2019-01-16 17:47:43 +03:00
|
|
|
package input
|
2017-05-07 14:04:28 +03:00
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/binary"
|
2017-08-01 04:42:32 +03:00
|
|
|
"errors"
|
2017-05-07 14:04:28 +03:00
|
|
|
"io"
|
|
|
|
|
2018-06-05 04:34:16 +03:00
|
|
|
"github.com/btcsuite/btcd/btcec"
|
|
|
|
"github.com/btcsuite/btcd/txscript"
|
|
|
|
"github.com/btcsuite/btcd/wire"
|
2018-07-31 10:17:17 +03:00
|
|
|
"github.com/lightningnetwork/lnd/keychain"
|
2017-05-07 14:04:28 +03:00
|
|
|
)
|
|
|
|
|
2017-08-01 04:42:32 +03:00
|
|
|
var (
|
|
|
|
// ErrTweakOverdose signals a SignDescriptor is invalid because both of its
|
|
|
|
// SingleTweak and DoubleTweak are non-nil.
|
|
|
|
ErrTweakOverdose = errors.New("sign descriptor should only have one tweak")
|
|
|
|
)
|
|
|
|
|
2020-01-06 13:42:04 +03:00
|
|
|
// SignDescriptor houses the necessary information required to successfully
|
|
|
|
// sign a given segwit output. This struct is used by the Signer interface in
|
|
|
|
// order to gain access to critical data needed to generate a valid signature.
|
2017-05-07 14:04:28 +03:00
|
|
|
type SignDescriptor struct {
|
2018-02-18 02:08:21 +03:00
|
|
|
// KeyDesc is a descriptor that precisely describes *which* key to use
|
|
|
|
// for signing. This may provide the raw public key directly, or
|
|
|
|
// require the Signer to re-derive the key according to the populated
|
|
|
|
// derivation path.
|
|
|
|
KeyDesc keychain.KeyDescriptor
|
2017-05-07 14:04:28 +03:00
|
|
|
|
2017-08-01 04:42:32 +03:00
|
|
|
// SingleTweak is a scalar value that will be added to the private key
|
|
|
|
// corresponding to the above public key to obtain the private key to
|
|
|
|
// be used to sign this input. This value is typically derived via the
|
|
|
|
// following computation:
|
|
|
|
//
|
|
|
|
// * derivedKey = privkey + sha256(perCommitmentPoint || pubKey) mod N
|
|
|
|
//
|
|
|
|
// NOTE: If this value is nil, then the input can be signed using only
|
|
|
|
// the above public key. Either a SingleTweak should be set or a
|
|
|
|
// DoubleTweak, not both.
|
|
|
|
SingleTweak []byte
|
|
|
|
|
|
|
|
// DoubleTweak is a private key that will be used in combination with
|
|
|
|
// its corresponding private key to derive the private key that is to
|
|
|
|
// be used to sign the target input. Within the Lightning protocol,
|
|
|
|
// this value is typically the commitment secret from a previously
|
|
|
|
// revoked commitment transaction. This value is in combination with
|
|
|
|
// two hash values, and the original private key to derive the private
|
|
|
|
// key to be used when signing.
|
|
|
|
//
|
|
|
|
// * k = (privKey*sha256(pubKey || tweakPub) +
|
|
|
|
// tweakPriv*sha256(tweakPub || pubKey)) mod N
|
2017-05-07 14:04:28 +03:00
|
|
|
//
|
|
|
|
// NOTE: If this value is nil, then the input can be signed using only
|
2017-08-01 04:42:32 +03:00
|
|
|
// the above public key. Either a SingleTweak should be set or a
|
|
|
|
// DoubleTweak, not both.
|
|
|
|
DoubleTweak *btcec.PrivateKey
|
2017-05-07 14:04:28 +03:00
|
|
|
|
|
|
|
// WitnessScript is the full script required to properly redeem the
|
2020-01-06 13:42:04 +03:00
|
|
|
// output. This field should be set to the full script if a p2wsh
|
|
|
|
// output is being signed. For p2wkh it should be set to the hashed
|
|
|
|
// script (PkScript).
|
2017-05-07 14:04:28 +03:00
|
|
|
WitnessScript []byte
|
|
|
|
|
|
|
|
// Output is the target output which should be signed. The PkScript and
|
|
|
|
// Value fields within the output should be properly populated,
|
|
|
|
// otherwise an invalid signature may be generated.
|
|
|
|
Output *wire.TxOut
|
|
|
|
|
|
|
|
// HashType is the target sighash type that should be used when
|
|
|
|
// generating the final sighash, and signature.
|
|
|
|
HashType txscript.SigHashType
|
|
|
|
|
|
|
|
// SigHashes is the pre-computed sighash midstate to be used when
|
|
|
|
// generating the final sighash for signing.
|
|
|
|
SigHashes *txscript.TxSigHashes
|
|
|
|
|
|
|
|
// InputIndex is the target input within the transaction that should be
|
|
|
|
// signed.
|
|
|
|
InputIndex int
|
|
|
|
}
|
|
|
|
|
|
|
|
// WriteSignDescriptor serializes a SignDescriptor struct into the passed
|
|
|
|
// io.Writer stream.
|
2018-01-17 04:59:43 +03:00
|
|
|
//
|
2017-05-07 14:04:28 +03:00
|
|
|
// NOTE: We assume the SigHashes and InputIndex fields haven't been assigned
|
|
|
|
// yet, since that is usually done just before broadcast by the witness
|
|
|
|
// generator.
|
|
|
|
func WriteSignDescriptor(w io.Writer, sd *SignDescriptor) error {
|
2018-02-18 02:08:21 +03:00
|
|
|
err := binary.Write(w, binary.BigEndian, sd.KeyDesc.Family)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
err = binary.Write(w, binary.BigEndian, sd.KeyDesc.Index)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = binary.Write(w, binary.BigEndian, sd.KeyDesc.PubKey != nil)
|
|
|
|
if err != nil {
|
2017-05-07 14:04:28 +03:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-02-18 02:08:21 +03:00
|
|
|
if sd.KeyDesc.PubKey != nil {
|
|
|
|
serializedPubKey := sd.KeyDesc.PubKey.SerializeCompressed()
|
|
|
|
if err := wire.WriteVarBytes(w, 0, serializedPubKey); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-08-01 04:42:32 +03:00
|
|
|
if err := wire.WriteVarBytes(w, 0, sd.SingleTweak); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
var doubleTweakBytes []byte
|
|
|
|
if sd.DoubleTweak != nil {
|
|
|
|
doubleTweakBytes = sd.DoubleTweak.Serialize()
|
|
|
|
}
|
|
|
|
if err := wire.WriteVarBytes(w, 0, doubleTweakBytes); err != nil {
|
2017-05-07 14:04:28 +03:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := wire.WriteVarBytes(w, 0, sd.WitnessScript); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-08-26 04:12:34 +03:00
|
|
|
if err := writeTxOut(w, sd.Output); err != nil {
|
2017-05-07 14:04:28 +03:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
var scratch [4]byte
|
|
|
|
binary.BigEndian.PutUint32(scratch[:], uint32(sd.HashType))
|
|
|
|
if _, err := w.Write(scratch[:]); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ReadSignDescriptor deserializes a SignDescriptor struct from the passed
|
|
|
|
// io.Reader stream.
|
|
|
|
func ReadSignDescriptor(r io.Reader, sd *SignDescriptor) error {
|
2018-02-18 02:08:21 +03:00
|
|
|
err := binary.Read(r, binary.BigEndian, &sd.KeyDesc.Family)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
err = binary.Read(r, binary.BigEndian, &sd.KeyDesc.Index)
|
2017-05-07 14:04:28 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2018-02-18 02:08:21 +03:00
|
|
|
|
|
|
|
var hasKey bool
|
|
|
|
err = binary.Read(r, binary.BigEndian, &hasKey)
|
2017-05-07 14:04:28 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-02-18 02:08:21 +03:00
|
|
|
if hasKey {
|
|
|
|
pubKeyBytes, err := wire.ReadVarBytes(r, 0, 34, "pubkey")
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
sd.KeyDesc.PubKey, err = btcec.ParsePubKey(
|
|
|
|
pubKeyBytes, btcec.S256(),
|
|
|
|
)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-08-01 04:42:32 +03:00
|
|
|
singleTweak, err := wire.ReadVarBytes(r, 0, 32, "singleTweak")
|
2017-05-07 14:04:28 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-01-17 04:59:43 +03:00
|
|
|
// Serializing a SignDescriptor with a nil-valued SingleTweak results
|
|
|
|
// in deserializing a zero-length slice. Since a nil-valued SingleTweak
|
|
|
|
// has special meaning and a zero-length slice for a SingleTweak is
|
|
|
|
// invalid, we can use the zero-length slice as the flag for a
|
|
|
|
// nil-valued SingleTweak.
|
2017-08-01 04:42:32 +03:00
|
|
|
if len(singleTweak) == 0 {
|
|
|
|
sd.SingleTweak = nil
|
2017-05-07 14:04:28 +03:00
|
|
|
} else {
|
2017-08-01 04:42:32 +03:00
|
|
|
sd.SingleTweak = singleTweak
|
|
|
|
}
|
|
|
|
|
|
|
|
doubleTweakBytes, err := wire.ReadVarBytes(r, 0, 32, "doubleTweak")
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-01-17 04:59:43 +03:00
|
|
|
// Serializing a SignDescriptor with a nil-valued DoubleTweak results
|
|
|
|
// in deserializing a zero-length slice. Since a nil-valued DoubleTweak
|
|
|
|
// has special meaning and a zero-length slice for a DoubleTweak is
|
|
|
|
// invalid, we can use the zero-length slice as the flag for a
|
|
|
|
// nil-valued DoubleTweak.
|
2017-08-01 04:42:32 +03:00
|
|
|
if len(doubleTweakBytes) == 0 {
|
|
|
|
sd.DoubleTweak = nil
|
|
|
|
} else {
|
|
|
|
sd.DoubleTweak, _ = btcec.PrivKeyFromBytes(btcec.S256(), doubleTweakBytes)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Only one tweak should ever be set, fail if both are present.
|
|
|
|
if sd.SingleTweak != nil && sd.DoubleTweak != nil {
|
|
|
|
return ErrTweakOverdose
|
2017-05-07 14:04:28 +03:00
|
|
|
}
|
|
|
|
|
2017-09-06 23:51:27 +03:00
|
|
|
witnessScript, err := wire.ReadVarBytes(r, 0, 500, "witnessScript")
|
2017-05-07 14:04:28 +03:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
sd.WitnessScript = witnessScript
|
|
|
|
|
|
|
|
txOut := &wire.TxOut{}
|
2017-08-26 04:12:34 +03:00
|
|
|
if err := readTxOut(r, txOut); err != nil {
|
2017-05-07 14:04:28 +03:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
sd.Output = txOut
|
|
|
|
|
|
|
|
var hashType [4]byte
|
|
|
|
if _, err := io.ReadFull(r, hashType[:]); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
sd.HashType = txscript.SigHashType(binary.BigEndian.Uint32(hashType[:]))
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|