'encode' and 'decode' are meaningless because the code deals with three encodings. Document the encodings and give a name to each one.
		
			
				
	
	
		
			149 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			149 lines
		
	
	
		
			4.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2015 The go-ethereum Authors
 | |
| // This file is part of the go-ethereum library.
 | |
| //
 | |
| // The go-ethereum library is free software: you can redistribute it and/or modify
 | |
| // it under the terms of the GNU Lesser General Public License as published by
 | |
| // the Free Software Foundation, either version 3 of the License, or
 | |
| // (at your option) any later version.
 | |
| //
 | |
| // The go-ethereum library is distributed in the hope that it will be useful,
 | |
| // but WITHOUT ANY WARRANTY; without even the implied warranty of
 | |
| // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 | |
| // GNU Lesser General Public License for more details.
 | |
| //
 | |
| // You should have received a copy of the GNU Lesser General Public License
 | |
| // along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
 | |
| 
 | |
| package trie
 | |
| 
 | |
| import (
 | |
| 	"bytes"
 | |
| 	"errors"
 | |
| 	"fmt"
 | |
| 
 | |
| 	"github.com/ethereum/go-ethereum/common"
 | |
| 	"github.com/ethereum/go-ethereum/crypto/sha3"
 | |
| 	"github.com/ethereum/go-ethereum/log"
 | |
| 	"github.com/ethereum/go-ethereum/rlp"
 | |
| )
 | |
| 
 | |
| // Prove constructs a merkle proof for key. The result contains all
 | |
| // encoded nodes on the path to the value at key. The value itself is
 | |
| // also included in the last node and can be retrieved by verifying
 | |
| // the proof.
 | |
| //
 | |
| // If the trie does not contain a value for key, the returned proof
 | |
| // contains all nodes of the longest existing prefix of the key
 | |
| // (at least the root node), ending with the node that proves the
 | |
| // absence of the key.
 | |
| func (t *Trie) Prove(key []byte) []rlp.RawValue {
 | |
| 	// Collect all nodes on the path to key.
 | |
| 	key = keybytesToHex(key)
 | |
| 	nodes := []node{}
 | |
| 	tn := t.root
 | |
| 	for len(key) > 0 && tn != nil {
 | |
| 		switch n := tn.(type) {
 | |
| 		case *shortNode:
 | |
| 			if len(key) < len(n.Key) || !bytes.Equal(n.Key, key[:len(n.Key)]) {
 | |
| 				// The trie doesn't contain the key.
 | |
| 				tn = nil
 | |
| 			} else {
 | |
| 				tn = n.Val
 | |
| 				key = key[len(n.Key):]
 | |
| 			}
 | |
| 			nodes = append(nodes, n)
 | |
| 		case *fullNode:
 | |
| 			tn = n.Children[key[0]]
 | |
| 			key = key[1:]
 | |
| 			nodes = append(nodes, n)
 | |
| 		case hashNode:
 | |
| 			var err error
 | |
| 			tn, err = t.resolveHash(n, nil, nil)
 | |
| 			if err != nil {
 | |
| 				log.Error(fmt.Sprintf("Unhandled trie error: %v", err))
 | |
| 				return nil
 | |
| 			}
 | |
| 		default:
 | |
| 			panic(fmt.Sprintf("%T: invalid node: %v", tn, tn))
 | |
| 		}
 | |
| 	}
 | |
| 	hasher := newHasher(0, 0)
 | |
| 	proof := make([]rlp.RawValue, 0, len(nodes))
 | |
| 	for i, n := range nodes {
 | |
| 		// Don't bother checking for errors here since hasher panics
 | |
| 		// if encoding doesn't work and we're not writing to any database.
 | |
| 		n, _, _ = hasher.hashChildren(n, nil)
 | |
| 		hn, _ := hasher.store(n, nil, false)
 | |
| 		if _, ok := hn.(hashNode); ok || i == 0 {
 | |
| 			// If the node's database encoding is a hash (or is the
 | |
| 			// root node), it becomes a proof element.
 | |
| 			enc, _ := rlp.EncodeToBytes(n)
 | |
| 			proof = append(proof, enc)
 | |
| 		}
 | |
| 	}
 | |
| 	return proof
 | |
| }
 | |
| 
 | |
| // VerifyProof checks merkle proofs. The given proof must contain the
 | |
| // value for key in a trie with the given root hash. VerifyProof
 | |
| // returns an error if the proof contains invalid trie nodes or the
 | |
| // wrong value.
 | |
| func VerifyProof(rootHash common.Hash, key []byte, proof []rlp.RawValue) (value []byte, err error) {
 | |
| 	key = keybytesToHex(key)
 | |
| 	sha := sha3.NewKeccak256()
 | |
| 	wantHash := rootHash.Bytes()
 | |
| 	for i, buf := range proof {
 | |
| 		sha.Reset()
 | |
| 		sha.Write(buf)
 | |
| 		if !bytes.Equal(sha.Sum(nil), wantHash) {
 | |
| 			return nil, fmt.Errorf("bad proof node %d: hash mismatch", i)
 | |
| 		}
 | |
| 		n, err := decodeNode(wantHash, buf, 0)
 | |
| 		if err != nil {
 | |
| 			return nil, fmt.Errorf("bad proof node %d: %v", i, err)
 | |
| 		}
 | |
| 		keyrest, cld := get(n, key)
 | |
| 		switch cld := cld.(type) {
 | |
| 		case nil:
 | |
| 			if i != len(proof)-1 {
 | |
| 				return nil, fmt.Errorf("key mismatch at proof node %d", i)
 | |
| 			} else {
 | |
| 				// The trie doesn't contain the key.
 | |
| 				return nil, nil
 | |
| 			}
 | |
| 		case hashNode:
 | |
| 			key = keyrest
 | |
| 			wantHash = cld
 | |
| 		case valueNode:
 | |
| 			if i != len(proof)-1 {
 | |
| 				return nil, errors.New("additional nodes at end of proof")
 | |
| 			}
 | |
| 			return cld, nil
 | |
| 		}
 | |
| 	}
 | |
| 	return nil, errors.New("unexpected end of proof")
 | |
| }
 | |
| 
 | |
| func get(tn node, key []byte) ([]byte, node) {
 | |
| 	for len(key) > 0 {
 | |
| 		switch n := tn.(type) {
 | |
| 		case *shortNode:
 | |
| 			if len(key) < len(n.Key) || !bytes.Equal(n.Key, key[:len(n.Key)]) {
 | |
| 				return nil, nil
 | |
| 			}
 | |
| 			tn = n.Val
 | |
| 			key = key[len(n.Key):]
 | |
| 		case *fullNode:
 | |
| 			tn = n.Children[key[0]]
 | |
| 			key = key[1:]
 | |
| 		case hashNode:
 | |
| 			return key, n
 | |
| 		case nil:
 | |
| 			return key, nil
 | |
| 		default:
 | |
| 			panic(fmt.Sprintf("%T: invalid node: %v", tn, tn))
 | |
| 		}
 | |
| 	}
 | |
| 	return nil, tn.(valueNode)
 | |
| }
 |