use std::collections::HashMap;
use triton_vm::prelude::*;
use crate::prelude::*;
use crate::traits::basic_snippet::Reviewer;
use crate::traits::basic_snippet::SignOffFingerprint;
#[derive(Clone, Debug)]
pub struct MerkleVerify;
impl MerkleVerify {
pub const TREE_TOO_HIGH_ERROR_ID: i128 = 0;
pub const OUT_OF_BOUNDS_LEAF_ERROR_ID: i128 = 1;
pub const ROOT_MISMATCH_ERROR_ID: i128 = 2;
}
impl BasicSnippet for MerkleVerify {
fn inputs(&self) -> Vec<(DataType, String)> {
vec![
(DataType::Digest, "root".to_string()),
(DataType::U32, "tree_height".to_string()),
(DataType::U32, "leaf_index".to_string()),
(DataType::Digest, "leaf".to_string()),
]
}
fn outputs(&self) -> Vec<(DataType, String)> {
vec![]
}
fn entrypoint(&self) -> String {
"tasmlib_hashing_merkle_verify".to_string()
}
fn code(&self, _: &mut Library) -> Vec<LabelledInstruction> {
let entrypoint = self.entrypoint();
let traverse_tree = format!("{entrypoint}_traverse_tree");
let tree_height_is_not_zero = format!("{entrypoint}_tree_height_is_not_zero");
triton_asm!(
{entrypoint}:
push 32
dup 7
lt
assert error_id {Self::TREE_TOO_HIGH_ERROR_ID}
dup 6
push 2
pow
dup 0 dup 7 lt
assert error_id {Self::OUT_OF_BOUNDS_LEAF_ERROR_ID}
pick 6
add
place 5
pick 6
skiz
call {tree_height_is_not_zero}
pick 5
pop 1
assert_vector error_id {Self::ROOT_MISMATCH_ERROR_ID}
pop 5
return
{tree_height_is_not_zero}:
push 1
place 6
call {traverse_tree}
pick 6
pop 1
return
{traverse_tree}:
merkle_step
recurse_or_return
)
}
fn sign_offs(&self) -> HashMap<Reviewer, SignOffFingerprint> {
let mut sign_offs = HashMap::new();
sign_offs.insert(Reviewer("ferdinand"), 0x54be0725136e609e.into());
sign_offs
}
}
#[cfg(test)]
mod tests {
use std::collections::VecDeque;
use proptest::collection::vec;
use super::*;
use crate::test_helpers::negative_test;
use crate::test_prelude::*;
impl ReadOnlyAlgorithm for MerkleVerify {
fn rust_shadow(
&self,
stack: &mut Vec<BFieldElement>,
_: &HashMap<BFieldElement, BFieldElement>,
_: VecDeque<BFieldElement>,
mut nd_digests: VecDeque<Digest>,
) {
let leaf = pop_encodable(stack);
let leaf_index = pop_encodable::<u32>(stack);
let tree_height = pop_encodable::<u32>(stack);
let root = pop_encodable(stack);
let num_leaves = 1 << tree_height;
assert!(leaf_index < num_leaves);
let mut node_digest = leaf;
let mut node_index = leaf_index + num_leaves;
while node_index != 1 {
let sibling = nd_digests.pop_front().unwrap();
let node_is_left_sibling = node_index % 2 == 0;
node_digest = if node_is_left_sibling {
Tip5::hash_pair(node_digest, sibling)
} else {
Tip5::hash_pair(sibling, node_digest)
};
node_index /= 2;
}
assert_eq!(node_digest, root);
}
fn pseudorandom_initial_state(
&self,
seed: [u8; 32],
maybe_bench_case: Option<BenchmarkCase>,
) -> ReadOnlyAlgorithmInitialState {
let mut rng = StdRng::from_seed(seed);
let tree_height = match maybe_bench_case {
Some(BenchmarkCase::CommonCase) => 6,
Some(BenchmarkCase::WorstCase) => 20,
None => rng.random_range(1..20),
};
let num_leaves = 1 << tree_height;
let leaf_index = rng.random_range(0..num_leaves);
let path = (0..tree_height).map(|_| rng.random()).collect_vec();
let leaf = rng.random();
let mut current_node = leaf;
let mut node_index = leaf_index + num_leaves;
for &sibling in &path {
let node_is_left_sibling = node_index % 2 == 0;
current_node = if node_is_left_sibling {
Tip5::hash_pair(current_node, sibling)
} else {
Tip5::hash_pair(sibling, current_node)
};
node_index /= 2;
}
let root = current_node;
let mut stack = Self.init_stack_for_isolated_run();
push_encodable(&mut stack, &root);
push_encodable(&mut stack, &tree_height);
push_encodable(&mut stack, &leaf_index);
push_encodable(&mut stack, &leaf);
let nondeterminism = NonDeterminism::default().with_digests(path);
ReadOnlyAlgorithmInitialState {
stack,
nondeterminism,
}
}
}
#[test]
fn merkle_verify_test() {
ShadowedReadOnlyAlgorithm::new(MerkleVerify).test()
}
#[proptest]
fn merkle_tree_verification_fails_if_leaf_is_disturbed_slightly(
seed: [u8; 32],
#[strategy(0_usize..5)] perturbation_index: usize,
#[filter(#perturbation != 0)] perturbation: i8,
) {
let mut initial_state = MerkleVerify.pseudorandom_initial_state(seed, None);
let top_of_stack = initial_state.stack.len() - 1;
initial_state.stack[top_of_stack - perturbation_index] += bfe!(perturbation);
test_assertion_failure(
&ShadowedReadOnlyAlgorithm::new(MerkleVerify),
initial_state.into(),
&[2],
);
}
#[proptest]
fn merkle_tree_verification_fails_if_leaf_index_is_disturbed_slightly(
seed: [u8; 32],
#[filter(#perturbation != 0)] perturbation: i8,
) {
let mut initial_state = MerkleVerify.pseudorandom_initial_state(seed, None);
let top_of_stack = initial_state.stack.len() - 1;
let leaf_index_index = top_of_stack - 5;
initial_state.stack[leaf_index_index] += bfe!(perturbation);
let leaf_index = initial_state.stack[leaf_index_index];
prop_assume!(u32::try_from(leaf_index).is_ok());
test_assertion_failure(
&ShadowedReadOnlyAlgorithm::new(MerkleVerify),
initial_state.into(),
&[1, 2],
);
}
#[proptest]
fn merkle_tree_verification_fails_if_leaf_index_is_out_of_range(
seed: [u8; 32],
#[strategy(u64::from(u32::MAX)..=BFieldElement::MAX)]
#[map(BFieldElement::new)]
leaf_index: BFieldElement,
) {
let mut initial_state = MerkleVerify.pseudorandom_initial_state(seed, None);
let top_of_stack = initial_state.stack.len() - 1;
let leaf_index_index = top_of_stack - 5;
initial_state.stack[leaf_index_index] = leaf_index;
negative_test(
&ShadowedReadOnlyAlgorithm::new(MerkleVerify),
initial_state.into(),
&[OpStackError::FailedU32Conversion(leaf_index).into()],
);
}
#[proptest]
fn merkle_tree_verification_fails_if_tree_height_is_disturbed_slightly(
seed: [u8; 32],
#[strategy(-32_i8..32)]
#[filter(#perturbation != 0)]
perturbation: i8,
#[strategy(vec(arb(), #perturbation.clamp(0, 32) as usize))]
additional_bogus_tree_nodes: Vec<Digest>,
) {
let mut initial_state = MerkleVerify.pseudorandom_initial_state(seed, None);
let top_of_stack = initial_state.stack.len() - 1;
let tree_height_index = top_of_stack - 6;
initial_state.stack[tree_height_index] += bfe!(perturbation);
let perturbed_tree_height = initial_state.stack[tree_height_index];
prop_assume!(u32::try_from(perturbed_tree_height).is_ok());
prop_assume!(perturbed_tree_height.value() < 32);
initial_state
.nondeterminism
.digests
.extend(additional_bogus_tree_nodes);
let expected_errors = [
MerkleVerify::OUT_OF_BOUNDS_LEAF_ERROR_ID,
MerkleVerify::ROOT_MISMATCH_ERROR_ID,
];
test_assertion_failure(
&ShadowedReadOnlyAlgorithm::new(MerkleVerify),
initial_state.into(),
&expected_errors,
);
}
#[proptest]
fn merkle_tree_verification_fails_if_tree_height_is_too_large(
seed: [u8; 32],
#[strategy(32_u32..)] tree_height: u32,
) {
let mut initial_state = MerkleVerify.pseudorandom_initial_state(seed, None);
let top_of_stack = initial_state.stack.len() - 1;
let tree_height_index = top_of_stack - 6;
initial_state.stack[tree_height_index] = bfe!(tree_height);
test_assertion_failure(
&ShadowedReadOnlyAlgorithm::new(MerkleVerify),
initial_state.into(),
&[MerkleVerify::TREE_TOO_HIGH_ERROR_ID],
);
}
#[proptest]
fn merkle_tree_verification_fails_if_tree_height_is_way_too_large(
seed: [u8; 32],
#[strategy(u64::from(u32::MAX)..=BFieldElement::MAX)]
#[map(BFieldElement::new)]
tree_height: BFieldElement,
) {
let mut initial_state = MerkleVerify.pseudorandom_initial_state(seed, None);
let top_of_stack = initial_state.stack.len() - 1;
let tree_height_index = top_of_stack - 6;
initial_state.stack[tree_height_index] = tree_height;
negative_test(
&ShadowedReadOnlyAlgorithm::new(MerkleVerify),
initial_state.into(),
&[OpStackError::FailedU32Conversion(tree_height).into()],
);
}
#[proptest]
fn merkle_tree_verification_fails_if_root_is_disturbed_slightly(
seed: [u8; 32],
#[strategy(7_usize..12)] perturbation_index: usize,
#[filter(#perturbation != 0)] perturbation: i8,
) {
let mut initial_state = MerkleVerify.pseudorandom_initial_state(seed, None);
let top_of_stack = initial_state.stack.len() - 1;
initial_state.stack[top_of_stack - perturbation_index] += bfe!(perturbation);
test_assertion_failure(
&ShadowedReadOnlyAlgorithm::new(MerkleVerify),
initial_state.into(),
&[MerkleVerify::ROOT_MISMATCH_ERROR_ID],
);
}
}
#[cfg(test)]
mod bench {
use super::*;
use crate::test_prelude::*;
#[test]
fn benchmark() {
ShadowedReadOnlyAlgorithm::new(MerkleVerify).bench()
}
}