pub use crate::bitcoin::{ timelocks::Timelock, transactions::{TxCancel, TxLock, TxPunish, TxRedeem, TxRefund}, }; use crate::{bitcoin::timelocks::BlockHeight, config::Config, ExpiredTimelocks}; use ::bitcoin::{ hashes::{hex::ToHex, Hash}, secp256k1, util::psbt::PartiallySignedTransaction, SigHash, }; pub use ::bitcoin::{util::amount::Amount, Address, Network, Transaction, Txid}; use anyhow::{anyhow, bail, Result}; use async_trait::async_trait; use ecdsa_fun::{adaptor::Adaptor, fun::Point, nonce::Deterministic, ECDSA}; pub use ecdsa_fun::{adaptor::EncryptedSignature, fun::Scalar, Signature}; use miniscript::{Descriptor, Segwitv0}; use rand::{CryptoRng, RngCore}; use serde::{Deserialize, Serialize}; use sha2::Sha256; use std::str::FromStr; pub use wallet::Wallet; pub mod timelocks; pub mod transactions; pub mod wallet; // TODO: Configurable tx-fee (note: parties have to agree prior to swapping) // Current reasoning: // tx with largest weight (as determined by get_weight() upon broadcast in e2e // test) = 609 assuming segwit and 60 sat/vB: // (609 / 4) * 60 (sat/vB) = 9135 sats // Recommended: Overpay a bit to ensure we don't have to wait too long for test // runs. pub const TX_FEE: u64 = 15_000; #[derive(Debug, Clone, Deserialize, Serialize, PartialEq)] pub struct SecretKey { inner: Scalar, public: Point, } impl SecretKey { pub fn new_random(rng: &mut R) -> Self { let scalar = Scalar::random(rng); let ecdsa = ECDSA::<()>::default(); let public = ecdsa.verification_key_for(&scalar); Self { inner: scalar, public, } } pub fn public(&self) -> PublicKey { PublicKey(self.public) } pub fn to_bytes(&self) -> [u8; 32] { self.inner.to_bytes() } pub fn sign(&self, digest: SigHash) -> Signature { let ecdsa = ECDSA::>::default(); ecdsa.sign(&self.inner, &digest.into_inner()) } // TxRefund encsigning explanation: // // A and B, are the Bitcoin Public Keys which go on the joint output for // TxLock_Bitcoin. S_a and S_b, are the Monero Public Keys which go on the // joint output for TxLock_Monero // tx_refund: multisig(A, B), published by bob // bob can produce sig on B for tx_refund using b // alice sends over an encrypted signature on A for tx_refund using a encrypted // with S_b we want to leak s_b // produced (by Alice) encsig - published (by Bob) sig = s_b (it's not really // subtraction, it's recover) // self = a, Y = S_b, digest = tx_refund pub fn encsign(&self, Y: PublicKey, digest: SigHash) -> EncryptedSignature { let adaptor = Adaptor::>::default(); adaptor.encrypted_sign(&self.inner, &Y.0, &digest.into_inner()) } } #[derive(Debug, Copy, Clone, Serialize, Deserialize, PartialEq)] pub struct PublicKey(Point); impl From for Point { fn from(from: PublicKey) -> Self { from.0 } } impl From for SecretKey { fn from(scalar: Scalar) -> Self { let ecdsa = ECDSA::<()>::default(); let public = ecdsa.verification_key_for(&scalar); Self { inner: scalar, public, } } } impl From for Scalar { fn from(sk: SecretKey) -> Self { sk.inner } } impl From for PublicKey { fn from(scalar: Scalar) -> Self { let ecdsa = ECDSA::<()>::default(); PublicKey(ecdsa.verification_key_for(&scalar)) } } pub fn verify_sig( verification_key: &PublicKey, transaction_sighash: &SigHash, sig: &Signature, ) -> Result<()> { let ecdsa = ECDSA::verify_only(); if ecdsa.verify(&verification_key.0, &transaction_sighash.into_inner(), &sig) { Ok(()) } else { bail!(InvalidSignature) } } #[derive(Debug, Clone, Copy, thiserror::Error)] #[error("signature is invalid")] pub struct InvalidSignature; pub fn verify_encsig( verification_key: PublicKey, encryption_key: PublicKey, digest: &SigHash, encsig: &EncryptedSignature, ) -> Result<()> { let adaptor = Adaptor::>::default(); if adaptor.verify_encrypted_signature( &verification_key.0, &encryption_key.0, &digest.into_inner(), &encsig, ) { Ok(()) } else { bail!(InvalidEncryptedSignature) } } #[derive(Clone, Copy, Debug, thiserror::Error)] #[error("encrypted signature is invalid")] pub struct InvalidEncryptedSignature; pub fn build_shared_output_descriptor(A: Point, B: Point) -> Descriptor { const MINISCRIPT_TEMPLATE: &str = "c:and_v(v:pk(A),pk_k(B))"; // NOTE: This shouldn't be a source of error, but maybe it is let A = ToHex::to_hex(&secp256k1::PublicKey::from(A)); let B = ToHex::to_hex(&secp256k1::PublicKey::from(B)); let miniscript = MINISCRIPT_TEMPLATE.replace("A", &A).replace("B", &B); let miniscript = miniscript::Miniscript::::from_str(&miniscript) .expect("a valid miniscript"); Descriptor::Wsh(miniscript) } #[async_trait] pub trait BuildTxLockPsbt { async fn build_tx_lock_psbt( &self, output_address: Address, output_amount: Amount, ) -> Result; } #[async_trait] pub trait SignTxLock { async fn sign_tx_lock(&self, tx_lock: TxLock) -> Result; } #[async_trait] pub trait BroadcastSignedTransaction { async fn broadcast_signed_transaction(&self, transaction: Transaction) -> Result; } #[async_trait] pub trait WatchForRawTransaction { async fn watch_for_raw_transaction(&self, txid: Txid) -> Transaction; } #[async_trait] pub trait WaitForTransactionFinality { async fn wait_for_transaction_finality(&self, txid: Txid, config: Config) -> Result<()>; } #[async_trait] pub trait GetBlockHeight { async fn get_block_height(&self) -> BlockHeight; } #[async_trait] pub trait TransactionBlockHeight { async fn transaction_block_height(&self, txid: Txid) -> BlockHeight; } #[async_trait] pub trait WaitForBlockHeight { async fn wait_for_block_height(&self, height: BlockHeight); } #[async_trait] pub trait GetRawTransaction { async fn get_raw_transaction(&self, txid: Txid) -> Result; } #[async_trait] pub trait GetNetwork { fn get_network(&self) -> Network; } pub fn recover(S: PublicKey, sig: Signature, encsig: EncryptedSignature) -> Result { let adaptor = Adaptor::>::default(); let s = adaptor .recover_decryption_key(&S.0, &sig, &encsig) .map(SecretKey::from) .ok_or_else(|| anyhow!("secret recovery failure"))?; Ok(s) } pub async fn poll_until_block_height_is_gte(client: &B, target: BlockHeight) where B: GetBlockHeight, { while client.get_block_height().await < target { tokio::time::delay_for(std::time::Duration::from_secs(1)).await; } } pub async fn current_epoch( bitcoin_wallet: &W, cancel_timelock: Timelock, punish_timelock: Timelock, lock_tx_id: ::bitcoin::Txid, ) -> anyhow::Result where W: WatchForRawTransaction + TransactionBlockHeight + GetBlockHeight, { let current_block_height = bitcoin_wallet.get_block_height().await; let lock_tx_height = bitcoin_wallet.transaction_block_height(lock_tx_id).await; let cancel_timelock_height = lock_tx_height + cancel_timelock; let punish_timelock_height = cancel_timelock_height + punish_timelock; match ( current_block_height < cancel_timelock_height, current_block_height < punish_timelock_height, ) { (true, _) => Ok(ExpiredTimelocks::None), (false, true) => Ok(ExpiredTimelocks::Cancel), (false, false) => Ok(ExpiredTimelocks::Punish), } } pub async fn wait_for_cancel_timelock_to_expire( bitcoin_wallet: &W, cancel_timelock: Timelock, lock_tx_id: ::bitcoin::Txid, ) -> Result<()> where W: WatchForRawTransaction + TransactionBlockHeight + GetBlockHeight, { let tx_lock_height = bitcoin_wallet.transaction_block_height(lock_tx_id).await; poll_until_block_height_is_gte(bitcoin_wallet, tx_lock_height + cancel_timelock).await; Ok(()) }