mirror of
https://github.com/aljazceru/lightning.git
synced 2025-12-20 23:54:22 +01:00
Split into two anchors.
This is a major change; instead of creating a mutual anchor (funding) transaction, each side creates its own. We use escape transactions in case anything goes wrong; these will be revoked later. Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
This commit is contained in:
@@ -23,101 +23,120 @@ int main(int argc, char *argv[])
|
||||
{
|
||||
const tal_t *ctx = tal_arr(NULL, char, 0);
|
||||
OpenChannel *o1, *o2;
|
||||
OpenAnchor *oa1, *oa2;
|
||||
Pkt *pkt;
|
||||
struct bitcoin_tx *anchor, *commit;
|
||||
struct sha256_double anchor_txid;
|
||||
AnchorSpend mysigs = ANCHOR_SPEND__INIT;
|
||||
struct bitcoin_tx *commit;
|
||||
struct sha256_double anchor_txid1, anchor_txid2;
|
||||
struct sha256 escape_hash1, escape_hash2;
|
||||
struct privkey privkey;
|
||||
bool testnet;
|
||||
struct bitcoin_signature sig1, sig2;
|
||||
size_t i;
|
||||
struct pubkey pubkey1, pubkey2;
|
||||
u8 *redeemscript;
|
||||
struct signature sigs[2];
|
||||
AnchorSpend *their_sigs;
|
||||
size_t i, inmap[2];
|
||||
struct pubkey pubkey1, pubkey2, final1, final2;
|
||||
int64_t delta;
|
||||
struct sha256 rhash;
|
||||
|
||||
err_set_progname(argv[0]);
|
||||
|
||||
opt_register_noarg("--help|-h", opt_usage_and_exit,
|
||||
"<anchor-tx> <open-channel-file1> <open-channel-file2> <commit-privkey> [final-update-accept|open-commit-sig] [<updates>]\n"
|
||||
"<open-channel-file1> <open-channel-file2> <open-anchor-file1> <open-anchor-file2> <commit-privkey> [final-update-accept|open-commit-sig] [<updates>]\n"
|
||||
"Create the signature needed for the commit transaction",
|
||||
"Print this message.");
|
||||
|
||||
opt_parse(&argc, argv, opt_log_stderr_exit);
|
||||
|
||||
if (argc < 6)
|
||||
opt_usage_exit_fail("Expected 5+ arguments");
|
||||
if (argc < 7)
|
||||
opt_usage_exit_fail("Expected 6+ arguments");
|
||||
|
||||
anchor = bitcoin_tx_from_file(ctx, argv[1]);
|
||||
bitcoin_txid(anchor, &anchor_txid);
|
||||
o1 = pkt_from_file(argv[2], PKT__PKT_OPEN)->open;
|
||||
o2 = pkt_from_file(argv[3], PKT__PKT_OPEN)->open;
|
||||
o1 = pkt_from_file(argv[1], PKT__PKT_OPEN)->open;
|
||||
proto_to_sha256(o1->escape_hash, &escape_hash1);
|
||||
o2 = pkt_from_file(argv[2], PKT__PKT_OPEN)->open;
|
||||
proto_to_sha256(o2->escape_hash, &escape_hash2);
|
||||
oa1 = pkt_from_file(argv[3], PKT__PKT_OPEN_ANCHOR)->open_anchor;
|
||||
oa2 = pkt_from_file(argv[4], PKT__PKT_OPEN_ANCHOR)->open_anchor;
|
||||
proto_to_sha256(oa1->anchor_txid, &anchor_txid1.sha);
|
||||
proto_to_sha256(oa2->anchor_txid, &anchor_txid2.sha);
|
||||
|
||||
if (!key_from_base58(argv[4], strlen(argv[4]), &testnet, &privkey, &pubkey1))
|
||||
errx(1, "Invalid private key '%s'", argv[4]);
|
||||
if (!key_from_base58(argv[5], strlen(argv[5]), &testnet, &privkey, &pubkey1))
|
||||
errx(1, "Invalid private key '%s'", argv[5]);
|
||||
if (!testnet)
|
||||
errx(1, "Private key '%s' not on testnet!", argv[4]);
|
||||
errx(1, "Private key '%s' not on testnet!", argv[5]);
|
||||
|
||||
/* Get pubkeys */
|
||||
if (!proto_to_pubkey(o1->anchor->pubkey, &pubkey2))
|
||||
errx(1, "Invalid o1 anchor pubkey");
|
||||
if (!proto_to_pubkey(o1->commitkey, &pubkey2))
|
||||
errx(1, "Invalid o1 pubkey");
|
||||
if (pubkey_len(&pubkey1) != pubkey_len(&pubkey2)
|
||||
|| memcmp(pubkey1.key, pubkey2.key, pubkey_len(&pubkey2)) != 0)
|
||||
errx(1, "o1 pubkey != this privkey");
|
||||
if (!proto_to_pubkey(o2->anchor->pubkey, &pubkey2))
|
||||
errx(1, "Invalid o2 anchor pubkey");
|
||||
if (!proto_to_pubkey(o2->commitkey, &pubkey2))
|
||||
errx(1, "Invalid o2 pubkey");
|
||||
if (!proto_to_pubkey(o1->final, &final1))
|
||||
errx(1, "Invalid o1 final pubkey");
|
||||
if (!proto_to_pubkey(o2->final, &final2))
|
||||
errx(1, "Invalid o2 final pubkey");
|
||||
|
||||
/* Their signature comes from open-commit or from update-accept. */
|
||||
sig2.stype = SIGHASH_ALL;
|
||||
pkt = any_pkt_from_file(argv[5]);
|
||||
pkt = any_pkt_from_file(argv[6]);
|
||||
|
||||
switch (pkt->pkt_case) {
|
||||
case PKT__PKT_UPDATE_ACCEPT:
|
||||
if (!proto_to_signature(pkt->update_accept->sig, &sig2.sig))
|
||||
errx(1, "Invalid update-accept sig");
|
||||
their_sigs = pkt->update_accept->sigs;
|
||||
break;
|
||||
case PKT__PKT_OPEN_COMMIT_SIG:
|
||||
if (!proto_to_signature(pkt->open_commit_sig->sig, &sig2.sig))
|
||||
errx(1, "Invalid open-commit-sig sig");
|
||||
their_sigs = pkt->open_commit_sig->sigs;
|
||||
break;
|
||||
default:
|
||||
errx(1, "Unexpected packet type %u in %s",
|
||||
pkt->pkt_case, argv[5]);
|
||||
pkt->pkt_case, argv[6]);
|
||||
}
|
||||
|
||||
/* Initial revocation hash comes from open. */
|
||||
proto_to_sha256(o1->revocation_hash, &rhash);
|
||||
|
||||
delta = 0;
|
||||
/* Figure out cumulative delta since anchor, update revocation hash */
|
||||
for (i = 6; i < argc; i++) {
|
||||
/* Figure out cumulative delta since anchors, update revocation hash */
|
||||
for (i = 7; i < argc; i++) {
|
||||
Update *u = pkt_from_file(argv[i], PKT__PKT_UPDATE)->update;
|
||||
delta += u->delta;
|
||||
proto_to_sha256(u->revocation_hash, &rhash);
|
||||
}
|
||||
redeemscript = bitcoin_redeem_2of2(ctx, &pubkey1, &pubkey2);
|
||||
|
||||
/* Now create commitment tx to spend 2/2 output of anchor. */
|
||||
commit = create_commit_tx(ctx, o1, o2, &rhash, delta, &anchor_txid,
|
||||
find_p2sh_out(anchor, redeemscript));
|
||||
/* Now create commitment tx to spend 2/2 outputs of anchors. */
|
||||
commit = create_commit_tx(ctx, o1, o2, &rhash, delta,
|
||||
&anchor_txid1, oa1->index, o1->total_input,
|
||||
&anchor_txid2, oa2->index, o2->total_input,
|
||||
inmap);
|
||||
|
||||
/* If contributions don't exceed fees, this fails. */
|
||||
if (!commit)
|
||||
errx(1, "Bad commit amounts");
|
||||
|
||||
/* We generate our signature. */
|
||||
sig1.stype = SIGHASH_ALL;
|
||||
sign_tx_input(ctx, commit, 0, redeemscript, tal_count(redeemscript),
|
||||
&privkey, &pubkey1, &sig1.sig);
|
||||
if (!check_anchor_spend(commit, inmap,
|
||||
&pubkey1, &final1, &escape_hash1,
|
||||
&pubkey2, &final2, &escape_hash2,
|
||||
&pubkey2, their_sigs))
|
||||
errx(1, "Bad signatures");
|
||||
|
||||
if (!check_2of2_sig(commit, 0, redeemscript, tal_count(redeemscript),
|
||||
&pubkey1, &pubkey2, &sig1, &sig2))
|
||||
errx(1, "Signature failed");
|
||||
/* We generate our signatures. */
|
||||
if (!sign_anchor_spend(commit, inmap,
|
||||
&pubkey1, &final1, &escape_hash1,
|
||||
&pubkey2, &final2, &escape_hash2,
|
||||
&pubkey1, &privkey, sigs))
|
||||
errx(1, "Could not create signatures");
|
||||
|
||||
/* Create p2sh input for commit */
|
||||
commit->input[0].script = scriptsig_p2sh_2of2(commit, &sig1, &sig2,
|
||||
&pubkey1, &pubkey2);
|
||||
commit->input[0].script_length = tal_count(commit->input[0].script);
|
||||
/* populate_anchor_inscripts wants args in protobuf */
|
||||
mysigs.sig0 = signature_to_proto(ctx, &sigs[0]);
|
||||
mysigs.sig1 = signature_to_proto(ctx, &sigs[1]);
|
||||
|
||||
/* Shouldn't fail, since we checked them in check_anchor_spend */
|
||||
if (!populate_anchor_inscripts(commit, commit, inmap,
|
||||
&pubkey1, &final1, &escape_hash1,
|
||||
&pubkey2, &final2, &escape_hash2,
|
||||
&mysigs, their_sigs))
|
||||
errx(1, "Malformed signatures");
|
||||
|
||||
/* Print it out in hex. */
|
||||
if (!bitcoin_tx_write(STDOUT_FILENO, commit))
|
||||
err(1, "Writing out transaction");
|
||||
|
||||
Reference in New Issue
Block a user