1
0
mirror of https://github.com/bitcoinbook/bitcoinbook synced 2024-12-27 00:48:09 +00:00

All: update to comply with current draft of bip-bikeshed

This commit is contained in:
David A. Harding 2023-06-30 13:39:58 -10:00
parent e6f895732a
commit a4f337b840
17 changed files with 375 additions and 374 deletions

View File

@ -880,7 +880,7 @@ The transaction decode shows all the components of this transaction,
including the transaction inputs and outputs. In this case we see that including the transaction inputs and outputs. In this case we see that
the transaction used one input and generated two outputs. The input to the transaction used one input and generated two outputs. The input to
this transaction was the output from a previously confirmed transaction this transaction was the output from a previously confirmed transaction
(shown as the vin +txid+). The two outputs correspond to the payment to (shown as the input +txid+). The two outputs correspond to the payment to
Bob and the change back to Alice. Bob and the change back to Alice.
We can further explore the blockchain by examining the previous We can further explore the blockchain by examining the previous

View File

@ -388,21 +388,21 @@ library] to do the elliptic curve math.
.Elliptic curve cryptography: visualizing the multiplication of a point G by an integer k on an elliptic curve .Elliptic curve cryptography: visualizing the multiplication of a point G by an integer k on an elliptic curve
image::images/mbc2_0404.png["ecc_illustrated"] image::images/mbc2_0404.png["ecc_illustrated"]
=== ScriptPubKey and ScriptSig === Output and Input Scripts
Although the illustration from the original Bitcoin paper, <<pay-to-pure-pubkey>>, Although the illustration from the original Bitcoin paper, <<pay-to-pure-pubkey>>,
shows public keys (pubkeys) and signatures (sigs) being used directly, shows public keys (pubkeys) and signatures (sigs) being used directly,
the first version of Bitcoin instead had payments sent to a field called the first version of Bitcoin instead had payments sent to a field called
_scriptPubKey_ and had them authorized by a field called _scriptSig_. _output script_ and had spends of those bitcoins authorized by a field called _input script_.
These fields allow additional operations to be performed in addition to These fields allow additional operations to be performed in addition to
(or instead of) verifying that a signature corresponds to a public key. (or instead of) verifying that a signature corresponds to a public key.
For example, a scriptPubKey can contain two public keys and require two For example, an output script can contain two public keys and require two
corresponding signatures be placed in the spending scriptSig. corresponding signatures be placed in the spending input script.
Later, in <<tx_script>>, we'll learn about scripts in detail. For now, Later, in <<tx_script>>, we'll learn about scripts in detail. For now,
all we need to understand is that bitcoins are received to a all we need to understand is that bitcoins are received to an
scriptPubKey which acts like a public key, and bitcoin spending is output script which acts like a public key, and bitcoin spending is
authorized by a scriptSig which acts like a signature. authorized by a input script which acts like a signature.
[[p2pk]] [[p2pk]]
=== IP Addresses: The Original Address For Bitcoin (P2PK) === IP Addresses: The Original Address For Bitcoin (P2PK)
@ -439,21 +439,21 @@ looking at the blockchain and noticing that all of the transactions paid
the same public key. the same public key.
Using the public key her node received from Bob's node, Alice's wallet Using the public key her node received from Bob's node, Alice's wallet
would construct a transaction output paying a very simple scriptPubKey: would construct a transaction output paying a very simple output script:
---- ----
<Bob's public key> OP_CHECKSIG <Bob's public key> OP_CHECKSIG
---- ----
Bob would later be able to spend that output with a scriptSig consisting Bob would later be able to spend that output with an input script consisting
entirely of his signature: entirely of his signature:
---- ----
<Bob's signature> <Bob's signature>
---- ----
To figure out what a scriptPubKey and scriptSig are doing, you can To figure out what an output and input script are doing, you can
combine them together (scriptSig first) and then note that each piece of combine them together (input script first) and then note that each piece of
data (shown in angle brackets) is placed at the top of a list of items, data (shown in angle brackets) is placed at the top of a list of items,
called a stack. When an operation code (opcode) is encountered, it uses called a stack. When an operation code (opcode) is encountered, it uses
items from the stack, starting with the topmost items. Let's look at items from the stack, starting with the topmost items. Let's look at
@ -564,13 +564,13 @@ where _K_ is the public key and _A_ is the resulting commitment.
Now that we understand how to make a commitment to a public key, we need Now that we understand how to make a commitment to a public key, we need
to figure out how to use it in a transaction. Consider the following to figure out how to use it in a transaction. Consider the following
scriptPubKey: output script:
---- ----
OP_DUP OP_HASH160 <Bob's commitment> OP_EQUAL OP_CHECKSIG OP_DUP OP_HASH160 <Bob's commitment> OP_EQUAL OP_CHECKSIG
---- ----
And also the following scriptSig: And also the following input script:
---- ----
<Bob's signature> <Bob's public key> <Bob's signature> <Bob's public key>
@ -592,8 +592,8 @@ so now the top of the stack is a hash of Bob's public key. Next, the
commitment to Bob's public key is added to the top of the stack. The commitment to Bob's public key is added to the top of the stack. The
+OP_EQUALVERIFY+ operation consumes the top two items and verifies that +OP_EQUALVERIFY+ operation consumes the top two items and verifies that
they are equal; that should be the case if the public key Bob provided they are equal; that should be the case if the public key Bob provided
in the scriptSig is the same public key used to create the commitment in in the input script is the same public key used to create the commitment in
the scriptPubKey that Alice paid. If +OP_EQUALVERIFY+ fails, the whole the output script that Alice paid. If +OP_EQUALVERIFY+ fails, the whole
script fails. Finally, we're left with a stack containing just Bob's script fails. Finally, we're left with a stack containing just Bob's
signature and his public key; the +OP_CHECKSIG+ opcode verifies they signature and his public key; the +OP_CHECKSIG+ opcode verifies they
correspond with each other and that the signature commits to the correspond with each other and that the signature commits to the
@ -664,7 +664,7 @@ To convert data (a number) into a base58check format, we first add a
prefix to the data, called the "version byte," which serves to easily prefix to the data, called the "version byte," which serves to easily
identify the type of data that is encoded. For example, the prefix zero identify the type of data that is encoded. For example, the prefix zero
(0x00 in hex) indicates that the data should be used as the commitment (hash) in (0x00 in hex) indicates that the data should be used as the commitment (hash) in
a legacy P2PKH scriptPubKey. A list of common version prefixes is shown a legacy P2PKH output script. A list of common version prefixes is shown
in <<base58check_versions>>. in <<base58check_versions>>.
Next, we compute the "double-SHA" checksum, meaning we apply the SHA256 Next, we compute the "double-SHA" checksum, meaning we apply the SHA256
@ -866,14 +866,14 @@ compressed public keys.
As we've seen in preceding sections, someone receiving Bitcoins (like As we've seen in preceding sections, someone receiving Bitcoins (like
Bob) can require payments to him contain certain constraints in their Bob) can require payments to him contain certain constraints in their
scriptPubKeys. Bob will need to fulfill those constraints using a output script. Bob will need to fulfill those constraints using an
scriptSig when he spends those bitcoins. In <<p2pk>>, the constraint input script when he spends those bitcoins. In <<p2pk>>, the constraint
was simply that the scriptSig needed to provide an appropriate was simply that the input script needed to provide an appropriate
signature. In <<addresses_for_p2pkh>>, an appropriate public key also needed to be signature. In <<addresses_for_p2pkh>>, an appropriate public key also needed to be
provided. provided.
In order for a spender (like Alice) to place the constraints Bob wants In order for a spender (like Alice) to place the constraints Bob wants
in the scriptPubKey she uses to pay him, Bob needs to communicate those in the output script she uses to pay him, Bob needs to communicate those
constraints to her. This is similar to the problem of Bob needing to constraints to her. This is similar to the problem of Bob needing to
communicate his public key to her. Like that problem, where communicate his public key to her. Like that problem, where
public keys can be fairly large, the constraints Bob uses can also be public keys can be fairly large, the constraints Bob uses can also be
@ -883,22 +883,22 @@ for which she needs to pay transaction fees every time she wants to spend
money to Bob. However, the solution of using hash functions to create money to Bob. However, the solution of using hash functions to create
small commitments to large amounts of data also applies here. small commitments to large amounts of data also applies here.
The BIP16 upgrade to the Bitcoin protocol in 2013 allows a The BIP16 upgrade to the Bitcoin protocol in 2013 allows an
scriptPubKey to commit to a _redemption script_ (_redeemScript_). When output script to commit to a _redemption script_ (_redeem script_). When
Bob spends his bitcoins, his scriptSig need to provide a redeemScript Bob spends his bitcoins, his input script need to provide a redeem script
that matches the commitment and also any data necessary to satisfy the that matches the commitment and also any data necessary to satisfy the
redeemScript (such as signatures). Let's start by imagining Bob wants redeem script (such as signatures). Let's start by imagining Bob wants
to require two signatures to spend his bitcoins, one signature from his to require two signatures to spend his bitcoins, one signature from his
desktop wallet and one from a hardware signing device. He puts those desktop wallet and one from a hardware signing device. He puts those
conditions into a redeemScript: conditions into a redeem script:
---- ----
<public key 1> OP_CHECKSIGVERIFY <public key 2> OP_CHECKSIG <public key 1> OP_CHECKSIGVERIFY <public key 2> OP_CHECKSIG
---- ----
He then creates a commitment to the redeemScript using the same He then creates a commitment to the redeem script using the same
HASH160 mechanism used for P2PKH commitments, +RIPEMD160(SHA256(script))+. HASH160 mechanism used for P2PKH commitments, +RIPEMD160(SHA256(script))+.
That commitment is placed into the scriptPubKey using a special That commitment is placed into the output script using a special
template: template:
---- ----
@ -908,24 +908,24 @@ OP_HASH160 <commitment> OP_EQUAL
[WARNING] [WARNING]
==== ====
Payments to Script Hashes (P2SH) must use the specific P2SH template Payments to Script Hashes (P2SH) must use the specific P2SH template
with no extra data or conditions in the scriptPubKey. If the with no extra data or conditions in the output script. If the
scriptPubKey is not exactly +OP_HASH160 <20 bytes> OP_EQUAL+, the output script is not exactly +OP_HASH160 <20 bytes> OP_EQUAL+, the
redeemScript will not be used and any bitcoins may either be unspendable redeem script will not be used and any bitcoins may either be unspendable
or spendable by anyone (meaning anyone can take them). or spendable by anyone (meaning anyone can take them).
==== ====
When Bob goes to spend the payment he received to the commitment for his When Bob goes to spend the payment he received to the commitment for his
script, he uses a scriptSig that includes the redeemScript, with it script, he uses an input script that includes the redeem script, with it
serialized as a single data element. He also provides the signatures serialized as a single data element. He also provides the signatures
he needs to satisfy the redeemScript, putting them in the order that he needs to satisfy the redeem script, putting them in the order that
they will be consumed by the opcodes: they will be consumed by the opcodes:
---- ----
<signature2> <signature1> <redeemScript> <signature2> <signature1> <redeem script>
---- ----
When Bitcoin full nodes receive Bob's spend, they'll verify that the When Bitcoin full nodes receive Bob's spend, they'll verify that the
serialized redeemScript will hash to the same value as the commitment. serialized redeem script will hash to the same value as the commitment.
Then they'll replace it on the stack with its deserialized value: Then they'll replace it on the stack with its deserialized value:
---- ----
@ -968,7 +968,7 @@ Legacy addresses were supplanted by the bech32 family of addresses.
.P2SH collision attacks .P2SH collision attacks
**** ****
All addresses based on hash functions are theoretically vulnerable to an All addresses based on hash functions are theoretically vulnerable to an
attacker finding two different inputs (e.g. redeemScripts) that produce attacker finding two different inputs (e.g. redeem scripts) that produce
the same hash function output (commitment). For addresses created the same hash function output (commitment). For addresses created
entirely by a single party, the chance of an attacker generating a entirely by a single party, the chance of an attacker generating a
different input for an existing commitment is proportional to the different input for an existing commitment is proportional to the
@ -1363,7 +1363,7 @@ With the checksum created, each 5-bit character in the data part
(including the witness version, witness program, and checksum) is (including the witness version, witness program, and checksum) is
converted to alphanumeric characters. converted to alphanumeric characters.
For decoding back into a scriptPubKey, we work in reverse. First let's For decoding back into an output script, we work in reverse. First let's
use the reference library to decode two of our addresses: use the reference library to decode two of our addresses:
---- ----
@ -1378,7 +1378,7 @@ decode(hrp, addr)
---- ----
We get back both the witness version and the witness program. Those can We get back both the witness version and the witness program. Those can
be inserted into the template for our scriptPubKey: be inserted into the template for our output script:
---- ----
<version> <program> <version> <program>

View File

@ -284,7 +284,7 @@ node will start a "handshake" (see <<network_handshake>>) by
transmitting a +version+ message, which contains basic identifying transmitting a +version+ message, which contains basic identifying
information, including: information, including:
+nVersion+:: The Bitcoin P2P protocol version the client "speaks" (e.g., 70002) +Version+:: The Bitcoin P2P protocol version the client "speaks" (e.g., 70002)
+nLocalServices+:: A list of local services supported by the node, currently just +NODE_NETWORK+ +nLocalServices+:: A list of local services supported by the node, currently just +NODE_NETWORK+
+nTime+:: The current time +nTime+:: The current time
+addrYou+:: The IP address of the remote node as seen from this node +addrYou+:: The IP address of the remote node as seen from this node
@ -296,7 +296,7 @@ information, including:
The +version+ message is always the first message sent by any peer to The +version+ message is always the first message sent by any peer to
another peer. The local peer receiving a +version+ message will examine another peer. The local peer receiving a +version+ message will examine
the remote peer's reported +nVersion+ and decide if the remote peer is the remote peer's reported +Version+ and decide if the remote peer is
compatible. If the remote peer is compatible, the local peer will compatible. If the remote peer is compatible, the local peer will
acknowledge the +version+ message and establish a connection by sending acknowledge the +version+ message and establish a connection by sending
a +verack+. a +verack+.
@ -974,7 +974,7 @@ transaction affecting that wallet. For a wallet to be effective, it
needs to learn two types of information: needs to learn two types of information:
1. When it has received money. Specifically, when a transaction 1. When it has received money. Specifically, when a transaction
output contains a scriptPubKey that the wallet controls (such as by output contains a script that the wallet controls (such as by
controlling the authorized private key). controlling the authorized private key).
2. When it has spent money. Specifically, when a transaction input 2. When it has spent money. Specifically, when a transaction input
@ -991,7 +991,7 @@ accurate filter.
For both the primary and secondary goals to be met, a filter would need For both the primary and secondary goals to be met, a filter would need
to reference two types of information: to reference two types of information:
1. The scriptPubKey for every output in every transaction in a block. 1. The script for every output in every transaction in a block.
2. The outpoint for every input in every transaction in a block. 2. The outpoint for every input in every transaction in a block.
@ -1001,27 +1001,27 @@ to accomplish the primary goal if we sacrificed the secondary goal. In
the new design, a block filter would still references two types of the new design, a block filter would still references two types of
information, but they'd be more closely related: information, but they'd be more closely related:
1. As before, the scriptPubKey for every output in every transaction in a 1. As before, the script for every output in every transaction in a
block. block.
2. In a change, it would also reference the scriptPubKey of the output 2. In a change, it would also reference the script of the output
referenced by the outpoint for every input in every transaction in a referenced by the outpoint for every input in every transaction in a
block. In other words, the scriptPubKey being spent. block. In other words, the output script being spent.
This had several advantages. First, it meant that wallets didn't need This had several advantages. First, it meant that wallets didn't need
to track outpoints; they could instead just scan for the the to track outpoints; they could instead just scan for the the
scriptPubKeys to which they expected to receive money. Second, any time a output scripts to which they expected to receive money. Second, any time a
later transaction in a block spends the output of an earlier later transaction in a block spends the output of an earlier
transaction in the same block, they'll both reference the same transaction in the same block, they'll both reference the same
scriptPubKey. More than one reference to the same scriptPubKey is output script. More than one reference to the same output script is
redundant in a compact block filter, so the redundant copies can be redundant in a compact block filter, so the redundant copies can be
removed, shrinking the size of the filters. removed, shrinking the size of the filters.
When full nodes validate a block, they need access to the scriptPubKeys When full nodes validate a block, they need access to the output scripts
for both the current transaction outputs in a block and the transaction for both the current transaction outputs in a block and the transaction
outputs from previous blocks that are being referenced in inputs, so outputs from previous blocks that are being referenced in inputs, so
they're able to build compact block filters in this simplified model. they're able to build compact block filters in this simplified model.
But a block itself doesn't include the scriptPubKeys from transactions But a block itself doesn't include the output scripts from transactions
included in previous blocks, so there's no convenient way for a client included in previous blocks, so there's no convenient way for a client
to verify a block filter was built correctly. However, there is an to verify a block filter was built correctly. However, there is an
alternative that can help a client detect if a peer is lying to it: alternative that can help a client detect if a peer is lying to it:
@ -1066,7 +1066,7 @@ more bandwidth than expected.
==== Reducing bandwidth with lossy encoding ==== Reducing bandwidth with lossy encoding
The data about the transactions in a block that we want to communicate The data about the transactions in a block that we want to communicate
is a scriptPubKey. ScriptPubKeys vary in length and follow patterns, is an output script. Output scripts vary in length and follow patterns,
which means the differences between them won't be evenly distributed which means the differences between them won't be evenly distributed
like we want. However, we've already seen in many places in this book like we want. However, we've already seen in many places in this book
that we can use a hash function to create a commitment to some data and that we can use a hash function to create a commitment to some data and
@ -1079,23 +1079,23 @@ faster and more configurable non-cryptographic hash functions, such as
the SipHash function we'll use for compact block filters. the SipHash function we'll use for compact block filters.
The details of the algorithm used are described in BIP158, but the gist The details of the algorithm used are described in BIP158, but the gist
is that each scriptPubKey is reduced to a 64 bit commitment using is that each output script is reduced to a 64 bit commitment using
SipHash and some arthritic operations. You can think of this as SipHash and some arthritic operations. You can think of this as
taking a set of large numbers and truncating them to shorter numbers, a taking a set of large numbers and truncating them to shorter numbers, a
process that loses data (so it's called _lossy encoding_). By losing process that loses data (so it's called _lossy encoding_). By losing
some information, we don't need to store as much information later, some information, we don't need to store as much information later,
which saves space. In this case, we go from a typical scriptPubKey which saves space. In this case, we go from a typical output script
that's 160 bits or longer down to just 64 bits. that's 160 bits or longer down to just 64 bits.
==== Using compact block filters ==== Using compact block filters
The 64 bit value for every commitment to a scriptPubKey in a block are The 64 bit value for every commitment to an output script in a block are
sorted, duplicate entries are removed, and the GCS is constructed by sorted, duplicate entries are removed, and the GCS is constructed by
finding the differences (deltas) between each entry. That compact block finding the differences (deltas) between each entry. That compact block
filter is then distributed by peers to their clients (such as wallets). filter is then distributed by peers to their clients (such as wallets).
A client uses the deltas to reconstruct the original commitments. The A client uses the deltas to reconstruct the original commitments. The
client such as a wallet also takes all the scriptPubKeys it is client such as a wallet also takes all the output scripts it is
monitoring for and generates commitments in the same way as BIP158. It monitoring for and generates commitments in the same way as BIP158. It
checks whether any of its generated commitments match the commitments in checks whether any of its generated commitments match the commitments in
the filter. the filter.

View File

@ -273,8 +273,8 @@ criteria:
- Each output value, as well as the total, must be within the allowed - Each output value, as well as the total, must be within the allowed
range of values (zero or more, but less than 21m coins). range of values (zero or more, but less than 21m coins).
- +nLocktime+ is equal to +INT_MAX+, or +nLocktime+ and +nSequence+ - Lock time is equal to +INT_MAX+, or lock time and sequence
values are satisfied according to the locktime and BIP68 rules. values are satisfied according to the lock time and BIP68 rules.
- The number of signature operations (SIGOPS) contained in the - The number of signature operations (SIGOPS) contained in the
transaction is less than the signature operation limit. transaction is less than the signature operation limit.
@ -492,7 +492,7 @@ structure of the coinbase transaction's input.
| 32 bytes | Transaction Hash | Pointer to the transaction containing the UTXO to be spent | 32 bytes | Transaction Hash | Pointer to the transaction containing the UTXO to be spent
| 4 bytes | Output Index | The index number of the UTXO to be spent, first one is 0 | 4 bytes | Output Index | The index number of the UTXO to be spent, first one is 0
| 1&#x2013;9 bytes (VarInt) | Script Size | Script length in bytes, to follow | 1&#x2013;9 bytes (VarInt) | Script Size | Script length in bytes, to follow
| Variable | ScriptSig | A script that fulfills the conditions of the UTXO scriptPubKey | Variable | Input script | A script that fulfills the conditions of the UTXO output script
| 4 bytes | Sequence Number | Multipurpose field used for BIP68 time locks and transaction replacement signaling | 4 bytes | Sequence Number | Multipurpose field used for BIP68 time locks and transaction replacement signaling
|======= |=======
@ -512,14 +512,14 @@ In a coinbase transaction, the first two fields are set to values that
do not represent a UTXO reference. Instead of a "transaction hash," the do not represent a UTXO reference. Instead of a "transaction hash," the
first field is filled with 32 bytes all set to zero. The "output index" first field is filled with 32 bytes all set to zero. The "output index"
is filled with 4 bytes all set to 0xFF (255 decimal). The is filled with 4 bytes all set to 0xFF (255 decimal). The
+scriptSig+ is replaced by coinbase data, a data field used by input script is replaced by coinbase data, a data field used by
the miners, as we will see next. the miners, as we will see next.
[[duplicate_transactions]] [[duplicate_transactions]]
==== Coinbase Data ==== Coinbase Data
((("coinbase transactions", "coinbase data")))Coinbase transactions do ((("coinbase transactions", "coinbase data")))Coinbase transactions do
not have a +scriptSig+ field. Instead, this not have an input script field. Instead, this
field is replaced by coinbase data, which must be between 2 and 100 field is replaced by coinbase data, which must be between 2 and 100
bytes. Except for the first few bytes, the rest of the coinbase data can bytes. Except for the first few bytes, the rest of the coinbase data can
be used by miners in any way they want; it is arbitrary data. be used by miners in any way they want; it is arbitrary data.
@ -1169,11 +1169,11 @@ miner can influence the timestamps in order to gain fees from
transactions with a timelock that hasn't yet matured. transactions with a timelock that hasn't yet matured.
Median time past changes the implementation of time calculations for Median time past changes the implementation of time calculations for
+nLocktime+, +CLTV+, +nSequence+, and +CSV+. The consensus time lock time, +CLTV+, sequence, and +CSV+. The consensus time
calculated by median time past is usually about one hour behind calculated by median time past is usually about one hour behind
wall clock time. If you create timelock transactions, you should account wall clock time. If you create timelock transactions, you should account
for it when estimating the desired value to encode in +nLocktime+, for it when estimating the desired value to encode in lock time,
+nSequence+, +CLTV+, and +CSV+. sequence, +CLTV+, and +CSV+.
=== Successfully Mining the Block === Successfully Mining the Block
@ -2173,7 +2173,7 @@ effect. Execution continues after the NOP opcode as if it wasn't there.
A soft fork therefore can modify the semantics of a NOP code to give it A soft fork therefore can modify the semantics of a NOP code to give it
new meaning. For example, BIP65 (+CHECKLOCKTIMEVERIFY+) reinterpreted new meaning. For example, BIP65 (+CHECKLOCKTIMEVERIFY+) reinterpreted
the NOP2 opcode. Clients implementing BIP65 interpret NOP2 as the NOP2 opcode. Clients implementing BIP65 interpret NOP2 as
+OP_CHECKLOCKTIMEVERIFY+ and impose an absolute locktime consensus rule +OP_CHECKLOCKTIMEVERIFY+ and impose an absolute lock time consensus rule
on UTXOs that contain this opcode in their locking scripts. This change on UTXOs that contain this opcode in their locking scripts. This change
is a soft fork because a transaction that is valid under BIP65 is also is a soft fork because a transaction that is valid under BIP65 is also
valid on any client that is not implementing (ignorant of) BIP65. To valid on any client that is not implementing (ignorant of) BIP65. To

View File

@ -581,7 +581,7 @@ to fix those:
commitment that is in her favor. commitment that is in her favor.
Both of these problems can be solved with timelocks&#x2014;let's look at Both of these problems can be solved with timelocks&#x2014;let's look at
how we could use transaction-level timelocks (+nLocktime+). how we could use transaction-level time locks.
Emma cannot risk funding a 2-of-2 multisig unless she has a guaranteed Emma cannot risk funding a 2-of-2 multisig unless she has a guaranteed
refund. To solve this problem, Emma constructs the funding and refund refund. To solve this problem, Emma constructs the funding and refund
@ -591,7 +591,7 @@ transaction to Fabian and obtains his signature.
The refund transaction acts as the first commitment transaction and its The refund transaction acts as the first commitment transaction and its
timelock establishes the upper bound for the channel's life. In this timelock establishes the upper bound for the channel's life. In this
case, Emma could set the +nLocktime+ to 30 days or 4320 blocks into the case, Emma could set the lock time to 30 days or 4320 blocks into the
future. All subsequent commitment transactions must have a shorter future. All subsequent commitment transactions must have a shorter
timelock, so that they can be redeemed before the refund transaction. timelock, so that they can be redeemed before the refund transaction.
@ -604,7 +604,7 @@ Every commitment transaction the parties exchange during the life of the
channel will be timelocked into the future. But the delay will be channel will be timelocked into the future. But the delay will be
slightly shorter for each commitment so the most recent commitment can slightly shorter for each commitment so the most recent commitment can
be redeemed before the prior commitment it invalidates. Because of the be redeemed before the prior commitment it invalidates. Because of the
nLockTime, neither party can successfully propagate any of the lock time, neither party can successfully propagate any of the
commitment transactions until their timelock expires. If all goes well, commitment transactions until their timelock expires. If all goes well,
they will cooperate and close the channel gracefully with a settlement they will cooperate and close the channel gracefully with a settlement
transaction, making it unnecessary to transmit an intermediate transaction, making it unnecessary to transmit an intermediate
@ -641,8 +641,8 @@ commitments. Thus, the most recent commitment transaction can be
transmitted, spending the inputs and invalidating prior commitment transmitted, spending the inputs and invalidating prior commitment
transactions. The enforcement of smart contracts with absolute timelocks transactions. The enforcement of smart contracts with absolute timelocks
protects against cheating by one of the parties. This implementation protects against cheating by one of the parties. This implementation
needs nothing more than absolute transaction-level timelocks needs nothing more than absolute transaction-level lock time.
(+nLocktime+). Next, we will see how script-level timelocks, Next, we will see how script-level timelocks,
+CHECKLOCKTIMEVERIFY+ and +CHECKSEQUENCEVERIFY+, can be used to +CHECKLOCKTIMEVERIFY+ and +CHECKSEQUENCEVERIFY+, can be used to
construct more flexible, useful, and sophisticated state channels. construct more flexible, useful, and sophisticated state channels.
@ -959,7 +959,7 @@ IF
HASH160 <H> EQUALVERIFY HASH160 <H> EQUALVERIFY
ELSE ELSE
# Refund after timeout. # Refund after timeout.
<locktime> CHECKLOCKTIMEVERIFY DROP <lock time> CHECKLOCKTIMEVERIFY DROP
<Payer Public Key> CHECKSIG <Payer Public Key> CHECKSIG
ENDIF ENDIF
---- ----
@ -1194,7 +1194,7 @@ startref="alicetwelve")))
Each element of the path contains information on the HTLC that must be Each element of the path contains information on the HTLC that must be
extended to the next hop, the amount that is being sent, the fee to extended to the next hop, the amount that is being sent, the fee to
include, and the CLTV locktime (in blocks) expiration of the HTLC. As include, and the CLTV lock time (in blocks) expiration of the HTLC. As
the route information propagates, the nodes make HTLC commitments the route information propagates, the nodes make HTLC commitments
forward to the next hop. forward to the next hop.

View File

@ -29,8 +29,8 @@ used.
id="Tsript06")))((("scripting", "transactions and", id="Tsript06")))((("scripting", "transactions and",
id="Stransact06")))The original version of Bitcoin introduced a new id="Stransact06")))The original version of Bitcoin introduced a new
programming language called _Script_, a Forth-like stack-based programming language called _Script_, a Forth-like stack-based
language. Both the scriptPubKey placed in an output and the legacy language. Both the script placed in an output and the legacy
scriptSig used in a spending transaction are written in this scripting input script used in a spending transaction are written in this scripting
language. language.
Script is a very simple language. It requires minimal processing and Script is a very simple language. It requires minimal processing and
@ -94,28 +94,28 @@ system.
==== Script Construction ==== Script Construction
Bitcoin's legacy transaction validation engine relies on two parts of scripts Bitcoin's legacy transaction validation engine relies on two parts of scripts
to validate transactions: a scriptPubKey and a scriptSig. to validate transactions: an output script and an input script.
A scriptPubKey is a spending condition placed on an output: An output script is a spending condition placed on an output:
it specifies the conditions that must be met to spend the output in the it specifies the conditions that must be met to spend the output in the
future, such as who is authorized to spend the output and how they will future, such as who is authorized to spend the output and how they will
be authenticated. be authenticated.
A scriptSig is a script that satisfies the An input script is a script that satisfies the
conditions placed on an output by a scriptPubKey and allows the output conditions placed on an output by an output script and allows the output
to be spent. ScriptSigs are part of every transaction input. Most to be spent. Input scripts are part of every transaction input. Most
of the time in legacy transactions they contain a digital signature produced by the user's of the time in legacy transactions they contain a digital signature produced by the user's
wallet from his or her private key, but not all scriptSigs wallet from his or her private key, but not all input scripts
must contain signatures. must contain signatures.
Every bitcoin validating node will validate transactions by executing Every bitcoin validating node will validate transactions by executing
the scriptPubKey and scriptSig together. As we saw in the output and input scripts. As we saw in
<<c_transactions>>, each input contains an outpoint which refers to a <<c_transactions>>, each input contains an outpoint which refers to a
previous transaction output. The input also contains a scriptSig. The previous transaction output. The input also contains an input script. The
validation software will copy the scriptSig, retrieve the UTXO validation software will copy the input script, retrieve the UTXO
referenced by the input, and copy the scriptPubKey from that UTXO. The referenced by the input, and copy the output script from that UTXO. The
scriptSig and scriptPubKey are then executed in sequence. The input is input and output scripts are then executed in sequence. The input is
valid if the scriptSig satisfies the scriptPubKey conditions valid if the input script satisfies the output script's conditions
(see <<script_exec>>). All the inputs are validated independently, as (see <<script_exec>>). All the inputs are validated independently, as
part of the overall validation of the transaction. part of the overall validation of the transaction.
@ -123,18 +123,18 @@ Note that the steps above involve making copies of all data. The
original data in the previous output and current input is never changed. original data in the previous output and current input is never changed.
In particular, the previous output is invariable and unaffected by In particular, the previous output is invariable and unaffected by
failed attempts to spend it. Only a valid transaction that correctly failed attempts to spend it. Only a valid transaction that correctly
satisfies the conditions of the scriptPubKey results in the output being satisfies the conditions of the output script results in the output being
considered as "spent". considered as "spent".
<<scriptSig_and_scriptPubKey>> is an example of the scriptPubKey and <<input_and_output_scripts_legacy>> is an example of the output and
scriptSig for the most common type of legacy Bitcoin transaction (a input scripts for the most common type of legacy Bitcoin transaction (a
payment to a public key hash), showing the combined script resulting payment to a public key hash), showing the combined script resulting
from the concatenation of the scripts prior to from the concatenation of the scripts prior to
validation. validation.
[[scriptSig_and_scriptPubKey]] [[input_and_output_scripts_legacy]]
.Combining scriptSig and scriptPubKey to evaluate a transaction script .Combining input and output scripts to evaluate a transaction script
image::../images/mbc2_0603.png["scriptSig_and_scriptPubKey"] image::../images/mbc2_0603.png["input_and_output_scripts"]
===== The script execution stack ===== The script execution stack
@ -172,21 +172,21 @@ operator +OP_EQUAL+, which checks that the resulting sum is equal to
in this book. For more details on the available script operators and in this book. For more details on the available script operators and
functions, see <<tx_script_ops>>. functions, see <<tx_script_ops>>.
Although most legacy scriptPubKeys refer to a public key hash (essentially, a Although most legacy output scripts refer to a public key hash (essentially, a
legacy Bitcoin address), thereby requiring proof of ownership to spend the legacy Bitcoin address), thereby requiring proof of ownership to spend the
funds, the script does not have to be that complex. Any combination of funds, the script does not have to be that complex. Any combination of
scriptPubKey and scriptSig that results in a TRUE value is valid. The output and input scripts that results in a TRUE value is valid. The
simple arithmetic we used as an example of the scripting language is simple arithmetic we used as an example of the scripting language is
also a valid script. also a valid script.
Use part of the arithmetic example script as the scriptPubKey: Use part of the arithmetic example script as the output script:
---- ----
3 OP_ADD 5 OP_EQUAL 3 OP_ADD 5 OP_EQUAL
---- ----
which can be satisfied by a transaction containing an input with the which can be satisfied by a transaction containing an input with the
scriptSig: input script:
---- ----
2 2
@ -200,7 +200,7 @@ The validation software combines the scripts:
As we saw in <<simplemath_script>>, when As we saw in <<simplemath_script>>, when
this script is executed, the result is +OP_TRUE+, making the transaction this script is executed, the result is +OP_TRUE+, making the transaction
valid. Not only have we shown a valid transaction output scriptPubKey, but valid. Not only have we shown a valid transaction output script, but
the resulting UTXO could be spent by anyone with the arithmetic skills the resulting UTXO could be spent by anyone with the arithmetic skills
to know that the number 2 satisfies the script. to know that the number 2 satisfies the script.
@ -237,38 +237,38 @@ When the script execution ends, you should be left with a +TRUE+ value
on the stack. on the stack.
[[script_exec]] [[script_exec]]
===== Separate execution of scriptPubKey and scriptSig ===== Separate execution of output and input scripts
In the original Bitcoin In the original Bitcoin
client, scriptPubKey and scriptSig were concatenated and executed client, output and input scripts were concatenated and executed
in sequence. For security reasons, this was changed in 2010 because of in sequence. For security reasons, this was changed in 2010 because of
a vulnerability known as the +1 OP_RETURN+ bug. In the current a vulnerability known as the +1 OP_RETURN+ bug. In the current
implementation, the scripts are executed separately with the stack implementation, the scripts are executed separately with the stack
transferred between the two executions. transferred between the two executions.
First, the scriptSig executed using the stack execution First, the input script executed using the stack execution
engine. If the scriptSig is executed without errors and has engine. If the input script is executed without errors and has
no operations left over, the stack is copied and the no operations left over, the stack is copied and the
scriptPubKey is executed. If the result of executing scriptPubKey output script is executed. If the result of executing the output script
with the stack data copied from scriptSig is +TRUE+, with the stack data copied from the input script is +TRUE+,
the scriptSig has succeeded in resolving the conditions imposed the input script has succeeded in resolving the conditions imposed
by the scriptPubKey and, therefore, the input is a valid authorization by the output script and, therefore, the input is a valid authorization
to spend the UTXO. If any result other than +TRUE+ remains after to spend the UTXO. If any result other than +TRUE+ remains after
execution of the combined script, the input is invalid because it has execution of the combined script, the input is invalid because it has
failed to satisfy the spending conditions placed on the output. failed to satisfy the spending conditions placed on the output.
//SOMEDAY:implications of not being able to use script in scriptSig //SOMEDAY:implications of not being able to use script in input script
[[p2pkh]] [[p2pkh]]
==== Pay-to-Public-Key-Hash (P2PKH) ==== Pay-to-Public-Key-Hash (P2PKH)
((("Pay-to-Public-Key-Hash (P2PKH)"))) ((("Pay-to-Public-Key-Hash (P2PKH)")))
A Pay-to-Public-Key-Hash or "P2PKH" script uses a scriptPubKey that A Pay-to-Public-Key-Hash or "P2PKH" script uses a output script that
contains a hash which commits to a public key. P2PKH is best known as a contains a hash which commits to a public key. P2PKH is best known as a
the basis for a legacy Bitcoin address. A P2PKH output can be spent by the basis for a legacy Bitcoin address. A P2PKH output can be spent by
presenting a public key which matches the hash commitment and a digital presenting a public key which matches the hash commitment and a digital
signature created by the corresponding private key (see signature created by the corresponding private key (see
<<c_signatures>>). Let's look at an example of a P2PKH scriptPubKey: <<c_signatures>>). Let's look at an example of a P2PKH output script:
---- ----
OP_DUP OP_HASH160 <Key Hash> OP_EQUALVERIFY OP_CHECKSIG OP_DUP OP_HASH160 <Key Hash> OP_EQUALVERIFY OP_CHECKSIG
@ -279,7 +279,7 @@ address. Most applications would show the _public key hash_ in a script
using hexadecimal encoding and not the familiar Bitcoin using hexadecimal encoding and not the familiar Bitcoin
address Base58Check format that begins with a "1." address Base58Check format that begins with a "1."
The preceding scriptPubKey can be satisfied with a scriptSig The preceding output script can be satisfied with an input script
of the form: of the form:
---- ----
@ -294,8 +294,8 @@ script:
---- ----
When executed, this combined script will evaluate to TRUE if, and only When executed, this combined script will evaluate to TRUE if, and only
if, the scriptSig matches the conditions set by the scriptPubKey. if, the input script matches the conditions set by the output script.
In other words, the result will be TRUE if the scriptSig In other words, the result will be TRUE if the input script
has a valid signature from Bob's private key that corresponds to has a valid signature from Bob's private key that corresponds to
the public key hash set as an encumbrance. the public key hash set as an encumbrance.
@ -338,7 +338,7 @@ to tell "M" and "N" apart when they're spoken, so we use the alternative
K-of-N. Both phrases refer to the same type of signature scheme. K-of-N. Both phrases refer to the same type of signature scheme.
==== ====
At this time, _standard_ multisignature scriptPubKeys are limited to at most 3 At this time, _standard_ multisignature output scripts are limited to at most 3
listed public keys, meaning you can do anything from a 1-of-1 to a listed public keys, meaning you can do anything from a 1-of-1 to a
3-of-3 multisignature or any combination within that range. 3-of-3 multisignature or any combination within that range.
You may want to check the +IsStandard()+ function to see what is currently You may want to check the +IsStandard()+ function to see what is currently
@ -348,7 +348,7 @@ multisignature scripts wrapped in a Pay-to-Script-Hash (P2SH) script.
P2SH multisignature scripts are limited to 15 keys, allowing for up to P2SH multisignature scripts are limited to 15 keys, allowing for up to
15-of-15 multisignature. We will learn about P2SH in <<p2sh>>. 15-of-15 multisignature. We will learn about P2SH in <<p2sh>>.
The general form of a scriptPubKey setting an K-of-N multisignature The general form of a output script setting an K-of-N multisignature
condition is: condition is:
---- ----
@ -358,14 +358,14 @@ K <Public Key 1> <Public Key 2> ... <Public Key N> N OP_CHECKMULTISIG
where N is the total number of listed public keys and K is the threshold where N is the total number of listed public keys and K is the threshold
of required signatures to spend the output. of required signatures to spend the output.
A scriptPubKey setting a 2-of-3 multisignature condition looks like An output script setting a 2-of-3 multisignature condition looks like
this: this:
---- ----
2 <Public Key A> <Public Key B> <Public Key C> 3 OP_CHECKMULTISIG 2 <Public Key A> <Public Key B> <Public Key C> 3 OP_CHECKMULTISIG
---- ----
The preceding scriptPubKey can be satisfied with a scriptSig The preceding output script can be satisfied with an input script
containing pairs of signatures and public keys: containing pairs of signatures and public keys:
---- ----
@ -382,8 +382,8 @@ The two scripts together would form the combined validation script:
---- ----
When executed, this combined script will evaluate to TRUE if, and only When executed, this combined script will evaluate to TRUE if, and only
if, the scriptSig script matches the conditions set by the scriptPubKey. if, the input script script matches the conditions set by the output script.
In this case, the condition is whether the scriptSig has In this case, the condition is whether the input script has
a valid signature from the two private keys that correspond to two of a valid signature from the two private keys that correspond to two of
the three public keys set as an encumbrance. the three public keys set as an encumbrance.
@ -429,7 +429,7 @@ like this:
OP_0 <Signature B> <Signature C> 2 <Public Key A> <Public Key B> <Public Key C> 3 OP_CHECKMULTISIG OP_0 <Signature B> <Signature C> 2 <Public Key A> <Public Key B> <Public Key C> 3 OP_CHECKMULTISIG
---- ----
Thus the scriptSig actually used in multisig is not: Thus the input script actually used in multisig is not:
---- ----
<Signature B> <Signature C> <Signature B> <Signature C>
@ -517,7 +517,7 @@ than a simple payment transaction, because this script contains very
long public keys. The burden of that extra data would be long public keys. The burden of that extra data would be
borne by the customer in the form of extra transaction fees. Finally, a large transaction borne by the customer in the form of extra transaction fees. Finally, a large transaction
script like this would be carried in the UTXO set in every full script like this would be carried in the UTXO set in every full
node, until it was spent. All of these issues make using complex scriptPubKeys node, until it was spent. All of these issues make using complex output scripts
difficult in practice. difficult in practice.
P2SH was developed to resolve these practical difficulties and to make P2SH was developed to resolve these practical difficulties and to make
@ -529,33 +529,33 @@ matches the commitment in addition to the data which satisfies the script. In si
P2SH means "pay to a script matching this hash, a script that will be P2SH means "pay to a script matching this hash, a script that will be
presented later when this output is spent." presented later when this output is spent."
((("redeemScripts")))((("scripting", "redeemScripts")))In P2SH ((("redeem scripts")))((("scripting", "redeem scripts")))In P2SH
transactions, the script that is replaced by a hash is referred transactions, the script that is replaced by a hash is referred
to as the _redeemScript_ because it is presented to the system at to as the _redeem script_ because it is presented to the system at
redemption time rather than as a scriptPubKey. <<without_p2sh>> shows redemption time rather than as an output script. <<without_p2sh>> shows
the script without P2SH and <<with_p2sh>> shows the same script encoded the script without P2SH and <<with_p2sh>> shows the same script encoded
with P2SH. with P2SH.
[[without_p2sh]] [[without_p2sh]]
.Complex script without P2SH .Complex script without P2SH
|======= |=======
| ScriptPubKey | 2 PubKey1 PubKey2 PubKey3 PubKey4 PubKey5 5 OP_CHECKMULTISIG | Output script | 2 PubKey1 PubKey2 PubKey3 PubKey4 PubKey5 5 OP_CHECKMULTISIG
| ScriptSig | Sig1 Sig2 | Input script | Sig1 Sig2
|======= |=======
[[with_p2sh]] [[with_p2sh]]
.Complex script as P2SH .Complex script as P2SH
|======= |=======
| RedeemScript | 2 PubKey1 PubKey2 PubKey3 PubKey4 PubKey5 5 OP_CHECKMULTISIG | Redeem script | 2 PubKey1 PubKey2 PubKey3 PubKey4 PubKey5 5 OP_CHECKMULTISIG
| ScriptPubKey | OP_HASH160 <20-byte hash of redeemScript> OP_EQUAL | Output script | OP_HASH160 <20-byte hash of redeem script> OP_EQUAL
| ScriptSig | Sig1 Sig2 <redeemScript> | Input script | Sig1 Sig2 <redeem script>
|======= |=======
As you can see from the tables, with P2SH the complex script that As you can see from the tables, with P2SH the complex script that
details the conditions for spending the output (redeemScript) is not details the conditions for spending the output (redeem script) is not
presented in the scriptPubKey. Instead, only a hash of it is in the presented in the output script. Instead, only a hash of it is in the
scriptPubKey and the reedemScript itself is presented later, as part output script and the reedemScript itself is presented later, as part
of the scriptSig when the output is spent. This shifts the burden of the input script when the output is spent. This shifts the burden
in fees and complexity from the sender to the recipient (spender) of the in fees and complexity from the sender to the recipient (spender) of the
transaction. transaction.
@ -599,18 +599,18 @@ echo \
---- ----
The series of commands above first encodes Mohammed's multisig The series of commands above first encodes Mohammed's multisig
redeemScript as a serialized hex-encoded bitcoin Script. The next +bx+ command redeem script as a serialized hex-encoded bitcoin Script. The next +bx+ command
calculates the SHA256 hash of that. The next +bx+ command hashes again calculates the SHA256 hash of that. The next +bx+ command hashes again
with RIPEMD160, producing the final script-hash: with RIPEMD160, producing the final script-hash:
The 20-byte hash of Mohammed's redeemScript is: The 20-byte hash of Mohammed's redeem script is:
---- ----
54c557e07dde5bb6cb791c7a540e0a4796f5e97e 54c557e07dde5bb6cb791c7a540e0a4796f5e97e
---- ----
A P2SH transaction locks the output to this hash instead of the longer A P2SH transaction locks the output to this hash instead of the longer
redeemScript, using a special scriptPubKey template: redeem script, using a special output script template:
---- ----
OP_HASH160 54c557e07dde5bb6cb791c7a540e0a4796f5e97e OP_EQUAL OP_HASH160 54c557e07dde5bb6cb791c7a540e0a4796f5e97e OP_EQUAL
@ -619,23 +619,23 @@ OP_HASH160 54c557e07dde5bb6cb791c7a540e0a4796f5e97e OP_EQUAL
which, as you can see, is much shorter. Instead of "pay to this 5-key which, as you can see, is much shorter. Instead of "pay to this 5-key
multisignature script," the P2SH equivalent transaction is "pay to a multisignature script," the P2SH equivalent transaction is "pay to a
script with this hash." A customer making a payment to Mohammed's script with this hash." A customer making a payment to Mohammed's
company need only include this much shorter scriptPubKey in his company need only include this much shorter output script in his
payment. When Mohammed and his partners want to spend this UTXO, they payment. When Mohammed and his partners want to spend this UTXO, they
must present the original redeemScript (the one whose hash locked the must present the original redeem script (the one whose hash locked the
UTXO) and the signatures necessary to unlock it, like this: UTXO) and the signatures necessary to unlock it, like this:
---- ----
<Sig1> <Sig2> <2 PK1 PK2 PK3 PK4 PK5 5 OP_CHECKMULTISIG> <Sig1> <Sig2> <2 PK1 PK2 PK3 PK4 PK5 5 OP_CHECKMULTISIG>
---- ----
The two scripts are combined in two stages. First, the redeemScript is The two scripts are combined in two stages. First, the redeem script is
checked against the scriptPubKey to make sure the hash matches: checked against the output script to make sure the hash matches:
---- ----
<2 PK1 PK2 PK3 PK4 PK5 5 OP_CHECKMULTISIG> OP_HASH160 <redeemScript hash> OP_EQUAL <2 PK1 PK2 PK3 PK4 PK5 5 OP_CHECKMULTISIG> OP_HASH160 <redeem script hash> OP_EQUAL
---- ----
If the redeemScript hash matches, the redeemScript is executed: If the redeem script hash matches, the redeem script is executed:
---- ----
<Sig1> <Sig2> 2 PK1 PK2 PK3 PK4 PK5 5 OP_CHECKMULTISIG <Sig1> <Sig2> 2 PK1 PK2 PK3 PK4 PK5 5 OP_CHECKMULTISIG
@ -698,31 +698,31 @@ scripts in outputs:
present time (payment) to a future time (when it is spent). present time (payment) to a future time (when it is spent).
- P2SH shifts the transaction fee cost of a long script from the sender - P2SH shifts the transaction fee cost of a long script from the sender
to the recipient, who has to include the long redeemScript to spend to the recipient, who has to include the long redeem script to spend
it. it.
==== RedeemScript and Validation ==== Redeem Script and Validation
You are not able to put a P2SH inside a P2SH redeemScript, because the You are not able to put a P2SH inside a P2SH redeem script, because the
P2SH specification is not recursive. Also, while it is technically P2SH specification is not recursive. Also, while it is technically
possible to include +OP_RETURN+ (see <<op_return>>) in a redeemScript, as possible to include +OP_RETURN+ (see <<op_return>>) in a redeem script, as
nothing in the rules prevents you from doing so, it is of no practical nothing in the rules prevents you from doing so, it is of no practical
use because executing +OP_RETURN+ during validation will cause the use because executing +OP_RETURN+ during validation will cause the
transaction to be marked invalid. transaction to be marked invalid.
Note that because the redeemScript is not presented to the network Note that because the redeem script is not presented to the network
until you attempt to spend a P2SH output, if you create an output with the until you attempt to spend a P2SH output, if you create an output with the
hash of an invalid redeemScript, you will not be able to spend hash of an invalid redeem script, you will not be able to spend
it. The spending transaction, which includes the redeemScript, it. The spending transaction, which includes the redeem script,
will not be accepted because it is an invalid script. This creates a will not be accepted because it is an invalid script. This creates a
risk, because you can send bitcoin to a P2SH address that cannot be spent later. risk, because you can send bitcoin to a P2SH address that cannot be spent later.
[WARNING] [WARNING]
==== ====
((("warnings and cautions", "accidental bitcoin invalidation")))P2SH scriptPubKeys ((("warnings and cautions", "accidental bitcoin invalidation")))P2SH output scripts
contain the hash of a redeemScript, which gives no clues as to contain the hash of a redeem script, which gives no clues as to
the content of the redeemScript. The P2SH transaction will be the content of the redeem script. The P2SH transaction will be
considered valid and accepted even if the redeemScript is invalid. You considered valid and accepted even if the redeem script is invalid. You
might accidentally receive bitcoin in such a way that it cannot later be might accidentally receive bitcoin in such a way that it cannot later be
spent. spent.
==== ====
@ -763,7 +763,7 @@ from the UTXO set and cause the size of the UTXO database to forever
increase, or "bloat." increase, or "bloat."
A compromise was reached A compromise was reached
that allows a scriptPubKey starting with +OP_RETURN+ to that allows an output script starting with +OP_RETURN+ to
add nonpayment data to a transaction output. However, unlike add nonpayment data to a transaction output. However, unlike
the use of "fake" UTXOs, the +OP_RETURN+ operator creates an explicitly the use of "fake" UTXOs, the +OP_RETURN+ operator creates an explicitly
_provably unspendable_ output, which does not need to be stored in the _provably unspendable_ output, which does not need to be stored in the
@ -787,7 +787,7 @@ http://proofofexistence.com[Proof of Existence] digital notarization
service uses the 8-byte prefix +DOCPROOF+, which is ASCII encoded as +44 service uses the 8-byte prefix +DOCPROOF+, which is ASCII encoded as +44
4f 43 50 52 4f 4f 46+ in hexadecimal. 4f 43 50 52 4f 4f 46+ in hexadecimal.
Keep in mind that there is no scriptSig that corresponds to Keep in mind that there is no input script that corresponds to
+OP_RETURN+ that could possibly be used to "spend" an +OP_RETURN+ output. The +OP_RETURN+ that could possibly be used to "spend" an +OP_RETURN+ output. The
whole point of an +OP_RETURN+ output is that you can't spend the money locked in that whole point of an +OP_RETURN+ output is that you can't spend the money locked in that
output, and therefore it does not need to be held in the UTXO set as output, and therefore it does not need to be held in the UTXO set as
@ -801,22 +801,22 @@ script to "RETURN" with a +FALSE+ and halt. Thus, if you accidentally
reference a +OP_RETURN+ output as an input in a transaction, that reference a +OP_RETURN+ output as an input in a transaction, that
transaction is invalid. transaction is invalid.
[[locktime_limitations]] [[lock_time_limitations]]
==== Transaction locktime limitations ==== Transaction lock time limitations
+nLockTime+ has the limitation that while it makes it possible to spend some outputs in the future, it does not make it impossible to spend them until that time. Let's explain that with the following example. Lock time has the limitation that while it makes it possible to spend some outputs in the future, it does not make it impossible to spend them until that time. Let's explain that with the following example.
((("use cases", "buying coffee", id="alicesseven")))Alice signs a transaction spending one of her outputs to Bob's address, and sets the transaction +nLockTime+ to 3 months in the future. Alice sends that transaction to Bob to hold. With this transaction Alice and Bob know that: ((("use cases", "buying coffee", id="alicesseven")))Alice signs a transaction spending one of her outputs to Bob's address, and sets the transaction lock time to 3 months in the future. Alice sends that transaction to Bob to hold. With this transaction Alice and Bob know that:
* Bob cannot transmit the transaction to redeem the funds until 3 months have elapsed. * Bob cannot transmit the transaction to redeem the funds until 3 months have elapsed.
* Bob may transmit the transaction after 3 months. * Bob may transmit the transaction after 3 months.
However: However:
* Alice can create another transaction, double-spending the same inputs without a locktime. Thus, Alice can spend the same UTXO before the 3 months have elapsed. * Alice can create another transaction, double-spending the same inputs without a lock time. Thus, Alice can spend the same UTXO before the 3 months have elapsed.
* Bob has no guarantee that Alice won't do that. * Bob has no guarantee that Alice won't do that.
It is important to understand the limitations of transaction +nLockTime+. The only guarantee is that Bob will not be able to redeem it before 3 months have elapsed. There is no guarantee that Bob will get the funds. To achieve such a guarantee, the timelock restriction must be placed on the UTXO itself and be part of the script, rather than on the transaction. This is achieved by the next form of timelock, called Check Lock Time Verify. It is important to understand the limitations of transaction lock time. The only guarantee is that Bob will not be able to redeem it before 3 months have elapsed. There is no guarantee that Bob will get the funds. To achieve such a guarantee, the timelock restriction must be placed on the UTXO itself and be part of the script, rather than on the transaction. This is achieved by the next form of timelock, called Check Lock Time Verify.
==== Check Lock Time Verify (OP_CLTV) ==== Check Lock Time Verify (OP_CLTV)
@ -828,7 +828,7 @@ timelock was introduced to Bitcoin as a soft fork upgrade. Based on a
specification in BIP65, a new script operator called specification in BIP65, a new script operator called
_OP_CHECKLOCKTIMEVERIFY_ (_CLTV_) was added to the scripting language. _OP_CHECKLOCKTIMEVERIFY_ (_CLTV_) was added to the scripting language.
+OP_CLTV+ is a per-output timelock, rather than a per-transaction timelock +OP_CLTV+ is a per-output timelock, rather than a per-transaction timelock
as is the case with +nLockTime+. This allows for much greater as is the case with lock time. This allows for much greater
flexibility in the way timelocks are applied. flexibility in the way timelocks are applied.
In simple terms, by committing to the +OP_CLTV+ opcode in an In simple terms, by committing to the +OP_CLTV+ opcode in an
@ -837,21 +837,21 @@ specified time has elapsed.
[TIP] [TIP]
==== ====
While +nLockTime+ is a transaction-level timelock, +OP_CLTV+ is an While lock time is a transaction-level timelock, +OP_CLTV+ is an
output-based timelock. output-based timelock.
==== ====
+OP_CLTV+ doesn't replace +nLockTime+, but rather restricts specific UTXO +OP_CLTV+ doesn't replace lock time, but rather restricts specific UTXO
such that they can only be spent in a future transaction with such that they can only be spent in a future transaction with
+nLockTime+ set to a greater or equal value. lock time set to a greater or equal value.
The +OP_CLTV+ opcode takes one parameter as input, expressed as a number in The +OP_CLTV+ opcode takes one parameter as input, expressed as a number in
the same format as +nLockTime+ (either a block height or Unix epoch the same format as lock time (either a block height or Unix epoch
time). As indicated by the +VERIFY+ suffix, +OP_CLTV+ is the type of opcode time). As indicated by the +VERIFY+ suffix, +OP_CLTV+ is the type of opcode
that halts execution of the script if the outcome is +FALSE+. If it that halts execution of the script if the outcome is +FALSE+. If it
results in TRUE, execution continues. results in TRUE, execution continues.
In order to use +OP_CLTV+, you insert it into the redeemScript of the In order to use +OP_CLTV+, you insert it into the redeem script of the
output in the transaction that creates the output. For output in the transaction that creates the output. For
example, if Alice is paying Bob's address, the output would normally example, if Alice is paying Bob's address, the output would normally
contain a P2PKH script like this: contain a P2PKH script like this:
@ -861,7 +861,7 @@ OP_DUP OP_HASH160 <Bob's Public Key Hash> OP_EQUALVERIFY OP_CHECKSIG
---- ----
To lock it to a time, say 3 months from now, the transaction would be a To lock it to a time, say 3 months from now, the transaction would be a
P2SH transaction with a redeemScript like this: P2SH transaction with a redeem script like this:
---- ----
<now + 3 months> OP_CHECKLOCKTIMEVERIFY OP_DROP OP_DUP OP_HASH160 <Bob's Public Key Hash> OP_EQUALVERIFY OP_CHECKSIG <now + 3 months> OP_CHECKLOCKTIMEVERIFY OP_DROP OP_DUP OP_HASH160 <Bob's Public Key Hash> OP_EQUALVERIFY OP_CHECKSIG
@ -875,13 +875,13 @@ where +<now {plus} 3 months>+ is a block height or time value estimated
When Bob tries to spend this UTXO, he constructs a transaction that When Bob tries to spend this UTXO, he constructs a transaction that
references the UTXO as an input. He uses his signature and public key in references the UTXO as an input. He uses his signature and public key in
the scriptSig of that input and sets the transaction +nLockTime+ the input script of that input and sets the transaction lock time
to be equal or greater to the timelock in the +OP_CHECKLOCKTIMEVERIFY+ to be equal or greater to the timelock in the +OP_CHECKLOCKTIMEVERIFY+
Alice set. Bob then broadcasts the transaction on the Bitcoin network. Alice set. Bob then broadcasts the transaction on the Bitcoin network.
Bob's transaction is evaluated as follows. If the +OP_CHECKLOCKTIMEVERIFY+ Bob's transaction is evaluated as follows. If the +OP_CHECKLOCKTIMEVERIFY+
parameter Alice set is less than or equal the spending transaction's parameter Alice set is less than or equal the spending transaction's
+nLockTime+, script execution continues (acts as if a _no lock time, script execution continues (acts as if a _no
operation_ or OP_NOP opcode was executed). Otherwise, script operation_ or OP_NOP opcode was executed). Otherwise, script
execution halts and the transaction is deemed invalid. execution halts and the transaction is deemed invalid.
@ -890,17 +890,17 @@ the transaction invalid if (source: BIP65):
1. the stack is empty; or 1. the stack is empty; or
2. the top item on the stack is less than 0; or 2. the top item on the stack is less than 0; or
3. the lock-time type (height versus timestamp) of the top stack item and the +nLockTime+ field are not the same; or 3. the lock-time type (height versus timestamp) of the top stack item and the lock time field are not the same; or
4. the top stack item is greater than the transaction's +nLockTime+ field; or 4. the top stack item is greater than the transaction's lock time field; or
5. the +nSequence+ field of the input is 0xffffffff. 5. the sequence field of the input is 0xffffffff.
[[timelock_conflicts]] [[timelock_conflicts]]
.Timelock conflicts .Timelock conflicts
[WARNING] [WARNING]
==== ====
+OP_CLTV+ and +nLockTime+ use the same format to describe timelocks, either +OP_CLTV+ and lock time use the same format to describe timelocks, either
a block height or the time elapsed in seconds since Unix epoch. a block height or the time elapsed in seconds since Unix epoch.
Critically, when used together, the format of +nLockTime+ must match Critically, when used together, the format of lock time must match
that of +OP_CLTV+ in the outputs--they must both reference either that of +OP_CLTV+ in the outputs--they must both reference either
block height or time in seconds. block height or time in seconds.
@ -922,10 +922,10 @@ dropped, with +OP_DROP+, for correct execution of subsequent script
opcodes. You will often see +OP_CHECKLOCKTIMEVERIFY+ followed by +OP_DROP+ in opcodes. You will often see +OP_CHECKLOCKTIMEVERIFY+ followed by +OP_DROP+ in
scripts for this reason. scripts for this reason.
By using nLockTime in conjunction with +OP_CLTV+, the scenario described in By using lock time in conjunction with +OP_CLTV+, the scenario described in
<<locktime_limitations>> changes. Alice can no longer spend the money <<lock_time_limitations>> changes. Alice can no longer spend the money
(because it's locked with Bob's key) and Bob cannot spend it before the (because it's locked with Bob's key) and Bob cannot spend it before the
3-month locktime has expired.((("", startref="alicesseven"))) 3-month lock time has expired.((("", startref="alicesseven")))
By introducing timelock functionality directly into the scripting By introducing timelock functionality directly into the scripting
language, +OP_CLTV+ allows us to develop some very interesting complex language, +OP_CLTV+ allows us to develop some very interesting complex
@ -937,7 +937,7 @@ https://github.com/bitcoin/bips/blob/master/bip-0065.mediawiki[BIP65
==== Relative Timelocks ==== Relative Timelocks
+nLockTime+ and +OP_CLTV+ are ((("timelocks", "relative timelocks", Lock time and +OP_CLTV+ are ((("timelocks", "relative timelocks",
id="Trelative07")))((("scripting", "timelocks", "relative id="Trelative07")))((("scripting", "timelocks", "relative
timelocks")))((("relative timelocks", id="relativetime07")))both timelocks")))((("relative timelocks", id="relativetime07")))both
_absolute timelocks_ in that they specify an absolute point in time. The _absolute timelocks_ in that they specify an absolute point in time. The
@ -956,7 +956,7 @@ and Lightning Networks, as we will see in <<state_channels>>.
Relative timelocks, like absolute timelocks, are implemented with both a Relative timelocks, like absolute timelocks, are implemented with both a
transaction-level feature and a script-level opcode. The transaction-level feature and a script-level opcode. The
transaction-level relative timelock is implemented as a consensus rule transaction-level relative timelock is implemented as a consensus rule
on the value of +nSequence+, a transaction field that is set in every on the value of +sequence+, a transaction field that is set in every
transaction input. Script-level relative timelocks are implemented with transaction input. Script-level relative timelocks are implemented with
the +OP_CHECKSEQUENCEVERIFY+ (OP_CSV) opcode. the +OP_CHECKSEQUENCEVERIFY+ (OP_CSV) opcode.
@ -976,20 +976,20 @@ the consensus rules.
((("scripting", "timelocks", "relative timelocks with ((("scripting", "timelocks", "relative timelocks with
CHECKSEQUENCEVERIFY")))((("CHECKSEQUENCEVERIFY (CSV)")))Just like OP_CLTV CHECKSEQUENCEVERIFY")))((("CHECKSEQUENCEVERIFY (CSV)")))Just like OP_CLTV
and +nLockTime+, there is a script opcode for relative timelocks that and lock time, there is a script opcode for relative timelocks that
leverages the +nSequence+ value in scripts. That opcode is leverages the sequence value in scripts. That opcode is
+OP_CHECKSEQUENCEVERIFY+, commonly referred to as +OP_CSV+ for short. +OP_CHECKSEQUENCEVERIFY+, commonly referred to as +OP_CSV+ for short.
The +OP_CSV+ opcode when evaluated in an UTXO's script allows The +OP_CSV+ opcode when evaluated in an UTXO's script allows
spending only in a transaction whose input +nSequence+ value is greater spending only in a transaction whose input sequence value is greater
than or equal to the +OP_CSV+ parameter. Essentially, this restricts than or equal to the +OP_CSV+ parameter. Essentially, this restricts
spending the UTXO until a certain number of blocks or seconds have spending the UTXO until a certain number of blocks or seconds have
elapsed relative to the time the UTXO was mined. elapsed relative to the time the UTXO was mined.
As with CLTV, the value in +OP_CSV+ must match the format in the As with CLTV, the value in +OP_CSV+ must match the format in the
corresponding +nSequence+ value. If +OP_CSV+ is specified in terms of corresponding sequence value. If +OP_CSV+ is specified in terms of
blocks, then so must +nSequence+. If +OP_CSV+ is specified in terms of blocks, then so must sequence. If +OP_CSV+ is specified in terms of
seconds, then so must +nSequence+. seconds, then so must sequence.
[WARNING] [WARNING]
==== ====
@ -1156,7 +1156,7 @@ OP_ENDIF
OP_CHECKSIG OP_CHECKSIG
---- ----
Looking at this redeemScript, you may be wondering: "Where is the Looking at this redeem script, you may be wondering: "Where is the
condition? There is nothing preceding the +IF+ clause!" condition? There is nothing preceding the +IF+ clause!"
The condition is not part of the script. Instead, the condition The condition is not part of the script. Instead, the condition
@ -1182,11 +1182,11 @@ known as +OP_0+, pushes an empty byte array to the stack.
<Bob's Sig> OP_FALSE <Bob's Sig> OP_FALSE
---- ----
Bob's scriptSig causes the +OP_IF+ clause Bob's input script causes the +OP_IF+ clause
to execute the second (+OP_ELSE+) script, which requires Bob's signature. to execute the second (+OP_ELSE+) script, which requires Bob's signature.
Since +OP_IF+ clauses can be nested, we can create a "maze" of execution Since +OP_IF+ clauses can be nested, we can create a "maze" of execution
paths. The scriptSig can provide a "map" selecting which paths. The input script can provide a "map" selecting which
execution path is actually executed: execution path is actually executed:
---- ----
@ -1202,18 +1202,18 @@ OP_ENDIF
---- ----
In this scenario, there are three execution paths (+subscript A+, +subscript In this scenario, there are three execution paths (+subscript A+, +subscript
B+, and +subscript C+). The scriptSig provides a path in the form of B+, and +subscript C+). The input script provides a path in the form of
a sequence of +TRUE+ or +FALSE+ values. To select path +subscript B+, for a sequence of +TRUE+ or +FALSE+ values. To select path +subscript B+, for
example, the scriptSig must end in +OP_1 OP_0+ (+TRUE+, +FALSE+). These example, the input script must end in +OP_1 OP_0+ (+TRUE+, +FALSE+). These
values will be pushed onto the stack, so that the second value (+FALSE+) values will be pushed onto the stack, so that the second value (+FALSE+)
ends up at the top of the stack. The outer +OP_IF+ clause pops the +FALSE+ ends up at the top of the stack. The outer +OP_IF+ clause pops the +FALSE+
value and executes the first +OP_ELSE+ clause. Then the +TRUE+ value moves value and executes the first +OP_ELSE+ clause. Then the +TRUE+ value moves
to the top of the stack and is evaluated by the inner (nested) +OP_IF+, to the top of the stack and is evaluated by the inner (nested) +OP_IF+,
selecting the +B+ execution path. selecting the +B+ execution path.
Using this construct, we can build redeemScripts with tens or hundreds Using this construct, we can build redeem scripts with tens or hundreds
of execution paths, each offering a different way to redeem the UTXO. To of execution paths, each offering a different way to redeem the UTXO. To
spend, we construct an scriptSig that navigates the execution spend, we construct an input script that navigates the execution
path by putting the appropriate +TRUE+ and +FALSE+ values on the stack path by putting the appropriate +TRUE+ and +FALSE+ values on the stack
at each flow control point.((("", startref="Sflow07")))((("", at each flow control point.((("", startref="Sflow07")))((("",
startref="flow07")))((("", startref="condition07"))) startref="flow07")))((("", startref="condition07")))
@ -1242,7 +1242,7 @@ partner signatures. Finally, if all partners are unavailable or
incapacitated for a while, they want the lawyer to be able to manage the incapacitated for a while, they want the lawyer to be able to manage the
account directly. account directly.
Here's the redeemScript that Mohammed designs to achieve this (line Here's the redeem script that Mohammed designs to achieve this (line
number prefixed as XX): number prefixed as XX):
[[variable_timelock_multisig]] [[variable_timelock_multisig]]
@ -1272,7 +1272,7 @@ In the first execution path, this script operates as a simple 2-of-3
multisig with the three partners. This execution path consists of lines multisig with the three partners. This execution path consists of lines
3 and 9. Line 3 sets the quorum of the multisig to +2+ (2-of-3). This 3 and 9. Line 3 sets the quorum of the multisig to +2+ (2-of-3). This
execution path can be selected by putting +OP_TRUE OP_TRUE+ at the end of the execution path can be selected by putting +OP_TRUE OP_TRUE+ at the end of the
scriptSig: input script:
.Spending data for the first execution path (2-of-3 multisig) .Spending data for the first execution path (2-of-3 multisig)
---- ----
@ -1282,7 +1282,7 @@ OP_0 <Mohammed's Sig> <Zaira's Sig> OP_TRUE OP_TRUE
[TIP] [TIP]
==== ====
The +OP_0+ at the beginning of this scriptSig is because of an oddity in The +OP_0+ at the beginning of this input script is because of an oddity in
+OP_CHECKMULTISIG+ that pops an extra value from the stack. The extra value +OP_CHECKMULTISIG+ that pops an extra value from the stack. The extra value
is disregarded by the +OP_CHECKMULTISIG+, but it must be present or the is disregarded by the +OP_CHECKMULTISIG+, but it must be present or the
script fails. Pushing an empty byte array with +OP_0+ is a workaround to the oddity, as script fails. Pushing an empty byte array with +OP_0+ is a workaround to the oddity, as
@ -1293,7 +1293,7 @@ The second execution path can only be used after 30 days have elapsed
from the creation of the UTXO. At that time, it requires the signature from the creation of the UTXO. At that time, it requires the signature
of Abdul the lawyer and one of the three partners (a 1-of-3 multisig). of Abdul the lawyer and one of the three partners (a 1-of-3 multisig).
This is achieved by line 7, which sets the quorum for the multisig to This is achieved by line 7, which sets the quorum for the multisig to
+1+. To select this execution path, the scriptSig would end in +1+. To select this execution path, the input script would end in
+OP_FALSE OP_TRUE+: +OP_FALSE OP_TRUE+:
.Spending data for the second execution path (Lawyer + 1-of-3) .Spending data for the second execution path (Lawyer + 1-of-3)
@ -1310,9 +1310,9 @@ stack and +TRUE+ is pushed on top of it.
Finally, the third execution path allows Abdul the lawyer to spend the Finally, the third execution path allows Abdul the lawyer to spend the
funds alone, but only after 90 days. To select this execution path, the funds alone, but only after 90 days. To select this execution path, the
scriptSig has to end in +OP_FALSE+: input script has to end in +OP_FALSE+:
.ScriptSig for the third execution path (Lawyer only) .Input script for the third execution path (Lawyer only)
---- ----
<Abdul's Sig> OP_FALSE <Abdul's Sig> OP_FALSE
---- ----
@ -1333,9 +1333,9 @@ inside a P2SH script.
===== Pay-to-Witness-Public-Key-Hash (P2WPKH) ===== Pay-to-Witness-Public-Key-Hash (P2WPKH)
Let's start by looking at the example of a P2PKH Let's start by looking at the example of a P2PKH
scriptPubKey: output script:
.Example P2PKH scriptPubKey .Example P2PKH output script
---- ----
OP_DUP OP_HASH160 ab68025513c3dbd2f7b92a94e0581f5d50f654e7 OP_EQUALVERIFY OP_CHECKSIG OP_DUP OP_HASH160 ab68025513c3dbd2f7b92a94e0581f5d50f654e7 OP_EQUALVERIFY OP_CHECKSIG
---- ----
@ -1349,7 +1349,7 @@ to the same public key, it would look like this:
0 ab68025513c3dbd2f7b92a94e0581f5d50f654e7 0 ab68025513c3dbd2f7b92a94e0581f5d50f654e7
---- ----
As you can see, a P2WPKH scriptPubKey is much As you can see, a P2WPKH output script is much
simpler than the P2PKH equivalent. It consists of two values that are simpler than the P2PKH equivalent. It consists of two values that are
pushed on to the script evaluation stack. To an old (nonsegwit-aware) pushed on to the script evaluation stack. To an old (nonsegwit-aware)
Bitcoin client, the two pushes would look like an output that anyone can Bitcoin client, the two pushes would look like an output that anyone can
@ -1366,7 +1366,7 @@ would have to include a signature within the transaction input:
.Decoded transaction showing a P2PKH output being spent with a signature .Decoded transaction showing a P2PKH output being spent with a signature
---- ----
[...] [...]
“Vin” : [ "vin" : [
"txid": "0627052b6f28912f2703066a912ea577f2ce4da4caa5a5fbd8a57286c345c2f2", "txid": "0627052b6f28912f2703066a912ea577f2ce4da4caa5a5fbd8a57286c345c2f2",
"vout": 0, "vout": 0,
"scriptSig": “<Bobs scriptSig>”, "scriptSig": “<Bobs scriptSig>”,
@ -1376,12 +1376,12 @@ would have to include a signature within the transaction input:
However, to spend the P2PKH output, the transaction has no However, to spend the P2PKH output, the transaction has no
signature on that input. Instead, Bobs transaction has an empty signature on that input. Instead, Bobs transaction has an empty
+scriptSig+ and includes a witness field: input script and includes a witness structure:
.Decoded transaction showing a P2WPKH output being spent with a witness field .Decoded transaction showing a P2WPKH output being spent with a witness structure
---- ----
[...] [...]
“Vin” : [ "vin" : [
"txid": "0627052b6f28912f2703066a912ea577f2ce4da4caa5a5fbd8a57286c345c2f2", "txid": "0627052b6f28912f2703066a912ea577f2ce4da4caa5a5fbd8a57286c345c2f2",
"vout": 0, "vout": 0,
"scriptSig": “”, "scriptSig": “”,
@ -1424,21 +1424,21 @@ saw this type of script in <<p2sh>>. In that example, P2SH was used by
Mohammed's company to express a multisignature script. Payments to Mohammed's company to express a multisignature script. Payments to
Mohammed's company were encoded with a script like this: Mohammed's company were encoded with a script like this:
.Example P2SH scriptPubKey .Example P2SH output script
---- ----
OP_HASH160 54c557e07dde5bb6cb791c7a540e0a4796f5e97e OP_EQUAL OP_HASH160 54c557e07dde5bb6cb791c7a540e0a4796f5e97e OP_EQUAL
---- ----
This P2SH script references the hash of a _redeemScript_ that defines a This P2SH script references the hash of a _redeem script_ that defines a
2-of-3 multisignature requirement to spend funds. To spend this output, 2-of-3 multisignature requirement to spend funds. To spend this output,
Mohammed's company would present the redeemScript (whose hash matches Mohammed's company would present the redeem script (whose hash matches
the script hash in the P2SH output) and the signatures necessary to the script hash in the P2SH output) and the signatures necessary to
satisfy that redeemScript, all inside the transaction input: satisfy that redeem script, all inside the transaction input:
.Decoded transaction showing a P2SH output being spent .Decoded transaction showing a P2SH output being spent
---- ----
[...] [...]
“Vin” : [ "vin" : [
"txid": "abcdef12345...", "txid": "abcdef12345...",
"vout": 0, "vout": 0,
"scriptSig": “<SigA> <SigB> <2 PubA PubB PubC PubD PubE 5 OP_CHECKMULTISIG>”, "scriptSig": “<SigA> <SigB> <2 PubA PubB PubC PubD PubE 5 OP_CHECKMULTISIG>”,
@ -1450,7 +1450,7 @@ If Mohammed's customers were using a segwit-compatible wallet, they
would make a payment, creating a Pay-to-Witness-Script-Hash (P2WSH) would make a payment, creating a Pay-to-Witness-Script-Hash (P2WSH)
output that would look like this: output that would look like this:
.Example P2WSH scriptPubKey .Example P2WSH output script
---- ----
0 a9b7b38d972cabc7961dbfbcb841ad4508d133c47ba87457b4a0e8aae86dbb89 0 a9b7b38d972cabc7961dbfbcb841ad4508d133c47ba87457b4a0e8aae86dbb89
---- ----
@ -1458,7 +1458,7 @@ output that would look like this:
Again, as with the example of P2WPKH, you can see that the Segregated Again, as with the example of P2WPKH, you can see that the Segregated
Witness equivalent script is a lot simpler and reduces the template Witness equivalent script is a lot simpler and reduces the template
overhead that you see in P2SH scripts. Instead, the Segregated Witness overhead that you see in P2SH scripts. Instead, the Segregated Witness
scriptPubKey consists of two values pushed to the stack: a witness version output script consists of two values pushed to the stack: a witness version
(0) and the 32-byte SHA256 hash of the witness script. (0) and the 32-byte SHA256 hash of the witness script.
[TIP] [TIP]
@ -1475,13 +1475,13 @@ Mohammed's company can spend the P2WSH output by presenting the
correct witness script and sufficient signatures to satisfy it. Both the correct witness script and sufficient signatures to satisfy it. Both the
witness script and the signatures would be witness script and the signatures would be
included as part of the witness data. No data would be placed in the included as part of the witness data. No data would be placed in the
scriptSig because this is a native witness program, which does not use input script because this is a native witness program, which does not use
the legacy scriptSig field. the legacy input script field.
.Decoded transaction showing a P2WSH output being spent with witness data .Decoded transaction showing a P2WSH output being spent with witness data
---- ----
[...] [...]
“Vin” : [ "vin" : [
"txid": "abcdef12345...", "txid": "abcdef12345...",
"vout": 0, "vout": 0,
"scriptSig": “”, "scriptSig": “”,
@ -1516,7 +1516,7 @@ Witness is a two-step process. First, wallets must create segwit
type outputs. Then, these outputs can be spent by wallets that know how type outputs. Then, these outputs can be spent by wallets that know how
to construct Segregated Witness transactions. In the examples, Alice's to construct Segregated Witness transactions. In the examples, Alice's
wallet is able to create outputs paying wallet is able to create outputs paying
Segregated Witness scriptPubKeys. Bob's wallet is also segwit-aware and able Segregated Witness output scripts. Bob's wallet is also segwit-aware and able
to spend those outputs. to spend those outputs.
Segregated Witness was implemented as a Segregated Witness was implemented as a
@ -1587,7 +1587,7 @@ echo \
3e0547268b3b19288b3adef9719ec8659f4b2b0b 3e0547268b3b19288b3adef9719ec8659f4b2b0b
---- ----
Next, the redeemScript hash is converted to a Bitcoin address. Let's Next, the redeem script hash is converted to a Bitcoin address. Let's
use +bx+ on the command-line again: use +bx+ on the command-line again:
.P2SH address .P2SH address
@ -1625,7 +1625,7 @@ company, regardless of whether their wallets are upgraded for segwit,
Mohammed's wallet can embed the P2WSH witness program inside a P2SH Mohammed's wallet can embed the P2WSH witness program inside a P2SH
script. script.
First, Mohammed's wallet hashes the redeemScript with SHA256 (just First, Mohammed's wallet hashes the redeem script with SHA256 (just
once). Let's use +bx+ to do that on the command-line: once). Let's use +bx+ to do that on the command-line:
.Mohammed's wallet creates a P2WSH witness program .Mohammed's wallet creates a P2WSH witness program
@ -1641,7 +1641,7 @@ echo \
9592d601848d04b172905e0ddb0adde59f1590f1e553ffc81ddc4b0ed927dd73 9592d601848d04b172905e0ddb0adde59f1590f1e553ffc81ddc4b0ed927dd73
---- ----
Next, the hashed redeemScript is turned into a P2WSH witness program: Next, the hashed redeem script is turned into a P2WSH witness program:
---- ----
0 9592d601848d04b172905e0ddb0adde59f1590f1e553ffc81ddc4b0ed927dd73 0 9592d601848d04b172905e0ddb0adde59f1590f1e553ffc81ddc4b0ed927dd73

View File

@ -384,8 +384,8 @@ https://bitcoinops.org/en/compatibility/#replace-by-fee-rbf
As a developer, if you plan to implement RBF fee bumping, you will first As a developer, if you plan to implement RBF fee bumping, you will first
need to implement the signaling specified in BIP125, which is a simple need to implement the signaling specified in BIP125, which is a simple
modification to any one of the nSequence fields in a transaction (see modification to any one of the sequence fields in a transaction (see
<<nsequence>>). <<sequence>>).
When you need to fee bump a transaction, you will simply create a new When you need to fee bump a transaction, you will simply create a new
transaction that spends at least one of the same UTXOs as the original transaction that spends at least one of the same UTXOs as the original
@ -727,11 +727,11 @@ higher than total fees per block. But at some point in the future,
transaction fees will be the majority of the reward (or even the transaction fees will be the majority of the reward (or even the
entirety of the reward). At that time, this scenario becomes inevitable. entirety of the reward). At that time, this scenario becomes inevitable.
Several wallets discourage fee sniping by creating transactions with an Several wallets discourage fee sniping by creating transactions with a
+nLocktime+ that limits those transactions to being included in the next lock time that limits those transactions to being included in the next
block or any later block. In our block or any later block. In our
scenario, our wallet would set +nLocktime+ to 100,001 on any scenario, our wallet would set lock time to 100,001 on any
transaction it created. Under normal circumstances, this +nLocktime+ has transaction it created. Under normal circumstances, this lock time has
no effect&#x2014;the transactions could only be included in block no effect&#x2014;the transactions could only be included in block
#100,001 anyway; it's the next block. #100,001 anyway; it's the next block.
@ -745,7 +745,7 @@ This does not entirely prevent fee sniping, but it does make it less
profitable in some cases and so can help preserve the stability of the profitable in some cases and so can help preserve the stability of the
Bitcoin network as the block subsidy declines. We recommend all wallets Bitcoin network as the block subsidy declines. We recommend all wallets
implement anti fee sniping when it doesn't interfere with the wallet's implement anti fee sniping when it doesn't interfere with the wallet's
other uses of the nLockTime field. other uses of the lock time field.
As Bitcoin continues to mature, and as the subsidy continues to decline, As Bitcoin continues to mature, and as the subsidy continues to decline,
fees become more and more important to Bitcoin users, both in their fees become more and more important to Bitcoin users, both in their

View File

@ -186,8 +186,8 @@ different subsets of the data in the transaction. By including the
[NOTE] [NOTE]
==== ====
All +SIGHASH+ types sign the transaction +nLocktime+ field (see All +SIGHASH+ types sign the transaction lock time field (see
<<nlocktime>>). In addition, the +SIGHASH+ type <<lock_time>>). In addition, the +SIGHASH+ type
itself is appended to the transaction before it is signed, so that it itself is appended to the transaction before it is signed, so that it
can't be modified once signed. can't be modified once signed.
==== ====
@ -219,7 +219,7 @@ even if they haven't reached the specified value.
+NONE+ :: This construction can be used to create a "bearer check" or +NONE+ :: This construction can be used to create a "bearer check" or
"blank check" of a specific amount. It commits to the input, but allows "blank check" of a specific amount. It commits to the input, but allows
the output script to be changed. Anyone can write their own the output script to be changed. Anyone can write their own
Bitcoin address into the output scriptPubKey. However, the output value Bitcoin address into the output script. However, the output value
itself cannot be changed. By itself, this allows any miner to change itself cannot be changed. By itself, this allows any miner to change
the output destination and claim the funds for themselves, but if other the output destination and claim the funds for themselves, but if other
required signatures in the transaction use +SIGHASH_ALL+ or another type required signatures in the transaction use +SIGHASH_ALL+ or another type

View File

@ -83,7 +83,7 @@ in the transaction and describe any additional fields that they contain.
.A byte map of Alice's transaction .A byte map of Alice's transaction
image::../images/tx-map-1.png["A byte map of Alice's transaction"] image::../images/tx-map-1.png["A byte map of Alice's transaction"]
[[nVersion]] [[version]]
=== Version === Version
The first four bytes of a serialized Bitcoin transaction are its The first four bytes of a serialized Bitcoin transaction are its
@ -94,7 +94,7 @@ described throughout this book.
Version 2 Bitcoin transactions were introduced in the BIP68 soft fork Version 2 Bitcoin transactions were introduced in the BIP68 soft fork
change to Bitcoin's consensus rules. BIP68 places additional change to Bitcoin's consensus rules. BIP68 places additional
constraints on the nSequence field, but those constraints only apply to constraints on the sequence field, but those constraints only apply to
transactions with version 2 or higher. Version 1 transactions are transactions with version 2 or higher. Version 1 transactions are
unaffected. BIP112, which was part of the same soft fork as BIP68, unaffected. BIP112, which was part of the same soft fork as BIP68,
upgraded an opcode (OP_CHECKSEQUENCEVERIFY) which will now fail if it is upgraded an opcode (OP_CHECKSEQUENCEVERIFY) which will now fail if it is
@ -116,7 +116,7 @@ Network, depend on pre-signed transactions.
This creates a challenge for protocol developers when they assist users This creates a challenge for protocol developers when they assist users
in upgrading the Bitcoin consensus protocol. Adding new in upgrading the Bitcoin consensus protocol. Adding new
constraints--such as BIP68 did to the nSequence field--may invalidate constraints--such as BIP68 did to the sequence field--may invalidate
some pre-signed transactions. If there's no way to create a new some pre-signed transactions. If there's no way to create a new
signature for an equivalent transaction, then the money being spent in signature for an equivalent transaction, then the money being spent in
the pre-signed transaction is permanently lost. the pre-signed transaction is permanently lost.
@ -125,7 +125,7 @@ This problem is solved by reserving some transaction features for
upgrades, such as version numbers. Anyone creating pre-signed upgrades, such as version numbers. Anyone creating pre-signed
transactions prior to BIP68 should have been using version 1 transactions prior to BIP68 should have been using version 1
transactions, so only applying BIP68's additional constraints on transactions, so only applying BIP68's additional constraints on
nSequence to transactions v2 or higher should not invalidate any sequence to transactions v2 or higher should not invalidate any
pre-signed transactions. pre-signed transactions.
If you implement a protocol that uses pre-signed transactions, ensure If you implement a protocol that uses pre-signed transactions, ensure
@ -150,8 +150,8 @@ part of the Segregated Witness (segwit) soft fork change to Bitcoin's
consensus rules. The rules were changed according to BIPs 141 and 143, consensus rules. The rules were changed according to BIPs 141 and 143,
but the _extended serialization format_ is defined in BIP144. but the _extended serialization format_ is defined in BIP144.
If the transaction includes a witness field (which we'll describe in If the transaction includes a witness structure (which we'll describe in
<<witnesses>>), the marker must be zero (0x00) and the flag must be <<witness_structure>>), the marker must be zero (0x00) and the flag must be
non-zero. In the current P2P protocol, the flag should always be one non-zero. In the current P2P protocol, the flag should always be one
(0x01); alternative flags are reserved for later protocol upgrades. (0x01); alternative flags are reserved for later protocol upgrades.
@ -177,9 +177,9 @@ map of those bytes in <<alice_tx_input_map>>.
.Map of bytes in the input field of Alice's transaction .Map of bytes in the input field of Alice's transaction
image::../images/input-byte-map.png["map of bytes in the input field of Alice's transaction"] image::../images/input-byte-map.png["map of bytes in the input field of Alice's transaction"]
==== Inputs Count ==== Length of transaction input list
The input field starts with an integer indicating the number of inputs The transaction input list starts with an integer indicating the number of inputs
in the transaction. The minimum value is one. There's no explicit in the transaction. The minimum value is one. There's no explicit
maximum value, but restrictions on the maximum size of a transaction maximum value, but restrictions on the maximum size of a transaction
effectively limit transactions to a few thousand inputs. The number is effectively limit transactions to a few thousand inputs. The number is
@ -210,7 +210,8 @@ For numbers from 0 to 252, compactSize unsigned integers are identical
to the C-language data type +uint8_t+, which is probably the native to the C-language data type +uint8_t+, which is probably the native
encoding familiar to any programmer. For other numbers up to encoding familiar to any programmer. For other numbers up to
0xffffffffffffffff, a byte is prefixed to the number to indicate its 0xffffffffffffffff, a byte is prefixed to the number to indicate its
length—but otherwise the numbers look like regular unsigned integers. length—but otherwise the numbers look like regular C-language encoded
unsigned integers.
[cols="1,1,1"] [cols="1,1,1"]
|=== |===
@ -226,9 +227,9 @@ Each input in a transaction must contain three fields:
- An _outpoint_ field - An _outpoint_ field
- A length-prefixed _scriptSig_ field - A length-prefixed _input script_ field
- An _nSequence_ - A _sequence_
We'll look at each of those fields in the following sections. Some We'll look at each of those fields in the following sections. Some
inputs also include a witness, but this is serialized at the end of a inputs also include a witness, but this is serialized at the end of a
@ -252,7 +253,7 @@ This txid is in Bitcoin's internal byte order for hashes, see
Because transactions may contain multiple outputs, Alice also needs to Because transactions may contain multiple outputs, Alice also needs to
identify which particular output from that transaction to use, called identify which particular output from that transaction to use, called
its output vector (_vout_). Output vectors are four-byte unsigned its _output index_. Output indices are four-byte unsigned
integers indexed from zero. integers indexed from zero.
When a full node encounters an outpoint, it uses that information to When a full node encounters an outpoint, it uses that information to
@ -348,14 +349,14 @@ _little-endian byte order_ for the internal version and _big-endian byte
order_ for the display version. order_ for the display version.
**** ****
==== ScriptSig ==== Input script
The scriptSig field is a remnant of the legacy transaction format. Our The input script field is a remnant of the legacy transaction format. Our
example transaction input spends a native segwit output which doesn't example transaction input spends a native segwit output which doesn't
require any data in the scriptSig, so the length prefix for the require any data in the input script, so the length prefix for the
scriptSig is set to zero (0x00). input script is set to zero (0x00).
For an example of a length-prefixed scriptSig that spends a legacy For an example of a length-prefixed input script that spends a legacy
output, we use one from an arbitrary transaction in the most recent output, we use one from an arbitrary transaction in the most recent
block as of this writing: block as of this writing:
@ -367,23 +368,23 @@ fa2580bb664b020220366060ea8203d766722ed0a02d1599b99d3c95b97dab8e
---- ----
The length prefix is a compactSize unsigned integer indicating the The length prefix is a compactSize unsigned integer indicating the
length of the serialized scriptSig field. In this case, it's a single length of the serialized input script field. In this case, it's a single
byte (0x6b) indicating the scriptSig is 107 bytes. We'll cover parsing byte (0x6b) indicating the input script is 107 bytes. We'll cover parsing
and using scripts in detail in the next chapter, and using scripts in detail in the next chapter,
<<c_authorization_authentication>>. <<c_authorization_authentication>>.
[[nsequence]] [[sequence]]
==== nSequence ==== Sequence
The final four bytes of an input are its sequence number, called The final four bytes of an input are its _sequence_ number.
_nSequence_. The use and meaning of this field has changed over time. The use and meaning of this field has changed over time.
[[original_tx_replacement]] [[original_tx_replacement]]
===== Original nSequence-based Transaction Replacement ===== Original Sequence-Based Transaction Replacement
The +nSequence+ field was originally intended to allow creation of The sequence field was originally intended to allow creation of
multiple versions of the same transaction, with later versions replacing multiple versions of the same transaction, with later versions replacing
earlier versions as candidates for confirmation. The nSequence number earlier versions as candidates for confirmation. The sequence number
tracked the version of the transaction. tracked the version of the transaction.
For example, imagine Alice and Bob want to bet on a game of cards. They For example, imagine Alice and Bob want to bet on a game of cards. They
@ -399,27 +400,27 @@ output:
the transaction at this time. They only need it if there's a problem. the transaction at this time. They only need it if there's a problem.
- Alice wins the first round of the card game, so the second version of - Alice wins the first round of the card game, so the second version of
the transaction, with nSequence 1, increases the amount of money paid the transaction, with sequence 1, increases the amount of money paid
to Alice and decreases Bob's share. They both sign the updated to Alice and decreases Bob's share. They both sign the updated
transaction. Again, they don't need to broadcast this version of the transaction. Again, they don't need to broadcast this version of the
transaction unless there's a problem. transaction unless there's a problem.
- Bob wins the second round, so the nSequence is incremented to 2, - Bob wins the second round, so the sequence is incremented to 2,
Alice's share is decreased, and Bob's share is increased. They again Alice's share is decreased, and Bob's share is increased. They again
sign but don't broadcast. sign but don't broadcast.
- After many more rounds where the nSequence is incremented, the - After many more rounds where the sequence is incremented, the
funds redistributed, and the resulting transaction is signed but not funds redistributed, and the resulting transaction is signed but not
broadcast, they decide to finalize the transaction. Creating a broadcast, they decide to finalize the transaction. Creating a
transaction with the final balance of funds, they set nSequence to its transaction with the final balance of funds, they set sequence to its
maximum value (0xffffffff), finalizing the transaction. They broadcast maximum value (0xffffffff), finalizing the transaction. They broadcast
this version of the transaction, it's relayed across the network, and this version of the transaction, it's relayed across the network, and
eventually confirmed by miners. eventually confirmed by miners.
We can see the replacement rules for nSequence at work if we consider We can see the replacement rules for sequence at work if we consider
alternative scenarios: alternative scenarios:
- Imagine that Alice broadcasts the final transaction, with an nSequence of - Imagine that Alice broadcasts the final transaction, with a sequence of
0xffffffff, and then Bob broadcasts one of the earlier transactions 0xffffffff, and then Bob broadcasts one of the earlier transactions
where his balance was higher. Because Bob's version of the where his balance was higher. Because Bob's version of the
transaction has a lower sequence number, full nodes using the original transaction has a lower sequence number, full nodes using the original
@ -429,7 +430,7 @@ alternative scenarios:
- In another scenario, imagine that Bob broadcasts an earlier version of - In another scenario, imagine that Bob broadcasts an earlier version of
the transaction a few seconds before Alice broadcasts the final the transaction a few seconds before Alice broadcasts the final
version. Nodes will relay Bob's version and miners will attempt to version. Nodes will relay Bob's version and miners will attempt to
mine it, but when Alice's version with its higher nSequence number mine it, but when Alice's version with its higher sequence number
arrives, nodes will also relay it and miners using the original arrives, nodes will also relay it and miners using the original
Bitcoin code will try to mine it instead of Bob's version. Unless Bob Bitcoin code will try to mine it instead of Bob's version. Unless Bob
got lucky and a block was discovered before Alice's version arrived, got lucky and a block was discovered before Alice's version arrived,
@ -442,7 +443,7 @@ the protocol to support them. We'll learn about several of those other
features later and also discover how modern versions of payment channels features later and also discover how modern versions of payment channels
are increasingly being used in Bitcoin today. are increasingly being used in Bitcoin today.
There were a few problems with purely nSequence-based payment channels. There were a few problems with purely sequence-based payment channels.
The first was that the rules for replacing a lower-sequence transaction The first was that the rules for replacing a lower-sequence transaction
with a higher-sequence transaction were only a matter of software with a higher-sequence transaction were only a matter of software
policy. There was no direct incentive for miners to prefer one version policy. There was no direct incentive for miners to prefer one version
@ -465,27 +466,27 @@ need to pay any costs for the enormous burden they placed on full node
operators. operators.
To eliminate the risk of this attack, the original type of To eliminate the risk of this attack, the original type of
nSequence-based transaction replacement was disabled in an early version sequence-based transaction replacement was disabled in an early version
of the Bitcoin software. For several years, Bitcoin full nodes would of the Bitcoin software. For several years, Bitcoin full nodes would
not allow an unconfirmed transaction containing a particular input (as not allow an unconfirmed transaction containing a particular input (as
indicated by its outpoint) to be replaced by a different transaction indicated by its outpoint) to be replaced by a different transaction
containing the same input. However, that situation didn't last forever. containing the same input. However, that situation didn't last forever.
[[nsequence-bip125]] [[sequence-bip125]]
===== Opt-in Transaction Replacement Signaling ===== Opt-in Transaction Replacement Signaling
After the original nSequence-based transaction replacement was disabled After the original sequence-based transaction replacement was disabled
due to the potential for abuse, a solution was proposed: programming due to the potential for abuse, a solution was proposed: programming
Bitcoin Core and other relaying full node software to allow a Bitcoin Core and other relaying full node software to allow a
transaction that paid a higher transaction fee rate to replace a transaction that paid a higher transaction fee rate to replace a
conflicting transaction that paid a lower fee rate. This is called conflicting transaction that paid a lower fee rate. This is called
_Replace-By-Fee_, or _RBF_ for short. Some users and businesses _Replace-By-Fee_, or _RBF_ for short. Some users and businesses
objected to adding support for transaction replacement back into Bitcoin objected to adding support for transaction replacement back into Bitcoin
Core, so a compromise was reached that once again used the nSequence Core, so a compromise was reached that once again used the sequence
field in support of replacement. field in support of replacement.
As documented in BIP125, an unconfirmed transaction with any input that As documented in BIP125, an unconfirmed transaction with any input that
has an nSequence set to a value below 0xfffffffe (i.e., at least 2 below has an sequence set to a value below 0xfffffffe (i.e., at least 2 below
the maximum value) signals to the network that its signer wants it to be the maximum value) signals to the network that its signer wants it to be
replaceable by a conflicting transaction paying a higher fee rate. replaceable by a conflicting transaction paying a higher fee rate.
Bitcoin Core allowed those unconfirmed transactions to be replaced and Bitcoin Core allowed those unconfirmed transactions to be replaced and
@ -495,56 +496,56 @@ ignore unconfirmed transactions containing the BIP125 signal until they
became confirmed. became confirmed.
There's more to modern transaction replacement policies than fee rates There's more to modern transaction replacement policies than fee rates
and nSequence signals, which we'll see in <<rbf>>. and sequence signals, which we'll see in <<rbf>>.
[[relative_timelocks]] [[relative_timelocks]]
===== nSequence as a consensus-enforced relative timelock ===== Sequence as a consensus-enforced relative timelock
In the <<nVersion>> section, we learned that the BIP68 soft fork added In the <<version>> section, we learned that the BIP68 soft fork added
a new constraint to transactions with version numbers 2 or higher. That a new constraint to transactions with version numbers 2 or higher. That
constraint applies to the nSequence field. constraint applies to the sequence field.
Transaction inputs with +nSequence+ values less than 2^31^ are Transaction inputs with sequence values less than 2^31^ are
interpreted as having a relative timelock. Such a transaction may only interpreted as having a relative timelock. Such a transaction may only
be included in the blockchain once the previous output (referenced by the be included in the blockchain once the previous output (referenced by the
outpoint) has aged by the relative timelock amount. For example, a outpoint) has aged by the relative timelock amount. For example, a
transaction with one input with a relative timelock of 30 blocks can transaction with one input with a relative timelock of 30 blocks can
only be confirmed after least 30 blocks have elapsed from the time the only be confirmed after least 30 blocks have elapsed from the time the
previous output was confirmed in a block on the current blockchain. previous output was confirmed in a block on the current blockchain.
Since +nSequence+ is a per-input field, a transaction may contain any Since sequence is a per-input field, a transaction may contain any
number of timelocked inputs, all of which must have sufficiently aged number of timelocked inputs, all of which must have sufficiently aged
for the transaction to be valid. A transaction can include both for the transaction to be valid. A transaction can include both
timelocked inputs (+nSequence+ < 2^31^) and inputs without a relative timelocked inputs (sequence < 2^31^) and inputs without a relative
timelock (+nSequence+ >= 2^31^). timelock (sequence >= 2^31^).
The +nSequence+ value is specified in either blocks or seconds. The sequence value is specified in either blocks or seconds.
A type-flag A type-flag
is used to differentiate between values counting blocks and values is used to differentiate between values counting blocks and values
counting time in seconds. The type-flag is set in the 23rd counting time in seconds. The type-flag is set in the 23rd
least-significant bit (i.e., value 1<<22). If the type-flag is set, then least-significant bit (i.e., value 1<<22). If the type-flag is set, then
the +nSequence+ value is interpreted as a multiple of 512 seconds. If the sequence value is interpreted as a multiple of 512 seconds. If
the type-flag is not set, the +nSequence+ value is interpreted as a the type-flag is not set, the sequence value is interpreted as a
number of blocks. number of blocks.
When interpreting +nSequence+ as a relative timelock, only the 16 least When interpreting sequence as a relative timelock, only the 16 least
significant bits are considered. Once the flags (bits 32 and 23) are significant bits are considered. Once the flags (bits 32 and 23) are
evaluated, the +nSequence+ value is usually "masked" with a 16-bit mask evaluated, the sequence value is usually "masked" with a 16-bit mask
(e.g., +nSequence+ & 0x0000FFFF). The multiple of 512 seconds is (e.g., +sequence+ & 0x0000FFFF). The multiple of 512 seconds is
roughly equal to the average amount of time between blocks, so the roughly equal to the average amount of time between blocks, so the
maximum relative timelock in both blocks and seconds from 16 bits maximum relative timelock in both blocks and seconds from 16 bits
(2^16^) is about one year. (2^16^) is about one year.
<<bip_68_def_of_nseq>> shows the binary layout of the +nSequence+ value, <<bip_68_def_of_nseq>> shows the binary layout of the sequence value,
as defined by BIP68. as defined by BIP68.
[[bip_68_def_of_nseq]] [[bip_68_def_of_nseq]]
.BIP68 definition of nSequence encoding (Source: BIP68) .BIP68 definition of sequence encoding (Source: BIP68)
image::../images/mbc2_0701.png["BIP68 definition of nSequence encoding"] image::../images/mbc2_0701.png["BIP68 definition of sequence encoding"]
Note that any transaction which sets a relative timelock using nSequence Note that any transaction which sets a relative timelock using sequence
also sends the signal for opt-in replace-by-fee as described in also sends the signal for opt-in replace-by-fee as described in
<<nsequence-bip125>>. <<sequence-bip125>>.
=== Outputs === Outputs
@ -566,10 +567,10 @@ transaction. It's a compactSize integer and must be greater than zero.
The example transaction has two outputs. The example transaction has two outputs.
==== nValue ==== Amount
The first field of a specific output is its value, also called The first field of a specific output is its _amount_, also called
_nValue_ in Bitcoin Core. This is an eight-byte signed integer indicating "value" in Bitcoin Core. This is an eight-byte signed integer indicating
the number of _satoshis_ to transfer. A satoshi is the smallest unit of the number of _satoshis_ to transfer. A satoshi is the smallest unit of
bitcoin that can be represented in an onchain Bitcoin transaction. bitcoin that can be represented in an onchain Bitcoin transaction.
There are 100 million satoshis in a bitcoin. There are 100 million satoshis in a bitcoin.
@ -639,39 +640,39 @@ use Utreexo.
==== ====
Bitcoin Core's policy rules about dust do have one exception: output Bitcoin Core's policy rules about dust do have one exception: output
scriptPubKeys starting with +OP_RETURN+, called _data carrier outputs_, scripts starting with +OP_RETURN+, called _data carrier outputs_,
can have a value of zero. The OP_RETURN opcode causes the script to can have a value of zero. The OP_RETURN opcode causes the script to
immediately fail no matter what comes after it, so these outputs can immediately fail no matter what comes after it, so these outputs can
never be spent. That means full nodes don't need to keep track of them, never be spent. That means full nodes don't need to keep track of them,
a feature Bitcoin Core takes advantage of to allow users to store small a feature Bitcoin Core takes advantage of to allow users to store small
amounts of arbitrary data in the blockchain without increasing the size amounts of arbitrary data in the blockchain without increasing the size
of its UTXO database. Since the outputs are unspendable, they aren't of its UTXO database. Since the outputs are unspendable, they aren't
uneconomical--any satoshis in nValue assigned to them becomes uneconomical--any satoshis assigned to them becomes
permanently unspendable--so allowing the nValue to be zero ensures permanently unspendable--so allowing the amount to be zero ensures
satoshis aren't being destroyed. satoshis aren't being destroyed.
==== ScriptPubKey ==== Output scripts
The output amount is followed by a compactSize integer indicating the The output amount is followed by a compactSize integer indicating the
length of the output's _scriptPubKey_, the script that contains the length of the _output script_, the script that contains the
conditions which will need to be fulfilled in order to spend the conditions which will need to be fulfilled in order to spend the
bitcoins, the _spending authorization_. According to Bitcoin's bitcoins, the _spending authorization_. According to Bitcoin's
consensus rules, the minimum size of a scriptPubKey is zero. consensus rules, the minimum size of an output script is zero.
The consensus maximum allowed size of a scriptPubKey varies depending on The consensus maximum allowed size of an outputs script varies depending on
when it's being checked. There's no explicit limit on the size of a when it's being checked. There's no explicit limit on the size of an
scriptPubKey in the output of a transaction, but a later transaction can output script in the output of a transaction, but a later transaction can
only spend a previous output with a scriptPubKey of 10,000 bytes or only spend a previous output with a script of 10,000 bytes or
smaller. Implicitly, a scriptPubKey can be almost as large as the smaller. Implicitly, an output script can be almost as large as the
transaction containing it, and a transaction can be almost as large as transaction containing it, and a transaction can be almost as large as
the block containing it. the block containing it.
[[anyone-can-spend]] [[anyone-can-spend]]
[TIP] [TIP]
==== ====
A scriptPubKey with zero length can be spent by a scriptSig containing An output script with zero length can be spent by a input script containing
OP_TRUE. Anyone can create that scriptSig, which means anyone OP_TRUE. Anyone can create that input script, which means anyone
can spend an empty scriptPubKey. There are an essentially unlimited can spend an empty output script. There are an essentially unlimited
number of scripts which anyone can spend and they are known to Bitcoin number of scripts which anyone can spend and they are known to Bitcoin
protocol developers as _anyone can spends_. Upgrades to Bitcoin's protocol developers as _anyone can spends_. Upgrades to Bitcoin's
script language often take an existing anyone-can-spend script and add script language often take an existing anyone-can-spend script and add
@ -683,7 +684,7 @@ future upgrades don't accidentally interfere with your system.
==== ====
Bitcoin Core's policy for relaying and mining transactions effectively Bitcoin Core's policy for relaying and mining transactions effectively
limits scriptPubKeys to just a few templates, called _standard limits output scripts to just a few templates, called _standard
transaction outputs_. This was originally implemented after the transaction outputs_. This was originally implemented after the
discovery of several early bugs in Bitcoin related to the Script discovery of several early bugs in Bitcoin related to the Script
language and is retained in modern Bitcoin Core to support language and is retained in modern Bitcoin Core to support
@ -694,8 +695,8 @@ segwit v2 (taproot) tapscripts.
We'll look at each of the current standard transaction templates and We'll look at each of the current standard transaction templates and
learn how to parse scripts in <<c_authorization_authentication>>. learn how to parse scripts in <<c_authorization_authentication>>.
[[witnesses]] [[witness_structure]]
=== Witnesses === Witness structure
In court, a witness is someone who testifies that they saw something In court, a witness is someone who testifies that they saw something
important happen. Human witnesses aren't always reliable, so courts important happen. Human witnesses aren't always reliable, so courts
@ -743,10 +744,10 @@ Witnesses, the values used to solve the math problems that protect
bitcoins, need to be included in the transactions where they're used in bitcoins, need to be included in the transactions where they're used in
order for full nodes to verify them. In the legacy transaction format order for full nodes to verify them. In the legacy transaction format
used for all early Bitcoin transactions, signatures and other data are used for all early Bitcoin transactions, signatures and other data are
placed in the scriptSig field. However, when developers started to placed in the input script field. However, when developers started to
implement contract protocols on Bitcoin, such as we saw in implement contract protocols on Bitcoin, such as we saw in
<<original_tx_replacement>>, they discovered several significant <<original_tx_replacement>>, they discovered several significant
problems with placing witnesses in the scriptSig field. problems with placing witnesses in the input script field.
==== Circular Dependencies ==== Circular Dependencies
@ -758,7 +759,7 @@ other person becomes unresponsive. A simple solution is to sign
transactions out of order. transactions out of order.
- Tx~0~ pays money from Alice and money from Bob into an output with a - Tx~0~ pays money from Alice and money from Bob into an output with a
scriptPubKey that requries signatures from both Alice and Bob to spend script that requries signatures from both Alice and Bob to spend
- Tx~1~ spends the previous output to two outputs, one refunding Alice - Tx~1~ spends the previous output to two outputs, one refunding Alice
her money and one refunding Bob his money (minus a small amount for her money and one refunding Bob his money (minus a small amount for
@ -770,7 +771,7 @@ transactions out of order.
protocol_. protocol_.
A problem with this construction in the legacy transaction format is A problem with this construction in the legacy transaction format is
that every field, including the scriptSig field which contains that every field, including the input script field which contains
signatures, is used to build a transaction's identifier (txid). The signatures, is used to build a transaction's identifier (txid). The
txid for Tx~0~ is part of the input's outpoint in Tx~1~. That means txid for Tx~0~ is part of the input's outpoint in Tx~1~. That means
there's no way for Alice and Bob to construct Tx~1~ until both there's no way for Alice and Bob to construct Tx~1~ until both
@ -784,13 +785,13 @@ _circular dependency_.
A more complex series of transactions can sometimes eliminate a circular A more complex series of transactions can sometimes eliminate a circular
dependency, but many protocols will then encounter a new concern: it's dependency, but many protocols will then encounter a new concern: it's
often possible to solve the same script in different ways. For example, often possible to solve the same script in different ways. For example,
consider our simple script from <<witnesses>>: consider our simple script from <<witness_structure>>:
---- ----
2 OP_ADD 4 OP_EQUAL 2 OP_ADD 4 OP_EQUAL
---- ----
We can make this script pass by providing the value _2_ in a scriptSig, We can make this script pass by providing the value _2_ in a input script,
but there are several ways to put that value on the stack in Bitcoin. but there are several ways to put that value on the stack in Bitcoin.
Here are just a few: Here are just a few:
@ -811,7 +812,7 @@ OP_PUSHDATA4 0x000000020002
... ...
---- ----
Each alternative encoding of the number _2_ in a scriptSig will produce Each alternative encoding of the number _2_ in an input script will produce
a slightly different transaction with a completely different txid. Each a slightly different transaction with a completely different txid. Each
different version of the transaction spends the same inputs (outpoints) different version of the transaction spends the same inputs (outpoints)
as every other version of the transaction, making them all _conflict_ as every other version of the transaction, making them all _conflict_
@ -819,7 +820,7 @@ with each other. Only one version of a set of conflicting transactions
can be contained within a valid blockchain. can be contained within a valid blockchain.
Imagine Alice creates one version of the transaction with +OP_2+ in the Imagine Alice creates one version of the transaction with +OP_2+ in the
scriptSig and an output that pays Bob. Bob then immediately spends that input script and an output that pays Bob. Bob then immediately spends that
output to Carol. Anyone on the network can replace +OP_2+ with output to Carol. Anyone on the network can replace +OP_2+ with
+OP_PUSH1 0x02+, creating a conflict with Alice's original version. If +OP_PUSH1 0x02+, creating a conflict with Alice's original version. If
that conflicting transaction is confirmed, then there's no way to that conflicting transaction is confirmed, then there's no way to
@ -855,7 +856,7 @@ that person could generate alternative signatures and so change the txid.
For example, Alice and Bob have deposited their money into a script For example, Alice and Bob have deposited their money into a script
requiring a signature from both of them to spend. They've also created requiring a signature from both of them to spend. They've also created
a refund transaction that allows each of the to get their money back at a refund transaction that allows each of them to get their money back at
any time. Alice decides she wants to spend just some of the any time. Alice decides she wants to spend just some of the
money, so she cooperates with Bob to create a chain of transactions. money, so she cooperates with Bob to create a chain of transactions.
@ -892,9 +893,9 @@ mutation is called _unwanted second-party transaction malleability_.
As early as https://bitcointalk.org/index.php?topic=40627.msg494697[2011], As early as https://bitcointalk.org/index.php?topic=40627.msg494697[2011],
protocol developers knew how to solve the problems of circular protocol developers knew how to solve the problems of circular
dependence, third-party malleability, and second-party malleability. The dependence, third-party malleability, and second-party malleability. The
idea was to avoid including the scriptSig in the calculation that idea was to avoid including the input script in the calculation that
produces a transaction's txid. Recall that an abstract name for the data produces a transaction's txid. Recall that an abstract name for the data
held by a scriptSig is a _witness_. The idea of separating the rest of held by a input script is a _witness_. The idea of separating the rest of
the data in a transaction from its witness for the purpose of generating the data in a transaction from its witness for the purpose of generating
a txid is called _segregated witness_ (segwit). a txid is called _segregated witness_ (segwit).
@ -915,28 +916,28 @@ explore the details of upgrading Bitcoin's consensus rules in
<<mining>>). <<mining>>).
The soft fork segwit approach is based on anyone-can-spend The soft fork segwit approach is based on anyone-can-spend
scriptPubKeys. A script which starts with any of the numbers 0 to 16 output scripts. A script which starts with any of the numbers 0 to 16
and followed by 2 to 40 bytes of data is defined as a segwit and followed by 2 to 40 bytes of data is defined as a segwit
scriptPubKey template. The number indicates its version (e.g. 0 is output script template. The number indicates its version (e.g. 0 is
segwit version 0, or _segwit v0_). The data is called a _native witness segwit version 0, or _segwit v0_). The data is called a _native witness
program_. It's also possible to wrap the segwit template in a P2SH program_. It's also possible to wrap the segwit template in a P2SH
commitment, called a _P2SH witness program_, but we won't deal with that commitment, called a _P2SH witness program_, but we won't deal with that
here. here.
From the perspective of old nodes, these scriptPubKey templates can be From the perspective of old nodes, these output script templates can be
spent with an empty scriptSig. From the perspective of a new node which spent with an empty input script. From the perspective of a new node which
is aware of the new segwit rules, any payment to a segwit scriptPubKey is aware of the new segwit rules, any payment to a segwit output script
template must only be spent with an empty scriptSig. Notice the template must only be spent with an empty input script. Notice the
difference here: old nodes _allow_ an empty scriptSig; new nodes difference here: old nodes _allow_ an empty input script; new nodes
_require_ an empty scriptSig. _require_ an empty input script.
An empty scriptSig keeps witnesses from affecting the txid, eliminating An empty input script keeps witnesses from affecting the txid, eliminating
circular dependencies, third-party transaction malleability, and circular dependencies, third-party transaction malleability, and
second-party transaction malleability. But, with no ability to put second-party transaction malleability. But, with no ability to put
data in a scriptSig, users of segwit scriptPubKey templates need a data in an input script, users of segwit output script templates need a
new field. That field is called the _witness_. new field. That field is called the _witness structure_.
The introduction of witnesses and witness programs complicates Bitcoin, The introduction of witness programs and the witness structure complicates Bitcoin,
but it follows an existing trend of increasing abstraction. Recall from but it follows an existing trend of increasing abstraction. Recall from
<<ch04_keys_addresses>> that the original Bitcoin whitepaper describes a system <<ch04_keys_addresses>> that the original Bitcoin whitepaper describes a system
where bitcoins were received to public keys (pubkeys) and spent with where bitcoins were received to public keys (pubkeys) and spent with
@ -945,50 +946,50 @@ the bitcoins (whoever controlled the corresponding private key) and the
signature provided _authentication_ that the spending transaction came signature provided _authentication_ that the spending transaction came
from someone who controlled the private key. To make that system more from someone who controlled the private key. To make that system more
flexible, the initial release of Bitcoin introduced scripts that allow flexible, the initial release of Bitcoin introduced scripts that allow
bitcoins to be received to scriptPubKeys and spent with scriptSigs. bitcoins to be received to output scripts and spent with input scripts.
Later experience with contract protocols inspired allowing bitcoins to Later experience with contract protocols inspired allowing bitcoins to
be received to witness programs and spent with witnesses. be received to witness programs and spent with the witness structure.
.Terms used for authorization and authentication data in different parts of Bitcoin .Terms used for authorization and authentication data in different parts of Bitcoin
[cols="1,1,1"] [cols="1,1,1"]
|=== |===
| | **Authorization** | **Authentication** | | **Authorization** | **Authentication**
| **Whitepaper** | Public key | Signature | **Whitepaper** | Public key | Signature
| **Original (Legacy)** | scriptPubKey | scriptSig | **Original (Legacy)** | Output script | Input script
| **Segwit** | Witness program | Witness | **Segwit** | Witness program | Witness structure
|=== |===
==== Witness Serialization ==== Witness Structure Serialization
Similar to the inputs and outputs fields, the witness field contains Similar to the inputs and outputs fields, the witness structure contains
several other fields, so we'll start with a map of those bytes from other fields, so we'll start with a map of those bytes from
Alice's transaction in <<alice_tx_witness_map>>: Alice's transaction in <<alice_tx_witness_map>>:
[[alice_tx_witness_map]] [[alice_tx_witness_map]]
.A byte map of the witness from Alice's transaction .A byte map of the witness structure from Alice's transaction
image::../images/witness-byte-map.png["A byte map of the witness from Alice's transaction"] image::../images/witness-byte-map.png["A byte map of the witness from Alice's transaction"]
Unlike the inputs and outputs fields, the overall witness field doesn't Unlike the inputs and outputs fields, the overall witness structure doesn't
start with any indication of the total number of elements it contains. start with any indication of the total number of witness stacks it contains.
Instead, this is implied by the inputs field--there's one witness Instead, this is implied by the inputs field--there's one witness
element for every input in a transaction. stack for every input in a transaction.
The witness field for a particular input does start with a count of the The witness structure for a particular input does start with a count of the
number of elements they contain. Those elements are called _stack number of elements they contain. Those elements are called _witness
items_. We'll explore them in detail in items_. We'll explore them in detail in
<<c_authorization_authentication>>, but for now we need to know that <<c_authorization_authentication>>, but for now we need to know that
each stack item is prefixed by a compactSize integer indicating its each witness item is prefixed by a compactSize integer indicating its
size. size.
Legacy inputs don't contain any witness stack items so their witness Legacy inputs don't contain any witness items so their witness stack
consists entirely of a count of zero (0x00). consists entirely of a count of zero (0x00).
Alice's transaction contains one input and one stack item. Alice's transaction contains one input and one stack item.
[[nlocktime]] [[lock_time]]
=== nLockTime === Lock Time
The final field in a serialized transaction is its _nLockTime_. This The final field in a serialized transaction is its lock time. This
field was part of Bitcoin's original serialization format but it was field was part of Bitcoin's original serialization format but it was
only initially enforced by Bitcoin's policy for choosing which only initially enforced by Bitcoin's policy for choosing which
transactions to mine. Bitcoin's earliest known soft fork added a rule transactions to mine. Bitcoin's earliest known soft fork added a rule
@ -996,21 +997,21 @@ that, starting at block height 31,000, forbid the inclusion of a
transaction in a block unless it satisfies one of the following rules: transaction in a block unless it satisfies one of the following rules:
- The transaction indicates that it should be eligible for inclusion in - The transaction indicates that it should be eligible for inclusion in
any block by setting its nLockTime to 0. any block by setting its lock time to 0.
- The transaction indicates that it wants to restrict which blocks it - The transaction indicates that it wants to restrict which blocks it
can be included in by setting its nLockTime to a value less than can be included in by setting its lock time to a value less than
500,000,000. In this case, the transaction can only be included in a 500,000,000. In this case, the transaction can only be included in a
block that has a height equal to the nLockTime or higher. For block that has a height equal to the lock time or higher. For
example, a transaction with an nLockTime of 123,456 can be included in example, a transaction with a lock time of 123,456 can be included in
block 123,456 or any later block. block 123,456 or any later block.
- The transaction indicates that it wants to restrict when it can be - The transaction indicates that it wants to restrict when it can be
included in the blockchain by setting its nLockTime to a value of included in the blockchain by setting its lock time to a value of
500,000,000 or greater. In this case, the field is parsed as epoch 500,000,000 or greater. In this case, the field is parsed as epoch
time (the number of seconds since 1970-01-01T00:00 UTC) and the time (the number of seconds since 1970-01-01T00:00 UTC) and the
transaction can only be included in a block with a _Median Time Past_ transaction can only be included in a block with a _Median Time Past_
(MTP) greater than the nLockTime. MTP is normally about an hour or (MTP) greater than the lock time. MTP is normally about an hour or
two behind the current time. The rules for MTP are described in two behind the current time. The rules for MTP are described in
<<mtp>>. <<mtp>>.
@ -1040,7 +1041,7 @@ Some of the special rules for coinbase transactions include:
which would (at the very least) be confusing given that the coinbase which would (at the very least) be confusing given that the coinbase
transaction spends fees and subsidy. transaction spends fees and subsidy.
- The field which would contain a scriptSig in a normal transaction is - The field which would contain a input script in a normal transaction is
called a _coinbase_. It's this field that gives the coinbase called a _coinbase_. It's this field that gives the coinbase
transaction its name. The coinbase field must be at least two bytes transaction its name. The coinbase field must be at least two bytes
and not longer than 100 bytes. This script is not executed but legacy and not longer than 100 bytes. This script is not executed but legacy
@ -1123,14 +1124,14 @@ creation of uneconomical outputs as described in
| Marker & Flag | 1 | 2 | Marker & Flag | 1 | 2
| Inputs Count | 4 | 4 | Inputs Count | 4 | 4
| Outpoint | 4 | 144 | Outpoint | 4 | 144
| scriptSig | 4 | 4 | Input script | 4 | 4
| nSequence | 4 | 16 | Sequence | 4 | 16
| Outputs Count | 4 | 4 | Outputs Count | 4 | 4
| nValue | 4 | 64 (2 outputs) | Amout | 4 | 64 (2 outputs)
| scriptPubKey | 4 | 232 (2 outputs with different scripts) | Output script | 4 | 232 (2 outputs with different scripts)
| Witness Count | 1 | 1 | Witness Count | 1 | 1
| Witnesses | 1 | 66 | Witness items | 1 | 66
| nLockTime | 4 | 16 | Lock time | 4 | 16
| **Total** | _N/A_ | **569** | **Total** | _N/A_ | **569**
|=== |===
@ -1162,13 +1163,13 @@ older format, called _legacy serialization_, must be used on the Bitcoin
P2P network for any transaction with an empty witness (which is only P2P network for any transaction with an empty witness (which is only
valid if the transaction doesn't spend any witness programs). valid if the transaction doesn't spend any witness programs).
Legacy serialization does not include the marker, flag, and witness Legacy serialization does not include the marker, flag, and witness structure
fields. fields.
In this chapter, we looked at each of the fields in a transaction and In this chapter, we looked at each of the fields in a transaction and
discovered how they communicate to full nodes the details about the discovered how they communicate to full nodes the details about the
bitcoins to be transferred between users. We only briefly looked at the bitcoins to be transferred between users. We only briefly looked at the
scriptPubKey, scriptSig, and witness fields that allow specifying and output script, input script, and witness structure that allow specifying and
satisfying conditions which restrict who can spend what bitcoins. satisfying conditions which restrict who can spend what bitcoins.
Understanding how to construct and use these conditions is essential to Understanding how to construct and use these conditions is essential to
ensuring that only Alice can spend her bitcoins, so they will be the ensuring that only Alice can spend her bitcoins, so they will be the

View File

@ -7,7 +7,7 @@ address::
A Bitcoin address looks like +1DSrfJdB2AnWaFNgSbv3MZC2m74996JafV+. It consists of a string of letters and numbers. It's really an encoded base58check version of a public key 160-bit hash. Just as you ask others to send an email to your email address, you would ask others to send you bitcoin to one of your Bitcoin addresses. A Bitcoin address looks like +1DSrfJdB2AnWaFNgSbv3MZC2m74996JafV+. It consists of a string of letters and numbers. It's really an encoded base58check version of a public key 160-bit hash. Just as you ask others to send an email to your email address, you would ask others to send you bitcoin to one of your Bitcoin addresses.
bip:: bip::
Bitcoin Improvement Proposals. A set of proposals that members of the bitcoin community have submitted to improve bitcoin. For example, BIP-21 is a proposal to improve the bitcoin uniform resource identifier (URI) scheme. Bitcoin Improvement Proposals. A set of proposals that members of the bitcoin community have submitted to improve bitcoin. For example, BIP21 is a proposal to improve the bitcoin uniform resource identifier (URI) scheme.
bitcoin:: bitcoin::
The name of the currency unit (the coin), the network, and the software. The name of the currency unit (the coin), the network, and the software.
@ -107,8 +107,8 @@ LevelDB::
Lightning Networks:: Lightning Networks::
Lightning Network is a proposed implementation of Hashed Timelock Contracts (HTLCs) with bi-directional payment channels which allows payments to be securely routed across multiple peer-to-peer payment channels. This allows the formation of a network where any peer on the network can pay any other peer even if they don't directly have a channel open between each other. Lightning Network is a proposed implementation of Hashed Timelock Contracts (HTLCs) with bi-directional payment channels which allows payments to be securely routed across multiple peer-to-peer payment channels. This allows the formation of a network where any peer on the network can pay any other peer even if they don't directly have a channel open between each other.
Locktime:: Lock time::
Locktime, or more technically nLockTime, is the part of a transaction which indicates the earliest time or earliest block when that transaction may be added to the block chain. Lock time is the part of a transaction which indicates the earliest time or earliest block when that transaction may be added to the block chain.
mempool:: mempool::
The bitcoin Mempool (memory pool) is a collection of all transaction data in a block that have been verified by Bitcoin nodes, but are not yet confirmed. The bitcoin Mempool (memory pool) is a collection of all transaction data in a block that have been verified by Bitcoin nodes, but are not yet confirmed.
@ -165,10 +165,10 @@ P2SH address::
P2SH addresses are Base58Check encodings of the 20-byte hash of a script, P2SH addresses use the version prefix "5", which results in Base58Check-encoded addresses that start with a "3". P2SH addresses hide all of the complexity, so that the person making a payment does not see the script. P2SH addresses are Base58Check encodings of the 20-byte hash of a script, P2SH addresses use the version prefix "5", which results in Base58Check-encoded addresses that start with a "3". P2SH addresses hide all of the complexity, so that the person making a payment does not see the script.
P2WPKH:: P2WPKH::
The signature of a P2WPKH (Pay-to-Witness-Public-Key-Hash) contains the same information as a P2PKH spending, but is located in the witness field instead of the scriptSig field. The scriptPubKey is also modified. The signature of a P2WPKH (Pay-to-Witness-Public-Key-Hash) contains the same information as a P2PKH spending, but is located in the witness structure instead of the input script. The output script is also modified.
P2WSH:: P2WSH::
The difference between P2SH and P2WSH (Pay-to-Witness-Script-Hash) is about the cryptographic proof location change from the scriptSig field to the witness field and the scriptPubKey that is also modified. The difference between P2SH and P2WSH (Pay-to-Witness-Script-Hash) is about the cryptographic proof location change from the input script to the witness structure and the output script that is also modified.
paper wallet:: paper wallet::
In the most specific sense, a paper wallet is a document containing all of the data necessary to generate any number of Bitcoin private keys, forming a wallet of keys. However, people often use the term to mean any way of storing bitcoin offline as a physical document. This second definition also includes paper keys and redeemable codes. In the most specific sense, a paper wallet is a document containing all of the data necessary to generate any number of Bitcoin private keys, forming a wallet of keys. However, people often use the term to mean any way of storing bitcoin offline as a physical document. This second definition also includes paper keys and redeemable codes.
@ -200,11 +200,11 @@ Satoshi Nakamoto::
Script:: Script::
Bitcoin uses a scripting system for transactions. Forth-like, Script is simple, stack-based, and processed from left to right. It is purposefully not Turing-complete, with no loops. Bitcoin uses a scripting system for transactions. Forth-like, Script is simple, stack-based, and processed from left to right. It is purposefully not Turing-complete, with no loops.
ScriptPubKey (aka pubkey script):: Output script::
ScriptPubKey or pubkey script, is a script included in outputs which sets the conditions that must be fulfilled for those satoshis to be spent. Data for fulfilling the conditions can be provided in a signature script. A script included in outputs which sets the conditions that must be fulfilled for those satoshis to be spent. Data for fulfilling the conditions can be provided in a signature script.
ScriptSig (aka signature script):: Input script::
ScriptSig or signature script, is the data generated by a spender which is almost always used as variables to satisfy a pubkey script. The data generated by a spender which is almost always used as variables to satisfy an output script.
secret key (aka private key):: secret key (aka private key)::
The secret number that unlocks bitcoin sent to the corresponding address. pass:[<span class="keep-together">A secret</span>] key looks like the following: The secret number that unlocks bitcoin sent to the corresponding address. pass:[<span class="keep-together">A secret</span>] key looks like the following:

Binary file not shown.

Before

Width:  |  Height:  |  Size: 13 KiB

After

Width:  |  Height:  |  Size: 15 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 17 KiB

After

Width:  |  Height:  |  Size: 16 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 18 KiB

After

Width:  |  Height:  |  Size: 18 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 14 KiB

After

Width:  |  Height:  |  Size: 15 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 9.1 KiB

After

Width:  |  Height:  |  Size: 9.4 KiB

View File

@ -46,9 +46,9 @@
== Chapter 7 == Chapter 7
* Time Locks * Time Locks
* Transaction level absolute (nLocktime) * Transaction level absolute lock time
* UTXO/Script level absolute (CHECKLOCKTIMEVERIFY) * UTXO/Script level absolute (CHECKLOCKTIMEVERIFY)
* Input level relative (nSequence) * Input level relative sequence
* UTXO/Script level relative (CHECKSEQUENCEVERIFY) * UTXO/Script level relative (CHECKSEQUENCEVERIFY)
* Median Time Past * Median Time Past
* Timelock defense against fee sniping * Timelock defense against fee sniping
@ -82,7 +82,7 @@
* Diverging hard forks * Diverging hard forks
* Soft forks for feature upgrades * Soft forks for feature upgrades
* Signaling soft forks with block version * Signaling soft forks with block version
* BIP-9 (versionbits) signaling and activation * BIP9 (versionbits) signaling and activation
* Consensus software development * Consensus software development
== Chapter 11 == Chapter 11

View File

@ -114,10 +114,10 @@ Bitcoin Addresses, Balances, and Other Abstractions
* Redeem Script and Validation * Redeem Script and Validation
* Data Recording Output (RETURN) * Data Recording Output (RETURN)
* Timelocks * Timelocks
* Transaction Locktime (nLocktime) * Transaction lock time
* Check Lock Time Verify (CLTV) * Check Lock Time Verify (CLTV)
* Relative Timelocks * Relative Timelocks
* Relative Timelocks with nSequence * Relative Timelocks with sequence
* Relative Timelocks with CSV * Relative Timelocks with CSV
* Median-Time-Past * Median-Time-Past
* Timelock Defense Against Fee Sniping * Timelock Defense Against Fee Sniping