forked from cerc-io/plugeth
9e5f03b6c4
With this commit, core/state's access to the underlying key/value database is mediated through an interface. Database errors are tracked in StateDB and returned by CommitTo or the new Error method. Motivation for this change: We can remove the light client's duplicated copy of core/state. The light client now supports node iteration, so tracing and storage enumeration can work with the light client (not implemented in this commit).
150 lines
4.3 KiB
Go
150 lines
4.3 KiB
Go
// Copyright 2015 The go-ethereum Authors
|
|
// This file is part of the go-ethereum library.
|
|
//
|
|
// The go-ethereum library is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Lesser General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// The go-ethereum library is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Lesser General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Lesser General Public License
|
|
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
package trie
|
|
|
|
import (
|
|
"bytes"
|
|
"errors"
|
|
"fmt"
|
|
|
|
"github.com/ethereum/go-ethereum/common"
|
|
"github.com/ethereum/go-ethereum/crypto/sha3"
|
|
"github.com/ethereum/go-ethereum/log"
|
|
"github.com/ethereum/go-ethereum/rlp"
|
|
)
|
|
|
|
// Prove constructs a merkle proof for key. The result contains all
|
|
// encoded nodes on the path to the value at key. The value itself is
|
|
// also included in the last node and can be retrieved by verifying
|
|
// the proof.
|
|
//
|
|
// If the trie does not contain a value for key, the returned proof
|
|
// contains all nodes of the longest existing prefix of the key
|
|
// (at least the root node), ending with the node that proves the
|
|
// absence of the key.
|
|
func (t *Trie) Prove(key []byte) []rlp.RawValue {
|
|
// Collect all nodes on the path to key.
|
|
key = keybytesToHex(key)
|
|
nodes := []node{}
|
|
tn := t.root
|
|
for len(key) > 0 && tn != nil {
|
|
switch n := tn.(type) {
|
|
case *shortNode:
|
|
if len(key) < len(n.Key) || !bytes.Equal(n.Key, key[:len(n.Key)]) {
|
|
// The trie doesn't contain the key.
|
|
tn = nil
|
|
} else {
|
|
tn = n.Val
|
|
key = key[len(n.Key):]
|
|
}
|
|
nodes = append(nodes, n)
|
|
case *fullNode:
|
|
tn = n.Children[key[0]]
|
|
key = key[1:]
|
|
nodes = append(nodes, n)
|
|
case hashNode:
|
|
var err error
|
|
tn, err = t.resolveHash(n, nil)
|
|
if err != nil {
|
|
log.Error(fmt.Sprintf("Unhandled trie error: %v", err))
|
|
return nil
|
|
}
|
|
default:
|
|
panic(fmt.Sprintf("%T: invalid node: %v", tn, tn))
|
|
}
|
|
}
|
|
hasher := newHasher(0, 0)
|
|
proof := make([]rlp.RawValue, 0, len(nodes))
|
|
for i, n := range nodes {
|
|
// Don't bother checking for errors here since hasher panics
|
|
// if encoding doesn't work and we're not writing to any database.
|
|
n, _, _ = hasher.hashChildren(n, nil)
|
|
hn, _ := hasher.store(n, nil, false)
|
|
if _, ok := hn.(hashNode); ok || i == 0 {
|
|
// If the node's database encoding is a hash (or is the
|
|
// root node), it becomes a proof element.
|
|
enc, _ := rlp.EncodeToBytes(n)
|
|
proof = append(proof, enc)
|
|
}
|
|
}
|
|
return proof
|
|
}
|
|
|
|
// VerifyProof checks merkle proofs. The given proof must contain the
|
|
// value for key in a trie with the given root hash. VerifyProof
|
|
// returns an error if the proof contains invalid trie nodes or the
|
|
// wrong value.
|
|
func VerifyProof(rootHash common.Hash, key []byte, proof []rlp.RawValue) (value []byte, err error) {
|
|
key = keybytesToHex(key)
|
|
sha := sha3.NewKeccak256()
|
|
wantHash := rootHash.Bytes()
|
|
for i, buf := range proof {
|
|
sha.Reset()
|
|
sha.Write(buf)
|
|
if !bytes.Equal(sha.Sum(nil), wantHash) {
|
|
return nil, fmt.Errorf("bad proof node %d: hash mismatch", i)
|
|
}
|
|
n, err := decodeNode(wantHash, buf, 0)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("bad proof node %d: %v", i, err)
|
|
}
|
|
keyrest, cld := get(n, key)
|
|
switch cld := cld.(type) {
|
|
case nil:
|
|
if i != len(proof)-1 {
|
|
return nil, fmt.Errorf("key mismatch at proof node %d", i)
|
|
} else {
|
|
// The trie doesn't contain the key.
|
|
return nil, nil
|
|
}
|
|
case hashNode:
|
|
key = keyrest
|
|
wantHash = cld
|
|
case valueNode:
|
|
if i != len(proof)-1 {
|
|
return nil, errors.New("additional nodes at end of proof")
|
|
}
|
|
return cld, nil
|
|
}
|
|
}
|
|
return nil, errors.New("unexpected end of proof")
|
|
}
|
|
|
|
func get(tn node, key []byte) ([]byte, node) {
|
|
for {
|
|
switch n := tn.(type) {
|
|
case *shortNode:
|
|
if len(key) < len(n.Key) || !bytes.Equal(n.Key, key[:len(n.Key)]) {
|
|
return nil, nil
|
|
}
|
|
tn = n.Val
|
|
key = key[len(n.Key):]
|
|
case *fullNode:
|
|
tn = n.Children[key[0]]
|
|
key = key[1:]
|
|
case hashNode:
|
|
return key, n
|
|
case nil:
|
|
return key, nil
|
|
case valueNode:
|
|
return nil, n
|
|
default:
|
|
panic(fmt.Sprintf("%T: invalid node: %v", tn, tn))
|
|
}
|
|
}
|
|
}
|