-
Notifications
You must be signed in to change notification settings - Fork 11.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merkle proof library with tests and docs #260
Changes from all commits
3c4d0d0
2e0bd06
30e2023
bc3db5d
863ad48
24323d3
bcda5bf
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,41 @@ | ||
pragma solidity ^0.4.11; | ||
|
||
/* | ||
* @title MerkleProof | ||
* @dev Merkle proof verification | ||
* @note Based on https://github.com/ameensol/merkle-tree-solidity/blob/master/src/MerkleProof.sol | ||
*/ | ||
library MerkleProof { | ||
/* | ||
* @dev Verifies a Merkle proof proving the existence of a leaf in a Merkle tree. Assumes that each pair of leaves | ||
* and each pair of pre-images is sorted. | ||
* @param _proof Merkle proof containing sibling hashes on the branch from the leaf to the root of the Merkle tree | ||
* @param _root Merkle root | ||
* @param _leaf Leaf of Merkle tree | ||
*/ | ||
function verifyProof(bytes _proof, bytes32 _root, bytes32 _leaf) constant returns (bool) { | ||
// Check if proof length is a multiple of 32 | ||
if (_proof.length % 32 != 0) return false; | ||
|
||
bytes32 proofElement; | ||
bytes32 computedHash = _leaf; | ||
|
||
for (uint256 i = 32; i <= _proof.length; i += 32) { | ||
assembly { | ||
// Load the current element of the proof | ||
proofElement := mload(add(_proof, i)) | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. WDYT about adding a check that There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I agree that a check for There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Absolutely, my bad! The check is for 32 as you say. |
||
} | ||
|
||
if (computedHash < proofElement) { | ||
// Hash(current computed hash + current element of the proof) | ||
computedHash = keccak256(computedHash, proofElement); | ||
} else { | ||
// Hash(current element of the proof + current computed hash) | ||
computedHash = keccak256(proofElement, computedHash); | ||
} | ||
} | ||
|
||
// Check if the computed hash (root) is equal to the provided root | ||
return computedHash == _root; | ||
} | ||
} |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
MerkleProof | ||
============================================= | ||
|
||
Merkle proof verification for leaves of a Merkle tree. | ||
|
||
verifyProof(bytes _proof, bytes32 _root, bytes32 _leaf) internal constant returns (bool) | ||
""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""" | ||
|
||
Verifies a Merkle proof proving the existence of a leaf in a Merkle tree. Assumes that each pair of leaves and each pair of pre-images is sorted. |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,60 @@ | ||
var MerkleProof = artifacts.require("./MerkleProof.sol"); | ||
|
||
import MerkleTree from "./helpers/merkleTree.js"; | ||
import { sha3, bufferToHex } from "ethereumjs-util"; | ||
|
||
contract('MerkleProof', function(accounts) { | ||
let merkleProof; | ||
|
||
before(async function() { | ||
merkleProof = await MerkleProof.new(); | ||
}); | ||
|
||
describe("verifyProof", function() { | ||
it("should return true for a valid Merkle proof", async function() { | ||
const elements = ["a", "b", "c", "d"]; | ||
const merkleTree = new MerkleTree(elements); | ||
|
||
const root = merkleTree.getHexRoot(); | ||
|
||
const proof = merkleTree.getHexProof(elements[0]); | ||
|
||
const leaf = bufferToHex(sha3(elements[0])); | ||
|
||
const result = await merkleProof.verifyProof(proof, root, leaf); | ||
assert.isOk(result, "verifyProof did not return true for a valid proof"); | ||
}); | ||
|
||
it("should return false for an invalid Merkle proof", async function() { | ||
const correctElements = ["a", "b", "c"] | ||
const correctMerkleTree = new MerkleTree(correctElements); | ||
|
||
const correctRoot = correctMerkleTree.getHexRoot(); | ||
|
||
const correctLeaf = bufferToHex(sha3(correctElements[0])); | ||
|
||
const badElements = ["d", "e", "f"] | ||
const badMerkleTree = new MerkleTree(badElements) | ||
|
||
const badProof = badMerkleTree.getHexProof(badElements[0]) | ||
|
||
const result = await merkleProof.verifyProof(badProof, correctRoot, correctLeaf); | ||
assert.isNotOk(result, "verifyProof did not return false for an invalid proof"); | ||
}); | ||
|
||
it("should return false for a Merkle proof of invalid length", async function() { | ||
const elements = ["a", "b", "c"] | ||
const merkleTree = new MerkleTree(elements); | ||
|
||
const root = merkleTree.getHexRoot(); | ||
|
||
const proof = merkleTree.getHexProof(elements[0]); | ||
const badProof = proof.slice(0, proof.length - 5); | ||
|
||
const leaf = bufferToHex(sha3(elements[0])); | ||
|
||
const result = await merkleProof.verifyProof(badProof, root, leaf); | ||
assert.isNotOk(result, "verifyProof did not return false for proof of invalid length"); | ||
}) | ||
}); | ||
}); |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,131 @@ | ||
import { sha3, bufferToHex } from "ethereumjs-util"; | ||
|
||
export default class MerkleTree { | ||
constructor(elements) { | ||
// Filter empty strings and hash elements | ||
this.elements = elements.filter(el => el).map(el => sha3(el)); | ||
|
||
// Deduplicate elements | ||
this.elements = this.bufDedup(this.elements); | ||
// Sort elements | ||
this.elements.sort(Buffer.compare); | ||
|
||
// Create layers | ||
this.layers = this.getLayers(this.elements); | ||
} | ||
|
||
getLayers(elements) { | ||
if (elements.length == 0) { | ||
return [[""]]; | ||
} | ||
|
||
const layers = []; | ||
layers.push(elements); | ||
|
||
// Get next layer until we reach the root | ||
while (layers[layers.length - 1].length > 1) { | ||
layers.push(this.getNextLayer(layers[layers.length - 1])); | ||
} | ||
|
||
return layers; | ||
} | ||
|
||
getNextLayer(elements) { | ||
return elements.reduce((layer, el, idx, arr) => { | ||
if (idx % 2 === 0) { | ||
// Hash the current element with its pair element | ||
layer.push(this.combinedHash(el, arr[idx + 1])); | ||
} | ||
|
||
return layer; | ||
}, []); | ||
} | ||
|
||
combinedHash(first, second) { | ||
if (!first) { return second; } | ||
if (!second) { return first; } | ||
|
||
return sha3(this.sortAndConcat(first, second)); | ||
} | ||
|
||
getRoot() { | ||
return this.layers[this.layers.length - 1][0]; | ||
} | ||
|
||
getHexRoot() { | ||
return bufferToHex(this.getRoot()); | ||
} | ||
|
||
getProof(el) { | ||
let idx = this.bufIndexOf(el, this.elements); | ||
|
||
if (idx === -1) { | ||
throw new Error("Element does not exist in Merkle tree"); | ||
} | ||
|
||
return this.layers.reduce((proof, layer) => { | ||
const pairElement = this.getPairElement(idx, layer); | ||
|
||
if (pairElement) { | ||
proof.push(pairElement); | ||
} | ||
|
||
idx = Math.floor(idx / 2); | ||
|
||
return proof; | ||
}, []); | ||
} | ||
|
||
getHexProof(el) { | ||
const proof = this.getProof(el); | ||
|
||
return this.bufArrToHex(proof); | ||
} | ||
|
||
getPairElement(idx, layer) { | ||
const pairIdx = idx % 2 === 0 ? idx + 1 : idx - 1; | ||
|
||
if (pairIdx < layer.length) { | ||
return layer[pairIdx]; | ||
} else { | ||
return null; | ||
} | ||
} | ||
|
||
bufIndexOf(el, arr) { | ||
let hash; | ||
|
||
// Convert element to 32 byte hash if it is not one already | ||
if (el.length !== 32 || !Buffer.isBuffer(el)) { | ||
hash = sha3(el); | ||
} else { | ||
hash = el; | ||
} | ||
|
||
for (let i = 0; i < arr.length; i++) { | ||
if (hash.equals(arr[i])) { | ||
return i; | ||
} | ||
} | ||
|
||
return -1; | ||
} | ||
|
||
bufDedup(elements) { | ||
return elements.filter((el, idx) => { | ||
return this.bufIndexOf(el, elements) === idx; | ||
}); | ||
} | ||
|
||
bufArrToHex(arr) { | ||
if (arr.some(el => !Buffer.isBuffer(el))) { | ||
throw new Error("Array is not an array of buffers"); | ||
} | ||
|
||
return "0x" + arr.map(el => el.toString("hex")).join(""); | ||
} | ||
|
||
sortAndConcat(...args) { | ||
return Buffer.concat([...args].sort(Buffer.compare)); | ||
} | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Comparing this implementation to https://github.com/raiden-network/raiden/blob/master/raiden/smart_contracts/NettingChannelLibrary.sol#L268, it seems the only difference is whether to hash the
leaf
element before entering the loop.I guess the difference is on how you build the tree: is it the tree who hashes every element initially to form the leaves, or should the tree's user do it (as is the case here)?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it makes sense for
_leaf
to be the hash of the leaf element instead of the actual leaf element since it avoids an additionalkeccak256
operation on-chain - the more logic that can be pushed off-chain the better imo. Then, the comments/documentation can make it clearer that_leaf
should be the hash of the leaf element and not the actual leaf element.