@aztec/protocol-contracts 0.55.0 → 0.55.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/artifacts/AuthRegistry.json +1 -1
- package/artifacts/ContractClassRegisterer.json +1 -1
- package/artifacts/ContractInstanceDeployer.json +1 -1
- package/artifacts/FeeJuice.json +1 -1
- package/artifacts/KeyRegistry.json +1 -1
- package/artifacts/MultiCallEntrypoint.json +1 -1
- package/artifacts/Router.json +1 -1
- package/package.json +4 -4
package/artifacts/FeeJuice.json
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"transpiled":true,"noir_version":"0.33.0+cb20e078dd909656110d133339b2b425e6c3ebb0","name":"FeeJuice","functions":[{"name":"balance_of_public","is_unconstrained":true,"custom_attributes":["aztec(public)","aztec(view)"],"abi":{"error_types":{},"parameters":[{"name":"inputs","type":{"fields":[{"name":"calldata_length","type":{"kind":"field"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"aztec::context::inputs::public_context_inputs::PublicContextInputs"},"visibility":"private"},{"name":"owner","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"},"visibility":"private"}],"return_type":{"abi_type":{"kind":"field"},"visibility":"public"}},"bytecode":"H4sIAAAAAAAC/11SPW8UQQx9Hs94PDMkoiPF0dEgHWRPCruioOLIVQhRI1EgJHqUX5k/lTzvniIlI9k79trv+WMmqKQD1E/ABFWjQn0PnkoxwL++hfnRjz9p+3ETJIos/AldwpOpv6F8pPtiAfFubyM8lEwQqR+A18gn2WjyvOIrMiZRiWtNdGafYNLm1DxAks+p+LTGRUTnNY3vNMIBxqBTBpNQOssslWRoHVLbIOU7jDMlQc+UDSsKzRbmWCuIawvn6KSktMpqbI9Dh1ouxDqh7HEzS+VQ1FKhLlln0bqD1fwphvX8PLw4sEtYtgD7ghKF7ZBr3oUzEcPyzROIPKFU5/9aMqxUdm00ZtQYll6zmsJ0U/pd2+eIZyvQ6Li/Yp09xvBjGwMXU1y5bSTPsarf3FrBuXfqYexcY8oS7VnRS2oNiF8bxDYYjcEs4uo2uCYjXiz4j9c9/hJTnaO6W2JFRUgHZ+GH9dIumNA8e38D8e49Xhc/6+vqm2yvi4D/vTPdI2GQbriHWVYzufsIs5G97fHvIErEIL5ecHV/df8IJE0Bp9wCAAA=","debug_symbols":"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","brillig_names":["balance_of_public"],"assert_messages":{"90":"attempt to add with overflow","15":"Function balance_of_public can only be called statically","60":"call to assert_max_bit_size","78":"Array index out of bounds","35":"Storage slot 0 not allowed. Storage slots must start from 1."}},{"name":"_increase_public_balance","is_unconstrained":true,"custom_attributes":["aztec(public)","aztec(internal)"],"abi":{"error_types":{},"parameters":[{"name":"inputs","type":{"fields":[{"name":"calldata_length","type":{"kind":"field"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"aztec::context::inputs::public_context_inputs::PublicContextInputs"},"visibility":"private"},{"name":"to","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"},"visibility":"private"},{"name":"amount","type":{"kind":"field"},"visibility":"private"}],"return_type":null},"bytecode":"H4sIAAAAAAAC/41Uu44UMRBsP8ZuP8azG0GwIAISpIXbk2BWkN5xGyFByifwCQRI8AOEiJAciQAhkSOS+ymo8tyexEWMNJ52ubuq3W7PTpyxp+L0ILIT5yMG0QeCR/FGfM7uSNBzPX9F7Hx5xeI1eyyK2xPxGJ/LgPFCwiMsjhd0P5AIlCbNndBJktk6JeSOkAPkO6SAPCFFkBGdrfqjq19cdxLEgcLfI7W/yzFlCT7lhyL3JR8MFYNhoMsITAzMsjPIAmayAHOBZMGsWFhD2XUXLlaYdnwBNQICH6ncDiSKg5BJOkJolnERcmY8aoyc2orpyGntkjRHgrUha7wjSpHjVs6yuJhrZwDhZ6lbOcwmLVmh8Fhts2lpIyGVJ9j2jefPjUdiQ46xgeylNGa3EZ/KhqAFRyyPr0nMNUtSrKcGr/BfIhNFphVEXsvqSiR0kQkiYSqdDzwhToB9iRualg4Ra5EbDC1EepRwHR1R4BgKeN9IuSqtK6hlYC1LryXNgAOTgjr6hlmzsIbW8cbqr/45OSzIqp/cgJMb1IH+rTjSe6aC9guT8kBQ/Hc4kJoVLh9Et/L+BGlVehTlrbDh2K+hJ0NTCYZhtmngOQ4VDIMHw0fxh15juLBxfR1mM4RnhMJyr1wdQ8MYIvw/SaQ/yJgIuqCyao3ibXrKqInbocgKInG1RtAXWTNojw5VhzssuC28et9wCwcGuMmuMa7jarZtxY4aKyRjZY98XXpkthP2X9mQe6NOQ0HOAVRM67sC/wE6p8NWfu95pQcDJVHs6rQbaURAUq/5lhjNmvm7wKf/LvLyLr8LEP7SjHBlQIFcUeV06FOrqoXTBPW0lZ+nxoGRwid7uX15+/Iv+GuLP60EAAA=","debug_symbols":"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","brillig_names":["_increase_public_balance"],"assert_messages":{"121":"Storage slot 0 not allowed. Storage slots must start from 1.","150":"attempt to add with overflow","160":"Array index out of bounds","142":"Array index out of bounds","171":"attempt to add with overflow","53":"Storage slot 0 not allowed. Storage slots must start from 1.","79":"call to assert_max_bit_size","89":"call to assert_max_bit_size","105":"attempt to add with overflow","35":"Function _increase_public_balance can only be called internally"}},{"name":"check_balance","is_unconstrained":true,"custom_attributes":["aztec(public)","aztec(view)"],"abi":{"error_types":{},"parameters":[{"name":"inputs","type":{"fields":[{"name":"calldata_length","type":{"kind":"field"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"aztec::context::inputs::public_context_inputs::PublicContextInputs"},"visibility":"private"},{"name":"fee_limit","type":{"kind":"field"},"visibility":"private"}],"return_type":null},"bytecode":"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","debug_symbols":"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","brillig_names":["check_balance"],"assert_messages":{"70":"call to assert_max_bit_size","45":"Storage slot 0 not allowed. Storage slots must start from 1.","122":"Balance too low","131":"Array index out of bounds","143":"attempt to add with overflow","14":"Function check_balance can only be called statically","19":"call to assert_max_bit_size"}},{"name":"set_portal","is_unconstrained":true,"custom_attributes":["aztec(public)"],"abi":{"error_types":{},"parameters":[{"name":"inputs","type":{"fields":[{"name":"calldata_length","type":{"kind":"field"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"aztec::context::inputs::public_context_inputs::PublicContextInputs"},"visibility":"private"},{"name":"portal_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::eth_address::EthAddress"},"visibility":"private"}],"return_type":null},"bytecode":"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","debug_symbols":"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","brillig_names":["set_portal"],"assert_messages":{"172":"Array index out of bounds","183":"attempt to add with overflow","116":"attempt to add with overflow","132":"Array index out of bounds","161":"attempt to add with overflow","84":"SharedImmutable already initialized","140":"attempt to add with overflow","57":"call to assert_max_bit_size","150":"Array index out of bounds","108":"Array index out of bounds"}},{"name":"claim","is_unconstrained":false,"custom_attributes":["aztec(private)"],"abi":{"error_types":{},"parameters":[{"name":"inputs","type":{"fields":[{"name":"call_context","type":{"fields":[{"name":"msg_sender","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"storage_contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"function_selector","type":{"fields":[{"name":"inner","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"}},{"name":"is_delegate_call","type":{"kind":"boolean"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::call_context::CallContext"}},{"name":"historical_header","type":{"fields":[{"name":"last_archive","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"content_commitment","type":{"fields":[{"name":"num_txs","type":{"kind":"field"}},{"name":"txs_effects_hash","type":{"kind":"field"}},{"name":"in_hash","type":{"kind":"field"}},{"name":"out_hash","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::content_commitment::ContentCommitment"}},{"name":"state","type":{"fields":[{"name":"l1_to_l2_message_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"partial","type":{"fields":[{"name":"note_hash_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"nullifier_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"public_data_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}}],"kind":"struct","path":"authwit::aztec::protocol_types::partial_state_reference::PartialStateReference"}}],"kind":"struct","path":"authwit::aztec::protocol_types::state_reference::StateReference"}},{"name":"global_variables","type":{"fields":[{"name":"chain_id","type":{"kind":"field"}},{"name":"version","type":{"kind":"field"}},{"name":"block_number","type":{"kind":"field"}},{"name":"slot_number","type":{"kind":"field"}},{"name":"timestamp","type":{"kind":"integer","sign":"unsigned","width":64}},{"name":"coinbase","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::eth_address::EthAddress"}},{"name":"fee_recipient","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"gas_fees","type":{"fields":[{"name":"fee_per_da_gas","type":{"kind":"field"}},{"name":"fee_per_l2_gas","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_fees::GasFees"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::global_variables::GlobalVariables"}},{"name":"total_fees","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::header::Header"}},{"name":"tx_context","type":{"fields":[{"name":"chain_id","type":{"kind":"field"}},{"name":"version","type":{"kind":"field"}},{"name":"gas_settings","type":{"fields":[{"name":"gas_limits","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"teardown_gas_limits","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"max_fees_per_gas","type":{"fields":[{"name":"fee_per_da_gas","type":{"kind":"field"}},{"name":"fee_per_l2_gas","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_fees::GasFees"}},{"name":"inclusion_fee","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_settings::GasSettings"}}],"kind":"struct","path":"authwit::aztec::protocol_types::transaction::tx_context::TxContext"}},{"name":"start_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"aztec::context::inputs::private_context_inputs::PrivateContextInputs"},"visibility":"private"},{"name":"to","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"},"visibility":"private"},{"name":"amount","type":{"kind":"field"},"visibility":"private"},{"name":"secret","type":{"kind":"field"},"visibility":"private"}],"return_type":{"abi_type":{"fields":[{"name":"call_context","type":{"fields":[{"name":"msg_sender","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"storage_contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"function_selector","type":{"fields":[{"name":"inner","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"}},{"name":"is_delegate_call","type":{"kind":"boolean"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::call_context::CallContext"}},{"name":"args_hash","type":{"kind":"field"}},{"name":"returns_hash","type":{"kind":"field"}},{"name":"min_revertible_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"is_fee_payer","type":{"kind":"boolean"}},{"name":"max_block_number","type":{"fields":[{"name":"_opt","type":{"fields":[{"name":"_is_some","type":{"kind":"boolean"}},{"name":"_value","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"std::option::Option"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::max_block_number::MaxBlockNumber"}},{"name":"note_hash_read_requests","type":{"kind":"array","length":16,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::read_request::ReadRequest"}}},{"name":"nullifier_read_requests","type":{"kind":"array","length":16,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::read_request::ReadRequest"}}},{"name":"key_validation_requests_and_generators","type":{"kind":"array","length":16,"type":{"fields":[{"name":"request","type":{"fields":[{"name":"pk_m","type":{"fields":[{"name":"x","type":{"kind":"field"}},{"name":"y","type":{"kind":"field"}},{"name":"is_infinite","type":{"kind":"boolean"}}],"kind":"struct","path":"std::embedded_curve_ops::EmbeddedCurvePoint"}},{"name":"sk_app","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::validation_requests::key_validation_request::KeyValidationRequest"}},{"name":"sk_app_generator","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::validation_requests::key_validation_request_and_generator::KeyValidationRequestAndGenerator"}}},{"name":"note_hashes","type":{"kind":"array","length":16,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::note_hash::NoteHash"}}},{"name":"nullifiers","type":{"kind":"array","length":16,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"note_hash","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::nullifier::Nullifier"}}},{"name":"private_call_requests","type":{"kind":"array","length":4,"type":{"fields":[{"name":"contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"call_context","type":{"fields":[{"name":"msg_sender","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"storage_contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"function_selector","type":{"fields":[{"name":"inner","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"}},{"name":"is_delegate_call","type":{"kind":"boolean"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::call_context::CallContext"}},{"name":"args_hash","type":{"kind":"field"}},{"name":"returns_hash","type":{"kind":"field"}},{"name":"start_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"end_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::private_call_request::PrivateCallRequest"}}},{"name":"public_call_requests","type":{"kind":"array","length":16,"type":{"fields":[{"name":"item","type":{"fields":[{"name":"contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"call_context","type":{"fields":[{"name":"msg_sender","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"storage_contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"function_selector","type":{"fields":[{"name":"inner","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"}},{"name":"is_delegate_call","type":{"kind":"boolean"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::call_context::CallContext"}},{"name":"args_hash","type":{"kind":"field"}},{"name":"returns_hash","type":{"kind":"field"}},{"name":"revert_code","type":{"kind":"integer","sign":"unsigned","width":8}},{"name":"start_gas_left","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"end_gas_left","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::public_call_stack_item_compressed::PublicCallStackItemCompressed"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::public_call_request::PublicCallRequest"}}},{"name":"public_teardown_call_request","type":{"fields":[{"name":"item","type":{"fields":[{"name":"contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"call_context","type":{"fields":[{"name":"msg_sender","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"storage_contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"function_selector","type":{"fields":[{"name":"inner","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"}},{"name":"is_delegate_call","type":{"kind":"boolean"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::call_context::CallContext"}},{"name":"args_hash","type":{"kind":"field"}},{"name":"returns_hash","type":{"kind":"field"}},{"name":"revert_code","type":{"kind":"integer","sign":"unsigned","width":8}},{"name":"start_gas_left","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"end_gas_left","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::public_call_stack_item_compressed::PublicCallStackItemCompressed"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::public_call_request::PublicCallRequest"}},{"name":"l2_to_l1_msgs","type":{"kind":"array","length":2,"type":{"fields":[{"name":"recipient","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::eth_address::EthAddress"}},{"name":"content","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::messaging::l2_to_l1_message::L2ToL1Message"}}},{"name":"start_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"end_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"note_encrypted_logs_hashes","type":{"kind":"array","length":16,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"length","type":{"kind":"field"}},{"name":"note_hash_counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::log_hash::NoteLogHash"}}},{"name":"encrypted_logs_hashes","type":{"kind":"array","length":4,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"length","type":{"kind":"field"}},{"name":"randomness","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::log_hash::EncryptedLogHash"}}},{"name":"unencrypted_logs_hashes","type":{"kind":"array","length":4,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"length","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::log_hash::LogHash"}}},{"name":"historical_header","type":{"fields":[{"name":"last_archive","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"content_commitment","type":{"fields":[{"name":"num_txs","type":{"kind":"field"}},{"name":"txs_effects_hash","type":{"kind":"field"}},{"name":"in_hash","type":{"kind":"field"}},{"name":"out_hash","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::content_commitment::ContentCommitment"}},{"name":"state","type":{"fields":[{"name":"l1_to_l2_message_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"partial","type":{"fields":[{"name":"note_hash_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"nullifier_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"public_data_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}}],"kind":"struct","path":"authwit::aztec::protocol_types::partial_state_reference::PartialStateReference"}}],"kind":"struct","path":"authwit::aztec::protocol_types::state_reference::StateReference"}},{"name":"global_variables","type":{"fields":[{"name":"chain_id","type":{"kind":"field"}},{"name":"version","type":{"kind":"field"}},{"name":"block_number","type":{"kind":"field"}},{"name":"slot_number","type":{"kind":"field"}},{"name":"timestamp","type":{"kind":"integer","sign":"unsigned","width":64}},{"name":"coinbase","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::eth_address::EthAddress"}},{"name":"fee_recipient","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"gas_fees","type":{"fields":[{"name":"fee_per_da_gas","type":{"kind":"field"}},{"name":"fee_per_l2_gas","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_fees::GasFees"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::global_variables::GlobalVariables"}},{"name":"total_fees","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::header::Header"}},{"name":"tx_context","type":{"fields":[{"name":"chain_id","type":{"kind":"field"}},{"name":"version","type":{"kind":"field"}},{"name":"gas_settings","type":{"fields":[{"name":"gas_limits","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"teardown_gas_limits","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"max_fees_per_gas","type":{"fields":[{"name":"fee_per_da_gas","type":{"kind":"field"}},{"name":"fee_per_l2_gas","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_fees::GasFees"}},{"name":"inclusion_fee","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_settings::GasSettings"}}],"kind":"struct","path":"authwit::aztec::protocol_types::transaction::tx_context::TxContext"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::private_circuit_public_inputs::PrivateCircuitPublicInputs"},"visibility":"public"}},"bytecode":"H4sIAAAAAAAA/+1dB5gURdPeu907jpyTChySRXT78ikoSFYQEyAownGBnIOoKJgDKmZRggETBswYUDFhQsWEETGhiAgGRAQU/re5Hagb+47dnepjyv+bh/e53mKn9q2urppOM5MQKD4eqxgIbEsuLicAwcjfRCDVJXP+0nLIIEs2nFvFIKtmkNUwyGoZZPWBji5ZE8P3Ug2ypgbZwQZZy4iMHgmRvx0jf9PDWRkZhdlphSpd5YXTcofmZIYzModm5agclZmTWZCWk55emJORk507NDc7nKsy0gtVUWZuelG4+Hgkca+usKcjLd8mz0fj5qmUW+L4L0S46nrYGSm3CuwttyblRyPfcc57DJ8fB54AnkzcK3eOoKsOwt4O1YZR12OJfL5ZwtaGzL5ZQnzzOCk/QcpPunzzFD4/DTwDPJu4N0+4dT9FdDxNys+Q8rMu3Uvx+TngeeCFMnQvJTqeI+XnSfkFl+5l+Pwi8BLwchm6lxEdL5LyS6T8skv3K/j8KrAceK0M3a8QHa+S8nJSfs2l+3V8fgN4E3jLEAvc+WCF5TZH88HrpLwisfR88DY+vwO8C6wso37fJjreIeV3SXmlS/d7+Pw+8AHwYRm63yM63iflD0j5Q5fuj/B5FfAx8EkZuj8iOlaR8sek/IlL96f4/BnwOfBFGbo/JTo+I+XPSfkLl+7V+PwlsAb4qgzdq4mOL0l5DSl/5dL9NT5/A3wLfGdoz4mRvx0jf8PeDtUywBcba/liQ9H+iNabSmwPkDrmrItWfLrCqRE934P0D8A64EdgPfATsAH4GdgIbAJ+AX4FfgN+BzYDfwBbgD+BrcBfwDZgO7AD+Bv4R7cfYFdicYUlAIlAEAhFKpDWpeaTEigp+8EgW2eQ/WiQrTfIfjLINhhkPxtkGw2yTQbZLwbZrwbZbwbZ7wbZZoPsD4Nsi0H2p0G21SD7yyDbZpBtN8h2GGR/G2T/GGQ7DbJdBpkuuGUJBlmiQRY0yEIRGT2cfNYx8jfs7SgRs17z1/eJ3nUVFukjrH5I5OP1cDJfXirLF15s1r5Yx1J/xX790buutEj9qfWMvnjEz77I2MNT/eTN5jCxWW3woiutRP2pnxl98ag/fRF28VQb47Q5q+hfNqtN8enKMdSf+oXRF4/5zRc5Rp7q19htzi7FZvVbrLqyS60/9TujLx73jy/SyuCpNsdic3aZNqs/oteVv4/6U1sYffGEH3yRvU+e6s/obA5HYbPaGo2ucFT1p/5i9MWT+9cXmVHyVNv2ZXNG1Dar7WXqyiiKof7UDkZfLNlfvsiOiaf6u3Sbc2K0Wf1Tiq7copjrT+1k9MVT5e+LcBw81S6TzeG4bFZ6kOrSpeKsP5UQ5PPF0+Xpi4K4earEkjane7BZBYmutCJP9adCjL54ppx8EfZ2KMb5AcU4vlV0fObVF88K8QXjOEgx9uPVE4y+WCrEF4z9PcXYX1FPMfriOSG+YLyuKca8rJ5l9MXzlnzBvZ+DMX4VY/tTnPWXGCh5cK8VtubTtWetMAmOTgYq6HUToCJQCagMVAGqAtWA6kANoCZQC6gN1AHqAvWA+kADoCFwAHAgcBDQCGgMNAFSgabAwUAzoLlhrTDJsKaTbJBVMMhSDLKKBlklg6yyQVbFIKtqkFUzyKobZDUMspoGWS2DrLZBVscgq2uQ1TPI6htkDQyyhgbZAQbZgQbZQQZZI4OssUHWxCBLNciaGmQHG2TNDLLmQftrhTRmveb6JIZxhrNWmMw4ZnlHyFphBZb6K/Zrindde9YKKzL64l0ha4WVvNlcYq2wshddrrXCKoy+WClkrbBqnDab1gqrxafLuFZYndEX7wlZK6wRu82lrhXWjFVXGWuFtRh98b6QtcLasdi8j7XCOtHr2udaYV1GX3wgZK2wXnQ2R7VWWD8aXVGuFTZg9MWHQtYKG+7L5hjWCg8I8q0VHsjoi4+ErBUeFORbK2wU5FsrbMzoi1VC1gqbBPnWClODfGuFTRl98bGQtcKDg3xrhc2CfGuFzRl98YmQeXjG+QHFOL5VKxnn4T8V4gvGcZBi7MerDxh98ZkQXzD29xRjf0WtYvTF50J8wXhdU4x5WX3K6IsvhKwVMsavYmx/ylb9udcJvfq5RZCLZ1a6TZ4t2XgWZdjk2YqNZ0auTZ6t+fyes/teOqAL4dqCrKG1JOVWpNyalEN0zY2U6b189F4/ei8gvVeQ3ktI7zWk9yLSexXpvYz0Xkd6LyS9V5LeS0nvtaT3YtJ7Nem9nPReT3ovKL1XlN5LSu81pfei0ntV6b2s9F5Xei8svVeW3ktL77VtTuqTrn/S9VG6fkrXV+n6K12fpeu3dH2Xrv/S9WG6fkzXl+n6M12fpuvXdH2brn/T9XG6fk7X1+n6O12fp+v3dH2frv/T/QF0/wDdX0D3H9D9Cc7+hTb4ewjQFjgUaAccBhwOhAEFpAHpQAaQCWQB2UAOkAscARwJtAc6AEcBR+sYBzoBxwCdgS5AV6Ab0B3o4VyQIwd3nunJlmdUtk2ex7LxDKfZ5Hlc/DzT3YLdsRUo+UwI7S/n2Q+782nk77FEflyw5DMheuFzb+B4oE+wWJ6k233g389EMNVJ2Nuh6gbs9LUCPDz3PGeJ1sUJkbg70dlg4vzV/7HGJdNfSnWR4u5I00r0uknhBMaJqxODdpybyFx/nDafZNA1NJxfkKmGZhVgbjcvMyc/PzddqbS8rLysoWk5RYVDM1VOZg505uel5eDn0vLyVWE4L6tQB+KeTpPr4A7Ekxh9RfmeHLRIWCvn1nsKY2OwZfcp5MrPpNfIlSMBaK5cAevo5fRRX+aG7yR+rbdpoPhqqo/yuJraSrjcPHsx8kwmPPtF4qJ/5O+pkb8DIn8HRvJF68j3T8Pn04FBwBnAYGAIkAcMBfKBAqAQKAKGAcOBEcBIYBQwGhgDjAXGAeOBCcBEYBIwGZgCTAXOBKYBZwFnA+cA04FzgfOAGcBM4HzgAnfvYmCkJ1GeV4X+lq4KFwYtEr7QwlXhIp9fFbTdF1m4KpRnYzvVUmO7OGiR8MUWGtslPm9s2u5LhDe2AZYa26VBi4QvtdDYLvN5Y9N2X1ZO/d2wt2P3VeKSIH8/+vKgzCAbaCnIrghaJHyFhSCb5fMg03bPEhJkOhlcbiHIriynwZNXnlfFzzPDLTBNI/cn08WnkvJAUr7KNY18NT7PBq4Brg3af2w849VbXc0Ym9cxJzy3b64jPphNyteQ8rUu31yPzzcANwI3BUvq42yXOn9caSEub2b0tXsShjs39WP0vzNJMQc6bwFuBeYC84D5wALgNuB24A7gTmAhcBdwN3APcC9wH7AIuB94AHgQeAhYDDwMPAI8CjwGPA48ATwJLAGeAp4GngGeBZYCzwHPAy8Ay4LFE1t0nmJOcO8SlCO7xSC71SCba5DNM8jmG2QLDLLbDLLbDbI7DLI7DbKFBtldBtndBtk9Btm9Btl9Btkig+x+g+wBg+xBg+whg2yxQfawQfaIQfaoQfaYQfa4QfaEQfakQbbEIHvKIHvaIHvGIHvWIFtqkD1nkD1vkL1gkC0L7s0xzsG9pZHmHK+5dg6DruJbz4uKbmHktUHArec4Cm7lq7/cuXy61DxGX/wswheFaj5b/eWrBWy6ctRtjL7YKMIXYXU7V/0VhtUdXLryw+pORl9skuCLnLBayFV/uPbcxaSrELruZvTFLwJ8kQ+b72GqvxzoupdJF0xW9zH64lf/+6JQ27yIp/7yta77eXTlaF0PMPriN//7QqtWD7LUX+FuXQ+x6MrfrWsxoy9+970vcnbb/DBL/e2mqR7h0FVYrOtRRl9s9rsv8ottfoyj/nKKdT3OoavYZPUEoy/+8LkvCiI2P8lg89CIriUMurIjup5i9MUWf/tiz67lp73brBxdz3jWlVPk6HqW0Rd/+toXOUMdm5d6r789j1F4zrOu7D26nmf0xVZf+yJzj80veLZZ7dG1LMg3Z7mB8Xbnv4Tces44b6YY533UJkZfbBPiC8b5AcU4vlW/MfpiuxBfMI6DFGM/Xv3B6IsdQnzB2N9TjP0VtZXRF38L8QXjdU0x5mW1ndEX/wh5VAlj/CrG9qds1V+iq/78sK7s6HqRsR+qdXDvAdL7rW4O8u+DeinI62tuu/XNVHMs2F2zgr/t1u3xJQt216pQPrnRK8+XGeOR0deqls/bjY6XFy20m7o+t3uOpXipJyReXmGMF0ZfK1v1x+3nV+OvvzS3QHNz77HW+czZS/0KKa9I3Ft+NVhyj/VyfH4NeB14I1j6Huuwt0Ppm5VvsRA7DS3nDK/8tM3LLdh9gKU2zz0WXM7Yf36TMf8wthslxRenM/riraCdGPZTXJhy7Jskr74VZY5dgc9vA+8A71rMsfphELdayDWNfJ5jtc0rLNjdWEhcr2CMxZWMOZax3SgpvhjE6Iv3gnZi2E9xYcqxK0lefS/KHPs+Pn8AfAh8ZDHH6oftzLWQa5r6PMdqm9+3YPfBQuL6fcZYXMWYYxnbjZLiizMYffFx0E4M+ykuTDl2FcmrH0eZYz/B50+Bz4DPLeZY/TCzeRZyTQuf51ht8ycW7G4pJK4/YYzFLxhzLGO7UVJ8MZjRF6uDdmLYT3FhyrFfkLy6Osoc+yU+rwG+Ar62mGOHBPc+i4Dq9VqnbXyeY7XNX1qw+xAhcf0lYyx+w5hjGduNkuKLIYy++DZoJ4b9FBemHPsNyavfRpljv8PntcD3wA8Wc6x+GO8CC7mmnc9zrLb5Owt2HyYkrr9jjMV1jDmWsd0oKb7IY/TFj0E7MeynuDDl2HUkr/4YZY5dj88/ARuAny3mWP2w89ss5Brl8xyrbV5vwe40IXG9njEWNzLmWMZ2o6T4YiijLzYF7cSwn+LClGM3kry6Kcoc+ws+/wr8BvxuMcfql0ncbiHXZPo8x2qbf7Fgd5aQuP6FMRY3M+ZYxnajpPgin9EXfwTtxLCf4sKUYzeTvPpHlDl2Cz7/CWwF/rKYY/XLeu6wkGtyfZ5jtc1bLNh9hJC43sIYi9sYcyxju1FSfFHA6IvtQTsx7Ke4MOXYbSSvbo8yx+7A57+Bf7TcYo7VL0O700Ku6eDzHKtt3mHB7qOExPUOxljcxZhjGduNkuKLQkZfaHI2YthPcWHKsbtIXtX/EU2OTUAhEQgCoZC9HKtfNrnQQq7p5PMcu9vmEL/eY4TEdQJjLCaF+HgxthslxRdFjDk2OWQnhv0UF6Ycm0TyanKUObYCCilARaCSxRyrX+Z7l4Uc29XnOVbbXMFCju0mJK4rMMZiZcYcy9hulBRfDGPMsVVCdmLYT3FhyrGVSV6tEmWOrYpCNaA6UMNijtUvS7/bQo7t6fMcq22uaiHHHiskrqsyxmJNxhzL2G6UFF8MZ8yxtUJ2YthPcWHKsTVJXq0VZY6tjUIdoC5Qz2KOHRHc+25Bqtdrnfb2eY7VNte2kGOPFxLXtRljsT5jjmVsN0qKL0Yw5tgGITsx7Ke4MOXY+iSvNogyxzZE4QDgQOAgizl2ZHDvu1qpXq91eqLPc6y2uaGFHHuSkLhuyBiLjRhzLGO7UVJ8MZIxxzYO2YlhP8WFKcc2Inm1cZQ5tgkKqUBT4GCLOXZUcO+7r6ler3Xa1+c5VtvcxEKO7SckrpswxmIzxhzL2G6UFF+MYsyxzUN2YthPcWHKsc1IXm0eZY5tgUJLoBXQ2mKOHY3fXWQhxw7weY7VNrewkGMHConrFoyx2IYxxzK2GyXFF6MZc+whITsx7Ke4MOXYNiSvHhJljm2LwqFAO+Awizl2DH73fgs5dpDPc6y2ua2FHHuGkLhuyxiLhzPmWMZ2o6T4Ygxjjg2H7MSwn+LClGMPJ3k1HGWOVSikAelAhsUcOxa/+4CFHJvn8xyrbVYWcuxQIXGtGGMxkzHHMrYbJcUXYxlzbFbITgz7KS5MOTaT5NWsKHNsNgo5QC5whMUcOw6/+6CFHFvo8xyrbc62kGOLhMR1NmMsHsmYYxnbjZLii3GMObZ9yE4M+ykuTDn2SJJX20eZYzugcBRwtK4zizl2PH73IQs5doTPc6y2uYOFHDtSSFx3YIzFTow5lrHdKCm+GM+YY48J2YlhP8WFKcd2Inn1mChzbGcUugBdgW4Wc+wE/O5iCzl2jM9zrLa5s4UcO1ZIXHdmjMXujDmWsd0oKb6YwJhje4TsxLCf4sKUY7uTvNojyhzbE4VjgeOAXhZz7ET87sMWcuwEn+dYbXNPCzl2opC47skYi70Zcyxju1FSfDGRMcceH7ITw36KC1OO7U3y6vFR5tg+KJwAnAicZDHHTsLvPmIhx07xeY7VNvexkGOnConrPoyxeDJjjmVsN0qKLyYx5thTQnZi2E9xYcqxJ5O8ekqUObYvCv2A/sCpFnPsZPzuoxZy7Fk+z7Ha5r4WcuzZQuK6L+c+SsYcy9hulBRfTGbMsQNDdmLYT3FhyrEDSF4dGGWOPQ2F04FBwBkWc+wU/O5jFnLsuT7Psdrm0yzk2POExPVpjLE4mDHHMrYbJcUXUxhz7JCQnRj2U1yYcuxgkleHRJlj81AYCuQDBRZz7FT87uMWcuz5Ps+x2uY8Czn2Ainv6ePc48OYYxnbjZLii6mMObYoZCeG/RQXphxbSPJqUZQ5dhgKw4ERwEiLOfZM/O4TFnLsxT7PsdrmYRZy7CVSnlnKGIujGHMsY7tRUnxxJmOOHR2yE8N+igtTjh1F8uroKHPsGBTGAuOA8RZz7DT87pMWcuzlPs+x2uYxFnLsFVLu3+Rcf2bMsYztRknxxTTGHDsxZCeG/RQXphw7geTViVHm2EkoTAamAFMt5tiz8LtLLOTYq3yeY7XNkyzk2KulrGUzxuKZjDmWsd0oKb44izHHTgvZiWE/xYUpx55J8uq0KHPsWSicDZwDTLeYY8/G7z5lIcde6/Mcq20+y0KOvU5KXHOujTDmWMZ2o6T44mzGHHteyE4M+ykuTDn2XJJXz4syx85AYSZwPnCBxRx7Dn73aQs59kaf51ht8wwLOfYmIXE9gzEWL2TMsYztRknxxTmMOfaikJ0Y9lNcmHLshSSvXhRljr0YhUuAS4HLLObY6fjdZyzk2Ft8nmO1zRdbyLG3Conriznn7RhzLGO7UVJ8MZ0xx14RshPDfooLU469nOTVK6LMsbNQuBK4CrjaYo49F7/7rIUcO9/nOVbbPMtCjl0gJK5nMcbibMYcy9hulBRfnMuYY68J2YlhP8WFKcfOJnn1mihz7LUoXAdcD9xgMceeh99daiHH3uHzHKttvtZCjr1TSFxfyzmmZMyxjO1GSfHFeYw59qaQnRj2U1yYcuyNJK/eFGWOvRmFOcAtwK0Wc+wM/O5zFnLs3T7Psdrmmy3k2HuExPXNjLE4lzHHMrYbJcUXMxhz7LyQnRj2U1yYcuxcklfnRZlj56OwALgNuN1ijp2J333eQo5d5PMcq22ebyHH3i8krudz9ncYcyxju1FSfDGTMcfeGbITw36KC1OOvYPk1TujzLELUbgLuBu4x2KOPR+/+4KFHPuQz3OstnmhhRy7WEhcL2SMxXsZcyxju1FSfHE+Y469L2Qnhv0UF6Ycey/Jq/dFmWMXoXA/8ADwoMUcewF+d5mFHPuoz3OstnmRhRz7mJC4XsQZi4w5lrHdKCm+uIAxxy4O2YlhP8WFKcc+RPLq4ihz7MMoPAI8CjxGcqxzJDL7uWaArz4fDtlp20GXzV559gry1V9/xjh5nLH+kqAjJbD3WkIP7us1J2/K94mQRcJPhPj1PsmY6GzZ/STJKEx6dzc2zTUxYL+xMQZv2CbP/kE7QbGEtFv+Jw0w9po0t2CEo0M6KdJIyiMrcTqANuynIgH0tLbJhgOWWMhMS5gvzbbsTrRot+dt35brMOztULphPmNh+Pgs8+XdSQpa78yIXu66eNpSXSy1VBdLLdaFToQ26uJJv99ubKkNLNm/dufvg5+1tv+UpakL9/Au7O1QjO1SMfpacdZfUqTeTD3uQIz1ua/2RHXauGZx1QntVD5XVi857O1Qz1i6CFDSMXJW+/odzfk5GxdEn8xnxtJ587zfJOTPBLO0gp12+TzpnMTrn33VOad/XiC6VHo6YqMgWxUVFKVnZuemDVVZ6VlZRRlF2Vk5GQVFmRl5BdmFKiMvPS23MDtcpHIKC7Mz0/Ozs4pyC/KzimjSVgXp6RkFuUPzVWZaVt7QcE5Bel64KCM7PS2cV5CeXVCQnpOVlZeeXpCVU5STm5OWlleUnhPOzM7ODWelpeem2fLPCxH/lOfoupel0fWySMN6UUoCt8VvmYVk/ZKlC9dLFkcvui5etFAXL1uqi5ct1kUvSyO55/1+w72leHjB5yM5W21/mZCRHGO7VIy+Vsv+N5JzH2qZpZHcKxJHcq9YHsm9YiEpvPL/cCT3asifCeYVSyOFV4WN5JYzjuSWMY7kbPlnORnJlXZR8PMUnE2eti4wr0m8wLxm+QLzmoULzPJyusBwrvP6aK2oxAXGK6/XymkE4JXn64wXaMb2p16zdAF4PYoLtNc6fSPEdyEsMT3qowv0ckv+eeM/NNX6ZqRhvWXayBT2dqjSNvRw7lDznJwZk4sNxzt1yJ1UbdWhV10rfO4PHTArLHSM3rbUSXzb4lT0W5bq4h1LdfGO5Wl5G3Xxps+n5W3Fw1s+n5a31fZXCJmWZ2yXitHXasX/puXdx+5rFled0M7uuzZnTVZYugi8a3HWRHN+10JSWClkWn4FY0dwZcifCWalpVHlynKYluf0z3uM0/IrGEf9tvzz3n4Y9du6fen9SMP6QEoCt8XvfQvJ+kNLF64PLY5edF18YKEuPrJUFx9ZvlXGRs/+fZ+P5GzFwwc+H8nZavsfChnJMbZLxehr9eH/RnLuQ71vaSS3SuJIbpXlkdwqC0nhk/+HI7mPQ/5MMJ9YGil8LGwk9wnjSO5DxpGcLf98sh82WL0ZshP3Ui4wn0q8wHxq+QLzqYULzGdCNlhxJrC3LPVgvfL6XMgGq88YL9CM7U99bukC8Fk5bLD6nHGD1YoK/rxAf2bJP58b/MM96u3F+My+AYy6vmC8lpXn8/++sNRxWB2ySHh1iF/vl4wXNlt2fxnaW8FMesv1+X8DhDz/j3PXJg2KNWX1pr02ui8ZewM0qzuk/wvbZr+KBNDXpm2zHA5YYyEzrbG8IMdld6JFu71y/Mbni5q6YX5jYVj5raUh9rcWF/K+tlQX31mqi+8sb0+1URdf+nxR01Y8rPH5oqattv+VkEVNxnapGH2tvvrfoqb72H3N4qoT2qlca3PO+RtLF4G1FuecNee1Ni6IQhY1v2HsCH4f8meC+c7SnNz35bCoyemfHxgXNb9inDO15Z8f9sP21AGWRtfrIg3rRykJ3Ba/dRaS9XpLF671Fkcvui5+tFAXP1mqi58s1sUASyO5730+krMVDz/4fCRnq+2vEzKSY2yXitHXat3/RnLuQ62zNJLbIHEkt8HySG6DhaSw4f/hSO7nkD8TzAZLI4WfhY3kNjKO5NYxjuRs+Wfjftie+lXITtxLucBskniB2WT5ArPJwgVmo5DtqZwJbI2lHqxXXpuEbE/9hfECzdj+1CZLF4BfymF76q+M21O/quDPC/RGS/759T801fpbpGH9btrIFPZ2qNI29HDuUPOcnBmTiw3HO3XInVRt1aFXXZt97g8dMJstdIz+sNRJ/MPiVPTvlupii6W62GJ5Wt5GXfzm82l5W/Hwu8+n5W21/c1CpuUZ26Vi9LXa/L9pefex+5rFVSe0s/unzVmTzZYuAn9anDXRnP+0kBS2CpmW38zYEdwa8meC2WppVLm1HKblOf3zF+O0/GbGUb8t//y1H0b9tm5f2hZpWNulJHBb/LZZSNY7LF24dlgcvei62G6hLv62VBd/W75VxkbPfpvPR3K24mG7z0dyttr+DiEjOcZ2qRh9rXb8byTnPtQ2SyO5fySO5P6xPJL7x0JS2PX/cCS3M+TPBLPL0khhp7CR3C7GkdwOxpGcLf/s2g8brH4L2Yl7KRcYXdniLjCUtI0LDNXv6PUazAkpMjZYcSaw3y31YL3ySrTkC+69AAlJfPXH2P4UZ/3RuNb2zgyUPLjbd2IS34VwcwV/XqATLPknMan02R2OfS+bQ/wPGeLMZ8Ek3rzBfb29DI6aFeT3Tciy3RzvTF1hoe1wPgs3yed1qNu29jP3LBZjzCjaDr3am+xzf+j2kmyhH1qB0R827Naz/BUs2J2U4u/c3d+S3cnMdjsHd65l9I9K9rmvT7Xk6xTGnEb7fVrv7YHiiZmUQPkssXPb4hwVkywSrpjEr7cS40XPlt2VkvZWMJNeq7NplZLKh6dXf1Vm46kyNLf6gb0Dav1Z698ZKbcJ7C2vSNxbfjVYXHbOq4JzqgLVgOpJxfLEQMnDz8kgNaKnBnTWBGoBtYE6QF2gHlAfaAA0BA4ADgQOAhoBjYEmQCrQFDgYaAY0B1oALYFWQGugDXAI0BY4FGgHHAYcHnkoN02ymo+TXB1ZTYOslkFW2yCrY5DVNcjqGWT1DbIGBllDg+wAg+xAg+wgg6yRQdbYIGtikKUaZE0NsoMNsmYGWXODrIVB1tIga2WQtTbI2hhkhxhkbQ2yQw2ydgbZYQbZ4REZPWJdCYslZr3mwRoMugqL9BFWNRl5VbTUueaa9NQ2a1/UYqm/Yr/W9q4rzdmSUYfRF5X87IuMvdtQ6nqzOUy3tNTzoiut5PaY+oy+qOxPX4TdW4IaxGkz5uz/tb2oYXy6ckxblQ5g9EUVv/kix7w968DYbc4ubavXQbHqyi5921gjRl9U9Y8v0sraKtc4Fpuzy9521yR6XfvcEprK6ItqfvBF9j55qqbR2RyOwmZ1cDS6wlHVn2rG6Ivq+9cXmVHyVM33ZXNG1DarFmXqyiiKof5US86+9v7yRXZMPFWr0m3OidFm1boUXblFMdefasPoi5rl74twHDzVISabw3HZrNr+W5eKs/7UoYy+qFWeviiIm6dqV9LmdA82q8OIrrQiT/WnDmf0Re1y8kXY26EY5wcU4/hW0fGZV1/UEeILxnGQYuzHq2qMvqgrxBeM/T3F2F9RNRl9UU+ILxiva4oxL6s6jL6ob8kX3JulGONXMbY/xVl/ttcKG/Hp2rNWqO9TVEAakA5kAJlAFpAN5AC5wBHAkUB7oANwFHC07vcAnYBjgM5AF6Ar0A3oDvQAegLHAscBvYDewPFAH8NaYdiwpqMMsjSDLN0gyzDIMg2yLIMs2yDLMchyDbIjDLIjDbL2BlkHg+wog+xog6yjQdbJIDvGIOtskHUxyLoaZN0Msu4GWQ+DrKdBdqxBdpxB1ssg622QHW+Q9Umyv1ZIY9Zrrg8zrhUqxjFLKyFrhWmMa4XpjGuFGYy+aC1krTCTca0wi3GtMJvRF22ErBXmMK4V5jKuFR7B6ItDhKwVHsm4Vtieca2wA6Mv2gpZKzyKca3waMa1wo6MvjhUyFphJ8a1wmMY1wo7M/qinZC1wi6Ma4VdGdcKuzH64jAha4XdGdcKezCuFfZk9MXhQtYKj2VcKzyOca2wF6MvwkLWCnszrhUez7hW2IfRF0rIPDzj/IBiHN+qNozz8GlCfME4DlKM/Xh1KKMv0oX4grG/pxj7K+pwRl9kCPEF43VNMeZllcboi0wha4WM8asY25/irD/ba4UJfLr2rBWegL7LicBJwMnAKUBfoB/QHzgVGAAMBE4DTgcGAWcAg4EhQB4wFMgHCoBCoAgYBgwHRgAjgVHAaGAMMBYYZ1grPMGwpnOiQXaSQXayQXaKQdbXIOtnkPU3yE41yAYYZAMNstMMstMNskEG2RkG2WCDbIhBlmeQDTXI8g2yAoOs0CArMsiGGWTDDbIRBtlIg2yUQTbaIBtjkI01yMYl2V8rpDHrNdefwLhWeCLjmKWrkLXCkxjXCk9mXCs8hdEX3YSsFfZlXCvsx7hW2J/RF92FrBWeyrhWOIBxrXAgoy96CFkrPI1xrfB0xrXCQYy+6ClkrfAMxrXCwYxrhUMYfXGskLXCPMa1wqGMa4X5jL44TshaYQHjWmEh41phEaMveglZKxzGuFY4nHGtcASjL3oLWSscybhWOIpxrXA0oy+OF7JWOIZxrXAs41rhOEZf9BEyD884P6AYx7eqO+M8/AlCfME4DlKM/Xh1LKMvThTiC8b+nmLsr6jejL44SYgvGK9rijEvqxMYfXGykLVCxvhVjO1Pcdaf7bXCxny69qwVjkffZQIwEZgETAamAFOBM4FpwFnA2cA5wHTgXOA8YAYwEzgfuAC4ELgIuBi4BLgUuAy4HLgCmAVcCVwFXA3MNqwVjjes6UwwyCYaZJMMsskG2RSDbKpBdqZBNs0gO8sgO9sgO8cgm26QnWuQnWeQzTDIZhpk5xtkFxhkFxpkFxlkFxtklxhklxpklxlklxtkVxhkswyyKw2yqwyyqw2y2Un21wppzHrN9eMZ1wonMI5Z8oWsFU5kXCucxLhWOJnRFwVC1gqnMK4VTmVcKzyT0ReFQtYKpzGuFZ7FuFZ4NqMvioSsFZ7DuFY4nXGt8FxGXwwTslZ4HuNa4QzGtcKZjL4YLmSt8HzGtcILGNcKL2T0xQgha4UXMa4VXsy4VngJoy9GClkrvJRxrfAyxrXCyxl9MUrIWuEVjGuFsxjXCq9k9MVoIWuFVzGuFV7NuFY4m9EXY4TMwzPODyjG8a0qZJyHHyvEF4zjIMXYj1fDGX0xTogvGPt7irG/okYx+mK8EF8wXtcUY15WYxl9MUHIWiFj/CrG9qc468+9Vtjk33Wowh6ONkEXVw/aDgn+y+64tbUNGuowTm2HBo3+iEtbu2Apvo1D22HBUttJzNoOD5bR5mLVFiyz/cakTQX3EQsxaEsL7jOuotaWHowiRqPUlhGNrii1ZUanKyptWdHqikJbdvS69qktJxZd+9CWG5uuMrUdEauuMrQdGbuuUrW1j0dXKdo6xKfLqO2oeHUZtB0dv65/aevoRZdLWydvukpoO8arLqKts3dde7R14dAV0daVR9dubd24dOn9vny69uyJugZzNNcC1wHXAzcANwI3ATcDc4BbgFuBucA8YD6wALgNuB24A7gTWAjcBdwN3APcC9wHLALuBx4AHgQeAhYDDxv2RF1j2LtyrUF2nUF2vUF2g0F2o0F2k0F2s0E2xyC7xSC71SCba5DNM8jmG2QLDLLbDLLbDbI7DLI7DbKFBtldBtndBtk9Btm9Btl9Btkig+x+g+wBg+xBg+whg2yxQfZwUlR7ov7zYxOvY+3zy3ve4z88hvLqiwv2zxzUf3Ks59UXF+7P+cD/2JjUqy8u2v9zs/+ZsbNXX1zsl3ny/8AY36svLvHXmoXouQivvrjUj+tHQudMvPriMv+u5Ymb2/Hqi8v9vq4qaA7Kqy+uELLG3Z3R5msY70W6lnFP1Cwh9yJdx3gv0vWM9yLdwOiLK4Xci3Qj471INzHei3Qzoy+uEnIv0hzGe5FuYbwX6VZGX1wt5F6kuYz3Is1jvBdpPqMvZgu5F2kB471ItzHei3Q7oy+uEXIv0h2M9yLdyXgv0kJGX1wr5F6kuxjvRbqb8V6kexh9cZ2Qe5HuZbwX6T7Ge5EWMfrieiH3It3PeC/SA4z3Ij3I6IsbhNyL9BDjvUiLGe9FepjRFzcKmQNhXJdXjOvK6kLGff43CfEF4/qjYlw/U5cw+uJmIb5gXGdRjOsE6nJGX8wR4gvG+WTFOB+qrmT0xS1CfME4b6YY533UbEZf3CrEF4zzA4pxfKuuY/TFXCG+YBwHKcZ+vLqR0RfzhPiCsb+nGPsrag6jL+YL8QXjdU0x5mU1l9EXC4TcR8wYv4qx/SnO+ksMlDwSmOuwShIf19SInkeg81HgMeBx4AngSWAJ8BTwNPAM8CywFHgOeB54AVgGvAi8BLwMvAK8CiwHXgNeB94A3gTeAlYAbwPvAO8CKw331zxiuA/iUYPsMYPscYPsCYPsSYNsiUH2lEH2tEH2jEH2rEG21CB7ziB73iB7wSBbZpC9aJC9ZJC9bJC9YpC9apAtN8heM8heN8jeMMjeNMjeMshWGGRvG2TvGGTvGmQrk+w/c7gK47zeI4z7fB5l5PW8kH0+jzHu83mccZ/PE4y+eEHIPp8nGff5LGHc5/MUoy+WCdnn8zTjPp9nGPf5PMvoixeF7PNZyrjP5znGfT7PM/riJSH7fF5g3OezjHGfz4uMvnhZyD6flxj3+bzMuM/nFUZfvCJkn8+rjPt8ljPu83mN0RevCtnn8zrjPp83GPf5vMnoi+VC9vm8xbjPZwXjPp+3GX3xmpB9Pu8w7vN5l3Gfz0pGX7wuZB6ecX5AMY5v1TLGefg3hPiCcRykGPvx6mVGX7wpxBeM/T3F2F9Ryxl98ZYQXzBe1xRjXlZvMPpihZC1Qsb4VYztT3HWX0KkDb8Y0ac/H07WKA4j5XakfCgptyXlQ0i5DSm3JuVWpNySlFuQcnNSbkbKB5NyU1JOJeUmpNyYlBuR8kGkfCApH0DKDUm5ASnXJ+V6pFyXlOuQcm1SrkXKNUm5Bin3IeXjSbk3Kfci5eNI+VhS7knKPUi5Oyl3I+WupNyFlDuT8jGk3ImUO5Ly0aR8FCl3IOX2pHwkKR9ByrmknEPK2aScRcqZpJxByumknEbKipTDpDyOlMeS8hhSHk3Ko0h5JCmPIOXhpDyMlItIuZCUC0g5n5SHknIeKQ8h5cGkfAYpDyLl00n5NFIeSMoDSPlUUu5Pyv1IuS8pn0LKJ5PySaR8IimfQMqzSZm+o5W+w5W+45W+A5a+I5a+Q5a+Y5a+g5a+o5a+w5a+45a+A5e+I5e+Q5e+Y5e+g5e+o5e+w5e+45e+A5i+I5i+Q5i+Y5i+g5i+o5i+w5i+45i+A5m+I5m+Q5m+Y/lhUqbPg6TPi6TPk6TPm6TPo6TPq6TPs6TPu6TPw6TPy6TP06TP26TP46TP66TP86TP+6TPA6XPC6XPE6XPG6XPI6XPK6XPM6XPO6XPQ6XPS6XPU6XPW6XPY6XPa6XPc11JynS/AN1PQPcb0P0IdL8C3c9A9zvQ/RB0vwTdT0H3W9D9GHS/Bt3PQfd70P0gdL8I3U9C95vQ/Sh0vwrdz0L3u9D9MHS/DN1PQ/fb0P04dL8O3c/j7Pd5D3/fBz4APgQ+AlYBHwOfAJ8CnwGfA18Aq4EvgTXAV8DXwDfAt8B3wFrge+AHYB3wI7Ae+AnYAPwMbAQ2Ab8A+Le7P+b0ZemREPnbMfI37O1QCQE7/XDu91Zon5Tg6UHb+0n/sjlubR8kGeovTm0fJhl9EZe2j5JK8Wsc2lYlldpGYtb2cVIZ7S1GbZ8kldl2Y9L2adI+4iAGbZ8l7TOmotb2eVIU8Rmlti+i0RWlttXR6YpK25fR6opC25rode1T21ex6NqHtq9j01Wmtm9i1VWGtm9j11Wqtu/i0VWKtrXx6TJq+z5eXQZtP8Sv61/a1nnR5dL2ozddJbSt96qLaPvJu6492jZw6Ipo+5lH125tG7l0QdumJDv9Me5+Yxs+XeEEwrFmpPwr6uE34HdgM/AHsAX4E9gK/AVsA7YDO4C/gX+AncAu3YFOBmzfBPEro7NqOBxBPBEIAiEgCUgGKgApQEWgElAZqAJUBaoB1YEaycU2azudjeVaX4JLlmiQBQ2ykEGWZJAlG2QVDLIUg6yiQVbJIKtskFUxyKoaZNUMsuoGWY3kvW3EObgXd2ib8bqIon3rVVfxJvyiosRkPl5fpPh44/demwuCfPWXG+LTpZIYfbFahC8KVTJb/eWrCmy6clQKoy++FOGLsKrIVX+FYVWJS1d+WFVm9MUaCb7ICasqXPWHa09VJl2F0FWN0RdfCfBFPmyuzlR/OdBVI5mvT0Gvt1598XU5+SLs7VCM1zXFmJfVGkZffGPJF9ybZBjjVzG2P8Vdfwn/zieeNvPqRY2EZKNeT+1mvX27PW2Ift+S3T+Vh90eNr9/YMnuDeVjd9w3EHxoye6fy8vuOG/C+MiS3RvLz+64brhZZcnuTeVodzw3LX1sye5fytfumG/8+sSS3b+Wt90x3uT3qSW7fyt3u2O7UfIzS3b/vj/sjuFm088t2b15/9gd9Y3FX1iy+4/9ZXeUN2evtmT3lv1nd1Q3uH9pye4/96fdUTzMYI0lu7fuX7v3+UCIryzZ/df+tnsfD9X42pLd2/a/3WU+QOUbS3Zv94PdZTyE5ltLdu/wh92lPsjnO0t2/+0Xu0t5aNNaS3b/4x+7jQ+++t6S3Tt9ZLfp4WE/WLJ7l7/s/teD4tZZsjtQ0Wd2ux6296MluxP8Z3eJBxaut2R3oh/tJg+n/MmS3UF/2r3nAZ8bLNkd8q3dxQ9J/dmS3Uk+tlvvv9loye5kn9q9Z37fkt0VLNsd9nao3yzZncJst3MY9nL852/u8+qLiuXni7AXqyXchOjVF5XK2xfh+KyWcLOkV19U3j++CMdqtYSbOr36osr+9EU4eqsl3Hzq1RdV978vwtFYLeEmWa++qOYXX4TLtlrCzbxefVHdX74Il2a1hJuOvfqihh99Ef631RJujvbqi5r+9UWYWi3hJm6vvqjld18UH5w3myvGPefqJ8Z7KGoL8QXjHm7FuC9abWT0RR0pccFYf4x7d9WvjL6oK8QXjHthFeP+UrWZ0Rf1hPiCcb+mYtwDqf5k9EV9Ib5g3FOoGPfpqW2MvmggxBeM+94U414y9TejLxoK8QXj3izFuN9J7WL0xQFCfMG4f0gx7slRdJ+LV18cKMQXjHtcFOO+EZXE6IuDhPiCcR+GYtzboFIYfdFIiC8Y1+UV47qyqszoi8ZCfMG4/qgY189UNUZfNBHiC8Z1FsW4TqBqMvoiVYgvGOeTFeN8qKrD6IumQnzBOG+mGOd9VH1GXxwsxBeM8wOKcXyrDmD0RTMhvmAcBynGfrxqxOiL5kJ8wdjfU4z9FZXK6IsWQnzBeF1TjHlZNWP0Rcty8oXnPRKMz1xkzAWKsS2rlkLi4jfG/RbrGedWOfceFAqJC85+PGf/uJCRV5EQX9RjtJlzTNCAUdcwIb5oyGgz55jgQEZdw4X44iB/zk2rIkZeI4T4ohZjP4oxFyjGtqw4faHv66xP/LD7RTeow52Rci1SXpG4t/xqsLjsnFcb36sD1AXqJZfUR/0b9nYo/dKdRAv3o47z+f3H2ubaFuweL6RPXpvxmf71GXMEY7tRUnzxO+P4qEGynRj2U1yYcmx9klcbRJljG+J7BwAHAgdZzLH6pWZBC7lmks9zrLa5oQW7JwuJ64aMsdiIMccythslxRebGXNs42Q7MeynuDDl2EYkrzaOMsc2wfdSgabAwRZzrH5pZMhCrjnT5zlW29zEgt3ThMR1E8ZYbMaYYxnbjZLiiz8Yc2zzZDsx7Ke4MOXYZiSvNo8yx7bA91oCrYDWFnOsfilvkoVcc47Pc6y2uYUFu6cLiesWjLHYhjHHMrYbJcUXWxhz7CHJdmLYT3FhyrFtSF49JMoc2xbfOxRoBxxmMcfql54nW8g1M3yeY7XNbS3YPVNIXLdljMXDGXMsY7tRUnzxJ2OODSfbiWE/xYUpxx5O8mo4yhyr8L00IB3IsJhjt8K/FSzkmgt9nmO1zcqC3RcJiWvFGIuZjDmWsd0oKb7Yyphjs5LtxLCf4sKUYzNJXs2KMsdm43s5QC5whMUc+xf8m2Ih11zq8xyrbc62YPdlQuI6mzEWj2TMsYztRknxxV+MObZ9sp0Y9lNcmHLskSSvto8yx3bA944CjtZ1ZjHHboN/K1rINbN8nmO1zR0s2H2lkLjuwBiLnRhzLGO7UVJ8sY0xxx6TbCeG/RQXphzbieTVY6LMsZ3xvS5AV6CbxRy7Hf6tZCHXzPZ5jtU2d7Zg9zVC4rozYyx2Z8yxjO1GSfHFdsYc2yPZTgz7KS5MObY7yas9osyxPfG9Y4HjgF4Wc+wO+LeyhVxzvc9zrLa5pwW7bxAS1z0ZY7E3Y45lbDdKii92MObY45PtxLCf4sKUY3uTvHp8lDm2D753AnAicJLFHPs3/FvFQq652ec5Vtvcx4Ldc4TEdR/GWDyZMccythslxRd/M+bYU5LtxLCf4sKUY08mefWUKHNsX3yvH9AfONVijv0H/q1qIdfM9XmO1Tb3tWD3PCFx3ZcxFgcw5ljGdqOk+OIfxhw7MNlODPspLkw5dgDJqwOjzLGn4XunA4OAMyzm2J3wbzULueY2n+dYbfNpFuy+XUhcn8YYi4MZcyxju1FSfLGTMccOSbYTw36KC1OOHUzy6pAoc2wevjcUyAcKLObYXfBvdQu5ZqHPc6y2Oc+C3XcJies8xlgsZMyxjO1GSfHFLsYcW5RsJ4b9FBemHFtI8mpRlDl2GL43HBgBjLSYYwPQXcNCrrnX5zlW2zzMgt33CYnrYYyxOIoxxzK2GyXFFwFGX4xOthPDfooLU44dRfLq6Chz7Bh8bywwDhhPcqxzJLr87HmdnbHNjEm207a58+EEPp6ZAYsxyPleclvv9/LqiweE5MPKjPVn6/1eXn3xoBBfVGOsP1vv9/Lqi4eE+KImY/1xvt/rAUZfLBbyPOqJjH1exlygGNuyWmy5zzaB9NMmknKbwN7yVa4+2yR8bzIwBZhq6LMFmWPuV8Z+wSTGvvmZyXZ9cybxx2RSnkLKU5NL+mYaPp8FnA2cE0V/OuztUGsT+epzOmM8J0Taof6r9aZGyu46foSMTVqRNt+alB9NLFnH50LfecAMYGakjk26zyV+Oo+UZ5DyTJf/zsfnC4ALgYvK0H0+0XEBKV9Iyhe5dF+Mz5cAlwKXlaH7YqLjElK+lJQvc+m+HJ+vAGYBV5ah+3Ki4wpSnkXKV7p0X4XPVwOzgWvK0H0V0XE1Kc8m5Wtcuq/F5+uA64EbytBN28m1pYxt3e3kRnzvJuBmYE4Zum8k+m4i5ZtJeY6L9y34fCswF5hXhu5biI5bSXkuKc9z6Z6PzwuA24Dby9A9n+hYQMq3kfLtLt134POdwELgrjJ030F03EnKC0n5Lpfuu/H5HuBe4L4ydN9NdNxDyveS8n0u3Yvw+X7gAeDBiO6kCJycajo6Rv6GvR1pCYbf4Z6HbhXg7/dxc2wd4L3mOsdDya7K5b5QLmLseDxkaeKJ2+bpjDYvttQ5WBzpHOhATo7AfXA34oSAHf8FmHim5RWkZ2bmZtisg0WW2jA3z+lCeIYC/m5TZelmn+XnrNhDAuWTbL3azJhUVFshNicy2nyoEJuDjDa3E2IzY3JTh5WTzWFvhzqcsf6+TpRxEQsHZPBUQnimCeGZLoRnhhCemUJ4ZgnhmS2EZ44QnrlCeB4hhOeRQni2F8KzgxCeRwnhebQQnh2F8OwkhOcxQnh2FsKzixCeXYXw7CaEZ3chPHsI4dlTCM9jhfA8TgjPXkJ49hbC83ghPPsI4XmCEJ4nCuF5khCeJwvheYoQnn2F8OwnhGd/ITxPFcJzgBCeA4XwPE0Iz9OF8BwkhOcZQngOFsJziBCeeUJ4DhXCM18IzwIhPAuF8CwSwnOYEJ7DhfAcIYTnSCE8RwnhOVoIzzFCeI4VwnOcEJ7jhfCcIITnRCE8JwnhOVkIzylCeE4VwvNMITynCeF5lhCeZwvheY4QntOF8DxXCM/zhPCcIYTnTCE8zxfC8wIhPC8UwvMiITwvFsLzEiE8LxXC8zIhPC8XwvMKITxnCeF5pRCeVwnhebUQnrOF8LxGCM9rhfC8TgjP64XwvEEIzxuF8LxJCM+bhfCcI4TnLUJ43iqE51whPOcJ4TlfCM8FQnjeJoTn7UJ43iGE551CeC4UwvMuITzvFsLzHiE87xXC8z4hPBcJ4Xm/EJ4PCOH5oBCeDwnhuVgIz4eF8HxECM9HhfB8TAjPx4XwfEIIzyeF8FwihOdTQng+LYTnM0J4PiuE51IhPJ8TwvN5ITxfEMJzmRCeLwrh+ZIQni8L4fmKEJ6vCuG5XAjP14TwfF0IzzeE8HxTCM+3hPBcIYTn20J4viOE57tCeK4UwvM9ITzfF8LzAyE8PxTC8yMhPFcJ4fmxEJ6fCOH5qRCenwnh+bkQnl8I4blaCM8vhfBcI4TnV0J4fi2E5zdCeH4rhOd3QniutcQzkZnn90SX13f3TkuWYfMPjDavTZTRHtcFZPD8UQjP9UJ4/iSE5wYhPH8WwnOjEJ6bhPD8RQjPX4Xw/E0Iz9+F8NwshOcfQnhuEcLzTyE8twrh+ZcQntuE8NwuhOcOITz/FsLzHyE8dwrhuUsIT61QAs8EITwThfAMCuEZEsIzSQjPZCE8KwjhmSKEZ0UhPCsJ4VlZCM8qQnhWFcKzmhCe1YXwrCGEZ00hPGsJ4VlbCM86QnjWFcKznhCe9YXwbCCEZ0MhPA8QwvNAITwPEsKzkRCejYXwbCKEZ6oQnk2F8DxYCM9mQng2F8KzhRCeLYXwbCWEZ2shPNsI4XmIEJ5thfA8VAjPdkJ4HiaE5+FCeIaF8FRCeKYJ4ZkuhGeGEJ6ZQnhmCeGZLYRnjhCeuUJ4HiGE55FCeLa3xDPRxdPrfZEJjDZ3+H9o81H/D20+WkgMdkzwXn/5mWn5eXlZBTZ5dhLShkKMNh9TTjaHvR2qcwJf/S1KlhE3XYTEd1chPLsJ4dldCM8eQnj2FJLjjmXMcdOF5LjjhLShXkJ49hbC83ghPPsI4XmCEJ4nCuF5khCeJwvheYoQnn2F8OwnhGd/ITxPFcJzgBCeA4XwPE0Iz9OF8BwkhOcZQngOFsJziBCeeUJ4DhXCM18IzwIhPAuF8CwSwnOYEJ7DhfAcIYTnSCE8RwnhOVoIzzFCeI4VwnOcEJ7jhfCcIITnRCE8JwnhOVkIzylCeE4VwvNMITynCeF5lhCeZwvheY4QntOF8DxXCM/zhPCcIYTnTCE8zxfC8wIhPC8UwvMiITwvFsLzEiE8LxXC8zIhPC8XwvMKITxnCeF5pRCeVwnhebUQnrOF8LxGCM9rhfC8TgjP64XwvEEIzxuF8LxJCM+bhfCcI4TnLUJ43iqE51whPOcJ4TlfCM8FQnjeJoTn7UJ43iGE551CeC4UwvMuITzvFsLzHiE87xXC8z4hPBcJ4Xm/EJ4PCOH5oBCeDwnhuVgIz4eF8HxECM9HhfB8TAjPx4XwfEIIzyeF8FwihOdTQng+LYTnM0J4PiuE51IhPJ8TwvN5ITxfEMJzmRCeLwrh+ZIQni8L4fmKEJ6vCuG5XAjP14TwfF0IzzeE8HxTCM+3hPBcIYTn20J4viOE57tCeK4UwvM9ITzfF8LzAyE8PxTC8yMhPFcJ4fmxEJ6fCOH5qRCenwnh+bkQnl8I4blaCM8vhfBcI4TnV0J4fi2E5zdCeH4rhOd3QniuFcLzeyE8fxDCc50Qnj8K4bleCM+fhPDcIITnz0J4bhTCc5MQnr8I4fmrEJ6/CeH5uxCem4Xw/EMIzy1CeP4phOdWITz/EsJzmxCe24Xw3CGE599CeP4jhOdOITx3CeEZSJTBM0EIz0QhPINCeIaE8EwSwjNZCM8KQnimCOFZUQjPSkJ4VhbCs4oQnlWF8KwmhGd1ITxrCOFZUwjPWkJ41hbCs44QnnWF8KwnhGd9ITwbCOHZUAjPA4TwPFAIz4OE8GwkhGdjITybCOGZKoRnUyE8DxbCs5kQns2F8GwhhGdLITxbCeHZWgjPNkJ4HiKEZ1shPA8VwrOdEJ6HCeF5uBCeYUs8E10808NZGRmF2WmFKl3lhdNyh+ZkhjMyh2blqByVmZNZkJaTnl6Yk5GTnTs0NzucqzLSC1VRZm56UUR3S0abVTnZHPZ2qLREvvpbnCyjPaYLiZsMITwzhfDMEsIzWwjPHCE8c4XwPEIIzyOF8GwvhGcHITyPEsLzaCE8Owrh2UkIz2OE8OwshGcXITy7CuHZTQjP7kJ49hDCs6cQnscK4XmcEJ69hPDsLYTn8UJ49hHC8wQhPE8UwvMkITxPFsLzFCE8+wrh2U8Iz/5CeJ4qhOcAITwHCuF5mhCepwvhOUgIzzOE8BwshOcQITzzhPAcKoRnvhCeBUJ4FgrhWSSE5zAhPIcL4TlCCM+RQniOEsJztBCeY4TwHCuE5zghPMcL4TlBCM+JQnhOEsJzshCeU4TwnCqE55lCeE4TwvMsITzPFsLzHCE8pwvhea4QnucJ4TlDCM+ZQnieL4TnBUJ4XiiE50VCeF4shOclQnheKoTnZUJ4Xi6E5xVCeM4SwvNKITyvEsLzaks8E108vd4HncRo82whNicz2nyNEJsrMNp8rRCbUxhtvk6IzRUZbb5eiM2VGG2+QYjNlRltvlGIzVUYbb5JiM1VGW2+WYjN1RhtniPE5uqMNt8ixOYajDbfKsTmmow2zxVicy1Gm+cJsbk2o83zhdhch9HmBUJsrsto821CbK7HaPPtQmyuz2jzHUJsbsBo851CbG7IaPNCITYfwGjzXUJsPpDR5ruF2HwQo833CLG5EaPN9wqxuTGjzfcJsbkJo82LhNicymjz/UJsbspo8wNCbD6Y0eYHhdjcjNHmh4TY3JzR5sVCbG7BaPPDjDbr/QChiK5DiP0JkToIRv5fr5/r9WS9vqrXG/X6m16P0uszer1Cz9/r+Ww9v6vnO/X8n54P0/NDer5Ezx/o8bQeX+rxlh5/6P647p/q/pruv+jrub6+pQI6/+l8oONDtxddf/pZ8K2A1kAbwvWSxL382wKHAu2Aw4DDdR0BCkjTfgQygEwgC8gGcoBc4AjgSKA90AE4Cjg64rdOwDFAZ6AL0BXoBnQHegA9gWOB44BeQG/geKAPcAJwInAScDJwCtAX6Af0B04FBgADgdOA04FBwBnAYGAIkAcMBfKBAqAQKAKGAcOBEcBIYBQwGhgDjAXGAeOBCcBEYBIwGZgCTAXOBKYBZwFnA+cA04FzgfOAGcBM4HzgAuBC4CLgYl3vwKXAZcDlwBXALOBK4CrgamA2cA1wLXAdcD1wA3AjcBNwMzAHuAW4FZgLzAPmAwuA24DbgTuAO4GFwF3A3cA9wL3AfcAi4H7gAeBB4CFgMfAw8AjwKPAY8DjwBPAksAR4CngaeAZ4FlgKPAc8D7wALANeBF4CXgZeAV4FlgOvAa8DbwBvAm8BK4C3gXeAd4GVwHvA+8AHwIfAR8Aq4GPgE+BT4DPgc+ALYDXwJbAG+Ar4GvgG+Bb4DlgLfA/8AKwDfgTWAz8BG4CfgY3AJuAX4FfgN+B3YDPwB7AF+BPYCvwFbAO2AzuAv4F/gJ3ALkAngwQgEQgCISAJSAYqAClARaASUBmoAlQFqgHVgRpATaAWUBuoA9QF6gH1gQZAQ+AA4EDgIKAR0BhoAqQCTYGDgWZAc6AF0BJoBbQG2gCHAG2BQ4F2wGHA4YBOcgpIA9KBDCATyAKygRwgFzgCOBJoD3QAjgKOBjoCnYBjgM5AF6Ar0A3oDvQAegLHAscBvYDewPFAH+AE4ETgJOBk4BSgL9AP6A+cCgwABgKnAacDg4AzgMHAECAPGArkAwVAIVAEDAOGAyOAkcAoYDQwBhgLjAPGAxOAicAkYDIwBZgKnAlMA84CzgbOAaYD5wLnATOAmcD5wAXAhcBFwMXAJcClwGXA5cAVwCzgSuAq4GpgNnANcC1wHXA9cANwI3ATcDMwB7gFuBWYC8wD5gMLgNuA24E7gDuBhcBdwN3APcC9wH3AIuB+4AHgQeAhYDHwMPAI8CjwGPA48ATwJLAEeAp4GngGeBZYCjwHPA+8ACwDXgReAl4GXgFeBZYDrwGvA28AbwJvASuAt4F3gHeBlcB7wPvAB8CHwEfAKuBj4BPgU+Az4HPgC2A18CWwBvgK+Br4BvgW+A5YC3wP/ACsA34E1gM/ARuAn4GNwCbgF+BX4Dfgd2Az8AewBfgT2Ar8BWwDtgM7gL+Bf4CdwC5AdwQSgEQgCISAJCAZqACkABWBSoB+P71+97t+r7p+Z7l+H7h+17Z+j7V+R7R+/7J+t7F+b7B+J69+361+l6x+T6t+B6p+v6h+d6d+L6Z+56R+n2MqoN9DqN/xp9+fp99Np9/7pt+ppt9Xpt8Fpt+zpd9hpd8Ppd+9pN9rpN8ZpN/Ho991o9/9ot+rot8zot/hod+Pod89od/roN+ZoN9HoJ/1r5+jr59Rr5//rp+tvvu55YB+3rZ+lrV+TrR+BrN+vrF+drB+Lq9+5q1+nqx+Vqt+Dqp+xqh+fqd+NqZ+7qR+pqN+XqJ+FqF+zp9+hp5+Pp1+9pt+rpp+Zpl+Hph+1pZ+jpV+RpR+/pJ+tpF+btAQQD/vRj9LRj+nRT8DRT9fRD+7Qz8XQz9zQj/PQT8rQT+HQN/jr++f1/em6/u+9T3V+n5lfS+wvs9W38Oq7w/V917q+xr1PYP6fjx9r5u+j0zfo6Xvf9L3Fun7dmYC+n4TfS+Hvk9C34Og9/frfpfel673fOv91Hqvst4HrPfY6v2rem+o3iup9w7qvXR6b5nea6X3Hum9OHpvit6rofcu6LV8vbat13r12qdeC9RrY3qtSK+d6LUEPbeu55r13Kuei9Rzc3quSs/d6LkMPbbXY1099tNjIT020H1l3RdxjiakfFDkb97kyYVjxk9OnTwuNa+gIPXMEZOHp46bWjixaPQ43T3anS+co0Xk7wkTx00dMXZY6vgpQ0ePyE+dmjd6SmHqiLH5o6dMGjFubGpR3ojRhbqftjuJOMeBkb/5eaNH7/61SZMKJ04ePCZv2uChIyYPnjTibN2t251vYjzlzdhPWRH7Ke/Gfsp7sZ/yWeynfBH7Kd/Efsp3sZ+yLvZT1sd+yu+xn/JH7Kdsjf2UbbGfoi8yMZ4Siv2USrGfUiX2U+rFfkqD2E9pGvspzWI/pWXsp7SO/RQV+ynpsZ+SG/spR8Z+ytGxn9Ip9lOOjf2UXrGf0if2U06M/ZSBsZ9yeuynDI39lILYTxlJTjk08veE4s5CQd7kvNTJEwt1h6GgcFpqwbjCSWNbTU4dkzc5f7jufowtnKTnaXZ35rzqGM2gY2zs5vcL7T2lTuRvb6jLG1aYOnbcZPxi6qTJeZN3fzePfDfaPtmEGM/RF6IbI98rDMR/7ghybsPI304TJ+adFanDcVMmp44rSh06bsrYgkn0xPHxnnhOHGyfiVx3c8m5Tf997qQpQydPzMufXLqCDrGydk7sEu+JfeMwd2nk3IxYf9Q5sZOHH+0a74/2i+NHl0fObU/OjcmxjoKOsbJ2Tuwe74n94zD37Xgd+7YHx74dr2Pf9uDYVV4duypex66K17GrPDh2tVdzV8dr7up4zV3twdy18bbjtR7a8dp42/FaD+14k1fHborXsZvidewmD47dEq9jt3hw7JZ4HbvFg2N3enXszngduzNex+704NikRI/mOgo6xsraObF7vCfGY27NyLlxdxgdBTF3GJ0Tu8R7YjwdxtqRc2MOW+fEeMLWOTfmsHVOjCdsG3ltx43ibceN4m3HjTy04+bxOra5B8c2j9exzT04tp1Xx7aL17Ht4nVsOw+OzfBqbka85mbEa26GB3Pbx9uO23tox+3jbcftPbTjbl4d2y1ex3aL17HdPDi2d7yO7e3Bsb3jdWxvD47t59Wx/eJ1bL94HdvPg2MHeTV3ULzmDorX3EHxmlsx8qXbIn/1Z2eKWCsOBfg2u1Yk5Fh152Snad1Jdnjv1p1sR/fuhxx1TinW5fB3fitI/s/56/x+1cj/0/+rGti7AbhLRKb/1Avs/f+uKXt1O7JuEVmIyLq7OGlZj5SS/LSsZ0RWgdQP9XMowkEfTrtyNhxTezpGPoe9HDkZeVp3ZRu6w2k5u+s8Za8Ne+o8IqtEZEkRmcNFf5wRKeuN1I4f2pE6qWCHd2FV4rMA+Y2Ay0/O4fCoFLDW7vUezj2/4/y+81tOO9Gb0RtEysMKJxcvdXXBStcpWOjqX7ymlUD4OfraEZnz121vO9dv6SPo4uP+/4RAyXqqTj4nl/KdkEFXDfJ95/8qkjJ3jommrvV3UlzfqeDiqO116iiF8LbTbovbSMUoeFdyfcc5pwLh7fCtRHhXtMNb703eE/dl8a7i+k5lws3h7fCtYp93uomTiXdV13eqGHg7tjjfDZLvufNzkJxLfz9oqBPnHIv1kGGy0VQP1VzfqWqoB8eeauT/qtrhraoGSsaL8xsBF0/nqGrgFODjs/vBftWt2JqW69ykFK2tDo9K5Dwb+aq66/ed36J9nxp26kTf+7BHt/P7NVz263qr6ZLp82pFykmR85zv1CD8ne/UIuclkc89yDk1ye8533VkAddvOHWjY+wYosNpy9WIriRyvnPOcZGyvWtocd1WddWRm0sS+c4Qwq9PpKzruwLh6sjc1yvTda+iq65qGHTR+Kf9e4dTCpE5dUr7rE57qEJkjv9pPq/p4kvHIiX6xaTs/HXqjPrUya20jVYgdjoyh39Nwon2wSqSv5ZybKYp79MxkvObji3Jru845yaR7xRF/tYK/PuwmEMLaL5w2rTDrzqRO98ZWQZPU+4xXTPd+dE5h/5uVVJ26sBmzqzuqgPHV7RunO9MKKMO6PiwRL8+xQr3XK32CvLbe9oW+b19XY9MfqP14dQDjUNqCz3P+T7NY8733XFgypnTI39NdRvv9aCClbovHlOlkDmSEPktp/4TyXdSCI8k8vnywF55RTIA290vduZWIn+1X5Kd+YeU0s8Luc6rQb6TTM6r4DqvAuG9+7uB4huG9VHZ9ftBgx5nrJvs0pNEvnM10X1NpEznS4JkjmmB4f+do6y+XojM0VS06P9KLv87vxUi9jvfqeTyv/N5HrGncin+r0j877Sbyimln5fkOq8G+U5KGe2mosH/10fKlQIl8wpnv5n6WrezUyNlmXPRGVn/xbnoWOabaZ/SPd9M5z4TiJ+t2KSKx6ApNnSH0xTtpwYCJW1yDpqX6ByUzTmz0ubxnFjS/ee6xCeahHNOqiOjk32UrHuSNOhSTgcmdFBg0wmUk/MbARdP56BOCFrhZHaCu54cJ4QIaaMT6GqQQzbZpdzd065Bvu/8n8UZZhXrCkNps94JfJzCpc2yW5o1VHSEGk0dODxqkPPKYzWgtF5zG+u/nRamMxtlzaI431GEX7tIuXrAfHVKJuc7MncMuGcM6MpkRRePBBeXTKLrxIDtulJFtK4c3bSOHHklwqu0+nS+c0Tkb2kzDVZWZSN+r0z40BmtSkTufOeoMnhSXY6d7iscrRfnO6bVlZCLg+06qBJFHTjf6bqPOnCv1ASjqIOyVmqo3TQWEgN766ky+Q23rgQX/16RvzReKKekUnTTvF2aXxivE4rm30oGzjavm7Sunfp2x29ZMU5zqfMdZ4NXaTNU7nNp7h9A/k/qyCtkkbelUV2JkZc7x5tGXu5RVhfDrp6uLn21yffoapQVmyIjL0s7WmLub/plR4tp5OWck+rITB2cBCJzlCe5lNPESYPc1iinqouT8xsBF0/nCBo4BQK8Hf4kw2/ZGXmG4x7+l+8IORz3CJlyCgR4L7jBMn7LxoDH3eHXcdLC+m8r44DHzYUOMsKEn3NRppMASUTmXm6h7ZEOjFJc59L2QM9183IGSxVd51vcYmnsJLs7iLST6QzKou0km5Yk3YOJKqQcCJTchuV8l25nop1s+l0ac6aOMz2Pliu6zqF5rZLhdyqUYYvbp7Q9JgdKr1/nO852jNIGjHYmU8ztwD2Ao+2gWxk8o20H7o64e7sa3UZIt1nQLb4Bw3dpO6hCftd0Hi27t/7R60ZKGb9TMVDS3o6Rv2Evhyp+pnYlwj/FwC/o4m5vQF3c4XL71T2gpzOx7vZO25fzHef+idIGT+5z6XVkMLH5f8tWJY7/5LIV/Z0k8l06iUtzM+ekRRL57YGEC91maqVPExnYWZoki3kLayXy19bEvmkizb0dzzSwc85JdWR0SY2SjWZJzb2vz7YTYhkwUCfYXFKrtI96Mi2pGZ3gvmLSq4SjPMWlvLRRi80ltViWk8prSc20VGVnNFBcB5UC0dcB7TFX2ke9cI8w3UuNdMnK4jKRcWnFzYUurWQQfs7yGt2YTDcJu0eY+pzTyTnu3hbt1bqX0Rx5DtF1svX6CRfR+nEvo9EeCe3RlVaHznecJ6OUNiqqYsWW4lGRexO6YxvtzTrf6VQGT6rLsdN9VTP1sJ1z6KjI3Su2XQfVoqgD5zs99lEH7s3cwSjqoJqhDqq6ONB2515Gq0p+w60rwcXfuXmAxot7dGzSTXM1HaG5Zw3KKQ6VaXbCHWNlxaFp9sfZKFjaaM19Ls3J+8pvdJRgmjmjsyZ0JlHeyC8z2+LoLN3eMlDJkV+yy5fRjvxoO+hKRoM1XZydw5QjrI2cI6NyO75RynTDAr2hnbb7JFc9648HRMp6dOw8RKAmqRM7fldpkm9od+psWOHkXuqUcb3SeheOGVo4cdLwEePLuKWdtkbnr9ti5zt06Ga6pV0fSYb/Nx00OkxzKs7/6Swo4XaL5oG9cj/ebnEgqc9DI2Wh84nZFucT0/fXfGKsj2Sx1qPKyciwPV9raT02zZQpHTvo6FNihqdrNHS9tDzrkl6hnbos6ypPe0xJrnZPr/K090R/owX5/26GefNurnnz/10niv9yXSdMbcDxk3MO3UNAe2XuPUXujbTO+2D1MT4vf1SnicOmjCkcO3kSDUaqkB6JpEy7zO6kSr/nNIhEgz7aAE3dfDokqx0pC7145lq8UyHL4qJsiYune3ez9pMz7OriSgD6/5xE0c3wf87zyLqT/3PWTpznkvVw/Z+XISC9AHUjMqfddScyJ157GIaPuh32JAGtDx1UzlP9CsdOmFI4pbD42VbdpozNnzxi3NjOeaNHB1wHvRruq1fv/j7NDimG/3cO91jXLaOjDqdcOVByPcRSw0qzuM4QpvXj3umjDyeBhFz14i4nBkomG/f/m2RVDb9T2yCjD7eoQ3RwJ7S6dnSXqGOHf11iE70IcP2m1uEeqdI6pav2tA0n8HNRROXu33Rf3KjPnf/7P6dQv7FB8wUA","debug_symbols":"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","brillig_names":["get_public_data_witness","lt_32_hint","decompose_hint","lte_16_hint","get_l1_to_l2_membership_witness","pack_arguments","enqueue_public_function_call_internal","directive_integer_quotient","directive_invert"]},{"name":"deploy","is_unconstrained":false,"custom_attributes":["aztec(private)"],"abi":{"error_types":{},"parameters":[{"name":"inputs","type":{"fields":[{"name":"call_context","type":{"fields":[{"name":"msg_sender","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"storage_contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"function_selector","type":{"fields":[{"name":"inner","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"}},{"name":"is_delegate_call","type":{"kind":"boolean"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::call_context::CallContext"}},{"name":"historical_header","type":{"fields":[{"name":"last_archive","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"content_commitment","type":{"fields":[{"name":"num_txs","type":{"kind":"field"}},{"name":"txs_effects_hash","type":{"kind":"field"}},{"name":"in_hash","type":{"kind":"field"}},{"name":"out_hash","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::content_commitment::ContentCommitment"}},{"name":"state","type":{"fields":[{"name":"l1_to_l2_message_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"partial","type":{"fields":[{"name":"note_hash_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"nullifier_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"public_data_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}}],"kind":"struct","path":"authwit::aztec::protocol_types::partial_state_reference::PartialStateReference"}}],"kind":"struct","path":"authwit::aztec::protocol_types::state_reference::StateReference"}},{"name":"global_variables","type":{"fields":[{"name":"chain_id","type":{"kind":"field"}},{"name":"version","type":{"kind":"field"}},{"name":"block_number","type":{"kind":"field"}},{"name":"slot_number","type":{"kind":"field"}},{"name":"timestamp","type":{"kind":"integer","sign":"unsigned","width":64}},{"name":"coinbase","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::eth_address::EthAddress"}},{"name":"fee_recipient","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"gas_fees","type":{"fields":[{"name":"fee_per_da_gas","type":{"kind":"field"}},{"name":"fee_per_l2_gas","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_fees::GasFees"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::global_variables::GlobalVariables"}},{"name":"total_fees","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::header::Header"}},{"name":"tx_context","type":{"fields":[{"name":"chain_id","type":{"kind":"field"}},{"name":"version","type":{"kind":"field"}},{"name":"gas_settings","type":{"fields":[{"name":"gas_limits","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"teardown_gas_limits","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"max_fees_per_gas","type":{"fields":[{"name":"fee_per_da_gas","type":{"kind":"field"}},{"name":"fee_per_l2_gas","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_fees::GasFees"}},{"name":"inclusion_fee","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_settings::GasSettings"}}],"kind":"struct","path":"authwit::aztec::protocol_types::transaction::tx_context::TxContext"}},{"name":"start_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"aztec::context::inputs::private_context_inputs::PrivateContextInputs"},"visibility":"private"},{"name":"artifact_hash","type":{"kind":"field"},"visibility":"private"},{"name":"private_functions_root","type":{"kind":"field"},"visibility":"private"},{"name":"public_bytecode_commitment","type":{"kind":"field"},"visibility":"private"},{"name":"portal_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::eth_address::EthAddress"},"visibility":"private"}],"return_type":{"abi_type":{"fields":[{"name":"call_context","type":{"fields":[{"name":"msg_sender","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"storage_contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"function_selector","type":{"fields":[{"name":"inner","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"}},{"name":"is_delegate_call","type":{"kind":"boolean"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::call_context::CallContext"}},{"name":"args_hash","type":{"kind":"field"}},{"name":"returns_hash","type":{"kind":"field"}},{"name":"min_revertible_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"is_fee_payer","type":{"kind":"boolean"}},{"name":"max_block_number","type":{"fields":[{"name":"_opt","type":{"fields":[{"name":"_is_some","type":{"kind":"boolean"}},{"name":"_value","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"std::option::Option"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::max_block_number::MaxBlockNumber"}},{"name":"note_hash_read_requests","type":{"kind":"array","length":16,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::read_request::ReadRequest"}}},{"name":"nullifier_read_requests","type":{"kind":"array","length":16,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::read_request::ReadRequest"}}},{"name":"key_validation_requests_and_generators","type":{"kind":"array","length":16,"type":{"fields":[{"name":"request","type":{"fields":[{"name":"pk_m","type":{"fields":[{"name":"x","type":{"kind":"field"}},{"name":"y","type":{"kind":"field"}},{"name":"is_infinite","type":{"kind":"boolean"}}],"kind":"struct","path":"std::embedded_curve_ops::EmbeddedCurvePoint"}},{"name":"sk_app","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::validation_requests::key_validation_request::KeyValidationRequest"}},{"name":"sk_app_generator","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::validation_requests::key_validation_request_and_generator::KeyValidationRequestAndGenerator"}}},{"name":"note_hashes","type":{"kind":"array","length":16,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::note_hash::NoteHash"}}},{"name":"nullifiers","type":{"kind":"array","length":16,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"note_hash","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::nullifier::Nullifier"}}},{"name":"private_call_requests","type":{"kind":"array","length":4,"type":{"fields":[{"name":"contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"call_context","type":{"fields":[{"name":"msg_sender","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"storage_contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"function_selector","type":{"fields":[{"name":"inner","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"}},{"name":"is_delegate_call","type":{"kind":"boolean"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::call_context::CallContext"}},{"name":"args_hash","type":{"kind":"field"}},{"name":"returns_hash","type":{"kind":"field"}},{"name":"start_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"end_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::private_call_request::PrivateCallRequest"}}},{"name":"public_call_requests","type":{"kind":"array","length":16,"type":{"fields":[{"name":"item","type":{"fields":[{"name":"contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"call_context","type":{"fields":[{"name":"msg_sender","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"storage_contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"function_selector","type":{"fields":[{"name":"inner","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"}},{"name":"is_delegate_call","type":{"kind":"boolean"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::call_context::CallContext"}},{"name":"args_hash","type":{"kind":"field"}},{"name":"returns_hash","type":{"kind":"field"}},{"name":"revert_code","type":{"kind":"integer","sign":"unsigned","width":8}},{"name":"start_gas_left","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"end_gas_left","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::public_call_stack_item_compressed::PublicCallStackItemCompressed"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::public_call_request::PublicCallRequest"}}},{"name":"public_teardown_call_request","type":{"fields":[{"name":"item","type":{"fields":[{"name":"contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"call_context","type":{"fields":[{"name":"msg_sender","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"storage_contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"function_selector","type":{"fields":[{"name":"inner","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"}},{"name":"is_delegate_call","type":{"kind":"boolean"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::call_context::CallContext"}},{"name":"args_hash","type":{"kind":"field"}},{"name":"returns_hash","type":{"kind":"field"}},{"name":"revert_code","type":{"kind":"integer","sign":"unsigned","width":8}},{"name":"start_gas_left","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"end_gas_left","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::public_call_stack_item_compressed::PublicCallStackItemCompressed"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::public_call_request::PublicCallRequest"}},{"name":"l2_to_l1_msgs","type":{"kind":"array","length":2,"type":{"fields":[{"name":"recipient","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::eth_address::EthAddress"}},{"name":"content","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::messaging::l2_to_l1_message::L2ToL1Message"}}},{"name":"start_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"end_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"note_encrypted_logs_hashes","type":{"kind":"array","length":16,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"length","type":{"kind":"field"}},{"name":"note_hash_counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::log_hash::NoteLogHash"}}},{"name":"encrypted_logs_hashes","type":{"kind":"array","length":4,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"length","type":{"kind":"field"}},{"name":"randomness","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::log_hash::EncryptedLogHash"}}},{"name":"unencrypted_logs_hashes","type":{"kind":"array","length":4,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"length","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::log_hash::LogHash"}}},{"name":"historical_header","type":{"fields":[{"name":"last_archive","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"content_commitment","type":{"fields":[{"name":"num_txs","type":{"kind":"field"}},{"name":"txs_effects_hash","type":{"kind":"field"}},{"name":"in_hash","type":{"kind":"field"}},{"name":"out_hash","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::content_commitment::ContentCommitment"}},{"name":"state","type":{"fields":[{"name":"l1_to_l2_message_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"partial","type":{"fields":[{"name":"note_hash_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"nullifier_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"public_data_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}}],"kind":"struct","path":"authwit::aztec::protocol_types::partial_state_reference::PartialStateReference"}}],"kind":"struct","path":"authwit::aztec::protocol_types::state_reference::StateReference"}},{"name":"global_variables","type":{"fields":[{"name":"chain_id","type":{"kind":"field"}},{"name":"version","type":{"kind":"field"}},{"name":"block_number","type":{"kind":"field"}},{"name":"slot_number","type":{"kind":"field"}},{"name":"timestamp","type":{"kind":"integer","sign":"unsigned","width":64}},{"name":"coinbase","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::eth_address::EthAddress"}},{"name":"fee_recipient","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"gas_fees","type":{"fields":[{"name":"fee_per_da_gas","type":{"kind":"field"}},{"name":"fee_per_l2_gas","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_fees::GasFees"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::global_variables::GlobalVariables"}},{"name":"total_fees","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::header::Header"}},{"name":"tx_context","type":{"fields":[{"name":"chain_id","type":{"kind":"field"}},{"name":"version","type":{"kind":"field"}},{"name":"gas_settings","type":{"fields":[{"name":"gas_limits","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"teardown_gas_limits","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"max_fees_per_gas","type":{"fields":[{"name":"fee_per_da_gas","type":{"kind":"field"}},{"name":"fee_per_l2_gas","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_fees::GasFees"}},{"name":"inclusion_fee","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_settings::GasSettings"}}],"kind":"struct","path":"authwit::aztec::protocol_types::transaction::tx_context::TxContext"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::private_circuit_public_inputs::PrivateCircuitPublicInputs"},"visibility":"public"}},"bytecode":"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","debug_symbols":"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","brillig_names":["get_contract_instance_internal","pack_arguments","enqueue_public_function_call_internal","debug_log_format","notify_set_min_revertible_side_effect_counter","pack_arguments","call_private_function_internal","pack_arguments","pack_arguments"]},{"name":"compute_note_hash_and_optionally_a_nullifier","is_unconstrained":true,"custom_attributes":[],"abi":{"error_types":{},"parameters":[{"name":"contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"},"visibility":"private"},{"name":"nonce","type":{"kind":"field"},"visibility":"private"},{"name":"storage_slot","type":{"kind":"field"},"visibility":"private"},{"name":"note_type_id","type":{"kind":"field"},"visibility":"private"},{"name":"compute_nullifier","type":{"kind":"boolean"},"visibility":"private"},{"name":"serialized_note","type":{"kind":"array","length":0,"type":{"kind":"field"}},"visibility":"private"}],"return_type":{"abi_type":{"kind":"array","length":4,"type":{"kind":"field"}},"visibility":"public"}},"bytecode":"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","debug_symbols":"lZDBCsMgEET/Zc8eSmMiza+UEjTRsCBrUFMo4r930+aQq5dlZmfeZQos1uzrhORCgvFZwIdZZwzErlQBJqL3uE7XN9yOI7tfP22aDpuyjhnGblACLC2s1J15h96yfvT1JUDKdqRvR4Z2RDUile1bR9TG23Mpt9N8GS5/tn/C5S8=","brillig_names":["compute_note_hash_and_optionally_a_nullifier"]}],"outputs":{"globals":{"storage":[{"fields":[{"name":"balances","value":{"fields":[{"name":"slot","value":{"kind":"integer","sign":false,"value":"0000000000000000000000000000000000000000000000000000000000000001"}}],"kind":"struct"}},{"name":"portal_address","value":{"fields":[{"name":"slot","value":{"kind":"integer","sign":false,"value":"0000000000000000000000000000000000000000000000000000000000000002"}}],"kind":"struct"}}],"kind":"struct"}]},"structs":{"functions":[{"fields":[{"name":"parameters","type":{"fields":[{"name":"fee_limit","type":{"kind":"field"}}],"kind":"struct","path":"FeeJuice::check_balance_parameters"}}],"kind":"struct","path":"FeeJuice::check_balance_abi"},{"fields":[{"name":"parameters","type":{"fields":[{"name":"artifact_hash","type":{"kind":"field"}},{"name":"private_functions_root","type":{"kind":"field"}},{"name":"public_bytecode_commitment","type":{"kind":"field"}},{"name":"portal_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::eth_address::EthAddress"}}],"kind":"struct","path":"FeeJuice::deploy_parameters"}}],"kind":"struct","path":"FeeJuice::deploy_abi"},{"fields":[{"name":"parameters","type":{"fields":[{"name":"to","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"amount","type":{"kind":"field"}}],"kind":"struct","path":"FeeJuice::_increase_public_balance_parameters"}}],"kind":"struct","path":"FeeJuice::_increase_public_balance_abi"},{"fields":[{"name":"parameters","type":{"fields":[{"name":"to","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"amount","type":{"kind":"field"}},{"name":"secret","type":{"kind":"field"}}],"kind":"struct","path":"FeeJuice::claim_parameters"}}],"kind":"struct","path":"FeeJuice::claim_abi"},{"fields":[{"name":"parameters","type":{"fields":[{"name":"owner","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}}],"kind":"struct","path":"FeeJuice::balance_of_public_parameters"}},{"name":"return_type","type":{"kind":"field"}}],"kind":"struct","path":"FeeJuice::balance_of_public_abi"},{"fields":[{"name":"parameters","type":{"fields":[{"name":"portal_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::eth_address::EthAddress"}}],"kind":"struct","path":"FeeJuice::set_portal_parameters"}}],"kind":"struct","path":"FeeJuice::set_portal_abi"}]}},"file_map":{"101":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/history/public_storage.nr","source":"use dep::protocol_types::{\n constants::GENERATOR_INDEX__PUBLIC_LEAF_INDEX, hash::poseidon2_hash_with_separator,\n address::AztecAddress, header::Header, utils::field::full_field_less_than\n};\nuse dep::protocol_types::merkle_tree::root::root_from_sibling_path;\n\nuse crate::{oracle::get_public_data_witness::get_public_data_witness};\n\ntrait PublicStorageHistoricalRead {\n fn public_storage_historical_read(header: Header, storage_slot: Field, contract_address: AztecAddress) -> Field;\n}\n\nimpl PublicStorageHistoricalRead for Header {\n fn public_storage_historical_read(self, storage_slot: Field, contract_address: AztecAddress) -> Field {\n // 1) Compute the leaf index by siloing the storage slot with the contract address\n let public_data_tree_index = poseidon2_hash_with_separator(\n [contract_address.to_field(), storage_slot],\n GENERATOR_INDEX__PUBLIC_LEAF_INDEX\n );\n\n // 2) Get the membership witness for the tree index.\n let witness = unsafe {\n get_public_data_witness(\n self.global_variables.block_number as u32,\n public_data_tree_index\n )\n };\n\n // 3) The witness is made up of two parts: the preimage of the leaf and the proof that it exists in the tree.\n // We first prove that the witness is indeed valid for the public data tree, i.e. that the preimage is of a\n // value present in the tree. Note that `hash` returns not just the hash of the value but also the metadata\n // (slot, next index and next slot).\n assert(\n self.state.partial.public_data_tree.root\n == root_from_sibling_path(witness.leaf_preimage.hash(), witness.index, witness.path), \"Proving public value inclusion failed\"\n );\n\n // 4) Now that we know the preimage is valid, we determine the value that's represented by this tree entry. Here\n // we have two scenarios:\n // 1. The tree entry is initialized, and the value is the same as the one in the witness\n // 2. The entry was never initialized, and the value is default zero (the default)\n // The code below is based on the same checks in `validate_public_data_reads` in `base_rollup_inputs`.\n let preimage = witness.leaf_preimage;\n\n let is_less_than_slot = full_field_less_than(preimage.slot, public_data_tree_index);\n let is_next_greater_than = full_field_less_than(public_data_tree_index, preimage.next_slot);\n let is_max = ((preimage.next_index == 0) & (preimage.next_slot == 0));\n let is_in_range = is_less_than_slot & (is_next_greater_than | is_max);\n\n let value = if is_in_range {\n 0\n } else {\n assert_eq(preimage.slot, public_data_tree_index, \"Public data tree index doesn't match witness\");\n preimage.value\n };\n\n value\n }\n}\n"},"107":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/messaging.nr","source":"use crate::{\n hash::{compute_secret_hash, compute_message_hash, compute_message_nullifier},\n oracle::get_l1_to_l2_membership_witness::get_l1_to_l2_membership_witness\n};\n\nuse dep::protocol_types::merkle_tree::root::root_from_sibling_path;\nuse dep::protocol_types::{constants::L1_TO_L2_MSG_TREE_HEIGHT, address::{AztecAddress, EthAddress}, utils::arr_copy_slice};\n\npub fn process_l1_to_l2_message(\n l1_to_l2_root: Field,\n storage_contract_address: AztecAddress,\n portal_contract_address: EthAddress,\n chain_id: Field,\n version: Field,\n content: Field,\n secret: Field\n) -> Field {\n let secret_hash = compute_secret_hash(secret);\n let message_hash = compute_message_hash(\n portal_contract_address,\n chain_id,\n storage_contract_address,\n version,\n content,\n secret_hash\n );\n\n let returned_message = get_l1_to_l2_membership_witness(storage_contract_address, message_hash, secret);\n let leaf_index = returned_message[0];\n let sibling_path = arr_copy_slice(returned_message, [0; L1_TO_L2_MSG_TREE_HEIGHT], 1);\n\n // Check that the message is in the tree\n // This is implicitly checking that the values of the message are correct\n let root = root_from_sibling_path(message_hash, leaf_index, sibling_path);\n assert(root == l1_to_l2_root, \"Message not in state\");\n\n compute_message_nullifier(message_hash, secret, leaf_index)\n}\n"},"110":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/context/packed_returns.nr","source":"use crate::{hash::hash_args_array, oracle::returns::unpack_returns};\nuse dep::protocol_types::traits::Deserialize;\n\nstruct PackedReturns {\n packed_returns: Field,\n}\n\nimpl PackedReturns {\n pub fn new(packed_returns: Field) -> Self {\n PackedReturns { packed_returns }\n }\n\n pub fn assert_empty(self) {\n assert_eq(self.packed_returns, 0);\n }\n\n pub fn raw(self) -> Field {\n self.packed_returns\n }\n\n pub fn unpack<let N: u32>(self) -> [Field; N] {\n let unpacked: [Field; N] = unpack_returns(self.packed_returns);\n assert_eq(self.packed_returns, hash_args_array(unpacked));\n unpacked\n }\n\n pub fn unpack_into<T, let N: u32>(self) -> T where T: Deserialize<N> {\n let unpacked: [Field; N] = self.unpack();\n Deserialize::deserialize(unpacked)\n }\n}\n"},"114":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/context/call_interfaces.nr","source":"use dep::protocol_types::{\n abis::{function_selector::FunctionSelector, private_circuit_public_inputs::PrivateCircuitPublicInputs},\n address::AztecAddress, traits::Deserialize\n};\n\nuse crate::context::{\n private_context::PrivateContext, public_context::PublicContext, gas::GasOpts,\n inputs::{PrivateContextInputs, PublicContextInputs}\n};\n\nuse crate::oracle::arguments::pack_arguments;\nuse crate::hash::hash_args;\n\ntrait CallInterface<let N: u32, T, P, Env> {\n fn get_original(self) -> fn[Env](T) -> P;\n\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\nimpl<let N: u32, T, P, Env> CallInterface<N, PrivateContextInputs, PrivateCircuitPublicInputs, Env> for PrivateCallInterface<N, T, Env> {\n fn get_original(self) -> fn[Env](PrivateContextInputs) -> PrivateCircuitPublicInputs {\n self.original\n }\n}\n\nstruct PrivateCallInterface<let N: u32, T, Env> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n original: fn[Env](PrivateContextInputs) -> PrivateCircuitPublicInputs,\n is_static: bool\n}\n\nimpl<let N: u32, T, Env> PrivateCallInterface<N, T, Env> {\n pub fn call<let M: u32>(self, context: &mut PrivateContext) -> T where T: Deserialize<M> {\n assert(self.args_hash == pack_arguments(self.args));\n let returns = context.call_private_function_with_packed_args(\n self.target_contract,\n self.selector,\n self.args_hash,\n false,\n false\n );\n let unpacked: T = returns.unpack_into();\n unpacked\n }\n\n pub fn view<let M: u32>(self, context: &mut PrivateContext) -> T where T: Deserialize<M> {\n assert(self.args_hash == pack_arguments(self.args));\n let returns = context.call_private_function_with_packed_args(self.target_contract, self.selector, self.args_hash, true, false);\n returns.unpack_into()\n }\n\n pub fn delegate_call<let M: u32>(self, context: &mut PrivateContext) -> T where T: Deserialize<M> {\n assert(self.args_hash == pack_arguments(self.args));\n let returns = context.call_private_function_with_packed_args(self.target_contract, self.selector, self.args_hash, false, true);\n returns.unpack_into()\n }\n}\n\nimpl<let N: u32, T, P, Env> CallInterface<N, PrivateContextInputs, PrivateCircuitPublicInputs, Env> for PrivateVoidCallInterface<N, Env> {\n fn get_original(self) -> fn[Env](PrivateContextInputs) -> PrivateCircuitPublicInputs {\n self.original\n }\n}\n\nstruct PrivateVoidCallInterface<let N: u32, Env> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n original: fn[Env](PrivateContextInputs) -> PrivateCircuitPublicInputs,\n is_static: bool\n}\n\nimpl<let N: u32, Env> PrivateVoidCallInterface<N, Env> {\n pub fn call(self, context: &mut PrivateContext) {\n assert(self.args_hash == pack_arguments(self.args));\n context.call_private_function_with_packed_args(\n self.target_contract,\n self.selector,\n self.args_hash,\n false,\n false\n ).assert_empty();\n }\n\n pub fn view(self, context: &mut PrivateContext) {\n assert(self.args_hash == pack_arguments(self.args));\n context.call_private_function_with_packed_args(self.target_contract, self.selector, self.args_hash, true, false).assert_empty();\n }\n\n pub fn delegate_call(self, context: &mut PrivateContext) {\n assert(self.args_hash == pack_arguments(self.args));\n context.call_private_function_with_packed_args(self.target_contract, self.selector, self.args_hash, false, true).assert_empty();\n }\n}\n\nimpl<let N: u32, T, P, Env> CallInterface<N, PrivateContextInputs, PrivateCircuitPublicInputs, Env> for PrivateStaticCallInterface<N, T, Env> {\n fn get_original(self) -> fn[Env](PrivateContextInputs) -> PrivateCircuitPublicInputs {\n self.original\n }\n}\n\nstruct PrivateStaticCallInterface<let N: u32, T, Env> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n original: fn[Env](PrivateContextInputs) -> PrivateCircuitPublicInputs,\n is_static: bool\n}\n\nimpl<let N: u32, T, Env> PrivateStaticCallInterface<N, T, Env> {\n pub fn view<let M: u32>(self, context: &mut PrivateContext) -> T where T: Deserialize<M> {\n assert(self.args_hash == pack_arguments(self.args));\n let returns = context.call_private_function_with_packed_args(self.target_contract, self.selector, self.args_hash, true, false);\n returns.unpack_into()\n }\n}\n\nimpl<let N: u32, T, P, Env> CallInterface<N, PrivateContextInputs, PrivateCircuitPublicInputs, Env> for PrivateStaticVoidCallInterface<N, Env> {\n fn get_original(self) -> fn[Env](PrivateContextInputs) -> PrivateCircuitPublicInputs {\n self.original\n }\n}\n\nstruct PrivateStaticVoidCallInterface<let N: u32, Env> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n original: fn[Env](PrivateContextInputs) -> PrivateCircuitPublicInputs,\n is_static: bool\n}\n\nimpl<let N: u32, Env> PrivateStaticVoidCallInterface<N, Env> {\n pub fn view(self, context: &mut PrivateContext) {\n assert(self.args_hash == pack_arguments(self.args));\n context.call_private_function_with_packed_args(self.target_contract, self.selector, self.args_hash, true, false).assert_empty();\n }\n}\n\nimpl<let N: u32, T, P, Env> CallInterface<N, PublicContextInputs, T, Env> for PublicCallInterface<N, T, Env> {\n fn get_original(self) -> fn[Env](PublicContextInputs) -> T {\n self.original\n }\n}\n\nstruct PublicCallInterface<let N: u32, T, Env> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n gas_opts: GasOpts,\n original: fn[Env](PublicContextInputs) -> T,\n is_static: bool\n}\n\nimpl<let N: u32, T, Env> PublicCallInterface<N, T, Env> {\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub fn call<let M: u32>(self, context: &mut PublicContext) -> T where T: Deserialize<M> {\n let returns = context.call_public_function(self.target_contract, self.selector, self.args, self.gas_opts);\n returns.deserialize_into()\n }\n\n pub fn view<let M: u32>(self, context: &mut PublicContext) -> T where T: Deserialize<M> {\n let returns = context.static_call_public_function(self.target_contract, self.selector, self.args, self.gas_opts);\n returns.deserialize_into()\n }\n\n pub fn delegate_call<let M: u32>(self, context: &mut PublicContext) -> T where T: Deserialize<M> {\n let returns = context.delegate_call_public_function(self.target_contract, self.selector, self.args);\n returns.deserialize_into()\n }\n\n pub fn enqueue(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n assert(args_hash == pack_arguments(self.args));\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/ false,\n /*delegate=*/ false\n )\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n assert(args_hash == pack_arguments(self.args));\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/ true,\n /*delegate=*/ false\n )\n }\n\n pub fn delegate_enqueue(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n assert(args_hash == pack_arguments(self.args));\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/ false,\n /*delegate=*/ true\n )\n }\n}\n\nimpl<let N: u32, T, P, Env> CallInterface<N, PublicContextInputs, (), Env> for PublicVoidCallInterface<N, Env> {\n fn get_original(self) -> fn[Env](PublicContextInputs) -> () {\n self.original\n }\n}\n\nstruct PublicVoidCallInterface<let N: u32, Env> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n original: fn[Env](PublicContextInputs) -> (),\n is_static: bool,\n gas_opts: GasOpts\n}\n\nimpl<let N: u32, Env> PublicVoidCallInterface<N, Env> {\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub fn call(self, context: &mut PublicContext) {\n let returns = context.call_public_function(self.target_contract, self.selector, self.args, self.gas_opts);\n returns.assert_empty()\n }\n\n pub fn view(self, context: &mut PublicContext) {\n let returns = context.static_call_public_function(self.target_contract, self.selector, self.args, self.gas_opts);\n returns.assert_empty()\n }\n\n pub fn delegate_call(self, context: &mut PublicContext) {\n let returns = context.delegate_call_public_function(self.target_contract, self.selector, self.args);\n returns.assert_empty()\n }\n\n pub fn enqueue(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n assert(args_hash == pack_arguments(self.args));\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/ false,\n /*delegate=*/ false\n )\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n assert(args_hash == pack_arguments(self.args));\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/ true,\n /*delegate=*/ false\n )\n }\n\n pub fn delegate_enqueue(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n assert(args_hash == pack_arguments(self.args));\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/ false,\n /*delegate=*/ true\n )\n }\n}\n\nimpl<let N: u32, T, P, Env> CallInterface<N, PublicContextInputs, T, Env> for PublicStaticCallInterface<N, T, Env> {\n fn get_original(self) -> fn[Env](PublicContextInputs) -> T {\n self.original\n }\n}\n\nstruct PublicStaticCallInterface<let N: u32, T, Env> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n original: fn[Env](PublicContextInputs) -> T,\n is_static: bool,\n gas_opts: GasOpts\n}\n\nimpl<let N: u32, T, Env> PublicStaticCallInterface<N, T, Env> {\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub fn view<let M: u32>(self, context: &mut PublicContext) -> T where T: Deserialize<M> {\n let returns = context.static_call_public_function(self.target_contract, self.selector, self.args, self.gas_opts);\n let unpacked: T = returns.deserialize_into();\n unpacked\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n assert(args_hash == pack_arguments(self.args));\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/ true,\n /*delegate=*/ false\n )\n }\n}\n\nimpl<let N: u32, T, P, Env> CallInterface<N, PublicContextInputs, (), Env> for PublicStaticVoidCallInterface<N, Env> {\n fn get_original(self) -> fn[Env](PublicContextInputs) -> () {\n self.original\n }\n}\n\nstruct PublicStaticVoidCallInterface<let N: u32, Env> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n original: fn[Env](PublicContextInputs) -> (),\n is_static: bool,\n gas_opts: GasOpts\n}\n\nimpl<let N: u32, Env> PublicStaticVoidCallInterface<N, Env> {\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub fn view(self, context: &mut PublicContext) {\n let returns = context.static_call_public_function(self.target_contract, self.selector, self.args, self.gas_opts);\n returns.assert_empty()\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n assert(args_hash == pack_arguments(self.args));\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/ true,\n /*delegate=*/ false\n )\n }\n}\n"},"115":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/context/private_context.nr","source":"use crate::{\n context::{inputs::PrivateContextInputs, packed_returns::PackedReturns},\n messaging::process_l1_to_l2_message, hash::{hash_args_array, ArgsHasher},\n keys::constants::{NULLIFIER_INDEX, OUTGOING_INDEX, NUM_KEY_TYPES, sk_generators},\n oracle::{\n key_validation_request::get_key_validation_request, arguments, returns::pack_returns,\n call_private_function::call_private_function_internal, header::get_header_at,\n logs::{emit_encrypted_note_log, emit_encrypted_event_log},\n enqueue_public_function_call::{\n enqueue_public_function_call_internal, notify_set_min_revertible_side_effect_counter,\n set_public_teardown_function_call_internal\n}\n}\n};\nuse dep::protocol_types::{\n abis::{\n call_context::CallContext, function_selector::FunctionSelector, gas::Gas,\n max_block_number::MaxBlockNumber,\n validation_requests::{KeyValidationRequest, KeyValidationRequestAndGenerator},\n private_call_request::PrivateCallRequest, private_circuit_public_inputs::PrivateCircuitPublicInputs,\n public_call_request::PublicCallRequest,\n public_call_stack_item_compressed::PublicCallStackItemCompressed, read_request::ReadRequest,\n note_hash::NoteHash, nullifier::Nullifier, log_hash::{LogHash, NoteLogHash, EncryptedLogHash}\n},\n address::{AztecAddress, EthAddress},\n constants::{\n MAX_NOTE_HASHES_PER_CALL, MAX_L2_TO_L1_MSGS_PER_CALL, MAX_NULLIFIERS_PER_CALL,\n MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL, MAX_PUBLIC_CALL_STACK_LENGTH_PER_CALL,\n MAX_NOTE_HASH_READ_REQUESTS_PER_CALL, MAX_NULLIFIER_READ_REQUESTS_PER_CALL,\n MAX_KEY_VALIDATION_REQUESTS_PER_CALL, MAX_ENCRYPTED_LOGS_PER_CALL, MAX_UNENCRYPTED_LOGS_PER_CALL,\n MAX_NOTE_ENCRYPTED_LOGS_PER_CALL\n},\n header::Header, messaging::l2_to_l1_message::L2ToL1Message, utils::reader::Reader, traits::Empty\n};\n\n// When finished, one can call .finish() to convert back to the abi\nstruct PrivateContext {\n // docs:start:private-context\n inputs: PrivateContextInputs,\n side_effect_counter: u32,\n\n min_revertible_side_effect_counter: u32,\n is_fee_payer: bool,\n\n args_hash: Field,\n return_hash: Field,\n\n max_block_number: MaxBlockNumber,\n\n note_hash_read_requests: BoundedVec<ReadRequest, MAX_NOTE_HASH_READ_REQUESTS_PER_CALL>,\n nullifier_read_requests: BoundedVec<ReadRequest, MAX_NULLIFIER_READ_REQUESTS_PER_CALL>,\n key_validation_requests_and_generators: BoundedVec<KeyValidationRequestAndGenerator, MAX_KEY_VALIDATION_REQUESTS_PER_CALL>,\n\n note_hashes: BoundedVec<NoteHash, MAX_NOTE_HASHES_PER_CALL>,\n nullifiers: BoundedVec<Nullifier, MAX_NULLIFIERS_PER_CALL>,\n\n private_call_requests : BoundedVec<PrivateCallRequest, MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL>,\n public_call_requests : BoundedVec<PublicCallRequest, MAX_PUBLIC_CALL_STACK_LENGTH_PER_CALL>,\n public_teardown_call_request: PublicCallRequest,\n l2_to_l1_msgs : BoundedVec<L2ToL1Message, MAX_L2_TO_L1_MSGS_PER_CALL>,\n // docs:end:private-context\n\n // Header of a block whose state is used during private execution (not the block the transaction is included in).\n historical_header: Header,\n\n note_encrypted_logs_hashes: BoundedVec<NoteLogHash, MAX_NOTE_ENCRYPTED_LOGS_PER_CALL>,\n encrypted_logs_hashes: BoundedVec<EncryptedLogHash, MAX_ENCRYPTED_LOGS_PER_CALL>,\n unencrypted_logs_hashes: BoundedVec<LogHash, MAX_UNENCRYPTED_LOGS_PER_CALL>,\n\n // Contains the last key validation request for each key type. This is used to cache the last request and avoid\n // fetching the same request multiple times.\n // The index of the array corresponds to the key type (0 nullifier, 1 incoming, 2 outgoing, 3 tagging).\n last_key_validation_requests: [Option<KeyValidationRequest>; NUM_KEY_TYPES],\n}\n\nimpl PrivateContext {\n pub fn new(inputs: PrivateContextInputs, args_hash: Field) -> PrivateContext {\n PrivateContext {\n inputs,\n side_effect_counter: inputs.start_side_effect_counter + 1,\n min_revertible_side_effect_counter: 0,\n is_fee_payer: false,\n args_hash,\n return_hash: 0,\n max_block_number: MaxBlockNumber::empty(),\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n historical_header: inputs.historical_header,\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n note_encrypted_logs_hashes: BoundedVec::new(),\n encrypted_logs_hashes: BoundedVec::new(),\n unencrypted_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES]\n }\n }\n\n fn msg_sender(self) -> AztecAddress {\n self.inputs.call_context.msg_sender\n }\n\n fn this_address(self) -> AztecAddress {\n self.inputs.call_context.storage_contract_address\n }\n\n fn chain_id(self) -> Field {\n self.inputs.tx_context.chain_id\n }\n\n fn version(self) -> Field {\n self.inputs.tx_context.version\n }\n\n fn selector(self) -> FunctionSelector {\n self.inputs.call_context.function_selector\n }\n\n fn get_args_hash(self) -> Field {\n self.args_hash\n }\n\n fn push_note_hash(&mut self, note_hash: Field) {\n self.note_hashes.push(NoteHash { value: note_hash, counter: self.next_counter() });\n }\n\n fn push_nullifier(&mut self, nullifier: Field) {\n self.nullifiers.push(Nullifier { value: nullifier, note_hash: 0, counter: self.next_counter() });\n }\n\n fn push_nullifier_for_note_hash(&mut self, nullifier: Field, nullified_note_hash: Field) {\n self.nullifiers.push(Nullifier { value: nullifier, note_hash: nullified_note_hash, counter: self.next_counter() });\n }\n\n // Returns the header of a block whose state is used during private execution (not the block the transaction is\n // included in).\n fn get_header(self) -> Header {\n self.historical_header\n }\n\n // Returns the header of an arbitrary block whose block number is less than or equal to the block number\n // of historical header.\n pub fn get_header_at(self, block_number: u32) -> Header {\n get_header_at(block_number, self)\n }\n\n pub fn set_return_hash(&mut self, returns_hasher: ArgsHasher) {\n pack_returns(returns_hasher.fields);\n self.return_hash = returns_hasher.hash();\n }\n\n pub fn finish(self) -> PrivateCircuitPublicInputs {\n PrivateCircuitPublicInputs {\n call_context: self.inputs.call_context,\n args_hash: self.args_hash,\n returns_hash: self.return_hash,\n min_revertible_side_effect_counter: self.min_revertible_side_effect_counter,\n is_fee_payer: self.is_fee_payer,\n max_block_number: self.max_block_number,\n note_hash_read_requests: self.note_hash_read_requests.storage,\n nullifier_read_requests: self.nullifier_read_requests.storage,\n key_validation_requests_and_generators: self.key_validation_requests_and_generators.storage,\n note_hashes: self.note_hashes.storage,\n nullifiers: self.nullifiers.storage,\n private_call_requests: self.private_call_requests.storage,\n public_call_requests: self.public_call_requests.storage,\n public_teardown_call_request: self.public_teardown_call_request,\n l2_to_l1_msgs: self.l2_to_l1_msgs.storage,\n start_side_effect_counter: self.inputs.start_side_effect_counter,\n end_side_effect_counter: self.side_effect_counter,\n note_encrypted_logs_hashes: self.note_encrypted_logs_hashes.storage,\n encrypted_logs_hashes: self.encrypted_logs_hashes.storage,\n unencrypted_logs_hashes: self.unencrypted_logs_hashes.storage,\n historical_header: self.historical_header,\n tx_context: self.inputs.tx_context\n }\n }\n\n pub fn set_as_fee_payer(&mut self) {\n dep::protocol_types::debug_log::debug_log_format(\"Setting {0} as fee payer\", [self.this_address().to_field()]);\n self.is_fee_payer = true;\n }\n\n pub fn end_setup(&mut self) {\n // dep::protocol_types::debug_log::debug_log_format(\n // \"Ending setup at counter {0}\",\n // [self.side_effect_counter as Field]\n // );\n self.min_revertible_side_effect_counter = self.side_effect_counter;\n notify_set_min_revertible_side_effect_counter(self.min_revertible_side_effect_counter);\n }\n\n // docs:start:max-block-number\n pub fn set_tx_max_block_number(&mut self, max_block_number: u32) {\n // docs:end:max-block-number\n self.max_block_number = MaxBlockNumber::min_with_u32(self.max_block_number, max_block_number);\n }\n\n pub fn push_note_hash_read_request(&mut self, note_hash: Field) {\n let side_effect = ReadRequest { value: note_hash, counter: self.next_counter() };\n self.note_hash_read_requests.push(side_effect);\n }\n\n pub fn push_nullifier_read_request(&mut self, nullifier: Field) {\n let request = ReadRequest { value: nullifier, counter: self.next_counter() };\n self.nullifier_read_requests.push(request);\n }\n\n pub fn request_nsk_app(&mut self, npk_m_hash: Field) -> Field {\n self.request_sk_app(npk_m_hash, NULLIFIER_INDEX)\n }\n\n pub fn request_ovsk_app(&mut self, ovpk_m_hash: Field) -> Field {\n self.request_sk_app(ovpk_m_hash, OUTGOING_INDEX)\n }\n\n fn request_sk_app(&mut self, pk_m_hash: Field, key_index: Field) -> Field {\n let cached_request = self.last_key_validation_requests[key_index].unwrap_or(KeyValidationRequest::empty());\n\n if cached_request.pk_m.hash() == pk_m_hash {\n // We get a match so the cached request is the latest one\n cached_request.sk_app\n } else {\n // We didn't get a match meaning the cached result is stale. We fetch new values from oracle and instruct\n // protocol circuits to validate them by storing the validation request in context.\n let request = get_key_validation_request(pk_m_hash, key_index);\n let request_and_generator = KeyValidationRequestAndGenerator { request, sk_app_generator: sk_generators[key_index] };\n // We constrain that the pk_m_hash matches the one in the request (otherwise we could get an arbitrary\n // valid key request and not the one corresponding to pk_m_hash).\n assert(request.pk_m.hash() == pk_m_hash);\n self.key_validation_requests_and_generators.push(request_and_generator);\n self.last_key_validation_requests[key_index] = Option::some(request);\n request.sk_app\n }\n }\n\n // docs:start:context_message_portal\n pub fn message_portal(&mut self, recipient: EthAddress, content: Field) {\n // docs:end:context_message_portal\n let message = L2ToL1Message { recipient, content, counter: self.next_counter() };\n self.l2_to_l1_msgs.push(message);\n }\n\n // docs:start:context_consume_l1_to_l2_message\n // docs:start:consume_l1_to_l2_message\n pub fn consume_l1_to_l2_message(&mut self, content: Field, secret: Field, sender: EthAddress) {\n // docs:end:context_consume_l1_to_l2_message\n let nullifier = process_l1_to_l2_message(\n self.historical_header.state.l1_to_l2_message_tree.root,\n self.this_address(),\n sender,\n self.chain_id(),\n self.version(),\n content,\n secret\n );\n\n // Push nullifier (and the \"commitment\" corresponding to this can be \"empty\")\n self.push_nullifier(nullifier)\n }\n // docs:end:consume_l1_to_l2_message\n\n // NB: A randomness value of 0 signals that the kernels should not mask the contract address\n // used in siloing later on e.g. 'handshaking' contract w/ known address.\n pub fn emit_raw_event_log_with_masked_address<let M: u32>(\n &mut self,\n randomness: Field,\n log: [u8; M],\n log_hash: Field\n ) {\n let counter = self.next_counter();\n let contract_address = self.this_address();\n let len = log.len() as Field + 4;\n let side_effect = EncryptedLogHash { value: log_hash, counter, length: len, randomness };\n self.encrypted_logs_hashes.push(side_effect);\n\n emit_encrypted_event_log(contract_address, randomness, log, counter);\n }\n\n pub fn emit_raw_note_log<let M: u32>(&mut self, note_hash_counter: u32, log: [u8; M], log_hash: Field) {\n let counter = self.next_counter();\n let len = log.len() as Field + 4;\n let side_effect = NoteLogHash { value: log_hash, counter, length: len, note_hash_counter };\n self.note_encrypted_logs_hashes.push(side_effect);\n\n emit_encrypted_note_log(note_hash_counter, log, counter);\n }\n\n pub fn call_private_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT]\n ) -> PackedReturns {\n let args_hash = hash_args_array(args);\n assert(args_hash == arguments::pack_arguments_array(args));\n self.call_private_function_with_packed_args(contract_address, function_selector, args_hash, false, false)\n }\n\n pub fn static_call_private_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT]\n ) -> PackedReturns {\n let args_hash = hash_args_array(args);\n assert(args_hash == arguments::pack_arguments_array(args));\n self.call_private_function_with_packed_args(contract_address, function_selector, args_hash, true, false)\n }\n\n pub fn delegate_call_private_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT]\n ) -> PackedReturns {\n let args_hash = hash_args_array(args);\n assert(args_hash == arguments::pack_arguments_array(args));\n self.call_private_function_with_packed_args(contract_address, function_selector, args_hash, false, true)\n }\n\n pub fn call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector\n ) -> PackedReturns {\n self.call_private_function_with_packed_args(contract_address, function_selector, 0, false, false)\n }\n\n pub fn static_call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector\n ) -> PackedReturns {\n self.call_private_function_with_packed_args(contract_address, function_selector, 0, true, false)\n }\n\n pub fn delegate_call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector\n ) -> PackedReturns {\n self.call_private_function_with_packed_args(contract_address, function_selector, 0, false, true)\n }\n\n pub fn call_private_function_with_packed_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n is_delegate_call: bool\n ) -> PackedReturns {\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n let start_side_effect_counter = self.side_effect_counter;\n let (end_side_effect_counter, returns_hash) = call_private_function_internal(\n contract_address,\n function_selector,\n args_hash,\n start_side_effect_counter,\n is_static_call,\n is_delegate_call\n );\n\n self.side_effect_counter = end_side_effect_counter + 1;\n\n // TODO (fees) figure out why this crashes the prover and enable it\n // we need this in order to pay fees inside child call contexts\n // assert(\n // (item.public_inputs.min_revertible_side_effect_counter == 0 as u32)\n // | (item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter)\n // );\n\n // if item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter {\n // self.min_revertible_side_effect_counter = item.public_inputs.min_revertible_side_effect_counter;\n // }\n\n let call_context = self.generate_call_context(\n contract_address,\n function_selector,\n is_static_call,\n is_delegate_call\n );\n\n self.private_call_requests.push(\n PrivateCallRequest {\n contract_address,\n call_context,\n args_hash,\n returns_hash,\n start_side_effect_counter,\n end_side_effect_counter\n }\n );\n\n PackedReturns::new(returns_hash)\n }\n\n pub fn call_public_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT]\n ) {\n let args_hash = hash_args_array(args);\n assert(args_hash == arguments::pack_arguments_array(args));\n self.call_public_function_with_packed_args(contract_address, function_selector, args_hash, false, false)\n }\n\n pub fn static_call_public_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT]\n ) {\n let args_hash = hash_args_array(args);\n assert(args_hash == arguments::pack_arguments_array(args));\n self.call_public_function_with_packed_args(contract_address, function_selector, args_hash, true, false)\n }\n\n pub fn delegate_call_public_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT]\n ) {\n let args_hash = hash_args_array(args);\n assert(args_hash == arguments::pack_arguments_array(args));\n self.call_public_function_with_packed_args(contract_address, function_selector, args_hash, false, true)\n }\n\n pub fn call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector\n ) {\n self.call_public_function_with_packed_args(contract_address, function_selector, 0, false, false)\n }\n\n pub fn static_call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector\n ) {\n self.call_public_function_with_packed_args(contract_address, function_selector, 0, true, false)\n }\n\n pub fn delegate_call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector\n ) {\n self.call_public_function_with_packed_args(contract_address, function_selector, 0, false, true)\n }\n\n pub fn call_public_function_with_packed_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n is_delegate_call: bool\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n enqueue_public_function_call_internal(\n contract_address,\n function_selector,\n args_hash,\n counter,\n is_static_call,\n is_delegate_call\n );\n\n let call_context = self.generate_call_context(\n contract_address,\n function_selector,\n is_static_call,\n is_delegate_call\n );\n\n let item = PublicCallStackItemCompressed {\n contract_address,\n call_context,\n args_hash,\n returns_hash: 0,\n revert_code: 0,\n start_gas_left: Gas::empty(),\n end_gas_left: Gas::empty()\n };\n\n let call_request = PublicCallRequest { item, counter };\n self.public_call_requests.push(call_request);\n }\n\n pub fn set_public_teardown_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT]\n ) {\n let args_hash = hash_args_array(args);\n assert(args_hash == arguments::pack_arguments_array(args));\n self.set_public_teardown_function_with_packed_args(contract_address, function_selector, args_hash, false, false)\n }\n\n pub fn set_public_teardown_function_with_packed_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n is_delegate_call: bool\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n set_public_teardown_function_call_internal(\n contract_address,\n function_selector,\n args_hash,\n counter,\n is_static_call,\n is_delegate_call\n );\n\n let call_context = self.generate_call_context(\n contract_address,\n function_selector,\n is_static_call,\n is_delegate_call\n );\n\n let item = PublicCallStackItemCompressed {\n contract_address,\n call_context,\n args_hash,\n returns_hash: 0,\n revert_code: 0,\n start_gas_left: Gas::empty(),\n end_gas_left: Gas::empty()\n };\n\n self.public_teardown_call_request = PublicCallRequest {\n item,\n counter,\n };\n }\n\n fn generate_call_context(\n self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n is_static_call: bool,\n is_delegate_call: bool\n ) -> CallContext {\n let msg_sender = if is_delegate_call {\n self.msg_sender()\n } else {\n self.this_address()\n };\n let storage_contract_address = if is_delegate_call {\n self.this_address()\n } else {\n contract_address\n };\n CallContext { msg_sender, storage_contract_address, function_selector, is_static_call, is_delegate_call }\n }\n\n fn next_counter(&mut self) -> u32 {\n let counter = self.side_effect_counter;\n self.side_effect_counter += 1;\n counter\n }\n}\n\nimpl Empty for PrivateContext {\n fn empty() -> Self {\n PrivateContext {\n inputs: PrivateContextInputs::empty(),\n side_effect_counter: 0 as u32,\n min_revertible_side_effect_counter: 0 as u32,\n is_fee_payer: false,\n args_hash: 0,\n return_hash: 0,\n max_block_number: MaxBlockNumber::empty(),\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n historical_header: Header::empty(),\n note_encrypted_logs_hashes: BoundedVec::new(),\n encrypted_logs_hashes: BoundedVec::new(),\n unencrypted_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES]\n }\n }\n}\n"},"116":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/context/public_context.nr","source":"use crate::hash::{compute_secret_hash, compute_message_hash, compute_message_nullifier};\nuse dep::protocol_types::address::{AztecAddress, EthAddress};\nuse dep::protocol_types::constants::MAX_FIELD_VALUE;\nuse dep::protocol_types::traits::{Serialize, Deserialize, Empty};\nuse dep::protocol_types::abis::function_selector::FunctionSelector;\nuse crate::context::inputs::public_context_inputs::PublicContextInputs;\nuse crate::context::gas::GasOpts;\nuse crate::hash::ArgsHasher;\n\nstruct PublicContext {\n inputs: PublicContextInputs,\n args_hash: Option<Field>\n}\n\nimpl PublicContext {\n pub fn new(inputs: PublicContextInputs) -> Self {\n PublicContext { inputs, args_hash: Option::none() }\n }\n\n pub fn emit_unencrypted_log<T, let N: u32>(_self: &mut Self, log: T) where T: Serialize<N> {\n emit_unencrypted_log(Serialize::serialize(log).as_slice());\n }\n\n pub fn note_hash_exists(_self: Self, note_hash: Field, leaf_index: Field) -> bool {\n note_hash_exists(note_hash, leaf_index) == 1\n }\n\n pub fn l1_to_l2_msg_exists(_self: Self, msg_hash: Field, msg_leaf_index: Field) -> bool {\n l1_to_l2_msg_exists(msg_hash, msg_leaf_index) == 1\n }\n\n fn nullifier_exists(_self: Self, unsiloed_nullifier: Field, address: AztecAddress) -> bool {\n nullifier_exists(unsiloed_nullifier, address.to_field()) == 1\n }\n\n fn consume_l1_to_l2_message(\n &mut self,\n content: Field,\n secret: Field,\n sender: EthAddress,\n leaf_index: Field\n ) {\n let secret_hash = compute_secret_hash(secret);\n let message_hash = compute_message_hash(\n sender,\n self.chain_id(),\n /*recipient=*/ self.this_address(),\n self.version(),\n content,\n secret_hash\n );\n let nullifier = compute_message_nullifier(message_hash, secret, leaf_index);\n\n assert(\n !self.nullifier_exists(nullifier, self.this_address()), \"L1-to-L2 message is already nullified\"\n );\n assert(\n self.l1_to_l2_msg_exists(message_hash, leaf_index), \"Tried to consume nonexistent L1-to-L2 message\"\n );\n\n self.push_nullifier(nullifier);\n }\n\n fn message_portal(_self: &mut Self, recipient: EthAddress, content: Field) {\n send_l2_to_l1_msg(recipient, content);\n }\n\n fn call_public_function<let RETURNS_COUNT: u32>(\n _self: &mut Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field],\n gas_opts: GasOpts\n ) -> FunctionReturns<RETURNS_COUNT> {\n let results = call(\n gas_for_call(gas_opts),\n contract_address,\n args,\n function_selector.to_field()\n );\n let data_to_return: [Field; RETURNS_COUNT] = results.0;\n let success: u8 = results.1;\n assert(success == 1, \"Nested call failed!\");\n\n FunctionReturns::new(data_to_return)\n }\n\n fn static_call_public_function<let RETURNS_COUNT: u32>(\n _self: &mut Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field],\n gas_opts: GasOpts\n ) -> FunctionReturns<RETURNS_COUNT> {\n let (data_to_return, success): ([Field; RETURNS_COUNT], u8) = call_static(\n gas_for_call(gas_opts),\n contract_address,\n args,\n function_selector.to_field()\n );\n\n assert(success == 1, \"Nested static call failed!\");\n FunctionReturns::new(data_to_return)\n }\n\n fn delegate_call_public_function<let RETURNS_COUNT: u32>(\n _self: &mut Self,\n _contract_address: AztecAddress,\n _function_selector: FunctionSelector,\n _args: [Field]\n ) -> FunctionReturns<RETURNS_COUNT> {\n assert(false, \"'delegate_call_public_function' not implemented!\");\n FunctionReturns::new([0; RETURNS_COUNT])\n }\n\n fn push_note_hash(_self: &mut Self, note_hash: Field) {\n emit_note_hash(note_hash);\n }\n fn push_nullifier(_self: &mut Self, nullifier: Field) {\n emit_nullifier(nullifier);\n }\n\n fn this_address(_self: Self) -> AztecAddress {\n address()\n }\n pub fn storage_address(_self: Self) -> AztecAddress {\n storage_address()\n }\n fn msg_sender(_self: Self) -> AztecAddress {\n sender()\n }\n fn selector(_self: Self) -> FunctionSelector {\n FunctionSelector::from_u32(function_selector())\n }\n fn get_args_hash(mut self) -> Field {\n if !self.args_hash.is_some() {\n let mut hasher = ArgsHasher::new();\n\n // TODO: this should be replaced with the compile-time calldata size.\n for i in 0..self.inputs.calldata_length as u32 {\n let argn: [Field; 1] = calldata_copy((2 + i) as u32, 1);\n hasher.add(argn[0]);\n }\n\n self.args_hash = Option::some(hasher.hash());\n }\n\n self.args_hash.unwrap()\n }\n fn transaction_fee(_self: Self) -> Field {\n transaction_fee()\n }\n\n fn chain_id(_self: Self) -> Field {\n chain_id()\n }\n fn version(_self: Self) -> Field {\n version()\n }\n fn block_number(_self: Self) -> Field {\n block_number()\n }\n fn timestamp(_self: Self) -> u64 {\n timestamp()\n }\n pub fn fee_per_l2_gas(_self: Self) -> Field {\n fee_per_l2_gas()\n }\n pub fn fee_per_da_gas(_self: Self) -> Field {\n fee_per_da_gas()\n }\n\n fn l2_gas_left(_self: Self) -> Field {\n l2_gas_left()\n }\n fn da_gas_left(_self: Self) -> Field {\n da_gas_left()\n }\n\n fn raw_storage_read<let N: u32>(_self: Self, storage_slot: Field) -> [Field; N] {\n let mut out = [0; N];\n for i in 0..N {\n out[i] = storage_read(storage_slot + i as Field);\n }\n out\n }\n\n fn storage_read<T, let N: u32>(self, storage_slot: Field) -> T where T: Deserialize<N> {\n T::deserialize(self.raw_storage_read(storage_slot))\n }\n\n fn raw_storage_write<let N: u32>(_self: Self, storage_slot: Field, values: [Field; N]) {\n for i in 0..N {\n storage_write(storage_slot + i as Field, values[i]);\n }\n }\n\n fn storage_write<T, let N: u32>(self, storage_slot: Field, value: T) where T: Serialize<N> {\n self.raw_storage_write(storage_slot, value.serialize());\n }\n}\n\n// Helper functions\nfn gas_for_call(user_gas: GasOpts) -> [Field; 2] {\n // It's ok to use the max possible gas here, because the gas will be\n // capped by the gas left in the (STATIC)CALL instruction.\n [\n user_gas.l2_gas.unwrap_or(MAX_FIELD_VALUE),\n user_gas.da_gas.unwrap_or(MAX_FIELD_VALUE)\n ]\n}\n\n// Unconstrained opcode wrappers (do not use directly).\n// TODO(https://github.com/AztecProtocol/aztec-packages/issues/6420): reconsider.\nunconstrained fn address() -> AztecAddress {\n address_opcode()\n}\nunconstrained fn storage_address() -> AztecAddress {\n storage_address_opcode()\n}\nunconstrained fn sender() -> AztecAddress {\n sender_opcode()\n}\nunconstrained fn portal() -> EthAddress {\n portal_opcode()\n}\nunconstrained fn function_selector() -> u32 {\n function_selector_opcode()\n}\nunconstrained fn transaction_fee() -> Field {\n transaction_fee_opcode()\n}\nunconstrained fn chain_id() -> Field {\n chain_id_opcode()\n}\nunconstrained fn version() -> Field {\n version_opcode()\n}\nunconstrained fn block_number() -> Field {\n block_number_opcode()\n}\nunconstrained fn timestamp() -> u64 {\n timestamp_opcode()\n}\nunconstrained fn fee_per_l2_gas() -> Field {\n fee_per_l2_gas_opcode()\n}\nunconstrained fn fee_per_da_gas() -> Field {\n fee_per_da_gas_opcode()\n}\nunconstrained fn l2_gas_left() -> Field {\n l2_gas_left_opcode()\n}\nunconstrained fn da_gas_left() -> Field {\n da_gas_left_opcode()\n}\nunconstrained fn note_hash_exists(note_hash: Field, leaf_index: Field) -> u8 {\n note_hash_exists_opcode(note_hash, leaf_index)\n}\nunconstrained fn emit_note_hash(note_hash: Field) {\n emit_note_hash_opcode(note_hash)\n}\nunconstrained fn nullifier_exists(nullifier: Field, address: Field) -> u8 {\n nullifier_exists_opcode(nullifier, address)\n}\nunconstrained fn emit_nullifier(nullifier: Field) {\n emit_nullifier_opcode(nullifier)\n}\nunconstrained fn emit_unencrypted_log(message: [Field]) {\n emit_unencrypted_log_opcode(message)\n}\nunconstrained fn l1_to_l2_msg_exists(msg_hash: Field, msg_leaf_index: Field) -> u8 {\n l1_to_l2_msg_exists_opcode(msg_hash, msg_leaf_index)\n}\nunconstrained fn send_l2_to_l1_msg(recipient: EthAddress, content: Field) {\n send_l2_to_l1_msg_opcode(recipient, content)\n}\nunconstrained fn call<let RET_SIZE: u32>(\n gas: [Field; 2],\n address: AztecAddress,\n args: [Field],\n function_selector: Field\n) -> ([Field; RET_SIZE], u8) {\n call_opcode(gas, address, args, function_selector)\n}\nunconstrained fn call_static<let RET_SIZE: u32>(\n gas: [Field; 2],\n address: AztecAddress,\n args: [Field],\n function_selector: Field\n) -> ([Field; RET_SIZE], u8) {\n call_static_opcode(gas, address, args, function_selector)\n}\n\nunconstrained fn calldata_copy<let N: u32>(cdoffset: u32, copy_size: u32) -> [Field; N] {\n calldata_copy_opcode(cdoffset, copy_size)\n}\n\nunconstrained fn storage_read(storage_slot: Field) -> Field {\n storage_read_opcode(storage_slot)\n}\n\nunconstrained fn storage_write(storage_slot: Field, value: Field) {\n storage_write_opcode(storage_slot, value);\n}\n\nimpl Empty for PublicContext {\n fn empty() -> Self {\n PublicContext::new(PublicContextInputs::empty())\n }\n}\n\n// AVM oracles (opcodes) follow, do not use directly.\n#[oracle(avmOpcodeAddress)]\nunconstrained fn address_opcode() -> AztecAddress {}\n\n#[oracle(avmOpcodeStorageAddress)]\nunconstrained fn storage_address_opcode() -> AztecAddress {}\n\n#[oracle(avmOpcodeSender)]\nunconstrained fn sender_opcode() -> AztecAddress {}\n\n#[oracle(avmOpcodePortal)]\nunconstrained fn portal_opcode() -> EthAddress {}\n\n#[oracle(avmOpcodeFunctionSelector)]\nunconstrained fn function_selector_opcode() -> u32 {}\n\n#[oracle(avmOpcodeTransactionFee)]\nunconstrained fn transaction_fee_opcode() -> Field {}\n\n#[oracle(avmOpcodeChainId)]\nunconstrained fn chain_id_opcode() -> Field {}\n\n#[oracle(avmOpcodeVersion)]\nunconstrained fn version_opcode() -> Field {}\n\n#[oracle(avmOpcodeBlockNumber)]\nunconstrained fn block_number_opcode() -> Field {}\n\n#[oracle(avmOpcodeTimestamp)]\nunconstrained fn timestamp_opcode() -> u64 {}\n\n#[oracle(avmOpcodeFeePerL2Gas)]\nunconstrained fn fee_per_l2_gas_opcode() -> Field {}\n\n#[oracle(avmOpcodeFeePerDaGas)]\nunconstrained fn fee_per_da_gas_opcode() -> Field {}\n\n#[oracle(avmOpcodeL2GasLeft)]\nunconstrained fn l2_gas_left_opcode() -> Field {}\n\n#[oracle(avmOpcodeDaGasLeft)]\nunconstrained fn da_gas_left_opcode() -> Field {}\n\n#[oracle(avmOpcodeNoteHashExists)]\nunconstrained fn note_hash_exists_opcode(note_hash: Field, leaf_index: Field) -> u8 {}\n\n#[oracle(avmOpcodeEmitNoteHash)]\nunconstrained fn emit_note_hash_opcode(note_hash: Field) {}\n\n#[oracle(avmOpcodeNullifierExists)]\nunconstrained fn nullifier_exists_opcode(nullifier: Field, address: Field) -> u8 {}\n\n#[oracle(avmOpcodeEmitNullifier)]\nunconstrained fn emit_nullifier_opcode(nullifier: Field) {}\n\n#[oracle(avmOpcodeEmitUnencryptedLog)]\nunconstrained fn emit_unencrypted_log_opcode(message: [Field]) {}\n\n#[oracle(avmOpcodeL1ToL2MsgExists)]\nunconstrained fn l1_to_l2_msg_exists_opcode(msg_hash: Field, msg_leaf_index: Field) -> u8 {}\n\n#[oracle(avmOpcodeSendL2ToL1Msg)]\nunconstrained fn send_l2_to_l1_msg_opcode(recipient: EthAddress, content: Field) {}\n\n#[oracle(avmOpcodeCalldataCopy)]\nunconstrained fn calldata_copy_opcode<let N: u32>(cdoffset: u32, copy_size: u32) -> [Field; N] {}\n\n#[oracle(avmOpcodeCall)]\nunconstrained fn call_opcode<let RET_SIZE: u32>(\n gas: [Field; 2], // gas allocation: [l2_gas, da_gas]\n address: AztecAddress,\n args: [Field],\n // TODO(5110): consider passing in calldata directly\n function_selector: Field\n) -> ([Field; RET_SIZE], u8) {}\n// ^ return data ^ success\n\n#[oracle(avmOpcodeStaticCall)]\nunconstrained fn call_static_opcode<let RET_SIZE: u32>(\n gas: [Field; 2], // gas allocation: [l2_gas, da_gas]\n address: AztecAddress,\n args: [Field],\n // TODO(5110): consider passing in calldata directly\n function_selector: Field\n) -> ([Field; RET_SIZE], u8) {}\n// ^ return data ^ success\n\n#[oracle(avmOpcodeStorageRead)]\nunconstrained fn storage_read_opcode(storage_slot: Field) -> Field {}\n\n#[oracle(avmOpcodeStorageWrite)]\nunconstrained fn storage_write_opcode(storage_slot: Field, value: Field) {}\n\nstruct FunctionReturns<let N: u32> {\n values: [Field; N]\n}\n\nimpl<let N: u32> FunctionReturns<N> {\n pub fn new(values: [Field; N]) -> FunctionReturns<N> {\n FunctionReturns { values }\n }\n\n pub fn raw(self) -> [Field; N] {\n self.values\n }\n\n pub fn deserialize_into<T>(self) -> T where T: Deserialize<N> {\n Deserialize::deserialize(self.raw())\n }\n}\n\nimpl FunctionReturns<0> {\n pub fn assert_empty(self) {\n assert(self.values.len() == 0);\n }\n}\n"},"143":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/hash.nr","source":"use dep::protocol_types::{\n address::{AztecAddress, EthAddress},\n constants::{\n GENERATOR_INDEX__SECRET_HASH, GENERATOR_INDEX__MESSAGE_NULLIFIER, ARGS_HASH_CHUNK_COUNT,\n GENERATOR_INDEX__FUNCTION_ARGS, ARGS_HASH_CHUNK_LENGTH, MAX_ARGS_LENGTH\n},\n point::Point, traits::Hash, hash::{sha256_to_field, poseidon2_hash_with_separator}\n};\nuse crate::oracle::logs_traits::ToBytesForUnencryptedLog;\n\npub use dep::protocol_types::hash::{compute_siloed_nullifier, pedersen_hash};\n\npub fn pedersen_commitment<let N: u32>(inputs: [Field; N], hash_index: u32) -> Point {\n std::hash::pedersen_commitment_with_separator(inputs, hash_index)\n}\n\npub fn compute_secret_hash(secret: Field) -> Field {\n poseidon2_hash_with_separator([secret], GENERATOR_INDEX__SECRET_HASH)\n}\n\npub fn compute_unencrypted_log_hash<T, let N: u32, let M: u32>(\n contract_address: AztecAddress,\n log: T\n) -> Field where T: ToBytesForUnencryptedLog<N, M> {\n let message_bytes: [u8; N] = log.to_be_bytes_arr();\n // can't use N - not in scope error\n let n = message_bytes.len();\n let mut hash_bytes = [0; M];\n // Address is converted to 32 bytes in ts\n let address_bytes = contract_address.to_be_bytes_arr();\n for i in 0..32 {\n hash_bytes[i] = address_bytes[i];\n }\n let len_bytes: [u8; 4] = (n as Field).to_be_bytes();\n for i in 0..4 {\n hash_bytes[32 + i] = len_bytes[i];\n }\n for i in 0..n {\n hash_bytes[36 + i] = message_bytes[i];\n }\n\n sha256_to_field(hash_bytes)\n}\n\npub fn compute_message_hash(\n sender: EthAddress,\n chain_id: Field,\n recipient: AztecAddress,\n version: Field,\n content: Field,\n secret_hash: Field\n) -> Field {\n let mut hash_bytes = [0 as u8; 192];\n let sender_bytes: [u8; 32] = sender.to_field().to_be_bytes();\n let chain_id_bytes: [u8; 32] = chain_id.to_be_bytes();\n let recipient_bytes: [u8; 32] = recipient.to_field().to_be_bytes();\n let version_bytes: [u8; 32] = version.to_be_bytes();\n let content_bytes: [u8; 32] = content.to_be_bytes();\n let secret_hash_bytes: [u8; 32] = secret_hash.to_be_bytes();\n\n for i in 0..32 {\n hash_bytes[i] = sender_bytes[i];\n hash_bytes[i + 32] = chain_id_bytes[i];\n hash_bytes[i + 64] = recipient_bytes[i];\n hash_bytes[i + 96] = version_bytes[i];\n hash_bytes[i + 128] = content_bytes[i];\n hash_bytes[i + 160] = secret_hash_bytes[i];\n }\n\n sha256_to_field(hash_bytes)\n}\n\n// The nullifier of a l1 to l2 message is the hash of the message salted with the secret and index of the message hash\n// in the L1 to L2 message tree\npub fn compute_message_nullifier(message_hash: Field, secret: Field, leaf_index: Field) -> Field {\n poseidon2_hash_with_separator(\n [message_hash, secret, leaf_index],\n GENERATOR_INDEX__MESSAGE_NULLIFIER\n )\n}\n\nstruct ArgsHasher {\n fields: [Field],\n}\n\nimpl Hash for ArgsHasher {\n fn hash(self) -> Field {\n hash_args(self.fields)\n }\n}\n\nimpl ArgsHasher {\n pub fn new() -> Self {\n Self { fields: [] }\n }\n\n pub fn add(&mut self, field: Field) {\n self.fields = self.fields.push_back(field);\n }\n\n pub fn add_multiple<let N: u32>(&mut self, fields: [Field; N]) {\n for i in 0..N {\n self.fields = self.fields.push_back(fields[i]);\n }\n }\n}\n\npub fn hash_args_array<let N: u32>(args: [Field; N]) -> Field {\n hash_args(args.as_slice())\n}\n\npub fn hash_args(args: [Field]) -> Field {\n if args.len() == 0 {\n 0\n } else {\n assert(args.len() <= MAX_ARGS_LENGTH, \"Args length exceeds maximum\");\n let mut chunks_hashes = [0; ARGS_HASH_CHUNK_COUNT];\n let mut current_chunk_values = [0; ARGS_HASH_CHUNK_LENGTH];\n\n let mut current_chunk_index = 0;\n let mut index_inside_current_chunk = 0;\n for i in 0..args.len() {\n current_chunk_values[index_inside_current_chunk] = args[i];\n index_inside_current_chunk+=1;\n if index_inside_current_chunk == ARGS_HASH_CHUNK_LENGTH {\n chunks_hashes[current_chunk_index] = poseidon2_hash_with_separator(current_chunk_values, GENERATOR_INDEX__FUNCTION_ARGS);\n current_chunk_values = [0; ARGS_HASH_CHUNK_LENGTH];\n current_chunk_index+=1;\n index_inside_current_chunk = 0;\n }\n }\n if index_inside_current_chunk > 0 {\n chunks_hashes[current_chunk_index] = poseidon2_hash_with_separator(current_chunk_values, GENERATOR_INDEX__FUNCTION_ARGS);\n }\n poseidon2_hash_with_separator(chunks_hashes, GENERATOR_INDEX__FUNCTION_ARGS)\n }\n}\n\n#[test]\nfn compute_var_args_hash() {\n let mut input = ArgsHasher::new();\n for i in 0..MAX_ARGS_LENGTH {\n input.add(i as Field);\n }\n let hash = input.hash();\n assert(hash == 0x1cce4dbf69f14c44865919991ee1057922e34d7310ba237d71759aa422621ca9);\n}\n\n#[test]\nfn compute_unenc_log_hash_array() {\n let contract_address = AztecAddress::from_field(0x233a3e0df23b2b15b324194cb4a151f26c0b7333250781d34cc269d85dc334c6);\n let log = [\n 0x20660de09f35f876e3e69d227b2a35166ad05f09d82d06366ec9b6f65a51fec2,\n 0x1b52bfe3b8689761916f76dc3d38aa8810860db325cd39ca611eed980091f01c,\n 0x2e559c4045c378a56ad13b9edb1e8de4e7ad3b3aa35cc7ba9ec77f7a68fa43a4,\n 0x25d0f689c4a4178a29d59306f2675824d19be6d25e44fa03b03f49c263053dd2,\n 0x2d513a722d6f352dc0961f156afdc5e31495b9f0e35cb069261a8e55e2df67fd\n ];\n let hash = compute_unencrypted_log_hash(contract_address, log);\n assert(hash == 0x0095b2d17ab72f4b27a341f7ac63e49ec73935ae8c9181a0ac02023eb12f3284);\n}\n\n#[test]\nfn compute_unenc_log_hash_addr() {\n let contract_address = AztecAddress::from_field(0x233a3e0df23b2b15b324194cb4a151f26c0b7333250781d34cc269d85dc334c6);\n let log = AztecAddress::from_field(0x26aa302d4715fd8a687453cb26d616b0768027bd54bcae56b09d908ecd9f8303);\n let hash = compute_unencrypted_log_hash(contract_address, log);\n assert(hash == 0x0083ab647dfb26e7ddee90a0f4209d049d4660cab42000c544b986aaa84c55a3);\n}\n\n#[test]\nfn compute_unenc_log_hash_str() {\n let contract_address = AztecAddress::from_field(0x1b401e1146c5c507962287065c81f0ef7590adae3802c533d7549d6bf0a41bd8);\n let log = \"dummy\";\n let hash = compute_unencrypted_log_hash(contract_address, log);\n assert(hash == 0x00629e88ebd6374f44aa6cfe07e251ecf07213ebc7267e8f6b578ae57ffd6c20);\n}\n\n#[test]\nfn compute_unenc_log_hash_longer_str() {\n let contract_address = AztecAddress::from_field(0x1b401e1146c5c507962287065c81f0ef7590adae3802c533d7549d6bf0a41bd8);\n let log = \"Hello this is a string\";\n let hash = compute_unencrypted_log_hash(contract_address, log);\n assert(hash == 0x0098637962f7d34fa202b7ffad8a07a238c5d1fd897b82a108f7f467fa73b841);\n}\n"},"147":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/oracle/arguments.nr","source":"#[oracle(packArgumentsArray)]\nunconstrained fn pack_arguments_array_oracle<let N: u32>(_args: [Field; N]) -> Field {}\n\n#[oracle(packArguments)]\nunconstrained fn pack_arguments_oracle(_args: [Field]) -> Field {}\n\n/// - Pack arguments (array version) will notify the simulator that these arguments will be used later at\n/// some point in the call.\n/// - When the external call is made later, the simulator will know what the values unpack to.\n/// - This oracle will not be required in public vm functions, as the vm will keep track of arguments\n/// itself.\nunconstrained pub fn pack_arguments_array<let N: u32>(args: [Field; N]) -> Field {\n pack_arguments_array_oracle(args)\n}\n\n/// - Pack arguments (slice version) will notify the simulator that these arguments will be used later at\n/// some point in the call.\n/// - When the external call is made later, the simulator will know what the values unpack to.\n/// - This oracle will not be required in public vm functions, as the vm will keep track of arguments\n/// itself.\nunconstrained pub fn pack_arguments(args: [Field]) -> Field {\n pack_arguments_oracle(args)\n}\n\n"},"149":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/oracle/get_public_data_witness.nr","source":"use dep::protocol_types::{constants::PUBLIC_DATA_TREE_HEIGHT, data::PublicDataTreeLeafPreimage, utils::arr_copy_slice};\n\nglobal LEAF_PREIMAGE_LENGTH: u32 = 4;\nglobal PUBLIC_DATA_WITNESS: Field = 45;\n\nstruct PublicDataWitness {\n index: Field,\n leaf_preimage: PublicDataTreeLeafPreimage,\n path: [Field; PUBLIC_DATA_TREE_HEIGHT],\n}\n\n#[oracle(getPublicDataTreeWitness)]\nunconstrained fn get_public_data_witness_oracle(\n _block_number: u32,\n _public_data_tree_index: Field\n) -> [Field; PUBLIC_DATA_WITNESS] {}\n\nunconstrained pub fn get_public_data_witness(\n block_number: u32,\n public_data_tree_index: Field\n) -> PublicDataWitness {\n let fields = get_public_data_witness_oracle(block_number, public_data_tree_index);\n PublicDataWitness {\n index: fields[0],\n leaf_preimage: PublicDataTreeLeafPreimage { slot: fields[1], value: fields[2], next_index: fields[3] as u32, next_slot: fields[4] },\n path: arr_copy_slice(fields, [0; PUBLIC_DATA_TREE_HEIGHT], 1 + LEAF_PREIMAGE_LENGTH)\n }\n}\n"},"156":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/oracle/call_private_function.nr","source":"use dep::protocol_types::{abis::function_selector::FunctionSelector, address::AztecAddress, utils::reader::Reader};\n\n#[oracle(callPrivateFunction)]\nunconstrained fn call_private_function_oracle(\n _contract_address: AztecAddress,\n _function_selector: FunctionSelector,\n _args_hash: Field,\n _start_side_effect_counter: u32,\n _is_static_call: bool,\n _is_delegate_call: bool\n) -> [Field; 2] {}\n\nunconstrained pub fn call_private_function_internal(\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n start_side_effect_counter: u32,\n is_static_call: bool,\n is_delegate_call: bool\n) -> (u32, Field) {\n let fields = call_private_function_oracle(\n contract_address,\n function_selector,\n args_hash,\n start_side_effect_counter,\n is_static_call,\n is_delegate_call\n );\n\n let mut reader = Reader::new(fields);\n let end_side_effect_counter = reader.read_u32();\n let returns_hash = reader.read();\n\n (end_side_effect_counter, returns_hash)\n}\n"},"160":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/oracle/get_contract_instance.nr","source":"use dep::protocol_types::{\n address::AztecAddress, contract_instance::ContractInstance, constants::CONTRACT_INSTANCE_LENGTH,\n utils::reader::Reader\n};\n\n#[oracle(getContractInstance)]\nunconstrained fn get_contract_instance_oracle(_address: AztecAddress) -> [Field; CONTRACT_INSTANCE_LENGTH] {}\n\n// Returns a ContractInstance plus a boolean indicating whether the instance was found.\n#[oracle(avmOpcodeGetContractInstance)]\nunconstrained fn get_contract_instance_oracle_avm(_address: AztecAddress) -> [Field; CONTRACT_INSTANCE_LENGTH + 1] {}\n\nunconstrained fn get_contract_instance_internal(address: AztecAddress) -> [Field; CONTRACT_INSTANCE_LENGTH] {\n get_contract_instance_oracle(address)\n}\n\nunconstrained pub fn get_contract_instance_internal_avm(address: AztecAddress) -> [Field; CONTRACT_INSTANCE_LENGTH + 1] {\n get_contract_instance_oracle_avm(address)\n}\n\npub fn get_contract_instance(address: AztecAddress) -> ContractInstance {\n let instance = unsafe {\n ContractInstance::deserialize(get_contract_instance_internal(address))\n };\n // The to_address function combines all values in the instance object to produce an address, so by checking that we\n // get the expected address we validate the entire struct.\n assert_eq(instance.to_address(), address);\n\n instance\n}\n\npub fn get_contract_instance_avm(address: AztecAddress) -> Option<ContractInstance> {\n let mut reader = Reader::new(get_contract_instance_internal_avm(address));\n let found = reader.read();\n if found == 0 {\n Option::none()\n } else {\n Option::some(reader.read_struct(ContractInstance::deserialize))\n }\n}\n"},"161":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/oracle/enqueue_public_function_call.nr","source":"use dep::protocol_types::{abis::{function_selector::FunctionSelector}, address::AztecAddress};\n\n#[oracle(enqueuePublicFunctionCall)]\nunconstrained fn enqueue_public_function_call_oracle(\n _contract_address: AztecAddress,\n _function_selector: FunctionSelector,\n _args_hash: Field,\n _side_effect_counter: u32,\n _is_static_call: bool,\n _is_delegate_call: bool\n) {}\n\nunconstrained pub fn enqueue_public_function_call_internal(\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n side_effect_counter: u32,\n is_static_call: bool,\n is_delegate_call: bool\n) {\n enqueue_public_function_call_oracle(\n contract_address,\n function_selector,\n args_hash,\n side_effect_counter,\n is_static_call,\n is_delegate_call\n );\n}\n\n#[oracle(setPublicTeardownFunctionCall)]\nunconstrained fn set_public_teardown_function_call_oracle(\n _contract_address: AztecAddress,\n _function_selector: FunctionSelector,\n _args_hash: Field,\n _side_effect_counter: u32,\n _is_static_call: bool,\n _is_delegate_call: bool\n) {}\n\nunconstrained pub fn set_public_teardown_function_call_internal(\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n side_effect_counter: u32,\n is_static_call: bool,\n is_delegate_call: bool\n) {\n set_public_teardown_function_call_oracle(\n contract_address,\n function_selector,\n args_hash,\n side_effect_counter,\n is_static_call,\n is_delegate_call\n );\n}\n\n#[oracle(notifySetMinRevertibleSideEffectCounter)]\nunconstrained fn notify_set_min_revertible_side_effect_counter_oracle(_counter: u32) {}\n\nunconstrained pub fn notify_set_min_revertible_side_effect_counter(counter: u32) {\n notify_set_min_revertible_side_effect_counter_oracle(counter);\n}\n"},"165":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/oracle/get_l1_to_l2_membership_witness.nr","source":"use dep::protocol_types::{address::AztecAddress};\n\nglobal L1_TO_L2_MESSAGE_ORACLE_CALL_LENGTH: u64 = 17;\n\n// Obtains membership witness (index and sibling path) for a message in the L1 to L2 message tree.\n#[oracle(getL1ToL2MembershipWitness)]\nunconstrained fn get_l1_to_l2_membership_witness_oracle(\n _contract_address: AztecAddress,\n _message_hash: Field,\n _secret: Field\n) -> [Field; L1_TO_L2_MESSAGE_ORACLE_CALL_LENGTH] {}\n\nunconstrained pub fn get_l1_to_l2_membership_witness(\n contract_address: AztecAddress,\n message_hash: Field,\n secret: Field\n) -> [Field; L1_TO_L2_MESSAGE_ORACLE_CALL_LENGTH] {\n get_l1_to_l2_membership_witness_oracle(contract_address, message_hash, secret)\n}\n"},"166":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/state_vars/map.nr","source":"use dep::protocol_types::{storage::map::derive_storage_slot_in_map, traits::ToField};\nuse crate::state_vars::storage::Storage;\n\n// docs:start:map\nstruct Map<K, V, Context> {\n context: Context,\n storage_slot: Field,\n state_var_constructor: fn(Context, Field) -> V,\n}\n// docs:end:map\n\nimpl<K, T, Context> Storage<T> for Map<K, T, Context> {}\n\nimpl<K, V, Context> Map<K, V, Context> {\n // docs:start:new\n pub fn new(\n context: Context,\n storage_slot: Field,\n state_var_constructor: fn(Context, Field) -> V\n ) -> Self {\n assert(storage_slot != 0, \"Storage slot 0 not allowed. Storage slots must start from 1.\");\n Map { context, storage_slot, state_var_constructor }\n }\n // docs:end:new\n\n // docs:start:at\n pub fn at(self, key: K) -> V where K: ToField {\n // TODO(#1204): use a generator index for the storage slot\n let derived_storage_slot = derive_storage_slot_in_map(self.storage_slot, key);\n\n let state_var_constructor = self.state_var_constructor;\n state_var_constructor(self.context, derived_storage_slot)\n }\n // docs:end:at\n}\n\n"},"168":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/state_vars/public_mutable.nr","source":"use crate::context::{PublicContext, UnconstrainedContext};\nuse dep::protocol_types::traits::{Deserialize, Serialize};\nuse crate::state_vars::storage::Storage;\n\n// docs:start:public_mutable_struct\nstruct PublicMutable<T, Context> {\n context: Context,\n storage_slot: Field,\n}\n// docs:end:public_mutable_struct\n\nimpl<T, Context> Storage<T> for PublicMutable<T, Context> {}\n\nimpl<T, Context> PublicMutable<T, Context> {\n // docs:start:public_mutable_struct_new\n pub fn new(\n // Note: Passing the contexts to new(...) just to have an interface compatible with a Map.\n context: Context,\n storage_slot: Field\n ) -> Self {\n assert(storage_slot != 0, \"Storage slot 0 not allowed. Storage slots must start from 1.\");\n PublicMutable { context, storage_slot }\n }\n // docs:end:public_mutable_struct_new\n}\n\nimpl<T, T_SERIALIZED_LEN> PublicMutable<T, &mut PublicContext> where T: Serialize<T_SERIALIZED_LEN> + Deserialize<T_SERIALIZED_LEN> {\n // docs:start:public_mutable_struct_read\n pub fn read(self) -> T {\n self.context.storage_read(self.storage_slot)\n }\n // docs:end:public_mutable_struct_read\n\n // docs:start:public_mutable_struct_write\n pub fn write(self, value: T) {\n self.context.storage_write(self.storage_slot, value);\n }\n // docs:end:public_mutable_struct_write\n}\n\nimpl<T, T_SERIALIZED_LEN> PublicMutable<T, UnconstrainedContext> where T: Deserialize<T_SERIALIZED_LEN> {\n unconstrained pub fn read(self) -> T {\n self.context.storage_read(self.storage_slot)\n }\n}\n"},"171":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/state_vars/shared_immutable.nr","source":"use crate::{context::{PrivateContext, PublicContext, UnconstrainedContext}, state_vars::storage::Storage};\nuse dep::protocol_types::{constants::INITIALIZATION_SLOT_SEPARATOR, traits::{Deserialize, Serialize}};\n\n// Just like PublicImmutable but with the ability to read from private functions.\nstruct SharedImmutable<T, Context>{\n context: Context,\n storage_slot: Field,\n}\n\nimpl<T, Context> Storage<T> for SharedImmutable<T, Context> {}\n\nimpl<T, Context> SharedImmutable<T, Context> {\n pub fn new(\n // Note: Passing the contexts to new(...) just to have an interface compatible with a Map.\n context: Context,\n storage_slot: Field\n ) -> Self {\n assert(storage_slot != 0, \"Storage slot 0 not allowed. Storage slots must start from 1.\");\n Self { context, storage_slot }\n }\n}\n\nimpl<T, T_SERIALIZED_LEN> SharedImmutable<T, &mut PublicContext> where T: Serialize<T_SERIALIZED_LEN> + Deserialize<T_SERIALIZED_LEN> {\n // Intended to be only called once.\n pub fn initialize(self, value: T) {\n // We check that the struct is not yet initialized by checking if the initialization slot is 0\n let initialization_slot = INITIALIZATION_SLOT_SEPARATOR + self.storage_slot;\n let init_field: Field = self.context.storage_read(initialization_slot);\n assert(init_field == 0, \"SharedImmutable already initialized\");\n\n // We populate the initialization slot with a non-zero value to indicate that the struct is initialized\n self.context.storage_write(initialization_slot, 0xdead);\n self.context.storage_write(self.storage_slot, value);\n }\n\n pub fn read_public(self) -> T {\n self.context.storage_read(self.storage_slot)\n }\n}\n\nimpl<T, T_SERIALIZED_LEN> SharedImmutable<T, UnconstrainedContext> where T: Serialize<T_SERIALIZED_LEN> + Deserialize<T_SERIALIZED_LEN> {\n unconstrained pub fn read_public(self) -> T {\n self.context.storage_read(self.storage_slot)\n }\n}\n\nimpl<T, T_SERIALIZED_LEN> SharedImmutable<T, &mut PrivateContext> where T: Serialize<T_SERIALIZED_LEN> + Deserialize<T_SERIALIZED_LEN> {\n pub fn read_private(self) -> T {\n let header = self.context.get_header();\n let mut fields = [0; T_SERIALIZED_LEN];\n\n for i in 0..fields.len() {\n fields[i] =\n header.public_storage_historical_read(\n self.storage_slot + i as Field,\n (*self.context).this_address()\n );\n }\n T::deserialize(fields)\n }\n}\n"},"25":{"path":"std/field/bn254.nr","source":"use crate::runtime::is_unconstrained;\n\n// The low and high decomposition of the field modulus\nglobal PLO: Field = 53438638232309528389504892708671455233;\nglobal PHI: Field = 64323764613183177041862057485226039389;\n\nglobal TWO_POW_128: Field = 0x100000000000000000000000000000000;\n\n// Decomposes a single field into two 16 byte fields.\nfn compute_decomposition(x: Field) -> (Field, Field) {\n let x_bytes: [u8; 32] = x.to_le_bytes();\n\n let mut low: Field = 0;\n let mut high: Field = 0;\n\n let mut offset = 1;\n for i in 0..16 {\n low += (x_bytes[i] as Field) * offset;\n high += (x_bytes[i + 16] as Field) * offset;\n offset *= 256;\n }\n\n (low, high)\n}\n\nunconstrained pub(crate) fn decompose_hint(x: Field) -> (Field, Field) {\n compute_decomposition(x)\n}\n\nfn compute_lt(x: Field, y: Field, num_bytes: u32) -> bool {\n let x_bytes: [u8; 32] = x.to_le_bytes();\n let y_bytes: [u8; 32] = y.to_le_bytes();\n let mut x_is_lt = false;\n let mut done = false;\n for i in 0..num_bytes {\n if (!done) {\n let x_byte = x_bytes[num_bytes - 1 - i];\n let y_byte = y_bytes[num_bytes - 1 - i];\n let bytes_match = x_byte == y_byte;\n if !bytes_match {\n x_is_lt = x_byte < y_byte;\n done = true;\n }\n }\n }\n x_is_lt\n}\n\nfn compute_lte(x: Field, y: Field, num_bytes: u32) -> bool {\n if x == y {\n true\n } else {\n compute_lt(x, y, num_bytes)\n }\n}\n\nunconstrained fn lt_32_hint(x: Field, y: Field) -> bool {\n compute_lt(x, y, 32)\n}\n\nunconstrained fn lte_16_hint(x: Field, y: Field) -> bool {\n compute_lte(x, y, 16)\n}\n\n// Assert that (alo > blo && ahi >= bhi) || (alo <= blo && ahi > bhi)\nfn assert_gt_limbs(a: (Field, Field), b: (Field, Field)) {\n let (alo, ahi) = a;\n let (blo, bhi) = b;\n unsafe {\n let borrow = lte_16_hint(alo, blo);\n\n let rlo = alo - blo - 1 + (borrow as Field) * TWO_POW_128;\n let rhi = ahi - bhi - (borrow as Field);\n\n rlo.assert_max_bit_size(128);\n rhi.assert_max_bit_size(128);\n }\n}\n\n/// Decompose a single field into two 16 byte fields.\npub fn decompose(x: Field) -> (Field, Field) {\n if is_unconstrained() {\n compute_decomposition(x)\n } else {\n unsafe {\n // Take hints of the decomposition\n let (xlo, xhi) = decompose_hint(x);\n\n // Range check the limbs\n xlo.assert_max_bit_size(128);\n xhi.assert_max_bit_size(128);\n\n // Check that the decomposition is correct\n assert_eq(x, xlo + TWO_POW_128 * xhi);\n\n // Assert that the decomposition of P is greater than the decomposition of x\n assert_gt_limbs((PLO, PHI), (xlo, xhi));\n (xlo, xhi)\n }\n }\n}\n\npub fn assert_gt(a: Field, b: Field) {\n if is_unconstrained() {\n assert(compute_lt(b, a, 32));\n } else {\n // Decompose a and b\n let a_limbs = decompose(a);\n let b_limbs = decompose(b);\n\n // Assert that a_limbs is greater than b_limbs\n assert_gt_limbs(a_limbs, b_limbs)\n }\n}\n\npub fn assert_lt(a: Field, b: Field) {\n assert_gt(b, a);\n}\n\npub fn gt(a: Field, b: Field) -> bool {\n if is_unconstrained() {\n compute_lt(b, a, 32)\n } else if a == b {\n false\n } else {\n // Take a hint of the comparison and verify it\n unsafe {\n if lt_32_hint(a, b) {\n assert_gt(b, a);\n false\n } else {\n assert_gt(a, b);\n true\n }\n }\n }\n}\n\npub fn lt(a: Field, b: Field) -> bool {\n gt(b, a)\n}\n\nmod tests {\n // TODO: Allow imports from \"super\"\n use crate::field::bn254::{decompose, compute_lt, assert_gt, gt, TWO_POW_128, compute_lte, PLO, PHI};\n\n #[test]\n fn check_decompose() {\n assert_eq(decompose(TWO_POW_128), (0, 1));\n assert_eq(decompose(TWO_POW_128 + 0x1234567890), (0x1234567890, 1));\n assert_eq(decompose(0x1234567890), (0x1234567890, 0));\n }\n\n #[test]\n unconstrained fn check_decompose_unconstrained() {\n assert_eq(decompose(TWO_POW_128), (0, 1));\n assert_eq(decompose(TWO_POW_128 + 0x1234567890), (0x1234567890, 1));\n assert_eq(decompose(0x1234567890), (0x1234567890, 0));\n }\n\n #[test]\n fn check_compute_lt() {\n assert(compute_lt(0, 1, 16));\n assert(compute_lt(0, 0x100, 16));\n assert(compute_lt(0x100, TWO_POW_128 - 1, 16));\n assert(!compute_lt(0, TWO_POW_128, 16));\n }\n\n #[test]\n fn check_compute_lte() {\n assert(compute_lte(0, 1, 16));\n assert(compute_lte(0, 0x100, 16));\n assert(compute_lte(0x100, TWO_POW_128 - 1, 16));\n assert(!compute_lte(0, TWO_POW_128, 16));\n\n assert(compute_lte(0, 0, 16));\n assert(compute_lte(0x100, 0x100, 16));\n assert(compute_lte(TWO_POW_128 - 1, TWO_POW_128 - 1, 16));\n assert(compute_lte(TWO_POW_128, TWO_POW_128, 16));\n }\n\n #[test]\n fn check_assert_gt() {\n assert_gt(1, 0);\n assert_gt(0x100, 0);\n assert_gt((0 - 1), (0 - 2));\n assert_gt(TWO_POW_128, 0);\n assert_gt(0 - 1, 0);\n }\n\n #[test]\n unconstrained fn check_assert_gt_unconstrained() {\n assert_gt(1, 0);\n assert_gt(0x100, 0);\n assert_gt((0 - 1), (0 - 2));\n assert_gt(TWO_POW_128, 0);\n assert_gt(0 - 1, 0);\n }\n\n #[test]\n fn check_gt() {\n assert(gt(1, 0));\n assert(gt(0x100, 0));\n assert(gt((0 - 1), (0 - 2)));\n assert(gt(TWO_POW_128, 0));\n assert(!gt(0, 0));\n assert(!gt(0, 0x100));\n assert(gt(0 - 1, 0 - 2));\n assert(!gt(0 - 2, 0 - 1));\n }\n\n #[test]\n unconstrained fn check_gt_unconstrained() {\n assert(gt(1, 0));\n assert(gt(0x100, 0));\n assert(gt((0 - 1), (0 - 2)));\n assert(gt(TWO_POW_128, 0));\n assert(!gt(0, 0));\n assert(!gt(0, 0x100));\n assert(gt(0 - 1, 0 - 2));\n assert(!gt(0 - 2, 0 - 1));\n }\n\n #[test]\n fn check_plo_phi() {\n assert_eq(PLO + PHI * TWO_POW_128, 0);\n let p_bytes = crate::field::modulus_le_bytes();\n let mut p_low: Field = 0;\n let mut p_high: Field = 0;\n\n let mut offset = 1;\n for i in 0..16 {\n p_low += (p_bytes[i] as Field) * offset;\n p_high += (p_bytes[i + 16] as Field) * offset;\n offset *= 256;\n }\n assert_eq(p_low, PLO);\n assert_eq(p_high, PHI);\n }\n}\n"},"251":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/data/public_data_tree_leaf_preimage.nr","source":"use crate::{merkle_tree::leaf_preimage::IndexedTreeLeafPreimage, traits::{Empty, Hash}};\n\nstruct PublicDataTreeLeafPreimage {\n slot : Field,\n value: Field,\n next_slot :Field,\n next_index : u32,\n}\n\nimpl Empty for PublicDataTreeLeafPreimage {\n fn empty() -> Self {\n Self { slot: 0, value: 0, next_slot: 0, next_index: 0 }\n }\n}\n\nimpl Hash for PublicDataTreeLeafPreimage {\n fn hash(self) -> Field {\n if self.is_empty() {\n 0\n } else {\n crate::hash::poseidon2_hash([self.slot, self.value, (self.next_index as Field), self.next_slot])\n }\n }\n}\n\nimpl IndexedTreeLeafPreimage for PublicDataTreeLeafPreimage {\n fn get_key(self) -> Field {\n self.slot\n }\n\n fn get_next_key(self) -> Field {\n self.next_slot\n }\n\n fn as_leaf(self) -> Field {\n self.hash()\n }\n}\n\nimpl PublicDataTreeLeafPreimage {\n pub fn is_empty(self) -> bool {\n (self.slot == 0) & (self.value == 0) & (self.next_slot == 0) & (self.next_index == 0)\n }\n}\n"},"258":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/storage/map.nr","source":"use crate::{hash::pedersen_hash, traits::ToField};\n\npub fn derive_storage_slot_in_map<K>(storage_slot: Field, key: K) -> Field where K: ToField {\n pedersen_hash([storage_slot, key.to_field()], 0)\n}\n\nmod test {\n use crate::{address::AztecAddress, storage::map::derive_storage_slot_in_map};\n\n #[test]\n fn test_derive_storage_slot_in_map_matches_typescript() {\n let map_slot = 0x132258fb6962c4387ba659d9556521102d227549a386d39f0b22d1890d59c2b5;\n let key = AztecAddress::from_field(0x302dbc2f9b50a73283d5fb2f35bc01eae8935615817a0b4219a057b2ba8a5a3f);\n\n let slot = derive_storage_slot_in_map(map_slot, key);\n\n // The following value was generated by `map_slot.test.ts`\n let slot_from_typescript = 0x2499880e2b1b831785c17286f99a0d5122fee784ce7b1c04e380c4a991da819a;\n\n assert_eq(slot, slot_from_typescript);\n }\n}\n"},"26":{"path":"std/field/mod.nr","source":"mod bn254;\nuse bn254::lt as bn254_lt;\n\nimpl Field {\n /// Asserts that `self` can be represented in `bit_size` bits.\n ///\n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^{bit_size}`.\n // docs:start:assert_max_bit_size\n pub fn assert_max_bit_size(self, bit_size: u32) {\n // docs:end:assert_max_bit_size\n crate::assert_constant(bit_size);\n assert(bit_size < modulus_num_bits() as u32);\n self.__assert_max_bit_size(bit_size);\n }\n\n #[builtin(apply_range_constraint)]\n fn __assert_max_bit_size(self, bit_size: u32) {}\n\n /// Decomposes `self` into its little endian bit decomposition as a `[u1; N]` array.\n /// This slice will be zero padded should not all bits be necessary to represent `self`.\n /// \n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^N` as the resulting slice will not\n /// be able to represent the original `Field`.\n ///\n /// # Safety\n /// Values of `N` equal to or greater than the number of bits necessary to represent the `Field` modulus\n /// (e.g. 254 for the BN254 field) allow for multiple bit decompositions. This is due to how the `Field` will\n /// wrap around due to overflow when verifying the decomposition.\n #[builtin(to_le_bits)]\n // docs:start:to_le_bits\n pub fn to_le_bits<let N: u32>(self: Self) -> [u1; N] {}\n // docs:end:to_le_bits\n\n /// Decomposes `self` into its big endian bit decomposition as a `[u1; N]` array.\n /// This array will be zero padded should not all bits be necessary to represent `self`.\n /// \n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^N` as the resulting slice will not\n /// be able to represent the original `Field`.\n ///\n /// # Safety\n /// Values of `N` equal to or greater than the number of bits necessary to represent the `Field` modulus\n /// (e.g. 254 for the BN254 field) allow for multiple bit decompositions. This is due to how the `Field` will\n /// wrap around due to overflow when verifying the decomposition.\n #[builtin(to_be_bits)]\n // docs:start:to_be_bits\n pub fn to_be_bits<let N: u32>(self: Self) -> [u1; N] {}\n // docs:end:to_be_bits\n\n /// Decomposes `self` into its little endian byte decomposition as a `[u8]` slice of length `byte_size`.\n /// This slice will be zero padded should not all bytes be necessary to represent `self`.\n /// \n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^{8*byte_size}` as the resulting slice will not\n /// be able to represent the original `Field`.\n ///\n /// # Safety\n /// Values of `byte_size` equal to or greater than the number of bytes necessary to represent the `Field` modulus\n /// (e.g. 32 for the BN254 field) allow for multiple byte decompositions. This is due to how the `Field` will\n /// wrap around due to overflow when verifying the decomposition.\n // docs:start:to_le_bytes\n pub fn to_le_bytes<let N: u32>(self: Self) -> [u8; N] {\n self.to_le_radix(256)\n }\n // docs:end:to_le_bytes\n\n /// Decomposes `self` into its big endian byte decomposition as a `[u8]` slice of length `byte_size`.\n /// This slice will be zero padded should not all bytes be necessary to represent `self`.\n /// \n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^{8*byte_size}` as the resulting slice will not\n /// be able to represent the original `Field`.\n ///\n /// # Safety\n /// Values of `byte_size` equal to or greater than the number of bytes necessary to represent the `Field` modulus\n /// (e.g. 32 for the BN254 field) allow for multiple byte decompositions. This is due to how the `Field` will\n /// wrap around due to overflow when verifying the decomposition.\n // docs:start:to_be_bytes\n pub fn to_be_bytes<let N: u32>(self: Self) -> [u8; N] {\n self.to_be_radix(256)\n }\n // docs:end:to_be_bytes\n\n // docs:start:to_le_radix\n pub fn to_le_radix<let N: u32>(self: Self, radix: u32) -> [u8; N] {\n crate::assert_constant(radix);\n self.__to_le_radix(radix)\n }\n // docs:end:to_le_radix\n\n // docs:start:to_be_radix\n pub fn to_be_radix<let N: u32>(self: Self, radix: u32) -> [u8; N] {\n crate::assert_constant(radix);\n self.__to_be_radix(radix)\n }\n // docs:end:to_be_radix\n\n // `_radix` must be less than 256\n #[builtin(to_le_radix)]\n fn __to_le_radix<let N: u32>(self, radix: u32) -> [u8; N] {}\n\n #[builtin(to_be_radix)]\n fn __to_be_radix<let N: u32>(self, radix: u32) -> [u8; N] {}\n\n // Returns self to the power of the given exponent value.\n // Caution: we assume the exponent fits into 32 bits\n // using a bigger bit size impacts negatively the performance and should be done only if the exponent does not fit in 32 bits\n pub fn pow_32(self, exponent: Field) -> Field {\n let mut r: Field = 1;\n let b: [u1; 32] = exponent.to_le_bits();\n\n for i in 1..33 {\n r *= r;\n r = (b[32-i] as Field) * (r * self) + (1 - b[32-i] as Field) * r;\n }\n r\n }\n\n // Parity of (prime) Field element, i.e. sgn0(x mod p) = 0 if x ∈ {0, ..., p-1} is even, otherwise sgn0(x mod p) = 1.\n pub fn sgn0(self) -> u1 {\n self as u1\n }\n\n pub fn lt(self, another: Field) -> bool {\n if crate::compat::is_bn254() {\n bn254_lt(self, another)\n } else {\n lt_fallback(self, another)\n }\n }\n}\n\n#[builtin(modulus_num_bits)]\npub comptime fn modulus_num_bits() -> u64 {}\n\n#[builtin(modulus_be_bits)]\npub comptime fn modulus_be_bits() -> [u1] {}\n\n#[builtin(modulus_le_bits)]\npub comptime fn modulus_le_bits() -> [u1] {}\n\n#[builtin(modulus_be_bytes)]\npub comptime fn modulus_be_bytes() -> [u8] {}\n\n#[builtin(modulus_le_bytes)]\npub comptime fn modulus_le_bytes() -> [u8] {}\n\n// Convert a 32 byte array to a field element by modding\npub fn bytes32_to_field(bytes32: [u8; 32]) -> Field {\n // Convert it to a field element\n let mut v = 1;\n let mut high = 0 as Field;\n let mut low = 0 as Field;\n\n for i in 0..16 {\n high = high + (bytes32[15 - i] as Field) * v;\n low = low + (bytes32[16 + 15 - i] as Field) * v;\n v = v * 256;\n }\n // Abuse that a % p + b % p = (a + b) % p and that low < p\n low + high * v\n}\n\nfn lt_fallback(x: Field, y: Field) -> bool {\n let x_bytes: [u8; 32] = x.to_le_bytes();\n let y_bytes: [u8; 32] = y.to_le_bytes();\n let mut x_is_lt = false;\n let mut done = false;\n for i in 0..32 {\n if (!done) {\n let x_byte = x_bytes[32 - 1 - i] as u8;\n let y_byte = y_bytes[32 - 1 - i] as u8;\n let bytes_match = x_byte == y_byte;\n if !bytes_match {\n x_is_lt = x_byte < y_byte;\n done = true;\n }\n }\n }\n x_is_lt\n}\n\nmod tests {\n #[test]\n // docs:start:to_be_bits_example\n fn test_to_be_bits() {\n let field = 2;\n let bits: [u1; 8] = field.to_be_bits();\n assert_eq(bits, [0, 0, 0, 0, 0, 0, 1, 0]);\n }\n // docs:end:to_be_bits_example\n\n #[test]\n // docs:start:to_le_bits_example\n fn test_to_le_bits() {\n let field = 2;\n let bits: [u1; 8] = field.to_le_bits();\n assert_eq(bits, [0, 1, 0, 0, 0, 0, 0, 0]);\n }\n // docs:end:to_le_bits_example\n\n #[test]\n // docs:start:to_be_bytes_example\n fn test_to_be_bytes() {\n let field = 2;\n let bits: [u8; 8] = field.to_be_bytes();\n assert_eq(bits, [0, 0, 0, 0, 0, 0, 0, 2]);\n }\n // docs:end:to_be_bytes_example\n\n #[test]\n // docs:start:to_le_bytes_example\n fn test_to_le_bytes() {\n let field = 2;\n let bits: [u8; 8] = field.to_le_bytes();\n assert_eq(bits, [2, 0, 0, 0, 0, 0, 0, 0]);\n }\n // docs:end:to_le_bytes_example\n\n #[test]\n // docs:start:to_be_radix_example\n fn test_to_be_radix() {\n let field = 2;\n let bits: [u8; 8] = field.to_be_radix(256);\n assert_eq(bits, [0, 0, 0, 0, 0, 0, 0, 2]);\n }\n // docs:end:to_be_radix_example\n\n #[test]\n // docs:start:to_le_radix_example\n fn test_to_le_radix() {\n let field = 2;\n let bits: [u8; 8] = field.to_le_radix(256);\n assert_eq(bits, [2, 0, 0, 0, 0, 0, 0, 0]);\n }\n // docs:end:to_le_radix_example\n}\n"},"263":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/type_serialization.nr","source":"use crate::traits::{Serialize, Deserialize};\n\nglobal BOOL_SERIALIZED_LEN: Field = 1;\nglobal U8_SERIALIZED_LEN: Field = 1;\nglobal U32_SERIALIZED_LEN: Field = 1;\nglobal U64_SERIALIZED_LEN: Field = 1;\nglobal U128_SERIALIZED_LEN: Field = 1;\nglobal FIELD_SERIALIZED_LEN: Field = 1;\n\nimpl Serialize<BOOL_SERIALIZED_LEN> for bool {\n fn serialize(self) -> [Field; BOOL_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<BOOL_SERIALIZED_LEN> for bool {\n fn deserialize(fields: [Field; BOOL_SERIALIZED_LEN]) -> bool {\n fields[0] as bool\n }\n}\n\nimpl Serialize<U8_SERIALIZED_LEN> for u8 {\n fn serialize(self) -> [Field; U32_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<U8_SERIALIZED_LEN> for u8 {\n fn deserialize(fields: [Field; U8_SERIALIZED_LEN]) -> Self {\n fields[0] as u8\n }\n}\n\nimpl Serialize<U32_SERIALIZED_LEN> for u32 {\n fn serialize(self) -> [Field; U32_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<U32_SERIALIZED_LEN> for u32 {\n fn deserialize(fields: [Field; U32_SERIALIZED_LEN]) -> Self {\n fields[0] as u32\n }\n}\n\nimpl Serialize<U64_SERIALIZED_LEN> for u64 {\n fn serialize(self) -> [Field; U64_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<U64_SERIALIZED_LEN> for u64 {\n fn deserialize(fields: [Field; U64_SERIALIZED_LEN]) -> Self {\n fields[0] as u64\n }\n}\n\nimpl Serialize<U128_SERIALIZED_LEN> for U128 {\n fn serialize(self) -> [Field; 1] {\n [self.to_integer()]\n }\n}\n\nimpl Deserialize<U128_SERIALIZED_LEN> for U128 {\n fn deserialize(fields: [Field; U128_SERIALIZED_LEN]) -> Self {\n U128::from_integer(fields[0])\n }\n}\n\nimpl Serialize<FIELD_SERIALIZED_LEN> for Field {\n fn serialize(self) -> [Field; U32_SERIALIZED_LEN] {\n [self]\n }\n}\n\nimpl Deserialize<FIELD_SERIALIZED_LEN> for Field {\n fn deserialize(fields: [Field; FIELD_SERIALIZED_LEN]) -> Self {\n fields[0]\n }\n}\n"},"264":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/traits.nr","source":"use crate::utils::field::field_from_bytes;\n\n// Trait: is_empty\n//\n// The general is_empty trait checks if a data type is is empty,\n// and it defines empty for the basic data types as 0.\n//\n// If a Field is equal to zero, then it is regarded as zero.\n// We will go with this definition for now, however it can be problematic \n// if a value can actually be zero. In a future refactor, we can \n// use the optional type for safety. Doing it now would lead to a worse devex\n// and would make it harder to sync up with the cpp code.\n// Preferred over Default trait to convey intent, as default doesn't necessarily mean empty.\ntrait Empty {\n fn empty() -> Self;\n}\n\nimpl Empty for Field {\n fn empty() -> Self {\n 0\n }\n}\n\nimpl Empty for u1 {\n fn empty() -> Self {\n 0\n }\n}\nimpl Empty for u8 {\n fn empty() -> Self {\n 0\n }\n}\nimpl Empty for u32 {\n fn empty() -> Self {\n 0\n }\n}\nimpl Empty for u64 {\n fn empty() -> Self {\n 0\n }\n}\nimpl Empty for U128 {\n fn empty() -> Self {\n U128::from_integer(0)\n }\n}\n\npub fn is_empty<T>(item: T) -> bool where T: Empty + Eq {\n item.eq(T::empty())\n}\n\npub fn is_empty_array<T, let N: u32>(array: [T; N]) -> bool where T: Empty + Eq {\n array.all(|elem| is_empty(elem))\n}\n\ntrait Hash {\n fn hash(self) -> Field;\n}\n\ntrait ToField {\n fn to_field(self) -> Field;\n}\n\nimpl ToField for Field {\n fn to_field(self) -> Field {\n self\n }\n}\n\nimpl ToField for bool {\n fn to_field(self) -> Field {\n self as Field\n }\n}\nimpl ToField for u1 {\n fn to_field(self) -> Field {\n self as Field\n }\n}\nimpl ToField for u8 {\n fn to_field(self) -> Field {\n self as Field\n }\n}\nimpl ToField for u32 {\n fn to_field(self) -> Field {\n self as Field\n }\n}\nimpl ToField for u64 {\n fn to_field(self) -> Field {\n self as Field\n }\n}\nimpl ToField for U128 {\n fn to_field(self) -> Field {\n self.to_integer()\n }\n}\nimpl<let N: u32> ToField for str<N> {\n fn to_field(self) -> Field {\n assert(N < 32, \"String doesn't fit in a field, consider using Serialize instead\");\n field_from_bytes(self.as_bytes(), true)\n }\n}\n\ntrait FromField {\n fn from_field(value: Field) -> Self;\n}\n\nimpl FromField for Field {\n fn from_field(value: Field) -> Self {\n value\n }\n}\n\nimpl FromField for bool {\n fn from_field(value: Field) -> Self {\n value as bool\n }\n}\nimpl FromField for u1 {\n fn from_field(value: Field) -> Self {\n value as u1\n }\n}\nimpl FromField for u8 {\n fn from_field(value: Field) -> Self {\n value as u8\n }\n}\nimpl FromField for u32 {\n fn from_field(value: Field) -> Self {\n value as u32\n }\n}\nimpl FromField for u64 {\n fn from_field(value: Field) -> Self {\n value as u64\n }\n}\nimpl FromField for U128 {\n fn from_field(value: Field) -> Self {\n U128::from_integer(value)\n }\n}\n\n// docs:start:serialize\ntrait Serialize<let N: u32> {\n fn serialize(self) -> [Field; N];\n}\n// docs:end:serialize\n\nimpl<let N: u32> Serialize<N> for [Field; N] {\n fn serialize(self) -> [Field; N] {\n self\n }\n}\nimpl<let N: u32> Serialize<N> for str<N> {\n fn serialize(self) -> [Field; N] {\n let mut result = [0; N];\n let bytes: [u8; N] = self.as_bytes();\n for i in 0..N {\n result[i] = field_from_bytes([bytes[i];1], true);\n }\n result\n }\n}\n\n// docs:start:deserialize\ntrait Deserialize<let N: u32> {\n fn deserialize(fields: [Field; N]) -> Self;\n}\n// docs:end:deserialize\n\nimpl<let N: u32> Deserialize<N> for [Field; N] {\n fn deserialize(fields: [Field; N]) -> Self {\n fields\n }\n}\n"},"265":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/debug_log.nr","source":"// Utility function to console.log data in the acir simulator\n// WARNING: sometimes when using debug logs the ACVM errors with: `thrown: \"solver opcode resolution error: cannot solve opcode: expression has too many unknowns x155\"`\n\n#[oracle(debugLog)]\nunconstrained fn debug_log_oracle<let M: u32>(_msg: str<M>, args: [Field]) {}\n\n/// NOTE: call this with a str<N> msg of form\n/// \"some string with {0} and {1} ... {N}\"\n/// and an array of N field which will be formatted\n/// into the string in the simulator.\n/// Example:\n/// debug_log_format(\"get_2(slot:{0}) =>\\n\\t0:{1}\\n\\t1:{2}\", [storage_slot, note0_hash, note1_hash]);\n/// debug_log_format(\"whole array: {}\", [e1, e2, e3, e4]);\nunconstrained pub fn debug_log_format<let M: u32, let N: u32>(msg: str<M>, args: [Field; N]) {\n debug_log_oracle(msg, args.as_slice());\n}\n\n/// NOTE: call this with a str<N> msg of length > 1\n/// Example:\n/// `debug_log(\"blah blah this is a debug string\");`\nunconstrained pub fn debug_log<let N: u32>(msg: str<N>) {\n debug_log_format(msg, []);\n}\n"},"269":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/hash.nr","source":"use crate::{\n abis::{\n contract_class_function_leaf_preimage::ContractClassFunctionLeafPreimage,\n function_selector::FunctionSelector, log_hash::{LogHash, ScopedLogHash, ScopedEncryptedLogHash},\n note_hash::ScopedNoteHash, nullifier::ScopedNullifier\n},\n address::{AztecAddress, EthAddress},\n constants::{\n FUNCTION_TREE_HEIGHT, GENERATOR_INDEX__SILOED_NOTE_HASH, GENERATOR_INDEX__OUTER_NULLIFIER,\n GENERATOR_INDEX__VK, GENERATOR_INDEX__NOTE_HASH_NONCE, GENERATOR_INDEX__UNIQUE_NOTE_HASH,\n MAX_ENCRYPTED_LOGS_PER_TX, MAX_NOTE_ENCRYPTED_LOGS_PER_TX\n},\n merkle_tree::root::root_from_sibling_path,\n messaging::l2_to_l1_message::{L2ToL1Message, ScopedL2ToL1Message},\n recursion::verification_key::VerificationKey, traits::{is_empty, ToField},\n utils::field::field_from_bytes_32_trunc\n};\n\npub fn sha256_to_field<let N: u32>(bytes_to_hash: [u8; N]) -> Field {\n let sha256_hashed = std::hash::sha256(bytes_to_hash);\n let hash_in_a_field = field_from_bytes_32_trunc(sha256_hashed);\n\n hash_in_a_field\n}\n\npub fn private_functions_root_from_siblings(\n selector: FunctionSelector,\n vk_hash: Field,\n function_leaf_index: Field,\n function_leaf_sibling_path: [Field; FUNCTION_TREE_HEIGHT]\n) -> Field {\n let function_leaf_preimage = ContractClassFunctionLeafPreimage { selector, vk_hash };\n let function_leaf = function_leaf_preimage.hash();\n root_from_sibling_path(function_leaf, function_leaf_index, function_leaf_sibling_path)\n}\n\nfn compute_note_hash_nonce(tx_hash: Field, note_index_in_tx: u32) -> Field {\n // Hashing tx hash with note index in tx is guaranteed to be unique\n poseidon2_hash_with_separator(\n [\n tx_hash,\n note_index_in_tx as Field\n ],\n GENERATOR_INDEX__NOTE_HASH_NONCE\n )\n}\n\npub fn compute_unique_note_hash(nonce: Field, note_hash: Field) -> Field {\n let inputs = [nonce, note_hash];\n poseidon2_hash_with_separator(inputs, GENERATOR_INDEX__UNIQUE_NOTE_HASH)\n}\n\npub fn compute_siloed_note_hash(app: AztecAddress, unique_note_hash: Field) -> Field {\n poseidon2_hash_with_separator(\n [\n app.to_field(),\n unique_note_hash\n ],\n GENERATOR_INDEX__SILOED_NOTE_HASH\n )\n}\n\n/// Siloing in the context of Aztec refers to the process of hashing a note hash with a contract address (this way\n/// the note hash is scoped to a specific contract). This is used to prevent intermingling of notes between contracts.\npub fn silo_note_hash(note_hash: ScopedNoteHash, tx_hash: Field, note_index_in_tx: u32) -> Field {\n if note_hash.contract_address.is_zero() {\n 0\n } else {\n let nonce = compute_note_hash_nonce(tx_hash, note_index_in_tx);\n let unique_note_hash = compute_unique_note_hash(nonce, note_hash.value());\n compute_siloed_note_hash(note_hash.contract_address, unique_note_hash)\n }\n}\n\npub fn compute_siloed_nullifier(app: AztecAddress, nullifier: Field) -> Field {\n poseidon2_hash_with_separator(\n [\n app.to_field(),\n nullifier\n ],\n GENERATOR_INDEX__OUTER_NULLIFIER\n )\n}\n\npub fn silo_nullifier(nullifier: ScopedNullifier) -> Field {\n if nullifier.contract_address.is_zero() {\n nullifier.value() // Return value instead of 0 because the first nullifier's contract address is zero.\n } else {\n compute_siloed_nullifier(nullifier.contract_address, nullifier.value())\n }\n}\n\npub fn silo_encrypted_log_hash(log_hash: ScopedLogHash) -> Field {\n // We assume contract address has already been masked\n if log_hash.contract_address.is_zero() {\n 0\n } else {\n accumulate_sha256([log_hash.contract_address.to_field(), log_hash.log_hash.value])\n }\n}\n\npub fn mask_encrypted_log_hash(scoped_log: ScopedEncryptedLogHash) -> AztecAddress {\n if scoped_log.contract_address.is_zero() {\n AztecAddress::from_field(0)\n } else if (scoped_log.log_hash.randomness == 0) {\n scoped_log.contract_address\n } else {\n AztecAddress::from_field(\n poseidon2_hash_with_separator(\n [scoped_log.contract_address.to_field(), scoped_log.log_hash.randomness],\n 0\n )\n )\n }\n}\n\nfn compute_siloed_unencrypted_log_hash(address: AztecAddress, log_hash: Field) -> Field {\n accumulate_sha256([address.to_field(), log_hash])\n}\n\npub fn silo_unencrypted_log_hash(log_hash: ScopedLogHash) -> Field {\n if log_hash.contract_address.is_zero() {\n 0\n } else {\n compute_siloed_unencrypted_log_hash(log_hash.contract_address, log_hash.value())\n }\n}\n\npub fn merkle_hash(left: Field, right: Field) -> Field {\n poseidon2_hash([left, right])\n}\n\npub fn stdlib_recursion_verification_key_compress_native_vk(_vk: VerificationKey) -> Field {\n // Original cpp code\n // stdlib::recursion::verification_key<CT::bn254>::compress_native(private_call.vk, GeneratorIndex::VK);\n // The above cpp method is only ever called on verification key, so it has been special cased here\n let _hash_index = GENERATOR_INDEX__VK;\n 0\n}\n\npub fn compute_l2_to_l1_hash(\n contract_address: AztecAddress,\n recipient: EthAddress,\n content: Field,\n rollup_version_id: Field,\n chain_id: Field\n) -> Field {\n let mut bytes: BoundedVec<u8, 160> = BoundedVec::new();\n\n let inputs = [contract_address.to_field(), rollup_version_id, recipient.to_field(), chain_id, content];\n for i in 0..inputs.len() {\n // TODO are bytes be in fr.to_buffer() ?\n let item_bytes: [u8; 32] = inputs[i].to_be_bytes();\n for j in 0..32 {\n bytes.push(item_bytes[j]);\n }\n }\n\n sha256_to_field(bytes.storage)\n}\n\npub fn silo_l2_to_l1_message(msg: ScopedL2ToL1Message, rollup_version_id: Field, chain_id: Field) -> Field {\n if msg.contract_address.is_zero() {\n 0\n } else {\n compute_l2_to_l1_hash(\n msg.contract_address,\n msg.message.recipient,\n msg.message.content,\n rollup_version_id,\n chain_id\n )\n }\n}\n\n// Computes sha256 hash of 2 input hashes.\n//\n// NB: This method now takes in two 31 byte fields - it assumes that any input\n// is the result of a sha_to_field hash and => is truncated\n//\n// TODO(Jan and David): This is used for the encrypted_log hashes.\n// Can we check to see if we can just use hash_to_field or pedersen_compress here?\n//\npub fn accumulate_sha256(input: [Field; 2]) -> Field {\n // This is a note about the cpp code, since it takes an array of Fields\n // instead of a U128.\n // 4 Field elements when converted to bytes will usually\n // occupy 4 * 32 = 128 bytes.\n // However, this function is making the assumption that each Field\n // only occupies 128 bits.\n //\n // TODO(David): This does not seem to be getting guaranteed anywhere in the code?\n\n // Concatentate two fields into 32x2 = 64 bytes\n // accumulate_sha256 assumes that the inputs are pre-truncated 31 byte numbers\n let mut hash_input_flattened = [0; 64];\n for offset in 0..input.len() {\n let input_as_bytes: [u8; 32] = input[offset].to_be_bytes();\n for byte_index in 0..32 {\n hash_input_flattened[offset * 32 + byte_index] = input_as_bytes[byte_index];\n }\n }\n\n sha256_to_field(hash_input_flattened)\n}\n\n// Computes the final logs hash for a tx.\n// NB: this assumes MAX_ENCRYPTED_LOGS_PER_TX == MAX_UNENCRYPTED_LOGS_PER_TX\n// to avoid doubling code, since we can't define the byte len to be 32*N directly.\npub fn compute_tx_logs_hash(logs: [LogHash; MAX_ENCRYPTED_LOGS_PER_TX]) -> Field {\n // Convert each field element into a byte array and append the bytes to `hash_input_flattened`\n let mut hash_input_flattened = [0; MAX_ENCRYPTED_LOGS_PER_TX * 32];\n for offset in 0..MAX_ENCRYPTED_LOGS_PER_TX {\n let input_as_bytes: [u8; 32] = logs[offset].value.to_be_bytes();\n for byte_index in 0..32 {\n hash_input_flattened[offset * 32 + byte_index] = input_as_bytes[byte_index];\n }\n }\n // Ideally we would push to a slice then hash, but there is no sha_slice\n // Hardcode to 256 bytes for now\n let mut hash = sha256_to_field(hash_input_flattened);\n // Not having a 0 value hash for empty logs causes issues with empty txs\n // used for padding. Returning early is currently unsupported.\n // We always provide sorted logs here, so 0 being empty means all are empty.\n if is_empty(logs[0]) {\n hash = 0;\n }\n hash\n}\n\npub fn compute_tx_note_logs_hash(logs: [LogHash; MAX_NOTE_ENCRYPTED_LOGS_PER_TX]) -> Field {\n // Convert each field element into a byte array and append the bytes to `hash_input_flattened`\n let mut hash_input_flattened = [0; MAX_NOTE_ENCRYPTED_LOGS_PER_TX * 32];\n for offset in 0..MAX_NOTE_ENCRYPTED_LOGS_PER_TX {\n let input_as_bytes: [u8; 32] = logs[offset].value.to_be_bytes();\n for byte_index in 0..32 {\n hash_input_flattened[offset * 32 + byte_index] = input_as_bytes[byte_index];\n }\n }\n // Ideally we would push to a slice then hash, but there is no sha_slice\n // Hardcode to 256 bytes for now\n let mut hash = sha256_to_field(hash_input_flattened);\n // Not having a 0 value hash for empty logs causes issues with empty txs\n // used for padding. Returning early is currently unsupported.\n // We always provide sorted logs here, so 0 being empty means all are empty.\n if is_empty(logs[0]) {\n hash = 0;\n }\n hash\n}\n\npub fn pedersen_hash<let N: u32>(inputs: [Field; N], hash_index: u32) -> Field {\n std::hash::pedersen_hash_with_separator(inputs, hash_index)\n}\n\npub fn poseidon2_hash<let N: u32>(inputs: [Field; N]) -> Field {\n std::hash::poseidon2::Poseidon2::hash(inputs, N)\n}\n\n#[no_predicates]\npub fn poseidon2_hash_with_separator<let N: u32, T>(\n inputs: [Field; N],\n separator: T\n) -> Field where T: ToField {\n // We manually hash the inputs here, since we cannot express with the type system a constant size inputs array of N + 1\n let in_len = N + 1;\n let two_pow_64 = 18446744073709551616;\n let iv : Field = (in_len as Field) * two_pow_64;\n let mut sponge = std::hash::poseidon2::Poseidon2::new(iv);\n sponge.absorb(separator.to_field());\n\n for i in 0..inputs.len() {\n sponge.absorb(inputs[i]);\n }\n\n sponge.squeeze()\n}\n\n#[test]\nfn smoke_sha256_to_field() {\n let full_buffer = [\n 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19,\n 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39,\n 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59,\n 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79,\n 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99,\n 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 119,\n 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130, 131, 132, 133, 134, 135, 136, 137, 138, 139,\n 140, 141, 142, 143, 144, 145, 146, 147, 148, 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159\n ];\n let result = sha256_to_field(full_buffer);\n\n assert(result == 0x448ebbc9e1a31220a2f3830c18eef61b9bd070e5084b7fa2a359fe729184c7);\n\n // to show correctness of the current ver (truncate one byte) vs old ver (mod full bytes):\n let result_bytes = std::hash::sha256(full_buffer);\n let truncated_field = crate::utils::field::field_from_bytes_32_trunc(result_bytes);\n assert(truncated_field == result);\n let mod_res = result + (result_bytes[31] as Field);\n assert(mod_res == 0x448ebbc9e1a31220a2f3830c18eef61b9bd070e5084b7fa2a359fe729184e0);\n}\n\n#[test]\nfn compute_l2_l1_hash() {\n // All zeroes\n let hash_result = compute_l2_to_l1_hash(AztecAddress::from_field(0), EthAddress::zero(), 0, 0, 0);\n assert(hash_result == 0xb393978842a0fa3d3e1470196f098f473f9678e72463cb65ec4ab5581856c2);\n\n // Non-zero case\n let hash_result = compute_l2_to_l1_hash(AztecAddress::from_field(1), EthAddress::from_field(3), 5, 2, 4);\n assert(hash_result == 0x3f88c1044a05e5340ed20466276500f6d45ca5603913b9091e957161734e16);\n}\n\n#[test]\nfn silo_l2_to_l1_message_matches_typescript() {\n let version = 4;\n let chainId = 5;\n\n let hash = silo_l2_to_l1_message(\n ScopedL2ToL1Message {\n message: L2ToL1Message { recipient: EthAddress::from_field(1), content: 2, counter: 0 },\n contract_address: AztecAddress::from_field(3)\n },\n version,\n chainId\n );\n\n // The following value was generated by `l2_to_l1_message.test.ts`\n let hash_from_typescript = 0x00c6155d69febb9d5039b374dd4f77bf57b7c881709aa524a18acaa0bd57476a;\n\n assert_eq(hash, hash_from_typescript);\n}\n"},"276":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/contract_instance.nr","source":"use crate::{\n address::{aztec_address::AztecAddress, partial_address::PartialAddress, public_keys_hash::PublicKeysHash},\n contract_class_id::ContractClassId, constants::CONTRACT_INSTANCE_LENGTH,\n traits::{Deserialize, Hash, Serialize}\n};\n\nstruct ContractInstance {\n salt : Field,\n deployer: AztecAddress,\n contract_class_id : ContractClassId,\n initialization_hash : Field,\n public_keys_hash : PublicKeysHash,\n}\n\nimpl Eq for ContractInstance {\n fn eq(self, other: Self) -> bool {\n self.public_keys_hash.eq(other.public_keys_hash)\n & self.initialization_hash.eq(other.initialization_hash)\n & self.contract_class_id.eq(other.contract_class_id)\n & self.salt.eq(other.salt)\n }\n}\n\nimpl Serialize<CONTRACT_INSTANCE_LENGTH> for ContractInstance {\n fn serialize(self) -> [Field; CONTRACT_INSTANCE_LENGTH] {\n [\n self.salt,\n self.deployer.to_field(),\n self.contract_class_id.to_field(),\n self.initialization_hash,\n self.public_keys_hash.to_field()\n ]\n }\n}\n\nimpl Deserialize<CONTRACT_INSTANCE_LENGTH> for ContractInstance {\n fn deserialize(serialized: [Field; CONTRACT_INSTANCE_LENGTH]) -> Self {\n Self {\n salt: serialized[0],\n deployer: AztecAddress::from_field(serialized[1]),\n contract_class_id: ContractClassId::from_field(serialized[2]),\n initialization_hash: serialized[3],\n public_keys_hash: PublicKeysHash::from_field(serialized[4])\n }\n }\n}\n\nimpl Hash for ContractInstance {\n fn hash(self) -> Field {\n self.to_address().to_field()\n }\n}\n\nimpl ContractInstance {\n fn to_address(self) -> AztecAddress {\n AztecAddress::compute(\n self.public_keys_hash,\n PartialAddress::compute(\n self.contract_class_id,\n self.salt,\n self.initialization_hash,\n self.deployer\n )\n )\n }\n}\n"},"277":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/contract_class_id.nr","source":"use crate::constants::GENERATOR_INDEX__CONTRACT_LEAF;\nuse crate::traits::{ToField, FromField, Serialize, Deserialize};\n\nstruct ContractClassId {\n inner: Field\n}\n\nimpl Eq for ContractClassId {\n fn eq(self, other: ContractClassId) -> bool {\n other.inner == self.inner\n }\n}\n\nimpl ToField for ContractClassId {\n fn to_field(self) -> Field {\n self.inner\n }\n}\n\nimpl FromField for ContractClassId {\n fn from_field(value: Field) -> Self {\n Self { inner: value }\n }\n}\n\nimpl Serialize<1> for ContractClassId {\n fn serialize(self: Self) -> [Field; 1] {\n [self.inner]\n }\n}\n\nimpl Deserialize<1> for ContractClassId {\n fn deserialize(fields: [Field; 1]) -> Self {\n Self { inner: fields[0] }\n }\n}\n\nimpl ContractClassId {\n pub fn compute(\n artifact_hash: Field,\n private_functions_root: Field,\n public_bytecode_commitment: Field\n ) -> Self {\n let hash = crate::hash::poseidon2_hash_with_separator(\n [\n artifact_hash,\n private_functions_root,\n public_bytecode_commitment\n ],\n GENERATOR_INDEX__CONTRACT_LEAF\n ); // TODO(@spalladino): Update generator index\n\n ContractClassId::from_field(hash)\n }\n\n pub fn assert_is_zero(self) {\n assert(self.to_field() == 0);\n }\n}\n"},"288":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/merkle_tree/root.nr","source":"use crate::{hash::merkle_hash, merkle_tree::merkle_tree::MerkleTree};\n\n// Calculate the Merkle tree root from the sibling path and leaf.\n//\n// The leaf is hashed with its sibling, and then the result is hashed\n// with the next sibling etc in the path. The last hash is the root.\n//\n// TODO(David/Someone): The cpp code is using a uint256, whereas its\n// TODO a bit simpler in Noir to just have a bit array.\n// TODO: I'd generally like to avoid u256 for algorithms like\n// this because it means we never even need to consider cases where\n// the index is greater than p.\npub fn root_from_sibling_path<let N: u32>(\n leaf: Field,\n leaf_index: Field,\n sibling_path: [Field; N]\n) -> Field {\n let mut node = leaf;\n let indices: [u1; N] = leaf_index.to_le_bits();\n\n for i in 0..N {\n let (hash_left, hash_right) = if indices[i] == 1 {\n (sibling_path[i], node)\n } else {\n (node, sibling_path[i])\n };\n node = merkle_hash(hash_left, hash_right);\n }\n node\n}\n\npub fn calculate_subtree_root<let N: u32>(leaves: [Field; N]) -> Field {\n MerkleTree::new(leaves).get_root()\n}\n\n// These values are precomputed and we run tests to ensure that they\n// are correct. The values themselves were computed from the cpp code.\n//\n// Would be good if we could use width since the compute_subtree\n// algorithm uses depth.\npub fn calculate_empty_tree_root(depth: u32) -> Field {\n if depth == 0 {\n 0\n } else if depth == 1 {\n 0x0b63a53787021a4a962a452c2921b3663aff1ffd8d5510540f8e659e782956f1\n } else if depth == 2 {\n 0x0e34ac2c09f45a503d2908bcb12f1cbae5fa4065759c88d501c097506a8b2290\n } else if depth == 3 {\n 0x21f9172d72fdcdafc312eee05cf5092980dda821da5b760a9fb8dbdf607c8a20\n } else if depth == 4 {\n 0x2373ea368857ec7af97e7b470d705848e2bf93ed7bef142a490f2119bcf82d8e\n } else if depth == 5 {\n 0x120157cfaaa49ce3da30f8b47879114977c24b266d58b0ac18b325d878aafddf\n } else if depth == 6 {\n 0x01c28fe1059ae0237b72334700697bdf465e03df03986fe05200cadeda66bd76\n } else if depth == 7 {\n 0x2d78ed82f93b61ba718b17c2dfe5b52375b4d37cbbed6f1fc98b47614b0cf21b\n } else if depth == 8 {\n 0x067243231eddf4222f3911defbba7705aff06ed45960b27f6f91319196ef97e1\n } else if depth == 9 {\n 0x1849b85f3c693693e732dfc4577217acc18295193bede09ce8b97ad910310972\n } else if depth == 10 {\n 0x2a775ea761d20435b31fa2c33ff07663e24542ffb9e7b293dfce3042eb104686\n } else {\n assert(false, \"depth should be between 0 and 10\");\n 0\n }\n}\n\n#[test]\nfn test_merkle_root_interop_test() {\n // This is a test to ensure that we match the cpp implementation.\n // You can grep for `TEST_F(root_rollup_tests, noir_interop_test)`\n // to find the test that matches this.\n let root = calculate_subtree_root([1, 2, 3, 4, 1, 2, 3, 4, 1, 2, 3, 4, 1, 2, 3, 4]);\n assert(0x1a09d935ae110b4c861fcec8f9099ec30b4485022aeb3d3cf9d7168e38fdc231 == root);\n\n let empty_root = calculate_subtree_root([0; 16]);\n assert(0x2373ea368857ec7af97e7b470d705848e2bf93ed7bef142a490f2119bcf82d8e == empty_root);\n}\n\n#[test]\nfn test_empty_subroot() {\n assert(calculate_empty_tree_root(0) == 0);\n\n let expected_empty_root_2 = calculate_subtree_root([0; 2]);\n assert(calculate_empty_tree_root(1) == expected_empty_root_2);\n\n let expected_empty_root_4 = calculate_subtree_root([0; 4]);\n assert(calculate_empty_tree_root(2) == expected_empty_root_4);\n\n let expected_empty_root_8 = calculate_subtree_root([0; 8]);\n assert(calculate_empty_tree_root(3) == expected_empty_root_8);\n\n let expected_empty_root_16 = calculate_subtree_root([0; 16]);\n assert(calculate_empty_tree_root(4) == expected_empty_root_16);\n\n let expected_empty_root_32 = calculate_subtree_root([0; 32]);\n assert(calculate_empty_tree_root(5) == expected_empty_root_32);\n\n let expected_empty_root_64 = calculate_subtree_root([0; 64]);\n assert(calculate_empty_tree_root(6) == expected_empty_root_64);\n\n let expected_empty_root_128 = calculate_subtree_root([0; 128]);\n assert(calculate_empty_tree_root(7) == expected_empty_root_128);\n\n let expected_empty_root_256 = calculate_subtree_root([0; 256]);\n assert(calculate_empty_tree_root(8) == expected_empty_root_256);\n\n let expected_empty_root_512 = calculate_subtree_root([0; 512]);\n assert(calculate_empty_tree_root(9) == expected_empty_root_512);\n\n let expected_empty_root_1024 = calculate_subtree_root([0; 1024]);\n assert(calculate_empty_tree_root(10) == expected_empty_root_1024);\n}\n"},"29":{"path":"std/hash/mod.nr","source":"mod poseidon;\nmod mimc;\nmod poseidon2;\nmod keccak;\nmod sha256;\nmod sha512;\n\nuse crate::default::Default;\nuse crate::uint128::U128;\nuse crate::collections::vec::Vec;\nuse crate::embedded_curve_ops::{EmbeddedCurvePoint, EmbeddedCurveScalar, multi_scalar_mul, multi_scalar_mul_slice};\nuse crate::meta::derive_via;\n\n// Kept for backwards compatibility\npub use sha256::{digest, sha256, sha256_compression, sha256_var};\n\n#[foreign(blake2s)]\n// docs:start:blake2s\npub fn blake2s<let N: u32>(input: [u8; N]) -> [u8; 32]\n// docs:end:blake2s\n{}\n\n#[foreign(blake3)]\n// docs:start:blake3\npub fn blake3<let N: u32>(input: [u8; N]) -> [u8; 32]\n// docs:end:blake3\n{}\n\n// docs:start:pedersen_commitment\npub fn pedersen_commitment<let N: u32>(input: [Field; N]) -> EmbeddedCurvePoint {\n // docs:end:pedersen_commitment\n pedersen_commitment_with_separator(input, 0)\n}\n\npub fn pedersen_hash_with_separator<let N: u32>(input: [Field; N], separator: u32) -> Field {\n __pedersen_hash_with_separator(input, separator)\n}\n\nfn pedersen_commitment_with_separator<let N: u32>(input: [Field; N], separator: u32) -> EmbeddedCurvePoint {\n let value = __pedersen_commitment_with_separator(input, separator);\n if (value[0] == 0) & (value[1] == 0) {\n EmbeddedCurvePoint { x: 0, y: 0, is_infinite: true }\n } else {\n EmbeddedCurvePoint { x: value[0], y: value[1], is_infinite: false }\n }\n}\n\n#[no_predicates]\nfn pedersen_commitment_with_separator_noir<let N: u32>(input: [Field; N], separator: u32) -> EmbeddedCurvePoint {\n let mut points = [EmbeddedCurveScalar { lo: 0, hi: 0 }; N];\n for i in 0..N {\n // we use the unsafe version because the multi_scalar_mul will constrain the scalars.\n points[i] = from_field_unsafe(input[i]);\n }\n let generators = derive_generators(\"DEFAULT_DOMAIN_SEPARATOR\".as_bytes(), separator);\n multi_scalar_mul(generators, points)\n}\n\n#[no_predicates]\nfn pedersen_hash_with_separator_noir<let N: u32>(input: [Field; N], separator: u32) -> Field {\n let mut scalars: Vec<EmbeddedCurveScalar> = Vec::from_slice([EmbeddedCurveScalar { lo: 0, hi: 0 }; N].as_slice()); //Vec::new();\n\n for i in 0..N {\n scalars.set(i, from_field_unsafe(input[i]));\n }\n scalars.push(EmbeddedCurveScalar { lo: N as Field, hi: 0 as Field });\n let domain_generators :[EmbeddedCurvePoint; N]= derive_generators(\"DEFAULT_DOMAIN_SEPARATOR\".as_bytes(), separator);\n let mut vec_generators = Vec::new();\n for i in 0..N {\n vec_generators.push(domain_generators[i]);\n }\n let length_generator : [EmbeddedCurvePoint; 1] = derive_generators(\"pedersen_hash_length\".as_bytes(), 0);\n vec_generators.push(length_generator[0]);\n multi_scalar_mul_slice(vec_generators.slice, scalars.slice)[0]\n}\n\n// docs:start:pedersen_hash\npub fn pedersen_hash<let N: u32>(input: [Field; N]) -> Field\n// docs:end:pedersen_hash\n{\n __pedersen_hash_with_separator(input, 0)\n}\n\n#[foreign(pedersen_hash)]\nfn __pedersen_hash_with_separator<let N: u32>(input: [Field; N], separator: u32) -> Field {}\n\n#[foreign(pedersen_commitment)]\nfn __pedersen_commitment_with_separator<let N: u32>(input: [Field; N], separator: u32) -> [Field; 2] {}\n\n#[field(bn254)]\nfn derive_generators<let N: u32, let M: u32>(domain_separator_bytes: [u8; M], starting_index: u32) -> [EmbeddedCurvePoint; N] {\n crate::assert_constant(domain_separator_bytes);\n // TODO(https://github.com/noir-lang/noir/issues/5672): Add back assert_constant on starting_index\n __derive_generators(domain_separator_bytes, starting_index)\n}\n\n#[builtin(derive_pedersen_generators)]\n#[field(bn254)]\nfn __derive_generators<let N: u32, let M: u32>(\n domain_separator_bytes: [u8; M],\n starting_index: u32\n) -> [EmbeddedCurvePoint; N] {}\n\n#[field(bn254)]\n // Same as from_field but:\n // does not assert the limbs are 128 bits\n // does not assert the decomposition does not overflow the EmbeddedCurveScalar\n fn from_field_unsafe(scalar: Field) -> EmbeddedCurveScalar {\n let (xlo, xhi) = unsafe {\n crate::field::bn254::decompose_hint(scalar)\n };\n // Check that the decomposition is correct\n assert_eq(scalar, xlo + crate::field::bn254::TWO_POW_128 * xhi);\n EmbeddedCurveScalar { lo: xlo, hi: xhi }\n}\n\npub fn hash_to_field(inputs: [Field]) -> Field {\n let mut sum = 0;\n\n for input in inputs {\n let input_bytes: [u8; 32] = input.to_le_bytes();\n sum += crate::field::bytes32_to_field(blake2s(input_bytes));\n }\n\n sum\n}\n\n// docs:start:keccak256\npub fn keccak256<let N: u32>(input: [u8; N], message_size: u32) -> [u8; 32]\n// docs:end:keccak256\n{\n crate::hash::keccak::keccak256(input, message_size)\n}\n\n#[foreign(poseidon2_permutation)]\npub fn poseidon2_permutation<let N: u32>(_input: [Field; N], _state_length: u32) -> [Field; N] {}\n\n// Generic hashing support. \n// Partially ported and impacted by rust.\n\n// Hash trait shall be implemented per type.\n#[derive_via(derive_hash)]\ntrait Hash {\n fn hash<H>(self, state: &mut H) where H: Hasher;\n}\n\n// docs:start:derive_hash\ncomptime fn derive_hash(s: StructDefinition) -> Quoted {\n let name = quote { Hash };\n let signature = quote { fn hash<H>(_self: Self, _state: &mut H) where H: std::hash::Hasher };\n let for_each_field = |name| quote { _self.$name.hash(_state); };\n crate::meta::make_trait_impl(s, name, signature, for_each_field, quote {}, |fields| fields)\n}\n// docs:end:derive_hash\n\n// Hasher trait shall be implemented by algorithms to provide hash-agnostic means.\n// TODO: consider making the types generic here ([u8], [Field], etc.)\ntrait Hasher{\n fn finish(self) -> Field;\n \n fn write(&mut self, input: Field);\n}\n\n// BuildHasher is a factory trait, responsible for production of specific Hasher.\ntrait BuildHasher<H> where H: Hasher{\n fn build_hasher(self) -> H;\n}\n\nstruct BuildHasherDefault<H>;\n\nimpl<H> BuildHasher<H> for BuildHasherDefault<H>\nwhere \n H: Hasher + Default {\n fn build_hasher(_self: Self) -> H {\n H::default()\n }\n}\n\nimpl<H> Default for BuildHasherDefault<H>\nwhere \n H: Hasher + Default {\n fn default() -> Self {\n BuildHasherDefault {}\n }\n}\n\nimpl Hash for Field {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self);\n }\n}\n\nimpl Hash for u1 {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for u8 {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for u16 {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for u32 {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for u64 {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for i8 {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for i16 {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for i32 {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for i64 {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for bool {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for () {\n fn hash<H>(_self: Self, _state: &mut H) where H: Hasher {}\n}\n\nimpl Hash for U128 {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self.lo as Field);\n H::write(state, self.hi as Field);\n }\n}\n\nimpl<T, let N: u32> Hash for [T; N] where T: Hash {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n for elem in self {\n elem.hash(state);\n }\n }\n}\n\nimpl<T> Hash for [T] where T: Hash {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n self.len().hash(state);\n for elem in self {\n elem.hash(state);\n }\n }\n}\n\nimpl<A, B> Hash for (A, B) where A: Hash, B: Hash {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n self.0.hash(state);\n self.1.hash(state);\n }\n}\n\nimpl<A, B, C> Hash for (A, B, C) where A: Hash, B: Hash, C: Hash {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n self.0.hash(state);\n self.1.hash(state);\n self.2.hash(state);\n }\n}\n\nimpl<A, B, C, D> Hash for (A, B, C, D) where A: Hash, B: Hash, C: Hash, D: Hash {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n self.0.hash(state);\n self.1.hash(state);\n self.2.hash(state);\n self.3.hash(state);\n }\n}\n\nimpl<A, B, C, D, E> Hash for (A, B, C, D, E) where A: Hash, B: Hash, C: Hash, D: Hash, E: Hash {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n self.0.hash(state);\n self.1.hash(state);\n self.2.hash(state);\n self.3.hash(state);\n self.4.hash(state);\n }\n}\n\n// Some test vectors for Pedersen hash and Pedersen Commitment.\n// They have been generated using the same functions so the tests are for now useless\n// but they will be useful when we switch to Noir implementation.\n#[test]\nfn assert_pedersen() {\n assert_eq(\n pedersen_hash_with_separator([1], 1), 0x1b3f4b1a83092a13d8d1a59f7acb62aba15e7002f4440f2275edb99ebbc2305f\n );\n assert_eq(\n pedersen_commitment_with_separator([1], 1), EmbeddedCurvePoint {\n x: 0x054aa86a73cb8a34525e5bbed6e43ba1198e860f5f3950268f71df4591bde402,\n y: 0x209dcfbf2cfb57f9f6046f44d71ac6faf87254afc7407c04eb621a6287cac126,\n is_infinite: false\n }\n );\n\n assert_eq(\n pedersen_hash_with_separator([1, 2], 2), 0x26691c129448e9ace0c66d11f0a16d9014a9e8498ee78f4d69f0083168188255\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2], 2), EmbeddedCurvePoint {\n x: 0x2e2b3b191e49541fe468ec6877721d445dcaffe41728df0a0eafeb15e87b0753,\n y: 0x2ff4482400ad3a6228be17a2af33e2bcdf41be04795f9782bd96efe7e24f8778,\n is_infinite: false\n }\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3], 3), 0x0bc694b7a1f8d10d2d8987d07433f26bd616a2d351bc79a3c540d85b6206dbe4\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3], 3), EmbeddedCurvePoint {\n x: 0x1fee4e8cf8d2f527caa2684236b07c4b1bad7342c01b0f75e9a877a71827dc85,\n y: 0x2f9fedb9a090697ab69bf04c8bc15f7385b3e4b68c849c1536e5ae15ff138fd1,\n is_infinite: false\n }\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4], 4), 0xdae10fb32a8408521803905981a2b300d6a35e40e798743e9322b223a5eddc\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4], 4), EmbeddedCurvePoint {\n x: 0x07ae3e202811e1fca39c2d81eabe6f79183978e6f12be0d3b8eda095b79bdbc9,\n y: 0x0afc6f892593db6fbba60f2da558517e279e0ae04f95758587760ba193145014,\n is_infinite: false\n }\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5], 5), 0xfc375b062c4f4f0150f7100dfb8d9b72a6d28582dd9512390b0497cdad9c22\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5], 5), EmbeddedCurvePoint {\n x: 0x1754b12bd475a6984a1094b5109eeca9838f4f81ac89c5f0a41dbce53189bb29,\n y: 0x2da030e3cfcdc7ddad80eaf2599df6692cae0717d4e9f7bfbee8d073d5d278f7,\n is_infinite: false\n }\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5, 6], 6), 0x1696ed13dc2730062a98ac9d8f9de0661bb98829c7582f699d0273b18c86a572\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6], 6), EmbeddedCurvePoint {\n x: 0x190f6c0e97ad83e1e28da22a98aae156da083c5a4100e929b77e750d3106a697,\n y: 0x1f4b60f34ef91221a0b49756fa0705da93311a61af73d37a0c458877706616fb,\n is_infinite: false\n }\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5, 6, 7], 7), 0x128c0ff144fc66b6cb60eeac8a38e23da52992fc427b92397a7dffd71c45ede3\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6, 7], 7), EmbeddedCurvePoint {\n x: 0x015441e9d29491b06563fac16fc76abf7a9534c715421d0de85d20dbe2965939,\n y: 0x1d2575b0276f4e9087e6e07c2cb75aa1baafad127af4be5918ef8a2ef2fea8fc,\n is_infinite: false\n }\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5, 6, 7, 8], 8), 0x2f960e117482044dfc99d12fece2ef6862fba9242be4846c7c9a3e854325a55c\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6, 7, 8], 8), EmbeddedCurvePoint {\n x: 0x1657737676968887fceb6dd516382ea13b3a2c557f509811cd86d5d1199bc443,\n y: 0x1f39f0cb569040105fa1e2f156521e8b8e08261e635a2b210bdc94e8d6d65f77,\n is_infinite: false\n }\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5, 6, 7, 8, 9], 9), 0x0c96db0790602dcb166cc4699e2d306c479a76926b81c2cb2aaa92d249ec7be7\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6, 7, 8, 9], 9), EmbeddedCurvePoint {\n x: 0x0a3ceae42d14914a432aa60ec7fded4af7dad7dd4acdbf2908452675ec67e06d,\n y: 0xfc19761eaaf621ad4aec9a8b2e84a4eceffdba78f60f8b9391b0bd9345a2f2,\n is_infinite: false\n }\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5, 6, 7, 8, 9, 10], 10), 0x2cd37505871bc460a62ea1e63c7fe51149df5d0801302cf1cbc48beb8dff7e94\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6, 7, 8, 9, 10], 10), EmbeddedCurvePoint {\n x: 0x2fb3f8b3d41ddde007c8c3c62550f9a9380ee546fcc639ffbb3fd30c8d8de30c,\n y: 0x300783be23c446b11a4c0fabf6c91af148937cea15fcf5fb054abf7f752ee245,\n is_infinite: false\n }\n );\n}\n\n"},"292":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/utils/reader.nr","source":"struct Reader<let N: u32> {\n data: [Field; N],\n offset: u32,\n}\n\nimpl<let N: u32> Reader<N> {\n pub fn new(data: [Field; N]) -> Self {\n Self { data, offset: 0 }\n }\n\n pub fn read(&mut self) -> Field {\n let result = self.data[self.offset];\n self.offset += 1;\n result\n }\n\n pub fn read_u32(&mut self) -> u32 {\n self.read() as u32\n }\n\n pub fn read_bool(&mut self) -> bool {\n self.read() as bool\n }\n\n pub fn read_array<let K: u32>(&mut self, mut result: [Field; K]) -> [Field; K] {\n for i in 0..K {\n result[i] = self.data[self.offset + i];\n }\n self.offset += K;\n result\n }\n\n // TODO(#4394)\n pub fn read_struct<T, let K: u32>(&mut self, deserialise: fn([Field; K]) -> T) -> T {\n let result = deserialise(self.read_array([0; K]));\n result\n }\n\n pub fn read_struct_array<T, let K: u32, let C: u32>(&mut self, deserialise: fn([Field; K]) -> T, mut result: [T; C]) -> [T; C] {\n for i in 0..C {\n result[i] = self.read_struct(deserialise);\n }\n result\n }\n\n pub fn finish(self) {\n assert(self.offset == self.data.len(), \"Reader did not read all data\");\n }\n}\n"},"310":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/utils/field.nr","source":"pub fn field_from_bytes<let N: u32>(bytes: [u8; N], big_endian: bool) -> Field {\n assert(bytes.len() < 32, \"field_from_bytes: N must be less than 32\");\n let mut as_field = 0;\n let mut offset = 1;\n for i in 0..N {\n let mut index = i;\n if big_endian {\n index = N - i - 1;\n }\n as_field += (bytes[index] as Field) * offset;\n offset *= 256;\n }\n\n as_field\n}\n\n// Convert a 32 byte array to a field element by truncating the final byte\npub fn field_from_bytes_32_trunc(bytes32: [u8; 32]) -> Field {\n // Convert it to a field element\n let mut v = 1;\n let mut high = 0 as Field;\n let mut low = 0 as Field;\n\n for i in 0..15 {\n // covers bytes 16..30 (31 is truncated and ignored)\n low = low + (bytes32[15 + 15 - i] as Field) * v;\n v = v * 256;\n // covers bytes 0..14\n high = high + (bytes32[14 - i] as Field) * v;\n }\n // covers byte 15\n low = low + (bytes32[15] as Field) * v;\n\n low + high * v\n}\n\n// TODO to radix returns u8, so we cannot use bigger radixes. It'd be ideal to use a radix of the maximum range-constrained integer noir supports\npub fn full_field_less_than(lhs: Field, rhs: Field) -> bool {\n lhs.lt(rhs)\n}\n\npub fn full_field_greater_than(lhs: Field, rhs: Field) -> bool {\n rhs.lt(lhs)\n}\n\n#[test]\nunconstrained fn bytes_field_test() {\n // Tests correctness of field_from_bytes_32_trunc against existing methods\n // Bytes representing 0x543e0a6642ffeb8039296861765a53407bba62bd1c97ca43374de950bbe0a7\n let inputs = [\n 84, 62, 10, 102, 66, 255, 235, 128, 57, 41, 104, 97, 118, 90, 83, 64, 123, 186, 98, 189, 28, 151, 202, 67, 55, 77, 233, 80, 187, 224, 167\n ];\n let field = field_from_bytes(inputs, true);\n let return_bytes: [u8; 31] = field.to_be_bytes();\n for i in 0..31 {\n assert_eq(inputs[i], return_bytes[i]);\n }\n // 32 bytes - we remove the final byte, and check it matches the field\n let inputs2 = [\n 84, 62, 10, 102, 66, 255, 235, 128, 57, 41, 104, 97, 118, 90, 83, 64, 123, 186, 98, 189, 28, 151, 202, 67, 55, 77, 233, 80, 187, 224, 167, 158\n ];\n let field2 = field_from_bytes_32_trunc(inputs2);\n let return_bytes2: [u8; 31] = field.to_be_bytes();\n\n for i in 0..31 {\n assert_eq(return_bytes2[i], return_bytes[i]);\n }\n assert_eq(field2, field);\n}\n\n#[test]\nunconstrained fn max_field_test() {\n // Tests the hardcoded value in constants.nr vs underlying modulus\n // NB: We can't use 0-1 in constants.nr as it will be transpiled incorrectly to ts and sol constants files\n let max_value = crate::constants::MAX_FIELD_VALUE;\n assert_eq(max_value, 0 - 1);\n // modulus == 0 is tested elsewhere, so below is more of a sanity check\n let max_bytes: [u8; 32] = max_value.to_be_bytes();\n let mod_bytes = std::field::modulus_be_bytes();\n for i in 0..31 {\n assert_eq(max_bytes[i], mod_bytes[i]);\n }\n assert_eq(max_bytes[31], mod_bytes[31] - 1);\n}\n"},"312":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/utils/mod.nr","source":"// general util packages/modules are usually bad practice\n// because there is no criteria for what we should not put in here.\n// Reducing the size of this package would be welcome.\n\nmod arrays;\nmod field;\nmod reader;\nmod uint256;\n\n// if predicate == true then return lhs, else return rhs\npub fn conditional_assign(predicate: bool, lhs: Field, rhs: Field) -> Field {\n if predicate { lhs } else { rhs }\n}\n\npub fn arr_copy_slice<T, let N: u32, let M: u32>(src: [T; N], mut dst: [T; M], offset: u32) -> [T; M] {\n let iterator_len = if N > M { M } else { N };\n for i in 0..iterator_len {\n dst[i] = src[i + offset];\n }\n dst\n}\n"},"324":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/address/eth_address.nr","source":"use crate::{constants::ETH_ADDRESS_LENGTH, traits::{Empty, ToField, Serialize, Deserialize}, utils};\n\nstruct EthAddress{\n inner : Field\n}\n\nimpl Eq for EthAddress {\n fn eq(self, other: Self) -> bool {\n self.to_field() == other.to_field()\n }\n}\n\nimpl Empty for EthAddress {\n fn empty() -> Self {\n Self { inner: 0 }\n }\n}\n\nimpl ToField for EthAddress {\n fn to_field(self) -> Field {\n self.inner\n }\n}\n\nimpl Serialize<ETH_ADDRESS_LENGTH> for EthAddress {\n fn serialize(self: Self) -> [Field; ETH_ADDRESS_LENGTH] {\n [self.inner]\n }\n}\n\nimpl Deserialize<ETH_ADDRESS_LENGTH> for EthAddress {\n fn deserialize(fields: [Field; ETH_ADDRESS_LENGTH]) -> Self {\n EthAddress::from_field(fields[0])\n }\n}\n\nimpl EthAddress {\n pub fn zero() -> Self {\n Self { inner: 0 }\n }\n\n pub fn from_field(field: Field) -> Self {\n field.assert_max_bit_size(160);\n Self { inner: field }\n }\n\n pub fn is_zero(self) -> bool {\n self.inner == 0\n }\n\n pub fn assert_is_zero(self) {\n assert(self.to_field() == 0);\n }\n\n pub fn conditional_assign(predicate: bool, lhs: Self, rhs: Self) -> Self {\n let result = utils::conditional_assign(predicate, rhs.to_field(), lhs.to_field());\n Self { inner: result }\n }\n}\n"},"325":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/address/aztec_address.nr","source":"use crate::{\n crate::address::{partial_address::PartialAddress, public_keys_hash::PublicKeysHash},\n constants::{AZTEC_ADDRESS_LENGTH, GENERATOR_INDEX__CONTRACT_ADDRESS_V1},\n hash::poseidon2_hash_with_separator, traits::{Empty, FromField, ToField, Serialize, Deserialize},\n utils\n};\n\n// Aztec address\nstruct AztecAddress {\n inner : Field\n}\n\nimpl Eq for AztecAddress {\n fn eq(self, other: Self) -> bool {\n self.to_field() == other.to_field()\n }\n}\n\nimpl Empty for AztecAddress {\n fn empty() -> Self {\n Self { inner: 0 }\n }\n}\n\nimpl ToField for AztecAddress {\n fn to_field(self) -> Field {\n self.inner\n }\n}\n\nimpl FromField for AztecAddress {\n fn from_field(value: Field) -> AztecAddress {\n AztecAddress { inner: value }\n }\n}\n\nimpl Serialize<AZTEC_ADDRESS_LENGTH> for AztecAddress {\n fn serialize(self: Self) -> [Field; AZTEC_ADDRESS_LENGTH] {\n [self.to_field()]\n }\n}\n\nimpl Deserialize<AZTEC_ADDRESS_LENGTH> for AztecAddress {\n fn deserialize(fields: [Field; AZTEC_ADDRESS_LENGTH]) -> Self {\n FromField::from_field(fields[0])\n }\n}\n\nimpl AztecAddress {\n pub fn zero() -> Self {\n Self { inner: 0 }\n }\n\n pub fn compute(pub_keys_hash: PublicKeysHash, partial_address: PartialAddress) -> AztecAddress {\n AztecAddress::from_field(\n poseidon2_hash_with_separator(\n [pub_keys_hash.to_field(), partial_address.to_field()],\n GENERATOR_INDEX__CONTRACT_ADDRESS_V1\n )\n )\n }\n\n pub fn is_zero(self) -> bool {\n self.inner == 0\n }\n\n pub fn assert_is_zero(self) {\n assert(self.to_field() == 0);\n }\n\n pub fn conditional_assign(predicate: bool, lhs: Self, rhs: Self) -> Self {\n let result = utils::conditional_assign(predicate, rhs.to_field(), lhs.to_field());\n Self { inner: result }\n }\n}\n\n#[test]\nfn compute_address_from_partial_and_pub_keys_hash() {\n let pub_keys_hash = PublicKeysHash::from_field(1);\n let partial_address = PartialAddress::from_field(2);\n\n let address = AztecAddress::compute(pub_keys_hash, partial_address);\n let expected_computed_address_from_partial_and_pubkey = 0x23ce9be3fa3c846b0f9245cc796902e731d04f086e8a42473bb29e405fc98075;\n assert(address.to_field() == expected_computed_address_from_partial_and_pubkey);\n}\n\n#[test]\nfn from_field_to_field() {\n let address = AztecAddress { inner: 37 };\n assert_eq(FromField::from_field(address.to_field()), address);\n}\n\n#[test]\nfn serde() {\n let address = AztecAddress { inner: 37 };\n assert_eq(Deserialize::deserialize(address.serialize()), address);\n}\n"},"327":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/address/partial_address.nr","source":"use crate::{\n address::{salted_initialization_hash::SaltedInitializationHash, aztec_address::AztecAddress},\n constants::GENERATOR_INDEX__PARTIAL_ADDRESS, contract_class_id::ContractClassId,\n hash::poseidon2_hash_with_separator, traits::{ToField, Serialize, Deserialize}\n};\n\nglobal PARTIAL_ADDRESS_LENGTH = 1;\n\n// Partial address\nstruct PartialAddress {\n inner : Field\n}\n\nimpl ToField for PartialAddress {\n fn to_field(self) -> Field {\n self.inner\n }\n}\n\nimpl Serialize<PARTIAL_ADDRESS_LENGTH> for PartialAddress {\n fn serialize(self: Self) -> [Field; PARTIAL_ADDRESS_LENGTH] {\n [self.to_field()]\n }\n}\n\nimpl Deserialize<PARTIAL_ADDRESS_LENGTH> for PartialAddress {\n fn deserialize(fields: [Field; PARTIAL_ADDRESS_LENGTH]) -> Self {\n PartialAddress { inner: fields[0] }\n }\n}\n\nimpl PartialAddress {\n pub fn from_field(field: Field) -> Self {\n Self { inner: field }\n }\n\n pub fn compute(\n contract_class_id: ContractClassId,\n salt: Field,\n initialization_hash: Field,\n deployer: AztecAddress\n ) -> Self {\n PartialAddress::compute_from_salted_initialization_hash(\n contract_class_id,\n SaltedInitializationHash::compute(salt, initialization_hash, deployer)\n )\n }\n\n pub fn compute_from_salted_initialization_hash(\n contract_class_id: ContractClassId,\n salted_initialization_hash: SaltedInitializationHash\n ) -> Self {\n PartialAddress::from_field(\n poseidon2_hash_with_separator(\n [\n contract_class_id.to_field(),\n salted_initialization_hash.to_field()\n ],\n GENERATOR_INDEX__PARTIAL_ADDRESS\n )\n )\n }\n\n pub fn to_field(self) -> Field {\n self.inner\n }\n\n pub fn is_zero(self) -> bool {\n self.to_field() == 0\n }\n\n pub fn assert_is_zero(self) {\n assert(self.to_field() == 0);\n }\n}\n"},"328":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/address/salted_initialization_hash.nr","source":"use crate::{\n address::{aztec_address::AztecAddress}, constants::GENERATOR_INDEX__PARTIAL_ADDRESS,\n hash::poseidon2_hash_with_separator, traits::ToField\n};\n\n// Salted initialization hash. Used in the computation of a partial address.\nstruct SaltedInitializationHash {\n inner: Field\n}\n\nimpl ToField for SaltedInitializationHash {\n fn to_field(self) -> Field {\n self.inner\n }\n}\n\nimpl SaltedInitializationHash {\n pub fn from_field(field: Field) -> Self {\n Self { inner: field }\n }\n\n pub fn compute(salt: Field, initialization_hash: Field, deployer: AztecAddress) -> Self {\n SaltedInitializationHash::from_field(\n poseidon2_hash_with_separator(\n [\n salt,\n initialization_hash,\n deployer.to_field()\n ],\n GENERATOR_INDEX__PARTIAL_ADDRESS\n )\n )\n }\n\n pub fn assert_is_zero(self) {\n assert(self.to_field() == 0);\n }\n}\n"},"34":{"path":"std/hash/poseidon2.nr","source":"use crate::hash::Hasher;\nuse crate::default::Default;\n\ncomptime global RATE: u32 = 3;\n\nstruct Poseidon2 {\n cache: [Field;3],\n state: [Field;4],\n cache_size: u32,\n squeeze_mode: bool, // 0 => absorb, 1 => squeeze\n}\n\nimpl Poseidon2 {\n #[no_predicates]\n pub fn hash<let N: u32>(input: [Field; N], message_size: u32) -> Field {\n if message_size == N {\n Poseidon2::hash_internal(input, N, false)\n } else {\n Poseidon2::hash_internal(input, message_size, true)\n }\n }\n\n fn new(iv: Field) -> Poseidon2 {\n let mut result = Poseidon2 { cache: [0; 3], state: [0; 4], cache_size: 0, squeeze_mode: false };\n result.state[RATE] = iv;\n result\n }\n\n fn perform_duplex(&mut self) {\n // add the cache into sponge state\n for i in 0..RATE {\n // We effectively zero-pad the cache by only adding to the state\n // cache that is less than the specified `cache_size`\n if i < self.cache_size {\n self.state[i] += self.cache[i];\n }\n }\n self.state = crate::hash::poseidon2_permutation(self.state, 4);\n }\n\n fn absorb(&mut self, input: Field) {\n assert(!self.squeeze_mode);\n if self.cache_size == RATE {\n // If we're absorbing, and the cache is full, apply the sponge permutation to compress the cache\n self.perform_duplex();\n self.cache[0] = input;\n self.cache_size = 1;\n } else {\n // If we're absorbing, and the cache is not full, add the input into the cache\n self.cache[self.cache_size] = input;\n self.cache_size += 1;\n }\n }\n\n fn squeeze(&mut self) -> Field {\n assert(!self.squeeze_mode);\n // If we're in absorb mode, apply sponge permutation to compress the cache.\n self.perform_duplex();\n self.squeeze_mode = true;\n\n // Pop one item off the top of the permutation and return it.\n self.state[0]\n }\n\n fn hash_internal<let N: u32>(input: [Field; N], in_len: u32, is_variable_length: bool) -> Field {\n let two_pow_64 = 18446744073709551616;\n let iv : Field = (in_len as Field) * two_pow_64;\n let mut sponge = Poseidon2::new(iv);\n for i in 0..input.len() {\n if i < in_len {\n sponge.absorb(input[i]);\n }\n }\n\n // In the case where the hash preimage is variable-length, we append `1` to the end of the input, to distinguish\n // from fixed-length hashes. (the combination of this additional field element + the hash IV ensures\n // fixed-length and variable-length hashes do not collide)\n if is_variable_length {\n sponge.absorb(1);\n }\n sponge.squeeze()\n }\n}\n\nstruct Poseidon2Hasher{\n _state: [Field],\n}\n\nimpl Hasher for Poseidon2Hasher {\n fn finish(self) -> Field {\n let iv : Field = (self._state.len() as Field) * 18446744073709551616; // iv = (self._state.len() << 64)\n let mut sponge = Poseidon2::new(iv);\n for i in 0..self._state.len() {\n sponge.absorb(self._state[i]);\n }\n sponge.squeeze()\n }\n\n fn write(&mut self, input: Field) {\n self._state = self._state.push_back(input);\n }\n}\n\nimpl Default for Poseidon2Hasher {\n fn default() -> Self {\n Poseidon2Hasher { _state: &[] }\n }\n}\n"},"373":{"path":"/usr/src/noir-projects/noir-contracts/contracts/contract_class_registerer_contract/src/main.nr","source":"mod events;\nmod capsule;\n\ncontract ContractClassRegisterer {\n use dep::aztec::prelude::{AztecAddress, EthAddress, FunctionSelector};\n use dep::aztec::protocol_types::{\n contract_class_id::ContractClassId,\n constants::{\n ARTIFACT_FUNCTION_TREE_MAX_HEIGHT, FUNCTION_TREE_HEIGHT,\n MAX_PACKED_BYTECODE_SIZE_PER_PRIVATE_FUNCTION_IN_FIELDS,\n MAX_PACKED_BYTECODE_SIZE_PER_UNCONSTRAINED_FUNCTION_IN_FIELDS,\n MAX_PACKED_PUBLIC_BYTECODE_SIZE_IN_FIELDS, REGISTERER_CONTRACT_CLASS_REGISTERED_MAGIC_VALUE\n },\n traits::Serialize, abis::log_hash::LogHash\n };\n\n use dep::aztec::{context::PrivateContext, oracle::logs::emit_contract_class_unencrypted_log_private_internal};\n\n use crate::events::{\n class_registered::ContractClassRegistered,\n private_function_broadcasted::{ClassPrivateFunctionBroadcasted, PrivateFunction, InnerPrivateFunction},\n unconstrained_function_broadcasted::{ClassUnconstrainedFunctionBroadcasted, UnconstrainedFunction, InnerUnconstrainedFunction}\n };\n\n // docs:start:import_pop_capsule\n use crate::capsule::pop_capsule;\n // docs:end:import_pop_capsule\n\n #[aztec(private)]\n fn register(artifact_hash: Field, private_functions_root: Field, public_bytecode_commitment: Field) {\n // TODO: Validate public_bytecode_commitment is the correct commitment of packed_public_bytecode\n // TODO: Validate packed_public_bytecode is legit public bytecode\n\n // docs:start:pop_capsule\n let packed_public_bytecode: [Field; MAX_PACKED_PUBLIC_BYTECODE_SIZE_IN_FIELDS] = pop_capsule();\n // docs:end:pop_capsule\n\n // Compute contract class id from preimage\n let contract_class_id = ContractClassId::compute(\n artifact_hash,\n private_functions_root,\n public_bytecode_commitment\n );\n\n // Emit the contract class id as a nullifier to be able to prove that this class has been (not) registered\n let event = ContractClassRegistered { contract_class_id, version: 1, artifact_hash, private_functions_root, packed_public_bytecode };\n context.push_nullifier(contract_class_id.to_field());\n\n // Broadcast class info including public bytecode\n dep::aztec::oracle::debug_log::debug_log_format(\n \"ContractClassRegistered: {}\",\n [\n contract_class_id.to_field(),\n artifact_hash,\n private_functions_root,\n public_bytecode_commitment\n ]\n );\n emit_contract_class_unencrypted_log(&mut context, event.serialize());\n }\n\n #[aztec(private)]\n fn broadcast_private_function(\n contract_class_id: ContractClassId,\n artifact_metadata_hash: Field,\n unconstrained_functions_artifact_tree_root: Field,\n private_function_tree_sibling_path: [Field; FUNCTION_TREE_HEIGHT],\n private_function_tree_leaf_index: Field,\n artifact_function_tree_sibling_path: [Field; ARTIFACT_FUNCTION_TREE_MAX_HEIGHT],\n artifact_function_tree_leaf_index: Field,\n function_data: InnerPrivateFunction\n ) {\n let private_bytecode: [Field; MAX_PACKED_BYTECODE_SIZE_PER_PRIVATE_FUNCTION_IN_FIELDS] = pop_capsule();\n\n let event = ClassPrivateFunctionBroadcasted {\n contract_class_id,\n artifact_metadata_hash,\n unconstrained_functions_artifact_tree_root,\n private_function_tree_sibling_path,\n private_function_tree_leaf_index,\n artifact_function_tree_sibling_path,\n artifact_function_tree_leaf_index,\n function: PrivateFunction {\n selector: function_data.selector,\n metadata_hash: function_data.metadata_hash,\n vk_hash: function_data.vk_hash,\n bytecode: private_bytecode\n }\n };\n dep::aztec::oracle::debug_log::debug_log_format(\n \"ClassPrivateFunctionBroadcasted: {}\",\n [\n contract_class_id.to_field(),\n artifact_metadata_hash,\n unconstrained_functions_artifact_tree_root,\n function_data.selector.to_field(),\n function_data.vk_hash,\n function_data.metadata_hash\n ]\n );\n emit_contract_class_unencrypted_log(&mut context, event.serialize());\n }\n\n #[aztec(private)]\n fn broadcast_unconstrained_function(\n contract_class_id: ContractClassId,\n artifact_metadata_hash: Field,\n private_functions_artifact_tree_root: Field,\n artifact_function_tree_sibling_path: [Field; ARTIFACT_FUNCTION_TREE_MAX_HEIGHT],\n artifact_function_tree_leaf_index: Field,\n function_data: InnerUnconstrainedFunction\n ) {\n let unconstrained_bytecode: [Field; MAX_PACKED_BYTECODE_SIZE_PER_UNCONSTRAINED_FUNCTION_IN_FIELDS] = pop_capsule();\n let event = ClassUnconstrainedFunctionBroadcasted {\n contract_class_id,\n artifact_metadata_hash,\n private_functions_artifact_tree_root,\n artifact_function_tree_sibling_path,\n artifact_function_tree_leaf_index,\n function: UnconstrainedFunction {\n selector: function_data.selector,\n metadata_hash: function_data.metadata_hash,\n bytecode: unconstrained_bytecode\n }\n };\n dep::aztec::oracle::debug_log::debug_log_format(\n \"ClassUnconstrainedFunctionBroadcasted: {}\",\n [\n contract_class_id.to_field(),\n artifact_metadata_hash,\n private_functions_artifact_tree_root,\n function_data.selector.to_field(),\n function_data.metadata_hash\n ]\n );\n emit_contract_class_unencrypted_log(&mut context, event.serialize());\n }\n\n // This fn exists separately from emit_unencrypted_log because sha hashing the preimage\n // is too large to compile (16,200 fields, 518,400 bytes) => the oracle hashes it\n // It is ONLY used with contract_class_registerer_contract since we already assert correctness:\n // - Contract class -> we will commit to the packed bytecode (currently a TODO)\n // - Private function -> we provide a membership proof\n // - Unconstrained function -> we provide a membership proof\n // Ordinary logs are not protected by the above so this fn shouldn't be called by anything else\n #[contract_library_method]\n pub fn emit_contract_class_unencrypted_log<N>(context: &mut PrivateContext, log: [Field; N]) {\n let contract_address = context.this_address();\n let counter = context.next_counter();\n let log_hash = emit_contract_class_unencrypted_log_private_internal(contract_address, log, counter);\n // 40 = addr (32) + raw log len (4) + processed log len (4)\n let len = 40 + N * 32;\n let side_effect = LogHash { value: log_hash, counter, length: len };\n context.unencrypted_logs_hashes.push(side_effect);\n }\n}\n"},"375":{"path":"/usr/src/noir-projects/noir-contracts/contracts/contract_instance_deployer_contract/src/main.nr","source":"contract ContractInstanceDeployer {\n use dep::aztec::protocol_types::{\n address::{AztecAddress, PublicKeysHash, PartialAddress}, contract_class_id::ContractClassId,\n constants::DEPLOYER_CONTRACT_INSTANCE_DEPLOYED_MAGIC_VALUE, abis::log_hash::LogHash\n };\n use dep::aztec::{hash::compute_unencrypted_log_hash, oracle::logs::emit_unencrypted_log_private_internal};\n\n #[aztec(event)]\n struct ContractInstanceDeployed {\n DEPLOYER_CONTRACT_INSTANCE_DEPLOYED_MAGIC_VALUE: Field,\n address: AztecAddress,\n version: u8,\n salt: Field,\n contract_class_id: ContractClassId,\n initialization_hash: Field,\n public_keys_hash: PublicKeysHash,\n deployer: AztecAddress,\n }\n\n #[aztec(private)]\n fn deploy(\n salt: Field,\n contract_class_id: ContractClassId,\n initialization_hash: Field,\n public_keys_hash: PublicKeysHash,\n universal_deploy: bool\n ) {\n // TODO(@spalladino): assert nullifier_exists silo(contract_class_id, ContractClassRegisterer)\n\n let deployer = if universal_deploy {\n AztecAddress::zero()\n } else {\n context.msg_sender()\n };\n\n let partial_address = PartialAddress::compute(contract_class_id, salt, initialization_hash, deployer);\n\n let address = AztecAddress::compute(public_keys_hash, partial_address);\n\n // Emit the address as a nullifier to be able to prove that this instance has been (not) deployed\n context.push_nullifier(address.to_field());\n\n // Broadcast the event\n let event = ContractInstanceDeployed {\n DEPLOYER_CONTRACT_INSTANCE_DEPLOYED_MAGIC_VALUE,\n contract_class_id,\n address,\n public_keys_hash,\n initialization_hash,\n salt,\n deployer,\n version: 1\n };\n\n let payload = event.serialize();\n dep::aztec::oracle::debug_log::debug_log_format(\"ContractInstanceDeployed: {}\", payload);\n\n let contract_address = context.this_address();\n let counter = context.next_counter();\n\n // @todo This is very inefficient, we are doing a lot of back and forth conversions.\n let log_slice = payload.to_be_bytes_arr();\n let log_hash = compute_unencrypted_log_hash(contract_address, payload);\n // 40 = addr (32) + raw log len (4) + processed log len (4)\n let len = 40 + log_slice.len().to_field();\n let side_effect = LogHash { value: log_hash, counter, length: len };\n context.unencrypted_logs_hashes.push(side_effect);\n\n let _void = emit_unencrypted_log_private_internal(contract_address, payload, counter);\n }\n}\n"},"395":{"path":"/usr/src/noir-projects/noir-contracts/contracts/fee_juice_contract/src/main.nr","source":"mod lib;\n\ncontract FeeJuice {\n use dep::aztec::{\n protocol_types::{\n contract_class_id::ContractClassId, address::{AztecAddress, EthAddress},\n constants::{DEPLOYER_CONTRACT_ADDRESS, REGISTERER_CONTRACT_ADDRESS, FEE_JUICE_INITIAL_MINT}\n },\n state_vars::{SharedImmutable, PublicMutable, Map},\n oracle::get_contract_instance::get_contract_instance\n };\n\n use dep::deployer::ContractInstanceDeployer;\n use dep::registerer::ContractClassRegisterer;\n\n use crate::lib::get_bridge_gas_msg_hash;\n\n #[aztec(storage)]\n struct Storage {\n // This map is accessed directly by protocol circuits to check balances for fee payment.\n // Do not change this storage layout unless you also update the base rollup circuits.\n balances: Map<AztecAddress, PublicMutable<U128>>,\n portal_address: SharedImmutable<EthAddress>,\n }\n\n // Not flagged as initializer to reduce cost of checking init nullifier in all functions.\n // This function should be called as entrypoint to initialize the contract by minting itself funds.\n #[aztec(private)]\n fn deploy(\n artifact_hash: Field,\n private_functions_root: Field,\n public_bytecode_commitment: Field,\n portal_address: EthAddress\n ) {\n // Validate contract class parameters are correct\n let self = context.this_address();\n let instance = get_contract_instance(self);\n let contract_class_id = ContractClassId::compute(\n artifact_hash,\n private_functions_root,\n public_bytecode_commitment\n );\n assert(\n instance.contract_class_id == contract_class_id, \"Invalid contract class id computed for Fee Juice\"\n );\n\n // Increase self balance and set as fee payer, and end setup\n FeeJuice::at(self)._increase_public_balance(self, FEE_JUICE_INITIAL_MINT).enqueue(&mut context);\n context.set_as_fee_payer();\n context.end_setup();\n\n // Register class and publicly deploy contract\n let _register = ContractClassRegisterer::at(REGISTERER_CONTRACT_ADDRESS).register(\n artifact_hash,\n private_functions_root,\n public_bytecode_commitment\n ).call(&mut context);\n let _deploy = ContractInstanceDeployer::at(DEPLOYER_CONTRACT_ADDRESS).deploy(\n instance.salt,\n instance.contract_class_id,\n instance.initialization_hash,\n instance.public_keys_hash,\n true\n ).call(&mut context);\n\n // Enqueue call to set the portal address\n FeeJuice::at(self).set_portal(portal_address).enqueue(&mut context);\n }\n\n // We purposefully not set this function as an initializer so we do not bind\n // the contract to a specific L1 portal address, since the Fee Juice address\n // is a hardcoded constant in the rollup circuits.\n #[aztec(public)]\n fn set_portal(portal_address: EthAddress) {\n assert(storage.portal_address.read_public().is_zero());\n storage.portal_address.initialize(portal_address);\n }\n\n #[aztec(private)]\n fn claim(to: AztecAddress, amount: Field, secret: Field) {\n let content_hash = get_bridge_gas_msg_hash(to, amount);\n let portal_address = storage.portal_address.read_private();\n assert(!portal_address.is_zero());\n\n // Consume message and emit nullifier\n context.consume_l1_to_l2_message(content_hash, secret, portal_address);\n\n // TODO(palla/gas) Emit an unencrypted log to announce which L1 to L2 message has been claimed\n // Otherwise, we cannot trace L1 deposits to their corresponding claims on L2\n\n FeeJuice::at(context.this_address())._increase_public_balance(to, amount).enqueue(&mut context);\n }\n\n #[aztec(public)]\n #[aztec(internal)]\n fn _increase_public_balance(to: AztecAddress, amount: Field) {\n let new_balance = storage.balances.at(to).read().add(U128::from_integer(amount));\n storage.balances.at(to).write(new_balance);\n }\n\n #[aztec(public)]\n #[aztec(view)]\n fn check_balance(fee_limit: Field) {\n let fee_limit = U128::from_integer(fee_limit);\n assert(storage.balances.at(context.msg_sender()).read() >= fee_limit, \"Balance too low\");\n }\n\n // utility function for testing\n #[aztec(public)]\n #[aztec(view)]\n fn balance_of_public(owner: AztecAddress) -> pub Field {\n storage.balances.at(owner).read().to_field()\n }\n}\n"},"396":{"path":"/usr/src/noir-projects/noir-contracts/contracts/fee_juice_contract/src/lib.nr","source":"use dep::aztec::prelude::AztecAddress;\nuse dep::aztec::context::PublicContext;\nuse dep::aztec::protocol_types::hash::sha256_to_field;\n\npub fn calculate_fee<TPublicContext>(context: PublicContext) -> Field {\n context.transaction_fee()\n}\n\npub fn get_bridge_gas_msg_hash(owner: AztecAddress, amount: Field) -> Field {\n let mut hash_bytes = [0; 68];\n let recipient_bytes: [u8; 32] = owner.to_field().to_be_bytes();\n let amount_bytes: [u8; 32] = amount.to_be_bytes();\n\n for i in 0..32 {\n hash_bytes[i + 4] = recipient_bytes[i];\n hash_bytes[i + 36] = amount_bytes[i];\n }\n\n // Function selector: 0x63f44968 keccak256('claim(bytes32,uint256)')\n hash_bytes[0] = 0x63;\n hash_bytes[1] = 0xf4;\n hash_bytes[2] = 0x49;\n hash_bytes[3] = 0x68;\n\n let content_hash = sha256_to_field(hash_bytes);\n content_hash\n}\n"},"6":{"path":"std/cmp.nr","source":"use crate::meta::derive_via;\n\n#[derive_via(derive_eq)]\n// docs:start:eq-trait\ntrait Eq {\n fn eq(self, other: Self) -> bool;\n}\n// docs:end:eq-trait\n\n// docs:start:derive_eq\ncomptime fn derive_eq(s: StructDefinition) -> Quoted {\n let signature = quote { fn eq(_self: Self, _other: Self) -> bool };\n let for_each_field = |name| quote { (_self.$name == _other.$name) };\n let body = |fields| {\n if s.fields().len() == 0 {\n quote { true }\n } else {\n fields\n }\n };\n crate::meta::make_trait_impl(s, quote { Eq }, signature, for_each_field, quote { & }, body)\n}\n// docs:end:derive_eq\n\nimpl Eq for Field {\n fn eq(self, other: Field) -> bool {\n self == other\n }\n}\n\nimpl Eq for u64 {\n fn eq(self, other: u64) -> bool {\n self == other\n }\n}\nimpl Eq for u32 {\n fn eq(self, other: u32) -> bool {\n self == other\n }\n}\nimpl Eq for u16 {\n fn eq(self, other: u16) -> bool {\n self == other\n }\n}\nimpl Eq for u8 {\n fn eq(self, other: u8) -> bool {\n self == other\n }\n}\nimpl Eq for u1 {\n fn eq(self, other: u1) -> bool {\n self == other\n }\n}\n\nimpl Eq for i8 {\n fn eq(self, other: i8) -> bool {\n self == other\n }\n}\nimpl Eq for i16 {\n fn eq(self, other: i16) -> bool {\n self == other\n }\n}\nimpl Eq for i32 {\n fn eq(self, other: i32) -> bool {\n self == other\n }\n}\nimpl Eq for i64 {\n fn eq(self, other: i64) -> bool {\n self == other\n }\n}\n\nimpl Eq for () {\n fn eq(_self: Self, _other: ()) -> bool {\n true\n }\n}\nimpl Eq for bool {\n fn eq(self, other: bool) -> bool {\n self == other\n }\n}\n\nimpl<T, let N: u32> Eq for [T; N] where T: Eq {\n fn eq(self, other: [T; N]) -> bool {\n let mut result = true;\n for i in 0..self.len() {\n result &= self[i].eq(other[i]);\n }\n result\n }\n}\n\nimpl<T> Eq for [T] where T: Eq {\n fn eq(self, other: [T]) -> bool {\n let mut result = self.len() == other.len();\n for i in 0..self.len() {\n result &= self[i].eq(other[i]);\n }\n result\n }\n}\n\nimpl<let N: u32> Eq for str<N> {\n fn eq(self, other: str<N>) -> bool {\n let self_bytes = self.as_bytes();\n let other_bytes = other.as_bytes();\n self_bytes == other_bytes\n }\n}\n\nimpl<A, B> Eq for (A, B) where A: Eq, B: Eq {\n fn eq(self, other: (A, B)) -> bool {\n self.0.eq(other.0) & self.1.eq(other.1)\n }\n}\n\nimpl<A, B, C> Eq for (A, B, C) where A: Eq, B: Eq, C: Eq {\n fn eq(self, other: (A, B, C)) -> bool {\n self.0.eq(other.0) & self.1.eq(other.1) & self.2.eq(other.2)\n }\n}\n\nimpl<A, B, C, D> Eq for (A, B, C, D) where A: Eq, B: Eq, C: Eq, D: Eq {\n fn eq(self, other: (A, B, C, D)) -> bool {\n self.0.eq(other.0) & self.1.eq(other.1) & self.2.eq(other.2) & self.3.eq(other.3)\n }\n}\n\nimpl<A, B, C, D, E> Eq for (A, B, C, D, E) where A: Eq, B: Eq, C: Eq, D: Eq, E: Eq {\n fn eq(self, other: (A, B, C, D, E)) -> bool {\n self.0.eq(other.0)\n & self.1.eq(other.1)\n & self.2.eq(other.2)\n & self.3.eq(other.3)\n & self.4.eq(other.4)\n }\n}\n\nimpl Eq for Ordering {\n fn eq(self, other: Ordering) -> bool {\n self.result == other.result\n }\n}\n\n// Noir doesn't have enums yet so we emulate (Lt | Eq | Gt) with a struct\n// that has 3 public functions for constructing the struct.\nstruct Ordering {\n result: Field,\n}\n\nimpl Ordering {\n // Implementation note: 0, 1, and 2 for Lt, Eq, and Gt are built\n // into the compiler, do not change these without also updating\n // the compiler itself!\n pub fn less() -> Ordering {\n Ordering { result: 0 }\n }\n\n pub fn equal() -> Ordering {\n Ordering { result: 1 }\n }\n\n pub fn greater() -> Ordering {\n Ordering { result: 2 }\n }\n}\n\n#[derive_via(derive_ord)]\n// docs:start:ord-trait\ntrait Ord {\n fn cmp(self, other: Self) -> Ordering;\n}\n// docs:end:ord-trait\n\n// docs:start:derive_ord\ncomptime fn derive_ord(s: StructDefinition) -> Quoted {\n let signature = quote { fn cmp(_self: Self, _other: Self) -> std::cmp::Ordering };\n let for_each_field = |name| quote {\n if result == std::cmp::Ordering::equal() {\n result = _self.$name.cmp(_other.$name);\n }\n };\n let body = |fields| quote {\n let mut result = std::cmp::Ordering::equal();\n $fields\n result\n };\n crate::meta::make_trait_impl(s, quote { Ord }, signature, for_each_field, quote {}, body)\n}\n// docs:end:derive_ord\n\n// Note: Field deliberately does not implement Ord\n\nimpl Ord for u64 {\n fn cmp(self, other: u64) -> Ordering {\n if self < other {\n Ordering::less()\n } else if self > other {\n Ordering::greater()\n } else {\n Ordering::equal()\n }\n }\n}\n\nimpl Ord for u32 {\n fn cmp(self, other: u32) -> Ordering {\n if self < other {\n Ordering::less()\n } else if self > other {\n Ordering::greater()\n } else {\n Ordering::equal()\n }\n }\n}\n\nimpl Ord for u16 {\n fn cmp(self, other: u16) -> Ordering {\n if self < other {\n Ordering::less()\n } else if self > other {\n Ordering::greater()\n } else {\n Ordering::equal()\n }\n }\n}\n\nimpl Ord for u8 {\n fn cmp(self, other: u8) -> Ordering {\n if self < other {\n Ordering::less()\n } else if self > other {\n Ordering::greater()\n } else {\n Ordering::equal()\n }\n }\n}\n\nimpl Ord for i8 {\n fn cmp(self, other: i8) -> Ordering {\n if self < other {\n Ordering::less()\n } else if self > other {\n Ordering::greater()\n } else {\n Ordering::equal()\n }\n }\n}\n\nimpl Ord for i16 {\n fn cmp(self, other: i16) -> Ordering {\n if self < other {\n Ordering::less()\n } else if self > other {\n Ordering::greater()\n } else {\n Ordering::equal()\n }\n }\n}\n\nimpl Ord for i32 {\n fn cmp(self, other: i32) -> Ordering {\n if self < other {\n Ordering::less()\n } else if self > other {\n Ordering::greater()\n } else {\n Ordering::equal()\n }\n }\n}\n\nimpl Ord for i64 {\n fn cmp(self, other: i64) -> Ordering {\n if self < other {\n Ordering::less()\n } else if self > other {\n Ordering::greater()\n } else {\n Ordering::equal()\n }\n }\n}\n\nimpl Ord for () {\n fn cmp(_self: Self, _other: ()) -> Ordering {\n Ordering::equal()\n }\n}\n\nimpl Ord for bool {\n fn cmp(self, other: bool) -> Ordering {\n if self {\n if other {\n Ordering::equal()\n } else {\n Ordering::greater()\n }\n } else if other {\n Ordering::less()\n } else {\n Ordering::equal()\n }\n }\n}\n\nimpl<T, let N: u32> Ord for [T; N] where T: Ord {\n // The first non-equal element of both arrays determines\n // the ordering for the whole array.\n fn cmp(self, other: [T; N]) -> Ordering {\n let mut result = Ordering::equal();\n for i in 0..self.len() {\n if result == Ordering::equal() {\n let result_i = self[i].cmp(other[i]);\n\n if result_i == Ordering::less() {\n result = result_i;\n } else if result_i == Ordering::greater() {\n result = result_i;\n }\n }\n }\n result\n }\n}\n\nimpl<T> Ord for [T] where T: Ord {\n // The first non-equal element of both arrays determines\n // the ordering for the whole array.\n fn cmp(self, other: [T]) -> Ordering {\n let mut result = self.len().cmp(other.len());\n for i in 0..self.len() {\n if result == Ordering::equal() {\n let result_i = self[i].cmp(other[i]);\n\n if result_i == Ordering::less() {\n result = result_i;\n } else if result_i == Ordering::greater() {\n result = result_i;\n }\n }\n }\n result\n }\n}\n\nimpl<A, B> Ord for (A, B) where A: Ord, B: Ord {\n fn cmp(self, other: (A, B)) -> Ordering {\n let result = self.0.cmp(other.0);\n\n if result != Ordering::equal() {\n result\n } else {\n self.1.cmp(other.1)\n }\n }\n}\n\nimpl<A, B, C> Ord for (A, B, C) where A: Ord, B: Ord, C: Ord {\n fn cmp(self, other: (A, B, C)) -> Ordering {\n let mut result = self.0.cmp(other.0);\n\n if result == Ordering::equal() {\n result = self.1.cmp(other.1);\n }\n\n if result == Ordering::equal() {\n result = self.2.cmp(other.2);\n }\n\n result\n }\n}\n\nimpl<A, B, C, D> Ord for (A, B, C, D) where A: Ord, B: Ord, C: Ord, D: Ord {\n fn cmp(self, other: (A, B, C, D)) -> Ordering {\n let mut result = self.0.cmp(other.0);\n\n if result == Ordering::equal() {\n result = self.1.cmp(other.1);\n }\n\n if result == Ordering::equal() {\n result = self.2.cmp(other.2);\n }\n\n if result == Ordering::equal() {\n result = self.3.cmp(other.3);\n }\n\n result\n }\n}\n\nimpl<A, B, C, D, E> Ord for (A, B, C, D, E) where A: Ord, B: Ord, C: Ord, D: Ord, E: Ord {\n fn cmp(self, other: (A, B, C, D, E)) -> Ordering {\n let mut result = self.0.cmp(other.0);\n\n if result == Ordering::equal() {\n result = self.1.cmp(other.1);\n }\n\n if result == Ordering::equal() {\n result = self.2.cmp(other.2);\n }\n\n if result == Ordering::equal() {\n result = self.3.cmp(other.3);\n }\n\n if result == Ordering::equal() {\n result = self.4.cmp(other.4);\n }\n\n result\n }\n}\n\n// Compares and returns the maximum of two values.\n//\n// Returns the second argument if the comparison determines them to be equal.\n//\n// # Examples\n//\n// ```\n// use std::cmp;\n//\n// assert_eq(cmp::max(1, 2), 2);\n// assert_eq(cmp::max(2, 2), 2);\n// ```\npub fn max<T>(v1: T, v2: T) -> T where T: Ord {\n if v1 > v2 { v1 } else { v2 }\n}\n\n// Compares and returns the minimum of two values.\n//\n// Returns the first argument if the comparison determines them to be equal.\n//\n// # Examples\n//\n// ```\n// use std::cmp;\n//\n// assert_eq(cmp::min(1, 2), 1);\n// assert_eq(cmp::min(2, 2), 2);\n// ```\npub fn min<T>(v1: T, v2: T) -> T where T: Ord {\n if v1 > v2 { v2 } else { v1 }\n}\n\nmod cmp_tests {\n use crate::cmp::{min, max};\n\n #[test]\n fn sanity_check_min() {\n assert_eq(min(0 as u64, 1 as u64), 0);\n assert_eq(min(0 as u64, 0 as u64), 0);\n assert_eq(min(1 as u64, 1 as u64), 1);\n assert_eq(min(255 as u8, 0 as u8), 0);\n }\n\n #[test]\n fn sanity_check_max() {\n assert_eq(max(0 as u64, 1 as u64), 1);\n assert_eq(max(0 as u64, 0 as u64), 0);\n assert_eq(max(1 as u64, 1 as u64), 1);\n assert_eq(max(255 as u8, 0 as u8), 255);\n }\n}\n"},"67":{"path":"std/uint128.nr","source":"use crate::ops::{Add, Sub, Mul, Div, Rem, Not, BitOr, BitAnd, BitXor, Shl, Shr};\nuse crate::cmp::{Eq, Ord, Ordering};\n\nglobal pow64 : Field = 18446744073709551616; //2^64;\nglobal pow63 : Field = 9223372036854775808; // 2^63;\nstruct U128 {\n lo: Field,\n hi: Field,\n}\n\nimpl U128 {\n\n pub fn from_u64s_le(lo: u64, hi: u64) -> U128 {\n // in order to handle multiplication, we need to represent the product of two u64 without overflow\n assert(crate::field::modulus_num_bits() as u32 > 128);\n U128 { lo: lo as Field, hi: hi as Field }\n }\n\n pub fn from_u64s_be(hi: u64, lo: u64) -> U128 {\n U128::from_u64s_le(lo, hi)\n }\n\n pub fn zero() -> U128 {\n U128 { lo: 0, hi: 0 }\n }\n\n pub fn one() -> U128 {\n U128 { lo: 1, hi: 0 }\n }\n pub fn from_le_bytes(bytes: [u8; 16]) -> U128 {\n let mut lo = 0;\n let mut base = 1;\n for i in 0..8 {\n lo += (bytes[i] as Field)*base;\n base *= 256;\n }\n let mut hi = 0;\n base = 1;\n for i in 8..16 {\n hi += (bytes[i] as Field)*base;\n base *= 256;\n }\n U128 { lo, hi }\n }\n\n pub fn to_be_bytes(self: Self) -> [u8; 16] {\n let lo: [u8; 8] = self.lo.to_be_bytes();\n let hi: [u8; 8] = self.hi.to_be_bytes();\n let mut bytes = [0; 16];\n for i in 0..8 {\n bytes[i] = hi[i];\n bytes[i+8] = lo[i];\n }\n bytes\n }\n\n pub fn to_le_bytes(self: Self) -> [u8; 16] {\n let lo: [u8; 8] = self.lo.to_le_bytes();\n let hi: [u8; 8] = self.hi.to_le_bytes();\n let mut bytes = [0; 16];\n for i in 0..8 {\n bytes[i] = lo[i];\n bytes[i+8] = hi[i];\n }\n bytes\n }\n\n pub fn from_hex<let N: u32>(hex: str<N>) -> U128 {\n let N = N as u32;\n let bytes = hex.as_bytes();\n // string must starts with \"0x\"\n assert((bytes[0] == 48) & (bytes[1] == 120), \"Invalid hexadecimal string\");\n assert(N < 35, \"Input does not fit into a U128\");\n\n let mut lo = 0;\n let mut hi = 0;\n let mut base = 1;\n if N <= 18 {\n for i in 0..N - 2 {\n lo += U128::decode_ascii(bytes[N-i-1])*base;\n base = base*16;\n }\n } else {\n for i in 0..16 {\n lo += U128::decode_ascii(bytes[N-i-1])*base;\n base = base*16;\n }\n base = 1;\n for i in 17..N - 1 {\n hi += U128::decode_ascii(bytes[N-i])*base;\n base = base*16;\n }\n }\n U128 { lo: lo as Field, hi: hi as Field }\n }\n\n unconstrained fn uconstrained_check_is_upper_ascii(ascii: u8) -> bool {\n ((ascii >= 65) & (ascii <= 90)) // Between 'A' and 'Z'\n }\n\n fn decode_ascii(ascii: u8) -> Field {\n (if ascii < 58 {\n ascii - 48\n } else {\n let ascii = ascii + 32 * (unsafe {\n U128::uconstrained_check_is_upper_ascii(ascii) as u8\n });\n assert(ascii >= 97); // enforce >= 'a'\n assert(ascii <= 102); // enforce <= 'f'\n ascii - 87\n }) as Field\n }\n\n // TODO: Replace with a faster version. \n // A circuit that uses this function can be slow to compute\n // (we're doing up to 127 calls to compute the quotient)\n unconstrained fn unconstrained_div(self: Self, b: U128) -> (U128, U128) {\n if b == U128::zero() {\n // Return 0,0 to avoid eternal loop\n (U128::zero(), U128::zero())\n } else if self < b {\n (U128::zero(), self)\n } else if self == b {\n (U128::one(), U128::zero())\n } else {\n let (q,r) = if b.hi as u64 >= pow63 as u64 {\n // The result of multiplication by 2 would overflow\n (U128::zero(), self)\n } else {\n self.unconstrained_div(b * U128::from_u64s_le(2, 0))\n };\n let q_mul_2 = q * U128::from_u64s_le(2, 0);\n if r < b {\n (q_mul_2, r)\n } else {\n (q_mul_2 + U128::one(), r - b)\n }\n }\n }\n\n pub fn from_integer<T>(i: T) -> U128 {\n let f = crate::as_field(i);\n // Reject values which would overflow a u128\n f.assert_max_bit_size(128);\n let lo = f as u64 as Field;\n let hi = (f - lo) / pow64;\n U128 { lo, hi }\n }\n\n pub fn to_integer<T>(self) -> T {\n crate::from_field(self.lo + self.hi * pow64)\n }\n\n fn wrapping_mul(self: Self, b: U128) -> U128 {\n let low = self.lo * b.lo;\n let lo = low as u64 as Field;\n let carry = (low - lo) / pow64;\n let high = self.lo * b.hi + self.hi * b.lo + carry;\n let hi = high as u64 as Field;\n U128 { lo, hi }\n }\n}\n\nimpl Add for U128 {\n fn add(self: Self, b: U128) -> U128 {\n let low = self.lo + b.lo;\n let lo = low as u64 as Field;\n let carry = (low - lo) / pow64;\n let high = self.hi + b.hi + carry;\n let hi = high as u64 as Field;\n assert(hi == high, \"attempt to add with overflow\");\n U128 { lo, hi }\n }\n}\n\nimpl Sub for U128 {\n fn sub(self: Self, b: U128) -> U128 {\n let low = pow64 + self.lo - b.lo;\n let lo = low as u64 as Field;\n let borrow = (low == lo) as Field;\n let high = self.hi - b.hi - borrow;\n let hi = high as u64 as Field;\n assert(hi == high, \"attempt to subtract with underflow\");\n U128 { lo, hi }\n }\n}\n\nimpl Mul for U128 {\n fn mul(self: Self, b: U128) -> U128 {\n assert(self.hi * b.hi == 0, \"attempt to multiply with overflow\");\n let low = self.lo * b.lo;\n let lo = low as u64 as Field;\n let carry = (low - lo) / pow64;\n let high = if crate::field::modulus_num_bits() as u32 > 196 {\n (self.lo + self.hi) * (b.lo + b.hi) - low + carry\n } else {\n self.lo * b.hi + self.hi * b.lo + carry\n };\n let hi = high as u64 as Field;\n assert(hi == high, \"attempt to multiply with overflow\");\n U128 { lo, hi }\n }\n}\n\nimpl Div for U128 {\n fn div(self: Self, b: U128) -> U128 {\n unsafe {\n let (q,r) = self.unconstrained_div(b);\n let a = b * q + r;\n assert_eq(self, a);\n assert(r < b);\n q\n }\n }\n}\n\nimpl Rem for U128 {\n fn rem(self: Self, b: U128) -> U128 {\n unsafe {\n let (q,r) = self.unconstrained_div(b);\n let a = b * q + r;\n assert_eq(self, a);\n assert(r < b);\n\n r\n }\n }\n}\n\nimpl Eq for U128 {\n fn eq(self: Self, b: U128) -> bool {\n (self.lo == b.lo) & (self.hi == b.hi)\n }\n}\n\nimpl Ord for U128 {\n fn cmp(self, other: Self) -> Ordering {\n let hi_ordering = (self.hi as u64).cmp((other.hi as u64));\n let lo_ordering = (self.lo as u64).cmp((other.lo as u64));\n\n if hi_ordering == Ordering::equal() {\n lo_ordering\n } else {\n hi_ordering\n }\n }\n}\n\nimpl Not for U128 {\n fn not(self) -> U128 {\n U128 { lo: (!(self.lo as u64)) as Field, hi: (!(self.hi as u64)) as Field }\n }\n}\n\nimpl BitOr for U128 {\n fn bitor(self, other: U128) -> U128 {\n U128 {\n lo: ((self.lo as u64) | (other.lo as u64)) as Field,\n hi: ((self.hi as u64) | (other.hi as u64)) as Field\n }\n }\n}\n\nimpl BitAnd for U128 {\n fn bitand(self, other: U128) -> U128 {\n U128 {\n lo: ((self.lo as u64) & (other.lo as u64)) as Field,\n hi: ((self.hi as u64) & (other.hi as u64)) as Field\n }\n }\n}\n\nimpl BitXor for U128 {\n fn bitxor(self, other: U128) -> U128 {\n U128 {\n lo: ((self.lo as u64) ^ (other.lo as u64)) as Field,\n hi: ((self.hi as u64) ^ (other.hi as u64)) as Field\n }\n }\n}\n\nimpl Shl for U128 {\n fn shl(self, other: u8) -> U128 {\n assert(other < 128, \"attempt to shift left with overflow\");\n let exp_bits: [u1; 7] = (other as Field).to_be_bits();\n\n let mut r: Field = 2;\n let mut y: Field = 1;\n for i in 1..8 {\n let bit = exp_bits[7 - i] as Field;\n y = bit * (r * y) + (1 - bit) * y;\n r *= r;\n }\n self.wrapping_mul(U128::from_integer(y))\n }\n}\n\nimpl Shr for U128 {\n fn shr(self, other: u8) -> U128 {\n assert(other < 128, \"attempt to shift right with overflow\");\n let exp_bits: [u1; 7] = (other as Field).to_be_bits();\n\n let mut r: Field = 2;\n let mut y: Field = 1;\n for i in 1..8 {\n let bit = exp_bits[7 - i] as Field;\n y = bit * (r * y) + (1 - bit) * y;\n r *= r;\n }\n self / U128::from_integer(y)\n }\n}\n\nmod tests {\n use crate::uint128::{U128, pow64, pow63};\n\n #[test]\n fn test_not(lo: u64, hi: u64) {\n let num = U128::from_u64s_le(lo, hi);\n let not_num = num.not();\n\n assert_eq(not_num.hi, (hi.not() as Field));\n assert_eq(not_num.lo, (lo.not() as Field));\n\n let not_not_num = not_num.not();\n assert_eq(num, not_not_num);\n }\n #[test]\n fn test_construction() {\n // Check little-endian u64 is inversed with big-endian u64 construction\n let a = U128::from_u64s_le(2, 1);\n let b = U128::from_u64s_be(1, 2);\n assert_eq(a, b);\n // Check byte construction is equivalent\n let c = U128::from_le_bytes([0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15]);\n let d = U128::from_u64s_le(0x0706050403020100, 0x0f0e0d0c0b0a0908);\n assert_eq(c, d);\n }\n #[test]\n fn test_byte_decomposition() {\n let a = U128::from_u64s_le(0x0706050403020100, 0x0f0e0d0c0b0a0908);\n // Get big-endian and little-endian byte decompostions\n let le_bytes_a= a.to_le_bytes();\n let be_bytes_a= a.to_be_bytes();\n\n // Check equivalence\n for i in 0..16 {\n assert_eq(le_bytes_a[i], be_bytes_a[15 - i]);\n }\n // Reconstruct U128 from byte decomposition\n let b= U128::from_le_bytes(le_bytes_a);\n // Check that it's the same element\n assert_eq(a, b);\n }\n #[test]\n fn test_hex_constuction() {\n let a = U128::from_u64s_le(0x1, 0x2);\n let b = U128::from_hex(\"0x20000000000000001\");\n assert_eq(a, b);\n\n let c= U128::from_hex(\"0xffffffffffffffffffffffffffffffff\");\n let d= U128::from_u64s_le(0xffffffffffffffff, 0xffffffffffffffff);\n assert_eq(c, d);\n\n let e= U128::from_hex(\"0x00000000000000000000000000000000\");\n let f= U128::from_u64s_le(0, 0);\n assert_eq(e, f);\n }\n\n // Ascii decode tests\n\n #[test]\n fn test_ascii_decode_correct_range() {\n // '0'..'9' range\n for i in 0..10 {\n let decoded= U128::decode_ascii(48 + i);\n assert_eq(decoded, i as Field);\n }\n // 'A'..'F' range\n for i in 0..6 {\n let decoded = U128::decode_ascii(65 + i);\n assert_eq(decoded, (i + 10) as Field);\n }\n // 'a'..'f' range\n for i in 0..6 {\n let decoded = U128::decode_ascii(97 + i);\n assert_eq(decoded, (i + 10) as Field);\n }\n }\n\n #[test(should_fail)]\n fn test_ascii_decode_range_less_than_48_fails_0() {\n crate::println(U128::decode_ascii(0));\n }\n #[test(should_fail)]\n fn test_ascii_decode_range_less_than_48_fails_1() {\n crate::println(U128::decode_ascii(47));\n }\n\n #[test(should_fail)]\n fn test_ascii_decode_range_58_64_fails_0() {\n let _ = U128::decode_ascii(58);\n }\n #[test(should_fail)]\n fn test_ascii_decode_range_58_64_fails_1() {\n let _ = U128::decode_ascii(64);\n }\n #[test(should_fail)]\n fn test_ascii_decode_range_71_96_fails_0() {\n let _ = U128::decode_ascii(71);\n }\n #[test(should_fail)]\n fn test_ascii_decode_range_71_96_fails_1() {\n let _ = U128::decode_ascii(96);\n }\n #[test(should_fail)]\n fn test_ascii_decode_range_greater_than_102_fails() {\n let _ = U128::decode_ascii(103);\n }\n\n #[test(should_fail)]\n fn test_ascii_decode_regression() {\n // This code will actually fail because of ascii_decode,\n // but in the past it was possible to create a value > (1<<128)\n let a = U128::from_hex(\"0x~fffffffffffffffffffffffffffffff\");\n let b:Field= a.to_integer();\n let c: [u8; 17]= b.to_le_bytes();\n assert(c[16] != 0);\n }\n\n #[test]\n fn test_unconstrained_div() {\n // Test the potential overflow case\n let a= U128::from_u64s_le(0x0, 0xffffffffffffffff);\n let b= U128::from_u64s_le(0x0, 0xfffffffffffffffe);\n let c= U128::one();\n let d= U128::from_u64s_le(0x0, 0x1);\n unsafe {\n let (q,r) = a.unconstrained_div(b);\n assert_eq(q, c);\n assert_eq(r, d);\n }\n\n let a = U128::from_u64s_le(2, 0);\n let b = U128::one();\n // Check the case where a is a multiple of b\n unsafe {\n let (c, d) = a.unconstrained_div(b);\n assert_eq((c, d), (a, U128::zero()));\n }\n\n // Check where b is a multiple of a\n unsafe {\n let (c,d) = b.unconstrained_div(a);\n assert_eq((c, d), (U128::zero(), b));\n }\n\n // Dividing by zero returns 0,0\n let a = U128::from_u64s_le(0x1, 0x0);\n let b = U128::zero();\n unsafe {\n let (c, d)= a.unconstrained_div(b);\n assert_eq((c, d), (U128::zero(), U128::zero()));\n }\n // Dividing 1<<127 by 1<<127 (special case)\n let a = U128::from_u64s_le(0x0, pow63 as u64);\n let b = U128::from_u64s_le(0x0, pow63 as u64);\n unsafe {\n let (c, d) = a.unconstrained_div(b);\n assert_eq((c, d), (U128::one(), U128::zero()));\n }\n }\n\n #[test]\n fn integer_conversions() {\n // Maximum\n let start:Field = 0xffffffffffffffffffffffffffffffff;\n let a = U128::from_integer(start);\n let end = a.to_integer();\n assert_eq(start, end);\n\n // Minimum\n let start:Field = 0x0;\n let a = U128::from_integer(start);\n let end = a.to_integer();\n assert_eq(start, end);\n\n // Low limb\n let start:Field = 0xffffffffffffffff;\n let a = U128::from_integer(start);\n let end = a.to_integer();\n assert_eq(start, end);\n\n // High limb\n let start:Field = 0xffffffffffffffff0000000000000000;\n let a = U128::from_integer(start);\n let end = a.to_integer();\n assert_eq(start, end);\n }\n\n #[test]\n fn integer_conversions_fuzz(lo: u64, hi: u64) {\n let start: Field = (lo as Field) + pow64 * (hi as Field);\n let a = U128::from_integer(start);\n let end = a.to_integer();\n assert_eq(start, end);\n }\n\n #[test]\n fn test_wrapping_mul() {\n // 1*0==0\n assert_eq(U128::zero(), U128::zero().wrapping_mul(U128::one()));\n\n // 0*1==0\n assert_eq(U128::zero(), U128::one().wrapping_mul(U128::zero()));\n\n // 1*1==1\n assert_eq(U128::one(), U128::one().wrapping_mul(U128::one()));\n\n // 0 * ( 1 << 64 ) == 0\n assert_eq(U128::zero(), U128::zero().wrapping_mul(U128::from_u64s_le(0, 1)));\n\n // ( 1 << 64 ) * 0 == 0\n assert_eq(U128::zero(), U128::from_u64s_le(0, 1).wrapping_mul(U128::zero()));\n\n // 1 * ( 1 << 64 ) == 1 << 64\n assert_eq(U128::from_u64s_le(0, 1), U128::from_u64s_le(0, 1).wrapping_mul(U128::one()));\n\n // ( 1 << 64 ) * 1 == 1 << 64\n assert_eq(U128::from_u64s_le(0, 1), U128::one().wrapping_mul(U128::from_u64s_le(0, 1)));\n\n // ( 1 << 64 ) * ( 1 << 64 ) == 1 << 64\n assert_eq(U128::zero(), U128::from_u64s_le(0, 1).wrapping_mul(U128::from_u64s_le(0, 1)));\n // -1 * -1 == 1\n assert_eq(\n U128::one(), U128::from_u64s_le(0xffffffffffffffff, 0xffffffffffffffff).wrapping_mul(U128::from_u64s_le(0xffffffffffffffff, 0xffffffffffffffff))\n );\n }\n}\n"}}}
|
|
1
|
+
{"transpiled":true,"noir_version":"0.34.0+e0185e75e65df08b5334856f8bf63fa3aed7049a","name":"FeeJuice","functions":[{"name":"compute_note_hash_and_optionally_a_nullifier","is_unconstrained":true,"custom_attributes":[],"abi":{"error_types":{},"parameters":[{"name":"contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"},"visibility":"private"},{"name":"nonce","type":{"kind":"field"},"visibility":"private"},{"name":"storage_slot","type":{"kind":"field"},"visibility":"private"},{"name":"note_type_id","type":{"kind":"field"},"visibility":"private"},{"name":"compute_nullifier","type":{"kind":"boolean"},"visibility":"private"},{"name":"serialized_note","type":{"kind":"array","length":0,"type":{"kind":"field"}},"visibility":"private"}],"return_type":{"abi_type":{"kind":"array","length":4,"type":{"kind":"field"}},"visibility":"public"}},"bytecode":"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","debug_symbols":"lZDBCoMwEET/Zc85FE0V/ZVSJNFEFsJGklgoIf/etXrwmssyszPvMhkWo/d1QrI+wvjK4PysEnpil4sAHdA5XKf7Gx7Hkc2/HzdFh41JhQRj2/UCDC2s+oZ5i86wHobyFiDbekTWI896pKtECtuPCqi0M9dSdqf5Nlz6bmfC5R8=","brillig_names":["compute_note_hash_and_optionally_a_nullifier"]},{"name":"_increase_public_balance","is_unconstrained":true,"custom_attributes":["aztec(public)","aztec(internal)"],"abi":{"error_types":{},"parameters":[{"name":"inputs","type":{"fields":[{"name":"calldata_length","type":{"kind":"field"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"aztec::context::inputs::public_context_inputs::PublicContextInputs"},"visibility":"private"},{"name":"to","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"},"visibility":"private"},{"name":"amount","type":{"kind":"field"},"visibility":"private"}],"return_type":null},"bytecode":"H4sIAAAAAAAC/41UvW4UMRAe/6w9/lnvXkWKA6VFOsgdgj1BQQEhVyAKCh6BR6BAghegRJT0SBQIiR5R56Xg+3ajKKTKSvZ6xjPfN54ZeyvO2J04PYhsxfmISfSu4FOMiN/z2xL0VE9fU3e6DLEYZo9NcXtqPOYX0mE+k3Afm/0ZzQ8EmmYsB5/JOr0qeUp+kbZiRCer/qoqiIOPPyaMv8M5ZQk+5Xsix5IPhlEHQ5+EyF2mY5atcSZhmWyeJBcQFUjFYtWV7WzCzYql7V+BjQqBjVSGDoriQGSS9iB6ID2JyHEROGzoWinWma3Hsrd1ktoQMEafwBw38jSLi5lMhlhfpG7k2WTSEhDyi902mZbWElJ5hBNf+/5e+yQ2hBcbwF5KY2Br8amsqbTAiOXhJYi5REmK/dRgFW5EMpBkGEHyRsYLkjCTDCAJQ5nxgBPiALUvcc2lpUHEXuQBQwuRFiVcekfkNoYC3LdSLrIaWDnmAxVgLoHqAmolBXn0DVKzWHVt1jdmfvyvaNiQcS5ah6J16gD/ThzhPUNBv4VBWRAk/z0KUrPC5KPoRj6cIKxKi6KRvUl4RoAkMRj2qtowSegmmzrWsatA6DwQPok/zDmGCXvW124yXXhCVViuj6t9aJhDhP1nicuZAwNBF1RmrZG8DY/pNfA4JBlBEscVnL7Kik57NKe6HRtQPW/Yd1y2jg5usCvMqzhOto3sqL6CMlb2yLelRyY74PyVDbk36jQUxBwAxbB+KPQ/Aee028ifPW9uZ8AkilPt5kXq4ZDUa74lRrNmvgr4za9CXsbyKgDwt2a4Kx0K6IoqxW4WraoWignsaSO/dsYBkcQnezk6Pzr/Bxp3x0aUBAAA","debug_symbols":"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","brillig_names":["_increase_public_balance"],"assert_messages":{"74":"call to assert_max_bit_size","116":"Storage slot 0 not allowed. Storage slots must start from 1.","49":"Storage slot 0 not allowed. Storage slots must start from 1.","84":"call to assert_max_bit_size","145":"attempt to add with overflow","155":"Array index out of bounds","100":"attempt to add with overflow","31":"Function _increase_public_balance can only be called internally","137":"Array index out of bounds","166":"attempt to add with overflow"}},{"name":"set_portal","is_unconstrained":true,"custom_attributes":["aztec(public)"],"abi":{"error_types":{},"parameters":[{"name":"inputs","type":{"fields":[{"name":"calldata_length","type":{"kind":"field"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"aztec::context::inputs::public_context_inputs::PublicContextInputs"},"visibility":"private"},{"name":"portal_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::eth_address::EthAddress"},"visibility":"private"}],"return_type":null},"bytecode":"H4sIAAAAAAAC/22Tv24TQRDGv/3jvbnbPbekCDVCMsRGyppAiQl0KBJCghegRDwBJaKkRUiUVDRIFAiJnvAOvAp8356dhCgn7fpmvDPfb+ZmlwjOrxDsGFgihMQN3U3w6bgSYA+uI9nGNie0bTMteC635p8Ia3ki94eY3aa7HOugNtSWJfB09aG7aMUL1hIO8bIrXXbxLRDOm0zD0gUX+EpHhfU820tD+KEipAVuDPwJxlS+p9sNt4BPsAUW1XUsLCSfuedQqivdPlKXDlXw+fP3igd5jpRyYbJDlEcOGBgZM+27yLL/Q85ClhgzC7kp+lSRCpG5MksMhNqQ1kK6g3T/w6mH8r0Dq3h8Blu4lzBWN3ZNMvHIE6RJUilOWoqO7tfoFng6eZ+deV/I+/yAlRoBU98loQowCjA2QKF3PlbEXP1M+C4XZmgVv5wqbkcajuXqcrwnV5zGJdgQ59wb3qsdXhTITjh3KhP48wX6vlEEyobSCAQTfakoY/XdKIJRBOOcGd9gviWIfs59bmpIaQTljKCIoIjg7Y6gqEHqpSiKKMp4pKhRkedlSuT9JLLmKQsrfUqLmuxvHPKZAsK4FWePSm6SSZJJTfo4Nan6kdUlfVrK2r6mRl3P5WgH27rbUzb1IwM/Y9zK2hWyrd++iSeOeu41FINRNpmm5et2+nyhrGn+186IlMXFVJqA78YJ+MF0wWYL/F7ros4clWDs+qq99CMDeos2XIOzwQZdf/606z9Ma7r+TPjLBqfxYkCmXDaTOWumN7Mss6d6v8DPFS+sa8IHa+yd7p3+A4bth2R9BAAA","debug_symbols":"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","brillig_names":["set_portal"],"assert_messages":{"144":"Array index out of bounds","166":"Array index out of bounds","52":"call to assert_max_bit_size","177":"attempt to add with overflow","78":"SharedImmutable already initialized","110":"attempt to add with overflow","126":"Array index out of bounds","155":"attempt to add with overflow","102":"Array index out of bounds","134":"attempt to add with overflow"}},{"name":"deploy","is_unconstrained":false,"custom_attributes":["aztec(private)"],"abi":{"error_types":{},"parameters":[{"name":"inputs","type":{"fields":[{"name":"call_context","type":{"fields":[{"name":"msg_sender","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"storage_contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"function_selector","type":{"fields":[{"name":"inner","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"}},{"name":"is_delegate_call","type":{"kind":"boolean"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::call_context::CallContext"}},{"name":"historical_header","type":{"fields":[{"name":"last_archive","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"content_commitment","type":{"fields":[{"name":"num_txs","type":{"kind":"field"}},{"name":"txs_effects_hash","type":{"kind":"field"}},{"name":"in_hash","type":{"kind":"field"}},{"name":"out_hash","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::content_commitment::ContentCommitment"}},{"name":"state","type":{"fields":[{"name":"l1_to_l2_message_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"partial","type":{"fields":[{"name":"note_hash_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"nullifier_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"public_data_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}}],"kind":"struct","path":"authwit::aztec::protocol_types::partial_state_reference::PartialStateReference"}}],"kind":"struct","path":"authwit::aztec::protocol_types::state_reference::StateReference"}},{"name":"global_variables","type":{"fields":[{"name":"chain_id","type":{"kind":"field"}},{"name":"version","type":{"kind":"field"}},{"name":"block_number","type":{"kind":"field"}},{"name":"slot_number","type":{"kind":"field"}},{"name":"timestamp","type":{"kind":"integer","sign":"unsigned","width":64}},{"name":"coinbase","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::eth_address::EthAddress"}},{"name":"fee_recipient","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"gas_fees","type":{"fields":[{"name":"fee_per_da_gas","type":{"kind":"field"}},{"name":"fee_per_l2_gas","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_fees::GasFees"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::global_variables::GlobalVariables"}},{"name":"total_fees","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::header::Header"}},{"name":"tx_context","type":{"fields":[{"name":"chain_id","type":{"kind":"field"}},{"name":"version","type":{"kind":"field"}},{"name":"gas_settings","type":{"fields":[{"name":"gas_limits","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"teardown_gas_limits","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"max_fees_per_gas","type":{"fields":[{"name":"fee_per_da_gas","type":{"kind":"field"}},{"name":"fee_per_l2_gas","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_fees::GasFees"}},{"name":"inclusion_fee","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_settings::GasSettings"}}],"kind":"struct","path":"authwit::aztec::protocol_types::transaction::tx_context::TxContext"}},{"name":"start_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"aztec::context::inputs::private_context_inputs::PrivateContextInputs"},"visibility":"private"},{"name":"artifact_hash","type":{"kind":"field"},"visibility":"private"},{"name":"private_functions_root","type":{"kind":"field"},"visibility":"private"},{"name":"public_bytecode_commitment","type":{"kind":"field"},"visibility":"private"},{"name":"portal_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::eth_address::EthAddress"},"visibility":"private"}],"return_type":{"abi_type":{"fields":[{"name":"call_context","type":{"fields":[{"name":"msg_sender","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"storage_contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"function_selector","type":{"fields":[{"name":"inner","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"}},{"name":"is_delegate_call","type":{"kind":"boolean"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::call_context::CallContext"}},{"name":"args_hash","type":{"kind":"field"}},{"name":"returns_hash","type":{"kind":"field"}},{"name":"min_revertible_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"is_fee_payer","type":{"kind":"boolean"}},{"name":"max_block_number","type":{"fields":[{"name":"_opt","type":{"fields":[{"name":"_is_some","type":{"kind":"boolean"}},{"name":"_value","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"std::option::Option"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::max_block_number::MaxBlockNumber"}},{"name":"note_hash_read_requests","type":{"kind":"array","length":16,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::read_request::ReadRequest"}}},{"name":"nullifier_read_requests","type":{"kind":"array","length":16,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::read_request::ReadRequest"}}},{"name":"key_validation_requests_and_generators","type":{"kind":"array","length":16,"type":{"fields":[{"name":"request","type":{"fields":[{"name":"pk_m","type":{"fields":[{"name":"x","type":{"kind":"field"}},{"name":"y","type":{"kind":"field"}},{"name":"is_infinite","type":{"kind":"boolean"}}],"kind":"struct","path":"std::embedded_curve_ops::EmbeddedCurvePoint"}},{"name":"sk_app","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::validation_requests::key_validation_request::KeyValidationRequest"}},{"name":"sk_app_generator","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::validation_requests::key_validation_request_and_generator::KeyValidationRequestAndGenerator"}}},{"name":"note_hashes","type":{"kind":"array","length":16,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::note_hash::NoteHash"}}},{"name":"nullifiers","type":{"kind":"array","length":16,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"note_hash","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::nullifier::Nullifier"}}},{"name":"private_call_requests","type":{"kind":"array","length":4,"type":{"fields":[{"name":"contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"call_context","type":{"fields":[{"name":"msg_sender","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"storage_contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"function_selector","type":{"fields":[{"name":"inner","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"}},{"name":"is_delegate_call","type":{"kind":"boolean"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::call_context::CallContext"}},{"name":"args_hash","type":{"kind":"field"}},{"name":"returns_hash","type":{"kind":"field"}},{"name":"start_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"end_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::private_call_request::PrivateCallRequest"}}},{"name":"public_call_requests","type":{"kind":"array","length":16,"type":{"fields":[{"name":"item","type":{"fields":[{"name":"contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"call_context","type":{"fields":[{"name":"msg_sender","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"storage_contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"function_selector","type":{"fields":[{"name":"inner","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"}},{"name":"is_delegate_call","type":{"kind":"boolean"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::call_context::CallContext"}},{"name":"args_hash","type":{"kind":"field"}},{"name":"returns_hash","type":{"kind":"field"}},{"name":"revert_code","type":{"kind":"integer","sign":"unsigned","width":8}},{"name":"start_gas_left","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"end_gas_left","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::public_call_stack_item_compressed::PublicCallStackItemCompressed"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::public_call_request::PublicCallRequest"}}},{"name":"public_teardown_call_request","type":{"fields":[{"name":"item","type":{"fields":[{"name":"contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"call_context","type":{"fields":[{"name":"msg_sender","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"storage_contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"function_selector","type":{"fields":[{"name":"inner","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"}},{"name":"is_delegate_call","type":{"kind":"boolean"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::call_context::CallContext"}},{"name":"args_hash","type":{"kind":"field"}},{"name":"returns_hash","type":{"kind":"field"}},{"name":"revert_code","type":{"kind":"integer","sign":"unsigned","width":8}},{"name":"start_gas_left","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"end_gas_left","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::public_call_stack_item_compressed::PublicCallStackItemCompressed"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::public_call_request::PublicCallRequest"}},{"name":"l2_to_l1_msgs","type":{"kind":"array","length":2,"type":{"fields":[{"name":"recipient","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::eth_address::EthAddress"}},{"name":"content","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::messaging::l2_to_l1_message::L2ToL1Message"}}},{"name":"start_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"end_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"note_encrypted_logs_hashes","type":{"kind":"array","length":16,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"length","type":{"kind":"field"}},{"name":"note_hash_counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::log_hash::NoteLogHash"}}},{"name":"encrypted_logs_hashes","type":{"kind":"array","length":4,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"length","type":{"kind":"field"}},{"name":"randomness","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::log_hash::EncryptedLogHash"}}},{"name":"unencrypted_logs_hashes","type":{"kind":"array","length":4,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"length","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::log_hash::LogHash"}}},{"name":"historical_header","type":{"fields":[{"name":"last_archive","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"content_commitment","type":{"fields":[{"name":"num_txs","type":{"kind":"field"}},{"name":"txs_effects_hash","type":{"kind":"field"}},{"name":"in_hash","type":{"kind":"field"}},{"name":"out_hash","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::content_commitment::ContentCommitment"}},{"name":"state","type":{"fields":[{"name":"l1_to_l2_message_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"partial","type":{"fields":[{"name":"note_hash_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"nullifier_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"public_data_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}}],"kind":"struct","path":"authwit::aztec::protocol_types::partial_state_reference::PartialStateReference"}}],"kind":"struct","path":"authwit::aztec::protocol_types::state_reference::StateReference"}},{"name":"global_variables","type":{"fields":[{"name":"chain_id","type":{"kind":"field"}},{"name":"version","type":{"kind":"field"}},{"name":"block_number","type":{"kind":"field"}},{"name":"slot_number","type":{"kind":"field"}},{"name":"timestamp","type":{"kind":"integer","sign":"unsigned","width":64}},{"name":"coinbase","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::eth_address::EthAddress"}},{"name":"fee_recipient","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"gas_fees","type":{"fields":[{"name":"fee_per_da_gas","type":{"kind":"field"}},{"name":"fee_per_l2_gas","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_fees::GasFees"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::global_variables::GlobalVariables"}},{"name":"total_fees","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::header::Header"}},{"name":"tx_context","type":{"fields":[{"name":"chain_id","type":{"kind":"field"}},{"name":"version","type":{"kind":"field"}},{"name":"gas_settings","type":{"fields":[{"name":"gas_limits","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"teardown_gas_limits","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"max_fees_per_gas","type":{"fields":[{"name":"fee_per_da_gas","type":{"kind":"field"}},{"name":"fee_per_l2_gas","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_fees::GasFees"}},{"name":"inclusion_fee","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_settings::GasSettings"}}],"kind":"struct","path":"authwit::aztec::protocol_types::transaction::tx_context::TxContext"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::private_circuit_public_inputs::PrivateCircuitPublicInputs"},"visibility":"public"}},"bytecode":"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","debug_symbols":"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","brillig_names":["get_contract_instance_internal","pack_arguments","enqueue_public_function_call_internal","debug_log_format","notify_set_min_revertible_side_effect_counter","pack_arguments","call_private_function_internal","pack_arguments","pack_arguments"]},{"name":"balance_of_public","is_unconstrained":true,"custom_attributes":["aztec(public)","aztec(view)"],"abi":{"error_types":{},"parameters":[{"name":"inputs","type":{"fields":[{"name":"calldata_length","type":{"kind":"field"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"aztec::context::inputs::public_context_inputs::PublicContextInputs"},"visibility":"private"},{"name":"owner","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"},"visibility":"private"}],"return_type":{"abi_type":{"kind":"field"},"visibility":"public"}},"bytecode":"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","debug_symbols":"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","brillig_names":["balance_of_public"],"assert_messages":{"35":"Storage slot 0 not allowed. Storage slots must start from 1.","77":"Array index out of bounds","15":"Function balance_of_public can only be called statically","89":"attempt to add with overflow","59":"call to assert_max_bit_size"}},{"name":"check_balance","is_unconstrained":true,"custom_attributes":["aztec(public)","aztec(view)"],"abi":{"error_types":{},"parameters":[{"name":"inputs","type":{"fields":[{"name":"calldata_length","type":{"kind":"field"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"aztec::context::inputs::public_context_inputs::PublicContextInputs"},"visibility":"private"},{"name":"fee_limit","type":{"kind":"field"},"visibility":"private"}],"return_type":null},"bytecode":"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","debug_symbols":"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","brillig_names":["check_balance"],"assert_messages":{"142":"attempt to add with overflow","45":"Storage slot 0 not allowed. Storage slots must start from 1.","69":"call to assert_max_bit_size","130":"Array index out of bounds","121":"Balance too low","14":"Function check_balance can only be called statically","19":"call to assert_max_bit_size"}},{"name":"claim","is_unconstrained":false,"custom_attributes":["aztec(private)"],"abi":{"error_types":{},"parameters":[{"name":"inputs","type":{"fields":[{"name":"call_context","type":{"fields":[{"name":"msg_sender","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"storage_contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"function_selector","type":{"fields":[{"name":"inner","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"}},{"name":"is_delegate_call","type":{"kind":"boolean"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::call_context::CallContext"}},{"name":"historical_header","type":{"fields":[{"name":"last_archive","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"content_commitment","type":{"fields":[{"name":"num_txs","type":{"kind":"field"}},{"name":"txs_effects_hash","type":{"kind":"field"}},{"name":"in_hash","type":{"kind":"field"}},{"name":"out_hash","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::content_commitment::ContentCommitment"}},{"name":"state","type":{"fields":[{"name":"l1_to_l2_message_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"partial","type":{"fields":[{"name":"note_hash_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"nullifier_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"public_data_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}}],"kind":"struct","path":"authwit::aztec::protocol_types::partial_state_reference::PartialStateReference"}}],"kind":"struct","path":"authwit::aztec::protocol_types::state_reference::StateReference"}},{"name":"global_variables","type":{"fields":[{"name":"chain_id","type":{"kind":"field"}},{"name":"version","type":{"kind":"field"}},{"name":"block_number","type":{"kind":"field"}},{"name":"slot_number","type":{"kind":"field"}},{"name":"timestamp","type":{"kind":"integer","sign":"unsigned","width":64}},{"name":"coinbase","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::eth_address::EthAddress"}},{"name":"fee_recipient","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"gas_fees","type":{"fields":[{"name":"fee_per_da_gas","type":{"kind":"field"}},{"name":"fee_per_l2_gas","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_fees::GasFees"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::global_variables::GlobalVariables"}},{"name":"total_fees","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::header::Header"}},{"name":"tx_context","type":{"fields":[{"name":"chain_id","type":{"kind":"field"}},{"name":"version","type":{"kind":"field"}},{"name":"gas_settings","type":{"fields":[{"name":"gas_limits","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"teardown_gas_limits","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"max_fees_per_gas","type":{"fields":[{"name":"fee_per_da_gas","type":{"kind":"field"}},{"name":"fee_per_l2_gas","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_fees::GasFees"}},{"name":"inclusion_fee","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_settings::GasSettings"}}],"kind":"struct","path":"authwit::aztec::protocol_types::transaction::tx_context::TxContext"}},{"name":"start_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"aztec::context::inputs::private_context_inputs::PrivateContextInputs"},"visibility":"private"},{"name":"to","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"},"visibility":"private"},{"name":"amount","type":{"kind":"field"},"visibility":"private"},{"name":"secret","type":{"kind":"field"},"visibility":"private"}],"return_type":{"abi_type":{"fields":[{"name":"call_context","type":{"fields":[{"name":"msg_sender","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"storage_contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"function_selector","type":{"fields":[{"name":"inner","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"}},{"name":"is_delegate_call","type":{"kind":"boolean"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::call_context::CallContext"}},{"name":"args_hash","type":{"kind":"field"}},{"name":"returns_hash","type":{"kind":"field"}},{"name":"min_revertible_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"is_fee_payer","type":{"kind":"boolean"}},{"name":"max_block_number","type":{"fields":[{"name":"_opt","type":{"fields":[{"name":"_is_some","type":{"kind":"boolean"}},{"name":"_value","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"std::option::Option"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::max_block_number::MaxBlockNumber"}},{"name":"note_hash_read_requests","type":{"kind":"array","length":16,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::read_request::ReadRequest"}}},{"name":"nullifier_read_requests","type":{"kind":"array","length":16,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::read_request::ReadRequest"}}},{"name":"key_validation_requests_and_generators","type":{"kind":"array","length":16,"type":{"fields":[{"name":"request","type":{"fields":[{"name":"pk_m","type":{"fields":[{"name":"x","type":{"kind":"field"}},{"name":"y","type":{"kind":"field"}},{"name":"is_infinite","type":{"kind":"boolean"}}],"kind":"struct","path":"std::embedded_curve_ops::EmbeddedCurvePoint"}},{"name":"sk_app","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::validation_requests::key_validation_request::KeyValidationRequest"}},{"name":"sk_app_generator","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::validation_requests::key_validation_request_and_generator::KeyValidationRequestAndGenerator"}}},{"name":"note_hashes","type":{"kind":"array","length":16,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::note_hash::NoteHash"}}},{"name":"nullifiers","type":{"kind":"array","length":16,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"note_hash","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::nullifier::Nullifier"}}},{"name":"private_call_requests","type":{"kind":"array","length":4,"type":{"fields":[{"name":"contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"call_context","type":{"fields":[{"name":"msg_sender","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"storage_contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"function_selector","type":{"fields":[{"name":"inner","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"}},{"name":"is_delegate_call","type":{"kind":"boolean"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::call_context::CallContext"}},{"name":"args_hash","type":{"kind":"field"}},{"name":"returns_hash","type":{"kind":"field"}},{"name":"start_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"end_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::private_call_request::PrivateCallRequest"}}},{"name":"public_call_requests","type":{"kind":"array","length":16,"type":{"fields":[{"name":"item","type":{"fields":[{"name":"contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"call_context","type":{"fields":[{"name":"msg_sender","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"storage_contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"function_selector","type":{"fields":[{"name":"inner","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"}},{"name":"is_delegate_call","type":{"kind":"boolean"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::call_context::CallContext"}},{"name":"args_hash","type":{"kind":"field"}},{"name":"returns_hash","type":{"kind":"field"}},{"name":"revert_code","type":{"kind":"integer","sign":"unsigned","width":8}},{"name":"start_gas_left","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"end_gas_left","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::public_call_stack_item_compressed::PublicCallStackItemCompressed"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::public_call_request::PublicCallRequest"}}},{"name":"public_teardown_call_request","type":{"fields":[{"name":"item","type":{"fields":[{"name":"contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"call_context","type":{"fields":[{"name":"msg_sender","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"storage_contract_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"function_selector","type":{"fields":[{"name":"inner","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"}},{"name":"is_delegate_call","type":{"kind":"boolean"}},{"name":"is_static_call","type":{"kind":"boolean"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::call_context::CallContext"}},{"name":"args_hash","type":{"kind":"field"}},{"name":"returns_hash","type":{"kind":"field"}},{"name":"revert_code","type":{"kind":"integer","sign":"unsigned","width":8}},{"name":"start_gas_left","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"end_gas_left","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::public_call_stack_item_compressed::PublicCallStackItemCompressed"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::public_call_request::PublicCallRequest"}},{"name":"l2_to_l1_msgs","type":{"kind":"array","length":2,"type":{"fields":[{"name":"recipient","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::eth_address::EthAddress"}},{"name":"content","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::messaging::l2_to_l1_message::L2ToL1Message"}}},{"name":"start_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"end_side_effect_counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"note_encrypted_logs_hashes","type":{"kind":"array","length":16,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"length","type":{"kind":"field"}},{"name":"note_hash_counter","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::log_hash::NoteLogHash"}}},{"name":"encrypted_logs_hashes","type":{"kind":"array","length":4,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"length","type":{"kind":"field"}},{"name":"randomness","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::log_hash::EncryptedLogHash"}}},{"name":"unencrypted_logs_hashes","type":{"kind":"array","length":4,"type":{"fields":[{"name":"value","type":{"kind":"field"}},{"name":"counter","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"length","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::log_hash::LogHash"}}},{"name":"historical_header","type":{"fields":[{"name":"last_archive","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"content_commitment","type":{"fields":[{"name":"num_txs","type":{"kind":"field"}},{"name":"txs_effects_hash","type":{"kind":"field"}},{"name":"in_hash","type":{"kind":"field"}},{"name":"out_hash","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::content_commitment::ContentCommitment"}},{"name":"state","type":{"fields":[{"name":"l1_to_l2_message_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"partial","type":{"fields":[{"name":"note_hash_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"nullifier_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}},{"name":"public_data_tree","type":{"fields":[{"name":"root","type":{"kind":"field"}},{"name":"next_available_leaf_index","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"}}],"kind":"struct","path":"authwit::aztec::protocol_types::partial_state_reference::PartialStateReference"}}],"kind":"struct","path":"authwit::aztec::protocol_types::state_reference::StateReference"}},{"name":"global_variables","type":{"fields":[{"name":"chain_id","type":{"kind":"field"}},{"name":"version","type":{"kind":"field"}},{"name":"block_number","type":{"kind":"field"}},{"name":"slot_number","type":{"kind":"field"}},{"name":"timestamp","type":{"kind":"integer","sign":"unsigned","width":64}},{"name":"coinbase","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::eth_address::EthAddress"}},{"name":"fee_recipient","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"gas_fees","type":{"fields":[{"name":"fee_per_da_gas","type":{"kind":"field"}},{"name":"fee_per_l2_gas","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_fees::GasFees"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::global_variables::GlobalVariables"}},{"name":"total_fees","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::header::Header"}},{"name":"tx_context","type":{"fields":[{"name":"chain_id","type":{"kind":"field"}},{"name":"version","type":{"kind":"field"}},{"name":"gas_settings","type":{"fields":[{"name":"gas_limits","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"teardown_gas_limits","type":{"fields":[{"name":"da_gas","type":{"kind":"integer","sign":"unsigned","width":32}},{"name":"l2_gas","type":{"kind":"integer","sign":"unsigned","width":32}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas::Gas"}},{"name":"max_fees_per_gas","type":{"fields":[{"name":"fee_per_da_gas","type":{"kind":"field"}},{"name":"fee_per_l2_gas","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_fees::GasFees"}},{"name":"inclusion_fee","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::gas_settings::GasSettings"}}],"kind":"struct","path":"authwit::aztec::protocol_types::transaction::tx_context::TxContext"}}],"kind":"struct","path":"authwit::aztec::protocol_types::abis::private_circuit_public_inputs::PrivateCircuitPublicInputs"},"visibility":"public"}},"bytecode":"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","debug_symbols":"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","brillig_names":["get_public_data_witness","lt_32_hint","decompose_hint","lte_16_hint","get_l1_to_l2_membership_witness","pack_arguments","enqueue_public_function_call_internal","directive_integer_quotient","directive_invert"]}],"outputs":{"globals":{"storage":[{"fields":[{"name":"balances","value":{"fields":[{"name":"slot","value":{"kind":"integer","sign":false,"value":"0000000000000000000000000000000000000000000000000000000000000001"}}],"kind":"struct"}},{"name":"portal_address","value":{"fields":[{"name":"slot","value":{"kind":"integer","sign":false,"value":"0000000000000000000000000000000000000000000000000000000000000002"}}],"kind":"struct"}}],"kind":"struct"}]},"structs":{"functions":[{"fields":[{"name":"parameters","type":{"fields":[{"name":"to","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"amount","type":{"kind":"field"}},{"name":"secret","type":{"kind":"field"}}],"kind":"struct","path":"FeeJuice::claim_parameters"}}],"kind":"struct","path":"FeeJuice::claim_abi"},{"fields":[{"name":"parameters","type":{"fields":[{"name":"to","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}},{"name":"amount","type":{"kind":"field"}}],"kind":"struct","path":"FeeJuice::_increase_public_balance_parameters"}}],"kind":"struct","path":"FeeJuice::_increase_public_balance_abi"},{"fields":[{"name":"parameters","type":{"fields":[{"name":"portal_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::eth_address::EthAddress"}}],"kind":"struct","path":"FeeJuice::set_portal_parameters"}}],"kind":"struct","path":"FeeJuice::set_portal_abi"},{"fields":[{"name":"parameters","type":{"fields":[{"name":"owner","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::aztec_address::AztecAddress"}}],"kind":"struct","path":"FeeJuice::balance_of_public_parameters"}},{"name":"return_type","type":{"kind":"field"}}],"kind":"struct","path":"FeeJuice::balance_of_public_abi"},{"fields":[{"name":"parameters","type":{"fields":[{"name":"fee_limit","type":{"kind":"field"}}],"kind":"struct","path":"FeeJuice::check_balance_parameters"}}],"kind":"struct","path":"FeeJuice::check_balance_abi"},{"fields":[{"name":"parameters","type":{"fields":[{"name":"artifact_hash","type":{"kind":"field"}},{"name":"private_functions_root","type":{"kind":"field"}},{"name":"public_bytecode_commitment","type":{"kind":"field"}},{"name":"portal_address","type":{"fields":[{"name":"inner","type":{"kind":"field"}}],"kind":"struct","path":"authwit::aztec::protocol_types::address::eth_address::EthAddress"}}],"kind":"struct","path":"FeeJuice::deploy_parameters"}}],"kind":"struct","path":"FeeJuice::deploy_abi"}]}},"file_map":{"102":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/history/public_storage.nr","source":"use dep::protocol_types::{\n constants::GENERATOR_INDEX__PUBLIC_LEAF_INDEX, hash::poseidon2_hash_with_separator,\n address::AztecAddress, header::Header, utils::field::full_field_less_than\n};\nuse dep::protocol_types::merkle_tree::root::root_from_sibling_path;\n\nuse crate::{oracle::get_public_data_witness::get_public_data_witness};\n\ntrait PublicStorageHistoricalRead {\n fn public_storage_historical_read(header: Header, storage_slot: Field, contract_address: AztecAddress) -> Field;\n}\n\nimpl PublicStorageHistoricalRead for Header {\n fn public_storage_historical_read(self, storage_slot: Field, contract_address: AztecAddress) -> Field {\n // 1) Compute the leaf index by siloing the storage slot with the contract address\n let public_data_tree_index = poseidon2_hash_with_separator(\n [contract_address.to_field(), storage_slot],\n GENERATOR_INDEX__PUBLIC_LEAF_INDEX\n );\n\n // 2) Get the membership witness for the tree index.\n let witness = unsafe {\n get_public_data_witness(\n self.global_variables.block_number as u32,\n public_data_tree_index\n )\n };\n\n // 3) The witness is made up of two parts: the preimage of the leaf and the proof that it exists in the tree.\n // We first prove that the witness is indeed valid for the public data tree, i.e. that the preimage is of a\n // value present in the tree. Note that `hash` returns not just the hash of the value but also the metadata\n // (slot, next index and next slot).\n assert(\n self.state.partial.public_data_tree.root\n == root_from_sibling_path(witness.leaf_preimage.hash(), witness.index, witness.path), \"Proving public value inclusion failed\"\n );\n\n // 4) Now that we know the preimage is valid, we determine the value that's represented by this tree entry. Here\n // we have two scenarios:\n // 1. The tree entry is initialized, and the value is the same as the one in the witness\n // 2. The entry was never initialized, and the value is default zero (the default)\n // The code below is based on the same checks in `validate_public_data_reads` in `base_rollup_inputs`.\n let preimage = witness.leaf_preimage;\n\n let is_less_than_slot = full_field_less_than(preimage.slot, public_data_tree_index);\n let is_next_greater_than = full_field_less_than(public_data_tree_index, preimage.next_slot);\n let is_max = ((preimage.next_index == 0) & (preimage.next_slot == 0));\n let is_in_range = is_less_than_slot & (is_next_greater_than | is_max);\n\n let value = if is_in_range {\n 0\n } else {\n assert_eq(preimage.slot, public_data_tree_index, \"Public data tree index doesn't match witness\");\n preimage.value\n };\n\n value\n }\n}\n"},"108":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/messaging.nr","source":"use crate::{\n hash::{compute_secret_hash, compute_message_hash, compute_message_nullifier},\n oracle::get_l1_to_l2_membership_witness::get_l1_to_l2_membership_witness\n};\n\nuse dep::protocol_types::merkle_tree::root::root_from_sibling_path;\nuse dep::protocol_types::{constants::L1_TO_L2_MSG_TREE_HEIGHT, address::{AztecAddress, EthAddress}, utils::arr_copy_slice};\n\npub fn process_l1_to_l2_message(\n l1_to_l2_root: Field,\n storage_contract_address: AztecAddress,\n portal_contract_address: EthAddress,\n chain_id: Field,\n version: Field,\n content: Field,\n secret: Field\n) -> Field {\n let secret_hash = compute_secret_hash(secret);\n let message_hash = compute_message_hash(\n portal_contract_address,\n chain_id,\n storage_contract_address,\n version,\n content,\n secret_hash\n );\n\n let returned_message = get_l1_to_l2_membership_witness(storage_contract_address, message_hash, secret);\n let leaf_index = returned_message[0];\n let sibling_path = arr_copy_slice(returned_message, [0; L1_TO_L2_MSG_TREE_HEIGHT], 1);\n\n // Check that the message is in the tree\n // This is implicitly checking that the values of the message are correct\n let root = root_from_sibling_path(message_hash, leaf_index, sibling_path);\n assert(root == l1_to_l2_root, \"Message not in state\");\n\n compute_message_nullifier(message_hash, secret, leaf_index)\n}\n"},"111":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/context/packed_returns.nr","source":"use crate::{hash::hash_args_array, oracle::returns::unpack_returns};\nuse dep::protocol_types::traits::Deserialize;\n\nstruct PackedReturns {\n packed_returns: Field,\n}\n\nimpl PackedReturns {\n pub fn new(packed_returns: Field) -> Self {\n PackedReturns { packed_returns }\n }\n\n pub fn assert_empty(self) {\n assert_eq(self.packed_returns, 0);\n }\n\n pub fn raw(self) -> Field {\n self.packed_returns\n }\n\n pub fn unpack<let N: u32>(self) -> [Field; N] {\n let unpacked: [Field; N] = unpack_returns(self.packed_returns);\n assert_eq(self.packed_returns, hash_args_array(unpacked));\n unpacked\n }\n\n pub fn unpack_into<T, let N: u32>(self) -> T where T: Deserialize<N> {\n let unpacked: [Field; N] = self.unpack();\n Deserialize::deserialize(unpacked)\n }\n}\n"},"115":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/context/call_interfaces.nr","source":"use dep::protocol_types::{\n abis::{function_selector::FunctionSelector, private_circuit_public_inputs::PrivateCircuitPublicInputs},\n address::AztecAddress, traits::Deserialize\n};\n\nuse crate::context::{\n private_context::PrivateContext, public_context::PublicContext, gas::GasOpts,\n inputs::{PrivateContextInputs, PublicContextInputs}\n};\n\nuse crate::oracle::arguments::pack_arguments;\nuse crate::hash::hash_args;\n\ntrait CallInterface<let N: u32, T, P, Env> {\n fn get_original(self) -> fn[Env](T) -> P;\n\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\nimpl<let N: u32, T, P, Env> CallInterface<N, PrivateContextInputs, PrivateCircuitPublicInputs, Env> for PrivateCallInterface<N, T, Env> {\n fn get_original(self) -> fn[Env](PrivateContextInputs) -> PrivateCircuitPublicInputs {\n self.original\n }\n}\n\nstruct PrivateCallInterface<let N: u32, T, Env> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n original: fn[Env](PrivateContextInputs) -> PrivateCircuitPublicInputs,\n is_static: bool\n}\n\nimpl<let N: u32, T, Env> PrivateCallInterface<N, T, Env> {\n pub fn call<let M: u32>(self, context: &mut PrivateContext) -> T where T: Deserialize<M> {\n assert(self.args_hash == pack_arguments(self.args));\n let returns = context.call_private_function_with_packed_args(\n self.target_contract,\n self.selector,\n self.args_hash,\n false,\n false\n );\n let unpacked: T = returns.unpack_into();\n unpacked\n }\n\n pub fn view<let M: u32>(self, context: &mut PrivateContext) -> T where T: Deserialize<M> {\n assert(self.args_hash == pack_arguments(self.args));\n let returns = context.call_private_function_with_packed_args(self.target_contract, self.selector, self.args_hash, true, false);\n returns.unpack_into()\n }\n\n pub fn delegate_call<let M: u32>(self, context: &mut PrivateContext) -> T where T: Deserialize<M> {\n assert(self.args_hash == pack_arguments(self.args));\n let returns = context.call_private_function_with_packed_args(self.target_contract, self.selector, self.args_hash, false, true);\n returns.unpack_into()\n }\n}\n\nimpl<let N: u32, T, P, Env> CallInterface<N, PrivateContextInputs, PrivateCircuitPublicInputs, Env> for PrivateVoidCallInterface<N, Env> {\n fn get_original(self) -> fn[Env](PrivateContextInputs) -> PrivateCircuitPublicInputs {\n self.original\n }\n}\n\nstruct PrivateVoidCallInterface<let N: u32, Env> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n original: fn[Env](PrivateContextInputs) -> PrivateCircuitPublicInputs,\n is_static: bool\n}\n\nimpl<let N: u32, Env> PrivateVoidCallInterface<N, Env> {\n pub fn call(self, context: &mut PrivateContext) {\n assert(self.args_hash == pack_arguments(self.args));\n context.call_private_function_with_packed_args(\n self.target_contract,\n self.selector,\n self.args_hash,\n false,\n false\n ).assert_empty();\n }\n\n pub fn view(self, context: &mut PrivateContext) {\n assert(self.args_hash == pack_arguments(self.args));\n context.call_private_function_with_packed_args(self.target_contract, self.selector, self.args_hash, true, false).assert_empty();\n }\n\n pub fn delegate_call(self, context: &mut PrivateContext) {\n assert(self.args_hash == pack_arguments(self.args));\n context.call_private_function_with_packed_args(self.target_contract, self.selector, self.args_hash, false, true).assert_empty();\n }\n}\n\nimpl<let N: u32, T, P, Env> CallInterface<N, PrivateContextInputs, PrivateCircuitPublicInputs, Env> for PrivateStaticCallInterface<N, T, Env> {\n fn get_original(self) -> fn[Env](PrivateContextInputs) -> PrivateCircuitPublicInputs {\n self.original\n }\n}\n\nstruct PrivateStaticCallInterface<let N: u32, T, Env> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n original: fn[Env](PrivateContextInputs) -> PrivateCircuitPublicInputs,\n is_static: bool\n}\n\nimpl<let N: u32, T, Env> PrivateStaticCallInterface<N, T, Env> {\n pub fn view<let M: u32>(self, context: &mut PrivateContext) -> T where T: Deserialize<M> {\n assert(self.args_hash == pack_arguments(self.args));\n let returns = context.call_private_function_with_packed_args(self.target_contract, self.selector, self.args_hash, true, false);\n returns.unpack_into()\n }\n}\n\nimpl<let N: u32, T, P, Env> CallInterface<N, PrivateContextInputs, PrivateCircuitPublicInputs, Env> for PrivateStaticVoidCallInterface<N, Env> {\n fn get_original(self) -> fn[Env](PrivateContextInputs) -> PrivateCircuitPublicInputs {\n self.original\n }\n}\n\nstruct PrivateStaticVoidCallInterface<let N: u32, Env> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n original: fn[Env](PrivateContextInputs) -> PrivateCircuitPublicInputs,\n is_static: bool\n}\n\nimpl<let N: u32, Env> PrivateStaticVoidCallInterface<N, Env> {\n pub fn view(self, context: &mut PrivateContext) {\n assert(self.args_hash == pack_arguments(self.args));\n context.call_private_function_with_packed_args(self.target_contract, self.selector, self.args_hash, true, false).assert_empty();\n }\n}\n\nimpl<let N: u32, T, P, Env> CallInterface<N, PublicContextInputs, T, Env> for PublicCallInterface<N, T, Env> {\n fn get_original(self) -> fn[Env](PublicContextInputs) -> T {\n self.original\n }\n}\n\nstruct PublicCallInterface<let N: u32, T, Env> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n gas_opts: GasOpts,\n original: fn[Env](PublicContextInputs) -> T,\n is_static: bool\n}\n\nimpl<let N: u32, T, Env> PublicCallInterface<N, T, Env> {\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub fn call<let M: u32>(self, context: &mut PublicContext) -> T where T: Deserialize<M> {\n let returns = context.call_public_function(self.target_contract, self.selector, self.args, self.gas_opts);\n returns.deserialize_into()\n }\n\n pub fn view<let M: u32>(self, context: &mut PublicContext) -> T where T: Deserialize<M> {\n let returns = context.static_call_public_function(self.target_contract, self.selector, self.args, self.gas_opts);\n returns.deserialize_into()\n }\n\n pub fn delegate_call<let M: u32>(self, context: &mut PublicContext) -> T where T: Deserialize<M> {\n let returns = context.delegate_call_public_function(self.target_contract, self.selector, self.args);\n returns.deserialize_into()\n }\n\n pub fn enqueue(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n assert(args_hash == pack_arguments(self.args));\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/ false,\n /*delegate=*/ false\n )\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n assert(args_hash == pack_arguments(self.args));\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/ true,\n /*delegate=*/ false\n )\n }\n\n pub fn delegate_enqueue(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n assert(args_hash == pack_arguments(self.args));\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/ false,\n /*delegate=*/ true\n )\n }\n}\n\nimpl<let N: u32, T, P, Env> CallInterface<N, PublicContextInputs, (), Env> for PublicVoidCallInterface<N, Env> {\n fn get_original(self) -> fn[Env](PublicContextInputs) -> () {\n self.original\n }\n}\n\nstruct PublicVoidCallInterface<let N: u32, Env> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n original: fn[Env](PublicContextInputs) -> (),\n is_static: bool,\n gas_opts: GasOpts\n}\n\nimpl<let N: u32, Env> PublicVoidCallInterface<N, Env> {\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub fn call(self, context: &mut PublicContext) {\n let returns = context.call_public_function(self.target_contract, self.selector, self.args, self.gas_opts);\n returns.assert_empty()\n }\n\n pub fn view(self, context: &mut PublicContext) {\n let returns = context.static_call_public_function(self.target_contract, self.selector, self.args, self.gas_opts);\n returns.assert_empty()\n }\n\n pub fn delegate_call(self, context: &mut PublicContext) {\n let returns = context.delegate_call_public_function(self.target_contract, self.selector, self.args);\n returns.assert_empty()\n }\n\n pub fn enqueue(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n assert(args_hash == pack_arguments(self.args));\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/ false,\n /*delegate=*/ false\n )\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n assert(args_hash == pack_arguments(self.args));\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/ true,\n /*delegate=*/ false\n )\n }\n\n pub fn delegate_enqueue(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n assert(args_hash == pack_arguments(self.args));\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/ false,\n /*delegate=*/ true\n )\n }\n}\n\nimpl<let N: u32, T, P, Env> CallInterface<N, PublicContextInputs, T, Env> for PublicStaticCallInterface<N, T, Env> {\n fn get_original(self) -> fn[Env](PublicContextInputs) -> T {\n self.original\n }\n}\n\nstruct PublicStaticCallInterface<let N: u32, T, Env> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n original: fn[Env](PublicContextInputs) -> T,\n is_static: bool,\n gas_opts: GasOpts\n}\n\nimpl<let N: u32, T, Env> PublicStaticCallInterface<N, T, Env> {\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub fn view<let M: u32>(self, context: &mut PublicContext) -> T where T: Deserialize<M> {\n let returns = context.static_call_public_function(self.target_contract, self.selector, self.args, self.gas_opts);\n let unpacked: T = returns.deserialize_into();\n unpacked\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n assert(args_hash == pack_arguments(self.args));\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/ true,\n /*delegate=*/ false\n )\n }\n}\n\nimpl<let N: u32, T, P, Env> CallInterface<N, PublicContextInputs, (), Env> for PublicStaticVoidCallInterface<N, Env> {\n fn get_original(self) -> fn[Env](PublicContextInputs) -> () {\n self.original\n }\n}\n\nstruct PublicStaticVoidCallInterface<let N: u32, Env> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n original: fn[Env](PublicContextInputs) -> (),\n is_static: bool,\n gas_opts: GasOpts\n}\n\nimpl<let N: u32, Env> PublicStaticVoidCallInterface<N, Env> {\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub fn view(self, context: &mut PublicContext) {\n let returns = context.static_call_public_function(self.target_contract, self.selector, self.args, self.gas_opts);\n returns.assert_empty()\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n assert(args_hash == pack_arguments(self.args));\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/ true,\n /*delegate=*/ false\n )\n }\n}\n"},"116":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/context/private_context.nr","source":"use crate::{\n context::{inputs::PrivateContextInputs, packed_returns::PackedReturns},\n messaging::process_l1_to_l2_message, hash::{hash_args_array, ArgsHasher},\n keys::constants::{NULLIFIER_INDEX, OUTGOING_INDEX, NUM_KEY_TYPES, sk_generators},\n oracle::{\n key_validation_request::get_key_validation_request, arguments, returns::pack_returns,\n call_private_function::call_private_function_internal, header::get_header_at,\n logs::{emit_encrypted_note_log, emit_encrypted_event_log},\n enqueue_public_function_call::{\n enqueue_public_function_call_internal, notify_set_min_revertible_side_effect_counter,\n set_public_teardown_function_call_internal\n}\n}\n};\nuse dep::protocol_types::{\n abis::{\n call_context::CallContext, function_selector::FunctionSelector, gas::Gas,\n max_block_number::MaxBlockNumber,\n validation_requests::{KeyValidationRequest, KeyValidationRequestAndGenerator},\n private_call_request::PrivateCallRequest, private_circuit_public_inputs::PrivateCircuitPublicInputs,\n public_call_request::PublicCallRequest,\n public_call_stack_item_compressed::PublicCallStackItemCompressed, read_request::ReadRequest,\n note_hash::NoteHash, nullifier::Nullifier, log_hash::{LogHash, NoteLogHash, EncryptedLogHash}\n},\n address::{AztecAddress, EthAddress},\n constants::{\n MAX_NOTE_HASHES_PER_CALL, MAX_L2_TO_L1_MSGS_PER_CALL, MAX_NULLIFIERS_PER_CALL,\n MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL, MAX_PUBLIC_CALL_STACK_LENGTH_PER_CALL,\n MAX_NOTE_HASH_READ_REQUESTS_PER_CALL, MAX_NULLIFIER_READ_REQUESTS_PER_CALL,\n MAX_KEY_VALIDATION_REQUESTS_PER_CALL, MAX_ENCRYPTED_LOGS_PER_CALL, MAX_UNENCRYPTED_LOGS_PER_CALL,\n MAX_NOTE_ENCRYPTED_LOGS_PER_CALL\n},\n header::Header, messaging::l2_to_l1_message::L2ToL1Message, utils::reader::Reader, traits::Empty\n};\n\n// When finished, one can call .finish() to convert back to the abi\nstruct PrivateContext {\n // docs:start:private-context\n inputs: PrivateContextInputs,\n side_effect_counter: u32,\n\n min_revertible_side_effect_counter: u32,\n is_fee_payer: bool,\n\n args_hash: Field,\n return_hash: Field,\n\n max_block_number: MaxBlockNumber,\n\n note_hash_read_requests: BoundedVec<ReadRequest, MAX_NOTE_HASH_READ_REQUESTS_PER_CALL>,\n nullifier_read_requests: BoundedVec<ReadRequest, MAX_NULLIFIER_READ_REQUESTS_PER_CALL>,\n key_validation_requests_and_generators: BoundedVec<KeyValidationRequestAndGenerator, MAX_KEY_VALIDATION_REQUESTS_PER_CALL>,\n\n note_hashes: BoundedVec<NoteHash, MAX_NOTE_HASHES_PER_CALL>,\n nullifiers: BoundedVec<Nullifier, MAX_NULLIFIERS_PER_CALL>,\n\n private_call_requests : BoundedVec<PrivateCallRequest, MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL>,\n public_call_requests : BoundedVec<PublicCallRequest, MAX_PUBLIC_CALL_STACK_LENGTH_PER_CALL>,\n public_teardown_call_request: PublicCallRequest,\n l2_to_l1_msgs : BoundedVec<L2ToL1Message, MAX_L2_TO_L1_MSGS_PER_CALL>,\n // docs:end:private-context\n\n // Header of a block whose state is used during private execution (not the block the transaction is included in).\n historical_header: Header,\n\n note_encrypted_logs_hashes: BoundedVec<NoteLogHash, MAX_NOTE_ENCRYPTED_LOGS_PER_CALL>,\n encrypted_logs_hashes: BoundedVec<EncryptedLogHash, MAX_ENCRYPTED_LOGS_PER_CALL>,\n unencrypted_logs_hashes: BoundedVec<LogHash, MAX_UNENCRYPTED_LOGS_PER_CALL>,\n\n // Contains the last key validation request for each key type. This is used to cache the last request and avoid\n // fetching the same request multiple times.\n // The index of the array corresponds to the key type (0 nullifier, 1 incoming, 2 outgoing, 3 tagging).\n last_key_validation_requests: [Option<KeyValidationRequest>; NUM_KEY_TYPES],\n}\n\nimpl PrivateContext {\n pub fn new(inputs: PrivateContextInputs, args_hash: Field) -> PrivateContext {\n PrivateContext {\n inputs,\n side_effect_counter: inputs.start_side_effect_counter + 1,\n min_revertible_side_effect_counter: 0,\n is_fee_payer: false,\n args_hash,\n return_hash: 0,\n max_block_number: MaxBlockNumber::empty(),\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n historical_header: inputs.historical_header,\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n note_encrypted_logs_hashes: BoundedVec::new(),\n encrypted_logs_hashes: BoundedVec::new(),\n unencrypted_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES]\n }\n }\n\n fn msg_sender(self) -> AztecAddress {\n self.inputs.call_context.msg_sender\n }\n\n fn this_address(self) -> AztecAddress {\n self.inputs.call_context.storage_contract_address\n }\n\n fn chain_id(self) -> Field {\n self.inputs.tx_context.chain_id\n }\n\n fn version(self) -> Field {\n self.inputs.tx_context.version\n }\n\n fn selector(self) -> FunctionSelector {\n self.inputs.call_context.function_selector\n }\n\n fn get_args_hash(self) -> Field {\n self.args_hash\n }\n\n fn push_note_hash(&mut self, note_hash: Field) {\n self.note_hashes.push(NoteHash { value: note_hash, counter: self.next_counter() });\n }\n\n fn push_nullifier(&mut self, nullifier: Field) {\n self.nullifiers.push(Nullifier { value: nullifier, note_hash: 0, counter: self.next_counter() });\n }\n\n fn push_nullifier_for_note_hash(&mut self, nullifier: Field, nullified_note_hash: Field) {\n self.nullifiers.push(Nullifier { value: nullifier, note_hash: nullified_note_hash, counter: self.next_counter() });\n }\n\n // Returns the header of a block whose state is used during private execution (not the block the transaction is\n // included in).\n fn get_header(self) -> Header {\n self.historical_header\n }\n\n // Returns the header of an arbitrary block whose block number is less than or equal to the block number\n // of historical header.\n pub fn get_header_at(self, block_number: u32) -> Header {\n get_header_at(block_number, self)\n }\n\n pub fn set_return_hash(&mut self, returns_hasher: ArgsHasher) {\n pack_returns(returns_hasher.fields);\n self.return_hash = returns_hasher.hash();\n }\n\n pub fn finish(self) -> PrivateCircuitPublicInputs {\n PrivateCircuitPublicInputs {\n call_context: self.inputs.call_context,\n args_hash: self.args_hash,\n returns_hash: self.return_hash,\n min_revertible_side_effect_counter: self.min_revertible_side_effect_counter,\n is_fee_payer: self.is_fee_payer,\n max_block_number: self.max_block_number,\n note_hash_read_requests: self.note_hash_read_requests.storage,\n nullifier_read_requests: self.nullifier_read_requests.storage,\n key_validation_requests_and_generators: self.key_validation_requests_and_generators.storage,\n note_hashes: self.note_hashes.storage,\n nullifiers: self.nullifiers.storage,\n private_call_requests: self.private_call_requests.storage,\n public_call_requests: self.public_call_requests.storage,\n public_teardown_call_request: self.public_teardown_call_request,\n l2_to_l1_msgs: self.l2_to_l1_msgs.storage,\n start_side_effect_counter: self.inputs.start_side_effect_counter,\n end_side_effect_counter: self.side_effect_counter,\n note_encrypted_logs_hashes: self.note_encrypted_logs_hashes.storage,\n encrypted_logs_hashes: self.encrypted_logs_hashes.storage,\n unencrypted_logs_hashes: self.unencrypted_logs_hashes.storage,\n historical_header: self.historical_header,\n tx_context: self.inputs.tx_context\n }\n }\n\n pub fn set_as_fee_payer(&mut self) {\n dep::protocol_types::debug_log::debug_log_format(\"Setting {0} as fee payer\", [self.this_address().to_field()]);\n self.is_fee_payer = true;\n }\n\n pub fn end_setup(&mut self) {\n // dep::protocol_types::debug_log::debug_log_format(\n // \"Ending setup at counter {0}\",\n // [self.side_effect_counter as Field]\n // );\n self.min_revertible_side_effect_counter = self.side_effect_counter;\n notify_set_min_revertible_side_effect_counter(self.min_revertible_side_effect_counter);\n }\n\n // docs:start:max-block-number\n pub fn set_tx_max_block_number(&mut self, max_block_number: u32) {\n // docs:end:max-block-number\n self.max_block_number = MaxBlockNumber::min_with_u32(self.max_block_number, max_block_number);\n }\n\n pub fn push_note_hash_read_request(&mut self, note_hash: Field) {\n let side_effect = ReadRequest { value: note_hash, counter: self.next_counter() };\n self.note_hash_read_requests.push(side_effect);\n }\n\n pub fn push_nullifier_read_request(&mut self, nullifier: Field) {\n let request = ReadRequest { value: nullifier, counter: self.next_counter() };\n self.nullifier_read_requests.push(request);\n }\n\n pub fn request_nsk_app(&mut self, npk_m_hash: Field) -> Field {\n self.request_sk_app(npk_m_hash, NULLIFIER_INDEX)\n }\n\n pub fn request_ovsk_app(&mut self, ovpk_m_hash: Field) -> Field {\n self.request_sk_app(ovpk_m_hash, OUTGOING_INDEX)\n }\n\n fn request_sk_app(&mut self, pk_m_hash: Field, key_index: Field) -> Field {\n let cached_request = self.last_key_validation_requests[key_index].unwrap_or(KeyValidationRequest::empty());\n\n if cached_request.pk_m.hash() == pk_m_hash {\n // We get a match so the cached request is the latest one\n cached_request.sk_app\n } else {\n // We didn't get a match meaning the cached result is stale. We fetch new values from oracle and instruct\n // protocol circuits to validate them by storing the validation request in context.\n let request = get_key_validation_request(pk_m_hash, key_index);\n let request_and_generator = KeyValidationRequestAndGenerator { request, sk_app_generator: sk_generators[key_index] };\n // We constrain that the pk_m_hash matches the one in the request (otherwise we could get an arbitrary\n // valid key request and not the one corresponding to pk_m_hash).\n assert(request.pk_m.hash() == pk_m_hash);\n self.key_validation_requests_and_generators.push(request_and_generator);\n self.last_key_validation_requests[key_index] = Option::some(request);\n request.sk_app\n }\n }\n\n // docs:start:context_message_portal\n pub fn message_portal(&mut self, recipient: EthAddress, content: Field) {\n // docs:end:context_message_portal\n let message = L2ToL1Message { recipient, content, counter: self.next_counter() };\n self.l2_to_l1_msgs.push(message);\n }\n\n // docs:start:context_consume_l1_to_l2_message\n // docs:start:consume_l1_to_l2_message\n pub fn consume_l1_to_l2_message(&mut self, content: Field, secret: Field, sender: EthAddress) {\n // docs:end:context_consume_l1_to_l2_message\n let nullifier = process_l1_to_l2_message(\n self.historical_header.state.l1_to_l2_message_tree.root,\n self.this_address(),\n sender,\n self.chain_id(),\n self.version(),\n content,\n secret\n );\n\n // Push nullifier (and the \"commitment\" corresponding to this can be \"empty\")\n self.push_nullifier(nullifier)\n }\n // docs:end:consume_l1_to_l2_message\n\n // NB: A randomness value of 0 signals that the kernels should not mask the contract address\n // used in siloing later on e.g. 'handshaking' contract w/ known address.\n pub fn emit_raw_event_log_with_masked_address<let M: u32>(\n &mut self,\n randomness: Field,\n log: [u8; M],\n log_hash: Field\n ) {\n let counter = self.next_counter();\n let contract_address = self.this_address();\n let len = log.len() as Field + 4;\n let side_effect = EncryptedLogHash { value: log_hash, counter, length: len, randomness };\n self.encrypted_logs_hashes.push(side_effect);\n\n emit_encrypted_event_log(contract_address, randomness, log, counter);\n }\n\n pub fn emit_raw_note_log<let M: u32>(&mut self, note_hash_counter: u32, log: [u8; M], log_hash: Field) {\n let counter = self.next_counter();\n let len = log.len() as Field + 4;\n let side_effect = NoteLogHash { value: log_hash, counter, length: len, note_hash_counter };\n self.note_encrypted_logs_hashes.push(side_effect);\n\n emit_encrypted_note_log(note_hash_counter, log, counter);\n }\n\n pub fn call_private_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT]\n ) -> PackedReturns {\n let args_hash = hash_args_array(args);\n assert(args_hash == arguments::pack_arguments_array(args));\n self.call_private_function_with_packed_args(contract_address, function_selector, args_hash, false, false)\n }\n\n pub fn static_call_private_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT]\n ) -> PackedReturns {\n let args_hash = hash_args_array(args);\n assert(args_hash == arguments::pack_arguments_array(args));\n self.call_private_function_with_packed_args(contract_address, function_selector, args_hash, true, false)\n }\n\n pub fn delegate_call_private_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT]\n ) -> PackedReturns {\n let args_hash = hash_args_array(args);\n assert(args_hash == arguments::pack_arguments_array(args));\n self.call_private_function_with_packed_args(contract_address, function_selector, args_hash, false, true)\n }\n\n pub fn call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector\n ) -> PackedReturns {\n self.call_private_function_with_packed_args(contract_address, function_selector, 0, false, false)\n }\n\n pub fn static_call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector\n ) -> PackedReturns {\n self.call_private_function_with_packed_args(contract_address, function_selector, 0, true, false)\n }\n\n pub fn delegate_call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector\n ) -> PackedReturns {\n self.call_private_function_with_packed_args(contract_address, function_selector, 0, false, true)\n }\n\n pub fn call_private_function_with_packed_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n is_delegate_call: bool\n ) -> PackedReturns {\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n let start_side_effect_counter = self.side_effect_counter;\n let (end_side_effect_counter, returns_hash) = call_private_function_internal(\n contract_address,\n function_selector,\n args_hash,\n start_side_effect_counter,\n is_static_call,\n is_delegate_call\n );\n\n self.side_effect_counter = end_side_effect_counter + 1;\n\n // TODO (fees) figure out why this crashes the prover and enable it\n // we need this in order to pay fees inside child call contexts\n // assert(\n // (item.public_inputs.min_revertible_side_effect_counter == 0 as u32)\n // | (item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter)\n // );\n\n // if item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter {\n // self.min_revertible_side_effect_counter = item.public_inputs.min_revertible_side_effect_counter;\n // }\n\n let call_context = self.generate_call_context(\n contract_address,\n function_selector,\n is_static_call,\n is_delegate_call\n );\n\n self.private_call_requests.push(\n PrivateCallRequest {\n contract_address,\n call_context,\n args_hash,\n returns_hash,\n start_side_effect_counter,\n end_side_effect_counter\n }\n );\n\n PackedReturns::new(returns_hash)\n }\n\n pub fn call_public_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT]\n ) {\n let args_hash = hash_args_array(args);\n assert(args_hash == arguments::pack_arguments_array(args));\n self.call_public_function_with_packed_args(contract_address, function_selector, args_hash, false, false)\n }\n\n pub fn static_call_public_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT]\n ) {\n let args_hash = hash_args_array(args);\n assert(args_hash == arguments::pack_arguments_array(args));\n self.call_public_function_with_packed_args(contract_address, function_selector, args_hash, true, false)\n }\n\n pub fn delegate_call_public_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT]\n ) {\n let args_hash = hash_args_array(args);\n assert(args_hash == arguments::pack_arguments_array(args));\n self.call_public_function_with_packed_args(contract_address, function_selector, args_hash, false, true)\n }\n\n pub fn call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector\n ) {\n self.call_public_function_with_packed_args(contract_address, function_selector, 0, false, false)\n }\n\n pub fn static_call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector\n ) {\n self.call_public_function_with_packed_args(contract_address, function_selector, 0, true, false)\n }\n\n pub fn delegate_call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector\n ) {\n self.call_public_function_with_packed_args(contract_address, function_selector, 0, false, true)\n }\n\n pub fn call_public_function_with_packed_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n is_delegate_call: bool\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n enqueue_public_function_call_internal(\n contract_address,\n function_selector,\n args_hash,\n counter,\n is_static_call,\n is_delegate_call\n );\n\n let call_context = self.generate_call_context(\n contract_address,\n function_selector,\n is_static_call,\n is_delegate_call\n );\n\n let item = PublicCallStackItemCompressed {\n contract_address,\n call_context,\n args_hash,\n returns_hash: 0,\n revert_code: 0,\n start_gas_left: Gas::empty(),\n end_gas_left: Gas::empty()\n };\n\n let call_request = PublicCallRequest { item, counter };\n self.public_call_requests.push(call_request);\n }\n\n pub fn set_public_teardown_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT]\n ) {\n let args_hash = hash_args_array(args);\n assert(args_hash == arguments::pack_arguments_array(args));\n self.set_public_teardown_function_with_packed_args(contract_address, function_selector, args_hash, false, false)\n }\n\n pub fn set_public_teardown_function_with_packed_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n is_delegate_call: bool\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n set_public_teardown_function_call_internal(\n contract_address,\n function_selector,\n args_hash,\n counter,\n is_static_call,\n is_delegate_call\n );\n\n let call_context = self.generate_call_context(\n contract_address,\n function_selector,\n is_static_call,\n is_delegate_call\n );\n\n let item = PublicCallStackItemCompressed {\n contract_address,\n call_context,\n args_hash,\n returns_hash: 0,\n revert_code: 0,\n start_gas_left: Gas::empty(),\n end_gas_left: Gas::empty()\n };\n\n self.public_teardown_call_request = PublicCallRequest {\n item,\n counter,\n };\n }\n\n fn generate_call_context(\n self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n is_static_call: bool,\n is_delegate_call: bool\n ) -> CallContext {\n let msg_sender = if is_delegate_call {\n self.msg_sender()\n } else {\n self.this_address()\n };\n let storage_contract_address = if is_delegate_call {\n self.this_address()\n } else {\n contract_address\n };\n CallContext { msg_sender, storage_contract_address, function_selector, is_static_call, is_delegate_call }\n }\n\n fn next_counter(&mut self) -> u32 {\n let counter = self.side_effect_counter;\n self.side_effect_counter += 1;\n counter\n }\n}\n\nimpl Empty for PrivateContext {\n fn empty() -> Self {\n PrivateContext {\n inputs: PrivateContextInputs::empty(),\n side_effect_counter: 0 as u32,\n min_revertible_side_effect_counter: 0 as u32,\n is_fee_payer: false,\n args_hash: 0,\n return_hash: 0,\n max_block_number: MaxBlockNumber::empty(),\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n historical_header: Header::empty(),\n note_encrypted_logs_hashes: BoundedVec::new(),\n encrypted_logs_hashes: BoundedVec::new(),\n unencrypted_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES]\n }\n }\n}\n"},"117":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/context/public_context.nr","source":"use crate::hash::{compute_secret_hash, compute_message_hash, compute_message_nullifier};\nuse dep::protocol_types::address::{AztecAddress, EthAddress};\nuse dep::protocol_types::constants::MAX_FIELD_VALUE;\nuse dep::protocol_types::traits::{Serialize, Deserialize, Empty};\nuse dep::protocol_types::abis::function_selector::FunctionSelector;\nuse crate::context::inputs::public_context_inputs::PublicContextInputs;\nuse crate::context::gas::GasOpts;\nuse crate::hash::ArgsHasher;\n\nstruct PublicContext {\n inputs: PublicContextInputs,\n args_hash: Option<Field>\n}\n\nimpl PublicContext {\n pub fn new(inputs: PublicContextInputs) -> Self {\n PublicContext { inputs, args_hash: Option::none() }\n }\n\n pub fn emit_unencrypted_log<T, let N: u32>(_self: &mut Self, log: T) where T: Serialize<N> {\n emit_unencrypted_log(Serialize::serialize(log).as_slice());\n }\n\n pub fn note_hash_exists(_self: Self, note_hash: Field, leaf_index: Field) -> bool {\n note_hash_exists(note_hash, leaf_index) == 1\n }\n\n pub fn l1_to_l2_msg_exists(_self: Self, msg_hash: Field, msg_leaf_index: Field) -> bool {\n l1_to_l2_msg_exists(msg_hash, msg_leaf_index) == 1\n }\n\n fn nullifier_exists(_self: Self, unsiloed_nullifier: Field, address: AztecAddress) -> bool {\n nullifier_exists(unsiloed_nullifier, address.to_field()) == 1\n }\n\n fn consume_l1_to_l2_message(\n &mut self,\n content: Field,\n secret: Field,\n sender: EthAddress,\n leaf_index: Field\n ) {\n let secret_hash = compute_secret_hash(secret);\n let message_hash = compute_message_hash(\n sender,\n self.chain_id(),\n /*recipient=*/ self.this_address(),\n self.version(),\n content,\n secret_hash\n );\n let nullifier = compute_message_nullifier(message_hash, secret, leaf_index);\n\n assert(\n !self.nullifier_exists(nullifier, self.this_address()), \"L1-to-L2 message is already nullified\"\n );\n assert(\n self.l1_to_l2_msg_exists(message_hash, leaf_index), \"Tried to consume nonexistent L1-to-L2 message\"\n );\n\n self.push_nullifier(nullifier);\n }\n\n fn message_portal(_self: &mut Self, recipient: EthAddress, content: Field) {\n send_l2_to_l1_msg(recipient, content);\n }\n\n fn call_public_function<let RETURNS_COUNT: u32>(\n _self: &mut Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field],\n gas_opts: GasOpts\n ) -> FunctionReturns<RETURNS_COUNT> {\n let results = call(\n gas_for_call(gas_opts),\n contract_address,\n args,\n function_selector.to_field()\n );\n let data_to_return: [Field; RETURNS_COUNT] = results.0;\n let success: u8 = results.1;\n assert(success == 1, \"Nested call failed!\");\n\n FunctionReturns::new(data_to_return)\n }\n\n fn static_call_public_function<let RETURNS_COUNT: u32>(\n _self: &mut Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field],\n gas_opts: GasOpts\n ) -> FunctionReturns<RETURNS_COUNT> {\n let (data_to_return, success): ([Field; RETURNS_COUNT], u8) = call_static(\n gas_for_call(gas_opts),\n contract_address,\n args,\n function_selector.to_field()\n );\n\n assert(success == 1, \"Nested static call failed!\");\n FunctionReturns::new(data_to_return)\n }\n\n fn delegate_call_public_function<let RETURNS_COUNT: u32>(\n _self: &mut Self,\n _contract_address: AztecAddress,\n _function_selector: FunctionSelector,\n _args: [Field]\n ) -> FunctionReturns<RETURNS_COUNT> {\n assert(false, \"'delegate_call_public_function' not implemented!\");\n FunctionReturns::new([0; RETURNS_COUNT])\n }\n\n fn push_note_hash(_self: &mut Self, note_hash: Field) {\n emit_note_hash(note_hash);\n }\n fn push_nullifier(_self: &mut Self, nullifier: Field) {\n emit_nullifier(nullifier);\n }\n\n fn this_address(_self: Self) -> AztecAddress {\n address()\n }\n pub fn storage_address(_self: Self) -> AztecAddress {\n storage_address()\n }\n fn msg_sender(_self: Self) -> AztecAddress {\n sender()\n }\n fn selector(_self: Self) -> FunctionSelector {\n FunctionSelector::from_u32(function_selector())\n }\n fn get_args_hash(mut self) -> Field {\n if !self.args_hash.is_some() {\n let mut hasher = ArgsHasher::new();\n\n // TODO: this should be replaced with the compile-time calldata size.\n for i in 0..self.inputs.calldata_length as u32 {\n let argn: [Field; 1] = calldata_copy((2 + i) as u32, 1);\n hasher.add(argn[0]);\n }\n\n self.args_hash = Option::some(hasher.hash());\n }\n\n self.args_hash.unwrap()\n }\n fn transaction_fee(_self: Self) -> Field {\n transaction_fee()\n }\n\n fn chain_id(_self: Self) -> Field {\n chain_id()\n }\n fn version(_self: Self) -> Field {\n version()\n }\n fn block_number(_self: Self) -> Field {\n block_number()\n }\n fn timestamp(_self: Self) -> u64 {\n timestamp()\n }\n pub fn fee_per_l2_gas(_self: Self) -> Field {\n fee_per_l2_gas()\n }\n pub fn fee_per_da_gas(_self: Self) -> Field {\n fee_per_da_gas()\n }\n\n fn l2_gas_left(_self: Self) -> Field {\n l2_gas_left()\n }\n fn da_gas_left(_self: Self) -> Field {\n da_gas_left()\n }\n\n fn raw_storage_read<let N: u32>(_self: Self, storage_slot: Field) -> [Field; N] {\n let mut out = [0; N];\n for i in 0..N {\n out[i] = storage_read(storage_slot + i as Field);\n }\n out\n }\n\n fn storage_read<T, let N: u32>(self, storage_slot: Field) -> T where T: Deserialize<N> {\n T::deserialize(self.raw_storage_read(storage_slot))\n }\n\n fn raw_storage_write<let N: u32>(_self: Self, storage_slot: Field, values: [Field; N]) {\n for i in 0..N {\n storage_write(storage_slot + i as Field, values[i]);\n }\n }\n\n fn storage_write<T, let N: u32>(self, storage_slot: Field, value: T) where T: Serialize<N> {\n self.raw_storage_write(storage_slot, value.serialize());\n }\n}\n\n// Helper functions\nfn gas_for_call(user_gas: GasOpts) -> [Field; 2] {\n // It's ok to use the max possible gas here, because the gas will be\n // capped by the gas left in the (STATIC)CALL instruction.\n [\n user_gas.l2_gas.unwrap_or(MAX_FIELD_VALUE),\n user_gas.da_gas.unwrap_or(MAX_FIELD_VALUE)\n ]\n}\n\n// Unconstrained opcode wrappers (do not use directly).\n// TODO(https://github.com/AztecProtocol/aztec-packages/issues/6420): reconsider.\nunconstrained fn address() -> AztecAddress {\n address_opcode()\n}\nunconstrained fn storage_address() -> AztecAddress {\n storage_address_opcode()\n}\nunconstrained fn sender() -> AztecAddress {\n sender_opcode()\n}\nunconstrained fn portal() -> EthAddress {\n portal_opcode()\n}\nunconstrained fn function_selector() -> u32 {\n function_selector_opcode()\n}\nunconstrained fn transaction_fee() -> Field {\n transaction_fee_opcode()\n}\nunconstrained fn chain_id() -> Field {\n chain_id_opcode()\n}\nunconstrained fn version() -> Field {\n version_opcode()\n}\nunconstrained fn block_number() -> Field {\n block_number_opcode()\n}\nunconstrained fn timestamp() -> u64 {\n timestamp_opcode()\n}\nunconstrained fn fee_per_l2_gas() -> Field {\n fee_per_l2_gas_opcode()\n}\nunconstrained fn fee_per_da_gas() -> Field {\n fee_per_da_gas_opcode()\n}\nunconstrained fn l2_gas_left() -> Field {\n l2_gas_left_opcode()\n}\nunconstrained fn da_gas_left() -> Field {\n da_gas_left_opcode()\n}\nunconstrained fn note_hash_exists(note_hash: Field, leaf_index: Field) -> u8 {\n note_hash_exists_opcode(note_hash, leaf_index)\n}\nunconstrained fn emit_note_hash(note_hash: Field) {\n emit_note_hash_opcode(note_hash)\n}\nunconstrained fn nullifier_exists(nullifier: Field, address: Field) -> u8 {\n nullifier_exists_opcode(nullifier, address)\n}\nunconstrained fn emit_nullifier(nullifier: Field) {\n emit_nullifier_opcode(nullifier)\n}\nunconstrained fn emit_unencrypted_log(message: [Field]) {\n emit_unencrypted_log_opcode(message)\n}\nunconstrained fn l1_to_l2_msg_exists(msg_hash: Field, msg_leaf_index: Field) -> u8 {\n l1_to_l2_msg_exists_opcode(msg_hash, msg_leaf_index)\n}\nunconstrained fn send_l2_to_l1_msg(recipient: EthAddress, content: Field) {\n send_l2_to_l1_msg_opcode(recipient, content)\n}\nunconstrained fn call<let RET_SIZE: u32>(\n gas: [Field; 2],\n address: AztecAddress,\n args: [Field],\n function_selector: Field\n) -> ([Field; RET_SIZE], u8) {\n call_opcode(gas, address, args, function_selector)\n}\nunconstrained fn call_static<let RET_SIZE: u32>(\n gas: [Field; 2],\n address: AztecAddress,\n args: [Field],\n function_selector: Field\n) -> ([Field; RET_SIZE], u8) {\n call_static_opcode(gas, address, args, function_selector)\n}\n\nunconstrained fn calldata_copy<let N: u32>(cdoffset: u32, copy_size: u32) -> [Field; N] {\n calldata_copy_opcode(cdoffset, copy_size)\n}\n\nunconstrained fn storage_read(storage_slot: Field) -> Field {\n storage_read_opcode(storage_slot)\n}\n\nunconstrained fn storage_write(storage_slot: Field, value: Field) {\n storage_write_opcode(storage_slot, value);\n}\n\nimpl Empty for PublicContext {\n fn empty() -> Self {\n PublicContext::new(PublicContextInputs::empty())\n }\n}\n\n// AVM oracles (opcodes) follow, do not use directly.\n#[oracle(avmOpcodeAddress)]\nunconstrained fn address_opcode() -> AztecAddress {}\n\n#[oracle(avmOpcodeStorageAddress)]\nunconstrained fn storage_address_opcode() -> AztecAddress {}\n\n#[oracle(avmOpcodeSender)]\nunconstrained fn sender_opcode() -> AztecAddress {}\n\n#[oracle(avmOpcodePortal)]\nunconstrained fn portal_opcode() -> EthAddress {}\n\n#[oracle(avmOpcodeFunctionSelector)]\nunconstrained fn function_selector_opcode() -> u32 {}\n\n#[oracle(avmOpcodeTransactionFee)]\nunconstrained fn transaction_fee_opcode() -> Field {}\n\n#[oracle(avmOpcodeChainId)]\nunconstrained fn chain_id_opcode() -> Field {}\n\n#[oracle(avmOpcodeVersion)]\nunconstrained fn version_opcode() -> Field {}\n\n#[oracle(avmOpcodeBlockNumber)]\nunconstrained fn block_number_opcode() -> Field {}\n\n#[oracle(avmOpcodeTimestamp)]\nunconstrained fn timestamp_opcode() -> u64 {}\n\n#[oracle(avmOpcodeFeePerL2Gas)]\nunconstrained fn fee_per_l2_gas_opcode() -> Field {}\n\n#[oracle(avmOpcodeFeePerDaGas)]\nunconstrained fn fee_per_da_gas_opcode() -> Field {}\n\n#[oracle(avmOpcodeL2GasLeft)]\nunconstrained fn l2_gas_left_opcode() -> Field {}\n\n#[oracle(avmOpcodeDaGasLeft)]\nunconstrained fn da_gas_left_opcode() -> Field {}\n\n#[oracle(avmOpcodeNoteHashExists)]\nunconstrained fn note_hash_exists_opcode(note_hash: Field, leaf_index: Field) -> u8 {}\n\n#[oracle(avmOpcodeEmitNoteHash)]\nunconstrained fn emit_note_hash_opcode(note_hash: Field) {}\n\n#[oracle(avmOpcodeNullifierExists)]\nunconstrained fn nullifier_exists_opcode(nullifier: Field, address: Field) -> u8 {}\n\n#[oracle(avmOpcodeEmitNullifier)]\nunconstrained fn emit_nullifier_opcode(nullifier: Field) {}\n\n#[oracle(avmOpcodeEmitUnencryptedLog)]\nunconstrained fn emit_unencrypted_log_opcode(message: [Field]) {}\n\n#[oracle(avmOpcodeL1ToL2MsgExists)]\nunconstrained fn l1_to_l2_msg_exists_opcode(msg_hash: Field, msg_leaf_index: Field) -> u8 {}\n\n#[oracle(avmOpcodeSendL2ToL1Msg)]\nunconstrained fn send_l2_to_l1_msg_opcode(recipient: EthAddress, content: Field) {}\n\n#[oracle(avmOpcodeCalldataCopy)]\nunconstrained fn calldata_copy_opcode<let N: u32>(cdoffset: u32, copy_size: u32) -> [Field; N] {}\n\n#[oracle(avmOpcodeCall)]\nunconstrained fn call_opcode<let RET_SIZE: u32>(\n gas: [Field; 2], // gas allocation: [l2_gas, da_gas]\n address: AztecAddress,\n args: [Field],\n // TODO(5110): consider passing in calldata directly\n function_selector: Field\n) -> ([Field; RET_SIZE], u8) {}\n// ^ return data ^ success\n\n#[oracle(avmOpcodeStaticCall)]\nunconstrained fn call_static_opcode<let RET_SIZE: u32>(\n gas: [Field; 2], // gas allocation: [l2_gas, da_gas]\n address: AztecAddress,\n args: [Field],\n // TODO(5110): consider passing in calldata directly\n function_selector: Field\n) -> ([Field; RET_SIZE], u8) {}\n// ^ return data ^ success\n\n#[oracle(avmOpcodeStorageRead)]\nunconstrained fn storage_read_opcode(storage_slot: Field) -> Field {}\n\n#[oracle(avmOpcodeStorageWrite)]\nunconstrained fn storage_write_opcode(storage_slot: Field, value: Field) {}\n\nstruct FunctionReturns<let N: u32> {\n values: [Field; N]\n}\n\nimpl<let N: u32> FunctionReturns<N> {\n pub fn new(values: [Field; N]) -> FunctionReturns<N> {\n FunctionReturns { values }\n }\n\n pub fn raw(self) -> [Field; N] {\n self.values\n }\n\n pub fn deserialize_into<T>(self) -> T where T: Deserialize<N> {\n Deserialize::deserialize(self.raw())\n }\n}\n\nimpl FunctionReturns<0> {\n pub fn assert_empty(self) {\n assert(self.values.len() == 0);\n }\n}\n"},"144":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/hash.nr","source":"use dep::protocol_types::{\n address::{AztecAddress, EthAddress},\n constants::{GENERATOR_INDEX__SECRET_HASH, GENERATOR_INDEX__MESSAGE_NULLIFIER, GENERATOR_INDEX__FUNCTION_ARGS},\n point::Point, traits::Hash,\n hash::{sha256_to_field, poseidon2_hash_with_separator, poseidon2_hash_with_separator_slice}\n};\nuse crate::oracle::logs_traits::ToBytesForUnencryptedLog;\n\npub use dep::protocol_types::hash::{compute_siloed_nullifier, pedersen_hash};\n\npub fn pedersen_commitment<let N: u32>(inputs: [Field; N], hash_index: u32) -> Point {\n std::hash::pedersen_commitment_with_separator(inputs, hash_index)\n}\n\npub fn compute_secret_hash(secret: Field) -> Field {\n poseidon2_hash_with_separator([secret], GENERATOR_INDEX__SECRET_HASH)\n}\n\npub fn compute_unencrypted_log_hash<T, let N: u32, let M: u32>(\n contract_address: AztecAddress,\n log: T\n) -> Field where T: ToBytesForUnencryptedLog<N, M> {\n let message_bytes: [u8; N] = log.to_be_bytes_arr();\n // can't use N - not in scope error\n let n = message_bytes.len();\n let mut hash_bytes = [0; M];\n // Address is converted to 32 bytes in ts\n let address_bytes = contract_address.to_be_bytes_arr();\n for i in 0..32 {\n hash_bytes[i] = address_bytes[i];\n }\n let len_bytes: [u8; 4] = (n as Field).to_be_bytes();\n for i in 0..4 {\n hash_bytes[32 + i] = len_bytes[i];\n }\n for i in 0..n {\n hash_bytes[36 + i] = message_bytes[i];\n }\n\n sha256_to_field(hash_bytes)\n}\n\npub fn compute_message_hash(\n sender: EthAddress,\n chain_id: Field,\n recipient: AztecAddress,\n version: Field,\n content: Field,\n secret_hash: Field\n) -> Field {\n let mut hash_bytes = [0 as u8; 192];\n let sender_bytes: [u8; 32] = sender.to_field().to_be_bytes();\n let chain_id_bytes: [u8; 32] = chain_id.to_be_bytes();\n let recipient_bytes: [u8; 32] = recipient.to_field().to_be_bytes();\n let version_bytes: [u8; 32] = version.to_be_bytes();\n let content_bytes: [u8; 32] = content.to_be_bytes();\n let secret_hash_bytes: [u8; 32] = secret_hash.to_be_bytes();\n\n for i in 0..32 {\n hash_bytes[i] = sender_bytes[i];\n hash_bytes[i + 32] = chain_id_bytes[i];\n hash_bytes[i + 64] = recipient_bytes[i];\n hash_bytes[i + 96] = version_bytes[i];\n hash_bytes[i + 128] = content_bytes[i];\n hash_bytes[i + 160] = secret_hash_bytes[i];\n }\n\n sha256_to_field(hash_bytes)\n}\n\n// The nullifier of a l1 to l2 message is the hash of the message salted with the secret and index of the message hash\n// in the L1 to L2 message tree\npub fn compute_message_nullifier(message_hash: Field, secret: Field, leaf_index: Field) -> Field {\n poseidon2_hash_with_separator(\n [message_hash, secret, leaf_index],\n GENERATOR_INDEX__MESSAGE_NULLIFIER\n )\n}\n\nstruct ArgsHasher {\n fields: [Field],\n}\n\nimpl Hash for ArgsHasher {\n fn hash(self) -> Field {\n hash_args(self.fields)\n }\n}\n\nimpl ArgsHasher {\n pub fn new() -> Self {\n Self { fields: [] }\n }\n\n pub fn add(&mut self, field: Field) {\n self.fields = self.fields.push_back(field);\n }\n\n pub fn add_multiple<let N: u32>(&mut self, fields: [Field; N]) {\n for i in 0..N {\n self.fields = self.fields.push_back(fields[i]);\n }\n }\n}\n\npub fn hash_args_array<let N: u32>(args: [Field; N]) -> Field {\n if args.len() == 0 {\n 0\n } else {\n poseidon2_hash_with_separator(args, GENERATOR_INDEX__FUNCTION_ARGS)\n }\n}\n\npub fn hash_args(args: [Field]) -> Field {\n if args.len() == 0 {\n 0\n } else {\n poseidon2_hash_with_separator_slice(args, GENERATOR_INDEX__FUNCTION_ARGS)\n }\n}\n\n#[test]\nfn compute_var_args_hash() {\n let mut input = ArgsHasher::new();\n for i in 0..100 {\n input.add(i as Field);\n }\n let hash = input.hash();\n dep::std::println(hash);\n assert(hash == 0x19b0d74feb06ebde19edd85a28986c97063e84b3b351a8b666c7cac963ce655f);\n}\n\n#[test]\nfn compute_unenc_log_hash_array() {\n let contract_address = AztecAddress::from_field(0x233a3e0df23b2b15b324194cb4a151f26c0b7333250781d34cc269d85dc334c6);\n let log = [\n 0x20660de09f35f876e3e69d227b2a35166ad05f09d82d06366ec9b6f65a51fec2,\n 0x1b52bfe3b8689761916f76dc3d38aa8810860db325cd39ca611eed980091f01c,\n 0x2e559c4045c378a56ad13b9edb1e8de4e7ad3b3aa35cc7ba9ec77f7a68fa43a4,\n 0x25d0f689c4a4178a29d59306f2675824d19be6d25e44fa03b03f49c263053dd2,\n 0x2d513a722d6f352dc0961f156afdc5e31495b9f0e35cb069261a8e55e2df67fd\n ];\n let hash = compute_unencrypted_log_hash(contract_address, log);\n assert(hash == 0x0095b2d17ab72f4b27a341f7ac63e49ec73935ae8c9181a0ac02023eb12f3284);\n}\n\n#[test]\nfn compute_unenc_log_hash_addr() {\n let contract_address = AztecAddress::from_field(0x233a3e0df23b2b15b324194cb4a151f26c0b7333250781d34cc269d85dc334c6);\n let log = AztecAddress::from_field(0x26aa302d4715fd8a687453cb26d616b0768027bd54bcae56b09d908ecd9f8303);\n let hash = compute_unencrypted_log_hash(contract_address, log);\n assert(hash == 0x0083ab647dfb26e7ddee90a0f4209d049d4660cab42000c544b986aaa84c55a3);\n}\n\n#[test]\nfn compute_unenc_log_hash_str() {\n let contract_address = AztecAddress::from_field(0x1b401e1146c5c507962287065c81f0ef7590adae3802c533d7549d6bf0a41bd8);\n let log = \"dummy\";\n let hash = compute_unencrypted_log_hash(contract_address, log);\n assert(hash == 0x00629e88ebd6374f44aa6cfe07e251ecf07213ebc7267e8f6b578ae57ffd6c20);\n}\n\n#[test]\nfn compute_unenc_log_hash_longer_str() {\n let contract_address = AztecAddress::from_field(0x1b401e1146c5c507962287065c81f0ef7590adae3802c533d7549d6bf0a41bd8);\n let log = \"Hello this is a string\";\n let hash = compute_unencrypted_log_hash(contract_address, log);\n assert(hash == 0x0098637962f7d34fa202b7ffad8a07a238c5d1fd897b82a108f7f467fa73b841);\n}\n"},"148":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/oracle/arguments.nr","source":"#[oracle(packArgumentsArray)]\nunconstrained fn pack_arguments_array_oracle<let N: u32>(_args: [Field; N]) -> Field {}\n\n#[oracle(packArguments)]\nunconstrained fn pack_arguments_oracle(_args: [Field]) -> Field {}\n\n/// - Pack arguments (array version) will notify the simulator that these arguments will be used later at\n/// some point in the call.\n/// - When the external call is made later, the simulator will know what the values unpack to.\n/// - This oracle will not be required in public vm functions, as the vm will keep track of arguments\n/// itself.\nunconstrained pub fn pack_arguments_array<let N: u32>(args: [Field; N]) -> Field {\n pack_arguments_array_oracle(args)\n}\n\n/// - Pack arguments (slice version) will notify the simulator that these arguments will be used later at\n/// some point in the call.\n/// - When the external call is made later, the simulator will know what the values unpack to.\n/// - This oracle will not be required in public vm functions, as the vm will keep track of arguments\n/// itself.\nunconstrained pub fn pack_arguments(args: [Field]) -> Field {\n pack_arguments_oracle(args)\n}\n\n"},"150":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/oracle/get_public_data_witness.nr","source":"use dep::protocol_types::{constants::PUBLIC_DATA_TREE_HEIGHT, data::PublicDataTreeLeafPreimage, utils::arr_copy_slice};\n\nglobal LEAF_PREIMAGE_LENGTH: u32 = 4;\nglobal PUBLIC_DATA_WITNESS: Field = 45;\n\nstruct PublicDataWitness {\n index: Field,\n leaf_preimage: PublicDataTreeLeafPreimage,\n path: [Field; PUBLIC_DATA_TREE_HEIGHT],\n}\n\n#[oracle(getPublicDataTreeWitness)]\nunconstrained fn get_public_data_witness_oracle(\n _block_number: u32,\n _public_data_tree_index: Field\n) -> [Field; PUBLIC_DATA_WITNESS] {}\n\nunconstrained pub fn get_public_data_witness(\n block_number: u32,\n public_data_tree_index: Field\n) -> PublicDataWitness {\n let fields = get_public_data_witness_oracle(block_number, public_data_tree_index);\n PublicDataWitness {\n index: fields[0],\n leaf_preimage: PublicDataTreeLeafPreimage { slot: fields[1], value: fields[2], next_index: fields[3] as u32, next_slot: fields[4] },\n path: arr_copy_slice(fields, [0; PUBLIC_DATA_TREE_HEIGHT], 1 + LEAF_PREIMAGE_LENGTH)\n }\n}\n"},"157":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/oracle/call_private_function.nr","source":"use dep::protocol_types::{abis::function_selector::FunctionSelector, address::AztecAddress, utils::reader::Reader};\n\n#[oracle(callPrivateFunction)]\nunconstrained fn call_private_function_oracle(\n _contract_address: AztecAddress,\n _function_selector: FunctionSelector,\n _args_hash: Field,\n _start_side_effect_counter: u32,\n _is_static_call: bool,\n _is_delegate_call: bool\n) -> [Field; 2] {}\n\nunconstrained pub fn call_private_function_internal(\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n start_side_effect_counter: u32,\n is_static_call: bool,\n is_delegate_call: bool\n) -> (u32, Field) {\n let fields = call_private_function_oracle(\n contract_address,\n function_selector,\n args_hash,\n start_side_effect_counter,\n is_static_call,\n is_delegate_call\n );\n\n let mut reader = Reader::new(fields);\n let end_side_effect_counter = reader.read_u32();\n let returns_hash = reader.read();\n\n (end_side_effect_counter, returns_hash)\n}\n"},"161":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/oracle/get_contract_instance.nr","source":"use dep::protocol_types::{\n address::AztecAddress, contract_instance::ContractInstance, constants::CONTRACT_INSTANCE_LENGTH,\n utils::reader::Reader\n};\n\n#[oracle(getContractInstance)]\nunconstrained fn get_contract_instance_oracle(_address: AztecAddress) -> [Field; CONTRACT_INSTANCE_LENGTH] {}\n\n// Returns a ContractInstance plus a boolean indicating whether the instance was found.\n#[oracle(avmOpcodeGetContractInstance)]\nunconstrained fn get_contract_instance_oracle_avm(_address: AztecAddress) -> [Field; CONTRACT_INSTANCE_LENGTH + 1] {}\n\nunconstrained fn get_contract_instance_internal(address: AztecAddress) -> [Field; CONTRACT_INSTANCE_LENGTH] {\n get_contract_instance_oracle(address)\n}\n\nunconstrained pub fn get_contract_instance_internal_avm(address: AztecAddress) -> [Field; CONTRACT_INSTANCE_LENGTH + 1] {\n get_contract_instance_oracle_avm(address)\n}\n\npub fn get_contract_instance(address: AztecAddress) -> ContractInstance {\n let instance = unsafe {\n ContractInstance::deserialize(get_contract_instance_internal(address))\n };\n // The to_address function combines all values in the instance object to produce an address, so by checking that we\n // get the expected address we validate the entire struct.\n assert_eq(instance.to_address(), address);\n\n instance\n}\n\npub fn get_contract_instance_avm(address: AztecAddress) -> Option<ContractInstance> {\n let mut reader = Reader::new(get_contract_instance_internal_avm(address));\n let found = reader.read();\n if found == 0 {\n Option::none()\n } else {\n Option::some(reader.read_struct(ContractInstance::deserialize))\n }\n}\n"},"162":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/oracle/enqueue_public_function_call.nr","source":"use dep::protocol_types::{abis::{function_selector::FunctionSelector}, address::AztecAddress};\n\n#[oracle(enqueuePublicFunctionCall)]\nunconstrained fn enqueue_public_function_call_oracle(\n _contract_address: AztecAddress,\n _function_selector: FunctionSelector,\n _args_hash: Field,\n _side_effect_counter: u32,\n _is_static_call: bool,\n _is_delegate_call: bool\n) {}\n\nunconstrained pub fn enqueue_public_function_call_internal(\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n side_effect_counter: u32,\n is_static_call: bool,\n is_delegate_call: bool\n) {\n enqueue_public_function_call_oracle(\n contract_address,\n function_selector,\n args_hash,\n side_effect_counter,\n is_static_call,\n is_delegate_call\n );\n}\n\n#[oracle(setPublicTeardownFunctionCall)]\nunconstrained fn set_public_teardown_function_call_oracle(\n _contract_address: AztecAddress,\n _function_selector: FunctionSelector,\n _args_hash: Field,\n _side_effect_counter: u32,\n _is_static_call: bool,\n _is_delegate_call: bool\n) {}\n\nunconstrained pub fn set_public_teardown_function_call_internal(\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n side_effect_counter: u32,\n is_static_call: bool,\n is_delegate_call: bool\n) {\n set_public_teardown_function_call_oracle(\n contract_address,\n function_selector,\n args_hash,\n side_effect_counter,\n is_static_call,\n is_delegate_call\n );\n}\n\n#[oracle(notifySetMinRevertibleSideEffectCounter)]\nunconstrained fn notify_set_min_revertible_side_effect_counter_oracle(_counter: u32) {}\n\nunconstrained pub fn notify_set_min_revertible_side_effect_counter(counter: u32) {\n notify_set_min_revertible_side_effect_counter_oracle(counter);\n}\n"},"166":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/oracle/get_l1_to_l2_membership_witness.nr","source":"use dep::protocol_types::{address::AztecAddress};\n\nglobal L1_TO_L2_MESSAGE_ORACLE_CALL_LENGTH: u64 = 17;\n\n// Obtains membership witness (index and sibling path) for a message in the L1 to L2 message tree.\n#[oracle(getL1ToL2MembershipWitness)]\nunconstrained fn get_l1_to_l2_membership_witness_oracle(\n _contract_address: AztecAddress,\n _message_hash: Field,\n _secret: Field\n) -> [Field; L1_TO_L2_MESSAGE_ORACLE_CALL_LENGTH] {}\n\nunconstrained pub fn get_l1_to_l2_membership_witness(\n contract_address: AztecAddress,\n message_hash: Field,\n secret: Field\n) -> [Field; L1_TO_L2_MESSAGE_ORACLE_CALL_LENGTH] {\n get_l1_to_l2_membership_witness_oracle(contract_address, message_hash, secret)\n}\n"},"167":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/state_vars/map.nr","source":"use dep::protocol_types::{storage::map::derive_storage_slot_in_map, traits::ToField};\nuse crate::state_vars::storage::Storage;\n\n// docs:start:map\nstruct Map<K, V, Context> {\n context: Context,\n storage_slot: Field,\n state_var_constructor: fn(Context, Field) -> V,\n}\n// docs:end:map\n\nimpl<K, T, Context> Storage<T> for Map<K, T, Context> {}\n\nimpl<K, V, Context> Map<K, V, Context> {\n // docs:start:new\n pub fn new(\n context: Context,\n storage_slot: Field,\n state_var_constructor: fn(Context, Field) -> V\n ) -> Self {\n assert(storage_slot != 0, \"Storage slot 0 not allowed. Storage slots must start from 1.\");\n Map { context, storage_slot, state_var_constructor }\n }\n // docs:end:new\n\n // docs:start:at\n pub fn at(self, key: K) -> V where K: ToField {\n // TODO(#1204): use a generator index for the storage slot\n let derived_storage_slot = derive_storage_slot_in_map(self.storage_slot, key);\n\n let state_var_constructor = self.state_var_constructor;\n state_var_constructor(self.context, derived_storage_slot)\n }\n // docs:end:at\n}\n\n"},"169":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/state_vars/public_mutable.nr","source":"use crate::context::{PublicContext, UnconstrainedContext};\nuse dep::protocol_types::traits::{Deserialize, Serialize};\nuse crate::state_vars::storage::Storage;\n\n// docs:start:public_mutable_struct\nstruct PublicMutable<T, Context> {\n context: Context,\n storage_slot: Field,\n}\n// docs:end:public_mutable_struct\n\nimpl<T, Context> Storage<T> for PublicMutable<T, Context> {}\n\nimpl<T, Context> PublicMutable<T, Context> {\n // docs:start:public_mutable_struct_new\n pub fn new(\n // Note: Passing the contexts to new(...) just to have an interface compatible with a Map.\n context: Context,\n storage_slot: Field\n ) -> Self {\n assert(storage_slot != 0, \"Storage slot 0 not allowed. Storage slots must start from 1.\");\n PublicMutable { context, storage_slot }\n }\n // docs:end:public_mutable_struct_new\n}\n\nimpl<T, T_SERIALIZED_LEN> PublicMutable<T, &mut PublicContext> where T: Serialize<T_SERIALIZED_LEN> + Deserialize<T_SERIALIZED_LEN> {\n // docs:start:public_mutable_struct_read\n pub fn read(self) -> T {\n self.context.storage_read(self.storage_slot)\n }\n // docs:end:public_mutable_struct_read\n\n // docs:start:public_mutable_struct_write\n pub fn write(self, value: T) {\n self.context.storage_write(self.storage_slot, value);\n }\n // docs:end:public_mutable_struct_write\n}\n\nimpl<T, T_SERIALIZED_LEN> PublicMutable<T, UnconstrainedContext> where T: Deserialize<T_SERIALIZED_LEN> {\n unconstrained pub fn read(self) -> T {\n self.context.storage_read(self.storage_slot)\n }\n}\n"},"172":{"path":"/usr/src/noir-projects/aztec-nr/aztec/src/state_vars/shared_immutable.nr","source":"use crate::{context::{PrivateContext, PublicContext, UnconstrainedContext}, state_vars::storage::Storage};\nuse dep::protocol_types::{constants::INITIALIZATION_SLOT_SEPARATOR, traits::{Deserialize, Serialize}};\n\n// Just like PublicImmutable but with the ability to read from private functions.\nstruct SharedImmutable<T, Context>{\n context: Context,\n storage_slot: Field,\n}\n\nimpl<T, Context> Storage<T> for SharedImmutable<T, Context> {}\n\nimpl<T, Context> SharedImmutable<T, Context> {\n pub fn new(\n // Note: Passing the contexts to new(...) just to have an interface compatible with a Map.\n context: Context,\n storage_slot: Field\n ) -> Self {\n assert(storage_slot != 0, \"Storage slot 0 not allowed. Storage slots must start from 1.\");\n Self { context, storage_slot }\n }\n}\n\nimpl<T, T_SERIALIZED_LEN> SharedImmutable<T, &mut PublicContext> where T: Serialize<T_SERIALIZED_LEN> + Deserialize<T_SERIALIZED_LEN> {\n // Intended to be only called once.\n pub fn initialize(self, value: T) {\n // We check that the struct is not yet initialized by checking if the initialization slot is 0\n let initialization_slot = INITIALIZATION_SLOT_SEPARATOR + self.storage_slot;\n let init_field: Field = self.context.storage_read(initialization_slot);\n assert(init_field == 0, \"SharedImmutable already initialized\");\n\n // We populate the initialization slot with a non-zero value to indicate that the struct is initialized\n self.context.storage_write(initialization_slot, 0xdead);\n self.context.storage_write(self.storage_slot, value);\n }\n\n pub fn read_public(self) -> T {\n self.context.storage_read(self.storage_slot)\n }\n}\n\nimpl<T, T_SERIALIZED_LEN> SharedImmutable<T, UnconstrainedContext> where T: Serialize<T_SERIALIZED_LEN> + Deserialize<T_SERIALIZED_LEN> {\n unconstrained pub fn read_public(self) -> T {\n self.context.storage_read(self.storage_slot)\n }\n}\n\nimpl<T, T_SERIALIZED_LEN> SharedImmutable<T, &mut PrivateContext> where T: Serialize<T_SERIALIZED_LEN> + Deserialize<T_SERIALIZED_LEN> {\n pub fn read_private(self) -> T {\n let header = self.context.get_header();\n let mut fields = [0; T_SERIALIZED_LEN];\n\n for i in 0..fields.len() {\n fields[i] =\n header.public_storage_historical_read(\n self.storage_slot + i as Field,\n (*self.context).this_address()\n );\n }\n T::deserialize(fields)\n }\n}\n"},"25":{"path":"std/field/bn254.nr","source":"use crate::runtime::is_unconstrained;\n\n// The low and high decomposition of the field modulus\nglobal PLO: Field = 53438638232309528389504892708671455233;\nglobal PHI: Field = 64323764613183177041862057485226039389;\n\nglobal TWO_POW_128: Field = 0x100000000000000000000000000000000;\n\n// Decomposes a single field into two 16 byte fields.\nfn compute_decomposition(x: Field) -> (Field, Field) {\n let x_bytes: [u8; 32] = x.to_le_bytes();\n\n let mut low: Field = 0;\n let mut high: Field = 0;\n\n let mut offset = 1;\n for i in 0..16 {\n low += (x_bytes[i] as Field) * offset;\n high += (x_bytes[i + 16] as Field) * offset;\n offset *= 256;\n }\n\n (low, high)\n}\n\nunconstrained pub(crate) fn decompose_hint(x: Field) -> (Field, Field) {\n compute_decomposition(x)\n}\n\nfn compute_lt(x: Field, y: Field, num_bytes: u32) -> bool {\n let x_bytes: [u8; 32] = x.to_le_bytes();\n let y_bytes: [u8; 32] = y.to_le_bytes();\n let mut x_is_lt = false;\n let mut done = false;\n for i in 0..num_bytes {\n if (!done) {\n let x_byte = x_bytes[num_bytes - 1 - i];\n let y_byte = y_bytes[num_bytes - 1 - i];\n let bytes_match = x_byte == y_byte;\n if !bytes_match {\n x_is_lt = x_byte < y_byte;\n done = true;\n }\n }\n }\n x_is_lt\n}\n\nfn compute_lte(x: Field, y: Field, num_bytes: u32) -> bool {\n if x == y {\n true\n } else {\n compute_lt(x, y, num_bytes)\n }\n}\n\nunconstrained fn lt_32_hint(x: Field, y: Field) -> bool {\n compute_lt(x, y, 32)\n}\n\nunconstrained fn lte_16_hint(x: Field, y: Field) -> bool {\n compute_lte(x, y, 16)\n}\n\n// Assert that (alo > blo && ahi >= bhi) || (alo <= blo && ahi > bhi)\nfn assert_gt_limbs(a: (Field, Field), b: (Field, Field)) {\n let (alo, ahi) = a;\n let (blo, bhi) = b;\n unsafe {\n let borrow = lte_16_hint(alo, blo);\n\n let rlo = alo - blo - 1 + (borrow as Field) * TWO_POW_128;\n let rhi = ahi - bhi - (borrow as Field);\n\n rlo.assert_max_bit_size(128);\n rhi.assert_max_bit_size(128);\n }\n}\n\n/// Decompose a single field into two 16 byte fields.\npub fn decompose(x: Field) -> (Field, Field) {\n if is_unconstrained() {\n compute_decomposition(x)\n } else {\n unsafe {\n // Take hints of the decomposition\n let (xlo, xhi) = decompose_hint(x);\n\n // Range check the limbs\n xlo.assert_max_bit_size(128);\n xhi.assert_max_bit_size(128);\n\n // Check that the decomposition is correct\n assert_eq(x, xlo + TWO_POW_128 * xhi);\n\n // Assert that the decomposition of P is greater than the decomposition of x\n assert_gt_limbs((PLO, PHI), (xlo, xhi));\n (xlo, xhi)\n }\n }\n}\n\npub fn assert_gt(a: Field, b: Field) {\n if is_unconstrained() {\n assert(compute_lt(b, a, 32));\n } else {\n // Decompose a and b\n let a_limbs = decompose(a);\n let b_limbs = decompose(b);\n\n // Assert that a_limbs is greater than b_limbs\n assert_gt_limbs(a_limbs, b_limbs)\n }\n}\n\npub fn assert_lt(a: Field, b: Field) {\n assert_gt(b, a);\n}\n\npub fn gt(a: Field, b: Field) -> bool {\n if is_unconstrained() {\n compute_lt(b, a, 32)\n } else if a == b {\n false\n } else {\n // Take a hint of the comparison and verify it\n unsafe {\n if lt_32_hint(a, b) {\n assert_gt(b, a);\n false\n } else {\n assert_gt(a, b);\n true\n }\n }\n }\n}\n\npub fn lt(a: Field, b: Field) -> bool {\n gt(b, a)\n}\n\nmod tests {\n // TODO: Allow imports from \"super\"\n use crate::field::bn254::{decompose, compute_lt, assert_gt, gt, TWO_POW_128, compute_lte, PLO, PHI};\n\n #[test]\n fn check_decompose() {\n assert_eq(decompose(TWO_POW_128), (0, 1));\n assert_eq(decompose(TWO_POW_128 + 0x1234567890), (0x1234567890, 1));\n assert_eq(decompose(0x1234567890), (0x1234567890, 0));\n }\n\n #[test]\n unconstrained fn check_decompose_unconstrained() {\n assert_eq(decompose(TWO_POW_128), (0, 1));\n assert_eq(decompose(TWO_POW_128 + 0x1234567890), (0x1234567890, 1));\n assert_eq(decompose(0x1234567890), (0x1234567890, 0));\n }\n\n #[test]\n fn check_compute_lt() {\n assert(compute_lt(0, 1, 16));\n assert(compute_lt(0, 0x100, 16));\n assert(compute_lt(0x100, TWO_POW_128 - 1, 16));\n assert(!compute_lt(0, TWO_POW_128, 16));\n }\n\n #[test]\n fn check_compute_lte() {\n assert(compute_lte(0, 1, 16));\n assert(compute_lte(0, 0x100, 16));\n assert(compute_lte(0x100, TWO_POW_128 - 1, 16));\n assert(!compute_lte(0, TWO_POW_128, 16));\n\n assert(compute_lte(0, 0, 16));\n assert(compute_lte(0x100, 0x100, 16));\n assert(compute_lte(TWO_POW_128 - 1, TWO_POW_128 - 1, 16));\n assert(compute_lte(TWO_POW_128, TWO_POW_128, 16));\n }\n\n #[test]\n fn check_assert_gt() {\n assert_gt(1, 0);\n assert_gt(0x100, 0);\n assert_gt((0 - 1), (0 - 2));\n assert_gt(TWO_POW_128, 0);\n assert_gt(0 - 1, 0);\n }\n\n #[test]\n unconstrained fn check_assert_gt_unconstrained() {\n assert_gt(1, 0);\n assert_gt(0x100, 0);\n assert_gt((0 - 1), (0 - 2));\n assert_gt(TWO_POW_128, 0);\n assert_gt(0 - 1, 0);\n }\n\n #[test]\n fn check_gt() {\n assert(gt(1, 0));\n assert(gt(0x100, 0));\n assert(gt((0 - 1), (0 - 2)));\n assert(gt(TWO_POW_128, 0));\n assert(!gt(0, 0));\n assert(!gt(0, 0x100));\n assert(gt(0 - 1, 0 - 2));\n assert(!gt(0 - 2, 0 - 1));\n }\n\n #[test]\n unconstrained fn check_gt_unconstrained() {\n assert(gt(1, 0));\n assert(gt(0x100, 0));\n assert(gt((0 - 1), (0 - 2)));\n assert(gt(TWO_POW_128, 0));\n assert(!gt(0, 0));\n assert(!gt(0, 0x100));\n assert(gt(0 - 1, 0 - 2));\n assert(!gt(0 - 2, 0 - 1));\n }\n\n #[test]\n fn check_plo_phi() {\n assert_eq(PLO + PHI * TWO_POW_128, 0);\n let p_bytes = crate::field::modulus_le_bytes();\n let mut p_low: Field = 0;\n let mut p_high: Field = 0;\n\n let mut offset = 1;\n for i in 0..16 {\n p_low += (p_bytes[i] as Field) * offset;\n p_high += (p_bytes[i + 16] as Field) * offset;\n offset *= 256;\n }\n assert_eq(p_low, PLO);\n assert_eq(p_high, PHI);\n }\n}\n"},"252":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/data/public_data_tree_leaf_preimage.nr","source":"use crate::{merkle_tree::leaf_preimage::IndexedTreeLeafPreimage, traits::{Empty, Hash}};\n\nstruct PublicDataTreeLeafPreimage {\n slot : Field,\n value: Field,\n next_slot :Field,\n next_index : u32,\n}\n\nimpl Empty for PublicDataTreeLeafPreimage {\n fn empty() -> Self {\n Self { slot: 0, value: 0, next_slot: 0, next_index: 0 }\n }\n}\n\nimpl Hash for PublicDataTreeLeafPreimage {\n fn hash(self) -> Field {\n if self.is_empty() {\n 0\n } else {\n crate::hash::poseidon2_hash([self.slot, self.value, (self.next_index as Field), self.next_slot])\n }\n }\n}\n\nimpl IndexedTreeLeafPreimage for PublicDataTreeLeafPreimage {\n fn get_key(self) -> Field {\n self.slot\n }\n\n fn get_next_key(self) -> Field {\n self.next_slot\n }\n\n fn as_leaf(self) -> Field {\n self.hash()\n }\n}\n\nimpl PublicDataTreeLeafPreimage {\n pub fn is_empty(self) -> bool {\n (self.slot == 0) & (self.value == 0) & (self.next_slot == 0) & (self.next_index == 0)\n }\n}\n"},"259":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/storage/map.nr","source":"use crate::{hash::pedersen_hash, traits::ToField};\n\npub fn derive_storage_slot_in_map<K>(storage_slot: Field, key: K) -> Field where K: ToField {\n pedersen_hash([storage_slot, key.to_field()], 0)\n}\n\nmod test {\n use crate::{address::AztecAddress, storage::map::derive_storage_slot_in_map};\n\n #[test]\n fn test_derive_storage_slot_in_map_matches_typescript() {\n let map_slot = 0x132258fb6962c4387ba659d9556521102d227549a386d39f0b22d1890d59c2b5;\n let key = AztecAddress::from_field(0x302dbc2f9b50a73283d5fb2f35bc01eae8935615817a0b4219a057b2ba8a5a3f);\n\n let slot = derive_storage_slot_in_map(map_slot, key);\n\n // The following value was generated by `map_slot.test.ts`\n let slot_from_typescript = 0x2499880e2b1b831785c17286f99a0d5122fee784ce7b1c04e380c4a991da819a;\n\n assert_eq(slot, slot_from_typescript);\n }\n}\n"},"26":{"path":"std/field/mod.nr","source":"mod bn254;\nuse bn254::lt as bn254_lt;\n\nimpl Field {\n /// Asserts that `self` can be represented in `bit_size` bits.\n ///\n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^{bit_size}`.\n // docs:start:assert_max_bit_size\n pub fn assert_max_bit_size(self, bit_size: u32) {\n // docs:end:assert_max_bit_size\n crate::assert_constant(bit_size);\n assert(bit_size < modulus_num_bits() as u32);\n self.__assert_max_bit_size(bit_size);\n }\n\n #[builtin(apply_range_constraint)]\n fn __assert_max_bit_size(self, bit_size: u32) {}\n\n /// Decomposes `self` into its little endian bit decomposition as a `[u1; N]` array.\n /// This slice will be zero padded should not all bits be necessary to represent `self`.\n /// \n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^N` as the resulting slice will not\n /// be able to represent the original `Field`.\n ///\n /// # Safety\n /// Values of `N` equal to or greater than the number of bits necessary to represent the `Field` modulus\n /// (e.g. 254 for the BN254 field) allow for multiple bit decompositions. This is due to how the `Field` will\n /// wrap around due to overflow when verifying the decomposition.\n #[builtin(to_le_bits)]\n // docs:start:to_le_bits\n pub fn to_le_bits<let N: u32>(self: Self) -> [u1; N] {}\n // docs:end:to_le_bits\n\n /// Decomposes `self` into its big endian bit decomposition as a `[u1; N]` array.\n /// This array will be zero padded should not all bits be necessary to represent `self`.\n /// \n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^N` as the resulting slice will not\n /// be able to represent the original `Field`.\n ///\n /// # Safety\n /// Values of `N` equal to or greater than the number of bits necessary to represent the `Field` modulus\n /// (e.g. 254 for the BN254 field) allow for multiple bit decompositions. This is due to how the `Field` will\n /// wrap around due to overflow when verifying the decomposition.\n #[builtin(to_be_bits)]\n // docs:start:to_be_bits\n pub fn to_be_bits<let N: u32>(self: Self) -> [u1; N] {}\n // docs:end:to_be_bits\n\n /// Decomposes `self` into its little endian byte decomposition as a `[u8]` slice of length `byte_size`.\n /// This slice will be zero padded should not all bytes be necessary to represent `self`.\n /// \n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^{8*byte_size}` as the resulting slice will not\n /// be able to represent the original `Field`.\n ///\n /// # Safety\n /// Values of `byte_size` equal to or greater than the number of bytes necessary to represent the `Field` modulus\n /// (e.g. 32 for the BN254 field) allow for multiple byte decompositions. This is due to how the `Field` will\n /// wrap around due to overflow when verifying the decomposition.\n // docs:start:to_le_bytes\n pub fn to_le_bytes<let N: u32>(self: Self) -> [u8; N] {\n self.to_le_radix(256)\n }\n // docs:end:to_le_bytes\n\n /// Decomposes `self` into its big endian byte decomposition as a `[u8]` slice of length `byte_size`.\n /// This slice will be zero padded should not all bytes be necessary to represent `self`.\n /// \n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^{8*byte_size}` as the resulting slice will not\n /// be able to represent the original `Field`.\n ///\n /// # Safety\n /// Values of `byte_size` equal to or greater than the number of bytes necessary to represent the `Field` modulus\n /// (e.g. 32 for the BN254 field) allow for multiple byte decompositions. This is due to how the `Field` will\n /// wrap around due to overflow when verifying the decomposition.\n // docs:start:to_be_bytes\n pub fn to_be_bytes<let N: u32>(self: Self) -> [u8; N] {\n self.to_be_radix(256)\n }\n // docs:end:to_be_bytes\n\n // docs:start:to_le_radix\n pub fn to_le_radix<let N: u32>(self: Self, radix: u32) -> [u8; N] {\n crate::assert_constant(radix);\n self.__to_le_radix(radix)\n }\n // docs:end:to_le_radix\n\n // docs:start:to_be_radix\n pub fn to_be_radix<let N: u32>(self: Self, radix: u32) -> [u8; N] {\n crate::assert_constant(radix);\n self.__to_be_radix(radix)\n }\n // docs:end:to_be_radix\n\n // `_radix` must be less than 256\n #[builtin(to_le_radix)]\n fn __to_le_radix<let N: u32>(self, radix: u32) -> [u8; N] {}\n\n #[builtin(to_be_radix)]\n fn __to_be_radix<let N: u32>(self, radix: u32) -> [u8; N] {}\n\n // Returns self to the power of the given exponent value.\n // Caution: we assume the exponent fits into 32 bits\n // using a bigger bit size impacts negatively the performance and should be done only if the exponent does not fit in 32 bits\n pub fn pow_32(self, exponent: Field) -> Field {\n let mut r: Field = 1;\n let b: [u1; 32] = exponent.to_le_bits();\n\n for i in 1..33 {\n r *= r;\n r = (b[32-i] as Field) * (r * self) + (1 - b[32-i] as Field) * r;\n }\n r\n }\n\n // Parity of (prime) Field element, i.e. sgn0(x mod p) = 0 if x ∈ {0, ..., p-1} is even, otherwise sgn0(x mod p) = 1.\n pub fn sgn0(self) -> u1 {\n self as u1\n }\n\n pub fn lt(self, another: Field) -> bool {\n if crate::compat::is_bn254() {\n bn254_lt(self, another)\n } else {\n lt_fallback(self, another)\n }\n }\n}\n\n#[builtin(modulus_num_bits)]\npub comptime fn modulus_num_bits() -> u64 {}\n\n#[builtin(modulus_be_bits)]\npub comptime fn modulus_be_bits() -> [u1] {}\n\n#[builtin(modulus_le_bits)]\npub comptime fn modulus_le_bits() -> [u1] {}\n\n#[builtin(modulus_be_bytes)]\npub comptime fn modulus_be_bytes() -> [u8] {}\n\n#[builtin(modulus_le_bytes)]\npub comptime fn modulus_le_bytes() -> [u8] {}\n\n// Convert a 32 byte array to a field element by modding\npub fn bytes32_to_field(bytes32: [u8; 32]) -> Field {\n // Convert it to a field element\n let mut v = 1;\n let mut high = 0 as Field;\n let mut low = 0 as Field;\n\n for i in 0..16 {\n high = high + (bytes32[15 - i] as Field) * v;\n low = low + (bytes32[16 + 15 - i] as Field) * v;\n v = v * 256;\n }\n // Abuse that a % p + b % p = (a + b) % p and that low < p\n low + high * v\n}\n\nfn lt_fallback(x: Field, y: Field) -> bool {\n let x_bytes: [u8; 32] = x.to_le_bytes();\n let y_bytes: [u8; 32] = y.to_le_bytes();\n let mut x_is_lt = false;\n let mut done = false;\n for i in 0..32 {\n if (!done) {\n let x_byte = x_bytes[32 - 1 - i] as u8;\n let y_byte = y_bytes[32 - 1 - i] as u8;\n let bytes_match = x_byte == y_byte;\n if !bytes_match {\n x_is_lt = x_byte < y_byte;\n done = true;\n }\n }\n }\n x_is_lt\n}\n\nmod tests {\n #[test]\n // docs:start:to_be_bits_example\n fn test_to_be_bits() {\n let field = 2;\n let bits: [u1; 8] = field.to_be_bits();\n assert_eq(bits, [0, 0, 0, 0, 0, 0, 1, 0]);\n }\n // docs:end:to_be_bits_example\n\n #[test]\n // docs:start:to_le_bits_example\n fn test_to_le_bits() {\n let field = 2;\n let bits: [u1; 8] = field.to_le_bits();\n assert_eq(bits, [0, 1, 0, 0, 0, 0, 0, 0]);\n }\n // docs:end:to_le_bits_example\n\n #[test]\n // docs:start:to_be_bytes_example\n fn test_to_be_bytes() {\n let field = 2;\n let bits: [u8; 8] = field.to_be_bytes();\n assert_eq(bits, [0, 0, 0, 0, 0, 0, 0, 2]);\n }\n // docs:end:to_be_bytes_example\n\n #[test]\n // docs:start:to_le_bytes_example\n fn test_to_le_bytes() {\n let field = 2;\n let bits: [u8; 8] = field.to_le_bytes();\n assert_eq(bits, [2, 0, 0, 0, 0, 0, 0, 0]);\n }\n // docs:end:to_le_bytes_example\n\n #[test]\n // docs:start:to_be_radix_example\n fn test_to_be_radix() {\n let field = 2;\n let bits: [u8; 8] = field.to_be_radix(256);\n assert_eq(bits, [0, 0, 0, 0, 0, 0, 0, 2]);\n }\n // docs:end:to_be_radix_example\n\n #[test]\n // docs:start:to_le_radix_example\n fn test_to_le_radix() {\n let field = 2;\n let bits: [u8; 8] = field.to_le_radix(256);\n assert_eq(bits, [2, 0, 0, 0, 0, 0, 0, 0]);\n }\n // docs:end:to_le_radix_example\n}\n"},"264":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/type_serialization.nr","source":"use crate::traits::{Serialize, Deserialize};\n\nglobal BOOL_SERIALIZED_LEN: Field = 1;\nglobal U8_SERIALIZED_LEN: Field = 1;\nglobal U32_SERIALIZED_LEN: Field = 1;\nglobal U64_SERIALIZED_LEN: Field = 1;\nglobal U128_SERIALIZED_LEN: Field = 1;\nglobal FIELD_SERIALIZED_LEN: Field = 1;\n\nimpl Serialize<BOOL_SERIALIZED_LEN> for bool {\n fn serialize(self) -> [Field; BOOL_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<BOOL_SERIALIZED_LEN> for bool {\n fn deserialize(fields: [Field; BOOL_SERIALIZED_LEN]) -> bool {\n fields[0] as bool\n }\n}\n\nimpl Serialize<U8_SERIALIZED_LEN> for u8 {\n fn serialize(self) -> [Field; U32_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<U8_SERIALIZED_LEN> for u8 {\n fn deserialize(fields: [Field; U8_SERIALIZED_LEN]) -> Self {\n fields[0] as u8\n }\n}\n\nimpl Serialize<U32_SERIALIZED_LEN> for u32 {\n fn serialize(self) -> [Field; U32_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<U32_SERIALIZED_LEN> for u32 {\n fn deserialize(fields: [Field; U32_SERIALIZED_LEN]) -> Self {\n fields[0] as u32\n }\n}\n\nimpl Serialize<U64_SERIALIZED_LEN> for u64 {\n fn serialize(self) -> [Field; U64_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<U64_SERIALIZED_LEN> for u64 {\n fn deserialize(fields: [Field; U64_SERIALIZED_LEN]) -> Self {\n fields[0] as u64\n }\n}\n\nimpl Serialize<U128_SERIALIZED_LEN> for U128 {\n fn serialize(self) -> [Field; 1] {\n [self.to_integer()]\n }\n}\n\nimpl Deserialize<U128_SERIALIZED_LEN> for U128 {\n fn deserialize(fields: [Field; U128_SERIALIZED_LEN]) -> Self {\n U128::from_integer(fields[0])\n }\n}\n\nimpl Serialize<FIELD_SERIALIZED_LEN> for Field {\n fn serialize(self) -> [Field; U32_SERIALIZED_LEN] {\n [self]\n }\n}\n\nimpl Deserialize<FIELD_SERIALIZED_LEN> for Field {\n fn deserialize(fields: [Field; FIELD_SERIALIZED_LEN]) -> Self {\n fields[0]\n }\n}\n"},"265":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/traits.nr","source":"use crate::utils::field::field_from_bytes;\n\n// Trait: is_empty\n//\n// The general is_empty trait checks if a data type is is empty,\n// and it defines empty for the basic data types as 0.\n//\n// If a Field is equal to zero, then it is regarded as zero.\n// We will go with this definition for now, however it can be problematic \n// if a value can actually be zero. In a future refactor, we can \n// use the optional type for safety. Doing it now would lead to a worse devex\n// and would make it harder to sync up with the cpp code.\n// Preferred over Default trait to convey intent, as default doesn't necessarily mean empty.\ntrait Empty {\n fn empty() -> Self;\n}\n\nimpl Empty for Field {\n fn empty() -> Self {\n 0\n }\n}\n\nimpl Empty for u1 {\n fn empty() -> Self {\n 0\n }\n}\nimpl Empty for u8 {\n fn empty() -> Self {\n 0\n }\n}\nimpl Empty for u32 {\n fn empty() -> Self {\n 0\n }\n}\nimpl Empty for u64 {\n fn empty() -> Self {\n 0\n }\n}\nimpl Empty for U128 {\n fn empty() -> Self {\n U128::from_integer(0)\n }\n}\n\npub fn is_empty<T>(item: T) -> bool where T: Empty + Eq {\n item.eq(T::empty())\n}\n\npub fn is_empty_array<T, let N: u32>(array: [T; N]) -> bool where T: Empty + Eq {\n array.all(|elem| is_empty(elem))\n}\n\ntrait Hash {\n fn hash(self) -> Field;\n}\n\ntrait ToField {\n fn to_field(self) -> Field;\n}\n\nimpl ToField for Field {\n fn to_field(self) -> Field {\n self\n }\n}\n\nimpl ToField for bool {\n fn to_field(self) -> Field {\n self as Field\n }\n}\nimpl ToField for u1 {\n fn to_field(self) -> Field {\n self as Field\n }\n}\nimpl ToField for u8 {\n fn to_field(self) -> Field {\n self as Field\n }\n}\nimpl ToField for u32 {\n fn to_field(self) -> Field {\n self as Field\n }\n}\nimpl ToField for u64 {\n fn to_field(self) -> Field {\n self as Field\n }\n}\nimpl ToField for U128 {\n fn to_field(self) -> Field {\n self.to_integer()\n }\n}\nimpl<let N: u32> ToField for str<N> {\n fn to_field(self) -> Field {\n assert(N < 32, \"String doesn't fit in a field, consider using Serialize instead\");\n field_from_bytes(self.as_bytes(), true)\n }\n}\n\ntrait FromField {\n fn from_field(value: Field) -> Self;\n}\n\nimpl FromField for Field {\n fn from_field(value: Field) -> Self {\n value\n }\n}\n\nimpl FromField for bool {\n fn from_field(value: Field) -> Self {\n value as bool\n }\n}\nimpl FromField for u1 {\n fn from_field(value: Field) -> Self {\n value as u1\n }\n}\nimpl FromField for u8 {\n fn from_field(value: Field) -> Self {\n value as u8\n }\n}\nimpl FromField for u32 {\n fn from_field(value: Field) -> Self {\n value as u32\n }\n}\nimpl FromField for u64 {\n fn from_field(value: Field) -> Self {\n value as u64\n }\n}\nimpl FromField for U128 {\n fn from_field(value: Field) -> Self {\n U128::from_integer(value)\n }\n}\n\n// docs:start:serialize\ntrait Serialize<let N: u32> {\n fn serialize(self) -> [Field; N];\n}\n// docs:end:serialize\n\nimpl<let N: u32> Serialize<N> for [Field; N] {\n fn serialize(self) -> [Field; N] {\n self\n }\n}\nimpl<let N: u32> Serialize<N> for str<N> {\n fn serialize(self) -> [Field; N] {\n let mut result = [0; N];\n let bytes: [u8; N] = self.as_bytes();\n for i in 0..N {\n result[i] = field_from_bytes([bytes[i];1], true);\n }\n result\n }\n}\n\n// docs:start:deserialize\ntrait Deserialize<let N: u32> {\n fn deserialize(fields: [Field; N]) -> Self;\n}\n// docs:end:deserialize\n\nimpl<let N: u32> Deserialize<N> for [Field; N] {\n fn deserialize(fields: [Field; N]) -> Self {\n fields\n }\n}\n"},"266":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/debug_log.nr","source":"// Utility function to console.log data in the acir simulator\n// WARNING: sometimes when using debug logs the ACVM errors with: `thrown: \"solver opcode resolution error: cannot solve opcode: expression has too many unknowns x155\"`\n\n#[oracle(debugLog)]\nunconstrained fn debug_log_oracle<let M: u32>(_msg: str<M>, args: [Field]) {}\n\n/// NOTE: call this with a str<N> msg of form\n/// \"some string with {0} and {1} ... {N}\"\n/// and an array of N field which will be formatted\n/// into the string in the simulator.\n/// Example:\n/// debug_log_format(\"get_2(slot:{0}) =>\\n\\t0:{1}\\n\\t1:{2}\", [storage_slot, note0_hash, note1_hash]);\n/// debug_log_format(\"whole array: {}\", [e1, e2, e3, e4]);\nunconstrained pub fn debug_log_format<let M: u32, let N: u32>(msg: str<M>, args: [Field; N]) {\n debug_log_oracle(msg, args.as_slice());\n}\n\n/// NOTE: call this with a str<N> msg of length > 1\n/// Example:\n/// `debug_log(\"blah blah this is a debug string\");`\nunconstrained pub fn debug_log<let N: u32>(msg: str<N>) {\n debug_log_format(msg, []);\n}\n"},"270":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/hash.nr","source":"use crate::{\n abis::{\n contract_class_function_leaf_preimage::ContractClassFunctionLeafPreimage,\n function_selector::FunctionSelector, log_hash::{LogHash, ScopedLogHash, ScopedEncryptedLogHash},\n note_hash::ScopedNoteHash, nullifier::ScopedNullifier\n},\n address::{AztecAddress, EthAddress},\n constants::{\n FUNCTION_TREE_HEIGHT, GENERATOR_INDEX__SILOED_NOTE_HASH, GENERATOR_INDEX__OUTER_NULLIFIER,\n GENERATOR_INDEX__VK, GENERATOR_INDEX__NOTE_HASH_NONCE, GENERATOR_INDEX__UNIQUE_NOTE_HASH,\n MAX_ENCRYPTED_LOGS_PER_TX, MAX_NOTE_ENCRYPTED_LOGS_PER_TX\n},\n merkle_tree::root::root_from_sibling_path,\n messaging::l2_to_l1_message::{L2ToL1Message, ScopedL2ToL1Message},\n recursion::verification_key::VerificationKey, traits::{is_empty, ToField},\n utils::field::field_from_bytes_32_trunc\n};\nuse super::utils::field::field_from_bytes;\n\npub fn sha256_to_field<let N: u32>(bytes_to_hash: [u8; N]) -> Field {\n let sha256_hashed = std::hash::sha256(bytes_to_hash);\n let hash_in_a_field = field_from_bytes_32_trunc(sha256_hashed);\n\n hash_in_a_field\n}\n\npub fn private_functions_root_from_siblings(\n selector: FunctionSelector,\n vk_hash: Field,\n function_leaf_index: Field,\n function_leaf_sibling_path: [Field; FUNCTION_TREE_HEIGHT]\n) -> Field {\n let function_leaf_preimage = ContractClassFunctionLeafPreimage { selector, vk_hash };\n let function_leaf = function_leaf_preimage.hash();\n root_from_sibling_path(function_leaf, function_leaf_index, function_leaf_sibling_path)\n}\n\nfn compute_note_hash_nonce(tx_hash: Field, note_index_in_tx: u32) -> Field {\n // Hashing tx hash with note index in tx is guaranteed to be unique\n poseidon2_hash_with_separator(\n [\n tx_hash,\n note_index_in_tx as Field\n ],\n GENERATOR_INDEX__NOTE_HASH_NONCE\n )\n}\n\npub fn compute_unique_note_hash(nonce: Field, note_hash: Field) -> Field {\n let inputs = [nonce, note_hash];\n poseidon2_hash_with_separator(inputs, GENERATOR_INDEX__UNIQUE_NOTE_HASH)\n}\n\npub fn compute_siloed_note_hash(app: AztecAddress, unique_note_hash: Field) -> Field {\n poseidon2_hash_with_separator(\n [\n app.to_field(),\n unique_note_hash\n ],\n GENERATOR_INDEX__SILOED_NOTE_HASH\n )\n}\n\n/// Siloing in the context of Aztec refers to the process of hashing a note hash with a contract address (this way\n/// the note hash is scoped to a specific contract). This is used to prevent intermingling of notes between contracts.\npub fn silo_note_hash(note_hash: ScopedNoteHash, tx_hash: Field, note_index_in_tx: u32) -> Field {\n if note_hash.contract_address.is_zero() {\n 0\n } else {\n let nonce = compute_note_hash_nonce(tx_hash, note_index_in_tx);\n let unique_note_hash = compute_unique_note_hash(nonce, note_hash.value());\n compute_siloed_note_hash(note_hash.contract_address, unique_note_hash)\n }\n}\n\npub fn compute_siloed_nullifier(app: AztecAddress, nullifier: Field) -> Field {\n poseidon2_hash_with_separator(\n [\n app.to_field(),\n nullifier\n ],\n GENERATOR_INDEX__OUTER_NULLIFIER\n )\n}\n\npub fn silo_nullifier(nullifier: ScopedNullifier) -> Field {\n if nullifier.contract_address.is_zero() {\n nullifier.value() // Return value instead of 0 because the first nullifier's contract address is zero.\n } else {\n compute_siloed_nullifier(nullifier.contract_address, nullifier.value())\n }\n}\n\npub fn silo_encrypted_log_hash(log_hash: ScopedLogHash) -> Field {\n // We assume contract address has already been masked\n if log_hash.contract_address.is_zero() {\n 0\n } else {\n accumulate_sha256([log_hash.contract_address.to_field(), log_hash.log_hash.value])\n }\n}\n\npub fn mask_encrypted_log_hash(scoped_log: ScopedEncryptedLogHash) -> AztecAddress {\n if scoped_log.contract_address.is_zero() {\n AztecAddress::from_field(0)\n } else if (scoped_log.log_hash.randomness == 0) {\n scoped_log.contract_address\n } else {\n AztecAddress::from_field(\n poseidon2_hash_with_separator(\n [scoped_log.contract_address.to_field(), scoped_log.log_hash.randomness],\n 0\n )\n )\n }\n}\n\nfn compute_siloed_unencrypted_log_hash(address: AztecAddress, log_hash: Field) -> Field {\n accumulate_sha256([address.to_field(), log_hash])\n}\n\npub fn silo_unencrypted_log_hash(log_hash: ScopedLogHash) -> Field {\n if log_hash.contract_address.is_zero() {\n 0\n } else {\n compute_siloed_unencrypted_log_hash(log_hash.contract_address, log_hash.value())\n }\n}\n\npub fn merkle_hash(left: Field, right: Field) -> Field {\n poseidon2_hash([left, right])\n}\n\npub fn stdlib_recursion_verification_key_compress_native_vk(_vk: VerificationKey) -> Field {\n // Original cpp code\n // stdlib::recursion::verification_key<CT::bn254>::compress_native(private_call.vk, GeneratorIndex::VK);\n // The above cpp method is only ever called on verification key, so it has been special cased here\n let _hash_index = GENERATOR_INDEX__VK;\n 0\n}\n\npub fn compute_l2_to_l1_hash(\n contract_address: AztecAddress,\n recipient: EthAddress,\n content: Field,\n rollup_version_id: Field,\n chain_id: Field\n) -> Field {\n let mut bytes: BoundedVec<u8, 160> = BoundedVec::new();\n\n let inputs = [contract_address.to_field(), rollup_version_id, recipient.to_field(), chain_id, content];\n for i in 0..inputs.len() {\n // TODO are bytes be in fr.to_buffer() ?\n let item_bytes: [u8; 32] = inputs[i].to_be_bytes();\n for j in 0..32 {\n bytes.push(item_bytes[j]);\n }\n }\n\n sha256_to_field(bytes.storage)\n}\n\npub fn silo_l2_to_l1_message(msg: ScopedL2ToL1Message, rollup_version_id: Field, chain_id: Field) -> Field {\n if msg.contract_address.is_zero() {\n 0\n } else {\n compute_l2_to_l1_hash(\n msg.contract_address,\n msg.message.recipient,\n msg.message.content,\n rollup_version_id,\n chain_id\n )\n }\n}\n\n// Computes sha256 hash of 2 input hashes.\n//\n// NB: This method now takes in two 31 byte fields - it assumes that any input\n// is the result of a sha_to_field hash and => is truncated\n//\n// TODO(Jan and David): This is used for the encrypted_log hashes.\n// Can we check to see if we can just use hash_to_field or pedersen_compress here?\n//\npub fn accumulate_sha256(input: [Field; 2]) -> Field {\n // This is a note about the cpp code, since it takes an array of Fields\n // instead of a U128.\n // 4 Field elements when converted to bytes will usually\n // occupy 4 * 32 = 128 bytes.\n // However, this function is making the assumption that each Field\n // only occupies 128 bits.\n //\n // TODO(David): This does not seem to be getting guaranteed anywhere in the code?\n\n // Concatentate two fields into 32x2 = 64 bytes\n // accumulate_sha256 assumes that the inputs are pre-truncated 31 byte numbers\n let mut hash_input_flattened = [0; 64];\n for offset in 0..input.len() {\n let input_as_bytes: [u8; 32] = input[offset].to_be_bytes();\n for byte_index in 0..32 {\n hash_input_flattened[offset * 32 + byte_index] = input_as_bytes[byte_index];\n }\n }\n\n sha256_to_field(hash_input_flattened)\n}\n\n// Computes the final logs hash for a tx.\n// NB: this assumes MAX_ENCRYPTED_LOGS_PER_TX == MAX_UNENCRYPTED_LOGS_PER_TX\n// to avoid doubling code, since we can't define the byte len to be 32*N directly.\npub fn compute_tx_logs_hash(logs: [LogHash; MAX_ENCRYPTED_LOGS_PER_TX]) -> Field {\n // Convert each field element into a byte array and append the bytes to `hash_input_flattened`\n let mut hash_input_flattened = [0; MAX_ENCRYPTED_LOGS_PER_TX * 32];\n for offset in 0..MAX_ENCRYPTED_LOGS_PER_TX {\n let input_as_bytes: [u8; 32] = logs[offset].value.to_be_bytes();\n for byte_index in 0..32 {\n hash_input_flattened[offset * 32 + byte_index] = input_as_bytes[byte_index];\n }\n }\n // Ideally we would push to a slice then hash, but there is no sha_slice\n // Hardcode to 256 bytes for now\n let mut hash = sha256_to_field(hash_input_flattened);\n // Not having a 0 value hash for empty logs causes issues with empty txs\n // used for padding. Returning early is currently unsupported.\n // We always provide sorted logs here, so 0 being empty means all are empty.\n if is_empty(logs[0]) {\n hash = 0;\n }\n hash\n}\n\npub fn compute_tx_note_logs_hash(logs: [LogHash; MAX_NOTE_ENCRYPTED_LOGS_PER_TX]) -> Field {\n // Convert each field element into a byte array and append the bytes to `hash_input_flattened`\n let mut hash_input_flattened = [0; MAX_NOTE_ENCRYPTED_LOGS_PER_TX * 32];\n for offset in 0..MAX_NOTE_ENCRYPTED_LOGS_PER_TX {\n let input_as_bytes: [u8; 32] = logs[offset].value.to_be_bytes();\n for byte_index in 0..32 {\n hash_input_flattened[offset * 32 + byte_index] = input_as_bytes[byte_index];\n }\n }\n // Ideally we would push to a slice then hash, but there is no sha_slice\n // Hardcode to 256 bytes for now\n let mut hash = sha256_to_field(hash_input_flattened);\n // Not having a 0 value hash for empty logs causes issues with empty txs\n // used for padding. Returning early is currently unsupported.\n // We always provide sorted logs here, so 0 being empty means all are empty.\n if is_empty(logs[0]) {\n hash = 0;\n }\n hash\n}\n\npub fn pedersen_hash<let N: u32>(inputs: [Field; N], hash_index: u32) -> Field {\n std::hash::pedersen_hash_with_separator(inputs, hash_index)\n}\n\npub fn poseidon2_hash<let N: u32>(inputs: [Field; N]) -> Field {\n std::hash::poseidon2::Poseidon2::hash(inputs, N)\n}\n\n#[no_predicates]\npub fn poseidon2_hash_with_separator<let N: u32, T>(\n inputs: [Field; N],\n separator: T\n) -> Field where T: ToField {\n // We manually hash the inputs here, since we cannot express with the type system a constant size inputs array of N + 1\n let in_len = N + 1;\n let two_pow_64 = 18446744073709551616;\n let iv : Field = (in_len as Field) * two_pow_64;\n let mut sponge = std::hash::poseidon2::Poseidon2::new(iv);\n sponge.absorb(separator.to_field());\n\n for i in 0..inputs.len() {\n sponge.absorb(inputs[i]);\n }\n\n sponge.squeeze()\n}\n\npub fn poseidon2_hash_with_separator_slice<T>(inputs: [Field], separator: T) -> Field where T: ToField {\n let in_len = inputs.len() + 1;\n let two_pow_64 = 18446744073709551616;\n let iv : Field = (in_len as Field) * two_pow_64;\n let mut sponge = std::hash::poseidon2::Poseidon2::new(iv);\n sponge.absorb(separator.to_field());\n\n for i in 0..inputs.len() {\n sponge.absorb(inputs[i]);\n }\n\n sponge.squeeze()\n}\n\n#[no_predicates]\npub fn poseidon2_hash_bytes<let N: u32>(inputs: [u8; N]) -> Field {\n // We manually hash the inputs here, since we cannot express with the type system a constant size inputs array of Math.ceil(N/31)\n let mut in_len = N / 31;\n let mut has_padding = false;\n if N % 31 != 0 {\n in_len += 1;\n has_padding = true;\n }\n\n let two_pow_64 = 18446744073709551616;\n let iv : Field = (in_len as Field) * two_pow_64;\n let mut sponge = std::hash::poseidon2::Poseidon2::new(iv);\n\n let mut current_field = [0; 31];\n for i in 0..inputs.len() {\n let index = i % 31;\n current_field[index] = inputs[i];\n if index == 30 {\n sponge.absorb(field_from_bytes(current_field, false));\n current_field = [0; 31];\n }\n }\n if has_padding {\n sponge.absorb(field_from_bytes(current_field, false));\n }\n\n sponge.squeeze()\n}\n\n#[test]\nfn smoke_sha256_to_field() {\n let full_buffer = [\n 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19,\n 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39,\n 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59,\n 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79,\n 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99,\n 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 119,\n 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130, 131, 132, 133, 134, 135, 136, 137, 138, 139,\n 140, 141, 142, 143, 144, 145, 146, 147, 148, 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159\n ];\n let result = sha256_to_field(full_buffer);\n\n assert(result == 0x448ebbc9e1a31220a2f3830c18eef61b9bd070e5084b7fa2a359fe729184c7);\n\n // to show correctness of the current ver (truncate one byte) vs old ver (mod full bytes):\n let result_bytes = std::hash::sha256(full_buffer);\n let truncated_field = crate::utils::field::field_from_bytes_32_trunc(result_bytes);\n assert(truncated_field == result);\n let mod_res = result + (result_bytes[31] as Field);\n assert(mod_res == 0x448ebbc9e1a31220a2f3830c18eef61b9bd070e5084b7fa2a359fe729184e0);\n}\n\n#[test]\nfn compute_l2_l1_hash() {\n // All zeroes\n let hash_result = compute_l2_to_l1_hash(AztecAddress::from_field(0), EthAddress::zero(), 0, 0, 0);\n assert(hash_result == 0xb393978842a0fa3d3e1470196f098f473f9678e72463cb65ec4ab5581856c2);\n\n // Non-zero case\n let hash_result = compute_l2_to_l1_hash(AztecAddress::from_field(1), EthAddress::from_field(3), 5, 2, 4);\n assert(hash_result == 0x3f88c1044a05e5340ed20466276500f6d45ca5603913b9091e957161734e16);\n}\n\n#[test]\nfn silo_l2_to_l1_message_matches_typescript() {\n let version = 4;\n let chainId = 5;\n\n let hash = silo_l2_to_l1_message(\n ScopedL2ToL1Message {\n message: L2ToL1Message { recipient: EthAddress::from_field(1), content: 2, counter: 0 },\n contract_address: AztecAddress::from_field(3)\n },\n version,\n chainId\n );\n\n // The following value was generated by `l2_to_l1_message.test.ts`\n let hash_from_typescript = 0x00c6155d69febb9d5039b374dd4f77bf57b7c881709aa524a18acaa0bd57476a;\n\n assert_eq(hash, hash_from_typescript);\n}\n"},"277":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/contract_instance.nr","source":"use crate::{\n address::{aztec_address::AztecAddress, partial_address::PartialAddress, public_keys_hash::PublicKeysHash},\n contract_class_id::ContractClassId, constants::CONTRACT_INSTANCE_LENGTH,\n traits::{Deserialize, Hash, Serialize}\n};\n\nstruct ContractInstance {\n salt : Field,\n deployer: AztecAddress,\n contract_class_id : ContractClassId,\n initialization_hash : Field,\n public_keys_hash : PublicKeysHash,\n}\n\nimpl Eq for ContractInstance {\n fn eq(self, other: Self) -> bool {\n self.public_keys_hash.eq(other.public_keys_hash)\n & self.initialization_hash.eq(other.initialization_hash)\n & self.contract_class_id.eq(other.contract_class_id)\n & self.salt.eq(other.salt)\n }\n}\n\nimpl Serialize<CONTRACT_INSTANCE_LENGTH> for ContractInstance {\n fn serialize(self) -> [Field; CONTRACT_INSTANCE_LENGTH] {\n [\n self.salt,\n self.deployer.to_field(),\n self.contract_class_id.to_field(),\n self.initialization_hash,\n self.public_keys_hash.to_field()\n ]\n }\n}\n\nimpl Deserialize<CONTRACT_INSTANCE_LENGTH> for ContractInstance {\n fn deserialize(serialized: [Field; CONTRACT_INSTANCE_LENGTH]) -> Self {\n Self {\n salt: serialized[0],\n deployer: AztecAddress::from_field(serialized[1]),\n contract_class_id: ContractClassId::from_field(serialized[2]),\n initialization_hash: serialized[3],\n public_keys_hash: PublicKeysHash::from_field(serialized[4])\n }\n }\n}\n\nimpl Hash for ContractInstance {\n fn hash(self) -> Field {\n self.to_address().to_field()\n }\n}\n\nimpl ContractInstance {\n fn to_address(self) -> AztecAddress {\n AztecAddress::compute(\n self.public_keys_hash,\n PartialAddress::compute(\n self.contract_class_id,\n self.salt,\n self.initialization_hash,\n self.deployer\n )\n )\n }\n}\n"},"278":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/contract_class_id.nr","source":"use crate::constants::GENERATOR_INDEX__CONTRACT_LEAF;\nuse crate::traits::{ToField, FromField, Serialize, Deserialize};\n\nstruct ContractClassId {\n inner: Field\n}\n\nimpl Eq for ContractClassId {\n fn eq(self, other: ContractClassId) -> bool {\n other.inner == self.inner\n }\n}\n\nimpl ToField for ContractClassId {\n fn to_field(self) -> Field {\n self.inner\n }\n}\n\nimpl FromField for ContractClassId {\n fn from_field(value: Field) -> Self {\n Self { inner: value }\n }\n}\n\nimpl Serialize<1> for ContractClassId {\n fn serialize(self: Self) -> [Field; 1] {\n [self.inner]\n }\n}\n\nimpl Deserialize<1> for ContractClassId {\n fn deserialize(fields: [Field; 1]) -> Self {\n Self { inner: fields[0] }\n }\n}\n\nimpl ContractClassId {\n pub fn compute(\n artifact_hash: Field,\n private_functions_root: Field,\n public_bytecode_commitment: Field\n ) -> Self {\n let hash = crate::hash::poseidon2_hash_with_separator(\n [\n artifact_hash,\n private_functions_root,\n public_bytecode_commitment\n ],\n GENERATOR_INDEX__CONTRACT_LEAF\n ); // TODO(@spalladino): Update generator index\n\n ContractClassId::from_field(hash)\n }\n\n pub fn assert_is_zero(self) {\n assert(self.to_field() == 0);\n }\n}\n"},"289":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/merkle_tree/root.nr","source":"use crate::{hash::merkle_hash, merkle_tree::merkle_tree::MerkleTree};\n\n// Calculate the Merkle tree root from the sibling path and leaf.\n//\n// The leaf is hashed with its sibling, and then the result is hashed\n// with the next sibling etc in the path. The last hash is the root.\n//\n// TODO(David/Someone): The cpp code is using a uint256, whereas its\n// TODO a bit simpler in Noir to just have a bit array.\n// TODO: I'd generally like to avoid u256 for algorithms like\n// this because it means we never even need to consider cases where\n// the index is greater than p.\npub fn root_from_sibling_path<let N: u32>(\n leaf: Field,\n leaf_index: Field,\n sibling_path: [Field; N]\n) -> Field {\n let mut node = leaf;\n let indices: [u1; N] = leaf_index.to_le_bits();\n\n for i in 0..N {\n let (hash_left, hash_right) = if indices[i] == 1 {\n (sibling_path[i], node)\n } else {\n (node, sibling_path[i])\n };\n node = merkle_hash(hash_left, hash_right);\n }\n node\n}\n\npub fn calculate_subtree_root<let N: u32>(leaves: [Field; N]) -> Field {\n MerkleTree::new(leaves).get_root()\n}\n\n// These values are precomputed and we run tests to ensure that they\n// are correct. The values themselves were computed from the cpp code.\n//\n// Would be good if we could use width since the compute_subtree\n// algorithm uses depth.\npub fn calculate_empty_tree_root(depth: u32) -> Field {\n if depth == 0 {\n 0\n } else if depth == 1 {\n 0x0b63a53787021a4a962a452c2921b3663aff1ffd8d5510540f8e659e782956f1\n } else if depth == 2 {\n 0x0e34ac2c09f45a503d2908bcb12f1cbae5fa4065759c88d501c097506a8b2290\n } else if depth == 3 {\n 0x21f9172d72fdcdafc312eee05cf5092980dda821da5b760a9fb8dbdf607c8a20\n } else if depth == 4 {\n 0x2373ea368857ec7af97e7b470d705848e2bf93ed7bef142a490f2119bcf82d8e\n } else if depth == 5 {\n 0x120157cfaaa49ce3da30f8b47879114977c24b266d58b0ac18b325d878aafddf\n } else if depth == 6 {\n 0x01c28fe1059ae0237b72334700697bdf465e03df03986fe05200cadeda66bd76\n } else if depth == 7 {\n 0x2d78ed82f93b61ba718b17c2dfe5b52375b4d37cbbed6f1fc98b47614b0cf21b\n } else if depth == 8 {\n 0x067243231eddf4222f3911defbba7705aff06ed45960b27f6f91319196ef97e1\n } else if depth == 9 {\n 0x1849b85f3c693693e732dfc4577217acc18295193bede09ce8b97ad910310972\n } else if depth == 10 {\n 0x2a775ea761d20435b31fa2c33ff07663e24542ffb9e7b293dfce3042eb104686\n } else {\n assert(false, \"depth should be between 0 and 10\");\n 0\n }\n}\n\n#[test]\nfn test_merkle_root_interop_test() {\n // This is a test to ensure that we match the cpp implementation.\n // You can grep for `TEST_F(root_rollup_tests, noir_interop_test)`\n // to find the test that matches this.\n let root = calculate_subtree_root([1, 2, 3, 4, 1, 2, 3, 4, 1, 2, 3, 4, 1, 2, 3, 4]);\n assert(0x1a09d935ae110b4c861fcec8f9099ec30b4485022aeb3d3cf9d7168e38fdc231 == root);\n\n let empty_root = calculate_subtree_root([0; 16]);\n assert(0x2373ea368857ec7af97e7b470d705848e2bf93ed7bef142a490f2119bcf82d8e == empty_root);\n}\n\n#[test]\nfn test_empty_subroot() {\n assert(calculate_empty_tree_root(0) == 0);\n\n let expected_empty_root_2 = calculate_subtree_root([0; 2]);\n assert(calculate_empty_tree_root(1) == expected_empty_root_2);\n\n let expected_empty_root_4 = calculate_subtree_root([0; 4]);\n assert(calculate_empty_tree_root(2) == expected_empty_root_4);\n\n let expected_empty_root_8 = calculate_subtree_root([0; 8]);\n assert(calculate_empty_tree_root(3) == expected_empty_root_8);\n\n let expected_empty_root_16 = calculate_subtree_root([0; 16]);\n assert(calculate_empty_tree_root(4) == expected_empty_root_16);\n\n let expected_empty_root_32 = calculate_subtree_root([0; 32]);\n assert(calculate_empty_tree_root(5) == expected_empty_root_32);\n\n let expected_empty_root_64 = calculate_subtree_root([0; 64]);\n assert(calculate_empty_tree_root(6) == expected_empty_root_64);\n\n let expected_empty_root_128 = calculate_subtree_root([0; 128]);\n assert(calculate_empty_tree_root(7) == expected_empty_root_128);\n\n let expected_empty_root_256 = calculate_subtree_root([0; 256]);\n assert(calculate_empty_tree_root(8) == expected_empty_root_256);\n\n let expected_empty_root_512 = calculate_subtree_root([0; 512]);\n assert(calculate_empty_tree_root(9) == expected_empty_root_512);\n\n let expected_empty_root_1024 = calculate_subtree_root([0; 1024]);\n assert(calculate_empty_tree_root(10) == expected_empty_root_1024);\n}\n"},"29":{"path":"std/hash/mod.nr","source":"mod poseidon;\nmod mimc;\nmod poseidon2;\nmod keccak;\nmod sha256;\nmod sha512;\n\nuse crate::default::Default;\nuse crate::uint128::U128;\nuse crate::collections::vec::Vec;\nuse crate::embedded_curve_ops::{EmbeddedCurvePoint, EmbeddedCurveScalar, multi_scalar_mul, multi_scalar_mul_slice};\nuse crate::meta::derive_via;\n\n// Kept for backwards compatibility\npub use sha256::{digest, sha256, sha256_compression, sha256_var};\n\n#[foreign(blake2s)]\n// docs:start:blake2s\npub fn blake2s<let N: u32>(input: [u8; N]) -> [u8; 32]\n// docs:end:blake2s\n{}\n\n#[foreign(blake3)]\n// docs:start:blake3\npub fn blake3<let N: u32>(input: [u8; N]) -> [u8; 32]\n// docs:end:blake3\n{}\n\n// docs:start:pedersen_commitment\npub fn pedersen_commitment<let N: u32>(input: [Field; N]) -> EmbeddedCurvePoint {\n // docs:end:pedersen_commitment\n pedersen_commitment_with_separator(input, 0)\n}\n\npub fn pedersen_hash_with_separator<let N: u32>(input: [Field; N], separator: u32) -> Field {\n __pedersen_hash_with_separator(input, separator)\n}\n\nfn pedersen_commitment_with_separator<let N: u32>(input: [Field; N], separator: u32) -> EmbeddedCurvePoint {\n let value = __pedersen_commitment_with_separator(input, separator);\n if (value[0] == 0) & (value[1] == 0) {\n EmbeddedCurvePoint { x: 0, y: 0, is_infinite: true }\n } else {\n EmbeddedCurvePoint { x: value[0], y: value[1], is_infinite: false }\n }\n}\n\n#[no_predicates]\nfn pedersen_commitment_with_separator_noir<let N: u32>(input: [Field; N], separator: u32) -> EmbeddedCurvePoint {\n let mut points = [EmbeddedCurveScalar { lo: 0, hi: 0 }; N];\n for i in 0..N {\n // we use the unsafe version because the multi_scalar_mul will constrain the scalars.\n points[i] = from_field_unsafe(input[i]);\n }\n let generators = derive_generators(\"DEFAULT_DOMAIN_SEPARATOR\".as_bytes(), separator);\n multi_scalar_mul(generators, points)\n}\n\n#[no_predicates]\nfn pedersen_hash_with_separator_noir<let N: u32>(input: [Field; N], separator: u32) -> Field {\n let mut scalars: Vec<EmbeddedCurveScalar> = Vec::from_slice([EmbeddedCurveScalar { lo: 0, hi: 0 }; N].as_slice()); //Vec::new();\n\n for i in 0..N {\n scalars.set(i, from_field_unsafe(input[i]));\n }\n scalars.push(EmbeddedCurveScalar { lo: N as Field, hi: 0 as Field });\n let domain_generators :[EmbeddedCurvePoint; N]= derive_generators(\"DEFAULT_DOMAIN_SEPARATOR\".as_bytes(), separator);\n let mut vec_generators = Vec::new();\n for i in 0..N {\n vec_generators.push(domain_generators[i]);\n }\n let length_generator : [EmbeddedCurvePoint; 1] = derive_generators(\"pedersen_hash_length\".as_bytes(), 0);\n vec_generators.push(length_generator[0]);\n multi_scalar_mul_slice(vec_generators.slice, scalars.slice)[0]\n}\n\n// docs:start:pedersen_hash\npub fn pedersen_hash<let N: u32>(input: [Field; N]) -> Field\n// docs:end:pedersen_hash\n{\n __pedersen_hash_with_separator(input, 0)\n}\n\n#[foreign(pedersen_hash)]\nfn __pedersen_hash_with_separator<let N: u32>(input: [Field; N], separator: u32) -> Field {}\n\n#[foreign(pedersen_commitment)]\nfn __pedersen_commitment_with_separator<let N: u32>(input: [Field; N], separator: u32) -> [Field; 2] {}\n\n#[field(bn254)]\nfn derive_generators<let N: u32, let M: u32>(domain_separator_bytes: [u8; M], starting_index: u32) -> [EmbeddedCurvePoint; N] {\n crate::assert_constant(domain_separator_bytes);\n // TODO(https://github.com/noir-lang/noir/issues/5672): Add back assert_constant on starting_index\n __derive_generators(domain_separator_bytes, starting_index)\n}\n\n#[builtin(derive_pedersen_generators)]\n#[field(bn254)]\nfn __derive_generators<let N: u32, let M: u32>(\n domain_separator_bytes: [u8; M],\n starting_index: u32\n) -> [EmbeddedCurvePoint; N] {}\n\n#[field(bn254)]\n // Same as from_field but:\n // does not assert the limbs are 128 bits\n // does not assert the decomposition does not overflow the EmbeddedCurveScalar\n fn from_field_unsafe(scalar: Field) -> EmbeddedCurveScalar {\n let (xlo, xhi) = unsafe {\n crate::field::bn254::decompose_hint(scalar)\n };\n // Check that the decomposition is correct\n assert_eq(scalar, xlo + crate::field::bn254::TWO_POW_128 * xhi);\n EmbeddedCurveScalar { lo: xlo, hi: xhi }\n}\n\npub fn hash_to_field(inputs: [Field]) -> Field {\n let mut sum = 0;\n\n for input in inputs {\n let input_bytes: [u8; 32] = input.to_le_bytes();\n sum += crate::field::bytes32_to_field(blake2s(input_bytes));\n }\n\n sum\n}\n\n// docs:start:keccak256\npub fn keccak256<let N: u32>(input: [u8; N], message_size: u32) -> [u8; 32]\n// docs:end:keccak256\n{\n crate::hash::keccak::keccak256(input, message_size)\n}\n\n#[foreign(poseidon2_permutation)]\npub fn poseidon2_permutation<let N: u32>(_input: [Field; N], _state_length: u32) -> [Field; N] {}\n\n// Generic hashing support. \n// Partially ported and impacted by rust.\n\n// Hash trait shall be implemented per type.\n#[derive_via(derive_hash)]\ntrait Hash {\n fn hash<H>(self, state: &mut H) where H: Hasher;\n}\n\n// docs:start:derive_hash\ncomptime fn derive_hash(s: StructDefinition) -> Quoted {\n let name = quote { Hash };\n let signature = quote { fn hash<H>(_self: Self, _state: &mut H) where H: std::hash::Hasher };\n let for_each_field = |name| quote { _self.$name.hash(_state); };\n crate::meta::make_trait_impl(s, name, signature, for_each_field, quote {}, |fields| fields)\n}\n// docs:end:derive_hash\n\n// Hasher trait shall be implemented by algorithms to provide hash-agnostic means.\n// TODO: consider making the types generic here ([u8], [Field], etc.)\ntrait Hasher{\n fn finish(self) -> Field;\n \n fn write(&mut self, input: Field);\n}\n\n// BuildHasher is a factory trait, responsible for production of specific Hasher.\ntrait BuildHasher<H> where H: Hasher{\n fn build_hasher(self) -> H;\n}\n\nstruct BuildHasherDefault<H>;\n\nimpl<H> BuildHasher<H> for BuildHasherDefault<H>\nwhere \n H: Hasher + Default {\n fn build_hasher(_self: Self) -> H {\n H::default()\n }\n}\n\nimpl<H> Default for BuildHasherDefault<H>\nwhere \n H: Hasher + Default {\n fn default() -> Self {\n BuildHasherDefault {}\n }\n}\n\nimpl Hash for Field {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self);\n }\n}\n\nimpl Hash for u1 {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for u8 {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for u16 {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for u32 {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for u64 {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for i8 {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for i16 {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for i32 {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for i64 {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for bool {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for () {\n fn hash<H>(_self: Self, _state: &mut H) where H: Hasher {}\n}\n\nimpl Hash for U128 {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n H::write(state, self.lo as Field);\n H::write(state, self.hi as Field);\n }\n}\n\nimpl<T, let N: u32> Hash for [T; N] where T: Hash {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n for elem in self {\n elem.hash(state);\n }\n }\n}\n\nimpl<T> Hash for [T] where T: Hash {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n self.len().hash(state);\n for elem in self {\n elem.hash(state);\n }\n }\n}\n\nimpl<A, B> Hash for (A, B) where A: Hash, B: Hash {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n self.0.hash(state);\n self.1.hash(state);\n }\n}\n\nimpl<A, B, C> Hash for (A, B, C) where A: Hash, B: Hash, C: Hash {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n self.0.hash(state);\n self.1.hash(state);\n self.2.hash(state);\n }\n}\n\nimpl<A, B, C, D> Hash for (A, B, C, D) where A: Hash, B: Hash, C: Hash, D: Hash {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n self.0.hash(state);\n self.1.hash(state);\n self.2.hash(state);\n self.3.hash(state);\n }\n}\n\nimpl<A, B, C, D, E> Hash for (A, B, C, D, E) where A: Hash, B: Hash, C: Hash, D: Hash, E: Hash {\n fn hash<H>(self, state: &mut H) where H: Hasher {\n self.0.hash(state);\n self.1.hash(state);\n self.2.hash(state);\n self.3.hash(state);\n self.4.hash(state);\n }\n}\n\n// Some test vectors for Pedersen hash and Pedersen Commitment.\n// They have been generated using the same functions so the tests are for now useless\n// but they will be useful when we switch to Noir implementation.\n#[test]\nfn assert_pedersen() {\n assert_eq(\n pedersen_hash_with_separator([1], 1), 0x1b3f4b1a83092a13d8d1a59f7acb62aba15e7002f4440f2275edb99ebbc2305f\n );\n assert_eq(\n pedersen_commitment_with_separator([1], 1), EmbeddedCurvePoint {\n x: 0x054aa86a73cb8a34525e5bbed6e43ba1198e860f5f3950268f71df4591bde402,\n y: 0x209dcfbf2cfb57f9f6046f44d71ac6faf87254afc7407c04eb621a6287cac126,\n is_infinite: false\n }\n );\n\n assert_eq(\n pedersen_hash_with_separator([1, 2], 2), 0x26691c129448e9ace0c66d11f0a16d9014a9e8498ee78f4d69f0083168188255\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2], 2), EmbeddedCurvePoint {\n x: 0x2e2b3b191e49541fe468ec6877721d445dcaffe41728df0a0eafeb15e87b0753,\n y: 0x2ff4482400ad3a6228be17a2af33e2bcdf41be04795f9782bd96efe7e24f8778,\n is_infinite: false\n }\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3], 3), 0x0bc694b7a1f8d10d2d8987d07433f26bd616a2d351bc79a3c540d85b6206dbe4\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3], 3), EmbeddedCurvePoint {\n x: 0x1fee4e8cf8d2f527caa2684236b07c4b1bad7342c01b0f75e9a877a71827dc85,\n y: 0x2f9fedb9a090697ab69bf04c8bc15f7385b3e4b68c849c1536e5ae15ff138fd1,\n is_infinite: false\n }\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4], 4), 0xdae10fb32a8408521803905981a2b300d6a35e40e798743e9322b223a5eddc\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4], 4), EmbeddedCurvePoint {\n x: 0x07ae3e202811e1fca39c2d81eabe6f79183978e6f12be0d3b8eda095b79bdbc9,\n y: 0x0afc6f892593db6fbba60f2da558517e279e0ae04f95758587760ba193145014,\n is_infinite: false\n }\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5], 5), 0xfc375b062c4f4f0150f7100dfb8d9b72a6d28582dd9512390b0497cdad9c22\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5], 5), EmbeddedCurvePoint {\n x: 0x1754b12bd475a6984a1094b5109eeca9838f4f81ac89c5f0a41dbce53189bb29,\n y: 0x2da030e3cfcdc7ddad80eaf2599df6692cae0717d4e9f7bfbee8d073d5d278f7,\n is_infinite: false\n }\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5, 6], 6), 0x1696ed13dc2730062a98ac9d8f9de0661bb98829c7582f699d0273b18c86a572\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6], 6), EmbeddedCurvePoint {\n x: 0x190f6c0e97ad83e1e28da22a98aae156da083c5a4100e929b77e750d3106a697,\n y: 0x1f4b60f34ef91221a0b49756fa0705da93311a61af73d37a0c458877706616fb,\n is_infinite: false\n }\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5, 6, 7], 7), 0x128c0ff144fc66b6cb60eeac8a38e23da52992fc427b92397a7dffd71c45ede3\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6, 7], 7), EmbeddedCurvePoint {\n x: 0x015441e9d29491b06563fac16fc76abf7a9534c715421d0de85d20dbe2965939,\n y: 0x1d2575b0276f4e9087e6e07c2cb75aa1baafad127af4be5918ef8a2ef2fea8fc,\n is_infinite: false\n }\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5, 6, 7, 8], 8), 0x2f960e117482044dfc99d12fece2ef6862fba9242be4846c7c9a3e854325a55c\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6, 7, 8], 8), EmbeddedCurvePoint {\n x: 0x1657737676968887fceb6dd516382ea13b3a2c557f509811cd86d5d1199bc443,\n y: 0x1f39f0cb569040105fa1e2f156521e8b8e08261e635a2b210bdc94e8d6d65f77,\n is_infinite: false\n }\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5, 6, 7, 8, 9], 9), 0x0c96db0790602dcb166cc4699e2d306c479a76926b81c2cb2aaa92d249ec7be7\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6, 7, 8, 9], 9), EmbeddedCurvePoint {\n x: 0x0a3ceae42d14914a432aa60ec7fded4af7dad7dd4acdbf2908452675ec67e06d,\n y: 0xfc19761eaaf621ad4aec9a8b2e84a4eceffdba78f60f8b9391b0bd9345a2f2,\n is_infinite: false\n }\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5, 6, 7, 8, 9, 10], 10), 0x2cd37505871bc460a62ea1e63c7fe51149df5d0801302cf1cbc48beb8dff7e94\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6, 7, 8, 9, 10], 10), EmbeddedCurvePoint {\n x: 0x2fb3f8b3d41ddde007c8c3c62550f9a9380ee546fcc639ffbb3fd30c8d8de30c,\n y: 0x300783be23c446b11a4c0fabf6c91af148937cea15fcf5fb054abf7f752ee245,\n is_infinite: false\n }\n );\n}\n\n"},"293":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/utils/reader.nr","source":"struct Reader<let N: u32> {\n data: [Field; N],\n offset: u32,\n}\n\nimpl<let N: u32> Reader<N> {\n pub fn new(data: [Field; N]) -> Self {\n Self { data, offset: 0 }\n }\n\n pub fn read(&mut self) -> Field {\n let result = self.data[self.offset];\n self.offset += 1;\n result\n }\n\n pub fn read_u32(&mut self) -> u32 {\n self.read() as u32\n }\n\n pub fn read_bool(&mut self) -> bool {\n self.read() as bool\n }\n\n pub fn read_array<let K: u32>(&mut self, mut result: [Field; K]) -> [Field; K] {\n for i in 0..K {\n result[i] = self.data[self.offset + i];\n }\n self.offset += K;\n result\n }\n\n // TODO(#4394)\n pub fn read_struct<T, let K: u32>(&mut self, deserialise: fn([Field; K]) -> T) -> T {\n let result = deserialise(self.read_array([0; K]));\n result\n }\n\n pub fn read_struct_array<T, let K: u32, let C: u32>(&mut self, deserialise: fn([Field; K]) -> T, mut result: [T; C]) -> [T; C] {\n for i in 0..C {\n result[i] = self.read_struct(deserialise);\n }\n result\n }\n\n pub fn finish(self) {\n assert(self.offset == self.data.len(), \"Reader did not read all data\");\n }\n}\n"},"311":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/utils/field.nr","source":"pub fn field_from_bytes<let N: u32>(bytes: [u8; N], big_endian: bool) -> Field {\n assert(bytes.len() < 32, \"field_from_bytes: N must be less than 32\");\n let mut as_field = 0;\n let mut offset = 1;\n for i in 0..N {\n let mut index = i;\n if big_endian {\n index = N - i - 1;\n }\n as_field += (bytes[index] as Field) * offset;\n offset *= 256;\n }\n\n as_field\n}\n\n// Convert a 32 byte array to a field element by truncating the final byte\npub fn field_from_bytes_32_trunc(bytes32: [u8; 32]) -> Field {\n // Convert it to a field element\n let mut v = 1;\n let mut high = 0 as Field;\n let mut low = 0 as Field;\n\n for i in 0..15 {\n // covers bytes 16..30 (31 is truncated and ignored)\n low = low + (bytes32[15 + 15 - i] as Field) * v;\n v = v * 256;\n // covers bytes 0..14\n high = high + (bytes32[14 - i] as Field) * v;\n }\n // covers byte 15\n low = low + (bytes32[15] as Field) * v;\n\n low + high * v\n}\n\n// TODO to radix returns u8, so we cannot use bigger radixes. It'd be ideal to use a radix of the maximum range-constrained integer noir supports\npub fn full_field_less_than(lhs: Field, rhs: Field) -> bool {\n lhs.lt(rhs)\n}\n\npub fn full_field_greater_than(lhs: Field, rhs: Field) -> bool {\n rhs.lt(lhs)\n}\n\n#[test]\nunconstrained fn bytes_field_test() {\n // Tests correctness of field_from_bytes_32_trunc against existing methods\n // Bytes representing 0x543e0a6642ffeb8039296861765a53407bba62bd1c97ca43374de950bbe0a7\n let inputs = [\n 84, 62, 10, 102, 66, 255, 235, 128, 57, 41, 104, 97, 118, 90, 83, 64, 123, 186, 98, 189, 28, 151, 202, 67, 55, 77, 233, 80, 187, 224, 167\n ];\n let field = field_from_bytes(inputs, true);\n let return_bytes: [u8; 31] = field.to_be_bytes();\n for i in 0..31 {\n assert_eq(inputs[i], return_bytes[i]);\n }\n // 32 bytes - we remove the final byte, and check it matches the field\n let inputs2 = [\n 84, 62, 10, 102, 66, 255, 235, 128, 57, 41, 104, 97, 118, 90, 83, 64, 123, 186, 98, 189, 28, 151, 202, 67, 55, 77, 233, 80, 187, 224, 167, 158\n ];\n let field2 = field_from_bytes_32_trunc(inputs2);\n let return_bytes2: [u8; 31] = field.to_be_bytes();\n\n for i in 0..31 {\n assert_eq(return_bytes2[i], return_bytes[i]);\n }\n assert_eq(field2, field);\n}\n\n#[test]\nunconstrained fn max_field_test() {\n // Tests the hardcoded value in constants.nr vs underlying modulus\n // NB: We can't use 0-1 in constants.nr as it will be transpiled incorrectly to ts and sol constants files\n let max_value = crate::constants::MAX_FIELD_VALUE;\n assert_eq(max_value, 0 - 1);\n // modulus == 0 is tested elsewhere, so below is more of a sanity check\n let max_bytes: [u8; 32] = max_value.to_be_bytes();\n let mod_bytes = std::field::modulus_be_bytes();\n for i in 0..31 {\n assert_eq(max_bytes[i], mod_bytes[i]);\n }\n assert_eq(max_bytes[31], mod_bytes[31] - 1);\n}\n"},"313":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/utils/mod.nr","source":"// general util packages/modules are usually bad practice\n// because there is no criteria for what we should not put in here.\n// Reducing the size of this package would be welcome.\n\nmod arrays;\nmod field;\nmod reader;\nmod uint256;\n\n// if predicate == true then return lhs, else return rhs\npub fn conditional_assign(predicate: bool, lhs: Field, rhs: Field) -> Field {\n if predicate { lhs } else { rhs }\n}\n\npub fn arr_copy_slice<T, let N: u32, let M: u32>(src: [T; N], mut dst: [T; M], offset: u32) -> [T; M] {\n let iterator_len = if N > M { M } else { N };\n for i in 0..iterator_len {\n dst[i] = src[i + offset];\n }\n dst\n}\n"},"325":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/address/eth_address.nr","source":"use crate::{constants::ETH_ADDRESS_LENGTH, traits::{Empty, ToField, Serialize, Deserialize}, utils};\n\nstruct EthAddress{\n inner : Field\n}\n\nimpl Eq for EthAddress {\n fn eq(self, other: Self) -> bool {\n self.to_field() == other.to_field()\n }\n}\n\nimpl Empty for EthAddress {\n fn empty() -> Self {\n Self { inner: 0 }\n }\n}\n\nimpl ToField for EthAddress {\n fn to_field(self) -> Field {\n self.inner\n }\n}\n\nimpl Serialize<ETH_ADDRESS_LENGTH> for EthAddress {\n fn serialize(self: Self) -> [Field; ETH_ADDRESS_LENGTH] {\n [self.inner]\n }\n}\n\nimpl Deserialize<ETH_ADDRESS_LENGTH> for EthAddress {\n fn deserialize(fields: [Field; ETH_ADDRESS_LENGTH]) -> Self {\n EthAddress::from_field(fields[0])\n }\n}\n\nimpl EthAddress {\n pub fn zero() -> Self {\n Self { inner: 0 }\n }\n\n pub fn from_field(field: Field) -> Self {\n field.assert_max_bit_size(160);\n Self { inner: field }\n }\n\n pub fn is_zero(self) -> bool {\n self.inner == 0\n }\n\n pub fn assert_is_zero(self) {\n assert(self.to_field() == 0);\n }\n\n pub fn conditional_assign(predicate: bool, lhs: Self, rhs: Self) -> Self {\n let result = utils::conditional_assign(predicate, rhs.to_field(), lhs.to_field());\n Self { inner: result }\n }\n}\n"},"326":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/address/aztec_address.nr","source":"use crate::{\n crate::address::{partial_address::PartialAddress, public_keys_hash::PublicKeysHash},\n constants::{AZTEC_ADDRESS_LENGTH, GENERATOR_INDEX__CONTRACT_ADDRESS_V1},\n hash::poseidon2_hash_with_separator, traits::{Empty, FromField, ToField, Serialize, Deserialize},\n utils\n};\n\n// Aztec address\nstruct AztecAddress {\n inner : Field\n}\n\nimpl Eq for AztecAddress {\n fn eq(self, other: Self) -> bool {\n self.to_field() == other.to_field()\n }\n}\n\nimpl Empty for AztecAddress {\n fn empty() -> Self {\n Self { inner: 0 }\n }\n}\n\nimpl ToField for AztecAddress {\n fn to_field(self) -> Field {\n self.inner\n }\n}\n\nimpl FromField for AztecAddress {\n fn from_field(value: Field) -> AztecAddress {\n AztecAddress { inner: value }\n }\n}\n\nimpl Serialize<AZTEC_ADDRESS_LENGTH> for AztecAddress {\n fn serialize(self: Self) -> [Field; AZTEC_ADDRESS_LENGTH] {\n [self.to_field()]\n }\n}\n\nimpl Deserialize<AZTEC_ADDRESS_LENGTH> for AztecAddress {\n fn deserialize(fields: [Field; AZTEC_ADDRESS_LENGTH]) -> Self {\n FromField::from_field(fields[0])\n }\n}\n\nimpl AztecAddress {\n pub fn zero() -> Self {\n Self { inner: 0 }\n }\n\n pub fn compute(pub_keys_hash: PublicKeysHash, partial_address: PartialAddress) -> AztecAddress {\n AztecAddress::from_field(\n poseidon2_hash_with_separator(\n [pub_keys_hash.to_field(), partial_address.to_field()],\n GENERATOR_INDEX__CONTRACT_ADDRESS_V1\n )\n )\n }\n\n pub fn is_zero(self) -> bool {\n self.inner == 0\n }\n\n pub fn assert_is_zero(self) {\n assert(self.to_field() == 0);\n }\n\n pub fn conditional_assign(predicate: bool, lhs: Self, rhs: Self) -> Self {\n let result = utils::conditional_assign(predicate, rhs.to_field(), lhs.to_field());\n Self { inner: result }\n }\n}\n\n#[test]\nfn compute_address_from_partial_and_pub_keys_hash() {\n let pub_keys_hash = PublicKeysHash::from_field(1);\n let partial_address = PartialAddress::from_field(2);\n\n let address = AztecAddress::compute(pub_keys_hash, partial_address);\n let expected_computed_address_from_partial_and_pubkey = 0x23ce9be3fa3c846b0f9245cc796902e731d04f086e8a42473bb29e405fc98075;\n assert(address.to_field() == expected_computed_address_from_partial_and_pubkey);\n}\n\n#[test]\nfn from_field_to_field() {\n let address = AztecAddress { inner: 37 };\n assert_eq(FromField::from_field(address.to_field()), address);\n}\n\n#[test]\nfn serde() {\n let address = AztecAddress { inner: 37 };\n assert_eq(Deserialize::deserialize(address.serialize()), address);\n}\n"},"328":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/address/partial_address.nr","source":"use crate::{\n address::{salted_initialization_hash::SaltedInitializationHash, aztec_address::AztecAddress},\n constants::GENERATOR_INDEX__PARTIAL_ADDRESS, contract_class_id::ContractClassId,\n hash::poseidon2_hash_with_separator, traits::{ToField, Serialize, Deserialize}\n};\n\nglobal PARTIAL_ADDRESS_LENGTH = 1;\n\n// Partial address\nstruct PartialAddress {\n inner : Field\n}\n\nimpl ToField for PartialAddress {\n fn to_field(self) -> Field {\n self.inner\n }\n}\n\nimpl Serialize<PARTIAL_ADDRESS_LENGTH> for PartialAddress {\n fn serialize(self: Self) -> [Field; PARTIAL_ADDRESS_LENGTH] {\n [self.to_field()]\n }\n}\n\nimpl Deserialize<PARTIAL_ADDRESS_LENGTH> for PartialAddress {\n fn deserialize(fields: [Field; PARTIAL_ADDRESS_LENGTH]) -> Self {\n PartialAddress { inner: fields[0] }\n }\n}\n\nimpl PartialAddress {\n pub fn from_field(field: Field) -> Self {\n Self { inner: field }\n }\n\n pub fn compute(\n contract_class_id: ContractClassId,\n salt: Field,\n initialization_hash: Field,\n deployer: AztecAddress\n ) -> Self {\n PartialAddress::compute_from_salted_initialization_hash(\n contract_class_id,\n SaltedInitializationHash::compute(salt, initialization_hash, deployer)\n )\n }\n\n pub fn compute_from_salted_initialization_hash(\n contract_class_id: ContractClassId,\n salted_initialization_hash: SaltedInitializationHash\n ) -> Self {\n PartialAddress::from_field(\n poseidon2_hash_with_separator(\n [\n contract_class_id.to_field(),\n salted_initialization_hash.to_field()\n ],\n GENERATOR_INDEX__PARTIAL_ADDRESS\n )\n )\n }\n\n pub fn to_field(self) -> Field {\n self.inner\n }\n\n pub fn is_zero(self) -> bool {\n self.to_field() == 0\n }\n\n pub fn assert_is_zero(self) {\n assert(self.to_field() == 0);\n }\n}\n"},"329":{"path":"/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/address/salted_initialization_hash.nr","source":"use crate::{\n address::{aztec_address::AztecAddress}, constants::GENERATOR_INDEX__PARTIAL_ADDRESS,\n hash::poseidon2_hash_with_separator, traits::ToField\n};\n\n// Salted initialization hash. Used in the computation of a partial address.\nstruct SaltedInitializationHash {\n inner: Field\n}\n\nimpl ToField for SaltedInitializationHash {\n fn to_field(self) -> Field {\n self.inner\n }\n}\n\nimpl SaltedInitializationHash {\n pub fn from_field(field: Field) -> Self {\n Self { inner: field }\n }\n\n pub fn compute(salt: Field, initialization_hash: Field, deployer: AztecAddress) -> Self {\n SaltedInitializationHash::from_field(\n poseidon2_hash_with_separator(\n [\n salt,\n initialization_hash,\n deployer.to_field()\n ],\n GENERATOR_INDEX__PARTIAL_ADDRESS\n )\n )\n }\n\n pub fn assert_is_zero(self) {\n assert(self.to_field() == 0);\n }\n}\n"},"34":{"path":"std/hash/poseidon2.nr","source":"use crate::hash::Hasher;\nuse crate::default::Default;\n\ncomptime global RATE: u32 = 3;\n\nstruct Poseidon2 {\n cache: [Field;3],\n state: [Field;4],\n cache_size: u32,\n squeeze_mode: bool, // 0 => absorb, 1 => squeeze\n}\n\nimpl Poseidon2 {\n #[no_predicates]\n pub fn hash<let N: u32>(input: [Field; N], message_size: u32) -> Field {\n if message_size == N {\n Poseidon2::hash_internal(input, N, false)\n } else {\n Poseidon2::hash_internal(input, message_size, true)\n }\n }\n\n fn new(iv: Field) -> Poseidon2 {\n let mut result = Poseidon2 { cache: [0; 3], state: [0; 4], cache_size: 0, squeeze_mode: false };\n result.state[RATE] = iv;\n result\n }\n\n fn perform_duplex(&mut self) {\n // add the cache into sponge state\n for i in 0..RATE {\n // We effectively zero-pad the cache by only adding to the state\n // cache that is less than the specified `cache_size`\n if i < self.cache_size {\n self.state[i] += self.cache[i];\n }\n }\n self.state = crate::hash::poseidon2_permutation(self.state, 4);\n }\n\n fn absorb(&mut self, input: Field) {\n assert(!self.squeeze_mode);\n if self.cache_size == RATE {\n // If we're absorbing, and the cache is full, apply the sponge permutation to compress the cache\n self.perform_duplex();\n self.cache[0] = input;\n self.cache_size = 1;\n } else {\n // If we're absorbing, and the cache is not full, add the input into the cache\n self.cache[self.cache_size] = input;\n self.cache_size += 1;\n }\n }\n\n fn squeeze(&mut self) -> Field {\n assert(!self.squeeze_mode);\n // If we're in absorb mode, apply sponge permutation to compress the cache.\n self.perform_duplex();\n self.squeeze_mode = true;\n\n // Pop one item off the top of the permutation and return it.\n self.state[0]\n }\n\n fn hash_internal<let N: u32>(input: [Field; N], in_len: u32, is_variable_length: bool) -> Field {\n let two_pow_64 = 18446744073709551616;\n let iv : Field = (in_len as Field) * two_pow_64;\n let mut sponge = Poseidon2::new(iv);\n for i in 0..input.len() {\n if i < in_len {\n sponge.absorb(input[i]);\n }\n }\n\n // In the case where the hash preimage is variable-length, we append `1` to the end of the input, to distinguish\n // from fixed-length hashes. (the combination of this additional field element + the hash IV ensures\n // fixed-length and variable-length hashes do not collide)\n if is_variable_length {\n sponge.absorb(1);\n }\n sponge.squeeze()\n }\n}\n\nstruct Poseidon2Hasher{\n _state: [Field],\n}\n\nimpl Hasher for Poseidon2Hasher {\n fn finish(self) -> Field {\n let iv : Field = (self._state.len() as Field) * 18446744073709551616; // iv = (self._state.len() << 64)\n let mut sponge = Poseidon2::new(iv);\n for i in 0..self._state.len() {\n sponge.absorb(self._state[i]);\n }\n sponge.squeeze()\n }\n\n fn write(&mut self, input: Field) {\n self._state = self._state.push_back(input);\n }\n}\n\nimpl Default for Poseidon2Hasher {\n fn default() -> Self {\n Poseidon2Hasher { _state: &[] }\n }\n}\n"},"377":{"path":"/usr/src/noir-projects/noir-contracts/contracts/contract_class_registerer_contract/src/main.nr","source":"mod events;\nmod capsule;\n\ncontract ContractClassRegisterer {\n use dep::aztec::prelude::{AztecAddress, EthAddress, FunctionSelector};\n use dep::aztec::protocol_types::{\n contract_class_id::ContractClassId,\n constants::{\n ARTIFACT_FUNCTION_TREE_MAX_HEIGHT, FUNCTION_TREE_HEIGHT,\n MAX_PACKED_BYTECODE_SIZE_PER_PRIVATE_FUNCTION_IN_FIELDS,\n MAX_PACKED_BYTECODE_SIZE_PER_UNCONSTRAINED_FUNCTION_IN_FIELDS,\n MAX_PACKED_PUBLIC_BYTECODE_SIZE_IN_FIELDS, REGISTERER_CONTRACT_CLASS_REGISTERED_MAGIC_VALUE\n },\n traits::Serialize, abis::log_hash::LogHash\n };\n\n use dep::aztec::{context::PrivateContext, oracle::logs::emit_contract_class_unencrypted_log_private_internal};\n\n use crate::events::{\n class_registered::ContractClassRegistered,\n private_function_broadcasted::{ClassPrivateFunctionBroadcasted, PrivateFunction, InnerPrivateFunction},\n unconstrained_function_broadcasted::{ClassUnconstrainedFunctionBroadcasted, UnconstrainedFunction, InnerUnconstrainedFunction}\n };\n\n // docs:start:import_pop_capsule\n use crate::capsule::pop_capsule;\n // docs:end:import_pop_capsule\n\n #[aztec(private)]\n fn register(artifact_hash: Field, private_functions_root: Field, public_bytecode_commitment: Field) {\n // TODO: Validate public_bytecode_commitment is the correct commitment of packed_public_bytecode\n // TODO: Validate packed_public_bytecode is legit public bytecode\n\n // docs:start:pop_capsule\n let packed_public_bytecode: [Field; MAX_PACKED_PUBLIC_BYTECODE_SIZE_IN_FIELDS] = pop_capsule();\n // docs:end:pop_capsule\n\n // Compute contract class id from preimage\n let contract_class_id = ContractClassId::compute(\n artifact_hash,\n private_functions_root,\n public_bytecode_commitment\n );\n\n // Emit the contract class id as a nullifier to be able to prove that this class has been (not) registered\n let event = ContractClassRegistered { contract_class_id, version: 1, artifact_hash, private_functions_root, packed_public_bytecode };\n context.push_nullifier(contract_class_id.to_field());\n\n // Broadcast class info including public bytecode\n dep::aztec::oracle::debug_log::debug_log_format(\n \"ContractClassRegistered: {}\",\n [\n contract_class_id.to_field(),\n artifact_hash,\n private_functions_root,\n public_bytecode_commitment\n ]\n );\n emit_contract_class_unencrypted_log(&mut context, event.serialize());\n }\n\n #[aztec(private)]\n fn broadcast_private_function(\n contract_class_id: ContractClassId,\n artifact_metadata_hash: Field,\n unconstrained_functions_artifact_tree_root: Field,\n private_function_tree_sibling_path: [Field; FUNCTION_TREE_HEIGHT],\n private_function_tree_leaf_index: Field,\n artifact_function_tree_sibling_path: [Field; ARTIFACT_FUNCTION_TREE_MAX_HEIGHT],\n artifact_function_tree_leaf_index: Field,\n function_data: InnerPrivateFunction\n ) {\n let private_bytecode: [Field; MAX_PACKED_BYTECODE_SIZE_PER_PRIVATE_FUNCTION_IN_FIELDS] = pop_capsule();\n\n let event = ClassPrivateFunctionBroadcasted {\n contract_class_id,\n artifact_metadata_hash,\n unconstrained_functions_artifact_tree_root,\n private_function_tree_sibling_path,\n private_function_tree_leaf_index,\n artifact_function_tree_sibling_path,\n artifact_function_tree_leaf_index,\n function: PrivateFunction {\n selector: function_data.selector,\n metadata_hash: function_data.metadata_hash,\n vk_hash: function_data.vk_hash,\n bytecode: private_bytecode\n }\n };\n dep::aztec::oracle::debug_log::debug_log_format(\n \"ClassPrivateFunctionBroadcasted: {}\",\n [\n contract_class_id.to_field(),\n artifact_metadata_hash,\n unconstrained_functions_artifact_tree_root,\n function_data.selector.to_field(),\n function_data.vk_hash,\n function_data.metadata_hash\n ]\n );\n emit_contract_class_unencrypted_log(&mut context, event.serialize());\n }\n\n #[aztec(private)]\n fn broadcast_unconstrained_function(\n contract_class_id: ContractClassId,\n artifact_metadata_hash: Field,\n private_functions_artifact_tree_root: Field,\n artifact_function_tree_sibling_path: [Field; ARTIFACT_FUNCTION_TREE_MAX_HEIGHT],\n artifact_function_tree_leaf_index: Field,\n function_data: InnerUnconstrainedFunction\n ) {\n let unconstrained_bytecode: [Field; MAX_PACKED_BYTECODE_SIZE_PER_UNCONSTRAINED_FUNCTION_IN_FIELDS] = pop_capsule();\n let event = ClassUnconstrainedFunctionBroadcasted {\n contract_class_id,\n artifact_metadata_hash,\n private_functions_artifact_tree_root,\n artifact_function_tree_sibling_path,\n artifact_function_tree_leaf_index,\n function: UnconstrainedFunction {\n selector: function_data.selector,\n metadata_hash: function_data.metadata_hash,\n bytecode: unconstrained_bytecode\n }\n };\n dep::aztec::oracle::debug_log::debug_log_format(\n \"ClassUnconstrainedFunctionBroadcasted: {}\",\n [\n contract_class_id.to_field(),\n artifact_metadata_hash,\n private_functions_artifact_tree_root,\n function_data.selector.to_field(),\n function_data.metadata_hash\n ]\n );\n emit_contract_class_unencrypted_log(&mut context, event.serialize());\n }\n\n // This fn exists separately from emit_unencrypted_log because sha hashing the preimage\n // is too large to compile (16,200 fields, 518,400 bytes) => the oracle hashes it\n // It is ONLY used with contract_class_registerer_contract since we already assert correctness:\n // - Contract class -> we will commit to the packed bytecode (currently a TODO)\n // - Private function -> we provide a membership proof\n // - Unconstrained function -> we provide a membership proof\n // Ordinary logs are not protected by the above so this fn shouldn't be called by anything else\n #[contract_library_method]\n pub fn emit_contract_class_unencrypted_log<N>(context: &mut PrivateContext, log: [Field; N]) {\n let contract_address = context.this_address();\n let counter = context.next_counter();\n let log_hash = emit_contract_class_unencrypted_log_private_internal(contract_address, log, counter);\n // 40 = addr (32) + raw log len (4) + processed log len (4)\n let len = 40 + N * 32;\n let side_effect = LogHash { value: log_hash, counter, length: len };\n context.unencrypted_logs_hashes.push(side_effect);\n }\n}\n"},"379":{"path":"/usr/src/noir-projects/noir-contracts/contracts/contract_instance_deployer_contract/src/main.nr","source":"contract ContractInstanceDeployer {\n use dep::aztec::protocol_types::{\n address::{AztecAddress, PublicKeysHash, PartialAddress}, contract_class_id::ContractClassId,\n constants::DEPLOYER_CONTRACT_INSTANCE_DEPLOYED_MAGIC_VALUE, abis::log_hash::LogHash\n };\n use dep::aztec::{hash::compute_unencrypted_log_hash, oracle::logs::emit_unencrypted_log_private_internal};\n\n #[aztec(event)]\n struct ContractInstanceDeployed {\n DEPLOYER_CONTRACT_INSTANCE_DEPLOYED_MAGIC_VALUE: Field,\n address: AztecAddress,\n version: u8,\n salt: Field,\n contract_class_id: ContractClassId,\n initialization_hash: Field,\n public_keys_hash: PublicKeysHash,\n deployer: AztecAddress,\n }\n\n #[aztec(private)]\n fn deploy(\n salt: Field,\n contract_class_id: ContractClassId,\n initialization_hash: Field,\n public_keys_hash: PublicKeysHash,\n universal_deploy: bool\n ) {\n // TODO(@spalladino): assert nullifier_exists silo(contract_class_id, ContractClassRegisterer)\n\n let deployer = if universal_deploy {\n AztecAddress::zero()\n } else {\n context.msg_sender()\n };\n\n let partial_address = PartialAddress::compute(contract_class_id, salt, initialization_hash, deployer);\n\n let address = AztecAddress::compute(public_keys_hash, partial_address);\n\n // Emit the address as a nullifier to be able to prove that this instance has been (not) deployed\n context.push_nullifier(address.to_field());\n\n // Broadcast the event\n let event = ContractInstanceDeployed {\n DEPLOYER_CONTRACT_INSTANCE_DEPLOYED_MAGIC_VALUE,\n contract_class_id,\n address,\n public_keys_hash,\n initialization_hash,\n salt,\n deployer,\n version: 1\n };\n\n let payload = event.serialize();\n dep::aztec::oracle::debug_log::debug_log_format(\"ContractInstanceDeployed: {}\", payload);\n\n let contract_address = context.this_address();\n let counter = context.next_counter();\n\n // @todo This is very inefficient, we are doing a lot of back and forth conversions.\n let log_slice = payload.to_be_bytes_arr();\n let log_hash = compute_unencrypted_log_hash(contract_address, payload);\n // 40 = addr (32) + raw log len (4) + processed log len (4)\n let len = 40 + log_slice.len().to_field();\n let side_effect = LogHash { value: log_hash, counter, length: len };\n context.unencrypted_logs_hashes.push(side_effect);\n\n let _void = emit_unencrypted_log_private_internal(contract_address, payload, counter);\n }\n}\n"},"399":{"path":"/usr/src/noir-projects/noir-contracts/contracts/fee_juice_contract/src/main.nr","source":"mod lib;\n\ncontract FeeJuice {\n use dep::aztec::{\n protocol_types::{\n contract_class_id::ContractClassId, address::{AztecAddress, EthAddress},\n constants::{DEPLOYER_CONTRACT_ADDRESS, REGISTERER_CONTRACT_ADDRESS, FEE_JUICE_INITIAL_MINT}\n },\n state_vars::{SharedImmutable, PublicMutable, Map},\n oracle::get_contract_instance::get_contract_instance\n };\n\n use dep::deployer::ContractInstanceDeployer;\n use dep::registerer::ContractClassRegisterer;\n\n use crate::lib::get_bridge_gas_msg_hash;\n\n #[aztec(storage)]\n struct Storage {\n // This map is accessed directly by protocol circuits to check balances for fee payment.\n // Do not change this storage layout unless you also update the base rollup circuits.\n balances: Map<AztecAddress, PublicMutable<U128>>,\n portal_address: SharedImmutable<EthAddress>,\n }\n\n // Not flagged as initializer to reduce cost of checking init nullifier in all functions.\n // This function should be called as entrypoint to initialize the contract by minting itself funds.\n #[aztec(private)]\n fn deploy(\n artifact_hash: Field,\n private_functions_root: Field,\n public_bytecode_commitment: Field,\n portal_address: EthAddress\n ) {\n // Validate contract class parameters are correct\n let self = context.this_address();\n let instance = get_contract_instance(self);\n let contract_class_id = ContractClassId::compute(\n artifact_hash,\n private_functions_root,\n public_bytecode_commitment\n );\n assert(\n instance.contract_class_id == contract_class_id, \"Invalid contract class id computed for Fee Juice\"\n );\n\n // Increase self balance and set as fee payer, and end setup\n FeeJuice::at(self)._increase_public_balance(self, FEE_JUICE_INITIAL_MINT).enqueue(&mut context);\n context.set_as_fee_payer();\n context.end_setup();\n\n // Register class and publicly deploy contract\n let _register = ContractClassRegisterer::at(REGISTERER_CONTRACT_ADDRESS).register(\n artifact_hash,\n private_functions_root,\n public_bytecode_commitment\n ).call(&mut context);\n let _deploy = ContractInstanceDeployer::at(DEPLOYER_CONTRACT_ADDRESS).deploy(\n instance.salt,\n instance.contract_class_id,\n instance.initialization_hash,\n instance.public_keys_hash,\n true\n ).call(&mut context);\n\n // Enqueue call to set the portal address\n FeeJuice::at(self).set_portal(portal_address).enqueue(&mut context);\n }\n\n // We purposefully not set this function as an initializer so we do not bind\n // the contract to a specific L1 portal address, since the Fee Juice address\n // is a hardcoded constant in the rollup circuits.\n #[aztec(public)]\n fn set_portal(portal_address: EthAddress) {\n assert(storage.portal_address.read_public().is_zero());\n storage.portal_address.initialize(portal_address);\n }\n\n #[aztec(private)]\n fn claim(to: AztecAddress, amount: Field, secret: Field) {\n let content_hash = get_bridge_gas_msg_hash(to, amount);\n let portal_address = storage.portal_address.read_private();\n assert(!portal_address.is_zero());\n\n // Consume message and emit nullifier\n context.consume_l1_to_l2_message(content_hash, secret, portal_address);\n\n // TODO(palla/gas) Emit an unencrypted log to announce which L1 to L2 message has been claimed\n // Otherwise, we cannot trace L1 deposits to their corresponding claims on L2\n\n FeeJuice::at(context.this_address())._increase_public_balance(to, amount).enqueue(&mut context);\n }\n\n #[aztec(public)]\n #[aztec(internal)]\n fn _increase_public_balance(to: AztecAddress, amount: Field) {\n let new_balance = storage.balances.at(to).read().add(U128::from_integer(amount));\n storage.balances.at(to).write(new_balance);\n }\n\n #[aztec(public)]\n #[aztec(view)]\n fn check_balance(fee_limit: Field) {\n let fee_limit = U128::from_integer(fee_limit);\n assert(storage.balances.at(context.msg_sender()).read() >= fee_limit, \"Balance too low\");\n }\n\n // utility function for testing\n #[aztec(public)]\n #[aztec(view)]\n fn balance_of_public(owner: AztecAddress) -> pub Field {\n storage.balances.at(owner).read().to_field()\n }\n}\n"},"400":{"path":"/usr/src/noir-projects/noir-contracts/contracts/fee_juice_contract/src/lib.nr","source":"use dep::aztec::prelude::AztecAddress;\nuse dep::aztec::context::PublicContext;\nuse dep::aztec::protocol_types::hash::sha256_to_field;\n\npub fn calculate_fee<TPublicContext>(context: PublicContext) -> Field {\n context.transaction_fee()\n}\n\npub fn get_bridge_gas_msg_hash(owner: AztecAddress, amount: Field) -> Field {\n let mut hash_bytes = [0; 68];\n let recipient_bytes: [u8; 32] = owner.to_field().to_be_bytes();\n let amount_bytes: [u8; 32] = amount.to_be_bytes();\n\n for i in 0..32 {\n hash_bytes[i + 4] = recipient_bytes[i];\n hash_bytes[i + 36] = amount_bytes[i];\n }\n\n // Function selector: 0x63f44968 keccak256('claim(bytes32,uint256)')\n hash_bytes[0] = 0x63;\n hash_bytes[1] = 0xf4;\n hash_bytes[2] = 0x49;\n hash_bytes[3] = 0x68;\n\n let content_hash = sha256_to_field(hash_bytes);\n content_hash\n}\n"},"6":{"path":"std/cmp.nr","source":"use crate::meta::derive_via;\n\n#[derive_via(derive_eq)]\n// docs:start:eq-trait\ntrait Eq {\n fn eq(self, other: Self) -> bool;\n}\n// docs:end:eq-trait\n\n// docs:start:derive_eq\ncomptime fn derive_eq(s: StructDefinition) -> Quoted {\n let signature = quote { fn eq(_self: Self, _other: Self) -> bool };\n let for_each_field = |name| quote { (_self.$name == _other.$name) };\n let body = |fields| {\n if s.fields().len() == 0 {\n quote { true }\n } else {\n fields\n }\n };\n crate::meta::make_trait_impl(s, quote { Eq }, signature, for_each_field, quote { & }, body)\n}\n// docs:end:derive_eq\n\nimpl Eq for Field {\n fn eq(self, other: Field) -> bool {\n self == other\n }\n}\n\nimpl Eq for u64 {\n fn eq(self, other: u64) -> bool {\n self == other\n }\n}\nimpl Eq for u32 {\n fn eq(self, other: u32) -> bool {\n self == other\n }\n}\nimpl Eq for u16 {\n fn eq(self, other: u16) -> bool {\n self == other\n }\n}\nimpl Eq for u8 {\n fn eq(self, other: u8) -> bool {\n self == other\n }\n}\nimpl Eq for u1 {\n fn eq(self, other: u1) -> bool {\n self == other\n }\n}\n\nimpl Eq for i8 {\n fn eq(self, other: i8) -> bool {\n self == other\n }\n}\nimpl Eq for i16 {\n fn eq(self, other: i16) -> bool {\n self == other\n }\n}\nimpl Eq for i32 {\n fn eq(self, other: i32) -> bool {\n self == other\n }\n}\nimpl Eq for i64 {\n fn eq(self, other: i64) -> bool {\n self == other\n }\n}\n\nimpl Eq for () {\n fn eq(_self: Self, _other: ()) -> bool {\n true\n }\n}\nimpl Eq for bool {\n fn eq(self, other: bool) -> bool {\n self == other\n }\n}\n\nimpl<T, let N: u32> Eq for [T; N] where T: Eq {\n fn eq(self, other: [T; N]) -> bool {\n let mut result = true;\n for i in 0..self.len() {\n result &= self[i].eq(other[i]);\n }\n result\n }\n}\n\nimpl<T> Eq for [T] where T: Eq {\n fn eq(self, other: [T]) -> bool {\n let mut result = self.len() == other.len();\n for i in 0..self.len() {\n result &= self[i].eq(other[i]);\n }\n result\n }\n}\n\nimpl<let N: u32> Eq for str<N> {\n fn eq(self, other: str<N>) -> bool {\n let self_bytes = self.as_bytes();\n let other_bytes = other.as_bytes();\n self_bytes == other_bytes\n }\n}\n\nimpl<A, B> Eq for (A, B) where A: Eq, B: Eq {\n fn eq(self, other: (A, B)) -> bool {\n self.0.eq(other.0) & self.1.eq(other.1)\n }\n}\n\nimpl<A, B, C> Eq for (A, B, C) where A: Eq, B: Eq, C: Eq {\n fn eq(self, other: (A, B, C)) -> bool {\n self.0.eq(other.0) & self.1.eq(other.1) & self.2.eq(other.2)\n }\n}\n\nimpl<A, B, C, D> Eq for (A, B, C, D) where A: Eq, B: Eq, C: Eq, D: Eq {\n fn eq(self, other: (A, B, C, D)) -> bool {\n self.0.eq(other.0) & self.1.eq(other.1) & self.2.eq(other.2) & self.3.eq(other.3)\n }\n}\n\nimpl<A, B, C, D, E> Eq for (A, B, C, D, E) where A: Eq, B: Eq, C: Eq, D: Eq, E: Eq {\n fn eq(self, other: (A, B, C, D, E)) -> bool {\n self.0.eq(other.0)\n & self.1.eq(other.1)\n & self.2.eq(other.2)\n & self.3.eq(other.3)\n & self.4.eq(other.4)\n }\n}\n\nimpl Eq for Ordering {\n fn eq(self, other: Ordering) -> bool {\n self.result == other.result\n }\n}\n\n// Noir doesn't have enums yet so we emulate (Lt | Eq | Gt) with a struct\n// that has 3 public functions for constructing the struct.\nstruct Ordering {\n result: Field,\n}\n\nimpl Ordering {\n // Implementation note: 0, 1, and 2 for Lt, Eq, and Gt are built\n // into the compiler, do not change these without also updating\n // the compiler itself!\n pub fn less() -> Ordering {\n Ordering { result: 0 }\n }\n\n pub fn equal() -> Ordering {\n Ordering { result: 1 }\n }\n\n pub fn greater() -> Ordering {\n Ordering { result: 2 }\n }\n}\n\n#[derive_via(derive_ord)]\n// docs:start:ord-trait\ntrait Ord {\n fn cmp(self, other: Self) -> Ordering;\n}\n// docs:end:ord-trait\n\n// docs:start:derive_ord\ncomptime fn derive_ord(s: StructDefinition) -> Quoted {\n let signature = quote { fn cmp(_self: Self, _other: Self) -> std::cmp::Ordering };\n let for_each_field = |name| quote {\n if result == std::cmp::Ordering::equal() {\n result = _self.$name.cmp(_other.$name);\n }\n };\n let body = |fields| quote {\n let mut result = std::cmp::Ordering::equal();\n $fields\n result\n };\n crate::meta::make_trait_impl(s, quote { Ord }, signature, for_each_field, quote {}, body)\n}\n// docs:end:derive_ord\n\n// Note: Field deliberately does not implement Ord\n\nimpl Ord for u64 {\n fn cmp(self, other: u64) -> Ordering {\n if self < other {\n Ordering::less()\n } else if self > other {\n Ordering::greater()\n } else {\n Ordering::equal()\n }\n }\n}\n\nimpl Ord for u32 {\n fn cmp(self, other: u32) -> Ordering {\n if self < other {\n Ordering::less()\n } else if self > other {\n Ordering::greater()\n } else {\n Ordering::equal()\n }\n }\n}\n\nimpl Ord for u16 {\n fn cmp(self, other: u16) -> Ordering {\n if self < other {\n Ordering::less()\n } else if self > other {\n Ordering::greater()\n } else {\n Ordering::equal()\n }\n }\n}\n\nimpl Ord for u8 {\n fn cmp(self, other: u8) -> Ordering {\n if self < other {\n Ordering::less()\n } else if self > other {\n Ordering::greater()\n } else {\n Ordering::equal()\n }\n }\n}\n\nimpl Ord for i8 {\n fn cmp(self, other: i8) -> Ordering {\n if self < other {\n Ordering::less()\n } else if self > other {\n Ordering::greater()\n } else {\n Ordering::equal()\n }\n }\n}\n\nimpl Ord for i16 {\n fn cmp(self, other: i16) -> Ordering {\n if self < other {\n Ordering::less()\n } else if self > other {\n Ordering::greater()\n } else {\n Ordering::equal()\n }\n }\n}\n\nimpl Ord for i32 {\n fn cmp(self, other: i32) -> Ordering {\n if self < other {\n Ordering::less()\n } else if self > other {\n Ordering::greater()\n } else {\n Ordering::equal()\n }\n }\n}\n\nimpl Ord for i64 {\n fn cmp(self, other: i64) -> Ordering {\n if self < other {\n Ordering::less()\n } else if self > other {\n Ordering::greater()\n } else {\n Ordering::equal()\n }\n }\n}\n\nimpl Ord for () {\n fn cmp(_self: Self, _other: ()) -> Ordering {\n Ordering::equal()\n }\n}\n\nimpl Ord for bool {\n fn cmp(self, other: bool) -> Ordering {\n if self {\n if other {\n Ordering::equal()\n } else {\n Ordering::greater()\n }\n } else if other {\n Ordering::less()\n } else {\n Ordering::equal()\n }\n }\n}\n\nimpl<T, let N: u32> Ord for [T; N] where T: Ord {\n // The first non-equal element of both arrays determines\n // the ordering for the whole array.\n fn cmp(self, other: [T; N]) -> Ordering {\n let mut result = Ordering::equal();\n for i in 0..self.len() {\n if result == Ordering::equal() {\n let result_i = self[i].cmp(other[i]);\n\n if result_i == Ordering::less() {\n result = result_i;\n } else if result_i == Ordering::greater() {\n result = result_i;\n }\n }\n }\n result\n }\n}\n\nimpl<T> Ord for [T] where T: Ord {\n // The first non-equal element of both arrays determines\n // the ordering for the whole array.\n fn cmp(self, other: [T]) -> Ordering {\n let mut result = self.len().cmp(other.len());\n for i in 0..self.len() {\n if result == Ordering::equal() {\n let result_i = self[i].cmp(other[i]);\n\n if result_i == Ordering::less() {\n result = result_i;\n } else if result_i == Ordering::greater() {\n result = result_i;\n }\n }\n }\n result\n }\n}\n\nimpl<A, B> Ord for (A, B) where A: Ord, B: Ord {\n fn cmp(self, other: (A, B)) -> Ordering {\n let result = self.0.cmp(other.0);\n\n if result != Ordering::equal() {\n result\n } else {\n self.1.cmp(other.1)\n }\n }\n}\n\nimpl<A, B, C> Ord for (A, B, C) where A: Ord, B: Ord, C: Ord {\n fn cmp(self, other: (A, B, C)) -> Ordering {\n let mut result = self.0.cmp(other.0);\n\n if result == Ordering::equal() {\n result = self.1.cmp(other.1);\n }\n\n if result == Ordering::equal() {\n result = self.2.cmp(other.2);\n }\n\n result\n }\n}\n\nimpl<A, B, C, D> Ord for (A, B, C, D) where A: Ord, B: Ord, C: Ord, D: Ord {\n fn cmp(self, other: (A, B, C, D)) -> Ordering {\n let mut result = self.0.cmp(other.0);\n\n if result == Ordering::equal() {\n result = self.1.cmp(other.1);\n }\n\n if result == Ordering::equal() {\n result = self.2.cmp(other.2);\n }\n\n if result == Ordering::equal() {\n result = self.3.cmp(other.3);\n }\n\n result\n }\n}\n\nimpl<A, B, C, D, E> Ord for (A, B, C, D, E) where A: Ord, B: Ord, C: Ord, D: Ord, E: Ord {\n fn cmp(self, other: (A, B, C, D, E)) -> Ordering {\n let mut result = self.0.cmp(other.0);\n\n if result == Ordering::equal() {\n result = self.1.cmp(other.1);\n }\n\n if result == Ordering::equal() {\n result = self.2.cmp(other.2);\n }\n\n if result == Ordering::equal() {\n result = self.3.cmp(other.3);\n }\n\n if result == Ordering::equal() {\n result = self.4.cmp(other.4);\n }\n\n result\n }\n}\n\n// Compares and returns the maximum of two values.\n//\n// Returns the second argument if the comparison determines them to be equal.\n//\n// # Examples\n//\n// ```\n// use std::cmp;\n//\n// assert_eq(cmp::max(1, 2), 2);\n// assert_eq(cmp::max(2, 2), 2);\n// ```\npub fn max<T>(v1: T, v2: T) -> T where T: Ord {\n if v1 > v2 { v1 } else { v2 }\n}\n\n// Compares and returns the minimum of two values.\n//\n// Returns the first argument if the comparison determines them to be equal.\n//\n// # Examples\n//\n// ```\n// use std::cmp;\n//\n// assert_eq(cmp::min(1, 2), 1);\n// assert_eq(cmp::min(2, 2), 2);\n// ```\npub fn min<T>(v1: T, v2: T) -> T where T: Ord {\n if v1 > v2 { v2 } else { v1 }\n}\n\nmod cmp_tests {\n use crate::cmp::{min, max};\n\n #[test]\n fn sanity_check_min() {\n assert_eq(min(0 as u64, 1 as u64), 0);\n assert_eq(min(0 as u64, 0 as u64), 0);\n assert_eq(min(1 as u64, 1 as u64), 1);\n assert_eq(min(255 as u8, 0 as u8), 0);\n }\n\n #[test]\n fn sanity_check_max() {\n assert_eq(max(0 as u64, 1 as u64), 1);\n assert_eq(max(0 as u64, 0 as u64), 0);\n assert_eq(max(1 as u64, 1 as u64), 1);\n assert_eq(max(255 as u8, 0 as u8), 255);\n }\n}\n"},"68":{"path":"std/uint128.nr","source":"use crate::ops::{Add, Sub, Mul, Div, Rem, Not, BitOr, BitAnd, BitXor, Shl, Shr};\nuse crate::cmp::{Eq, Ord, Ordering};\n\nglobal pow64 : Field = 18446744073709551616; //2^64;\nglobal pow63 : Field = 9223372036854775808; // 2^63;\nstruct U128 {\n lo: Field,\n hi: Field,\n}\n\nimpl U128 {\n\n pub fn from_u64s_le(lo: u64, hi: u64) -> U128 {\n // in order to handle multiplication, we need to represent the product of two u64 without overflow\n assert(crate::field::modulus_num_bits() as u32 > 128);\n U128 { lo: lo as Field, hi: hi as Field }\n }\n\n pub fn from_u64s_be(hi: u64, lo: u64) -> U128 {\n U128::from_u64s_le(lo, hi)\n }\n\n pub fn zero() -> U128 {\n U128 { lo: 0, hi: 0 }\n }\n\n pub fn one() -> U128 {\n U128 { lo: 1, hi: 0 }\n }\n pub fn from_le_bytes(bytes: [u8; 16]) -> U128 {\n let mut lo = 0;\n let mut base = 1;\n for i in 0..8 {\n lo += (bytes[i] as Field)*base;\n base *= 256;\n }\n let mut hi = 0;\n base = 1;\n for i in 8..16 {\n hi += (bytes[i] as Field)*base;\n base *= 256;\n }\n U128 { lo, hi }\n }\n\n pub fn to_be_bytes(self: Self) -> [u8; 16] {\n let lo: [u8; 8] = self.lo.to_be_bytes();\n let hi: [u8; 8] = self.hi.to_be_bytes();\n let mut bytes = [0; 16];\n for i in 0..8 {\n bytes[i] = hi[i];\n bytes[i+8] = lo[i];\n }\n bytes\n }\n\n pub fn to_le_bytes(self: Self) -> [u8; 16] {\n let lo: [u8; 8] = self.lo.to_le_bytes();\n let hi: [u8; 8] = self.hi.to_le_bytes();\n let mut bytes = [0; 16];\n for i in 0..8 {\n bytes[i] = lo[i];\n bytes[i+8] = hi[i];\n }\n bytes\n }\n\n pub fn from_hex<let N: u32>(hex: str<N>) -> U128 {\n let N = N as u32;\n let bytes = hex.as_bytes();\n // string must starts with \"0x\"\n assert((bytes[0] == 48) & (bytes[1] == 120), \"Invalid hexadecimal string\");\n assert(N < 35, \"Input does not fit into a U128\");\n\n let mut lo = 0;\n let mut hi = 0;\n let mut base = 1;\n if N <= 18 {\n for i in 0..N - 2 {\n lo += U128::decode_ascii(bytes[N-i-1])*base;\n base = base*16;\n }\n } else {\n for i in 0..16 {\n lo += U128::decode_ascii(bytes[N-i-1])*base;\n base = base*16;\n }\n base = 1;\n for i in 17..N - 1 {\n hi += U128::decode_ascii(bytes[N-i])*base;\n base = base*16;\n }\n }\n U128 { lo: lo as Field, hi: hi as Field }\n }\n\n unconstrained fn uconstrained_check_is_upper_ascii(ascii: u8) -> bool {\n ((ascii >= 65) & (ascii <= 90)) // Between 'A' and 'Z'\n }\n\n fn decode_ascii(ascii: u8) -> Field {\n (if ascii < 58 {\n ascii - 48\n } else {\n let ascii = ascii + 32 * (unsafe {\n U128::uconstrained_check_is_upper_ascii(ascii) as u8\n });\n assert(ascii >= 97); // enforce >= 'a'\n assert(ascii <= 102); // enforce <= 'f'\n ascii - 87\n }) as Field\n }\n\n // TODO: Replace with a faster version. \n // A circuit that uses this function can be slow to compute\n // (we're doing up to 127 calls to compute the quotient)\n unconstrained fn unconstrained_div(self: Self, b: U128) -> (U128, U128) {\n if b == U128::zero() {\n // Return 0,0 to avoid eternal loop\n (U128::zero(), U128::zero())\n } else if self < b {\n (U128::zero(), self)\n } else if self == b {\n (U128::one(), U128::zero())\n } else {\n let (q,r) = if b.hi as u64 >= pow63 as u64 {\n // The result of multiplication by 2 would overflow\n (U128::zero(), self)\n } else {\n self.unconstrained_div(b * U128::from_u64s_le(2, 0))\n };\n let q_mul_2 = q * U128::from_u64s_le(2, 0);\n if r < b {\n (q_mul_2, r)\n } else {\n (q_mul_2 + U128::one(), r - b)\n }\n }\n }\n\n pub fn from_integer<T>(i: T) -> U128 {\n let f = crate::as_field(i);\n // Reject values which would overflow a u128\n f.assert_max_bit_size(128);\n let lo = f as u64 as Field;\n let hi = (f - lo) / pow64;\n U128 { lo, hi }\n }\n\n pub fn to_integer<T>(self) -> T {\n crate::from_field(self.lo + self.hi * pow64)\n }\n\n fn wrapping_mul(self: Self, b: U128) -> U128 {\n let low = self.lo * b.lo;\n let lo = low as u64 as Field;\n let carry = (low - lo) / pow64;\n let high = self.lo * b.hi + self.hi * b.lo + carry;\n let hi = high as u64 as Field;\n U128 { lo, hi }\n }\n}\n\nimpl Add for U128 {\n fn add(self: Self, b: U128) -> U128 {\n let low = self.lo + b.lo;\n let lo = low as u64 as Field;\n let carry = (low - lo) / pow64;\n let high = self.hi + b.hi + carry;\n let hi = high as u64 as Field;\n assert(hi == high, \"attempt to add with overflow\");\n U128 { lo, hi }\n }\n}\n\nimpl Sub for U128 {\n fn sub(self: Self, b: U128) -> U128 {\n let low = pow64 + self.lo - b.lo;\n let lo = low as u64 as Field;\n let borrow = (low == lo) as Field;\n let high = self.hi - b.hi - borrow;\n let hi = high as u64 as Field;\n assert(hi == high, \"attempt to subtract with underflow\");\n U128 { lo, hi }\n }\n}\n\nimpl Mul for U128 {\n fn mul(self: Self, b: U128) -> U128 {\n assert(self.hi * b.hi == 0, \"attempt to multiply with overflow\");\n let low = self.lo * b.lo;\n let lo = low as u64 as Field;\n let carry = (low - lo) / pow64;\n let high = if crate::field::modulus_num_bits() as u32 > 196 {\n (self.lo + self.hi) * (b.lo + b.hi) - low + carry\n } else {\n self.lo * b.hi + self.hi * b.lo + carry\n };\n let hi = high as u64 as Field;\n assert(hi == high, \"attempt to multiply with overflow\");\n U128 { lo, hi }\n }\n}\n\nimpl Div for U128 {\n fn div(self: Self, b: U128) -> U128 {\n unsafe {\n let (q,r) = self.unconstrained_div(b);\n let a = b * q + r;\n assert_eq(self, a);\n assert(r < b);\n q\n }\n }\n}\n\nimpl Rem for U128 {\n fn rem(self: Self, b: U128) -> U128 {\n unsafe {\n let (q,r) = self.unconstrained_div(b);\n let a = b * q + r;\n assert_eq(self, a);\n assert(r < b);\n\n r\n }\n }\n}\n\nimpl Eq for U128 {\n fn eq(self: Self, b: U128) -> bool {\n (self.lo == b.lo) & (self.hi == b.hi)\n }\n}\n\nimpl Ord for U128 {\n fn cmp(self, other: Self) -> Ordering {\n let hi_ordering = (self.hi as u64).cmp((other.hi as u64));\n let lo_ordering = (self.lo as u64).cmp((other.lo as u64));\n\n if hi_ordering == Ordering::equal() {\n lo_ordering\n } else {\n hi_ordering\n }\n }\n}\n\nimpl Not for U128 {\n fn not(self) -> U128 {\n U128 { lo: (!(self.lo as u64)) as Field, hi: (!(self.hi as u64)) as Field }\n }\n}\n\nimpl BitOr for U128 {\n fn bitor(self, other: U128) -> U128 {\n U128 {\n lo: ((self.lo as u64) | (other.lo as u64)) as Field,\n hi: ((self.hi as u64) | (other.hi as u64)) as Field\n }\n }\n}\n\nimpl BitAnd for U128 {\n fn bitand(self, other: U128) -> U128 {\n U128 {\n lo: ((self.lo as u64) & (other.lo as u64)) as Field,\n hi: ((self.hi as u64) & (other.hi as u64)) as Field\n }\n }\n}\n\nimpl BitXor for U128 {\n fn bitxor(self, other: U128) -> U128 {\n U128 {\n lo: ((self.lo as u64) ^ (other.lo as u64)) as Field,\n hi: ((self.hi as u64) ^ (other.hi as u64)) as Field\n }\n }\n}\n\nimpl Shl for U128 {\n fn shl(self, other: u8) -> U128 {\n assert(other < 128, \"attempt to shift left with overflow\");\n let exp_bits: [u1; 7] = (other as Field).to_be_bits();\n\n let mut r: Field = 2;\n let mut y: Field = 1;\n for i in 1..8 {\n let bit = exp_bits[7 - i] as Field;\n y = bit * (r * y) + (1 - bit) * y;\n r *= r;\n }\n self.wrapping_mul(U128::from_integer(y))\n }\n}\n\nimpl Shr for U128 {\n fn shr(self, other: u8) -> U128 {\n assert(other < 128, \"attempt to shift right with overflow\");\n let exp_bits: [u1; 7] = (other as Field).to_be_bits();\n\n let mut r: Field = 2;\n let mut y: Field = 1;\n for i in 1..8 {\n let bit = exp_bits[7 - i] as Field;\n y = bit * (r * y) + (1 - bit) * y;\n r *= r;\n }\n self / U128::from_integer(y)\n }\n}\n\nmod tests {\n use crate::uint128::{U128, pow64, pow63};\n\n #[test]\n fn test_not(lo: u64, hi: u64) {\n let num = U128::from_u64s_le(lo, hi);\n let not_num = num.not();\n\n assert_eq(not_num.hi, (hi.not() as Field));\n assert_eq(not_num.lo, (lo.not() as Field));\n\n let not_not_num = not_num.not();\n assert_eq(num, not_not_num);\n }\n #[test]\n fn test_construction() {\n // Check little-endian u64 is inversed with big-endian u64 construction\n let a = U128::from_u64s_le(2, 1);\n let b = U128::from_u64s_be(1, 2);\n assert_eq(a, b);\n // Check byte construction is equivalent\n let c = U128::from_le_bytes([0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15]);\n let d = U128::from_u64s_le(0x0706050403020100, 0x0f0e0d0c0b0a0908);\n assert_eq(c, d);\n }\n #[test]\n fn test_byte_decomposition() {\n let a = U128::from_u64s_le(0x0706050403020100, 0x0f0e0d0c0b0a0908);\n // Get big-endian and little-endian byte decompostions\n let le_bytes_a= a.to_le_bytes();\n let be_bytes_a= a.to_be_bytes();\n\n // Check equivalence\n for i in 0..16 {\n assert_eq(le_bytes_a[i], be_bytes_a[15 - i]);\n }\n // Reconstruct U128 from byte decomposition\n let b= U128::from_le_bytes(le_bytes_a);\n // Check that it's the same element\n assert_eq(a, b);\n }\n #[test]\n fn test_hex_constuction() {\n let a = U128::from_u64s_le(0x1, 0x2);\n let b = U128::from_hex(\"0x20000000000000001\");\n assert_eq(a, b);\n\n let c= U128::from_hex(\"0xffffffffffffffffffffffffffffffff\");\n let d= U128::from_u64s_le(0xffffffffffffffff, 0xffffffffffffffff);\n assert_eq(c, d);\n\n let e= U128::from_hex(\"0x00000000000000000000000000000000\");\n let f= U128::from_u64s_le(0, 0);\n assert_eq(e, f);\n }\n\n // Ascii decode tests\n\n #[test]\n fn test_ascii_decode_correct_range() {\n // '0'..'9' range\n for i in 0..10 {\n let decoded= U128::decode_ascii(48 + i);\n assert_eq(decoded, i as Field);\n }\n // 'A'..'F' range\n for i in 0..6 {\n let decoded = U128::decode_ascii(65 + i);\n assert_eq(decoded, (i + 10) as Field);\n }\n // 'a'..'f' range\n for i in 0..6 {\n let decoded = U128::decode_ascii(97 + i);\n assert_eq(decoded, (i + 10) as Field);\n }\n }\n\n #[test(should_fail)]\n fn test_ascii_decode_range_less_than_48_fails_0() {\n crate::println(U128::decode_ascii(0));\n }\n #[test(should_fail)]\n fn test_ascii_decode_range_less_than_48_fails_1() {\n crate::println(U128::decode_ascii(47));\n }\n\n #[test(should_fail)]\n fn test_ascii_decode_range_58_64_fails_0() {\n let _ = U128::decode_ascii(58);\n }\n #[test(should_fail)]\n fn test_ascii_decode_range_58_64_fails_1() {\n let _ = U128::decode_ascii(64);\n }\n #[test(should_fail)]\n fn test_ascii_decode_range_71_96_fails_0() {\n let _ = U128::decode_ascii(71);\n }\n #[test(should_fail)]\n fn test_ascii_decode_range_71_96_fails_1() {\n let _ = U128::decode_ascii(96);\n }\n #[test(should_fail)]\n fn test_ascii_decode_range_greater_than_102_fails() {\n let _ = U128::decode_ascii(103);\n }\n\n #[test(should_fail)]\n fn test_ascii_decode_regression() {\n // This code will actually fail because of ascii_decode,\n // but in the past it was possible to create a value > (1<<128)\n let a = U128::from_hex(\"0x~fffffffffffffffffffffffffffffff\");\n let b:Field= a.to_integer();\n let c: [u8; 17]= b.to_le_bytes();\n assert(c[16] != 0);\n }\n\n #[test]\n fn test_unconstrained_div() {\n // Test the potential overflow case\n let a= U128::from_u64s_le(0x0, 0xffffffffffffffff);\n let b= U128::from_u64s_le(0x0, 0xfffffffffffffffe);\n let c= U128::one();\n let d= U128::from_u64s_le(0x0, 0x1);\n unsafe {\n let (q,r) = a.unconstrained_div(b);\n assert_eq(q, c);\n assert_eq(r, d);\n }\n\n let a = U128::from_u64s_le(2, 0);\n let b = U128::one();\n // Check the case where a is a multiple of b\n unsafe {\n let (c, d) = a.unconstrained_div(b);\n assert_eq((c, d), (a, U128::zero()));\n }\n\n // Check where b is a multiple of a\n unsafe {\n let (c,d) = b.unconstrained_div(a);\n assert_eq((c, d), (U128::zero(), b));\n }\n\n // Dividing by zero returns 0,0\n let a = U128::from_u64s_le(0x1, 0x0);\n let b = U128::zero();\n unsafe {\n let (c, d)= a.unconstrained_div(b);\n assert_eq((c, d), (U128::zero(), U128::zero()));\n }\n // Dividing 1<<127 by 1<<127 (special case)\n let a = U128::from_u64s_le(0x0, pow63 as u64);\n let b = U128::from_u64s_le(0x0, pow63 as u64);\n unsafe {\n let (c, d) = a.unconstrained_div(b);\n assert_eq((c, d), (U128::one(), U128::zero()));\n }\n }\n\n #[test]\n fn integer_conversions() {\n // Maximum\n let start:Field = 0xffffffffffffffffffffffffffffffff;\n let a = U128::from_integer(start);\n let end = a.to_integer();\n assert_eq(start, end);\n\n // Minimum\n let start:Field = 0x0;\n let a = U128::from_integer(start);\n let end = a.to_integer();\n assert_eq(start, end);\n\n // Low limb\n let start:Field = 0xffffffffffffffff;\n let a = U128::from_integer(start);\n let end = a.to_integer();\n assert_eq(start, end);\n\n // High limb\n let start:Field = 0xffffffffffffffff0000000000000000;\n let a = U128::from_integer(start);\n let end = a.to_integer();\n assert_eq(start, end);\n }\n\n #[test]\n fn integer_conversions_fuzz(lo: u64, hi: u64) {\n let start: Field = (lo as Field) + pow64 * (hi as Field);\n let a = U128::from_integer(start);\n let end = a.to_integer();\n assert_eq(start, end);\n }\n\n #[test]\n fn test_wrapping_mul() {\n // 1*0==0\n assert_eq(U128::zero(), U128::zero().wrapping_mul(U128::one()));\n\n // 0*1==0\n assert_eq(U128::zero(), U128::one().wrapping_mul(U128::zero()));\n\n // 1*1==1\n assert_eq(U128::one(), U128::one().wrapping_mul(U128::one()));\n\n // 0 * ( 1 << 64 ) == 0\n assert_eq(U128::zero(), U128::zero().wrapping_mul(U128::from_u64s_le(0, 1)));\n\n // ( 1 << 64 ) * 0 == 0\n assert_eq(U128::zero(), U128::from_u64s_le(0, 1).wrapping_mul(U128::zero()));\n\n // 1 * ( 1 << 64 ) == 1 << 64\n assert_eq(U128::from_u64s_le(0, 1), U128::from_u64s_le(0, 1).wrapping_mul(U128::one()));\n\n // ( 1 << 64 ) * 1 == 1 << 64\n assert_eq(U128::from_u64s_le(0, 1), U128::one().wrapping_mul(U128::from_u64s_le(0, 1)));\n\n // ( 1 << 64 ) * ( 1 << 64 ) == 1 << 64\n assert_eq(U128::zero(), U128::from_u64s_le(0, 1).wrapping_mul(U128::from_u64s_le(0, 1)));\n // -1 * -1 == 1\n assert_eq(\n U128::one(), U128::from_u64s_le(0xffffffffffffffff, 0xffffffffffffffff).wrapping_mul(U128::from_u64s_le(0xffffffffffffffff, 0xffffffffffffffff))\n );\n }\n}\n"}}}
|