@aztec/noir-acvm_js 0.0.1-commit.f295ac2 → 0.0.1-commit.f2ce05ee

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/nodejs/acvm_js.js CHANGED
@@ -229,122 +229,132 @@ module.exports.initLogLevel = function(filter) {
229
229
  }
230
230
  };
231
231
 
232
- function passArray8ToWasm0(arg, malloc) {
233
- const ptr = malloc(arg.length * 1, 1) >>> 0;
234
- getUint8ArrayMemory0().set(arg, ptr / 1);
235
- WASM_VECTOR_LEN = arg.length;
236
- return ptr;
237
- }
238
232
  /**
239
- * Executes an ACIR circuit to generate the solved witness from the initial witness.
240
- *
241
- * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
242
- * @param {WitnessMap} initial_witness - The initial witness map defining all of the inputs to `circuit`..
243
- * @param {ForeignCallHandler} foreign_call_handler - A callback to process any foreign calls from the circuit.
244
- * @returns {WitnessMap} The solved witness calculated by executing the circuit on the provided inputs.
233
+ * Performs a bitwise AND operation between `lhs` and `rhs`
234
+ * @param {string} lhs
235
+ * @param {string} rhs
236
+ * @returns {string}
245
237
  */
246
- module.exports.executeCircuit = function(program, initial_witness, foreign_call_handler) {
247
- const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
248
- const len0 = WASM_VECTOR_LEN;
249
- const ret = wasm.executeCircuit(ptr0, len0, initial_witness, foreign_call_handler);
238
+ module.exports.and = function(lhs, rhs) {
239
+ const ret = wasm.and(lhs, rhs);
250
240
  return ret;
251
241
  };
252
242
 
253
243
  /**
254
- * Executes an ACIR circuit to generate the solved witness from the initial witness.
255
- * This method also extracts the public return values from the solved witness into its own return witness.
256
- *
257
- * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
258
- * @param {WitnessMap} initial_witness - The initial witness map defining all of the inputs to `circuit`..
259
- * @param {ForeignCallHandler} foreign_call_handler - A callback to process any foreign calls from the circuit.
260
- * @returns {SolvedAndReturnWitness} The solved witness calculated by executing the circuit on the provided inputs, as well as the return witness indices as specified by the circuit.
244
+ * Performs a bitwise XOR operation between `lhs` and `rhs`
245
+ * @param {string} lhs
246
+ * @param {string} rhs
247
+ * @returns {string}
261
248
  */
262
- module.exports.executeCircuitWithReturnWitness = function(program, initial_witness, foreign_call_handler) {
263
- const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
264
- const len0 = WASM_VECTOR_LEN;
265
- const ret = wasm.executeCircuitWithReturnWitness(ptr0, len0, initial_witness, foreign_call_handler);
249
+ module.exports.xor = function(lhs, rhs) {
250
+ const ret = wasm.xor(lhs, rhs);
266
251
  return ret;
267
252
  };
268
253
 
254
+ let cachedUint32ArrayMemory0 = null;
255
+
256
+ function getUint32ArrayMemory0() {
257
+ if (cachedUint32ArrayMemory0 === null || cachedUint32ArrayMemory0.byteLength === 0) {
258
+ cachedUint32ArrayMemory0 = new Uint32Array(wasm.memory.buffer);
259
+ }
260
+ return cachedUint32ArrayMemory0;
261
+ }
262
+
263
+ function passArray32ToWasm0(arg, malloc) {
264
+ const ptr = malloc(arg.length * 4, 4) >>> 0;
265
+ getUint32ArrayMemory0().set(arg, ptr / 4);
266
+ WASM_VECTOR_LEN = arg.length;
267
+ return ptr;
268
+ }
269
+
270
+ function getArrayU32FromWasm0(ptr, len) {
271
+ ptr = ptr >>> 0;
272
+ return getUint32ArrayMemory0().subarray(ptr / 4, ptr / 4 + len);
273
+ }
269
274
  /**
270
- * Executes an ACIR circuit to generate the solved witness from the initial witness.
271
- *
272
- * @param {Uint8Array} program - A serialized representation of an ACIR program
273
- * @param {WitnessMap} initial_witness - The initial witness map defining all of the inputs to `program`.
274
- * @param {ForeignCallHandler} foreign_call_handler - A callback to process any foreign calls from the program.
275
- * @returns {WitnessStack} The solved witness calculated by executing the program on the provided inputs.
275
+ * Sha256 compression function
276
+ * @param {Uint32Array} inputs
277
+ * @param {Uint32Array} state
278
+ * @returns {Uint32Array}
276
279
  */
277
- module.exports.executeProgram = function(program, initial_witness, foreign_call_handler) {
278
- const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
280
+ module.exports.sha256_compression = function(inputs, state) {
281
+ const ptr0 = passArray32ToWasm0(inputs, wasm.__wbindgen_malloc);
279
282
  const len0 = WASM_VECTOR_LEN;
280
- const ret = wasm.executeProgram(ptr0, len0, initial_witness, foreign_call_handler);
281
- return ret;
283
+ const ptr1 = passArray32ToWasm0(state, wasm.__wbindgen_malloc);
284
+ const len1 = WASM_VECTOR_LEN;
285
+ const ret = wasm.sha256_compression(ptr0, len0, ptr1, len1);
286
+ var v3 = getArrayU32FromWasm0(ret[0], ret[1]).slice();
287
+ wasm.__wbindgen_free(ret[0], ret[1] * 4, 4);
288
+ return v3;
282
289
  };
283
290
 
291
+ function passArray8ToWasm0(arg, malloc) {
292
+ const ptr = malloc(arg.length * 1, 1) >>> 0;
293
+ getUint8ArrayMemory0().set(arg, ptr / 1);
294
+ WASM_VECTOR_LEN = arg.length;
295
+ return ptr;
296
+ }
297
+
298
+ function getArrayU8FromWasm0(ptr, len) {
299
+ ptr = ptr >>> 0;
300
+ return getUint8ArrayMemory0().subarray(ptr / 1, ptr / 1 + len);
301
+ }
284
302
  /**
285
- * Extracts a `WitnessMap` containing the witness indices corresponding to the circuit's return values.
286
- *
287
- * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
288
- * @param {WitnessMap} witness_map - The completed witness map after executing the circuit.
289
- * @returns {WitnessMap} A witness map containing the circuit's return values.
290
- * @param {Uint8Array} program
291
- * @param {WitnessMap} witness_map
292
- * @returns {WitnessMap}
303
+ * Calculates the Blake2s256 hash of the input bytes
304
+ * @param {Uint8Array} inputs
305
+ * @returns {Uint8Array}
293
306
  */
294
- module.exports.getReturnWitness = function(program, witness_map) {
295
- const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
307
+ module.exports.blake2s256 = function(inputs) {
308
+ const ptr0 = passArray8ToWasm0(inputs, wasm.__wbindgen_malloc);
296
309
  const len0 = WASM_VECTOR_LEN;
297
- const ret = wasm.getReturnWitness(ptr0, len0, witness_map);
298
- if (ret[2]) {
299
- throw takeFromExternrefTable0(ret[1]);
300
- }
301
- return takeFromExternrefTable0(ret[0]);
310
+ const ret = wasm.blake2s256(ptr0, len0);
311
+ var v2 = getArrayU8FromWasm0(ret[0], ret[1]).slice();
312
+ wasm.__wbindgen_free(ret[0], ret[1] * 1, 1);
313
+ return v2;
302
314
  };
303
315
 
304
316
  /**
305
- * Extracts a `WitnessMap` containing the witness indices corresponding to the circuit's public parameters.
306
- *
307
- * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
308
- * @param {WitnessMap} witness_map - The completed witness map after executing the circuit.
309
- * @returns {WitnessMap} A witness map containing the circuit's public parameters.
310
- * @param {Uint8Array} program
311
- * @param {WitnessMap} solved_witness
312
- * @returns {WitnessMap}
317
+ * Verifies a ECDSA signature over the secp256k1 curve.
318
+ * @param {Uint8Array} hashed_msg
319
+ * @param {Uint8Array} public_key_x_bytes
320
+ * @param {Uint8Array} public_key_y_bytes
321
+ * @param {Uint8Array} signature
322
+ * @returns {boolean}
313
323
  */
314
- module.exports.getPublicParametersWitness = function(program, solved_witness) {
315
- const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
324
+ module.exports.ecdsa_secp256k1_verify = function(hashed_msg, public_key_x_bytes, public_key_y_bytes, signature) {
325
+ const ptr0 = passArray8ToWasm0(hashed_msg, wasm.__wbindgen_malloc);
316
326
  const len0 = WASM_VECTOR_LEN;
317
- const ret = wasm.getPublicParametersWitness(ptr0, len0, solved_witness);
318
- if (ret[2]) {
319
- throw takeFromExternrefTable0(ret[1]);
320
- }
321
- return takeFromExternrefTable0(ret[0]);
327
+ const ptr1 = passArray8ToWasm0(public_key_x_bytes, wasm.__wbindgen_malloc);
328
+ const len1 = WASM_VECTOR_LEN;
329
+ const ptr2 = passArray8ToWasm0(public_key_y_bytes, wasm.__wbindgen_malloc);
330
+ const len2 = WASM_VECTOR_LEN;
331
+ const ptr3 = passArray8ToWasm0(signature, wasm.__wbindgen_malloc);
332
+ const len3 = WASM_VECTOR_LEN;
333
+ const ret = wasm.ecdsa_secp256k1_verify(ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3);
334
+ return ret !== 0;
322
335
  };
323
336
 
324
337
  /**
325
- * Extracts a `WitnessMap` containing the witness indices corresponding to the circuit's public inputs.
326
- *
327
- * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
328
- * @param {WitnessMap} witness_map - The completed witness map after executing the circuit.
329
- * @returns {WitnessMap} A witness map containing the circuit's public inputs.
330
- * @param {Uint8Array} program
331
- * @param {WitnessMap} solved_witness
332
- * @returns {WitnessMap}
338
+ * Verifies a ECDSA signature over the secp256r1 curve.
339
+ * @param {Uint8Array} hashed_msg
340
+ * @param {Uint8Array} public_key_x_bytes
341
+ * @param {Uint8Array} public_key_y_bytes
342
+ * @param {Uint8Array} signature
343
+ * @returns {boolean}
333
344
  */
334
- module.exports.getPublicWitness = function(program, solved_witness) {
335
- const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
345
+ module.exports.ecdsa_secp256r1_verify = function(hashed_msg, public_key_x_bytes, public_key_y_bytes, signature) {
346
+ const ptr0 = passArray8ToWasm0(hashed_msg, wasm.__wbindgen_malloc);
336
347
  const len0 = WASM_VECTOR_LEN;
337
- const ret = wasm.getPublicWitness(ptr0, len0, solved_witness);
338
- if (ret[2]) {
339
- throw takeFromExternrefTable0(ret[1]);
340
- }
341
- return takeFromExternrefTable0(ret[0]);
348
+ const ptr1 = passArray8ToWasm0(public_key_x_bytes, wasm.__wbindgen_malloc);
349
+ const len1 = WASM_VECTOR_LEN;
350
+ const ptr2 = passArray8ToWasm0(public_key_y_bytes, wasm.__wbindgen_malloc);
351
+ const len2 = WASM_VECTOR_LEN;
352
+ const ptr3 = passArray8ToWasm0(signature, wasm.__wbindgen_malloc);
353
+ const len3 = WASM_VECTOR_LEN;
354
+ const ret = wasm.ecdsa_secp256r1_verify(ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3);
355
+ return ret !== 0;
342
356
  };
343
357
 
344
- function getArrayU8FromWasm0(ptr, len) {
345
- ptr = ptr >>> 0;
346
- return getUint8ArrayMemory0().subarray(ptr / 1, ptr / 1 + len);
347
- }
348
358
  /**
349
359
  * Compresses a `WitnessMap` into the binary format outputted by Nargo.
350
360
  *
@@ -411,130 +421,121 @@ module.exports.decompressWitnessStack = function(compressed_witness) {
411
421
  };
412
422
 
413
423
  /**
414
- * Performs a bitwise AND operation between `lhs` and `rhs`
415
- * @param {string} lhs
416
- * @param {string} rhs
417
- * @returns {string}
424
+ * Executes an ACIR circuit to generate the solved witness from the initial witness.
425
+ *
426
+ * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
427
+ * @param {WitnessMap} initial_witness - The initial witness map defining all of the inputs to `circuit`..
428
+ * @param {ForeignCallHandler} foreign_call_handler - A callback to process any foreign calls from the circuit.
429
+ * @returns {WitnessMap} The solved witness calculated by executing the circuit on the provided inputs.
418
430
  */
419
- module.exports.and = function(lhs, rhs) {
420
- const ret = wasm.and(lhs, rhs);
431
+ module.exports.executeCircuit = function(program, initial_witness, foreign_call_handler) {
432
+ const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
433
+ const len0 = WASM_VECTOR_LEN;
434
+ const ret = wasm.executeCircuit(ptr0, len0, initial_witness, foreign_call_handler);
421
435
  return ret;
422
436
  };
423
437
 
424
438
  /**
425
- * Performs a bitwise XOR operation between `lhs` and `rhs`
426
- * @param {string} lhs
427
- * @param {string} rhs
428
- * @returns {string}
439
+ * Executes an ACIR circuit to generate the solved witness from the initial witness.
440
+ * This method also extracts the public return values from the solved witness into its own return witness.
441
+ *
442
+ * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
443
+ * @param {WitnessMap} initial_witness - The initial witness map defining all of the inputs to `circuit`..
444
+ * @param {ForeignCallHandler} foreign_call_handler - A callback to process any foreign calls from the circuit.
445
+ * @returns {SolvedAndReturnWitness} The solved witness calculated by executing the circuit on the provided inputs, as well as the return witness indices as specified by the circuit.
429
446
  */
430
- module.exports.xor = function(lhs, rhs) {
431
- const ret = wasm.xor(lhs, rhs);
447
+ module.exports.executeCircuitWithReturnWitness = function(program, initial_witness, foreign_call_handler) {
448
+ const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
449
+ const len0 = WASM_VECTOR_LEN;
450
+ const ret = wasm.executeCircuitWithReturnWitness(ptr0, len0, initial_witness, foreign_call_handler);
432
451
  return ret;
433
452
  };
434
453
 
435
- let cachedUint32ArrayMemory0 = null;
436
-
437
- function getUint32ArrayMemory0() {
438
- if (cachedUint32ArrayMemory0 === null || cachedUint32ArrayMemory0.byteLength === 0) {
439
- cachedUint32ArrayMemory0 = new Uint32Array(wasm.memory.buffer);
440
- }
441
- return cachedUint32ArrayMemory0;
442
- }
443
-
444
- function passArray32ToWasm0(arg, malloc) {
445
- const ptr = malloc(arg.length * 4, 4) >>> 0;
446
- getUint32ArrayMemory0().set(arg, ptr / 4);
447
- WASM_VECTOR_LEN = arg.length;
448
- return ptr;
449
- }
450
-
451
- function getArrayU32FromWasm0(ptr, len) {
452
- ptr = ptr >>> 0;
453
- return getUint32ArrayMemory0().subarray(ptr / 4, ptr / 4 + len);
454
- }
455
454
  /**
456
- * Sha256 compression function
457
- * @param {Uint32Array} inputs
458
- * @param {Uint32Array} state
459
- * @returns {Uint32Array}
455
+ * Executes an ACIR circuit to generate the solved witness from the initial witness.
456
+ *
457
+ * @param {Uint8Array} program - A serialized representation of an ACIR program
458
+ * @param {WitnessMap} initial_witness - The initial witness map defining all of the inputs to `program`.
459
+ * @param {ForeignCallHandler} foreign_call_handler - A callback to process any foreign calls from the program.
460
+ * @returns {WitnessStack} The solved witness calculated by executing the program on the provided inputs.
460
461
  */
461
- module.exports.sha256_compression = function(inputs, state) {
462
- const ptr0 = passArray32ToWasm0(inputs, wasm.__wbindgen_malloc);
462
+ module.exports.executeProgram = function(program, initial_witness, foreign_call_handler) {
463
+ const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
463
464
  const len0 = WASM_VECTOR_LEN;
464
- const ptr1 = passArray32ToWasm0(state, wasm.__wbindgen_malloc);
465
- const len1 = WASM_VECTOR_LEN;
466
- const ret = wasm.sha256_compression(ptr0, len0, ptr1, len1);
467
- var v3 = getArrayU32FromWasm0(ret[0], ret[1]).slice();
468
- wasm.__wbindgen_free(ret[0], ret[1] * 4, 4);
469
- return v3;
465
+ const ret = wasm.executeProgram(ptr0, len0, initial_witness, foreign_call_handler);
466
+ return ret;
470
467
  };
471
468
 
472
469
  /**
473
- * Calculates the Blake2s256 hash of the input bytes
474
- * @param {Uint8Array} inputs
475
- * @returns {Uint8Array}
470
+ * Extracts a `WitnessMap` containing the witness indices corresponding to the circuit's return values.
471
+ *
472
+ * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
473
+ * @param {WitnessMap} witness_map - The completed witness map after executing the circuit.
474
+ * @returns {WitnessMap} A witness map containing the circuit's return values.
475
+ * @param {Uint8Array} program
476
+ * @param {WitnessMap} witness_map
477
+ * @returns {WitnessMap}
476
478
  */
477
- module.exports.blake2s256 = function(inputs) {
478
- const ptr0 = passArray8ToWasm0(inputs, wasm.__wbindgen_malloc);
479
+ module.exports.getReturnWitness = function(program, witness_map) {
480
+ const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
479
481
  const len0 = WASM_VECTOR_LEN;
480
- const ret = wasm.blake2s256(ptr0, len0);
481
- var v2 = getArrayU8FromWasm0(ret[0], ret[1]).slice();
482
- wasm.__wbindgen_free(ret[0], ret[1] * 1, 1);
483
- return v2;
482
+ const ret = wasm.getReturnWitness(ptr0, len0, witness_map);
483
+ if (ret[2]) {
484
+ throw takeFromExternrefTable0(ret[1]);
485
+ }
486
+ return takeFromExternrefTable0(ret[0]);
484
487
  };
485
488
 
486
489
  /**
487
- * Verifies a ECDSA signature over the secp256k1 curve.
488
- * @param {Uint8Array} hashed_msg
489
- * @param {Uint8Array} public_key_x_bytes
490
- * @param {Uint8Array} public_key_y_bytes
491
- * @param {Uint8Array} signature
492
- * @returns {boolean}
490
+ * Extracts a `WitnessMap` containing the witness indices corresponding to the circuit's public parameters.
491
+ *
492
+ * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
493
+ * @param {WitnessMap} witness_map - The completed witness map after executing the circuit.
494
+ * @returns {WitnessMap} A witness map containing the circuit's public parameters.
495
+ * @param {Uint8Array} program
496
+ * @param {WitnessMap} solved_witness
497
+ * @returns {WitnessMap}
493
498
  */
494
- module.exports.ecdsa_secp256k1_verify = function(hashed_msg, public_key_x_bytes, public_key_y_bytes, signature) {
495
- const ptr0 = passArray8ToWasm0(hashed_msg, wasm.__wbindgen_malloc);
499
+ module.exports.getPublicParametersWitness = function(program, solved_witness) {
500
+ const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
496
501
  const len0 = WASM_VECTOR_LEN;
497
- const ptr1 = passArray8ToWasm0(public_key_x_bytes, wasm.__wbindgen_malloc);
498
- const len1 = WASM_VECTOR_LEN;
499
- const ptr2 = passArray8ToWasm0(public_key_y_bytes, wasm.__wbindgen_malloc);
500
- const len2 = WASM_VECTOR_LEN;
501
- const ptr3 = passArray8ToWasm0(signature, wasm.__wbindgen_malloc);
502
- const len3 = WASM_VECTOR_LEN;
503
- const ret = wasm.ecdsa_secp256k1_verify(ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3);
504
- return ret !== 0;
502
+ const ret = wasm.getPublicParametersWitness(ptr0, len0, solved_witness);
503
+ if (ret[2]) {
504
+ throw takeFromExternrefTable0(ret[1]);
505
+ }
506
+ return takeFromExternrefTable0(ret[0]);
505
507
  };
506
508
 
507
509
  /**
508
- * Verifies a ECDSA signature over the secp256r1 curve.
509
- * @param {Uint8Array} hashed_msg
510
- * @param {Uint8Array} public_key_x_bytes
511
- * @param {Uint8Array} public_key_y_bytes
512
- * @param {Uint8Array} signature
513
- * @returns {boolean}
510
+ * Extracts a `WitnessMap` containing the witness indices corresponding to the circuit's public inputs.
511
+ *
512
+ * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
513
+ * @param {WitnessMap} witness_map - The completed witness map after executing the circuit.
514
+ * @returns {WitnessMap} A witness map containing the circuit's public inputs.
515
+ * @param {Uint8Array} program
516
+ * @param {WitnessMap} solved_witness
517
+ * @returns {WitnessMap}
514
518
  */
515
- module.exports.ecdsa_secp256r1_verify = function(hashed_msg, public_key_x_bytes, public_key_y_bytes, signature) {
516
- const ptr0 = passArray8ToWasm0(hashed_msg, wasm.__wbindgen_malloc);
519
+ module.exports.getPublicWitness = function(program, solved_witness) {
520
+ const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
517
521
  const len0 = WASM_VECTOR_LEN;
518
- const ptr1 = passArray8ToWasm0(public_key_x_bytes, wasm.__wbindgen_malloc);
519
- const len1 = WASM_VECTOR_LEN;
520
- const ptr2 = passArray8ToWasm0(public_key_y_bytes, wasm.__wbindgen_malloc);
521
- const len2 = WASM_VECTOR_LEN;
522
- const ptr3 = passArray8ToWasm0(signature, wasm.__wbindgen_malloc);
523
- const len3 = WASM_VECTOR_LEN;
524
- const ret = wasm.ecdsa_secp256r1_verify(ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3);
525
- return ret !== 0;
522
+ const ret = wasm.getPublicWitness(ptr0, len0, solved_witness);
523
+ if (ret[2]) {
524
+ throw takeFromExternrefTable0(ret[1]);
525
+ }
526
+ return takeFromExternrefTable0(ret[0]);
526
527
  };
527
528
 
528
529
  function __wbg_adapter_30(arg0, arg1, arg2) {
529
- wasm.closure447_externref_shim(arg0, arg1, arg2);
530
+ wasm.closure445_externref_shim(arg0, arg1, arg2);
530
531
  }
531
532
 
532
533
  function __wbg_adapter_89(arg0, arg1, arg2, arg3, arg4) {
533
- wasm.closure932_externref_shim(arg0, arg1, arg2, arg3, arg4);
534
+ wasm.closure921_externref_shim(arg0, arg1, arg2, arg3, arg4);
534
535
  }
535
536
 
536
537
  function __wbg_adapter_110(arg0, arg1, arg2, arg3) {
537
- wasm.closure936_externref_shim(arg0, arg1, arg2, arg3);
538
+ wasm.closure925_externref_shim(arg0, arg1, arg2, arg3);
538
539
  }
539
540
 
540
541
  module.exports.__wbg_call_672a4d21634d4a24 = function() { return handleError(function (arg0, arg1) {
@@ -812,8 +813,8 @@ module.exports.__wbindgen_cb_drop = function(arg0) {
812
813
  return ret;
813
814
  };
814
815
 
815
- module.exports.__wbindgen_closure_wrapper1447 = function(arg0, arg1, arg2) {
816
- const ret = makeMutClosure(arg0, arg1, 448, __wbg_adapter_30);
816
+ module.exports.__wbindgen_closure_wrapper1365 = function(arg0, arg1, arg2) {
817
+ const ret = makeMutClosure(arg0, arg1, 446, __wbg_adapter_30);
817
818
  return ret;
818
819
  };
819
820
 
Binary file
@@ -3,22 +3,22 @@
3
3
  export const memory: WebAssembly.Memory;
4
4
  export const buildInfo: () => any;
5
5
  export const initLogLevel: (a: number, b: number) => [number, number];
6
- export const executeCircuit: (a: number, b: number, c: any, d: any) => any;
7
- export const executeCircuitWithReturnWitness: (a: number, b: number, c: any, d: any) => any;
8
- export const executeProgram: (a: number, b: number, c: any, d: any) => any;
9
- export const getReturnWitness: (a: number, b: number, c: any) => [number, number, number];
10
- export const getPublicParametersWitness: (a: number, b: number, c: any) => [number, number, number];
11
- export const getPublicWitness: (a: number, b: number, c: any) => [number, number, number];
12
- export const compressWitness: (a: any) => [number, number, number, number];
13
- export const decompressWitness: (a: number, b: number) => [number, number, number];
14
- export const compressWitnessStack: (a: any) => [number, number, number, number];
15
- export const decompressWitnessStack: (a: number, b: number) => [number, number, number];
16
6
  export const and: (a: any, b: any) => any;
17
7
  export const xor: (a: any, b: any) => any;
18
8
  export const sha256_compression: (a: number, b: number, c: number, d: number) => [number, number];
19
9
  export const blake2s256: (a: number, b: number) => [number, number];
20
10
  export const ecdsa_secp256k1_verify: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number) => number;
21
11
  export const ecdsa_secp256r1_verify: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number) => number;
12
+ export const compressWitness: (a: any) => [number, number, number, number];
13
+ export const decompressWitness: (a: number, b: number) => [number, number, number];
14
+ export const compressWitnessStack: (a: any) => [number, number, number, number];
15
+ export const decompressWitnessStack: (a: number, b: number) => [number, number, number];
16
+ export const executeCircuit: (a: number, b: number, c: any, d: any) => any;
17
+ export const executeCircuitWithReturnWitness: (a: number, b: number, c: any, d: any) => any;
18
+ export const executeProgram: (a: number, b: number, c: any, d: any) => any;
19
+ export const getReturnWitness: (a: number, b: number, c: any) => [number, number, number];
20
+ export const getPublicParametersWitness: (a: number, b: number, c: any) => [number, number, number];
21
+ export const getPublicWitness: (a: number, b: number, c: any) => [number, number, number];
22
22
  export const __wbindgen_exn_store: (a: number) => void;
23
23
  export const __externref_table_alloc: () => number;
24
24
  export const __wbindgen_export_2: WebAssembly.Table;
@@ -27,7 +27,7 @@ export const __wbindgen_malloc: (a: number, b: number) => number;
27
27
  export const __wbindgen_realloc: (a: number, b: number, c: number, d: number) => number;
28
28
  export const __wbindgen_export_6: WebAssembly.Table;
29
29
  export const __externref_table_dealloc: (a: number) => void;
30
- export const closure447_externref_shim: (a: number, b: number, c: any) => void;
31
- export const closure932_externref_shim: (a: number, b: number, c: any, d: number, e: any) => void;
32
- export const closure936_externref_shim: (a: number, b: number, c: any, d: any) => void;
30
+ export const closure445_externref_shim: (a: number, b: number, c: any) => void;
31
+ export const closure921_externref_shim: (a: number, b: number, c: any, d: number, e: any) => void;
32
+ export const closure925_externref_shim: (a: number, b: number, c: any, d: any) => void;
33
33
  export const __wbindgen_start: () => void;
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aztec/noir-acvm_js",
3
- "version": "0.0.1-commit.f295ac2",
3
+ "version": "0.0.1-commit.f2ce05ee",
4
4
  "publishConfig": {
5
5
  "access": "public"
6
6
  },
@@ -43,9 +43,9 @@
43
43
  "@web/test-runner-playwright": "^0.11.1",
44
44
  "chai": "^6.2.2",
45
45
  "eslint": "^9.39.2",
46
- "eslint-plugin-prettier": "^5.5.4",
46
+ "eslint-plugin-prettier": "^5.5.5",
47
47
  "mocha": "^11.7.5",
48
- "prettier": "3.7.4",
48
+ "prettier": "3.8.1",
49
49
  "ts-node": "^10.9.2",
50
50
  "typescript": "^5.8.3"
51
51
  }