/* Copyright 2022 Erigon contributors Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package commitment import ( "bytes" "encoding/binary" "encoding/hex" "fmt" "hash" "io" "math/bits" "strings" "github.com/holiman/uint256" "golang.org/x/crypto/sha3" "github.com/ledgerwatch/erigon-lib/common/length" "github.com/ledgerwatch/erigon-lib/rlp" ) // keccakState wraps sha3.state. In addition to the usual hash methods, it also supports // Read to get a variable amount of data from the hash state. Read is faster than Sum // because it doesn't copy the internal state, but also modifies the internal state. type keccakState interface { hash.Hash Read([]byte) (int, error) } type ByteArrayWriter struct { buf []byte } func (w *ByteArrayWriter) Setup(buf []byte) { w.buf = buf } func (w *ByteArrayWriter) Write(data []byte) (int, error) { w.buf = append(w.buf, data...) return len(data), nil } // HexPatriciaHashed implements commitment based on patricia merkle tree with radix 16, // with keys pre-hashed by keccak256 type HexPatriciaHashed struct { root Cell // Root cell of the tree // Rows of the grid correspond to the level of depth in the patricia tree // Columns of the grid correspond to pointers to the nodes further from the root grid [128][16]Cell // First 64 rows of this grid are for account trie, and next 64 rows are for storage trie // How many rows (starting from row 0) are currently active and have corresponding selected columns // Last active row does not have selected column activeRows int // Length of the key that reflects current positioning of the grid. It maybe larger than number of active rows, // if a account leaf cell represents multiple nibbles in the key currentKeyLen int currentKey [128]byte // For each row indicates which column is currently selected depths [128]int // For each row, the depth of cells in that row rootChecked bool // Set to false if it is not known whether the root is empty, set to true if it is checked rootTouched bool rootPresent bool branchBefore [128]bool // For each row, whether there was a branch node in the database loaded in unfold touchMap [128]uint16 // For each row, bitmap of cells that were either present before modification, or modified or deleted afterMap [128]uint16 // For each row, bitmap of cells that were present after modification // Function used to load branch node and fill up the cells // For each cell, it sets the cell type, clears the modified flag, fills the hash, // and for the extension, account, and leaf type, the `l` and `k` lockFn func() unlockFn func() branchFn func(prefix []byte) []byte // Function used to fetch account with given plain key accountFn func(plainKey []byte, cell *Cell) []byte // Function used to fetch account with given plain key storageFn func(plainKey []byte, cell *Cell) []byte keccak keccakState keccak2 keccakState accountKeyLen int trace bool numBuf [binary.MaxVarintLen64]byte byteArrayWriter ByteArrayWriter } func NewHexPatriciaHashed(accountKeyLen int, branchFn func(prefix []byte) []byte, accountFn func(plainKey []byte, cell *Cell) []byte, storageFn func(plainKey []byte, cell *Cell) []byte, lockFn func(), unlockFn func(), ) *HexPatriciaHashed { return &HexPatriciaHashed{ keccak: sha3.NewLegacyKeccak256().(keccakState), keccak2: sha3.NewLegacyKeccak256().(keccakState), accountKeyLen: accountKeyLen, branchFn: branchFn, accountFn: accountFn, storageFn: storageFn, lockFn: lockFn, unlockFn: unlockFn, } } type Cell struct { h [32]byte // cell hash hl int // Length of the hash (or embedded) apk [20]byte // account plain key apl int // length of account plain key spk [52]byte // storage plain key spl int // length of the storage plain key downHashedKey [128]byte downHashedLen int extension [64]byte extLen int Nonce uint64 Balance uint256.Int CodeHash [32]byte // hash of the bytecode Storage [32]byte StorageLen int } var ( EmptyRootHash, _ = hex.DecodeString("56e81f171bcc55a6ff8345e692c0f86e5b48e01b996cadc001622fb5e363b421") EmptyCodeHash, _ = hex.DecodeString("c5d2460186f7233c927e7db2dcc703c0e500b653ca82273b7bfad8045d85a470") ) func (cell *Cell) fillEmpty() { cell.apl = 0 cell.spl = 0 cell.downHashedLen = 0 cell.extLen = 0 cell.hl = 0 cell.Nonce = 0 cell.Balance.Clear() copy(cell.CodeHash[:], EmptyCodeHash) cell.StorageLen = 0 } func (cell *Cell) fillFromUpperCell(upCell *Cell, depth, depthIncrement int) { if upCell.downHashedLen >= depthIncrement { cell.downHashedLen = upCell.downHashedLen - depthIncrement } else { cell.downHashedLen = 0 } if upCell.downHashedLen > depthIncrement { copy(cell.downHashedKey[:], upCell.downHashedKey[depthIncrement:upCell.downHashedLen]) } if upCell.extLen >= depthIncrement { cell.extLen = upCell.extLen - depthIncrement } else { cell.extLen = 0 } if upCell.extLen > depthIncrement { copy(cell.extension[:], upCell.extension[depthIncrement:upCell.extLen]) } if depth <= 64 { cell.apl = upCell.apl if upCell.apl > 0 { copy(cell.apk[:], upCell.apk[:cell.apl]) cell.Balance.Set(&upCell.Balance) cell.Nonce = upCell.Nonce copy(cell.CodeHash[:], upCell.CodeHash[:]) cell.extLen = upCell.extLen if upCell.extLen > 0 { copy(cell.extension[:], upCell.extension[:upCell.extLen]) } } } else { cell.apl = 0 } cell.spl = upCell.spl if upCell.spl > 0 { copy(cell.spk[:], upCell.spk[:upCell.spl]) cell.StorageLen = upCell.StorageLen if upCell.StorageLen > 0 { copy(cell.Storage[:], upCell.Storage[:upCell.StorageLen]) } } cell.hl = upCell.hl if upCell.hl > 0 { copy(cell.h[:], upCell.h[:upCell.hl]) } } func (cell *Cell) fillFromLowerCell(lowCell *Cell, lowDepth int, preExtension []byte, nibble int) { if lowCell.apl > 0 || lowDepth < 64 { cell.apl = lowCell.apl } if lowCell.apl > 0 { copy(cell.apk[:], lowCell.apk[:cell.apl]) cell.Balance.Set(&lowCell.Balance) cell.Nonce = lowCell.Nonce copy(cell.CodeHash[:], lowCell.CodeHash[:]) } cell.spl = lowCell.spl if lowCell.spl > 0 { copy(cell.spk[:], lowCell.spk[:cell.spl]) cell.StorageLen = lowCell.StorageLen if lowCell.StorageLen > 0 { copy(cell.Storage[:], lowCell.Storage[:lowCell.StorageLen]) } } if lowCell.hl > 0 { if (lowCell.apl == 0 && lowDepth < 64) || (lowCell.spl == 0 && lowDepth > 64) { // Extension is related to either accounts branch node, or storage branch node, we prepend it by preExtension | nibble if len(preExtension) > 0 { copy(cell.extension[:], preExtension) } cell.extension[len(preExtension)] = byte(nibble) if lowCell.extLen > 0 { copy(cell.extension[1+len(preExtension):], lowCell.extension[:lowCell.extLen]) } cell.extLen = lowCell.extLen + 1 + len(preExtension) } else { // Extension is related to a storage branch node, so we copy it upwards as is cell.extLen = lowCell.extLen if lowCell.extLen > 0 { copy(cell.extension[:], lowCell.extension[:lowCell.extLen]) } } } cell.hl = lowCell.hl if lowCell.hl > 0 { copy(cell.h[:], lowCell.h[:lowCell.hl]) } } func hashKey(keccak keccakState, plainKey []byte, dest []byte, hashedKeyOffset int) error { keccak.Reset() var hashBufBack [32]byte hashBuf := hashBufBack[:] if _, err := keccak.Write(plainKey); err != nil { return err } if _, err := keccak.Read(hashBuf); err != nil { return err } hashBuf = hashBuf[hashedKeyOffset/2:] var k int if hashedKeyOffset%2 == 1 { dest[0] = hashBuf[0] & 0xf k++ hashBuf = hashBuf[1:] } for _, c := range hashBuf { dest[k] = (c >> 4) & 0xf k++ dest[k] = c & 0xf k++ } return nil } func (cell *Cell) deriveHashedKeys(depth int, keccak keccakState, accountKeyLen int) error { extraLen := 0 if cell.apl > 0 { if depth > 64 { return fmt.Errorf("deriveHashedKeys accountPlainKey present at depth > 64") } extraLen = 64 - depth } if cell.spl > 0 { if depth >= 64 { extraLen = 128 - depth } else { extraLen += 64 } } if extraLen > 0 { if cell.downHashedLen > 0 { copy(cell.downHashedKey[extraLen:], cell.downHashedKey[:cell.downHashedLen]) } cell.downHashedLen += extraLen var hashedKeyOffset, downOffset int if cell.apl > 0 { if err := hashKey(keccak, cell.apk[:cell.apl], cell.downHashedKey[:], depth); err != nil { return err } downOffset = 64 - depth } if cell.spl > 0 { if depth >= 64 { hashedKeyOffset = depth - 64 } if err := hashKey(keccak, cell.spk[accountKeyLen:cell.spl], cell.downHashedKey[downOffset:], hashedKeyOffset); err != nil { return err } } } return nil } func (cell *Cell) fillFromFields(data []byte, pos int, fieldBits PartFlags) (int, error) { if fieldBits&HASHEDKEY_PART != 0 { l, n := binary.Uvarint(data[pos:]) if n == 0 { return 0, fmt.Errorf("fillFromFields buffer too small for hashedKey len") } else if n < 0 { return 0, fmt.Errorf("fillFromFields value overflow for hashedKey len") } pos += n if len(data) < pos+int(l) { return 0, fmt.Errorf("fillFromFields buffer too small for hashedKey") } cell.downHashedLen = int(l) cell.extLen = int(l) if l > 0 { copy(cell.downHashedKey[:], data[pos:pos+int(l)]) copy(cell.extension[:], data[pos:pos+int(l)]) pos += int(l) } } else { cell.downHashedLen = 0 cell.extLen = 0 } if fieldBits&ACCOUNT_PLAIN_PART != 0 { l, n := binary.Uvarint(data[pos:]) if n == 0 { return 0, fmt.Errorf("fillFromFields buffer too small for accountPlainKey len") } else if n < 0 { return 0, fmt.Errorf("fillFromFields value overflow for accountPlainKey len") } pos += n if len(data) < pos+int(l) { return 0, fmt.Errorf("fillFromFields buffer too small for accountPlainKey") } cell.apl = int(l) if l > 0 { copy(cell.apk[:], data[pos:pos+int(l)]) pos += int(l) } } else { cell.apl = 0 } if fieldBits&STORAGE_PLAIN_PART != 0 { l, n := binary.Uvarint(data[pos:]) if n == 0 { return 0, fmt.Errorf("fillFromFields buffer too small for storagePlainKey len") } else if n < 0 { return 0, fmt.Errorf("fillFromFields value overflow for storagePlainKey len") } pos += n if len(data) < pos+int(l) { return 0, fmt.Errorf("fillFromFields buffer too small for storagePlainKey") } cell.spl = int(l) if l > 0 { copy(cell.spk[:], data[pos:pos+int(l)]) pos += int(l) } } else { cell.spl = 0 } if fieldBits&HASH_PART != 0 { l, n := binary.Uvarint(data[pos:]) if n == 0 { return 0, fmt.Errorf("fillFromFields buffer too small for hash len") } else if n < 0 { return 0, fmt.Errorf("fillFromFields value overflow for hash len") } pos += n if len(data) < pos+int(l) { return 0, fmt.Errorf("fillFromFields buffer too small for hash") } cell.hl = int(l) if l > 0 { copy(cell.h[:], data[pos:pos+int(l)]) pos += int(l) } } else { cell.hl = 0 } return pos, nil } func (hph *HexPatriciaHashed) SetTrace(trace bool) { hph.trace = trace } // hasTerm returns whether a hex key has the terminator flag. func hasTerm(s []byte) bool { return len(s) > 0 && s[len(s)-1] == 16 } func (hph *HexPatriciaHashed) completeLeafHash(buf []byte, keyPrefix []byte, kp, kl, compactLen int, key []byte, compact0 byte, ni int, val rlp.RlpSerializable, singleton bool) ([]byte, error) { totalLen := kp + kl + val.DoubleRLPLen() var lenPrefix [4]byte pt := rlp.GenerateStructLen(lenPrefix[:], totalLen) embedded := !singleton && totalLen+pt < length.Hash var writer io.Writer if embedded { hph.byteArrayWriter.Setup(buf) writer = &hph.byteArrayWriter } else { hph.keccak.Reset() writer = hph.keccak } if _, err := writer.Write(lenPrefix[:pt]); err != nil { return nil, err } if _, err := writer.Write(keyPrefix[:kp]); err != nil { return nil, err } var b [1]byte b[0] = compact0 if _, err := writer.Write(b[:]); err != nil { return nil, err } for i := 1; i < compactLen; i++ { b[0] = key[ni]*16 + key[ni+1] if _, err := writer.Write(b[:]); err != nil { return nil, err } ni += 2 } var prefixBuf [8]byte if err := val.ToDoubleRLP(writer, prefixBuf[:]); err != nil { return nil, err } if embedded { buf = hph.byteArrayWriter.buf } else { var hashBuf [33]byte hashBuf[0] = 0x80 + length.Hash if _, err := hph.keccak.Read(hashBuf[1:]); err != nil { return nil, err } buf = append(buf, hashBuf[:]...) } return buf, nil } func (hph *HexPatriciaHashed) leafHashWithKeyVal(buf []byte, key []byte, val rlp.RlpSerializableBytes, singleton bool) ([]byte, error) { // Compute the total length of binary representation var kp, kl int // Write key var compactLen int var ni int var compact0 byte compactLen = (len(key)-1)/2 + 1 if len(key)&1 == 0 { compact0 = 0x30 + key[0] // Odd: (3<<4) + first nibble ni = 1 } else { compact0 = 0x20 } var keyPrefix [1]byte if compactLen > 1 { keyPrefix[0] = 0x80 + byte(compactLen) kp = 1 kl = compactLen } else { kl = 1 } buf, err := hph.completeLeafHash(buf, keyPrefix[:], kp, kl, compactLen, key, compact0, ni, val, singleton) if err != nil { return nil, err } return buf, nil } func (cell *Cell) accountForHashing(buffer []byte, storageRootHash []byte) int { balanceBytes := 0 if !cell.Balance.LtUint64(128) { balanceBytes = cell.Balance.ByteLen() } var nonceBytes int if cell.Nonce < 128 && cell.Nonce != 0 { nonceBytes = 0 } else { nonceBytes = (bits.Len64(cell.Nonce) + 7) / 8 } var structLength = uint(balanceBytes + nonceBytes + 2) structLength += 66 // Two 32-byte arrays + 2 prefixes var pos int if structLength < 56 { buffer[0] = byte(192 + structLength) pos = 1 } else { lengthBytes := (bits.Len(structLength) + 7) / 8 buffer[0] = byte(247 + lengthBytes) for i := lengthBytes; i > 0; i-- { buffer[i] = byte(structLength) structLength >>= 8 } pos = lengthBytes + 1 } // Encoding nonce if cell.Nonce < 128 && cell.Nonce != 0 { buffer[pos] = byte(cell.Nonce) } else { buffer[pos] = byte(128 + nonceBytes) var nonce = cell.Nonce for i := nonceBytes; i > 0; i-- { buffer[pos+i] = byte(nonce) nonce >>= 8 } } pos += 1 + nonceBytes // Encoding balance if cell.Balance.LtUint64(128) && !cell.Balance.IsZero() { buffer[pos] = byte(cell.Balance.Uint64()) pos++ } else { buffer[pos] = byte(128 + balanceBytes) pos++ cell.Balance.WriteToSlice(buffer[pos : pos+balanceBytes]) pos += balanceBytes } // Encoding Root and CodeHash buffer[pos] = 128 + 32 pos++ copy(buffer[pos:], storageRootHash[:length.Hash]) pos += 32 buffer[pos] = 128 + 32 pos++ copy(buffer[pos:], cell.CodeHash[:]) pos += 32 return pos } func (hph *HexPatriciaHashed) accountLeafHashWithKey(buf []byte, key []byte, val rlp.RlpSerializable) ([]byte, error) { // Compute the total length of binary representation var kp, kl int // Write key var compactLen int var ni int var compact0 byte if hasTerm(key) { compactLen = (len(key)-1)/2 + 1 if len(key)&1 == 0 { compact0 = 48 + key[0] // Odd (1<<4) + first nibble ni = 1 } else { compact0 = 32 } } else { compactLen = len(key)/2 + 1 if len(key)&1 == 1 { compact0 = 16 + key[0] // Odd (1<<4) + first nibble ni = 1 } } var keyPrefix [1]byte if compactLen > 1 { keyPrefix[0] = byte(128 + compactLen) kp = 1 kl = compactLen } else { kl = 1 } var err error if buf, err = hph.completeLeafHash(buf, keyPrefix[:], kp, kl, compactLen, key, compact0, ni, val, true); err != nil { return nil, err } return buf, nil } func (hph *HexPatriciaHashed) extensionHash(buf []byte, key []byte, hash []byte) ([]byte, error) { // Compute the total length of binary representation var kp, kl int // Write key var compactLen int var ni int var compact0 byte if hasTerm(key) { compactLen = (len(key)-1)/2 + 1 if len(key)&1 == 0 { compact0 = 0x30 + key[0] // Odd: (3<<4) + first nibble ni = 1 } else { compact0 = 0x20 } } else { compactLen = len(key)/2 + 1 if len(key)&1 == 1 { compact0 = 0x10 + key[0] // Odd: (1<<4) + first nibble ni = 1 } } var keyPrefix [1]byte if compactLen > 1 { keyPrefix[0] = 0x80 + byte(compactLen) kp = 1 kl = compactLen } else { kl = 1 } totalLen := kp + kl + 33 var lenPrefix [4]byte pt := rlp.GenerateStructLen(lenPrefix[:], totalLen) hph.keccak.Reset() if _, err := hph.keccak.Write(lenPrefix[:pt]); err != nil { return nil, err } if _, err := hph.keccak.Write(keyPrefix[:kp]); err != nil { return nil, err } var b [1]byte b[0] = compact0 if _, err := hph.keccak.Write(b[:]); err != nil { return nil, err } for i := 1; i < compactLen; i++ { b[0] = key[ni]*16 + key[ni+1] if _, err := hph.keccak.Write(b[:]); err != nil { return nil, err } ni += 2 } b[0] = 0x80 + length.Hash if _, err := hph.keccak.Write(b[:]); err != nil { return nil, err } if _, err := hph.keccak.Write(hash); err != nil { return nil, err } // Replace previous hash with the new one var hashBuf [33]byte if _, err := hph.keccak.Read(hashBuf[:length.Hash]); err != nil { return nil, err } buf = append(buf, hashBuf[:length.Hash]...) return buf, nil } func (hph *HexPatriciaHashed) computeCellHashLen(cell *Cell, depth int) int { if cell.spl > 0 && depth >= 64 { keyLen := 128 - depth + 1 // Length of hex key with terminator character var kp, kl int compactLen := (keyLen-1)/2 + 1 if compactLen > 1 { kp = 1 kl = compactLen } else { kl = 1 } val := rlp.RlpSerializableBytes(cell.Storage[:cell.StorageLen]) totalLen := kp + kl + val.DoubleRLPLen() var lenPrefix [4]byte pt := rlp.GenerateStructLen(lenPrefix[:], totalLen) if totalLen+pt < length.Hash { return totalLen + pt } } return length.Hash + 1 } func (hph *HexPatriciaHashed) computeCellHash(cell *Cell, depth int, buf []byte) ([]byte, error) { var err error var storageRootHash []byte if cell.spl > 0 { var hashedKeyOffset int if depth >= 64 { hashedKeyOffset = depth - 64 } singleton := depth <= 64 if err := hashKey(hph.keccak, cell.spk[hph.accountKeyLen:cell.spl], cell.downHashedKey[:], hashedKeyOffset); err != nil { return nil, err } cell.downHashedKey[64-hashedKeyOffset] = 16 // Add terminator if singleton { if hph.trace { fmt.Printf("leafHashWithKeyVal(singleton) for [%x]=>[%x]\n", cell.downHashedKey[:64-hashedKeyOffset+1], cell.Storage[:cell.StorageLen]) } if storageRootHash, err = hph.leafHashWithKeyVal(nil, cell.downHashedKey[:64-hashedKeyOffset+1], rlp.RlpSerializableBytes(cell.Storage[:cell.StorageLen]), true); err != nil { return nil, err } storageRootHash = storageRootHash[1:] } else { if hph.trace { fmt.Printf("leafHashWithKeyVal for [%x]=>[%x]\n", cell.downHashedKey[:64-hashedKeyOffset+1], cell.Storage[:cell.StorageLen]) } if buf, err = hph.leafHashWithKeyVal(buf, cell.downHashedKey[:64-hashedKeyOffset+1], rlp.RlpSerializableBytes(cell.Storage[:cell.StorageLen]), false); err != nil { return nil, err } return buf, nil } } if cell.apl > 0 { if err := hashKey(hph.keccak, cell.apk[:cell.apl], cell.downHashedKey[:], depth); err != nil { return nil, err } cell.downHashedKey[64-depth] = 16 // Add terminator if storageRootHash == nil { if cell.extLen > 0 { // Extension if cell.hl > 0 { if hph.trace { fmt.Printf("extensionHash for [%x]=>[%x]\n", cell.extension[:cell.extLen], cell.h[:cell.hl]) } if storageRootHash, err = hph.extensionHash(nil, cell.extension[:cell.extLen], cell.h[:cell.hl]); err != nil { return nil, err } } else { return nil, fmt.Errorf("computeCellHash extension without hash") } } else if cell.hl > 0 { storageRootHash = cell.h[:cell.hl] } else { storageRootHash = EmptyRootHash } } var valBuf [128]byte valLen := cell.accountForHashing(valBuf[:], storageRootHash) if hph.trace { fmt.Printf("accountLeafHashWithKey for [%x]=>[%x]\n", cell.downHashedKey[:65-depth], valBuf[:valLen]) } if buf, err = hph.accountLeafHashWithKey(buf, cell.downHashedKey[:65-depth], rlp.RlpEncodedBytes(valBuf[:valLen])); err != nil { return nil, err } return buf, nil } buf = append(buf, 0x80+32) if cell.extLen > 0 { // Extension if cell.hl > 0 { if hph.trace { fmt.Printf("extensionHash for [%x]=>[%x]\n", cell.extension[:cell.extLen], cell.h[:cell.hl]) } if buf, err = hph.extensionHash(buf, cell.extension[:cell.extLen], cell.h[:cell.hl]); err != nil { return nil, err } } else { return nil, fmt.Errorf("computeCellHash extension without hash") } } else if cell.hl > 0 { buf = append(buf, cell.h[:cell.hl]...) } else { buf = append(buf, EmptyRootHash...) } return buf, nil } type PartFlags uint8 const ( HASHEDKEY_PART PartFlags = 1 ACCOUNT_PLAIN_PART PartFlags = 2 STORAGE_PLAIN_PART PartFlags = 4 HASH_PART PartFlags = 8 ) func branchToString(branchData []byte) string { touchMap := binary.BigEndian.Uint16(branchData[0:]) afterMap := binary.BigEndian.Uint16(branchData[2:]) pos := 4 var sb strings.Builder var cell Cell fmt.Fprintf(&sb, "touchMap %016b, afterMap %016b\n", touchMap, afterMap) for bitset, j := touchMap, 0; bitset != 0; j++ { bit := bitset & -bitset nibble := bits.TrailingZeros16(bit) fmt.Fprintf(&sb, " %x => ", nibble) if afterMap&bit == 0 { sb.WriteString("{DELETED}\n") } else { fieldBits := PartFlags(branchData[pos]) pos++ var err error if pos, err = cell.fillFromFields(branchData, pos, PartFlags(fieldBits)); err != nil { // This is used for test output, so ok to panic panic(err) } sb.WriteString("{") var comma string if cell.downHashedLen > 0 { fmt.Fprintf(&sb, "hashedKey=[%x]", cell.downHashedKey[:cell.downHashedLen]) comma = "," } if cell.apl > 0 { fmt.Fprintf(&sb, "%saccountPlainKey=[%x]", comma, cell.apk[:cell.apl]) comma = "," } if cell.spl > 0 { fmt.Fprintf(&sb, "%sstoragePlainKey=[%x]", comma, cell.spk[:cell.spl]) comma = "," } if cell.hl > 0 { fmt.Fprintf(&sb, "%shash=[%x]", comma, cell.h[:cell.hl]) } sb.WriteString("}\n") } bitset ^= bit } return sb.String() } func commonPrefixLen(b1, b2 []byte) int { var i int for i = 0; i < len(b1) && i < len(b2); i++ { if b1[i] != b2[i] { break } } return i } // Reset allows HexPatriciaHashed instance to be reused for the new commitment calculation func (hph *HexPatriciaHashed) Reset() { hph.rootChecked = false hph.root.hl = 0 hph.root.downHashedLen = 0 hph.root.apl = 0 hph.root.spl = 0 hph.root.extLen = 0 copy(hph.root.CodeHash[:], EmptyCodeHash) hph.root.StorageLen = 0 hph.root.Balance.Clear() hph.root.Nonce = 0 hph.rootTouched = false hph.rootPresent = true } func (hph *HexPatriciaHashed) ResetFns( branchFn func(prefix []byte) []byte, accountFn func(plainKey []byte, cell *Cell) []byte, storageFn func(plainKey []byte, cell *Cell) []byte, lockFn func(), unlockFn func(), ) { hph.branchFn = branchFn hph.accountFn = accountFn hph.storageFn = storageFn hph.lockFn = lockFn hph.unlockFn = unlockFn } func (hph *HexPatriciaHashed) needUnfolding(hashedKey []byte) int { var cell *Cell var depth int if hph.activeRows == 0 { if hph.trace { fmt.Printf("needUnfolding root, rootChecked = %t\n", hph.rootChecked) } cell = &hph.root if cell.downHashedLen == 0 && cell.hl == 0 && !hph.rootChecked { // Need to attempt to unfold the root return 1 } } else { col := int(hashedKey[hph.currentKeyLen]) cell = &hph.grid[hph.activeRows-1][col] depth = hph.depths[hph.activeRows-1] if hph.trace { fmt.Printf("needUnfolding cell (%d, %x), currentKey=[%x], depth=%d, cell.h=[%x]\n", hph.activeRows-1, col, hph.currentKey[:hph.currentKeyLen], depth, cell.h[:cell.hl]) } } if len(hashedKey) <= depth { return 0 } if cell.downHashedLen == 0 { if cell.hl == 0 { // cell is empty, no need to unfold further return 0 } else { // unfold branch node return 1 } } cpl := commonPrefixLen(hashedKey[depth:], cell.downHashedKey[:cell.downHashedLen-1]) if hph.trace { fmt.Printf("cpl=%d, cell.downHashedKey=[%x], depth=%d, hashedKey[depth:]=[%x]\n", cpl, cell.downHashedKey[:cell.downHashedLen], depth, hashedKey[depth:]) } unfolding := cpl + 1 if depth < 64 && depth+unfolding > 64 { // This is to make sure that unfolding always breaks at the level where storage subtrees start unfolding = 64 - depth if hph.trace { fmt.Printf("adjusted unfolding=%d\n", unfolding) } } return unfolding } func (hph *HexPatriciaHashed) unfoldBranchNode(row int, deleted bool, depth int) error { //hph.lockFn() //defer hph.unlockFn() branchData := hph.branchFn(hexToCompact(hph.currentKey[:hph.currentKeyLen])) if !hph.rootChecked && hph.currentKeyLen == 0 && len(branchData) == 0 { // Special case - empty or deleted root hph.rootChecked = true return nil } hph.branchBefore[row] = true bitmap := binary.BigEndian.Uint16(branchData[0:]) pos := 2 if deleted { // All cells come as deleted (touched but not present after) hph.afterMap[row] = 0 hph.touchMap[row] = bitmap } else { hph.afterMap[row] = bitmap hph.touchMap[row] = 0 } //fmt.Printf("unfoldBranchNode [%x], afterMap = [%x], touchMap = [%x]\n", branchData, hph.afterMap[row], hph.touchMap[row]) // Loop iterating over the set bits of modMask for bitset, j := bitmap, 0; bitset != 0; j++ { bit := bitset & -bitset nibble := bits.TrailingZeros16(bit) cell := &hph.grid[row][nibble] fieldBits := branchData[pos] pos++ var err error if pos, err = cell.fillFromFields(branchData, pos, PartFlags(fieldBits)); err != nil { return fmt.Errorf("prefix [%x], branchData[%x]: %w", hph.currentKey[:hph.currentKeyLen], branchData, err) } if hph.trace { fmt.Printf("cell (%d, %x) depth=%d, hash=[%x], a=[%x], s=[%x], ex=[%x]\n", row, nibble, depth, cell.h[:cell.hl], cell.apk[:cell.apl], cell.spk[:cell.spl], cell.extension[:cell.extLen]) } if cell.apl > 0 { k := hph.accountFn(cell.apk[:cell.apl], cell) cell.apl = len(k) copy(cell.apk[:], k) if hph.trace { fmt.Printf("accountFn[%x] return balance=%d, nonce=%d\n", cell.apk[:cell.apl], &cell.Balance, cell.Nonce) } } if cell.spl > 0 { k := hph.storageFn(cell.spk[:cell.spl], cell) cell.spl = len(k) copy(cell.spk[:], k) } if err = cell.deriveHashedKeys(depth, hph.keccak, hph.accountKeyLen); err != nil { return err } bitset ^= bit } return nil } func (hph *HexPatriciaHashed) unfold(hashedKey []byte, unfolding int) error { if hph.trace { fmt.Printf("unfold %d: activeRows: %d\n", unfolding, hph.activeRows) } var upCell *Cell var touched, present bool var col byte var upDepth, depth int if hph.activeRows == 0 { if hph.rootChecked && hph.root.hl == 0 && hph.root.downHashedLen == 0 { // No unfolding for empty root return nil } upCell = &hph.root touched = hph.rootTouched present = hph.rootPresent if hph.trace { fmt.Printf("root, touched %t, present %t\n", touched, present) } } else { upDepth = hph.depths[hph.activeRows-1] col = hashedKey[upDepth-1] upCell = &hph.grid[hph.activeRows-1][col] touched = hph.touchMap[hph.activeRows-1]&(uint16(1)<