1
2
3use std::{cmp, fmt, io, iter};
4use std::collections::{HashMap, VecDeque};
5
6use bitcoin::hashes::{sha256, Hash};
7use bitcoin::{
8 taproot, Amount, OutPoint, ScriptBuf, Sequence, TapLeafHash, Transaction, TxIn, TxOut, Txid, Weight, Witness
9};
10use bitcoin::secp256k1::{schnorr, Keypair, PublicKey, XOnlyPublicKey};
11use bitcoin::sighash::{self, SighashCache, TapSighash, TapSighashType};
12use secp256k1_musig::musig::{AggregatedNonce, PartialSignature, PublicNonce, SecretNonce};
13
14use bitcoin_ext::{fee, BlockDelta, BlockHeight, TaprootSpendInfoExt, TransactionExt, TxOutExt};
15
16use crate::{musig, scripts, ServerVtxoPolicy, Vtxo, VtxoId, VtxoPolicy, VtxoRequest, SECP};
17use crate::encode::{
18 LengthPrefixedVector, OversizedVectorError, ProtocolDecodingError, ProtocolEncoding, ReadExt, WriteExt
19};
20use crate::error::IncorrectSigningKeyError;
21use crate::tree::{self, Tree};
22use crate::vtxo::{self, Full, GenesisItem, GenesisTransition, MaybePreimage, ServerVtxo};
23
24
25pub type UnlockHash = sha256::Hash;
27
28pub type UnlockPreimage = [u8; 32];
30
31pub const NODE_SPEND_WEIGHT: Weight = Weight::from_wu(140);
33
34pub fn expiry_clause(server_pubkey: PublicKey, expiry_height: BlockHeight) -> ScriptBuf {
36 let pk = server_pubkey.x_only_public_key().0;
37 scripts::timelock_sign(expiry_height, pk)
38}
39
40pub fn unlock_clause(pubkey: XOnlyPublicKey, unlock_hash: UnlockHash) -> ScriptBuf {
44 scripts::hash_and_sign(unlock_hash, pubkey)
45}
46
47pub fn leaf_cosign_taproot(
54 user_pubkey: PublicKey,
55 server_pubkey: PublicKey,
56 expiry_height: BlockHeight,
57 unlock_hash: UnlockHash,
58) -> taproot::TaprootSpendInfo {
59 let agg_pk = musig::combine_keys([user_pubkey, server_pubkey])
60 .x_only_public_key().0;
61 taproot::TaprootBuilder::new()
62 .add_leaf(1, expiry_clause(server_pubkey, expiry_height)).unwrap()
63 .add_leaf(1, unlock_clause(agg_pk, unlock_hash)).unwrap()
64 .finalize(&SECP, agg_pk).unwrap()
65}
66
67pub fn cosign_taproot(
69 agg_pk: XOnlyPublicKey,
70 server_pubkey: PublicKey,
71 expiry_height: BlockHeight,
72) -> taproot::TaprootSpendInfo {
73 taproot::TaprootBuilder::new()
74 .add_leaf(0, expiry_clause(server_pubkey, expiry_height)).unwrap()
75 .finalize(&SECP, agg_pk).unwrap()
76}
77
78#[derive(Debug, Clone, PartialEq, Eq, PartialOrd, Ord, Hash)]
79pub struct VtxoLeafSpec {
80 pub vtxo: VtxoRequest,
82
83 pub cosign_pubkey: Option<PublicKey>,
90
91 pub unlock_hash: UnlockHash,
93}
94
95impl ProtocolEncoding for VtxoLeafSpec {
96 fn encode<W: io::Write + ?Sized>(&self, w: &mut W) -> Result<(), io::Error> {
97 self.vtxo.policy.encode(w)?;
98 w.emit_u64(self.vtxo.amount.to_sat())?;
99 self.cosign_pubkey.encode(w)?;
100 self.unlock_hash.encode(w)?;
101 Ok(())
102 }
103
104 fn decode<R: io::Read + ?Sized>(r: &mut R) -> Result<Self, ProtocolDecodingError> {
105 Ok(VtxoLeafSpec {
106 vtxo: VtxoRequest {
107 policy: VtxoPolicy::decode(r)?,
108 amount: Amount::from_sat(r.read_u64()?),
109 },
110 cosign_pubkey: Option::<PublicKey>::decode(r)?,
111 unlock_hash: sha256::Hash::decode(r)?,
112 })
113 }
114}
115
116#[derive(Debug, Clone, Eq, PartialEq)]
118pub struct VtxoTreeSpec {
119 pub vtxos: Vec<VtxoLeafSpec>,
120 pub expiry_height: BlockHeight,
121 pub server_pubkey: PublicKey,
122 pub exit_delta: BlockDelta,
123 pub global_cosign_pubkeys: Vec<PublicKey>,
124}
125
126#[derive(Clone, Copy)]
127enum ChildSpec<'a> {
128 Leaf {
129 spec: &'a VtxoLeafSpec,
130 },
131 Internal {
132 output_value: Amount,
133 agg_pk: PublicKey,
134 },
135}
136
137impl VtxoTreeSpec {
138 pub fn new(
139 vtxos: Vec<VtxoLeafSpec>,
140 server_pubkey: PublicKey,
141 expiry_height: BlockHeight,
142 exit_delta: BlockDelta,
143 global_cosign_pubkeys: Vec<PublicKey>,
144 ) -> VtxoTreeSpec {
145 assert_ne!(vtxos.len(), 0);
146 VtxoTreeSpec { vtxos, server_pubkey, expiry_height, exit_delta, global_cosign_pubkeys }
147 }
148
149 pub fn nb_leaves(&self) -> usize {
150 self.vtxos.len()
151 }
152
153 pub fn nb_nodes(&self) -> usize {
154 Tree::nb_nodes_for_leaves(self.nb_leaves())
155 }
156
157 pub fn nb_internal_nodes(&self) -> usize {
158 Tree::nb_nodes_for_leaves(self.nb_leaves()).checked_sub(self.nb_leaves())
159 .expect("tree can't have less nodes than leaves")
160 }
161
162 pub fn iter_vtxos(&self) -> impl Iterator<Item = &VtxoLeafSpec> {
163 self.vtxos.iter()
164 }
165
166 pub fn leaf_idx_of(&self, leaf_spec: &VtxoLeafSpec) -> Option<usize> {
168 self.vtxos.iter().position(|e| e == leaf_spec)
169 }
170
171 pub fn leaf_idx_of_req(&self, vtxo_request: &VtxoRequest) -> Option<usize> {
176 self.vtxos.iter().position(|e| e.vtxo == *vtxo_request)
177 }
178
179 pub fn total_required_value(&self) -> Amount {
184 self.vtxos.iter().map(|d| d.vtxo.amount).sum::<Amount>()
185 }
186
187 pub fn leaf_taproot(
189 &self,
190 user_pubkey: PublicKey,
191 unlock_hash: UnlockHash,
192 ) -> taproot::TaprootSpendInfo {
193 leaf_cosign_taproot(user_pubkey, self.server_pubkey, self.expiry_height, unlock_hash)
194 }
195
196 pub fn internal_taproot(&self, agg_pk: XOnlyPublicKey) -> taproot::TaprootSpendInfo {
198 cosign_taproot(agg_pk, self.server_pubkey, self.expiry_height)
199 }
200
201 pub fn funding_tx_cosign_pubkey(&self) -> XOnlyPublicKey {
205 let keys = self.vtxos.iter()
206 .filter_map(|v| v.cosign_pubkey)
207 .chain(self.global_cosign_pubkeys.iter().copied());
208 musig::combine_keys(keys).x_only_public_key().0
209 }
210
211 pub fn funding_tx_script_pubkey(&self) -> ScriptBuf {
215 let agg_pk = self.funding_tx_cosign_pubkey();
216 self.internal_taproot(agg_pk).script_pubkey()
217 }
218
219 pub fn funding_tx_txout(&self) -> TxOut {
223 TxOut {
224 script_pubkey: self.funding_tx_script_pubkey(),
225 value: self.total_required_value(),
226 }
227 }
228
229 fn node_tx<'a>(
234 &self,
235 children: impl Iterator<Item = ChildSpec<'a>>,
236 ) -> Transaction {
237 Transaction {
238 version: bitcoin::transaction::Version(3),
239 lock_time: bitcoin::absolute::LockTime::ZERO,
240 input: vec![TxIn {
241 previous_output: OutPoint::null(), sequence: Sequence::ZERO,
243 script_sig: ScriptBuf::new(),
244 witness: Witness::new(),
245 }],
246 output: children.map(|child| match child {
247 ChildSpec::Leaf { spec } => {
248 let taproot = self.leaf_taproot(
249 spec.vtxo.policy.user_pubkey(),
250 spec.unlock_hash,
251 );
252 TxOut {
253 script_pubkey: taproot.script_pubkey(),
254 value: spec.vtxo.amount,
255 }
256 },
257 ChildSpec::Internal { output_value, agg_pk } => {
258 let taproot = self.internal_taproot(agg_pk.x_only_public_key().0);
259 TxOut {
260 script_pubkey: taproot.script_pubkey(),
261 value: output_value,
262 }
263 },
264 }).chain(Some(fee::fee_anchor())).collect(),
265 }
266 }
267
268 fn leaf_tx(&self, vtxo: &VtxoRequest) -> Transaction {
269 let txout = TxOut {
270 value: vtxo.amount,
271 script_pubkey: vtxo.policy.script_pubkey(self.server_pubkey, self.exit_delta, self.expiry_height),
272 };
273
274 vtxo::create_exit_tx(OutPoint::null(), txout, None, Amount::ZERO)
278 }
279
280 pub fn cosign_agg_pks(&self)
284 -> impl Iterator<Item = PublicKey> + iter::DoubleEndedIterator + iter::ExactSizeIterator + '_
285 {
286 Tree::new(self.nb_leaves()).into_iter().map(|node| {
287 if node.is_leaf() {
288 musig::combine_keys([
289 self.vtxos[node.idx()].vtxo.policy.user_pubkey(),
290 self.server_pubkey,
291 ])
292 } else {
293 musig::combine_keys(
294 node.leaves().filter_map(|i| self.vtxos[i].cosign_pubkey)
295 .chain(self.global_cosign_pubkeys.iter().copied())
296 )
297 }
298 })
299 }
300
301 pub fn unsigned_transactions(&self, utxo: OutPoint) -> Vec<Transaction> {
303 let tree = Tree::new(self.nb_leaves());
304
305 let cosign_agg_pks = self.cosign_agg_pks().collect::<Vec<_>>();
306
307 let mut txs = Vec::<Transaction>::with_capacity(tree.nb_nodes());
308 for node in tree.iter() {
309 let tx = if node.is_leaf() {
310 self.leaf_tx(&self.vtxos[node.idx()].vtxo).clone()
311 } else {
312 let mut buf = [None; tree::RADIX];
313 for (idx, child) in node.children().enumerate() {
314 let child = if let Some(spec) = self.vtxos.get(child) {
315 ChildSpec::Leaf { spec }
316 } else {
317 ChildSpec::Internal {
318 output_value: txs[child].output_value(),
319 agg_pk: cosign_agg_pks[child],
320 }
321 };
322 buf[idx] = Some(child);
323 }
324 self.node_tx(buf.iter().filter_map(|x| *x))
325 };
326 txs.push(tx.clone());
327 };
328
329 txs.last_mut().unwrap().input[0].previous_output = utxo;
331 for node in tree.iter().rev() {
332 let txid = txs[node.idx()].compute_txid();
333 for (i, child) in node.children().enumerate() {
334 let point = OutPoint::new(txid, i as u32);
335 txs[child].input[0].previous_output = point;
336 }
337 }
338
339 txs
340 }
341
342 pub fn final_transactions(
346 &self,
347 utxo: OutPoint,
348 internal_signatures: &[schnorr::Signature],
349 ) -> Vec<Transaction> {
350 let mut txs = self.unsigned_transactions(utxo);
351 for (tx, sig) in txs.iter_mut().skip(self.nb_leaves()).zip(internal_signatures) {
352 tx.input[0].witness.push(&sig[..]);
353 }
354 txs
355 }
356
357 pub fn calculate_cosign_agg_nonces(
361 &self,
362 leaf_cosign_nonces: &HashMap<PublicKey, Vec<PublicNonce>>,
363 global_signer_cosign_nonces: &[impl AsRef<[PublicNonce]>],
364 ) -> Result<Vec<AggregatedNonce>, String> {
365 if global_signer_cosign_nonces.len() != self.global_cosign_pubkeys.len() {
366 return Err("missing global signer nonces".into());
367 }
368
369 Tree::new(self.nb_leaves()).iter_internal().enumerate().map(|(idx, node)| {
370 let mut nonces = Vec::new();
371 for pk in node.leaves().filter_map(|i| self.vtxos[i].cosign_pubkey) {
372 nonces.push(leaf_cosign_nonces.get(&pk)
373 .ok_or_else(|| format!("missing nonces for leaf pk {}", pk))?
374 .get(node.internal_level())
377 .ok_or_else(|| format!("not enough nonces for leaf_pk {}", pk))?
378 );
379 }
380 for glob in global_signer_cosign_nonces {
381 nonces.push(glob.as_ref().get(idx).ok_or("not enough global cosign nonces")?);
382 }
383 Ok(musig::nonce_agg(&nonces))
384 }).collect()
385 }
386
387 pub fn into_unsigned_tree(
392 self,
393 utxo: OutPoint,
394 ) -> UnsignedVtxoTree {
395 UnsignedVtxoTree::new(self, utxo)
396 }
397}
398
399#[derive(Debug, Clone)]
403pub struct UnsignedVtxoTree {
404 pub spec: VtxoTreeSpec,
405 pub utxo: OutPoint,
406
407 pub cosign_agg_pks: Vec<PublicKey>,
411 pub txs: Vec<Transaction>,
413 pub internal_sighashes: Vec<TapSighash>,
416
417 tree: Tree,
418}
419
420impl UnsignedVtxoTree {
421 pub fn new(
422 spec: VtxoTreeSpec,
423 utxo: OutPoint,
424 ) -> UnsignedVtxoTree {
425 let tree = Tree::new(spec.nb_leaves());
426
427 let cosign_agg_pks = spec.cosign_agg_pks().collect::<Vec<_>>();
428 let txs = spec.unsigned_transactions(utxo);
429
430 let root_txout = spec.funding_tx_txout();
431 let internal_sighashes = tree.iter_internal().map(|node| {
432 let prev = if let Some((parent, sibling_idx))
433 = tree.parent_idx_of_with_sibling_idx(node.idx())
434 {
435 assert!(!node.is_root());
436 &txs[parent].output[sibling_idx]
437 } else {
438 assert!(node.is_root());
439 &root_txout
440 };
441
442 let mut shc = SighashCache::new(&txs[node.idx()]);
443 shc.taproot_key_spend_signature_hash(
444 0, &sighash::Prevouts::All(&[prev]),
446 TapSighashType::Default,
447 ).expect("sighash error")
448 }).collect();
449
450 UnsignedVtxoTree { spec, utxo, txs, internal_sighashes, cosign_agg_pks, tree }
451 }
452
453 pub fn nb_leaves(&self) -> usize {
454 self.tree.nb_leaves()
455 }
456
457 pub fn nb_cosigned_leaves(&self) -> usize {
459 self.spec.vtxos.iter()
460 .filter(|v| v.cosign_pubkey.is_some())
461 .count()
462 }
463
464 pub fn nb_nodes(&self) -> usize {
465 self.tree.nb_nodes()
466 }
467
468 pub fn nb_internal_nodes(&self) -> usize {
469 self.tree.nb_internal_nodes()
470 }
471
472 pub fn cosign_branch(
485 &self,
486 cosign_agg_nonces: &[AggregatedNonce],
487 leaf_idx: usize,
488 cosign_key: &Keypair,
489 cosign_sec_nonces: Vec<SecretNonce>,
490 ) -> Result<Vec<PartialSignature>, IncorrectSigningKeyError> {
491 let req = self.spec.vtxos.get(leaf_idx).expect("leaf idx out of bounds");
492 if Some(cosign_key.public_key()) != req.cosign_pubkey {
493 return Err(IncorrectSigningKeyError {
494 required: req.cosign_pubkey,
495 provided: cosign_key.public_key(),
496 });
497 }
498
499 let mut nonce_iter = cosign_sec_nonces.into_iter().enumerate();
500 let mut ret = Vec::with_capacity(self.tree.root().level() + 1);
501 for node in self.tree.iter_branch(leaf_idx).skip(1) {
503 let sec_nonce = loop {
508 let next = nonce_iter.next().expect("level overflow");
509 if next.0 == node.internal_level() {
510 break next.1;
511 }
512 };
513
514 let cosign_pubkeys = node.leaves()
515 .filter_map(|i| self.spec.vtxos[i].cosign_pubkey)
516 .chain(self.spec.global_cosign_pubkeys.iter().copied());
517 let sighash = self.internal_sighashes[node.internal_idx()];
518
519 let agg_pk = self.cosign_agg_pks[node.idx()].x_only_public_key().0;
520 let tweak = self.spec.internal_taproot(agg_pk).tap_tweak().to_byte_array();
521 let sig = musig::partial_sign(
522 cosign_pubkeys,
523 cosign_agg_nonces[node.internal_idx()],
524 &cosign_key,
525 sec_nonce,
526 sighash.to_byte_array(),
527 Some(tweak),
528 None,
529 ).0;
530 ret.push(sig);
531 }
532
533 Ok(ret)
534 }
535
536 pub fn cosign_tree(
542 &self,
543 cosign_agg_nonces: &[AggregatedNonce],
544 keypair: &Keypair,
545 cosign_sec_nonces: Vec<SecretNonce>,
546 ) -> Vec<PartialSignature> {
547 debug_assert_eq!(cosign_agg_nonces.len(), self.nb_internal_nodes());
548 debug_assert_eq!(cosign_sec_nonces.len(), self.nb_internal_nodes());
549
550 let nonces = cosign_sec_nonces.into_iter().zip(cosign_agg_nonces);
551 self.tree.iter_internal().zip(nonces).map(|(node, (sec_nonce, agg_nonce))| {
552 let sighash = self.internal_sighashes[node.internal_idx()];
553
554 let cosign_pubkeys = node.leaves()
555 .filter_map(|i| self.spec.vtxos[i].cosign_pubkey)
556 .chain(self.spec.global_cosign_pubkeys.iter().copied());
557 let agg_pk = self.cosign_agg_pks[node.idx()];
558 debug_assert_eq!(agg_pk, musig::combine_keys(cosign_pubkeys.clone()));
559 let taproot = self.spec.internal_taproot(agg_pk.x_only_public_key().0);
560 musig::partial_sign(
561 cosign_pubkeys,
562 *agg_nonce,
563 &keypair,
564 sec_nonce,
565 sighash.to_byte_array(),
566 Some(taproot.tap_tweak().to_byte_array()),
567 None,
568 ).0
569 }).collect()
570 }
571
572 fn verify_internal_node_cosign_partial_sig(
574 &self,
575 node: &tree::Node,
576 pk: PublicKey,
577 agg_nonces: &[AggregatedNonce],
578 part_sig: PartialSignature,
579 pub_nonce: PublicNonce,
580 ) -> Result<(), CosignSignatureError> {
581 debug_assert!(!node.is_leaf());
582
583 let sighash = self.internal_sighashes[node.internal_idx()];
584
585 let key_agg = {
586 let cosign_pubkeys = node.leaves()
587 .filter_map(|i| self.spec.vtxos[i].cosign_pubkey)
588 .chain(self.spec.global_cosign_pubkeys.iter().copied());
589 let agg_pk = self.cosign_agg_pks[node.idx()].x_only_public_key().0;
590 let taproot = self.spec.internal_taproot(agg_pk);
591 let taptweak = taproot.tap_tweak().to_byte_array();
592 musig::tweaked_key_agg(cosign_pubkeys, taptweak).0
593 };
594 let agg_nonce = agg_nonces.get(node.internal_idx())
595 .ok_or(CosignSignatureError::NotEnoughNonces)?;
596 let session = musig::Session::new(&key_agg, *agg_nonce, &sighash.to_byte_array());
597 let ok = session.partial_verify(&key_agg, &part_sig, &pub_nonce, musig::pubkey_to(pk));
598 if !ok {
599 return Err(CosignSignatureError::invalid_sig(pk));
600 }
601 Ok(())
602 }
603
604 pub fn verify_branch_cosign_partial_sigs(
609 &self,
610 cosign_agg_nonces: &[AggregatedNonce],
611 request: &VtxoLeafSpec,
612 cosign_pub_nonces: &[PublicNonce],
613 cosign_part_sigs: &[PartialSignature],
614 ) -> Result<(), String> {
615 assert_eq!(cosign_agg_nonces.len(), self.nb_internal_nodes());
616
617 let cosign_pubkey = request.cosign_pubkey.ok_or("no cosign pubkey for request")?;
618 let leaf_idx = self.spec.leaf_idx_of(request).ok_or("request not in tree")?;
619
620 let internal_branch = self.tree.iter_branch(leaf_idx).skip(1);
622
623 match internal_branch.clone().count().cmp(&cosign_part_sigs.len()) {
625 cmp::Ordering::Less => return Err("too few partial signatures".into()),
626 cmp::Ordering::Greater => return Err("too many partial signatures".into()),
627 cmp::Ordering::Equal => {},
628 }
629
630 let mut part_sigs_iter = cosign_part_sigs.iter();
631 let mut pub_nonce_iter = cosign_pub_nonces.iter().enumerate();
632 for node in internal_branch {
633 let pub_nonce = loop {
634 let next = pub_nonce_iter.next().ok_or("not enough pub nonces")?;
635 if next.0 == node.internal_level() {
636 break next.1;
637 }
638 };
639 self.verify_internal_node_cosign_partial_sig(
640 node,
641 cosign_pubkey,
642 cosign_agg_nonces,
643 part_sigs_iter.next().ok_or("not enough sigs")?.clone(),
644 *pub_nonce,
645 ).map_err(|e| format!("part sig verification failed: {}", e))?;
646 }
647
648 Ok(())
649 }
650
651 pub fn verify_global_cosign_partial_sigs(
656 &self,
657 pk: PublicKey,
658 agg_nonces: &[AggregatedNonce],
659 pub_nonces: &[PublicNonce],
660 part_sigs: &[PartialSignature],
661 ) -> Result<(), CosignSignatureError> {
662 for node in self.tree.iter_internal() {
663 let sigs = *part_sigs.get(node.internal_idx())
664 .ok_or_else(|| CosignSignatureError::missing_sig(pk))?;
665 let nonces = *pub_nonces.get(node.internal_idx())
666 .ok_or_else(|| CosignSignatureError::NotEnoughNonces)?;
667 self.verify_internal_node_cosign_partial_sig(node, pk, agg_nonces, sigs, nonces)?;
668 }
669
670 Ok(())
671 }
672
673 pub fn combine_partial_signatures(
682 &self,
683 cosign_agg_nonces: &[AggregatedNonce],
684 branch_part_sigs: &HashMap<PublicKey, Vec<PartialSignature>>,
685 global_signer_part_sigs: &[impl AsRef<[PartialSignature]>],
686 ) -> Result<Vec<schnorr::Signature>, CosignSignatureError> {
687 let mut leaf_part_sigs = branch_part_sigs.iter()
689 .map(|(pk, sigs)| (pk, sigs.iter().collect()))
690 .collect::<HashMap<_, VecDeque<_>>>();
691
692 if global_signer_part_sigs.len() != self.spec.global_cosign_pubkeys.len() {
693 return Err(CosignSignatureError::Invalid(
694 "invalid nb of global cosigner partial signatures",
695 ));
696 }
697 for (pk, sigs) in self.spec.global_cosign_pubkeys.iter().zip(global_signer_part_sigs) {
698 if sigs.as_ref().len() != self.nb_internal_nodes() {
699 return Err(CosignSignatureError::MissingSignature { pk: *pk });
702 }
703 }
704
705 let max_level = match self.tree.root().is_leaf() {
706 true => 0,
707 false => self.tree.root().internal_level(),
708 };
709 self.tree.iter_internal().map(|node| {
710 let mut cosign_pks = Vec::with_capacity(max_level + 1);
711 let mut part_sigs = Vec::with_capacity(max_level + 1);
712 for leaf in node.leaves() {
713 if let Some(cosign_pk) = self.spec.vtxos[leaf].cosign_pubkey {
714 let part_sig = leaf_part_sigs.get_mut(&cosign_pk)
715 .ok_or(CosignSignatureError::missing_sig(cosign_pk))?
716 .pop_front()
717 .ok_or(CosignSignatureError::missing_sig(cosign_pk))?;
718 cosign_pks.push(cosign_pk);
719 part_sigs.push(part_sig);
720 }
721 }
722 cosign_pks.extend(&self.spec.global_cosign_pubkeys);
724 for sigs in global_signer_part_sigs {
725 part_sigs.push(sigs.as_ref().get(node.internal_idx()).expect("checked before"));
726 }
727
728 let agg_pk = self.cosign_agg_pks[node.idx()].x_only_public_key().0;
729 let taproot = self.spec.internal_taproot(agg_pk);
730 let agg_nonce = *cosign_agg_nonces.get(node.internal_idx())
731 .ok_or(CosignSignatureError::NotEnoughNonces)?;
732 let sighash = self.internal_sighashes[node.internal_idx()].to_byte_array();
733 let tweak = taproot.tap_tweak().to_byte_array();
734 Ok(musig::combine_partial_signatures(
735 cosign_pks, agg_nonce, sighash, Some(tweak), &part_sigs,
736 ))
737 }).collect()
738 }
739
740 pub fn verify_cosign_sigs(
744 &self,
745 signatures: &[schnorr::Signature],
746 ) -> Result<(), XOnlyPublicKey> {
747 for node in self.tree.iter_internal() {
748 let sighash = self.internal_sighashes[node.internal_idx()];
749 let agg_pk = &self.cosign_agg_pks[node.idx()].x_only_public_key().0;
750 let pk = self.spec.internal_taproot(*agg_pk).output_key().to_x_only_public_key();
751 let sig = signatures.get(node.internal_idx()).ok_or_else(|| pk)?;
752 if SECP.verify_schnorr(sig, &sighash.into(), &pk).is_err() {
753 return Err(pk);
754 }
755 }
756 Ok(())
757 }
758
759 pub fn into_signed_tree(
763 self,
764 signatures: Vec<schnorr::Signature>,
765 ) -> SignedVtxoTreeSpec {
766 SignedVtxoTreeSpec {
767 spec: self.spec,
768 utxo: self.utxo,
769 cosign_sigs: signatures,
770 }
771 }
772}
773
774#[derive(PartialEq, Eq, thiserror::Error)]
776pub enum CosignSignatureError {
777 #[error("missing cosign signature from pubkey {pk}")]
778 MissingSignature { pk: PublicKey },
779 #[error("invalid cosign signature from pubkey {pk}")]
780 InvalidSignature { pk: PublicKey },
781 #[error("not enough nonces")]
782 NotEnoughNonces,
783 #[error("invalid cosign signatures: {0}")]
784 Invalid(&'static str),
785}
786
787impl fmt::Debug for CosignSignatureError {
788 fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
789 fmt::Display::fmt(self, f)
790 }
791}
792
793impl CosignSignatureError {
794 fn missing_sig(cosign_pk: PublicKey) -> CosignSignatureError {
795 CosignSignatureError::MissingSignature { pk: cosign_pk }
796 }
797 fn invalid_sig(cosign_pk: PublicKey) -> CosignSignatureError {
798 CosignSignatureError::InvalidSignature { pk: cosign_pk }
799 }
800}
801
802#[derive(Debug, Clone, PartialEq)]
804pub struct SignedVtxoTreeSpec {
805 pub spec: VtxoTreeSpec,
806 pub utxo: OutPoint,
807 pub cosign_sigs: Vec<schnorr::Signature>,
809}
810
811impl SignedVtxoTreeSpec {
812 pub fn new(
814 spec: VtxoTreeSpec,
815 utxo: OutPoint,
816 cosign_signatures: Vec<schnorr::Signature>,
817 ) -> SignedVtxoTreeSpec {
818 SignedVtxoTreeSpec { spec, utxo, cosign_sigs: cosign_signatures }
819 }
820
821 pub fn nb_leaves(&self) -> usize {
822 self.spec.nb_leaves()
823 }
824
825 pub fn exit_branch(&self, leaf_idx: usize) -> Vec<Transaction> {
832 let txs = self.all_final_txs();
833 let tree = Tree::new(self.spec.nb_leaves());
834 let mut ret = tree.iter_branch(leaf_idx)
835 .map(|n| txs[n.idx()].clone())
836 .collect::<Vec<_>>();
837 ret.reverse();
838 ret
839 }
840
841 pub fn all_final_txs(&self) -> Vec<Transaction> {
843 self.spec.final_transactions(self.utxo, &self.cosign_sigs)
844 }
845
846 pub fn into_cached_tree(self) -> CachedSignedVtxoTree {
847 CachedSignedVtxoTree {
848 txs: self.all_final_txs(),
849 spec: self,
850 }
851 }
852}
853
854pub struct CachedSignedVtxoTree {
858 pub spec: SignedVtxoTreeSpec,
859 pub txs: Vec<Transaction>,
861}
862
863impl CachedSignedVtxoTree {
864 pub fn exit_branch(&self, leaf_idx: usize) -> Vec<&Transaction> {
868 let tree = Tree::new(self.spec.spec.nb_leaves());
869 let mut ret = tree.iter_branch(leaf_idx)
870 .map(|n| &self.txs[n.idx()])
871 .collect::<Vec<_>>();
872 ret.reverse();
873 ret
874 }
875
876 pub fn nb_leaves(&self) -> usize {
877 self.spec.nb_leaves()
878 }
879
880 pub fn nb_nodes(&self) -> usize {
881 Tree::nb_nodes_for_leaves(self.spec.nb_leaves())
882 }
883
884 pub fn all_final_txs(&self) -> &[Transaction] {
889 &self.txs
890 }
891
892 pub fn unsigned_leaf_txs(&self) -> &[Transaction] {
896 &self.txs[..self.nb_leaves()]
897 }
898
899 pub fn internal_node_txs(&self) -> &[Transaction] {
903 &self.txs[self.nb_leaves()..]
904 }
905
906 fn build_genesis_item_at<'a>(&self, tree: &Tree, node_idx: usize, output_idx: u8) -> GenesisItem {
908 debug_assert_eq!(self.nb_leaves(), tree.nb_leaves(), "tree corresponds to self");
909 debug_assert!(node_idx < tree.nb_nodes(), "Node index is in tree");
910
911 let other_outputs = self.txs.get(node_idx).expect("Each node has a tx")
912 .output.iter().enumerate()
913 .filter(|(i, _)| *i != output_idx as usize) .filter(|(_, out)| !out.is_p2a_fee_anchor()) .map(|(_, out)| out)
916 .cloned()
917 .collect();
918
919 let node = tree.node_at(node_idx);
920
921 let transition = if node.is_leaf() {
922 debug_assert_eq!(output_idx, 0, "Leafs have a single output");
923 let req = self.spec.spec.vtxos.get(node_idx).expect("Every leaf has a spec");
924 GenesisTransition::new_hash_locked_cosigned(
925 req.vtxo.policy.user_pubkey(),
926 None,
927 MaybePreimage::Hash(req.unlock_hash),
928 )
929 } else {
930 let pubkeys = node.leaves()
931 .filter_map(|i| self.spec.spec.vtxos[i].cosign_pubkey)
932 .chain(self.spec.spec.global_cosign_pubkeys.iter().copied())
933 .collect();
934
935 let sig = self.spec.cosign_sigs.get(node.internal_idx())
936 .expect("enough sigs for all nodes");
937
938 GenesisTransition::new_cosigned(pubkeys, Some(*sig))
939 };
940
941 let fee_amount = Amount::ZERO;
942 GenesisItem {transition, output_idx, other_outputs, fee_amount }
943 }
944
945 fn build_internal_vtxo(&self, node_idx: usize) -> ServerVtxo<Full> {
951 let tree = Tree::new(self.spec.spec.nb_leaves());
952 assert!(node_idx < tree.nb_nodes(), "node_idx out of range");
953
954 let mut genesis = tree.iter_branch_with_output(node_idx)
955 .map(|(idx, child_idx)| self.build_genesis_item_at(&tree, idx, child_idx as u8))
956 .collect::<Vec<_>>();
957 genesis.reverse();
958
959 let node = tree.node_at(node_idx);
960 let spec = &self.spec.spec;
961 let (point, amount) = match tree.parent_idx_of_with_sibling_idx(node_idx) {
962 None => (self.spec.utxo, spec.total_required_value()),
963 Some((parent_idx, child_idx)) => {
964 let parent_tx = self.txs.get(parent_idx).expect("parent tx exists");
965 let point = OutPoint::new(parent_tx.compute_txid(), child_idx as u32);
966 (point, parent_tx.output[child_idx].value)
967 }
968 };
969
970 let policy = if node.is_leaf() {
971 let req = spec.vtxos.get(node_idx).expect("one vtxo request for every leaf");
972 ServerVtxoPolicy::new_hark_leaf(req.vtxo.policy.user_pubkey(), req.unlock_hash)
973 } else {
974 let agg_pk = musig::combine_keys(
975 node.leaves().filter_map(|i| self.spec.spec.vtxos[i].cosign_pubkey)
976 .chain(self.spec.spec.global_cosign_pubkeys.iter().copied())
977 );
978 ServerVtxoPolicy::new_expiry(agg_pk.x_only_public_key().0)
979 };
980
981 ServerVtxo {
982 policy,
983 amount,
984 expiry_height: self.spec.spec.expiry_height,
985 server_pubkey: self.spec.spec.server_pubkey,
986 exit_delta: self.spec.spec.exit_delta,
987 anchor_point: self.spec.utxo,
988 genesis: Full { items: genesis },
989 point,
990 }
991 }
992
993 pub fn build_vtxo(&self, leaf_idx: usize) -> Vtxo<Full> {
997 let req = self.spec.spec.vtxos.get(leaf_idx).expect("index is not a leaf");
998
999 let genesis = {
1000 let tree = Tree::new(self.spec.spec.nb_leaves());
1001 let leaf = self.build_genesis_item_at(&tree, leaf_idx, 0);
1002 let internal = tree.iter_branch_with_output(leaf_idx)
1003 .map(|(node_idx, child_idx)| {
1004 self.build_genesis_item_at(&tree, node_idx, child_idx as u8)
1005 });
1006
1007 let mut genesis = [leaf].into_iter().chain(internal).collect::<Vec<_>>();
1008 genesis.reverse();
1009 genesis
1010 };
1011
1012 Vtxo {
1013 amount: req.vtxo.amount,
1014 expiry_height: self.spec.spec.expiry_height,
1015 server_pubkey: self.spec.spec.server_pubkey,
1016 exit_delta: self.spec.spec.exit_delta,
1017 anchor_point: self.spec.utxo,
1018 genesis: Full { items: genesis },
1019 policy: req.vtxo.policy.clone(),
1020 point: {
1021 let leaf_tx = self.txs.get(leaf_idx).expect("leaf idx exists");
1022 OutPoint::new(leaf_tx.compute_txid(), 0)
1023 },
1024 }
1025 }
1026
1027 pub fn internal_vtxos(&self) -> impl Iterator<Item = ServerVtxo<Full>> + ExactSizeIterator + '_ {
1029 (0..self.nb_nodes()).map(|idx| self.build_internal_vtxo(idx))
1030 }
1031
1032 pub fn output_vtxos(&self) -> impl Iterator<Item = Vtxo<Full>> + ExactSizeIterator + '_ {
1034 (0..self.nb_leaves()).map(|idx| self.build_vtxo(idx))
1035 }
1036
1037 pub fn spend_info(&self) -> impl Iterator<Item = (VtxoId, Txid)> + '_ {
1038 self.internal_vtxos()
1042 .enumerate()
1043 .map(|(idx, vtxo)| (vtxo.id(), self.txs[idx].compute_txid()))
1044 }
1045}
1046
1047pub fn hashlocked_leaf_sighash(
1049 leaf_tx: &Transaction,
1050 user_pubkey: PublicKey,
1051 server_pubkey: PublicKey,
1052 unlock_hash: UnlockHash,
1053 prev_txout: &TxOut,
1054) -> TapSighash {
1055 let agg_pk = musig::combine_keys([user_pubkey, server_pubkey])
1056 .x_only_public_key().0;
1057 let clause = unlock_clause(agg_pk, unlock_hash);
1058 let leaf_hash = TapLeafHash::from_script(&clause, bitcoin::taproot::LeafVersion::TapScript);
1059 let mut shc = SighashCache::new(leaf_tx);
1060 shc.taproot_script_spend_signature_hash(
1061 0, &sighash::Prevouts::All(&[prev_txout]),
1063 leaf_hash,
1064 TapSighashType::Default,
1065 ).expect("sighash error")
1066}
1067
1068fn hashlocked_leaf_sighash_from_vtxo(
1074 vtxo: &Vtxo<Full>,
1075 chain_anchor: &Transaction,
1076) -> TapSighash {
1077 assert_eq!(chain_anchor.compute_txid(), vtxo.chain_anchor().txid);
1078 let last_genesis = vtxo.genesis.items.last().expect("at least one genesis item");
1079 let (user_pubkey, unlock_hash) = match &last_genesis.transition {
1080 GenesisTransition::HashLockedCosigned(inner) => {
1081 (inner.user_pubkey, inner.unlock.hash())
1082 },
1083 _ => panic!("VTXO is not a HashLockedCosigned VTXO")
1084 };
1085 debug_assert_eq!(user_pubkey, vtxo.user_pubkey());
1086
1087 let mut preleaf_txout = chain_anchor.output[vtxo.chain_anchor().vout as usize].clone();
1089 let mut leaf_tx = None;
1090 let mut peekable_iter = vtxo.transactions().peekable();
1091 while let Some(item) = peekable_iter.next() {
1092 if peekable_iter.peek().is_some() {
1095 preleaf_txout = item.tx.output[item.output_idx].clone();
1096 }
1097
1098 if peekable_iter.peek().is_none() {
1100 leaf_tx = Some(item.tx);
1101 }
1102 }
1103 let leaf_tx = leaf_tx.expect("at least one tx");
1104 hashlocked_leaf_sighash(
1105 &leaf_tx, user_pubkey, vtxo.server_pubkey(), unlock_hash, &preleaf_txout,
1106 )
1107}
1108
1109#[derive(Debug)]
1110pub struct LeafVtxoCosignRequest {
1111 pub vtxo_id: VtxoId,
1112 pub pub_nonce: musig::PublicNonce,
1113}
1114
1115pub struct LeafVtxoCosignContext<'a> {
1116 key: &'a Keypair,
1117 pub_nonce: musig::PublicNonce,
1118 sec_nonce: musig::SecretNonce,
1119 sighash: TapSighash,
1120}
1121
1122impl<'a> LeafVtxoCosignContext<'a> {
1123 pub fn new(
1128 vtxo: &Vtxo<Full>,
1129 chain_anchor: &Transaction,
1130 key: &'a Keypair,
1131 ) -> (Self, LeafVtxoCosignRequest) {
1132 let sighash = hashlocked_leaf_sighash_from_vtxo(&vtxo, chain_anchor);
1133 let (sec_nonce, pub_nonce) = musig::nonce_pair_with_msg(key, &sighash.to_byte_array());
1134 let vtxo_id = vtxo.id();
1135 let req = LeafVtxoCosignRequest { vtxo_id, pub_nonce };
1136 let ret = Self { key, pub_nonce, sec_nonce, sighash };
1137 (ret, req)
1138 }
1139
1140 pub fn finalize(
1142 self,
1143 vtxo: &mut Vtxo<Full>,
1144 response: LeafVtxoCosignResponse,
1145 ) -> bool {
1146 let agg_nonce = musig::nonce_agg(&[&self.pub_nonce, &response.public_nonce]);
1147 let (_part_sig, final_sig) = musig::partial_sign(
1148 [vtxo.user_pubkey(), vtxo.server_pubkey()],
1149 agg_nonce,
1150 self.key,
1151 self.sec_nonce,
1152 self.sighash.to_byte_array(),
1153 None,
1154 Some(&[&response.partial_signature]),
1155 );
1156 let final_sig = final_sig.expect("has other sigs");
1157
1158 let pubkey = musig::combine_keys([vtxo.user_pubkey(), vtxo.server_pubkey()])
1159 .x_only_public_key().0;
1160 debug_assert_eq!(pubkey, leaf_cosign_taproot(
1161 vtxo.user_pubkey(),
1162 vtxo.server_pubkey(),
1163 vtxo.expiry_height(),
1164 vtxo.unlock_hash().expect("checked is hark vtxo"),
1165 ).internal_key());
1166 if SECP.verify_schnorr(&final_sig, &self.sighash.into(), &pubkey).is_err() {
1167 return false;
1168 }
1169
1170 vtxo.provide_unlock_signature(final_sig)
1171 }
1172}
1173
1174#[derive(Debug)]
1175pub struct LeafVtxoCosignResponse {
1176 pub public_nonce: musig::PublicNonce,
1177 pub partial_signature: musig::PartialSignature,
1178}
1179
1180impl LeafVtxoCosignResponse {
1181 pub fn new_cosign(
1183 request: &LeafVtxoCosignRequest,
1184 vtxo: &Vtxo<Full>,
1185 chain_anchor: &Transaction,
1186 server_key: &Keypair,
1187 ) -> Self {
1188 debug_assert_eq!(server_key.public_key(), vtxo.server_pubkey());
1189 let sighash = hashlocked_leaf_sighash_from_vtxo(&vtxo, chain_anchor);
1190 let (public_nonce, partial_signature) = musig::deterministic_partial_sign(
1191 server_key,
1192 [vtxo.user_pubkey()],
1193 &[&request.pub_nonce],
1194 sighash.to_byte_array(),
1195 None,
1196 );
1197 Self { public_nonce, partial_signature }
1198 }
1199}
1200
1201pub mod builder {
1202 use std::collections::HashMap;
1209 use std::marker::PhantomData;
1210
1211 use bitcoin::{Amount, OutPoint, ScriptBuf, TxOut};
1212 use bitcoin::hashes::{sha256, Hash};
1213 use bitcoin::secp256k1::{Keypair, PublicKey};
1214 use bitcoin_ext::{BlockDelta, BlockHeight};
1215
1216 use crate::tree::signed::{UnlockHash, UnlockPreimage, VtxoLeafSpec};
1217 use crate::{musig, VtxoRequest};
1218 use crate::error::IncorrectSigningKeyError;
1219
1220 use super::{CosignSignatureError, SignedVtxoTreeSpec, UnsignedVtxoTree, VtxoTreeSpec};
1221
1222 pub mod state {
1223 mod sealed {
1224 pub trait Sealed {}
1226 impl Sealed for super::Preparing {}
1227 impl Sealed for super::CanGenerateNonces {}
1228 impl Sealed for super::ServerCanCosign {}
1229 impl Sealed for super::CanFinish {}
1230 }
1231
1232 pub trait BuilderState: sealed::Sealed {}
1234
1235 pub struct Preparing;
1237 impl BuilderState for Preparing {}
1238
1239 pub struct CanGenerateNonces;
1242 impl BuilderState for CanGenerateNonces {}
1243
1244 pub struct ServerCanCosign;
1246 impl BuilderState for ServerCanCosign {}
1247
1248 pub struct CanFinish;
1251 impl BuilderState for CanFinish {}
1252
1253 pub trait CanSign: BuilderState {}
1256 impl CanSign for ServerCanCosign {}
1257 impl CanSign for CanFinish {}
1258 }
1259
1260 enum BuilderTree {
1262 Spec(VtxoTreeSpec),
1263 Unsigned(UnsignedVtxoTree),
1264 }
1265
1266 impl BuilderTree {
1267 fn unsigned_tree(&self) -> Option<&UnsignedVtxoTree> {
1268 match self {
1269 BuilderTree::Spec(_) => None,
1270 BuilderTree::Unsigned(t) => Some(t),
1271 }
1272 }
1273
1274 fn into_unsigned_tree(self) -> Option<UnsignedVtxoTree> {
1275 match self {
1276 BuilderTree::Spec(_) => None,
1277 BuilderTree::Unsigned(t) => Some(t),
1278 }
1279 }
1280 }
1281
1282 pub struct SignedTreeBuilder<S: state::BuilderState> {
1286 pub expiry_height: BlockHeight,
1287 pub server_pubkey: PublicKey,
1288 pub exit_delta: BlockDelta,
1289 pub cosign_pubkey: PublicKey,
1291 pub unlock_preimage: UnlockPreimage,
1293
1294 tree: BuilderTree,
1295
1296 user_pub_nonces: Vec<musig::PublicNonce>,
1298 user_sec_nonces: Option<Vec<musig::SecretNonce>>,
1301 _state: PhantomData<S>,
1302 }
1303
1304 impl<T: state::BuilderState> SignedTreeBuilder<T> {
1305 fn tree_spec(&self) -> &VtxoTreeSpec {
1306 match self.tree {
1307 BuilderTree::Spec(ref s) => s,
1308 BuilderTree::Unsigned(ref t) => &t.spec,
1309 }
1310 }
1311
1312 pub fn total_required_value(&self) -> Amount {
1314 self.tree_spec().total_required_value()
1315 }
1316
1317 pub fn funding_script_pubkey(&self) -> ScriptBuf {
1319 self.tree_spec().funding_tx_script_pubkey()
1320 }
1321
1322 pub fn funding_txout(&self) -> TxOut {
1324 let spec = self.tree_spec();
1325 TxOut {
1326 value: spec.total_required_value(),
1327 script_pubkey: spec.funding_tx_script_pubkey(),
1328 }
1329 }
1330 }
1331
1332 impl<T: state::CanSign> SignedTreeBuilder<T> {
1333 pub fn user_pub_nonces(&self) -> &[musig::PublicNonce] {
1335 &self.user_pub_nonces
1336 }
1337 }
1338
1339 #[derive(Debug, thiserror::Error)]
1340 #[error("signed VTXO tree builder error: {0}")]
1341 pub struct SignedTreeBuilderError(&'static str);
1342
1343 impl SignedTreeBuilder<state::Preparing> {
1344 pub fn construct_tree_spec(
1346 vtxos: impl IntoIterator<Item = VtxoRequest>,
1347 cosign_pubkey: PublicKey,
1348 unlock_hash: UnlockHash,
1349 expiry_height: BlockHeight,
1350 server_pubkey: PublicKey,
1351 server_cosign_pubkey: PublicKey,
1352 exit_delta: BlockDelta,
1353 ) -> Result<VtxoTreeSpec, SignedTreeBuilderError> {
1354 let reqs = vtxos.into_iter()
1355 .map(|vtxo| VtxoLeafSpec {
1356 vtxo: vtxo,
1357 cosign_pubkey: None,
1358 unlock_hash: unlock_hash,
1359 })
1360 .collect::<Vec<_>>();
1361 if reqs.len() < 2 {
1362 return Err(SignedTreeBuilderError("need to have at least 2 VTXOs in tree"));
1363 }
1364 Ok(VtxoTreeSpec::new(
1365 reqs,
1366 server_pubkey,
1367 expiry_height,
1368 exit_delta,
1369 vec![cosign_pubkey, server_cosign_pubkey],
1372 ))
1373 }
1374
1375 pub fn new(
1377 vtxos: impl IntoIterator<Item = VtxoRequest>,
1378 cosign_pubkey: PublicKey,
1379 unlock_preimage: UnlockPreimage,
1380 expiry_height: BlockHeight,
1381 server_pubkey: PublicKey,
1382 server_cosign_pubkey: PublicKey,
1383 exit_delta: BlockDelta,
1384 ) -> Result<SignedTreeBuilder<state::Preparing>, SignedTreeBuilderError> {
1385 let tree = Self::construct_tree_spec(
1386 vtxos,
1387 cosign_pubkey,
1388 sha256::Hash::hash(&unlock_preimage),
1389 expiry_height,
1390 server_pubkey,
1391 server_cosign_pubkey,
1392 exit_delta,
1393 )?;
1394
1395 Ok(SignedTreeBuilder {
1396 expiry_height, server_pubkey, exit_delta, cosign_pubkey, unlock_preimage,
1397 tree: BuilderTree::Spec(tree),
1398 user_pub_nonces: Vec::new(),
1399 user_sec_nonces: None,
1400 _state: PhantomData,
1401 })
1402 }
1403
1404 pub fn set_utxo(self, utxo: OutPoint) -> SignedTreeBuilder<state::CanGenerateNonces> {
1406 let unsigned_tree = match self.tree {
1407 BuilderTree::Spec(s) => s.into_unsigned_tree(utxo),
1408 BuilderTree::Unsigned(t) => t, };
1410 SignedTreeBuilder {
1411 tree: BuilderTree::Unsigned(unsigned_tree),
1412
1413 expiry_height: self.expiry_height,
1414 server_pubkey: self.server_pubkey,
1415 exit_delta: self.exit_delta,
1416 cosign_pubkey: self.cosign_pubkey,
1417 unlock_preimage: self.unlock_preimage,
1418 user_pub_nonces: self.user_pub_nonces,
1419 user_sec_nonces: self.user_sec_nonces,
1420 _state: PhantomData,
1421 }
1422 }
1423 }
1424
1425 impl SignedTreeBuilder<state::CanGenerateNonces> {
1426 pub fn generate_user_nonces(
1428 self,
1429 cosign_key: &Keypair,
1430 ) -> SignedTreeBuilder<state::CanFinish> {
1431 let unsigned_tree = self.tree.unsigned_tree().expect("state invariant");
1432
1433 let mut cosign_sec_nonces = Vec::with_capacity(unsigned_tree.internal_sighashes.len());
1434 let mut cosign_pub_nonces = Vec::with_capacity(unsigned_tree.internal_sighashes.len());
1435 for sh in &unsigned_tree.internal_sighashes {
1436 let pair = musig::nonce_pair_with_msg(&cosign_key, &sh.to_byte_array());
1437 cosign_sec_nonces.push(pair.0);
1438 cosign_pub_nonces.push(pair.1);
1439 }
1440
1441 SignedTreeBuilder {
1442 user_pub_nonces: cosign_pub_nonces,
1443 user_sec_nonces: Some(cosign_sec_nonces),
1444
1445 expiry_height: self.expiry_height,
1446 server_pubkey: self.server_pubkey,
1447 exit_delta: self.exit_delta,
1448 cosign_pubkey: self.cosign_pubkey,
1449 unlock_preimage: self.unlock_preimage,
1450 tree: self.tree,
1451 _state: PhantomData,
1452 }
1453 }
1454 }
1455
1456 #[derive(Debug, Clone)]
1458 pub struct SignedTreeCosignResponse {
1459 pub pub_nonces: Vec<musig::PublicNonce>,
1460 pub partial_signatures: Vec<musig::PartialSignature>,
1461 }
1462
1463 impl SignedTreeBuilder<state::ServerCanCosign> {
1464 pub fn new_for_cosign(
1466 vtxos: impl IntoIterator<Item = VtxoRequest>,
1467 cosign_pubkey: PublicKey,
1468 unlock_preimage: UnlockPreimage,
1469 expiry_height: BlockHeight,
1470 server_pubkey: PublicKey,
1471 server_cosign_pubkey: PublicKey,
1472 exit_delta: BlockDelta,
1473 utxo: OutPoint,
1474 user_pub_nonces: Vec<musig::PublicNonce>,
1475 ) -> Result<SignedTreeBuilder<state::ServerCanCosign>, SignedTreeBuilderError> {
1476 let unsigned_tree = SignedTreeBuilder::construct_tree_spec(
1477 vtxos,
1478 cosign_pubkey,
1479 sha256::Hash::hash(&unlock_preimage),
1480 expiry_height,
1481 server_pubkey,
1482 server_cosign_pubkey,
1483 exit_delta,
1484 )?.into_unsigned_tree(utxo);
1485
1486 Ok(SignedTreeBuilder {
1487 expiry_height,
1488 server_pubkey,
1489 exit_delta,
1490 cosign_pubkey,
1491 unlock_preimage,
1492 user_pub_nonces,
1493 tree: BuilderTree::Unsigned(unsigned_tree),
1494 user_sec_nonces: None,
1495 _state: PhantomData,
1496 })
1497 }
1498
1499 pub fn server_cosign(&self, server_cosign_key: &Keypair) -> SignedTreeCosignResponse {
1501 let unsigned_tree = self.tree.unsigned_tree().expect("state invariant");
1502
1503 let mut sec_nonces = Vec::with_capacity(unsigned_tree.internal_sighashes.len());
1504 let mut pub_nonces = Vec::with_capacity(unsigned_tree.internal_sighashes.len());
1505 for sh in &unsigned_tree.internal_sighashes {
1506 let pair = musig::nonce_pair_with_msg(&server_cosign_key, &sh.to_byte_array());
1507 sec_nonces.push(pair.0);
1508 pub_nonces.push(pair.1);
1509 }
1510
1511 let agg_nonces = self.user_pub_nonces().iter().zip(&pub_nonces)
1512 .map(|(u, s)| musig::AggregatedNonce::new(&[u, s]))
1513 .collect::<Vec<_>>();
1514
1515 let sigs = unsigned_tree.cosign_tree(&agg_nonces, &server_cosign_key, sec_nonces);
1516
1517 SignedTreeCosignResponse {
1518 pub_nonces,
1519 partial_signatures: sigs,
1520 }
1521 }
1522 }
1523
1524 impl SignedTreeBuilder<state::CanFinish> {
1525 pub fn verify_cosign_response(
1527 &self,
1528 server_cosign: &SignedTreeCosignResponse,
1529 ) -> Result<(), CosignSignatureError> {
1530 let unsigned_tree = self.tree.unsigned_tree().expect("state invariant");
1531
1532 let agg_nonces = self.user_pub_nonces().iter()
1533 .zip(&server_cosign.pub_nonces)
1534 .map(|(u, s)| musig::AggregatedNonce::new(&[u, s]))
1535 .collect::<Vec<_>>();
1536
1537 unsigned_tree.verify_global_cosign_partial_sigs(
1538 *unsigned_tree.spec.global_cosign_pubkeys.get(1).expect("state invariant"),
1539 &agg_nonces,
1540 &server_cosign.pub_nonces,
1541 &server_cosign.partial_signatures,
1542 )
1543 }
1544
1545 pub fn build_tree(
1546 self,
1547 server_cosign: &SignedTreeCosignResponse,
1548 cosign_key: &Keypair,
1549 ) -> Result<SignedVtxoTreeSpec, IncorrectSigningKeyError> {
1550 if cosign_key.public_key() != self.cosign_pubkey {
1551 return Err(IncorrectSigningKeyError {
1552 required: Some(self.cosign_pubkey),
1553 provided: cosign_key.public_key(),
1554 });
1555 }
1556
1557 let agg_nonces = self.user_pub_nonces().iter().zip(&server_cosign.pub_nonces)
1558 .map(|(u, s)| musig::AggregatedNonce::new(&[u, s]))
1559 .collect::<Vec<_>>();
1560
1561 let unsigned_tree = self.tree.into_unsigned_tree().expect("state invariant");
1562 let sec_nonces = self.user_sec_nonces.expect("state invariant");
1563 let partial_sigs = unsigned_tree.cosign_tree(&agg_nonces, cosign_key, sec_nonces);
1564
1565 debug_assert!(unsigned_tree.verify_global_cosign_partial_sigs(
1566 self.cosign_pubkey,
1567 &agg_nonces,
1568 &self.user_pub_nonces,
1569 &partial_sigs,
1570 ).is_ok(), "produced invalid partial signatures");
1571
1572 let sigs = unsigned_tree.combine_partial_signatures(
1573 &agg_nonces,
1574 &HashMap::new(),
1575 &[&server_cosign.partial_signatures, &partial_sigs],
1576 ).expect("should work with correct cosign signatures");
1577
1578 Ok(unsigned_tree.into_signed_tree(sigs))
1579 }
1580 }
1581}
1582
1583const VTXO_TREE_SPEC_VERSION: u8 = 0x02;
1585
1586impl ProtocolEncoding for VtxoTreeSpec {
1587 fn encode<W: io::Write + ?Sized>(&self, w: &mut W) -> Result<(), io::Error> {
1588 w.emit_u8(VTXO_TREE_SPEC_VERSION)?;
1589 w.emit_u32(self.expiry_height)?;
1590 self.server_pubkey.encode(w)?;
1591 w.emit_u16(self.exit_delta)?;
1592 LengthPrefixedVector::new(&self.global_cosign_pubkeys).encode(w)?;
1593 LengthPrefixedVector::new(&self.vtxos).encode(w)?;
1594 Ok(())
1595 }
1596
1597 fn decode<R: io::Read + ?Sized>(r: &mut R) -> Result<Self, ProtocolDecodingError> {
1598 let version = r.read_u8()?;
1599
1600 if version != VTXO_TREE_SPEC_VERSION {
1601 return Err(ProtocolDecodingError::invalid(format_args!(
1602 "invalid VtxoTreeSpec encoding version byte: {version:#x}",
1603 )));
1604 }
1605
1606 let expiry_height = r.read_u32()?;
1607 let server_pubkey = PublicKey::decode(r)?;
1608 let exit_delta = r.read_u16()?;
1609 let global_cosign_pubkeys = LengthPrefixedVector::decode(r)?.into_inner();
1610 let vtxos = LengthPrefixedVector::decode(r)?.into_inner();
1611 Ok(VtxoTreeSpec { vtxos, expiry_height, server_pubkey, exit_delta, global_cosign_pubkeys })
1612 }
1613}
1614
1615const SIGNED_VTXO_TREE_SPEC_VERSION: u8 = 0x02;
1617
1618const SIGNED_VTXO_TREE_SPEC_VERSION_U32_SIZE: u8 = 0x01;
1620
1621impl ProtocolEncoding for SignedVtxoTreeSpec {
1622 fn encode<W: io::Write + ?Sized>(&self, w: &mut W) -> Result<(), io::Error> {
1623 w.emit_u8(SIGNED_VTXO_TREE_SPEC_VERSION)?;
1624 self.spec.encode(w)?;
1625 self.utxo.encode(w)?;
1626 LengthPrefixedVector::new(&self.cosign_sigs).encode(w)?;
1627 Ok(())
1628 }
1629
1630 fn decode<R: io::Read + ?Sized>(r: &mut R) -> Result<Self, ProtocolDecodingError> {
1631 let version = r.read_u8()?;
1632 if version != SIGNED_VTXO_TREE_SPEC_VERSION
1633 && version != SIGNED_VTXO_TREE_SPEC_VERSION_U32_SIZE
1634 {
1635 return Err(ProtocolDecodingError::invalid(format_args!(
1636 "invalid SignedVtxoTreeSpec encoding version byte: {version:#x}",
1637 )));
1638 }
1639 let spec = VtxoTreeSpec::decode(r)?;
1640 let utxo = OutPoint::decode(r)?;
1641 let cosign_sigs = if version == SIGNED_VTXO_TREE_SPEC_VERSION_U32_SIZE {
1642 let nb_cosign_sigs = r.read_u32()?;
1643 OversizedVectorError::check::<schnorr::Signature>(nb_cosign_sigs as usize)?;
1644 let mut cosign_sigs = Vec::with_capacity(nb_cosign_sigs as usize);
1645 for _ in 0..nb_cosign_sigs {
1646 cosign_sigs.push(schnorr::Signature::decode(r)?);
1647 }
1648 cosign_sigs
1649 } else {
1650 LengthPrefixedVector::decode(r)?.into_inner()
1651 };
1652 Ok(SignedVtxoTreeSpec { spec, utxo, cosign_sigs })
1653 }
1654}
1655
1656
1657#[cfg(test)]
1658mod test {
1659 use std::iter;
1660 use std::collections::HashMap;
1661 use std::str::FromStr;
1662
1663 use bitcoin::hashes::{siphash24, sha256, Hash, HashEngine};
1664 use bitcoin::key::rand::Rng;
1665 use bitcoin::secp256k1::{self, rand, Keypair};
1666 use bitcoin::{absolute, transaction};
1667 use rand::SeedableRng;
1668
1669 use crate::encode;
1670 use crate::test_util::{encoding_roundtrip, json_roundtrip};
1671 use crate::tree::signed::builder::SignedTreeBuilder;
1672 use crate::vtxo::policy::{ServerVtxoPolicy, VtxoPolicy};
1673
1674 use super::*;
1675
1676 fn test_tree_amounts(
1677 tree: &UnsignedVtxoTree,
1678 root_value: Amount,
1679 ) {
1680 let map = tree.txs.iter().map(|tx| (tx.compute_txid(), tx)).collect::<HashMap<_, _>>();
1681
1682 for (idx, tx) in tree.txs.iter().take(tree.txs.len() - 1).enumerate() {
1684 println!("tx #{idx}: {}", bitcoin::consensus::encode::serialize_hex(tx));
1685 let input = tx.input.iter().map(|i| {
1686 let prev = i.previous_output;
1687 map.get(&prev.txid).expect(&format!("tx {} not found", prev.txid))
1688 .output[prev.vout as usize].value
1689 }).sum::<Amount>();
1690 let output = tx.output_value();
1691 assert!(input >= output);
1692 assert_eq!(input, output);
1693 }
1694
1695 let root = tree.txs.last().unwrap();
1697 assert_eq!(root_value, root.output_value());
1698 }
1699
1700 #[test]
1701 fn vtxo_tree() {
1702 let secp = secp256k1::Secp256k1::new();
1703 let mut rand = rand::rngs::StdRng::seed_from_u64(42);
1704 let random_sig = {
1705 let key = Keypair::new(&secp, &mut rand);
1706 let sha = sha256::Hash::from_str("4bf5122f344554c53bde2ebb8cd2b7e3d1600ad631c385a5d7cce23c7785459a").unwrap();
1707 let msg = secp256k1::Message::from_digest(sha.to_byte_array());
1708 secp.sign_schnorr(&msg, &key)
1709 };
1710
1711 let server_key = Keypair::new(&secp, &mut rand);
1712 let server_cosign_key = Keypair::new(&secp, &mut rand);
1713
1714 struct Req {
1715 key: Keypair,
1716 cosign_key: Keypair,
1717 amount: Amount,
1718 hash: sha256::Hash,
1719 }
1720 impl Req {
1721 fn to_vtxo(&self) -> VtxoLeafSpec {
1722 VtxoLeafSpec {
1723 vtxo: VtxoRequest {
1724 amount: self.amount,
1725 policy: VtxoPolicy::new_pubkey(self.key.public_key()),
1726 },
1727 cosign_pubkey: Some(self.cosign_key.public_key()),
1728 unlock_hash: self.hash,
1729 }
1730 }
1731 }
1732
1733 let nb_leaves = 27;
1734 let reqs = iter::repeat_with(|| Req {
1735 key: Keypair::new(&secp, &mut rand),
1736 cosign_key: Keypair::new(&secp, &mut rand),
1737 amount: Amount::from_sat(100_000),
1738 hash: sha256::Hash::from_byte_array(rand.r#gen()),
1739 }).take(nb_leaves).collect::<Vec<_>>();
1740 let point = "0000000000000000000000000000000000000000000000000000000000000001:1".parse().unwrap();
1741
1742 let spec = VtxoTreeSpec::new(
1743 reqs.iter().map(|r| r.to_vtxo()).collect(),
1744 server_key.public_key(),
1745 101_000,
1746 2016,
1747 vec![server_cosign_key.public_key()],
1748 );
1749 assert_eq!(spec.nb_leaves(), nb_leaves);
1750 assert_eq!(spec.total_required_value().to_sat(), 2700000);
1751 let nb_nodes = spec.nb_nodes();
1752
1753 encoding_roundtrip(&spec);
1754
1755 let unsigned = spec.into_unsigned_tree(point);
1756
1757 test_tree_amounts(&unsigned, unsigned.spec.total_required_value());
1758
1759 let sighashes_hash = {
1760 let mut eng = siphash24::Hash::engine();
1761 unsigned.internal_sighashes.iter().for_each(|h| eng.input(&h[..]));
1762 siphash24::Hash::from_engine(eng)
1763 };
1764 assert_eq!(sighashes_hash.to_string(), "b83a4fe5937a7404");
1765
1766 let signed = unsigned.into_signed_tree(vec![random_sig; nb_nodes]);
1767
1768 encoding_roundtrip(&signed);
1769
1770 #[derive(Debug, PartialEq, Serialize, Deserialize)]
1771 struct JsonSignedVtxoTreeSpec {
1772 #[serde(with = "encode::serde")]
1773 pub spec: SignedVtxoTreeSpec,
1774 }
1775
1776 json_roundtrip(&JsonSignedVtxoTreeSpec { spec: signed.clone() });
1777
1778 for l in 0..nb_leaves {
1779 let exit = signed.exit_branch(l);
1780
1781 let mut iter = exit.iter().enumerate().peekable();
1783 while let Some((i, cur)) = iter.next() {
1784 if let Some((_, next)) = iter.peek() {
1785 assert_eq!(next.input[0].previous_output.txid, cur.compute_txid(), "{}", i);
1786 }
1787 }
1788 }
1789
1790 let cached = signed.into_cached_tree();
1791 for vtxo in cached.output_vtxos() {
1792 encoding_roundtrip(&vtxo);
1793 }
1794 }
1795
1796 #[test]
1797 fn test_tree_builder() {
1798 let expiry = 100_000;
1799 let exit_delta = 24;
1800
1801 let vtxo_key = Keypair::from_str("985247fb0ef008f8043b6be28add87710d42d482433ef287235bfe041ee6cc11").unwrap();
1802 let policy = VtxoPolicy::new_pubkey(vtxo_key.public_key());
1803 let user_cosign_key = Keypair::from_str("5255d132d6ec7d4fc2a41c8f0018bb14343489ddd0344025cc60c7aa2b3fda6a").unwrap();
1804 let user_cosign_pubkey = user_cosign_key.public_key();
1805 println!("user_cosign_pubkey: {}", user_cosign_pubkey);
1806
1807 let server_key = Keypair::from_str("1fb316e653eec61de11c6b794636d230379509389215df1ceb520b65313e5426").unwrap();
1808 let server_pubkey = server_key.public_key();
1809 println!("server_pubkey: {}", server_pubkey);
1810
1811 let server_cosign_key = Keypair::from_str("52a506fbae3b725749d2486afd4761841ec685b841c2967e30f24182c4b02eed").unwrap();
1812 let server_cosign_pubkey = server_cosign_key.public_key();
1813 println!("server_cosign_pubkey: {}", server_cosign_pubkey);
1814
1815 let unlock_preimage = rand::random::<UnlockPreimage>();
1816 let unlock_hash = sha256::Hash::hash(&unlock_preimage);
1817 println!("unlock_hash: {}", unlock_hash);
1818
1819 for nb_vtxos in [2, 3, 4, 5, 10, 50] {
1821 println!("building tree with {} vtxos", nb_vtxos);
1822 let vtxos = (0..nb_vtxos).map(|i| VtxoRequest {
1823 amount: Amount::from_sat(1000 * (i + 1)),
1824 policy: policy.clone(),
1825 }).collect::<Vec<_>>();
1826
1827 let builder = SignedTreeBuilder::new(
1828 vtxos.iter().cloned(), user_cosign_pubkey, unlock_preimage, expiry, server_pubkey,
1829 server_cosign_pubkey, exit_delta,
1830 ).unwrap();
1831
1832 let funding_tx = Transaction {
1833 version: transaction::Version::TWO,
1834 lock_time: absolute::LockTime::ZERO,
1835 input: vec![],
1836 output: vec![builder.funding_txout()],
1837 };
1838 let utxo = OutPoint::new(funding_tx.compute_txid(), 0);
1839 let builder = builder.set_utxo(utxo).generate_user_nonces(&user_cosign_key);
1840 let user_pub_nonces = builder.user_pub_nonces().to_vec();
1841
1842 let cosign = {
1843 let builder = SignedTreeBuilder::new_for_cosign(
1844 vtxos.iter().cloned(), user_cosign_pubkey, unlock_preimage, expiry, server_pubkey,
1845 server_cosign_pubkey, exit_delta, utxo, user_pub_nonces,
1846 ).unwrap();
1847 builder.server_cosign(&server_cosign_key)
1848 };
1849
1850 builder.verify_cosign_response(&cosign).unwrap();
1851 let tree = builder.build_tree(&cosign, &user_cosign_key).unwrap().into_cached_tree();
1852
1853 for mut vtxo in tree.output_vtxos() {
1855 {
1856 let mut with_preimage = vtxo.clone();
1858 assert!(with_preimage.provide_unlock_preimage(unlock_preimage));
1859 assert!(with_preimage.validate(&funding_tx).is_err());
1860 }
1861
1862 let (ctx, req) = LeafVtxoCosignContext::new(&vtxo, &funding_tx, &vtxo_key);
1863 let cosign = LeafVtxoCosignResponse::new_cosign(&req, &vtxo, &funding_tx, &server_key);
1864 assert!(ctx.finalize(&mut vtxo, cosign));
1865
1866
1867 assert!(!vtxo.has_all_witnesses());
1869 vtxo.validate_unsigned(&funding_tx).expect("Tree is valid if we ignore sigs");
1870 vtxo.validate(&funding_tx).expect_err("The signature check must fail");
1871
1872 assert!(vtxo.provide_unlock_preimage(unlock_preimage));
1873
1874 println!("vtxo debug: {:#?}", vtxo);
1875 println!("vtxo hex: {}", vtxo.serialize_hex());
1876 assert!(vtxo.has_all_witnesses());
1877 vtxo.validate(&funding_tx).expect("should be value");
1878
1879 vtxo.invalidate_final_sig();
1880 assert!(vtxo.has_all_witnesses(), "still has all witnesses, just an invalid one");
1881 vtxo.validate_unsigned(&funding_tx).expect("unsigned still valid");
1882 vtxo.validate(&funding_tx).expect_err("but not fully valid anymore");
1883 }
1884
1885 for (idx, vtxo) in tree.internal_vtxos().enumerate() {
1886 let mut prev_txout = funding_tx.output[vtxo.chain_anchor().vout as usize].clone();
1888
1889 for item in vtxo.transactions() {
1891 crate::test_util::verify_tx(&[prev_txout], 0, &item.tx)
1892 .expect("Invalid transaction");
1893 prev_txout = item.tx.output[item.output_idx].clone();
1894 }
1895
1896 if idx < nb_vtxos as usize {
1898 matches!(vtxo.policy(), ServerVtxoPolicy::HarkLeaf(_));
1900 } else {
1901 matches!(vtxo.policy(), ServerVtxoPolicy::Expiry(_));
1902 }
1903 }
1904 }
1905 }
1906
1907 #[test]
1908 fn vtxo_leaf_spec_encoding() {
1909 let pk1: PublicKey = "020aceb65eed0ee5c512d3718e6f4bd868a7efb58ede7899ffd9bcba09555d4eb8".parse().unwrap();
1910 let pk2: PublicKey = "02e4ed0ca35c3b8a2ff675b9b23f4961964b57e130afa607e32a83d2d9a510622b".parse().unwrap();
1911 let hash = sha256::Hash::from_str("4bf5122f344554c53bde2ebb8cd2b7e3d1600ad631c385a5d7cce23c7785459a").unwrap();
1912
1913 let spec_with_cosign = VtxoLeafSpec {
1915 vtxo: VtxoRequest {
1916 amount: Amount::from_sat(100_000),
1917 policy: VtxoPolicy::new_pubkey(pk1),
1918 },
1919 cosign_pubkey: Some(pk2),
1920 unlock_hash: hash,
1921 };
1922 encoding_roundtrip(&spec_with_cosign);
1923
1924 let spec_without_cosign = VtxoLeafSpec {
1926 vtxo: VtxoRequest {
1927 amount: Amount::from_sat(200_000),
1928 policy: VtxoPolicy::new_pubkey(pk1),
1929 },
1930 cosign_pubkey: None,
1931 unlock_hash: hash,
1932 };
1933 encoding_roundtrip(&spec_without_cosign);
1934 }
1935
1936 #[test]
1937 fn test_compat_u32_size_signed_spec() {
1938 let hex = "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";
1940 let ret = SignedVtxoTreeSpec::deserialize_hex(hex).unwrap();
1941 assert_eq!(ret.cosign_sigs.len(), 4);
1942 }
1943}