@aztec/protocol-contracts 0.87.3 → 0.87.4-starknet.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/artifacts/AuthRegistry.json +10 -392
- package/artifacts/ContractClassRegisterer.json +7 -246
- package/artifacts/ContractInstanceDeployer.json +6 -241
- package/artifacts/FeeJuice.json +8 -259
- package/artifacts/MultiCallEntrypoint.json +4 -267
- package/artifacts/Router.json +8 -259
- package/dest/protocol_contract_data.js +7 -7
- package/package.json +4 -4
- package/src/protocol_contract_data.ts +7 -7
|
@@ -68,7 +68,7 @@
|
|
|
68
68
|
}
|
|
69
69
|
},
|
|
70
70
|
"bytecode": "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",
|
|
71
|
-
"debug_symbols": "
|
|
71
|
+
"debug_symbols": "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",
|
|
72
72
|
"brillig_names": [
|
|
73
73
|
"_set_authorized"
|
|
74
74
|
]
|
|
@@ -207,7 +207,7 @@
|
|
|
207
207
|
}
|
|
208
208
|
},
|
|
209
209
|
"bytecode": "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",
|
|
210
|
-
"debug_symbols": "
|
|
210
|
+
"debug_symbols": "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",
|
|
211
211
|
"brillig_names": [
|
|
212
212
|
"is_consumable"
|
|
213
213
|
]
|
|
@@ -268,7 +268,7 @@
|
|
|
268
268
|
}
|
|
269
269
|
},
|
|
270
270
|
"bytecode": "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",
|
|
271
|
-
"debug_symbols": "
|
|
271
|
+
"debug_symbols": "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",
|
|
272
272
|
"brillig_names": [
|
|
273
273
|
"is_reject_all"
|
|
274
274
|
]
|
|
@@ -339,7 +339,7 @@
|
|
|
339
339
|
}
|
|
340
340
|
},
|
|
341
341
|
"bytecode": "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",
|
|
342
|
-
"debug_symbols": "
|
|
342
|
+
"debug_symbols": "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",
|
|
343
343
|
"brillig_names": [
|
|
344
344
|
"public_dispatch"
|
|
345
345
|
]
|
|
@@ -2022,7 +2022,7 @@
|
|
|
2022
2022
|
}
|
|
2023
2023
|
},
|
|
2024
2024
|
"bytecode": "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",
|
|
2025
|
-
"debug_symbols": "
|
|
2025
|
+
"debug_symbols": "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",
|
|
2026
2026
|
"brillig_names": [
|
|
2027
2027
|
"store_in_execution_cache_oracle_wrapper",
|
|
2028
2028
|
"call_private_function_internal",
|
|
@@ -2085,153 +2085,14 @@
|
|
|
2085
2085
|
"parameters": [],
|
|
2086
2086
|
"return_type": null,
|
|
2087
2087
|
"error_types": {
|
|
2088
|
-
"576755928210959028": {
|
|
2089
|
-
"error_kind": "string",
|
|
2090
|
-
"string": "0 has a square root; you cannot claim it is not square"
|
|
2091
|
-
},
|
|
2092
|
-
"2709101749560550278": {
|
|
2093
|
-
"error_kind": "string",
|
|
2094
|
-
"string": "Cannot serialize point at infinity as bytes."
|
|
2095
|
-
},
|
|
2096
|
-
"2896122431943215824": {
|
|
2097
|
-
"error_kind": "fmtstring",
|
|
2098
|
-
"length": 144,
|
|
2099
|
-
"item_types": [
|
|
2100
|
-
{
|
|
2101
|
-
"kind": "integer",
|
|
2102
|
-
"sign": "unsigned",
|
|
2103
|
-
"width": 32
|
|
2104
|
-
}
|
|
2105
|
-
]
|
|
2106
|
-
},
|
|
2107
|
-
"2920182694213909827": {
|
|
2108
|
-
"error_kind": "string",
|
|
2109
|
-
"string": "attempt to subtract with overflow"
|
|
2110
|
-
},
|
|
2111
|
-
"3305101268118424981": {
|
|
2112
|
-
"error_kind": "string",
|
|
2113
|
-
"string": "Attempted to delete past the length of a CapsuleArray"
|
|
2114
|
-
},
|
|
2115
|
-
"3367683922240523006": {
|
|
2116
|
-
"error_kind": "fmtstring",
|
|
2117
|
-
"length": 58,
|
|
2118
|
-
"item_types": [
|
|
2119
|
-
{
|
|
2120
|
-
"kind": "field"
|
|
2121
|
-
}
|
|
2122
|
-
]
|
|
2123
|
-
},
|
|
2124
|
-
"5019202896831570965": {
|
|
2125
|
-
"error_kind": "string",
|
|
2126
|
-
"string": "attempt to add with overflow"
|
|
2127
|
-
},
|
|
2128
|
-
"5727012404371710682": {
|
|
2129
|
-
"error_kind": "string",
|
|
2130
|
-
"string": "push out of bounds"
|
|
2131
|
-
},
|
|
2132
|
-
"5870202753060865374": {
|
|
2133
|
-
"error_kind": "fmtstring",
|
|
2134
|
-
"length": 61,
|
|
2135
|
-
"item_types": [
|
|
2136
|
-
{
|
|
2137
|
-
"kind": "field"
|
|
2138
|
-
},
|
|
2139
|
-
{
|
|
2140
|
-
"kind": "field"
|
|
2141
|
-
}
|
|
2142
|
-
]
|
|
2143
|
-
},
|
|
2144
|
-
"6336853191198150230": {
|
|
2145
|
-
"error_kind": "fmtstring",
|
|
2146
|
-
"length": 77,
|
|
2147
|
-
"item_types": [
|
|
2148
|
-
{
|
|
2149
|
-
"kind": "integer",
|
|
2150
|
-
"sign": "unsigned",
|
|
2151
|
-
"width": 32
|
|
2152
|
-
}
|
|
2153
|
-
]
|
|
2154
|
-
},
|
|
2155
|
-
"6485997221020871071": {
|
|
2156
|
-
"error_kind": "string",
|
|
2157
|
-
"string": "call to assert_max_bit_size"
|
|
2158
|
-
},
|
|
2159
|
-
"6753155520859132764": {
|
|
2160
|
-
"error_kind": "string",
|
|
2161
|
-
"string": "Failed to deliver note"
|
|
2162
|
-
},
|
|
2163
|
-
"7233212735005103307": {
|
|
2164
|
-
"error_kind": "string",
|
|
2165
|
-
"string": "attempt to multiply with overflow"
|
|
2166
|
-
},
|
|
2167
|
-
"8830323656616886390": {
|
|
2168
|
-
"error_kind": "string",
|
|
2169
|
-
"string": "Got a public log emitted by a different contract"
|
|
2170
|
-
},
|
|
2171
|
-
"13649294680379557736": {
|
|
2172
|
-
"error_kind": "string",
|
|
2173
|
-
"string": "extend_from_bounded_vec out of bounds"
|
|
2174
|
-
},
|
|
2175
|
-
"14225679739041873922": {
|
|
2176
|
-
"error_kind": "string",
|
|
2177
|
-
"string": "Index out of bounds"
|
|
2178
|
-
},
|
|
2179
|
-
"14514982005979867414": {
|
|
2180
|
-
"error_kind": "string",
|
|
2181
|
-
"string": "attempt to bit-shift with overflow"
|
|
2182
|
-
},
|
|
2183
|
-
"14657895983200220173": {
|
|
2184
|
-
"error_kind": "string",
|
|
2185
|
-
"string": "Attempted to read past the length of a CapsuleArray"
|
|
2186
|
-
},
|
|
2187
|
-
"15366650908120444287": {
|
|
2188
|
-
"error_kind": "fmtstring",
|
|
2189
|
-
"length": 48,
|
|
2190
|
-
"item_types": [
|
|
2191
|
-
{
|
|
2192
|
-
"kind": "field"
|
|
2193
|
-
},
|
|
2194
|
-
{
|
|
2195
|
-
"kind": "field"
|
|
2196
|
-
}
|
|
2197
|
-
]
|
|
2198
|
-
},
|
|
2199
|
-
"16218014537381711836": {
|
|
2200
|
-
"error_kind": "string",
|
|
2201
|
-
"string": "Value does not fit in field"
|
|
2202
|
-
},
|
|
2203
|
-
"16446004518090376065": {
|
|
2204
|
-
"error_kind": "string",
|
|
2205
|
-
"string": "Input length must be a multiple of 32"
|
|
2206
|
-
},
|
|
2207
|
-
"16775516380094354375": {
|
|
2208
|
-
"error_kind": "fmtstring",
|
|
2209
|
-
"length": 40,
|
|
2210
|
-
"item_types": []
|
|
2211
|
-
},
|
|
2212
|
-
"16954218183513903507": {
|
|
2213
|
-
"error_kind": "string",
|
|
2214
|
-
"string": "Attempted to read past end of BoundedVec"
|
|
2215
|
-
},
|
|
2216
2088
|
"17843811134343075018": {
|
|
2217
2089
|
"error_kind": "string",
|
|
2218
2090
|
"string": "Stack too deep"
|
|
2219
|
-
},
|
|
2220
|
-
"17879506016437779469": {
|
|
2221
|
-
"error_kind": "fmtstring",
|
|
2222
|
-
"length": 128,
|
|
2223
|
-
"item_types": [
|
|
2224
|
-
{
|
|
2225
|
-
"kind": "integer",
|
|
2226
|
-
"sign": "unsigned",
|
|
2227
|
-
"width": 32
|
|
2228
|
-
}
|
|
2229
|
-
]
|
|
2230
2091
|
}
|
|
2231
2092
|
}
|
|
2232
2093
|
},
|
|
2233
|
-
"bytecode": "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",
|
|
2234
|
-
"debug_symbols": "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",
|
|
2094
|
+
"bytecode": "H4sIAAAAAAAA/7WTPQ+CMBCGi2KUjzjgoD+jBAyM+LG4OLpXCkpUSAB3frqQXENtwKjAJU17FJ5736OVUB0SzDLqEAyyglmBecTtj8vhQY67hakIdfvku9i2lQZ/Peq3FGBKw/Ax4w/UfzwFzr6o+bwXVndWDo1b66g+H0P5Z/9vSP+LD5418GpAXnmew/oS5Nt74t+Oz8c5SNnXTR1EgnIxdK5CSd0lcZ4SP99QmgZZJhJGDWTUQlU56pVE8YG26fmRdgrSLEpikSZ/Sav6yu6lXLyr8eA57hCOizHTMAb+BDV3X+b2+feXkKuCJ+bT+1Nn6BAztEhI1oRS2yeGwK+CP38vlizs4eEFAAA=",
|
|
2095
|
+
"debug_symbols": "nZPRioQgFIbf5Vx3oaWmvsowDFY2CGLh1MISvfvqoDu14DLMjSfzfF9/pRsMulvvN+PG6QHyskHnjbXmfrNTrxYzuXB3AxQH3IBsKsAEJA2FgmxDYSDFvleQ+2+L1zq2HwRBOyuv3QLSrdZW8KXs+mx6zMo966J8WEUVaDeEGoSjsTpe7dWLRmUUI0pYwjFiiP4qMCInCS5LWp4VPEBZ0OITX5d5WtPEU/p6B0zYuwF40+YAVJQCkDJPGpF4wvhHATjJAQQvBWBlPnz4xLOafRJA1HUSiIaWAvB/AvC8iVr05xdcw1T1xp/29h5V3qjO6jQdV9cfVpfvOa/kszH7qdfD6nU0HQ5IGC+YV3Vz3ePTfgA=",
|
|
2235
2096
|
"brillig_names": [
|
|
2236
2097
|
"sync_private_state"
|
|
2237
2098
|
]
|
|
@@ -2279,153 +2140,22 @@
|
|
|
2279
2140
|
"error_kind": "string",
|
|
2280
2141
|
"string": "Storage slot 0 not allowed. Storage slots must start from 1."
|
|
2281
2142
|
},
|
|
2282
|
-
"576755928210959028": {
|
|
2283
|
-
"error_kind": "string",
|
|
2284
|
-
"string": "0 has a square root; you cannot claim it is not square"
|
|
2285
|
-
},
|
|
2286
|
-
"2709101749560550278": {
|
|
2287
|
-
"error_kind": "string",
|
|
2288
|
-
"string": "Cannot serialize point at infinity as bytes."
|
|
2289
|
-
},
|
|
2290
|
-
"2896122431943215824": {
|
|
2291
|
-
"error_kind": "fmtstring",
|
|
2292
|
-
"length": 144,
|
|
2293
|
-
"item_types": [
|
|
2294
|
-
{
|
|
2295
|
-
"kind": "integer",
|
|
2296
|
-
"sign": "unsigned",
|
|
2297
|
-
"width": 32
|
|
2298
|
-
}
|
|
2299
|
-
]
|
|
2300
|
-
},
|
|
2301
|
-
"2920182694213909827": {
|
|
2302
|
-
"error_kind": "string",
|
|
2303
|
-
"string": "attempt to subtract with overflow"
|
|
2304
|
-
},
|
|
2305
|
-
"3305101268118424981": {
|
|
2306
|
-
"error_kind": "string",
|
|
2307
|
-
"string": "Attempted to delete past the length of a CapsuleArray"
|
|
2308
|
-
},
|
|
2309
|
-
"3367683922240523006": {
|
|
2310
|
-
"error_kind": "fmtstring",
|
|
2311
|
-
"length": 58,
|
|
2312
|
-
"item_types": [
|
|
2313
|
-
{
|
|
2314
|
-
"kind": "field"
|
|
2315
|
-
}
|
|
2316
|
-
]
|
|
2317
|
-
},
|
|
2318
2143
|
"5019202896831570965": {
|
|
2319
2144
|
"error_kind": "string",
|
|
2320
2145
|
"string": "attempt to add with overflow"
|
|
2321
2146
|
},
|
|
2322
|
-
"5727012404371710682": {
|
|
2323
|
-
"error_kind": "string",
|
|
2324
|
-
"string": "push out of bounds"
|
|
2325
|
-
},
|
|
2326
|
-
"5870202753060865374": {
|
|
2327
|
-
"error_kind": "fmtstring",
|
|
2328
|
-
"length": 61,
|
|
2329
|
-
"item_types": [
|
|
2330
|
-
{
|
|
2331
|
-
"kind": "field"
|
|
2332
|
-
},
|
|
2333
|
-
{
|
|
2334
|
-
"kind": "field"
|
|
2335
|
-
}
|
|
2336
|
-
]
|
|
2337
|
-
},
|
|
2338
|
-
"6336853191198150230": {
|
|
2339
|
-
"error_kind": "fmtstring",
|
|
2340
|
-
"length": 77,
|
|
2341
|
-
"item_types": [
|
|
2342
|
-
{
|
|
2343
|
-
"kind": "integer",
|
|
2344
|
-
"sign": "unsigned",
|
|
2345
|
-
"width": 32
|
|
2346
|
-
}
|
|
2347
|
-
]
|
|
2348
|
-
},
|
|
2349
|
-
"6485997221020871071": {
|
|
2350
|
-
"error_kind": "string",
|
|
2351
|
-
"string": "call to assert_max_bit_size"
|
|
2352
|
-
},
|
|
2353
|
-
"6753155520859132764": {
|
|
2354
|
-
"error_kind": "string",
|
|
2355
|
-
"string": "Failed to deliver note"
|
|
2356
|
-
},
|
|
2357
|
-
"7233212735005103307": {
|
|
2358
|
-
"error_kind": "string",
|
|
2359
|
-
"string": "attempt to multiply with overflow"
|
|
2360
|
-
},
|
|
2361
|
-
"8830323656616886390": {
|
|
2362
|
-
"error_kind": "string",
|
|
2363
|
-
"string": "Got a public log emitted by a different contract"
|
|
2364
|
-
},
|
|
2365
|
-
"13649294680379557736": {
|
|
2366
|
-
"error_kind": "string",
|
|
2367
|
-
"string": "extend_from_bounded_vec out of bounds"
|
|
2368
|
-
},
|
|
2369
2147
|
"14225679739041873922": {
|
|
2370
2148
|
"error_kind": "string",
|
|
2371
2149
|
"string": "Index out of bounds"
|
|
2372
2150
|
},
|
|
2373
|
-
"14514982005979867414": {
|
|
2374
|
-
"error_kind": "string",
|
|
2375
|
-
"string": "attempt to bit-shift with overflow"
|
|
2376
|
-
},
|
|
2377
|
-
"14657895983200220173": {
|
|
2378
|
-
"error_kind": "string",
|
|
2379
|
-
"string": "Attempted to read past the length of a CapsuleArray"
|
|
2380
|
-
},
|
|
2381
|
-
"15366650908120444287": {
|
|
2382
|
-
"error_kind": "fmtstring",
|
|
2383
|
-
"length": 48,
|
|
2384
|
-
"item_types": [
|
|
2385
|
-
{
|
|
2386
|
-
"kind": "field"
|
|
2387
|
-
},
|
|
2388
|
-
{
|
|
2389
|
-
"kind": "field"
|
|
2390
|
-
}
|
|
2391
|
-
]
|
|
2392
|
-
},
|
|
2393
|
-
"16218014537381711836": {
|
|
2394
|
-
"error_kind": "string",
|
|
2395
|
-
"string": "Value does not fit in field"
|
|
2396
|
-
},
|
|
2397
|
-
"16446004518090376065": {
|
|
2398
|
-
"error_kind": "string",
|
|
2399
|
-
"string": "Input length must be a multiple of 32"
|
|
2400
|
-
},
|
|
2401
|
-
"16775516380094354375": {
|
|
2402
|
-
"error_kind": "fmtstring",
|
|
2403
|
-
"length": 40,
|
|
2404
|
-
"item_types": []
|
|
2405
|
-
},
|
|
2406
|
-
"16954218183513903507": {
|
|
2407
|
-
"error_kind": "string",
|
|
2408
|
-
"string": "Attempted to read past end of BoundedVec"
|
|
2409
|
-
},
|
|
2410
2151
|
"17843811134343075018": {
|
|
2411
2152
|
"error_kind": "string",
|
|
2412
2153
|
"string": "Stack too deep"
|
|
2413
|
-
},
|
|
2414
|
-
"17879506016437779469": {
|
|
2415
|
-
"error_kind": "fmtstring",
|
|
2416
|
-
"length": 128,
|
|
2417
|
-
"item_types": [
|
|
2418
|
-
{
|
|
2419
|
-
"kind": "integer",
|
|
2420
|
-
"sign": "unsigned",
|
|
2421
|
-
"width": 32
|
|
2422
|
-
}
|
|
2423
|
-
]
|
|
2424
2154
|
}
|
|
2425
2155
|
}
|
|
2426
2156
|
},
|
|
2427
|
-
"bytecode": "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",
|
|
2428
|
-
"debug_symbols": "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",
|
|
2157
|
+
"bytecode": "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",
|
|
2158
|
+
"debug_symbols": "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",
|
|
2429
2159
|
"brillig_names": [
|
|
2430
2160
|
"utility_is_consumable"
|
|
2431
2161
|
]
|
|
@@ -2804,48 +2534,16 @@
|
|
|
2804
2534
|
"file_map": {
|
|
2805
2535
|
"104": {
|
|
2806
2536
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/macros/functions/utils.nr",
|
|
2807
|
-
"source": "use crate::macros::{\n functions::{abi_export::create_fn_abi_export, call_interface_stubs::stub_fn, stub_registry},\n notes::NOTES,\n utils::{\n add_to_hasher, fn_has_noinitcheck, get_fn_visibility, is_fn_contract_library_method,\n is_fn_initializer, is_fn_internal, is_fn_private, is_fn_public, is_fn_test, is_fn_utility,\n is_fn_view, modify_fn_body, module_has_initializer, module_has_storage,\n },\n};\nuse protocol_types::meta::generate_serialize_to_fields;\nuse std::meta::type_of;\n\npub(crate) comptime fn transform_private(f: FunctionDefinition) -> Quoted {\n let fn_abi = create_fn_abi_export(f);\n let fn_stub = stub_fn(f);\n stub_registry::register(f.module(), fn_stub);\n\n // If a function is further modified as unconstrained, we throw an error\n if f.is_unconstrained() {\n let name = f.name();\n panic(\n f\"Function {name} is annotated with #[private] but marked as unconstrained, remove unconstrained keyword\",\n );\n }\n\n let module_has_initializer = module_has_initializer(f.module());\n let module_has_storage = module_has_storage(f.module());\n\n // Private functions undergo a lot of transformations from their Aztec.nr form into a circuit that can be fed to the\n // Private Kernel Circuit.\n // First we change the function signature so that it also receives `PrivateContextInputs`, which contain information\n // about the execution context (e.g. the caller).\n let original_params = f.parameters();\n f.set_parameters(&[(\n quote { inputs },\n quote { crate::context::inputs::private_context_inputs::PrivateContextInputs }.as_type(),\n )]\n .append(original_params));\n\n let mut body = f.body().as_block().unwrap();\n\n // The original params are hashed and passed to the `context` object, so that the kernel can verify we've received\n // the correct values.\n // TODO: Optimize args_hasher for small number of arguments\n let args_hasher_name = quote { args_hasher };\n let args_hasher = original_params.fold(\n quote {\n let mut $args_hasher_name = dep::aztec::hash::ArgsHasher::new();\n },\n |args_hasher, param: (Quoted, Type)| {\n let (name, typ) = param;\n let appended_arg = add_to_hasher(args_hasher_name, name, typ);\n quote {\n $args_hasher\n $appended_arg\n }\n },\n );\n\n let context_creation = quote {\n let mut context = dep::aztec::context::private_context::PrivateContext::new(inputs, dep::aztec::protocol_types::traits::Hash::hash($args_hasher_name));\n };\n\n // Modifications introduced by the different marker attributes.\n let internal_check = if is_fn_internal(f) {\n create_internal_check(f)\n } else {\n quote {}\n };\n\n let view_check = if is_fn_view(f) {\n create_view_check(f)\n } else {\n quote {}\n };\n\n let (assert_initializer, mark_as_initialized) = if is_fn_initializer(f) {\n (create_assert_correct_initializer_args(f), create_mark_as_initialized(f))\n } else {\n (quote {}, quote {})\n };\n\n let storage_init = if module_has_storage {\n quote {\n // Some functions don't access storage, but it'd be quite difficult to only inject this variable if it is\n // referenced. We instead ignore 'unused variable' warnings for it.\n #[allow(unused_variables)]\n let storage = Storage::init(&mut context);\n }\n } else {\n quote {}\n };\n\n // Initialization checks are not included in contracts that don't have initializers.\n let init_check = if module_has_initializer & !is_fn_initializer(f) & !fn_has_noinitcheck(f) {\n create_init_check(f)\n } else {\n quote {}\n };\n\n // All private functions perform message discovery, since they may need to access notes. This is slightly\n // inefficient and could be improved by only doing it once we actually attempt to read any. Note that the message\n // discovery call syncs private events as well. We do not sync those here if there are no notes because we don't\n // have an API that would access events from private functions.\n let message_discovery_call = if NOTES.len() > 0 {\n create_message_discovery_call()\n } else {\n quote {}\n };\n\n // Finally, we need to change the return type to be `PrivateCircuitPublicInputs`, which is what the Private Kernel\n // circuit expects.\n let return_value_var_name = quote { macro__returned__values };\n\n let return_value_type = f.return_type();\n let return_value = if body.len() == 0 {\n quote {}\n } else if return_value_type != type_of(()) {\n // The original return value is passed to a second args hasher which the context receives.\n let (body_without_return, last_body_expr) = body.pop_back();\n let return_value = last_body_expr.quoted();\n let return_value_assignment =\n quote { let $return_value_var_name: $return_value_type = $return_value; };\n let return_hasher_name = quote { return_hasher };\n let return_value_into_hasher =\n add_to_hasher(return_hasher_name, return_value_var_name, return_value_type);\n\n body = body_without_return;\n\n quote {\n let mut $return_hasher_name = dep::aztec::hash::ArgsHasher::new();\n $return_value_assignment\n $return_value_into_hasher\n context.set_return_hash($return_hasher_name);\n }\n } else {\n let (body_without_return, last_body_expr) = body.pop_back();\n if !last_body_expr.has_semicolon()\n & last_body_expr.as_for().is_none()\n & last_body_expr.as_assert().is_none()\n & last_body_expr.as_for_range().is_none()\n & last_body_expr.as_assert_eq().is_none()\n & last_body_expr.as_let().is_none() {\n let unused_return_value_name = f\"_{return_value_var_name}\".quoted_contents();\n body = body_without_return.push_back(\n quote { let $unused_return_value_name = $last_body_expr; }.as_expr().unwrap(),\n );\n }\n quote {}\n };\n\n let context_finish = quote { context.finish() };\n\n let to_prepend = quote {\n $args_hasher\n $context_creation\n $assert_initializer\n $init_check\n $internal_check\n $view_check\n $storage_init\n $message_discovery_call\n };\n\n let to_append = quote {\n $return_value\n $mark_as_initialized\n $context_finish\n };\n let modified_body = modify_fn_body(body, to_prepend, to_append);\n f.set_body(modified_body);\n f.set_return_type(\n quote { dep::protocol_types::abis::private_circuit_public_inputs::PrivateCircuitPublicInputs }\n .as_type(),\n );\n f.set_return_data();\n\n fn_abi\n}\n\npub(crate) comptime fn transform_public(f: FunctionDefinition) -> Quoted {\n let fn_abi = create_fn_abi_export(f);\n let fn_stub = stub_fn(f);\n stub_registry::register(f.module(), fn_stub);\n\n // If a function is further modified as unconstrained, we throw an error\n if f.is_unconstrained() {\n let name = f.name();\n panic(\n f\"Function {name} is annotated with #[public] but marked as unconstrained, remove unconstrained keyword\",\n );\n }\n\n let module_has_initializer = module_has_initializer(f.module());\n let module_has_storage = module_has_storage(f.module());\n\n // Public functions undergo a lot of transformations from their Aztec.nr form.\n let original_params = f.parameters();\n let args_len = original_params\n .map(|(name, typ): (Quoted, Type)| {\n generate_serialize_to_fields(name, typ, false).0.len()\n })\n .fold(0, |acc: u32, val: u32| acc + val);\n\n // Unlike in the private case, in public the `context` does not need to receive the hash of the original params.\n let context_creation = quote {\n let mut context = dep::aztec::context::public_context::PublicContext::new(|| {\n // We start from 1 because we skip the selector for the dispatch function.\n let serialized_args : [Field; $args_len] = dep::aztec::context::public_context::calldata_copy(1, $args_len);\n dep::aztec::hash::hash_args_array(serialized_args)\n });\n };\n\n // Modifications introduced by the different marker attributes.\n let internal_check = if is_fn_internal(f) {\n create_internal_check(f)\n } else {\n quote {}\n };\n\n let view_check = if is_fn_view(f) {\n create_view_check(f)\n } else {\n quote {}\n };\n\n let (assert_initializer, mark_as_initialized) = if is_fn_initializer(f) {\n (create_assert_correct_initializer_args(f), create_mark_as_initialized(f))\n } else {\n (quote {}, quote {})\n };\n\n let storage_init = if module_has_storage {\n // Some functions don't access storage, but it'd be quite difficult to only inject this variable if it is\n // referenced. We instead ignore 'unused variable' warnings for it.\n quote {\n #[allow(unused_variables)]\n let storage = Storage::init(&mut context);\n }\n } else {\n quote {}\n };\n\n // Initialization checks are not included in contracts that don't have initializers.\n let init_check = if module_has_initializer & !fn_has_noinitcheck(f) & !is_fn_initializer(f) {\n create_init_check(f)\n } else {\n quote {}\n };\n\n let to_prepend = quote {\n $context_creation\n $assert_initializer\n $init_check\n $internal_check\n $view_check\n $storage_init\n };\n\n let to_append = quote {\n $mark_as_initialized\n };\n\n let body = f.body().as_block().unwrap();\n let modified_body = modify_fn_body(body, to_prepend, to_append);\n f.set_body(modified_body);\n\n // All public functions are automatically made unconstrained, even if they were not marked as such. This is because\n // instead of compiling into a circuit, they will compile to bytecode that will be later transpiled into AVM\n // bytecode.\n f.set_unconstrained(true);\n f.set_return_public(true);\n\n fn_abi\n}\n\npub(crate) comptime fn transform_utility(f: FunctionDefinition) -> Quoted {\n let fn_abi = create_fn_abi_export(f);\n let fn_stub = stub_fn(f);\n stub_registry::register(f.module(), fn_stub);\n\n // Check if function is marked as unconstrained\n if !f.is_unconstrained() {\n let name = f.name();\n panic(\n f\"Function {name} is annotated with #[utility] but not marked as unconstrained, add unconstrained keyword\",\n );\n }\n\n // Create utility context\n let context_creation =\n quote { let mut context = dep::aztec::context::utility_context::UtilityContext::new(); };\n let module_has_storage = module_has_storage(f.module());\n\n // Initialize Storage if module has storage\n let storage_init = if module_has_storage {\n quote {\n // Some functions don't access storage, but it'd be quite difficult to only inject this variable if it is\n // referenced. We instead ignore 'unused variable' warnings for it.\n #[allow(unused_variables)]\n let storage = Storage::init(context);\n }\n } else {\n quote {}\n };\n\n // All utility functions perform message discovery, since they may need to access private notes that would be\n // found during this process or they may be used to sync private events from TypeScript\n // (`sync_private_state` function gets invoked by PXE::getPrivateEvents function).\n let message_discovery_call = create_message_discovery_call();\n\n // Inject context creation, storage initialization, and message discovery call at the beginning of the function\n // body.\n let to_prepend = quote {\n $context_creation\n $storage_init\n $message_discovery_call\n };\n let body = f.body().as_block().unwrap();\n let modified_body = modify_fn_body(body, to_prepend, quote {});\n f.set_body(modified_body);\n\n f.set_return_public(true);\n\n fn_abi\n}\n\ncomptime fn create_internal_check(f: FunctionDefinition) -> Quoted {\n let name = f.name();\n let assertion_message = f\"Function {name} can only be called internally\";\n quote { assert(context.msg_sender() == context.this_address(), $assertion_message); }\n}\n\ncomptime fn create_view_check(f: FunctionDefinition) -> Quoted {\n let name = f.name();\n let assertion_message = f\"Function {name} can only be called statically\";\n if is_fn_private(f) {\n // Here `context` is of type context::PrivateContext\n quote { assert(context.inputs.call_context.is_static_call == true, $assertion_message); }\n } else {\n // Here `context` is of type context::PublicContext\n quote { assert(context.is_static_call(), $assertion_message); }\n }\n}\n\ncomptime fn create_assert_correct_initializer_args(f: FunctionDefinition) -> Quoted {\n let fn_visibility = get_fn_visibility(f);\n f\"dep::aztec::macros::functions::initialization_utils::assert_initialization_matches_address_preimage_{fn_visibility}(context);\"\n .quoted_contents()\n}\n\ncomptime fn create_mark_as_initialized(f: FunctionDefinition) -> Quoted {\n let fn_visibility = get_fn_visibility(f);\n f\"dep::aztec::macros::functions::initialization_utils::mark_as_initialized_{fn_visibility}(&mut context);\"\n .quoted_contents()\n}\n\ncomptime fn create_init_check(f: FunctionDefinition) -> Quoted {\n let fn_visibility = get_fn_visibility(f);\n f\"dep::aztec::macros::functions::initialization_utils::assert_is_initialized_{fn_visibility}(&mut context);\"\n .quoted_contents()\n}\n\n/// Injects a call to `aztec::messages::discovery::discover_new_messages`, causing for new notes to be added to PXE and made\n/// available for the current execution.\npub(crate) comptime fn create_message_discovery_call() -> Quoted {\n quote {\n /// Safety: message discovery returns nothing and is performed solely for its side-effects. It is therefore\n /// always safe to call.\n unsafe {\n dep::aztec::messages::discovery::discover_new_messages(\n context.this_address(),\n _compute_note_hash_and_nullifier,\n );\n };\n }\n}\n\n/// Checks if each function in the module is marked with either #[private], #[public], #[utility],\n/// #[contract_library_method], or #[test]. Non-macroified functions are not allowed in contracts.\npub(crate) comptime fn check_each_fn_macroified(m: Module) {\n for f in m.functions() {\n let name = f.name();\n if !is_fn_private(f)\n & !is_fn_public(f)\n & !is_fn_utility(f)\n & !is_fn_contract_library_method(f)\n & !is_fn_test(f) {\n panic(\n f\"Function {name} must be marked as either #[private], #[public], #[utility], #[contract_library_method], or #[test]\",\n );\n }\n }\n}\n"
|
|
2537
|
+
"source": "use crate::macros::{\n functions::{abi_export::create_fn_abi_export, call_interface_stubs::stub_fn, stub_registry},\n notes::NOTES,\n utils::{\n add_to_hasher, fn_has_noinitcheck, get_fn_visibility, is_fn_contract_library_method,\n is_fn_initializer, is_fn_internal, is_fn_private, is_fn_public, is_fn_test, is_fn_utility,\n is_fn_view, modify_fn_body, module_has_initializer, module_has_storage,\n },\n};\nuse protocol_types::meta::generate_serialize_to_fields;\nuse std::meta::type_of;\n\npub(crate) comptime fn transform_private(f: FunctionDefinition) -> Quoted {\n let fn_abi = create_fn_abi_export(f);\n let fn_stub = stub_fn(f);\n stub_registry::register(f.module(), fn_stub);\n\n // If a function is further modified as unconstrained, we throw an error\n if f.is_unconstrained() {\n let name = f.name();\n panic(\n f\"Function {name} is annotated with #[private] but marked as unconstrained, remove unconstrained keyword\",\n );\n }\n\n let module_has_initializer = module_has_initializer(f.module());\n let module_has_storage = module_has_storage(f.module());\n\n // Private functions undergo a lot of transformations from their Aztec.nr form into a circuit that can be fed to the\n // Private Kernel Circuit.\n // First we change the function signature so that it also receives `PrivateContextInputs`, which contain information\n // about the execution context (e.g. the caller).\n let original_params = f.parameters();\n f.set_parameters(&[(\n quote { inputs },\n quote { crate::context::inputs::private_context_inputs::PrivateContextInputs }.as_type(),\n )]\n .append(original_params));\n\n let mut body = f.body().as_block().unwrap();\n\n // The original params are hashed and passed to the `context` object, so that the kernel can verify we've received\n // the correct values.\n // TODO: Optimize args_hasher for small number of arguments\n let args_hasher_name = quote { args_hasher };\n let args_hasher = original_params.fold(\n quote {\n let mut $args_hasher_name = dep::aztec::hash::ArgsHasher::new();\n },\n |args_hasher, param: (Quoted, Type)| {\n let (name, typ) = param;\n let appended_arg = add_to_hasher(args_hasher_name, name, typ);\n quote {\n $args_hasher\n $appended_arg\n }\n },\n );\n\n let context_creation = quote {\n let mut context = dep::aztec::context::private_context::PrivateContext::new(inputs, dep::aztec::protocol_types::traits::Hash::hash($args_hasher_name));\n };\n\n // Modifications introduced by the different marker attributes.\n let internal_check = if is_fn_internal(f) {\n create_internal_check(f)\n } else {\n quote {}\n };\n\n let view_check = if is_fn_view(f) {\n create_view_check(f)\n } else {\n quote {}\n };\n\n let (assert_initializer, mark_as_initialized) = if is_fn_initializer(f) {\n (create_assert_correct_initializer_args(f), create_mark_as_initialized(f))\n } else {\n (quote {}, quote {})\n };\n\n let storage_init = if module_has_storage {\n quote {\n // Some functions don't access storage, but it'd be quite difficult to only inject this variable if it is\n // referenced. We instead ignore 'unused variable' warnings for it.\n #[allow(unused_variables)]\n let storage = Storage::init(&mut context);\n }\n } else {\n quote {}\n };\n\n // Initialization checks are not included in contracts that don't have initializers.\n let init_check = if module_has_initializer & !is_fn_initializer(f) & !fn_has_noinitcheck(f) {\n create_init_check(f)\n } else {\n quote {}\n };\n\n // All private functions perform message discovery, since they may need to access notes. This is slightly\n // inefficient and could be improved by only doing it once we actually attempt to read any.\n let message_discovery_call = if NOTES.len() > 0 {\n create_message_discovery_call()\n } else {\n quote {}\n };\n\n // Finally, we need to change the return type to be `PrivateCircuitPublicInputs`, which is what the Private Kernel\n // circuit expects.\n let return_value_var_name = quote { macro__returned__values };\n\n let return_value_type = f.return_type();\n let return_value = if body.len() == 0 {\n quote {}\n } else if return_value_type != type_of(()) {\n // The original return value is passed to a second args hasher which the context receives.\n let (body_without_return, last_body_expr) = body.pop_back();\n let return_value = last_body_expr.quoted();\n let return_value_assignment =\n quote { let $return_value_var_name: $return_value_type = $return_value; };\n let return_hasher_name = quote { return_hasher };\n let return_value_into_hasher =\n add_to_hasher(return_hasher_name, return_value_var_name, return_value_type);\n\n body = body_without_return;\n\n quote {\n let mut $return_hasher_name = dep::aztec::hash::ArgsHasher::new();\n $return_value_assignment\n $return_value_into_hasher\n context.set_return_hash($return_hasher_name);\n }\n } else {\n let (body_without_return, last_body_expr) = body.pop_back();\n if !last_body_expr.has_semicolon()\n & last_body_expr.as_for().is_none()\n & last_body_expr.as_assert().is_none()\n & last_body_expr.as_for_range().is_none()\n & last_body_expr.as_assert_eq().is_none()\n & last_body_expr.as_let().is_none() {\n let unused_return_value_name = f\"_{return_value_var_name}\".quoted_contents();\n body = body_without_return.push_back(\n quote { let $unused_return_value_name = $last_body_expr; }.as_expr().unwrap(),\n );\n }\n quote {}\n };\n\n let context_finish = quote { context.finish() };\n\n let to_prepend = quote {\n $args_hasher\n $context_creation\n $assert_initializer\n $init_check\n $internal_check\n $view_check\n $storage_init\n $message_discovery_call\n };\n\n let to_append = quote {\n $return_value\n $mark_as_initialized\n $context_finish\n };\n let modified_body = modify_fn_body(body, to_prepend, to_append);\n f.set_body(modified_body);\n f.set_return_type(\n quote { dep::protocol_types::abis::private_circuit_public_inputs::PrivateCircuitPublicInputs }\n .as_type(),\n );\n f.set_return_data();\n\n fn_abi\n}\n\npub(crate) comptime fn transform_public(f: FunctionDefinition) -> Quoted {\n let fn_abi = create_fn_abi_export(f);\n let fn_stub = stub_fn(f);\n stub_registry::register(f.module(), fn_stub);\n\n // If a function is further modified as unconstrained, we throw an error\n if f.is_unconstrained() {\n let name = f.name();\n panic(\n f\"Function {name} is annotated with #[public] but marked as unconstrained, remove unconstrained keyword\",\n );\n }\n\n let module_has_initializer = module_has_initializer(f.module());\n let module_has_storage = module_has_storage(f.module());\n\n // Public functions undergo a lot of transformations from their Aztec.nr form.\n let original_params = f.parameters();\n let args_len = original_params\n .map(|(name, typ): (Quoted, Type)| {\n generate_serialize_to_fields(name, typ, false).0.len()\n })\n .fold(0, |acc: u32, val: u32| acc + val);\n\n // Unlike in the private case, in public the `context` does not need to receive the hash of the original params.\n let context_creation = quote {\n let mut context = dep::aztec::context::public_context::PublicContext::new(|| {\n // We start from 1 because we skip the selector for the dispatch function.\n let serialized_args : [Field; $args_len] = dep::aztec::context::public_context::calldata_copy(1, $args_len);\n dep::aztec::hash::hash_args_array(serialized_args)\n });\n };\n\n // Modifications introduced by the different marker attributes.\n let internal_check = if is_fn_internal(f) {\n create_internal_check(f)\n } else {\n quote {}\n };\n\n let view_check = if is_fn_view(f) {\n create_view_check(f)\n } else {\n quote {}\n };\n\n let (assert_initializer, mark_as_initialized) = if is_fn_initializer(f) {\n (create_assert_correct_initializer_args(f), create_mark_as_initialized(f))\n } else {\n (quote {}, quote {})\n };\n\n let storage_init = if module_has_storage {\n // Some functions don't access storage, but it'd be quite difficult to only inject this variable if it is\n // referenced. We instead ignore 'unused variable' warnings for it.\n quote {\n #[allow(unused_variables)]\n let storage = Storage::init(&mut context);\n }\n } else {\n quote {}\n };\n\n // Initialization checks are not included in contracts that don't have initializers.\n let init_check = if module_has_initializer & !fn_has_noinitcheck(f) & !is_fn_initializer(f) {\n create_init_check(f)\n } else {\n quote {}\n };\n\n let to_prepend = quote {\n $context_creation\n $assert_initializer\n $init_check\n $internal_check\n $view_check\n $storage_init\n };\n\n let to_append = quote {\n $mark_as_initialized\n };\n\n let body = f.body().as_block().unwrap();\n let modified_body = modify_fn_body(body, to_prepend, to_append);\n f.set_body(modified_body);\n\n // All public functions are automatically made unconstrained, even if they were not marked as such. This is because\n // instead of compiling into a circuit, they will compile to bytecode that will be later transpiled into AVM\n // bytecode.\n f.set_unconstrained(true);\n f.set_return_public(true);\n\n fn_abi\n}\n\npub(crate) comptime fn transform_utility(f: FunctionDefinition) -> Quoted {\n let fn_abi = create_fn_abi_export(f);\n let fn_stub = stub_fn(f);\n stub_registry::register(f.module(), fn_stub);\n\n // Check if function is marked as unconstrained\n if !f.is_unconstrained() {\n let name = f.name();\n panic(\n f\"Function {name} is annotated with #[utility] but not marked as unconstrained, add unconstrained keyword\",\n );\n }\n\n // Create utility context\n let context_creation =\n quote { let mut context = dep::aztec::context::utility_context::UtilityContext::new(); };\n let module_has_storage = module_has_storage(f.module());\n\n // Initialize Storage if module has storage\n let storage_init = if module_has_storage {\n quote {\n // Some functions don't access storage, but it'd be quite difficult to only inject this variable if it is\n // referenced. We instead ignore 'unused variable' warnings for it.\n #[allow(unused_variables)]\n let storage = Storage::init(context);\n }\n } else {\n quote {}\n };\n\n // All utility functions perform message discovery, since they may need to access private notes that would be\n // found during this process. This is slightly inefficient and could be improved by only doing it once we actually\n // attempt to read any.\n let message_discovery_call = if NOTES.len() > 0 {\n create_message_discovery_call()\n } else {\n quote {}\n };\n\n // Inject context creation, storage initialization, and message discovery call at the beginning of the function\n // body.\n let to_prepend = quote {\n $context_creation\n $storage_init\n $message_discovery_call\n };\n let body = f.body().as_block().unwrap();\n let modified_body = modify_fn_body(body, to_prepend, quote {});\n f.set_body(modified_body);\n\n f.set_return_public(true);\n\n fn_abi\n}\n\ncomptime fn create_internal_check(f: FunctionDefinition) -> Quoted {\n let name = f.name();\n let assertion_message = f\"Function {name} can only be called internally\";\n quote { assert(context.msg_sender() == context.this_address(), $assertion_message); }\n}\n\ncomptime fn create_view_check(f: FunctionDefinition) -> Quoted {\n let name = f.name();\n let assertion_message = f\"Function {name} can only be called statically\";\n if is_fn_private(f) {\n // Here `context` is of type context::PrivateContext\n quote { assert(context.inputs.call_context.is_static_call == true, $assertion_message); }\n } else {\n // Here `context` is of type context::PublicContext\n quote { assert(context.is_static_call(), $assertion_message); }\n }\n}\n\ncomptime fn create_assert_correct_initializer_args(f: FunctionDefinition) -> Quoted {\n let fn_visibility = get_fn_visibility(f);\n f\"dep::aztec::macros::functions::initialization_utils::assert_initialization_matches_address_preimage_{fn_visibility}(context);\"\n .quoted_contents()\n}\n\ncomptime fn create_mark_as_initialized(f: FunctionDefinition) -> Quoted {\n let fn_visibility = get_fn_visibility(f);\n f\"dep::aztec::macros::functions::initialization_utils::mark_as_initialized_{fn_visibility}(&mut context);\"\n .quoted_contents()\n}\n\ncomptime fn create_init_check(f: FunctionDefinition) -> Quoted {\n let fn_visibility = get_fn_visibility(f);\n f\"dep::aztec::macros::functions::initialization_utils::assert_is_initialized_{fn_visibility}(&mut context);\"\n .quoted_contents()\n}\n\n/// Injects a call to `aztec::messages::discovery::discover_new_messages`, causing for new notes to be added to PXE and made\n/// available for the current execution.\npub(crate) comptime fn create_message_discovery_call() -> Quoted {\n quote {\n /// Safety: message discovery returns nothing and is performed solely for its side-effects. It is therefore\n /// always safe to call.\n unsafe {\n dep::aztec::messages::discovery::discover_new_messages(\n context.this_address(),\n _compute_note_hash_and_nullifier,\n );\n };\n }\n}\n\n/// Checks if each function in the module is marked with either #[private], #[public], #[utility],\n/// #[contract_library_method], or #[test]. Non-macroified functions are not allowed in contracts.\npub(crate) comptime fn check_each_fn_macroified(m: Module) {\n for f in m.functions() {\n let name = f.name();\n if !is_fn_private(f)\n & !is_fn_public(f)\n & !is_fn_utility(f)\n & !is_fn_contract_library_method(f)\n & !is_fn_test(f) {\n panic(\n f\"Function {name} must be marked as either #[private], #[public], #[utility], #[contract_library_method], or #[test]\",\n );\n }\n }\n}\n"
|
|
2808
2538
|
},
|
|
2809
2539
|
"107": {
|
|
2810
2540
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/macros/storage.nr",
|
|
2811
2541
|
"source": "use poseidon::poseidon2::Poseidon2Hasher;\nuse std::{collections::umap::UHashMap, hash::BuildHasherDefault};\n\nuse super::utils::AsStrQuote;\nuse super::utils::get_storage_size;\n\n/// Stores a map from a module to the name of the struct that describes its storage layout.\n/// This is then used when generating a `storage_layout()` getter on the contract struct.\npub comptime mut global STORAGE_LAYOUT_NAME: UHashMap<Module, Quoted, BuildHasherDefault<Poseidon2Hasher>> =\n UHashMap::default();\n\n/// Marks a struct as the one describing the storage layout of a contract.\n///\n/// The contract's storage is accessed via the `storage` variable, which will will automatically be made available in\n/// all functions as an instance of the struct this macro was applied to.\n///\n/// Only a single struct in the entire contract should have this macro (or `storage_no_init`) applied to it, and the\n/// struct has to be called 'Storage'.\npub comptime fn storage(s: TypeDefinition) -> Quoted {\n let struct_name = s.name();\n if struct_name != quote { Storage } {\n panic(\n f\"The #[storage] macro can only be applied to a struct with name 'Storage', got '{struct_name}' instead.\",\n )\n }\n\n assert(\n !s.has_named_attribute(\"storage_no_init\"),\n f\"Only one of #[storage] and #[storage_no_init] can be applied to the Storage struct.\",\n );\n\n // This macro performs three things:\n // - it marks the contract as having storage, so that `macros::utils::module_has_storage` will return true and\n // functions will have the storage variable injected and initialized via the `init` function.\n // - it implements said `init` function by allocating appropriate storage slots to each state variable.\n // - it exposes the storage layout by creating a `StorageLayout` struct that is exposed via the `abi(storage)`\n // macro.\n let mut slot: u32 = 1;\n let mut storage_vars_constructors = &[];\n let mut storage_layout_fields = &[];\n let mut storage_layout_constructors = &[];\n\n // TODO(#8658): uncomment the code below to inject the Context type parameter.\n //let mut new_storage_fields = &[];\n //let context_generic = s.add_generic(\"Context\");\n for field in s.fields_as_written() {\n // FIXME: This doesn't handle field types with generics\n let (name, typ) = field;\n let (storage_field_constructor, storage_size) =\n generate_storage_field_constructor(typ, quote { $slot });\n storage_vars_constructors =\n storage_vars_constructors.push_back(quote { $name: $storage_field_constructor });\n // We have `Storable` in a separate `.nr` file instead of defining it in the last quote of this function\n // because that way a dev gets a more reasonable error if he defines a struct with the same name in\n // a contract.\n storage_layout_fields =\n storage_layout_fields.push_back(quote { pub $name: dep::aztec::prelude::Storable });\n storage_layout_constructors = storage_layout_constructors.push_back(\n quote { $name: dep::aztec::prelude::Storable { slot: $slot } },\n );\n //let with_context_generic = add_context_generic(typ, context_generic);\n //println(with_context_generic);\n //new_storage_fields = new_storage_fields.push_back((name, with_context_generic ));\n slot += storage_size;\n }\n\n //s.set_fields(new_storage_fields);\n let storage_vars_constructors = storage_vars_constructors.join(quote {,});\n let storage_impl = quote {\n impl<Context> Storage<Context> {\n fn init(context: Context) -> Self {\n Self {\n $storage_vars_constructors\n }\n }\n }\n };\n\n let storage_layout_fields = storage_layout_fields.join(quote {,});\n let storage_layout_constructors = storage_layout_constructors.join(quote {,});\n\n let module = s.module();\n let module_name = module.name();\n let storage_layout_name = f\"STORAGE_LAYOUT_{module_name}\".quoted_contents();\n let (module_name_str, module_name_len) = module_name.as_str_quote();\n STORAGE_LAYOUT_NAME.insert(module, storage_layout_name);\n\n quote {\n $storage_impl\n\n pub struct StorageLayoutFields {\n $storage_layout_fields\n }\n\n pub struct StorageLayout<let N: u32> {\n pub contract_name: str<N>,\n pub fields: StorageLayoutFields\n }\n\n #[abi(storage)]\n pub global $storage_layout_name: StorageLayout<$module_name_len> = StorageLayout {\n contract_name: $module_name_str,\n fields: StorageLayoutFields { $storage_layout_constructors }\n };\n }\n}\n\n/// Same as `storage`, except the user is in charge of providing an implementation of the `init` constructor function\n/// with signature `fn init<Context>(context: Context) -> Self`, which allows for manual control of storage slot\n/// allocation. Similarly, no `StorageLayout` struct will be created.\n///\n/// The contract's storage is accessed via the `storage` variable, which will will automatically be made available in\n/// all functions as an instance of the struct this macro was applied to.\n///\n/// Only a single struct in the entire contract can have this macro (or storage_no_init) applied to it, and the struct\n/// has to be called 'Storage'.\npub comptime fn storage_no_init(s: TypeDefinition) {\n // All `storage` does is provide the `init` implementation, so we don't need to do anything here. Applying this\n // macro however will cause for `macros::utils::module_has_storage` to return true, resulting in the injection of\n // the `storage` variable.\n\n // We do need to make sure that the type is called Storage, since we'll do `Storage::init` later on.\n\n if s.name() != quote { Storage } {\n let name = s.name();\n panic(\n f\"The #[storage_no_init] macro can only be applied to a struct with name 'Storage', got '{name}' instead.\",\n )\n }\n\n assert(\n !s.has_named_attribute(\"storage\"),\n f\"Only one of #[storage] and #[storage_no_init] can be applied to the Storage struct.\",\n );\n}\n\n/// Returns the expression required to initialize a state variable with a given slot, along with its serialization size,\n/// i.e. how many contiguous storage slots the variable requires.\ncomptime fn generate_storage_field_constructor(typ: Type, slot: Quoted) -> (Quoted, u32) {\n assert(\n typ.as_data_type().is_some(),\n \"Storage containers must be generic structs of the form `Container<_, Context>`, or Map<Key, _, Context>\",\n );\n let (container_struct, generics) = typ.as_data_type().unwrap();\n let struct_name = container_struct.name();\n\n let constructor = if is_storage_map(typ) {\n // Map state variables recursively initialize their contents - this includes nested maps.\n let (value_constructor, _) =\n generate_storage_field_constructor(generics[1], quote { slot });\n\n quote { $struct_name::new(context, $slot, | context, slot | { $value_constructor }) }\n } else {\n // We assume below that all state variables implement `fn new<Context>(context: Context, slot: Field) -> Self`.\n quote { $struct_name::new(context, $slot)}\n };\n\n (constructor, get_storage_size(typ))\n}\n\n/// Returns true if `typ` is `state_vars::map::Map`.\ncomptime fn is_storage_map(typ: Type) -> bool {\n if typ.as_data_type().is_some() {\n let (def, generics) = typ.as_data_type().unwrap();\n let maybe_map = if (def.name() == quote { Map }) & (generics.len() == 3) {\n let maybe_key = generics[0];\n let maybe_value = generics[1];\n let maybe_context = generics[2];\n quote { crate::state_vars::map::Map<$maybe_key, $maybe_value, $maybe_context> }.as_type()\n } else {\n quote {()}.as_type()\n };\n typ == maybe_map\n } else {\n false\n }\n}\n\ncomptime fn add_context_generic(typ: Type, context_generic: Type) -> Type {\n let (def, mut generics) = typ.as_data_type().expect(\n f\"Storage containers must be generic structs of the form `Container<..., Context>`\",\n );\n let name = def.name();\n\n if is_storage_map(typ) {\n generics[generics.len() - 2] = add_context_generic(generics[1], context_generic);\n generics[generics.len() - 1] = context_generic;\n } else {\n generics[generics.len() - 1] = context_generic;\n }\n\n let generics = generics.map(|typ: Type| quote {$typ}).join(quote {,});\n quote { $name<$generics> }.as_type()\n}\n"
|
|
2812
2542
|
},
|
|
2813
|
-
"109": {
|
|
2814
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/messages/discovery/mod.nr",
|
|
2815
|
-
"source": "use protocol_types::{address::AztecAddress, debug_log::debug_log};\n\npub mod nonce_discovery;\npub mod partial_notes;\npub mod pending_tagged_log;\npub mod private_logs;\npub mod private_notes;\n\nuse private_notes::MAX_NOTE_PACKED_LEN;\n\npub struct NoteHashAndNullifier {\n /// The result of NoteHash::compute_note_hash\n pub note_hash: Field,\n /// The result of NoteHash::compute_nullifier_unconstrained (since all of message discovery is unconstrained)\n pub inner_nullifier: Field,\n}\n\n/// A function which takes a note's packed content, address of the emitting contract, nonce, storage slot and note type\n/// ID and attempts to compute its note hash (not siloed by nonce nor address) and inner nullifier (not siloed by\n/// address).\n///\n/// This function must be user-provided as its implementation requires knowledge of how note type IDs are allocated in a\n/// contract. The `#[aztec]` macro automatically creates such a contract library method called\n/// `_compute_note_hash_and_nullifier`, which looks something like this:\n///\n/// ```\n/// |packed_note, contract_address, nonce, storage_slot, note_type_id| {\n/// if note_type_id == MyNoteType::get_id() {\n/// assert(packed_note.len() == MY_NOTE_TYPE_SERIALIZATION_LENGTH);\n///\n/// let note = MyNoteType::unpack(aztec::utils::array::subarray(packed_note.storage(), 0));\n///\n/// let note_hash = note.compute_note_hash(storage_slot);\n/// let note_hash_for_nullify = aztec::note::utils::compute_note_hash_for_nullify(\n/// RetrievedNote{ note, contract_address, metadata: SettledNoteMetadata::new(nonce).into() },\n/// storage_slot\n/// );\n///\n/// let inner_nullifier = note.compute_nullifier_unconstrained(note_hash_for_nullify);\n///\n/// Option::some(\n/// aztec::messages::discovery::NoteHashAndNullifier {\n/// note_hash, inner_nullifier\n/// }\n/// )\n/// } else if note_type_id == MyOtherNoteType::get_id() {\n/// ... // Similar to above but calling MyOtherNoteType::unpack_content\n/// } else {\n/// Option::none() // Unknown note type ID\n/// };\n/// }\n/// ```\ntype ComputeNoteHashAndNullifier<Env> = unconstrained fn[Env](/* packed_note */BoundedVec<Field, MAX_NOTE_PACKED_LEN>, /* storage_slot */ Field, /* note_type_id */ Field, /* contract_address */ AztecAddress, /* nonce */ Field) -> Option<NoteHashAndNullifier>;\n\n/// Performs the message discovery process, in which private are downloaded and inspected to find new private notes,\n/// partial notes and events, etc., and pending partial notes are processed to search for their completion logs.\n/// This is the mechanism via which a contract updates its knowledge of its private state.\n///\n/// Receives the address of the contract on which discovery is performed along with its\n/// `compute_note_hash_and_nullifier` function.\npub unconstrained fn discover_new_messages<Env>(\n contract_address: AztecAddress,\n compute_note_hash_and_nullifier: ComputeNoteHashAndNullifier<Env>,\n) {\n debug_log(\"Performing message discovery\");\n\n private_logs::fetch_and_process_private_tagged_logs(\n contract_address,\n compute_note_hash_and_nullifier,\n );\n\n partial_notes::fetch_and_process_public_partial_note_completion_logs(\n contract_address,\n compute_note_hash_and_nullifier,\n );\n}\n"
|
|
2816
|
-
},
|
|
2817
|
-
"110": {
|
|
2818
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/messages/discovery/nonce_discovery.nr",
|
|
2819
|
-
"source": "use crate::messages::discovery::{ComputeNoteHashAndNullifier, private_notes::MAX_NOTE_PACKED_LEN};\n\nuse dep::protocol_types::{\n address::AztecAddress,\n constants::MAX_NOTE_HASHES_PER_TX,\n debug_log::debug_log_format,\n hash::{compute_note_hash_nonce, compute_siloed_note_hash, compute_unique_note_hash},\n traits::ToField,\n};\n\n/// A struct with the discovered information of a complete note, required for delivery to PXE. Note that this is *not*\n/// the complete note information, since it does not include content, storage slot, etc.\npub struct DiscoveredNoteInfo {\n pub nonce: Field,\n pub note_hash: Field,\n pub inner_nullifier: Field,\n}\n\n/// Searches for note nonces that will result in a note that was emitted in a transaction. While rare, it is possible\n/// for multiple notes to have the exact same packed content and storage slot but different nonces, resulting in\n/// different unique note hashes. Because of this this function returns a *vector* of discovered notes, though in most\n/// cases it will contain a single element.\n///\n/// Due to how nonces are computed, this function requires knowledge of the transaction in which the note was created,\n/// more specifically the list of all unique note hashes in it plus the value of its first nullifier.\npub unconstrained fn attempt_note_nonce_discovery<Env>(\n unique_note_hashes_in_tx: BoundedVec<Field, MAX_NOTE_HASHES_PER_TX>,\n first_nullifier_in_tx: Field,\n compute_note_hash_and_nullifier: ComputeNoteHashAndNullifier<Env>,\n contract_address: AztecAddress,\n storage_slot: Field,\n note_type_id: Field,\n packed_note: BoundedVec<Field, MAX_NOTE_PACKED_LEN>,\n) -> BoundedVec<DiscoveredNoteInfo, MAX_NOTE_HASHES_PER_TX> {\n let discovered_notes = &mut BoundedVec::new();\n\n debug_log_format(\n \"Attempting nonce discovery on {0} potential notes on contract {1} for storage slot {2}\",\n [unique_note_hashes_in_tx.len() as Field, contract_address.to_field(), storage_slot],\n );\n\n // We need to find nonces (typically just one) that result in a note hash that, once siloed into a unique note hash,\n // is one of the note hashes created by the transaction.\n unique_note_hashes_in_tx.for_eachi(|i, expected_unique_note_hash| {\n // Nonces are computed by hashing the first nullifier in the transaction with the index of the note in the\n // new note hashes array. We therefore know for each note in every transaction what its nonce is.\n let candidate_nonce = compute_note_hash_nonce(first_nullifier_in_tx, i);\n\n // Given nonce, note content and metadata, we can compute the note hash and silo it to check if it matches\n // the note hash at the array index we're currently processing.\n // TODO(#11157): handle failed note_hash_and_nullifier computation\n let hashes = compute_note_hash_and_nullifier(\n packed_note,\n storage_slot,\n note_type_id,\n contract_address,\n candidate_nonce,\n )\n .expect(f\"Failed to compute a note hash for note type {note_type_id}\");\n\n let siloed_note_hash = compute_siloed_note_hash(contract_address, hashes.note_hash);\n let unique_note_hash = compute_unique_note_hash(candidate_nonce, siloed_note_hash);\n\n if unique_note_hash == expected_unique_note_hash {\n // Note that while we did check that the note hash is the preimage of the expected unique note hash, we\n // perform no validations on the nullifier - we fundamentally cannot, since only the application knows\n // how to compute nullifiers. We simply trust it to have provided the correct one: if it hasn't, then\n // PXE may fail to realize that a given note has been nullified already, and calls to the application\n // could result in invalid transactions (with duplicate nullifiers). This is not a concern because an\n // application already has more direct means of making a call to it fail the transaction.\n discovered_notes.push(\n DiscoveredNoteInfo {\n nonce: candidate_nonce,\n note_hash: hashes.note_hash,\n inner_nullifier: hashes.inner_nullifier,\n },\n );\n\n // We don't exit the loop - it is possible (though rare) for the exact same note content to be present\n // multiple times in the same transaction with different nonces. This typically doesn't happen due to\n // notes containing random values in order to hide their contents.\n }\n });\n\n debug_log_format(\n \"Discovered a total of {0} notes\",\n [discovered_notes.len() as Field],\n );\n\n *discovered_notes\n}\n\nmod test {\n use crate::{\n messages::discovery::{NoteHashAndNullifier, private_notes::MAX_NOTE_PACKED_LEN},\n note::{\n note_interface::{NoteHash, NoteType},\n note_metadata::SettledNoteMetadata,\n retrieved_note::RetrievedNote,\n utils::compute_note_hash_for_nullify,\n },\n oracle::random::random,\n test::mocks::mock_note::MockNote,\n utils::array,\n };\n\n use dep::protocol_types::{\n address::AztecAddress,\n hash::{compute_note_hash_nonce, compute_siloed_note_hash, compute_unique_note_hash},\n traits::{FromField, Packable},\n };\n\n use super::attempt_note_nonce_discovery;\n\n // This implementation could be simpler, but this serves as a nice example of the expected flow in a real\n // implementation, and as a sanity check that the interface is sufficient.\n unconstrained fn compute_note_hash_and_nullifier(\n packed_note: BoundedVec<Field, MAX_NOTE_PACKED_LEN>,\n storage_slot: Field,\n note_type_id: Field,\n contract_address: AztecAddress,\n nonce: Field,\n ) -> Option<NoteHashAndNullifier> {\n if note_type_id == MockNote::get_id() {\n let note = MockNote::unpack(array::subarray(packed_note.storage(), 0));\n let note_hash = note.compute_note_hash(storage_slot);\n\n let note_hash_for_nullify = compute_note_hash_for_nullify(\n RetrievedNote {\n note,\n contract_address,\n metadata: SettledNoteMetadata::new(nonce).into(),\n },\n storage_slot,\n );\n\n let inner_nullifier = note.compute_nullifier_unconstrained(note_hash_for_nullify);\n\n Option::some(NoteHashAndNullifier { note_hash, inner_nullifier })\n } else {\n Option::none()\n }\n }\n\n global VALUE: Field = 7;\n global FIRST_NULLIFIER_IN_TX: Field = 47;\n global CONTRACT_ADDRESS: AztecAddress = AztecAddress::from_field(13);\n global STORAGE_SLOT: Field = 99;\n\n #[test]\n unconstrained fn no_note_hashes() {\n let unique_note_hashes_in_tx = BoundedVec::new();\n let packed_note = BoundedVec::new();\n\n let discovered_notes = attempt_note_nonce_discovery(\n unique_note_hashes_in_tx,\n FIRST_NULLIFIER_IN_TX,\n compute_note_hash_and_nullifier,\n CONTRACT_ADDRESS,\n STORAGE_SLOT,\n MockNote::get_id(),\n packed_note,\n );\n\n assert_eq(discovered_notes.len(), 0);\n }\n\n #[test(should_fail_with = \"Failed to compute a note hash\")]\n unconstrained fn failed_hash_computation() {\n let unique_note_hashes_in_tx = BoundedVec::from_array([random()]);\n let packed_note = BoundedVec::new();\n let note_type_id = 0; // This note type id is unknown to compute_note_hash_and_nullifier\n\n let discovered_notes = attempt_note_nonce_discovery(\n unique_note_hashes_in_tx,\n FIRST_NULLIFIER_IN_TX,\n compute_note_hash_and_nullifier,\n CONTRACT_ADDRESS,\n STORAGE_SLOT,\n note_type_id,\n packed_note,\n );\n\n assert_eq(discovered_notes.len(), 0);\n }\n\n struct NoteAndData {\n note: MockNote,\n nonce: Field,\n note_hash: Field,\n unique_note_hash: Field,\n inner_nullifier: Field,\n }\n\n unconstrained fn construct_note(value: Field, note_index_in_tx: u32) -> NoteAndData {\n let nonce = compute_note_hash_nonce(FIRST_NULLIFIER_IN_TX, note_index_in_tx);\n\n let retrieved_note = MockNote::new(value)\n .contract_address(CONTRACT_ADDRESS)\n .note_metadata(SettledNoteMetadata::new(nonce).into())\n .build_retrieved_note();\n let note = retrieved_note.note;\n\n let note_hash = note.compute_note_hash(STORAGE_SLOT);\n let unique_note_hash =\n compute_unique_note_hash(nonce, compute_siloed_note_hash(CONTRACT_ADDRESS, note_hash));\n let inner_nullifier = note.compute_nullifier_unconstrained(compute_note_hash_for_nullify(\n retrieved_note,\n STORAGE_SLOT,\n ));\n\n NoteAndData { note, nonce, note_hash, unique_note_hash, inner_nullifier }\n }\n\n #[test]\n unconstrained fn single_note() {\n let note_index_in_tx = 2;\n let note_and_data = construct_note(VALUE, note_index_in_tx);\n\n let mut unique_note_hashes_in_tx = BoundedVec::from_array([\n random(), random(), random(), random(), random(), random(), random(),\n ]);\n unique_note_hashes_in_tx.set(note_index_in_tx, note_and_data.unique_note_hash);\n\n let discovered_notes = attempt_note_nonce_discovery(\n unique_note_hashes_in_tx,\n FIRST_NULLIFIER_IN_TX,\n compute_note_hash_and_nullifier,\n CONTRACT_ADDRESS,\n STORAGE_SLOT,\n MockNote::get_id(),\n BoundedVec::from_array(note_and_data.note.pack()),\n );\n\n assert_eq(discovered_notes.len(), 1);\n let discovered_note = discovered_notes.get(0);\n\n assert_eq(discovered_note.nonce, note_and_data.nonce);\n assert_eq(discovered_note.note_hash, note_and_data.note_hash);\n assert_eq(discovered_note.inner_nullifier, note_and_data.inner_nullifier);\n }\n\n #[test]\n unconstrained fn multiple_notes_same_preimage() {\n let first_note_index_in_tx = 3;\n let first_note_and_data = construct_note(VALUE, first_note_index_in_tx);\n\n let second_note_index_in_tx = 5;\n let second_note_and_data = construct_note(VALUE, second_note_index_in_tx);\n\n // Both notes have the same preimage (and therefore packed representation), so both should be found in the same\n // call.\n assert_eq(first_note_and_data.note, second_note_and_data.note);\n let packed_note = first_note_and_data.note.pack();\n\n let mut unique_note_hashes_in_tx = BoundedVec::from_array([\n random(), random(), random(), random(), random(), random(), random(),\n ]);\n unique_note_hashes_in_tx.set(first_note_index_in_tx, first_note_and_data.unique_note_hash);\n unique_note_hashes_in_tx.set(second_note_index_in_tx, second_note_and_data.unique_note_hash);\n\n let discovered_notes = attempt_note_nonce_discovery(\n unique_note_hashes_in_tx,\n FIRST_NULLIFIER_IN_TX,\n compute_note_hash_and_nullifier,\n CONTRACT_ADDRESS,\n STORAGE_SLOT,\n MockNote::get_id(),\n BoundedVec::from_array(packed_note),\n );\n\n assert_eq(discovered_notes.len(), 2);\n\n assert(discovered_notes.any(|discovered_note| {\n (discovered_note.nonce == first_note_and_data.nonce)\n & (discovered_note.note_hash == first_note_and_data.note_hash)\n & (discovered_note.inner_nullifier == first_note_and_data.inner_nullifier)\n }));\n\n assert(discovered_notes.any(|discovered_note| {\n (discovered_note.nonce == second_note_and_data.nonce)\n & (discovered_note.note_hash == second_note_and_data.note_hash)\n & (discovered_note.inner_nullifier == second_note_and_data.inner_nullifier)\n }));\n }\n}\n"
|
|
2820
|
-
},
|
|
2821
|
-
"111": {
|
|
2822
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/messages/discovery/partial_notes.nr",
|
|
2823
|
-
"source": "use crate::{\n capsules::CapsuleArray,\n messages::{\n discovery::{ComputeNoteHashAndNullifier, nonce_discovery::attempt_note_nonce_discovery},\n encoding::MAX_MESSAGE_CONTENT_LEN,\n },\n oracle::message_discovery::{deliver_note, get_log_by_tag},\n utils::array,\n};\n\nuse dep::protocol_types::{\n address::AztecAddress,\n constants::PUBLIC_LOG_SIZE_IN_FIELDS,\n debug_log::debug_log_format,\n hash::sha256_to_field,\n traits::{Deserialize, Serialize, ToField},\n};\n\nglobal PARTIAL_NOTE_PRIVATE_MSG_CONTENT_NON_NOTE_FIELDS_LEN: u32 = 2;\n\n/// Partial notes have a maximum packed length of their private fields bound by extra content in their private message\n/// (e.g. the storage slot, note completion log tag, etc.).\npub global MAX_PARTIAL_NOTE_PRIVATE_PACKED_LEN: u32 =\n MAX_MESSAGE_CONTENT_LEN - PARTIAL_NOTE_PRIVATE_MSG_CONTENT_NON_NOTE_FIELDS_LEN;\n\n/// The slot in the PXE capsules where we store a `CapsuleArray` of `DeliveredPendingPartialNote`.\npub global DELIVERED_PENDING_PARTIAL_NOTE_ARRAY_LENGTH_CAPSULES_SLOT: Field = sha256_to_field(\n \"AZTEC_NR::DELIVERED_PENDING_PARTIAL_NOTE_ARRAY_LENGTH_CAPSULES_SLOT\".as_bytes(),\n);\n\n/// Public logs contain an extra field at the beginning with the address of the contract that emitted them, and partial\n/// notes emit their completion tag in the log, resulting in the first two fields in the public log not being part of\n/// the packed public content.\n// TODO(#10273): improve how contract log siloing is handled\npub global NON_PACKED_CONTENT_FIELDS_IN_PUBLIC_LOG: u32 = 2;\n\n/// The maximum length of the packed representation of public fields in a partial note. This is limited by public log\n/// size and extra fields in the log (e.g. the tag).\npub global MAX_PUBLIC_PARTIAL_NOTE_PACKED_CONTENT_LENGTH: u32 =\n PUBLIC_LOG_SIZE_IN_FIELDS - NON_PACKED_CONTENT_FIELDS_IN_PUBLIC_LOG;\n\n/// A partial note that was delivered but is still pending completion. Contains the information necessary to find the\n/// log that will complete it and lead to a note being discovered and delivered.\n#[derive(Serialize, Deserialize)]\npub(crate) struct DeliveredPendingPartialNote {\n pub(crate) note_completion_log_tag: Field,\n pub(crate) storage_slot: Field,\n pub(crate) note_type_id: Field,\n pub(crate) packed_private_note_content: BoundedVec<Field, MAX_PARTIAL_NOTE_PRIVATE_PACKED_LEN>,\n pub(crate) recipient: AztecAddress,\n}\n\npub unconstrained fn process_partial_note_private_msg(\n contract_address: AztecAddress,\n recipient: AztecAddress,\n msg_metadata: u64,\n msg_content: BoundedVec<Field, MAX_MESSAGE_CONTENT_LEN>,\n) {\n let (note_type_id, storage_slot, note_completion_log_tag, packed_private_note_content) =\n decode_partial_note_private_msg(msg_metadata, msg_content);\n\n // We store the information of the partial note we found in a persistent capsule in PXE, so that we can later search\n // for the public log that will complete it.\n let pending = DeliveredPendingPartialNote {\n note_completion_log_tag,\n storage_slot,\n note_type_id,\n packed_private_note_content,\n recipient,\n };\n\n CapsuleArray::at(\n contract_address,\n DELIVERED_PENDING_PARTIAL_NOTE_ARRAY_LENGTH_CAPSULES_SLOT,\n )\n .push(pending);\n}\n\n/// Searches for public logs that would result in the completion of pending partial notes, ultimately resulting in the\n/// notes being delivered to PXE if completed.\npub unconstrained fn fetch_and_process_public_partial_note_completion_logs<Env>(\n contract_address: AztecAddress,\n compute_note_hash_and_nullifier: ComputeNoteHashAndNullifier<Env>,\n) {\n let pending_partial_notes = CapsuleArray::at(\n contract_address,\n DELIVERED_PENDING_PARTIAL_NOTE_ARRAY_LENGTH_CAPSULES_SLOT,\n );\n\n debug_log_format(\n \"{} pending partial notes\",\n [pending_partial_notes.len() as Field],\n );\n\n pending_partial_notes.for_each(|i, pending_partial_note: DeliveredPendingPartialNote| {\n let maybe_log = get_log_by_tag(pending_partial_note.note_completion_log_tag);\n if maybe_log.is_none() {\n debug_log_format(\n \"Found no completion logs for partial note with tag {}\",\n [pending_partial_note.note_completion_log_tag],\n );\n\n // Note that we're not removing the pending partial note from the capsule array, so we will continue\n // searching for this tagged log when performing message discovery in the future until we either find it or\n // the entry is somehow removed from the array.\n } else {\n debug_log_format(\n \"Completion log found for partial note with tag {}\",\n [pending_partial_note.note_completion_log_tag],\n );\n let log = maybe_log.unwrap();\n\n // Public logs have an extra field at the beginning with the contract address, which we use to verify\n // that we're getting the logs from the expected contract.\n // TODO(#10273): improve how contract log siloing is handled\n assert_eq(\n log.log_content.get(0),\n contract_address.to_field(),\n \"Got a public log emitted by a different contract\",\n );\n\n // Public fields are assumed to all be placed at the end of the packed representation, so we combine the\n // private and public packed fields (i.e. the contents of the private message and public log sans the extra\n // fields) to get the complete packed content.\n let packed_public_note_content: BoundedVec<_, MAX_PUBLIC_PARTIAL_NOTE_PACKED_CONTENT_LENGTH> =\n array::subbvec(log.log_content, NON_PACKED_CONTENT_FIELDS_IN_PUBLIC_LOG);\n let complete_packed_note = array::append(\n pending_partial_note.packed_private_note_content,\n packed_public_note_content,\n );\n\n let discovered_notes = attempt_note_nonce_discovery(\n log.unique_note_hashes_in_tx,\n log.first_nullifier_in_tx,\n compute_note_hash_and_nullifier,\n contract_address,\n pending_partial_note.storage_slot,\n pending_partial_note.note_type_id,\n complete_packed_note,\n );\n\n debug_log_format(\n \"Discovered {0} notes for partial note with tag {1}\",\n [discovered_notes.len() as Field, pending_partial_note.note_completion_log_tag],\n );\n\n discovered_notes.for_each(|discovered_note| {\n // TODO:(#10728): decide how to handle notes that fail delivery. This could be due to e.g. a\n // temporary node connectivity issue - is simply throwing good enough here?\n assert(\n deliver_note(\n contract_address,\n pending_partial_note.storage_slot,\n discovered_note.nonce,\n complete_packed_note,\n discovered_note.note_hash,\n discovered_note.inner_nullifier,\n log.tx_hash,\n pending_partial_note.recipient,\n ),\n \"Failed to deliver note\",\n );\n });\n\n // Because there is only a single log for a given tag, once we've processed the tagged log then we\n // simply delete the pending work entry, regardless of whether it was actually completed or not.\n // TODO(#11627): only remove the pending entry if we actually process a log that results in the note\n // being completed.\n pending_partial_notes.remove(i);\n }\n });\n}\n\nfn decode_partial_note_private_msg(\n msg_metadata: u64,\n msg_content: BoundedVec<Field, MAX_MESSAGE_CONTENT_LEN>,\n) -> (Field, Field, Field, BoundedVec<Field, MAX_PARTIAL_NOTE_PRIVATE_PACKED_LEN>) {\n let note_type_id = msg_metadata as Field; // TODO: make note type id not be a full field\n\n assert(\n msg_content.len() > PARTIAL_NOTE_PRIVATE_MSG_CONTENT_NON_NOTE_FIELDS_LEN,\n f\"Invalid private note message: all partial note private messages must have at least {PARTIAL_NOTE_PRIVATE_MSG_CONTENT_NON_NOTE_FIELDS_LEN} fields\",\n );\n\n // If PARTIAL_NOTE_PRIVATE_MSG_CONTENT_NON_NOTE_FIELDS_LEN is changed, causing the assertion below to fail, then the\n // destructuring of the partial note private message encoding below must be updated as well.\n std::static_assert(\n PARTIAL_NOTE_PRIVATE_MSG_CONTENT_NON_NOTE_FIELDS_LEN == 2,\n \"unexpected value for PARTIAL_NOTE_PRIVATE_MSG_CONTENT_NON_NOTE_FIELDS_LEN\",\n );\n\n // We currently have two fields that are not the partial note's packed representation, which are the storage slot\n // and the note completion log tag.\n let storage_slot = msg_content.get(0);\n let note_completion_log_tag = msg_content.get(1);\n\n let packed_private_note_content = array::subbvec(msg_content, 2);\n\n (note_type_id, storage_slot, note_completion_log_tag, packed_private_note_content)\n}\n"
|
|
2824
|
-
},
|
|
2825
|
-
"113": {
|
|
2826
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/messages/discovery/private_logs.nr",
|
|
2827
|
-
"source": "use crate::{\n capsules::CapsuleArray,\n messages::{\n discovery::{\n ComputeNoteHashAndNullifier,\n partial_notes::process_partial_note_private_msg,\n pending_tagged_log::{PENDING_TAGGED_LOG_ARRAY_BASE_SLOT, PendingTaggedLog},\n private_notes::process_private_note_msg,\n },\n encoding::decode_message,\n encryption::{aes128::AES128, log_encryption::LogEncryption},\n msg_type::{\n PARTIAL_NOTE_PRIVATE_MSG_TYPE_ID, PRIVATE_EVENT_MSG_TYPE_ID, PRIVATE_NOTE_MSG_TYPE_ID,\n },\n },\n oracle::{logs::store_private_event_log, message_discovery::fetch_tagged_logs},\n utils::array,\n};\n\nuse protocol_types::{\n abis::event_selector::EventSelector,\n address::AztecAddress,\n debug_log::{debug_log, debug_log_format},\n traits::FromField,\n};\n\n/// Searches for private logs that signal new private notes that are then delivered to PXE, or new partial notes that\n/// are stored in the PXE capsules so that `fetch_and_process_public_partial_note_completion_logs` can later search for\n/// public logs that will complete them.\npub unconstrained fn fetch_and_process_private_tagged_logs<Env>(\n contract_address: AztecAddress,\n compute_note_hash_and_nullifier: ComputeNoteHashAndNullifier<Env>,\n) {\n // We will eventually perform log discovery via tagging here, but for now we simply call the `fetchTaggedLogs` oracle.\n // This makes PXE synchronize tags, download logs and store the pending tagged logs in capsule array which are then\n // retrieved and processed here.\n fetch_tagged_logs(PENDING_TAGGED_LOG_ARRAY_BASE_SLOT);\n\n // Get the logs from the capsule array and process them one by one\n let logs =\n CapsuleArray::<PendingTaggedLog>::at(contract_address, PENDING_TAGGED_LOG_ARRAY_BASE_SLOT);\n logs.for_each(|i, log: PendingTaggedLog| {\n process_log(contract_address, compute_note_hash_and_nullifier, log);\n logs.remove(i);\n });\n}\n\n/// Processes a log's ciphertext by decrypting it and then searching the plaintext for private notes or partial notes.\n///\n/// Private notes result in nonce discovery being performed prior to delivery, which requires knowledge of the\n/// transaction hash in which the notes would've been created (typically the same transaction in which the log was\n/// emitted), along with the list of unique note hashes in said transaction and the `compute_note_hash_and_nullifier`\n/// function.\n///\n/// Partial notes result in a pending partial note entry being stored in a PXE capsule, which will later be retrieved to\n/// search for the note's completion public log.\nunconstrained fn process_log<Env>(\n contract_address: AztecAddress,\n compute_note_hash_and_nullifier: ComputeNoteHashAndNullifier<Env>,\n pending_tagged_log: PendingTaggedLog,\n) {\n debug_log_format(\n \"Processing log with tag {0}\",\n [pending_tagged_log.log.get(0)],\n );\n\n // The tag is ignored for now.\n let ciphertext = array::subbvec(pending_tagged_log.log, 1);\n\n let log_plaintext = AES128::decrypt_log(ciphertext, pending_tagged_log.recipient);\n\n // The first thing to do after decrypting the log is to determine what type of private log we're processing. We\n // have 3 log types: private note logs, partial note logs and event logs.\n\n let (msg_type_id, msg_metadata, msg_content) = decode_message(log_plaintext);\n\n if msg_type_id == PRIVATE_NOTE_MSG_TYPE_ID {\n debug_log(\"Processing private note msg\");\n\n process_private_note_msg(\n contract_address,\n pending_tagged_log.tx_hash,\n pending_tagged_log.unique_note_hashes_in_tx,\n pending_tagged_log.first_nullifier_in_tx,\n pending_tagged_log.recipient,\n compute_note_hash_and_nullifier,\n msg_metadata,\n msg_content,\n );\n } else if msg_type_id == PARTIAL_NOTE_PRIVATE_MSG_TYPE_ID {\n debug_log(\"Processing partial note private msg\");\n\n process_partial_note_private_msg(\n contract_address,\n pending_tagged_log.recipient,\n msg_metadata,\n msg_content,\n );\n } else if msg_type_id == PRIVATE_EVENT_MSG_TYPE_ID {\n debug_log(\"Processing private event msg\");\n\n // In the case of events, the msg metadata is the event selector.\n let event_selector = EventSelector::from_field(msg_metadata as Field);\n\n store_private_event_log(\n contract_address,\n pending_tagged_log.recipient,\n event_selector,\n msg_content,\n pending_tagged_log.tx_hash,\n pending_tagged_log.log_index_in_tx,\n pending_tagged_log.tx_index_in_block,\n );\n } else {\n debug_log_format(\"Unknown msg type id {0}\", [msg_type_id as Field]);\n }\n}\n"
|
|
2828
|
-
},
|
|
2829
|
-
"114": {
|
|
2830
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/messages/discovery/private_notes.nr",
|
|
2831
|
-
"source": "use crate::{\n messages::{\n discovery::{ComputeNoteHashAndNullifier, nonce_discovery::attempt_note_nonce_discovery},\n encoding::MAX_MESSAGE_CONTENT_LEN,\n },\n oracle,\n utils::array,\n};\nuse protocol_types::{\n address::AztecAddress, constants::MAX_NOTE_HASHES_PER_TX, debug_log::debug_log_format,\n};\n\n/// The number of fields in a private note message content that are not the note's packed representation.\nglobal PRIVATE_NOTE_MSG_CONTENT_NON_NOTE_FIELDS_LEN: u32 = 1;\n\n/// The maximum length of the packed representation of a note's contents. This is limited by private log size,\n/// encryption overhead and extra fields in the message (e.g. message type id, storage slot, etc.).\npub global MAX_NOTE_PACKED_LEN: u32 =\n MAX_MESSAGE_CONTENT_LEN - PRIVATE_NOTE_MSG_CONTENT_NON_NOTE_FIELDS_LEN;\n\npub unconstrained fn process_private_note_msg<Env>(\n contract_address: AztecAddress,\n tx_hash: Field,\n unique_note_hashes_in_tx: BoundedVec<Field, MAX_NOTE_HASHES_PER_TX>,\n first_nullifier_in_tx: Field,\n recipient: AztecAddress,\n compute_note_hash_and_nullifier: ComputeNoteHashAndNullifier<Env>,\n msg_metadata: u64,\n msg_content: BoundedVec<Field, MAX_MESSAGE_CONTENT_LEN>,\n) {\n let (note_type_id, storage_slot, packed_note) =\n decode_private_note_msg(msg_metadata, msg_content);\n\n attempt_note_discovery(\n contract_address,\n tx_hash,\n unique_note_hashes_in_tx,\n first_nullifier_in_tx,\n recipient,\n compute_note_hash_and_nullifier,\n storage_slot,\n note_type_id,\n packed_note,\n );\n}\n\n/// Attempts discovery of a note given information about its contents and the transaction in which it is\n/// suspected the note was created.\npub unconstrained fn attempt_note_discovery<Env>(\n contract_address: AztecAddress,\n tx_hash: Field,\n unique_note_hashes_in_tx: BoundedVec<Field, MAX_NOTE_HASHES_PER_TX>,\n first_nullifier_in_tx: Field,\n recipient: AztecAddress,\n compute_note_hash_and_nullifier: ComputeNoteHashAndNullifier<Env>,\n storage_slot: Field,\n note_type_id: Field,\n packed_note: BoundedVec<Field, MAX_NOTE_PACKED_LEN>,\n) {\n let discovered_notes = attempt_note_nonce_discovery(\n unique_note_hashes_in_tx,\n first_nullifier_in_tx,\n compute_note_hash_and_nullifier,\n contract_address,\n storage_slot,\n note_type_id,\n packed_note,\n );\n\n debug_log_format(\n \"Discovered {0} notes from a private message\",\n [discovered_notes.len() as Field],\n );\n\n discovered_notes.for_each(|discovered_note| {\n // TODO:(#10728): handle notes that fail delivery. This could be due to e.g. a temporary node connectivity\n // issue, and we should perhaps not have marked the tag index as taken.\n assert(\n oracle::message_discovery::deliver_note(\n contract_address,\n storage_slot,\n discovered_note.nonce,\n packed_note,\n discovered_note.note_hash,\n discovered_note.inner_nullifier,\n tx_hash,\n recipient,\n ),\n \"Failed to deliver note\",\n );\n });\n}\n\nfn decode_private_note_msg(\n msg_metadata: u64,\n msg_content: BoundedVec<Field, MAX_MESSAGE_CONTENT_LEN>,\n) -> (Field, Field, BoundedVec<Field, MAX_NOTE_PACKED_LEN>) {\n let note_type_id = msg_metadata as Field; // TODO: make note type id not be a full field\n\n assert(\n msg_content.len() > PRIVATE_NOTE_MSG_CONTENT_NON_NOTE_FIELDS_LEN,\n f\"Invalid private note message: all private note messages must have at least {PRIVATE_NOTE_MSG_CONTENT_NON_NOTE_FIELDS_LEN} fields\",\n );\n\n // If PRIVATE_NOTE_MSG_CONTENT_NON_NOTE_FIELDS_LEN is changed, causing the assertion below to fail, then the\n // destructuring of the private note message encoding below must be updated as well.\n std::static_assert(\n PRIVATE_NOTE_MSG_CONTENT_NON_NOTE_FIELDS_LEN == 1,\n \"unexpected value for PRIVATE_NOTE_MSG_CONTENT_NON_NOTE_FIELDS_LEN\",\n );\n\n // We currently have a single field that is not the note's packed representation, which is the storage slot.\n let storage_slot = msg_content.get(0);\n let packed_note = array::subbvec(msg_content, PRIVATE_NOTE_MSG_CONTENT_NON_NOTE_FIELDS_LEN);\n\n (note_type_id, storage_slot, packed_note)\n}\n"
|
|
2832
|
-
},
|
|
2833
|
-
"115": {
|
|
2834
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/messages/encoding.nr",
|
|
2835
|
-
"source": "// TODO(#12750): don't make these values assume we're using AES.\nuse crate::{\n messages::encryption::log_encryption::PRIVATE_LOG_PLAINTEXT_SIZE_IN_FIELDS, utils::array,\n};\n\nglobal MAX_MESSAGE_LEN: u32 = PRIVATE_LOG_PLAINTEXT_SIZE_IN_FIELDS;\n\nglobal MESSAGE_EXPANDED_METADATA_LEN: u32 = 1;\n\n// The standard message layout is composed of:\n// - an initial field called the 'expanded metadata'\n// - an arbitrary number of fields following that called the 'message content'\n//\n// ```\n// message: [ msg_expanded_metadata, ...msg_content ]\n// ```\n//\n// The expanded metadata itself is interpreted as a u128, of which:\n// - the upper 64 bits are the message type id\n// - the lower 64 bits are called the 'message metadata'\n//\n// ```\n// msg_expanded_metadata: [ msg_type_id | msg_metadata ]\n// <--- 64 bits --->|<--- 64 bits --->\n// ```\n//\n// The meaning of the message metadata and message content depend on the value of the message type id. Note that there\n// is nothing special about the message metadata, it _can_ be considered part of the content. It just has a different\n// name to make it distinct from the message content given that it is not a full field.\n\n/// The maximum length of a message's content, i.e. not including the expanded message metadata.\npub global MAX_MESSAGE_CONTENT_LEN: u32 = MAX_MESSAGE_LEN - MESSAGE_EXPANDED_METADATA_LEN;\n\n/// Encodes a message following aztec-nr's standard message encoding. This message can later be decoded with\n/// `decode_message` to retrieve the original values.\n///\n/// - The `msg_type` is an identifier that groups types of messages that are all processed the same way, e.g. private\n/// notes or events. Possible values are defined in `aztec::messages::msg_type`.\n/// - The `msg_metadata` and `msg_content` are the values stored in the message, whose meaning depends on the\n/// `msg_type`. The only special thing about `msg_metadata` that separates it from `msg_content` is that it is a u64\n/// instead of a full Field (due to details of how messages are encoded), allowing applications that can fit values into\n/// this smaller variable to achieve higher data efficiency.\npub fn encode_message<let N: u32>(\n msg_type: u64,\n msg_metadata: u64,\n msg_content: [Field; N],\n) -> [Field; (N + MESSAGE_EXPANDED_METADATA_LEN)] {\n std::static_assert(\n msg_content.len() <= MAX_MESSAGE_CONTENT_LEN,\n \"Invalid message content: it must have a length of at most MAX_MESSAGE_CONTENT_LEN\",\n );\n\n // If MESSAGE_EXPANDED_METADATA_LEN is changed, causing the assertion below to fail, then the destructuring of\n // the message encoding below must be updated as well.\n std::static_assert(\n MESSAGE_EXPANDED_METADATA_LEN == 1,\n \"unexpected value for MESSAGE_EXPANDED_METADATA_LEN\",\n );\n let mut message: [Field; (N + MESSAGE_EXPANDED_METADATA_LEN)] = std::mem::zeroed();\n\n message[0] = to_expanded_metadata(msg_type, msg_metadata);\n for i in 0..msg_content.len() {\n message[MESSAGE_EXPANDED_METADATA_LEN + i] = msg_content[i];\n }\n\n message\n}\n\n/// Decodes a standard aztec-nr message, i.e. one created via `encode_message`, returning the original encoded values.\n///\n/// Note that `encode_message` returns a fixed size array while this function takes a `BoundedVec`: this is because\n/// prior to decoding the message type is unknown, and consequentially not known at compile time. If working with\n/// fixed-size messages, consider using `BoundedVec::from_array` to convert them.\npub unconstrained fn decode_message(\n message: BoundedVec<Field, MAX_MESSAGE_LEN>,\n) -> (u64, u64, BoundedVec<Field, MAX_MESSAGE_CONTENT_LEN>) {\n assert(\n message.len() >= MESSAGE_EXPANDED_METADATA_LEN,\n f\"Invalid message: it must have at least {MESSAGE_EXPANDED_METADATA_LEN} fields\",\n );\n\n // If MESSAGE_EXPANDED_METADATA_LEN is changed, causing the assertion below to fail, then the destructuring of\n // the message encoding below must be updated as well.\n std::static_assert(\n MESSAGE_EXPANDED_METADATA_LEN == 1,\n \"unexpected value for MESSAGE_EXPANDED_METADATA_LEN\",\n );\n\n let msg_expanded_metadata = message.get(0);\n let (msg_type_id, msg_metadata) = from_expanded_metadata(msg_expanded_metadata);\n let msg_content = array::subbvec(message, MESSAGE_EXPANDED_METADATA_LEN);\n\n (msg_type_id, msg_metadata, msg_content)\n}\n\nglobal U64_SHIFT_MULTIPLIER: Field = 2.pow_32(64);\n\nfn to_expanded_metadata(msg_type: u64, msg_metadata: u64) -> Field {\n // We use multiplication instead of bit shifting operations to shift the type bits as bit shift operations are\n // expensive in circuits.\n let type_field: Field = (msg_type as Field) * U64_SHIFT_MULTIPLIER;\n let msg_metadata_field = msg_metadata as Field;\n\n type_field + msg_metadata_field\n}\n\nfn from_expanded_metadata(input: Field) -> (u64, u64) {\n input.assert_max_bit_size::<128>();\n let msg_metadata = (input as u64);\n let msg_type = ((input - (msg_metadata as Field)) / U64_SHIFT_MULTIPLIER) as u64;\n // Use division instead of bit shift since bit shifts are expensive in circuits\n (msg_type, msg_metadata)\n}\n\nmod tests {\n use crate::utils::array::subarray::subarray;\n use super::{\n decode_message, encode_message, from_expanded_metadata, MAX_MESSAGE_CONTENT_LEN,\n to_expanded_metadata,\n };\n\n global U64_MAX: u64 = (2.pow_32(64) - 1) as u64;\n global U128_MAX: Field = (2.pow_32(128) - 1);\n\n #[test]\n unconstrained fn encode_decode_empty_message(msg_type: u64, msg_metadata: u64) {\n let encoded = encode_message(msg_type, msg_metadata, []);\n let (decoded_msg_type, decoded_msg_metadata, decoded_msg_content) =\n decode_message(BoundedVec::from_array(encoded));\n\n assert_eq(decoded_msg_type, msg_type);\n assert_eq(decoded_msg_metadata, msg_metadata);\n assert_eq(decoded_msg_content.len(), 0);\n }\n\n #[test]\n unconstrained fn encode_decode_short_message(\n msg_type: u64,\n msg_metadata: u64,\n msg_content: [Field; MAX_MESSAGE_CONTENT_LEN / 2],\n ) {\n let encoded = encode_message(msg_type, msg_metadata, msg_content);\n let (decoded_msg_type, decoded_msg_metadata, decoded_msg_content) =\n decode_message(BoundedVec::from_array(encoded));\n\n assert_eq(decoded_msg_type, msg_type);\n assert_eq(decoded_msg_metadata, msg_metadata);\n assert_eq(decoded_msg_content.len(), msg_content.len());\n assert_eq(subarray(decoded_msg_content.storage(), 0), msg_content);\n }\n\n #[test]\n unconstrained fn encode_decode_full_message(\n msg_type: u64,\n msg_metadata: u64,\n msg_content: [Field; MAX_MESSAGE_CONTENT_LEN],\n ) {\n let encoded = encode_message(msg_type, msg_metadata, msg_content);\n let (decoded_msg_type, decoded_msg_metadata, decoded_msg_content) =\n decode_message(BoundedVec::from_array(encoded));\n\n assert_eq(decoded_msg_type, msg_type);\n assert_eq(decoded_msg_metadata, msg_metadata);\n assert_eq(decoded_msg_content.len(), msg_content.len());\n assert_eq(subarray(decoded_msg_content.storage(), 0), msg_content);\n }\n\n #[test]\n unconstrained fn to_expanded_metadata_packing() {\n // Test case 1: All bits set\n let packed = to_expanded_metadata(U64_MAX, U64_MAX);\n let (msg_type, msg_metadata) = from_expanded_metadata(packed);\n assert_eq(msg_type, U64_MAX);\n assert_eq(msg_metadata, U64_MAX);\n\n // Test case 2: Only log type bits set\n let packed = to_expanded_metadata(U64_MAX, 0);\n let (msg_type, msg_metadata) = from_expanded_metadata(packed);\n assert_eq(msg_type, U64_MAX);\n assert_eq(msg_metadata, 0);\n\n // Test case 3: Only msg_metadata bits set\n let packed = to_expanded_metadata(0, U64_MAX);\n let (msg_type, msg_metadata) = from_expanded_metadata(packed);\n assert_eq(msg_type, 0);\n assert_eq(msg_metadata, U64_MAX);\n\n // Test case 4: No bits set\n let packed = to_expanded_metadata(0, 0);\n let (msg_type, msg_metadata) = from_expanded_metadata(packed);\n assert_eq(msg_type, 0);\n assert_eq(msg_metadata, 0);\n }\n\n #[test]\n unconstrained fn from_expanded_metadata_packing() {\n // Test case 1: All bits set\n let input = U128_MAX as Field;\n let (msg_type, msg_metadata) = from_expanded_metadata(input);\n assert_eq(msg_type, U64_MAX);\n assert_eq(msg_metadata, U64_MAX);\n\n // Test case 2: Only log type bits set\n let input = (U128_MAX - U64_MAX as Field);\n let (msg_type, msg_metadata) = from_expanded_metadata(input);\n assert_eq(msg_type, U64_MAX);\n assert_eq(msg_metadata, 0);\n\n // Test case 3: Only msg_metadata bits set\n let input = U64_MAX as Field;\n let (msg_type, msg_metadata) = from_expanded_metadata(input);\n assert_eq(msg_type, 0);\n assert_eq(msg_metadata, U64_MAX);\n\n // Test case 4: No bits set\n let input = 0;\n let (msg_type, msg_metadata) = from_expanded_metadata(input);\n assert_eq(msg_type, 0);\n assert_eq(msg_metadata, 0);\n }\n\n #[test]\n unconstrained fn to_from_expanded_metadata(original_msg_type: u64, original_msg_metadata: u64) {\n let packed = to_expanded_metadata(original_msg_type, original_msg_metadata);\n let (unpacked_msg_type, unpacked_msg_metadata) = from_expanded_metadata(packed);\n\n assert_eq(original_msg_type, unpacked_msg_type);\n assert_eq(original_msg_metadata, unpacked_msg_metadata);\n }\n}\n"
|
|
2836
|
-
},
|
|
2837
|
-
"116": {
|
|
2838
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/messages/encryption/aes128.nr",
|
|
2839
|
-
"source": "use dep::protocol_types::{\n constants::{GENERATOR_INDEX__SYMMETRIC_KEY, GENERATOR_INDEX__SYMMETRIC_KEY_2},\n hash::poseidon2_hash_with_separator,\n point::Point,\n};\n\nuse crate::{\n keys::{\n ecdh_shared_secret::derive_ecdh_shared_secret_using_aztec_address,\n ephemeral::generate_ephemeral_key_pair,\n },\n messages::{\n encryption::log_encryption::{\n EPH_PK_SIGN_BYTE_SIZE_IN_BYTES, EPH_PK_X_SIZE_IN_FIELDS,\n HEADER_CIPHERTEXT_SIZE_IN_BYTES, LogEncryption, PRIVATE_LOG_CIPHERTEXT_LEN,\n PRIVATE_LOG_PLAINTEXT_SIZE_IN_FIELDS,\n },\n logs::arithmetic_generics_utils::{\n get_arr_of_size__log_bytes__from_PT, get_arr_of_size__log_bytes_padding__from_PT,\n },\n },\n oracle::{aes128_decrypt::aes128_decrypt_oracle, shared_secret::get_shared_secret},\n prelude::AztecAddress,\n utils::{\n array,\n conversion::{\n bytes_to_fields::{bytes_from_fields, bytes_to_fields},\n fields_to_bytes::{fields_from_bytes, fields_to_bytes},\n },\n point::{get_sign_of_point, point_from_x_coord_and_sign, point_to_bytes},\n random::get_random_bytes,\n },\n};\n\nuse std::aes128::aes128_encrypt;\n\nfn extract_close_to_uniformly_random_256_bits_from_ecdh_shared_secret_using_poseidon2(\n shared_secret: Point,\n) -> [u8; 32] {\n let rand1: Field = poseidon2_hash_with_separator(\n [shared_secret.x, shared_secret.y],\n GENERATOR_INDEX__SYMMETRIC_KEY,\n );\n let rand2: Field = poseidon2_hash_with_separator(\n [shared_secret.x, shared_secret.y],\n GENERATOR_INDEX__SYMMETRIC_KEY_2,\n );\n let rand1_bytes: [u8; 16] = rand1.to_le_bytes();\n let rand2_bytes: [u8; 16] = rand2.to_le_bytes();\n let mut bytes: [u8; 32] = [0; 32];\n for i in 0..16 {\n bytes[i] = rand1_bytes[i];\n bytes[i + 1] = rand2_bytes[i];\n }\n bytes\n}\n\n// TODO(#10537): Consider nuking this function.\nfn extract_close_to_uniformly_random_256_bits_from_ecdh_shared_secret_using_sha256(\n shared_secret: Point,\n) -> [u8; 32] {\n let shared_secret_bytes: [u8; 32] = point_to_bytes(shared_secret);\n\n let mut shared_secret_bytes_with_separator: [u8; 33] = std::mem::zeroed();\n for i in 0..shared_secret_bytes.len() {\n shared_secret_bytes_with_separator[i] = shared_secret_bytes[i];\n }\n shared_secret_bytes_with_separator[32] = GENERATOR_INDEX__SYMMETRIC_KEY;\n\n sha256::digest(shared_secret_bytes_with_separator)\n}\n\nfn derive_aes_symmetric_key_and_iv_from_ecdh_shared_secret(\n shared_secret: Point,\n randomness_extraction_fn: fn(Point) -> [u8; 32],\n) -> ([u8; 16], [u8; 16]) {\n let random_256_bits = randomness_extraction_fn(shared_secret);\n let mut sym_key = [0; 16];\n let mut iv = [0; 16];\n for i in 0..16 {\n sym_key[i] = random_256_bits[i];\n iv[i] = random_256_bits[i + 16];\n }\n (sym_key, iv)\n}\n\n// TODO(#10537): Consider nuking this function.\npub fn derive_aes_symmetric_key_and_iv_from_ecdh_shared_secret_using_sha256(\n shared_secret: Point,\n) -> ([u8; 16], [u8; 16]) {\n derive_aes_symmetric_key_and_iv_from_ecdh_shared_secret(\n shared_secret,\n extract_close_to_uniformly_random_256_bits_from_ecdh_shared_secret_using_sha256,\n )\n}\n\n// TODO(#10537): This function is currently unused. Consider using it instead of the sha256 one.\npub fn derive_aes_symmetric_key_and_iv_from_ecdh_shared_secret_using_poseidon2(\n shared_secret: Point,\n) -> ([u8; 16], [u8; 16]) {\n derive_aes_symmetric_key_and_iv_from_ecdh_shared_secret(\n shared_secret,\n extract_close_to_uniformly_random_256_bits_from_ecdh_shared_secret_using_poseidon2,\n )\n}\n\npub struct AES128 {}\n\nimpl LogEncryption for AES128 {\n fn encrypt_log<let PLAINTEXT_LEN: u32>(\n plaintext: [Field; PLAINTEXT_LEN],\n recipient: AztecAddress,\n ) -> [Field; PRIVATE_LOG_CIPHERTEXT_LEN] {\n // AES 128 operates on bytes, not fields, so we need to convert the fields to bytes.\n // (This process is then reversed when processing the log in `do_process_log`)\n let plaintext_bytes = fields_to_bytes(plaintext);\n\n // *****************************************************************************\n // Compute the shared secret\n // *****************************************************************************\n\n let (eph_sk, eph_pk) = generate_ephemeral_key_pair();\n\n let eph_pk_sign_byte: u8 = get_sign_of_point(eph_pk) as u8;\n\n // (not to be confused with the tagging shared secret)\n let ciphertext_shared_secret =\n derive_ecdh_shared_secret_using_aztec_address(eph_sk, recipient);\n\n // TODO: also use this shared secret for deriving note randomness.\n\n // *****************************************************************************\n // Convert the plaintext into whatever format the encryption function expects\n // *****************************************************************************\n\n // Already done for this strategy: AES expects bytes.\n\n // *****************************************************************************\n // Encrypt the plaintext\n // *****************************************************************************\n\n let (sym_key, iv) = derive_aes_symmetric_key_and_iv_from_ecdh_shared_secret_using_sha256(\n ciphertext_shared_secret,\n );\n\n let ciphertext_bytes = aes128_encrypt(plaintext_bytes, iv, sym_key);\n\n // |full_pt| = |pt_length| + |pt|\n // |pt_aes_padding| = 16 - (|full_pt| % 16)\n // or... since a % b is the same as a - b * (a // b) (integer division), so:\n // |pt_aes_padding| = 16 - (|full_pt| - 16 * (|full_pt| // 16))\n // |ct| = |full_pt| + |pt_aes_padding|\n // = |full_pt| + 16 - (|full_pt| - 16 * (|full_pt| // 16))\n // = 16 + 16 * (|full_pt| // 16)\n // = 16 * (1 + |full_pt| // 16)\n assert(ciphertext_bytes.len() == 16 * (1 + (PLAINTEXT_LEN * 32) / 16));\n\n // *****************************************************************************\n // Compute the header ciphertext\n // *****************************************************************************\n\n // Header contains only the length of the ciphertext stored in 2 bytes.\n // TODO: consider nuking the header altogether and just have a fixed-size ciphertext by padding the plaintext.\n // This would be more costly constraint-wise but cheaper DA-wise.\n let mut header_plaintext: [u8; 2] = [0 as u8; 2];\n let ciphertext_bytes_length = ciphertext_bytes.len();\n header_plaintext[0] = (ciphertext_bytes_length >> 8) as u8;\n header_plaintext[1] = ciphertext_bytes_length as u8;\n\n // TODO: this is insecure and wasteful:\n // \"Insecure\", because the esk shouldn't be used twice (once for the header,\n // and again for the proper ciphertext) (at least, I never got the\n // \"go ahead\" that this would be safe, unfortunately).\n // \"Wasteful\", because the exact same computation is happening further down.\n // I'm leaving that 2nd computation where it is, because this 1st computation\n // will be imminently deleted, when the header logic is deleted.\n let (sym_key, iv) = derive_aes_symmetric_key_and_iv_from_ecdh_shared_secret_using_sha256(\n ciphertext_shared_secret,\n );\n\n // Note: the aes128_encrypt builtin fn automatically appends bytes to the\n // input, according to pkcs#7; hence why the output `header_ciphertext_bytes` is 16\n // bytes larger than the input in this case.\n let header_ciphertext_bytes = aes128_encrypt(header_plaintext, iv, sym_key);\n // I recall that converting a slice to an array incurs constraints, so I'll check the length this way instead:\n assert(header_ciphertext_bytes.len() == HEADER_CIPHERTEXT_SIZE_IN_BYTES);\n\n // *****************************************************************************\n // Prepend / append more bytes of data to the ciphertext, before converting back\n // to fields.\n // *****************************************************************************\n\n let mut log_bytes_padding_to_mult_31 =\n get_arr_of_size__log_bytes_padding__from_PT::<PLAINTEXT_LEN * 32>();\n // Safety: this randomness won't be constrained to be random. It's in the\n // interest of the executor of this fn to encrypt with random bytes.\n log_bytes_padding_to_mult_31 = unsafe { get_random_bytes() };\n\n let mut log_bytes = get_arr_of_size__log_bytes__from_PT::<PLAINTEXT_LEN * 32>();\n\n assert(\n log_bytes.len() % 31 == 0,\n \"Unexpected error: log_bytes.len() should be divisible by 31, by construction.\",\n );\n\n log_bytes[0] = eph_pk_sign_byte;\n let mut offset = 1;\n for i in 0..header_ciphertext_bytes.len() {\n log_bytes[offset + i] = header_ciphertext_bytes[i];\n }\n offset += header_ciphertext_bytes.len();\n\n for i in 0..ciphertext_bytes.len() {\n log_bytes[offset + i] = ciphertext_bytes[i];\n }\n offset += ciphertext_bytes.len();\n\n for i in 0..log_bytes_padding_to_mult_31.len() {\n log_bytes[offset + i] = log_bytes_padding_to_mult_31[i];\n }\n\n assert(\n offset + log_bytes_padding_to_mult_31.len() == log_bytes.len(),\n \"Something has gone wrong\",\n );\n\n // *****************************************************************************\n // Convert bytes back to fields\n // *****************************************************************************\n\n // TODO(#12749): As Mike pointed out, we need to make logs produced by different encryption schemes\n // indistinguishable from each other and for this reason the output here and in the last for-loop of this function\n // should cover a full field.\n let log_bytes_as_fields = bytes_to_fields(log_bytes);\n\n // *****************************************************************************\n // Prepend / append fields, to create the final log\n // *****************************************************************************\n\n let mut ciphertext: [Field; PRIVATE_LOG_CIPHERTEXT_LEN] = [0; PRIVATE_LOG_CIPHERTEXT_LEN];\n\n ciphertext[0] = eph_pk.x;\n\n let mut offset = 1;\n for i in 0..log_bytes_as_fields.len() {\n ciphertext[offset + i] = log_bytes_as_fields[i];\n }\n offset += log_bytes_as_fields.len();\n\n for i in offset..PRIVATE_LOG_CIPHERTEXT_LEN {\n // We need to get a random value that fits in 31 bytes to not leak information about the size of the log\n // (all the \"real\" log fields contain at most 31 bytes because of the way we convert the bytes to fields).\n // TODO(#12749): Long term, this is not a good solution.\n\n // Safety: we assume that the sender wants for the log to be private - a malicious one could simply reveal its\n // contents publicly. It is therefore fine to trust the sender to provide random padding.\n let field_bytes = unsafe { get_random_bytes::<31>() };\n ciphertext[i] = Field::from_be_bytes::<31>(field_bytes);\n }\n\n ciphertext\n }\n\n unconstrained fn decrypt_log(\n ciphertext: BoundedVec<Field, PRIVATE_LOG_CIPHERTEXT_LEN>,\n recipient: AztecAddress,\n ) -> BoundedVec<Field, PRIVATE_LOG_PLAINTEXT_SIZE_IN_FIELDS> {\n let eph_pk_x = ciphertext.get(0);\n\n let ciphertext_without_eph_pk_x_fields = array::subbvec::<Field, PRIVATE_LOG_CIPHERTEXT_LEN, PRIVATE_LOG_CIPHERTEXT_LEN - EPH_PK_X_SIZE_IN_FIELDS>(\n ciphertext,\n EPH_PK_X_SIZE_IN_FIELDS,\n );\n\n // Convert the ciphertext represented as fields to a byte representation (its original format)\n let ciphertext_without_eph_pk_x = bytes_from_fields(ciphertext_without_eph_pk_x_fields);\n\n // First byte of the ciphertext represents the ephemeral public key sign\n let eph_pk_sign_bool = ciphertext_without_eph_pk_x.get(0) as bool;\n // With the sign and the x-coordinate of the ephemeral public key, we can reconstruct the point\n let eph_pk = point_from_x_coord_and_sign(eph_pk_x, eph_pk_sign_bool);\n\n // Derive shared secret and symmetric key\n let ciphertext_shared_secret = get_shared_secret(recipient, eph_pk);\n let (sym_key, iv) = derive_aes_symmetric_key_and_iv_from_ecdh_shared_secret_using_sha256(\n ciphertext_shared_secret,\n );\n\n // Extract the header ciphertext\n let header_start = EPH_PK_SIGN_BYTE_SIZE_IN_BYTES; // Skip eph_pk_sign byte\n let header_ciphertext: [u8; HEADER_CIPHERTEXT_SIZE_IN_BYTES] =\n array::subarray(ciphertext_without_eph_pk_x.storage(), header_start);\n // We need to convert the array to a BoundedVec because the oracle expects a BoundedVec as it's designed to work\n // with logs with unknown length at compile time. This would not be necessary here as the header ciphertext length\n // is fixed. But we do it anyway to not have to have duplicate oracles.\n let header_ciphertext_bvec =\n BoundedVec::<u8, HEADER_CIPHERTEXT_SIZE_IN_BYTES>::from_array(header_ciphertext);\n\n // Decrypt header\n let header_plaintext = aes128_decrypt_oracle(header_ciphertext_bvec, iv, sym_key);\n\n // Extract ciphertext length from header (2 bytes, big-endian)\n let ciphertext_length =\n ((header_plaintext.get(0) as u32) << 8) | (header_plaintext.get(1) as u32);\n\n // Extract and decrypt main ciphertext\n let ciphertext_start = header_start + HEADER_CIPHERTEXT_SIZE_IN_BYTES;\n let ciphertext_with_padding: [u8; (PRIVATE_LOG_CIPHERTEXT_LEN - EPH_PK_X_SIZE_IN_FIELDS) * 31 - HEADER_CIPHERTEXT_SIZE_IN_BYTES - EPH_PK_SIGN_BYTE_SIZE_IN_BYTES] =\n array::subarray(ciphertext_without_eph_pk_x.storage(), ciphertext_start);\n let ciphertext: BoundedVec<u8, (PRIVATE_LOG_CIPHERTEXT_LEN - EPH_PK_X_SIZE_IN_FIELDS) * 31 - HEADER_CIPHERTEXT_SIZE_IN_BYTES - EPH_PK_SIGN_BYTE_SIZE_IN_BYTES> =\n BoundedVec::from_parts(ciphertext_with_padding, ciphertext_length);\n\n // Decrypt main ciphertext and return it\n let plaintext_bytes = aes128_decrypt_oracle(ciphertext, iv, sym_key);\n\n // Each field of the original note log was serialized to 32 bytes so we convert the bytes back to fields.\n fields_from_bytes(plaintext_bytes)\n }\n}\n\nmod test {\n use crate::{\n keys::ecdh_shared_secret::derive_ecdh_shared_secret_using_aztec_address,\n messages::encryption::log_encryption::{LogEncryption, PRIVATE_LOG_PLAINTEXT_SIZE_IN_FIELDS},\n test::helpers::test_environment::TestEnvironment,\n };\n use super::AES128;\n use protocol_types::{\n address::AztecAddress,\n indexed_tagging_secret::IndexedTaggingSecret,\n traits::{Deserialize, FromField},\n };\n use std::{embedded_curve_ops::EmbeddedCurveScalar, test::OracleMock};\n\n #[test]\n unconstrained fn encrypt_decrypt_log() {\n let mut env = TestEnvironment::new();\n // Advance 1 block so we can read historic state from private\n env.advance_block_by(1);\n\n let plaintext = [1, 2, 3];\n\n let recipient = AztecAddress::from_field(\n 0x25afb798ea6d0b8c1618e50fdeafa463059415013d3b7c75d46abf5e242be70c,\n );\n\n // Mock random values for deterministic test\n let eph_sk = 0x1358d15019d4639393d62b97e1588c095957ce74a1c32d6ec7d62fe6705d9538;\n let _ = OracleMock::mock(\"getRandomField\").returns(eph_sk).times(1);\n\n let randomness = 0x0101010101010101010101010101010101010101010101010101010101010101;\n let _ = OracleMock::mock(\"getRandomField\").returns(randomness).times(1000000);\n\n let _ = OracleMock::mock(\"getIndexedTaggingSecretAsSender\").returns(\n IndexedTaggingSecret::deserialize([69420, 1337]),\n );\n let _ = OracleMock::mock(\"incrementAppTaggingSecretIndexAsSender\").returns(());\n\n // Encrypt the log\n let encrypted_log = BoundedVec::from_array(AES128::encrypt_log(plaintext, recipient));\n\n // Mock shared secret for deterministic test\n let shared_secret = derive_ecdh_shared_secret_using_aztec_address(\n EmbeddedCurveScalar::from_field(eph_sk),\n recipient,\n );\n let _ = OracleMock::mock(\"getSharedSecret\").returns(shared_secret);\n\n // Decrypt the log\n let decrypted = AES128::decrypt_log(encrypted_log, recipient);\n\n // The decryption function spits out a BoundedVec because it's designed to work with logs with unknown length\n // at compile time. For this reason we need to convert the original input to a BoundedVec.\n let plaintext_bvec =\n BoundedVec::<Field, PRIVATE_LOG_PLAINTEXT_SIZE_IN_FIELDS>::from_array(plaintext);\n\n // Verify decryption matches original plaintext\n assert_eq(decrypted, plaintext_bvec, \"Decrypted bytes should match original plaintext\");\n\n // The following is a workaround of \"struct is never constructed\" Noir compilation error (we only ever use\n // static methods of the struct).\n let _ = AES128 {};\n }\n}\n"
|
|
2840
|
-
},
|
|
2841
2543
|
"143": {
|
|
2842
2544
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/call_private_function.nr",
|
|
2843
2545
|
"source": "use dep::protocol_types::{\n abis::function_selector::FunctionSelector, address::AztecAddress, utils::reader::Reader,\n};\n\n#[oracle(callPrivateFunction)]\nunconstrained fn call_private_function_oracle(\n _contract_address: AztecAddress,\n _function_selector: FunctionSelector,\n _args_hash: Field,\n _start_side_effect_counter: u32,\n _is_static_call: bool,\n) -> [Field; 2] {}\n\npub unconstrained fn call_private_function_internal(\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n start_side_effect_counter: u32,\n is_static_call: bool,\n) -> (u32, Field) {\n let fields = call_private_function_oracle(\n contract_address,\n function_selector,\n args_hash,\n start_side_effect_counter,\n is_static_call,\n );\n\n let mut reader = Reader::new(fields);\n let end_side_effect_counter = reader.read_u32();\n let returns_hash = reader.read();\n\n (end_side_effect_counter, returns_hash)\n}\n"
|
|
2844
2546
|
},
|
|
2845
|
-
"144": {
|
|
2846
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/capsules.nr",
|
|
2847
|
-
"source": "use protocol_types::{address::AztecAddress, traits::{Deserialize, Serialize}};\n\n/// Stores arbitrary information in a per-contract non-volatile database, which can later be retrieved with `load`. If\n/// data was already stored at this slot, it is overwritten.\npub unconstrained fn store<T, let N: u32>(contract_address: AztecAddress, slot: Field, value: T)\nwhere\n T: Serialize<N>,\n{\n let serialized = value.serialize();\n store_oracle(contract_address, slot, serialized);\n}\n\n/// Returns data previously stored via `storeCapsule` in the per-contract non-volatile database. Returns Option::none() if\n/// nothing was stored at the given slot.\npub unconstrained fn load<T, let N: u32>(contract_address: AztecAddress, slot: Field) -> Option<T>\nwhere\n T: Deserialize<N>,\n{\n let serialized_option = load_oracle::<N>(contract_address, slot, N);\n serialized_option.map(|arr| Deserialize::deserialize(arr))\n}\n\n/// Deletes data in the per-contract non-volatile database. Does nothing if no data was present.\npub unconstrained fn delete(contract_address: AztecAddress, slot: Field) {\n delete_oracle(contract_address, slot);\n}\n\n/// Copies a number of contiguous entries in the per-contract non-volatile database. This allows for efficient data\n/// structures by avoiding repeated calls to `loadCapsule` and `storeCapsule`.\n/// Supports overlapping source and destination regions (which will result in the overlapped source values being\n/// overwritten). All copied slots must exist in the database (i.e. have been stored and not deleted)\npub unconstrained fn copy(\n contract_address: AztecAddress,\n src_slot: Field,\n dst_slot: Field,\n num_entries: u32,\n) {\n copy_oracle(contract_address, src_slot, dst_slot, num_entries);\n}\n\n#[oracle(storeCapsule)]\nunconstrained fn store_oracle<let N: u32>(\n contract_address: AztecAddress,\n slot: Field,\n values: [Field; N],\n) {}\n\n/// We need to pass in `array_len` (the value of N) as a parameter to tell the oracle how many fields the response must\n/// have.\n///\n/// Note that the oracle returns an Option<[Field; N]> because we cannot return an Option<T> directly. That would\n/// require for the oracle resolver to know the shape of T (e.g. if T were a struct of 3 u32 values then the expected\n/// response shape would be 3 single items, whereas it were a struct containing `u32, [Field;10], u32` then the expected\n/// shape would be single, array, single.). Instead, we return the serialization and deserialize in Noir.\n#[oracle(loadCapsule)]\nunconstrained fn load_oracle<let N: u32>(\n contract_address: AztecAddress,\n slot: Field,\n array_len: u32,\n) -> Option<[Field; N]> {}\n\n#[oracle(deleteCapsule)]\nunconstrained fn delete_oracle(contract_address: AztecAddress, slot: Field) {}\n\n#[oracle(copyCapsule)]\nunconstrained fn copy_oracle(\n contract_address: AztecAddress,\n src_slot: Field,\n dst_slot: Field,\n num_entries: u32,\n) {}\n\nmod test {\n // These tests are sort of redundant since we already test the oracle implementation directly in TypeScript, but\n // they are cheap regardless and help ensure both that the TXE implementation works accordingly and that the Noir\n // oracles are hooked up correctly.\n\n use crate::{\n oracle::capsules::{copy, delete, load, store},\n test::{helpers::test_environment::TestEnvironment, mocks::mock_struct::MockStruct},\n };\n use protocol_types::{address::AztecAddress, traits::{FromField, ToField}};\n\n unconstrained fn setup() -> AztecAddress {\n let env = TestEnvironment::new();\n env.contract_address()\n }\n\n global SLOT: Field = 1;\n\n #[test]\n unconstrained fn stores_and_loads() {\n let contract_address = setup();\n\n let value = MockStruct::new(5, 6);\n store(contract_address, SLOT, value);\n\n assert_eq(load(contract_address, SLOT).unwrap(), value);\n }\n\n #[test]\n unconstrained fn store_overwrites() {\n let contract_address = setup();\n\n let value = MockStruct::new(5, 6);\n store(contract_address, SLOT, value);\n\n let new_value = MockStruct::new(7, 8);\n store(contract_address, SLOT, new_value);\n\n assert_eq(load(contract_address, SLOT).unwrap(), new_value);\n }\n\n #[test]\n unconstrained fn loads_empty_slot() {\n let contract_address = setup();\n\n let loaded_value: Option<MockStruct> = load(contract_address, SLOT);\n assert_eq(loaded_value, Option::none());\n }\n\n #[test]\n unconstrained fn deletes_stored_value() {\n let contract_address = setup();\n\n let value = MockStruct::new(5, 6);\n store(contract_address, SLOT, value);\n delete(contract_address, SLOT);\n\n let loaded_value: Option<MockStruct> = load(contract_address, SLOT);\n assert_eq(loaded_value, Option::none());\n }\n\n #[test]\n unconstrained fn deletes_empty_slot() {\n let contract_address = setup();\n\n delete(contract_address, SLOT);\n let loaded_value: Option<MockStruct> = load(contract_address, SLOT);\n assert_eq(loaded_value, Option::none());\n }\n\n #[test]\n unconstrained fn copies_non_overlapping_values() {\n let contract_address = setup();\n\n let src = 5;\n\n let values = [MockStruct::new(5, 6), MockStruct::new(7, 8), MockStruct::new(9, 10)];\n store(contract_address, src, values[0]);\n store(contract_address, src + 1, values[1]);\n store(contract_address, src + 2, values[2]);\n\n let dst = 10;\n copy(contract_address, src, dst, 3);\n\n assert_eq(load(contract_address, dst).unwrap(), values[0]);\n assert_eq(load(contract_address, dst + 1).unwrap(), values[1]);\n assert_eq(load(contract_address, dst + 2).unwrap(), values[2]);\n }\n\n #[test]\n unconstrained fn copies_overlapping_values_with_src_ahead() {\n let contract_address = setup();\n\n let src = 1;\n\n let values = [MockStruct::new(5, 6), MockStruct::new(7, 8), MockStruct::new(9, 10)];\n store(contract_address, src, values[0]);\n store(contract_address, src + 1, values[1]);\n store(contract_address, src + 2, values[2]);\n\n let dst = 2;\n copy(contract_address, src, dst, 3);\n\n assert_eq(load(contract_address, dst).unwrap(), values[0]);\n assert_eq(load(contract_address, dst + 1).unwrap(), values[1]);\n assert_eq(load(contract_address, dst + 2).unwrap(), values[2]);\n\n // src[1] and src[2] should have been overwritten since they are also dst[0] and dst[1]\n assert_eq(load(contract_address, src).unwrap(), values[0]); // src[0] (unchanged)\n assert_eq(load(contract_address, src + 1).unwrap(), values[0]); // dst[0]\n assert_eq(load(contract_address, src + 2).unwrap(), values[1]); // dst[1]\n }\n\n #[test]\n unconstrained fn copies_overlapping_values_with_dst_ahead() {\n let contract_address = setup();\n\n let src = 2;\n\n let values = [MockStruct::new(5, 6), MockStruct::new(7, 8), MockStruct::new(9, 10)];\n store(contract_address, src, values[0]);\n store(contract_address, src + 1, values[1]);\n store(contract_address, src + 2, values[2]);\n\n let dst = 1;\n copy(contract_address, src, dst, 3);\n\n assert_eq(load(contract_address, dst).unwrap(), values[0]);\n assert_eq(load(contract_address, dst + 1).unwrap(), values[1]);\n assert_eq(load(contract_address, dst + 2).unwrap(), values[2]);\n\n // src[0] and src[1] should have been overwritten since they are also dst[1] and dst[2]\n assert_eq(load(contract_address, src).unwrap(), values[1]); // dst[1]\n assert_eq(load(contract_address, src + 1).unwrap(), values[2]); // dst[2]\n assert_eq(load(contract_address, src + 2).unwrap(), values[2]); // src[2] (unchanged)\n }\n\n #[test(should_fail_with = \"copy empty slot\")]\n unconstrained fn cannot_copy_empty_values() {\n let contract_address = setup();\n\n copy(contract_address, SLOT, SLOT, 1);\n }\n\n #[test(should_fail_with = \"not allowed to access\")]\n unconstrained fn cannot_store_other_contract() {\n let contract_address = setup();\n let other_contract_address = AztecAddress::from_field(contract_address.to_field() + 1);\n\n let value = MockStruct::new(5, 6);\n store(other_contract_address, SLOT, value);\n }\n\n #[test(should_fail_with = \"not allowed to access\")]\n unconstrained fn cannot_load_other_contract() {\n let contract_address = setup();\n let other_contract_address = AztecAddress::from_field(contract_address.to_field() + 1);\n\n let _: Option<MockStruct> = load(other_contract_address, SLOT);\n }\n\n #[test(should_fail_with = \"not allowed to access\")]\n unconstrained fn cannot_delete_other_contract() {\n let contract_address = setup();\n let other_contract_address = AztecAddress::from_field(contract_address.to_field() + 1);\n\n delete(other_contract_address, SLOT);\n }\n\n #[test(should_fail_with = \"not allowed to access\")]\n unconstrained fn cannot_copy_other_contract() {\n let contract_address = setup();\n let other_contract_address = AztecAddress::from_field(contract_address.to_field() + 1);\n\n copy(other_contract_address, SLOT, SLOT, 0);\n }\n}\n"
|
|
2848
|
-
},
|
|
2849
2547
|
"145": {
|
|
2850
2548
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/enqueue_public_function_call.nr",
|
|
2851
2549
|
"source": "use dep::protocol_types::address::AztecAddress;\n\n#[oracle(notifyEnqueuedPublicFunctionCall)]\nunconstrained fn notify_enqueued_public_function_call_oracle(\n _contract_address: AztecAddress,\n _calldata_hash: Field,\n _side_effect_counter: u32,\n _is_static_call: bool,\n) {}\n\nunconstrained fn notify_enqueued_public_function_call_wrapper(\n contract_address: AztecAddress,\n calldata_hash: Field,\n side_effect_counter: u32,\n is_static_call: bool,\n) {\n notify_enqueued_public_function_call_oracle(\n contract_address,\n calldata_hash,\n side_effect_counter,\n is_static_call,\n )\n}\n\npub fn notify_enqueued_public_function_call(\n contract_address: AztecAddress,\n calldata_hash: Field,\n side_effect_counter: u32,\n is_static_call: bool,\n) {\n // Safety: Notifies the simulator that a public call has been enqueued, allowing it to prepare hints for the AVM to process this call.\n unsafe {\n notify_enqueued_public_function_call_wrapper(\n contract_address,\n calldata_hash,\n side_effect_counter,\n is_static_call,\n )\n }\n}\n\n#[oracle(notifySetPublicTeardownFunctionCall)]\nunconstrained fn notify_set_public_teardown_function_call_oracle(\n _contract_address: AztecAddress,\n _calldata_hash: Field,\n _side_effect_counter: u32,\n _is_static_call: bool,\n) {}\n\nunconstrained fn notify_set_public_teardown_function_call_wrapper(\n contract_address: AztecAddress,\n calldata_hash: Field,\n side_effect_counter: u32,\n is_static_call: bool,\n) {\n notify_set_public_teardown_function_call_oracle(\n contract_address,\n calldata_hash,\n side_effect_counter,\n is_static_call,\n )\n}\n\npub fn notify_set_public_teardown_function_call(\n contract_address: AztecAddress,\n calldata_hash: Field,\n side_effect_counter: u32,\n is_static_call: bool,\n) {\n // Safety: Notifies the simulator that a teardown call has been set, allowing it to prepare hints for the AVM to process this call.\n unsafe {\n notify_set_public_teardown_function_call_wrapper(\n contract_address,\n calldata_hash,\n side_effect_counter,\n is_static_call,\n )\n }\n}\n\npub fn notify_set_min_revertible_side_effect_counter(counter: u32) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe\n // to call.\n unsafe { notify_set_min_revertible_side_effect_counter_oracle_wrapper(counter) };\n}\n\npub unconstrained fn notify_set_min_revertible_side_effect_counter_oracle_wrapper(counter: u32) {\n notify_set_min_revertible_side_effect_counter_oracle(counter);\n}\n\n#[oracle(notifySetMinRevertibleSideEffectCounter)]\nunconstrained fn notify_set_min_revertible_side_effect_counter_oracle(_counter: u32) {}\n"
|
|
@@ -2858,22 +2556,10 @@
|
|
|
2858
2556
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/execution_cache.nr",
|
|
2859
2557
|
"source": "/// Stores values represented as slice in execution cache to be later obtained by its hash.\npub fn store(values: [Field], hash: Field) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe\n // to call. When loading the values, however, the caller must check that the values are indeed the preimage.\n unsafe { store_in_execution_cache_oracle_wrapper(values, hash) };\n}\n\nunconstrained fn store_in_execution_cache_oracle_wrapper(values: [Field], hash: Field) {\n store_in_execution_cache_oracle(values, hash);\n}\n\npub unconstrained fn load<let N: u32>(hash: Field) -> [Field; N] {\n load_from_execution_cache_oracle(hash)\n}\n\n#[oracle(storeInExecutionCache)]\nunconstrained fn store_in_execution_cache_oracle(_values: [Field], _hash: Field) {}\n\n#[oracle(loadFromExecutionCache)]\nunconstrained fn load_from_execution_cache_oracle<let N: u32>(_hash: Field) -> [Field; N] {}\n"
|
|
2860
2558
|
},
|
|
2861
|
-
"155": {
|
|
2862
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/logs.nr",
|
|
2863
|
-
"source": "use crate::messages::encoding::MAX_MESSAGE_CONTENT_LEN;\nuse protocol_types::{abis::event_selector::EventSelector, address::AztecAddress};\n\n/// The below only exists to broadcast the raw log, so we can provide it to the base rollup later to be constrained.\npub unconstrained fn notify_created_contract_class_log<let N: u32>(\n contract_address: AztecAddress,\n message: [Field; N],\n length: u32,\n counter: u32,\n) {\n notify_created_contract_class_log_private_oracle(contract_address, message, length, counter)\n}\n\n#[oracle(notifyCreatedContractClassLog)]\nunconstrained fn notify_created_contract_class_log_private_oracle<let N: u32>(\n contract_address: AztecAddress,\n message: [Field; N],\n length: u32,\n counter: u32,\n) {}\n\npub unconstrained fn store_private_event_log(\n contract_address: AztecAddress,\n recipient: AztecAddress,\n event_selector: EventSelector,\n msg_content: BoundedVec<Field, MAX_MESSAGE_CONTENT_LEN>,\n tx_hash: Field,\n log_index_in_tx: Field,\n tx_index_in_block: Field,\n) {\n store_private_event_log_oracle(\n contract_address,\n recipient,\n event_selector,\n msg_content,\n tx_hash,\n log_index_in_tx,\n tx_index_in_block,\n )\n}\n\n#[oracle(storePrivateEventLog)]\nunconstrained fn store_private_event_log_oracle(\n contract_address: AztecAddress,\n recipient: AztecAddress,\n event_selector: EventSelector,\n msg_content: BoundedVec<Field, MAX_MESSAGE_CONTENT_LEN>,\n tx_hash: Field,\n log_index_in_tx: Field,\n tx_index_in_block: Field,\n) {}\n"
|
|
2864
|
-
},
|
|
2865
|
-
"156": {
|
|
2866
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/message_discovery.nr",
|
|
2867
|
-
"source": "use crate::messages::discovery::private_notes::MAX_NOTE_PACKED_LEN;\nuse dep::protocol_types::{\n address::AztecAddress,\n constants::{MAX_NOTE_HASHES_PER_TX, PUBLIC_LOG_SIZE_IN_FIELDS},\n};\n\n/// Finds new private logs that may have been sent to all registered accounts in PXE in the current contract and makes\n/// them available for later processing in Noir by storing them in a capsule array.\npub unconstrained fn fetch_tagged_logs(pending_tagged_log_array_base_slot: Field) {\n fetch_tagged_logs_oracle(pending_tagged_log_array_base_slot);\n}\n\n#[oracle(fetchTaggedLogs)]\nunconstrained fn fetch_tagged_logs_oracle(pending_tagged_log_array_base_slot: Field) {}\n\n/// Informs PXE of a note's existence so that it can later be retrieved by the `getNotes` oracle. The note will be\n/// scoped to `contract_address`, meaning other contracts will not be able to access it unless authorized.\n///\n/// The packed note is what `getNotes` will later return. PXE indexes notes by `storage_slot`, so this value\n/// is typically used to filter notes that correspond to different state variables. `note_hash` and `nullifier` are\n/// the inner hashes, i.e. the raw hashes returned by `NoteHash::compute_note_hash` and\n/// `NoteHash::compute_nullifier`. PXE will verify that the siloed unique note hash was inserted into the tree\n/// at `tx_hash`, and will store the nullifier to later check for nullification.\n///\n/// `recipient` is the account to which the note was sent to. Other accounts will not be able to access this note (e.g.\n/// other accounts will not be able to see one another's token balance notes, even in the same PXE) unless authorized.\n///\n/// Returns true if the note was successfully delivered and added to PXE's database.\npub unconstrained fn deliver_note(\n contract_address: AztecAddress,\n storage_slot: Field,\n nonce: Field,\n packed_note: BoundedVec<Field, MAX_NOTE_PACKED_LEN>,\n note_hash: Field,\n nullifier: Field,\n tx_hash: Field,\n recipient: AztecAddress,\n) -> bool {\n deliver_note_oracle(\n contract_address,\n storage_slot,\n nonce,\n packed_note,\n note_hash,\n nullifier,\n tx_hash,\n recipient,\n )\n}\n\n/// The contents of a public log, plus contextual information about the transaction in which the log was emitted. This\n/// is the data required in order to discover notes that are being delivered in a log.\n// TODO(#11639): this could also be used to fetch private logs, but the `BoundedVec` maximum length is that of a public\n// log.\npub struct LogWithTxData {\n // The log fields length is PUBLIC_LOG_SIZE_IN_FIELDS. + 1 because the contract address is prepended to the content.\n pub log_content: BoundedVec<Field, PUBLIC_LOG_SIZE_IN_FIELDS + 1>,\n pub tx_hash: Field,\n /// The array of new note hashes created by `tx_hash`\n pub unique_note_hashes_in_tx: BoundedVec<Field, MAX_NOTE_HASHES_PER_TX>,\n /// The first nullifier created by `tx_hash`\n pub first_nullifier_in_tx: Field,\n}\n\n/// Fetches a log from the node that has the corresponding `tag`. The log can be either a public or a private log, and\n/// the tag is the first field in the log's content. Returns `Option::none` if no such log exists. Throws if more than\n/// one log with that tag exists.\n/// Public logs have an extra field included at the beginning with the address of the contract that emitted them.\n// TODO(#11627): handle multiple logs with the same tag.\n// TODO(#10273): improve contract siloing of logs, don't introduce an extra field.\npub unconstrained fn get_log_by_tag(tag: Field) -> Option<LogWithTxData> {\n get_log_by_tag_oracle(tag)\n}\n\n#[oracle(deliverNote)]\nunconstrained fn deliver_note_oracle(\n contract_address: AztecAddress,\n storage_slot: Field,\n nonce: Field,\n packed_note: BoundedVec<Field, MAX_NOTE_PACKED_LEN>,\n note_hash: Field,\n nullifier: Field,\n tx_hash: Field,\n recipient: AztecAddress,\n) -> bool {}\n\n#[oracle(getLogByTag)]\nunconstrained fn get_log_by_tag_oracle(tag: Field) -> Option<LogWithTxData> {}\n"
|
|
2868
|
-
},
|
|
2869
2559
|
"158": {
|
|
2870
2560
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/notes.nr",
|
|
2871
2561
|
"source": "use crate::note::{\n note_interface::NoteType,\n retrieved_note::{RETRIEVED_NOTE_OVERHEAD, RetrievedNote, unpack_retrieved_note},\n};\n\nuse dep::protocol_types::{\n address::AztecAddress, indexed_tagging_secret::IndexedTaggingSecret, traits::Packable,\n};\n\n/// Notifies the simulator that a note has been created, so that it can be returned in future read requests in the same\n/// transaction. This note should only be added to the non-volatile database if found in an actual block.\npub fn notify_created_note<let N: u32>(\n storage_slot: Field,\n note_type_id: Field,\n packed_note: [Field; N],\n note_hash: Field,\n counter: u32,\n) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe\n // to call.\n unsafe {\n notify_created_note_oracle_wrapper(\n storage_slot,\n note_type_id,\n packed_note,\n note_hash,\n counter,\n )\n };\n}\n\n/// Notifies the simulator that a note has been nullified, so that it is no longer returned in future read requests in\n/// the same transaction. This note should only be removed to the non-volatile database if its nullifier is found in an\n/// actual block.\npub fn notify_nullified_note(nullifier: Field, note_hash: Field, counter: u32) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe to\n // call.\n unsafe { notify_nullified_note_oracle_wrapper(nullifier, note_hash, counter) };\n}\n\n/// Notifies the simulator that a non-note nullifier has been created, so that it can be used for note nonces.\npub fn notify_created_nullifier(nullifier: Field) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe to\n // call.\n unsafe { notify_created_nullifier_oracle_wrapper(nullifier) };\n}\n\nunconstrained fn notify_created_note_oracle_wrapper<let N: u32>(\n storage_slot: Field,\n note_type_id: Field,\n packed_note: [Field; N],\n note_hash: Field,\n counter: u32,\n) {\n notify_created_note_oracle(storage_slot, note_type_id, packed_note, note_hash, counter);\n}\n\n#[oracle(notifyCreatedNote)]\nunconstrained fn notify_created_note_oracle<let N: u32>(\n _storage_slot: Field,\n _note_type_id: Field,\n _packed_note: [Field; N],\n _note_hash: Field,\n _counter: u32,\n) {}\n\nunconstrained fn notify_nullified_note_oracle_wrapper(\n nullifier: Field,\n note_hash: Field,\n counter: u32,\n) {\n notify_nullified_note_oracle(nullifier, note_hash, counter);\n}\n\n#[oracle(notifyNullifiedNote)]\nunconstrained fn notify_nullified_note_oracle(_nullifier: Field, _note_hash: Field, _counter: u32) {}\n\nunconstrained fn notify_created_nullifier_oracle_wrapper(nullifier: Field) {\n notify_created_nullifier_oracle(nullifier);\n}\n\n#[oracle(notifyCreatedNullifier)]\nunconstrained fn notify_created_nullifier_oracle(_nullifier: Field) {}\n\n#[oracle(getNotes)]\nunconstrained fn get_notes_oracle<let NOTE_PCKD_LEN: u32, let M: u32, let MAX_NOTES: u32>(\n _storage_slot: Field,\n _num_selects: u8,\n _select_by_indexes: [u8; M],\n _select_by_offsets: [u8; M],\n _select_by_lengths: [u8; M],\n _select_values: [Field; M],\n _select_comparators: [u8; M],\n _sort_by_indexes: [u8; M],\n _sort_by_offsets: [u8; M],\n _sort_by_lengths: [u8; M],\n _sort_order: [u8; M],\n _limit: u32,\n _offset: u32,\n _status: u8,\n // This is always set to MAX_NOTES. We need to pass it to TS in order to correctly construct the BoundedVec\n _max_notes: u32,\n // This is always set to NOTE_PCKD_LEN + RETRIEVED_NOTE_OVERHEAD. We need to pass it to TS in order to be able to\n // correctly construct the BoundedVec there.\n _packed_retrieved_note_length: u32,\n) -> BoundedVec<[Field; NOTE_PCKD_LEN + RETRIEVED_NOTE_OVERHEAD], MAX_NOTES> {}\n\npub unconstrained fn get_notes<Note, let NOTE_PCKD_LEN: u32, let M: u32, let MAX_NOTES: u32>(\n storage_slot: Field,\n num_selects: u8,\n select_by_indexes: [u8; M],\n select_by_offsets: [u8; M],\n select_by_lengths: [u8; M],\n select_values: [Field; M],\n select_comparators: [u8; M],\n sort_by_indexes: [u8; M],\n sort_by_offsets: [u8; M],\n sort_by_lengths: [u8; M],\n sort_order: [u8; M],\n limit: u32,\n offset: u32,\n status: u8,\n) -> [Option<RetrievedNote<Note>>; MAX_NOTES]\nwhere\n Note: NoteType + Packable<NOTE_PCKD_LEN>,\n{\n // N + 3 because of the contract address, nonce, and note_hash_counter that are stored out of the packed note.\n let packed_retrieved_notes: BoundedVec<[Field; NOTE_PCKD_LEN + RETRIEVED_NOTE_OVERHEAD], MAX_NOTES> = get_notes_oracle(\n storage_slot,\n num_selects,\n select_by_indexes,\n select_by_offsets,\n select_by_lengths,\n select_values,\n select_comparators,\n sort_by_indexes,\n sort_by_offsets,\n sort_by_lengths,\n sort_order,\n limit,\n offset,\n status,\n MAX_NOTES,\n NOTE_PCKD_LEN + RETRIEVED_NOTE_OVERHEAD,\n );\n\n let mut notes = BoundedVec::<_, MAX_NOTES>::new();\n for i in 0..packed_retrieved_notes.len() {\n let retrieved_note = unpack_retrieved_note(packed_retrieved_notes.get(i));\n notes.push(retrieved_note);\n }\n\n // At last we convert the bounded vector to an array of options. We do this because that is what the filter\n // function needs to have on the output and we've decided to have the same type on the input and output of\n // the filter and preprocessor functions.\n //\n // We have decided to have the same type on the input and output of the filter and preprocessor functions because\n // it allows us to chain multiple filters and preprocessors together.\n //\n // So why do we want the array of options on the output of the filter function?\n //\n // Filter returns an array of options rather than a BoundedVec for performance reasons. Using an array of options\n // allows setting values at known indices in the output array which is much more efficient than pushing to a\n // BoundedVec where the write position depends on previous iterations. The array can then be efficiently converted\n // to a BoundedVec using utils/array/collapse.nr::collapse function from Aztec.nr. This avoids expensive dynamic\n // memory access patterns that would be required when building up a BoundedVec incrementally. For preprocessor\n // functions we could use BoundedVec return value as there the optimization does not matter since it is applied in\n // an unconstrained context. We, however, use the same return value type to be able to use the same function as\n // both a preprocessor and a filter.\n let mut notes_array = [Option::none(); MAX_NOTES];\n for i in 0..notes.len() {\n if i < notes.len() {\n notes_array[i] = Option::some(notes.get_unchecked(i));\n }\n }\n\n notes_array\n}\n\n/// Returns true if the nullifier exists. Note that a `true` value can be constrained by proving existence of the\n/// nullifier, but a `false` value should not be relied upon since other transactions may emit this nullifier before the\n/// current transaction is included in a block. While this might seem of little use at first, certain design patterns\n/// benefit from this abstraction (see e.g. `PrivateMutable`).\npub unconstrained fn check_nullifier_exists(inner_nullifier: Field) -> bool {\n check_nullifier_exists_oracle(inner_nullifier)\n}\n\n#[oracle(checkNullifierExists)]\nunconstrained fn check_nullifier_exists_oracle(_inner_nullifier: Field) -> bool {}\n\n/// Returns the derived app tagging secret ready to be included in a log for a given sender and recipient pair,\n/// siloed for the current contract address.\npub unconstrained fn get_app_tag_as_sender(sender: AztecAddress, recipient: AztecAddress) -> Field {\n get_indexed_tagging_secret_as_sender_oracle(sender, recipient).compute_tag(recipient)\n}\n\n#[oracle(getIndexedTaggingSecretAsSender)]\nunconstrained fn get_indexed_tagging_secret_as_sender_oracle(\n _sender: AztecAddress,\n _recipient: AztecAddress,\n) -> IndexedTaggingSecret {}\n\n/// Notifies the simulator that a tag has been used in a note, and to therefore increment the associated index so that\n/// future notes get a different tag and can be discovered by the recipient.\n/// This change should only be persisted in a non-volatile database if the tagged log is found in an actual block -\n/// otherwise e.g. a reverting transaction can cause the sender to accidentally skip indices and later produce notes\n/// that are not found by the recipient.\npub fn increment_app_tagging_secret_index_as_sender(sender: AztecAddress, recipient: AztecAddress) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe\n // to call.\n unsafe {\n increment_app_tagging_secret_index_as_sender_wrapper(sender, recipient);\n }\n}\n\nunconstrained fn increment_app_tagging_secret_index_as_sender_wrapper(\n sender: AztecAddress,\n recipient: AztecAddress,\n) {\n increment_app_tagging_secret_index_as_sender_oracle(sender, recipient);\n}\n\n#[oracle(incrementAppTaggingSecretIndexAsSender)]\nunconstrained fn increment_app_tagging_secret_index_as_sender_oracle(\n _sender: AztecAddress,\n _recipient: AztecAddress,\n) {}\n"
|
|
2872
2562
|
},
|
|
2873
|
-
"160": {
|
|
2874
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/shared_secret.nr",
|
|
2875
|
-
"source": "use protocol_types::{address::aztec_address::AztecAddress, point::Point};\n\n// TODO(#12656): return an app-siloed secret + document this\n#[oracle(getSharedSecret)]\nunconstrained fn get_shared_secret_oracle(address: AztecAddress, ephPk: Point) -> Point {}\n\n/// Returns an app-siloed shared secret between `address` and someone who knows the secret key behind an\n/// ephemeral public key `ephPk`. The app-siloing means that contracts cannot retrieve secrets that belong to\n/// other contracts, and therefore cannot e.g. decrypt their messages. This is an important security consideration\n/// given that both the `address` and `ephPk` are public information.\n///\n/// The shared secret `S` is computed as:\n/// `let S = (ivsk + h) * ephPk`\n/// where `ivsk + h` is the 'preaddress' i.e. the preimage of the address, also called the address secret.\n/// TODO(#12656): app-silo this secret\npub unconstrained fn get_shared_secret(address: AztecAddress, ephPk: Point) -> Point {\n get_shared_secret_oracle(address, ephPk)\n}\n"
|
|
2876
|
-
},
|
|
2877
2563
|
"162": {
|
|
2878
2564
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/storage.nr",
|
|
2879
2565
|
"source": "use dep::protocol_types::{address::AztecAddress, traits::{Packable, ToField}};\n\n#[oracle(storageRead)]\nunconstrained fn storage_read_oracle<let N: u32>(\n address: Field,\n storage_slot: Field,\n block_number: Field,\n length: Field,\n) -> [Field; N] {}\n\npub unconstrained fn raw_storage_read<let N: u32>(\n address: AztecAddress,\n storage_slot: Field,\n block_number: u32,\n) -> [Field; N] {\n storage_read_oracle(\n address.to_field(),\n storage_slot,\n block_number as Field,\n N as Field,\n )\n}\n\npub unconstrained fn storage_read<T, let N: u32>(\n address: AztecAddress,\n storage_slot: Field,\n block_number: u32,\n) -> T\nwhere\n T: Packable<N>,\n{\n T::unpack(raw_storage_read(address, storage_slot, block_number))\n}\n\nmod tests {\n use crate::oracle::storage::{raw_storage_read, storage_read};\n use dep::protocol_types::{address::AztecAddress, traits::{FromField, Packable}};\n\n use crate::test::mocks::mock_struct::MockStruct;\n use std::test::OracleMock;\n\n global address: AztecAddress = AztecAddress::from_field(29);\n global slot: Field = 7;\n global block_number: u32 = 17;\n\n #[test]\n unconstrained fn test_raw_storage_read() {\n let written = MockStruct { a: 13, b: 42 };\n\n let _ = OracleMock::mock(\"storageRead\").returns(written.pack());\n\n let read: [Field; 2] = raw_storage_read(address, slot, block_number);\n assert_eq(read[0], 13);\n assert_eq(read[1], 42);\n }\n\n #[test]\n unconstrained fn test_storage_read() {\n let written = MockStruct { a: 13, b: 42 };\n\n let _ = OracleMock::mock(\"storageRead\").returns(written.pack());\n\n let read: MockStruct = storage_read(address, slot, block_number);\n assert_eq(read.a, 13);\n assert_eq(read.b, 42);\n }\n}\n"
|
|
@@ -2882,70 +2568,22 @@
|
|
|
2882
2568
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/state_vars/map.nr",
|
|
2883
2569
|
"source": "use crate::state_vars::storage::Storage;\nuse dep::protocol_types::{storage::map::derive_storage_slot_in_map, traits::ToField};\n\n// docs:start:map\npub struct Map<K, V, Context> {\n context: Context,\n storage_slot: Field,\n state_var_constructor: fn(Context, Field) -> V,\n}\n// docs:end:map\n\n// Map reserves a single storage slot regardless of what it stores because nothing is stored at said slot: it is only\n// used to derive the storage slots of nested state variables, which is expected to never result in collisions or slots\n// being close to one another due to these being hashes. This mirrors the strategy adopted by Solidity mappings.\nimpl<K, T, Context> Storage<1> for Map<K, T, Context> {\n fn get_storage_slot(self) -> Field {\n self.storage_slot\n }\n}\n\nimpl<K, V, Context> Map<K, V, Context> {\n // docs:start:new\n pub fn new(\n context: Context,\n storage_slot: Field,\n state_var_constructor: fn(Context, Field) -> V,\n ) -> Self {\n assert(storage_slot != 0, \"Storage slot 0 not allowed. Storage slots must start from 1.\");\n Map { context, storage_slot, state_var_constructor }\n }\n // docs:end:new\n\n // docs:start:at\n pub fn at(self, key: K) -> V\n where\n K: ToField,\n {\n // TODO(#1204): use a generator index for the storage slot\n let derived_storage_slot = derive_storage_slot_in_map(self.storage_slot, key);\n\n let state_var_constructor = self.state_var_constructor;\n state_var_constructor(self.context, derived_storage_slot)\n }\n // docs:end:at\n}\n"
|
|
2884
2570
|
},
|
|
2885
|
-
"17": {
|
|
2886
|
-
"path": "std/field/bn254.nr",
|
|
2887
|
-
"source": "use crate::field::field_less_than;\nuse crate::runtime::is_unconstrained;\n\n// The low and high decomposition of the field modulus\nglobal PLO: Field = 53438638232309528389504892708671455233;\nglobal PHI: Field = 64323764613183177041862057485226039389;\n\npub(crate) global TWO_POW_128: Field = 0x100000000000000000000000000000000;\n\n// Decomposes a single field into two 16 byte fields.\nfn compute_decomposition(x: Field) -> (Field, Field) {\n // Here's we're taking advantage of truncating 128 bit limbs from the input field\n // and then subtracting them from the input such the field division is equivalent to integer division.\n let low = (x as u128) as Field;\n let high = (x - low) / TWO_POW_128;\n\n (low, high)\n}\n\npub(crate) unconstrained fn decompose_hint(x: Field) -> (Field, Field) {\n compute_decomposition(x)\n}\n\nunconstrained fn lte_hint(x: Field, y: Field) -> bool {\n if x == y {\n true\n } else {\n field_less_than(x, y)\n }\n}\n\n// Assert that (alo > blo && ahi >= bhi) || (alo <= blo && ahi > bhi)\nfn assert_gt_limbs(a: (Field, Field), b: (Field, Field)) {\n let (alo, ahi) = a;\n let (blo, bhi) = b;\n // Safety: borrow is enforced to be boolean due to its type.\n // if borrow is 0, it asserts that (alo > blo && ahi >= bhi)\n // if borrow is 1, it asserts that (alo <= blo && ahi > bhi)\n unsafe {\n let borrow = lte_hint(alo, blo);\n\n let rlo = alo - blo - 1 + (borrow as Field) * TWO_POW_128;\n let rhi = ahi - bhi - (borrow as Field);\n\n rlo.assert_max_bit_size::<128>();\n rhi.assert_max_bit_size::<128>();\n }\n}\n\n/// Decompose a single field into two 16 byte fields.\npub fn decompose(x: Field) -> (Field, Field) {\n if is_unconstrained() {\n compute_decomposition(x)\n } else {\n // Safety: decomposition is properly checked below\n unsafe {\n // Take hints of the decomposition\n let (xlo, xhi) = decompose_hint(x);\n\n // Range check the limbs\n xlo.assert_max_bit_size::<128>();\n xhi.assert_max_bit_size::<128>();\n\n // Check that the decomposition is correct\n assert_eq(x, xlo + TWO_POW_128 * xhi);\n\n // Assert that the decomposition of P is greater than the decomposition of x\n assert_gt_limbs((PLO, PHI), (xlo, xhi));\n (xlo, xhi)\n }\n }\n}\n\npub fn assert_gt(a: Field, b: Field) {\n if is_unconstrained() {\n assert(\n // Safety: already unconstrained\n unsafe { field_less_than(b, a) },\n );\n } else {\n // Decompose a and b\n let a_limbs = decompose(a);\n let b_limbs = decompose(b);\n\n // Assert that a_limbs is greater than b_limbs\n assert_gt_limbs(a_limbs, b_limbs)\n }\n}\n\npub fn assert_lt(a: Field, b: Field) {\n assert_gt(b, a);\n}\n\npub fn gt(a: Field, b: Field) -> bool {\n if is_unconstrained() {\n // Safety: unsafe in unconstrained\n unsafe {\n field_less_than(b, a)\n }\n } else if a == b {\n false\n } else {\n // Safety: Take a hint of the comparison and verify it\n unsafe {\n if field_less_than(a, b) {\n assert_gt(b, a);\n false\n } else {\n assert_gt(a, b);\n true\n }\n }\n }\n}\n\npub fn lt(a: Field, b: Field) -> bool {\n gt(b, a)\n}\n\nmod tests {\n // TODO: Allow imports from \"super\"\n use crate::field::bn254::{assert_gt, decompose, gt, lte_hint, PHI, PLO, TWO_POW_128};\n\n #[test]\n fn check_decompose() {\n assert_eq(decompose(TWO_POW_128), (0, 1));\n assert_eq(decompose(TWO_POW_128 + 0x1234567890), (0x1234567890, 1));\n assert_eq(decompose(0x1234567890), (0x1234567890, 0));\n }\n\n #[test]\n unconstrained fn check_decompose_unconstrained() {\n assert_eq(decompose(TWO_POW_128), (0, 1));\n assert_eq(decompose(TWO_POW_128 + 0x1234567890), (0x1234567890, 1));\n assert_eq(decompose(0x1234567890), (0x1234567890, 0));\n }\n\n #[test]\n unconstrained fn check_lte_hint() {\n assert(lte_hint(0, 1));\n assert(lte_hint(0, 0x100));\n assert(lte_hint(0x100, TWO_POW_128 - 1));\n assert(!lte_hint(0 - 1, 0));\n\n assert(lte_hint(0, 0));\n assert(lte_hint(0x100, 0x100));\n assert(lte_hint(0 - 1, 0 - 1));\n }\n\n #[test]\n fn check_assert_gt() {\n assert_gt(1, 0);\n assert_gt(0x100, 0);\n assert_gt((0 - 1), (0 - 2));\n assert_gt(TWO_POW_128, 0);\n assert_gt(0 - 1, 0);\n }\n\n #[test]\n unconstrained fn check_assert_gt_unconstrained() {\n assert_gt(1, 0);\n assert_gt(0x100, 0);\n assert_gt((0 - 1), (0 - 2));\n assert_gt(TWO_POW_128, 0);\n assert_gt(0 - 1, 0);\n }\n\n #[test]\n fn check_gt() {\n assert(gt(1, 0));\n assert(gt(0x100, 0));\n assert(gt((0 - 1), (0 - 2)));\n assert(gt(TWO_POW_128, 0));\n assert(!gt(0, 0));\n assert(!gt(0, 0x100));\n assert(gt(0 - 1, 0 - 2));\n assert(!gt(0 - 2, 0 - 1));\n }\n\n #[test]\n unconstrained fn check_gt_unconstrained() {\n assert(gt(1, 0));\n assert(gt(0x100, 0));\n assert(gt((0 - 1), (0 - 2)));\n assert(gt(TWO_POW_128, 0));\n assert(!gt(0, 0));\n assert(!gt(0, 0x100));\n assert(gt(0 - 1, 0 - 2));\n assert(!gt(0 - 2, 0 - 1));\n }\n\n #[test]\n fn check_plo_phi() {\n assert_eq(PLO + PHI * TWO_POW_128, 0);\n let p_bytes = crate::field::modulus_le_bytes();\n let mut p_low: Field = 0;\n let mut p_high: Field = 0;\n\n let mut offset = 1;\n for i in 0..16 {\n p_low += (p_bytes[i] as Field) * offset;\n p_high += (p_bytes[i + 16] as Field) * offset;\n offset *= 256;\n }\n assert_eq(p_low, PLO);\n assert_eq(p_high, PHI);\n }\n}\n"
|
|
2888
|
-
},
|
|
2889
2571
|
"173": {
|
|
2890
2572
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/state_vars/public_mutable.nr",
|
|
2891
2573
|
"source": "use crate::context::{PublicContext, UtilityContext};\nuse crate::state_vars::storage::Storage;\nuse dep::protocol_types::traits::Packable;\n\n// docs:start:public_mutable_struct\npub struct PublicMutable<T, Context> {\n context: Context,\n storage_slot: Field,\n}\n// docs:end:public_mutable_struct\n\nimpl<T, Context, let N: u32> Storage<N> for PublicMutable<T, Context>\nwhere\n T: Packable<N>,\n{\n fn get_storage_slot(self) -> Field {\n self.storage_slot\n }\n}\n\nimpl<T, Context> PublicMutable<T, Context> {\n // docs:start:public_mutable_struct_new\n pub fn new(\n // Note: Passing the contexts to new(...) just to have an interface compatible with a Map.\n context: Context,\n storage_slot: Field,\n ) -> Self {\n assert(storage_slot != 0, \"Storage slot 0 not allowed. Storage slots must start from 1.\");\n PublicMutable { context, storage_slot }\n }\n // docs:end:public_mutable_struct_new\n}\n\nimpl<T> PublicMutable<T, &mut PublicContext> {\n // docs:start:public_mutable_struct_read\n pub fn read<let T_PACKED_LEN: u32>(self) -> T\n where\n T: Packable<T_PACKED_LEN>,\n {\n self.context.storage_read(self.storage_slot)\n }\n // docs:end:public_mutable_struct_read\n\n // docs:start:public_mutable_struct_write\n pub fn write<let T_PACKED_LEN: u32>(self, value: T)\n where\n T: Packable<T_PACKED_LEN>,\n {\n self.context.storage_write(self.storage_slot, value);\n }\n // docs:end:public_mutable_struct_write\n}\n\nimpl<T> PublicMutable<T, UtilityContext> {\n pub unconstrained fn read<let T_PACKED_LEN: u32>(self) -> T\n where\n T: Packable<T_PACKED_LEN>,\n {\n self.context.storage_read(self.storage_slot)\n }\n}\n"
|
|
2892
2574
|
},
|
|
2893
|
-
"18": {
|
|
2894
|
-
"path": "std/field/mod.nr",
|
|
2895
|
-
"source": "pub mod bn254;\nuse crate::{runtime::is_unconstrained, static_assert};\nuse bn254::lt as bn254_lt;\n\nimpl Field {\n /// Asserts that `self` can be represented in `bit_size` bits.\n ///\n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^{bit_size}`.\n // docs:start:assert_max_bit_size\n pub fn assert_max_bit_size<let BIT_SIZE: u32>(self) {\n // docs:end:assert_max_bit_size\n static_assert(\n BIT_SIZE < modulus_num_bits() as u32,\n \"BIT_SIZE must be less than modulus_num_bits\",\n );\n self.__assert_max_bit_size(BIT_SIZE);\n }\n\n #[builtin(apply_range_constraint)]\n fn __assert_max_bit_size(self, bit_size: u32) {}\n\n /// Decomposes `self` into its little endian bit decomposition as a `[u1; N]` array.\n /// This slice will be zero padded should not all bits be necessary to represent `self`.\n ///\n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^N` as the resulting slice will not\n /// be able to represent the original `Field`.\n ///\n /// # Safety\n /// Values of `N` equal to or greater than the number of bits necessary to represent the `Field` modulus\n /// (e.g. 254 for the BN254 field) allow for multiple bit decompositions. This is due to how the `Field` will\n /// wrap around due to overflow when verifying the decomposition.\n #[builtin(to_le_bits)]\n fn _to_le_bits<let N: u32>(self: Self) -> [u1; N] {}\n\n /// Decomposes `self` into its big endian bit decomposition as a `[u1; N]` array.\n /// This array will be zero padded should not all bits be necessary to represent `self`.\n ///\n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^N` as the resulting slice will not\n /// be able to represent the original `Field`.\n ///\n /// # Safety\n /// Values of `N` equal to or greater than the number of bits necessary to represent the `Field` modulus\n /// (e.g. 254 for the BN254 field) allow for multiple bit decompositions. This is due to how the `Field` will\n /// wrap around due to overflow when verifying the decomposition.\n #[builtin(to_be_bits)]\n fn _to_be_bits<let N: u32>(self: Self) -> [u1; N] {}\n\n /// Decomposes `self` into its little endian bit decomposition as a `[u1; N]` array.\n /// This slice will be zero padded should not all bits be necessary to represent `self`.\n ///\n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^N` as the resulting slice will not\n /// be able to represent the original `Field`.\n ///\n /// # Safety\n /// The bit decomposition returned is canonical and is guaranteed to not overflow the modulus.\n // docs:start:to_le_bits\n pub fn to_le_bits<let N: u32>(self: Self) -> [u1; N] {\n // docs:end:to_le_bits\n let bits = self._to_le_bits();\n\n if !is_unconstrained() {\n // Ensure that the byte decomposition does not overflow the modulus\n let p = modulus_le_bits();\n assert(bits.len() <= p.len());\n let mut ok = bits.len() != p.len();\n for i in 0..N {\n if !ok {\n if (bits[N - 1 - i] != p[N - 1 - i]) {\n assert(p[N - 1 - i] == 1);\n ok = true;\n }\n }\n }\n assert(ok);\n }\n bits\n }\n\n /// Decomposes `self` into its big endian bit decomposition as a `[u1; N]` array.\n /// This array will be zero padded should not all bits be necessary to represent `self`.\n ///\n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^N` as the resulting slice will not\n /// be able to represent the original `Field`.\n ///\n /// # Safety\n /// The bit decomposition returned is canonical and is guaranteed to not overflow the modulus.\n // docs:start:to_be_bits\n pub fn to_be_bits<let N: u32>(self: Self) -> [u1; N] {\n // docs:end:to_be_bits\n let bits = self._to_be_bits();\n\n if !is_unconstrained() {\n // Ensure that the decomposition does not overflow the modulus\n let p = modulus_be_bits();\n assert(bits.len() <= p.len());\n let mut ok = bits.len() != p.len();\n for i in 0..N {\n if !ok {\n if (bits[i] != p[i]) {\n assert(p[i] == 1);\n ok = true;\n }\n }\n }\n assert(ok);\n }\n bits\n }\n\n /// Decomposes `self` into its little endian byte decomposition as a `[u8;N]` array\n /// This array will be zero padded should not all bytes be necessary to represent `self`.\n ///\n /// # Failures\n /// The length N of the array must be big enough to contain all the bytes of the 'self',\n /// and no more than the number of bytes required to represent the field modulus\n ///\n /// # Safety\n /// The result is ensured to be the canonical decomposition of the field element\n // docs:start:to_le_bytes\n pub fn to_le_bytes<let N: u32>(self: Self) -> [u8; N] {\n // docs:end:to_le_bytes\n static_assert(\n N <= modulus_le_bytes().len(),\n \"N must be less than or equal to modulus_le_bytes().len()\",\n );\n // Compute the byte decomposition\n let bytes = self.to_le_radix(256);\n\n if !is_unconstrained() {\n // Ensure that the byte decomposition does not overflow the modulus\n let p = modulus_le_bytes();\n assert(bytes.len() <= p.len());\n let mut ok = bytes.len() != p.len();\n for i in 0..N {\n if !ok {\n if (bytes[N - 1 - i] != p[N - 1 - i]) {\n assert(bytes[N - 1 - i] < p[N - 1 - i]);\n ok = true;\n }\n }\n }\n assert(ok);\n }\n bytes\n }\n\n /// Decomposes `self` into its big endian byte decomposition as a `[u8;N]` array of length required to represent the field modulus\n /// This array will be zero padded should not all bytes be necessary to represent `self`.\n ///\n /// # Failures\n /// The length N of the array must be big enough to contain all the bytes of the 'self',\n /// and no more than the number of bytes required to represent the field modulus\n ///\n /// # Safety\n /// The result is ensured to be the canonical decomposition of the field element\n // docs:start:to_be_bytes\n pub fn to_be_bytes<let N: u32>(self: Self) -> [u8; N] {\n // docs:end:to_be_bytes\n static_assert(\n N <= modulus_le_bytes().len(),\n \"N must be less than or equal to modulus_le_bytes().len()\",\n );\n // Compute the byte decomposition\n let bytes = self.to_be_radix(256);\n\n if !is_unconstrained() {\n // Ensure that the byte decomposition does not overflow the modulus\n let p = modulus_be_bytes();\n assert(bytes.len() <= p.len());\n let mut ok = bytes.len() != p.len();\n for i in 0..N {\n if !ok {\n if (bytes[i] != p[i]) {\n assert(bytes[i] < p[i]);\n ok = true;\n }\n }\n }\n assert(ok);\n }\n bytes\n }\n\n // docs:start:to_le_radix\n pub fn to_le_radix<let N: u32>(self: Self, radix: u32) -> [u8; N] {\n // Brillig does not need an immediate radix\n if !crate::runtime::is_unconstrained() {\n static_assert(1 < radix, \"radix must be greater than 1\");\n static_assert(radix <= 256, \"radix must be less than or equal to 256\");\n static_assert(radix & (radix - 1) == 0, \"radix must be a power of 2\");\n }\n self.__to_le_radix(radix)\n }\n // docs:end:to_le_radix\n\n // docs:start:to_be_radix\n pub fn to_be_radix<let N: u32>(self: Self, radix: u32) -> [u8; N] {\n // Brillig does not need an immediate radix\n if !crate::runtime::is_unconstrained() {\n crate::assert_constant(radix);\n }\n self.__to_be_radix(radix)\n }\n // docs:end:to_be_radix\n\n // `_radix` must be less than 256\n #[builtin(to_le_radix)]\n fn __to_le_radix<let N: u32>(self, radix: u32) -> [u8; N] {}\n\n // `_radix` must be less than 256\n #[builtin(to_be_radix)]\n fn __to_be_radix<let N: u32>(self, radix: u32) -> [u8; N] {}\n\n // Returns self to the power of the given exponent value.\n // Caution: we assume the exponent fits into 32 bits\n // using a bigger bit size impacts negatively the performance and should be done only if the exponent does not fit in 32 bits\n pub fn pow_32(self, exponent: Field) -> Field {\n let mut r: Field = 1;\n let b: [u1; 32] = exponent.to_le_bits();\n\n for i in 1..33 {\n r *= r;\n r = (b[32 - i] as Field) * (r * self) + (1 - b[32 - i] as Field) * r;\n }\n r\n }\n\n // Parity of (prime) Field element, i.e. sgn0(x mod p) = 0 if x `elem` {0, ..., p-1} is even, otherwise sgn0(x mod p) = 1.\n pub fn sgn0(self) -> u1 {\n self as u1\n }\n\n pub fn lt(self, another: Field) -> bool {\n if crate::compat::is_bn254() {\n bn254_lt(self, another)\n } else {\n lt_fallback(self, another)\n }\n }\n\n /// Convert a little endian byte array to a field element.\n /// If the provided byte array overflows the field modulus then the Field will silently wrap around.\n pub fn from_le_bytes<let N: u32>(bytes: [u8; N]) -> Field {\n static_assert(\n N <= modulus_le_bytes().len(),\n \"N must be less than or equal to modulus_le_bytes().len()\",\n );\n let mut v = 1;\n let mut result = 0;\n\n for i in 0..N {\n result += (bytes[i] as Field) * v;\n v = v * 256;\n }\n result\n }\n\n /// Convert a big endian byte array to a field element.\n /// If the provided byte array overflows the field modulus then the Field will silently wrap around.\n pub fn from_be_bytes<let N: u32>(bytes: [u8; N]) -> Field {\n let mut v = 1;\n let mut result = 0;\n\n for i in 0..N {\n result += (bytes[N - 1 - i] as Field) * v;\n v = v * 256;\n }\n result\n }\n}\n\n#[builtin(modulus_num_bits)]\npub comptime fn modulus_num_bits() -> u64 {}\n\n#[builtin(modulus_be_bits)]\npub comptime fn modulus_be_bits() -> [u1] {}\n\n#[builtin(modulus_le_bits)]\npub comptime fn modulus_le_bits() -> [u1] {}\n\n#[builtin(modulus_be_bytes)]\npub comptime fn modulus_be_bytes() -> [u8] {}\n\n#[builtin(modulus_le_bytes)]\npub comptime fn modulus_le_bytes() -> [u8] {}\n\n/// An unconstrained only built in to efficiently compare fields.\n#[builtin(field_less_than)]\nunconstrained fn __field_less_than(x: Field, y: Field) -> bool {}\n\npub(crate) unconstrained fn field_less_than(x: Field, y: Field) -> bool {\n __field_less_than(x, y)\n}\n\n// Convert a 32 byte array to a field element by modding\npub fn bytes32_to_field(bytes32: [u8; 32]) -> Field {\n // Convert it to a field element\n let mut v = 1;\n let mut high = 0 as Field;\n let mut low = 0 as Field;\n\n for i in 0..16 {\n high = high + (bytes32[15 - i] as Field) * v;\n low = low + (bytes32[16 + 15 - i] as Field) * v;\n v = v * 256;\n }\n // Abuse that a % p + b % p = (a + b) % p and that low < p\n low + high * v\n}\n\nfn lt_fallback(x: Field, y: Field) -> bool {\n if is_unconstrained() {\n // Safety: unconstrained context\n unsafe {\n field_less_than(x, y)\n }\n } else {\n let x_bytes: [u8; 32] = x.to_le_bytes();\n let y_bytes: [u8; 32] = y.to_le_bytes();\n let mut x_is_lt = false;\n let mut done = false;\n for i in 0..32 {\n if (!done) {\n let x_byte = x_bytes[32 - 1 - i] as u8;\n let y_byte = y_bytes[32 - 1 - i] as u8;\n let bytes_match = x_byte == y_byte;\n if !bytes_match {\n x_is_lt = x_byte < y_byte;\n done = true;\n }\n }\n }\n x_is_lt\n }\n}\n\nmod tests {\n use crate::{panic::panic, runtime};\n use super::field_less_than;\n\n #[test]\n // docs:start:to_be_bits_example\n fn test_to_be_bits() {\n let field = 2;\n let bits: [u1; 8] = field.to_be_bits();\n assert_eq(bits, [0, 0, 0, 0, 0, 0, 1, 0]);\n }\n // docs:end:to_be_bits_example\n\n #[test]\n // docs:start:to_le_bits_example\n fn test_to_le_bits() {\n let field = 2;\n let bits: [u1; 8] = field.to_le_bits();\n assert_eq(bits, [0, 1, 0, 0, 0, 0, 0, 0]);\n }\n // docs:end:to_le_bits_example\n\n #[test]\n // docs:start:to_be_bytes_example\n fn test_to_be_bytes() {\n let field = 2;\n let bytes: [u8; 8] = field.to_be_bytes();\n assert_eq(bytes, [0, 0, 0, 0, 0, 0, 0, 2]);\n assert_eq(Field::from_be_bytes::<8>(bytes), field);\n }\n // docs:end:to_be_bytes_example\n\n #[test]\n // docs:start:to_le_bytes_example\n fn test_to_le_bytes() {\n let field = 2;\n let bytes: [u8; 8] = field.to_le_bytes();\n assert_eq(bytes, [2, 0, 0, 0, 0, 0, 0, 0]);\n assert_eq(Field::from_le_bytes::<8>(bytes), field);\n }\n // docs:end:to_le_bytes_example\n\n #[test]\n // docs:start:to_be_radix_example\n fn test_to_be_radix() {\n // 259, in base 256, big endian, is [1, 3].\n // i.e. 3 * 256^0 + 1 * 256^1\n let field = 259;\n\n // The radix (in this example, 256) must be a power of 2.\n // The length of the returned byte array can be specified to be\n // >= the amount of space needed.\n let bytes: [u8; 8] = field.to_be_radix(256);\n assert_eq(bytes, [0, 0, 0, 0, 0, 0, 1, 3]);\n assert_eq(Field::from_be_bytes::<8>(bytes), field);\n }\n // docs:end:to_be_radix_example\n\n #[test]\n // docs:start:to_le_radix_example\n fn test_to_le_radix() {\n // 259, in base 256, little endian, is [3, 1].\n // i.e. 3 * 256^0 + 1 * 256^1\n let field = 259;\n\n // The radix (in this example, 256) must be a power of 2.\n // The length of the returned byte array can be specified to be\n // >= the amount of space needed.\n let bytes: [u8; 8] = field.to_le_radix(256);\n assert_eq(bytes, [3, 1, 0, 0, 0, 0, 0, 0]);\n assert_eq(Field::from_le_bytes::<8>(bytes), field);\n }\n // docs:end:to_le_radix_example\n\n #[test(should_fail_with = \"radix must be greater than 1\")]\n fn test_to_le_radix_1() {\n // this test should only fail in constrained mode\n if !runtime::is_unconstrained() {\n let field = 2;\n let _: [u8; 8] = field.to_le_radix(1);\n } else {\n panic(f\"radix must be greater than 1\");\n }\n }\n\n // TODO: Update this test to account for the Brillig restriction that the radix must be greater than 2\n //#[test]\n //fn test_to_le_radix_brillig_1() {\n // // this test should only fail in constrained mode\n // if runtime::is_unconstrained() {\n // let field = 1;\n // let out: [u8; 8] = field.to_le_radix(1);\n // crate::println(out);\n // let expected = [0; 8];\n // assert(out == expected, \"unexpected result\");\n // }\n //}\n\n #[test(should_fail_with = \"radix must be a power of 2\")]\n fn test_to_le_radix_3() {\n // this test should only fail in constrained mode\n if !runtime::is_unconstrained() {\n let field = 2;\n let _: [u8; 8] = field.to_le_radix(3);\n } else {\n panic(f\"radix must be a power of 2\");\n }\n }\n\n #[test]\n fn test_to_le_radix_brillig_3() {\n // this test should only fail in constrained mode\n if runtime::is_unconstrained() {\n let field = 1;\n let out: [u8; 8] = field.to_le_radix(3);\n let mut expected = [0; 8];\n expected[0] = 1;\n assert(out == expected, \"unexpected result\");\n }\n }\n\n #[test(should_fail_with = \"radix must be less than or equal to 256\")]\n fn test_to_le_radix_512() {\n // this test should only fail in constrained mode\n if !runtime::is_unconstrained() {\n let field = 2;\n let _: [u8; 8] = field.to_le_radix(512);\n } else {\n panic(f\"radix must be less than or equal to 256\")\n }\n }\n\n // TODO: Update this test to account for the Brillig restriction that the radix must be less than 512\n //#[test]\n //fn test_to_le_radix_brillig_512() {\n // // this test should only fail in constrained mode\n // if runtime::is_unconstrained() {\n // let field = 1;\n // let out: [u8; 8] = field.to_le_radix(512);\n // let mut expected = [0; 8];\n // expected[0] = 1;\n // assert(out == expected, \"unexpected result\");\n // }\n //}\n\n #[test]\n unconstrained fn test_field_less_than() {\n assert(field_less_than(0, 1));\n assert(field_less_than(0, 0x100));\n assert(field_less_than(0x100, 0 - 1));\n assert(!field_less_than(0 - 1, 0));\n }\n}\n"
|
|
2896
|
-
},
|
|
2897
|
-
"187": {
|
|
2898
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/utils/array/append.nr",
|
|
2899
|
-
"source": "/// Appends two `BoundedVec`s together, returning one that contains all of the elements of the first one followed by all\n/// of the elements of the second one. The resulting `BoundedVec` can have any arbitrary maximum length, but it must be\n/// large enough to fit all of the elements of both the first and second vectors.\npub fn append<T, let A_LEN: u32, let B_LEN: u32, let DST_LEN: u32>(\n a: BoundedVec<T, A_LEN>,\n b: BoundedVec<T, B_LEN>,\n) -> BoundedVec<T, DST_LEN> {\n let mut dst = BoundedVec::new();\n\n dst.extend_from_bounded_vec(a);\n dst.extend_from_bounded_vec(b);\n\n dst\n}\n\nmod test {\n use super::append;\n\n #[test]\n unconstrained fn append_empty_vecs() {\n let a: BoundedVec<_, 3> = BoundedVec::new();\n let b: BoundedVec<_, 14> = BoundedVec::new();\n\n let result: BoundedVec<Field, 5> = append(a, b);\n\n assert_eq(result.len(), 0);\n assert_eq(result.storage(), std::mem::zeroed());\n }\n\n #[test]\n unconstrained fn append_non_empty_vecs() {\n let a: BoundedVec<_, 3> = BoundedVec::from_array([1, 2, 3]);\n let b: BoundedVec<_, 14> = BoundedVec::from_array([4, 5, 6]);\n\n let result: BoundedVec<Field, 8> = append(a, b);\n\n assert_eq(result.len(), 6);\n assert_eq(result.storage(), [1, 2, 3, 4, 5, 6, std::mem::zeroed(), std::mem::zeroed()]);\n }\n\n #[test(should_fail_with = \"out of bounds\")]\n unconstrained fn append_non_empty_vecs_insufficient_max_len() {\n let a: BoundedVec<_, 3> = BoundedVec::from_array([1, 2, 3]);\n let b: BoundedVec<_, 14> = BoundedVec::from_array([4, 5, 6]);\n\n let _: BoundedVec<Field, 5> = append(a, b);\n }\n}\n"
|
|
2900
|
-
},
|
|
2901
|
-
"190": {
|
|
2902
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/utils/array/subarray.nr",
|
|
2903
|
-
"source": "/// Returns `DST_LEN` elements from a source array, starting at `offset`. `DST_LEN` must not be larger than the number\n/// of elements past `offset`.\n///\n/// Examples:\n/// ```\n/// let foo: [Field; 2] = subarray([1, 2, 3, 4, 5], 2);\n/// assert_eq(foo, [3, 4]);\n///\n/// let bar: [Field; 5] = subarray([1, 2, 3, 4, 5], 2); // fails - we can't return 5 elements since only 3 remain\n/// ```\npub fn subarray<T, let SRC_LEN: u32, let DST_LEN: u32>(\n src: [T; SRC_LEN],\n offset: u32,\n) -> [T; DST_LEN] {\n assert(offset + DST_LEN <= SRC_LEN, \"DST_LEN too large for offset\");\n\n let mut dst: [T; DST_LEN] = std::mem::zeroed();\n for i in 0..DST_LEN {\n dst[i] = src[i + offset];\n }\n\n dst\n}\n\nmod test {\n use super::subarray;\n\n #[test]\n unconstrained fn subarray_into_empty() {\n // In all of these cases we're setting DST_LEN to be 0, so we always get back an emtpy array.\n assert_eq(subarray::<Field, _, _>([], 0), []);\n assert_eq(subarray([1, 2, 3, 4, 5], 0), []);\n assert_eq(subarray([1, 2, 3, 4, 5], 2), []);\n }\n\n #[test]\n unconstrained fn subarray_complete() {\n assert_eq(subarray::<Field, _, _>([], 0), []);\n assert_eq(subarray([1, 2, 3, 4, 5], 0), [1, 2, 3, 4, 5]);\n }\n\n #[test]\n unconstrained fn subarray_different_end_sizes() {\n // We implicitly select how many values to read in the size of the return array\n assert_eq(subarray([1, 2, 3, 4, 5], 1), [2, 3, 4, 5]);\n assert_eq(subarray([1, 2, 3, 4, 5], 1), [2, 3, 4]);\n assert_eq(subarray([1, 2, 3, 4, 5], 1), [2, 3]);\n assert_eq(subarray([1, 2, 3, 4, 5], 1), [2]);\n }\n\n #[test(should_fail_with = \"DST_LEN too large for offset\")]\n unconstrained fn subarray_offset_too_large() {\n // With an offset of 1 we can only request up to 4 elements\n let _: [_; 5] = subarray([1, 2, 3, 4, 5], 1);\n }\n\n #[test(should_fail)]\n unconstrained fn subarray_bad_return_value() {\n assert_eq(subarray([1, 2, 3, 4, 5], 1), [3, 3, 4, 5]);\n }\n}\n"
|
|
2904
|
-
},
|
|
2905
|
-
"191": {
|
|
2906
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/utils/array/subbvec.nr",
|
|
2907
|
-
"source": "use crate::utils::array;\n\n/// Returns `DST_MAX_LEN` elements from a source BoundedVec, starting at `offset`. `offset` must not be larger than the\n/// original length, and `DST_LEN` must not be larger than the total number of elements past `offset` (including the\n/// zeroed elements past `len()`).\n///\n/// Only elements at the beginning of the vector can be removed: it is not possible to also remove elements at the end\n/// of the vector by passing a value for `DST_LEN` that is smaller than `len() - offset`.\n///\n/// Examples:\n/// ```\n/// let foo = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n/// assert_eq(subbvec(foo, 2), BoundedVec::<_, 8>::from_array([3, 4, 5]));\n///\n/// let bar: BoundedVec<_, 1> = subbvec(foo, 2); // fails - we can't return just 1 element since 3 remain\n/// let baz: BoundedVec<_, 10> = subbvec(foo, 3); // fails - we can't return 10 elements since only 7 remain\n/// ```\npub fn subbvec<T, let SRC_MAX_LEN: u32, let DST_MAX_LEN: u32>(\n bvec: BoundedVec<T, SRC_MAX_LEN>,\n offset: u32,\n) -> BoundedVec<T, DST_MAX_LEN> {\n // from_parts_unchecked does not verify that the elements past len are zeroed, but that is not an issue in our case\n // because we're constructing the new storage array as a subarray of the original one (which should have zeroed\n // storage past len), guaranteeing correctness. This is because `subarray` does not allow extending arrays past\n // their original length.\n BoundedVec::from_parts_unchecked(array::subarray(bvec.storage(), offset), bvec.len() - offset)\n}\n\nmod test {\n use super::subbvec;\n\n #[test]\n unconstrained fn subbvec_empty() {\n let bvec = BoundedVec::<Field, 0>::from_array([]);\n assert_eq(subbvec(bvec, 0), bvec);\n }\n\n #[test]\n unconstrained fn subbvec_complete() {\n let bvec = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n assert_eq(subbvec(bvec, 0), bvec);\n\n let smaller_capacity = BoundedVec::<_, 5>::from_array([1, 2, 3, 4, 5]);\n assert_eq(subbvec(bvec, 0), smaller_capacity);\n }\n\n #[test]\n unconstrained fn subbvec_partial() {\n let bvec = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n\n assert_eq(subbvec(bvec, 2), BoundedVec::<_, 8>::from_array([3, 4, 5]));\n assert_eq(subbvec(bvec, 2), BoundedVec::<_, 3>::from_array([3, 4, 5]));\n }\n\n #[test]\n unconstrained fn subbvec_into_empty() {\n let bvec: BoundedVec<_, 10> = BoundedVec::from_array([1, 2, 3, 4, 5]);\n assert_eq(subbvec(bvec, 5), BoundedVec::<_, 5>::from_array([]));\n }\n\n #[test(should_fail)]\n unconstrained fn subbvec_offset_past_len() {\n let bvec = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n let _: BoundedVec<_, 1> = subbvec(bvec, 6);\n }\n\n #[test(should_fail)]\n unconstrained fn subbvec_insufficient_dst_len() {\n let bvec = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n\n // We're not providing enough space to hold all of the items inside the original BoundedVec. subbvec can cause\n // for the capacity to reduce, but not the length (other than by len - offset).\n let _: BoundedVec<_, 1> = subbvec(bvec, 2);\n }\n\n #[test(should_fail_with = \"DST_LEN too large for offset\")]\n unconstrained fn subbvec_dst_len_causes_enlarge() {\n let bvec = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n\n // subbvec does not supprt capacity increases\n let _: BoundedVec<_, 11> = subbvec(bvec, 0);\n }\n\n #[test(should_fail_with = \"DST_LEN too large for offset\")]\n unconstrained fn subbvec_dst_len_too_large_for_offset() {\n let bvec = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n\n // This effectively requests a capacity increase, since there'd be just one element plus the 5 empty slots,\n // which is less than 7.\n let _: BoundedVec<_, 7> = subbvec(bvec, 4);\n }\n}\n"
|
|
2908
|
-
},
|
|
2909
|
-
"193": {
|
|
2910
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/utils/conversion/bytes_to_fields.nr",
|
|
2911
|
-
"source": "use std::static_assert;\n\n// These functions are used to facilitate the conversion of log ciphertext between byte and field representations.\n//\n// `bytes_to_fields` uses fixed-size arrays since encryption contexts have compile-time size information.\n// `bytes_from_fields` uses BoundedVec for flexibility in unconstrained contexts where sizes are dynamic.\n//\n// Together they provide bidirectional conversion between bytes and fields when processing encrypted logs.\n\n/// Converts the input bytes into an array of fields. A Field is ~254 bits meaning that each field can store 31 whole\n/// bytes. Use `bytes_from_fields` to obtain the original bytes array.\n///\n/// The input bytes are chunked into chunks of 31 bytes. Each 31-byte chunk is viewed as big-endian, and is converted\n/// into a Field.\n/// For example, [1, 10, 3, ..., 0] (31 bytes) is encoded as [1 * 256^30 + 10 * 256^29 + 3 * 256^28 + ... + 0]\n/// Note: N must be a multiple of 31 bytes\npub fn bytes_to_fields<let N: u32>(bytes: [u8; N]) -> [Field; N / 31] {\n // Assert that N is a multiple of 31\n static_assert(N % 31 == 0, \"N must be a multiple of 31\");\n\n let mut fields = [0; N / 31];\n\n // Since N is a multiple of 31, we can simply process all chunks fully\n for i in 0..N / 31 {\n let mut field = 0;\n for j in 0..31 {\n // Shift the existing value left by 8 bits and add the new byte\n field = field * 256 + bytes[i * 31 + j] as Field;\n }\n fields[i] = field;\n }\n\n fields\n}\n\n/// Converts an input BoundedVec of fields into a BoundedVec of bytes in big-endian order. Arbitrary Field arrays\n/// are not allowed: this is assumed to be an array obtained via `bytes_to_fields`, i.e. one that actually represents\n/// bytes. To convert a Field array into bytes, use `fields_to_bytes`.\n///\n/// Each input field must contain at most 31 bytes (this is constrained to be so).\n/// Each field is converted into 31 big-endian bytes, and the resulting 31-byte chunks are concatenated\n/// back together in the order of the original fields.\npub fn bytes_from_fields<let N: u32>(fields: BoundedVec<Field, N>) -> BoundedVec<u8, N * 31> {\n let mut bytes = BoundedVec::new();\n\n for i in 0..fields.len() {\n let field = fields.get(i);\n\n // We expect that the field contains at most 31 bytes of information.\n field.assert_max_bit_size::<248>();\n\n // Now we can safely convert the field to 31 bytes.\n let field_as_bytes: [u8; 31] = field.to_be_bytes();\n\n for j in 0..31 {\n bytes.push(field_as_bytes[j]);\n }\n }\n\n bytes\n}\n\nmod tests {\n use crate::utils::array::subarray;\n use super::{bytes_from_fields, bytes_to_fields};\n\n #[test]\n unconstrained fn random_bytes_to_fields_and_back(input: [u8; 93]) {\n let fields = bytes_to_fields(input);\n\n // At this point in production, the log flies through the system and we get a BoundedVec on the other end.\n // So we need to convert the field array to a BoundedVec to be able to feed it to the `bytes_from_fields`\n // function.\n let fields_as_bounded_vec = BoundedVec::<_, 6>::from_array(fields);\n\n let bytes_back = bytes_from_fields(fields_as_bounded_vec);\n\n // Compare the original input with the round-tripped result\n assert_eq(bytes_back.len(), input.len());\n assert_eq(subarray(bytes_back.storage(), 0), input);\n }\n\n #[test(should_fail_with = \"N must be a multiple of 31\")]\n unconstrained fn bytes_to_fields_input_length_not_multiple_of_31() {\n // Try to convert 32 bytes (not a multiple of 31) to fields\n let _fields = bytes_to_fields([0; 32]);\n }\n\n}\n"
|
|
2912
|
-
},
|
|
2913
|
-
"194": {
|
|
2914
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/utils/conversion/fields_to_bytes.nr",
|
|
2915
|
-
"source": "// These functions are used to facilitate the conversion of log plaintext represented as fields into bytes and back.\n//\n// `fields_to_bytes` uses fixed-size arrays since encryption contexts have compile-time size information.\n// `fields_from_bytes` uses BoundedVec for flexibility in unconstrained contexts where sizes are dynamic.\n//\n// Together they provide bidirectional conversion between fields and bytes.\n\n/// Converts an input array of fields into a single array of bytes. Use `fields_from_bytes` to obtain the original\n/// field array.\n/// Each field is converted to a 32-byte big-endian array.\n///\n/// For example, if you have a field array [123, 456], it will be converted to a 64-byte array:\n/// [0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,123, // First field (32 bytes)\n/// 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,200] // Second field (32 bytes)\n///\n/// Since a field is ~254 bits, you'll end up with a subtle 2-bit \"gap\" at the big end, every 32 bytes. Be careful\n/// that such a gap doesn't leak information! This could happen if you for example expected the output to be\n/// indistinguishable from random bytes.\npub fn fields_to_bytes<let N: u32>(fields: [Field; N]) -> [u8; 32 * N] {\n let mut bytes = [0; 32 * N];\n\n for i in 0..N {\n let field_as_bytes: [u8; 32] = fields[i].to_be_bytes();\n\n for j in 0..32 {\n bytes[i * 32 + j] = field_as_bytes[j];\n }\n }\n\n bytes\n}\n\n/// Converts an input BoundedVec of bytes into a BoundedVec of fields. Arbitrary byte arrays are not allowed: this\n/// is assumed to be an array obtained via `fields_to_bytes`, i.e. one that actually represents fields. To convert\n/// a byte array into Fields, use `bytes_to_fields`.\n///\n/// The input bytes are chunked into chunks of 32 bytes. Each 32-byte chunk is viewed as big-endian, and is converted\n/// into a Field.\n/// For example, [1, 10, 3, ..., 0] (32 bytes) is encoded as [1 * 256^31 + 10 * 256^30 + 3 * 256^29 + ... + 0]\n/// Note 1: N must be a multiple of 32 bytes\n/// Note 2: The max value check code was taken from std::field::to_be_bytes function.\npub fn fields_from_bytes<let N: u32>(bytes: BoundedVec<u8, N>) -> BoundedVec<Field, N / 32> {\n // Assert that input length is a multiple of 32\n assert(bytes.len() % 32 == 0, \"Input length must be a multiple of 32\");\n\n let mut fields = BoundedVec::new();\n\n let p = std::field::modulus_be_bytes();\n\n // Since input length is a multiple of 32, we can simply process all chunks fully\n for i in 0..bytes.len() / 32 {\n let mut field = 0;\n\n // Process each byte in the 32-byte chunk\n let mut ok = false;\n\n for j in 0..32 {\n let next_byte = bytes.get(i * 32 + j);\n field = field * 256 + next_byte as Field;\n\n if !ok {\n if next_byte != p[j] {\n assert(next_byte < p[j], \"Value does not fit in field\");\n ok = true;\n }\n }\n }\n assert(ok, \"Value does not fit in field\");\n\n fields.push(field);\n }\n\n fields\n}\n\nmod tests {\n use crate::utils::array::subarray;\n use super::{fields_from_bytes, fields_to_bytes};\n\n #[test]\n unconstrained fn random_fields_to_bytes_and_back(input: [Field; 3]) {\n // Convert to bytes\n let bytes = fields_to_bytes(input);\n\n // At this point in production, the log flies through the system and we get a BoundedVec on the other end.\n // So we need to convert the field array to a BoundedVec to be able to feed it to the `fields_from_bytes`\n // function.\n // 113 is an arbitrary max length that is larger than the input length of 96.\n let bytes_as_bounded_vec = BoundedVec::<_, 113>::from_array(bytes);\n\n // Convert back to fields\n let fields_back = fields_from_bytes(bytes_as_bounded_vec);\n\n // Compare the original input with the round-tripped result\n assert_eq(fields_back.len(), input.len());\n assert_eq(subarray(fields_back.storage(), 0), input);\n }\n\n #[test(should_fail_with = \"Input length must be a multiple of 32\")]\n unconstrained fn to_fields_assert() {\n // 143 is an arbitrary max length that is larger than 33\n let input = BoundedVec::<_, 143>::from_array([\n 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24,\n 25, 26, 27, 28, 29, 30, 31, 32, 33,\n ]);\n\n // This should fail since 33 is not a multiple of 32\n let _fields = fields_from_bytes(input);\n }\n\n #[test]\n unconstrained fn fields_from_bytes_max_value() {\n let max_field_as_bytes: [u8; 32] = (-1).to_be_bytes();\n let input = BoundedVec::<_, 32>::from_array(max_field_as_bytes);\n\n let fields = fields_from_bytes(input);\n\n // The result should be a largest value storable in a field (-1 since we are modulo-ing)\n assert_eq(fields.get(0), -1);\n }\n\n // In this test we verify that overflow check works by taking the max allowed value, bumping a random byte\n // and then feeding it to `fields_from_bytes` as input.\n #[test(should_fail_with = \"Value does not fit in field\")]\n unconstrained fn fields_from_bytes_overflow(random_value: u8) {\n let index_of_byte_to_bump = random_value % 32;\n\n // Obtain the byte representation of the maximum field value\n let max_field_value_as_bytes: [u8; 32] = (-1).to_be_bytes();\n\n let byte_to_bump = max_field_value_as_bytes[index_of_byte_to_bump as u32];\n\n // Skip test execution if the selected byte is already at maximum value (255).\n // This is acceptable since we are using fuzz testing to generate many test cases.\n if byte_to_bump != 255 {\n let mut input = BoundedVec::<_, 32>::from_array(max_field_value_as_bytes);\n\n // Increment the selected byte to exceed the field's maximum value\n input.set(index_of_byte_to_bump as u32, byte_to_bump + 1);\n\n // Attempt the conversion, which should fail due to the value exceeding the field's capacity\n let _fields = fields_from_bytes(input);\n }\n }\n\n}\n"
|
|
2916
|
-
},
|
|
2917
|
-
"196": {
|
|
2918
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/utils/field.nr",
|
|
2919
|
-
"source": "use std::option::Option;\n\nglobal KNOWN_NON_RESIDUE: Field = 5; // This is a non-residue in Noir's native Field.\n\nglobal C1: u32 = 28;\nglobal C3: Field = 40770029410420498293352137776570907027550720424234931066070132305055;\nglobal C5: Field = 19103219067921713944291392827692070036145651957329286315305642004821462161904;\n\n// Power function of two Field arguments of arbitrary size.\n// Adapted from std::field::pow_32.\npub fn pow(x: Field, y: Field) -> Field {\n let mut r = 1 as Field;\n let b: [u1; 254] = y.to_le_bits();\n\n for i in 0..254 {\n r *= r;\n r *= (b[254 - 1 - i] as Field) * x + (1 - b[254 - 1 - i] as Field);\n }\n\n r\n}\n\n// Boolean indicating whether Field element is a square, i.e. whether there exists a y in Field s.t. x = y*y.\nunconstrained fn is_square(x: Field) -> bool {\n let v = pow(x, -1 / 2);\n v * (v - 1) == 0\n}\n\n// Tonelli-Shanks algorithm for computing the square root of a Field element.\n// Requires C1 = max{c: 2^c divides (p-1)}, where p is the order of Field\n// as well as C3 = (C2 - 1)/2, where C2 = (p-1)/(2^c1),\n// and C5 = ZETA^C2, where ZETA is a non-square element of Field.\n// These are pre-computed above as globals.\nunconstrained fn tonelli_shanks_sqrt(x: Field) -> Field {\n let mut z = pow(x, C3);\n let mut t = z * z * x;\n z *= x;\n let mut b = t;\n let mut c = C5;\n\n for i in 0..(C1 - 1) {\n for _j in 1..(C1 - i - 1) {\n b *= b;\n }\n\n z *= if b == 1 { 1 } else { c };\n\n c *= c;\n\n t *= if b == 1 { 1 } else { c };\n\n b = t;\n }\n\n z\n}\n\n// NB: this doesn't return an option, because in the case of there _not_ being a square root, we still want to return a field element that allows us to then assert in the _constrained_ sqrt function that there is no sqrt.\npub unconstrained fn __sqrt(x: Field) -> (bool, Field) {\n let is_sq = is_square(x);\n if is_sq {\n let sqrt = tonelli_shanks_sqrt(x);\n (true, sqrt)\n } else {\n // Demonstrate that x is not a square (a.k.a. a \"quadratic non-residue\").\n // Facts:\n // The Legendre symbol (\"LS\") of x, is x^((p-1)/2) (mod p).\n // - If x is a square, LS(x) = 1\n // - If x is not a square, LS(x) = -1\n // - If x = 0, LS(x) = 0.\n //\n // Hence:\n // sq * sq = sq // 1 * 1 = 1\n // non-sq * non-sq = sq // -1 * -1 = 1\n // sq * non-sq = non-sq // -1 * 1 = -1\n //\n // See: https://en.wikipedia.org/wiki/Legendre_symbol\n let demo_x_not_square = x * KNOWN_NON_RESIDUE;\n let not_sqrt = tonelli_shanks_sqrt(demo_x_not_square);\n (false, not_sqrt)\n }\n}\n\n// Returns (false, 0) if there is no square root.\n// Returns (true, sqrt) if there is a square root.\npub fn sqrt(x: Field) -> Option<Field> {\n // Safety: if the hint returns the square root of x, then we simply square it\n // check the result equals x. If x is not square, we return a value that\n // enables us to prove that fact (see the `else` clause below).\n let (is_sq, maybe_sqrt) = unsafe { __sqrt(x) };\n\n if is_sq {\n let sqrt = maybe_sqrt;\n validate_sqrt_hint(x, sqrt);\n Option::some(sqrt)\n } else {\n let not_sqrt_hint = maybe_sqrt;\n validate_not_sqrt_hint(x, not_sqrt_hint);\n Option::none()\n }\n}\n\nfn validate_sqrt_hint(x: Field, hint: Field) {\n assert(hint * hint == x, f\"The claimed_sqrt {hint} is not the sqrt of x {x}\");\n}\n\nfn validate_not_sqrt_hint(x: Field, hint: Field) {\n // We need this assertion, because x = 0 would pass the other assertions in this\n // function, and we don't want people to be able to prove that 0 is not square!\n assert(x != 0, \"0 has a square root; you cannot claim it is not square\");\n // Demonstrate that x is not a square (a.k.a. a \"quadratic non-residue\").\n //\n // Facts:\n // The Legendre symbol (\"LS\") of x, is x^((p-1)/2) (mod p).\n // - If x is a square, LS(x) = 1\n // - If x is not a square, LS(x) = -1\n // - If x = 0, LS(x) = 0.\n //\n // Hence:\n // 1. sq * sq = sq // 1 * 1 = 1\n // 2. non-sq * non-sq = sq // -1 * -1 = 1\n // 3. sq * non-sq = non-sq // -1 * 1 = -1\n //\n // See: https://en.wikipedia.org/wiki/Legendre_symbol\n //\n // We want to demonstrate that this below multiplication falls under bullet-point (2):\n let demo_x_not_square = x * KNOWN_NON_RESIDUE;\n // I.e. we want to demonstrate that `demo_x_not_square` has Legendre symbol 1\n // (i.e. that it is a square), so we prove that it is square below.\n // Why do we want to prove that it has LS 1?\n // Well, since it was computed with a known-non-residue, its squareness implies we're\n // in case 2 (something multiplied by a known-non-residue yielding a result which\n // has a LS of 1), which implies that x must be a non-square. The unconstrained\n // function gave us the sqrt of demo_x_not_square, so all we need to do is\n // assert its squareness:\n assert(\n hint * hint == demo_x_not_square,\n f\"The hint {hint} does not demonstrate that {x} is not a square\",\n );\n}\n\n#[test]\nfn test_sqrt() {\n let x = 9;\n let maybe_sqrt = sqrt(x);\n assert(maybe_sqrt.is_some());\n let sqrt = maybe_sqrt.unwrap_unchecked();\n assert((sqrt == 3) | (sqrt == -3));\n}\n\n#[test]\nfn test_non_square() {\n let x = 5;\n let maybe_sqrt = sqrt(x);\n assert(maybe_sqrt.is_none());\n}\n\n#[test]\nunconstrained fn test_known_non_residue_is_actually_a_non_residue_in_the_field() {\n assert(!is_square(KNOWN_NON_RESIDUE));\n}\n\n#[test]\nfn test_sqrt_0() {\n let x = 0;\n let sqrt = sqrt(x).unwrap();\n assert(sqrt == 0);\n}\n\n#[test]\nfn test_sqrt_1() {\n let x = 1;\n let sqrt = sqrt(x).unwrap();\n assert((sqrt == 1) | (sqrt == -1));\n}\n\n#[test(should_fail_with = \"The claimed_sqrt 0x04 is not the sqrt of x 0x09\")]\nfn test_bad_sqrt_hint_fails() {\n validate_sqrt_hint(9, 4);\n}\n\n#[test(should_fail_with = \"The hint 0x04 does not demonstrate that 0x0a is not a square\")]\nfn test_bad_not_sqrt_hint_fails() {\n validate_not_sqrt_hint(10, 4);\n}\n\n#[test(should_fail_with = \"0 has a square root; you cannot claim it is not square\")]\nfn test_0_not_sqrt_hint_fails() {\n validate_not_sqrt_hint(0, 0);\n}\n\n#[test]\nunconstrained fn test_is_square() {\n assert(is_square(25));\n}\n\n#[test]\nunconstrained fn test_is_not_square() {\n assert(!is_square(10));\n}\n"
|
|
2920
|
-
},
|
|
2921
|
-
"198": {
|
|
2922
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/utils/point.nr",
|
|
2923
|
-
"source": "use crate::utils::field::sqrt;\nuse dep::protocol_types::point::Point;\n\n// I am storing the modulus minus 1 divided by 2 here because full modulus would throw \"String literal too large\" error\n// Full modulus is 21888242871839275222246405745257275088548364400416034343698204186575808495617\nglobal BN254_FR_MODULUS_DIV_2: Field =\n 10944121435919637611123202872628637544274182200208017171849102093287904247808;\n\n/// Converts a point to a byte array.\n///\n/// We don't serialize the point at infinity flag because this function is used in situations where we do not want\n/// to waste the extra byte (encrypted log).\npub fn point_to_bytes(p: Point) -> [u8; 32] {\n // Note that there is 1 more free bit in the 32 bytes (254 bits currently occupied by the x coordinate, 1 bit for\n // the \"sign\") so it's possible to use that last bit as an \"is_infinite\" flag if desired in the future.\n assert(!p.is_infinite, \"Cannot serialize point at infinity as bytes.\");\n\n let mut result: [u8; 32] = p.x.to_be_bytes();\n\n if get_sign_of_point(p) {\n // y is <= (modulus - 1) / 2 so we set the sign bit to 1\n // Here we leverage that field fits into 254 bits (log2(Fr.MODULUS) < 254) and given that we serialize Fr to 32\n // bytes and we use big-endian the 2 most significant bits are never populated. Hence we can use one of\n // the bits as a sign bit.\n result[0] += 128;\n }\n\n result\n}\n\n/**\n * Returns: true if p.y <= MOD_DIV_2, else false.\n */\npub fn get_sign_of_point(p: Point) -> bool {\n // We store only a \"sign\" of the y coordinate because the rest can be derived from the x coordinate. To get\n // the sign we check if the y coordinate is less or equal than the curve's order minus 1 divided by 2.\n // Ideally we'd do `y <= MOD_DIV_2`, but there's no `lte` function, so instead we do `!(y > MOD_DIV_2)`, which is\n // equivalent, and then rewrite that as `!(MOD_DIV_2 < y)`, since we also have no `gt` function.\n !BN254_FR_MODULUS_DIV_2.lt(p.y)\n}\n\npub fn point_from_x_coord(x: Field) -> Point {\n // y ^ 2 = x ^ 3 - 17\n let rhs = x * x * x - 17;\n let y = sqrt(rhs).unwrap();\n Point { x, y, is_infinite: false }\n}\n\n/// Uses the x coordinate and sign flag (+/-) to reconstruct the point.\n/// The y coordinate can be derived from the x coordinate and the \"sign\" flag by solving the grumpkin curve\n/// equation for y.\n/// @param x - The x coordinate of the point\n/// @param sign - The \"sign\" of the y coordinate - determines whether y <= (Fr.MODULUS - 1) / 2\npub fn point_from_x_coord_and_sign(x: Field, sign: bool) -> Point {\n // y ^ 2 = x ^ 3 - 17\n let rhs = x * x * x - 17;\n let y = sqrt(rhs).unwrap();\n\n // If y > MOD_DIV_2 and we want positive sign (or vice versa), negate y\n let y_is_positive = !BN254_FR_MODULUS_DIV_2.lt(y);\n let final_y = if y_is_positive == sign { y } else { -y };\n\n Point { x, y: final_y, is_infinite: false }\n}\n\nmod test {\n use crate::utils::point::{point_from_x_coord_and_sign, point_to_bytes};\n use dep::protocol_types::point::Point;\n\n #[test]\n unconstrained fn test_point_to_bytes_positive_sign() {\n let p = Point {\n x: 0x1af41f5de96446dc3776a1eb2d98bb956b7acd9979a67854bec6fa7c2973bd73,\n y: 0x07fc22c7f2c7057571f137fe46ea9c95114282bc95d37d71ec4bfb88de457d4a,\n is_infinite: false,\n };\n\n let compressed_point = point_to_bytes(p);\n\n let expected_compressed_point_positive_sign = [\n 154, 244, 31, 93, 233, 100, 70, 220, 55, 118, 161, 235, 45, 152, 187, 149, 107, 122,\n 205, 153, 121, 166, 120, 84, 190, 198, 250, 124, 41, 115, 189, 115,\n ];\n assert_eq(expected_compressed_point_positive_sign, compressed_point);\n }\n\n #[test]\n unconstrained fn test_point_to_bytes_negative_sign() {\n let p = Point {\n x: 0x247371652e55dd74c9af8dbe9fb44931ba29a9229994384bd7077796c14ee2b5,\n y: 0x26441aec112e1ae4cee374f42556932001507ad46e255ffb27369c7e3766e5c0,\n is_infinite: false,\n };\n\n let compressed_point = point_to_bytes(p);\n\n let expected_compressed_point_negative_sign = [\n 36, 115, 113, 101, 46, 85, 221, 116, 201, 175, 141, 190, 159, 180, 73, 49, 186, 41, 169,\n 34, 153, 148, 56, 75, 215, 7, 119, 150, 193, 78, 226, 181,\n ];\n\n assert_eq(expected_compressed_point_negative_sign, compressed_point);\n }\n\n #[test]\n unconstrained fn test_point_from_x_coord_and_sign() {\n // Test positive y coordinate\n let x = 0x1af41f5de96446dc3776a1eb2d98bb956b7acd9979a67854bec6fa7c2973bd73;\n let sign = true;\n let p = point_from_x_coord_and_sign(x, sign);\n\n assert_eq(p.x, x);\n assert_eq(p.y, 0x07fc22c7f2c7057571f137fe46ea9c95114282bc95d37d71ec4bfb88de457d4a);\n assert_eq(p.is_infinite, false);\n\n // Test negative y coordinate\n let x2 = 0x247371652e55dd74c9af8dbe9fb44931ba29a9229994384bd7077796c14ee2b5;\n let sign2 = false;\n let p2 = point_from_x_coord_and_sign(x2, sign2);\n\n assert_eq(p2.x, x2);\n assert_eq(p2.y, 0x26441aec112e1ae4cee374f42556932001507ad46e255ffb27369c7e3766e5c0);\n assert_eq(p2.is_infinite, false);\n }\n}\n"
|
|
2924
|
-
},
|
|
2925
2575
|
"209": {
|
|
2926
2576
|
"path": "/home/aztec-dev/nargo/github.com/noir-lang/poseidon/v0.1.0/src/poseidon2.nr",
|
|
2927
2577
|
"source": "use std::default::Default;\nuse std::hash::Hasher;\n\ncomptime global RATE: u32 = 3;\n\npub struct Poseidon2 {\n cache: [Field; 3],\n state: [Field; 4],\n cache_size: u32,\n squeeze_mode: bool, // 0 => absorb, 1 => squeeze\n}\n\nimpl Poseidon2 {\n #[no_predicates]\n pub fn hash<let N: u32>(input: [Field; N], message_size: u32) -> Field {\n Poseidon2::hash_internal(input, message_size, message_size != N)\n }\n\n pub(crate) fn new(iv: Field) -> Poseidon2 {\n let mut result =\n Poseidon2 { cache: [0; 3], state: [0; 4], cache_size: 0, squeeze_mode: false };\n result.state[RATE] = iv;\n result\n }\n\n fn perform_duplex(&mut self) {\n // add the cache into sponge state\n for i in 0..RATE {\n // We effectively zero-pad the cache by only adding to the state\n // cache that is less than the specified `cache_size`\n if i < self.cache_size {\n self.state[i] += self.cache[i];\n }\n }\n self.state = crate::poseidon2_permutation(self.state, 4);\n }\n\n fn absorb(&mut self, input: Field) {\n assert(!self.squeeze_mode);\n if self.cache_size == RATE {\n // If we're absorbing, and the cache is full, apply the sponge permutation to compress the cache\n self.perform_duplex();\n self.cache[0] = input;\n self.cache_size = 1;\n } else {\n // If we're absorbing, and the cache is not full, add the input into the cache\n self.cache[self.cache_size] = input;\n self.cache_size += 1;\n }\n }\n\n fn squeeze(&mut self) -> Field {\n assert(!self.squeeze_mode);\n // If we're in absorb mode, apply sponge permutation to compress the cache.\n self.perform_duplex();\n self.squeeze_mode = true;\n\n // Pop one item off the top of the permutation and return it.\n self.state[0]\n }\n\n fn hash_internal<let N: u32>(\n input: [Field; N],\n in_len: u32,\n is_variable_length: bool,\n ) -> Field {\n let two_pow_64 = 18446744073709551616;\n let iv: Field = (in_len as Field) * two_pow_64;\n let mut sponge = Poseidon2::new(iv);\n for i in 0..input.len() {\n if i < in_len {\n sponge.absorb(input[i]);\n }\n }\n\n // In the case where the hash preimage is variable-length, we append `1` to the end of the input, to distinguish\n // from fixed-length hashes. (the combination of this additional field element + the hash IV ensures\n // fixed-length and variable-length hashes do not collide)\n if is_variable_length {\n sponge.absorb(1);\n }\n sponge.squeeze()\n }\n}\n\npub struct Poseidon2Hasher {\n _state: [Field],\n}\n\nimpl Hasher for Poseidon2Hasher {\n fn finish(self) -> Field {\n let iv: Field = (self._state.len() as Field) * 18446744073709551616; // iv = (self._state.len() << 64)\n let mut sponge = Poseidon2::new(iv);\n for i in 0..self._state.len() {\n sponge.absorb(self._state[i]);\n }\n sponge.squeeze()\n }\n\n fn write(&mut self, input: Field) {\n self._state = self._state.push_back(input);\n }\n}\n\nimpl Default for Poseidon2Hasher {\n fn default() -> Self {\n Poseidon2Hasher { _state: &[] }\n }\n}\n"
|
|
2928
2578
|
},
|
|
2929
|
-
"226": {
|
|
2930
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/abis/event_selector.nr",
|
|
2931
|
-
"source": "use crate::traits::{Deserialize, Empty, FromField, Serialize, ToField};\n\npub struct EventSelector {\n // 1st 4-bytes (big-endian leftmost) of abi-encoding of an event.\n inner: u32,\n}\n\nimpl Eq for EventSelector {\n fn eq(self, other: EventSelector) -> bool {\n other.inner == self.inner\n }\n}\n\nimpl Serialize<1> for EventSelector {\n fn serialize(self: Self) -> [Field; 1] {\n [self.inner as Field]\n }\n}\n\nimpl Deserialize<1> for EventSelector {\n fn deserialize(fields: [Field; 1]) -> Self {\n Self { inner: fields[0] as u32 }\n }\n}\n\nimpl FromField for EventSelector {\n fn from_field(field: Field) -> Self {\n Self { inner: field as u32 }\n }\n}\n\nimpl ToField for EventSelector {\n fn to_field(self) -> Field {\n self.inner as Field\n }\n}\n\nimpl Empty for EventSelector {\n fn empty() -> Self {\n Self { inner: 0 as u32 }\n }\n}\n\nimpl EventSelector {\n pub fn from_u32(value: u32) -> Self {\n Self { inner: value }\n }\n\n pub fn from_signature<let N: u32>(signature: str<N>) -> Self {\n let bytes = signature.as_bytes();\n let hash = crate::hash::poseidon2_hash_bytes(bytes);\n\n // `hash` is automatically truncated to fit within 32 bits.\n EventSelector::from_field(hash)\n }\n\n pub fn zero() -> Self {\n Self { inner: 0 }\n }\n}\n"
|
|
2932
|
-
},
|
|
2933
2579
|
"271": {
|
|
2934
2580
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/address/aztec_address.nr",
|
|
2935
2581
|
"source": "use crate::{\n address::{\n partial_address::PartialAddress, salted_initialization_hash::SaltedInitializationHash,\n },\n constants::{\n AZTEC_ADDRESS_LENGTH, GENERATOR_INDEX__CONTRACT_ADDRESS_V1, MAX_FIELD_VALUE,\n MAX_PROTOCOL_CONTRACTS,\n },\n contract_class_id::ContractClassId,\n hash::poseidon2_hash_with_separator,\n public_keys::{IvpkM, NpkM, OvpkM, PublicKeys, ToPoint, TpkM},\n traits::{Deserialize, Empty, FromField, Packable, Serialize, ToField},\n utils::field::{pow, sqrt},\n};\n\n// We do below because `use crate::point::Point;` does not work\nuse dep::std::embedded_curve_ops::EmbeddedCurvePoint as Point;\n\nuse crate::public_keys::AddressPoint;\nuse std::{\n embedded_curve_ops::{EmbeddedCurveScalar, fixed_base_scalar_mul as derive_public_key},\n ops::Add,\n};\n\n// Aztec address\npub struct AztecAddress {\n pub inner: Field,\n}\n\nimpl Eq for AztecAddress {\n fn eq(self, other: Self) -> bool {\n self.to_field() == other.to_field()\n }\n}\n\nimpl Empty for AztecAddress {\n fn empty() -> Self {\n Self { inner: 0 }\n }\n}\n\nimpl ToField for AztecAddress {\n fn to_field(self) -> Field {\n self.inner\n }\n}\n\nimpl FromField for AztecAddress {\n fn from_field(value: Field) -> AztecAddress {\n AztecAddress { inner: value }\n }\n}\n\nimpl Serialize<AZTEC_ADDRESS_LENGTH> for AztecAddress {\n fn serialize(self: Self) -> [Field; AZTEC_ADDRESS_LENGTH] {\n [self.to_field()]\n }\n}\n\nimpl Deserialize<AZTEC_ADDRESS_LENGTH> for AztecAddress {\n fn deserialize(fields: [Field; AZTEC_ADDRESS_LENGTH]) -> Self {\n FromField::from_field(fields[0])\n }\n}\n\n/// We implement the Packable trait for AztecAddress because it can be stored in contract's storage (and there\n/// the implementation of Packable is required).\nimpl Packable<AZTEC_ADDRESS_LENGTH> for AztecAddress {\n fn pack(self) -> [Field; AZTEC_ADDRESS_LENGTH] {\n self.serialize()\n }\n\n fn unpack(fields: [Field; AZTEC_ADDRESS_LENGTH]) -> Self {\n Self::deserialize(fields)\n }\n}\n\nimpl AztecAddress {\n pub fn zero() -> Self {\n Self { inner: 0 }\n }\n\n pub fn to_address_point(self) -> AddressPoint {\n // We compute the address point by taking our address, setting it to x, and then solving for y in the\n // equation which defines our bn curve:\n // y^2 = x^3 - 17; x = address\n let x = self.inner;\n let y_squared = pow(x, 3) - 17;\n\n // TODO (#8970): Handle cases where we cannot recover a point from an address\n let mut y = sqrt(y_squared);\n\n // If we get a negative y coordinate (any y where y > MAX_FIELD_VALUE / 2), we pin it to the\n // positive one (any value where y <= MAX_FIELD_VALUE / 2) by subtracting it from the Field modulus\n // note: The field modulus is MAX_FIELD_VALUE + 1\n if (!(y.lt(MAX_FIELD_VALUE / 2) | y.eq(MAX_FIELD_VALUE / 2))) {\n y = (MAX_FIELD_VALUE + 1) - y;\n }\n\n AddressPoint { inner: Point { x: self.inner, y, is_infinite: false } }\n }\n\n pub fn compute(public_keys: PublicKeys, partial_address: PartialAddress) -> AztecAddress {\n let public_keys_hash = public_keys.hash();\n\n let pre_address = poseidon2_hash_with_separator(\n [public_keys_hash.to_field(), partial_address.to_field()],\n GENERATOR_INDEX__CONTRACT_ADDRESS_V1,\n );\n\n let address_point = derive_public_key(EmbeddedCurveScalar::from_field(pre_address)).add(\n public_keys.ivpk_m.to_point(),\n );\n\n // Note that our address is only the x-coordinate of the full address_point. This is okay because when people want to encrypt something and send it to us\n // they can recover our full point using the x-coordinate (our address itself). To do this, they recompute the y-coordinate according to the equation y^2 = x^3 - 17.\n // When they do this, they may get a positive y-coordinate (a value that is less than or equal to MAX_FIELD_VALUE / 2) or\n // a negative y-coordinate (a value that is more than MAX_FIELD_VALUE), and we cannot dictate which one they get and hence the recovered point may sometimes be different than the one\n // our secret can decrypt. Regardless though, they should and will always encrypt using point with the positive y-coordinate by convention.\n // This ensures that everyone encrypts to the same point given an arbitrary x-coordinate (address). This is allowed because even though our original point may not have a positive y-coordinate,\n // with our original secret, we will be able to derive the secret to the point with the flipped (and now positive) y-coordinate that everyone encrypts to.\n AztecAddress::from_field(address_point.x)\n }\n\n pub fn compute_from_class_id(\n contract_class_id: ContractClassId,\n salted_initialization_hash: SaltedInitializationHash,\n public_keys: PublicKeys,\n ) -> Self {\n let partial_address = PartialAddress::compute_from_salted_initialization_hash(\n contract_class_id,\n salted_initialization_hash,\n );\n\n AztecAddress::compute(public_keys, partial_address)\n }\n\n pub fn is_protocol_contract(self) -> bool {\n self.inner.lt(MAX_PROTOCOL_CONTRACTS as Field)\n }\n\n pub fn is_zero(self) -> bool {\n self.inner == 0\n }\n\n pub fn assert_is_zero(self) {\n assert(self.to_field() == 0);\n }\n}\n\n#[test]\nfn compute_address_from_partial_and_pub_keys() {\n let public_keys = PublicKeys {\n npk_m: NpkM {\n inner: Point {\n x: 0x22f7fcddfa3ce3e8f0cc8e82d7b94cdd740afa3e77f8e4a63ea78a239432dcab,\n y: 0x0471657de2b6216ade6c506d28fbc22ba8b8ed95c871ad9f3e3984e90d9723a7,\n is_infinite: false,\n },\n },\n ivpk_m: IvpkM {\n inner: Point {\n x: 0x111223493147f6785514b1c195bb37a2589f22a6596d30bb2bb145fdc9ca8f1e,\n y: 0x273bbffd678edce8fe30e0deafc4f66d58357c06fd4a820285294b9746c3be95,\n is_infinite: false,\n },\n },\n ovpk_m: OvpkM {\n inner: Point {\n x: 0x09115c96e962322ffed6522f57194627136b8d03ac7469109707f5e44190c484,\n y: 0x0c49773308a13d740a7f0d4f0e6163b02c5a408b6f965856b6a491002d073d5b,\n is_infinite: false,\n },\n },\n tpk_m: TpkM {\n inner: Point {\n x: 0x00d3d81beb009873eb7116327cf47c612d5758ef083d4fda78e9b63980b2a762,\n y: 0x2f567d22d2b02fe1f4ad42db9d58a36afd1983e7e2909d1cab61cafedad6193a,\n is_infinite: false,\n },\n },\n };\n\n let partial_address = PartialAddress::from_field(\n 0x0a7c585381b10f4666044266a02405bf6e01fa564c8517d4ad5823493abd31de,\n );\n\n let address = AztecAddress::compute(public_keys, partial_address);\n\n // The following value was generated by `derivation.test.ts`.\n // --> Run the test with AZTEC_GENERATE_TEST_DATA=1 flag to update test data.\n let expected_computed_address_from_partial_and_pubkeys =\n 0x24e4646f58b9fbe7d38e317db8d5636c423fbbdfbe119fc190fe9c64747e0c62;\n assert(address.to_field() == expected_computed_address_from_partial_and_pubkeys);\n}\n\n#[test]\nfn compute_preaddress_from_partial_and_pub_keys() {\n let pre_address = poseidon2_hash_with_separator([1, 2], GENERATOR_INDEX__CONTRACT_ADDRESS_V1);\n let expected_computed_preaddress_from_partial_and_pubkey =\n 0x23ce9be3fa3c846b0f9245cc796902e731d04f086e8a42473bb29e405fc98075;\n assert(pre_address == expected_computed_preaddress_from_partial_and_pubkey);\n}\n\n#[test]\nfn from_field_to_field() {\n let address = AztecAddress { inner: 37 };\n assert_eq(FromField::from_field(address.to_field()), address);\n}\n\n#[test]\nfn serde() {\n let address = AztecAddress { inner: 37 };\n assert_eq(Deserialize::deserialize(address.serialize()), address);\n}\n"
|
|
2936
2582
|
},
|
|
2937
|
-
"288": {
|
|
2938
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/debug_log.nr",
|
|
2939
|
-
"source": "/// Utility function to console.log data in the acir simulator.\n/// Example:\n/// debug_log(\"blah blah this is a debug string\");\npub fn debug_log<let N: u32>(msg: str<N>) {\n debug_log_format(msg, []);\n}\n\n/// Utility function to console.log data in the acir simulator. This variant receives a format string in which the\n/// `${k}` tokens will be replaced with the k-eth value in the `args` array.\n/// Examples:\n/// debug_log_format(\"get_2(slot:{0}) =>\\n\\t0:{1}\\n\\t1:{2}\", [storage_slot, note0_hash, note1_hash]);\n/// debug_log_format(\"whole array: {}\", [e1, e2, e3, e4]);\npub fn debug_log_format<let M: u32, let N: u32>(msg: str<M>, args: [Field; N]) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe\n // to call.\n unsafe { debug_log_oracle_wrapper(msg, args) };\n}\n\npub unconstrained fn debug_log_oracle_wrapper<let M: u32, let N: u32>(\n msg: str<M>,\n args: [Field; N],\n) {\n debug_log_oracle(msg, args.as_slice());\n}\n\n// WARNING: sometimes when using debug logs the ACVM errors with: `thrown: \"solver opcode resolution error: cannot solve opcode: expression has too many unknowns x155\"`\n#[oracle(debugLog)]\nunconstrained fn debug_log_oracle<let M: u32>(_msg: str<M>, args: [Field]) {}\n"
|
|
2940
|
-
},
|
|
2941
2583
|
"289": {
|
|
2942
2584
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/hash.nr",
|
|
2943
2585
|
"source": "use crate::{\n abis::{\n contract_class_function_leaf_preimage::ContractClassFunctionLeafPreimage,\n contract_class_log::ContractClassLog,\n function_selector::FunctionSelector,\n note_hash::ScopedNoteHash,\n nullifier::ScopedNullifier,\n private_log::{PrivateLog, PrivateLogData},\n side_effect::{OrderedValue, scoped::Scoped},\n },\n address::{AztecAddress, EthAddress},\n constants::{\n CONTRACT_CLASS_LOG_SIZE_IN_FIELDS, FUNCTION_TREE_HEIGHT, GENERATOR_INDEX__NOTE_HASH_NONCE,\n GENERATOR_INDEX__OUTER_NULLIFIER, GENERATOR_INDEX__SILOED_NOTE_HASH,\n GENERATOR_INDEX__UNIQUE_NOTE_HASH, TWO_POW_64,\n },\n merkle_tree::root::root_from_sibling_path,\n messaging::l2_to_l1_message::{L2ToL1Message, ScopedL2ToL1Message},\n poseidon2::Poseidon2Sponge,\n traits::{FromField, Hash, ToField},\n utils::{arrays::array_concat, field::{field_from_bytes, field_from_bytes_32_trunc}},\n};\n\npub fn sha256_to_field<let N: u32>(bytes_to_hash: [u8; N]) -> Field {\n let sha256_hashed = sha256::digest(bytes_to_hash);\n let hash_in_a_field = field_from_bytes_32_trunc(sha256_hashed);\n\n hash_in_a_field\n}\n\npub fn private_functions_root_from_siblings(\n selector: FunctionSelector,\n vk_hash: Field,\n function_leaf_index: Field,\n function_leaf_sibling_path: [Field; FUNCTION_TREE_HEIGHT],\n) -> Field {\n let function_leaf_preimage = ContractClassFunctionLeafPreimage { selector, vk_hash };\n let function_leaf = function_leaf_preimage.hash();\n root_from_sibling_path(\n function_leaf,\n function_leaf_index,\n function_leaf_sibling_path,\n )\n}\n\npub fn compute_note_hash_nonce(first_nullifier_in_tx: Field, note_index_in_tx: u32) -> Field {\n // Hashing the first nullifier with note index in tx is guaranteed to be unique (because all nullifiers are also\n // unique).\n poseidon2_hash_with_separator(\n [first_nullifier_in_tx, note_index_in_tx as Field],\n GENERATOR_INDEX__NOTE_HASH_NONCE,\n )\n}\n\npub fn compute_unique_note_hash(nonce: Field, siloed_note_hash: Field) -> Field {\n let inputs = [nonce, siloed_note_hash];\n poseidon2_hash_with_separator(inputs, GENERATOR_INDEX__UNIQUE_NOTE_HASH)\n}\n\npub fn compute_siloed_note_hash(app: AztecAddress, note_hash: Field) -> Field {\n poseidon2_hash_with_separator(\n [app.to_field(), note_hash],\n GENERATOR_INDEX__SILOED_NOTE_HASH,\n )\n}\n\n/// Computes unique note hashes from siloed note hashes\npub fn compute_unique_siloed_note_hash(\n siloed_note_hash: Field,\n first_nullifier: Field,\n note_index_in_tx: u32,\n) -> Field {\n if siloed_note_hash == 0 {\n 0\n } else {\n let nonce = compute_note_hash_nonce(first_nullifier, note_index_in_tx);\n compute_unique_note_hash(nonce, siloed_note_hash)\n }\n}\n\n/// Siloing in the context of Aztec refers to the process of hashing a note hash with a contract address (this way\n/// the note hash is scoped to a specific contract). This is used to prevent intermingling of notes between contracts.\npub fn silo_note_hash(note_hash: ScopedNoteHash) -> Field {\n if note_hash.contract_address.is_zero() {\n 0\n } else {\n compute_siloed_note_hash(note_hash.contract_address, note_hash.value())\n }\n}\n\npub fn compute_siloed_nullifier(app: AztecAddress, nullifier: Field) -> Field {\n poseidon2_hash_with_separator(\n [app.to_field(), nullifier],\n GENERATOR_INDEX__OUTER_NULLIFIER,\n )\n}\n\npub fn silo_nullifier(nullifier: ScopedNullifier) -> Field {\n if nullifier.contract_address.is_zero() {\n nullifier.value() // Return value instead of 0 because the first nullifier's contract address is zero.\n } else {\n compute_siloed_nullifier(nullifier.contract_address, nullifier.value())\n }\n}\n\npub fn compute_siloed_private_log_field(contract_address: AztecAddress, field: Field) -> Field {\n poseidon2_hash([contract_address.to_field(), field])\n}\n\npub fn silo_private_log(private_log: Scoped<PrivateLogData>) -> PrivateLog {\n if private_log.contract_address.is_zero() {\n private_log.inner.log\n } else {\n let mut fields = private_log.inner.log.fields;\n fields[0] = compute_siloed_private_log_field(private_log.contract_address, fields[0]);\n PrivateLog::new(fields, private_log.inner.log.length)\n }\n}\n\npub fn compute_siloed_contract_class_log_field(\n contract_address: AztecAddress,\n first_field: Field,\n) -> Field {\n poseidon2_hash([contract_address.to_field(), first_field])\n}\n\npub fn silo_contract_class_log(contract_class_log: ContractClassLog) -> ContractClassLog {\n if contract_class_log.contract_address.is_zero() {\n contract_class_log\n } else {\n let mut log = contract_class_log;\n log.log.fields[0] = compute_siloed_contract_class_log_field(\n contract_class_log.contract_address,\n log.log.fields[0],\n );\n log\n }\n}\n\npub fn compute_contract_class_log_hash(log: [Field; CONTRACT_CLASS_LOG_SIZE_IN_FIELDS]) -> Field {\n poseidon2_hash(log)\n}\n\npub fn merkle_hash(left: Field, right: Field) -> Field {\n poseidon2_hash([left, right])\n}\n\npub fn compute_l2_to_l1_hash(\n contract_address: AztecAddress,\n recipient: EthAddress,\n content: Field,\n rollup_version_id: Field,\n chain_id: Field,\n) -> Field {\n let mut bytes: [u8; 160] = std::mem::zeroed();\n\n let inputs =\n [contract_address.to_field(), rollup_version_id, recipient.to_field(), chain_id, content];\n for i in 0..5 {\n // TODO are bytes be in fr.to_buffer() ?\n let item_bytes: [u8; 32] = inputs[i].to_be_bytes();\n for j in 0..32 {\n bytes[32 * i + j] = item_bytes[j];\n }\n }\n\n sha256_to_field(bytes)\n}\n\npub fn silo_l2_to_l1_message(\n msg: ScopedL2ToL1Message,\n rollup_version_id: Field,\n chain_id: Field,\n) -> Field {\n if msg.contract_address.is_zero() {\n 0\n } else {\n compute_l2_to_l1_hash(\n msg.contract_address,\n msg.message.recipient,\n msg.message.content,\n rollup_version_id,\n chain_id,\n )\n }\n}\n\n// Computes sha256 hash of 2 input hashes.\n//\n// NB: This method now takes in two 31 byte fields - it assumes that any input\n// is the result of a sha_to_field hash and => is truncated\n//\n// TODO(Jan and David): This is used for the encrypted_log hashes.\n// Can we check to see if we can just use hash_to_field or pedersen_compress here?\n//\npub fn accumulate_sha256(input: [Field; 2]) -> Field {\n // This is a note about the cpp code, since it takes an array of Fields\n // instead of a u128.\n // 4 Field elements when converted to bytes will usually\n // occupy 4 * 32 = 128 bytes.\n // However, this function is making the assumption that each Field\n // only occupies 128 bits.\n //\n // TODO(David): This does not seem to be getting guaranteed anywhere in the code?\n // Concatentate two fields into 32x2 = 64 bytes\n // accumulate_sha256 assumes that the inputs are pre-truncated 31 byte numbers\n let mut hash_input_flattened = [0; 64];\n for offset in 0..input.len() {\n let input_as_bytes: [u8; 32] = input[offset].to_be_bytes();\n for byte_index in 0..32 {\n hash_input_flattened[offset * 32 + byte_index] = input_as_bytes[byte_index];\n }\n }\n\n sha256_to_field(hash_input_flattened)\n}\n\npub fn verification_key_hash<let N: u32>(key: [Field; N]) -> Field {\n crate::hash::poseidon2_hash(key)\n}\n\n#[inline_always]\npub fn pedersen_hash<let N: u32>(inputs: [Field; N], hash_index: u32) -> Field {\n std::hash::pedersen_hash_with_separator(inputs, hash_index)\n}\n\npub fn poseidon2_hash<let N: u32>(inputs: [Field; N]) -> Field {\n poseidon::poseidon2::Poseidon2::hash(inputs, N)\n}\n\n#[no_predicates]\npub fn poseidon2_hash_with_separator<let N: u32, T>(inputs: [Field; N], separator: T) -> Field\nwhere\n T: ToField,\n{\n let inputs_with_separator = array_concat([separator.to_field()], inputs);\n poseidon2_hash(inputs_with_separator)\n}\n\n// Performs a fixed length hash with a subarray of the given input.\n// Useful for SpongeBlob in which we aborb M things and want to check it vs a hash of M elts of an N-len array.\n// Using stdlib poseidon, this will always absorb an extra 1 as a 'variable' hash, and not match spongeblob.squeeze()\n// or any ts implementation. Also checks that any remaining elts not hashed are empty.\n#[no_predicates]\npub fn poseidon2_hash_subarray<let N: u32>(input: [Field; N], in_len: u32) -> Field {\n let mut sponge = poseidon2_absorb_chunks(input, in_len, false);\n sponge.squeeze()\n}\n\n// NB the below is the same as poseidon::poseidon2::Poseidon2::hash(), but replacing a range check with a bit check,\n// and absorbing in chunks of 3 below.\n#[no_predicates]\npub fn poseidon2_cheaper_variable_hash<let N: u32>(input: [Field; N], in_len: u32) -> Field {\n let mut sponge = poseidon2_absorb_chunks(input, in_len, true);\n // In the case where the hash preimage is variable-length, we append `1` to the end of the input, to distinguish\n // from fixed-length hashes. (the combination of this additional field element + the hash IV ensures\n // fixed-length and variable-length hashes do not collide)\n if in_len != N {\n sponge.absorb(1);\n }\n sponge.squeeze()\n}\n\n// The below fn reduces gates of a conditional poseidon2 hash by approx 3x (thank you ~* Giant Brain Dev @IlyasRidhuan *~ for the idea)\n// Why? Because when we call stdlib poseidon, we call absorb for each item. When absorbing is conditional, it seems the compiler does not know\n// what cache_size will be when calling absorb, so it assigns the permutation gates for /each i/ rather than /every 3rd i/, which is actually required.\n// The below code forces the compiler to:\n// - absorb normally up to 2 times to set cache_size to 1\n// - absorb in chunks of 3 to ensure perm. only happens every 3rd absorb\n// - absorb normally up to 2 times to add any remaining values to the hash\n// In fixed len hashes, the compiler is able to tell that it will only need to perform the permutation every 3 absorbs.\n// NB: it also replaces unnecessary range checks (i < thing) with a bit check (&= i != thing), which alone reduces the gates of a var. hash by half.\n\n#[no_predicates]\nfn poseidon2_absorb_chunks<let N: u32>(\n input: [Field; N],\n in_len: u32,\n variable: bool,\n) -> Poseidon2Sponge {\n let iv: Field = (in_len as Field) * TWO_POW_64;\n let mut sponge = Poseidon2Sponge::new(iv);\n // Even though shift is always 1 here, if we input in_len = 0 we get an underflow\n // since we cannot isolate computation branches. The below is just to avoid that.\n let shift = if in_len == 0 { 0 } else { 1 };\n if in_len != 0 {\n // cache_size = 0, init absorb\n sponge.cache[0] = input[0];\n sponge.cache_size = 1;\n // shift = num elts already added to make cache_size 1 = 1 for a fresh sponge\n // M = max_chunks = (N - 1 - (N - 1) % 3) / 3: (must be written as a fn of N to compile)\n // max_remainder = (N - 1) % 3;\n // max_chunks = (N - 1 - max_remainder) / 3;\n sponge = poseidon2_absorb_chunks_loop::<N, (N - 1 - (N - 1) % 3) / 3>(\n sponge,\n input,\n in_len,\n variable,\n shift,\n );\n }\n sponge\n}\n\n// NB: If it's not required to check that the non-absorbed elts of 'input' are 0s, set skip_0_check=true\n#[no_predicates]\npub fn poseidon2_absorb_chunks_existing_sponge<let N: u32>(\n in_sponge: Poseidon2Sponge,\n input: [Field; N],\n in_len: u32,\n skip_0_check: bool,\n) -> Poseidon2Sponge {\n let mut sponge = in_sponge;\n // 'shift' is to account for already added inputs\n let mut shift = 0;\n // 'stop' is to avoid an underflow when inputting in_len = 0\n let mut stop = false;\n for i in 0..3 {\n if shift == in_len {\n stop = true;\n }\n if (sponge.cache_size != 1) & (!stop) {\n sponge.absorb(input[i]);\n shift += 1;\n }\n }\n sponge = if stop {\n sponge\n } else {\n // max_chunks = (N - (N % 3)) / 3;\n poseidon2_absorb_chunks_loop::<N, (N - (N % 3)) / 3>(\n sponge,\n input,\n in_len,\n skip_0_check,\n shift,\n )\n };\n sponge\n}\n\n// The below is the loop to absorb elts into a poseidon sponge in chunks of 3\n// shift - the num of elts already absorbed to ensure the sponge's cache_size = 1\n// M - the max number of chunks required to absorb N things (must be comptime to compile)\n// NB: The 0 checks ('Found non-zero field...') are messy, but having a separate loop over N to check\n// for 0s costs 3N gates. Current approach is approx 2N gates.\n#[no_predicates]\nfn poseidon2_absorb_chunks_loop<let N: u32, let M: u32>(\n in_sponge: Poseidon2Sponge,\n input: [Field; N],\n in_len: u32,\n variable: bool,\n shift: u32,\n) -> Poseidon2Sponge {\n assert(in_len <= N, \"Given in_len to absorb is larger than the input array len\");\n // When we have an existing sponge, we may have a shift of 0, and the final 'k+2' below = N\n // The below avoids an overflow\n let skip_last = 3 * M == N;\n // Writing in_sponge: &mut does not compile\n let mut sponge = in_sponge;\n let mut should_add = true;\n // The num of things left over after absorbing in 3s\n let remainder = (in_len - shift) % 3;\n // The num of chunks of 3 to absorb (maximum M)\n let chunks = (in_len - shift - remainder) / 3;\n for i in 0..M {\n // Now we loop through cache size = 1 -> 3\n should_add &= i != chunks;\n // This is the index at the start of the chunk (for readability)\n let k = 3 * i + shift;\n if should_add {\n // cache_size = 1, 2 => just assign\n sponge.cache[1] = input[k];\n sponge.cache[2] = input[k + 1];\n // cache_size = 3 => duplex + perm\n for j in 0..3 {\n sponge.state[j] += sponge.cache[j];\n }\n sponge.state = std::hash::poseidon2_permutation(sponge.state, 4);\n sponge.cache[0] = input[k + 2];\n // cache_size is now 1 again, repeat loop\n } else if (!variable) & (i != chunks) {\n // if we are hashing a fixed len array which is a subarray, we check the remaining elts are 0\n // NB: we don't check at i == chunks, because that chunk contains elts to be absorbed or checked below\n let last_0 = if (i == M - 1) & (skip_last) {\n 0\n } else {\n input[k + 2]\n };\n let all_0 = (input[k] == 0) & (input[k + 1] == 0) & (last_0 == 0);\n assert(all_0, \"Found non-zero field after breakpoint\");\n }\n }\n // we have 'remainder' num of items left to absorb\n should_add = true;\n // below is to avoid overflows (i.e. if inlen is close to N)\n let mut should_check = !variable;\n for i in 0..3 {\n should_add &= i != remainder;\n should_check &= in_len - remainder + i != N;\n if should_add {\n // we want to absorb the final 'remainder' items\n sponge.absorb(input[in_len - remainder + i]);\n } else if should_check {\n assert(input[in_len - remainder + i] == 0, \"Found non-zero field after breakpoint\");\n }\n }\n sponge\n}\n\npub fn poseidon2_hash_with_separator_slice<T>(inputs: [Field], separator: T) -> Field\nwhere\n T: ToField,\n{\n let in_len = inputs.len() + 1;\n let iv: Field = (in_len as Field) * TWO_POW_64;\n let mut sponge = Poseidon2Sponge::new(iv);\n sponge.absorb(separator.to_field());\n\n for i in 0..inputs.len() {\n sponge.absorb(inputs[i]);\n }\n\n sponge.squeeze()\n}\n\n#[no_predicates]\npub fn poseidon2_hash_bytes<let N: u32>(inputs: [u8; N]) -> Field {\n let mut fields = [0; (N + 30) / 31];\n let mut field_index = 0;\n let mut current_field = [0; 31];\n for i in 0..inputs.len() {\n let index = i % 31;\n current_field[index] = inputs[i];\n if index == 30 {\n fields[field_index] = field_from_bytes(current_field, false);\n current_field = [0; 31];\n field_index += 1;\n }\n }\n if field_index != fields.len() {\n fields[field_index] = field_from_bytes(current_field, false);\n }\n poseidon2_hash(fields)\n}\n\n#[test]\nfn poseidon_chunks_matches_fixed() {\n let in_len = 501;\n let mut input: [Field; 4096] = [0; 4096];\n let mut fixed_input = [3; 501];\n assert(in_len == fixed_input.len()); // sanity check\n for i in 0..in_len {\n input[i] = 3;\n }\n let sub_chunk_hash = poseidon2_hash_subarray(input, in_len);\n let fixed_len_hash = poseidon::poseidon2::Poseidon2::hash(fixed_input, fixed_input.len());\n assert(sub_chunk_hash == fixed_len_hash);\n}\n\n#[test]\nfn poseidon_chunks_matches_variable() {\n let in_len = 501;\n let mut input: [Field; 4096] = [0; 4096];\n for i in 0..in_len {\n input[i] = 3;\n }\n let variable_chunk_hash = poseidon2_cheaper_variable_hash(input, in_len);\n let variable_len_hash = poseidon::poseidon2::Poseidon2::hash(input, in_len);\n assert(variable_chunk_hash == variable_len_hash);\n}\n\n#[test]\nfn existing_sponge_poseidon_chunks_matches_fixed() {\n let in_len = 501;\n let mut input: [Field; 4096] = [0; 4096];\n let mut fixed_input = [3; 501];\n assert(in_len == fixed_input.len()); // sanity check\n for i in 0..in_len {\n input[i] = 3;\n }\n // absorb 250 of the 501 things\n let empty_sponge = Poseidon2Sponge::new((in_len as Field) * TWO_POW_64);\n let first_sponge = poseidon2_absorb_chunks_existing_sponge(empty_sponge, input, 250, true);\n // now absorb the final 251 (since they are all 3s, im being lazy and not making a new array)\n let mut final_sponge = poseidon2_absorb_chunks_existing_sponge(first_sponge, input, 251, true);\n let fixed_len_hash = Poseidon2Sponge::hash(fixed_input, fixed_input.len());\n assert(final_sponge.squeeze() == fixed_len_hash);\n}\n\n#[test]\nfn poseidon_chunks_empty_inputs() {\n let in_len = 0;\n let mut input: [Field; 4096] = [0; 4096];\n let mut constructed_empty_sponge = poseidon2_absorb_chunks(input, in_len, true);\n let mut first_sponge =\n poseidon2_absorb_chunks_existing_sponge(constructed_empty_sponge, input, in_len, true);\n assert(first_sponge.squeeze() == constructed_empty_sponge.squeeze());\n}\n\n#[test]\nfn smoke_sha256_to_field() {\n let full_buffer = [\n 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24,\n 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47,\n 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70,\n 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93,\n 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112,\n 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130,\n 131, 132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145, 146, 147, 148,\n 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159,\n ];\n let result = sha256_to_field(full_buffer);\n\n assert(result == 0x448ebbc9e1a31220a2f3830c18eef61b9bd070e5084b7fa2a359fe729184c7);\n\n // to show correctness of the current ver (truncate one byte) vs old ver (mod full bytes):\n let result_bytes = sha256::digest(full_buffer);\n let truncated_field = crate::utils::field::field_from_bytes_32_trunc(result_bytes);\n assert(truncated_field == result);\n let mod_res = result + (result_bytes[31] as Field);\n assert(mod_res == 0x448ebbc9e1a31220a2f3830c18eef61b9bd070e5084b7fa2a359fe729184e0);\n}\n\n#[test]\nfn compute_l2_l1_hash() {\n // All zeroes\n let hash_result =\n compute_l2_to_l1_hash(AztecAddress::from_field(0), EthAddress::zero(), 0, 0, 0);\n assert(hash_result == 0xb393978842a0fa3d3e1470196f098f473f9678e72463cb65ec4ab5581856c2);\n\n // Non-zero case\n let hash_result = compute_l2_to_l1_hash(\n AztecAddress::from_field(1),\n EthAddress::from_field(3),\n 5,\n 2,\n 4,\n );\n assert(hash_result == 0x3f88c1044a05e5340ed20466276500f6d45ca5603913b9091e957161734e16);\n}\n\n#[test]\nfn silo_l2_to_l1_message_matches_typescript() {\n let version = 4;\n let chainId = 5;\n\n let hash = silo_l2_to_l1_message(\n ScopedL2ToL1Message {\n message: L2ToL1Message { recipient: EthAddress::from_field(1), content: 2, counter: 0 },\n contract_address: AztecAddress::from_field(3),\n },\n version,\n chainId,\n );\n\n // The following value was generated by `l2_to_l1_message.test.ts`\n let hash_from_typescript = 0x00c6155d69febb9d5039b374dd4f77bf57b7c881709aa524a18acaa0bd57476a;\n\n assert_eq(hash, hash_from_typescript);\n}\n"
|
|
2944
2586
|
},
|
|
2945
|
-
"303": {
|
|
2946
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/meta/mod.nr",
|
|
2947
|
-
"source": "use super::traits::{Deserialize, Packable, Serialize};\n\n/// Returns the typed expression of a trait method implementation.\n///\n/// This helper function is preferred over directly inlining with `$typ::target_method()` in a quote,\n/// as direct inlining would result in missing import warnings in the generated code (specifically,\n/// warnings that the trait implementation is not in scope).\n///\n/// # Note\n/// A copy of this function exists in `aztec-nr/aztec/src/macros/utils.nr`. We maintain separate copies\n/// because importing it there from here would cause the `target_trait` to be interpreted in the context\n/// of this crate, making it impossible to compile code for traits from that crate (e.g. NoteType).\ncomptime fn get_trait_impl_method(\n typ: Type,\n target_trait: Quoted,\n target_method: Quoted,\n) -> TypedExpr {\n let trait_constraint = target_trait.as_trait_constraint();\n typ\n .get_trait_impl(trait_constraint)\n .expect(f\"Could not find impl for {target_trait} for type {typ}\")\n .methods()\n .filter(|m| m.name() == target_method)[0]\n .as_typed_expr()\n}\n\n/// Generates code that deserializes a struct, primitive type, array or string from a field array.\n///\n/// # Parameters\n/// - `name`: The name of the current field being processed, used to identify fields for replacement.\n/// - `typ`: The type of the struct or field being deserialized (e.g., a custom struct, array, or primitive).\n/// - `field_array_name`: The name of the field array containing serialized field data (e.g., `\"values\"`).\n/// - `num_already_consumed`: The number of fields already processed in previous recursion calls.\n/// - `should_unpack`: A boolean indicating whether the type should be unpacked (see description of `Packable`\n/// and `Serialize` trait for more information about the difference between packing and serialization).\n///\n/// # Returns\n/// A tuple containing:\n/// - `Quoted`: A code that deserializes a given struct, primitive type, array, or string from the field array.\n/// - `u32`: The total number of fields consumed during deserialization (used for recursion).\n///\n/// # Nested Struct Example\n/// Given the following setup:\n/// ```\n/// struct UintNote {\n/// value: u128,\n/// owner: AztecAddress,\n/// randomness: Field,\n/// }\n///\n/// struct AztecAddress {\n/// inner: Field,\n/// }\n/// ```\n///\n/// If `UintNote` is the input type, the function will generate the following deserialization code:\n/// ```\n/// UintNote {\n/// value: fields[0] as u128,\n/// owner: AztecAddress {\n/// inner: fields[1],\n/// },\n/// randomness: fields[2],\n/// }\n/// ```\n/// # Nested Struct Example with Unpacking\n/// - given the same setup as above and given that u128, AztecAddress and Field implement the `Packable` trait\n/// the result we get is:\n/// ```\n/// UintNote {\n/// value: aztec::protocol_types::traits::Packable::unpack([fields[0]]),\n/// owner: aztec::protocol_types::traits::Packable::unpack([fields[1]]),\n/// randomness: aztec::protocol_types::traits::Packable::unpack([fields[2]]),\n/// }\n/// ```\n///\n/// # Panics\n/// - If the deserialization logic encounters a type it does not support.\n/// - If an incorrect number of fields are consumed when deserializing a string.\npub comptime fn generate_deserialize_from_fields(\n name: Quoted,\n typ: Type,\n field_array_name: Quoted,\n num_already_consumed: u32,\n should_unpack: bool,\n) -> (Quoted, u32) {\n let mut result = quote {};\n // Counter for the number of fields consumed\n let mut consumed_counter: u32 = 0;\n\n // If the type implements `Packable`, its length will be assigned to the `maybe_packed_len_typ` variable.\n let maybe_packed_len_typ = std::meta::typ::fresh_type_variable();\n let packable_constraint = quote { Packable<$maybe_packed_len_typ> }.as_trait_constraint();\n\n if (should_unpack & typ.implements(packable_constraint)) {\n // Unpacking is enabled and the given type implements the `Packable` trait so we call the `unpack()`\n // method, add the resulting field array to `aux_vars` and each field to `fields`.\n let packed_len = maybe_packed_len_typ.as_constant().unwrap();\n\n // We copy the packed fields into a new array and pass that to the unpack function in a quote\n let mut packed_fields_quotes = &[];\n for i in 0..packed_len {\n let index_in_field_array = i + num_already_consumed;\n packed_fields_quotes =\n packed_fields_quotes.push_back(quote { $field_array_name[$index_in_field_array] });\n }\n let packed_fields = packed_fields_quotes.join(quote {,});\n\n // Now we call unpack on the type\n let unpack_method = get_trait_impl_method(typ, quote { Packable<_> }, quote { unpack });\n result = quote { $unpack_method([ $packed_fields ]) };\n\n consumed_counter = packed_len;\n } else if typ.is_field() | typ.as_integer().is_some() | typ.is_bool() {\n // The field is a primitive so we just reference it in the field array\n result = quote { $field_array_name[$num_already_consumed] as $typ };\n consumed_counter = 1;\n } else if typ.as_data_type().is_some() {\n // The field is a struct so we iterate over each struct field and recursively call\n // `generate_deserialize_from_fields`\n let (nested_def, generics) = typ.as_data_type().unwrap();\n let nested_name = nested_def.name();\n let mut deserialized_fields_list = &[];\n\n // Iterate over each field in the struct\n for field in nested_def.fields(generics) {\n let (field_name, field_type) = field;\n // Recursively call `generate_deserialize_from_fields` for each field in the struct\n let (deserialized_field, num_consumed_in_recursion) = generate_deserialize_from_fields(\n field_name,\n field_type,\n field_array_name,\n consumed_counter + num_already_consumed,\n should_unpack,\n );\n // We increment the consumed counter by the number of fields consumed in the recursion\n consumed_counter += num_consumed_in_recursion;\n // We add the deserialized field to the list of deserialized fields.\n // E.g. `value: u128 { lo: fields[0], hi: fields[1] }`\n deserialized_fields_list =\n deserialized_fields_list.push_back(quote { $field_name: $deserialized_field });\n }\n\n // We can construct the struct from the deserialized fields\n let deserialized_fields = deserialized_fields_list.join(quote {,});\n result = quote {\n $nested_name {\n $deserialized_fields\n }\n };\n } else if typ.as_array().is_some() {\n // The field is an array so we iterate over each element and recursively call\n // `generate_deserialize_from_fields`\n let (element_type, array_len) = typ.as_array().unwrap();\n let array_len = array_len.as_constant().unwrap();\n let mut array_fields_list = &[];\n\n // Iterate over each element in the array\n for _ in 0..array_len {\n // Recursively call `generate_deserialize_from_fields` for each element in the array\n let (deserialized_field, num_consumed_in_recursion) = generate_deserialize_from_fields(\n name,\n element_type,\n field_array_name,\n consumed_counter + num_already_consumed,\n should_unpack,\n );\n // We increment the consumed counter by the number of fields consumed in the recursion\n consumed_counter += num_consumed_in_recursion;\n // We add the deserialized field to the list of deserialized fields.\n array_fields_list = array_fields_list.push_back(deserialized_field);\n }\n\n // We can construct the array from the deserialized fields\n let array_fields = array_fields_list.join(quote {,});\n result = quote { [ $array_fields ] };\n } else if typ.as_str().is_some() {\n // The field is a string and we expect each byte of the string to be represented as 1 field in the field\n // array. So we iterate over the string length and deserialize each character as u8 in the recursive call\n // to `generate_deserialize_from_fields`.\n let length_type = typ.as_str().unwrap();\n let str_len = length_type.as_constant().unwrap();\n let mut byte_list = &[];\n\n // Iterate over each character in the string\n for _ in 0..str_len {\n // Recursively call `generate_deserialize_from_fields` for each character in the string\n let (deserialized_field, num_consumed_in_recursion) = generate_deserialize_from_fields(\n name,\n quote {u8}.as_type(),\n field_array_name,\n consumed_counter + num_already_consumed,\n should_unpack,\n );\n\n // We should consume just one field in the recursion so we sanity check that\n assert_eq(\n num_consumed_in_recursion,\n 1,\n \"Incorrect number of fields consumed in string deserialization\",\n );\n\n // We increment the consumed counter by 1 as we have consumed one field\n consumed_counter += 1;\n\n // We add the deserialized field to the list of deserialized fields.\n // E.g. `fields[6] as u8`\n byte_list = byte_list.push_back(deserialized_field);\n }\n\n // We construct the string from the deserialized fields\n let bytes = byte_list.join(quote {,});\n result = quote { [ $bytes ].as_str_unchecked() };\n } else {\n panic(\n f\"Unsupported type for serialization of argument {name} and type {typ}\",\n )\n }\n\n (result, consumed_counter)\n}\n\n/// Generates code that serializes a type into an array of fields. Also generates auxiliary variables if necessary\n/// for serialization. If `should_pack` is true, we check if the type implements the `Packable` trait and pack it\n/// if it does.\n///\n/// # Parameters\n/// - `name`: The base identifier (e.g., `self`, `some_var`).\n/// - `typ`: The type being serialized (e.g., a custom struct, array, or primitive type).\n/// - `should_pack`: A boolean indicating whether the type should be packed.\n///\n/// # Returns\n/// A tuple containing:\n/// - A flattened array of `Quoted` field references representing the serialized fields.\n/// - An array of `Quoted` auxiliary variables needed for serialization, such as byte arrays for strings.\n///\n/// # Examples\n///\n/// ## Struct\n/// Given the following struct:\n/// ```rust\n/// struct MockStruct {\n/// a: Field,\n/// b: Field,\n/// }\n/// ```\n///\n/// Serializing the struct:\n/// ```rust\n/// generate_serialize_to_fields(quote { my_mock_struct }, MockStruct, false)\n/// // Returns:\n/// // ([`my_mock_struct.a`, `my_mock_struct.b`], [])\n/// ```\n///\n/// ## Nested Struct\n/// For a more complex struct:\n/// ```rust\n/// struct NestedStruct {\n/// m1: MockStruct,\n/// m2: MockStruct,\n/// }\n/// ```\n///\n/// Serialization output:\n/// ```rust\n/// generate_serialize_to_fields(quote { self }, NestedStruct, false)\n/// // Returns:\n/// // ([`self.m1.a`, `self.m1.b`, `self.m2.a`, `self.m2.b`], [])\n/// ```\n///\n/// ## Array\n/// For an array type:\n/// ```rust\n/// generate_serialize_to_fields(quote { my_array }, [Field; 3], false)\n/// // Returns:\n/// // ([`my_array[0]`, `my_array[1]`, `my_array[2]`], [])\n/// ```\n///\n/// ## String\n/// For a string field, where each character is serialized as a `Field`:\n/// ```rust\n/// generate_serialize_to_fields(quote { my_string }, StringType, false)\n/// // Returns:\n/// // ([`my_string_as_bytes[0] as Field`, `my_string_as_bytes[1] as Field`, ...],\n/// // [`let my_string_as_bytes = my_string.as_bytes()`])\n/// ```\n///\n/// ## Nested Struct with packing enabled\n/// - u128 has a `Packable` implementation hence it will be packed.\n///\n/// For a more complex struct:\n/// ```rust\n/// struct MyStruct {\n/// value: u128,\n/// value2: Field,\n/// }\n/// ```\n///\n/// # Panics\n/// - If the type is unsupported for serialization.\n/// - If the provided `typ` contains invalid constants or incompatible structures.\npub comptime fn generate_serialize_to_fields(\n name: Quoted,\n typ: Type,\n should_pack: bool,\n) -> ([Quoted], [Quoted]) {\n let mut fields = &[];\n let mut aux_vars = &[];\n\n // If the type implements `Packable`, its length will be assigned to the `maybe_packed_len_typ` variable.\n let maybe_packed_len_typ = std::meta::typ::fresh_type_variable();\n let packable_constraint =\n quote { crate::traits::Packable<$maybe_packed_len_typ> }.as_trait_constraint();\n\n if (should_pack & typ.implements(packable_constraint)) {\n // Packing is enabled and the given type implements the `Packable` trait so we call the `pack()`\n // method, add the resulting field array to `aux_vars` and each field to `fields`.\n let packed_len = maybe_packed_len_typ.as_constant().unwrap();\n\n // We collapse the name to a one that gets tokenized as a single token (e.g. \"self.value\" -> \"self_value\").\n let name_at_one_token = collapse_to_one_token(name);\n let packed_struct_name = f\"{name_at_one_token}_aux_var\".quoted_contents();\n\n // We add the individual fields to the fields array\n let pack_method = get_trait_impl_method(\n typ,\n quote { crate::traits::Packable<$packed_len> },\n quote { pack },\n );\n let packed_struct = quote { let $packed_struct_name = $pack_method($name) };\n for i in 0..packed_len {\n fields = fields.push_back(quote { $packed_struct_name[$i] });\n }\n\n // We add the new auxiliary variable to the aux_vars array\n aux_vars = aux_vars.push_back(packed_struct);\n } else if typ.is_field() {\n // For field we just add the value to fields\n fields = fields.push_back(name);\n } else if typ.as_integer().is_some() | typ.is_bool() {\n // For integer and bool we just cast to Field and add the value to fields\n fields = fields.push_back(quote { $name as Field });\n } else if typ.as_data_type().is_some() {\n // For struct we pref\n let nested_struct = typ.as_data_type().unwrap();\n let params = nested_struct.0.fields(nested_struct.1);\n let struct_flattened = params.map(|(param_name, param_type): (Quoted, Type)| {\n let maybe_prefixed_name = if name == quote {} {\n // Triggered when the param name is of a value available in the current scope (e.g. a function\n // argument) --> then we don't prefix the name with anything.\n param_name\n } else {\n // Triggered when we want to prefix the param name with the `name` from function input. This\n // can typically be `self` when implementing a method on a struct.\n quote { $name.$param_name }\n };\n generate_serialize_to_fields(quote {$maybe_prefixed_name}, param_type, should_pack)\n });\n let struct_flattened_fields = struct_flattened.fold(\n &[],\n |acc: [Quoted], (fields, _): (_, [Quoted])| acc.append(fields),\n );\n let struct_flattened_aux_vars = struct_flattened.fold(\n &[],\n |acc: [Quoted], (_, aux_vars): ([Quoted], _)| acc.append(aux_vars),\n );\n fields = fields.append(struct_flattened_fields);\n aux_vars = aux_vars.append(struct_flattened_aux_vars);\n } else if typ.as_array().is_some() {\n // For array we recursively call `generate_serialize_to_fields(...)` for each element\n let (element_type, array_len) = typ.as_array().unwrap();\n let array_len = array_len.as_constant().unwrap();\n for i in 0..array_len {\n let (element_fields, element_aux_vars) =\n generate_serialize_to_fields(quote { $name[$i] }, element_type, should_pack);\n fields = fields.append(element_fields);\n aux_vars = aux_vars.append(element_aux_vars);\n }\n } else if typ.as_str().is_some() {\n // For string we convert the value to bytes, we store the `as_bytes` in an auxiliary variables and\n // then we add each byte to fields as a Field\n let length_type = typ.as_str().unwrap();\n let str_len = length_type.as_constant().unwrap();\n let as_member = name.as_expr().unwrap().as_member_access();\n let var_name = if as_member.is_some() {\n as_member.unwrap().1\n } else {\n name\n };\n let as_bytes_name = f\"{var_name}_as_bytes\".quoted_contents();\n let as_bytes = quote { let $as_bytes_name = $name.as_bytes() };\n for i in 0..str_len {\n fields = fields.push_back(quote { $as_bytes_name[$i] as Field });\n }\n aux_vars = aux_vars.push_back(as_bytes);\n } else {\n panic(\n f\"Unsupported type for serialization of argument {name} and type {typ}\",\n )\n }\n\n (fields, aux_vars)\n}\n\n/// From a quote that gets tokenized to a multiple tokens we collapse it to a single token by replacing all `.` with `_`.\n/// E.g. \"self.values[0]\" -> \"self_values_0_\"\ncomptime fn collapse_to_one_token(q: Quoted) -> Quoted {\n let tokens = q.tokens();\n\n let mut single_token = quote {};\n for token in tokens {\n let new_token = if ((token == quote {.}) | (token == quote {[}) | (token == quote {]})) {\n quote {_}\n } else {\n token\n };\n single_token = f\"{single_token}{new_token}\".quoted_contents();\n }\n single_token\n}\n\npub(crate) comptime fn derive_serialize(s: TypeDefinition) -> Quoted {\n let typ = s.as_type();\n let (fields, aux_vars) = generate_serialize_to_fields(quote { self }, typ, false);\n let aux_vars_for_serialization = if aux_vars.len() > 0 {\n let joint = aux_vars.join(quote {;});\n quote { $joint; }\n } else {\n quote {}\n };\n\n let field_serializations = fields.join(quote {,});\n let serialized_len = fields.len();\n quote {\n impl Serialize<$serialized_len> for $typ {\n #[inline_always]\n fn serialize(self) -> [Field; $serialized_len] {\n $aux_vars_for_serialization\n [ $field_serializations ]\n }\n }\n }\n}\n\npub(crate) comptime fn derive_deserialize(s: TypeDefinition) -> Quoted {\n let typ = s.as_type();\n let (fields, _) = generate_serialize_to_fields(quote { self }, typ, false);\n let serialized_len = fields.len();\n let (deserialized, _) =\n generate_deserialize_from_fields(quote { self }, typ, quote { serialized }, 0, false);\n quote {\n impl Deserialize<$serialized_len> for $typ {\n #[inline_always]\n fn deserialize(serialized: [Field; $serialized_len]) -> Self {\n $deserialized\n }\n }\n }\n}\n\n/// Generates `Packable` implementation for a given struct and returns the packed length.\n///\n/// Note: We are having this function separate from `derive_packable` because we use this in the note macros to get\n/// the packed length of a note as well as the `Packable` implementation. We need the length to be able to register\n/// the note in the global `NOTES` map. There the length is used to generate partial note helper functions.\npub comptime fn derive_packable_and_get_packed_len(s: TypeDefinition) -> (Quoted, u32) {\n let packing_enabled = true;\n\n let typ = s.as_type();\n let (fields, aux_vars) = generate_serialize_to_fields(quote { self }, typ, packing_enabled);\n let aux_vars_for_packing = if aux_vars.len() > 0 {\n let joint = aux_vars.join(quote {;});\n quote { $joint; }\n } else {\n quote {}\n };\n\n let (unpacked, _) =\n generate_deserialize_from_fields(quote { self }, typ, quote { packed }, 0, packing_enabled);\n\n let field_packings = fields.join(quote {,});\n let packed_len = fields.len();\n let packable_trait: TraitConstraint = quote { Packable<$packed_len> }.as_trait_constraint();\n (\n quote {\n impl $packable_trait for $typ {\n fn pack(self) -> [Field; $packed_len] {\n $aux_vars_for_packing\n [ $field_packings ]\n }\n\n fn unpack(packed: [Field; $packed_len]) -> Self {\n $unpacked\n }\n }\n },\n packed_len,\n )\n}\n\npub(crate) comptime fn derive_packable(s: TypeDefinition) -> Quoted {\n let (packable_impl, _) = derive_packable_and_get_packed_len(s);\n packable_impl\n}\n\n#[derive(Packable, Serialize, Deserialize, Eq)]\npub struct Smol {\n a: Field,\n b: Field,\n}\n\n#[derive(Serialize, Deserialize, Eq)]\npub struct HasArray {\n a: [Field; 2],\n b: bool,\n}\n\n#[derive(Serialize, Deserialize, Eq)]\npub struct Fancier {\n a: Smol,\n b: [Field; 2],\n c: [u8; 3],\n d: str<16>,\n}\n\nfn main() {\n assert(false);\n}\n\n#[test]\nfn smol_test() {\n let smol = Smol { a: 1, b: 2 };\n let serialized = smol.serialize();\n assert(serialized == [1, 2], serialized);\n let deserialized = Smol::deserialize(serialized);\n assert(deserialized == smol);\n\n // None of the struct members implements the `Packable` trait so the packed and serialized data should be the same\n let packed = smol.pack();\n assert_eq(packed, serialized, \"Packed does not match serialized\");\n}\n\n#[test]\nfn has_array_test() {\n let has_array = HasArray { a: [1, 2], b: true };\n let serialized = has_array.serialize();\n assert(serialized == [1, 2, 1], serialized);\n let deserialized = HasArray::deserialize(serialized);\n assert(deserialized == has_array);\n}\n\n#[test]\nfn fancier_test() {\n let fancier =\n Fancier { a: Smol { a: 1, b: 2 }, b: [0, 1], c: [1, 2, 3], d: \"metaprogramming!\" };\n let serialized = fancier.serialize();\n assert(\n serialized\n == [\n 1, 2, 0, 1, 1, 2, 3, 0x6d, 0x65, 0x74, 0x61, 0x70, 0x72, 0x6f, 0x67, 0x72, 0x61,\n 0x6d, 0x6d, 0x69, 0x6e, 0x67, 0x21,\n ],\n serialized,\n );\n let deserialized = Fancier::deserialize(serialized);\n assert(deserialized == fancier);\n}\n"
|
|
2948
|
-
},
|
|
2949
2587
|
"306": {
|
|
2950
2588
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/poseidon2.nr",
|
|
2951
2589
|
"source": "use crate::constants::TWO_POW_64;\n\n// NB: This is a clone of noir/noir-repo/noir_stdlib/src/hash/poseidon2.nr\n// It exists as we sometimes need to perform custom absorption, but the stdlib version\n// has a private absorb() method (it's also designed to just be a hasher)\n// Can be removed when standalone noir poseidon lib exists: See noir#6679\n\ncomptime global RATE: u32 = 3;\n\npub struct Poseidon2Sponge {\n pub cache: [Field; 3],\n pub state: [Field; 4],\n pub cache_size: u32,\n pub squeeze_mode: bool, // 0 => absorb, 1 => squeeze\n}\n\nimpl Poseidon2Sponge {\n #[no_predicates]\n pub fn hash<let N: u32>(input: [Field; N], message_size: u32) -> Field {\n Poseidon2Sponge::hash_internal(input, message_size, message_size != N)\n }\n\n pub(crate) fn new(iv: Field) -> Poseidon2Sponge {\n let mut result =\n Poseidon2Sponge { cache: [0; 3], state: [0; 4], cache_size: 0, squeeze_mode: false };\n result.state[RATE] = iv;\n result\n }\n\n fn perform_duplex(&mut self) {\n // add the cache into sponge state\n for i in 0..RATE {\n // We effectively zero-pad the cache by only adding to the state\n // cache that is less than the specified `cache_size`\n if i < self.cache_size {\n self.state[i] += self.cache[i];\n }\n }\n self.state = std::hash::poseidon2_permutation(self.state, 4);\n }\n\n pub fn absorb(&mut self, input: Field) {\n assert(!self.squeeze_mode);\n if self.cache_size == RATE {\n // If we're absorbing, and the cache is full, apply the sponge permutation to compress the cache\n self.perform_duplex();\n self.cache[0] = input;\n self.cache_size = 1;\n } else {\n // If we're absorbing, and the cache is not full, add the input into the cache\n self.cache[self.cache_size] = input;\n self.cache_size += 1;\n }\n }\n\n pub fn squeeze(&mut self) -> Field {\n assert(!self.squeeze_mode);\n // If we're in absorb mode, apply sponge permutation to compress the cache.\n self.perform_duplex();\n self.squeeze_mode = true;\n\n // Pop one item off the top of the permutation and return it.\n self.state[0]\n }\n\n fn hash_internal<let N: u32>(\n input: [Field; N],\n in_len: u32,\n is_variable_length: bool,\n ) -> Field {\n let iv: Field = (in_len as Field) * TWO_POW_64;\n let mut sponge = Poseidon2Sponge::new(iv);\n for i in 0..input.len() {\n if i < in_len {\n sponge.absorb(input[i]);\n }\n }\n\n // In the case where the hash preimage is variable-length, we append `1` to the end of the input, to distinguish\n // from fixed-length hashes. (the combination of this additional field element + the hash IV ensures\n // fixed-length and variable-length hashes do not collide)\n if is_variable_length {\n sponge.absorb(1);\n }\n sponge.squeeze()\n }\n}\n"
|
|
@@ -2970,14 +2608,6 @@
|
|
|
2970
2608
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/utils/reader.nr",
|
|
2971
2609
|
"source": "pub struct Reader<let N: u32> {\n data: [Field; N],\n offset: u32,\n}\n\nimpl<let N: u32> Reader<N> {\n pub fn new(data: [Field; N]) -> Self {\n Self { data, offset: 0 }\n }\n\n pub fn read(&mut self) -> Field {\n let result = self.data[self.offset];\n self.offset += 1;\n result\n }\n\n pub fn read_u32(&mut self) -> u32 {\n self.read() as u32\n }\n\n pub fn read_bool(&mut self) -> bool {\n self.read() as bool\n }\n\n pub fn read_array<let K: u32>(&mut self) -> [Field; K] {\n let mut result = [0; K];\n for i in 0..K {\n result[i] = self.data[self.offset + i];\n }\n self.offset += K;\n result\n }\n\n pub fn read_struct<T, let K: u32>(&mut self, deserialise: fn([Field; K]) -> T) -> T {\n let result = deserialise(self.read_array());\n result\n }\n\n pub fn read_struct_array<T, let K: u32, let C: u32>(\n &mut self,\n deserialise: fn([Field; K]) -> T,\n mut result: [T; C],\n ) -> [T; C] {\n for i in 0..C {\n result[i] = self.read_struct(deserialise);\n }\n result\n }\n\n pub fn finish(self) {\n assert(self.offset == self.data.len(), \"Reader did not read all data\");\n }\n}\n"
|
|
2972
2610
|
},
|
|
2973
|
-
"375": {
|
|
2974
|
-
"path": "/home/aztec-dev/nargo/github.com/noir-lang/sha256/v0.1.2/src/sha256.nr",
|
|
2975
|
-
"source": "use std::hash::sha256_compression;\nuse std::runtime::is_unconstrained;\n\nuse constants::{\n BLOCK_BYTE_PTR, BLOCK_SIZE, HASH, INITIAL_STATE, INT_BLOCK, INT_BLOCK_SIZE, INT_SIZE,\n INT_SIZE_PTR, MSG_BLOCK, MSG_SIZE_PTR, STATE, TWO_POW_16, TWO_POW_24, TWO_POW_32, TWO_POW_8,\n};\n\nmod constants;\nmod tests;\n\n// Implementation of SHA-256 mapping a byte array of variable length to\n// 32 bytes.\n\n// Deprecated in favour of `sha256_var`\n// docs:start:sha256\npub fn sha256<let N: u32>(input: [u8; N]) -> HASH\n// docs:end:sha256\n{\n digest(input)\n}\n\n// SHA-256 hash function\n#[no_predicates]\npub fn digest<let N: u32>(msg: [u8; N]) -> HASH {\n sha256_var(msg, N as u64)\n}\n\n// Variable size SHA-256 hash\npub fn sha256_var<let N: u32>(msg: [u8; N], message_size: u64) -> HASH {\n let message_size = message_size as u32;\n assert(message_size <= N);\n\n if std::runtime::is_unconstrained() {\n // Safety: SHA256 is running as an unconstrained function.\n unsafe {\n __sha256_var(msg, message_size)\n }\n } else {\n let mut msg_block: MSG_BLOCK = [0; INT_BLOCK_SIZE];\n // Intermediate hash, starting with the canonical initial value\n let mut h: STATE = INITIAL_STATE;\n // Pointer into msg_block on a 64 byte scale\n let mut msg_byte_ptr = 0;\n let num_blocks = N / BLOCK_SIZE;\n for i in 0..num_blocks {\n let msg_start = BLOCK_SIZE * i;\n let (new_msg_block, new_msg_byte_ptr) =\n unsafe { build_msg_block(msg, message_size, msg_start) };\n\n if msg_start < message_size {\n msg_block = new_msg_block;\n }\n\n // Verify the block we are compressing was appropriately constructed\n let new_msg_byte_ptr = verify_msg_block(msg, message_size, msg_block, msg_start);\n if msg_start < message_size {\n msg_byte_ptr = new_msg_byte_ptr;\n }\n\n // If the block is filled, compress it.\n // An un-filled block is handled after this loop.\n if (msg_start < message_size) & (msg_byte_ptr == BLOCK_SIZE) {\n h = sha256_compression(msg_block, h);\n }\n }\n\n let modulo = N % BLOCK_SIZE;\n // Handle setup of the final msg block.\n // This case is only hit if the msg is less than the block size,\n // or our message cannot be evenly split into blocks.\n if modulo != 0 {\n let msg_start = BLOCK_SIZE * num_blocks;\n let (new_msg_block, new_msg_byte_ptr) =\n unsafe { build_msg_block(msg, message_size, msg_start) };\n\n if msg_start < message_size {\n msg_block = new_msg_block;\n }\n\n let new_msg_byte_ptr = verify_msg_block(msg, message_size, msg_block, msg_start);\n if msg_start < message_size {\n msg_byte_ptr = new_msg_byte_ptr;\n verify_msg_block_padding(msg_block, msg_byte_ptr);\n }\n }\n\n // If we had modulo == 0 then it means the last block was full,\n // and we can reset the pointer to zero to overwrite it.\n if msg_byte_ptr == BLOCK_SIZE {\n msg_byte_ptr = 0;\n }\n\n // Pad the rest such that we have a [u32; 2] block at the end representing the length\n // of the message, and a block of 1 0 ... 0 following the message (i.e. [1 << 7, 0, ..., 0]).\n // Here we rely on the fact that everything beyond the available input is set to 0.\n let index = msg_byte_ptr / INT_SIZE;\n msg_block[index] = set_item_byte_then_zeros(msg_block[index], msg_byte_ptr, 1 << 7);\n\n msg_byte_ptr = msg_byte_ptr + 1;\n let last_block = msg_block;\n\n // If we don't have room to write the size, compress the block and reset it.\n if msg_byte_ptr > MSG_SIZE_PTR {\n h = sha256_compression(msg_block, h);\n // `attach_len_to_msg_block` will zero out everything after the `msg_byte_ptr`.\n msg_byte_ptr = 0;\n }\n\n msg_block = unsafe { attach_len_to_msg_block(msg_block, msg_byte_ptr, message_size) };\n\n verify_msg_len(msg_block, last_block, msg_byte_ptr, message_size);\n\n hash_final_block(msg_block, h)\n }\n}\n\n// Variable size SHA-256 hash\nunconstrained fn __sha256_var<let N: u32>(msg: [u8; N], message_size: u32) -> HASH {\n let num_full_blocks = message_size / BLOCK_SIZE;\n // Intermediate hash, starting with the canonical initial value\n let mut h: STATE = INITIAL_STATE;\n // Pointer into msg_block on a 64 byte scale\n for i in 0..num_full_blocks {\n let (msg_block, _) = build_msg_block(msg, message_size, BLOCK_SIZE * i);\n h = sha256_compression(msg_block, h);\n }\n\n // Handle setup of the final msg block.\n // This case is only hit if the msg is less than the block size,\n // or our message cannot be evenly split into blocks.\n let modulo = message_size % BLOCK_SIZE;\n let (mut msg_block, mut msg_byte_ptr): (INT_BLOCK, u32) = if modulo != 0 {\n let msg_start = BLOCK_SIZE * num_full_blocks;\n let (new_msg_block, new_msg_byte_ptr) = build_msg_block(msg, message_size, msg_start);\n\n (new_msg_block, new_msg_byte_ptr)\n } else {\n // If we had modulo == 0 then it means the last block was full,\n // and we can reset the pointer to zero to overwrite it.\n ([0; INT_BLOCK_SIZE], 0)\n };\n\n // Pad the rest such that we have a [u32; 2] block at the end representing the length\n // of the message, and a block of 1 0 ... 0 following the message (i.e. [1 << 7, 0, ..., 0]).\n // Here we rely on the fact that everything beyond the available input is set to 0.\n let index = msg_byte_ptr / INT_SIZE;\n msg_block[index] = set_item_byte_then_zeros(msg_block[index], msg_byte_ptr, 1 << 7);\n\n // If we don't have room to write the size, compress the block and reset it.\n let (h, mut msg_byte_ptr): (STATE, u32) = if msg_byte_ptr >= MSG_SIZE_PTR {\n // `attach_len_to_msg_block` will zero out everything after the `msg_byte_ptr`.\n (sha256_compression(msg_block, h), 0)\n } else {\n (h, msg_byte_ptr + 1)\n };\n msg_block = attach_len_to_msg_block(msg_block, msg_byte_ptr, message_size);\n\n hash_final_block(msg_block, h)\n}\n\n// Take `BLOCK_SIZE` number of bytes from `msg` starting at `msg_start`.\n// Returns the block and the length that has been copied rather than padded with zeros.\nunconstrained fn build_msg_block<let N: u32>(\n msg: [u8; N],\n message_size: u32,\n msg_start: u32,\n) -> (MSG_BLOCK, BLOCK_BYTE_PTR) {\n let mut msg_block: MSG_BLOCK = [0; INT_BLOCK_SIZE];\n\n // We insert `BLOCK_SIZE` bytes (or up to the end of the message)\n let block_input = if message_size < msg_start {\n // This function is sometimes called with `msg_start` past the end of the message.\n // In this case we return an empty block and zero pointer to signal that the result should be ignored.\n 0\n } else if message_size < msg_start + BLOCK_SIZE {\n message_size - msg_start\n } else {\n BLOCK_SIZE\n };\n\n // Figure out the number of items in the int array that we have to pack.\n // e.g. if the input is [0,1,2,3,4,5] then we need to pack it as 2 items: [0123, 4500]\n let mut int_input = block_input / INT_SIZE;\n if block_input % INT_SIZE != 0 {\n int_input = int_input + 1;\n };\n\n for i in 0..int_input {\n let mut msg_item: u32 = 0;\n // Always construct the integer as 4 bytes, even if it means going beyond the input.\n for j in 0..INT_SIZE {\n let k = i * INT_SIZE + j;\n let msg_byte = if k < block_input {\n msg[msg_start + k]\n } else {\n 0\n };\n msg_item = lshift8(msg_item, 1) + msg_byte as u32;\n }\n msg_block[i] = msg_item;\n }\n\n // Returning the index as if it was a 64 byte array.\n // We have to project it down to 16 items and bit shifting to get a byte back if we need it.\n (msg_block, block_input)\n}\n\n// Verify the block we are compressing was appropriately constructed by `build_msg_block`\n// and matches the input data. Returns the index of the first unset item.\n// If `message_size` is less than `msg_start` then this is called with the old non-empty block;\n// in that case we can skip verification, ie. no need to check that everything is zero.\nfn verify_msg_block<let N: u32>(\n msg: [u8; N],\n message_size: u32,\n msg_block: MSG_BLOCK,\n msg_start: u32,\n) -> BLOCK_BYTE_PTR {\n let mut msg_byte_ptr = 0;\n let mut msg_end = msg_start + BLOCK_SIZE;\n if msg_end > N {\n msg_end = N;\n }\n // We might have to go beyond the input to pad the fields.\n if msg_end % INT_SIZE != 0 {\n msg_end = msg_end + INT_SIZE - msg_end % INT_SIZE;\n }\n\n // Reconstructed packed item.\n let mut msg_item: u32 = 0;\n\n // Inclusive at the end so that we can compare the last item.\n let mut i: u32 = 0;\n for k in msg_start..=msg_end {\n if k % INT_SIZE == 0 {\n // If we consumed some input we can compare against the block.\n if (msg_start < message_size) & (k > msg_start) {\n assert_eq(msg_block[i], msg_item as u32);\n i = i + 1;\n msg_item = 0;\n }\n }\n // Shift the accumulator\n msg_item = lshift8(msg_item, 1);\n // If we have input to consume, add it at the rightmost position.\n if k < message_size & k < msg_end {\n msg_item = msg_item + msg[k] as u32;\n msg_byte_ptr = msg_byte_ptr + 1;\n }\n }\n\n msg_byte_ptr\n}\n\n// Verify the block we are compressing was appropriately padded with zeros by `build_msg_block`.\n// This is only relevant for the last, potentially partially filled block.\nfn verify_msg_block_padding(msg_block: MSG_BLOCK, msg_byte_ptr: BLOCK_BYTE_PTR) {\n // Check all the way to the end of the block.\n verify_msg_block_zeros(msg_block, msg_byte_ptr, INT_BLOCK_SIZE);\n}\n\n// Verify that a region of ints in the message block are (partially) zeroed,\n// up to an (exclusive) maximum which can either be the end of the block\n// or just where the size is to be written.\nfn verify_msg_block_zeros(\n msg_block: MSG_BLOCK,\n mut msg_byte_ptr: BLOCK_BYTE_PTR,\n max_int_byte_ptr: u32,\n) {\n // This variable is used to get around the compiler under-constrained check giving a warning.\n // We want to check against a constant zero, but if it does not come from the circuit inputs\n // or return values the compiler check will issue a warning.\n let zero = msg_block[0] - msg_block[0];\n\n // First integer which is supposed to be (partially) zero.\n let mut int_byte_ptr = msg_byte_ptr / INT_SIZE;\n\n // Check partial zeros.\n let modulo = msg_byte_ptr % INT_SIZE;\n if modulo != 0 {\n let zeros = INT_SIZE - modulo;\n let mask = if zeros == 3 {\n TWO_POW_24\n } else if zeros == 2 {\n TWO_POW_16\n } else {\n TWO_POW_8\n };\n assert_eq(msg_block[int_byte_ptr] % mask, zero);\n int_byte_ptr = int_byte_ptr + 1;\n }\n\n // Check the rest of the items.\n for i in 0..max_int_byte_ptr {\n if i >= int_byte_ptr {\n assert_eq(msg_block[i], zero);\n }\n }\n}\n\n// Verify that up to the byte pointer the two blocks are equal.\n// At the byte pointer the new block can be partially zeroed.\nfn verify_msg_block_equals_last(\n msg_block: MSG_BLOCK,\n last_block: MSG_BLOCK,\n mut msg_byte_ptr: BLOCK_BYTE_PTR,\n) {\n // msg_byte_ptr is the position at which they are no longer have to be the same.\n // First integer which is supposed to be (partially) zero contains that pointer.\n let mut int_byte_ptr = msg_byte_ptr / INT_SIZE;\n\n // Check partial zeros.\n let modulo = msg_byte_ptr % INT_SIZE;\n if modulo != 0 {\n // Reconstruct the partially zero item from the last block.\n let last_field = last_block[int_byte_ptr];\n let mut msg_item: u32 = 0;\n // Reset to where they are still equal.\n msg_byte_ptr = msg_byte_ptr - modulo;\n for i in 0..INT_SIZE {\n msg_item = lshift8(msg_item, 1);\n if i < modulo {\n msg_item = msg_item + get_item_byte(last_field, msg_byte_ptr) as u32;\n msg_byte_ptr = msg_byte_ptr + 1;\n }\n }\n assert_eq(msg_block[int_byte_ptr], msg_item);\n }\n\n for i in 0..INT_SIZE_PTR {\n if i < int_byte_ptr {\n assert_eq(msg_block[i], last_block[i]);\n }\n }\n}\n\n// Set the rightmost `zeros` number of bytes to 0.\n#[inline_always]\nfn set_item_zeros(item: u32, zeros: u8) -> u32 {\n lshift8(rshift8(item, zeros), zeros)\n}\n\n// Replace one byte in the item with a value, and set everything after it to zero.\nfn set_item_byte_then_zeros(msg_item: u32, msg_byte_ptr: BLOCK_BYTE_PTR, msg_byte: u8) -> u32 {\n let zeros = INT_SIZE - msg_byte_ptr % INT_SIZE;\n let zeroed_item = set_item_zeros(msg_item, zeros as u8);\n let new_item = byte_into_item(msg_byte, msg_byte_ptr);\n zeroed_item + new_item\n}\n\n// Get a byte of a message item according to its overall position in the `BLOCK_SIZE` space.\nfn get_item_byte(mut msg_item: u32, msg_byte_ptr: BLOCK_BYTE_PTR) -> u8 {\n // How many times do we have to shift to the right to get to the position we want?\n let max_shifts = INT_SIZE - 1;\n let shifts = max_shifts - msg_byte_ptr % INT_SIZE;\n msg_item = rshift8(msg_item, shifts as u8);\n // At this point the byte we want is in the rightmost position.\n msg_item as u8\n}\n\n// Project a byte into a position in a field based on the overall block pointer.\n// For example putting 1 into pointer 5 would be 100, because overall we would\n// have [____, 0100] with indexes [0123,4567].\n#[inline_always]\nfn byte_into_item(msg_byte: u8, msg_byte_ptr: BLOCK_BYTE_PTR) -> u32 {\n let mut msg_item = msg_byte as u32;\n // How many times do we have to shift to the left to get to the position we want?\n let max_shifts = INT_SIZE - 1;\n let shifts = max_shifts - msg_byte_ptr % INT_SIZE;\n lshift8(msg_item, shifts as u8)\n}\n\n// Construct a field out of 4 bytes.\n#[inline_always]\nfn make_item(b0: u8, b1: u8, b2: u8, b3: u8) -> u32 {\n let mut item = b0 as u32;\n item = lshift8(item, 1) + b1 as u32;\n item = lshift8(item, 1) + b2 as u32;\n item = lshift8(item, 1) + b3 as u32;\n item\n}\n\n// Shift by 8 bits to the left between 0 and 4 times.\n// Checks `is_unconstrained()` to just use a bitshift if we're running in an unconstrained context,\n// otherwise multiplies by 256.\n#[inline_always]\nfn lshift8(item: u32, shifts: u8) -> u32 {\n if is_unconstrained() {\n // Brillig wouldn't shift 0<<4 without overflow.\n if shifts >= 4 {\n 0\n } else {\n item << (8 * shifts)\n }\n } else {\n // We can do a for loop up to INT_SIZE or an if-else.\n if shifts == 0 {\n item\n } else if shifts == 1 {\n item * TWO_POW_8\n } else if shifts == 2 {\n item * TWO_POW_16\n } else if shifts == 3 {\n item * TWO_POW_24\n } else {\n // Doesn't make sense, but it's most likely called on 0 anyway.\n 0\n }\n }\n}\n\n// Shift by 8 bits to the right between 0 and 4 times.\n// Checks `is_unconstrained()` to just use a bitshift if we're running in an unconstrained context,\n// otherwise divides by 256.\nfn rshift8(item: u32, shifts: u8) -> u32 {\n if is_unconstrained() {\n item >> (8 * shifts)\n } else {\n // Division wouldn't work on `Field`.\n if shifts == 0 {\n item\n } else if shifts == 1 {\n item / TWO_POW_8\n } else if shifts == 2 {\n item / TWO_POW_16\n } else if shifts == 3 {\n item / TWO_POW_24\n } else {\n 0\n }\n }\n}\n\n// Zero out all bytes between the end of the message and where the length is appended,\n// then write the length into the last 8 bytes of the block.\nunconstrained fn attach_len_to_msg_block(\n mut msg_block: MSG_BLOCK,\n mut msg_byte_ptr: BLOCK_BYTE_PTR,\n message_size: u32,\n) -> MSG_BLOCK {\n // We assume that `msg_byte_ptr` is less than 57 because if not then it is reset to zero before calling this function.\n // In any case, fill blocks up with zeros until the last 64 bits (i.e. until msg_byte_ptr = 56).\n // There can be one item which has to be partially zeroed.\n let modulo = msg_byte_ptr % INT_SIZE;\n if modulo != 0 {\n // Index of the block in which we find the item we need to partially zero.\n let i = msg_byte_ptr / INT_SIZE;\n let zeros = INT_SIZE - modulo;\n msg_block[i] = set_item_zeros(msg_block[i], zeros as u8);\n msg_byte_ptr = msg_byte_ptr + zeros;\n }\n\n // The rest can be zeroed without bit shifting anything.\n for i in (msg_byte_ptr / INT_SIZE)..INT_SIZE_PTR {\n msg_block[i] = 0;\n }\n\n // Set the last two 4 byte ints as the first/second half of the 8 bytes of the length.\n let len = 8 * message_size;\n let len_bytes: [u8; 8] = (len as Field).to_be_bytes();\n for i in 0..=1 {\n let shift = i * 4;\n msg_block[INT_SIZE_PTR + i] = make_item(\n len_bytes[shift],\n len_bytes[shift + 1],\n len_bytes[shift + 2],\n len_bytes[shift + 3],\n );\n }\n msg_block\n}\n\n// Verify that the message length was correctly written by `attach_len_to_msg_block`,\n// and that everything between the byte pointer and the size pointer was zeroed,\n// and that everything before the byte pointer was untouched.\nfn verify_msg_len(\n msg_block: MSG_BLOCK,\n last_block: MSG_BLOCK,\n msg_byte_ptr: BLOCK_BYTE_PTR,\n message_size: u32,\n) {\n // Check zeros up to the size pointer.\n verify_msg_block_zeros(msg_block, msg_byte_ptr, INT_SIZE_PTR);\n\n // Check that up to the pointer we match the last block.\n verify_msg_block_equals_last(msg_block, last_block, msg_byte_ptr);\n\n // We verify the message length was inserted correctly by reversing the byte decomposition.\n let mut reconstructed_len: u64 = 0;\n for i in INT_SIZE_PTR..INT_BLOCK_SIZE {\n reconstructed_len = reconstructed_len * TWO_POW_32;\n reconstructed_len = reconstructed_len + msg_block[i] as u64;\n }\n let len = 8 * message_size as u64;\n assert_eq(reconstructed_len, len);\n}\n\n// Perform the final compression, then transform the `STATE` into `HASH`.\nfn hash_final_block(msg_block: MSG_BLOCK, mut state: STATE) -> HASH {\n let mut out_h: HASH = [0; 32]; // Digest as sequence of bytes\n // Hash final padded block\n state = sha256_compression(msg_block, state);\n\n // Return final hash as byte array\n for j in 0..8 {\n let h_bytes: [u8; 4] = (state[j] as Field).to_be_bytes();\n for k in 0..4 {\n out_h[4 * j + k] = h_bytes[k];\n }\n }\n\n out_h\n}\n\nmod equivalence_test {\n\n #[test]\n fn test_implementations_agree(msg: [u8; 100], message_size: u64) {\n let message_size = message_size % 100;\n let unconstrained_sha = unsafe { super::__sha256_var(msg, message_size as u32) };\n let sha = super::sha256_var(msg, message_size);\n assert_eq(sha, unconstrained_sha);\n }\n}\n"
|
|
2976
|
-
},
|
|
2977
|
-
"42": {
|
|
2978
|
-
"path": "std/option.nr",
|
|
2979
|
-
"source": "use crate::cmp::{Eq, Ord, Ordering};\nuse crate::default::Default;\nuse crate::hash::{Hash, Hasher};\n\npub struct Option<T> {\n _is_some: bool,\n _value: T,\n}\n\nimpl<T> Option<T> {\n /// Constructs a None value\n pub fn none() -> Self {\n Self { _is_some: false, _value: crate::mem::zeroed() }\n }\n\n /// Constructs a Some wrapper around the given value\n pub fn some(_value: T) -> Self {\n Self { _is_some: true, _value }\n }\n\n /// True if this Option is None\n pub fn is_none(self) -> bool {\n !self._is_some\n }\n\n /// True if this Option is Some\n pub fn is_some(self) -> bool {\n self._is_some\n }\n\n /// Asserts `self.is_some()` and returns the wrapped value.\n pub fn unwrap(self) -> T {\n assert(self._is_some);\n self._value\n }\n\n /// Returns the inner value without asserting `self.is_some()`\n /// Note that if `self` is `None`, there is no guarantee what value will be returned,\n /// only that it will be of type `T`.\n pub fn unwrap_unchecked(self) -> T {\n self._value\n }\n\n /// Returns the wrapped value if `self.is_some()`. Otherwise, returns the given default value.\n pub fn unwrap_or(self, default: T) -> T {\n if self._is_some {\n self._value\n } else {\n default\n }\n }\n\n /// Returns the wrapped value if `self.is_some()`. Otherwise, calls the given function to return\n /// a default value.\n pub fn unwrap_or_else<Env>(self, default: fn[Env]() -> T) -> T {\n if self._is_some {\n self._value\n } else {\n default()\n }\n }\n\n /// Asserts `self.is_some()` with a provided custom message and returns the contained `Some` value\n pub fn expect<let N: u32, MessageTypes>(self, message: fmtstr<N, MessageTypes>) -> T {\n assert(self.is_some(), message);\n self._value\n }\n\n /// If self is `Some(x)`, this returns `Some(f(x))`. Otherwise, this returns `None`.\n pub fn map<U, Env>(self, f: fn[Env](T) -> U) -> Option<U> {\n if self._is_some {\n Option::some(f(self._value))\n } else {\n Option::none()\n }\n }\n\n /// If self is `Some(x)`, this returns `f(x)`. Otherwise, this returns the given default value.\n pub fn map_or<U, Env>(self, default: U, f: fn[Env](T) -> U) -> U {\n if self._is_some {\n f(self._value)\n } else {\n default\n }\n }\n\n /// If self is `Some(x)`, this returns `f(x)`. Otherwise, this returns `default()`.\n pub fn map_or_else<U, Env1, Env2>(self, default: fn[Env1]() -> U, f: fn[Env2](T) -> U) -> U {\n if self._is_some {\n f(self._value)\n } else {\n default()\n }\n }\n\n /// Returns None if self is None. Otherwise, this returns `other`.\n pub fn and(self, other: Self) -> Self {\n if self.is_none() {\n Option::none()\n } else {\n other\n }\n }\n\n /// If self is None, this returns None. Otherwise, this calls the given function\n /// with the Some value contained within self, and returns the result of that call.\n ///\n /// In some languages this function is called `flat_map` or `bind`.\n pub fn and_then<U, Env>(self, f: fn[Env](T) -> Option<U>) -> Option<U> {\n if self._is_some {\n f(self._value)\n } else {\n Option::none()\n }\n }\n\n /// If self is Some, return self. Otherwise, return `other`.\n pub fn or(self, other: Self) -> Self {\n if self._is_some {\n self\n } else {\n other\n }\n }\n\n /// If self is Some, return self. Otherwise, return `default()`.\n pub fn or_else<Env>(self, default: fn[Env]() -> Self) -> Self {\n if self._is_some {\n self\n } else {\n default()\n }\n }\n\n // If only one of the two Options is Some, return that option.\n // Otherwise, if both options are Some or both are None, None is returned.\n pub fn xor(self, other: Self) -> Self {\n if self._is_some {\n if other._is_some {\n Option::none()\n } else {\n self\n }\n } else if other._is_some {\n other\n } else {\n Option::none()\n }\n }\n\n /// Returns `Some(x)` if self is `Some(x)` and `predicate(x)` is true.\n /// Otherwise, this returns `None`\n pub fn filter<Env>(self, predicate: fn[Env](T) -> bool) -> Self {\n if self._is_some {\n if predicate(self._value) {\n self\n } else {\n Option::none()\n }\n } else {\n Option::none()\n }\n }\n\n /// Flattens an Option<Option<T>> into a Option<T>.\n /// This returns None if the outer Option is None. Otherwise, this returns the inner Option.\n pub fn flatten(option: Option<Option<T>>) -> Option<T> {\n if option._is_some {\n option._value\n } else {\n Option::none()\n }\n }\n}\n\nimpl<T> Default for Option<T> {\n fn default() -> Self {\n Option::none()\n }\n}\n\nimpl<T> Eq for Option<T>\nwhere\n T: Eq,\n{\n fn eq(self, other: Self) -> bool {\n if self._is_some == other._is_some {\n if self._is_some {\n self._value == other._value\n } else {\n true\n }\n } else {\n false\n }\n }\n}\n\nimpl<T> Hash for Option<T>\nwhere\n T: Hash,\n{\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n self._is_some.hash(state);\n if self._is_some {\n self._value.hash(state);\n }\n }\n}\n\n// For this impl we're declaring Option::none < Option::some\nimpl<T> Ord for Option<T>\nwhere\n T: Ord,\n{\n fn cmp(self, other: Self) -> Ordering {\n if self._is_some {\n if other._is_some {\n self._value.cmp(other._value)\n } else {\n Ordering::greater()\n }\n } else if other._is_some {\n Ordering::less()\n } else {\n Ordering::equal()\n }\n }\n}\n"
|
|
2980
|
-
},
|
|
2981
2611
|
"43": {
|
|
2982
2612
|
"path": "std/panic.nr",
|
|
2983
2613
|
"source": "pub fn panic<T, U, let N: u32>(message: fmtstr<N, T>) -> U {\n assert(false, message);\n crate::mem::zeroed()\n}\n"
|
|
@@ -2990,14 +2620,6 @@
|
|
|
2990
2620
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/authwit/src/auth.nr",
|
|
2991
2621
|
"source": "use dep::aztec::{context::{gas::GasOpts, PrivateContext, PublicContext}, hash::hash_args_array};\nuse dep::aztec::protocol_types::{\n abis::function_selector::FunctionSelector,\n address::AztecAddress,\n constants::{\n CANONICAL_AUTH_REGISTRY_ADDRESS, GENERATOR_INDEX__AUTHWIT_INNER,\n GENERATOR_INDEX__AUTHWIT_NULLIFIER, GENERATOR_INDEX__AUTHWIT_OUTER,\n },\n hash::poseidon2_hash_with_separator,\n traits::ToField,\n};\n\n/**\n * Authenticaion witness helper library\n *\n * Authentication Witness is a scheme for authenticating actions on Aztec, so users can allow third-parties\n * (e.g. protocols or other users) to execute an action on their behalf.\n *\n * This library provides helper functions to manage such witnesses.\n * The authentication witness, is some \"witness\" (data) that authenticates a `message_hash`.\n * The simplest example of an authentication witness, is a signature. The signature is the \"evidence\",\n * that the signer has seen the message, agrees with it, and has allowed it.\n * It does not need to be a signature. It could be any kind of \"proof\" that the message is allowed.\n * Another proof could be knowing some kind of secret, or having some kind of \"token\" that allows the message.\n *\n * The `message_hash` is a hash of the following structure:\n * hash(consumer, chain_id, version, inner_hash)\n * - consumer: the address of the contract that is \"consuming\" the message,\n * - chain_id: the chain id of the chain that the message is being consumed on,\n * - version: the version of the chain that the message is being consumed on,\n * - inner_hash: the hash of the \"inner\" message that is being consumed, this is the \"actual\" message or action.\n *\n * While the `inner_hash` could be anything, such as showing you signed a specific message, it will often be\n * a hash of the \"action\" to approve, along with who made the call. As part of this library, we provide a few\n * helper functions to deal with such messages.\n *\n * For example, we provide helper function that is used for checking that the message is an encoding of the current call.\n * This can be used to let some contract \"allow\" another contract to act on its behalf, as long as it can\n * show that it is acting on behalf of the contract.\n *\n * If we take a case of allowing a contract to transfer tokens on behalf of an account, the `inner_hash` can be\n * derived as:\n * inner_hash = hash(caller, \"transfer\", hash(to, amount))\n *\n * Where the `caller` would be the address of the contract that is trying to transfer the tokens, and `to` and `amount`\n * the arguments for the transfer.\n *\n * Note that we have both a `caller` and a `consumer`, the `consumer` will be the contract that is consuming the message,\n * in the case of the transfer, it would be the `Token` contract itself, while the caller, will be the actor that is\n * allowed to transfer the tokens.\n *\n *\n * The authentication mechanism works differently in public and private contexts. In private, we recall that everything\n * is executed on the user's device, so we can use `oracles` to \"ask\" the user (not contract) for information. In public\n * we cannot do this, since it is executed by the sequencer (someone else). Therefore we can instead use a \"registry\"\n * to store the messages that we have approved.\n *\n * A simple example would be a \"token\" that is being \"pulled\" from one account into another. We will first outline\n * how this would look in private, and then in public later.\n *\n * Say that a user `Alice` wants to deposit some tokens into a DeFi protocol (say a DEX).\n * `Alice` would make a `deposit` transaction, that she is executing using her account contract.\n * The account would call the `DeFi` contract to execute `deposit`, which would try to pull funds from the `Token`\n * contract. Since the `DeFi` contract is trying to pull funds from an account that is not its own, it needs to\n * convince the `Token` contract that it is allowed to do so.\n *\n * This is where the authentication witness comes in The `Token` contract computes a `message_hash` from the\n * `transfer` call, and then asks `Alice Account` contract to verify that the `DeFi` contract is allowed to\n * execute that call.\n *\n * `Alice Account` contract can then ask `Alice` if she wants to allow the `DeFi` contract to pull funds from her\n * account. If she does, she will sign the `message_hash` and return the signature to the `Alice Account` which\n * will validate it and return success to the `Token` contract which will then allow the `DeFi` contract to pull\n * funds from `Alice`.\n *\n * To ensure that the same \"approval\" cannot be used multiple times, we also compute a `nullifier` for the\n * authentication witness, and emit it from the `Token` contract (consumer).\n *\n * Note that we can do this flow as we are in private were we can do oracle calls out from contracts.\n *\n *\n * Person Contract Contract Contract\n * Alice Alice Account Token DeFi\n * | | | |\n * | Defi.deposit(Token, 1000) | |\n * |----------------->| | |\n * | | deposit(Token, 1000) |\n * | |---------------------------------------->|\n * | | | |\n * | | | transfer(Alice, Defi, 1000)\n * | | |<---------------------|\n * | | | |\n * | | Check if Defi may call transfer(Alice, Defi, 1000)\n * | |<-----------------| |\n * | | | |\n * | Please give me AuthWit for DeFi | |\n * | calling transfer(Alice, Defi, 1000) | |\n * |<-----------------| | |\n * | | | |\n * | | | |\n * | AuthWit for transfer(Alice, Defi, 1000) |\n * |----------------->| | |\n * | | AuthWit validity | |\n * | |----------------->| |\n * | | | |\n * | | throw if invalid AuthWit |\n * | | | |\n * | | emit AuthWit nullifier |\n * | | | |\n * | | transfer(Alice, Defi, 1000) |\n * | | | |\n * | | | |\n * | | | success |\n * | | |--------------------->|\n * | | | |\n * | | | |\n * | | | deposit(Token, 1000)\n * | | | |\n * | | | |\n *\n *\n * If we instead were in public, we cannot do the same flow. Instead we would use an authentication registry to store\n * the messages that we have approved.\n *\n * To approve a message, `Alice Account` can make a `set_authorized` call to the registry, to set a `message_hash`\n * as authorized. This is essentially a mapping from `message_hash` to `true` for `Alice Contract`. Every account\n * has its own map in the registry, so `Alice` cannot approve a message for `Bob`.\n *\n * The `Token` contract can then try to \"spend\" the approval by calling `consume` on the registry. If the message\n * was approved, the value is updated to `false`, and we return the success flag. For more information on the\n * registry, see `main.nr` in `auth_registry_contract`.\n *\n * Person Contract Contract Contract Contract\n * Alice Alice Account Registry Token DeFi\n * | | | | |\n * | Registry.set_authorized(..., true) | | |\n * |----------------->| | | |\n * | | set_authorized(..., true) | |\n * | |------------------->| | |\n * | | | | |\n * | | set authorized to true | |\n * | | | | |\n * | | | | |\n * | Defi.deposit(Token, 1000) | | |\n * |----------------->| | | |\n * | | deposit(Token, 1000) | |\n * | |-------------------------------------------------------------->|\n * | | | | |\n * | | | transfer(Alice, Defi, 1000) |\n * | | | |<---------------------|\n * | | | | |\n * | | | Check if Defi may call transfer(Alice, Defi, 1000)\n * | | |<------------------| |\n * | | | | |\n * | | throw if invalid AuthWit | |\n * | | | | |\n * | | | | |\n * | | set authorized to false | |\n * | | | | |\n * | | | | |\n * | | | AuthWit validity | |\n * | | |------------------>| |\n * | | | | |\n * | | | | transfer(Alice, Defi, 1000)\n * | | | |<-------------------->|\n * | | | | |\n * | | | | success |\n * | | | |--------------------->|\n * | | | | |\n * | | | | deposit(Token, 1000)\n * | | | | |\n *\n *\n * --- FAQ ---\n * Q: Why are we using a success flag of `poseidon2_hash_bytes(\"IS_VALID()\")` instead of just returning a boolean?\n * A: We want to make sure that we don't accidentally return `true` if there is a collision in the function selector.\n * By returning a hash of `IS_VALID()`, it becomes very unlikely that there is both a collision and we return\n * a success flag.\n *\n * Q: Why are we using static calls?\n * A: We are using static calls to ensure that the account contract cannot re-enter. If it was a normal call, it\n * could make a new call and do a re-entry attack. Using a static ensures that it cannot update any state.\n *\n * Q: Would it not be cheaper to use a nullifier instead of updating state in public?\n * A: At a quick glance, a public state update + nullifier is 96 bytes, but two state updates are 128, so it would be\n * cheaper to use a nullifier, if this is the way it would always be done. However, if both the approval and the\n * consumption is done in the same transaction, then we will be able to squash the updates (only final tx state diff is posted to DA), and now it is cheaper.\n *\n * Q: Why is the chain id and the version part of the message hash?\n * A: The chain id and the version is part of the message hash to ensure that the message is only valid on a specific\n * chain to avoid a case where the same message could be used across multiple chains.\n */\n\npub global IS_VALID_SELECTOR: Field = 0x47dacd73; // 4 last bytes of poseidon2_hash_bytes(\"IS_VALID()\")\n\n/**\n * Assert that `on_behalf_of` has authorized the current call with a valid authentication witness\n *\n * Compute the `inner_hash` using the `msg_sender`, `selector` and `args_hash` and then make a call out to the\n * `on_behalf_of` contract to verify that the `inner_hash` is valid.\n *\n * @param on_behalf_of The address that has allegedly authorized the current call\n */\n// docs:start:assert_current_call_valid_authwit\npub fn assert_current_call_valid_authwit(context: &mut PrivateContext, on_behalf_of: AztecAddress) {\n let inner_hash = compute_inner_authwit_hash([\n context.msg_sender().to_field(),\n context.selector().to_field(),\n context.args_hash,\n ]);\n assert_inner_hash_valid_authwit(context, on_behalf_of, inner_hash);\n}\n// docs:end:assert_current_call_valid_authwit\n\n/**\n * Assert that a specific `inner_hash` is valid for the `on_behalf_of` address\n *\n * Used as an internal function for `assert_current_call_valid_authwit` and can be used as a standalone function when\n * the `inner_hash` is from a different source, e.g., say a block of text etc.\n *\n * @param on_behalf_of The address that has allegedly authorized the current call\n * @param inner_hash The hash of the message to authorize\n */\npub fn assert_inner_hash_valid_authwit(\n context: &mut PrivateContext,\n on_behalf_of: AztecAddress,\n inner_hash: Field,\n) {\n // We perform a static call here and not a standard one to ensure that the account contract cannot re-enter.\n let result: Field = context\n .static_call_private_function(\n on_behalf_of,\n comptime { FunctionSelector::from_signature(\"verify_private_authwit(Field)\") },\n [inner_hash],\n )\n .get_preimage();\n assert(result == IS_VALID_SELECTOR, \"Message not authorized by account\");\n // Compute the nullifier, similar computation to the outer hash, but without the chain_id and version.\n // Those should already be handled in the verification, so we just need something to nullify, that allows the same inner_hash for multiple actors.\n let nullifier = compute_authwit_nullifier(on_behalf_of, inner_hash);\n context.push_nullifier(nullifier);\n}\n\n/**\n * Assert that `on_behalf_of` has authorized the current call in the authentication registry\n *\n * Compute the `inner_hash` using the `msg_sender`, `selector` and `args_hash` and then make a call out to the\n * `on_behalf_of` contract to verify that the `inner_hash` is valid.\n *\n * Note that the authentication registry will take the `msg_sender` into account as the consumer, so this will only\n * work if the `msg_sender` is the same as the `consumer` when the `message_hash` was inserted into the registry.\n *\n * @param on_behalf_of The address that has allegedly authorized the current call\n */\n// docs:start:assert_current_call_valid_authwit_public\npub unconstrained fn assert_current_call_valid_authwit_public(\n context: &mut PublicContext,\n on_behalf_of: AztecAddress,\n) {\n let inner_hash = compute_inner_authwit_hash([\n (*context).msg_sender().to_field(),\n (*context).selector().to_field(),\n (*context).get_args_hash(),\n ]);\n assert_inner_hash_valid_authwit_public(context, on_behalf_of, inner_hash);\n}\n// docs:end:assert_current_call_valid_authwit_public\n\n/**\n * Assert that `on_behalf_of` has authorized a specific `inner_hash` in the authentication registry\n *\n * Compute the `inner_hash` using the `msg_sender`, `selector` and `args_hash` and then make a call out to the\n * `on_behalf_of` contract to verify that the `inner_hash` is valid.\n *\n * Note that the authentication registry will take the `msg_sender` into account as the consumer, so this will only\n * work if the `msg_sender` is the same as the `consumer` when the `message_hash` was inserted into the registry.\n *\n * @param on_behalf_of The address that has allegedly authorized the `inner_hash`\n */\npub unconstrained fn assert_inner_hash_valid_authwit_public(\n context: &mut PublicContext,\n on_behalf_of: AztecAddress,\n inner_hash: Field,\n) {\n let results: [Field] = context.call_public_function(\n CANONICAL_AUTH_REGISTRY_ADDRESS,\n comptime { FunctionSelector::from_signature(\"consume((Field),Field)\") },\n [on_behalf_of.to_field(), inner_hash].as_slice(),\n GasOpts::default(),\n );\n assert(results.len() == 1, \"Invalid response from registry\");\n assert(results[0] == IS_VALID_SELECTOR, \"Message not authorized by account\");\n}\n\n/**\n * Compute the `message_hash` from a function call to be used by an authentication witness\n *\n * Useful for when you need a non-account contract to approve during execution. For example if you need a contract\n * to make a call to nested contract, e.g., contract A wants to exit token T to L1 using bridge B, so it needs to allow\n * B to transfer T on its behalf.\n *\n * @param caller The address of the contract that is calling the function, in the example above, this would be B\n * @param consumer The address of the contract that is consuming the message, in the example above, this would be T\n * @param chain_id The chain id of the chain that the message is being consumed on\n * @param version The version of the chain that the message is being consumed on\n * @param selector The function selector of the function that is being called\n * @param args The arguments of the function that is being called\n */\n// docs:start:compute_authwit_message_hash_from_call\npub fn compute_authwit_message_hash_from_call<let N: u32>(\n caller: AztecAddress,\n consumer: AztecAddress,\n chain_id: Field,\n version: Field,\n selector: FunctionSelector,\n args: [Field; N],\n) -> Field {\n let args_hash = hash_args_array(args);\n let inner_hash =\n compute_inner_authwit_hash([caller.to_field(), selector.to_field(), args_hash]);\n compute_authwit_message_hash(consumer, chain_id, version, inner_hash)\n}\n// docs:end:compute_authwit_message_hash_from_call\n\n/**\n * Computes the `inner_hash` of the authentication witness\n *\n * This is used internally, but also useful in cases where you want to compute the `inner_hash` for a specific message\n * that is not necessarily a call, but just some \"bytes\" or text.\n *\n * @param args The arguments to hash\n */\npub fn compute_inner_authwit_hash<let N: u32>(args: [Field; N]) -> Field {\n poseidon2_hash_with_separator(args, GENERATOR_INDEX__AUTHWIT_INNER)\n}\n\n/**\n * Computes the `authwit_nullifier` for a specific `on_behalf_of` and `inner_hash`\n *\n * Using the `on_behalf_of` and the `inner_hash` to ensure that the nullifier is siloed for a specific `on_behalf_of`.\n *\n * @param on_behalf_of The address that has authorized the `inner_hash`\n * @param inner_hash The hash of the message to authorize\n */\npub fn compute_authwit_nullifier(on_behalf_of: AztecAddress, inner_hash: Field) -> Field {\n poseidon2_hash_with_separator(\n [on_behalf_of.to_field(), inner_hash],\n GENERATOR_INDEX__AUTHWIT_NULLIFIER,\n )\n}\n\n/**\n * Computes the `message_hash` for the authentication witness\n *\n * @param consumer The address of the contract that is consuming the message\n * @param chain_id The chain id of the chain that the message is being consumed on\n * @param version The version of the chain that the message is being consumed on\n * @param inner_hash The hash of the \"inner\" message that is being consumed\n */\npub fn compute_authwit_message_hash(\n consumer: AztecAddress,\n chain_id: Field,\n version: Field,\n inner_hash: Field,\n) -> Field {\n poseidon2_hash_with_separator(\n [consumer.to_field(), chain_id, version, inner_hash],\n GENERATOR_INDEX__AUTHWIT_OUTER,\n )\n}\n\n/**\n * Helper function to set the authorization status of a message hash\n *\n * Wraps a public call to the authentication registry to set the authorization status of a `message_hash`\n *\n * @param message_hash The hash of the message to authorize\n * @param authorize True if the message should be authorized, false if it should be revoked\n */\npub unconstrained fn set_authorized(\n context: &mut PublicContext,\n message_hash: Field,\n authorize: bool,\n) {\n let res = context.call_public_function(\n CANONICAL_AUTH_REGISTRY_ADDRESS,\n comptime { FunctionSelector::from_signature(\"set_authorized(Field,bool)\") },\n [message_hash, authorize as Field].as_slice(),\n GasOpts::default(),\n );\n assert(res.len() == 0);\n}\n\n/**\n * Helper function to reject all authwits\n *\n * Wraps a public call to the authentication registry to set the `reject_all` flag\n *\n * @param reject True if all authwits should be rejected, false otherwise\n */\npub unconstrained fn set_reject_all(context: &mut PublicContext, reject: bool) {\n let res = context.call_public_function(\n CANONICAL_AUTH_REGISTRY_ADDRESS,\n comptime { FunctionSelector::from_signature(\"set_reject_all(bool)\") },\n [context.this_address().to_field(), reject as Field].as_slice(),\n GasOpts::default(),\n );\n assert(res.len() == 0);\n}\n"
|
|
2992
2622
|
},
|
|
2993
|
-
"6": {
|
|
2994
|
-
"path": "std/collections/bounded_vec.nr",
|
|
2995
|
-
"source": "use crate::{cmp::Eq, convert::From, runtime::is_unconstrained, static_assert};\n\n/// A `BoundedVec<T, MaxLen>` is a growable storage similar to a `Vec<T>` except that it\n/// is bounded with a maximum possible length. Unlike `Vec`, `BoundedVec` is not implemented\n/// via slices and thus is not subject to the same restrictions slices are (notably, nested\n/// slices - and thus nested vectors as well - are disallowed).\n///\n/// Since a BoundedVec is backed by a normal array under the hood, growing the BoundedVec by\n/// pushing an additional element is also more efficient - the length only needs to be increased\n/// by one.\n///\n/// For these reasons `BoundedVec<T, N>` should generally be preferred over `Vec<T>` when there\n/// is a reasonable maximum bound that can be placed on the vector.\n///\n/// Example:\n///\n/// ```noir\n/// let mut vector: BoundedVec<Field, 10> = BoundedVec::new();\n/// for i in 0..5 {\n/// vector.push(i);\n/// }\n/// assert(vector.len() == 5);\n/// assert(vector.max_len() == 10);\n/// ```\npub struct BoundedVec<T, let MaxLen: u32> {\n storage: [T; MaxLen],\n len: u32,\n}\n\nimpl<T, let MaxLen: u32> BoundedVec<T, MaxLen> {\n /// Creates a new, empty vector of length zero.\n ///\n /// Since this container is backed by an array internally, it still needs an initial value\n /// to give each element. To resolve this, each element is zeroed internally. This value\n /// is guaranteed to be inaccessible unless `get_unchecked` is used.\n ///\n /// Example:\n ///\n /// ```noir\n /// let empty_vector: BoundedVec<Field, 10> = BoundedVec::new();\n /// assert(empty_vector.len() == 0);\n /// ```\n ///\n /// Note that whenever calling `new` the maximum length of the vector should always be specified\n /// via a type signature:\n ///\n /// ```noir\n /// fn good() -> BoundedVec<Field, 10> {\n /// // Ok! MaxLen is specified with a type annotation\n /// let v1: BoundedVec<Field, 3> = BoundedVec::new();\n /// let v2 = BoundedVec::new();\n ///\n /// // Ok! MaxLen is known from the type of `good`'s return value\n /// v2\n /// }\n ///\n /// fn bad() {\n /// // Error: Type annotation needed\n /// // The compiler can't infer `MaxLen` from the following code:\n /// let mut v3 = BoundedVec::new();\n /// v3.push(5);\n /// }\n /// ```\n ///\n /// This defaulting of `MaxLen` (and numeric generics in general) to zero may change in future noir versions\n /// but for now make sure to use type annotations when using bounded vectors. Otherwise, you will receive a\n /// constraint failure at runtime when the vec is pushed to.\n pub fn new() -> Self {\n let zeroed = crate::mem::zeroed();\n BoundedVec { storage: [zeroed; MaxLen], len: 0 }\n }\n\n /// Retrieves an element from the vector at the given index, starting from zero.\n ///\n /// If the given index is equal to or greater than the length of the vector, this\n /// will issue a constraint failure.\n ///\n /// Example:\n ///\n /// ```noir\n /// fn foo<let N: u32>(v: BoundedVec<u32, N>) {\n /// let first = v.get(0);\n /// let last = v.get(v.len() - 1);\n /// assert(first != last);\n /// }\n /// ```\n pub fn get(self, index: u32) -> T {\n assert(index < self.len, \"Attempted to read past end of BoundedVec\");\n self.get_unchecked(index)\n }\n\n /// Retrieves an element from the vector at the given index, starting from zero, without\n /// performing a bounds check.\n ///\n /// Since this function does not perform a bounds check on length before accessing the element,\n /// it is unsafe! Use at your own risk!\n ///\n /// Example:\n ///\n /// ```noir\n /// fn sum_of_first_three<let N: u32>(v: BoundedVec<u32, N>) -> u32 {\n /// // Always ensure the length is larger than the largest\n /// // index passed to get_unchecked\n /// assert(v.len() > 2);\n /// let first = v.get_unchecked(0);\n /// let second = v.get_unchecked(1);\n /// let third = v.get_unchecked(2);\n /// first + second + third\n /// }\n /// ```\n pub fn get_unchecked(self, index: u32) -> T {\n self.storage[index]\n }\n\n /// Writes an element to the vector at the given index, starting from zero.\n ///\n /// If the given index is equal to or greater than the length of the vector, this will issue a constraint failure.\n ///\n /// Example:\n ///\n /// ```noir\n /// fn foo<let N: u32>(v: BoundedVec<u32, N>) {\n /// let first = v.get(0);\n /// assert(first != 42);\n /// v.set(0, 42);\n /// let new_first = v.get(0);\n /// assert(new_first == 42);\n /// }\n /// ```\n pub fn set(&mut self, index: u32, value: T) {\n assert(index < self.len, \"Attempted to write past end of BoundedVec\");\n self.set_unchecked(index, value)\n }\n\n /// Writes an element to the vector at the given index, starting from zero, without performing a bounds check.\n ///\n /// Since this function does not perform a bounds check on length before accessing the element, it is unsafe! Use at your own risk!\n ///\n /// Example:\n ///\n /// ```noir\n /// fn set_unchecked_example() {\n /// let mut vec: BoundedVec<u32, 5> = BoundedVec::new();\n /// vec.extend_from_array([1, 2]);\n ///\n /// // Here we're safely writing within the valid range of `vec`\n /// // `vec` now has the value [42, 2]\n /// vec.set_unchecked(0, 42);\n ///\n /// // We can then safely read this value back out of `vec`.\n /// // Notice that we use the checked version of `get` which would prevent reading unsafe values.\n /// assert_eq(vec.get(0), 42);\n ///\n /// // We've now written past the end of `vec`.\n /// // As this index is still within the maximum potential length of `v`,\n /// // it won't cause a constraint failure.\n /// vec.set_unchecked(2, 42);\n /// println(vec);\n ///\n /// // This will write past the end of the maximum potential length of `vec`,\n /// // it will then trigger a constraint failure.\n /// vec.set_unchecked(5, 42);\n /// println(vec);\n /// }\n /// ```\n pub fn set_unchecked(&mut self, index: u32, value: T) {\n self.storage[index] = value;\n }\n\n /// Pushes an element to the end of the vector. This increases the length\n /// of the vector by one.\n ///\n /// Panics if the new length of the vector will be greater than the max length.\n ///\n /// Example:\n ///\n /// ```noir\n /// let mut v: BoundedVec<Field, 2> = BoundedVec::new();\n ///\n /// v.push(1);\n /// v.push(2);\n ///\n /// // Panics with failed assertion \"push out of bounds\"\n /// v.push(3);\n /// ```\n pub fn push(&mut self, elem: T) {\n assert(self.len < MaxLen, \"push out of bounds\");\n\n self.storage[self.len] = elem;\n self.len += 1;\n }\n\n /// Returns the current length of this vector\n ///\n /// Example:\n ///\n /// ```noir\n /// let mut v: BoundedVec<Field, 4> = BoundedVec::new();\n /// assert(v.len() == 0);\n ///\n /// v.push(100);\n /// assert(v.len() == 1);\n ///\n /// v.push(200);\n /// v.push(300);\n /// v.push(400);\n /// assert(v.len() == 4);\n ///\n /// let _ = v.pop();\n /// let _ = v.pop();\n /// assert(v.len() == 2);\n /// ```\n pub fn len(self) -> u32 {\n self.len\n }\n\n /// Returns the maximum length of this vector. This is always\n /// equal to the `MaxLen` parameter this vector was initialized with.\n ///\n /// Example:\n ///\n /// ```noir\n /// let mut v: BoundedVec<Field, 5> = BoundedVec::new();\n ///\n /// assert(v.max_len() == 5);\n /// v.push(10);\n /// assert(v.max_len() == 5);\n /// ```\n pub fn max_len(_self: BoundedVec<T, MaxLen>) -> u32 {\n MaxLen\n }\n\n /// Returns the internal array within this vector.\n ///\n /// Since arrays in Noir are immutable, mutating the returned storage array will not mutate\n /// the storage held internally by this vector.\n ///\n /// Note that uninitialized elements may be zeroed out!\n ///\n /// Example:\n ///\n /// ```noir\n /// let mut v: BoundedVec<Field, 5> = BoundedVec::new();\n ///\n /// assert(v.storage() == [0, 0, 0, 0, 0]);\n ///\n /// v.push(57);\n /// assert(v.storage() == [57, 0, 0, 0, 0]);\n /// ```\n pub fn storage(self) -> [T; MaxLen] {\n self.storage\n }\n\n /// Pushes each element from the given array to this vector.\n ///\n /// Panics if pushing each element would cause the length of this vector\n /// to exceed the maximum length.\n ///\n /// Example:\n ///\n /// ```noir\n /// let mut vec: BoundedVec<Field, 3> = BoundedVec::new();\n /// vec.extend_from_array([2, 4]);\n ///\n /// assert(vec.len == 2);\n /// assert(vec.get(0) == 2);\n /// assert(vec.get(1) == 4);\n /// ```\n pub fn extend_from_array<let Len: u32>(&mut self, array: [T; Len]) {\n let new_len = self.len + array.len();\n assert(new_len <= MaxLen, \"extend_from_array out of bounds\");\n for i in 0..array.len() {\n self.storage[self.len + i] = array[i];\n }\n self.len = new_len;\n }\n\n /// Pushes each element from the given slice to this vector.\n ///\n /// Panics if pushing each element would cause the length of this vector\n /// to exceed the maximum length.\n ///\n /// Example:\n ///\n /// ```noir\n /// let mut vec: BoundedVec<Field, 3> = BoundedVec::new();\n /// vec.extend_from_slice(&[2, 4]);\n ///\n /// assert(vec.len == 2);\n /// assert(vec.get(0) == 2);\n /// assert(vec.get(1) == 4);\n /// ```\n pub fn extend_from_slice(&mut self, slice: [T]) {\n let new_len = self.len + slice.len();\n assert(new_len <= MaxLen, \"extend_from_slice out of bounds\");\n for i in 0..slice.len() {\n self.storage[self.len + i] = slice[i];\n }\n self.len = new_len;\n }\n\n /// Pushes each element from the other vector to this vector. The length of\n /// the other vector is left unchanged.\n ///\n /// Panics if pushing each element would cause the length of this vector\n /// to exceed the maximum length.\n ///\n /// ```noir\n /// let mut v1: BoundedVec<Field, 5> = BoundedVec::new();\n /// let mut v2: BoundedVec<Field, 7> = BoundedVec::new();\n ///\n /// v2.extend_from_array([1, 2, 3]);\n /// v1.extend_from_bounded_vec(v2);\n ///\n /// assert(v1.storage() == [1, 2, 3, 0, 0]);\n /// assert(v2.storage() == [1, 2, 3, 0, 0, 0, 0]);\n /// ```\n pub fn extend_from_bounded_vec<let Len: u32>(&mut self, vec: BoundedVec<T, Len>) {\n let append_len = vec.len();\n let new_len = self.len + append_len;\n assert(new_len <= MaxLen, \"extend_from_bounded_vec out of bounds\");\n\n if is_unconstrained() {\n for i in 0..append_len {\n self.storage[self.len + i] = vec.get_unchecked(i);\n }\n } else {\n let mut exceeded_len = false;\n for i in 0..Len {\n exceeded_len |= i == append_len;\n if !exceeded_len {\n self.storage[self.len + i] = vec.get_unchecked(i);\n }\n }\n }\n self.len = new_len;\n }\n\n /// Creates a new vector, populating it with values derived from an array input.\n /// The maximum length of the vector is determined based on the type signature.\n ///\n /// Example:\n ///\n /// ```noir\n /// let bounded_vec: BoundedVec<Field, 10> = BoundedVec::from_array([1, 2, 3])\n /// ```\n pub fn from_array<let Len: u32>(array: [T; Len]) -> Self {\n static_assert(Len <= MaxLen, \"from array out of bounds\");\n let mut vec: BoundedVec<T, MaxLen> = BoundedVec::new();\n vec.extend_from_array(array);\n vec\n }\n\n /// Pops the element at the end of the vector. This will decrease the length\n /// of the vector by one.\n ///\n /// Panics if the vector is empty.\n ///\n /// Example:\n ///\n /// ```noir\n /// let mut v: BoundedVec<Field, 2> = BoundedVec::new();\n /// v.push(1);\n /// v.push(2);\n ///\n /// let two = v.pop();\n /// let one = v.pop();\n ///\n /// assert(two == 2);\n /// assert(one == 1);\n ///\n /// // error: cannot pop from an empty vector\n /// let _ = v.pop();\n /// ```\n pub fn pop(&mut self) -> T {\n assert(self.len > 0);\n self.len -= 1;\n\n let elem = self.storage[self.len];\n self.storage[self.len] = crate::mem::zeroed();\n elem\n }\n\n /// Returns true if the given predicate returns true for any element\n /// in this vector.\n ///\n /// Example:\n ///\n /// ```noir\n /// let mut v: BoundedVec<u32, 3> = BoundedVec::new();\n /// v.extend_from_array([2, 4, 6]);\n ///\n /// let all_even = !v.any(|elem: u32| elem % 2 != 0);\n /// assert(all_even);\n /// ```\n pub fn any<Env>(self, predicate: fn[Env](T) -> bool) -> bool {\n let mut ret = false;\n if is_unconstrained() {\n for i in 0..self.len {\n ret |= predicate(self.storage[i]);\n }\n } else {\n let mut ret = false;\n let mut exceeded_len = false;\n for i in 0..MaxLen {\n exceeded_len |= i == self.len;\n if !exceeded_len {\n ret |= predicate(self.storage[i]);\n }\n }\n }\n ret\n }\n\n /// Creates a new vector of equal size by calling a closure on each element in this vector.\n ///\n /// Example:\n ///\n /// ```noir\n /// let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n /// let result = vec.map(|value| value * 2);\n ///\n /// let expected = BoundedVec::from_array([2, 4, 6, 8]);\n /// assert_eq(result, expected);\n /// ```\n pub fn map<U, Env>(self, f: fn[Env](T) -> U) -> BoundedVec<U, MaxLen> {\n let mut ret = BoundedVec::new();\n ret.len = self.len();\n\n if is_unconstrained() {\n for i in 0..self.len() {\n ret.storage[i] = f(self.get_unchecked(i));\n }\n } else {\n for i in 0..MaxLen {\n if i < self.len() {\n ret.storage[i] = f(self.get_unchecked(i));\n }\n }\n }\n\n ret\n }\n\n /// Creates a new vector of equal size by calling a closure on each element\n /// in this vector, along with its index.\n ///\n /// Example:\n ///\n /// ```noir\n /// let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n /// let result = vec.mapi(|i, value| i + value * 2);\n ///\n /// let expected = BoundedVec::from_array([2, 5, 8, 11]);\n /// assert_eq(result, expected);\n /// ```\n pub fn mapi<U, Env>(self, f: fn[Env](u32, T) -> U) -> BoundedVec<U, MaxLen> {\n let mut ret = BoundedVec::new();\n ret.len = self.len();\n\n if is_unconstrained() {\n for i in 0..self.len() {\n ret.storage[i] = f(i, self.get_unchecked(i));\n }\n } else {\n for i in 0..MaxLen {\n if i < self.len() {\n ret.storage[i] = f(i, self.get_unchecked(i));\n }\n }\n }\n\n ret\n }\n\n /// Calls a closure on each element in this vector.\n ///\n /// Example:\n ///\n /// ```noir\n /// let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n /// let mut result = BoundedVec::<u32, 4>::new();\n /// vec.for_each(|value| result.push(value * 2));\n ///\n /// let expected = BoundedVec::from_array([2, 4, 6, 8]);\n /// assert_eq(result, expected);\n /// ```\n pub fn for_each<Env>(self, f: fn[Env](T) -> ()) {\n if is_unconstrained() {\n for i in 0..self.len() {\n f(self.get_unchecked(i));\n }\n } else {\n for i in 0..MaxLen {\n if i < self.len() {\n f(self.get_unchecked(i));\n }\n }\n }\n }\n\n /// Calls a closure on each element in this vector, along with its index.\n ///\n /// Example:\n ///\n /// ```noir\n /// let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n /// let mut result = BoundedVec::<u32, 4>::new();\n /// vec.for_eachi(|i, value| result.push(i + value * 2));\n ///\n /// let expected = BoundedVec::from_array([2, 5, 8, 11]);\n /// assert_eq(result, expected);\n /// ```\n pub fn for_eachi<Env>(self, f: fn[Env](u32, T) -> ()) {\n if is_unconstrained() {\n for i in 0..self.len() {\n f(i, self.get_unchecked(i));\n }\n } else {\n for i in 0..MaxLen {\n if i < self.len() {\n f(i, self.get_unchecked(i));\n }\n }\n }\n }\n\n /// Creates a new BoundedVec from the given array and length.\n /// The given length must be less than or equal to the length of the array.\n ///\n /// This function will zero out any elements at or past index `len` of `array`.\n /// This incurs an extra runtime cost of O(MaxLen). If you are sure your array is\n /// zeroed after that index, you can use `from_parts_unchecked` to remove the extra loop.\n ///\n /// Example:\n ///\n /// ```noir\n /// let vec: BoundedVec<u32, 4> = BoundedVec::from_parts([1, 2, 3, 0], 3);\n /// assert_eq(vec.len(), 3);\n /// ```\n pub fn from_parts(mut array: [T; MaxLen], len: u32) -> Self {\n assert(len <= MaxLen);\n let zeroed = crate::mem::zeroed();\n\n if is_unconstrained() {\n for i in len..MaxLen {\n array[i] = zeroed;\n }\n } else {\n for i in 0..MaxLen {\n if i >= len {\n array[i] = zeroed;\n }\n }\n }\n\n BoundedVec { storage: array, len }\n }\n\n /// Creates a new BoundedVec from the given array and length.\n /// The given length must be less than or equal to the length of the array.\n ///\n /// This function is unsafe because it expects all elements past the `len` index\n /// of `array` to be zeroed, but does not check for this internally. Use `from_parts`\n /// for a safe version of this function which does zero out any indices past the\n /// given length. Invalidating this assumption can notably cause `BoundedVec::eq`\n /// to give incorrect results since it will check even elements past `len`.\n ///\n /// Example:\n ///\n /// ```noir\n /// let vec: BoundedVec<u32, 4> = BoundedVec::from_parts_unchecked([1, 2, 3, 0], 3);\n /// assert_eq(vec.len(), 3);\n ///\n /// // invalid use!\n /// let vec1: BoundedVec<u32, 4> = BoundedVec::from_parts_unchecked([1, 2, 3, 1], 3);\n /// let vec2: BoundedVec<u32, 4> = BoundedVec::from_parts_unchecked([1, 2, 3, 2], 3);\n ///\n /// // both vecs have length 3 so we'd expect them to be equal, but this\n /// // fails because elements past the length are still checked in eq\n /// assert_eq(vec1, vec2); // fails\n /// ```\n pub fn from_parts_unchecked(array: [T; MaxLen], len: u32) -> Self {\n assert(len <= MaxLen);\n BoundedVec { storage: array, len }\n }\n}\n\nimpl<T, let MaxLen: u32> Eq for BoundedVec<T, MaxLen>\nwhere\n T: Eq,\n{\n fn eq(self, other: BoundedVec<T, MaxLen>) -> bool {\n // TODO: https://github.com/noir-lang/noir/issues/4837\n //\n // We make the assumption that the user has used the proper interface for working with `BoundedVec`s\n // rather than directly manipulating the internal fields as this can result in an inconsistent internal state.\n if self.len == other.len {\n self.storage == other.storage\n } else {\n false\n }\n }\n}\n\nimpl<T, let MaxLen: u32, let Len: u32> From<[T; Len]> for BoundedVec<T, MaxLen> {\n fn from(array: [T; Len]) -> BoundedVec<T, MaxLen> {\n BoundedVec::from_array(array)\n }\n}\n\nmod bounded_vec_tests {\n\n mod get {\n use crate::collections::bounded_vec::BoundedVec;\n\n #[test(should_fail_with = \"Attempted to read past end of BoundedVec\")]\n fn panics_when_reading_elements_past_end_of_vec() {\n let vec: BoundedVec<Field, 5> = BoundedVec::new();\n\n crate::println(vec.get(0));\n }\n }\n\n mod set {\n use crate::collections::bounded_vec::BoundedVec;\n\n #[test]\n fn set_updates_values_properly() {\n let mut vec = BoundedVec::from_array([0, 0, 0, 0, 0]);\n\n vec.set(0, 42);\n assert_eq(vec.storage, [42, 0, 0, 0, 0]);\n\n vec.set(1, 43);\n assert_eq(vec.storage, [42, 43, 0, 0, 0]);\n\n vec.set(2, 44);\n assert_eq(vec.storage, [42, 43, 44, 0, 0]);\n\n vec.set(1, 10);\n assert_eq(vec.storage, [42, 10, 44, 0, 0]);\n\n vec.set(0, 0);\n assert_eq(vec.storage, [0, 10, 44, 0, 0]);\n }\n\n #[test(should_fail_with = \"Attempted to write past end of BoundedVec\")]\n fn panics_when_writing_elements_past_end_of_vec() {\n let mut vec: BoundedVec<Field, 5> = BoundedVec::new();\n vec.set(0, 42);\n\n // Need to use println to avoid DIE removing the write operation.\n crate::println(vec.get(0));\n }\n }\n\n mod map {\n use crate::collections::bounded_vec::BoundedVec;\n\n #[test]\n fn applies_function_correctly() {\n // docs:start:bounded-vec-map-example\n let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n let result = vec.map(|value| value * 2);\n // docs:end:bounded-vec-map-example\n let expected = BoundedVec::from_array([2, 4, 6, 8]);\n\n assert_eq(result, expected);\n }\n\n #[test]\n fn applies_function_that_changes_return_type() {\n let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n let result = vec.map(|value| (value * 2) as Field);\n let expected: BoundedVec<Field, 4> = BoundedVec::from_array([2, 4, 6, 8]);\n\n assert_eq(result, expected);\n }\n\n #[test]\n fn does_not_apply_function_past_len() {\n let vec: BoundedVec<u32, 3> = BoundedVec::from_array([0, 1]);\n let result = vec.map(|value| if value == 0 { 5 } else { value });\n let expected = BoundedVec::from_array([5, 1]);\n\n assert_eq(result, expected);\n assert_eq(result.get_unchecked(2), 0);\n }\n }\n\n mod mapi {\n use crate::collections::bounded_vec::BoundedVec;\n\n #[test]\n fn applies_function_correctly() {\n // docs:start:bounded-vec-mapi-example\n let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n let result = vec.mapi(|i, value| i + value * 2);\n // docs:end:bounded-vec-mapi-example\n let expected = BoundedVec::from_array([2, 5, 8, 11]);\n\n assert_eq(result, expected);\n }\n\n #[test]\n fn applies_function_that_changes_return_type() {\n let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n let result = vec.mapi(|i, value| (i + value * 2) as Field);\n let expected: BoundedVec<Field, 4> = BoundedVec::from_array([2, 5, 8, 11]);\n\n assert_eq(result, expected);\n }\n\n #[test]\n fn does_not_apply_function_past_len() {\n let vec: BoundedVec<u32, 3> = BoundedVec::from_array([0, 1]);\n let result = vec.mapi(|_, value| if value == 0 { 5 } else { value });\n let expected = BoundedVec::from_array([5, 1]);\n\n assert_eq(result, expected);\n assert_eq(result.get_unchecked(2), 0);\n }\n }\n\n mod for_each {\n use crate::collections::bounded_vec::BoundedVec;\n\n // map in terms of for_each\n fn for_each_map<T, U, Env, let MaxLen: u32>(\n input: BoundedVec<T, MaxLen>,\n f: fn[Env](T) -> U,\n ) -> BoundedVec<U, MaxLen> {\n let mut output = BoundedVec::<U, MaxLen>::new();\n let output_ref = &mut output;\n input.for_each(|x| output_ref.push(f(x)));\n output\n }\n\n #[test]\n fn smoke_test() {\n let mut acc = 0;\n let acc_ref = &mut acc;\n // docs:start:bounded-vec-for-each-example\n let vec: BoundedVec<u32, 3> = BoundedVec::from_array([1, 2, 3]);\n vec.for_each(|value| { *acc_ref += value; });\n // docs:end:bounded-vec-for-each-example\n assert_eq(acc, 6);\n }\n\n #[test]\n fn applies_function_correctly() {\n let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n let result = for_each_map(vec, |value| value * 2);\n let expected = BoundedVec::from_array([2, 4, 6, 8]);\n\n assert_eq(result, expected);\n }\n\n #[test]\n fn applies_function_that_changes_return_type() {\n let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n let result = for_each_map(vec, |value| (value * 2) as Field);\n let expected: BoundedVec<Field, 4> = BoundedVec::from_array([2, 4, 6, 8]);\n\n assert_eq(result, expected);\n }\n\n #[test]\n fn does_not_apply_function_past_len() {\n let vec: BoundedVec<u32, 3> = BoundedVec::from_array([0, 1]);\n let result = for_each_map(vec, |value| if value == 0 { 5 } else { value });\n let expected = BoundedVec::from_array([5, 1]);\n\n assert_eq(result, expected);\n assert_eq(result.get_unchecked(2), 0);\n }\n }\n\n mod for_eachi {\n use crate::collections::bounded_vec::BoundedVec;\n\n // mapi in terms of for_eachi\n fn for_eachi_mapi<T, U, Env, let MaxLen: u32>(\n input: BoundedVec<T, MaxLen>,\n f: fn[Env](u32, T) -> U,\n ) -> BoundedVec<U, MaxLen> {\n let mut output = BoundedVec::<U, MaxLen>::new();\n let output_ref = &mut output;\n input.for_eachi(|i, x| output_ref.push(f(i, x)));\n output\n }\n\n #[test]\n fn smoke_test() {\n let mut acc = 0;\n let acc_ref = &mut acc;\n // docs:start:bounded-vec-for-eachi-example\n let vec: BoundedVec<u32, 3> = BoundedVec::from_array([1, 2, 3]);\n vec.for_eachi(|i, value| { *acc_ref += i * value; });\n // docs:end:bounded-vec-for-eachi-example\n\n // 0 * 1 + 1 * 2 + 2 * 3\n assert_eq(acc, 8);\n }\n\n #[test]\n fn applies_function_correctly() {\n let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n let result = for_eachi_mapi(vec, |i, value| i + value * 2);\n let expected = BoundedVec::from_array([2, 5, 8, 11]);\n\n assert_eq(result, expected);\n }\n\n #[test]\n fn applies_function_that_changes_return_type() {\n let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n let result = for_eachi_mapi(vec, |i, value| (i + value * 2) as Field);\n let expected: BoundedVec<Field, 4> = BoundedVec::from_array([2, 5, 8, 11]);\n\n assert_eq(result, expected);\n }\n\n #[test]\n fn does_not_apply_function_past_len() {\n let vec: BoundedVec<u32, 3> = BoundedVec::from_array([0, 1]);\n let result = for_eachi_mapi(vec, |_, value| if value == 0 { 5 } else { value });\n let expected = BoundedVec::from_array([5, 1]);\n\n assert_eq(result, expected);\n assert_eq(result.get_unchecked(2), 0);\n }\n }\n\n mod from_array {\n use crate::collections::bounded_vec::BoundedVec;\n\n #[test]\n fn empty() {\n let empty_array: [Field; 0] = [];\n let bounded_vec = BoundedVec::from_array([]);\n\n assert_eq(bounded_vec.max_len(), 0);\n assert_eq(bounded_vec.len(), 0);\n assert_eq(bounded_vec.storage(), empty_array);\n }\n\n #[test]\n fn equal_len() {\n let array = [1, 2, 3];\n let bounded_vec = BoundedVec::from_array(array);\n\n assert_eq(bounded_vec.max_len(), 3);\n assert_eq(bounded_vec.len(), 3);\n assert_eq(bounded_vec.storage(), array);\n }\n\n #[test]\n fn max_len_greater_then_array_len() {\n let array = [1, 2, 3];\n let bounded_vec: BoundedVec<Field, 10> = BoundedVec::from_array(array);\n\n assert_eq(bounded_vec.max_len(), 10);\n assert_eq(bounded_vec.len(), 3);\n assert_eq(bounded_vec.get(0), 1);\n assert_eq(bounded_vec.get(1), 2);\n assert_eq(bounded_vec.get(2), 3);\n }\n\n #[test(should_fail_with = \"from array out of bounds\")]\n fn max_len_lower_then_array_len() {\n let _: BoundedVec<Field, 2> = BoundedVec::from_array([0; 3]);\n }\n }\n\n mod trait_from {\n use crate::collections::bounded_vec::BoundedVec;\n use crate::convert::From;\n\n #[test]\n fn simple() {\n let array = [1, 2];\n let bounded_vec: BoundedVec<Field, 10> = BoundedVec::from(array);\n\n assert_eq(bounded_vec.max_len(), 10);\n assert_eq(bounded_vec.len(), 2);\n assert_eq(bounded_vec.get(0), 1);\n assert_eq(bounded_vec.get(1), 2);\n }\n }\n\n mod trait_eq {\n use crate::collections::bounded_vec::BoundedVec;\n\n #[test]\n fn empty_equality() {\n let mut bounded_vec1: BoundedVec<Field, 3> = BoundedVec::new();\n let mut bounded_vec2: BoundedVec<Field, 3> = BoundedVec::new();\n\n assert_eq(bounded_vec1, bounded_vec2);\n }\n\n #[test]\n fn inequality() {\n let mut bounded_vec1: BoundedVec<Field, 3> = BoundedVec::new();\n let mut bounded_vec2: BoundedVec<Field, 3> = BoundedVec::new();\n bounded_vec1.push(1);\n bounded_vec2.push(2);\n\n assert(bounded_vec1 != bounded_vec2);\n }\n }\n\n mod from_parts {\n use crate::collections::bounded_vec::BoundedVec;\n\n #[test]\n fn from_parts() {\n // docs:start:from-parts\n let vec: BoundedVec<u32, 4> = BoundedVec::from_parts([1, 2, 3, 0], 3);\n assert_eq(vec.len(), 3);\n\n // Any elements past the given length are zeroed out, so these\n // two BoundedVecs will be completely equal\n let vec1: BoundedVec<u32, 4> = BoundedVec::from_parts([1, 2, 3, 1], 3);\n let vec2: BoundedVec<u32, 4> = BoundedVec::from_parts([1, 2, 3, 2], 3);\n assert_eq(vec1, vec2);\n // docs:end:from-parts\n }\n\n #[test]\n fn from_parts_unchecked() {\n // docs:start:from-parts-unchecked\n let vec: BoundedVec<u32, 4> = BoundedVec::from_parts_unchecked([1, 2, 3, 0], 3);\n assert_eq(vec.len(), 3);\n\n // invalid use!\n let vec1: BoundedVec<u32, 4> = BoundedVec::from_parts_unchecked([1, 2, 3, 1], 3);\n let vec2: BoundedVec<u32, 4> = BoundedVec::from_parts_unchecked([1, 2, 3, 2], 3);\n\n // both vecs have length 3 so we'd expect them to be equal, but this\n // fails because elements past the length are still checked in eq\n assert(vec1 != vec2);\n // docs:end:from-parts-unchecked\n }\n }\n}\n"
|
|
2996
|
-
},
|
|
2997
|
-
"60": {
|
|
2998
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/capsules/mod.nr",
|
|
2999
|
-
"source": "use crate::oracle::capsules;\nuse protocol_types::{address::AztecAddress, traits::{Deserialize, Serialize}};\n\n/// A dynamically sized array backed by PXE's non-volatile database (called capsules). Values are persisted until\n/// deleted, so they can be e.g. stored during simulation of a transaction and later retrieved during witness\n/// generation. All values are scoped per contract address, so external contracts cannot access them.\npub struct CapsuleArray<T> {\n contract_address: AztecAddress,\n /// The base slot is where the array length is stored in capsules. Array elements are stored in consecutive slots\n /// after the base slot. For example, with base slot 5: the length is at slot 5, the first element (index 0) is at\n /// slot 6, the second element (index 1) is at slot 7, and so on.\n base_slot: Field,\n}\n\nimpl<T> CapsuleArray<T> {\n /// Returns a CapsuleArray connected to a contract's capsules at a base slot. Array elements are stored in\n /// contiguous slots following the base slot, so there should be sufficient space between array base slots to\n /// accommodate elements. A reasonable strategy is to make the base slot a hash of a unique value.\n pub unconstrained fn at(contract_address: AztecAddress, base_slot: Field) -> Self {\n Self { contract_address, base_slot }\n }\n\n /// Returns the number of elements stored in the array.\n pub unconstrained fn len(self) -> u32 {\n // An uninitialized array defaults to a length of 0.\n capsules::load(self.contract_address, self.base_slot).unwrap_or(0) as u32\n }\n\n /// Stores a value at the end of the array.\n pub unconstrained fn push<let N: u32>(self, value: T)\n where\n T: Serialize<N>,\n {\n let current_length = self.len();\n\n // The slot corresponding to the index `current_length` is the first slot immediately after the end of the\n // array, which is where we want to place the new value.\n capsules::store(self.contract_address, self.slot_at(current_length), value);\n\n // Then we simply update the length.\n let new_length = current_length + 1;\n capsules::store(self.contract_address, self.base_slot, new_length);\n }\n\n /// Retrieves the value stored in the array at `index`. Throws if the index is out of bounds.\n pub unconstrained fn get<let N: u32>(self, index: u32) -> T\n where\n T: Deserialize<N>,\n {\n assert(index < self.len(), \"Attempted to read past the length of a CapsuleArray\");\n\n capsules::load(self.contract_address, self.slot_at(index)).unwrap()\n }\n\n /// Deletes the value stored in the array at `index`. Throws if the index is out of bounds.\n pub unconstrained fn remove(self, index: u32) {\n let current_length = self.len();\n assert(index < current_length, \"Attempted to delete past the length of a CapsuleArray\");\n\n // In order to be able to remove elements at arbitrary indices, we need to shift the entire contents of the\n // array past the removed element one slot backward so that we don't end up with a gap and preserve the\n // contiguous slots. We can skip this when deleting the last element however.\n if index != current_length - 1 {\n // The source and destination regions overlap, but `copy` supports this.\n capsules::copy(\n self.contract_address,\n self.slot_at(index + 1),\n self.slot_at(index),\n current_length - index - 1,\n );\n }\n\n // We can now delete the last element (which has either been copied to the slot immediately before it, or was\n // the element we meant to delete in the first place) and update the length.\n capsules::delete(self.contract_address, self.slot_at(current_length - 1));\n capsules::store(self.contract_address, self.base_slot, current_length - 1);\n }\n\n /// Iterates over the entire array, calling the callback with all values and their array index. The order in which\n /// values are processed is arbitrary.\n ///\n /// It is safe to delete the current element (and only the current element) from inside the callback via `remove`:\n /// ```noir\n /// array.for_each(|index, value| {\n /// if some_condition(value) {\n /// array.remove(index); // safe only for this index\n /// }\n /// }\n /// ```\n ///\n /// If all elements in the array need to iterated over and then removed, then using `for_each` results in optimal\n /// efficiency.\n ///\n /// It is **not** safe to push new elements into the array from inside the callback.\n pub unconstrained fn for_each<Env, let N: u32>(self, f: unconstrained fn[Env](u32, T) -> ())\n where\n T: Deserialize<N>,\n {\n // Iterating over all elements is simple, but we want to do it in such a way that a) deleting the current\n // element is safe to do, and b) deleting *all* elements is optimally efficient. This is because CapsuleArrays\n // are typically used to hold pending tasks, so iterating them while clearing completed tasks (sometimes\n // unconditionally, resulting in a full clear) is a very common access pattern.\n //\n // The way we achieve this is by iterating backwards: each element can always be deleted since it won't change\n // any preceding (lower) indices, and if every element is deleted then every element will (in turn) be the last\n // element. This results in an optimal full clear since `remove` will be able to skip the `capsules::copy` call\n // to shift any elements past the deleted one (because there will be none).\n let mut i = self.len();\n while i > 0 {\n i -= 1;\n f(i, self.get(i));\n }\n }\n\n unconstrained fn slot_at(self, index: u32) -> Field {\n // Elements are stored immediately after the base slot, so we add 1 to it to compute the slot for the first\n // element.\n self.base_slot + 1 + index as Field\n }\n}\n\nmod test {\n use crate::test::helpers::test_environment::TestEnvironment;\n use super::CapsuleArray;\n use protocol_types::address::AztecAddress;\n\n global SLOT: Field = 1230;\n\n unconstrained fn setup() -> AztecAddress {\n TestEnvironment::new().utility().this_address()\n }\n\n #[test]\n unconstrained fn empty_array() {\n let contract_address = setup();\n\n let array: CapsuleArray<Field> = CapsuleArray::at(contract_address, SLOT);\n assert_eq(array.len(), 0);\n }\n\n #[test(should_fail_with = \"Attempted to read past the length of a CapsuleArray\")]\n unconstrained fn empty_array_read() {\n let contract_address = setup();\n\n let array = CapsuleArray::at(contract_address, SLOT);\n let _: Field = array.get(0);\n }\n\n #[test]\n unconstrained fn array_push() {\n let contract_address = setup();\n\n let array = CapsuleArray::at(contract_address, SLOT);\n array.push(5);\n\n assert_eq(array.len(), 1);\n assert_eq(array.get(0), 5);\n }\n\n #[test(should_fail_with = \"Attempted to read past the length of a CapsuleArray\")]\n unconstrained fn read_past_len() {\n let contract_address = setup();\n\n let array = CapsuleArray::at(contract_address, SLOT);\n array.push(5);\n\n let _ = array.get(1);\n }\n\n #[test]\n unconstrained fn array_remove_last() {\n let contract_address = setup();\n\n let array = CapsuleArray::at(contract_address, SLOT);\n\n array.push(5);\n array.remove(0);\n\n assert_eq(array.len(), 0);\n }\n\n #[test]\n unconstrained fn array_remove_some() {\n let contract_address = setup();\n\n let array = CapsuleArray::at(contract_address, SLOT);\n\n array.push(7);\n array.push(8);\n array.push(9);\n\n assert_eq(array.len(), 3);\n assert_eq(array.get(0), 7);\n assert_eq(array.get(1), 8);\n assert_eq(array.get(2), 9);\n\n array.remove(1);\n\n assert_eq(array.len(), 2);\n assert_eq(array.get(0), 7);\n assert_eq(array.get(1), 9);\n }\n\n #[test]\n unconstrained fn array_remove_all() {\n let contract_address = setup();\n\n let array = CapsuleArray::at(contract_address, SLOT);\n\n array.push(7);\n array.push(8);\n array.push(9);\n\n array.remove(1);\n array.remove(1);\n array.remove(0);\n\n assert_eq(array.len(), 0);\n }\n\n #[test]\n unconstrained fn for_each_called_with_all_elements() {\n let contract_address = setup();\n let array = CapsuleArray::at(contract_address, SLOT);\n\n array.push(4);\n array.push(5);\n array.push(6);\n\n // We store all values that we were called with and check that all (value, index) tuples are present. Note that\n // we do not care about the order in which each tuple was passed to the closure.\n let called_with = &mut BoundedVec::<(u32, Field), 3>::new();\n array.for_each(|index, value| { called_with.push((index, value)); });\n\n assert_eq(called_with.len(), 3);\n assert(called_with.any(|(index, value)| (index == 0) & (value == 4)));\n assert(called_with.any(|(index, value)| (index == 1) & (value == 5)));\n assert(called_with.any(|(index, value)| (index == 2) & (value == 6)));\n }\n\n #[test]\n unconstrained fn for_each_remove_some() {\n let contract_address = setup();\n let array = CapsuleArray::at(contract_address, SLOT);\n\n array.push(4);\n array.push(5);\n array.push(6);\n\n array.for_each(|index, _| {\n if index == 1 {\n array.remove(index);\n }\n });\n\n assert_eq(array.len(), 2);\n assert_eq(array.get(0), 4);\n assert_eq(array.get(1), 6);\n }\n\n #[test]\n unconstrained fn for_each_remove_all() {\n let contract_address = setup();\n let array = CapsuleArray::at(contract_address, SLOT);\n\n array.push(4);\n array.push(5);\n array.push(6);\n\n array.for_each(|index, _| { array.remove(index); });\n\n assert_eq(array.len(), 0);\n }\n\n // TODO: uncomment this test once OracleMock::count is implemented in the stdlib.\n // #[test]\n // unconstrained fn for_each_remove_all_no_copy() {\n // let contract_address = setup();\n // let array = CapsuleArray::at(contract_address, SLOT);\n\n // array.push(4);\n // array.push(5);\n // array.push(6);\n\n // // We test that the copyCapsule was never called, which is the expensive operation we want to avoid.\n // let mock = OracleMock::mock(\"copyCapsule\");\n\n // array.for_each(|index, _| {\n // array.remove(index);\n // });\n\n // assert_eq(mock.count(), 0);\n // }\n}\n"
|
|
3000
|
-
},
|
|
3001
2623
|
"61": {
|
|
3002
2624
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/context/call_interfaces.nr",
|
|
3003
2625
|
"source": "use dep::protocol_types::{\n abis::function_selector::FunctionSelector,\n address::AztecAddress,\n traits::{Deserialize, ToField},\n};\n\nuse crate::context::{gas::GasOpts, private_context::PrivateContext, public_context::PublicContext};\n\nuse crate::hash::{hash_args, hash_calldata};\nuse crate::oracle::execution_cache;\n\npub trait CallInterface<let N: u32> {\n fn get_args(self) -> [Field];\n fn get_selector(self) -> FunctionSelector;\n fn get_name(self) -> str<N>;\n fn get_contract_address(self) -> AztecAddress;\n fn get_is_static(self) -> bool;\n}\n\n// PrivateCallInterface\n\npub struct PrivateCallInterface<let N: u32, T> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n return_type: T,\n is_static: bool,\n}\n\nimpl<let N: u32, T> PrivateCallInterface<N, T> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n is_static: bool,\n ) -> Self {\n let args_hash = hash_args(args);\n Self {\n target_contract,\n selector,\n name,\n args_hash,\n args,\n return_type: std::mem::zeroed(),\n is_static,\n }\n }\n\n pub fn call<let M: u32>(self, context: &mut PrivateContext) -> T\n where\n T: Deserialize<M>,\n {\n execution_cache::store(self.args, self.args_hash);\n let returns_hash = context.call_private_function_with_args_hash(\n self.target_contract,\n self.selector,\n self.args_hash,\n false,\n );\n let returns: T = returns_hash.get_preimage();\n returns\n }\n\n pub fn view<let M: u32>(self, context: &mut PrivateContext) -> T\n where\n T: Deserialize<M>,\n {\n execution_cache::store(self.args, self.args_hash);\n let returns_hash = context.call_private_function_with_args_hash(\n self.target_contract,\n self.selector,\n self.args_hash,\n true,\n );\n returns_hash.get_preimage()\n }\n}\n\nimpl<let N: u32, T> CallInterface<N> for PrivateCallInterface<N, T> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PrivateVoidCallInterface\n\npub struct PrivateVoidCallInterface<let N: u32> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n return_type: (), // Unit type () indicates this interface is for functions that return nothing (void)\n is_static: bool,\n}\n\nimpl<let N: u32> PrivateVoidCallInterface<N> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n is_static: bool,\n ) -> Self {\n let args_hash = hash_args(args);\n Self { target_contract, selector, name, args_hash, args, return_type: (), is_static }\n }\n\n pub fn call(self, context: &mut PrivateContext) {\n execution_cache::store(self.args, self.args_hash);\n context\n .call_private_function_with_args_hash(\n self.target_contract,\n self.selector,\n self.args_hash,\n false,\n )\n .assert_empty();\n }\n\n pub fn view(self, context: &mut PrivateContext) {\n execution_cache::store(self.args, self.args_hash);\n context\n .call_private_function_with_args_hash(\n self.target_contract,\n self.selector,\n self.args_hash,\n true,\n )\n .assert_empty();\n }\n}\n\nimpl<let N: u32> CallInterface<N> for PrivateVoidCallInterface<N> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PrivateStaticCallInterface\n\npub struct PrivateStaticCallInterface<let N: u32, T> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n return_type: T,\n is_static: bool,\n}\n\nimpl<let N: u32, T> PrivateStaticCallInterface<N, T> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n ) -> Self {\n let args_hash = hash_args(args);\n Self {\n target_contract,\n selector,\n name,\n args_hash,\n args,\n return_type: std::mem::zeroed(),\n is_static: true,\n }\n }\n\n pub fn view<let M: u32>(self, context: &mut PrivateContext) -> T\n where\n T: Deserialize<M>,\n {\n execution_cache::store(self.args, self.args_hash);\n let returns = context.call_private_function_with_args_hash(\n self.target_contract,\n self.selector,\n self.args_hash,\n true,\n );\n returns.get_preimage()\n }\n}\n\nimpl<let N: u32, T> CallInterface<N> for PrivateStaticCallInterface<N, T> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PrivateStaticVoidCallInterface\n\npub struct PrivateStaticVoidCallInterface<let N: u32> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n return_type: (), // Unit type () indicates this interface is for functions that return nothing (void)\n is_static: bool,\n}\n\nimpl<let N: u32> PrivateStaticVoidCallInterface<N> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n ) -> Self {\n let args_hash = hash_args(args);\n Self { target_contract, selector, name, args_hash, args, return_type: (), is_static: true }\n }\n\n pub fn view(self, context: &mut PrivateContext) {\n execution_cache::store(self.args, self.args_hash);\n context\n .call_private_function_with_args_hash(\n self.target_contract,\n self.selector,\n self.args_hash,\n true,\n )\n .assert_empty();\n }\n}\n\nimpl<let N: u32> CallInterface<N> for PrivateStaticVoidCallInterface<N> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PublicCallInterface\n\npub struct PublicCallInterface<let N: u32, T> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n gas_opts: GasOpts,\n return_type: T,\n is_static: bool,\n}\n\nimpl<let N: u32, T> PublicCallInterface<N, T> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n is_static: bool,\n ) -> Self {\n Self {\n target_contract,\n selector,\n name,\n args,\n gas_opts: GasOpts::default(),\n return_type: std::mem::zeroed(),\n is_static,\n }\n }\n\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub unconstrained fn call<let M: u32>(self, context: &mut PublicContext) -> T\n where\n T: Deserialize<M>,\n {\n let returns = context.call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n Deserialize::deserialize(returns.as_array::<M>())\n }\n\n pub unconstrained fn view<let M: u32>(self, context: &mut PublicContext) -> T\n where\n T: Deserialize<M>,\n {\n let returns = context.static_call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n Deserialize::deserialize(returns.as_array::<M>())\n }\n\n pub fn enqueue(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.call_public_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n /*static=*/\n false,\n )\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.call_public_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n /*static=*/\n true,\n )\n }\n}\n\nimpl<let N: u32, T> CallInterface<N> for PublicCallInterface<N, T> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PublicVoidCallInterface\n\npub struct PublicVoidCallInterface<let N: u32> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n return_type: (), // Unit type () indicates this interface is for functions that return nothing (void)\n is_static: bool,\n gas_opts: GasOpts,\n}\n\nimpl<let N: u32> PublicVoidCallInterface<N> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n is_static: bool,\n ) -> Self {\n Self {\n target_contract,\n selector,\n name,\n args,\n return_type: (),\n is_static,\n gas_opts: GasOpts::default(),\n }\n }\n\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub unconstrained fn call(self, context: &mut PublicContext) {\n let returns = context.call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n assert(returns.len() == 0);\n }\n\n pub unconstrained fn view(self, context: &mut PublicContext) {\n let returns = context.static_call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n assert(returns.len() == 0);\n }\n\n pub fn enqueue(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.call_public_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n /*static=*/\n false,\n )\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.call_public_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n /*static=*/\n true,\n )\n }\n\n pub fn set_as_teardown(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.set_public_teardown_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n false,\n )\n }\n}\n\nimpl<let N: u32> CallInterface<N> for PublicVoidCallInterface<N> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PublicStaticCallInterface\n\npub struct PublicStaticCallInterface<let N: u32, T> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n return_type: T,\n is_static: bool,\n gas_opts: GasOpts,\n}\n\nimpl<let N: u32, T> PublicStaticCallInterface<N, T> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n ) -> Self {\n Self {\n target_contract,\n selector,\n name,\n args,\n return_type: std::mem::zeroed(),\n is_static: true,\n gas_opts: GasOpts::default(),\n }\n }\n\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub unconstrained fn view<let M: u32>(self, context: &mut PublicContext) -> T\n where\n T: Deserialize<M>,\n {\n let returns = context.static_call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n Deserialize::deserialize(returns.as_array::<M>())\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.call_public_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n /*static=*/\n true,\n )\n }\n}\n\nimpl<let N: u32, T> CallInterface<N> for PublicStaticCallInterface<N, T> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// PublicStaticVoidCallInterface\n\npub struct PublicStaticVoidCallInterface<let N: u32> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n return_type: (), // Unit type () indicates this interface is for functions that return nothing (void)\n is_static: bool,\n gas_opts: GasOpts,\n}\n\nimpl<let N: u32> PublicStaticVoidCallInterface<N> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n ) -> Self {\n Self {\n target_contract,\n selector,\n name,\n args,\n return_type: (),\n is_static: true,\n gas_opts: GasOpts::default(),\n }\n }\n\n pub fn with_gas(self: &mut Self, gas_opts: GasOpts) -> &mut Self {\n self.gas_opts = gas_opts;\n self\n }\n\n pub unconstrained fn view(self, context: &mut PublicContext) {\n let returns = context.static_call_public_function(\n self.target_contract,\n self.selector,\n self.args,\n self.gas_opts,\n );\n assert(returns.len() == 0);\n }\n\n pub fn enqueue_view(self, context: &mut PrivateContext) {\n let calldata = self.args.push_front(self.selector.to_field());\n let calldata_hash = hash_calldata(calldata);\n execution_cache::store(calldata, calldata_hash);\n context.call_public_function_with_calldata_hash(\n self.target_contract,\n calldata_hash,\n /*static=*/\n true,\n )\n }\n}\n\nimpl<let N: u32> CallInterface<N> for PublicStaticVoidCallInterface<N> {\n fn get_args(self) -> [Field] {\n self.args\n }\n\n fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n fn get_name(self) -> str<N> {\n self.name\n }\n\n fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n\n fn get_is_static(self) -> bool {\n self.is_static\n }\n}\n\n// UtilityCallInterface\n\npub struct UtilityCallInterface<let N: u32, T> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n return_type: T,\n}\n\nimpl<let N: u32, T> UtilityCallInterface<N, T> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n ) -> Self {\n let args_hash = hash_args(args);\n Self { target_contract, selector, name, args_hash, args, return_type: std::mem::zeroed() }\n }\n\n pub fn get_args(self) -> [Field] {\n self.args\n }\n\n pub fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n pub fn get_name(self) -> str<N> {\n self.name\n }\n\n pub fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n}\n\n// UtilityVoidCallInterface\n\npub struct UtilityVoidCallInterface<let N: u32> {\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args_hash: Field,\n args: [Field],\n return_type: (),\n}\n\nimpl<let N: u32> UtilityVoidCallInterface<N> {\n pub fn new(\n target_contract: AztecAddress,\n selector: FunctionSelector,\n name: str<N>,\n args: [Field],\n ) -> Self {\n let args_hash = hash_args(args);\n Self { target_contract, selector, name, args_hash, args, return_type: () }\n }\n\n pub fn get_args(self) -> [Field] {\n self.args\n }\n\n pub fn get_selector(self) -> FunctionSelector {\n self.selector\n }\n\n pub fn get_name(self) -> str<N> {\n self.name\n }\n\n pub fn get_contract_address(self) -> AztecAddress {\n self.target_contract\n }\n}\n"
|
|
@@ -3022,10 +2644,6 @@
|
|
|
3022
2644
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/hash.nr",
|
|
3023
2645
|
"source": "use dep::protocol_types::{\n address::{AztecAddress, EthAddress},\n constants::{\n GENERATOR_INDEX__FUNCTION_ARGS, GENERATOR_INDEX__MESSAGE_NULLIFIER,\n GENERATOR_INDEX__PUBLIC_CALLDATA, GENERATOR_INDEX__SECRET_HASH,\n },\n hash::{poseidon2_hash_with_separator, poseidon2_hash_with_separator_slice, sha256_to_field},\n point::Point,\n traits::{Hash, ToField},\n};\n\npub use dep::protocol_types::hash::{compute_siloed_nullifier, pedersen_hash};\n\npub fn pedersen_commitment<let N: u32>(inputs: [Field; N], hash_index: u32) -> Point {\n std::hash::pedersen_commitment_with_separator(inputs, hash_index)\n}\n\npub fn compute_secret_hash(secret: Field) -> Field {\n poseidon2_hash_with_separator([secret], GENERATOR_INDEX__SECRET_HASH)\n}\n\npub fn compute_l1_to_l2_message_hash(\n sender: EthAddress,\n chain_id: Field,\n recipient: AztecAddress,\n version: Field,\n content: Field,\n secret_hash: Field,\n leaf_index: Field,\n) -> Field {\n let mut hash_bytes = [0 as u8; 224];\n let sender_bytes: [u8; 32] = sender.to_field().to_be_bytes();\n let chain_id_bytes: [u8; 32] = chain_id.to_be_bytes();\n let recipient_bytes: [u8; 32] = recipient.to_field().to_be_bytes();\n let version_bytes: [u8; 32] = version.to_be_bytes();\n let content_bytes: [u8; 32] = content.to_be_bytes();\n let secret_hash_bytes: [u8; 32] = secret_hash.to_be_bytes();\n let leaf_index_bytes: [u8; 32] = leaf_index.to_be_bytes();\n\n for i in 0..32 {\n hash_bytes[i] = sender_bytes[i];\n hash_bytes[i + 32] = chain_id_bytes[i];\n hash_bytes[i + 64] = recipient_bytes[i];\n hash_bytes[i + 96] = version_bytes[i];\n hash_bytes[i + 128] = content_bytes[i];\n hash_bytes[i + 160] = secret_hash_bytes[i];\n hash_bytes[i + 192] = leaf_index_bytes[i];\n }\n\n sha256_to_field(hash_bytes)\n}\n\n// The nullifier of a l1 to l2 message is the hash of the message salted with the secret\npub fn compute_l1_to_l2_message_nullifier(message_hash: Field, secret: Field) -> Field {\n poseidon2_hash_with_separator([message_hash, secret], GENERATOR_INDEX__MESSAGE_NULLIFIER)\n}\n\npub struct ArgsHasher {\n pub fields: [Field],\n}\n\nimpl Hash for ArgsHasher {\n fn hash(self) -> Field {\n hash_args(self.fields)\n }\n}\n\nimpl ArgsHasher {\n pub fn new() -> Self {\n Self { fields: [] }\n }\n\n pub fn add(&mut self, field: Field) {\n self.fields = self.fields.push_back(field);\n }\n\n pub fn add_multiple<let N: u32>(&mut self, fields: [Field; N]) {\n for i in 0..N {\n self.fields = self.fields.push_back(fields[i]);\n }\n }\n}\n\n// Computes the hash of input arguments or return values for private functions, or for authwit creation.\npub fn hash_args_array<let N: u32>(args: [Field; N]) -> Field {\n if args.len() == 0 {\n 0\n } else {\n poseidon2_hash_with_separator(args, GENERATOR_INDEX__FUNCTION_ARGS)\n }\n}\n\n// Same as `hash_args_array`, but takes a slice instead of an array.\npub fn hash_args(args: [Field]) -> Field {\n if args.len() == 0 {\n 0\n } else {\n poseidon2_hash_with_separator_slice(args, GENERATOR_INDEX__FUNCTION_ARGS)\n }\n}\n\n// Computes the hash of calldata for public functions.\npub fn hash_calldata_array<let N: u32>(calldata: [Field; N]) -> Field {\n if calldata.len() == 0 {\n 0\n } else {\n poseidon2_hash_with_separator(calldata, GENERATOR_INDEX__PUBLIC_CALLDATA)\n }\n}\n\n// Same as `hash_calldata_array`, but takes a slice instead of an array.\npub fn hash_calldata(calldata: [Field]) -> Field {\n if calldata.len() == 0 {\n 0\n } else {\n poseidon2_hash_with_separator_slice(calldata, GENERATOR_INDEX__PUBLIC_CALLDATA)\n }\n}\n\n#[test]\nunconstrained fn compute_var_args_hash() {\n let mut input = ArgsHasher::new();\n for i in 0..100 {\n input.add(i as Field);\n }\n let hash = input.hash();\n dep::std::println(hash);\n assert(hash == 0x19b0d74feb06ebde19edd85a28986c97063e84b3b351a8b666c7cac963ce655f);\n}\n"
|
|
3024
2646
|
},
|
|
3025
|
-
"96": {
|
|
3026
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/macros/aztec.nr",
|
|
3027
|
-
"source": "use crate::{\n macros::{\n dispatch::generate_public_dispatch,\n functions::{stub_registry, utils::check_each_fn_macroified},\n notes::{generate_note_export, NOTES},\n storage::STORAGE_LAYOUT_NAME,\n utils::{get_trait_impl_method, module_has_storage},\n },\n messages::discovery::private_notes::MAX_NOTE_PACKED_LEN,\n};\n\n/// Marks a contract as an Aztec contract, generating the interfaces for its functions and notes, as well as injecting\n/// the `sync_private_state` utility function.\n/// Note: This is a module annotation, so the returned quote gets injected inside the module (contract) itself.\npub comptime fn aztec(m: Module) -> Quoted {\n let interface = generate_contract_interface(m);\n\n // Functions that don't have #[private], #[public], #[utility], #[contract_library_method], or #[test] are not\n // allowed in contracts.\n check_each_fn_macroified(m);\n\n let contract_library_method_compute_note_hash_and_nullifier =\n generate_contract_library_method_compute_note_hash_and_nullifier();\n let note_exports = generate_note_exports();\n let public_dispatch = generate_public_dispatch(m);\n let sync_private_state = generate_sync_private_state();\n\n quote {\n $note_exports\n $interface\n $contract_library_method_compute_note_hash_and_nullifier\n $public_dispatch\n $sync_private_state\n }\n}\n\ncomptime fn generate_contract_interface(m: Module) -> Quoted {\n let module_name = m.name();\n let contract_stubs = stub_registry::get(m);\n let fn_stubs_quote = if contract_stubs.is_some() {\n contract_stubs.unwrap().join(quote {})\n } else {\n quote {}\n };\n\n let has_storage_layout = module_has_storage(m) & STORAGE_LAYOUT_NAME.get(m).is_some();\n let storage_layout_getter = if has_storage_layout {\n let storage_layout_name = STORAGE_LAYOUT_NAME.get(m).unwrap();\n quote {\n pub fn storage_layout() -> StorageLayoutFields {\n $storage_layout_name.fields\n }\n }\n } else {\n quote {}\n };\n\n let library_storage_layout_getter = if has_storage_layout {\n quote {\n #[contract_library_method]\n $storage_layout_getter\n }\n } else {\n quote {}\n };\n\n quote {\n pub struct $module_name {\n pub target_contract: dep::aztec::protocol_types::address::AztecAddress\n }\n\n impl $module_name {\n $fn_stubs_quote\n\n pub fn at(\n addr: aztec::protocol_types::address::AztecAddress\n ) -> Self {\n Self { target_contract: addr }\n }\n\n pub fn interface() -> Self {\n Self { target_contract: aztec::protocol_types::address::AztecAddress::zero() }\n }\n\n $storage_layout_getter\n }\n\n #[contract_library_method]\n pub fn at(\n addr: aztec::protocol_types::address::AztecAddress\n ) -> $module_name {\n $module_name { target_contract: addr }\n }\n\n #[contract_library_method]\n pub fn interface() -> $module_name {\n $module_name { target_contract: aztec::protocol_types::address::AztecAddress::zero() }\n }\n\n $library_storage_layout_getter\n\n }\n}\n\n/// Generates a contract library method called `_compute_note_hash_and_nullifier` which is used for note\n/// discovery (to create the `aztec::messages::discovery::ComputeNoteHashAndNullifier` function) and to implement the\n/// `compute_note_hash_and_nullifier` unconstrained contract function.\ncomptime fn generate_contract_library_method_compute_note_hash_and_nullifier() -> Quoted {\n let notes = NOTES.entries();\n\n if notes.len() > 0 {\n let max_note_packed_len = notes.fold(\n 0,\n |acc, (_, (_, len, _, _)): (Type, (TypeDefinition, u32, Field, [(Quoted, u32, bool)]))| {\n if len > acc {\n len\n } else {\n acc\n }\n },\n );\n\n if max_note_packed_len > MAX_NOTE_PACKED_LEN {\n panic(\n f\"One of the notes has packed len {max_note_packed_len} but the maximum is {MAX_NOTE_PACKED_LEN}\",\n );\n }\n\n // Contracts that do define notes produce an if-else chain where `note_type_id` is matched against the\n // `get_note_type_id()` function of each note type that we know of, in order to identify the note type. Once we\n // know it we call we correct `unpack` method from the `Packable` trait to obtain the underlying note type, and\n // compute the note hash (non-siloed) and inner nullifier (also non-siloed).\n\n let mut if_note_type_id_match_statements_list = &[];\n for i in 0..notes.len() {\n let (typ, (_, packed_note_length, _, _)) = notes[i];\n\n let get_note_type_id = get_trait_impl_method(\n typ,\n quote { crate::note::note_interface::NoteType },\n quote { get_id },\n );\n let unpack = get_trait_impl_method(\n typ,\n quote { crate::protocol_types::traits::Packable<_> },\n quote { unpack },\n );\n\n let compute_note_hash = get_trait_impl_method(\n typ,\n quote { crate::note::note_interface::NoteHash },\n quote { compute_note_hash },\n );\n\n let compute_nullifier_unconstrained = get_trait_impl_method(\n typ,\n quote { crate::note::note_interface::NoteHash },\n quote { compute_nullifier_unconstrained },\n );\n\n let if_or_else_if = if i == 0 {\n quote { if }\n } else {\n quote { else if }\n };\n\n if_note_type_id_match_statements_list = if_note_type_id_match_statements_list.push_back(\n quote {\n $if_or_else_if note_type_id == $get_note_type_id() {\n // As an extra safety check we make sure that the packed_note BoundedVec has the expected\n // length, since we're about to interpret it's raw storage as a fixed-size array by calling the\n // unpack function on it.\n let expected_len = $packed_note_length;\n let actual_len = packed_note.len();\n assert(\n actual_len == expected_len,\n f\"Expected packed note of length {expected_len} but got {actual_len} for note type id {note_type_id}\"\n );\n\n let note = $unpack(aztec::utils::array::subarray(packed_note.storage(), 0));\n\n let note_hash = $compute_note_hash(note, storage_slot);\n \n // The message discovery process finds settled notes, that is, notes that were created in prior\n // transactions and are therefore already part of the note hash tree. We therefore compute the\n // nullification note hash by treating the note as a settled note with the provided nonce.\n let note_hash_for_nullify = aztec::note::utils::compute_note_hash_for_nullify(\n aztec::note::retrieved_note::RetrievedNote{ \n note, \n contract_address, \n metadata: aztec::note::note_metadata::SettledNoteMetadata::new(nonce).into() \n }, \n storage_slot,\n );\n\n let inner_nullifier = $compute_nullifier_unconstrained(note, note_hash_for_nullify);\n\n Option::some(\n aztec::messages::discovery::NoteHashAndNullifier {\n note_hash, inner_nullifier\n }\n )\n }\n },\n );\n }\n\n let if_note_type_id_match_statements = if_note_type_id_match_statements_list.join(quote {});\n\n quote {\n /// Unpacks an array into a note corresponding to `note_type_id` and then computes its note hash\n /// (non-siloed) and inner nullifier (non-siloed) assuming the note has been inserted into the note hash\n /// tree with `nonce`.\n ///\n /// The signature of this function notably matches the `aztec::messages::discovery::ComputeNoteHashAndNullifier` type,\n /// and so it can be used to call functions from that module such as `discover_new_messages`, \n /// `do_process_log` and `attempt_note_discovery`.\n ///\n /// This function is automatically injected by the `#[aztec]` macro.\n #[contract_library_method]\n unconstrained fn _compute_note_hash_and_nullifier(\n packed_note: BoundedVec<Field, aztec::messages::discovery::private_notes::MAX_NOTE_PACKED_LEN>,\n storage_slot: Field,\n note_type_id: Field,\n contract_address: aztec::protocol_types::address::AztecAddress,\n nonce: Field,\n ) -> Option<aztec::messages::discovery::NoteHashAndNullifier> {\n $if_note_type_id_match_statements\n else {\n Option::none()\n }\n }\n }\n } else {\n // Contracts with no notes still implement this function to avoid having special-casing, the implementation\n // simply throws immediately.\n quote {\n /// This contract does not use private notes, so this function should never be called as it will\n /// unconditionally fail.\n ///\n /// This function is automatically injected by the `#[aztec]` macro.\n #[contract_library_method]\n unconstrained fn _compute_note_hash_and_nullifier(\n _packed_note: BoundedVec<Field, aztec::messages::discovery::private_notes::MAX_NOTE_PACKED_LEN>,\n _storage_slot: Field,\n _note_type_id: Field,\n _contract_address: aztec::protocol_types::address::AztecAddress,\n _nonce: Field,\n ) -> Option<aztec::messages::discovery::NoteHashAndNullifier> {\n panic(f\"This contract does not use private notes\")\n }\n }\n }\n}\n\ncomptime fn generate_note_exports() -> Quoted {\n let notes = NOTES.values();\n // Second value in each tuple is `note_packed_len` and that is ignored here because it's only used when\n // generating partial note helper functions.\n notes\n .map(|(s, _, note_type_id, fields): (TypeDefinition, u32, Field, [(Quoted, u32, bool)])| {\n generate_note_export(s, note_type_id, fields)\n })\n .join(quote {})\n}\n\ncomptime fn generate_sync_private_state() -> Quoted {\n // We obtain the `utility` function on the next line instead of directly doing\n // `#[aztec::macros::functions::utility]` in the returned quote because the latter would result in the function\n // attribute having the full path in the ABI. This is undesirable because we use the information in the ABI only\n // to determine whether a function is `private`, `public`, or `utility`.\n let utility = crate::macros::functions::utility;\n\n // All we need to do here is trigger message discovery, but this is already done by the #[utility] macro - we don't\n // need to do anything extra.\n quote {\n #[$utility]\n unconstrained fn sync_private_state() {\n }\n }\n}\n"
|
|
3028
|
-
},
|
|
3029
2647
|
"97": {
|
|
3030
2648
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/macros/dispatch.nr",
|
|
3031
2649
|
"source": "use super::utils::compute_fn_selector;\nuse std::panic;\n\n/// Returns an `fn public_dispatch(...)` function for the given module that's assumed to be an Aztec contract.\npub comptime fn generate_public_dispatch(m: Module) -> Quoted {\n let functions = m.functions();\n let functions =\n functions.filter(|function: FunctionDefinition| function.has_named_attribute(\"public\"));\n\n let unit = get_type::<()>();\n\n let ifs = functions.map(|function: FunctionDefinition| {\n let parameters = function.parameters();\n let return_type = function.return_type();\n\n let selector: Field = compute_fn_selector(function);\n\n let mut parameters_size = 0;\n for param in parameters {\n parameters_size += size_in_fields(param.1);\n }\n\n let initial_read = if parameters.len() == 0 {\n quote {}\n } else {\n // The initial calldata_copy offset is 1 to skip the Field selector\n // The expected calldata is the serialization of\n // - FunctionSelector: the selector of the function intended to dispatch\n // - Parameters: the parameters of the function intended to dispatch\n // That is, exactly what is expected for a call to the target function,\n // but with a selector added at the beginning.\n quote {\n let input_calldata: [Field; $parameters_size] = dep::aztec::context::public_context::calldata_copy(1, $parameters_size);\n let mut reader = dep::aztec::protocol_types::utils::reader::Reader::new(input_calldata);\n }\n };\n\n let parameter_index = &mut 0;\n let reads = parameters.map(|param: (Quoted, Type)| {\n let parameter_index_value = *parameter_index;\n let param_name = f\"arg{parameter_index_value}\".quoted_contents();\n let param_type = param.1;\n let read = quote {\n let $param_name: $param_type = reader.read_struct(dep::aztec::protocol_types::traits::Deserialize::deserialize);\n };\n *parameter_index += 1;\n quote { $read }\n });\n let read = reads.join(quote { });\n\n let mut args = &[];\n for parameter_index in 0..parameters.len() {\n let param_name = f\"arg{parameter_index}\".quoted_contents();\n args = args.push_back(quote { $param_name });\n }\n\n let args = args.join(quote { , });\n // name of the function is assigned just before the call so debug metadata doesn't span most of this macro when figuring out where the call comes from.\n let name = function.name();\n let call = quote { $name($args) };\n\n let return_code = if return_type == unit {\n quote {\n $call;\n // Force early return.\n dep::aztec::context::public_context::avm_return([]);\n }\n } else {\n quote {\n let return_value = dep::aztec::protocol_types::traits::Serialize::serialize($call);\n dep::aztec::context::public_context::avm_return(return_value.as_slice());\n }\n };\n\n let if_ = quote {\n if selector == $selector {\n $initial_read\n $read\n $return_code\n }\n };\n if_\n });\n\n if ifs.len() == 0 {\n // No dispatch function if there are no public functions\n quote {}\n } else {\n let ifs = ifs.push_back(quote { panic(f\"Unknown selector {selector}\") });\n let dispatch = ifs.join(quote { });\n\n let body = quote {\n // We mark this as public because our whole system depends on public\n // functions having this attribute. However, the public MACRO will\n // handle the public_dispatch function specially and do nothing.\n #[public]\n pub unconstrained fn public_dispatch(selector: Field) {\n $dispatch\n }\n };\n\n body\n }\n}\n\ncomptime fn size_in_fields(typ: Type) -> u32 {\n let size = array_size_in_fields(typ);\n let size = size.or_else(|| bool_size_in_fields(typ));\n let size = size.or_else(|| constant_size_in_fields(typ));\n let size = size.or_else(|| field_size_in_fields(typ));\n let size = size.or_else(|| int_size_in_fields(typ));\n let size = size.or_else(|| str_size_in_fields(typ));\n let size = size.or_else(|| struct_size_in_fields(typ));\n let size = size.or_else(|| tuple_size_in_fields(typ));\n if size.is_some() {\n size.unwrap()\n } else {\n panic(f\"Can't determine size in fields of {typ}\")\n }\n}\n\ncomptime fn array_size_in_fields(typ: Type) -> Option<u32> {\n typ.as_array().and_then(|typ: (Type, Type)| {\n let (typ, element_size) = typ;\n element_size.as_constant().map(|x: u32| x * size_in_fields(typ))\n })\n}\n\ncomptime fn bool_size_in_fields(typ: Type) -> Option<u32> {\n if typ.is_bool() {\n Option::some(1)\n } else {\n Option::none()\n }\n}\n\ncomptime fn field_size_in_fields(typ: Type) -> Option<u32> {\n if typ.is_field() {\n Option::some(1)\n } else {\n Option::none()\n }\n}\n\ncomptime fn int_size_in_fields(typ: Type) -> Option<u32> {\n if typ.as_integer().is_some() {\n Option::some(1)\n } else {\n Option::none()\n }\n}\n\ncomptime fn constant_size_in_fields(typ: Type) -> Option<u32> {\n typ.as_constant()\n}\n\ncomptime fn str_size_in_fields(typ: Type) -> Option<u32> {\n typ.as_str().map(|typ| size_in_fields(typ))\n}\n\ncomptime fn struct_size_in_fields(typ: Type) -> Option<u32> {\n typ.as_data_type().map(|typ: (TypeDefinition, [Type])| {\n let struct_type = typ.0;\n let generics = typ.1;\n let mut size = 0;\n for field in struct_type.fields(generics) {\n size += size_in_fields(field.1);\n }\n size\n })\n}\n\ncomptime fn tuple_size_in_fields(typ: Type) -> Option<u32> {\n typ.as_tuple().map(|types: [Type]| {\n let mut size = 0;\n for typ in types {\n size += size_in_fields(typ);\n }\n size\n })\n}\n\ncomptime fn get_type<T>() -> Type {\n let t: T = std::mem::zeroed();\n std::meta::type_of(t)\n}\n"
|