
            spent_outputs.emplace_back(coin->second.out.nValue, coin->second.out.scriptPubKey);
1027
0
        }
1028
0
    }
1029
0
    if (spent_outputs.size() == mtx.vin.size()) {
1030
0
        txdata.Init(txConst, std::move(spent_outputs), true);
1031
0
    }
1032
1033
    // Sign what we can:
1034
0
    for (unsigned int i = 0; i < mtx.vin.size(); ++i) {
1035
0
        CTxIn& txin = mtx.vin[i];
1036
0
        auto coin = coins.find(txin.prevout);
1037
0
        if (coin == coins.end() || coin->second.IsSpent()) {
1038
0
            input_errors[i] = _("Input not found or already spent");
1039
0
            continue;
1040
0
        }
1041
0
        const CScript& prevPubKey = coin->second.out.scriptPubKey;
1042
0
        const CAmount& amount = coin->second.out.nValue;
1043
1044
0
        SignatureData sigdata = DataFromTransaction(mtx, i, coin->second.out);
1045
        // Only sign SIGHASH_SINGLE if there's a corresponding output:
1046
0
        if (!fHashSingle || (i < mtx.vout.size())) {
1047
0
            ProduceSignature(*keystore, MutableTransactionSignatureCreator(mtx, i, amount, &txdata, nHashType), prevPubKey, sigdata);
1048
0
        }
1049
1050
0
        UpdateInput(txin, sigdata);
1051
1052
        // amount must be specified for valid segwit signature
1053
0
        if (amount == MAX_MONEY && !txin.scriptWitness.IsNull()) {
1054
0
            input_errors[i] = _("Missing amount");
1055
0
            continue;
1056
0
        }
1057
1058
0
        ScriptError serror = SCRIPT_ERR_OK;
1059
0
        if (!sigdata.complete && !VerifyScript(txin.scriptSig, prevPubKey, &txin.scriptWitness, STANDARD_SCRIPT_VERIFY_FLAGS, TransactionSignatureChecker(&txConst, i, amount, txdata, MissingDataBehavior::FAIL), &serror)) {
1060
0
            if (serror == SCRIPT_ERR_INVALID_STACK_OPERATION) {
1061
                // Unable to sign input and verification failed (possible attempt to partially sign).
1062
0
                input_errors[i] = Untranslated("Unable to sign input, invalid stack size (possibly missing key)");
1063
0
            } else if (serror == SCRIPT_ERR_SIG_NULLFAIL) {
1064
                // Verification failed (possibly due to insufficient signatures).
1065
0
                input_errors[i] = Untranslated("CHECK(MULTI)SIG failing with non-zero signature (possibly need more signatures)");
1066
0
            } else {
1067
0
                input_errors[i] = Untranslated(ScriptErrorString(serror));
1068
0
            }
1069
0
        } else {
1070
            // If this input succeeds, make sure there is no error set for it
1071
0
            input_errors.erase(i);
1072
0
        }
1073
0
    }
1074
0
    return input_errors.empty();
1075
0
}