@aztec/protocol-contracts 0.65.0 → 0.65.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,75 +1,8 @@
1
1
  {
2
2
  "transpiled": true,
3
- "noir_version": "0.39.0+5569eb8ea1578265649219a5497a61c4d93e8d83-x8664",
3
+ "noir_version": "1.0.0-beta.0+c8ff97767236adc0817b37c116f045c62eb981a1-x8664",
4
4
  "name": "AuthRegistry",
5
5
  "functions": [
6
- {
7
- "name": "public_dispatch",
8
- "is_unconstrained": true,
9
- "custom_attributes": [
10
- "public"
11
- ],
12
- "abi": {
13
- "error_types": {
14
- "12737498021964987455": {
15
- "error_kind": "string",
16
- "string": "unauthorized"
17
- },
18
- "16761564377371454734": {
19
- "error_kind": "string",
20
- "string": "Array index out of bounds"
21
- },
22
- "16957488177269924912": {
23
- "error_kind": "fmtstring",
24
- "item_types": [],
25
- "length": 16
26
- },
27
- "17843811134343075018": {
28
- "error_kind": "string",
29
- "string": "Stack too deep"
30
- },
31
- "206160798890201757": {
32
- "error_kind": "string",
33
- "string": "Storage slot 0 not allowed. Storage slots must start from 1."
34
- },
35
- "5019202896831570965": {
36
- "error_kind": "string",
37
- "string": "attempt to add with overflow"
38
- },
39
- "5444967152290923376": {
40
- "error_kind": "string",
41
- "string": "Function is_consumable can only be called statically"
42
- },
43
- "6304245522015439386": {
44
- "error_kind": "string",
45
- "string": "Function _set_authorized can only be called internally"
46
- },
47
- "715723737710351018": {
48
- "error_kind": "string",
49
- "string": "rejecting all"
50
- },
51
- "9474245853673257536": {
52
- "error_kind": "string",
53
- "string": "Function is_reject_all can only be called statically"
54
- }
55
- },
56
- "parameters": [
57
- {
58
- "name": "selector",
59
- "type": {
60
- "kind": "field"
61
- },
62
- "visibility": "private"
63
- }
64
- ],
65
- "return_type": null
66
- },
67
- "bytecode": "JgACBAEnAAABBIBEJgAABAMmAgIEASYCAwQAHxgAAwACgEMtCIBDAAEkAAAAQCcCAAEEgEQmAgIEADoNAAEAAiQAABP5KAIAAgC4Od6RCjgBAgMmAgIAAiYCBAAAJgIFBAEmAgYANiYCBwEAJgIIAAQmAgkEAiYCCgQAIwIAAwAAAIgiAAACzSwIAQMmAgsEAwAQAQsBJgMDBAEAKAMCCx88AAUACQALLA0DCwAoCwILLA4LAywIAQsAAAECASwOAwssCAEDAAABAgEsDgoDJgINBA4sCAAOLAwLDywMAxAsDAgRABAADQAkAAAUIiwEAAAsDA8MJgIOBA8sCAAPLAwLECwMAxEAEAAOACQAABRuLAQAACwMEA0mAgsEDiwIAA4sDA0PABAACwAkAAAU/iwEAAAsDA8DLAgBCwAAAQIBLA4HCywIAQ0AAAECASwOBA0sCAEOAAABAgEmAg8AWSwODw4eAgAPASwIARAmAhEEAwAQAREBJgMQBAEAKBACESwMERIsDgISACgSAhIsDg8SJgIRBBIsCAASLAwQEwAQABEAJAAAFSosBAAALAwTDwo4DwQQCjgQBxEjAgARAAAByCQAABaaLAgBECYCEQQDABABEQEmAxAEAQAoEAIRLAwREiwODxIAKBICEiwODBImAg8EESwIABEsDBASABAADwAkAAAVKiwEAAAsDBIMJgITBBQsCAAULAwGFSwMCxYsDA0XLAwOGCwMDBkAEAATACQAABasLAQAACwMFQ8sDBYQLAwXESwMGBImAgsEEywIABMsDA8ULAwQFSwMERYsDBIXLAwDGAAQAAsAJAAAF1YsBAAAJgILBAAmAg0EAwA4Cw0MLAgBAwAQAQwBJgMDBAEAKAMCDCwOCwwAKAwCDCwOCwwmAgwEAwA4AwwLACgDAg0sDQ0MJgIOBAIAOA0OCzoNAAsADCIAAALNKAIAAwCJVfX8CjgBAwsmAgMAMiYCDAABIwIACwAAAvIiAAAEviwIAQsmAg0EAgAQAQ0BJgMLBAEAKAsCDR88AAUABQANLA0LDQAoDQINLA4NCywIAQ0AAAECASwOCw0sCAEOAAABAgEsDgoOLA0LDwAoDwIPLA4PCyYCDwQQLAgAECwMDREsDA4SABAADwAkAAAXlCwEAAAsDBELJgIOBA8sCAAPLAwLEAAQAA4AJAAAFP4sBAAALAwQDSwIAQsAAAECASwOBwssCAEOAAABAgEsDgQOLAgBDwAAAQIBJgIQAFgsDhAPHgIAEAEsCAERJgISBAMAEAESASYDEQQBACgRAhIsDBITLA4MEwAoEwITLA4QEyYCEgQTLAgAEywMERQAEAASACQAABUqLAQAACwMFBAmAhUEFiwIABYsDAMXLAwLGCwMDhksDA8aLAwQGwAQABUAJAAAFqwsBAAALAwXESwMGBIsDBkTLAwaFCYCCwQVLAgAFSwMERYsDBIXLAwTGCwMFBksDA0aABAACwAkAAAXViwEAAAmAg0EACYCDwQDADgNDw4sCAELABABDgEmAwsEAQAoCwIOLA4NDgAoDgIOLA4NDiYCDgQDADgLDg0AKAsCDywNDw4mAhAEAgA4DxANOg0ADQAOIgAABL4oAgALACcWsWYKOAELDSYCCwAOJgIOAQEjAgANAAAE4yIAAApJLAgBDyYCEAQDABABEAEmAw8EAQAoDwIQHzwABQAJABAsDQ8QACgQAhAsDhAPLAgBEAAAAQIBLA4PECwIAREAAAECASwOChEsDQ8SACgSAhIsDhIPJgISBBMsCAATLAwQFCwMERUAEAASACQAABRuLAQAACwMFA8mAhMEFCwIABQsDAsVLAwPFgAQABMAJAAAGCQsBAAALAwVEiYCEwQULAgAFCwMEBUsDBEWLAwIFwAQABMAJAAAFCIsBAAALAwVDywIARAAAAECASwOBxAsCAERAAABAgEsDgQRLAgBEwAAAQIBJgIUAE8sDhQTLAgBFCYCFQQDABABFQEmAxQEAQAoFAIVLAwVFiwODBYAKBYCFiwOEhYmAhYEFywIABcsDBQYABAAFgAkAAAVKiwEAAAsDBgVJgIZBBosCAAaLAwDGywMEBwsDBEdLAwTHiwMFR8AEAAZACQAABasLAQAACwMGxQsDBwWLAwdFywMHhgmAhkEGiwIABosDBQbLAwWHCwMFx0sDBgeABAAGQAkAAAYkywEAAAsDBsVCjgVBxQjAgAUAAAGkCQAABjiHgIAFAEeAgAVBB4CABYFLAgBFyYCGAQFABABGAEmAxcEAQAoFwIYLAwYGSwOFBkAKBkCGSwOFRkAKBkCGSwOFhkAKBkCGSwODxkqAgAPAAAAAAAAAAAFAAAAAAAAAAAmAhkEGiwIABosDA8bABAAGQAkAAAY9CwEAAAsDBsULAwcFSwMHRYsDB4YLA0UDwAoDwIPLA4PFCwIAQ8AAAECASwOFA8sDRUUACgUAhQsDhQVLAgBFAAAAQIBLA4VFCwIARUAAAECASwOFhUsCAEWAAABAgEsDhgWJgIYAC4mAhkEGiwIABosDA8bLAwUHCwMFR0sDBYeLAwYHwAQABkAJAAAGY4sBAAAJgIYBAQsDAoNIgAAB6YMOA0YGSMCABkAABOJIgAAB7gmAhcEGCwIABgsDA8ZLAwUGiwMFRssDBYcABAAFwAkAAAa9ywEAAAsDBkNLAgBDyYCFAQDABABFAEmAw8EAQAoDwIULAwUFSwOAhUAKBUCFSwOEhUmAhQEFSwIABUsDA8WABAAFAAkAAAVKiwEAAAsDBYSCjgSBBQKOBQHFSMCABUAAAhCJAAAFposCAEUJgIVBAMAEAEVASYDFAQBACgUAhUsDBUWLA4SFgAoFgIWLA4NFiYCFQQWLAgAFiwMFBcAEAAVACQAABUqLAQAACwMFxImAhgEGSwIABksDAYaLAwQGywMERwsDBMdLAwSHgAQABgAJAAAFqwsBAAALAwaFCwMGxUsDBwWLAwdFyYCGAQZLAgAGSwMFBosDBUbLAwWHCwMFx0AEAAYACQAABiTLAQAACwMGhIjAgASAAAI/SQAABuVJgIUBBUsCAAVLAwPFgAQABQAJAAAFSosBAAALAwWEgo4EgQPCjgPBxQjAgAUAAAJMyQAABaaLAgBDyYCFAQDABABFAEmAw8EAQAoDwIULAwUFSwOEhUAKBUCFSwODRUmAhIEFCwIABQsDA8VABAAEgAkAAAVKiwEAAAsDBUNJgIWBBcsCAAXLAwGGCwMEBksDBEaLAwTGywMDRwAEAAWACQAABasLAQAACwMGA8sDBkSLAwaFCwMGxUmAg0EFiwIABYsDA8XLAwSGCwMFBksDBUaLAwHGwAQAA0AJAAAF1YsBAAAKAIADQBH2s1zJgIQBAEmAhIEAwA4EBIRLAgBDwAQAREBJgMPBAEAKA8CESwOEBEAKBECESwOEBEmAhEEAwA4DxEQLAwQESwODREAKA8CESwNERAmAhIEAgA4ERINOg0ADQAQIgAACkkoAgANAGGWa3wKOAENDyMCAA8AAApkIgAADTcmAg0EAywIAQ8mAhAEBAAQARABJgMPBAEAKA8CEB88AAUADQAQLA0PDQAoDQINLA4NDywIAQ0AAAECASwODw0sCAEQAAABAgEsDgoQLA0PEQAoEQIRLA4RDyYCEQQSLAgAEiwMDRMsDBAUABAAEQAkAAAbpywEAAAsDBMPJgISBBMsCAATLAwLFCwMDxUAEAASACQAABgkLAQAACwMFBEmAhIEEywIABMsDA0ULAwQFQAQABIAJAAAG6csBAAALAwUDyYCEwQULAgAFCwMCBUsDA8WABAAEwAkAAAYJCwEAAAsDBUSJgITBBQsCAAULAwNFSwMEBYAEAATACQAABunLAQAACwMFQ8mAhAEEywIABMsDA8UABAAEAAkAAAU/iwEAAAsDBQNLAgBDwAAAQIBLA4HDywIARAAAAECASwOBBAsCAETAAABAgEmAhQAQiwOFBMeAgAUAR4CABUACjgUFRYjAgAWAAAL0yQAABw3LAgBFCYCFQQDABABFQEmAxQEAQAoFAIVLAwVFiwOAhYAKBYCFiwOERYmAhUEFiwIABYsDBQXABAAFQAkAAAVKiwEAAAsDBcRCjgRBBQKOBQHFSMCABUAAAwyJAAAFposCAEUJgIVBAMAEAEVASYDFAQBACgUAhUsDBUWLA4RFgAoFgIWLA4SFiYCEgQVLAgAFSwMFBYAEAASACQAABUqLAQAACwMFhEmAhcEGCwIABgsDAYZLAwPGiwMEBssDBMcLAwRHQAQABcAJAAAFqwsBAAALAwZEiwMGhQsDBsVLAwcFiYCDwQXLAgAFywMEhgsDBQZLAwVGiwMFhssDA0cABAADwAkAAAXViwEAAAmAg8EACYCEQQDADgPERAsCAENABABEAEmAw0EAQAoDQIQLA4PEAAoEAIQLA4PECYCEAQDADgNEA8AKA0CESwNERAmAhIEAgA4ERIPOg0ADwAQIgAADTcoAgANAEb7RNoKOAENDyMCAA8AAA1SIgAAD3QsCAENJgIPBAIAEAEPASYDDQQBACgNAg8fPAAFAAUADywNDQ8AKA8CDywODw0sCAEPAAABAgEsDg0PLAgBEAAAAQIBLA4KECwNDREAKBECESwOEQ0mAhEEEiwIABIsDA8TLAwQFAAQABEAJAAAF5QsBAAALAwTDSYCEAQRLAgAESwMCxIsDA0TABAAEAAkAAAYJCwEAAAsDBIPLAgBDQAAAQIBLA4HDSwIARAAAAECASwOBBAsCAERAAABAgEmAhIAPSwOEhEeAgASCgo4EgwTIwIAEwAADi8kAAAcSSwIARImAhMEAwAQARMBJgMSBAEAKBICEywMExQsDgwUACgUAhQsDg8UJgITBBQsCAAULAwSFQAQABMAJAAAFSosBAAALAwVDyYCFgQXLAgAFywMAxgsDA0ZLAwQGiwMERssDA8cABAAFgAkAAAWrCwEAAAsDBgSLAwZEywMGhQsDBsVJgINBBYsCAAWLAwSFywMExgsDBQZLAwVGgAQAA0AJAAAGJMsBAAALAwXAyYCDwQQLAgAECwMAxEAEAAPACQAABxbLAQAACwMEQ0mAhAEAQYoEAIDJgISBAMAOBASESwIAQ8AEAERASYDDwQBACgPAhEsDhARACgRAhEsDhARJgISBAMAOA8SEQAoDQISLQQAEoADLQQAEYAELQQAEIAFJAAAHIYAKA8CESwNERAmAhIEAgA4ERINOg0ADQAQIgAAD3QoAgADAPjUXpsKOAEDDSMCAA0AAA+PIgAAEjcsCAEBJgIDBAMAEAEDASYDAQQBACgBAgMfPAAFAAkAAywNAQMAKAMCAywOAwEsCAEDAAABAgEsDgEDLAgBCQAAAQIBLA4KCSwNAQ0AKA0CDSwODQEmAg0EDywIAA8sDAMQLAwJEQAQAA0AJAAAFG4sBAAALAwQASYCDwQQLAgAECwMCxEsDAESABAADwAkAAAYJCwEAAAsDBENJgILBA8sCAAPLAwDECwMCREsDAgSABAACwAkAAAUIiwEAAAsDBABLAgBAwAAAQIBLA4HAywIAQgAAAECASwOBAgsCAEJAAABAgEmAgsAHSwOCwkeAgALCgo4CwwPIwIADwAAEJMkAAAczCwIAQsmAgwEAwAQAQwBJgMLBAEAKAsCDCwMDA8sDgIPACgPAg8sDg0PJgIMBA8sCAAPLAwLEAAQAAwAJAAAFSosBAAALAwQAgo4AgQLCjgLBwQjAgAEAAAQ8iQAABaaLAgBBCYCCwQDABABCwEmAwQEAQAoBAILLAwLDCwOAgwAKAwCDCwOAQwmAgIEDywIAA8sDAQQABAAAgAkAAAVKiwEAAAsDBABJgINBA8sCAAPLAwGECwMAxEsDAgSLAwJEywMARQAEAANACQAABasLAQAACwMEAIsDBEELAwSCywMEwwmAgMEDywIAA8sDAIQLAwEESwMCxIsDAwTABAAAwAkAAAYkywEAAAsDBABJgIDBA8sCAAPLAwBEAAQAAMAJAAAHFssBAAALAwQAiYCBAQBBigEAgEmAggEAwA4BAgGLAgBAwAQAQYBJgMDBAEAKAMCBiwOBAYAKAYCBiwOBAYmAggEAwA4AwgGACgCAggtBAAIgAMtBAAGgAQtBAAEgAUkAAAchgAoAwIGLA0GBCYCCAQCADgGCAI6DQACAAQiAAASNyYCAQJyJgICAmwmAgMCICYCBAJrJgIFAmMmAgYCcyYCCAJvJgIJAlUmAgsCdCYCDAJlJgINAncmAg8CbiwIARAmAhEEEQAQAREBJgMQBAEAKBACESwMERIsDgkSACgSAhIsDg8SACgSAhIsDgQSACgSAhIsDg8SACgSAhIsDggSACgSAhIsDg0SACgSAhIsDg8SACgSAhIsDgMSACgSAhIsDgYSACgSAhIsDgwSACgSAhIsDgISACgSAhIsDgwSACgSAhIsDgUSACgSAhIsDgsSACgSAhIsDggSACgSAhIsDgESCjgHDgEjAgABAAATiCYCAgQSLAgBAyYCBAQSABABBAEsDAMEKQMABAXrVRmnEQ9kMAAoBAIEACgQAgUmAgYEEC0EAAWAAy0EAASABC0EAAaABSQAAByGJgIFBBAAOAQFBCwOCgQAKAQCBDsNAwIlJgIaBAQMOA0aGyMCABsAABOgJAAAHN4AKBcCGgA4Gg0bLA0bGSYCGgQbLAgAGywMDxwsDBQdLAwVHiwMFh8sDBkgABAAGgAkAAAZjiwEAAAAOA0FGQ44DRkaIwIAGgAAE/AkAAAc8CwMGQ0iAAAHpicAgAQEeAANAAAAgASAAyMAgAMAABQhKQEAAQX3ofOvpa3UyjsBAQIlJAAAE/kmAgUEBiwIAAYsDAEHLAwCCAAQAAUAJAAAFG4sBAAALAwHBCYCAgQFLAgABSwMAwYsDAQHABAAAgAkAAAYJCwEAAAsDAYBJSQAABP5LA0BAywNAgQmAgYEAgw4BAYHIwIABwAAFJIkAAAc3gAoAwIGADgGBAcsDQcFLAgBAyYCBAQCABABBAEmAwMEAQAoAwIELAwEBiwOBQYsDQEELA0CBSYCBgQBADgFBgcOOAUHCCMCAAgAABTkJAAAHPAsDgQBLA4HAiwNBAECKAECASwOAQQsDAMBJSQAABP5JgICBAAAKAECBAA4BAIFLA0FAxwMAwIBHAwCAQAcDAECASwMAgElJAAAE/kqAgADAAAAAAAAAAACAAAAAAAAAAAmAggECSwIAAksDAMKABAACAAkAAAY9CwEAAAsDAoELAwLBSwMDAYsDA0HLA0EAwAoAwIDLA4DBCwIAQMAAAECASwOBAMsDQUEACgEAgQsDgQFLAgBBAAAAQIBLA4FBCwIAQUAAAECASwOBgUsCAEGAAABAgEsDgcGJgIHBAImAggEACYCCQQBLAwIAiIAABXVDDgCBwgjAgAIAAAWEyIAABXnJgICBAcsCAAHLAwDCCwMBAksDAUKLAwGCwAQAAIAJAAAGvcsBAAALAwIASUMOAIHCCMCAAgAABYlIgAAFnomAgoEAgw4AgoLIwIACwAAFjwkAAAc3gAoAQIKADgKAgssDQsIJgIKBAssCAALLAwDDCwMBA0sDAUOLAwGDywMCBAAEAAKACQAABmOLAQAACIAABZ6ADgCCQgOOAIICiMCAAoAABaRJAAAHPAsDAgCIgAAFdUpAQABBQLcbieAdhKdOwEBAiUkAAAT+SYCCgAyCjgBCgsmAgoBACYCDAAAIwIACwAAFxkiAAAW0iYCCwA2CjgBCw0jAgANAAAW7SYCDgQAOwkBDgo4BQwBCjgBCgsjAgALAAAXBCQAABaaLAwCBiwMAwcsDAQILAwFCSIAABdFCjgFDAEKOAEKCyMCAAsAABcwJAAAFposDAIGLAwDBywMBAgsDAUJIgAAF0UsDAcCLAwIAywMBgEsDAkEJSQAABP5JgIHBAgsCAAILAwFCQAQAAcAJAAAHFssBAAALAwJBiYCBQQAACgGAggAOAgFCSwNCQcvDAAHAAQlJAAAE/ksDQEDLA0CBCYCBgQBDDgEBgcjAgAHAAAXuCQAABzeACgDAgYAOAYEBywNBwUsCAEDJgIEBAIAEAEEASYDAwQBACgDAgQsDAQGLA4FBiwNAQQsDQIFJgIGBAEAOAUGBw44BQcIIwIACAAAGAokAAAc8CwOBAEsDgcCLA0EAQIoAQIBLA4BBCwMAwElJAAAE/kmAgQABAo4AQQFJgIEBAAjAgAFAAAYdyIAABhFJgIFAA4KOAEFBiMCAAYAABhgJgIHBAA7CQEHACgCAgUAOAUEBiwNBgEsDAEDIgAAGI4AKAICBQA4BQQGLA0GASwMAQMiAAAYjiwMAwElJAAAE/kuDAAEAAUsCAEEJgIGBAIAEAEGASYDBAQBACgEAgYsDAYHLA4FByYCBgQHLAgABywMBAgAEAAGACQAABT+LAQAACwMCAUsDAUBJSkBAAEFCe7C8oeKUqo7AQECJSQAABP5JgICAAAsCAEDJgIEBAQAEAEEASYDAwQBACgDAgQsDAQFLA4CBQAoBQIFLA4CBQAoBQIFLA4CBSwIAQQmAgUEBQAQAQUBJgMEBAEAKAQCBSwMBQYsDgIGACgGAgYsDgIGACgGAgYsDgIGACgGAgYsDgEGJgIBBAAmAgIBACwMAgUsDAEGLAwEAiwMBQQsDAMBLAwGAyUkAAAT+SwNBAYmAgcBAAo4BgcIIwIACAAAGbImAgkEADsJAQksDQMGJgIHBAMKOAYHCCYCBgQBIwIACAAAGmkiAAAZ0iwNAQcsDQIILA0DCSwNBAosDQMLJgINBAMMOAsNDiMCAA4AABn9JAAAHN4tBAAHgAMnAIAEBAAEJAAAHQItCIAFAAwAKAwCDQA4DQsOLA4FDiwNDAUAKAUCBSwOBQwsDQgFACgFAgUsDgUIADgJBgUOOAkFByMCAAcAABpUJAAAHPAsDgwBLA4IAiwOBQMsDgoEIgAAGvYmAgcECCwIAAgsDAEJLAwCCiwMAwssDAQMABAABwAkAAAdiCwEAAAsDQEHLA0CCCwNBAkmAgoEAC0EAAeAAycAgAQEAAQkAAAdAi0IgAUACwAoCwIMADgMCg0sDgUNLA0LBQAoBQIFLA4FCywNCAUAKAUCBSwOBQgsDgsBLA4IAiwOBgMsDgkEIgAAGvYlJAAAE/ksDQQFJgIGAQAKOAUGByMCAAcAABsbJgIIBAA7CQEIJgIFBAYsCAAGLAwBBywMAggsDAMJLAwECgAQAAUAJAAAHYgsBAAALA0BBSwNAgYsDQMHLA4FASwOBgIsDgcDJgIBAQEsDgEEJgIBBAAAKAYCAwA4AwEELA0EAiwNBQECKAECASwOAQUsDQYBAigBAgEsDgEGLAwCASUpAQABBbDErvb+drw/OwEBAiUkAAAT+SwNAQMsDQIEJgIGBAMMOAQGByMCAAcAABvLJAAAHN4AKAMCBgA4BgQHLA0HBSwIAQMmAgQEAgAQAQQBJgMDBAEAKAMCBCwMBAYsDgUGLA0BBCwNAgUmAgYEAQA4BQYHDjgFBwgjAgAIAAAcHSQAABzwLA4EASwOBwIsDQQBAigBAgEsDgEELAwDASUpAQABBVd9Leakk8oaOwEBAiUpAQABBYN7SGg+6XpAOwEBAiUkAAAT+RwMAQIALAgBASYCAwQCABABAwEmAwEEAQAoAQIDLAwDBCwOAgQlAQCAA4AFgActAIADgAgtAIAEgAkLAIAIgAeACiMAgAoAABzLLQGACIAGLQKABoAJAQCACAACgAgBAIAJAAKACSIAAByaJSkBAAEFS5Boxr34g3A7AQECJSkBAAEF6J0J/qERLQ47AQECJSkBAAEFRafKcRlB5BU7AQECJS0BgAOABgsAgAYAAoAHIwCABwAAHR0iAAAdKC0AgAOABSIAAB2HLQAAAYAFAQAAAYAEAAEBAIADgASACS0AgAOACi0AgAWACwsAgAqACYAMIwCADAAAHXstAYAKgAgtAoAIgAsBAIAKAAKACgEAgAsAAoALIgAAHUonAYAFBAABIgAAHYclJAAAE/kmAgYEAyYCBwQAJgIIBAEsDAcFIgAAHaUMOAUGByMCAAcAAB4SIgAAHbcsDQEFLA0DBiwNBAcsDQIIJgIJBAQsCAEKJgILBAUAEAELASYDCgQBACgIAgsmAgwEBAAoCgINPg8ACwANLA4FASwOCgIsDgYDLA4HBCwNBQECKAECASwOAQUlLA0DBww4BQcJIwIACQAAHigiAAAe4SwNAQcsDQIJLA0DCiwNBAssDQIMJgIOBAQMOAUODyMCAA8AAB5TJAAAHN4AKAwCDgA4DgUPLA0PDSwNAQwmAg8EAww4BQ8QIwIAEAAAHnwkAAAc3gAoDAIPADgPBRAsDRAOADgNDgwmAg4EBAw4BQ4PIwIADwAAHqYkAAAc3i0EAAmAAycAgAQEAAUkAAAdAi0IgAUADQAoDQIOADgOBQ8sDgwPLA4HASwODQIsDgoDLA4LBCIAAB7hADgFCAcOOAUHCSMCAAkAAB74JAAAHPAsDAcFIgAAHaUtABjKGMo=",
68
- "debug_symbols": "5V3djt22rn6XXOdCokiR6qtsHBT9yS4CBEmRpgc4KPrux5mZ5Znpkq1SMm0Kc9O9p/XH7xOXRMkWRf317tcPP//5248fP//3yx/vfvjPX+8+ffnlp28fv3xe/vrr7/fvfv768dOnj7/9+PJfvwvf/5HLw/N//P7T5+9//vHtp6/f3v2Q4P27D59/ffcDhgX934+fPiz/juDv/3n/jkUJiClrEO/vnowBRJ4ejiFBWZ+PMTwwYDBnIGsGMm8Dmbchm7chq3sfgxrBWoRENYK0iBLUCFQjtN6FkNQIrXchghqRtQgIagSqEWrvJrV3k5oD1d7FwXgusTw9Kgmfn4WHEQ4UTa2TqfViaT0nU+tiaZ1Ntesitta6jPbIwKt1vreeLa2XYGodTa0XQ+spoKl1sbSumxEr66xcwm2ZxeEuwqeYbe1DNLZPxvaLrf2ExvbF1j4a909kW/tkrJ+G34iJ19ckpsbTSJRulinHV+9UlcgD4aZDIPKrp79rz6NjN0BZtVNuPp1ofVqeW7q8DtWelnx7uMj6LIT8qJxmVc5hWuXT+lym9bnM6/Myq/KSplUukyrHAI6V0035Mp3eK+dZlUfPs/++cs9RcVc5eJ6J9pXP63PPM9Gu8nTuTLTs+dyefvW2UFWeSllllIblzPHp2Szyyu5DK+UttBLfxG9J8U20Mh/YSoknrrNymFY5zaqcp/U5T+tzmdbngtMql1mVH/rGf65ydqx8b21Lh77xn6vc8+y/qzx6jor7yj3PRLvKYVqf67KiXCk/dybaeQv5riYlV2rYkxqMrtSQKzXFkxpy1YvJVS/O4EqNK9+wqxHOrkY4uxrh4mqEy4G9OIbXar7bL2BsP5vazyEY20dj+2JrP4KxfePfF6KxfWP9SXsKIyftOZqMag7Uc2gP1WVCNULNkdUc6tNWmZMaoT0PlAXUiOF5YQnN6zS1DLPnmecxKzKPzwxNhmzMwCGaM5i3IWp7E4P2rBjrxmo1Cu6fcmQSa4aczBnM28DmbWDzNoi696nPgXIhNUI7t4j6HKgE7dwi6nOgoj4HKhDVCNuzJmJ81kSMz5pIsjxXKJhMrVueKxTTk65ietJVRnNCGtZttVue0pXhk657J/+ELc8VioCpdcuTrlKiqXVL7SUEU+u2Eb4E29OEJSZj+7anCYvxadcCtqd1SwrG9o37Z7JdQRU01o+j4wsRb/YxQ+PpQ0+LluEdQARYtWNqvm8dliVVhncLL1M+vLN4nfJpfc7T+pyn9floXZYLldOsykfryVyoHB0r38tMK6N1cC5THkPwPP03pHuOi/vSo+fJqCF9Xq+D5+moIf3c+Wg/i2dpWfAlB33JEVdyEHzJya7kkK+uTL66MhVXcrIv72RfA519DXT2NdDF10CXI7sy32XqLQTFmKAkawK2JYghWhOQNYHxjxxjsiYQYwKwbgGoq9HHBHqIngX1LJjVEIp6iJ4l61myuoJ/5KCHoB5S1JDx+gGNvMyFophTjJ/Ib1OINQUE81ZAVHcqgKSGHFDWp3EZCNjfaAL2V5pAtm8F27eC7Vsh+k4o6nkNCugh6hknhaCHkB6ingtSTHqI/kooGH2Z5LB+/uQXOU8Q4xNBNiZI0ZrAMgkyJgy25tHWvJiaHy0A3zLPpuazrfqcTc2zZTJkHK5I3jJfTM1LsjXPpuYL2Jo3VY8h2ppXT+8Ygx6Ceoh6ekcAPUS9hsIU9RA9C+qdbJwRuhCIMQElawI2JsjRmiAbE3CwJrDuplyMCcS6BaP1KSGUW1HgZWHfyr0+MN8t4uhke6V0nlX6cInKK6XP6/U4r9dHa8JcKH20TOWV0mle6cWx9N08QxrNpLtSuueFwL509BwcaV+65ylpXzrN63XyPCXtS8/nTkmNNCzK5EtOcSVntFTC0XLYlZzR421Hy/HVlcVXVx49XXa0HFfeycHVQM/B1UDP0dVAz9HVQM/xyK6c7hMsM6A1gRgTJLAmyMYEGKwJrH9ktO6mZN0Csu6mebibCj4TpAoBGxMwGROMniIBgFvxFgBslVM/tNTLIn7UO0C8iufWERhCvKWREFJpiaf1JVOI4F58Gfa83ORACtgSn9fkr8Xx2BRf1syBHFNF/Kjno6xDNzW7DQRmWl/CuTx7k8uTnuJKDwd0pseZf6Iz/0Rn/hk95HO4HvalZ3gBerSe7EvP6I1Vh+vxNV/w6Cn5w/WcHQ/Tsx55sfJZ9FRWA8sq8bYaYHiWAunxGzgzzaxewtTqp+45w9lOl6ovaWr1M/teAkytPs+sPs4cMSXOHDElTj1qYepRe/pb0KHqU5xa/cxrTMGpIyZOHTFx6ohJM68xhaaOmHnqiJmnXmPy1BGTp46YXGZWL1NHTJk6Ypap1/fFdcRkyKv6VO7Ul+B6tmqqn9r3vr+INNW7nq2a6l2v71vqfX8RaaqfetSmqUet7y8iLfW+v4i01JPvmPNinfNis3lVz65H7fKx7KZeCO/Vi+t1TlO961HbVO/6zbCl3vd+bVO96zfDffUQfL+dNNVPHDEhxKl9HyeOmIv60YiZ8nOad8mNpw+s+wBhOAn1QukyrfQ0r9fTvF7Heb0+XLLiOumjFduvlJ6nlT5cssJS+l61jeV/aF7pnhcC+9LZc3BsSPc8Je1Ll3m9Lp6npH3p5dwpaacYwf3TqZRVRmlYznx76ckir+w+NjO/hWYO34g2SzPLm2jm8D7li2ZiPPEueBi+Fu5C6Ud+Bjhb+rxeT/N6Pc3r9eHKlRdKz9NKP/IzwNnSybH03ZVuPPIzwNnScV7pnoPjvnT2PCU1pM/rdfE8JTWknzsl7Rf2g1iiLznkS07xJGf4Vtqj5bArOdFVV4boqisDBF9ynHnH10BPvgZ68jXQ0ddAxyO7coJXTz8QULAmQGsCMSbIYE2QjQnY+kdm624q1i0Q6246XHkJaU2TQ473BMM7TA2CNLy3g+V2/TsQ0IkvRmk4nfQ66cMn3S6UjvNKL9NKh3m9Prx9dJ304QKpOukX7Qin4dX6HM3Et/FrUngbzaQDm4lwbFjZ3e5KVKaVPrxndKH0eb3O83qd5/X6cOrohdJ5WukF5pWeHUvfXenioZ8BTpbueSHQkO45OO5LP/QzwMnS5/U6eJ6SGtLPnZIaezCYwJec7EoOBl9y0JcccSWHfHVl8tWVc/Qlx5d32NdAZ18DnX0NdPE10OXIrpxfy3kgKNGagKwJii0BhWRNwMYEMVoTGP/IBMGawLwFqm76ANEdT3qA6KqDPEL0LKRn0dXXf4Do0oceIXoW1rPoqhI+QHSlAB8hpIbobup9hHSwqHtyHg2hMVBZPwuGDK8vZH6kEHOKCPYUbE4B9q1I6viQUT0M8+ixsBhAZG1IgnLfkNEqLv+GophTjK74/w2FfSvEvhVi34qinqE4RD1EPUNxDHoI6iHquUN5w/QjRO/kBHrI4LuZhPXq+vT86pfgsafw6PfBlnmyNT84lCSW1Tzemx9Njm+ZF1Pzo4nxLfPZ1DxHW/O26kcT4lvm0XRYjc5QDfOjdadb5tnSvIxusLfMm8Z7ibbqI9maN433Mpqb3TJvGu8lga1504gpGG3N26qnYGveNN4LmcZ7ycnWvG28Z9uIybbxXmzVi228F9t4X2zjfTGN9yWArXnTiFlitDVvqx6CrXnTeF/ANN6XlGzNm8b7Mnq4qGXeVj1FW/Ojn6pzWVMRONx/7iqjS5Emwei5lzaBGBMwWBOwMcHooqRNYN1NS7AmMG+B4UC7fxqX3fybZcqvN/MqQQjCTYe8Slh63N9IIeCp4tO634KpcEt8XHOtl88hsSLeNsSlENGYAMCaYDACYSBcn5XWHVcHHh1KIcV5pedppeO8Xsd5vU7zen10IXul9DKt9NHF95XSxbH0vQNbafi+oiule14I7EsXz8GxId3zlLQvvczr9eJ5SmpIP3dKuqZSTYqjr52zNPNt/JqR30QzR1/WXzWz4Ilrrgh5WumHfgY4Wfq8Xsd5vY7zen00+eVK6Tiv9DKt9JwcS99d6cZDPwOcK509LwQa0j0Hx33p4nlKakif1+vF85TUkH7ulLRfGyLFUjzJGb4H6Wg57EpOjL7kkC85vroy+OrKIK7kJF/eSb4GOvoa6OhroKOvgU4HduUYX8t5JBBjggzWBNmYgIM1AVoTWP/IYv0jCxsTFOsWFG3Fg5TUdRVSCnqWqGeJpIZA0EP0LEnPklAPKWqIuuzVAhE1hKyrGC0UYk6RwZ6CzSnYvhWi71RFW0UkYbSuYpSG64j/G4piTgH2rQD7ViT7VqC+E6J6XkOKegjpIeq5AHWZjI8Q9VyArHcysxoy+oma6NZX6MXFlLHEJ/Nkan70U2/L/OBQ2j3pmYbryu6bH64q2zLPpuZNzwgv5rOpebBVP1pLtmXe8ozwsshFW/Niat70jPBiPpuaNz0jvJi3VZ+DrfnRpVPjbBsZnw9ONJru3yZgYwLj88ELQTYmMD4fvBBYd9NifEo1B7QmMBxo909nxjUNl6l1SLgEuUWh8vDEP16vcjQexDkah6EMxmMsD6fYItx+McQz7xdcpNO00kcLxl4pfV6v07xep4m9XqaVPpxie6F0mVb6cIqtpfTdtMM8fNL2OunieSHQkO45OO5LL56npIb0ib3ueUralc7h3CmpkZXFQVzJieBLTnYlB4IvOehLjq+unHx15cSu5KAv76CvgU6+Bjr5Gujka6DnI7tyfl1B4ZGAjQk4WhOQNUExJpBkTWD9IxfrblqMWzB850ybQJ00Jeqr3BYI6iHqpClRX+WWlDezPEDUV7kl5Q0qDxCMeoieRZ9lJ6RnyfoOk/XdkvUs3MGizhgU0Xd+0XfLou/8Rc1SQtJD1B4r+hMKBaIeMrpP2czxLqM7lf+GgswpMNhT2LdCH7iKPgoVGT7E0UrALsLmFAXsKaxbgSGAPYV9K9TBcIEUNUT3YesRImqIeu20QFgNUa+dFojeyRT0kMGPCpHD+lWeX+QwQoxPBGJMMLq73CawTCzHwGBrPpuaN71cdjGPtuaLqfliq970TjeMwTKxfDHPpuZNL5ddzJOt+WJq3vROt8W8rXrTO90W8+rpPaoPIGJUfxrBqJ/elTUlHyHqNZSyhuIjRM/Ceiezbd4vRgnWBGRNUIwJSrImsM0eRwhgTWDcTYdrsbUJrFsAhgPt/ulDD1As4o0HMaRgTWA9xnB0Z2/5qHt7tqTcknNcou0inaeVTjCv9Hm9nuf1ep7X68PpFRdKp2mljy6Qr5SOjqXvpTcv0su00ovnhUBDuufguCs9Bc9TUkP6vF6PnqekhvRzp6RrLqzCBOFtNPNt/JopvY1myoHNpHTimishzCudp5VO83qd5vV6ntfrwyXSr5POYV7pNK/04lj6/kr30M8AJ0v3vBDYl148B8eGdM9T0q50DNN6HYPnKWlfejx3Sto/SbnIIV9yiis5kHzJYVdyUvQlx1dXTr66MqIvOb68Q74GOvka6NnXQM++Bno+siszvHr6gYDRmkCMCQSsCbIxQQnWBNY/cjHuphTQmsC4m1JUJx1TVOePk/qoMJL6MrNlQgt6SAeL+qQfqS8zWyDq/HEiPYs+F570ufCU9R1GnwtPrGcRPYuojzVQ0Xf+ou6WOQQ9RM8S9SxR7bEMoIeoe3JO1pf/LRRiToFgT8HmFGTfCn3gyvpDPJn1LKxnET2L6FmKnkVd3wRZXd8EleVEHyBRzxL1LKBnAfW0xfoj/aw/88f6M3+MehZ1OaQFop62WF0OaYGgHqJeGbI+XLA+XLB+naMsFPcA0a9zWH3HM4p+naMvuLZA1D+lvuAa6guuob7g2gJR/5T6gmuoL7iG+oJrC0T/U+pPFYv+VLGQvsPoFySiX5CI/k1K9G9SIvqfUv8mJaNfpPj2JD9/0yR5sk1mtstoNfZd22Jne7RO+q5ttrMNhrpHS9jt2R7dP9uzPboZtmvbUDcZ6s7B0LZhP2HD/s2G41IMdYuh7hINbZv1EwqjpYwhyi0RHxLG1tOB16QhCMLPu4xcKo8va4a1TI3A82EDSPlJfZ5ZfZza96NJSdeqHy3/dLH6qX2fpvb96Ad7Y/UhrepjRf1okZGL1fPM6sl3vG+pp6nV+46YDfV56lGbpx61o29SF6uf2vcydcQU328nDfVlat+XmeN9rM9Wu8WKKda3I1sg6QDVQ2ILlDtA9QDQAvUw1TcOWqC6y/eK6y6gogdBfX+gBeIOUP2rRAuUO0DQw1RP+myA6jmcJLdwQJIqoNIBqr9f5XhLls8va2asIOkAUQ9T/cxCC5Q7QNzDxD1M9fpqVG43eORQ6RH1I80tUOkAlR6m0sGUAvaApANU3/VrgXIHqF59KK+nSfPLjPUVRB2g1MOUepg2YkQDJB2ges5kC5Q7QLnHe7nHe/U6ChxuII4vzyLHR1B9uLdAPUylh6meE/kCBOkOhPUlQQvUw1TPKBKA29CVJXK/WsXer3lTWa+8TC9+1VRbTS+RbF17w6uHH+TU96mvk1NcySFfP1b90OZlcuoVh66T48s79UXbdXLIlxxfA118DXTx1ZWLr65cz+G4Sg7VU6Svk+NqRqfgaqBTdDXQNw73XiYHXM3oBL4GevI10JOrGX3joPZlctDXQK9/crhMDvka6ORroGdX6x2Ss0cWPssh+qecHE6eswRu+0bLl+Z0JyeCLznZlRwIvuSgLzniSk7y1ZWTr4GOvryDvgY6nT1ncVonCbmXk0+eszCuNVER8E4Ooy85vrxz9uemhpwCvuS48g4HV97hcHIYxACrnBfbfzc5MfqSQ77kFFdyzt4LbclhV3KSr66cfHVlDL7k+PIOoS85vuJO9uUdBk9yZKOukuJCMU63JEPGF+WM5TEjWzaqDR9IYN2CjdPvhxGUjfppBxKIMQFYt2DjboDjCOq9KCa4pUfH9KK093dYhSKvKZnM8cXTj2USqdST6Y4mkRNI6m9tR5OwOUkOAc4gySeQ1OvHaknybWrhLK9JKk/TupfBVJVE7iSBPy+BQy+V0yVhTs+SsPF0jJFXKRGi3DehXgFv9xTKAqIeUFEfvsihvmhvgXqY6qmSDVB9mdoC9TBJD5Poj0TkUEIPiPSgGEIPqIcp9jDVy2m2QNIBAugB6c9R5FhfIbZAPUzYw7QRI/ZBGzGiAZIOUIYeUI/3uMN7UP/+E/l5OuIXUQJifIJRF4z62Oq1Jpa37ucX8Je108sNJl0w7mOrp9MuESGts2mW1sQO8cWpF25N7GE9YsoBc3NiD1lWKTHcFZvPaWPFbtiEZeV9e9HMpVBFUnYnqb43cq0kf14Cf14Cf16q58JeKwmPkBTWFxQgqJCUE0jquatHk/AJJARnkJzRkhxPIKlfAbKQry8+L9bG6QkjaszGxcwNDOsxsYMndvBAB8/GK8UuZuNc+z6GOjBFj6mf5G1gNk4wr1+C7rKRM9aHdAPDekzu4MkdPNzBU6+tsY+pl9ZoYKgDU/SYrYP2uxh936GtY/Z7mK15ak2HXL77yR2qng4Z4TlcQ473qNyDyl1c9W3WFqq+d9pESQ+q/hkuAq931UO593x9b7SB2rjpLtL6zW/5v/EehV0o6UHV55gmKvegNlbXy/Lzhso53KOoB4VdXPWZo4Wq11NookoPqv4pqoWqf4tqorgHtTG+WqgurtLVrtLToziELhR2oXr64cb1dE3UhufXraDI4W7+4o240UJ1cW1FgH3UVgRooLALJT0o6vLhxry8vC3cUIjxHpV7UBy6UNiFkh7URrRpobq8Ubo8X3q4Nm6oa6KwC9XjeYkbnqd18wA53KO4B1VPu2qhNtYbLRT1oDB2oXIPirq4qKtdG6uUBipjF0p6UNzVD7mrH9aLzTbWvVJ/322iSg+q/q2tgdq4/23/cF7euNkt8nqGLi4h8x7FPSjo4tqIAC0UdaHqv5fIeqV0CXSH2lhvtFDSg9pYb7RQuQdVr/bYRHV5I3d5nru4uMvz0uV56fJ86fJ86fJG6fAGb2WitlDcg6rvDkNY1zYQUgWVe1DQxQVdXPXI1kRhF6r0oOrbfU0U96Dqka2F2qjwvJcDuYCkA1T0qX8LSJ9kyDF0MG3k1rVA1AGCHiboYtLXx14+oKQekHSAsIcJe5ioh6m+tdUA1b9MtEDUA9InGS7fubAH1MMkPUwFekCsB0GIPSDqAXV4D2KH96C+ciS6dSPiuxzBBVQ6QPV8xBZIOkDSwyQ9TKWHqd739kFbVb9wvUSF/vmeyRulueIy699WfiHfze55Iy+whaIuVOlBbXzV2t0D5o3qTi1Ugi4U96Cwiwu7uKiLi7q4chdX7vq9uIuLcw9KQhcKu1Bd3ihdI6X+drobazbq0MQQcR3J6R61cdauhcIulPSgUle76sdGWqiNnbf9aLhRa6KFoi4ukh5U/dxDE9XFxV1c3DNT8sZX7ZDX0RUE7lG5B1W6uErpQG3thrVQXVyxiyu2+0YFBT19Q6CnH0rq4sLYhco9qI0VQAvVs2Lb2tdqoDh0oXrioUgXl3S1S7p6VOn6vUpP3yihx4clhi5UF5d+LP+9/PW/P339+NPPnz78sWC+/8c/P//y7eOXz09/fvu/32//5eevHz99+vjbj79//fLLh1///Prhx09ffvn+396Fp3/8J5Lg+5gDLnrSw995+Zv4+98PnoihlPfLN8KHfxEfnqC4PEFp0bLo+X8=",
69
- "brillig_names": [
70
- "public_dispatch"
71
- ]
72
- },
73
6
  {
74
7
  "name": "is_reject_all",
75
8
  "is_unconstrained": true,
@@ -126,38 +59,18 @@
126
59
  }
127
60
  },
128
61
  "bytecode": "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",
129
- "debug_symbols": "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",
62
+ "debug_symbols": "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",
130
63
  "brillig_names": [
131
64
  "is_reject_all"
132
65
  ]
133
66
  },
134
- {
135
- "name": "sync_notes",
136
- "is_unconstrained": true,
137
- "custom_attributes": [],
138
- "abi": {
139
- "error_types": {
140
- "17843811134343075018": {
141
- "error_kind": "string",
142
- "string": "Stack too deep"
143
- }
144
- },
145
- "parameters": [],
146
- "return_type": null
147
- },
148
- "bytecode": "H4sIAAAAAAAA/9VUyw6CMBBseURBOaiJ3kz8gyIYOJJ49x8akKMe8OKNT5eabbqpVRKlJkzSbEs3szNlW0oUKESPvAH9tGnIFdhBDCA6aN/tRgFr9hviQKs7JH/O0iQw+BtQ/5OfWtIvIPktnT+bAM+xVfzYi6w77UaIesKWZ/nPbHpe9fhc/MFnh32k1caghm+uIYci3RuYR4Y8iRlRd9prh/eV5YzJei7w++RVO67va/lrWIeafvmOFV/qrDMe1wmv+YFXVVrypcYv4KBzGnMvbGHe1wvY45yo3mjul/J0vZ0b0gNB8gCVxsvQjgYAAA==",
149
- "debug_symbols": "ndLNCoQgEAfwd5lzh9S0j1eJJawsBNEwW1iid1+LdmmXLnoZmMHfzMH/Cr1ol7GRejAzVPUKynTcSaN9t24JtFYqJcfmOoZ0Lwgd7+eJ672dHbcOKoITELqHKku9HqQSfkbx9kgA4VBAQkEWCmggwLcXSoqLk5SU0i9CuDgQjUEsBuUxqIhA5Pb3S4byD2KE/aLNt09uJW+VONM1LLq7hM29JvGXu8maTvSLFXsCL+Hztfa3MPZr/eo3",
150
- "brillig_names": [
151
- "sync_notes"
152
- ]
153
- },
154
67
  {
155
68
  "name": "compute_note_hash_and_optionally_a_nullifier",
156
69
  "is_unconstrained": true,
157
70
  "custom_attributes": [],
158
71
  "abi": {
159
72
  "error_types": {
160
- "16957488177269924912": {
73
+ "16541607464495309456": {
161
74
  "error_kind": "fmtstring",
162
75
  "item_types": [],
163
76
  "length": 16
@@ -235,68 +148,16 @@
235
148
  "visibility": "public"
236
149
  }
237
150
  },
238
- "bytecode": "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",
239
- "debug_symbols": "tdfNaoQwFAXgd8k6i9z8TIyvUsoQNQ6BECVqoYjv3jhM26GzLGcj3HD9IpJDuDsbQrfdrjGP08Lat52lqfdrnHKt9oOzrsSU4u36vMzE+XDq3r/MPp/lsvqyslZJzkIeWKtFfXuMKdQ1Iw/+0mm/O6396TTN8c6Z0zDZwOQLTLYwuYHJDiWTEDiacLTE0QpHaxxtcPQFR1sc3eBoXBoJl0bCpZFwaSRcGgmXRsKlkf6ZRqcenfXXvtgWaDdA2+FsKYA2AW0JtBXQ1kDbAG1gLiUwlxKYS4nK5VGrD1+i71J4DFbjlvunOWv9nMOfkWsuUx+GrYRz+Pqdu86zrDTX+n6114LqB5KydZO60Rc=",
151
+ "bytecode": "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",
152
+ "debug_symbols": "tdfBaoQwEAbgd8nZQyaJG+OrlLJEjUsgRIlaKOK7d1y27dI9lv8iTBi/iOQnzC6G0G23a8zjtIj2bRdp6v0ap8zVflSiKzGleLs+Lwt5Ppy+9y+zz2e5rL6sotWqEiEPojWS3x5jCrxW01G9dNrvTmt/OrnxvRLOwOQaJl9gsoXJDUx2KJmkxNGEoxWO1jja4OgaR19wtMXRDY7GpZFwaSRcGgmXRsKlkXBpJFwa6Z9pdPrRyb/2xbZAuwHaDmcrCbQJaCugrYG2Ado10AbmUgFzqYC5VKhcHlx9+BJ9l8JjsBq33D/NWevnHP6MXHOZ+jBsJZzD1+/cdZ5lbSpj7lc7F8QfSNryJrzRFw==",
240
153
  "brillig_names": [
241
154
  "compute_note_hash_and_optionally_a_nullifier"
242
155
  ]
243
156
  },
244
157
  {
245
- "name": "set_authorized",
246
- "is_unconstrained": true,
247
- "custom_attributes": [
248
- "public"
249
- ],
250
- "abi": {
251
- "error_types": {
252
- "16761564377371454734": {
253
- "error_kind": "string",
254
- "string": "Array index out of bounds"
255
- },
256
- "17843811134343075018": {
257
- "error_kind": "string",
258
- "string": "Stack too deep"
259
- },
260
- "206160798890201757": {
261
- "error_kind": "string",
262
- "string": "Storage slot 0 not allowed. Storage slots must start from 1."
263
- },
264
- "5019202896831570965": {
265
- "error_kind": "string",
266
- "string": "attempt to add with overflow"
267
- }
268
- },
269
- "parameters": [
270
- {
271
- "name": "message_hash",
272
- "type": {
273
- "kind": "field"
274
- },
275
- "visibility": "private"
276
- },
277
- {
278
- "name": "authorize",
279
- "type": {
280
- "kind": "boolean"
281
- },
282
- "visibility": "private"
283
- }
284
- ],
285
- "return_type": null
286
- },
287
- "bytecode": "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",
288
- "debug_symbols": "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",
289
- "brillig_names": [
290
- "set_authorized"
291
- ]
292
- },
293
- {
294
- "name": "is_consumable",
158
+ "name": "unconstrained_is_consumable",
295
159
  "is_unconstrained": true,
296
- "custom_attributes": [
297
- "public",
298
- "view"
299
- ],
160
+ "custom_attributes": [],
300
161
  "abi": {
301
162
  "error_types": {
302
163
  "16761564377371454734": {
@@ -314,10 +175,6 @@
314
175
  "5019202896831570965": {
315
176
  "error_kind": "string",
316
177
  "string": "attempt to add with overflow"
317
- },
318
- "5444967152290923376": {
319
- "error_kind": "string",
320
- "string": "Function is_consumable can only be called statically"
321
178
  }
322
179
  },
323
180
  "parameters": [
@@ -352,24 +209,21 @@
352
209
  "visibility": "public"
353
210
  }
354
211
  },
355
- "bytecode": "JgACBAEnAAABBIBGJgAABAMmAgMEAiYCBAQAHxgABAADgEMtCIBDAAEtCIBEAAIkAAAATC0EAAGARScCAAIEgEUmAgMEAToNAAIAAyQAAAFUHgIAAwomAgQAAQo4AwQFIwIABQAAAG0kAAABfSYCAwACLAgBBCYCBQQDABABBQEmAwQEAQAoBAIFLAwFBiwOAwYAKAYCBiwOAQYmAgMEBSwIAAUsDAQGABAAAwAkAAABjywEAAAsDAYBJgIDAAAKOAEDBCYCBQEACjgEBQYjAgAGAAAA2yQAAAPVLAgBBCYCBgQDABABBgEmAwQEAQAoBAIGLAwGBywOAQcAKAcCBywOAgcmAgIEBiwIAAYsDAQHABAAAgAkAAABjywEAAAsDAcBCjgBAwIKOAIFAyMCAAMAAAE6JAAAA9UuDAABAAIcDAIDARwMAwEAHAwBAgEsDAIBJScAgAQEeAANAAAAgASAAyMAgAMAAAF8KQEAAQX3ofOvpa3UyjsBAQIlKQEAAQVLkGjGvfiDcDsBAQIlJAAAAVQmAgMAACwIAQQmAgUEBAAQAQUBJgMEBAEAKAQCBSwMBQYsDgMGACgGAgYsDgMGACgGAgYsDgMGLA0EBQAoBQIFLA4FBCwNBAUAKAUCBSwOBQQsDQQFACgFAgUsDgUEKgIABQAAAAAAAAAAAgAAAAAAAAAALAgBBiYCBwQFABABBwEmAwYEAQAoBgIHLAwHCCwOAwgAKAgCCCwOAwgAKAgCCCwOAwgAKAgCCCwOBQgsDQQDACgDAgMsDgMELAgBAwAAAQIBLA4EAywNBgQAKAQCBCwOBAYsCAEEAAABAgEsDgYELAgBBQAAAQIBJgIGBAAsDgYFLAgBBwAAAQIBJgIIAQAsDggHJgIJBAEmAgoEAiwMBgIiAAACrQw4AgoLIwIACwAAA04iAAACvywNBwEKOAEIAiMCAAIAAALZJgIJBAA7CQEJJgIBBAgsCAAILAwDCSwMBAosDAULLAwHDAAQAAEAJAAAA+csBAAALA0DASwNBAIsDQUILA4BAywOAgQsDggFJgIDAQEsDgMHACgCAgQAOAQGBSwNBQMsDQEEAigEAgQsDgQBLA0CAQIoAQIBLA4BAiwMAwElDDgCCgsjAgALAAADYCIAAAO1JgIMBAIMOAIMDSMCAA0AAAN3JAAABWAAKAECDAA4DAINLA0NCyYCDAQNLAgADSwMAw4sDAQPLAwFECwMBxEsDAsSABAADAAkAAAFciwEAAAiAAADtQA4AgkLDjgCCwwjAgAMAAADzCQAAAbbLAwLAiIAAAKtKQEAAQUC3G4ngHYSnTsBAQIlJAAAAVQmAgYEAyYCBwQAJgIIBAEsDAcFIgAABAQMOAUGByMCAAcAAARxIgAABBYsDQEFLA0DBiwNBAcsDQIIJgIJBAQsCAEKJgILBAUAEAELASYDCgQBACgIAgsmAgwEBAAoCgINPg8ACwANLA4FASwOCgIsDgYDLA4HBCwNBQECKAECASwOAQUlLA0DBww4BQcJIwIACQAABIciAAAFQCwNAQcsDQIJLA0DCiwNBAssDQIMJgIOBAQMOAUODyMCAA8AAASyJAAABWAAKAwCDgA4DgUPLA0PDSwNAQwmAg8EAww4BQ8QIwIAEAAABNskAAAFYAAoDAIPADgPBRAsDRAOADgNDgwmAg4EBAw4BQ4PIwIADwAABQUkAAAFYC0EAAmAAycAgAQEAAUkAAAG7S0IgAUADQAoDQIOADgOBQ8sDgwPLA4HASwODQIsDgoDLA4LBCIAAAVAADgFCAcOOAUHCSMCAAkAAAVXJAAABtssDAcFIgAABAQpAQABBeidCf6hES0OOwEBAiUkAAABVCwNBAYmAgcBAAo4BgcIIwIACAAABZYmAgkEADsJAQksDQMGJgIHBAMKOAYHCCYCBgQBIwIACAAABk0iAAAFtiwNAQcsDQIILA0DCSwNBAosDQMLJgINBAMMOAsNDiMCAA4AAAXhJAAABWAtBAAHgAMnAIAEBAAEJAAABu0tCIAFAAwAKAwCDQA4DQsOLA4FDiwNDAUAKAUCBSwOBQwsDQgFACgFAgUsDgUIADgJBgUOOAkFByMCAAcAAAY4JAAABtssDgwBLA4IAiwOBQMsDgoEIgAABtomAgcECCwIAAgsDAEJLAwCCiwMAwssDAQMABAABwAkAAAD5ywEAAAsDQEHLA0CCCwNBAkmAgoEAC0EAAeAAycAgAQEAAQkAAAG7S0IgAUACwAoCwIMADgMCg0sDgUNLA0LBQAoBQIFLA4FCywNCAUAKAUCBSwOBQgsDgsBLA4IAiwOBgMsDgkEIgAABtolKQEAAQVFp8pxGUHkFTsBAQIlLQGAA4AGCwCABgACgAcjAIAHAAAHCCIAAAcTLQCAA4AFIgAAB3ItAAABgAUBAAABgAQAAQEAgAOABIAJLQCAA4AKLQCABYALCwCACoAJgAwjAIAMAAAHZi0BgAqACC0CgAiACwEAgAoAAoAKAQCACwACgAsiAAAHNScBgAUEAAEiAAAHciUtABjKGMo=",
356
- "debug_symbols": "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",
212
+ "bytecode": "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",
213
+ "debug_symbols": "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",
357
214
  "brillig_names": [
358
- "is_consumable"
215
+ "unconstrained_is_consumable"
359
216
  ]
360
217
  },
361
218
  {
362
- "name": "consume",
219
+ "name": "is_consumable",
363
220
  "is_unconstrained": true,
364
221
  "custom_attributes": [
365
- "public"
222
+ "public",
223
+ "view"
366
224
  ],
367
225
  "abi": {
368
226
  "error_types": {
369
- "12737498021964987455": {
370
- "error_kind": "string",
371
- "string": "unauthorized"
372
- },
373
227
  "16761564377371454734": {
374
228
  "error_kind": "string",
375
229
  "string": "Array index out of bounds"
@@ -386,9 +240,9 @@
386
240
  "error_kind": "string",
387
241
  "string": "attempt to add with overflow"
388
242
  },
389
- "715723737710351018": {
243
+ "5444967152290923376": {
390
244
  "error_kind": "string",
391
- "string": "rejecting all"
245
+ "string": "Function is_consumable can only be called statically"
392
246
  }
393
247
  },
394
248
  "parameters": [
@@ -409,7 +263,7 @@
409
263
  "visibility": "private"
410
264
  },
411
265
  {
412
- "name": "inner_hash",
266
+ "name": "message_hash",
413
267
  "type": {
414
268
  "kind": "field"
415
269
  },
@@ -418,15 +272,15 @@
418
272
  ],
419
273
  "return_type": {
420
274
  "abi_type": {
421
- "kind": "field"
275
+ "kind": "boolean"
422
276
  },
423
277
  "visibility": "public"
424
278
  }
425
279
  },
426
- "bytecode": "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",
427
- "debug_symbols": "1Z3bbts4EIbfxde5IIecA/sqxaJI27QwECRFmi6wKPruK2ct2V6RZj1wpd83xXqjz/NpzKNESj83nx8+/vj6Yfv05fn75t37n5vH50/3r9vnp+HTz193m48v28fH7dcPx/97E3b/WHw7/vu3+6fdx++v9y+vm3dRSrjbPDx9Hv5TQxi+4cv28WHzLjH9+utuY+yASvBArkjFAcWQXJR5qOiKFdVDUXRR4qGSK1aq/sgUStxTFCOdUHfzGCHxGCMYT0fHEmpHm4wHF5uOpSBvPjmA+WQwn4Llw2D5YbD8CFh+xLB8lMB8FMunPkb4oz48+lCguY9g+ZQA5pPBfAqUDwWs/FAwLJ94jfYwyjTmo6gdn1TK/uAcSuebNY1frPnoe23vrrfrTjec9xRu2L0//0jx1/9mLfQbs4QalV2UeSgmFyUeSlzZEFfm1RVLXZnXRuYtH6g0oyx5qBJdVP33IkojRTl26kdmHo/OLIejY6zVPBs6jf3RdlJPh6MHoxTq50Gsk5GmjhHnPFZvzlx6Rjz1fsZMc6NGjmyMMbRfuWckYYwxpCh3jcp4tiYxzYxiPUfDWHsy6v5qFFR56se1HM5by39BeIEgFJYIssSZpCXOJC1yJmWBIDktEcQWCNLoKK8cRBcIIks0KyILBNHrVMZ0CGJHnc4QpNJmi43DRFM6XKem9DZOTCXiKQmaUg5wP1xuTPhXVSpwShEvS9HglIjwlPAagYTXCCS84p3wiveVBnVXVVI4JYYbCWTGawQErxEQvEZA8EYCitcIKF4jYHgjAcNrBApeI1AYTwmuEeAA1whwgBsvcVyhEVCSSSmVuZLCKRFeltaYNHWU1pg09ZQynpLBKWW84p3xivcak6aeEl6WbI0ad9THHV2J3ytJWKF4W56UjPNcSeGUYsRTYjylAqdECU8Jr3gnvEYg4WUp4zUCud4IJDmsfSnSUbrianJp7B5Zzaexe2Q9H7D8CFh+BCw/jYul6/kolk/jMul6PrK4z7nV9tJYVbKeD4P5FCgfDRnMByw/MYH5XKM9/GM7E0THkaGYnXzvzp3oht1vOO+Jb9e9sS/lyD3HdN36d66/1ZzBfAqWD4Plh8HyI2D5aexeX81HCcxHsXwsLu5zdjzSn38s61MCmE8G8ylQPhaw8mPBsHziNdrDdXYiW9TbdacbznsKN+zenavkRCcRdtRvzBJqVHZR5qGYXJR4KHFlQ1yZV1csdWW+sXs983R/Ketsz7s1dq93qMZ1zB5V/71ysZFi4uVGi6Wxe209H8byiWD5iWD5IbD8UAbzMSyflMB8dHGfc6Pp0ljauJ6PYPlwAPNhLB8By49kMJ9rtIfr3Gkomm7Y/YbzbnK77q1ZwpF7pgX728JQPjH8xgRkYSG0DEW0DEW4DBUwIUpoQgYmlGhxobPP7A2/MRFZVihHNCEGE+KAJgSXoQImJNdoGNe58TDI2w3L6y1n3uIty/enL9KVTzQ+XjUmTidBKkIi45xExU4fxlo5Osv4MFzl7oNeY4w6qQyJtJPjdyccV9k/GafHzxodliruNwUNTornFAHzRAHQifGcEmCeEmKe1tj/GtLkFCtOjbv66zoZnhMToJPgOa3x3LeuE2AZF8Ayvsaj37pOgHkywLbAFM+p4OWJAl771Hh/ihGNkyIjPcVqc7TxBE7WgqWafgrTS0USnRz8plOfYK6nI1A6BevHqq+YX0+nIOkMf8XSMSid+px7PR2oit54t816OlhFmbCKcn0p33o6CqWToXr0lLEqOmNVdMaq6IzVowtWRResiq5YPbpiVXTDqujGWDpYFb1gVfQCNd5pvPbnD+rkgw7zTCcv3GcZTVvfLKe5ToHS4YSlo1A6ErF0GEsHqygrVkVXrOwYVkW3pfssnV47nWymw2HhPivHafldpjzTiRFLBys7S19u6ukUKJ2ElZ2ElZ28cDOYp1fSD2Y81zEoHSYsHYHSWfpeaE8nY+lgFWXFKsqqUDqGlZ0SsXSg2h0JUNmRUKB06ndsYszjgH+3oG2iGgvxaRo16DBVOBxdX4gfwriYVkOWztFxtyFlUokhnhz/dgr1bvfSUwjTXgJi6p7C0fkeji1xL6RgQoKWofr+bEkjJEelaF9Stb6+q8NkB1MuZ6IjTnTEIUec+v3880x932qH0cuZ+u3rDiOXM/UbwTpdidf5hfjGE5w7TLmcEUccccRRR5z6Gt3zTH1w1GH0cqY+6ukwcjFjITgYvpyp39qIcboSuFsyPaPqdyAiHZp2kjinzEOJK5ZGFyUeqn4fuEvlOqXTjmAq88zX76p2qFJfmTdcJJx2bQ6XL+eUeKj6OrculV2Ueah6PxMlTb+XSJhT6qGyK1a95+hS7KHq98u6lHmo+o6QLlU8VKN+9ShXrOI6r+IoURQCuSjxUDG4KHZRjczbOJMcBsk0oxrtRo9yxWq1AOepVgvQocRDtdqNDuXKYaNfzjRROcc5ZR6qfmGwS4mHavTmPSq7KFc2iivzxROr8byBLuXJfIzBRTUyz9OTFLKGOVU8VH23fI9qjDd6lHqonFyUeSh2xWLXeTVGKT1KPJQGF+Uqh+oqh/WFIefHvdTY09mj6jPeLsUOihqP4zu7LmWg6pnXafnIbto+p4qHIlesRgvQo9RD1a9uDTPHwzPjAs8p8VCN8UaPyi7KPFTjInSPcmVDXZlXVyxzZd5cmTdX5osr88WTjRSCi8ouqnioxptMwzS2GaYXFco8FLlikStW41mTPUo8VOOpjT2KXVTxUI33L56nuLGPJI+dnvGsz+PGaD7wNFYOMoskjdF8jxIP1RjN96h8+fXogSoeql5PupR5qOSKlVyxsitWdsViVyx2/V7iiiXqoRp9eY9iF+XKhrlqSmNX1rm2RhrXG0LMU01OM0rr66G7FLuo4qHIdV71d1H3qBQdraEmT8vbuL/dpYqHaozle5QrlrhiiaenbLwJdzh0ql3BaE6phzJXrBJcFDuoxt3oLuWL1S8bFSp6yoZFTzk0csVK5KLUQzVGAB2Kg4tiDyXRRXnaw9ZagB7lOi91lShz/V7mKhvFk8MSootyxbq8Lv8aPv19/7K9//j48H1gdn/88fTpdfv8tP/4+s+38S8fX7aPj9uvH769PH96+Pzj5eHD4/On3d82Yf/Pew75jikPNm+zGOJ0N0zTdh93adg9XZpDGKIOkf8F",
280
+ "bytecode": "JgACBAEnAAABBIBGJgAABAMmAgMEAiYCBAQAHxgABAADgEMtCIBDAAEtCIBEAAIkAAAATC0EAAGARScCAAIEgEUmAgMEAToNAAIAAyQAAAFUHgIAAwomAgQAAQo4AwQFIwIABQAAAG0kAAABfSYCAwACLAgBBCYCBQQDABABBQEmAwQEAQAoBAIFLAwFBiwOAwYAKAYCBiwOAQYmAgMEBSwIAAUsDAQGABAAAwAkAAABjywEAAAsDAYBJgIDAAAKOAEDBCYCBQEACjgEBQYjAgAGAAAA2yQAAAPVLAgBBCYCBgQDABABBgEmAwQEAQAoBAIGLAwGBywOAQcAKAcCBywOAgcmAgIEBiwIAAYsDAQHABAAAgAkAAABjywEAAAsDAcBCjgBAwIKOAIFAyMCAAMAAAE6JAAAA9UuDAABAAIcDAIDARwMAwEAHAwBAgEsDAIBJScAgAQEeAANAAAAgASAAyMAgAMAAAF8KQEAAQX3ofOvpa3UyjsBAQIlKQEAAQVLkGjGvfiDcDsBAQIlJAAAAVQmAgMAACwIAQQmAgUEBAAQAQUBJgMEBAEAKAQCBSwMBQYsDgMGACgGAgYsDgMGACgGAgYsDgMGLA0EBQAoBQIFLA4FBCwNBAUAKAUCBSwOBQQsDQQFACgFAgUsDgUEKgIABQAAAAAAAAAAAgAAAAAAAAAALAgBBiYCBwQFABABBwEmAwYEAQAoBgIHLAwHCCwOAwgAKAgCCCwOAwgAKAgCCCwOAwgAKAgCCCwOBQgsDQQDACgDAgMsDgMELAgBAwAAAQIBLA4EAywNBgQAKAQCBCwOBAYsCAEEAAABAgEsDgYELAgBBQAAAQIBJgIGBAAsDgYFLAgBBwAAAQIBJgIIAQAsDggHJgIJBAEmAgoEAiwMBgIiAAACrQw4AgoLIwIACwAAA04iAAACvywNBwEKOAEIAiMCAAIAAALZJgIJBAA7CQEJJgIBBAgsCAAILAwDCSwMBAosDAULLAwHDAAQAAEAJAAAA+csBAAALA0DASwNBAIsDQUILA4BAywOAgQsDggFJgIDAQEsDgMHACgCAgQAOAQGBSwNBQMsDQEEAigEAgQsDgQBLA0CAQIoAQIBLA4BAiwMAwElDDgCCgsjAgALAAADYCIAAAO1JgIMBAIMOAIMDSMCAA0AAAN3JAAABWAAKAECDAA4DAINLA0NCyYCDAQNLAgADSwMAw4sDAQPLAwFECwMBxEsDAsSABAADAAkAAAFciwEAAAiAAADtQA4AgkLDjgCCwwjAgAMAAADzCQAAAbbLAwLAiIAAAKtKQEAAQUC3G4ngHYSnTsBAQIlJAAAAVQmAgYEAyYCBwQAJgIIBAEsDAcFIgAABAQMOAUGByMCAAcAAARxIgAABBYsDQEFLA0DBiwNBAcsDQIIJgIJBAQsCAEKJgILBAUAEAELASYDCgQBACgIAgsmAgwEBAAoCgINPg8ACwANLA4FASwOCgIsDgYDLA4HBCwNBQECKAECASwOAQUlLA0DBww4BQcJIwIACQAABIciAAAFQCwNAQcsDQIJLA0DCiwNBAssDQIMJgIOBAQMOAUODyMCAA8AAASyJAAABWAAKAwCDgA4DgUPLA0PDSwNAQwmAg8EAww4BQ8QIwIAEAAABNskAAAFYAAoDAIPADgPBRAsDRAOADgNDgwmAg4EBAw4BQ4PIwIADwAABQUkAAAFYC0EAAmAAycAgAQEAAUkAAAG7S0IgAUADQAoDQIOADgOBQ8sDgwPLA4HASwODQIsDgoDLA4LBCIAAAVAADgFCAcOOAUHCSMCAAkAAAVXJAAABtssDAcFIgAABAQpAQABBeidCf6hES0OOwEBAiUkAAABVCwNBAYmAgcBAAo4BgcIIwIACAAABZYmAgkEADsJAQksDQMGJgIHBAMKOAYHCCYCBgQBIwIACAAABk0iAAAFtiwNAQcsDQIILA0DCSwNBAosDQMLJgINBAMMOAsNDiMCAA4AAAXhJAAABWAtBAAHgAMnAIAEBAAEJAAABu0tCIAFAAwAKAwCDQA4DQsOLA4FDiwNDAUAKAUCBSwOBQwsDQgFACgFAgUsDgUIADgJBgUOOAkFByMCAAcAAAY4JAAABtssDgwBLA4IAiwOBQMsDgoEIgAABtomAgcECCwIAAgsDAEJLAwCCiwMAwssDAQMABAABwAkAAAD5ywEAAAsDQEHLA0CCCwNBAkmAgoEAC0EAAeAAycAgAQEAAQkAAAG7S0IgAUACwAoCwIMADgMCg0sDgUNLA0LBQAoBQIFLA4FCywNCAUAKAUCBSwOBQgsDgsBLA4IAiwOBgMsDgkEIgAABtolKQEAAQVFp8pxGUHkFTsBAQIlLQGAA4AGCwCABgACgAcjAIAHAAAHCCIAAAcTLQCAA4AFIgAAB3ItAAABgAUBAAABgAQAAQEAgAOABIAJLQCAA4AKLQCABYALCwCACoAJgAwjAIAMAAAHZi0BgAqACC0CgAiACwEAgAoAAoAKAQCACwACgAsiAAAHNScBgAUEAAEiAAAHciUtABjKGMo=",
281
+ "debug_symbols": "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",
428
282
  "brillig_names": [
429
- "consume"
283
+ "is_consumable"
430
284
  ]
431
285
  },
432
286
  {
@@ -788,6 +642,12 @@
788
642
  "type": {
789
643
  "kind": "field"
790
644
  }
645
+ },
646
+ {
647
+ "name": "total_mana_used",
648
+ "type": {
649
+ "kind": "field"
650
+ }
791
651
  }
792
652
  ],
793
653
  "kind": "struct",
@@ -1936,6 +1796,12 @@
1936
1796
  "type": {
1937
1797
  "kind": "field"
1938
1798
  }
1799
+ },
1800
+ {
1801
+ "name": "total_mana_used",
1802
+ "type": {
1803
+ "kind": "field"
1804
+ }
1939
1805
  }
1940
1806
  ],
1941
1807
  "kind": "struct",
@@ -2050,8 +1916,8 @@
2050
1916
  "visibility": "databus"
2051
1917
  }
2052
1918
  },
2053
- "bytecode": "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",
2054
- "debug_symbols": "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",
1919
+ "bytecode": "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",
1920
+ "debug_symbols": "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",
2055
1921
  "brillig_names": [
2056
1922
  "pack_arguments_array_oracle_wrapper",
2057
1923
  "call_private_function_internal",
@@ -2059,15 +1925,112 @@
2059
1925
  "pack_arguments_oracle_wrapper",
2060
1926
  "enqueue_public_function_call_internal"
2061
1927
  ],
2062
- "verification_key": "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",
2063
- "artifact_hash": "7cb5566fe25622a27de9406180c3ef36c08c61ac-6363bf86679200c35286725496858a96-mega-honk-true"
1928
+ "verification_key": "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",
1929
+ "artifact_hash": "276b5434ac1f4ec77b1325d6224d183983db7ea8-b93942a841fd2bff466ca6ad2cf09551-mega-honk-true"
2064
1930
  },
2065
1931
  {
2066
- "name": "unconstrained_is_consumable",
1932
+ "name": "set_authorized",
2067
1933
  "is_unconstrained": true,
2068
- "custom_attributes": [],
1934
+ "custom_attributes": [
1935
+ "public"
1936
+ ],
1937
+ "abi": {
1938
+ "error_types": {
1939
+ "16761564377371454734": {
1940
+ "error_kind": "string",
1941
+ "string": "Array index out of bounds"
1942
+ },
1943
+ "17843811134343075018": {
1944
+ "error_kind": "string",
1945
+ "string": "Stack too deep"
1946
+ },
1947
+ "206160798890201757": {
1948
+ "error_kind": "string",
1949
+ "string": "Storage slot 0 not allowed. Storage slots must start from 1."
1950
+ },
1951
+ "5019202896831570965": {
1952
+ "error_kind": "string",
1953
+ "string": "attempt to add with overflow"
1954
+ }
1955
+ },
1956
+ "parameters": [
1957
+ {
1958
+ "name": "message_hash",
1959
+ "type": {
1960
+ "kind": "field"
1961
+ },
1962
+ "visibility": "private"
1963
+ },
1964
+ {
1965
+ "name": "authorize",
1966
+ "type": {
1967
+ "kind": "boolean"
1968
+ },
1969
+ "visibility": "private"
1970
+ }
1971
+ ],
1972
+ "return_type": null
1973
+ },
1974
+ "bytecode": "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",
1975
+ "debug_symbols": "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",
1976
+ "brillig_names": [
1977
+ "set_authorized"
1978
+ ]
1979
+ },
1980
+ {
1981
+ "name": "set_reject_all",
1982
+ "is_unconstrained": true,
1983
+ "custom_attributes": [
1984
+ "public"
1985
+ ],
1986
+ "abi": {
1987
+ "error_types": {
1988
+ "16761564377371454734": {
1989
+ "error_kind": "string",
1990
+ "string": "Array index out of bounds"
1991
+ },
1992
+ "17843811134343075018": {
1993
+ "error_kind": "string",
1994
+ "string": "Stack too deep"
1995
+ },
1996
+ "206160798890201757": {
1997
+ "error_kind": "string",
1998
+ "string": "Storage slot 0 not allowed. Storage slots must start from 1."
1999
+ },
2000
+ "5019202896831570965": {
2001
+ "error_kind": "string",
2002
+ "string": "attempt to add with overflow"
2003
+ }
2004
+ },
2005
+ "parameters": [
2006
+ {
2007
+ "name": "reject",
2008
+ "type": {
2009
+ "kind": "boolean"
2010
+ },
2011
+ "visibility": "private"
2012
+ }
2013
+ ],
2014
+ "return_type": null
2015
+ },
2016
+ "bytecode": "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",
2017
+ "debug_symbols": "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",
2018
+ "brillig_names": [
2019
+ "set_reject_all"
2020
+ ]
2021
+ },
2022
+ {
2023
+ "name": "consume",
2024
+ "is_unconstrained": true,
2025
+ "custom_attributes": [
2026
+ "public"
2027
+ ],
2069
2028
  "abi": {
2070
2029
  "error_types": {
2030
+ "12737498021964987455": {
2031
+ "error_kind": "string",
2032
+ "string": "unauthorized"
2033
+ },
2071
2034
  "16761564377371454734": {
2072
2035
  "error_kind": "string",
2073
2036
  "string": "Array index out of bounds"
@@ -2083,6 +2046,10 @@
2083
2046
  "5019202896831570965": {
2084
2047
  "error_kind": "string",
2085
2048
  "string": "attempt to add with overflow"
2049
+ },
2050
+ "715723737710351018": {
2051
+ "error_kind": "string",
2052
+ "string": "rejecting all"
2086
2053
  }
2087
2054
  },
2088
2055
  "parameters": [
@@ -2103,7 +2070,7 @@
2103
2070
  "visibility": "private"
2104
2071
  },
2105
2072
  {
2106
- "name": "message_hash",
2073
+ "name": "inner_hash",
2107
2074
  "type": {
2108
2075
  "kind": "field"
2109
2076
  },
@@ -2112,15 +2079,15 @@
2112
2079
  ],
2113
2080
  "return_type": {
2114
2081
  "abi_type": {
2115
- "kind": "boolean"
2082
+ "kind": "field"
2116
2083
  },
2117
2084
  "visibility": "public"
2118
2085
  }
2119
2086
  },
2120
- "bytecode": "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",
2121
- "debug_symbols": "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",
2087
+ "bytecode": "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",
2088
+ "debug_symbols": "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",
2122
2089
  "brillig_names": [
2123
- "unconstrained_is_consumable"
2090
+ "consume"
2124
2091
  ]
2125
2092
  },
2126
2093
  {
@@ -2188,19 +2155,48 @@
2188
2155
  "return_type": null
2189
2156
  },
2190
2157
  "bytecode": "JgACBAEnAAABBIBGJgAABAMmAgQEAyYCBQQAHxgABQAEgEMdAIBFgEUBLQiAQwABLQiARAACLQiARQADJAAAAFMnAgABBIBGJgICBAA6DQABAAIkAAABTR4CAAQBHgIABQAKOAQFBiMCAAYAAAB0JAAAAXYmAgQAAiwIAQUmAgYEAwAQAQYBJgMFBAEAKAUCBiwMBgcsDgQHACgHAgcsDgEHJgIEBAYsCAAGLAwFBwAQAAQAJAAAAYgsBAAALAwHASYCBAAACjgBBAUmAgYBAAo4BQYHIwIABwAAAOIkAAADziwIAQUmAgcEAwAQAQcBJgMFBAEAKAUCBywMBwgsDgEIACgIAggsDgIIJgICBAcsCAAHLAwFCAAQAAIAJAAAAYgsBAAALAwIAQo4AQQCCjgCBgQjAgAEAAABQSQAAAPOHAwDAgAvDAACAAElJwCABAR4AA0AAACABIADIwCAAwAAAXUpAQABBfeh86+lrdTKOwEBAiUpAQABBVd9Leakk8oaOwEBAiUkAAABTSYCAwAALAgBBCYCBQQEABABBQEmAwQEAQAoBAIFLAwFBiwOAwYAKAYCBiwOAwYAKAYCBiwOAwYsDQQFACgFAgUsDgUELA0EBQAoBQIFLA4FBCwNBAUAKAUCBSwOBQQqAgAFAAAAAAAAAAACAAAAAAAAAAAsCAEGJgIHBAUAEAEHASYDBgQBACgGAgcsDAcILA4DCAAoCAIILA4DCAAoCAIILA4DCAAoCAIILA4FCCwNBAMAKAMCAywOAwQsCAEDAAABAgEsDgQDLA0GBAAoBAIELA4EBiwIAQQAAAECASwOBgQsCAEFAAABAgEmAgYEACwOBgUsCAEHAAABAgEmAggBACwOCAcmAgkEASYCCgQCLAwGAiIAAAKmDDgCCgsjAgALAAADRyIAAAK4LA0HAQo4AQgCIwIAAgAAAtImAgkEADsJAQkmAgEECCwIAAgsDAMJLAwECiwMBQssDAcMABAAAQAkAAAD4CwEAAAsDQMBLA0EAiwNBQgsDgEDLA4CBCwOCAUmAgMBASwOAwcAKAICBAA4BAYFLA0FAywNAQQCKAQCBCwOBAEsDQIBAigBAgEsDgECLAwDASUMOAIKCyMCAAsAAANZIgAAA64mAgwEAgw4AgwNIwIADQAAA3AkAAAFWQAoAQIMADgMAg0sDQ0LJgIMBA0sCAANLAwDDiwMBA8sDAUQLAwHESwMCxIAEAAMACQAAAVrLAQAACIAAAOuADgCCQsOOAILDCMCAAwAAAPFJAAABtQsDAsCIgAAAqYpAQABBQLcbieAdhKdOwEBAiUkAAABTSYCBgQDJgIHBAAmAggEASwMBwUiAAAD/Qw4BQYHIwIABwAABGoiAAAEDywNAQUsDQMGLA0EBywNAggmAgkEBCwIAQomAgsEBQAQAQsBJgMKBAEAKAgCCyYCDAQEACgKAg0+DwALAA0sDgUBLA4KAiwOBgMsDgcELA0FAQIoAQIBLA4BBSUsDQMHDDgFBwkjAgAJAAAEgCIAAAU5LA0BBywNAgksDQMKLA0ECywNAgwmAg4EBAw4BQ4PIwIADwAABKskAAAFWQAoDAIOADgOBQ8sDQ8NLA0BDCYCDwQDDDgFDxAjAgAQAAAE1CQAAAVZACgMAg8AOA8FECwNEA4AOA0ODCYCDgQEDDgFDg8jAgAPAAAE/iQAAAVZLQQACYADJwCABAQABSQAAAbmLQiABQANACgNAg4AOA4FDywODA8sDgcBLA4NAiwOCgMsDgsEIgAABTkAOAUIBw44BQcJIwIACQAABVAkAAAG1CwMBwUiAAAD/SkBAAEF6J0J/qERLQ47AQECJSQAAAFNLA0EBiYCBwEACjgGBwgjAgAIAAAFjyYCCQQAOwkBCSwNAwYmAgcEAwo4BgcIJgIGBAEjAgAIAAAGRiIAAAWvLA0BBywNAggsDQMJLA0ECiwNAwsmAg0EAww4Cw0OIwIADgAABdokAAAFWS0EAAeAAycAgAQEAAQkAAAG5i0IgAUADAAoDAINADgNCw4sDgUOLA0MBQAoBQIFLA4FDCwNCAUAKAUCBSwOBQgAOAkGBQ44CQUHIwIABwAABjEkAAAG1CwODAEsDggCLA4FAywOCgQiAAAG0yYCBwQILAgACCwMAQksDAIKLAwDCywMBAwAEAAHACQAAAPgLAQAACwNAQcsDQIILA0ECSYCCgQALQQAB4ADJwCABAQABCQAAAbmLQiABQALACgLAgwAOAwKDSwOBQ0sDQsFACgFAgUsDgULLA0IBQAoBQIFLA4FCCwOCwEsDggCLA4GAywOCQQiAAAG0yUpAQABBUWnynEZQeQVOwEBAiUtAYADgAYLAIAGAAKAByMAgAcAAAcBIgAABwwtAIADgAUiAAAHay0AAAGABQEAAAGABAABAQCAA4AEgAktAIADgAotAIAFgAsLAIAKgAmADCMAgAwAAAdfLQGACoAILQKACIALAQCACgACgAoBAIALAAKACyIAAAcuJwGABQQAASIAAAdrJS0AGMoYyg==",
2191
- "debug_symbols": "1Z3bbuM4DIbfJde5EEWRouZVBoui7XQGAYK26GGBRdF3Xztbu2ktmTtE10vdFOOJfvPLH4kSfXzZ/bi5ev51cbj9efe4+/b9ZXe8u758OtzdDlsvr/vd1cPheDz8ujj/710Y/4ic2j/eX96Om49Plw9Pu2/AJex3N7c/hn/mEIY9/Dwcb3bfkOLrftE6EeFb60QMc2uAUGktMcS31hIhf2j9x35X8AuAUGQCwpI1IECagIBgAfTbDg0iCGhRAZhUXFOlQGkyIQgolg3AkwkQhN5NKDXLQHhqXGRuGwOfeCI44yFfPBic8TjzJznzJ3nzp/jiIXTGI754OG7OQxPPMNkuebIvngzOeMgXjwRnPN78Kb54ylfkQ+B5zfdhlVzlwVLmXRdlz5zhrS2LfNjviV26ZY+hX99j6Nh36Nj3L6lV/i92ve4rabt1TvwXdc22POSLJznzJznzh5z5Q8kZj/jiYXTGkzfnWVsHxhyd8bAvHgnOeMgXT3HmT0nOeL4iH/5na7eM045zOtuvnNgxYMfsHfsO3C+7XqsAqOwY88SOhB9iVHi4TCfScoaz1tUTaURTY8pnp9EK/EPP29PzVD5lFo0+J57OYmY6I6m3Hk7V5Rll6AXyof34fUt1NSIxTibJMCG/5zTkat+ZvkDC9/yHWGk6VF+TkRGj0phxyquM+bzpAJ5C7BWcOwWvn/btAbxXx2OvjsdeHa8fHOoBPPUKXjoFT9gruHQKTr1O+dRrOuReJyAmx+B5Kp/4rACZwD2nwzXw7HkCWgX3nA7XwMVzOlwF91xzroEXx+kwz23zx6YDOIHjrrIO7njmXAX3XLqtg/fqOPbqOPbqeHJcLK+Dp17BHa8OV8HJcbG8Du54dbgKzr1O+ex4dbgKnt1MQCcaNxXwSCNupooTjZv8f6Jxk2JGmuImU59o3CSDgYaDpxHOfk4kjjTgaYQzeBrhDG6WbSNN9DTCOboa4ehm1XSiceVNcpX9kqf1DZOr7EeuvNn8AHt6pyH6TFM2njUlThfWRUlobjyg5xD8okPO03VpkAss0KlbdMB+0aVb9Bgdo8vZDR6BFui5W/Stj6F/JbrnDKOgl27Rk+fkqKD3O0yp3+RI/brO/SZH7jc5cr/JMfebHHO/w1T6HabS7zAtnmtTBT05PiIQ4vQYyhhwie44Oa6jS+jWdQmOy2oFHRyvHDV0x1OSgh4dT0kauuMpSUFHx1OShr71CcP5WFxE+XzcWbau2RLMz1NIMX2m2frCJoXGlTdbX/SzTrP1RT8KjStviitvtl4Cp/nh6gPYIvttvapdpSkBXdFkTzRbPxJAoSFXNK56cXTVi6N4okFX3qToisZVviFX3nBwRAOhUWWmqSoRwoWmXmhAoCkSBF5Gqp/1U1XZoiIwqapTAcBcogFkWajqP6iqSiZVsaiyKVY2xRJTLDHFKpZYEIJJZYslFlX9eJuqYosqmtyIlpHSeDnMaq6B+iNqIECaRzIuVfWUr6rYomqMf01l+l4sFlWOhmwI2ZJ5QUyxSjCpyKCKIZhUtliWmbLx0Pkx+88qiUuVWFTRFAvBpGKLKpliJVMs0vtGTWXqG2zqh2yKldGkEouqsQJQVAVMKjaoMESTypIPEUyxwPS9YjCpkkll6RuIJg+TyUNT5YCmsYzFsmLDRu+Nab7GOfLna5wh1e8nVFWmWPU74lRVsagaM5Gmqv/KMc+P4o5l4Xyq37GlqRp9g2B+ZDLBkpCKRVV/AYGqyhZV/R50VVV3g3H+vZjDQlU/vaOqTLFa71tVVGJQUaM+VFStl6IqKrao6jdHqKpsUaEpFpq+VwomFZlUxaIiNKlM/ZAbzss8f+UQl6psUWVTrFYGUFRkUhWLqpU3FJXFw8b9+MO8NqtSWuRebuQNTUUmVbGoGrO5psoWFZrcQJPzyRQrmZxPJufJ5Dw1nKf5TQApL7INN7KNphKLqrHeUFSNbKOp2KJq1LCayhKrcVuvqkomVbGoGkexNJWlHzZu/FRVbFj35vpRbFWVTCr5XdXrsPXn5cPh8up48zhoxg+fb6+fDne3b5tPf91Pn1w9HI7Hw6+L+4e765sfzw83F8e76/GzXXj78x057FHCSDNuMu8zjBtjV4ci++Fw6hBziPs3",
2158
+ "debug_symbols": "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",
2192
2159
  "brillig_names": [
2193
2160
  "_set_authorized"
2194
2161
  ]
2195
2162
  },
2196
2163
  {
2197
- "name": "set_reject_all",
2164
+ "name": "sync_notes",
2165
+ "is_unconstrained": true,
2166
+ "custom_attributes": [],
2167
+ "abi": {
2168
+ "error_types": {
2169
+ "17843811134343075018": {
2170
+ "error_kind": "string",
2171
+ "string": "Stack too deep"
2172
+ }
2173
+ },
2174
+ "parameters": [],
2175
+ "return_type": null
2176
+ },
2177
+ "bytecode": "H4sIAAAAAAAA/9VUyw6CMBBseURBOaiJ3kz8gyIYOJJ49x8akKMe8OKNT5eabbqpVRKlJkzSbEs3szNlW0oUKESPvAH9tGnIFdhBDCA6aN/tRgFr9hviQKs7JH/O0iQw+BtQ/5OfWtIvIPktnT+bAM+xVfzYi6w77UaIesKWZ/nPbHpe9fhc/MFnh32k1caghm+uIYci3RuYR4Y8iRlRd9prh/eV5YzJei7w++RVO67va/lrWIeafvmOFV/qrDMe1wmv+YFXVVrypcYv4KBzGnMvbGHe1wvY45yo3mjul/J0vZ0b0gNB8gCVxsvQjgYAAA==",
2178
+ "debug_symbols": "ndLNCoQgEAfwd5lzh9S0j1eJJawsBNEwW1iid1/bbZd26aKXgRn8zRz8r9CLdhkbqQczQ1WvoEzHnTTad+uWQGulUnJszmNI94LQ6/08cb23s+PWQUVwAkL3UGWp14NUws8o2m4JIBwKSCjIQgENBPjyQklxcZCSUvpFCL8RjUEsBuUxqIhA5PL3S4byD2KE/aLNt3duJW+VONI1LLo7hc09JvGXu8maTvSLFXsCT+Hztfa3MPZr/eon",
2179
+ "brillig_names": [
2180
+ "sync_notes"
2181
+ ]
2182
+ },
2183
+ {
2184
+ "name": "public_dispatch",
2198
2185
  "is_unconstrained": true,
2199
2186
  "custom_attributes": [
2200
2187
  "public"
2201
2188
  ],
2202
2189
  "abi": {
2203
2190
  "error_types": {
2191
+ "12737498021964987455": {
2192
+ "error_kind": "string",
2193
+ "string": "unauthorized"
2194
+ },
2195
+ "16541607464495309456": {
2196
+ "error_kind": "fmtstring",
2197
+ "item_types": [],
2198
+ "length": 16
2199
+ },
2204
2200
  "16761564377371454734": {
2205
2201
  "error_kind": "string",
2206
2202
  "string": "Array index out of bounds"
@@ -2216,23 +2212,39 @@
2216
2212
  "5019202896831570965": {
2217
2213
  "error_kind": "string",
2218
2214
  "string": "attempt to add with overflow"
2215
+ },
2216
+ "5444967152290923376": {
2217
+ "error_kind": "string",
2218
+ "string": "Function is_consumable can only be called statically"
2219
+ },
2220
+ "6304245522015439386": {
2221
+ "error_kind": "string",
2222
+ "string": "Function _set_authorized can only be called internally"
2223
+ },
2224
+ "715723737710351018": {
2225
+ "error_kind": "string",
2226
+ "string": "rejecting all"
2227
+ },
2228
+ "9474245853673257536": {
2229
+ "error_kind": "string",
2230
+ "string": "Function is_reject_all can only be called statically"
2219
2231
  }
2220
2232
  },
2221
2233
  "parameters": [
2222
2234
  {
2223
- "name": "reject",
2235
+ "name": "selector",
2224
2236
  "type": {
2225
- "kind": "boolean"
2237
+ "kind": "field"
2226
2238
  },
2227
2239
  "visibility": "private"
2228
2240
  }
2229
2241
  ],
2230
2242
  "return_type": null
2231
2243
  },
2232
- "bytecode": "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",
2233
- "debug_symbols": "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",
2244
+ "bytecode": "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",
2245
+ "debug_symbols": "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",
2234
2246
  "brillig_names": [
2235
- "set_reject_all"
2247
+ "public_dispatch"
2236
2248
  ]
2237
2249
  }
2238
2250
  ],
@@ -2302,7 +2314,34 @@
2302
2314
  "type": {
2303
2315
  "fields": [
2304
2316
  {
2305
- "name": "approver",
2317
+ "name": "message_hash",
2318
+ "type": {
2319
+ "kind": "field"
2320
+ }
2321
+ },
2322
+ {
2323
+ "name": "authorize",
2324
+ "type": {
2325
+ "kind": "boolean"
2326
+ }
2327
+ }
2328
+ ],
2329
+ "kind": "struct",
2330
+ "path": "AuthRegistry::set_authorized_parameters"
2331
+ }
2332
+ }
2333
+ ],
2334
+ "kind": "struct",
2335
+ "path": "AuthRegistry::set_authorized_abi"
2336
+ },
2337
+ {
2338
+ "fields": [
2339
+ {
2340
+ "name": "parameters",
2341
+ "type": {
2342
+ "fields": [
2343
+ {
2344
+ "name": "on_behalf_of",
2306
2345
  "type": {
2307
2346
  "fields": [
2308
2347
  {
@@ -2315,27 +2354,21 @@
2315
2354
  "kind": "struct",
2316
2355
  "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
2317
2356
  }
2318
- },
2319
- {
2320
- "name": "message_hash",
2321
- "type": {
2322
- "kind": "field"
2323
- }
2324
- },
2325
- {
2326
- "name": "authorize",
2327
- "type": {
2328
- "kind": "boolean"
2329
- }
2330
2357
  }
2331
2358
  ],
2332
2359
  "kind": "struct",
2333
- "path": "AuthRegistry::set_authorized_private_parameters"
2360
+ "path": "AuthRegistry::is_reject_all_parameters"
2361
+ }
2362
+ },
2363
+ {
2364
+ "name": "return_type",
2365
+ "type": {
2366
+ "kind": "boolean"
2334
2367
  }
2335
2368
  }
2336
2369
  ],
2337
2370
  "kind": "struct",
2338
- "path": "AuthRegistry::set_authorized_private_abi"
2371
+ "path": "AuthRegistry::is_reject_all_abi"
2339
2372
  },
2340
2373
  {
2341
2374
  "fields": [
@@ -2343,6 +2376,21 @@
2343
2376
  "name": "parameters",
2344
2377
  "type": {
2345
2378
  "fields": [
2379
+ {
2380
+ "name": "approver",
2381
+ "type": {
2382
+ "fields": [
2383
+ {
2384
+ "name": "inner",
2385
+ "type": {
2386
+ "kind": "field"
2387
+ }
2388
+ }
2389
+ ],
2390
+ "kind": "struct",
2391
+ "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
2392
+ }
2393
+ },
2346
2394
  {
2347
2395
  "name": "message_hash",
2348
2396
  "type": {
@@ -2357,12 +2405,12 @@
2357
2405
  }
2358
2406
  ],
2359
2407
  "kind": "struct",
2360
- "path": "AuthRegistry::set_authorized_parameters"
2408
+ "path": "AuthRegistry::set_authorized_private_parameters"
2361
2409
  }
2362
2410
  }
2363
2411
  ],
2364
2412
  "kind": "struct",
2365
- "path": "AuthRegistry::set_authorized_abi"
2413
+ "path": "AuthRegistry::set_authorized_private_abi"
2366
2414
  },
2367
2415
  {
2368
2416
  "fields": [
@@ -2434,7 +2482,7 @@
2434
2482
  "type": {
2435
2483
  "fields": [
2436
2484
  {
2437
- "name": "approver",
2485
+ "name": "on_behalf_of",
2438
2486
  "type": {
2439
2487
  "fields": [
2440
2488
  {
@@ -2453,46 +2501,10 @@
2453
2501
  "type": {
2454
2502
  "kind": "field"
2455
2503
  }
2456
- },
2457
- {
2458
- "name": "authorize",
2459
- "type": {
2460
- "kind": "boolean"
2461
- }
2462
2504
  }
2463
2505
  ],
2464
2506
  "kind": "struct",
2465
- "path": "AuthRegistry::_set_authorized_parameters"
2466
- }
2467
- }
2468
- ],
2469
- "kind": "struct",
2470
- "path": "AuthRegistry::_set_authorized_abi"
2471
- },
2472
- {
2473
- "fields": [
2474
- {
2475
- "name": "parameters",
2476
- "type": {
2477
- "fields": [
2478
- {
2479
- "name": "on_behalf_of",
2480
- "type": {
2481
- "fields": [
2482
- {
2483
- "name": "inner",
2484
- "type": {
2485
- "kind": "field"
2486
- }
2487
- }
2488
- ],
2489
- "kind": "struct",
2490
- "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
2491
- }
2492
- }
2493
- ],
2494
- "kind": "struct",
2495
- "path": "AuthRegistry::is_reject_all_parameters"
2507
+ "path": "AuthRegistry::is_consumable_parameters"
2496
2508
  }
2497
2509
  },
2498
2510
  {
@@ -2503,7 +2515,7 @@
2503
2515
  }
2504
2516
  ],
2505
2517
  "kind": "struct",
2506
- "path": "AuthRegistry::is_reject_all_abi"
2518
+ "path": "AuthRegistry::is_consumable_abi"
2507
2519
  },
2508
2520
  {
2509
2521
  "fields": [
@@ -2512,7 +2524,7 @@
2512
2524
  "type": {
2513
2525
  "fields": [
2514
2526
  {
2515
- "name": "on_behalf_of",
2527
+ "name": "approver",
2516
2528
  "type": {
2517
2529
  "fields": [
2518
2530
  {
@@ -2531,119 +2543,119 @@
2531
2543
  "type": {
2532
2544
  "kind": "field"
2533
2545
  }
2546
+ },
2547
+ {
2548
+ "name": "authorize",
2549
+ "type": {
2550
+ "kind": "boolean"
2551
+ }
2534
2552
  }
2535
2553
  ],
2536
2554
  "kind": "struct",
2537
- "path": "AuthRegistry::is_consumable_parameters"
2538
- }
2539
- },
2540
- {
2541
- "name": "return_type",
2542
- "type": {
2543
- "kind": "boolean"
2555
+ "path": "AuthRegistry::_set_authorized_parameters"
2544
2556
  }
2545
2557
  }
2546
2558
  ],
2547
2559
  "kind": "struct",
2548
- "path": "AuthRegistry::is_consumable_abi"
2560
+ "path": "AuthRegistry::_set_authorized_abi"
2549
2561
  }
2550
2562
  ]
2551
2563
  }
2552
2564
  },
2553
2565
  "file_map": {
2554
- "33": {
2566
+ "26": {
2555
2567
  "path": "std/hash/poseidon2.nr",
2556
2568
  "source": "use crate::default::Default;\nuse crate::hash::Hasher;\n\ncomptime global RATE: u32 = 3;\n\npub struct Poseidon2 {\n cache: [Field; 3],\n state: [Field; 4],\n cache_size: u32,\n squeeze_mode: bool, // 0 => absorb, 1 => squeeze\n}\n\nimpl Poseidon2 {\n #[no_predicates]\n pub fn hash<let N: u32>(input: [Field; N], message_size: u32) -> Field {\n if message_size == N {\n Poseidon2::hash_internal(input, N, false)\n } else {\n Poseidon2::hash_internal(input, message_size, true)\n }\n }\n\n pub(crate) fn new(iv: Field) -> Poseidon2 {\n let mut result =\n Poseidon2 { cache: [0; 3], state: [0; 4], cache_size: 0, squeeze_mode: false };\n result.state[RATE] = iv;\n result\n }\n\n fn perform_duplex(&mut self) {\n // add the cache into sponge state\n for i in 0..RATE {\n // We effectively zero-pad the cache by only adding to the state\n // cache that is less than the specified `cache_size`\n if i < self.cache_size {\n self.state[i] += self.cache[i];\n }\n }\n self.state = crate::hash::poseidon2_permutation(self.state, 4);\n }\n\n fn absorb(&mut self, input: Field) {\n assert(!self.squeeze_mode);\n if self.cache_size == RATE {\n // If we're absorbing, and the cache is full, apply the sponge permutation to compress the cache\n self.perform_duplex();\n self.cache[0] = input;\n self.cache_size = 1;\n } else {\n // If we're absorbing, and the cache is not full, add the input into the cache\n self.cache[self.cache_size] = input;\n self.cache_size += 1;\n }\n }\n\n fn squeeze(&mut self) -> Field {\n assert(!self.squeeze_mode);\n // If we're in absorb mode, apply sponge permutation to compress the cache.\n self.perform_duplex();\n self.squeeze_mode = true;\n\n // Pop one item off the top of the permutation and return it.\n self.state[0]\n }\n\n fn hash_internal<let N: u32>(\n input: [Field; N],\n in_len: u32,\n is_variable_length: bool,\n ) -> Field {\n let two_pow_64 = 18446744073709551616;\n let iv: Field = (in_len as Field) * two_pow_64;\n let mut sponge = Poseidon2::new(iv);\n for i in 0..input.len() {\n if i < in_len {\n sponge.absorb(input[i]);\n }\n }\n\n // In the case where the hash preimage is variable-length, we append `1` to the end of the input, to distinguish\n // from fixed-length hashes. (the combination of this additional field element + the hash IV ensures\n // fixed-length and variable-length hashes do not collide)\n if is_variable_length {\n sponge.absorb(1);\n }\n sponge.squeeze()\n }\n}\n\npub struct Poseidon2Hasher {\n _state: [Field],\n}\n\nimpl Hasher for Poseidon2Hasher {\n fn finish(self) -> Field {\n let iv: Field = (self._state.len() as Field) * 18446744073709551616; // iv = (self._state.len() << 64)\n let mut sponge = Poseidon2::new(iv);\n for i in 0..self._state.len() {\n sponge.absorb(self._state[i]);\n }\n sponge.squeeze()\n }\n\n fn write(&mut self, input: Field) {\n self._state = self._state.push_back(input);\n }\n}\n\nimpl Default for Poseidon2Hasher {\n fn default() -> Self {\n Poseidon2Hasher { _state: &[] }\n }\n}\n"
2557
2569
  },
2558
- "58": {
2570
+ "51": {
2559
2571
  "path": "std/panic.nr",
2560
2572
  "source": "pub fn panic<T, U, let N: u32>(message: fmtstr<N, T>) -> U {\n assert(false, message);\n crate::mem::zeroed()\n}\n"
2561
2573
  },
2562
- "79": {
2574
+ "72": {
2563
2575
  "path": "/usr/src/noir-projects/aztec-nr/authwit/src/auth.nr",
2564
- "source": "use dep::aztec::{context::{gas::GasOpts, PrivateContext, PublicContext}, hash::hash_args_array};\nuse dep::aztec::protocol_types::{\n abis::function_selector::FunctionSelector,\n address::AztecAddress,\n constants::{\n CANONICAL_AUTH_REGISTRY_ADDRESS, GENERATOR_INDEX__AUTHWIT_INNER,\n GENERATOR_INDEX__AUTHWIT_NULLIFIER, GENERATOR_INDEX__AUTHWIT_OUTER,\n },\n hash::poseidon2_hash_with_separator,\n};\n\n/**\n * Authenticaion witness helper library\n *\n * Authentication Witness is a scheme for authenticating actions on Aztec, so users can allow third-parties\n * (e.g. protocols or other users) to execute an action on their behalf.\n *\n * This library provides helper functions to manage such witnesses.\n * The authentication witness, is some \"witness\" (data) that authenticates a `message_hash`.\n * The simplest example of an authentication witness, is a signature. The signature is the \"evidence\",\n * that the signer has seen the message, agrees with it, and has allowed it.\n * It does not need to be a signature. It could be any kind of \"proof\" that the message is allowed.\n * Another proof could be knowing some kind of secret, or having some kind of \"token\" that allows the message.\n *\n * The `message_hash` is a hash of the following structure:\n * hash(consumer, chain_id, version, inner_hash)\n * - consumer: the address of the contract that is \"consuming\" the message,\n * - chain_id: the chain id of the chain that the message is being consumed on,\n * - version: the version of the chain that the message is being consumed on,\n * - inner_hash: the hash of the \"inner\" message that is being consumed, this is the \"actual\" message or action.\n *\n * While the `inner_hash` could be anything, such as showing you signed a specific message, it will often be\n * a hash of the \"action\" to approve, along with who made the call. As part of this library, we provide a few\n * helper functions to deal with such messages.\n *\n * For example, we provide helper function that is used for checking that the message is an encoding of the current call.\n * This can be used to let some contract \"allow\" another contract to act on its behalf, as long as it can\n * show that it is acting on behalf of the contract.\n *\n * If we take a case of allowing a contract to transfer tokens on behalf of an account, the `inner_hash` can be\n * derived as:\n * inner_hash = hash(caller, \"transfer\", hash(to, amount))\n *\n * Where the `caller` would be the address of the contract that is trying to transfer the tokens, and `to` and `amount`\n * the arguments for the transfer.\n *\n * Note that we have both a `caller` and a `consumer`, the `consumer` will be the contract that is consuming the message,\n * in the case of the transfer, it would be the `Token` contract itself, while the caller, will be the actor that is\n * allowed to transfer the tokens.\n *\n *\n * The authentication mechanism works differently in public and private contexts. In private, we recall that everything\n * is executed on the user's device, so we can use `oracles` to \"ask\" the user (not contract) for information. In public\n * we cannot do this, since it is executed by the sequencer (someone else). Therefore we can instead use a \"registry\"\n * to store the messages that we have approved.\n *\n * A simple example would be a \"token\" that is being \"pulled\" from one account into another. We will first outline\n * how this would look in private, and then in public later.\n *\n * Say that a user `Alice` wants to deposit some tokens into a DeFi protocol (say a DEX).\n * `Alice` would make a `deposit` transaction, that she is executing using her account contract.\n * The account would call the `DeFi` contract to execute `deposit`, which would try to pull funds from the `Token`\n * contract. Since the `DeFi` contract is trying to pull funds from an account that is not its own, it needs to\n * convince the `Token` contract that it is allowed to do so.\n *\n * This is where the authentication witness comes in The `Token` contract computes a `message_hash` from the\n * `transfer` call, and then asks `Alice Account` contract to verify that the `DeFi` contract is allowed to\n * execute that call.\n *\n * `Alice Account` contract can then ask `Alice` if she wants to allow the `DeFi` contract to pull funds from her\n * account. If she does, she will sign the `message_hash` and return the signature to the `Alice Account` which\n * will validate it and return success to the `Token` contract which will then allow the `DeFi` contract to pull\n * funds from `Alice`.\n *\n * To ensure that the same \"approval\" cannot be used multiple times, we also compute a `nullifier` for the\n * authentication witness, and emit it from the `Token` contract (consumer).\n *\n * Note that we can do this flow as we are in private were we can do oracle calls out from contracts.\n *\n *\n * Person Contract Contract Contract\n * Alice Alice Account Token DeFi\n * | | | |\n * | Defi.deposit(Token, 1000) | |\n * |----------------->| | |\n * | | deposit(Token, 1000) |\n * | |---------------------------------------->|\n * | | | |\n * | | | transfer(Alice, Defi, 1000)\n * | | |<---------------------|\n * | | | |\n * | | Check if Defi may call transfer(Alice, Defi, 1000)\n * | |<-----------------| |\n * | | | |\n * | Please give me AuthWit for DeFi | |\n * | calling transfer(Alice, Defi, 1000) | |\n * |<-----------------| | |\n * | | | |\n * | | | |\n * | AuthWit for transfer(Alice, Defi, 1000) |\n * |----------------->| | |\n * | | AuthWit validity | |\n * | |----------------->| |\n * | | | |\n * | | throw if invalid AuthWit |\n * | | | |\n * | | emit AuthWit nullifier |\n * | | | |\n * | | transfer(Alice, Defi, 1000) |\n * | | | |\n * | | | |\n * | | | success |\n * | | |--------------------->|\n * | | | |\n * | | | |\n * | | | deposit(Token, 1000)\n * | | | |\n * | | | |\n *\n *\n * If we instead were in public, we cannot do the same flow. Instead we would use an authentication registry to store\n * the messages that we have approved.\n *\n * To approve a message, `Alice Account` can make a `set_authorized` call to the registry, to set a `message_hash`\n * as authorized. This is essentially a mapping from `message_hash` to `true` for `Alice Contract`. Every account\n * has its own map in the registry, so `Alice` cannot approve a message for `Bob`.\n *\n * The `Token` contract can then try to \"spend\" the approval by calling `consume` on the registry. If the message\n * was approved, the value is updated to `false`, and we return the success flag. For more information on the\n * registry, see `main.nr` in `auth_registry_contract`.\n *\n * Person Contract Contract Contract Contract\n * Alice Alice Account Registry Token DeFi\n * | | | | |\n * | Registry.set_authorized(..., true) | | |\n * |----------------->| | | |\n * | | set_authorized(..., true) | |\n * | |------------------->| | |\n * | | | | |\n * | | set authorized to true | |\n * | | | | |\n * | | | | |\n * | Defi.deposit(Token, 1000) | | |\n * |----------------->| | | |\n * | | deposit(Token, 1000) | |\n * | |-------------------------------------------------------------->|\n * | | | | |\n * | | | transfer(Alice, Defi, 1000) |\n * | | | |<---------------------|\n * | | | | |\n * | | | Check if Defi may call transfer(Alice, Defi, 1000)\n * | | |<------------------| |\n * | | | | |\n * | | throw if invalid AuthWit | |\n * | | | | |\n * | | | | |\n * | | set authorized to false | |\n * | | | | |\n * | | | | |\n * | | | AuthWit validity | |\n * | | |------------------>| |\n * | | | | |\n * | | | | transfer(Alice, Defi, 1000)\n * | | | |<-------------------->|\n * | | | | |\n * | | | | success |\n * | | | |--------------------->|\n * | | | | |\n * | | | | deposit(Token, 1000)\n * | | | | |\n *\n *\n * --- FAQ ---\n * Q: Why are we using a success flag of `poseidon2_hash_bytes(\"IS_VALID()\")` instead of just returning a boolean?\n * A: We want to make sure that we don't accidentally return `true` if there is a collision in the function selector.\n * By returning a hash of `IS_VALID()`, it becomes very unlikely that there is both a collision and we return\n * a success flag.\n *\n * Q: Why are we using static calls?\n * A: We are using static calls to ensure that the account contract cannot re-enter. If it was a normal call, it\n * could make a new call and do a re-entry attack. Using a static ensures that it cannot update any state.\n *\n * Q: Would it not be cheaper to use a nullifier instead of updating state in public?\n * A: At a quick glance, a public state update + nullifier is 96 bytes, but two state updates are 128, so it would be\n * cheaper to use a nullifier, if this is the way it would always be done. However, if both the approval and the\n * consumption is done in the same transaction, then we will be able to squash the updates (only final tx state diff is posted to DA), and now it is cheaper.\n *\n * Q: Why is the chain id and the version part of the message hash?\n * A: The chain id and the version is part of the message hash to ensure that the message is only valid on a specific\n * chain to avoid a case where the same message could be used across multiple chains.\n */\n\nglobal IS_VALID_SELECTOR = 0x47dacd73; // 4 last bytes of poseidon2_hash_bytes(\"IS_VALID()\")\n\n/**\n * Assert that `on_behalf_of` have authorized the current call with a valid authentication witness\n *\n * Computing the `inner_hash` using the `msg_sender`, `selector` and `args_hash` and then making a call out to the\n * `on_behalf_of` contract to verify that the `inner_hash` is valid.\n *\n * @param on_behalf_of The address that have authorized the current call\n */\n// docs:start:assert_current_call_valid_authwit\npub fn assert_current_call_valid_authwit(context: &mut PrivateContext, on_behalf_of: AztecAddress) {\n let inner_hash = compute_inner_authwit_hash([\n context.msg_sender().to_field(),\n context.selector().to_field(),\n context.args_hash,\n ]);\n assert_inner_hash_valid_authwit(context, on_behalf_of, inner_hash);\n}\n// docs:end:assert_current_call_valid_authwit\n\n/**\n * Assert that a specific `inner_hash` is valid for the `on_behalf_of` address\n *\n * Used as an internal function for `assert_current_call_valid_authwit` and can be used as a standalone function when\n * the `inner_hash` is from a different source, e.g., say a block of text etc.\n *\n * @param on_behalf_of The address that have authorized the current call\n * @param inner_hash The hash of the message to authorize\n */\npub fn assert_inner_hash_valid_authwit(\n context: &mut PrivateContext,\n on_behalf_of: AztecAddress,\n inner_hash: Field,\n) {\n // We perform a static call here and not a standard one to ensure that the account contract cannot re-enter.\n let result: Field = context\n .static_call_private_function(\n on_behalf_of,\n comptime { FunctionSelector::from_signature(\"verify_private_authwit(Field)\") },\n [inner_hash],\n )\n .unpack_into();\n assert(result == IS_VALID_SELECTOR, \"Message not authorized by account\");\n // Compute the nullifier, similar computation to the outer hash, but without the chain_id and version.\n // Those should already be handled in the verification, so we just need something to nullify, that allow same inner_hash for multiple actors.\n let nullifier = compute_authwit_nullifier(on_behalf_of, inner_hash);\n context.push_nullifier(nullifier);\n}\n\n/**\n * Assert that `on_behalf_of` have authorized the current call in the authentication registry\n *\n * Computing the `inner_hash` using the `msg_sender`, `selector` and `args_hash` and then making a call out to the\n * `on_behalf_of` contract to verify that the `inner_hash` is valid.\n *\n * Note that the authentication registry will take the `msg_sender` into account as the consumer, so this will only\n * work if the `msg_sender` is the same as the `consumer` when the `message_hash` was inserted into the registry.\n *\n * @param on_behalf_of The address that have authorized the current call\n */\n// docs:start:assert_current_call_valid_authwit_public\npub unconstrained fn assert_current_call_valid_authwit_public(\n context: &mut PublicContext,\n on_behalf_of: AztecAddress,\n) {\n let inner_hash = compute_inner_authwit_hash([\n (*context).msg_sender().to_field(),\n (*context).selector().to_field(),\n (*context).get_args_hash(),\n ]);\n assert_inner_hash_valid_authwit_public(context, on_behalf_of, inner_hash);\n}\n// docs:end:assert_current_call_valid_authwit_public\n\n/**\n * Assert that `on_behalf_of` have authorized a speicifc `inner_hash` in the authentication registry\n *\n * Computing the `inner_hash` using the `msg_sender`, `selector` and `args_hash` and then making a call out to the\n * `on_behalf_of` contract to verify that the `inner_hash` is valid.\n *\n * Note that the authentication registry will take the `msg_sender` into account as the consumer, so this will only\n * work if the `msg_sender` is the same as the `consumer` when the `message_hash` was inserted into the registry.\n *\n * @param on_behalf_of The address that have authorized the `inner_hash`\n */\npub unconstrained fn assert_inner_hash_valid_authwit_public(\n context: &mut PublicContext,\n on_behalf_of: AztecAddress,\n inner_hash: Field,\n) {\n let results: [Field] = context.call_public_function(\n CANONICAL_AUTH_REGISTRY_ADDRESS,\n comptime { FunctionSelector::from_signature(\"consume((Field),Field)\") },\n [on_behalf_of.to_field(), inner_hash].as_slice(),\n GasOpts::default(),\n );\n assert(results.len() == 1, \"Invalid response from registry\");\n assert(results[0] == IS_VALID_SELECTOR, \"Message not authorized by account\");\n}\n\n/**\n * Compute the `message_hash` from a function call to be used by an authentication witness\n *\n * Useful for when you need a non-account contract to approve during execution. For example if you need a contract\n * to make a call to nested contract, e.g., contract A wants to exit token T to L1 using bridge B, so it needs to allow\n * B to transfer T on its behalf.\n *\n * @param caller The address of the contract that is calling the function, in the example above, this would be B\n * @param consumer The address of the contract that is consuming the message, in the example above, this would be T\n * @param chain_id The chain id of the chain that the message is being consumed on\n * @param version The version of the chain that the message is being consumed on\n * @param selector The function selector of the function that is being called\n * @param args The arguments of the function that is being called\n */\n// docs:start:compute_authwit_message_hash_from_call\npub fn compute_authwit_message_hash_from_call<let N: u32>(\n caller: AztecAddress,\n consumer: AztecAddress,\n chain_id: Field,\n version: Field,\n selector: FunctionSelector,\n args: [Field; N],\n) -> Field {\n let args_hash = hash_args_array(args);\n let inner_hash =\n compute_inner_authwit_hash([caller.to_field(), selector.to_field(), args_hash]);\n compute_authwit_message_hash(consumer, chain_id, version, inner_hash)\n}\n// docs:end:compute_authwit_message_hash_from_call\n\n/**\n * Computes the `inner_hash` of the authentication witness\n *\n * This is used internally, but also useful in cases where you want to compute the `inner_hash` for a specific message\n * that is not necessarily a call, but just some \"bytes\" or text.\n *\n * @param args The arguments to hash\n */\npub fn compute_inner_authwit_hash<let N: u32>(args: [Field; N]) -> Field {\n poseidon2_hash_with_separator(args, GENERATOR_INDEX__AUTHWIT_INNER)\n}\n\n/**\n * Computs the `authwit_nullifier` for a specific `on_behalf_of` and `inner_hash`\n *\n * Using the `on_behalf_of` and the `inner_hash` to ensure that the nullifier is siloed for a specific `on_behalf_of`.\n *\n * @param on_behalf_of The address that have authorized the `inner_hash`\n * @param inner_hash The hash of the message to authorize\n */\npub fn compute_authwit_nullifier(on_behalf_of: AztecAddress, inner_hash: Field) -> Field {\n poseidon2_hash_with_separator(\n [on_behalf_of.to_field(), inner_hash],\n GENERATOR_INDEX__AUTHWIT_NULLIFIER,\n )\n}\n\n/**\n * Computes the `message_hash` for the authentication witness\n *\n * @param consumer The address of the contract that is consuming the message\n * @param chain_id The chain id of the chain that the message is being consumed on\n * @param version The version of the chain that the message is being consumed on\n * @param inner_hash The hash of the \"inner\" message that is being consumed\n */\npub fn compute_authwit_message_hash(\n consumer: AztecAddress,\n chain_id: Field,\n version: Field,\n inner_hash: Field,\n) -> Field {\n poseidon2_hash_with_separator(\n [consumer.to_field(), chain_id, version, inner_hash],\n GENERATOR_INDEX__AUTHWIT_OUTER,\n )\n}\n\n/**\n * Helper function to set the authorization status of a message hash\n *\n * Wraps a public call to the authentication registry to set the authorization status of a `message_hash`\n *\n * @param message_hash The hash of the message to authorize\n * @param authorize True if the message should be authorized, false if it should be revoked\n */\npub unconstrained fn set_authorized(\n context: &mut PublicContext,\n message_hash: Field,\n authorize: bool,\n) {\n let res = context.call_public_function(\n CANONICAL_AUTH_REGISTRY_ADDRESS,\n comptime { FunctionSelector::from_signature(\"set_authorized(Field,bool)\") },\n [message_hash, authorize as Field].as_slice(),\n GasOpts::default(),\n );\n assert(res.len() == 0);\n}\n\n/**\n * Helper function to reject all authwits\n *\n * Wraps a public call to the authentication registry to set the `reject_all` flag\n *\n * @param reject True if all authwits should be rejected, false otherwise\n */\npub unconstrained fn set_reject_all(context: &mut PublicContext, reject: bool) {\n let res = context.call_public_function(\n CANONICAL_AUTH_REGISTRY_ADDRESS,\n comptime { FunctionSelector::from_signature(\"set_reject_all(bool)\") },\n [context.this_address().to_field(), reject as Field].as_slice(),\n GasOpts::default(),\n );\n assert(res.len() == 0);\n}\n"
2576
+ "source": "use dep::aztec::{context::{gas::GasOpts, PrivateContext, PublicContext}, hash::hash_args_array};\nuse dep::aztec::protocol_types::{\n abis::function_selector::FunctionSelector,\n address::AztecAddress,\n constants::{\n CANONICAL_AUTH_REGISTRY_ADDRESS, GENERATOR_INDEX__AUTHWIT_INNER,\n GENERATOR_INDEX__AUTHWIT_NULLIFIER, GENERATOR_INDEX__AUTHWIT_OUTER,\n },\n hash::poseidon2_hash_with_separator,\n};\n\n/**\n * Authenticaion witness helper library\n *\n * Authentication Witness is a scheme for authenticating actions on Aztec, so users can allow third-parties\n * (e.g. protocols or other users) to execute an action on their behalf.\n *\n * This library provides helper functions to manage such witnesses.\n * The authentication witness, is some \"witness\" (data) that authenticates a `message_hash`.\n * The simplest example of an authentication witness, is a signature. The signature is the \"evidence\",\n * that the signer has seen the message, agrees with it, and has allowed it.\n * It does not need to be a signature. It could be any kind of \"proof\" that the message is allowed.\n * Another proof could be knowing some kind of secret, or having some kind of \"token\" that allows the message.\n *\n * The `message_hash` is a hash of the following structure:\n * hash(consumer, chain_id, version, inner_hash)\n * - consumer: the address of the contract that is \"consuming\" the message,\n * - chain_id: the chain id of the chain that the message is being consumed on,\n * - version: the version of the chain that the message is being consumed on,\n * - inner_hash: the hash of the \"inner\" message that is being consumed, this is the \"actual\" message or action.\n *\n * While the `inner_hash` could be anything, such as showing you signed a specific message, it will often be\n * a hash of the \"action\" to approve, along with who made the call. As part of this library, we provide a few\n * helper functions to deal with such messages.\n *\n * For example, we provide helper function that is used for checking that the message is an encoding of the current call.\n * This can be used to let some contract \"allow\" another contract to act on its behalf, as long as it can\n * show that it is acting on behalf of the contract.\n *\n * If we take a case of allowing a contract to transfer tokens on behalf of an account, the `inner_hash` can be\n * derived as:\n * inner_hash = hash(caller, \"transfer\", hash(to, amount))\n *\n * Where the `caller` would be the address of the contract that is trying to transfer the tokens, and `to` and `amount`\n * the arguments for the transfer.\n *\n * Note that we have both a `caller` and a `consumer`, the `consumer` will be the contract that is consuming the message,\n * in the case of the transfer, it would be the `Token` contract itself, while the caller, will be the actor that is\n * allowed to transfer the tokens.\n *\n *\n * The authentication mechanism works differently in public and private contexts. In private, we recall that everything\n * is executed on the user's device, so we can use `oracles` to \"ask\" the user (not contract) for information. In public\n * we cannot do this, since it is executed by the sequencer (someone else). Therefore we can instead use a \"registry\"\n * to store the messages that we have approved.\n *\n * A simple example would be a \"token\" that is being \"pulled\" from one account into another. We will first outline\n * how this would look in private, and then in public later.\n *\n * Say that a user `Alice` wants to deposit some tokens into a DeFi protocol (say a DEX).\n * `Alice` would make a `deposit` transaction, that she is executing using her account contract.\n * The account would call the `DeFi` contract to execute `deposit`, which would try to pull funds from the `Token`\n * contract. Since the `DeFi` contract is trying to pull funds from an account that is not its own, it needs to\n * convince the `Token` contract that it is allowed to do so.\n *\n * This is where the authentication witness comes in The `Token` contract computes a `message_hash` from the\n * `transfer` call, and then asks `Alice Account` contract to verify that the `DeFi` contract is allowed to\n * execute that call.\n *\n * `Alice Account` contract can then ask `Alice` if she wants to allow the `DeFi` contract to pull funds from her\n * account. If she does, she will sign the `message_hash` and return the signature to the `Alice Account` which\n * will validate it and return success to the `Token` contract which will then allow the `DeFi` contract to pull\n * funds from `Alice`.\n *\n * To ensure that the same \"approval\" cannot be used multiple times, we also compute a `nullifier` for the\n * authentication witness, and emit it from the `Token` contract (consumer).\n *\n * Note that we can do this flow as we are in private were we can do oracle calls out from contracts.\n *\n *\n * Person Contract Contract Contract\n * Alice Alice Account Token DeFi\n * | | | |\n * | Defi.deposit(Token, 1000) | |\n * |----------------->| | |\n * | | deposit(Token, 1000) |\n * | |---------------------------------------->|\n * | | | |\n * | | | transfer(Alice, Defi, 1000)\n * | | |<---------------------|\n * | | | |\n * | | Check if Defi may call transfer(Alice, Defi, 1000)\n * | |<-----------------| |\n * | | | |\n * | Please give me AuthWit for DeFi | |\n * | calling transfer(Alice, Defi, 1000) | |\n * |<-----------------| | |\n * | | | |\n * | | | |\n * | AuthWit for transfer(Alice, Defi, 1000) |\n * |----------------->| | |\n * | | AuthWit validity | |\n * | |----------------->| |\n * | | | |\n * | | throw if invalid AuthWit |\n * | | | |\n * | | emit AuthWit nullifier |\n * | | | |\n * | | transfer(Alice, Defi, 1000) |\n * | | | |\n * | | | |\n * | | | success |\n * | | |--------------------->|\n * | | | |\n * | | | |\n * | | | deposit(Token, 1000)\n * | | | |\n * | | | |\n *\n *\n * If we instead were in public, we cannot do the same flow. Instead we would use an authentication registry to store\n * the messages that we have approved.\n *\n * To approve a message, `Alice Account` can make a `set_authorized` call to the registry, to set a `message_hash`\n * as authorized. This is essentially a mapping from `message_hash` to `true` for `Alice Contract`. Every account\n * has its own map in the registry, so `Alice` cannot approve a message for `Bob`.\n *\n * The `Token` contract can then try to \"spend\" the approval by calling `consume` on the registry. If the message\n * was approved, the value is updated to `false`, and we return the success flag. For more information on the\n * registry, see `main.nr` in `auth_registry_contract`.\n *\n * Person Contract Contract Contract Contract\n * Alice Alice Account Registry Token DeFi\n * | | | | |\n * | Registry.set_authorized(..., true) | | |\n * |----------------->| | | |\n * | | set_authorized(..., true) | |\n * | |------------------->| | |\n * | | | | |\n * | | set authorized to true | |\n * | | | | |\n * | | | | |\n * | Defi.deposit(Token, 1000) | | |\n * |----------------->| | | |\n * | | deposit(Token, 1000) | |\n * | |-------------------------------------------------------------->|\n * | | | | |\n * | | | transfer(Alice, Defi, 1000) |\n * | | | |<---------------------|\n * | | | | |\n * | | | Check if Defi may call transfer(Alice, Defi, 1000)\n * | | |<------------------| |\n * | | | | |\n * | | throw if invalid AuthWit | |\n * | | | | |\n * | | | | |\n * | | set authorized to false | |\n * | | | | |\n * | | | | |\n * | | | AuthWit validity | |\n * | | |------------------>| |\n * | | | | |\n * | | | | transfer(Alice, Defi, 1000)\n * | | | |<-------------------->|\n * | | | | |\n * | | | | success |\n * | | | |--------------------->|\n * | | | | |\n * | | | | deposit(Token, 1000)\n * | | | | |\n *\n *\n * --- FAQ ---\n * Q: Why are we using a success flag of `poseidon2_hash_bytes(\"IS_VALID()\")` instead of just returning a boolean?\n * A: We want to make sure that we don't accidentally return `true` if there is a collision in the function selector.\n * By returning a hash of `IS_VALID()`, it becomes very unlikely that there is both a collision and we return\n * a success flag.\n *\n * Q: Why are we using static calls?\n * A: We are using static calls to ensure that the account contract cannot re-enter. If it was a normal call, it\n * could make a new call and do a re-entry attack. Using a static ensures that it cannot update any state.\n *\n * Q: Would it not be cheaper to use a nullifier instead of updating state in public?\n * A: At a quick glance, a public state update + nullifier is 96 bytes, but two state updates are 128, so it would be\n * cheaper to use a nullifier, if this is the way it would always be done. However, if both the approval and the\n * consumption is done in the same transaction, then we will be able to squash the updates (only final tx state diff is posted to DA), and now it is cheaper.\n *\n * Q: Why is the chain id and the version part of the message hash?\n * A: The chain id and the version is part of the message hash to ensure that the message is only valid on a specific\n * chain to avoid a case where the same message could be used across multiple chains.\n */\n\nglobal IS_VALID_SELECTOR: Field = 0x47dacd73; // 4 last bytes of poseidon2_hash_bytes(\"IS_VALID()\")\n\n/**\n * Assert that `on_behalf_of` have authorized the current call with a valid authentication witness\n *\n * Computing the `inner_hash` using the `msg_sender`, `selector` and `args_hash` and then making a call out to the\n * `on_behalf_of` contract to verify that the `inner_hash` is valid.\n *\n * @param on_behalf_of The address that have authorized the current call\n */\n// docs:start:assert_current_call_valid_authwit\npub fn assert_current_call_valid_authwit(context: &mut PrivateContext, on_behalf_of: AztecAddress) {\n let inner_hash = compute_inner_authwit_hash([\n context.msg_sender().to_field(),\n context.selector().to_field(),\n context.args_hash,\n ]);\n assert_inner_hash_valid_authwit(context, on_behalf_of, inner_hash);\n}\n// docs:end:assert_current_call_valid_authwit\n\n/**\n * Assert that a specific `inner_hash` is valid for the `on_behalf_of` address\n *\n * Used as an internal function for `assert_current_call_valid_authwit` and can be used as a standalone function when\n * the `inner_hash` is from a different source, e.g., say a block of text etc.\n *\n * @param on_behalf_of The address that have authorized the current call\n * @param inner_hash The hash of the message to authorize\n */\npub fn assert_inner_hash_valid_authwit(\n context: &mut PrivateContext,\n on_behalf_of: AztecAddress,\n inner_hash: Field,\n) {\n // We perform a static call here and not a standard one to ensure that the account contract cannot re-enter.\n let result: Field = context\n .static_call_private_function(\n on_behalf_of,\n comptime { FunctionSelector::from_signature(\"verify_private_authwit(Field)\") },\n [inner_hash],\n )\n .unpack_into();\n assert(result == IS_VALID_SELECTOR, \"Message not authorized by account\");\n // Compute the nullifier, similar computation to the outer hash, but without the chain_id and version.\n // Those should already be handled in the verification, so we just need something to nullify, that allow same inner_hash for multiple actors.\n let nullifier = compute_authwit_nullifier(on_behalf_of, inner_hash);\n context.push_nullifier(nullifier);\n}\n\n/**\n * Assert that `on_behalf_of` have authorized the current call in the authentication registry\n *\n * Computing the `inner_hash` using the `msg_sender`, `selector` and `args_hash` and then making a call out to the\n * `on_behalf_of` contract to verify that the `inner_hash` is valid.\n *\n * Note that the authentication registry will take the `msg_sender` into account as the consumer, so this will only\n * work if the `msg_sender` is the same as the `consumer` when the `message_hash` was inserted into the registry.\n *\n * @param on_behalf_of The address that have authorized the current call\n */\n// docs:start:assert_current_call_valid_authwit_public\npub unconstrained fn assert_current_call_valid_authwit_public(\n context: &mut PublicContext,\n on_behalf_of: AztecAddress,\n) {\n let inner_hash = compute_inner_authwit_hash([\n (*context).msg_sender().to_field(),\n (*context).selector().to_field(),\n (*context).get_args_hash(),\n ]);\n assert_inner_hash_valid_authwit_public(context, on_behalf_of, inner_hash);\n}\n// docs:end:assert_current_call_valid_authwit_public\n\n/**\n * Assert that `on_behalf_of` have authorized a speicifc `inner_hash` in the authentication registry\n *\n * Computing the `inner_hash` using the `msg_sender`, `selector` and `args_hash` and then making a call out to the\n * `on_behalf_of` contract to verify that the `inner_hash` is valid.\n *\n * Note that the authentication registry will take the `msg_sender` into account as the consumer, so this will only\n * work if the `msg_sender` is the same as the `consumer` when the `message_hash` was inserted into the registry.\n *\n * @param on_behalf_of The address that have authorized the `inner_hash`\n */\npub unconstrained fn assert_inner_hash_valid_authwit_public(\n context: &mut PublicContext,\n on_behalf_of: AztecAddress,\n inner_hash: Field,\n) {\n let results: [Field] = context.call_public_function(\n CANONICAL_AUTH_REGISTRY_ADDRESS,\n comptime { FunctionSelector::from_signature(\"consume((Field),Field)\") },\n [on_behalf_of.to_field(), inner_hash].as_slice(),\n GasOpts::default(),\n );\n assert(results.len() == 1, \"Invalid response from registry\");\n assert(results[0] == IS_VALID_SELECTOR, \"Message not authorized by account\");\n}\n\n/**\n * Compute the `message_hash` from a function call to be used by an authentication witness\n *\n * Useful for when you need a non-account contract to approve during execution. For example if you need a contract\n * to make a call to nested contract, e.g., contract A wants to exit token T to L1 using bridge B, so it needs to allow\n * B to transfer T on its behalf.\n *\n * @param caller The address of the contract that is calling the function, in the example above, this would be B\n * @param consumer The address of the contract that is consuming the message, in the example above, this would be T\n * @param chain_id The chain id of the chain that the message is being consumed on\n * @param version The version of the chain that the message is being consumed on\n * @param selector The function selector of the function that is being called\n * @param args The arguments of the function that is being called\n */\n// docs:start:compute_authwit_message_hash_from_call\npub fn compute_authwit_message_hash_from_call<let N: u32>(\n caller: AztecAddress,\n consumer: AztecAddress,\n chain_id: Field,\n version: Field,\n selector: FunctionSelector,\n args: [Field; N],\n) -> Field {\n let args_hash = hash_args_array(args);\n let inner_hash =\n compute_inner_authwit_hash([caller.to_field(), selector.to_field(), args_hash]);\n compute_authwit_message_hash(consumer, chain_id, version, inner_hash)\n}\n// docs:end:compute_authwit_message_hash_from_call\n\n/**\n * Computes the `inner_hash` of the authentication witness\n *\n * This is used internally, but also useful in cases where you want to compute the `inner_hash` for a specific message\n * that is not necessarily a call, but just some \"bytes\" or text.\n *\n * @param args The arguments to hash\n */\npub fn compute_inner_authwit_hash<let N: u32>(args: [Field; N]) -> Field {\n poseidon2_hash_with_separator(args, GENERATOR_INDEX__AUTHWIT_INNER)\n}\n\n/**\n * Computs the `authwit_nullifier` for a specific `on_behalf_of` and `inner_hash`\n *\n * Using the `on_behalf_of` and the `inner_hash` to ensure that the nullifier is siloed for a specific `on_behalf_of`.\n *\n * @param on_behalf_of The address that have authorized the `inner_hash`\n * @param inner_hash The hash of the message to authorize\n */\npub fn compute_authwit_nullifier(on_behalf_of: AztecAddress, inner_hash: Field) -> Field {\n poseidon2_hash_with_separator(\n [on_behalf_of.to_field(), inner_hash],\n GENERATOR_INDEX__AUTHWIT_NULLIFIER,\n )\n}\n\n/**\n * Computes the `message_hash` for the authentication witness\n *\n * @param consumer The address of the contract that is consuming the message\n * @param chain_id The chain id of the chain that the message is being consumed on\n * @param version The version of the chain that the message is being consumed on\n * @param inner_hash The hash of the \"inner\" message that is being consumed\n */\npub fn compute_authwit_message_hash(\n consumer: AztecAddress,\n chain_id: Field,\n version: Field,\n inner_hash: Field,\n) -> Field {\n poseidon2_hash_with_separator(\n [consumer.to_field(), chain_id, version, inner_hash],\n GENERATOR_INDEX__AUTHWIT_OUTER,\n )\n}\n\n/**\n * Helper function to set the authorization status of a message hash\n *\n * Wraps a public call to the authentication registry to set the authorization status of a `message_hash`\n *\n * @param message_hash The hash of the message to authorize\n * @param authorize True if the message should be authorized, false if it should be revoked\n */\npub unconstrained fn set_authorized(\n context: &mut PublicContext,\n message_hash: Field,\n authorize: bool,\n) {\n let res = context.call_public_function(\n CANONICAL_AUTH_REGISTRY_ADDRESS,\n comptime { FunctionSelector::from_signature(\"set_authorized(Field,bool)\") },\n [message_hash, authorize as Field].as_slice(),\n GasOpts::default(),\n );\n assert(res.len() == 0);\n}\n\n/**\n * Helper function to reject all authwits\n *\n * Wraps a public call to the authentication registry to set the `reject_all` flag\n *\n * @param reject True if all authwits should be rejected, false otherwise\n */\npub unconstrained fn set_reject_all(context: &mut PublicContext, reject: bool) {\n let res = context.call_public_function(\n CANONICAL_AUTH_REGISTRY_ADDRESS,\n comptime { FunctionSelector::from_signature(\"set_reject_all(bool)\") },\n [context.this_address().to_field(), reject as Field].as_slice(),\n GasOpts::default(),\n );\n assert(res.len() == 0);\n}\n"
2565
2577
  },
2566
- "108": {
2578
+ "101": {
2567
2579
  "path": "/usr/src/noir-projects/aztec-nr/aztec/src/context/unconstrained_context.nr",
2568
2580
  "source": "use crate::oracle::{\n execution::{get_block_number, get_chain_id, get_contract_address, get_version},\n storage::storage_read,\n};\nuse dep::protocol_types::{address::AztecAddress, traits::Deserialize};\n\npub struct UnconstrainedContext {\n block_number: u32,\n contract_address: AztecAddress,\n version: Field,\n chain_id: Field,\n}\n\nimpl UnconstrainedContext {\n pub unconstrained fn new() -> Self {\n // We could call these oracles on the getters instead of at creation, which makes sense given that they might\n // not even be accessed. However any performance gains are minimal, and we'd rather fail early if a user\n // incorrectly attempts to create an UnconstrainedContext in an environment in which these oracles are not\n // available.\n let block_number = get_block_number();\n let contract_address = get_contract_address();\n let chain_id = get_chain_id();\n let version = get_version();\n Self { block_number, contract_address, version, chain_id }\n }\n\n pub unconstrained fn at(contract_address: AztecAddress) -> Self {\n let block_number = get_block_number();\n let chain_id = get_chain_id();\n let version = get_version();\n Self { block_number, contract_address, version, chain_id }\n }\n\n pub unconstrained fn at_historical(contract_address: AztecAddress, block_number: u32) -> Self {\n let chain_id = get_chain_id();\n let version = get_version();\n Self { block_number, contract_address, version, chain_id }\n }\n\n pub fn block_number(self) -> u32 {\n self.block_number\n }\n\n pub fn this_address(self) -> AztecAddress {\n self.contract_address\n }\n\n pub fn version(self) -> Field {\n self.version\n }\n\n pub fn chain_id(self) -> Field {\n self.chain_id\n }\n\n pub unconstrained fn raw_storage_read<let N: u32>(\n self: Self,\n storage_slot: Field,\n ) -> [Field; N] {\n storage_read(self.this_address(), storage_slot, self.block_number())\n }\n\n pub unconstrained fn storage_read<T, let N: u32>(self, storage_slot: Field) -> T\n where\n T: Deserialize<N>,\n {\n T::deserialize(self.raw_storage_read(storage_slot))\n }\n}\n"
2569
2581
  },
2570
- "109": {
2582
+ "102": {
2571
2583
  "path": "/usr/src/noir-projects/aztec-nr/aztec/src/context/private_context.nr",
2572
2584
  "source": "use crate::{\n context::{inputs::PrivateContextInputs, packed_returns::PackedReturns},\n hash::{ArgsHasher, hash_args_array},\n keys::constants::{NULLIFIER_INDEX, NUM_KEY_TYPES, OUTGOING_INDEX, sk_generators},\n messaging::process_l1_to_l2_message,\n oracle::{\n arguments,\n call_private_function::call_private_function_internal,\n enqueue_public_function_call::{\n enqueue_public_function_call_internal, notify_set_min_revertible_side_effect_counter,\n set_public_teardown_function_call_internal,\n },\n header::get_header_at,\n key_validation_request::get_key_validation_request,\n logs::{emit_encrypted_event_log, emit_encrypted_note_log},\n returns::pack_returns,\n },\n};\nuse dep::protocol_types::{\n abis::{\n call_context::CallContext,\n function_selector::FunctionSelector,\n log_hash::{EncryptedLogHash, LogHash, NoteLogHash},\n max_block_number::MaxBlockNumber,\n note_hash::NoteHash,\n nullifier::Nullifier,\n private_call_request::PrivateCallRequest,\n private_circuit_public_inputs::PrivateCircuitPublicInputs,\n public_call_request::PublicCallRequest,\n read_request::ReadRequest,\n side_effect::Counted,\n validation_requests::{KeyValidationRequest, KeyValidationRequestAndGenerator},\n },\n address::{AztecAddress, EthAddress},\n constants::{\n MAX_CONTRACT_CLASS_LOGS_PER_CALL, MAX_ENCRYPTED_LOGS_PER_CALL, MAX_ENQUEUED_CALLS_PER_CALL,\n MAX_KEY_VALIDATION_REQUESTS_PER_CALL, MAX_L2_TO_L1_MSGS_PER_CALL,\n MAX_NOTE_ENCRYPTED_LOGS_PER_CALL, MAX_NOTE_HASH_READ_REQUESTS_PER_CALL,\n MAX_NOTE_HASHES_PER_CALL, MAX_NULLIFIER_READ_REQUESTS_PER_CALL, MAX_NULLIFIERS_PER_CALL,\n MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL, PUBLIC_DISPATCH_SELECTOR,\n },\n header::Header,\n messaging::l2_to_l1_message::L2ToL1Message,\n traits::Empty,\n};\n\n// When finished, one can call .finish() to convert back to the abi\npub struct PrivateContext {\n // docs:start:private-context\n pub inputs: PrivateContextInputs,\n pub side_effect_counter: u32,\n\n pub min_revertible_side_effect_counter: u32,\n pub is_fee_payer: bool,\n\n pub args_hash: Field,\n pub return_hash: Field,\n\n pub max_block_number: MaxBlockNumber,\n\n pub note_hash_read_requests: BoundedVec<ReadRequest, MAX_NOTE_HASH_READ_REQUESTS_PER_CALL>,\n pub nullifier_read_requests: BoundedVec<ReadRequest, MAX_NULLIFIER_READ_REQUESTS_PER_CALL>,\n key_validation_requests_and_generators: BoundedVec<KeyValidationRequestAndGenerator, MAX_KEY_VALIDATION_REQUESTS_PER_CALL>,\n\n pub note_hashes: BoundedVec<NoteHash, MAX_NOTE_HASHES_PER_CALL>,\n pub nullifiers: BoundedVec<Nullifier, MAX_NULLIFIERS_PER_CALL>,\n\n pub private_call_requests: BoundedVec<PrivateCallRequest, MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL>,\n pub public_call_requests: BoundedVec<Counted<PublicCallRequest>, MAX_ENQUEUED_CALLS_PER_CALL>,\n pub public_teardown_call_request: PublicCallRequest,\n pub l2_to_l1_msgs: BoundedVec<L2ToL1Message, MAX_L2_TO_L1_MSGS_PER_CALL>,\n // docs:end:private-context\n\n // Header of a block whose state is used during private execution (not the block the transaction is included in).\n pub historical_header: Header,\n\n pub note_encrypted_logs_hashes: BoundedVec<NoteLogHash, MAX_NOTE_ENCRYPTED_LOGS_PER_CALL>,\n pub encrypted_logs_hashes: BoundedVec<EncryptedLogHash, MAX_ENCRYPTED_LOGS_PER_CALL>,\n pub contract_class_logs_hashes: BoundedVec<LogHash, MAX_CONTRACT_CLASS_LOGS_PER_CALL>,\n\n // Contains the last key validation request for each key type. This is used to cache the last request and avoid\n // fetching the same request multiple times.\n // The index of the array corresponds to the key type (0 nullifier, 1 incoming, 2 outgoing, 3 tagging).\n pub last_key_validation_requests: [Option<KeyValidationRequest>; NUM_KEY_TYPES],\n}\n\nimpl PrivateContext {\n pub fn new(inputs: PrivateContextInputs, args_hash: Field) -> PrivateContext {\n PrivateContext {\n inputs,\n side_effect_counter: inputs.start_side_effect_counter + 1,\n min_revertible_side_effect_counter: 0,\n is_fee_payer: false,\n args_hash,\n return_hash: 0,\n max_block_number: MaxBlockNumber::empty(),\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n historical_header: inputs.historical_header,\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n note_encrypted_logs_hashes: BoundedVec::new(),\n encrypted_logs_hashes: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n }\n }\n\n pub fn msg_sender(self) -> AztecAddress {\n self.inputs.call_context.msg_sender\n }\n\n pub fn this_address(self) -> AztecAddress {\n self.inputs.call_context.contract_address\n }\n\n pub fn chain_id(self) -> Field {\n self.inputs.tx_context.chain_id\n }\n\n pub fn version(self) -> Field {\n self.inputs.tx_context.version\n }\n\n pub fn selector(self) -> FunctionSelector {\n self.inputs.call_context.function_selector\n }\n\n pub fn get_args_hash(self) -> Field {\n self.args_hash\n }\n\n pub fn push_note_hash(&mut self, note_hash: Field) {\n self.note_hashes.push(NoteHash { value: note_hash, counter: self.next_counter() });\n }\n\n pub fn push_nullifier(&mut self, nullifier: Field) {\n self.nullifiers.push(\n Nullifier { value: nullifier, note_hash: 0, counter: self.next_counter() },\n );\n }\n\n pub fn push_nullifier_for_note_hash(&mut self, nullifier: Field, nullified_note_hash: Field) {\n self.nullifiers.push(\n Nullifier {\n value: nullifier,\n note_hash: nullified_note_hash,\n counter: self.next_counter(),\n },\n );\n }\n\n // Returns the header of a block whose state is used during private execution (not the block the transaction is\n // included in).\n pub fn get_header(self) -> Header {\n self.historical_header\n }\n\n // Returns the header of an arbitrary block whose block number is less than or equal to the block number\n // of historical header.\n pub fn get_header_at(self, block_number: u32) -> Header {\n get_header_at(block_number, self)\n }\n\n pub fn set_return_hash(&mut self, returns_hasher: ArgsHasher) {\n pack_returns(returns_hasher.fields);\n self.return_hash = returns_hasher.hash();\n }\n\n pub fn finish(self) -> PrivateCircuitPublicInputs {\n PrivateCircuitPublicInputs {\n call_context: self.inputs.call_context,\n args_hash: self.args_hash,\n returns_hash: self.return_hash,\n min_revertible_side_effect_counter: self.min_revertible_side_effect_counter,\n is_fee_payer: self.is_fee_payer,\n max_block_number: self.max_block_number,\n note_hash_read_requests: self.note_hash_read_requests.storage(),\n nullifier_read_requests: self.nullifier_read_requests.storage(),\n key_validation_requests_and_generators: self\n .key_validation_requests_and_generators\n .storage(),\n note_hashes: self.note_hashes.storage(),\n nullifiers: self.nullifiers.storage(),\n private_call_requests: self.private_call_requests.storage(),\n public_call_requests: self.public_call_requests.storage(),\n public_teardown_call_request: self.public_teardown_call_request,\n l2_to_l1_msgs: self.l2_to_l1_msgs.storage(),\n start_side_effect_counter: self.inputs.start_side_effect_counter,\n end_side_effect_counter: self.side_effect_counter,\n note_encrypted_logs_hashes: self.note_encrypted_logs_hashes.storage(),\n encrypted_logs_hashes: self.encrypted_logs_hashes.storage(),\n contract_class_logs_hashes: self.contract_class_logs_hashes.storage(),\n historical_header: self.historical_header,\n tx_context: self.inputs.tx_context,\n }\n }\n\n pub fn set_as_fee_payer(&mut self) {\n dep::protocol_types::debug_log::debug_log_format(\n \"Setting {0} as fee payer\",\n [self.this_address().to_field()],\n );\n self.is_fee_payer = true;\n }\n\n pub fn end_setup(&mut self) {\n // dep::protocol_types::debug_log::debug_log_format(\n // \"Ending setup at counter {0}\",\n // [self.side_effect_counter as Field]\n // );\n self.min_revertible_side_effect_counter = self.side_effect_counter;\n notify_set_min_revertible_side_effect_counter(self.min_revertible_side_effect_counter);\n }\n\n // docs:start:max-block-number\n pub fn set_tx_max_block_number(&mut self, max_block_number: u32) {\n // docs:end:max-block-number\n self.max_block_number =\n MaxBlockNumber::min_with_u32(self.max_block_number, max_block_number);\n }\n\n pub fn push_note_hash_read_request(&mut self, note_hash: Field) {\n let side_effect = ReadRequest { value: note_hash, counter: self.next_counter() };\n self.note_hash_read_requests.push(side_effect);\n }\n\n pub fn push_nullifier_read_request(&mut self, nullifier: Field) {\n let request = ReadRequest { value: nullifier, counter: self.next_counter() };\n self.nullifier_read_requests.push(request);\n }\n\n pub fn request_nsk_app(&mut self, npk_m_hash: Field) -> Field {\n self.request_sk_app(npk_m_hash, NULLIFIER_INDEX)\n }\n\n pub fn request_ovsk_app(&mut self, ovpk_m_hash: Field) -> Field {\n self.request_sk_app(ovpk_m_hash, OUTGOING_INDEX)\n }\n\n fn request_sk_app(&mut self, pk_m_hash: Field, key_index: Field) -> Field {\n let cached_request =\n self.last_key_validation_requests[key_index].unwrap_or(KeyValidationRequest::empty());\n\n if cached_request.pk_m.hash() == pk_m_hash {\n // We get a match so the cached request is the latest one\n cached_request.sk_app\n } else {\n // We didn't get a match meaning the cached result is stale\n // Typically we'd validate keys by showing that they are the preimage of `pk_m_hash`, but that'd require\n // the oracle returning the master secret keys, which could cause malicious contracts to leak it or learn\n // about secrets from other contracts. We therefore silo secret keys, and rely on the private kernel to\n // validate that we siloed secret key corresponds to correct siloing of the master secret key that hashes\n // to `pk_m_hash`.\n let request = unsafe { get_key_validation_request(pk_m_hash, key_index) };\n assert(request.pk_m.hash() == pk_m_hash);\n\n self.key_validation_requests_and_generators.push(\n KeyValidationRequestAndGenerator {\n request,\n sk_app_generator: sk_generators[key_index],\n },\n );\n self.last_key_validation_requests[key_index] = Option::some(request);\n request.sk_app\n }\n }\n\n // docs:start:context_message_portal\n pub fn message_portal(&mut self, recipient: EthAddress, content: Field) {\n // docs:end:context_message_portal\n let message = L2ToL1Message { recipient, content, counter: self.next_counter() };\n self.l2_to_l1_msgs.push(message);\n }\n\n // docs:start:context_consume_l1_to_l2_message\n // docs:start:consume_l1_to_l2_message\n pub fn consume_l1_to_l2_message(\n &mut self,\n content: Field,\n secret: Field,\n sender: EthAddress,\n leaf_index: Field,\n ) {\n // docs:end:context_consume_l1_to_l2_message\n let nullifier = process_l1_to_l2_message(\n self.historical_header.state.l1_to_l2_message_tree.root,\n self.this_address(),\n sender,\n self.chain_id(),\n self.version(),\n content,\n secret,\n leaf_index,\n );\n\n // Push nullifier (and the \"commitment\" corresponding to this can be \"empty\")\n self.push_nullifier(nullifier)\n }\n // docs:end:consume_l1_to_l2_message\n\n // NB: A randomness value of 0 signals that the kernels should not mask the contract address\n // used in siloing later on e.g. 'handshaking' contract w/ known address.\n pub fn emit_raw_event_log_with_masked_address<let M: u32>(\n &mut self,\n randomness: Field,\n log: [u8; M],\n log_hash: Field,\n ) {\n let counter = self.next_counter();\n let contract_address = self.this_address();\n let len = log.len() as Field + 4;\n let side_effect = EncryptedLogHash { value: log_hash, counter, length: len, randomness };\n self.encrypted_logs_hashes.push(side_effect);\n\n emit_encrypted_event_log(contract_address, randomness, log, counter);\n }\n\n pub fn emit_raw_note_log<let M: u32>(\n &mut self,\n note_hash_counter: u32,\n log: [u8; M],\n log_hash: Field,\n ) {\n let counter = self.next_counter();\n let len = log.len() as Field + 4;\n let side_effect = NoteLogHash { value: log_hash, counter, length: len, note_hash_counter };\n self.note_encrypted_logs_hashes.push(side_effect);\n\n emit_encrypted_note_log(note_hash_counter, log, counter);\n }\n\n pub fn call_private_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) -> PackedReturns {\n let args_hash = hash_args_array(args);\n arguments::pack_arguments_array(args);\n self.call_private_function_with_packed_args(\n contract_address,\n function_selector,\n args_hash,\n false,\n )\n }\n\n pub fn static_call_private_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) -> PackedReturns {\n let args_hash = hash_args_array(args);\n arguments::pack_arguments_array(args);\n self.call_private_function_with_packed_args(\n contract_address,\n function_selector,\n args_hash,\n true,\n )\n }\n\n pub fn call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> PackedReturns {\n self.call_private_function_with_packed_args(contract_address, function_selector, 0, false)\n }\n\n pub fn static_call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> PackedReturns {\n self.call_private_function_with_packed_args(contract_address, function_selector, 0, true)\n }\n\n pub fn call_private_function_with_packed_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) -> PackedReturns {\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n let start_side_effect_counter = self.side_effect_counter;\n\n // The oracle simulates the private call and returns the value of the side effects counter after execution of\n // the call (which means that end_side_effect_counter - start_side_effect_counter is the number of side effects\n // that took place), along with the hash of the return values. We validate these by requesting a private kernel\n // iteration in which the return values are constrained to hash to `returns_hash` and the side effects counter\n // to increment from start to end.\n let (end_side_effect_counter, returns_hash) = unsafe {\n call_private_function_internal(\n contract_address,\n function_selector,\n args_hash,\n start_side_effect_counter,\n is_static_call,\n )\n };\n\n self.private_call_requests.push(\n PrivateCallRequest {\n call_context: CallContext {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n },\n args_hash,\n returns_hash,\n start_side_effect_counter,\n end_side_effect_counter,\n },\n );\n\n // TODO (fees) figure out why this crashes the prover and enable it\n // we need this in order to pay fees inside child call contexts\n // assert(\n // (item.public_inputs.min_revertible_side_effect_counter == 0 as u32)\n // | (item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter)\n // );\n // if item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter {\n // self.min_revertible_side_effect_counter = item.public_inputs.min_revertible_side_effect_counter;\n // }\n self.side_effect_counter = end_side_effect_counter + 1;\n PackedReturns::new(returns_hash)\n }\n\n pub fn call_public_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let args_hash = hash_args_array(args);\n arguments::pack_arguments_array(args);\n self.call_public_function_with_packed_args(\n contract_address,\n function_selector,\n args_hash,\n false,\n )\n }\n\n pub fn static_call_public_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let args_hash = hash_args_array(args);\n arguments::pack_arguments_array(args);\n self.call_public_function_with_packed_args(\n contract_address,\n function_selector,\n args_hash,\n true,\n )\n }\n\n pub fn call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) {\n self.call_public_function_with_packed_args(contract_address, function_selector, 0, false)\n }\n\n pub fn static_call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) {\n self.call_public_function_with_packed_args(contract_address, function_selector, 0, true)\n }\n\n pub fn call_public_function_with_packed_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n // TODO(https://github.com/AztecProtocol/aztec-packages/issues/8985): Fix this.\n // WARNING: This is insecure and should be temporary!\n // The oracle repacks the arguments and returns a new args_hash.\n // new_args = [selector, ...old_args], so as to make it suitable to call the public dispatch function.\n // We don't validate or compute it in the circuit because a) it's harder to do with slices, and\n // b) this is only temporary.\n let args_hash = enqueue_public_function_call_internal(\n contract_address,\n function_selector,\n args_hash,\n counter,\n is_static_call,\n );\n\n // Public calls are rerouted through the dispatch function.\n let function_selector = comptime { FunctionSelector::from_field(PUBLIC_DISPATCH_SELECTOR) };\n\n let call_request = PublicCallRequest {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n args_hash,\n };\n\n self.public_call_requests.push(Counted::new(call_request, counter));\n }\n\n pub fn set_public_teardown_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let args_hash = hash_args_array(args);\n arguments::pack_arguments_array(args);\n self.set_public_teardown_function_with_packed_args(\n contract_address,\n function_selector,\n args_hash,\n false,\n )\n }\n\n pub fn set_public_teardown_function_with_packed_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n // TODO(https://github.com/AztecProtocol/aztec-packages/issues/8985): Fix this.\n // WARNING: This is insecure and should be temporary!\n // The oracle repacks the arguments and returns a new args_hash.\n // new_args = [selector, ...old_args], so as to make it suitable to call the public dispatch function.\n // We don't validate or compute it in the circuit because a) it's harder to do with slices, and\n // b) this is only temporary.\n let args_hash = set_public_teardown_function_call_internal(\n contract_address,\n function_selector,\n args_hash,\n counter,\n is_static_call,\n );\n\n let function_selector = comptime { FunctionSelector::from_field(PUBLIC_DISPATCH_SELECTOR) };\n\n self.public_teardown_call_request = PublicCallRequest {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n args_hash,\n };\n }\n\n fn next_counter(&mut self) -> u32 {\n let counter = self.side_effect_counter;\n self.side_effect_counter += 1;\n counter\n }\n}\n\nimpl Empty for PrivateContext {\n fn empty() -> Self {\n PrivateContext {\n inputs: PrivateContextInputs::empty(),\n side_effect_counter: 0 as u32,\n min_revertible_side_effect_counter: 0 as u32,\n is_fee_payer: false,\n args_hash: 0,\n return_hash: 0,\n max_block_number: MaxBlockNumber::empty(),\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n historical_header: Header::empty(),\n note_encrypted_logs_hashes: BoundedVec::new(),\n encrypted_logs_hashes: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n }\n }\n}\n"
2573
2585
  },
2574
- "110": {
2586
+ "103": {
2575
2587
  "path": "/usr/src/noir-projects/aztec-nr/aztec/src/context/public_context.nr",
2576
2588
  "source": "use crate::context::gas::GasOpts;\nuse crate::hash::{\n compute_l1_to_l2_message_hash, compute_l1_to_l2_message_nullifier, compute_secret_hash,\n};\nuse dep::protocol_types::abis::function_selector::FunctionSelector;\nuse dep::protocol_types::address::{AztecAddress, EthAddress};\nuse dep::protocol_types::constants::MAX_FIELD_VALUE;\nuse dep::protocol_types::traits::{Deserialize, Empty, Serialize};\n\npub struct PublicContext {\n pub args_hash: Option<Field>,\n pub compute_args_hash: fn() -> Field,\n}\n\nimpl PublicContext {\n pub fn new(compute_args_hash: fn() -> Field) -> Self {\n PublicContext { args_hash: Option::none(), compute_args_hash }\n }\n\n pub fn emit_unencrypted_log<T, let N: u32>(_self: &mut Self, log: T)\n where\n T: Serialize<N>,\n {\n // AVM opcodes are constrained by the AVM itself\n unsafe { emit_unencrypted_log(Serialize::serialize(log).as_slice()) };\n }\n\n pub fn note_hash_exists(_self: Self, note_hash: Field, leaf_index: Field) -> bool {\n // AVM opcodes are constrained by the AVM itself\n unsafe { note_hash_exists(note_hash, leaf_index) } == 1\n }\n\n pub fn l1_to_l2_msg_exists(_self: Self, msg_hash: Field, msg_leaf_index: Field) -> bool {\n // AVM opcodes are constrained by the AVM itself\n unsafe { l1_to_l2_msg_exists(msg_hash, msg_leaf_index) } == 1\n }\n\n pub fn nullifier_exists(_self: Self, unsiloed_nullifier: Field, address: AztecAddress) -> bool {\n // AVM opcodes are constrained by the AVM itself\n unsafe { nullifier_exists(unsiloed_nullifier, address.to_field()) } == 1\n }\n\n pub fn consume_l1_to_l2_message(\n &mut self,\n content: Field,\n secret: Field,\n sender: EthAddress,\n leaf_index: Field,\n ) {\n let secret_hash = compute_secret_hash(secret);\n let message_hash = compute_l1_to_l2_message_hash(\n sender,\n self.chain_id(),\n /*recipient=*/\n self.this_address(),\n self.version(),\n content,\n secret_hash,\n leaf_index,\n );\n let nullifier = compute_l1_to_l2_message_nullifier(message_hash, secret);\n\n assert(\n !self.nullifier_exists(nullifier, self.this_address()),\n \"L1-to-L2 message is already nullified\",\n );\n assert(\n self.l1_to_l2_msg_exists(message_hash, leaf_index),\n \"Tried to consume nonexistent L1-to-L2 message\",\n );\n\n self.push_nullifier(nullifier);\n }\n\n pub fn message_portal(_self: &mut Self, recipient: EthAddress, content: Field) {\n // AVM opcodes are constrained by the AVM itself\n unsafe { send_l2_to_l1_msg(recipient, content) };\n }\n\n pub unconstrained fn call_public_function(\n _self: &mut Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field],\n gas_opts: GasOpts,\n ) -> [Field] {\n let args = args.push_front(function_selector.to_field());\n let success = call(gas_for_call(gas_opts), contract_address, args);\n\n let result_data = returndata_copy(0, returndata_size());\n if !success {\n // Rethrow the revert data.\n avm_revert(result_data);\n }\n result_data\n }\n\n pub unconstrained fn static_call_public_function(\n _self: &mut Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field],\n gas_opts: GasOpts,\n ) -> [Field] {\n let args = args.push_front(function_selector.to_field());\n let success = call_static(gas_for_call(gas_opts), contract_address, args);\n\n let result_data = returndata_copy(0, returndata_size());\n if !success {\n // Rethrow the revert data.\n avm_revert(result_data);\n }\n result_data\n }\n\n pub fn push_note_hash(_self: &mut Self, note_hash: Field) {\n // AVM opcodes are constrained by the AVM itself\n unsafe { emit_note_hash(note_hash) };\n }\n pub fn push_nullifier(_self: &mut Self, nullifier: Field) {\n // AVM opcodes are constrained by the AVM itself\n unsafe { emit_nullifier(nullifier) };\n }\n\n pub fn this_address(_self: Self) -> AztecAddress {\n // AVM opcodes are constrained by the AVM itself\n unsafe {\n address()\n }\n }\n pub fn msg_sender(_self: Self) -> AztecAddress {\n // AVM opcodes are constrained by the AVM itself\n unsafe {\n sender()\n }\n }\n pub fn selector(_self: Self) -> FunctionSelector {\n // The selector is the first element of the calldata when calling a public function through dispatch.\n // AVM opcodes are constrained by the AVM itself.\n let raw_selector: [Field; 1] = unsafe { calldata_copy(0, 1) };\n FunctionSelector::from_field(raw_selector[0])\n }\n pub fn get_args_hash(mut self) -> Field {\n if !self.args_hash.is_some() {\n self.args_hash = Option::some((self.compute_args_hash)());\n }\n\n self.args_hash.unwrap_unchecked()\n }\n pub fn transaction_fee(_self: Self) -> Field {\n // AVM opcodes are constrained by the AVM itself\n unsafe {\n transaction_fee()\n }\n }\n\n pub fn chain_id(_self: Self) -> Field {\n // AVM opcodes are constrained by the AVM itself\n unsafe {\n chain_id()\n }\n }\n pub fn version(_self: Self) -> Field {\n // AVM opcodes are constrained by the AVM itself\n unsafe {\n version()\n }\n }\n pub fn block_number(_self: Self) -> Field {\n // AVM opcodes are constrained by the AVM itself\n unsafe {\n block_number()\n }\n }\n pub fn timestamp(_self: Self) -> u64 {\n // AVM opcodes are constrained by the AVM itself\n unsafe {\n timestamp()\n }\n }\n pub fn fee_per_l2_gas(_self: Self) -> Field {\n // AVM opcodes are constrained by the AVM itself\n unsafe {\n fee_per_l2_gas()\n }\n }\n pub fn fee_per_da_gas(_self: Self) -> Field {\n // AVM opcodes are constrained by the AVM itself\n unsafe {\n fee_per_da_gas()\n }\n }\n\n pub fn l2_gas_left(_self: Self) -> Field {\n // AVM opcodes are constrained by the AVM itself\n unsafe {\n l2_gas_left()\n }\n }\n pub fn da_gas_left(_self: Self) -> Field {\n // AVM opcodes are constrained by the AVM itself\n unsafe {\n da_gas_left()\n }\n }\n pub fn is_static_call(_self: Self) -> bool {\n // AVM opcodes are constrained by the AVM itself\n unsafe { is_static_call() } == 1\n }\n\n pub fn raw_storage_read<let N: u32>(_self: Self, storage_slot: Field) -> [Field; N] {\n let mut out = [0; N];\n for i in 0..N {\n // AVM opcodes are constrained by the AVM itself\n out[i] = unsafe { storage_read(storage_slot + i as Field) };\n }\n out\n }\n\n pub fn storage_read<T, let N: u32>(self, storage_slot: Field) -> T\n where\n T: Deserialize<N>,\n {\n T::deserialize(self.raw_storage_read(storage_slot))\n }\n\n pub fn raw_storage_write<let N: u32>(_self: Self, storage_slot: Field, values: [Field; N]) {\n for i in 0..N {\n // AVM opcodes are constrained by the AVM itself\n unsafe { storage_write(storage_slot + i as Field, values[i]) };\n }\n }\n\n pub fn storage_write<T, let N: u32>(self, storage_slot: Field, value: T)\n where\n T: Serialize<N>,\n {\n self.raw_storage_write(storage_slot, value.serialize());\n }\n}\n\n// Helper functions\nfn gas_for_call(user_gas: GasOpts) -> [Field; 2] {\n // It's ok to use the max possible gas here, because the gas will be\n // capped by the gas left in the (STATIC)CALL instruction.\n [user_gas.l2_gas.unwrap_or(MAX_FIELD_VALUE), user_gas.da_gas.unwrap_or(MAX_FIELD_VALUE)]\n}\n\n// Unconstrained opcode wrappers (do not use directly).\nunconstrained fn address() -> AztecAddress {\n address_opcode()\n}\nunconstrained fn sender() -> AztecAddress {\n sender_opcode()\n}\n// TODO(9396): Remove.\nunconstrained fn portal() -> EthAddress {\n portal_opcode()\n}\n// TODO(9396): Remove.\n//unconstrained fn function_selector() -> u32 {\n// function_selector_opcode()\n//}\nunconstrained fn transaction_fee() -> Field {\n transaction_fee_opcode()\n}\nunconstrained fn chain_id() -> Field {\n chain_id_opcode()\n}\nunconstrained fn version() -> Field {\n version_opcode()\n}\nunconstrained fn block_number() -> Field {\n block_number_opcode()\n}\nunconstrained fn timestamp() -> u64 {\n timestamp_opcode()\n}\nunconstrained fn fee_per_l2_gas() -> Field {\n fee_per_l2_gas_opcode()\n}\nunconstrained fn fee_per_da_gas() -> Field {\n fee_per_da_gas_opcode()\n}\nunconstrained fn l2_gas_left() -> Field {\n l2_gas_left_opcode()\n}\nunconstrained fn da_gas_left() -> Field {\n da_gas_left_opcode()\n}\nunconstrained fn is_static_call() -> Field {\n is_static_call_opcode()\n}\nunconstrained fn note_hash_exists(note_hash: Field, leaf_index: Field) -> u1 {\n note_hash_exists_opcode(note_hash, leaf_index)\n}\nunconstrained fn emit_note_hash(note_hash: Field) {\n emit_note_hash_opcode(note_hash)\n}\nunconstrained fn nullifier_exists(nullifier: Field, address: Field) -> u1 {\n nullifier_exists_opcode(nullifier, address)\n}\nunconstrained fn emit_nullifier(nullifier: Field) {\n emit_nullifier_opcode(nullifier)\n}\nunconstrained fn emit_unencrypted_log(message: [Field]) {\n emit_unencrypted_log_opcode(message)\n}\nunconstrained fn l1_to_l2_msg_exists(msg_hash: Field, msg_leaf_index: Field) -> u1 {\n l1_to_l2_msg_exists_opcode(msg_hash, msg_leaf_index)\n}\nunconstrained fn send_l2_to_l1_msg(recipient: EthAddress, content: Field) {\n send_l2_to_l1_msg_opcode(recipient, content)\n}\nunconstrained fn call(gas: [Field; 2], address: AztecAddress, args: [Field]) -> bool {\n call_opcode(gas, address, args)\n}\nunconstrained fn call_static(gas: [Field; 2], address: AztecAddress, args: [Field]) -> bool {\n call_static_opcode(gas, address, args)\n}\n\npub unconstrained fn calldata_copy<let N: u32>(cdoffset: u32, copy_size: u32) -> [Field; N] {\n calldata_copy_opcode(cdoffset, copy_size)\n}\n\nunconstrained fn returndata_size() -> u32 {\n returndata_size_opcode()\n}\n\nunconstrained fn returndata_copy(rdoffset: u32, copy_size: u32) -> [Field] {\n returndata_copy_opcode(rdoffset, copy_size)\n}\n\npub unconstrained fn avm_return(returndata: [Field]) {\n return_opcode(returndata)\n}\n\n// This opcode reverts using the exact data given. In general it should only be used\n// to do rethrows, where the revert data is the same as the original revert data.\n// For normal reverts, use Noir's `assert` which, on top of reverting, will also add\n// an error selector to the revert data.\nunconstrained fn avm_revert(revertdata: [Field]) {\n revert_opcode(revertdata)\n}\n\nunconstrained fn storage_read(storage_slot: Field) -> Field {\n storage_read_opcode(storage_slot)\n}\n\nunconstrained fn storage_write(storage_slot: Field, value: Field) {\n storage_write_opcode(storage_slot, value);\n}\n\nimpl Empty for PublicContext {\n fn empty() -> Self {\n PublicContext::new(|| 0)\n }\n}\n\n// AVM oracles (opcodes) follow, do not use directly.\n#[oracle(avmOpcodeAddress)]\nunconstrained fn address_opcode() -> AztecAddress {}\n\n#[oracle(avmOpcodeSender)]\nunconstrained fn sender_opcode() -> AztecAddress {}\n\n#[oracle(avmOpcodePortal)]\nunconstrained fn portal_opcode() -> EthAddress {}\n\n// TODO(9396): Remove.\n//#[oracle(avmOpcodeFunctionSelector)]\n//unconstrained fn function_selector_opcode() -> u32 {}\n\n#[oracle(avmOpcodeTransactionFee)]\nunconstrained fn transaction_fee_opcode() -> Field {}\n\n#[oracle(avmOpcodeChainId)]\nunconstrained fn chain_id_opcode() -> Field {}\n\n#[oracle(avmOpcodeVersion)]\nunconstrained fn version_opcode() -> Field {}\n\n#[oracle(avmOpcodeBlockNumber)]\nunconstrained fn block_number_opcode() -> Field {}\n\n#[oracle(avmOpcodeTimestamp)]\nunconstrained fn timestamp_opcode() -> u64 {}\n\n#[oracle(avmOpcodeFeePerL2Gas)]\nunconstrained fn fee_per_l2_gas_opcode() -> Field {}\n\n#[oracle(avmOpcodeFeePerDaGas)]\nunconstrained fn fee_per_da_gas_opcode() -> Field {}\n\n#[oracle(avmOpcodeL2GasLeft)]\nunconstrained fn l2_gas_left_opcode() -> Field {}\n\n#[oracle(avmOpcodeDaGasLeft)]\nunconstrained fn da_gas_left_opcode() -> Field {}\n\n#[oracle(avmOpcodeIsStaticCall)]\nunconstrained fn is_static_call_opcode() -> Field {}\n\n#[oracle(avmOpcodeNoteHashExists)]\nunconstrained fn note_hash_exists_opcode(note_hash: Field, leaf_index: Field) -> u1 {}\n\n#[oracle(avmOpcodeEmitNoteHash)]\nunconstrained fn emit_note_hash_opcode(note_hash: Field) {}\n\n#[oracle(avmOpcodeNullifierExists)]\nunconstrained fn nullifier_exists_opcode(nullifier: Field, address: Field) -> u1 {}\n\n#[oracle(avmOpcodeEmitNullifier)]\nunconstrained fn emit_nullifier_opcode(nullifier: Field) {}\n\n#[oracle(avmOpcodeEmitUnencryptedLog)]\nunconstrained fn emit_unencrypted_log_opcode(message: [Field]) {}\n\n#[oracle(avmOpcodeL1ToL2MsgExists)]\nunconstrained fn l1_to_l2_msg_exists_opcode(msg_hash: Field, msg_leaf_index: Field) -> u1 {}\n\n#[oracle(avmOpcodeSendL2ToL1Msg)]\nunconstrained fn send_l2_to_l1_msg_opcode(recipient: EthAddress, content: Field) {}\n\n#[oracle(avmOpcodeCalldataCopy)]\nunconstrained fn calldata_copy_opcode<let N: u32>(cdoffset: u32, copy_size: u32) -> [Field; N] {}\n\n#[oracle(avmOpcodeReturndataSize)]\nunconstrained fn returndata_size_opcode() -> u32 {}\n\n#[oracle(avmOpcodeReturndataCopy)]\nunconstrained fn returndata_copy_opcode(rdoffset: u32, copy_size: u32) -> [Field] {}\n\n#[oracle(avmOpcodeReturn)]\nunconstrained fn return_opcode(returndata: [Field]) {}\n\n// This opcode reverts using the exact data given. In general it should only be used\n// to do rethrows, where the revert data is the same as the original revert data.\n// For normal reverts, use Noir's `assert` which, on top of reverting, will also add\n// an error selector to the revert data.\n#[oracle(avmOpcodeRevert)]\nunconstrained fn revert_opcode(revertdata: [Field]) {}\n\n#[oracle(avmOpcodeCall)]\nunconstrained fn call_opcode(\n gas: [Field; 2], // gas allocation: [l2_gas, da_gas]\n address: AztecAddress,\n args: [Field],\n) -> bool {}\n\n#[oracle(avmOpcodeStaticCall)]\nunconstrained fn call_static_opcode(\n gas: [Field; 2], // gas allocation: [l2_gas, da_gas]\n address: AztecAddress,\n args: [Field],\n) -> bool {}\n\n#[oracle(avmOpcodeStorageRead)]\nunconstrained fn storage_read_opcode(storage_slot: Field) -> Field {}\n\n#[oracle(avmOpcodeStorageWrite)]\nunconstrained fn storage_write_opcode(storage_slot: Field, value: Field) {}\n"
2577
2589
  },
2578
- "111": {
2590
+ "104": {
2579
2591
  "path": "/usr/src/noir-projects/aztec-nr/aztec/src/context/packed_returns.nr",
2580
2592
  "source": "use crate::{hash::hash_args_array, oracle::returns::unpack_returns};\nuse dep::protocol_types::traits::Deserialize;\n\npub struct PackedReturns {\n packed_returns: Field,\n}\n\nimpl PackedReturns {\n pub fn new(packed_returns: Field) -> Self {\n PackedReturns { packed_returns }\n }\n\n pub fn assert_empty(self) {\n assert_eq(self.packed_returns, 0);\n }\n\n pub fn raw(self) -> Field {\n self.packed_returns\n }\n\n pub fn unpack<let N: u32>(self) -> [Field; N] {\n // We verify that the value returned by `unpack_returns` is the preimage of `packed_returns`, fully constraining\n // it.\n let unpacked: [Field; N] = unsafe { unpack_returns(self.packed_returns) };\n assert_eq(self.packed_returns, hash_args_array(unpacked));\n unpacked\n }\n\n pub fn unpack_into<T, let N: u32>(self) -> T\n where\n T: Deserialize<N>,\n {\n let unpacked: [Field; N] = self.unpack();\n Deserialize::deserialize(unpacked)\n }\n}\n"
2581
2593
  },
2582
- "112": {
2594
+ "105": {
2583
2595
  "path": "/usr/src/noir-projects/aztec-nr/aztec/src/context/call_interfaces.nr",
2584
2596
  "source": "use dep::protocol_types::{\n abis::function_selector::FunctionSelector, address::AztecAddress, traits::Deserialize,\n};\n\nuse crate::context::{gas::GasOpts, private_context::PrivateContext, public_context::PublicContext};\n\nuse crate::hash::hash_args;\nuse crate::oracle::arguments::pack_arguments;\n\npub trait CallInterface<let N: u32> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\npub struct PrivateCallInterface<let N: u32, T> {\n pub target_contract: AztecAddress,\n pub selector: FunctionSelector,\n pub name: str<N>,\n pub args_hash: Field,\n pub args: [Field],\n pub return_type: T,\n pub is_static: bool,\n}\n\nimpl<let N: u32, T> PrivateCallInterface<N, T> {\n pub fn call<let M: u32>(self, context: &mut PrivateContext) -> T\n where\n T: Deserialize<M>,\n {\n pack_arguments(self.args);\n let returns = context.call_private_function_with_packed_args(\n self.target_contract,\n self.selector,\n self.args_hash,\n false,\n );\n let unpacked: T = returns.unpack_into();\n unpacked\n }\n\n pub fn view<let M: u32>(self, context: &mut PrivateContext) -> T\n where\n T: Deserialize<M>,\n {\n pack_arguments(self.args);\n let returns = context.call_private_function_with_packed_args(\n self.target_contract,\n self.selector,\n self.args_hash,\n true,\n );\n returns.unpack_into()\n }\n}\n\nimpl<let N: u32> CallInterface<N> for PrivateVoidCallInterface<N> {}\n\npub struct PrivateVoidCallInterface<let N: u32> {\n pub target_contract: AztecAddress,\n pub selector: FunctionSelector,\n pub name: str<N>,\n pub args_hash: Field,\n pub args: [Field],\n pub return_type: (),\n pub is_static: bool,\n}\n\nimpl<let N: u32> PrivateVoidCallInterface<N> {\n pub fn call(self, context: &mut PrivateContext) {\n pack_arguments(self.args);\n context\n .call_private_function_with_packed_args(\n self.target_contract,\n self.selector,\n self.args_hash,\n false,\n )\n .assert_empty();\n }\n\n pub fn view(self, context: &mut PrivateContext) {\n pack_arguments(self.args);\n context\n .call_private_function_with_packed_args(\n self.target_contract,\n self.selector,\n self.args_hash,\n true,\n )\n .assert_empty();\n }\n}\n\nimpl<let N: u32, T> CallInterface<N> for PrivateStaticCallInterface<N, T> {}\n\npub struct PrivateStaticCallInterface<let N: u32, T> {\n pub target_contract: AztecAddress,\n pub selector: FunctionSelector,\n pub name: str<N>,\n pub args_hash: Field,\n pub args: [Field],\n pub return_type: T,\n pub is_static: bool,\n}\n\nimpl<let N: u32, T> PrivateStaticCallInterface<N, T> {\n pub fn view<let M: u32>(self, context: &mut PrivateContext) -> T\n where\n T: Deserialize<M>,\n {\n pack_arguments(self.args);\n let returns = context.call_private_function_with_packed_args(\n self.target_contract,\n self.selector,\n self.args_hash,\n true,\n );\n returns.unpack_into()\n }\n}\n\nimpl<let N: u32> CallInterface<N> for PrivateStaticVoidCallInterface<N> {}\n\npub struct PrivateStaticVoidCallInterface<let N: u32> {\n pub target_contract: AztecAddress,\n pub selector: FunctionSelector,\n pub name: str<N>,\n pub args_hash: Field,\n pub args: [Field],\n pub return_type: (),\n pub is_static: bool,\n}\n\nimpl<let N: u32> PrivateStaticVoidCallInterface<N> {\n pub fn view(self, context: &mut PrivateContext) {\n pack_arguments(self.args);\n context\n .call_private_function_with_packed_args(\n self.target_contract,\n self.selector,\n self.args_hash,\n true,\n )\n .assert_empty();\n }\n}\n\nimpl<let N: u32, T> CallInterface<N> for PublicCallInterface<N, T> {}\n\npub struct PublicCallInterface<let N: u32, T> {\n pub target_contract: AztecAddress,\n pub selector: FunctionSelector,\n pub name: str<N>,\n pub args: [Field],\n pub gas_opts: GasOpts,\n pub return_type: T,\n pub is_static: bool,\n}\n\nimpl<let N: u32, T> PublicCallInterface<N, T> {\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub unconstrained fn call<let M: u32>(self, context: &mut PublicContext) -> T\n where\n T: Deserialize<M>,\n {\n let returns = context.call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n Deserialize::deserialize(returns.as_array::<M>())\n }\n\n pub unconstrained fn view<let M: u32>(self, context: &mut PublicContext) -> T\n where\n T: Deserialize<M>,\n {\n let returns = context.static_call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n Deserialize::deserialize(returns.as_array::<M>())\n }\n\n pub fn enqueue(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n pack_arguments(self.args);\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/\n false,\n )\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n pack_arguments(self.args);\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/\n true,\n )\n }\n}\n\nimpl<let N: u32> CallInterface<N> for PublicVoidCallInterface<N> {}\n\npub struct PublicVoidCallInterface<let N: u32> {\n pub target_contract: AztecAddress,\n pub selector: FunctionSelector,\n pub name: str<N>,\n pub args: [Field],\n pub return_type: (),\n pub is_static: bool,\n pub gas_opts: GasOpts,\n}\n\nimpl<let N: u32> PublicVoidCallInterface<N> {\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub unconstrained fn call(self, context: &mut PublicContext) {\n let returns = context.call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n assert(returns.len() == 0);\n }\n\n pub unconstrained fn view(self, context: &mut PublicContext) {\n let returns = context.static_call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n assert(returns.len() == 0);\n }\n\n pub fn enqueue(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n pack_arguments(self.args);\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/\n false,\n )\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n pack_arguments(self.args);\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/\n true,\n )\n }\n}\n\nimpl<let N: u32, T> CallInterface<N> for PublicStaticCallInterface<N, T> {}\n\npub struct PublicStaticCallInterface<let N: u32, T> {\n pub target_contract: AztecAddress,\n pub selector: FunctionSelector,\n pub name: str<N>,\n pub args: [Field],\n pub return_type: T,\n pub is_static: bool,\n pub gas_opts: GasOpts,\n}\n\nimpl<let N: u32, T> PublicStaticCallInterface<N, T> {\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub unconstrained fn view<let M: u32>(self, context: &mut PublicContext) -> T\n where\n T: Deserialize<M>,\n {\n let returns = context.static_call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n Deserialize::deserialize(returns.as_array::<M>())\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n pack_arguments(self.args);\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/\n true,\n )\n }\n}\n\nimpl<let N: u32> CallInterface<N> for PublicStaticVoidCallInterface<N> {}\n\npub struct PublicStaticVoidCallInterface<let N: u32> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n return_type: (),\n is_static: bool,\n gas_opts: GasOpts,\n}\n\nimpl<let N: u32> PublicStaticVoidCallInterface<N> {\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub unconstrained fn view(self, context: &mut PublicContext) {\n let returns = context.static_call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n assert(returns.len() == 0);\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let args_hash = hash_args(self.args);\n pack_arguments(self.args);\n context.call_public_function_with_packed_args(\n self.target_contract,\n self.selector,\n args_hash,\n /*static=*/\n true,\n )\n }\n}\n"
2585
2597
  },
2586
- "127": {
2598
+ "120": {
2587
2599
  "path": "/usr/src/noir-projects/aztec-nr/aztec/src/oracle/call_private_function.nr",
2588
2600
  "source": "use dep::protocol_types::{\n abis::function_selector::FunctionSelector, address::AztecAddress, utils::reader::Reader,\n};\n\n#[oracle(callPrivateFunction)]\nunconstrained fn call_private_function_oracle(\n _contract_address: AztecAddress,\n _function_selector: FunctionSelector,\n _args_hash: Field,\n _start_side_effect_counter: u32,\n _is_static_call: bool,\n) -> [Field; 2] {}\n\npub unconstrained fn call_private_function_internal(\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n start_side_effect_counter: u32,\n is_static_call: bool,\n) -> (u32, Field) {\n let fields = call_private_function_oracle(\n contract_address,\n function_selector,\n args_hash,\n start_side_effect_counter,\n is_static_call,\n );\n\n let mut reader = Reader::new(fields);\n let end_side_effect_counter = reader.read_u32();\n let returns_hash = reader.read();\n\n (end_side_effect_counter, returns_hash)\n}\n"
2589
2601
  },
2590
- "128": {
2602
+ "121": {
2591
2603
  "path": "/usr/src/noir-projects/aztec-nr/aztec/src/oracle/notes.nr",
2592
2604
  "source": "use crate::note::{note_header::NoteHeader, note_interface::NoteInterface};\n\nuse dep::protocol_types::{\n address::AztecAddress,\n indexed_tagging_secret::{INDEXED_TAGGING_SECRET_LENGTH, IndexedTaggingSecret},\n utils::arr_copy_slice,\n};\n\n/// Notifies the simulator that a note has been created, so that it can be returned in future read requests in the same\n/// transaction. This note should only be added to the non-volatile database if found in an actual block.\npub fn notify_created_note<let N: u32>(\n storage_slot: Field,\n note_type_id: Field,\n serialized_note: [Field; N],\n note_hash: Field,\n counter: u32,\n) {\n // This oracle call returns nothing: we only call it for its side effects. It is therefore always safe to call.\n unsafe {\n notify_created_note_oracle_wrapper(\n storage_slot,\n note_type_id,\n serialized_note,\n note_hash,\n counter,\n )\n };\n}\n\n/// Notifies the simulator that a note has been nullified, so that it is no longer returned in future read requests in\n/// the same transaction. This note should only be removed to the non-volatile database if its nullifier is found in an\n/// actual block.\npub fn notify_nullified_note(nullifier: Field, note_hash: Field, counter: u32) {\n // This oracle call returns nothing: we only call it for its side effects. It is therefore always safe to call.\n unsafe { notify_nullified_note_oracle_wrapper(nullifier, note_hash, counter) };\n}\n\nunconstrained fn notify_created_note_oracle_wrapper<let N: u32>(\n storage_slot: Field,\n note_type_id: Field,\n serialized_note: [Field; N],\n note_hash: Field,\n counter: u32,\n) {\n let _ = notify_created_note_oracle(\n storage_slot,\n note_type_id,\n serialized_note,\n note_hash,\n counter,\n );\n}\n\n#[oracle(notifyCreatedNote)]\nunconstrained fn notify_created_note_oracle<let N: u32>(\n _storage_slot: Field,\n _note_type_id: Field,\n _serialized_note: [Field; N],\n _note_hash: Field,\n _counter: u32,\n) -> Field {}\n\nunconstrained fn notify_nullified_note_oracle_wrapper(\n nullifier: Field,\n note_hash: Field,\n counter: u32,\n) {\n let _ = notify_nullified_note_oracle(nullifier, note_hash, counter);\n}\n\n#[oracle(notifyNullifiedNote)]\nunconstrained fn notify_nullified_note_oracle(\n _nullifier: Field,\n _note_hash: Field,\n _counter: u32,\n) -> Field {}\n\n#[oracle(getNotes)]\nunconstrained fn get_notes_oracle<let N: u32, let S: u32>(\n _storage_slot: Field,\n _num_selects: u8,\n _select_by_indexes: [u8; N],\n _select_by_offsets: [u8; N],\n _select_by_lengths: [u8; N],\n _select_values: [Field; N],\n _select_comparators: [u8; N],\n _sort_by_indexes: [u8; N],\n _sort_by_offsets: [u8; N],\n _sort_by_lengths: [u8; N],\n _sort_order: [u8; N],\n _limit: u32,\n _offset: u32,\n _status: u8,\n _return_size: u32,\n _placeholder_fields: [Field; S],\n) -> [Field; S] {}\n\nunconstrained fn get_notes_oracle_wrapper<let N: u32, let S: u32>(\n storage_slot: Field,\n num_selects: u8,\n select_by_indexes: [u8; N],\n select_by_offsets: [u8; N],\n select_by_lengths: [u8; N],\n select_values: [Field; N],\n select_comparators: [u8; N],\n sort_by_indexes: [u8; N],\n sort_by_offsets: [u8; N],\n sort_by_lengths: [u8; N],\n sort_order: [u8; N],\n limit: u32,\n offset: u32,\n status: u8,\n mut placeholder_fields: [Field; S],\n) -> [Field; S] {\n let return_size = placeholder_fields.len() as u32;\n get_notes_oracle(\n storage_slot,\n num_selects,\n select_by_indexes,\n select_by_offsets,\n select_by_lengths,\n select_values,\n select_comparators,\n sort_by_indexes,\n sort_by_offsets,\n sort_by_lengths,\n sort_order,\n limit,\n offset,\n status,\n return_size,\n placeholder_fields,\n )\n}\n\npub unconstrained fn get_notes<Note, let N: u32, let M: u32, let S: u32, let NS: u32>(\n storage_slot: Field,\n num_selects: u8,\n select_by_indexes: [u8; M],\n select_by_offsets: [u8; M],\n select_by_lengths: [u8; M],\n select_values: [Field; M],\n select_comparators: [u8; M],\n sort_by_indexes: [u8; M],\n sort_by_offsets: [u8; M],\n sort_by_lengths: [u8; M],\n sort_order: [u8; M],\n limit: u32,\n offset: u32,\n status: u8,\n mut placeholder_opt_notes: [Option<Note>; S], // TODO: Remove it and use `limit` to initialize the note array.\n placeholder_fields: [Field; NS], // TODO: Remove it and use `limit` to initialize the note array.\n _placeholder_note_length: [Field; N], // Turbofish hack? Compiler breaks calculating read_offset unless we add this parameter\n) -> [Option<Note>; S]\nwhere\n Note: NoteInterface<N>,\n{\n sync_notes_oracle_wrapper();\n let fields = get_notes_oracle_wrapper(\n storage_slot,\n num_selects,\n select_by_indexes,\n select_by_offsets,\n select_by_lengths,\n select_values,\n select_comparators,\n sort_by_indexes,\n sort_by_offsets,\n sort_by_lengths,\n sort_order,\n limit,\n offset,\n status,\n placeholder_fields,\n );\n let num_notes = fields[0] as u32;\n let contract_address = AztecAddress::from_field(fields[1]);\n for i in 0..placeholder_opt_notes.len() {\n if i < num_notes {\n // lengths named as per typescript.\n let return_header_length: u32 = 2; // num_notes & contract_address.\n let extra_preimage_length: u32 = 2; // nonce & note_hash_counter.\n let read_offset: u32 = return_header_length + i * (N + extra_preimage_length);\n let nonce = fields[read_offset];\n let note_hash_counter = fields[read_offset + 1] as u32;\n let header = NoteHeader { contract_address, nonce, storage_slot, note_hash_counter };\n let serialized_note = arr_copy_slice(fields, [0; N], read_offset + 2);\n let mut note = Note::deserialize_content(serialized_note);\n note.set_header(header);\n placeholder_opt_notes[i] = Option::some(note);\n };\n }\n placeholder_opt_notes\n}\n\n/// Returns true if the nullifier exists. Note that a `true` value can be constrained by proving existence of the\n/// nullifier, but a `false` value should not be relied upon since other transactions may emit this nullifier before the\n/// current transaction is included in a block. While this might seem of little use at first, certain design patterns\n/// benefit from this abstraction (see e.g. `PrivateMutable`).\npub unconstrained fn check_nullifier_exists(inner_nullifier: Field) -> bool {\n check_nullifier_exists_oracle(inner_nullifier) == 1\n}\n\n#[oracle(checkNullifierExists)]\nunconstrained fn check_nullifier_exists_oracle(_inner_nullifier: Field) -> Field {}\n\n/// Same as `get_app_tagging_secret_as_sender`, except it returns the derived tag as an array of bytes, ready to be included in a\n/// log.\npub unconstrained fn get_app_tag_bytes_as_sender(\n sender: AztecAddress,\n recipient: AztecAddress,\n) -> [u8; 32] {\n let tag = get_app_tagging_secret_as_sender(sender, recipient).compute_tag(recipient);\n tag.to_be_bytes()\n}\n\n/// Returns the tagging secret for a given sender and recipient pair, siloed for the current contract address.\n/// Includes the last known index used to send a note tagged with this secret.\n/// For this to work, PXE must know the ivpsk_m of the sender.\n/// For the recipient's side, only the address is needed.\npub unconstrained fn get_app_tagging_secret_as_sender(\n sender: AztecAddress,\n recipient: AztecAddress,\n) -> IndexedTaggingSecret {\n let result = get_app_tagging_secret_as_sender_oracle(sender, recipient);\n IndexedTaggingSecret::deserialize(result)\n}\n\n#[oracle(getAppTaggingSecretAsSender)]\nunconstrained fn get_app_tagging_secret_as_sender_oracle(\n _sender: AztecAddress,\n _recipient: AztecAddress,\n) -> [Field; INDEXED_TAGGING_SECRET_LENGTH] {}\n\n/// Notifies the simulator that a tag has been used in a note, and to therefore increment the associated index so that\n/// future notes get a different tag and can be discovered by the recipient.\n/// This change should only be persisted in a non-volatile database if the tagged log is found in an actual block -\n/// otherwise e.g. a reverting transaction can cause the sender to accidentally skip indices and later produce notes\n/// that are not found by the recipient.\npub fn increment_app_tagging_secret_index_as_sender(sender: AztecAddress, recipient: AztecAddress) {\n // This oracle call returns nothing: we only call it for its side effects. It is therefore always safe to call.\n unsafe {\n increment_app_tagging_secret_index_as_sender_wrapper(sender, recipient);\n }\n}\n\nunconstrained fn increment_app_tagging_secret_index_as_sender_wrapper(\n sender: AztecAddress,\n recipient: AztecAddress,\n) {\n increment_app_tagging_secret_index_as_sender_oracle(sender, recipient);\n}\n\n#[oracle(incrementAppTaggingSecretIndexAsSender)]\nunconstrained fn increment_app_tagging_secret_index_as_sender_oracle(\n _sender: AztecAddress,\n _recipient: AztecAddress,\n) {}\n\n/// Finds new notes that may have been sent to all registered accounts in PXE in the current contract and makes them available\n/// for later querying via the `get_notes` oracle.\npub fn sync_notes() {\n // This oracle call returns nothing: we only call it for its side effects. It is therefore always safe to call.\n unsafe {\n sync_notes_oracle_wrapper();\n }\n}\n\nunconstrained fn sync_notes_oracle_wrapper() {\n sync_notes_oracle();\n}\n\n#[oracle(syncNotes)]\nunconstrained fn sync_notes_oracle() {}\n"
2593
2605
  },
2594
- "130": {
2606
+ "123": {
2595
2607
  "path": "/usr/src/noir-projects/aztec-nr/aztec/src/oracle/returns.nr",
2596
2608
  "source": "/// Notifies the simulator that `returns` will be later fetched once the function return is processed, referenced by\n/// their hash. This allows the simulator to know how to respond to this future request.\n///\n/// This is only used during private execution, since in public it is the VM itself that keeps track of return values.\npub fn pack_returns(returns: [Field]) {\n // This oracle call returns nothing: we only call it for its side effects. It is therefore always safe to call. When\n // unpacking however the caller must check that the returned value is indeed the preimage.\n unsafe { pack_returns_oracle_wrapper(returns) };\n}\n\npub unconstrained fn pack_returns_oracle_wrapper(returns: [Field]) {\n let _ = pack_returns_oracle(returns);\n}\n\npub unconstrained fn unpack_returns<let N: u32>(return_hash: Field) -> [Field; N] {\n unpack_returns_oracle(return_hash)\n}\n\n#[oracle(packReturns)]\nunconstrained fn pack_returns_oracle(_returns: [Field]) -> Field {}\n\n#[oracle(unpackReturns)]\nunconstrained fn unpack_returns_oracle<let N: u32>(_return_hash: Field) -> [Field; N] {}\n"
2597
2609
  },
2598
- "132": {
2610
+ "125": {
2599
2611
  "path": "/usr/src/noir-projects/aztec-nr/aztec/src/oracle/storage.nr",
2600
- "source": "use dep::protocol_types::{address::AztecAddress, traits::Deserialize};\n\n#[oracle(storageRead)]\nunconstrained fn storage_read_oracle<let N: u32>(\n address: Field,\n storage_slot: Field,\n block_number: Field,\n length: Field,\n) -> [Field; N] {}\n\npub unconstrained fn raw_storage_read<let N: u32>(\n address: AztecAddress,\n storage_slot: Field,\n block_number: u32,\n) -> [Field; N] {\n storage_read_oracle(\n address.to_field(),\n storage_slot,\n block_number as Field,\n N as Field,\n )\n}\n\npub unconstrained fn storage_read<T, let N: u32>(\n address: AztecAddress,\n storage_slot: Field,\n block_number: u32,\n) -> T\nwhere\n T: Deserialize<N>,\n{\n T::deserialize(raw_storage_read(address, storage_slot, block_number))\n}\n\nmod tests {\n use crate::oracle::storage::{raw_storage_read, storage_read};\n use dep::protocol_types::address::AztecAddress;\n\n use crate::test::mocks::mock_struct::MockStruct;\n use std::test::OracleMock;\n\n global address = AztecAddress::from_field(29);\n global slot = 7;\n global block_number = 17;\n\n #[test]\n unconstrained fn test_raw_storage_read() {\n let written = MockStruct { a: 13, b: 42 };\n\n let _ = OracleMock::mock(\"storageRead\").returns(written.serialize());\n\n let read: [Field; 2] = raw_storage_read(address, slot, block_number);\n assert_eq(read[0], 13);\n assert_eq(read[1], 42);\n }\n\n #[test]\n unconstrained fn test_storage_read() {\n let written = MockStruct { a: 13, b: 42 };\n\n let _ = OracleMock::mock(\"storageRead\").returns(written.serialize());\n\n let read: MockStruct = storage_read(address, slot, block_number);\n assert_eq(read.a, 13);\n assert_eq(read.b, 42);\n }\n}\n"
2612
+ "source": "use dep::protocol_types::{address::AztecAddress, traits::Deserialize};\n\n#[oracle(storageRead)]\nunconstrained fn storage_read_oracle<let N: u32>(\n address: Field,\n storage_slot: Field,\n block_number: Field,\n length: Field,\n) -> [Field; N] {}\n\npub unconstrained fn raw_storage_read<let N: u32>(\n address: AztecAddress,\n storage_slot: Field,\n block_number: u32,\n) -> [Field; N] {\n storage_read_oracle(\n address.to_field(),\n storage_slot,\n block_number as Field,\n N as Field,\n )\n}\n\npub unconstrained fn storage_read<T, let N: u32>(\n address: AztecAddress,\n storage_slot: Field,\n block_number: u32,\n) -> T\nwhere\n T: Deserialize<N>,\n{\n T::deserialize(raw_storage_read(address, storage_slot, block_number))\n}\n\nmod tests {\n use crate::oracle::storage::{raw_storage_read, storage_read};\n use dep::protocol_types::address::AztecAddress;\n\n use crate::test::mocks::mock_struct::MockStruct;\n use std::test::OracleMock;\n\n global address: AztecAddress = AztecAddress::from_field(29);\n global slot: Field = 7;\n global block_number: u32 = 17;\n\n #[test]\n unconstrained fn test_raw_storage_read() {\n let written = MockStruct { a: 13, b: 42 };\n\n let _ = OracleMock::mock(\"storageRead\").returns(written.serialize());\n\n let read: [Field; 2] = raw_storage_read(address, slot, block_number);\n assert_eq(read[0], 13);\n assert_eq(read[1], 42);\n }\n\n #[test]\n unconstrained fn test_storage_read() {\n let written = MockStruct { a: 13, b: 42 };\n\n let _ = OracleMock::mock(\"storageRead\").returns(written.serialize());\n\n let read: MockStruct = storage_read(address, slot, block_number);\n assert_eq(read.a, 13);\n assert_eq(read.b, 42);\n }\n}\n"
2601
2613
  },
2602
- "133": {
2614
+ "126": {
2603
2615
  "path": "/usr/src/noir-projects/aztec-nr/aztec/src/oracle/execution.nr",
2604
2616
  "source": "use dep::protocol_types::address::AztecAddress;\n\n#[oracle(getContractAddress)]\nunconstrained fn get_contract_address_oracle() -> AztecAddress {}\n\n#[oracle(getBlockNumber)]\nunconstrained fn get_block_number_oracle() -> u32 {}\n\n#[oracle(getChainId)]\nunconstrained fn get_chain_id_oracle() -> Field {}\n\n#[oracle(getVersion)]\nunconstrained fn get_version_oracle() -> Field {}\n\npub unconstrained fn get_contract_address() -> AztecAddress {\n get_contract_address_oracle()\n}\n\npub unconstrained fn get_block_number() -> u32 {\n get_block_number_oracle()\n}\n\npub unconstrained fn get_chain_id() -> Field {\n get_chain_id_oracle()\n}\n\npub unconstrained fn get_version() -> Field {\n get_version_oracle()\n}\n"
2605
2617
  },
2606
- "134": {
2618
+ "127": {
2607
2619
  "path": "/usr/src/noir-projects/aztec-nr/aztec/src/oracle/arguments.nr",
2608
2620
  "source": "/// Notifies the simulator that `args` will later be used at some point during execution, referenced by their hash. This\n/// allows the simulator to know how to respond to this future request.\n///\n/// This is only used during private execution, since in public it is the VM itself that keeps track of arguments.\npub fn pack_arguments(args: [Field]) {\n // This oracle call returns nothing: we only call it for its side effects. It is therefore always safe to call. When\n // unpacking however the caller must check that the returned value is indeed the preimage.\n unsafe { pack_arguments_oracle_wrapper(args) };\n}\n\n/// Same as `pack_arguments`, but using arrays instead of slices.\npub fn pack_arguments_array<let N: u32>(args: [Field; N]) {\n // This oracle call returns nothing: we only call it for its side effects. It is therefore always safe to call. When\n // unpacking however the caller must check that the returned value is indeed the preimage.\n unsafe { pack_arguments_array_oracle_wrapper(args) };\n}\n\nunconstrained fn pack_arguments_oracle_wrapper(args: [Field]) {\n let _ = pack_arguments_oracle(args);\n}\n\nunconstrained fn pack_arguments_array_oracle_wrapper<let N: u32>(args: [Field; N]) {\n let _ = pack_arguments_array_oracle(args);\n}\n\n#[oracle(packArguments)]\nunconstrained fn pack_arguments_oracle(_args: [Field]) -> Field {}\n\n#[oracle(packArgumentsArray)]\nunconstrained fn pack_arguments_array_oracle<let N: u32>(_args: [Field; N]) -> Field {}\n"
2609
2621
  },
2610
- "136": {
2622
+ "129": {
2611
2623
  "path": "/usr/src/noir-projects/aztec-nr/aztec/src/oracle/enqueue_public_function_call.nr",
2612
2624
  "source": "use dep::protocol_types::{abis::function_selector::FunctionSelector, address::AztecAddress};\n\n#[oracle(enqueuePublicFunctionCall)]\nunconstrained fn enqueue_public_function_call_oracle(\n _contract_address: AztecAddress,\n _function_selector: FunctionSelector,\n _args_hash: Field,\n _side_effect_counter: u32,\n _is_static_call: bool,\n) -> Field {}\n\npub unconstrained fn enqueue_public_function_call_internal(\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n side_effect_counter: u32,\n is_static_call: bool,\n) -> Field {\n enqueue_public_function_call_oracle(\n contract_address,\n function_selector,\n args_hash,\n side_effect_counter,\n is_static_call,\n )\n}\n\n#[oracle(setPublicTeardownFunctionCall)]\nunconstrained fn set_public_teardown_function_call_oracle(\n _contract_address: AztecAddress,\n _function_selector: FunctionSelector,\n _args_hash: Field,\n _side_effect_counter: u32,\n _is_static_call: bool,\n) -> Field {}\n\npub unconstrained fn set_public_teardown_function_call_internal(\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n side_effect_counter: u32,\n is_static_call: bool,\n) -> Field {\n set_public_teardown_function_call_oracle(\n contract_address,\n function_selector,\n args_hash,\n side_effect_counter,\n is_static_call,\n )\n}\n\npub fn notify_set_min_revertible_side_effect_counter(counter: u32) {\n unsafe { notify_set_min_revertible_side_effect_counter_oracle_wrapper(counter) };\n}\n\npub unconstrained fn notify_set_min_revertible_side_effect_counter_oracle_wrapper(counter: u32) {\n notify_set_min_revertible_side_effect_counter_oracle(counter);\n}\n\n#[oracle(notifySetMinRevertibleSideEffectCounter)]\nunconstrained fn notify_set_min_revertible_side_effect_counter_oracle(_counter: u32) {}\n"
2613
2625
  },
2614
- "158": {
2626
+ "151": {
2615
2627
  "path": "/usr/src/noir-projects/aztec-nr/aztec/src/hash.nr",
2616
2628
  "source": "use crate::utils::to_bytes::{arr_to_be_bytes_arr, str_to_be_bytes_arr};\nuse dep::protocol_types::{\n address::{AztecAddress, EthAddress},\n constants::{\n GENERATOR_INDEX__FUNCTION_ARGS, GENERATOR_INDEX__MESSAGE_NULLIFIER,\n GENERATOR_INDEX__SECRET_HASH,\n },\n hash::{poseidon2_hash_with_separator, poseidon2_hash_with_separator_slice, sha256_to_field},\n point::Point,\n traits::Hash,\n};\n\npub use dep::protocol_types::hash::{compute_siloed_nullifier, pedersen_hash};\n\npub fn pedersen_commitment<let N: u32>(inputs: [Field; N], hash_index: u32) -> Point {\n std::hash::pedersen_commitment_with_separator(inputs, hash_index)\n}\n\npub fn compute_secret_hash(secret: Field) -> Field {\n poseidon2_hash_with_separator([secret], GENERATOR_INDEX__SECRET_HASH)\n}\n\npub fn compute_unencrypted_log_hash<let N: u32>(\n contract_address: AztecAddress,\n log: [u8; N],\n) -> Field {\n let mut hash_bytes = [0; N + 36];\n // Address is converted to 32 bytes in ts\n let address_bytes: [u8; 32] = contract_address.to_field().to_be_bytes();\n for i in 0..32 {\n hash_bytes[i] = address_bytes[i];\n }\n let len_bytes: [u8; 4] = (N as Field).to_be_bytes();\n for i in 0..4 {\n hash_bytes[32 + i] = len_bytes[i];\n }\n for i in 0..N {\n hash_bytes[36 + i] = log[i];\n }\n\n sha256_to_field(hash_bytes)\n}\n\npub fn compute_l1_to_l2_message_hash(\n sender: EthAddress,\n chain_id: Field,\n recipient: AztecAddress,\n version: Field,\n content: Field,\n secret_hash: Field,\n leaf_index: Field,\n) -> Field {\n let mut hash_bytes = [0 as u8; 224];\n let sender_bytes: [u8; 32] = sender.to_field().to_be_bytes();\n let chain_id_bytes: [u8; 32] = chain_id.to_be_bytes();\n let recipient_bytes: [u8; 32] = recipient.to_field().to_be_bytes();\n let version_bytes: [u8; 32] = version.to_be_bytes();\n let content_bytes: [u8; 32] = content.to_be_bytes();\n let secret_hash_bytes: [u8; 32] = secret_hash.to_be_bytes();\n let leaf_index_bytes: [u8; 32] = leaf_index.to_be_bytes();\n\n for i in 0..32 {\n hash_bytes[i] = sender_bytes[i];\n hash_bytes[i + 32] = chain_id_bytes[i];\n hash_bytes[i + 64] = recipient_bytes[i];\n hash_bytes[i + 96] = version_bytes[i];\n hash_bytes[i + 128] = content_bytes[i];\n hash_bytes[i + 160] = secret_hash_bytes[i];\n hash_bytes[i + 192] = leaf_index_bytes[i];\n }\n\n sha256_to_field(hash_bytes)\n}\n\n// The nullifier of a l1 to l2 message is the hash of the message salted with the secret\npub fn compute_l1_to_l2_message_nullifier(message_hash: Field, secret: Field) -> Field {\n poseidon2_hash_with_separator([message_hash, secret], GENERATOR_INDEX__MESSAGE_NULLIFIER)\n}\n\npub struct ArgsHasher {\n pub fields: [Field],\n}\n\nimpl Hash for ArgsHasher {\n fn hash(self) -> Field {\n hash_args(self.fields)\n }\n}\n\nimpl ArgsHasher {\n pub fn new() -> Self {\n Self { fields: [] }\n }\n\n pub fn add(&mut self, field: Field) {\n self.fields = self.fields.push_back(field);\n }\n\n pub fn add_multiple<let N: u32>(&mut self, fields: [Field; N]) {\n for i in 0..N {\n self.fields = self.fields.push_back(fields[i]);\n }\n }\n}\n\npub fn hash_args_array<let N: u32>(args: [Field; N]) -> Field {\n if args.len() == 0 {\n 0\n } else {\n poseidon2_hash_with_separator(args, GENERATOR_INDEX__FUNCTION_ARGS)\n }\n}\n\npub fn hash_args(args: [Field]) -> Field {\n if args.len() == 0 {\n 0\n } else {\n poseidon2_hash_with_separator_slice(args, GENERATOR_INDEX__FUNCTION_ARGS)\n }\n}\n\n#[test]\nunconstrained fn compute_var_args_hash() {\n let mut input = ArgsHasher::new();\n for i in 0..100 {\n input.add(i as Field);\n }\n let hash = input.hash();\n dep::std::println(hash);\n assert(hash == 0x19b0d74feb06ebde19edd85a28986c97063e84b3b351a8b666c7cac963ce655f);\n}\n\n#[test]\nunconstrained fn compute_unenc_log_hash_array() {\n let contract_address = AztecAddress::from_field(\n 0x233a3e0df23b2b15b324194cb4a151f26c0b7333250781d34cc269d85dc334c6,\n );\n let log = [\n 0x20660de09f35f876e3e69d227b2a35166ad05f09d82d06366ec9b6f65a51fec2,\n 0x1b52bfe3b8689761916f76dc3d38aa8810860db325cd39ca611eed980091f01c,\n 0x2e559c4045c378a56ad13b9edb1e8de4e7ad3b3aa35cc7ba9ec77f7a68fa43a4,\n 0x25d0f689c4a4178a29d59306f2675824d19be6d25e44fa03b03f49c263053dd2,\n 0x2d513a722d6f352dc0961f156afdc5e31495b9f0e35cb069261a8e55e2df67fd,\n ];\n let serialized_log = arr_to_be_bytes_arr(log);\n let hash = compute_unencrypted_log_hash(contract_address, serialized_log);\n assert(hash == 0x0095b2d17ab72f4b27a341f7ac63e49ec73935ae8c9181a0ac02023eb12f3284);\n}\n\n#[test]\nunconstrained fn compute_unenc_log_hash_addr() {\n let contract_address = AztecAddress::from_field(\n 0x233a3e0df23b2b15b324194cb4a151f26c0b7333250781d34cc269d85dc334c6,\n );\n let log = AztecAddress::from_field(\n 0x26aa302d4715fd8a687453cb26d616b0768027bd54bcae56b09d908ecd9f8303,\n );\n let serialized_log: [u8; 32] = log.to_field().to_be_bytes();\n let hash = compute_unencrypted_log_hash(contract_address, serialized_log);\n assert(hash == 0x0083ab647dfb26e7ddee90a0f4209d049d4660cab42000c544b986aaa84c55a3);\n}\n\n#[test]\nunconstrained fn compute_unenc_log_hash_str() {\n let contract_address = AztecAddress::from_field(\n 0x1b401e1146c5c507962287065c81f0ef7590adae3802c533d7549d6bf0a41bd8,\n );\n let log = \"dummy\";\n let serialized_log = str_to_be_bytes_arr(log);\n let hash = compute_unencrypted_log_hash(contract_address, serialized_log);\n assert(hash == 0x00629e88ebd6374f44aa6cfe07e251ecf07213ebc7267e8f6b578ae57ffd6c20);\n}\n\n#[test]\nunconstrained fn compute_unenc_log_hash_longer_str() {\n let contract_address = AztecAddress::from_field(\n 0x1b401e1146c5c507962287065c81f0ef7590adae3802c533d7549d6bf0a41bd8,\n );\n let log = \"Hello this is a string\";\n let serialized_log = str_to_be_bytes_arr(log);\n let hash = compute_unencrypted_log_hash(contract_address, serialized_log);\n assert(hash == 0x0098637962f7d34fa202b7ffad8a07a238c5d1fd897b82a108f7f467fa73b841);\n}\n"
2617
2629
  },
2618
- "186": {
2630
+ "179": {
2619
2631
  "path": "/usr/src/noir-projects/aztec-nr/aztec/src/state_vars/public_mutable.nr",
2620
2632
  "source": "use crate::context::{PublicContext, UnconstrainedContext};\nuse crate::state_vars::storage::Storage;\nuse dep::protocol_types::traits::{Deserialize, Serialize};\n\n// docs:start:public_mutable_struct\npub struct PublicMutable<T, Context> {\n context: Context,\n storage_slot: Field,\n}\n// docs:end:public_mutable_struct\n\nimpl<T, Context, let N: u32> Storage<T, N> for PublicMutable<T, Context>\nwhere\n T: Serialize<N> + Deserialize<N>,\n{}\n\nimpl<T, Context> PublicMutable<T, Context> {\n // docs:start:public_mutable_struct_new\n pub fn new(\n // Note: Passing the contexts to new(...) just to have an interface compatible with a Map.\n context: Context,\n storage_slot: Field,\n ) -> Self {\n assert(storage_slot != 0, \"Storage slot 0 not allowed. Storage slots must start from 1.\");\n PublicMutable { context, storage_slot }\n }\n // docs:end:public_mutable_struct_new\n}\n\nimpl<T, let T_SERIALIZED_LEN: u32> PublicMutable<T, &mut PublicContext>\nwhere\n T: Serialize<T_SERIALIZED_LEN> + Deserialize<T_SERIALIZED_LEN>,\n{\n // docs:start:public_mutable_struct_read\n pub fn read(self) -> T {\n self.context.storage_read(self.storage_slot)\n }\n // docs:end:public_mutable_struct_read\n\n // docs:start:public_mutable_struct_write\n pub fn write(self, value: T) {\n self.context.storage_write(self.storage_slot, value);\n }\n // docs:end:public_mutable_struct_write\n}\n\nimpl<T, let T_SERIALIZED_LEN: u32> PublicMutable<T, UnconstrainedContext>\nwhere\n T: Deserialize<T_SERIALIZED_LEN>,\n{\n pub unconstrained fn read(self) -> T {\n self.context.storage_read(self.storage_slot)\n }\n}\n"
2621
2633
  },
2622
- "190": {
2634
+ "183": {
2623
2635
  "path": "/usr/src/noir-projects/aztec-nr/aztec/src/state_vars/map.nr",
2624
2636
  "source": "use crate::state_vars::storage::Storage;\nuse dep::protocol_types::{\n storage::map::derive_storage_slot_in_map,\n traits::{Deserialize, Serialize, ToField},\n};\n\n// docs:start:map\npub struct Map<K, V, Context> {\n context: Context,\n storage_slot: Field,\n state_var_constructor: fn(Context, Field) -> V,\n}\n// docs:end:map\n\nimpl<K, T, Context, let N: u32> Storage<T, N> for Map<K, T, Context>\nwhere\n T: Serialize<N> + Deserialize<N>,\n{}\n\nimpl<K, V, Context> Map<K, V, Context> {\n // docs:start:new\n pub fn new(\n context: Context,\n storage_slot: Field,\n state_var_constructor: fn(Context, Field) -> V,\n ) -> Self {\n assert(storage_slot != 0, \"Storage slot 0 not allowed. Storage slots must start from 1.\");\n Map { context, storage_slot, state_var_constructor }\n }\n // docs:end:new\n\n // docs:start:at\n pub fn at(self, key: K) -> V\n where\n K: ToField,\n {\n // TODO(#1204): use a generator index for the storage slot\n let derived_storage_slot = derive_storage_slot_in_map(self.storage_slot, key);\n\n let state_var_constructor = self.state_var_constructor;\n state_var_constructor(self.context, derived_storage_slot)\n }\n // docs:end:at\n}\n"
2625
2637
  },
2626
- "191": {
2638
+ "184": {
2627
2639
  "path": "/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/type_serialization.nr",
2628
2640
  "source": "use crate::traits::{Deserialize, Serialize};\n\nglobal BOOL_SERIALIZED_LEN: u32 = 1;\nglobal U8_SERIALIZED_LEN: u32 = 1;\nglobal U16_SERIALIZED_LEN: u32 = 1;\nglobal U32_SERIALIZED_LEN: u32 = 1;\nglobal U64_SERIALIZED_LEN: u32 = 1;\nglobal U128_SERIALIZED_LEN: u32 = 1;\nglobal FIELD_SERIALIZED_LEN: u32 = 1;\nglobal I8_SERIALIZED_LEN: u32 = 1;\nglobal I16_SERIALIZED_LEN: u32 = 1;\nglobal I32_SERIALIZED_LEN: u32 = 1;\nglobal I64_SERIALIZED_LEN: u32 = 1;\n\nimpl Serialize<BOOL_SERIALIZED_LEN> for bool {\n fn serialize(self) -> [Field; BOOL_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<BOOL_SERIALIZED_LEN> for bool {\n fn deserialize(fields: [Field; BOOL_SERIALIZED_LEN]) -> bool {\n fields[0] as bool\n }\n}\n\nimpl Serialize<U8_SERIALIZED_LEN> for u8 {\n fn serialize(self) -> [Field; U8_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<U8_SERIALIZED_LEN> for u8 {\n fn deserialize(fields: [Field; U8_SERIALIZED_LEN]) -> Self {\n fields[0] as u8\n }\n}\n\nimpl Serialize<U16_SERIALIZED_LEN> for u16 {\n fn serialize(self) -> [Field; U16_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<U16_SERIALIZED_LEN> for u16 {\n fn deserialize(fields: [Field; U16_SERIALIZED_LEN]) -> Self {\n fields[0] as u16\n }\n}\n\nimpl Serialize<U32_SERIALIZED_LEN> for u32 {\n fn serialize(self) -> [Field; U32_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<U32_SERIALIZED_LEN> for u32 {\n fn deserialize(fields: [Field; U32_SERIALIZED_LEN]) -> Self {\n fields[0] as u32\n }\n}\n\nimpl Serialize<U64_SERIALIZED_LEN> for u64 {\n fn serialize(self) -> [Field; U64_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<U64_SERIALIZED_LEN> for u64 {\n fn deserialize(fields: [Field; U64_SERIALIZED_LEN]) -> Self {\n fields[0] as u64\n }\n}\n\nimpl Serialize<U128_SERIALIZED_LEN> for U128 {\n fn serialize(self) -> [Field; U128_SERIALIZED_LEN] {\n [self.to_integer()]\n }\n}\n\nimpl Deserialize<U128_SERIALIZED_LEN> for U128 {\n fn deserialize(fields: [Field; U128_SERIALIZED_LEN]) -> Self {\n U128::from_integer(fields[0])\n }\n}\n\nimpl Serialize<FIELD_SERIALIZED_LEN> for Field {\n fn serialize(self) -> [Field; FIELD_SERIALIZED_LEN] {\n [self]\n }\n}\n\nimpl Deserialize<FIELD_SERIALIZED_LEN> for Field {\n fn deserialize(fields: [Field; FIELD_SERIALIZED_LEN]) -> Self {\n fields[0]\n }\n}\n\nimpl Serialize<I8_SERIALIZED_LEN> for i8 {\n fn serialize(self) -> [Field; I8_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<I8_SERIALIZED_LEN> for i8 {\n fn deserialize(fields: [Field; I8_SERIALIZED_LEN]) -> Self {\n fields[0] as i8\n }\n}\n\nimpl Serialize<I16_SERIALIZED_LEN> for i16 {\n fn serialize(self) -> [Field; I16_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<I16_SERIALIZED_LEN> for i16 {\n fn deserialize(fields: [Field; I16_SERIALIZED_LEN]) -> Self {\n fields[0] as i16\n }\n}\n\nimpl Serialize<I32_SERIALIZED_LEN> for i32 {\n fn serialize(self) -> [Field; I32_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<I32_SERIALIZED_LEN> for i32 {\n fn deserialize(fields: [Field; I32_SERIALIZED_LEN]) -> Self {\n fields[0] as i32\n }\n}\n\nimpl Serialize<I64_SERIALIZED_LEN> for i64 {\n fn serialize(self) -> [Field; I64_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<I64_SERIALIZED_LEN> for i64 {\n fn deserialize(fields: [Field; I64_SERIALIZED_LEN]) -> Self {\n fields[0] as i64\n }\n}\n\nimpl<T, let N: u32, let M: u32> Serialize<N * M> for [T; N]\nwhere\n T: Serialize<M>,\n{\n fn serialize(self) -> [Field; N * M] {\n let mut result: [Field; N * M] = std::mem::zeroed();\n let mut serialized: [Field; M] = std::mem::zeroed();\n for i in 0..N {\n serialized = self[i].serialize();\n for j in 0..M {\n result[i * M + j] = serialized[j];\n }\n }\n result\n }\n}\n\nimpl<T, let N: u32, let M: u32> Deserialize<N * M> for [T; N]\nwhere\n T: Deserialize<M>,\n{\n fn deserialize(fields: [Field; N * M]) -> Self {\n let mut reader = crate::utils::reader::Reader::new(fields);\n let mut result: [T; N] = std::mem::zeroed();\n reader.read_struct_array::<T, M, N>(Deserialize::deserialize, result)\n }\n}\n\n#[test]\nfn test_u16_serialization() {\n let a: u16 = 10;\n assert_eq(a, u16::deserialize(a.serialize()));\n}\n\n#[test]\nfn test_i8_serialization() {\n let a: i8 = -10;\n assert_eq(a, i8::deserialize(a.serialize()));\n}\n\n#[test]\nfn test_i16_serialization() {\n let a: i16 = -10;\n assert_eq(a, i16::deserialize(a.serialize()));\n}\n\n#[test]\nfn test_i32_serialization() {\n let a: i32 = -10;\n assert_eq(a, i32::deserialize(a.serialize()));\n}\n\n#[test]\nfn test_i64_serialization() {\n let a: i64 = -10;\n assert_eq(a, i64::deserialize(a.serialize()));\n}\n"
2629
2641
  },
2630
- "206": {
2642
+ "199": {
2631
2643
  "path": "/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/storage/map.nr",
2632
2644
  "source": "use crate::{hash::poseidon2_hash, traits::ToField};\n\npub fn derive_storage_slot_in_map<K>(storage_slot: Field, key: K) -> Field\nwhere\n K: ToField,\n{\n poseidon2_hash([storage_slot, key.to_field()])\n}\n\nmod test {\n use crate::{address::AztecAddress, storage::map::derive_storage_slot_in_map};\n\n #[test]\n fn test_derive_storage_slot_in_map_matches_typescript() {\n let map_slot = 0x132258fb6962c4387ba659d9556521102d227549a386d39f0b22d1890d59c2b5;\n let key = AztecAddress::from_field(\n 0x302dbc2f9b50a73283d5fb2f35bc01eae8935615817a0b4219a057b2ba8a5a3f,\n );\n\n let slot = derive_storage_slot_in_map(map_slot, key);\n\n // The following value was generated by `map_slot.test.ts`\n let slot_from_typescript =\n 0x15b9fe39449affd8b377461263e9d2b610b9ad40580553500b4e41d9cbd887ac;\n\n assert_eq(slot, slot_from_typescript);\n }\n}\n"
2633
2645
  },
2634
- "211": {
2646
+ "204": {
2635
2647
  "path": "/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/address/aztec_address.nr",
2636
- "source": "use crate::{\n abis::function_selector::FunctionSelector,\n address::{\n partial_address::PartialAddress, salted_initialization_hash::SaltedInitializationHash,\n },\n constants::{\n AZTEC_ADDRESS_LENGTH, FUNCTION_TREE_HEIGHT, GENERATOR_INDEX__CONTRACT_ADDRESS_V1,\n MAX_FIELD_VALUE,\n },\n contract_class_id::ContractClassId,\n hash::{poseidon2_hash_with_separator, private_functions_root_from_siblings},\n merkle_tree::membership::MembershipWitness,\n public_keys::{IvpkM, NpkM, OvpkM, PublicKeys, TpkM},\n traits::{Deserialize, Empty, FromField, Serialize, ToField},\n utils,\n};\n\n// We do below because `use crate::point::Point;` does not work\nuse dep::std::embedded_curve_ops::EmbeddedCurvePoint as Point;\n\nuse crate::public_keys::AddressPoint;\nuse std::{\n ec::{pow, sqrt},\n embedded_curve_ops::{EmbeddedCurveScalar, fixed_base_scalar_mul as derive_public_key},\n};\n\n// Aztec address\npub struct AztecAddress {\n pub inner: Field,\n}\n\nimpl Eq for AztecAddress {\n fn eq(self, other: Self) -> bool {\n self.to_field() == other.to_field()\n }\n}\n\nimpl Empty for AztecAddress {\n fn empty() -> Self {\n Self { inner: 0 }\n }\n}\n\nimpl ToField for AztecAddress {\n fn to_field(self) -> Field {\n self.inner\n }\n}\n\nimpl FromField for AztecAddress {\n fn from_field(value: Field) -> AztecAddress {\n AztecAddress { inner: value }\n }\n}\n\nimpl Serialize<AZTEC_ADDRESS_LENGTH> for AztecAddress {\n fn serialize(self: Self) -> [Field; AZTEC_ADDRESS_LENGTH] {\n [self.to_field()]\n }\n}\n\nimpl Deserialize<AZTEC_ADDRESS_LENGTH> for AztecAddress {\n fn deserialize(fields: [Field; AZTEC_ADDRESS_LENGTH]) -> Self {\n FromField::from_field(fields[0])\n }\n}\n\nimpl AztecAddress {\n pub fn zero() -> Self {\n Self { inner: 0 }\n }\n\n pub fn to_address_point(self) -> AddressPoint {\n // We compute the address point by taking our address, setting it to x, and then solving for y in the\n // equation which defines our bn curve:\n // y^2 = x^3 - 17; x = address\n let x = self.inner;\n let y_squared = pow(x, 3) - 17;\n\n // TODO (#8970): Handle cases where we cannot recover a point from an address\n let mut y = sqrt(y_squared);\n\n // If we get a negative y coordinate (any y where y > MAX_FIELD_VALUE / 2), we pin it to the\n // positive one (any value where y <= MAX_FIELD_VALUE / 2) by subtracting it from the Field modulus\n // note: The field modulus is MAX_FIELD_VALUE + 1\n if (!(y.lt(MAX_FIELD_VALUE / 2) | y.eq(MAX_FIELD_VALUE / 2))) {\n y = (MAX_FIELD_VALUE + 1) - y;\n }\n\n AddressPoint { inner: Point { x: self.inner, y, is_infinite: false } }\n }\n\n pub fn compute(public_keys: PublicKeys, partial_address: PartialAddress) -> AztecAddress {\n let public_keys_hash = public_keys.hash();\n\n let pre_address = poseidon2_hash_with_separator(\n [public_keys_hash.to_field(), partial_address.to_field()],\n GENERATOR_INDEX__CONTRACT_ADDRESS_V1,\n );\n\n let address_point = derive_public_key(EmbeddedCurveScalar::from_field(pre_address)).add(\n public_keys.ivpk_m.to_point(),\n );\n\n // Note that our address is only the x-coordinate of the full address_point. This is okay because when people want to encrypt something and send it to us\n // they can recover our full point using the x-coordinate (our address itself). To do this, they recompute the y-coordinate according to the equation y^2 = x^3 - 17.\n // When they do this, they may get a positive y-coordinate (a value that is less than or equal to MAX_FIELD_VALUE / 2) or\n // a negative y-coordinate (a value that is more than MAX_FIELD_VALUE), and we cannot dictate which one they get and hence the recovered point may sometimes be different than the one\n // our secrect can decrypt. Regardless though, they should and will always encrypt using point with the positive y-coordinate by convention.\n // This ensures that everyone encrypts to the same point given an arbitrary x-coordinate (address). This is allowed because even though our original point may not have a positive y-coordinate,\n // with our original secret, we will be able to derive the secret to the point with the flipped (and now positive) y-coordinate that everyone encrypts to.\n AztecAddress::from_field(address_point.x)\n }\n\n pub fn compute_from_private_function(\n function_selector: FunctionSelector,\n function_vk_hash: Field,\n function_leaf_membership_witness: MembershipWitness<FUNCTION_TREE_HEIGHT>,\n contract_class_artifact_hash: Field,\n contract_class_public_bytecode_commitment: Field,\n salted_initialization_hash: SaltedInitializationHash,\n public_keys: PublicKeys,\n ) -> Self {\n let private_functions_root = private_functions_root_from_siblings(\n function_selector,\n function_vk_hash,\n function_leaf_membership_witness.leaf_index,\n function_leaf_membership_witness.sibling_path,\n );\n\n let contract_class_id = ContractClassId::compute(\n contract_class_artifact_hash,\n private_functions_root,\n contract_class_public_bytecode_commitment,\n );\n\n // Compute contract address using the preimage which includes the class_id.\n let partial_address = PartialAddress::compute_from_salted_initialization_hash(\n contract_class_id,\n salted_initialization_hash,\n );\n\n AztecAddress::compute(public_keys, partial_address)\n }\n\n pub fn is_zero(self) -> bool {\n self.inner == 0\n }\n\n pub fn assert_is_zero(self) {\n assert(self.to_field() == 0);\n }\n\n pub fn conditional_assign(predicate: bool, lhs: Self, rhs: Self) -> Self {\n let result = utils::conditional_assign(predicate, rhs.to_field(), lhs.to_field());\n Self { inner: result }\n }\n}\n\n#[test]\nfn compute_address_from_partial_and_pub_keys() {\n let public_keys = PublicKeys {\n npk_m: NpkM {\n inner: Point {\n x: 0x22f7fcddfa3ce3e8f0cc8e82d7b94cdd740afa3e77f8e4a63ea78a239432dcab,\n y: 0x0471657de2b6216ade6c506d28fbc22ba8b8ed95c871ad9f3e3984e90d9723a7,\n is_infinite: false,\n },\n },\n ivpk_m: IvpkM {\n inner: Point {\n x: 0x111223493147f6785514b1c195bb37a2589f22a6596d30bb2bb145fdc9ca8f1e,\n y: 0x273bbffd678edce8fe30e0deafc4f66d58357c06fd4a820285294b9746c3be95,\n is_infinite: false,\n },\n },\n ovpk_m: OvpkM {\n inner: Point {\n x: 0x09115c96e962322ffed6522f57194627136b8d03ac7469109707f5e44190c484,\n y: 0x0c49773308a13d740a7f0d4f0e6163b02c5a408b6f965856b6a491002d073d5b,\n is_infinite: false,\n },\n },\n tpk_m: TpkM {\n inner: Point {\n x: 0x00d3d81beb009873eb7116327cf47c612d5758ef083d4fda78e9b63980b2a762,\n y: 0x2f567d22d2b02fe1f4ad42db9d58a36afd1983e7e2909d1cab61cafedad6193a,\n is_infinite: false,\n },\n },\n };\n\n let partial_address = PartialAddress::from_field(\n 0x0a7c585381b10f4666044266a02405bf6e01fa564c8517d4ad5823493abd31de,\n );\n\n let address = AztecAddress::compute(public_keys, partial_address);\n\n // The following value was generated by `derivation.test.ts`.\n // --> Run the test with AZTEC_GENERATE_TEST_DATA=1 flag to update test data.\n let expected_computed_address_from_partial_and_pubkeys =\n 0x24e4646f58b9fbe7d38e317db8d5636c423fbbdfbe119fc190fe9c64747e0c62;\n assert(address.to_field() == expected_computed_address_from_partial_and_pubkeys);\n}\n\n#[test]\nfn from_field_to_field() {\n let address = AztecAddress { inner: 37 };\n assert_eq(FromField::from_field(address.to_field()), address);\n}\n\n#[test]\nfn serde() {\n let address = AztecAddress { inner: 37 };\n assert_eq(Deserialize::deserialize(address.serialize()), address);\n}\n"
2648
+ "source": "use crate::{\n abis::function_selector::FunctionSelector,\n address::{\n partial_address::PartialAddress, salted_initialization_hash::SaltedInitializationHash,\n },\n constants::{\n AZTEC_ADDRESS_LENGTH, FUNCTION_TREE_HEIGHT, GENERATOR_INDEX__CONTRACT_ADDRESS_V1,\n MAX_FIELD_VALUE,\n },\n contract_class_id::ContractClassId,\n hash::{poseidon2_hash_with_separator, private_functions_root_from_siblings},\n merkle_tree::membership::MembershipWitness,\n public_keys::{IvpkM, NpkM, OvpkM, PublicKeys, TpkM},\n traits::{Deserialize, Empty, FromField, Serialize, ToField},\n utils,\n};\n\n// We do below because `use crate::point::Point;` does not work\nuse dep::std::embedded_curve_ops::EmbeddedCurvePoint as Point;\n\nuse crate::public_keys::AddressPoint;\nuse ec::{pow, sqrt};\nuse std::embedded_curve_ops::{EmbeddedCurveScalar, fixed_base_scalar_mul as derive_public_key};\n\n// Aztec address\npub struct AztecAddress {\n pub inner: Field,\n}\n\nimpl Eq for AztecAddress {\n fn eq(self, other: Self) -> bool {\n self.to_field() == other.to_field()\n }\n}\n\nimpl Empty for AztecAddress {\n fn empty() -> Self {\n Self { inner: 0 }\n }\n}\n\nimpl ToField for AztecAddress {\n fn to_field(self) -> Field {\n self.inner\n }\n}\n\nimpl FromField for AztecAddress {\n fn from_field(value: Field) -> AztecAddress {\n AztecAddress { inner: value }\n }\n}\n\nimpl Serialize<AZTEC_ADDRESS_LENGTH> for AztecAddress {\n fn serialize(self: Self) -> [Field; AZTEC_ADDRESS_LENGTH] {\n [self.to_field()]\n }\n}\n\nimpl Deserialize<AZTEC_ADDRESS_LENGTH> for AztecAddress {\n fn deserialize(fields: [Field; AZTEC_ADDRESS_LENGTH]) -> Self {\n FromField::from_field(fields[0])\n }\n}\n\nimpl AztecAddress {\n pub fn zero() -> Self {\n Self { inner: 0 }\n }\n\n pub fn to_address_point(self) -> AddressPoint {\n // We compute the address point by taking our address, setting it to x, and then solving for y in the\n // equation which defines our bn curve:\n // y^2 = x^3 - 17; x = address\n let x = self.inner;\n let y_squared = pow(x, 3) - 17;\n\n // TODO (#8970): Handle cases where we cannot recover a point from an address\n let mut y = sqrt(y_squared);\n\n // If we get a negative y coordinate (any y where y > MAX_FIELD_VALUE / 2), we pin it to the\n // positive one (any value where y <= MAX_FIELD_VALUE / 2) by subtracting it from the Field modulus\n // note: The field modulus is MAX_FIELD_VALUE + 1\n if (!(y.lt(MAX_FIELD_VALUE / 2) | y.eq(MAX_FIELD_VALUE / 2))) {\n y = (MAX_FIELD_VALUE + 1) - y;\n }\n\n AddressPoint { inner: Point { x: self.inner, y, is_infinite: false } }\n }\n\n pub fn compute(public_keys: PublicKeys, partial_address: PartialAddress) -> AztecAddress {\n let public_keys_hash = public_keys.hash();\n\n let pre_address = poseidon2_hash_with_separator(\n [public_keys_hash.to_field(), partial_address.to_field()],\n GENERATOR_INDEX__CONTRACT_ADDRESS_V1,\n );\n\n let address_point = derive_public_key(EmbeddedCurveScalar::from_field(pre_address)).add(\n public_keys.ivpk_m.to_point(),\n );\n\n // Note that our address is only the x-coordinate of the full address_point. This is okay because when people want to encrypt something and send it to us\n // they can recover our full point using the x-coordinate (our address itself). To do this, they recompute the y-coordinate according to the equation y^2 = x^3 - 17.\n // When they do this, they may get a positive y-coordinate (a value that is less than or equal to MAX_FIELD_VALUE / 2) or\n // a negative y-coordinate (a value that is more than MAX_FIELD_VALUE), and we cannot dictate which one they get and hence the recovered point may sometimes be different than the one\n // our secrect can decrypt. Regardless though, they should and will always encrypt using point with the positive y-coordinate by convention.\n // This ensures that everyone encrypts to the same point given an arbitrary x-coordinate (address). This is allowed because even though our original point may not have a positive y-coordinate,\n // with our original secret, we will be able to derive the secret to the point with the flipped (and now positive) y-coordinate that everyone encrypts to.\n AztecAddress::from_field(address_point.x)\n }\n\n pub fn compute_from_private_function(\n function_selector: FunctionSelector,\n function_vk_hash: Field,\n function_leaf_membership_witness: MembershipWitness<FUNCTION_TREE_HEIGHT>,\n contract_class_artifact_hash: Field,\n contract_class_public_bytecode_commitment: Field,\n salted_initialization_hash: SaltedInitializationHash,\n public_keys: PublicKeys,\n ) -> Self {\n let private_functions_root = private_functions_root_from_siblings(\n function_selector,\n function_vk_hash,\n function_leaf_membership_witness.leaf_index,\n function_leaf_membership_witness.sibling_path,\n );\n\n let contract_class_id = ContractClassId::compute(\n contract_class_artifact_hash,\n private_functions_root,\n contract_class_public_bytecode_commitment,\n );\n\n // Compute contract address using the preimage which includes the class_id.\n let partial_address = PartialAddress::compute_from_salted_initialization_hash(\n contract_class_id,\n salted_initialization_hash,\n );\n\n AztecAddress::compute(public_keys, partial_address)\n }\n\n pub fn is_zero(self) -> bool {\n self.inner == 0\n }\n\n pub fn assert_is_zero(self) {\n assert(self.to_field() == 0);\n }\n\n pub fn conditional_assign(predicate: bool, lhs: Self, rhs: Self) -> Self {\n let result = utils::conditional_assign(predicate, rhs.to_field(), lhs.to_field());\n Self { inner: result }\n }\n}\n\n#[test]\nfn compute_address_from_partial_and_pub_keys() {\n let public_keys = PublicKeys {\n npk_m: NpkM {\n inner: Point {\n x: 0x22f7fcddfa3ce3e8f0cc8e82d7b94cdd740afa3e77f8e4a63ea78a239432dcab,\n y: 0x0471657de2b6216ade6c506d28fbc22ba8b8ed95c871ad9f3e3984e90d9723a7,\n is_infinite: false,\n },\n },\n ivpk_m: IvpkM {\n inner: Point {\n x: 0x111223493147f6785514b1c195bb37a2589f22a6596d30bb2bb145fdc9ca8f1e,\n y: 0x273bbffd678edce8fe30e0deafc4f66d58357c06fd4a820285294b9746c3be95,\n is_infinite: false,\n },\n },\n ovpk_m: OvpkM {\n inner: Point {\n x: 0x09115c96e962322ffed6522f57194627136b8d03ac7469109707f5e44190c484,\n y: 0x0c49773308a13d740a7f0d4f0e6163b02c5a408b6f965856b6a491002d073d5b,\n is_infinite: false,\n },\n },\n tpk_m: TpkM {\n inner: Point {\n x: 0x00d3d81beb009873eb7116327cf47c612d5758ef083d4fda78e9b63980b2a762,\n y: 0x2f567d22d2b02fe1f4ad42db9d58a36afd1983e7e2909d1cab61cafedad6193a,\n is_infinite: false,\n },\n },\n };\n\n let partial_address = PartialAddress::from_field(\n 0x0a7c585381b10f4666044266a02405bf6e01fa564c8517d4ad5823493abd31de,\n );\n\n let address = AztecAddress::compute(public_keys, partial_address);\n\n // The following value was generated by `derivation.test.ts`.\n // --> Run the test with AZTEC_GENERATE_TEST_DATA=1 flag to update test data.\n let expected_computed_address_from_partial_and_pubkeys =\n 0x24e4646f58b9fbe7d38e317db8d5636c423fbbdfbe119fc190fe9c64747e0c62;\n assert(address.to_field() == expected_computed_address_from_partial_and_pubkeys);\n}\n\n#[test]\nfn compute_preaddress_from_partial_and_pub_keys() {\n let pre_address = poseidon2_hash_with_separator([1, 2], GENERATOR_INDEX__CONTRACT_ADDRESS_V1);\n let expected_computed_preaddress_from_partial_and_pubkey =\n 0x23ce9be3fa3c846b0f9245cc796902e731d04f086e8a42473bb29e405fc98075;\n assert(pre_address == expected_computed_preaddress_from_partial_and_pubkey);\n}\n\n#[test]\nfn from_field_to_field() {\n let address = AztecAddress { inner: 37 };\n assert_eq(FromField::from_field(address.to_field()), address);\n}\n\n#[test]\nfn serde() {\n let address = AztecAddress { inner: 37 };\n assert_eq(Deserialize::deserialize(address.serialize()), address);\n}\n"
2637
2649
  },
2638
- "236": {
2650
+ "229": {
2639
2651
  "path": "/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/hash.nr",
2640
2652
  "source": "use crate::{\n abis::{\n contract_class_function_leaf_preimage::ContractClassFunctionLeafPreimage,\n function_selector::FunctionSelector,\n log_hash::{LogHash, ScopedEncryptedLogHash, ScopedLogHash},\n note_hash::ScopedNoteHash,\n nullifier::ScopedNullifier,\n },\n address::{AztecAddress, EthAddress},\n constants::{\n FUNCTION_TREE_HEIGHT, GENERATOR_INDEX__NOTE_HASH_NONCE, GENERATOR_INDEX__OUTER_NULLIFIER,\n GENERATOR_INDEX__SILOED_NOTE_HASH, GENERATOR_INDEX__UNIQUE_NOTE_HASH,\n },\n merkle_tree::root::root_from_sibling_path,\n messaging::l2_to_l1_message::{L2ToL1Message, ScopedL2ToL1Message},\n traits::{is_empty, ToField},\n utils::field::field_from_bytes_32_trunc,\n};\nuse super::utils::field::field_from_bytes;\n\npub fn sha256_to_field<let N: u32>(bytes_to_hash: [u8; N]) -> Field {\n let sha256_hashed = std::hash::sha256(bytes_to_hash);\n let hash_in_a_field = field_from_bytes_32_trunc(sha256_hashed);\n\n hash_in_a_field\n}\n\npub fn private_functions_root_from_siblings(\n selector: FunctionSelector,\n vk_hash: Field,\n function_leaf_index: Field,\n function_leaf_sibling_path: [Field; FUNCTION_TREE_HEIGHT],\n) -> Field {\n let function_leaf_preimage = ContractClassFunctionLeafPreimage { selector, vk_hash };\n let function_leaf = function_leaf_preimage.hash();\n root_from_sibling_path(\n function_leaf,\n function_leaf_index,\n function_leaf_sibling_path,\n )\n}\n\nfn compute_note_hash_nonce(tx_hash: Field, note_index_in_tx: u32) -> Field {\n // Hashing tx hash with note index in tx is guaranteed to be unique\n poseidon2_hash_with_separator(\n [tx_hash, note_index_in_tx as Field],\n GENERATOR_INDEX__NOTE_HASH_NONCE,\n )\n}\n\npub fn compute_unique_note_hash(nonce: Field, note_hash: Field) -> Field {\n let inputs = [nonce, note_hash];\n poseidon2_hash_with_separator(inputs, GENERATOR_INDEX__UNIQUE_NOTE_HASH)\n}\n\npub fn compute_siloed_note_hash(app: AztecAddress, unique_note_hash: Field) -> Field {\n poseidon2_hash_with_separator(\n [app.to_field(), unique_note_hash],\n GENERATOR_INDEX__SILOED_NOTE_HASH,\n )\n}\n\n/// Siloing in the context of Aztec refers to the process of hashing a note hash with a contract address (this way\n/// the note hash is scoped to a specific contract). This is used to prevent intermingling of notes between contracts.\npub fn silo_note_hash(note_hash: ScopedNoteHash, tx_hash: Field, note_index_in_tx: u32) -> Field {\n if note_hash.contract_address.is_zero() {\n 0\n } else {\n let nonce = compute_note_hash_nonce(tx_hash, note_index_in_tx);\n let unique_note_hash = compute_unique_note_hash(nonce, note_hash.value());\n compute_siloed_note_hash(note_hash.contract_address, unique_note_hash)\n }\n}\n\npub fn compute_siloed_nullifier(app: AztecAddress, nullifier: Field) -> Field {\n poseidon2_hash_with_separator(\n [app.to_field(), nullifier],\n GENERATOR_INDEX__OUTER_NULLIFIER,\n )\n}\n\npub fn silo_nullifier(nullifier: ScopedNullifier) -> Field {\n if nullifier.contract_address.is_zero() {\n nullifier.value() // Return value instead of 0 because the first nullifier's contract address is zero.\n } else {\n compute_siloed_nullifier(nullifier.contract_address, nullifier.value())\n }\n}\n\npub fn silo_encrypted_log_hash(log_hash: ScopedLogHash) -> Field {\n // We assume contract address has already been masked\n if log_hash.contract_address.is_zero() {\n 0\n } else {\n accumulate_sha256(\n [log_hash.contract_address.to_field(), log_hash.log_hash.value],\n )\n }\n}\n\npub fn mask_encrypted_log_hash(scoped_log: ScopedEncryptedLogHash) -> AztecAddress {\n if scoped_log.contract_address.is_zero() {\n AztecAddress::from_field(0)\n } else if (scoped_log.log_hash.randomness == 0) {\n scoped_log.contract_address\n } else {\n AztecAddress::from_field(poseidon2_hash_with_separator(\n [scoped_log.contract_address.to_field(), scoped_log.log_hash.randomness],\n 0,\n ))\n }\n}\n\nfn compute_siloed_unencrypted_log_hash(address: AztecAddress, log_hash: Field) -> Field {\n accumulate_sha256([address.to_field(), log_hash])\n}\n\npub fn silo_unencrypted_log_hash(log_hash: ScopedLogHash) -> Field {\n if log_hash.contract_address.is_zero() {\n 0\n } else {\n compute_siloed_unencrypted_log_hash(log_hash.contract_address, log_hash.value())\n }\n}\n\npub fn merkle_hash(left: Field, right: Field) -> Field {\n poseidon2_hash([left, right])\n}\n\npub fn compute_l2_to_l1_hash(\n contract_address: AztecAddress,\n recipient: EthAddress,\n content: Field,\n rollup_version_id: Field,\n chain_id: Field,\n) -> Field {\n let mut bytes: BoundedVec<u8, 160> = BoundedVec::new();\n\n let inputs =\n [contract_address.to_field(), rollup_version_id, recipient.to_field(), chain_id, content];\n for i in 0..inputs.len() {\n // TODO are bytes be in fr.to_buffer() ?\n let item_bytes: [u8; 32] = inputs[i].to_be_bytes();\n for j in 0..32 {\n bytes.push(item_bytes[j]);\n }\n }\n\n sha256_to_field(bytes.storage())\n}\n\npub fn silo_l2_to_l1_message(\n msg: ScopedL2ToL1Message,\n rollup_version_id: Field,\n chain_id: Field,\n) -> Field {\n if msg.contract_address.is_zero() {\n 0\n } else {\n compute_l2_to_l1_hash(\n msg.contract_address,\n msg.message.recipient,\n msg.message.content,\n rollup_version_id,\n chain_id,\n )\n }\n}\n\n// Computes sha256 hash of 2 input hashes.\n//\n// NB: This method now takes in two 31 byte fields - it assumes that any input\n// is the result of a sha_to_field hash and => is truncated\n//\n// TODO(Jan and David): This is used for the encrypted_log hashes.\n// Can we check to see if we can just use hash_to_field or pedersen_compress here?\n//\npub fn accumulate_sha256(input: [Field; 2]) -> Field {\n // This is a note about the cpp code, since it takes an array of Fields\n // instead of a U128.\n // 4 Field elements when converted to bytes will usually\n // occupy 4 * 32 = 128 bytes.\n // However, this function is making the assumption that each Field\n // only occupies 128 bits.\n //\n // TODO(David): This does not seem to be getting guaranteed anywhere in the code?\n // Concatentate two fields into 32x2 = 64 bytes\n // accumulate_sha256 assumes that the inputs are pre-truncated 31 byte numbers\n let mut hash_input_flattened = [0; 64];\n for offset in 0..input.len() {\n let input_as_bytes: [u8; 32] = input[offset].to_be_bytes();\n for byte_index in 0..32 {\n hash_input_flattened[offset * 32 + byte_index] = input_as_bytes[byte_index];\n }\n }\n\n sha256_to_field(hash_input_flattened)\n}\n\n// Computes the final logs hash for a tx.\npub fn compute_tx_logs_hash<let N: u32>(logs: [LogHash; N]) -> Field {\n // Convert each field element into a byte array and append the bytes to `hash_input_flattened`\n let mut hash_input_flattened = [0; N * 32];\n for offset in 0..N {\n // TODO: This is not checking that the decomposition is smaller than P\n let input_as_bytes: [u8; 32] = logs[offset].value.to_be_radix(256);\n for byte_index in 0..32 {\n hash_input_flattened[offset * 32 + byte_index] = input_as_bytes[byte_index];\n }\n }\n // Ideally we would push to a slice then hash, but there is no sha_slice\n // Hardcode to 256 bytes for now\n let mut hash = sha256_to_field(hash_input_flattened);\n // Not having a 0 value hash for empty logs causes issues with empty txs\n // used for padding. Returning early is currently unsupported.\n // We always provide sorted logs here, so 0 being empty means all are empty.\n if is_empty(logs[0]) {\n hash = 0;\n }\n hash\n}\n\npub fn verification_key_hash<let N: u32>(key: [Field; N]) -> Field {\n crate::hash::poseidon2_hash(key)\n}\n\n#[inline_always]\npub fn pedersen_hash<let N: u32>(inputs: [Field; N], hash_index: u32) -> Field {\n std::hash::pedersen_hash_with_separator(inputs, hash_index)\n}\n\npub fn poseidon2_hash<let N: u32>(inputs: [Field; N]) -> Field {\n std::hash::poseidon2::Poseidon2::hash(inputs, N)\n}\n\n#[no_predicates]\npub fn poseidon2_hash_with_separator<let N: u32, T>(inputs: [Field; N], separator: T) -> Field\nwhere\n T: ToField,\n{\n // We manually hash the inputs here, since we cannot express with the type system a constant size inputs array of N + 1\n let in_len = N + 1;\n let two_pow_64 = 18446744073709551616;\n let iv: Field = (in_len as Field) * two_pow_64;\n let mut sponge = std::hash::poseidon2::Poseidon2::new(iv);\n sponge.absorb(separator.to_field());\n\n for i in 0..inputs.len() {\n sponge.absorb(inputs[i]);\n }\n\n sponge.squeeze()\n}\n\npub fn poseidon2_hash_with_separator_slice<T>(inputs: [Field], separator: T) -> Field\nwhere\n T: ToField,\n{\n let in_len = inputs.len() + 1;\n let two_pow_64 = 18446744073709551616;\n let iv: Field = (in_len as Field) * two_pow_64;\n let mut sponge = std::hash::poseidon2::Poseidon2::new(iv);\n sponge.absorb(separator.to_field());\n\n for i in 0..inputs.len() {\n sponge.absorb(inputs[i]);\n }\n\n sponge.squeeze()\n}\n\n#[no_predicates]\npub fn poseidon2_hash_bytes<let N: u32>(inputs: [u8; N]) -> Field {\n // We manually hash the inputs here, since we cannot express with the type system a constant size inputs array of Math.ceil(N/31)\n let mut in_len = N / 31;\n let mut has_padding = false;\n if N % 31 != 0 {\n in_len += 1;\n has_padding = true;\n }\n\n let two_pow_64 = 18446744073709551616;\n let iv: Field = (in_len as Field) * two_pow_64;\n let mut sponge = std::hash::poseidon2::Poseidon2::new(iv);\n\n let mut current_field = [0; 31];\n for i in 0..inputs.len() {\n let index = i % 31;\n current_field[index] = inputs[i];\n if index == 30 {\n sponge.absorb(field_from_bytes(current_field, false));\n current_field = [0; 31];\n }\n }\n if has_padding {\n sponge.absorb(field_from_bytes(current_field, false));\n }\n\n sponge.squeeze()\n}\n\n#[test]\nfn smoke_sha256_to_field() {\n let full_buffer = [\n 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24,\n 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47,\n 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70,\n 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93,\n 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112,\n 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130,\n 131, 132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145, 146, 147, 148,\n 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159,\n ];\n let result = sha256_to_field(full_buffer);\n\n assert(result == 0x448ebbc9e1a31220a2f3830c18eef61b9bd070e5084b7fa2a359fe729184c7);\n\n // to show correctness of the current ver (truncate one byte) vs old ver (mod full bytes):\n let result_bytes = std::hash::sha256(full_buffer);\n let truncated_field = crate::utils::field::field_from_bytes_32_trunc(result_bytes);\n assert(truncated_field == result);\n let mod_res = result + (result_bytes[31] as Field);\n assert(mod_res == 0x448ebbc9e1a31220a2f3830c18eef61b9bd070e5084b7fa2a359fe729184e0);\n}\n\n#[test]\nfn compute_l2_l1_hash() {\n // All zeroes\n let hash_result =\n compute_l2_to_l1_hash(AztecAddress::from_field(0), EthAddress::zero(), 0, 0, 0);\n assert(hash_result == 0xb393978842a0fa3d3e1470196f098f473f9678e72463cb65ec4ab5581856c2);\n\n // Non-zero case\n let hash_result = compute_l2_to_l1_hash(\n AztecAddress::from_field(1),\n EthAddress::from_field(3),\n 5,\n 2,\n 4,\n );\n assert(hash_result == 0x3f88c1044a05e5340ed20466276500f6d45ca5603913b9091e957161734e16);\n}\n\n#[test]\nfn silo_l2_to_l1_message_matches_typescript() {\n let version = 4;\n let chainId = 5;\n\n let hash = silo_l2_to_l1_message(\n ScopedL2ToL1Message {\n message: L2ToL1Message { recipient: EthAddress::from_field(1), content: 2, counter: 0 },\n contract_address: AztecAddress::from_field(3),\n },\n version,\n chainId,\n );\n\n // The following value was generated by `l2_to_l1_message.test.ts`\n let hash_from_typescript = 0x00c6155d69febb9d5039b374dd4f77bf57b7c881709aa524a18acaa0bd57476a;\n\n assert_eq(hash, hash_from_typescript);\n}\n"
2641
2653
  },
2642
- "320": {
2654
+ "313": {
2643
2655
  "path": "/usr/src/noir-projects/noir-protocol-circuits/crates/types/src/utils/reader.nr",
2644
2656
  "source": "pub struct Reader<let N: u32> {\n data: [Field; N],\n offset: u32,\n}\n\nimpl<let N: u32> Reader<N> {\n pub fn new(data: [Field; N]) -> Self {\n Self { data, offset: 0 }\n }\n\n pub fn read(&mut self) -> Field {\n let result = self.data[self.offset];\n self.offset += 1;\n result\n }\n\n pub fn read_u32(&mut self) -> u32 {\n self.read() as u32\n }\n\n pub fn read_bool(&mut self) -> bool {\n self.read() as bool\n }\n\n pub fn read_array<let K: u32>(&mut self) -> [Field; K] {\n let mut result = [0; K];\n for i in 0..K {\n result[i] = self.data[self.offset + i];\n }\n self.offset += K;\n result\n }\n\n pub fn read_struct<T, let K: u32>(&mut self, deserialise: fn([Field; K]) -> T) -> T {\n let result = deserialise(self.read_array());\n result\n }\n\n pub fn read_struct_array<T, let K: u32, let C: u32>(\n &mut self,\n deserialise: fn([Field; K]) -> T,\n mut result: [T; C],\n ) -> [T; C] {\n for i in 0..C {\n result[i] = self.read_struct(deserialise);\n }\n result\n }\n\n pub fn finish(self) {\n assert(self.offset == self.data.len(), \"Reader did not read all data\");\n }\n}\n"
2645
2657
  },
2646
- "352": {
2658
+ "351": {
2647
2659
  "path": "/usr/src/noir-projects/noir-contracts/contracts/auth_registry_contract/src/main.nr",
2648
2660
  "source": "use dep::aztec::macros::aztec;\n\n#[aztec]\ncontract AuthRegistry {\n use dep::authwit::auth::{\n assert_current_call_valid_authwit, compute_authwit_message_hash, IS_VALID_SELECTOR,\n };\n use dep::aztec::{\n macros::{functions::{internal, private, public, view}, storage::storage},\n protocol_types::address::AztecAddress,\n state_vars::{Map, PublicMutable},\n };\n\n #[storage]\n struct Storage<Context> {\n reject_all: Map<AztecAddress, PublicMutable<bool, Context>, Context>,\n // on_behalf_of => authwit hash => authorized\n approved_actions: Map<AztecAddress, Map<Field, PublicMutable<bool, Context>, Context>, Context>,\n }\n\n /**\n * Updates the `authorized` value for `msg_sender` for `message_hash`.\n *\n * @param message_hash The message hash being authorized\n * @param authorize True if the caller is authorized to perform the message hash, false otherwise\n */\n #[public]\n fn set_authorized(message_hash: Field, authorize: bool) {\n storage.approved_actions.at(context.msg_sender()).at(message_hash).write(authorize);\n }\n\n /**\n * Updates the `reject_all` value for `msg_sender`.\n *\n * When `reject_all` is `true` any `consume` on `msg_sender` will revert.\n *\n * @param reject True if all actions should be rejected, false otherwise\n */\n #[public]\n fn set_reject_all(reject: bool) {\n storage.reject_all.at(context.msg_sender()).write(reject);\n }\n\n /**\n * Consumes an `inner_hash` on behalf of `on_behalf_of` if the caller is authorized to do so.\n *\n * Will revert even if the caller is authorized if `reject_all` is set to true for `on_behalf_of`.\n * This is to support \"mass-revoke\".\n *\n * @param on_behalf_of The address on whose behalf the action is being consumed\n * @param inner_hash The inner_hash of the authwit\n * @return `IS_VALID_SELECTOR` if the action was consumed, revert otherwise\n */\n #[public]\n fn consume(on_behalf_of: AztecAddress, inner_hash: Field) -> Field {\n assert_eq(false, storage.reject_all.at(on_behalf_of).read(), \"rejecting all\");\n\n let message_hash = compute_authwit_message_hash(\n context.msg_sender(),\n context.chain_id(),\n context.version(),\n inner_hash,\n );\n\n let authorized = storage.approved_actions.at(on_behalf_of).at(message_hash).read();\n\n assert_eq(true, authorized, \"unauthorized\");\n storage.approved_actions.at(on_behalf_of).at(message_hash).write(false);\n\n IS_VALID_SELECTOR\n }\n\n /**\n * Updates a public authwit using a private authwit\n *\n * Useful for the case where you want someone else to insert a public authwit for you.\n * For example, if Alice wants Bob to insert an authwit in public, such that they can execute\n * a trade, Alice can create a private authwit, and Bob can call this function with it.\n *\n * @param approver The address of the approver (Alice in the example)\n * @param message_hash The message hash to authorize\n * @param authorize True if the message hash should be authorized, false otherwise\n */\n #[private]\n fn set_authorized_private(approver: AztecAddress, message_hash: Field, authorize: bool) {\n assert_current_call_valid_authwit(&mut context, approver);\n AuthRegistry::at(context.this_address())\n ._set_authorized(approver, message_hash, authorize)\n .enqueue(&mut context);\n }\n\n /**\n * Internal function to update the `authorized` value for `approver` for `messageHash`.\n * Used along with `set_authorized_private` to update the public authwit.\n *\n * @param approver The address of the approver\n * @param message_hash The message hash being authorized\n * @param authorize True if the caller is authorized to perform the message hash, false otherwise\n */\n #[public]\n #[internal]\n fn _set_authorized(approver: AztecAddress, message_hash: Field, authorize: bool) {\n storage.approved_actions.at(approver).at(message_hash).write(authorize);\n }\n\n /**\n * Fetches the `reject_all` value for `on_behalf_of`.\n *\n * @param on_behalf_of The address to check\n * @return True if all actions are rejected, false otherwise\n */\n #[public]\n #[view]\n fn is_reject_all(on_behalf_of: AztecAddress) -> bool {\n storage.reject_all.at(on_behalf_of).read()\n }\n\n /**\n * Fetches the `authorized` value for `on_behalf_of` for `message_hash`.\n *\n * @param on_behalf_of The address on whose behalf the action is being consumed\n * @param message_hash The message hash to check\n * @return True if the caller is authorized to perform the action, false otherwise\n */\n #[public]\n #[view]\n fn is_consumable(on_behalf_of: AztecAddress, message_hash: Field) -> bool {\n storage.approved_actions.at(on_behalf_of).at(message_hash).read()\n }\n\n unconstrained fn unconstrained_is_consumable(\n on_behalf_of: AztecAddress,\n message_hash: Field,\n ) -> pub bool {\n storage.approved_actions.at(on_behalf_of).at(message_hash).read()\n }\n}\n"
2649
2661
  }