@aztec/protocol-contracts 0.86.0 → 0.87.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (43) hide show
  1. package/artifacts/AuthRegistry.json +736 -663
  2. package/artifacts/ContractClassRegisterer.json +333 -251
  3. package/artifacts/ContractInstanceDeployer.json +456 -425
  4. package/artifacts/FeeJuice.json +296 -265
  5. package/artifacts/MultiCallEntrypoint.json +77 -46
  6. package/artifacts/Router.json +204 -156
  7. package/dest/auth-registry/index.js +1 -1
  8. package/dest/class-registerer/contract_class_registered_event.d.ts +0 -2
  9. package/dest/class-registerer/contract_class_registered_event.d.ts.map +1 -1
  10. package/dest/class-registerer/contract_class_registered_event.js +4 -3
  11. package/dest/class-registerer/index.js +1 -1
  12. package/dest/class-registerer/private_function_broadcasted_event.d.ts +0 -2
  13. package/dest/class-registerer/private_function_broadcasted_event.d.ts.map +1 -1
  14. package/dest/class-registerer/private_function_broadcasted_event.js +2 -2
  15. package/dest/class-registerer/utility_function_broadcasted_event.d.ts +0 -2
  16. package/dest/class-registerer/utility_function_broadcasted_event.d.ts.map +1 -1
  17. package/dest/class-registerer/utility_function_broadcasted_event.js +2 -2
  18. package/dest/fee-juice/index.js +1 -1
  19. package/dest/instance-deployer/contract_instance_updated_event.js +1 -1
  20. package/dest/instance-deployer/index.js +1 -1
  21. package/dest/multi-call-entrypoint/index.js +1 -1
  22. package/dest/protocol_contract_data.js +7 -7
  23. package/dest/router/index.js +1 -1
  24. package/dest/scripts/cleanup_artifacts.js +2 -2
  25. package/dest/tests/fixtures.d.ts +0 -2
  26. package/dest/tests/fixtures.d.ts.map +1 -1
  27. package/package.json +7 -7
  28. package/src/auth-registry/index.ts +1 -1
  29. package/src/build_protocol_contract_tree.ts +2 -2
  30. package/src/class-registerer/contract_class_registered_event.ts +4 -3
  31. package/src/class-registerer/index.ts +1 -1
  32. package/src/class-registerer/private_function_broadcasted_event.ts +2 -2
  33. package/src/class-registerer/utility_function_broadcasted_event.ts +2 -2
  34. package/src/fee-juice/index.ts +1 -1
  35. package/src/instance-deployer/contract_instance_updated_event.ts +1 -1
  36. package/src/instance-deployer/index.ts +1 -1
  37. package/src/multi-call-entrypoint/index.ts +1 -1
  38. package/src/protocol_contract_data.ts +7 -7
  39. package/src/router/index.ts +1 -1
  40. package/dest/protocol_contract_data_2.d.ts +0 -21
  41. package/dest/protocol_contract_data_2.d.ts.map +0 -1
  42. package/dest/protocol_contract_data_2.js +0 -41
  43. package/src/protocol_contract_data_2.ts +0 -61
@@ -1,8 +1,398 @@
1
1
  {
2
2
  "transpiled": true,
3
- "noir_version": "1.0.0-beta.4+0000000000000000000000000000000000000000",
3
+ "noir_version": "1.0.0-beta.5+0000000000000000000000000000000000000000",
4
4
  "name": "AuthRegistry",
5
5
  "functions": [
6
+ {
7
+ "name": "_set_authorized",
8
+ "is_unconstrained": true,
9
+ "custom_attributes": [
10
+ "public",
11
+ "internal"
12
+ ],
13
+ "abi": {
14
+ "parameters": [
15
+ {
16
+ "name": "approver",
17
+ "type": {
18
+ "kind": "struct",
19
+ "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress",
20
+ "fields": [
21
+ {
22
+ "name": "inner",
23
+ "type": {
24
+ "kind": "field"
25
+ }
26
+ }
27
+ ]
28
+ },
29
+ "visibility": "private"
30
+ },
31
+ {
32
+ "name": "message_hash",
33
+ "type": {
34
+ "kind": "field"
35
+ },
36
+ "visibility": "private"
37
+ },
38
+ {
39
+ "name": "authorize",
40
+ "type": {
41
+ "kind": "boolean"
42
+ },
43
+ "visibility": "private"
44
+ }
45
+ ],
46
+ "return_type": null,
47
+ "error_types": {
48
+ "206160798890201757": {
49
+ "error_kind": "string",
50
+ "string": "Storage slot 0 not allowed. Storage slots must start from 1."
51
+ },
52
+ "5019202896831570965": {
53
+ "error_kind": "string",
54
+ "string": "attempt to add with overflow"
55
+ },
56
+ "6304245522015439386": {
57
+ "error_kind": "string",
58
+ "string": "Function _set_authorized can only be called internally"
59
+ },
60
+ "14225679739041873922": {
61
+ "error_kind": "string",
62
+ "string": "Index out of bounds"
63
+ },
64
+ "17843811134343075018": {
65
+ "error_kind": "string",
66
+ "string": "Stack too deep"
67
+ }
68
+ }
69
+ },
70
+ "bytecode": "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",
71
+ "debug_symbols": "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",
72
+ "brillig_names": [
73
+ "_set_authorized"
74
+ ]
75
+ },
76
+ {
77
+ "name": "consume",
78
+ "is_unconstrained": true,
79
+ "custom_attributes": [
80
+ "public"
81
+ ],
82
+ "abi": {
83
+ "parameters": [
84
+ {
85
+ "name": "on_behalf_of",
86
+ "type": {
87
+ "kind": "struct",
88
+ "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress",
89
+ "fields": [
90
+ {
91
+ "name": "inner",
92
+ "type": {
93
+ "kind": "field"
94
+ }
95
+ }
96
+ ]
97
+ },
98
+ "visibility": "private"
99
+ },
100
+ {
101
+ "name": "inner_hash",
102
+ "type": {
103
+ "kind": "field"
104
+ },
105
+ "visibility": "private"
106
+ }
107
+ ],
108
+ "return_type": {
109
+ "abi_type": {
110
+ "kind": "field"
111
+ },
112
+ "visibility": "public"
113
+ },
114
+ "error_types": {
115
+ "206160798890201757": {
116
+ "error_kind": "string",
117
+ "string": "Storage slot 0 not allowed. Storage slots must start from 1."
118
+ },
119
+ "715723737710351018": {
120
+ "error_kind": "string",
121
+ "string": "rejecting all"
122
+ },
123
+ "5019202896831570965": {
124
+ "error_kind": "string",
125
+ "string": "attempt to add with overflow"
126
+ },
127
+ "12737498021964987455": {
128
+ "error_kind": "string",
129
+ "string": "unauthorized"
130
+ },
131
+ "14225679739041873922": {
132
+ "error_kind": "string",
133
+ "string": "Index out of bounds"
134
+ },
135
+ "17843811134343075018": {
136
+ "error_kind": "string",
137
+ "string": "Stack too deep"
138
+ }
139
+ }
140
+ },
141
+ "bytecode": "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",
142
+ "debug_symbols": "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",
143
+ "brillig_names": [
144
+ "consume"
145
+ ]
146
+ },
147
+ {
148
+ "name": "is_consumable",
149
+ "is_unconstrained": true,
150
+ "custom_attributes": [
151
+ "public",
152
+ "view"
153
+ ],
154
+ "abi": {
155
+ "parameters": [
156
+ {
157
+ "name": "on_behalf_of",
158
+ "type": {
159
+ "kind": "struct",
160
+ "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress",
161
+ "fields": [
162
+ {
163
+ "name": "inner",
164
+ "type": {
165
+ "kind": "field"
166
+ }
167
+ }
168
+ ]
169
+ },
170
+ "visibility": "private"
171
+ },
172
+ {
173
+ "name": "message_hash",
174
+ "type": {
175
+ "kind": "field"
176
+ },
177
+ "visibility": "private"
178
+ }
179
+ ],
180
+ "return_type": {
181
+ "abi_type": {
182
+ "kind": "boolean"
183
+ },
184
+ "visibility": "public"
185
+ },
186
+ "error_types": {
187
+ "206160798890201757": {
188
+ "error_kind": "string",
189
+ "string": "Storage slot 0 not allowed. Storage slots must start from 1."
190
+ },
191
+ "5019202896831570965": {
192
+ "error_kind": "string",
193
+ "string": "attempt to add with overflow"
194
+ },
195
+ "5444967152290923376": {
196
+ "error_kind": "string",
197
+ "string": "Function is_consumable can only be called statically"
198
+ },
199
+ "14225679739041873922": {
200
+ "error_kind": "string",
201
+ "string": "Index out of bounds"
202
+ },
203
+ "17843811134343075018": {
204
+ "error_kind": "string",
205
+ "string": "Stack too deep"
206
+ }
207
+ }
208
+ },
209
+ "bytecode": "JwACBAEoAAABBIBKJwAABAMnAgMEAicCBAQAHwoAAwAEgEcuCIBHAAEuCIBIAAIlAAAAUSUAAABuLgIAAYBJKAIAAgSASScCAwQBOw4AAwACKACAQwQAAygAgEQBAAAoAIBFBAAAKACARgQAASYlAAADmh4CAAMJJwIEAAEKKgMEBSQCAAUAAACPJQAAA8MnAgMAAC0IAQQnAgUEBAAIAQUBJwMEBAEAIgQCBS0KBQYtDgMGACIGAgYtDgMGACIGAgYtDgMGKwIABQAAAAAAAAAAAgAAAAAAAAAALQgBBicCBwQFAAgBBwEnAwYEAQAiBgIHLQoHCC0OAwgAIggCCC0OAwgAIggCCC0OAwgAIggCCC0OBQgtCAEHAAABAgEtDgQHLQgBBAAAAQIBLQ4GBC0IAQYAAAECAS4MgEUABi0IAQgAAAECAS4MgEQACCcCCQACJwIKBAstCAALLQoHDC0KBA0tCgYOLQoIDy0KCRAACAAKACUAAAPVLQIAACcCCQQKLQgACi0KBwstCgQMLQoGDS0KCA4tCgEPAAgACQAlAAAD1S0CAAAtCwgBCyIAAYBEAAkkAgAJAAABxicCCgQAPAYKAScCAQQJLQgACS0KBwotCgQLLQoGDC0KCA0ACAABACUAAAUDLQIAAC0LBAEBIgABgEYABi0LBgQKKgQDAQsiAAGARAAGJAIABgAAAhclAAAGFi0IAQEnAgYEBAAIAQYBJwMBBAEAIgECBi0KBgctDgMHACIHAgctDgMHACIHAgctDgMHLQgBBicCBwQFAAgBBwEnAwYEAQAiBgIHLQoHCC0OAwgAIggCCC0OAwgAIggCCC0OAwgAIggCCC0OBQgtCAEFAAABAgEtDgEFLQgBAQAAAQIBLQ4GAS0IAQYAAAECAS4MgEUABi0IAQcAAAECAS4MgEQABycCCAQJLQgACS0KBQotCgELLQoGDC0KBw0tCgQOAAgACAAlAAAD1S0CAAAnAgQECC0IAAgtCgUJLQoBCi0KBgstCgcMLQoCDQAIAAQAJQAAA9UtAgAALQsHAgsiAAKARAAEJAIABAAAAy8nAggEADwGCAEnAgIECC0IAAgtCgUJLQoBCi0KBgstCgcMAAgAAgAlAAAFAy0CAAAtCwECASIAAoBGAAQtCwQBCioBAwILIgACgEQAAyQCAAMAAAOAJQAABhYvCgABAAIcCgIDARwKAwEAHAoBAgEtCgIBJigAgAQEeAANAAAAgASAAyQAgAMAAAPCKgEAAQX3ofOvpa3UyjwEAgEmKgEAAQVLkGjGvfiDcDwEAgEmJQAAA5otCwQGCyIABoBEAAckAgAHAAAD9ycCCAQAPAYIAS0LAwYLIgAGgEMAByQCAAcAAASPIwAABBAtCwMGLQsBBy0LAggtCwQJDSIABoBDAAonAgsBASQCAAoAAAQ6JQAABiguAgAHgAMoAIAEBAAEJQAABjouCIAFAAoAIgoCCwAqCwYMLQ4FDAEiAAaARgAFDioGBQckAgAHAAAEeiUAAAbILQ4KAS0OCAItDgUDLQ4JBCMAAAUCJwIGBActCAAHLQoBCC0KAgktCgMKLQoECwAIAAYAJQAABQMtAgAALQsBBi0LAgctCwQILgIABoADKACABAQABCUAAAY6LgiABQAJACIJAgoBIgAKgEUACy0OBQstDgkBLQ4HAi4MgEYAAy0OCAQjAAAFAiYlAAADmi4IgEUABSMAAAUTDSIABYBDAAYkAgAGAAAFgyMAAAUoLQsCBS0LBQYAIgYCBi0OBgUnAgYEBC0IAQcnAggEBQAIAQgBJwMHBAEAIgUCCCcCCQQEACIHAgo/DwAIAAotCwEFLQsDBi0LBAgtDgUBLQ4HAi0OBgMtDggEJi0LAwYMKgUGByQCAAcAAAWZIwAABgUtCwIGACIGAggAKggFCS0LCQctCwEIACIIAgoAKgoFCy0LCwkAKgcJCi0LAwctCwQJLgIABoADKACABAQABSUAAAY6LgiABQALACILAgwAKgwFDS0OCg0tDggBLQ4LAi0OBwMtDgkEIwAABgUBIgAFgEYABi0KBgUjAAAFEyoBAAEFAtxuJ4B2Ep08BAIBJioBAAEFxWvEWg4QAAI8BAIBJi4BgAOABgsAgAYAAoAHJACABwAABlUjAAAGYC4AgAOABSMAAAbHLgAAAYAFAQAAAYAEAAEBAIADgASACS4AgAOACi4AgAWACwsAgAqACYAMJACADAAABrMuAYAKgAguBIAIgAsBAIAKAAKACgEAgAsAAoALIwAABoIoAYAFBAABAwCABgACgAYjAAAGxyYqAQABBUWnynEZQeQVPAQCASY=",
210
+ "debug_symbols": "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",
211
+ "brillig_names": [
212
+ "is_consumable"
213
+ ]
214
+ },
215
+ {
216
+ "name": "is_reject_all",
217
+ "is_unconstrained": true,
218
+ "custom_attributes": [
219
+ "public",
220
+ "view"
221
+ ],
222
+ "abi": {
223
+ "parameters": [
224
+ {
225
+ "name": "on_behalf_of",
226
+ "type": {
227
+ "kind": "struct",
228
+ "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress",
229
+ "fields": [
230
+ {
231
+ "name": "inner",
232
+ "type": {
233
+ "kind": "field"
234
+ }
235
+ }
236
+ ]
237
+ },
238
+ "visibility": "private"
239
+ }
240
+ ],
241
+ "return_type": {
242
+ "abi_type": {
243
+ "kind": "boolean"
244
+ },
245
+ "visibility": "public"
246
+ },
247
+ "error_types": {
248
+ "206160798890201757": {
249
+ "error_kind": "string",
250
+ "string": "Storage slot 0 not allowed. Storage slots must start from 1."
251
+ },
252
+ "5019202896831570965": {
253
+ "error_kind": "string",
254
+ "string": "attempt to add with overflow"
255
+ },
256
+ "9474245853673257536": {
257
+ "error_kind": "string",
258
+ "string": "Function is_reject_all can only be called statically"
259
+ },
260
+ "14225679739041873922": {
261
+ "error_kind": "string",
262
+ "string": "Index out of bounds"
263
+ },
264
+ "17843811134343075018": {
265
+ "error_kind": "string",
266
+ "string": "Stack too deep"
267
+ }
268
+ }
269
+ },
270
+ "bytecode": "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",
271
+ "debug_symbols": "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",
272
+ "brillig_names": [
273
+ "is_reject_all"
274
+ ]
275
+ },
276
+ {
277
+ "name": "public_dispatch",
278
+ "is_unconstrained": true,
279
+ "custom_attributes": [
280
+ "public"
281
+ ],
282
+ "abi": {
283
+ "parameters": [
284
+ {
285
+ "name": "selector",
286
+ "type": {
287
+ "kind": "field"
288
+ },
289
+ "visibility": "private"
290
+ }
291
+ ],
292
+ "return_type": null,
293
+ "error_types": {
294
+ "206160798890201757": {
295
+ "error_kind": "string",
296
+ "string": "Storage slot 0 not allowed. Storage slots must start from 1."
297
+ },
298
+ "715723737710351018": {
299
+ "error_kind": "string",
300
+ "string": "rejecting all"
301
+ },
302
+ "2830029349304997821": {
303
+ "error_kind": "fmtstring",
304
+ "length": 27,
305
+ "item_types": [
306
+ {
307
+ "kind": "field"
308
+ }
309
+ ]
310
+ },
311
+ "5019202896831570965": {
312
+ "error_kind": "string",
313
+ "string": "attempt to add with overflow"
314
+ },
315
+ "5444967152290923376": {
316
+ "error_kind": "string",
317
+ "string": "Function is_consumable can only be called statically"
318
+ },
319
+ "6304245522015439386": {
320
+ "error_kind": "string",
321
+ "string": "Function _set_authorized can only be called internally"
322
+ },
323
+ "9474245853673257536": {
324
+ "error_kind": "string",
325
+ "string": "Function is_reject_all can only be called statically"
326
+ },
327
+ "12737498021964987455": {
328
+ "error_kind": "string",
329
+ "string": "unauthorized"
330
+ },
331
+ "14225679739041873922": {
332
+ "error_kind": "string",
333
+ "string": "Index out of bounds"
334
+ },
335
+ "17843811134343075018": {
336
+ "error_kind": "string",
337
+ "string": "Stack too deep"
338
+ }
339
+ }
340
+ },
341
+ "bytecode": "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",
342
+ "debug_symbols": "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",
343
+ "brillig_names": [
344
+ "public_dispatch"
345
+ ]
346
+ },
347
+ {
348
+ "name": "set_authorized",
349
+ "is_unconstrained": true,
350
+ "custom_attributes": [
351
+ "public"
352
+ ],
353
+ "abi": {
354
+ "parameters": [
355
+ {
356
+ "name": "message_hash",
357
+ "type": {
358
+ "kind": "field"
359
+ },
360
+ "visibility": "private"
361
+ },
362
+ {
363
+ "name": "authorize",
364
+ "type": {
365
+ "kind": "boolean"
366
+ },
367
+ "visibility": "private"
368
+ }
369
+ ],
370
+ "return_type": null,
371
+ "error_types": {
372
+ "206160798890201757": {
373
+ "error_kind": "string",
374
+ "string": "Storage slot 0 not allowed. Storage slots must start from 1."
375
+ },
376
+ "5019202896831570965": {
377
+ "error_kind": "string",
378
+ "string": "attempt to add with overflow"
379
+ },
380
+ "14225679739041873922": {
381
+ "error_kind": "string",
382
+ "string": "Index out of bounds"
383
+ },
384
+ "17843811134343075018": {
385
+ "error_kind": "string",
386
+ "string": "Stack too deep"
387
+ }
388
+ }
389
+ },
390
+ "bytecode": "JwACBAEoAAABBIBJJwAABAMnAgMEAicCBAQAHwoAAwAEgEcdAIBIgEgBLgiARwABLgiASAACJQAAAFIlAAAAbygCAAEEgEknAgIEADsOAAIAASgAgEMEAAMoAIBEAQAAKACARQQAACgAgEYEAAEmJQAAA3YeAgADAScCBAAALQgBBScCBgQEAAgBBgEnAwUEAQAiBQIGLQoGBy0OBAcAIgcCBy0OBAcAIgcCBy0OBAcrAgAGAAAAAAAAAAACAAAAAAAAAAAtCAEHJwIIBAUACAEIAScDBwQBACIHAggtCggJLQ4ECQAiCQIJLQ4ECQAiCQIJLQ4ECQAiCQIJLQ4GCS0IAQgAAAECAS0OBQgtCAEFAAABAgEtDgcFLQgBBwAAAQIBLgyARQAHLQgBCQAAAQIBLgyARAAJJwIKAAInAgsEDC0IAAwtCggNLQoFDi0KBw8tCgkQLQoKEQAIAAsAJQAAA58tAgAAJwIKBAstCAALLQoIDC0KBQ0tCgcOLQoJDy0KAxAACAAKACUAAAOfLQIAAC0LCQMLIgADgEQACiQCAAoAAAGwJwILBAA8BgsBJwIDBAotCAAKLQoICy0KBQwtCgcNLQoJDgAIAAMAJQAABM0tAgAALQsFAwEiAAOARgAHLQsHBQoqBQQDCyIAA4BEAAckAgAHAAACASUAAAXgLQgBAycCBwQEAAgBBwEnAwMEAQAiAwIHLQoHCC0OBAgAIggCCC0OBAgAIggCCC0OBAgtCAEHJwIIBAUACAEIAScDBwQBACIHAggtCggJLQ4ECQAiCQIJLQ4ECQAiCQIJLQ4ECQAiCQIJLQ4GCS0IAQYAAAECAS0OAwYtCAEDAAABAgEtDgcDLQgBBwAAAQIBLgyARQAHLQgBCAAAAQIBLgyARAAIJwIJBAotCAAKLQoGCy0KAwwtCgcNLQoIDi0KBQ8ACAAJACUAAAOfLQIAACcCBQQJLQgACS0KBgotCgMLLQoHDC0KCA0tCgEOAAgABQAlAAADny0CAAAtCwgBCyIAAYBEAAUkAgAFAAADGScCCQQAPAYJAScCAQQJLQgACS0KBgotCgMLLQoHDC0KCA0ACAABACUAAATNLQIAAC0LAwEBIgABgEYABS0LBQMKKgMEAQsiAAGARAAEJAIABAAAA2olAAAF4BwKAgEAMAoAAQADJigAgAQEeAANAAAAgASAAyQAgAMAAAOeKgEAAQX3ofOvpa3UyjwEAgEmJQAAA3YtCwQGCyIABoBEAAckAgAHAAADwScCCAQAPAYIAS0LAwYLIgAGgEMAByQCAAcAAARZIwAAA9otCwMGLQsBBy0LAggtCwQJDSIABoBDAAonAgsBASQCAAoAAAQEJQAABfIuAgAHgAMoAIAEBAAEJQAABgQuCIAFAAoAIgoCCwAqCwYMLQ4FDAEiAAaARgAFDioGBQckAgAHAAAERCUAAAaSLQ4KAS0OCAItDgUDLQ4JBCMAAATMJwIGBActCAAHLQoBCC0KAgktCgMKLQoECwAIAAYAJQAABM0tAgAALQsBBi0LAgctCwQILgIABoADKACABAQABCUAAAYELgiABQAJACIJAgoBIgAKgEUACy0OBQstDgkBLQ4HAi4MgEYAAy0OCAQjAAAEzCYlAAADdi4IgEUABSMAAATdDSIABYBDAAYkAgAGAAAFTSMAAATyLQsCBS0LBQYAIgYCBi0OBgUnAgYEBC0IAQcnAggEBQAIAQgBJwMHBAEAIgUCCCcCCQQEACIHAgo/DwAIAAotCwEFLQsDBi0LBAgtDgUBLQ4HAi0OBgMtDggEJi0LAwYMKgUGByQCAAcAAAVjIwAABc8tCwIGACIGAggAKggFCS0LCQctCwEIACIIAgoAKgoFCy0LCwkAKgcJCi0LAwctCwQJLgIABoADKACABAQABSUAAAYELgiABQALACILAgwAKgwFDS0OCg0tDggBLQ4LAi0OBwMtDgkEIwAABc8BIgAFgEYABi0KBgUjAAAE3SoBAAEFAtxuJ4B2Ep08BAIBJioBAAEFxWvEWg4QAAI8BAIBJi4BgAOABgsAgAYAAoAHJACABwAABh8jAAAGKi4AgAOABSMAAAaRLgAAAYAFAQAAAYAEAAEBAIADgASACS4AgAOACi4AgAWACwsAgAqACYAMJACADAAABn0uAYAKgAguBIAIgAsBAIAKAAKACgEAgAsAAoALIwAABkwoAYAFBAABAwCABgACgAYjAAAGkSYqAQABBUWnynEZQeQVPAQCASY=",
391
+ "debug_symbols": "tZndbhs5DIXfxde5kETqL69SFEWaukUAwwncZIFFkHdfUuKh4wVm4I7RG+szRzwjShRHY7/vfuy/v/369nT8+fx7d//lfff99HQ4PP36dnh+fHh9ej6K9X0X9CPGsrunu11McXcfg0IxoADIBgwLw5JhyQxoBoUA1aAmgN4iCvQ6IYUIsEspwhJhSbCkDOgGxIBmwATALXICiGCXtgRrs7V9tpWsbbNtyVrz69HaOloK0dp5naLeKClUgwTLmFuFMbcDGNAMGJ0ZnXMEwFLgrmOf0A109BNw9wb3hs4NnTvu3s3CQd1ZQd2zQMwGiQDNgHSoRaEacARkQDfIBEDnAvcCS4V7Vfcq0AggfZIkD/c0IYcAaAZROqeqUA105ifAQrAQLDrmCdlAs3oCA7qBZnVqCtVAs3oCLA2WBoumzIQ8oYzBD2BAN4gEaAYjiqJQDCgCMqAbMAOaQYa7zvyAEcUAWCr6aNYnSeOiMz+hGowoBmRAn1ADAaxz1V0wAZYUAcVAd8EEBtjdK8Od0Tmjc7a71wJLEXeKCuJOksZVK8yAxoBu0GWoRAptQgsJUAxiADAAnRMBYCG4k7rL3mm6BBO0j6RN0+QfUCKgG1TpzFFBLCxeXQU5K4ggy6J0FRygSzmhGqjgBJkWFsGudYolbXoPAAa0CTFozJNicMogDdJIPbqSrtEk3TBGBTQGNqmCituK9Mta+YNGa9RBmmCTdG8bwSPqTjGCb9QtkuOgBtJNYlRAmmBG7OQe7Crstuwq2VWKq2ii5aRUg1MF6b43aiDNtkHjEWeEeU665ydFcnKb1qM8ns1j/lhp3HcSO3WQ7lnNHKEG6smpGlFITm6LbotuS25L0CNy20jPQXowMGIn98juobkxIiJN2zxsY/SDdPQjDhrzN6i7TUc/iMdMlkEFFN2mWZyrUgpO7ARlJszfeGgZYZ555MEkv29xm68H+3qwrwdXv8fIbP74uNvh5PXt9bTf68Hr01FMDmgvD6f98XV3f3w7HO52/zwc3kan3y8Px9G+PpzkquT+/vhDWhH8+XTYK33cnb3DsmvMsZt3lEefC+RLhbisII9Z3F+wuULpFwppWaFlPTUMBSmIYUlhLQru0aOIbSkKXlGgwlDgyK4gW/tCIq9NZTGFFJILUKoXAmVZoFbGWtTai0ukdjkRdVmCtJIMBY6fBMKlQFsWkDKDmUzqtiTRVxIiIYrPi/knAr2aQIl5UxAyYwiCPq3Fn0jU6KtZV8KI9Hc1YinYXfLC1LZp1ErQqD1t0+jB60RPyxprW4zbudRwWdxicWVZSg1ITzlSnqdDjg2XGivpJScHn9IQ6+I4rq03TEv1JsXbC05Kt1acRLeXnMS31pyUby86qdxadVYVrio7q3FcWXdWNa4sGhT+rsa1hWdV48rCs6pxZeFZ3WtXVh7K11WeVGix8tDaA764xOfaVWlT3SmLdYfamoTHIafeujgKWqmgjfzQKG+5fenAxiuRcEP1434eBHG+fhDyA5wPIvDiINYOnqH5wVPq8aLE2nNR3gIxDH0PpC2n15BcIpTl0rMmEcl3q2T7NolyDqRtGwV5CRXcNoqcwnmr1m0S5bzbW98WyLnoyCvuNgn257u8326RqIwFqVy2CHRGeve8KYgesJ49bRuB51Sv+cYQ/i/wVb4+PD6dLv69+FCp09PD98Pevv58Oz5+uvr67wuu4N+Pl9Pz4/7H22mvSue/QOTji+aB/Cj/VX96kq+xxbvYin6NelV+XCSirx86mP8A",
392
+ "brillig_names": [
393
+ "set_authorized"
394
+ ]
395
+ },
6
396
  {
7
397
  "name": "set_authorized_private",
8
398
  "is_unconstrained": false,
@@ -1115,6 +1505,14 @@
1115
1505
  "kind": "field"
1116
1506
  }
1117
1507
  }
1508
+ },
1509
+ {
1510
+ "name": "length",
1511
+ "type": {
1512
+ "kind": "integer",
1513
+ "sign": "unsigned",
1514
+ "width": 32
1515
+ }
1118
1516
  }
1119
1517
  ]
1120
1518
  }
@@ -1146,12 +1544,29 @@
1146
1544
  "length": 1,
1147
1545
  "type": {
1148
1546
  "kind": "struct",
1149
- "path": "authwit::aztec::protocol_types::abis::log_hash::LogHash",
1547
+ "path": "authwit::aztec::protocol_types::abis::side_effect::counted::Counted",
1150
1548
  "fields": [
1151
1549
  {
1152
- "name": "value",
1550
+ "name": "inner",
1153
1551
  "type": {
1154
- "kind": "field"
1552
+ "kind": "struct",
1553
+ "path": "authwit::aztec::protocol_types::abis::log_hash::LogHash",
1554
+ "fields": [
1555
+ {
1556
+ "name": "value",
1557
+ "type": {
1558
+ "kind": "field"
1559
+ }
1560
+ },
1561
+ {
1562
+ "name": "length",
1563
+ "type": {
1564
+ "kind": "integer",
1565
+ "sign": "unsigned",
1566
+ "width": 32
1567
+ }
1568
+ }
1569
+ ]
1155
1570
  }
1156
1571
  },
1157
1572
  {
@@ -1161,14 +1576,6 @@
1161
1576
  "sign": "unsigned",
1162
1577
  "width": 32
1163
1578
  }
1164
- },
1165
- {
1166
- "name": "length",
1167
- "type": {
1168
- "kind": "integer",
1169
- "sign": "unsigned",
1170
- "width": 32
1171
- }
1172
1579
  }
1173
1580
  ]
1174
1581
  }
@@ -1407,156 +1814,22 @@
1407
1814
  "path": "authwit::aztec::protocol_types::address::eth_address::EthAddress",
1408
1815
  "fields": [
1409
1816
  {
1410
- "name": "inner",
1411
- "type": {
1412
- "kind": "field"
1413
- }
1414
- }
1415
- ]
1416
- }
1417
- },
1418
- {
1419
- "name": "fee_recipient",
1420
- "type": {
1421
- "kind": "struct",
1422
- "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress",
1423
- "fields": [
1424
- {
1425
- "name": "inner",
1426
- "type": {
1427
- "kind": "field"
1428
- }
1429
- }
1430
- ]
1431
- }
1432
- },
1433
- {
1434
- "name": "gas_fees",
1435
- "type": {
1436
- "kind": "struct",
1437
- "path": "authwit::aztec::protocol_types::abis::gas_fees::GasFees",
1438
- "fields": [
1439
- {
1440
- "name": "fee_per_da_gas",
1441
- "type": {
1442
- "kind": "field"
1443
- }
1444
- },
1445
- {
1446
- "name": "fee_per_l2_gas",
1447
- "type": {
1448
- "kind": "field"
1449
- }
1450
- }
1451
- ]
1452
- }
1453
- }
1454
- ]
1455
- }
1456
- },
1457
- {
1458
- "name": "total_fees",
1459
- "type": {
1460
- "kind": "field"
1461
- }
1462
- },
1463
- {
1464
- "name": "total_mana_used",
1465
- "type": {
1466
- "kind": "field"
1467
- }
1468
- }
1469
- ]
1470
- }
1471
- },
1472
- {
1473
- "name": "tx_context",
1474
- "type": {
1475
- "kind": "struct",
1476
- "path": "authwit::aztec::protocol_types::transaction::tx_context::TxContext",
1477
- "fields": [
1478
- {
1479
- "name": "chain_id",
1480
- "type": {
1481
- "kind": "field"
1482
- }
1483
- },
1484
- {
1485
- "name": "version",
1486
- "type": {
1487
- "kind": "field"
1488
- }
1489
- },
1490
- {
1491
- "name": "gas_settings",
1492
- "type": {
1493
- "kind": "struct",
1494
- "path": "authwit::aztec::protocol_types::abis::gas_settings::GasSettings",
1495
- "fields": [
1496
- {
1497
- "name": "gas_limits",
1498
- "type": {
1499
- "kind": "struct",
1500
- "path": "authwit::aztec::protocol_types::abis::gas::Gas",
1501
- "fields": [
1502
- {
1503
- "name": "da_gas",
1504
- "type": {
1505
- "kind": "integer",
1506
- "sign": "unsigned",
1507
- "width": 32
1508
- }
1509
- },
1510
- {
1511
- "name": "l2_gas",
1512
- "type": {
1513
- "kind": "integer",
1514
- "sign": "unsigned",
1515
- "width": 32
1516
- }
1517
- }
1518
- ]
1519
- }
1520
- },
1521
- {
1522
- "name": "teardown_gas_limits",
1523
- "type": {
1524
- "kind": "struct",
1525
- "path": "authwit::aztec::protocol_types::abis::gas::Gas",
1526
- "fields": [
1527
- {
1528
- "name": "da_gas",
1529
- "type": {
1530
- "kind": "integer",
1531
- "sign": "unsigned",
1532
- "width": 32
1533
- }
1534
- },
1535
- {
1536
- "name": "l2_gas",
1817
+ "name": "inner",
1537
1818
  "type": {
1538
- "kind": "integer",
1539
- "sign": "unsigned",
1540
- "width": 32
1819
+ "kind": "field"
1541
1820
  }
1542
1821
  }
1543
1822
  ]
1544
1823
  }
1545
1824
  },
1546
1825
  {
1547
- "name": "max_fees_per_gas",
1826
+ "name": "fee_recipient",
1548
1827
  "type": {
1549
1828
  "kind": "struct",
1550
- "path": "authwit::aztec::protocol_types::abis::gas_fees::GasFees",
1829
+ "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress",
1551
1830
  "fields": [
1552
1831
  {
1553
- "name": "fee_per_da_gas",
1554
- "type": {
1555
- "kind": "field"
1556
- }
1557
- },
1558
- {
1559
- "name": "fee_per_l2_gas",
1832
+ "name": "inner",
1560
1833
  "type": {
1561
1834
  "kind": "field"
1562
1835
  }
@@ -1565,7 +1838,7 @@
1565
1838
  }
1566
1839
  },
1567
1840
  {
1568
- "name": "max_priority_fees_per_gas",
1841
+ "name": "gas_fees",
1569
1842
  "type": {
1570
1843
  "kind": "struct",
1571
1844
  "path": "authwit::aztec::protocol_types::abis::gas_fees::GasFees",
@@ -1587,383 +1860,157 @@
1587
1860
  }
1588
1861
  ]
1589
1862
  }
1863
+ },
1864
+ {
1865
+ "name": "total_fees",
1866
+ "type": {
1867
+ "kind": "field"
1868
+ }
1869
+ },
1870
+ {
1871
+ "name": "total_mana_used",
1872
+ "type": {
1873
+ "kind": "field"
1874
+ }
1590
1875
  }
1591
1876
  ]
1592
1877
  }
1593
- }
1594
- ]
1595
- },
1596
- "visibility": "databus"
1597
- },
1598
- "error_types": {
1599
- "4939791462094160055": {
1600
- "error_kind": "string",
1601
- "string": "Message not authorized by account"
1602
- },
1603
- "5019202896831570965": {
1604
- "error_kind": "string",
1605
- "string": "attempt to add with overflow"
1606
- },
1607
- "14225679739041873922": {
1608
- "error_kind": "string",
1609
- "string": "Index out of bounds"
1610
- },
1611
- "17843811134343075018": {
1612
- "error_kind": "string",
1613
- "string": "Stack too deep"
1614
- }
1615
- }
1616
- },
1617
- "bytecode": "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",
1618
- "debug_symbols": "7Vvbbts4EP0XPfuBM5wb8yuLosjFLQwESZDLAosg/75kWlKyQ0klYidurJcglOdQnHOG4gwpPXdX64unn983Nz9uH7qzf56769vL88fN7U1sPXdAr9ce7s5vUvPh8fz+sTtDJl1165ur+K8Avqy6H5vrdXcGjl5Wb62RXLZG6a2VK8beBf5t7EFs2hg4QLaO/2NvjmY1e2HL5qJarL2r9u7FZ2sCt2X9bdUBL9SMUSMLNWPU6JFTw9hTIzJDDQJKHgkQv5MaW6gZoyZUqSGDnho/Qw0B0G9rAu5vER2Pd0B38DtA7Q5eJWQNDHtSE7zCklG+A/hgA3OsmQfpJ3oQw2lzwzJ8Q4YZfTVQ7ltDwBlrX2KHYBA5rho5aJkS9A5nrCFGcaFk+CyrWzssQeyEt6yTRrhodPQa+UWjP9NIoTyB1bs51lXLE1gDvlMjWjQ6eo14DxpFNsqy7dhmNCLrnwNkTHPmZFLM2elwQa1QaVxSnwA6nc0s+ncoi/4nrb8u+p+0/nb0+jNorz/LtP5e8y4F+V5QIH11Nhy/s9IHu8wFOwj2oSBkYafY9O7E/IUv5q8ONt1UjHf9xRPz13+qv+wGj5SquXL2Vm2wk+ZeB09HPvi4GubFkGQ4+GWVfe8q6/nYtQdX1z4N/uNLBHYk/eDVD83TiD4+aWUfoIyIaGZjAR1g2a93OPeYXGZI522R9KtJGhZJv5ik9PEFRZTReknVTZvH48nsLYdBClZPN41LZRkGuSnwL2fhyJ0VZznEBAbHL/WNkZSL57BJqftObk14Ut7WKwnzGeTjScKMtzF8SoYFNjhrSMi3fYvP3HgFmE6ZP/XlDKKFm1FueOFmlBtZuBnlRo+dm897rYds4WaUm7BwM8YNu31w02csEHyY4WbqcIFhD8MJ1EsVgkwPB0LMcUsCK8Dvy4kY/3YH/Mc7oOiKAzbYqKo6ELgsQDBYf9JM+BZbF/eb6+vNz+9b75679KeedrDPxS6r7IZjfTWehmg7xNohoRESW5As6698ic96meMB0I+/gTQN4XaItEO0HWLtkCrVhgVCtgupHxlOQ6Adgu0Q3w6hdgi3Q6rqm5W9ohC2ILUlt7yArf0eVFz8xve699e9Hbb7cNDu6/tR++seDts9HrZ7f9juaY/dm3/TPR+2ezls99VZG0r2G7zuPkfqS+k0JDRD6knzNATaIdgO8e0QaoYIt0OkHdKuvrSrL+3qa7v62q6+Yv0rmjxfUHR3vqhvh1A7pP6xopZDoPBmIqu0Q7QdYu2Q0Awx1w6BRkhs4WuyXgVK2S2Q4HYLg/pnN9MQ3w6hdgi3Q6QREls+WY58amyQ62Q0GUDTSVVs0VIkxuXglb8qkLQQj/SyXXfH5r/n95vzi+t1KrjTr083l7n+js3H/+7yL7lCv7u/vVxfPd2vU63el+kpGuPuGWH0ANJkY1ixlAL21yVbiU+/pwliurJQ5kyCx0rDhwwntyLuQyNdike/CEXy8RtyQSCsMF56ia7+Dw==",
1619
- "brillig_names": [
1620
- "store_in_execution_cache_oracle_wrapper",
1621
- "call_private_function_internal",
1622
- "load",
1623
- "notify_created_nullifier_oracle_wrapper",
1624
- "store_in_execution_cache_oracle_wrapper",
1625
- "notify_enqueued_public_function_call_wrapper"
1626
- ],
1627
- "verification_key": "AAAAAAAEAAAAAAAAAAAAEgAAAAAAAAAQAAAAAAAAVgkAAAAA//////////8AJ8TdMlWfOU2ViCHv8uyUZDcwcOkGqbx/YtzeHKJHf1ouMScmMX4zhaUAnJHLB6OUQpGRV+QgYa/mcymkFrqwxx2q85MF+Z6/Xgnw3b4PKECpeJThizYBTlE+ut7Nhl5LMDtNbQABTLQH13eb9YUWEW1AM5aQEBNbY/+5EZk0NRcDq+0q/jG9GP/f9/bxAiYemMZx58ceUj76oTLU4j8yRRd06Wlb4qcs1nhDmRgrR3PlysUHG1PwvB4bjla0Ie47B08yoAwaZQqwy3I5NcfAh+N5oU1Fu0S7J4ix8KbOTUUNrXRMTNGFhtJLHKgUitw3aD3dzU2J3IMPqb9d8cpCxBXlqXI+BbHYn7cQ0EX7ArFgLn5y5OuaS475tHjZyx1GAvSSkLhNf8B3mI1mDWoEK9XyLd7uqbJ9VBa4FB8J5hYGco1iASnbQLHY4m6/84J9tq5H1yTdcfAWMlmSQQw9jg3wboPiVqCEZZR4MdIMu+IWWC7DF/wTcPqwGp7NmS/fIuSmLVifXcWOAD4X0sKeZqqcjXq3WBuYEO2nPlPhfd8OP4PTyf+mJHwLpRXOLm9SrLCVbfb6d5ltuCSwof5icCmMMxH8kXD5LelAsEKquZDVPGo7JjOc2mtz35IIMUFZB7BfQIphKEclkBa5IErkvzdTfrGWsFwdmPpRAWqbrLsKmpY6cZIcYg58qBzrH0uNwI8/6L+oM7A9gJB4q8y79xreGXYq5OjlclVyGHzg35+f7ChMpLS2wvQKXjYculqjItSSS5jMY1+2OU9rwu1Sg3gmX9QciLRqDAvnJE6ZDBgMcltqlvfI9dIm/W8QUbmF9DcvtTo01DakchasgVI+ViHrSJuRmKhkLL92LlSOA5ve52T8+85x9jwkt2+sZv9oEf1BtfmTbZMquuTG6TPg05wk6o4uDu5wKlMm81nJR8AUoX18ClXS1F7o7fbsFlwRPSgrmEfVYv1BQCIOR+GCrxpw0tC/U/KBmNxua015bsn0E4YWuRKVxKct3D6sKlhhHfWKf0zqTShDD09yQw2Hv+h1T+PCDLbvfFKtQvU4pdsKfT4OAkUDvRsvO03KkY/tWgA/zcH2P9+RhmmEjVLm8hrP29pg7ocfjkGADu/NVWUEJXhtCA0EJ8P7KKhaz+T+GtHpKUm05AOzXknXhH9FCOqTq8znVFvLcjsiWjrjQUUXQ5XnFwgyaOuQKmSE+yyFU6P5GpWDf9H4LtOWgP1Q+CuJvzf+PS9En88+f3kB9pzTEvRQbttLpa1uIMum9vlLLgpCf7Ub5V3mOe2TpEPTdjwZzmfdPHh30oahyXUThTUrDeE6LGO/alY5WHeRlJwLOpBSyQEPTdFI0p3zd9CEax2N3NLsIh1GqB3KAN8vG6joPx/scCASi327GFqS5yJjATYzpsFmh/0i+xAvR5Hp6oojDxv2YIWktbi6TV7woyIkd3cshbsOiH0JVPBIR3eNLmvWvLO6l7FvI00iHPHiAioXOyMPaVoDuVkhik3/L8UF0zxCBNk1f/YKayzmpGMdCB0oJQMFRrdyn7/d94pk3SGlCbRI5KCc2qPc8VhTvZ0byy7wYI6tDzfnxjBXPMHDAnVFTZIH6GJAt4pxJa0d0xVK8dqYEPwihmKtniXBiy5YniB7tQrwEHm9NAEWGa3yJnZQSStBOo3cjAOOSww3vxqx+Urmh+yrJpIgSjhl3w8If5AqmcMTUmruYK+R7RyYhVjqZvejuxWon/TU7MgbwiBS5KGhmzPIBuUIE9TaKLr2gr43EYIq7pDMayTUD4BxKl7AC+jQDIR5YxwLtIZu1aHLI3kwHNuagzoFhmw53g4G7epYDHPl8NF29eI4jcD2Bga1pBCJSUZ82oMbNZNeoArcicSNdbVxY29bvrSoBvb0WWICMBtq5OsOu+rdIDNABm8oE1dI8RljHD/gf6nXAANOPidFTvmStL+EuXuqdHEuJXg1Ud9QwATsfNH03Ys7ZKZvKsSXm2XlZWjFoxsU7Rj3bPDO7MtHmN50GuibZOglj4RHfBtiVlpVm6e7OIMuLSmftoZ40BULzFsW3IJSNT1D+nDpkjnBwcZ+JxoO6sUV06xaGZq7dJM6TvyYxZsoFO3nzSfa7QDDPBKGC8SwRi041tS6Hkdjp07NsRyh80aWgMJw5VFRU0RZL1kYj6dlEts56JKCazJhDuCCUeAF/OkXwNXcoBlHfFL2B1MythIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACJ2fA5Wa7LlOBymgvADlTZwg7C8Ppm73VPNQmV4KkdpoJ+eV6//PhraWZmum2YDVateD+shv5yOZBnvdDZyX4uQDENyb3W2/aDeIs4ODfq2vMegX/lalrKJQkxfczZw2WL5tuC04sAZaN5cMkgqp9HQoJ1xeOyTuteFj5bmTwtI0dWKphxkrVIgQ9ecSAIhnlW6GXUa3+bDYyTT+2wtoJiS18GKk8Pa5YgJ+q7saoanj0s7xh8Z1ucGk1m79H5/kH"
1628
- },
1629
- {
1630
- "name": "set_reject_all",
1631
- "is_unconstrained": true,
1632
- "custom_attributes": [
1633
- "public"
1634
- ],
1635
- "abi": {
1636
- "parameters": [
1637
- {
1638
- "name": "reject",
1639
- "type": {
1640
- "kind": "boolean"
1641
- },
1642
- "visibility": "private"
1643
- }
1644
- ],
1645
- "return_type": null,
1646
- "error_types": {
1647
- "206160798890201757": {
1648
- "error_kind": "string",
1649
- "string": "Storage slot 0 not allowed. Storage slots must start from 1."
1650
- },
1651
- "5019202896831570965": {
1652
- "error_kind": "string",
1653
- "string": "attempt to add with overflow"
1654
- },
1655
- "14225679739041873922": {
1656
- "error_kind": "string",
1657
- "string": "Index out of bounds"
1658
- },
1659
- "17843811134343075018": {
1660
- "error_kind": "string",
1661
- "string": "Stack too deep"
1662
- }
1663
- }
1664
- },
1665
- "bytecode": "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",
1666
- "debug_symbols": "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",
1667
- "brillig_names": [
1668
- "set_reject_all"
1669
- ]
1670
- },
1671
- {
1672
- "name": "is_reject_all",
1673
- "is_unconstrained": true,
1674
- "custom_attributes": [
1675
- "public",
1676
- "view"
1677
- ],
1678
- "abi": {
1679
- "parameters": [
1680
- {
1681
- "name": "on_behalf_of",
1682
- "type": {
1683
- "kind": "struct",
1684
- "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress",
1685
- "fields": [
1686
- {
1687
- "name": "inner",
1688
- "type": {
1689
- "kind": "field"
1690
- }
1691
- }
1692
- ]
1693
- },
1694
- "visibility": "private"
1695
- }
1696
- ],
1697
- "return_type": {
1698
- "abi_type": {
1699
- "kind": "boolean"
1700
- },
1701
- "visibility": "public"
1702
- },
1703
- "error_types": {
1704
- "206160798890201757": {
1705
- "error_kind": "string",
1706
- "string": "Storage slot 0 not allowed. Storage slots must start from 1."
1707
- },
1708
- "5019202896831570965": {
1709
- "error_kind": "string",
1710
- "string": "attempt to add with overflow"
1711
- },
1712
- "9474245853673257536": {
1713
- "error_kind": "string",
1714
- "string": "Function is_reject_all can only be called statically"
1715
- },
1716
- "14225679739041873922": {
1717
- "error_kind": "string",
1718
- "string": "Index out of bounds"
1719
- },
1720
- "17843811134343075018": {
1721
- "error_kind": "string",
1722
- "string": "Stack too deep"
1723
- }
1724
- }
1725
- },
1726
- "bytecode": "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",
1727
- "debug_symbols": "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",
1728
- "brillig_names": [
1729
- "is_reject_all"
1730
- ]
1731
- },
1732
- {
1733
- "name": "utility_is_consumable",
1734
- "is_unconstrained": true,
1735
- "custom_attributes": [
1736
- "utility"
1737
- ],
1738
- "abi": {
1739
- "parameters": [
1740
- {
1741
- "name": "on_behalf_of",
1742
- "type": {
1743
- "kind": "struct",
1744
- "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress",
1745
- "fields": [
1746
- {
1747
- "name": "inner",
1748
- "type": {
1749
- "kind": "field"
1750
- }
1751
- }
1752
- ]
1753
- },
1754
- "visibility": "private"
1755
- },
1756
- {
1757
- "name": "message_hash",
1758
- "type": {
1759
- "kind": "field"
1760
- },
1761
- "visibility": "private"
1762
- }
1763
- ],
1764
- "return_type": {
1765
- "abi_type": {
1766
- "kind": "boolean"
1767
- },
1768
- "visibility": "public"
1769
- },
1770
- "error_types": {
1771
- "206160798890201757": {
1772
- "error_kind": "string",
1773
- "string": "Storage slot 0 not allowed. Storage slots must start from 1."
1774
- },
1775
- "5019202896831570965": {
1776
- "error_kind": "string",
1777
- "string": "attempt to add with overflow"
1778
- },
1779
- "14225679739041873922": {
1780
- "error_kind": "string",
1781
- "string": "Index out of bounds"
1782
- },
1783
- "17843811134343075018": {
1784
- "error_kind": "string",
1785
- "string": "Stack too deep"
1786
- }
1787
- }
1788
- },
1789
- "bytecode": "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",
1790
- "debug_symbols": "7Z3ZbttIEEX/Rc9+6KV6y68EgeEthgDBNrwMMDD870N6RFIOK2q7qjEDpe+LYUZ1xeJhk763pTRfN9c3ly+359u7n/dPm2/fXze7+6uL5+393bD1+na2uXzc7nbb2/PDf96Y8Ycz7/VPDxd34+bT88Xj8+abNWT92ebm7vr99+SG9/i53d28b72drepTjvvqPL6+r02WKQ0u7EtDMMvbUnz7cbZxtkU32aepm1COd0O+7Esp5lU3rkk3maZuSj7eTTQTm+jiqhvfopvi3L66+FDpJpt9aTLrM0VcNyFmO53dZJajHc8003qcO7fWL3uInqsO0xBzZjlI7wI3HAtNIFMpS7XLman2YUJCdqHuDFfrbJkO0DlTKtXBTaMrePOhdiQYQFBJMIKgkmACQSXBDIJKggUEdQS9AUElQQuCSoIOBJUEPQgqCRIIKgkik2gJIpN8gmCZJmiiDSuCyCRagsgkWoLIJEqChEyiJYhMoiWITKIliEyiJUggqCSITKIliEyiJYhMoiWITKIliEyiJBiQSX4lOFJBzuCoIDtwVJAHOCoEKgwV+HaOCrw4RwX+mqMCz8xRgQ9mqER4W44KvC1HpVNv6/L0wb3zB31MVDr1thUqBCoMlU69bYVKp962QqVTb1uh0qm3rVDp1Nsep5I69bYVKp162woVeFuOCrwtR4VAhaECb8tRgbflqMDbclTgbTkq8LYMlQxvy1GBt+WowNtyVDr1tsnObaRf/h/a16pHhgSGVYY2xmlBHBtTXjHs1Dc3Zdipy27KsFNP3pRhpw7+awxTmo8wlfXf5U79fkuGpdN00JRhp1miKcNOk0dThsgpeoYEhmqGyCl6hsgpeobIKXqGyCmfYFjMNH9oi1szRE5RM7SmQVCxOU+7cBQqEEMoU4APJRxUm8RUxzJ1nw7AjO/83rw95ebdKTfvT7l5qjbvwh9442i3WJ41AQi1CCMQahEmINQizECoRViAUInQGiDUIrRAqEXogFCL0AOhFiEBoRYh0olyxS1rkU7UCJFO1AiRTtQIkU60CB3SiRoh0okaIdKJGiHSiRohAaEWIdKJGiHSiRoh0okaIdIJs0iddUgcHBaPFMFiQTJgscDts1jg4FksBCwcFjhtFgvcM4sFjpjFApfLYoHL5bBQpy73+FInljp1uTUsnbrcGpZOXW4NCwELh6VTl1vD0qnLrWHp1OXWsHTqcmtYOnW5FSwBLpfFApfLYoHLZbHA5bJYCFg4LHC5LBa4XBYLXC6LBS6XxQKXy2GJnbrclgs029ipJ265qquNnTrothA79dttIRIg6iF26uVbriBnY6fOvy3ETnNCW4idpoq2EDvNIE0hJiSWBhCRWBpARGJpABGJpQFEAkQ9RCQW/VrDCYmlAcQGiUW68m7MjpZqduXdFKc+0kHwH/4c/tt8PuXmywk3n80pN193pESV5mOieUqqlA+7YC7ZIdNOl6zNS3Wy7BVL88coxqbjxcnOd5l4cKCRq6X545lgzYfadyiuTyh2XgfcpzUUDyhrKAQoaygBUNZQIqCsoSRAWUPJgLKGUv4cKGaBUipQvJutnvd2OUBPbCgzS9Q2Bz171kZmO/WcPVVq43xyoo8faseT84lHcuLk/G8n5793+GE+Oc7Qcd5DNpraOGRC+97dCffuT7Z3xz9AyRrn5hEcV4s2Of7JRVUVsSrr5+85WMprVRCpokiVRKrMq+JMYzDKKxX/rAHr59Wyhl/X++KX16+qvEhFIlUQqaJIlUSqLFKxvsQGN4+NQGml4pe9raqsSOVEKi9SkUgVRCp+bIQ4z/Ee3tlmVRKpskhVJCpvRCorUjmRyotUv7kDLHPy3q2vLx9FqiRSZZGqSFT8Yh5VlRWpnEjlRSoSqURjg0Rjg34zNmi2Wj6s7zaURaoiUQUjUlmRyolUXqQSOYcgcg5B5ByCyDnw3/5ONBm9RHGtYftbPigtgdlPEmiyQFO+ruG/HlbRWIHGCTSiXMJ/uaOqCiJVFKmSSJVFqiJR8R+NVlVWpBJl1iwaG1k0NrJobPBz5MfvLvwUcjHTbaw4RiO46vn5meP74edFKhoSaIJAI7grF8FduQjuyvwz2cs8nVDSaux4/hHkFY0VaGp3ZU7jv8zA83NFFU0QaKJAkwSaLNB8/Tr11gg0VqBxAs1Xx8HbsPnXxeP24nJ38zRIxldf7q6et/d3+83nvx+mVy4ft7vd9vb84fH+6ub65fHmfHd/Nb62Mfsf373zZ4Nz/TE+b3bYtCWcOWPGzZGAHxrxlIa9Dnv+Bw==",
1791
- "brillig_names": [
1792
- "utility_is_consumable"
1793
- ]
1794
- },
1795
- {
1796
- "name": "is_consumable",
1797
- "is_unconstrained": true,
1798
- "custom_attributes": [
1799
- "public",
1800
- "view"
1801
- ],
1802
- "abi": {
1803
- "parameters": [
1804
- {
1805
- "name": "on_behalf_of",
1806
- "type": {
1807
- "kind": "struct",
1808
- "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress",
1809
- "fields": [
1810
- {
1811
- "name": "inner",
1812
- "type": {
1813
- "kind": "field"
1814
- }
1878
+ },
1879
+ {
1880
+ "name": "tx_context",
1881
+ "type": {
1882
+ "kind": "struct",
1883
+ "path": "authwit::aztec::protocol_types::transaction::tx_context::TxContext",
1884
+ "fields": [
1885
+ {
1886
+ "name": "chain_id",
1887
+ "type": {
1888
+ "kind": "field"
1889
+ }
1890
+ },
1891
+ {
1892
+ "name": "version",
1893
+ "type": {
1894
+ "kind": "field"
1895
+ }
1896
+ },
1897
+ {
1898
+ "name": "gas_settings",
1899
+ "type": {
1900
+ "kind": "struct",
1901
+ "path": "authwit::aztec::protocol_types::abis::gas_settings::GasSettings",
1902
+ "fields": [
1903
+ {
1904
+ "name": "gas_limits",
1905
+ "type": {
1906
+ "kind": "struct",
1907
+ "path": "authwit::aztec::protocol_types::abis::gas::Gas",
1908
+ "fields": [
1909
+ {
1910
+ "name": "da_gas",
1911
+ "type": {
1912
+ "kind": "integer",
1913
+ "sign": "unsigned",
1914
+ "width": 32
1915
+ }
1916
+ },
1917
+ {
1918
+ "name": "l2_gas",
1919
+ "type": {
1920
+ "kind": "integer",
1921
+ "sign": "unsigned",
1922
+ "width": 32
1923
+ }
1924
+ }
1925
+ ]
1926
+ }
1927
+ },
1928
+ {
1929
+ "name": "teardown_gas_limits",
1930
+ "type": {
1931
+ "kind": "struct",
1932
+ "path": "authwit::aztec::protocol_types::abis::gas::Gas",
1933
+ "fields": [
1934
+ {
1935
+ "name": "da_gas",
1936
+ "type": {
1937
+ "kind": "integer",
1938
+ "sign": "unsigned",
1939
+ "width": 32
1940
+ }
1941
+ },
1942
+ {
1943
+ "name": "l2_gas",
1944
+ "type": {
1945
+ "kind": "integer",
1946
+ "sign": "unsigned",
1947
+ "width": 32
1948
+ }
1949
+ }
1950
+ ]
1951
+ }
1952
+ },
1953
+ {
1954
+ "name": "max_fees_per_gas",
1955
+ "type": {
1956
+ "kind": "struct",
1957
+ "path": "authwit::aztec::protocol_types::abis::gas_fees::GasFees",
1958
+ "fields": [
1959
+ {
1960
+ "name": "fee_per_da_gas",
1961
+ "type": {
1962
+ "kind": "field"
1963
+ }
1964
+ },
1965
+ {
1966
+ "name": "fee_per_l2_gas",
1967
+ "type": {
1968
+ "kind": "field"
1969
+ }
1970
+ }
1971
+ ]
1972
+ }
1973
+ },
1974
+ {
1975
+ "name": "max_priority_fees_per_gas",
1976
+ "type": {
1977
+ "kind": "struct",
1978
+ "path": "authwit::aztec::protocol_types::abis::gas_fees::GasFees",
1979
+ "fields": [
1980
+ {
1981
+ "name": "fee_per_da_gas",
1982
+ "type": {
1983
+ "kind": "field"
1984
+ }
1985
+ },
1986
+ {
1987
+ "name": "fee_per_l2_gas",
1988
+ "type": {
1989
+ "kind": "field"
1990
+ }
1991
+ }
1992
+ ]
1993
+ }
1994
+ }
1995
+ ]
1996
+ }
1997
+ }
1998
+ ]
1815
1999
  }
1816
- ]
1817
- },
1818
- "visibility": "private"
1819
- },
1820
- {
1821
- "name": "message_hash",
1822
- "type": {
1823
- "kind": "field"
1824
- },
1825
- "visibility": "private"
1826
- }
1827
- ],
1828
- "return_type": {
1829
- "abi_type": {
1830
- "kind": "boolean"
2000
+ }
2001
+ ]
1831
2002
  },
1832
- "visibility": "public"
2003
+ "visibility": "databus"
1833
2004
  },
1834
2005
  "error_types": {
1835
- "206160798890201757": {
1836
- "error_kind": "string",
1837
- "string": "Storage slot 0 not allowed. Storage slots must start from 1."
1838
- },
1839
- "5019202896831570965": {
1840
- "error_kind": "string",
1841
- "string": "attempt to add with overflow"
1842
- },
1843
- "5444967152290923376": {
1844
- "error_kind": "string",
1845
- "string": "Function is_consumable can only be called statically"
1846
- },
1847
- "14225679739041873922": {
1848
- "error_kind": "string",
1849
- "string": "Index out of bounds"
1850
- },
1851
- "17843811134343075018": {
1852
- "error_kind": "string",
1853
- "string": "Stack too deep"
1854
- }
1855
- }
1856
- },
1857
- "bytecode": "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",
1858
- "debug_symbols": "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",
1859
- "brillig_names": [
1860
- "is_consumable"
1861
- ]
1862
- },
1863
- {
1864
- "name": "set_authorized",
1865
- "is_unconstrained": true,
1866
- "custom_attributes": [
1867
- "public"
1868
- ],
1869
- "abi": {
1870
- "parameters": [
1871
- {
1872
- "name": "message_hash",
1873
- "type": {
1874
- "kind": "field"
1875
- },
1876
- "visibility": "private"
1877
- },
1878
- {
1879
- "name": "authorize",
1880
- "type": {
1881
- "kind": "boolean"
1882
- },
1883
- "visibility": "private"
1884
- }
1885
- ],
1886
- "return_type": null,
1887
- "error_types": {
1888
- "206160798890201757": {
1889
- "error_kind": "string",
1890
- "string": "Storage slot 0 not allowed. Storage slots must start from 1."
1891
- },
1892
- "5019202896831570965": {
1893
- "error_kind": "string",
1894
- "string": "attempt to add with overflow"
1895
- },
1896
- "14225679739041873922": {
1897
- "error_kind": "string",
1898
- "string": "Index out of bounds"
1899
- },
1900
- "17843811134343075018": {
1901
- "error_kind": "string",
1902
- "string": "Stack too deep"
1903
- }
1904
- }
1905
- },
1906
- "bytecode": "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",
1907
- "debug_symbols": "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",
1908
- "brillig_names": [
1909
- "set_authorized"
1910
- ]
1911
- },
1912
- {
1913
- "name": "public_dispatch",
1914
- "is_unconstrained": true,
1915
- "custom_attributes": [
1916
- "public"
1917
- ],
1918
- "abi": {
1919
- "parameters": [
1920
- {
1921
- "name": "selector",
1922
- "type": {
1923
- "kind": "field"
1924
- },
1925
- "visibility": "private"
1926
- }
1927
- ],
1928
- "return_type": null,
1929
- "error_types": {
1930
- "206160798890201757": {
1931
- "error_kind": "string",
1932
- "string": "Storage slot 0 not allowed. Storage slots must start from 1."
1933
- },
1934
- "715723737710351018": {
2006
+ "4939791462094160055": {
1935
2007
  "error_kind": "string",
1936
- "string": "rejecting all"
1937
- },
1938
- "2830029349304997821": {
1939
- "error_kind": "fmtstring",
1940
- "length": 27,
1941
- "item_types": [
1942
- {
1943
- "kind": "field"
1944
- }
1945
- ]
2008
+ "string": "Message not authorized by account"
1946
2009
  },
1947
2010
  "5019202896831570965": {
1948
2011
  "error_kind": "string",
1949
2012
  "string": "attempt to add with overflow"
1950
2013
  },
1951
- "5444967152290923376": {
1952
- "error_kind": "string",
1953
- "string": "Function is_consumable can only be called statically"
1954
- },
1955
- "6304245522015439386": {
1956
- "error_kind": "string",
1957
- "string": "Function _set_authorized can only be called internally"
1958
- },
1959
- "9474245853673257536": {
1960
- "error_kind": "string",
1961
- "string": "Function is_reject_all can only be called statically"
1962
- },
1963
- "12737498021964987455": {
1964
- "error_kind": "string",
1965
- "string": "unauthorized"
1966
- },
1967
2014
  "14225679739041873922": {
1968
2015
  "error_kind": "string",
1969
2016
  "string": "Index out of bounds"
@@ -1974,14 +2021,20 @@
1974
2021
  }
1975
2022
  }
1976
2023
  },
1977
- "bytecode": "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",
1978
- "debug_symbols": "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",
2024
+ "bytecode": "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",
2025
+ "debug_symbols": "rVrRbiMrDP2XPOcBG4xNf6VarbLd7CpSlFbZdqWr1f77hWEGprkXlw556WFmyokxtjHgP7vvx29vP7+eLj+ef+0eHv/svl1P5/Pp59fz89Ph9fR8iW//7Ez642j3gPud8xk4g2QIEf7ud5D+Ee3uwe136DJQBp+BM0iG2I32O2syQAbMYDO4DJQhsnAEziAZwgTOZIAMmMFmiCyyn4YgeQiShxDyEEIeQgQyGSADZrAZ3ASeMvgMmcVnFp9ZOLNwZuHIAiaindHNGIkAIvoZeUaZMWQUMyMkjGrGSc3pKeoecUY7o5uRZkzsaXJs6gXxq40PrndKaeqVJPkbnxaz+Pp6PR7Tl5WdROt5OVyPl9fdw+XtfN7vfh/Ob9M//Xo5XCZ8PVzj1zj04+V7xEj443Q+ptbffe1t2l0d49zZoyvdwVEvAVmYCYj9ioB7CVDMIgKKW8lA0kvhbZgZxNBKBttLIFgInGwiELcQhNAk8G0C62kmsFx1EN9uIBDbJFCGENDPBMHyFh2gWyRAz1skQOaFIGwagqdizMFssUVwYmcGcGGlBeO6B0GujMJPYeL/KcApHOgWl0b0lYPfawJIMQcTij2AlyaFYlFADItbxLatcqCE9yyssHiShcTzyi6Mf88hCgfKYpuAK//6FIf1dWrBtDl0jZCvGmHT1AiCMrtQPA1ToG1JgjiukV6OaCPbODq1quojmnixdm7rQw09AtXpbNPpUDFUB8XaHVAVw3cvQ5Z9KDEYq0Lp/Wqc1pq2PgNimZTg6swSviOxihwcljmRVQBClE+IEVfiKob4phiabQQPSwyKbcEmiVUWVgNS13ZqOpxVwimzW+aFOfg2hxZPy9LiVq6C5obBa2YuixRoDbY5tGAKxVUAhLZxxKWhTC1Km0Oxj1CW+kDbGMBUOzeetmnUS1km/SpjuOVwOK4NZ0e10cnAG3XBUBYVtqYthba8MZdgzqFtoY6HdcHjlqGOJNRZjQG1yfFBKA5FEGdWo7kJXwRqQlklcUKuSaLZqCOuJN6Y1tpEVttmUXGWANxKCMmNx2Ki8VhMfjQWE4/HYpLxWKzK0em13ox7rYdRr9UYer1WHUmn1+q+4m3NSP1qJ3vrKzoJmEqyysJuSLxmpbw4i7PQ3Ix+IAZVv+e233vNTL31Jc2PezHcRMJMUIyMWZpa7Y2FZFZKuYmFrJDUDRjLaldrugkEoRz1+CbBeCBlLSENvgZSaO+rmbRzt7I6kTOwOi7Bbjl6AzrzeEBnGQ3oHMYDupjxgK7K0RnQBccDugynpBpDb0BXR9IZ0FV/LZFY8Vc17JBx9dDGsN2Ux0V3KwGQnGvuZUUzjujr5WzQYDsZDGbcZwOM+2zAUZ8NdtxngxvfvgUlkgazTErAjSPp9PrA414fZNTrNYZer1dH0pvGqf7mnFR/W5203rgKGMVGKZSzZwqrA4KbpAWMFgfFFceXAM3rKVUQb8ISxWJmyW1BSDs2puK1sd3OwbQTSrGLodp4Otc6oQSjnkFxvSQBMSu1wmdYpOa2IOu09JYlaJdeFsu1GUDzlgPMXa45AO5wzwF3ONbXSXpvOuAOlwO6TriuvOw0nZh7XLqAdg/Ve+sCd7mI6iXRVXuP6yxVJ503Lx95cj0ng2BD05PRju6WPxAkuBpSwiqv+Y8gpN5a1EwvsGmG2cmehoP1B7IIlFmOA/JtFi0roHILA7iubuiv8Yi/vSxfZmVs0/Xal/h4eDpd31c4pbIYjJRAM/oZU01MlAdkxlQVE4VHMyOkhDIX4UyYap/CXPwUchFOsvxUhDMhzxj5POcKqHQLl0qgJkzVSyYXQU2Y6pcwl0HJXAclnAuhRHIlFBiTa6FyI8yNVA8VR5wromJ2lGuiciOVCqUb/VQXlRu0NPzSSMzp8CHVA+VGmBupRgrQ5SqpaY9AuDSmIqTkU78P19Ph2/mY1Jtm4O3ytGg7Pr7+87J8WSrOXq7PT8fvb9djmpladhYJH+Oq6fBL1H588xjzMPJpFqdis/xK9t6m7/HVY1SPhPQdl+7x2NyGpbsze0fpsy3dYzaMkF45/Qep9IhawPgqWdO/",
1979
2026
  "brillig_names": [
1980
- "public_dispatch"
1981
- ]
2027
+ "store_in_execution_cache_oracle_wrapper",
2028
+ "call_private_function_internal",
2029
+ "load",
2030
+ "notify_created_nullifier_oracle_wrapper",
2031
+ "store_in_execution_cache_oracle_wrapper",
2032
+ "notify_enqueued_public_function_call_wrapper"
2033
+ ],
2034
+ "verification_key": "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"
1982
2035
  },
1983
2036
  {
1984
- "name": "consume",
2037
+ "name": "set_reject_all",
1985
2038
  "is_unconstrained": true,
1986
2039
  "custom_attributes": [
1987
2040
  "public"
@@ -1989,52 +2042,23 @@
1989
2042
  "abi": {
1990
2043
  "parameters": [
1991
2044
  {
1992
- "name": "on_behalf_of",
1993
- "type": {
1994
- "kind": "struct",
1995
- "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress",
1996
- "fields": [
1997
- {
1998
- "name": "inner",
1999
- "type": {
2000
- "kind": "field"
2001
- }
2002
- }
2003
- ]
2004
- },
2005
- "visibility": "private"
2006
- },
2007
- {
2008
- "name": "inner_hash",
2045
+ "name": "reject",
2009
2046
  "type": {
2010
- "kind": "field"
2047
+ "kind": "boolean"
2011
2048
  },
2012
2049
  "visibility": "private"
2013
2050
  }
2014
2051
  ],
2015
- "return_type": {
2016
- "abi_type": {
2017
- "kind": "field"
2018
- },
2019
- "visibility": "public"
2020
- },
2052
+ "return_type": null,
2021
2053
  "error_types": {
2022
2054
  "206160798890201757": {
2023
2055
  "error_kind": "string",
2024
2056
  "string": "Storage slot 0 not allowed. Storage slots must start from 1."
2025
2057
  },
2026
- "715723737710351018": {
2027
- "error_kind": "string",
2028
- "string": "rejecting all"
2029
- },
2030
2058
  "5019202896831570965": {
2031
2059
  "error_kind": "string",
2032
2060
  "string": "attempt to add with overflow"
2033
2061
  },
2034
- "12737498021964987455": {
2035
- "error_kind": "string",
2036
- "string": "unauthorized"
2037
- },
2038
2062
  "14225679739041873922": {
2039
2063
  "error_kind": "string",
2040
2064
  "string": "Index out of bounds"
@@ -2045,23 +2069,44 @@
2045
2069
  }
2046
2070
  }
2047
2071
  },
2048
- "bytecode": "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",
2049
- "debug_symbols": "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",
2072
+ "bytecode": "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",
2073
+ "debug_symbols": "tZjdbuM4DIXfJde5EPVHqa8yKIq0TQcBgrTIJAssirz7khKPnCxgY8eLuak+0+IRKVGymu/N+/71+vPlcPr4/LV5+vG9eT0fjsfDz5fj59vucvg8ifV74/QPkTRhK23aPJET8A4QAdUgwBJgibDEYpA8gA0yAbIB6xAkUAmQOnjnALAQLDQs1cAHQDEIHsAGkQDZIIlg1TZaW3ubg7XcW/bW5t4W8yuptxp8a/tzcM5aHcgLEAFgaXPbIAKKQYu8ATpHdI7JIMGS4K6xN9DgO7ABY3SGO6NzQeeC0SssVd3jdhOduieFakBs4D1AQ80CgQAJUA1iALBBQucE9wxLhntWdxZgNijSxzuFbFBjh+Q8QDp7CT6RWsQrqaAvCiLoZXWSCjbQZWxQHSACZFqCCGattCA1k7XSOrCBptwhGUT00b3QQBNsoAkGr8AGHAHVQONpoPF0GBbtI5uUNcEGmmADragOCYDOIQDgpVsgyPywLkGHBKgGWkgd2IDRmeFeYClwL3CvcNdCClIkxQWDdtI0SAaeANlAT5gONocleoBNZkmwsPaRailtfmS5axurARu0iWqQeyVUHbSD1UYNDgBLhCXCkmBJsGTo5GGpBhwAbFDQuaBzW+WsoCmLhVyLtVPuUZNrU9Rp2DReI/WtjSooDpvWYdTz1qUwiEF5KGcGtarsVEFtjRvVMW6dbOhHmHsh6BFhjPZVCXy7bTf4Br1czvu9foLuPkryqfranfeny+bpdD0et5u/dsdr6/Tra3dq7WV3lreSwf70Lq0IfhyOe6XbdvJ2865UXTZvqj4OgfSoQPMKyRWML1iGQq4PCn5eoSQ9P5tCScHNKSxlUUocWbg0l0VcUAh5KESa5oFyfJBICxIJM+mdHwLB84NAnhdgjtUUmGseEr48TgTPS4TkTSHSnYB7FCjzAnKdIGShbnMSdaEgPLK4X8zfEahsApnSqiRkxpBEuFuL35FgGqvJC2lQ+LMack3E7qLMZZ0Gc4AGV79Oo7o6nRPzGktbLI5VoRTz7BajhWXJ7FCeLFfUScM97jJaKC/OQ+JuQonDqtMmhLnTxtPSXIw8KMoJMReFXzo2A2E+S/B19uBdWNU4Eol1CkKu2P89CF/8CMLF2SAWzs0iH1VIyDE8K7FwchJlhzCEY1jzDXF+SLg8f+4sSVAYm1WqfZ1EnhIp66II4/wUXBdF8m7aqrxOIk+7vdR1iUxnjvxruE4ijq0a0qpEOGJBOOY1AnJtNoGaViUh93cI+HURjJqqnP5nCv8WeJbH3dvh/PBryk2lzofd63Fvjx/X09vd28vfX3iDX2O+zp9v+/frea9K008y8ueHl39wfPLPesWWR7lcb+Umro+kb1OQt+n5psH8Aw==",
2050
2074
  "brillig_names": [
2051
- "consume"
2075
+ "set_reject_all"
2052
2076
  ]
2053
2077
  },
2054
2078
  {
2055
- "name": "_set_authorized",
2079
+ "name": "sync_notes",
2056
2080
  "is_unconstrained": true,
2057
2081
  "custom_attributes": [
2058
- "public",
2059
- "internal"
2082
+ "utility"
2083
+ ],
2084
+ "abi": {
2085
+ "parameters": [],
2086
+ "return_type": null,
2087
+ "error_types": {
2088
+ "17843811134343075018": {
2089
+ "error_kind": "string",
2090
+ "string": "Stack too deep"
2091
+ }
2092
+ }
2093
+ },
2094
+ "bytecode": "H4sIAAAAAAAA/7WTPQ+CMBCGi2KUjzjgoD+jBAyM+LG4OLpXCkpUSAB3frqQXENtwKjAJU17FJ5736OVUB0SzDLqEAyyglmBecTtj8vhQY67hakIdfvku9i2lQZ/Peq3FGBKw/Ax4w/UfzwFzr6o+bwXVndWDo1b66g+H0P5Z/9vSP+LD5418GpAXnmew/oS5Nt74t+Oz8c5SNnXTR1EgnIxdK5CSd0lcZ4SP99QmgZZJhJGDWTUQlU56pVE8YG26fmRdgrSLEpikSZ/Sav6yu6lXLyr8eA57hCOizHTMAb+BDV3X+b2+feXkKuCJ+bT+1Nn6BAztEhI1oRS2yeGwK+CP38vlizs4eEFAAA=",
2095
+ "debug_symbols": "nZPRioQgFIbf5Vx3oaWmvsowDFY2CGLh1MISvfvqoDu14DLMjSfzfF9/pRsMulvvN+PG6QHyskHnjbXmfrNTrxYzuXB3AxQH3IBsKsAEJA2FgmxDYSDFvleQ+2+L1zq2HwRBOyuv3QLSrdZW8KXs+mx6zMo966J8WEUVaDeEGoSjsTpe7dWLRmUUI0pYwjFiiP4qMCInCS5LWp4VPEBZ0OITX5d5WtPEU/p6B0zYuwF40+YAVJQCkDJPGpF4wvhHATjJAQQvBWBlPnz4xLOafRJA1HUSiIaWAvB/AvC8iVr05xdcw1T1xp/29h5V3qjO6jQdV9cfVpfvOa/kszH7qdfD6nU0HQ5IGC+YV3Vz3ePTfgA=",
2096
+ "brillig_names": [
2097
+ "sync_notes"
2098
+ ]
2099
+ },
2100
+ {
2101
+ "name": "utility_is_consumable",
2102
+ "is_unconstrained": true,
2103
+ "custom_attributes": [
2104
+ "utility"
2060
2105
  ],
2061
2106
  "abi": {
2062
2107
  "parameters": [
2063
2108
  {
2064
- "name": "approver",
2109
+ "name": "on_behalf_of",
2065
2110
  "type": {
2066
2111
  "kind": "struct",
2067
2112
  "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress",
@@ -2082,16 +2127,14 @@
2082
2127
  "kind": "field"
2083
2128
  },
2084
2129
  "visibility": "private"
2085
- },
2086
- {
2087
- "name": "authorize",
2088
- "type": {
2089
- "kind": "boolean"
2090
- },
2091
- "visibility": "private"
2092
2130
  }
2093
2131
  ],
2094
- "return_type": null,
2132
+ "return_type": {
2133
+ "abi_type": {
2134
+ "kind": "boolean"
2135
+ },
2136
+ "visibility": "public"
2137
+ },
2095
2138
  "error_types": {
2096
2139
  "206160798890201757": {
2097
2140
  "error_kind": "string",
@@ -2101,10 +2144,6 @@
2101
2144
  "error_kind": "string",
2102
2145
  "string": "attempt to add with overflow"
2103
2146
  },
2104
- "6304245522015439386": {
2105
- "error_kind": "string",
2106
- "string": "Function _set_authorized can only be called internally"
2107
- },
2108
2147
  "14225679739041873922": {
2109
2148
  "error_kind": "string",
2110
2149
  "string": "Index out of bounds"
@@ -2115,32 +2154,10 @@
2115
2154
  }
2116
2155
  }
2117
2156
  },
2118
- "bytecode": "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",
2119
- "debug_symbols": "7Z3bbiI5EIbfhWsufLZrXmW0inKaCAklEUlWWkV5923YdMOkC0yqrJUY/zcRBP+4+Lq6qlxNm/fF3f3N28PV6vHX08vix8/3xfrp9vp19fQ4PHv/WC5uNqv1evVwdfjvhdn+sc7tBC/P14/b5y+v15vXxQ9rifxycf94Nzx2xtrhTX6t1vfDMxM+lrPx0RTzOXx4WKbRiZjBJdr4ObhEbw4H/7UcLMqsRYMVeW+RzxWLAplxeCCbKhaFUEaLQgpfLfLnMPL0m0U7XZbpQpTpouF0Ido0kojBT6poGBLWpGkOa/eDbfLc6Di+szNuGutdZMZmCuNRz0T70W7rLrPRPrrR5oOD5ww31lmyoxnOUGV0dDR66oHvbcfuEEYg1CIkIFQiTAEItQjhhVqEGV6oRggv1CIsHgi1CDMQKhGSA0ItwgSEOoTDEhgItQixwDsDIY29k2TjDKHDiaxF6NGpUSPEiaxFGOCFaoTwQi1CdK31CAMQahEWIFQiTOjUqBGiU6NFmNGpUSPEAk+LsKBTo0aI0vorwh0WXFLisFAAFg4LyloGizcoElgsKD85LBbJnMWCBM1hcehnsViwqOCw4EoQjwWxhcMSOs1Ew6pnNMMf2DFh6TS2VLBEeAuLpdPYUsPSaWOhgqXXqxo1LJ0uFStYMkIuiwUhl8NSOi3+a1jgLSwWJGgOS6+d/xqWTjv/p7GEXjv/NSxYQXNYLBI0iwUhl8WCkMthcVhBs1jgLRwW32mCztMHdPnLfWvfG72D2Gk6/xZEm9K4aZFNucwghk6zXFOIEadzA4idNlubQkydtma/BzHn6RNmmmfnhMSih5g7XVW2hYjs3ABip2uQphALSpwGEJFY9BAJJU4DiPBENcRoUOI0gBgAsQ6RzNhPtOTmEC2ycwOIDWKiLeMe29aFWIEYI00bilM8GG0yMzrRaH0+ALN9563xzl6y8XTBxvt8wcaHeuCI6Q8MHO0224tnfC8fCE8jPOM7/EBYQQgv1CJM8EI1QnihFuEZfXMgrCAMQKhFSECoRHjGnv5AWEFYgFCJkLDAU+7RFQlFjRJhMiit1QjhhVqEFl6oRggv1CJ0WOCpEQYg1CLEAk+L0GOBp0aIBZ4WIa7g6RFmIFQixBU8biu7dMYuXD1iSSiBWSwBWDgsKBI4LBnlJ4sFyZzDUpCgWSzoZ3FYcNWIxwJvYbBkXN3hsXSaiU7vfZJtp7GlhqXT2FLB0uvVkhqWACwclk6XihUsHiGXxYKQy2EJnZZzNSzwFg5LRIJmsXTa+a9h6fRrBxUsqdNebg0LVtAclowEzWJByGWxIORyWEoAFg4LvIXDQp0m6JYbNmfqNJ233OG1mE6zXFOIFqdzA4idNlubQnSdtmZb7iFXHBKLHqLvdFXZFiKycwOIna5BmkIMKHEaQERi0UOMKHEaQIQn6iH2usNbW4gocdR7DZdeb95oC7FBTJTuvJuKC/vR7M67OY1fD84HC3+b3c744i7YeDKXbHy5XOPJ1ANHrhkfzDiDDS7/NsV89NAXGE/C4t3+W+6JmMGhhNEM2r+xD/4/28v/bbsrbrLdhNO2F1PGqDf0h9PpwdYm46bomw42+B6Gbz8rf9XVGjepTJrdRk38noFVFRsHh5wwdR5tmHUeiaJAZQ3vgHVZEcn4mwUG4nv4Jc5l/NYc1k/3sA8Pmdn4rdyrMv4Lk3VZlMlIJIuyz5acSMbvYluX8Uiim7wkhjyX8Tc31mVFJOOvBddlJJENx1smk81mj3y2NBVisdBc5qxMlkQyH2QyEsmCDAnfOqrKooxkOnK+7Qto7wojizIZiWTZy2RZJDsSFKoyGRKSHQASziY6AM54mUx0AJw9cgBCmGQxM7IskvF3RNVlJJL5KJIFI5MVkSyKcrfjf0qiKktGJpPNxt+hnsNYF+aQZiLPZ7d9t4NiYURZIOITYk0UJSISiLwEBL9ZW0XEb09WWdEMsiySHcmeVVkSyZJstiSbLctmy7LZimy2IjtuJJvtSPasyiRr86HzEL4fcgK/7iUzRjdyjEgSpwJfFVdm8hLz+HO6JkoCEX9zWQVEFITRkCQz8Rt20dScoMy4EV88V0RZMlOuBWxOVCS+VwRJ6Mhv0J4WRWMlIkEKP/KbmjWRZCZJsRAlxUKUFAvx28XCx/D07+vN6vpmff8ySLavvj3evq6eHj+fvv7zPL5ys1mt16uHq+fN0+393dvm/mr9dLt9bWE+//wcSrDlUH1sjdk+tSUtLdndQmj7qqelD3aYdZj5Xw==",
2120
- "brillig_names": [
2121
- "_set_authorized"
2122
- ]
2123
- },
2124
- {
2125
- "name": "sync_notes",
2126
- "is_unconstrained": true,
2127
- "custom_attributes": [
2128
- "aztec::macros::functions::utility"
2129
- ],
2130
- "abi": {
2131
- "parameters": [],
2132
- "return_type": null,
2133
- "error_types": {
2134
- "17843811134343075018": {
2135
- "error_kind": "string",
2136
- "string": "Stack too deep"
2137
- }
2138
- }
2139
- },
2140
- "bytecode": "H4sIAAAAAAAA/7WTPQ+CMBCGi2KUjzjgoD+jBAyM+LG4OLpXCkpUSAB3frqQXENtwKjAJU17FJ5736OVUB0SzDLqEAyyglmBecTtj8vhQY67hakIdfvku9i2lQZ/Peq3FGBKw/Ax4w/UfzwFzr6o+bwXVndWDo1b66g+H0P5Z/9vSP+LD5418GpAXnmew/oS5Nt74t+Oz8c5SNnXTR1EgnIxdK5CSd0lcZ4SP99QmgZZJhJGDWTUQlU56pVE8YG26fmRdgrSLEpikSZ/Sav6yu6lXLyr8eA57hCOizHTMAb+BDV3X+b2+feXkKuCJ+bT+1Nn6BAztEhI1oRS2yeGwK+CP38vlizs4eEFAAA=",
2141
- "debug_symbols": "rZLdCoMgGIbvxWMP/P/ZrYwxrGwIYmE1GNG9z8JYrNFOOhE/fXh50HcElS2Gx92FuunA5ToC35Smd01I0zhBUETnvXvct8cAzQumC9+1Jsxj15vYgwtGDFMIbKiWvSQpo3beLtMEd7xUItNqvs+sxD9QTnhGOUefWCamGwSYnWGjqFxtuD62YVRnlAm1s+Gn2Ci22mh1bCPQ+jaCiJ2NOMNGE5JpTfkfG4UyKtHXT01pfJroTOFtrlg9hHLTuP7V2q/ytbEpbTVEO9dw08C0XrGChKbYFP0G",
2157
+ "bytecode": "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",
2158
+ "debug_symbols": "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",
2142
2159
  "brillig_names": [
2143
- "sync_notes"
2160
+ "utility_is_consumable"
2144
2161
  ]
2145
2162
  }
2146
2163
  ],
@@ -2210,46 +2227,40 @@
2210
2227
  "type": {
2211
2228
  "fields": [
2212
2229
  {
2213
- "name": "message_hash",
2230
+ "name": "approver",
2214
2231
  "type": {
2215
- "kind": "field"
2232
+ "fields": [
2233
+ {
2234
+ "name": "inner",
2235
+ "type": {
2236
+ "kind": "field"
2237
+ }
2238
+ }
2239
+ ],
2240
+ "kind": "struct",
2241
+ "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
2216
2242
  }
2217
2243
  },
2218
2244
  {
2219
- "name": "authorize",
2245
+ "name": "message_hash",
2220
2246
  "type": {
2221
- "kind": "boolean"
2247
+ "kind": "field"
2222
2248
  }
2223
- }
2224
- ],
2225
- "kind": "struct",
2226
- "path": "AuthRegistry::set_authorized_parameters"
2227
- }
2228
- }
2229
- ],
2230
- "kind": "struct",
2231
- "path": "AuthRegistry::set_authorized_abi"
2232
- },
2233
- {
2234
- "fields": [
2235
- {
2236
- "name": "parameters",
2237
- "type": {
2238
- "fields": [
2249
+ },
2239
2250
  {
2240
- "name": "reject",
2251
+ "name": "authorize",
2241
2252
  "type": {
2242
2253
  "kind": "boolean"
2243
2254
  }
2244
2255
  }
2245
2256
  ],
2246
2257
  "kind": "struct",
2247
- "path": "AuthRegistry::set_reject_all_parameters"
2258
+ "path": "AuthRegistry::_set_authorized_parameters"
2248
2259
  }
2249
2260
  }
2250
2261
  ],
2251
2262
  "kind": "struct",
2252
- "path": "AuthRegistry::set_reject_all_abi"
2263
+ "path": "AuthRegistry::_set_authorized_abi"
2253
2264
  },
2254
2265
  {
2255
2266
  "fields": [
@@ -2271,21 +2282,27 @@
2271
2282
  "kind": "struct",
2272
2283
  "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
2273
2284
  }
2285
+ },
2286
+ {
2287
+ "name": "inner_hash",
2288
+ "type": {
2289
+ "kind": "field"
2290
+ }
2274
2291
  }
2275
2292
  ],
2276
2293
  "kind": "struct",
2277
- "path": "AuthRegistry::is_reject_all_parameters"
2294
+ "path": "AuthRegistry::consume_parameters"
2278
2295
  }
2279
2296
  },
2280
2297
  {
2281
2298
  "name": "return_type",
2282
2299
  "type": {
2283
- "kind": "boolean"
2300
+ "kind": "field"
2284
2301
  }
2285
2302
  }
2286
2303
  ],
2287
2304
  "kind": "struct",
2288
- "path": "AuthRegistry::is_reject_all_abi"
2305
+ "path": "AuthRegistry::consume_abi"
2289
2306
  },
2290
2307
  {
2291
2308
  "fields": [
@@ -2349,27 +2366,48 @@
2349
2366
  "kind": "struct",
2350
2367
  "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
2351
2368
  }
2352
- },
2353
- {
2354
- "name": "inner_hash",
2355
- "type": {
2356
- "kind": "field"
2357
- }
2358
2369
  }
2359
2370
  ],
2360
2371
  "kind": "struct",
2361
- "path": "AuthRegistry::consume_parameters"
2372
+ "path": "AuthRegistry::is_reject_all_parameters"
2362
2373
  }
2363
2374
  },
2364
2375
  {
2365
2376
  "name": "return_type",
2366
2377
  "type": {
2367
- "kind": "field"
2378
+ "kind": "boolean"
2368
2379
  }
2369
2380
  }
2370
2381
  ],
2371
2382
  "kind": "struct",
2372
- "path": "AuthRegistry::consume_abi"
2383
+ "path": "AuthRegistry::is_reject_all_abi"
2384
+ },
2385
+ {
2386
+ "fields": [
2387
+ {
2388
+ "name": "parameters",
2389
+ "type": {
2390
+ "fields": [
2391
+ {
2392
+ "name": "message_hash",
2393
+ "type": {
2394
+ "kind": "field"
2395
+ }
2396
+ },
2397
+ {
2398
+ "name": "authorize",
2399
+ "type": {
2400
+ "kind": "boolean"
2401
+ }
2402
+ }
2403
+ ],
2404
+ "kind": "struct",
2405
+ "path": "AuthRegistry::set_authorized_parameters"
2406
+ }
2407
+ }
2408
+ ],
2409
+ "kind": "struct",
2410
+ "path": "AuthRegistry::set_authorized_abi"
2373
2411
  },
2374
2412
  {
2375
2413
  "fields": [
@@ -2406,12 +2444,12 @@
2406
2444
  }
2407
2445
  ],
2408
2446
  "kind": "struct",
2409
- "path": "AuthRegistry::_set_authorized_parameters"
2447
+ "path": "AuthRegistry::set_authorized_private_parameters"
2410
2448
  }
2411
2449
  }
2412
2450
  ],
2413
2451
  "kind": "struct",
2414
- "path": "AuthRegistry::_set_authorized_abi"
2452
+ "path": "AuthRegistry::set_authorized_private_abi"
2415
2453
  },
2416
2454
  {
2417
2455
  "fields": [
@@ -2420,7 +2458,42 @@
2420
2458
  "type": {
2421
2459
  "fields": [
2422
2460
  {
2423
- "name": "approver",
2461
+ "name": "reject",
2462
+ "type": {
2463
+ "kind": "boolean"
2464
+ }
2465
+ }
2466
+ ],
2467
+ "kind": "struct",
2468
+ "path": "AuthRegistry::set_reject_all_parameters"
2469
+ }
2470
+ }
2471
+ ],
2472
+ "kind": "struct",
2473
+ "path": "AuthRegistry::set_reject_all_abi"
2474
+ },
2475
+ {
2476
+ "fields": [
2477
+ {
2478
+ "name": "parameters",
2479
+ "type": {
2480
+ "fields": [],
2481
+ "kind": "struct",
2482
+ "path": "AuthRegistry::sync_notes_parameters"
2483
+ }
2484
+ }
2485
+ ],
2486
+ "kind": "struct",
2487
+ "path": "AuthRegistry::sync_notes_abi"
2488
+ },
2489
+ {
2490
+ "fields": [
2491
+ {
2492
+ "name": "parameters",
2493
+ "type": {
2494
+ "fields": [
2495
+ {
2496
+ "name": "on_behalf_of",
2424
2497
  "type": {
2425
2498
  "fields": [
2426
2499
  {
@@ -2439,21 +2512,21 @@
2439
2512
  "type": {
2440
2513
  "kind": "field"
2441
2514
  }
2442
- },
2443
- {
2444
- "name": "authorize",
2445
- "type": {
2446
- "kind": "boolean"
2447
- }
2448
2515
  }
2449
2516
  ],
2450
2517
  "kind": "struct",
2451
- "path": "AuthRegistry::set_authorized_private_parameters"
2518
+ "path": "AuthRegistry::utility_is_consumable_parameters"
2519
+ }
2520
+ },
2521
+ {
2522
+ "name": "return_type",
2523
+ "type": {
2524
+ "kind": "boolean"
2452
2525
  }
2453
2526
  }
2454
2527
  ],
2455
2528
  "kind": "struct",
2456
- "path": "AuthRegistry::set_authorized_private_abi"
2529
+ "path": "AuthRegistry::utility_is_consumable_abi"
2457
2530
  }
2458
2531
  ]
2459
2532
  }
@@ -2461,11 +2534,11 @@
2461
2534
  "file_map": {
2462
2535
  "104": {
2463
2536
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/macros/functions/utils.nr",
2464
- "source": "use crate::macros::{\n functions::{abi_export::create_fn_abi_export, call_interface_stubs::stub_fn, stub_registry},\n notes::NOTES,\n utils::{\n add_to_hasher, fn_has_noinitcheck, get_fn_visibility, is_fn_contract_library_method,\n is_fn_initializer, is_fn_internal, is_fn_private, is_fn_public, is_fn_test, is_fn_utility,\n is_fn_view, modify_fn_body, module_has_initializer, module_has_storage,\n },\n};\nuse protocol_types::meta::generate_serialize_to_fields;\nuse std::meta::type_of;\n\npub(crate) comptime fn transform_private(f: FunctionDefinition) -> Quoted {\n let fn_abi = create_fn_abi_export(f);\n let fn_stub = stub_fn(f);\n stub_registry::register(f.module(), fn_stub);\n\n // If a function is further modified as unconstrained, we throw an error\n if f.is_unconstrained() {\n let name = f.name();\n panic(\n f\"Function {name} is annotated with #[private] but marked as unconstrained, remove unconstrained keyword\",\n );\n }\n\n let module_has_initializer = module_has_initializer(f.module());\n let module_has_storage = module_has_storage(f.module());\n\n // Private functions undergo a lot of transformations from their Aztec.nr form into a circuit that can be fed to the\n // Private Kernel Circuit.\n // First we change the function signature so that it also receives `PrivateContextInputs`, which contain information\n // about the execution context (e.g. the caller).\n let original_params = f.parameters();\n f.set_parameters(&[(\n quote { inputs },\n quote { crate::context::inputs::private_context_inputs::PrivateContextInputs }.as_type(),\n )]\n .append(original_params));\n\n let mut body = f.body().as_block().unwrap();\n\n // The original params are hashed and passed to the `context` object, so that the kernel can verify we've received\n // the correct values.\n // TODO: Optimize args_hasher for small number of arguments\n let args_hasher_name = quote { args_hasher };\n let args_hasher = original_params.fold(\n quote {\n let mut $args_hasher_name = dep::aztec::hash::ArgsHasher::new();\n },\n |args_hasher, param: (Quoted, Type)| {\n let (name, typ) = param;\n let appended_arg = add_to_hasher(args_hasher_name, name, typ);\n quote {\n $args_hasher\n $appended_arg\n }\n },\n );\n\n let context_creation = quote {\n let mut context = dep::aztec::context::private_context::PrivateContext::new(inputs, dep::aztec::protocol_types::traits::Hash::hash($args_hasher_name));\n };\n\n // Modifications introduced by the different marker attributes.\n let internal_check = if is_fn_internal(f) {\n create_internal_check(f)\n } else {\n quote {}\n };\n\n let view_check = if is_fn_view(f) {\n create_view_check(f)\n } else {\n quote {}\n };\n\n let (assert_initializer, mark_as_initialized) = if is_fn_initializer(f) {\n (create_assert_correct_initializer_args(f), create_mark_as_initialized(f))\n } else {\n (quote {}, quote {})\n };\n\n let storage_init = if module_has_storage {\n quote {\n // Some functions don't access storage, but it'd be quite difficult to only inject this variable if it is\n // referenced. We instead ignore 'unused variable' warnings for it.\n #[allow(unused_variables)]\n let storage = Storage::init(&mut context);\n }\n } else {\n quote {}\n };\n\n // Initialization checks are not included in contracts that don't have initializers.\n let init_check = if module_has_initializer & !is_fn_initializer(f) & !fn_has_noinitcheck(f) {\n create_init_check(f)\n } else {\n quote {}\n };\n\n // All private functions perform message discovery, since they may need to access notes. This is slightly\n // inefficient and could be improved by only doing it once we actually attempt to read any.\n let message_discovery_call = if NOTES.len() > 0 {\n create_message_discovery_call()\n } else {\n quote {}\n };\n\n // Finally, we need to change the return type to be `PrivateCircuitPublicInputs`, which is what the Private Kernel\n // circuit expects.\n let return_value_var_name = quote { macro__returned__values };\n\n let return_value_type = f.return_type();\n let return_value = if body.len() == 0 {\n quote {}\n } else if return_value_type != type_of(()) {\n // The original return value is passed to a second args hasher which the context receives.\n let (body_without_return, last_body_expr) = body.pop_back();\n let return_value = last_body_expr.quoted();\n let return_value_assignment =\n quote { let $return_value_var_name: $return_value_type = $return_value; };\n let return_hasher_name = quote { return_hasher };\n let return_value_into_hasher =\n add_to_hasher(return_hasher_name, return_value_var_name, return_value_type);\n\n body = body_without_return;\n\n quote {\n let mut $return_hasher_name = dep::aztec::hash::ArgsHasher::new();\n $return_value_assignment\n $return_value_into_hasher\n context.set_return_hash($return_hasher_name);\n }\n } else {\n let (body_without_return, last_body_expr) = body.pop_back();\n if !last_body_expr.has_semicolon()\n & last_body_expr.as_for().is_none()\n & last_body_expr.as_assert().is_none()\n & last_body_expr.as_for_range().is_none()\n & last_body_expr.as_assert_eq().is_none()\n & last_body_expr.as_let().is_none() {\n let unused_return_value_name = f\"_{return_value_var_name}\".quoted_contents();\n body = body_without_return.push_back(\n quote { let $unused_return_value_name = $last_body_expr; }.as_expr().unwrap(),\n );\n }\n quote {}\n };\n\n let context_finish = quote { context.finish() };\n\n let to_prepend = quote {\n $args_hasher\n $context_creation\n $assert_initializer\n $init_check\n $internal_check\n $view_check\n $storage_init\n $message_discovery_call\n };\n\n let to_append = quote {\n $return_value\n $mark_as_initialized\n $context_finish\n };\n let modified_body = modify_fn_body(body, to_prepend, to_append);\n f.set_body(modified_body);\n f.set_return_type(\n quote { dep::protocol_types::abis::private_circuit_public_inputs::PrivateCircuitPublicInputs }\n .as_type(),\n );\n f.set_return_data();\n\n fn_abi\n}\n\npub(crate) comptime fn transform_public(f: FunctionDefinition) -> Quoted {\n let fn_abi = create_fn_abi_export(f);\n let fn_stub = stub_fn(f);\n stub_registry::register(f.module(), fn_stub);\n\n // If a function is further modified as unconstrained, we throw an error\n if f.is_unconstrained() {\n let name = f.name();\n panic(\n f\"Function {name} is annotated with #[public] but marked as unconstrained, remove unconstrained keyword\",\n );\n }\n\n let module_has_initializer = module_has_initializer(f.module());\n let module_has_storage = module_has_storage(f.module());\n\n // Public functions undergo a lot of transformations from their Aztec.nr form.\n let original_params = f.parameters();\n let args_len = original_params\n .map(|(name, typ): (Quoted, Type)| {\n generate_serialize_to_fields(name, typ, false).0.len()\n })\n .fold(0, |acc: u32, val: u32| acc + val);\n\n // Unlike in the private case, in public the `context` does not need to receive the hash of the original params.\n let context_creation = quote {\n let mut context = dep::aztec::context::public_context::PublicContext::new(|| {\n // We start from 1 because we skip the selector for the dispatch function.\n let serialized_args : [Field; $args_len] = dep::aztec::context::public_context::calldata_copy(1, $args_len);\n dep::aztec::hash::hash_args_array(serialized_args)\n });\n };\n\n // Modifications introduced by the different marker attributes.\n let internal_check = if is_fn_internal(f) {\n create_internal_check(f)\n } else {\n quote {}\n };\n\n let view_check = if is_fn_view(f) {\n create_view_check(f)\n } else {\n quote {}\n };\n\n let (assert_initializer, mark_as_initialized) = if is_fn_initializer(f) {\n (create_assert_correct_initializer_args(f), create_mark_as_initialized(f))\n } else {\n (quote {}, quote {})\n };\n\n let storage_init = if module_has_storage {\n // Some functions don't access storage, but it'd be quite difficult to only inject this variable if it is\n // referenced. We instead ignore 'unused variable' warnings for it.\n quote {\n #[allow(unused_variables)]\n let storage = Storage::init(&mut context);\n }\n } else {\n quote {}\n };\n\n // Initialization checks are not included in contracts that don't have initializers.\n let init_check = if module_has_initializer & !fn_has_noinitcheck(f) & !is_fn_initializer(f) {\n create_init_check(f)\n } else {\n quote {}\n };\n\n let to_prepend = quote {\n $context_creation\n $assert_initializer\n $init_check\n $internal_check\n $view_check\n $storage_init\n };\n\n let to_append = quote {\n $mark_as_initialized\n };\n\n let body = f.body().as_block().unwrap();\n let modified_body = modify_fn_body(body, to_prepend, to_append);\n f.set_body(modified_body);\n\n // All public functions are automatically made unconstrained, even if they were not marked as such. This is because\n // instead of compiling into a circuit, they will compile to bytecode that will be later transpiled into AVM\n // bytecode.\n f.set_unconstrained(true);\n f.set_return_public(true);\n\n fn_abi\n}\n\npub(crate) comptime fn transform_utility(f: FunctionDefinition) {\n // Check if function is marked as unconstrained\n if !f.is_unconstrained() {\n let name = f.name();\n panic(\n f\"Function {name} is annotated with #[utility] but not marked as unconstrained, add unconstrained keyword\",\n );\n }\n\n // Create utility context\n let context_creation =\n quote { let mut context = dep::aztec::context::utility_context::UtilityContext::new(); };\n let module_has_storage = module_has_storage(f.module());\n\n // Initialize Storage if module has storage\n let storage_init = if module_has_storage {\n quote {\n // Some functions don't access storage, but it'd be quite difficult to only inject this variable if it is\n // referenced. We instead ignore 'unused variable' warnings for it.\n #[allow(unused_variables)]\n let storage = Storage::init(context);\n }\n } else {\n quote {}\n };\n\n // All utility functions perform message discovery, since they may need to access private notes that would be\n // found during this process. This is slightly inefficient and could be improved by only doing it once we actually\n // attempt to read any.\n let message_discovery_call = if NOTES.len() > 0 {\n create_message_discovery_call()\n } else {\n quote {}\n };\n\n // Inject context creation, storage initialization, and message discovery call at the beginning of the function\n // body.\n let to_prepend = quote {\n $context_creation\n $storage_init\n $message_discovery_call\n };\n let body = f.body().as_block().unwrap();\n let modified_body = modify_fn_body(body, to_prepend, quote {});\n f.set_body(modified_body);\n\n f.set_return_public(true);\n}\n\ncomptime fn create_internal_check(f: FunctionDefinition) -> Quoted {\n let name = f.name();\n let assertion_message = f\"Function {name} can only be called internally\";\n quote { assert(context.msg_sender() == context.this_address(), $assertion_message); }\n}\n\ncomptime fn create_view_check(f: FunctionDefinition) -> Quoted {\n let name = f.name();\n let assertion_message = f\"Function {name} can only be called statically\";\n if is_fn_private(f) {\n // Here `context` is of type context::PrivateContext\n quote { assert(context.inputs.call_context.is_static_call == true, $assertion_message); }\n } else {\n // Here `context` is of type context::PublicContext\n quote { assert(context.is_static_call(), $assertion_message); }\n }\n}\n\ncomptime fn create_assert_correct_initializer_args(f: FunctionDefinition) -> Quoted {\n let fn_visibility = get_fn_visibility(f);\n f\"dep::aztec::macros::functions::initialization_utils::assert_initialization_matches_address_preimage_{fn_visibility}(context);\"\n .quoted_contents()\n}\n\ncomptime fn create_mark_as_initialized(f: FunctionDefinition) -> Quoted {\n let fn_visibility = get_fn_visibility(f);\n f\"dep::aztec::macros::functions::initialization_utils::mark_as_initialized_{fn_visibility}(&mut context);\"\n .quoted_contents()\n}\n\ncomptime fn create_init_check(f: FunctionDefinition) -> Quoted {\n let fn_visibility = get_fn_visibility(f);\n f\"dep::aztec::macros::functions::initialization_utils::assert_is_initialized_{fn_visibility}(&mut context);\"\n .quoted_contents()\n}\n\n/// Injects a call to `aztec::messages::discovery::discover_new_messages`, causing for new notes to be added to PXE and made\n/// available for the current execution.\npub(crate) comptime fn create_message_discovery_call() -> Quoted {\n quote {\n /// Safety: message discovery returns nothing and is performed solely for its side-effects. It is therefore\n /// always safe to call.\n unsafe {\n dep::aztec::messages::discovery::discover_new_messages(\n context.this_address(),\n _compute_note_hash_and_nullifier,\n );\n };\n }\n}\n\n/// Checks if each function in the module is marked with either #[private], #[public], #[utility],\n/// #[contract_library_method], or #[test]. Non-macroified functions are not allowed in contracts.\npub(crate) comptime fn check_each_fn_macroified(m: Module) {\n for f in m.functions() {\n let name = f.name();\n if !is_fn_private(f)\n & !is_fn_public(f)\n & !is_fn_utility(f)\n & !is_fn_contract_library_method(f)\n & !is_fn_test(f) {\n panic(\n f\"Function {name} must be marked as either #[private], #[public], #[utility], #[contract_library_method], or #[test]\",\n );\n }\n }\n}\n"
2537
+ "source": "use crate::macros::{\n functions::{abi_export::create_fn_abi_export, call_interface_stubs::stub_fn, stub_registry},\n notes::NOTES,\n utils::{\n add_to_hasher, fn_has_noinitcheck, get_fn_visibility, is_fn_contract_library_method,\n is_fn_initializer, is_fn_internal, is_fn_private, is_fn_public, is_fn_test, is_fn_utility,\n is_fn_view, modify_fn_body, module_has_initializer, module_has_storage,\n },\n};\nuse protocol_types::meta::generate_serialize_to_fields;\nuse std::meta::type_of;\n\npub(crate) comptime fn transform_private(f: FunctionDefinition) -> Quoted {\n let fn_abi = create_fn_abi_export(f);\n let fn_stub = stub_fn(f);\n stub_registry::register(f.module(), fn_stub);\n\n // If a function is further modified as unconstrained, we throw an error\n if f.is_unconstrained() {\n let name = f.name();\n panic(\n f\"Function {name} is annotated with #[private] but marked as unconstrained, remove unconstrained keyword\",\n );\n }\n\n let module_has_initializer = module_has_initializer(f.module());\n let module_has_storage = module_has_storage(f.module());\n\n // Private functions undergo a lot of transformations from their Aztec.nr form into a circuit that can be fed to the\n // Private Kernel Circuit.\n // First we change the function signature so that it also receives `PrivateContextInputs`, which contain information\n // about the execution context (e.g. the caller).\n let original_params = f.parameters();\n f.set_parameters(&[(\n quote { inputs },\n quote { crate::context::inputs::private_context_inputs::PrivateContextInputs }.as_type(),\n )]\n .append(original_params));\n\n let mut body = f.body().as_block().unwrap();\n\n // The original params are hashed and passed to the `context` object, so that the kernel can verify we've received\n // the correct values.\n // TODO: Optimize args_hasher for small number of arguments\n let args_hasher_name = quote { args_hasher };\n let args_hasher = original_params.fold(\n quote {\n let mut $args_hasher_name = dep::aztec::hash::ArgsHasher::new();\n },\n |args_hasher, param: (Quoted, Type)| {\n let (name, typ) = param;\n let appended_arg = add_to_hasher(args_hasher_name, name, typ);\n quote {\n $args_hasher\n $appended_arg\n }\n },\n );\n\n let context_creation = quote {\n let mut context = dep::aztec::context::private_context::PrivateContext::new(inputs, dep::aztec::protocol_types::traits::Hash::hash($args_hasher_name));\n };\n\n // Modifications introduced by the different marker attributes.\n let internal_check = if is_fn_internal(f) {\n create_internal_check(f)\n } else {\n quote {}\n };\n\n let view_check = if is_fn_view(f) {\n create_view_check(f)\n } else {\n quote {}\n };\n\n let (assert_initializer, mark_as_initialized) = if is_fn_initializer(f) {\n (create_assert_correct_initializer_args(f), create_mark_as_initialized(f))\n } else {\n (quote {}, quote {})\n };\n\n let storage_init = if module_has_storage {\n quote {\n // Some functions don't access storage, but it'd be quite difficult to only inject this variable if it is\n // referenced. We instead ignore 'unused variable' warnings for it.\n #[allow(unused_variables)]\n let storage = Storage::init(&mut context);\n }\n } else {\n quote {}\n };\n\n // Initialization checks are not included in contracts that don't have initializers.\n let init_check = if module_has_initializer & !is_fn_initializer(f) & !fn_has_noinitcheck(f) {\n create_init_check(f)\n } else {\n quote {}\n };\n\n // All private functions perform message discovery, since they may need to access notes. This is slightly\n // inefficient and could be improved by only doing it once we actually attempt to read any.\n let message_discovery_call = if NOTES.len() > 0 {\n create_message_discovery_call()\n } else {\n quote {}\n };\n\n // Finally, we need to change the return type to be `PrivateCircuitPublicInputs`, which is what the Private Kernel\n // circuit expects.\n let return_value_var_name = quote { macro__returned__values };\n\n let return_value_type = f.return_type();\n let return_value = if body.len() == 0 {\n quote {}\n } else if return_value_type != type_of(()) {\n // The original return value is passed to a second args hasher which the context receives.\n let (body_without_return, last_body_expr) = body.pop_back();\n let return_value = last_body_expr.quoted();\n let return_value_assignment =\n quote { let $return_value_var_name: $return_value_type = $return_value; };\n let return_hasher_name = quote { return_hasher };\n let return_value_into_hasher =\n add_to_hasher(return_hasher_name, return_value_var_name, return_value_type);\n\n body = body_without_return;\n\n quote {\n let mut $return_hasher_name = dep::aztec::hash::ArgsHasher::new();\n $return_value_assignment\n $return_value_into_hasher\n context.set_return_hash($return_hasher_name);\n }\n } else {\n let (body_without_return, last_body_expr) = body.pop_back();\n if !last_body_expr.has_semicolon()\n & last_body_expr.as_for().is_none()\n & last_body_expr.as_assert().is_none()\n & last_body_expr.as_for_range().is_none()\n & last_body_expr.as_assert_eq().is_none()\n & last_body_expr.as_let().is_none() {\n let unused_return_value_name = f\"_{return_value_var_name}\".quoted_contents();\n body = body_without_return.push_back(\n quote { let $unused_return_value_name = $last_body_expr; }.as_expr().unwrap(),\n );\n }\n quote {}\n };\n\n let context_finish = quote { context.finish() };\n\n let to_prepend = quote {\n $args_hasher\n $context_creation\n $assert_initializer\n $init_check\n $internal_check\n $view_check\n $storage_init\n $message_discovery_call\n };\n\n let to_append = quote {\n $return_value\n $mark_as_initialized\n $context_finish\n };\n let modified_body = modify_fn_body(body, to_prepend, to_append);\n f.set_body(modified_body);\n f.set_return_type(\n quote { dep::protocol_types::abis::private_circuit_public_inputs::PrivateCircuitPublicInputs }\n .as_type(),\n );\n f.set_return_data();\n\n fn_abi\n}\n\npub(crate) comptime fn transform_public(f: FunctionDefinition) -> Quoted {\n let fn_abi = create_fn_abi_export(f);\n let fn_stub = stub_fn(f);\n stub_registry::register(f.module(), fn_stub);\n\n // If a function is further modified as unconstrained, we throw an error\n if f.is_unconstrained() {\n let name = f.name();\n panic(\n f\"Function {name} is annotated with #[public] but marked as unconstrained, remove unconstrained keyword\",\n );\n }\n\n let module_has_initializer = module_has_initializer(f.module());\n let module_has_storage = module_has_storage(f.module());\n\n // Public functions undergo a lot of transformations from their Aztec.nr form.\n let original_params = f.parameters();\n let args_len = original_params\n .map(|(name, typ): (Quoted, Type)| {\n generate_serialize_to_fields(name, typ, false).0.len()\n })\n .fold(0, |acc: u32, val: u32| acc + val);\n\n // Unlike in the private case, in public the `context` does not need to receive the hash of the original params.\n let context_creation = quote {\n let mut context = dep::aztec::context::public_context::PublicContext::new(|| {\n // We start from 1 because we skip the selector for the dispatch function.\n let serialized_args : [Field; $args_len] = dep::aztec::context::public_context::calldata_copy(1, $args_len);\n dep::aztec::hash::hash_args_array(serialized_args)\n });\n };\n\n // Modifications introduced by the different marker attributes.\n let internal_check = if is_fn_internal(f) {\n create_internal_check(f)\n } else {\n quote {}\n };\n\n let view_check = if is_fn_view(f) {\n create_view_check(f)\n } else {\n quote {}\n };\n\n let (assert_initializer, mark_as_initialized) = if is_fn_initializer(f) {\n (create_assert_correct_initializer_args(f), create_mark_as_initialized(f))\n } else {\n (quote {}, quote {})\n };\n\n let storage_init = if module_has_storage {\n // Some functions don't access storage, but it'd be quite difficult to only inject this variable if it is\n // referenced. We instead ignore 'unused variable' warnings for it.\n quote {\n #[allow(unused_variables)]\n let storage = Storage::init(&mut context);\n }\n } else {\n quote {}\n };\n\n // Initialization checks are not included in contracts that don't have initializers.\n let init_check = if module_has_initializer & !fn_has_noinitcheck(f) & !is_fn_initializer(f) {\n create_init_check(f)\n } else {\n quote {}\n };\n\n let to_prepend = quote {\n $context_creation\n $assert_initializer\n $init_check\n $internal_check\n $view_check\n $storage_init\n };\n\n let to_append = quote {\n $mark_as_initialized\n };\n\n let body = f.body().as_block().unwrap();\n let modified_body = modify_fn_body(body, to_prepend, to_append);\n f.set_body(modified_body);\n\n // All public functions are automatically made unconstrained, even if they were not marked as such. This is because\n // instead of compiling into a circuit, they will compile to bytecode that will be later transpiled into AVM\n // bytecode.\n f.set_unconstrained(true);\n f.set_return_public(true);\n\n fn_abi\n}\n\npub(crate) comptime fn transform_utility(f: FunctionDefinition) -> Quoted {\n let fn_abi = create_fn_abi_export(f);\n let fn_stub = stub_fn(f);\n stub_registry::register(f.module(), fn_stub);\n\n // Check if function is marked as unconstrained\n if !f.is_unconstrained() {\n let name = f.name();\n panic(\n f\"Function {name} is annotated with #[utility] but not marked as unconstrained, add unconstrained keyword\",\n );\n }\n\n // Create utility context\n let context_creation =\n quote { let mut context = dep::aztec::context::utility_context::UtilityContext::new(); };\n let module_has_storage = module_has_storage(f.module());\n\n // Initialize Storage if module has storage\n let storage_init = if module_has_storage {\n quote {\n // Some functions don't access storage, but it'd be quite difficult to only inject this variable if it is\n // referenced. We instead ignore 'unused variable' warnings for it.\n #[allow(unused_variables)]\n let storage = Storage::init(context);\n }\n } else {\n quote {}\n };\n\n // All utility functions perform message discovery, since they may need to access private notes that would be\n // found during this process. This is slightly inefficient and could be improved by only doing it once we actually\n // attempt to read any.\n let message_discovery_call = if NOTES.len() > 0 {\n create_message_discovery_call()\n } else {\n quote {}\n };\n\n // Inject context creation, storage initialization, and message discovery call at the beginning of the function\n // body.\n let to_prepend = quote {\n $context_creation\n $storage_init\n $message_discovery_call\n };\n let body = f.body().as_block().unwrap();\n let modified_body = modify_fn_body(body, to_prepend, quote {});\n f.set_body(modified_body);\n\n f.set_return_public(true);\n\n fn_abi\n}\n\ncomptime fn create_internal_check(f: FunctionDefinition) -> Quoted {\n let name = f.name();\n let assertion_message = f\"Function {name} can only be called internally\";\n quote { assert(context.msg_sender() == context.this_address(), $assertion_message); }\n}\n\ncomptime fn create_view_check(f: FunctionDefinition) -> Quoted {\n let name = f.name();\n let assertion_message = f\"Function {name} can only be called statically\";\n if is_fn_private(f) {\n // Here `context` is of type context::PrivateContext\n quote { assert(context.inputs.call_context.is_static_call == true, $assertion_message); }\n } else {\n // Here `context` is of type context::PublicContext\n quote { assert(context.is_static_call(), $assertion_message); }\n }\n}\n\ncomptime fn create_assert_correct_initializer_args(f: FunctionDefinition) -> Quoted {\n let fn_visibility = get_fn_visibility(f);\n f\"dep::aztec::macros::functions::initialization_utils::assert_initialization_matches_address_preimage_{fn_visibility}(context);\"\n .quoted_contents()\n}\n\ncomptime fn create_mark_as_initialized(f: FunctionDefinition) -> Quoted {\n let fn_visibility = get_fn_visibility(f);\n f\"dep::aztec::macros::functions::initialization_utils::mark_as_initialized_{fn_visibility}(&mut context);\"\n .quoted_contents()\n}\n\ncomptime fn create_init_check(f: FunctionDefinition) -> Quoted {\n let fn_visibility = get_fn_visibility(f);\n f\"dep::aztec::macros::functions::initialization_utils::assert_is_initialized_{fn_visibility}(&mut context);\"\n .quoted_contents()\n}\n\n/// Injects a call to `aztec::messages::discovery::discover_new_messages`, causing for new notes to be added to PXE and made\n/// available for the current execution.\npub(crate) comptime fn create_message_discovery_call() -> Quoted {\n quote {\n /// Safety: message discovery returns nothing and is performed solely for its side-effects. It is therefore\n /// always safe to call.\n unsafe {\n dep::aztec::messages::discovery::discover_new_messages(\n context.this_address(),\n _compute_note_hash_and_nullifier,\n );\n };\n }\n}\n\n/// Checks if each function in the module is marked with either #[private], #[public], #[utility],\n/// #[contract_library_method], or #[test]. Non-macroified functions are not allowed in contracts.\npub(crate) comptime fn check_each_fn_macroified(m: Module) {\n for f in m.functions() {\n let name = f.name();\n if !is_fn_private(f)\n & !is_fn_public(f)\n & !is_fn_utility(f)\n & !is_fn_contract_library_method(f)\n & !is_fn_test(f) {\n panic(\n f\"Function {name} must be marked as either #[private], #[public], #[utility], #[contract_library_method], or #[test]\",\n );\n }\n }\n}\n"
2465
2538
  },
2466
2539
  "107": {
2467
2540
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/macros/storage.nr",
2468
- "source": "use poseidon::poseidon2::Poseidon2Hasher;\nuse std::{collections::umap::UHashMap, hash::BuildHasherDefault};\n\nuse super::utils::AsStrQuote;\nuse super::utils::get_storage_size;\nuse super::utils::is_note;\n\n/// Stores a map from a module to the name of the struct that describes its storage layout.\n/// This is then used when generating a `storage_layout()` getter on the contract struct.\npub comptime mut global STORAGE_LAYOUT_NAME: UHashMap<Module, Quoted, BuildHasherDefault<Poseidon2Hasher>> =\n UHashMap::default();\n\n/// Marks a struct as the one describing the storage layout of a contract. Only a single struct in the entire contract\n/// should have this macro (or `storage_no_init`) applied to it.\n/// The contract's storage is accessed via the `storage` variable, which will will automatically be made available in\n/// all functions as an instance of the struct this macro was applied to.\npub comptime fn storage(s: TypeDefinition) -> Quoted {\n // This macro performs three things:\n // - it marks the contract as having storage, so that `macros::utils::module_has_storage` will return true and\n // functions will have the storage variable injected and initialized via the `init` function.\n // - it implements said `init` function by allocating appropriate storage slots to each state variable.\n // - it exposes the storage layout by creating a `StorageLayout` struct that is exposed via the `abi(storage)`\n // macro.\n let mut slot: u32 = 1;\n let mut storage_vars_constructors = &[];\n let mut storage_layout_fields = &[];\n let mut storage_layout_constructors = &[];\n\n // TODO(#8658): uncomment the code below to inject the Context type parameter.\n //let mut new_storage_fields = &[];\n //let context_generic = s.add_generic(\"Context\");\n for field in s.fields_as_written() {\n // FIXME: This doesn't handle field types with generics\n let (name, typ) = field;\n let (storage_field_constructor, storage_size) =\n generate_storage_field_constructor(typ, quote { $slot }, false);\n storage_vars_constructors =\n storage_vars_constructors.push_back(quote { $name: $storage_field_constructor });\n // We have `Storable` in a separate `.nr` file instead of defining it in the last quote of this function\n // because that way a dev gets a more reasonable error if he defines a struct with the same name in\n // a contract.\n storage_layout_fields =\n storage_layout_fields.push_back(quote { pub $name: dep::aztec::prelude::Storable });\n storage_layout_constructors = storage_layout_constructors.push_back(\n quote { $name: dep::aztec::prelude::Storable { slot: $slot } },\n );\n //let with_context_generic = add_context_generic(typ, context_generic);\n //println(with_context_generic);\n //new_storage_fields = new_storage_fields.push_back((name, with_context_generic ));\n slot += storage_size;\n }\n\n //s.set_fields(new_storage_fields);\n let storage_vars_constructors = storage_vars_constructors.join(quote {,});\n let storage_impl = quote {\n impl<Context> Storage<Context> {\n fn init(context: Context) -> Self {\n Self {\n $storage_vars_constructors\n }\n }\n }\n };\n\n let storage_layout_fields = storage_layout_fields.join(quote {,});\n let storage_layout_constructors = storage_layout_constructors.join(quote {,});\n\n let module = s.module();\n let module_name = module.name();\n let storage_layout_name = f\"STORAGE_LAYOUT_{module_name}\".quoted_contents();\n let (module_name_str, module_name_len) = module_name.as_str_quote();\n STORAGE_LAYOUT_NAME.insert(module, storage_layout_name);\n\n quote {\n $storage_impl\n\n pub struct StorageLayoutFields {\n $storage_layout_fields\n }\n\n pub struct StorageLayout<let N: u32> {\n pub contract_name: str<N>,\n pub fields: StorageLayoutFields\n }\n\n #[abi(storage)]\n pub global $storage_layout_name: StorageLayout<$module_name_len> = StorageLayout {\n contract_name: $module_name_str,\n fields: StorageLayoutFields { $storage_layout_constructors }\n };\n }\n}\n\n/// Same as `storage`, except the user is in charge of providing an implementation of the `init` constructor function\n/// with signature `fn init<Context>(context: Context) -> Self`, which allows for manual control of storage slot\n/// allocation. Similarly, no `StorageLayout` struct will be created.\n/// Only a single struct in the entire contract should have this macro (or `storage`) applied to it.\npub comptime fn storage_no_init(_s: TypeDefinition) {\n // All `storage` does is provide the `init` implementation, so we don't need to do anything here. Applying this\n // macro however will cause for `macros::utils::module_has_storage` to return true, resulting in the injection of\n // the `storage` variable.\n}\n\n/// Returns the expression required to initialize a state variable with a given slot, along with its serialization size,\n/// i.e. how many contiguous storage slots the variable requires.\ncomptime fn generate_storage_field_constructor(\n typ: Type,\n slot: Quoted,\n parent_is_map: bool,\n) -> (Quoted, u32) {\n assert(\n typ.as_data_type().is_some(),\n \"Storage containers must be generic structs of the form `Container<_, Context>`, or Map<Key, _, Context>\",\n );\n let (container_struct, generics) = typ.as_data_type().unwrap();\n let struct_name = container_struct.name();\n\n if is_storage_map(typ) {\n // Map state variables recursively initialize their contents - this includes nested maps.\n let (value_constructor, _) =\n generate_storage_field_constructor(generics[1], quote { slot }, true);\n (quote { $struct_name::new(context, $slot, | context, slot | { $value_constructor }) }, 1)\n } else {\n let storage_size = if parent_is_map {\n // Variables inside a map do not require contiguous slots since the map slot derivation is assumed to result\n // in slots very far away from one another.\n 1\n } else {\n let (_, container_struct_generics) = typ.as_data_type().unwrap();\n let stored_struct = container_struct_generics[0];\n\n if is_note(stored_struct) {\n // Private notes always occupy a single slot, since the slot is only used as a state variable\n // identifier.\n 1\n } else {\n get_storage_size(typ)\n }\n };\n\n // We assume below that all state variables implement `fn new<Context>(context: Context, slot: Field) -> Self`.\n (quote { $struct_name::new(context, $slot)}, storage_size)\n }\n}\n\n/// Returns true if `typ` is `state_vars::map::Map`.\ncomptime fn is_storage_map(typ: Type) -> bool {\n if typ.as_data_type().is_some() {\n let (def, generics) = typ.as_data_type().unwrap();\n let maybe_map = if (def.name() == quote { Map }) & (generics.len() == 3) {\n let maybe_key = generics[0];\n let maybe_value = generics[1];\n let maybe_context = generics[2];\n quote { crate::state_vars::map::Map<$maybe_key, $maybe_value, $maybe_context> }.as_type()\n } else {\n quote {()}.as_type()\n };\n typ == maybe_map\n } else {\n false\n }\n}\n\ncomptime fn add_context_generic(typ: Type, context_generic: Type) -> Type {\n let (def, mut generics) = typ.as_data_type().expect(\n f\"Storage containers must be generic structs of the form `Container<..., Context>`\",\n );\n let name = def.name();\n\n if is_storage_map(typ) {\n generics[generics.len() - 2] = add_context_generic(generics[1], context_generic);\n generics[generics.len() - 1] = context_generic;\n } else {\n generics[generics.len() - 1] = context_generic;\n }\n\n let generics = generics.map(|typ: Type| quote {$typ}).join(quote {,});\n quote { $name<$generics> }.as_type()\n}\n"
2541
+ "source": "use poseidon::poseidon2::Poseidon2Hasher;\nuse std::{collections::umap::UHashMap, hash::BuildHasherDefault};\n\nuse super::utils::AsStrQuote;\nuse super::utils::get_storage_size;\n\n/// Stores a map from a module to the name of the struct that describes its storage layout.\n/// This is then used when generating a `storage_layout()` getter on the contract struct.\npub comptime mut global STORAGE_LAYOUT_NAME: UHashMap<Module, Quoted, BuildHasherDefault<Poseidon2Hasher>> =\n UHashMap::default();\n\n/// Marks a struct as the one describing the storage layout of a contract.\n///\n/// The contract's storage is accessed via the `storage` variable, which will will automatically be made available in\n/// all functions as an instance of the struct this macro was applied to.\n///\n/// Only a single struct in the entire contract should have this macro (or `storage_no_init`) applied to it, and the\n/// struct has to be called 'Storage'.\npub comptime fn storage(s: TypeDefinition) -> Quoted {\n let struct_name = s.name();\n if struct_name != quote { Storage } {\n panic(\n f\"The #[storage] macro can only be applied to a struct with name 'Storage', got '{struct_name}' instead.\",\n )\n }\n\n assert(\n !s.has_named_attribute(\"storage_no_init\"),\n f\"Only one of #[storage] and #[storage_no_init] can be applied to the Storage struct.\",\n );\n\n // This macro performs three things:\n // - it marks the contract as having storage, so that `macros::utils::module_has_storage` will return true and\n // functions will have the storage variable injected and initialized via the `init` function.\n // - it implements said `init` function by allocating appropriate storage slots to each state variable.\n // - it exposes the storage layout by creating a `StorageLayout` struct that is exposed via the `abi(storage)`\n // macro.\n let mut slot: u32 = 1;\n let mut storage_vars_constructors = &[];\n let mut storage_layout_fields = &[];\n let mut storage_layout_constructors = &[];\n\n // TODO(#8658): uncomment the code below to inject the Context type parameter.\n //let mut new_storage_fields = &[];\n //let context_generic = s.add_generic(\"Context\");\n for field in s.fields_as_written() {\n // FIXME: This doesn't handle field types with generics\n let (name, typ) = field;\n let (storage_field_constructor, storage_size) =\n generate_storage_field_constructor(typ, quote { $slot });\n storage_vars_constructors =\n storage_vars_constructors.push_back(quote { $name: $storage_field_constructor });\n // We have `Storable` in a separate `.nr` file instead of defining it in the last quote of this function\n // because that way a dev gets a more reasonable error if he defines a struct with the same name in\n // a contract.\n storage_layout_fields =\n storage_layout_fields.push_back(quote { pub $name: dep::aztec::prelude::Storable });\n storage_layout_constructors = storage_layout_constructors.push_back(\n quote { $name: dep::aztec::prelude::Storable { slot: $slot } },\n );\n //let with_context_generic = add_context_generic(typ, context_generic);\n //println(with_context_generic);\n //new_storage_fields = new_storage_fields.push_back((name, with_context_generic ));\n slot += storage_size;\n }\n\n //s.set_fields(new_storage_fields);\n let storage_vars_constructors = storage_vars_constructors.join(quote {,});\n let storage_impl = quote {\n impl<Context> Storage<Context> {\n fn init(context: Context) -> Self {\n Self {\n $storage_vars_constructors\n }\n }\n }\n };\n\n let storage_layout_fields = storage_layout_fields.join(quote {,});\n let storage_layout_constructors = storage_layout_constructors.join(quote {,});\n\n let module = s.module();\n let module_name = module.name();\n let storage_layout_name = f\"STORAGE_LAYOUT_{module_name}\".quoted_contents();\n let (module_name_str, module_name_len) = module_name.as_str_quote();\n STORAGE_LAYOUT_NAME.insert(module, storage_layout_name);\n\n quote {\n $storage_impl\n\n pub struct StorageLayoutFields {\n $storage_layout_fields\n }\n\n pub struct StorageLayout<let N: u32> {\n pub contract_name: str<N>,\n pub fields: StorageLayoutFields\n }\n\n #[abi(storage)]\n pub global $storage_layout_name: StorageLayout<$module_name_len> = StorageLayout {\n contract_name: $module_name_str,\n fields: StorageLayoutFields { $storage_layout_constructors }\n };\n }\n}\n\n/// Same as `storage`, except the user is in charge of providing an implementation of the `init` constructor function\n/// with signature `fn init<Context>(context: Context) -> Self`, which allows for manual control of storage slot\n/// allocation. Similarly, no `StorageLayout` struct will be created.\n///\n/// The contract's storage is accessed via the `storage` variable, which will will automatically be made available in\n/// all functions as an instance of the struct this macro was applied to.\n///\n/// Only a single struct in the entire contract can have this macro (or storage_no_init) applied to it, and the struct\n/// has to be called 'Storage'.\npub comptime fn storage_no_init(s: TypeDefinition) {\n // All `storage` does is provide the `init` implementation, so we don't need to do anything here. Applying this\n // macro however will cause for `macros::utils::module_has_storage` to return true, resulting in the injection of\n // the `storage` variable.\n\n // We do need to make sure that the type is called Storage, since we'll do `Storage::init` later on.\n\n if s.name() != quote { Storage } {\n let name = s.name();\n panic(\n f\"The #[storage_no_init] macro can only be applied to a struct with name 'Storage', got '{name}' instead.\",\n )\n }\n\n assert(\n !s.has_named_attribute(\"storage\"),\n f\"Only one of #[storage] and #[storage_no_init] can be applied to the Storage struct.\",\n );\n}\n\n/// Returns the expression required to initialize a state variable with a given slot, along with its serialization size,\n/// i.e. how many contiguous storage slots the variable requires.\ncomptime fn generate_storage_field_constructor(typ: Type, slot: Quoted) -> (Quoted, u32) {\n assert(\n typ.as_data_type().is_some(),\n \"Storage containers must be generic structs of the form `Container<_, Context>`, or Map<Key, _, Context>\",\n );\n let (container_struct, generics) = typ.as_data_type().unwrap();\n let struct_name = container_struct.name();\n\n let constructor = if is_storage_map(typ) {\n // Map state variables recursively initialize their contents - this includes nested maps.\n let (value_constructor, _) =\n generate_storage_field_constructor(generics[1], quote { slot });\n\n quote { $struct_name::new(context, $slot, | context, slot | { $value_constructor }) }\n } else {\n // We assume below that all state variables implement `fn new<Context>(context: Context, slot: Field) -> Self`.\n quote { $struct_name::new(context, $slot)}\n };\n\n (constructor, get_storage_size(typ))\n}\n\n/// Returns true if `typ` is `state_vars::map::Map`.\ncomptime fn is_storage_map(typ: Type) -> bool {\n if typ.as_data_type().is_some() {\n let (def, generics) = typ.as_data_type().unwrap();\n let maybe_map = if (def.name() == quote { Map }) & (generics.len() == 3) {\n let maybe_key = generics[0];\n let maybe_value = generics[1];\n let maybe_context = generics[2];\n quote { crate::state_vars::map::Map<$maybe_key, $maybe_value, $maybe_context> }.as_type()\n } else {\n quote {()}.as_type()\n };\n typ == maybe_map\n } else {\n false\n }\n}\n\ncomptime fn add_context_generic(typ: Type, context_generic: Type) -> Type {\n let (def, mut generics) = typ.as_data_type().expect(\n f\"Storage containers must be generic structs of the form `Container<..., Context>`\",\n );\n let name = def.name();\n\n if is_storage_map(typ) {\n generics[generics.len() - 2] = add_context_generic(generics[1], context_generic);\n generics[generics.len() - 1] = context_generic;\n } else {\n generics[generics.len() - 1] = context_generic;\n }\n\n let generics = generics.map(|typ: Type| quote {$typ}).join(quote {,});\n quote { $name<$generics> }.as_type()\n}\n"
2469
2542
  },
2470
2543
  "143": {
2471
2544
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/call_private_function.nr",
@@ -2485,53 +2558,53 @@
2485
2558
  },
2486
2559
  "158": {
2487
2560
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/notes.nr",
2488
- "source": "use crate::{\n note::{note_interface::NoteType, note_metadata::NoteMetadata, retrieved_note::RetrievedNote},\n utils::array,\n};\n\nuse dep::protocol_types::{\n address::AztecAddress,\n indexed_tagging_secret::IndexedTaggingSecret,\n traits::{FromField, Packable},\n};\n\n/// Notifies the simulator that a note has been created, so that it can be returned in future read requests in the same\n/// transaction. This note should only be added to the non-volatile database if found in an actual block.\npub fn notify_created_note<let N: u32>(\n storage_slot: Field,\n note_type_id: Field,\n packed_note: [Field; N],\n note_hash: Field,\n counter: u32,\n) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe\n // to call.\n unsafe {\n notify_created_note_oracle_wrapper(\n storage_slot,\n note_type_id,\n packed_note,\n note_hash,\n counter,\n )\n };\n}\n\n/// Notifies the simulator that a note has been nullified, so that it is no longer returned in future read requests in\n/// the same transaction. This note should only be removed to the non-volatile database if its nullifier is found in an\n/// actual block.\npub fn notify_nullified_note(nullifier: Field, note_hash: Field, counter: u32) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe to\n // call.\n unsafe { notify_nullified_note_oracle_wrapper(nullifier, note_hash, counter) };\n}\n\n/// Notifies the simulator that a non-note nullifier has been created, so that it can be used for note nonces.\npub fn notify_created_nullifier(nullifier: Field) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe to\n // call.\n unsafe { notify_created_nullifier_oracle_wrapper(nullifier) };\n}\n\nunconstrained fn notify_created_note_oracle_wrapper<let N: u32>(\n storage_slot: Field,\n note_type_id: Field,\n packed_note: [Field; N],\n note_hash: Field,\n counter: u32,\n) {\n notify_created_note_oracle(storage_slot, note_type_id, packed_note, note_hash, counter);\n}\n\n#[oracle(notifyCreatedNote)]\nunconstrained fn notify_created_note_oracle<let N: u32>(\n _storage_slot: Field,\n _note_type_id: Field,\n _packed_note: [Field; N],\n _note_hash: Field,\n _counter: u32,\n) {}\n\nunconstrained fn notify_nullified_note_oracle_wrapper(\n nullifier: Field,\n note_hash: Field,\n counter: u32,\n) {\n notify_nullified_note_oracle(nullifier, note_hash, counter);\n}\n\n#[oracle(notifyNullifiedNote)]\nunconstrained fn notify_nullified_note_oracle(_nullifier: Field, _note_hash: Field, _counter: u32) {}\n\nunconstrained fn notify_created_nullifier_oracle_wrapper(nullifier: Field) {\n notify_created_nullifier_oracle(nullifier);\n}\n\n#[oracle(notifyCreatedNullifier)]\nunconstrained fn notify_created_nullifier_oracle(_nullifier: Field) {}\n\n#[oracle(getNotes)]\nunconstrained fn get_notes_oracle<let N: u32, let ORACLE_RETURN_FIELD_LENGTH: u32>(\n _storage_slot: Field,\n _num_selects: u8,\n _select_by_indexes: [u8; N],\n _select_by_offsets: [u8; N],\n _select_by_lengths: [u8; N],\n _select_values: [Field; N],\n _select_comparators: [u8; N],\n _sort_by_indexes: [u8; N],\n _sort_by_offsets: [u8; N],\n _sort_by_lengths: [u8; N],\n _sort_order: [u8; N],\n _limit: u32,\n _offset: u32,\n _status: u8,\n _return_size: u32,\n) -> [Field; ORACLE_RETURN_FIELD_LENGTH] {}\n\nunconstrained fn get_notes_oracle_wrapper<let N: u32, let ORACLE_RETURN_FIELD_LENGTH: u32>(\n storage_slot: Field,\n num_selects: u8,\n select_by_indexes: [u8; N],\n select_by_offsets: [u8; N],\n select_by_lengths: [u8; N],\n select_values: [Field; N],\n select_comparators: [u8; N],\n sort_by_indexes: [u8; N],\n sort_by_offsets: [u8; N],\n sort_by_lengths: [u8; N],\n sort_order: [u8; N],\n limit: u32,\n offset: u32,\n status: u8,\n) -> [Field; ORACLE_RETURN_FIELD_LENGTH] {\n // This wrapper exists to extract the ORACLE_RETURN_FIELD_LENGTH generic numeric param into a value and pass it to\n // the oracle, so that it knows how big the return array must be.\n get_notes_oracle(\n storage_slot,\n num_selects,\n select_by_indexes,\n select_by_offsets,\n select_by_lengths,\n select_values,\n select_comparators,\n sort_by_indexes,\n sort_by_offsets,\n sort_by_lengths,\n sort_order,\n limit,\n offset,\n status,\n ORACLE_RETURN_FIELD_LENGTH,\n )\n}\n\npub unconstrained fn get_notes<Note, let N: u32, let M: u32, let MAX_NOTES: u32, let ORACLE_RETURN_FIELD_LENGTH: u32>(\n storage_slot: Field,\n num_selects: u8,\n select_by_indexes: [u8; M],\n select_by_offsets: [u8; M],\n select_by_lengths: [u8; M],\n select_values: [Field; M],\n select_comparators: [u8; M],\n sort_by_indexes: [u8; M],\n sort_by_offsets: [u8; M],\n sort_by_lengths: [u8; M],\n sort_order: [u8; M],\n limit: u32,\n offset: u32,\n status: u8,\n _placeholder_fields: [Field; ORACLE_RETURN_FIELD_LENGTH], // TODO: Compute this value automatically from MAX_NOTES\n) -> [Option<RetrievedNote<Note>>; MAX_NOTES]\nwhere\n Note: NoteType + Packable<N>,\n{\n let fields: [_; ORACLE_RETURN_FIELD_LENGTH] = get_notes_oracle_wrapper(\n storage_slot,\n num_selects,\n select_by_indexes,\n select_by_offsets,\n select_by_lengths,\n select_values,\n select_comparators,\n sort_by_indexes,\n sort_by_offsets,\n sort_by_lengths,\n sort_order,\n limit,\n offset,\n status,\n );\n let num_notes = fields[0] as u32;\n let contract_address = AztecAddress::from_field(fields[1]);\n\n let mut opt_notes = [Option::none(); MAX_NOTES];\n for i in 0..opt_notes.len() {\n if i < num_notes {\n // lengths named as per typescript.\n let return_header_length: u32 = 2; // num_notes & contract_address.\n let extra_preimage_length: u32 = 2; // nonce & note_hash_counter.\n let read_offset: u32 = return_header_length + i * (N + extra_preimage_length);\n\n let maybe_nonce = fields[read_offset];\n let maybe_note_hash_counter = fields[read_offset + 1] as u32;\n let packed_note = array::subarray(fields, read_offset + 2);\n\n let note = Note::unpack(packed_note);\n let retrieved_note = RetrievedNote {\n note,\n contract_address,\n metadata: NoteMetadata::from_raw_data(maybe_note_hash_counter != 0, maybe_nonce),\n };\n\n opt_notes[i] = Option::some(retrieved_note);\n };\n }\n opt_notes\n}\n\n/// Returns true if the nullifier exists. Note that a `true` value can be constrained by proving existence of the\n/// nullifier, but a `false` value should not be relied upon since other transactions may emit this nullifier before the\n/// current transaction is included in a block. While this might seem of little use at first, certain design patterns\n/// benefit from this abstraction (see e.g. `PrivateMutable`).\npub unconstrained fn check_nullifier_exists(inner_nullifier: Field) -> bool {\n check_nullifier_exists_oracle(inner_nullifier)\n}\n\n#[oracle(checkNullifierExists)]\nunconstrained fn check_nullifier_exists_oracle(_inner_nullifier: Field) -> bool {}\n\n/// Returns the derived app tagging secret ready to be included in a log for a given sender and recipient pair,\n/// siloed for the current contract address.\npub unconstrained fn get_app_tag_as_sender(sender: AztecAddress, recipient: AztecAddress) -> Field {\n get_indexed_tagging_secret_as_sender_oracle(sender, recipient).compute_tag(recipient)\n}\n\n#[oracle(getIndexedTaggingSecretAsSender)]\nunconstrained fn get_indexed_tagging_secret_as_sender_oracle(\n _sender: AztecAddress,\n _recipient: AztecAddress,\n) -> IndexedTaggingSecret {}\n\n/// Notifies the simulator that a tag has been used in a note, and to therefore increment the associated index so that\n/// future notes get a different tag and can be discovered by the recipient.\n/// This change should only be persisted in a non-volatile database if the tagged log is found in an actual block -\n/// otherwise e.g. a reverting transaction can cause the sender to accidentally skip indices and later produce notes\n/// that are not found by the recipient.\npub fn increment_app_tagging_secret_index_as_sender(sender: AztecAddress, recipient: AztecAddress) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe\n // to call.\n unsafe {\n increment_app_tagging_secret_index_as_sender_wrapper(sender, recipient);\n }\n}\n\nunconstrained fn increment_app_tagging_secret_index_as_sender_wrapper(\n sender: AztecAddress,\n recipient: AztecAddress,\n) {\n increment_app_tagging_secret_index_as_sender_oracle(sender, recipient);\n}\n\n#[oracle(incrementAppTaggingSecretIndexAsSender)]\nunconstrained fn increment_app_tagging_secret_index_as_sender_oracle(\n _sender: AztecAddress,\n _recipient: AztecAddress,\n) {}\n"
2561
+ "source": "use crate::note::{\n note_interface::NoteType,\n retrieved_note::{RETRIEVED_NOTE_OVERHEAD, RetrievedNote, unpack_retrieved_note},\n};\n\nuse dep::protocol_types::{\n address::AztecAddress, indexed_tagging_secret::IndexedTaggingSecret, traits::Packable,\n};\n\n/// Notifies the simulator that a note has been created, so that it can be returned in future read requests in the same\n/// transaction. This note should only be added to the non-volatile database if found in an actual block.\npub fn notify_created_note<let N: u32>(\n storage_slot: Field,\n note_type_id: Field,\n packed_note: [Field; N],\n note_hash: Field,\n counter: u32,\n) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe\n // to call.\n unsafe {\n notify_created_note_oracle_wrapper(\n storage_slot,\n note_type_id,\n packed_note,\n note_hash,\n counter,\n )\n };\n}\n\n/// Notifies the simulator that a note has been nullified, so that it is no longer returned in future read requests in\n/// the same transaction. This note should only be removed to the non-volatile database if its nullifier is found in an\n/// actual block.\npub fn notify_nullified_note(nullifier: Field, note_hash: Field, counter: u32) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe to\n // call.\n unsafe { notify_nullified_note_oracle_wrapper(nullifier, note_hash, counter) };\n}\n\n/// Notifies the simulator that a non-note nullifier has been created, so that it can be used for note nonces.\npub fn notify_created_nullifier(nullifier: Field) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe to\n // call.\n unsafe { notify_created_nullifier_oracle_wrapper(nullifier) };\n}\n\nunconstrained fn notify_created_note_oracle_wrapper<let N: u32>(\n storage_slot: Field,\n note_type_id: Field,\n packed_note: [Field; N],\n note_hash: Field,\n counter: u32,\n) {\n notify_created_note_oracle(storage_slot, note_type_id, packed_note, note_hash, counter);\n}\n\n#[oracle(notifyCreatedNote)]\nunconstrained fn notify_created_note_oracle<let N: u32>(\n _storage_slot: Field,\n _note_type_id: Field,\n _packed_note: [Field; N],\n _note_hash: Field,\n _counter: u32,\n) {}\n\nunconstrained fn notify_nullified_note_oracle_wrapper(\n nullifier: Field,\n note_hash: Field,\n counter: u32,\n) {\n notify_nullified_note_oracle(nullifier, note_hash, counter);\n}\n\n#[oracle(notifyNullifiedNote)]\nunconstrained fn notify_nullified_note_oracle(_nullifier: Field, _note_hash: Field, _counter: u32) {}\n\nunconstrained fn notify_created_nullifier_oracle_wrapper(nullifier: Field) {\n notify_created_nullifier_oracle(nullifier);\n}\n\n#[oracle(notifyCreatedNullifier)]\nunconstrained fn notify_created_nullifier_oracle(_nullifier: Field) {}\n\n#[oracle(getNotes)]\nunconstrained fn get_notes_oracle<let NOTE_PCKD_LEN: u32, let M: u32, let MAX_NOTES: u32>(\n _storage_slot: Field,\n _num_selects: u8,\n _select_by_indexes: [u8; M],\n _select_by_offsets: [u8; M],\n _select_by_lengths: [u8; M],\n _select_values: [Field; M],\n _select_comparators: [u8; M],\n _sort_by_indexes: [u8; M],\n _sort_by_offsets: [u8; M],\n _sort_by_lengths: [u8; M],\n _sort_order: [u8; M],\n _limit: u32,\n _offset: u32,\n _status: u8,\n // This is always set to MAX_NOTES. We need to pass it to TS in order to correctly construct the BoundedVec\n _max_notes: u32,\n // This is always set to NOTE_PCKD_LEN + RETRIEVED_NOTE_OVERHEAD. We need to pass it to TS in order to be able to\n // correctly construct the BoundedVec there.\n _packed_retrieved_note_length: u32,\n) -> BoundedVec<[Field; NOTE_PCKD_LEN + RETRIEVED_NOTE_OVERHEAD], MAX_NOTES> {}\n\npub unconstrained fn get_notes<Note, let NOTE_PCKD_LEN: u32, let M: u32, let MAX_NOTES: u32>(\n storage_slot: Field,\n num_selects: u8,\n select_by_indexes: [u8; M],\n select_by_offsets: [u8; M],\n select_by_lengths: [u8; M],\n select_values: [Field; M],\n select_comparators: [u8; M],\n sort_by_indexes: [u8; M],\n sort_by_offsets: [u8; M],\n sort_by_lengths: [u8; M],\n sort_order: [u8; M],\n limit: u32,\n offset: u32,\n status: u8,\n) -> [Option<RetrievedNote<Note>>; MAX_NOTES]\nwhere\n Note: NoteType + Packable<NOTE_PCKD_LEN>,\n{\n // N + 3 because of the contract address, nonce, and note_hash_counter that are stored out of the packed note.\n let packed_retrieved_notes: BoundedVec<[Field; NOTE_PCKD_LEN + RETRIEVED_NOTE_OVERHEAD], MAX_NOTES> = get_notes_oracle(\n storage_slot,\n num_selects,\n select_by_indexes,\n select_by_offsets,\n select_by_lengths,\n select_values,\n select_comparators,\n sort_by_indexes,\n sort_by_offsets,\n sort_by_lengths,\n sort_order,\n limit,\n offset,\n status,\n MAX_NOTES,\n NOTE_PCKD_LEN + RETRIEVED_NOTE_OVERHEAD,\n );\n\n let mut notes = BoundedVec::<_, MAX_NOTES>::new();\n for i in 0..packed_retrieved_notes.len() {\n let retrieved_note = unpack_retrieved_note(packed_retrieved_notes.get(i));\n notes.push(retrieved_note);\n }\n\n // At last we convert the bounded vector to an array of options. We do this because that is what the filter\n // function needs to have on the output and we've decided to have the same type on the input and output of\n // the filter and preprocessor functions.\n //\n // We have decided to have the same type on the input and output of the filter and preprocessor functions because\n // it allows us to chain multiple filters and preprocessors together.\n //\n // So why do we want the array of options on the output of the filter function?\n //\n // Filter returns an array of options rather than a BoundedVec for performance reasons. Using an array of options\n // allows setting values at known indices in the output array which is much more efficient than pushing to a\n // BoundedVec where the write position depends on previous iterations. The array can then be efficiently converted\n // to a BoundedVec using utils/array/collapse.nr::collapse function from Aztec.nr. This avoids expensive dynamic\n // memory access patterns that would be required when building up a BoundedVec incrementally. For preprocessor\n // functions we could use BoundedVec return value as there the optimization does not matter since it is applied in\n // an unconstrained context. We, however, use the same return value type to be able to use the same function as\n // both a preprocessor and a filter.\n let mut notes_array = [Option::none(); MAX_NOTES];\n for i in 0..notes.len() {\n if i < notes.len() {\n notes_array[i] = Option::some(notes.get_unchecked(i));\n }\n }\n\n notes_array\n}\n\n/// Returns true if the nullifier exists. Note that a `true` value can be constrained by proving existence of the\n/// nullifier, but a `false` value should not be relied upon since other transactions may emit this nullifier before the\n/// current transaction is included in a block. While this might seem of little use at first, certain design patterns\n/// benefit from this abstraction (see e.g. `PrivateMutable`).\npub unconstrained fn check_nullifier_exists(inner_nullifier: Field) -> bool {\n check_nullifier_exists_oracle(inner_nullifier)\n}\n\n#[oracle(checkNullifierExists)]\nunconstrained fn check_nullifier_exists_oracle(_inner_nullifier: Field) -> bool {}\n\n/// Returns the derived app tagging secret ready to be included in a log for a given sender and recipient pair,\n/// siloed for the current contract address.\npub unconstrained fn get_app_tag_as_sender(sender: AztecAddress, recipient: AztecAddress) -> Field {\n get_indexed_tagging_secret_as_sender_oracle(sender, recipient).compute_tag(recipient)\n}\n\n#[oracle(getIndexedTaggingSecretAsSender)]\nunconstrained fn get_indexed_tagging_secret_as_sender_oracle(\n _sender: AztecAddress,\n _recipient: AztecAddress,\n) -> IndexedTaggingSecret {}\n\n/// Notifies the simulator that a tag has been used in a note, and to therefore increment the associated index so that\n/// future notes get a different tag and can be discovered by the recipient.\n/// This change should only be persisted in a non-volatile database if the tagged log is found in an actual block -\n/// otherwise e.g. a reverting transaction can cause the sender to accidentally skip indices and later produce notes\n/// that are not found by the recipient.\npub fn increment_app_tagging_secret_index_as_sender(sender: AztecAddress, recipient: AztecAddress) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe\n // to call.\n unsafe {\n increment_app_tagging_secret_index_as_sender_wrapper(sender, recipient);\n }\n}\n\nunconstrained fn increment_app_tagging_secret_index_as_sender_wrapper(\n sender: AztecAddress,\n recipient: AztecAddress,\n) {\n increment_app_tagging_secret_index_as_sender_oracle(sender, recipient);\n}\n\n#[oracle(incrementAppTaggingSecretIndexAsSender)]\nunconstrained fn increment_app_tagging_secret_index_as_sender_oracle(\n _sender: AztecAddress,\n _recipient: AztecAddress,\n) {}\n"
2489
2562
  },
2490
- "161": {
2563
+ "162": {
2491
2564
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/storage.nr",
2492
2565
  "source": "use dep::protocol_types::{address::AztecAddress, traits::{Packable, ToField}};\n\n#[oracle(storageRead)]\nunconstrained fn storage_read_oracle<let N: u32>(\n address: Field,\n storage_slot: Field,\n block_number: Field,\n length: Field,\n) -> [Field; N] {}\n\npub unconstrained fn raw_storage_read<let N: u32>(\n address: AztecAddress,\n storage_slot: Field,\n block_number: u32,\n) -> [Field; N] {\n storage_read_oracle(\n address.to_field(),\n storage_slot,\n block_number as Field,\n N as Field,\n )\n}\n\npub unconstrained fn storage_read<T, let N: u32>(\n address: AztecAddress,\n storage_slot: Field,\n block_number: u32,\n) -> T\nwhere\n T: Packable<N>,\n{\n T::unpack(raw_storage_read(address, storage_slot, block_number))\n}\n\nmod tests {\n use crate::oracle::storage::{raw_storage_read, storage_read};\n use dep::protocol_types::{address::AztecAddress, traits::{FromField, Packable}};\n\n use crate::test::mocks::mock_struct::MockStruct;\n use std::test::OracleMock;\n\n global address: AztecAddress = AztecAddress::from_field(29);\n global slot: Field = 7;\n global block_number: u32 = 17;\n\n #[test]\n unconstrained fn test_raw_storage_read() {\n let written = MockStruct { a: 13, b: 42 };\n\n let _ = OracleMock::mock(\"storageRead\").returns(written.pack());\n\n let read: [Field; 2] = raw_storage_read(address, slot, block_number);\n assert_eq(read[0], 13);\n assert_eq(read[1], 42);\n }\n\n #[test]\n unconstrained fn test_storage_read() {\n let written = MockStruct { a: 13, b: 42 };\n\n let _ = OracleMock::mock(\"storageRead\").returns(written.pack());\n\n let read: MockStruct = storage_read(address, slot, block_number);\n assert_eq(read.a, 13);\n assert_eq(read.b, 42);\n }\n}\n"
2493
2566
  },
2494
- "163": {
2567
+ "164": {
2495
2568
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/state_vars/map.nr",
2496
- "source": "use crate::state_vars::storage::Storage;\nuse dep::protocol_types::{storage::map::derive_storage_slot_in_map, traits::{Packable, ToField}};\n\n// docs:start:map\npub struct Map<K, V, Context> {\n context: Context,\n storage_slot: Field,\n state_var_constructor: fn(Context, Field) -> V,\n}\n// docs:end:map\n\nimpl<K, T, Context, let N: u32> Storage<N> for Map<K, T, Context>\nwhere\n T: Packable<N>,\n{\n fn get_storage_slot(self) -> Field {\n self.storage_slot\n }\n}\n\nimpl<K, V, Context> Map<K, V, Context> {\n // docs:start:new\n pub fn new(\n context: Context,\n storage_slot: Field,\n state_var_constructor: fn(Context, Field) -> V,\n ) -> Self {\n assert(storage_slot != 0, \"Storage slot 0 not allowed. Storage slots must start from 1.\");\n Map { context, storage_slot, state_var_constructor }\n }\n // docs:end:new\n\n // docs:start:at\n pub fn at(self, key: K) -> V\n where\n K: ToField,\n {\n // TODO(#1204): use a generator index for the storage slot\n let derived_storage_slot = derive_storage_slot_in_map(self.storage_slot, key);\n\n let state_var_constructor = self.state_var_constructor;\n state_var_constructor(self.context, derived_storage_slot)\n }\n // docs:end:at\n}\n"
2569
+ "source": "use crate::state_vars::storage::Storage;\nuse dep::protocol_types::{storage::map::derive_storage_slot_in_map, traits::ToField};\n\n// docs:start:map\npub struct Map<K, V, Context> {\n context: Context,\n storage_slot: Field,\n state_var_constructor: fn(Context, Field) -> V,\n}\n// docs:end:map\n\n// Map reserves a single storage slot regardless of what it stores because nothing is stored at said slot: it is only\n// used to derive the storage slots of nested state variables, which is expected to never result in collisions or slots\n// being close to one another due to these being hashes. This mirrors the strategy adopted by Solidity mappings.\nimpl<K, T, Context> Storage<1> for Map<K, T, Context> {\n fn get_storage_slot(self) -> Field {\n self.storage_slot\n }\n}\n\nimpl<K, V, Context> Map<K, V, Context> {\n // docs:start:new\n pub fn new(\n context: Context,\n storage_slot: Field,\n state_var_constructor: fn(Context, Field) -> V,\n ) -> Self {\n assert(storage_slot != 0, \"Storage slot 0 not allowed. Storage slots must start from 1.\");\n Map { context, storage_slot, state_var_constructor }\n }\n // docs:end:new\n\n // docs:start:at\n pub fn at(self, key: K) -> V\n where\n K: ToField,\n {\n // TODO(#1204): use a generator index for the storage slot\n let derived_storage_slot = derive_storage_slot_in_map(self.storage_slot, key);\n\n let state_var_constructor = self.state_var_constructor;\n state_var_constructor(self.context, derived_storage_slot)\n }\n // docs:end:at\n}\n"
2497
2570
  },
2498
- "172": {
2571
+ "173": {
2499
2572
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/state_vars/public_mutable.nr",
2500
2573
  "source": "use crate::context::{PublicContext, UtilityContext};\nuse crate::state_vars::storage::Storage;\nuse dep::protocol_types::traits::Packable;\n\n// docs:start:public_mutable_struct\npub struct PublicMutable<T, Context> {\n context: Context,\n storage_slot: Field,\n}\n// docs:end:public_mutable_struct\n\nimpl<T, Context, let N: u32> Storage<N> for PublicMutable<T, Context>\nwhere\n T: Packable<N>,\n{\n fn get_storage_slot(self) -> Field {\n self.storage_slot\n }\n}\n\nimpl<T, Context> PublicMutable<T, Context> {\n // docs:start:public_mutable_struct_new\n pub fn new(\n // Note: Passing the contexts to new(...) just to have an interface compatible with a Map.\n context: Context,\n storage_slot: Field,\n ) -> Self {\n assert(storage_slot != 0, \"Storage slot 0 not allowed. Storage slots must start from 1.\");\n PublicMutable { context, storage_slot }\n }\n // docs:end:public_mutable_struct_new\n}\n\nimpl<T> PublicMutable<T, &mut PublicContext> {\n // docs:start:public_mutable_struct_read\n pub fn read<let T_PACKED_LEN: u32>(self) -> T\n where\n T: Packable<T_PACKED_LEN>,\n {\n self.context.storage_read(self.storage_slot)\n }\n // docs:end:public_mutable_struct_read\n\n // docs:start:public_mutable_struct_write\n pub fn write<let T_PACKED_LEN: u32>(self, value: T)\n where\n T: Packable<T_PACKED_LEN>,\n {\n self.context.storage_write(self.storage_slot, value);\n }\n // docs:end:public_mutable_struct_write\n}\n\nimpl<T> PublicMutable<T, UtilityContext> {\n pub unconstrained fn read<let T_PACKED_LEN: u32>(self) -> T\n where\n T: Packable<T_PACKED_LEN>,\n {\n self.context.storage_read(self.storage_slot)\n }\n}\n"
2501
2574
  },
2502
- "208": {
2575
+ "209": {
2503
2576
  "path": "/home/aztec-dev/nargo/github.com/noir-lang/poseidon/v0.1.0/src/poseidon2.nr",
2504
2577
  "source": "use std::default::Default;\nuse std::hash::Hasher;\n\ncomptime global RATE: u32 = 3;\n\npub struct Poseidon2 {\n cache: [Field; 3],\n state: [Field; 4],\n cache_size: u32,\n squeeze_mode: bool, // 0 => absorb, 1 => squeeze\n}\n\nimpl Poseidon2 {\n #[no_predicates]\n pub fn hash<let N: u32>(input: [Field; N], message_size: u32) -> Field {\n Poseidon2::hash_internal(input, message_size, message_size != N)\n }\n\n pub(crate) fn new(iv: Field) -> Poseidon2 {\n let mut result =\n Poseidon2 { cache: [0; 3], state: [0; 4], cache_size: 0, squeeze_mode: false };\n result.state[RATE] = iv;\n result\n }\n\n fn perform_duplex(&mut self) {\n // add the cache into sponge state\n for i in 0..RATE {\n // We effectively zero-pad the cache by only adding to the state\n // cache that is less than the specified `cache_size`\n if i < self.cache_size {\n self.state[i] += self.cache[i];\n }\n }\n self.state = crate::poseidon2_permutation(self.state, 4);\n }\n\n fn absorb(&mut self, input: Field) {\n assert(!self.squeeze_mode);\n if self.cache_size == RATE {\n // If we're absorbing, and the cache is full, apply the sponge permutation to compress the cache\n self.perform_duplex();\n self.cache[0] = input;\n self.cache_size = 1;\n } else {\n // If we're absorbing, and the cache is not full, add the input into the cache\n self.cache[self.cache_size] = input;\n self.cache_size += 1;\n }\n }\n\n fn squeeze(&mut self) -> Field {\n assert(!self.squeeze_mode);\n // If we're in absorb mode, apply sponge permutation to compress the cache.\n self.perform_duplex();\n self.squeeze_mode = true;\n\n // Pop one item off the top of the permutation and return it.\n self.state[0]\n }\n\n fn hash_internal<let N: u32>(\n input: [Field; N],\n in_len: u32,\n is_variable_length: bool,\n ) -> Field {\n let two_pow_64 = 18446744073709551616;\n let iv: Field = (in_len as Field) * two_pow_64;\n let mut sponge = Poseidon2::new(iv);\n for i in 0..input.len() {\n if i < in_len {\n sponge.absorb(input[i]);\n }\n }\n\n // In the case where the hash preimage is variable-length, we append `1` to the end of the input, to distinguish\n // from fixed-length hashes. (the combination of this additional field element + the hash IV ensures\n // fixed-length and variable-length hashes do not collide)\n if is_variable_length {\n sponge.absorb(1);\n }\n sponge.squeeze()\n }\n}\n\npub struct Poseidon2Hasher {\n _state: [Field],\n}\n\nimpl Hasher for Poseidon2Hasher {\n fn finish(self) -> Field {\n let iv: Field = (self._state.len() as Field) * 18446744073709551616; // iv = (self._state.len() << 64)\n let mut sponge = Poseidon2::new(iv);\n for i in 0..self._state.len() {\n sponge.absorb(self._state[i]);\n }\n sponge.squeeze()\n }\n\n fn write(&mut self, input: Field) {\n self._state = self._state.push_back(input);\n }\n}\n\nimpl Default for Poseidon2Hasher {\n fn default() -> Self {\n Poseidon2Hasher { _state: &[] }\n }\n}\n"
2505
2578
  },
2506
- "270": {
2579
+ "271": {
2507
2580
  "path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/address/aztec_address.nr",
2508
2581
  "source": "use crate::{\n address::{\n partial_address::PartialAddress, salted_initialization_hash::SaltedInitializationHash,\n },\n constants::{\n AZTEC_ADDRESS_LENGTH, GENERATOR_INDEX__CONTRACT_ADDRESS_V1, MAX_FIELD_VALUE,\n MAX_PROTOCOL_CONTRACTS,\n },\n contract_class_id::ContractClassId,\n hash::poseidon2_hash_with_separator,\n public_keys::{IvpkM, NpkM, OvpkM, PublicKeys, ToPoint, TpkM},\n traits::{Deserialize, Empty, FromField, Packable, Serialize, ToField},\n utils::field::{pow, sqrt},\n};\n\n// We do below because `use crate::point::Point;` does not work\nuse dep::std::embedded_curve_ops::EmbeddedCurvePoint as Point;\n\nuse crate::public_keys::AddressPoint;\nuse std::{\n embedded_curve_ops::{EmbeddedCurveScalar, fixed_base_scalar_mul as derive_public_key},\n ops::Add,\n};\n\n// Aztec address\npub struct AztecAddress {\n pub inner: Field,\n}\n\nimpl Eq for AztecAddress {\n fn eq(self, other: Self) -> bool {\n self.to_field() == other.to_field()\n }\n}\n\nimpl Empty for AztecAddress {\n fn empty() -> Self {\n Self { inner: 0 }\n }\n}\n\nimpl ToField for AztecAddress {\n fn to_field(self) -> Field {\n self.inner\n }\n}\n\nimpl FromField for AztecAddress {\n fn from_field(value: Field) -> AztecAddress {\n AztecAddress { inner: value }\n }\n}\n\nimpl Serialize<AZTEC_ADDRESS_LENGTH> for AztecAddress {\n fn serialize(self: Self) -> [Field; AZTEC_ADDRESS_LENGTH] {\n [self.to_field()]\n }\n}\n\nimpl Deserialize<AZTEC_ADDRESS_LENGTH> for AztecAddress {\n fn deserialize(fields: [Field; AZTEC_ADDRESS_LENGTH]) -> Self {\n FromField::from_field(fields[0])\n }\n}\n\n/// We implement the Packable trait for AztecAddress because it can be stored in contract's storage (and there\n/// the implementation of Packable is required).\nimpl Packable<AZTEC_ADDRESS_LENGTH> for AztecAddress {\n fn pack(self) -> [Field; AZTEC_ADDRESS_LENGTH] {\n self.serialize()\n }\n\n fn unpack(fields: [Field; AZTEC_ADDRESS_LENGTH]) -> Self {\n Self::deserialize(fields)\n }\n}\n\nimpl AztecAddress {\n pub fn zero() -> Self {\n Self { inner: 0 }\n }\n\n pub fn to_address_point(self) -> AddressPoint {\n // We compute the address point by taking our address, setting it to x, and then solving for y in the\n // equation which defines our bn curve:\n // y^2 = x^3 - 17; x = address\n let x = self.inner;\n let y_squared = pow(x, 3) - 17;\n\n // TODO (#8970): Handle cases where we cannot recover a point from an address\n let mut y = sqrt(y_squared);\n\n // If we get a negative y coordinate (any y where y > MAX_FIELD_VALUE / 2), we pin it to the\n // positive one (any value where y <= MAX_FIELD_VALUE / 2) by subtracting it from the Field modulus\n // note: The field modulus is MAX_FIELD_VALUE + 1\n if (!(y.lt(MAX_FIELD_VALUE / 2) | y.eq(MAX_FIELD_VALUE / 2))) {\n y = (MAX_FIELD_VALUE + 1) - y;\n }\n\n AddressPoint { inner: Point { x: self.inner, y, is_infinite: false } }\n }\n\n pub fn compute(public_keys: PublicKeys, partial_address: PartialAddress) -> AztecAddress {\n let public_keys_hash = public_keys.hash();\n\n let pre_address = poseidon2_hash_with_separator(\n [public_keys_hash.to_field(), partial_address.to_field()],\n GENERATOR_INDEX__CONTRACT_ADDRESS_V1,\n );\n\n let address_point = derive_public_key(EmbeddedCurveScalar::from_field(pre_address)).add(\n public_keys.ivpk_m.to_point(),\n );\n\n // Note that our address is only the x-coordinate of the full address_point. This is okay because when people want to encrypt something and send it to us\n // they can recover our full point using the x-coordinate (our address itself). To do this, they recompute the y-coordinate according to the equation y^2 = x^3 - 17.\n // When they do this, they may get a positive y-coordinate (a value that is less than or equal to MAX_FIELD_VALUE / 2) or\n // a negative y-coordinate (a value that is more than MAX_FIELD_VALUE), and we cannot dictate which one they get and hence the recovered point may sometimes be different than the one\n // our secret can decrypt. Regardless though, they should and will always encrypt using point with the positive y-coordinate by convention.\n // This ensures that everyone encrypts to the same point given an arbitrary x-coordinate (address). This is allowed because even though our original point may not have a positive y-coordinate,\n // with our original secret, we will be able to derive the secret to the point with the flipped (and now positive) y-coordinate that everyone encrypts to.\n AztecAddress::from_field(address_point.x)\n }\n\n pub fn compute_from_class_id(\n contract_class_id: ContractClassId,\n salted_initialization_hash: SaltedInitializationHash,\n public_keys: PublicKeys,\n ) -> Self {\n let partial_address = PartialAddress::compute_from_salted_initialization_hash(\n contract_class_id,\n salted_initialization_hash,\n );\n\n AztecAddress::compute(public_keys, partial_address)\n }\n\n pub fn is_protocol_contract(self) -> bool {\n self.inner.lt(MAX_PROTOCOL_CONTRACTS as Field)\n }\n\n pub fn is_zero(self) -> bool {\n self.inner == 0\n }\n\n pub fn assert_is_zero(self) {\n assert(self.to_field() == 0);\n }\n}\n\n#[test]\nfn compute_address_from_partial_and_pub_keys() {\n let public_keys = PublicKeys {\n npk_m: NpkM {\n inner: Point {\n x: 0x22f7fcddfa3ce3e8f0cc8e82d7b94cdd740afa3e77f8e4a63ea78a239432dcab,\n y: 0x0471657de2b6216ade6c506d28fbc22ba8b8ed95c871ad9f3e3984e90d9723a7,\n is_infinite: false,\n },\n },\n ivpk_m: IvpkM {\n inner: Point {\n x: 0x111223493147f6785514b1c195bb37a2589f22a6596d30bb2bb145fdc9ca8f1e,\n y: 0x273bbffd678edce8fe30e0deafc4f66d58357c06fd4a820285294b9746c3be95,\n is_infinite: false,\n },\n },\n ovpk_m: OvpkM {\n inner: Point {\n x: 0x09115c96e962322ffed6522f57194627136b8d03ac7469109707f5e44190c484,\n y: 0x0c49773308a13d740a7f0d4f0e6163b02c5a408b6f965856b6a491002d073d5b,\n is_infinite: false,\n },\n },\n tpk_m: TpkM {\n inner: Point {\n x: 0x00d3d81beb009873eb7116327cf47c612d5758ef083d4fda78e9b63980b2a762,\n y: 0x2f567d22d2b02fe1f4ad42db9d58a36afd1983e7e2909d1cab61cafedad6193a,\n is_infinite: false,\n },\n },\n };\n\n let partial_address = PartialAddress::from_field(\n 0x0a7c585381b10f4666044266a02405bf6e01fa564c8517d4ad5823493abd31de,\n );\n\n let address = AztecAddress::compute(public_keys, partial_address);\n\n // The following value was generated by `derivation.test.ts`.\n // --> Run the test with AZTEC_GENERATE_TEST_DATA=1 flag to update test data.\n let expected_computed_address_from_partial_and_pubkeys =\n 0x24e4646f58b9fbe7d38e317db8d5636c423fbbdfbe119fc190fe9c64747e0c62;\n assert(address.to_field() == expected_computed_address_from_partial_and_pubkeys);\n}\n\n#[test]\nfn compute_preaddress_from_partial_and_pub_keys() {\n let pre_address = poseidon2_hash_with_separator([1, 2], GENERATOR_INDEX__CONTRACT_ADDRESS_V1);\n let expected_computed_preaddress_from_partial_and_pubkey =\n 0x23ce9be3fa3c846b0f9245cc796902e731d04f086e8a42473bb29e405fc98075;\n assert(pre_address == expected_computed_preaddress_from_partial_and_pubkey);\n}\n\n#[test]\nfn from_field_to_field() {\n let address = AztecAddress { inner: 37 };\n assert_eq(FromField::from_field(address.to_field()), address);\n}\n\n#[test]\nfn serde() {\n let address = AztecAddress { inner: 37 };\n assert_eq(Deserialize::deserialize(address.serialize()), address);\n}\n"
2509
2582
  },
2510
- "288": {
2583
+ "289": {
2511
2584
  "path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/hash.nr",
2512
- "source": "use crate::{\n abis::{\n contract_class_function_leaf_preimage::ContractClassFunctionLeafPreimage,\n contract_class_log::ContractClassLog,\n function_selector::FunctionSelector,\n note_hash::ScopedNoteHash,\n nullifier::ScopedNullifier,\n private_log::{PrivateLog, PrivateLogData},\n side_effect::{OrderedValue, scoped::Scoped},\n },\n address::{AztecAddress, EthAddress},\n constants::{\n FUNCTION_TREE_HEIGHT, GENERATOR_INDEX__NOTE_HASH_NONCE, GENERATOR_INDEX__OUTER_NULLIFIER,\n GENERATOR_INDEX__SILOED_NOTE_HASH, GENERATOR_INDEX__UNIQUE_NOTE_HASH, TWO_POW_64,\n },\n merkle_tree::root::root_from_sibling_path,\n messaging::l2_to_l1_message::{L2ToL1Message, ScopedL2ToL1Message},\n poseidon2::Poseidon2Sponge,\n traits::{FromField, Hash, ToField},\n utils::{\n arrays::{array_concat, unsafe_padded_array_length},\n field::{field_from_bytes, field_from_bytes_32_trunc},\n },\n};\n\npub fn sha256_to_field<let N: u32>(bytes_to_hash: [u8; N]) -> Field {\n let sha256_hashed = sha256::digest(bytes_to_hash);\n let hash_in_a_field = field_from_bytes_32_trunc(sha256_hashed);\n\n hash_in_a_field\n}\n\npub fn private_functions_root_from_siblings(\n selector: FunctionSelector,\n vk_hash: Field,\n function_leaf_index: Field,\n function_leaf_sibling_path: [Field; FUNCTION_TREE_HEIGHT],\n) -> Field {\n let function_leaf_preimage = ContractClassFunctionLeafPreimage { selector, vk_hash };\n let function_leaf = function_leaf_preimage.hash();\n root_from_sibling_path(\n function_leaf,\n function_leaf_index,\n function_leaf_sibling_path,\n )\n}\n\npub fn compute_note_hash_nonce(first_nullifier_in_tx: Field, note_index_in_tx: u32) -> Field {\n // Hashing the first nullifier with note index in tx is guaranteed to be unique (because all nullifiers are also\n // unique).\n poseidon2_hash_with_separator(\n [first_nullifier_in_tx, note_index_in_tx as Field],\n GENERATOR_INDEX__NOTE_HASH_NONCE,\n )\n}\n\npub fn compute_unique_note_hash(nonce: Field, siloed_note_hash: Field) -> Field {\n let inputs = [nonce, siloed_note_hash];\n poseidon2_hash_with_separator(inputs, GENERATOR_INDEX__UNIQUE_NOTE_HASH)\n}\n\npub fn compute_siloed_note_hash(app: AztecAddress, note_hash: Field) -> Field {\n poseidon2_hash_with_separator(\n [app.to_field(), note_hash],\n GENERATOR_INDEX__SILOED_NOTE_HASH,\n )\n}\n\n/// Computes unique note hashes from siloed note hashes\npub fn compute_unique_siloed_note_hash(\n siloed_note_hash: Field,\n first_nullifier: Field,\n note_index_in_tx: u32,\n) -> Field {\n if siloed_note_hash == 0 {\n 0\n } else {\n let nonce = compute_note_hash_nonce(first_nullifier, note_index_in_tx);\n compute_unique_note_hash(nonce, siloed_note_hash)\n }\n}\n\n/// Siloing in the context of Aztec refers to the process of hashing a note hash with a contract address (this way\n/// the note hash is scoped to a specific contract). This is used to prevent intermingling of notes between contracts.\npub fn silo_note_hash(note_hash: ScopedNoteHash) -> Field {\n if note_hash.contract_address.is_zero() {\n 0\n } else {\n compute_siloed_note_hash(note_hash.contract_address, note_hash.value())\n }\n}\n\npub fn compute_siloed_nullifier(app: AztecAddress, nullifier: Field) -> Field {\n poseidon2_hash_with_separator(\n [app.to_field(), nullifier],\n GENERATOR_INDEX__OUTER_NULLIFIER,\n )\n}\n\npub fn silo_nullifier(nullifier: ScopedNullifier) -> Field {\n if nullifier.contract_address.is_zero() {\n nullifier.value() // Return value instead of 0 because the first nullifier's contract address is zero.\n } else {\n compute_siloed_nullifier(nullifier.contract_address, nullifier.value())\n }\n}\n\npub fn compute_siloed_private_log_field(contract_address: AztecAddress, field: Field) -> Field {\n poseidon2_hash([contract_address.to_field(), field])\n}\n\npub fn silo_private_log(private_log: Scoped<PrivateLogData>) -> PrivateLog {\n if private_log.contract_address.is_zero() {\n private_log.inner.log\n } else {\n let mut fields = private_log.inner.log.fields;\n fields[0] = compute_siloed_private_log_field(private_log.contract_address, fields[0]);\n PrivateLog { fields }\n }\n}\n\nfn compute_siloed_contract_class_log_field(\n contract_address: AztecAddress,\n first_field: Field,\n) -> Field {\n poseidon2_hash([contract_address.to_field(), first_field])\n}\n\npub fn silo_contract_class_log(contract_class_log: ContractClassLog) -> ContractClassLog {\n if contract_class_log.contract_address.is_zero() {\n contract_class_log\n } else {\n let mut log = contract_class_log;\n log.log.fields[0] = compute_siloed_contract_class_log_field(\n contract_class_log.contract_address,\n log.log.fields[0],\n );\n log\n }\n}\n\npub fn compute_contract_class_log_hash(contract_class_log: ContractClassLog) -> Field {\n let array = contract_class_log.log.fields;\n // Safety: The below length is constrained in the base rollup.\n let length = unsafe { unsafe_padded_array_length(array) };\n if length == 0 {\n 0\n } else {\n poseidon2_hash(array)\n }\n}\n\npub fn merkle_hash(left: Field, right: Field) -> Field {\n poseidon2_hash([left, right])\n}\n\npub fn compute_l2_to_l1_hash(\n contract_address: AztecAddress,\n recipient: EthAddress,\n content: Field,\n rollup_version_id: Field,\n chain_id: Field,\n) -> Field {\n let mut bytes: [u8; 160] = std::mem::zeroed();\n\n let inputs =\n [contract_address.to_field(), rollup_version_id, recipient.to_field(), chain_id, content];\n for i in 0..5 {\n // TODO are bytes be in fr.to_buffer() ?\n let item_bytes: [u8; 32] = inputs[i].to_be_bytes();\n for j in 0..32 {\n bytes[32 * i + j] = item_bytes[j];\n }\n }\n\n sha256_to_field(bytes)\n}\n\npub fn silo_l2_to_l1_message(\n msg: ScopedL2ToL1Message,\n rollup_version_id: Field,\n chain_id: Field,\n) -> Field {\n if msg.contract_address.is_zero() {\n 0\n } else {\n compute_l2_to_l1_hash(\n msg.contract_address,\n msg.message.recipient,\n msg.message.content,\n rollup_version_id,\n chain_id,\n )\n }\n}\n\n// Computes sha256 hash of 2 input hashes.\n//\n// NB: This method now takes in two 31 byte fields - it assumes that any input\n// is the result of a sha_to_field hash and => is truncated\n//\n// TODO(Jan and David): This is used for the encrypted_log hashes.\n// Can we check to see if we can just use hash_to_field or pedersen_compress here?\n//\npub fn accumulate_sha256(input: [Field; 2]) -> Field {\n // This is a note about the cpp code, since it takes an array of Fields\n // instead of a u128.\n // 4 Field elements when converted to bytes will usually\n // occupy 4 * 32 = 128 bytes.\n // However, this function is making the assumption that each Field\n // only occupies 128 bits.\n //\n // TODO(David): This does not seem to be getting guaranteed anywhere in the code?\n // Concatentate two fields into 32x2 = 64 bytes\n // accumulate_sha256 assumes that the inputs are pre-truncated 31 byte numbers\n let mut hash_input_flattened = [0; 64];\n for offset in 0..input.len() {\n let input_as_bytes: [u8; 32] = input[offset].to_be_bytes();\n for byte_index in 0..32 {\n hash_input_flattened[offset * 32 + byte_index] = input_as_bytes[byte_index];\n }\n }\n\n sha256_to_field(hash_input_flattened)\n}\n\npub fn verification_key_hash<let N: u32>(key: [Field; N]) -> Field {\n crate::hash::poseidon2_hash(key)\n}\n\n#[inline_always]\npub fn pedersen_hash<let N: u32>(inputs: [Field; N], hash_index: u32) -> Field {\n std::hash::pedersen_hash_with_separator(inputs, hash_index)\n}\n\npub fn poseidon2_hash<let N: u32>(inputs: [Field; N]) -> Field {\n poseidon::poseidon2::Poseidon2::hash(inputs, N)\n}\n\n#[no_predicates]\npub fn poseidon2_hash_with_separator<let N: u32, T>(inputs: [Field; N], separator: T) -> Field\nwhere\n T: ToField,\n{\n let inputs_with_separator = array_concat([separator.to_field()], inputs);\n poseidon2_hash(inputs_with_separator)\n}\n\n// Performs a fixed length hash with a subarray of the given input.\n// Useful for SpongeBlob in which we aborb M things and want to check it vs a hash of M elts of an N-len array.\n// Using stdlib poseidon, this will always absorb an extra 1 as a 'variable' hash, and not match spongeblob.squeeze()\n// or any ts implementation. Also checks that any remaining elts not hashed are empty.\n#[no_predicates]\npub fn poseidon2_hash_subarray<let N: u32>(input: [Field; N], in_len: u32) -> Field {\n let mut sponge = poseidon2_absorb_chunks(input, in_len, false);\n sponge.squeeze()\n}\n\n// NB the below is the same as poseidon::poseidon2::Poseidon2::hash(), but replacing a range check with a bit check,\n// and absorbing in chunks of 3 below.\n#[no_predicates]\npub fn poseidon2_cheaper_variable_hash<let N: u32>(input: [Field; N], in_len: u32) -> Field {\n let mut sponge = poseidon2_absorb_chunks(input, in_len, true);\n // In the case where the hash preimage is variable-length, we append `1` to the end of the input, to distinguish\n // from fixed-length hashes. (the combination of this additional field element + the hash IV ensures\n // fixed-length and variable-length hashes do not collide)\n if in_len != N {\n sponge.absorb(1);\n }\n sponge.squeeze()\n}\n\n// The below fn reduces gates of a conditional poseidon2 hash by approx 3x (thank you ~* Giant Brain Dev @IlyasRidhuan *~ for the idea)\n// Why? Because when we call stdlib poseidon, we call absorb for each item. When absorbing is conditional, it seems the compiler does not know\n// what cache_size will be when calling absorb, so it assigns the permutation gates for /each i/ rather than /every 3rd i/, which is actually required.\n// The below code forces the compiler to:\n// - absorb normally up to 2 times to set cache_size to 1\n// - absorb in chunks of 3 to ensure perm. only happens every 3rd absorb\n// - absorb normally up to 2 times to add any remaining values to the hash\n// In fixed len hashes, the compiler is able to tell that it will only need to perform the permutation every 3 absorbs.\n// NB: it also replaces unnecessary range checks (i < thing) with a bit check (&= i != thing), which alone reduces the gates of a var. hash by half.\n\n#[no_predicates]\nfn poseidon2_absorb_chunks<let N: u32>(\n input: [Field; N],\n in_len: u32,\n variable: bool,\n) -> Poseidon2Sponge {\n let iv: Field = (in_len as Field) * TWO_POW_64;\n let mut sponge = Poseidon2Sponge::new(iv);\n // Even though shift is always 1 here, if we input in_len = 0 we get an underflow\n // since we cannot isolate computation branches. The below is just to avoid that.\n let shift = if in_len == 0 { 0 } else { 1 };\n if in_len != 0 {\n // cache_size = 0, init absorb\n sponge.cache[0] = input[0];\n sponge.cache_size = 1;\n // shift = num elts already added to make cache_size 1 = 1 for a fresh sponge\n // M = max_chunks = (N - 1 - (N - 1) % 3) / 3: (must be written as a fn of N to compile)\n // max_remainder = (N - 1) % 3;\n // max_chunks = (N - 1 - max_remainder) / 3;\n sponge = poseidon2_absorb_chunks_loop::<N, (N - 1 - (N - 1) % 3) / 3>(\n sponge,\n input,\n in_len,\n variable,\n shift,\n );\n }\n sponge\n}\n\n// NB: If it's not required to check that the non-absorbed elts of 'input' are 0s, set skip_0_check=true\n#[no_predicates]\npub fn poseidon2_absorb_chunks_existing_sponge<let N: u32>(\n in_sponge: Poseidon2Sponge,\n input: [Field; N],\n in_len: u32,\n skip_0_check: bool,\n) -> Poseidon2Sponge {\n let mut sponge = in_sponge;\n // 'shift' is to account for already added inputs\n let mut shift = 0;\n // 'stop' is to avoid an underflow when inputting in_len = 0\n let mut stop = false;\n for i in 0..3 {\n if shift == in_len {\n stop = true;\n }\n if (sponge.cache_size != 1) & (!stop) {\n sponge.absorb(input[i]);\n shift += 1;\n }\n }\n sponge = if stop {\n sponge\n } else {\n // max_chunks = (N - (N % 3)) / 3;\n poseidon2_absorb_chunks_loop::<N, (N - (N % 3)) / 3>(\n sponge,\n input,\n in_len,\n skip_0_check,\n shift,\n )\n };\n sponge\n}\n\n// The below is the loop to absorb elts into a poseidon sponge in chunks of 3\n// shift - the num of elts already absorbed to ensure the sponge's cache_size = 1\n// M - the max number of chunks required to absorb N things (must be comptime to compile)\n// NB: The 0 checks ('Found non-zero field...') are messy, but having a separate loop over N to check\n// for 0s costs 3N gates. Current approach is approx 2N gates.\n#[no_predicates]\nfn poseidon2_absorb_chunks_loop<let N: u32, let M: u32>(\n in_sponge: Poseidon2Sponge,\n input: [Field; N],\n in_len: u32,\n variable: bool,\n shift: u32,\n) -> Poseidon2Sponge {\n assert(in_len <= N, \"Given in_len to absorb is larger than the input array len\");\n // When we have an existing sponge, we may have a shift of 0, and the final 'k+2' below = N\n // The below avoids an overflow\n let skip_last = 3 * M == N;\n // Writing in_sponge: &mut does not compile\n let mut sponge = in_sponge;\n let mut should_add = true;\n // The num of things left over after absorbing in 3s\n let remainder = (in_len - shift) % 3;\n // The num of chunks of 3 to absorb (maximum M)\n let chunks = (in_len - shift - remainder) / 3;\n for i in 0..M {\n // Now we loop through cache size = 1 -> 3\n should_add &= i != chunks;\n // This is the index at the start of the chunk (for readability)\n let k = 3 * i + shift;\n if should_add {\n // cache_size = 1, 2 => just assign\n sponge.cache[1] = input[k];\n sponge.cache[2] = input[k + 1];\n // cache_size = 3 => duplex + perm\n for j in 0..3 {\n sponge.state[j] += sponge.cache[j];\n }\n sponge.state = std::hash::poseidon2_permutation(sponge.state, 4);\n sponge.cache[0] = input[k + 2];\n // cache_size is now 1 again, repeat loop\n } else if (!variable) & (i != chunks) {\n // if we are hashing a fixed len array which is a subarray, we check the remaining elts are 0\n // NB: we don't check at i == chunks, because that chunk contains elts to be absorbed or checked below\n let last_0 = if (i == M - 1) & (skip_last) {\n 0\n } else {\n input[k + 2]\n };\n let all_0 = (input[k] == 0) & (input[k + 1] == 0) & (last_0 == 0);\n assert(all_0, \"Found non-zero field after breakpoint\");\n }\n }\n // we have 'remainder' num of items left to absorb\n should_add = true;\n // below is to avoid overflows (i.e. if inlen is close to N)\n let mut should_check = !variable;\n for i in 0..3 {\n should_add &= i != remainder;\n should_check &= in_len - remainder + i != N;\n if should_add {\n // we want to absorb the final 'remainder' items\n sponge.absorb(input[in_len - remainder + i]);\n } else if should_check {\n assert(input[in_len - remainder + i] == 0, \"Found non-zero field after breakpoint\");\n }\n }\n sponge\n}\n\npub fn poseidon2_hash_with_separator_slice<T>(inputs: [Field], separator: T) -> Field\nwhere\n T: ToField,\n{\n let in_len = inputs.len() + 1;\n let iv: Field = (in_len as Field) * TWO_POW_64;\n let mut sponge = Poseidon2Sponge::new(iv);\n sponge.absorb(separator.to_field());\n\n for i in 0..inputs.len() {\n sponge.absorb(inputs[i]);\n }\n\n sponge.squeeze()\n}\n\n#[no_predicates]\npub fn poseidon2_hash_bytes<let N: u32>(inputs: [u8; N]) -> Field {\n let mut fields = [0; (N + 30) / 31];\n let mut field_index = 0;\n let mut current_field = [0; 31];\n for i in 0..inputs.len() {\n let index = i % 31;\n current_field[index] = inputs[i];\n if index == 30 {\n fields[field_index] = field_from_bytes(current_field, false);\n current_field = [0; 31];\n field_index += 1;\n }\n }\n if field_index != fields.len() {\n fields[field_index] = field_from_bytes(current_field, false);\n }\n poseidon2_hash(fields)\n}\n\n#[test]\nfn poseidon_chunks_matches_fixed() {\n let in_len = 501;\n let mut input: [Field; 4096] = [0; 4096];\n let mut fixed_input = [3; 501];\n assert(in_len == fixed_input.len()); // sanity check\n for i in 0..in_len {\n input[i] = 3;\n }\n let sub_chunk_hash = poseidon2_hash_subarray(input, in_len);\n let fixed_len_hash = poseidon::poseidon2::Poseidon2::hash(fixed_input, fixed_input.len());\n assert(sub_chunk_hash == fixed_len_hash);\n}\n\n#[test]\nfn poseidon_chunks_matches_variable() {\n let in_len = 501;\n let mut input: [Field; 4096] = [0; 4096];\n for i in 0..in_len {\n input[i] = 3;\n }\n let variable_chunk_hash = poseidon2_cheaper_variable_hash(input, in_len);\n let variable_len_hash = poseidon::poseidon2::Poseidon2::hash(input, in_len);\n assert(variable_chunk_hash == variable_len_hash);\n}\n\n#[test]\nfn existing_sponge_poseidon_chunks_matches_fixed() {\n let in_len = 501;\n let mut input: [Field; 4096] = [0; 4096];\n let mut fixed_input = [3; 501];\n assert(in_len == fixed_input.len()); // sanity check\n for i in 0..in_len {\n input[i] = 3;\n }\n // absorb 250 of the 501 things\n let empty_sponge = Poseidon2Sponge::new((in_len as Field) * TWO_POW_64);\n let first_sponge = poseidon2_absorb_chunks_existing_sponge(empty_sponge, input, 250, true);\n // now absorb the final 251 (since they are all 3s, im being lazy and not making a new array)\n let mut final_sponge = poseidon2_absorb_chunks_existing_sponge(first_sponge, input, 251, true);\n let fixed_len_hash = Poseidon2Sponge::hash(fixed_input, fixed_input.len());\n assert(final_sponge.squeeze() == fixed_len_hash);\n}\n\n#[test]\nfn poseidon_chunks_empty_inputs() {\n let in_len = 0;\n let mut input: [Field; 4096] = [0; 4096];\n let mut constructed_empty_sponge = poseidon2_absorb_chunks(input, in_len, true);\n let mut first_sponge =\n poseidon2_absorb_chunks_existing_sponge(constructed_empty_sponge, input, in_len, true);\n assert(first_sponge.squeeze() == constructed_empty_sponge.squeeze());\n}\n\n#[test]\nfn smoke_sha256_to_field() {\n let full_buffer = [\n 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24,\n 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47,\n 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70,\n 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93,\n 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112,\n 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130,\n 131, 132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145, 146, 147, 148,\n 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159,\n ];\n let result = sha256_to_field(full_buffer);\n\n assert(result == 0x448ebbc9e1a31220a2f3830c18eef61b9bd070e5084b7fa2a359fe729184c7);\n\n // to show correctness of the current ver (truncate one byte) vs old ver (mod full bytes):\n let result_bytes = sha256::digest(full_buffer);\n let truncated_field = crate::utils::field::field_from_bytes_32_trunc(result_bytes);\n assert(truncated_field == result);\n let mod_res = result + (result_bytes[31] as Field);\n assert(mod_res == 0x448ebbc9e1a31220a2f3830c18eef61b9bd070e5084b7fa2a359fe729184e0);\n}\n\n#[test]\nfn compute_l2_l1_hash() {\n // All zeroes\n let hash_result =\n compute_l2_to_l1_hash(AztecAddress::from_field(0), EthAddress::zero(), 0, 0, 0);\n assert(hash_result == 0xb393978842a0fa3d3e1470196f098f473f9678e72463cb65ec4ab5581856c2);\n\n // Non-zero case\n let hash_result = compute_l2_to_l1_hash(\n AztecAddress::from_field(1),\n EthAddress::from_field(3),\n 5,\n 2,\n 4,\n );\n assert(hash_result == 0x3f88c1044a05e5340ed20466276500f6d45ca5603913b9091e957161734e16);\n}\n\n#[test]\nfn silo_l2_to_l1_message_matches_typescript() {\n let version = 4;\n let chainId = 5;\n\n let hash = silo_l2_to_l1_message(\n ScopedL2ToL1Message {\n message: L2ToL1Message { recipient: EthAddress::from_field(1), content: 2, counter: 0 },\n contract_address: AztecAddress::from_field(3),\n },\n version,\n chainId,\n );\n\n // The following value was generated by `l2_to_l1_message.test.ts`\n let hash_from_typescript = 0x00c6155d69febb9d5039b374dd4f77bf57b7c881709aa524a18acaa0bd57476a;\n\n assert_eq(hash, hash_from_typescript);\n}\n"
2585
+ "source": "use crate::{\n abis::{\n contract_class_function_leaf_preimage::ContractClassFunctionLeafPreimage,\n contract_class_log::ContractClassLog,\n function_selector::FunctionSelector,\n note_hash::ScopedNoteHash,\n nullifier::ScopedNullifier,\n private_log::{PrivateLog, PrivateLogData},\n side_effect::{OrderedValue, scoped::Scoped},\n },\n address::{AztecAddress, EthAddress},\n constants::{\n CONTRACT_CLASS_LOG_SIZE_IN_FIELDS, FUNCTION_TREE_HEIGHT, GENERATOR_INDEX__NOTE_HASH_NONCE,\n GENERATOR_INDEX__OUTER_NULLIFIER, GENERATOR_INDEX__SILOED_NOTE_HASH,\n GENERATOR_INDEX__UNIQUE_NOTE_HASH, TWO_POW_64,\n },\n merkle_tree::root::root_from_sibling_path,\n messaging::l2_to_l1_message::{L2ToL1Message, ScopedL2ToL1Message},\n poseidon2::Poseidon2Sponge,\n traits::{FromField, Hash, ToField},\n utils::{arrays::array_concat, field::{field_from_bytes, field_from_bytes_32_trunc}},\n};\n\npub fn sha256_to_field<let N: u32>(bytes_to_hash: [u8; N]) -> Field {\n let sha256_hashed = sha256::digest(bytes_to_hash);\n let hash_in_a_field = field_from_bytes_32_trunc(sha256_hashed);\n\n hash_in_a_field\n}\n\npub fn private_functions_root_from_siblings(\n selector: FunctionSelector,\n vk_hash: Field,\n function_leaf_index: Field,\n function_leaf_sibling_path: [Field; FUNCTION_TREE_HEIGHT],\n) -> Field {\n let function_leaf_preimage = ContractClassFunctionLeafPreimage { selector, vk_hash };\n let function_leaf = function_leaf_preimage.hash();\n root_from_sibling_path(\n function_leaf,\n function_leaf_index,\n function_leaf_sibling_path,\n )\n}\n\npub fn compute_note_hash_nonce(first_nullifier_in_tx: Field, note_index_in_tx: u32) -> Field {\n // Hashing the first nullifier with note index in tx is guaranteed to be unique (because all nullifiers are also\n // unique).\n poseidon2_hash_with_separator(\n [first_nullifier_in_tx, note_index_in_tx as Field],\n GENERATOR_INDEX__NOTE_HASH_NONCE,\n )\n}\n\npub fn compute_unique_note_hash(nonce: Field, siloed_note_hash: Field) -> Field {\n let inputs = [nonce, siloed_note_hash];\n poseidon2_hash_with_separator(inputs, GENERATOR_INDEX__UNIQUE_NOTE_HASH)\n}\n\npub fn compute_siloed_note_hash(app: AztecAddress, note_hash: Field) -> Field {\n poseidon2_hash_with_separator(\n [app.to_field(), note_hash],\n GENERATOR_INDEX__SILOED_NOTE_HASH,\n )\n}\n\n/// Computes unique note hashes from siloed note hashes\npub fn compute_unique_siloed_note_hash(\n siloed_note_hash: Field,\n first_nullifier: Field,\n note_index_in_tx: u32,\n) -> Field {\n if siloed_note_hash == 0 {\n 0\n } else {\n let nonce = compute_note_hash_nonce(first_nullifier, note_index_in_tx);\n compute_unique_note_hash(nonce, siloed_note_hash)\n }\n}\n\n/// Siloing in the context of Aztec refers to the process of hashing a note hash with a contract address (this way\n/// the note hash is scoped to a specific contract). This is used to prevent intermingling of notes between contracts.\npub fn silo_note_hash(note_hash: ScopedNoteHash) -> Field {\n if note_hash.contract_address.is_zero() {\n 0\n } else {\n compute_siloed_note_hash(note_hash.contract_address, note_hash.value())\n }\n}\n\npub fn compute_siloed_nullifier(app: AztecAddress, nullifier: Field) -> Field {\n poseidon2_hash_with_separator(\n [app.to_field(), nullifier],\n GENERATOR_INDEX__OUTER_NULLIFIER,\n )\n}\n\npub fn silo_nullifier(nullifier: ScopedNullifier) -> Field {\n if nullifier.contract_address.is_zero() {\n nullifier.value() // Return value instead of 0 because the first nullifier's contract address is zero.\n } else {\n compute_siloed_nullifier(nullifier.contract_address, nullifier.value())\n }\n}\n\npub fn compute_siloed_private_log_field(contract_address: AztecAddress, field: Field) -> Field {\n poseidon2_hash([contract_address.to_field(), field])\n}\n\npub fn silo_private_log(private_log: Scoped<PrivateLogData>) -> PrivateLog {\n if private_log.contract_address.is_zero() {\n private_log.inner.log\n } else {\n let mut fields = private_log.inner.log.fields;\n fields[0] = compute_siloed_private_log_field(private_log.contract_address, fields[0]);\n PrivateLog::new(fields, private_log.inner.log.length)\n }\n}\n\npub fn compute_siloed_contract_class_log_field(\n contract_address: AztecAddress,\n first_field: Field,\n) -> Field {\n poseidon2_hash([contract_address.to_field(), first_field])\n}\n\npub fn silo_contract_class_log(contract_class_log: ContractClassLog) -> ContractClassLog {\n if contract_class_log.contract_address.is_zero() {\n contract_class_log\n } else {\n let mut log = contract_class_log;\n log.log.fields[0] = compute_siloed_contract_class_log_field(\n contract_class_log.contract_address,\n log.log.fields[0],\n );\n log\n }\n}\n\npub fn compute_contract_class_log_hash(log: [Field; CONTRACT_CLASS_LOG_SIZE_IN_FIELDS]) -> Field {\n poseidon2_hash(log)\n}\n\npub fn merkle_hash(left: Field, right: Field) -> Field {\n poseidon2_hash([left, right])\n}\n\npub fn compute_l2_to_l1_hash(\n contract_address: AztecAddress,\n recipient: EthAddress,\n content: Field,\n rollup_version_id: Field,\n chain_id: Field,\n) -> Field {\n let mut bytes: [u8; 160] = std::mem::zeroed();\n\n let inputs =\n [contract_address.to_field(), rollup_version_id, recipient.to_field(), chain_id, content];\n for i in 0..5 {\n // TODO are bytes be in fr.to_buffer() ?\n let item_bytes: [u8; 32] = inputs[i].to_be_bytes();\n for j in 0..32 {\n bytes[32 * i + j] = item_bytes[j];\n }\n }\n\n sha256_to_field(bytes)\n}\n\npub fn silo_l2_to_l1_message(\n msg: ScopedL2ToL1Message,\n rollup_version_id: Field,\n chain_id: Field,\n) -> Field {\n if msg.contract_address.is_zero() {\n 0\n } else {\n compute_l2_to_l1_hash(\n msg.contract_address,\n msg.message.recipient,\n msg.message.content,\n rollup_version_id,\n chain_id,\n )\n }\n}\n\n// Computes sha256 hash of 2 input hashes.\n//\n// NB: This method now takes in two 31 byte fields - it assumes that any input\n// is the result of a sha_to_field hash and => is truncated\n//\n// TODO(Jan and David): This is used for the encrypted_log hashes.\n// Can we check to see if we can just use hash_to_field or pedersen_compress here?\n//\npub fn accumulate_sha256(input: [Field; 2]) -> Field {\n // This is a note about the cpp code, since it takes an array of Fields\n // instead of a u128.\n // 4 Field elements when converted to bytes will usually\n // occupy 4 * 32 = 128 bytes.\n // However, this function is making the assumption that each Field\n // only occupies 128 bits.\n //\n // TODO(David): This does not seem to be getting guaranteed anywhere in the code?\n // Concatentate two fields into 32x2 = 64 bytes\n // accumulate_sha256 assumes that the inputs are pre-truncated 31 byte numbers\n let mut hash_input_flattened = [0; 64];\n for offset in 0..input.len() {\n let input_as_bytes: [u8; 32] = input[offset].to_be_bytes();\n for byte_index in 0..32 {\n hash_input_flattened[offset * 32 + byte_index] = input_as_bytes[byte_index];\n }\n }\n\n sha256_to_field(hash_input_flattened)\n}\n\npub fn verification_key_hash<let N: u32>(key: [Field; N]) -> Field {\n crate::hash::poseidon2_hash(key)\n}\n\n#[inline_always]\npub fn pedersen_hash<let N: u32>(inputs: [Field; N], hash_index: u32) -> Field {\n std::hash::pedersen_hash_with_separator(inputs, hash_index)\n}\n\npub fn poseidon2_hash<let N: u32>(inputs: [Field; N]) -> Field {\n poseidon::poseidon2::Poseidon2::hash(inputs, N)\n}\n\n#[no_predicates]\npub fn poseidon2_hash_with_separator<let N: u32, T>(inputs: [Field; N], separator: T) -> Field\nwhere\n T: ToField,\n{\n let inputs_with_separator = array_concat([separator.to_field()], inputs);\n poseidon2_hash(inputs_with_separator)\n}\n\n// Performs a fixed length hash with a subarray of the given input.\n// Useful for SpongeBlob in which we aborb M things and want to check it vs a hash of M elts of an N-len array.\n// Using stdlib poseidon, this will always absorb an extra 1 as a 'variable' hash, and not match spongeblob.squeeze()\n// or any ts implementation. Also checks that any remaining elts not hashed are empty.\n#[no_predicates]\npub fn poseidon2_hash_subarray<let N: u32>(input: [Field; N], in_len: u32) -> Field {\n let mut sponge = poseidon2_absorb_chunks(input, in_len, false);\n sponge.squeeze()\n}\n\n// NB the below is the same as poseidon::poseidon2::Poseidon2::hash(), but replacing a range check with a bit check,\n// and absorbing in chunks of 3 below.\n#[no_predicates]\npub fn poseidon2_cheaper_variable_hash<let N: u32>(input: [Field; N], in_len: u32) -> Field {\n let mut sponge = poseidon2_absorb_chunks(input, in_len, true);\n // In the case where the hash preimage is variable-length, we append `1` to the end of the input, to distinguish\n // from fixed-length hashes. (the combination of this additional field element + the hash IV ensures\n // fixed-length and variable-length hashes do not collide)\n if in_len != N {\n sponge.absorb(1);\n }\n sponge.squeeze()\n}\n\n// The below fn reduces gates of a conditional poseidon2 hash by approx 3x (thank you ~* Giant Brain Dev @IlyasRidhuan *~ for the idea)\n// Why? Because when we call stdlib poseidon, we call absorb for each item. When absorbing is conditional, it seems the compiler does not know\n// what cache_size will be when calling absorb, so it assigns the permutation gates for /each i/ rather than /every 3rd i/, which is actually required.\n// The below code forces the compiler to:\n// - absorb normally up to 2 times to set cache_size to 1\n// - absorb in chunks of 3 to ensure perm. only happens every 3rd absorb\n// - absorb normally up to 2 times to add any remaining values to the hash\n// In fixed len hashes, the compiler is able to tell that it will only need to perform the permutation every 3 absorbs.\n// NB: it also replaces unnecessary range checks (i < thing) with a bit check (&= i != thing), which alone reduces the gates of a var. hash by half.\n\n#[no_predicates]\nfn poseidon2_absorb_chunks<let N: u32>(\n input: [Field; N],\n in_len: u32,\n variable: bool,\n) -> Poseidon2Sponge {\n let iv: Field = (in_len as Field) * TWO_POW_64;\n let mut sponge = Poseidon2Sponge::new(iv);\n // Even though shift is always 1 here, if we input in_len = 0 we get an underflow\n // since we cannot isolate computation branches. The below is just to avoid that.\n let shift = if in_len == 0 { 0 } else { 1 };\n if in_len != 0 {\n // cache_size = 0, init absorb\n sponge.cache[0] = input[0];\n sponge.cache_size = 1;\n // shift = num elts already added to make cache_size 1 = 1 for a fresh sponge\n // M = max_chunks = (N - 1 - (N - 1) % 3) / 3: (must be written as a fn of N to compile)\n // max_remainder = (N - 1) % 3;\n // max_chunks = (N - 1 - max_remainder) / 3;\n sponge = poseidon2_absorb_chunks_loop::<N, (N - 1 - (N - 1) % 3) / 3>(\n sponge,\n input,\n in_len,\n variable,\n shift,\n );\n }\n sponge\n}\n\n// NB: If it's not required to check that the non-absorbed elts of 'input' are 0s, set skip_0_check=true\n#[no_predicates]\npub fn poseidon2_absorb_chunks_existing_sponge<let N: u32>(\n in_sponge: Poseidon2Sponge,\n input: [Field; N],\n in_len: u32,\n skip_0_check: bool,\n) -> Poseidon2Sponge {\n let mut sponge = in_sponge;\n // 'shift' is to account for already added inputs\n let mut shift = 0;\n // 'stop' is to avoid an underflow when inputting in_len = 0\n let mut stop = false;\n for i in 0..3 {\n if shift == in_len {\n stop = true;\n }\n if (sponge.cache_size != 1) & (!stop) {\n sponge.absorb(input[i]);\n shift += 1;\n }\n }\n sponge = if stop {\n sponge\n } else {\n // max_chunks = (N - (N % 3)) / 3;\n poseidon2_absorb_chunks_loop::<N, (N - (N % 3)) / 3>(\n sponge,\n input,\n in_len,\n skip_0_check,\n shift,\n )\n };\n sponge\n}\n\n// The below is the loop to absorb elts into a poseidon sponge in chunks of 3\n// shift - the num of elts already absorbed to ensure the sponge's cache_size = 1\n// M - the max number of chunks required to absorb N things (must be comptime to compile)\n// NB: The 0 checks ('Found non-zero field...') are messy, but having a separate loop over N to check\n// for 0s costs 3N gates. Current approach is approx 2N gates.\n#[no_predicates]\nfn poseidon2_absorb_chunks_loop<let N: u32, let M: u32>(\n in_sponge: Poseidon2Sponge,\n input: [Field; N],\n in_len: u32,\n variable: bool,\n shift: u32,\n) -> Poseidon2Sponge {\n assert(in_len <= N, \"Given in_len to absorb is larger than the input array len\");\n // When we have an existing sponge, we may have a shift of 0, and the final 'k+2' below = N\n // The below avoids an overflow\n let skip_last = 3 * M == N;\n // Writing in_sponge: &mut does not compile\n let mut sponge = in_sponge;\n let mut should_add = true;\n // The num of things left over after absorbing in 3s\n let remainder = (in_len - shift) % 3;\n // The num of chunks of 3 to absorb (maximum M)\n let chunks = (in_len - shift - remainder) / 3;\n for i in 0..M {\n // Now we loop through cache size = 1 -> 3\n should_add &= i != chunks;\n // This is the index at the start of the chunk (for readability)\n let k = 3 * i + shift;\n if should_add {\n // cache_size = 1, 2 => just assign\n sponge.cache[1] = input[k];\n sponge.cache[2] = input[k + 1];\n // cache_size = 3 => duplex + perm\n for j in 0..3 {\n sponge.state[j] += sponge.cache[j];\n }\n sponge.state = std::hash::poseidon2_permutation(sponge.state, 4);\n sponge.cache[0] = input[k + 2];\n // cache_size is now 1 again, repeat loop\n } else if (!variable) & (i != chunks) {\n // if we are hashing a fixed len array which is a subarray, we check the remaining elts are 0\n // NB: we don't check at i == chunks, because that chunk contains elts to be absorbed or checked below\n let last_0 = if (i == M - 1) & (skip_last) {\n 0\n } else {\n input[k + 2]\n };\n let all_0 = (input[k] == 0) & (input[k + 1] == 0) & (last_0 == 0);\n assert(all_0, \"Found non-zero field after breakpoint\");\n }\n }\n // we have 'remainder' num of items left to absorb\n should_add = true;\n // below is to avoid overflows (i.e. if inlen is close to N)\n let mut should_check = !variable;\n for i in 0..3 {\n should_add &= i != remainder;\n should_check &= in_len - remainder + i != N;\n if should_add {\n // we want to absorb the final 'remainder' items\n sponge.absorb(input[in_len - remainder + i]);\n } else if should_check {\n assert(input[in_len - remainder + i] == 0, \"Found non-zero field after breakpoint\");\n }\n }\n sponge\n}\n\npub fn poseidon2_hash_with_separator_slice<T>(inputs: [Field], separator: T) -> Field\nwhere\n T: ToField,\n{\n let in_len = inputs.len() + 1;\n let iv: Field = (in_len as Field) * TWO_POW_64;\n let mut sponge = Poseidon2Sponge::new(iv);\n sponge.absorb(separator.to_field());\n\n for i in 0..inputs.len() {\n sponge.absorb(inputs[i]);\n }\n\n sponge.squeeze()\n}\n\n#[no_predicates]\npub fn poseidon2_hash_bytes<let N: u32>(inputs: [u8; N]) -> Field {\n let mut fields = [0; (N + 30) / 31];\n let mut field_index = 0;\n let mut current_field = [0; 31];\n for i in 0..inputs.len() {\n let index = i % 31;\n current_field[index] = inputs[i];\n if index == 30 {\n fields[field_index] = field_from_bytes(current_field, false);\n current_field = [0; 31];\n field_index += 1;\n }\n }\n if field_index != fields.len() {\n fields[field_index] = field_from_bytes(current_field, false);\n }\n poseidon2_hash(fields)\n}\n\n#[test]\nfn poseidon_chunks_matches_fixed() {\n let in_len = 501;\n let mut input: [Field; 4096] = [0; 4096];\n let mut fixed_input = [3; 501];\n assert(in_len == fixed_input.len()); // sanity check\n for i in 0..in_len {\n input[i] = 3;\n }\n let sub_chunk_hash = poseidon2_hash_subarray(input, in_len);\n let fixed_len_hash = poseidon::poseidon2::Poseidon2::hash(fixed_input, fixed_input.len());\n assert(sub_chunk_hash == fixed_len_hash);\n}\n\n#[test]\nfn poseidon_chunks_matches_variable() {\n let in_len = 501;\n let mut input: [Field; 4096] = [0; 4096];\n for i in 0..in_len {\n input[i] = 3;\n }\n let variable_chunk_hash = poseidon2_cheaper_variable_hash(input, in_len);\n let variable_len_hash = poseidon::poseidon2::Poseidon2::hash(input, in_len);\n assert(variable_chunk_hash == variable_len_hash);\n}\n\n#[test]\nfn existing_sponge_poseidon_chunks_matches_fixed() {\n let in_len = 501;\n let mut input: [Field; 4096] = [0; 4096];\n let mut fixed_input = [3; 501];\n assert(in_len == fixed_input.len()); // sanity check\n for i in 0..in_len {\n input[i] = 3;\n }\n // absorb 250 of the 501 things\n let empty_sponge = Poseidon2Sponge::new((in_len as Field) * TWO_POW_64);\n let first_sponge = poseidon2_absorb_chunks_existing_sponge(empty_sponge, input, 250, true);\n // now absorb the final 251 (since they are all 3s, im being lazy and not making a new array)\n let mut final_sponge = poseidon2_absorb_chunks_existing_sponge(first_sponge, input, 251, true);\n let fixed_len_hash = Poseidon2Sponge::hash(fixed_input, fixed_input.len());\n assert(final_sponge.squeeze() == fixed_len_hash);\n}\n\n#[test]\nfn poseidon_chunks_empty_inputs() {\n let in_len = 0;\n let mut input: [Field; 4096] = [0; 4096];\n let mut constructed_empty_sponge = poseidon2_absorb_chunks(input, in_len, true);\n let mut first_sponge =\n poseidon2_absorb_chunks_existing_sponge(constructed_empty_sponge, input, in_len, true);\n assert(first_sponge.squeeze() == constructed_empty_sponge.squeeze());\n}\n\n#[test]\nfn smoke_sha256_to_field() {\n let full_buffer = [\n 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24,\n 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47,\n 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70,\n 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93,\n 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112,\n 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130,\n 131, 132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145, 146, 147, 148,\n 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159,\n ];\n let result = sha256_to_field(full_buffer);\n\n assert(result == 0x448ebbc9e1a31220a2f3830c18eef61b9bd070e5084b7fa2a359fe729184c7);\n\n // to show correctness of the current ver (truncate one byte) vs old ver (mod full bytes):\n let result_bytes = sha256::digest(full_buffer);\n let truncated_field = crate::utils::field::field_from_bytes_32_trunc(result_bytes);\n assert(truncated_field == result);\n let mod_res = result + (result_bytes[31] as Field);\n assert(mod_res == 0x448ebbc9e1a31220a2f3830c18eef61b9bd070e5084b7fa2a359fe729184e0);\n}\n\n#[test]\nfn compute_l2_l1_hash() {\n // All zeroes\n let hash_result =\n compute_l2_to_l1_hash(AztecAddress::from_field(0), EthAddress::zero(), 0, 0, 0);\n assert(hash_result == 0xb393978842a0fa3d3e1470196f098f473f9678e72463cb65ec4ab5581856c2);\n\n // Non-zero case\n let hash_result = compute_l2_to_l1_hash(\n AztecAddress::from_field(1),\n EthAddress::from_field(3),\n 5,\n 2,\n 4,\n );\n assert(hash_result == 0x3f88c1044a05e5340ed20466276500f6d45ca5603913b9091e957161734e16);\n}\n\n#[test]\nfn silo_l2_to_l1_message_matches_typescript() {\n let version = 4;\n let chainId = 5;\n\n let hash = silo_l2_to_l1_message(\n ScopedL2ToL1Message {\n message: L2ToL1Message { recipient: EthAddress::from_field(1), content: 2, counter: 0 },\n contract_address: AztecAddress::from_field(3),\n },\n version,\n chainId,\n );\n\n // The following value was generated by `l2_to_l1_message.test.ts`\n let hash_from_typescript = 0x00c6155d69febb9d5039b374dd4f77bf57b7c881709aa524a18acaa0bd57476a;\n\n assert_eq(hash, hash_from_typescript);\n}\n"
2513
2586
  },
2514
- "305": {
2587
+ "306": {
2515
2588
  "path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/poseidon2.nr",
2516
2589
  "source": "use crate::constants::TWO_POW_64;\n\n// NB: This is a clone of noir/noir-repo/noir_stdlib/src/hash/poseidon2.nr\n// It exists as we sometimes need to perform custom absorption, but the stdlib version\n// has a private absorb() method (it's also designed to just be a hasher)\n// Can be removed when standalone noir poseidon lib exists: See noir#6679\n\ncomptime global RATE: u32 = 3;\n\npub struct Poseidon2Sponge {\n pub cache: [Field; 3],\n pub state: [Field; 4],\n pub cache_size: u32,\n pub squeeze_mode: bool, // 0 => absorb, 1 => squeeze\n}\n\nimpl Poseidon2Sponge {\n #[no_predicates]\n pub fn hash<let N: u32>(input: [Field; N], message_size: u32) -> Field {\n Poseidon2Sponge::hash_internal(input, message_size, message_size != N)\n }\n\n pub(crate) fn new(iv: Field) -> Poseidon2Sponge {\n let mut result =\n Poseidon2Sponge { cache: [0; 3], state: [0; 4], cache_size: 0, squeeze_mode: false };\n result.state[RATE] = iv;\n result\n }\n\n fn perform_duplex(&mut self) {\n // add the cache into sponge state\n for i in 0..RATE {\n // We effectively zero-pad the cache by only adding to the state\n // cache that is less than the specified `cache_size`\n if i < self.cache_size {\n self.state[i] += self.cache[i];\n }\n }\n self.state = std::hash::poseidon2_permutation(self.state, 4);\n }\n\n pub fn absorb(&mut self, input: Field) {\n assert(!self.squeeze_mode);\n if self.cache_size == RATE {\n // If we're absorbing, and the cache is full, apply the sponge permutation to compress the cache\n self.perform_duplex();\n self.cache[0] = input;\n self.cache_size = 1;\n } else {\n // If we're absorbing, and the cache is not full, add the input into the cache\n self.cache[self.cache_size] = input;\n self.cache_size += 1;\n }\n }\n\n pub fn squeeze(&mut self) -> Field {\n assert(!self.squeeze_mode);\n // If we're in absorb mode, apply sponge permutation to compress the cache.\n self.perform_duplex();\n self.squeeze_mode = true;\n\n // Pop one item off the top of the permutation and return it.\n self.state[0]\n }\n\n fn hash_internal<let N: u32>(\n input: [Field; N],\n in_len: u32,\n is_variable_length: bool,\n ) -> Field {\n let iv: Field = (in_len as Field) * TWO_POW_64;\n let mut sponge = Poseidon2Sponge::new(iv);\n for i in 0..input.len() {\n if i < in_len {\n sponge.absorb(input[i]);\n }\n }\n\n // In the case where the hash preimage is variable-length, we append `1` to the end of the input, to distinguish\n // from fixed-length hashes. (the combination of this additional field element + the hash IV ensures\n // fixed-length and variable-length hashes do not collide)\n if is_variable_length {\n sponge.absorb(1);\n }\n sponge.squeeze()\n }\n}\n"
2517
2590
  },
2518
- "325": {
2591
+ "327": {
2519
2592
  "path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/storage/map.nr",
2520
2593
  "source": "use crate::{hash::poseidon2_hash, traits::ToField};\n\npub fn derive_storage_slot_in_map<K>(storage_slot: Field, key: K) -> Field\nwhere\n K: ToField,\n{\n poseidon2_hash([storage_slot, key.to_field()])\n}\n\nmod test {\n use crate::{address::AztecAddress, storage::map::derive_storage_slot_in_map, traits::FromField};\n\n #[test]\n fn test_derive_storage_slot_in_map_matches_typescript() {\n let map_slot = 0x132258fb6962c4387ba659d9556521102d227549a386d39f0b22d1890d59c2b5;\n let key = AztecAddress::from_field(\n 0x302dbc2f9b50a73283d5fb2f35bc01eae8935615817a0b4219a057b2ba8a5a3f,\n );\n\n let slot = derive_storage_slot_in_map(map_slot, key);\n\n // The following value was generated by `map_slot.test.ts`\n let slot_from_typescript =\n 0x15b9fe39449affd8b377461263e9d2b610b9ad40580553500b4e41d9cbd887ac;\n\n assert_eq(slot, slot_from_typescript);\n }\n}\n"
2521
2594
  },
2522
- "343": {
2595
+ "345": {
2523
2596
  "path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/type_packing.nr",
2524
2597
  "source": "use crate::traits::Packable;\n\nglobal BOOL_PACKED_LEN: u32 = 1;\nglobal U8_PACKED_LEN: u32 = 1;\nglobal U16_PACKED_LEN: u32 = 1;\nglobal U32_PACKED_LEN: u32 = 1;\nglobal U64_PACKED_LEN: u32 = 1;\nglobal U128_PACKED_LEN: u32 = 1;\nglobal FIELD_PACKED_LEN: u32 = 1;\nglobal I8_PACKED_LEN: u32 = 1;\nglobal I16_PACKED_LEN: u32 = 1;\nglobal I32_PACKED_LEN: u32 = 1;\nglobal I64_PACKED_LEN: u32 = 1;\n\nimpl Packable<BOOL_PACKED_LEN> for bool {\n fn pack(self) -> [Field; BOOL_PACKED_LEN] {\n [self as Field]\n }\n\n fn unpack(fields: [Field; BOOL_PACKED_LEN]) -> bool {\n fields[0] as bool\n }\n}\n\nimpl Packable<U8_PACKED_LEN> for u8 {\n fn pack(self) -> [Field; U8_PACKED_LEN] {\n [self as Field]\n }\n\n fn unpack(fields: [Field; U8_PACKED_LEN]) -> Self {\n fields[0] as u8\n }\n}\n\nimpl Packable<U16_PACKED_LEN> for u16 {\n fn pack(self) -> [Field; U16_PACKED_LEN] {\n [self as Field]\n }\n\n fn unpack(fields: [Field; U16_PACKED_LEN]) -> Self {\n fields[0] as u16\n }\n}\n\nimpl Packable<U32_PACKED_LEN> for u32 {\n fn pack(self) -> [Field; U32_PACKED_LEN] {\n [self as Field]\n }\n\n fn unpack(fields: [Field; U32_PACKED_LEN]) -> Self {\n fields[0] as u32\n }\n}\n\nimpl Packable<U64_PACKED_LEN> for u64 {\n fn pack(self) -> [Field; U64_PACKED_LEN] {\n [self as Field]\n }\n\n fn unpack(fields: [Field; U64_PACKED_LEN]) -> Self {\n fields[0] as u64\n }\n}\n\nimpl Packable<U128_PACKED_LEN> for u128 {\n fn pack(self) -> [Field; U128_PACKED_LEN] {\n [self as Field]\n }\n\n fn unpack(fields: [Field; U128_PACKED_LEN]) -> Self {\n fields[0] as u128\n }\n}\n\nimpl Packable<FIELD_PACKED_LEN> for Field {\n fn pack(self) -> [Field; FIELD_PACKED_LEN] {\n [self]\n }\n\n fn unpack(fields: [Field; FIELD_PACKED_LEN]) -> Self {\n fields[0]\n }\n}\n\nimpl Packable<I8_PACKED_LEN> for i8 {\n fn pack(self) -> [Field; I8_PACKED_LEN] {\n [self as Field]\n }\n\n fn unpack(fields: [Field; I8_PACKED_LEN]) -> Self {\n fields[0] as i8\n }\n}\n\nimpl Packable<I16_PACKED_LEN> for i16 {\n fn pack(self) -> [Field; I16_PACKED_LEN] {\n [self as Field]\n }\n\n fn unpack(fields: [Field; I16_PACKED_LEN]) -> Self {\n fields[0] as i16\n }\n}\n\nimpl Packable<I32_PACKED_LEN> for i32 {\n fn pack(self) -> [Field; I32_PACKED_LEN] {\n [self as Field]\n }\n\n fn unpack(fields: [Field; I32_PACKED_LEN]) -> Self {\n fields[0] as i32\n }\n}\n\nimpl Packable<I64_PACKED_LEN> for i64 {\n fn pack(self) -> [Field; I64_PACKED_LEN] {\n [self as Field]\n }\n\n fn unpack(fields: [Field; I64_PACKED_LEN]) -> Self {\n fields[0] as i64\n }\n}\n\nimpl<T, let N: u32, let M: u32> Packable<N * M> for [T; N]\nwhere\n T: Packable<M>,\n{\n fn pack(self) -> [Field; N * M] {\n let mut result: [Field; N * M] = std::mem::zeroed();\n let mut serialized: [Field; M] = std::mem::zeroed();\n for i in 0..N {\n serialized = self[i].pack();\n for j in 0..M {\n result[i * M + j] = serialized[j];\n }\n }\n result\n }\n\n fn unpack(fields: [Field; N * M]) -> Self {\n let mut reader = crate::utils::reader::Reader::new(fields);\n let mut result: [T; N] = std::mem::zeroed();\n reader.read_struct_array::<T, M, N>(Packable::unpack, result)\n }\n}\n\n#[test]\nfn test_u16_packing() {\n let a: u16 = 10;\n assert_eq(a, u16::unpack(a.pack()));\n}\n\n#[test]\nfn test_i8_packing() {\n let a: i8 = -10;\n assert_eq(a, i8::unpack(a.pack()));\n}\n\n#[test]\nfn test_i16_packing() {\n let a: i16 = -10;\n assert_eq(a, i16::unpack(a.pack()));\n}\n\n#[test]\nfn test_i32_packing() {\n let a: i32 = -10;\n assert_eq(a, i32::unpack(a.pack()));\n}\n\n#[test]\nfn test_i64_packing() {\n let a: i64 = -10;\n assert_eq(a, i64::unpack(a.pack()));\n}\n"
2525
2598
  },
2526
- "344": {
2599
+ "346": {
2527
2600
  "path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/type_serialization.nr",
2528
2601
  "source": "use crate::traits::{Deserialize, Serialize};\n\nglobal BOOL_SERIALIZED_LEN: u32 = 1;\nglobal U8_SERIALIZED_LEN: u32 = 1;\nglobal U16_SERIALIZED_LEN: u32 = 1;\nglobal U32_SERIALIZED_LEN: u32 = 1;\nglobal U64_SERIALIZED_LEN: u32 = 1;\nglobal U128_SERIALIZED_LEN: u32 = 1;\nglobal FIELD_SERIALIZED_LEN: u32 = 1;\nglobal I8_SERIALIZED_LEN: u32 = 1;\nglobal I16_SERIALIZED_LEN: u32 = 1;\nglobal I32_SERIALIZED_LEN: u32 = 1;\nglobal I64_SERIALIZED_LEN: u32 = 1;\n\nimpl Serialize<BOOL_SERIALIZED_LEN> for bool {\n fn serialize(self) -> [Field; BOOL_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<BOOL_SERIALIZED_LEN> for bool {\n fn deserialize(fields: [Field; BOOL_SERIALIZED_LEN]) -> bool {\n fields[0] as bool\n }\n}\n\nimpl Serialize<U8_SERIALIZED_LEN> for u8 {\n fn serialize(self) -> [Field; U8_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<U8_SERIALIZED_LEN> for u8 {\n fn deserialize(fields: [Field; U8_SERIALIZED_LEN]) -> Self {\n fields[0] as u8\n }\n}\n\nimpl Serialize<U16_SERIALIZED_LEN> for u16 {\n fn serialize(self) -> [Field; U16_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<U16_SERIALIZED_LEN> for u16 {\n fn deserialize(fields: [Field; U16_SERIALIZED_LEN]) -> Self {\n fields[0] as u16\n }\n}\n\nimpl Serialize<U32_SERIALIZED_LEN> for u32 {\n fn serialize(self) -> [Field; U32_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<U32_SERIALIZED_LEN> for u32 {\n fn deserialize(fields: [Field; U32_SERIALIZED_LEN]) -> Self {\n fields[0] as u32\n }\n}\n\nimpl Serialize<U64_SERIALIZED_LEN> for u64 {\n fn serialize(self) -> [Field; U64_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<U64_SERIALIZED_LEN> for u64 {\n fn deserialize(fields: [Field; U64_SERIALIZED_LEN]) -> Self {\n fields[0] as u64\n }\n}\n\nimpl Serialize<U128_SERIALIZED_LEN> for u128 {\n fn serialize(self) -> [Field; U128_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<U128_SERIALIZED_LEN> for u128 {\n fn deserialize(fields: [Field; U128_SERIALIZED_LEN]) -> Self {\n fields[0] as u128\n }\n}\n\nimpl Serialize<FIELD_SERIALIZED_LEN> for Field {\n fn serialize(self) -> [Field; FIELD_SERIALIZED_LEN] {\n [self]\n }\n}\n\nimpl Deserialize<FIELD_SERIALIZED_LEN> for Field {\n fn deserialize(fields: [Field; FIELD_SERIALIZED_LEN]) -> Self {\n fields[0]\n }\n}\n\nimpl Serialize<I8_SERIALIZED_LEN> for i8 {\n fn serialize(self) -> [Field; I8_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<I8_SERIALIZED_LEN> for i8 {\n fn deserialize(fields: [Field; I8_SERIALIZED_LEN]) -> Self {\n fields[0] as i8\n }\n}\n\nimpl Serialize<I16_SERIALIZED_LEN> for i16 {\n fn serialize(self) -> [Field; I16_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<I16_SERIALIZED_LEN> for i16 {\n fn deserialize(fields: [Field; I16_SERIALIZED_LEN]) -> Self {\n fields[0] as i16\n }\n}\n\nimpl Serialize<I32_SERIALIZED_LEN> for i32 {\n fn serialize(self) -> [Field; I32_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<I32_SERIALIZED_LEN> for i32 {\n fn deserialize(fields: [Field; I32_SERIALIZED_LEN]) -> Self {\n fields[0] as i32\n }\n}\n\nimpl Serialize<I64_SERIALIZED_LEN> for i64 {\n fn serialize(self) -> [Field; I64_SERIALIZED_LEN] {\n [self as Field]\n }\n}\n\nimpl Deserialize<I64_SERIALIZED_LEN> for i64 {\n fn deserialize(fields: [Field; I64_SERIALIZED_LEN]) -> Self {\n fields[0] as i64\n }\n}\n\nimpl<T, let N: u32, let M: u32> Serialize<N * M> for [T; N]\nwhere\n T: Serialize<M>,\n{\n fn serialize(self) -> [Field; N * M] {\n let mut result: [Field; N * M] = std::mem::zeroed();\n let mut serialized: [Field; M] = std::mem::zeroed();\n for i in 0..N {\n serialized = self[i].serialize();\n for j in 0..M {\n result[i * M + j] = serialized[j];\n }\n }\n result\n }\n}\n\nimpl<T, let N: u32, let M: u32> Deserialize<N * M> for [T; N]\nwhere\n T: Deserialize<M>,\n{\n fn deserialize(fields: [Field; N * M]) -> Self {\n let mut reader = crate::utils::reader::Reader::new(fields);\n let mut result: [T; N] = std::mem::zeroed();\n reader.read_struct_array::<T, M, N>(Deserialize::deserialize, result)\n }\n}\n\n#[test]\nfn test_u16_serialization() {\n let a: u16 = 10;\n assert_eq(a, u16::deserialize(a.serialize()));\n}\n\n#[test]\nfn test_i8_serialization() {\n let a: i8 = -10;\n assert_eq(a, i8::deserialize(a.serialize()));\n}\n\n#[test]\nfn test_i16_serialization() {\n let a: i16 = -10;\n assert_eq(a, i16::deserialize(a.serialize()));\n}\n\n#[test]\nfn test_i32_serialization() {\n let a: i32 = -10;\n assert_eq(a, i32::deserialize(a.serialize()));\n}\n\n#[test]\nfn test_i64_serialization() {\n let a: i64 = -10;\n assert_eq(a, i64::deserialize(a.serialize()));\n}\n"
2529
2602
  },
2530
- "360": {
2603
+ "362": {
2531
2604
  "path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/utils/arrays.nr",
2532
- "source": "pub mod assert_array_appended;\npub mod assert_array_prepended;\npub mod assert_combined_array;\npub mod assert_combined_transformed_array;\npub mod assert_exposed_sorted_transformed_value_array;\npub mod assert_sorted_array;\npub mod assert_sorted_transformed_value_array;\npub mod assert_split_sorted_transformed_value_arrays;\npub mod assert_split_transformed_value_arrays;\npub mod get_sorted_result;\npub mod get_sorted_tuple;\npub mod sort_by;\npub mod sort_by_counter;\n\n// Re-exports.\npub use assert_array_appended::{\n assert_array_appended, assert_array_appended_and_scoped, assert_array_appended_reversed,\n assert_array_appended_scoped,\n};\npub use assert_array_prepended::assert_array_prepended;\npub use assert_combined_array::{assert_combined_array, combine_arrays};\npub use assert_combined_transformed_array::{\n assert_combined_transformed_array, combine_and_transform_arrays,\n};\npub use assert_exposed_sorted_transformed_value_array::{\n assert_exposed_sorted_transformed_value_array,\n get_order_hints::{get_order_hints_asc, get_order_hints_desc, OrderHint},\n};\npub use assert_sorted_array::assert_sorted_array;\npub use assert_sorted_transformed_value_array::{\n assert_sorted_transformed_value_array, assert_sorted_transformed_value_array_capped_size,\n};\npub use assert_split_sorted_transformed_value_arrays::{\n assert_split_sorted_transformed_value_arrays_asc,\n assert_split_sorted_transformed_value_arrays_desc,\n get_split_order_hints::{get_split_order_hints_asc, get_split_order_hints_desc, SplitOrderHints},\n};\npub use assert_split_transformed_value_arrays::assert_split_transformed_value_arrays;\npub use get_sorted_result::{get_sorted_result, SortedResult};\npub use sort_by_counter::{sort_by_counter_asc, sort_by_counter_desc};\n\nuse crate::traits::{Empty, is_empty};\n\npub fn subarray<let SRC_LEN: u32, let DST_LEN: u32>(\n src: [Field; SRC_LEN],\n offset: u32,\n) -> [Field; DST_LEN] {\n assert(offset + DST_LEN <= SRC_LEN, \"offset too large\");\n\n let mut dst: [Field; DST_LEN] = std::mem::zeroed();\n for i in 0..DST_LEN {\n dst[i] = src[i + offset];\n }\n\n dst\n}\n\n// Helper function to convert a validated array to BoundedVec.\n// Important: Only use it for validated arrays: validate_array(array) should be true.\npub unconstrained fn array_to_bounded_vec<T, let N: u32>(array: [T; N]) -> BoundedVec<T, N>\nwhere\n T: Empty + Eq,\n{\n let len = array_length(array);\n BoundedVec::from_parts_unchecked(array, len)\n}\n\n// Helper function to find the index of the first element in an array that satisfies a given predicate. If the element\n// is not found, the function returns N as the index.\npub unconstrained fn find_index_hint<T, let N: u32, Env>(\n array: [T; N],\n find: fn[Env](T) -> bool,\n) -> u32 {\n let mut index = N;\n for i in 0..N {\n // We check `index == N` to ensure that we only update the index if we haven't found a match yet.\n if (index == N) & find(array[i]) {\n index = i;\n }\n }\n index\n}\n\n// Routine which validates that all zero values of an array form a contiguous region at the end, i.e.,\n// of the form: [*,*,*...,0,0,0,0] where any * is non-zero. Note that a full array of non-zero values is\n// valid.\npub fn validate_array<T, let N: u32>(array: [T; N]) -> u32\nwhere\n T: Empty + Eq,\n{\n let mut seen_empty = false;\n let mut length = 0;\n for i in 0..N {\n if is_empty(array[i]) {\n seen_empty = true;\n } else {\n assert(seen_empty == false, \"invalid array\");\n length += 1;\n }\n }\n length\n}\n\n// Helper function to count the number of non-empty elements in a validated array.\n// Important: Only use it for validated arrays where validate_array(array) returns true,\n// which ensures that:\n// 1. All elements before the first empty element are non-empty\n// 2. All elements after and including the first empty element are empty\n// 3. The array forms a contiguous sequence of non-empty elements followed by empty elements\npub fn array_length<T, let N: u32>(array: [T; N]) -> u32\nwhere\n T: Empty + Eq,\n{\n // We get the length by checking the index of the first empty element.\n\n // Safety: This is safe because we have validated the array (see function doc above) and the emptiness\n // of the element and non-emptiness of the previous element is checked below.\n let length = unsafe { find_index_hint(array, |elem: T| is_empty(elem)) };\n if length != 0 {\n assert(!is_empty(array[length - 1]));\n }\n if length != N {\n assert(is_empty(array[length]));\n }\n length\n}\n\npub fn array_concat<T, let N: u32, let M: u32>(array1: [T; N], array2: [T; M]) -> [T; N + M] {\n let mut result = [array1[0]; N + M];\n for i in 1..N {\n result[i] = array1[i];\n }\n for i in 0..M {\n result[i + N] = array2[i];\n }\n result\n}\n/// This function assumes that `array1` and `array2` contain no more than N non-empty elements between them,\n/// if this is not the case then elements from the end of `array2` will be dropped.\npub fn array_merge<T, let N: u32>(array1: [T; N], array2: [T; N]) -> [T; N]\nwhere\n T: Empty + Eq,\n{\n // Safety: we constrain this array below\n let result = unsafe { array_merge_helper(array1, array2) };\n // We assume arrays have been validated. The only use cases so far are with previously validated arrays.\n let array1_len = array_length(array1);\n let mut add_from_left = true;\n for i in 0..N {\n add_from_left &= i != array1_len;\n if add_from_left {\n assert_eq(result[i], array1[i]);\n } else {\n assert_eq(result[i], array2[i - array1_len]);\n }\n }\n result\n}\n\nunconstrained fn array_merge_helper<T, let N: u32>(array1: [T; N], array2: [T; N]) -> [T; N]\nwhere\n T: Empty + Eq,\n{\n let mut result: [T; N] = [T::empty(); N];\n let mut i = 0;\n for elem in array1 {\n if !is_empty(elem) {\n result[i] = elem;\n i += 1;\n }\n }\n for elem in array2 {\n if !is_empty(elem) {\n result[i] = elem;\n i += 1;\n }\n }\n result\n}\n\n// Helper fn to create a subarray from a given array\npub fn array_splice<T, let N: u32, let M: u32>(array: [T; N], offset: u32) -> [T; M]\nwhere\n T: Empty,\n{\n assert(M + offset <= N, \"Subarray length larger than array length\");\n let mut result: [T; M] = [T::empty(); M];\n for i in 0..M {\n result[i] = array[offset + i];\n }\n result\n}\n\npub fn check_permutation<T, let N: u32>(\n original_array: [T; N],\n permuted_array: [T; N],\n original_indexes: [u32; N],\n)\nwhere\n T: Eq + Empty,\n{\n let mut seen_value = [false; N];\n for i in 0..N {\n let index = original_indexes[i];\n let original_value = original_array[index];\n assert(permuted_array[i].eq(original_value), \"Invalid index\");\n assert(!seen_value[index], \"Duplicated index\");\n seen_value[index] = true;\n }\n}\n\n// Helper function to find the index of the last element in an array, allowing empty elements.\n// e.g. useful for removing trailing 0s from [1, 0, 2, 0, 0, 0] -> [1, 0, 2]\n// Nothing to do with validated arrays. Correctness constrained by padded_array_length.\npub unconstrained fn find_last_value_index<T, let N: u32>(array: [T; N]) -> u32\nwhere\n T: Empty + Eq,\n{\n let mut index = N;\n for i in 0..N {\n let j = N - i - 1;\n // We check `index == N` to ensure that we only update the index if we haven't found a match yet.\n if (index == N) & !is_empty(array[j]) {\n index = j;\n }\n }\n index\n}\n\n// Routine which returns the length of an array right padded by empty elements\n// of the form: [*,*,*...,0,0,0,0] where * is any value (zeroes allowed).\n// See smoke_validate_array_trailing for examples.\n// Nothing to do with validated arrays. Correctness constrained by padded_array_length.\npub unconstrained fn unsafe_padded_array_length<T, let N: u32>(array: [T; N]) -> u32\nwhere\n T: Empty + Eq,\n{\n let index = find_last_value_index(array);\n if index == N {\n 0\n } else {\n index + 1\n }\n}\n\n// Routine which validates that zero values of an array form a contiguous region at the end, i.e.,\n// of the form: [*,*,*...,0,0,0,0] where * is any value (zeroes allowed).\npub fn padded_array_length<T, let N: u32>(array: [T; N]) -> u32\nwhere\n T: Empty + Eq,\n{\n // Safety: this value is constrained in the below loop.\n let length = unsafe { unsafe_padded_array_length(array) };\n // Check the elt just before length is non-zero:\n if length != 0 {\n assert(!is_empty(array[length - 1]), \"invalid right padded array\");\n }\n // Check all beyond length are zero:\n let mut check_zero = false;\n for i in 0..N {\n check_zero |= i == length;\n if check_zero {\n assert(is_empty(array[i]), \"invalid right padded array\");\n }\n }\n length\n}\n\n#[test]\nfn smoke_validate_array() {\n let valid_array: [Field; 0] = [];\n assert(validate_array(valid_array) == 0);\n\n let valid_array = [0];\n assert(validate_array(valid_array) == 0);\n\n let valid_array = [3];\n assert(validate_array(valid_array) == 1);\n\n let valid_array = [1, 2, 3];\n assert(validate_array(valid_array) == 3);\n\n let valid_array = [1, 2, 3, 0];\n assert(validate_array(valid_array) == 3);\n\n let valid_array = [1, 2, 3, 0, 0];\n assert(validate_array(valid_array) == 3);\n}\n\n#[test]\nfn smoke_validate_array_trailing() {\n let valid_array: [Field; 0] = [];\n assert(padded_array_length(valid_array) == 0);\n\n let valid_array = [0];\n assert(padded_array_length(valid_array) == 0);\n\n let valid_array = [3];\n assert(padded_array_length(valid_array) == 1);\n\n let valid_array = [1, 0, 3];\n assert(padded_array_length(valid_array) == 3);\n\n let valid_array = [1, 0, 3, 0];\n assert(padded_array_length(valid_array) == 3);\n\n let valid_array = [1, 2, 3, 0, 0];\n assert(padded_array_length(valid_array) == 3);\n\n let valid_array = [0, 0, 3, 0, 0];\n assert(padded_array_length(valid_array) == 3);\n}\n\n#[test(should_fail_with = \"invalid array\")]\nfn smoke_validate_array_invalid_case0() {\n let invalid_array = [0, 1];\n let _ = validate_array(invalid_array);\n}\n\n#[test(should_fail_with = \"invalid array\")]\nfn smoke_validate_array_invalid_case1() {\n let invalid_array = [1, 0, 0, 1, 0];\n let _ = validate_array(invalid_array);\n}\n\n#[test(should_fail_with = \"invalid array\")]\nfn smoke_validate_array_invalid_case2() {\n let invalid_array = [0, 0, 0, 0, 1];\n let _ = validate_array(invalid_array);\n}\n\n#[test]\nfn test_empty_array_length() {\n assert_eq(array_length([0]), 0);\n assert_eq(array_length([0, 0, 0]), 0);\n}\n\n#[test]\nfn test_array_length() {\n assert_eq(array_length([123]), 1);\n assert_eq(array_length([123, 0, 0]), 1);\n assert_eq(array_length([123, 456]), 2);\n assert_eq(array_length([123, 456, 0]), 2);\n}\n\n#[test]\nfn test_array_length_invalid_arrays() {\n // Result can be misleading (but correct) for invalid arrays.\n assert_eq(array_length([0, 0, 123]), 0);\n assert_eq(array_length([0, 123, 0]), 0);\n assert_eq(array_length([0, 123, 456]), 0);\n assert_eq(array_length([123, 0, 456]), 1);\n}\n\n#[test]\nunconstrained fn find_index_greater_than_min() {\n let values = [10, 20, 30, 40];\n let min = 22;\n let index = find_index_hint(values, |v: Field| min.lt(v));\n assert_eq(index, 2);\n}\n\n#[test]\nunconstrained fn find_index_not_found() {\n let values = [10, 20, 30, 40];\n let min = 100;\n let index = find_index_hint(values, |v: Field| min.lt(v));\n assert_eq(index, 4);\n}\n\n#[test]\nfn test_array_concat() {\n let array0 = [1, 2, 3];\n let array1 = [4, 5];\n let concatenated = array_concat(array0, array1);\n assert_eq(concatenated, [1, 2, 3, 4, 5]);\n}\n\n#[test]\nfn check_permutation_basic_test() {\n let original_array = [1, 2, 3];\n let permuted_array = [3, 1, 2];\n let indexes = [2, 0, 1];\n check_permutation(original_array, permuted_array, indexes);\n}\n\n#[test(should_fail_with = \"Duplicated index\")]\nfn check_permutation_duplicated_index() {\n let original_array = [0, 1, 0];\n let permuted_array = [1, 0, 0];\n let indexes = [1, 0, 0];\n check_permutation(original_array, permuted_array, indexes);\n}\n\n#[test(should_fail_with = \"Invalid index\")]\nfn check_permutation_invalid_index() {\n let original_array = [0, 1, 2];\n let permuted_array = [1, 0, 0];\n let indexes = [1, 0, 2];\n check_permutation(original_array, permuted_array, indexes);\n}\n"
2605
+ "source": "pub mod assert_array_appended;\npub mod assert_array_prepended;\npub mod assert_combined_array;\npub mod assert_combined_transformed_array;\npub mod assert_exposed_sorted_transformed_value_array;\npub mod assert_sorted_array;\npub mod assert_sorted_transformed_value_array;\npub mod assert_split_sorted_transformed_value_arrays;\npub mod assert_split_transformed_value_arrays;\npub mod get_sorted_result;\npub mod get_sorted_tuple;\npub mod sort_by;\npub mod sort_by_counter;\n\n// Re-exports.\npub use assert_array_appended::{\n assert_array_appended, assert_array_appended_and_scoped, assert_array_appended_reversed,\n assert_array_appended_scoped,\n};\npub use assert_array_prepended::assert_array_prepended;\npub use assert_combined_array::{assert_combined_array, combine_arrays};\npub use assert_combined_transformed_array::{\n assert_combined_transformed_array, combine_and_transform_arrays,\n};\npub use assert_exposed_sorted_transformed_value_array::{\n assert_exposed_sorted_transformed_value_array,\n get_order_hints::{get_order_hints_asc, OrderHint},\n};\npub use assert_sorted_array::assert_sorted_array;\npub use assert_sorted_transformed_value_array::{\n assert_sorted_transformed_value_array, assert_sorted_transformed_value_array_capped_size,\n};\npub use assert_split_sorted_transformed_value_arrays::{\n assert_split_sorted_transformed_value_arrays_asc,\n get_split_order_hints::{get_split_order_hints_asc, SplitOrderHints},\n};\npub use assert_split_transformed_value_arrays::assert_split_transformed_value_arrays;\npub use get_sorted_result::{get_sorted_result, SortedResult};\npub use sort_by_counter::sort_by_counter_asc;\n\nuse crate::traits::{Empty, is_empty};\n\npub fn subarray<let SRC_LEN: u32, let DST_LEN: u32>(\n src: [Field; SRC_LEN],\n offset: u32,\n) -> [Field; DST_LEN] {\n assert(offset + DST_LEN <= SRC_LEN, \"offset too large\");\n\n let mut dst: [Field; DST_LEN] = std::mem::zeroed();\n for i in 0..DST_LEN {\n dst[i] = src[i + offset];\n }\n\n dst\n}\n\n// Helper function to convert a validated array to BoundedVec.\n// Important: Only use it for validated arrays: validate_array(array) should be true.\npub unconstrained fn array_to_bounded_vec<T, let N: u32>(array: [T; N]) -> BoundedVec<T, N>\nwhere\n T: Empty + Eq,\n{\n let len = array_length(array);\n BoundedVec::from_parts_unchecked(array, len)\n}\n\n// Helper function to find the index of the first element in an array that satisfies a given predicate. If the element\n// is not found, the function returns N as the index.\npub unconstrained fn find_index_hint<T, let N: u32, Env>(\n array: [T; N],\n find: fn[Env](T) -> bool,\n) -> u32 {\n let mut index = N;\n for i in 0..N {\n // We check `index == N` to ensure that we only update the index if we haven't found a match yet.\n if (index == N) & find(array[i]) {\n index = i;\n }\n }\n index\n}\n\n// Routine which validates that all zero values of an array form a contiguous region at the end, i.e.,\n// of the form: [*,*,*...,0,0,0,0] where any * is non-zero. Note that a full array of non-zero values is\n// valid.\npub fn validate_array<T, let N: u32>(array: [T; N]) -> u32\nwhere\n T: Empty + Eq,\n{\n let mut seen_empty = false;\n let mut length = 0;\n for i in 0..N {\n if is_empty(array[i]) {\n seen_empty = true;\n } else {\n assert(seen_empty == false, \"invalid array\");\n length += 1;\n }\n }\n length\n}\n\n// Helper function to count the number of non-empty elements in a validated array.\n// Important: Only use it for validated arrays where validate_array(array) returns true,\n// which ensures that:\n// 1. All elements before the first empty element are non-empty\n// 2. All elements after and including the first empty element are empty\n// 3. The array forms a contiguous sequence of non-empty elements followed by empty elements\npub fn array_length<T, let N: u32>(array: [T; N]) -> u32\nwhere\n T: Empty + Eq,\n{\n // We get the length by checking the index of the first empty element.\n\n // Safety: This is safe because we have validated the array (see function doc above) and the emptiness\n // of the element and non-emptiness of the previous element is checked below.\n let length = unsafe { find_index_hint(array, |elem: T| is_empty(elem)) };\n if length != 0 {\n assert(!is_empty(array[length - 1]));\n }\n if length != N {\n assert(is_empty(array[length]));\n }\n length\n}\n\n// Returns the number of consecutive elements at the start of the array for which the predicate returns false.\n// This function ensures that any element after the first matching element (predicate returns true) also matches the predicate.\npub fn array_length_until<T, let N: u32, Env>(array: [T; N], predicate: fn[Env](T) -> bool) -> u32 {\n let mut length = 0;\n let mut stop = false;\n for i in 0..N {\n if predicate(array[i]) {\n stop = true;\n } else {\n assert(\n stop == false,\n \"matching element found after already encountering a non-matching element\",\n );\n length += 1;\n }\n }\n length\n}\n\npub fn array_concat<T, let N: u32, let M: u32>(array1: [T; N], array2: [T; M]) -> [T; N + M] {\n let mut result = [array1[0]; N + M];\n for i in 1..N {\n result[i] = array1[i];\n }\n for i in 0..M {\n result[i + N] = array2[i];\n }\n result\n}\n\n/// This function assumes that `array1` and `array2` contain no more than N non-empty elements between them,\n/// if this is not the case then elements from the end of `array2` will be dropped.\npub fn array_merge<T, let N: u32>(array1: [T; N], array2: [T; N]) -> [T; N]\nwhere\n T: Empty + Eq,\n{\n // Safety: we constrain this array below\n let result = unsafe { array_merge_helper(array1, array2) };\n // We assume arrays have been validated. The only use cases so far are with previously validated arrays.\n let array1_len = array_length(array1);\n let mut add_from_left = true;\n for i in 0..N {\n add_from_left &= i != array1_len;\n if add_from_left {\n assert_eq(result[i], array1[i]);\n } else {\n assert_eq(result[i], array2[i - array1_len]);\n }\n }\n result\n}\n\nunconstrained fn array_merge_helper<T, let N: u32>(array1: [T; N], array2: [T; N]) -> [T; N]\nwhere\n T: Empty + Eq,\n{\n let mut result: [T; N] = [T::empty(); N];\n let mut i = 0;\n for elem in array1 {\n if !is_empty(elem) {\n result[i] = elem;\n i += 1;\n }\n }\n for elem in array2 {\n if !is_empty(elem) {\n result[i] = elem;\n i += 1;\n }\n }\n result\n}\n\n// Helper fn to create a subarray from a given array\npub fn array_splice<T, let N: u32, let M: u32>(array: [T; N], offset: u32) -> [T; M]\nwhere\n T: Empty,\n{\n assert(M + offset <= N, \"Subarray length larger than array length\");\n let mut result: [T; M] = [T::empty(); M];\n for i in 0..M {\n result[i] = array[offset + i];\n }\n result\n}\n\npub fn check_permutation<T, let N: u32>(\n original_array: [T; N],\n permuted_array: [T; N],\n original_indexes: [u32; N],\n)\nwhere\n T: Eq + Empty,\n{\n let mut seen_value = [false; N];\n for i in 0..N {\n let index = original_indexes[i];\n let original_value = original_array[index];\n assert(permuted_array[i].eq(original_value), \"Invalid index\");\n assert(!seen_value[index], \"Duplicated index\");\n seen_value[index] = true;\n }\n}\n\n// Helper function to find the index of the last element in an array, allowing empty elements.\n// e.g. useful for removing trailing 0s from [1, 0, 2, 0, 0, 0] -> [1, 0, 2]\n// Nothing to do with validated arrays. Correctness constrained by padded_array_length.\npub unconstrained fn find_last_value_index<T, let N: u32>(array: [T; N]) -> u32\nwhere\n T: Empty + Eq,\n{\n let mut index = N;\n for i in 0..N {\n let j = N - i - 1;\n // We check `index == N` to ensure that we only update the index if we haven't found a match yet.\n if (index == N) & !is_empty(array[j]) {\n index = j;\n }\n }\n index\n}\n\n// Routine which returns the length of an array right padded by empty elements\n// of the form: [*,*,*...,0,0,0,0] where * is any value (zeroes allowed).\n// See smoke_validate_array_trailing for examples.\n// Nothing to do with validated arrays. Correctness constrained by padded_array_length.\npub unconstrained fn unsafe_padded_array_length<T, let N: u32>(array: [T; N]) -> u32\nwhere\n T: Empty + Eq,\n{\n let index = find_last_value_index(array);\n if index == N {\n 0\n } else {\n index + 1\n }\n}\n\n// Routine which validates that zero values of an array form a contiguous region at the end, i.e.,\n// of the form: [*,*,*...,0,0,0,0] where * is any value (zeroes allowed).\npub fn padded_array_length<T, let N: u32>(array: [T; N]) -> u32\nwhere\n T: Empty + Eq,\n{\n // Safety: this value is constrained in the below loop.\n let length = unsafe { unsafe_padded_array_length(array) };\n // Check the elt just before length is non-zero:\n if length != 0 {\n assert(!is_empty(array[length - 1]), \"invalid right padded array\");\n }\n // Check all beyond length are zero:\n let mut check_zero = false;\n for i in 0..N {\n check_zero |= i == length;\n if check_zero {\n assert(is_empty(array[i]), \"invalid right padded array\");\n }\n }\n length\n}\n\n// Helper function to check if an array is padded with a given value from a given index.\n// Different to padded_array_length in that it allows the elements before the given index to be the same as the padded value.\npub fn array_padded_with<T, let N: u32>(array: [T; N], from_index: u32, padded_with: T) -> bool\nwhere\n T: Eq,\n{\n let mut is_valid = true;\n let mut should_check = false;\n for i in 0..N {\n should_check |= i == from_index;\n is_valid &= !should_check | (array[i] == padded_with);\n }\n is_valid\n}\n\n#[test]\nfn smoke_validate_array() {\n let valid_array: [Field; 0] = [];\n assert(validate_array(valid_array) == 0);\n\n let valid_array = [0];\n assert(validate_array(valid_array) == 0);\n\n let valid_array = [3];\n assert(validate_array(valid_array) == 1);\n\n let valid_array = [1, 2, 3];\n assert(validate_array(valid_array) == 3);\n\n let valid_array = [1, 2, 3, 0];\n assert(validate_array(valid_array) == 3);\n\n let valid_array = [1, 2, 3, 0, 0];\n assert(validate_array(valid_array) == 3);\n}\n\n#[test]\nfn smoke_validate_array_trailing() {\n let valid_array: [Field; 0] = [];\n assert(padded_array_length(valid_array) == 0);\n\n let valid_array = [0];\n assert(padded_array_length(valid_array) == 0);\n\n let valid_array = [3];\n assert(padded_array_length(valid_array) == 1);\n\n let valid_array = [1, 0, 3];\n assert(padded_array_length(valid_array) == 3);\n\n let valid_array = [1, 0, 3, 0];\n assert(padded_array_length(valid_array) == 3);\n\n let valid_array = [1, 2, 3, 0, 0];\n assert(padded_array_length(valid_array) == 3);\n\n let valid_array = [0, 0, 3, 0, 0];\n assert(padded_array_length(valid_array) == 3);\n}\n\n#[test(should_fail_with = \"invalid array\")]\nfn smoke_validate_array_invalid_case0() {\n let invalid_array = [0, 1];\n let _ = validate_array(invalid_array);\n}\n\n#[test(should_fail_with = \"invalid array\")]\nfn smoke_validate_array_invalid_case1() {\n let invalid_array = [1, 0, 0, 1, 0];\n let _ = validate_array(invalid_array);\n}\n\n#[test(should_fail_with = \"invalid array\")]\nfn smoke_validate_array_invalid_case2() {\n let invalid_array = [0, 0, 0, 0, 1];\n let _ = validate_array(invalid_array);\n}\n\n#[test]\nfn test_empty_array_length() {\n assert_eq(array_length([0]), 0);\n assert_eq(array_length([0, 0, 0]), 0);\n}\n\n#[test]\nfn test_array_length() {\n assert_eq(array_length([123]), 1);\n assert_eq(array_length([123, 0, 0]), 1);\n assert_eq(array_length([123, 456]), 2);\n assert_eq(array_length([123, 456, 0]), 2);\n}\n\n#[test]\nfn test_array_length_invalid_arrays() {\n // Result can be misleading (but correct) for invalid arrays.\n assert_eq(array_length([0, 0, 123]), 0);\n assert_eq(array_length([0, 123, 0]), 0);\n assert_eq(array_length([0, 123, 456]), 0);\n assert_eq(array_length([123, 0, 456]), 1);\n}\n\n#[test]\nfn test_array_length_until() {\n let array = [11, 22, 33, 44, 55];\n assert_eq(array_length_until(array, |x| x == 55), 4);\n assert_eq(array_length_until(array, |x| x == 56), 5);\n assert_eq(array_length_until(array, |x| x > 40), 3);\n assert_eq(array_length_until(array, |x| x > 10), 0);\n}\n\n#[test(should_fail_with = \"matching element found after already encountering a non-matching element\")]\nfn test_array_length_until_non_consecutive_fails() {\n let array = [1, 1, 0, 1, 0];\n let _ = array_length_until(array, |x| x == 0);\n}\n\n#[test(should_fail_with = \"matching element found after already encountering a non-matching element\")]\nfn test_array_length_until_first_non_matching_fails() {\n let array = [1, 0, 0, 0, 0];\n let _ = array_length_until(array, |x| x == 1);\n}\n\n#[test]\nunconstrained fn find_index_greater_than_min() {\n let values = [10, 20, 30, 40];\n let min = 22;\n let index = find_index_hint(values, |v: Field| min.lt(v));\n assert_eq(index, 2);\n}\n\n#[test]\nunconstrained fn find_index_not_found() {\n let values = [10, 20, 30, 40];\n let min = 100;\n let index = find_index_hint(values, |v: Field| min.lt(v));\n assert_eq(index, 4);\n}\n\n#[test]\nfn test_array_concat() {\n let array0 = [1, 2, 3];\n let array1 = [4, 5];\n let concatenated = array_concat(array0, array1);\n assert_eq(concatenated, [1, 2, 3, 4, 5]);\n}\n\n#[test]\nfn check_permutation_basic_test() {\n let original_array = [1, 2, 3];\n let permuted_array = [3, 1, 2];\n let indexes = [2, 0, 1];\n check_permutation(original_array, permuted_array, indexes);\n}\n\n#[test(should_fail_with = \"Duplicated index\")]\nfn check_permutation_duplicated_index() {\n let original_array = [0, 1, 0];\n let permuted_array = [1, 0, 0];\n let indexes = [1, 0, 0];\n check_permutation(original_array, permuted_array, indexes);\n}\n\n#[test(should_fail_with = \"Invalid index\")]\nfn check_permutation_invalid_index() {\n let original_array = [0, 1, 2];\n let permuted_array = [1, 0, 0];\n let indexes = [1, 0, 2];\n check_permutation(original_array, permuted_array, indexes);\n}\n\n#[test]\nfn test_array_padded_with() {\n let array = [11, 22, 33, 44, 44];\n assert_eq(array_padded_with(array, 0, 44), false);\n assert_eq(array_padded_with(array, 1, 44), false);\n assert_eq(array_padded_with(array, 2, 44), false);\n assert_eq(array_padded_with(array, 3, 44), true);\n assert_eq(array_padded_with(array, 4, 44), true);\n assert_eq(array_padded_with(array, 4, 33), false);\n assert_eq(array_padded_with(array, 5, 44), true); // Index out of bounds.\n assert_eq(array_padded_with(array, 0, 11), false);\n}\n"
2533
2606
  },
2534
- "363": {
2607
+ "365": {
2535
2608
  "path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/utils/reader.nr",
2536
2609
  "source": "pub struct Reader<let N: u32> {\n data: [Field; N],\n offset: u32,\n}\n\nimpl<let N: u32> Reader<N> {\n pub fn new(data: [Field; N]) -> Self {\n Self { data, offset: 0 }\n }\n\n pub fn read(&mut self) -> Field {\n let result = self.data[self.offset];\n self.offset += 1;\n result\n }\n\n pub fn read_u32(&mut self) -> u32 {\n self.read() as u32\n }\n\n pub fn read_bool(&mut self) -> bool {\n self.read() as bool\n }\n\n pub fn read_array<let K: u32>(&mut self) -> [Field; K] {\n let mut result = [0; K];\n for i in 0..K {\n result[i] = self.data[self.offset + i];\n }\n self.offset += K;\n result\n }\n\n pub fn read_struct<T, let K: u32>(&mut self, deserialise: fn([Field; K]) -> T) -> T {\n let result = deserialise(self.read_array());\n result\n }\n\n pub fn read_struct_array<T, let K: u32, let C: u32>(\n &mut self,\n deserialise: fn([Field; K]) -> T,\n mut result: [T; C],\n ) -> [T; C] {\n for i in 0..C {\n result[i] = self.read_struct(deserialise);\n }\n result\n }\n\n pub fn finish(self) {\n assert(self.offset == self.data.len(), \"Reader did not read all data\");\n }\n}\n"
2537
2610
  },
@@ -2549,11 +2622,11 @@
2549
2622
  },
2550
2623
  "61": {
2551
2624
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/context/call_interfaces.nr",
2552
- "source": "use dep::protocol_types::{\n abis::function_selector::FunctionSelector,\n address::AztecAddress,\n traits::{Deserialize, ToField},\n};\n\nuse crate::context::{gas::GasOpts, private_context::PrivateContext, public_context::PublicContext};\n\nuse crate::hash::{hash_args, hash_calldata};\nuse crate::oracle::execution_cache;\n\npub trait CallInterface<let N: u32> {\n fn get_args(self) -> [Field];\n fn get_selector(self) -> FunctionSelector;\n fn get_name(self) -> str<N>;\n fn get_contract_address(self) -> AztecAddress;\n fn get_is_static(self) -> bool;\n}\n\n// PrivateCallInterface\n\npub struct PrivateCallInterface<let N: u32, T> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n return_type: T,\n is_static: bool,\n}\n\nimpl<let N: u32, T> PrivateCallInterface<N, T> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n is_static: bool,\n ) -> Self {\n let args_hash = hash_args(args);\n Self {\n target_contract,\n selector,\n name,\n args_hash,\n args,\n return_type: std::mem::zeroed(),\n is_static,\n }\n }\n\n pub fn call<let M: u32>(self, context: &mut PrivateContext) -> T\n where\n T: Deserialize<M>,\n {\n execution_cache::store(self.args, self.args_hash);\n let returns_hash = context.call_private_function_with_args_hash(\n self.target_contract,\n self.selector,\n self.args_hash,\n false,\n );\n let returns: T = returns_hash.get_preimage();\n returns\n }\n\n pub fn view<let M: u32>(self, context: &mut PrivateContext) -> T\n where\n T: Deserialize<M>,\n {\n execution_cache::store(self.args, self.args_hash);\n let returns_hash = context.call_private_function_with_args_hash(\n self.target_contract,\n self.selector,\n self.args_hash,\n true,\n );\n returns_hash.get_preimage()\n }\n}\n\nimpl<let N: u32, T> CallInterface<N> for PrivateCallInterface<N, T> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PrivateVoidCallInterface\n\npub struct PrivateVoidCallInterface<let N: u32> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n return_type: (), // Unit type () indicates this interface is for functions that return nothing (void)\n is_static: bool,\n}\n\nimpl<let N: u32> PrivateVoidCallInterface<N> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n is_static: bool,\n ) -> Self {\n let args_hash = hash_args(args);\n Self { target_contract, selector, name, args_hash, args, return_type: (), is_static }\n }\n\n pub fn call(self, context: &mut PrivateContext) {\n execution_cache::store(self.args, self.args_hash);\n context\n .call_private_function_with_args_hash(\n self.target_contract,\n self.selector,\n self.args_hash,\n false,\n )\n .assert_empty();\n }\n\n pub fn view(self, context: &mut PrivateContext) {\n execution_cache::store(self.args, self.args_hash);\n context\n .call_private_function_with_args_hash(\n self.target_contract,\n self.selector,\n self.args_hash,\n true,\n )\n .assert_empty();\n }\n}\n\nimpl<let N: u32> CallInterface<N> for PrivateVoidCallInterface<N> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PrivateStaticCallInterface\n\npub struct PrivateStaticCallInterface<let N: u32, T> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n return_type: T,\n is_static: bool,\n}\n\nimpl<let N: u32, T> PrivateStaticCallInterface<N, T> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n ) -> Self {\n let args_hash = hash_args(args);\n Self {\n target_contract,\n selector,\n name,\n args_hash,\n args,\n return_type: std::mem::zeroed(),\n is_static: true,\n }\n }\n\n pub fn view<let M: u32>(self, context: &mut PrivateContext) -> T\n where\n T: Deserialize<M>,\n {\n execution_cache::store(self.args, self.args_hash);\n let returns = context.call_private_function_with_args_hash(\n self.target_contract,\n self.selector,\n self.args_hash,\n true,\n );\n returns.get_preimage()\n }\n}\n\nimpl<let N: u32, T> CallInterface<N> for PrivateStaticCallInterface<N, T> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PrivateStaticVoidCallInterface\n\npub struct PrivateStaticVoidCallInterface<let N: u32> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n return_type: (), // Unit type () indicates this interface is for functions that return nothing (void)\n is_static: bool,\n}\n\nimpl<let N: u32> PrivateStaticVoidCallInterface<N> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n ) -> Self {\n let args_hash = hash_args(args);\n Self { target_contract, selector, name, args_hash, args, return_type: (), is_static: true }\n }\n\n pub fn view(self, context: &mut PrivateContext) {\n execution_cache::store(self.args, self.args_hash);\n context\n .call_private_function_with_args_hash(\n self.target_contract,\n self.selector,\n self.args_hash,\n true,\n )\n .assert_empty();\n }\n}\n\nimpl<let N: u32> CallInterface<N> for PrivateStaticVoidCallInterface<N> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PublicCallInterface\n\npub struct PublicCallInterface<let N: u32, T> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n gas_opts: GasOpts,\n return_type: T,\n is_static: bool,\n}\n\nimpl<let N: u32, T> PublicCallInterface<N, T> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n is_static: bool,\n ) -> Self {\n Self {\n target_contract,\n selector,\n name,\n args,\n gas_opts: GasOpts::default(),\n return_type: std::mem::zeroed(),\n is_static,\n }\n }\n\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub unconstrained fn call<let M: u32>(self, context: &mut PublicContext) -> T\n where\n T: Deserialize<M>,\n {\n let returns = context.call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n Deserialize::deserialize(returns.as_array::<M>())\n }\n\n pub unconstrained fn view<let M: u32>(self, context: &mut PublicContext) -> T\n where\n T: Deserialize<M>,\n {\n let returns = context.static_call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n Deserialize::deserialize(returns.as_array::<M>())\n }\n\n pub fn enqueue(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.call_public_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n /*static=*/\n false,\n )\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.call_public_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n /*static=*/\n true,\n )\n }\n}\n\nimpl<let N: u32, T> CallInterface<N> for PublicCallInterface<N, T> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PublicVoidCallInterface\n\npub struct PublicVoidCallInterface<let N: u32> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n return_type: (), // Unit type () indicates this interface is for functions that return nothing (void)\n is_static: bool,\n gas_opts: GasOpts,\n}\n\nimpl<let N: u32> PublicVoidCallInterface<N> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n is_static: bool,\n ) -> Self {\n Self {\n target_contract,\n selector,\n name,\n args,\n return_type: (),\n is_static,\n gas_opts: GasOpts::default(),\n }\n }\n\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub unconstrained fn call(self, context: &mut PublicContext) {\n let returns = context.call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n assert(returns.len() == 0);\n }\n\n pub unconstrained fn view(self, context: &mut PublicContext) {\n let returns = context.static_call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n assert(returns.len() == 0);\n }\n\n pub fn enqueue(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.call_public_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n /*static=*/\n false,\n )\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.call_public_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n /*static=*/\n true,\n )\n }\n\n pub fn set_as_teardown(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.set_public_teardown_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n false,\n )\n }\n}\n\nimpl<let N: u32> CallInterface<N> for PublicVoidCallInterface<N> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PublicStaticCallInterface\n\npub struct PublicStaticCallInterface<let N: u32, T> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n return_type: T,\n is_static: bool,\n gas_opts: GasOpts,\n}\n\nimpl<let N: u32, T> PublicStaticCallInterface<N, T> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n ) -> Self {\n Self {\n target_contract,\n selector,\n name,\n args,\n return_type: std::mem::zeroed(),\n is_static: true,\n gas_opts: GasOpts::default(),\n }\n }\n\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub unconstrained fn view<let M: u32>(self, context: &mut PublicContext) -> T\n where\n T: Deserialize<M>,\n {\n let returns = context.static_call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n Deserialize::deserialize(returns.as_array::<M>())\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.call_public_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n /*static=*/\n true,\n )\n }\n}\n\nimpl<let N: u32, T> CallInterface<N> for PublicStaticCallInterface<N, T> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PublicStaticVoidCallInterface\n\npub struct PublicStaticVoidCallInterface<let N: u32> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n return_type: (), // Unit type () indicates this interface is for functions that return nothing (void)\n is_static: bool,\n gas_opts: GasOpts,\n}\n\nimpl<let N: u32> PublicStaticVoidCallInterface<N> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n ) -> Self {\n Self {\n target_contract,\n selector,\n name,\n args,\n return_type: (),\n is_static: true,\n gas_opts: GasOpts::default(),\n }\n }\n\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub unconstrained fn view(self, context: &mut PublicContext) {\n let returns = context.static_call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n assert(returns.len() == 0);\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.call_public_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n /*static=*/\n true,\n )\n }\n}\n\nimpl<let N: u32> CallInterface<N> for PublicStaticVoidCallInterface<N> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n"
2625
+ "source": "use dep::protocol_types::{\n abis::function_selector::FunctionSelector,\n address::AztecAddress,\n traits::{Deserialize, ToField},\n};\n\nuse crate::context::{gas::GasOpts, private_context::PrivateContext, public_context::PublicContext};\n\nuse crate::hash::{hash_args, hash_calldata};\nuse crate::oracle::execution_cache;\n\npub trait CallInterface<let N: u32> {\n fn get_args(self) -> [Field];\n fn get_selector(self) -> FunctionSelector;\n fn get_name(self) -> str<N>;\n fn get_contract_address(self) -> AztecAddress;\n fn get_is_static(self) -> bool;\n}\n\n// PrivateCallInterface\n\npub struct PrivateCallInterface<let N: u32, T> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n return_type: T,\n is_static: bool,\n}\n\nimpl<let N: u32, T> PrivateCallInterface<N, T> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n is_static: bool,\n ) -> Self {\n let args_hash = hash_args(args);\n Self {\n target_contract,\n selector,\n name,\n args_hash,\n args,\n return_type: std::mem::zeroed(),\n is_static,\n }\n }\n\n pub fn call<let M: u32>(self, context: &mut PrivateContext) -> T\n where\n T: Deserialize<M>,\n {\n execution_cache::store(self.args, self.args_hash);\n let returns_hash = context.call_private_function_with_args_hash(\n self.target_contract,\n self.selector,\n self.args_hash,\n false,\n );\n let returns: T = returns_hash.get_preimage();\n returns\n }\n\n pub fn view<let M: u32>(self, context: &mut PrivateContext) -> T\n where\n T: Deserialize<M>,\n {\n execution_cache::store(self.args, self.args_hash);\n let returns_hash = context.call_private_function_with_args_hash(\n self.target_contract,\n self.selector,\n self.args_hash,\n true,\n );\n returns_hash.get_preimage()\n }\n}\n\nimpl<let N: u32, T> CallInterface<N> for PrivateCallInterface<N, T> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PrivateVoidCallInterface\n\npub struct PrivateVoidCallInterface<let N: u32> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n return_type: (), // Unit type () indicates this interface is for functions that return nothing (void)\n is_static: bool,\n}\n\nimpl<let N: u32> PrivateVoidCallInterface<N> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n is_static: bool,\n ) -> Self {\n let args_hash = hash_args(args);\n Self { target_contract, selector, name, args_hash, args, return_type: (), is_static }\n }\n\n pub fn call(self, context: &mut PrivateContext) {\n execution_cache::store(self.args, self.args_hash);\n context\n .call_private_function_with_args_hash(\n self.target_contract,\n self.selector,\n self.args_hash,\n false,\n )\n .assert_empty();\n }\n\n pub fn view(self, context: &mut PrivateContext) {\n execution_cache::store(self.args, self.args_hash);\n context\n .call_private_function_with_args_hash(\n self.target_contract,\n self.selector,\n self.args_hash,\n true,\n )\n .assert_empty();\n }\n}\n\nimpl<let N: u32> CallInterface<N> for PrivateVoidCallInterface<N> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PrivateStaticCallInterface\n\npub struct PrivateStaticCallInterface<let N: u32, T> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n return_type: T,\n is_static: bool,\n}\n\nimpl<let N: u32, T> PrivateStaticCallInterface<N, T> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n ) -> Self {\n let args_hash = hash_args(args);\n Self {\n target_contract,\n selector,\n name,\n args_hash,\n args,\n return_type: std::mem::zeroed(),\n is_static: true,\n }\n }\n\n pub fn view<let M: u32>(self, context: &mut PrivateContext) -> T\n where\n T: Deserialize<M>,\n {\n execution_cache::store(self.args, self.args_hash);\n let returns = context.call_private_function_with_args_hash(\n self.target_contract,\n self.selector,\n self.args_hash,\n true,\n );\n returns.get_preimage()\n }\n}\n\nimpl<let N: u32, T> CallInterface<N> for PrivateStaticCallInterface<N, T> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PrivateStaticVoidCallInterface\n\npub struct PrivateStaticVoidCallInterface<let N: u32> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n return_type: (), // Unit type () indicates this interface is for functions that return nothing (void)\n is_static: bool,\n}\n\nimpl<let N: u32> PrivateStaticVoidCallInterface<N> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n ) -> Self {\n let args_hash = hash_args(args);\n Self { target_contract, selector, name, args_hash, args, return_type: (), is_static: true }\n }\n\n pub fn view(self, context: &mut PrivateContext) {\n execution_cache::store(self.args, self.args_hash);\n context\n .call_private_function_with_args_hash(\n self.target_contract,\n self.selector,\n self.args_hash,\n true,\n )\n .assert_empty();\n }\n}\n\nimpl<let N: u32> CallInterface<N> for PrivateStaticVoidCallInterface<N> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PublicCallInterface\n\npub struct PublicCallInterface<let N: u32, T> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n gas_opts: GasOpts,\n return_type: T,\n is_static: bool,\n}\n\nimpl<let N: u32, T> PublicCallInterface<N, T> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n is_static: bool,\n ) -> Self {\n Self {\n target_contract,\n selector,\n name,\n args,\n gas_opts: GasOpts::default(),\n return_type: std::mem::zeroed(),\n is_static,\n }\n }\n\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub unconstrained fn call<let M: u32>(self, context: &mut PublicContext) -> T\n where\n T: Deserialize<M>,\n {\n let returns = context.call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n Deserialize::deserialize(returns.as_array::<M>())\n }\n\n pub unconstrained fn view<let M: u32>(self, context: &mut PublicContext) -> T\n where\n T: Deserialize<M>,\n {\n let returns = context.static_call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n Deserialize::deserialize(returns.as_array::<M>())\n }\n\n pub fn enqueue(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.call_public_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n /*static=*/\n false,\n )\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.call_public_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n /*static=*/\n true,\n )\n }\n}\n\nimpl<let N: u32, T> CallInterface<N> for PublicCallInterface<N, T> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PublicVoidCallInterface\n\npub struct PublicVoidCallInterface<let N: u32> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n return_type: (), // Unit type () indicates this interface is for functions that return nothing (void)\n is_static: bool,\n gas_opts: GasOpts,\n}\n\nimpl<let N: u32> PublicVoidCallInterface<N> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n is_static: bool,\n ) -> Self {\n Self {\n target_contract,\n selector,\n name,\n args,\n return_type: (),\n is_static,\n gas_opts: GasOpts::default(),\n }\n }\n\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub unconstrained fn call(self, context: &mut PublicContext) {\n let returns = context.call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n assert(returns.len() == 0);\n }\n\n pub unconstrained fn view(self, context: &mut PublicContext) {\n let returns = context.static_call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n assert(returns.len() == 0);\n }\n\n pub fn enqueue(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.call_public_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n /*static=*/\n false,\n )\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.call_public_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n /*static=*/\n true,\n )\n }\n\n pub fn set_as_teardown(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.set_public_teardown_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n false,\n )\n }\n}\n\nimpl<let N: u32> CallInterface<N> for PublicVoidCallInterface<N> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PublicStaticCallInterface\n\npub struct PublicStaticCallInterface<let N: u32, T> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n return_type: T,\n is_static: bool,\n gas_opts: GasOpts,\n}\n\nimpl<let N: u32, T> PublicStaticCallInterface<N, T> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n ) -> Self {\n Self {\n target_contract,\n selector,\n name,\n args,\n return_type: std::mem::zeroed(),\n is_static: true,\n gas_opts: GasOpts::default(),\n }\n }\n\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub unconstrained fn view<let M: u32>(self, context: &mut PublicContext) -> T\n where\n T: Deserialize<M>,\n {\n let returns = context.static_call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n Deserialize::deserialize(returns.as_array::<M>())\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.call_public_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n /*static=*/\n true,\n )\n }\n}\n\nimpl<let N: u32, T> CallInterface<N> for PublicStaticCallInterface<N, T> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PublicStaticVoidCallInterface\n\npub struct PublicStaticVoidCallInterface<let N: u32> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n return_type: (), // Unit type () indicates this interface is for functions that return nothing (void)\n is_static: bool,\n gas_opts: GasOpts,\n}\n\nimpl<let N: u32> PublicStaticVoidCallInterface<N> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n ) -> Self {\n Self {\n target_contract,\n selector,\n name,\n args,\n return_type: (),\n is_static: true,\n gas_opts: GasOpts::default(),\n }\n }\n\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub unconstrained fn view(self, context: &mut PublicContext) {\n let returns = context.static_call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n assert(returns.len() == 0);\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.call_public_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n /*static=*/\n true,\n )\n }\n}\n\nimpl<let N: u32> CallInterface<N> for PublicStaticVoidCallInterface<N> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// UtilityCallInterface\n\npub struct UtilityCallInterface<let N: u32, T> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n return_type: T,\n}\n\nimpl<let N: u32, T> UtilityCallInterface<N, T> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n ) -> Self {\n let args_hash = hash_args(args);\n Self { target_contract, selector, name, args_hash, args, return_type: std::mem::zeroed() }\n }\n\n pub fn get_args(self) -> [Field] {\n self.args\n }\n\n pub fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n pub fn get_name(self) -> str<N> {\n self.name\n }\n\n pub fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n}\n\n// UtilityVoidCallInterface\n\npub struct UtilityVoidCallInterface<let N: u32> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n return_type: (),\n}\n\nimpl<let N: u32> UtilityVoidCallInterface<N> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n ) -> Self {\n let args_hash = hash_args(args);\n Self { target_contract, selector, name, args_hash, args, return_type: () }\n }\n\n pub fn get_args(self) -> [Field] {\n self.args\n }\n\n pub fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n pub fn get_name(self) -> str<N> {\n self.name\n }\n\n pub fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n}\n"
2553
2626
  },
2554
2627
  "68": {
2555
2628
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/context/private_context.nr",
2556
- "source": "use crate::{\n context::{inputs::PrivateContextInputs, returns_hash::ReturnsHash},\n hash::{ArgsHasher, hash_args_array, hash_calldata_array},\n keys::constants::{NULLIFIER_INDEX, NUM_KEY_TYPES, OUTGOING_INDEX, sk_generators},\n messaging::process_l1_to_l2_message,\n oracle::{\n block_header::get_block_header_at,\n call_private_function::call_private_function_internal,\n enqueue_public_function_call::{\n notify_enqueued_public_function_call, notify_set_min_revertible_side_effect_counter,\n notify_set_public_teardown_function_call,\n },\n execution_cache,\n key_validation_request::get_key_validation_request,\n notes::{notify_created_nullifier, notify_nullified_note},\n },\n};\nuse dep::protocol_types::{\n abis::{\n call_context::CallContext,\n function_selector::FunctionSelector,\n gas_settings::GasSettings,\n log::Log,\n log_hash::LogHash,\n max_block_number::MaxBlockNumber,\n note_hash::NoteHash,\n nullifier::Nullifier,\n private_call_request::PrivateCallRequest,\n private_circuit_public_inputs::PrivateCircuitPublicInputs,\n private_log::PrivateLogData,\n public_call_request::PublicCallRequest,\n read_request::ReadRequest,\n side_effect::Counted,\n validation_requests::{KeyValidationRequest, KeyValidationRequestAndGenerator},\n },\n address::{AztecAddress, EthAddress},\n block_header::BlockHeader,\n constants::{\n MAX_CONTRACT_CLASS_LOGS_PER_CALL, MAX_ENQUEUED_CALLS_PER_CALL,\n MAX_KEY_VALIDATION_REQUESTS_PER_CALL, MAX_L2_TO_L1_MSGS_PER_CALL,\n MAX_NOTE_HASH_READ_REQUESTS_PER_CALL, MAX_NOTE_HASHES_PER_CALL,\n MAX_NULLIFIER_READ_REQUESTS_PER_CALL, MAX_NULLIFIERS_PER_CALL,\n MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL, MAX_PRIVATE_LOGS_PER_CALL,\n PRIVATE_LOG_SIZE_IN_FIELDS,\n },\n messaging::l2_to_l1_message::L2ToL1Message,\n traits::{Empty, Hash, ToField},\n utils::arrays::array_concat,\n};\n\n// When finished, one can call .finish() to convert back to the abi\npub struct PrivateContext {\n // docs:start:private-context\n pub inputs: PrivateContextInputs,\n pub side_effect_counter: u32,\n\n pub min_revertible_side_effect_counter: u32,\n pub is_fee_payer: bool,\n\n pub args_hash: Field,\n pub return_hash: Field,\n\n pub max_block_number: MaxBlockNumber,\n\n pub note_hash_read_requests: BoundedVec<ReadRequest, MAX_NOTE_HASH_READ_REQUESTS_PER_CALL>,\n pub nullifier_read_requests: BoundedVec<ReadRequest, MAX_NULLIFIER_READ_REQUESTS_PER_CALL>,\n key_validation_requests_and_generators: BoundedVec<KeyValidationRequestAndGenerator, MAX_KEY_VALIDATION_REQUESTS_PER_CALL>,\n\n pub note_hashes: BoundedVec<NoteHash, MAX_NOTE_HASHES_PER_CALL>,\n pub nullifiers: BoundedVec<Nullifier, MAX_NULLIFIERS_PER_CALL>,\n\n pub private_call_requests: BoundedVec<PrivateCallRequest, MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL>,\n pub public_call_requests: BoundedVec<Counted<PublicCallRequest>, MAX_ENQUEUED_CALLS_PER_CALL>,\n pub public_teardown_call_request: PublicCallRequest,\n pub l2_to_l1_msgs: BoundedVec<L2ToL1Message, MAX_L2_TO_L1_MSGS_PER_CALL>,\n // docs:end:private-context\n\n // Header of a block whose state is used during private execution (not the block the transaction is included in).\n pub historical_header: BlockHeader,\n\n pub private_logs: BoundedVec<PrivateLogData, MAX_PRIVATE_LOGS_PER_CALL>,\n pub contract_class_logs_hashes: BoundedVec<LogHash, MAX_CONTRACT_CLASS_LOGS_PER_CALL>,\n\n // Contains the last key validation request for each key type. This is used to cache the last request and avoid\n // fetching the same request multiple times.\n // The index of the array corresponds to the key type (0 nullifier, 1 incoming, 2 outgoing, 3 tagging).\n pub last_key_validation_requests: [Option<KeyValidationRequest>; NUM_KEY_TYPES],\n}\n\nimpl PrivateContext {\n pub fn new(inputs: PrivateContextInputs, args_hash: Field) -> PrivateContext {\n PrivateContext {\n inputs,\n side_effect_counter: inputs.start_side_effect_counter + 1,\n min_revertible_side_effect_counter: 0,\n is_fee_payer: false,\n args_hash,\n return_hash: 0,\n max_block_number: MaxBlockNumber::empty(),\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n historical_header: inputs.historical_header,\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n private_logs: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n }\n }\n\n pub fn msg_sender(self) -> AztecAddress {\n self.inputs.call_context.msg_sender\n }\n\n pub fn this_address(self) -> AztecAddress {\n self.inputs.call_context.contract_address\n }\n\n pub fn chain_id(self) -> Field {\n self.inputs.tx_context.chain_id\n }\n\n pub fn version(self) -> Field {\n self.inputs.tx_context.version\n }\n\n pub fn gas_settings(self) -> GasSettings {\n self.inputs.tx_context.gas_settings\n }\n\n pub fn selector(self) -> FunctionSelector {\n self.inputs.call_context.function_selector\n }\n\n pub fn get_args_hash(self) -> Field {\n self.args_hash\n }\n\n pub fn push_note_hash(&mut self, note_hash: Field) {\n self.note_hashes.push(NoteHash { value: note_hash, counter: self.next_counter() });\n }\n\n pub fn push_nullifier(&mut self, nullifier: Field) {\n notify_created_nullifier(nullifier);\n self.nullifiers.push(\n Nullifier { value: nullifier, note_hash: 0, counter: self.next_counter() },\n );\n }\n\n pub fn push_nullifier_for_note_hash(&mut self, nullifier: Field, nullified_note_hash: Field) {\n let nullifier_counter = self.next_counter();\n notify_nullified_note(nullifier, nullified_note_hash, nullifier_counter);\n self.nullifiers.push(\n Nullifier {\n value: nullifier,\n note_hash: nullified_note_hash,\n counter: nullifier_counter,\n },\n );\n }\n\n // Returns the header of a block whose state is used during private execution (not the block the transaction is\n // included in).\n pub fn get_block_header(self) -> BlockHeader {\n self.historical_header\n }\n\n // Returns the header of an arbitrary block whose block number is less than or equal to the block number\n // of historical header.\n pub fn get_block_header_at(self, block_number: u32) -> BlockHeader {\n get_block_header_at(block_number, self)\n }\n\n pub fn set_return_hash(&mut self, returns_hasher: ArgsHasher) {\n self.return_hash = returns_hasher.hash();\n execution_cache::store(returns_hasher.fields, self.return_hash);\n }\n\n pub fn finish(self) -> PrivateCircuitPublicInputs {\n PrivateCircuitPublicInputs {\n call_context: self.inputs.call_context,\n args_hash: self.args_hash,\n returns_hash: self.return_hash,\n min_revertible_side_effect_counter: self.min_revertible_side_effect_counter,\n is_fee_payer: self.is_fee_payer,\n max_block_number: self.max_block_number,\n note_hash_read_requests: self.note_hash_read_requests.storage(),\n nullifier_read_requests: self.nullifier_read_requests.storage(),\n key_validation_requests_and_generators: self\n .key_validation_requests_and_generators\n .storage(),\n note_hashes: self.note_hashes.storage(),\n nullifiers: self.nullifiers.storage(),\n private_call_requests: self.private_call_requests.storage(),\n public_call_requests: self.public_call_requests.storage(),\n public_teardown_call_request: self.public_teardown_call_request,\n l2_to_l1_msgs: self.l2_to_l1_msgs.storage(),\n start_side_effect_counter: self.inputs.start_side_effect_counter,\n end_side_effect_counter: self.side_effect_counter,\n private_logs: self.private_logs.storage(),\n contract_class_logs_hashes: self.contract_class_logs_hashes.storage(),\n historical_header: self.historical_header,\n tx_context: self.inputs.tx_context,\n }\n }\n\n pub fn set_as_fee_payer(&mut self) {\n dep::protocol_types::debug_log::debug_log_format(\n \"Setting {0} as fee payer\",\n [self.this_address().to_field()],\n );\n self.is_fee_payer = true;\n }\n\n pub fn end_setup(&mut self) {\n // dep::protocol_types::debug_log::debug_log_format(\n // \"Ending setup at counter {0}\",\n // [self.side_effect_counter as Field]\n // );\n self.min_revertible_side_effect_counter = self.side_effect_counter;\n notify_set_min_revertible_side_effect_counter(self.min_revertible_side_effect_counter);\n }\n\n // docs:start:max-block-number\n pub fn set_tx_max_block_number(&mut self, max_block_number: u32) {\n // docs:end:max-block-number\n self.max_block_number =\n MaxBlockNumber::min_with_u32(self.max_block_number, max_block_number);\n }\n\n pub fn push_note_hash_read_request(&mut self, note_hash: Field) {\n let side_effect = ReadRequest { value: note_hash, counter: self.next_counter() };\n self.note_hash_read_requests.push(side_effect);\n }\n\n pub fn push_nullifier_read_request(&mut self, nullifier: Field) {\n let request = ReadRequest { value: nullifier, counter: self.next_counter() };\n self.nullifier_read_requests.push(request);\n }\n\n pub fn request_nsk_app(&mut self, npk_m_hash: Field) -> Field {\n self.request_sk_app(npk_m_hash, NULLIFIER_INDEX)\n }\n\n pub fn request_ovsk_app(&mut self, ovpk_m_hash: Field) -> Field {\n self.request_sk_app(ovpk_m_hash, OUTGOING_INDEX)\n }\n\n fn request_sk_app(&mut self, pk_m_hash: Field, key_index: Field) -> Field {\n let cached_request = self.last_key_validation_requests[key_index as u32].unwrap_or(\n KeyValidationRequest::empty(),\n );\n\n if cached_request.pk_m.hash() == pk_m_hash {\n // We get a match so the cached request is the latest one\n cached_request.sk_app\n } else {\n // We didn't get a match meaning the cached result is stale\n // Typically we'd validate keys by showing that they are the preimage of `pk_m_hash`, but that'd require\n // the oracle returning the master secret keys, which could cause malicious contracts to leak it or learn\n // about secrets from other contracts. We therefore silo secret keys, and rely on the private kernel to\n // validate that we siloed secret key corresponds to correct siloing of the master secret key that hashes\n // to `pk_m_hash`.\n\n // Safety: Kernels verify that the key validation request is valid and below we verify that a request\n // for the correct public key has been received.\n let request = unsafe { get_key_validation_request(pk_m_hash, key_index) };\n assert_eq(request.pk_m.hash(), pk_m_hash, \"Obtained invalid key validation request\");\n\n self.key_validation_requests_and_generators.push(\n KeyValidationRequestAndGenerator {\n request,\n sk_app_generator: sk_generators[key_index as u32],\n },\n );\n self.last_key_validation_requests[key_index as u32] = Option::some(request);\n request.sk_app\n }\n }\n\n // docs:start:context_message_portal\n pub fn message_portal(&mut self, recipient: EthAddress, content: Field) {\n // docs:end:context_message_portal\n let message = L2ToL1Message { recipient, content, counter: self.next_counter() };\n self.l2_to_l1_msgs.push(message);\n }\n\n // docs:start:context_consume_l1_to_l2_message\n // docs:start:consume_l1_to_l2_message\n pub fn consume_l1_to_l2_message(\n &mut self,\n content: Field,\n secret: Field,\n sender: EthAddress,\n leaf_index: Field,\n ) {\n // docs:end:context_consume_l1_to_l2_message\n let nullifier = process_l1_to_l2_message(\n self.historical_header.state.l1_to_l2_message_tree.root,\n self.this_address(),\n sender,\n self.chain_id(),\n self.version(),\n content,\n secret,\n leaf_index,\n );\n\n // Push nullifier (and the \"commitment\" corresponding to this can be \"empty\")\n self.push_nullifier(nullifier)\n }\n // docs:end:consume_l1_to_l2_message\n\n pub fn emit_private_log(&mut self, log: [Field; PRIVATE_LOG_SIZE_IN_FIELDS]) {\n let counter = self.next_counter();\n let private_log = PrivateLogData { log: Log::new(log), note_hash_counter: 0, counter };\n self.private_logs.push(private_log);\n }\n\n pub fn emit_raw_note_log(\n &mut self,\n log: [Field; PRIVATE_LOG_SIZE_IN_FIELDS],\n note_hash_counter: u32,\n ) {\n let counter = self.next_counter();\n let private_log = PrivateLogData { log: Log::new(log), note_hash_counter, counter };\n self.private_logs.push(private_log);\n }\n\n pub fn call_private_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) -> ReturnsHash {\n let args_hash = hash_args_array(args);\n execution_cache::store(args, args_hash);\n self.call_private_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n false,\n )\n }\n\n pub fn static_call_private_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) -> ReturnsHash {\n let args_hash = hash_args_array(args);\n execution_cache::store(args, args_hash);\n self.call_private_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n true,\n )\n }\n\n pub fn call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> ReturnsHash {\n self.call_private_function_with_args_hash(contract_address, function_selector, 0, false)\n }\n\n pub fn static_call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> ReturnsHash {\n self.call_private_function_with_args_hash(contract_address, function_selector, 0, true)\n }\n\n pub fn call_private_function_with_args_hash(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) -> ReturnsHash {\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n let start_side_effect_counter = self.side_effect_counter;\n\n // Safety: The oracle simulates the private call and returns the value of the side effects counter after\n // execution of the call (which means that end_side_effect_counter - start_side_effect_counter is\n // the number of side effects that took place), along with the hash of the return values. We validate these\n // by requesting a private kernel iteration in which the return values are constrained to hash\n // to `returns_hash` and the side effects counter to increment from start to end.\n let (end_side_effect_counter, returns_hash) = unsafe {\n call_private_function_internal(\n contract_address,\n function_selector,\n args_hash,\n start_side_effect_counter,\n is_static_call,\n )\n };\n\n self.private_call_requests.push(\n PrivateCallRequest {\n call_context: CallContext {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n },\n args_hash,\n returns_hash,\n start_side_effect_counter,\n end_side_effect_counter,\n },\n );\n\n // TODO (fees) figure out why this crashes the prover and enable it\n // we need this in order to pay fees inside child call contexts\n // assert(\n // (item.public_inputs.min_revertible_side_effect_counter == 0 as u32)\n // | (item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter)\n // );\n // if item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter {\n // self.min_revertible_side_effect_counter = item.public_inputs.min_revertible_side_effect_counter;\n // }\n self.side_effect_counter = end_side_effect_counter + 1;\n ReturnsHash::new(returns_hash)\n }\n\n pub fn call_public_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let calldata = array_concat([function_selector.to_field()], args);\n let calldata_hash = hash_calldata_array(calldata);\n execution_cache::store(calldata, calldata_hash);\n self.call_public_function_with_calldata_hash(contract_address, calldata_hash, false)\n }\n\n pub fn static_call_public_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let calldata = array_concat([function_selector.to_field()], args);\n let calldata_hash = hash_calldata_array(calldata);\n execution_cache::store(calldata, calldata_hash);\n self.call_public_function_with_calldata_hash(contract_address, calldata_hash, true)\n }\n\n pub fn call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) {\n let calldata_hash = hash_calldata_array([function_selector.to_field()]);\n self.call_public_function_with_calldata_hash(contract_address, calldata_hash, false)\n }\n\n pub fn static_call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) {\n let calldata_hash = hash_calldata_array([function_selector.to_field()]);\n self.call_public_function_with_calldata_hash(contract_address, calldata_hash, true)\n }\n\n pub fn call_public_function_with_calldata_hash(\n &mut self,\n contract_address: AztecAddress,\n calldata_hash: Field,\n is_static_call: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n\n notify_enqueued_public_function_call(\n contract_address,\n calldata_hash,\n counter,\n is_static_call,\n );\n\n let call_request = PublicCallRequest {\n msg_sender: self.this_address(),\n contract_address,\n is_static_call,\n calldata_hash,\n };\n\n self.public_call_requests.push(Counted::new(call_request, counter));\n }\n\n pub fn set_public_teardown_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let calldata = array_concat([function_selector.to_field()], args);\n let calldata_hash = hash_calldata_array(calldata);\n execution_cache::store(calldata, calldata_hash);\n self.set_public_teardown_function_with_calldata_hash(contract_address, calldata_hash, false)\n }\n\n pub fn set_public_teardown_function_with_calldata_hash(\n &mut self,\n contract_address: AztecAddress,\n calldata_hash: Field,\n is_static_call: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n\n notify_set_public_teardown_function_call(\n contract_address,\n calldata_hash,\n counter,\n is_static_call,\n );\n\n self.public_teardown_call_request = PublicCallRequest {\n msg_sender: self.this_address(),\n contract_address,\n is_static_call,\n calldata_hash,\n };\n }\n\n fn next_counter(&mut self) -> u32 {\n let counter = self.side_effect_counter;\n self.side_effect_counter += 1;\n counter\n }\n}\n\nimpl Empty for PrivateContext {\n fn empty() -> Self {\n PrivateContext {\n inputs: PrivateContextInputs::empty(),\n side_effect_counter: 0 as u32,\n min_revertible_side_effect_counter: 0 as u32,\n is_fee_payer: false,\n args_hash: 0,\n return_hash: 0,\n max_block_number: MaxBlockNumber::empty(),\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n historical_header: BlockHeader::empty(),\n private_logs: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n }\n }\n}\n"
2629
+ "source": "use crate::{\n context::{inputs::PrivateContextInputs, returns_hash::ReturnsHash},\n hash::{ArgsHasher, hash_args_array, hash_calldata_array},\n keys::constants::{NULLIFIER_INDEX, NUM_KEY_TYPES, OUTGOING_INDEX, sk_generators},\n messaging::process_l1_to_l2_message,\n oracle::{\n block_header::get_block_header_at,\n call_private_function::call_private_function_internal,\n enqueue_public_function_call::{\n notify_enqueued_public_function_call, notify_set_min_revertible_side_effect_counter,\n notify_set_public_teardown_function_call,\n },\n execution_cache,\n key_validation_request::get_key_validation_request,\n notes::{notify_created_nullifier, notify_nullified_note},\n },\n};\nuse dep::protocol_types::{\n abis::{\n call_context::CallContext,\n function_selector::FunctionSelector,\n gas_settings::GasSettings,\n log_hash::LogHash,\n max_block_number::MaxBlockNumber,\n note_hash::NoteHash,\n nullifier::Nullifier,\n private_call_request::PrivateCallRequest,\n private_circuit_public_inputs::PrivateCircuitPublicInputs,\n private_log::{PrivateLog, PrivateLogData},\n public_call_request::PublicCallRequest,\n read_request::ReadRequest,\n side_effect::Counted,\n validation_requests::{KeyValidationRequest, KeyValidationRequestAndGenerator},\n },\n address::{AztecAddress, EthAddress},\n block_header::BlockHeader,\n constants::{\n MAX_CONTRACT_CLASS_LOGS_PER_CALL, MAX_ENQUEUED_CALLS_PER_CALL,\n MAX_KEY_VALIDATION_REQUESTS_PER_CALL, MAX_L2_TO_L1_MSGS_PER_CALL,\n MAX_NOTE_HASH_READ_REQUESTS_PER_CALL, MAX_NOTE_HASHES_PER_CALL,\n MAX_NULLIFIER_READ_REQUESTS_PER_CALL, MAX_NULLIFIERS_PER_CALL,\n MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL, MAX_PRIVATE_LOGS_PER_CALL,\n PRIVATE_LOG_SIZE_IN_FIELDS,\n },\n messaging::l2_to_l1_message::L2ToL1Message,\n traits::{Empty, Hash, ToField},\n utils::arrays::array_concat,\n};\n\n// When finished, one can call .finish() to convert back to the abi\npub struct PrivateContext {\n // docs:start:private-context\n pub inputs: PrivateContextInputs,\n pub side_effect_counter: u32,\n\n pub min_revertible_side_effect_counter: u32,\n pub is_fee_payer: bool,\n\n pub args_hash: Field,\n pub return_hash: Field,\n\n pub max_block_number: MaxBlockNumber,\n\n pub note_hash_read_requests: BoundedVec<ReadRequest, MAX_NOTE_HASH_READ_REQUESTS_PER_CALL>,\n pub nullifier_read_requests: BoundedVec<ReadRequest, MAX_NULLIFIER_READ_REQUESTS_PER_CALL>,\n key_validation_requests_and_generators: BoundedVec<KeyValidationRequestAndGenerator, MAX_KEY_VALIDATION_REQUESTS_PER_CALL>,\n\n pub note_hashes: BoundedVec<NoteHash, MAX_NOTE_HASHES_PER_CALL>,\n pub nullifiers: BoundedVec<Nullifier, MAX_NULLIFIERS_PER_CALL>,\n\n pub private_call_requests: BoundedVec<PrivateCallRequest, MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL>,\n pub public_call_requests: BoundedVec<Counted<PublicCallRequest>, MAX_ENQUEUED_CALLS_PER_CALL>,\n pub public_teardown_call_request: PublicCallRequest,\n pub l2_to_l1_msgs: BoundedVec<L2ToL1Message, MAX_L2_TO_L1_MSGS_PER_CALL>,\n // docs:end:private-context\n\n // Header of a block whose state is used during private execution (not the block the transaction is included in).\n pub historical_header: BlockHeader,\n\n pub private_logs: BoundedVec<PrivateLogData, MAX_PRIVATE_LOGS_PER_CALL>,\n pub contract_class_logs_hashes: BoundedVec<Counted<LogHash>, MAX_CONTRACT_CLASS_LOGS_PER_CALL>,\n\n // Contains the last key validation request for each key type. This is used to cache the last request and avoid\n // fetching the same request multiple times.\n // The index of the array corresponds to the key type (0 nullifier, 1 incoming, 2 outgoing, 3 tagging).\n pub last_key_validation_requests: [Option<KeyValidationRequest>; NUM_KEY_TYPES],\n}\n\nimpl PrivateContext {\n pub fn new(inputs: PrivateContextInputs, args_hash: Field) -> PrivateContext {\n PrivateContext {\n inputs,\n side_effect_counter: inputs.start_side_effect_counter + 1,\n min_revertible_side_effect_counter: 0,\n is_fee_payer: false,\n args_hash,\n return_hash: 0,\n max_block_number: MaxBlockNumber::empty(),\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n historical_header: inputs.historical_header,\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n private_logs: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n }\n }\n\n pub fn msg_sender(self) -> AztecAddress {\n self.inputs.call_context.msg_sender\n }\n\n pub fn this_address(self) -> AztecAddress {\n self.inputs.call_context.contract_address\n }\n\n pub fn chain_id(self) -> Field {\n self.inputs.tx_context.chain_id\n }\n\n pub fn version(self) -> Field {\n self.inputs.tx_context.version\n }\n\n pub fn gas_settings(self) -> GasSettings {\n self.inputs.tx_context.gas_settings\n }\n\n pub fn selector(self) -> FunctionSelector {\n self.inputs.call_context.function_selector\n }\n\n pub fn get_args_hash(self) -> Field {\n self.args_hash\n }\n\n pub fn push_note_hash(&mut self, note_hash: Field) {\n self.note_hashes.push(NoteHash { value: note_hash, counter: self.next_counter() });\n }\n\n pub fn push_nullifier(&mut self, nullifier: Field) {\n notify_created_nullifier(nullifier);\n self.nullifiers.push(\n Nullifier { value: nullifier, note_hash: 0, counter: self.next_counter() },\n );\n }\n\n pub fn push_nullifier_for_note_hash(&mut self, nullifier: Field, nullified_note_hash: Field) {\n let nullifier_counter = self.next_counter();\n notify_nullified_note(nullifier, nullified_note_hash, nullifier_counter);\n self.nullifiers.push(\n Nullifier {\n value: nullifier,\n note_hash: nullified_note_hash,\n counter: nullifier_counter,\n },\n );\n }\n\n // Returns the header of a block whose state is used during private execution (not the block the transaction is\n // included in).\n pub fn get_block_header(self) -> BlockHeader {\n self.historical_header\n }\n\n // Returns the header of an arbitrary block whose block number is less than or equal to the block number\n // of historical header.\n pub fn get_block_header_at(self, block_number: u32) -> BlockHeader {\n get_block_header_at(block_number, self)\n }\n\n pub fn set_return_hash(&mut self, returns_hasher: ArgsHasher) {\n self.return_hash = returns_hasher.hash();\n execution_cache::store(returns_hasher.fields, self.return_hash);\n }\n\n pub fn finish(self) -> PrivateCircuitPublicInputs {\n PrivateCircuitPublicInputs {\n call_context: self.inputs.call_context,\n args_hash: self.args_hash,\n returns_hash: self.return_hash,\n min_revertible_side_effect_counter: self.min_revertible_side_effect_counter,\n is_fee_payer: self.is_fee_payer,\n max_block_number: self.max_block_number,\n note_hash_read_requests: self.note_hash_read_requests.storage(),\n nullifier_read_requests: self.nullifier_read_requests.storage(),\n key_validation_requests_and_generators: self\n .key_validation_requests_and_generators\n .storage(),\n note_hashes: self.note_hashes.storage(),\n nullifiers: self.nullifiers.storage(),\n private_call_requests: self.private_call_requests.storage(),\n public_call_requests: self.public_call_requests.storage(),\n public_teardown_call_request: self.public_teardown_call_request,\n l2_to_l1_msgs: self.l2_to_l1_msgs.storage(),\n start_side_effect_counter: self.inputs.start_side_effect_counter,\n end_side_effect_counter: self.side_effect_counter,\n private_logs: self.private_logs.storage(),\n contract_class_logs_hashes: self.contract_class_logs_hashes.storage(),\n historical_header: self.historical_header,\n tx_context: self.inputs.tx_context,\n }\n }\n\n pub fn set_as_fee_payer(&mut self) {\n dep::protocol_types::debug_log::debug_log_format(\n \"Setting {0} as fee payer\",\n [self.this_address().to_field()],\n );\n self.is_fee_payer = true;\n }\n\n pub fn end_setup(&mut self) {\n // dep::protocol_types::debug_log::debug_log_format(\n // \"Ending setup at counter {0}\",\n // [self.side_effect_counter as Field]\n // );\n self.min_revertible_side_effect_counter = self.side_effect_counter;\n notify_set_min_revertible_side_effect_counter(self.min_revertible_side_effect_counter);\n }\n\n // docs:start:max-block-number\n pub fn set_tx_max_block_number(&mut self, max_block_number: u32) {\n // docs:end:max-block-number\n self.max_block_number =\n MaxBlockNumber::min_with_u32(self.max_block_number, max_block_number);\n }\n\n pub fn push_note_hash_read_request(&mut self, note_hash: Field) {\n let side_effect = ReadRequest { value: note_hash, counter: self.next_counter() };\n self.note_hash_read_requests.push(side_effect);\n }\n\n pub fn push_nullifier_read_request(&mut self, nullifier: Field) {\n let request = ReadRequest { value: nullifier, counter: self.next_counter() };\n self.nullifier_read_requests.push(request);\n }\n\n pub fn request_nsk_app(&mut self, npk_m_hash: Field) -> Field {\n self.request_sk_app(npk_m_hash, NULLIFIER_INDEX)\n }\n\n pub fn request_ovsk_app(&mut self, ovpk_m_hash: Field) -> Field {\n self.request_sk_app(ovpk_m_hash, OUTGOING_INDEX)\n }\n\n fn request_sk_app(&mut self, pk_m_hash: Field, key_index: Field) -> Field {\n let cached_request = self.last_key_validation_requests[key_index as u32].unwrap_or(\n KeyValidationRequest::empty(),\n );\n\n if cached_request.pk_m.hash() == pk_m_hash {\n // We get a match so the cached request is the latest one\n cached_request.sk_app\n } else {\n // We didn't get a match meaning the cached result is stale\n // Typically we'd validate keys by showing that they are the preimage of `pk_m_hash`, but that'd require\n // the oracle returning the master secret keys, which could cause malicious contracts to leak it or learn\n // about secrets from other contracts. We therefore silo secret keys, and rely on the private kernel to\n // validate that we siloed secret key corresponds to correct siloing of the master secret key that hashes\n // to `pk_m_hash`.\n\n // Safety: Kernels verify that the key validation request is valid and below we verify that a request\n // for the correct public key has been received.\n let request = unsafe { get_key_validation_request(pk_m_hash, key_index) };\n assert_eq(request.pk_m.hash(), pk_m_hash, \"Obtained invalid key validation request\");\n\n self.key_validation_requests_and_generators.push(\n KeyValidationRequestAndGenerator {\n request,\n sk_app_generator: sk_generators[key_index as u32],\n },\n );\n self.last_key_validation_requests[key_index as u32] = Option::some(request);\n request.sk_app\n }\n }\n\n // docs:start:context_message_portal\n pub fn message_portal(&mut self, recipient: EthAddress, content: Field) {\n // docs:end:context_message_portal\n let message = L2ToL1Message { recipient, content, counter: self.next_counter() };\n self.l2_to_l1_msgs.push(message);\n }\n\n // docs:start:context_consume_l1_to_l2_message\n // docs:start:consume_l1_to_l2_message\n pub fn consume_l1_to_l2_message(\n &mut self,\n content: Field,\n secret: Field,\n sender: EthAddress,\n leaf_index: Field,\n ) {\n // docs:end:context_consume_l1_to_l2_message\n let nullifier = process_l1_to_l2_message(\n self.historical_header.state.l1_to_l2_message_tree.root,\n self.this_address(),\n sender,\n self.chain_id(),\n self.version(),\n content,\n secret,\n leaf_index,\n );\n\n // Push nullifier (and the \"commitment\" corresponding to this can be \"empty\")\n self.push_nullifier(nullifier)\n }\n // docs:end:consume_l1_to_l2_message\n\n pub fn emit_private_log(&mut self, log: [Field; PRIVATE_LOG_SIZE_IN_FIELDS], length: u32) {\n let counter = self.next_counter();\n let private_log =\n PrivateLogData { log: PrivateLog::new(log, length), note_hash_counter: 0, counter };\n self.private_logs.push(private_log);\n }\n\n pub fn emit_raw_note_log(\n &mut self,\n log: [Field; PRIVATE_LOG_SIZE_IN_FIELDS],\n length: u32,\n note_hash_counter: u32,\n ) {\n let counter = self.next_counter();\n let private_log =\n PrivateLogData { log: PrivateLog::new(log, length), note_hash_counter, counter };\n self.private_logs.push(private_log);\n }\n\n pub fn call_private_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) -> ReturnsHash {\n let args_hash = hash_args_array(args);\n execution_cache::store(args, args_hash);\n self.call_private_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n false,\n )\n }\n\n pub fn static_call_private_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) -> ReturnsHash {\n let args_hash = hash_args_array(args);\n execution_cache::store(args, args_hash);\n self.call_private_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n true,\n )\n }\n\n pub fn call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> ReturnsHash {\n self.call_private_function_with_args_hash(contract_address, function_selector, 0, false)\n }\n\n pub fn static_call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> ReturnsHash {\n self.call_private_function_with_args_hash(contract_address, function_selector, 0, true)\n }\n\n pub fn call_private_function_with_args_hash(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) -> ReturnsHash {\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n let start_side_effect_counter = self.side_effect_counter;\n\n // Safety: The oracle simulates the private call and returns the value of the side effects counter after\n // execution of the call (which means that end_side_effect_counter - start_side_effect_counter is\n // the number of side effects that took place), along with the hash of the return values. We validate these\n // by requesting a private kernel iteration in which the return values are constrained to hash\n // to `returns_hash` and the side effects counter to increment from start to end.\n let (end_side_effect_counter, returns_hash) = unsafe {\n call_private_function_internal(\n contract_address,\n function_selector,\n args_hash,\n start_side_effect_counter,\n is_static_call,\n )\n };\n\n self.private_call_requests.push(\n PrivateCallRequest {\n call_context: CallContext {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n },\n args_hash,\n returns_hash,\n start_side_effect_counter,\n end_side_effect_counter,\n },\n );\n\n // TODO (fees) figure out why this crashes the prover and enable it\n // we need this in order to pay fees inside child call contexts\n // assert(\n // (item.public_inputs.min_revertible_side_effect_counter == 0 as u32)\n // | (item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter)\n // );\n // if item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter {\n // self.min_revertible_side_effect_counter = item.public_inputs.min_revertible_side_effect_counter;\n // }\n self.side_effect_counter = end_side_effect_counter + 1;\n ReturnsHash::new(returns_hash)\n }\n\n pub fn call_public_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let calldata = array_concat([function_selector.to_field()], args);\n let calldata_hash = hash_calldata_array(calldata);\n execution_cache::store(calldata, calldata_hash);\n self.call_public_function_with_calldata_hash(contract_address, calldata_hash, false)\n }\n\n pub fn static_call_public_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let calldata = array_concat([function_selector.to_field()], args);\n let calldata_hash = hash_calldata_array(calldata);\n execution_cache::store(calldata, calldata_hash);\n self.call_public_function_with_calldata_hash(contract_address, calldata_hash, true)\n }\n\n pub fn call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) {\n let calldata_hash = hash_calldata_array([function_selector.to_field()]);\n self.call_public_function_with_calldata_hash(contract_address, calldata_hash, false)\n }\n\n pub fn static_call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) {\n let calldata_hash = hash_calldata_array([function_selector.to_field()]);\n self.call_public_function_with_calldata_hash(contract_address, calldata_hash, true)\n }\n\n pub fn call_public_function_with_calldata_hash(\n &mut self,\n contract_address: AztecAddress,\n calldata_hash: Field,\n is_static_call: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n\n notify_enqueued_public_function_call(\n contract_address,\n calldata_hash,\n counter,\n is_static_call,\n );\n\n let call_request = PublicCallRequest {\n msg_sender: self.this_address(),\n contract_address,\n is_static_call,\n calldata_hash,\n };\n\n self.public_call_requests.push(Counted::new(call_request, counter));\n }\n\n pub fn set_public_teardown_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let calldata = array_concat([function_selector.to_field()], args);\n let calldata_hash = hash_calldata_array(calldata);\n execution_cache::store(calldata, calldata_hash);\n self.set_public_teardown_function_with_calldata_hash(contract_address, calldata_hash, false)\n }\n\n pub fn set_public_teardown_function_with_calldata_hash(\n &mut self,\n contract_address: AztecAddress,\n calldata_hash: Field,\n is_static_call: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n\n notify_set_public_teardown_function_call(\n contract_address,\n calldata_hash,\n counter,\n is_static_call,\n );\n\n self.public_teardown_call_request = PublicCallRequest {\n msg_sender: self.this_address(),\n contract_address,\n is_static_call,\n calldata_hash,\n };\n }\n\n fn next_counter(&mut self) -> u32 {\n let counter = self.side_effect_counter;\n self.side_effect_counter += 1;\n counter\n }\n}\n\nimpl Empty for PrivateContext {\n fn empty() -> Self {\n PrivateContext {\n inputs: PrivateContextInputs::empty(),\n side_effect_counter: 0 as u32,\n min_revertible_side_effect_counter: 0 as u32,\n is_fee_payer: false,\n args_hash: 0,\n return_hash: 0,\n max_block_number: MaxBlockNumber::empty(),\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n historical_header: BlockHeader::empty(),\n private_logs: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n }\n }\n}\n"
2557
2630
  },
2558
2631
  "69": {
2559
2632
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/context/public_context.nr",