Coverage Report

Created: 2026-04-20 22:07

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/root/bitcoin/src/script/interpreter.cpp
Line
Count
Source
1
// Copyright (c) 2009-2010 Satoshi Nakamoto
2
// Copyright (c) 2009-present The Bitcoin Core developers
3
// Distributed under the MIT software license, see the accompanying
4
// file COPYING or http://www.opensource.org/licenses/mit-license.php.
5
6
#include <script/interpreter.h>
7
8
#include <crypto/ripemd160.h>
9
#include <crypto/sha1.h>
10
#include <crypto/sha256.h>
11
#include <pubkey.h>
12
#include <script/script.h>
13
#include <tinyformat.h>
14
#include <uint256.h>
15
16
typedef std::vector<unsigned char> valtype;
17
18
namespace {
19
20
inline bool set_success(ScriptError* ret)
21
5.10M
{
22
5.10M
    if (ret)
23
4.45M
        *ret = SCRIPT_ERR_OK;
24
5.10M
    return true;
25
5.10M
}
26
27
inline bool set_error(ScriptError* ret, const ScriptError serror)
28
8.26M
{
29
8.26M
    if (ret)
30
6.31M
        *ret = serror;
31
8.26M
    return false;
32
8.26M
}
33
34
} // namespace
35
36
bool CastToBool(const valtype& vch)
37
2.81M
{
38
3.31M
    for (unsigned int i = 0; i < vch.size(); i++)
39
3.13M
    {
40
3.13M
        if (vch[i] != 0)
41
2.63M
        {
42
            // Can be negative zero
43
2.63M
            if (i == vch.size()-1 && vch[i] == 0x80)
44
9.64k
                return false;
45
2.62M
            return true;
46
2.63M
        }
47
3.13M
    }
48
184k
    return false;
49
2.81M
}
50
51
/**
52
 * Script is a stack machine (like Forth) that evaluates a predicate
53
 * returning a bool indicating valid or not.  There are no loops.
54
 */
55
11.2M
#define stacktop(i) (stack.at(size_t(int64_t(stack.size()) + int64_t{i})))
56
19.8k
#define altstacktop(i) (altstack.at(size_t(int64_t(altstack.size()) + int64_t{i})))
57
static inline void popstack(std::vector<valtype>& stack)
58
6.37M
{
59
6.37M
    if (stack.empty())
60
0
        throw std::runtime_error("popstack(): stack empty");
61
6.37M
    stack.pop_back();
62
6.37M
}
63
64
179k
bool static IsCompressedOrUncompressedPubKey(const valtype &vchPubKey) {
65
179k
    if (vchPubKey.size() < CPubKey::COMPRESSED_SIZE) {
66
        //  Non-canonical public key: too short
67
5.95k
        return false;
68
5.95k
    }
69
173k
    if (vchPubKey[0] == 0x04) {
70
31.8k
        if (vchPubKey.size() != CPubKey::SIZE) {
71
            //  Non-canonical public key: invalid length for uncompressed key
72
1.60k
            return false;
73
1.60k
        }
74
141k
    } else if (vchPubKey[0] == 0x02 || vchPubKey[0] == 0x03) {
75
138k
        if (vchPubKey.size() != CPubKey::COMPRESSED_SIZE) {
76
            //  Non-canonical public key: invalid length for compressed key
77
2.53k
            return false;
78
2.53k
        }
79
138k
    } else {
80
        //  Non-canonical public key: neither compressed nor uncompressed
81
2.92k
        return false;
82
2.92k
    }
83
166k
    return true;
84
173k
}
85
86
79.1k
bool static IsCompressedPubKey(const valtype &vchPubKey) {
87
79.1k
    if (vchPubKey.size() != CPubKey::COMPRESSED_SIZE) {
88
        //  Non-canonical public key: invalid length for compressed key
89
148
        return false;
90
148
    }
91
78.9k
    if (vchPubKey[0] != 0x02 && vchPubKey[0] != 0x03) {
92
        //  Non-canonical public key: invalid prefix for compressed key
93
14
        return false;
94
14
    }
95
78.9k
    return true;
96
78.9k
}
97
98
/**
99
 * A canonical signature exists of: <30> <total len> <02> <len R> <R> <02> <len S> <S> <hashtype>
100
 * Where R and S are not negative (their first byte has its highest bit not set), and not
101
 * excessively padded (do not start with a 0 byte, unless an otherwise negative number follows,
102
 * in which case a single 0 byte is necessary and even required).
103
 *
104
 * See https://bitcointalk.org/index.php?topic=8392.msg127623#msg127623
105
 *
106
 * This function is consensus-critical since BIP66.
107
 */
108
510k
bool static IsValidSignatureEncoding(const std::vector<unsigned char> &sig) {
109
    // Format: 0x30 [total-length] 0x02 [R-length] [R] 0x02 [S-length] [S] [sighash]
110
    // * total-length: 1-byte length descriptor of everything that follows,
111
    //   excluding the sighash byte.
112
    // * R-length: 1-byte length descriptor of the R value that follows.
113
    // * R: arbitrary-length big-endian encoded R value. It must use the shortest
114
    //   possible encoding for a positive integer (which means no null bytes at
115
    //   the start, except a single one when the next byte has its highest bit set).
116
    // * S-length: 1-byte length descriptor of the S value that follows.
117
    // * S: arbitrary-length big-endian encoded S value. The same rules apply.
118
    // * sighash: 1-byte value indicating what data is hashed (not part of the DER
119
    //   signature)
120
121
    // Minimum and maximum size constraints.
122
510k
    if (sig.size() < 9) return false;
123
491k
    if (sig.size() > 73) return false;
124
125
    // A signature is of type 0x30 (compound).
126
488k
    if (sig[0] != 0x30) return false;
127
128
    // Make sure the length covers the entire signature.
129
411k
    if (sig[1] != sig.size() - 3) return false;
130
131
    // Extract the length of the R element.
132
406k
    unsigned int lenR = sig[3];
133
134
    // Make sure the length of the S element is still inside the signature.
135
406k
    if (5 + lenR >= sig.size()) return false;
136
137
    // Extract the length of the S element.
138
403k
    unsigned int lenS = sig[5 + lenR];
139
140
    // Verify that the length of the signature matches the sum of the length
141
    // of the elements.
142
403k
    if ((size_t)(lenR + lenS + 7) != sig.size()) return false;
143
144
    // Check whether the R element is an integer.
145
401k
    if (sig[2] != 0x02) return false;
146
147
    // Zero-length integers are not allowed for R.
148
400k
    if (lenR == 0) return false;
149
150
    // Negative numbers are not allowed for R.
151
398k
    if (sig[4] & 0x80) return false;
152
153
    // Null bytes at the start of R are not allowed, unless R would
154
    // otherwise be interpreted as a negative number.
155
398k
    if (lenR > 1 && (sig[4] == 0x00) && !(sig[5] & 0x80)) return false;
156
157
    // Check whether the S element is an integer.
158
397k
    if (sig[lenR + 4] != 0x02) return false;
159
160
    // Zero-length integers are not allowed for S.
161
395k
    if (lenS == 0) return false;
162
163
    // Negative numbers are not allowed for S.
164
395k
    if (sig[lenR + 6] & 0x80) return false;
165
166
    // Null bytes at the start of S are not allowed, unless S would otherwise be
167
    // interpreted as a negative number.
168
394k
    if (lenS > 1 && (sig[lenR + 6] == 0x00) && !(sig[lenR + 7] & 0x80)) return false;
169
170
393k
    return true;
171
394k
}
172
173
181k
bool static IsLowDERSignature(const valtype &vchSig, ScriptError* serror) {
174
181k
    if (!IsValidSignatureEncoding(vchSig)) {
175
0
        return set_error(serror, SCRIPT_ERR_SIG_DER);
176
0
    }
177
    // https://bitcoin.stackexchange.com/a/12556:
178
    //     Also note that inside transaction signatures, an extra hashtype byte
179
    //     follows the actual signature data.
180
181k
    std::vector<unsigned char> vchSigCopy(vchSig.begin(), vchSig.begin() + vchSig.size() - 1);
181
    // If the S value is above the order of the curve divided by two, its
182
    // complement modulo the order could have been used instead, which is
183
    // one byte shorter when encoded correctly.
184
181k
    if (!CPubKey::CheckLowS(vchSigCopy)) {
185
1.19k
        return set_error(serror, SCRIPT_ERR_SIG_HIGH_S);
186
1.19k
    }
187
180k
    return true;
188
181k
}
189
190
198k
bool static IsDefinedHashtypeSignature(const valtype &vchSig) {
191
198k
    if (vchSig.size() == 0) {
192
0
        return false;
193
0
    }
194
198k
    unsigned char nHashType = vchSig[vchSig.size() - 1] & (~(SIGHASH_ANYONECANPAY));
195
198k
    if (nHashType < SIGHASH_ALL || nHashType > SIGHASH_SINGLE)
196
40.2k
        return false;
197
198
157k
    return true;
199
198k
}
200
201
527k
bool CheckSignatureEncoding(const std::vector<unsigned char> &vchSig, script_verify_flags flags, ScriptError* serror) {
202
    // Empty signature. Not strictly DER encoded, but allowed to provide a
203
    // compact way to provide an invalid signature for use with CHECK(MULTI)SIG
204
527k
    if (vchSig.size() == 0) {
205
67.4k
        return true;
206
67.4k
    }
207
459k
    if ((flags & (SCRIPT_VERIFY_DERSIG | SCRIPT_VERIFY_LOW_S | SCRIPT_VERIFY_STRICTENC)) != 0 && !IsValidSignatureEncoding(vchSig)) {
208
117k
        return set_error(serror, SCRIPT_ERR_SIG_DER);
209
342k
    } else if ((flags & SCRIPT_VERIFY_LOW_S) != 0 && !IsLowDERSignature(vchSig, serror)) {
210
        // serror is set
211
1.19k
        return false;
212
341k
    } else if ((flags & SCRIPT_VERIFY_STRICTENC) != 0 && !IsDefinedHashtypeSignature(vchSig)) {
213
40.2k
        return set_error(serror, SCRIPT_ERR_SIG_HASHTYPE);
214
40.2k
    }
215
300k
    return true;
216
459k
}
217
218
353k
bool static CheckPubKeyEncoding(const valtype &vchPubKey, script_verify_flags flags, const SigVersion &sigversion, ScriptError* serror) {
219
353k
    if ((flags & SCRIPT_VERIFY_STRICTENC) != 0 && !IsCompressedOrUncompressedPubKey(vchPubKey)) {
220
13.0k
        return set_error(serror, SCRIPT_ERR_PUBKEYTYPE);
221
13.0k
    }
222
    // Only compressed keys are accepted in segwit
223
340k
    if ((flags & SCRIPT_VERIFY_WITNESS_PUBKEYTYPE) != 0 && sigversion == SigVersion::WITNESS_V0 && !IsCompressedPubKey(vchPubKey)) {
224
162
        return set_error(serror, SCRIPT_ERR_WITNESS_PUBKEYTYPE);
225
162
    }
226
339k
    return true;
227
340k
}
228
229
int FindAndDelete(CScript& script, const CScript& b)
230
301k
{
231
301k
    int nFound = 0;
232
301k
    if (b.empty())
233
80
        return nFound;
234
301k
    CScript result;
235
301k
    CScript::const_iterator pc = script.begin(), pc2 = script.begin(), end = script.end();
236
301k
    opcodetype opcode;
237
301k
    do
238
43.0M
    {
239
43.0M
        result.insert(result.end(), pc2, pc);
240
47.1M
        while (static_cast<size_t>(end - pc) >= b.size() && std::equal(b.begin(), b.end(), pc))
241
4.09M
        {
242
4.09M
            pc = pc + b.size();
243
4.09M
            ++nFound;
244
4.09M
        }
245
43.0M
        pc2 = pc;
246
43.0M
    }
247
43.0M
    while (script.GetOp(pc, opcode));
248
249
301k
    if (nFound > 0) {
250
53.2k
        result.insert(result.end(), pc2, end);
251
53.2k
        script = std::move(result);
252
53.2k
    }
253
254
301k
    return nFound;
255
301k
}
256
257
namespace {
258
/** A data type to abstract out the condition stack during script execution.
259
 *
260
 * Conceptually it acts like a vector of booleans, one for each level of nested
261
 * IF/THEN/ELSE, indicating whether we're in the active or inactive branch of
262
 * each.
263
 *
264
 * The elements on the stack cannot be observed individually; we only need to
265
 * expose whether the stack is empty and whether or not any false values are
266
 * present at all. To implement OP_ELSE, a toggle_top modifier is added, which
267
 * flips the last value without returning it.
268
 *
269
 * This uses an optimized implementation that does not materialize the
270
 * actual stack. Instead, it just stores the size of the would-be stack,
271
 * and the position of the first false value in it.
272
 */
273
class ConditionStack {
274
private:
275
    //! A constant for m_first_false_pos to indicate there are no falses.
276
    static constexpr uint32_t NO_FALSE = std::numeric_limits<uint32_t>::max();
277
278
    //! The size of the implied stack.
279
    uint32_t m_stack_size = 0;
280
    //! The position of the first false value on the implied stack, or NO_FALSE if all true.
281
    uint32_t m_first_false_pos = NO_FALSE;
282
283
public:
284
4.43M
    bool empty() const { return m_stack_size == 0; }
285
56.2M
    bool all_true() const { return m_first_false_pos == NO_FALSE; }
286
    void push_back(bool f)
287
917k
    {
288
917k
        if (m_first_false_pos == NO_FALSE && !f) {
289
            // The stack consists of all true values, and a false is added.
290
            // The first false value will appear at the current size.
291
26.0k
            m_first_false_pos = m_stack_size;
292
26.0k
        }
293
917k
        ++m_stack_size;
294
917k
    }
295
    void pop_back()
296
134k
    {
297
134k
        assert(m_stack_size > 0);
298
134k
        --m_stack_size;
299
134k
        if (m_first_false_pos == m_stack_size) {
300
            // When popping off the first false value, everything becomes true.
301
13.7k
            m_first_false_pos = NO_FALSE;
302
13.7k
        }
303
134k
    }
304
    void toggle_top()
305
100k
    {
306
100k
        assert(m_stack_size > 0);
307
100k
        if (m_first_false_pos == NO_FALSE) {
308
            // The current stack is all true values; the first false will be the top.
309
39.0k
            m_first_false_pos = m_stack_size - 1;
310
61.7k
        } else if (m_first_false_pos == m_stack_size - 1) {
311
            // The top is the first false value; toggling it will make everything true.
312
35.7k
            m_first_false_pos = NO_FALSE;
313
35.7k
        } else {
314
            // There is a false value, but not on top. No action is needed as toggling
315
            // anything but the first false value is unobservable.
316
26.0k
        }
317
100k
    }
318
};
319
}
320
321
static bool EvalChecksigPreTapscript(const valtype& vchSig, const valtype& vchPubKey, CScript::const_iterator pbegincodehash, CScript::const_iterator pend, script_verify_flags flags, const BaseSignatureChecker& checker, SigVersion sigversion, ScriptError* serror, bool& fSuccess)
322
257k
{
323
257k
    assert(sigversion == SigVersion::BASE || sigversion == SigVersion::WITNESS_V0);
324
325
    // Subset of script starting at the most recent codeseparator
326
257k
    CScript scriptCode(pbegincodehash, pend);
327
328
    // Drop the signature in pre-segwit scripts but not segwit scripts
329
257k
    if (sigversion == SigVersion::BASE) {
330
180k
        int found = FindAndDelete(scriptCode, CScript() << vchSig);
331
180k
        if (found > 0 && (flags & SCRIPT_VERIFY_CONST_SCRIPTCODE))
332
7.82k
            return set_error(serror, SCRIPT_ERR_SIG_FINDANDDELETE);
333
180k
    }
334
335
249k
    if (!CheckSignatureEncoding(vchSig, flags, serror) || !CheckPubKeyEncoding(vchPubKey, flags, sigversion, serror)) {
336
        //serror is set
337
54.6k
        return false;
338
54.6k
    }
339
195k
    fSuccess = checker.CheckECDSASignature(vchSig, vchPubKey, scriptCode, sigversion);
340
341
195k
    if (!fSuccess && (flags & SCRIPT_VERIFY_NULLFAIL) && vchSig.size())
342
112k
        return set_error(serror, SCRIPT_ERR_SIG_NULLFAIL);
343
344
82.5k
    return true;
345
195k
}
346
347
static bool EvalChecksigTapscript(const valtype& sig, const valtype& pubkey, ScriptExecutionData& execdata, script_verify_flags flags, const BaseSignatureChecker& checker, SigVersion sigversion, ScriptError* serror, bool& success)
348
34.4k
{
349
34.4k
    assert(sigversion == SigVersion::TAPSCRIPT);
350
351
    /*
352
     *  The following validation sequence is consensus critical. Please note how --
353
     *    upgradable public key versions precede other rules;
354
     *    the script execution fails when using empty signature with invalid public key;
355
     *    the script execution fails when using non-empty invalid signature.
356
     */
357
34.4k
    success = !sig.empty();
358
34.4k
    if (success) {
359
        // Implement the sigops/witnesssize ratio test.
360
        // Passing with an upgradable public key version is also counted.
361
10.0k
        assert(execdata.m_validation_weight_left_init);
362
10.0k
        execdata.m_validation_weight_left -= VALIDATION_WEIGHT_PER_SIGOP_PASSED;
363
10.0k
        if (execdata.m_validation_weight_left < 0) {
364
16
            return set_error(serror, SCRIPT_ERR_TAPSCRIPT_VALIDATION_WEIGHT);
365
16
        }
366
10.0k
    }
367
34.3k
    if (pubkey.size() == 0) {
368
0
        return set_error(serror, SCRIPT_ERR_TAPSCRIPT_EMPTY_PUBKEY);
369
34.3k
    } else if (pubkey.size() == 32) {
370
34.2k
        if (success && !checker.CheckSchnorrSignature(sig, pubkey, sigversion, execdata, serror)) {
371
38
            return false; // serror is set
372
38
        }
373
34.2k
    } else {
374
        /*
375
         *  New public key version softforks should be defined before this `else` block.
376
         *  Generally, the new code should not do anything but failing the script execution. To avoid
377
         *  consensus bugs, it should not modify any existing values (including `success`).
378
         */
379
115
        if ((flags & SCRIPT_VERIFY_DISCOURAGE_UPGRADABLE_PUBKEYTYPE) != 0) {
380
4
            return set_error(serror, SCRIPT_ERR_DISCOURAGE_UPGRADABLE_PUBKEYTYPE);
381
4
        }
382
115
    }
383
384
34.3k
    return true;
385
34.3k
}
386
387
/** Helper for OP_CHECKSIG, OP_CHECKSIGVERIFY, and (in Tapscript) OP_CHECKSIGADD.
388
 *
389
 * A return value of false means the script fails entirely. When true is returned, the
390
 * success variable indicates whether the signature check itself succeeded.
391
 */
392
static bool EvalChecksig(const valtype& sig, const valtype& pubkey, CScript::const_iterator pbegincodehash, CScript::const_iterator pend, ScriptExecutionData& execdata, script_verify_flags flags, const BaseSignatureChecker& checker, SigVersion sigversion, ScriptError* serror, bool& success)
393
292k
{
394
292k
    switch (sigversion) {
395
180k
    case SigVersion::BASE:
396
257k
    case SigVersion::WITNESS_V0:
397
257k
        return EvalChecksigPreTapscript(sig, pubkey, pbegincodehash, pend, flags, checker, sigversion, serror, success);
398
34.4k
    case SigVersion::TAPSCRIPT:
399
34.4k
        return EvalChecksigTapscript(sig, pubkey, execdata, flags, checker, sigversion, serror, success);
400
0
    case SigVersion::TAPROOT:
401
        // Key path spending in Taproot has no script, so this is unreachable.
402
0
        break;
403
292k
    }
404
292k
    assert(false);
405
0
}
406
407
bool EvalScript(std::vector<std::vector<unsigned char> >& stack, const CScript& script, script_verify_flags flags, const BaseSignatureChecker& checker, SigVersion sigversion, ScriptExecutionData& execdata, ScriptError* serror)
408
5.02M
{
409
5.02M
    static const CScriptNum bnZero(0);
410
5.02M
    static const CScriptNum bnOne(1);
411
    // static const CScriptNum bnFalse(0);
412
    // static const CScriptNum bnTrue(1);
413
5.02M
    static const valtype vchFalse(0);
414
    // static const valtype vchZero(0);
415
5.02M
    static const valtype vchTrue(1, 1);
416
417
    // sigversion cannot be TAPROOT here, as it admits no script execution.
418
5.02M
    assert(sigversion == SigVersion::BASE || sigversion == SigVersion::WITNESS_V0 || sigversion == SigVersion::TAPSCRIPT);
419
420
5.02M
    CScript::const_iterator pc = script.begin();
421
5.02M
    CScript::const_iterator pend = script.end();
422
5.02M
    CScript::const_iterator pbegincodehash = script.begin();
423
5.02M
    opcodetype opcode;
424
5.02M
    valtype vchPushValue;
425
5.02M
    ConditionStack vfExec;
426
5.02M
    std::vector<valtype> altstack;
427
5.02M
    set_error(serror, SCRIPT_ERR_UNKNOWN_ERROR);
428
5.02M
    if ((sigversion == SigVersion::BASE || sigversion == SigVersion::WITNESS_V0) && script.size() > MAX_SCRIPT_SIZE) {
429
467
        return set_error(serror, SCRIPT_ERR_SCRIPT_SIZE);
430
467
    }
431
5.02M
    int nOpCount = 0;
432
5.02M
    bool fRequireMinimal = (flags & SCRIPT_VERIFY_MINIMALDATA) != 0;
433
5.02M
    uint32_t opcode_pos = 0;
434
5.02M
    execdata.m_codeseparator_pos = 0xFFFFFFFFUL;
435
5.02M
    execdata.m_codeseparator_pos_init = true;
436
437
5.02M
    try
438
5.02M
    {
439
60.4M
        for (; pc < pend; ++opcode_pos) {
440
56.2M
            bool fExec = vfExec.all_true();
441
442
            //
443
            // Read instruction
444
            //
445
56.2M
            if (!script.GetOp(pc, opcode, vchPushValue))
446
167k
                return set_error(serror, SCRIPT_ERR_BAD_OPCODE);
447
56.1M
            if (vchPushValue.size() > MAX_SCRIPT_ELEMENT_SIZE)
448
2.73k
                return set_error(serror, SCRIPT_ERR_PUSH_SIZE);
449
450
56.1M
            if (sigversion == SigVersion::BASE || sigversion == SigVersion::WITNESS_V0) {
451
                // Note how OP_RESERVED does not count towards the opcode limit.
452
55.5M
                if (opcode > OP_16 && ++nOpCount > MAX_OPS_PER_SCRIPT) {
453
5.03k
                    return set_error(serror, SCRIPT_ERR_OP_COUNT);
454
5.03k
                }
455
55.5M
            }
456
457
56.1M
            if (opcode == OP_CAT ||
458
56.1M
                opcode == OP_SUBSTR ||
459
56.1M
                opcode == OP_LEFT ||
460
56.1M
                opcode == OP_RIGHT ||
461
56.1M
                opcode == OP_INVERT ||
462
56.1M
                opcode == OP_AND ||
463
56.1M
                opcode == OP_OR ||
464
56.1M
                opcode == OP_XOR ||
465
56.1M
                opcode == OP_2MUL ||
466
56.1M
                opcode == OP_2DIV ||
467
56.1M
                opcode == OP_MUL ||
468
56.1M
                opcode == OP_DIV ||
469
56.1M
                opcode == OP_MOD ||
470
56.1M
                opcode == OP_LSHIFT ||
471
56.1M
                opcode == OP_RSHIFT)
472
40.1k
                return set_error(serror, SCRIPT_ERR_DISABLED_OPCODE); // Disabled opcodes (CVE-2010-5137).
473
474
            // With SCRIPT_VERIFY_CONST_SCRIPTCODE, OP_CODESEPARATOR in non-segwit script is rejected even in an unexecuted branch
475
56.0M
            if (opcode == OP_CODESEPARATOR && sigversion == SigVersion::BASE && (flags & SCRIPT_VERIFY_CONST_SCRIPTCODE))
476
3.94k
                return set_error(serror, SCRIPT_ERR_OP_CODESEPARATOR);
477
478
56.0M
            if (fExec && 0 <= opcode && opcode <= OP_PUSHDATA4) {
479
16.5M
                if (fRequireMinimal && !CheckMinimalPush(vchPushValue, opcode)) {
480
7.83k
                    return set_error(serror, SCRIPT_ERR_MINIMALDATA);
481
7.83k
                }
482
16.5M
                stack.push_back(vchPushValue);
483
39.5M
            } else if (fExec || (OP_IF <= opcode && opcode <= OP_ENDIF))
484
28.2M
            switch (opcode)
485
28.2M
            {
486
                //
487
                // Push value
488
                //
489
1.14M
                case OP_1NEGATE:
490
3.57M
                case OP_1:
491
3.84M
                case OP_2:
492
3.95M
                case OP_3:
493
4.49M
                case OP_4:
494
4.87M
                case OP_5:
495
5.20M
                case OP_6:
496
5.42M
                case OP_7:
497
6.14M
                case OP_8:
498
6.37M
                case OP_9:
499
6.57M
                case OP_10:
500
8.13M
                case OP_11:
501
8.21M
                case OP_12:
502
8.28M
                case OP_13:
503
8.53M
                case OP_14:
504
8.60M
                case OP_15:
505
8.75M
                case OP_16:
506
8.75M
                {
507
                    // ( -- value)
508
8.75M
                    CScriptNum bn((int)opcode - (int)(OP_1 - 1));
509
8.75M
                    stack.push_back(bn.getvch());
510
                    // The result of these opcodes should always be the minimal way to push the data
511
                    // they push, so no need for a CheckMinimalPush here.
512
8.75M
                }
513
8.75M
                break;
514
515
516
                //
517
                // Control
518
                //
519
10.0M
                case OP_NOP:
520
10.0M
                    break;
521
522
71.7k
                case OP_CHECKLOCKTIMEVERIFY:
523
71.7k
                {
524
71.7k
                    if (!(flags & SCRIPT_VERIFY_CHECKLOCKTIMEVERIFY)) {
525
                        // not enabled; treat as a NOP2
526
23.4k
                        break;
527
23.4k
                    }
528
529
48.3k
                    if (stack.size() < 1)
530
2.74k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
531
532
                    // Note that elsewhere numeric opcodes are limited to
533
                    // operands in the range -2**31+1 to 2**31-1, however it is
534
                    // legal for opcodes to produce results exceeding that
535
                    // range. This limitation is implemented by CScriptNum's
536
                    // default 4-byte limit.
537
                    //
538
                    // If we kept to that limit we'd have a year 2038 problem,
539
                    // even though the nLockTime field in transactions
540
                    // themselves is uint32 which only becomes meaningless
541
                    // after the year 2106.
542
                    //
543
                    // Thus as a special case we tell CScriptNum to accept up
544
                    // to 5-byte bignums, which are good until 2**39-1, well
545
                    // beyond the 2**32-1 limit of the nLockTime field itself.
546
45.5k
                    const CScriptNum nLockTime(stacktop(-1), fRequireMinimal, 5);
547
548
                    // In the rare event that the argument may be < 0 due to
549
                    // some arithmetic being done first, you can always use
550
                    // 0 MAX CHECKLOCKTIMEVERIFY.
551
45.5k
                    if (nLockTime < 0)
552
3.48k
                        return set_error(serror, SCRIPT_ERR_NEGATIVE_LOCKTIME);
553
554
                    // Actually compare the specified lock time with the transaction.
555
42.1k
                    if (!checker.CheckLockTime(nLockTime))
556
9.93k
                        return set_error(serror, SCRIPT_ERR_UNSATISFIED_LOCKTIME);
557
558
32.1k
                    break;
559
42.1k
                }
560
561
306k
                case OP_CHECKSEQUENCEVERIFY:
562
306k
                {
563
306k
                    if (!(flags & SCRIPT_VERIFY_CHECKSEQUENCEVERIFY)) {
564
                        // not enabled; treat as a NOP3
565
254k
                        break;
566
254k
                    }
567
568
52.2k
                    if (stack.size() < 1)
569
3.10k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
570
571
                    // nSequence, like nLockTime, is a 32-bit unsigned integer
572
                    // field. See the comment in CHECKLOCKTIMEVERIFY regarding
573
                    // 5-byte numeric operands.
574
49.1k
                    const CScriptNum nSequence(stacktop(-1), fRequireMinimal, 5);
575
576
                    // In the rare event that the argument may be < 0 due to
577
                    // some arithmetic being done first, you can always use
578
                    // 0 MAX CHECKSEQUENCEVERIFY.
579
49.1k
                    if (nSequence < 0)
580
2.59k
                        return set_error(serror, SCRIPT_ERR_NEGATIVE_LOCKTIME);
581
582
                    // To provide for future soft-fork extensibility, if the
583
                    // operand has the disabled lock-time flag set,
584
                    // CHECKSEQUENCEVERIFY behaves as a NOP.
585
46.5k
                    if ((nSequence & CTxIn::SEQUENCE_LOCKTIME_DISABLE_FLAG) != 0)
586
4.41k
                        break;
587
588
                    // Compare the specified sequence number with the input.
589
42.1k
                    if (!checker.CheckSequence(nSequence))
590
11.4k
                        return set_error(serror, SCRIPT_ERR_UNSATISFIED_LOCKTIME);
591
592
30.7k
                    break;
593
42.1k
                }
594
595
141k
                case OP_NOP1: case OP_NOP4: case OP_NOP5:
596
272k
                case OP_NOP6: case OP_NOP7: case OP_NOP8: case OP_NOP9: case OP_NOP10:
597
272k
                {
598
272k
                    if (flags & SCRIPT_VERIFY_DISCOURAGE_UPGRADABLE_NOPS)
599
8.41k
                        return set_error(serror, SCRIPT_ERR_DISCOURAGE_UPGRADABLE_NOPS);
600
272k
                }
601
263k
                break;
602
603
546k
                case OP_IF:
604
923k
                case OP_NOTIF:
605
923k
                {
606
                    // <expression> if [statements] [else [statements]] endif
607
923k
                    bool fValue = false;
608
923k
                    if (fExec)
609
610k
                    {
610
610k
                        if (stack.size() < 1)
611
5.86k
                            return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
612
604k
                        valtype& vch = stacktop(-1);
613
                        // Tapscript requires minimal IF/NOTIF inputs as a consensus rule.
614
604k
                        if (sigversion == SigVersion::TAPSCRIPT) {
615
                            // The input argument to the OP_IF and OP_NOTIF opcodes must be either
616
                            // exactly 0 (the empty vector) or exactly 1 (the one-byte vector with value 1).
617
8.12k
                            if (vch.size() > 1 || (vch.size() == 1 && vch[0] != 1)) {
618
10
                                return set_error(serror, SCRIPT_ERR_TAPSCRIPT_MINIMALIF);
619
10
                            }
620
8.12k
                        }
621
                        // Under witness v0 rules it is only a policy rule, enabled through SCRIPT_VERIFY_MINIMALIF.
622
604k
                        if (sigversion == SigVersion::WITNESS_V0 && (flags & SCRIPT_VERIFY_MINIMALIF)) {
623
19.6k
                            if (vch.size() > 1)
624
281
                                return set_error(serror, SCRIPT_ERR_MINIMALIF);
625
19.4k
                            if (vch.size() == 1 && vch[0] != 1)
626
94
                                return set_error(serror, SCRIPT_ERR_MINIMALIF);
627
19.4k
                        }
628
603k
                        fValue = CastToBool(vch);
629
603k
                        if (opcode == OP_NOTIF)
630
138k
                            fValue = !fValue;
631
603k
                        popstack(stack);
632
603k
                    }
633
917k
                    vfExec.push_back(fValue);
634
917k
                }
635
0
                break;
636
637
104k
                case OP_ELSE:
638
104k
                {
639
104k
                    if (vfExec.empty())
640
3.39k
                        return set_error(serror, SCRIPT_ERR_UNBALANCED_CONDITIONAL);
641
100k
                    vfExec.toggle_top();
642
100k
                }
643
0
                break;
644
645
139k
                case OP_ENDIF:
646
139k
                {
647
139k
                    if (vfExec.empty())
648
4.48k
                        return set_error(serror, SCRIPT_ERR_UNBALANCED_CONDITIONAL);
649
134k
                    vfExec.pop_back();
650
134k
                }
651
0
                break;
652
653
24.7k
                case OP_VERIFY:
654
24.7k
                {
655
                    // (true -- ) or
656
                    // (false -- false) and return
657
24.7k
                    if (stack.size() < 1)
658
5.10k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
659
19.6k
                    bool fValue = CastToBool(stacktop(-1));
660
19.6k
                    if (fValue)
661
16.8k
                        popstack(stack);
662
2.81k
                    else
663
2.81k
                        return set_error(serror, SCRIPT_ERR_VERIFY);
664
19.6k
                }
665
16.8k
                break;
666
667
16.8k
                case OP_RETURN:
668
7.46k
                {
669
7.46k
                    return set_error(serror, SCRIPT_ERR_OP_RETURN);
670
19.6k
                }
671
0
                break;
672
673
674
                //
675
                // Stack ops
676
                //
677
75.8k
                case OP_TOALTSTACK:
678
75.8k
                {
679
75.8k
                    if (stack.size() < 1)
680
4.70k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
681
71.1k
                    altstack.push_back(stacktop(-1));
682
71.1k
                    popstack(stack);
683
71.1k
                }
684
0
                break;
685
686
23.4k
                case OP_FROMALTSTACK:
687
23.4k
                {
688
23.4k
                    if (altstack.size() < 1)
689
3.66k
                        return set_error(serror, SCRIPT_ERR_INVALID_ALTSTACK_OPERATION);
690
19.8k
                    stack.push_back(altstacktop(-1));
691
19.8k
                    popstack(altstack);
692
19.8k
                }
693
0
                break;
694
695
25.9k
                case OP_2DROP:
696
25.9k
                {
697
                    // (x1 x2 -- )
698
25.9k
                    if (stack.size() < 2)
699
2.93k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
700
23.0k
                    popstack(stack);
701
23.0k
                    popstack(stack);
702
23.0k
                }
703
0
                break;
704
705
54.0k
                case OP_2DUP:
706
54.0k
                {
707
                    // (x1 x2 -- x1 x2 x1 x2)
708
54.0k
                    if (stack.size() < 2)
709
2.87k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
710
51.2k
                    valtype vch1 = stacktop(-2);
711
51.2k
                    valtype vch2 = stacktop(-1);
712
51.2k
                    stack.push_back(vch1);
713
51.2k
                    stack.push_back(vch2);
714
51.2k
                }
715
0
                break;
716
717
153k
                case OP_3DUP:
718
153k
                {
719
                    // (x1 x2 x3 -- x1 x2 x3 x1 x2 x3)
720
153k
                    if (stack.size() < 3)
721
6.15k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
722
147k
                    valtype vch1 = stacktop(-3);
723
147k
                    valtype vch2 = stacktop(-2);
724
147k
                    valtype vch3 = stacktop(-1);
725
147k
                    stack.push_back(vch1);
726
147k
                    stack.push_back(vch2);
727
147k
                    stack.push_back(vch3);
728
147k
                }
729
0
                break;
730
731
52.5k
                case OP_2OVER:
732
52.5k
                {
733
                    // (x1 x2 x3 x4 -- x1 x2 x3 x4 x1 x2)
734
52.5k
                    if (stack.size() < 4)
735
3.67k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
736
48.8k
                    valtype vch1 = stacktop(-4);
737
48.8k
                    valtype vch2 = stacktop(-3);
738
48.8k
                    stack.push_back(vch1);
739
48.8k
                    stack.push_back(vch2);
740
48.8k
                }
741
0
                break;
742
743
1.51M
                case OP_2ROT:
744
1.51M
                {
745
                    // (x1 x2 x3 x4 x5 x6 -- x3 x4 x5 x6 x1 x2)
746
1.51M
                    if (stack.size() < 6)
747
3.38k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
748
1.50M
                    valtype vch1 = stacktop(-6);
749
1.50M
                    valtype vch2 = stacktop(-5);
750
1.50M
                    stack.erase(stack.end()-6, stack.end()-4);
751
1.50M
                    stack.push_back(vch1);
752
1.50M
                    stack.push_back(vch2);
753
1.50M
                }
754
0
                break;
755
756
19.0k
                case OP_2SWAP:
757
19.0k
                {
758
                    // (x1 x2 x3 x4 -- x3 x4 x1 x2)
759
19.0k
                    if (stack.size() < 4)
760
4.12k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
761
14.8k
                    swap(stacktop(-4), stacktop(-2));
762
14.8k
                    swap(stacktop(-3), stacktop(-1));
763
14.8k
                }
764
0
                break;
765
766
76.7k
                case OP_IFDUP:
767
76.7k
                {
768
                    // (x - 0 | x x)
769
76.7k
                    if (stack.size() < 1)
770
3.27k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
771
73.4k
                    valtype vch = stacktop(-1);
772
73.4k
                    if (CastToBool(vch))
773
47.3k
                        stack.push_back(vch);
774
73.4k
                }
775
0
                break;
776
777
191k
                case OP_DEPTH:
778
191k
                {
779
                    // -- stacksize
780
191k
                    CScriptNum bn(stack.size());
781
191k
                    stack.push_back(bn.getvch());
782
191k
                }
783
191k
                break;
784
785
28.6k
                case OP_DROP:
786
28.6k
                {
787
                    // (x -- )
788
28.6k
                    if (stack.size() < 1)
789
3.19k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
790
25.5k
                    popstack(stack);
791
25.5k
                }
792
0
                break;
793
794
280k
                case OP_DUP:
795
280k
                {
796
                    // (x -- x x)
797
280k
                    if (stack.size() < 1)
798
35.2k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
799
245k
                    valtype vch = stacktop(-1);
800
245k
                    stack.push_back(vch);
801
245k
                }
802
0
                break;
803
804
371k
                case OP_NIP:
805
371k
                {
806
                    // (x1 x2 -- x2)
807
371k
                    if (stack.size() < 2)
808
2.88k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
809
368k
                    stack.erase(stack.end() - 2);
810
368k
                }
811
0
                break;
812
813
51.6k
                case OP_OVER:
814
51.6k
                {
815
                    // (x1 x2 -- x1 x2 x1)
816
51.6k
                    if (stack.size() < 2)
817
3.30k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
818
48.3k
                    valtype vch = stacktop(-2);
819
48.3k
                    stack.push_back(vch);
820
48.3k
                }
821
0
                break;
822
823
16.5k
                case OP_PICK:
824
79.9k
                case OP_ROLL:
825
79.9k
                {
826
                    // (xn ... x2 x1 x0 n - xn ... x2 x1 x0 xn)
827
                    // (xn ... x2 x1 x0 n - ... x2 x1 x0 xn)
828
79.9k
                    if (stack.size() < 2)
829
4.58k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
830
75.3k
                    int n = CScriptNum(stacktop(-1), fRequireMinimal).getint();
831
75.3k
                    popstack(stack);
832
75.3k
                    if (n < 0 || n >= (int)stack.size())
833
5.44k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
834
69.8k
                    valtype vch = stacktop(-n-1);
835
69.8k
                    if (opcode == OP_ROLL)
836
55.4k
                        stack.erase(stack.end()-n-1);
837
69.8k
                    stack.push_back(vch);
838
69.8k
                }
839
0
                break;
840
841
29.2k
                case OP_ROT:
842
29.2k
                {
843
                    // (x1 x2 x3 -- x2 x3 x1)
844
                    //  x2 x1 x3  after first swap
845
                    //  x2 x3 x1  after second swap
846
29.2k
                    if (stack.size() < 3)
847
3.47k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
848
25.7k
                    swap(stacktop(-3), stacktop(-2));
849
25.7k
                    swap(stacktop(-2), stacktop(-1));
850
25.7k
                }
851
0
                break;
852
853
45.9k
                case OP_SWAP:
854
45.9k
                {
855
                    // (x1 x2 -- x2 x1)
856
45.9k
                    if (stack.size() < 2)
857
3.06k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
858
42.8k
                    swap(stacktop(-2), stacktop(-1));
859
42.8k
                }
860
0
                break;
861
862
223k
                case OP_TUCK:
863
223k
                {
864
                    // (x1 x2 -- x2 x1 x2)
865
223k
                    if (stack.size() < 2)
866
4.99k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
867
218k
                    valtype vch = stacktop(-1);
868
218k
                    stack.insert(stack.end()-2, vch);
869
218k
                }
870
0
                break;
871
872
873
44.9k
                case OP_SIZE:
874
44.9k
                {
875
                    // (in -- in size)
876
44.9k
                    if (stack.size() < 1)
877
2.95k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
878
42.0k
                    CScriptNum bn(stacktop(-1).size());
879
42.0k
                    stack.push_back(bn.getvch());
880
42.0k
                }
881
0
                break;
882
883
884
                //
885
                // Bitwise logic
886
                //
887
215k
                case OP_EQUAL:
888
407k
                case OP_EQUALVERIFY:
889
                //case OP_NOTEQUAL: // use OP_NUMNOTEQUAL
890
407k
                {
891
                    // (x1 x2 - bool)
892
407k
                    if (stack.size() < 2)
893
3.37k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
894
404k
                    valtype& vch1 = stacktop(-2);
895
404k
                    valtype& vch2 = stacktop(-1);
896
404k
                    bool fEqual = (vch1 == vch2);
897
                    // OP_NOTEQUAL is disabled because it would be too easy to say
898
                    // something like n != 1 and have some wiseguy pass in 1 with extra
899
                    // zero bytes after it (numerically, 0x01 == 0x0001 == 0x000001)
900
                    //if (opcode == OP_NOTEQUAL)
901
                    //    fEqual = !fEqual;
902
404k
                    popstack(stack);
903
404k
                    popstack(stack);
904
404k
                    stack.push_back(fEqual ? vchTrue : vchFalse);
905
404k
                    if (opcode == OP_EQUALVERIFY)
906
190k
                    {
907
190k
                        if (fEqual)
908
183k
                            popstack(stack);
909
6.90k
                        else
910
6.90k
                            return set_error(serror, SCRIPT_ERR_EQUALVERIFY);
911
190k
                    }
912
404k
                }
913
397k
                break;
914
915
916
                //
917
                // Numeric
918
                //
919
397k
                case OP_1ADD:
920
59.2k
                case OP_1SUB:
921
103k
                case OP_NEGATE:
922
244k
                case OP_ABS:
923
281k
                case OP_NOT:
924
354k
                case OP_0NOTEQUAL:
925
354k
                {
926
                    // (in -- out)
927
354k
                    if (stack.size() < 1)
928
4.02k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
929
350k
                    CScriptNum bn(stacktop(-1), fRequireMinimal);
930
350k
                    switch (opcode)
931
350k
                    {
932
22.7k
                    case OP_1ADD:       bn += bnOne; break;
933
35.3k
                    case OP_1SUB:       bn -= bnOne; break;
934
43.0k
                    case OP_NEGATE:     bn = -bn; break;
935
139k
                    case OP_ABS:        if (bn < bnZero) bn = -bn; break;
936
35.9k
                    case OP_NOT:        bn = (bn == bnZero); break;
937
72.2k
                    case OP_0NOTEQUAL:  bn = (bn != bnZero); break;
938
0
                    default:            assert(!"invalid opcode"); break;
939
350k
                    }
940
348k
                    popstack(stack);
941
348k
                    stack.push_back(bn.getvch());
942
348k
                }
943
0
                break;
944
945
19.3k
                case OP_ADD:
946
37.7k
                case OP_SUB:
947
57.7k
                case OP_BOOLAND:
948
79.9k
                case OP_BOOLOR:
949
90.2k
                case OP_NUMEQUAL:
950
116k
                case OP_NUMEQUALVERIFY:
951
133k
                case OP_NUMNOTEQUAL:
952
146k
                case OP_LESSTHAN:
953
160k
                case OP_GREATERTHAN:
954
180k
                case OP_LESSTHANOREQUAL:
955
197k
                case OP_GREATERTHANOREQUAL:
956
241k
                case OP_MIN:
957
260k
                case OP_MAX:
958
260k
                {
959
                    // (x1 x2 -- out)
960
260k
                    if (stack.size() < 2)
961
11.1k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
962
248k
                    CScriptNum bn1(stacktop(-2), fRequireMinimal);
963
248k
                    CScriptNum bn2(stacktop(-1), fRequireMinimal);
964
248k
                    CScriptNum bn(0);
965
248k
                    switch (opcode)
966
248k
                    {
967
18.7k
                    case OP_ADD:
968
18.7k
                        bn = bn1 + bn2;
969
18.7k
                        break;
970
971
17.4k
                    case OP_SUB:
972
17.4k
                        bn = bn1 - bn2;
973
17.4k
                        break;
974
975
19.4k
                    case OP_BOOLAND:             bn = (bn1 != bnZero && bn2 != bnZero); break;
976
21.5k
                    case OP_BOOLOR:              bn = (bn1 != bnZero || bn2 != bnZero); break;
977
8.40k
                    case OP_NUMEQUAL:            bn = (bn1 == bn2); break;
978
24.3k
                    case OP_NUMEQUALVERIFY:      bn = (bn1 == bn2); break;
979
15.3k
                    case OP_NUMNOTEQUAL:         bn = (bn1 != bn2); break;
980
11.5k
                    case OP_LESSTHAN:            bn = (bn1 < bn2); break;
981
10.8k
                    case OP_GREATERTHAN:         bn = (bn1 > bn2); break;
982
19.1k
                    case OP_LESSTHANOREQUAL:     bn = (bn1 <= bn2); break;
983
16.2k
                    case OP_GREATERTHANOREQUAL:  bn = (bn1 >= bn2); break;
984
40.4k
                    case OP_MIN:                 bn = (bn1 < bn2 ? bn1 : bn2); break;
985
17.4k
                    case OP_MAX:                 bn = (bn1 > bn2 ? bn1 : bn2); break;
986
0
                    default:                     assert(!"invalid opcode"); break;
987
248k
                    }
988
241k
                    popstack(stack);
989
241k
                    popstack(stack);
990
241k
                    stack.push_back(bn.getvch());
991
992
241k
                    if (opcode == OP_NUMEQUALVERIFY)
993
24.3k
                    {
994
24.3k
                        if (CastToBool(stacktop(-1)))
995
21.2k
                            popstack(stack);
996
3.00k
                        else
997
3.00k
                            return set_error(serror, SCRIPT_ERR_NUMEQUALVERIFY);
998
24.3k
                    }
999
241k
                }
1000
238k
                break;
1001
1002
238k
                case OP_WITHIN:
1003
63.5k
                {
1004
                    // (x min max -- out)
1005
63.5k
                    if (stack.size() < 3)
1006
3.92k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
1007
59.6k
                    CScriptNum bn1(stacktop(-3), fRequireMinimal);
1008
59.6k
                    CScriptNum bn2(stacktop(-2), fRequireMinimal);
1009
59.6k
                    CScriptNum bn3(stacktop(-1), fRequireMinimal);
1010
59.6k
                    bool fValue = (bn2 <= bn1 && bn1 < bn3);
1011
59.6k
                    popstack(stack);
1012
59.6k
                    popstack(stack);
1013
59.6k
                    popstack(stack);
1014
59.6k
                    stack.push_back(fValue ? vchTrue : vchFalse);
1015
59.6k
                }
1016
0
                break;
1017
1018
1019
                //
1020
                // Crypto
1021
                //
1022
1.74M
                case OP_RIPEMD160:
1023
2.00M
                case OP_SHA1:
1024
2.03M
                case OP_SHA256:
1025
2.40M
                case OP_HASH160:
1026
2.45M
                case OP_HASH256:
1027
2.45M
                {
1028
                    // (in -- hash)
1029
2.45M
                    if (stack.size() < 1)
1030
52.4k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
1031
2.40M
                    valtype& vch = stacktop(-1);
1032
2.40M
                    valtype vchHash((opcode == OP_RIPEMD160 || opcode == OP_SHA1 || opcode == OP_HASH160) ? 20 : 32);
1033
2.40M
                    if (opcode == OP_RIPEMD160)
1034
1.74M
                        CRIPEMD160().Write(vch.data(), vch.size()).Finalize(vchHash.data());
1035
662k
                    else if (opcode == OP_SHA1)
1036
261k
                        CSHA1().Write(vch.data(), vch.size()).Finalize(vchHash.data());
1037
400k
                    else if (opcode == OP_SHA256)
1038
28.1k
                        CSHA256().Write(vch.data(), vch.size()).Finalize(vchHash.data());
1039
372k
                    else if (opcode == OP_HASH160)
1040
316k
                        CHash160().Write(vch).Finalize(vchHash);
1041
55.6k
                    else if (opcode == OP_HASH256)
1042
55.6k
                        CHash256().Write(vch).Finalize(vchHash);
1043
2.40M
                    popstack(stack);
1044
2.40M
                    stack.push_back(vchHash);
1045
2.40M
                }
1046
0
                break;
1047
1048
221k
                case OP_CODESEPARATOR:
1049
221k
                {
1050
                    // If SCRIPT_VERIFY_CONST_SCRIPTCODE flag is set, use of OP_CODESEPARATOR is rejected in pre-segwit
1051
                    // script, even in an unexecuted branch (this is checked above the opcode case statement).
1052
1053
                    // Hash starts after the code separator
1054
221k
                    pbegincodehash = pc;
1055
221k
                    execdata.m_codeseparator_pos = opcode_pos;
1056
221k
                }
1057
221k
                break;
1058
1059
266k
                case OP_CHECKSIG:
1060
294k
                case OP_CHECKSIGVERIFY:
1061
294k
                {
1062
                    // (sig pubkey -- bool)
1063
294k
                    if (stack.size() < 2)
1064
29.0k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
1065
1066
265k
                    valtype& vchSig    = stacktop(-2);
1067
265k
                    valtype& vchPubKey = stacktop(-1);
1068
1069
265k
                    bool fSuccess = true;
1070
265k
                    if (!EvalChecksig(vchSig, vchPubKey, pbegincodehash, pend, execdata, flags, checker, sigversion, serror, fSuccess)) return false;
1071
90.1k
                    popstack(stack);
1072
90.1k
                    popstack(stack);
1073
90.1k
                    stack.push_back(fSuccess ? vchTrue : vchFalse);
1074
90.1k
                    if (opcode == OP_CHECKSIGVERIFY)
1075
12.3k
                    {
1076
12.3k
                        if (fSuccess)
1077
7.69k
                            popstack(stack);
1078
4.69k
                        else
1079
4.69k
                            return set_error(serror, SCRIPT_ERR_CHECKSIGVERIFY);
1080
12.3k
                    }
1081
90.1k
                }
1082
85.4k
                break;
1083
1084
85.4k
                case OP_CHECKSIGADD:
1085
30.2k
                {
1086
                    // OP_CHECKSIGADD is only available in Tapscript
1087
30.2k
                    if (sigversion == SigVersion::BASE || sigversion == SigVersion::WITNESS_V0) return set_error(serror, SCRIPT_ERR_BAD_OPCODE);
1088
1089
                    // (sig num pubkey -- num)
1090
26.7k
                    if (stack.size() < 3) return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
1091
1092
26.7k
                    const valtype& sig = stacktop(-3);
1093
26.7k
                    const CScriptNum num(stacktop(-2), fRequireMinimal);
1094
26.7k
                    const valtype& pubkey = stacktop(-1);
1095
1096
26.7k
                    bool success = true;
1097
26.7k
                    if (!EvalChecksig(sig, pubkey, pbegincodehash, pend, execdata, flags, checker, sigversion, serror, success)) return false;
1098
26.7k
                    popstack(stack);
1099
26.7k
                    popstack(stack);
1100
26.7k
                    popstack(stack);
1101
26.7k
                    stack.push_back((num + (success ? 1 : 0)).getvch());
1102
26.7k
                }
1103
0
                break;
1104
1105
130k
                case OP_CHECKMULTISIG:
1106
172k
                case OP_CHECKMULTISIGVERIFY:
1107
172k
                {
1108
172k
                    if (sigversion == SigVersion::TAPSCRIPT) return set_error(serror, SCRIPT_ERR_TAPSCRIPT_CHECKMULTISIG);
1109
1110
                    // ([sig ...] num_of_signatures [pubkey ...] num_of_pubkeys -- bool)
1111
1112
172k
                    int i = 1;
1113
172k
                    if ((int)stack.size() < i)
1114
4.59k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
1115
1116
167k
                    int nKeysCount = CScriptNum(stacktop(-i), fRequireMinimal).getint();
1117
167k
                    if (nKeysCount < 0 || nKeysCount > MAX_PUBKEYS_PER_MULTISIG)
1118
4.89k
                        return set_error(serror, SCRIPT_ERR_PUBKEY_COUNT);
1119
162k
                    nOpCount += nKeysCount;
1120
162k
                    if (nOpCount > MAX_OPS_PER_SCRIPT)
1121
2.42k
                        return set_error(serror, SCRIPT_ERR_OP_COUNT);
1122
160k
                    int ikey = ++i;
1123
                    // ikey2 is the position of last non-signature item in the stack. Top stack item = 1.
1124
                    // With SCRIPT_VERIFY_NULLFAIL, this is used for cleanup if operation fails.
1125
160k
                    int ikey2 = nKeysCount + 2;
1126
160k
                    i += nKeysCount;
1127
160k
                    if ((int)stack.size() < i)
1128
5.61k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
1129
1130
154k
                    int nSigsCount = CScriptNum(stacktop(-i), fRequireMinimal).getint();
1131
154k
                    if (nSigsCount < 0 || nSigsCount > nKeysCount)
1132
4.71k
                        return set_error(serror, SCRIPT_ERR_SIG_COUNT);
1133
149k
                    int isig = ++i;
1134
149k
                    i += nSigsCount;
1135
149k
                    if ((int)stack.size() < i)
1136
3.70k
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
1137
1138
                    // Subset of script starting at the most recent codeseparator
1139
146k
                    CScript scriptCode(pbegincodehash, pend);
1140
1141
                    // Drop the signature in pre-segwit scripts but not segwit scripts
1142
300k
                    for (int k = 0; k < nSigsCount; k++)
1143
158k
                    {
1144
158k
                        valtype& vchSig = stacktop(-isig-k);
1145
158k
                        if (sigversion == SigVersion::BASE) {
1146
120k
                            int found = FindAndDelete(scriptCode, CScript() << vchSig);
1147
120k
                            if (found > 0 && (flags & SCRIPT_VERIFY_CONST_SCRIPTCODE))
1148
4.30k
                                return set_error(serror, SCRIPT_ERR_SIG_FINDANDDELETE);
1149
120k
                        }
1150
158k
                    }
1151
1152
141k
                    bool fSuccess = true;
1153
286k
                    while (fSuccess && nSigsCount > 0)
1154
155k
                    {
1155
155k
                        valtype& vchSig    = stacktop(-isig);
1156
155k
                        valtype& vchPubKey = stacktop(-ikey);
1157
1158
                        // Note how this makes the exact order of pubkey/signature evaluation
1159
                        // distinguishable by CHECKMULTISIG NOT if the STRICTENC flag is set.
1160
                        // See the script_(in)valid tests for details.
1161
155k
                        if (!CheckSignatureEncoding(vchSig, flags, serror) || !CheckPubKeyEncoding(vchPubKey, flags, sigversion, serror)) {
1162
                            // serror is set
1163
10.8k
                            return false;
1164
10.8k
                        }
1165
1166
                        // Check signature
1167
144k
                        bool fOk = checker.CheckECDSASignature(vchSig, vchPubKey, scriptCode, sigversion);
1168
1169
144k
                        if (fOk) {
1170
10.3k
                            isig++;
1171
10.3k
                            nSigsCount--;
1172
10.3k
                        }
1173
144k
                        ikey++;
1174
144k
                        nKeysCount--;
1175
1176
                        // If there are more signatures left than keys left,
1177
                        // then too many signatures have failed. Exit early,
1178
                        // without checking any further signatures.
1179
144k
                        if (nSigsCount > nKeysCount)
1180
23.2k
                            fSuccess = false;
1181
144k
                    }
1182
1183
                    // Clean up stack of actual arguments
1184
769k
                    while (i-- > 1) {
1185
                        // If the operation failed, we require that all signatures must be empty vector
1186
643k
                        if (!fSuccess && (flags & SCRIPT_VERIFY_NULLFAIL) && !ikey2 && stacktop(-1).size())
1187
4.45k
                            return set_error(serror, SCRIPT_ERR_SIG_NULLFAIL);
1188
638k
                        if (ikey2 > 0)
1189
547k
                            ikey2--;
1190
638k
                        popstack(stack);
1191
638k
                    }
1192
1193
                    // A bug causes CHECKMULTISIG to consume one extra argument
1194
                    // whose contents were not checked in any way.
1195
                    //
1196
                    // Unfortunately this is a potential source of mutability,
1197
                    // so optionally verify it is exactly equal to zero prior
1198
                    // to removing it from the stack.
1199
126k
                    if (stack.size() < 1)
1200
0
                        return set_error(serror, SCRIPT_ERR_INVALID_STACK_OPERATION);
1201
126k
                    if ((flags & SCRIPT_VERIFY_NULLDUMMY) && stacktop(-1).size())
1202
3.23k
                        return set_error(serror, SCRIPT_ERR_SIG_NULLDUMMY);
1203
123k
                    popstack(stack);
1204
1205
123k
                    stack.push_back(fSuccess ? vchTrue : vchFalse);
1206
1207
123k
                    if (opcode == OP_CHECKMULTISIGVERIFY)
1208
23.4k
                    {
1209
23.4k
                        if (fSuccess)
1210
22.0k
                            popstack(stack);
1211
1.41k
                        else
1212
1.41k
                            return set_error(serror, SCRIPT_ERR_CHECKMULTISIGVERIFY);
1213
23.4k
                    }
1214
123k
                }
1215
121k
                break;
1216
1217
121k
                default:
1218
56.2k
                    return set_error(serror, SCRIPT_ERR_BAD_OPCODE);
1219
28.2M
            }
1220
1221
            // Size limits
1222
55.4M
            if (stack.size() + altstack.size() > MAX_STACK_SIZE)
1223
2.25k
                return set_error(serror, SCRIPT_ERR_STACK_SIZE);
1224
55.4M
        }
1225
5.02M
    }
1226
5.02M
    catch (const scriptnum_error&)
1227
5.02M
    {
1228
28.0k
        return set_error(serror, SCRIPT_ERR_SCRIPTNUM);
1229
28.0k
    }
1230
5.02M
    catch (...)
1231
5.02M
    {
1232
0
        return set_error(serror, SCRIPT_ERR_UNKNOWN_ERROR);
1233
0
    }
1234
1235
4.18M
    if (!vfExec.empty())
1236
13.2k
        return set_error(serror, SCRIPT_ERR_UNBALANCED_CONDITIONAL);
1237
1238
4.17M
    return set_success(serror);
1239
4.18M
}
1240
1241
bool EvalScript(std::vector<std::vector<unsigned char> >& stack, const CScript& script, script_verify_flags flags, const BaseSignatureChecker& checker, SigVersion sigversion, ScriptError* serror)
1242
4.06M
{
1243
4.06M
    ScriptExecutionData execdata;
1244
4.06M
    return EvalScript(stack, script, flags, checker, sigversion, execdata, serror);
1245
4.06M
}
1246
1247
namespace {
1248
1249
/**
1250
 * Wrapper that serializes like CTransaction, but with the modifications
1251
 *  required for the signature hash done in-place
1252
 */
1253
template <class T>
1254
class CTransactionSignatureSerializer
1255
{
1256
private:
1257
    const T& txTo;             //!< reference to the spending transaction (the one being serialized)
1258
    const CScript& scriptCode; //!< output script being consumed
1259
    const unsigned int nIn;    //!< input index of txTo being signed
1260
    const bool fAnyoneCanPay;  //!< whether the hashtype has the SIGHASH_ANYONECANPAY flag set
1261
    const bool fHashSingle;    //!< whether the hashtype is SIGHASH_SINGLE
1262
    const bool fHashNone;      //!< whether the hashtype is SIGHASH_NONE
1263
1264
public:
1265
    CTransactionSignatureSerializer(const T& txToIn, const CScript& scriptCodeIn, unsigned int nInIn, int nHashTypeIn) :
1266
143k
        txTo(txToIn), scriptCode(scriptCodeIn), nIn(nInIn),
1267
143k
        fAnyoneCanPay(!!(nHashTypeIn & SIGHASH_ANYONECANPAY)),
1268
143k
        fHashSingle((nHashTypeIn & 0x1f) == SIGHASH_SINGLE),
1269
143k
        fHashNone((nHashTypeIn & 0x1f) == SIGHASH_NONE) {}
interpreter.cpp:_ZN12_GLOBAL__N_131CTransactionSignatureSerializerI12CTransactionEC2ERKS1_RK7CScriptji
Line
Count
Source
1266
41.8k
        txTo(txToIn), scriptCode(scriptCodeIn), nIn(nInIn),
1267
41.8k
        fAnyoneCanPay(!!(nHashTypeIn & SIGHASH_ANYONECANPAY)),
1268
41.8k
        fHashSingle((nHashTypeIn & 0x1f) == SIGHASH_SINGLE),
1269
41.8k
        fHashNone((nHashTypeIn & 0x1f) == SIGHASH_NONE) {}
interpreter.cpp:_ZN12_GLOBAL__N_131CTransactionSignatureSerializerI19CMutableTransactionEC2ERKS1_RK7CScriptji
Line
Count
Source
1266
101k
        txTo(txToIn), scriptCode(scriptCodeIn), nIn(nInIn),
1267
101k
        fAnyoneCanPay(!!(nHashTypeIn & SIGHASH_ANYONECANPAY)),
1268
101k
        fHashSingle((nHashTypeIn & 0x1f) == SIGHASH_SINGLE),
1269
101k
        fHashNone((nHashTypeIn & 0x1f) == SIGHASH_NONE) {}
1270
1271
    /** Serialize the passed scriptCode, skipping OP_CODESEPARATORs */
1272
    template<typename S>
1273
143k
    void SerializeScriptCode(S &s) const {
1274
143k
        CScript::const_iterator it = scriptCode.begin();
1275
143k
        CScript::const_iterator itBegin = it;
1276
143k
        opcodetype opcode;
1277
143k
        unsigned int nCodeSeparators = 0;
1278
145M
        while (scriptCode.GetOp(it, opcode)) {
1279
145M
            if (opcode == OP_CODESEPARATOR)
1280
33.4k
                nCodeSeparators++;
1281
145M
        }
1282
143k
        ::WriteCompactSize(s, scriptCode.size() - nCodeSeparators);
1283
143k
        it = itBegin;
1284
145M
        while (scriptCode.GetOp(it, opcode)) {
1285
145M
            if (opcode == OP_CODESEPARATOR) {
1286
33.4k
                s.write(std::as_bytes(std::span{&itBegin[0], size_t(it - itBegin - 1)}));
1287
33.4k
                itBegin = it;
1288
33.4k
            }
1289
145M
        }
1290
143k
        if (itBegin != scriptCode.end())
1291
133k
            s.write(std::as_bytes(std::span{&itBegin[0], size_t(it - itBegin)}));
1292
143k
    }
interpreter.cpp:_ZNK12_GLOBAL__N_131CTransactionSignatureSerializerI12CTransactionE19SerializeScriptCodeI10HashWriterEEvRT_
Line
Count
Source
1273
41.8k
    void SerializeScriptCode(S &s) const {
1274
41.8k
        CScript::const_iterator it = scriptCode.begin();
1275
41.8k
        CScript::const_iterator itBegin = it;
1276
41.8k
        opcodetype opcode;
1277
41.8k
        unsigned int nCodeSeparators = 0;
1278
24.0M
        while (scriptCode.GetOp(it, opcode)) {
1279
23.9M
            if (opcode == OP_CODESEPARATOR)
1280
28.2k
                nCodeSeparators++;
1281
23.9M
        }
1282
41.8k
        ::WriteCompactSize(s, scriptCode.size() - nCodeSeparators);
1283
41.8k
        it = itBegin;
1284
24.0M
        while (scriptCode.GetOp(it, opcode)) {
1285
23.9M
            if (opcode == OP_CODESEPARATOR) {
1286
28.2k
                s.write(std::as_bytes(std::span{&itBegin[0], size_t(it - itBegin - 1)}));
1287
28.2k
                itBegin = it;
1288
28.2k
            }
1289
23.9M
        }
1290
41.8k
        if (itBegin != scriptCode.end())
1291
41.4k
            s.write(std::as_bytes(std::span{&itBegin[0], size_t(it - itBegin)}));
1292
41.8k
    }
interpreter.cpp:_ZNK12_GLOBAL__N_131CTransactionSignatureSerializerI19CMutableTransactionE19SerializeScriptCodeI10HashWriterEEvRT_
Line
Count
Source
1273
101k
    void SerializeScriptCode(S &s) const {
1274
101k
        CScript::const_iterator it = scriptCode.begin();
1275
101k
        CScript::const_iterator itBegin = it;
1276
101k
        opcodetype opcode;
1277
101k
        unsigned int nCodeSeparators = 0;
1278
121M
        while (scriptCode.GetOp(it, opcode)) {
1279
121M
            if (opcode == OP_CODESEPARATOR)
1280
5.21k
                nCodeSeparators++;
1281
121M
        }
1282
101k
        ::WriteCompactSize(s, scriptCode.size() - nCodeSeparators);
1283
101k
        it = itBegin;
1284
121M
        while (scriptCode.GetOp(it, opcode)) {
1285
121M
            if (opcode == OP_CODESEPARATOR) {
1286
5.21k
                s.write(std::as_bytes(std::span{&itBegin[0], size_t(it - itBegin - 1)}));
1287
5.21k
                itBegin = it;
1288
5.21k
            }
1289
121M
        }
1290
101k
        if (itBegin != scriptCode.end())
1291
91.6k
            s.write(std::as_bytes(std::span{&itBegin[0], size_t(it - itBegin)}));
1292
101k
    }
1293
1294
    /** Serialize an input of txTo */
1295
    template<typename S>
1296
17.2M
    void SerializeInput(S &s, unsigned int nInput) const {
1297
        // In case of SIGHASH_ANYONECANPAY, only the input being signed is serialized
1298
17.2M
        if (fAnyoneCanPay)
1299
24.0k
            nInput = nIn;
1300
        // Serialize the prevout
1301
17.2M
        ::Serialize(s, txTo.vin[nInput].prevout);
1302
        // Serialize the script
1303
17.2M
        if (nInput != nIn)
1304
            // Blank out other inputs' signatures
1305
17.0M
            ::Serialize(s, CScript());
1306
143k
        else
1307
143k
            SerializeScriptCode(s);
1308
        // Serialize the nSequence
1309
17.2M
        if (nInput != nIn && (fHashSingle || fHashNone))
1310
            // let the others update at will
1311
4.94M
            ::Serialize(s, int32_t{0});
1312
12.2M
        else
1313
12.2M
            ::Serialize(s, txTo.vin[nInput].nSequence);
1314
17.2M
    }
interpreter.cpp:_ZNK12_GLOBAL__N_131CTransactionSignatureSerializerI12CTransactionE14SerializeInputI10HashWriterEEvRT_j
Line
Count
Source
1296
7.05M
    void SerializeInput(S &s, unsigned int nInput) const {
1297
        // In case of SIGHASH_ANYONECANPAY, only the input being signed is serialized
1298
7.05M
        if (fAnyoneCanPay)
1299
3.70k
            nInput = nIn;
1300
        // Serialize the prevout
1301
7.05M
        ::Serialize(s, txTo.vin[nInput].prevout);
1302
        // Serialize the script
1303
7.05M
        if (nInput != nIn)
1304
            // Blank out other inputs' signatures
1305
7.00M
            ::Serialize(s, CScript());
1306
41.8k
        else
1307
41.8k
            SerializeScriptCode(s);
1308
        // Serialize the nSequence
1309
7.05M
        if (nInput != nIn && (fHashSingle || fHashNone))
1310
            // let the others update at will
1311
1.92M
            ::Serialize(s, int32_t{0});
1312
5.12M
        else
1313
5.12M
            ::Serialize(s, txTo.vin[nInput].nSequence);
1314
7.05M
    }
interpreter.cpp:_ZNK12_GLOBAL__N_131CTransactionSignatureSerializerI19CMutableTransactionE14SerializeInputI10HashWriterEEvRT_j
Line
Count
Source
1296
10.1M
    void SerializeInput(S &s, unsigned int nInput) const {
1297
        // In case of SIGHASH_ANYONECANPAY, only the input being signed is serialized
1298
10.1M
        if (fAnyoneCanPay)
1299
20.3k
            nInput = nIn;
1300
        // Serialize the prevout
1301
10.1M
        ::Serialize(s, txTo.vin[nInput].prevout);
1302
        // Serialize the script
1303
10.1M
        if (nInput != nIn)
1304
            // Blank out other inputs' signatures
1305
10.0M
            ::Serialize(s, CScript());
1306
101k
        else
1307
101k
            SerializeScriptCode(s);
1308
        // Serialize the nSequence
1309
10.1M
        if (nInput != nIn && (fHashSingle || fHashNone))
1310
            // let the others update at will
1311
3.02M
            ::Serialize(s, int32_t{0});
1312
7.16M
        else
1313
7.16M
            ::Serialize(s, txTo.vin[nInput].nSequence);
1314
10.1M
    }
1315
1316
    /** Serialize an output of txTo */
1317
    template<typename S>
1318
1.80M
    void SerializeOutput(S &s, unsigned int nOutput) const {
1319
1.80M
        if (fHashSingle && nOutput != nIn)
1320
            // Do not lock-in the txout payee at other indices as txin
1321
466k
            ::Serialize(s, CTxOut());
1322
1.33M
        else
1323
1.33M
            ::Serialize(s, txTo.vout[nOutput]);
1324
1.80M
    }
interpreter.cpp:_ZNK12_GLOBAL__N_131CTransactionSignatureSerializerI12CTransactionE15SerializeOutputI10HashWriterEEvRT_j
Line
Count
Source
1318
646k
    void SerializeOutput(S &s, unsigned int nOutput) const {
1319
646k
        if (fHashSingle && nOutput != nIn)
1320
            // Do not lock-in the txout payee at other indices as txin
1321
160k
            ::Serialize(s, CTxOut());
1322
485k
        else
1323
485k
            ::Serialize(s, txTo.vout[nOutput]);
1324
646k
    }
interpreter.cpp:_ZNK12_GLOBAL__N_131CTransactionSignatureSerializerI19CMutableTransactionE15SerializeOutputI10HashWriterEEvRT_j
Line
Count
Source
1318
1.15M
    void SerializeOutput(S &s, unsigned int nOutput) const {
1319
1.15M
        if (fHashSingle && nOutput != nIn)
1320
            // Do not lock-in the txout payee at other indices as txin
1321
305k
            ::Serialize(s, CTxOut());
1322
853k
        else
1323
853k
            ::Serialize(s, txTo.vout[nOutput]);
1324
1.15M
    }
1325
1326
    /** Serialize txTo */
1327
    template<typename S>
1328
143k
    void Serialize(S &s) const {
1329
        // Serialize version
1330
143k
        ::Serialize(s, txTo.version);
1331
        // Serialize vin
1332
143k
        unsigned int nInputs = fAnyoneCanPay ? 1 : txTo.vin.size();
1333
143k
        ::WriteCompactSize(s, nInputs);
1334
17.3M
        for (unsigned int nInput = 0; nInput < nInputs; nInput++)
1335
17.2M
             SerializeInput(s, nInput);
1336
        // Serialize vout
1337
143k
        unsigned int nOutputs = fHashNone ? 0 : (fHashSingle ? nIn+1 : txTo.vout.size());
1338
143k
        ::WriteCompactSize(s, nOutputs);
1339
1.94M
        for (unsigned int nOutput = 0; nOutput < nOutputs; nOutput++)
1340
1.80M
             SerializeOutput(s, nOutput);
1341
        // Serialize nLockTime
1342
143k
        ::Serialize(s, txTo.nLockTime);
1343
143k
    }
interpreter.cpp:_ZNK12_GLOBAL__N_131CTransactionSignatureSerializerI12CTransactionE9SerializeI10HashWriterEEvRT_
Line
Count
Source
1328
41.8k
    void Serialize(S &s) const {
1329
        // Serialize version
1330
41.8k
        ::Serialize(s, txTo.version);
1331
        // Serialize vin
1332
41.8k
        unsigned int nInputs = fAnyoneCanPay ? 1 : txTo.vin.size();
1333
41.8k
        ::WriteCompactSize(s, nInputs);
1334
7.09M
        for (unsigned int nInput = 0; nInput < nInputs; nInput++)
1335
7.05M
             SerializeInput(s, nInput);
1336
        // Serialize vout
1337
41.8k
        unsigned int nOutputs = fHashNone ? 0 : (fHashSingle ? nIn+1 : txTo.vout.size());
1338
41.8k
        ::WriteCompactSize(s, nOutputs);
1339
688k
        for (unsigned int nOutput = 0; nOutput < nOutputs; nOutput++)
1340
646k
             SerializeOutput(s, nOutput);
1341
        // Serialize nLockTime
1342
41.8k
        ::Serialize(s, txTo.nLockTime);
1343
41.8k
    }
interpreter.cpp:_ZNK12_GLOBAL__N_131CTransactionSignatureSerializerI19CMutableTransactionE9SerializeI10HashWriterEEvRT_
Line
Count
Source
1328
101k
    void Serialize(S &s) const {
1329
        // Serialize version
1330
101k
        ::Serialize(s, txTo.version);
1331
        // Serialize vin
1332
101k
        unsigned int nInputs = fAnyoneCanPay ? 1 : txTo.vin.size();
1333
101k
        ::WriteCompactSize(s, nInputs);
1334
10.2M
        for (unsigned int nInput = 0; nInput < nInputs; nInput++)
1335
10.1M
             SerializeInput(s, nInput);
1336
        // Serialize vout
1337
101k
        unsigned int nOutputs = fHashNone ? 0 : (fHashSingle ? nIn+1 : txTo.vout.size());
1338
101k
        ::WriteCompactSize(s, nOutputs);
1339
1.26M
        for (unsigned int nOutput = 0; nOutput < nOutputs; nOutput++)
1340
1.15M
             SerializeOutput(s, nOutput);
1341
        // Serialize nLockTime
1342
101k
        ::Serialize(s, txTo.nLockTime);
1343
101k
    }
1344
};
1345
1346
/** Compute the (single) SHA256 of the concatenation of all prevouts of a tx. */
1347
template <class T>
1348
uint256 GetPrevoutsSHA256(const T& txTo)
1349
456k
{
1350
456k
    HashWriter ss{};
1351
1.34M
    for (const auto& txin : txTo.vin) {
1352
1.34M
        ss << txin.prevout;
1353
1.34M
    }
1354
456k
    return ss.GetSHA256();
1355
456k
}
interpreter.cpp:_ZN12_GLOBAL__N_117GetPrevoutsSHA256I12CTransactionEE7uint256RKT_
Line
Count
Source
1349
423k
{
1350
423k
    HashWriter ss{};
1351
1.27M
    for (const auto& txin : txTo.vin) {
1352
1.27M
        ss << txin.prevout;
1353
1.27M
    }
1354
423k
    return ss.GetSHA256();
1355
423k
}
interpreter.cpp:_ZN12_GLOBAL__N_117GetPrevoutsSHA256I19CMutableTransactionEE7uint256RKT_
Line
Count
Source
1349
33.6k
{
1350
33.6k
    HashWriter ss{};
1351
68.5k
    for (const auto& txin : txTo.vin) {
1352
68.5k
        ss << txin.prevout;
1353
68.5k
    }
1354
33.6k
    return ss.GetSHA256();
1355
33.6k
}
1356
1357
/** Compute the (single) SHA256 of the concatenation of all nSequences of a tx. */
1358
template <class T>
1359
uint256 GetSequencesSHA256(const T& txTo)
1360
454k
{
1361
454k
    HashWriter ss{};
1362
1.33M
    for (const auto& txin : txTo.vin) {
1363
1.33M
        ss << txin.nSequence;
1364
1.33M
    }
1365
454k
    return ss.GetSHA256();
1366
454k
}
interpreter.cpp:_ZN12_GLOBAL__N_118GetSequencesSHA256I12CTransactionEE7uint256RKT_
Line
Count
Source
1360
423k
{
1361
423k
    HashWriter ss{};
1362
1.27M
    for (const auto& txin : txTo.vin) {
1363
1.27M
        ss << txin.nSequence;
1364
1.27M
    }
1365
423k
    return ss.GetSHA256();
1366
423k
}
interpreter.cpp:_ZN12_GLOBAL__N_118GetSequencesSHA256I19CMutableTransactionEE7uint256RKT_
Line
Count
Source
1360
31.5k
{
1361
31.5k
    HashWriter ss{};
1362
62.0k
    for (const auto& txin : txTo.vin) {
1363
62.0k
        ss << txin.nSequence;
1364
62.0k
    }
1365
31.5k
    return ss.GetSHA256();
1366
31.5k
}
1367
1368
/** Compute the (single) SHA256 of the concatenation of all txouts of a tx. */
1369
template <class T>
1370
uint256 GetOutputsSHA256(const T& txTo)
1371
459k
{
1372
459k
    HashWriter ss{};
1373
2.94M
    for (const auto& txout : txTo.vout) {
1374
2.94M
        ss << txout;
1375
2.94M
    }
1376
459k
    return ss.GetSHA256();
1377
459k
}
interpreter.cpp:_ZN12_GLOBAL__N_116GetOutputsSHA256I12CTransactionEE7uint256RKT_
Line
Count
Source
1371
423k
{
1372
423k
    HashWriter ss{};
1373
2.84M
    for (const auto& txout : txTo.vout) {
1374
2.84M
        ss << txout;
1375
2.84M
    }
1376
423k
    return ss.GetSHA256();
1377
423k
}
interpreter.cpp:_ZN12_GLOBAL__N_116GetOutputsSHA256I19CMutableTransactionEE7uint256RKT_
Line
Count
Source
1371
36.4k
{
1372
36.4k
    HashWriter ss{};
1373
98.1k
    for (const auto& txout : txTo.vout) {
1374
98.1k
        ss << txout;
1375
98.1k
    }
1376
36.4k
    return ss.GetSHA256();
1377
36.4k
}
1378
1379
/** Compute the (single) SHA256 of the concatenation of all amounts spent by a tx. */
1380
uint256 GetSpentAmountsSHA256(const std::vector<CTxOut>& outputs_spent)
1381
22.5k
{
1382
22.5k
    HashWriter ss{};
1383
41.2k
    for (const auto& txout : outputs_spent) {
1384
41.2k
        ss << txout.nValue;
1385
41.2k
    }
1386
22.5k
    return ss.GetSHA256();
1387
22.5k
}
1388
1389
/** Compute the (single) SHA256 of the concatenation of all scriptPubKeys spent by a tx. */
1390
uint256 GetSpentScriptsSHA256(const std::vector<CTxOut>& outputs_spent)
1391
22.5k
{
1392
22.5k
    HashWriter ss{};
1393
41.2k
    for (const auto& txout : outputs_spent) {
1394
41.2k
        ss << txout.scriptPubKey;
1395
41.2k
    }
1396
22.5k
    return ss.GetSHA256();
1397
22.5k
}
1398
1399
1400
} // namespace
1401
1402
template <class T>
1403
void PrecomputedTransactionData::Init(const T& txTo, std::vector<CTxOut>&& spent_outputs, bool force)
1404
491k
{
1405
491k
    assert(!m_spent_outputs_ready);
1406
1407
491k
    m_spent_outputs = std::move(spent_outputs);
1408
491k
    if (!m_spent_outputs.empty()) {
1409
471k
        assert(m_spent_outputs.size() == txTo.vin.size());
1410
471k
        m_spent_outputs_ready = true;
1411
471k
    }
1412
1413
    // Determine which precomputation-impacting features this transaction uses.
1414
491k
    bool uses_bip143_segwit = force;
1415
491k
    bool uses_bip341_taproot = force;
1416
1.52M
    for (size_t inpos = 0; inpos < txTo.vin.size() && !(uses_bip143_segwit && uses_bip341_taproot); ++inpos) {
1417
1.03M
        if (!txTo.vin[inpos].scriptWitness.IsNull()) {
1418
804k
            if (m_spent_outputs_ready && m_spent_outputs[inpos].scriptPubKey.size() == 2 + WITNESS_V1_TAPROOT_SIZE &&
1419
804k
                m_spent_outputs[inpos].scriptPubKey[0] == OP_1) {
1420
                // Treat every witness-bearing spend with 34-byte scriptPubKey that starts with OP_1 as a Taproot
1421
                // spend. This only works if spent_outputs was provided as well, but if it wasn't, actual validation
1422
                // will fail anyway. Note that this branch may trigger for scriptPubKeys that aren't actually segwit
1423
                // but in that case validation will fail as SCRIPT_ERR_WITNESS_UNEXPECTED anyway.
1424
7.61k
                uses_bip341_taproot = true;
1425
796k
            } else {
1426
                // Treat every spend that's not known to native witness v1 as a Witness v0 spend. This branch may
1427
                // also be taken for unknown witness versions, but it is harmless, and being precise would require
1428
                // P2SH evaluation to find the redeemScript.
1429
796k
                uses_bip143_segwit = true;
1430
796k
            }
1431
804k
        }
1432
1.03M
        if (uses_bip341_taproot && uses_bip143_segwit) break; // No need to scan further if we already need all.
1433
1.03M
    }
1434
1435
491k
    if (uses_bip143_segwit || uses_bip341_taproot) {
1436
        // Computations shared between both sighash schemes.
1437
449k
        m_prevouts_single_hash = GetPrevoutsSHA256(txTo);
1438
449k
        m_sequences_single_hash = GetSequencesSHA256(txTo);
1439
449k
        m_outputs_single_hash = GetOutputsSHA256(txTo);
1440
449k
    }
1441
491k
    if (uses_bip143_segwit) {
1442
442k
        hashPrevouts = SHA256Uint256(m_prevouts_single_hash);
1443
442k
        hashSequence = SHA256Uint256(m_sequences_single_hash);
1444
442k
        hashOutputs = SHA256Uint256(m_outputs_single_hash);
1445
442k
        m_bip143_segwit_ready = true;
1446
442k
    }
1447
491k
    if (uses_bip341_taproot && m_spent_outputs_ready) {
1448
22.5k
        m_spent_amounts_single_hash = GetSpentAmountsSHA256(m_spent_outputs);
1449
22.5k
        m_spent_scripts_single_hash = GetSpentScriptsSHA256(m_spent_outputs);
1450
22.5k
        m_bip341_taproot_ready = true;
1451
22.5k
    }
1452
491k
}
_ZN26PrecomputedTransactionData4InitI12CTransactionEEvRKT_OSt6vectorI6CTxOutSaIS6_EEb
Line
Count
Source
1404
465k
{
1405
465k
    assert(!m_spent_outputs_ready);
1406
1407
465k
    m_spent_outputs = std::move(spent_outputs);
1408
465k
    if (!m_spent_outputs.empty()) {
1409
458k
        assert(m_spent_outputs.size() == txTo.vin.size());
1410
458k
        m_spent_outputs_ready = true;
1411
458k
    }
1412
1413
    // Determine which precomputation-impacting features this transaction uses.
1414
465k
    bool uses_bip143_segwit = force;
1415
465k
    bool uses_bip341_taproot = force;
1416
1.50M
    for (size_t inpos = 0; inpos < txTo.vin.size() && !(uses_bip143_segwit && uses_bip341_taproot); ++inpos) {
1417
1.03M
        if (!txTo.vin[inpos].scriptWitness.IsNull()) {
1418
804k
            if (m_spent_outputs_ready && m_spent_outputs[inpos].scriptPubKey.size() == 2 + WITNESS_V1_TAPROOT_SIZE &&
1419
804k
                m_spent_outputs[inpos].scriptPubKey[0] == OP_1) {
1420
                // Treat every witness-bearing spend with 34-byte scriptPubKey that starts with OP_1 as a Taproot
1421
                // spend. This only works if spent_outputs was provided as well, but if it wasn't, actual validation
1422
                // will fail anyway. Note that this branch may trigger for scriptPubKeys that aren't actually segwit
1423
                // but in that case validation will fail as SCRIPT_ERR_WITNESS_UNEXPECTED anyway.
1424
7.61k
                uses_bip341_taproot = true;
1425
796k
            } else {
1426
                // Treat every spend that's not known to native witness v1 as a Witness v0 spend. This branch may
1427
                // also be taken for unknown witness versions, but it is harmless, and being precise would require
1428
                // P2SH evaluation to find the redeemScript.
1429
796k
                uses_bip143_segwit = true;
1430
796k
            }
1431
804k
        }
1432
1.03M
        if (uses_bip341_taproot && uses_bip143_segwit) break; // No need to scan further if we already need all.
1433
1.03M
    }
1434
1435
465k
    if (uses_bip143_segwit || uses_bip341_taproot) {
1436
        // Computations shared between both sighash schemes.
1437
423k
        m_prevouts_single_hash = GetPrevoutsSHA256(txTo);
1438
423k
        m_sequences_single_hash = GetSequencesSHA256(txTo);
1439
423k
        m_outputs_single_hash = GetOutputsSHA256(txTo);
1440
423k
    }
1441
465k
    if (uses_bip143_segwit) {
1442
416k
        hashPrevouts = SHA256Uint256(m_prevouts_single_hash);
1443
416k
        hashSequence = SHA256Uint256(m_sequences_single_hash);
1444
416k
        hashOutputs = SHA256Uint256(m_outputs_single_hash);
1445
416k
        m_bip143_segwit_ready = true;
1446
416k
    }
1447
465k
    if (uses_bip341_taproot && m_spent_outputs_ready) {
1448
9.54k
        m_spent_amounts_single_hash = GetSpentAmountsSHA256(m_spent_outputs);
1449
9.54k
        m_spent_scripts_single_hash = GetSpentScriptsSHA256(m_spent_outputs);
1450
9.54k
        m_bip341_taproot_ready = true;
1451
9.54k
    }
1452
465k
}
_ZN26PrecomputedTransactionData4InitI19CMutableTransactionEEvRKT_OSt6vectorI6CTxOutSaIS6_EEb
Line
Count
Source
1404
26.1k
{
1405
26.1k
    assert(!m_spent_outputs_ready);
1406
1407
26.1k
    m_spent_outputs = std::move(spent_outputs);
1408
26.1k
    if (!m_spent_outputs.empty()) {
1409
12.9k
        assert(m_spent_outputs.size() == txTo.vin.size());
1410
12.9k
        m_spent_outputs_ready = true;
1411
12.9k
    }
1412
1413
    // Determine which precomputation-impacting features this transaction uses.
1414
26.1k
    bool uses_bip143_segwit = force;
1415
26.1k
    bool uses_bip341_taproot = force;
1416
26.1k
    for (size_t inpos = 0; inpos < txTo.vin.size() && !(uses_bip143_segwit && uses_bip341_taproot); ++inpos) {
1417
0
        if (!txTo.vin[inpos].scriptWitness.IsNull()) {
1418
0
            if (m_spent_outputs_ready && m_spent_outputs[inpos].scriptPubKey.size() == 2 + WITNESS_V1_TAPROOT_SIZE &&
1419
0
                m_spent_outputs[inpos].scriptPubKey[0] == OP_1) {
1420
                // Treat every witness-bearing spend with 34-byte scriptPubKey that starts with OP_1 as a Taproot
1421
                // spend. This only works if spent_outputs was provided as well, but if it wasn't, actual validation
1422
                // will fail anyway. Note that this branch may trigger for scriptPubKeys that aren't actually segwit
1423
                // but in that case validation will fail as SCRIPT_ERR_WITNESS_UNEXPECTED anyway.
1424
0
                uses_bip341_taproot = true;
1425
0
            } else {
1426
                // Treat every spend that's not known to native witness v1 as a Witness v0 spend. This branch may
1427
                // also be taken for unknown witness versions, but it is harmless, and being precise would require
1428
                // P2SH evaluation to find the redeemScript.
1429
0
                uses_bip143_segwit = true;
1430
0
            }
1431
0
        }
1432
0
        if (uses_bip341_taproot && uses_bip143_segwit) break; // No need to scan further if we already need all.
1433
0
    }
1434
1435
26.1k
    if (uses_bip143_segwit || uses_bip341_taproot) {
1436
        // Computations shared between both sighash schemes.
1437
26.1k
        m_prevouts_single_hash = GetPrevoutsSHA256(txTo);
1438
26.1k
        m_sequences_single_hash = GetSequencesSHA256(txTo);
1439
26.1k
        m_outputs_single_hash = GetOutputsSHA256(txTo);
1440
26.1k
    }
1441
26.1k
    if (uses_bip143_segwit) {
1442
26.1k
        hashPrevouts = SHA256Uint256(m_prevouts_single_hash);
1443
26.1k
        hashSequence = SHA256Uint256(m_sequences_single_hash);
1444
26.1k
        hashOutputs = SHA256Uint256(m_outputs_single_hash);
1445
26.1k
        m_bip143_segwit_ready = true;
1446
26.1k
    }
1447
26.1k
    if (uses_bip341_taproot && m_spent_outputs_ready) {
1448
12.9k
        m_spent_amounts_single_hash = GetSpentAmountsSHA256(m_spent_outputs);
1449
12.9k
        m_spent_scripts_single_hash = GetSpentScriptsSHA256(m_spent_outputs);
1450
12.9k
        m_bip341_taproot_ready = true;
1451
12.9k
    }
1452
26.1k
}
1453
1454
template <class T>
1455
PrecomputedTransactionData::PrecomputedTransactionData(const T& txTo)
1456
181
{
1457
181
    Init(txTo, {});
1458
181
}
_ZN26PrecomputedTransactionDataC2I12CTransactionEERKT_
Line
Count
Source
1456
181
{
1457
181
    Init(txTo, {});
1458
181
}
Unexecuted instantiation: _ZN26PrecomputedTransactionDataC2I19CMutableTransactionEERKT_
1459
1460
// explicit instantiation
1461
template void PrecomputedTransactionData::Init(const CTransaction& txTo, std::vector<CTxOut>&& spent_outputs, bool force);
1462
template void PrecomputedTransactionData::Init(const CMutableTransaction& txTo, std::vector<CTxOut>&& spent_outputs, bool force);
1463
template PrecomputedTransactionData::PrecomputedTransactionData(const CTransaction& txTo);
1464
template PrecomputedTransactionData::PrecomputedTransactionData(const CMutableTransaction& txTo);
1465
1466
const HashWriter HASHER_TAPSIGHASH{TaggedHash("TapSighash")};
1467
const HashWriter HASHER_TAPLEAF{TaggedHash("TapLeaf")};
1468
const HashWriter HASHER_TAPBRANCH{TaggedHash("TapBranch")};
1469
1470
static bool HandleMissingData(MissingDataBehavior mdb)
1471
449
{
1472
449
    switch (mdb) {
1473
0
    case MissingDataBehavior::ASSERT_FAIL:
1474
0
        assert(!"Missing data");
1475
0
        break;
1476
449
    case MissingDataBehavior::FAIL:
1477
449
        return false;
1478
449
    }
1479
449
    assert(!"Unknown MissingDataBehavior value");
1480
0
}
1481
1482
template<typename T>
1483
bool SignatureHashSchnorr(uint256& hash_out, ScriptExecutionData& execdata, const T& tx_to, uint32_t in_pos, uint8_t hash_type, SigVersion sigversion, const PrecomputedTransactionData& cache, MissingDataBehavior mdb)
1484
3.10k
{
1485
3.10k
    uint8_t ext_flag, key_version;
1486
3.10k
    switch (sigversion) {
1487
2.88k
    case SigVersion::TAPROOT:
1488
2.88k
        ext_flag = 0;
1489
        // key_version is not used and left uninitialized.
1490
2.88k
        break;
1491
220
    case SigVersion::TAPSCRIPT:
1492
220
        ext_flag = 1;
1493
        // key_version must be 0 for now, representing the current version of
1494
        // 32-byte public keys in the tapscript signature opcode execution.
1495
        // An upgradable public key version (with a size not 32-byte) may
1496
        // request a different key_version with a new sigversion.
1497
220
        key_version = 0;
1498
220
        break;
1499
0
    default:
1500
0
        assert(false);
1501
3.10k
    }
1502
3.10k
    assert(in_pos < tx_to.vin.size());
1503
3.10k
    if (!(cache.m_bip341_taproot_ready && cache.m_spent_outputs_ready)) {
1504
92
        return HandleMissingData(mdb);
1505
92
    }
1506
1507
3.01k
    HashWriter ss{HASHER_TAPSIGHASH};
1508
1509
    // Epoch
1510
3.01k
    static constexpr uint8_t EPOCH = 0;
1511
3.01k
    ss << EPOCH;
1512
1513
    // Hash type
1514
3.01k
    const uint8_t output_type = (hash_type == SIGHASH_DEFAULT) ? SIGHASH_ALL : (hash_type & SIGHASH_OUTPUT_MASK); // Default (no sighash byte) is equivalent to SIGHASH_ALL
1515
3.01k
    const uint8_t input_type = hash_type & SIGHASH_INPUT_MASK;
1516
3.01k
    if (!(hash_type <= 0x03 || (hash_type >= 0x81 && hash_type <= 0x83))) return false;
1517
2.85k
    ss << hash_type;
1518
1519
    // Transaction level data
1520
2.85k
    ss << tx_to.version;
1521
2.85k
    ss << tx_to.nLockTime;
1522
2.85k
    if (input_type != SIGHASH_ANYONECANPAY) {
1523
2.76k
        ss << cache.m_prevouts_single_hash;
1524
2.76k
        ss << cache.m_spent_amounts_single_hash;
1525
2.76k
        ss << cache.m_spent_scripts_single_hash;
1526
2.76k
        ss << cache.m_sequences_single_hash;
1527
2.76k
    }
1528
2.85k
    if (output_type == SIGHASH_ALL) {
1529
2.62k
        ss << cache.m_outputs_single_hash;
1530
2.62k
    }
1531
1532
    // Data about the input/prevout being spent
1533
2.85k
    assert(execdata.m_annex_init);
1534
2.85k
    const bool have_annex = execdata.m_annex_present;
1535
2.85k
    const uint8_t spend_type = (ext_flag << 1) + (have_annex ? 1 : 0); // The low bit indicates whether an annex is present.
1536
2.85k
    ss << spend_type;
1537
2.85k
    if (input_type == SIGHASH_ANYONECANPAY) {
1538
96
        ss << tx_to.vin[in_pos].prevout;
1539
96
        ss << cache.m_spent_outputs[in_pos];
1540
96
        ss << tx_to.vin[in_pos].nSequence;
1541
2.76k
    } else {
1542
2.76k
        ss << in_pos;
1543
2.76k
    }
1544
2.85k
    if (have_annex) {
1545
194
        ss << execdata.m_annex_hash;
1546
194
    }
1547
1548
    // Data about the output (if only one).
1549
2.85k
    if (output_type == SIGHASH_SINGLE) {
1550
208
        if (in_pos >= tx_to.vout.size()) return false;
1551
183
        if (!execdata.m_output_hash) {
1552
183
            HashWriter sha_single_output{};
1553
183
            sha_single_output << tx_to.vout[in_pos];
1554
183
            execdata.m_output_hash = sha_single_output.GetSHA256();
1555
183
        }
1556
183
        ss << execdata.m_output_hash.value();
1557
183
    }
1558
1559
    // Additional data for BIP 342 signatures
1560
2.83k
    if (sigversion == SigVersion::TAPSCRIPT) {
1561
216
        assert(execdata.m_tapleaf_hash_init);
1562
216
        ss << execdata.m_tapleaf_hash;
1563
216
        ss << key_version;
1564
216
        assert(execdata.m_codeseparator_pos_init);
1565
216
        ss << execdata.m_codeseparator_pos;
1566
216
    }
1567
1568
2.83k
    hash_out = ss.GetSHA256();
1569
2.83k
    return true;
1570
2.83k
}
_Z20SignatureHashSchnorrI12CTransactionEbR7uint256R19ScriptExecutionDataRKT_jh10SigVersionRK26PrecomputedTransactionData19MissingDataBehavior
Line
Count
Source
1484
2.57k
{
1485
2.57k
    uint8_t ext_flag, key_version;
1486
2.57k
    switch (sigversion) {
1487
2.35k
    case SigVersion::TAPROOT:
1488
2.35k
        ext_flag = 0;
1489
        // key_version is not used and left uninitialized.
1490
2.35k
        break;
1491
220
    case SigVersion::TAPSCRIPT:
1492
220
        ext_flag = 1;
1493
        // key_version must be 0 for now, representing the current version of
1494
        // 32-byte public keys in the tapscript signature opcode execution.
1495
        // An upgradable public key version (with a size not 32-byte) may
1496
        // request a different key_version with a new sigversion.
1497
220
        key_version = 0;
1498
220
        break;
1499
0
    default:
1500
0
        assert(false);
1501
2.57k
    }
1502
2.57k
    assert(in_pos < tx_to.vin.size());
1503
2.57k
    if (!(cache.m_bip341_taproot_ready && cache.m_spent_outputs_ready)) {
1504
51
        return HandleMissingData(mdb);
1505
51
    }
1506
1507
2.52k
    HashWriter ss{HASHER_TAPSIGHASH};
1508
1509
    // Epoch
1510
2.52k
    static constexpr uint8_t EPOCH = 0;
1511
2.52k
    ss << EPOCH;
1512
1513
    // Hash type
1514
2.52k
    const uint8_t output_type = (hash_type == SIGHASH_DEFAULT) ? SIGHASH_ALL : (hash_type & SIGHASH_OUTPUT_MASK); // Default (no sighash byte) is equivalent to SIGHASH_ALL
1515
2.52k
    const uint8_t input_type = hash_type & SIGHASH_INPUT_MASK;
1516
2.52k
    if (!(hash_type <= 0x03 || (hash_type >= 0x81 && hash_type <= 0x83))) return false;
1517
2.36k
    ss << hash_type;
1518
1519
    // Transaction level data
1520
2.36k
    ss << tx_to.version;
1521
2.36k
    ss << tx_to.nLockTime;
1522
2.36k
    if (input_type != SIGHASH_ANYONECANPAY) {
1523
2.27k
        ss << cache.m_prevouts_single_hash;
1524
2.27k
        ss << cache.m_spent_amounts_single_hash;
1525
2.27k
        ss << cache.m_spent_scripts_single_hash;
1526
2.27k
        ss << cache.m_sequences_single_hash;
1527
2.27k
    }
1528
2.36k
    if (output_type == SIGHASH_ALL) {
1529
2.12k
        ss << cache.m_outputs_single_hash;
1530
2.12k
    }
1531
1532
    // Data about the input/prevout being spent
1533
2.36k
    assert(execdata.m_annex_init);
1534
2.36k
    const bool have_annex = execdata.m_annex_present;
1535
2.36k
    const uint8_t spend_type = (ext_flag << 1) + (have_annex ? 1 : 0); // The low bit indicates whether an annex is present.
1536
2.36k
    ss << spend_type;
1537
2.36k
    if (input_type == SIGHASH_ANYONECANPAY) {
1538
96
        ss << tx_to.vin[in_pos].prevout;
1539
96
        ss << cache.m_spent_outputs[in_pos];
1540
96
        ss << tx_to.vin[in_pos].nSequence;
1541
2.27k
    } else {
1542
2.27k
        ss << in_pos;
1543
2.27k
    }
1544
2.36k
    if (have_annex) {
1545
194
        ss << execdata.m_annex_hash;
1546
194
    }
1547
1548
    // Data about the output (if only one).
1549
2.36k
    if (output_type == SIGHASH_SINGLE) {
1550
208
        if (in_pos >= tx_to.vout.size()) return false;
1551
183
        if (!execdata.m_output_hash) {
1552
183
            HashWriter sha_single_output{};
1553
183
            sha_single_output << tx_to.vout[in_pos];
1554
183
            execdata.m_output_hash = sha_single_output.GetSHA256();
1555
183
        }
1556
183
        ss << execdata.m_output_hash.value();
1557
183
    }
1558
1559
    // Additional data for BIP 342 signatures
1560
2.34k
    if (sigversion == SigVersion::TAPSCRIPT) {
1561
216
        assert(execdata.m_tapleaf_hash_init);
1562
216
        ss << execdata.m_tapleaf_hash;
1563
216
        ss << key_version;
1564
216
        assert(execdata.m_codeseparator_pos_init);
1565
216
        ss << execdata.m_codeseparator_pos;
1566
216
    }
1567
1568
2.34k
    hash_out = ss.GetSHA256();
1569
2.34k
    return true;
1570
2.34k
}
_Z20SignatureHashSchnorrI19CMutableTransactionEbR7uint256R19ScriptExecutionDataRKT_jh10SigVersionRK26PrecomputedTransactionData19MissingDataBehavior
Line
Count
Source
1484
533
{
1485
533
    uint8_t ext_flag, key_version;
1486
533
    switch (sigversion) {
1487
533
    case SigVersion::TAPROOT:
1488
533
        ext_flag = 0;
1489
        // key_version is not used and left uninitialized.
1490
533
        break;
1491
0
    case SigVersion::TAPSCRIPT:
1492
0
        ext_flag = 1;
1493
        // key_version must be 0 for now, representing the current version of
1494
        // 32-byte public keys in the tapscript signature opcode execution.
1495
        // An upgradable public key version (with a size not 32-byte) may
1496
        // request a different key_version with a new sigversion.
1497
0
        key_version = 0;
1498
0
        break;
1499
0
    default:
1500
0
        assert(false);
1501
533
    }
1502
533
    assert(in_pos < tx_to.vin.size());
1503
533
    if (!(cache.m_bip341_taproot_ready && cache.m_spent_outputs_ready)) {
1504
41
        return HandleMissingData(mdb);
1505
41
    }
1506
1507
492
    HashWriter ss{HASHER_TAPSIGHASH};
1508
1509
    // Epoch
1510
492
    static constexpr uint8_t EPOCH = 0;
1511
492
    ss << EPOCH;
1512
1513
    // Hash type
1514
492
    const uint8_t output_type = (hash_type == SIGHASH_DEFAULT) ? SIGHASH_ALL : (hash_type & SIGHASH_OUTPUT_MASK); // Default (no sighash byte) is equivalent to SIGHASH_ALL
1515
492
    const uint8_t input_type = hash_type & SIGHASH_INPUT_MASK;
1516
492
    if (!(hash_type <= 0x03 || (hash_type >= 0x81 && hash_type <= 0x83))) return false;
1517
492
    ss << hash_type;
1518
1519
    // Transaction level data
1520
492
    ss << tx_to.version;
1521
492
    ss << tx_to.nLockTime;
1522
492
    if (input_type != SIGHASH_ANYONECANPAY) {
1523
492
        ss << cache.m_prevouts_single_hash;
1524
492
        ss << cache.m_spent_amounts_single_hash;
1525
492
        ss << cache.m_spent_scripts_single_hash;
1526
492
        ss << cache.m_sequences_single_hash;
1527
492
    }
1528
492
    if (output_type == SIGHASH_ALL) {
1529
492
        ss << cache.m_outputs_single_hash;
1530
492
    }
1531
1532
    // Data about the input/prevout being spent
1533
492
    assert(execdata.m_annex_init);
1534
492
    const bool have_annex = execdata.m_annex_present;
1535
492
    const uint8_t spend_type = (ext_flag << 1) + (have_annex ? 1 : 0); // The low bit indicates whether an annex is present.
1536
492
    ss << spend_type;
1537
492
    if (input_type == SIGHASH_ANYONECANPAY) {
1538
0
        ss << tx_to.vin[in_pos].prevout;
1539
0
        ss << cache.m_spent_outputs[in_pos];
1540
0
        ss << tx_to.vin[in_pos].nSequence;
1541
492
    } else {
1542
492
        ss << in_pos;
1543
492
    }
1544
492
    if (have_annex) {
1545
0
        ss << execdata.m_annex_hash;
1546
0
    }
1547
1548
    // Data about the output (if only one).
1549
492
    if (output_type == SIGHASH_SINGLE) {
1550
0
        if (in_pos >= tx_to.vout.size()) return false;
1551
0
        if (!execdata.m_output_hash) {
1552
0
            HashWriter sha_single_output{};
1553
0
            sha_single_output << tx_to.vout[in_pos];
1554
0
            execdata.m_output_hash = sha_single_output.GetSHA256();
1555
0
        }
1556
0
        ss << execdata.m_output_hash.value();
1557
0
    }
1558
1559
    // Additional data for BIP 342 signatures
1560
492
    if (sigversion == SigVersion::TAPSCRIPT) {
1561
0
        assert(execdata.m_tapleaf_hash_init);
1562
0
        ss << execdata.m_tapleaf_hash;
1563
0
        ss << key_version;
1564
0
        assert(execdata.m_codeseparator_pos_init);
1565
0
        ss << execdata.m_codeseparator_pos;
1566
0
    }
1567
1568
492
    hash_out = ss.GetSHA256();
1569
492
    return true;
1570
492
}
1571
1572
int SigHashCache::CacheIndex(int32_t hash_type) const noexcept
1573
323k
{
1574
    // Note that we do not distinguish between BASE and WITNESS_V0 to determine the cache index,
1575
    // because no input can simultaneously use both.
1576
323k
    return 3 * !!(hash_type & SIGHASH_ANYONECANPAY) +
1577
323k
           2 * ((hash_type & 0x1f) == SIGHASH_SINGLE) +
1578
323k
           1 * ((hash_type & 0x1f) == SIGHASH_NONE);
1579
323k
}
1580
1581
bool SigHashCache::Load(int32_t hash_type, const CScript& script_code, HashWriter& writer) const noexcept
1582
198k
{
1583
198k
    auto& entry = m_cache_entries[CacheIndex(hash_type)];
1584
198k
    if (entry.has_value()) {
1585
75.3k
        if (script_code == entry->first) {
1586
72.9k
            writer = HashWriter(entry->second);
1587
72.9k
            return true;
1588
72.9k
        }
1589
75.3k
    }
1590
125k
    return false;
1591
198k
}
1592
1593
void SigHashCache::Store(int32_t hash_type, const CScript& script_code, const HashWriter& writer) noexcept
1594
125k
{
1595
125k
    auto& entry = m_cache_entries[CacheIndex(hash_type)];
1596
125k
    entry.emplace(script_code, writer);
1597
125k
}
1598
1599
template <class T>
1600
uint256 SignatureHash(const CScript& scriptCode, const T& txTo, unsigned int nIn, int32_t nHashType, const CAmount& amount, SigVersion sigversion, const PrecomputedTransactionData* cache, SigHashCache* sighash_cache)
1601
328k
{
1602
328k
    assert(nIn < txTo.vin.size());
1603
1604
328k
    if (sigversion != SigVersion::WITNESS_V0) {
1605
        // Check for invalid use of SIGHASH_SINGLE
1606
210k
        if ((nHashType & 0x1f) == SIGHASH_SINGLE) {
1607
29.9k
            if (nIn >= txTo.vout.size()) {
1608
                //  nOut out of range
1609
17.4k
                return uint256::ONE;
1610
17.4k
            }
1611
29.9k
        }
1612
210k
    }
1613
1614
311k
    HashWriter ss{};
1615
1616
    // Try to compute using cached SHA256 midstate.
1617
311k
    if (sighash_cache && sighash_cache->Load(nHashType, scriptCode, ss)) {
1618
        // Add sighash type and hash.
1619
72.9k
        ss << nHashType;
1620
72.9k
        return ss.GetHash();
1621
72.9k
    }
1622
1623
238k
    if (sigversion == SigVersion::WITNESS_V0) {
1624
95.0k
        uint256 hashPrevouts;
1625
95.0k
        uint256 hashSequence;
1626
95.0k
        uint256 hashOutputs;
1627
95.0k
        const bool cacheready = cache && cache->m_bip143_segwit_ready;
1628
1629
95.0k
        if (!(nHashType & SIGHASH_ANYONECANPAY)) {
1630
79.2k
            hashPrevouts = cacheready ? cache->hashPrevouts : SHA256Uint256(GetPrevoutsSHA256(txTo));
1631
79.2k
        }
1632
1633
95.0k
        if (!(nHashType & SIGHASH_ANYONECANPAY) && (nHashType & 0x1f) != SIGHASH_SINGLE && (nHashType & 0x1f) != SIGHASH_NONE) {
1634
28.9k
            hashSequence = cacheready ? cache->hashSequence : SHA256Uint256(GetSequencesSHA256(txTo));
1635
28.9k
        }
1636
1637
95.0k
        if ((nHashType & 0x1f) != SIGHASH_SINGLE && (nHashType & 0x1f) != SIGHASH_NONE) {
1638
35.9k
            hashOutputs = cacheready ? cache->hashOutputs : SHA256Uint256(GetOutputsSHA256(txTo));
1639
59.0k
        } else if ((nHashType & 0x1f) == SIGHASH_SINGLE && nIn < txTo.vout.size()) {
1640
23.2k
            HashWriter inner_ss{};
1641
23.2k
            inner_ss << txTo.vout[nIn];
1642
23.2k
            hashOutputs = inner_ss.GetHash();
1643
23.2k
        }
1644
1645
        // Version
1646
95.0k
        ss << txTo.version;
1647
        // Input prevouts/nSequence (none/all, depending on flags)
1648
95.0k
        ss << hashPrevouts;
1649
95.0k
        ss << hashSequence;
1650
        // The input being signed (replacing the scriptSig with scriptCode + amount)
1651
        // The prevout may already be contained in hashPrevout, and the nSequence
1652
        // may already be contain in hashSequence.
1653
95.0k
        ss << txTo.vin[nIn].prevout;
1654
95.0k
        ss << scriptCode;
1655
95.0k
        ss << amount;
1656
95.0k
        ss << txTo.vin[nIn].nSequence;
1657
        // Outputs (none/one/all, depending on flags)
1658
95.0k
        ss << hashOutputs;
1659
        // Locktime
1660
95.0k
        ss << txTo.nLockTime;
1661
143k
    } else {
1662
        // Wrapper to serialize only the necessary parts of the transaction being signed
1663
143k
        CTransactionSignatureSerializer<T> txTmp(txTo, scriptCode, nIn, nHashType);
1664
1665
        // Serialize
1666
143k
        ss << txTmp;
1667
143k
    }
1668
1669
    // If a cache object was provided, store the midstate there.
1670
238k
    if (sighash_cache != nullptr) {
1671
125k
        sighash_cache->Store(nHashType, scriptCode, ss);
1672
125k
    }
1673
1674
    // Add sighash type and hash.
1675
238k
    ss << nHashType;
1676
238k
    return ss.GetHash();
1677
311k
}
_Z13SignatureHashI12CTransactionE7uint256RK7CScriptRKT_jiRKl10SigVersionPK26PrecomputedTransactionDataP12SigHashCache
Line
Count
Source
1601
105k
{
1602
105k
    assert(nIn < txTo.vin.size());
1603
1604
105k
    if (sigversion != SigVersion::WITNESS_V0) {
1605
        // Check for invalid use of SIGHASH_SINGLE
1606
72.5k
        if ((nHashType & 0x1f) == SIGHASH_SINGLE) {
1607
7.25k
            if (nIn >= txTo.vout.size()) {
1608
                //  nOut out of range
1609
2.90k
                return uint256::ONE;
1610
2.90k
            }
1611
7.25k
        }
1612
72.5k
    }
1613
1614
102k
    HashWriter ss{};
1615
1616
    // Try to compute using cached SHA256 midstate.
1617
102k
    if (sighash_cache && sighash_cache->Load(nHashType, scriptCode, ss)) {
1618
        // Add sighash type and hash.
1619
36.9k
        ss << nHashType;
1620
36.9k
        return ss.GetHash();
1621
36.9k
    }
1622
1623
66.0k
    if (sigversion == SigVersion::WITNESS_V0) {
1624
24.1k
        uint256 hashPrevouts;
1625
24.1k
        uint256 hashSequence;
1626
24.1k
        uint256 hashOutputs;
1627
24.1k
        const bool cacheready = cache && cache->m_bip143_segwit_ready;
1628
1629
24.1k
        if (!(nHashType & SIGHASH_ANYONECANPAY)) {
1630
22.1k
            hashPrevouts = cacheready ? cache->hashPrevouts : SHA256Uint256(GetPrevoutsSHA256(txTo));
1631
22.1k
        }
1632
1633
24.1k
        if (!(nHashType & SIGHASH_ANYONECANPAY) && (nHashType & 0x1f) != SIGHASH_SINGLE && (nHashType & 0x1f) != SIGHASH_NONE) {
1634
6.22k
            hashSequence = cacheready ? cache->hashSequence : SHA256Uint256(GetSequencesSHA256(txTo));
1635
6.22k
        }
1636
1637
24.1k
        if ((nHashType & 0x1f) != SIGHASH_SINGLE && (nHashType & 0x1f) != SIGHASH_NONE) {
1638
6.75k
            hashOutputs = cacheready ? cache->hashOutputs : SHA256Uint256(GetOutputsSHA256(txTo));
1639
17.4k
        } else if ((nHashType & 0x1f) == SIGHASH_SINGLE && nIn < txTo.vout.size()) {
1640
6.19k
            HashWriter inner_ss{};
1641
6.19k
            inner_ss << txTo.vout[nIn];
1642
6.19k
            hashOutputs = inner_ss.GetHash();
1643
6.19k
        }
1644
1645
        // Version
1646
24.1k
        ss << txTo.version;
1647
        // Input prevouts/nSequence (none/all, depending on flags)
1648
24.1k
        ss << hashPrevouts;
1649
24.1k
        ss << hashSequence;
1650
        // The input being signed (replacing the scriptSig with scriptCode + amount)
1651
        // The prevout may already be contained in hashPrevout, and the nSequence
1652
        // may already be contain in hashSequence.
1653
24.1k
        ss << txTo.vin[nIn].prevout;
1654
24.1k
        ss << scriptCode;
1655
24.1k
        ss << amount;
1656
24.1k
        ss << txTo.vin[nIn].nSequence;
1657
        // Outputs (none/one/all, depending on flags)
1658
24.1k
        ss << hashOutputs;
1659
        // Locktime
1660
24.1k
        ss << txTo.nLockTime;
1661
41.8k
    } else {
1662
        // Wrapper to serialize only the necessary parts of the transaction being signed
1663
41.8k
        CTransactionSignatureSerializer<T> txTmp(txTo, scriptCode, nIn, nHashType);
1664
1665
        // Serialize
1666
41.8k
        ss << txTmp;
1667
41.8k
    }
1668
1669
    // If a cache object was provided, store the midstate there.
1670
66.0k
    if (sighash_cache != nullptr) {
1671
65.5k
        sighash_cache->Store(nHashType, scriptCode, ss);
1672
65.5k
    }
1673
1674
    // Add sighash type and hash.
1675
66.0k
    ss << nHashType;
1676
66.0k
    return ss.GetHash();
1677
102k
}
_Z13SignatureHashI19CMutableTransactionE7uint256RK7CScriptRKT_jiRKl10SigVersionPK26PrecomputedTransactionDataP12SigHashCache
Line
Count
Source
1601
222k
{
1602
222k
    assert(nIn < txTo.vin.size());
1603
1604
222k
    if (sigversion != SigVersion::WITNESS_V0) {
1605
        // Check for invalid use of SIGHASH_SINGLE
1606
138k
        if ((nHashType & 0x1f) == SIGHASH_SINGLE) {
1607
22.6k
            if (nIn >= txTo.vout.size()) {
1608
                //  nOut out of range
1609
14.5k
                return uint256::ONE;
1610
14.5k
            }
1611
22.6k
        }
1612
138k
    }
1613
1614
208k
    HashWriter ss{};
1615
1616
    // Try to compute using cached SHA256 midstate.
1617
208k
    if (sighash_cache && sighash_cache->Load(nHashType, scriptCode, ss)) {
1618
        // Add sighash type and hash.
1619
36.0k
        ss << nHashType;
1620
36.0k
        return ss.GetHash();
1621
36.0k
    }
1622
1623
172k
    if (sigversion == SigVersion::WITNESS_V0) {
1624
70.8k
        uint256 hashPrevouts;
1625
70.8k
        uint256 hashSequence;
1626
70.8k
        uint256 hashOutputs;
1627
70.8k
        const bool cacheready = cache && cache->m_bip143_segwit_ready;
1628
1629
70.8k
        if (!(nHashType & SIGHASH_ANYONECANPAY)) {
1630
57.1k
            hashPrevouts = cacheready ? cache->hashPrevouts : SHA256Uint256(GetPrevoutsSHA256(txTo));
1631
57.1k
        }
1632
1633
70.8k
        if (!(nHashType & SIGHASH_ANYONECANPAY) && (nHashType & 0x1f) != SIGHASH_SINGLE && (nHashType & 0x1f) != SIGHASH_NONE) {
1634
22.7k
            hashSequence = cacheready ? cache->hashSequence : SHA256Uint256(GetSequencesSHA256(txTo));
1635
22.7k
        }
1636
1637
70.8k
        if ((nHashType & 0x1f) != SIGHASH_SINGLE && (nHashType & 0x1f) != SIGHASH_NONE) {
1638
29.2k
            hashOutputs = cacheready ? cache->hashOutputs : SHA256Uint256(GetOutputsSHA256(txTo));
1639
41.6k
        } else if ((nHashType & 0x1f) == SIGHASH_SINGLE && nIn < txTo.vout.size()) {
1640
17.0k
            HashWriter inner_ss{};
1641
17.0k
            inner_ss << txTo.vout[nIn];
1642
17.0k
            hashOutputs = inner_ss.GetHash();
1643
17.0k
        }
1644
1645
        // Version
1646
70.8k
        ss << txTo.version;
1647
        // Input prevouts/nSequence (none/all, depending on flags)
1648
70.8k
        ss << hashPrevouts;
1649
70.8k
        ss << hashSequence;
1650
        // The input being signed (replacing the scriptSig with scriptCode + amount)
1651
        // The prevout may already be contained in hashPrevout, and the nSequence
1652
        // may already be contain in hashSequence.
1653
70.8k
        ss << txTo.vin[nIn].prevout;
1654
70.8k
        ss << scriptCode;
1655
70.8k
        ss << amount;
1656
70.8k
        ss << txTo.vin[nIn].nSequence;
1657
        // Outputs (none/one/all, depending on flags)
1658
70.8k
        ss << hashOutputs;
1659
        // Locktime
1660
70.8k
        ss << txTo.nLockTime;
1661
101k
    } else {
1662
        // Wrapper to serialize only the necessary parts of the transaction being signed
1663
101k
        CTransactionSignatureSerializer<T> txTmp(txTo, scriptCode, nIn, nHashType);
1664
1665
        // Serialize
1666
101k
        ss << txTmp;
1667
101k
    }
1668
1669
    // If a cache object was provided, store the midstate there.
1670
172k
    if (sighash_cache != nullptr) {
1671
59.8k
        sighash_cache->Store(nHashType, scriptCode, ss);
1672
59.8k
    }
1673
1674
    // Add sighash type and hash.
1675
172k
    ss << nHashType;
1676
172k
    return ss.GetHash();
1677
208k
}
1678
1679
template <class T>
1680
bool GenericTransactionSignatureChecker<T>::VerifyECDSASignature(const std::vector<unsigned char>& vchSig, const CPubKey& pubkey, const uint256& sighash) const
1681
164k
{
1682
164k
    return pubkey.Verify(sighash, vchSig);
1683
164k
}
_ZNK34GenericTransactionSignatureCheckerI12CTransactionE20VerifyECDSASignatureERKSt6vectorIhSaIhEERK7CPubKeyRK7uint256
Line
Count
Source
1681
105k
{
1682
105k
    return pubkey.Verify(sighash, vchSig);
1683
105k
}
_ZNK34GenericTransactionSignatureCheckerI19CMutableTransactionE20VerifyECDSASignatureERKSt6vectorIhSaIhEERK7CPubKeyRK7uint256
Line
Count
Source
1681
59.1k
{
1682
59.1k
    return pubkey.Verify(sighash, vchSig);
1683
59.1k
}
1684
1685
template <class T>
1686
bool GenericTransactionSignatureChecker<T>::VerifySchnorrSignature(std::span<const unsigned char> sig, const XOnlyPubKey& pubkey, const uint256& sighash) const
1687
3.07k
{
1688
3.07k
    return pubkey.VerifySchnorr(sighash, sig);
1689
3.07k
}
_ZNK34GenericTransactionSignatureCheckerI12CTransactionE22VerifySchnorrSignatureESt4spanIKhLm18446744073709551615EERK11XOnlyPubKeyRK7uint256
Line
Count
Source
1687
2.58k
{
1688
2.58k
    return pubkey.VerifySchnorr(sighash, sig);
1689
2.58k
}
_ZNK34GenericTransactionSignatureCheckerI19CMutableTransactionE22VerifySchnorrSignatureESt4spanIKhLm18446744073709551615EERK11XOnlyPubKeyRK7uint256
Line
Count
Source
1687
492
{
1688
492
    return pubkey.VerifySchnorr(sighash, sig);
1689
492
}
1690
1691
template <class T>
1692
bool GenericTransactionSignatureChecker<T>::CheckECDSASignature(const std::vector<unsigned char>& vchSigIn, const std::vector<unsigned char>& vchPubKey, const CScript& scriptCode, SigVersion sigversion) const
1693
273k
{
1694
273k
    CPubKey pubkey(vchPubKey);
1695
273k
    if (!pubkey.IsValid())
1696
99.7k
        return false;
1697
1698
    // Hash type is one byte tacked on to the end of the signature
1699
173k
    std::vector<unsigned char> vchSig(vchSigIn);
1700
173k
    if (vchSig.empty())
1701
8.98k
        return false;
1702
164k
    int nHashType = vchSig.back();
1703
164k
    vchSig.pop_back();
1704
1705
    // Witness sighashes need the amount.
1706
164k
    if (sigversion == SigVersion::WITNESS_V0 && amount < 0) return HandleMissingData(m_mdb);
1707
1708
164k
    uint256 sighash = SignatureHash(scriptCode, *txTo, nIn, nHashType, amount, sigversion, this->txdata, &m_sighash_cache);
1709
1710
164k
    if (!VerifyECDSASignature(vchSig, pubkey, sighash))
1711
158k
        return false;
1712
1713
6.21k
    return true;
1714
164k
}
_ZNK34GenericTransactionSignatureCheckerI12CTransactionE19CheckECDSASignatureERKSt6vectorIhSaIhEES6_RK7CScript10SigVersion
Line
Count
Source
1693
210k
{
1694
210k
    CPubKey pubkey(vchPubKey);
1695
210k
    if (!pubkey.IsValid())
1696
99.7k
        return false;
1697
1698
    // Hash type is one byte tacked on to the end of the signature
1699
110k
    std::vector<unsigned char> vchSig(vchSigIn);
1700
110k
    if (vchSig.empty())
1701
5.53k
        return false;
1702
105k
    int nHashType = vchSig.back();
1703
105k
    vchSig.pop_back();
1704
1705
    // Witness sighashes need the amount.
1706
105k
    if (sigversion == SigVersion::WITNESS_V0 && amount < 0) return HandleMissingData(m_mdb);
1707
1708
105k
    uint256 sighash = SignatureHash(scriptCode, *txTo, nIn, nHashType, amount, sigversion, this->txdata, &m_sighash_cache);
1709
1710
105k
    if (!VerifyECDSASignature(vchSig, pubkey, sighash))
1711
103k
        return false;
1712
1713
2.02k
    return true;
1714
105k
}
_ZNK34GenericTransactionSignatureCheckerI19CMutableTransactionE19CheckECDSASignatureERKSt6vectorIhSaIhEES6_RK7CScript10SigVersion
Line
Count
Source
1693
62.5k
{
1694
62.5k
    CPubKey pubkey(vchPubKey);
1695
62.5k
    if (!pubkey.IsValid())
1696
0
        return false;
1697
1698
    // Hash type is one byte tacked on to the end of the signature
1699
62.5k
    std::vector<unsigned char> vchSig(vchSigIn);
1700
62.5k
    if (vchSig.empty())
1701
3.44k
        return false;
1702
59.1k
    int nHashType = vchSig.back();
1703
59.1k
    vchSig.pop_back();
1704
1705
    // Witness sighashes need the amount.
1706
59.1k
    if (sigversion == SigVersion::WITNESS_V0 && amount < 0) return HandleMissingData(m_mdb);
1707
1708
59.1k
    uint256 sighash = SignatureHash(scriptCode, *txTo, nIn, nHashType, amount, sigversion, this->txdata, &m_sighash_cache);
1709
1710
59.1k
    if (!VerifyECDSASignature(vchSig, pubkey, sighash))
1711
54.9k
        return false;
1712
1713
4.18k
    return true;
1714
59.1k
}
1715
1716
template <class T>
1717
bool GenericTransactionSignatureChecker<T>::CheckSchnorrSignature(std::span<const unsigned char> sig, std::span<const unsigned char> pubkey_in, SigVersion sigversion, ScriptExecutionData& execdata, ScriptError* serror) const
1718
10.5k
{
1719
10.5k
    assert(sigversion == SigVersion::TAPROOT || sigversion == SigVersion::TAPSCRIPT);
1720
    // Schnorr signatures have 32-byte public keys. The caller is responsible for enforcing this.
1721
10.5k
    assert(pubkey_in.size() == 32);
1722
    // Note that in Tapscript evaluation, empty signatures are treated specially (invalid signature that does not
1723
    // abort script execution). This is implemented in EvalChecksigTapscript, which won't invoke
1724
    // CheckSchnorrSignature in that case. In other contexts, they are invalid like every other signature with
1725
    // size different from 64 or 65.
1726
10.5k
    if (sig.size() != 64 && sig.size() != 65) return set_error(serror, SCRIPT_ERR_SCHNORR_SIG_SIZE);
1727
1728
3.52k
    XOnlyPubKey pubkey{pubkey_in};
1729
1730
3.52k
    uint8_t hashtype = SIGHASH_DEFAULT;
1731
3.52k
    if (sig.size() == 65) {
1732
1.27k
        hashtype = SpanPopBack(sig);
1733
1.27k
        if (hashtype == SIGHASH_DEFAULT) return set_error(serror, SCRIPT_ERR_SCHNORR_SIG_HASHTYPE);
1734
1.27k
    }
1735
3.45k
    uint256 sighash;
1736
3.45k
    if (!this->txdata) return HandleMissingData(m_mdb);
1737
3.10k
    if (!SignatureHashSchnorr(sighash, execdata, *txTo, nIn, hashtype, sigversion, *this->txdata, m_mdb)) {
1738
271
        return set_error(serror, SCRIPT_ERR_SCHNORR_SIG_HASHTYPE);
1739
271
    }
1740
2.83k
    if (!VerifySchnorrSignature(sig, pubkey, sighash)) return set_error(serror, SCRIPT_ERR_SCHNORR_SIG);
1741
186
    return true;
1742
2.83k
}
_ZNK34GenericTransactionSignatureCheckerI12CTransactionE21CheckSchnorrSignatureESt4spanIKhLm18446744073709551615EES4_10SigVersionR19ScriptExecutionDataP13ScriptError_t
Line
Count
Source
1718
8.09k
{
1719
8.09k
    assert(sigversion == SigVersion::TAPROOT || sigversion == SigVersion::TAPSCRIPT);
1720
    // Schnorr signatures have 32-byte public keys. The caller is responsible for enforcing this.
1721
8.09k
    assert(pubkey_in.size() == 32);
1722
    // Note that in Tapscript evaluation, empty signatures are treated specially (invalid signature that does not
1723
    // abort script execution). This is implemented in EvalChecksigTapscript, which won't invoke
1724
    // CheckSchnorrSignature in that case. In other contexts, they are invalid like every other signature with
1725
    // size different from 64 or 65.
1726
8.09k
    if (sig.size() != 64 && sig.size() != 65) return set_error(serror, SCRIPT_ERR_SCHNORR_SIG_SIZE);
1727
1728
2.62k
    XOnlyPubKey pubkey{pubkey_in};
1729
1730
2.62k
    uint8_t hashtype = SIGHASH_DEFAULT;
1731
2.62k
    if (sig.size() == 65) {
1732
979
        hashtype = SpanPopBack(sig);
1733
979
        if (hashtype == SIGHASH_DEFAULT) return set_error(serror, SCRIPT_ERR_SCHNORR_SIG_HASHTYPE);
1734
979
    }
1735
2.57k
    uint256 sighash;
1736
2.57k
    if (!this->txdata) return HandleMissingData(m_mdb);
1737
2.57k
    if (!SignatureHashSchnorr(sighash, execdata, *txTo, nIn, hashtype, sigversion, *this->txdata, m_mdb)) {
1738
230
        return set_error(serror, SCRIPT_ERR_SCHNORR_SIG_HASHTYPE);
1739
230
    }
1740
2.34k
    if (!VerifySchnorrSignature(sig, pubkey, sighash)) return set_error(serror, SCRIPT_ERR_SCHNORR_SIG);
1741
186
    return true;
1742
2.34k
}
_ZNK34GenericTransactionSignatureCheckerI19CMutableTransactionE21CheckSchnorrSignatureESt4spanIKhLm18446744073709551615EES4_10SigVersionR19ScriptExecutionDataP13ScriptError_t
Line
Count
Source
1718
2.41k
{
1719
2.41k
    assert(sigversion == SigVersion::TAPROOT || sigversion == SigVersion::TAPSCRIPT);
1720
    // Schnorr signatures have 32-byte public keys. The caller is responsible for enforcing this.
1721
2.41k
    assert(pubkey_in.size() == 32);
1722
    // Note that in Tapscript evaluation, empty signatures are treated specially (invalid signature that does not
1723
    // abort script execution). This is implemented in EvalChecksigTapscript, which won't invoke
1724
    // CheckSchnorrSignature in that case. In other contexts, they are invalid like every other signature with
1725
    // size different from 64 or 65.
1726
2.41k
    if (sig.size() != 64 && sig.size() != 65) return set_error(serror, SCRIPT_ERR_SCHNORR_SIG_SIZE);
1727
1728
902
    XOnlyPubKey pubkey{pubkey_in};
1729
1730
902
    uint8_t hashtype = SIGHASH_DEFAULT;
1731
902
    if (sig.size() == 65) {
1732
297
        hashtype = SpanPopBack(sig);
1733
297
        if (hashtype == SIGHASH_DEFAULT) return set_error(serror, SCRIPT_ERR_SCHNORR_SIG_HASHTYPE);
1734
297
    }
1735
880
    uint256 sighash;
1736
880
    if (!this->txdata) return HandleMissingData(m_mdb);
1737
533
    if (!SignatureHashSchnorr(sighash, execdata, *txTo, nIn, hashtype, sigversion, *this->txdata, m_mdb)) {
1738
41
        return set_error(serror, SCRIPT_ERR_SCHNORR_SIG_HASHTYPE);
1739
41
    }
1740
492
    if (!VerifySchnorrSignature(sig, pubkey, sighash)) return set_error(serror, SCRIPT_ERR_SCHNORR_SIG);
1741
0
    return true;
1742
492
}
1743
1744
template <class T>
1745
bool GenericTransactionSignatureChecker<T>::CheckLockTime(const CScriptNum& nLockTime) const
1746
38.5k
{
1747
    // There are two kinds of nLockTime: lock-by-blockheight
1748
    // and lock-by-blocktime, distinguished by whether
1749
    // nLockTime < LOCKTIME_THRESHOLD.
1750
    //
1751
    // We want to compare apples to apples, so fail the script
1752
    // unless the type of nLockTime being tested is the same as
1753
    // the nLockTime in the transaction.
1754
38.5k
    if (!(
1755
38.5k
        (txTo->nLockTime <  LOCKTIME_THRESHOLD && nLockTime <  LOCKTIME_THRESHOLD) ||
1756
38.5k
        (txTo->nLockTime >= LOCKTIME_THRESHOLD && nLockTime >= LOCKTIME_THRESHOLD)
1757
38.5k
    ))
1758
5.60k
        return false;
1759
1760
    // Now that we know we're comparing apples-to-apples, the
1761
    // comparison is a simple numeric one.
1762
32.9k
    if (nLockTime > (int64_t)txTo->nLockTime)
1763
4.01k
        return false;
1764
1765
    // Finally the nLockTime feature can be disabled in IsFinalTx()
1766
    // and thus CHECKLOCKTIMEVERIFY bypassed if every txin has
1767
    // been finalized by setting nSequence to maxint. The
1768
    // transaction would be allowed into the blockchain, making
1769
    // the opcode ineffective.
1770
    //
1771
    // Testing if this vin is not final is sufficient to
1772
    // prevent this condition. Alternatively we could test all
1773
    // inputs, but testing just this input minimizes the data
1774
    // required to prove correct CHECKLOCKTIMEVERIFY execution.
1775
28.9k
    if (CTxIn::SEQUENCE_FINAL == txTo->vin[nIn].nSequence)
1776
461
        return false;
1777
1778
28.4k
    return true;
1779
28.9k
}
_ZNK34GenericTransactionSignatureCheckerI12CTransactionE13CheckLockTimeERK10CScriptNum
Line
Count
Source
1746
21.2k
{
1747
    // There are two kinds of nLockTime: lock-by-blockheight
1748
    // and lock-by-blocktime, distinguished by whether
1749
    // nLockTime < LOCKTIME_THRESHOLD.
1750
    //
1751
    // We want to compare apples to apples, so fail the script
1752
    // unless the type of nLockTime being tested is the same as
1753
    // the nLockTime in the transaction.
1754
21.2k
    if (!(
1755
21.2k
        (txTo->nLockTime <  LOCKTIME_THRESHOLD && nLockTime <  LOCKTIME_THRESHOLD) ||
1756
21.2k
        (txTo->nLockTime >= LOCKTIME_THRESHOLD && nLockTime >= LOCKTIME_THRESHOLD)
1757
21.2k
    ))
1758
3.56k
        return false;
1759
1760
    // Now that we know we're comparing apples-to-apples, the
1761
    // comparison is a simple numeric one.
1762
17.6k
    if (nLockTime > (int64_t)txTo->nLockTime)
1763
2.62k
        return false;
1764
1765
    // Finally the nLockTime feature can be disabled in IsFinalTx()
1766
    // and thus CHECKLOCKTIMEVERIFY bypassed if every txin has
1767
    // been finalized by setting nSequence to maxint. The
1768
    // transaction would be allowed into the blockchain, making
1769
    // the opcode ineffective.
1770
    //
1771
    // Testing if this vin is not final is sufficient to
1772
    // prevent this condition. Alternatively we could test all
1773
    // inputs, but testing just this input minimizes the data
1774
    // required to prove correct CHECKLOCKTIMEVERIFY execution.
1775
15.0k
    if (CTxIn::SEQUENCE_FINAL == txTo->vin[nIn].nSequence)
1776
418
        return false;
1777
1778
14.6k
    return true;
1779
15.0k
}
_ZNK34GenericTransactionSignatureCheckerI19CMutableTransactionE13CheckLockTimeERK10CScriptNum
Line
Count
Source
1746
17.3k
{
1747
    // There are two kinds of nLockTime: lock-by-blockheight
1748
    // and lock-by-blocktime, distinguished by whether
1749
    // nLockTime < LOCKTIME_THRESHOLD.
1750
    //
1751
    // We want to compare apples to apples, so fail the script
1752
    // unless the type of nLockTime being tested is the same as
1753
    // the nLockTime in the transaction.
1754
17.3k
    if (!(
1755
17.3k
        (txTo->nLockTime <  LOCKTIME_THRESHOLD && nLockTime <  LOCKTIME_THRESHOLD) ||
1756
17.3k
        (txTo->nLockTime >= LOCKTIME_THRESHOLD && nLockTime >= LOCKTIME_THRESHOLD)
1757
17.3k
    ))
1758
2.04k
        return false;
1759
1760
    // Now that we know we're comparing apples-to-apples, the
1761
    // comparison is a simple numeric one.
1762
15.2k
    if (nLockTime > (int64_t)txTo->nLockTime)
1763
1.39k
        return false;
1764
1765
    // Finally the nLockTime feature can be disabled in IsFinalTx()
1766
    // and thus CHECKLOCKTIMEVERIFY bypassed if every txin has
1767
    // been finalized by setting nSequence to maxint. The
1768
    // transaction would be allowed into the blockchain, making
1769
    // the opcode ineffective.
1770
    //
1771
    // Testing if this vin is not final is sufficient to
1772
    // prevent this condition. Alternatively we could test all
1773
    // inputs, but testing just this input minimizes the data
1774
    // required to prove correct CHECKLOCKTIMEVERIFY execution.
1775
13.9k
    if (CTxIn::SEQUENCE_FINAL == txTo->vin[nIn].nSequence)
1776
43
        return false;
1777
1778
13.8k
    return true;
1779
13.9k
}
1780
1781
template <class T>
1782
bool GenericTransactionSignatureChecker<T>::CheckSequence(const CScriptNum& nSequence) const
1783
37.3k
{
1784
    // Relative lock times are supported by comparing the passed
1785
    // in operand to the sequence number of the input.
1786
37.3k
    const int64_t txToSequence = (int64_t)txTo->vin[nIn].nSequence;
1787
1788
    // Fail if the transaction's version number is not set high
1789
    // enough to trigger BIP 68 rules.
1790
37.3k
    if (txTo->version < 2)
1791
2.21k
        return false;
1792
1793
    // Sequence numbers with their most significant bit set are not
1794
    // consensus constrained. Testing that the transaction's sequence
1795
    // number do not have this bit set prevents using this property
1796
    // to get around a CHECKSEQUENCEVERIFY check.
1797
35.1k
    if (txToSequence & CTxIn::SEQUENCE_LOCKTIME_DISABLE_FLAG)
1798
875
        return false;
1799
1800
    // Mask off any bits that do not have consensus-enforced meaning
1801
    // before doing the integer comparisons
1802
34.2k
    const uint32_t nLockTimeMask = CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG | CTxIn::SEQUENCE_LOCKTIME_MASK;
1803
34.2k
    const int64_t txToSequenceMasked = txToSequence & nLockTimeMask;
1804
34.2k
    const CScriptNum nSequenceMasked = nSequence & nLockTimeMask;
1805
1806
    // There are two kinds of nSequence: lock-by-blockheight
1807
    // and lock-by-blocktime, distinguished by whether
1808
    // nSequenceMasked < CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG.
1809
    //
1810
    // We want to compare apples to apples, so fail the script
1811
    // unless the type of nSequenceMasked being tested is the same as
1812
    // the nSequenceMasked in the transaction.
1813
34.2k
    if (!(
1814
34.2k
        (txToSequenceMasked <  CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG && nSequenceMasked <  CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG) ||
1815
34.2k
        (txToSequenceMasked >= CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG && nSequenceMasked >= CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG)
1816
34.2k
    )) {
1817
5.55k
        return false;
1818
5.55k
    }
1819
1820
    // Now that we know we're comparing apples-to-apples, the
1821
    // comparison is a simple numeric one.
1822
28.6k
    if (nSequenceMasked > txToSequenceMasked)
1823
2.79k
        return false;
1824
1825
25.8k
    return true;
1826
28.6k
}
_ZNK34GenericTransactionSignatureCheckerI12CTransactionE13CheckSequenceERK10CScriptNum
Line
Count
Source
1783
20.8k
{
1784
    // Relative lock times are supported by comparing the passed
1785
    // in operand to the sequence number of the input.
1786
20.8k
    const int64_t txToSequence = (int64_t)txTo->vin[nIn].nSequence;
1787
1788
    // Fail if the transaction's version number is not set high
1789
    // enough to trigger BIP 68 rules.
1790
20.8k
    if (txTo->version < 2)
1791
1.36k
        return false;
1792
1793
    // Sequence numbers with their most significant bit set are not
1794
    // consensus constrained. Testing that the transaction's sequence
1795
    // number do not have this bit set prevents using this property
1796
    // to get around a CHECKSEQUENCEVERIFY check.
1797
19.4k
    if (txToSequence & CTxIn::SEQUENCE_LOCKTIME_DISABLE_FLAG)
1798
710
        return false;
1799
1800
    // Mask off any bits that do not have consensus-enforced meaning
1801
    // before doing the integer comparisons
1802
18.7k
    const uint32_t nLockTimeMask = CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG | CTxIn::SEQUENCE_LOCKTIME_MASK;
1803
18.7k
    const int64_t txToSequenceMasked = txToSequence & nLockTimeMask;
1804
18.7k
    const CScriptNum nSequenceMasked = nSequence & nLockTimeMask;
1805
1806
    // There are two kinds of nSequence: lock-by-blockheight
1807
    // and lock-by-blocktime, distinguished by whether
1808
    // nSequenceMasked < CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG.
1809
    //
1810
    // We want to compare apples to apples, so fail the script
1811
    // unless the type of nSequenceMasked being tested is the same as
1812
    // the nSequenceMasked in the transaction.
1813
18.7k
    if (!(
1814
18.7k
        (txToSequenceMasked <  CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG && nSequenceMasked <  CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG) ||
1815
18.7k
        (txToSequenceMasked >= CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG && nSequenceMasked >= CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG)
1816
18.7k
    )) {
1817
3.27k
        return false;
1818
3.27k
    }
1819
1820
    // Now that we know we're comparing apples-to-apples, the
1821
    // comparison is a simple numeric one.
1822
15.4k
    if (nSequenceMasked > txToSequenceMasked)
1823
1.47k
        return false;
1824
1825
13.9k
    return true;
1826
15.4k
}
_ZNK34GenericTransactionSignatureCheckerI19CMutableTransactionE13CheckSequenceERK10CScriptNum
Line
Count
Source
1783
16.5k
{
1784
    // Relative lock times are supported by comparing the passed
1785
    // in operand to the sequence number of the input.
1786
16.5k
    const int64_t txToSequence = (int64_t)txTo->vin[nIn].nSequence;
1787
1788
    // Fail if the transaction's version number is not set high
1789
    // enough to trigger BIP 68 rules.
1790
16.5k
    if (txTo->version < 2)
1791
843
        return false;
1792
1793
    // Sequence numbers with their most significant bit set are not
1794
    // consensus constrained. Testing that the transaction's sequence
1795
    // number do not have this bit set prevents using this property
1796
    // to get around a CHECKSEQUENCEVERIFY check.
1797
15.6k
    if (txToSequence & CTxIn::SEQUENCE_LOCKTIME_DISABLE_FLAG)
1798
165
        return false;
1799
1800
    // Mask off any bits that do not have consensus-enforced meaning
1801
    // before doing the integer comparisons
1802
15.4k
    const uint32_t nLockTimeMask = CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG | CTxIn::SEQUENCE_LOCKTIME_MASK;
1803
15.4k
    const int64_t txToSequenceMasked = txToSequence & nLockTimeMask;
1804
15.4k
    const CScriptNum nSequenceMasked = nSequence & nLockTimeMask;
1805
1806
    // There are two kinds of nSequence: lock-by-blockheight
1807
    // and lock-by-blocktime, distinguished by whether
1808
    // nSequenceMasked < CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG.
1809
    //
1810
    // We want to compare apples to apples, so fail the script
1811
    // unless the type of nSequenceMasked being tested is the same as
1812
    // the nSequenceMasked in the transaction.
1813
15.4k
    if (!(
1814
15.4k
        (txToSequenceMasked <  CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG && nSequenceMasked <  CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG) ||
1815
15.4k
        (txToSequenceMasked >= CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG && nSequenceMasked >= CTxIn::SEQUENCE_LOCKTIME_TYPE_FLAG)
1816
15.4k
    )) {
1817
2.27k
        return false;
1818
2.27k
    }
1819
1820
    // Now that we know we're comparing apples-to-apples, the
1821
    // comparison is a simple numeric one.
1822
13.2k
    if (nSequenceMasked > txToSequenceMasked)
1823
1.32k
        return false;
1824
1825
11.8k
    return true;
1826
13.2k
}
1827
1828
// explicit instantiation
1829
template class GenericTransactionSignatureChecker<CTransaction>;
1830
template class GenericTransactionSignatureChecker<CMutableTransaction>;
1831
1832
static bool ExecuteWitnessScript(const std::span<const valtype>& stack_span, const CScript& exec_script, script_verify_flags flags, SigVersion sigversion, const BaseSignatureChecker& checker, ScriptExecutionData& execdata, ScriptError* serror)
1833
956k
{
1834
956k
    std::vector<valtype> stack{stack_span.begin(), stack_span.end()};
1835
1836
956k
    if (sigversion == SigVersion::TAPSCRIPT) {
1837
        // OP_SUCCESSx processing overrides everything, including stack element size limits
1838
1.67k
        CScript::const_iterator pc = exec_script.begin();
1839
606k
        while (pc < exec_script.end()) {
1840
604k
            opcodetype opcode;
1841
604k
            if (!exec_script.GetOp(pc, opcode)) {
1842
                // Note how this condition would not be reached if an unknown OP_SUCCESSx was found
1843
0
                return set_error(serror, SCRIPT_ERR_BAD_OPCODE);
1844
0
            }
1845
            // New opcodes will be listed here. May use a different sigversion to modify existing opcodes.
1846
604k
            if (IsOpSuccess(opcode)) {
1847
36
                if (flags & SCRIPT_VERIFY_DISCOURAGE_OP_SUCCESS) {
1848
16
                    return set_error(serror, SCRIPT_ERR_DISCOURAGE_OP_SUCCESS);
1849
16
                }
1850
20
                return set_success(serror);
1851
36
            }
1852
604k
        }
1853
1854
        // Tapscript enforces initial stack size limits (altstack is empty here)
1855
1.63k
        if (stack.size() > MAX_STACK_SIZE) return set_error(serror, SCRIPT_ERR_STACK_SIZE);
1856
1.63k
    }
1857
1858
    // Disallow stack item size > MAX_SCRIPT_ELEMENT_SIZE in witness stack
1859
1.12M
    for (const valtype& elem : stack) {
1860
1.12M
        if (elem.size() > MAX_SCRIPT_ELEMENT_SIZE) return set_error(serror, SCRIPT_ERR_PUSH_SIZE);
1861
1.12M
    }
1862
1863
    // Run the script interpreter.
1864
956k
    if (!EvalScript(stack, exec_script, flags, checker, sigversion, execdata, serror)) return false;
1865
1866
    // Scripts inside witness implicitly require cleanstack behaviour
1867
885k
    if (stack.size() != 1) return set_error(serror, SCRIPT_ERR_CLEANSTACK);
1868
881k
    if (!CastToBool(stack.back())) return set_error(serror, SCRIPT_ERR_EVAL_FALSE);
1869
878k
    return true;
1870
881k
}
1871
1872
uint256 ComputeTapleafHash(uint8_t leaf_version, std::span<const unsigned char> script)
1873
146k
{
1874
146k
    return (HashWriter{HASHER_TAPLEAF} << leaf_version << CompactSizeWriter(script.size()) << script).GetSHA256();
1875
146k
}
1876
1877
uint256 ComputeTapbranchHash(std::span<const unsigned char> a, std::span<const unsigned char> b)
1878
188k
{
1879
188k
    HashWriter ss_branch{HASHER_TAPBRANCH};
1880
188k
    if (std::lexicographical_compare(a.begin(), a.end(), b.begin(), b.end())) {
1881
67.0k
        ss_branch << a << b;
1882
121k
    } else {
1883
121k
        ss_branch << b << a;
1884
121k
    }
1885
188k
    return ss_branch.GetSHA256();
1886
188k
}
1887
1888
uint256 ComputeTaprootMerkleRoot(std::span<const unsigned char> control, const uint256& tapleaf_hash)
1889
21.2k
{
1890
21.2k
    assert(control.size() >= TAPROOT_CONTROL_BASE_SIZE);
1891
21.2k
    assert(control.size() <= TAPROOT_CONTROL_MAX_SIZE);
1892
21.2k
    assert((control.size() - TAPROOT_CONTROL_BASE_SIZE) % TAPROOT_CONTROL_NODE_SIZE == 0);
1893
1894
21.2k
    const int path_len = (control.size() - TAPROOT_CONTROL_BASE_SIZE) / TAPROOT_CONTROL_NODE_SIZE;
1895
21.2k
    uint256 k = tapleaf_hash;
1896
121k
    for (int i = 0; i < path_len; ++i) {
1897
100k
        std::span node{std::span{control}.subspan(TAPROOT_CONTROL_BASE_SIZE + TAPROOT_CONTROL_NODE_SIZE * i, TAPROOT_CONTROL_NODE_SIZE)};
1898
100k
        k = ComputeTapbranchHash(k, node);
1899
100k
    }
1900
21.2k
    return k;
1901
21.2k
}
1902
1903
static bool VerifyTaprootCommitment(const std::vector<unsigned char>& control, const std::vector<unsigned char>& program, const uint256& tapleaf_hash)
1904
4.63k
{
1905
4.63k
    assert(control.size() >= TAPROOT_CONTROL_BASE_SIZE);
1906
4.63k
    assert(program.size() >= uint256::size());
1907
    //! The internal pubkey (x-only, so no Y coordinate parity).
1908
4.63k
    const XOnlyPubKey p{std::span{control}.subspan(1, TAPROOT_CONTROL_BASE_SIZE - 1)};
1909
    //! The output pubkey (taken from the scriptPubKey).
1910
4.63k
    const XOnlyPubKey q{program};
1911
    // Compute the Merkle root from the leaf and the provided path.
1912
4.63k
    const uint256 merkle_root = ComputeTaprootMerkleRoot(control, tapleaf_hash);
1913
    // Verify that the output pubkey matches the tweaked internal pubkey, after correcting for parity.
1914
4.63k
    return q.CheckTapTweak(p, merkle_root, control[0] & 1);
1915
4.63k
}
1916
1917
static bool VerifyWitnessProgram(const CScriptWitness& witness, int witversion, const std::vector<unsigned char>& program, script_verify_flags flags, const BaseSignatureChecker& checker, ScriptError* serror, bool is_p2sh)
1918
1.04M
{
1919
1.04M
    CScript exec_script; //!< Actually executed script (last stack item in P2WSH; implied P2PKH script in P2WPKH; leaf script in P2TR)
1920
1.04M
    std::span stack{witness.stack};
1921
1.04M
    ScriptExecutionData execdata;
1922
1923
1.04M
    if (witversion == 0) {
1924
1.00M
        if (program.size() == WITNESS_V0_SCRIPTHASH_SIZE) {
1925
            // BIP141 P2WSH: 32-byte witness v0 program (which encodes SHA256(script))
1926
929k
            if (stack.size() == 0) {
1927
26.5k
                return set_error(serror, SCRIPT_ERR_WITNESS_PROGRAM_WITNESS_EMPTY);
1928
26.5k
            }
1929
902k
            const valtype& script_bytes = SpanPopBack(stack);
1930
902k
            exec_script = CScript(script_bytes.begin(), script_bytes.end());
1931
902k
            uint256 hash_exec_script;
1932
902k
            CSHA256().Write(exec_script.data(), exec_script.size()).Finalize(hash_exec_script.begin());
1933
902k
            if (memcmp(hash_exec_script.begin(), program.data(), 32)) {
1934
13.0k
                return set_error(serror, SCRIPT_ERR_WITNESS_PROGRAM_MISMATCH);
1935
13.0k
            }
1936
889k
            return ExecuteWitnessScript(stack, exec_script, flags, SigVersion::WITNESS_V0, checker, execdata, serror);
1937
902k
        } else if (program.size() == WITNESS_V0_KEYHASH_SIZE) {
1938
            // BIP141 P2WPKH: 20-byte witness v0 program (which encodes Hash160(pubkey))
1939
76.8k
            if (stack.size() != 2) {
1940
11.1k
                return set_error(serror, SCRIPT_ERR_WITNESS_PROGRAM_MISMATCH); // 2 items in witness
1941
11.1k
            }
1942
65.6k
            exec_script << OP_DUP << OP_HASH160 << program << OP_EQUALVERIFY << OP_CHECKSIG;
1943
65.6k
            return ExecuteWitnessScript(stack, exec_script, flags, SigVersion::WITNESS_V0, checker, execdata, serror);
1944
76.8k
        } else {
1945
2.56k
            return set_error(serror, SCRIPT_ERR_WITNESS_PROGRAM_WRONG_LENGTH);
1946
2.56k
        }
1947
1.00M
    } else if (witversion == 1 && program.size() == WITNESS_V1_TAPROOT_SIZE && !is_p2sh) {
1948
        // BIP341 Taproot: 32-byte non-P2SH witness v1 program (which encodes a P2C-tweaked pubkey)
1949
32.0k
        if (!(flags & SCRIPT_VERIFY_TAPROOT)) return set_success(serror);
1950
31.9k
        if (stack.size() == 0) return set_error(serror, SCRIPT_ERR_WITNESS_PROGRAM_WITNESS_EMPTY);
1951
19.1k
        if (stack.size() >= 2 && !stack.back().empty() && stack.back()[0] == ANNEX_TAG) {
1952
            // Drop annex (this is non-standard; see IsWitnessStandard)
1953
692
            const valtype& annex = SpanPopBack(stack);
1954
692
            execdata.m_annex_hash = (HashWriter{} << annex).GetSHA256();
1955
692
            execdata.m_annex_present = true;
1956
18.4k
        } else {
1957
18.4k
            execdata.m_annex_present = false;
1958
18.4k
        }
1959
19.1k
        execdata.m_annex_init = true;
1960
19.1k
        if (stack.size() == 1) {
1961
            // Key path spending (stack size is 1 after removing optional annex)
1962
10.6k
            if (!checker.CheckSchnorrSignature(stack.front(), program, SigVersion::TAPROOT, execdata, serror)) {
1963
10.2k
                return false; // serror is set
1964
10.2k
            }
1965
316
            return set_success(serror);
1966
10.6k
        } else {
1967
            // Script path spending (stack size is >1 after removing optional annex)
1968
8.53k
            const valtype& control = SpanPopBack(stack);
1969
8.53k
            const valtype& script = SpanPopBack(stack);
1970
8.53k
            if (control.size() < TAPROOT_CONTROL_BASE_SIZE || control.size() > TAPROOT_CONTROL_MAX_SIZE || ((control.size() - TAPROOT_CONTROL_BASE_SIZE) % TAPROOT_CONTROL_NODE_SIZE) != 0) {
1971
3.89k
                return set_error(serror, SCRIPT_ERR_TAPROOT_WRONG_CONTROL_SIZE);
1972
3.89k
            }
1973
4.63k
            execdata.m_tapleaf_hash = ComputeTapleafHash(control[0] & TAPROOT_LEAF_MASK, script);
1974
4.63k
            if (!VerifyTaprootCommitment(control, program, execdata.m_tapleaf_hash)) {
1975
2.95k
                return set_error(serror, SCRIPT_ERR_WITNESS_PROGRAM_MISMATCH);
1976
2.95k
            }
1977
1.68k
            execdata.m_tapleaf_hash_init = true;
1978
1.68k
            if ((control[0] & TAPROOT_LEAF_MASK) == TAPROOT_LEAF_TAPSCRIPT) {
1979
                // Tapscript (leaf version 0xc0)
1980
1.67k
                exec_script = CScript(script.begin(), script.end());
1981
1.67k
                execdata.m_validation_weight_left = ::GetSerializeSize(witness.stack) + VALIDATION_WEIGHT_OFFSET;
1982
1.67k
                execdata.m_validation_weight_left_init = true;
1983
1.67k
                return ExecuteWitnessScript(stack, exec_script, flags, SigVersion::TAPSCRIPT, checker, execdata, serror);
1984
1.67k
            }
1985
9
            if (flags & SCRIPT_VERIFY_DISCOURAGE_UPGRADABLE_TAPROOT_VERSION) {
1986
4
                return set_error(serror, SCRIPT_ERR_DISCOURAGE_UPGRADABLE_TAPROOT_VERSION);
1987
4
            }
1988
5
            return set_success(serror);
1989
9
        }
1990
19.1k
    } else if (!is_p2sh && CScript::IsPayToAnchor(witversion, program)) {
1991
802
        return true;
1992
6.52k
    } else {
1993
6.52k
        if (flags & SCRIPT_VERIFY_DISCOURAGE_UPGRADABLE_WITNESS_PROGRAM) {
1994
6.46k
            return set_error(serror, SCRIPT_ERR_DISCOURAGE_UPGRADABLE_WITNESS_PROGRAM);
1995
6.46k
        }
1996
        // Other version/size/p2sh combinations return true for future softfork compatibility
1997
64
        return true;
1998
6.52k
    }
1999
    // There is intentionally no return statement here, to be able to use "control reaches end of non-void function" warnings to detect gaps in the logic above.
2000
1.04M
}
2001
2002
bool VerifyScript(const CScript& scriptSig, const CScript& scriptPubKey, const CScriptWitness* witness, script_verify_flags flags, const BaseSignatureChecker& checker, ScriptError* serror)
2003
1.99M
{
2004
1.99M
    static const CScriptWitness emptyWitness;
2005
1.99M
    if (witness == nullptr) {
2006
1.14k
        witness = &emptyWitness;
2007
1.14k
    }
2008
1.99M
    bool hadWitness = false;
2009
2010
1.99M
    set_error(serror, SCRIPT_ERR_UNKNOWN_ERROR);
2011
2012
1.99M
    if ((flags & SCRIPT_VERIFY_SIGPUSHONLY) != 0 && !scriptSig.IsPushOnly()) {
2013
30.0k
        return set_error(serror, SCRIPT_ERR_SIG_PUSHONLY);
2014
30.0k
    }
2015
2016
    // scriptSig and scriptPubKey must be evaluated sequentially on the same stack
2017
    // rather than being simply concatenated (see CVE-2010-5141)
2018
1.96M
    std::vector<std::vector<unsigned char> > stack, stackCopy;
2019
1.96M
    if (!EvalScript(stack, scriptSig, flags, checker, SigVersion::BASE, serror))
2020
        // serror is set
2021
197k
        return false;
2022
1.76M
    if (flags & SCRIPT_VERIFY_P2SH)
2023
1.60M
        stackCopy = stack;
2024
1.76M
    if (!EvalScript(stack, scriptPubKey, flags, checker, SigVersion::BASE, serror))
2025
        // serror is set
2026
513k
        return false;
2027
1.25M
    if (stack.empty())
2028
94.2k
        return set_error(serror, SCRIPT_ERR_EVAL_FALSE);
2029
1.16M
    if (CastToBool(stack.back()) == false)
2030
27.4k
        return set_error(serror, SCRIPT_ERR_EVAL_FALSE);
2031
2032
    // Bare witness programs
2033
1.13M
    int witnessversion;
2034
1.13M
    std::vector<unsigned char> witnessprogram;
2035
1.13M
    if (flags & SCRIPT_VERIFY_WITNESS) {
2036
1.09M
        if (scriptPubKey.IsWitnessProgram(witnessversion, witnessprogram)) {
2037
1.00M
            hadWitness = true;
2038
1.00M
            if (scriptSig.size() != 0) {
2039
                // The scriptSig must be _exactly_ CScript(), otherwise we reintroduce malleability.
2040
10.4k
                return set_error(serror, SCRIPT_ERR_WITNESS_MALLEATED);
2041
10.4k
            }
2042
995k
            if (!VerifyWitnessProgram(*witness, witnessversion, witnessprogram, flags, checker, serror, /*is_p2sh=*/false)) {
2043
117k
                return false;
2044
117k
            }
2045
            // Bypass the cleanstack check at the end. The actual stack is obviously not clean
2046
            // for witness programs.
2047
878k
            stack.resize(1);
2048
878k
        }
2049
1.09M
    }
2050
2051
    // Additional validation for spend-to-script-hash transactions:
2052
1.00M
    if ((flags & SCRIPT_VERIFY_P2SH) && scriptPubKey.IsPayToScriptHash())
2053
62.5k
    {
2054
        // scriptSig must be literals-only or validation fails
2055
62.5k
        if (!scriptSig.IsPushOnly())
2056
1.14k
            return set_error(serror, SCRIPT_ERR_SIG_PUSHONLY);
2057
2058
        // Restore stack.
2059
61.4k
        swap(stack, stackCopy);
2060
2061
        // stack cannot be empty here, because if it was the
2062
        // P2SH  HASH <> EQUAL  scriptPubKey would be evaluated with
2063
        // an empty stack and the EvalScript above would return false.
2064
61.4k
        assert(!stack.empty());
2065
2066
61.4k
        const valtype& pubKeySerialized = stack.back();
2067
61.4k
        CScript pubKey2(pubKeySerialized.begin(), pubKeySerialized.end());
2068
61.4k
        popstack(stack);
2069
2070
61.4k
        if (!EvalScript(stack, pubKey2, flags, checker, SigVersion::BASE, serror))
2071
            // serror is set
2072
1.40k
            return false;
2073
60.0k
        if (stack.empty())
2074
6.66k
            return set_error(serror, SCRIPT_ERR_EVAL_FALSE);
2075
53.3k
        if (!CastToBool(stack.back()))
2076
399
            return set_error(serror, SCRIPT_ERR_EVAL_FALSE);
2077
2078
        // P2SH witness program
2079
52.9k
        if (flags & SCRIPT_VERIFY_WITNESS) {
2080
52.6k
            if (pubKey2.IsWitnessProgram(witnessversion, witnessprogram)) {
2081
52.4k
                hadWitness = true;
2082
52.4k
                if (scriptSig != CScript() << std::vector<unsigned char>(pubKey2.begin(), pubKey2.end())) {
2083
                    // The scriptSig must be _exactly_ a single push of the redeemScript. Otherwise we
2084
                    // reintroduce malleability.
2085
24
                    return set_error(serror, SCRIPT_ERR_WITNESS_MALLEATED_P2SH);
2086
24
                }
2087
52.3k
                if (!VerifyWitnessProgram(*witness, witnessversion, witnessprogram, flags, checker, serror, /*is_p2sh=*/true)) {
2088
51.0k
                    return false;
2089
51.0k
                }
2090
                // Bypass the cleanstack check at the end. The actual stack is obviously not clean
2091
                // for witness programs.
2092
1.37k
                stack.resize(1);
2093
1.37k
            }
2094
52.6k
        }
2095
52.9k
    }
2096
2097
    // The CLEANSTACK check is only performed after potential P2SH evaluation,
2098
    // as the non-P2SH evaluation of a P2SH script will obviously not result in
2099
    // a clean stack (the P2SH inputs remain). The same holds for witness evaluation.
2100
944k
    if ((flags & SCRIPT_VERIFY_CLEANSTACK) != 0) {
2101
        // Disallow CLEANSTACK without P2SH, as otherwise a switch CLEANSTACK->P2SH+CLEANSTACK
2102
        // would be possible, which is not a softfork (and P2SH should be one).
2103
753k
        assert((flags & SCRIPT_VERIFY_P2SH) != 0);
2104
753k
        assert((flags & SCRIPT_VERIFY_WITNESS) != 0);
2105
753k
        if (stack.size() != 1) {
2106
11.7k
            return set_error(serror, SCRIPT_ERR_CLEANSTACK);
2107
11.7k
        }
2108
753k
    }
2109
2110
933k
    if (flags & SCRIPT_VERIFY_WITNESS) {
2111
        // We can't check for correct unexpected witness data if P2SH was off, so require
2112
        // that WITNESS implies P2SH. Otherwise, going from WITNESS->P2SH+WITNESS would be
2113
        // possible, which is not a softfork.
2114
891k
        assert((flags & SCRIPT_VERIFY_P2SH) != 0);
2115
891k
        if (!hadWitness && !witness->IsNull()) {
2116
3.33k
            return set_error(serror, SCRIPT_ERR_WITNESS_UNEXPECTED);
2117
3.33k
        }
2118
891k
    }
2119
2120
929k
    return set_success(serror);
2121
933k
}
2122
2123
size_t static WitnessSigOps(int witversion, const std::vector<unsigned char>& witprogram, const CScriptWitness& witness)
2124
3.16M
{
2125
3.16M
    if (witversion == 0) {
2126
3.15M
        if (witprogram.size() == WITNESS_V0_KEYHASH_SIZE)
2127
716
            return 1;
2128
2129
3.15M
        if (witprogram.size() == WITNESS_V0_SCRIPTHASH_SIZE && witness.stack.size() > 0) {
2130
3.13M
            CScript subscript(witness.stack.back().begin(), witness.stack.back().end());
2131
3.13M
            return subscript.GetSigOpCount(true);
2132
3.13M
        }
2133
3.15M
    }
2134
2135
    // Future flags may be implemented here.
2136
27.8k
    return 0;
2137
3.16M
}
2138
2139
size_t CountWitnessSigOps(const CScript& scriptSig, const CScript& scriptPubKey, const CScriptWitness& witness, script_verify_flags flags)
2140
3.21M
{
2141
3.21M
    if ((flags & SCRIPT_VERIFY_WITNESS) == 0) {
2142
326
        return 0;
2143
326
    }
2144
3.21M
    assert((flags & SCRIPT_VERIFY_P2SH) != 0);
2145
2146
3.21M
    int witnessversion;
2147
3.21M
    std::vector<unsigned char> witnessprogram;
2148
3.21M
    if (scriptPubKey.IsWitnessProgram(witnessversion, witnessprogram)) {
2149
3.16M
        return WitnessSigOps(witnessversion, witnessprogram, witness);
2150
3.16M
    }
2151
2152
54.5k
    if (scriptPubKey.IsPayToScriptHash() && scriptSig.IsPushOnly()) {
2153
391
        CScript::const_iterator pc = scriptSig.begin();
2154
391
        std::vector<unsigned char> data;
2155
75.4k
        while (pc < scriptSig.end()) {
2156
75.0k
            opcodetype opcode;
2157
75.0k
            scriptSig.GetOp(pc, opcode, data);
2158
75.0k
        }
2159
391
        CScript subscript(data.begin(), data.end());
2160
391
        if (subscript.IsWitnessProgram(witnessversion, witnessprogram)) {
2161
62
            return WitnessSigOps(witnessversion, witnessprogram, witness);
2162
62
        }
2163
391
    }
2164
2165
54.4k
    return 0;
2166
54.5k
}
2167
2168
const std::map<std::string, script_verify_flag_name>& ScriptFlagNamesToEnum()
2169
4
{
2170
84
#define FLAG_NAME(flag) {std::string(#flag), SCRIPT_VERIFY_##flag}
2171
4
    static const std::map<std::string, script_verify_flag_name> g_names_to_enum{
2172
4
        FLAG_NAME(P2SH),
2173
4
        FLAG_NAME(STRICTENC),
2174
4
        FLAG_NAME(DERSIG),
2175
4
        FLAG_NAME(LOW_S),
2176
4
        FLAG_NAME(SIGPUSHONLY),
2177
4
        FLAG_NAME(MINIMALDATA),
2178
4
        FLAG_NAME(NULLDUMMY),
2179
4
        FLAG_NAME(DISCOURAGE_UPGRADABLE_NOPS),
2180
4
        FLAG_NAME(CLEANSTACK),
2181
4
        FLAG_NAME(MINIMALIF),
2182
4
        FLAG_NAME(NULLFAIL),
2183
4
        FLAG_NAME(CHECKLOCKTIMEVERIFY),
2184
4
        FLAG_NAME(CHECKSEQUENCEVERIFY),
2185
4
        FLAG_NAME(WITNESS),
2186
4
        FLAG_NAME(DISCOURAGE_UPGRADABLE_WITNESS_PROGRAM),
2187
4
        FLAG_NAME(WITNESS_PUBKEYTYPE),
2188
4
        FLAG_NAME(CONST_SCRIPTCODE),
2189
4
        FLAG_NAME(TAPROOT),
2190
4
        FLAG_NAME(DISCOURAGE_UPGRADABLE_PUBKEYTYPE),
2191
4
        FLAG_NAME(DISCOURAGE_OP_SUCCESS),
2192
4
        FLAG_NAME(DISCOURAGE_UPGRADABLE_TAPROOT_VERSION),
2193
4
    };
2194
4
#undef FLAG_NAME
2195
4
    return g_names_to_enum;
2196
4
}
2197
2198
std::vector<std::string> GetScriptFlagNames(script_verify_flags flags)
2199
4
{
2200
4
    std::vector<std::string> res;
2201
4
    if (flags == SCRIPT_VERIFY_NONE) {
2202
0
        return res;
2203
0
    }
2204
4
    script_verify_flags leftover = flags;
2205
84
    for (const auto& [name, flag] : ScriptFlagNamesToEnum()) {
2206
84
        if ((flags & flag) != 0) {
2207
16
            res.push_back(name);
2208
16
            leftover &= ~flag;
2209
16
        }
2210
84
    }
2211
4
    if (leftover != 0) {
2212
0
        res.push_back(strprintf("0x%08x", leftover.as_int()));
2213
0
    }
2214
4
    return res;
2215
4
}