LCOV - code coverage report
Current view: top level - src - psbt.h (source / functions) Hit Total Coverage
Test: fuzz_coverage.info Lines: 0 607 0.0 %
Date: 2023-09-26 12:08:55 Functions: 0 54 0.0 %

          Line data    Source code
       1             : // Copyright (c) 2009-2022 The Bitcoin Core developers
       2             : // Distributed under the MIT software license, see the accompanying
       3             : // file COPYING or http://www.opensource.org/licenses/mit-license.php.
       4             : 
       5             : #ifndef BITCOIN_PSBT_H
       6             : #define BITCOIN_PSBT_H
       7             : 
       8             : #include <node/transaction.h>
       9             : #include <policy/feerate.h>
      10             : #include <primitives/transaction.h>
      11             : #include <pubkey.h>
      12             : #include <script/keyorigin.h>
      13             : #include <script/sign.h>
      14             : #include <script/signingprovider.h>
      15             : #include <span.h>
      16             : #include <streams.h>
      17             : 
      18             : #include <optional>
      19             : 
      20             : // Magic bytes
      21             : static constexpr uint8_t PSBT_MAGIC_BYTES[5] = {'p', 's', 'b', 't', 0xff};
      22             : 
      23             : // Global types
      24             : static constexpr uint8_t PSBT_GLOBAL_UNSIGNED_TX = 0x00;
      25             : static constexpr uint8_t PSBT_GLOBAL_XPUB = 0x01;
      26             : static constexpr uint8_t PSBT_GLOBAL_VERSION = 0xFB;
      27             : static constexpr uint8_t PSBT_GLOBAL_PROPRIETARY = 0xFC;
      28             : 
      29             : // Input types
      30             : static constexpr uint8_t PSBT_IN_NON_WITNESS_UTXO = 0x00;
      31             : static constexpr uint8_t PSBT_IN_WITNESS_UTXO = 0x01;
      32             : static constexpr uint8_t PSBT_IN_PARTIAL_SIG = 0x02;
      33             : static constexpr uint8_t PSBT_IN_SIGHASH = 0x03;
      34             : static constexpr uint8_t PSBT_IN_REDEEMSCRIPT = 0x04;
      35             : static constexpr uint8_t PSBT_IN_WITNESSSCRIPT = 0x05;
      36             : static constexpr uint8_t PSBT_IN_BIP32_DERIVATION = 0x06;
      37             : static constexpr uint8_t PSBT_IN_SCRIPTSIG = 0x07;
      38             : static constexpr uint8_t PSBT_IN_SCRIPTWITNESS = 0x08;
      39             : static constexpr uint8_t PSBT_IN_RIPEMD160 = 0x0A;
      40             : static constexpr uint8_t PSBT_IN_SHA256 = 0x0B;
      41             : static constexpr uint8_t PSBT_IN_HASH160 = 0x0C;
      42             : static constexpr uint8_t PSBT_IN_HASH256 = 0x0D;
      43             : static constexpr uint8_t PSBT_IN_TAP_KEY_SIG = 0x13;
      44             : static constexpr uint8_t PSBT_IN_TAP_SCRIPT_SIG = 0x14;
      45             : static constexpr uint8_t PSBT_IN_TAP_LEAF_SCRIPT = 0x15;
      46             : static constexpr uint8_t PSBT_IN_TAP_BIP32_DERIVATION = 0x16;
      47             : static constexpr uint8_t PSBT_IN_TAP_INTERNAL_KEY = 0x17;
      48             : static constexpr uint8_t PSBT_IN_TAP_MERKLE_ROOT = 0x18;
      49             : static constexpr uint8_t PSBT_IN_PROPRIETARY = 0xFC;
      50             : 
      51             : // Output types
      52             : static constexpr uint8_t PSBT_OUT_REDEEMSCRIPT = 0x00;
      53             : static constexpr uint8_t PSBT_OUT_WITNESSSCRIPT = 0x01;
      54             : static constexpr uint8_t PSBT_OUT_BIP32_DERIVATION = 0x02;
      55             : static constexpr uint8_t PSBT_OUT_TAP_INTERNAL_KEY = 0x05;
      56             : static constexpr uint8_t PSBT_OUT_TAP_TREE = 0x06;
      57             : static constexpr uint8_t PSBT_OUT_TAP_BIP32_DERIVATION = 0x07;
      58             : static constexpr uint8_t PSBT_OUT_PROPRIETARY = 0xFC;
      59             : 
      60             : // The separator is 0x00. Reading this in means that the unserializer can interpret it
      61             : // as a 0 length key which indicates that this is the separator. The separator has no value.
      62             : static constexpr uint8_t PSBT_SEPARATOR = 0x00;
      63             : 
      64             : // BIP 174 does not specify a maximum file size, but we set a limit anyway
      65             : // to prevent reading a stream indefinitely and running out of memory.
      66             : const std::streamsize MAX_FILE_SIZE_PSBT = 100000000; // 100 MB
      67             : 
      68             : // PSBT version number
      69             : static constexpr uint32_t PSBT_HIGHEST_VERSION = 0;
      70             : 
      71             : /** A structure for PSBT proprietary types */
      72           0 : struct PSBTProprietary
      73             : {
      74             :     uint64_t subtype;
      75             :     std::vector<unsigned char> identifier;
      76             :     std::vector<unsigned char> key;
      77             :     std::vector<unsigned char> value;
      78             : 
      79           0 :     bool operator<(const PSBTProprietary &b) const {
      80           0 :         return key < b.key;
      81             :     }
      82             :     bool operator==(const PSBTProprietary &b) const {
      83             :         return key == b.key;
      84             :     }
      85             : };
      86             : 
      87             : // Takes a stream and multiple arguments and serializes them as if first serialized into a vector and then into the stream
      88             : // The resulting output into the stream has the total serialized length of all of the objects followed by all objects concatenated with each other.
      89             : template<typename Stream, typename... X>
      90           0 : void SerializeToVector(Stream& s, const X&... args)
      91             : {
      92           0 :     WriteCompactSize(s, GetSerializeSizeMany(s.GetVersion(), args...));
      93           0 :     SerializeMany(s, args...);
      94           0 : }
      95             : 
      96             : // Takes a stream and multiple arguments and unserializes them first as a vector then each object individually in the order provided in the arguments
      97             : template<typename Stream, typename... X>
      98           0 : void UnserializeFromVector(Stream& s, X&... args)
      99             : {
     100           0 :     size_t expected_size = ReadCompactSize(s);
     101           0 :     size_t remaining_before = s.size();
     102           0 :     UnserializeMany(s, args...);
     103           0 :     size_t remaining_after = s.size();
     104           0 :     if (remaining_after + expected_size != remaining_before) {
     105           0 :         throw std::ios_base::failure("Size of value was not the stated size");
     106             :     }
     107           0 : }
     108             : 
     109             : // Deserialize bytes of given length from the stream as a KeyOriginInfo
     110             : template<typename Stream>
     111           0 : KeyOriginInfo DeserializeKeyOrigin(Stream& s, uint64_t length)
     112             : {
     113             :     // Read in key path
     114           0 :     if (length % 4 || length == 0) {
     115           0 :         throw std::ios_base::failure("Invalid length for HD key path");
     116             :     }
     117             : 
     118           0 :     KeyOriginInfo hd_keypath;
     119           0 :     s >> hd_keypath.fingerprint;
     120           0 :     for (unsigned int i = 4; i < length; i += sizeof(uint32_t)) {
     121             :         uint32_t index;
     122           0 :         s >> index;
     123           0 :         hd_keypath.path.push_back(index);
     124           0 :     }
     125           0 :     return hd_keypath;
     126           0 : }
     127             : 
     128             : // Deserialize a length prefixed KeyOriginInfo from a stream
     129             : template<typename Stream>
     130           0 : void DeserializeHDKeypath(Stream& s, KeyOriginInfo& hd_keypath)
     131             : {
     132           0 :     hd_keypath = DeserializeKeyOrigin(s, ReadCompactSize(s));
     133           0 : }
     134             : 
     135             : // Deserialize HD keypaths into a map
     136             : template<typename Stream>
     137           0 : void DeserializeHDKeypaths(Stream& s, const std::vector<unsigned char>& key, std::map<CPubKey, KeyOriginInfo>& hd_keypaths)
     138             : {
     139             :     // Make sure that the key is the size of pubkey + 1
     140           0 :     if (key.size() != CPubKey::SIZE + 1 && key.size() != CPubKey::COMPRESSED_SIZE + 1) {
     141           0 :         throw std::ios_base::failure("Size of key was not the expected size for the type BIP32 keypath");
     142             :     }
     143             :     // Read in the pubkey from key
     144           0 :     CPubKey pubkey(key.begin() + 1, key.end());
     145           0 :     if (!pubkey.IsFullyValid()) {
     146           0 :        throw std::ios_base::failure("Invalid pubkey");
     147             :     }
     148           0 :     if (hd_keypaths.count(pubkey) > 0) {
     149           0 :         throw std::ios_base::failure("Duplicate Key, pubkey derivation path already provided");
     150             :     }
     151             : 
     152           0 :     KeyOriginInfo keypath;
     153           0 :     DeserializeHDKeypath(s, keypath);
     154             : 
     155             :     // Add to map
     156           0 :     hd_keypaths.emplace(pubkey, std::move(keypath));
     157           0 : }
     158             : 
     159             : // Serialize a KeyOriginInfo to a stream
     160             : template<typename Stream>
     161           0 : void SerializeKeyOrigin(Stream& s, KeyOriginInfo hd_keypath)
     162             : {
     163           0 :     s << hd_keypath.fingerprint;
     164           0 :     for (const auto& path : hd_keypath.path) {
     165           0 :         s << path;
     166             :     }
     167           0 : }
     168             : 
     169             : // Serialize a length prefixed KeyOriginInfo to a stream
     170             : template<typename Stream>
     171           0 : void SerializeHDKeypath(Stream& s, KeyOriginInfo hd_keypath)
     172             : {
     173           0 :     WriteCompactSize(s, (hd_keypath.path.size() + 1) * sizeof(uint32_t));
     174           0 :     SerializeKeyOrigin(s, hd_keypath);
     175           0 : }
     176             : 
     177             : // Serialize HD keypaths to a stream from a map
     178             : template<typename Stream>
     179           0 : void SerializeHDKeypaths(Stream& s, const std::map<CPubKey, KeyOriginInfo>& hd_keypaths, CompactSizeWriter type)
     180             : {
     181           0 :     for (const auto& keypath_pair : hd_keypaths) {
     182           0 :         if (!keypath_pair.first.IsValid()) {
     183           0 :             throw std::ios_base::failure("Invalid CPubKey being serialized");
     184             :         }
     185           0 :         SerializeToVector(s, type, Span{keypath_pair.first});
     186           0 :         SerializeHDKeypath(s, keypath_pair.second);
     187             :     }
     188           0 : }
     189             : 
     190             : /** A structure for PSBTs which contain per-input information */
     191           0 : struct PSBTInput
     192             : {
     193             :     CTransactionRef non_witness_utxo;
     194             :     CTxOut witness_utxo;
     195             :     CScript redeem_script;
     196             :     CScript witness_script;
     197             :     CScript final_script_sig;
     198             :     CScriptWitness final_script_witness;
     199             :     std::map<CPubKey, KeyOriginInfo> hd_keypaths;
     200             :     std::map<CKeyID, SigPair> partial_sigs;
     201             :     std::map<uint160, std::vector<unsigned char>> ripemd160_preimages;
     202             :     std::map<uint256, std::vector<unsigned char>> sha256_preimages;
     203             :     std::map<uint160, std::vector<unsigned char>> hash160_preimages;
     204             :     std::map<uint256, std::vector<unsigned char>> hash256_preimages;
     205             : 
     206             :     // Taproot fields
     207             :     std::vector<unsigned char> m_tap_key_sig;
     208             :     std::map<std::pair<XOnlyPubKey, uint256>, std::vector<unsigned char>> m_tap_script_sigs;
     209             :     std::map<std::pair<std::vector<unsigned char>, int>, std::set<std::vector<unsigned char>, ShortestVectorFirstComparator>> m_tap_scripts;
     210             :     std::map<XOnlyPubKey, std::pair<std::set<uint256>, KeyOriginInfo>> m_tap_bip32_paths;
     211             :     XOnlyPubKey m_tap_internal_key;
     212             :     uint256 m_tap_merkle_root;
     213             : 
     214             :     std::map<std::vector<unsigned char>, std::vector<unsigned char>> unknown;
     215             :     std::set<PSBTProprietary> m_proprietary;
     216             :     std::optional<int> sighash_type;
     217             : 
     218             :     bool IsNull() const;
     219             :     void FillSignatureData(SignatureData& sigdata) const;
     220             :     void FromSignatureData(const SignatureData& sigdata);
     221             :     void Merge(const PSBTInput& input);
     222           0 :     PSBTInput() {}
     223             : 
     224             :     template <typename Stream>
     225           0 :     inline void Serialize(Stream& s) const {
     226             :         // Write the utxo
     227           0 :         if (non_witness_utxo) {
     228           0 :             SerializeToVector(s, CompactSizeWriter(PSBT_IN_NON_WITNESS_UTXO));
     229           0 :             OverrideStream<Stream> os(&s, s.GetType(), s.GetVersion() | SERIALIZE_TRANSACTION_NO_WITNESS);
     230           0 :             SerializeToVector(os, non_witness_utxo);
     231           0 :         }
     232           0 :         if (!witness_utxo.IsNull()) {
     233           0 :             SerializeToVector(s, CompactSizeWriter(PSBT_IN_WITNESS_UTXO));
     234           0 :             SerializeToVector(s, witness_utxo);
     235           0 :         }
     236             : 
     237           0 :         if (final_script_sig.empty() && final_script_witness.IsNull()) {
     238             :             // Write any partial signatures
     239           0 :             for (auto sig_pair : partial_sigs) {
     240           0 :                 SerializeToVector(s, CompactSizeWriter(PSBT_IN_PARTIAL_SIG), Span{sig_pair.second.first});
     241           0 :                 s << sig_pair.second.second;
     242           0 :             }
     243             : 
     244             :             // Write the sighash type
     245           0 :             if (sighash_type != std::nullopt) {
     246           0 :                 SerializeToVector(s, CompactSizeWriter(PSBT_IN_SIGHASH));
     247           0 :                 SerializeToVector(s, *sighash_type);
     248           0 :             }
     249             : 
     250             :             // Write the redeem script
     251           0 :             if (!redeem_script.empty()) {
     252           0 :                 SerializeToVector(s, CompactSizeWriter(PSBT_IN_REDEEMSCRIPT));
     253           0 :                 s << redeem_script;
     254           0 :             }
     255             : 
     256             :             // Write the witness script
     257           0 :             if (!witness_script.empty()) {
     258           0 :                 SerializeToVector(s, CompactSizeWriter(PSBT_IN_WITNESSSCRIPT));
     259           0 :                 s << witness_script;
     260           0 :             }
     261             : 
     262             :             // Write any hd keypaths
     263           0 :             SerializeHDKeypaths(s, hd_keypaths, CompactSizeWriter(PSBT_IN_BIP32_DERIVATION));
     264             : 
     265             :             // Write any ripemd160 preimage
     266           0 :             for (const auto& [hash, preimage] : ripemd160_preimages) {
     267           0 :                 SerializeToVector(s, CompactSizeWriter(PSBT_IN_RIPEMD160), Span{hash});
     268           0 :                 s << preimage;
     269             :             }
     270             : 
     271             :             // Write any sha256 preimage
     272           0 :             for (const auto& [hash, preimage] : sha256_preimages) {
     273           0 :                 SerializeToVector(s, CompactSizeWriter(PSBT_IN_SHA256), Span{hash});
     274           0 :                 s << preimage;
     275             :             }
     276             : 
     277             :             // Write any hash160 preimage
     278           0 :             for (const auto& [hash, preimage] : hash160_preimages) {
     279           0 :                 SerializeToVector(s, CompactSizeWriter(PSBT_IN_HASH160), Span{hash});
     280           0 :                 s << preimage;
     281             :             }
     282             : 
     283             :             // Write any hash256 preimage
     284           0 :             for (const auto& [hash, preimage] : hash256_preimages) {
     285           0 :                 SerializeToVector(s, CompactSizeWriter(PSBT_IN_HASH256), Span{hash});
     286           0 :                 s << preimage;
     287             :             }
     288             : 
     289             :             // Write taproot key sig
     290           0 :             if (!m_tap_key_sig.empty()) {
     291           0 :                 SerializeToVector(s, PSBT_IN_TAP_KEY_SIG);
     292           0 :                 s << m_tap_key_sig;
     293           0 :             }
     294             : 
     295             :             // Write taproot script sigs
     296           0 :             for (const auto& [pubkey_leaf, sig] : m_tap_script_sigs) {
     297           0 :                 const auto& [xonly, leaf_hash] = pubkey_leaf;
     298           0 :                 SerializeToVector(s, PSBT_IN_TAP_SCRIPT_SIG, xonly, leaf_hash);
     299           0 :                 s << sig;
     300             :             }
     301             : 
     302             :             // Write taproot leaf scripts
     303           0 :             for (const auto& [leaf, control_blocks] : m_tap_scripts) {
     304           0 :                 const auto& [script, leaf_ver] = leaf;
     305           0 :                 for (const auto& control_block : control_blocks) {
     306           0 :                     SerializeToVector(s, PSBT_IN_TAP_LEAF_SCRIPT, Span{control_block});
     307           0 :                     std::vector<unsigned char> value_v(script.begin(), script.end());
     308           0 :                     value_v.push_back((uint8_t)leaf_ver);
     309           0 :                     s << value_v;
     310           0 :                 }
     311             :             }
     312             : 
     313             :             // Write taproot bip32 keypaths
     314           0 :             for (const auto& [xonly, leaf_origin] : m_tap_bip32_paths) {
     315           0 :                 const auto& [leaf_hashes, origin] = leaf_origin;
     316           0 :                 SerializeToVector(s, PSBT_IN_TAP_BIP32_DERIVATION, xonly);
     317           0 :                 std::vector<unsigned char> value;
     318           0 :                 CVectorWriter s_value(s.GetType(), s.GetVersion(), value, 0);
     319           0 :                 s_value << leaf_hashes;
     320           0 :                 SerializeKeyOrigin(s_value, origin);
     321           0 :                 s << value;
     322           0 :             }
     323             : 
     324             :             // Write taproot internal key
     325           0 :             if (!m_tap_internal_key.IsNull()) {
     326           0 :                 SerializeToVector(s, PSBT_IN_TAP_INTERNAL_KEY);
     327           0 :                 s << ToByteVector(m_tap_internal_key);
     328           0 :             }
     329             : 
     330             :             // Write taproot merkle root
     331           0 :             if (!m_tap_merkle_root.IsNull()) {
     332           0 :                 SerializeToVector(s, PSBT_IN_TAP_MERKLE_ROOT);
     333           0 :                 SerializeToVector(s, m_tap_merkle_root);
     334           0 :             }
     335           0 :         }
     336             : 
     337             :         // Write script sig
     338           0 :         if (!final_script_sig.empty()) {
     339           0 :             SerializeToVector(s, CompactSizeWriter(PSBT_IN_SCRIPTSIG));
     340           0 :             s << final_script_sig;
     341           0 :         }
     342             :         // write script witness
     343           0 :         if (!final_script_witness.IsNull()) {
     344           0 :             SerializeToVector(s, CompactSizeWriter(PSBT_IN_SCRIPTWITNESS));
     345           0 :             SerializeToVector(s, final_script_witness.stack);
     346           0 :         }
     347             : 
     348             :         // Write proprietary things
     349           0 :         for (const auto& entry : m_proprietary) {
     350           0 :             s << entry.key;
     351           0 :             s << entry.value;
     352             :         }
     353             : 
     354             :         // Write unknown things
     355           0 :         for (auto& entry : unknown) {
     356           0 :             s << entry.first;
     357           0 :             s << entry.second;
     358             :         }
     359             : 
     360           0 :         s << PSBT_SEPARATOR;
     361           0 :     }
     362             : 
     363             : 
     364             :     template <typename Stream>
     365           0 :     inline void Unserialize(Stream& s) {
     366             :         // Used for duplicate key detection
     367           0 :         std::set<std::vector<unsigned char>> key_lookup;
     368             : 
     369             :         // Read loop
     370           0 :         bool found_sep = false;
     371           0 :         while(!s.empty()) {
     372             :             // Read
     373           0 :             std::vector<unsigned char> key;
     374           0 :             s >> key;
     375             : 
     376             :             // the key is empty if that was actually a separator byte
     377             :             // This is a special case for key lengths 0 as those are not allowed (except for separator)
     378           0 :             if (key.empty()) {
     379           0 :                 found_sep = true;
     380           0 :                 break;
     381             :             }
     382             : 
     383             :             // Type is compact size uint at beginning of key
     384           0 :             SpanReader skey(s.GetType(), s.GetVersion(), key);
     385           0 :             uint64_t type = ReadCompactSize(skey);
     386             : 
     387             :             // Do stuff based on type
     388           0 :             switch(type) {
     389             :                 case PSBT_IN_NON_WITNESS_UTXO:
     390             :                 {
     391           0 :                     if (!key_lookup.emplace(key).second) {
     392           0 :                         throw std::ios_base::failure("Duplicate Key, input non-witness utxo already provided");
     393           0 :                     } else if (key.size() != 1) {
     394           0 :                         throw std::ios_base::failure("Non-witness utxo key is more than one byte type");
     395             :                     }
     396             :                     // Set the stream to unserialize with witness since this is always a valid network transaction
     397           0 :                     OverrideStream<Stream> os(&s, s.GetType(), s.GetVersion() & ~SERIALIZE_TRANSACTION_NO_WITNESS);
     398           0 :                     UnserializeFromVector(os, non_witness_utxo);
     399           0 :                     break;
     400             :                 }
     401             :                 case PSBT_IN_WITNESS_UTXO:
     402           0 :                     if (!key_lookup.emplace(key).second) {
     403           0 :                         throw std::ios_base::failure("Duplicate Key, input witness utxo already provided");
     404           0 :                     } else if (key.size() != 1) {
     405           0 :                         throw std::ios_base::failure("Witness utxo key is more than one byte type");
     406             :                     }
     407           0 :                     UnserializeFromVector(s, witness_utxo);
     408           0 :                     break;
     409             :                 case PSBT_IN_PARTIAL_SIG:
     410             :                 {
     411             :                     // Make sure that the key is the size of pubkey + 1
     412           0 :                     if (key.size() != CPubKey::SIZE + 1 && key.size() != CPubKey::COMPRESSED_SIZE + 1) {
     413           0 :                         throw std::ios_base::failure("Size of key was not the expected size for the type partial signature pubkey");
     414             :                     }
     415             :                     // Read in the pubkey from key
     416           0 :                     CPubKey pubkey(key.begin() + 1, key.end());
     417           0 :                     if (!pubkey.IsFullyValid()) {
     418           0 :                        throw std::ios_base::failure("Invalid pubkey");
     419             :                     }
     420           0 :                     if (partial_sigs.count(pubkey.GetID()) > 0) {
     421           0 :                         throw std::ios_base::failure("Duplicate Key, input partial signature for pubkey already provided");
     422             :                     }
     423             : 
     424             :                     // Read in the signature from value
     425           0 :                     std::vector<unsigned char> sig;
     426           0 :                     s >> sig;
     427             : 
     428             :                     // Add to list
     429           0 :                     partial_sigs.emplace(pubkey.GetID(), SigPair(pubkey, std::move(sig)));
     430             :                     break;
     431           0 :                 }
     432             :                 case PSBT_IN_SIGHASH:
     433           0 :                     if (!key_lookup.emplace(key).second) {
     434           0 :                         throw std::ios_base::failure("Duplicate Key, input sighash type already provided");
     435           0 :                     } else if (key.size() != 1) {
     436           0 :                         throw std::ios_base::failure("Sighash type key is more than one byte type");
     437             :                     }
     438             :                     int sighash;
     439           0 :                     UnserializeFromVector(s, sighash);
     440           0 :                     sighash_type = sighash;
     441           0 :                     break;
     442             :                 case PSBT_IN_REDEEMSCRIPT:
     443             :                 {
     444           0 :                     if (!key_lookup.emplace(key).second) {
     445           0 :                         throw std::ios_base::failure("Duplicate Key, input redeemScript already provided");
     446           0 :                     } else if (key.size() != 1) {
     447           0 :                         throw std::ios_base::failure("Input redeemScript key is more than one byte type");
     448             :                     }
     449           0 :                     s >> redeem_script;
     450           0 :                     break;
     451             :                 }
     452             :                 case PSBT_IN_WITNESSSCRIPT:
     453             :                 {
     454           0 :                     if (!key_lookup.emplace(key).second) {
     455           0 :                         throw std::ios_base::failure("Duplicate Key, input witnessScript already provided");
     456           0 :                     } else if (key.size() != 1) {
     457           0 :                         throw std::ios_base::failure("Input witnessScript key is more than one byte type");
     458             :                     }
     459           0 :                     s >> witness_script;
     460           0 :                     break;
     461             :                 }
     462             :                 case PSBT_IN_BIP32_DERIVATION:
     463             :                 {
     464           0 :                     DeserializeHDKeypaths(s, key, hd_keypaths);
     465           0 :                     break;
     466             :                 }
     467             :                 case PSBT_IN_SCRIPTSIG:
     468             :                 {
     469           0 :                     if (!key_lookup.emplace(key).second) {
     470           0 :                         throw std::ios_base::failure("Duplicate Key, input final scriptSig already provided");
     471           0 :                     } else if (key.size() != 1) {
     472           0 :                         throw std::ios_base::failure("Final scriptSig key is more than one byte type");
     473             :                     }
     474           0 :                     s >> final_script_sig;
     475           0 :                     break;
     476             :                 }
     477             :                 case PSBT_IN_SCRIPTWITNESS:
     478             :                 {
     479           0 :                     if (!key_lookup.emplace(key).second) {
     480           0 :                         throw std::ios_base::failure("Duplicate Key, input final scriptWitness already provided");
     481           0 :                     } else if (key.size() != 1) {
     482           0 :                         throw std::ios_base::failure("Final scriptWitness key is more than one byte type");
     483             :                     }
     484           0 :                     UnserializeFromVector(s, final_script_witness.stack);
     485           0 :                     break;
     486             :                 }
     487             :                 case PSBT_IN_RIPEMD160:
     488             :                 {
     489             :                     // Make sure that the key is the size of a ripemd160 hash + 1
     490           0 :                     if (key.size() != CRIPEMD160::OUTPUT_SIZE + 1) {
     491           0 :                         throw std::ios_base::failure("Size of key was not the expected size for the type ripemd160 preimage");
     492             :                     }
     493             :                     // Read in the hash from key
     494           0 :                     std::vector<unsigned char> hash_vec(key.begin() + 1, key.end());
     495           0 :                     uint160 hash(hash_vec);
     496           0 :                     if (ripemd160_preimages.count(hash) > 0) {
     497           0 :                         throw std::ios_base::failure("Duplicate Key, input ripemd160 preimage already provided");
     498             :                     }
     499             : 
     500             :                     // Read in the preimage from value
     501           0 :                     std::vector<unsigned char> preimage;
     502           0 :                     s >> preimage;
     503             : 
     504             :                     // Add to preimages list
     505           0 :                     ripemd160_preimages.emplace(hash, std::move(preimage));
     506             :                     break;
     507           0 :                 }
     508             :                 case PSBT_IN_SHA256:
     509             :                 {
     510             :                     // Make sure that the key is the size of a sha256 hash + 1
     511           0 :                     if (key.size() != CSHA256::OUTPUT_SIZE + 1) {
     512           0 :                         throw std::ios_base::failure("Size of key was not the expected size for the type sha256 preimage");
     513             :                     }
     514             :                     // Read in the hash from key
     515           0 :                     std::vector<unsigned char> hash_vec(key.begin() + 1, key.end());
     516           0 :                     uint256 hash(hash_vec);
     517           0 :                     if (sha256_preimages.count(hash) > 0) {
     518           0 :                         throw std::ios_base::failure("Duplicate Key, input sha256 preimage already provided");
     519             :                     }
     520             : 
     521             :                     // Read in the preimage from value
     522           0 :                     std::vector<unsigned char> preimage;
     523           0 :                     s >> preimage;
     524             : 
     525             :                     // Add to preimages list
     526           0 :                     sha256_preimages.emplace(hash, std::move(preimage));
     527             :                     break;
     528           0 :                 }
     529             :                 case PSBT_IN_HASH160:
     530             :                 {
     531             :                     // Make sure that the key is the size of a hash160 hash + 1
     532           0 :                     if (key.size() != CHash160::OUTPUT_SIZE + 1) {
     533           0 :                         throw std::ios_base::failure("Size of key was not the expected size for the type hash160 preimage");
     534             :                     }
     535             :                     // Read in the hash from key
     536           0 :                     std::vector<unsigned char> hash_vec(key.begin() + 1, key.end());
     537           0 :                     uint160 hash(hash_vec);
     538           0 :                     if (hash160_preimages.count(hash) > 0) {
     539           0 :                         throw std::ios_base::failure("Duplicate Key, input hash160 preimage already provided");
     540             :                     }
     541             : 
     542             :                     // Read in the preimage from value
     543           0 :                     std::vector<unsigned char> preimage;
     544           0 :                     s >> preimage;
     545             : 
     546             :                     // Add to preimages list
     547           0 :                     hash160_preimages.emplace(hash, std::move(preimage));
     548             :                     break;
     549           0 :                 }
     550             :                 case PSBT_IN_HASH256:
     551             :                 {
     552             :                     // Make sure that the key is the size of a hash256 hash + 1
     553           0 :                     if (key.size() != CHash256::OUTPUT_SIZE + 1) {
     554           0 :                         throw std::ios_base::failure("Size of key was not the expected size for the type hash256 preimage");
     555             :                     }
     556             :                     // Read in the hash from key
     557           0 :                     std::vector<unsigned char> hash_vec(key.begin() + 1, key.end());
     558           0 :                     uint256 hash(hash_vec);
     559           0 :                     if (hash256_preimages.count(hash) > 0) {
     560           0 :                         throw std::ios_base::failure("Duplicate Key, input hash256 preimage already provided");
     561             :                     }
     562             : 
     563             :                     // Read in the preimage from value
     564           0 :                     std::vector<unsigned char> preimage;
     565           0 :                     s >> preimage;
     566             : 
     567             :                     // Add to preimages list
     568           0 :                     hash256_preimages.emplace(hash, std::move(preimage));
     569             :                     break;
     570           0 :                 }
     571             :                 case PSBT_IN_TAP_KEY_SIG:
     572             :                 {
     573           0 :                     if (!key_lookup.emplace(key).second) {
     574           0 :                         throw std::ios_base::failure("Duplicate Key, input Taproot key signature already provided");
     575           0 :                     } else if (key.size() != 1) {
     576           0 :                         throw std::ios_base::failure("Input Taproot key signature key is more than one byte type");
     577             :                     }
     578           0 :                     s >> m_tap_key_sig;
     579           0 :                     if (m_tap_key_sig.size() < 64) {
     580           0 :                         throw std::ios_base::failure("Input Taproot key path signature is shorter than 64 bytes");
     581           0 :                     } else if (m_tap_key_sig.size() > 65) {
     582           0 :                         throw std::ios_base::failure("Input Taproot key path signature is longer than 65 bytes");
     583             :                     }
     584           0 :                     break;
     585             :                 }
     586             :                 case PSBT_IN_TAP_SCRIPT_SIG:
     587             :                 {
     588           0 :                     if (!key_lookup.emplace(key).second) {
     589           0 :                         throw std::ios_base::failure("Duplicate Key, input Taproot script signature already provided");
     590           0 :                     } else if (key.size() != 65) {
     591           0 :                         throw std::ios_base::failure("Input Taproot script signature key is not 65 bytes");
     592             :                     }
     593           0 :                     SpanReader s_key(s.GetType(), s.GetVersion(), Span{key}.subspan(1));
     594           0 :                     XOnlyPubKey xonly;
     595           0 :                     uint256 hash;
     596           0 :                     s_key >> xonly;
     597           0 :                     s_key >> hash;
     598           0 :                     std::vector<unsigned char> sig;
     599           0 :                     s >> sig;
     600           0 :                     if (sig.size() < 64) {
     601           0 :                         throw std::ios_base::failure("Input Taproot script path signature is shorter than 64 bytes");
     602           0 :                     } else if (sig.size() > 65) {
     603           0 :                         throw std::ios_base::failure("Input Taproot script path signature is longer than 65 bytes");
     604             :                     }
     605           0 :                     m_tap_script_sigs.emplace(std::make_pair(xonly, hash), sig);
     606             :                     break;
     607           0 :                 }
     608             :                 case PSBT_IN_TAP_LEAF_SCRIPT:
     609             :                 {
     610           0 :                     if (!key_lookup.emplace(key).second) {
     611           0 :                         throw std::ios_base::failure("Duplicate Key, input Taproot leaf script already provided");
     612           0 :                     } else if (key.size() < 34) {
     613           0 :                         throw std::ios_base::failure("Taproot leaf script key is not at least 34 bytes");
     614           0 :                     } else if ((key.size() - 2) % 32 != 0) {
     615           0 :                         throw std::ios_base::failure("Input Taproot leaf script key's control block size is not valid");
     616             :                     }
     617           0 :                     std::vector<unsigned char> script_v;
     618           0 :                     s >> script_v;
     619           0 :                     if (script_v.empty()) {
     620           0 :                         throw std::ios_base::failure("Input Taproot leaf script must be at least 1 byte");
     621             :                     }
     622           0 :                     uint8_t leaf_ver = script_v.back();
     623           0 :                     script_v.pop_back();
     624           0 :                     const auto leaf_script = std::make_pair(script_v, (int)leaf_ver);
     625           0 :                     m_tap_scripts[leaf_script].insert(std::vector<unsigned char>(key.begin() + 1, key.end()));
     626             :                     break;
     627           0 :                 }
     628             :                 case PSBT_IN_TAP_BIP32_DERIVATION:
     629             :                 {
     630           0 :                     if (!key_lookup.emplace(key).second) {
     631           0 :                         throw std::ios_base::failure("Duplicate Key, input Taproot BIP32 keypath already provided");
     632           0 :                     } else if (key.size() != 33) {
     633           0 :                         throw std::ios_base::failure("Input Taproot BIP32 keypath key is not at 33 bytes");
     634             :                     }
     635           0 :                     SpanReader s_key(s.GetType(), s.GetVersion(), Span{key}.subspan(1));
     636           0 :                     XOnlyPubKey xonly;
     637           0 :                     s_key >> xonly;
     638           0 :                     std::set<uint256> leaf_hashes;
     639           0 :                     uint64_t value_len = ReadCompactSize(s);
     640           0 :                     size_t before_hashes = s.size();
     641           0 :                     s >> leaf_hashes;
     642           0 :                     size_t after_hashes = s.size();
     643           0 :                     size_t hashes_len = before_hashes - after_hashes;
     644           0 :                     if (hashes_len > value_len) {
     645           0 :                         throw std::ios_base::failure("Input Taproot BIP32 keypath has an invalid length");
     646             :                     }
     647           0 :                     size_t origin_len = value_len - hashes_len;
     648           0 :                     m_tap_bip32_paths.emplace(xonly, std::make_pair(leaf_hashes, DeserializeKeyOrigin(s, origin_len)));
     649             :                     break;
     650           0 :                 }
     651             :                 case PSBT_IN_TAP_INTERNAL_KEY:
     652             :                 {
     653           0 :                     if (!key_lookup.emplace(key).second) {
     654           0 :                         throw std::ios_base::failure("Duplicate Key, input Taproot internal key already provided");
     655           0 :                     } else if (key.size() != 1) {
     656           0 :                         throw std::ios_base::failure("Input Taproot internal key key is more than one byte type");
     657             :                     }
     658           0 :                     UnserializeFromVector(s, m_tap_internal_key);
     659           0 :                     break;
     660             :                 }
     661             :                 case PSBT_IN_TAP_MERKLE_ROOT:
     662             :                 {
     663           0 :                     if (!key_lookup.emplace(key).second) {
     664           0 :                         throw std::ios_base::failure("Duplicate Key, input Taproot merkle root already provided");
     665           0 :                     } else if (key.size() != 1) {
     666           0 :                         throw std::ios_base::failure("Input Taproot merkle root key is more than one byte type");
     667             :                     }
     668           0 :                     UnserializeFromVector(s, m_tap_merkle_root);
     669           0 :                     break;
     670             :                 }
     671             :                 case PSBT_IN_PROPRIETARY:
     672             :                 {
     673           0 :                     PSBTProprietary this_prop;
     674           0 :                     skey >> this_prop.identifier;
     675           0 :                     this_prop.subtype = ReadCompactSize(skey);
     676           0 :                     this_prop.key = key;
     677             : 
     678           0 :                     if (m_proprietary.count(this_prop) > 0) {
     679           0 :                         throw std::ios_base::failure("Duplicate Key, proprietary key already found");
     680             :                     }
     681           0 :                     s >> this_prop.value;
     682           0 :                     m_proprietary.insert(this_prop);
     683             :                     break;
     684           0 :                 }
     685             :                 // Unknown stuff
     686             :                 default:
     687           0 :                     if (unknown.count(key) > 0) {
     688           0 :                         throw std::ios_base::failure("Duplicate Key, key for unknown value already provided");
     689             :                     }
     690             :                     // Read in the value
     691           0 :                     std::vector<unsigned char> val_bytes;
     692           0 :                     s >> val_bytes;
     693           0 :                     unknown.emplace(std::move(key), std::move(val_bytes));
     694             :                     break;
     695           0 :             }
     696           0 :         }
     697             : 
     698           0 :         if (!found_sep) {
     699           0 :             throw std::ios_base::failure("Separator is missing at the end of an input map");
     700             :         }
     701           0 :     }
     702             : 
     703             :     template <typename Stream>
     704             :     PSBTInput(deserialize_type, Stream& s) {
     705             :         Unserialize(s);
     706             :     }
     707             : };
     708             : 
     709             : /** A structure for PSBTs which contains per output information */
     710           0 : struct PSBTOutput
     711             : {
     712             :     CScript redeem_script;
     713             :     CScript witness_script;
     714             :     std::map<CPubKey, KeyOriginInfo> hd_keypaths;
     715             :     XOnlyPubKey m_tap_internal_key;
     716             :     std::vector<std::tuple<uint8_t, uint8_t, std::vector<unsigned char>>> m_tap_tree;
     717             :     std::map<XOnlyPubKey, std::pair<std::set<uint256>, KeyOriginInfo>> m_tap_bip32_paths;
     718             :     std::map<std::vector<unsigned char>, std::vector<unsigned char>> unknown;
     719             :     std::set<PSBTProprietary> m_proprietary;
     720             : 
     721             :     bool IsNull() const;
     722             :     void FillSignatureData(SignatureData& sigdata) const;
     723             :     void FromSignatureData(const SignatureData& sigdata);
     724             :     void Merge(const PSBTOutput& output);
     725           0 :     PSBTOutput() {}
     726             : 
     727             :     template <typename Stream>
     728           0 :     inline void Serialize(Stream& s) const {
     729             :         // Write the redeem script
     730           0 :         if (!redeem_script.empty()) {
     731           0 :             SerializeToVector(s, CompactSizeWriter(PSBT_OUT_REDEEMSCRIPT));
     732           0 :             s << redeem_script;
     733           0 :         }
     734             : 
     735             :         // Write the witness script
     736           0 :         if (!witness_script.empty()) {
     737           0 :             SerializeToVector(s, CompactSizeWriter(PSBT_OUT_WITNESSSCRIPT));
     738           0 :             s << witness_script;
     739           0 :         }
     740             : 
     741             :         // Write any hd keypaths
     742           0 :         SerializeHDKeypaths(s, hd_keypaths, CompactSizeWriter(PSBT_OUT_BIP32_DERIVATION));
     743             : 
     744             :         // Write proprietary things
     745           0 :         for (const auto& entry : m_proprietary) {
     746           0 :             s << entry.key;
     747           0 :             s << entry.value;
     748             :         }
     749             : 
     750             :         // Write taproot internal key
     751           0 :         if (!m_tap_internal_key.IsNull()) {
     752           0 :             SerializeToVector(s, PSBT_OUT_TAP_INTERNAL_KEY);
     753           0 :             s << ToByteVector(m_tap_internal_key);
     754           0 :         }
     755             : 
     756             :         // Write taproot tree
     757           0 :         if (!m_tap_tree.empty()) {
     758           0 :             SerializeToVector(s, PSBT_OUT_TAP_TREE);
     759           0 :             std::vector<unsigned char> value;
     760           0 :             CVectorWriter s_value(s.GetType(), s.GetVersion(), value, 0);
     761           0 :             for (const auto& [depth, leaf_ver, script] : m_tap_tree) {
     762           0 :                 s_value << depth;
     763           0 :                 s_value << leaf_ver;
     764           0 :                 s_value << script;
     765             :             }
     766           0 :             s << value;
     767           0 :         }
     768             : 
     769             :         // Write taproot bip32 keypaths
     770           0 :         for (const auto& [xonly, leaf] : m_tap_bip32_paths) {
     771           0 :             const auto& [leaf_hashes, origin] = leaf;
     772           0 :             SerializeToVector(s, PSBT_OUT_TAP_BIP32_DERIVATION, xonly);
     773           0 :             std::vector<unsigned char> value;
     774           0 :             CVectorWriter s_value(s.GetType(), s.GetVersion(), value, 0);
     775           0 :             s_value << leaf_hashes;
     776           0 :             SerializeKeyOrigin(s_value, origin);
     777           0 :             s << value;
     778           0 :         }
     779             : 
     780             :         // Write unknown things
     781           0 :         for (auto& entry : unknown) {
     782           0 :             s << entry.first;
     783           0 :             s << entry.second;
     784             :         }
     785             : 
     786           0 :         s << PSBT_SEPARATOR;
     787           0 :     }
     788             : 
     789             : 
     790             :     template <typename Stream>
     791           0 :     inline void Unserialize(Stream& s) {
     792             :         // Used for duplicate key detection
     793           0 :         std::set<std::vector<unsigned char>> key_lookup;
     794             : 
     795             :         // Read loop
     796           0 :         bool found_sep = false;
     797           0 :         while(!s.empty()) {
     798             :             // Read
     799           0 :             std::vector<unsigned char> key;
     800           0 :             s >> key;
     801             : 
     802             :             // the key is empty if that was actually a separator byte
     803             :             // This is a special case for key lengths 0 as those are not allowed (except for separator)
     804           0 :             if (key.empty()) {
     805           0 :                 found_sep = true;
     806           0 :                 break;
     807             :             }
     808             : 
     809             :             // Type is compact size uint at beginning of key
     810           0 :             SpanReader skey(s.GetType(), s.GetVersion(), key);
     811           0 :             uint64_t type = ReadCompactSize(skey);
     812             : 
     813             :             // Do stuff based on type
     814           0 :             switch(type) {
     815             :                 case PSBT_OUT_REDEEMSCRIPT:
     816             :                 {
     817           0 :                     if (!key_lookup.emplace(key).second) {
     818           0 :                         throw std::ios_base::failure("Duplicate Key, output redeemScript already provided");
     819           0 :                     } else if (key.size() != 1) {
     820           0 :                         throw std::ios_base::failure("Output redeemScript key is more than one byte type");
     821             :                     }
     822           0 :                     s >> redeem_script;
     823           0 :                     break;
     824             :                 }
     825             :                 case PSBT_OUT_WITNESSSCRIPT:
     826             :                 {
     827           0 :                     if (!key_lookup.emplace(key).second) {
     828           0 :                         throw std::ios_base::failure("Duplicate Key, output witnessScript already provided");
     829           0 :                     } else if (key.size() != 1) {
     830           0 :                         throw std::ios_base::failure("Output witnessScript key is more than one byte type");
     831             :                     }
     832           0 :                     s >> witness_script;
     833           0 :                     break;
     834             :                 }
     835             :                 case PSBT_OUT_BIP32_DERIVATION:
     836             :                 {
     837           0 :                     DeserializeHDKeypaths(s, key, hd_keypaths);
     838           0 :                     break;
     839             :                 }
     840             :                 case PSBT_OUT_TAP_INTERNAL_KEY:
     841             :                 {
     842           0 :                     if (!key_lookup.emplace(key).second) {
     843           0 :                         throw std::ios_base::failure("Duplicate Key, output Taproot internal key already provided");
     844           0 :                     } else if (key.size() != 1) {
     845           0 :                         throw std::ios_base::failure("Output Taproot internal key key is more than one byte type");
     846             :                     }
     847           0 :                     UnserializeFromVector(s, m_tap_internal_key);
     848           0 :                     break;
     849             :                 }
     850             :                 case PSBT_OUT_TAP_TREE:
     851             :                 {
     852           0 :                     if (!key_lookup.emplace(key).second) {
     853           0 :                         throw std::ios_base::failure("Duplicate Key, output Taproot tree already provided");
     854           0 :                     } else if (key.size() != 1) {
     855           0 :                         throw std::ios_base::failure("Output Taproot tree key is more than one byte type");
     856             :                     }
     857           0 :                     std::vector<unsigned char> tree_v;
     858           0 :                     s >> tree_v;
     859           0 :                     SpanReader s_tree(s.GetType(), s.GetVersion(), tree_v);
     860           0 :                     if (s_tree.empty()) {
     861           0 :                         throw std::ios_base::failure("Output Taproot tree must not be empty");
     862             :                     }
     863           0 :                     TaprootBuilder builder;
     864           0 :                     while (!s_tree.empty()) {
     865             :                         uint8_t depth;
     866             :                         uint8_t leaf_ver;
     867           0 :                         std::vector<unsigned char> script;
     868           0 :                         s_tree >> depth;
     869           0 :                         s_tree >> leaf_ver;
     870           0 :                         s_tree >> script;
     871           0 :                         if (depth > TAPROOT_CONTROL_MAX_NODE_COUNT) {
     872           0 :                             throw std::ios_base::failure("Output Taproot tree has as leaf greater than Taproot maximum depth");
     873             :                         }
     874           0 :                         if ((leaf_ver & ~TAPROOT_LEAF_MASK) != 0) {
     875           0 :                             throw std::ios_base::failure("Output Taproot tree has a leaf with an invalid leaf version");
     876             :                         }
     877           0 :                         m_tap_tree.push_back(std::make_tuple(depth, leaf_ver, script));
     878           0 :                         builder.Add((int)depth, script, (int)leaf_ver, /*track=*/true);
     879           0 :                     }
     880           0 :                     if (!builder.IsComplete()) {
     881           0 :                         throw std::ios_base::failure("Output Taproot tree is malformed");
     882             :                     }
     883             :                     break;
     884           0 :                 }
     885             :                 case PSBT_OUT_TAP_BIP32_DERIVATION:
     886             :                 {
     887           0 :                     if (!key_lookup.emplace(key).second) {
     888           0 :                         throw std::ios_base::failure("Duplicate Key, output Taproot BIP32 keypath already provided");
     889           0 :                     } else if (key.size() != 33) {
     890           0 :                         throw std::ios_base::failure("Output Taproot BIP32 keypath key is not at 33 bytes");
     891             :                     }
     892           0 :                     XOnlyPubKey xonly(uint256(Span<uint8_t>(key).last(32)));
     893           0 :                     std::set<uint256> leaf_hashes;
     894           0 :                     uint64_t value_len = ReadCompactSize(s);
     895           0 :                     size_t before_hashes = s.size();
     896           0 :                     s >> leaf_hashes;
     897           0 :                     size_t after_hashes = s.size();
     898           0 :                     size_t hashes_len = before_hashes - after_hashes;
     899           0 :                     if (hashes_len > value_len) {
     900           0 :                         throw std::ios_base::failure("Output Taproot BIP32 keypath has an invalid length");
     901             :                     }
     902           0 :                     size_t origin_len = value_len - hashes_len;
     903           0 :                     m_tap_bip32_paths.emplace(xonly, std::make_pair(leaf_hashes, DeserializeKeyOrigin(s, origin_len)));
     904             :                     break;
     905           0 :                 }
     906             :                 case PSBT_OUT_PROPRIETARY:
     907             :                 {
     908           0 :                     PSBTProprietary this_prop;
     909           0 :                     skey >> this_prop.identifier;
     910           0 :                     this_prop.subtype = ReadCompactSize(skey);
     911           0 :                     this_prop.key = key;
     912             : 
     913           0 :                     if (m_proprietary.count(this_prop) > 0) {
     914           0 :                         throw std::ios_base::failure("Duplicate Key, proprietary key already found");
     915             :                     }
     916           0 :                     s >> this_prop.value;
     917           0 :                     m_proprietary.insert(this_prop);
     918             :                     break;
     919           0 :                 }
     920             :                 // Unknown stuff
     921             :                 default: {
     922           0 :                     if (unknown.count(key) > 0) {
     923           0 :                         throw std::ios_base::failure("Duplicate Key, key for unknown value already provided");
     924             :                     }
     925             :                     // Read in the value
     926           0 :                     std::vector<unsigned char> val_bytes;
     927           0 :                     s >> val_bytes;
     928           0 :                     unknown.emplace(std::move(key), std::move(val_bytes));
     929             :                     break;
     930           0 :                 }
     931             :             }
     932           0 :         }
     933             : 
     934           0 :         if (!found_sep) {
     935           0 :             throw std::ios_base::failure("Separator is missing at the end of an output map");
     936             :         }
     937           0 :     }
     938             : 
     939             :     template <typename Stream>
     940             :     PSBTOutput(deserialize_type, Stream& s) {
     941             :         Unserialize(s);
     942             :     }
     943             : };
     944             : 
     945             : /** A version of CTransaction with the PSBT format*/
     946           0 : struct PartiallySignedTransaction
     947             : {
     948             :     std::optional<CMutableTransaction> tx;
     949             :     // We use a vector of CExtPubKey in the event that there happens to be the same KeyOriginInfos for different CExtPubKeys
     950             :     // Note that this map swaps the key and values from the serialization
     951             :     std::map<KeyOriginInfo, std::set<CExtPubKey>> m_xpubs;
     952             :     std::vector<PSBTInput> inputs;
     953             :     std::vector<PSBTOutput> outputs;
     954             :     std::map<std::vector<unsigned char>, std::vector<unsigned char>> unknown;
     955             :     std::optional<uint32_t> m_version;
     956             :     std::set<PSBTProprietary> m_proprietary;
     957             : 
     958             :     bool IsNull() const;
     959             :     uint32_t GetVersion() const;
     960             : 
     961             :     /** Merge psbt into this. The two psbts must have the same underlying CTransaction (i.e. the
     962             :       * same actual Bitcoin transaction.) Returns true if the merge succeeded, false otherwise. */
     963             :     [[nodiscard]] bool Merge(const PartiallySignedTransaction& psbt);
     964             :     bool AddInput(const CTxIn& txin, PSBTInput& psbtin);
     965             :     bool AddOutput(const CTxOut& txout, const PSBTOutput& psbtout);
     966           0 :     PartiallySignedTransaction() {}
     967             :     explicit PartiallySignedTransaction(const CMutableTransaction& tx);
     968             :     /**
     969             :      * Finds the UTXO for a given input index
     970             :      *
     971             :      * @param[out] utxo The UTXO of the input if found
     972             :      * @param[in] input_index Index of the input to retrieve the UTXO of
     973             :      * @return Whether the UTXO for the specified input was found
     974             :      */
     975             :     bool GetInputUTXO(CTxOut& utxo, int input_index) const;
     976             : 
     977             :     template <typename Stream>
     978           0 :     inline void Serialize(Stream& s) const {
     979             : 
     980             :         // magic bytes
     981           0 :         s << PSBT_MAGIC_BYTES;
     982             : 
     983             :         // unsigned tx flag
     984           0 :         SerializeToVector(s, CompactSizeWriter(PSBT_GLOBAL_UNSIGNED_TX));
     985             : 
     986             :         // Write serialized tx to a stream
     987           0 :         OverrideStream<Stream> os(&s, s.GetType(), s.GetVersion() | SERIALIZE_TRANSACTION_NO_WITNESS);
     988           0 :         SerializeToVector(os, *tx);
     989             : 
     990             :         // Write xpubs
     991           0 :         for (const auto& xpub_pair : m_xpubs) {
     992           0 :             for (const auto& xpub : xpub_pair.second) {
     993             :                 unsigned char ser_xpub[BIP32_EXTKEY_WITH_VERSION_SIZE];
     994           0 :                 xpub.EncodeWithVersion(ser_xpub);
     995             :                 // Note that the serialization swaps the key and value
     996             :                 // The xpub is the key (for uniqueness) while the path is the value
     997           0 :                 SerializeToVector(s, PSBT_GLOBAL_XPUB, ser_xpub);
     998           0 :                 SerializeHDKeypath(s, xpub_pair.first);
     999             :             }
    1000             :         }
    1001             : 
    1002             :         // PSBT version
    1003           0 :         if (GetVersion() > 0) {
    1004           0 :             SerializeToVector(s, CompactSizeWriter(PSBT_GLOBAL_VERSION));
    1005           0 :             SerializeToVector(s, *m_version);
    1006           0 :         }
    1007             : 
    1008             :         // Write proprietary things
    1009           0 :         for (const auto& entry : m_proprietary) {
    1010           0 :             s << entry.key;
    1011           0 :             s << entry.value;
    1012             :         }
    1013             : 
    1014             :         // Write the unknown things
    1015           0 :         for (auto& entry : unknown) {
    1016           0 :             s << entry.first;
    1017           0 :             s << entry.second;
    1018             :         }
    1019             : 
    1020             :         // Separator
    1021           0 :         s << PSBT_SEPARATOR;
    1022             : 
    1023             :         // Write inputs
    1024           0 :         for (const PSBTInput& input : inputs) {
    1025           0 :             s << input;
    1026             :         }
    1027             :         // Write outputs
    1028           0 :         for (const PSBTOutput& output : outputs) {
    1029           0 :             s << output;
    1030             :         }
    1031           0 :     }
    1032             : 
    1033             : 
    1034             :     template <typename Stream>
    1035           0 :     inline void Unserialize(Stream& s) {
    1036             :         // Read the magic bytes
    1037             :         uint8_t magic[5];
    1038           0 :         s >> magic;
    1039           0 :         if (!std::equal(magic, magic + 5, PSBT_MAGIC_BYTES)) {
    1040           0 :             throw std::ios_base::failure("Invalid PSBT magic bytes");
    1041             :         }
    1042             : 
    1043             :         // Used for duplicate key detection
    1044           0 :         std::set<std::vector<unsigned char>> key_lookup;
    1045             : 
    1046             :         // Track the global xpubs we have already seen. Just for sanity checking
    1047           0 :         std::set<CExtPubKey> global_xpubs;
    1048             : 
    1049             :         // Read global data
    1050           0 :         bool found_sep = false;
    1051           0 :         while(!s.empty()) {
    1052             :             // Read
    1053           0 :             std::vector<unsigned char> key;
    1054           0 :             s >> key;
    1055             : 
    1056             :             // the key is empty if that was actually a separator byte
    1057             :             // This is a special case for key lengths 0 as those are not allowed (except for separator)
    1058           0 :             if (key.empty()) {
    1059           0 :                 found_sep = true;
    1060           0 :                 break;
    1061             :             }
    1062             : 
    1063             :             // Type is compact size uint at beginning of key
    1064           0 :             SpanReader skey(s.GetType(), s.GetVersion(), key);
    1065           0 :             uint64_t type = ReadCompactSize(skey);
    1066             : 
    1067             :             // Do stuff based on type
    1068           0 :             switch(type) {
    1069             :                 case PSBT_GLOBAL_UNSIGNED_TX:
    1070             :                 {
    1071           0 :                     if (!key_lookup.emplace(key).second) {
    1072           0 :                         throw std::ios_base::failure("Duplicate Key, unsigned tx already provided");
    1073           0 :                     } else if (key.size() != 1) {
    1074           0 :                         throw std::ios_base::failure("Global unsigned tx key is more than one byte type");
    1075             :                     }
    1076           0 :                     CMutableTransaction mtx;
    1077             :                     // Set the stream to serialize with non-witness since this should always be non-witness
    1078           0 :                     OverrideStream<Stream> os(&s, s.GetType(), s.GetVersion() | SERIALIZE_TRANSACTION_NO_WITNESS);
    1079           0 :                     UnserializeFromVector(os, mtx);
    1080           0 :                     tx = std::move(mtx);
    1081             :                     // Make sure that all scriptSigs and scriptWitnesses are empty
    1082           0 :                     for (const CTxIn& txin : tx->vin) {
    1083           0 :                         if (!txin.scriptSig.empty() || !txin.scriptWitness.IsNull()) {
    1084           0 :                             throw std::ios_base::failure("Unsigned tx does not have empty scriptSigs and scriptWitnesses.");
    1085             :                         }
    1086             :                     }
    1087             :                     break;
    1088           0 :                 }
    1089             :                 case PSBT_GLOBAL_XPUB:
    1090             :                 {
    1091           0 :                     if (key.size() != BIP32_EXTKEY_WITH_VERSION_SIZE + 1) {
    1092           0 :                         throw std::ios_base::failure("Size of key was not the expected size for the type global xpub");
    1093             :                     }
    1094             :                     // Read in the xpub from key
    1095           0 :                     CExtPubKey xpub;
    1096           0 :                     xpub.DecodeWithVersion(&key.data()[1]);
    1097           0 :                     if (!xpub.pubkey.IsFullyValid()) {
    1098           0 :                        throw std::ios_base::failure("Invalid pubkey");
    1099             :                     }
    1100           0 :                     if (global_xpubs.count(xpub) > 0) {
    1101           0 :                        throw std::ios_base::failure("Duplicate key, global xpub already provided");
    1102             :                     }
    1103           0 :                     global_xpubs.insert(xpub);
    1104             :                     // Read in the keypath from stream
    1105           0 :                     KeyOriginInfo keypath;
    1106           0 :                     DeserializeHDKeypath(s, keypath);
    1107             : 
    1108             :                     // Note that we store these swapped to make searches faster.
    1109             :                     // Serialization uses xpub -> keypath to enqure key uniqueness
    1110           0 :                     if (m_xpubs.count(keypath) == 0) {
    1111             :                         // Make a new set to put the xpub in
    1112           0 :                         m_xpubs[keypath] = {xpub};
    1113           0 :                     } else {
    1114             :                         // Insert xpub into existing set
    1115           0 :                         m_xpubs[keypath].insert(xpub);
    1116             :                     }
    1117             :                     break;
    1118           0 :                 }
    1119             :                 case PSBT_GLOBAL_VERSION:
    1120             :                 {
    1121           0 :                     if (m_version) {
    1122           0 :                         throw std::ios_base::failure("Duplicate Key, version already provided");
    1123           0 :                     } else if (key.size() != 1) {
    1124           0 :                         throw std::ios_base::failure("Global version key is more than one byte type");
    1125             :                     }
    1126             :                     uint32_t v;
    1127           0 :                     UnserializeFromVector(s, v);
    1128           0 :                     m_version = v;
    1129           0 :                     if (*m_version > PSBT_HIGHEST_VERSION) {
    1130           0 :                         throw std::ios_base::failure("Unsupported version number");
    1131             :                     }
    1132           0 :                     break;
    1133             :                 }
    1134             :                 case PSBT_GLOBAL_PROPRIETARY:
    1135             :                 {
    1136           0 :                     PSBTProprietary this_prop;
    1137           0 :                     skey >> this_prop.identifier;
    1138           0 :                     this_prop.subtype = ReadCompactSize(skey);
    1139           0 :                     this_prop.key = key;
    1140             : 
    1141           0 :                     if (m_proprietary.count(this_prop) > 0) {
    1142           0 :                         throw std::ios_base::failure("Duplicate Key, proprietary key already found");
    1143             :                     }
    1144           0 :                     s >> this_prop.value;
    1145           0 :                     m_proprietary.insert(this_prop);
    1146             :                     break;
    1147           0 :                 }
    1148             :                 // Unknown stuff
    1149             :                 default: {
    1150           0 :                     if (unknown.count(key) > 0) {
    1151           0 :                         throw std::ios_base::failure("Duplicate Key, key for unknown value already provided");
    1152             :                     }
    1153             :                     // Read in the value
    1154           0 :                     std::vector<unsigned char> val_bytes;
    1155           0 :                     s >> val_bytes;
    1156           0 :                     unknown.emplace(std::move(key), std::move(val_bytes));
    1157           0 :                 }
    1158           0 :             }
    1159           0 :         }
    1160             : 
    1161           0 :         if (!found_sep) {
    1162           0 :             throw std::ios_base::failure("Separator is missing at the end of the global map");
    1163             :         }
    1164             : 
    1165             :         // Make sure that we got an unsigned tx
    1166           0 :         if (!tx) {
    1167           0 :             throw std::ios_base::failure("No unsigned transaction was provided");
    1168             :         }
    1169             : 
    1170             :         // Read input data
    1171           0 :         unsigned int i = 0;
    1172           0 :         while (!s.empty() && i < tx->vin.size()) {
    1173           0 :             PSBTInput input;
    1174           0 :             s >> input;
    1175           0 :             inputs.push_back(input);
    1176             : 
    1177             :             // Make sure the non-witness utxo matches the outpoint
    1178           0 :             if (input.non_witness_utxo && input.non_witness_utxo->GetHash() != tx->vin[i].prevout.hash) {
    1179           0 :                 throw std::ios_base::failure("Non-witness UTXO does not match outpoint hash");
    1180             :             }
    1181           0 :             ++i;
    1182           0 :         }
    1183             :         // Make sure that the number of inputs matches the number of inputs in the transaction
    1184           0 :         if (inputs.size() != tx->vin.size()) {
    1185           0 :             throw std::ios_base::failure("Inputs provided does not match the number of inputs in transaction.");
    1186             :         }
    1187             : 
    1188             :         // Read output data
    1189           0 :         i = 0;
    1190           0 :         while (!s.empty() && i < tx->vout.size()) {
    1191           0 :             PSBTOutput output;
    1192           0 :             s >> output;
    1193           0 :             outputs.push_back(output);
    1194           0 :             ++i;
    1195           0 :         }
    1196             :         // Make sure that the number of outputs matches the number of outputs in the transaction
    1197           0 :         if (outputs.size() != tx->vout.size()) {
    1198           0 :             throw std::ios_base::failure("Outputs provided does not match the number of outputs in transaction.");
    1199             :         }
    1200           0 :     }
    1201             : 
    1202             :     template <typename Stream>
    1203             :     PartiallySignedTransaction(deserialize_type, Stream& s) {
    1204             :         Unserialize(s);
    1205             :     }
    1206             : };
    1207             : 
    1208             : enum class PSBTRole {
    1209             :     CREATOR,
    1210             :     UPDATER,
    1211             :     SIGNER,
    1212             :     FINALIZER,
    1213             :     EXTRACTOR
    1214             : };
    1215             : 
    1216             : std::string PSBTRoleName(PSBTRole role);
    1217             : 
    1218             : /** Compute a PrecomputedTransactionData object from a psbt. */
    1219             : PrecomputedTransactionData PrecomputePSBTData(const PartiallySignedTransaction& psbt);
    1220             : 
    1221             : /** Checks whether a PSBTInput is already signed by checking for non-null finalized fields. */
    1222             : bool PSBTInputSigned(const PSBTInput& input);
    1223             : 
    1224             : /** Checks whether a PSBTInput is already signed by doing script verification using final fields. */
    1225             : bool PSBTInputSignedAndVerified(const PartiallySignedTransaction psbt, unsigned int input_index, const PrecomputedTransactionData* txdata);
    1226             : 
    1227             : /** Signs a PSBTInput, verifying that all provided data matches what is being signed.
    1228             :  *
    1229             :  * txdata should be the output of PrecomputePSBTData (which can be shared across
    1230             :  * multiple SignPSBTInput calls). If it is nullptr, a dummy signature will be created.
    1231             :  **/
    1232             : bool SignPSBTInput(const SigningProvider& provider, PartiallySignedTransaction& psbt, int index, const PrecomputedTransactionData* txdata, int sighash = SIGHASH_ALL, SignatureData* out_sigdata = nullptr, bool finalize = true);
    1233             : 
    1234             : /**  Reduces the size of the PSBT by dropping unnecessary `non_witness_utxos` (i.e. complete previous transactions) from a psbt when all inputs are segwit v1. */
    1235             : void RemoveUnnecessaryTransactions(PartiallySignedTransaction& psbtx, const int& sighash_type);
    1236             : 
    1237             : /** Counts the unsigned inputs of a PSBT. */
    1238             : size_t CountPSBTUnsignedInputs(const PartiallySignedTransaction& psbt);
    1239             : 
    1240             : /** Updates a PSBTOutput with information from provider.
    1241             :  *
    1242             :  * This fills in the redeem_script, witness_script, and hd_keypaths where possible.
    1243             :  */
    1244             : void UpdatePSBTOutput(const SigningProvider& provider, PartiallySignedTransaction& psbt, int index);
    1245             : 
    1246             : /**
    1247             :  * Finalizes a PSBT if possible, combining partial signatures.
    1248             :  *
    1249             :  * @param[in,out] psbtx PartiallySignedTransaction to finalize
    1250             :  * return True if the PSBT is now complete, false otherwise
    1251             :  */
    1252             : bool FinalizePSBT(PartiallySignedTransaction& psbtx);
    1253             : 
    1254             : /**
    1255             :  * Finalizes a PSBT if possible, and extracts it to a CMutableTransaction if it could be finalized.
    1256             :  *
    1257             :  * @param[in]  psbtx PartiallySignedTransaction
    1258             :  * @param[out] result CMutableTransaction representing the complete transaction, if successful
    1259             :  * @return True if we successfully extracted the transaction, false otherwise
    1260             :  */
    1261             : bool FinalizeAndExtractPSBT(PartiallySignedTransaction& psbtx, CMutableTransaction& result);
    1262             : 
    1263             : /**
    1264             :  * Combines PSBTs with the same underlying transaction, resulting in a single PSBT with all partial signatures from each input.
    1265             :  *
    1266             :  * @param[out] out   the combined PSBT, if successful
    1267             :  * @param[in]  psbtxs the PSBTs to combine
    1268             :  * @return error (OK if we successfully combined the transactions, other error if they were not compatible)
    1269             :  */
    1270             : [[nodiscard]] TransactionError CombinePSBTs(PartiallySignedTransaction& out, const std::vector<PartiallySignedTransaction>& psbtxs);
    1271             : 
    1272             : //! Decode a base64ed PSBT into a PartiallySignedTransaction
    1273             : [[nodiscard]] bool DecodeBase64PSBT(PartiallySignedTransaction& decoded_psbt, const std::string& base64_psbt, std::string& error);
    1274             : //! Decode a raw (binary blob) PSBT into a PartiallySignedTransaction
    1275             : [[nodiscard]] bool DecodeRawPSBT(PartiallySignedTransaction& decoded_psbt, Span<const std::byte> raw_psbt, std::string& error);
    1276             : 
    1277             : #endif // BITCOIN_PSBT_H

Generated by: LCOV version 1.14