proof.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582
  1. // Copyright 2015 The go-ethereum Authors
  2. // This file is part of the go-ethereum library.
  3. //
  4. // The go-ethereum library is free software: you can redistribute it and/or modify
  5. // it under the terms of the GNU Lesser General Public License as published by
  6. // the Free Software Foundation, either version 3 of the License, or
  7. // (at your option) any later version.
  8. //
  9. // The go-ethereum library is distributed in the hope that it will be useful,
  10. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  11. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  12. // GNU Lesser General Public License for more details.
  13. //
  14. // You should have received a copy of the GNU Lesser General Public License
  15. // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
  16. package trie
  17. import (
  18. "bytes"
  19. "errors"
  20. "fmt"
  21. "github.com/ethereum/go-ethereum/common"
  22. "github.com/ethereum/go-ethereum/ethdb"
  23. "github.com/ethereum/go-ethereum/ethdb/memorydb"
  24. "github.com/ethereum/go-ethereum/log"
  25. "github.com/ethereum/go-ethereum/rlp"
  26. )
  27. // Prove constructs a merkle proof for key. The result contains all encoded nodes
  28. // on the path to the value at key. The value itself is also included in the last
  29. // node and can be retrieved by verifying the proof.
  30. //
  31. // If the trie does not contain a value for key, the returned proof contains all
  32. // nodes of the longest existing prefix of the key (at least the root node), ending
  33. // with the node that proves the absence of the key.
  34. func (t *Trie) Prove(key []byte, fromLevel uint, proofDb ethdb.KeyValueWriter) error {
  35. // Collect all nodes on the path to key.
  36. key = keybytesToHex(key)
  37. var nodes []node
  38. tn := t.root
  39. for len(key) > 0 && tn != nil {
  40. switch n := tn.(type) {
  41. case *shortNode:
  42. if len(key) < len(n.Key) || !bytes.Equal(n.Key, key[:len(n.Key)]) {
  43. // The trie doesn't contain the key.
  44. tn = nil
  45. } else {
  46. tn = n.Val
  47. key = key[len(n.Key):]
  48. }
  49. nodes = append(nodes, n)
  50. case *fullNode:
  51. tn = n.Children[key[0]]
  52. key = key[1:]
  53. nodes = append(nodes, n)
  54. case hashNode:
  55. var err error
  56. tn, err = t.resolveHash(n, nil)
  57. if err != nil {
  58. log.Error(fmt.Sprintf("Unhandled trie error: %v", err))
  59. return err
  60. }
  61. default:
  62. panic(fmt.Sprintf("%T: invalid node: %v", tn, tn))
  63. }
  64. }
  65. hasher := newHasher(false)
  66. defer returnHasherToPool(hasher)
  67. for i, n := range nodes {
  68. if fromLevel > 0 {
  69. fromLevel--
  70. continue
  71. }
  72. var hn node
  73. n, hn = hasher.proofHash(n)
  74. if hash, ok := hn.(hashNode); ok || i == 0 {
  75. // If the node's database encoding is a hash (or is the
  76. // root node), it becomes a proof element.
  77. enc, _ := rlp.EncodeToBytes(n)
  78. if !ok {
  79. hash = hasher.hashData(enc)
  80. }
  81. proofDb.Put(hash, enc)
  82. }
  83. }
  84. return nil
  85. }
  86. // Prove constructs a merkle proof for key. The result contains all encoded nodes
  87. // on the path to the value at key. The value itself is also included in the last
  88. // node and can be retrieved by verifying the proof.
  89. //
  90. // If the trie does not contain a value for key, the returned proof contains all
  91. // nodes of the longest existing prefix of the key (at least the root node), ending
  92. // with the node that proves the absence of the key.
  93. func (t *SecureTrie) Prove(key []byte, fromLevel uint, proofDb ethdb.KeyValueWriter) error {
  94. return t.trie.Prove(key, fromLevel, proofDb)
  95. }
  96. // VerifyProof checks merkle proofs. The given proof must contain the value for
  97. // key in a trie with the given root hash. VerifyProof returns an error if the
  98. // proof contains invalid trie nodes or the wrong value.
  99. func VerifyProof(rootHash common.Hash, key []byte, proofDb ethdb.KeyValueReader) (value []byte, err error) {
  100. key = keybytesToHex(key)
  101. wantHash := rootHash
  102. for i := 0; ; i++ {
  103. buf, _ := proofDb.Get(wantHash[:])
  104. if buf == nil {
  105. return nil, fmt.Errorf("proof node %d (hash %064x) missing", i, wantHash)
  106. }
  107. n, err := decodeNode(wantHash[:], buf)
  108. if err != nil {
  109. return nil, fmt.Errorf("bad proof node %d: %v", i, err)
  110. }
  111. keyrest, cld := get(n, key, true)
  112. switch cld := cld.(type) {
  113. case nil:
  114. // The trie doesn't contain the key.
  115. return nil, nil
  116. case hashNode:
  117. key = keyrest
  118. copy(wantHash[:], cld)
  119. case valueNode:
  120. return cld, nil
  121. }
  122. }
  123. }
  124. // proofToPath converts a merkle proof to trie node path. The main purpose of
  125. // this function is recovering a node path from the merkle proof stream. All
  126. // necessary nodes will be resolved and leave the remaining as hashnode.
  127. //
  128. // The given edge proof is allowed to be an existent or non-existent proof.
  129. func proofToPath(rootHash common.Hash, root node, key []byte, proofDb ethdb.KeyValueReader, allowNonExistent bool) (node, []byte, error) {
  130. // resolveNode retrieves and resolves trie node from merkle proof stream
  131. resolveNode := func(hash common.Hash) (node, error) {
  132. buf, _ := proofDb.Get(hash[:])
  133. if buf == nil {
  134. return nil, fmt.Errorf("proof node (hash %064x) missing", hash)
  135. }
  136. n, err := decodeNode(hash[:], buf)
  137. if err != nil {
  138. return nil, fmt.Errorf("bad proof node %v", err)
  139. }
  140. return n, err
  141. }
  142. // If the root node is empty, resolve it first.
  143. // Root node must be included in the proof.
  144. if root == nil {
  145. n, err := resolveNode(rootHash)
  146. if err != nil {
  147. return nil, nil, err
  148. }
  149. root = n
  150. }
  151. var (
  152. err error
  153. child, parent node
  154. keyrest []byte
  155. valnode []byte
  156. )
  157. key, parent = keybytesToHex(key), root
  158. for {
  159. keyrest, child = get(parent, key, false)
  160. switch cld := child.(type) {
  161. case nil:
  162. // The trie doesn't contain the key. It's possible
  163. // the proof is a non-existing proof, but at least
  164. // we can prove all resolved nodes are correct, it's
  165. // enough for us to prove range.
  166. if allowNonExistent {
  167. return root, nil, nil
  168. }
  169. return nil, nil, errors.New("the node is not contained in trie")
  170. case *shortNode:
  171. key, parent = keyrest, child // Already resolved
  172. continue
  173. case *fullNode:
  174. key, parent = keyrest, child // Already resolved
  175. continue
  176. case hashNode:
  177. child, err = resolveNode(common.BytesToHash(cld))
  178. if err != nil {
  179. return nil, nil, err
  180. }
  181. case valueNode:
  182. valnode = cld
  183. }
  184. // Link the parent and child.
  185. switch pnode := parent.(type) {
  186. case *shortNode:
  187. pnode.Val = child
  188. case *fullNode:
  189. pnode.Children[key[0]] = child
  190. default:
  191. panic(fmt.Sprintf("%T: invalid node: %v", pnode, pnode))
  192. }
  193. if len(valnode) > 0 {
  194. return root, valnode, nil // The whole path is resolved
  195. }
  196. key, parent = keyrest, child
  197. }
  198. }
  199. // unsetInternal removes all internal node references(hashnode, embedded node).
  200. // It should be called after a trie is constructed with two edge paths. Also
  201. // the given boundary keys must be the one used to construct the edge paths.
  202. //
  203. // It's the key step for range proof. All visited nodes should be marked dirty
  204. // since the node content might be modified. Besides it can happen that some
  205. // fullnodes only have one child which is disallowed. But if the proof is valid,
  206. // the missing children will be filled, otherwise it will be thrown anyway.
  207. //
  208. // Note we have the assumption here the given boundary keys are different
  209. // and right is larger than left.
  210. func unsetInternal(n node, left []byte, right []byte) error {
  211. left, right = keybytesToHex(left), keybytesToHex(right)
  212. // Step down to the fork point. There are two scenarios can happen:
  213. // - the fork point is a shortnode: either the key of left proof or
  214. // right proof doesn't match with shortnode's key.
  215. // - the fork point is a fullnode: both two edge proofs are allowed
  216. // to point to a non-existent key.
  217. var (
  218. pos = 0
  219. parent node
  220. // fork indicator, 0 means no fork, -1 means proof is less, 1 means proof is greater
  221. shortForkLeft, shortForkRight int
  222. )
  223. findFork:
  224. for {
  225. switch rn := (n).(type) {
  226. case *shortNode:
  227. rn.flags = nodeFlag{dirty: true}
  228. // If either the key of left proof or right proof doesn't match with
  229. // shortnode, stop here and the forkpoint is the shortnode.
  230. if len(left)-pos < len(rn.Key) {
  231. shortForkLeft = bytes.Compare(left[pos:], rn.Key)
  232. } else {
  233. shortForkLeft = bytes.Compare(left[pos:pos+len(rn.Key)], rn.Key)
  234. }
  235. if len(right)-pos < len(rn.Key) {
  236. shortForkRight = bytes.Compare(right[pos:], rn.Key)
  237. } else {
  238. shortForkRight = bytes.Compare(right[pos:pos+len(rn.Key)], rn.Key)
  239. }
  240. if shortForkLeft != 0 || shortForkRight != 0 {
  241. break findFork
  242. }
  243. parent = n
  244. n, pos = rn.Val, pos+len(rn.Key)
  245. case *fullNode:
  246. rn.flags = nodeFlag{dirty: true}
  247. // If either the node pointed by left proof or right proof is nil,
  248. // stop here and the forkpoint is the fullnode.
  249. leftnode, rightnode := rn.Children[left[pos]], rn.Children[right[pos]]
  250. if leftnode == nil || rightnode == nil || leftnode != rightnode {
  251. break findFork
  252. }
  253. parent = n
  254. n, pos = rn.Children[left[pos]], pos+1
  255. default:
  256. panic(fmt.Sprintf("%T: invalid node: %v", n, n))
  257. }
  258. }
  259. switch rn := n.(type) {
  260. case *shortNode:
  261. // There can have these five scenarios:
  262. // - both proofs are less than the trie path => no valid range
  263. // - both proofs are greater than the trie path => no valid range
  264. // - left proof is less and right proof is greater => valid range, unset the shortnode entirely
  265. // - left proof points to the shortnode, but right proof is greater
  266. // - right proof points to the shortnode, but left proof is less
  267. if shortForkLeft == -1 && shortForkRight == -1 {
  268. return errors.New("empty range")
  269. }
  270. if shortForkLeft == 1 && shortForkRight == 1 {
  271. return errors.New("empty range")
  272. }
  273. if shortForkLeft != 0 && shortForkRight != 0 {
  274. parent.(*fullNode).Children[left[pos-1]] = nil
  275. return nil
  276. }
  277. // Only one proof points to non-existent key.
  278. if shortForkRight != 0 {
  279. // Unset left proof's path
  280. if _, ok := rn.Val.(valueNode); ok {
  281. parent.(*fullNode).Children[left[pos-1]] = nil
  282. return nil
  283. }
  284. return unset(rn, rn.Val, left[pos:], len(rn.Key), false)
  285. }
  286. if shortForkLeft != 0 {
  287. // Unset right proof's path.
  288. if _, ok := rn.Val.(valueNode); ok {
  289. parent.(*fullNode).Children[right[pos-1]] = nil
  290. return nil
  291. }
  292. return unset(rn, rn.Val, right[pos:], len(rn.Key), true)
  293. }
  294. return nil
  295. case *fullNode:
  296. // unset all internal nodes in the forkpoint
  297. for i := left[pos] + 1; i < right[pos]; i++ {
  298. rn.Children[i] = nil
  299. }
  300. if err := unset(rn, rn.Children[left[pos]], left[pos:], 1, false); err != nil {
  301. return err
  302. }
  303. if err := unset(rn, rn.Children[right[pos]], right[pos:], 1, true); err != nil {
  304. return err
  305. }
  306. return nil
  307. default:
  308. panic(fmt.Sprintf("%T: invalid node: %v", n, n))
  309. }
  310. }
  311. // unset removes all internal node references either the left most or right most.
  312. // It can meet these scenarios:
  313. //
  314. // - The given path is existent in the trie, unset the associated nodes with the
  315. // specific direction
  316. // - The given path is non-existent in the trie
  317. // - the fork point is a fullnode, the corresponding child pointed by path
  318. // is nil, return
  319. // - the fork point is a shortnode, the shortnode is included in the range,
  320. // keep the entire branch and return.
  321. // - the fork point is a shortnode, the shortnode is excluded in the range,
  322. // unset the entire branch.
  323. func unset(parent node, child node, key []byte, pos int, removeLeft bool) error {
  324. switch cld := child.(type) {
  325. case *fullNode:
  326. if removeLeft {
  327. for i := 0; i < int(key[pos]); i++ {
  328. cld.Children[i] = nil
  329. }
  330. cld.flags = nodeFlag{dirty: true}
  331. } else {
  332. for i := key[pos] + 1; i < 16; i++ {
  333. cld.Children[i] = nil
  334. }
  335. cld.flags = nodeFlag{dirty: true}
  336. }
  337. return unset(cld, cld.Children[key[pos]], key, pos+1, removeLeft)
  338. case *shortNode:
  339. if len(key[pos:]) < len(cld.Key) || !bytes.Equal(cld.Key, key[pos:pos+len(cld.Key)]) {
  340. // Find the fork point, it's an non-existent branch.
  341. if removeLeft {
  342. if bytes.Compare(cld.Key, key[pos:]) < 0 {
  343. // The key of fork shortnode is less than the path
  344. // (it belongs to the range), unset the entrie
  345. // branch. The parent must be a fullnode.
  346. fn := parent.(*fullNode)
  347. fn.Children[key[pos-1]] = nil
  348. } else {
  349. // The key of fork shortnode is greater than the
  350. // path(it doesn't belong to the range), keep
  351. // it with the cached hash available.
  352. }
  353. } else {
  354. if bytes.Compare(cld.Key, key[pos:]) > 0 {
  355. // The key of fork shortnode is greater than the
  356. // path(it belongs to the range), unset the entrie
  357. // branch. The parent must be a fullnode.
  358. fn := parent.(*fullNode)
  359. fn.Children[key[pos-1]] = nil
  360. } else {
  361. // The key of fork shortnode is less than the
  362. // path(it doesn't belong to the range), keep
  363. // it with the cached hash available.
  364. }
  365. }
  366. return nil
  367. }
  368. if _, ok := cld.Val.(valueNode); ok {
  369. fn := parent.(*fullNode)
  370. fn.Children[key[pos-1]] = nil
  371. return nil
  372. }
  373. cld.flags = nodeFlag{dirty: true}
  374. return unset(cld, cld.Val, key, pos+len(cld.Key), removeLeft)
  375. case nil:
  376. // If the node is nil, then it's a child of the fork point
  377. // fullnode(it's a non-existent branch).
  378. return nil
  379. default:
  380. panic("it shouldn't happen") // hashNode, valueNode
  381. }
  382. }
  383. // hasRightElement returns the indicator whether there exists more elements
  384. // in the right side of the given path. The given path can point to an existent
  385. // key or a non-existent one. This function has the assumption that the whole
  386. // path should already be resolved.
  387. func hasRightElement(node node, key []byte) bool {
  388. pos, key := 0, keybytesToHex(key)
  389. for node != nil {
  390. switch rn := node.(type) {
  391. case *fullNode:
  392. for i := key[pos] + 1; i < 16; i++ {
  393. if rn.Children[i] != nil {
  394. return true
  395. }
  396. }
  397. node, pos = rn.Children[key[pos]], pos+1
  398. case *shortNode:
  399. if len(key)-pos < len(rn.Key) || !bytes.Equal(rn.Key, key[pos:pos+len(rn.Key)]) {
  400. return bytes.Compare(rn.Key, key[pos:]) > 0
  401. }
  402. node, pos = rn.Val, pos+len(rn.Key)
  403. case valueNode:
  404. return false // We have resolved the whole path
  405. default:
  406. panic(fmt.Sprintf("%T: invalid node: %v", node, node)) // hashnode
  407. }
  408. }
  409. return false
  410. }
  411. // VerifyRangeProof checks whether the given leaf nodes and edge proof
  412. // can prove the given trie leaves range is matched with the specific root.
  413. // Besides, the range should be consecutive(no gap inside) and monotonic
  414. // increasing.
  415. //
  416. // Note the given proof actually contains two edge proofs. Both of them can
  417. // be non-existent proofs. For example the first proof is for a non-existent
  418. // key 0x03, the last proof is for a non-existent key 0x10. The given batch
  419. // leaves are [0x04, 0x05, .. 0x09]. It's still feasible to prove the given
  420. // batch is valid.
  421. //
  422. // The firstKey is paired with firstProof, not necessarily the same as keys[0]
  423. // (unless firstProof is an existent proof). Similarly, lastKey and lastProof
  424. // are paired.
  425. //
  426. // Expect the normal case, this function can also be used to verify the following
  427. // range proofs:
  428. //
  429. // - All elements proof. In this case the proof can be nil, but the range should
  430. // be all the leaves in the trie.
  431. //
  432. // - One element proof. In this case no matter the edge proof is a non-existent
  433. // proof or not, we can always verify the correctness of the proof.
  434. //
  435. // - Zero element proof. In this case a single non-existent proof is enough to prove.
  436. // Besides, if there are still some other leaves available on the right side, then
  437. // an error will be returned.
  438. //
  439. // Except returning the error to indicate the proof is valid or not, the function will
  440. // also return a flag to indicate whether there exists more accounts/slots in the trie.
  441. func VerifyRangeProof(rootHash common.Hash, firstKey []byte, lastKey []byte, keys [][]byte, values [][]byte, proof ethdb.KeyValueReader) (error, bool) {
  442. if len(keys) != len(values) {
  443. return fmt.Errorf("inconsistent proof data, keys: %d, values: %d", len(keys), len(values)), false
  444. }
  445. // Ensure the received batch is monotonic increasing.
  446. for i := 0; i < len(keys)-1; i++ {
  447. if bytes.Compare(keys[i], keys[i+1]) >= 0 {
  448. return errors.New("range is not monotonically increasing"), false
  449. }
  450. }
  451. // Special case, there is no edge proof at all. The given range is expected
  452. // to be the whole leaf-set in the trie.
  453. if proof == nil {
  454. emptytrie, err := New(common.Hash{}, NewDatabase(memorydb.New()))
  455. if err != nil {
  456. return err, false
  457. }
  458. for index, key := range keys {
  459. emptytrie.TryUpdate(key, values[index])
  460. }
  461. if emptytrie.Hash() != rootHash {
  462. return fmt.Errorf("invalid proof, want hash %x, got %x", rootHash, emptytrie.Hash()), false
  463. }
  464. return nil, false // no more element.
  465. }
  466. // Special case, there is a provided edge proof but zero key/value
  467. // pairs, ensure there are no more accounts / slots in the trie.
  468. if len(keys) == 0 {
  469. root, val, err := proofToPath(rootHash, nil, firstKey, proof, true)
  470. if err != nil {
  471. return err, false
  472. }
  473. if val != nil || hasRightElement(root, firstKey) {
  474. return errors.New("more entries available"), false
  475. }
  476. return nil, false
  477. }
  478. // Special case, there is only one element and two edge keys are same.
  479. // In this case, we can't construct two edge paths. So handle it here.
  480. if len(keys) == 1 && bytes.Equal(firstKey, lastKey) {
  481. root, val, err := proofToPath(rootHash, nil, firstKey, proof, false)
  482. if err != nil {
  483. return err, false
  484. }
  485. if !bytes.Equal(firstKey, keys[0]) {
  486. return errors.New("correct proof but invalid key"), false
  487. }
  488. if !bytes.Equal(val, values[0]) {
  489. return errors.New("correct proof but invalid data"), false
  490. }
  491. return nil, hasRightElement(root, firstKey)
  492. }
  493. // Ok, in all other cases, we require two edge paths available.
  494. // First check the validity of edge keys.
  495. if bytes.Compare(firstKey, lastKey) >= 0 {
  496. return errors.New("invalid edge keys"), false
  497. }
  498. // todo(rjl493456442) different length edge keys should be supported
  499. if len(firstKey) != len(lastKey) {
  500. return errors.New("inconsistent edge keys"), false
  501. }
  502. // Convert the edge proofs to edge trie paths. Then we can
  503. // have the same tree architecture with the original one.
  504. // For the first edge proof, non-existent proof is allowed.
  505. root, _, err := proofToPath(rootHash, nil, firstKey, proof, true)
  506. if err != nil {
  507. return err, false
  508. }
  509. // Pass the root node here, the second path will be merged
  510. // with the first one. For the last edge proof, non-existent
  511. // proof is also allowed.
  512. root, _, err = proofToPath(rootHash, root, lastKey, proof, true)
  513. if err != nil {
  514. return err, false
  515. }
  516. // Remove all internal references. All the removed parts should
  517. // be re-filled(or re-constructed) by the given leaves range.
  518. if err := unsetInternal(root, firstKey, lastKey); err != nil {
  519. return err, false
  520. }
  521. // Rebuild the trie with the leave stream, the shape of trie
  522. // should be same with the original one.
  523. newtrie := &Trie{root: root, db: NewDatabase(memorydb.New())}
  524. for index, key := range keys {
  525. newtrie.TryUpdate(key, values[index])
  526. }
  527. if newtrie.Hash() != rootHash {
  528. return fmt.Errorf("invalid proof, want hash %x, got %x", rootHash, newtrie.Hash()), false
  529. }
  530. return nil, hasRightElement(root, keys[len(keys)-1])
  531. }
  532. // get returns the child of the given node. Return nil if the
  533. // node with specified key doesn't exist at all.
  534. //
  535. // There is an additional flag `skipResolved`. If it's set then
  536. // all resolved nodes won't be returned.
  537. func get(tn node, key []byte, skipResolved bool) ([]byte, node) {
  538. for {
  539. switch n := tn.(type) {
  540. case *shortNode:
  541. if len(key) < len(n.Key) || !bytes.Equal(n.Key, key[:len(n.Key)]) {
  542. return nil, nil
  543. }
  544. tn = n.Val
  545. key = key[len(n.Key):]
  546. if !skipResolved {
  547. return key, tn
  548. }
  549. case *fullNode:
  550. tn = n.Children[key[0]]
  551. key = key[1:]
  552. if !skipResolved {
  553. return key, tn
  554. }
  555. case hashNode:
  556. return key, n
  557. case nil:
  558. return key, nil
  559. case valueNode:
  560. return nil, n
  561. default:
  562. panic(fmt.Sprintf("%T: invalid node: %v", tn, tn))
  563. }
  564. }
  565. }