|
/**
|
|
* @file
|
|
* @copyright defined in aergo/LICENSE.txt
|
|
*/
|
|
|
|
package trie
|
|
|
|
import (
|
|
"bytes"
|
|
)
|
|
|
|
// MerkleProof generates a Merke proof of inclusion or non-inclusion
|
|
// for the current trie root
|
|
// returns the audit path, bool (key included), key, value, error
|
|
// (key,value) can be 1- (nil, value), value of the included key, 2- the kv of a LeafNode
|
|
// on the path of the non-included key, 3- (nil, nil) for a non-included key
|
|
// with a DefaultLeaf on the path
|
|
func (s *Trie) MerkleProof(key []byte) ([][]byte, bool, []byte, []byte, error) {
|
|
s.lock.RLock()
|
|
defer s.lock.RUnlock()
|
|
s.atomicUpdate = false // so loadChildren doesnt return a copy
|
|
return s.merkleProof(s.Root, key, nil, s.TrieHeight, 0)
|
|
}
|
|
|
|
// MerkleProofPast generates a Merke proof of inclusion or non-inclusion
|
|
// for a given past trie root
|
|
// returns the audit path, bool (key included), key, value, error
|
|
// (key,value) can be 1- (nil, value), value of the included key, 2- the kv of a LeafNode
|
|
// on the path of the non-included key, 3- (nil, nil) for a non-included key
|
|
// with a DefaultLeaf on the path
|
|
func (s *Trie) MerkleProofR(key, root []byte) ([][]byte, bool, []byte, []byte, error) {
|
|
s.lock.RLock()
|
|
defer s.lock.RUnlock()
|
|
s.atomicUpdate = false // so loadChildren doesnt return a copy
|
|
return s.merkleProof(root, key, nil, s.TrieHeight, 0)
|
|
}
|
|
|
|
// MerkleProofCompressed returns a compressed merkle proof in the given trie
|
|
func (s *Trie) MerkleProofCompressedR(key, root []byte) ([]byte, [][]byte, int, bool, []byte, []byte, error) {
|
|
return s.merkleProofCompressed(key, root)
|
|
}
|
|
|
|
// MerkleProofCompressed returns a compressed merkle proof
|
|
func (s *Trie) MerkleProofCompressed(key []byte) ([]byte, [][]byte, int, bool, []byte, []byte, error) {
|
|
return s.merkleProofCompressed(key, s.Root)
|
|
}
|
|
|
|
func (s *Trie) merkleProofCompressed(key, root []byte) ([]byte, [][]byte, int, bool, []byte, []byte, error) {
|
|
s.lock.RLock()
|
|
defer s.lock.RUnlock()
|
|
s.atomicUpdate = false // so loadChildren doesnt return a copy
|
|
// create a regular merkle proof and then compress it
|
|
mpFull, included, proofKey, proofVal, err := s.merkleProof(root, key, nil, s.TrieHeight, 0)
|
|
if err != nil {
|
|
return nil, nil, 0, true, nil, nil, err
|
|
}
|
|
// the height of the shortcut in the tree will be needed for the proof verification
|
|
height := len(mpFull)
|
|
var mp [][]byte
|
|
bitmap := make([]byte, len(mpFull)/8+1)
|
|
for i, node := range mpFull {
|
|
if !bytes.Equal(node, DefaultLeaf) {
|
|
bitSet(bitmap, i)
|
|
mp = append(mp, node)
|
|
}
|
|
}
|
|
return bitmap, mp, height, included, proofKey, proofVal, nil
|
|
}
|
|
|
|
// merkleProof generates a Merke proof of inclusion or non-inclusion
|
|
// for a given trie root.
|
|
// returns the audit path, bool (key included), key, value, error
|
|
// (key,value) can be 1- (nil, value), value of the included key, 2- the kv of a LeafNode
|
|
// on the path of the non-included key, 3- (nil, nil) for a non-included key
|
|
// with a DefaultLeaf on the path
|
|
func (s *Trie) merkleProof(root, key []byte, batch [][]byte, height, iBatch int) ([][]byte, bool, []byte, []byte, error) {
|
|
if len(root) == 0 {
|
|
// proove that an empty subtree is on the path of the key
|
|
return nil, false, nil, nil, nil
|
|
}
|
|
// Fetch the children of the node
|
|
batch, iBatch, lnode, rnode, isShortcut, err := s.loadChildren(root, height, iBatch, batch)
|
|
if err != nil {
|
|
return nil, false, nil, nil, err
|
|
}
|
|
if isShortcut || height == 0 {
|
|
if bytes.Equal(lnode[:HashLength], key) {
|
|
// return the value so a call to trie.Get() is not needed.
|
|
return nil, true, nil, rnode[:HashLength], nil
|
|
}
|
|
// Return the proof of the leaf key that is on the path of the non included key
|
|
return nil, false, lnode[:HashLength], rnode[:HashLength], nil
|
|
}
|
|
|
|
// append the left or right node to the proof
|
|
if bitIsSet(key, s.TrieHeight-height) {
|
|
mp, included, proofKey, proofValue, err := s.merkleProof(rnode, key, batch, height-1, 2*iBatch+2)
|
|
if err != nil {
|
|
return nil, false, nil, nil, err
|
|
}
|
|
if len(lnode) != 0 {
|
|
return append(mp, lnode[:HashLength]), included, proofKey, proofValue, nil
|
|
} else {
|
|
return append(mp, DefaultLeaf), included, proofKey, proofValue, nil
|
|
}
|
|
|
|
}
|
|
mp, included, proofKey, proofValue, err := s.merkleProof(lnode, key, batch, height-1, 2*iBatch+1)
|
|
if err != nil {
|
|
return nil, false, nil, nil, err
|
|
}
|
|
if len(rnode) != 0 {
|
|
return append(mp, rnode[:HashLength]), included, proofKey, proofValue, nil
|
|
} else {
|
|
return append(mp, DefaultLeaf), included, proofKey, proofValue, nil
|
|
}
|
|
}
|
|
|
|
// VerifyInclusion verifies that key/value is included in the trie with latest root
|
|
func (s *Trie) VerifyInclusion(ap [][]byte, key, value []byte) bool {
|
|
leafHash := s.hash(key, value, []byte{byte(s.TrieHeight - len(ap))})
|
|
return bytes.Equal(s.Root, s.verifyInclusion(ap, 0, key, leafHash))
|
|
}
|
|
|
|
// VerifyInclusionWithRoot verifies that key/value is included in the trie with provided root
|
|
func (s *Trie) VerifyInclusionWithRoot(root []byte, ap [][]byte, key, value []byte) bool {
|
|
leafHash := s.hash(key, value, []byte{byte(s.TrieHeight - len(ap))})
|
|
return bytes.Equal(root, s.verifyInclusion(ap, 0, key, leafHash))
|
|
}
|
|
|
|
// verifyInclusion returns the merkle root by hashing the merkle proof items
|
|
func (s *Trie) verifyInclusion(ap [][]byte, keyIndex int, key, leafHash []byte) []byte {
|
|
if keyIndex == len(ap) {
|
|
return leafHash
|
|
}
|
|
if bitIsSet(key, keyIndex) {
|
|
return s.hash(ap[len(ap)-keyIndex-1], s.verifyInclusion(ap, keyIndex+1, key, leafHash))
|
|
}
|
|
return s.hash(s.verifyInclusion(ap, keyIndex+1, key, leafHash), ap[len(ap)-keyIndex-1])
|
|
}
|
|
|
|
// VerifyNonInclusion verifies a proof of non inclusion,
|
|
// Returns true if the non-inclusion is verified
|
|
func (s *Trie) VerifyNonInclusion(ap [][]byte, key, value, proofKey []byte) bool {
|
|
// Check if an empty subtree is on the key path
|
|
if len(proofKey) == 0 {
|
|
// return true if a DefaultLeaf in the key path is included in the trie
|
|
return bytes.Equal(s.Root, s.verifyInclusion(ap, 0, key, DefaultLeaf))
|
|
}
|
|
// Check if another kv leaf is on the key path in 2 steps
|
|
// 1- Check the proof leaf exists
|
|
if !s.VerifyInclusion(ap, proofKey, value) {
|
|
// the proof leaf is not included in the trie
|
|
return false
|
|
}
|
|
// 2- Check the proof leaf is on the key path
|
|
var b int
|
|
for b = 0; b < len(ap); b++ {
|
|
if bitIsSet(key, b) != bitIsSet(proofKey, b) {
|
|
// the proofKey leaf node is not on the path of the key
|
|
return false
|
|
}
|
|
}
|
|
// return true because we verified another leaf is on the key path
|
|
return true
|
|
}
|
|
|
|
// VerifyInclusionC verifies that key/value is included in the trie with latest root
|
|
func (s *Trie) VerifyInclusionC(bitmap, key, value []byte, ap [][]byte, length int) bool {
|
|
leafHash := s.hash(key, value, []byte{byte(s.TrieHeight - length)})
|
|
return bytes.Equal(s.Root, s.verifyInclusionC(bitmap, key, leafHash, ap, length, 0, 0))
|
|
}
|
|
|
|
// VerifyInclusionWithRootC verifies that key/value is included in the trie with latest root
|
|
func (s *Trie) VerifyInclusionWithRootC(root, bitmap, key, value []byte, ap [][]byte, length int) bool {
|
|
leafHash := s.hash(key, value, []byte{byte(s.TrieHeight - length)})
|
|
return bytes.Equal(root, s.verifyInclusionC(bitmap, key, leafHash, ap, length, 0, 0))
|
|
}
|
|
|
|
// verifyInclusionC returns the merkle root by hashing the merkle proof items
|
|
func (s *Trie) verifyInclusionC(bitmap, key, leafHash []byte, ap [][]byte, length, keyIndex, apIndex int) []byte {
|
|
if keyIndex == length {
|
|
return leafHash
|
|
}
|
|
if bitIsSet(key, keyIndex) {
|
|
if bitIsSet(bitmap, length-keyIndex-1) {
|
|
return s.hash(ap[len(ap)-apIndex-1], s.verifyInclusionC(bitmap, key, leafHash, ap, length, keyIndex+1, apIndex+1))
|
|
}
|
|
return s.hash(DefaultLeaf, s.verifyInclusionC(bitmap, key, leafHash, ap, length, keyIndex+1, apIndex))
|
|
|
|
}
|
|
if bitIsSet(bitmap, length-keyIndex-1) {
|
|
return s.hash(s.verifyInclusionC(bitmap, key, leafHash, ap, length, keyIndex+1, apIndex+1), ap[len(ap)-apIndex-1])
|
|
}
|
|
return s.hash(s.verifyInclusionC(bitmap, key, leafHash, ap, length, keyIndex+1, apIndex), DefaultLeaf)
|
|
}
|
|
|
|
// VerifyNonInclusionC verifies a proof of non inclusion,
|
|
// Returns true if the non-inclusion is verified
|
|
func (s *Trie) VerifyNonInclusionC(ap [][]byte, length int, bitmap, key, value, proofKey []byte) bool {
|
|
// Check if an empty subtree is on the key path
|
|
if len(proofKey) == 0 {
|
|
// return true if a DefaultLeaf in the key path is included in the trie
|
|
return bytes.Equal(s.Root, s.verifyInclusionC(bitmap, key, DefaultLeaf, ap, length, 0, 0))
|
|
}
|
|
// Check if another kv leaf is on the key path in 2 steps
|
|
// 1- Check the proof leaf exists
|
|
if !s.VerifyInclusionC(bitmap, proofKey, value, ap, length) {
|
|
// the proof leaf is not included in the trie
|
|
return false
|
|
}
|
|
// 2- Check the proof leaf is on the key path
|
|
var b int
|
|
for b = 0; b < length; b++ {
|
|
if bitIsSet(key, b) != bitIsSet(proofKey, b) {
|
|
// the proofKey leaf node is not on the path of the key
|
|
return false
|
|
}
|
|
}
|
|
// return true because we verified another leaf is on the key path
|
|
return true
|
|
}
|