Implementation of Zcash consensus checks.
More specifically, this crate implements semantic validity checks, as defined below.
Zebra’s implementation of the Zcash consensus rules is oriented around three telescoping notions of validity:
Structural Validity, or whether the format and structure of the object are valid. For instance, Sprout-on-BCTV14 proofs are not allowed in version 4 transactions, and a transaction with a spend or output description must include a binding signature.
Semantic Validity, or whether the object could potentially be valid, depending on the chain state. For instance, a transaction that spends a UTXO must supply a valid unlock script; a shielded transaction must have valid proofs, etc.
Contextual Validity, or whether a semantically valid transaction is actually valid in the context of a particular chain state. For instance, a transaction that spends a UTXO is only valid if the UTXO remains unspent; a shielded transaction spending some note must reveal a nullifier not already in the nullifier set, etc.
Structural validity is enforced by the definitions of data
zebra-chain. Semantic validity is enforced by the
code in this crate. Contextual validity is enforced in
zebra-state when objects are committed to the chain state.
- block 🔒Consensus-based block verification.
- Checkpoint-based block verification.
- Configuration for semantic verification which is run in parallel.
- Async Ed25519 batch verifier service
- Errors that can occur when checking consensus rules.
- Async Groth16 batch verifier service
- Async Halo2 batch verifier service
- The consensus parameters for each Zcash network.
- Asynchronous verification of cryptographic primitives.
- Async RedJubjub batch verifier service
- Async RedPallas batch verifier service
- Top-level semantic block verification for Zebra.
- script 🔒
- Asynchronous verification of transactions.
- A list of block height and hash checkpoints.
- The funding stream receiver categories.
- A request to the chain or block verifier
- The maximum allowed number of legacy signature check operations in a block.
- We limit the memory usage and download contention for each checkpoint, based on the cumulative size of the serialized blocks in the chain.
- We limit the maximum number of blocks in each checkpoint. Each block uses a constant amount of memory for the supporting data structures and futures.
- Return the address corresponding to given height, network and funding stream receiver.
- Return a human-readable name and a specification URL for the funding stream
- Returns the
fs.Value(height)for each stream receiver as described in protocol specification §7.8
- Returns the minimum height after the first halving as described in protocol specification §7.10
MinerSubsidy(height)as described in protocol specification §7.8
- Returns a new funding stream coinbase output lock script, which pays to the P2SH
- A boxed