@aztec/noir-acvm_js 0.0.1-commit.f295ac2 → 0.0.1-commit.f2ce05ee

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/web/acvm_js.js CHANGED
@@ -225,122 +225,132 @@ export function initLogLevel(filter) {
225
225
  }
226
226
  }
227
227
 
228
- function passArray8ToWasm0(arg, malloc) {
229
- const ptr = malloc(arg.length * 1, 1) >>> 0;
230
- getUint8ArrayMemory0().set(arg, ptr / 1);
231
- WASM_VECTOR_LEN = arg.length;
232
- return ptr;
233
- }
234
228
  /**
235
- * Executes an ACIR circuit to generate the solved witness from the initial witness.
236
- *
237
- * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
238
- * @param {WitnessMap} initial_witness - The initial witness map defining all of the inputs to `circuit`..
239
- * @param {ForeignCallHandler} foreign_call_handler - A callback to process any foreign calls from the circuit.
240
- * @returns {WitnessMap} The solved witness calculated by executing the circuit on the provided inputs.
229
+ * Performs a bitwise AND operation between `lhs` and `rhs`
230
+ * @param {string} lhs
231
+ * @param {string} rhs
232
+ * @returns {string}
241
233
  */
242
- export function executeCircuit(program, initial_witness, foreign_call_handler) {
243
- const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
244
- const len0 = WASM_VECTOR_LEN;
245
- const ret = wasm.executeCircuit(ptr0, len0, initial_witness, foreign_call_handler);
234
+ export function and(lhs, rhs) {
235
+ const ret = wasm.and(lhs, rhs);
246
236
  return ret;
247
237
  }
248
238
 
249
239
  /**
250
- * Executes an ACIR circuit to generate the solved witness from the initial witness.
251
- * This method also extracts the public return values from the solved witness into its own return witness.
252
- *
253
- * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
254
- * @param {WitnessMap} initial_witness - The initial witness map defining all of the inputs to `circuit`..
255
- * @param {ForeignCallHandler} foreign_call_handler - A callback to process any foreign calls from the circuit.
256
- * @returns {SolvedAndReturnWitness} The solved witness calculated by executing the circuit on the provided inputs, as well as the return witness indices as specified by the circuit.
240
+ * Performs a bitwise XOR operation between `lhs` and `rhs`
241
+ * @param {string} lhs
242
+ * @param {string} rhs
243
+ * @returns {string}
257
244
  */
258
- export function executeCircuitWithReturnWitness(program, initial_witness, foreign_call_handler) {
259
- const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
260
- const len0 = WASM_VECTOR_LEN;
261
- const ret = wasm.executeCircuitWithReturnWitness(ptr0, len0, initial_witness, foreign_call_handler);
245
+ export function xor(lhs, rhs) {
246
+ const ret = wasm.xor(lhs, rhs);
262
247
  return ret;
263
248
  }
264
249
 
250
+ let cachedUint32ArrayMemory0 = null;
251
+
252
+ function getUint32ArrayMemory0() {
253
+ if (cachedUint32ArrayMemory0 === null || cachedUint32ArrayMemory0.byteLength === 0) {
254
+ cachedUint32ArrayMemory0 = new Uint32Array(wasm.memory.buffer);
255
+ }
256
+ return cachedUint32ArrayMemory0;
257
+ }
258
+
259
+ function passArray32ToWasm0(arg, malloc) {
260
+ const ptr = malloc(arg.length * 4, 4) >>> 0;
261
+ getUint32ArrayMemory0().set(arg, ptr / 4);
262
+ WASM_VECTOR_LEN = arg.length;
263
+ return ptr;
264
+ }
265
+
266
+ function getArrayU32FromWasm0(ptr, len) {
267
+ ptr = ptr >>> 0;
268
+ return getUint32ArrayMemory0().subarray(ptr / 4, ptr / 4 + len);
269
+ }
265
270
  /**
266
- * Executes an ACIR circuit to generate the solved witness from the initial witness.
267
- *
268
- * @param {Uint8Array} program - A serialized representation of an ACIR program
269
- * @param {WitnessMap} initial_witness - The initial witness map defining all of the inputs to `program`.
270
- * @param {ForeignCallHandler} foreign_call_handler - A callback to process any foreign calls from the program.
271
- * @returns {WitnessStack} The solved witness calculated by executing the program on the provided inputs.
271
+ * Sha256 compression function
272
+ * @param {Uint32Array} inputs
273
+ * @param {Uint32Array} state
274
+ * @returns {Uint32Array}
272
275
  */
273
- export function executeProgram(program, initial_witness, foreign_call_handler) {
274
- const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
276
+ export function sha256_compression(inputs, state) {
277
+ const ptr0 = passArray32ToWasm0(inputs, wasm.__wbindgen_malloc);
275
278
  const len0 = WASM_VECTOR_LEN;
276
- const ret = wasm.executeProgram(ptr0, len0, initial_witness, foreign_call_handler);
277
- return ret;
279
+ const ptr1 = passArray32ToWasm0(state, wasm.__wbindgen_malloc);
280
+ const len1 = WASM_VECTOR_LEN;
281
+ const ret = wasm.sha256_compression(ptr0, len0, ptr1, len1);
282
+ var v3 = getArrayU32FromWasm0(ret[0], ret[1]).slice();
283
+ wasm.__wbindgen_free(ret[0], ret[1] * 4, 4);
284
+ return v3;
285
+ }
286
+
287
+ function passArray8ToWasm0(arg, malloc) {
288
+ const ptr = malloc(arg.length * 1, 1) >>> 0;
289
+ getUint8ArrayMemory0().set(arg, ptr / 1);
290
+ WASM_VECTOR_LEN = arg.length;
291
+ return ptr;
278
292
  }
279
293
 
294
+ function getArrayU8FromWasm0(ptr, len) {
295
+ ptr = ptr >>> 0;
296
+ return getUint8ArrayMemory0().subarray(ptr / 1, ptr / 1 + len);
297
+ }
280
298
  /**
281
- * Extracts a `WitnessMap` containing the witness indices corresponding to the circuit's return values.
282
- *
283
- * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
284
- * @param {WitnessMap} witness_map - The completed witness map after executing the circuit.
285
- * @returns {WitnessMap} A witness map containing the circuit's return values.
286
- * @param {Uint8Array} program
287
- * @param {WitnessMap} witness_map
288
- * @returns {WitnessMap}
299
+ * Calculates the Blake2s256 hash of the input bytes
300
+ * @param {Uint8Array} inputs
301
+ * @returns {Uint8Array}
289
302
  */
290
- export function getReturnWitness(program, witness_map) {
291
- const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
303
+ export function blake2s256(inputs) {
304
+ const ptr0 = passArray8ToWasm0(inputs, wasm.__wbindgen_malloc);
292
305
  const len0 = WASM_VECTOR_LEN;
293
- const ret = wasm.getReturnWitness(ptr0, len0, witness_map);
294
- if (ret[2]) {
295
- throw takeFromExternrefTable0(ret[1]);
296
- }
297
- return takeFromExternrefTable0(ret[0]);
306
+ const ret = wasm.blake2s256(ptr0, len0);
307
+ var v2 = getArrayU8FromWasm0(ret[0], ret[1]).slice();
308
+ wasm.__wbindgen_free(ret[0], ret[1] * 1, 1);
309
+ return v2;
298
310
  }
299
311
 
300
312
  /**
301
- * Extracts a `WitnessMap` containing the witness indices corresponding to the circuit's public parameters.
302
- *
303
- * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
304
- * @param {WitnessMap} witness_map - The completed witness map after executing the circuit.
305
- * @returns {WitnessMap} A witness map containing the circuit's public parameters.
306
- * @param {Uint8Array} program
307
- * @param {WitnessMap} solved_witness
308
- * @returns {WitnessMap}
313
+ * Verifies a ECDSA signature over the secp256k1 curve.
314
+ * @param {Uint8Array} hashed_msg
315
+ * @param {Uint8Array} public_key_x_bytes
316
+ * @param {Uint8Array} public_key_y_bytes
317
+ * @param {Uint8Array} signature
318
+ * @returns {boolean}
309
319
  */
310
- export function getPublicParametersWitness(program, solved_witness) {
311
- const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
320
+ export function ecdsa_secp256k1_verify(hashed_msg, public_key_x_bytes, public_key_y_bytes, signature) {
321
+ const ptr0 = passArray8ToWasm0(hashed_msg, wasm.__wbindgen_malloc);
312
322
  const len0 = WASM_VECTOR_LEN;
313
- const ret = wasm.getPublicParametersWitness(ptr0, len0, solved_witness);
314
- if (ret[2]) {
315
- throw takeFromExternrefTable0(ret[1]);
316
- }
317
- return takeFromExternrefTable0(ret[0]);
323
+ const ptr1 = passArray8ToWasm0(public_key_x_bytes, wasm.__wbindgen_malloc);
324
+ const len1 = WASM_VECTOR_LEN;
325
+ const ptr2 = passArray8ToWasm0(public_key_y_bytes, wasm.__wbindgen_malloc);
326
+ const len2 = WASM_VECTOR_LEN;
327
+ const ptr3 = passArray8ToWasm0(signature, wasm.__wbindgen_malloc);
328
+ const len3 = WASM_VECTOR_LEN;
329
+ const ret = wasm.ecdsa_secp256k1_verify(ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3);
330
+ return ret !== 0;
318
331
  }
319
332
 
320
333
  /**
321
- * Extracts a `WitnessMap` containing the witness indices corresponding to the circuit's public inputs.
322
- *
323
- * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
324
- * @param {WitnessMap} witness_map - The completed witness map after executing the circuit.
325
- * @returns {WitnessMap} A witness map containing the circuit's public inputs.
326
- * @param {Uint8Array} program
327
- * @param {WitnessMap} solved_witness
328
- * @returns {WitnessMap}
334
+ * Verifies a ECDSA signature over the secp256r1 curve.
335
+ * @param {Uint8Array} hashed_msg
336
+ * @param {Uint8Array} public_key_x_bytes
337
+ * @param {Uint8Array} public_key_y_bytes
338
+ * @param {Uint8Array} signature
339
+ * @returns {boolean}
329
340
  */
330
- export function getPublicWitness(program, solved_witness) {
331
- const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
341
+ export function ecdsa_secp256r1_verify(hashed_msg, public_key_x_bytes, public_key_y_bytes, signature) {
342
+ const ptr0 = passArray8ToWasm0(hashed_msg, wasm.__wbindgen_malloc);
332
343
  const len0 = WASM_VECTOR_LEN;
333
- const ret = wasm.getPublicWitness(ptr0, len0, solved_witness);
334
- if (ret[2]) {
335
- throw takeFromExternrefTable0(ret[1]);
336
- }
337
- return takeFromExternrefTable0(ret[0]);
344
+ const ptr1 = passArray8ToWasm0(public_key_x_bytes, wasm.__wbindgen_malloc);
345
+ const len1 = WASM_VECTOR_LEN;
346
+ const ptr2 = passArray8ToWasm0(public_key_y_bytes, wasm.__wbindgen_malloc);
347
+ const len2 = WASM_VECTOR_LEN;
348
+ const ptr3 = passArray8ToWasm0(signature, wasm.__wbindgen_malloc);
349
+ const len3 = WASM_VECTOR_LEN;
350
+ const ret = wasm.ecdsa_secp256r1_verify(ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3);
351
+ return ret !== 0;
338
352
  }
339
353
 
340
- function getArrayU8FromWasm0(ptr, len) {
341
- ptr = ptr >>> 0;
342
- return getUint8ArrayMemory0().subarray(ptr / 1, ptr / 1 + len);
343
- }
344
354
  /**
345
355
  * Compresses a `WitnessMap` into the binary format outputted by Nargo.
346
356
  *
@@ -407,130 +417,121 @@ export function decompressWitnessStack(compressed_witness) {
407
417
  }
408
418
 
409
419
  /**
410
- * Performs a bitwise AND operation between `lhs` and `rhs`
411
- * @param {string} lhs
412
- * @param {string} rhs
413
- * @returns {string}
420
+ * Executes an ACIR circuit to generate the solved witness from the initial witness.
421
+ *
422
+ * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
423
+ * @param {WitnessMap} initial_witness - The initial witness map defining all of the inputs to `circuit`..
424
+ * @param {ForeignCallHandler} foreign_call_handler - A callback to process any foreign calls from the circuit.
425
+ * @returns {WitnessMap} The solved witness calculated by executing the circuit on the provided inputs.
414
426
  */
415
- export function and(lhs, rhs) {
416
- const ret = wasm.and(lhs, rhs);
427
+ export function executeCircuit(program, initial_witness, foreign_call_handler) {
428
+ const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
429
+ const len0 = WASM_VECTOR_LEN;
430
+ const ret = wasm.executeCircuit(ptr0, len0, initial_witness, foreign_call_handler);
417
431
  return ret;
418
432
  }
419
433
 
420
434
  /**
421
- * Performs a bitwise XOR operation between `lhs` and `rhs`
422
- * @param {string} lhs
423
- * @param {string} rhs
424
- * @returns {string}
435
+ * Executes an ACIR circuit to generate the solved witness from the initial witness.
436
+ * This method also extracts the public return values from the solved witness into its own return witness.
437
+ *
438
+ * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
439
+ * @param {WitnessMap} initial_witness - The initial witness map defining all of the inputs to `circuit`..
440
+ * @param {ForeignCallHandler} foreign_call_handler - A callback to process any foreign calls from the circuit.
441
+ * @returns {SolvedAndReturnWitness} The solved witness calculated by executing the circuit on the provided inputs, as well as the return witness indices as specified by the circuit.
425
442
  */
426
- export function xor(lhs, rhs) {
427
- const ret = wasm.xor(lhs, rhs);
443
+ export function executeCircuitWithReturnWitness(program, initial_witness, foreign_call_handler) {
444
+ const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
445
+ const len0 = WASM_VECTOR_LEN;
446
+ const ret = wasm.executeCircuitWithReturnWitness(ptr0, len0, initial_witness, foreign_call_handler);
428
447
  return ret;
429
448
  }
430
449
 
431
- let cachedUint32ArrayMemory0 = null;
432
-
433
- function getUint32ArrayMemory0() {
434
- if (cachedUint32ArrayMemory0 === null || cachedUint32ArrayMemory0.byteLength === 0) {
435
- cachedUint32ArrayMemory0 = new Uint32Array(wasm.memory.buffer);
436
- }
437
- return cachedUint32ArrayMemory0;
438
- }
439
-
440
- function passArray32ToWasm0(arg, malloc) {
441
- const ptr = malloc(arg.length * 4, 4) >>> 0;
442
- getUint32ArrayMemory0().set(arg, ptr / 4);
443
- WASM_VECTOR_LEN = arg.length;
444
- return ptr;
445
- }
446
-
447
- function getArrayU32FromWasm0(ptr, len) {
448
- ptr = ptr >>> 0;
449
- return getUint32ArrayMemory0().subarray(ptr / 4, ptr / 4 + len);
450
- }
451
450
  /**
452
- * Sha256 compression function
453
- * @param {Uint32Array} inputs
454
- * @param {Uint32Array} state
455
- * @returns {Uint32Array}
451
+ * Executes an ACIR circuit to generate the solved witness from the initial witness.
452
+ *
453
+ * @param {Uint8Array} program - A serialized representation of an ACIR program
454
+ * @param {WitnessMap} initial_witness - The initial witness map defining all of the inputs to `program`.
455
+ * @param {ForeignCallHandler} foreign_call_handler - A callback to process any foreign calls from the program.
456
+ * @returns {WitnessStack} The solved witness calculated by executing the program on the provided inputs.
456
457
  */
457
- export function sha256_compression(inputs, state) {
458
- const ptr0 = passArray32ToWasm0(inputs, wasm.__wbindgen_malloc);
458
+ export function executeProgram(program, initial_witness, foreign_call_handler) {
459
+ const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
459
460
  const len0 = WASM_VECTOR_LEN;
460
- const ptr1 = passArray32ToWasm0(state, wasm.__wbindgen_malloc);
461
- const len1 = WASM_VECTOR_LEN;
462
- const ret = wasm.sha256_compression(ptr0, len0, ptr1, len1);
463
- var v3 = getArrayU32FromWasm0(ret[0], ret[1]).slice();
464
- wasm.__wbindgen_free(ret[0], ret[1] * 4, 4);
465
- return v3;
461
+ const ret = wasm.executeProgram(ptr0, len0, initial_witness, foreign_call_handler);
462
+ return ret;
466
463
  }
467
464
 
468
465
  /**
469
- * Calculates the Blake2s256 hash of the input bytes
470
- * @param {Uint8Array} inputs
471
- * @returns {Uint8Array}
466
+ * Extracts a `WitnessMap` containing the witness indices corresponding to the circuit's return values.
467
+ *
468
+ * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
469
+ * @param {WitnessMap} witness_map - The completed witness map after executing the circuit.
470
+ * @returns {WitnessMap} A witness map containing the circuit's return values.
471
+ * @param {Uint8Array} program
472
+ * @param {WitnessMap} witness_map
473
+ * @returns {WitnessMap}
472
474
  */
473
- export function blake2s256(inputs) {
474
- const ptr0 = passArray8ToWasm0(inputs, wasm.__wbindgen_malloc);
475
+ export function getReturnWitness(program, witness_map) {
476
+ const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
475
477
  const len0 = WASM_VECTOR_LEN;
476
- const ret = wasm.blake2s256(ptr0, len0);
477
- var v2 = getArrayU8FromWasm0(ret[0], ret[1]).slice();
478
- wasm.__wbindgen_free(ret[0], ret[1] * 1, 1);
479
- return v2;
478
+ const ret = wasm.getReturnWitness(ptr0, len0, witness_map);
479
+ if (ret[2]) {
480
+ throw takeFromExternrefTable0(ret[1]);
481
+ }
482
+ return takeFromExternrefTable0(ret[0]);
480
483
  }
481
484
 
482
485
  /**
483
- * Verifies a ECDSA signature over the secp256k1 curve.
484
- * @param {Uint8Array} hashed_msg
485
- * @param {Uint8Array} public_key_x_bytes
486
- * @param {Uint8Array} public_key_y_bytes
487
- * @param {Uint8Array} signature
488
- * @returns {boolean}
486
+ * Extracts a `WitnessMap` containing the witness indices corresponding to the circuit's public parameters.
487
+ *
488
+ * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
489
+ * @param {WitnessMap} witness_map - The completed witness map after executing the circuit.
490
+ * @returns {WitnessMap} A witness map containing the circuit's public parameters.
491
+ * @param {Uint8Array} program
492
+ * @param {WitnessMap} solved_witness
493
+ * @returns {WitnessMap}
489
494
  */
490
- export function ecdsa_secp256k1_verify(hashed_msg, public_key_x_bytes, public_key_y_bytes, signature) {
491
- const ptr0 = passArray8ToWasm0(hashed_msg, wasm.__wbindgen_malloc);
495
+ export function getPublicParametersWitness(program, solved_witness) {
496
+ const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
492
497
  const len0 = WASM_VECTOR_LEN;
493
- const ptr1 = passArray8ToWasm0(public_key_x_bytes, wasm.__wbindgen_malloc);
494
- const len1 = WASM_VECTOR_LEN;
495
- const ptr2 = passArray8ToWasm0(public_key_y_bytes, wasm.__wbindgen_malloc);
496
- const len2 = WASM_VECTOR_LEN;
497
- const ptr3 = passArray8ToWasm0(signature, wasm.__wbindgen_malloc);
498
- const len3 = WASM_VECTOR_LEN;
499
- const ret = wasm.ecdsa_secp256k1_verify(ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3);
500
- return ret !== 0;
498
+ const ret = wasm.getPublicParametersWitness(ptr0, len0, solved_witness);
499
+ if (ret[2]) {
500
+ throw takeFromExternrefTable0(ret[1]);
501
+ }
502
+ return takeFromExternrefTable0(ret[0]);
501
503
  }
502
504
 
503
505
  /**
504
- * Verifies a ECDSA signature over the secp256r1 curve.
505
- * @param {Uint8Array} hashed_msg
506
- * @param {Uint8Array} public_key_x_bytes
507
- * @param {Uint8Array} public_key_y_bytes
508
- * @param {Uint8Array} signature
509
- * @returns {boolean}
506
+ * Extracts a `WitnessMap` containing the witness indices corresponding to the circuit's public inputs.
507
+ *
508
+ * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
509
+ * @param {WitnessMap} witness_map - The completed witness map after executing the circuit.
510
+ * @returns {WitnessMap} A witness map containing the circuit's public inputs.
511
+ * @param {Uint8Array} program
512
+ * @param {WitnessMap} solved_witness
513
+ * @returns {WitnessMap}
510
514
  */
511
- export function ecdsa_secp256r1_verify(hashed_msg, public_key_x_bytes, public_key_y_bytes, signature) {
512
- const ptr0 = passArray8ToWasm0(hashed_msg, wasm.__wbindgen_malloc);
515
+ export function getPublicWitness(program, solved_witness) {
516
+ const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
513
517
  const len0 = WASM_VECTOR_LEN;
514
- const ptr1 = passArray8ToWasm0(public_key_x_bytes, wasm.__wbindgen_malloc);
515
- const len1 = WASM_VECTOR_LEN;
516
- const ptr2 = passArray8ToWasm0(public_key_y_bytes, wasm.__wbindgen_malloc);
517
- const len2 = WASM_VECTOR_LEN;
518
- const ptr3 = passArray8ToWasm0(signature, wasm.__wbindgen_malloc);
519
- const len3 = WASM_VECTOR_LEN;
520
- const ret = wasm.ecdsa_secp256r1_verify(ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3);
521
- return ret !== 0;
518
+ const ret = wasm.getPublicWitness(ptr0, len0, solved_witness);
519
+ if (ret[2]) {
520
+ throw takeFromExternrefTable0(ret[1]);
521
+ }
522
+ return takeFromExternrefTable0(ret[0]);
522
523
  }
523
524
 
524
525
  function __wbg_adapter_30(arg0, arg1, arg2) {
525
- wasm.closure447_externref_shim(arg0, arg1, arg2);
526
+ wasm.closure445_externref_shim(arg0, arg1, arg2);
526
527
  }
527
528
 
528
529
  function __wbg_adapter_89(arg0, arg1, arg2, arg3, arg4) {
529
- wasm.closure932_externref_shim(arg0, arg1, arg2, arg3, arg4);
530
+ wasm.closure921_externref_shim(arg0, arg1, arg2, arg3, arg4);
530
531
  }
531
532
 
532
533
  function __wbg_adapter_110(arg0, arg1, arg2, arg3) {
533
- wasm.closure936_externref_shim(arg0, arg1, arg2, arg3);
534
+ wasm.closure925_externref_shim(arg0, arg1, arg2, arg3);
534
535
  }
535
536
 
536
537
  async function __wbg_load(module, imports) {
@@ -796,8 +797,8 @@ function __wbg_get_imports() {
796
797
  const ret = false;
797
798
  return ret;
798
799
  };
799
- imports.wbg.__wbindgen_closure_wrapper1447 = function(arg0, arg1, arg2) {
800
- const ret = makeMutClosure(arg0, arg1, 448, __wbg_adapter_30);
800
+ imports.wbg.__wbindgen_closure_wrapper1365 = function(arg0, arg1, arg2) {
801
+ const ret = makeMutClosure(arg0, arg1, 446, __wbg_adapter_30);
801
802
  return ret;
802
803
  };
803
804
  imports.wbg.__wbindgen_debug_string = function(arg0, arg1) {
Binary file
@@ -3,22 +3,22 @@
3
3
  export const memory: WebAssembly.Memory;
4
4
  export const buildInfo: () => any;
5
5
  export const initLogLevel: (a: number, b: number) => [number, number];
6
- export const executeCircuit: (a: number, b: number, c: any, d: any) => any;
7
- export const executeCircuitWithReturnWitness: (a: number, b: number, c: any, d: any) => any;
8
- export const executeProgram: (a: number, b: number, c: any, d: any) => any;
9
- export const getReturnWitness: (a: number, b: number, c: any) => [number, number, number];
10
- export const getPublicParametersWitness: (a: number, b: number, c: any) => [number, number, number];
11
- export const getPublicWitness: (a: number, b: number, c: any) => [number, number, number];
12
- export const compressWitness: (a: any) => [number, number, number, number];
13
- export const decompressWitness: (a: number, b: number) => [number, number, number];
14
- export const compressWitnessStack: (a: any) => [number, number, number, number];
15
- export const decompressWitnessStack: (a: number, b: number) => [number, number, number];
16
6
  export const and: (a: any, b: any) => any;
17
7
  export const xor: (a: any, b: any) => any;
18
8
  export const sha256_compression: (a: number, b: number, c: number, d: number) => [number, number];
19
9
  export const blake2s256: (a: number, b: number) => [number, number];
20
10
  export const ecdsa_secp256k1_verify: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number) => number;
21
11
  export const ecdsa_secp256r1_verify: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number) => number;
12
+ export const compressWitness: (a: any) => [number, number, number, number];
13
+ export const decompressWitness: (a: number, b: number) => [number, number, number];
14
+ export const compressWitnessStack: (a: any) => [number, number, number, number];
15
+ export const decompressWitnessStack: (a: number, b: number) => [number, number, number];
16
+ export const executeCircuit: (a: number, b: number, c: any, d: any) => any;
17
+ export const executeCircuitWithReturnWitness: (a: number, b: number, c: any, d: any) => any;
18
+ export const executeProgram: (a: number, b: number, c: any, d: any) => any;
19
+ export const getReturnWitness: (a: number, b: number, c: any) => [number, number, number];
20
+ export const getPublicParametersWitness: (a: number, b: number, c: any) => [number, number, number];
21
+ export const getPublicWitness: (a: number, b: number, c: any) => [number, number, number];
22
22
  export const __wbindgen_exn_store: (a: number) => void;
23
23
  export const __externref_table_alloc: () => number;
24
24
  export const __wbindgen_export_2: WebAssembly.Table;
@@ -27,7 +27,7 @@ export const __wbindgen_malloc: (a: number, b: number) => number;
27
27
  export const __wbindgen_realloc: (a: number, b: number, c: number, d: number) => number;
28
28
  export const __wbindgen_export_6: WebAssembly.Table;
29
29
  export const __externref_table_dealloc: (a: number) => void;
30
- export const closure447_externref_shim: (a: number, b: number, c: any) => void;
31
- export const closure932_externref_shim: (a: number, b: number, c: any, d: number, e: any) => void;
32
- export const closure936_externref_shim: (a: number, b: number, c: any, d: any) => void;
30
+ export const closure445_externref_shim: (a: number, b: number, c: any) => void;
31
+ export const closure921_externref_shim: (a: number, b: number, c: any, d: number, e: any) => void;
32
+ export const closure925_externref_shim: (a: number, b: number, c: any, d: any) => void;
33
33
  export const __wbindgen_start: () => void;