Difference between revisions of "OP CHECKSIG"

m
 
(4 intermediate revisions by 2 users not shown)
Line 6: Line 6:
 
In addition to the stack parameters, OP_CHECKSIG needs to have  
 
In addition to the stack parameters, OP_CHECKSIG needs to have  
 
# the current transaction <math>TX_{current}</math>,  
 
# the current transaction <math>TX_{current}</math>,  
# the index of the transaction input in which the signature is checked <math>i</math>,  
+
# the [[index]] of the transaction input in which the signature is checked <math>i</math>,  
 
# the scriptPubKey in which this OP_CHECKSIG belongs <math>previousScriptPubKey</math>, and  
 
# the scriptPubKey in which this OP_CHECKSIG belongs <math>previousScriptPubKey</math>, and  
 
# the value in satoshi that the outpoint represents <math>amount</math>.  
 
# the value in satoshi that the outpoint represents <math>amount</math>.  
Line 13: Line 13:
  
 
== How it works ==
 
== How it works ==
In short, OP_CHECKSIG calls a function called "sighash" which produces a hash value of the serialised transaction. The hash value is the message on which the signature is verified. The signature and the public key involved in the verification are obtained from the stack.
+
In short, OP_CHECKSIG calls a function called "sighash" which produces a hash value of the serialised transaction. (For legacy sighash algorithm, please click [[Legacy Sighash Algorithm | here]].) The hash value is the message on which the signature is verified. The signature and the public key involved in the verification are obtained from the stack.
  
In detail,
+
In detail:
  
 
# Check the stack size is not less than 2.  
 
# Check the stack size is not less than 2.  
# the public key and the signature are popped as the top 2 items of the stack.  
+
# The public key and the signature are popped as the top 2 items of the stack.  
 
# Check the signature encoding is of the correct format [<DER signature><hashtype>]. An example: 47304402205a2b556c71ee1c12d8e0b460c3446aeca0e3ee71b7bc11c6ddd3da8beeec99c60220783a1f0c0158674df8904022ec30fab5154c4fc4c7e8467086f0204cc8e16cbb01, where 47 indicates number of bytes in hex (71 in decimal) of the signature including 1 byte of sighash flag at the end, the next 46 bytes (70 in decimal) are the ECDSA signature (r,s), the last byte is the sighash flag "ALL".  
 
# Check the signature encoding is of the correct format [<DER signature><hashtype>]. An example: 47304402205a2b556c71ee1c12d8e0b460c3446aeca0e3ee71b7bc11c6ddd3da8beeec99c60220783a1f0c0158674df8904022ec30fab5154c4fc4c7e8467086f0204cc8e16cbb01, where 47 indicates number of bytes in hex (71 in decimal) of the signature including 1 byte of sighash flag at the end, the next 46 bytes (70 in decimal) are the ECDSA signature (r,s), the last byte is the sighash flag "ALL".  
 
# Check the public key encoding is of the correct format. Both compressed public key and uncompressed public key can be acceptable. An example: 210220798b9772a8ae06d13027e6f501d09ea07f6dfc4b7afc3db3a6d6c57bf24239, where 21 indicates the number of bytes in hex of the public key, 02 indicates this is a compressed public and the y-coordinate is an even number, the rest is the value of the x-coordinate of the public key. Note that if the second byte is 04, then it indicates that the public key is given in its uncompressed form.   
 
# Check the public key encoding is of the correct format. Both compressed public key and uncompressed public key can be acceptable. An example: 210220798b9772a8ae06d13027e6f501d09ea07f6dfc4b7afc3db3a6d6c57bf24239, where 21 indicates the number of bytes in hex of the public key, 02 indicates this is a compressed public and the y-coordinate is an even number, the rest is the value of the x-coordinate of the public key. Note that if the second byte is 04, then it indicates that the public key is given in its uncompressed form.   
 
# A new subScript is created from the <math>previousScriptPubKey</math>. The subScript starts from the most recent OP_CODESEPARATOR (the one just before the OP_CHECKSIG that is executed here) to the end of the <math>previousScriptPubKey</math>. If there is no OP_CODESEPARATOR, the entire <math>previousScriptPubKey</math> becomes the subScript.
 
# A new subScript is created from the <math>previousScriptPubKey</math>. The subScript starts from the most recent OP_CODESEPARATOR (the one just before the OP_CHECKSIG that is executed here) to the end of the <math>previousScriptPubKey</math>. If there is no OP_CODESEPARATOR, the entire <math>previousScriptPubKey</math> becomes the subScript.
 
# Any remaining OP_CODESEPARATORS are removed from the subScript.
 
# Any remaining OP_CODESEPARATORS are removed from the subScript.
# A serialisation algorithm is called to produce an input to double SHA256 depending on sighash type:
+
# A serialisation algorithm (sighash) is called to produce an input to double SHA256 depending on sighash type:
## nVersion in <math>TX_{current}</math> (4-byte little endian)
+
## nVersion in <math>TX_{current}</math> (4-byte little endian).
## double SHA256 of the serialisation of all input outpoints (32-byte hash)
+
## double SHA256 of the serialisation of all input outpoints (32-byte hash).
 
### if ANYONECANPAY flag is set, then this should be a 32-byte zero.
 
### if ANYONECANPAY flag is set, then this should be a 32-byte zero.
## double SHA256 of the serialisation of nSequence of all inputs (32-byte hash)
+
## double SHA256 of the serialisation of nSequence of all inputs (32-byte hash).
 
### if ANYONECANPAY flag is set, then this should be a 32-byte zero.
 
### if ANYONECANPAY flag is set, then this should be a 32-byte zero.
## the outpoint being spent (32-byte for transaction ID + 4-byte little endian for index)
+
## the outpoint being spent (32-byte for transaction ID + 4-byte little endian for index).
## length in bytes of the subScript (big endian)
+
## length in bytes of the subScript (big endian).
## the subScript
+
## the subScript.
## <math>amount</math> (8-byte little endian)
+
## <math>amount</math> (8-byte little endian).
## nSequence of this outpoint (4-byte little endian)
+
## nSequence of this outpoint (4-byte little endian).
## double SHA256 of the serialization of all output amount (8-byte little endian) with scriptPubKey (These are the outputs in <math>TX_{current}</math>.)
+
## double SHA256 of the serialization of all output amount (8-byte little endian) with scriptPubKey (These are the outputs in <math>TX_{current}</math>.).
### If SINGLE flag is set and the input index is smaller than the number of outputs, then this should be the double SHA256 of the output with scriptPubKey of the same index as the input
+
### If SINGLE flag is set and the input index is smaller than the number of outputs, then this should be the double SHA256 of the output with scriptPubKey of the same index as the input.
 
### If NONE flag is set, then this should be a 32-byte zero.   
 
### If NONE flag is set, then this should be a 32-byte zero.   
## nLocktime of the transaction <math>TX_{current}</math> (4-byte little endian)
+
## nLocktime of the transaction <math>TX_{current}</math> (4-byte little endian).
## sighash type of the signature (4-byte little endian)
+
## sighash type of the signature (4-byte little endian).
 
# The serialisation in bytes from the step above will be fed to double SHA256 to produce the 32-byte message. This message is used to check the ECDSA signature, together with the public key and the signature obtained from the stack. Note that the [[secp256k1]] elliptic curve is used for the verification with the given public key.
 
# The serialisation in bytes from the step above will be fed to double SHA256 to produce the 32-byte message. This message is used to check the ECDSA signature, together with the public key and the signature obtained from the stack. Note that the [[secp256k1]] elliptic curve is used for the verification with the given public key.
  
Line 50: Line 50:
  
 
See [[SIGHASH flags]] for more detail on the effect of combinations of flags.
 
See [[SIGHASH flags]] for more detail on the effect of combinations of flags.
 +
 +
==Attribution==
 +
This content is based on content sourced from https://en.bitcoin.it/wiki/OP_CHECKSIG under [https://creativecommons.org/licenses/by/3.0/ Creative Commons Attribution 3.0]. Although it may have been extensively revised and updated, we acknowledge the original authors.

Latest revision as of 03:26, 22 April 2022

OP_CHECKSIG is an opcode that verifies an ECDSA signature. It takes two inputs from the stack, a public key (on top of the stack) and an ECDSA signature in its DER_CANONISED format concatenated with sighash flags. It outputs true or false on the stack based on whether the signature check passes or fails.


Parameters

In addition to the stack parameters, OP_CHECKSIG needs to have

  1. the current transaction ,
  2. the index of the transaction input in which the signature is checked ,
  3. the scriptPubKey in which this OP_CHECKSIG belongs , and
  4. the value in satoshi that the outpoint represents .

Note that is from previous transaction, in which the output is spent in current transaction.

How it works

In short, OP_CHECKSIG calls a function called "sighash" which produces a hash value of the serialised transaction. (For legacy sighash algorithm, please click here.) The hash value is the message on which the signature is verified. The signature and the public key involved in the verification are obtained from the stack.

In detail:

  1. Check the stack size is not less than 2.
  2. The public key and the signature are popped as the top 2 items of the stack.
  3. Check the signature encoding is of the correct format [<DER signature><hashtype>]. An example: 47304402205a2b556c71ee1c12d8e0b460c3446aeca0e3ee71b7bc11c6ddd3da8beeec99c60220783a1f0c0158674df8904022ec30fab5154c4fc4c7e8467086f0204cc8e16cbb01, where 47 indicates number of bytes in hex (71 in decimal) of the signature including 1 byte of sighash flag at the end, the next 46 bytes (70 in decimal) are the ECDSA signature (r,s), the last byte is the sighash flag "ALL".
  4. Check the public key encoding is of the correct format. Both compressed public key and uncompressed public key can be acceptable. An example: 210220798b9772a8ae06d13027e6f501d09ea07f6dfc4b7afc3db3a6d6c57bf24239, where 21 indicates the number of bytes in hex of the public key, 02 indicates this is a compressed public and the y-coordinate is an even number, the rest is the value of the x-coordinate of the public key. Note that if the second byte is 04, then it indicates that the public key is given in its uncompressed form.
  5. A new subScript is created from the . The subScript starts from the most recent OP_CODESEPARATOR (the one just before the OP_CHECKSIG that is executed here) to the end of the . If there is no OP_CODESEPARATOR, the entire becomes the subScript.
  6. Any remaining OP_CODESEPARATORS are removed from the subScript.
  7. A serialisation algorithm (sighash) is called to produce an input to double SHA256 depending on sighash type:
    1. nVersion in (4-byte little endian).
    2. double SHA256 of the serialisation of all input outpoints (32-byte hash).
      1. if ANYONECANPAY flag is set, then this should be a 32-byte zero.
    3. double SHA256 of the serialisation of nSequence of all inputs (32-byte hash).
      1. if ANYONECANPAY flag is set, then this should be a 32-byte zero.
    4. the outpoint being spent (32-byte for transaction ID + 4-byte little endian for index).
    5. length in bytes of the subScript (big endian).
    6. the subScript.
    7. (8-byte little endian).
    8. nSequence of this outpoint (4-byte little endian).
    9. double SHA256 of the serialization of all output amount (8-byte little endian) with scriptPubKey (These are the outputs in .).
      1. If SINGLE flag is set and the input index is smaller than the number of outputs, then this should be the double SHA256 of the output with scriptPubKey of the same index as the input.
      2. If NONE flag is set, then this should be a 32-byte zero.
    10. nLocktime of the transaction (4-byte little endian).
    11. sighash type of the signature (4-byte little endian).
  8. The serialisation in bytes from the step above will be fed to double SHA256 to produce the 32-byte message. This message is used to check the ECDSA signature, together with the public key and the signature obtained from the stack. Note that the secp256k1 elliptic curve is used for the verification with the given public key.

Return values

OP_CHECKSIG will push true to the stack if the check passed, false otherwise. OP_CHECKSIGVERIFY leaves nothing on the stack but will cause the script validation to fail immediately if the check does not pass.

References

https://github.com/bitcoin-sv/bitcoin-sv/blob/master/src/script/interpreter.cpp

See SIGHASH flags for more detail on the effect of combinations of flags.

Attribution

This content is based on content sourced from https://en.bitcoin.it/wiki/OP_CHECKSIG under Creative Commons Attribution 3.0. Although it may have been extensively revised and updated, we acknowledge the original authors.