|
| 1 | +use std::str::FromStr; |
| 2 | + |
| 3 | +use bitcoin::absolute::LockTime; |
| 4 | +use bitcoin::consensus::encode::serialize; |
| 5 | +use bitcoin::hashes::Hash; |
| 6 | +use bitcoin::hex::{Case, DisplayHex}; |
| 7 | +use bitcoin::transaction::Version; |
| 8 | +use bitcoin::{Address, Amount, Network, Psbt, PublicKey, Sequence, TxIn, TxOut}; |
| 9 | +use helper_fns::{produce_grim_hash, produce_kelly_hash, produce_key_pairs}; |
| 10 | +use miniscript::descriptor::DescriptorSecretKey; |
| 11 | +use miniscript::policy::Concrete; |
| 12 | +use miniscript::psbt::PsbtExt; |
| 13 | +use miniscript::{Descriptor, DescriptorPublicKey}; |
| 14 | +mod helper_fns; |
| 15 | + |
| 16 | +pub const KEYS_PER_PERSONA: usize = 9; |
| 17 | + |
| 18 | +fn main() { |
| 19 | + let secp: &secp256k1::Secp256k1<secp256k1::All> = &secp256k1::Secp256k1::new(); |
| 20 | + |
| 21 | + // ====== 1. Setup Hardcoded values for all of the personas ====== |
| 22 | + |
| 23 | + // Define derivation paths that will be used |
| 24 | + let normal_path = "86'/1'/0'/0"; |
| 25 | + let unhardened_path = "86/1/0/0"; |
| 26 | + let weird_path = "69'/420'/999999999'/8008135'"; |
| 27 | + |
| 28 | + // Hard coded regtest tprvs that will be used. |
| 29 | + let internal = format!("tprv8ZgxMBicQKsPfBJTWzMTQfRzcE3HCNKg6TUBpGBfigcFbqTXNBw6SuGPqBpD6D9pjLLASwq8bE7oZXCtMFPDKRizLy14xNqw4uz1zwrfo2c/{normal_path}/*"); |
| 30 | + let alice = format!("tprv8ZgxMBicQKsPeZjVFDhZR5wjfCvFNev9qKGPDPC77p5cAEgEMUCR8Cecaf8pYfY7NTz8QcjVnP8uR8NedPz8o7iG7qWgnFMyQy9BAhMVZgb/{normal_path}/*"); |
| 31 | + let bob = format!("tprv8ZgxMBicQKsPeHy2kPPVzYpbUqwTVBjSthMJUcGyqUiXk8eZTQ6xrJKEmdX8NYJKLLGCHGjuByqz2ahJXp52E8zCUV7njziJzwN7V7zfrKZ/{normal_path}/*"); |
| 32 | + let charlie = format!("tprv8ZgxMBicQKsPdYaiWLUQCprj7Ej9Ka5GEq6giWHgTnbJvdLWnSuYnsF5sonVh6iy2HzvfkfxRDAmWEXNo3SJWTHCXM6XuxVZvqxtEyjdC29/{normal_path}/*"); |
| 33 | + let dave = format!("tprv8ZgxMBicQKsPfCRUoMSWthoE8aJKr7De5YkxS1y55PuiSoi5ACyYUbas8Kv4vVtDzhKnBgY7cVSuogg2QLqtFcSZVv4ZTeBEzkzSnF9cSUT/{weird_path}/*"); |
| 34 | + let eve = format!("tprv8ZgxMBicQKsPdYD5umCPZeh6tMqKfQATctqJbycgJ5N1rrJ15cHMgxds5iYENHZHmkMiXccAqUFx2k3ZNwU9qxPMjrKvTbCtgLFxk7mjMWD/{normal_path}/*"); |
| 35 | + let frank = format!("tprv8ZgxMBicQKsPemyPyxqZ85T1UjpToCbLQ7uSn4JpbtwMBCodjvrLbgjBZeGgT4tMHdHCqyieDwCNzE7RrtRMVCQjPKQbGJzrg5vfn4eT7og/{normal_path}/*"); |
| 36 | + let heather = format!("tprv8ZgxMBicQKsPefp99xLkwnQbU9LEEb8v4Aig3o4hwnjbaYotixkbJv3Ssmog68ptHij2LgExefNU96DYJKtFbDazTr1jm48twYhQLG775qw/{normal_path}/*"); |
| 37 | + let ian = format!("tprv8ZgxMBicQKsPfGsuwfAdg3xPP452wreLk7ZEgusb8zdMqh1fyKGKnzFbxyxeHY3qhg8ESDRp5F6RgWiQGcvkmLyERcMys5V8DuT4gvxMDmS/{unhardened_path}/*"); |
| 38 | + let judy = format!("tprv8ZgxMBicQKsPcz4VcN87e2e9k1LHDBLLajbVSAKAedpm1qakjtRT5xrdnmsQARWAfwg3REr6sNd5YHeWuWkHVvyey3rYmq9xYorMvwY3XAB/{normal_path}/*"); |
| 39 | + let liam = format!("tprv8ZgxMBicQKsPcycCJ2v7B1utZrhWJNdQTBm7m9eR6iX1D9a9YvjbCNeT6dTEdMh4JziVCHD4YHQ7AXkZNMLfaBVf3CCiVWQLxwdU2SnrPcT/{normal_path}/*"); |
| 40 | + let s_backup_1 = format!("tprv8ZgxMBicQKsPetPYYt5GUtNmQPChghNDBLbgJXz3cTZopeDrxHMendLpujaBHMPX3dXLZcv2NkgAvxMeuf1jWBU3iYxdeJAhktdeM9cKcYF/{normal_path}/*"); |
| 41 | + let x_backup_2 = format!("tprv8ZgxMBicQKsPdf55kYg8pVPrUaW3VLZyt8XwxwrvSPkpskxDah1mAWypsTTZJeomWPrGf4e5RyT4zVzENHrwAsXxJP2EPYbfrYLRVFC1rLb/{normal_path}/*"); |
| 42 | + |
| 43 | + // define DescriptorSecretKeys |
| 44 | + let internal_desc_secret = DescriptorSecretKey::from_str(&internal).unwrap(); |
| 45 | + let a_descriptor_desc_secret = DescriptorSecretKey::from_str(&alice).unwrap(); |
| 46 | + let b_descriptor_desc_secret = DescriptorSecretKey::from_str(&bob).unwrap(); |
| 47 | + let c_descriptor_desc_secret = DescriptorSecretKey::from_str(&charlie).unwrap(); |
| 48 | + let d_descriptor_desc_secret = DescriptorSecretKey::from_str(&dave).unwrap(); |
| 49 | + let e_descriptor_desc_secret = DescriptorSecretKey::from_str(&eve).unwrap(); |
| 50 | + let f_descriptor_desc_secret = DescriptorSecretKey::from_str(&frank).unwrap(); |
| 51 | + let h_descriptor_desc_secret = DescriptorSecretKey::from_str(&heather).unwrap(); |
| 52 | + let i_descriptor_desc_secret = DescriptorSecretKey::from_str(&ian).unwrap(); |
| 53 | + let j_descriptor_desc_secret = DescriptorSecretKey::from_str(&judy).unwrap(); |
| 54 | + let l_descriptor_desc_secret = DescriptorSecretKey::from_str(&liam).unwrap(); |
| 55 | + let s_descriptor_desc_secret = DescriptorSecretKey::from_str(&s_backup_1).unwrap(); |
| 56 | + let x_descriptor_desc_secret = DescriptorSecretKey::from_str(&x_backup_2).unwrap(); |
| 57 | + let grim = produce_grim_hash("sovereignty through knowledge"); |
| 58 | + let kelly = produce_kelly_hash("the ultimate pre-preimage"); |
| 59 | + |
| 60 | + // ====== 2. Derive Keys, Preimages, Hashes, and Timelocks for Policy and Signing ====== |
| 61 | + |
| 62 | + let internal_xpub: miniscript::DescriptorPublicKey = |
| 63 | + internal_desc_secret.to_public(secp).unwrap(); |
| 64 | + |
| 65 | + // example of how defining the internal xpriv that can be used for signing. |
| 66 | + // let internal_xpriv: DescriptorXKey<bitcoin::bip32::Xpriv> = match internal_desc_secret { |
| 67 | + // miniscript::descriptor::DescriptorSecretKey::XPrv(x) => Some(x.clone()), |
| 68 | + // _ => None, |
| 69 | + // } |
| 70 | + // .unwrap(); |
| 71 | + |
| 72 | + let (a_pks, a_prvs) = produce_key_pairs(a_descriptor_desc_secret, secp, normal_path, "alice"); |
| 73 | + let (b_pks, b_prvs) = produce_key_pairs(b_descriptor_desc_secret, secp, normal_path, "bob"); |
| 74 | + let (c_pks, c_prvs) = produce_key_pairs(c_descriptor_desc_secret, secp, normal_path, "charlie"); |
| 75 | + let (d_pks, d_prvs) = produce_key_pairs(d_descriptor_desc_secret, secp, weird_path, "dave"); |
| 76 | + let (e_pks, e_prvs) = produce_key_pairs(e_descriptor_desc_secret, secp, normal_path, "eve"); |
| 77 | + let (f_pks, f_prvs) = produce_key_pairs(f_descriptor_desc_secret, secp, normal_path, "frank"); |
| 78 | + let (h_pks, h_prvs) = produce_key_pairs(h_descriptor_desc_secret, secp, normal_path, "heather"); |
| 79 | + let (i_pks, i_prvs) = produce_key_pairs(i_descriptor_desc_secret, secp, unhardened_path, "ian"); |
| 80 | + let (j_pks, j_prvs) = produce_key_pairs(j_descriptor_desc_secret, secp, normal_path, "judy"); |
| 81 | + let (l_pks, l_prvs) = produce_key_pairs(l_descriptor_desc_secret, secp, normal_path, "liam"); |
| 82 | + let (s_pks, _s_prvs) = |
| 83 | + produce_key_pairs(s_descriptor_desc_secret, secp, normal_path, "s_backup1"); |
| 84 | + let (x_pks, _x_prvs) = |
| 85 | + produce_key_pairs(x_descriptor_desc_secret, secp, normal_path, "x_backup2"); |
| 86 | + |
| 87 | + // For this example we are grabbing the 9 keys for each persona |
| 88 | + let [a0, a1, a2, a3, a4, a5, a6, a7, a8]: [PublicKey; KEYS_PER_PERSONA] = |
| 89 | + a_pks[..].try_into().unwrap(); |
| 90 | + let [b0, b1, b2, b3, b4, b5, b6, b7, b8]: [PublicKey; KEYS_PER_PERSONA] = |
| 91 | + b_pks[..].try_into().unwrap(); |
| 92 | + let [c0, c1, c2, c3, c4, c5, c6, c7, c8]: [PublicKey; KEYS_PER_PERSONA] = |
| 93 | + c_pks[..].try_into().unwrap(); |
| 94 | + let [d0, d1, d2, d3, d4, d5, d6, d7, d8]: [PublicKey; KEYS_PER_PERSONA] = |
| 95 | + d_pks[..].try_into().unwrap(); |
| 96 | + let [e0, e1, e2, e3, e4, e5, e6, e7, e8]: [PublicKey; KEYS_PER_PERSONA] = |
| 97 | + e_pks[..].try_into().unwrap(); |
| 98 | + let [f0, f1, f2, f3, f4, f5, f6, f7, f8]: [PublicKey; KEYS_PER_PERSONA] = |
| 99 | + f_pks[..].try_into().unwrap(); |
| 100 | + let [h0, h1, h2, h3, h4, h5, h6, h7, h8]: [PublicKey; KEYS_PER_PERSONA] = |
| 101 | + h_pks[..].try_into().unwrap(); |
| 102 | + let [i0, i1, i2, i3, i4, i5, i6, i7, i8]: [PublicKey; KEYS_PER_PERSONA] = |
| 103 | + i_pks[..].try_into().unwrap(); |
| 104 | + let [j0, j1, j2, j3, j4, j5, j6, j7, j8]: [PublicKey; KEYS_PER_PERSONA] = |
| 105 | + j_pks[..].try_into().unwrap(); |
| 106 | + let [l0, l1, l2, l3, l4, l5, l6, l7, l8]: [PublicKey; KEYS_PER_PERSONA] = |
| 107 | + l_pks[..].try_into().unwrap(); |
| 108 | + let [_s0, _s1, s2, _s3, s4, s5, _s6, s7, s8]: [PublicKey; KEYS_PER_PERSONA] = |
| 109 | + s_pks[..].try_into().unwrap(); |
| 110 | + let [_x0, _x1, x2, _x3, x4, x5, x6, _x7, x8]: [PublicKey; KEYS_PER_PERSONA] = |
| 111 | + x_pks[..].try_into().unwrap(); |
| 112 | + |
| 113 | + // Hashes that will also be used in the policy. |
| 114 | + let g = grim.1; |
| 115 | + let k = kelly.1; |
| 116 | + // Absolute timelocks that were used at TABConf 6, The event took place Oct 23-26 and more spending paths for the puzzle became available during the conference. |
| 117 | + let oct_23_morning: u32 = 1729692000; // Oct 23, 10:00 AM EST |
| 118 | + let oct_24_evening: u32 = 1729819800; // Oct 24, 09:30 PM EST |
| 119 | + let oct_25_afternoon: u32 = 1729877400; // Oct 25, 01:30 PM EST |
| 120 | + let oct_26_morning: u32 = 1729942200; // Oct 26, 07:30 AM EST |
| 121 | + |
| 122 | + // ====== 3. Create Taptree Policy and Descriptor ====== |
| 123 | + |
| 124 | + let pol_str = format!( |
| 125 | + "or( |
| 126 | + pk({internal_xpub}), |
| 127 | + or( |
| 128 | + and( |
| 129 | + thresh(10, pk({a0}), pk({b0}), pk({c0}), pk({d0}), pk({e0}), pk({f0}), pk({h0}), pk({i0}), pk({j0}), pk({l0})), |
| 130 | + thresh(3, sha256({k}), ripemd160({g}), after({oct_23_morning})) |
| 131 | + ), |
| 132 | + or( |
| 133 | + or( |
| 134 | + and( |
| 135 | + thresh(8, pk({a1}), pk({b1}), pk({c1}), pk({e1}), pk({f1}), pk({h1}), pk({i1}), pk({j1}), pk({l1})), |
| 136 | + thresh(3, pk({d1}), sha256({k}), after({oct_24_evening})) |
| 137 | + ), |
| 138 | + and( |
| 139 | + thresh(4, pk({a2}), pk({b2}), pk({c2}), pk({e2}), pk({f2}), pk({h2}), pk({i2}), pk({l2})), |
| 140 | + and( |
| 141 | + thresh(4, pk({d2}), pk({j2}), ripemd160({g}), after({oct_24_evening})), |
| 142 | + or(pk({s2}), pk({x2})) |
| 143 | + ) |
| 144 | + ) |
| 145 | + ), |
| 146 | + or( |
| 147 | + or( |
| 148 | + or( |
| 149 | + and( |
| 150 | + thresh(6, pk({a3}), pk({b3}), pk({c3}), pk({e3}), pk({f3}), pk({h3}), pk({i3}), pk({l3})), |
| 151 | + thresh(4, pk({d3}), pk({j3}), sha256({k}), after({oct_25_afternoon})) |
| 152 | + ), |
| 153 | + thresh(14, pk({a8}), pk({b8}), pk({c8}), pk({d8}), pk({e8}), pk({f8}), pk({h8}), pk({i8}), pk({j8}), pk({l8}), pk({s8}), pk({x8}), sha256({k}), ripemd160({g})) |
| 154 | + ), |
| 155 | + or( |
| 156 | + and( |
| 157 | + thresh(9, pk({a4}), pk({b4}), pk({c4}), pk({d4}), pk({e4}), pk({f4}), pk({h4}), pk({i4}), pk({j4}), pk({l4}), pk({s4}), pk({x4})), |
| 158 | + thresh(2, sha256({k}), after({oct_26_morning})) |
| 159 | + ), |
| 160 | + and( |
| 161 | + thresh(10, pk({a5}), pk({b5}), pk({c5}), pk({d5}), pk({e5}), pk({f5}), pk({h5}), pk({i5}), pk({j5}), pk({l5}), pk({s5}), pk({x5})), |
| 162 | + after({oct_26_morning}) |
| 163 | + ) |
| 164 | + ) |
| 165 | + ), |
| 166 | + or( |
| 167 | + and( |
| 168 | + thresh(4, pk({a6}), pk({b6}), pk({c6}), pk({e6}), pk({f6}), pk({h6}), pk({i6}), pk({l6})), |
| 169 | + thresh(5, pk({d6}), pk({x6}), pk({j6}), ripemd160({g}), after({oct_25_afternoon})) |
| 170 | + ), |
| 171 | + and( |
| 172 | + thresh(4, pk({a7}), pk({b7}), pk({c7}), pk({e7}), pk({f7}), pk({h7}), pk({i7}), pk({l7})), |
| 173 | + thresh(5, pk({d7}), pk({s7}), pk({j7}), ripemd160({g}), after({oct_25_afternoon})) |
| 174 | + ) |
| 175 | + ) |
| 176 | + ) |
| 177 | + ) |
| 178 | + ) |
| 179 | +
|
| 180 | + )" |
| 181 | + ) |
| 182 | + .replace(&[' ', '\n', '\t'][..], ""); |
| 183 | + |
| 184 | + // make sure policy doesn't have any issues |
| 185 | + let pol = Concrete::<DescriptorPublicKey>::from_str(&pol_str).unwrap(); |
| 186 | + let policy_desc: Descriptor<DescriptorPublicKey> = pol.compile_tr(None).unwrap(); |
| 187 | + |
| 188 | + // Now, using this public descriptor create the script address |
| 189 | + let derived_descriptor = policy_desc.at_derivation_index(0).unwrap(); |
| 190 | + let _script_address = derived_descriptor.address(Network::Regtest).unwrap(); |
| 191 | + println!("the receiving address of this script is: {}", _script_address); |
| 192 | + println!("\ndescriptor is: {}\n", policy_desc); |
| 193 | + |
| 194 | + // We assert internal key is the one used in the descriptor |
| 195 | + match &policy_desc { |
| 196 | + Descriptor::Tr(tr) => { |
| 197 | + // println!("internal: {}, eve: {}", tr.internal_key(), eve_xpub); |
| 198 | + assert!(tr.internal_key() == &internal_xpub); |
| 199 | + } |
| 200 | + _ => panic!("internal spending path is not correct"), |
| 201 | + } |
| 202 | + |
| 203 | + // ====== 4. Create an Example Spending Transaction from the Tapscript ====== |
| 204 | + |
| 205 | + let secp: &secp256k1::Secp256k1<secp256k1::All> = &secp256k1::Secp256k1::new(); |
| 206 | + |
| 207 | + let tx_in = TxIn { |
| 208 | + previous_output: bitcoin::OutPoint { |
| 209 | + txid: "8888888899999999aaaaaaaabbbbbbbbccccccccddddddddeeeeeeeeffffffff" |
| 210 | + .parse() |
| 211 | + .unwrap(), |
| 212 | + vout: 0, |
| 213 | + }, |
| 214 | + sequence: Sequence(0), |
| 215 | + // sequence: Sequence(40), |
| 216 | + ..Default::default() |
| 217 | + }; |
| 218 | + |
| 219 | + let prev_amount = Amount::from_sat(100_000_000); |
| 220 | + let witness_utxo = |
| 221 | + TxOut { value: prev_amount, script_pubkey: derived_descriptor.clone().script_pubkey() }; |
| 222 | + |
| 223 | + let destination_address = |
| 224 | + Address::from_str("bcrt1p2tl8zasepqe3j6m7hx4tdmqzndddr5wa9ugglpdzgenjwv42rkws66dk5a") |
| 225 | + .unwrap(); |
| 226 | + let destination_output: TxOut = TxOut { |
| 227 | + value: bitcoin::Amount::from_sat(99_999_000), |
| 228 | + script_pubkey: destination_address.assume_checked().script_pubkey(), |
| 229 | + }; |
| 230 | + |
| 231 | + let time = oct_23_morning; |
| 232 | + |
| 233 | + let unsigned_tx = bitcoin::Transaction { |
| 234 | + version: Version::TWO, |
| 235 | + lock_time: LockTime::from_time(time).unwrap(), |
| 236 | + input: vec![tx_in], |
| 237 | + output: vec![destination_output], |
| 238 | + }; |
| 239 | + |
| 240 | + let unsigned_tx_test_string = serialize(&unsigned_tx).to_hex_string(Case::Lower); |
| 241 | + assert!(unsigned_tx_test_string == "0200000001ffffffffeeeeeeeeddddddddccccccccbbbbbbbbaaaaaaaa99999999888888880000000000000000000118ddf5050000000022512052fe7176190833196b7eb9aab6ec029b5ad1d1dd2f108f85a246672732aa1d9d60011967"); |
| 242 | + |
| 243 | + let mut psbt = Psbt::from_unsigned_tx(unsigned_tx).unwrap(); |
| 244 | + psbt.inputs[0].witness_utxo = Some(witness_utxo); |
| 245 | + |
| 246 | + // Tell Psbt about the descriptor so it can sign with it |
| 247 | + psbt.update_input_with_descriptor(0, &derived_descriptor) |
| 248 | + .unwrap(); |
| 249 | + |
| 250 | + // ====== 5. Sign and Create a Spending Transaction ====== |
| 251 | + |
| 252 | + // this is how you would sign for an internal key spend |
| 253 | + //let _res = psbt.sign(&intneral_xpriv.xkey, secp).unwrap(); |
| 254 | + |
| 255 | + // how you would sign using the leaf that uses index 0 keys |
| 256 | + let _res = psbt.sign(&a_prvs[0], secp).unwrap(); |
| 257 | + let _res = psbt.sign(&b_prvs[0], secp).unwrap(); |
| 258 | + let _res = psbt.sign(&c_prvs[0], secp).unwrap(); |
| 259 | + let _res = psbt.sign(&d_prvs[0], secp).unwrap(); |
| 260 | + let _res = psbt.sign(&e_prvs[0], secp).unwrap(); |
| 261 | + let _res = psbt.sign(&f_prvs[0], secp).unwrap(); |
| 262 | + let _res = psbt.sign(&h_prvs[0], secp).unwrap(); |
| 263 | + let _res = psbt.sign(&i_prvs[0], secp).unwrap(); |
| 264 | + let _res = psbt.sign(&j_prvs[0], secp).unwrap(); |
| 265 | + let _res = psbt.sign(&l_prvs[0], secp).unwrap(); |
| 266 | + |
| 267 | + psbt.inputs[0] |
| 268 | + .sha256_preimages |
| 269 | + .insert(kelly.1, kelly.0.to_byte_array().to_vec()); |
| 270 | + |
| 271 | + psbt.inputs[0] |
| 272 | + .ripemd160_preimages |
| 273 | + .insert(grim.1, grim.0.to_byte_array().to_vec()); |
| 274 | + |
| 275 | + // Finalize PSBT now that we have all the required signatures and hash preimages. |
| 276 | + psbt.finalize_mut(secp).unwrap(); |
| 277 | + |
| 278 | + // Now extract the tx |
| 279 | + let signed_tx = psbt.extract_tx().unwrap(); |
| 280 | + let raw_tx = bitcoin::consensus::encode::serialize(&signed_tx).to_hex_string(Case::Lower); |
| 281 | + |
| 282 | + assert!(raw_tx == "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"); |
| 283 | +} |
0 commit comments