@aztec/protocol-contracts 0.71.0 → 0.72.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/artifacts/AuthRegistry.json +669 -665
- package/artifacts/ContractClassRegisterer.json +520 -520
- package/artifacts/ContractInstanceDeployer.json +126 -126
- package/artifacts/FeeJuice.json +881 -727
- package/artifacts/MultiCallEntrypoint.json +30 -30
- package/artifacts/Router.json +241 -241
- package/dest/auth-registry/index.d.ts +1 -1
- package/dest/auth-registry/index.d.ts.map +1 -1
- package/dest/auth-registry/index.js +3 -3
- package/dest/bundle/index.d.ts +1 -1
- package/dest/bundle/index.d.ts.map +1 -1
- package/dest/bundle/index.js +3 -3
- package/dest/class-registerer/index.d.ts +1 -1
- package/dest/class-registerer/index.d.ts.map +1 -1
- package/dest/class-registerer/index.js +3 -3
- package/dest/fee-juice/index.d.ts +1 -1
- package/dest/fee-juice/index.d.ts.map +1 -1
- package/dest/fee-juice/index.js +3 -3
- package/dest/instance-deployer/index.d.ts +1 -1
- package/dest/instance-deployer/index.d.ts.map +1 -1
- package/dest/instance-deployer/index.js +3 -3
- package/dest/make_protocol_contract.d.ts +1 -1
- package/dest/make_protocol_contract.d.ts.map +1 -1
- package/dest/make_protocol_contract.js +3 -3
- package/dest/multi-call-entrypoint/index.d.ts +1 -1
- package/dest/multi-call-entrypoint/index.d.ts.map +1 -1
- package/dest/multi-call-entrypoint/index.js +3 -3
- package/dest/protocol_contract_data.js +3 -3
- package/dest/router/index.d.ts +1 -1
- package/dest/router/index.d.ts.map +1 -1
- package/dest/router/index.js +3 -3
- package/package.json +4 -4
- package/src/auth-registry/index.ts +2 -2
- package/src/bundle/index.ts +2 -2
- package/src/class-registerer/index.ts +2 -2
- package/src/fee-juice/index.ts +2 -2
- package/src/instance-deployer/index.ts +2 -2
- package/src/make_protocol_contract.ts +5 -2
- package/src/multi-call-entrypoint/index.ts +2 -2
- package/src/protocol_contract_data.ts +3 -3
- package/src/router/index.ts +2 -2
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"transpiled": true,
|
|
3
|
-
"noir_version": "1.0.0-beta.1+
|
|
3
|
+
"noir_version": "1.0.0-beta.1+4ca7394b2efd7aef",
|
|
4
4
|
"name": "AuthRegistry",
|
|
5
5
|
"functions": [
|
|
6
6
|
{
|
|
@@ -23,199 +23,6 @@
|
|
|
23
23
|
"sync_notes"
|
|
24
24
|
]
|
|
25
25
|
},
|
|
26
|
-
{
|
|
27
|
-
"name": "consume",
|
|
28
|
-
"is_unconstrained": true,
|
|
29
|
-
"custom_attributes": [
|
|
30
|
-
"public"
|
|
31
|
-
],
|
|
32
|
-
"abi": {
|
|
33
|
-
"error_types": {
|
|
34
|
-
"12737498021964987455": {
|
|
35
|
-
"error_kind": "string",
|
|
36
|
-
"string": "unauthorized"
|
|
37
|
-
},
|
|
38
|
-
"16761564377371454734": {
|
|
39
|
-
"error_kind": "string",
|
|
40
|
-
"string": "Array index out of bounds"
|
|
41
|
-
},
|
|
42
|
-
"17843811134343075018": {
|
|
43
|
-
"error_kind": "string",
|
|
44
|
-
"string": "Stack too deep"
|
|
45
|
-
},
|
|
46
|
-
"206160798890201757": {
|
|
47
|
-
"error_kind": "string",
|
|
48
|
-
"string": "Storage slot 0 not allowed. Storage slots must start from 1."
|
|
49
|
-
},
|
|
50
|
-
"5019202896831570965": {
|
|
51
|
-
"error_kind": "string",
|
|
52
|
-
"string": "attempt to add with overflow"
|
|
53
|
-
},
|
|
54
|
-
"715723737710351018": {
|
|
55
|
-
"error_kind": "string",
|
|
56
|
-
"string": "rejecting all"
|
|
57
|
-
}
|
|
58
|
-
},
|
|
59
|
-
"parameters": [
|
|
60
|
-
{
|
|
61
|
-
"name": "on_behalf_of",
|
|
62
|
-
"type": {
|
|
63
|
-
"fields": [
|
|
64
|
-
{
|
|
65
|
-
"name": "inner",
|
|
66
|
-
"type": {
|
|
67
|
-
"kind": "field"
|
|
68
|
-
}
|
|
69
|
-
}
|
|
70
|
-
],
|
|
71
|
-
"kind": "struct",
|
|
72
|
-
"path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
|
|
73
|
-
},
|
|
74
|
-
"visibility": "private"
|
|
75
|
-
},
|
|
76
|
-
{
|
|
77
|
-
"name": "inner_hash",
|
|
78
|
-
"type": {
|
|
79
|
-
"kind": "field"
|
|
80
|
-
},
|
|
81
|
-
"visibility": "private"
|
|
82
|
-
}
|
|
83
|
-
],
|
|
84
|
-
"return_type": {
|
|
85
|
-
"abi_type": {
|
|
86
|
-
"kind": "field"
|
|
87
|
-
},
|
|
88
|
-
"visibility": "public"
|
|
89
|
-
}
|
|
90
|
-
},
|
|
91
|
-
"bytecode": "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",
|
|
92
|
-
"debug_symbols": "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",
|
|
93
|
-
"brillig_names": [
|
|
94
|
-
"consume"
|
|
95
|
-
]
|
|
96
|
-
},
|
|
97
|
-
{
|
|
98
|
-
"name": "is_reject_all",
|
|
99
|
-
"is_unconstrained": true,
|
|
100
|
-
"custom_attributes": [
|
|
101
|
-
"public",
|
|
102
|
-
"view"
|
|
103
|
-
],
|
|
104
|
-
"abi": {
|
|
105
|
-
"error_types": {
|
|
106
|
-
"16761564377371454734": {
|
|
107
|
-
"error_kind": "string",
|
|
108
|
-
"string": "Array index out of bounds"
|
|
109
|
-
},
|
|
110
|
-
"17843811134343075018": {
|
|
111
|
-
"error_kind": "string",
|
|
112
|
-
"string": "Stack too deep"
|
|
113
|
-
},
|
|
114
|
-
"206160798890201757": {
|
|
115
|
-
"error_kind": "string",
|
|
116
|
-
"string": "Storage slot 0 not allowed. Storage slots must start from 1."
|
|
117
|
-
},
|
|
118
|
-
"5019202896831570965": {
|
|
119
|
-
"error_kind": "string",
|
|
120
|
-
"string": "attempt to add with overflow"
|
|
121
|
-
},
|
|
122
|
-
"9474245853673257536": {
|
|
123
|
-
"error_kind": "string",
|
|
124
|
-
"string": "Function is_reject_all can only be called statically"
|
|
125
|
-
}
|
|
126
|
-
},
|
|
127
|
-
"parameters": [
|
|
128
|
-
{
|
|
129
|
-
"name": "on_behalf_of",
|
|
130
|
-
"type": {
|
|
131
|
-
"fields": [
|
|
132
|
-
{
|
|
133
|
-
"name": "inner",
|
|
134
|
-
"type": {
|
|
135
|
-
"kind": "field"
|
|
136
|
-
}
|
|
137
|
-
}
|
|
138
|
-
],
|
|
139
|
-
"kind": "struct",
|
|
140
|
-
"path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
|
|
141
|
-
},
|
|
142
|
-
"visibility": "private"
|
|
143
|
-
}
|
|
144
|
-
],
|
|
145
|
-
"return_type": {
|
|
146
|
-
"abi_type": {
|
|
147
|
-
"kind": "boolean"
|
|
148
|
-
},
|
|
149
|
-
"visibility": "public"
|
|
150
|
-
}
|
|
151
|
-
},
|
|
152
|
-
"bytecode": "JgACBAEnAAABBIBFJgAABAMmAgIEASYCAwQAHxgAAwACgEMtCIBDAAEkAAAARi0EAAGARCcCAAIEgEQmAgMEAToNAAIAAyQAAAPKLAgBAwAAAQIBJgIEAQAsDgQDLAgBAwAAAQIBJgIFAAAsDgUDLAgBAwAAAQIBJgIGAAIsDgYDHgIAAwkmAgYAAQo4AwYHIwIABwAAAJ0kAAAD8ywIAQMmAgcEAwAQAQcBJgMDBAEAKAMCBywMBwgsDgYIACgIAggsDgEILAgBASYCBgQEABABBgEmAwEEAQAoAQIGLAwGBywOBQcAKAcCBywOBQcAKAcCBywOBQcsDQEGACgGAgYsDgYBKgIABgAAAAAAAAAAAgAAAAAAAAAALAgBByYCCAQFABABCAEmAwcEAQAoBwIILAwICSwOBQkAKAkCCSwOBQkAKAkCCSwOBQkAKAkCCSwOBgksDQEGACgGAgYsDgYBLAgBBgAAAQIBLA4BBiwNBwEAKAECASwOAQcsCAEBAAABAgEsDgcBLAgBBwAAAQIBJgIIBAAsDggHLAgBCQAAAQIBLA4ECSYCCgQCJgILBAMmAgwEASwMCAIiAAABwAw4AgoNIwIADQAAAnMiAAAB0iwNCQIKOAIEAyMCAAMAAAHsJgIKBAA7CQEKJgICBAosCAAKLAwGCywMAQwsDAcNLAwJDgAQAAIAJAAABAUsBAAALA0GAiwNAQMsDQcKLA4CBiwOAwEsDgoHJgIBAQEsDgEJACgDAgIAOAIIBiwNBgEKOAEFAgo4AgQDIwIAAwAAAlkkAAAFZC4MAAEAAhwMAgMBHAwDAQAcDAECASwMAgElIwIADQAAAoAiAAADvCYCDgQCDDgCDg8jAgAPAAAClyQAAAV2ACgDAg4AOA4CDywNDw0sDQcOLA0JDwo4DwQQIwIAEAAAAsMmAhEEADsJAREKOA4LDyMCAA8AAANOIgAAAtUsDQYOLA0BDywNBxAsDQkRJgITBAMMOBATFCMCABQAAAL8JAAABXYtBAAOgAMnAIAEBAAEJAAABYgtCIAFABIAKBICEwA4ExAULA4NFAA4EAwNDjgQDQ4jAgAOAAADOSQAAAYWLA4SBiwODwEsDg0HLA4RCSIAAAO8JgIOBA8sCAAPLAwGECwMAREsDAcSLAwJEwAQAA4AJAAABAUsBAAALA0GDiwNAQ8sDQkQLQQADoADJwCABAQABCQAAAWILQiABQARACgRAhIAOBIIEywODRMsDhEGLA4PASwODAcsDhAJIgAAA7wAOAIMDSwMDQIiAAABwCcAgAQEeAANAAAAgASAAyMAgAMAAAPyKQEAAQX3ofOvpa3UyjsBAQIlKQEAAQWDe0hoPul6QDsBAQIlJAAAA8omAgYEAyYCBwQAJgIIBAEsDAcFIgAABCIMOAUGByMCAAcAAASPIgAABDQsDQEFLA0CBiwNAwcsDQQIJgIJBAQsCAEKJgILBAUAEAELASYDCgQBACgGAgsmAgwEBAAoCgINPg8ACwANLA0KBgAoBgIGLA4GCiwOBQEsDgoCLA4HAywOCAQlLA0DBww4BQcJADgFCAcjAgAJAAAEqiIAAAVbLA0BCSwNAgosDQMLLA0EDCYCDgQEDDgFDg8jAgAPAAAE0SQAAAV2ACgKAg4AOA4FDywNDw0mAg8EAww4BQ8QIwIAEAAABPYkAAAFdgAoCQIPADgPBRAsDRAOADgNDg8mAg4EBAw4BQ4QIwIAEAAABSAkAAAFdi0EAAqAAycAgAQEAAUkAAAFiC0IgAUADQAoDQIOADgOBRAsDg8QLA4JASwODQIsDgsDLA4MBCIAAAVbLAwHBSIAAAQiKQEAAQUC3G4ngHYSnTsBAQIlKQEAAQXonQn+oREtDjsBAQIlLQGAA4AGCwCABgACgAcjAIAHAAAFoyIAAAWuLQCAA4AFIgAABhUtAAABgAUBAAABgAQAAQEAgAOABIAJLQCAA4AKLQCABYALCwCACoAJgAwjAIAMAAAGAS0BgAqACC0CgAiACwEAgAoAAoAKAQCACwACgAsiAAAF0CcBgAUEAAEDAIAGAAKABiIAAAYVJSkBAAEFRafKcRlB5BU7AQECJS0AGMoYyg==",
|
|
153
|
-
"debug_symbols": "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",
|
|
154
|
-
"brillig_names": [
|
|
155
|
-
"is_reject_all"
|
|
156
|
-
]
|
|
157
|
-
},
|
|
158
|
-
{
|
|
159
|
-
"name": "unconstrained_is_consumable",
|
|
160
|
-
"is_unconstrained": true,
|
|
161
|
-
"custom_attributes": [],
|
|
162
|
-
"abi": {
|
|
163
|
-
"error_types": {
|
|
164
|
-
"16761564377371454734": {
|
|
165
|
-
"error_kind": "string",
|
|
166
|
-
"string": "Array index out of bounds"
|
|
167
|
-
},
|
|
168
|
-
"17843811134343075018": {
|
|
169
|
-
"error_kind": "string",
|
|
170
|
-
"string": "Stack too deep"
|
|
171
|
-
},
|
|
172
|
-
"206160798890201757": {
|
|
173
|
-
"error_kind": "string",
|
|
174
|
-
"string": "Storage slot 0 not allowed. Storage slots must start from 1."
|
|
175
|
-
},
|
|
176
|
-
"5019202896831570965": {
|
|
177
|
-
"error_kind": "string",
|
|
178
|
-
"string": "attempt to add with overflow"
|
|
179
|
-
}
|
|
180
|
-
},
|
|
181
|
-
"parameters": [
|
|
182
|
-
{
|
|
183
|
-
"name": "on_behalf_of",
|
|
184
|
-
"type": {
|
|
185
|
-
"fields": [
|
|
186
|
-
{
|
|
187
|
-
"name": "inner",
|
|
188
|
-
"type": {
|
|
189
|
-
"kind": "field"
|
|
190
|
-
}
|
|
191
|
-
}
|
|
192
|
-
],
|
|
193
|
-
"kind": "struct",
|
|
194
|
-
"path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
|
|
195
|
-
},
|
|
196
|
-
"visibility": "private"
|
|
197
|
-
},
|
|
198
|
-
{
|
|
199
|
-
"name": "message_hash",
|
|
200
|
-
"type": {
|
|
201
|
-
"kind": "field"
|
|
202
|
-
},
|
|
203
|
-
"visibility": "private"
|
|
204
|
-
}
|
|
205
|
-
],
|
|
206
|
-
"return_type": {
|
|
207
|
-
"abi_type": {
|
|
208
|
-
"kind": "boolean"
|
|
209
|
-
},
|
|
210
|
-
"visibility": "public"
|
|
211
|
-
}
|
|
212
|
-
},
|
|
213
|
-
"bytecode": "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",
|
|
214
|
-
"debug_symbols": "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",
|
|
215
|
-
"brillig_names": [
|
|
216
|
-
"unconstrained_is_consumable"
|
|
217
|
-
]
|
|
218
|
-
},
|
|
219
26
|
{
|
|
220
27
|
"name": "set_reject_all",
|
|
221
28
|
"is_unconstrained": true,
|
|
@@ -253,7 +60,7 @@
|
|
|
253
60
|
"return_type": null
|
|
254
61
|
},
|
|
255
62
|
"bytecode": "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",
|
|
256
|
-
"debug_symbols": "
|
|
63
|
+
"debug_symbols": "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",
|
|
257
64
|
"brillig_names": [
|
|
258
65
|
"set_reject_all"
|
|
259
66
|
]
|
|
@@ -349,22 +156,13 @@
|
|
|
349
156
|
]
|
|
350
157
|
},
|
|
351
158
|
{
|
|
352
|
-
"name": "
|
|
353
|
-
"is_unconstrained":
|
|
159
|
+
"name": "set_authorized_private",
|
|
160
|
+
"is_unconstrained": false,
|
|
354
161
|
"custom_attributes": [
|
|
355
|
-
"
|
|
162
|
+
"private"
|
|
356
163
|
],
|
|
357
164
|
"abi": {
|
|
358
165
|
"error_types": {
|
|
359
|
-
"12737498021964987455": {
|
|
360
|
-
"error_kind": "string",
|
|
361
|
-
"string": "unauthorized"
|
|
362
|
-
},
|
|
363
|
-
"16541607464495309456": {
|
|
364
|
-
"error_kind": "fmtstring",
|
|
365
|
-
"item_types": [],
|
|
366
|
-
"length": 16
|
|
367
|
-
},
|
|
368
166
|
"16761564377371454734": {
|
|
369
167
|
"error_kind": "string",
|
|
370
168
|
"string": "Array index out of bounds"
|
|
@@ -373,392 +171,84 @@
|
|
|
373
171
|
"error_kind": "string",
|
|
374
172
|
"string": "Stack too deep"
|
|
375
173
|
},
|
|
376
|
-
"
|
|
174
|
+
"4939791462094160055": {
|
|
377
175
|
"error_kind": "string",
|
|
378
|
-
"string": "
|
|
176
|
+
"string": "Message not authorized by account"
|
|
379
177
|
},
|
|
380
178
|
"5019202896831570965": {
|
|
381
179
|
"error_kind": "string",
|
|
382
180
|
"string": "attempt to add with overflow"
|
|
383
|
-
},
|
|
384
|
-
"5444967152290923376": {
|
|
385
|
-
"error_kind": "string",
|
|
386
|
-
"string": "Function is_consumable can only be called statically"
|
|
387
|
-
},
|
|
388
|
-
"6304245522015439386": {
|
|
389
|
-
"error_kind": "string",
|
|
390
|
-
"string": "Function _set_authorized can only be called internally"
|
|
391
|
-
},
|
|
392
|
-
"715723737710351018": {
|
|
393
|
-
"error_kind": "string",
|
|
394
|
-
"string": "rejecting all"
|
|
395
|
-
},
|
|
396
|
-
"9474245853673257536": {
|
|
397
|
-
"error_kind": "string",
|
|
398
|
-
"string": "Function is_reject_all can only be called statically"
|
|
399
181
|
}
|
|
400
182
|
},
|
|
401
183
|
"parameters": [
|
|
402
184
|
{
|
|
403
|
-
"name": "
|
|
404
|
-
"type": {
|
|
405
|
-
"kind": "field"
|
|
406
|
-
},
|
|
407
|
-
"visibility": "private"
|
|
408
|
-
}
|
|
409
|
-
],
|
|
410
|
-
"return_type": null
|
|
411
|
-
},
|
|
412
|
-
"bytecode": "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",
|
|
413
|
-
"debug_symbols": "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",
|
|
414
|
-
"brillig_names": [
|
|
415
|
-
"public_dispatch"
|
|
416
|
-
]
|
|
417
|
-
},
|
|
418
|
-
{
|
|
419
|
-
"name": "is_consumable",
|
|
420
|
-
"is_unconstrained": true,
|
|
421
|
-
"custom_attributes": [
|
|
422
|
-
"public",
|
|
423
|
-
"view"
|
|
424
|
-
],
|
|
425
|
-
"abi": {
|
|
426
|
-
"error_types": {
|
|
427
|
-
"16761564377371454734": {
|
|
428
|
-
"error_kind": "string",
|
|
429
|
-
"string": "Array index out of bounds"
|
|
430
|
-
},
|
|
431
|
-
"17843811134343075018": {
|
|
432
|
-
"error_kind": "string",
|
|
433
|
-
"string": "Stack too deep"
|
|
434
|
-
},
|
|
435
|
-
"206160798890201757": {
|
|
436
|
-
"error_kind": "string",
|
|
437
|
-
"string": "Storage slot 0 not allowed. Storage slots must start from 1."
|
|
438
|
-
},
|
|
439
|
-
"5019202896831570965": {
|
|
440
|
-
"error_kind": "string",
|
|
441
|
-
"string": "attempt to add with overflow"
|
|
442
|
-
},
|
|
443
|
-
"5444967152290923376": {
|
|
444
|
-
"error_kind": "string",
|
|
445
|
-
"string": "Function is_consumable can only be called statically"
|
|
446
|
-
}
|
|
447
|
-
},
|
|
448
|
-
"parameters": [
|
|
449
|
-
{
|
|
450
|
-
"name": "on_behalf_of",
|
|
451
|
-
"type": {
|
|
452
|
-
"fields": [
|
|
453
|
-
{
|
|
454
|
-
"name": "inner",
|
|
455
|
-
"type": {
|
|
456
|
-
"kind": "field"
|
|
457
|
-
}
|
|
458
|
-
}
|
|
459
|
-
],
|
|
460
|
-
"kind": "struct",
|
|
461
|
-
"path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
|
|
462
|
-
},
|
|
463
|
-
"visibility": "private"
|
|
464
|
-
},
|
|
465
|
-
{
|
|
466
|
-
"name": "message_hash",
|
|
467
|
-
"type": {
|
|
468
|
-
"kind": "field"
|
|
469
|
-
},
|
|
470
|
-
"visibility": "private"
|
|
471
|
-
}
|
|
472
|
-
],
|
|
473
|
-
"return_type": {
|
|
474
|
-
"abi_type": {
|
|
475
|
-
"kind": "boolean"
|
|
476
|
-
},
|
|
477
|
-
"visibility": "public"
|
|
478
|
-
}
|
|
479
|
-
},
|
|
480
|
-
"bytecode": "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",
|
|
481
|
-
"debug_symbols": "1Z3bbuM4DIbfJde9EClKIvsqg0XR0xQBgrboYYFF0XdfJ1urmYkcj4VFwv8mqBv+5mfGpCVLlj9Wd/c37w9X68efT6+ryx8fq83T7fXb+ulx2Pr4vFjdvKw3m/XD1f6/V2H7obSzf32+ftxuvr5dv7ytLilbuFjdP94Nf5YQhj38XG/uV5eZP/+6WGlarrHQoenxY8s1FGKPSDtE1OOJSoeIqUeUO0Sxx1Nc+tteHBhn49E4W8zVWEPD2ILal7ER8b7xFkc6Tk+SjvOTUo+n1HOu5ea5JhbGQMh+1JohJqrGRMmq8XAULWvNo7FptWXV/3CKK5zCvnB8RUd9RUd9RcfIF07yhMMh+MKRU+OkEYcDH+KYKxyKvnCKKxxmXzi+ohPJF87/UAY5yojDRjM40eqegx3fcZH0ZVoy/7LbLbkEWHLYmKcIS66z5Cme7vqa2RdOcYVTfEWn+IqO+oqOZlc4FnzhJF84dmqcY62P+AfdjJPiqCscYl84xRUO+4oOZ1c4sVkGFzSnNIzNNOX9Vpo2bJcd5ZEG4I48oZILbMxFUcn/oEdSeM4FlepCeIa+SD3UIpyqdXMApQy3GUfj4UCOGw/pX+rQxLAR9813x2qnPtZYx3+KSJg51pC/D7WaxpB27FmA2XHjLtLMj8SjJnH5vnbkVmZLHTBUyXstyu0F6rBk1IvSIDu+YyYbE4l5b3BxMN6BKyh4YlTwAgqeUSOeUSNeUCNeMii4BlTwhApuoOAmqODtS34eYVIml+ApMCp4AQWn5ihqqpr8q8QPeGRU8AwKLqiniqBGPKFGPKFGPAdUcEEFN1DwElHBFRRcUS/57QnEAODtqcZno0mOaHJ7ovHZaMQVjXqiac8yPhtN8UTDnjI8t8f+z0UTXWV4dJXh0TzRiKsMF1cZ3h5GOxuNq9hkV9Uvu2rfFFfVr3iKTQknrjffc3eYJf1O076Gc6Fx7gOXGM/VwZim2KFPPMSc45eIspJP9Bhw0RUWXSIuenshhVLqPPNiySd6uw2BgZ5h0ds3ozHQBRddYdELbpoW3OKouFFX3OJouMXRcIujwRZHDbBpqgE2TZVg01Qp4aK316Ez4hHd2Ck6Cy46btRPfcs61mdtOJL8TnPqW9YzNK5ic+qbxMdpTn2TeIbGVWzUVWy0XVdDLQsU9mlOW5zYuKKHdICusOjWbnRSrLcrKZFT9IKKbiHBok+0lyHQ2xWGcqro6jNNrf0wAUmoj5FLcBr19uMEEOgTyx5DoAsuevtqmrhWmJSCT/T2GhUY6LhRzxkWvRAueoFFn+hqQKAbLPrE+yoA0Cm059KDsCPHfeJ0L/WOZTJ2yj7R3cBgB447F1z2iX4eBnvGZZ/o6WGwA9eZiQ5T/B6RitFnN3VgV1z29kJaIOwZl709HAXCLsDswLmqwDVSgeNuwDXScGskBdwaOTTG2uxS14SN2WlfmyZG9jDYCy47MzC74rLHCMwOHHeBHcse2GEHs2nq1boY7ILLnk/9LPZRHG7PXy7xex36eKBpp6zJ6MjSoZ92qhzXtE/RGY10aJZO2Nup2j/krKr0qCaelJtTdfnSLl/a5cu6fFmPrxhil6rLF3GXKveoOHSppEvVkymx3bQ6WmNibMbd6jtYjA81HXUpth9aPu6n/bTwjEaXa9pZP6NZXmejUoemw49Jh8YWayRIh6bDT3uhNkvjeb3/dpiq0eUa7vDTft3wjCYv10iHH+nwM9sWaGnS8t80hw5Nh5/2cqwzGl2u0Y5cMOrQLK8HE8vnz2jKcg11+KGO4+HQoZEOzcLz4HPY+vv6ZX19s7l/HRTbL98fb9/WT49fm2//PI/f3LysN5v1w9Xzy9Pt/d37y/3V5ul2+90qfH38iFQuYtQty3azlAvlXd9m+91wVY9Cg8/B778=",
|
|
482
|
-
"brillig_names": [
|
|
483
|
-
"is_consumable"
|
|
484
|
-
]
|
|
485
|
-
},
|
|
486
|
-
{
|
|
487
|
-
"name": "_set_authorized",
|
|
488
|
-
"is_unconstrained": true,
|
|
489
|
-
"custom_attributes": [
|
|
490
|
-
"public",
|
|
491
|
-
"internal"
|
|
492
|
-
],
|
|
493
|
-
"abi": {
|
|
494
|
-
"error_types": {
|
|
495
|
-
"16761564377371454734": {
|
|
496
|
-
"error_kind": "string",
|
|
497
|
-
"string": "Array index out of bounds"
|
|
498
|
-
},
|
|
499
|
-
"17843811134343075018": {
|
|
500
|
-
"error_kind": "string",
|
|
501
|
-
"string": "Stack too deep"
|
|
502
|
-
},
|
|
503
|
-
"206160798890201757": {
|
|
504
|
-
"error_kind": "string",
|
|
505
|
-
"string": "Storage slot 0 not allowed. Storage slots must start from 1."
|
|
506
|
-
},
|
|
507
|
-
"5019202896831570965": {
|
|
508
|
-
"error_kind": "string",
|
|
509
|
-
"string": "attempt to add with overflow"
|
|
510
|
-
},
|
|
511
|
-
"6304245522015439386": {
|
|
512
|
-
"error_kind": "string",
|
|
513
|
-
"string": "Function _set_authorized can only be called internally"
|
|
514
|
-
}
|
|
515
|
-
},
|
|
516
|
-
"parameters": [
|
|
517
|
-
{
|
|
518
|
-
"name": "approver",
|
|
519
|
-
"type": {
|
|
520
|
-
"fields": [
|
|
521
|
-
{
|
|
522
|
-
"name": "inner",
|
|
523
|
-
"type": {
|
|
524
|
-
"kind": "field"
|
|
525
|
-
}
|
|
526
|
-
}
|
|
527
|
-
],
|
|
528
|
-
"kind": "struct",
|
|
529
|
-
"path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
|
|
530
|
-
},
|
|
531
|
-
"visibility": "private"
|
|
532
|
-
},
|
|
533
|
-
{
|
|
534
|
-
"name": "message_hash",
|
|
535
|
-
"type": {
|
|
536
|
-
"kind": "field"
|
|
537
|
-
},
|
|
538
|
-
"visibility": "private"
|
|
539
|
-
},
|
|
540
|
-
{
|
|
541
|
-
"name": "authorize",
|
|
542
|
-
"type": {
|
|
543
|
-
"kind": "boolean"
|
|
544
|
-
},
|
|
545
|
-
"visibility": "private"
|
|
546
|
-
}
|
|
547
|
-
],
|
|
548
|
-
"return_type": null
|
|
549
|
-
},
|
|
550
|
-
"bytecode": "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",
|
|
551
|
-
"debug_symbols": "1Z3bbus4DEX/Jc99EEVRFPsrB4Oit1MECNqilwEGRf99nDZ2clo5rjUDh/uliGvtcIWWaN31trq5vXq9u1jf/354Xp3/elttHq4vX9YP993V2/vZ6uppvdms7y4O/70K2z+lfKR/fry8314+v1w+vazOKVs4W93e33QfNYTuG36vN7er8xzf/zpbWWzQ6HwNhdgiyg0iCi0iaRDFFksxtYgaHi0xt4haLKW5D/fsW+KUOe0Sp5zikLiESuLCZrvEJVE6TPyBo/8dJ+U+cffRpnA49jicylccacn60lLIcksu1mouTkGG5xEKHfdWV+b659GVpL23SGruopL7xLZ3VizlEyf5wjFXOMWXd4ov75gv71jxhBPrr+DT4agrHKKlcaTH6Z7Md5zsCicGXzjJF465wmFf3uHiCif9D2EwDpVVikYTOPvKagp2/Is1yS6p5vjH136QKyq5wPo8B1hymSS3tNz7NZsrnB80MxbF8eWd4ss7xZd3jH3hqCcc/kEzY1GcvDTOsdoH/6CZsSiO+MIxVzgx+cLx5R1mXzjVMDijOlVCD17iYS2t1PqHZ/3KIxXALXm9RQJBDutzEVTy6RYJ0ZSJFKg3kaJO0GuxoZ1htB8/qI6FiJRdWtE9Owf5ZJfF2QceLWWCXfMw6KNKdDwxUTc2MMSuroPsMHn3WxNXKx4S+xgmB/Ax13JYij1OSfmgZrMNlN+z7hAc0wFL9Ytj11HeB9JI8TDxFjwRKriAgktABUf1eEb1eIb1uIGCK6OCF1DwElHBFRTc6q/8oTokmZyCCya4hIAKnqrggyb/KfEDHgUV3EDBGTWrMKrHE6rHE6rHhVHBFRQ8R1TwDAquhAqO+sovARW8+gI6GU3xRFOfNnAyGnVEkwO5osmeaOoLmk5G46mE5/qEgVPRRE8lPEdXJZyjKxpXJTy5KuH1YbRT0Ygr34ir6Cee6jc5u4p+2ZVvbOF4s59DEmOSLzRaf4dHpX5CQ1TmUzUwxik+0EfWJ2feiSgX8okeGRadCRc9w6LXqwWkOsx3VhOn6IKLbrDo9c5oDHSFRc+Ei45bTBU3OCqw13GDY8ENjgU3OBpucDTcYmqwxbQE2GJaQoFFp/oeVUb9xlZk0Su6wqJHXK8v3WXNYVj7xwdLhHoa8UQjrnyzdCfxcZqlO4knaFz5Rl35RutxNQxhgcIhzbLBKVoc0MPX/u1SCBe9XukkHrorScgnugVc9IKKbiP1ZQj0eoShLAN68VlMrb6YgFIYdlpNwanX68sJINBHdjSGQFdY9Pp6cJI4RBiR4BQ9w6ILrtfFYNFzgkUfGRCBQFdY9PpaZQz0Aoten0qPgQ7rdQojh3iIDv2VYtEru+KyE7DfRw5JwWAXYHbDZR9p52GwA8eZkeYS78ejmH02UimMtJcw2AWY3XDZ64NRIOyKy67AZVWBY2QB9nsBjpEFOEYacIwcOamSkw7s2Wlbm0bG9SDYR47gxGAXXPZIwOwZl52B/c6wI9kdO+xQNlGCHcumsQN2Idhl6ZXYR3Fiffaycj9TTRN/09SLrKXekMl3O/WiclxTz6ITGp2vkbnT9T5VuUVV3/h7UiUtKm2ypU22SpOt0mTLmmxZy/PiEJpU0qSyFhVxk0pbVJGaVHl2jGGu+t2GQ08sVjTz4xLXlywft1NfK3xcU1+kO6GRBs38OMv1swgnNA12yvzYzBYbNPPtpBAbNNV8bdLna9P4TVM/f21C02CnfnTYhMbma7jBDjfYmawL1DRl/jMVbtA02KlvxnpcU++2ntA0lIWSGjTz48HI5vlHNSP71k9oWuzM/z1C3KCZ/3wkzswH793V35dP68urze1zp9jefL2/flk/3O8uX/557O9cPa03m/XdxePTw/XtzevT7cXm4Xp7bxV2f34xyRlz3rJsL1XOSvho22zvsXb3rLPZ2f0X",
|
|
552
|
-
"brillig_names": [
|
|
553
|
-
"_set_authorized"
|
|
554
|
-
]
|
|
555
|
-
},
|
|
556
|
-
{
|
|
557
|
-
"name": "process_log",
|
|
558
|
-
"is_unconstrained": true,
|
|
559
|
-
"custom_attributes": [],
|
|
560
|
-
"abi": {
|
|
561
|
-
"error_types": {
|
|
562
|
-
"16541607464495309456": {
|
|
563
|
-
"error_kind": "fmtstring",
|
|
564
|
-
"item_types": [],
|
|
565
|
-
"length": 16
|
|
566
|
-
},
|
|
567
|
-
"17843811134343075018": {
|
|
568
|
-
"error_kind": "string",
|
|
569
|
-
"string": "Stack too deep"
|
|
570
|
-
}
|
|
571
|
-
},
|
|
572
|
-
"parameters": [
|
|
573
|
-
{
|
|
574
|
-
"name": "log_plaintext",
|
|
575
|
-
"type": {
|
|
576
|
-
"fields": [
|
|
577
|
-
{
|
|
578
|
-
"name": "storage",
|
|
579
|
-
"type": {
|
|
580
|
-
"kind": "array",
|
|
581
|
-
"length": 18,
|
|
582
|
-
"type": {
|
|
583
|
-
"kind": "field"
|
|
584
|
-
}
|
|
585
|
-
}
|
|
586
|
-
},
|
|
587
|
-
{
|
|
588
|
-
"name": "len",
|
|
589
|
-
"type": {
|
|
590
|
-
"kind": "integer",
|
|
591
|
-
"sign": "unsigned",
|
|
592
|
-
"width": 32
|
|
593
|
-
}
|
|
594
|
-
}
|
|
595
|
-
],
|
|
596
|
-
"kind": "struct",
|
|
597
|
-
"path": "std::collections::bounded_vec::BoundedVec"
|
|
598
|
-
},
|
|
599
|
-
"visibility": "private"
|
|
600
|
-
},
|
|
601
|
-
{
|
|
602
|
-
"name": "tx_hash",
|
|
603
|
-
"type": {
|
|
604
|
-
"kind": "field"
|
|
605
|
-
},
|
|
606
|
-
"visibility": "private"
|
|
607
|
-
},
|
|
608
|
-
{
|
|
609
|
-
"name": "unique_note_hashes_in_tx",
|
|
185
|
+
"name": "inputs",
|
|
610
186
|
"type": {
|
|
611
187
|
"fields": [
|
|
612
188
|
{
|
|
613
|
-
"name": "
|
|
189
|
+
"name": "call_context",
|
|
614
190
|
"type": {
|
|
615
|
-
"
|
|
616
|
-
|
|
617
|
-
|
|
618
|
-
|
|
619
|
-
|
|
191
|
+
"fields": [
|
|
192
|
+
{
|
|
193
|
+
"name": "msg_sender",
|
|
194
|
+
"type": {
|
|
195
|
+
"fields": [
|
|
196
|
+
{
|
|
197
|
+
"name": "inner",
|
|
198
|
+
"type": {
|
|
199
|
+
"kind": "field"
|
|
200
|
+
}
|
|
201
|
+
}
|
|
202
|
+
],
|
|
203
|
+
"kind": "struct",
|
|
204
|
+
"path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
|
|
205
|
+
}
|
|
206
|
+
},
|
|
207
|
+
{
|
|
208
|
+
"name": "contract_address",
|
|
209
|
+
"type": {
|
|
210
|
+
"fields": [
|
|
211
|
+
{
|
|
212
|
+
"name": "inner",
|
|
213
|
+
"type": {
|
|
214
|
+
"kind": "field"
|
|
215
|
+
}
|
|
216
|
+
}
|
|
217
|
+
],
|
|
218
|
+
"kind": "struct",
|
|
219
|
+
"path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
|
|
220
|
+
}
|
|
221
|
+
},
|
|
222
|
+
{
|
|
223
|
+
"name": "function_selector",
|
|
224
|
+
"type": {
|
|
225
|
+
"fields": [
|
|
226
|
+
{
|
|
227
|
+
"name": "inner",
|
|
228
|
+
"type": {
|
|
229
|
+
"kind": "integer",
|
|
230
|
+
"sign": "unsigned",
|
|
231
|
+
"width": 32
|
|
232
|
+
}
|
|
233
|
+
}
|
|
234
|
+
],
|
|
235
|
+
"kind": "struct",
|
|
236
|
+
"path": "authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"
|
|
237
|
+
}
|
|
238
|
+
},
|
|
239
|
+
{
|
|
240
|
+
"name": "is_static_call",
|
|
241
|
+
"type": {
|
|
242
|
+
"kind": "boolean"
|
|
243
|
+
}
|
|
244
|
+
}
|
|
245
|
+
],
|
|
246
|
+
"kind": "struct",
|
|
247
|
+
"path": "authwit::aztec::protocol_types::abis::call_context::CallContext"
|
|
620
248
|
}
|
|
621
249
|
},
|
|
622
250
|
{
|
|
623
|
-
"name": "
|
|
624
|
-
"type": {
|
|
625
|
-
"kind": "integer",
|
|
626
|
-
"sign": "unsigned",
|
|
627
|
-
"width": 32
|
|
628
|
-
}
|
|
629
|
-
}
|
|
630
|
-
],
|
|
631
|
-
"kind": "struct",
|
|
632
|
-
"path": "std::collections::bounded_vec::BoundedVec"
|
|
633
|
-
},
|
|
634
|
-
"visibility": "private"
|
|
635
|
-
},
|
|
636
|
-
{
|
|
637
|
-
"name": "first_nullifier_in_tx",
|
|
638
|
-
"type": {
|
|
639
|
-
"kind": "field"
|
|
640
|
-
},
|
|
641
|
-
"visibility": "private"
|
|
642
|
-
},
|
|
643
|
-
{
|
|
644
|
-
"name": "recipient",
|
|
645
|
-
"type": {
|
|
646
|
-
"fields": [
|
|
647
|
-
{
|
|
648
|
-
"name": "inner",
|
|
649
|
-
"type": {
|
|
650
|
-
"kind": "field"
|
|
651
|
-
}
|
|
652
|
-
}
|
|
653
|
-
],
|
|
654
|
-
"kind": "struct",
|
|
655
|
-
"path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
|
|
656
|
-
},
|
|
657
|
-
"visibility": "private"
|
|
658
|
-
}
|
|
659
|
-
],
|
|
660
|
-
"return_type": null
|
|
661
|
-
},
|
|
662
|
-
"bytecode": "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",
|
|
663
|
-
"debug_symbols": "tZbLCoMwEEX/ZdZZOFOtrb9SSokaJRCiRC0U8d8bpQ9p13cTuGFyZnXCnak25dTerG+6gYrLTK6r9Gg7H9O8KCqDdc62t/01JevBSbI9GHrt1zyMOoxUHESR8TUVaRKfN9YZKo6yqL/B/D2Y55/BTJarimSGkQVGPsDIKYycwchHGDmHkU8w8hlFZpiDDHOQYQ4yzEGGOcgwBxnmIMMcZJiDDHNQYA4KzEHBOLjEdNfB6tKZV4FoJl/t+sT46M1PtehDV5l6CmYtGd9+sbqcssp4+0FjYEkVyzkuiYue",
|
|
664
|
-
"brillig_names": [
|
|
665
|
-
"process_log"
|
|
666
|
-
]
|
|
667
|
-
},
|
|
668
|
-
{
|
|
669
|
-
"name": "set_authorized_private",
|
|
670
|
-
"is_unconstrained": false,
|
|
671
|
-
"custom_attributes": [
|
|
672
|
-
"private"
|
|
673
|
-
],
|
|
674
|
-
"abi": {
|
|
675
|
-
"error_types": {
|
|
676
|
-
"16761564377371454734": {
|
|
677
|
-
"error_kind": "string",
|
|
678
|
-
"string": "Array index out of bounds"
|
|
679
|
-
},
|
|
680
|
-
"17843811134343075018": {
|
|
681
|
-
"error_kind": "string",
|
|
682
|
-
"string": "Stack too deep"
|
|
683
|
-
},
|
|
684
|
-
"4939791462094160055": {
|
|
685
|
-
"error_kind": "string",
|
|
686
|
-
"string": "Message not authorized by account"
|
|
687
|
-
},
|
|
688
|
-
"5019202896831570965": {
|
|
689
|
-
"error_kind": "string",
|
|
690
|
-
"string": "attempt to add with overflow"
|
|
691
|
-
}
|
|
692
|
-
},
|
|
693
|
-
"parameters": [
|
|
694
|
-
{
|
|
695
|
-
"name": "inputs",
|
|
696
|
-
"type": {
|
|
697
|
-
"fields": [
|
|
698
|
-
{
|
|
699
|
-
"name": "call_context",
|
|
700
|
-
"type": {
|
|
701
|
-
"fields": [
|
|
702
|
-
{
|
|
703
|
-
"name": "msg_sender",
|
|
704
|
-
"type": {
|
|
705
|
-
"fields": [
|
|
706
|
-
{
|
|
707
|
-
"name": "inner",
|
|
708
|
-
"type": {
|
|
709
|
-
"kind": "field"
|
|
710
|
-
}
|
|
711
|
-
}
|
|
712
|
-
],
|
|
713
|
-
"kind": "struct",
|
|
714
|
-
"path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
|
|
715
|
-
}
|
|
716
|
-
},
|
|
717
|
-
{
|
|
718
|
-
"name": "contract_address",
|
|
719
|
-
"type": {
|
|
720
|
-
"fields": [
|
|
721
|
-
{
|
|
722
|
-
"name": "inner",
|
|
723
|
-
"type": {
|
|
724
|
-
"kind": "field"
|
|
725
|
-
}
|
|
726
|
-
}
|
|
727
|
-
],
|
|
728
|
-
"kind": "struct",
|
|
729
|
-
"path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
|
|
730
|
-
}
|
|
731
|
-
},
|
|
732
|
-
{
|
|
733
|
-
"name": "function_selector",
|
|
734
|
-
"type": {
|
|
735
|
-
"fields": [
|
|
736
|
-
{
|
|
737
|
-
"name": "inner",
|
|
738
|
-
"type": {
|
|
739
|
-
"kind": "integer",
|
|
740
|
-
"sign": "unsigned",
|
|
741
|
-
"width": 32
|
|
742
|
-
}
|
|
743
|
-
}
|
|
744
|
-
],
|
|
745
|
-
"kind": "struct",
|
|
746
|
-
"path": "authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"
|
|
747
|
-
}
|
|
748
|
-
},
|
|
749
|
-
{
|
|
750
|
-
"name": "is_static_call",
|
|
751
|
-
"type": {
|
|
752
|
-
"kind": "boolean"
|
|
753
|
-
}
|
|
754
|
-
}
|
|
755
|
-
],
|
|
756
|
-
"kind": "struct",
|
|
757
|
-
"path": "authwit::aztec::protocol_types::abis::call_context::CallContext"
|
|
758
|
-
}
|
|
759
|
-
},
|
|
760
|
-
{
|
|
761
|
-
"name": "historical_header",
|
|
251
|
+
"name": "historical_header",
|
|
762
252
|
"type": {
|
|
763
253
|
"fields": [
|
|
764
254
|
{
|
|
@@ -2300,25 +1790,535 @@
|
|
|
2300
1790
|
"kind": "struct",
|
|
2301
1791
|
"path": "authwit::aztec::protocol_types::transaction::tx_context::TxContext"
|
|
2302
1792
|
}
|
|
2303
|
-
}
|
|
2304
|
-
],
|
|
2305
|
-
"kind": "struct",
|
|
2306
|
-
"path": "authwit::aztec::protocol_types::abis::private_circuit_public_inputs::PrivateCircuitPublicInputs"
|
|
1793
|
+
}
|
|
1794
|
+
],
|
|
1795
|
+
"kind": "struct",
|
|
1796
|
+
"path": "authwit::aztec::protocol_types::abis::private_circuit_public_inputs::PrivateCircuitPublicInputs"
|
|
1797
|
+
},
|
|
1798
|
+
"visibility": "databus"
|
|
1799
|
+
}
|
|
1800
|
+
},
|
|
1801
|
+
"bytecode": "H4sIAAAAAAAA/+2dBXQUVxuGJ9kkEByCuxMggZ3sbnY3WHB3dzbJBgIBioRCNXWl7gpUaKkr9VJvqbu3tIW6u9L//dqZchkmoSV3Qt+/zDnP2bGdeb47dmfmzr0Jxp9dT59hNPD92Z8AfNZvImjtGGf/qv3JLvNVdxlX02VcbZdxdV3GNQS5jnGtXOZr7TKujcu4ti7jOrmM62L9qp09nGv9BvzZwWA8nBU3A2bMnxXNi4T8wVBedsSMmKFIqCArEgjEI8FIOJoXDfujZjAQNwtD0UCh/8+ujm/HsvwV6rLyvfSsu+eeQecIcasHkhRXSYftVn+6saO/s9Jf15rH/l89DKeB+tY+nOTYVj5HGvgr1pldNC6rnk/ftmmobR9y3zYNlW2TpvTXV/obOLZNIww3Bk1AU5dtk6h523TSuK8305eepno+keW2dqSD7uO0ub7zSYHbvtBc2ebS2f2JRtnHaQsMtwStJP5KOE4badx+LTQep208Pk7bKNumpdLfSulv7dg2bTHcDrQHHVy2je79s6PGNPDSs9Oee2Y5R+zuetdW6e+o9HdybKt0DHcGXUBXa1vZ0xKNsrtcPelt2nm/8tLdX7HObOvF/pFk7MisGh4HkG54s4Pr2pj54XAkGDXDnqZBJR3k/op1ZjPfv3tb2Z7qwZ1hXS0znXdlGS65C925rAyNV8NuHuWyulnpkGTF7zxjebEjZWq+stuOdn93O7jyLiPd/+ZlxI9hE2SBQCVkzTM17jR+kjNLdw0xxyJZoUBWJF6eZ0XTM6jvdqHQS8/QnnsGnCPcjqNgGY8f1KxZyHEcZWM4DCIgqmTHfEblnHSyPb56aT8RdNN4Isjx6OqRo1w9koxKyVcH7PV7ubN4kS3V7diZwLGLQXbQ5Wg86Hp4dND1UA66ZKNy7tMSDG83ZEWXnW1Gs7PzwvlepkEjktxUDomnT9+y/GoOoqfz6uA8SVT0wNaZCF0NbzaW7pg1ngDMDJKYEzXGnEkSs8aD0uxWSTH7K9aZ3TWmH8tFwm9weJoknlkkngESzyCJZ4jEM5vEM0ziGSHxjJJ45pB49iDx7Eni2YvEszeJZx8Sz1wSz74knv1IPPuTeA4g8RxI4jmIxHMwiecQEs+hJJ7DSDyHk3iOIPEcSeI5isRzNInnGBLPsSSe40g8x5N4TiDxnEjiOYnEczKJ5xQSz6kkntNIPKeTeM4g8ZxJ4jmLxHM2ieccEs8YiWceiWc+iWcBiWecxLOQxHMuiec8Es8iEs/5JJ4LSDyLSTwXknguIvFcTOK5H4nnEhLPpSSey0g8l5N4lpB4riDx3J/EcyWJ5yoSzwNIPA8k8TyIxPNgEs9DSDwPJfEsJfE8jMTzcBLPI0g8jyTxPIrE82gSz2NIPI8l8TyOxPN4Es8TSDxPJPFcTeJ5EonnySSep5B4nkrieRqJ5+kknmeQeJ5J4nkWiefZJJ7nkHieS+J5Honn+SSeF5B4XkjieRGJ58UknmtIPNeSeK4j8byExPNSEs/LSDwvJ/FcT+J5BYnnlSSeG0g8ryLxvJrE8xoSz2tJPK8j8byexPMGEs8bSTxvIvG8mcTzFhLPW0k8N5J43kbieTuJ5x0knneSeN5F4nk3iec9JJ73knhuIvG8j8TzfhLPB0g8HyTxfIjE82ESz0dIPB8l8XyMxHMziefjJJ5PkHg+SeL5FInn0ySez5B4Pkvi+RyJ5/Mkni+QeL5I4vkSiefLJJ6vkHi+SuL5Gonn6ySeb5B4vkni+RaJ59sknltIPN8h8XyXxPM9Es+tHnkmavbcpiyrom33Zvs4Yn5fY8zdSNor/sDg8PyQxPMjEs+PSTw/IfH8lMTzMxLPz0k8vyDx/JLE8ysSz69JPL8h8fyWxPM7Es/vSTx/IPH8kcTzJxLPn0k8fyHx/JXE8zcSz+0knr+TeMoCGTwTSDwTSTx9JJ5JJJ7JJJ4pJJ5VSDyrknimknhWI/GsTuJZg8SzJolnLRLP2iSedUg865J41iPxTCPxrO+Rp/MdeUXfaydojLkBSczpGmNuSLI/NkqoePplRSLhvOx4zEvPxgn6tnN5+5C/Yp3ZRKNnOkl5mqYaY84kibmZxpibkcTcXGPMGSTlplqQnMdbkni2IvFsTeLZhsSzLYlnOxLP9iSeHUg8O5J4diLxTCfx7Ezi2YXEsyuJZwaJZyaJZzcSz+4knn4ST5PEM4vEM0DiGSTxDJF4ZpN4hkk8IySeURLPHBLPHiSePf+D7wF7/Qdj7k2yP/bR8GzfjOXlxYOFQS+3jU9jzLmVtD/6K9aZfTW+d+lJ8q6pn8aYc0jeNfUnOVcMIPEcSOI5iMRzMInnEBLPoSSew0g8h5N4jiDxHEniOYrEczSJ5xgSz7EknuNIPMeTeE4g8ZxI4jmJxHMyiecUEs+pJJ7TSDynk3jOIPGcSeI5i8RzNonnHBLPGIlnHolnPolnAYlnnMSzkMRzLonnPBLPIhLP+SSeC0g8i0k8F5J4LiLxXEziuR+J5xISz6UknstIPJeTeJaQeK4g8dyfxHMliecqEs8DSDwPJPE8iMTzYBLPQ0g8DyXxLCXxPIzE83ASzyNIPI8k8TyKxPNoEs9jSDyPJfE8jsTzeBLPE0g8TyTxXE3ieRKJ58kknqeQeJ5K4nkaiefpJJ5nkHieSeJ5Fonn2SSe55B4nkvieR6J5/kknheQeF5I4nkRiefFJJ5rSDzXkniuI/G8hMTzUhLPy0g8LyfxXE/ieQWJ55UknhtIPK8i8byaxPMaEs9rSTyvI/G8nsTzBhLPG0k8byLxvJnE8xYSz1tJPDeSeN5G4nk7iecdJJ53knjeReJ5N4nnPSSe95J4biLxvI/E834SzwdIPB8k8XyIxPNhEs9HSDwfJfF8jMRzM4nn4ySeT5B4Pkni+RSJ59Mkns+QeD5L4vkciefzJJ4vkHi+SOL5EonnyySer5B4vkri+RqJ5+sknm+QeL5J4vkWiefbJJ5bSDzfIfF8l8TzPRLPrSSe20g83yfx/IDE80MSz49IPD8m8fyExPNTEs/PSDw/J/H8gsTzSxLPr0g8vybx/IbE81sSz+9IPL8n8fyBxPNHEs+fSDx/JvH8hcTzVxLP30g8t5N4/k7iaSRyeCaQeCaSePpIPJNIPJNJPFNIPKuQeFYl8Uwl8axG4lmdxLMGiWdNEs9aJJ61STzrkHjWJfGsR+KZRuJZn8SzAYlnQxLPRiSejUk8m5B4NiXxbEbi2ZzEswWJZ0sSz1Yknq1JPNuQeLYl8WxH4tmexLMDiWdHEs9OJJ7pJJ6dSTy7kHh2JfHMIPHMJPHsRuLZncTTT+JpknhmkXgGSDyDJJ4hEs9sEs8wiWeExDNK4plD4tmDxLMniWcvEs/eJJ59SDxzSTz7knj2I/HsT+I5gMRzIInnIBLPwSSeQ0g8h5J4DiPxHE7iOYLEcySJ5ygSz9EknmNIPMeSeI4j8RxP4jmBxHMiieckEs/JJJ5TSDynknhOI/GcTuI5g8RzJonnLBLP2SSec0g8YySeeSSe+SSeBSSecRLPQhLPuSSe80g8i0g855N4LiDxLCbxXEjiuYjEczGJ534knktIPJeSeC4j8VxO4llC4rmCxHN/Es+VJJ6rSDwPIPE8kMTzIBLPg0k8DyHxPJTEs5TE8zASz8NJPI8g8TySxPMoEs+jSTyPIfE8lsTzOBLP40k8TyDxPJHEczWJ50kknieTeJ5C4nkqiedpJJ6nk3ieQeJ5JonnWSSeZ5N4nkPieS6J53kknueTeF5A4nkhiedFJJ4Xk3iuIfFcS+K5jsTzEhLPS0k8LyPxvJzEcz2J5xUknleSeG4g8byKxPNqEs9rSDyvJfG8jsTzehLPG0g8byTxvInE82YSz1tIPG8l8dxI4nkbieftJJ53kHjeSeJ5F4nn3SSe95B43kviuYnE8z4Sz/tJPB8g8XyQxPMhEs+HSTwfIfF8lMTzMRLPzSSej5N4PkHi+SSJ51Mknk+TeD5D4vksiedzJJ7Pk3i+QOL5IonnSySeL5N4vkLi+SqJ52sknq+TeL5B4vkmiedbJJ5vk3huIfF8h8TzXRLP90g8t5J4biPxfJ/E8wMSzw9JPD8i8fzYI89Eh2fAnx0MxsNZcTNgxvxZ0bxIyB8M5WVHzIgZioQKsiKBQDwSjISjedGwP2oGA3GzMBQNFFrL7qQx5k8qKWZ/xTrz00R96dfDx7GdkzSm32ck+3ayxpg/J4k5RWPMX5DEXEVjzF+SxFxVY8xfkcScqjHmr0lirqYx5m9IYq6uMeZvSWKuoTHm70hirqkx5u9JYq6lMeYfSGKurTHmH0lirqMx5p9IYq6rMeafSWKupzHmX0hiTtMY868kMdfXGPNvJDE30BjzdpKYG2qM+XeSmBtpjNkgeR7WWGPMCSQxN9EYcyJJzE01xuwjibmZxpiTSGJurjHmZJKYW2iMOYUk5pYaY65CEnMrjTFXJYm5tcaYU0libqMx5mokMbfVGHN1kpjbaYy5BknM7TXGXJMk5g4aY65FEnNHjTHX1hgzFvVHGZ9tVsBdQQbIBN1Ad1kHMEGWpAMIghDIBmEQAVGQA3qAnqAX6A36WHH3Bf1AfzAADASDwGAwBAwFw8BwMAKMBKPAaDAGjAXjwHgwAUwEk8BkMAVMBdPAdDADzASzwGwwB8RAHsgHBSAOCsFcMA8UgflgASgGC8EisBjsB5aApWAZWA5KwAqwP1gJVoEDwIHgIHAwOAQcCkrBYeBwcAQ4EhwFjgbHgGPBceB4cAI4EawGJ4GTwSngVHAaOB2cAc4EZ4GzwTngXHAeOB9cAC4EF4GLwRqwFqwDl4BLwWXgcrAeXAGuBBvAVeBqcA24FlwHrgc3gBvBTeBmcAu4FWwEt4HbwR3gTnAXuBvcA+4Fm8B94H7wAHgQPAQeBo+AR8FjYDN4HDwBngRPgafBM+BZ8Bx4HrwAXgQvgZfBK+BV8Bp4HbwB3gRvgbfBFvAOeBe8B7aCbeB98AH4EHwEPgafgE/BZ+Bz8AX4EnwFvgbfgG/Bd+B78AP4EfwEfga/gF/Bb2A7+B3IAZYAEoEPJIFkkAKqgKogFVQD1UENUBPUArVBHVAX1ANpoD5oABqCRqAxaAKagmagOWgBWoJWoDVoA9qCdqA96AA6gk4gHXQGXUBXkAEyQTfQHfiBCbJAAARBCGSDMIiAKMgBPUBP0Av0Bn1ALugL+oH+YAAYCAaBwWAIGAqGgeFgBBgJRoHRYAwYC8aB8WACmAgmgclgCpgKpoHpYAaYCWaB2WAOiIE8kA8KQBwUgrlgHigC88ECUAwWgkVgMdgPLAFLwTKwHJSAFWB/sBKsAgeAA8FB4GBwCDgUlILDwOHgCHAkOAocDY4Bx4LjwPHgBHAiWA1OAieDU8Cp4DRwOjgDnAnOAmeDc8C54DxwPrgAXAguAheDNWAtWAcuAZeCy8DlYD24AlwJNoCrwNXgGnAtuA5cD24AN4KbwM3gFnAr2AhuA7eDO8Cd4C5wN7gH3As2gfvA/eAB8CB4CDwMHgGPgsfAZvA4eAI8CZ4CT4NnwLPgOfA8eAG8CF4CL4NXwKvgNfA6eAO8Cd4Cb4Mt4B3wLngPbAXbwPvgA/Ah+Ah8DD4Bn4LPwOfgC/Al+Ap8Db4B34LvwPfgB/Aj+An8DH4Bv4LfwHbwO5DMRAJIBD6QBJJBCqgCqoJUUA1UBzVATVAL1AZ1QF1QD6SB+qABaAgagcagCWgKmoHmoAVoCVqB1qANaAvagfagA+gIOoF00Bl0AV1BBsgE3UB34AcmyAIBEAQhkA3CIAKiIAf0AD1BL9Ab9AG5oC/oB/qDAWAgGAQGgyFgKBgGhoMRYCQYBUaDMWAsGAfGgwlgIpgEJoMpYCqYBqaDGWAmmAVmgzkgBvJAPigAcVAI5oJ5oAjMBwtAMZD26qUteGlnXdowl/bBpe1tadda2oyW9pilrWNpR1ja6JX2b6VtWWm3VdpElfZGpS1PaSezFEj7jtJ2orRLKG3+SXt60ladtAMnbaxJ+2XSNpi0uyVtWkl7UdIWk7RzJG0ISfs80vaNtCsjbbZIeyjS1oi04yFtZEj7E9K2g7SbIG0SSH3/Upe+1FO/Bkj96lJ3udQLLnVuS33WUle01MMsdRxL/cFSN6/Ueyt1ykp9rVIXqtQzKnV4Sv2YUvek1OsodSZKfYRS15/Uoyd11En9b1K3mtRbJnWCSX1bUpeV1BO1CUj9RlJ3kNTLI3XeSH0yUleL1IMidYxI/R1SN4bUOyF1Okh9CVIXgXznL9/Qy/fp8u23fFct3yzL98Dyra18xyrfiMr3l/Jto3w3KN/kyfdu8i2ZfKe1Bcj3RfLtjnwXI9+cSH5XvpWQ7xCkjL+Un5ey6VJWW8pBS1leKdsqZT2l7KOUBZSycVJWTMpOSVkiKVsjZU2k7IWURZB38/KuWt7dyrtMebcn77rk3Y+8C5F3A/KsXJ4dy7NUebYoz9rk2ZM8i5FnE3KvLveuci8n9zaS10/8MwthSFll6boaOzrr9CKr+GO6lO2Vsq5S9lPKQkrZQCkrJ2XHpCyVlC2SsjZS9kTKYkjZBHlXL++u5V2uvNuUd33y7kveBcm7EXlXIM/O5VmyPFuVZ43y7K01aAPaArl3l3tZubeTex0pP58OOoMuxq5dstJf3/ptsLVvkyWb1w9U52tdzrT21u/G3LXrOm9YPUCd1qWc/2WWMS3F+s22flOt30TrV9Ja0jnXGvZXrDNTleXqXn4Ed6epxs6dZv9AqrJMD5afZS8/yZvl/1E+Wrr+pTsv33Cs1+eYz+0/Na3+BGPXeew4vNiPsJ2DHqeTaS8/xZvlB+x0U88JPpeY7PXXNHbeVvZ0t1/D2HmbGo51VTM83YfN8mJT/e19o45jfmcalLWs5H+4rL25TdW0VrfpH/OU7piW6JiWpExLdkxLLt01Rrn+tVTmczsG7fk6O9LFy3OyV+cC6dJc/NV1SVel1Pirs9PAp4yz09JO26rq/I5pqcq0pNKd11PNGk5S1qMuy/ZIdsyfbg3Xtn5TlP/Y/6/jsv4Ux/p38nYZ50yXVJf5U13ml322jdUv+SrZf/zKssra7xONXZdV29j1GLf/6/ExmpVg7Hoecp5P1PVL/rGB1b9s+eKl8aGLBq6M55csL1q8qH8sf15cPek6F2K4BG9PS1DGl3URdv7Hp8yvdtWNHRm3pNKd58+1xvsr0IUjfr+9TvtgSDZ2TkTDsf5kx/wha7iaEo8ab+4eehaGY2ZhIFYYC8UKCoL5sXqO5RvGjnSUdJpm9ZNndGOVldH16ED866JQxZvlu2Z01Vjs6fY+PKB0R1oOKN3ZyZ5nkDLPoDLmGazMM1iZR7ryMszOi7Xq4Zb5G+iYlmTs6mZPU0/MtpOcwOsrXtINKd3hm+CYNlSZZjt6eTOEfTzicSY/K80o+9wr6dPD2Dkd7f3HnldNA4/240CCY32G4Z65t9dfzfD0uP0rc1/F4eNMH3sfkQtomtWfHysuHrO0aEVseXxQyaJ8uYaqIaiLTXQJsaxLqrp7O+dzHlLOw8h56KiHi7rcsv7vHGevu7axa540xeHo3KTOcc57Guf/pXM7pSSU8Wuvx9jNetyc3U5Pe7oej5+h+Os4XNV1eXxKCbmdcg1HGpa3HdXTiPMYMFzS11DmUU9dfZXlOudz+rjdm7rliZ3by+15xe7ufZ3pnlrGenKtYX/Fumy3U7czfjXNndujqjLtn24PO6Z/uj3UNKrimKYeaz7HNNXPXgbDrUGuNby3bw3US35tY9d913luV7eT89zm9f2rvV/Yae30SVGmq/MPsX4l1gmO2NRjpLzndU4HdX417iRHeqnHeJXKSa9ysytu6WXPbx/3KWXMr6a/Ov8Y61eGJ1v9btdVn2Naosuy3Y55Ow1lf9V9vMQj0QJ/tDAeM00zq8Af393xonv9wVAsnB8Lm2Y0aMaDZmh368+w+ve9syq3C3j8/NX0Oj/ndivvlrcr7/Zajkd1f1KXYRjl5789vs31/F3WP33P4HNMS1amqXnMZo708fpdn1fvq9KMsvcpibOjkh7O/SbBkQZevRdOcKzPMNwfA9jjqnm4TfzKddXtObrbM395DNDQ6i9eHCsYtHTxQvcH6QkuKen8VVPBbR7nfM753a6s6pXFHv9vf2vUwRr+N781st9GMtyJ2KWM9vadiP1gljxnE9yXsym/05WzqW6N8/hNfnBvvsmXOGtZ/erVZNHi5UWFq/ovjeOpcsGokuLiosKi+FLnlaCsZzd/94rBcPayH7Pv7bPX/0lZwjB5WUKv7yv2lSX8e53Xr9L3lSU09pUl/I+UJQzvK0u4Y/6y7gr3lSW01m14eozuK0u4J93/U1nCFlY/eUY3uq8sYfndvrKEuy9LmKZ4SedWltDjjHxkb78oaGT1y4m+idUfX7SkJF4SH1OSV1yUb5d66x8rLnae7NUdSu3+jaXb3J6f2/4MF5Dm1vDevoD8D20d8ojYWAIA",
|
|
1802
|
+
"debug_symbols": "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",
|
|
1803
|
+
"brillig_names": [
|
|
1804
|
+
"store_in_execution_cache_oracle_wrapper",
|
|
1805
|
+
"call_private_function_internal",
|
|
1806
|
+
"load",
|
|
1807
|
+
"notify_created_nullifier_oracle_wrapper",
|
|
1808
|
+
"store_in_execution_cache_oracle_wrapper",
|
|
1809
|
+
"enqueue_public_function_call_internal"
|
|
1810
|
+
],
|
|
1811
|
+
"verification_key": "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"
|
|
1812
|
+
},
|
|
1813
|
+
{
|
|
1814
|
+
"name": "public_dispatch",
|
|
1815
|
+
"is_unconstrained": true,
|
|
1816
|
+
"custom_attributes": [
|
|
1817
|
+
"public"
|
|
1818
|
+
],
|
|
1819
|
+
"abi": {
|
|
1820
|
+
"error_types": {
|
|
1821
|
+
"12737498021964987455": {
|
|
1822
|
+
"error_kind": "string",
|
|
1823
|
+
"string": "unauthorized"
|
|
1824
|
+
},
|
|
1825
|
+
"16541607464495309456": {
|
|
1826
|
+
"error_kind": "fmtstring",
|
|
1827
|
+
"item_types": [],
|
|
1828
|
+
"length": 16
|
|
1829
|
+
},
|
|
1830
|
+
"16761564377371454734": {
|
|
1831
|
+
"error_kind": "string",
|
|
1832
|
+
"string": "Array index out of bounds"
|
|
1833
|
+
},
|
|
1834
|
+
"17843811134343075018": {
|
|
1835
|
+
"error_kind": "string",
|
|
1836
|
+
"string": "Stack too deep"
|
|
1837
|
+
},
|
|
1838
|
+
"206160798890201757": {
|
|
1839
|
+
"error_kind": "string",
|
|
1840
|
+
"string": "Storage slot 0 not allowed. Storage slots must start from 1."
|
|
1841
|
+
},
|
|
1842
|
+
"5019202896831570965": {
|
|
1843
|
+
"error_kind": "string",
|
|
1844
|
+
"string": "attempt to add with overflow"
|
|
1845
|
+
},
|
|
1846
|
+
"5444967152290923376": {
|
|
1847
|
+
"error_kind": "string",
|
|
1848
|
+
"string": "Function is_consumable can only be called statically"
|
|
1849
|
+
},
|
|
1850
|
+
"6304245522015439386": {
|
|
1851
|
+
"error_kind": "string",
|
|
1852
|
+
"string": "Function _set_authorized can only be called internally"
|
|
1853
|
+
},
|
|
1854
|
+
"715723737710351018": {
|
|
1855
|
+
"error_kind": "string",
|
|
1856
|
+
"string": "rejecting all"
|
|
1857
|
+
},
|
|
1858
|
+
"9474245853673257536": {
|
|
1859
|
+
"error_kind": "string",
|
|
1860
|
+
"string": "Function is_reject_all can only be called statically"
|
|
1861
|
+
}
|
|
1862
|
+
},
|
|
1863
|
+
"parameters": [
|
|
1864
|
+
{
|
|
1865
|
+
"name": "selector",
|
|
1866
|
+
"type": {
|
|
1867
|
+
"kind": "field"
|
|
1868
|
+
},
|
|
1869
|
+
"visibility": "private"
|
|
1870
|
+
}
|
|
1871
|
+
],
|
|
1872
|
+
"return_type": null
|
|
1873
|
+
},
|
|
1874
|
+
"bytecode": "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",
|
|
1875
|
+
"debug_symbols": "7V3bjhy3rv2XefaDSJGilF/ZOAicxDswYNiB4xzgIPC/n5pLV7enVSVTKk5J3fVizHhqLS6yVLqL+vfhjw+//fPnrx8///fL3w+//Offh09ffn//7eOXz9Nv/35/9/Db14+fPn3889fL/35wj/+E9PT833+9//z469/f3n/99vCLx3cPHz7/8fALuQn934+fPjz8EvD7/7x7kKh7Pnrl80r+pORPSn5wqAWIEgBaC6C1gKAFBCXAOy2AlQBVQXp39eD0Htm/PDv9nGh+PLpnfrHlT2jMb6sfHRrzG+sHZYFDUNaMiKQFKOsi9KgFKGsKJNACtGFlpwVQU8GIkF6ejP5cKDyGZ/JkSB68JbkYkgtYkgdD8mipPLIleb4ogosvID81/GeUk4yFn5fiZJYiV1IS9SOlm6h4Z/g5excNyQEtyQ0/Z4/Oktzwc/beUrknS/LGorj6EZG3JBdDcgZL8mBIHiyVB7Ykb+ueQUjuNCYQ97pn6cWbskdL9oim7MGSPYEpO5uyW5ZIcmTKbqodWidoWObxu/D6wxQQTrwB0/eLsX6mivGCcx0T5fuPEwME2e8UXAgnOQBhBgHnTECcH05xfnbq0rf0Rh+nMeaIcHgdb8RBdcuYuv2g8faDxpsGjTeFMXXnJ+YG0M2D6k4b6ObTw9P8/BvpDjSo7jimbsFBdcuYuuOg8Y5hTN0p3+5AOvXwASkWdE/DsllMWlcj7qRbIJVot3KRb91Fdjf/Fjk/RX9TLjaP4S/YI5Qe3qaH9qRbxtSNOKjuQePtB423HzTeBIPq5jF1sxtUN3Wre7FH/KQ7jak79NvOr+vutx5c1S39tjvrugeNd+y33VnXnW93FIMGOS3RycVKF3DcbNBQDMfKeOjRxfxw/7ZcvPm3GBb2wt2Ui3GzOgQcvBpphw1H2jl2sWRHMGVnU/Zkye5N36o3fauEpuym2rm1RHKA87RYPDfiz3tEQuP2vCJ/cMb8bMsvxvqj8lhKSMpTJgK2x8sEbI83CaIxv7F+b6zfG+vXnoMS0h68Vc2RPAGUx8skoBagPF4mAlqANqxR++HHtqmn1a30Eg2Pl0nyluSGx8uiA0tyw/MoESyVA1uSNxbFtX36EcmS3PA8SmxsdwrkhudRIlkqJ8PzKLF1lWJ1H3psXUsosFvuoY/Bm7KLJbugKbvliZQYTUtktDyREpOp9tT4NRHRiZ0Crj+84amO2HpOhxBn3eRLg4PNVkJT4yHj/XTHMXXDoPGGQeONg8a7df5jL90eBtUdxtRNrlvdayvPqXXH0266+23nV3Vzv/Xguu5+251V3WHQeId+251V3QszvXtvEFCFY32DQFoYkt6Si/H23+LCFP0tudg8hr/QIq/X3tOWI+0rdnBbDohz9GJKD2BLz7b0tq8WbV8tRlN6b6tem7oTnDZ354TQpvl1bLvRY/o/tjaQjA0EsjZg7YF2DX1CKDczAIBxOmSAYGygfRdkyYC1B97aA2/tAZG23JE2/zuwVyPUGeADqBHaqhvEqRHq6Iq6HoiGm1gm9mjJntCU3XAfC6BzpuxsyQ6m2oFM2fNJBITm7c3CF7PKj0O/Bi1r2zAA8/3vnbR0FBdv+V2jF0t2AlN20++akiU7m37XbKrd8iYBWLpKYIcc64ALu4j20dJRXKJlzlxA0y1KgKZ7lABbJzhL9JaZnKH1XoEivZjSA9jSB1N6tFXfeJYR3Tyxj9N8QGm0vNkuhkl4GlR4480IOwofNeI0asRp1Ig37h3ZUbgMKjzgqMJDt8LXto+Ab7yBbEfh/Tb5BeH9VofrwhtPcO4ofNSIp34boIJw6XGzjy4e65t9gBYuar0tH+/gPUKXWaS29bHxer8fxPirPTS05fA7R59M6b23pRdTegJbettXy7YFk43V2xbM0FowI53p/TV9NKWXYErfOFGP06rsiX5azFt/eMMDs0CNd/4hzve3IUphxzIznbxkZl8QznBqyCLjtfDUGvF4alLROyoIl3nxhwWkJPwccY7xWnhjxCHOn6kvFZWp2LrZTRfxIvU/Panhxh0hW6vhntRAV7GBrmKDXcWmMRPN1mpiT2paO5Qbq5Ge1DRm09laTVctQ2N2za3VvGntJ+GsJjm5VJNp8MO8XS2GdO7WYMh1D0gcn0QLXO7L8c+eBnc3ntLdeJruxVO5m3cqd/NO49280xjvxdOEd+Op3ImnwcHdeBruxVO4l95ggHvp4Qe4l55DeNt5mV09vZeeQ/D30nMI/m56Djc0u5Jk9vRia+Tsqfhb8fQ8Y0YRMeNpz6V33s8SxYeCp5HmW4AiiRSe9vNeMEJ38WzWxTQv6uLFrpaX01ch9VynjxBBcT1/bWNE8PiKGyMIPY+Kx4hgz6PtISKIRxlsjWDPPdQxItjzrMMQEfRHb6Y1gkdvpjGCdLQkrRE8WpLGCHLPaxJjRJCOCDZG8JibaYxgOHozrRE8ejONEZSjN9MawWNupjGC8ejNtEaQjgg2RvCYm2mMYDp6M60RPHozbRGMruedMWNE8OjNNEaw6/2iY0TwmB9sjOCxTlKM4OTYHEHiqwjyMS4uRVDm7OYo3l9H8GhJGiPY9TnUMSJIRwQbI3jM8jdGUI4xSWsEj5akMYLx6M20RvAog40RTEdvpjWClIvgVnnL3zW8G3+Otk/h8uFn4XFM4Sl/emIE4aNGHEaNOIwaccRRhYdBhefv/x1BOG8gfDFTvKFwcqMKp1GFx0GFsx9V+KgRDziq8HwDtJJ8PyNGca+AOwmfxgkl2q18zO8PvDEf7+A95neI3ZiPjXu4LugJCpnUt7wtLLVundpPeBxSODo3ZsQn4aNGHEaNOMigwluPvO8nPAwq3Ltuha/dzzYJ51GF99vkrwunfqvDgvB+G6B14TxqxLnfBmhdeIAub9JTxWP9Jr3Jx3D7PsodvMeFXPI35WPrKbFLMR5fDb8n+mRKv+UgOUcvlvTgwJaebelNXy0A2dLbqkdvS99YMIl5phe4om/t+hfoN1l5M1nrpHS6URAZ+Vo4jSo8DSq835W3kvBuV94KwvtdeSsJD4MKFxhV+KgRj91u/SgJpxtYsSv5mG7fx3T77xHz5+5vzMfWfvgFPeH3LafhVlclsDX99n7Cw6DCcdSI46gR96NGvHn4vZvwNKhwolGFx26Fr64DYevK237C+23y14WHfqvDgvB+G6B14TJqxKXfBqggvM8VO1U8Cit2uLBid1s+3sF7XFhcvCUffWvuvUsx4WoZzG85/M7QbzlIztGzLX0ypUdvS2/7ar3tq/XBlJ5s1avu4nhCqG5OeEYkLSKobQS1DdU9pM+IqEVEtY2otpFQjRAlglS7V54RQYsAtQ1gNaKtngTHYW4EHcdzDzY+N4LUeN32TxiIxgYaU0f+hAFrD0hbFRBrPzpqTEkFbpoUmZ3ARFdONGZs+gkDbGygMd/PTxgw9oCdszZg7QFo2x8GbdvAiGqEtm1g1cGaZwSrEdpqg0kdXdJWNMxto6o4Z5SK/vLW+fDCLpbsjbOQJXY2ZU+W7EKm7Kbaozdlz5ZIEDqhHi8em2FTb6JlAiQ6mbXItZZ8z3onLf3EJTjL7zo03kBQYG/Mzl9iJ1P2aMmO3pTdVLtHU/Z8iQR3mlmZZg8vPpPHbJNm397CdNA+WjqKC5t+18ym7JbtdQim33Ww7EEGMf2uxVR7NG0lG4fvha+pcexeYidT9mjILo2JY0rsptoBTdkbp8SmQjd3Zd3VQFjQ2dKzLX0ypW+dtC3RR1N6Qlt624LZeFNQkd5WfTD7rK4fpoCnmfvpx/OOh5jb/TPVMThXNxd7Hl6mNiXwGwonOlV9RBxKwh3PwhGuhIttRSa2FVm0rWlir1m0yTHNj8arc86Ses2iXRQuYwpfuOtzBOGjRhxGjTj0mim+JBx7zZ5QFM6jCt8ie4LFceGScE+jCu81e0JJOPWaPaEoXAYVzqNGnHvNnlASnh8ejnWwu+gj376PcgfvMb8997Z8bBx+/0B/sV9sYXvZdodXY5RBhSccVfigEU9u0IgnN2rEGw8/7SicBxXeuJq1o3DqVvjqceHUuAK3n3Dfb5NfEN5vdbgunPptgArCR40499sAFYTnG6CdD3br4lE42J0Wlohvy8c7eI8LB15vy8e4WUUCQK+H32nD4XeWXkzpE9jSsy19MqT3rTfCFenFlB7Qlt5WPbYedl0/EuxbbxQrG/DO2gAbGyBrD1h5vt+74LQIaT1bvn6g1ruI1gbE2ECy9iAZewDO2AMAbbnTXWDyjEhaBHo1QrQIj2pE0CJIHV1tjhoPZHiixoMqA46ePVqyBzRlD5bsAqbsptqjM2WnXk4H+6Wc/rtoSR3FJVkeovDo0JZeTOkBbOnZlN70bNJET7b0tgXT9GzSRG+r3u5s0vXD07OnGiQk9Jf90uuHkwsnEclFft2JRbL9YNm2ugm2X1Tj4SGi80EmesMc8JPwNKjwxow3OwofNeJx1IjHUSPeeEPtjsJlTOGtOad3FB66Fb624O1b82TvKLzfJr8gvN/qcF1461ax/YSPGnHfbwNUEN7l/Qi6eKxvTfB+YSR5Wz7ewXvsdMvXpj42Dr9/EBNen2KZ6NmWPpnSi7elF1P6CLb0tq822RbMZKzetGBS4xYm5lPeRpYz+WPaxmd2Ze5qT9rs4xNCbUO9Kk7qVXFSr4qTV9sgtQ3SrryTegcOsXblndR7dijobWj3TpDYXmoxGYjGBpo3HhUNiLGBZOwBO21VwKD96NjbXgkxGSBrA8nYAFl7QNYesLUHQV3ugrayZwE1gtUIbUXMqkWJZ4S2S8BJHV3thVjeNAW+N02B701T4HvTFPjeNAW+N02B701T4HvTFPh+IQX+LhupFlLg76Slo7iw6XdtmQLfm6bA96Yp8L1pCnxvmgLfm6bA96Yp8P1SCvwdrp/wSwnz99HSU1ws85771mz8RXrTvYWt+fiL9MGUHsGWnm3pbQtm6zC+RG+rnsw+q+uHt9z0KmT7wbJtdRNsv6jQbRbk5ObF0+TDlXDpNgtySXi3WZALwuOoEY+jRjyNGvGFI1YDCO/2qol14THf6R1BeLd5pwvCodu80yXh3eadLgjf5OKDXYTzoML9qBHv9+KDkvBbyFdd8DE/krwxH+/gPS5cYHBTPjYOv3+gZ18Yq294mCi2bqfdTXjjVXg7Ch814nHUiMdhI54GFd56mnU/4XFM4c0XHxgKXz2+1XzxwW7Cod8mvyC83+pwXTj22wAVhA8b8X4boHXhvs981ap4FA7apYXsRTflI93Be1w4WnNbPobtKhLB18PvtOXwO0fPtvTJlF68Lb2Y0kfbVxttC2ayVZ9sC2bjDrzVQ6HkHOlOTkyIpEWA2gaobWiPkU6IqEV4tQ2vtqE9RjohRIvQHiOdEEGLCGob2mOkE6L1HNn6gURyjTnvfsJANDYQvbUBaw+StioAdZUG6ipNnS+e1PniCVBtA9U2vNqGV9sgtQ1S22C1DVbbCF6N0Fb/IGoborYR1TaitomBBGqEtolB59QIViO0pQTVNQNqc2YQqjs7qM2ZQajNmTEh1G+QQI1Qv0FWlxJ1XYLqugTVdQmq6xIU9RsUdSmJ6jcY1aUkqd9gUpcSdS/Dq3sZXpt/h7w2/86E0L5Bj6hGtI3WZd4Zcp4m4xdqD3bUyYy6MWHGKnU0o248C7NKbae68fqbNerGPSFr1I27Nlap7VQnO9XJrA4hh3bUZuVal2pNSW2nGu1Uo5hRe7sS0pjCYRoLnGZD0BMUHnYSTjPH00DFndUEyjwew7yYFeVi9ySG3NJunPpEp6fpwtH8035eCJ6GTBfP5lR7Ny8a+4urRJ8PnBM1pqk4IkjhKIOtEYxHBNsi2LjceUSwNSHlEUGKRxlsjaAcESxEEBPOLjq+imBjztQjgtQ4UjwiyO7oD7ZGkI4INkbw6M00RhCOlqQ1gkdL0hjBxoxxRwQZjzLYGEF/zA82RrAx/b5tBOe8y1MwfSEmJOmUeXD68XzgwaN/9pR7ngFQeRphfv0RIeNpz/2rTT0Nd/NOpefWdltPe24VdZ4iz57+kPL6xdN4O++05OndvNPU8+zAtp7eTM+h4GnoesZnW0/v5p3C7fQczicGI2LG09vpDRY8xbt5p/52eg4lT2+n51DwlHqe093W09tpZQqeNt49OJCnXe8z29bTnuccN/VU7uadyt18p13vJNvSU8mnW+B4cpWjvwA9T4dLvhEugbJ9lACnHEDhYvp/BuXzLpRANZYC1YBSBUhqLEmNpfx2Pk6n9CbBSQYkFaD8pq0SqMJSdFgDqrGUT5RYAmXbvTAvRQXBa1A+QWAJVGPJ11jK1xEFUD4DWgkkFaB83hSZ92kKnBf0Tkl8Yv5iqAJIaixJjaX86bcL0MWtYWcQV4BShaWUzwpgtzwLiU4tJAJePvwkJ79FYDc5+XmH/eT09bLyp4p3k5M/ibyfnL6ik98OsJ8c6UpO6OtDD3196KGvoix9FeX8EHM3ORH7ktNXi576+tBTXx966ulD54X8nPvJ6elDZwc9feiTnJ5adHbY04c+yenpQ2eXnz3YT05fH7rv60Onnvo77OSNv6xp4n2WQ3wlJ75xmyUwz/GL91dyEvUlJ/YkBxz2JSd0JQdcX3K6KsoLSYR3k4N9RQf7+tDpjb+s1WQODAx9yekrOoH6kpO6kiN9RUf6ik58487p6vm+SU7sSk7CvuSEnuQsJDHfTw71JaeroozQVVHGt55uKsjBvqLz1gvXBTn5nILgcb5v0fN5oiF/b5xE8S9PS7zYlhazu+XS6TjMNEEwPzo1Zc968itIWj1+3lkROa7rkeBPkZeQ3PrDMI28TuGcfv7R1yf9+f0hq9v2JlCqAOXvUV7drTaBoh7kXYUlD1ADChUgrLGENZbyc7Oru9UmENWAUgWIaixRjSWusZRPBlAA5ROrr+5Wm0BSAZIaS1JjKXIFKLkaEOlBC+nEf6j5gpSqYB/nJoEcFapgmGs6wYuD+AtVsPN+FuLC66u5mPKTY1r95yaNIK1L4tnX4NxVk0b52bH99GBn8clvOOK5xZ86Ba+7LZSvFgqYoMfkV1QKmAo7scJOrLCTr0UKGKrAJDWG892MAibqMbCwu/20lhWuV9YWkrStYxAqMBV2fIUdX2GHXAWGKjBJj2FfgYl6TKgoO0HUmJDvPRem9kP+YASEMDeYIcIVKn8yooiqspW/q7aIijWo/AkqEJmHkpL4GiU1qPwqRhHFVahUg8onqCqiqqIhVZGXKluxKvKxKvKxKvKpKvKpJhrioApVEw3Jr4kXUfneZ4K595kwg0o1KKyyhVW28vvU1+dwJHANSH9MkWsORHLNgUheONtYAOVXY0qgCksLZxtLoKCfuojgakBcAcIaS1hjqWYGLNbMgNUciOSaA5ETqMYS11jK1xElUKgAiX62KLj84APc3Omcplviq4ovLGxYLaIWJiEu5nYYrlGpBkVVthirUFKDyheMaR6GZ1S8jmG+ZJRQC50YcqcacPrxWuFCJ6aEkgoULHRiSqh8J2ZacTuhpumCK9RCJ6aEqrKVzwpWRMUa1ML3VUDlb74uokINauH7KqGkBhWqbC18XzzftAic8AolUIWqshWpCpVqUAs1QAklFSh0NTHEhW/Znzvu3sM1iqtQqQa1UAOUUFKDyk8LFlFV0aCqyFOdrarIc1XkuSryC625J5lRwV2jQg1qYaqlhEo1qIXapoBKrgrFFSjvXBWKKvobfmGZtIDKLz4UUaECxfmaTc77XchfYfITtGleG0zM1xjRY/I9jQKGKzCpYnTC+f0NRVSsQS1MzJZQVbakypZU2YpVtmKVrVT1vlKNreB8FUpqUPlloCKKq1A1X0rIT7Gu1jEhP6JJ7rQglvAaU1EvLSzKrNvJL8kUMEmPyX/1BYy+nl1YiilgKuxEfd0c8j2DAkZvR5yrwGTLdeJTuU6C15ikx0CFnfyO5gJG9BhfYcdX2Cn2BXKYoH+nDBWYCjv5Q1sFTNJjpOJbiFiB0dcHknwFJqox0fkKjN6fhUSVBQxXYJTl4Pv02/++//rx/W+fPvw9IR7/+M/n3799/PL55ddv//fX6S+/ff346dPHP3/96+uX3z/88c/XD79++vL7498e3Ms//wGP/G4aMIVJzWNoYRqlvwNknn5/ml9Jkd+l5B5/hae/O5n+7tKkZFLz/w==",
|
|
1876
|
+
"brillig_names": [
|
|
1877
|
+
"public_dispatch"
|
|
1878
|
+
]
|
|
1879
|
+
},
|
|
1880
|
+
{
|
|
1881
|
+
"name": "is_consumable",
|
|
1882
|
+
"is_unconstrained": true,
|
|
1883
|
+
"custom_attributes": [
|
|
1884
|
+
"public",
|
|
1885
|
+
"view"
|
|
1886
|
+
],
|
|
1887
|
+
"abi": {
|
|
1888
|
+
"error_types": {
|
|
1889
|
+
"16761564377371454734": {
|
|
1890
|
+
"error_kind": "string",
|
|
1891
|
+
"string": "Array index out of bounds"
|
|
1892
|
+
},
|
|
1893
|
+
"17843811134343075018": {
|
|
1894
|
+
"error_kind": "string",
|
|
1895
|
+
"string": "Stack too deep"
|
|
1896
|
+
},
|
|
1897
|
+
"206160798890201757": {
|
|
1898
|
+
"error_kind": "string",
|
|
1899
|
+
"string": "Storage slot 0 not allowed. Storage slots must start from 1."
|
|
1900
|
+
},
|
|
1901
|
+
"5019202896831570965": {
|
|
1902
|
+
"error_kind": "string",
|
|
1903
|
+
"string": "attempt to add with overflow"
|
|
1904
|
+
},
|
|
1905
|
+
"5444967152290923376": {
|
|
1906
|
+
"error_kind": "string",
|
|
1907
|
+
"string": "Function is_consumable can only be called statically"
|
|
1908
|
+
}
|
|
1909
|
+
},
|
|
1910
|
+
"parameters": [
|
|
1911
|
+
{
|
|
1912
|
+
"name": "on_behalf_of",
|
|
1913
|
+
"type": {
|
|
1914
|
+
"fields": [
|
|
1915
|
+
{
|
|
1916
|
+
"name": "inner",
|
|
1917
|
+
"type": {
|
|
1918
|
+
"kind": "field"
|
|
1919
|
+
}
|
|
1920
|
+
}
|
|
1921
|
+
],
|
|
1922
|
+
"kind": "struct",
|
|
1923
|
+
"path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
|
|
1924
|
+
},
|
|
1925
|
+
"visibility": "private"
|
|
1926
|
+
},
|
|
1927
|
+
{
|
|
1928
|
+
"name": "message_hash",
|
|
1929
|
+
"type": {
|
|
1930
|
+
"kind": "field"
|
|
1931
|
+
},
|
|
1932
|
+
"visibility": "private"
|
|
1933
|
+
}
|
|
1934
|
+
],
|
|
1935
|
+
"return_type": {
|
|
1936
|
+
"abi_type": {
|
|
1937
|
+
"kind": "boolean"
|
|
1938
|
+
},
|
|
1939
|
+
"visibility": "public"
|
|
1940
|
+
}
|
|
1941
|
+
},
|
|
1942
|
+
"bytecode": "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",
|
|
1943
|
+
"debug_symbols": "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",
|
|
1944
|
+
"brillig_names": [
|
|
1945
|
+
"is_consumable"
|
|
1946
|
+
]
|
|
1947
|
+
},
|
|
1948
|
+
{
|
|
1949
|
+
"name": "_set_authorized",
|
|
1950
|
+
"is_unconstrained": true,
|
|
1951
|
+
"custom_attributes": [
|
|
1952
|
+
"public",
|
|
1953
|
+
"internal"
|
|
1954
|
+
],
|
|
1955
|
+
"abi": {
|
|
1956
|
+
"error_types": {
|
|
1957
|
+
"16761564377371454734": {
|
|
1958
|
+
"error_kind": "string",
|
|
1959
|
+
"string": "Array index out of bounds"
|
|
1960
|
+
},
|
|
1961
|
+
"17843811134343075018": {
|
|
1962
|
+
"error_kind": "string",
|
|
1963
|
+
"string": "Stack too deep"
|
|
1964
|
+
},
|
|
1965
|
+
"206160798890201757": {
|
|
1966
|
+
"error_kind": "string",
|
|
1967
|
+
"string": "Storage slot 0 not allowed. Storage slots must start from 1."
|
|
1968
|
+
},
|
|
1969
|
+
"5019202896831570965": {
|
|
1970
|
+
"error_kind": "string",
|
|
1971
|
+
"string": "attempt to add with overflow"
|
|
1972
|
+
},
|
|
1973
|
+
"6304245522015439386": {
|
|
1974
|
+
"error_kind": "string",
|
|
1975
|
+
"string": "Function _set_authorized can only be called internally"
|
|
1976
|
+
}
|
|
1977
|
+
},
|
|
1978
|
+
"parameters": [
|
|
1979
|
+
{
|
|
1980
|
+
"name": "approver",
|
|
1981
|
+
"type": {
|
|
1982
|
+
"fields": [
|
|
1983
|
+
{
|
|
1984
|
+
"name": "inner",
|
|
1985
|
+
"type": {
|
|
1986
|
+
"kind": "field"
|
|
1987
|
+
}
|
|
1988
|
+
}
|
|
1989
|
+
],
|
|
1990
|
+
"kind": "struct",
|
|
1991
|
+
"path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
|
|
1992
|
+
},
|
|
1993
|
+
"visibility": "private"
|
|
1994
|
+
},
|
|
1995
|
+
{
|
|
1996
|
+
"name": "message_hash",
|
|
1997
|
+
"type": {
|
|
1998
|
+
"kind": "field"
|
|
1999
|
+
},
|
|
2000
|
+
"visibility": "private"
|
|
2001
|
+
},
|
|
2002
|
+
{
|
|
2003
|
+
"name": "authorize",
|
|
2004
|
+
"type": {
|
|
2005
|
+
"kind": "boolean"
|
|
2006
|
+
},
|
|
2007
|
+
"visibility": "private"
|
|
2008
|
+
}
|
|
2009
|
+
],
|
|
2010
|
+
"return_type": null
|
|
2011
|
+
},
|
|
2012
|
+
"bytecode": "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",
|
|
2013
|
+
"debug_symbols": "1Z3dTvM4EIbvpcc98Hg8tue7lU8rxE8/VKlqUYGVVoh73xSIW8BJiHfVznuCGuI382RiT/wT2y+Lu9XN8/3Vevtn97j49ftlsdndXj+td9vu6OV1ubjZrzeb9f3V6b8X7vAn57f0jw/X28Ph49P1/mnxi6K65WK1vet+Jue6K/xZb1aLX9G//rVcqG/QpPkacr5FFBtE5FpE0iDyLZZ8aBE1PFpibhG1WApzH+7yW+IQPX0k7n5qSZxdJXHm5D8SZ87pNPEbTvrvOCGkHidInMJxUnA8fcWRlqwvLYUstuTiVM3FwUnoHeAyjXurK6ixt0B09BZJzV2US2LNJa3P+o4TbOGoKZxsyzvZlnfUlnc0W8Lx9Vfw5XCSKRyic+NIn7h7Mt9xoikc72zhBFs4agqHbXmHsymc8D+EQdK+strV5/MEDquWK+v4hZPr67WJ9NNl38gTKrnA+jw6WHKZJNdwvvdrVFM4P2hmnBXHlneyLe9kW95RtoWTLOHwD5oZZ8WJ58YZq33wD5oZZ8URWzhqCscHWzi2vMNsC6caBudUp1LfTZpO+pRJcq1/eNZdjlQAD+T1FgkEOazPRVDJp1skRFMm2Jdix+In6Lv743KrmUvq6lhI0H4oRNyRvXsLv7PL2dk5FnbJ4+wpcv/4UzdmMp64i1fBH2PXZ7909xq4WvGQQi/+mG18rA0rBd/j5JBOE1fbjSU4Bu/GL+y7jvI+kHryp4kP4IFQwQUUXBwqOKrHI6rHI6zHFRQ8MSp4BgXPHhU8gYJr/ZUf+yquRDIKLpjg4hwqeKiCF038LLED7gUVXEHBGTWrMKrHA6rHA6rHhVHBEyh49KjgERQ8ESo46is/O1Tw6gvoYjTZEk39s4GL0SRDNNGRKZpoiaY+oeliNJZKeKx/MHApGm+phEdvqoSzN0VjqoQHUyW8Pox2KRox5RsxFf3EUv0mRlPRL5ryjZ453ng+0gT5QpPq73CfqKfxiflSDYxhijf0gfnJsf9EhWImm+ieYdGZcNEjLHq9WkAplQ+gkopRdMFFV1j0emc0BnqCRY+Ei45bTBNucEzAXscNjhk3OGbc4Ki4wVFxi6nCFtPsYItpdhkWneprVCmVKQ7qraInWHSP6/Vzd1mzK3P/+GSKUE8jlmjElG/O3Uk8TnPuTuIJGlO+SaZ8k+px1ZWwQC7mSwUnr76gu6/92zkTLnq90klcuitJyCa6Olz0jIquA/VlCPR6hKEoBT3bLKZan0xAwZWVVoMz6vX6dAII9IEVjSHQEyx6fT44iS8RRsQZRY+w6ILrdVFY9Bhg0QcGRCDQEyx6fa4yBnqGRa9/So+BDut1cgObeEjZjYFEvVX2hMtOwH4f2CQFg12A2RWXfaCdh8EOHGcGmkt8HI9ittlIJTfQXsJgF2B2xWWvD0aBsCdc9gRcVhNwjMzAfs/AMTIDx0gFjpEDO1Vy2duPOBpta9PAuB4E+8AWnBjsgsvuCZg94rIzsN8ZdiS7Y4cdyiYKsGPZNLTBLgS7nHsm9iiOr3+9nI4L0Qf+pqkXWS3L0at8t1MvKuOaehad0KT5Gpn7ud67Krao6gt/T6qkRZWabKUmW7nJVm6ypU22tOV5sXNNKmlSaYuKuEmVWlSemlRxdoxhrvpdXb+shPqKZn5c4vqU5XE79bnC45r6JN0JjTRo5sdZru9FOKFpsJPnx2ZW36CZbyc436Cp5muVPl9r8t809f3XJjQNdupbh01odL6GG+xwg53JukBNk+c/U+EGTYOd+mKs45p6t/WEpqEs5NCgmR8PBhbPH9UMrFs/oWmxM/9+hLhBM//5iJ+ZD167o7+v9+vrm83qsVMcTj5vb5/Wu+3H4dM/D/2Zm/16s1nfXz3sd7eru+f96mqzuz2cW7iPP7+ZZMkcDyyHwyTL7N7aNodznLpz2tns7P4L",
|
|
2014
|
+
"brillig_names": [
|
|
2015
|
+
"_set_authorized"
|
|
2016
|
+
]
|
|
2017
|
+
},
|
|
2018
|
+
{
|
|
2019
|
+
"name": "consume",
|
|
2020
|
+
"is_unconstrained": true,
|
|
2021
|
+
"custom_attributes": [
|
|
2022
|
+
"public"
|
|
2023
|
+
],
|
|
2024
|
+
"abi": {
|
|
2025
|
+
"error_types": {
|
|
2026
|
+
"12737498021964987455": {
|
|
2027
|
+
"error_kind": "string",
|
|
2028
|
+
"string": "unauthorized"
|
|
2029
|
+
},
|
|
2030
|
+
"16761564377371454734": {
|
|
2031
|
+
"error_kind": "string",
|
|
2032
|
+
"string": "Array index out of bounds"
|
|
2033
|
+
},
|
|
2034
|
+
"17843811134343075018": {
|
|
2035
|
+
"error_kind": "string",
|
|
2036
|
+
"string": "Stack too deep"
|
|
2037
|
+
},
|
|
2038
|
+
"206160798890201757": {
|
|
2039
|
+
"error_kind": "string",
|
|
2040
|
+
"string": "Storage slot 0 not allowed. Storage slots must start from 1."
|
|
2041
|
+
},
|
|
2042
|
+
"5019202896831570965": {
|
|
2043
|
+
"error_kind": "string",
|
|
2044
|
+
"string": "attempt to add with overflow"
|
|
2045
|
+
},
|
|
2046
|
+
"715723737710351018": {
|
|
2047
|
+
"error_kind": "string",
|
|
2048
|
+
"string": "rejecting all"
|
|
2049
|
+
}
|
|
2050
|
+
},
|
|
2051
|
+
"parameters": [
|
|
2052
|
+
{
|
|
2053
|
+
"name": "on_behalf_of",
|
|
2054
|
+
"type": {
|
|
2055
|
+
"fields": [
|
|
2056
|
+
{
|
|
2057
|
+
"name": "inner",
|
|
2058
|
+
"type": {
|
|
2059
|
+
"kind": "field"
|
|
2060
|
+
}
|
|
2061
|
+
}
|
|
2062
|
+
],
|
|
2063
|
+
"kind": "struct",
|
|
2064
|
+
"path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
|
|
2065
|
+
},
|
|
2066
|
+
"visibility": "private"
|
|
2067
|
+
},
|
|
2068
|
+
{
|
|
2069
|
+
"name": "inner_hash",
|
|
2070
|
+
"type": {
|
|
2071
|
+
"kind": "field"
|
|
2072
|
+
},
|
|
2073
|
+
"visibility": "private"
|
|
2074
|
+
}
|
|
2075
|
+
],
|
|
2076
|
+
"return_type": {
|
|
2077
|
+
"abi_type": {
|
|
2078
|
+
"kind": "field"
|
|
2079
|
+
},
|
|
2080
|
+
"visibility": "public"
|
|
2081
|
+
}
|
|
2082
|
+
},
|
|
2083
|
+
"bytecode": "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",
|
|
2084
|
+
"debug_symbols": "7V3bbtw4DP2Xec6DbhSp/spiUaRttggQJEWaLrAo+u/rSWLPJKbMmEhsCvZLkMnohIdHF0qyRf0+fLv68uv75+vbf+5+Hj799ftwc/f18uH67rb79PvPxeHL/fXNzfX3z+d/PrjjD/KP5X/+uLw9fvz5cHn/cPjkc3EXh6vbb92v6Fz3H/65vrk6fMrhz98XB4L5mOIUGI2dMh/jXdSASAHyGkseFaDgNaCsAEWNpcjWbXDFP4OC9+EcdDG24HLuLXifh8IeHFeahsKFhrKByiOd5GzRSbboFFN0wJY6YEudbEudTKboYLBFB03R4WcDH0kH+sLBhTGdbIpOcbboJFt0iiU6wZlSJzgyRcezw2As5RmTXJkmg9jP7pDwjAoxZed56YfCPiR64eUjc2yVeWhW8+iaZS4vM6J/tTYJb1gMMKCkAZECBEEDygpQ1giRNZKjxhJqJMeK5JROoPgaRFEBKl4D4usphNiDQvLTfSLl0AvQ/XrqmcSFCYoYngtTPOub9Nh/ouN9CIADHYzTdABSzx0AokAHfD9SEIQxnYo61I9E3VCVBDroqKeDHiU6J3WA6DUdz6vTTaMHOlJldc3BDeQdhVNYz+nJBny8jeAWsLGAH3EBP+ISfpSPt5HiAjbo421UouH72sCPt5EXGEty/ngb+B59EPPJRnF4boMZpHPqS1MupwDTTV+46IgO+uiI/hQsYohP/KFx/qVt/pQa59+4/qVx/Uvb+icXG+ePbfP3oXH+uW3+wTfOv+35Q4ptz99SbDt+pdh4/EqNx6/UePyCxuMXmR9/Cg78zx6h9/wLGed/Wr8nCuE1f3ArtJ/hQRJhzAJ/SmEonRCF0nF4CpqCOyvLse4eqA+b2mfPnbrCR11C3HVhdaFdF06XuPcjXpe868LpkvyuC6vL3l5YXcDturC6pF0XVpc9TrO65D1O87rs4y6rC+7jLq8L7LqwupRdF04X2tfTvC57nGZ1KXuc5nXZ4zSnS3b7eprXZY/TvC57nGZ18WnXhdVlj9OsLmGP07wuuOvC6RL3OM3rssdpVpe077+wumx3f7dzbNAlwWtdcLPrI/QDaYzxtS602XFX0GWz466gy2bXR9O6lM3uYwq6bHa+O6kLbndfStBlj9OsLn5vL7wue5zmdeHjdDx5Gkue1uUdM4ph5bXZ1eiQKTrRljrRljrJljqVkyFr0QFvi042RaeSuugD6UzlW8NKUqTV6BRTdDDaokOm6JAtdQhN0SnvMAxOJJFjpmoz0t65PntUNy178W8fmedGmZNrVXNypVXmlefwZ8yTj4vFV/Jkio68zFiWji11oi11oi11UrBFJ5uiIy8zlqUDS9OZmn2QvMxYlk6yRYdM0cFoi44tdSjYopOXzDk9y8vpnNPEr0iaYN6q5sWlZpmLK5IUw7mJI+gNiwEGRApQCBpQVoCi04A0QkSN5EljKWkkr2TwSQADCP0IhApQZVdyGlQ5AJlKn1Y7QIDFJoSlkgR+NTrFFJ3K3uEH0pkK6qVyuG0tOpUzZavRyZboeFfZ5luPjzF9vDPG5x2GwlU2NzvqpVnqoV3VY2iXOorUU1gsznqXvDE+2RYfMKYPGNMnG9OntjRYjU+xxecNy45l+dDSfKbnIm9YeCzLB23xKd4Yn2yKj3e29PEOjPEpS254znJzesOzcz21S71d1QM2S/0Ny5Qs2Yhh6HsRgkAfKebBV3hx7R9TOMdeQ8zFTRc+tv5wGgToxXWIj87mzZ73iG4Y8eJZYvincw2dMJs9ICQIg3uLqQiz2SOrgjBr3LHWhjB7i+GFKXuLqQiz3bQbJQwuutdpN3xwmz0XLwmz2YPxgjDbPeksCbPZo86SMJsN14Iw272sSBJmH3x5YbZ7XZEkzN5ieGG2ezGPIExu+wbDzoFk3AHyQ2VR8IwD1u9QlRzA1muArN9CKjpg/RpYCsM1qhTT2IFivgYkBxqvgeis3wQuOeCtBzLRgdZrILReA8F8IJu8DblzwPxUQnAgtl4DyXwgkxwwH8gEByA27oD5FZnogPlAJjiwxjsK7+tAbtwBar0GqPU+QI1PJVJiHVjpwguf+IPI69EBW3RsVRZ/HmA9OmSKTrGlDr/1shYd4M8CrEfHVEcHZ6qjgzfVlMHbasp8OpX16GRTdKKpiA7RVkePtjp6stXRk6mIDmCro4Otjp5tRfRsq6NnWx2dfxi9Hh1bHZ1sdXQyNd/JfuGeNXkXpM9x4Zg1eVVPR4dM0UnBFp1sig44W3SSLTq2mnK21dGzLXXQVkcvC/es6SNduYAlOuhMqYOOTNFZertJomNLnWBLnbDw5HT6RW2MwRadbIpOcrboJFt0yBQdsNWUwVZTXnq7SaJjS52lH1xP0yHPNuUXeXOylH8II8Xn0t04dgpEfAIfT0Oq0XB2FqCSwMfFOBBxOZ8Xf+JP78EfT/zP0p+ylGDwNbuT9l0ofuLDzwFW5GNMH35wgCFfFAQctVG+B09j+NdVBAzMx5DCDinsFIUdPo2IgKHZmMInnxAwOB/Dj1UChm87wz5qHm+jFv4cgICB+ZiosBMVdpLCDj8BFDA0H8O/7SxgcD4mBwVG0Xb4V2+nMMFVDs5M7uOEShL342ZcP7Jn8iMUf0RERKls8Ye5JRS/Ly6i2LrqpltDIkIsMELxebJFFKhQRYPit1ZFFGpQqFIDVcqTyhaplCeV8kWlfNEoX8m/K6JAhdKoUUkjK6L42WcXyXtUCWNUZQ4toVS2osoW/37t8WKNHuUyjVGoQfG5q70/WxiBH6OyAhWcV6GKBlVpURKqsp7JMKBopGGorcqmUZWYklyfmrf7dcyQf3IpopIKRRoUPxfyEAblAdwYhRoUqmzxqyoRBRpUpX9JKFKgIr9SElFFg6r0LwmlslXpX4DDKAoljFGkQUWVreRVqKxBVUYACZVUKJWGlb4cT1EvxtG4ESt9WUJlDaoyAkiopEKRBlVUahSN8skFFUqjfPJOhUoqVEX5hAMqj0abVBltJFTRoGLWoCqjjYRCDQqCCqWyxe/eCvONxL/wK6KKBsXfOi6gKq/o4OmqgTTaf6m8R1OGjfUCMMYkBYZmY5AfLwRMVqxOkE8jK6JAg+L3ZUWUylZU2YoqW0llK6lsgaq+QGUrq/zi8+GJKNKgKjMaCaXqKfyO1+QYg/yKprh+N7mEMUYxLhH/mtmkncqTYwGT52P4Xi9g5o+zxM8PpjFRYScFBQbnY0BhBxR2+DlBgb5dFwxjTJ6PQYUd/lj+NIZfQwgYhZ2isCPOBcaYytPZyTotbv6co3iFneAVmDwfE4MCM388qDw1ncaAU2BgPiYr7GSFP1nRdlBRPzizHfzpPv17eX99+eXm6meHOH756/brw/Xd7fPHh/9+9N98ub++ubn+/vnH/d3Xq2+/7q8+39x9PX53cM8//gKPFxCp4/K4Yu4650XXAI4fj406JbjoFnSd1c7y/w==",
|
|
2085
|
+
"brillig_names": [
|
|
2086
|
+
"consume"
|
|
2087
|
+
]
|
|
2088
|
+
},
|
|
2089
|
+
{
|
|
2090
|
+
"name": "is_reject_all",
|
|
2091
|
+
"is_unconstrained": true,
|
|
2092
|
+
"custom_attributes": [
|
|
2093
|
+
"public",
|
|
2094
|
+
"view"
|
|
2095
|
+
],
|
|
2096
|
+
"abi": {
|
|
2097
|
+
"error_types": {
|
|
2098
|
+
"16761564377371454734": {
|
|
2099
|
+
"error_kind": "string",
|
|
2100
|
+
"string": "Array index out of bounds"
|
|
2101
|
+
},
|
|
2102
|
+
"17843811134343075018": {
|
|
2103
|
+
"error_kind": "string",
|
|
2104
|
+
"string": "Stack too deep"
|
|
2105
|
+
},
|
|
2106
|
+
"206160798890201757": {
|
|
2107
|
+
"error_kind": "string",
|
|
2108
|
+
"string": "Storage slot 0 not allowed. Storage slots must start from 1."
|
|
2109
|
+
},
|
|
2110
|
+
"5019202896831570965": {
|
|
2111
|
+
"error_kind": "string",
|
|
2112
|
+
"string": "attempt to add with overflow"
|
|
2113
|
+
},
|
|
2114
|
+
"9474245853673257536": {
|
|
2115
|
+
"error_kind": "string",
|
|
2116
|
+
"string": "Function is_reject_all can only be called statically"
|
|
2117
|
+
}
|
|
2118
|
+
},
|
|
2119
|
+
"parameters": [
|
|
2120
|
+
{
|
|
2121
|
+
"name": "on_behalf_of",
|
|
2122
|
+
"type": {
|
|
2123
|
+
"fields": [
|
|
2124
|
+
{
|
|
2125
|
+
"name": "inner",
|
|
2126
|
+
"type": {
|
|
2127
|
+
"kind": "field"
|
|
2128
|
+
}
|
|
2129
|
+
}
|
|
2130
|
+
],
|
|
2131
|
+
"kind": "struct",
|
|
2132
|
+
"path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
|
|
2133
|
+
},
|
|
2134
|
+
"visibility": "private"
|
|
2135
|
+
}
|
|
2136
|
+
],
|
|
2137
|
+
"return_type": {
|
|
2138
|
+
"abi_type": {
|
|
2139
|
+
"kind": "boolean"
|
|
2140
|
+
},
|
|
2141
|
+
"visibility": "public"
|
|
2142
|
+
}
|
|
2143
|
+
},
|
|
2144
|
+
"bytecode": "JgACBAEnAAABBIBFJgAABAMmAgIEASYCAwQAHxgAAwACgEMtCIBDAAEkAAAARi0EAAGARCcCAAIEgEQmAgMEAToNAAIAAyQAAAPKLAgBAwAAAQIBJgIEAQAsDgQDLAgBAwAAAQIBJgIFAAAsDgUDLAgBAwAAAQIBJgIGAAIsDgYDHgIAAwkmAgYAAQo4AwYHIwIABwAAAJ0kAAAD8ywIAQMmAgcEAwAQAQcBJgMDBAEAKAMCBywMBwgsDgYIACgIAggsDgEILAgBASYCBgQEABABBgEmAwEEAQAoAQIGLAwGBywOBQcAKAcCBywOBQcAKAcCBywOBQcsDQEGACgGAgYsDgYBKgIABgAAAAAAAAAAAgAAAAAAAAAALAgBByYCCAQFABABCAEmAwcEAQAoBwIILAwICSwOBQkAKAkCCSwOBQkAKAkCCSwOBQkAKAkCCSwOBgksDQEGACgGAgYsDgYBLAgBBgAAAQIBLA4BBiwNBwEAKAECASwOAQcsCAEBAAABAgEsDgcBLAgBBwAAAQIBJgIIBAAsDggHLAgBCQAAAQIBLA4ECSYCCgQCJgILBAMmAgwEASwMCAIiAAABwAw4AgoNIwIADQAAAnMiAAAB0iwNCQIKOAIEAyMCAAMAAAHsJgIKBAA7CQEKJgICBAosCAAKLAwGCywMAQwsDAcNLAwJDgAQAAIAJAAABAUsBAAALA0GAiwNAQMsDQcKLA4CBiwOAwEsDgoHJgIBAQEsDgEJACgDAgIAOAIIBiwNBgEKOAEFAgo4AgQDIwIAAwAAAlkkAAAFZC4MAAEAAhwMAgMBHAwDAQAcDAECASwMAgElIwIADQAAAoAiAAADvCYCDgQCDDgCDg8jAgAPAAAClyQAAAV2ACgDAg4AOA4CDywNDw0sDQcOLA0JDwo4DwQQIwIAEAAAAsMmAhEEADsJAREKOA4LDyMCAA8AAANOIgAAAtUsDQYOLA0BDywNBxAsDQkRJgITBAMMOBATFCMCABQAAAL8JAAABXYtBAAOgAMnAIAEBAAEJAAABYgtCIAFABIAKBICEwA4ExAULA4NFAA4EAwNDjgQDQ4jAgAOAAADOSQAAAYWLA4SBiwODwEsDg0HLA4RCSIAAAO8JgIOBA8sCAAPLAwGECwMAREsDAcSLAwJEwAQAA4AJAAABAUsBAAALA0GDiwNAQ8sDQkQLQQADoADJwCABAQABCQAAAWILQiABQARACgRAhIAOBIIEywODRMsDhEGLA4PASwODAcsDhAJIgAAA7wAOAIMDSwMDQIiAAABwCcAgAQEeAANAAAAgASAAyMAgAMAAAPyKQEAAQX3ofOvpa3UyjsBAQIlKQEAAQWDe0hoPul6QDsBAQIlJAAAA8omAgYEAyYCBwQAJgIIBAEsDAcFIgAABCIMOAUGByMCAAcAAASPIgAABDQsDQEFLA0CBiwNAwcsDQQIJgIJBAQsCAEKJgILBAUAEAELASYDCgQBACgGAgsmAgwEBAAoCgINPg8ACwANLA0KBgAoBgIGLA4GCiwOBQEsDgoCLA4HAywOCAQlLA0DBww4BQcJADgFCAcjAgAJAAAEqiIAAAVbLA0BCSwNAgosDQMLLA0EDCYCDgQEDDgFDg8jAgAPAAAE0SQAAAV2ACgKAg4AOA4FDywNDw0mAg8EAww4BQ8QIwIAEAAABPYkAAAFdgAoCQIPADgPBRAsDRAOADgNDg8mAg4EBAw4BQ4QIwIAEAAABSAkAAAFdi0EAAqAAycAgAQEAAUkAAAFiC0IgAUADQAoDQIOADgOBRAsDg8QLA4JASwODQIsDgsDLA4MBCIAAAVbLAwHBSIAAAQiKQEAAQUC3G4ngHYSnTsBAQIlKQEAAQXonQn+oREtDjsBAQIlLQGAA4AGCwCABgACgAcjAIAHAAAFoyIAAAWuLQCAA4AFIgAABhUtAAABgAUBAAABgAQAAQEAgAOABIAJLQCAA4AKLQCABYALCwCACoAJgAwjAIAMAAAGAS0BgAqACC0CgAiACwEAgAoAAoAKAQCACwACgAsiAAAF0CcBgAUEAAEDAIAGAAKABiIAAAYVJSkBAAEFRafKcRlB5BU7AQECJS0AGMoYyg==",
|
|
2145
|
+
"debug_symbols": "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",
|
|
2146
|
+
"brillig_names": [
|
|
2147
|
+
"is_reject_all"
|
|
2148
|
+
]
|
|
2149
|
+
},
|
|
2150
|
+
{
|
|
2151
|
+
"name": "unconstrained_is_consumable",
|
|
2152
|
+
"is_unconstrained": true,
|
|
2153
|
+
"custom_attributes": [],
|
|
2154
|
+
"abi": {
|
|
2155
|
+
"error_types": {
|
|
2156
|
+
"16761564377371454734": {
|
|
2157
|
+
"error_kind": "string",
|
|
2158
|
+
"string": "Array index out of bounds"
|
|
2159
|
+
},
|
|
2160
|
+
"17843811134343075018": {
|
|
2161
|
+
"error_kind": "string",
|
|
2162
|
+
"string": "Stack too deep"
|
|
2163
|
+
},
|
|
2164
|
+
"206160798890201757": {
|
|
2165
|
+
"error_kind": "string",
|
|
2166
|
+
"string": "Storage slot 0 not allowed. Storage slots must start from 1."
|
|
2167
|
+
},
|
|
2168
|
+
"5019202896831570965": {
|
|
2169
|
+
"error_kind": "string",
|
|
2170
|
+
"string": "attempt to add with overflow"
|
|
2171
|
+
}
|
|
2172
|
+
},
|
|
2173
|
+
"parameters": [
|
|
2174
|
+
{
|
|
2175
|
+
"name": "on_behalf_of",
|
|
2176
|
+
"type": {
|
|
2177
|
+
"fields": [
|
|
2178
|
+
{
|
|
2179
|
+
"name": "inner",
|
|
2180
|
+
"type": {
|
|
2181
|
+
"kind": "field"
|
|
2182
|
+
}
|
|
2183
|
+
}
|
|
2184
|
+
],
|
|
2185
|
+
"kind": "struct",
|
|
2186
|
+
"path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
|
|
2187
|
+
},
|
|
2188
|
+
"visibility": "private"
|
|
2307
2189
|
},
|
|
2308
|
-
|
|
2190
|
+
{
|
|
2191
|
+
"name": "message_hash",
|
|
2192
|
+
"type": {
|
|
2193
|
+
"kind": "field"
|
|
2194
|
+
},
|
|
2195
|
+
"visibility": "private"
|
|
2196
|
+
}
|
|
2197
|
+
],
|
|
2198
|
+
"return_type": {
|
|
2199
|
+
"abi_type": {
|
|
2200
|
+
"kind": "boolean"
|
|
2201
|
+
},
|
|
2202
|
+
"visibility": "public"
|
|
2309
2203
|
}
|
|
2310
2204
|
},
|
|
2311
|
-
"bytecode": "H4sIAAAAAAAA
|
|
2312
|
-
"debug_symbols": "
|
|
2205
|
+
"bytecode": "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",
|
|
2206
|
+
"debug_symbols": "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",
|
|
2313
2207
|
"brillig_names": [
|
|
2314
|
-
"
|
|
2315
|
-
|
|
2316
|
-
|
|
2317
|
-
|
|
2318
|
-
|
|
2319
|
-
|
|
2320
|
-
],
|
|
2321
|
-
"
|
|
2208
|
+
"unconstrained_is_consumable"
|
|
2209
|
+
]
|
|
2210
|
+
},
|
|
2211
|
+
{
|
|
2212
|
+
"name": "process_log",
|
|
2213
|
+
"is_unconstrained": true,
|
|
2214
|
+
"custom_attributes": [],
|
|
2215
|
+
"abi": {
|
|
2216
|
+
"error_types": {
|
|
2217
|
+
"16541607464495309456": {
|
|
2218
|
+
"error_kind": "fmtstring",
|
|
2219
|
+
"item_types": [],
|
|
2220
|
+
"length": 16
|
|
2221
|
+
},
|
|
2222
|
+
"17843811134343075018": {
|
|
2223
|
+
"error_kind": "string",
|
|
2224
|
+
"string": "Stack too deep"
|
|
2225
|
+
}
|
|
2226
|
+
},
|
|
2227
|
+
"parameters": [
|
|
2228
|
+
{
|
|
2229
|
+
"name": "log_plaintext",
|
|
2230
|
+
"type": {
|
|
2231
|
+
"fields": [
|
|
2232
|
+
{
|
|
2233
|
+
"name": "storage",
|
|
2234
|
+
"type": {
|
|
2235
|
+
"kind": "array",
|
|
2236
|
+
"length": 18,
|
|
2237
|
+
"type": {
|
|
2238
|
+
"kind": "field"
|
|
2239
|
+
}
|
|
2240
|
+
}
|
|
2241
|
+
},
|
|
2242
|
+
{
|
|
2243
|
+
"name": "len",
|
|
2244
|
+
"type": {
|
|
2245
|
+
"kind": "integer",
|
|
2246
|
+
"sign": "unsigned",
|
|
2247
|
+
"width": 32
|
|
2248
|
+
}
|
|
2249
|
+
}
|
|
2250
|
+
],
|
|
2251
|
+
"kind": "struct",
|
|
2252
|
+
"path": "std::collections::bounded_vec::BoundedVec"
|
|
2253
|
+
},
|
|
2254
|
+
"visibility": "private"
|
|
2255
|
+
},
|
|
2256
|
+
{
|
|
2257
|
+
"name": "tx_hash",
|
|
2258
|
+
"type": {
|
|
2259
|
+
"kind": "field"
|
|
2260
|
+
},
|
|
2261
|
+
"visibility": "private"
|
|
2262
|
+
},
|
|
2263
|
+
{
|
|
2264
|
+
"name": "unique_note_hashes_in_tx",
|
|
2265
|
+
"type": {
|
|
2266
|
+
"fields": [
|
|
2267
|
+
{
|
|
2268
|
+
"name": "storage",
|
|
2269
|
+
"type": {
|
|
2270
|
+
"kind": "array",
|
|
2271
|
+
"length": 64,
|
|
2272
|
+
"type": {
|
|
2273
|
+
"kind": "field"
|
|
2274
|
+
}
|
|
2275
|
+
}
|
|
2276
|
+
},
|
|
2277
|
+
{
|
|
2278
|
+
"name": "len",
|
|
2279
|
+
"type": {
|
|
2280
|
+
"kind": "integer",
|
|
2281
|
+
"sign": "unsigned",
|
|
2282
|
+
"width": 32
|
|
2283
|
+
}
|
|
2284
|
+
}
|
|
2285
|
+
],
|
|
2286
|
+
"kind": "struct",
|
|
2287
|
+
"path": "std::collections::bounded_vec::BoundedVec"
|
|
2288
|
+
},
|
|
2289
|
+
"visibility": "private"
|
|
2290
|
+
},
|
|
2291
|
+
{
|
|
2292
|
+
"name": "first_nullifier_in_tx",
|
|
2293
|
+
"type": {
|
|
2294
|
+
"kind": "field"
|
|
2295
|
+
},
|
|
2296
|
+
"visibility": "private"
|
|
2297
|
+
},
|
|
2298
|
+
{
|
|
2299
|
+
"name": "recipient",
|
|
2300
|
+
"type": {
|
|
2301
|
+
"fields": [
|
|
2302
|
+
{
|
|
2303
|
+
"name": "inner",
|
|
2304
|
+
"type": {
|
|
2305
|
+
"kind": "field"
|
|
2306
|
+
}
|
|
2307
|
+
}
|
|
2308
|
+
],
|
|
2309
|
+
"kind": "struct",
|
|
2310
|
+
"path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
|
|
2311
|
+
},
|
|
2312
|
+
"visibility": "private"
|
|
2313
|
+
}
|
|
2314
|
+
],
|
|
2315
|
+
"return_type": null
|
|
2316
|
+
},
|
|
2317
|
+
"bytecode": "H4sIAAAAAAAA/92caVPbMBCGHbABB0LC0fukNy1tHZKQpCctve8L+jlTyJ9oP7j9E7T/tnlBSzZCnaGDNOWtZzxOvMruo7Usr6VVCtH2ttbbC+ZzbI6j5ojz09HgJmWXzTHb31b1qCsLxVggYBwiYBwmYIwJGBMCxhECxlECxjECxpSAsUjAOE7AOEHAWCJgnCRgLBMwVggYpwIwhuCcJuGc8cipY/tQvLPRwW+jhwgYDxMwHiFgPErAeIyA8TgB4wkCxpMEjKcIGE8TMJ4hYDxLwDhHwHiOgPE8AeMFAsaLBIyXCBgvEzBeIWCcJ2C8SsB4jYBxgYDxOgHjDQLGmwSMGQFjlYBxkYCxRsBYJ2BsEDAuETA2CRhbBIxtAsZbBIy3CRjvEDDeJWC8R8B4n4BxmYDxAQHjQwLGFQLGRwSMjwkYnxAwPiVgfEbA+JyA8QUB40sCxlcEjK8JGN8QML4lYHxHwPiegPEDAePHAIwhOD+RcK6ScK4F4ow+W9BDvR0Lt7AwCguPsLAHC2ewMAULP7CwAgsXsDAAifdIbEfieKW3I/EZScVI2EUSLJJMkcSJJEkkISLJD0l0SFJDEhiSrJDEhCShs719rrcjiQRJGkiCQJIBJvExSY5JaEzyYhIVk5SYBMQkGyaxMEmEWmGSA5MIGKTHIDgGmTGIi0FSDEJikA+DaBikwiAQBlkwiCGDBHjJxUskXtLwEoSXDATxCJIRhCLIQxCFIAVBAB6yeIjhIYFOGJ0cOhHcpLgB0LjWoj9v0kh+mGNqjkNK7nERXTW17PrU38randRRP4/8tdToHAuiv9EU/WkY/kwW2q7kff26LmJ32BxX874vV/NBJimzqcpsWmWkPmGud70W1l/VxZLlo0jVRWwXw9iuFSx7+rpomdgvRiHb5vaiZG1PeGz/SN9RkjJ5n6dgyeJ8dz1EliiZXF/YmVfl7LY1ZsmEBZu035LyjWxrRibXNFY6/bXX0Pd3Pft37bVe/R/ba2zJ4nx3Pf62veq2ZbfXJOpv0peKbETJflqyUSX7lfdt1825sP3w9nNX32++n1szDn5tC9to3veBtLthdS5RPtvyjy5vyVIli/NBO0XzPVZ2tC7hSKzyNfO9bI4j6jfy+4rD/ohlf4Dbcc72S+oonzrKo30tmM+Ir9F+vkn5aPe9in3ZfM/2tS21Xf2iP/3Nmqvv88i/IfrHg+iv7+ifCMNfF/2lMP7f0T8Zhr8r+sth9C+J/koY/Q3RPxVE/+JOXKD/XMeOC2bUeY9x7J7jArFftFhDxQUzFo/tHx0XQDbrYK04ZHYfMOuwM+uw49I16VHXlEddxQNax5JHXRWPulKPunxexwmPunz6q+xR15hHXT7bvU9/yXUMOz6VZa44LQqgvxhG/07fL320fhfTdRL7iVX+q+XniSB+7o87SX+mfeGKpXza3uvzWuyXHDzCXXTI9vOHZxuNVrfdarR7IX11abGdFSz9wmqf0+9Eun/R5V3Pflfc59HXmWvMoaz8ii1WsklLliiZMOoxB1dc7JN/L/7X9isOmd0/7/VaTkeDbU3fj+NR/36Oc/91b7a2/8hli9HoT6LBMcXIsp9Y5b+b73Zft997pNvsVLu1TrfT6Kyv1790pi392ofw02+mXHNgmVMAAA==",
|
|
2318
|
+
"debug_symbols": "tZbLCoMwEEX/ZdZZOFOtrb9SSokaJRCiRC0U8d8bpQ9p13cTuGFyZnXCnak25dTerG+6gYrLTK6r9Gg7H9O8KCqDdc62t/01JevBSbI9GHrt1zyMOoxUHESR8TUVaRKfN9YZKo6yqL/B/D2Y55/BTJarimSGkQVGPsDIKYycwchHGDmHkU8w8hlFZpiDDHOQYQ4yzEGGOcgwBxnmIMMcZJiDDHNQYA4KzEHBOLjEdNfB6tKZV4FoJl/t+sT46M1PtehDV5l6CmYtGd9+sbqcssp4+0FjYEkVyzkuiYue",
|
|
2319
|
+
"brillig_names": [
|
|
2320
|
+
"process_log"
|
|
2321
|
+
]
|
|
2322
2322
|
},
|
|
2323
2323
|
{
|
|
2324
2324
|
"name": "set_authorized",
|
|
@@ -2364,7 +2364,7 @@
|
|
|
2364
2364
|
"return_type": null
|
|
2365
2365
|
},
|
|
2366
2366
|
"bytecode": "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",
|
|
2367
|
-
"debug_symbols": "
|
|
2367
|
+
"debug_symbols": "1Z3bbuM4DIbfJde9oCiRkuZVBouipykCBEmRtgssir772m3tpBvJHgs7Cf+bIm74m58Zi9bBkt5W9w+3r4/X6+2v3fPqx8+31WZ3d/Oy3m27o7f3q9Xtfr3ZrB+vj/+9ov5P4g/756ebbX/4/HKzf1n9cJrpavWwve8+RqLuDL/Wm4fVD+X3v65WSZdrsmvQNPhxRC2i0CLKDSLX4smlBhFziyg2iHyLJ1/+cUniIKIox6KrE+Og7L6Mu495NE5UME4+8pdx8ikeG/c4oXx/EucRR3Qax5HqYOzcwdhJicel0Tin0ZZT/sQRUzhCtnBsRUdtRUeNRSebwoneFk4yhVOpDvxBHBmMmfgUJ5rCyc4WjljCYSJbOMaik03huP8hDXblYTDmkGZwfB7OHChPnzjSUFOLLn877Qd5QiVn2Jh7B0uus+TJne35yoFs4YgpHLEVHbEVHbUVHQ22cJIpnN9oZpwVJ54bZ7L28RvNjLPiqCmcTLZwxBKOJ1PR8RRs4RTT4JLqVBx6beNRL6mTVARfcpUTFcCevNwigSCHjTkrKvl8i8TRnIvu8gdjLzxD312fHy81+dG6ONgQsnzZCh3YPeknu56d3evILmmaPaofOGI3hDNt3OWrwIfc9T0u/bWmYreHjPTCh9uGtTRuE8awpBCPjYvtxjE5BqbpE7PLYUik7PjYuAfPARU8YYIH8qjgqBF3qBF3qBEvD8ojgCsoeLmigAAuoODlPk4E8FAE16GKK+qMgidQcPGo4MX+NBk1+l1iB7z8vgEAeLnLEAEc9VbJqBHPoBEXAo24kIKCO0IFF1TwDArOARUc9JEv3qOCFx9Al6Ipv9p+MRq1RFN+4+RiNMEUTbZEo94UjakSHtkUjakSnkyV8CSmaEyV8GyqhJeH0S5Eo2QpNkqWsp86S/UbdZayn7Kp2IQz5xv2B5og/6UpP8M5uoGGo/eXamDUKXr0WJlNrcMrKk6TM4qusOgp4KJnWPRytcDFOL4AFbMYRU+o6LHcFY2BrrDo5e5oDPSAi45bTBk2OUbGjbrHTY4eNzkG3OQYcJNjwC2mgltMBbeYqsNFL890y26c4pDZKHokXHTcqJ+7y9rTOPfPu3BCkwzRJLIUm3TuTuIZGrVEw6Ziw6Zi4yuzjd1hKqOmSyUnzjyik5ygB1z0cqXT+bG70omziR48LLo4XHSFRa8s6+JURvRktJhWFi8MNC78Gsho1CsrkECgKyx6ZWUTCPTy01R4zDAiZBQ9o6Jngo1613zFRY+w6JUBEQT0SlMDAl1g0SsLv0OgKyy64Ea9siqkjNsLOMlsE73S1IBAx416ZSlICPQEi15p4EGgKyx6xs0wlVaSPwxDeW+zbeqo0kzCYE+47JU2Hga74rIzAbMDl1UGzpEeOO4eOEcG4BwZgHNkZTMFH8YN9rzabGL3m4ngspcnqoOwJ1z2GIDZMy57Ao57gh3AdpRhR7A7dtghbFfbYBiD/dwTsKdxyi8tx8P688GfaMpFNo+r0Hf98yeaclGZ0ehiTWUHxBlNWPiW3qcqt6hqm/7NqFKLipt8cZMv3+TLN/kKTb5C0+8lTb6k6bqUm1TaoorUpGoqKeWq1WSO4VSMe6ZhNYnMBc3yvOTLM5Un/fjyFOEZTWjQpOUaXp5nfXnH+WmNb/ATqEEjyzXS4Eda/BTv6yzDfZ0jn2jKW/bNaBr8lHebm9aUx+tmNA1+coOf2brAqaarAy7+TQMtr3ME1+CnvAbrtKbcbT2t8dSgWZ4PQuAGzfJ8XVmufkbT4Ecbrkcb7p3Y8PvEhffBe3f0981+fXO7eXjuFP2Xr9u7l/Vu+3X48s/T8M3tfr3ZrB+vn/a7u4f71/3D9WZ313+3oq8/Pz3FK8+pZ+kPI11F+aiw99917ZiuQ7bz2fn9Fw==",
|
|
2368
2368
|
"brillig_names": [
|
|
2369
2369
|
"set_authorized"
|
|
2370
2370
|
]
|
|
@@ -2436,7 +2436,7 @@
|
|
|
2436
2436
|
"type": {
|
|
2437
2437
|
"fields": [
|
|
2438
2438
|
{
|
|
2439
|
-
"name": "
|
|
2439
|
+
"name": "approver",
|
|
2440
2440
|
"type": {
|
|
2441
2441
|
"fields": [
|
|
2442
2442
|
{
|
|
@@ -2449,21 +2449,27 @@
|
|
|
2449
2449
|
"kind": "struct",
|
|
2450
2450
|
"path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
|
|
2451
2451
|
}
|
|
2452
|
+
},
|
|
2453
|
+
{
|
|
2454
|
+
"name": "message_hash",
|
|
2455
|
+
"type": {
|
|
2456
|
+
"kind": "field"
|
|
2457
|
+
}
|
|
2458
|
+
},
|
|
2459
|
+
{
|
|
2460
|
+
"name": "authorize",
|
|
2461
|
+
"type": {
|
|
2462
|
+
"kind": "boolean"
|
|
2463
|
+
}
|
|
2452
2464
|
}
|
|
2453
2465
|
],
|
|
2454
2466
|
"kind": "struct",
|
|
2455
|
-
"path": "AuthRegistry::
|
|
2456
|
-
}
|
|
2457
|
-
},
|
|
2458
|
-
{
|
|
2459
|
-
"name": "return_type",
|
|
2460
|
-
"type": {
|
|
2461
|
-
"kind": "boolean"
|
|
2467
|
+
"path": "AuthRegistry::set_authorized_private_parameters"
|
|
2462
2468
|
}
|
|
2463
2469
|
}
|
|
2464
2470
|
],
|
|
2465
2471
|
"kind": "struct",
|
|
2466
|
-
"path": "AuthRegistry::
|
|
2472
|
+
"path": "AuthRegistry::set_authorized_private_abi"
|
|
2467
2473
|
},
|
|
2468
2474
|
{
|
|
2469
2475
|
"fields": [
|
|
@@ -2514,40 +2520,25 @@
|
|
|
2514
2520
|
"type": {
|
|
2515
2521
|
"fields": [
|
|
2516
2522
|
{
|
|
2517
|
-
"name": "
|
|
2523
|
+
"name": "message_hash",
|
|
2518
2524
|
"type": {
|
|
2519
|
-
"
|
|
2520
|
-
{
|
|
2521
|
-
"name": "inner",
|
|
2522
|
-
"type": {
|
|
2523
|
-
"kind": "field"
|
|
2524
|
-
}
|
|
2525
|
-
}
|
|
2526
|
-
],
|
|
2527
|
-
"kind": "struct",
|
|
2528
|
-
"path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
|
|
2525
|
+
"kind": "field"
|
|
2529
2526
|
}
|
|
2530
2527
|
},
|
|
2531
2528
|
{
|
|
2532
|
-
"name": "
|
|
2529
|
+
"name": "authorize",
|
|
2533
2530
|
"type": {
|
|
2534
|
-
"kind": "
|
|
2531
|
+
"kind": "boolean"
|
|
2535
2532
|
}
|
|
2536
2533
|
}
|
|
2537
2534
|
],
|
|
2538
2535
|
"kind": "struct",
|
|
2539
|
-
"path": "AuthRegistry::
|
|
2540
|
-
}
|
|
2541
|
-
},
|
|
2542
|
-
{
|
|
2543
|
-
"name": "return_type",
|
|
2544
|
-
"type": {
|
|
2545
|
-
"kind": "boolean"
|
|
2536
|
+
"path": "AuthRegistry::set_authorized_parameters"
|
|
2546
2537
|
}
|
|
2547
2538
|
}
|
|
2548
2539
|
],
|
|
2549
2540
|
"kind": "struct",
|
|
2550
|
-
"path": "AuthRegistry::
|
|
2541
|
+
"path": "AuthRegistry::set_authorized_abi"
|
|
2551
2542
|
},
|
|
2552
2543
|
{
|
|
2553
2544
|
"fields": [
|
|
@@ -2556,7 +2547,7 @@
|
|
|
2556
2547
|
"type": {
|
|
2557
2548
|
"fields": [
|
|
2558
2549
|
{
|
|
2559
|
-
"name": "
|
|
2550
|
+
"name": "on_behalf_of",
|
|
2560
2551
|
"type": {
|
|
2561
2552
|
"fields": [
|
|
2562
2553
|
{
|
|
@@ -2575,21 +2566,21 @@
|
|
|
2575
2566
|
"type": {
|
|
2576
2567
|
"kind": "field"
|
|
2577
2568
|
}
|
|
2578
|
-
},
|
|
2579
|
-
{
|
|
2580
|
-
"name": "authorize",
|
|
2581
|
-
"type": {
|
|
2582
|
-
"kind": "boolean"
|
|
2583
|
-
}
|
|
2584
2569
|
}
|
|
2585
2570
|
],
|
|
2586
2571
|
"kind": "struct",
|
|
2587
|
-
"path": "AuthRegistry::
|
|
2572
|
+
"path": "AuthRegistry::is_consumable_parameters"
|
|
2573
|
+
}
|
|
2574
|
+
},
|
|
2575
|
+
{
|
|
2576
|
+
"name": "return_type",
|
|
2577
|
+
"type": {
|
|
2578
|
+
"kind": "boolean"
|
|
2588
2579
|
}
|
|
2589
2580
|
}
|
|
2590
2581
|
],
|
|
2591
2582
|
"kind": "struct",
|
|
2592
|
-
"path": "AuthRegistry::
|
|
2583
|
+
"path": "AuthRegistry::is_consumable_abi"
|
|
2593
2584
|
},
|
|
2594
2585
|
{
|
|
2595
2586
|
"fields": [
|
|
@@ -2640,19 +2631,34 @@
|
|
|
2640
2631
|
"type": {
|
|
2641
2632
|
"fields": [
|
|
2642
2633
|
{
|
|
2643
|
-
"name": "
|
|
2634
|
+
"name": "on_behalf_of",
|
|
2644
2635
|
"type": {
|
|
2645
|
-
"
|
|
2636
|
+
"fields": [
|
|
2637
|
+
{
|
|
2638
|
+
"name": "inner",
|
|
2639
|
+
"type": {
|
|
2640
|
+
"kind": "field"
|
|
2641
|
+
}
|
|
2642
|
+
}
|
|
2643
|
+
],
|
|
2644
|
+
"kind": "struct",
|
|
2645
|
+
"path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
|
|
2646
2646
|
}
|
|
2647
2647
|
}
|
|
2648
2648
|
],
|
|
2649
2649
|
"kind": "struct",
|
|
2650
|
-
"path": "AuthRegistry::
|
|
2650
|
+
"path": "AuthRegistry::is_reject_all_parameters"
|
|
2651
|
+
}
|
|
2652
|
+
},
|
|
2653
|
+
{
|
|
2654
|
+
"name": "return_type",
|
|
2655
|
+
"type": {
|
|
2656
|
+
"kind": "boolean"
|
|
2651
2657
|
}
|
|
2652
2658
|
}
|
|
2653
2659
|
],
|
|
2654
2660
|
"kind": "struct",
|
|
2655
|
-
"path": "AuthRegistry::
|
|
2661
|
+
"path": "AuthRegistry::is_reject_all_abi"
|
|
2656
2662
|
},
|
|
2657
2663
|
{
|
|
2658
2664
|
"fields": [
|
|
@@ -2661,25 +2667,19 @@
|
|
|
2661
2667
|
"type": {
|
|
2662
2668
|
"fields": [
|
|
2663
2669
|
{
|
|
2664
|
-
"name": "
|
|
2665
|
-
"type": {
|
|
2666
|
-
"kind": "field"
|
|
2667
|
-
}
|
|
2668
|
-
},
|
|
2669
|
-
{
|
|
2670
|
-
"name": "authorize",
|
|
2670
|
+
"name": "reject",
|
|
2671
2671
|
"type": {
|
|
2672
2672
|
"kind": "boolean"
|
|
2673
2673
|
}
|
|
2674
2674
|
}
|
|
2675
2675
|
],
|
|
2676
2676
|
"kind": "struct",
|
|
2677
|
-
"path": "AuthRegistry::
|
|
2677
|
+
"path": "AuthRegistry::set_reject_all_parameters"
|
|
2678
2678
|
}
|
|
2679
2679
|
}
|
|
2680
2680
|
],
|
|
2681
2681
|
"kind": "struct",
|
|
2682
|
-
"path": "AuthRegistry::
|
|
2682
|
+
"path": "AuthRegistry::set_reject_all_abi"
|
|
2683
2683
|
}
|
|
2684
2684
|
]
|
|
2685
2685
|
}
|
|
@@ -2699,7 +2699,7 @@
|
|
|
2699
2699
|
},
|
|
2700
2700
|
"133": {
|
|
2701
2701
|
"path": "/build-volume/noir-projects/aztec-nr/aztec/src/oracle/execution_cache.nr",
|
|
2702
|
-
"source": "/// Stores values represented as slice in execution cache to be later obtained by its hash.\npub fn store(values: [Field]) {\n /// Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe\n /// to call. When loading the values, however, the caller must check that the values are indeed the preimage.\n unsafe { store_in_execution_cache_oracle_wrapper(values) };\n}\n\
|
|
2702
|
+
"source": "/// Stores values represented as slice in execution cache to be later obtained by its hash.\npub fn store(values: [Field]) {\n /// Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe\n /// to call. When loading the values, however, the caller must check that the values are indeed the preimage.\n unsafe { store_in_execution_cache_oracle_wrapper(values) };\n}\n\npub unconstrained fn store_in_execution_cache_oracle_wrapper(values: [Field]) {\n let _ = store_in_execution_cache_oracle(values);\n}\n\npub unconstrained fn load<let N: u32>(hash: Field) -> [Field; N] {\n load_from_execution_cache_oracle(hash)\n}\n\n#[oracle(storeInExecutionCache)]\nunconstrained fn store_in_execution_cache_oracle(_values: [Field]) -> Field {}\n\n#[oracle(loadFromExecutionCache)]\nunconstrained fn load_from_execution_cache_oracle<let N: u32>(_hash: Field) -> [Field; N] {}\n"
|
|
2703
2703
|
},
|
|
2704
2704
|
"144": {
|
|
2705
2705
|
"path": "/build-volume/noir-projects/aztec-nr/aztec/src/oracle/notes.nr",
|
|
@@ -2707,45 +2707,49 @@
|
|
|
2707
2707
|
},
|
|
2708
2708
|
"147": {
|
|
2709
2709
|
"path": "/build-volume/noir-projects/aztec-nr/aztec/src/oracle/storage.nr",
|
|
2710
|
-
"source": "use dep::protocol_types::{address::AztecAddress, traits::
|
|
2710
|
+
"source": "use dep::protocol_types::{address::AztecAddress, traits::Packable};\n\n#[oracle(storageRead)]\nunconstrained fn storage_read_oracle<let N: u32>(\n address: Field,\n storage_slot: Field,\n block_number: Field,\n length: Field,\n) -> [Field; N] {}\n\npub unconstrained fn raw_storage_read<let N: u32>(\n address: AztecAddress,\n storage_slot: Field,\n block_number: u32,\n) -> [Field; N] {\n storage_read_oracle(\n address.to_field(),\n storage_slot,\n block_number as Field,\n N as Field,\n )\n}\n\npub unconstrained fn storage_read<T, let N: u32>(\n address: AztecAddress,\n storage_slot: Field,\n block_number: u32,\n) -> T\nwhere\n T: Packable<N>,\n{\n T::unpack(raw_storage_read(address, storage_slot, block_number))\n}\n\nmod tests {\n use crate::oracle::storage::{raw_storage_read, storage_read};\n use dep::protocol_types::{address::AztecAddress, traits::{FromField, Packable}};\n\n use crate::test::mocks::mock_struct::MockStruct;\n use std::test::OracleMock;\n\n global address: AztecAddress = AztecAddress::from_field(29);\n global slot: Field = 7;\n global block_number: u32 = 17;\n\n #[test]\n unconstrained fn test_raw_storage_read() {\n let written = MockStruct { a: 13, b: 42 };\n\n let _ = OracleMock::mock(\"storageRead\").returns(written.pack());\n\n let read: [Field; 2] = raw_storage_read(address, slot, block_number);\n assert_eq(read[0], 13);\n assert_eq(read[1], 42);\n }\n\n #[test]\n unconstrained fn test_storage_read() {\n let written = MockStruct { a: 13, b: 42 };\n\n let _ = OracleMock::mock(\"storageRead\").returns(written.pack());\n\n let read: MockStruct = storage_read(address, slot, block_number);\n assert_eq(read.a, 13);\n assert_eq(read.b, 42);\n }\n}\n"
|
|
2711
2711
|
},
|
|
2712
2712
|
"150": {
|
|
2713
2713
|
"path": "/build-volume/noir-projects/aztec-nr/aztec/src/state_vars/map.nr",
|
|
2714
|
-
"source": "use crate::state_vars::storage::Storage;\nuse dep::protocol_types::{
|
|
2714
|
+
"source": "use crate::state_vars::storage::Storage;\nuse dep::protocol_types::{storage::map::derive_storage_slot_in_map, traits::{Packable, ToField}};\n\n// docs:start:map\npub struct Map<K, V, Context> {\n context: Context,\n storage_slot: Field,\n state_var_constructor: fn(Context, Field) -> V,\n}\n// docs:end:map\n\nimpl<K, T, Context, let N: u32> Storage<T, N> for Map<K, T, Context>\nwhere\n T: Packable<N>,\n{\n fn get_storage_slot(self) -> Field {\n self.storage_slot\n }\n}\n\nimpl<K, V, Context> Map<K, V, Context> {\n // docs:start:new\n pub fn new(\n context: Context,\n storage_slot: Field,\n state_var_constructor: fn(Context, Field) -> V,\n ) -> Self {\n assert(storage_slot != 0, \"Storage slot 0 not allowed. Storage slots must start from 1.\");\n Map { context, storage_slot, state_var_constructor }\n }\n // docs:end:new\n\n // docs:start:at\n pub fn at(self, key: K) -> V\n where\n K: ToField,\n {\n // TODO(#1204): use a generator index for the storage slot\n let derived_storage_slot = derive_storage_slot_in_map(self.storage_slot, key);\n\n let state_var_constructor = self.state_var_constructor;\n state_var_constructor(self.context, derived_storage_slot)\n }\n // docs:end:at\n}\n"
|
|
2715
2715
|
},
|
|
2716
2716
|
"158": {
|
|
2717
2717
|
"path": "/build-volume/noir-projects/aztec-nr/aztec/src/state_vars/public_mutable.nr",
|
|
2718
|
-
"source": "use crate::context::{PublicContext, UnconstrainedContext};\nuse crate::state_vars::storage::Storage;\nuse dep::protocol_types::traits::
|
|
2718
|
+
"source": "use crate::context::{PublicContext, UnconstrainedContext};\nuse crate::state_vars::storage::Storage;\nuse dep::protocol_types::traits::Packable;\n\n// docs:start:public_mutable_struct\npub struct PublicMutable<T, Context> {\n context: Context,\n storage_slot: Field,\n}\n// docs:end:public_mutable_struct\n\nimpl<T, Context, let N: u32> Storage<T, N> for PublicMutable<T, Context>\nwhere\n T: Packable<N>,\n{\n fn get_storage_slot(self) -> Field {\n self.storage_slot\n }\n}\n\nimpl<T, Context> PublicMutable<T, Context> {\n // docs:start:public_mutable_struct_new\n pub fn new(\n // Note: Passing the contexts to new(...) just to have an interface compatible with a Map.\n context: Context,\n storage_slot: Field,\n ) -> Self {\n assert(storage_slot != 0, \"Storage slot 0 not allowed. Storage slots must start from 1.\");\n PublicMutable { context, storage_slot }\n }\n // docs:end:public_mutable_struct_new\n}\n\nimpl<T, let T_PACKED_LEN: u32> PublicMutable<T, &mut PublicContext>\nwhere\n T: Packable<T_PACKED_LEN>,\n{\n // docs:start:public_mutable_struct_read\n pub fn read(self) -> T {\n self.context.storage_read(self.storage_slot)\n }\n // docs:end:public_mutable_struct_read\n\n // docs:start:public_mutable_struct_write\n pub fn write(self, value: T) {\n self.context.storage_write(self.storage_slot, value);\n }\n // docs:end:public_mutable_struct_write\n}\n\nimpl<T, let T_PACKED_LEN: u32> PublicMutable<T, UnconstrainedContext>\nwhere\n T: Packable<T_PACKED_LEN>,\n{\n pub unconstrained fn read(self) -> T {\n self.context.storage_read(self.storage_slot)\n }\n}\n"
|
|
2719
2719
|
},
|
|
2720
|
-
"
|
|
2720
|
+
"243": {
|
|
2721
2721
|
"path": "/build-volume/noir-projects/noir-protocol-circuits/crates/types/src/address/aztec_address.nr",
|
|
2722
|
-
"source": "use crate::{\n abis::function_selector::FunctionSelector,\n address::{\n partial_address::PartialAddress, salted_initialization_hash::SaltedInitializationHash,\n },\n constants::{\n AZTEC_ADDRESS_LENGTH, FUNCTION_TREE_HEIGHT, GENERATOR_INDEX__CONTRACT_ADDRESS_V1,\n MAX_FIELD_VALUE,\n },\n contract_class_id::ContractClassId,\n hash::{poseidon2_hash_with_separator, private_functions_root_from_siblings},\n merkle_tree::membership::MembershipWitness,\n public_keys::{IvpkM, NpkM, OvpkM, PublicKeys, ToPoint, TpkM},\n traits::{Deserialize, Empty, FromField, Serialize, ToField},\n};\n\n// We do below because `use crate::point::Point;` does not work\nuse dep::std::embedded_curve_ops::EmbeddedCurvePoint as Point;\n\nuse crate::public_keys::AddressPoint;\nuse ec::{pow, sqrt};\nuse std::{\n embedded_curve_ops::{EmbeddedCurveScalar, fixed_base_scalar_mul as derive_public_key},\n ops::Add,\n};\n\n// Aztec address\npub struct AztecAddress {\n pub inner: Field,\n}\n\nimpl Eq for AztecAddress {\n fn eq(self, other: Self) -> bool {\n self.to_field() == other.to_field()\n }\n}\n\nimpl Empty for AztecAddress {\n fn empty() -> Self {\n Self { inner: 0 }\n }\n}\n\nimpl ToField for AztecAddress {\n fn to_field(self) -> Field {\n self.inner\n }\n}\n\nimpl FromField for AztecAddress {\n fn from_field(value: Field) -> AztecAddress {\n AztecAddress { inner: value }\n }\n}\n\nimpl Serialize<AZTEC_ADDRESS_LENGTH> for AztecAddress {\n fn serialize(self: Self) -> [Field; AZTEC_ADDRESS_LENGTH] {\n [self.to_field()]\n }\n}\n\nimpl Deserialize<AZTEC_ADDRESS_LENGTH> for AztecAddress {\n fn deserialize(fields: [Field; AZTEC_ADDRESS_LENGTH]) -> Self {\n FromField::from_field(fields[0])\n }\n}\n\nimpl AztecAddress {\n pub fn zero() -> Self {\n Self { inner: 0 }\n }\n\n pub fn to_address_point(self) -> AddressPoint {\n // We compute the address point by taking our address, setting it to x, and then solving for y in the\n // equation which defines our bn curve:\n // y^2 = x^3 - 17; x = address\n let x = self.inner;\n let y_squared = pow(x, 3) - 17;\n\n // TODO (#8970): Handle cases where we cannot recover a point from an address\n let mut y = sqrt(y_squared);\n\n // If we get a negative y coordinate (any y where y > MAX_FIELD_VALUE / 2), we pin it to the\n // positive one (any value where y <= MAX_FIELD_VALUE / 2) by subtracting it from the Field modulus\n // note: The field modulus is MAX_FIELD_VALUE + 1\n if (!(y.lt(MAX_FIELD_VALUE / 2) | y.eq(MAX_FIELD_VALUE / 2))) {\n y = (MAX_FIELD_VALUE + 1) - y;\n }\n\n AddressPoint { inner: Point { x: self.inner, y, is_infinite: false } }\n }\n\n pub fn compute(public_keys: PublicKeys, partial_address: PartialAddress) -> AztecAddress {\n let public_keys_hash = public_keys.hash();\n\n let pre_address = poseidon2_hash_with_separator(\n [public_keys_hash.to_field(), partial_address.to_field()],\n GENERATOR_INDEX__CONTRACT_ADDRESS_V1,\n );\n\n let address_point = derive_public_key(EmbeddedCurveScalar::from_field(pre_address)).add(\n public_keys.ivpk_m.to_point(),\n );\n\n // Note that our address is only the x-coordinate of the full address_point. This is okay because when people want to encrypt something and send it to us\n // they can recover our full point using the x-coordinate (our address itself). To do this, they recompute the y-coordinate according to the equation y^2 = x^3 - 17.\n // When they do this, they may get a positive y-coordinate (a value that is less than or equal to MAX_FIELD_VALUE / 2) or\n // a negative y-coordinate (a value that is more than MAX_FIELD_VALUE), and we cannot dictate which one they get and hence the recovered point may sometimes be different than the one\n // our secrect can decrypt. Regardless though, they should and will always encrypt using point with the positive y-coordinate by convention.\n // This ensures that everyone encrypts to the same point given an arbitrary x-coordinate (address). This is allowed because even though our original point may not have a positive y-coordinate,\n // with our original secret, we will be able to derive the secret to the point with the flipped (and now positive) y-coordinate that everyone encrypts to.\n AztecAddress::from_field(address_point.x)\n }\n\n pub fn compute_from_private_function(\n function_selector: FunctionSelector,\n function_vk_hash: Field,\n function_leaf_membership_witness: MembershipWitness<FUNCTION_TREE_HEIGHT>,\n contract_class_artifact_hash: Field,\n contract_class_public_bytecode_commitment: Field,\n salted_initialization_hash: SaltedInitializationHash,\n public_keys: PublicKeys,\n ) -> Self {\n let private_functions_root = private_functions_root_from_siblings(\n function_selector,\n function_vk_hash,\n function_leaf_membership_witness.leaf_index,\n function_leaf_membership_witness.sibling_path,\n );\n\n let contract_class_id = ContractClassId::compute(\n contract_class_artifact_hash,\n private_functions_root,\n contract_class_public_bytecode_commitment,\n );\n\n // Compute contract address using the preimage which includes the class_id.\n let partial_address = PartialAddress::compute_from_salted_initialization_hash(\n contract_class_id,\n salted_initialization_hash,\n );\n\n AztecAddress::compute(public_keys, partial_address)\n }\n\n pub fn is_zero(self) -> bool {\n self.inner == 0\n }\n\n pub fn assert_is_zero(self) {\n assert(self.to_field() == 0);\n }\n}\n\n#[test]\nfn compute_address_from_partial_and_pub_keys() {\n let public_keys = PublicKeys {\n npk_m: NpkM {\n inner: Point {\n x: 0x22f7fcddfa3ce3e8f0cc8e82d7b94cdd740afa3e77f8e4a63ea78a239432dcab,\n y: 0x0471657de2b6216ade6c506d28fbc22ba8b8ed95c871ad9f3e3984e90d9723a7,\n is_infinite: false,\n },\n },\n ivpk_m: IvpkM {\n inner: Point {\n x: 0x111223493147f6785514b1c195bb37a2589f22a6596d30bb2bb145fdc9ca8f1e,\n y: 0x273bbffd678edce8fe30e0deafc4f66d58357c06fd4a820285294b9746c3be95,\n is_infinite: false,\n },\n },\n ovpk_m: OvpkM {\n inner: Point {\n x: 0x09115c96e962322ffed6522f57194627136b8d03ac7469109707f5e44190c484,\n y: 0x0c49773308a13d740a7f0d4f0e6163b02c5a408b6f965856b6a491002d073d5b,\n is_infinite: false,\n },\n },\n tpk_m: TpkM {\n inner: Point {\n x: 0x00d3d81beb009873eb7116327cf47c612d5758ef083d4fda78e9b63980b2a762,\n y: 0x2f567d22d2b02fe1f4ad42db9d58a36afd1983e7e2909d1cab61cafedad6193a,\n is_infinite: false,\n },\n },\n };\n\n let partial_address = PartialAddress::from_field(\n 0x0a7c585381b10f4666044266a02405bf6e01fa564c8517d4ad5823493abd31de,\n );\n\n let address = AztecAddress::compute(public_keys, partial_address);\n\n // The following value was generated by `derivation.test.ts`.\n // --> Run the test with AZTEC_GENERATE_TEST_DATA=1 flag to update test data.\n let expected_computed_address_from_partial_and_pubkeys =\n 0x24e4646f58b9fbe7d38e317db8d5636c423fbbdfbe119fc190fe9c64747e0c62;\n assert(address.to_field() == expected_computed_address_from_partial_and_pubkeys);\n}\n\n#[test]\nfn compute_preaddress_from_partial_and_pub_keys() {\n let pre_address = poseidon2_hash_with_separator([1, 2], GENERATOR_INDEX__CONTRACT_ADDRESS_V1);\n let expected_computed_preaddress_from_partial_and_pubkey =\n 0x23ce9be3fa3c846b0f9245cc796902e731d04f086e8a42473bb29e405fc98075;\n assert(pre_address == expected_computed_preaddress_from_partial_and_pubkey);\n}\n\n#[test]\nfn from_field_to_field() {\n let address = AztecAddress { inner: 37 };\n assert_eq(FromField::from_field(address.to_field()), address);\n}\n\n#[test]\nfn serde() {\n let address = AztecAddress { inner: 37 };\n assert_eq(Deserialize::deserialize(address.serialize()), address);\n}\n"
|
|
2723
|
-
},
|
|
2724
|
-
"259": {
|
|
2725
|
-
"path": "/build-volume/noir-projects/noir-protocol-circuits/crates/types/src/hash.nr",
|
|
2726
|
-
"source": "use crate::{\n abis::{\n contract_class_function_leaf_preimage::ContractClassFunctionLeafPreimage,\n function_selector::FunctionSelector,\n log_hash::{LogHash, ScopedLogHash},\n note_hash::ScopedNoteHash,\n nullifier::ScopedNullifier,\n private_log::{PrivateLog, PrivateLogData},\n side_effect::{OrderedValue, scoped::Scoped},\n },\n address::{AztecAddress, EthAddress},\n constants::{\n FUNCTION_TREE_HEIGHT, GENERATOR_INDEX__NOTE_HASH_NONCE, GENERATOR_INDEX__OUTER_NULLIFIER,\n GENERATOR_INDEX__SILOED_NOTE_HASH, GENERATOR_INDEX__UNIQUE_NOTE_HASH,\n },\n merkle_tree::root::root_from_sibling_path,\n messaging::l2_to_l1_message::{L2ToL1Message, ScopedL2ToL1Message},\n poseidon2::Poseidon2Sponge,\n traits::{FromField, Hash, is_empty, ToField},\n utils::field::field_from_bytes_32_trunc,\n};\nuse super::{constants::TWO_POW_64, utils::{arrays::array_concat, field::field_from_bytes}};\n\npub fn sha256_to_field<let N: u32>(bytes_to_hash: [u8; N]) -> Field {\n let sha256_hashed = std::hash::sha256(bytes_to_hash);\n let hash_in_a_field = field_from_bytes_32_trunc(sha256_hashed);\n\n hash_in_a_field\n}\n\npub fn private_functions_root_from_siblings(\n selector: FunctionSelector,\n vk_hash: Field,\n function_leaf_index: Field,\n function_leaf_sibling_path: [Field; FUNCTION_TREE_HEIGHT],\n) -> Field {\n let function_leaf_preimage = ContractClassFunctionLeafPreimage { selector, vk_hash };\n let function_leaf = function_leaf_preimage.hash();\n root_from_sibling_path(\n function_leaf,\n function_leaf_index,\n function_leaf_sibling_path,\n )\n}\n\npub fn compute_note_hash_nonce(first_nullifier_in_tx: Field, note_index_in_tx: u32) -> Field {\n // Hashing the first nullifier with note index in tx is guaranteed to be unique (because all nullifiers are also\n // unique).\n poseidon2_hash_with_separator(\n [first_nullifier_in_tx, note_index_in_tx as Field],\n GENERATOR_INDEX__NOTE_HASH_NONCE,\n )\n}\n\npub fn compute_unique_note_hash(nonce: Field, siloed_note_hash: Field) -> Field {\n let inputs = [nonce, siloed_note_hash];\n poseidon2_hash_with_separator(inputs, GENERATOR_INDEX__UNIQUE_NOTE_HASH)\n}\n\npub fn compute_siloed_note_hash(app: AztecAddress, note_hash: Field) -> Field {\n poseidon2_hash_with_separator(\n [app.to_field(), note_hash],\n GENERATOR_INDEX__SILOED_NOTE_HASH,\n )\n}\n\n/// Computes unique note hashes from siloed note hashes\npub fn compute_unique_siloed_note_hash(\n siloed_note_hash: Field,\n first_nullifier: Field,\n note_index_in_tx: u32,\n) -> Field {\n if siloed_note_hash == 0 {\n 0\n } else {\n let nonce = compute_note_hash_nonce(first_nullifier, note_index_in_tx);\n compute_unique_note_hash(nonce, siloed_note_hash)\n }\n}\n\n/// Siloing in the context of Aztec refers to the process of hashing a note hash with a contract address (this way\n/// the note hash is scoped to a specific contract). This is used to prevent intermingling of notes between contracts.\npub fn silo_note_hash(note_hash: ScopedNoteHash) -> Field {\n if note_hash.contract_address.is_zero() {\n 0\n } else {\n compute_siloed_note_hash(note_hash.contract_address, note_hash.value())\n }\n}\n\npub fn compute_siloed_nullifier(app: AztecAddress, nullifier: Field) -> Field {\n poseidon2_hash_with_separator(\n [app.to_field(), nullifier],\n GENERATOR_INDEX__OUTER_NULLIFIER,\n )\n}\n\npub fn silo_nullifier(nullifier: ScopedNullifier) -> Field {\n if nullifier.contract_address.is_zero() {\n nullifier.value() // Return value instead of 0 because the first nullifier's contract address is zero.\n } else {\n compute_siloed_nullifier(nullifier.contract_address, nullifier.value())\n }\n}\n\npub fn compute_siloed_private_log_field(contract_address: AztecAddress, field: Field) -> Field {\n poseidon2_hash([contract_address.to_field(), field])\n}\n\npub fn silo_private_log(private_log: Scoped<PrivateLogData>) -> PrivateLog {\n if private_log.contract_address.is_zero() {\n private_log.inner.log\n } else {\n let mut fields = private_log.inner.log.fields;\n fields[0] = compute_siloed_private_log_field(private_log.contract_address, fields[0]);\n PrivateLog { fields }\n }\n}\n\nfn compute_siloed_unencrypted_log_hash(address: AztecAddress, log_hash: Field) -> Field {\n accumulate_sha256([address.to_field(), log_hash])\n}\n\npub fn silo_unencrypted_log_hash(log_hash: ScopedLogHash) -> Field {\n if log_hash.contract_address.is_zero() {\n 0\n } else {\n compute_siloed_unencrypted_log_hash(log_hash.contract_address, log_hash.value())\n }\n}\n\npub fn merkle_hash(left: Field, right: Field) -> Field {\n poseidon2_hash([left, right])\n}\n\npub fn compute_l2_to_l1_hash(\n contract_address: AztecAddress,\n recipient: EthAddress,\n content: Field,\n rollup_version_id: Field,\n chain_id: Field,\n) -> Field {\n let mut bytes: [u8; 160] = std::mem::zeroed();\n\n let inputs =\n [contract_address.to_field(), rollup_version_id, recipient.to_field(), chain_id, content];\n for i in 0..5 {\n // TODO are bytes be in fr.to_buffer() ?\n let item_bytes: [u8; 32] = inputs[i].to_be_bytes();\n for j in 0..32 {\n bytes[32 * i + j] = item_bytes[j];\n }\n }\n\n sha256_to_field(bytes)\n}\n\npub fn silo_l2_to_l1_message(\n msg: ScopedL2ToL1Message,\n rollup_version_id: Field,\n chain_id: Field,\n) -> Field {\n if msg.contract_address.is_zero() {\n 0\n } else {\n compute_l2_to_l1_hash(\n msg.contract_address,\n msg.message.recipient,\n msg.message.content,\n rollup_version_id,\n chain_id,\n )\n }\n}\n\n// Computes sha256 hash of 2 input hashes.\n//\n// NB: This method now takes in two 31 byte fields - it assumes that any input\n// is the result of a sha_to_field hash and => is truncated\n//\n// TODO(Jan and David): This is used for the encrypted_log hashes.\n// Can we check to see if we can just use hash_to_field or pedersen_compress here?\n//\npub fn accumulate_sha256(input: [Field; 2]) -> Field {\n // This is a note about the cpp code, since it takes an array of Fields\n // instead of a U128.\n // 4 Field elements when converted to bytes will usually\n // occupy 4 * 32 = 128 bytes.\n // However, this function is making the assumption that each Field\n // only occupies 128 bits.\n //\n // TODO(David): This does not seem to be getting guaranteed anywhere in the code?\n // Concatentate two fields into 32x2 = 64 bytes\n // accumulate_sha256 assumes that the inputs are pre-truncated 31 byte numbers\n let mut hash_input_flattened = [0; 64];\n for offset in 0..input.len() {\n let input_as_bytes: [u8; 32] = input[offset].to_be_bytes();\n for byte_index in 0..32 {\n hash_input_flattened[offset * 32 + byte_index] = input_as_bytes[byte_index];\n }\n }\n\n sha256_to_field(hash_input_flattened)\n}\n\n// Computes the final logs hash for a tx.\npub fn compute_tx_logs_hash<let N: u32>(logs: [LogHash; N]) -> Field {\n // Convert each field element into a byte array and append the bytes to `hash_input_flattened`\n let mut hash_input_flattened = [0; N * 32];\n for offset in 0..N {\n // TODO: This is not checking that the decomposition is smaller than P\n let input_as_bytes: [u8; 32] = logs[offset].value.to_be_radix(256);\n for byte_index in 0..32 {\n hash_input_flattened[offset * 32 + byte_index] = input_as_bytes[byte_index];\n }\n }\n // Ideally we would push to a slice then hash, but there is no sha_slice\n // Hardcode to 256 bytes for now\n let mut hash = sha256_to_field(hash_input_flattened);\n // Not having a 0 value hash for empty logs causes issues with empty txs\n // used for padding. Returning early is currently unsupported.\n // We always provide sorted logs here, so 0 being empty means all are empty.\n if is_empty(logs[0]) {\n hash = 0;\n }\n hash\n}\n\npub fn verification_key_hash<let N: u32>(key: [Field; N]) -> Field {\n crate::hash::poseidon2_hash(key)\n}\n\n#[inline_always]\npub fn pedersen_hash<let N: u32>(inputs: [Field; N], hash_index: u32) -> Field {\n std::hash::pedersen_hash_with_separator(inputs, hash_index)\n}\n\npub fn poseidon2_hash<let N: u32>(inputs: [Field; N]) -> Field {\n std::hash::poseidon2::Poseidon2::hash(inputs, N)\n}\n\n#[no_predicates]\npub fn poseidon2_hash_with_separator<let N: u32, T>(inputs: [Field; N], separator: T) -> Field\nwhere\n T: ToField,\n{\n let inputs_with_separator = array_concat([separator.to_field()], inputs);\n poseidon2_hash(inputs_with_separator)\n}\n\n// Performs a fixed length hash with a subarray of the given input.\n// Useful for SpongeBlob in which we aborb M things and want to check it vs a hash of M elts of an N-len array.\n// Using stdlib poseidon, this will always absorb an extra 1 as a 'variable' hash, and not match spongeblob.squeeze()\n// or any ts implementation. Also checks that any remaining elts not hashed are empty.\n#[no_predicates]\npub fn poseidon2_hash_subarray<let N: u32>(input: [Field; N], in_len: u32) -> Field {\n let mut sponge = poseidon2_absorb_chunks(input, in_len, false);\n sponge.squeeze()\n}\n\n// NB the below is the same as std::hash::poseidon2::Poseidon2::hash(), but replacing a range check with a bit check,\n// and absorbing in chunks of 3 below.\n#[no_predicates]\npub fn poseidon2_cheaper_variable_hash<let N: u32>(input: [Field; N], in_len: u32) -> Field {\n let mut sponge = poseidon2_absorb_chunks(input, in_len, true);\n // In the case where the hash preimage is variable-length, we append `1` to the end of the input, to distinguish\n // from fixed-length hashes. (the combination of this additional field element + the hash IV ensures\n // fixed-length and variable-length hashes do not collide)\n if in_len != N {\n sponge.absorb(1);\n }\n sponge.squeeze()\n}\n\n// The below fn reduces gates of a conditional poseidon2 hash by approx 3x (thank you ~* Giant Brain Dev @IlyasRidhuan *~ for the idea)\n// Why? Because when we call stdlib poseidon, we call absorb for each item. When absorbing is conditional, it seems the compiler does not know\n// what cache_size will be when calling absorb, so it assigns the permutation gates for /each i/ rather than /every 3rd i/, which is actually required.\n// The below code forces the compiler to:\n// - absorb normally up to 2 times to set cache_size to 1\n// - absorb in chunks of 3 to ensure perm. only happens every 3rd absorb\n// - absorb normally up to 2 times to add any remaining values to the hash\n// In fixed len hashes, the compiler is able to tell that it will only need to perform the permutation every 3 absorbs.\n// NB: it also replaces unnecessary range checks (i < thing) with a bit check (&= i != thing), which alone reduces the gates of a var. hash by half.\n\n#[no_predicates]\nfn poseidon2_absorb_chunks<let N: u32>(\n input: [Field; N],\n in_len: u32,\n variable: bool,\n) -> Poseidon2Sponge {\n let iv: Field = (in_len as Field) * TWO_POW_64;\n let mut sponge = Poseidon2Sponge::new(iv);\n // Even though shift is always 1 here, if we input in_len = 0 we get an underflow\n // since we cannot isolate computation branches. The below is just to avoid that.\n let shift = if in_len == 0 { 0 } else { 1 };\n if in_len != 0 {\n // cache_size = 0, init absorb\n sponge.cache[0] = input[0];\n sponge.cache_size = 1;\n // shift = num elts already added to make cache_size 1 = 1 for a fresh sponge\n // M = max_chunks = (N - 1 - (N - 1) % 3) / 3: (must be written as a fn of N to compile)\n // max_remainder = (N - 1) % 3;\n // max_chunks = (N - 1 - max_remainder) / 3;\n sponge = poseidon2_absorb_chunks_loop::<N, (N - 1 - (N - 1) % 3) / 3>(\n sponge,\n input,\n in_len,\n variable,\n shift,\n );\n }\n sponge\n}\n\n// NB: If it's not required to check that the non-absorbed elts of 'input' are 0s, set skip_0_check=true\n#[no_predicates]\npub fn poseidon2_absorb_chunks_existing_sponge<let N: u32>(\n in_sponge: Poseidon2Sponge,\n input: [Field; N],\n in_len: u32,\n skip_0_check: bool,\n) -> Poseidon2Sponge {\n let mut sponge = in_sponge;\n // 'shift' is to account for already added inputs\n let mut shift = 0;\n // 'stop' is to avoid an underflow when inputting in_len = 0\n let mut stop = false;\n for i in 0..3 {\n if shift == in_len {\n stop = true;\n }\n if (sponge.cache_size != 1) & (!stop) {\n sponge.absorb(input[i]);\n shift += 1;\n }\n }\n sponge = if stop {\n sponge\n } else {\n // max_chunks = (N - (N % 3)) / 3;\n poseidon2_absorb_chunks_loop::<N, (N - (N % 3)) / 3>(\n sponge,\n input,\n in_len,\n skip_0_check,\n shift,\n )\n };\n sponge\n}\n\n// The below is the loop to absorb elts into a poseidon sponge in chunks of 3\n// shift - the num of elts already absorbed to ensure the sponge's cache_size = 1\n// M - the max number of chunks required to absorb N things (must be comptime to compile)\n// NB: The 0 checks ('Found non-zero field...') are messy, but having a separate loop over N to check\n// for 0s costs 3N gates. Current approach is approx 2N gates.\n#[no_predicates]\nfn poseidon2_absorb_chunks_loop<let N: u32, let M: u32>(\n in_sponge: Poseidon2Sponge,\n input: [Field; N],\n in_len: u32,\n variable: bool,\n shift: u32,\n) -> Poseidon2Sponge {\n assert(in_len <= N, \"Given in_len to absorb is larger than the input array len\");\n // When we have an existing sponge, we may have a shift of 0, and the final 'k+2' below = N\n // The below avoids an overflow\n let skip_last = 3 * M == N;\n // Writing in_sponge: &mut does not compile\n let mut sponge = in_sponge;\n let mut should_add = true;\n // The num of things left over after absorbing in 3s\n let remainder = (in_len - shift) % 3;\n // The num of chunks of 3 to absorb (maximum M)\n let chunks = (in_len - shift - remainder) / 3;\n for i in 0..M {\n // Now we loop through cache size = 1 -> 3\n should_add &= i != chunks;\n // This is the index at the start of the chunk (for readability)\n let k = 3 * i + shift;\n if should_add {\n // cache_size = 1, 2 => just assign\n sponge.cache[1] = input[k];\n sponge.cache[2] = input[k + 1];\n // cache_size = 3 => duplex + perm\n for j in 0..3 {\n sponge.state[j] += sponge.cache[j];\n }\n sponge.state = std::hash::poseidon2_permutation(sponge.state, 4);\n sponge.cache[0] = input[k + 2];\n // cache_size is now 1 again, repeat loop\n } else if (!variable) & (i != chunks) {\n // if we are hashing a fixed len array which is a subarray, we check the remaining elts are 0\n // NB: we don't check at i == chunks, because that chunk contains elts to be absorbed or checked below\n let last_0 = if (i == M - 1) & (skip_last) {\n 0\n } else {\n input[k + 2]\n };\n let all_0 = (input[k] == 0) & (input[k + 1] == 0) & (last_0 == 0);\n assert(all_0, \"Found non-zero field after breakpoint\");\n }\n }\n // we have 'remainder' num of items left to absorb\n should_add = true;\n // below is to avoid overflows (i.e. if inlen is close to N)\n let mut should_check = !variable;\n for i in 0..3 {\n should_add &= i != remainder;\n should_check &= in_len - remainder + i != N;\n if should_add {\n // we want to absorb the final 'remainder' items\n sponge.absorb(input[in_len - remainder + i]);\n } else if should_check {\n assert(input[in_len - remainder + i] == 0, \"Found non-zero field after breakpoint\");\n }\n }\n sponge\n}\n\npub fn poseidon2_hash_with_separator_slice<T>(inputs: [Field], separator: T) -> Field\nwhere\n T: ToField,\n{\n let in_len = inputs.len() + 1;\n let iv: Field = (in_len as Field) * TWO_POW_64;\n let mut sponge = Poseidon2Sponge::new(iv);\n sponge.absorb(separator.to_field());\n\n for i in 0..inputs.len() {\n sponge.absorb(inputs[i]);\n }\n\n sponge.squeeze()\n}\n\n#[no_predicates]\npub fn poseidon2_hash_bytes<let N: u32>(inputs: [u8; N]) -> Field {\n let mut fields = [0; (N + 30) / 31];\n let mut field_index = 0;\n let mut current_field = [0; 31];\n for i in 0..inputs.len() {\n let index = i % 31;\n current_field[index] = inputs[i];\n if index == 30 {\n fields[field_index] = field_from_bytes(current_field, false);\n current_field = [0; 31];\n field_index += 1;\n }\n }\n if field_index != fields.len() {\n fields[field_index] = field_from_bytes(current_field, false);\n }\n poseidon2_hash(fields)\n}\n\n#[test]\nfn poseidon_chunks_matches_fixed() {\n let in_len = 501;\n let mut input: [Field; 4096] = [0; 4096];\n let mut fixed_input = [3; 501];\n assert(in_len == fixed_input.len()); // sanity check\n for i in 0..in_len {\n input[i] = 3;\n }\n let sub_chunk_hash = poseidon2_hash_subarray(input, in_len);\n let fixed_len_hash = std::hash::poseidon2::Poseidon2::hash(fixed_input, fixed_input.len());\n assert(sub_chunk_hash == fixed_len_hash);\n}\n\n#[test]\nfn poseidon_chunks_matches_variable() {\n let in_len = 501;\n let mut input: [Field; 4096] = [0; 4096];\n for i in 0..in_len {\n input[i] = 3;\n }\n let variable_chunk_hash = poseidon2_cheaper_variable_hash(input, in_len);\n let variable_len_hash = std::hash::poseidon2::Poseidon2::hash(input, in_len);\n assert(variable_chunk_hash == variable_len_hash);\n}\n\n#[test]\nfn existing_sponge_poseidon_chunks_matches_fixed() {\n let in_len = 501;\n let mut input: [Field; 4096] = [0; 4096];\n let mut fixed_input = [3; 501];\n assert(in_len == fixed_input.len()); // sanity check\n for i in 0..in_len {\n input[i] = 3;\n }\n // absorb 250 of the 501 things\n let empty_sponge = Poseidon2Sponge::new((in_len as Field) * TWO_POW_64);\n let first_sponge = poseidon2_absorb_chunks_existing_sponge(empty_sponge, input, 250, true);\n // now absorb the final 251 (since they are all 3s, im being lazy and not making a new array)\n let mut final_sponge = poseidon2_absorb_chunks_existing_sponge(first_sponge, input, 251, true);\n let fixed_len_hash = Poseidon2Sponge::hash(fixed_input, fixed_input.len());\n assert(final_sponge.squeeze() == fixed_len_hash);\n}\n\n#[test]\nfn poseidon_chunks_empty_inputs() {\n let in_len = 0;\n let mut input: [Field; 4096] = [0; 4096];\n let mut contructed_empty_sponge = poseidon2_absorb_chunks(input, in_len, true);\n let mut first_sponge =\n poseidon2_absorb_chunks_existing_sponge(contructed_empty_sponge, input, in_len, true);\n assert(first_sponge.squeeze() == contructed_empty_sponge.squeeze());\n}\n\n#[test]\nfn smoke_sha256_to_field() {\n let full_buffer = [\n 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24,\n 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47,\n 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70,\n 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93,\n 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112,\n 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130,\n 131, 132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145, 146, 147, 148,\n 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159,\n ];\n let result = sha256_to_field(full_buffer);\n\n assert(result == 0x448ebbc9e1a31220a2f3830c18eef61b9bd070e5084b7fa2a359fe729184c7);\n\n // to show correctness of the current ver (truncate one byte) vs old ver (mod full bytes):\n let result_bytes = std::hash::sha256(full_buffer);\n let truncated_field = crate::utils::field::field_from_bytes_32_trunc(result_bytes);\n assert(truncated_field == result);\n let mod_res = result + (result_bytes[31] as Field);\n assert(mod_res == 0x448ebbc9e1a31220a2f3830c18eef61b9bd070e5084b7fa2a359fe729184e0);\n}\n\n#[test]\nfn compute_l2_l1_hash() {\n // All zeroes\n let hash_result =\n compute_l2_to_l1_hash(AztecAddress::from_field(0), EthAddress::zero(), 0, 0, 0);\n assert(hash_result == 0xb393978842a0fa3d3e1470196f098f473f9678e72463cb65ec4ab5581856c2);\n\n // Non-zero case\n let hash_result = compute_l2_to_l1_hash(\n AztecAddress::from_field(1),\n EthAddress::from_field(3),\n 5,\n 2,\n 4,\n );\n assert(hash_result == 0x3f88c1044a05e5340ed20466276500f6d45ca5603913b9091e957161734e16);\n}\n\n#[test]\nfn silo_l2_to_l1_message_matches_typescript() {\n let version = 4;\n let chainId = 5;\n\n let hash = silo_l2_to_l1_message(\n ScopedL2ToL1Message {\n message: L2ToL1Message { recipient: EthAddress::from_field(1), content: 2, counter: 0 },\n contract_address: AztecAddress::from_field(3),\n },\n version,\n chainId,\n );\n\n // The following value was generated by `l2_to_l1_message.test.ts`\n let hash_from_typescript = 0x00c6155d69febb9d5039b374dd4f77bf57b7c881709aa524a18acaa0bd57476a;\n\n assert_eq(hash, hash_from_typescript);\n}\n"
|
|
2722
|
+
"source": "use crate::{\n abis::function_selector::FunctionSelector,\n address::{\n partial_address::PartialAddress, salted_initialization_hash::SaltedInitializationHash,\n },\n constants::{\n AZTEC_ADDRESS_LENGTH, FUNCTION_TREE_HEIGHT, GENERATOR_INDEX__CONTRACT_ADDRESS_V1,\n MAX_FIELD_VALUE,\n },\n contract_class_id::ContractClassId,\n hash::{poseidon2_hash_with_separator, private_functions_root_from_siblings},\n merkle_tree::membership::MembershipWitness,\n public_keys::{IvpkM, NpkM, OvpkM, PublicKeys, ToPoint, TpkM},\n traits::{Deserialize, Empty, FromField, Packable, Serialize, ToField},\n};\n\n// We do below because `use crate::point::Point;` does not work\nuse dep::std::embedded_curve_ops::EmbeddedCurvePoint as Point;\n\nuse crate::public_keys::AddressPoint;\nuse ec::{pow, sqrt};\nuse std::{\n embedded_curve_ops::{EmbeddedCurveScalar, fixed_base_scalar_mul as derive_public_key},\n ops::Add,\n};\n\n// Aztec address\npub struct AztecAddress {\n pub inner: Field,\n}\n\nimpl Eq for AztecAddress {\n fn eq(self, other: Self) -> bool {\n self.to_field() == other.to_field()\n }\n}\n\nimpl Empty for AztecAddress {\n fn empty() -> Self {\n Self { inner: 0 }\n }\n}\n\nimpl ToField for AztecAddress {\n fn to_field(self) -> Field {\n self.inner\n }\n}\n\nimpl FromField for AztecAddress {\n fn from_field(value: Field) -> AztecAddress {\n AztecAddress { inner: value }\n }\n}\n\nimpl Serialize<AZTEC_ADDRESS_LENGTH> for AztecAddress {\n fn serialize(self: Self) -> [Field; AZTEC_ADDRESS_LENGTH] {\n [self.to_field()]\n }\n}\n\nimpl Deserialize<AZTEC_ADDRESS_LENGTH> for AztecAddress {\n fn deserialize(fields: [Field; AZTEC_ADDRESS_LENGTH]) -> Self {\n FromField::from_field(fields[0])\n }\n}\n\n/// We implement the Packable trait for AztecAddress because it can be stored in contract's storage (and there\n/// the implementation of Packable is required).\nimpl Packable<AZTEC_ADDRESS_LENGTH> for AztecAddress {\n fn pack(self) -> [Field; AZTEC_ADDRESS_LENGTH] {\n self.serialize()\n }\n\n fn unpack(fields: [Field; AZTEC_ADDRESS_LENGTH]) -> Self {\n Self::deserialize(fields)\n }\n}\n\nimpl AztecAddress {\n pub fn zero() -> Self {\n Self { inner: 0 }\n }\n\n pub fn to_address_point(self) -> AddressPoint {\n // We compute the address point by taking our address, setting it to x, and then solving for y in the\n // equation which defines our bn curve:\n // y^2 = x^3 - 17; x = address\n let x = self.inner;\n let y_squared = pow(x, 3) - 17;\n\n // TODO (#8970): Handle cases where we cannot recover a point from an address\n let mut y = sqrt(y_squared);\n\n // If we get a negative y coordinate (any y where y > MAX_FIELD_VALUE / 2), we pin it to the\n // positive one (any value where y <= MAX_FIELD_VALUE / 2) by subtracting it from the Field modulus\n // note: The field modulus is MAX_FIELD_VALUE + 1\n if (!(y.lt(MAX_FIELD_VALUE / 2) | y.eq(MAX_FIELD_VALUE / 2))) {\n y = (MAX_FIELD_VALUE + 1) - y;\n }\n\n AddressPoint { inner: Point { x: self.inner, y, is_infinite: false } }\n }\n\n pub fn compute(public_keys: PublicKeys, partial_address: PartialAddress) -> AztecAddress {\n let public_keys_hash = public_keys.hash();\n\n let pre_address = poseidon2_hash_with_separator(\n [public_keys_hash.to_field(), partial_address.to_field()],\n GENERATOR_INDEX__CONTRACT_ADDRESS_V1,\n );\n\n let address_point = derive_public_key(EmbeddedCurveScalar::from_field(pre_address)).add(\n public_keys.ivpk_m.to_point(),\n );\n\n // Note that our address is only the x-coordinate of the full address_point. This is okay because when people want to encrypt something and send it to us\n // they can recover our full point using the x-coordinate (our address itself). To do this, they recompute the y-coordinate according to the equation y^2 = x^3 - 17.\n // When they do this, they may get a positive y-coordinate (a value that is less than or equal to MAX_FIELD_VALUE / 2) or\n // a negative y-coordinate (a value that is more than MAX_FIELD_VALUE), and we cannot dictate which one they get and hence the recovered point may sometimes be different than the one\n // our secrect can decrypt. Regardless though, they should and will always encrypt using point with the positive y-coordinate by convention.\n // This ensures that everyone encrypts to the same point given an arbitrary x-coordinate (address). This is allowed because even though our original point may not have a positive y-coordinate,\n // with our original secret, we will be able to derive the secret to the point with the flipped (and now positive) y-coordinate that everyone encrypts to.\n AztecAddress::from_field(address_point.x)\n }\n\n pub fn compute_from_private_function(\n function_selector: FunctionSelector,\n function_vk_hash: Field,\n function_leaf_membership_witness: MembershipWitness<FUNCTION_TREE_HEIGHT>,\n contract_class_artifact_hash: Field,\n contract_class_public_bytecode_commitment: Field,\n salted_initialization_hash: SaltedInitializationHash,\n public_keys: PublicKeys,\n ) -> Self {\n let private_functions_root = private_functions_root_from_siblings(\n function_selector,\n function_vk_hash,\n function_leaf_membership_witness.leaf_index,\n function_leaf_membership_witness.sibling_path,\n );\n\n let contract_class_id = ContractClassId::compute(\n contract_class_artifact_hash,\n private_functions_root,\n contract_class_public_bytecode_commitment,\n );\n\n // Compute contract address using the preimage which includes the class_id.\n let partial_address = PartialAddress::compute_from_salted_initialization_hash(\n contract_class_id,\n salted_initialization_hash,\n );\n\n AztecAddress::compute(public_keys, partial_address)\n }\n\n pub fn is_zero(self) -> bool {\n self.inner == 0\n }\n\n pub fn assert_is_zero(self) {\n assert(self.to_field() == 0);\n }\n}\n\n#[test]\nfn compute_address_from_partial_and_pub_keys() {\n let public_keys = PublicKeys {\n npk_m: NpkM {\n inner: Point {\n x: 0x22f7fcddfa3ce3e8f0cc8e82d7b94cdd740afa3e77f8e4a63ea78a239432dcab,\n y: 0x0471657de2b6216ade6c506d28fbc22ba8b8ed95c871ad9f3e3984e90d9723a7,\n is_infinite: false,\n },\n },\n ivpk_m: IvpkM {\n inner: Point {\n x: 0x111223493147f6785514b1c195bb37a2589f22a6596d30bb2bb145fdc9ca8f1e,\n y: 0x273bbffd678edce8fe30e0deafc4f66d58357c06fd4a820285294b9746c3be95,\n is_infinite: false,\n },\n },\n ovpk_m: OvpkM {\n inner: Point {\n x: 0x09115c96e962322ffed6522f57194627136b8d03ac7469109707f5e44190c484,\n y: 0x0c49773308a13d740a7f0d4f0e6163b02c5a408b6f965856b6a491002d073d5b,\n is_infinite: false,\n },\n },\n tpk_m: TpkM {\n inner: Point {\n x: 0x00d3d81beb009873eb7116327cf47c612d5758ef083d4fda78e9b63980b2a762,\n y: 0x2f567d22d2b02fe1f4ad42db9d58a36afd1983e7e2909d1cab61cafedad6193a,\n is_infinite: false,\n },\n },\n };\n\n let partial_address = PartialAddress::from_field(\n 0x0a7c585381b10f4666044266a02405bf6e01fa564c8517d4ad5823493abd31de,\n );\n\n let address = AztecAddress::compute(public_keys, partial_address);\n\n // The following value was generated by `derivation.test.ts`.\n // --> Run the test with AZTEC_GENERATE_TEST_DATA=1 flag to update test data.\n let expected_computed_address_from_partial_and_pubkeys =\n 0x24e4646f58b9fbe7d38e317db8d5636c423fbbdfbe119fc190fe9c64747e0c62;\n assert(address.to_field() == expected_computed_address_from_partial_and_pubkeys);\n}\n\n#[test]\nfn compute_preaddress_from_partial_and_pub_keys() {\n let pre_address = poseidon2_hash_with_separator([1, 2], GENERATOR_INDEX__CONTRACT_ADDRESS_V1);\n let expected_computed_preaddress_from_partial_and_pubkey =\n 0x23ce9be3fa3c846b0f9245cc796902e731d04f086e8a42473bb29e405fc98075;\n assert(pre_address == expected_computed_preaddress_from_partial_and_pubkey);\n}\n\n#[test]\nfn from_field_to_field() {\n let address = AztecAddress { inner: 37 };\n assert_eq(FromField::from_field(address.to_field()), address);\n}\n\n#[test]\nfn serde() {\n let address = AztecAddress { inner: 37 };\n assert_eq(Deserialize::deserialize(address.serialize()), address);\n}\n"
|
|
2727
2723
|
},
|
|
2728
2724
|
"26": {
|
|
2729
2725
|
"path": "std/hash/poseidon2.nr",
|
|
2730
2726
|
"source": "use crate::default::Default;\nuse crate::hash::Hasher;\n\ncomptime global RATE: u32 = 3;\n\npub struct Poseidon2 {\n cache: [Field; 3],\n state: [Field; 4],\n cache_size: u32,\n squeeze_mode: bool, // 0 => absorb, 1 => squeeze\n}\n\nimpl Poseidon2 {\n #[no_predicates]\n pub fn hash<let N: u32>(input: [Field; N], message_size: u32) -> Field {\n Poseidon2::hash_internal(input, message_size, message_size != N)\n }\n\n pub fn new(iv: Field) -> Poseidon2 {\n let mut result =\n Poseidon2 { cache: [0; 3], state: [0; 4], cache_size: 0, squeeze_mode: false };\n result.state[RATE] = iv;\n result\n }\n\n fn perform_duplex(&mut self) {\n // add the cache into sponge state\n for i in 0..RATE {\n // We effectively zero-pad the cache by only adding to the state\n // cache that is less than the specified `cache_size`\n if i < self.cache_size {\n self.state[i] += self.cache[i];\n }\n }\n self.state = crate::hash::poseidon2_permutation(self.state, 4);\n }\n\n fn absorb(&mut self, input: Field) {\n assert(!self.squeeze_mode);\n if self.cache_size == RATE {\n // If we're absorbing, and the cache is full, apply the sponge permutation to compress the cache\n self.perform_duplex();\n self.cache[0] = input;\n self.cache_size = 1;\n } else {\n // If we're absorbing, and the cache is not full, add the input into the cache\n self.cache[self.cache_size] = input;\n self.cache_size += 1;\n }\n }\n\n fn squeeze(&mut self) -> Field {\n assert(!self.squeeze_mode);\n // If we're in absorb mode, apply sponge permutation to compress the cache.\n self.perform_duplex();\n self.squeeze_mode = true;\n\n // Pop one item off the top of the permutation and return it.\n self.state[0]\n }\n\n fn hash_internal<let N: u32>(\n input: [Field; N],\n in_len: u32,\n is_variable_length: bool,\n ) -> Field {\n let two_pow_64 = 18446744073709551616;\n let iv: Field = (in_len as Field) * two_pow_64;\n let mut sponge = Poseidon2::new(iv);\n for i in 0..input.len() {\n if i < in_len {\n sponge.absorb(input[i]);\n }\n }\n\n // In the case where the hash preimage is variable-length, we append `1` to the end of the input, to distinguish\n // from fixed-length hashes. (the combination of this additional field element + the hash IV ensures\n // fixed-length and variable-length hashes do not collide)\n if is_variable_length {\n sponge.absorb(1);\n }\n sponge.squeeze()\n }\n}\n\npub struct Poseidon2Hasher {\n _state: [Field],\n}\n\nimpl Hasher for Poseidon2Hasher {\n fn finish(self) -> Field {\n let iv: Field = (self._state.len() as Field) * 18446744073709551616; // iv = (self._state.len() << 64)\n let mut sponge = Poseidon2::new(iv);\n for i in 0..self._state.len() {\n sponge.absorb(self._state[i]);\n }\n sponge.squeeze()\n }\n\n fn write(&mut self, input: Field) {\n self._state = self._state.push_back(input);\n }\n}\n\nimpl Default for Poseidon2Hasher {\n fn default() -> Self {\n Poseidon2Hasher { _state: &[] }\n }\n}\n"
|
|
2731
2727
|
},
|
|
2732
|
-
"
|
|
2728
|
+
"260": {
|
|
2729
|
+
"path": "/build-volume/noir-projects/noir-protocol-circuits/crates/types/src/hash.nr",
|
|
2730
|
+
"source": "use crate::{\n abis::{\n contract_class_function_leaf_preimage::ContractClassFunctionLeafPreimage,\n function_selector::FunctionSelector,\n log_hash::{LogHash, ScopedLogHash},\n note_hash::ScopedNoteHash,\n nullifier::ScopedNullifier,\n private_log::{PrivateLog, PrivateLogData},\n side_effect::{OrderedValue, scoped::Scoped},\n },\n address::{AztecAddress, EthAddress},\n constants::{\n FUNCTION_TREE_HEIGHT, GENERATOR_INDEX__NOTE_HASH_NONCE, GENERATOR_INDEX__OUTER_NULLIFIER,\n GENERATOR_INDEX__SILOED_NOTE_HASH, GENERATOR_INDEX__UNIQUE_NOTE_HASH,\n },\n merkle_tree::root::root_from_sibling_path,\n messaging::l2_to_l1_message::{L2ToL1Message, ScopedL2ToL1Message},\n poseidon2::Poseidon2Sponge,\n traits::{FromField, Hash, is_empty, ToField},\n utils::field::field_from_bytes_32_trunc,\n};\nuse super::{constants::TWO_POW_64, utils::{arrays::array_concat, field::field_from_bytes}};\n\npub fn sha256_to_field<let N: u32>(bytes_to_hash: [u8; N]) -> Field {\n let sha256_hashed = std::hash::sha256(bytes_to_hash);\n let hash_in_a_field = field_from_bytes_32_trunc(sha256_hashed);\n\n hash_in_a_field\n}\n\npub fn private_functions_root_from_siblings(\n selector: FunctionSelector,\n vk_hash: Field,\n function_leaf_index: Field,\n function_leaf_sibling_path: [Field; FUNCTION_TREE_HEIGHT],\n) -> Field {\n let function_leaf_preimage = ContractClassFunctionLeafPreimage { selector, vk_hash };\n let function_leaf = function_leaf_preimage.hash();\n root_from_sibling_path(\n function_leaf,\n function_leaf_index,\n function_leaf_sibling_path,\n )\n}\n\npub fn compute_note_hash_nonce(first_nullifier_in_tx: Field, note_index_in_tx: u32) -> Field {\n // Hashing the first nullifier with note index in tx is guaranteed to be unique (because all nullifiers are also\n // unique).\n poseidon2_hash_with_separator(\n [first_nullifier_in_tx, note_index_in_tx as Field],\n GENERATOR_INDEX__NOTE_HASH_NONCE,\n )\n}\n\npub fn compute_unique_note_hash(nonce: Field, siloed_note_hash: Field) -> Field {\n let inputs = [nonce, siloed_note_hash];\n poseidon2_hash_with_separator(inputs, GENERATOR_INDEX__UNIQUE_NOTE_HASH)\n}\n\npub fn compute_siloed_note_hash(app: AztecAddress, note_hash: Field) -> Field {\n poseidon2_hash_with_separator(\n [app.to_field(), note_hash],\n GENERATOR_INDEX__SILOED_NOTE_HASH,\n )\n}\n\n/// Computes unique note hashes from siloed note hashes\npub fn compute_unique_siloed_note_hash(\n siloed_note_hash: Field,\n first_nullifier: Field,\n note_index_in_tx: u32,\n) -> Field {\n if siloed_note_hash == 0 {\n 0\n } else {\n let nonce = compute_note_hash_nonce(first_nullifier, note_index_in_tx);\n compute_unique_note_hash(nonce, siloed_note_hash)\n }\n}\n\n/// Siloing in the context of Aztec refers to the process of hashing a note hash with a contract address (this way\n/// the note hash is scoped to a specific contract). This is used to prevent intermingling of notes between contracts.\npub fn silo_note_hash(note_hash: ScopedNoteHash) -> Field {\n if note_hash.contract_address.is_zero() {\n 0\n } else {\n compute_siloed_note_hash(note_hash.contract_address, note_hash.value())\n }\n}\n\npub fn compute_siloed_nullifier(app: AztecAddress, nullifier: Field) -> Field {\n poseidon2_hash_with_separator(\n [app.to_field(), nullifier],\n GENERATOR_INDEX__OUTER_NULLIFIER,\n )\n}\n\npub fn silo_nullifier(nullifier: ScopedNullifier) -> Field {\n if nullifier.contract_address.is_zero() {\n nullifier.value() // Return value instead of 0 because the first nullifier's contract address is zero.\n } else {\n compute_siloed_nullifier(nullifier.contract_address, nullifier.value())\n }\n}\n\npub fn compute_siloed_private_log_field(contract_address: AztecAddress, field: Field) -> Field {\n poseidon2_hash([contract_address.to_field(), field])\n}\n\npub fn silo_private_log(private_log: Scoped<PrivateLogData>) -> PrivateLog {\n if private_log.contract_address.is_zero() {\n private_log.inner.log\n } else {\n let mut fields = private_log.inner.log.fields;\n fields[0] = compute_siloed_private_log_field(private_log.contract_address, fields[0]);\n PrivateLog { fields }\n }\n}\n\nfn compute_siloed_contract_class_log_hash(address: AztecAddress, log_hash: Field) -> Field {\n accumulate_sha256([address.to_field(), log_hash])\n}\n\npub fn silo_contract_class_log_hash(log_hash: ScopedLogHash) -> Field {\n if log_hash.contract_address.is_zero() {\n 0\n } else {\n compute_siloed_contract_class_log_hash(log_hash.contract_address, log_hash.value())\n }\n}\n\npub fn merkle_hash(left: Field, right: Field) -> Field {\n poseidon2_hash([left, right])\n}\n\npub fn compute_l2_to_l1_hash(\n contract_address: AztecAddress,\n recipient: EthAddress,\n content: Field,\n rollup_version_id: Field,\n chain_id: Field,\n) -> Field {\n let mut bytes: [u8; 160] = std::mem::zeroed();\n\n let inputs =\n [contract_address.to_field(), rollup_version_id, recipient.to_field(), chain_id, content];\n for i in 0..5 {\n // TODO are bytes be in fr.to_buffer() ?\n let item_bytes: [u8; 32] = inputs[i].to_be_bytes();\n for j in 0..32 {\n bytes[32 * i + j] = item_bytes[j];\n }\n }\n\n sha256_to_field(bytes)\n}\n\npub fn silo_l2_to_l1_message(\n msg: ScopedL2ToL1Message,\n rollup_version_id: Field,\n chain_id: Field,\n) -> Field {\n if msg.contract_address.is_zero() {\n 0\n } else {\n compute_l2_to_l1_hash(\n msg.contract_address,\n msg.message.recipient,\n msg.message.content,\n rollup_version_id,\n chain_id,\n )\n }\n}\n\n// Computes sha256 hash of 2 input hashes.\n//\n// NB: This method now takes in two 31 byte fields - it assumes that any input\n// is the result of a sha_to_field hash and => is truncated\n//\n// TODO(Jan and David): This is used for the encrypted_log hashes.\n// Can we check to see if we can just use hash_to_field or pedersen_compress here?\n//\npub fn accumulate_sha256(input: [Field; 2]) -> Field {\n // This is a note about the cpp code, since it takes an array of Fields\n // instead of a U128.\n // 4 Field elements when converted to bytes will usually\n // occupy 4 * 32 = 128 bytes.\n // However, this function is making the assumption that each Field\n // only occupies 128 bits.\n //\n // TODO(David): This does not seem to be getting guaranteed anywhere in the code?\n // Concatentate two fields into 32x2 = 64 bytes\n // accumulate_sha256 assumes that the inputs are pre-truncated 31 byte numbers\n let mut hash_input_flattened = [0; 64];\n for offset in 0..input.len() {\n let input_as_bytes: [u8; 32] = input[offset].to_be_bytes();\n for byte_index in 0..32 {\n hash_input_flattened[offset * 32 + byte_index] = input_as_bytes[byte_index];\n }\n }\n\n sha256_to_field(hash_input_flattened)\n}\n\n// Computes the final logs hash for a tx.\npub fn compute_tx_logs_hash<let N: u32>(logs: [LogHash; N]) -> Field {\n // Convert each field element into a byte array and append the bytes to `hash_input_flattened`\n let mut hash_input_flattened = [0; N * 32];\n for offset in 0..N {\n // TODO: This is not checking that the decomposition is smaller than P\n let input_as_bytes: [u8; 32] = logs[offset].value.to_be_radix(256);\n for byte_index in 0..32 {\n hash_input_flattened[offset * 32 + byte_index] = input_as_bytes[byte_index];\n }\n }\n // Ideally we would push to a slice then hash, but there is no sha_slice\n // Hardcode to 256 bytes for now\n let mut hash = sha256_to_field(hash_input_flattened);\n // Not having a 0 value hash for empty logs causes issues with empty txs\n // used for padding. Returning early is currently unsupported.\n // We always provide sorted logs here, so 0 being empty means all are empty.\n if is_empty(logs[0]) {\n hash = 0;\n }\n hash\n}\n\npub fn verification_key_hash<let N: u32>(key: [Field; N]) -> Field {\n crate::hash::poseidon2_hash(key)\n}\n\n#[inline_always]\npub fn pedersen_hash<let N: u32>(inputs: [Field; N], hash_index: u32) -> Field {\n std::hash::pedersen_hash_with_separator(inputs, hash_index)\n}\n\npub fn poseidon2_hash<let N: u32>(inputs: [Field; N]) -> Field {\n std::hash::poseidon2::Poseidon2::hash(inputs, N)\n}\n\n#[no_predicates]\npub fn poseidon2_hash_with_separator<let N: u32, T>(inputs: [Field; N], separator: T) -> Field\nwhere\n T: ToField,\n{\n let inputs_with_separator = array_concat([separator.to_field()], inputs);\n poseidon2_hash(inputs_with_separator)\n}\n\n// Performs a fixed length hash with a subarray of the given input.\n// Useful for SpongeBlob in which we aborb M things and want to check it vs a hash of M elts of an N-len array.\n// Using stdlib poseidon, this will always absorb an extra 1 as a 'variable' hash, and not match spongeblob.squeeze()\n// or any ts implementation. Also checks that any remaining elts not hashed are empty.\n#[no_predicates]\npub fn poseidon2_hash_subarray<let N: u32>(input: [Field; N], in_len: u32) -> Field {\n let mut sponge = poseidon2_absorb_chunks(input, in_len, false);\n sponge.squeeze()\n}\n\n// NB the below is the same as std::hash::poseidon2::Poseidon2::hash(), but replacing a range check with a bit check,\n// and absorbing in chunks of 3 below.\n#[no_predicates]\npub fn poseidon2_cheaper_variable_hash<let N: u32>(input: [Field; N], in_len: u32) -> Field {\n let mut sponge = poseidon2_absorb_chunks(input, in_len, true);\n // In the case where the hash preimage is variable-length, we append `1` to the end of the input, to distinguish\n // from fixed-length hashes. (the combination of this additional field element + the hash IV ensures\n // fixed-length and variable-length hashes do not collide)\n if in_len != N {\n sponge.absorb(1);\n }\n sponge.squeeze()\n}\n\n// The below fn reduces gates of a conditional poseidon2 hash by approx 3x (thank you ~* Giant Brain Dev @IlyasRidhuan *~ for the idea)\n// Why? Because when we call stdlib poseidon, we call absorb for each item. When absorbing is conditional, it seems the compiler does not know\n// what cache_size will be when calling absorb, so it assigns the permutation gates for /each i/ rather than /every 3rd i/, which is actually required.\n// The below code forces the compiler to:\n// - absorb normally up to 2 times to set cache_size to 1\n// - absorb in chunks of 3 to ensure perm. only happens every 3rd absorb\n// - absorb normally up to 2 times to add any remaining values to the hash\n// In fixed len hashes, the compiler is able to tell that it will only need to perform the permutation every 3 absorbs.\n// NB: it also replaces unnecessary range checks (i < thing) with a bit check (&= i != thing), which alone reduces the gates of a var. hash by half.\n\n#[no_predicates]\nfn poseidon2_absorb_chunks<let N: u32>(\n input: [Field; N],\n in_len: u32,\n variable: bool,\n) -> Poseidon2Sponge {\n let iv: Field = (in_len as Field) * TWO_POW_64;\n let mut sponge = Poseidon2Sponge::new(iv);\n // Even though shift is always 1 here, if we input in_len = 0 we get an underflow\n // since we cannot isolate computation branches. The below is just to avoid that.\n let shift = if in_len == 0 { 0 } else { 1 };\n if in_len != 0 {\n // cache_size = 0, init absorb\n sponge.cache[0] = input[0];\n sponge.cache_size = 1;\n // shift = num elts already added to make cache_size 1 = 1 for a fresh sponge\n // M = max_chunks = (N - 1 - (N - 1) % 3) / 3: (must be written as a fn of N to compile)\n // max_remainder = (N - 1) % 3;\n // max_chunks = (N - 1 - max_remainder) / 3;\n sponge = poseidon2_absorb_chunks_loop::<N, (N - 1 - (N - 1) % 3) / 3>(\n sponge,\n input,\n in_len,\n variable,\n shift,\n );\n }\n sponge\n}\n\n// NB: If it's not required to check that the non-absorbed elts of 'input' are 0s, set skip_0_check=true\n#[no_predicates]\npub fn poseidon2_absorb_chunks_existing_sponge<let N: u32>(\n in_sponge: Poseidon2Sponge,\n input: [Field; N],\n in_len: u32,\n skip_0_check: bool,\n) -> Poseidon2Sponge {\n let mut sponge = in_sponge;\n // 'shift' is to account for already added inputs\n let mut shift = 0;\n // 'stop' is to avoid an underflow when inputting in_len = 0\n let mut stop = false;\n for i in 0..3 {\n if shift == in_len {\n stop = true;\n }\n if (sponge.cache_size != 1) & (!stop) {\n sponge.absorb(input[i]);\n shift += 1;\n }\n }\n sponge = if stop {\n sponge\n } else {\n // max_chunks = (N - (N % 3)) / 3;\n poseidon2_absorb_chunks_loop::<N, (N - (N % 3)) / 3>(\n sponge,\n input,\n in_len,\n skip_0_check,\n shift,\n )\n };\n sponge\n}\n\n// The below is the loop to absorb elts into a poseidon sponge in chunks of 3\n// shift - the num of elts already absorbed to ensure the sponge's cache_size = 1\n// M - the max number of chunks required to absorb N things (must be comptime to compile)\n// NB: The 0 checks ('Found non-zero field...') are messy, but having a separate loop over N to check\n// for 0s costs 3N gates. Current approach is approx 2N gates.\n#[no_predicates]\nfn poseidon2_absorb_chunks_loop<let N: u32, let M: u32>(\n in_sponge: Poseidon2Sponge,\n input: [Field; N],\n in_len: u32,\n variable: bool,\n shift: u32,\n) -> Poseidon2Sponge {\n assert(in_len <= N, \"Given in_len to absorb is larger than the input array len\");\n // When we have an existing sponge, we may have a shift of 0, and the final 'k+2' below = N\n // The below avoids an overflow\n let skip_last = 3 * M == N;\n // Writing in_sponge: &mut does not compile\n let mut sponge = in_sponge;\n let mut should_add = true;\n // The num of things left over after absorbing in 3s\n let remainder = (in_len - shift) % 3;\n // The num of chunks of 3 to absorb (maximum M)\n let chunks = (in_len - shift - remainder) / 3;\n for i in 0..M {\n // Now we loop through cache size = 1 -> 3\n should_add &= i != chunks;\n // This is the index at the start of the chunk (for readability)\n let k = 3 * i + shift;\n if should_add {\n // cache_size = 1, 2 => just assign\n sponge.cache[1] = input[k];\n sponge.cache[2] = input[k + 1];\n // cache_size = 3 => duplex + perm\n for j in 0..3 {\n sponge.state[j] += sponge.cache[j];\n }\n sponge.state = std::hash::poseidon2_permutation(sponge.state, 4);\n sponge.cache[0] = input[k + 2];\n // cache_size is now 1 again, repeat loop\n } else if (!variable) & (i != chunks) {\n // if we are hashing a fixed len array which is a subarray, we check the remaining elts are 0\n // NB: we don't check at i == chunks, because that chunk contains elts to be absorbed or checked below\n let last_0 = if (i == M - 1) & (skip_last) {\n 0\n } else {\n input[k + 2]\n };\n let all_0 = (input[k] == 0) & (input[k + 1] == 0) & (last_0 == 0);\n assert(all_0, \"Found non-zero field after breakpoint\");\n }\n }\n // we have 'remainder' num of items left to absorb\n should_add = true;\n // below is to avoid overflows (i.e. if inlen is close to N)\n let mut should_check = !variable;\n for i in 0..3 {\n should_add &= i != remainder;\n should_check &= in_len - remainder + i != N;\n if should_add {\n // we want to absorb the final 'remainder' items\n sponge.absorb(input[in_len - remainder + i]);\n } else if should_check {\n assert(input[in_len - remainder + i] == 0, \"Found non-zero field after breakpoint\");\n }\n }\n sponge\n}\n\npub fn poseidon2_hash_with_separator_slice<T>(inputs: [Field], separator: T) -> Field\nwhere\n T: ToField,\n{\n let in_len = inputs.len() + 1;\n let iv: Field = (in_len as Field) * TWO_POW_64;\n let mut sponge = Poseidon2Sponge::new(iv);\n sponge.absorb(separator.to_field());\n\n for i in 0..inputs.len() {\n sponge.absorb(inputs[i]);\n }\n\n sponge.squeeze()\n}\n\n#[no_predicates]\npub fn poseidon2_hash_bytes<let N: u32>(inputs: [u8; N]) -> Field {\n let mut fields = [0; (N + 30) / 31];\n let mut field_index = 0;\n let mut current_field = [0; 31];\n for i in 0..inputs.len() {\n let index = i % 31;\n current_field[index] = inputs[i];\n if index == 30 {\n fields[field_index] = field_from_bytes(current_field, false);\n current_field = [0; 31];\n field_index += 1;\n }\n }\n if field_index != fields.len() {\n fields[field_index] = field_from_bytes(current_field, false);\n }\n poseidon2_hash(fields)\n}\n\n#[test]\nfn poseidon_chunks_matches_fixed() {\n let in_len = 501;\n let mut input: [Field; 4096] = [0; 4096];\n let mut fixed_input = [3; 501];\n assert(in_len == fixed_input.len()); // sanity check\n for i in 0..in_len {\n input[i] = 3;\n }\n let sub_chunk_hash = poseidon2_hash_subarray(input, in_len);\n let fixed_len_hash = std::hash::poseidon2::Poseidon2::hash(fixed_input, fixed_input.len());\n assert(sub_chunk_hash == fixed_len_hash);\n}\n\n#[test]\nfn poseidon_chunks_matches_variable() {\n let in_len = 501;\n let mut input: [Field; 4096] = [0; 4096];\n for i in 0..in_len {\n input[i] = 3;\n }\n let variable_chunk_hash = poseidon2_cheaper_variable_hash(input, in_len);\n let variable_len_hash = std::hash::poseidon2::Poseidon2::hash(input, in_len);\n assert(variable_chunk_hash == variable_len_hash);\n}\n\n#[test]\nfn existing_sponge_poseidon_chunks_matches_fixed() {\n let in_len = 501;\n let mut input: [Field; 4096] = [0; 4096];\n let mut fixed_input = [3; 501];\n assert(in_len == fixed_input.len()); // sanity check\n for i in 0..in_len {\n input[i] = 3;\n }\n // absorb 250 of the 501 things\n let empty_sponge = Poseidon2Sponge::new((in_len as Field) * TWO_POW_64);\n let first_sponge = poseidon2_absorb_chunks_existing_sponge(empty_sponge, input, 250, true);\n // now absorb the final 251 (since they are all 3s, im being lazy and not making a new array)\n let mut final_sponge = poseidon2_absorb_chunks_existing_sponge(first_sponge, input, 251, true);\n let fixed_len_hash = Poseidon2Sponge::hash(fixed_input, fixed_input.len());\n assert(final_sponge.squeeze() == fixed_len_hash);\n}\n\n#[test]\nfn poseidon_chunks_empty_inputs() {\n let in_len = 0;\n let mut input: [Field; 4096] = [0; 4096];\n let mut constructed_empty_sponge = poseidon2_absorb_chunks(input, in_len, true);\n let mut first_sponge =\n poseidon2_absorb_chunks_existing_sponge(constructed_empty_sponge, input, in_len, true);\n assert(first_sponge.squeeze() == constructed_empty_sponge.squeeze());\n}\n\n#[test]\nfn smoke_sha256_to_field() {\n let full_buffer = [\n 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24,\n 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47,\n 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70,\n 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93,\n 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112,\n 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130,\n 131, 132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145, 146, 147, 148,\n 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159,\n ];\n let result = sha256_to_field(full_buffer);\n\n assert(result == 0x448ebbc9e1a31220a2f3830c18eef61b9bd070e5084b7fa2a359fe729184c7);\n\n // to show correctness of the current ver (truncate one byte) vs old ver (mod full bytes):\n let result_bytes = std::hash::sha256(full_buffer);\n let truncated_field = crate::utils::field::field_from_bytes_32_trunc(result_bytes);\n assert(truncated_field == result);\n let mod_res = result + (result_bytes[31] as Field);\n assert(mod_res == 0x448ebbc9e1a31220a2f3830c18eef61b9bd070e5084b7fa2a359fe729184e0);\n}\n\n#[test]\nfn compute_l2_l1_hash() {\n // All zeroes\n let hash_result =\n compute_l2_to_l1_hash(AztecAddress::from_field(0), EthAddress::zero(), 0, 0, 0);\n assert(hash_result == 0xb393978842a0fa3d3e1470196f098f473f9678e72463cb65ec4ab5581856c2);\n\n // Non-zero case\n let hash_result = compute_l2_to_l1_hash(\n AztecAddress::from_field(1),\n EthAddress::from_field(3),\n 5,\n 2,\n 4,\n );\n assert(hash_result == 0x3f88c1044a05e5340ed20466276500f6d45ca5603913b9091e957161734e16);\n}\n\n#[test]\nfn silo_l2_to_l1_message_matches_typescript() {\n let version = 4;\n let chainId = 5;\n\n let hash = silo_l2_to_l1_message(\n ScopedL2ToL1Message {\n message: L2ToL1Message { recipient: EthAddress::from_field(1), content: 2, counter: 0 },\n contract_address: AztecAddress::from_field(3),\n },\n version,\n chainId,\n );\n\n // The following value was generated by `l2_to_l1_message.test.ts`\n let hash_from_typescript = 0x00c6155d69febb9d5039b374dd4f77bf57b7c881709aa524a18acaa0bd57476a;\n\n assert_eq(hash, hash_from_typescript);\n}\n"
|
|
2731
|
+
},
|
|
2732
|
+
"277": {
|
|
2733
2733
|
"path": "/build-volume/noir-projects/noir-protocol-circuits/crates/types/src/poseidon2.nr",
|
|
2734
2734
|
"source": "use crate::constants::TWO_POW_64;\n\n// NB: This is a clone of noir/noir-repo/noir_stdlib/src/hash/poseidon2.nr\n// It exists as we sometimes need to perform custom absorption, but the stdlib version\n// has a private absorb() method (it's also designed to just be a hasher)\n// Can be removed when standalone noir poseidon lib exists: See noir#6679\n\ncomptime global RATE: u32 = 3;\n\npub struct Poseidon2Sponge {\n pub cache: [Field; 3],\n pub state: [Field; 4],\n pub cache_size: u32,\n pub squeeze_mode: bool, // 0 => absorb, 1 => squeeze\n}\n\nimpl Poseidon2Sponge {\n #[no_predicates]\n pub fn hash<let N: u32>(input: [Field; N], message_size: u32) -> Field {\n Poseidon2Sponge::hash_internal(input, message_size, message_size != N)\n }\n\n pub(crate) fn new(iv: Field) -> Poseidon2Sponge {\n let mut result =\n Poseidon2Sponge { cache: [0; 3], state: [0; 4], cache_size: 0, squeeze_mode: false };\n result.state[RATE] = iv;\n result\n }\n\n fn perform_duplex(&mut self) {\n // add the cache into sponge state\n for i in 0..RATE {\n // We effectively zero-pad the cache by only adding to the state\n // cache that is less than the specified `cache_size`\n if i < self.cache_size {\n self.state[i] += self.cache[i];\n }\n }\n self.state = std::hash::poseidon2_permutation(self.state, 4);\n }\n\n pub fn absorb(&mut self, input: Field) {\n assert(!self.squeeze_mode);\n if self.cache_size == RATE {\n // If we're absorbing, and the cache is full, apply the sponge permutation to compress the cache\n self.perform_duplex();\n self.cache[0] = input;\n self.cache_size = 1;\n } else {\n // If we're absorbing, and the cache is not full, add the input into the cache\n self.cache[self.cache_size] = input;\n self.cache_size += 1;\n }\n }\n\n pub fn squeeze(&mut self) -> Field {\n assert(!self.squeeze_mode);\n // If we're in absorb mode, apply sponge permutation to compress the cache.\n self.perform_duplex();\n self.squeeze_mode = true;\n\n // Pop one item off the top of the permutation and return it.\n self.state[0]\n }\n\n fn hash_internal<let N: u32>(\n input: [Field; N],\n in_len: u32,\n is_variable_length: bool,\n ) -> Field {\n let iv: Field = (in_len as Field) * TWO_POW_64;\n let mut sponge = Poseidon2Sponge::new(iv);\n for i in 0..input.len() {\n if i < in_len {\n sponge.absorb(input[i]);\n }\n }\n\n // In the case where the hash preimage is variable-length, we append `1` to the end of the input, to distinguish\n // from fixed-length hashes. (the combination of this additional field element + the hash IV ensures\n // fixed-length and variable-length hashes do not collide)\n if is_variable_length {\n sponge.absorb(1);\n }\n sponge.squeeze()\n }\n}\n"
|
|
2735
2735
|
},
|
|
2736
|
-
"
|
|
2736
|
+
"289": {
|
|
2737
2737
|
"path": "/build-volume/noir-projects/noir-protocol-circuits/crates/types/src/storage/map.nr",
|
|
2738
2738
|
"source": "use crate::{hash::poseidon2_hash, traits::ToField};\n\npub fn derive_storage_slot_in_map<K>(storage_slot: Field, key: K) -> Field\nwhere\n K: ToField,\n{\n poseidon2_hash([storage_slot, key.to_field()])\n}\n\nmod test {\n use crate::{address::AztecAddress, storage::map::derive_storage_slot_in_map, traits::FromField};\n\n #[test]\n fn test_derive_storage_slot_in_map_matches_typescript() {\n let map_slot = 0x132258fb6962c4387ba659d9556521102d227549a386d39f0b22d1890d59c2b5;\n let key = AztecAddress::from_field(\n 0x302dbc2f9b50a73283d5fb2f35bc01eae8935615817a0b4219a057b2ba8a5a3f,\n );\n\n let slot = derive_storage_slot_in_map(map_slot, key);\n\n // The following value was generated by `map_slot.test.ts`\n let slot_from_typescript =\n 0x15b9fe39449affd8b377461263e9d2b610b9ad40580553500b4e41d9cbd887ac;\n\n assert_eq(slot, slot_from_typescript);\n }\n}\n"
|
|
2739
2739
|
},
|
|
2740
|
-
"
|
|
2740
|
+
"306": {
|
|
2741
|
+
"path": "/build-volume/noir-projects/noir-protocol-circuits/crates/types/src/type_packing.nr",
|
|
2742
|
+
"source": "use crate::traits::{Packable, ToField};\n\nglobal BOOL_PACKED_LEN: u32 = 1;\nglobal U8_PACKED_LEN: u32 = 1;\nglobal U16_PACKED_LEN: u32 = 1;\nglobal U32_PACKED_LEN: u32 = 1;\nglobal U64_PACKED_LEN: u32 = 1;\nglobal U128_PACKED_LEN: u32 = 1;\nglobal FIELD_PACKED_LEN: u32 = 1;\nglobal I8_PACKED_LEN: u32 = 1;\nglobal I16_PACKED_LEN: u32 = 1;\nglobal I32_PACKED_LEN: u32 = 1;\nglobal I64_PACKED_LEN: u32 = 1;\n\nimpl Packable<BOOL_PACKED_LEN> for bool {\n fn pack(self) -> [Field; BOOL_PACKED_LEN] {\n [self as Field]\n }\n\n fn unpack(fields: [Field; BOOL_PACKED_LEN]) -> bool {\n fields[0] as bool\n }\n}\n\nimpl Packable<U8_PACKED_LEN> for u8 {\n fn pack(self) -> [Field; U8_PACKED_LEN] {\n [self as Field]\n }\n\n fn unpack(fields: [Field; U8_PACKED_LEN]) -> Self {\n fields[0] as u8\n }\n}\n\nimpl Packable<U16_PACKED_LEN> for u16 {\n fn pack(self) -> [Field; U16_PACKED_LEN] {\n [self as Field]\n }\n\n fn unpack(fields: [Field; U16_PACKED_LEN]) -> Self {\n fields[0] as u16\n }\n}\n\nimpl Packable<U32_PACKED_LEN> for u32 {\n fn pack(self) -> [Field; U32_PACKED_LEN] {\n [self as Field]\n }\n\n fn unpack(fields: [Field; U32_PACKED_LEN]) -> Self {\n fields[0] as u32\n }\n}\n\nimpl Packable<U64_PACKED_LEN> for u64 {\n fn pack(self) -> [Field; U64_PACKED_LEN] {\n [self as Field]\n }\n\n fn unpack(fields: [Field; U64_PACKED_LEN]) -> Self {\n fields[0] as u64\n }\n}\n\nimpl Packable<U128_PACKED_LEN> for U128 {\n fn pack(self) -> [Field; U128_PACKED_LEN] {\n [self.to_field()]\n }\n\n fn unpack(fields: [Field; U128_PACKED_LEN]) -> Self {\n U128::from_integer(fields[0])\n }\n}\n\nimpl Packable<FIELD_PACKED_LEN> for Field {\n fn pack(self) -> [Field; FIELD_PACKED_LEN] {\n [self]\n }\n\n fn unpack(fields: [Field; FIELD_PACKED_LEN]) -> Self {\n fields[0]\n }\n}\n\nimpl Packable<I8_PACKED_LEN> for i8 {\n fn pack(self) -> [Field; I8_PACKED_LEN] {\n [self as Field]\n }\n\n fn unpack(fields: [Field; I8_PACKED_LEN]) -> Self {\n fields[0] as i8\n }\n}\n\nimpl Packable<I16_PACKED_LEN> for i16 {\n fn pack(self) -> [Field; I16_PACKED_LEN] {\n [self as Field]\n }\n\n fn unpack(fields: [Field; I16_PACKED_LEN]) -> Self {\n fields[0] as i16\n }\n}\n\nimpl Packable<I32_PACKED_LEN> for i32 {\n fn pack(self) -> [Field; I32_PACKED_LEN] {\n [self as Field]\n }\n\n fn unpack(fields: [Field; I32_PACKED_LEN]) -> Self {\n fields[0] as i32\n }\n}\n\nimpl Packable<I64_PACKED_LEN> for i64 {\n fn pack(self) -> [Field; I64_PACKED_LEN] {\n [self as Field]\n }\n\n fn unpack(fields: [Field; I64_PACKED_LEN]) -> Self {\n fields[0] as i64\n }\n}\n\nimpl<T, let N: u32, let M: u32> Packable<N * M> for [T; N]\nwhere\n T: Packable<M>,\n{\n fn pack(self) -> [Field; N * M] {\n let mut result: [Field; N * M] = std::mem::zeroed();\n let mut serialized: [Field; M] = std::mem::zeroed();\n for i in 0..N {\n serialized = self[i].pack();\n for j in 0..M {\n result[i * M + j] = serialized[j];\n }\n }\n result\n }\n\n fn unpack(fields: [Field; N * M]) -> Self {\n let mut reader = crate::utils::reader::Reader::new(fields);\n let mut result: [T; N] = std::mem::zeroed();\n reader.read_struct_array::<T, M, N>(Packable::unpack, result)\n }\n}\n\n#[test]\nfn test_u16_packing() {\n let a: u16 = 10;\n assert_eq(a, u16::unpack(a.pack()));\n}\n\n#[test]\nfn test_i8_packing() {\n let a: i8 = -10;\n assert_eq(a, i8::unpack(a.pack()));\n}\n\n#[test]\nfn test_i16_packing() {\n let a: i16 = -10;\n assert_eq(a, i16::unpack(a.pack()));\n}\n\n#[test]\nfn test_i32_packing() {\n let a: i32 = -10;\n assert_eq(a, i32::unpack(a.pack()));\n}\n\n#[test]\nfn test_i64_packing() {\n let a: i64 = -10;\n assert_eq(a, i64::unpack(a.pack()));\n}\n"
|
|
2743
|
+
},
|
|
2744
|
+
"307": {
|
|
2741
2745
|
"path": "/build-volume/noir-projects/noir-protocol-circuits/crates/types/src/type_serialization.nr",
|
|
2742
|
-
"source": "use crate::traits::{Deserialize, Serialize};\n\nglobal BOOL_SERIALIZED_LEN: u32 = 1;\nglobal U8_SERIALIZED_LEN: u32 = 1;\nglobal U16_SERIALIZED_LEN: u32 = 1;\nglobal U32_SERIALIZED_LEN: u32 = 1;\nglobal U64_SERIALIZED_LEN: u32 = 1;\nglobal U128_SERIALIZED_LEN: u32 =
|
|
2746
|
+
"source": "use crate::traits::{Deserialize, Serialize};\n\nglobal BOOL_SERIALIZED_LEN: u32 = 1;\nglobal U8_SERIALIZED_LEN: u32 = 1;\nglobal U16_SERIALIZED_LEN: u32 = 1;\nglobal U32_SERIALIZED_LEN: u32 = 1;\nglobal U64_SERIALIZED_LEN: u32 = 1;\nglobal U128_SERIALIZED_LEN: u32 = 2;\nglobal FIELD_SERIALIZED_LEN: u32 = 1;\nglobal I8_SERIALIZED_LEN: u32 = 1;\nglobal I16_SERIALIZED_LEN: u32 = 1;\nglobal I32_SERIALIZED_LEN: u32 = 1;\nglobal I64_SERIALIZED_LEN: u32 = 1;\n\nimpl Serialize<BOOL_SERIALIZED_LEN> for bool {\n fn serialize(self) -> [Field; BOOL_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<BOOL_SERIALIZED_LEN> for bool {\n fn deserialize(fields: [Field; BOOL_SERIALIZED_LEN]) -> bool {\n fields[0] as bool\n }\n}\n\nimpl Serialize<U8_SERIALIZED_LEN> for u8 {\n fn serialize(self) -> [Field; U8_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<U8_SERIALIZED_LEN> for u8 {\n fn deserialize(fields: [Field; U8_SERIALIZED_LEN]) -> Self {\n fields[0] as u8\n }\n}\n\nimpl Serialize<U16_SERIALIZED_LEN> for u16 {\n fn serialize(self) -> [Field; U16_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<U16_SERIALIZED_LEN> for u16 {\n fn deserialize(fields: [Field; U16_SERIALIZED_LEN]) -> Self {\n fields[0] as u16\n }\n}\n\nimpl Serialize<U32_SERIALIZED_LEN> for u32 {\n fn serialize(self) -> [Field; U32_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<U32_SERIALIZED_LEN> for u32 {\n fn deserialize(fields: [Field; U32_SERIALIZED_LEN]) -> Self {\n fields[0] as u32\n }\n}\n\nimpl Serialize<U64_SERIALIZED_LEN> for u64 {\n fn serialize(self) -> [Field; U64_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<U64_SERIALIZED_LEN> for u64 {\n fn deserialize(fields: [Field; U64_SERIALIZED_LEN]) -> Self {\n fields[0] as u64\n }\n}\n\nimpl Serialize<U128_SERIALIZED_LEN> for U128 {\n fn serialize(self) -> [Field; U128_SERIALIZED_LEN] {\n // We use little-endian ordering to match the order in which U128 defines its limbs.\n // This is necessary because of how Noir handles serialization:\n // - When calling a contract function from TypeScript, the serialization in encoder.ts gets used and then Noir\n // deserializes using its intrinsic serialization logic (based on the limb order in the struct).\n // - When calling a contract function from another function, the `serialize` method is invoked on the type\n // first.\n // For this reason if we didn't use the ordering of U128 limbs here and in encoder.ts we would get an arguments\n // hash mismatch.\n [self.lo, self.hi]\n }\n}\n\nimpl Deserialize<U128_SERIALIZED_LEN> for U128 {\n fn deserialize(fields: [Field; U128_SERIALIZED_LEN]) -> Self {\n U128::from_u64s_le(fields[0] as u64, fields[1] as u64)\n }\n}\n\nimpl Serialize<FIELD_SERIALIZED_LEN> for Field {\n fn serialize(self) -> [Field; FIELD_SERIALIZED_LEN] {\n [self]\n }\n}\n\nimpl Deserialize<FIELD_SERIALIZED_LEN> for Field {\n fn deserialize(fields: [Field; FIELD_SERIALIZED_LEN]) -> Self {\n fields[0]\n }\n}\n\nimpl Serialize<I8_SERIALIZED_LEN> for i8 {\n fn serialize(self) -> [Field; I8_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<I8_SERIALIZED_LEN> for i8 {\n fn deserialize(fields: [Field; I8_SERIALIZED_LEN]) -> Self {\n fields[0] as i8\n }\n}\n\nimpl Serialize<I16_SERIALIZED_LEN> for i16 {\n fn serialize(self) -> [Field; I16_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<I16_SERIALIZED_LEN> for i16 {\n fn deserialize(fields: [Field; I16_SERIALIZED_LEN]) -> Self {\n fields[0] as i16\n }\n}\n\nimpl Serialize<I32_SERIALIZED_LEN> for i32 {\n fn serialize(self) -> [Field; I32_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<I32_SERIALIZED_LEN> for i32 {\n fn deserialize(fields: [Field; I32_SERIALIZED_LEN]) -> Self {\n fields[0] as i32\n }\n}\n\nimpl Serialize<I64_SERIALIZED_LEN> for i64 {\n fn serialize(self) -> [Field; I64_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<I64_SERIALIZED_LEN> for i64 {\n fn deserialize(fields: [Field; I64_SERIALIZED_LEN]) -> Self {\n fields[0] as i64\n }\n}\n\nimpl<T, let N: u32, let M: u32> Serialize<N * M> for [T; N]\nwhere\n T: Serialize<M>,\n{\n fn serialize(self) -> [Field; N * M] {\n let mut result: [Field; N * M] = std::mem::zeroed();\n let mut serialized: [Field; M] = std::mem::zeroed();\n for i in 0..N {\n serialized = self[i].serialize();\n for j in 0..M {\n result[i * M + j] = serialized[j];\n }\n }\n result\n }\n}\n\nimpl<T, let N: u32, let M: u32> Deserialize<N * M> for [T; N]\nwhere\n T: Deserialize<M>,\n{\n fn deserialize(fields: [Field; N * M]) -> Self {\n let mut reader = crate::utils::reader::Reader::new(fields);\n let mut result: [T; N] = std::mem::zeroed();\n reader.read_struct_array::<T, M, N>(Deserialize::deserialize, result)\n }\n}\n\n#[test]\nfn test_u16_serialization() {\n let a: u16 = 10;\n assert_eq(a, u16::deserialize(a.serialize()));\n}\n\n#[test]\nfn test_i8_serialization() {\n let a: i8 = -10;\n assert_eq(a, i8::deserialize(a.serialize()));\n}\n\n#[test]\nfn test_i16_serialization() {\n let a: i16 = -10;\n assert_eq(a, i16::deserialize(a.serialize()));\n}\n\n#[test]\nfn test_i32_serialization() {\n let a: i32 = -10;\n assert_eq(a, i32::deserialize(a.serialize()));\n}\n\n#[test]\nfn test_i64_serialization() {\n let a: i64 = -10;\n assert_eq(a, i64::deserialize(a.serialize()));\n}\n"
|
|
2743
2747
|
},
|
|
2744
|
-
"
|
|
2748
|
+
"323": {
|
|
2745
2749
|
"path": "/build-volume/noir-projects/noir-protocol-circuits/crates/types/src/utils/arrays.nr",
|
|
2746
2750
|
"source": "pub mod assert_array_appended;\npub mod assert_array_prepended;\npub mod assert_combined_array;\npub mod assert_combined_transformed_array;\npub mod assert_exposed_sorted_transformed_value_array;\npub mod assert_sorted_array;\npub mod assert_sorted_transformed_value_array;\npub mod assert_split_sorted_transformed_value_arrays;\npub mod assert_split_transformed_value_arrays;\npub mod get_sorted_result;\npub mod get_sorted_tuple;\npub mod sort_by;\npub mod sort_by_counter;\n\n// Re-exports.\npub use assert_array_appended::{\n assert_array_appended, assert_array_appended_and_scoped, assert_array_appended_reversed,\n assert_array_appended_scoped,\n};\npub use assert_array_prepended::assert_array_prepended;\npub use assert_combined_array::{assert_combined_array, combine_arrays};\npub use assert_combined_transformed_array::{\n assert_combined_transformed_array, combine_and_transform_arrays,\n};\npub use assert_exposed_sorted_transformed_value_array::{\n assert_exposed_sorted_transformed_value_array,\n get_order_hints::{get_order_hints_asc, get_order_hints_desc, OrderHint},\n};\npub use assert_sorted_array::assert_sorted_array;\npub use assert_sorted_transformed_value_array::{\n assert_sorted_transformed_value_array, assert_sorted_transformed_value_array_capped_size,\n};\npub use assert_split_sorted_transformed_value_arrays::{\n assert_split_sorted_transformed_value_arrays_asc,\n assert_split_sorted_transformed_value_arrays_desc,\n get_split_order_hints::{get_split_order_hints_asc, get_split_order_hints_desc, SplitOrderHints},\n};\npub use assert_split_transformed_value_arrays::assert_split_transformed_value_arrays;\npub use get_sorted_result::{get_sorted_result, SortedResult};\npub use sort_by_counter::{sort_by_counter_asc, sort_by_counter_desc};\n\nuse crate::traits::{Empty, is_empty};\n\npub fn subarray<let SRC_LEN: u32, let DST_LEN: u32>(\n src: [Field; SRC_LEN],\n offset: u32,\n) -> [Field; DST_LEN] {\n assert(offset + DST_LEN <= SRC_LEN, \"offset too large\");\n\n let mut dst: [Field; DST_LEN] = std::mem::zeroed();\n for i in 0..DST_LEN {\n dst[i] = src[i + offset];\n }\n\n dst\n}\n\n// Helper function to convert a validated array to BoundedVec.\n// Important: Only use it for validated arrays: validate_array(array) should be true.\npub unconstrained fn array_to_bounded_vec<T, let N: u32>(array: [T; N]) -> BoundedVec<T, N>\nwhere\n T: Empty + Eq,\n{\n let len = array_length(array);\n BoundedVec::from_parts_unchecked(array, len)\n}\n\n// Helper function to find the index of the first element in an array that satisfies a given predicate. If the element\n// is not found, the function returns N as the index.\npub unconstrained fn find_index_hint<T, let N: u32, Env>(\n array: [T; N],\n find: fn[Env](T) -> bool,\n) -> u32 {\n let mut index = N;\n for i in 0..N {\n // We check `index == N` to ensure that we only update the index if we haven't found a match yet.\n if (index == N) & find(array[i]) {\n index = i;\n }\n }\n index\n}\n\n// Routine which validates that all zero values of an array form a contiguous region at the end, i.e.,\n// of the form: [*,*,*...,0,0,0,0] where any * is non-zero. Note that a full array of non-zero values is\n// valid.\npub fn validate_array<T, let N: u32>(array: [T; N]) -> u32\nwhere\n T: Empty + Eq,\n{\n let mut seen_empty = false;\n let mut length = 0;\n for i in 0..N {\n if is_empty(array[i]) {\n seen_empty = true;\n } else {\n assert(seen_empty == false, \"invalid array\");\n length += 1;\n }\n }\n length\n}\n\n// Helper function to count the number of non-empty elements in a validated array.\n// Important: Only use it for validated arrays where validate_array(array) returns true,\n// which ensures that:\n// 1. All elements before the first empty element are non-empty\n// 2. All elements after and including the first empty element are empty\n// 3. The array forms a contiguous sequence of non-empty elements followed by empty elements\npub fn array_length<T, let N: u32>(array: [T; N]) -> u32\nwhere\n T: Empty + Eq,\n{\n // We get the length by checking the index of the first empty element.\n\n /// Safety: This is safe because we have validated the array (see function doc above) and the emptiness\n /// of the element and non-emptiness of the previous element is checked below.\n let length = unsafe { find_index_hint(array, |elem: T| is_empty(elem)) };\n if length != 0 {\n assert(!is_empty(array[length - 1]));\n }\n if length != N {\n assert(is_empty(array[length]));\n }\n length\n}\n\npub fn array_concat<T, let N: u32, let M: u32>(array1: [T; N], array2: [T; M]) -> [T; N + M] {\n let mut result = [array1[0]; N + M];\n for i in 1..N {\n result[i] = array1[i];\n }\n for i in 0..M {\n result[i + N] = array2[i];\n }\n result\n}\n\npub fn array_merge<T, let N: u32>(array1: [T; N], array2: [T; N]) -> [T; N]\nwhere\n T: Empty + Eq,\n{\n let mut result: [T; N] = [T::empty(); N];\n let mut i = 0;\n for elem in array1 {\n if !is_empty(elem) {\n result[i] = elem;\n i += 1;\n }\n }\n for elem in array2 {\n if !is_empty(elem) {\n result[i] = elem;\n i += 1;\n }\n }\n result\n}\n\n// Helper fn to create a subarray from a given array\npub fn array_splice<T, let N: u32, let M: u32>(array: [T; N], offset: u32) -> [T; M]\nwhere\n T: Empty,\n{\n assert(M + offset <= N, \"Subarray length larger than array length\");\n let mut result: [T; M] = [T::empty(); M];\n for i in 0..M {\n result[i] = array[offset + i];\n }\n result\n}\n\npub fn check_permutation<T, let N: u32>(\n original_array: [T; N],\n permuted_array: [T; N],\n original_indexes: [u32; N],\n)\nwhere\n T: Eq + Empty,\n{\n let mut seen_value = [false; N];\n for i in 0..N {\n let index = original_indexes[i];\n let original_value = original_array[index];\n assert(permuted_array[i].eq(original_value), \"Invalid index\");\n assert(!seen_value[index], \"Duplicated index\");\n seen_value[index] = true;\n }\n}\n\n#[test]\nfn smoke_validate_array() {\n let valid_array: [Field; 0] = [];\n assert(validate_array(valid_array) == 0);\n\n let valid_array = [0];\n assert(validate_array(valid_array) == 0);\n\n let valid_array = [3];\n assert(validate_array(valid_array) == 1);\n\n let valid_array = [1, 2, 3];\n assert(validate_array(valid_array) == 3);\n\n let valid_array = [1, 2, 3, 0];\n assert(validate_array(valid_array) == 3);\n\n let valid_array = [1, 2, 3, 0, 0];\n assert(validate_array(valid_array) == 3);\n}\n\n#[test(should_fail_with = \"invalid array\")]\nfn smoke_validate_array_invalid_case0() {\n let invalid_array = [0, 1];\n let _ = validate_array(invalid_array);\n}\n\n#[test(should_fail_with = \"invalid array\")]\nfn smoke_validate_array_invalid_case1() {\n let invalid_array = [1, 0, 0, 1, 0];\n let _ = validate_array(invalid_array);\n}\n\n#[test(should_fail_with = \"invalid array\")]\nfn smoke_validate_array_invalid_case2() {\n let invalid_array = [0, 0, 0, 0, 1];\n let _ = validate_array(invalid_array);\n}\n\n#[test]\nfn test_empty_array_length() {\n assert_eq(array_length([0]), 0);\n assert_eq(array_length([0, 0, 0]), 0);\n}\n\n#[test]\nfn test_array_length() {\n assert_eq(array_length([123]), 1);\n assert_eq(array_length([123, 0, 0]), 1);\n assert_eq(array_length([123, 456]), 2);\n assert_eq(array_length([123, 456, 0]), 2);\n}\n\n#[test]\nfn test_array_length_invalid_arrays() {\n // Result can be misleading (but correct) for invalid arrays.\n assert_eq(array_length([0, 0, 123]), 0);\n assert_eq(array_length([0, 123, 0]), 0);\n assert_eq(array_length([0, 123, 456]), 0);\n assert_eq(array_length([123, 0, 456]), 1);\n}\n\n#[test]\nunconstrained fn find_index_greater_than_min() {\n let values = [10, 20, 30, 40];\n let min = 22;\n let index = find_index_hint(values, |v: Field| min.lt(v));\n assert_eq(index, 2);\n}\n\n#[test]\nunconstrained fn find_index_not_found() {\n let values = [10, 20, 30, 40];\n let min = 100;\n let index = find_index_hint(values, |v: Field| min.lt(v));\n assert_eq(index, 4);\n}\n\n#[test]\nfn test_array_concat() {\n let array0 = [1, 2, 3];\n let array1 = [4, 5];\n let concatenated = array_concat(array0, array1);\n assert_eq(concatenated, [1, 2, 3, 4, 5]);\n}\n\n#[test]\nfn check_permutation_basic_test() {\n let original_array = [1, 2, 3];\n let permuted_array = [3, 1, 2];\n let indexes = [2, 0, 1];\n check_permutation(original_array, permuted_array, indexes);\n}\n\n#[test(should_fail_with = \"Duplicated index\")]\nfn check_permutation_duplicated_index() {\n let original_array = [0, 1, 0];\n let permuted_array = [1, 0, 0];\n let indexes = [1, 0, 0];\n check_permutation(original_array, permuted_array, indexes);\n}\n\n#[test(should_fail_with = \"Invalid index\")]\nfn check_permutation_invalid_index() {\n let original_array = [0, 1, 2];\n let permuted_array = [1, 0, 0];\n let indexes = [1, 0, 2];\n check_permutation(original_array, permuted_array, indexes);\n}\n"
|
|
2747
2751
|
},
|
|
2748
|
-
"
|
|
2752
|
+
"326": {
|
|
2749
2753
|
"path": "/build-volume/noir-projects/noir-protocol-circuits/crates/types/src/utils/reader.nr",
|
|
2750
2754
|
"source": "pub struct Reader<let N: u32> {\n data: [Field; N],\n offset: u32,\n}\n\nimpl<let N: u32> Reader<N> {\n pub fn new(data: [Field; N]) -> Self {\n Self { data, offset: 0 }\n }\n\n pub fn read(&mut self) -> Field {\n let result = self.data[self.offset];\n self.offset += 1;\n result\n }\n\n pub fn read_u32(&mut self) -> u32 {\n self.read() as u32\n }\n\n pub fn read_bool(&mut self) -> bool {\n self.read() as bool\n }\n\n pub fn read_array<let K: u32>(&mut self) -> [Field; K] {\n let mut result = [0; K];\n for i in 0..K {\n result[i] = self.data[self.offset + i];\n }\n self.offset += K;\n result\n }\n\n pub fn read_struct<T, let K: u32>(&mut self, deserialise: fn([Field; K]) -> T) -> T {\n let result = deserialise(self.read_array());\n result\n }\n\n pub fn read_struct_array<T, let K: u32, let C: u32>(\n &mut self,\n deserialise: fn([Field; K]) -> T,\n mut result: [T; C],\n ) -> [T; C] {\n for i in 0..C {\n result[i] = self.read_struct(deserialise);\n }\n result\n }\n\n pub fn finish(self) {\n assert(self.offset == self.data.len(), \"Reader did not read all data\");\n }\n}\n"
|
|
2751
2755
|
},
|
|
@@ -2767,11 +2771,11 @@
|
|
|
2767
2771
|
},
|
|
2768
2772
|
"79": {
|
|
2769
2773
|
"path": "/build-volume/noir-projects/aztec-nr/aztec/src/context/private_context.nr",
|
|
2770
|
-
"source": "use dep::protocol_types::debug_log::debug_log_format;\n\nuse crate::{\n context::{inputs::PrivateContextInputs, returns_hash::ReturnsHash},\n hash::{ArgsHasher, hash_args_array},\n keys::constants::{NULLIFIER_INDEX, NUM_KEY_TYPES, OUTGOING_INDEX, sk_generators},\n messaging::process_l1_to_l2_message,\n oracle::{\n block_header::get_block_header_at,\n call_private_function::call_private_function_internal,\n enqueue_public_function_call::{\n enqueue_public_function_call_internal, notify_set_min_revertible_side_effect_counter,\n set_public_teardown_function_call_internal,\n },\n execution_cache,\n key_validation_request::get_key_validation_request,\n notes::{notify_created_nullifier, notify_nullified_note},\n },\n};\nuse dep::protocol_types::{\n abis::{\n call_context::CallContext,\n function_selector::FunctionSelector,\n log::Log,\n log_hash::LogHash,\n max_block_number::MaxBlockNumber,\n note_hash::NoteHash,\n nullifier::Nullifier,\n private_call_request::PrivateCallRequest,\n private_circuit_public_inputs::PrivateCircuitPublicInputs,\n private_log::PrivateLogData,\n public_call_request::PublicCallRequest,\n read_request::ReadRequest,\n side_effect::Counted,\n validation_requests::{KeyValidationRequest, KeyValidationRequestAndGenerator},\n },\n address::{AztecAddress, EthAddress},\n block_header::BlockHeader,\n constants::{\n MAX_CONTRACT_CLASS_LOGS_PER_CALL, MAX_ENQUEUED_CALLS_PER_CALL,\n MAX_KEY_VALIDATION_REQUESTS_PER_CALL, MAX_L2_TO_L1_MSGS_PER_CALL,\n MAX_NOTE_HASH_READ_REQUESTS_PER_CALL, MAX_NOTE_HASHES_PER_CALL,\n MAX_NULLIFIER_READ_REQUESTS_PER_CALL, MAX_NULLIFIERS_PER_CALL,\n MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL, MAX_PRIVATE_LOGS_PER_CALL,\n PRIVATE_LOG_SIZE_IN_FIELDS, PUBLIC_DISPATCH_SELECTOR,\n },\n messaging::l2_to_l1_message::L2ToL1Message,\n traits::Empty,\n};\n\n// When finished, one can call .finish() to convert back to the abi\npub struct PrivateContext {\n // docs:start:private-context\n pub inputs: PrivateContextInputs,\n pub side_effect_counter: u32,\n\n pub min_revertible_side_effect_counter: u32,\n pub is_fee_payer: bool,\n\n pub args_hash: Field,\n pub return_hash: Field,\n\n pub max_block_number: MaxBlockNumber,\n\n pub note_hash_read_requests: BoundedVec<ReadRequest, MAX_NOTE_HASH_READ_REQUESTS_PER_CALL>,\n pub nullifier_read_requests: BoundedVec<ReadRequest, MAX_NULLIFIER_READ_REQUESTS_PER_CALL>,\n key_validation_requests_and_generators: BoundedVec<KeyValidationRequestAndGenerator, MAX_KEY_VALIDATION_REQUESTS_PER_CALL>,\n\n pub note_hashes: BoundedVec<NoteHash, MAX_NOTE_HASHES_PER_CALL>,\n pub nullifiers: BoundedVec<Nullifier, MAX_NULLIFIERS_PER_CALL>,\n\n pub private_call_requests: BoundedVec<PrivateCallRequest, MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL>,\n pub public_call_requests: BoundedVec<Counted<PublicCallRequest>, MAX_ENQUEUED_CALLS_PER_CALL>,\n pub public_teardown_call_request: PublicCallRequest,\n pub l2_to_l1_msgs: BoundedVec<L2ToL1Message, MAX_L2_TO_L1_MSGS_PER_CALL>,\n // docs:end:private-context\n\n // Header of a block whose state is used during private execution (not the block the transaction is included in).\n pub historical_header: BlockHeader,\n\n pub private_logs: BoundedVec<PrivateLogData, MAX_PRIVATE_LOGS_PER_CALL>,\n pub contract_class_logs_hashes: BoundedVec<LogHash, MAX_CONTRACT_CLASS_LOGS_PER_CALL>,\n\n // Contains the last key validation request for each key type. This is used to cache the last request and avoid\n // fetching the same request multiple times.\n // The index of the array corresponds to the key type (0 nullifier, 1 incoming, 2 outgoing, 3 tagging).\n pub last_key_validation_requests: [Option<KeyValidationRequest>; NUM_KEY_TYPES],\n}\n\nimpl PrivateContext {\n pub fn new(inputs: PrivateContextInputs, args_hash: Field) -> PrivateContext {\n PrivateContext {\n inputs,\n side_effect_counter: inputs.start_side_effect_counter + 1,\n min_revertible_side_effect_counter: 0,\n is_fee_payer: false,\n args_hash,\n return_hash: 0,\n max_block_number: MaxBlockNumber::empty(),\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n historical_header: inputs.historical_header,\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n private_logs: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n }\n }\n\n pub fn msg_sender(self) -> AztecAddress {\n self.inputs.call_context.msg_sender\n }\n\n pub fn this_address(self) -> AztecAddress {\n self.inputs.call_context.contract_address\n }\n\n pub fn chain_id(self) -> Field {\n self.inputs.tx_context.chain_id\n }\n\n pub fn version(self) -> Field {\n self.inputs.tx_context.version\n }\n\n pub fn selector(self) -> FunctionSelector {\n self.inputs.call_context.function_selector\n }\n\n pub fn get_args_hash(self) -> Field {\n self.args_hash\n }\n\n pub fn push_note_hash(&mut self, note_hash: Field) {\n self.note_hashes.push(NoteHash { value: note_hash, counter: self.next_counter() });\n\n // WARNING(https://github.com/AztecProtocol/aztec-packages/issues/10558): if you delete this debug_log_format line, some tests fail.\n debug_log_format(\n \"Context.note_hashes, after pushing new note hash: {0}\",\n self.note_hashes.storage().map(|nh: NoteHash| nh.value),\n );\n }\n\n pub fn push_nullifier(&mut self, nullifier: Field) {\n notify_created_nullifier(nullifier);\n self.nullifiers.push(\n Nullifier { value: nullifier, note_hash: 0, counter: self.next_counter() },\n );\n }\n\n pub fn push_nullifier_for_note_hash(&mut self, nullifier: Field, nullified_note_hash: Field) {\n let nullifier_counter = self.next_counter();\n notify_nullified_note(nullifier, nullified_note_hash, nullifier_counter);\n self.nullifiers.push(\n Nullifier {\n value: nullifier,\n note_hash: nullified_note_hash,\n counter: nullifier_counter,\n },\n );\n }\n\n // Returns the header of a block whose state is used during private execution (not the block the transaction is\n // included in).\n pub fn get_block_header(self) -> BlockHeader {\n self.historical_header\n }\n\n // Returns the header of an arbitrary block whose block number is less than or equal to the block number\n // of historical header.\n pub fn get_block_header_at(self, block_number: u32) -> BlockHeader {\n get_block_header_at(block_number, self)\n }\n\n pub fn set_return_hash(&mut self, returns_hasher: ArgsHasher) {\n execution_cache::store(returns_hasher.fields);\n self.return_hash = returns_hasher.hash();\n }\n\n pub fn finish(self) -> PrivateCircuitPublicInputs {\n PrivateCircuitPublicInputs {\n call_context: self.inputs.call_context,\n args_hash: self.args_hash,\n returns_hash: self.return_hash,\n min_revertible_side_effect_counter: self.min_revertible_side_effect_counter,\n is_fee_payer: self.is_fee_payer,\n max_block_number: self.max_block_number,\n note_hash_read_requests: self.note_hash_read_requests.storage(),\n nullifier_read_requests: self.nullifier_read_requests.storage(),\n key_validation_requests_and_generators: self\n .key_validation_requests_and_generators\n .storage(),\n note_hashes: self.note_hashes.storage(),\n nullifiers: self.nullifiers.storage(),\n private_call_requests: self.private_call_requests.storage(),\n public_call_requests: self.public_call_requests.storage(),\n public_teardown_call_request: self.public_teardown_call_request,\n l2_to_l1_msgs: self.l2_to_l1_msgs.storage(),\n start_side_effect_counter: self.inputs.start_side_effect_counter,\n end_side_effect_counter: self.side_effect_counter,\n private_logs: self.private_logs.storage(),\n contract_class_logs_hashes: self.contract_class_logs_hashes.storage(),\n historical_header: self.historical_header,\n tx_context: self.inputs.tx_context,\n }\n }\n\n pub fn set_as_fee_payer(&mut self) {\n dep::protocol_types::debug_log::debug_log_format(\n \"Setting {0} as fee payer\",\n [self.this_address().to_field()],\n );\n self.is_fee_payer = true;\n }\n\n pub fn end_setup(&mut self) {\n // dep::protocol_types::debug_log::debug_log_format(\n // \"Ending setup at counter {0}\",\n // [self.side_effect_counter as Field]\n // );\n self.min_revertible_side_effect_counter = self.side_effect_counter;\n notify_set_min_revertible_side_effect_counter(self.min_revertible_side_effect_counter);\n }\n\n // docs:start:max-block-number\n pub fn set_tx_max_block_number(&mut self, max_block_number: u32) {\n // docs:end:max-block-number\n self.max_block_number =\n MaxBlockNumber::min_with_u32(self.max_block_number, max_block_number);\n }\n\n pub fn push_note_hash_read_request(&mut self, note_hash: Field) {\n let side_effect = ReadRequest { value: note_hash, counter: self.next_counter() };\n self.note_hash_read_requests.push(side_effect);\n }\n\n pub fn push_nullifier_read_request(&mut self, nullifier: Field) {\n let request = ReadRequest { value: nullifier, counter: self.next_counter() };\n self.nullifier_read_requests.push(request);\n }\n\n pub fn request_nsk_app(&mut self, npk_m_hash: Field) -> Field {\n self.request_sk_app(npk_m_hash, NULLIFIER_INDEX)\n }\n\n pub fn request_ovsk_app(&mut self, ovpk_m_hash: Field) -> Field {\n self.request_sk_app(ovpk_m_hash, OUTGOING_INDEX)\n }\n\n fn request_sk_app(&mut self, pk_m_hash: Field, key_index: Field) -> Field {\n let cached_request =\n self.last_key_validation_requests[key_index].unwrap_or(KeyValidationRequest::empty());\n\n if cached_request.pk_m.hash() == pk_m_hash {\n // We get a match so the cached request is the latest one\n cached_request.sk_app\n } else {\n // We didn't get a match meaning the cached result is stale\n // Typically we'd validate keys by showing that they are the preimage of `pk_m_hash`, but that'd require\n // the oracle returning the master secret keys, which could cause malicious contracts to leak it or learn\n // about secrets from other contracts. We therefore silo secret keys, and rely on the private kernel to\n // validate that we siloed secret key corresponds to correct siloing of the master secret key that hashes\n // to `pk_m_hash`.\n\n /// Safety: Kernels verify that the key validation request is valid and below we verify that a request\n /// for the correct public key has been received.\n let request = unsafe { get_key_validation_request(pk_m_hash, key_index) };\n assert_eq(request.pk_m.hash(), pk_m_hash, \"Obtained invalid key validation request\");\n\n self.key_validation_requests_and_generators.push(\n KeyValidationRequestAndGenerator {\n request,\n sk_app_generator: sk_generators[key_index],\n },\n );\n self.last_key_validation_requests[key_index] = Option::some(request);\n request.sk_app\n }\n }\n\n // docs:start:context_message_portal\n pub fn message_portal(&mut self, recipient: EthAddress, content: Field) {\n // docs:end:context_message_portal\n let message = L2ToL1Message { recipient, content, counter: self.next_counter() };\n self.l2_to_l1_msgs.push(message);\n }\n\n // docs:start:context_consume_l1_to_l2_message\n // docs:start:consume_l1_to_l2_message\n pub fn consume_l1_to_l2_message(\n &mut self,\n content: Field,\n secret: Field,\n sender: EthAddress,\n leaf_index: Field,\n ) {\n // docs:end:context_consume_l1_to_l2_message\n let nullifier = process_l1_to_l2_message(\n self.historical_header.state.l1_to_l2_message_tree.root,\n self.this_address(),\n sender,\n self.chain_id(),\n self.version(),\n content,\n secret,\n leaf_index,\n );\n\n // Push nullifier (and the \"commitment\" corresponding to this can be \"empty\")\n self.push_nullifier(nullifier)\n }\n // docs:end:consume_l1_to_l2_message\n\n pub fn emit_private_log(&mut self, log: [Field; PRIVATE_LOG_SIZE_IN_FIELDS]) {\n let counter = self.next_counter();\n let private_log = PrivateLogData { log: Log::new(log), note_hash_counter: 0, counter };\n self.private_logs.push(private_log);\n }\n\n pub fn emit_raw_note_log(\n &mut self,\n log: [Field; PRIVATE_LOG_SIZE_IN_FIELDS],\n note_hash_counter: u32,\n ) {\n let counter = self.next_counter();\n let private_log = PrivateLogData { log: Log::new(log), note_hash_counter, counter };\n self.private_logs.push(private_log);\n }\n\n pub fn call_private_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) -> ReturnsHash {\n let args_hash = hash_args_array(args);\n execution_cache::store_array(args);\n self.call_private_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n false,\n )\n }\n\n pub fn static_call_private_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) -> ReturnsHash {\n let args_hash = hash_args_array(args);\n execution_cache::store_array(args);\n self.call_private_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n true,\n )\n }\n\n pub fn call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> ReturnsHash {\n self.call_private_function_with_args_hash(contract_address, function_selector, 0, false)\n }\n\n pub fn static_call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> ReturnsHash {\n self.call_private_function_with_args_hash(contract_address, function_selector, 0, true)\n }\n\n pub fn call_private_function_with_args_hash(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) -> ReturnsHash {\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n let start_side_effect_counter = self.side_effect_counter;\n\n /// Safety: The oracle simulates the private call and returns the value of the side effects counter after\n /// execution of the call (which means that end_side_effect_counter - start_side_effect_counter is\n /// the number of side effects that took place), along with the hash of the return values. We validate these\n /// by requesting a private kernel iteration in which the return values are constrained to hash\n /// to `returns_hash` and the side effects counter to increment from start to end.\n let (end_side_effect_counter, returns_hash) = unsafe {\n call_private_function_internal(\n contract_address,\n function_selector,\n args_hash,\n start_side_effect_counter,\n is_static_call,\n )\n };\n\n self.private_call_requests.push(\n PrivateCallRequest {\n call_context: CallContext {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n },\n args_hash,\n returns_hash,\n start_side_effect_counter,\n end_side_effect_counter,\n },\n );\n\n // TODO (fees) figure out why this crashes the prover and enable it\n // we need this in order to pay fees inside child call contexts\n // assert(\n // (item.public_inputs.min_revertible_side_effect_counter == 0 as u32)\n // | (item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter)\n // );\n // if item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter {\n // self.min_revertible_side_effect_counter = item.public_inputs.min_revertible_side_effect_counter;\n // }\n self.side_effect_counter = end_side_effect_counter + 1;\n ReturnsHash::new(returns_hash)\n }\n\n pub fn call_public_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let args_hash = hash_args_array(args);\n execution_cache::store_array(args);\n self.call_public_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n false,\n )\n }\n\n pub fn static_call_public_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let args_hash = hash_args_array(args);\n execution_cache::store_array(args);\n self.call_public_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n true,\n )\n }\n\n pub fn call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) {\n self.call_public_function_with_args_hash(contract_address, function_selector, 0, false)\n }\n\n pub fn static_call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) {\n self.call_public_function_with_args_hash(contract_address, function_selector, 0, true)\n }\n\n pub fn call_public_function_with_args_hash(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n /// Safety: TODO(https://github.com/AztecProtocol/aztec-packages/issues/8985): Fix this.\n /// WARNING: This is insecure and should be temporary!\n /// The oracle hashes the arguments and returns a new args_hash.\n /// new_args = [selector, ...old_args], so as to make it suitable to call the public dispatch function.\n /// We don't validate or compute it in the circuit because a) it's harder to do with slices, and\n /// b) this is only temporary.\n let args_hash = unsafe {\n enqueue_public_function_call_internal(\n contract_address,\n function_selector,\n args_hash,\n counter,\n is_static_call,\n )\n };\n\n // Public calls are rerouted through the dispatch function.\n let function_selector = comptime { FunctionSelector::from_field(PUBLIC_DISPATCH_SELECTOR) };\n\n let call_request = PublicCallRequest {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n args_hash,\n };\n\n self.public_call_requests.push(Counted::new(call_request, counter));\n }\n\n pub fn set_public_teardown_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let args_hash = hash_args_array(args);\n execution_cache::store_array(args);\n self.set_public_teardown_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n false,\n )\n }\n\n pub fn set_public_teardown_function_with_args_hash(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n /// Safety: TODO(https://github.com/AztecProtocol/aztec-packages/issues/8985): Fix this.\n /// WARNING: This is insecure and should be temporary!\n /// The oracle hashes the arguments and returns a new args_hash.\n /// new_args = [selector, ...old_args], so as to make it suitable to call the public dispatch function.\n /// We don't validate or compute it in the circuit because a) it's harder to do with slices, and\n /// b) this is only temporary.\n let args_hash = unsafe {\n set_public_teardown_function_call_internal(\n contract_address,\n function_selector,\n args_hash,\n counter,\n is_static_call,\n )\n };\n\n let function_selector = comptime { FunctionSelector::from_field(PUBLIC_DISPATCH_SELECTOR) };\n\n self.public_teardown_call_request = PublicCallRequest {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n args_hash,\n };\n }\n\n fn next_counter(&mut self) -> u32 {\n let counter = self.side_effect_counter;\n self.side_effect_counter += 1;\n counter\n }\n}\n\nimpl Empty for PrivateContext {\n fn empty() -> Self {\n PrivateContext {\n inputs: PrivateContextInputs::empty(),\n side_effect_counter: 0 as u32,\n min_revertible_side_effect_counter: 0 as u32,\n is_fee_payer: false,\n args_hash: 0,\n return_hash: 0,\n max_block_number: MaxBlockNumber::empty(),\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n historical_header: BlockHeader::empty(),\n private_logs: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n }\n }\n}\n"
|
|
2774
|
+
"source": "use dep::protocol_types::debug_log::debug_log_format;\n\nuse crate::{\n context::{inputs::PrivateContextInputs, returns_hash::ReturnsHash},\n hash::{ArgsHasher, hash_args_array},\n keys::constants::{NULLIFIER_INDEX, NUM_KEY_TYPES, OUTGOING_INDEX, sk_generators},\n messaging::process_l1_to_l2_message,\n oracle::{\n block_header::get_block_header_at,\n call_private_function::call_private_function_internal,\n enqueue_public_function_call::{\n enqueue_public_function_call_internal, notify_set_min_revertible_side_effect_counter,\n set_public_teardown_function_call_internal,\n },\n execution_cache,\n key_validation_request::get_key_validation_request,\n notes::{notify_created_nullifier, notify_nullified_note},\n },\n};\nuse dep::protocol_types::{\n abis::{\n call_context::CallContext,\n function_selector::FunctionSelector,\n log::Log,\n log_hash::LogHash,\n max_block_number::MaxBlockNumber,\n note_hash::NoteHash,\n nullifier::Nullifier,\n private_call_request::PrivateCallRequest,\n private_circuit_public_inputs::PrivateCircuitPublicInputs,\n private_log::PrivateLogData,\n public_call_request::PublicCallRequest,\n read_request::ReadRequest,\n side_effect::Counted,\n validation_requests::{KeyValidationRequest, KeyValidationRequestAndGenerator},\n },\n address::{AztecAddress, EthAddress},\n block_header::BlockHeader,\n constants::{\n MAX_CONTRACT_CLASS_LOGS_PER_CALL, MAX_ENQUEUED_CALLS_PER_CALL,\n MAX_KEY_VALIDATION_REQUESTS_PER_CALL, MAX_L2_TO_L1_MSGS_PER_CALL,\n MAX_NOTE_HASH_READ_REQUESTS_PER_CALL, MAX_NOTE_HASHES_PER_CALL,\n MAX_NULLIFIER_READ_REQUESTS_PER_CALL, MAX_NULLIFIERS_PER_CALL,\n MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL, MAX_PRIVATE_LOGS_PER_CALL,\n PRIVATE_LOG_SIZE_IN_FIELDS, PUBLIC_DISPATCH_SELECTOR,\n },\n messaging::l2_to_l1_message::L2ToL1Message,\n traits::Empty,\n};\n\n// When finished, one can call .finish() to convert back to the abi\npub struct PrivateContext {\n // docs:start:private-context\n pub inputs: PrivateContextInputs,\n pub side_effect_counter: u32,\n\n pub min_revertible_side_effect_counter: u32,\n pub is_fee_payer: bool,\n\n pub args_hash: Field,\n pub return_hash: Field,\n\n pub max_block_number: MaxBlockNumber,\n\n pub note_hash_read_requests: BoundedVec<ReadRequest, MAX_NOTE_HASH_READ_REQUESTS_PER_CALL>,\n pub nullifier_read_requests: BoundedVec<ReadRequest, MAX_NULLIFIER_READ_REQUESTS_PER_CALL>,\n key_validation_requests_and_generators: BoundedVec<KeyValidationRequestAndGenerator, MAX_KEY_VALIDATION_REQUESTS_PER_CALL>,\n\n pub note_hashes: BoundedVec<NoteHash, MAX_NOTE_HASHES_PER_CALL>,\n pub nullifiers: BoundedVec<Nullifier, MAX_NULLIFIERS_PER_CALL>,\n\n pub private_call_requests: BoundedVec<PrivateCallRequest, MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL>,\n pub public_call_requests: BoundedVec<Counted<PublicCallRequest>, MAX_ENQUEUED_CALLS_PER_CALL>,\n pub public_teardown_call_request: PublicCallRequest,\n pub l2_to_l1_msgs: BoundedVec<L2ToL1Message, MAX_L2_TO_L1_MSGS_PER_CALL>,\n // docs:end:private-context\n\n // Header of a block whose state is used during private execution (not the block the transaction is included in).\n pub historical_header: BlockHeader,\n\n pub private_logs: BoundedVec<PrivateLogData, MAX_PRIVATE_LOGS_PER_CALL>,\n pub contract_class_logs_hashes: BoundedVec<LogHash, MAX_CONTRACT_CLASS_LOGS_PER_CALL>,\n\n // Contains the last key validation request for each key type. This is used to cache the last request and avoid\n // fetching the same request multiple times.\n // The index of the array corresponds to the key type (0 nullifier, 1 incoming, 2 outgoing, 3 tagging).\n pub last_key_validation_requests: [Option<KeyValidationRequest>; NUM_KEY_TYPES],\n}\n\nimpl PrivateContext {\n pub fn new(inputs: PrivateContextInputs, args_hash: Field) -> PrivateContext {\n PrivateContext {\n inputs,\n side_effect_counter: inputs.start_side_effect_counter + 1,\n min_revertible_side_effect_counter: 0,\n is_fee_payer: false,\n args_hash,\n return_hash: 0,\n max_block_number: MaxBlockNumber::empty(),\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n historical_header: inputs.historical_header,\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n private_logs: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n }\n }\n\n pub fn msg_sender(self) -> AztecAddress {\n self.inputs.call_context.msg_sender\n }\n\n pub fn this_address(self) -> AztecAddress {\n self.inputs.call_context.contract_address\n }\n\n pub fn chain_id(self) -> Field {\n self.inputs.tx_context.chain_id\n }\n\n pub fn version(self) -> Field {\n self.inputs.tx_context.version\n }\n\n pub fn selector(self) -> FunctionSelector {\n self.inputs.call_context.function_selector\n }\n\n pub fn get_args_hash(self) -> Field {\n self.args_hash\n }\n\n pub fn push_note_hash(&mut self, note_hash: Field) {\n self.note_hashes.push(NoteHash { value: note_hash, counter: self.next_counter() });\n\n // WARNING(https://github.com/AztecProtocol/aztec-packages/issues/10558): if you delete this debug_log_format line, some tests fail.\n debug_log_format(\n \"Context.note_hashes, after pushing new note hash: {0}\",\n self.note_hashes.storage().map(|nh: NoteHash| nh.value),\n );\n }\n\n pub fn push_nullifier(&mut self, nullifier: Field) {\n notify_created_nullifier(nullifier);\n self.nullifiers.push(\n Nullifier { value: nullifier, note_hash: 0, counter: self.next_counter() },\n );\n }\n\n pub fn push_nullifier_for_note_hash(&mut self, nullifier: Field, nullified_note_hash: Field) {\n let nullifier_counter = self.next_counter();\n notify_nullified_note(nullifier, nullified_note_hash, nullifier_counter);\n self.nullifiers.push(\n Nullifier {\n value: nullifier,\n note_hash: nullified_note_hash,\n counter: nullifier_counter,\n },\n );\n }\n\n // Returns the header of a block whose state is used during private execution (not the block the transaction is\n // included in).\n pub fn get_block_header(self) -> BlockHeader {\n self.historical_header\n }\n\n // Returns the header of an arbitrary block whose block number is less than or equal to the block number\n // of historical header.\n pub fn get_block_header_at(self, block_number: u32) -> BlockHeader {\n get_block_header_at(block_number, self)\n }\n\n pub fn set_return_hash(&mut self, returns_hasher: ArgsHasher) {\n execution_cache::store(returns_hasher.fields);\n self.return_hash = returns_hasher.hash();\n }\n\n pub fn finish(self) -> PrivateCircuitPublicInputs {\n PrivateCircuitPublicInputs {\n call_context: self.inputs.call_context,\n args_hash: self.args_hash,\n returns_hash: self.return_hash,\n min_revertible_side_effect_counter: self.min_revertible_side_effect_counter,\n is_fee_payer: self.is_fee_payer,\n max_block_number: self.max_block_number,\n note_hash_read_requests: self.note_hash_read_requests.storage(),\n nullifier_read_requests: self.nullifier_read_requests.storage(),\n key_validation_requests_and_generators: self\n .key_validation_requests_and_generators\n .storage(),\n note_hashes: self.note_hashes.storage(),\n nullifiers: self.nullifiers.storage(),\n private_call_requests: self.private_call_requests.storage(),\n public_call_requests: self.public_call_requests.storage(),\n public_teardown_call_request: self.public_teardown_call_request,\n l2_to_l1_msgs: self.l2_to_l1_msgs.storage(),\n start_side_effect_counter: self.inputs.start_side_effect_counter,\n end_side_effect_counter: self.side_effect_counter,\n private_logs: self.private_logs.storage(),\n contract_class_logs_hashes: self.contract_class_logs_hashes.storage(),\n historical_header: self.historical_header,\n tx_context: self.inputs.tx_context,\n }\n }\n\n pub fn set_as_fee_payer(&mut self) {\n dep::protocol_types::debug_log::debug_log_format(\n \"Setting {0} as fee payer\",\n [self.this_address().to_field()],\n );\n self.is_fee_payer = true;\n }\n\n pub fn end_setup(&mut self) {\n // dep::protocol_types::debug_log::debug_log_format(\n // \"Ending setup at counter {0}\",\n // [self.side_effect_counter as Field]\n // );\n self.min_revertible_side_effect_counter = self.side_effect_counter;\n notify_set_min_revertible_side_effect_counter(self.min_revertible_side_effect_counter);\n }\n\n // docs:start:max-block-number\n pub fn set_tx_max_block_number(&mut self, max_block_number: u32) {\n // docs:end:max-block-number\n self.max_block_number =\n MaxBlockNumber::min_with_u32(self.max_block_number, max_block_number);\n }\n\n pub fn push_note_hash_read_request(&mut self, note_hash: Field) {\n let side_effect = ReadRequest { value: note_hash, counter: self.next_counter() };\n self.note_hash_read_requests.push(side_effect);\n }\n\n pub fn push_nullifier_read_request(&mut self, nullifier: Field) {\n let request = ReadRequest { value: nullifier, counter: self.next_counter() };\n self.nullifier_read_requests.push(request);\n }\n\n pub fn request_nsk_app(&mut self, npk_m_hash: Field) -> Field {\n self.request_sk_app(npk_m_hash, NULLIFIER_INDEX)\n }\n\n pub fn request_ovsk_app(&mut self, ovpk_m_hash: Field) -> Field {\n self.request_sk_app(ovpk_m_hash, OUTGOING_INDEX)\n }\n\n fn request_sk_app(&mut self, pk_m_hash: Field, key_index: Field) -> Field {\n let cached_request =\n self.last_key_validation_requests[key_index].unwrap_or(KeyValidationRequest::empty());\n\n if cached_request.pk_m.hash() == pk_m_hash {\n // We get a match so the cached request is the latest one\n cached_request.sk_app\n } else {\n // We didn't get a match meaning the cached result is stale\n // Typically we'd validate keys by showing that they are the preimage of `pk_m_hash`, but that'd require\n // the oracle returning the master secret keys, which could cause malicious contracts to leak it or learn\n // about secrets from other contracts. We therefore silo secret keys, and rely on the private kernel to\n // validate that we siloed secret key corresponds to correct siloing of the master secret key that hashes\n // to `pk_m_hash`.\n\n /// Safety: Kernels verify that the key validation request is valid and below we verify that a request\n /// for the correct public key has been received.\n let request = unsafe { get_key_validation_request(pk_m_hash, key_index) };\n assert_eq(request.pk_m.hash(), pk_m_hash, \"Obtained invalid key validation request\");\n\n self.key_validation_requests_and_generators.push(\n KeyValidationRequestAndGenerator {\n request,\n sk_app_generator: sk_generators[key_index],\n },\n );\n self.last_key_validation_requests[key_index] = Option::some(request);\n request.sk_app\n }\n }\n\n // docs:start:context_message_portal\n pub fn message_portal(&mut self, recipient: EthAddress, content: Field) {\n // docs:end:context_message_portal\n let message = L2ToL1Message { recipient, content, counter: self.next_counter() };\n self.l2_to_l1_msgs.push(message);\n }\n\n // docs:start:context_consume_l1_to_l2_message\n // docs:start:consume_l1_to_l2_message\n pub fn consume_l1_to_l2_message(\n &mut self,\n content: Field,\n secret: Field,\n sender: EthAddress,\n leaf_index: Field,\n ) {\n // docs:end:context_consume_l1_to_l2_message\n let nullifier = process_l1_to_l2_message(\n self.historical_header.state.l1_to_l2_message_tree.root,\n self.this_address(),\n sender,\n self.chain_id(),\n self.version(),\n content,\n secret,\n leaf_index,\n );\n\n // Push nullifier (and the \"commitment\" corresponding to this can be \"empty\")\n self.push_nullifier(nullifier)\n }\n // docs:end:consume_l1_to_l2_message\n\n pub fn emit_private_log(&mut self, log: [Field; PRIVATE_LOG_SIZE_IN_FIELDS]) {\n let counter = self.next_counter();\n let private_log = PrivateLogData { log: Log::new(log), note_hash_counter: 0, counter };\n self.private_logs.push(private_log);\n }\n\n pub fn emit_raw_note_log(\n &mut self,\n log: [Field; PRIVATE_LOG_SIZE_IN_FIELDS],\n note_hash_counter: u32,\n ) {\n let counter = self.next_counter();\n let private_log = PrivateLogData { log: Log::new(log), note_hash_counter, counter };\n self.private_logs.push(private_log);\n }\n\n pub fn call_private_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) -> ReturnsHash {\n let args_hash = hash_args_array(args);\n execution_cache::store(args);\n self.call_private_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n false,\n )\n }\n\n pub fn static_call_private_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) -> ReturnsHash {\n let args_hash = hash_args_array(args);\n execution_cache::store(args);\n self.call_private_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n true,\n )\n }\n\n pub fn call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> ReturnsHash {\n self.call_private_function_with_args_hash(contract_address, function_selector, 0, false)\n }\n\n pub fn static_call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> ReturnsHash {\n self.call_private_function_with_args_hash(contract_address, function_selector, 0, true)\n }\n\n pub fn call_private_function_with_args_hash(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) -> ReturnsHash {\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n let start_side_effect_counter = self.side_effect_counter;\n\n /// Safety: The oracle simulates the private call and returns the value of the side effects counter after\n /// execution of the call (which means that end_side_effect_counter - start_side_effect_counter is\n /// the number of side effects that took place), along with the hash of the return values. We validate these\n /// by requesting a private kernel iteration in which the return values are constrained to hash\n /// to `returns_hash` and the side effects counter to increment from start to end.\n let (end_side_effect_counter, returns_hash) = unsafe {\n call_private_function_internal(\n contract_address,\n function_selector,\n args_hash,\n start_side_effect_counter,\n is_static_call,\n )\n };\n\n self.private_call_requests.push(\n PrivateCallRequest {\n call_context: CallContext {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n },\n args_hash,\n returns_hash,\n start_side_effect_counter,\n end_side_effect_counter,\n },\n );\n\n // TODO (fees) figure out why this crashes the prover and enable it\n // we need this in order to pay fees inside child call contexts\n // assert(\n // (item.public_inputs.min_revertible_side_effect_counter == 0 as u32)\n // | (item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter)\n // );\n // if item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter {\n // self.min_revertible_side_effect_counter = item.public_inputs.min_revertible_side_effect_counter;\n // }\n self.side_effect_counter = end_side_effect_counter + 1;\n ReturnsHash::new(returns_hash)\n }\n\n pub fn call_public_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let args_hash = hash_args_array(args);\n execution_cache::store(args);\n self.call_public_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n false,\n )\n }\n\n pub fn static_call_public_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let args_hash = hash_args_array(args);\n execution_cache::store(args);\n self.call_public_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n true,\n )\n }\n\n pub fn call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) {\n self.call_public_function_with_args_hash(contract_address, function_selector, 0, false)\n }\n\n pub fn static_call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) {\n self.call_public_function_with_args_hash(contract_address, function_selector, 0, true)\n }\n\n pub fn call_public_function_with_args_hash(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n /// Safety: TODO(https://github.com/AztecProtocol/aztec-packages/issues/8985): Fix this.\n /// WARNING: This is insecure and should be temporary!\n /// The oracle hashes the arguments and returns a new args_hash.\n /// new_args = [selector, ...old_args], so as to make it suitable to call the public dispatch function.\n /// We don't validate or compute it in the circuit because a) it's harder to do with slices, and\n /// b) this is only temporary.\n let args_hash = unsafe {\n enqueue_public_function_call_internal(\n contract_address,\n function_selector,\n args_hash,\n counter,\n is_static_call,\n )\n };\n\n // Public calls are rerouted through the dispatch function.\n let function_selector = comptime { FunctionSelector::from_field(PUBLIC_DISPATCH_SELECTOR) };\n\n let call_request = PublicCallRequest {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n args_hash,\n };\n\n self.public_call_requests.push(Counted::new(call_request, counter));\n }\n\n pub fn set_public_teardown_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let args_hash = hash_args_array(args);\n execution_cache::store(args);\n self.set_public_teardown_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n false,\n )\n }\n\n pub fn set_public_teardown_function_with_args_hash(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n /// Safety: TODO(https://github.com/AztecProtocol/aztec-packages/issues/8985): Fix this.\n /// WARNING: This is insecure and should be temporary!\n /// The oracle hashes the arguments and returns a new args_hash.\n /// new_args = [selector, ...old_args], so as to make it suitable to call the public dispatch function.\n /// We don't validate or compute it in the circuit because a) it's harder to do with slices, and\n /// b) this is only temporary.\n let args_hash = unsafe {\n set_public_teardown_function_call_internal(\n contract_address,\n function_selector,\n args_hash,\n counter,\n is_static_call,\n )\n };\n\n let function_selector = comptime { FunctionSelector::from_field(PUBLIC_DISPATCH_SELECTOR) };\n\n self.public_teardown_call_request = PublicCallRequest {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n args_hash,\n };\n }\n\n fn next_counter(&mut self) -> u32 {\n let counter = self.side_effect_counter;\n self.side_effect_counter += 1;\n counter\n }\n}\n\nimpl Empty for PrivateContext {\n fn empty() -> Self {\n PrivateContext {\n inputs: PrivateContextInputs::empty(),\n side_effect_counter: 0 as u32,\n min_revertible_side_effect_counter: 0 as u32,\n is_fee_payer: false,\n args_hash: 0,\n return_hash: 0,\n max_block_number: MaxBlockNumber::empty(),\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n historical_header: BlockHeader::empty(),\n private_logs: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n }\n }\n}\n"
|
|
2771
2775
|
},
|
|
2772
2776
|
"80": {
|
|
2773
2777
|
"path": "/build-volume/noir-projects/aztec-nr/aztec/src/context/public_context.nr",
|
|
2774
|
-
"source": "use crate::context::gas::GasOpts;\nuse crate::hash::{\n compute_l1_to_l2_message_hash, compute_l1_to_l2_message_nullifier, compute_secret_hash,\n};\nuse dep::protocol_types::abis::function_selector::FunctionSelector;\nuse dep::protocol_types::address::{AztecAddress, EthAddress};\nuse dep::protocol_types::constants::MAX_FIELD_VALUE;\nuse dep::protocol_types::traits::{Deserialize, Empty, Serialize};\n\npub struct PublicContext {\n pub args_hash: Option<Field>,\n pub compute_args_hash: fn() -> Field,\n}\n\nimpl PublicContext {\n pub fn new(compute_args_hash: fn() -> Field) -> Self {\n PublicContext { args_hash: Option::none(), compute_args_hash }\n }\n\n pub fn emit_unencrypted_log<T, let N: u32>(_self: &mut Self, log: T)\n where\n T: Serialize<N>,\n {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe { emit_unencrypted_log(Serialize::serialize(log).as_slice()) };\n }\n\n pub fn note_hash_exists(_self: Self, note_hash: Field, leaf_index: Field) -> bool {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe { note_hash_exists(note_hash, leaf_index) } == 1\n }\n\n pub fn l1_to_l2_msg_exists(_self: Self, msg_hash: Field, msg_leaf_index: Field) -> bool {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe { l1_to_l2_msg_exists(msg_hash, msg_leaf_index) } == 1\n }\n\n pub fn nullifier_exists(_self: Self, unsiloed_nullifier: Field, address: AztecAddress) -> bool {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe { nullifier_exists(unsiloed_nullifier, address.to_field()) } == 1\n }\n\n pub fn consume_l1_to_l2_message(\n &mut self,\n content: Field,\n secret: Field,\n sender: EthAddress,\n leaf_index: Field,\n ) {\n let secret_hash = compute_secret_hash(secret);\n let message_hash = compute_l1_to_l2_message_hash(\n sender,\n self.chain_id(),\n /*recipient=*/\n self.this_address(),\n self.version(),\n content,\n secret_hash,\n leaf_index,\n );\n let nullifier = compute_l1_to_l2_message_nullifier(message_hash, secret);\n\n assert(\n !self.nullifier_exists(nullifier, self.this_address()),\n \"L1-to-L2 message is already nullified\",\n );\n assert(\n self.l1_to_l2_msg_exists(message_hash, leaf_index),\n \"Tried to consume nonexistent L1-to-L2 message\",\n );\n\n self.push_nullifier(nullifier);\n }\n\n pub fn message_portal(_self: &mut Self, recipient: EthAddress, content: Field) {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe { send_l2_to_l1_msg(recipient, content) };\n }\n\n pub unconstrained fn call_public_function(\n _self: &mut Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field],\n gas_opts: GasOpts,\n ) -> [Field] {\n let args = args.push_front(function_selector.to_field());\n let success = call(gas_for_call(gas_opts), contract_address, args);\n\n let result_data = returndata_copy(0, returndata_size());\n if !success {\n // Rethrow the revert data.\n avm_revert(result_data);\n }\n result_data\n }\n\n pub unconstrained fn static_call_public_function(\n _self: &mut Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field],\n gas_opts: GasOpts,\n ) -> [Field] {\n let args = args.push_front(function_selector.to_field());\n let success = call_static(gas_for_call(gas_opts), contract_address, args);\n\n let result_data = returndata_copy(0, returndata_size());\n if !success {\n // Rethrow the revert data.\n avm_revert(result_data);\n }\n result_data\n }\n\n pub fn push_note_hash(_self: &mut Self, note_hash: Field) {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe { emit_note_hash(note_hash) };\n }\n pub fn push_nullifier(_self: &mut Self, nullifier: Field) {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe { emit_nullifier(nullifier) };\n }\n\n pub fn this_address(_self: Self) -> AztecAddress {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n address()\n }\n }\n pub fn msg_sender(_self: Self) -> AztecAddress {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n sender()\n }\n }\n pub fn selector(_self: Self) -> FunctionSelector {\n // The selector is the first element of the calldata when calling a public function through dispatch.\n /// Safety: AVM opcodes are constrained by the AVM itself\n let raw_selector: [Field; 1] = unsafe { calldata_copy(0, 1) };\n FunctionSelector::from_field(raw_selector[0])\n }\n pub fn get_args_hash(mut self) -> Field {\n if !self.args_hash.is_some() {\n self.args_hash = Option::some((self.compute_args_hash)());\n }\n\n self.args_hash.unwrap_unchecked()\n }\n pub fn transaction_fee(_self: Self) -> Field {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n transaction_fee()\n }\n }\n\n pub fn chain_id(_self: Self) -> Field {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n chain_id()\n }\n }\n pub fn version(_self: Self) -> Field {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n version()\n }\n }\n pub fn block_number(_self: Self) -> Field {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n block_number()\n }\n }\n pub fn timestamp(_self: Self) -> u64 {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n timestamp()\n }\n }\n pub fn fee_per_l2_gas(_self: Self) -> Field {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n fee_per_l2_gas()\n }\n }\n pub fn fee_per_da_gas(_self: Self) -> Field {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n fee_per_da_gas()\n }\n }\n\n pub fn l2_gas_left(_self: Self) -> Field {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n l2_gas_left()\n }\n }\n pub fn da_gas_left(_self: Self) -> Field {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n da_gas_left()\n }\n }\n pub fn is_static_call(_self: Self) -> bool {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe { is_static_call() } == 1\n }\n\n pub fn raw_storage_read<let N: u32>(_self: Self, storage_slot: Field) -> [Field; N] {\n let mut out = [0; N];\n for i in 0..N {\n /// Safety: AVM opcodes are constrained by the AVM itself\n out[i] = unsafe { storage_read(storage_slot + i as Field) };\n }\n out\n }\n\n pub fn storage_read<T, let N: u32>(self, storage_slot: Field) -> T\n where\n T: Deserialize<N>,\n {\n T::deserialize(self.raw_storage_read(storage_slot))\n }\n\n pub fn raw_storage_write<let N: u32>(_self: Self, storage_slot: Field, values: [Field; N]) {\n for i in 0..N {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe { storage_write(storage_slot + i as Field, values[i]) };\n }\n }\n\n pub fn storage_write<T, let N: u32>(self, storage_slot: Field, value: T)\n where\n T: Serialize<N>,\n {\n self.raw_storage_write(storage_slot, value.serialize());\n }\n}\n\n// Helper functions\nfn gas_for_call(user_gas: GasOpts) -> [Field; 2] {\n // It's ok to use the max possible gas here, because the gas will be\n // capped by the gas left in the (STATIC)CALL instruction.\n [user_gas.l2_gas.unwrap_or(MAX_FIELD_VALUE), user_gas.da_gas.unwrap_or(MAX_FIELD_VALUE)]\n}\n\n// Unconstrained opcode wrappers (do not use directly).\nunconstrained fn address() -> AztecAddress {\n address_opcode()\n}\nunconstrained fn sender() -> AztecAddress {\n sender_opcode()\n}\nunconstrained fn transaction_fee() -> Field {\n transaction_fee_opcode()\n}\nunconstrained fn chain_id() -> Field {\n chain_id_opcode()\n}\nunconstrained fn version() -> Field {\n version_opcode()\n}\nunconstrained fn block_number() -> Field {\n block_number_opcode()\n}\nunconstrained fn timestamp() -> u64 {\n timestamp_opcode()\n}\nunconstrained fn fee_per_l2_gas() -> Field {\n fee_per_l2_gas_opcode()\n}\nunconstrained fn fee_per_da_gas() -> Field {\n fee_per_da_gas_opcode()\n}\nunconstrained fn l2_gas_left() -> Field {\n l2_gas_left_opcode()\n}\nunconstrained fn da_gas_left() -> Field {\n da_gas_left_opcode()\n}\nunconstrained fn is_static_call() -> Field {\n is_static_call_opcode()\n}\nunconstrained fn note_hash_exists(note_hash: Field, leaf_index: Field) -> u1 {\n note_hash_exists_opcode(note_hash, leaf_index)\n}\nunconstrained fn emit_note_hash(note_hash: Field) {\n emit_note_hash_opcode(note_hash)\n}\nunconstrained fn nullifier_exists(nullifier: Field, address: Field) -> u1 {\n nullifier_exists_opcode(nullifier, address)\n}\nunconstrained fn emit_nullifier(nullifier: Field) {\n emit_nullifier_opcode(nullifier)\n}\nunconstrained fn emit_unencrypted_log(message: [Field]) {\n emit_unencrypted_log_opcode(message)\n}\nunconstrained fn l1_to_l2_msg_exists(msg_hash: Field, msg_leaf_index: Field) -> u1 {\n l1_to_l2_msg_exists_opcode(msg_hash, msg_leaf_index)\n}\nunconstrained fn send_l2_to_l1_msg(recipient: EthAddress, content: Field) {\n send_l2_to_l1_msg_opcode(recipient, content)\n}\nunconstrained fn call(gas: [Field; 2], address: AztecAddress, args: [Field]) -> bool {\n call_opcode(gas, address, args)\n}\nunconstrained fn call_static(gas: [Field; 2], address: AztecAddress, args: [Field]) -> bool {\n call_static_opcode(gas, address, args)\n}\n\npub unconstrained fn calldata_copy<let N: u32>(cdoffset: u32, copy_size: u32) -> [Field; N] {\n calldata_copy_opcode(cdoffset, copy_size)\n}\n\nunconstrained fn returndata_size() -> u32 {\n returndata_size_opcode()\n}\n\nunconstrained fn returndata_copy(rdoffset: u32, copy_size: u32) -> [Field] {\n returndata_copy_opcode(rdoffset, copy_size)\n}\n\npub unconstrained fn avm_return(returndata: [Field]) {\n return_opcode(returndata)\n}\n\n// This opcode reverts using the exact data given. In general it should only be used\n// to do rethrows, where the revert data is the same as the original revert data.\n// For normal reverts, use Noir's `assert` which, on top of reverting, will also add\n// an error selector to the revert data.\nunconstrained fn avm_revert(revertdata: [Field]) {\n revert_opcode(revertdata)\n}\n\nunconstrained fn storage_read(storage_slot: Field) -> Field {\n storage_read_opcode(storage_slot)\n}\n\nunconstrained fn storage_write(storage_slot: Field, value: Field) {\n storage_write_opcode(storage_slot, value);\n}\n\nimpl Empty for PublicContext {\n fn empty() -> Self {\n PublicContext::new(|| 0)\n }\n}\n\n// AVM oracles (opcodes) follow, do not use directly.\n#[oracle(avmOpcodeAddress)]\nunconstrained fn address_opcode() -> AztecAddress {}\n\n#[oracle(avmOpcodeSender)]\nunconstrained fn sender_opcode() -> AztecAddress {}\n\n#[oracle(avmOpcodeTransactionFee)]\nunconstrained fn transaction_fee_opcode() -> Field {}\n\n#[oracle(avmOpcodeChainId)]\nunconstrained fn chain_id_opcode() -> Field {}\n\n#[oracle(avmOpcodeVersion)]\nunconstrained fn version_opcode() -> Field {}\n\n#[oracle(avmOpcodeBlockNumber)]\nunconstrained fn block_number_opcode() -> Field {}\n\n#[oracle(avmOpcodeTimestamp)]\nunconstrained fn timestamp_opcode() -> u64 {}\n\n#[oracle(avmOpcodeFeePerL2Gas)]\nunconstrained fn fee_per_l2_gas_opcode() -> Field {}\n\n#[oracle(avmOpcodeFeePerDaGas)]\nunconstrained fn fee_per_da_gas_opcode() -> Field {}\n\n#[oracle(avmOpcodeL2GasLeft)]\nunconstrained fn l2_gas_left_opcode() -> Field {}\n\n#[oracle(avmOpcodeDaGasLeft)]\nunconstrained fn da_gas_left_opcode() -> Field {}\n\n#[oracle(avmOpcodeIsStaticCall)]\nunconstrained fn is_static_call_opcode() -> Field {}\n\n#[oracle(avmOpcodeNoteHashExists)]\nunconstrained fn note_hash_exists_opcode(note_hash: Field, leaf_index: Field) -> u1 {}\n\n#[oracle(avmOpcodeEmitNoteHash)]\nunconstrained fn emit_note_hash_opcode(note_hash: Field) {}\n\n#[oracle(avmOpcodeNullifierExists)]\nunconstrained fn nullifier_exists_opcode(nullifier: Field, address: Field) -> u1 {}\n\n#[oracle(avmOpcodeEmitNullifier)]\nunconstrained fn emit_nullifier_opcode(nullifier: Field) {}\n\n#[oracle(avmOpcodeEmitUnencryptedLog)]\nunconstrained fn emit_unencrypted_log_opcode(message: [Field]) {}\n\n#[oracle(avmOpcodeL1ToL2MsgExists)]\nunconstrained fn l1_to_l2_msg_exists_opcode(msg_hash: Field, msg_leaf_index: Field) -> u1 {}\n\n#[oracle(avmOpcodeSendL2ToL1Msg)]\nunconstrained fn send_l2_to_l1_msg_opcode(recipient: EthAddress, content: Field) {}\n\n#[oracle(avmOpcodeCalldataCopy)]\nunconstrained fn calldata_copy_opcode<let N: u32>(cdoffset: u32, copy_size: u32) -> [Field; N] {}\n\n#[oracle(avmOpcodeReturndataSize)]\nunconstrained fn returndata_size_opcode() -> u32 {}\n\n#[oracle(avmOpcodeReturndataCopy)]\nunconstrained fn returndata_copy_opcode(rdoffset: u32, copy_size: u32) -> [Field] {}\n\n#[oracle(avmOpcodeReturn)]\nunconstrained fn return_opcode(returndata: [Field]) {}\n\n// This opcode reverts using the exact data given. In general it should only be used\n// to do rethrows, where the revert data is the same as the original revert data.\n// For normal reverts, use Noir's `assert` which, on top of reverting, will also add\n// an error selector to the revert data.\n#[oracle(avmOpcodeRevert)]\nunconstrained fn revert_opcode(revertdata: [Field]) {}\n\n#[oracle(avmOpcodeCall)]\nunconstrained fn call_opcode(\n gas: [Field; 2], // gas allocation: [l2_gas, da_gas]\n address: AztecAddress,\n args: [Field],\n) -> bool {}\n\n#[oracle(avmOpcodeStaticCall)]\nunconstrained fn call_static_opcode(\n gas: [Field; 2], // gas allocation: [l2_gas, da_gas]\n address: AztecAddress,\n args: [Field],\n) -> bool {}\n\n#[oracle(avmOpcodeStorageRead)]\nunconstrained fn storage_read_opcode(storage_slot: Field) -> Field {}\n\n#[oracle(avmOpcodeStorageWrite)]\nunconstrained fn storage_write_opcode(storage_slot: Field, value: Field) {}\n"
|
|
2778
|
+
"source": "use crate::context::gas::GasOpts;\nuse crate::hash::{\n compute_l1_to_l2_message_hash, compute_l1_to_l2_message_nullifier, compute_secret_hash,\n};\nuse dep::protocol_types::abis::function_selector::FunctionSelector;\nuse dep::protocol_types::address::{AztecAddress, EthAddress};\nuse dep::protocol_types::constants::MAX_FIELD_VALUE;\nuse dep::protocol_types::traits::{Empty, Packable, Serialize};\n\npub struct PublicContext {\n pub args_hash: Option<Field>,\n pub compute_args_hash: fn() -> Field,\n}\n\nimpl PublicContext {\n pub fn new(compute_args_hash: fn() -> Field) -> Self {\n PublicContext { args_hash: Option::none(), compute_args_hash }\n }\n\n pub fn emit_public_log<T, let N: u32>(_self: &mut Self, log: T)\n where\n T: Serialize<N>,\n {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe { emit_public_log(Serialize::serialize(log).as_slice()) };\n }\n\n pub fn note_hash_exists(_self: Self, note_hash: Field, leaf_index: Field) -> bool {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe { note_hash_exists(note_hash, leaf_index) } == 1\n }\n\n pub fn l1_to_l2_msg_exists(_self: Self, msg_hash: Field, msg_leaf_index: Field) -> bool {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe { l1_to_l2_msg_exists(msg_hash, msg_leaf_index) } == 1\n }\n\n pub fn nullifier_exists(_self: Self, unsiloed_nullifier: Field, address: AztecAddress) -> bool {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe { nullifier_exists(unsiloed_nullifier, address.to_field()) } == 1\n }\n\n pub fn consume_l1_to_l2_message(\n &mut self,\n content: Field,\n secret: Field,\n sender: EthAddress,\n leaf_index: Field,\n ) {\n let secret_hash = compute_secret_hash(secret);\n let message_hash = compute_l1_to_l2_message_hash(\n sender,\n self.chain_id(),\n /*recipient=*/\n self.this_address(),\n self.version(),\n content,\n secret_hash,\n leaf_index,\n );\n let nullifier = compute_l1_to_l2_message_nullifier(message_hash, secret);\n\n assert(\n !self.nullifier_exists(nullifier, self.this_address()),\n \"L1-to-L2 message is already nullified\",\n );\n assert(\n self.l1_to_l2_msg_exists(message_hash, leaf_index),\n \"Tried to consume nonexistent L1-to-L2 message\",\n );\n\n self.push_nullifier(nullifier);\n }\n\n pub fn message_portal(_self: &mut Self, recipient: EthAddress, content: Field) {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe { send_l2_to_l1_msg(recipient, content) };\n }\n\n pub unconstrained fn call_public_function(\n _self: &mut Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field],\n gas_opts: GasOpts,\n ) -> [Field] {\n let args = args.push_front(function_selector.to_field());\n let success = call(gas_for_call(gas_opts), contract_address, args);\n\n let result_data = returndata_copy(0, returndata_size());\n if !success {\n // Rethrow the revert data.\n avm_revert(result_data);\n }\n result_data\n }\n\n pub unconstrained fn static_call_public_function(\n _self: &mut Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field],\n gas_opts: GasOpts,\n ) -> [Field] {\n let args = args.push_front(function_selector.to_field());\n let success = call_static(gas_for_call(gas_opts), contract_address, args);\n\n let result_data = returndata_copy(0, returndata_size());\n if !success {\n // Rethrow the revert data.\n avm_revert(result_data);\n }\n result_data\n }\n\n pub fn push_note_hash(_self: &mut Self, note_hash: Field) {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe { emit_note_hash(note_hash) };\n }\n pub fn push_nullifier(_self: &mut Self, nullifier: Field) {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe { emit_nullifier(nullifier) };\n }\n\n pub fn this_address(_self: Self) -> AztecAddress {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n address()\n }\n }\n pub fn msg_sender(_self: Self) -> AztecAddress {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n sender()\n }\n }\n pub fn selector(_self: Self) -> FunctionSelector {\n // The selector is the first element of the calldata when calling a public function through dispatch.\n /// Safety: AVM opcodes are constrained by the AVM itself\n let raw_selector: [Field; 1] = unsafe { calldata_copy(0, 1) };\n FunctionSelector::from_field(raw_selector[0])\n }\n pub fn get_args_hash(mut self) -> Field {\n if !self.args_hash.is_some() {\n self.args_hash = Option::some((self.compute_args_hash)());\n }\n\n self.args_hash.unwrap_unchecked()\n }\n pub fn transaction_fee(_self: Self) -> Field {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n transaction_fee()\n }\n }\n\n pub fn chain_id(_self: Self) -> Field {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n chain_id()\n }\n }\n pub fn version(_self: Self) -> Field {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n version()\n }\n }\n pub fn block_number(_self: Self) -> Field {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n block_number()\n }\n }\n pub fn timestamp(_self: Self) -> u64 {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n timestamp()\n }\n }\n pub fn fee_per_l2_gas(_self: Self) -> Field {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n fee_per_l2_gas()\n }\n }\n pub fn fee_per_da_gas(_self: Self) -> Field {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n fee_per_da_gas()\n }\n }\n\n pub fn l2_gas_left(_self: Self) -> Field {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n l2_gas_left()\n }\n }\n pub fn da_gas_left(_self: Self) -> Field {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n da_gas_left()\n }\n }\n pub fn is_static_call(_self: Self) -> bool {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe { is_static_call() } == 1\n }\n\n pub fn raw_storage_read<let N: u32>(_self: Self, storage_slot: Field) -> [Field; N] {\n let mut out = [0; N];\n for i in 0..N {\n /// Safety: AVM opcodes are constrained by the AVM itself\n out[i] = unsafe { storage_read(storage_slot + i as Field) };\n }\n out\n }\n\n pub fn storage_read<T, let N: u32>(self, storage_slot: Field) -> T\n where\n T: Packable<N>,\n {\n T::unpack(self.raw_storage_read(storage_slot))\n }\n\n pub fn raw_storage_write<let N: u32>(_self: Self, storage_slot: Field, values: [Field; N]) {\n for i in 0..N {\n /// Safety: AVM opcodes are constrained by the AVM itself\n unsafe { storage_write(storage_slot + i as Field, values[i]) };\n }\n }\n\n pub fn storage_write<T, let N: u32>(self, storage_slot: Field, value: T)\n where\n T: Packable<N>,\n {\n self.raw_storage_write(storage_slot, value.pack());\n }\n}\n\n// Helper functions\nfn gas_for_call(user_gas: GasOpts) -> [Field; 2] {\n // It's ok to use the max possible gas here, because the gas will be\n // capped by the gas left in the (STATIC)CALL instruction.\n [user_gas.l2_gas.unwrap_or(MAX_FIELD_VALUE), user_gas.da_gas.unwrap_or(MAX_FIELD_VALUE)]\n}\n\n// Unconstrained opcode wrappers (do not use directly).\nunconstrained fn address() -> AztecAddress {\n address_opcode()\n}\nunconstrained fn sender() -> AztecAddress {\n sender_opcode()\n}\nunconstrained fn transaction_fee() -> Field {\n transaction_fee_opcode()\n}\nunconstrained fn chain_id() -> Field {\n chain_id_opcode()\n}\nunconstrained fn version() -> Field {\n version_opcode()\n}\nunconstrained fn block_number() -> Field {\n block_number_opcode()\n}\nunconstrained fn timestamp() -> u64 {\n timestamp_opcode()\n}\nunconstrained fn fee_per_l2_gas() -> Field {\n fee_per_l2_gas_opcode()\n}\nunconstrained fn fee_per_da_gas() -> Field {\n fee_per_da_gas_opcode()\n}\nunconstrained fn l2_gas_left() -> Field {\n l2_gas_left_opcode()\n}\nunconstrained fn da_gas_left() -> Field {\n da_gas_left_opcode()\n}\nunconstrained fn is_static_call() -> Field {\n is_static_call_opcode()\n}\nunconstrained fn note_hash_exists(note_hash: Field, leaf_index: Field) -> u1 {\n note_hash_exists_opcode(note_hash, leaf_index)\n}\nunconstrained fn emit_note_hash(note_hash: Field) {\n emit_note_hash_opcode(note_hash)\n}\nunconstrained fn nullifier_exists(nullifier: Field, address: Field) -> u1 {\n nullifier_exists_opcode(nullifier, address)\n}\nunconstrained fn emit_nullifier(nullifier: Field) {\n emit_nullifier_opcode(nullifier)\n}\nunconstrained fn emit_public_log(message: [Field]) {\n emit_public_log_opcode(message)\n}\nunconstrained fn l1_to_l2_msg_exists(msg_hash: Field, msg_leaf_index: Field) -> u1 {\n l1_to_l2_msg_exists_opcode(msg_hash, msg_leaf_index)\n}\nunconstrained fn send_l2_to_l1_msg(recipient: EthAddress, content: Field) {\n send_l2_to_l1_msg_opcode(recipient, content)\n}\nunconstrained fn call(gas: [Field; 2], address: AztecAddress, args: [Field]) -> bool {\n call_opcode(gas, address, args)\n}\nunconstrained fn call_static(gas: [Field; 2], address: AztecAddress, args: [Field]) -> bool {\n call_static_opcode(gas, address, args)\n}\n\npub unconstrained fn calldata_copy<let N: u32>(cdoffset: u32, copy_size: u32) -> [Field; N] {\n calldata_copy_opcode(cdoffset, copy_size)\n}\n\nunconstrained fn returndata_size() -> u32 {\n returndata_size_opcode()\n}\n\nunconstrained fn returndata_copy(rdoffset: u32, copy_size: u32) -> [Field] {\n returndata_copy_opcode(rdoffset, copy_size)\n}\n\npub unconstrained fn avm_return(returndata: [Field]) {\n return_opcode(returndata)\n}\n\n// This opcode reverts using the exact data given. In general it should only be used\n// to do rethrows, where the revert data is the same as the original revert data.\n// For normal reverts, use Noir's `assert` which, on top of reverting, will also add\n// an error selector to the revert data.\nunconstrained fn avm_revert(revertdata: [Field]) {\n revert_opcode(revertdata)\n}\n\nunconstrained fn storage_read(storage_slot: Field) -> Field {\n storage_read_opcode(storage_slot)\n}\n\nunconstrained fn storage_write(storage_slot: Field, value: Field) {\n storage_write_opcode(storage_slot, value);\n}\n\nimpl Empty for PublicContext {\n fn empty() -> Self {\n PublicContext::new(|| 0)\n }\n}\n\n// AVM oracles (opcodes) follow, do not use directly.\n#[oracle(avmOpcodeAddress)]\nunconstrained fn address_opcode() -> AztecAddress {}\n\n#[oracle(avmOpcodeSender)]\nunconstrained fn sender_opcode() -> AztecAddress {}\n\n#[oracle(avmOpcodeTransactionFee)]\nunconstrained fn transaction_fee_opcode() -> Field {}\n\n#[oracle(avmOpcodeChainId)]\nunconstrained fn chain_id_opcode() -> Field {}\n\n#[oracle(avmOpcodeVersion)]\nunconstrained fn version_opcode() -> Field {}\n\n#[oracle(avmOpcodeBlockNumber)]\nunconstrained fn block_number_opcode() -> Field {}\n\n#[oracle(avmOpcodeTimestamp)]\nunconstrained fn timestamp_opcode() -> u64 {}\n\n#[oracle(avmOpcodeFeePerL2Gas)]\nunconstrained fn fee_per_l2_gas_opcode() -> Field {}\n\n#[oracle(avmOpcodeFeePerDaGas)]\nunconstrained fn fee_per_da_gas_opcode() -> Field {}\n\n#[oracle(avmOpcodeL2GasLeft)]\nunconstrained fn l2_gas_left_opcode() -> Field {}\n\n#[oracle(avmOpcodeDaGasLeft)]\nunconstrained fn da_gas_left_opcode() -> Field {}\n\n#[oracle(avmOpcodeIsStaticCall)]\nunconstrained fn is_static_call_opcode() -> Field {}\n\n#[oracle(avmOpcodeNoteHashExists)]\nunconstrained fn note_hash_exists_opcode(note_hash: Field, leaf_index: Field) -> u1 {}\n\n#[oracle(avmOpcodeEmitNoteHash)]\nunconstrained fn emit_note_hash_opcode(note_hash: Field) {}\n\n#[oracle(avmOpcodeNullifierExists)]\nunconstrained fn nullifier_exists_opcode(nullifier: Field, address: Field) -> u1 {}\n\n#[oracle(avmOpcodeEmitNullifier)]\nunconstrained fn emit_nullifier_opcode(nullifier: Field) {}\n\n// TODO(#11124): rename unencrypted to public in avm\n#[oracle(avmOpcodeEmitUnencryptedLog)]\nunconstrained fn emit_public_log_opcode(message: [Field]) {}\n\n#[oracle(avmOpcodeL1ToL2MsgExists)]\nunconstrained fn l1_to_l2_msg_exists_opcode(msg_hash: Field, msg_leaf_index: Field) -> u1 {}\n\n#[oracle(avmOpcodeSendL2ToL1Msg)]\nunconstrained fn send_l2_to_l1_msg_opcode(recipient: EthAddress, content: Field) {}\n\n#[oracle(avmOpcodeCalldataCopy)]\nunconstrained fn calldata_copy_opcode<let N: u32>(cdoffset: u32, copy_size: u32) -> [Field; N] {}\n\n#[oracle(avmOpcodeReturndataSize)]\nunconstrained fn returndata_size_opcode() -> u32 {}\n\n#[oracle(avmOpcodeReturndataCopy)]\nunconstrained fn returndata_copy_opcode(rdoffset: u32, copy_size: u32) -> [Field] {}\n\n#[oracle(avmOpcodeReturn)]\nunconstrained fn return_opcode(returndata: [Field]) {}\n\n// This opcode reverts using the exact data given. In general it should only be used\n// to do rethrows, where the revert data is the same as the original revert data.\n// For normal reverts, use Noir's `assert` which, on top of reverting, will also add\n// an error selector to the revert data.\n#[oracle(avmOpcodeRevert)]\nunconstrained fn revert_opcode(revertdata: [Field]) {}\n\n#[oracle(avmOpcodeCall)]\nunconstrained fn call_opcode(\n gas: [Field; 2], // gas allocation: [l2_gas, da_gas]\n address: AztecAddress,\n args: [Field],\n) -> bool {}\n\n#[oracle(avmOpcodeStaticCall)]\nunconstrained fn call_static_opcode(\n gas: [Field; 2], // gas allocation: [l2_gas, da_gas]\n address: AztecAddress,\n args: [Field],\n) -> bool {}\n\n#[oracle(avmOpcodeStorageRead)]\nunconstrained fn storage_read_opcode(storage_slot: Field) -> Field {}\n\n#[oracle(avmOpcodeStorageWrite)]\nunconstrained fn storage_write_opcode(storage_slot: Field, value: Field) {}\n"
|
|
2775
2779
|
},
|
|
2776
2780
|
"81": {
|
|
2777
2781
|
"path": "/build-volume/noir-projects/aztec-nr/aztec/src/context/returns_hash.nr",
|
|
@@ -2779,11 +2783,11 @@
|
|
|
2779
2783
|
},
|
|
2780
2784
|
"82": {
|
|
2781
2785
|
"path": "/build-volume/noir-projects/aztec-nr/aztec/src/context/unconstrained_context.nr",
|
|
2782
|
-
"source": "use crate::oracle::{\n execution::{get_block_number, get_chain_id, get_contract_address, get_version},\n storage::storage_read,\n};\nuse dep::protocol_types::{address::AztecAddress, traits::
|
|
2786
|
+
"source": "use crate::oracle::{\n execution::{get_block_number, get_chain_id, get_contract_address, get_version},\n storage::storage_read,\n};\nuse dep::protocol_types::{address::AztecAddress, traits::Packable};\n\npub struct UnconstrainedContext {\n block_number: u32,\n contract_address: AztecAddress,\n version: Field,\n chain_id: Field,\n}\n\nimpl UnconstrainedContext {\n pub unconstrained fn new() -> Self {\n // We could call these oracles on the getters instead of at creation, which makes sense given that they might\n // not even be accessed. However any performance gains are minimal, and we'd rather fail early if a user\n // incorrectly attempts to create an UnconstrainedContext in an environment in which these oracles are not\n // available.\n let block_number = get_block_number();\n let contract_address = get_contract_address();\n let chain_id = get_chain_id();\n let version = get_version();\n Self { block_number, contract_address, version, chain_id }\n }\n\n pub unconstrained fn at(contract_address: AztecAddress) -> Self {\n let block_number = get_block_number();\n let chain_id = get_chain_id();\n let version = get_version();\n Self { block_number, contract_address, version, chain_id }\n }\n\n pub unconstrained fn at_historical(contract_address: AztecAddress, block_number: u32) -> Self {\n let chain_id = get_chain_id();\n let version = get_version();\n Self { block_number, contract_address, version, chain_id }\n }\n\n pub fn block_number(self) -> u32 {\n self.block_number\n }\n\n pub fn this_address(self) -> AztecAddress {\n self.contract_address\n }\n\n pub fn version(self) -> Field {\n self.version\n }\n\n pub fn chain_id(self) -> Field {\n self.chain_id\n }\n\n pub unconstrained fn raw_storage_read<let N: u32>(\n self: Self,\n storage_slot: Field,\n ) -> [Field; N] {\n storage_read(self.this_address(), storage_slot, self.block_number())\n }\n\n pub unconstrained fn storage_read<T, let N: u32>(self, storage_slot: Field) -> T\n where\n T: Packable<N>,\n {\n T::unpack(self.raw_storage_read(storage_slot))\n }\n}\n"
|
|
2783
2787
|
},
|
|
2784
2788
|
"92": {
|
|
2785
2789
|
"path": "/build-volume/noir-projects/aztec-nr/aztec/src/hash.nr",
|
|
2786
|
-
"source": "use crate::utils::to_bytes::{arr_to_be_bytes_arr, str_to_be_bytes_arr};\nuse dep::protocol_types::{\n address::{AztecAddress, EthAddress},\n constants::{\n GENERATOR_INDEX__FUNCTION_ARGS, GENERATOR_INDEX__MESSAGE_NULLIFIER,\n GENERATOR_INDEX__SECRET_HASH,\n },\n hash::{poseidon2_hash_with_separator, poseidon2_hash_with_separator_slice, sha256_to_field},\n point::Point,\n traits::Hash,\n};\n\npub use dep::protocol_types::hash::{compute_siloed_nullifier, pedersen_hash};\n\npub fn pedersen_commitment<let N: u32>(inputs: [Field; N], hash_index: u32) -> Point {\n std::hash::pedersen_commitment_with_separator(inputs, hash_index)\n}\n\npub fn compute_secret_hash(secret: Field) -> Field {\n poseidon2_hash_with_separator([secret], GENERATOR_INDEX__SECRET_HASH)\n}\n\npub fn
|
|
2790
|
+
"source": "use crate::utils::to_bytes::{arr_to_be_bytes_arr, str_to_be_bytes_arr};\nuse dep::protocol_types::{\n address::{AztecAddress, EthAddress},\n constants::{\n GENERATOR_INDEX__FUNCTION_ARGS, GENERATOR_INDEX__MESSAGE_NULLIFIER,\n GENERATOR_INDEX__SECRET_HASH,\n },\n hash::{poseidon2_hash_with_separator, poseidon2_hash_with_separator_slice, sha256_to_field},\n point::Point,\n traits::Hash,\n};\n\npub use dep::protocol_types::hash::{compute_siloed_nullifier, pedersen_hash};\n\npub fn pedersen_commitment<let N: u32>(inputs: [Field; N], hash_index: u32) -> Point {\n std::hash::pedersen_commitment_with_separator(inputs, hash_index)\n}\n\npub fn compute_secret_hash(secret: Field) -> Field {\n poseidon2_hash_with_separator([secret], GENERATOR_INDEX__SECRET_HASH)\n}\n\npub fn compute_l1_to_l2_message_hash(\n sender: EthAddress,\n chain_id: Field,\n recipient: AztecAddress,\n version: Field,\n content: Field,\n secret_hash: Field,\n leaf_index: Field,\n) -> Field {\n let mut hash_bytes = [0 as u8; 224];\n let sender_bytes: [u8; 32] = sender.to_field().to_be_bytes();\n let chain_id_bytes: [u8; 32] = chain_id.to_be_bytes();\n let recipient_bytes: [u8; 32] = recipient.to_field().to_be_bytes();\n let version_bytes: [u8; 32] = version.to_be_bytes();\n let content_bytes: [u8; 32] = content.to_be_bytes();\n let secret_hash_bytes: [u8; 32] = secret_hash.to_be_bytes();\n let leaf_index_bytes: [u8; 32] = leaf_index.to_be_bytes();\n\n for i in 0..32 {\n hash_bytes[i] = sender_bytes[i];\n hash_bytes[i + 32] = chain_id_bytes[i];\n hash_bytes[i + 64] = recipient_bytes[i];\n hash_bytes[i + 96] = version_bytes[i];\n hash_bytes[i + 128] = content_bytes[i];\n hash_bytes[i + 160] = secret_hash_bytes[i];\n hash_bytes[i + 192] = leaf_index_bytes[i];\n }\n\n sha256_to_field(hash_bytes)\n}\n\n// The nullifier of a l1 to l2 message is the hash of the message salted with the secret\npub fn compute_l1_to_l2_message_nullifier(message_hash: Field, secret: Field) -> Field {\n poseidon2_hash_with_separator([message_hash, secret], GENERATOR_INDEX__MESSAGE_NULLIFIER)\n}\n\npub struct ArgsHasher {\n pub fields: [Field],\n}\n\nimpl Hash for ArgsHasher {\n fn hash(self) -> Field {\n hash_args(self.fields)\n }\n}\n\nimpl ArgsHasher {\n pub fn new() -> Self {\n Self { fields: [] }\n }\n\n pub fn add(&mut self, field: Field) {\n self.fields = self.fields.push_back(field);\n }\n\n pub fn add_multiple<let N: u32>(&mut self, fields: [Field; N]) {\n for i in 0..N {\n self.fields = self.fields.push_back(fields[i]);\n }\n }\n}\n\npub fn hash_args_array<let N: u32>(args: [Field; N]) -> Field {\n if args.len() == 0 {\n 0\n } else {\n poseidon2_hash_with_separator(args, GENERATOR_INDEX__FUNCTION_ARGS)\n }\n}\n\npub fn hash_args(args: [Field]) -> Field {\n if args.len() == 0 {\n 0\n } else {\n poseidon2_hash_with_separator_slice(args, GENERATOR_INDEX__FUNCTION_ARGS)\n }\n}\n\n#[test]\nunconstrained fn compute_var_args_hash() {\n let mut input = ArgsHasher::new();\n for i in 0..100 {\n input.add(i as Field);\n }\n let hash = input.hash();\n dep::std::println(hash);\n assert(hash == 0x19b0d74feb06ebde19edd85a28986c97063e84b3b351a8b666c7cac963ce655f);\n}\n"
|
|
2787
2791
|
}
|
|
2788
2792
|
}
|
|
2789
2793
|
}
|