@aztec/protocol-contracts 4.0.0-nightly.20260121 → 4.0.0-nightly.20260122
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/artifacts/AuthRegistry.json +66 -66
- package/artifacts/ContractClassRegistry.json +44 -44
- package/artifacts/ContractInstanceRegistry.json +63 -63
- package/artifacts/FeeJuice.json +58 -58
- package/artifacts/MultiCallEntrypoint.json +40 -40
- package/artifacts/PublicChecks.json +39 -39
- package/dest/protocol_contract_data.js +13 -13
- package/package.json +4 -4
- package/src/protocol_contract_data.ts +13 -13
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"transpiled": true,
|
|
3
|
-
"noir_version": "1.0.0-beta.18+
|
|
3
|
+
"noir_version": "1.0.0-beta.18+e48a0d8d0e96d1b35964908f875faa9e5e631f59",
|
|
4
4
|
"name": "AuthRegistry",
|
|
5
5
|
"functions": [
|
|
6
6
|
{
|
|
@@ -75,8 +75,8 @@
|
|
|
75
75
|
}
|
|
76
76
|
}
|
|
77
77
|
},
|
|
78
|
-
"bytecode": "
|
|
79
|
-
"debug_symbols": "
|
|
78
|
+
"bytecode": "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",
|
|
79
|
+
"debug_symbols": "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"
|
|
80
80
|
},
|
|
81
81
|
{
|
|
82
82
|
"name": "consume",
|
|
@@ -151,8 +151,8 @@
|
|
|
151
151
|
}
|
|
152
152
|
}
|
|
153
153
|
},
|
|
154
|
-
"bytecode": "
|
|
155
|
-
"debug_symbols": "
|
|
154
|
+
"bytecode": "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",
|
|
155
|
+
"debug_symbols": "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"
|
|
156
156
|
},
|
|
157
157
|
{
|
|
158
158
|
"name": "is_consumable",
|
|
@@ -224,8 +224,8 @@
|
|
|
224
224
|
}
|
|
225
225
|
}
|
|
226
226
|
},
|
|
227
|
-
"bytecode": "
|
|
228
|
-
"debug_symbols": "
|
|
227
|
+
"bytecode": "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",
|
|
228
|
+
"debug_symbols": "tZndTiM5EIXfJddc2OWqss2rjEYoQBhFigLKwEorxLtvle1yJ0htZZydG/hykj5df22nO5+b593jx6+H/fHl9ffm/sfn5vG0Pxz2vx4Or0/b9/3rUdTPjdM/OW/uw93GO9zcR/0vr70T8CJ4LwBgEAVQIIABN0BvYAqZQqawM0CD3CAGAT17TA0SGHCD7AyoAjhngAZ6eBbwwcAUMCV4A3EGEEBnQA3IFDKFTdHgK6QGGnwFqQ+QgAZfgRto8BXQIFcIDg1SA6+HR4XYAEwJzkACC3LSoJUPqMANqCmoRwVSEJ/AApgakMQcokJswPrhpMANojcwJZmSTNG8KqBBrkAuGKQGHgxiA/AGmo40hTA3YPkMyhxSBANTkil6dgXWoUUZUdZMUcrCOqIYFGIDNAVVkfowgYGkg1IojmiQGpRzFYgNssSMUYEqRJ3DCqZ4U7wpYArouaQFUTuISUGDl5QjYgPtDjmF1IBN0aZU4AbJGVCDbB/OeriUJWkvKpiivagQG2gLCuiMEShQAzRFI6SgkNuHyZzJnNkUNudo54qm6CBVsJPq2JD0IpdQSSE1KKGyQmwApoApJVSFEmoBU0qEBdRQWpBLhAVMKREmhdhOWiIswA2yKdp3Be+08Y20MLlQNtI1iF2hZARd02WoERth17S+lUic2RfKRtw1zYBBSVehet6SQyEd3kZdK2lU4kZe8+BQiDrp2XRtLhtBo65p4Svphdaoa1r7SrqQMhUiI+5ayYMLZTuv5tEoGaWuaR6VMnTiRtDzgJ4HlDySUulHpWQEXYOuha6FrungcyykWvz6utvYXvrwftrtdCs921xly33bnnbH98398eNwuNv8sz18lA/9ftsey//37UnelR7vjs/yXwxf9oed0tfdcrRbP1TCy+1o2cJyN5BaX1j4dQupIqTmIRxiN4mXYcC6RwgQsXkIZ7fmMUoleQsDMvjVVHBgAR7YPEC+hyxhhAsP+h/KwX+3HIH0mq4WlNY7mwYWsiTZdAgzrYWRBx7ogpVUmPKtqeT1zg4sCL0VlPCsr+Qvx3wwowSRzCLAUguf8dIjDAYM7VoFgu4Qvk3X0MEvDrzuMBjQ5MkaksCFxQO/XfKjAaXekLwMuEZ0fTUh92oGXq/maD4phmUu3KrHtXPBYW0uwN0+F+BvnYuhw1VzAeH2uQC8dS7G1bxuLmAwnT7q7U1dgeUL8RKH46m5SLA6F2m0mSSbC7lfdKtRwGj19Ex9xL3cWqytnmG0fMq3tNhNZB1fNRnMV+Cw7AUczkryfZcfp4Nn6aTVzSAM5pS9JSM3aMuUZn9tb+UpgOsbtKfVMR1ZyL3GssfnKYvcLzfBOGcRfbc468gfWMgwmgW4s/H6Ewt0/XsXBjdnEfvqJU8KZixCdH085UZ5zgKoW4R0swWGyUTSYoFzFsv1ntz6gONgDZXnNJYJprM9yeero0ihbwYpzNUi9a/jYjE3neT8srVOTmemxcLPRQGLxVwtLqKYtPB94ROcS8RlXCzmlhzvoVtMdkQeWiwWtycyaeFDv3f2GOcsKHYLzpMWfcB9dDcnMmuR+iYgD1OmLMCd3XunSQu3WORbE5m1AOxXKqT1K1UX6Znl96e82j7tTxc/xHyp12m/fTzs2suXj+PT2bvv/77ZO/ZDztvp9Wn3/HHaqdPya478+SE/UdxJ7D/1GZ+8lDuc5PSF1/fkKaf8lvHzS0P5Dw=="
|
|
229
229
|
},
|
|
230
230
|
{
|
|
231
231
|
"name": "is_reject_all",
|
|
@@ -274,8 +274,8 @@
|
|
|
274
274
|
}
|
|
275
275
|
}
|
|
276
276
|
},
|
|
277
|
-
"bytecode": "
|
|
278
|
-
"debug_symbols": "
|
|
277
|
+
"bytecode": "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",
|
|
278
|
+
"debug_symbols": "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"
|
|
279
279
|
},
|
|
280
280
|
{
|
|
281
281
|
"name": "set_authorized",
|
|
@@ -328,8 +328,8 @@
|
|
|
328
328
|
}
|
|
329
329
|
}
|
|
330
330
|
},
|
|
331
|
-
"bytecode": "
|
|
332
|
-
"debug_symbols": "
|
|
331
|
+
"bytecode": "JwACBAEoAAABBIBJJwAABEklAAAASicCAwQCJwIEBAAfCgADAAQARxwASEgBLQhHAS0ISAIlAAAAfycCAQRJJwICBAA7DgACAAEsAABDADBkTnLhMaApuFBFtoGBWF0oM+hIeblwkUPh9ZPwAAAAJwBEBAMnAEUAACcARgQCJiUAAAGYHgIAAwAeAgAEAB4CAAUBCiIFQwYWCgYHHAoHCAAEKggFBycCBQEACioGBQgkAgAIAAAAwScCCQQAPAYJAScCBgACLQgBCCcCCQQDAAgBCQEnAwgEAQAiCAIJLQoJCi0OBgoAIgoCCi0OBwonAgcECS0IAAktCggKLQhGCwAIAAcAJQAAAb4tAgAALQoKBgoiBkUHCioHBQgkAgAIAAABKSUAAAUQLQgBBycCCAQDAAgBCAEnAwcEAQAiBwIILQoICS0OBgkAIgkCCS0OAQknAgYECC0IAAgtCgcJLQhGCgAIAAYAJQAAAb4tAgAALQoJAQoiAUUGCioGBQckAgAHAAABjCUAAAUQHAoCBQAwCgAFAAEmKAAABAR4SQwAAAQDJAAAAwAAAb0qAQABBdrF9da0SjJtPAQCASYlAAABmBwKAgQAKwIABQAAAAAAAAAAAQAAAAAAAAAABCoEBQYtCAEEAAABAgEtCAEFJwIHBAUACAEHAScDBQQBACIFAgctCgcILQxFCAAiCAIILQxFCAAiCAIILQxFCAAiCAIILQ4GCC0OBQQGIgJEBScCBgQAJwIHAQEnAggEAS0KBgMjAAACRwwqAwUJJAIACQAAA6UjAAACWQQiBUQJBiIJRAsKKgsFCiQCAAoAAAJ1JQAABSInAgUEBC0KCQMjAAACgwwqAwIKJAIACgAAAxMjAAAClQoqAgYBBiICRAUEIgVEBwIqAgcDCioDBgIWCgIDEioBAwIkAgACAAACxCMAAAMBLQsEAS0LAQIAIgICAi0OAgEtCAECJwIDBAUACAEDAScDAgQBACIBAgMAIgICBT8PAAMABS0OAgQjAAADAS0LBAEAKgEIAy0LAwItCgIBJgIqAwkKDioJAwskAgALAAADKiUAAAU0LQsECwwqCgUMJAIADAAAA0AlAAAFRgAiCwINACoNCg4tCw4MDCIDRg0kAgANAAADYCUAAAVGACIBAg4AKg4DDy0LDw0AKgwNDi0CCwMnAAQEBSUAAAVYLQgFDAAiDAINACoNCg8tDg4PLQ4MBAAqAwgKLQoKAyMAAAKDLQsECQAqCQgLLQsLCgQiA0QLBiILRA0KKg0DDCQCAAwAAAPOJQAABSIMIgtGDCQCAAwAAAPgJQAABUYAIgECDQAqDQsOLQsODAAqCgwNLQIJAycABAQFJQAABVgtCAUKACoKCAwtDg0MACIKRgwtCwwJACoLCAwOKgsMDSQCAA0AAAQuJQAABbcMIgxGDSQCAA0AAARAJQAABUYAIgECDgAqDgwPLQsPDQAqCQ0MLQIKAycABAQFJQAABVgtCAUJACIJRg0tDgwNACIJRAwtCwwKACILRgwOKgsMDSQCAA0AAASOJQAABbcMIgxGCyQCAAsAAASgJQAABUYAIgECDQAqDQwOLQsOCwAqCgsMLQIJAycABAQFJQAABVgtCAUKACIKRAstDgwLLQsKCQAiCQIJLQ4JCi0IAQknAgsEBQAIAQsBJwMJBAEAIgoCCwAiCQIMPw8ACwAMLQ4JBAAqAwgJLQoJAyMAAAJHKgEAAQW6uyHXgjMYZDwEAgEmKgEAAQUFBBuZIK9gTDwEAgEmKgEAAQUbvGXQP9zq3DwEAgEmKgEAAQXkCFBFArWMHzwEAgEmLQEDBgoABgIHJAAABwAABW4jAAAFdy0AAwUjAAAFti0AAQUAAAEEAQAAAwQJLQADCi0ABQsKAAoJDCQAAAwAAAWxLQEKCC0ECAsAAAoCCgAACwILIwAABY0nAQUEASYqAQABBdAH6/TLxmeQPAQCASY=",
|
|
332
|
+
"debug_symbols": "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"
|
|
333
333
|
},
|
|
334
334
|
{
|
|
335
335
|
"name": "set_authorized_private",
|
|
@@ -2159,8 +2159,8 @@
|
|
|
2159
2159
|
}
|
|
2160
2160
|
}
|
|
2161
2161
|
},
|
|
2162
|
-
"bytecode": "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",
|
|
2163
|
-
"debug_symbols": "
|
|
2162
|
+
"bytecode": "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",
|
|
2163
|
+
"debug_symbols": "tVtZbhs5EL2Lvv3BpRbSVwkGgZNoBgYMJ3DsAIMgd58qksVuKUOqrVZ+/F7L4hPJroXrz8OX46e3fz4+Pv/99fvh/sPPw6eXx6enx38+Pn39/PD6+PVZPv15cPrHw+E+8q+7gy9PJE8kT6E85cM9CHcVfIVQIVaACni4TwJSPAtwhVQhF4iugq8QKsQKUAErVJVYVWJViVUFqgpUFRAV7wVjQ2iIDakhN0wNc0V0DX3DpodND5seNj1setj0sOlh06OmR02Pmh41PWp61PSo6bF+LwiqTrw7JH2Wbk1ajgWhITakhtwwNcwVs2voG4aGTS83vdz0ctPLTS83vdz0vHNGvJFgJBoBI2iEjKiO2If3WiorkVLBKQEj8uXglbCRZESKB+ker5ZYiqstVmKCao+VgBE0QkbYSGpErTFEJaITQEk0AkbQCBlhI8lIri/Mq31W4o0EI9EIGEEjZIQbUcsMqMQbCUaiEa0hKUEjZISNJCO5EbXRSrwRVVanj+r0pXHV7YJ8BvqZdm5I1dsLYkNqyA1TQ/mx6KvPF/QN5ZdiqG5fEBqKXoTq+QVZUX4dy69raayRp2BsCA2xoZZGKUUW2IIGNv6fViULb/6XPFlU/Pj6cjzqf1ZhUoLnt4eX4/Pr4f757enp7vDj4emtfOn7t4fngq8PL/JfseHj8xdBEfz78emo7NfdUtqNiwLnVpii78U9h60CyMEEPK8EYKuAWCBykxCeqItgPNGIYw3KsSnwSSu2VwKdS1YJdDGPKoFjjRC81SIEhq4QMZ9I0KQaS0M841iCJxIZe0MyL50Rc9jaEAm5aA2BSUO29yekUX/6mWllZ5aNOSzG/R4FXBTQX6FAzptxCk1XKcTYFYAGClMHyYmXvkQc9uXkncbeEZGWN+rF204UaBYpGJqEBI0wNKypRvJdI3m8TiNHiziQiccas94IofcGX9cbCXJvCdKVLWHXW5ImvTG1LnCLdeFV9tlbQg7TVV7GqXtZwqsUiLoC4/t9JIgl2Bt1Lq9eKW6VILAqJB9WOWRzKk3ZN4HsaCgQ8sQsyeJuXIVdcGd5cNYP0CP3yrDPFTbWIcWhwqQKuYe7DDDshhj3NsL9weGAmFPs5nRiDZvHRTJdMXOQycjKHvJmg2LJ32aSLq760p82JKaZUVqky2uF7ZXYOqqB2fsIPUbFOAxzs0pEyn1E4sc9AWGm0XszQFxGE3zWjolhJvAW6BKs8nCE0ygDMNGQmZJpBBfHGtNk3tNXXhwk4Gn6gknqCanHy5BWAfddGsvgKuSUxhppOiDAJY2uHC1vrkaEbLYhg5zruuNEI/jrNHhJQcmNuxTDn+2OFGgJ4DCsxjSJ9FQYcD2pO/M2nM4hyOUe/9gv/kb5HSKcXRdJgUYis6FFWIYWYqbjxkysNDqIvucDGXUOGzMVQViSCjFfJ8I9oEeXVsO17T0iZtEbk/ISgdCfTlPDbJ4qS0H2YmTez6MpCU2iqZcA0uc1J6O2s7YQzDy3O4zMjZZqXNuU8fIDTZyO+3CBeRGA8I5aRBd6LWIYzvEo3WABIt9gBcLtX4KYd0hgXHXIcAGBZyl/VZMQnB+aKd8g6fMNkj7vTvp8g6TPN0j6vD/p8w2SPt8g6fMNkn4Kf7Y7Nib9ucdhpO5x5MYhaCpCfYVHeHIjkTRbBWXoCyMahNJ1IjH1AMLrAf+5yMRSScJQXxzxtJrPnqWolHdPPLLbH4N0BWJvDMphbwzKcb/jTjU2Ol3G3U43rcZGp7tgYAiLga1GY2cGlmeDwp6yAWi43DGvBru4bOOM7dy72TRfBthm6YTrt/suFSK2fhXqhl2y3fvJ8Xj/YTZCjWEZoOIyPmX/Ho0+YJeNWT/WwN0RROZcE/ePfTyVwMHQ/WXOtX+tmPaHMu/y/ljmZ4vO24KZ935/NJuLbAxn3sfd8WxekY0B7YK9J7/B3ufOS31/Rjjk6/L/siXg03rr7jwC+OmUCij0GQQmP1bJN7D54G5g88HvtvkQ9s8i5iIbpxE+wH6bn1VkswfPRciSeITVAsBvI4GZvSYXYLFXGK5D+DCzV++XVCHmNFyp8rM9IJ98979EYbibdqEqIfXJt6zv4LAqcTZqjdQ34IXDNUuAMffBjQyVaLTg5eN0sQqXPgnIqy1Gd7ZbG2HvYYALNSFYakIJJjWZTeRxMRRadcr5mCLyDeLadIdqa1yLeXdcm21SbY5rU5GtcQ32LwhMK7I5rm0WmayQzEW2Dm+A/nCXbB3eXPC+3Bc3g8wsxt4Hee+U7UJNlgM5EmpXmyO/1QQnAZYjRdd3ywnGk7bZxtXmMH2hLtz9mCVqj1MGTmJs7iM2GTHjNXv3Mne12Ii42rE+3zMqkWv3ptEFFYQ+tnA4XiC4oLIsy+ne0/V12bSDdUFl/xYWArnlBeHwBc0OV1CfpzA7dyrxlzw+fH58Ob20UG4o6NFt1gNbgqlhrqhHxHUvSQ8NFwyCVA8NFwQ9LlsPDRckPe5UjzBju7RAvh5hpnaEmdoRZv2+HmEuz7Eh6DpLPcJckBqKnsZcPXFcMGtarxcYuN1g4HaFIcV6haGg6OmqiZ4Nz1SvMBTkhnodIrcrDM7uMDi7xKAbWOUWQyF64tyB3WMAu8hAdpOB21UGPU5e7jIUkhsptxk0LpXrDHrgr9xnKKScZY/tRkMhaISMlLPs8hOUjORGWJU1SbMq62sqNyAKUWXdj2ZV1h5nNKLKupfEbCQZyY2koiz9k7yRYCQaUWW13XKdQjuq3KcohI2kVp9ypUJfdLlTUYg3EozE9uVyr6IQNGLK5WpFGcb/eHh5fPj0dFRzVot/e/5s1i2Pr/9+s//YpZ1vL18/H7+8vRzVE1Y3d+TvB3mXwaun+OWjfBdAPwrtqx90OuKz++vOyuCdrDXqoy/f1/9GLVEvAMhn8voj2vclnwPqv6H/Bvg7IP0Ie4l8F/NvJej3ivL8N1IvIVPoIL+hgeA/",
|
|
2164
2164
|
"verification_key": "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"
|
|
2165
2165
|
},
|
|
2166
2166
|
{
|
|
@@ -2191,8 +2191,8 @@
|
|
|
2191
2191
|
}
|
|
2192
2192
|
}
|
|
2193
2193
|
},
|
|
2194
|
-
"bytecode": "
|
|
2195
|
-
"debug_symbols": "
|
|
2194
|
+
"bytecode": "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",
|
|
2195
|
+
"debug_symbols": "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"
|
|
2196
2196
|
},
|
|
2197
2197
|
{
|
|
2198
2198
|
"name": "utility_is_consumable",
|
|
@@ -2259,8 +2259,8 @@
|
|
|
2259
2259
|
}
|
|
2260
2260
|
}
|
|
2261
2261
|
},
|
|
2262
|
-
"bytecode": "H4sIAAAAAAAA/+1dXYwcRxHe6fmfXTuJE/sc9uwEiReEhGQHEG/gv4vP+E92zBu6bHzDsWFv99jds2yeskg8IBHp9uwI8WrfHQZzgFAiIYcghCAv3CIDEijIj7xAJCRLRuJHiMzmdme6p7uqp2dm75zc+
|
|
2263
|
-
"debug_symbols": "
|
|
2262
|
+
"bytecode": "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",
|
|
2263
|
+
"debug_symbols": "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"
|
|
2264
2264
|
},
|
|
2265
2265
|
{
|
|
2266
2266
|
"name": "process_message",
|
|
@@ -2510,8 +2510,8 @@
|
|
|
2510
2510
|
}
|
|
2511
2511
|
}
|
|
2512
2512
|
},
|
|
2513
|
-
"bytecode": "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",
|
|
2514
|
-
"debug_symbols": "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"
|
|
2513
|
+
"bytecode": "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",
|
|
2514
|
+
"debug_symbols": "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"
|
|
2515
2515
|
},
|
|
2516
2516
|
{
|
|
2517
2517
|
"name": "public_dispatch",
|
|
@@ -2586,8 +2586,8 @@
|
|
|
2586
2586
|
}
|
|
2587
2587
|
}
|
|
2588
2588
|
},
|
|
2589
|
-
"bytecode": "
|
|
2590
|
-
"debug_symbols": "
|
|
2589
|
+
"bytecode": "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",
|
|
2590
|
+
"debug_symbols": "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"
|
|
2591
2591
|
},
|
|
2592
2592
|
{
|
|
2593
2593
|
"name": "sync_private_state",
|
|
@@ -2744,8 +2744,8 @@
|
|
|
2744
2744
|
}
|
|
2745
2745
|
}
|
|
2746
2746
|
},
|
|
2747
|
-
"bytecode": "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",
|
|
2748
|
-
"debug_symbols": "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"
|
|
2747
|
+
"bytecode": "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",
|
|
2748
|
+
"debug_symbols": "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"
|
|
2749
2749
|
}
|
|
2750
2750
|
],
|
|
2751
2751
|
"outputs": {
|
|
@@ -3226,7 +3226,7 @@
|
|
|
3226
3226
|
"file_map": {
|
|
3227
3227
|
"100": {
|
|
3228
3228
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/macros/aztec.nr",
|
|
3229
|
-
"source": "use crate::macros::{\n calls_generation::{\n external_functions::{\n generate_external_function_calls, generate_external_function_self_calls_structs,\n },\n internal_functions::generate_call_internal_struct,\n },\n dispatch::generate_public_dispatch,\n internals_functions_generation::{create_fn_abi_exports, process_functions},\n notes::NOTES,\n storage::STORAGE_LAYOUT_NAME,\n utils::{\n get_trait_impl_method, is_fn_contract_library_method, is_fn_external, is_fn_internal,\n is_fn_test, module_has_storage,\n },\n};\n\n/// Marks a contract as an Aztec contract, generating the interfaces for its functions and notes, as well as injecting\n/// the `sync_private_state` utility function.\n/// Note: This is a module annotation, so the returned quote gets injected inside the module (contract) itself.\npub comptime fn aztec(m: Module) -> Quoted {\n // Functions that don't have #[external(...)], #[contract_library_method], or #[test] are not allowed in contracts.\n check_each_fn_macroified(m);\n\n // We generate new functions prefixed with `__aztec_nr_internals__` and we replace the original functions' bodies\n // with `static_assert(false, ...)` to prevent them from being called directly from within the contract.\n let functions = process_functions(m);\n\n // We generate structs and their implementations necessary for convenient functions calls.\n let interface = generate_contract_interface(m);\n let self_call_structs = generate_external_function_self_calls_structs(m);\n let call_internal_struct = generate_call_internal_struct(m);\n\n // We generate ABI exports for all the external functions in the contract.\n let fn_abi_exports = create_fn_abi_exports(m);\n\n // We generate `_compute_note_hash_and_nullifier`, `sync_private_state` and `process_message`\n // functions only if they are not already implemented. If they are implemented we just insert empty\n // quotes.\n let contract_library_method_compute_note_hash_and_nullifier = if !m.functions().any(|f| {\n f.name() == quote { _compute_note_hash_and_nullifier }\n }) {\n generate_contract_library_method_compute_note_hash_and_nullifier()\n } else {\n quote {}\n };\n let sync_private_state_fn_and_abi_export = if !m.functions().any(|f| {\n f.name() == quote { sync_private_state }\n }) {\n generate_sync_private_state()\n } else {\n quote {}\n };\n\n let process_message_fn_and_abi_export = if !m.functions().any(|f| {\n f.name() == quote { process_message }\n }) {\n generate_process_message()\n } else {\n quote {}\n };\n let public_dispatch = generate_public_dispatch(m);\n\n quote {\n $interface\n $self_call_structs\n $call_internal_struct\n $functions\n $fn_abi_exports\n $contract_library_method_compute_note_hash_and_nullifier\n $public_dispatch\n $sync_private_state_fn_and_abi_export\n $process_message_fn_and_abi_export\n }\n}\n\ncomptime fn generate_contract_interface(m: Module) -> Quoted {\n let calls = generate_external_function_calls(m);\n\n let module_name = m.name();\n\n let has_storage_layout = module_has_storage(m) & STORAGE_LAYOUT_NAME.get(m).is_some();\n let storage_layout_getter = if has_storage_layout {\n let storage_layout_name = STORAGE_LAYOUT_NAME.get(m).unwrap();\n quote {\n pub fn storage_layout() -> StorageLayoutFields {\n $storage_layout_name.fields\n }\n }\n } else {\n quote {}\n };\n\n let library_storage_layout_getter = if has_storage_layout {\n quote {\n #[contract_library_method]\n $storage_layout_getter\n }\n } else {\n quote {}\n };\n\n quote {\n pub struct $module_name {\n pub target_contract: dep::aztec::protocol_types::address::AztecAddress\n }\n\n impl $module_name {\n $calls\n\n pub fn at(\n addr: aztec::protocol_types::address::AztecAddress\n ) -> Self {\n Self { target_contract: addr }\n }\n\n pub fn interface() -> Self {\n Self { target_contract: aztec::protocol_types::address::AztecAddress::zero() }\n }\n\n $storage_layout_getter\n }\n\n #[contract_library_method]\n pub fn at(\n addr: aztec::protocol_types::address::AztecAddress\n ) -> $module_name {\n $module_name { target_contract: addr }\n }\n\n #[contract_library_method]\n pub fn interface() -> $module_name {\n $module_name { target_contract: aztec::protocol_types::address::AztecAddress::zero() }\n }\n\n $library_storage_layout_getter\n\n }\n}\n\n/// Generates a contract library method called `_compute_note_hash_and_nullifier` which is used for note\n/// discovery (to create the `aztec::messages::discovery::ComputeNoteHashAndNullifier` function) and to implement the\n/// `compute_note_hash_and_nullifier` unconstrained contract function.\ncomptime fn generate_contract_library_method_compute_note_hash_and_nullifier() -> Quoted {\n if NOTES.len() > 0 {\n // Contracts that do define notes produce an if-else chain where `note_type_id` is matched against the\n // `get_note_type_id()` function of each note type that we know of, in order to identify the note type. Once we\n // know it we call we correct `unpack` method from the `Packable` trait to obtain the underlying note type, and\n // compute the note hash (non-siloed) and inner nullifier (also non-siloed).\n\n let mut if_note_type_id_match_statements_list = @[];\n for i in 0..NOTES.len() {\n let typ = NOTES.get(i);\n\n let get_note_type_id = get_trait_impl_method(\n typ,\n quote { crate::note::note_interface::NoteType },\n quote { get_id },\n );\n let unpack = get_trait_impl_method(\n typ,\n quote { crate::protocol_types::traits::Packable },\n quote { unpack },\n );\n\n let compute_note_hash = get_trait_impl_method(\n typ,\n quote { crate::note::note_interface::NoteHash },\n quote { compute_note_hash },\n );\n\n let compute_nullifier_unconstrained = get_trait_impl_method(\n typ,\n quote { crate::note::note_interface::NoteHash },\n quote { compute_nullifier_unconstrained },\n );\n\n let if_or_else_if = if i == 0 {\n quote { if }\n } else {\n quote { else if }\n };\n\n if_note_type_id_match_statements_list = if_note_type_id_match_statements_list.push_back(\n quote {\n $if_or_else_if note_type_id == $get_note_type_id() {\n // As an extra safety check we make sure that the packed_note BoundedVec has the expected\n // length, since we're about to interpret its raw storage as a fixed-size array by calling the\n // unpack function on it.\n let expected_len = <$typ as $crate::protocol_types::traits::Packable>::N;\n let actual_len = packed_note.len();\n assert(\n actual_len == expected_len,\n f\"Expected packed note of length {expected_len} but got {actual_len} for note type id {note_type_id}\"\n );\n\n let note = $unpack(aztec::utils::array::subarray(packed_note.storage(), 0));\n\n let note_hash = $compute_note_hash(note, owner, storage_slot, randomness);\n \n // The message discovery process finds settled notes, that is, notes that were created in prior\n // transactions and are therefore already part of the note hash tree. We therefore compute the\n // nullification note hash by treating the note as a settled note with the provided note nonce.\n let note_hash_for_nullification = aztec::note::utils::compute_note_hash_for_nullification(\n aztec::note::retrieved_note::RetrievedNote{ \n note,\n contract_address,\n owner,\n randomness,\n storage_slot,\n metadata: aztec::note::note_metadata::SettledNoteMetadata::new(note_nonce).into()\n }\n );\n\n let inner_nullifier = $compute_nullifier_unconstrained(note, owner, note_hash_for_nullification);\n\n Option::some(\n aztec::messages::discovery::NoteHashAndNullifier {\n note_hash, inner_nullifier\n }\n )\n }\n },\n );\n }\n\n let if_note_type_id_match_statements = if_note_type_id_match_statements_list.join(quote {});\n\n quote {\n /// Unpacks an array into a note corresponding to `note_type_id` and then computes its note hash\n /// (non-siloed) and inner nullifier (non-siloed) assuming the note has been inserted into the note hash\n /// tree with `note_nonce`.\n ///\n /// The signature of this function notably matches the `aztec::messages::discovery::ComputeNoteHashAndNullifier` type,\n /// and so it can be used to call functions from that module such as `discover_new_messages`, \n /// `do_process_message` and `attempt_note_discovery`.\n ///\n /// This function is automatically injected by the `#[aztec]` macro.\n #[contract_library_method]\n unconstrained fn _compute_note_hash_and_nullifier(\n packed_note: BoundedVec<Field, aztec::messages::logs::note::MAX_NOTE_PACKED_LEN>,\n owner: aztec::protocol_types::address::AztecAddress,\n storage_slot: Field,\n note_type_id: Field,\n contract_address: aztec::protocol_types::address::AztecAddress,\n randomness: Field,\n note_nonce: Field,\n ) -> Option<aztec::messages::discovery::NoteHashAndNullifier> {\n $if_note_type_id_match_statements\n else {\n Option::none()\n }\n }\n }\n } else {\n // Contracts with no notes still implement this function to avoid having special-casing, the implementation\n // simply throws immediately.\n quote {\n /// This contract does not use private notes, so this function should never be called as it will\n /// unconditionally fail.\n ///\n /// This function is automatically injected by the `#[aztec]` macro.\n #[contract_library_method]\n unconstrained fn _compute_note_hash_and_nullifier(\n _packed_note: BoundedVec<Field, aztec::messages::logs::note::MAX_NOTE_PACKED_LEN>,\n _owner: aztec::protocol_types::address::AztecAddress,\n _storage_slot: Field,\n _note_type_id: Field,\n _contract_address: aztec::protocol_types::address::AztecAddress,\n _randomness: Field,\n _nonce: Field,\n ) -> Option<aztec::messages::discovery::NoteHashAndNullifier> {\n panic(f\"This contract does not use private notes\")\n }\n }\n }\n}\n\ncomptime fn generate_sync_private_state() -> Quoted {\n quote {\n pub struct sync_private_state_parameters {}\n\n #[abi(functions)]\n pub struct sync_private_state_abi {\n parameters: sync_private_state_parameters,\n }\n\n #[aztec::macros::internals_functions_generation::abi_attributes::abi_utility]\n unconstrained fn sync_private_state() {\n let address = aztec::context::utility_context::UtilityContext::new().this_address();\n \n aztec::messages::discovery::discover_new_messages(address, _compute_note_hash_and_nullifier);\n }\n }\n}\n\ncomptime fn generate_process_message() -> Quoted {\n quote {\n pub struct process_message_parameters {\n pub message_ciphertext: BoundedVec<Field, aztec::messages::encoding::MESSAGE_CIPHERTEXT_LEN>,\n pub message_context: aztec::messages::processing::message_context::MessageContext,\n }\n\n #[abi(functions)]\n pub struct process_message_abi {\n parameters: process_message_parameters,\n }\n\n #[aztec::macros::internals_functions_generation::abi_attributes::abi_utility]\n unconstrained fn process_message(\n message_ciphertext: BoundedVec<Field, aztec::messages::encoding::MESSAGE_CIPHERTEXT_LEN>,\n message_context: aztec::messages::processing::message_context::MessageContext,\n ) {\n let address = aztec::context::utility_context::UtilityContext::new().this_address();\n\n aztec::messages::discovery::discover_new_messages(address, _compute_note_hash_and_nullifier); \n aztec::messages::discovery::process_message::process_message_ciphertext(\n address,\n _compute_note_hash_and_nullifier,\n message_ciphertext,\n message_context,\n );\n }\n }\n}\n\n/// Checks that all functions in the module have a context macro applied.\n///\n/// Non-macroified functions are not allowed in contracts. They must all be one of\n/// [external](crate::macros::functions::external), [internal](crate::macros::functions::internal) or `test`.\ncomptime fn check_each_fn_macroified(m: Module) {\n for f in m.functions() {\n let name = f.name();\n if !is_fn_external(f)\n & !is_fn_contract_library_method(f)\n & !is_fn_internal(f)\n & !is_fn_test(f) {\n // We don't suggest that #[contract_library_method] is allowed because we don't want to introduce another\n // concept\n panic(\n f\"Function {name} must be marked as either #[external(...)], #[internal(...)], or #[test]\",\n );\n }\n }\n}\n"
|
|
3229
|
+
"source": "use crate::macros::{\n calls_generation::{\n external_functions::{\n generate_external_function_calls, generate_external_function_self_calls_structs,\n },\n internal_functions::generate_call_internal_struct,\n },\n dispatch::generate_public_dispatch,\n internals_functions_generation::{create_fn_abi_exports, process_functions},\n notes::NOTES,\n storage::STORAGE_LAYOUT_NAME,\n utils::{\n get_trait_impl_method, is_fn_contract_library_method, is_fn_external, is_fn_internal,\n is_fn_test, module_has_storage,\n },\n};\n\n/// Marks a contract as an Aztec contract, generating the interfaces for its functions and notes, as well as injecting\n/// the `sync_private_state` utility function.\n/// Note: This is a module annotation, so the returned quote gets injected inside the module (contract) itself.\npub comptime fn aztec(m: Module) -> Quoted {\n // Functions that don't have #[external(...)], #[contract_library_method], or #[test] are not allowed in contracts.\n check_each_fn_macroified(m);\n\n // We generate new functions prefixed with `__aztec_nr_internals__` and we replace the original functions' bodies\n // with `static_assert(false, ...)` to prevent them from being called directly from within the contract.\n let functions = process_functions(m);\n\n // We generate structs and their implementations necessary for convenient functions calls.\n let interface = generate_contract_interface(m);\n let self_call_structs = generate_external_function_self_calls_structs(m);\n let call_internal_struct = generate_call_internal_struct(m);\n\n // We generate ABI exports for all the external functions in the contract.\n let fn_abi_exports = create_fn_abi_exports(m);\n\n // We generate `_compute_note_hash_and_nullifier`, `sync_private_state` and `process_message`\n // functions only if they are not already implemented. If they are implemented we just insert empty\n // quotes.\n let contract_library_method_compute_note_hash_and_nullifier = if !m.functions().any(|f| {\n f.name() == quote { _compute_note_hash_and_nullifier }\n }) {\n generate_contract_library_method_compute_note_hash_and_nullifier()\n } else {\n quote {}\n };\n let sync_private_state_fn_and_abi_export = if !m.functions().any(|f| {\n f.name() == quote { sync_private_state }\n }) {\n generate_sync_private_state()\n } else {\n quote {}\n };\n\n let process_message_fn_and_abi_export = if !m.functions().any(|f| {\n f.name() == quote { process_message }\n }) {\n generate_process_message()\n } else {\n quote {}\n };\n let public_dispatch = generate_public_dispatch(m);\n\n quote {\n $interface\n $self_call_structs\n $call_internal_struct\n $functions\n $fn_abi_exports\n $contract_library_method_compute_note_hash_and_nullifier\n $public_dispatch\n $sync_private_state_fn_and_abi_export\n $process_message_fn_and_abi_export\n }\n}\n\ncomptime fn generate_contract_interface(m: Module) -> Quoted {\n let calls = generate_external_function_calls(m);\n\n let module_name = m.name();\n\n let has_storage_layout = module_has_storage(m) & STORAGE_LAYOUT_NAME.get(m).is_some();\n let storage_layout_getter = if has_storage_layout {\n let storage_layout_name = STORAGE_LAYOUT_NAME.get(m).unwrap();\n quote {\n pub fn storage_layout() -> StorageLayoutFields {\n $storage_layout_name.fields\n }\n }\n } else {\n quote {}\n };\n\n let library_storage_layout_getter = if has_storage_layout {\n quote {\n #[contract_library_method]\n $storage_layout_getter\n }\n } else {\n quote {}\n };\n\n quote {\n pub struct $module_name {\n pub target_contract: dep::aztec::protocol_types::address::AztecAddress\n }\n\n impl $module_name {\n $calls\n\n pub fn at(\n addr: aztec::protocol_types::address::AztecAddress\n ) -> Self {\n Self { target_contract: addr }\n }\n\n pub fn interface() -> Self {\n Self { target_contract: aztec::protocol_types::address::AztecAddress::zero() }\n }\n\n $storage_layout_getter\n }\n\n #[contract_library_method]\n pub fn at(\n addr: aztec::protocol_types::address::AztecAddress\n ) -> $module_name {\n $module_name { target_contract: addr }\n }\n\n #[contract_library_method]\n pub fn interface() -> $module_name {\n $module_name { target_contract: aztec::protocol_types::address::AztecAddress::zero() }\n }\n\n $library_storage_layout_getter\n\n }\n}\n\n/// Generates a contract library method called `_compute_note_hash_and_nullifier` which is used for note\n/// discovery (to create the `aztec::messages::discovery::ComputeNoteHashAndNullifier` function) and to implement the\n/// `compute_note_hash_and_nullifier` unconstrained contract function.\ncomptime fn generate_contract_library_method_compute_note_hash_and_nullifier() -> Quoted {\n if NOTES.len() > 0 {\n // Contracts that do define notes produce an if-else chain where `note_type_id` is matched against the\n // `get_note_type_id()` function of each note type that we know of, in order to identify the note type. Once we\n // know it we call we correct `unpack` method from the `Packable` trait to obtain the underlying note type, and\n // compute the note hash (non-siloed) and inner nullifier (also non-siloed).\n\n let mut if_note_type_id_match_statements_list = @[];\n for i in 0..NOTES.len() {\n let typ = NOTES.get(i);\n\n let get_note_type_id = get_trait_impl_method(\n typ,\n quote { crate::note::note_interface::NoteType },\n quote { get_id },\n );\n let unpack = get_trait_impl_method(\n typ,\n quote { crate::protocol_types::traits::Packable },\n quote { unpack },\n );\n\n let compute_note_hash = get_trait_impl_method(\n typ,\n quote { crate::note::note_interface::NoteHash },\n quote { compute_note_hash },\n );\n\n let compute_nullifier_unconstrained = get_trait_impl_method(\n typ,\n quote { crate::note::note_interface::NoteHash },\n quote { compute_nullifier_unconstrained },\n );\n\n let if_or_else_if = if i == 0 {\n quote { if }\n } else {\n quote { else if }\n };\n\n if_note_type_id_match_statements_list = if_note_type_id_match_statements_list.push_back(\n quote {\n $if_or_else_if note_type_id == $get_note_type_id() {\n // As an extra safety check we make sure that the packed_note BoundedVec has the expected\n // length, since we're about to interpret its raw storage as a fixed-size array by calling the\n // unpack function on it.\n let expected_len = <$typ as $crate::protocol_types::traits::Packable>::N;\n let actual_len = packed_note.len();\n assert(\n actual_len == expected_len,\n f\"Expected packed note of length {expected_len} but got {actual_len} for note type id {note_type_id}\"\n );\n\n let note = $unpack(aztec::utils::array::subarray(packed_note.storage(), 0));\n\n let note_hash = $compute_note_hash(note, owner, storage_slot, randomness);\n \n // The message discovery process finds settled notes, that is, notes that were created in prior\n // transactions and are therefore already part of the note hash tree. We therefore compute the\n // nullification note hash by treating the note as a settled note with the provided note nonce.\n let note_hash_for_nullification = aztec::note::utils::compute_note_hash_for_nullification(\n aztec::note::hinted_note::HintedNote{\n note,\n contract_address,\n owner,\n randomness,\n storage_slot,\n metadata: aztec::note::note_metadata::SettledNoteMetadata::new(note_nonce).into()\n }\n );\n\n let inner_nullifier = $compute_nullifier_unconstrained(note, owner, note_hash_for_nullification);\n\n Option::some(\n aztec::messages::discovery::NoteHashAndNullifier {\n note_hash, inner_nullifier\n }\n )\n }\n },\n );\n }\n\n let if_note_type_id_match_statements = if_note_type_id_match_statements_list.join(quote {});\n\n quote {\n /// Unpacks an array into a note corresponding to `note_type_id` and then computes its note hash\n /// (non-siloed) and inner nullifier (non-siloed) assuming the note has been inserted into the note hash\n /// tree with `note_nonce`.\n ///\n /// The signature of this function notably matches the `aztec::messages::discovery::ComputeNoteHashAndNullifier` type,\n /// and so it can be used to call functions from that module such as `discover_new_messages`, \n /// `do_process_message` and `attempt_note_discovery`.\n ///\n /// This function is automatically injected by the `#[aztec]` macro.\n #[contract_library_method]\n unconstrained fn _compute_note_hash_and_nullifier(\n packed_note: BoundedVec<Field, aztec::messages::logs::note::MAX_NOTE_PACKED_LEN>,\n owner: aztec::protocol_types::address::AztecAddress,\n storage_slot: Field,\n note_type_id: Field,\n contract_address: aztec::protocol_types::address::AztecAddress,\n randomness: Field,\n note_nonce: Field,\n ) -> Option<aztec::messages::discovery::NoteHashAndNullifier> {\n $if_note_type_id_match_statements\n else {\n Option::none()\n }\n }\n }\n } else {\n // Contracts with no notes still implement this function to avoid having special-casing, the implementation\n // simply throws immediately.\n quote {\n /// This contract does not use private notes, so this function should never be called as it will\n /// unconditionally fail.\n ///\n /// This function is automatically injected by the `#[aztec]` macro.\n #[contract_library_method]\n unconstrained fn _compute_note_hash_and_nullifier(\n _packed_note: BoundedVec<Field, aztec::messages::logs::note::MAX_NOTE_PACKED_LEN>,\n _owner: aztec::protocol_types::address::AztecAddress,\n _storage_slot: Field,\n _note_type_id: Field,\n _contract_address: aztec::protocol_types::address::AztecAddress,\n _randomness: Field,\n _nonce: Field,\n ) -> Option<aztec::messages::discovery::NoteHashAndNullifier> {\n panic(f\"This contract does not use private notes\")\n }\n }\n }\n}\n\ncomptime fn generate_sync_private_state() -> Quoted {\n quote {\n pub struct sync_private_state_parameters {}\n\n #[abi(functions)]\n pub struct sync_private_state_abi {\n parameters: sync_private_state_parameters,\n }\n\n #[aztec::macros::internals_functions_generation::abi_attributes::abi_utility]\n unconstrained fn sync_private_state() {\n let address = aztec::context::utility_context::UtilityContext::new().this_address();\n \n aztec::messages::discovery::discover_new_messages(address, _compute_note_hash_and_nullifier);\n }\n }\n}\n\ncomptime fn generate_process_message() -> Quoted {\n quote {\n pub struct process_message_parameters {\n pub message_ciphertext: BoundedVec<Field, aztec::messages::encoding::MESSAGE_CIPHERTEXT_LEN>,\n pub message_context: aztec::messages::processing::message_context::MessageContext,\n }\n\n #[abi(functions)]\n pub struct process_message_abi {\n parameters: process_message_parameters,\n }\n\n #[aztec::macros::internals_functions_generation::abi_attributes::abi_utility]\n unconstrained fn process_message(\n message_ciphertext: BoundedVec<Field, aztec::messages::encoding::MESSAGE_CIPHERTEXT_LEN>,\n message_context: aztec::messages::processing::message_context::MessageContext,\n ) {\n let address = aztec::context::utility_context::UtilityContext::new().this_address();\n\n aztec::messages::discovery::discover_new_messages(address, _compute_note_hash_and_nullifier); \n aztec::messages::discovery::process_message::process_message_ciphertext(\n address,\n _compute_note_hash_and_nullifier,\n message_ciphertext,\n message_context,\n );\n }\n }\n}\n\n/// Checks that all functions in the module have a context macro applied.\n///\n/// Non-macroified functions are not allowed in contracts. They must all be one of\n/// [external](crate::macros::functions::external), [internal](crate::macros::functions::internal) or `test`.\ncomptime fn check_each_fn_macroified(m: Module) {\n for f in m.functions() {\n let name = f.name();\n if !is_fn_external(f)\n & !is_fn_contract_library_method(f)\n & !is_fn_internal(f)\n & !is_fn_test(f) {\n // We don't suggest that #[contract_library_method] is allowed because we don't want to introduce another\n // concept\n panic(\n f\"Function {name} must be marked as either #[external(...)], #[internal(...)], or #[test]\",\n );\n }\n }\n}\n"
|
|
3230
3230
|
},
|
|
3231
3231
|
"102": {
|
|
3232
3232
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/macros/calls_generation/external_functions_stubs.nr",
|
|
@@ -3250,11 +3250,11 @@
|
|
|
3250
3250
|
},
|
|
3251
3251
|
"125": {
|
|
3252
3252
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/messages/discovery/mod.nr",
|
|
3253
|
-
"source": "use protocol_types::{address::AztecAddress, debug_log::{debug_log, debug_log_format}};\n\npub mod nonce_discovery;\npub mod partial_notes;\npub mod private_events;\npub mod private_notes;\npub mod process_message;\n\nuse crate::{\n messages::{\n discovery::process_message::process_message_ciphertext,\n logs::note::MAX_NOTE_PACKED_LEN,\n processing::{\n get_private_logs, pending_tagged_log::PendingTaggedLog,\n validate_enqueued_notes_and_events,\n },\n },\n utils::array,\n};\n\npub struct NoteHashAndNullifier {\n /// The result of NoteHash::compute_note_hash\n pub note_hash: Field,\n /// The result of NoteHash::compute_nullifier_unconstrained (since all of message discovery is unconstrained)\n pub inner_nullifier: Field,\n}\n\n/// A function which takes a note's packed content, address of the emitting contract, note nonce, storage slot and note\n/// type ID and attempts to compute its note hash (not hashed by note nonce nor siloed by address) and inner nullifier\n/// (not siloed by address).\n///\n/// This function must be user-provided as its implementation requires knowledge of how note type IDs are allocated in a\n/// contract. The `#[aztec]` macro automatically creates such a contract library method called\n/// `_compute_note_hash_and_nullifier`, which looks something like this:\n///\n/// ```\n/// |packed_note, owner, storage_slot, note_type_id, contract_address, randomness, note_nonce| {\n/// if note_type_id == MyNoteType::get_id() {\n/// assert(packed_note.len() == MY_NOTE_TYPE_SERIALIZATION_LENGTH);\n///\n/// let note = MyNoteType::unpack(aztec::utils::array::subarray(packed_note.storage(), 0));\n///\n/// let note_hash = note.compute_note_hash(owner, storage_slot, randomness);\n/// let note_hash_for_nullification = aztec::note::utils::compute_note_hash_for_nullification(\n///
|
|
3253
|
+
"source": "use protocol_types::{address::AztecAddress, debug_log::{debug_log, debug_log_format}};\n\npub mod nonce_discovery;\npub mod partial_notes;\npub mod private_events;\npub mod private_notes;\npub mod process_message;\n\nuse crate::{\n messages::{\n discovery::process_message::process_message_ciphertext,\n logs::note::MAX_NOTE_PACKED_LEN,\n processing::{\n get_private_logs, pending_tagged_log::PendingTaggedLog,\n validate_enqueued_notes_and_events,\n },\n },\n utils::array,\n};\n\npub struct NoteHashAndNullifier {\n /// The result of NoteHash::compute_note_hash\n pub note_hash: Field,\n /// The result of NoteHash::compute_nullifier_unconstrained (since all of message discovery is unconstrained)\n pub inner_nullifier: Field,\n}\n\n/// A function which takes a note's packed content, address of the emitting contract, note nonce, storage slot and note\n/// type ID and attempts to compute its note hash (not hashed by note nonce nor siloed by address) and inner nullifier\n/// (not siloed by address).\n///\n/// This function must be user-provided as its implementation requires knowledge of how note type IDs are allocated in a\n/// contract. The `#[aztec]` macro automatically creates such a contract library method called\n/// `_compute_note_hash_and_nullifier`, which looks something like this:\n///\n/// ```\n/// |packed_note, owner, storage_slot, note_type_id, contract_address, randomness, note_nonce| {\n/// if note_type_id == MyNoteType::get_id() {\n/// assert(packed_note.len() == MY_NOTE_TYPE_SERIALIZATION_LENGTH);\n///\n/// let note = MyNoteType::unpack(aztec::utils::array::subarray(packed_note.storage(), 0));\n///\n/// let note_hash = note.compute_note_hash(owner, storage_slot, randomness);\n/// let note_hash_for_nullification = aztec::note::utils::compute_note_hash_for_nullification(\n/// HintedNote{ note, contract_address, metadata: SettledNoteMetadata::new(note_nonce).into() },\n/// storage_slot\n/// );\n///\n/// let inner_nullifier = note.compute_nullifier_unconstrained(owner, note_hash_for_nullification);\n///\n/// Option::some(\n/// aztec::messages::discovery::NoteHashAndNullifier {\n/// note_hash, inner_nullifier\n/// }\n/// )\n/// } else if note_type_id == MyOtherNoteType::get_id() {\n/// ... // Similar to above but calling MyOtherNoteType::unpack_content\n/// } else {\n/// Option::none() // Unknown note type ID\n/// };\n/// }\n/// ```\npub type ComputeNoteHashAndNullifier<Env> = unconstrained fn[Env](/* packed_note */BoundedVec<Field, MAX_NOTE_PACKED_LEN>, /* owner */ AztecAddress, /* storage_slot */ Field, /* note_type_id */ Field, /* contract_address */ AztecAddress, /* randomness */ Field, /* note nonce */ Field) -> Option<NoteHashAndNullifier>;\n\n/// Performs the message discovery process, in which private logs are downloaded and inspected to find new private\n/// notes, partial notes and events, etc., and pending partial notes are processed to search for their completion logs.\n/// This is the mechanism via which a contract updates its knowledge of its private state.\n///\n/// Note that the state is synchronized up to the latest block synchronized by PXE. That should be close to the chain\n/// tip as block synchronization is performed before contract function simulation is done.\n///\n/// Receives the address of the contract on which discovery is performed along with its\n/// `compute_note_hash_and_nullifier` function.\npub unconstrained fn discover_new_messages<Env>(\n contract_address: AztecAddress,\n compute_note_hash_and_nullifier: ComputeNoteHashAndNullifier<Env>,\n) {\n debug_log(\"Performing message discovery\");\n\n // First we process all private logs, which can contain different kinds of messages e.g. private notes, partial\n // notes, private events, etc.\n let mut logs = get_private_logs(contract_address);\n logs.for_each(|i, pending_tagged_log: PendingTaggedLog| {\n debug_log_format(\n \"Processing log with tag {0}\",\n [pending_tagged_log.log.get(0)],\n );\n\n // We remove the tag from the pending tagged log and process the message ciphertext contained in it.\n let message_ciphertext = array::subbvec(pending_tagged_log.log, 1);\n\n process_message_ciphertext(\n contract_address,\n compute_note_hash_and_nullifier,\n message_ciphertext,\n pending_tagged_log.context,\n );\n logs.remove(i);\n });\n\n // Then we process all pending partial notes, regardless of whether they were found in the current or previous\n // executions.\n partial_notes::fetch_and_process_partial_note_completion_logs(\n contract_address,\n compute_note_hash_and_nullifier,\n );\n\n // Finally we validate all notes and events that were found as part of the previous processes, resulting in them\n // being added to PXE's database and retrievable via oracles (get_notes) and our TS API (PXE::getPrivateEvents).\n validate_enqueued_notes_and_events(contract_address);\n}\n"
|
|
3254
3254
|
},
|
|
3255
3255
|
"126": {
|
|
3256
3256
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/messages/discovery/nonce_discovery.nr",
|
|
3257
|
-
"source": "use crate::messages::{discovery::ComputeNoteHashAndNullifier, logs::note::MAX_NOTE_PACKED_LEN};\n\nuse dep::protocol_types::{\n address::AztecAddress,\n constants::MAX_NOTE_HASHES_PER_TX,\n debug_log::debug_log_format,\n hash::{compute_note_hash_nonce, compute_siloed_note_hash, compute_unique_note_hash},\n traits::ToField,\n};\n\n/// A struct with the discovered information of a complete note, required for delivery to PXE. Note that this is *not*\n/// the complete note information, since it does not include content, storage slot, etc.\npub struct DiscoveredNoteInfo {\n pub note_nonce: Field,\n pub note_hash: Field,\n pub inner_nullifier: Field,\n}\n\n/// Searches for note nonces that will result in a note that was emitted in a transaction. While rare, it is possible\n/// for multiple notes to have the exact same packed content and storage slot but different nonces, resulting in\n/// different unique note hashes. Because of this this function returns a *vector* of discovered notes, though in most\n/// cases it will contain a single element.\n///\n/// Due to how nonces are computed, this function requires knowledge of the transaction in which the note was created,\n/// more specifically the list of all unique note hashes in it plus the value of its first nullifier.\npub unconstrained fn attempt_note_nonce_discovery<Env>(\n unique_note_hashes_in_tx: BoundedVec<Field, MAX_NOTE_HASHES_PER_TX>,\n first_nullifier_in_tx: Field,\n compute_note_hash_and_nullifier: ComputeNoteHashAndNullifier<Env>,\n contract_address: AztecAddress,\n owner: AztecAddress,\n storage_slot: Field,\n randomness: Field,\n note_type_id: Field,\n packed_note: BoundedVec<Field, MAX_NOTE_PACKED_LEN>,\n) -> BoundedVec<DiscoveredNoteInfo, MAX_NOTE_HASHES_PER_TX> {\n let discovered_notes = &mut BoundedVec::new();\n\n debug_log_format(\n \"Attempting nonce discovery on {0} potential notes on contract {1} for storage slot {2}\",\n [unique_note_hashes_in_tx.len() as Field, contract_address.to_field(), storage_slot],\n );\n\n // We need to find nonces (typically just one) that result in a note hash that, once siloed into a unique note hash,\n // is one of the note hashes created by the transaction.\n unique_note_hashes_in_tx.for_eachi(|i, expected_unique_note_hash| {\n // Nonces are computed by hashing the first nullifier in the transaction with the index of the note in the\n // new note hashes array. We therefore know for each note in every transaction what its nonce is.\n let candidate_nonce = compute_note_hash_nonce(first_nullifier_in_tx, i);\n\n // Given note nonce, note content and metadata, we can compute the note hash and silo it to check if it matches\n // the note hash at the array index we're currently processing.\n // TODO(#11157): handle failed note_hash_and_nullifier computation\n let hashes = compute_note_hash_and_nullifier(\n packed_note,\n owner,\n storage_slot,\n note_type_id,\n contract_address,\n randomness,\n candidate_nonce,\n )\n .expect(f\"Failed to compute a note hash for note type {note_type_id}\");\n\n let siloed_note_hash = compute_siloed_note_hash(contract_address, hashes.note_hash);\n let unique_note_hash = compute_unique_note_hash(candidate_nonce, siloed_note_hash);\n\n if unique_note_hash == expected_unique_note_hash {\n // Note that while we did check that the note hash is the preimage of the expected unique note hash, we\n // perform no validations on the nullifier - we fundamentally cannot, since only the application knows\n // how to compute nullifiers. We simply trust it to have provided the correct one: if it hasn't, then\n // PXE may fail to realize that a given note has been nullified already, and calls to the application\n // could result in invalid transactions (with duplicate nullifiers). This is not a concern because an\n // application already has more direct means of making a call to it fail the transaction.\n discovered_notes.push(\n DiscoveredNoteInfo {\n note_nonce: candidate_nonce,\n note_hash: hashes.note_hash,\n inner_nullifier: hashes.inner_nullifier,\n },\n );\n\n // We don't exit the loop - it is possible (though rare) for the exact same note content to be present\n // multiple times in the same transaction with different nonces. This typically doesn't happen due to\n // notes containing random values in order to hide their contents.\n }\n });\n\n debug_log_format(\n \"Found valid nonces for a total of {0} notes\",\n [discovered_notes.len() as Field],\n );\n\n *discovered_notes\n}\n\nmod test {\n use crate::{\n messages::{discovery::NoteHashAndNullifier, logs::note::MAX_NOTE_PACKED_LEN},\n note::{\n note_interface::{NoteHash, NoteType},\n note_metadata::SettledNoteMetadata,\n retrieved_note::RetrievedNote,\n utils::compute_note_hash_for_nullification,\n },\n oracle::random::random,\n test::mocks::mock_note::MockNote,\n utils::array,\n };\n\n use dep::protocol_types::{\n address::AztecAddress,\n hash::{compute_note_hash_nonce, compute_siloed_note_hash, compute_unique_note_hash},\n traits::{FromField, Packable},\n };\n\n use super::attempt_note_nonce_discovery;\n\n // This implementation could be simpler, but this serves as a nice example of the expected flow in a real\n // implementation, and as a sanity check that the interface is sufficient.\n unconstrained fn compute_note_hash_and_nullifier(\n packed_note: BoundedVec<Field, MAX_NOTE_PACKED_LEN>,\n owner: AztecAddress,\n storage_slot: Field,\n note_type_id: Field,\n contract_address: AztecAddress,\n randomness: Field,\n note_nonce: Field,\n ) -> Option<NoteHashAndNullifier> {\n if note_type_id == MockNote::get_id() {\n let note = MockNote::unpack(array::subarray(packed_note.storage(), 0));\n let note_hash = note.compute_note_hash(owner, storage_slot, randomness);\n\n let note_hash_for_nullification = compute_note_hash_for_nullification(\n RetrievedNote {\n note,\n contract_address,\n owner,\n randomness,\n storage_slot,\n metadata: SettledNoteMetadata::new(note_nonce).into(),\n },\n );\n\n let inner_nullifier =\n note.compute_nullifier_unconstrained(owner, note_hash_for_nullification);\n\n Option::some(NoteHashAndNullifier { note_hash, inner_nullifier })\n } else {\n Option::none()\n }\n }\n\n global VALUE: Field = 7;\n global FIRST_NULLIFIER_IN_TX: Field = 47;\n global CONTRACT_ADDRESS: AztecAddress = AztecAddress::from_field(13);\n global OWNER: AztecAddress = AztecAddress::from_field(14);\n global STORAGE_SLOT: Field = 99;\n global RANDOMNESS: Field = 99;\n\n #[test]\n unconstrained fn no_note_hashes() {\n let unique_note_hashes_in_tx = BoundedVec::new();\n let packed_note = BoundedVec::new();\n\n let discovered_notes = attempt_note_nonce_discovery(\n unique_note_hashes_in_tx,\n FIRST_NULLIFIER_IN_TX,\n compute_note_hash_and_nullifier,\n CONTRACT_ADDRESS,\n OWNER,\n STORAGE_SLOT,\n RANDOMNESS,\n MockNote::get_id(),\n packed_note,\n );\n\n assert_eq(discovered_notes.len(), 0);\n }\n\n #[test(should_fail_with = \"Failed to compute a note hash\")]\n unconstrained fn failed_hash_computation() {\n let unique_note_hashes_in_tx = BoundedVec::from_array([random()]);\n let packed_note = BoundedVec::new();\n let note_type_id = 0; // This note type id is unknown to compute_note_hash_and_nullifier\n\n let discovered_notes = attempt_note_nonce_discovery(\n unique_note_hashes_in_tx,\n FIRST_NULLIFIER_IN_TX,\n compute_note_hash_and_nullifier,\n CONTRACT_ADDRESS,\n OWNER,\n STORAGE_SLOT,\n RANDOMNESS,\n note_type_id,\n packed_note,\n );\n\n assert_eq(discovered_notes.len(), 0);\n }\n\n struct NoteAndData {\n note: MockNote,\n note_nonce: Field,\n note_hash: Field,\n unique_note_hash: Field,\n inner_nullifier: Field,\n }\n\n unconstrained fn construct_note(value: Field, note_index_in_tx: u32) -> NoteAndData {\n let note_nonce = compute_note_hash_nonce(FIRST_NULLIFIER_IN_TX, note_index_in_tx);\n\n let retrieved_note = MockNote::new(value)\n .contract_address(CONTRACT_ADDRESS)\n .owner(OWNER)\n .randomness(RANDOMNESS)\n .storage_slot(STORAGE_SLOT)\n .note_metadata(SettledNoteMetadata::new(note_nonce).into())\n .build_retrieved_note();\n let note = retrieved_note.note;\n\n let note_hash = note.compute_note_hash(OWNER, STORAGE_SLOT, RANDOMNESS);\n let unique_note_hash = compute_unique_note_hash(\n note_nonce,\n compute_siloed_note_hash(CONTRACT_ADDRESS, note_hash),\n );\n let inner_nullifier = note.compute_nullifier_unconstrained(\n OWNER,\n compute_note_hash_for_nullification(retrieved_note),\n );\n\n NoteAndData { note, note_nonce, note_hash, unique_note_hash, inner_nullifier }\n }\n\n #[test]\n unconstrained fn single_note() {\n let note_index_in_tx = 2;\n let note_and_data = construct_note(VALUE, note_index_in_tx);\n\n let mut unique_note_hashes_in_tx = BoundedVec::from_array([\n random(), random(), random(), random(), random(), random(), random(),\n ]);\n unique_note_hashes_in_tx.set(note_index_in_tx, note_and_data.unique_note_hash);\n\n let discovered_notes = attempt_note_nonce_discovery(\n unique_note_hashes_in_tx,\n FIRST_NULLIFIER_IN_TX,\n compute_note_hash_and_nullifier,\n CONTRACT_ADDRESS,\n OWNER,\n STORAGE_SLOT,\n RANDOMNESS,\n MockNote::get_id(),\n BoundedVec::from_array(note_and_data.note.pack()),\n );\n\n assert_eq(discovered_notes.len(), 1);\n let discovered_note = discovered_notes.get(0);\n\n assert_eq(discovered_note.note_nonce, note_and_data.note_nonce);\n assert_eq(discovered_note.note_hash, note_and_data.note_hash);\n assert_eq(discovered_note.inner_nullifier, note_and_data.inner_nullifier);\n }\n\n #[test]\n unconstrained fn multiple_notes_same_preimage() {\n let first_note_index_in_tx = 3;\n let first_note_and_data = construct_note(VALUE, first_note_index_in_tx);\n\n let second_note_index_in_tx = 5;\n let second_note_and_data = construct_note(VALUE, second_note_index_in_tx);\n\n // Both notes have the same preimage (and therefore packed representation), so both should be found in the same\n // call.\n assert_eq(first_note_and_data.note, second_note_and_data.note);\n let packed_note = first_note_and_data.note.pack();\n\n let mut unique_note_hashes_in_tx = BoundedVec::from_array([\n random(), random(), random(), random(), random(), random(), random(),\n ]);\n unique_note_hashes_in_tx.set(first_note_index_in_tx, first_note_and_data.unique_note_hash);\n unique_note_hashes_in_tx.set(second_note_index_in_tx, second_note_and_data.unique_note_hash);\n\n let discovered_notes = attempt_note_nonce_discovery(\n unique_note_hashes_in_tx,\n FIRST_NULLIFIER_IN_TX,\n compute_note_hash_and_nullifier,\n CONTRACT_ADDRESS,\n OWNER,\n STORAGE_SLOT,\n RANDOMNESS,\n MockNote::get_id(),\n BoundedVec::from_array(packed_note),\n );\n\n assert_eq(discovered_notes.len(), 2);\n\n assert(discovered_notes.any(|discovered_note| {\n (discovered_note.note_nonce == first_note_and_data.note_nonce)\n & (discovered_note.note_hash == first_note_and_data.note_hash)\n & (discovered_note.inner_nullifier == first_note_and_data.inner_nullifier)\n }));\n\n assert(discovered_notes.any(|discovered_note| {\n (discovered_note.note_nonce == second_note_and_data.note_nonce)\n & (discovered_note.note_hash == second_note_and_data.note_hash)\n & (discovered_note.inner_nullifier == second_note_and_data.inner_nullifier)\n }));\n }\n}\n"
|
|
3257
|
+
"source": "use crate::messages::{discovery::ComputeNoteHashAndNullifier, logs::note::MAX_NOTE_PACKED_LEN};\n\nuse dep::protocol_types::{\n address::AztecAddress,\n constants::MAX_NOTE_HASHES_PER_TX,\n debug_log::debug_log_format,\n hash::{compute_note_hash_nonce, compute_siloed_note_hash, compute_unique_note_hash},\n traits::ToField,\n};\n\n/// A struct with the discovered information of a complete note, required for delivery to PXE. Note that this is *not*\n/// the complete note information, since it does not include content, storage slot, etc.\npub struct DiscoveredNoteInfo {\n pub note_nonce: Field,\n pub note_hash: Field,\n pub inner_nullifier: Field,\n}\n\n/// Searches for note nonces that will result in a note that was emitted in a transaction. While rare, it is possible\n/// for multiple notes to have the exact same packed content and storage slot but different nonces, resulting in\n/// different unique note hashes. Because of this this function returns a *vector* of discovered notes, though in most\n/// cases it will contain a single element.\n///\n/// Due to how nonces are computed, this function requires knowledge of the transaction in which the note was created,\n/// more specifically the list of all unique note hashes in it plus the value of its first nullifier.\npub unconstrained fn attempt_note_nonce_discovery<Env>(\n unique_note_hashes_in_tx: BoundedVec<Field, MAX_NOTE_HASHES_PER_TX>,\n first_nullifier_in_tx: Field,\n compute_note_hash_and_nullifier: ComputeNoteHashAndNullifier<Env>,\n contract_address: AztecAddress,\n owner: AztecAddress,\n storage_slot: Field,\n randomness: Field,\n note_type_id: Field,\n packed_note: BoundedVec<Field, MAX_NOTE_PACKED_LEN>,\n) -> BoundedVec<DiscoveredNoteInfo, MAX_NOTE_HASHES_PER_TX> {\n let discovered_notes = &mut BoundedVec::new();\n\n debug_log_format(\n \"Attempting nonce discovery on {0} potential notes on contract {1} for storage slot {2}\",\n [unique_note_hashes_in_tx.len() as Field, contract_address.to_field(), storage_slot],\n );\n\n // We need to find nonces (typically just one) that result in a note hash that, once siloed into a unique note hash,\n // is one of the note hashes created by the transaction.\n unique_note_hashes_in_tx.for_eachi(|i, expected_unique_note_hash| {\n // Nonces are computed by hashing the first nullifier in the transaction with the index of the note in the\n // new note hashes array. We therefore know for each note in every transaction what its nonce is.\n let candidate_nonce = compute_note_hash_nonce(first_nullifier_in_tx, i);\n\n // Given note nonce, note content and metadata, we can compute the note hash and silo it to check if it matches\n // the note hash at the array index we're currently processing.\n // TODO(#11157): handle failed note_hash_and_nullifier computation\n let hashes = compute_note_hash_and_nullifier(\n packed_note,\n owner,\n storage_slot,\n note_type_id,\n contract_address,\n randomness,\n candidate_nonce,\n )\n .expect(f\"Failed to compute a note hash for note type {note_type_id}\");\n\n let siloed_note_hash = compute_siloed_note_hash(contract_address, hashes.note_hash);\n let unique_note_hash = compute_unique_note_hash(candidate_nonce, siloed_note_hash);\n\n if unique_note_hash == expected_unique_note_hash {\n // Note that while we did check that the note hash is the preimage of the expected unique note hash, we\n // perform no validations on the nullifier - we fundamentally cannot, since only the application knows\n // how to compute nullifiers. We simply trust it to have provided the correct one: if it hasn't, then\n // PXE may fail to realize that a given note has been nullified already, and calls to the application\n // could result in invalid transactions (with duplicate nullifiers). This is not a concern because an\n // application already has more direct means of making a call to it fail the transaction.\n discovered_notes.push(\n DiscoveredNoteInfo {\n note_nonce: candidate_nonce,\n note_hash: hashes.note_hash,\n inner_nullifier: hashes.inner_nullifier,\n },\n );\n\n // We don't exit the loop - it is possible (though rare) for the exact same note content to be present\n // multiple times in the same transaction with different nonces. This typically doesn't happen due to\n // notes containing random values in order to hide their contents.\n }\n });\n\n debug_log_format(\n \"Found valid nonces for a total of {0} notes\",\n [discovered_notes.len() as Field],\n );\n\n *discovered_notes\n}\n\nmod test {\n use crate::{\n messages::{discovery::NoteHashAndNullifier, logs::note::MAX_NOTE_PACKED_LEN},\n note::{\n hinted_note::HintedNote,\n note_interface::{NoteHash, NoteType},\n note_metadata::SettledNoteMetadata,\n utils::compute_note_hash_for_nullification,\n },\n oracle::random::random,\n test::mocks::mock_note::MockNote,\n utils::array,\n };\n\n use dep::protocol_types::{\n address::AztecAddress,\n hash::{compute_note_hash_nonce, compute_siloed_note_hash, compute_unique_note_hash},\n traits::{FromField, Packable},\n };\n\n use super::attempt_note_nonce_discovery;\n\n // This implementation could be simpler, but this serves as a nice example of the expected flow in a real\n // implementation, and as a sanity check that the interface is sufficient.\n unconstrained fn compute_note_hash_and_nullifier(\n packed_note: BoundedVec<Field, MAX_NOTE_PACKED_LEN>,\n owner: AztecAddress,\n storage_slot: Field,\n note_type_id: Field,\n contract_address: AztecAddress,\n randomness: Field,\n note_nonce: Field,\n ) -> Option<NoteHashAndNullifier> {\n if note_type_id == MockNote::get_id() {\n let note = MockNote::unpack(array::subarray(packed_note.storage(), 0));\n let note_hash = note.compute_note_hash(owner, storage_slot, randomness);\n\n let note_hash_for_nullification = compute_note_hash_for_nullification(\n HintedNote {\n note,\n contract_address,\n owner,\n randomness,\n storage_slot,\n metadata: SettledNoteMetadata::new(note_nonce).into(),\n },\n );\n\n let inner_nullifier =\n note.compute_nullifier_unconstrained(owner, note_hash_for_nullification);\n\n Option::some(NoteHashAndNullifier { note_hash, inner_nullifier })\n } else {\n Option::none()\n }\n }\n\n global VALUE: Field = 7;\n global FIRST_NULLIFIER_IN_TX: Field = 47;\n global CONTRACT_ADDRESS: AztecAddress = AztecAddress::from_field(13);\n global OWNER: AztecAddress = AztecAddress::from_field(14);\n global STORAGE_SLOT: Field = 99;\n global RANDOMNESS: Field = 99;\n\n #[test]\n unconstrained fn no_note_hashes() {\n let unique_note_hashes_in_tx = BoundedVec::new();\n let packed_note = BoundedVec::new();\n\n let discovered_notes = attempt_note_nonce_discovery(\n unique_note_hashes_in_tx,\n FIRST_NULLIFIER_IN_TX,\n compute_note_hash_and_nullifier,\n CONTRACT_ADDRESS,\n OWNER,\n STORAGE_SLOT,\n RANDOMNESS,\n MockNote::get_id(),\n packed_note,\n );\n\n assert_eq(discovered_notes.len(), 0);\n }\n\n #[test(should_fail_with = \"Failed to compute a note hash\")]\n unconstrained fn failed_hash_computation() {\n let unique_note_hashes_in_tx = BoundedVec::from_array([random()]);\n let packed_note = BoundedVec::new();\n let note_type_id = 0; // This note type id is unknown to compute_note_hash_and_nullifier\n\n let discovered_notes = attempt_note_nonce_discovery(\n unique_note_hashes_in_tx,\n FIRST_NULLIFIER_IN_TX,\n compute_note_hash_and_nullifier,\n CONTRACT_ADDRESS,\n OWNER,\n STORAGE_SLOT,\n RANDOMNESS,\n note_type_id,\n packed_note,\n );\n\n assert_eq(discovered_notes.len(), 0);\n }\n\n struct NoteAndData {\n note: MockNote,\n note_nonce: Field,\n note_hash: Field,\n unique_note_hash: Field,\n inner_nullifier: Field,\n }\n\n unconstrained fn construct_note(value: Field, note_index_in_tx: u32) -> NoteAndData {\n let note_nonce = compute_note_hash_nonce(FIRST_NULLIFIER_IN_TX, note_index_in_tx);\n\n let hinted_note = MockNote::new(value)\n .contract_address(CONTRACT_ADDRESS)\n .owner(OWNER)\n .randomness(RANDOMNESS)\n .storage_slot(STORAGE_SLOT)\n .note_metadata(SettledNoteMetadata::new(note_nonce).into())\n .build_hinted_note();\n let note = hinted_note.note;\n\n let note_hash = note.compute_note_hash(OWNER, STORAGE_SLOT, RANDOMNESS);\n let unique_note_hash = compute_unique_note_hash(\n note_nonce,\n compute_siloed_note_hash(CONTRACT_ADDRESS, note_hash),\n );\n let inner_nullifier = note.compute_nullifier_unconstrained(\n OWNER,\n compute_note_hash_for_nullification(hinted_note),\n );\n\n NoteAndData { note, note_nonce, note_hash, unique_note_hash, inner_nullifier }\n }\n\n #[test]\n unconstrained fn single_note() {\n let note_index_in_tx = 2;\n let note_and_data = construct_note(VALUE, note_index_in_tx);\n\n let mut unique_note_hashes_in_tx = BoundedVec::from_array([\n random(), random(), random(), random(), random(), random(), random(),\n ]);\n unique_note_hashes_in_tx.set(note_index_in_tx, note_and_data.unique_note_hash);\n\n let discovered_notes = attempt_note_nonce_discovery(\n unique_note_hashes_in_tx,\n FIRST_NULLIFIER_IN_TX,\n compute_note_hash_and_nullifier,\n CONTRACT_ADDRESS,\n OWNER,\n STORAGE_SLOT,\n RANDOMNESS,\n MockNote::get_id(),\n BoundedVec::from_array(note_and_data.note.pack()),\n );\n\n assert_eq(discovered_notes.len(), 1);\n let discovered_note = discovered_notes.get(0);\n\n assert_eq(discovered_note.note_nonce, note_and_data.note_nonce);\n assert_eq(discovered_note.note_hash, note_and_data.note_hash);\n assert_eq(discovered_note.inner_nullifier, note_and_data.inner_nullifier);\n }\n\n #[test]\n unconstrained fn multiple_notes_same_preimage() {\n let first_note_index_in_tx = 3;\n let first_note_and_data = construct_note(VALUE, first_note_index_in_tx);\n\n let second_note_index_in_tx = 5;\n let second_note_and_data = construct_note(VALUE, second_note_index_in_tx);\n\n // Both notes have the same preimage (and therefore packed representation), so both should be found in the same\n // call.\n assert_eq(first_note_and_data.note, second_note_and_data.note);\n let packed_note = first_note_and_data.note.pack();\n\n let mut unique_note_hashes_in_tx = BoundedVec::from_array([\n random(), random(), random(), random(), random(), random(), random(),\n ]);\n unique_note_hashes_in_tx.set(first_note_index_in_tx, first_note_and_data.unique_note_hash);\n unique_note_hashes_in_tx.set(second_note_index_in_tx, second_note_and_data.unique_note_hash);\n\n let discovered_notes = attempt_note_nonce_discovery(\n unique_note_hashes_in_tx,\n FIRST_NULLIFIER_IN_TX,\n compute_note_hash_and_nullifier,\n CONTRACT_ADDRESS,\n OWNER,\n STORAGE_SLOT,\n RANDOMNESS,\n MockNote::get_id(),\n BoundedVec::from_array(packed_note),\n );\n\n assert_eq(discovered_notes.len(), 2);\n\n assert(discovered_notes.any(|discovered_note| {\n (discovered_note.note_nonce == first_note_and_data.note_nonce)\n & (discovered_note.note_hash == first_note_and_data.note_hash)\n & (discovered_note.inner_nullifier == first_note_and_data.inner_nullifier)\n }));\n\n assert(discovered_notes.any(|discovered_note| {\n (discovered_note.note_nonce == second_note_and_data.note_nonce)\n & (discovered_note.note_hash == second_note_and_data.note_hash)\n & (discovered_note.inner_nullifier == second_note_and_data.inner_nullifier)\n }));\n }\n}\n"
|
|
3258
3258
|
},
|
|
3259
3259
|
"127": {
|
|
3260
3260
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/messages/discovery/partial_notes.nr",
|
|
@@ -3296,27 +3296,27 @@
|
|
|
3296
3296
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/messages/processing/mod.nr",
|
|
3297
3297
|
"source": "pub(crate) mod event_validation_request;\npub mod message_context;\npub(crate) mod note_validation_request;\npub(crate) mod log_retrieval_request;\npub(crate) mod log_retrieval_response;\npub(crate) mod pending_tagged_log;\n\nuse crate::{\n capsules::CapsuleArray,\n event::event_selector::EventSelector,\n messages::{\n discovery::partial_notes::DeliveredPendingPartialNote,\n logs::{event::MAX_EVENT_SERIALIZED_LEN, note::MAX_NOTE_PACKED_LEN},\n processing::{\n log_retrieval_request::LogRetrievalRequest,\n log_retrieval_response::LogRetrievalResponse,\n note_validation_request::NoteValidationRequest, pending_tagged_log::PendingTaggedLog,\n },\n },\n oracle,\n};\nuse event_validation_request::EventValidationRequest;\nuse protocol_types::{address::AztecAddress, hash::sha256_to_field};\n\n// Base slot for the pending tagged log array to which the fetch_tagged_logs oracle inserts found private logs.\nglobal PENDING_TAGGED_LOG_ARRAY_BASE_SLOT: Field =\n sha256_to_field(\"AZTEC_NR::PENDING_TAGGED_LOG_ARRAY_BASE_SLOT\".as_bytes());\n\nglobal NOTE_VALIDATION_REQUESTS_ARRAY_BASE_SLOT: Field = sha256_to_field(\n \"AZTEC_NR::NOTE_VALIDATION_REQUESTS_ARRAY_BASE_SLOT\".as_bytes(),\n);\n\nglobal EVENT_VALIDATION_REQUESTS_ARRAY_BASE_SLOT: Field = sha256_to_field(\n \"AZTEC_NR::EVENT_VALIDATION_REQUESTS_ARRAY_BASE_SLOT\".as_bytes(),\n);\n\nglobal LOG_RETRIEVAL_REQUESTS_ARRAY_BASE_SLOT: Field = sha256_to_field(\n \"AZTEC_NR::LOG_RETRIEVAL_REQUESTS_ARRAY_BASE_SLOT\".as_bytes(),\n);\n\nglobal LOG_RETRIEVAL_RESPONSES_ARRAY_BASE_SLOT: Field = sha256_to_field(\n \"AZTEC_NR::LOG_RETRIEVAL_RESPONSES_ARRAY_BASE_SLOT\".as_bytes(),\n);\n\n/// Searches for private logs emitted by `contract_address` that might contain messages for one of the local accounts,\n/// and stores them in a `CapsuleArray` which is then returned.\npub(crate) unconstrained fn get_private_logs(\n contract_address: AztecAddress,\n) -> CapsuleArray<PendingTaggedLog> {\n // We will eventually perform log discovery via tagging here, but for now we simply call the `fetchTaggedLogs`\n // oracle. This makes PXE synchronize tags, download logs and store the pending tagged logs in a capsule array.\n oracle::message_processing::fetch_tagged_logs(PENDING_TAGGED_LOG_ARRAY_BASE_SLOT);\n\n CapsuleArray::at(contract_address, PENDING_TAGGED_LOG_ARRAY_BASE_SLOT)\n}\n\n/// Enqueues a note for validation by PXE, so that it becomes aware of a note's existence allowing for later retrieval\n/// via `get_notes` oracle. The note will be scoped to `contract_address`, meaning other contracts will not be able to\n/// access it unless authorized.\n///\n/// In order for the note validation and insertion to occur, `validate_enqueued_notes_and_events` must be later called.\n/// For optimal performance, accumulate as many note validation requests as possible and then validate them all at the\n/// end (which results in PXE minimizing the number of network round-trips).\n///\n/// The `packed_note` is what `getNotes` will later return. PXE indexes notes by `storage_slot`, so this value\n/// is typically used to filter notes that correspond to different state variables. `note_hash` and `nullifier` are\n/// the inner hashes, i.e. the raw hashes returned by `NoteHash::compute_note_hash` and\n/// `NoteHash::compute_nullifier`. PXE will verify that the siloed unique note hash was inserted into the tree\n/// at `tx_hash`, and will store the nullifier to later check for nullification.\n///\n/// `owner` is the address used in note hash and nullifier computation, often requiring knowledge of their\n/// nullifier secret key.\n///\n/// `recipient` is the account to which the note message was delivered (i.e. the address the message was encrypted to).\n/// This determines which PXE account can see the note - other accounts will not be able to access it (e.g. other\n/// accounts will not be able to see one another's token balance notes, even in the same PXE) unless authorized. In most\n/// cases `recipient` equals `owner`, but they can differ in scenarios like delegated discovery.\npub(crate) unconstrained fn enqueue_note_for_validation(\n contract_address: AztecAddress,\n owner: AztecAddress,\n storage_slot: Field,\n randomness: Field,\n note_nonce: Field,\n packed_note: BoundedVec<Field, MAX_NOTE_PACKED_LEN>,\n note_hash: Field,\n nullifier: Field,\n tx_hash: Field,\n recipient: AztecAddress,\n) {\n // We store requests in a `CapsuleArray`, which PXE will later read from and deserialize into its version of the\n // Noir `NoteValidationRequest`\n CapsuleArray::at(contract_address, NOTE_VALIDATION_REQUESTS_ARRAY_BASE_SLOT).push(\n NoteValidationRequest {\n contract_address,\n owner,\n storage_slot,\n randomness,\n note_nonce,\n packed_note,\n note_hash,\n nullifier,\n tx_hash,\n recipient,\n },\n )\n}\n\n/// Enqueues an event for validation by PXE, so that it can be efficiently validated and then inserted into the event\n/// store.\n///\n/// In order for the event validation and insertion to occur, `validate_enqueued_notes_and_events` must be later\n/// called. For optimal performance, accumulate as many event validation requests as possible and then validate them\n/// all at the end (which results in PXE minimizing the number of network round-trips).\npub(crate) unconstrained fn enqueue_event_for_validation(\n contract_address: AztecAddress,\n event_type_id: EventSelector,\n randomness: Field,\n serialized_event: BoundedVec<Field, MAX_EVENT_SERIALIZED_LEN>,\n event_commitment: Field,\n tx_hash: Field,\n recipient: AztecAddress,\n) {\n // We store requests in a `CapsuleArray`, which PXE will later read from and deserialize into its version of the\n // Noir `EventValidationRequest`\n CapsuleArray::at(contract_address, EVENT_VALIDATION_REQUESTS_ARRAY_BASE_SLOT).push(\n EventValidationRequest {\n contract_address,\n event_type_id,\n randomness,\n serialized_event,\n event_commitment,\n tx_hash,\n recipient,\n },\n )\n}\n\n/// Validates all note and event validation requests enqueued via `enqueue_note_for_validation` and\n/// `enqueue_event_for_validation`, inserting them into the note database and event store respectively, making them\n/// queryable via `get_notes` oracle and our TS API (PXE::getPrivateEvents).\n///\n/// This automatically clears both validation request queues, so no further work needs to be done by the caller.\npub(crate) unconstrained fn validate_enqueued_notes_and_events(contract_address: AztecAddress) {\n oracle::message_processing::validate_enqueued_notes_and_events(\n contract_address,\n NOTE_VALIDATION_REQUESTS_ARRAY_BASE_SLOT,\n EVENT_VALIDATION_REQUESTS_ARRAY_BASE_SLOT,\n );\n}\n\n/// Efficiently queries the node for logs that result in the completion of all `DeliveredPendingPartialNote`s stored in\n/// a `CapsuleArray` by performing all node communication concurrently. Returns a second `CapsuleArray` with Options for\n/// the responses that correspond to the pending partial notes at the same index.\n///\n/// For example, given an array with pending partial notes `[ p1, p2, p3 ]`, where `p1` and `p3` have corresponding\n/// completion logs but `p2` does not, the returned `CapsuleArray` will have contents\n/// `[some(p1_log), none(), some(p3_log)]`.\npub(crate) unconstrained fn get_pending_partial_notes_completion_logs(\n contract_address: AztecAddress,\n pending_partial_notes: CapsuleArray<DeliveredPendingPartialNote>,\n) -> CapsuleArray<Option<LogRetrievalResponse>> {\n let log_retrieval_requests =\n CapsuleArray::at(contract_address, LOG_RETRIEVAL_REQUESTS_ARRAY_BASE_SLOT);\n\n // We create a LogRetrievalRequest for each PendingPartialNote in the CapsuleArray. Because we need the indices in\n // the request array to match the indices in the partial note array, we can't use CapsuleArray::for_each, as that\n // function has arbitrary iteration order. Instead, we manually iterate the array from the beginning and push into\n // the requests array, which we expect to be empty.\n let mut i = 0;\n let pending_partial_notes_count = pending_partial_notes.len();\n while i < pending_partial_notes_count {\n let pending_partial_note = pending_partial_notes.get(i);\n log_retrieval_requests.push(\n LogRetrievalRequest {\n contract_address,\n unsiloed_tag: pending_partial_note.note_completion_log_tag,\n },\n );\n i += 1;\n }\n\n oracle::message_processing::bulk_retrieve_logs(\n contract_address,\n LOG_RETRIEVAL_REQUESTS_ARRAY_BASE_SLOT,\n LOG_RETRIEVAL_RESPONSES_ARRAY_BASE_SLOT,\n );\n\n CapsuleArray::at(contract_address, LOG_RETRIEVAL_RESPONSES_ARRAY_BASE_SLOT)\n}\n"
|
|
3298
3298
|
},
|
|
3299
|
-
"169": {
|
|
3300
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/call_private_function.nr",
|
|
3301
|
-
"source": "use dep::protocol_types::{\n abis::function_selector::FunctionSelector, address::AztecAddress, utils::reader::Reader,\n};\n\n#[oracle(privateCallPrivateFunction)]\nunconstrained fn call_private_function_oracle(\n _contract_address: AztecAddress,\n _function_selector: FunctionSelector,\n _args_hash: Field,\n _start_side_effect_counter: u32,\n _is_static_call: bool,\n) -> [Field; 2] {}\n\npub unconstrained fn call_private_function_internal(\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n start_side_effect_counter: u32,\n is_static_call: bool,\n) -> (u32, Field) {\n let fields = call_private_function_oracle(\n contract_address,\n function_selector,\n args_hash,\n start_side_effect_counter,\n is_static_call,\n );\n\n let mut reader = Reader::new(fields);\n let end_side_effect_counter = reader.read_u32();\n let returns_hash = reader.read();\n\n (end_side_effect_counter, returns_hash)\n}\n"
|
|
3302
|
-
},
|
|
3303
3299
|
"17": {
|
|
3304
3300
|
"path": "std/field/bn254.nr",
|
|
3305
3301
|
"source": "use crate::field::field_less_than;\nuse crate::runtime::is_unconstrained;\n\n// The low and high decomposition of the field modulus\npub(crate) global PLO: Field = 53438638232309528389504892708671455233;\npub(crate) global PHI: Field = 64323764613183177041862057485226039389;\n\npub(crate) global TWO_POW_128: Field = 0x100000000000000000000000000000000;\n\n// Decomposes a single field into two 16 byte fields.\nfn compute_decomposition(x: Field) -> (Field, Field) {\n // Here's we're taking advantage of truncating 128 bit limbs from the input field\n // and then subtracting them from the input such the field division is equivalent to integer division.\n let low = (x as u128) as Field;\n let high = (x - low) / TWO_POW_128;\n\n (low, high)\n}\n\npub(crate) unconstrained fn decompose_hint(x: Field) -> (Field, Field) {\n compute_decomposition(x)\n}\n\nunconstrained fn lte_hint(x: Field, y: Field) -> bool {\n if x == y {\n true\n } else {\n field_less_than(x, y)\n }\n}\n\n// Assert that (alo > blo && ahi >= bhi) || (alo <= blo && ahi > bhi)\nfn assert_gt_limbs(a: (Field, Field), b: (Field, Field)) {\n let (alo, ahi) = a;\n let (blo, bhi) = b;\n // Safety: borrow is enforced to be boolean due to its type.\n // if borrow is 0, it asserts that (alo > blo && ahi >= bhi)\n // if borrow is 1, it asserts that (alo <= blo && ahi > bhi)\n unsafe {\n let borrow = lte_hint(alo, blo);\n\n let rlo = alo - blo - 1 + (borrow as Field) * TWO_POW_128;\n let rhi = ahi - bhi - (borrow as Field);\n\n rlo.assert_max_bit_size::<128>();\n rhi.assert_max_bit_size::<128>();\n }\n}\n\n/// Decompose a single field into two 16 byte fields.\npub fn decompose(x: Field) -> (Field, Field) {\n if is_unconstrained() {\n compute_decomposition(x)\n } else {\n // Safety: decomposition is properly checked below\n unsafe {\n // Take hints of the decomposition\n let (xlo, xhi) = decompose_hint(x);\n\n // Range check the limbs\n xlo.assert_max_bit_size::<128>();\n xhi.assert_max_bit_size::<128>();\n\n // Check that the decomposition is correct\n assert_eq(x, xlo + TWO_POW_128 * xhi);\n\n // Assert that the decomposition of P is greater than the decomposition of x\n assert_gt_limbs((PLO, PHI), (xlo, xhi));\n (xlo, xhi)\n }\n }\n}\n\npub fn assert_gt(a: Field, b: Field) {\n if is_unconstrained() {\n assert(\n // Safety: already unconstrained\n unsafe { field_less_than(b, a) },\n );\n } else {\n // Decompose a and b\n let a_limbs = decompose(a);\n let b_limbs = decompose(b);\n\n // Assert that a_limbs is greater than b_limbs\n assert_gt_limbs(a_limbs, b_limbs)\n }\n}\n\npub fn assert_lt(a: Field, b: Field) {\n assert_gt(b, a);\n}\n\npub fn gt(a: Field, b: Field) -> bool {\n if is_unconstrained() {\n // Safety: unsafe in unconstrained\n unsafe {\n field_less_than(b, a)\n }\n } else if a == b {\n false\n } else {\n // Safety: Take a hint of the comparison and verify it\n unsafe {\n if field_less_than(a, b) {\n assert_gt(b, a);\n false\n } else {\n assert_gt(a, b);\n true\n }\n }\n }\n}\n\npub fn lt(a: Field, b: Field) -> bool {\n gt(b, a)\n}\n\nmod tests {\n // TODO: Allow imports from \"super\"\n use crate::field::bn254::{assert_gt, decompose, gt, lt, lte_hint, PHI, PLO, TWO_POW_128};\n\n #[test]\n fn check_decompose() {\n assert_eq(decompose(TWO_POW_128), (0, 1));\n assert_eq(decompose(TWO_POW_128 + 0x1234567890), (0x1234567890, 1));\n assert_eq(decompose(0x1234567890), (0x1234567890, 0));\n }\n\n #[test]\n unconstrained fn check_lte_hint() {\n assert(lte_hint(0, 1));\n assert(lte_hint(0, 0x100));\n assert(lte_hint(0x100, TWO_POW_128 - 1));\n assert(!lte_hint(0 - 1, 0));\n\n assert(lte_hint(0, 0));\n assert(lte_hint(0x100, 0x100));\n assert(lte_hint(0 - 1, 0 - 1));\n }\n\n #[test]\n fn check_gt() {\n assert(gt(1, 0));\n assert(gt(0x100, 0));\n assert(gt((0 - 1), (0 - 2)));\n assert(gt(TWO_POW_128, 0));\n assert(!gt(0, 0));\n assert(!gt(0, 0x100));\n assert(gt(0 - 1, 0 - 2));\n assert(!gt(0 - 2, 0 - 1));\n assert_gt(0 - 1, 0);\n }\n\n #[test]\n fn check_plo_phi() {\n assert_eq(PLO + PHI * TWO_POW_128, 0);\n let p_bytes = crate::field::modulus_le_bytes();\n let mut p_low: Field = 0;\n let mut p_high: Field = 0;\n\n let mut offset = 1;\n for i in 0..16 {\n p_low += (p_bytes[i] as Field) * offset;\n p_high += (p_bytes[i + 16] as Field) * offset;\n offset *= 256;\n }\n assert_eq(p_low, PLO);\n assert_eq(p_high, PHI);\n }\n\n #[test]\n fn check_decompose_edge_cases() {\n assert_eq(decompose(0), (0, 0));\n assert_eq(decompose(TWO_POW_128 - 1), (TWO_POW_128 - 1, 0));\n assert_eq(decompose(TWO_POW_128 + 1), (1, 1));\n assert_eq(decompose(TWO_POW_128 * 2), (0, 2));\n assert_eq(decompose(TWO_POW_128 * 2 + 0x1234567890), (0x1234567890, 2));\n }\n\n #[test]\n fn check_decompose_large_values() {\n let large_field = 0xffffffffffffffff;\n let (lo, hi) = decompose(large_field);\n assert_eq(large_field, lo + TWO_POW_128 * hi);\n\n let large_value = large_field - TWO_POW_128;\n let (lo2, hi2) = decompose(large_value);\n assert_eq(large_value, lo2 + TWO_POW_128 * hi2);\n }\n\n #[test]\n fn check_lt_comprehensive() {\n assert(lt(0, 1));\n assert(!lt(1, 0));\n assert(!lt(0, 0));\n assert(!lt(42, 42));\n\n assert(lt(TWO_POW_128 - 1, TWO_POW_128));\n assert(!lt(TWO_POW_128, TWO_POW_128 - 1));\n }\n}\n"
|
|
3306
3302
|
},
|
|
3307
3303
|
"170": {
|
|
3304
|
+
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/call_private_function.nr",
|
|
3305
|
+
"source": "use dep::protocol_types::{\n abis::function_selector::FunctionSelector, address::AztecAddress, utils::reader::Reader,\n};\n\n#[oracle(privateCallPrivateFunction)]\nunconstrained fn call_private_function_oracle(\n _contract_address: AztecAddress,\n _function_selector: FunctionSelector,\n _args_hash: Field,\n _start_side_effect_counter: u32,\n _is_static_call: bool,\n) -> [Field; 2] {}\n\npub unconstrained fn call_private_function_internal(\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n start_side_effect_counter: u32,\n is_static_call: bool,\n) -> (u32, Field) {\n let fields = call_private_function_oracle(\n contract_address,\n function_selector,\n args_hash,\n start_side_effect_counter,\n is_static_call,\n );\n\n let mut reader = Reader::new(fields);\n let end_side_effect_counter = reader.read_u32();\n let returns_hash = reader.read();\n\n (end_side_effect_counter, returns_hash)\n}\n"
|
|
3306
|
+
},
|
|
3307
|
+
"171": {
|
|
3308
3308
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/capsules.nr",
|
|
3309
3309
|
"source": "use protocol_types::{address::AztecAddress, traits::{Deserialize, Serialize}};\n\n/// Stores arbitrary information in a per-contract non-volatile database, which can later be retrieved with `load`. If\n/// data was already stored at this slot, it is overwritten.\npub unconstrained fn store<T>(contract_address: AztecAddress, slot: Field, value: T)\nwhere\n T: Serialize,\n{\n let serialized = value.serialize();\n store_oracle(contract_address, slot, serialized);\n}\n\n/// Returns data previously stored via `storeCapsule` in the per-contract non-volatile database. Returns Option::none() if\n/// nothing was stored at the given slot.\npub unconstrained fn load<T>(contract_address: AztecAddress, slot: Field) -> Option<T>\nwhere\n T: Deserialize,\n{\n let serialized_option = load_oracle(contract_address, slot, <T as Deserialize>::N);\n serialized_option.map(|arr| Deserialize::deserialize(arr))\n}\n\n/// Deletes data in the per-contract non-volatile database. Does nothing if no data was present.\npub unconstrained fn delete(contract_address: AztecAddress, slot: Field) {\n delete_oracle(contract_address, slot);\n}\n\n/// Copies a number of contiguous entries in the per-contract non-volatile database. This allows for efficient data\n/// structures by avoiding repeated calls to `loadCapsule` and `storeCapsule`.\n/// Supports overlapping source and destination regions (which will result in the overlapped source values being\n/// overwritten). All copied slots must exist in the database (i.e. have been stored and not deleted)\npub unconstrained fn copy(\n contract_address: AztecAddress,\n src_slot: Field,\n dst_slot: Field,\n num_entries: u32,\n) {\n copy_oracle(contract_address, src_slot, dst_slot, num_entries);\n}\n\n#[oracle(utilityStoreCapsule)]\nunconstrained fn store_oracle<let N: u32>(\n contract_address: AztecAddress,\n slot: Field,\n values: [Field; N],\n) {}\n\n/// We need to pass in `array_len` (the value of N) as a parameter to tell the oracle how many fields the response must\n/// have.\n///\n/// Note that the oracle returns an Option<[Field; N]> because we cannot return an Option<T> directly. That would\n/// require for the oracle resolver to know the shape of T (e.g. if T were a struct of 3 u32 values then the expected\n/// response shape would be 3 single items, whereas it were a struct containing `u32, [Field;10], u32` then the expected\n/// shape would be single, array, single.). Instead, we return the serialization and deserialize in Noir.\n#[oracle(utilityLoadCapsule)]\nunconstrained fn load_oracle<let N: u32>(\n contract_address: AztecAddress,\n slot: Field,\n array_len: u32,\n) -> Option<[Field; N]> {}\n\n#[oracle(utilityDeleteCapsule)]\nunconstrained fn delete_oracle(contract_address: AztecAddress, slot: Field) {}\n\n#[oracle(utilityCopyCapsule)]\nunconstrained fn copy_oracle(\n contract_address: AztecAddress,\n src_slot: Field,\n dst_slot: Field,\n num_entries: u32,\n) {}\n\nmod test {\n // These tests are sort of redundant since we already test the oracle implementation directly in TypeScript, but\n // they are cheap regardless and help ensure both that the TXE implementation works accordingly and that the Noir\n // oracles are hooked up correctly.\n\n use crate::{\n oracle::capsules::{copy, delete, load, store},\n test::{helpers::test_environment::TestEnvironment, mocks::mock_struct::MockStruct},\n };\n use protocol_types::{address::AztecAddress, traits::{FromField, ToField}};\n\n global SLOT: Field = 1;\n\n #[test]\n unconstrained fn stores_and_loads() {\n let env = TestEnvironment::new();\n env.private_context(|context| {\n let contract_address = context.this_address();\n\n let value = MockStruct::new(5, 6);\n store(contract_address, SLOT, value);\n\n assert_eq(load(contract_address, SLOT).unwrap(), value);\n });\n }\n\n #[test]\n unconstrained fn store_overwrites() {\n let env = TestEnvironment::new();\n env.private_context(|context| {\n let contract_address = context.this_address();\n\n let value = MockStruct::new(5, 6);\n store(contract_address, SLOT, value);\n\n let new_value = MockStruct::new(7, 8);\n store(contract_address, SLOT, new_value);\n\n assert_eq(load(contract_address, SLOT).unwrap(), new_value);\n });\n }\n\n #[test]\n unconstrained fn loads_empty_slot() {\n let env = TestEnvironment::new();\n env.private_context(|context| {\n let contract_address = context.this_address();\n\n let loaded_value: Option<MockStruct> = load(contract_address, SLOT);\n assert_eq(loaded_value, Option::none());\n });\n }\n\n #[test]\n unconstrained fn deletes_stored_value() {\n let env = TestEnvironment::new();\n env.private_context(|context| {\n let contract_address = context.this_address();\n\n let value = MockStruct::new(5, 6);\n store(contract_address, SLOT, value);\n delete(contract_address, SLOT);\n\n let loaded_value: Option<MockStruct> = load(contract_address, SLOT);\n assert_eq(loaded_value, Option::none());\n });\n }\n\n #[test]\n unconstrained fn deletes_empty_slot() {\n let env = TestEnvironment::new();\n env.private_context(|context| {\n let contract_address = context.this_address();\n\n delete(contract_address, SLOT);\n let loaded_value: Option<MockStruct> = load(contract_address, SLOT);\n assert_eq(loaded_value, Option::none());\n });\n }\n\n #[test]\n unconstrained fn copies_non_overlapping_values() {\n let env = TestEnvironment::new();\n env.private_context(|context| {\n let contract_address = context.this_address();\n\n let src = 5;\n\n let values = [MockStruct::new(5, 6), MockStruct::new(7, 8), MockStruct::new(9, 10)];\n store(contract_address, src, values[0]);\n store(contract_address, src + 1, values[1]);\n store(contract_address, src + 2, values[2]);\n\n let dst = 10;\n copy(contract_address, src, dst, 3);\n\n assert_eq(load(contract_address, dst).unwrap(), values[0]);\n assert_eq(load(contract_address, dst + 1).unwrap(), values[1]);\n assert_eq(load(contract_address, dst + 2).unwrap(), values[2]);\n });\n }\n\n #[test]\n unconstrained fn copies_overlapping_values_with_src_ahead() {\n let env = TestEnvironment::new();\n env.private_context(|context| {\n let contract_address = context.this_address();\n\n let src = 1;\n\n let values = [MockStruct::new(5, 6), MockStruct::new(7, 8), MockStruct::new(9, 10)];\n store(contract_address, src, values[0]);\n store(contract_address, src + 1, values[1]);\n store(contract_address, src + 2, values[2]);\n\n let dst = 2;\n copy(contract_address, src, dst, 3);\n\n assert_eq(load(contract_address, dst).unwrap(), values[0]);\n assert_eq(load(contract_address, dst + 1).unwrap(), values[1]);\n assert_eq(load(contract_address, dst + 2).unwrap(), values[2]);\n\n // src[1] and src[2] should have been overwritten since they are also dst[0] and dst[1]\n assert_eq(load(contract_address, src).unwrap(), values[0]); // src[0] (unchanged)\n assert_eq(load(contract_address, src + 1).unwrap(), values[0]); // dst[0]\n assert_eq(load(contract_address, src + 2).unwrap(), values[1]); // dst[1]\n });\n }\n\n #[test]\n unconstrained fn copies_overlapping_values_with_dst_ahead() {\n let env = TestEnvironment::new();\n env.private_context(|context| {\n let contract_address = context.this_address();\n\n let src = 2;\n\n let values = [MockStruct::new(5, 6), MockStruct::new(7, 8), MockStruct::new(9, 10)];\n store(contract_address, src, values[0]);\n store(contract_address, src + 1, values[1]);\n store(contract_address, src + 2, values[2]);\n\n let dst = 1;\n copy(contract_address, src, dst, 3);\n\n assert_eq(load(contract_address, dst).unwrap(), values[0]);\n assert_eq(load(contract_address, dst + 1).unwrap(), values[1]);\n assert_eq(load(contract_address, dst + 2).unwrap(), values[2]);\n\n // src[0] and src[1] should have been overwritten since they are also dst[1] and dst[2]\n assert_eq(load(contract_address, src).unwrap(), values[1]); // dst[1]\n assert_eq(load(contract_address, src + 1).unwrap(), values[2]); // dst[2]\n assert_eq(load(contract_address, src + 2).unwrap(), values[2]); // src[2] (unchanged)\n });\n }\n\n #[test(should_fail_with = \"copy empty slot\")]\n unconstrained fn cannot_copy_empty_values() {\n let env = TestEnvironment::new();\n env.private_context(|context| {\n let contract_address = context.this_address();\n\n copy(contract_address, SLOT, SLOT, 1);\n });\n }\n\n #[test(should_fail_with = \"not allowed to access\")]\n unconstrained fn cannot_store_other_contract() {\n let env = TestEnvironment::new();\n env.private_context(|context| {\n let contract_address = context.this_address();\n let other_contract_address = AztecAddress::from_field(contract_address.to_field() + 1);\n\n let value = MockStruct::new(5, 6);\n store(other_contract_address, SLOT, value);\n });\n }\n\n #[test(should_fail_with = \"not allowed to access\")]\n unconstrained fn cannot_load_other_contract() {\n let env = TestEnvironment::new();\n env.private_context(|context| {\n let contract_address = context.this_address();\n let other_contract_address = AztecAddress::from_field(contract_address.to_field() + 1);\n\n let _: Option<MockStruct> = load(other_contract_address, SLOT);\n });\n }\n\n #[test(should_fail_with = \"not allowed to access\")]\n unconstrained fn cannot_delete_other_contract() {\n let env = TestEnvironment::new();\n env.private_context(|context| {\n let contract_address = context.this_address();\n let other_contract_address = AztecAddress::from_field(contract_address.to_field() + 1);\n\n delete(other_contract_address, SLOT);\n });\n }\n\n #[test(should_fail_with = \"not allowed to access\")]\n unconstrained fn cannot_copy_other_contract() {\n let env = TestEnvironment::new();\n env.private_context(|context| {\n let contract_address = context.this_address();\n let other_contract_address = AztecAddress::from_field(contract_address.to_field() + 1);\n\n copy(other_contract_address, SLOT, SLOT, 0);\n });\n }\n}\n"
|
|
3310
3310
|
},
|
|
3311
|
-
"
|
|
3311
|
+
"172": {
|
|
3312
3312
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/enqueue_public_function_call.nr",
|
|
3313
3313
|
"source": "use dep::protocol_types::address::AztecAddress;\n\n#[oracle(privateNotifyEnqueuedPublicFunctionCall)]\nunconstrained fn notify_enqueued_public_function_call_oracle(\n _contract_address: AztecAddress,\n _calldata_hash: Field,\n _side_effect_counter: u32,\n _is_static_call: bool,\n) {}\n\nunconstrained fn notify_enqueued_public_function_call_wrapper(\n contract_address: AztecAddress,\n calldata_hash: Field,\n side_effect_counter: u32,\n is_static_call: bool,\n) {\n notify_enqueued_public_function_call_oracle(\n contract_address,\n calldata_hash,\n side_effect_counter,\n is_static_call,\n )\n}\n\npub fn notify_enqueued_public_function_call(\n contract_address: AztecAddress,\n calldata_hash: Field,\n side_effect_counter: u32,\n is_static_call: bool,\n) {\n // Safety: Notifies the simulator that a public call has been enqueued, allowing it to prepare hints for the AVM to process this call.\n unsafe {\n notify_enqueued_public_function_call_wrapper(\n contract_address,\n calldata_hash,\n side_effect_counter,\n is_static_call,\n )\n }\n}\n\n#[oracle(privateNotifySetPublicTeardownFunctionCall)]\nunconstrained fn notify_set_public_teardown_function_call_oracle(\n _contract_address: AztecAddress,\n _calldata_hash: Field,\n _side_effect_counter: u32,\n _is_static_call: bool,\n) {}\n\nunconstrained fn notify_set_public_teardown_function_call_wrapper(\n contract_address: AztecAddress,\n calldata_hash: Field,\n side_effect_counter: u32,\n is_static_call: bool,\n) {\n notify_set_public_teardown_function_call_oracle(\n contract_address,\n calldata_hash,\n side_effect_counter,\n is_static_call,\n )\n}\n\npub fn notify_set_public_teardown_function_call(\n contract_address: AztecAddress,\n calldata_hash: Field,\n side_effect_counter: u32,\n is_static_call: bool,\n) {\n // Safety: Notifies the simulator that a teardown call has been set, allowing it to prepare hints for the AVM to process this call.\n unsafe {\n notify_set_public_teardown_function_call_wrapper(\n contract_address,\n calldata_hash,\n side_effect_counter,\n is_static_call,\n )\n }\n}\n\npub fn notify_set_min_revertible_side_effect_counter(counter: u32) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe\n // to call.\n unsafe { notify_set_min_revertible_side_effect_counter_oracle_wrapper(counter) };\n}\n\npub unconstrained fn notify_set_min_revertible_side_effect_counter_oracle_wrapper(counter: u32) {\n notify_set_min_revertible_side_effect_counter_oracle(counter);\n}\n\n#[oracle(privateNotifySetMinRevertibleSideEffectCounter)]\nunconstrained fn notify_set_min_revertible_side_effect_counter_oracle(_counter: u32) {}\n\npub unconstrained fn is_side_effect_counter_revertible_oracle_wrapper(counter: u32) -> bool {\n is_side_effect_counter_revertible_oracle(counter)\n}\n\n#[oracle(privateIsSideEffectCounterRevertible)]\nunconstrained fn is_side_effect_counter_revertible_oracle(counter: u32) -> bool {}\n"
|
|
3314
3314
|
},
|
|
3315
|
-
"
|
|
3315
|
+
"173": {
|
|
3316
3316
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/execution.nr",
|
|
3317
3317
|
"source": "use crate::context::utility_context::UtilityContext;\n\n#[oracle(utilityGetUtilityContext)]\nunconstrained fn get_utility_context_oracle() -> UtilityContext {}\n\n/// Returns a utility context built from the global variables of anchor block and the contract address of the function\n/// being executed.\npub unconstrained fn get_utility_context() -> UtilityContext {\n get_utility_context_oracle()\n}\n"
|
|
3318
3318
|
},
|
|
3319
|
-
"
|
|
3319
|
+
"174": {
|
|
3320
3320
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/execution_cache.nr",
|
|
3321
3321
|
"source": "/// Stores values represented as slice in execution cache to be later obtained by its hash.\npub fn store<let N: u32>(values: [Field; N], hash: Field) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe\n // to call. When loading the values, however, the caller must check that the values are indeed the preimage.\n unsafe { store_in_execution_cache_oracle_wrapper(values, hash) };\n}\n\nunconstrained fn store_in_execution_cache_oracle_wrapper<let N: u32>(\n values: [Field; N],\n hash: Field,\n) {\n store_in_execution_cache_oracle(values, hash);\n}\n\npub unconstrained fn load<let N: u32>(hash: Field) -> [Field; N] {\n load_from_execution_cache_oracle(hash)\n}\n\n#[oracle(privateStoreInExecutionCache)]\nunconstrained fn store_in_execution_cache_oracle<let N: u32>(_values: [Field; N], _hash: Field) {}\n\n#[oracle(privateLoadFromExecutionCache)]\nunconstrained fn load_from_execution_cache_oracle<let N: u32>(_hash: Field) -> [Field; N] {}\n"
|
|
3322
3322
|
},
|
|
@@ -3324,71 +3324,71 @@
|
|
|
3324
3324
|
"path": "std/field/mod.nr",
|
|
3325
3325
|
"source": "pub mod bn254;\nuse crate::{runtime::is_unconstrained, static_assert};\nuse bn254::lt as bn254_lt;\n\nimpl Field {\n /// Asserts that `self` can be represented in `bit_size` bits.\n ///\n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^{bit_size}`.\n // docs:start:assert_max_bit_size\n pub fn assert_max_bit_size<let BIT_SIZE: u32>(self) {\n // docs:end:assert_max_bit_size\n static_assert(\n BIT_SIZE < modulus_num_bits() as u32,\n \"BIT_SIZE must be less than modulus_num_bits\",\n );\n __assert_max_bit_size(self, BIT_SIZE);\n }\n\n /// Decomposes `self` into its little endian bit decomposition as a `[u1; N]` array.\n /// This array will be zero padded should not all bits be necessary to represent `self`.\n ///\n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^N` as the resulting array will not\n /// be able to represent the original `Field`.\n ///\n /// # Safety\n /// The bit decomposition returned is canonical and is guaranteed to not overflow the modulus.\n // docs:start:to_le_bits\n pub fn to_le_bits<let N: u32>(self: Self) -> [u1; N] {\n // docs:end:to_le_bits\n let bits = __to_le_bits(self);\n\n if !is_unconstrained() {\n // Ensure that the byte decomposition does not overflow the modulus\n let p = modulus_le_bits();\n assert(bits.len() <= p.len());\n let mut ok = bits.len() != p.len();\n for i in 0..N {\n if !ok {\n if (bits[N - 1 - i] != p[N - 1 - i]) {\n assert(p[N - 1 - i] == 1);\n ok = true;\n }\n }\n }\n assert(ok);\n }\n bits\n }\n\n /// Decomposes `self` into its big endian bit decomposition as a `[u1; N]` array.\n /// This array will be zero padded should not all bits be necessary to represent `self`.\n ///\n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^N` as the resulting array will not\n /// be able to represent the original `Field`.\n ///\n /// # Safety\n /// The bit decomposition returned is canonical and is guaranteed to not overflow the modulus.\n // docs:start:to_be_bits\n pub fn to_be_bits<let N: u32>(self: Self) -> [u1; N] {\n // docs:end:to_be_bits\n let bits = __to_be_bits(self);\n\n if !is_unconstrained() {\n // Ensure that the decomposition does not overflow the modulus\n let p = modulus_be_bits();\n assert(bits.len() <= p.len());\n let mut ok = bits.len() != p.len();\n for i in 0..N {\n if !ok {\n if (bits[i] != p[i]) {\n assert(p[i] == 1);\n ok = true;\n }\n }\n }\n assert(ok);\n }\n bits\n }\n\n /// Decomposes `self` into its little endian byte decomposition as a `[u8;N]` array\n /// This array will be zero padded should not all bytes be necessary to represent `self`.\n ///\n /// # Failures\n /// The length N of the array must be big enough to contain all the bytes of the 'self',\n /// and no more than the number of bytes required to represent the field modulus\n ///\n /// # Safety\n /// The result is ensured to be the canonical decomposition of the field element\n // docs:start:to_le_bytes\n pub fn to_le_bytes<let N: u32>(self: Self) -> [u8; N] {\n // docs:end:to_le_bytes\n static_assert(\n N <= modulus_le_bytes().len(),\n \"N must be less than or equal to modulus_le_bytes().len()\",\n );\n // Compute the byte decomposition\n let bytes = self.to_le_radix(256);\n\n if !is_unconstrained() {\n // Ensure that the byte decomposition does not overflow the modulus\n let p = modulus_le_bytes();\n assert(bytes.len() <= p.len());\n let mut ok = bytes.len() != p.len();\n for i in 0..N {\n if !ok {\n if (bytes[N - 1 - i] != p[N - 1 - i]) {\n assert(bytes[N - 1 - i] < p[N - 1 - i]);\n ok = true;\n }\n }\n }\n assert(ok);\n }\n bytes\n }\n\n /// Decomposes `self` into its big endian byte decomposition as a `[u8;N]` array of length required to represent the field modulus\n /// This array will be zero padded should not all bytes be necessary to represent `self`.\n ///\n /// # Failures\n /// The length N of the array must be big enough to contain all the bytes of the 'self',\n /// and no more than the number of bytes required to represent the field modulus\n ///\n /// # Safety\n /// The result is ensured to be the canonical decomposition of the field element\n // docs:start:to_be_bytes\n pub fn to_be_bytes<let N: u32>(self: Self) -> [u8; N] {\n // docs:end:to_be_bytes\n static_assert(\n N <= modulus_le_bytes().len(),\n \"N must be less than or equal to modulus_le_bytes().len()\",\n );\n // Compute the byte decomposition\n let bytes = self.to_be_radix(256);\n\n if !is_unconstrained() {\n // Ensure that the byte decomposition does not overflow the modulus\n let p = modulus_be_bytes();\n assert(bytes.len() <= p.len());\n let mut ok = bytes.len() != p.len();\n for i in 0..N {\n if !ok {\n if (bytes[i] != p[i]) {\n assert(bytes[i] < p[i]);\n ok = true;\n }\n }\n }\n assert(ok);\n }\n bytes\n }\n\n fn to_le_radix<let N: u32>(self: Self, radix: u32) -> [u8; N] {\n // Brillig does not need an immediate radix\n if !crate::runtime::is_unconstrained() {\n static_assert(1 < radix, \"radix must be greater than 1\");\n static_assert(radix <= 256, \"radix must be less than or equal to 256\");\n static_assert(radix & (radix - 1) == 0, \"radix must be a power of 2\");\n }\n __to_le_radix(self, radix)\n }\n\n fn to_be_radix<let N: u32>(self: Self, radix: u32) -> [u8; N] {\n // Brillig does not need an immediate radix\n if !crate::runtime::is_unconstrained() {\n static_assert(1 < radix, \"radix must be greater than 1\");\n static_assert(radix <= 256, \"radix must be less than or equal to 256\");\n static_assert(radix & (radix - 1) == 0, \"radix must be a power of 2\");\n }\n __to_be_radix(self, radix)\n }\n\n // Returns self to the power of the given exponent value.\n // Caution: we assume the exponent fits into 32 bits\n // using a bigger bit size impacts negatively the performance and should be done only if the exponent does not fit in 32 bits\n pub fn pow_32(self, exponent: Field) -> Field {\n let mut r: Field = 1;\n let b: [u1; 32] = exponent.to_le_bits();\n\n for i in 1..33 {\n r *= r;\n r = (b[32 - i] as Field) * (r * self) + (1 - b[32 - i] as Field) * r;\n }\n r\n }\n\n // Parity of (prime) Field element, i.e. sgn0(x mod p) = 0 if x `elem` {0, ..., p-1} is even, otherwise sgn0(x mod p) = 1.\n pub fn sgn0(self) -> u1 {\n self as u1\n }\n\n pub fn lt(self, another: Field) -> bool {\n if crate::compat::is_bn254() {\n bn254_lt(self, another)\n } else {\n lt_fallback(self, another)\n }\n }\n\n /// Convert a little endian byte array to a field element.\n /// If the provided byte array overflows the field modulus then the Field will silently wrap around.\n pub fn from_le_bytes<let N: u32>(bytes: [u8; N]) -> Field {\n static_assert(\n N <= modulus_le_bytes().len(),\n \"N must be less than or equal to modulus_le_bytes().len()\",\n );\n let mut v = 1;\n let mut result = 0;\n\n for i in 0..N {\n result += (bytes[i] as Field) * v;\n v = v * 256;\n }\n result\n }\n\n /// Convert a big endian byte array to a field element.\n /// If the provided byte array overflows the field modulus then the Field will silently wrap around.\n pub fn from_be_bytes<let N: u32>(bytes: [u8; N]) -> Field {\n let mut v = 1;\n let mut result = 0;\n\n for i in 0..N {\n result += (bytes[N - 1 - i] as Field) * v;\n v = v * 256;\n }\n result\n }\n}\n\n#[builtin(apply_range_constraint)]\nfn __assert_max_bit_size(value: Field, bit_size: u32) {}\n\n// `_radix` must be less than 256\n#[builtin(to_le_radix)]\nfn __to_le_radix<let N: u32>(value: Field, radix: u32) -> [u8; N] {}\n\n// `_radix` must be less than 256\n#[builtin(to_be_radix)]\nfn __to_be_radix<let N: u32>(value: Field, radix: u32) -> [u8; N] {}\n\n/// Decomposes `self` into its little endian bit decomposition as a `[u1; N]` array.\n/// This array will be zero padded should not all bits be necessary to represent `self`.\n///\n/// # Failures\n/// Causes a constraint failure for `Field` values exceeding `2^N` as the resulting array will not\n/// be able to represent the original `Field`.\n///\n/// # Safety\n/// Values of `N` equal to or greater than the number of bits necessary to represent the `Field` modulus\n/// (e.g. 254 for the BN254 field) allow for multiple bit decompositions. This is due to how the `Field` will\n/// wrap around due to overflow when verifying the decomposition.\n#[builtin(to_le_bits)]\nfn __to_le_bits<let N: u32>(value: Field) -> [u1; N] {}\n\n/// Decomposes `self` into its big endian bit decomposition as a `[u1; N]` array.\n/// This array will be zero padded should not all bits be necessary to represent `self`.\n///\n/// # Failures\n/// Causes a constraint failure for `Field` values exceeding `2^N` as the resulting array will not\n/// be able to represent the original `Field`.\n///\n/// # Safety\n/// Values of `N` equal to or greater than the number of bits necessary to represent the `Field` modulus\n/// (e.g. 254 for the BN254 field) allow for multiple bit decompositions. This is due to how the `Field` will\n/// wrap around due to overflow when verifying the decomposition.\n#[builtin(to_be_bits)]\nfn __to_be_bits<let N: u32>(value: Field) -> [u1; N] {}\n\n#[builtin(modulus_num_bits)]\npub comptime fn modulus_num_bits() -> u64 {}\n\n#[builtin(modulus_be_bits)]\npub comptime fn modulus_be_bits() -> [u1] {}\n\n#[builtin(modulus_le_bits)]\npub comptime fn modulus_le_bits() -> [u1] {}\n\n#[builtin(modulus_be_bytes)]\npub comptime fn modulus_be_bytes() -> [u8] {}\n\n#[builtin(modulus_le_bytes)]\npub comptime fn modulus_le_bytes() -> [u8] {}\n\n/// An unconstrained only built in to efficiently compare fields.\n#[builtin(field_less_than)]\nunconstrained fn __field_less_than(x: Field, y: Field) -> bool {}\n\npub(crate) unconstrained fn field_less_than(x: Field, y: Field) -> bool {\n __field_less_than(x, y)\n}\n\n// Convert a 32 byte array to a field element by modding\npub fn bytes32_to_field(bytes32: [u8; 32]) -> Field {\n // Convert it to a field element\n let mut v = 1;\n let mut high = 0 as Field;\n let mut low = 0 as Field;\n\n for i in 0..16 {\n high = high + (bytes32[15 - i] as Field) * v;\n low = low + (bytes32[16 + 15 - i] as Field) * v;\n v = v * 256;\n }\n // Abuse that a % p + b % p = (a + b) % p and that low < p\n low + high * v\n}\n\nfn lt_fallback(x: Field, y: Field) -> bool {\n if is_unconstrained() {\n // Safety: unconstrained context\n unsafe {\n field_less_than(x, y)\n }\n } else {\n let x_bytes: [u8; 32] = x.to_le_bytes();\n let y_bytes: [u8; 32] = y.to_le_bytes();\n let mut x_is_lt = false;\n let mut done = false;\n for i in 0..32 {\n if (!done) {\n let x_byte = x_bytes[32 - 1 - i] as u8;\n let y_byte = y_bytes[32 - 1 - i] as u8;\n let bytes_match = x_byte == y_byte;\n if !bytes_match {\n x_is_lt = x_byte < y_byte;\n done = true;\n }\n }\n }\n x_is_lt\n }\n}\n\nmod tests {\n use crate::{panic::panic, runtime, static_assert};\n use super::{\n field_less_than, modulus_be_bits, modulus_be_bytes, modulus_le_bits, modulus_le_bytes,\n };\n\n #[test]\n // docs:start:to_be_bits_example\n fn test_to_be_bits() {\n let field = 2;\n let bits: [u1; 8] = field.to_be_bits();\n assert_eq(bits, [0, 0, 0, 0, 0, 0, 1, 0]);\n }\n // docs:end:to_be_bits_example\n\n #[test]\n // docs:start:to_le_bits_example\n fn test_to_le_bits() {\n let field = 2;\n let bits: [u1; 8] = field.to_le_bits();\n assert_eq(bits, [0, 1, 0, 0, 0, 0, 0, 0]);\n }\n // docs:end:to_le_bits_example\n\n #[test]\n // docs:start:to_be_bytes_example\n fn test_to_be_bytes() {\n let field = 2;\n let bytes: [u8; 8] = field.to_be_bytes();\n assert_eq(bytes, [0, 0, 0, 0, 0, 0, 0, 2]);\n assert_eq(Field::from_be_bytes::<8>(bytes), field);\n }\n // docs:end:to_be_bytes_example\n\n #[test]\n // docs:start:to_le_bytes_example\n fn test_to_le_bytes() {\n let field = 2;\n let bytes: [u8; 8] = field.to_le_bytes();\n assert_eq(bytes, [2, 0, 0, 0, 0, 0, 0, 0]);\n assert_eq(Field::from_le_bytes::<8>(bytes), field);\n }\n // docs:end:to_le_bytes_example\n\n #[test]\n // docs:start:to_be_radix_example\n fn test_to_be_radix() {\n // 259, in base 256, big endian, is [1, 3].\n // i.e. 3 * 256^0 + 1 * 256^1\n let field = 259;\n\n // The radix (in this example, 256) must be a power of 2.\n // The length of the returned byte array can be specified to be\n // >= the amount of space needed.\n let bytes: [u8; 8] = field.to_be_radix(256);\n assert_eq(bytes, [0, 0, 0, 0, 0, 0, 1, 3]);\n assert_eq(Field::from_be_bytes::<8>(bytes), field);\n }\n // docs:end:to_be_radix_example\n\n #[test]\n // docs:start:to_le_radix_example\n fn test_to_le_radix() {\n // 259, in base 256, little endian, is [3, 1].\n // i.e. 3 * 256^0 + 1 * 256^1\n let field = 259;\n\n // The radix (in this example, 256) must be a power of 2.\n // The length of the returned byte array can be specified to be\n // >= the amount of space needed.\n let bytes: [u8; 8] = field.to_le_radix(256);\n assert_eq(bytes, [3, 1, 0, 0, 0, 0, 0, 0]);\n assert_eq(Field::from_le_bytes::<8>(bytes), field);\n }\n // docs:end:to_le_radix_example\n\n #[test(should_fail_with = \"radix must be greater than 1\")]\n fn test_to_le_radix_1() {\n // this test should only fail in constrained mode\n if !runtime::is_unconstrained() {\n let field = 2;\n let _: [u8; 8] = field.to_le_radix(1);\n } else {\n panic(\"radix must be greater than 1\");\n }\n }\n\n // Updated test to account for Brillig restriction that radix must be greater than 2\n #[test(should_fail_with = \"radix must be greater than 1\")]\n fn test_to_le_radix_brillig_1() {\n // this test should only fail in constrained mode\n if !runtime::is_unconstrained() {\n let field = 1;\n let _: [u8; 8] = field.to_le_radix(1);\n } else {\n panic(\"radix must be greater than 1\");\n }\n }\n\n #[test(should_fail_with = \"radix must be a power of 2\")]\n fn test_to_le_radix_3() {\n // this test should only fail in constrained mode\n if !runtime::is_unconstrained() {\n let field = 2;\n let _: [u8; 8] = field.to_le_radix(3);\n } else {\n panic(\"radix must be a power of 2\");\n }\n }\n\n #[test]\n fn test_to_le_radix_brillig_3() {\n // this test should only fail in constrained mode\n if runtime::is_unconstrained() {\n let field = 1;\n let out: [u8; 8] = field.to_le_radix(3);\n let mut expected = [0; 8];\n expected[0] = 1;\n assert(out == expected, \"unexpected result\");\n }\n }\n\n #[test(should_fail_with = \"radix must be less than or equal to 256\")]\n fn test_to_le_radix_512() {\n // this test should only fail in constrained mode\n if !runtime::is_unconstrained() {\n let field = 2;\n let _: [u8; 8] = field.to_le_radix(512);\n } else {\n panic(\"radix must be less than or equal to 256\")\n }\n }\n\n #[test(should_fail_with = \"Field failed to decompose into specified 16 limbs\")]\n unconstrained fn not_enough_limbs_brillig() {\n let _: [u8; 16] = 0x100000000000000000000000000000000.to_le_bytes();\n }\n\n #[test(should_fail_with = \"Field failed to decompose into specified 16 limbs\")]\n fn not_enough_limbs() {\n let _: [u8; 16] = 0x100000000000000000000000000000000.to_le_bytes();\n }\n\n #[test]\n unconstrained fn test_field_less_than() {\n assert(field_less_than(0, 1));\n assert(field_less_than(0, 0x100));\n assert(field_less_than(0x100, 0 - 1));\n assert(!field_less_than(0 - 1, 0));\n }\n\n #[test]\n unconstrained fn test_large_field_values_unconstrained() {\n let large_field = 0xffffffffffffffff;\n\n let bits: [u1; 64] = large_field.to_le_bits();\n assert_eq(bits[0], 1);\n\n let bytes: [u8; 8] = large_field.to_le_bytes();\n assert_eq(Field::from_le_bytes::<8>(bytes), large_field);\n\n let radix_bytes: [u8; 8] = large_field.to_le_radix(256);\n assert_eq(Field::from_le_bytes::<8>(radix_bytes), large_field);\n }\n\n #[test]\n fn test_large_field_values() {\n let large_val = 0xffffffffffffffff;\n\n let bits: [u1; 64] = large_val.to_le_bits();\n assert_eq(bits[0], 1);\n\n let bytes: [u8; 8] = large_val.to_le_bytes();\n assert_eq(Field::from_le_bytes::<8>(bytes), large_val);\n\n let radix_bytes: [u8; 8] = large_val.to_le_radix(256);\n assert_eq(Field::from_le_bytes::<8>(radix_bytes), large_val);\n }\n\n #[test]\n fn test_decomposition_edge_cases() {\n let zero_bits: [u1; 8] = 0.to_le_bits();\n assert_eq(zero_bits, [0; 8]);\n\n let zero_bytes: [u8; 8] = 0.to_le_bytes();\n assert_eq(zero_bytes, [0; 8]);\n\n let one_bits: [u1; 8] = 1.to_le_bits();\n let expected: [u1; 8] = [1, 0, 0, 0, 0, 0, 0, 0];\n assert_eq(one_bits, expected);\n\n let pow2_bits: [u1; 8] = 4.to_le_bits();\n let expected: [u1; 8] = [0, 0, 1, 0, 0, 0, 0, 0];\n assert_eq(pow2_bits, expected);\n }\n\n #[test]\n fn test_pow_32() {\n assert_eq(2.pow_32(3), 8);\n assert_eq(3.pow_32(2), 9);\n assert_eq(5.pow_32(0), 1);\n assert_eq(7.pow_32(1), 7);\n\n assert_eq(2.pow_32(10), 1024);\n\n assert_eq(0.pow_32(5), 0);\n assert_eq(0.pow_32(0), 1);\n\n assert_eq(1.pow_32(100), 1);\n }\n\n #[test]\n fn test_sgn0() {\n assert_eq(0.sgn0(), 0);\n assert_eq(2.sgn0(), 0);\n assert_eq(4.sgn0(), 0);\n assert_eq(100.sgn0(), 0);\n\n assert_eq(1.sgn0(), 1);\n assert_eq(3.sgn0(), 1);\n assert_eq(5.sgn0(), 1);\n assert_eq(101.sgn0(), 1);\n }\n\n #[test(should_fail_with = \"Field failed to decompose into specified 8 limbs\")]\n fn test_bit_decomposition_overflow() {\n // 8 bits can't represent large field values\n let large_val = 0x1000000000000000;\n let _: [u1; 8] = large_val.to_le_bits();\n }\n\n #[test(should_fail_with = \"Field failed to decompose into specified 4 limbs\")]\n fn test_byte_decomposition_overflow() {\n // 4 bytes can't represent large field values\n let large_val = 0x1000000000000000;\n let _: [u8; 4] = large_val.to_le_bytes();\n }\n\n #[test]\n fn test_to_from_be_bytes_bn254_edge_cases() {\n if crate::compat::is_bn254() {\n // checking that decrementing this byte produces the expected 32 BE bytes for (modulus - 1)\n let mut p_minus_1_bytes: [u8; 32] = modulus_be_bytes().as_array();\n assert(p_minus_1_bytes[32 - 1] > 0);\n p_minus_1_bytes[32 - 1] -= 1;\n\n let p_minus_1 = Field::from_be_bytes::<32>(p_minus_1_bytes);\n assert_eq(p_minus_1 + 1, 0);\n\n // checking that converting (modulus - 1) from and then to 32 BE bytes produces the same bytes\n let p_minus_1_converted_bytes: [u8; 32] = p_minus_1.to_be_bytes();\n assert_eq(p_minus_1_converted_bytes, p_minus_1_bytes);\n\n // checking that incrementing this byte produces 32 BE bytes for (modulus + 1)\n let mut p_plus_1_bytes: [u8; 32] = modulus_be_bytes().as_array();\n assert(p_plus_1_bytes[32 - 1] < 255);\n p_plus_1_bytes[32 - 1] += 1;\n\n let p_plus_1 = Field::from_be_bytes::<32>(p_plus_1_bytes);\n assert_eq(p_plus_1, 1);\n\n // checking that converting p_plus_1 to 32 BE bytes produces the same\n // byte set to 1 as p_plus_1_bytes and otherwise zeroes\n let mut p_plus_1_converted_bytes: [u8; 32] = p_plus_1.to_be_bytes();\n assert_eq(p_plus_1_converted_bytes[32 - 1], 1);\n p_plus_1_converted_bytes[32 - 1] = 0;\n assert_eq(p_plus_1_converted_bytes, [0; 32]);\n\n // checking that Field::from_be_bytes::<32> on the Field modulus produces 0\n assert_eq(modulus_be_bytes().len(), 32);\n let p = Field::from_be_bytes::<32>(modulus_be_bytes().as_array());\n assert_eq(p, 0);\n\n // checking that converting 0 to 32 BE bytes produces 32 zeroes\n let p_bytes: [u8; 32] = 0.to_be_bytes();\n assert_eq(p_bytes, [0; 32]);\n }\n }\n\n #[test]\n fn test_to_from_le_bytes_bn254_edge_cases() {\n if crate::compat::is_bn254() {\n // checking that decrementing this byte produces the expected 32 LE bytes for (modulus - 1)\n let mut p_minus_1_bytes: [u8; 32] = modulus_le_bytes().as_array();\n assert(p_minus_1_bytes[0] > 0);\n p_minus_1_bytes[0] -= 1;\n\n let p_minus_1 = Field::from_le_bytes::<32>(p_minus_1_bytes);\n assert_eq(p_minus_1 + 1, 0);\n\n // checking that converting (modulus - 1) from and then to 32 BE bytes produces the same bytes\n let p_minus_1_converted_bytes: [u8; 32] = p_minus_1.to_le_bytes();\n assert_eq(p_minus_1_converted_bytes, p_minus_1_bytes);\n\n // checking that incrementing this byte produces 32 LE bytes for (modulus + 1)\n let mut p_plus_1_bytes: [u8; 32] = modulus_le_bytes().as_array();\n assert(p_plus_1_bytes[0] < 255);\n p_plus_1_bytes[0] += 1;\n\n let p_plus_1 = Field::from_le_bytes::<32>(p_plus_1_bytes);\n assert_eq(p_plus_1, 1);\n\n // checking that converting p_plus_1 to 32 LE bytes produces the same\n // byte set to 1 as p_plus_1_bytes and otherwise zeroes\n let mut p_plus_1_converted_bytes: [u8; 32] = p_plus_1.to_le_bytes();\n assert_eq(p_plus_1_converted_bytes[0], 1);\n p_plus_1_converted_bytes[0] = 0;\n assert_eq(p_plus_1_converted_bytes, [0; 32]);\n\n // checking that Field::from_le_bytes::<32> on the Field modulus produces 0\n assert_eq(modulus_le_bytes().len(), 32);\n let p = Field::from_le_bytes::<32>(modulus_le_bytes().as_array());\n assert_eq(p, 0);\n\n // checking that converting 0 to 32 LE bytes produces 32 zeroes\n let p_bytes: [u8; 32] = 0.to_le_bytes();\n assert_eq(p_bytes, [0; 32]);\n }\n }\n\n /// Convert a little endian bit array to a field element.\n /// If the provided bit array overflows the field modulus then the Field will silently wrap around.\n fn from_le_bits<let N: u32>(bits: [u1; N]) -> Field {\n static_assert(\n N <= modulus_le_bits().len(),\n \"N must be less than or equal to modulus_le_bits().len()\",\n );\n let mut v = 1;\n let mut result = 0;\n\n for i in 0..N {\n result += (bits[i] as Field) * v;\n v = v * 2;\n }\n result\n }\n\n /// Convert a big endian bit array to a field element.\n /// If the provided bit array overflows the field modulus then the Field will silently wrap around.\n fn from_be_bits<let N: u32>(bits: [u1; N]) -> Field {\n let mut v = 1;\n let mut result = 0;\n\n for i in 0..N {\n result += (bits[N - 1 - i] as Field) * v;\n v = v * 2;\n }\n result\n }\n\n #[test]\n fn test_to_from_be_bits_bn254_edge_cases() {\n if crate::compat::is_bn254() {\n // checking that decrementing this bit produces the expected 254 BE bits for (modulus - 1)\n let mut p_minus_1_bits: [u1; 254] = modulus_be_bits().as_array();\n assert(p_minus_1_bits[254 - 1] > 0);\n p_minus_1_bits[254 - 1] -= 1;\n\n let p_minus_1 = from_be_bits::<254>(p_minus_1_bits);\n assert_eq(p_minus_1 + 1, 0);\n\n // checking that converting (modulus - 1) from and then to 254 BE bits produces the same bits\n let p_minus_1_converted_bits: [u1; 254] = p_minus_1.to_be_bits();\n assert_eq(p_minus_1_converted_bits, p_minus_1_bits);\n\n // checking that incrementing this bit produces 254 BE bits for (modulus + 4)\n let mut p_plus_4_bits: [u1; 254] = modulus_be_bits().as_array();\n assert(p_plus_4_bits[254 - 3] < 1);\n p_plus_4_bits[254 - 3] += 1;\n\n let p_plus_4 = from_be_bits::<254>(p_plus_4_bits);\n assert_eq(p_plus_4, 4);\n\n // checking that converting p_plus_4 to 254 BE bits produces the same\n // bit set to 1 as p_plus_4_bits and otherwise zeroes\n let mut p_plus_4_converted_bits: [u1; 254] = p_plus_4.to_be_bits();\n assert_eq(p_plus_4_converted_bits[254 - 3], 1);\n p_plus_4_converted_bits[254 - 3] = 0;\n assert_eq(p_plus_4_converted_bits, [0; 254]);\n\n // checking that Field::from_be_bits::<254> on the Field modulus produces 0\n assert_eq(modulus_be_bits().len(), 254);\n let p = from_be_bits::<254>(modulus_be_bits().as_array());\n assert_eq(p, 0);\n\n // checking that converting 0 to 254 BE bytes produces 254 zeroes\n let p_bits: [u1; 254] = 0.to_be_bits();\n assert_eq(p_bits, [0; 254]);\n }\n }\n\n #[test]\n fn test_to_from_le_bits_bn254_edge_cases() {\n if crate::compat::is_bn254() {\n // checking that decrementing this bit produces the expected 254 LE bits for (modulus - 1)\n let mut p_minus_1_bits: [u1; 254] = modulus_le_bits().as_array();\n assert(p_minus_1_bits[0] > 0);\n p_minus_1_bits[0] -= 1;\n\n let p_minus_1 = from_le_bits::<254>(p_minus_1_bits);\n assert_eq(p_minus_1 + 1, 0);\n\n // checking that converting (modulus - 1) from and then to 254 BE bits produces the same bits\n let p_minus_1_converted_bits: [u1; 254] = p_minus_1.to_le_bits();\n assert_eq(p_minus_1_converted_bits, p_minus_1_bits);\n\n // checking that incrementing this bit produces 254 LE bits for (modulus + 4)\n let mut p_plus_4_bits: [u1; 254] = modulus_le_bits().as_array();\n assert(p_plus_4_bits[2] < 1);\n p_plus_4_bits[2] += 1;\n\n let p_plus_4 = from_le_bits::<254>(p_plus_4_bits);\n assert_eq(p_plus_4, 4);\n\n // checking that converting p_plus_4 to 254 LE bits produces the same\n // bit set to 1 as p_plus_4_bits and otherwise zeroes\n let mut p_plus_4_converted_bits: [u1; 254] = p_plus_4.to_le_bits();\n assert_eq(p_plus_4_converted_bits[2], 1);\n p_plus_4_converted_bits[2] = 0;\n assert_eq(p_plus_4_converted_bits, [0; 254]);\n\n // checking that Field::from_le_bits::<254> on the Field modulus produces 0\n assert_eq(modulus_le_bits().len(), 254);\n let p = from_le_bits::<254>(modulus_le_bits().as_array());\n assert_eq(p, 0);\n\n // checking that converting 0 to 254 LE bytes produces 254 zeroes\n let p_bits: [u1; 254] = 0.to_le_bits();\n assert_eq(p_bits, [0; 254]);\n }\n }\n}\n"
|
|
3326
3326
|
},
|
|
3327
|
-
"
|
|
3327
|
+
"183": {
|
|
3328
3328
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/message_processing.nr",
|
|
3329
3329
|
"source": "use protocol_types::address::AztecAddress;\n\n/// Finds new private logs that may have been sent to all registered accounts in PXE in the current contract and makes\n/// them available for later processing in Noir by storing them in a capsule array.\npub unconstrained fn fetch_tagged_logs(pending_tagged_log_array_base_slot: Field) {\n fetch_tagged_logs_oracle(pending_tagged_log_array_base_slot);\n}\n\n#[oracle(utilityFetchTaggedLogs)]\nunconstrained fn fetch_tagged_logs_oracle(pending_tagged_log_array_base_slot: Field) {}\n\n// This must be a single oracle and not one for notes and one for events because the entire point is to validate\n// all notes and events in one go, minimizing node round-trips.\npub(crate) unconstrained fn validate_enqueued_notes_and_events(\n contract_address: AztecAddress,\n note_validation_requests_array_base_slot: Field,\n event_validation_requests_array_base_slot: Field,\n) {\n validate_enqueued_notes_and_events_oracle(\n contract_address,\n note_validation_requests_array_base_slot,\n event_validation_requests_array_base_slot,\n );\n}\n\n#[oracle(utilityValidateEnqueuedNotesAndEvents)]\nunconstrained fn validate_enqueued_notes_and_events_oracle(\n contract_address: AztecAddress,\n note_validation_requests_array_base_slot: Field,\n event_validation_requests_array_base_slot: Field,\n) {}\n\npub(crate) unconstrained fn bulk_retrieve_logs(\n contract_address: AztecAddress,\n log_retrieval_requests_array_base_slot: Field,\n log_retrieval_responses_array_base_slot: Field,\n) {\n bulk_retrieve_logs_oracle(\n contract_address,\n log_retrieval_requests_array_base_slot,\n log_retrieval_responses_array_base_slot,\n );\n}\n\n#[oracle(utilityBulkRetrieveLogs)]\nunconstrained fn bulk_retrieve_logs_oracle(\n contract_address: AztecAddress,\n log_retrieval_requests_array_base_slot: Field,\n log_retrieval_responses_array_base_slot: Field,\n) {}\n"
|
|
3330
3330
|
},
|
|
3331
|
-
"
|
|
3331
|
+
"185": {
|
|
3332
3332
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/notes.nr",
|
|
3333
|
-
"source": "use crate::note::{note_interface::NoteType, retrieved_note::RetrievedNote};\n\nuse dep::protocol_types::{address::AztecAddress, traits::Packable};\n\n/// Notifies the simulator that a note has been created, so that it can be returned in future read requests in the same\n/// transaction. This note should only be added to the non-volatile database if found in an actual block.\npub fn notify_created_note<let N: u32>(\n owner: AztecAddress,\n storage_slot: Field,\n randomness: Field,\n note_type_id: Field,\n packed_note: [Field; N],\n note_hash: Field,\n counter: u32,\n) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe\n // to call.\n unsafe {\n notify_created_note_oracle_wrapper(\n owner,\n storage_slot,\n randomness,\n note_type_id,\n packed_note,\n note_hash,\n counter,\n )\n };\n}\n\n/// Notifies the simulator that a note has been nullified, so that it is no longer returned in future read requests in\n/// the same transaction. This note should only be removed to the non-volatile database if its nullifier is found in an\n/// actual block.\npub fn notify_nullified_note(nullifier: Field, note_hash: Field, counter: u32) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe to\n // call.\n unsafe { notify_nullified_note_oracle_wrapper(nullifier, note_hash, counter) };\n}\n\n/// Notifies the simulator that a non-note nullifier has been created, so that it can be used for note nonces.\npub fn notify_created_nullifier(nullifier: Field) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe to\n // call.\n unsafe { notify_created_nullifier_oracle_wrapper(nullifier) };\n}\n\nunconstrained fn notify_created_note_oracle_wrapper<let N: u32>(\n owner: AztecAddress,\n storage_slot: Field,\n randomness: Field,\n note_type_id: Field,\n packed_note: [Field; N],\n note_hash: Field,\n counter: u32,\n) {\n notify_created_note_oracle(\n owner,\n storage_slot,\n randomness,\n note_type_id,\n packed_note,\n note_hash,\n counter,\n );\n}\n\n#[oracle(privateNotifyCreatedNote)]\nunconstrained fn notify_created_note_oracle<let N: u32>(\n _owner: AztecAddress,\n _storage_slot: Field,\n _randomness: Field,\n _note_type_id: Field,\n _packed_note: [Field; N],\n _note_hash: Field,\n _counter: u32,\n) {}\n\nunconstrained fn notify_nullified_note_oracle_wrapper(\n nullifier: Field,\n note_hash: Field,\n counter: u32,\n) {\n notify_nullified_note_oracle(nullifier, note_hash, counter);\n}\n\n#[oracle(privateNotifyNullifiedNote)]\nunconstrained fn notify_nullified_note_oracle(_nullifier: Field, _note_hash: Field, _counter: u32) {}\n\nunconstrained fn notify_created_nullifier_oracle_wrapper(nullifier: Field) {\n notify_created_nullifier_oracle(nullifier);\n}\n\n#[oracle(privateNotifyCreatedNullifier)]\nunconstrained fn notify_created_nullifier_oracle(_nullifier: Field) {}\n\n#[oracle(utilityGetNotes)]\nunconstrained fn get_notes_oracle<Note, let M: u32, let MaxNotes: u32>(\n _owner: Option<AztecAddress>,\n _storage_slot: Field,\n _num_selects: u8,\n _select_by_indexes: [u8; M],\n _select_by_offsets: [u8; M],\n _select_by_lengths: [u8; M],\n _select_values: [Field; M],\n _select_comparators: [u8; M],\n _sort_by_indexes: [u8; M],\n _sort_by_offsets: [u8; M],\n _sort_by_lengths: [u8; M],\n _sort_order: [u8; M],\n _limit: u32,\n _offset: u32,\n _status: u8,\n // This is always set to MAX_NOTES. We need to pass it to TS in order to correctly construct the BoundedVec\n _max_notes: u32,\n // This is always set to <RetrievedNote<Note> as Packable>::N. We need to pass it to TS in order to be able to\n // correctly construct the BoundedVec there.\n _packed_retrieved_note_length: u32,\n) -> BoundedVec<[Field; <RetrievedNote<Note> as Packable>::N], MaxNotes>\nwhere\n // TODO(https://github.com/noir-lang/noir/issues/9399): `Note: Packable` should work here.\n RetrievedNote<Note>: Packable,\n{}\n\npub unconstrained fn get_notes<Note, let M: u32, let MaxNotes: u32>(\n owner: Option<AztecAddress>,\n storage_slot: Field,\n num_selects: u8,\n select_by_indexes: [u8; M],\n select_by_offsets: [u8; M],\n select_by_lengths: [u8; M],\n select_values: [Field; M],\n select_comparators: [u8; M],\n sort_by_indexes: [u8; M],\n sort_by_offsets: [u8; M],\n sort_by_lengths: [u8; M],\n sort_order: [u8; M],\n limit: u32,\n offset: u32,\n status: u8,\n) -> [Option<RetrievedNote<Note>>; MaxNotes]\nwhere\n Note: NoteType + Packable,\n{\n let packed_retrieved_notes: BoundedVec<[Field; <RetrievedNote<Note> as Packable>::N], MaxNotes>\n = get_notes_oracle::<Note, M, MaxNotes>(\n owner,\n storage_slot,\n num_selects,\n select_by_indexes,\n select_by_offsets,\n select_by_lengths,\n select_values,\n select_comparators,\n sort_by_indexes,\n sort_by_offsets,\n sort_by_lengths,\n sort_order,\n limit,\n offset,\n status,\n MaxNotes,\n <RetrievedNote<Note> as Packable>::N,\n );\n\n let mut notes = BoundedVec::<_, MaxNotes>::new();\n for i in 0..packed_retrieved_notes.len() {\n let retrieved_note = RetrievedNote::unpack(packed_retrieved_notes.get(i));\n notes.push(retrieved_note);\n }\n\n // At last we convert the bounded vector to an array of options. We do this because that is what the filter\n // function needs to have on the output and we've decided to have the same type on the input and output of\n // the filter and preprocessor functions.\n //\n // We have decided to have the same type on the input and output of the filter and preprocessor functions because\n // it allows us to chain multiple filters and preprocessors together.\n //\n // So why do we want the array of options on the output of the filter function?\n //\n // Filter returns an array of options rather than a BoundedVec for performance reasons. Using an array of options\n // allows setting values at known indices in the output array which is much more efficient than pushing to a\n // BoundedVec where the write position depends on previous iterations. The array can then be efficiently converted\n // to a BoundedVec using utils/array/collapse.nr::collapse function from Aztec.nr. This avoids expensive dynamic\n // memory access patterns that would be required when building up a BoundedVec incrementally. For preprocessor\n // functions we could use BoundedVec return value as there the optimization does not matter since it is applied in\n // an unconstrained context. We, however, use the same return value type to be able to use the same function as\n // both a preprocessor and a filter.\n let mut notes_array = [Option::none(); MaxNotes];\n for i in 0..notes.len() {\n if i < notes.len() {\n notes_array[i] = Option::some(notes.get_unchecked(i));\n }\n }\n\n notes_array\n}\n\n/// Returns true if the nullifier exists. Note that a `true` value can be constrained by proving existence of the\n/// nullifier, but a `false` value should not be relied upon since other transactions may emit this nullifier before the\n/// current transaction is included in a block. While this might seem of little use at first, certain design patterns\n/// benefit from this abstraction (see e.g. `PrivateMutable`).\npub unconstrained fn check_nullifier_exists(inner_nullifier: Field) -> bool {\n check_nullifier_exists_oracle(inner_nullifier)\n}\n\n#[oracle(utilityCheckNullifierExists)]\nunconstrained fn check_nullifier_exists_oracle(_inner_nullifier: Field) -> bool {}\n\n// TODO: Oracles below are generic private log oracles and are not specific to notes. Move them somewhere else.\n\n/// Returns the next app tag for a given sender and recipient pair.\n///\n/// This also notifies the simulator that a tag has been used in a note, and to therefore increment the\n/// associated index so that future notes get a different tag and can be discovered by the recipient.\n/// This change should only be persisted in a non-volatile database if the tagged log is found in an actual block -\n/// otherwise e.g. a reverting transaction can cause the sender to accidentally skip indices and later produce notes\n/// that are not found by the recipient.\npub unconstrained fn get_next_app_tag_as_sender(\n sender: AztecAddress,\n recipient: AztecAddress,\n) -> Field {\n get_next_app_tag_as_sender_oracle(sender, recipient)\n}\n\n#[oracle(privateGetNextAppTagAsSender)]\nunconstrained fn get_next_app_tag_as_sender_oracle(\n _sender: AztecAddress,\n _recipient: AztecAddress,\n) -> Field {}\n\n/// Gets the sender for tags.\n///\n/// This unconstrained value is used as the sender when computing an unconstrained shared secret\n/// for a tag in order to emit a log. Constrained tagging should not use this as there is no\n/// guarantee that the recipient knows about the sender, and hence about the shared secret.\n///\n/// The value persists through nested calls, meaning all calls down the stack will use the same\n/// 'senderForTags' value (unless it is replaced).\npub unconstrained fn get_sender_for_tags() -> Option<AztecAddress> {\n get_sender_for_tags_oracle()\n}\n\n#[oracle(privateGetSenderForTags)]\nunconstrained fn get_sender_for_tags_oracle() -> Option<AztecAddress> {}\n\n/// Sets the sender for tags.\n///\n/// This unconstrained value is used as the sender when computing an unconstrained shared secret\n/// for a tag in order to emit a log. Constrained tagging should not use this as there is no\n/// guarantee that the recipient knows about the sender, and hence about the shared secret.\n///\n/// Account contracts typically set this value before calling other contracts. The value persists\n/// through nested calls, meaning all calls down the stack will use the same 'senderForTags'\n/// value (unless it is replaced by another call to this setter).\npub unconstrained fn set_sender_for_tags(sender_for_tags: AztecAddress) {\n set_sender_for_tags_oracle(sender_for_tags);\n}\n\n#[oracle(privateSetSenderForTags)]\nunconstrained fn set_sender_for_tags_oracle(_sender_for_tags: AztecAddress) {}\n"
|
|
3333
|
+
"source": "use crate::note::{hinted_note::HintedNote, note_interface::NoteType};\n\nuse dep::protocol_types::{address::AztecAddress, traits::Packable};\n\n/// Notifies the simulator that a note has been created, so that it can be returned in future read requests in the same\n/// transaction. This note should only be added to the non-volatile database if found in an actual block.\npub fn notify_created_note<let N: u32>(\n owner: AztecAddress,\n storage_slot: Field,\n randomness: Field,\n note_type_id: Field,\n packed_note: [Field; N],\n note_hash: Field,\n counter: u32,\n) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe\n // to call.\n unsafe {\n notify_created_note_oracle_wrapper(\n owner,\n storage_slot,\n randomness,\n note_type_id,\n packed_note,\n note_hash,\n counter,\n )\n };\n}\n\n/// Notifies the simulator that a note has been nullified, so that it is no longer returned in future read requests in\n/// the same transaction. This note should only be removed to the non-volatile database if its nullifier is found in an\n/// actual block.\npub fn notify_nullified_note(nullifier: Field, note_hash: Field, counter: u32) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe to\n // call.\n unsafe { notify_nullified_note_oracle_wrapper(nullifier, note_hash, counter) };\n}\n\n/// Notifies the simulator that a non-note nullifier has been created, so that it can be used for note nonces.\npub fn notify_created_nullifier(nullifier: Field) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe to\n // call.\n unsafe { notify_created_nullifier_oracle_wrapper(nullifier) };\n}\n\nunconstrained fn notify_created_note_oracle_wrapper<let N: u32>(\n owner: AztecAddress,\n storage_slot: Field,\n randomness: Field,\n note_type_id: Field,\n packed_note: [Field; N],\n note_hash: Field,\n counter: u32,\n) {\n notify_created_note_oracle(\n owner,\n storage_slot,\n randomness,\n note_type_id,\n packed_note,\n note_hash,\n counter,\n );\n}\n\n#[oracle(privateNotifyCreatedNote)]\nunconstrained fn notify_created_note_oracle<let N: u32>(\n _owner: AztecAddress,\n _storage_slot: Field,\n _randomness: Field,\n _note_type_id: Field,\n _packed_note: [Field; N],\n _note_hash: Field,\n _counter: u32,\n) {}\n\nunconstrained fn notify_nullified_note_oracle_wrapper(\n nullifier: Field,\n note_hash: Field,\n counter: u32,\n) {\n notify_nullified_note_oracle(nullifier, note_hash, counter);\n}\n\n#[oracle(privateNotifyNullifiedNote)]\nunconstrained fn notify_nullified_note_oracle(_nullifier: Field, _note_hash: Field, _counter: u32) {}\n\nunconstrained fn notify_created_nullifier_oracle_wrapper(nullifier: Field) {\n notify_created_nullifier_oracle(nullifier);\n}\n\n#[oracle(privateNotifyCreatedNullifier)]\nunconstrained fn notify_created_nullifier_oracle(_nullifier: Field) {}\n\n#[oracle(utilityGetNotes)]\nunconstrained fn get_notes_oracle<Note, let M: u32, let MaxNotes: u32>(\n _owner: Option<AztecAddress>,\n _storage_slot: Field,\n _num_selects: u8,\n _select_by_indexes: [u8; M],\n _select_by_offsets: [u8; M],\n _select_by_lengths: [u8; M],\n _select_values: [Field; M],\n _select_comparators: [u8; M],\n _sort_by_indexes: [u8; M],\n _sort_by_offsets: [u8; M],\n _sort_by_lengths: [u8; M],\n _sort_order: [u8; M],\n _limit: u32,\n _offset: u32,\n _status: u8,\n // This is always set to MAX_NOTES. We need to pass it to TS in order to correctly construct the BoundedVec\n _max_notes: u32,\n // This is always set to <HintedNote<Note> as Packable>::N. We need to pass it to TS in order to be able to\n // correctly construct the BoundedVec there.\n _packed_hinted_note_length: u32,\n) -> BoundedVec<[Field; <HintedNote<Note> as Packable>::N], MaxNotes>\nwhere\n // TODO(https://github.com/noir-lang/noir/issues/9399): `Note: Packable` should work here.\n HintedNote<Note>: Packable,\n{}\n\npub unconstrained fn get_notes<Note, let M: u32, let MaxNotes: u32>(\n owner: Option<AztecAddress>,\n storage_slot: Field,\n num_selects: u8,\n select_by_indexes: [u8; M],\n select_by_offsets: [u8; M],\n select_by_lengths: [u8; M],\n select_values: [Field; M],\n select_comparators: [u8; M],\n sort_by_indexes: [u8; M],\n sort_by_offsets: [u8; M],\n sort_by_lengths: [u8; M],\n sort_order: [u8; M],\n limit: u32,\n offset: u32,\n status: u8,\n) -> [Option<HintedNote<Note>>; MaxNotes]\nwhere\n Note: NoteType + Packable,\n{\n let packed_hinted_notes: BoundedVec<[Field; <HintedNote<Note> as Packable>::N], MaxNotes> = get_notes_oracle::<Note, M, MaxNotes>(\n owner,\n storage_slot,\n num_selects,\n select_by_indexes,\n select_by_offsets,\n select_by_lengths,\n select_values,\n select_comparators,\n sort_by_indexes,\n sort_by_offsets,\n sort_by_lengths,\n sort_order,\n limit,\n offset,\n status,\n MaxNotes,\n <HintedNote<Note> as Packable>::N,\n );\n\n let mut notes = BoundedVec::<_, MaxNotes>::new();\n for i in 0..packed_hinted_notes.len() {\n let hinted_note = HintedNote::unpack(packed_hinted_notes.get(i));\n notes.push(hinted_note);\n }\n\n // At last we convert the bounded vector to an array of options. We do this because that is what the filter\n // function needs to have on the output and we've decided to have the same type on the input and output of\n // the filter and preprocessor functions.\n //\n // We have decided to have the same type on the input and output of the filter and preprocessor functions because\n // it allows us to chain multiple filters and preprocessors together.\n //\n // So why do we want the array of options on the output of the filter function?\n //\n // Filter returns an array of options rather than a BoundedVec for performance reasons. Using an array of options\n // allows setting values at known indices in the output array which is much more efficient than pushing to a\n // BoundedVec where the write position depends on previous iterations. The array can then be efficiently converted\n // to a BoundedVec using utils/array/collapse.nr::collapse function from Aztec.nr. This avoids expensive dynamic\n // memory access patterns that would be required when building up a BoundedVec incrementally. For preprocessor\n // functions we could use BoundedVec return value as there the optimization does not matter since it is applied in\n // an unconstrained context. We, however, use the same return value type to be able to use the same function as\n // both a preprocessor and a filter.\n let mut notes_array = [Option::none(); MaxNotes];\n for i in 0..notes.len() {\n if i < notes.len() {\n notes_array[i] = Option::some(notes.get_unchecked(i));\n }\n }\n\n notes_array\n}\n\n/// Returns true if the nullifier exists. Note that a `true` value can be constrained by proving existence of the\n/// nullifier, but a `false` value should not be relied upon since other transactions may emit this nullifier before the\n/// current transaction is included in a block. While this might seem of little use at first, certain design patterns\n/// benefit from this abstraction (see e.g. `PrivateMutable`).\npub unconstrained fn check_nullifier_exists(inner_nullifier: Field) -> bool {\n check_nullifier_exists_oracle(inner_nullifier)\n}\n\n#[oracle(utilityCheckNullifierExists)]\nunconstrained fn check_nullifier_exists_oracle(_inner_nullifier: Field) -> bool {}\n\n// TODO: Oracles below are generic private log oracles and are not specific to notes. Move them somewhere else.\n\n/// Returns the next app tag for a given sender and recipient pair.\n///\n/// This also notifies the simulator that a tag has been used in a note, and to therefore increment the\n/// associated index so that future notes get a different tag and can be discovered by the recipient.\n/// This change should only be persisted in a non-volatile database if the tagged log is found in an actual block -\n/// otherwise e.g. a reverting transaction can cause the sender to accidentally skip indices and later produce notes\n/// that are not found by the recipient.\npub unconstrained fn get_next_app_tag_as_sender(\n sender: AztecAddress,\n recipient: AztecAddress,\n) -> Field {\n get_next_app_tag_as_sender_oracle(sender, recipient)\n}\n\n#[oracle(privateGetNextAppTagAsSender)]\nunconstrained fn get_next_app_tag_as_sender_oracle(\n _sender: AztecAddress,\n _recipient: AztecAddress,\n) -> Field {}\n\n/// Gets the sender for tags.\n///\n/// This unconstrained value is used as the sender when computing an unconstrained shared secret\n/// for a tag in order to emit a log. Constrained tagging should not use this as there is no\n/// guarantee that the recipient knows about the sender, and hence about the shared secret.\n///\n/// The value persists through nested calls, meaning all calls down the stack will use the same\n/// 'senderForTags' value (unless it is replaced).\npub unconstrained fn get_sender_for_tags() -> Option<AztecAddress> {\n get_sender_for_tags_oracle()\n}\n\n#[oracle(privateGetSenderForTags)]\nunconstrained fn get_sender_for_tags_oracle() -> Option<AztecAddress> {}\n\n/// Sets the sender for tags.\n///\n/// This unconstrained value is used as the sender when computing an unconstrained shared secret\n/// for a tag in order to emit a log. Constrained tagging should not use this as there is no\n/// guarantee that the recipient knows about the sender, and hence about the shared secret.\n///\n/// Account contracts typically set this value before calling other contracts. The value persists\n/// through nested calls, meaning all calls down the stack will use the same 'senderForTags'\n/// value (unless it is replaced by another call to this setter).\npub unconstrained fn set_sender_for_tags(sender_for_tags: AztecAddress) {\n set_sender_for_tags_oracle(sender_for_tags);\n}\n\n#[oracle(privateSetSenderForTags)]\nunconstrained fn set_sender_for_tags_oracle(_sender_for_tags: AztecAddress) {}\n"
|
|
3334
3334
|
},
|
|
3335
|
-
"
|
|
3335
|
+
"186": {
|
|
3336
3336
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/offchain_effect.nr",
|
|
3337
3337
|
"source": "use protocol_types::traits::Serialize;\n\n/// Emits data that will be delivered to PXE unaltered. This data can be interpreted freely by a\n/// downstream consumer (such as a wallet).\n///\n/// # Arguments\n///\n/// * `data` - The data to emit.\npub unconstrained fn emit_offchain_effect<T>(data: T)\nwhere\n T: Serialize,\n{\n emit_offchain_effect_oracle(data.serialize());\n}\n\n#[oracle(utilityEmitOffchainEffect)]\nunconstrained fn emit_offchain_effect_oracle<let N: u32>(data: [Field; N]) {}\n"
|
|
3338
3338
|
},
|
|
3339
|
-
"
|
|
3339
|
+
"188": {
|
|
3340
3340
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/shared_secret.nr",
|
|
3341
3341
|
"source": "use protocol_types::{address::aztec_address::AztecAddress, point::Point};\n\n// TODO(#12656): return an app-siloed secret + document this\n#[oracle(utilityGetSharedSecret)]\nunconstrained fn get_shared_secret_oracle(address: AztecAddress, ephPk: Point) -> Point {}\n\n/// Returns an app-siloed shared secret between `address` and someone who knows the secret key behind an\n/// ephemeral public key `ephPk`. The app-siloing means that contracts cannot retrieve secrets that belong to\n/// other contracts, and therefore cannot e.g. decrypt their messages. This is an important security consideration\n/// given that both the `address` and `ephPk` are public information.\n///\n/// The shared secret `S` is computed as:\n/// `let S = (ivsk + h) * ephPk`\n/// where `ivsk + h` is the 'preaddress' i.e. the preimage of the address, also called the address secret.\n/// TODO(#12656): app-silo this secret\npub unconstrained fn get_shared_secret(address: AztecAddress, ephPk: Point) -> Point {\n get_shared_secret_oracle(address, ephPk)\n}\n"
|
|
3342
3342
|
},
|
|
3343
|
-
"
|
|
3343
|
+
"189": {
|
|
3344
3344
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/storage.nr",
|
|
3345
3345
|
"source": "use protocol_types::{\n abis::block_header::BlockHeader,\n address::AztecAddress,\n traits::{Hash, Packable, ToField},\n};\n\n#[oracle(utilityStorageRead)]\nunconstrained fn storage_read_oracle<let N: u32>(\n block_hash: Field,\n address: Field,\n storage_slot: Field,\n length: u32,\n) -> [Field; N] {}\n\npub unconstrained fn raw_storage_read<let N: u32>(\n block_hash_to_read_from: Field,\n address: AztecAddress,\n storage_slot: Field,\n) -> [Field; N] {\n storage_read_oracle(block_hash_to_read_from, address.to_field(), storage_slot, N)\n}\n\npub unconstrained fn storage_read<T>(\n header_to_read_from: BlockHeader,\n address: AztecAddress,\n storage_slot: Field,\n) -> T\nwhere\n T: Packable,\n{\n let block_hash_to_read_from = header_to_read_from.hash();\n T::unpack(\n raw_storage_read(block_hash_to_read_from, address, storage_slot),\n )\n}\n"
|
|
3346
3346
|
},
|
|
3347
|
-
"189": {
|
|
3348
|
-
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/version.nr",
|
|
3349
|
-
"source": "/// The ORACLE_VERSION constant is used to check that the oracle interface is in sync between PXE and Aztec.nr. We need\n/// to version the oracle interface to ensure that developers get a reasonable error message if they use incompatible\n/// versions of Aztec.nr and PXE. The TypeScript counterpart is in `oracle_version.ts`.\n///\n/// @dev Whenever a contract function or Noir test is run, the `utilityAssertCompatibleOracleVersion` oracle is called and\n/// if the oracle version is incompatible an error is thrown.\npub global ORACLE_VERSION: Field = 6;\n\n/// Asserts that the version of the oracle is compatible with the version expected by the contract.\npub fn assert_compatible_oracle_version() {\n // Safety: This oracle call returns nothing: we only call it to check Aztec.nr and Oracle interface versions are\n // compatible. It is therefore always safe to call.\n unsafe {\n assert_compatible_oracle_version_wrapper();\n }\n}\n\nunconstrained fn assert_compatible_oracle_version_wrapper() {\n assert_compatible_oracle_version_oracle(ORACLE_VERSION);\n}\n\n#[oracle(utilityAssertCompatibleOracleVersion)]\nunconstrained fn assert_compatible_oracle_version_oracle(version: Field) {}\n\nmod test {\n use super::{assert_compatible_oracle_version_oracle, ORACLE_VERSION};\n\n #[test]\n unconstrained fn compatible_oracle_version() {\n assert_compatible_oracle_version_oracle(ORACLE_VERSION);\n }\n\n #[test(should_fail_with = \"Incompatible oracle version. TXE is using version\")]\n unconstrained fn incompatible_oracle_version() {\n let arbitrary_incorrect_version = 318183437;\n assert_compatible_oracle_version_oracle(arbitrary_incorrect_version);\n }\n}\n"
|
|
3350
|
-
},
|
|
3351
3347
|
"19": {
|
|
3352
3348
|
"path": "std/hash/mod.nr",
|
|
3353
3349
|
"source": "// Exposed only for usage in `std::meta`\npub(crate) mod poseidon2;\n\nuse crate::default::Default;\nuse crate::embedded_curve_ops::{\n EmbeddedCurvePoint, EmbeddedCurveScalar, multi_scalar_mul, multi_scalar_mul_array_return,\n};\nuse crate::meta::derive_via;\n\n#[foreign(sha256_compression)]\n// docs:start:sha256_compression\npub fn sha256_compression(input: [u32; 16], state: [u32; 8]) -> [u32; 8] {}\n// docs:end:sha256_compression\n\n#[foreign(keccakf1600)]\n// docs:start:keccakf1600\npub fn keccakf1600(input: [u64; 25]) -> [u64; 25] {}\n// docs:end:keccakf1600\n\npub mod keccak {\n #[deprecated(\"This function has been moved to std::hash::keccakf1600\")]\n pub fn keccakf1600(input: [u64; 25]) -> [u64; 25] {\n super::keccakf1600(input)\n }\n}\n\n#[foreign(blake2s)]\n// docs:start:blake2s\npub fn blake2s<let N: u32>(input: [u8; N]) -> [u8; 32]\n// docs:end:blake2s\n{}\n\n// docs:start:blake3\npub fn blake3<let N: u32>(input: [u8; N]) -> [u8; 32]\n// docs:end:blake3\n{\n if crate::runtime::is_unconstrained() {\n // Temporary measure while Barretenberg is main proving system.\n // Please open an issue if you're working on another proving system and running into problems due to this.\n crate::static_assert(\n N <= 1024,\n \"Barretenberg cannot prove blake3 hashes with inputs larger than 1024 bytes\",\n );\n }\n __blake3(input)\n}\n\n#[foreign(blake3)]\nfn __blake3<let N: u32>(input: [u8; N]) -> [u8; 32] {}\n\n// docs:start:pedersen_commitment\npub fn pedersen_commitment<let N: u32>(input: [Field; N]) -> EmbeddedCurvePoint {\n // docs:end:pedersen_commitment\n pedersen_commitment_with_separator(input, 0)\n}\n\n#[inline_always]\npub fn pedersen_commitment_with_separator<let N: u32>(\n input: [Field; N],\n separator: u32,\n) -> EmbeddedCurvePoint {\n let mut points = [EmbeddedCurveScalar { lo: 0, hi: 0 }; N];\n for i in 0..N {\n // we use the unsafe version because the multi_scalar_mul will constrain the scalars.\n points[i] = from_field_unsafe(input[i]);\n }\n let generators = derive_generators(\"DEFAULT_DOMAIN_SEPARATOR\".as_bytes(), separator);\n multi_scalar_mul(generators, points)\n}\n\n// docs:start:pedersen_hash\npub fn pedersen_hash<let N: u32>(input: [Field; N]) -> Field\n// docs:end:pedersen_hash\n{\n pedersen_hash_with_separator(input, 0)\n}\n\n#[no_predicates]\npub fn pedersen_hash_with_separator<let N: u32>(input: [Field; N], separator: u32) -> Field {\n let mut scalars: [EmbeddedCurveScalar; N + 1] = [EmbeddedCurveScalar { lo: 0, hi: 0 }; N + 1];\n let mut generators: [EmbeddedCurvePoint; N + 1] =\n [EmbeddedCurvePoint::point_at_infinity(); N + 1];\n let domain_generators: [EmbeddedCurvePoint; N] =\n derive_generators(\"DEFAULT_DOMAIN_SEPARATOR\".as_bytes(), separator);\n\n for i in 0..N {\n scalars[i] = from_field_unsafe(input[i]);\n generators[i] = domain_generators[i];\n }\n scalars[N] = EmbeddedCurveScalar { lo: N as Field, hi: 0 as Field };\n\n let length_generator: [EmbeddedCurvePoint; 1] =\n derive_generators(\"pedersen_hash_length\".as_bytes(), 0);\n generators[N] = length_generator[0];\n multi_scalar_mul_array_return(generators, scalars, true)[0].x\n}\n\n#[field(bn254)]\n#[inline_always]\npub fn derive_generators<let N: u32, let M: u32>(\n domain_separator_bytes: [u8; M],\n starting_index: u32,\n) -> [EmbeddedCurvePoint; N] {\n crate::assert_constant(domain_separator_bytes);\n // TODO(https://github.com/noir-lang/noir/issues/5672): Add back assert_constant on starting_index\n __derive_generators(domain_separator_bytes, starting_index)\n}\n\n#[builtin(derive_pedersen_generators)]\n#[field(bn254)]\nfn __derive_generators<let N: u32, let M: u32>(\n domain_separator_bytes: [u8; M],\n starting_index: u32,\n) -> [EmbeddedCurvePoint; N] {}\n\n#[field(bn254)]\n// Decompose the input 'bn254 scalar' into two 128 bits limbs.\n// It is called 'unsafe' because it does not assert the limbs are 128 bits\n// Assuming the limbs are 128 bits:\n// Assert the decomposition does not overflow the field size.\nfn from_field_unsafe(scalar: Field) -> EmbeddedCurveScalar {\n // Safety: xlo and xhi decomposition is checked below\n let (xlo, xhi) = unsafe { crate::field::bn254::decompose_hint(scalar) };\n // Check that the decomposition is correct\n assert_eq(scalar, xlo + crate::field::bn254::TWO_POW_128 * xhi);\n // Check that the decomposition does not overflow the field size\n let (a, b) = if xhi == crate::field::bn254::PHI {\n (xlo, crate::field::bn254::PLO)\n } else {\n (xhi, crate::field::bn254::PHI)\n };\n crate::field::bn254::assert_lt(a, b);\n\n EmbeddedCurveScalar { lo: xlo, hi: xhi }\n}\n\npub fn poseidon2_permutation<let N: u32>(input: [Field; N], state_len: u32) -> [Field; N] {\n assert_eq(input.len(), state_len);\n poseidon2_permutation_internal(input)\n}\n\n#[foreign(poseidon2_permutation)]\nfn poseidon2_permutation_internal<let N: u32>(input: [Field; N]) -> [Field; N] {}\n\n// Generic hashing support.\n// Partially ported and impacted by rust.\n\n// Hash trait shall be implemented per type.\n#[derive_via(derive_hash)]\npub trait Hash {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher;\n}\n\n// docs:start:derive_hash\ncomptime fn derive_hash(s: TypeDefinition) -> Quoted {\n let name = quote { $crate::hash::Hash };\n let signature = quote { fn hash<H>(_self: Self, _state: &mut H) where H: $crate::hash::Hasher };\n let for_each_field = |name| quote { _self.$name.hash(_state); };\n crate::meta::make_trait_impl(\n s,\n name,\n signature,\n for_each_field,\n quote {},\n |fields| fields,\n )\n}\n// docs:end:derive_hash\n\n// Hasher trait shall be implemented by algorithms to provide hash-agnostic means.\n// TODO: consider making the types generic here ([u8], [Field], etc.)\npub trait Hasher {\n fn finish(self) -> Field;\n\n fn write(&mut self, input: Field);\n}\n\n// BuildHasher is a factory trait, responsible for production of specific Hasher.\npub trait BuildHasher {\n type H: Hasher;\n\n fn build_hasher(self) -> H;\n}\n\npub struct BuildHasherDefault<H>;\n\nimpl<H> BuildHasher for BuildHasherDefault<H>\nwhere\n H: Hasher + Default,\n{\n type H = H;\n\n fn build_hasher(_self: Self) -> H {\n H::default()\n }\n}\n\nimpl<H> Default for BuildHasherDefault<H>\nwhere\n H: Hasher + Default,\n{\n fn default() -> Self {\n BuildHasherDefault {}\n }\n}\n\nimpl Hash for Field {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self);\n }\n}\n\nimpl Hash for u1 {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for u8 {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for u16 {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for u32 {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for u64 {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for u128 {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for i8 {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as u8 as Field);\n }\n}\n\nimpl Hash for i16 {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as u16 as Field);\n }\n}\n\nimpl Hash for i32 {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as u32 as Field);\n }\n}\n\nimpl Hash for i64 {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as u64 as Field);\n }\n}\n\nimpl Hash for bool {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for () {\n fn hash<H>(_self: Self, _state: &mut H)\n where\n H: Hasher,\n {}\n}\n\nimpl<T, let N: u32> Hash for [T; N]\nwhere\n T: Hash,\n{\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n for elem in self {\n elem.hash(state);\n }\n }\n}\n\nimpl<T> Hash for [T]\nwhere\n T: Hash,\n{\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n self.len().hash(state);\n for elem in self {\n elem.hash(state);\n }\n }\n}\n\nimpl<A, B> Hash for (A, B)\nwhere\n A: Hash,\n B: Hash,\n{\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n self.0.hash(state);\n self.1.hash(state);\n }\n}\n\nimpl<A, B, C> Hash for (A, B, C)\nwhere\n A: Hash,\n B: Hash,\n C: Hash,\n{\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n self.0.hash(state);\n self.1.hash(state);\n self.2.hash(state);\n }\n}\n\nimpl<A, B, C, D> Hash for (A, B, C, D)\nwhere\n A: Hash,\n B: Hash,\n C: Hash,\n D: Hash,\n{\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n self.0.hash(state);\n self.1.hash(state);\n self.2.hash(state);\n self.3.hash(state);\n }\n}\n\nimpl<A, B, C, D, E> Hash for (A, B, C, D, E)\nwhere\n A: Hash,\n B: Hash,\n C: Hash,\n D: Hash,\n E: Hash,\n{\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n self.0.hash(state);\n self.1.hash(state);\n self.2.hash(state);\n self.3.hash(state);\n self.4.hash(state);\n }\n}\n\n// Some test vectors for Pedersen hash and Pedersen Commitment.\n// They have been generated using the same functions so the tests are for now useless\n// but they will be useful when we switch to Noir implementation.\n#[test]\nfn assert_pedersen() {\n assert_eq(\n pedersen_hash_with_separator([1], 1),\n 0x1b3f4b1a83092a13d8d1a59f7acb62aba15e7002f4440f2275edb99ebbc2305f,\n );\n assert_eq(\n pedersen_commitment_with_separator([1], 1),\n EmbeddedCurvePoint {\n x: 0x054aa86a73cb8a34525e5bbed6e43ba1198e860f5f3950268f71df4591bde402,\n y: 0x209dcfbf2cfb57f9f6046f44d71ac6faf87254afc7407c04eb621a6287cac126,\n is_infinite: false,\n },\n );\n\n assert_eq(\n pedersen_hash_with_separator([1, 2], 2),\n 0x26691c129448e9ace0c66d11f0a16d9014a9e8498ee78f4d69f0083168188255,\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2], 2),\n EmbeddedCurvePoint {\n x: 0x2e2b3b191e49541fe468ec6877721d445dcaffe41728df0a0eafeb15e87b0753,\n y: 0x2ff4482400ad3a6228be17a2af33e2bcdf41be04795f9782bd96efe7e24f8778,\n is_infinite: false,\n },\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3], 3),\n 0x0bc694b7a1f8d10d2d8987d07433f26bd616a2d351bc79a3c540d85b6206dbe4,\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3], 3),\n EmbeddedCurvePoint {\n x: 0x1fee4e8cf8d2f527caa2684236b07c4b1bad7342c01b0f75e9a877a71827dc85,\n y: 0x2f9fedb9a090697ab69bf04c8bc15f7385b3e4b68c849c1536e5ae15ff138fd1,\n is_infinite: false,\n },\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4], 4),\n 0xdae10fb32a8408521803905981a2b300d6a35e40e798743e9322b223a5eddc,\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4], 4),\n EmbeddedCurvePoint {\n x: 0x07ae3e202811e1fca39c2d81eabe6f79183978e6f12be0d3b8eda095b79bdbc9,\n y: 0x0afc6f892593db6fbba60f2da558517e279e0ae04f95758587760ba193145014,\n is_infinite: false,\n },\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5], 5),\n 0xfc375b062c4f4f0150f7100dfb8d9b72a6d28582dd9512390b0497cdad9c22,\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5], 5),\n EmbeddedCurvePoint {\n x: 0x1754b12bd475a6984a1094b5109eeca9838f4f81ac89c5f0a41dbce53189bb29,\n y: 0x2da030e3cfcdc7ddad80eaf2599df6692cae0717d4e9f7bfbee8d073d5d278f7,\n is_infinite: false,\n },\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5, 6], 6),\n 0x1696ed13dc2730062a98ac9d8f9de0661bb98829c7582f699d0273b18c86a572,\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6], 6),\n EmbeddedCurvePoint {\n x: 0x190f6c0e97ad83e1e28da22a98aae156da083c5a4100e929b77e750d3106a697,\n y: 0x1f4b60f34ef91221a0b49756fa0705da93311a61af73d37a0c458877706616fb,\n is_infinite: false,\n },\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5, 6, 7], 7),\n 0x128c0ff144fc66b6cb60eeac8a38e23da52992fc427b92397a7dffd71c45ede3,\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6, 7], 7),\n EmbeddedCurvePoint {\n x: 0x015441e9d29491b06563fac16fc76abf7a9534c715421d0de85d20dbe2965939,\n y: 0x1d2575b0276f4e9087e6e07c2cb75aa1baafad127af4be5918ef8a2ef2fea8fc,\n is_infinite: false,\n },\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5, 6, 7, 8], 8),\n 0x2f960e117482044dfc99d12fece2ef6862fba9242be4846c7c9a3e854325a55c,\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6, 7, 8], 8),\n EmbeddedCurvePoint {\n x: 0x1657737676968887fceb6dd516382ea13b3a2c557f509811cd86d5d1199bc443,\n y: 0x1f39f0cb569040105fa1e2f156521e8b8e08261e635a2b210bdc94e8d6d65f77,\n is_infinite: false,\n },\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5, 6, 7, 8, 9], 9),\n 0x0c96db0790602dcb166cc4699e2d306c479a76926b81c2cb2aaa92d249ec7be7,\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6, 7, 8, 9], 9),\n EmbeddedCurvePoint {\n x: 0x0a3ceae42d14914a432aa60ec7fded4af7dad7dd4acdbf2908452675ec67e06d,\n y: 0xfc19761eaaf621ad4aec9a8b2e84a4eceffdba78f60f8b9391b0bd9345a2f2,\n is_infinite: false,\n },\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5, 6, 7, 8, 9, 10], 10),\n 0x2cd37505871bc460a62ea1e63c7fe51149df5d0801302cf1cbc48beb8dff7e94,\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6, 7, 8, 9, 10], 10),\n EmbeddedCurvePoint {\n x: 0x2fb3f8b3d41ddde007c8c3c62550f9a9380ee546fcc639ffbb3fd30c8d8de30c,\n y: 0x300783be23c446b11a4c0fabf6c91af148937cea15fcf5fb054abf7f752ee245,\n is_infinite: false,\n },\n );\n}\n"
|
|
3354
3350
|
},
|
|
3355
|
-
"
|
|
3351
|
+
"190": {
|
|
3352
|
+
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/version.nr",
|
|
3353
|
+
"source": "/// The ORACLE_VERSION constant is used to check that the oracle interface is in sync between PXE and Aztec.nr. We need\n/// to version the oracle interface to ensure that developers get a reasonable error message if they use incompatible\n/// versions of Aztec.nr and PXE. The TypeScript counterpart is in `oracle_version.ts`.\n///\n/// @dev Whenever a contract function or Noir test is run, the `utilityAssertCompatibleOracleVersion` oracle is called and\n/// if the oracle version is incompatible an error is thrown.\npub global ORACLE_VERSION: Field = 6;\n\n/// Asserts that the version of the oracle is compatible with the version expected by the contract.\npub fn assert_compatible_oracle_version() {\n // Safety: This oracle call returns nothing: we only call it to check Aztec.nr and Oracle interface versions are\n // compatible. It is therefore always safe to call.\n unsafe {\n assert_compatible_oracle_version_wrapper();\n }\n}\n\nunconstrained fn assert_compatible_oracle_version_wrapper() {\n assert_compatible_oracle_version_oracle(ORACLE_VERSION);\n}\n\n#[oracle(utilityAssertCompatibleOracleVersion)]\nunconstrained fn assert_compatible_oracle_version_oracle(version: Field) {}\n\nmod test {\n use super::{assert_compatible_oracle_version_oracle, ORACLE_VERSION};\n\n #[test]\n unconstrained fn compatible_oracle_version() {\n assert_compatible_oracle_version_oracle(ORACLE_VERSION);\n }\n\n #[test(should_fail_with = \"Incompatible oracle version. TXE is using version\")]\n unconstrained fn incompatible_oracle_version() {\n let arbitrary_incorrect_version = 318183437;\n assert_compatible_oracle_version_oracle(arbitrary_incorrect_version);\n }\n}\n"
|
|
3354
|
+
},
|
|
3355
|
+
"194": {
|
|
3356
3356
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/state_vars/map.nr",
|
|
3357
3357
|
"source": "use crate::state_vars::state_variable::StateVariable;\nuse dep::protocol_types::{storage::map::derive_storage_slot_in_map, traits::ToField};\n\n/// Map\n///\n/// A key-value storage container that maps keys to state variables, similar\n/// to Solidity mappings.\n///\n/// `Map` enables you to associate keys (like addresses or other identifiers)\n/// with state variables in your Aztec smart contract. This is conceptually\n/// similar to Solidity's `mapping(K => V)` syntax, where you can store and\n/// retrieve values by their associated keys.\n///\n/// You can declare a state variable contained within a Map in your contract's\n/// [storage](crate::macros::storage::storage) struct.\n///\n/// For example, you might use\n/// `Map<AztecAddress, PublicMutable<FieldNote, Context>, Context>` to track\n/// token balances for different users, similar to how you'd use\n/// `mapping(address => uint256)` in Solidity.\n///\n/// > Aside: the verbose `Context` in the declaration is a consequence of\n/// > leveraging Noir's regular syntax for generics to ensure that certain\n/// > state variable methods can only be called in some contexts (private,\n/// > public, utility).\n///\n/// The methods of Map are:\n/// - `at` (access state variable for a given key)\n/// (see the method's own doc comments for more info).\n///\n/// ## Generic Parameters\n/// - `K`: The key type (must implement `ToField` trait for hashing)\n/// - `V`: The value type:\n/// - any Aztec state variable (variable that implements the StateVariable trait):\n/// - `PublicMutable`\n/// - `PublicImmutable`\n/// - `DelayedPublicMutable`\n/// - `Map`\n/// - `Context`: The execution context (handles private/public function\n/// contexts)\n///\n/// ## Usage\n/// Maps are typically declared in your contract's [storage](crate::macros::storage::storage) struct and\n/// accessed\n/// using the `at(key)` method to get the state variable for a specific key.\n/// The resulting state variable can then be read from or written to using its\n/// own methods.\n///\n/// Note that maps cannot be used with owned state variables (variables that\n/// implement the OwnedStateVariable trait) - those need to be wrapped in an\n/// `Owned` state variable instead.\n///\n/// ## Advanced\n/// Internally, `Map` uses a single base storage slot to represent the\n/// mapping\n/// itself, similar to Solidity's approach. Individual key-value pairs are\n/// stored at derived storage slots computed by hashing the base storage\n/// slot\n/// with the key using Poseidon2. This ensures:\n/// - No storage slot collisions between different keys\n/// - Uniform distribution of storage slots across the storage space\n/// - Compatibility with Aztec's storage tree structure\n/// - Gas-efficient storage access patterns similar to Solidity mappings\n///\n/// The storage slot derivation uses `derive_storage_slot_in_map(base_slot,\n/// key)` which computes `poseidon2_hash([base_slot, key.to_field()])`,\n/// ensuring cryptographically secure slot separation.\n///\n/// docs:start:map\npub struct Map<K, V, Context> {\n pub context: Context,\n storage_slot: Field,\n}\n\n// Map reserves a single storage slot regardless of what it stores because\n// nothing is stored at said slot: it is only used to derive the storage slots\n// of nested state variables, which is expected to never result in collisions\n// or slots being close to one another due to these being hashes. This mirrors\n// the strategy adopted by Solidity mappings.\nimpl<K, V, Context> StateVariable<1, Context> for Map<K, V, Context> {\n fn new(context: Context, storage_slot: Field) -> Self {\n assert(storage_slot != 0, \"Storage slot 0 not allowed. Storage slots must start from 1.\");\n Map { context, storage_slot }\n }\n\n fn get_storage_slot(self) -> Field {\n self.storage_slot\n }\n}\n\nimpl<K, V, Context> Map<K, V, Context> {\n /// Returns the state variable associated with the given key.\n ///\n /// This is equivalent to accessing `mapping[key]` in Solidity. It returns\n /// the state variable instance for the specified key, which can then be\n /// used to read or write the value at that key.\n ///\n /// Unlike Solidity mappings which return the value directly, this returns\n /// the state variable wrapper (like PublicMutable, nested Map etc.)\n /// that you then call methods on to interact with the actual value.\n ///\n /// # Arguments\n ///\n /// * `key` - The key to look up in the map. Must implement the ToField\n /// trait (which most basic Noir & Aztec types do).\n ///\n /// # Returns\n ///\n /// * `V` - The state variable instance for this key. You can then call\n /// methods like `.read()`, `.write()`, `.get_note()`, etc. on this\n /// depending on the specific state variable type.\n ///\n /// # Example\n ///\n /// ```noir\n /// // Get a user's balance (assuming PrivateMutable<FieldNote>)\n /// let user_balance = self.storage.balances.at(user_address);\n /// let current_note = user_balance.get_note();\n ///\n /// // Update the balance\n /// user_balance.replace(new_note);\n /// ```\n ///\n pub fn at<let N: u32>(self, key: K) -> V\n where\n K: ToField,\n V: StateVariable<N, Context>,\n {\n V::new(\n self.context,\n derive_storage_slot_in_map(self.storage_slot, key),\n )\n }\n}\n"
|
|
3358
3358
|
},
|
|
3359
|
-
"
|
|
3359
|
+
"206": {
|
|
3360
3360
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/state_vars/public_mutable.nr",
|
|
3361
3361
|
"source": "use crate::context::{PublicContext, UtilityContext};\nuse crate::state_vars::state_variable::StateVariable;\nuse dep::protocol_types::traits::Packable;\n\n/// # PublicMutable\n///\n/// PublicMutable is a public state variable type for values that can be read\n/// and written within public [external](crate::macros::functions::external) functions of your smart contract.\n///\n/// You can declare a state variable of type PublicMutable within your contract's\n/// [storage](crate::macros::storage::storage) struct:\n///\n/// E.g.:\n/// `your_variable: PublicMutable<T, Context>`\n/// or:\n/// `your_mapping: Map<Field, PublicMutable<T, Context>>`\n///\n/// The methods of PublicMutable are:\n/// - `read`\n/// - `write`\n/// (see the methods' own doc comments for more info).\n///\n/// ## Example.\n///\n/// A voting contract's proposal count can be represented as a PublicMutable<u64>.\n/// The count can be read by anyone to see how many proposals exist, and incremented\n/// when new proposals are submitted.\n///\n/// # Generic Parameters:\n///\n/// * `T` - The type of value stored (must implement Packable).\n/// * `Context` - The execution context (PublicContext or UtilityContext).\n///\n/// # Advanced\n///\n/// Unlike private state variables which use notes, PublicMutable stores values\n/// directly in Aztec's public data tree. This enables direct read and write\n/// access to the current state during public function execution.\n///\n/// docs:start:public_mutable_struct\npub struct PublicMutable<T, Context> {\n context: Context,\n storage_slot: Field,\n}\n\nimpl<T, Context, let M: u32> StateVariable<M, Context> for PublicMutable<T, Context>\nwhere\n T: Packable<N = M>,\n{\n fn new(context: Context, storage_slot: Field) -> Self {\n assert(storage_slot != 0, \"Storage slot 0 not allowed. Storage slots must start from 1.\");\n PublicMutable { context, storage_slot }\n }\n\n fn get_storage_slot(self) -> Field {\n self.storage_slot\n }\n}\n\nimpl<T> PublicMutable<T, PublicContext> {\n /// Reads the current value stored in this PublicMutable state variable.\n ///\n /// # Returns\n ///\n /// * `T` - The current value stored in this PublicMutable.\n ///\n /// docs:start:public_mutable_struct_read\n pub fn read(self) -> T\n where\n T: Packable,\n {\n self.context.storage_read(self.storage_slot)\n }\n\n /// Writes a new value to this PublicMutable state variable.\n ///\n /// # Arguments\n ///\n /// * `value` - The new value to store in this PublicMutable.\n ///\n /// # Advanced\n ///\n /// This function updates the value stored in Aztec's public data tree.\n /// The new value becomes immediately available to subsequent reads within\n /// the same transaction.\n ///\n /// docs:start:public_mutable_struct_write\n pub fn write(self, value: T)\n where\n T: Packable,\n {\n self.context.storage_write(self.storage_slot, value);\n }\n}\n\nimpl<T> PublicMutable<T, UtilityContext> {\n /// Reads the current value stored in this PublicMutable state variable.\n ///\n /// Notice that this function is executable only within a UtilityContext, which\n /// is an unconstrained environment on the user's local device.\n ///\n /// # Returns\n ///\n /// * `T` - The current value stored in this PublicMutable.\n ///\n pub unconstrained fn read(self) -> T\n where\n T: Packable,\n {\n self.context.storage_read(self.storage_slot)\n }\n}\n"
|
|
3362
3362
|
},
|
|
3363
|
-
"
|
|
3363
|
+
"235": {
|
|
3364
3364
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/utils/array/append.nr",
|
|
3365
3365
|
"source": "/// Appends the elements of the second `BoundedVec` to the end of the first one. The resulting `BoundedVec` can have any arbitrary maximum length, but it must be\n/// large enough to fit all of the elements of both the first and second vectors.\npub fn append<T, let ALen: u32, let BLen: u32, let DstLen: u32>(\n a: BoundedVec<T, ALen>,\n b: BoundedVec<T, BLen>,\n) -> BoundedVec<T, DstLen> {\n let mut dst = BoundedVec::new();\n\n dst.extend_from_bounded_vec(a);\n dst.extend_from_bounded_vec(b);\n\n dst\n}\n\nmod test {\n use super::append;\n\n #[test]\n unconstrained fn append_empty_vecs() {\n let a: BoundedVec<_, 3> = BoundedVec::new();\n let b: BoundedVec<_, 14> = BoundedVec::new();\n\n let result: BoundedVec<Field, 5> = append(a, b);\n\n assert_eq(result.len(), 0);\n assert_eq(result.storage(), std::mem::zeroed());\n }\n\n #[test]\n unconstrained fn append_non_empty_vecs() {\n let a: BoundedVec<_, 3> = BoundedVec::from_array([1, 2, 3]);\n let b: BoundedVec<_, 14> = BoundedVec::from_array([4, 5, 6]);\n\n let result: BoundedVec<Field, 8> = append(a, b);\n\n assert_eq(result.len(), 6);\n assert_eq(result.storage(), [1, 2, 3, 4, 5, 6, std::mem::zeroed(), std::mem::zeroed()]);\n }\n\n #[test(should_fail_with = \"out of bounds\")]\n unconstrained fn append_non_empty_vecs_insufficient_max_len() {\n let a: BoundedVec<_, 3> = BoundedVec::from_array([1, 2, 3]);\n let b: BoundedVec<_, 14> = BoundedVec::from_array([4, 5, 6]);\n\n let _: BoundedVec<Field, 5> = append(a, b);\n }\n}\n"
|
|
3366
3366
|
},
|
|
3367
|
-
"
|
|
3367
|
+
"238": {
|
|
3368
3368
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/utils/array/subarray.nr",
|
|
3369
3369
|
"source": "/// Returns `DstLen` elements from a source array, starting at `offset`. `DstLen` must not be larger than the number\n/// of elements past `offset`.\n///\n/// Examples:\n/// ```\n/// let foo: [Field; 2] = subarray([1, 2, 3, 4, 5], 2);\n/// assert_eq(foo, [3, 4]);\n///\n/// let bar: [Field; 5] = subarray([1, 2, 3, 4, 5], 2); // fails - we can't return 5 elements since only 3 remain\n/// ```\npub fn subarray<T, let SrcLen: u32, let DstLen: u32>(src: [T; SrcLen], offset: u32) -> [T; DstLen] {\n assert(offset + DstLen <= SrcLen, \"DstLen too large for offset\");\n\n let mut dst: [T; DstLen] = std::mem::zeroed();\n for i in 0..DstLen {\n dst[i] = src[i + offset];\n }\n\n dst\n}\n\nmod test {\n use super::subarray;\n\n #[test]\n unconstrained fn subarray_into_empty() {\n // In all of these cases we're setting DstLen to be 0, so we always get back an empty array.\n assert_eq(subarray::<Field, _, _>([], 0), []);\n assert_eq(subarray([1, 2, 3, 4, 5], 0), []);\n assert_eq(subarray([1, 2, 3, 4, 5], 2), []);\n }\n\n #[test]\n unconstrained fn subarray_complete() {\n assert_eq(subarray::<Field, _, _>([], 0), []);\n assert_eq(subarray([1, 2, 3, 4, 5], 0), [1, 2, 3, 4, 5]);\n }\n\n #[test]\n unconstrained fn subarray_different_end_sizes() {\n // We implicitly select how many values to read in the size of the return array\n assert_eq(subarray([1, 2, 3, 4, 5], 1), [2, 3, 4, 5]);\n assert_eq(subarray([1, 2, 3, 4, 5], 1), [2, 3, 4]);\n assert_eq(subarray([1, 2, 3, 4, 5], 1), [2, 3]);\n assert_eq(subarray([1, 2, 3, 4, 5], 1), [2]);\n }\n\n #[test(should_fail_with = \"DstLen too large for offset\")]\n unconstrained fn subarray_offset_too_large() {\n // With an offset of 1 we can only request up to 4 elements\n let _: [_; 5] = subarray([1, 2, 3, 4, 5], 1);\n }\n\n #[test(should_fail)]\n unconstrained fn subarray_bad_return_value() {\n assert_eq(subarray([1, 2, 3, 4, 5], 1), [3, 3, 4, 5]);\n }\n}\n"
|
|
3370
3370
|
},
|
|
3371
|
-
"
|
|
3371
|
+
"239": {
|
|
3372
3372
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/utils/array/subbvec.nr",
|
|
3373
3373
|
"source": "use crate::utils::array;\n\n/// Returns `DstMaxLen` elements from a source BoundedVec, starting at `offset`. `offset` must not be larger than the\n/// original length, and `DstLen` must not be larger than the total number of elements past `offset` (including the\n/// zeroed elements past `len()`).\n///\n/// Only elements at the beginning of the vector can be removed: it is not possible to also remove elements at the end\n/// of the vector by passing a value for `DstLen` that is smaller than `len() - offset`.\n///\n/// Examples:\n/// ```\n/// let foo = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n/// assert_eq(subbvec(foo, 2), BoundedVec::<_, 8>::from_array([3, 4, 5]));\n///\n/// let bar: BoundedVec<_, 1> = subbvec(foo, 2); // fails - we can't return just 1 element since 3 remain\n/// let baz: BoundedVec<_, 10> = subbvec(foo, 3); // fails - we can't return 10 elements since only 7 remain\n/// ```\npub fn subbvec<T, let SrcMaxLen: u32, let DstMaxLen: u32>(\n bvec: BoundedVec<T, SrcMaxLen>,\n offset: u32,\n) -> BoundedVec<T, DstMaxLen> {\n // from_parts_unchecked does not verify that the elements past len are zeroed, but that is not an issue in our case\n // because we're constructing the new storage array as a subarray of the original one (which should have zeroed\n // storage past len), guaranteeing correctness. This is because `subarray` does not allow extending arrays past\n // their original length.\n BoundedVec::from_parts_unchecked(array::subarray(bvec.storage(), offset), bvec.len() - offset)\n}\n\nmod test {\n use super::subbvec;\n\n #[test]\n unconstrained fn subbvec_empty() {\n let bvec = BoundedVec::<Field, 0>::from_array([]);\n assert_eq(subbvec(bvec, 0), bvec);\n }\n\n #[test]\n unconstrained fn subbvec_complete() {\n let bvec = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n assert_eq(subbvec(bvec, 0), bvec);\n\n let smaller_capacity = BoundedVec::<_, 5>::from_array([1, 2, 3, 4, 5]);\n assert_eq(subbvec(bvec, 0), smaller_capacity);\n }\n\n #[test]\n unconstrained fn subbvec_partial() {\n let bvec = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n\n assert_eq(subbvec(bvec, 2), BoundedVec::<_, 8>::from_array([3, 4, 5]));\n assert_eq(subbvec(bvec, 2), BoundedVec::<_, 3>::from_array([3, 4, 5]));\n }\n\n #[test]\n unconstrained fn subbvec_into_empty() {\n let bvec: BoundedVec<_, 10> = BoundedVec::from_array([1, 2, 3, 4, 5]);\n assert_eq(subbvec(bvec, 5), BoundedVec::<_, 5>::from_array([]));\n }\n\n #[test(should_fail)]\n unconstrained fn subbvec_offset_past_len() {\n let bvec = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n let _: BoundedVec<_, 1> = subbvec(bvec, 6);\n }\n\n #[test(should_fail)]\n unconstrained fn subbvec_insufficient_dst_len() {\n let bvec = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n\n // We're not providing enough space to hold all of the items inside the original BoundedVec. subbvec can cause\n // for the capacity to reduce, but not the length (other than by len - offset).\n let _: BoundedVec<_, 1> = subbvec(bvec, 2);\n }\n\n #[test(should_fail_with = \"DstLen too large for offset\")]\n unconstrained fn subbvec_dst_len_causes_enlarge() {\n let bvec = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n\n // subbvec does not support capacity increases\n let _: BoundedVec<_, 11> = subbvec(bvec, 0);\n }\n\n #[test(should_fail_with = \"DstLen too large for offset\")]\n unconstrained fn subbvec_dst_len_too_large_for_offset() {\n let bvec = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n\n // This effectively requests a capacity increase, since there'd be just one element plus the 5 empty slots,\n // which is less than 7.\n let _: BoundedVec<_, 7> = subbvec(bvec, 4);\n }\n}\n"
|
|
3374
3374
|
},
|
|
3375
|
-
"
|
|
3375
|
+
"241": {
|
|
3376
3376
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/utils/conversion/bytes_to_fields.nr",
|
|
3377
3377
|
"source": "use std::static_assert;\n\n// These functions are used to facilitate the conversion of log ciphertext between byte and field representations.\n//\n// `bytes_to_fields` uses fixed-size arrays since encryption contexts have compile-time size information.\n// `bytes_from_fields` uses BoundedVec for flexibility in unconstrained contexts where sizes are dynamic.\n//\n// Together they provide bidirectional conversion between bytes and fields when processing encrypted logs.\n\n/// Converts the input bytes into an array of fields. A Field is ~254 bits meaning that each field can store 31 whole\n/// bytes. Use `bytes_from_fields` to obtain the original bytes array.\n///\n/// The input bytes are chunked into chunks of 31 bytes. Each 31-byte chunk is viewed as big-endian, and is converted\n/// into a Field.\n/// For example, [1, 10, 3, ..., 0] (31 bytes) is encoded as [1 * 256^30 + 10 * 256^29 + 3 * 256^28 + ... + 0]\n/// Note: N must be a multiple of 31 bytes\npub fn bytes_to_fields<let N: u32>(bytes: [u8; N]) -> [Field; N / 31] {\n // Assert that N is a multiple of 31\n static_assert(N % 31 == 0, \"N must be a multiple of 31\");\n\n let mut fields = [0; N / 31];\n\n // Since N is a multiple of 31, we can simply process all chunks fully\n for i in 0..N / 31 {\n let mut field = 0;\n for j in 0..31 {\n // Shift the existing value left by 8 bits and add the new byte\n field = field * 256 + bytes[i * 31 + j] as Field;\n }\n fields[i] = field;\n }\n\n fields\n}\n\n/// Converts an input BoundedVec of fields into a BoundedVec of bytes in big-endian order. Arbitrary Field arrays\n/// are not allowed: this is assumed to be an array obtained via `bytes_to_fields`, i.e. one that actually represents\n/// bytes. To convert a Field array into bytes, use `fields_to_bytes`.\n///\n/// Each input field must contain at most 31 bytes (this is constrained to be so).\n/// Each field is converted into 31 big-endian bytes, and the resulting 31-byte chunks are concatenated\n/// back together in the order of the original fields.\npub fn bytes_from_fields<let N: u32>(fields: BoundedVec<Field, N>) -> BoundedVec<u8, N * 31> {\n let mut bytes = BoundedVec::new();\n\n for i in 0..fields.len() {\n let field = fields.get(i);\n\n // We expect that the field contains at most 31 bytes of information.\n field.assert_max_bit_size::<248>();\n\n // Now we can safely convert the field to 31 bytes.\n let field_as_bytes: [u8; 31] = field.to_be_bytes();\n\n for j in 0..31 {\n bytes.push(field_as_bytes[j]);\n }\n }\n\n bytes\n}\n\nmod tests {\n use crate::utils::array::subarray;\n use super::{bytes_from_fields, bytes_to_fields};\n\n #[test]\n unconstrained fn random_bytes_to_fields_and_back(input: [u8; 93]) {\n let fields = bytes_to_fields(input);\n\n // At this point in production, the log flies through the system and we get a BoundedVec on the other end.\n // So we need to convert the field array to a BoundedVec to be able to feed it to the `bytes_from_fields`\n // function.\n let fields_as_bounded_vec = BoundedVec::<_, 6>::from_array(fields);\n\n let bytes_back = bytes_from_fields(fields_as_bounded_vec);\n\n // Compare the original input with the round-tripped result\n assert_eq(bytes_back.len(), input.len());\n assert_eq(subarray(bytes_back.storage(), 0), input);\n }\n\n #[test(should_fail_with = \"N must be a multiple of 31\")]\n unconstrained fn bytes_to_fields_input_length_not_multiple_of_31() {\n // Try to convert 32 bytes (not a multiple of 31) to fields\n let _fields = bytes_to_fields([0; 32]);\n }\n\n}\n"
|
|
3378
3378
|
},
|
|
3379
|
-
"
|
|
3379
|
+
"242": {
|
|
3380
3380
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/utils/conversion/fields_to_bytes.nr",
|
|
3381
3381
|
"source": "// These functions are used to facilitate the conversion of log plaintext represented as fields into bytes and back.\n//\n// `fields_to_bytes` uses fixed-size arrays since encryption contexts have compile-time size information.\n// `fields_from_bytes` uses BoundedVec for flexibility in unconstrained contexts where sizes are dynamic.\n//\n// Together they provide bidirectional conversion between fields and bytes.\n\n/// Converts an input array of fields into a single array of bytes. Use `fields_from_bytes` to obtain the original\n/// field array.\n/// Each field is converted to a 32-byte big-endian array.\n///\n/// For example, if you have a field array [123, 456], it will be converted to a 64-byte array:\n/// [0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,123, // First field (32 bytes)\n/// 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,200] // Second field (32 bytes)\n///\n/// Since a field is ~254 bits, you'll end up with a subtle 2-bit \"gap\" at the big end, every 32 bytes. Be careful\n/// that such a gap doesn't leak information! This could happen if you for example expected the output to be\n/// indistinguishable from random bytes.\npub fn fields_to_bytes<let N: u32>(fields: [Field; N]) -> [u8; 32 * N] {\n let mut bytes = [0; 32 * N];\n\n for i in 0..N {\n let field_as_bytes: [u8; 32] = fields[i].to_be_bytes();\n\n for j in 0..32 {\n bytes[i * 32 + j] = field_as_bytes[j];\n }\n }\n\n bytes\n}\n\n/// Converts an input BoundedVec of bytes into a BoundedVec of fields. Arbitrary byte arrays are not allowed: this\n/// is assumed to be an array obtained via `fields_to_bytes`, i.e. one that actually represents fields. To convert\n/// a byte array into Fields, use `bytes_to_fields`.\n///\n/// The input bytes are chunked into chunks of 32 bytes. Each 32-byte chunk is viewed as big-endian, and is converted\n/// into a Field.\n/// For example, [1, 10, 3, ..., 0] (32 bytes) is encoded as [1 * 256^31 + 10 * 256^30 + 3 * 256^29 + ... + 0]\n/// Note 1: N must be a multiple of 32 bytes\n/// Note 2: The max value check code was taken from std::field::to_be_bytes function.\npub fn fields_from_bytes<let N: u32>(bytes: BoundedVec<u8, N>) -> BoundedVec<Field, N / 32> {\n // Assert that input length is a multiple of 32\n assert(bytes.len() % 32 == 0, \"Input length must be a multiple of 32\");\n\n let mut fields = BoundedVec::new();\n\n let p = std::field::modulus_be_bytes();\n\n // Since input length is a multiple of 32, we can simply process all chunks fully\n for i in 0..bytes.len() / 32 {\n let mut field = 0;\n\n // Process each byte in the 32-byte chunk\n let mut ok = false;\n\n for j in 0..32 {\n let next_byte = bytes.get(i * 32 + j);\n field = field * 256 + next_byte as Field;\n\n if !ok {\n if next_byte != p[j] {\n assert(next_byte < p[j], \"Value does not fit in field\");\n ok = true;\n }\n }\n }\n assert(ok, \"Value does not fit in field\");\n\n fields.push(field);\n }\n\n fields\n}\n\nmod tests {\n use crate::utils::array::subarray;\n use super::{fields_from_bytes, fields_to_bytes};\n\n #[test]\n unconstrained fn random_fields_to_bytes_and_back(input: [Field; 3]) {\n // Convert to bytes\n let bytes = fields_to_bytes(input);\n\n // At this point in production, the log flies through the system and we get a BoundedVec on the other end.\n // So we need to convert the field array to a BoundedVec to be able to feed it to the `fields_from_bytes`\n // function.\n // 113 is an arbitrary max length that is larger than the input length of 96.\n let bytes_as_bounded_vec = BoundedVec::<_, 113>::from_array(bytes);\n\n // Convert back to fields\n let fields_back = fields_from_bytes(bytes_as_bounded_vec);\n\n // Compare the original input with the round-tripped result\n assert_eq(fields_back.len(), input.len());\n assert_eq(subarray(fields_back.storage(), 0), input);\n }\n\n #[test(should_fail_with = \"Input length must be a multiple of 32\")]\n unconstrained fn to_fields_assert() {\n // 143 is an arbitrary max length that is larger than 33\n let input = BoundedVec::<_, 143>::from_array([\n 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24,\n 25, 26, 27, 28, 29, 30, 31, 32, 33,\n ]);\n\n // This should fail since 33 is not a multiple of 32\n let _fields = fields_from_bytes(input);\n }\n\n #[test]\n unconstrained fn fields_from_bytes_max_value() {\n let max_field_as_bytes: [u8; 32] = (-1).to_be_bytes();\n let input = BoundedVec::<_, 32>::from_array(max_field_as_bytes);\n\n let fields = fields_from_bytes(input);\n\n // The result should be a largest value storable in a field (-1 since we are modulo-ing)\n assert_eq(fields.get(0), -1);\n }\n\n // In this test we verify that overflow check works by taking the max allowed value, bumping a random byte\n // and then feeding it to `fields_from_bytes` as input.\n #[test(should_fail_with = \"Value does not fit in field\")]\n unconstrained fn fields_from_bytes_overflow(random_value: u8) {\n let index_of_byte_to_bump = random_value % 32;\n\n // Obtain the byte representation of the maximum field value\n let max_field_value_as_bytes: [u8; 32] = (-1).to_be_bytes();\n\n let byte_to_bump = max_field_value_as_bytes[index_of_byte_to_bump as u32];\n\n // Skip test execution if the selected byte is already at maximum value (255).\n // This is acceptable since we are using fuzz testing to generate many test cases.\n if byte_to_bump != 255 {\n let mut input = BoundedVec::<_, 32>::from_array(max_field_value_as_bytes);\n\n // Increment the selected byte to exceed the field's maximum value\n input.set(index_of_byte_to_bump as u32, byte_to_bump + 1);\n\n // Attempt the conversion, which should fail due to the value exceeding the field's capacity\n let _fields = fields_from_bytes(input);\n }\n }\n\n}\n"
|
|
3382
3382
|
},
|
|
3383
|
-
"
|
|
3383
|
+
"245": {
|
|
3384
3384
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/utils/point.nr",
|
|
3385
3385
|
"source": "use protocol_types::{point::Point, utils::field::sqrt};\n\n// I am storing the modulus minus 1 divided by 2 here because full modulus would throw \"String literal too large\" error\n// Full modulus is 21888242871839275222246405745257275088548364400416034343698204186575808495617\nglobal BN254_FR_MODULUS_DIV_2: Field =\n 10944121435919637611123202872628637544274182200208017171849102093287904247808;\n\n/**\n * Returns: true if p.y <= MOD_DIV_2, else false.\n */\npub fn get_sign_of_point(p: Point) -> bool {\n // We store only a \"sign\" of the y coordinate because the rest can be derived from the x coordinate. To get\n // the sign we check if the y coordinate is less or equal than the field's modulus minus 1 divided by 2.\n // Ideally we'd do `y <= MOD_DIV_2`, but there's no `lte` function, so instead we do `!(y > MOD_DIV_2)`, which is\n // equivalent, and then rewrite that as `!(MOD_DIV_2 < y)`, since we also have no `gt` function.\n !BN254_FR_MODULUS_DIV_2.lt(p.y)\n}\n\n/// Returns a `Point` in the Grumpkin curve given its x coordinate.\n///\n/// Because not all values in the field are valid x coordinates of points in the curve (i.e. there\n/// is no corresponding y value in the field that satisfies the curve equation), it may not be\n/// possible to reconstruct a `Point`. `Option::none()` is returned in such cases.\npub fn point_from_x_coord(x: Field) -> Option<Point> {\n // y ^ 2 = x ^ 3 - 17\n let rhs = x * x * x - 17;\n sqrt(rhs).map(|y| Point { x, y, is_infinite: false })\n}\n\n/// Returns a `Point` in the Grumpkin curve given its x coordinate and sign for the y coordinate.\n///\n/// Because not all values in the field are valid x coordinates of points in the curve (i.e. there\n/// is no corresponding y value in the field that satisfies the curve equation), it may not be\n/// possible to reconstruct a `Point`. `Option::none()` is returned in such cases.\n///\n/// @param x - The x coordinate of the point\n/// @param sign - The \"sign\" of the y coordinate - determines whether y <= (Fr.MODULUS - 1) / 2\npub fn point_from_x_coord_and_sign(x: Field, sign: bool) -> Option<Point> {\n // y ^ 2 = x ^ 3 - 17\n let rhs = x * x * x - 17;\n\n sqrt(rhs).map(|y| {\n // If there is a square root, we need to ensure it has the correct \"sign\"\n let y_is_positive = !BN254_FR_MODULUS_DIV_2.lt(y);\n let final_y = if y_is_positive == sign { y } else { -y };\n Point { x, y: final_y, is_infinite: false }\n })\n}\n\nmod test {\n use crate::utils::point::{\n BN254_FR_MODULUS_DIV_2, get_sign_of_point, point_from_x_coord, point_from_x_coord_and_sign,\n };\n use dep::protocol_types::point::Point;\n\n #[test]\n unconstrained fn test_point_from_x_coord_and_sign() {\n // Test positive y coordinate\n let x = 0x1af41f5de96446dc3776a1eb2d98bb956b7acd9979a67854bec6fa7c2973bd73;\n let sign = true;\n let p = point_from_x_coord_and_sign(x, sign).unwrap();\n\n assert_eq(p.x, x);\n assert_eq(p.y, 0x07fc22c7f2c7057571f137fe46ea9c95114282bc95d37d71ec4bfb88de457d4a);\n assert_eq(p.is_infinite, false);\n\n // Test negative y coordinate\n let x2 = 0x247371652e55dd74c9af8dbe9fb44931ba29a9229994384bd7077796c14ee2b5;\n let sign2 = false;\n let p2 = point_from_x_coord_and_sign(x2, sign2).unwrap();\n\n assert_eq(p2.x, x2);\n assert_eq(p2.y, 0x26441aec112e1ae4cee374f42556932001507ad46e255ffb27369c7e3766e5c0);\n assert_eq(p2.is_infinite, false);\n }\n\n #[test]\n unconstrained fn test_point_from_x_coord_valid() {\n // x = 8 is a known quadratic residue - should give a valid point\n let result = point_from_x_coord(Field::from(8));\n assert(result.is_some());\n\n let point = result.unwrap();\n assert_eq(point.x, Field::from(8));\n // Check curve equation y^2 = x^3 - 17\n assert_eq(point.y * point.y, point.x * point.x * point.x - 17);\n }\n\n #[test]\n unconstrained fn test_point_from_x_coord_invalid() {\n // x = 3 is a non-residue for this curve - should give None\n let x = Field::from(3);\n let maybe_point = point_from_x_coord(x);\n assert(maybe_point.is_none());\n }\n\n #[test]\n unconstrained fn test_both_roots_satisfy_curve() {\n // Derive a point from x = 8 (known to be valid from test_point_from_x_coord_valid)\n let x: Field = 8;\n let point = point_from_x_coord(x).unwrap();\n\n // Check y satisfies curve equation\n assert_eq(point.y * point.y, x * x * x - 17);\n\n // Check -y also satisfies curve equation\n let neg_y = 0 - point.y;\n assert_eq(neg_y * neg_y, x * x * x - 17);\n\n // Verify they are different (unless y = 0)\n assert(point.y != neg_y);\n }\n\n #[test]\n unconstrained fn test_point_from_x_coord_and_sign_invalid() {\n // x = 3 has no valid point on the curve (from test_point_from_x_coord_invalid)\n let x = Field::from(3);\n let result_positive = point_from_x_coord_and_sign(x, true);\n let result_negative = point_from_x_coord_and_sign(x, false);\n\n assert(result_positive.is_none());\n assert(result_negative.is_none());\n }\n\n #[test]\n unconstrained fn test_get_sign_of_point() {\n // Derive a point from x = 8, then test both possible y values\n let point = point_from_x_coord(8).unwrap();\n let neg_point = Point { x: point.x, y: 0 - point.y, is_infinite: false };\n\n // One should be \"positive\" (y <= MOD_DIV_2) and one \"negative\"\n let sign1 = get_sign_of_point(point);\n let sign2 = get_sign_of_point(neg_point);\n assert(sign1 != sign2);\n\n // y = 0 should return true (0 <= MOD_DIV_2)\n let zero_y_point = Point { x: 0, y: 0, is_infinite: false };\n assert(get_sign_of_point(zero_y_point) == true);\n\n // y = MOD_DIV_2 should return true (exactly at boundary)\n let boundary_point = Point { x: 0, y: BN254_FR_MODULUS_DIV_2, is_infinite: false };\n assert(get_sign_of_point(boundary_point) == true);\n\n // y = MOD_DIV_2 + 1 should return false (just over boundary)\n let over_boundary_point = Point { x: 0, y: BN254_FR_MODULUS_DIV_2 + 1, is_infinite: false };\n assert(get_sign_of_point(over_boundary_point) == false);\n }\n\n #[test]\n unconstrained fn test_point_from_x_coord_zero() {\n // x = 0: y^2 = 0^3 - 17 = -17, which is not a quadratic residue in BN254 scalar field\n let result = point_from_x_coord(0);\n assert(result.is_none());\n }\n\n #[test]\n unconstrained fn test_bn254_fr_modulus_div_2() {\n // Verify that BN254_FR_MODULUS_DIV_2 == (p - 1) / 2\n // This means: 2 * BN254_FR_MODULUS_DIV_2 + 1 == p == 0 (in the field)\n assert_eq(2 * BN254_FR_MODULUS_DIV_2 + 1, 0);\n }\n\n}\n"
|
|
3386
3386
|
},
|
|
3387
|
-
"
|
|
3387
|
+
"256": {
|
|
3388
3388
|
"path": "/home/aztec-dev/nargo/github.com/noir-lang/poseidon/v0.2.2/src/poseidon2.nr",
|
|
3389
3389
|
"source": "use std::default::Default;\nuse std::hash::Hasher;\n\ncomptime global RATE: u32 = 3;\n\npub struct Poseidon2 {\n cache: [Field; 3],\n state: [Field; 4],\n cache_size: u32,\n squeeze_mode: bool, // 0 => absorb, 1 => squeeze\n}\n\nimpl Poseidon2 {\n #[no_predicates]\n pub fn hash<let N: u32>(input: [Field; N], message_size: u32) -> Field {\n Poseidon2::hash_internal(input, message_size)\n }\n\n pub(crate) fn new(iv: Field) -> Poseidon2 {\n let mut result =\n Poseidon2 { cache: [0; 3], state: [0; 4], cache_size: 0, squeeze_mode: false };\n result.state[RATE] = iv;\n result\n }\n\n fn perform_duplex(&mut self) {\n // add the cache into sponge state\n self.state[0] += self.cache[0];\n self.state[1] += self.cache[1];\n self.state[2] += self.cache[2];\n self.state = crate::poseidon2_permutation(self.state, 4);\n }\n\n fn absorb(&mut self, input: Field) {\n assert(!self.squeeze_mode);\n if self.cache_size == RATE {\n // If we're absorbing, and the cache is full, apply the sponge permutation to compress the cache\n self.perform_duplex();\n self.cache[0] = input;\n self.cache_size = 1;\n } else {\n // If we're absorbing, and the cache is not full, add the input into the cache\n self.cache[self.cache_size] = input;\n self.cache_size += 1;\n }\n }\n\n fn squeeze(&mut self) -> Field {\n assert(!self.squeeze_mode);\n // If we're in absorb mode, apply sponge permutation to compress the cache.\n self.perform_duplex();\n self.squeeze_mode = true;\n\n // Pop one item off the top of the permutation and return it.\n self.state[0]\n }\n\n fn hash_internal<let N: u32>(input: [Field; N], in_len: u32) -> Field {\n let two_pow_64 = 18446744073709551616;\n let iv: Field = (in_len as Field) * two_pow_64;\n let mut state = [0; 4];\n state[RATE] = iv;\n\n if std::runtime::is_unconstrained() {\n for i in 0..(in_len / RATE) {\n state[0] += input[i * RATE];\n state[1] += input[i * RATE + 1];\n state[2] += input[i * RATE + 2];\n state = crate::poseidon2_permutation(state, 4);\n }\n\n // handle remaining elements after last full RATE-sized chunk\n let remainder_start = (in_len / RATE) * RATE;\n for j in remainder_start..in_len {\n state[j - remainder_start] += input[j];\n }\n } else {\n let mut states: [[Field; 4]; N / RATE + 1] = [[0; 4]; N / RATE + 1];\n states[0] = state;\n\n // process all full RATE-sized chunks, storing state after each permutation\n for chunk_idx in 0..(N / RATE) {\n for i in 0..RATE {\n state[i] += input[chunk_idx * RATE + i];\n }\n state = crate::poseidon2_permutation(state, 4);\n states[chunk_idx + 1] = state;\n }\n\n // get state at the last full block before in_len\n let first_partially_filled_chunk = in_len / RATE;\n state = states[first_partially_filled_chunk];\n\n // handle remaining elements after last full RATE-sized chunk\n let remainder_start = (in_len / RATE) * RATE;\n for j in 0..RATE {\n let idx = remainder_start + j;\n if idx < in_len {\n state[j] += input[idx];\n }\n }\n }\n\n // always run final permutation unless we just completed a full chunk\n // still need to permute once if in_len is 0\n if (in_len == 0) | (in_len % RATE != 0) {\n state = crate::poseidon2_permutation(state, 4)\n };\n\n state[0]\n }\n}\n\npub struct Poseidon2Hasher {\n _state: [Field],\n}\n\nimpl Hasher for Poseidon2Hasher {\n fn finish(self) -> Field {\n let iv: Field = (self._state.len() as Field) * 18446744073709551616; // iv = (self._state.len() << 64)\n let mut sponge = Poseidon2::new(iv);\n for i in 0..self._state.len() {\n sponge.absorb(self._state[i]);\n }\n sponge.squeeze()\n }\n\n fn write(&mut self, input: Field) {\n self._state = self._state.push_back(input);\n }\n}\n\nimpl Default for Poseidon2Hasher {\n fn default() -> Self {\n Poseidon2Hasher { _state: &[] }\n }\n}\n"
|
|
3390
3390
|
},
|
|
3391
|
-
"
|
|
3391
|
+
"267": {
|
|
3392
3392
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/abis/block_header.nr",
|
|
3393
3393
|
"source": "use crate::{\n abis::{\n append_only_tree_snapshot::AppendOnlyTreeSnapshot, global_variables::GlobalVariables,\n state_reference::StateReference,\n },\n constants::{BLOCK_HEADER_LENGTH, DOM_SEP__BLOCK_HASH, GENESIS_BLOCK_HEADER_HASH},\n hash::poseidon2_hash_with_separator,\n traits::{Deserialize, Empty, Hash, Serialize},\n};\nuse std::meta::derive;\n\n// docs:start:block-header\n#[derive(Deserialize, Eq, Serialize)]\npub struct BlockHeader {\n pub last_archive: AppendOnlyTreeSnapshot,\n pub state: StateReference,\n\n // The hash of the sponge blob for this block, which commits to the tx effects added in this block.\n // Note: it may also include tx effects from previous blocks within the same checkpoint.\n // When proving tx effects from this block only, we must refer to the `sponge_blob_hash` in the previous block\n // header to show that the effect was added after the previous block.\n // The previous block header can be validated using a membership proof of the last leaf in `last_archive`.\n pub sponge_blob_hash: Field,\n\n pub global_variables: GlobalVariables,\n pub total_fees: Field,\n pub total_mana_used: Field,\n}\n// docs:end:block-header\n\nimpl Empty for BlockHeader {\n fn empty() -> Self {\n Self {\n last_archive: AppendOnlyTreeSnapshot::empty(),\n state: StateReference::empty(),\n sponge_blob_hash: 0,\n global_variables: GlobalVariables::empty(),\n total_fees: 0,\n total_mana_used: 0,\n }\n }\n}\n\nimpl Hash for BlockHeader {\n fn hash(self) -> Field {\n poseidon2_hash_with_separator(self.serialize(), DOM_SEP__BLOCK_HASH)\n }\n}\n\n#[test]\nfn serialization_of_empty() {\n let header = BlockHeader::empty();\n // We use the BLOCK_HEADER_LENGTH constant to ensure that there is a match\n // between the derived trait implementation and the constant.\n let serialized: [Field; BLOCK_HEADER_LENGTH] = header.serialize();\n let deserialized = BlockHeader::deserialize(serialized);\n assert(header.eq(deserialized));\n}\n\n#[test]\nfn hash_of_genesis_block_header() {\n let mut header = BlockHeader::empty();\n // The following values are taken from world_state.test.cpp > WorldStateTest.GetInitialTreeInfoForAllTrees.\n header.state.l1_to_l2_message_tree.root =\n 0x0d582c10ff8115413aa5b70564fdd2f3cefe1f33a1e43a47bc495081e91e73e5;\n header.state.partial.note_hash_tree.root =\n 0x2ac5dda169f6bb3b9ca09bbac34e14c94d1654597db740153a1288d859a8a30a;\n header.state.partial.nullifier_tree.root =\n 0x1ec3788cd1c32e54d889d67fe29e481114f9d4afe9b44b229aa29d8ad528dd31;\n header.state.partial.nullifier_tree.next_available_leaf_index = 128;\n header.state.partial.public_data_tree.root =\n 0x23c08a6b1297210c5e24c76b9a936250a1ce2721576c26ea797c7ec35f9e46a9;\n header.state.partial.public_data_tree.next_available_leaf_index = 128;\n\n let hash = header.hash();\n assert_eq(hash, GENESIS_BLOCK_HEADER_HASH);\n}\n\n#[test]\nfn hash_of_empty_block_header_match_typescript() {\n let header = BlockHeader::empty();\n let hash = header.hash();\n\n // Value from header.test.ts \"computes empty hash\" test\n let test_data_empty_hash = 0x2c920b5fcfe68d413eab3e0022eb918d64d62ca44d195d5c32b8b9c68bff2dfe;\n assert_eq(hash, test_data_empty_hash);\n}\n"
|
|
3394
3394
|
},
|
|
@@ -3396,47 +3396,47 @@
|
|
|
3396
3396
|
"path": "std/array/mod.nr",
|
|
3397
3397
|
"source": "use crate::cmp::{Eq, Ord};\nuse crate::convert::From;\nuse crate::runtime::is_unconstrained;\n\nmod check_shuffle;\nmod quicksort;\n\nimpl<T, let N: u32> [T; N] {\n /// Returns the length of this array.\n ///\n /// ```noir\n /// fn len(self) -> Field\n /// ```\n ///\n /// example\n ///\n /// ```noir\n /// fn main() {\n /// let array = [42, 42];\n /// assert(array.len() == 2);\n /// }\n /// ```\n #[builtin(array_len)]\n pub fn len(self) -> u32 {}\n\n /// Returns this array as a vector.\n ///\n /// ```noir\n /// let array = [1, 2];\n /// let vector = array.as_vector();\n /// assert_eq(vector, [1, 2].as_vector());\n /// ```\n #[builtin(as_vector)]\n pub fn as_vector(self) -> [T] {}\n\n /// Returns this array as a vector.\n /// This method is deprecated in favor of `as_vector`.\n ///\n /// ```noir\n /// let array = [1, 2];\n /// let vector = array.as_slice();\n /// assert_eq(vector, [1, 2].as_vector());\n /// ```\n #[builtin(as_vector)]\n #[deprecated(\"This method has been renamed to `as_vector`\")]\n pub fn as_slice(self) -> [T] {}\n\n /// Applies a function to each element of this array, returning a new array containing the mapped elements.\n ///\n /// Example:\n ///\n /// ```rust\n /// let a = [1, 2, 3];\n /// let b = a.map(|a| a * 2);\n /// assert_eq(b, [2, 4, 6]);\n /// ```\n pub fn map<U, Env>(self, f: fn[Env](T) -> U) -> [U; N] {\n let uninitialized = crate::mem::zeroed();\n let mut ret = [uninitialized; N];\n\n for i in 0..self.len() {\n ret[i] = f(self[i]);\n }\n\n ret\n }\n\n /// Applies a function to each element of this array along with its index,\n /// returning a new array containing the mapped elements.\n ///\n /// Example:\n ///\n /// ```rust\n /// let a = [1, 2, 3];\n /// let b = a.mapi(|i, a| i + a * 2);\n /// assert_eq(b, [2, 5, 8]);\n /// ```\n pub fn mapi<U, Env>(self, f: fn[Env](u32, T) -> U) -> [U; N] {\n let uninitialized = crate::mem::zeroed();\n let mut ret = [uninitialized; N];\n\n for i in 0..self.len() {\n ret[i] = f(i, self[i]);\n }\n\n ret\n }\n\n /// Applies a function to each element of this array.\n ///\n /// Example:\n ///\n /// ```rust\n /// let a = [1, 2, 3];\n /// let mut b = [0; 3];\n /// let mut i = 0;\n /// a.for_each(|x| {\n /// b[i] = x;\n /// i += 1;\n /// });\n /// assert_eq(a, b);\n /// ```\n pub fn for_each<Env>(self, f: fn[Env](T) -> ()) {\n for i in 0..self.len() {\n f(self[i]);\n }\n }\n\n /// Applies a function to each element of this array along with its index.\n ///\n /// Example:\n ///\n /// ```rust\n /// let a = [1, 2, 3];\n /// let mut b = [0; 3];\n /// a.for_eachi(|i, x| {\n /// b[i] = x;\n /// });\n /// assert_eq(a, b);\n /// ```\n pub fn for_eachi<Env>(self, f: fn[Env](u32, T) -> ()) {\n for i in 0..self.len() {\n f(i, self[i]);\n }\n }\n\n /// Applies a function to each element of the array, returning the final accumulated value. The first\n /// parameter is the initial value.\n ///\n /// This is a left fold, so the given function will be applied to the accumulator and first element of\n /// the array, then the second, and so on. For a given call the expected result would be equivalent to:\n ///\n /// ```rust\n /// let a1 = [1];\n /// let a2 = [1, 2];\n /// let a3 = [1, 2, 3];\n ///\n /// let f = |a, b| a - b;\n /// a1.fold(10, f); //=> f(10, 1)\n /// a2.fold(10, f); //=> f(f(10, 1), 2)\n /// a3.fold(10, f); //=> f(f(f(10, 1), 2), 3)\n ///\n /// assert_eq(a3.fold(10, f), 10 - 1 - 2 - 3);\n /// ```\n pub fn fold<U, Env>(self, mut accumulator: U, f: fn[Env](U, T) -> U) -> U {\n for elem in self {\n accumulator = f(accumulator, elem);\n }\n accumulator\n }\n\n /// Same as fold, but uses the first element as the starting element.\n ///\n /// Requires the input array to be non-empty.\n ///\n /// Example:\n ///\n /// ```noir\n /// fn main() {\n /// let arr = [1, 2, 3, 4];\n /// let reduced = arr.reduce(|a, b| a + b);\n /// assert(reduced == 10);\n /// }\n /// ```\n pub fn reduce<Env>(self, f: fn[Env](T, T) -> T) -> T {\n let mut accumulator = self[0];\n for i in 1..self.len() {\n accumulator = f(accumulator, self[i]);\n }\n accumulator\n }\n\n /// Returns true if all the elements in this array satisfy the given predicate.\n ///\n /// Example:\n ///\n /// ```noir\n /// fn main() {\n /// let arr = [2, 2, 2, 2, 2];\n /// let all = arr.all(|a| a == 2);\n /// assert(all);\n /// }\n /// ```\n pub fn all<Env>(self, predicate: fn[Env](T) -> bool) -> bool {\n let mut ret = true;\n for elem in self {\n ret &= predicate(elem);\n }\n ret\n }\n\n /// Returns true if any of the elements in this array satisfy the given predicate.\n ///\n /// Example:\n ///\n /// ```noir\n /// fn main() {\n /// let arr = [2, 2, 2, 2, 5];\n /// let any = arr.any(|a| a == 5);\n /// assert(any);\n /// }\n /// ```\n pub fn any<Env>(self, predicate: fn[Env](T) -> bool) -> bool {\n let mut ret = false;\n for elem in self {\n ret |= predicate(elem);\n }\n ret\n }\n\n /// Concatenates this array with another array.\n ///\n /// Example:\n ///\n /// ```noir\n /// fn main() {\n /// let arr1 = [1, 2, 3, 4];\n /// let arr2 = [6, 7, 8, 9, 10, 11];\n /// let concatenated_arr = arr1.concat(arr2);\n /// assert(concatenated_arr == [1, 2, 3, 4, 6, 7, 8, 9, 10, 11]);\n /// }\n /// ```\n pub fn concat<let M: u32>(self, array2: [T; M]) -> [T; N + M] {\n let mut result = [crate::mem::zeroed(); N + M];\n for i in 0..N {\n result[i] = self[i];\n }\n for i in 0..M {\n result[i + N] = array2[i];\n }\n result\n }\n}\n\nimpl<T, let N: u32> [T; N]\nwhere\n T: Ord + Eq,\n{\n /// Returns a new sorted array. The original array remains untouched. Notice that this function will\n /// only work for arrays of fields or integers, not for any arbitrary type. This is because the sorting\n /// logic it uses internally is optimized specifically for these values. If you need a sort function to\n /// sort any type, you should use the [`Self::sort_via`] function.\n ///\n /// Example:\n ///\n /// ```rust\n /// fn main() {\n /// let arr = [42, 32];\n /// let sorted = arr.sort();\n /// assert(sorted == [32, 42]);\n /// }\n /// ```\n pub fn sort(self) -> Self {\n self.sort_via(|a, b| a <= b)\n }\n}\n\nimpl<T, let N: u32> [T; N]\nwhere\n T: Eq,\n{\n /// Returns a new sorted array by sorting it with a custom comparison function.\n /// The original array remains untouched.\n /// The ordering function must return true if the first argument should be sorted to be before the second argument or is equal to the second argument.\n ///\n /// Using this method with an operator like `<` that does not return `true` for equal values will result in an assertion failure for arrays with equal elements.\n ///\n /// Example:\n ///\n /// ```rust\n /// fn main() {\n /// let arr = [42, 32]\n /// let sorted_ascending = arr.sort_via(|a, b| a <= b);\n /// assert(sorted_ascending == [32, 42]); // verifies\n ///\n /// let sorted_descending = arr.sort_via(|a, b| a >= b);\n /// assert(sorted_descending == [32, 42]); // does not verify\n /// }\n /// ```\n pub fn sort_via<Env>(self, ordering: fn[Env](T, T) -> bool) -> Self {\n // Safety: `sorted` array is checked to be:\n // a. a permutation of `input`'s elements\n // b. satisfying the predicate `ordering`\n let sorted = unsafe { quicksort::quicksort(self, ordering) };\n\n if !is_unconstrained() {\n for i in 0..N - 1 {\n assert(\n ordering(sorted[i], sorted[i + 1]),\n \"Array has not been sorted correctly according to `ordering`.\",\n );\n }\n check_shuffle::check_shuffle(self, sorted);\n }\n sorted\n }\n}\n\nimpl<let N: u32> [u8; N] {\n /// Converts a byte array of type `[u8; N]` to a string. Note that this performs no UTF-8 validation -\n /// the given array is interpreted as-is as a string.\n ///\n /// Example:\n ///\n /// ```rust\n /// fn main() {\n /// let hi = [104, 105].as_str_unchecked();\n /// assert_eq(hi, \"hi\");\n /// }\n /// ```\n #[builtin(array_as_str_unchecked)]\n pub fn as_str_unchecked(self) -> str<N> {}\n}\n\nimpl<let N: u32> From<str<N>> for [u8; N] {\n /// Returns an array of the string bytes.\n fn from(s: str<N>) -> Self {\n s.as_bytes()\n }\n}\n\nmod test {\n #[test]\n fn map_empty() {\n assert_eq([].map(|x| x + 1), []);\n }\n\n global arr_with_100_values: [u32; 100] = [\n 42, 123, 87, 93, 48, 80, 50, 5, 104, 84, 70, 47, 119, 66, 71, 121, 3, 29, 42, 118, 2, 54,\n 89, 44, 81, 0, 26, 106, 68, 96, 84, 48, 95, 54, 45, 32, 89, 100, 109, 19, 37, 41, 19, 98,\n 53, 114, 107, 66, 6, 74, 13, 19, 105, 64, 123, 28, 44, 50, 89, 58, 123, 126, 21, 43, 86, 35,\n 21, 62, 82, 0, 108, 120, 72, 72, 62, 80, 12, 71, 70, 86, 116, 73, 38, 15, 127, 81, 30, 8,\n 125, 28, 26, 69, 114, 63, 27, 28, 61, 42, 13, 32,\n ];\n global expected_with_100_values: [u32; 100] = [\n 0, 0, 2, 3, 5, 6, 8, 12, 13, 13, 15, 19, 19, 19, 21, 21, 26, 26, 27, 28, 28, 28, 29, 30, 32,\n 32, 35, 37, 38, 41, 42, 42, 42, 43, 44, 44, 45, 47, 48, 48, 50, 50, 53, 54, 54, 58, 61, 62,\n 62, 63, 64, 66, 66, 68, 69, 70, 70, 71, 71, 72, 72, 73, 74, 80, 80, 81, 81, 82, 84, 84, 86,\n 86, 87, 89, 89, 89, 93, 95, 96, 98, 100, 104, 105, 106, 107, 108, 109, 114, 114, 116, 118,\n 119, 120, 121, 123, 123, 123, 125, 126, 127,\n ];\n fn sort_u32(a: u32, b: u32) -> bool {\n a <= b\n }\n\n #[test]\n fn test_sort() {\n let mut arr: [u32; 7] = [3, 6, 8, 10, 1, 2, 1];\n\n let sorted = arr.sort();\n\n let expected: [u32; 7] = [1, 1, 2, 3, 6, 8, 10];\n assert(sorted == expected);\n }\n\n #[test]\n fn test_sort_100_values() {\n let mut arr: [u32; 100] = [\n 42, 123, 87, 93, 48, 80, 50, 5, 104, 84, 70, 47, 119, 66, 71, 121, 3, 29, 42, 118, 2,\n 54, 89, 44, 81, 0, 26, 106, 68, 96, 84, 48, 95, 54, 45, 32, 89, 100, 109, 19, 37, 41,\n 19, 98, 53, 114, 107, 66, 6, 74, 13, 19, 105, 64, 123, 28, 44, 50, 89, 58, 123, 126, 21,\n 43, 86, 35, 21, 62, 82, 0, 108, 120, 72, 72, 62, 80, 12, 71, 70, 86, 116, 73, 38, 15,\n 127, 81, 30, 8, 125, 28, 26, 69, 114, 63, 27, 28, 61, 42, 13, 32,\n ];\n\n let sorted = arr.sort();\n\n let expected: [u32; 100] = [\n 0, 0, 2, 3, 5, 6, 8, 12, 13, 13, 15, 19, 19, 19, 21, 21, 26, 26, 27, 28, 28, 28, 29, 30,\n 32, 32, 35, 37, 38, 41, 42, 42, 42, 43, 44, 44, 45, 47, 48, 48, 50, 50, 53, 54, 54, 58,\n 61, 62, 62, 63, 64, 66, 66, 68, 69, 70, 70, 71, 71, 72, 72, 73, 74, 80, 80, 81, 81, 82,\n 84, 84, 86, 86, 87, 89, 89, 89, 93, 95, 96, 98, 100, 104, 105, 106, 107, 108, 109, 114,\n 114, 116, 118, 119, 120, 121, 123, 123, 123, 125, 126, 127,\n ];\n assert(sorted == expected);\n }\n\n #[test]\n fn test_sort_100_values_comptime() {\n let sorted = arr_with_100_values.sort();\n assert(sorted == expected_with_100_values);\n }\n\n #[test]\n fn test_sort_via() {\n let mut arr: [u32; 7] = [3, 6, 8, 10, 1, 2, 1];\n\n let sorted = arr.sort_via(sort_u32);\n\n let expected: [u32; 7] = [1, 1, 2, 3, 6, 8, 10];\n assert(sorted == expected);\n }\n\n #[test]\n fn test_sort_via_100_values() {\n let mut arr: [u32; 100] = [\n 42, 123, 87, 93, 48, 80, 50, 5, 104, 84, 70, 47, 119, 66, 71, 121, 3, 29, 42, 118, 2,\n 54, 89, 44, 81, 0, 26, 106, 68, 96, 84, 48, 95, 54, 45, 32, 89, 100, 109, 19, 37, 41,\n 19, 98, 53, 114, 107, 66, 6, 74, 13, 19, 105, 64, 123, 28, 44, 50, 89, 58, 123, 126, 21,\n 43, 86, 35, 21, 62, 82, 0, 108, 120, 72, 72, 62, 80, 12, 71, 70, 86, 116, 73, 38, 15,\n 127, 81, 30, 8, 125, 28, 26, 69, 114, 63, 27, 28, 61, 42, 13, 32,\n ];\n\n let sorted = arr.sort_via(sort_u32);\n\n let expected: [u32; 100] = [\n 0, 0, 2, 3, 5, 6, 8, 12, 13, 13, 15, 19, 19, 19, 21, 21, 26, 26, 27, 28, 28, 28, 29, 30,\n 32, 32, 35, 37, 38, 41, 42, 42, 42, 43, 44, 44, 45, 47, 48, 48, 50, 50, 53, 54, 54, 58,\n 61, 62, 62, 63, 64, 66, 66, 68, 69, 70, 70, 71, 71, 72, 72, 73, 74, 80, 80, 81, 81, 82,\n 84, 84, 86, 86, 87, 89, 89, 89, 93, 95, 96, 98, 100, 104, 105, 106, 107, 108, 109, 114,\n 114, 116, 118, 119, 120, 121, 123, 123, 123, 125, 126, 127,\n ];\n assert(sorted == expected);\n }\n\n #[test]\n fn mapi_empty() {\n assert_eq([].mapi(|i, x| i * x + 1), []);\n }\n\n #[test]\n fn for_each_empty() {\n let empty_array: [Field; 0] = [];\n empty_array.for_each(|_x| assert(false));\n }\n\n #[test]\n fn for_eachi_empty() {\n let empty_array: [Field; 0] = [];\n empty_array.for_eachi(|_i, _x| assert(false));\n }\n\n #[test]\n fn map_example() {\n let a = [1, 2, 3];\n let b = a.map(|a| a * 2);\n assert_eq(b, [2, 4, 6]);\n }\n\n #[test]\n fn mapi_example() {\n let a = [1, 2, 3];\n let b = a.mapi(|i, a| i + a * 2);\n assert_eq(b, [2, 5, 8]);\n }\n\n #[test]\n fn for_each_example() {\n let a = [1, 2, 3];\n let mut b = [0, 0, 0];\n let b_ref = &mut b;\n let mut i = 0;\n let i_ref = &mut i;\n a.for_each(|x| {\n b_ref[*i_ref] = x * 2;\n *i_ref += 1;\n });\n assert_eq(b, [2, 4, 6]);\n assert_eq(i, 3);\n }\n\n #[test]\n fn for_eachi_example() {\n let a = [1, 2, 3];\n let mut b = [0, 0, 0];\n let b_ref = &mut b;\n a.for_eachi(|i, a| { b_ref[i] = i + a * 2; });\n assert_eq(b, [2, 5, 8]);\n }\n\n #[test]\n fn concat() {\n let arr1 = [1, 2, 3, 4];\n let arr2 = [6, 7, 8, 9, 10, 11];\n let concatenated_arr = arr1.concat(arr2);\n assert_eq(concatenated_arr, [1, 2, 3, 4, 6, 7, 8, 9, 10, 11]);\n }\n\n #[test]\n fn concat_zero_length_with_something() {\n let arr1 = [];\n let arr2 = [1];\n let concatenated_arr = arr1.concat(arr2);\n assert_eq(concatenated_arr, [1]);\n }\n\n #[test]\n fn concat_something_with_zero_length() {\n let arr1 = [1];\n let arr2 = [];\n let concatenated_arr = arr1.concat(arr2);\n assert_eq(concatenated_arr, [1]);\n }\n\n #[test]\n fn concat_zero_lengths() {\n let arr1: [Field; 0] = [];\n let arr2: [Field; 0] = [];\n let concatenated_arr = arr1.concat(arr2);\n assert_eq(concatenated_arr, []);\n }\n}\n"
|
|
3398
3398
|
},
|
|
3399
|
-
"
|
|
3399
|
+
"334": {
|
|
3400
3400
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/debug_log.nr",
|
|
3401
3401
|
"source": "// TODO: Expose other wrapped functions than debug (info, warn)\n// ['silent', 'fatal', 'error', 'warn', 'info', 'verbose', 'debug', 'trace']\n\npub global SILENT_LOG_LEVEL: u8 = 0;\npub global FATAL_LOG_LEVEL: u8 = 1;\npub global ERROR_LOG_LEVEL: u8 = 2;\npub global WARN_LOG_LEVEL: u8 = 3;\npub global INFO_LOG_LEVEL: u8 = 4;\npub global VERBOSE_LOG_LEVEL: u8 = 5;\npub global DEBUG_LOG_LEVEL: u8 = 6;\npub global TRACE_LOG_LEVEL: u8 = 7;\n\n/// Utility function to console.log data in the acir simulator.\n/// Example:\n/// debug_log(\"blah blah this is a debug string\");\npub fn debug_log<let N: u32>(msg: str<N>) {\n debug_log_format(msg, []);\n}\n\n/// Same as debug_log, but allows to customize the log level.\n/// Consider changing just to 'log'\npub fn debug_log_with_level<let N: u32>(log_level: u8, msg: str<N>) {\n debug_log_format_with_level(log_level, msg, []);\n}\n\n/// Utility function to console.log data in the acir simulator. This variant receives a format string in which the\n/// `${k}` tokens will be replaced with the k-eth value in the `args` array.\n/// Examples:\n/// debug_log_format(\"get_2(slot:{0}) =>\\n\\t0:{1}\\n\\t1:{2}\", [storage_slot, note0_hash, note1_hash]);\n/// debug_log_format(\"whole array: {}\", [e1, e2, e3, e4]);\npub fn debug_log_format<let M: u32, let N: u32>(msg: str<M>, args: [Field; N]) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe\n // to call.\n unsafe { debug_log_array_oracle_wrapper(DEBUG_LOG_LEVEL, msg, args) };\n}\n\n/// Same as debug_log_format, but allows to customize the log level.\n/// Consider changing just to 'log_format'\npub fn debug_log_format_with_level<let M: u32, let N: u32>(\n log_level: u8,\n msg: str<M>,\n args: [Field; N],\n) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe\n // to call.\n unsafe { debug_log_array_oracle_wrapper(log_level, msg, args) };\n}\n\n/// Utility function to console.log data in the acir simulator. This variant receives a format string in which the\n/// `${k}` tokens will be replaced with the k-eth value in the `args` slice.\n/// Examples:\n/// debug_log_format(\"get_2(slot:{0}) =>\\n\\t0:{1}\\n\\t1:{2}\", [storage_slot, note0_hash, note1_hash]);\n/// debug_log_format(\"whole slice: {}\", [e1, e2, e3, e4]);\npub fn debug_log_format_slice<let M: u32>(log_level: u8, msg: str<M>, args: [Field]) {\n // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe\n // to call.\n unsafe { debug_log_slice_oracle_wrapper(log_level, msg, args) };\n}\n\n// We provide two versions of the debug log oracle: one that takes args as a slice and another one that takes args as an array.\n// We do this since conversion from array to slice generates overhead in public functions, since opcodes need to be emitted for the conversion.\n// By exposing the two flavors, we avoid conversions since the AVM is able to handle both arrays an slices in this oracle.\n\nunconstrained fn debug_log_slice_oracle_wrapper<let M: u32>(\n log_level: u8,\n msg: str<M>,\n args: [Field],\n) {\n debug_log_slice_oracle(log_level, msg, args);\n}\n\n// WARNING: sometimes when using debug logs the ACVM errors with: `thrown: \"solver opcode resolution error: cannot solve opcode: expression has too many unknowns x155\"`\n#[oracle(utilityDebugLog)]\nunconstrained fn debug_log_slice_oracle<let M: u32>(log_level: u8, msg: str<M>, args: [Field]) {}\n\nunconstrained fn debug_log_array_oracle_wrapper<let M: u32, let N: u32>(\n log_level: u8,\n msg: str<M>,\n args: [Field; N],\n) {\n debug_log_array_oracle(log_level, msg, N, args);\n}\n\n#[oracle(utilityDebugLog)]\nunconstrained fn debug_log_array_oracle<let M: u32, let N: u32>(\n log_level: u8,\n msg: str<M>,\n length: u32,\n args: [Field; N],\n) {}\n"
|
|
3402
3402
|
},
|
|
3403
|
-
"
|
|
3403
|
+
"345": {
|
|
3404
3404
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/hash.nr",
|
|
3405
3405
|
"source": "mod poseidon2_chunks;\n\nuse crate::{\n abis::{\n contract_class_function_leaf_preimage::ContractClassFunctionLeafPreimage,\n function_selector::FunctionSelector,\n note_hash::NoteHash,\n nullifier::Nullifier,\n private_log::{PrivateLog, PrivateLogData},\n transaction::tx_request::TxRequest,\n },\n address::{AztecAddress, EthAddress},\n constants::{\n CONTRACT_CLASS_LOG_SIZE_IN_FIELDS, DOM_SEP__NOTE_HASH_NONCE, DOM_SEP__OUTER_NULLIFIER,\n DOM_SEP__SILOED_NOTE_HASH, DOM_SEP__UNIQUE_NOTE_HASH, FUNCTION_TREE_HEIGHT,\n NULL_MSG_SENDER_CONTRACT_ADDRESS, TWO_POW_64,\n },\n merkle_tree::root_from_sibling_path,\n messaging::l2_to_l1_message::L2ToL1Message,\n poseidon2::Poseidon2Sponge,\n side_effect::{Counted, Scoped},\n traits::{FromField, Hash, ToField},\n utils::field::{field_from_bytes, field_from_bytes_32_trunc},\n};\n\npub use poseidon2_chunks::poseidon2_absorb_in_chunks_existing_sponge;\nuse poseidon2_chunks::poseidon2_absorb_in_chunks;\nuse std::embedded_curve_ops::EmbeddedCurveScalar;\n\n// TODO: refactor these into their own files: sha256, poseidon2, some protocol-specific hash computations, some merkle computations.\n\npub fn sha256_to_field<let N: u32>(bytes_to_hash: [u8; N]) -> Field {\n let sha256_hashed = sha256::digest(bytes_to_hash);\n let hash_in_a_field = field_from_bytes_32_trunc(sha256_hashed);\n\n hash_in_a_field\n}\n\npub fn private_functions_root_from_siblings(\n selector: FunctionSelector,\n vk_hash: Field,\n function_leaf_index: Field,\n function_leaf_sibling_path: [Field; FUNCTION_TREE_HEIGHT],\n) -> Field {\n let function_leaf_preimage = ContractClassFunctionLeafPreimage { selector, vk_hash };\n let function_leaf = function_leaf_preimage.hash();\n root_from_sibling_path(\n function_leaf,\n function_leaf_index,\n function_leaf_sibling_path,\n )\n}\n\npub fn compute_note_hash_nonce(first_nullifier_in_tx: Field, note_index_in_tx: u32) -> Field {\n // Hashing the first nullifier with note index in tx is guaranteed to be unique (because all nullifiers are also\n // unique).\n poseidon2_hash_with_separator(\n [first_nullifier_in_tx, note_index_in_tx as Field],\n DOM_SEP__NOTE_HASH_NONCE,\n )\n}\n\npub fn compute_unique_note_hash(note_nonce: Field, siloed_note_hash: Field) -> Field {\n let inputs = [note_nonce, siloed_note_hash];\n poseidon2_hash_with_separator(inputs, DOM_SEP__UNIQUE_NOTE_HASH)\n}\n\npub fn compute_nonce_and_unique_note_hash(\n siloed_note_hash: Field,\n first_nullifier: Field,\n note_index_in_tx: u32,\n) -> Field {\n let note_nonce = compute_note_hash_nonce(first_nullifier, note_index_in_tx);\n compute_unique_note_hash(note_nonce, siloed_note_hash)\n}\n\npub fn compute_siloed_note_hash(app: AztecAddress, note_hash: Field) -> Field {\n poseidon2_hash_with_separator([app.to_field(), note_hash], DOM_SEP__SILOED_NOTE_HASH)\n}\n\n/// Computes unique note hashes from siloed note hashes\npub fn compute_unique_siloed_note_hash(\n siloed_note_hash: Field,\n first_nullifier: Field,\n note_index_in_tx: u32,\n) -> Field {\n if siloed_note_hash == 0 {\n 0\n } else {\n compute_nonce_and_unique_note_hash(siloed_note_hash, first_nullifier, note_index_in_tx)\n }\n}\n\n/// Siloing in the context of Aztec refers to the process of hashing a note hash with a contract address (this way\n/// the note hash is scoped to a specific contract). This is used to prevent intermingling of notes between contracts.\npub fn silo_note_hash(note_hash: Scoped<Counted<NoteHash>>) -> Field {\n if note_hash.contract_address.is_zero() {\n 0\n } else {\n compute_siloed_note_hash(note_hash.contract_address, note_hash.innermost())\n }\n}\n\npub fn compute_siloed_nullifier(contract_address: AztecAddress, nullifier: Field) -> Field {\n poseidon2_hash_with_separator(\n [contract_address.to_field(), nullifier],\n DOM_SEP__OUTER_NULLIFIER,\n )\n}\n\npub fn silo_nullifier(nullifier: Scoped<Counted<Nullifier>>) -> Field {\n let value = nullifier.innermost().value;\n // Q: shouldn't we be checking whether the _whole_ scoped, counted, nullifier struct is empty?\n // A: We don't have to. The init and inner circuits add a contract address only to non-empty nullifiers.\n // So we know we should silo it if the contract address is not empty.\n if nullifier.contract_address.is_zero() {\n value // Return `value` instead of 0 because an already-siloed nullifier's contract address is zero.\n } else {\n compute_siloed_nullifier(nullifier.contract_address, value)\n }\n}\n\npub fn create_protocol_nullifier(tx_request: TxRequest) -> Scoped<Counted<Nullifier>> {\n // The protocol nullifier is ascribed a special side-effect counter of 1. No other side-effect\n // can have counter 1 (see `validate_as_first_call` for that assertion).\n Nullifier { value: tx_request.hash(), note_hash: 0 }.count(1).scope(\n NULL_MSG_SENDER_CONTRACT_ADDRESS,\n )\n}\n\npub fn compute_siloed_private_log_field(contract_address: AztecAddress, field: Field) -> Field {\n poseidon2_hash([contract_address.to_field(), field])\n}\n\npub fn silo_private_log(private_log: Scoped<Counted<PrivateLogData>>) -> PrivateLog {\n let log = private_log.innermost().log;\n if private_log.contract_address.is_zero() {\n log\n } else {\n let mut fields = log.fields;\n fields[0] = compute_siloed_private_log_field(private_log.contract_address, fields[0]);\n PrivateLog::new(fields, log.length)\n }\n}\n\npub fn compute_contract_class_log_hash(log: [Field; CONTRACT_CLASS_LOG_SIZE_IN_FIELDS]) -> Field {\n poseidon2_hash(log)\n}\n\npub fn compute_app_secret_key(\n master_secret_key: EmbeddedCurveScalar,\n app_address: AztecAddress,\n app_secret_key_domain_separator: Field,\n) -> Field {\n poseidon2_hash_with_separator(\n [master_secret_key.hi, master_secret_key.lo, app_address.to_field()],\n app_secret_key_domain_separator,\n )\n}\n\npub fn compute_l2_to_l1_hash(\n contract_address: AztecAddress,\n recipient: EthAddress,\n content: Field,\n rollup_version_id: Field,\n chain_id: Field,\n) -> Field {\n let contract_address_bytes: [u8; 32] = contract_address.to_field().to_be_bytes();\n let recipient_bytes: [u8; 20] = recipient.to_be_bytes();\n let content_bytes: [u8; 32] = content.to_be_bytes();\n let rollup_version_id_bytes: [u8; 32] = rollup_version_id.to_be_bytes();\n let chain_id_bytes: [u8; 32] = chain_id.to_be_bytes();\n\n let mut bytes: [u8; 148] = std::mem::zeroed();\n for i in 0..32 {\n bytes[i] = contract_address_bytes[i];\n bytes[i + 32] = rollup_version_id_bytes[i];\n // 64 - 84 are for recipient.\n bytes[i + 84] = chain_id_bytes[i];\n bytes[i + 116] = content_bytes[i];\n }\n\n for i in 0..20 {\n bytes[64 + i] = recipient_bytes[i];\n }\n\n sha256_to_field(bytes)\n}\n\npub fn silo_l2_to_l1_message(\n msg: Scoped<L2ToL1Message>,\n rollup_version_id: Field,\n chain_id: Field,\n) -> Field {\n if msg.contract_address.is_zero() {\n 0\n } else {\n compute_l2_to_l1_hash(\n msg.contract_address,\n msg.inner.recipient,\n msg.inner.content,\n rollup_version_id,\n chain_id,\n )\n }\n}\n\n// TODO: consider a variant that enables domain separation with a u32 (we seem to have standardised u32s for domain separators)\n/// Computes sha256 hash of 2 input fields.\n///\n/// @returns A truncated field (i.e., the first byte is always 0).\npub fn accumulate_sha256(v0: Field, v1: Field) -> Field {\n // Concatenate two fields into 32 x 2 = 64 bytes\n let v0_as_bytes: [u8; 32] = v0.to_be_bytes();\n let v1_as_bytes: [u8; 32] = v1.to_be_bytes();\n let hash_input_flattened = v0_as_bytes.concat(v1_as_bytes);\n\n sha256_to_field(hash_input_flattened)\n}\n\n// TODO: remove this. The protocol doesn't need it.\n#[inline_always]\npub fn pedersen_hash<let N: u32>(inputs: [Field; N], hash_index: u32) -> Field {\n std::hash::pedersen_hash_with_separator(inputs, hash_index)\n}\n\npub fn poseidon2_hash<let N: u32>(inputs: [Field; N]) -> Field {\n poseidon::poseidon2::Poseidon2::hash(inputs, N)\n}\n\n#[no_predicates]\npub fn poseidon2_hash_with_separator<let N: u32, T>(inputs: [Field; N], separator: T) -> Field\nwhere\n T: ToField,\n{\n let inputs_with_separator = [separator.to_field()].concat(inputs);\n poseidon2_hash(inputs_with_separator)\n}\n\n/// Computes a Poseidon2 hash over a dynamic-length subarray of the given input.\n/// Only the first `in_len` fields of `input` are absorbed; any remaining fields are ignored.\n/// The caller is responsible for ensuring that the input is padded with zeros if required.\n#[no_predicates]\npub fn poseidon2_hash_subarray<let N: u32>(input: [Field; N], in_len: u32) -> Field {\n let mut sponge = poseidon2_absorb_in_chunks(input, in_len);\n sponge.squeeze()\n}\n\n// NB the below is the same as poseidon::poseidon2::Poseidon2::hash(), but replacing a range check with a bit check,\n// and absorbing in chunks of 3 below.\n#[no_predicates]\npub fn poseidon2_cheaper_variable_hash<let N: u32>(input: [Field; N], in_len: u32) -> Field {\n let mut sponge = poseidon2_absorb_in_chunks(input, in_len);\n sponge.squeeze()\n}\n\n// This function is unconstrained because it is intended to be used in unconstrained context only as\n// in constrained contexts it would be too inefficient.\npub unconstrained fn poseidon2_hash_with_separator_bounded_vec<let N: u32, T>(\n inputs: BoundedVec<Field, N>,\n separator: T,\n) -> Field\nwhere\n T: ToField,\n{\n let in_len = inputs.len() + 1;\n let iv: Field = (in_len as Field) * TWO_POW_64;\n let mut sponge = Poseidon2Sponge::new(iv);\n sponge.absorb(separator.to_field());\n\n for i in 0..inputs.len() {\n sponge.absorb(inputs.get(i));\n }\n\n sponge.squeeze()\n}\n\n#[no_predicates]\npub fn poseidon2_hash_bytes<let N: u32>(inputs: [u8; N]) -> Field {\n let mut fields = [0; (N + 30) / 31];\n let mut field_index = 0;\n let mut current_field = [0; 31];\n for i in 0..inputs.len() {\n let index = i % 31;\n current_field[index] = inputs[i];\n if index == 30 {\n fields[field_index] = field_from_bytes(current_field, false);\n current_field = [0; 31];\n field_index += 1;\n }\n }\n if field_index != fields.len() {\n fields[field_index] = field_from_bytes(current_field, false);\n }\n poseidon2_hash(fields)\n}\n\n#[test]\nfn poseidon_chunks_matches_fixed() {\n let in_len = 501;\n let mut input: [Field; 4096] = [0; 4096];\n let mut fixed_input = [3; 501];\n assert(in_len == fixed_input.len()); // sanity check\n for i in 0..in_len {\n input[i] = 3;\n }\n let sub_chunk_hash = poseidon2_hash_subarray(input, in_len);\n let fixed_len_hash = poseidon::poseidon2::Poseidon2::hash(fixed_input, fixed_input.len());\n assert(sub_chunk_hash == fixed_len_hash);\n}\n\n#[test]\nfn poseidon_chunks_matches_variable() {\n let in_len = 501;\n let mut input: [Field; 4096] = [0; 4096];\n for i in 0..in_len {\n input[i] = 3;\n }\n let variable_chunk_hash = poseidon2_cheaper_variable_hash(input, in_len);\n let variable_len_hash = poseidon::poseidon2::Poseidon2::hash(input, in_len);\n assert(variable_chunk_hash == variable_len_hash);\n}\n\n#[test]\nfn smoke_sha256_to_field() {\n let full_buffer = [\n 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24,\n 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47,\n 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70,\n 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93,\n 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112,\n 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130,\n 131, 132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145, 146, 147, 148,\n 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159,\n ];\n let result = sha256_to_field(full_buffer);\n\n assert(result == 0x448ebbc9e1a31220a2f3830c18eef61b9bd070e5084b7fa2a359fe729184c7);\n\n // to show correctness of the current ver (truncate one byte) vs old ver (mod full bytes):\n let result_bytes = sha256::digest(full_buffer);\n let truncated_field = crate::utils::field::field_from_bytes_32_trunc(result_bytes);\n assert(truncated_field == result);\n let mod_res = result + (result_bytes[31] as Field);\n assert(mod_res == 0x448ebbc9e1a31220a2f3830c18eef61b9bd070e5084b7fa2a359fe729184e0);\n}\n\n#[test]\nfn compute_l2_l1_hash() {\n // All zeroes\n let hash_result =\n compute_l2_to_l1_hash(AztecAddress::from_field(0), EthAddress::zero(), 0, 0, 0);\n assert(hash_result == 0x3b18c58c739716e76429634a61375c45b3b5cd470c22ab6d3e14cee23dd992);\n\n // Non-zero case\n let hash_result = compute_l2_to_l1_hash(\n AztecAddress::from_field(1),\n EthAddress::from_field(3),\n 5,\n 2,\n 4,\n );\n assert(hash_result == 0xaab2a5828156782b12a1dc6f336e2bc627eb1b9514b02d511f66296990c050);\n}\n\n#[test]\nfn silo_l2_to_l1_message_matches_typescript() {\n let version = 4;\n let chainId = 5;\n\n let hash = silo_l2_to_l1_message(\n L2ToL1Message { recipient: EthAddress::from_field(1), content: 2 }.scope(\n AztecAddress::from_field(3),\n ),\n version,\n chainId,\n );\n\n // The following value was generated by `yarn-project/stdlib/src/hash/hash.test.ts`\n let hash_from_typescript = 0x0081edf209e087ad31b3fd24263698723d57190bd1d6e9fe056fc0c0a68ee661;\n\n assert_eq(hash, hash_from_typescript);\n}\n\n#[test]\nunconstrained fn poseidon2_hash_with_separator_bounded_vec_matches_non_bounded_vec_version() {\n let inputs = BoundedVec::<Field, 4>::from_array([1, 2, 3]);\n let separator = 42;\n\n // Hash using bounded vec version\n let bounded_result = poseidon2_hash_with_separator_bounded_vec(inputs, separator);\n\n // Hash using regular version\n let regular_result = poseidon2_hash_with_separator([1, 2, 3], separator);\n\n // Results should match\n assert_eq(bounded_result, regular_result);\n}\n"
|
|
3406
3406
|
},
|
|
3407
|
-
"
|
|
3407
|
+
"358": {
|
|
3408
3408
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/meta/mod.nr",
|
|
3409
3409
|
"source": "use utils::derive_serialization_quotes;\n\npub mod utils;\n\n/// Generates the generic parameter declarations for a struct's trait implementation.\n///\n/// This function takes a struct type definition and generates the generic parameter declarations\n/// that go after the `impl` keyword. For example, given a struct with generics `N: u32` and `T`,\n/// it generates `<let N: u32, T>`.\n///\n/// # Parameters\n/// - `s`: The struct type definition to generate generic declarations for\n///\n/// # Returns\n/// A quoted code block containing the generic parameter declarations, or an empty quote if the struct\n/// has no generic parameters\n///\n/// # Example\n/// For a struct defined as:\n/// ```\n/// struct Container<T, let N: u32> {\n/// items: [T; N],\n/// count: u32\n/// }\n/// ```\n///\n/// This function generates:\n/// ```\n/// <let N: u32, T>\n/// ```\ncomptime fn get_generics_declarations(s: TypeDefinition) -> Quoted {\n let generics = s.generics();\n\n if generics.len() > 0 {\n let generics_declarations_items = generics\n .map(|(name, maybe_integer_typ)| {\n // The second item in the generics tuple is an Option of an integer type that is Some only if\n // the generic is numeric.\n if maybe_integer_typ.is_some() {\n // The generic is numeric, so we return a quote defined as e.g. \"let N: u32\"\n let integer_type = maybe_integer_typ.unwrap();\n quote {let $name: $integer_type}\n } else {\n // The generic is not numeric, so we return a quote containing the name of the generic (e.g. \"T\")\n quote {$name}\n }\n })\n .join(quote {,});\n quote {<$generics_declarations_items>}\n } else {\n // The struct doesn't have any generics defined, so we just return an empty quote.\n quote {}\n }\n}\n\n/// Generates the `where` clause for a trait implementation that constrains non-numeric generic type parameters.\n///\n/// This function takes a struct type definition and a trait name, and generates a `where` clause that\n/// requires all non-numeric generic type parameters to implement the specified trait.\n///\n/// # Parameters\n/// - `s`: The struct type definition to generate the where clause for\n/// - `trait_name`: The name of the trait that non-numeric generic parameters must implement\n///\n/// # Returns\n/// A quoted code block containing the where clause, or an empty quote if the struct has no non-numeric\n/// generic parameters\n///\n/// # Example\n/// For a struct defined as:\n/// ```\n/// struct Container<T, let N: u32> {\n/// items: [T; N],\n/// count: u32\n/// }\n/// ```\n///\n/// And trait name \"Serialize\", this function generates:\n/// ```\n/// where T: Serialize\n/// ```\ncomptime fn get_where_trait_clause(s: TypeDefinition, trait_name: Quoted) -> Quoted {\n let generics = s.generics();\n\n // The second item in the generics tuple is an Option of an integer type that is Some only if the generic is\n // numeric.\n let non_numeric_generics =\n generics.filter(|(_, maybe_integer_typ)| maybe_integer_typ.is_none());\n\n if non_numeric_generics.len() > 0 {\n let non_numeric_generics_declarations =\n non_numeric_generics.map(|(name, _)| quote {$name: $trait_name}).join(quote {,});\n quote {where $non_numeric_generics_declarations}\n } else {\n // There are no non-numeric generics, so we return an empty quote.\n quote {}\n }\n}\n\n/// Generates a `Serialize` trait implementation for a struct type.\n///\n/// # Parameters\n/// - `s`: The struct type definition to generate the implementation for\n///\n/// # Returns\n/// A quoted code block containing the trait implementation\n///\n/// # Example\n/// For a struct defined as:\n/// ```\n/// struct Log<N> {\n/// fields: [Field; N],\n/// length: u32\n/// }\n/// ```\n///\n/// This function generates code equivalent to:\n/// ```\n/// impl<let N: u32> Serialize for Log<N> {\n/// let N: u32 = <[Field; N] as Serialize>::N + <u32 as Serialize>::N;\n///\n/// #[inline_always]\n/// fn serialize(self) -> [Field; Self::N] {\n/// let mut serialized_params = [0; _];\n/// let mut offset = 0;\n///\n/// let serialized_member = Serialize::serialize(self.fields);\n/// let serialized_member_len = <[Field; N] as Serialize>::N;\n/// for i in 0..serialized_member_len {\n/// serialized_params[i + offset] = serialized_member[i];\n/// }\n/// offset += serialized_member_len;\n///\n/// let serialized_member = Serialize::serialize(self.length);\n/// let serialized_member_len = <u32 as Serialize>::N;\n/// for i in 0..serialized_member_len {\n/// serialized_params[i + offset] = serialized_member[i];\n/// }\n/// offset += serialized_member_len;\n///\n/// serialized_params\n/// }\n/// }\n/// ```\npub comptime fn derive_serialize(s: TypeDefinition) -> Quoted {\n let typ = s.as_type();\n let nested_struct = typ.as_data_type().unwrap();\n\n // We care only about the name and type so we drop the last item of the tuple\n let params = nested_struct.0.fields(nested_struct.1).map(|(name, typ, _)| (name, typ));\n\n // Generates the generic parameter declarations (to be placed after the `impl` keyword) and the `where` clause\n // for the `Serialize` trait.\n let generics_declarations = get_generics_declarations(s);\n let where_serialize_clause = get_where_trait_clause(s, quote {Serialize});\n\n let (function_body, params_len_quote, serialized_params_name) =\n derive_serialization_quotes(params, true);\n\n quote {\n impl$generics_declarations $crate::traits::Serialize for $typ\n $where_serialize_clause\n {\n let N: u32 = $params_len_quote;\n\n #[inline_always]\n fn serialize(self) -> [Field; Self::N] {\n $function_body\n\n $serialized_params_name\n }\n }\n }\n}\n\n/// Generates a `Deserialize` trait implementation for a given struct `s`.\n///\n/// # Arguments\n/// * `s` - The struct type definition to generate the implementation for\n///\n/// # Returns\n/// A `Quoted` block containing the generated trait implementation\n///\n/// # Requirements\n/// Each struct member type must implement the `Deserialize` trait (it gets used in the generated code).\n///\n/// # Example\n/// For a struct like:\n/// ```\n/// struct MyStruct {\n/// x: AztecAddress,\n/// y: Field,\n/// }\n/// ```\n///\n/// This generates:\n/// ```\n/// impl Deserialize for MyStruct {\n/// let N: u32 = <AztecAddress as Deserialize>::N + <Field as Deserialize>::N;\n///\n/// fn deserialize(serialized: [Field; Self::N]) -> Self {\n/// let mut offset = 0;\n/// let mut member_fields = [0; <AztecAddress as Deserialize>::N];\n/// for i in 0..<AztecAddress as Deserialize>::N {\n/// member_fields[i] = serialized[i + offset];\n/// }\n/// let x = <AztecAddress as Deserialize>::deserialize(member_fields);\n/// offset += <AztecAddress as Deserialize>::N;\n///\n/// let mut member_fields = [0; <Field as Deserialize>::N];\n/// for i in 0..<Field as Deserialize>::N {\n/// member_fields[i] = serialized[i + offset];\n/// }\n/// let y = <Field as Deserialize>::deserialize(member_fields);\n/// offset += <Field as Deserialize>::N;\n///\n/// Self { x, y }\n/// }\n/// }\n/// ```\npub(crate) comptime fn derive_deserialize(s: TypeDefinition) -> Quoted {\n let typ = s.as_type();\n let nested_struct = typ.as_data_type().unwrap();\n let params = nested_struct.0.fields(nested_struct.1);\n\n // Generates the generic parameter declarations (to be placed after the `impl` keyword) and the `where` clause\n // for the `Deserialize` trait.\n let generics_declarations = get_generics_declarations(s);\n let where_deserialize_clause = get_where_trait_clause(s, quote {Deserialize});\n\n // The following will give us:\n // <type_of_struct_member_1 as Deserialize>::N + <type_of_struct_member_2 as Deserialize>::N + ...\n // (or 0 if the struct has no members)\n let right_hand_side_of_definition_of_n = if params.len() > 0 {\n params\n .map(|(_, param_type, _): (Quoted, Type, Quoted)| {\n quote {\n <$param_type as $crate::traits::Deserialize>::N\n }\n })\n .join(quote {+})\n } else {\n quote {0}\n };\n\n // For structs containing a single member, we can enhance performance by directly deserializing the input array,\n // bypassing the need for loop-based array construction. While this optimization yields significant benefits in\n // Brillig where the loops are expected to not be optimized, it is not relevant in ACIR where the loops are\n // expected to be optimized away.\n let function_body = if params.len() > 1 {\n // This generates deserialization code for each struct member and concatenates them together.\n let deserialization_of_struct_members = params\n .map(|(param_name, param_type, _): (Quoted, Type, Quoted)| {\n quote {\n let mut member_fields = [0; <$param_type as Deserialize>::N];\n for i in 0..<$param_type as Deserialize>::N {\n member_fields[i] = serialized[i + offset];\n }\n let $param_name = <$param_type as Deserialize>::deserialize(member_fields);\n offset += <$param_type as Deserialize>::N;\n }\n })\n .join(quote {});\n\n // We join the struct member names with a comma to be used in the `Self { ... }` syntax\n // This will give us e.g. `a, b, c` for a struct with three fields named `a`, `b`, and `c`.\n let struct_members = params\n .map(|(param_name, _, _): (Quoted, Type, Quoted)| quote { $param_name })\n .join(quote {,});\n\n quote {\n let mut offset = 0;\n\n $deserialization_of_struct_members\n\n Self { $struct_members }\n }\n } else if params.len() == 1 {\n let param_name = params[0].0;\n quote {\n Self { $param_name: $crate::traits::Deserialize::deserialize(serialized) }\n }\n } else {\n quote {\n Self {}\n }\n };\n\n quote {\n impl$generics_declarations $crate::traits::Deserialize for $typ\n $where_deserialize_clause\n {\n let N: u32 = $right_hand_side_of_definition_of_n;\n\n #[inline_always]\n fn deserialize(serialized: [Field; Self::N]) -> Self {\n $function_body\n }\n }\n }\n}\n\n/// Generates a `Packable` trait implementation for a given struct `s`.\n///\n/// # Arguments\n/// * `s` - The struct type definition to generate the implementation for\n///\n/// # Returns\n/// A `Quoted` block containing the generated trait implementation\n///\n/// # Requirements\n/// Each struct member type must implement the `Packable` trait (it gets used in the generated code).\n///\n/// # Example\n/// For a struct like:\n/// ```\n/// struct MyStruct {\n/// x: AztecAddress,\n/// y: Field,\n/// }\n/// ```\n///\n/// This generates:\n/// ```\n/// impl Packable for MyStruct {\n/// let N: u32 = 2;\n///\n/// fn pack(self) -> [Field; 2] {\n/// let mut result: [Field; 2] = [0_Field; 2];\n/// let mut offset: u32 = 0_u32;\n/// let packed_member: [Field; 1] = self.x.pack();\n/// let packed_member_len: u32 = <Field as Packable>::N;\n/// for i in 0_u32..packed_member_len {\n/// {\n/// result[i + offset] = packed_member[i];\n/// }\n/// }\n/// offset = offset + packed_member_len;\n/// let packed_member: [Field; 1] = self.y.pack();\n/// let packed_member_len: u32 = <Field as Packable>::N;\n/// for i in 0_u32..packed_member_len {\n/// {\n/// result[i + offset] = packed_member[i];\n/// }\n/// }\n/// offset = offset + packed_member_len;\n/// result\n/// }\n///\n/// fn unpack(packed: [Field; 2]) -> Self {\n/// let mut offset: u32 = 0_u32;\n/// let mut member_fields: [Field; 1] = [0_Field; 1];\n/// for i in 0_u32..<AztecAddress as Packable>::N {\n/// member_fields[i] = packed[i + offset];\n/// }\n/// let x: AztecAddress = <AztecAddress as Packable>::unpack(member_fields);\n/// offset = offset + <AztecAddress as Packable>::N;\n/// let mut member_fields: [Field; 1] = [0_Field; 1];\n/// for i in 0_u32..<Field as Packable>::N {\n/// member_fields[i] = packed[i + offset];\n/// }\n/// let y: Field = <Field as Packable>::unpack(member_fields);\n/// offset = offset + <Field as Packable>::N;\n/// Self { x: x, y: y }\n/// }\n/// }\n/// ```\npub comptime fn derive_packable(s: TypeDefinition) -> Quoted {\n let typ = s.as_type();\n let nested_struct = typ.as_data_type().unwrap();\n let params = nested_struct.0.fields(nested_struct.1);\n\n // Generates the generic parameter declarations (to be placed after the `impl` keyword) and the `where` clause\n // for the `Packable` trait.\n let generics_declarations = get_generics_declarations(s);\n let where_packable_clause = get_where_trait_clause(s, quote {Packable});\n\n // The following will give us:\n // <type_of_struct_member_1 as Packable>::N + <type_of_struct_member_2 as Packable>::N + ...\n // (or 0 if the struct has no members)\n let right_hand_side_of_definition_of_n = if params.len() > 0 {\n params\n .map(|(_, param_type, _): (Quoted, Type, Quoted)| {\n quote {\n <$param_type as $crate::traits::Packable>::N\n }\n })\n .join(quote {+})\n } else {\n quote {0}\n };\n\n // For structs containing a single member, we can enhance performance by directly returning the packed member,\n // bypassing the need for loop-based array construction. While this optimization yields significant benefits in\n // Brillig where the loops are expected to not be optimized, it is not relevant in ACIR where the loops are\n // expected to be optimized away.\n let pack_function_body = if params.len() > 1 {\n // For multiple struct members, generate packing code that:\n // 1. Packs each member\n // 2. Copies the packed fields into the result array at the correct offset\n // 3. Updates the offset for the next member\n let packing_of_struct_members = params\n .map(|(param_name, param_type, _): (Quoted, Type, Quoted)| {\n quote {\n let packed_member = $crate::traits::Packable::pack(self.$param_name);\n let packed_member_len = <$param_type as $crate::traits::Packable>::N;\n for i in 0..packed_member_len {\n result[i + offset] = packed_member[i];\n }\n offset += packed_member_len;\n }\n })\n .join(quote {});\n\n quote {\n let mut result = [0; Self::N];\n let mut offset = 0;\n\n $packing_of_struct_members\n\n result\n }\n } else if params.len() == 1 {\n let param_name = params[0].0;\n quote {\n $crate::traits::Packable::pack(self.$param_name)\n }\n } else {\n quote {\n [0; Self::N]\n }\n };\n\n // For structs containing a single member, we can enhance performance by directly unpacking the input array,\n // bypassing the need for loop-based array construction. While this optimization yields significant benefits in\n // Brillig where the loops are expected to not be optimized, it is not relevant in ACIR where the loops are\n // expected to be optimized away.\n let unpack_function_body = if params.len() > 1 {\n // For multiple struct members, generate unpacking code that:\n // 1. Unpacks each member\n // 2. Copies packed fields into member array at correct offset\n // 3. Updates offset for next member\n let unpacking_of_struct_members = params\n .map(|(param_name, param_type, _): (Quoted, Type, Quoted)| {\n quote {\n let mut member_fields = [0; <$param_type as $crate::traits::Packable>::N];\n for i in 0..<$param_type as $crate::traits::Packable>::N {\n member_fields[i] = packed[i + offset];\n }\n let $param_name = <$param_type as $crate::traits::Packable>::unpack(member_fields);\n offset += <$param_type as $crate::traits::Packable>::N;\n }\n })\n .join(quote {});\n\n // We join the struct member names with a comma to be used in the `Self { ... }` syntax\n let struct_members = params\n .map(|(param_name, _, _): (Quoted, Type, Quoted)| quote { $param_name })\n .join(quote {,});\n\n quote {\n let mut offset = 0;\n $unpacking_of_struct_members\n Self { $struct_members }\n }\n } else if params.len() == 1 {\n let param_name = params[0].0;\n quote {\n Self { $param_name: $crate::traits::Packable::unpack(packed) }\n }\n } else {\n quote {\n Self {}\n }\n };\n\n quote {\n impl$generics_declarations $crate::traits::Packable for $typ\n $where_packable_clause\n {\n let N: u32 = $right_hand_side_of_definition_of_n;\n\n #[inline_always]\n fn pack(self) -> [Field; Self::N] {\n $pack_function_body\n }\n\n #[inline_always]\n fn unpack(packed: [Field; Self::N]) -> Self {\n $unpack_function_body\n }\n }\n }\n}\n\nmod test {\n use crate::traits::{Deserialize, Packable, Serialize};\n\n #[derive(Deserialize, Eq, Packable, Serialize)]\n pub struct Empty {}\n\n #[derive(Deserialize, Eq, Packable, Serialize)]\n pub struct Smol {\n a: Field,\n b: Field,\n }\n\n #[derive(Deserialize, Eq, Serialize)]\n pub struct HasArray {\n a: [Field; 2],\n b: bool,\n }\n\n #[derive(Deserialize, Eq, Serialize)]\n pub struct Fancier {\n a: Smol,\n b: [Field; 2],\n c: [u8; 3],\n d: str<16>,\n }\n\n #[derive(Deserialize, Eq, Packable, Serialize)]\n pub struct HasArrayWithGenerics<T, let N: u32> {\n pub fields: [T; N],\n pub length: u32,\n }\n\n #[test]\n fn serde_on_empty() {\n let original = Empty {};\n let serialized = original.serialize();\n assert_eq(serialized, [], \"Serialized does not match empty array\");\n let deserialized = Empty::deserialize(serialized);\n assert_eq(deserialized, original, \"Deserialized does not match original\");\n }\n\n #[test]\n fn packable_on_empty() {\n let original = Empty {};\n let packed = original.pack();\n assert_eq(packed, [], \"Packed does not match empty array\");\n let unpacked = Empty::unpack(packed);\n assert_eq(unpacked, original, \"Unpacked does not match original\");\n }\n\n #[test]\n fn serde_on_smol() {\n let smol = Smol { a: 1, b: 2 };\n let serialized = smol.serialize();\n assert(serialized == [1, 2], serialized);\n let deserialized = Smol::deserialize(serialized);\n assert(deserialized == smol);\n\n // None of the struct members implements the `Packable` trait so the packed and serialized data should be the same\n let packed = smol.pack();\n assert_eq(packed, serialized, \"Packed does not match serialized\");\n }\n\n #[test]\n fn serde_on_has_array() {\n let has_array = HasArray { a: [1, 2], b: true };\n let serialized = has_array.serialize();\n assert(serialized == [1, 2, 1], serialized);\n let deserialized = HasArray::deserialize(serialized);\n assert(deserialized == has_array);\n }\n\n #[test]\n fn serde_on_fancier() {\n let fancier =\n Fancier { a: Smol { a: 1, b: 2 }, b: [0, 1], c: [1, 2, 3], d: \"metaprogramming!\" };\n let serialized = fancier.serialize();\n assert(\n serialized\n == [\n 1, 2, 0, 1, 1, 2, 3, 0x6d, 0x65, 0x74, 0x61, 0x70, 0x72, 0x6f, 0x67, 0x72, 0x61,\n 0x6d, 0x6d, 0x69, 0x6e, 0x67, 0x21,\n ],\n serialized,\n );\n let deserialized = Fancier::deserialize(serialized);\n assert(deserialized == fancier);\n }\n\n #[test]\n fn serde_on_contains_array_with_generics() {\n let struct_with_array_of_generics = HasArrayWithGenerics { fields: [1, 2, 3], length: 3 };\n let serialized = struct_with_array_of_generics.serialize();\n assert(serialized == [1, 2, 3, 3], serialized);\n let deserialized = HasArrayWithGenerics::deserialize(serialized);\n assert(deserialized == struct_with_array_of_generics);\n }\n\n #[test]\n fn packable_on_contains_array_with_generics() {\n let struct_with_array_of_generics = HasArrayWithGenerics { fields: [1, 2, 3], length: 3 };\n let packed = struct_with_array_of_generics.pack();\n assert(packed == [1, 2, 3, 3], packed);\n\n let unpacked = HasArrayWithGenerics::unpack(packed);\n assert(unpacked == struct_with_array_of_generics);\n }\n\n}\n"
|
|
3410
3410
|
},
|
|
3411
|
-
"
|
|
3411
|
+
"359": {
|
|
3412
3412
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/meta/utils.nr",
|
|
3413
3413
|
"source": "/// Generates serialization code for a list of parameters and the total length of the serialized array\n///\n/// # Parameters\n/// - `params`: A list of (name, type) tuples to serialize\n/// - `use_self_prefix`: If true, parameters are accessed as `self.$param_name` (for struct members).\n/// If false, parameters are accessed directly as `$param_name` (for function parameters).\n///\n/// # Returns\n/// A tuple containing:\n/// - Quoted code that serializes the parameters into an array named `serialized_params`\n/// - Quoted code that evaluates to the total length of the serialized array\n/// - Quoted code containing the name of the serialized array\npub comptime fn derive_serialization_quotes(\n params: [(Quoted, Type)],\n use_self_prefix: bool,\n) -> (Quoted, Quoted, Quoted) {\n let prefix_quote = if use_self_prefix {\n quote { self. }\n } else {\n quote {}\n };\n\n let params_len_quote = get_params_len_quote(params);\n let serialized_params_name = quote { serialized_params };\n\n let body = if params.len() == 0 {\n quote {\n let $serialized_params_name: [Field; 0] = [];\n }\n } else if params.len() == 1 {\n // When we have only a single parameter on the input, we can enhance performance by directly returning\n // the serialized member, bypassing the need for loop-based array construction. While this optimization yields\n // significant benefits in Brillig where the loops are expected to not be optimized, it is not relevant in ACIR\n // where the loops are expected to be optimized away.\n\n let param_name = params[0].0;\n quote {\n let $serialized_params_name = $crate::traits::Serialize::serialize($prefix_quote$param_name);\n }\n } else {\n // For multiple struct members, generate serialization code that:\n // 1. Serializes each member\n // 2. Copies the serialized fields into the serialize array at the correct offset\n // 3. Updates the offset for the next member\n let serialization_of_struct_members = params\n .map(|(param_name, param_type): (Quoted, Type)| {\n quote {\n let serialized_member = $crate::traits::Serialize::serialize($prefix_quote$param_name);\n let serialized_member_len = <$param_type as $crate::traits::Serialize>::N;\n for i in 0..serialized_member_len {\n $serialized_params_name[i + offset] = serialized_member[i];\n }\n offset += serialized_member_len;\n }\n })\n .join(quote {});\n\n quote {\n let mut $serialized_params_name = [0; $params_len_quote];\n let mut offset = 0;\n\n $serialization_of_struct_members\n }\n };\n\n (body, params_len_quote, serialized_params_name)\n}\n\n/// Generates a quoted expression that computes the total serialized length of function parameters.\n///\n/// # Parameters\n/// * `params` - An array of tuples where each tuple contains a quoted parameter name and its Type. The type needs\n/// to implement the Serialize trait.\n///\n/// # Returns\n/// A quoted expression that evaluates to:\n/// * `0` if there are no parameters\n/// * `(<type1 as Serialize>::N + <type2 as Serialize>::N + ...)` for one or more parameters\npub comptime fn get_params_len_quote(params: [(Quoted, Type)]) -> Quoted {\n if params.len() == 0 {\n quote { 0 }\n } else {\n let params_quote_without_parentheses = params\n .map(|(_, param_type): (Quoted, Type)| {\n quote {\n <$param_type as $crate::traits::Serialize>::N\n }\n })\n .join(quote {+});\n quote { ($params_quote_without_parentheses) }\n }\n}\n"
|
|
3414
3414
|
},
|
|
3415
|
-
"
|
|
3415
|
+
"361": {
|
|
3416
3416
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/poseidon2.nr",
|
|
3417
3417
|
"source": "use crate::constants::TWO_POW_64;\nuse crate::traits::{Deserialize, Serialize};\nuse std::meta::derive;\n// NB: This is a clone of noir/noir-repo/noir_stdlib/src/hash/poseidon2.nr\n// It exists as we sometimes need to perform custom absorption, but the stdlib version\n// has a private absorb() method (it's also designed to just be a hasher)\n// Can be removed when standalone noir poseidon lib exists: See noir#6679\n\ncomptime global RATE: u32 = 3;\n\n#[derive(Deserialize, Eq, Serialize)]\npub struct Poseidon2Sponge {\n pub cache: [Field; 3],\n pub state: [Field; 4],\n pub cache_size: u32,\n pub squeeze_mode: bool, // 0 => absorb, 1 => squeeze\n}\n\nimpl Poseidon2Sponge {\n #[no_predicates]\n pub fn hash<let N: u32>(input: [Field; N], message_size: u32) -> Field {\n Poseidon2Sponge::hash_internal(input, message_size, message_size != N)\n }\n\n pub(crate) fn new(iv: Field) -> Poseidon2Sponge {\n let mut result =\n Poseidon2Sponge { cache: [0; 3], state: [0; 4], cache_size: 0, squeeze_mode: false };\n result.state[RATE] = iv;\n result\n }\n\n fn perform_duplex(&mut self) {\n // add the cache into sponge state\n for i in 0..RATE {\n // We effectively zero-pad the cache by only adding to the state\n // cache that is less than the specified `cache_size`\n if i < self.cache_size {\n self.state[i] += self.cache[i];\n }\n }\n self.state = std::hash::poseidon2_permutation(self.state, 4);\n }\n\n pub fn absorb(&mut self, input: Field) {\n assert(!self.squeeze_mode);\n if self.cache_size == RATE {\n // If we're absorbing, and the cache is full, apply the sponge permutation to compress the cache\n self.perform_duplex();\n self.cache[0] = input;\n self.cache_size = 1;\n } else {\n // If we're absorbing, and the cache is not full, add the input into the cache\n self.cache[self.cache_size] = input;\n self.cache_size += 1;\n }\n }\n\n pub fn squeeze(&mut self) -> Field {\n assert(!self.squeeze_mode);\n // If we're in absorb mode, apply sponge permutation to compress the cache.\n self.perform_duplex();\n self.squeeze_mode = true;\n\n // Pop one item off the top of the permutation and return it.\n self.state[0]\n }\n\n fn hash_internal<let N: u32>(\n input: [Field; N],\n in_len: u32,\n is_variable_length: bool,\n ) -> Field {\n let iv: Field = (in_len as Field) * TWO_POW_64;\n let mut sponge = Poseidon2Sponge::new(iv);\n for i in 0..input.len() {\n if i < in_len {\n sponge.absorb(input[i]);\n }\n }\n\n sponge.squeeze()\n }\n}\n"
|
|
3418
3418
|
},
|
|
3419
|
-
"
|
|
3419
|
+
"373": {
|
|
3420
3420
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/storage/map.nr",
|
|
3421
3421
|
"source": "use crate::{hash::poseidon2_hash, traits::ToField};\n\n// TODO: Move this to abis/public_data/storage/map.nr\npub fn derive_storage_slot_in_map<K>(storage_slot: Field, key: K) -> Field\nwhere\n K: ToField,\n{\n poseidon2_hash([storage_slot, key.to_field()])\n}\n\nmod test {\n use crate::{address::AztecAddress, storage::map::derive_storage_slot_in_map, traits::FromField};\n\n #[test]\n fn test_derive_storage_slot_in_map_matches_typescript() {\n let map_slot = 0x132258fb6962c4387ba659d9556521102d227549a386d39f0b22d1890d59c2b5;\n let key = AztecAddress::from_field(\n 0x302dbc2f9b50a73283d5fb2f35bc01eae8935615817a0b4219a057b2ba8a5a3f,\n );\n\n let slot = derive_storage_slot_in_map(map_slot, key);\n\n // The following value was generated by `map_slot.test.ts`\n let slot_from_typescript =\n 0x15b9fe39449affd8b377461263e9d2b610b9ad40580553500b4e41d9cbd887ac;\n\n assert_eq(slot, slot_from_typescript);\n }\n}\n"
|
|
3422
3422
|
},
|
|
3423
|
-
"
|
|
3423
|
+
"389": {
|
|
3424
3424
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/traits.nr",
|
|
3425
3425
|
"source": "use crate::meta::{derive_deserialize, derive_packable, derive_serialize};\nuse crate::utils::field::field_from_bytes;\n\n// Trait: is_empty\n//\n// The general is_empty trait checks if a data type is is empty,\n// and it defines empty for the basic data types as 0.\n//\n// If a Field is equal to zero, then it is regarded as zero.\n// We will go with this definition for now, however it can be problematic\n// if a value can actually be zero. In a future refactor, we can\n// use the optional type for safety. Doing it now would lead to a worse devex\n// and would make it harder to sync up with the cpp code.\n// Preferred over Default trait to convey intent, as default doesn't necessarily mean empty.\npub trait Empty: Eq {\n fn empty() -> Self;\n\n fn is_empty(self) -> bool {\n self.eq(Self::empty())\n }\n\n // Requires this Noir fix: https://github.com/noir-lang/noir/issues/9002\n // fn assert_not_empty<let U: u32>(self, msg: str<U>) { // This msg version was failing with weird compiler errors.\n // // We provide a default impl but it's likely inefficient.\n // // The reason we include this function is because there's a lot of\n // // opportunity for optimisation on a per-struct basis.\n // // You only need to show one element is not empty to know that the whole thing\n // // is not empty.\n // // If you know an element of your struct which should always be nonempty,\n // // you can write an impl that solely checks that that element is nonempty.\n // assert(!self.is_empty(), msg);\n // }\n\n // This default impl is overwritten by types like arrays, because there's a much\n // more efficient approach.\n fn assert_empty<let S: u32>(self, msg: str<S>) {\n assert(self.is_empty(), msg);\n }\n}\n\nimpl Empty for Field {\n #[inline_always]\n fn empty() -> Self {\n 0\n }\n}\n\nimpl Empty for bool {\n #[inline_always]\n fn empty() -> Self {\n false\n }\n}\n\nimpl Empty for u1 {\n #[inline_always]\n fn empty() -> Self {\n 0\n }\n}\nimpl Empty for u8 {\n #[inline_always]\n fn empty() -> Self {\n 0\n }\n}\nimpl Empty for u16 {\n fn empty() -> Self {\n 0\n }\n}\nimpl Empty for u32 {\n #[inline_always]\n fn empty() -> Self {\n 0\n }\n}\nimpl Empty for u64 {\n #[inline_always]\n fn empty() -> Self {\n 0\n }\n}\nimpl Empty for u128 {\n #[inline_always]\n fn empty() -> Self {\n 0\n }\n}\n\nimpl<T, let N: u32> Empty for [T; N]\nwhere\n T: Empty,\n{\n #[inline_always]\n fn empty() -> Self {\n [T::empty(); N]\n }\n\n fn is_empty(self) -> bool {\n self.all(|elem| elem.is_empty())\n }\n\n fn assert_empty<let S: u32>(self, msg: str<S>) -> () {\n self.for_each(|elem| elem.assert_empty(msg))\n }\n}\n\nimpl<T> Empty for [T]\nwhere\n T: Empty,\n{\n #[inline_always]\n fn empty() -> Self {\n [T::empty()]\n }\n\n fn is_empty(self) -> bool {\n self.all(|elem| elem.is_empty())\n }\n\n fn assert_empty<let S: u32>(self, msg: str<S>) -> () {\n self.for_each(|elem| elem.assert_empty(msg))\n }\n}\nimpl<A, B> Empty for (A, B)\nwhere\n A: Empty,\n B: Empty,\n{\n #[inline_always]\n fn empty() -> Self {\n (A::empty(), B::empty())\n }\n}\n\nimpl<T> Empty for Option<T>\nwhere\n T: Eq,\n{\n #[inline_always]\n fn empty() -> Self {\n Option::none()\n }\n}\n\n// pub fn is_empty<T>(item: T) -> bool\n// where\n// T: Empty,\n// {\n// item.eq(T::empty())\n// }\n\n// pub fn is_empty_array<T, let N: u32>(array: [T; N]) -> bool\n// where\n// T: Empty,\n// {\n// array.all(|elem| is_empty(elem))\n// }\n\n// pub fn assert_empty<T>(item: T) -> ()\n// where\n// T: Empty,\n// {\n// assert(item.eq(T::empty()))\n// }\n\n// pub fn assert_empty_array<T, let N: u32>(array: [T; N]) -> ()\n// where\n// T: Empty,\n// {\n// // A cheaper option than `is_empty_array` for if you don't need to gracefully\n// // handle a bool result.\n// // Avoids the `&` operator of `is_empty_array`'s `.all()` call.\n// for i in 0..N {\n// assert(is_empty(array[i]));\n// }\n// }\n\npub trait Hash {\n fn hash(self) -> Field;\n}\n\npub trait ToField {\n fn to_field(self) -> Field;\n}\n\nimpl ToField for Field {\n #[inline_always]\n fn to_field(self) -> Field {\n self\n }\n}\n\nimpl ToField for bool {\n #[inline_always]\n fn to_field(self) -> Field {\n self as Field\n }\n}\nimpl ToField for u1 {\n #[inline_always]\n fn to_field(self) -> Field {\n self as Field\n }\n}\nimpl ToField for u8 {\n #[inline_always]\n fn to_field(self) -> Field {\n self as Field\n }\n}\nimpl ToField for u16 {\n fn to_field(self) -> Field {\n self as Field\n }\n}\nimpl ToField for u32 {\n #[inline_always]\n fn to_field(self) -> Field {\n self as Field\n }\n}\nimpl ToField for u64 {\n #[inline_always]\n fn to_field(self) -> Field {\n self as Field\n }\n}\nimpl ToField for u128 {\n #[inline_always]\n fn to_field(self) -> Field {\n self as Field\n }\n}\nimpl<let N: u32> ToField for str<N> {\n #[inline_always]\n fn to_field(self) -> Field {\n assert(N < 32, \"String doesn't fit in a field, consider using Serialize instead\");\n field_from_bytes(self.as_bytes(), true)\n }\n}\n\npub trait FromField {\n fn from_field(value: Field) -> Self;\n}\n\nimpl FromField for Field {\n #[inline_always]\n fn from_field(value: Field) -> Self {\n value\n }\n}\n\nimpl FromField for bool {\n #[inline_always]\n fn from_field(value: Field) -> Self {\n value != 0\n }\n}\nimpl FromField for u1 {\n #[inline_always]\n fn from_field(value: Field) -> Self {\n value as u1\n }\n}\nimpl FromField for u8 {\n #[inline_always]\n fn from_field(value: Field) -> Self {\n value as u8\n }\n}\nimpl FromField for u16 {\n fn from_field(value: Field) -> Self {\n value as u16\n }\n}\nimpl FromField for u32 {\n #[inline_always]\n fn from_field(value: Field) -> Self {\n value as u32\n }\n}\nimpl FromField for u64 {\n #[inline_always]\n fn from_field(value: Field) -> Self {\n value as u64\n }\n}\nimpl FromField for u128 {\n #[inline_always]\n fn from_field(value: Field) -> Self {\n value as u128\n }\n}\n\n// docs:start:serialize\n/// Trait for serializing Noir types into arrays of Fields.\n///\n/// An implementation of the Serialize trait has to follow Noir's intrinsic serialization (each member of a struct\n/// converted directly into one or more Fields without any packing or compression). This trait (and Deserialize) are\n/// typically used to communicate between Noir and TypeScript (via oracles and function arguments).\n///\n/// # On Following Noir's Intrinsic Serialization\n/// When calling a Noir function from TypeScript (TS), first the function arguments are serialized into an array\n/// of fields. This array is then included in the initial witness. Noir's intrinsic serialization is then used\n/// to deserialize the arguments from the witness. When the same Noir function is called from Noir this Serialize trait\n/// is used instead of the serialization in TS. For this reason we need to have a match between TS serialization,\n/// Noir's intrinsic serialization and the implementation of this trait. If there is a mismatch, the function calls\n/// fail with an arguments hash mismatch error message.\n///\n/// # Associated Constants\n/// * `N` - The length of the output Field array, known at compile time\n///\n/// # Example\n/// ```\n/// impl<let N: u32> Serialize for str<N> {\n/// let N: u32 = N;\n///\n/// fn serialize(self) -> [Field; Self::N] {\n/// let bytes = self.as_bytes();\n/// let mut fields = [0; Self::N];\n/// for i in 0..bytes.len() {\n/// fields[i] = bytes[i] as Field; // Each byte gets its own Field\n/// }\n/// fields\n/// }\n/// }\n/// ```\n#[derive_via(derive_serialize)]\npub trait Serialize {\n let N: u32;\n\n fn serialize(self) -> [Field; N];\n}\n// docs:end:serialize\n\nimpl<let M: u32> Serialize for str<M> {\n let N: u32 = M;\n\n #[inline_always]\n fn serialize(self) -> [Field; Self::N] {\n let bytes = self.as_bytes();\n let mut fields = [0; Self::N];\n for i in 0..bytes.len() {\n fields[i] = bytes[i] as Field;\n }\n fields\n }\n}\n\n/// Implementation of Deserialize for BoundedVec.\n///\n/// This implementation deserializes a BoundedVec from an array of Fields. The array contains:\n/// 1. The serialized items, each taking up T::N Fields\n/// 2. The length of the BoundedVec as the last Field\n///\n/// # Type Parameters\n/// * `T` - The type of items stored in the BoundedVec, must implement Deserialize\n/// * `M` - The maximum length of the BoundedVec\n///\n/// # Fields Array Layout\n/// [item1_field1, item1_field2, ..., item2_field1, item2_field2, ..., length]\n/// Where:\n/// - itemN_fieldM: The M-th Field of the N-th item (T::N Fields per item)\n/// - length: The number of items in the BoundedVec (1 Field)\n///\n/// Total length N = T::N * M + 1, where:\n/// - T::N is the number of Fields needed to deserialize one item\n/// - M is the maximum length of the BoundedVec\n/// - +1 is for storing the length\n///\n/// # Note\n/// Not deriving this because it's not supported to call derive_deserialize on a \"remote\" struct (and it will never\n/// be supported).\nimpl<T, let M: u32> Deserialize for BoundedVec<T, M>\nwhere\n T: Deserialize,\n{\n let N: u32 = <T as Deserialize>::N * M + 1;\n\n #[inline_always]\n fn deserialize(fields: [Field; Self::N]) -> Self {\n let mut new_bounded_vec: BoundedVec<T, M> = BoundedVec::new();\n\n // Length is stored in the last field as we need to match intrinsic Noir serialization and the `len` struct\n // field is after `storage` struct field (see `bounded_vec.nr` in noir-stdlib)\n let len = fields[<T as Deserialize>::N * M] as u32;\n\n for i in 0..len {\n let mut nested_fields = [0; <T as Deserialize>::N];\n for j in 0..<T as Deserialize>::N {\n nested_fields[j] = fields[i * <T as Deserialize>::N + j];\n }\n\n let item = T::deserialize(nested_fields);\n new_bounded_vec.push(item);\n }\n\n new_bounded_vec\n }\n}\n\n// This may cause issues if used as program input, because noir disallows empty arrays for program input.\n// I think this is okay because I don't foresee a unit type being used as input. But leaving this comment as a hint\n// if someone does run into this in the future.\nimpl Deserialize for () {\n let N: u32 = 0;\n\n fn deserialize(_fields: [Field; Self::N]) -> Self {\n ()\n }\n}\n\n// Note: Not deriving this because it's not supported to call derive_serialize on a \"remote\" struct (and it will never\n// be supported).\nimpl<T, let M: u32> Serialize for BoundedVec<T, M>\nwhere\n T: Serialize,\n{\n let N: u32 = <T as Serialize>::N * M + 1; // +1 for the length of the BoundedVec\n\n #[inline_always]\n fn serialize(self) -> [Field; Self::N] {\n let mut fields = [0; Self::N];\n\n let storage = self.storage();\n\n for i in 0..M {\n let serialized_item = storage[i].serialize();\n\n for j in 0..<T as Serialize>::N {\n fields[i * <T as Serialize>::N + j] = serialized_item[j];\n }\n }\n\n // Length is stored in the last field as we need to match intrinsic Noir serialization and the `len` struct\n // field is after `storage` struct field (see `bounded_vec.nr` in noir-stdlib)\n fields[<T as Serialize>::N * M] = self.len() as Field;\n\n fields\n }\n}\n\n// docs:start:deserialize\n/// Trait for deserializing Noir types from arrays of Fields.\n///\n/// An implementation of the Deserialize trait has to follow Noir's intrinsic serialization (each member of a struct\n/// converted directly into one or more Fields without any packing or compression). This trait is typically used when\n/// deserializing return values from function calls in Noir. Since the same function could be called from TypeScript\n/// (TS), in which case the TS deserialization would get used, we need to have a match between the 2.\n///\n/// # Associated Constants\n/// * `N` - The length of the input Field array, known at compile time\n///\n/// # Example\n/// ```\n/// impl<let M: u32> Deserialize for str<M> {\n/// let N: u32 = M;\n///\n/// #[inline_always]\n/// fn deserialize(fields: [Field; Self::N]) -> Self {\n/// str::<Self::N>::from(fields.map(|value| value as u8))\n/// }\n/// }\n/// ```\n#[derive_via(derive_deserialize)]\npub trait Deserialize {\n let N: u32;\n\n fn deserialize(fields: [Field; N]) -> Self;\n}\n// docs:end:deserialize\n\nimpl<let M: u32> Deserialize for str<M> {\n let N: u32 = M;\n\n #[inline_always]\n fn deserialize(fields: [Field; Self::N]) -> Self {\n str::<Self::N>::from(fields.map(|value| value as u8))\n }\n}\n\n/// Trait for efficiently packing and unpacking Noir types into and from arrays of Fields.\n///\n/// The `Packable` trait allows types to be serialized and deserialized with a focus on minimizing the size of\n/// the resulting Field array. This trait is used when storage efficiency is critical (e.g. when storing data\n/// in the contract's public storage).\n///\n/// # Associated Constants\n/// * `N` - The length of the Field array, known at compile time\n#[derive_via(derive_packable)]\npub trait Packable {\n let N: u32;\n\n /// Packs the current value into a compact array of `Field` elements.\n fn pack(self) -> [Field; N];\n\n /// Unpacks a compact array of `Field` elements into the original value.\n fn unpack(fields: [Field; N]) -> Self;\n}\n\n#[test]\nunconstrained fn bounded_vec_serialization() {\n // Test empty BoundedVec\n let empty_vec: BoundedVec<Field, 3> = BoundedVec::from_array([]);\n let serialized = empty_vec.serialize();\n let deserialized = BoundedVec::<Field, 3>::deserialize(serialized);\n assert_eq(empty_vec, deserialized);\n assert_eq(deserialized.len(), 0);\n\n // Test partially filled BoundedVec\n let partial_vec: BoundedVec<[u32; 2], 3> = BoundedVec::from_array([[1, 2]]);\n let serialized = partial_vec.serialize();\n let deserialized = BoundedVec::<[u32; 2], 3>::deserialize(serialized);\n assert_eq(partial_vec, deserialized);\n assert_eq(deserialized.len(), 1);\n assert_eq(deserialized.get(0), [1, 2]);\n\n // Test full BoundedVec\n let full_vec: BoundedVec<[u32; 2], 3> = BoundedVec::from_array([[1, 2], [3, 4], [5, 6]]);\n let serialized = full_vec.serialize();\n let deserialized = BoundedVec::<[u32; 2], 3>::deserialize(serialized);\n assert_eq(full_vec, deserialized);\n assert_eq(deserialized.len(), 3);\n assert_eq(deserialized.get(0), [1, 2]);\n assert_eq(deserialized.get(1), [3, 4]);\n assert_eq(deserialized.get(2), [5, 6]);\n}\n"
|
|
3426
3426
|
},
|
|
3427
|
-
"
|
|
3427
|
+
"391": {
|
|
3428
3428
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/type_packing.nr",
|
|
3429
3429
|
"source": "use crate::traits::Packable;\n\nglobal BOOL_PACKED_LEN: u32 = 1;\nglobal U8_PACKED_LEN: u32 = 1;\nglobal U16_PACKED_LEN: u32 = 1;\nglobal U32_PACKED_LEN: u32 = 1;\nglobal U64_PACKED_LEN: u32 = 1;\nglobal U128_PACKED_LEN: u32 = 1;\nglobal FIELD_PACKED_LEN: u32 = 1;\nglobal I8_PACKED_LEN: u32 = 1;\nglobal I16_PACKED_LEN: u32 = 1;\nglobal I32_PACKED_LEN: u32 = 1;\nglobal I64_PACKED_LEN: u32 = 1;\n\nimpl Packable for bool {\n let N: u32 = BOOL_PACKED_LEN;\n\n #[inline_always]\n fn pack(self) -> [Field; Self::N] {\n [self as Field]\n }\n\n #[inline_always]\n fn unpack(fields: [Field; Self::N]) -> bool {\n (fields[0] as u1) != 0\n }\n}\n\nimpl Packable for u8 {\n let N: u32 = U8_PACKED_LEN;\n\n #[inline_always]\n fn pack(self) -> [Field; Self::N] {\n [self as Field]\n }\n\n #[inline_always]\n fn unpack(fields: [Field; Self::N]) -> Self {\n fields[0] as u8\n }\n}\n\nimpl Packable for u16 {\n let N: u32 = U16_PACKED_LEN;\n\n #[inline_always]\n fn pack(self) -> [Field; Self::N] {\n [self as Field]\n }\n\n #[inline_always]\n fn unpack(fields: [Field; Self::N]) -> Self {\n fields[0] as u16\n }\n}\n\nimpl Packable for u32 {\n let N: u32 = U32_PACKED_LEN;\n\n #[inline_always]\n fn pack(self) -> [Field; Self::N] {\n [self as Field]\n }\n\n #[inline_always]\n fn unpack(fields: [Field; Self::N]) -> Self {\n fields[0] as u32\n }\n}\n\nimpl Packable for u64 {\n let N: u32 = U64_PACKED_LEN;\n\n #[inline_always]\n fn pack(self) -> [Field; Self::N] {\n [self as Field]\n }\n\n #[inline_always]\n fn unpack(fields: [Field; Self::N]) -> Self {\n fields[0] as u64\n }\n}\n\nimpl Packable for u128 {\n let N: u32 = U128_PACKED_LEN;\n\n #[inline_always]\n fn pack(self) -> [Field; Self::N] {\n [self as Field]\n }\n\n #[inline_always]\n fn unpack(fields: [Field; Self::N]) -> Self {\n fields[0] as u128\n }\n}\n\nimpl Packable for Field {\n let N: u32 = FIELD_PACKED_LEN;\n\n #[inline_always]\n fn pack(self) -> [Field; Self::N] {\n [self]\n }\n\n #[inline_always]\n fn unpack(fields: [Field; Self::N]) -> Self {\n fields[0]\n }\n}\n\nimpl Packable for i8 {\n let N: u32 = I8_PACKED_LEN;\n\n #[inline_always]\n fn pack(self) -> [Field; Self::N] {\n [self as u8 as Field]\n }\n\n #[inline_always]\n fn unpack(fields: [Field; Self::N]) -> Self {\n fields[0] as u8 as i8\n }\n}\n\nimpl Packable for i16 {\n let N: u32 = I16_PACKED_LEN;\n\n #[inline_always]\n fn pack(self) -> [Field; Self::N] {\n [self as u16 as Field]\n }\n\n #[inline_always]\n fn unpack(fields: [Field; Self::N]) -> Self {\n fields[0] as u16 as i16\n }\n}\n\nimpl Packable for i32 {\n let N: u32 = I32_PACKED_LEN;\n\n #[inline_always]\n fn pack(self) -> [Field; Self::N] {\n [self as u32 as Field]\n }\n\n #[inline_always]\n fn unpack(fields: [Field; Self::N]) -> Self {\n fields[0] as u32 as i32\n }\n}\n\nimpl Packable for i64 {\n let N: u32 = I64_PACKED_LEN;\n\n #[inline_always]\n fn pack(self) -> [Field; Self::N] {\n [self as u64 as Field]\n }\n\n #[inline_always]\n fn unpack(fields: [Field; Self::N]) -> Self {\n fields[0] as u64 as i64\n }\n}\n\nimpl<T, let M: u32> Packable for [T; M]\nwhere\n T: Packable,\n{\n let N: u32 = M * <T as Packable>::N;\n\n #[inline_always]\n fn pack(self) -> [Field; Self::N] {\n let mut result: [Field; Self::N] = std::mem::zeroed();\n for i in 0..M {\n let serialized = self[i].pack();\n for j in 0..<T as Packable>::N {\n result[i * <T as Packable>::N + j] = serialized[j];\n }\n }\n result\n }\n\n #[inline_always]\n fn unpack(fields: [Field; Self::N]) -> Self {\n let mut reader = crate::utils::reader::Reader::new(fields);\n let mut result: [T; M] = std::mem::zeroed();\n reader.read_struct_array::<T, <T as Packable>::N, M>(Packable::unpack, result)\n }\n}\n\n#[test]\nfn test_u16_packing() {\n let a: u16 = 10;\n assert_eq(a, u16::unpack(a.pack()));\n}\n\n#[test]\nfn test_i8_packing() {\n let a: i8 = -10;\n assert_eq(a, i8::unpack(a.pack()));\n}\n\n#[test]\nfn test_i16_packing() {\n let a: i16 = -10;\n assert_eq(a, i16::unpack(a.pack()));\n}\n\n#[test]\nfn test_i32_packing() {\n let a: i32 = -10;\n assert_eq(a, i32::unpack(a.pack()));\n}\n\n#[test]\nfn test_i64_packing() {\n let a: i64 = -10;\n assert_eq(a, i64::unpack(a.pack()));\n}\n"
|
|
3430
3430
|
},
|
|
3431
|
-
"
|
|
3431
|
+
"392": {
|
|
3432
3432
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/type_serialization.nr",
|
|
3433
3433
|
"source": "use crate::traits::{Deserialize, Serialize};\n\nglobal U1_SERIALIZED_LEN: u32 = 1;\nglobal BOOL_SERIALIZED_LEN: u32 = 1;\nglobal U8_SERIALIZED_LEN: u32 = 1;\nglobal U16_SERIALIZED_LEN: u32 = 1;\nglobal U32_SERIALIZED_LEN: u32 = 1;\nglobal U64_SERIALIZED_LEN: u32 = 1;\nglobal U128_SERIALIZED_LEN: u32 = 1;\nglobal FIELD_SERIALIZED_LEN: u32 = 1;\nglobal I8_SERIALIZED_LEN: u32 = 1;\nglobal I16_SERIALIZED_LEN: u32 = 1;\nglobal I32_SERIALIZED_LEN: u32 = 1;\nglobal I64_SERIALIZED_LEN: u32 = 1;\n\nimpl Serialize for bool {\n let N: u32 = BOOL_SERIALIZED_LEN;\n\n #[inline_always]\n fn serialize(self) -> [Field; Self::N] {\n [self as Field]\n }\n}\n\nimpl Deserialize for bool {\n let N: u32 = BOOL_SERIALIZED_LEN;\n\n #[inline_always]\n fn deserialize(fields: [Field; Self::N]) -> bool {\n fields[0] != 0\n }\n}\n\nimpl Serialize for u1 {\n let N: u32 = U1_SERIALIZED_LEN;\n\n #[inline_always]\n fn serialize(self) -> [Field; Self::N] {\n [self as Field]\n }\n}\n\nimpl Deserialize for u1 {\n let N: u32 = U1_SERIALIZED_LEN;\n\n #[inline_always]\n fn deserialize(fields: [Field; Self::N]) -> Self {\n fields[0] as u1\n }\n}\n\nimpl Serialize for u8 {\n let N: u32 = U8_SERIALIZED_LEN;\n\n #[inline_always]\n fn serialize(self) -> [Field; Self::N] {\n [self as Field]\n }\n}\n\nimpl Deserialize for u8 {\n let N: u32 = U8_SERIALIZED_LEN;\n\n #[inline_always]\n fn deserialize(fields: [Field; Self::N]) -> Self {\n fields[0] as u8\n }\n}\n\nimpl Serialize for u16 {\n let N: u32 = U16_SERIALIZED_LEN;\n\n #[inline_always]\n fn serialize(self) -> [Field; Self::N] {\n [self as Field]\n }\n}\n\nimpl Deserialize for u16 {\n let N: u32 = U16_SERIALIZED_LEN;\n\n #[inline_always]\n fn deserialize(fields: [Field; Self::N]) -> Self {\n fields[0] as u16\n }\n}\n\nimpl Serialize for u32 {\n let N: u32 = U32_SERIALIZED_LEN;\n\n #[inline_always]\n fn serialize(self) -> [Field; Self::N] {\n [self as Field]\n }\n}\n\nimpl Deserialize for u32 {\n let N: u32 = U32_SERIALIZED_LEN;\n\n #[inline_always]\n fn deserialize(fields: [Field; Self::N]) -> Self {\n fields[0] as u32\n }\n}\n\nimpl Serialize for u64 {\n let N: u32 = U64_SERIALIZED_LEN;\n\n #[inline_always]\n fn serialize(self) -> [Field; Self::N] {\n [self as Field]\n }\n}\n\nimpl Deserialize for u64 {\n let N: u32 = U64_SERIALIZED_LEN;\n\n #[inline_always]\n fn deserialize(fields: [Field; Self::N]) -> Self {\n fields[0] as u64\n }\n}\n\nimpl Serialize for u128 {\n let N: u32 = U128_SERIALIZED_LEN;\n\n #[inline_always]\n fn serialize(self) -> [Field; Self::N] {\n [self as Field]\n }\n}\n\nimpl Deserialize for u128 {\n let N: u32 = U128_SERIALIZED_LEN;\n\n #[inline_always]\n fn deserialize(fields: [Field; Self::N]) -> Self {\n fields[0] as u128\n }\n}\n\nimpl Serialize for Field {\n let N: u32 = FIELD_SERIALIZED_LEN;\n\n #[inline_always]\n fn serialize(self) -> [Field; Self::N] {\n [self]\n }\n}\n\nimpl Deserialize for Field {\n let N: u32 = FIELD_SERIALIZED_LEN;\n\n #[inline_always]\n fn deserialize(fields: [Field; Self::N]) -> Self {\n fields[0]\n }\n}\n\nimpl Serialize for i8 {\n let N: u32 = I8_SERIALIZED_LEN;\n\n #[inline_always]\n fn serialize(self) -> [Field; Self::N] {\n [self as u8 as Field]\n }\n}\n\nimpl Deserialize for i8 {\n let N: u32 = I8_SERIALIZED_LEN;\n\n #[inline_always]\n fn deserialize(fields: [Field; Self::N]) -> Self {\n fields[0] as u8 as i8\n }\n}\n\nimpl Serialize for i16 {\n let N: u32 = I16_SERIALIZED_LEN;\n\n #[inline_always]\n fn serialize(self) -> [Field; Self::N] {\n [self as u16 as Field]\n }\n}\n\nimpl Deserialize for i16 {\n let N: u32 = I16_SERIALIZED_LEN;\n\n #[inline_always]\n fn deserialize(fields: [Field; Self::N]) -> Self {\n fields[0] as u16 as i16\n }\n}\n\nimpl Serialize for i32 {\n let N: u32 = I32_SERIALIZED_LEN;\n\n #[inline_always]\n fn serialize(self) -> [Field; Self::N] {\n [self as u32 as Field]\n }\n}\n\nimpl Deserialize for i32 {\n let N: u32 = I32_SERIALIZED_LEN;\n\n #[inline_always]\n fn deserialize(fields: [Field; Self::N]) -> Self {\n fields[0] as u32 as i32\n }\n}\n\nimpl Serialize for i64 {\n let N: u32 = I64_SERIALIZED_LEN;\n\n #[inline_always]\n fn serialize(self) -> [Field; Self::N] {\n [self as u64 as Field]\n }\n}\n\nimpl Deserialize for i64 {\n let N: u32 = I64_SERIALIZED_LEN;\n\n #[inline_always]\n fn deserialize(fields: [Field; Self::N]) -> Self {\n fields[0] as u64 as i64\n }\n}\n\nimpl<T, let M: u32> Serialize for [T; M]\nwhere\n T: Serialize,\n{\n let N: u32 = <T as Serialize>::N * M;\n #[inline_always]\n fn serialize(self) -> [Field; Self::N] {\n let mut result: [Field; _] = std::mem::zeroed();\n for i in 0..M {\n let serialized_t = self[i].serialize();\n for j in 0..<T as Serialize>::N {\n result[i * <T as Serialize>::N + j] = serialized_t[j];\n }\n }\n result\n }\n}\n\nimpl<T, let M: u32> Deserialize for [T; M]\nwhere\n T: Deserialize,\n{\n let N: u32 = <T as Deserialize>::N * M;\n\n #[inline_always]\n fn deserialize(fields: [Field; Self::N]) -> Self {\n let mut reader = crate::utils::reader::Reader::new(fields);\n let mut result: [T; M] = std::mem::zeroed();\n reader.read_struct_array::<T, <T as Deserialize>::N, M>(Deserialize::deserialize, result)\n }\n}\n\nimpl<T> Serialize for Option<T>\nwhere\n T: Serialize,\n{\n let N: u32 = <T as Serialize>::N + 1;\n\n #[inline_always]\n fn serialize(self) -> [Field; Self::N] {\n let mut result: [Field; Self::N] = std::mem::zeroed();\n\n result[0] = if self.is_some() { 1 } else { 0 };\n\n let value_serialized = self.unwrap_unchecked().serialize();\n for i in 0..<T as Serialize>::N {\n result[1 + i] = value_serialized[i];\n }\n\n result\n }\n}\n\nimpl<T> Deserialize for Option<T>\nwhere\n T: Deserialize,\n{\n let N: u32 = <T as Deserialize>::N + 1;\n\n #[inline_always]\n fn deserialize(fields: [Field; Self::N]) -> Self {\n if fields[0] == 1 {\n let mut value_fields = [0; <T as Deserialize>::N];\n for i in 0..<T as Deserialize>::N {\n value_fields[i] = fields[1 + i];\n }\n\n Option::some(T::deserialize(value_fields))\n } else {\n Option::none()\n }\n }\n}\n\nmod test {\n use crate::traits::{Deserialize, Serialize};\n\n #[test]\n fn u16_serialization() {\n let a: u16 = 10;\n assert_eq(a, u16::deserialize(a.serialize()));\n }\n\n #[test]\n fn i8_serialization() {\n let a: i8 = -10;\n assert_eq(a, i8::deserialize(a.serialize()));\n }\n\n #[test]\n fn i16_serialization() {\n let a: i16 = -10;\n assert_eq(a, i16::deserialize(a.serialize()));\n }\n\n #[test]\n fn i32_serialization() {\n let a: i32 = -10;\n assert_eq(a, i32::deserialize(a.serialize()));\n }\n\n #[test]\n fn i64_serialization() {\n let a: i64 = -10;\n assert_eq(a, i64::deserialize(a.serialize()));\n }\n\n #[test]\n fn option_field_serialization() {\n let opt_some = Option::some(5);\n assert_eq(Option::<_>::deserialize(opt_some.serialize()), opt_some);\n\n let opt_none = Option::none();\n assert_eq(Option::<Field>::deserialize(opt_none.serialize()), opt_none);\n }\n\n #[test]\n fn array_serialization() {\n let array = [1, 2, 3, 4];\n\n let serialized: [Field; 4] = array.serialize();\n let deserialized: [Field; 4] = Deserialize::deserialize(serialized);\n assert_eq(deserialized, array);\n }\n\n #[test]\n fn nested_array_serialization() {\n let nested_array = [[1, 2, 3, 4], [5, 6, 7, 8]];\n\n let serialized: [Field; 8] = nested_array.serialize();\n let deserialized: [[Field; 4]; 2] = Deserialize::deserialize(serialized);\n\n assert_eq(deserialized, nested_array);\n }\n\n #[test]\n fn option_array_serialization() {\n let opt_some = Option::some([2, 5]);\n assert_eq(Option::<_>::deserialize(opt_some.serialize()), opt_some);\n\n let opt_none = Option::none();\n assert_eq(Option::<Field>::deserialize(opt_none.serialize()), opt_none);\n }\n}\n"
|
|
3434
3434
|
},
|
|
3435
|
-
"
|
|
3435
|
+
"399": {
|
|
3436
3436
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/utils/field.nr",
|
|
3437
3437
|
"source": "pub fn field_from_bytes<let N: u32>(bytes: [u8; N], big_endian: bool) -> Field {\n assert(bytes.len() < 32, \"field_from_bytes: N must be less than 32\");\n let mut as_field = 0;\n let mut offset = 1;\n for i in 0..N {\n let mut index = i;\n if big_endian {\n index = N - i - 1;\n }\n as_field += (bytes[index] as Field) * offset;\n offset *= 256;\n }\n\n as_field\n}\n\n// Convert a 32 byte array to a field element by truncating the final byte\npub fn field_from_bytes_32_trunc(bytes32: [u8; 32]) -> Field {\n // Convert it to a field element\n let mut v = 1;\n let mut high = 0 as Field;\n let mut low = 0 as Field;\n\n for i in 0..15 {\n // covers bytes 16..30 (31 is truncated and ignored)\n low = low + (bytes32[15 + 15 - i] as Field) * v;\n v = v * 256;\n // covers bytes 0..14\n high = high + (bytes32[14 - i] as Field) * v;\n }\n // covers byte 15\n low = low + (bytes32[15] as Field) * v;\n\n low + high * v\n}\n\n// TODO to radix returns u8, so we cannot use bigger radixes. It'd be ideal to use a radix of the maximum range-constrained integer noir supports\npub fn full_field_less_than(lhs: Field, rhs: Field) -> bool {\n lhs.lt(rhs)\n}\n\npub fn full_field_greater_than(lhs: Field, rhs: Field) -> bool {\n rhs.lt(lhs)\n}\n\npub fn min(f1: Field, f2: Field) -> Field {\n if f1.lt(f2) {\n f1\n } else {\n f2\n }\n}\n\n// TODO: write doc-comments and tests for these magic constants.\n\nglobal KNOWN_NON_RESIDUE: Field = 5; // This is a non-residue in Noir's native Field.\nglobal C1: u32 = 28;\nglobal C3: Field = 40770029410420498293352137776570907027550720424234931066070132305055;\nglobal C5: Field = 19103219067921713944291392827692070036145651957329286315305642004821462161904;\n\n// @dev: only use this for _huge_ exponents y, when writing a constrained function.\n// If you're only exponentiating by a small value, first consider writing-out the multiplications by hand.\n// Only after you've measured the gates of that approach, consider using the native Field::pow_32 function.\n// Only if your exponent is larger than 32 bits, resort to using this function.\npub fn pow(x: Field, y: Field) -> Field {\n let mut r = 1 as Field;\n let b: [u1; 254] = y.to_le_bits();\n\n for i in 0..254 {\n r *= r;\n r *= (b[254 - 1 - i] as Field) * x + (1 - b[254 - 1 - i] as Field);\n }\n\n r\n}\n\n/// Returns Option::some(sqrt) if there is a square root, and Option::none() if there isn't.\npub fn sqrt(x: Field) -> Option<Field> {\n // Safety: if the hint returns the square root of x, then we simply square it\n // check the result equals x. If x is not square, we return a value that\n // enables us to prove that fact (see the `else` clause below).\n let (is_sq, maybe_sqrt) = unsafe { __sqrt(x) };\n\n if is_sq {\n let sqrt = maybe_sqrt;\n validate_sqrt_hint(x, sqrt);\n Option::some(sqrt)\n } else {\n let not_sqrt_hint = maybe_sqrt;\n validate_not_sqrt_hint(x, not_sqrt_hint);\n Option::none()\n }\n}\n\n// Boolean indicating whether Field element is a square, i.e. whether there exists a y in Field s.t. x = y*y.\nunconstrained fn is_square(x: Field) -> bool {\n let v = pow(x, -1 / 2);\n v * (v - 1) == 0\n}\n\n// Tonelli-Shanks algorithm for computing the square root of a Field element.\n// Requires C1 = max{c: 2^c divides (p-1)}, where p is the order of Field\n// as well as C3 = (C2 - 1)/2, where C2 = (p-1)/(2^c1),\n// and C5 = ZETA^C2, where ZETA is a non-square element of Field.\n// These are pre-computed above as globals.\nunconstrained fn tonelli_shanks_sqrt(x: Field) -> Field {\n let mut z = pow(x, C3);\n let mut t = z * z * x;\n z *= x;\n let mut b = t;\n let mut c = C5;\n\n for i in 0..(C1 - 1) {\n for _j in 1..(C1 - i - 1) {\n b *= b;\n }\n\n z *= if b == 1 { 1 } else { c };\n\n c *= c;\n\n t *= if b == 1 { 1 } else { c };\n\n b = t;\n }\n\n z\n}\n\n// NB: this doesn't return an option, because in the case of there _not_ being a square root, we still want to return a field element that allows us to then assert in the _constrained_ sqrt function that there is no sqrt.\nunconstrained fn __sqrt(x: Field) -> (bool, Field) {\n let is_sq = is_square(x);\n if is_sq {\n let sqrt = tonelli_shanks_sqrt(x);\n (true, sqrt)\n } else {\n // Demonstrate that x is not a square (a.k.a. a \"quadratic non-residue\").\n // Facts:\n // The Legendre symbol (\"LS\") of x, is x^((p-1)/2) (mod p).\n // - If x is a square, LS(x) = 1\n // - If x is not a square, LS(x) = -1\n // - If x = 0, LS(x) = 0.\n //\n // Hence:\n // sq * sq = sq // 1 * 1 = 1\n // non-sq * non-sq = sq // -1 * -1 = 1\n // sq * non-sq = non-sq // -1 * 1 = -1\n //\n // See: https://en.wikipedia.org/wiki/Legendre_symbol\n let demo_x_not_square = x * KNOWN_NON_RESIDUE;\n let not_sqrt = tonelli_shanks_sqrt(demo_x_not_square);\n (false, not_sqrt)\n }\n}\n\nfn validate_sqrt_hint(x: Field, hint: Field) {\n assert(hint * hint == x, f\"The claimed_sqrt {hint} is not the sqrt of x {x}\");\n}\n\nfn validate_not_sqrt_hint(x: Field, hint: Field) {\n // We need this assertion, because x = 0 would pass the other assertions in this\n // function, and we don't want people to be able to prove that 0 is not square!\n assert(x != 0, \"0 has a square root; you cannot claim it is not square\");\n // Demonstrate that x is not a square (a.k.a. a \"quadratic non-residue\").\n //\n // Facts:\n // The Legendre symbol (\"LS\") of x, is x^((p-1)/2) (mod p).\n // - If x is a square, LS(x) = 1\n // - If x is not a square, LS(x) = -1\n // - If x = 0, LS(x) = 0.\n //\n // Hence:\n // 1. sq * sq = sq // 1 * 1 = 1\n // 2. non-sq * non-sq = sq // -1 * -1 = 1\n // 3. sq * non-sq = non-sq // -1 * 1 = -1\n //\n // See: https://en.wikipedia.org/wiki/Legendre_symbol\n //\n // We want to demonstrate that this below multiplication falls under bullet-point (2):\n let demo_x_not_square = x * KNOWN_NON_RESIDUE;\n // I.e. we want to demonstrate that `demo_x_not_square` has Legendre symbol 1\n // (i.e. that it is a square), so we prove that it is square below.\n // Why do we want to prove that it has LS 1?\n // Well, since it was computed with a known-non-residue, its squareness implies we're\n // in case 2 (something multiplied by a known-non-residue yielding a result which\n // has a LS of 1), which implies that x must be a non-square. The unconstrained\n // function gave us the sqrt of demo_x_not_square, so all we need to do is\n // assert its squareness:\n assert(\n hint * hint == demo_x_not_square,\n f\"The hint {hint} does not demonstrate that {x} is not a square\",\n );\n}\n\n#[test]\nunconstrained fn bytes_field_test() {\n // Tests correctness of field_from_bytes_32_trunc against existing methods\n // Bytes representing 0x543e0a6642ffeb8039296861765a53407bba62bd1c97ca43374de950bbe0a7\n let inputs = [\n 84, 62, 10, 102, 66, 255, 235, 128, 57, 41, 104, 97, 118, 90, 83, 64, 123, 186, 98, 189, 28,\n 151, 202, 67, 55, 77, 233, 80, 187, 224, 167,\n ];\n let field = field_from_bytes(inputs, true);\n let return_bytes: [u8; 31] = field.to_be_bytes();\n assert_eq(inputs, return_bytes);\n // 32 bytes - we remove the final byte, and check it matches the field\n let inputs2 = [\n 84, 62, 10, 102, 66, 255, 235, 128, 57, 41, 104, 97, 118, 90, 83, 64, 123, 186, 98, 189, 28,\n 151, 202, 67, 55, 77, 233, 80, 187, 224, 167, 158,\n ];\n let field2 = field_from_bytes_32_trunc(inputs2);\n let return_bytes2: [u8; 31] = field2.to_be_bytes();\n\n assert_eq(return_bytes2, return_bytes);\n assert_eq(field2, field);\n}\n\n#[test]\nunconstrained fn max_field_test() {\n // Tests the hardcoded value in constants.nr vs underlying modulus\n // NB: We can't use 0-1 in constants.nr as it will be transpiled incorrectly to ts and sol constants files\n let max_value = crate::constants::MAX_FIELD_VALUE;\n assert_eq(max_value, 0 - 1);\n // modulus == 0 is tested elsewhere, so below is more of a sanity check\n let max_bytes: [u8; 32] = max_value.to_be_bytes();\n let mod_bytes = std::field::modulus_be_bytes();\n for i in 0..31 {\n assert_eq(max_bytes[i], mod_bytes[i]);\n }\n assert_eq(max_bytes[31], mod_bytes[31] - 1);\n}\n\n#[test]\nunconstrained fn sqrt_valid_test() {\n let x = 16; // examples: 16, 9, 25, 81\n let result = sqrt(x);\n assert(result.is_some());\n assert_eq(result.unwrap() * result.unwrap(), x);\n}\n\n#[test]\nunconstrained fn sqrt_invalid_test() {\n let x = KNOWN_NON_RESIDUE; // has no square root in the field\n let result = sqrt(x);\n assert(result.is_none());\n}\n\n#[test]\nunconstrained fn sqrt_zero_test() {\n let result = sqrt(0);\n assert(result.is_some());\n assert_eq(result.unwrap(), 0);\n}\n\n#[test]\nunconstrained fn sqrt_one_test() {\n let result = sqrt(1);\n assert(result.is_some());\n assert_eq(result.unwrap() * result.unwrap(), 1);\n}\n\n#[test]\nunconstrained fn field_from_bytes_empty_test() {\n let empty: [u8; 0] = [];\n let result = field_from_bytes(empty, true);\n assert_eq(result, 0);\n\n let result_le = field_from_bytes(empty, false);\n assert_eq(result_le, 0);\n}\n\n#[test]\nunconstrained fn field_from_bytes_little_endian_test() {\n // Test little-endian conversion: [0x01, 0x02] should be 0x0201 = 513\n let bytes = [0x01, 0x02];\n let result_le = field_from_bytes(bytes, false);\n assert_eq(result_le, 0x0201);\n\n // Compare with big-endian: [0x01, 0x02] should be 0x0102 = 258\n let result_be = field_from_bytes(bytes, true);\n assert_eq(result_be, 0x0102);\n}\n\n#[test]\nunconstrained fn pow_test() {\n assert_eq(pow(2, 0), 1);\n assert_eq(pow(2, 1), 2);\n assert_eq(pow(2, 10), 1024);\n assert_eq(pow(3, 5), 243);\n assert_eq(pow(0, 5), 0);\n assert_eq(pow(1, 100), 1);\n}\n\n#[test]\nunconstrained fn min_test() {\n assert_eq(min(5, 10), 5);\n assert_eq(min(10, 5), 5);\n assert_eq(min(7, 7), 7);\n assert_eq(min(0, 1), 0);\n}\n\n#[test]\nunconstrained fn full_field_comparison_test() {\n assert(full_field_less_than(5, 10));\n assert(!full_field_less_than(10, 5));\n assert(!full_field_less_than(5, 5));\n\n assert(full_field_greater_than(10, 5));\n assert(!full_field_greater_than(5, 10));\n assert(!full_field_greater_than(5, 5));\n}\n\n#[test]\nunconstrained fn sqrt_has_two_roots_test() {\n // Every square has two roots: r and -r (i.e., p - r)\n // sqrt(16) can return 4 or -4\n let x = 16;\n let result = sqrt(x).unwrap();\n assert(result * result == x);\n // The other root is -result\n let other_root = 0 - result;\n assert(other_root * other_root == x);\n // Verify they are different (unless x = 0)\n assert(result != other_root);\n\n // Same for 9: roots are 3 and -3\n let y = 9;\n let result_y = sqrt(y).unwrap();\n assert(result_y * result_y == y);\n let other_root_y = 0 - result_y;\n assert(other_root_y * other_root_y == y);\n assert(result_y != other_root_y);\n}\n\n#[test]\nunconstrained fn sqrt_negative_one_test() {\n let x = 0 - 1;\n let result = sqrt(x);\n assert(result.unwrap() == 0x30644e72e131a029048b6e193fd841045cea24f6fd736bec231204708f703636);\n}\n\n#[test]\nunconstrained fn validate_sqrt_hint_valid_test() {\n // 4 is a valid sqrt of 16\n validate_sqrt_hint(16, 4);\n // -4 is also a valid sqrt of 16\n validate_sqrt_hint(16, 0 - 4);\n // 0 is a valid sqrt of 0\n validate_sqrt_hint(0, 0);\n // 1 is a valid sqrt of 1\n validate_sqrt_hint(1, 1);\n // -1 is also a valid sqrt of 1\n validate_sqrt_hint(1, 0 - 1);\n}\n\n#[test(should_fail_with = \"is not the sqrt of x\")]\nunconstrained fn validate_sqrt_hint_invalid_test() {\n // 5 is not a valid sqrt of 16\n validate_sqrt_hint(16, 5);\n}\n\n#[test]\nunconstrained fn validate_not_sqrt_hint_valid_test() {\n // 5 (KNOWN_NON_RESIDUE) is not a square.\n let x = KNOWN_NON_RESIDUE;\n let hint = tonelli_shanks_sqrt(x * KNOWN_NON_RESIDUE);\n validate_not_sqrt_hint(x, hint);\n}\n\n#[test(should_fail_with = \"0 has a square root\")]\nunconstrained fn validate_not_sqrt_hint_zero_test() {\n // 0 has a square root, so we cannot claim it is not square\n validate_not_sqrt_hint(0, 0);\n}\n\n#[test(should_fail_with = \"does not demonstrate that\")]\nunconstrained fn validate_not_sqrt_hint_wrong_hint_test() {\n // Provide a wrong hint for a non-square\n let x = KNOWN_NON_RESIDUE;\n validate_not_sqrt_hint(x, 123);\n}\n"
|
|
3438
3438
|
},
|
|
3439
|
-
"
|
|
3439
|
+
"403": {
|
|
3440
3440
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/utils/reader.nr",
|
|
3441
3441
|
"source": "pub struct Reader<let N: u32> {\n data: [Field; N],\n offset: u32,\n}\n\nimpl<let N: u32> Reader<N> {\n pub fn new(data: [Field; N]) -> Self {\n Self { data, offset: 0 }\n }\n\n pub fn read(&mut self) -> Field {\n let result = self.data[self.offset];\n self.offset += 1;\n result\n }\n\n pub fn read_u32(&mut self) -> u32 {\n self.read() as u32\n }\n\n pub fn read_u64(&mut self) -> u64 {\n self.read() as u64\n }\n\n pub fn read_bool(&mut self) -> bool {\n self.read() != 0\n }\n\n pub fn read_array<let K: u32>(&mut self) -> [Field; K] {\n let mut result = [0; K];\n for i in 0..K {\n result[i] = self.data[self.offset + i];\n }\n self.offset += K;\n result\n }\n\n pub fn read_struct<T, let K: u32>(&mut self, deserialise: fn([Field; K]) -> T) -> T {\n let result = deserialise(self.read_array());\n result\n }\n\n pub fn read_struct_array<T, let K: u32, let C: u32>(\n &mut self,\n deserialise: fn([Field; K]) -> T,\n mut result: [T; C],\n ) -> [T; C] {\n for i in 0..C {\n result[i] = self.read_struct(deserialise);\n }\n result\n }\n\n pub fn finish(self) {\n assert_eq(self.offset, self.data.len(), \"Reader did not read all data\");\n }\n}\n"
|
|
3442
3442
|
},
|
|
@@ -3470,11 +3470,11 @@
|
|
|
3470
3470
|
},
|
|
3471
3471
|
"69": {
|
|
3472
3472
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/context/private_context.nr",
|
|
3473
|
-
"source": "use crate::{\n context::{\n inputs::PrivateContextInputs, note_hash_read::NoteHashRead, returns_hash::ReturnsHash,\n },\n hash::{hash_args, hash_calldata_array},\n keys::constants::{NULLIFIER_INDEX, NUM_KEY_TYPES, OUTGOING_INDEX, sk_generators},\n messaging::process_l1_to_l2_message,\n oracle::{\n block_header::get_block_header_at,\n call_private_function::call_private_function_internal,\n enqueue_public_function_call::{\n is_side_effect_counter_revertible_oracle_wrapper, notify_enqueued_public_function_call,\n notify_set_min_revertible_side_effect_counter, notify_set_public_teardown_function_call,\n },\n execution_cache,\n key_validation_request::get_key_validation_request,\n logs::notify_created_contract_class_log,\n notes::{notify_created_nullifier, notify_nullified_note},\n },\n};\nuse dep::protocol_types::{\n abis::{\n block_header::BlockHeader,\n call_context::CallContext,\n function_selector::FunctionSelector,\n gas_settings::GasSettings,\n log_hash::LogHash,\n note_hash::NoteHash,\n nullifier::Nullifier,\n private_call_request::PrivateCallRequest,\n private_circuit_public_inputs::PrivateCircuitPublicInputs,\n private_log::{PrivateLog, PrivateLogData},\n public_call_request::PublicCallRequest,\n validation_requests::{KeyValidationRequest, KeyValidationRequestAndGenerator},\n },\n address::{AztecAddress, EthAddress},\n constants::{\n CONTRACT_CLASS_LOG_SIZE_IN_FIELDS, MAX_CONTRACT_CLASS_LOGS_PER_CALL,\n MAX_ENQUEUED_CALLS_PER_CALL, MAX_INCLUDE_BY_TIMESTAMP_DURATION,\n MAX_KEY_VALIDATION_REQUESTS_PER_CALL, MAX_L2_TO_L1_MSGS_PER_CALL,\n MAX_NOTE_HASH_READ_REQUESTS_PER_CALL, MAX_NOTE_HASHES_PER_CALL,\n MAX_NULLIFIER_READ_REQUESTS_PER_CALL, MAX_NULLIFIERS_PER_CALL,\n MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL, MAX_PRIVATE_LOGS_PER_CALL,\n NULL_MSG_SENDER_CONTRACT_ADDRESS, PRIVATE_LOG_SIZE_IN_FIELDS,\n },\n hash::poseidon2_hash,\n messaging::l2_to_l1_message::L2ToL1Message,\n side_effect::{Counted, scoped::Scoped},\n traits::{Empty, Hash, ToField},\n utils::arrays::{ClaimedLengthArray, find_first_index, trimmed_array_length_hint},\n};\n\n/// # PrivateContext\n///\n/// The **main interface** between an #[external(\"private\")] function and the Aztec blockchain.\n///\n/// An instance of the PrivateContext is initialized automatically at the outset\n/// of every private function, within the #[external(\"private\")] macro, so you'll never\n/// need to consciously instantiate this yourself.\n///\n/// The instance is always named `context`, and it is always be available within\n/// the body of every #[external(\"private\")] function in your smart contract.\n///\n/// > For those used to \"vanilla\" Noir, it might be jarring to have access to\n/// > `context` without seeing a declaration `let context = PrivateContext::new(...)`\n/// > within the body of your function. This is just a consequence of using\n/// > macros to tidy-up verbose boilerplate. You can use `nargo expand` to\n/// > expand all macros, if you dare.\n///\n/// Typical usage for a smart contract developer will be to call getter\n/// methods of the PrivateContext.\n///\n/// _Pushing_ data and requests to the context is mostly handled within\n/// aztec-nr's own functions, so typically a smart contract developer won't\n/// need to call any setter methods directly.\n///\n/// > Advanced users might occasionally wish to push data to the context\n/// > directly for lower-level control. If you find yourself doing this, please\n/// > open an issue on GitHub to describe your use case: it might be that\n/// > new functionality should be added to aztec-nr.\n///\n/// ## Responsibilities\n/// - Exposes contextual data to a private function:\n/// - Data relating to how this private function was called.\n/// - msg_sender\n/// - this_address - (the contract address of the private function being\n/// executed)\n/// - See `CallContext` for more data.\n/// - Data relating to the transaction in which this private function is\n/// being executed.\n/// - chain_id\n/// - version\n/// - gas_settings\n/// - Provides state access:\n/// - Access to the \"Anchor block\" header.\n/// Recall, a private function cannot read from the \"current\" block header,\n/// but must read from some historical block header, because as soon as\n/// private function execution begins (asynchronously, on a user's device),\n/// the public state of the chain (the \"current state\") will have progressed\n/// forward. We call this reference the \"Anchor block\".\n/// See `BlockHeader`.\n/// - Enables consumption of L1->L2 messages.\n/// - Enables calls to functions of other smart contracts:\n/// - Private function calls\n/// - Enqueueing of public function call requests\n/// (Since public functions are executed at a later time, by a block\n/// proposer, we say they are \"enqueued\").\n/// - Writes data to the blockchain:\n/// - New notes\n/// - New nullifiers\n/// - Private logs (for sending encrypted note contents or encrypted events)\n/// - New L2->L1 messages.\n/// - Provides args to the private function (handled by the #[external(\"private\")] macro).\n/// - Returns the return values of this private function (handled by the\n/// #[external(\"private\")] macro).\n/// - Makes Key Validation Requests.\n/// - Private functions are not allowed to see master secret keys, because we\n/// do not trust them. They are instead given \"app-siloed\" secret keys with\n/// a claim that they relate to a master public key. They can then request\n/// validation of this claim, by making a \"key validation request\" to the\n/// protocol's kernel circuits (which _are_ allowed to see certain master\n/// secret keys).\n///\n/// ## Advanced Responsibilities\n///\n/// - Ultimately, the PrivateContext is responsible for constructing the\n/// PrivateCircuitPublicInputs of the private function being executed.\n/// All private functions on Aztec must have public inputs which adhere\n/// to the rigid layout of the PrivateCircuitPublicInputs, in order to be\n/// compatible with the protocol's kernel circuits.\n/// A well-known misnomer:\n/// - \"public inputs\" contain both inputs and outputs of this function.\n/// - By \"outputs\" we mean a lot more side-effects than just the\n/// \"return values\" of the function.\n/// - Most of the so-called \"public inputs\" are kept _private_, and never leak\n/// to the outside world, because they are 'swallowed' by the protocol's\n/// kernel circuits before the tx is sent to the network. Only the\n/// following are exposed to the outside world:\n/// - New note_hashes\n/// - New nullifiers\n/// - New private logs\n/// - New L2->L1 messages\n/// - New enqueued public function call requests\n/// All the above-listed arrays of side-effects can be padded by the\n/// user's wallet (through instructions to the kernel circuits, via the\n/// PXE) to obscure their true lengths.\n///\n/// ## Syntax Justification\n///\n/// Both user-defined functions _and_ most functions in aztec-nr need access to\n/// the PrivateContext instance to read/write data. This is why you'll see the\n/// arguably-ugly pervasiveness of the \"context\" throughout your smart contract\n/// and the aztec-nr library.\n/// For example, `&mut context` is prevalent. In some languages, you can access\n/// and mutate a global variable (such as a PrivateContext instance) from a\n/// function without polluting the function's parameters. With Noir, a function\n/// must explicitly pass control of a mutable variable to another function, by\n/// reference. Since many functions in aztec-nr need to be able to push new data\n/// to the PrivateContext, they need to be handed a mutable reference _to_ the\n/// context as a parameter.\n/// For example, `Context` is prevalent as a generic parameter, to give better\n/// type safety at compile time. Many `aztec-nr` functions don't make sense if\n/// they're called in a particular runtime (private, public or utility), and so\n/// are intentionally only implemented over certain\n/// [Private|Public|Utility]Context structs. This gives smart contract\n/// developers a much faster feedback loop if they're making a mistake, as an\n/// error will be thrown by the LSP or when they compile their contract.\n///\n#[derive(Eq)]\npub struct PrivateContext {\n // docs:start:private-context\n pub inputs: PrivateContextInputs,\n pub side_effect_counter: u32,\n\n pub min_revertible_side_effect_counter: u32,\n pub is_fee_payer: bool,\n\n pub args_hash: Field,\n pub return_hash: Field,\n\n pub include_by_timestamp: u64,\n\n pub note_hash_read_requests: BoundedVec<Scoped<Counted<Field>>, MAX_NOTE_HASH_READ_REQUESTS_PER_CALL>,\n pub nullifier_read_requests: BoundedVec<Scoped<Counted<Field>>, MAX_NULLIFIER_READ_REQUESTS_PER_CALL>,\n key_validation_requests_and_generators: BoundedVec<KeyValidationRequestAndGenerator, MAX_KEY_VALIDATION_REQUESTS_PER_CALL>,\n\n pub note_hashes: BoundedVec<Counted<NoteHash>, MAX_NOTE_HASHES_PER_CALL>,\n pub nullifiers: BoundedVec<Counted<Nullifier>, MAX_NULLIFIERS_PER_CALL>,\n\n pub private_call_requests: BoundedVec<PrivateCallRequest, MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL>,\n pub public_call_requests: BoundedVec<Counted<PublicCallRequest>, MAX_ENQUEUED_CALLS_PER_CALL>,\n pub public_teardown_call_request: PublicCallRequest,\n pub l2_to_l1_msgs: BoundedVec<Counted<L2ToL1Message>, MAX_L2_TO_L1_MSGS_PER_CALL>,\n // docs:end:private-context\n\n // Header of a block whose state is used during private execution (not the block the transaction is included in).\n pub anchor_block_header: BlockHeader,\n\n pub private_logs: BoundedVec<Counted<PrivateLogData>, MAX_PRIVATE_LOGS_PER_CALL>,\n pub contract_class_logs_hashes: BoundedVec<Counted<LogHash>, MAX_CONTRACT_CLASS_LOGS_PER_CALL>,\n\n // Contains the last key validation request for each key type. This is used to cache the last request and avoid\n // fetching the same request multiple times.\n // The index of the array corresponds to the key type (0 nullifier, 1 incoming, 2 outgoing, 3 tagging).\n pub last_key_validation_requests: [Option<KeyValidationRequest>; NUM_KEY_TYPES],\n\n pub expected_non_revertible_side_effect_counter: u32,\n pub expected_revertible_side_effect_counter: u32,\n}\n\nimpl PrivateContext {\n pub fn new(inputs: PrivateContextInputs, args_hash: Field) -> PrivateContext {\n let max_allowed_include_by_timestamp = inputs.anchor_block_header.global_variables.timestamp\n + MAX_INCLUDE_BY_TIMESTAMP_DURATION;\n PrivateContext {\n inputs,\n side_effect_counter: inputs.start_side_effect_counter + 1,\n min_revertible_side_effect_counter: 0,\n is_fee_payer: false,\n args_hash,\n return_hash: 0,\n include_by_timestamp: max_allowed_include_by_timestamp,\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n anchor_block_header: inputs.anchor_block_header,\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n private_logs: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n expected_non_revertible_side_effect_counter: 0,\n expected_revertible_side_effect_counter: 0,\n }\n }\n\n /// Returns the contract address that initiated this function call.\n ///\n /// This is similar to `msg.sender` in Solidity (hence the name).\n ///\n /// Important Note: Since Aztec doesn't have a concept of an EoA (Externally-owned Account), the msg_sender is\n /// \"none\" for the first function call of every transaction. The first function call of a tx is likely to be a call\n /// to the user's account contract, so this quirk will most often be handled by account contract developers.\n ///\n /// # Returns\n /// * `Option<AztecAddress>` - The address of the smart contract that called this function (be it an app contract\n /// or a user's account contract). Returns `Option<AztecAddress>::none` for the first function call of the tx. No\n /// other _private_ function calls in the tx will have a `none` msg_sender, but _public_ function calls might\n /// (see the PublicContext).\n pub fn maybe_msg_sender(self) -> Option<AztecAddress> {\n let maybe_msg_sender = self.inputs.call_context.msg_sender;\n if maybe_msg_sender == NULL_MSG_SENDER_CONTRACT_ADDRESS {\n Option::none()\n } else {\n Option::some(maybe_msg_sender)\n }\n }\n\n /// Returns the contract address of the current function being executed.\n ///\n /// This is equivalent to `address(this)` in Solidity (hence the name).\n /// Use this to identify the current contract's address, commonly needed for\n /// access control or when interacting with other contracts.\n ///\n /// # Returns\n /// * `AztecAddress` - The contract address of the current function being\n /// executed.\n ///\n pub fn this_address(self) -> AztecAddress {\n self.inputs.call_context.contract_address\n }\n\n /// Returns the chain ID of the current network.\n ///\n /// This is similar to `block.chainid` in Solidity. Returns the unique\n /// identifier for the blockchain network this transaction is executing on.\n ///\n /// Helps prevent cross-chain replay attacks. Useful if implementing\n /// multi-chain contract logic.\n ///\n /// # Returns\n /// * `Field` - The chain ID as a field element\n ///\n pub fn chain_id(self) -> Field {\n self.inputs.tx_context.chain_id\n }\n\n /// Returns the Aztec protocol version that this transaction is executing\n /// under. Different versions may have different rules, opcodes, or\n /// cryptographic primitives.\n ///\n /// This is similar to how Ethereum has different EVM versions.\n ///\n /// Useful for forward/backward compatibility checks\n ///\n /// Not to be confused with contract versions; this is the protocol version.\n ///\n /// # Returns\n /// * `Field` - The protocol version as a field element\n ///\n pub fn version(self) -> Field {\n self.inputs.tx_context.version\n }\n\n /// Returns the gas settings for the current transaction.\n ///\n /// This provides information about gas limits and pricing for the\n /// transaction, similar to `tx.gasprice` and gas limits in Ethereum.\n /// However, Aztec has a more sophisticated gas model with separate\n /// accounting for L2 computation and data availability (DA) costs.\n ///\n /// # Returns\n /// * `GasSettings` - Struct containing gas limits and fee information\n ///\n pub fn gas_settings(self) -> GasSettings {\n self.inputs.tx_context.gas_settings\n }\n\n /// Returns the function selector of the currently executing function.\n ///\n /// Low-level function: Ordinarily, smart contract developers will not need\n /// to access this.\n ///\n /// This is similar to `msg.sig` in Solidity, which returns the first 4\n /// bytes of the function signature. In Aztec, the selector uniquely\n /// identifies which function within the contract is being called.\n ///\n /// # Returns\n /// * `FunctionSelector` - The 4-byte function identifier\n ///\n /// # Advanced\n /// Only #[external(\"private\")] functions have a function selector as a protocol-\n /// enshrined concept. The function selectors of private functions are\n /// baked into the preimage of the contract address, and are used by the\n /// protocol's kernel circuits to identify each private function and ensure\n /// the correct one is being executed.\n ///\n /// Used internally for function dispatch and call verification.\n ///\n pub fn selector(self) -> FunctionSelector {\n self.inputs.call_context.function_selector\n }\n\n /// Returns the hash of the arguments passed to the current function.\n ///\n /// Very low-level function: You shouldn't need to call this. The #[external(\"private\")]\n /// macro calls this, and it makes the arguments neatly available to the\n /// body of your private function.\n ///\n /// # Returns\n /// * `Field` - Hash of the function arguments\n ///\n /// # Advanced\n /// * Arguments are hashed to reduce proof size and verification time\n /// * Enables efficient argument passing in recursive function calls\n /// * The hash can be used to retrieve the original arguments from the PXE.\n ///\n pub fn get_args_hash(self) -> Field {\n self.args_hash\n }\n\n /// Pushes a new note_hash to the Aztec blockchain's global Note Hash Tree\n /// (a state tree).\n ///\n /// A note_hash is a commitment to a piece of private state.\n ///\n /// Low-level function: Ordinarily, smart contract developers will not need\n /// to manually call this. Aztec-nr's state variables (see `../state_vars/`)\n /// are designed to understand when to create and push new note hashes.\n ///\n /// # Arguments\n /// * `note_hash` - The new note_hash.\n ///\n /// # Advanced\n /// From here, the protocol's kernel circuits will take over and insert the\n /// note_hash into the protocol's \"note hash tree\" (in the Base Rollup\n /// circuit).\n /// Before insertion, the protocol will:\n /// - \"Silo\" the `note_hash` with the contract address of this function,\n /// to yield a `siloed_note_hash`. This prevents state collisions\n /// between different smart contracts.\n /// - Ensure uniqueness of the `siloed_note_hash`, to prevent Faerie-Gold\n /// attacks, by hashing the `siloed_note_hash` with a unique value, to\n /// yield a `unique_siloed_note_hash` (see the protocol spec for more).\n ///\n /// In addition to calling this function, aztec-nr provides the contents\n /// of the newly-created note to the PXE, via the `notify_created_note`\n /// oracle.\n ///\n /// > Advanced users might occasionally wish to push data to the context\n /// > directly for lower-level control. If you find yourself doing this,\n /// > please open an issue on GitHub to describe your use case: it might be\n /// > that new functionality should be added to aztec-nr.\n ///\n pub fn push_note_hash(&mut self, note_hash: Field) {\n self.note_hashes.push(Counted::new(note_hash, self.next_counter()));\n }\n\n /// Pushes a new nullifier to the Aztec blockchain's global Nullifier Tree\n /// (a state tree).\n ///\n /// See also: `push_nullifier_for_note_hash`.\n ///\n /// Low-level function: Ordinarily, smart contract developers will not need\n /// to manually call this. Aztec-nr's state variables (see `../state_vars/`)\n /// are designed to understand when to create and push new nullifiers.\n ///\n /// A nullifier can only be emitted once. Duplicate nullifier insertions are\n /// rejected by the protocol.\n ///\n /// Generally, a nullifier is emitted to prevent an action from happening\n /// more than once, in such a way that the action cannot be linked (by an\n /// observer of the blockchain) to any earlier transactions.\n ///\n /// I.e. a nullifier is a random-looking, but deterministic record of a\n /// private, one-time action, which does not leak what action has been\n /// taken, and which preserves the property of \"tx unlinkability\".\n ///\n /// Usually, a nullifier will be emitted to \"spend\" a note (a piece of\n /// private state), without revealing which specific note is being spent.\n ///\n /// (Important: in such cases, use the below `push_nullifier_for_note_hash`).\n ///\n /// Sometimes, a nullifier might be emitted completely unrelated to any\n /// notes. Examples include initialization of a new contract; initialization\n /// of a PrivateMutable, or signalling in Semaphore-like applications.\n /// This `push_nullifier` function serves such use cases.\n ///\n /// # Arguments\n /// * `nullifier`\n ///\n /// # Advanced\n /// From here, the protocol's kernel circuits will take over and insert the\n /// nullifier into the protocol's \"nullifier tree\" (in the Base Rollup\n /// circuit).\n /// Before insertion, the protocol will:\n /// - \"Silo\" the `nullifier` with the contract address of this function,\n /// to yield a `siloed_nullifier`. This prevents state collisions\n /// between different smart contracts.\n /// - Ensure the `siloed_nullifier` is unique (the nullifier tree is an\n /// indexed merkle tree which supports efficient non-membership proofs).\n ///\n pub fn push_nullifier(&mut self, nullifier: Field) {\n notify_created_nullifier(nullifier);\n self.nullifiers.push(Nullifier { value: nullifier, note_hash: 0 }.count(self.next_counter()));\n }\n\n /// Pushes a nullifier that corresponds to a specific note hash.\n ///\n /// Low-level function: Ordinarily, smart contract developers will not need\n /// to manually call this. Aztec-nr's state variables (see `../state_vars/`)\n /// are designed to understand when to create and push new nullifiers.\n ///\n /// This is a specialized version of `push_nullifier` that links a nullifier\n /// to the specific note hash it's nullifying. This is the most common\n /// usage pattern for nullifiers.\n /// See `push_nullifier` for more explanation on nullifiers.\n ///\n /// # Arguments\n /// * `nullifier`\n /// * `nullified_note_hash` - The note hash of the note being nullified\n ///\n /// # Advanced\n /// Important: usage of this function doesn't mean that the world will _see_\n /// that this nullifier relates to the given nullified_note_hash (as that\n /// would violate \"tx unlinkability\"); it simply informs the user's PXE\n /// about the relationship (via `notify_nullified_note`). The PXE can then\n /// use this information to feed hints to the kernel circuits for\n /// \"squashing\" purposes: If a note is nullified during the same tx which\n /// created it, we can \"squash\" (delete) the note and nullifier (and any\n /// private logs associated with the note), to save on data emission costs.\n ///\n pub fn push_nullifier_for_note_hash(&mut self, nullifier: Field, nullified_note_hash: Field) {\n let nullifier_counter = self.next_counter();\n notify_nullified_note(nullifier, nullified_note_hash, nullifier_counter);\n self.nullifiers.push(Nullifier { value: nullifier, note_hash: nullified_note_hash }.count(\n nullifier_counter,\n ));\n }\n\n /// Returns the anchor block header - the historical block header that this\n /// private function is reading from.\n ///\n /// A private function CANNOT read from the \"current\" block header,\n /// but must read from some older block header, because as soon as\n /// private function execution begins (asynchronously, on a user's device),\n /// the public state of the chain (the \"current state\") will have progressed\n /// forward.\n ///\n /// # Returns\n /// * `BlockHeader` - The anchor block header.\n ///\n /// # Advanced\n /// * All private functions of a tx read from the same anchor block header.\n /// * The protocol asserts that the `include_by_timestamp` of every tx\n /// is at most 24 hours beyond the timestamp of the tx's chosen anchor\n /// block header. This enables the network's nodes to safely prune old txs\n /// from the mempool. Therefore, the chosen block header _must_ be one\n /// from within the last 24 hours.\n ///\n pub fn get_anchor_block_header(self) -> BlockHeader {\n self.anchor_block_header\n }\n\n /// Returns the header of any historical block at or before the anchor\n /// block.\n ///\n /// This enables private contracts to access information from even older\n /// blocks than the anchor block header.\n ///\n /// Useful for time-based contract logic that needs to compare against\n /// multiple historical points.\n ///\n /// # Arguments\n /// * `block_number` - The block number to retrieve (must be <= anchor\n /// block number)\n ///\n /// # Returns\n /// * `BlockHeader` - The header of the requested historical block\n ///\n /// # Advanced\n /// This function uses an oracle to fetch block header data from the user's\n /// PXE. Depending on how much blockchain data the user's PXE has been set\n /// up to store, this might require a query from the PXE to another Aztec\n /// node to get the data.\n /// > This is generally true of all oracle getters (see `../oracle`).\n ///\n /// Each block header gets hashed and stored as a leaf in the protocol's\n /// Archive Tree. In fact, the i-th block header gets stored at the i-th\n /// leaf index of the Archive Tree. Behind the scenes, this\n /// `get_block_header_at` function will add Archive Tree merkle-membership\n /// constraints (~3k) to your smart contract function's circuit, to prove\n /// existence of the block header in the Archive Tree.\n ///\n /// Note: we don't do any caching, so avoid making duplicate calls for the\n /// same block header, because each call will add duplicate constraints.\n ///\n /// Calling this function is more expensive (constraint-wise) than getting\n /// the anchor block header (via `get_block_header`). This is because the\n /// anchor block's merkle membership proof is handled by Aztec's protocol\n /// circuits, and is only performed once for the entire tx because all\n /// private functions of a tx share a common anchor block header. Therefore,\n /// the cost (constraint-wise) of calling `get_block_header` is effectively\n /// free.\n ///\n pub fn get_block_header_at(self, block_number: u32) -> BlockHeader {\n get_block_header_at(block_number, self)\n }\n\n /// Sets the hash of the return values for this private function.\n ///\n /// Very low-level function: this is called by the #[external(\"private\")] macro.\n ///\n /// # Arguments\n /// * `serialized_return_values` - The serialized return values as a field array\n ///\n pub fn set_return_hash<let N: u32>(&mut self, serialized_return_values: [Field; N]) {\n let return_hash = hash_args(serialized_return_values);\n self.return_hash = return_hash;\n execution_cache::store(serialized_return_values, return_hash);\n }\n\n /// Builds the PrivateCircuitPublicInputs for this private function, to\n /// ensure compatibility with the protocol's kernel circuits.\n ///\n /// Very low-level function: This function is automatically called by the\n /// #[external(\"private\")] macro.\n pub fn finish(self) -> PrivateCircuitPublicInputs {\n PrivateCircuitPublicInputs {\n call_context: self.inputs.call_context,\n args_hash: self.args_hash,\n returns_hash: self.return_hash,\n min_revertible_side_effect_counter: self.min_revertible_side_effect_counter,\n is_fee_payer: self.is_fee_payer,\n include_by_timestamp: self.include_by_timestamp,\n note_hash_read_requests: ClaimedLengthArray::from_bounded_vec(\n self.note_hash_read_requests,\n ),\n nullifier_read_requests: ClaimedLengthArray::from_bounded_vec(\n self.nullifier_read_requests,\n ),\n key_validation_requests_and_generators: ClaimedLengthArray::from_bounded_vec(\n self.key_validation_requests_and_generators,\n ),\n note_hashes: ClaimedLengthArray::from_bounded_vec(self.note_hashes),\n nullifiers: ClaimedLengthArray::from_bounded_vec(self.nullifiers),\n private_call_requests: ClaimedLengthArray::from_bounded_vec(self.private_call_requests),\n public_call_requests: ClaimedLengthArray::from_bounded_vec(self.public_call_requests),\n public_teardown_call_request: self.public_teardown_call_request,\n l2_to_l1_msgs: ClaimedLengthArray::from_bounded_vec(self.l2_to_l1_msgs),\n start_side_effect_counter: self.inputs.start_side_effect_counter,\n end_side_effect_counter: self.side_effect_counter,\n private_logs: ClaimedLengthArray::from_bounded_vec(self.private_logs),\n contract_class_logs_hashes: ClaimedLengthArray::from_bounded_vec(\n self.contract_class_logs_hashes,\n ),\n anchor_block_header: self.anchor_block_header,\n tx_context: self.inputs.tx_context,\n expected_non_revertible_side_effect_counter: self\n .expected_non_revertible_side_effect_counter,\n expected_revertible_side_effect_counter: self.expected_revertible_side_effect_counter,\n }\n }\n\n /// Designates this contract as the fee payer for the transaction.\n ///\n /// Unlike Ethereum, where the transaction sender always pays fees, Aztec\n /// allows any contract to voluntarily pay transaction fees. This enables\n /// patterns like sponsored transactions or fee abstraction where users\n /// don't need to hold fee-juice themselves. (Fee juice is a fee-paying\n /// asset for Aztec).\n ///\n /// Only one contract per transaction can declare itself as the fee payer,\n /// and it must have sufficient fee-juice balance (>= the gas limits\n /// specified in the TxContext) by the time we reach the public setup phase\n /// of the tx.\n ///\n pub fn set_as_fee_payer(&mut self) {\n dep::protocol_types::debug_log::debug_log_format(\n \"Setting {0} as fee payer\",\n [self.this_address().to_field()],\n );\n self.is_fee_payer = true;\n }\n\n pub fn in_revertible_phase(&mut self) -> bool {\n let current_counter = self.side_effect_counter;\n\n // Safety: Kernel will validate that the claim is correct by validating the expected counters.\n let is_revertible =\n unsafe { is_side_effect_counter_revertible_oracle_wrapper(current_counter) };\n\n if is_revertible {\n if (self.expected_revertible_side_effect_counter == 0)\n | (current_counter < self.expected_revertible_side_effect_counter) {\n self.expected_revertible_side_effect_counter = current_counter;\n }\n } else if current_counter > self.expected_non_revertible_side_effect_counter {\n self.expected_non_revertible_side_effect_counter = current_counter;\n }\n\n is_revertible\n }\n\n /// Declares the end of the \"setup phase\" of this tx.\n ///\n /// Only one function per tx can declare the end of the setup phase.\n ///\n /// Niche function: Only wallet developers and paymaster contract developers\n /// (aka Fee-payment contracts) will need to make use of this function.\n ///\n /// Aztec supports a three-phase execution model: setup, app logic, teardown.\n /// The phases exist to enable a fee payer to take on the risk of paying\n /// a transaction fee, safe in the knowledge that their payment (in whatever\n /// token or method the user chooses) will succeed, regardless of whether\n /// the app logic will succeed. The \"setup\" phase enables such a payment to\n /// be made, because the setup phase _cannot revert_: a reverting function\n /// within the setup phase would result in an invalid block which cannot\n /// be proven. Any side-effects generated during that phase are guaranteed\n /// to be inserted into Aztec's state trees (except for squashed notes &\n /// nullifiers, of course).\n ///\n /// Even though the end of the setup phase is declared within a private\n /// function, you might have noticed that _public_ functions can also\n /// execute within the setup phase. This is because any public function\n /// calls which were enqueued _within the setup phase_ by a private\n /// function are considered part of the setup phase.\n ///\n /// # Advanced\n /// * Sets the minimum revertible side effect counter of this tx to be the\n /// PrivateContext's _current_ side effect counter.\n ///\n pub fn end_setup(&mut self) {\n // Incrementing the side effect counter when ending setup ensures non\n // ambiguity for the counter where we change phases.\n self.side_effect_counter += 1;\n // dep::protocol_types::debug_log::debug_log_format(\n // \"Ending setup at counter {0}\",\n // [self.side_effect_counter as Field]\n // );\n self.min_revertible_side_effect_counter = self.next_counter();\n notify_set_min_revertible_side_effect_counter(self.min_revertible_side_effect_counter);\n }\n\n /// Sets a deadline (an \"include-by timestamp\") for when this transaction\n /// must be included in a block.\n ///\n /// Other functions in this tx might call this setter with differing\n /// values for the include-by timestamp. To ensure that all functions'\n /// deadlines are met, the _minimum_ of all these include-by timestamps will\n /// be exposed when this tx is submitted to the network.\n ///\n /// If the transaction is not included in a block by its include-by\n /// timestamp, it becomes invalid and it will never be included.\n ///\n /// This expiry timestamp is publicly visible. See the \"Advanced\" section\n /// for privacy concerns.\n ///\n /// # Arguments\n /// * `include_by_timestamp` - Unix timestamp (seconds) deadline for inclusion.\n /// The include-by timestamp of this tx will be\n /// _at most_ the timestamp specified.\n ///\n /// # Advanced\n /// * If multiple functions set differing `include_by_timestamp`s, the\n /// kernel circuits will set it to be the _minimum_ of the two. This\n /// ensures the tx expiry requirements of all functions in the tx are met.\n /// * Rollup circuits will reject expired txs.\n /// * The protocol enforces that all transactions must be included within\n /// 24 hours of their chosen anchor block's timestamp, to enable safe\n /// mempool pruning.\n /// * The DelayedPublicMutable design makes heavy use of this functionality,\n /// to enable private functions to read public state.\n /// * A sophisticated Wallet should cleverly set an include-by timestamp\n /// to improve the privacy of the user and the network as a whole.\n /// For example, if a contract interaction sets include-by to some\n /// publicly-known value (e.g. the time when a contract upgrades), then\n /// the wallet might wish to set an even lower one to avoid revealing that\n /// this tx is interacting with said contract.\n /// Ideally, all wallets should standardize on an approach in order to\n /// provide users with a large anonymity set -- although the exact approach\n /// will need to be discussed. Wallets that deviate from a standard might\n /// accidentally reveal which wallet each transaction originates from.\n ///\n // docs:start:include-by-timestamp\n pub fn set_include_by_timestamp(&mut self, include_by_timestamp: u64) {\n // docs:end:include-by-timestamp\n self.include_by_timestamp = std::cmp::min(self.include_by_timestamp, include_by_timestamp);\n }\n\n /// Makes a request to the protocol's kernel circuit to ensure a note_hash\n /// actually exists.\n ///\n /// \"Read requests\" are used to prove that a note hash exists without\n /// revealing which specific note was read.\n ///\n /// This can be used to prove existence of both settled notes (created in\n /// prior transactions) and pending notes (created in the current\n /// transaction).\n /// If you need to prove existence of a settled note _at a specific block\n /// number_, use `note_inclusion::prove_note_inclusion`.\n ///\n /// Low-level function. Ordinarily, smart contract developers will not need\n /// to call this directly. Aztec-nr's state variables (see `../state_vars/`)\n /// are designed to understand when to create and push new note_hash read\n /// requests.\n ///\n /// # Arguments\n /// * `note_hash_read` - The note hash to read and verify\n ///\n /// # Advanced\n /// In \"traditional\" circuits for non-Aztec privacy applications, the merkle\n /// membership proofs to check existence of a note are performed _within_\n /// the application circuit.\n ///\n /// All Aztec private functions have access to the following constraint\n /// optimisation:\n /// In cases where the note being read was created earlier in the same tx,\n /// the note wouldn't yet exist in the Note Hash Tree, so a hard-coded\n /// merkle membership check which then gets ignored would be a waste of\n /// constraints.\n /// Instead, we can send read requests for all notes to the protocol's\n /// kernel circuits, where we can conditionally assess which notes actually\n /// need merkle membership proofs, and select an appropriately-sized\n /// kernel circuit.\n ///\n /// For \"settled notes\" (which already existed in the Note Hash Tree of the\n /// anchor block (i.e. before the tx began)), the kernel does a merkle\n /// membership check.\n ///\n /// For \"pending notes\" (which were created earlier in _this_ tx), the\n /// kernel will check that the note existed _before_ this read request was\n /// made, by checking the side-effect counters of the note_hash and this\n /// read request.\n ///\n /// This approach improves latency between writes and reads:\n /// a function can read a note which was created earlier in the tx (rather\n /// than performing the read in a later tx, after waiting for the earlier tx\n /// to be included, to ensure the note is included in the tree).\n ///\n pub fn push_note_hash_read_request(&mut self, note_hash_read: NoteHashRead) {\n let note_hash = note_hash_read.note_hash();\n let contract_address = note_hash_read.contract_address().unwrap_or(AztecAddress::zero());\n let side_effect = Scoped::new(\n Counted::new(note_hash, self.next_counter()),\n contract_address,\n );\n self.note_hash_read_requests.push(side_effect);\n }\n\n /// Asserts that a NoteHashRead has been requested to the kernel by this context.\n /// Asserts instead of returning a boolean to save on gates.\n ///\n /// # Arguments\n /// * `note_hash_read` - The note hash read to assert that has been requested.\n ///\n pub fn assert_has_been_requested(self, note_hash_read: NoteHashRead) {\n let note_hash = note_hash_read.note_hash();\n let contract_address = note_hash_read.contract_address().unwrap_or(AztecAddress::zero());\n\n // Safety: The index is constrained by the checks below.\n let hinted_index = unsafe {\n find_first_index(\n self.note_hash_read_requests.storage(),\n |r| (r.contract_address == contract_address) & (r.innermost() == note_hash),\n )\n };\n // This assertion is not necessary, since the .get would fail. But it enables us to have a more explicit error message.\n assert(\n hinted_index != self.note_hash_read_requests.max_len(),\n \"Note hash read has not been requested\",\n );\n\n let request = self.note_hash_read_requests.get(hinted_index);\n assert_eq(request.contract_address, contract_address);\n assert_eq(request.innermost(), note_hash);\n }\n\n /// Requests the private kernel to ensure an `unsiloed_nullifier` has been emitted by `contract_address`, failing\n /// the transaction otherwise.\n ///\n /// Note that unsiloed nullifiers are not the actual values stored in the nullifier tree: they are first siloed via\n /// [crate::hash::compute_siloed_nullifier] with the emitting contract's address.\n ///\n /// ## Pending Nullifiers\n ///\n /// Both settled nullifiers (emitted in prior transactions) and pending nullifiers (emitted in the current\n /// transaction) will be considered by this function. This is the **only** mechanism via which it is possible to\n /// assert that a pending nullifier exists, since those are otherwise hidden from contracts by the kernels.\n ///\n /// The nullifier must have been emitted **before** this call is made for the transaction to not fail.\n ///\n /// In order to instead prove existence of a settled nullifier at a specific block number, use\n /// [crate::history::nullifier_inclusion::ProveNullifierInclusion::prove_nullifier_inclusion].\n ///\n /// ## Public vs Private\n ///\n /// In general, it is unsafe to check for nullifier non-existence in private, as that will not consider the\n /// possibility of the nullifier having been emitted in any transaction between the anchor block and the inclusion\n /// block. Private functions instead prove existence via this function and 'prove' non-existence by _emitting_ the\n /// nullifer, which would cause the transaction to fail if the nullifier existed.\n ///\n /// This is not the case in public functions, which do have access to the tip of the blockchain and so can reliably\n /// prove whether a nullifier exists or not via\n /// [crate::context::public_context::PublicContext::nullifier_exists_unsafe].\n ///\n /// ## Cost\n ///\n /// This uses up one of the call's kernel nullifier read requests, which are limited. Like all kernel requests,\n /// proving time costs are only incurred when the total number of requests exceeds the kernel's capacity, requiring\n /// an additional invocation of the kernel reset circuit.\n pub fn push_nullifier_read_request(\n &mut self,\n unsiloed_nullifier: Field,\n contract_address: AztecAddress,\n ) {\n let request = Scoped::new(\n Counted::new(unsiloed_nullifier, self.next_counter()),\n contract_address,\n );\n self.nullifier_read_requests.push(request);\n }\n\n /// Requests the app-siloed nullifier secret key (nsk_app) for the given\n /// (hashed) master nullifier public key (npk_m), from the user's PXE.\n ///\n /// Advanced function: Only needed if you're designing your own notes and/or\n /// nullifiers.\n ///\n /// Contracts are not allowed to compute nullifiers for other contracts, as\n /// that would let them read parts of their private state. Because of this,\n /// a contract is only given an \"app-siloed secret key\", which is\n /// constructed by hashing the user's master nullifier secret key with the\n /// contract's address.\n /// However, because contracts cannot be trusted with a user's master\n /// nullifier secret key (because we don't know which contracts are honest\n /// or malicious), the PXE refuses to provide any master secret keys to\n /// any app smart contract function. This means app functions are unable to\n /// prove that the derivation of an app-siloed nullifier secret key has been\n /// computed correctly. Instead, an app function can request to the kernel\n /// (via `request_nsk_app`) that it validates the siloed derivation, since\n /// the kernel has been vetted to not leak any master secret keys.\n ///\n /// A common nullification scheme is to inject a nullifier secret key into\n /// the preimage of a nullifier, to make the nullifier deterministic but\n /// random-looking. This function enables that flow.\n ///\n /// # Arguments\n /// * `npk_m_hash` - A hash of the master nullifier public key of the user\n /// whose PXE is executing this function.\n ///\n /// # Returns\n /// * The app-siloed nullifier secret key that corresponds to the given\n /// `npk_m_hash`.\n ///\n pub fn request_nsk_app(&mut self, npk_m_hash: Field) -> Field {\n self.request_sk_app(npk_m_hash, NULLIFIER_INDEX)\n }\n\n /// Requests the app-siloed nullifier secret key (nsk_app) for the given\n /// (hashed) master nullifier public key (npk_m), from the user's PXE.\n ///\n /// See `request_nsk_app` and `request_sk_app` for more info.\n ///\n /// The intention of the \"outgoing\" keypair is to provide a second secret\n /// key for all of a user's outgoing activity (i.e. for notes that a user\n /// creates, as opposed to notes that a user receives from others). The\n /// separation of incoming and outgoing data was a distinction made by\n /// zcash, with the intention of enabling a user to optionally share with a\n /// 3rd party a controlled view of only incoming or outgoing notes.\n /// Similar functionality of sharing select data can be achieved with\n /// offchain zero-knowledge proofs. It is up to an app developer whether\n /// they choose to make use of a user's outgoing keypair within their\n /// application logic, or instead simply use the same keypair (the address\n /// keypair (which is effectively the same as the \"incoming\" keypair)) for\n /// all incoming & outgoing messages to a user.\n ///\n /// Currently, all of the exposed encryption functions in aztec-nr ignore\n /// the outgoing viewing keys, and instead encrypt all note logs and event\n /// logs to a user's address public key.\n ///\n /// # Arguments\n /// * `ovpk_m_hash` - Hash of the outgoing viewing public key master\n ///\n /// # Returns\n /// * The application-specific outgoing viewing secret key\n ///\n pub fn request_ovsk_app(&mut self, ovpk_m_hash: Field) -> Field {\n self.request_sk_app(ovpk_m_hash, OUTGOING_INDEX)\n }\n\n /// Pushes a Key Validation Request to the kernel.\n ///\n /// Private functions are not allowed to see a user's master secret keys,\n /// because we do not trust them. They are instead given \"app-siloed\" secret\n /// keys with a claim that they relate to a master public key.\n /// They can then request validation of this claim, by making a \"key\n /// validation request\" to the protocol's kernel circuits (which _are_\n /// allowed to see certain master secret keys).\n ///\n /// When a Key Validation Request tuple of (sk_app, Pk_m, app_address) is\n /// submitted to the kernel, it will perform the following derivations\n /// to validate the relationship between the claimed sk_app and the user's\n /// Pk_m:\n ///\n /// (sk_m) ----> * G ----> Pk_m\n /// | |\n /// v We use the kernel to prove this\n /// h(sk_m, app_address) | sk_app-Pk_m relationship, because app\n /// | circuits must not be trusted to see sk_m.\n /// v |\n /// sk_app - - - - - - - - -\n ///\n /// The function is named \"request_\" instead of \"get_\" to remind the user\n /// that a Key Validation Request will be emitted to the kernel.\n ///\n fn request_sk_app(&mut self, pk_m_hash: Field, key_index: Field) -> Field {\n let cached_request = self.last_key_validation_requests[key_index as u32].unwrap_or(\n KeyValidationRequest::empty(),\n );\n\n if cached_request.pk_m.hash() == pk_m_hash {\n // We get a match so the cached request is the latest one\n cached_request.sk_app\n } else {\n // We didn't get a match meaning the cached result is stale\n // Typically we'd validate keys by showing that they are the preimage of `pk_m_hash`, but that'd require\n // the oracle returning the master secret keys, which could cause malicious contracts to leak it or learn\n // about secrets from other contracts. We therefore silo secret keys, and rely on the private kernel to\n // validate that we siloed secret key corresponds to correct siloing of the master secret key that hashes\n // to `pk_m_hash`.\n\n // Safety: Kernels verify that the key validation request is valid and below we verify that a request\n // for the correct public key has been received.\n let request = unsafe { get_key_validation_request(pk_m_hash, key_index) };\n assert_eq(request.pk_m.hash(), pk_m_hash, \"Obtained invalid key validation request\");\n\n self.key_validation_requests_and_generators.push(\n KeyValidationRequestAndGenerator {\n request,\n sk_app_generator: sk_generators[key_index as u32],\n },\n );\n self.last_key_validation_requests[key_index as u32] = Option::some(request);\n request.sk_app\n }\n }\n\n /// Sends an \"L2 -> L1 message\" from this function (Aztec, L2) to a smart\n /// contract on Ethereum (L1). L1 contracts which are designed to\n /// send/receive messages to/from Aztec are called \"Portal Contracts\".\n ///\n /// Common use cases include withdrawals, cross-chain asset transfers, and\n /// triggering L1 actions based on L2 state changes.\n ///\n /// The message will be inserted into an Aztec \"Outbox\" contract on L1,\n /// when this transaction's block is proposed to L1.\n /// Sending the message will not result in any immediate state changes in\n /// the target portal contract. The message will need to be manually\n /// consumed from the Outbox through a separate Ethereum transaction: a user\n /// will need to call a function of the portal contract -- a function\n /// specifically designed to make a call to the Outbox to consume the\n /// message.\n /// The message will only be available for consumption once the _epoch_\n /// proof has been submitted. Given that there are multiple Aztec blocks\n /// within an epoch, it might take some time for this epoch proof to be\n /// submitted -- especially if the block was near the start of an epoch.\n ///\n /// # Arguments\n /// * `recipient` - Ethereum address that will receive the message\n /// * `content` - Message content (32 bytes as a Field element).\n /// This content has a very specific layout.\n /// docs:start:context_message_portal\n pub fn message_portal(&mut self, recipient: EthAddress, content: Field) {\n let message = L2ToL1Message { recipient, content };\n self.l2_to_l1_msgs.push(message.count(self.next_counter()));\n }\n\n /// Consumes a message sent from Ethereum (L1) to Aztec (L2).\n ///\n /// Common use cases include token bridging, cross-chain governance, and\n /// triggering L2 actions based on L1 events.\n ///\n /// Use this function if you only want the message to ever be \"referred to\"\n /// once. Once consumed using this method, the message cannot be consumed\n /// again, because a nullifier is emitted.\n /// If your use case wants for the message to be read unlimited times, then\n /// you can always read any historic message from the L1-to-L2 messages tree;\n /// messages never technically get deleted from that tree.\n ///\n /// The message will first be inserted into an Aztec \"Inbox\" smart contract\n /// on L1.\n /// Sending the message will not result in any immediate state changes in\n /// the target L2 contract. The message will need to be manually\n /// consumed by the target contract through a separate Aztec transaction.\n /// The message will not be available for consumption immediately. Messages\n /// get copied over from the L1 Inbox to L2 by the next Proposer in batches.\n /// So you will need to wait until the messages are copied before you can\n /// consume them.\n ///\n /// # Arguments\n /// * `content` - The message content that was sent from L1\n /// * `secret` - Secret value used for message privacy (if needed)\n /// * `sender` - Ethereum address that sent the message\n /// * `leaf_index` - Index of the message in the L1-to-L2 message tree\n ///\n /// # Advanced\n /// Validates message existence in the L1-to-L2 message tree and nullifies\n /// the message to prevent double-consumption.\n ///\n pub fn consume_l1_to_l2_message(\n &mut self,\n content: Field,\n secret: Field,\n sender: EthAddress,\n leaf_index: Field,\n ) {\n let nullifier = process_l1_to_l2_message(\n self.anchor_block_header.state.l1_to_l2_message_tree.root,\n self.this_address(),\n sender,\n self.chain_id(),\n self.version(),\n content,\n secret,\n leaf_index,\n );\n\n // Push nullifier (and the \"commitment\" corresponding to this can be \"empty\")\n self.push_nullifier(nullifier)\n }\n\n /// Emits a private log (an array of Fields) that will be published to an\n /// Ethereum blob.\n ///\n /// Private logs are intended for the broadcasting of ciphertexts: that is,\n /// encrypted events or encrypted note contents.\n /// Since the data in the logs is meant to be _encrypted_, private_logs are\n /// broadcast to publicly-visible Ethereum blobs.\n /// The intended recipients of such encrypted messages can then discover and\n /// decrypt these encrypted logs using their viewing secret key.\n /// (See `../messages/discovery` for more details).\n ///\n /// Important note: This function DOES NOT _do_ any encryption of the input\n /// `log` fields. This function blindly publishes whatever input `log` data\n /// is fed into it, so the caller of this function should have already\n /// performed the encryption, and the `log` should be the result of that\n /// encryption.\n ///\n /// The protocol does not dictate what encryption scheme should be used:\n /// a smart contract developer can choose whatever encryption scheme they\n /// like.\n /// Aztec-nr includes some off-the-shelf encryption libraries that\n /// developers might wish to use, for convenience. These libraries not only\n /// encrypt a plaintext (to produce a ciphertext); they also prepend the\n /// ciphertext with a `tag` and `ephemeral public key` for easier message\n /// discovery. This is a very dense topic, and we will be writing more\n /// libraries and docs soon.\n ///\n /// > Currently, AES128 CBC encryption is the main scheme included in\n /// > aztec.nr.\n /// > We are currently making significant changes to the interfaces of the\n /// > encryption library.\n ///\n /// In some niche use cases, an app might be tempted to publish\n /// _un-encrypted_ data via a private log, because _public logs_ are not\n /// available to private functions. Be warned that emitting public data via\n /// private logs is strongly discouraged, and is considered a \"privacy\n /// anti-pattern\", because it reveals identifiable information about _which_\n /// function has been executed. A tx which leaks such information does not\n /// contribute to the privacy set of the network.\n ///\n /// * Unlike `emit_raw_note_log`, this log is not tied to any specific note\n ///\n /// # Arguments\n /// * `log` - The log data that will be publicly broadcast (so make sure\n /// it's already been encrypted before you call this function).\n /// Private logs are bounded in size (PRIVATE_LOG_SIZE_IN_FIELDS), to\n /// encourage all logs from all smart contracts look identical.\n /// * `length` - The actual length of the `log` (measured in number of\n /// Fields). Although the input log has a max size of\n /// PRIVATE_LOG_SIZE_IN_FIELDS, the latter values of the array might all\n /// be 0's for small logs. This `length` should reflect the trimmed length\n /// of the array. The protocol's kernel circuits can then append random\n /// fields as \"padding\" after the `length`, so that the logs of this\n /// smart contract look indistinguishable from (the same length as) the\n /// logs of all other applications. It's up to wallets how much padding\n /// to apply, so ideally all wallets should agree on standards for this.\n ///\n /// # Advanced\n ///\n pub fn emit_private_log(&mut self, log: [Field; PRIVATE_LOG_SIZE_IN_FIELDS], length: u32) {\n let counter = self.next_counter();\n let private_log = PrivateLogData { log: PrivateLog::new(log, length), note_hash_counter: 0 }\n .count(counter);\n self.private_logs.push(private_log);\n }\n\n // TODO: rename.\n /// Emits a private log that is explicitly tied to a newly-emitted note_hash,\n /// to convey to the kernel: \"this log relates to this note\".\n ///\n /// This linkage is important in case the note gets squashed (due to being\n /// read later in this same tx), since we can then squash the log as well.\n ///\n /// See `emit_private_log` for more info about private log emission.\n ///\n /// # Arguments\n /// * `log` - The log data as an array of Field elements\n /// * `length` - The actual length of the `log` (measured in number of\n /// Fields).\n /// * `note_hash_counter` - The side-effect counter that was assigned to the\n /// new note_hash when it was pushed to this\n // `PrivateContext`.\n ///\n /// Important: If your application logic requires the log to always be\n /// emitted regardless of note squashing, consider using `emit_private_log`\n /// instead, or emitting additional events.\n ///\n pub fn emit_raw_note_log(\n &mut self,\n log: [Field; PRIVATE_LOG_SIZE_IN_FIELDS],\n length: u32,\n note_hash_counter: u32,\n ) {\n let counter = self.next_counter();\n let private_log = PrivateLogData { log: PrivateLog::new(log, length), note_hash_counter };\n self.private_logs.push(private_log.count(counter));\n }\n\n pub fn emit_contract_class_log<let N: u32>(&mut self, log: [Field; N]) {\n let contract_address = self.this_address();\n let counter = self.next_counter();\n\n let log_to_emit: [Field; CONTRACT_CLASS_LOG_SIZE_IN_FIELDS] =\n log.concat([0; CONTRACT_CLASS_LOG_SIZE_IN_FIELDS - N]);\n // Note: the length is not always N, it is the number of fields we want to broadcast, omitting trailing zeros to save blob space.\n // Safety: The below length is constrained in the base rollup, which will make sure that all the fields beyond length are zero.\n // However, it won't be able to check that we didn't add extra padding (trailing zeroes) or that we cut trailing zeroes from the end.\n let length = unsafe { trimmed_array_length_hint(log_to_emit) };\n // We hash the entire padded log to ensure a user cannot pass a shorter length and so emit incorrect shorter bytecode.\n let log_hash = poseidon2_hash(log_to_emit);\n // Safety: the below only exists to broadcast the raw log, so we can provide it to the base rollup later to be constrained.\n unsafe {\n notify_created_contract_class_log(contract_address, log_to_emit, length, counter);\n }\n\n self.contract_class_logs_hashes.push(LogHash { value: log_hash, length: length }.count(\n counter,\n ));\n }\n\n /// Calls a private function on another contract (or the same contract).\n ///\n /// Very low-level function.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args` - Array of arguments to pass to the called function\n ///\n /// # Returns\n /// * `ReturnsHash` - Hash of the called function's return values. Use\n /// `.get_preimage()` to extract the actual return values.\n ///\n /// This enables contracts to interact with each other while maintaining\n /// privacy. This \"composability\" of private contract functions is a key\n /// feature of the Aztec network.\n ///\n /// If a user's transaction includes multiple private function calls, then\n /// by the design of Aztec, the following information will remain private[1]:\n /// - The function selectors and contract addresses of all private function\n /// calls will remain private, so an observer of the public mempool will\n /// not be able to look at a tx and deduce which private functions have\n /// been executed.\n /// - The arguments and return values of all private function calls will\n /// remain private.\n /// - The person who initiated the tx will remain private.\n /// - The notes and nullifiers and private logs that are emitted by all\n /// private function calls will (if designed well) not leak any user\n /// secrets, nor leak which functions have been executed.\n ///\n /// [1] Caveats: Some of these privacy guarantees depend on how app\n /// developers design their smart contracts. Some actions _can_ leak\n /// information, such as:\n /// - Calling an internal public function.\n /// - Calling a public function and not setting msg_sender to Option::none\n /// (feature not built yet - see github).\n /// - Calling any public function will always leak details about the nature\n /// of the transaction, so devs should be careful in their contract\n /// designs. If it can be done in a private function, then that will give\n /// the best privacy.\n /// - Not padding the side-effects of a tx to some standardized, uniform\n /// size. The kernel circuits can take hints to pad side-effects, so a\n /// wallet should be able to request for a particular amount of padding.\n /// Wallets should ideally agree on some standard.\n /// - Padding should include:\n /// - Padding the lengths of note & nullifier arrays\n /// - Padding private logs with random fields, up to some standardized\n /// size.\n /// See also: https://docs.aztec.network/developers/resources/considerations/privacy_considerations\n ///\n /// # Advanced\n /// * The call is added to the private call stack and executed by kernel\n /// circuits after this function completes\n /// * The called function can modify its own contract's private state\n /// * Side effects from the called function are included in this transaction\n /// * The call inherits the current transaction's context and gas limits\n ///\n pub fn call_private_function<let ArgsCount: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ArgsCount],\n ) -> ReturnsHash {\n let args_hash = hash_args(args);\n execution_cache::store(args, args_hash);\n self.call_private_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n false,\n )\n }\n\n /// Makes a read-only call to a private function on another contract.\n ///\n /// This is similar to Solidity's `staticcall`. The called function\n /// cannot modify state, emit L2->L2 messages, nor emit events. Any nested\n /// calls are constrained to also be staticcalls.\n ///\n /// See `call_private_function` for more general info on private function\n /// calls.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract to call\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args` - Array of arguments to pass to the called function\n ///\n /// # Returns\n /// * `ReturnsHash` - Hash of the called function's return values. Use\n /// `.get_preimage()` to extract the actual return values.\n ///\n pub fn static_call_private_function<let ArgsCount: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ArgsCount],\n ) -> ReturnsHash {\n let args_hash = hash_args(args);\n execution_cache::store(args, args_hash);\n self.call_private_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n true,\n )\n }\n\n /// Calls a private function that takes no arguments.\n ///\n /// This is a convenience function for calling private functions that don't\n /// require any input parameters. It's equivalent to `call_private_function`\n /// but slightly more efficient to use when no arguments are needed.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n ///\n /// # Returns\n /// * `ReturnsHash` - Hash of the called function's return values. Use\n /// `.get_preimage()` to extract the actual return values.\n ///\n pub fn call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> ReturnsHash {\n self.call_private_function_with_args_hash(contract_address, function_selector, 0, false)\n }\n\n /// Makes a read-only call to a private function which takes no arguments.\n ///\n /// This combines the optimisation of `call_private_function_no_args` with\n /// the safety of `static_call_private_function`.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n ///\n /// # Returns\n /// * `ReturnsHash` - Hash of the called function's return values. Use\n /// `.get_preimage()` to extract the actual return values.\n ///\n pub fn static_call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> ReturnsHash {\n self.call_private_function_with_args_hash(contract_address, function_selector, 0, true)\n }\n\n /// Low-level private function call.\n ///\n /// This is the underlying implementation used by all other private function\n /// call methods. Instead of taking raw arguments, it accepts a\n /// hash of the arguments.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args_hash` - Pre-computed hash of the function arguments\n /// * `is_static_call` - Whether this should be a read-only call\n ///\n /// # Returns\n /// * `ReturnsHash` - Hash of the called function's return values\n ///\n pub fn call_private_function_with_args_hash(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) -> ReturnsHash {\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n let start_side_effect_counter = self.side_effect_counter;\n\n // Safety: The oracle simulates the private call and returns the value of the side effects counter after\n // execution of the call (which means that end_side_effect_counter - start_side_effect_counter is\n // the number of side effects that took place), along with the hash of the return values. We validate these\n // by requesting a private kernel iteration in which the return values are constrained to hash\n // to `returns_hash` and the side effects counter to increment from start to end.\n let (end_side_effect_counter, returns_hash) = unsafe {\n call_private_function_internal(\n contract_address,\n function_selector,\n args_hash,\n start_side_effect_counter,\n is_static_call,\n )\n };\n\n self.private_call_requests.push(\n PrivateCallRequest {\n call_context: CallContext {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n },\n args_hash,\n returns_hash,\n start_side_effect_counter,\n end_side_effect_counter,\n },\n );\n\n // TODO (fees) figure out why this crashes the prover and enable it\n // we need this in order to pay fees inside child call contexts\n // assert(\n // (item.public_inputs.min_revertible_side_effect_counter == 0 as u32)\n // | (item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter)\n // );\n // if item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter {\n // self.min_revertible_side_effect_counter = item.public_inputs.min_revertible_side_effect_counter;\n // }\n self.side_effect_counter = end_side_effect_counter + 1; // TODO: call `next_counter` instead, for consistency\n ReturnsHash::new(returns_hash)\n }\n\n /// Enqueues a call to a public function to be executed later.\n ///\n /// Unlike private functions which execute immediately on the user's device,\n /// public function calls are \"enqueued\" and executed some time later by a\n /// block proposer.\n ///\n /// This means a public function cannot return any values back to a private\n /// function, because by the time the public function is being executed,\n /// the private function which called it has already completed execution.\n /// (In fact, the private function has been executed and proven, along with\n /// all other private function calls of the user's tx. A single proof of the\n /// tx has been submitted to the Aztec network, and some time later a\n /// proposer has picked the tx up from the mempool and begun executing all\n /// of the enqueued public functions).\n ///\n /// # Privacy warning\n /// Enqueueing a public function call is an inherently leaky action.\n /// Many interesting applications will require some interaction with public\n /// state, but smart contract developers should try to use public function\n /// calls sparingly, and carefully.\n /// _Internal_ public function calls are especially leaky, because they\n /// completely leak which private contract made the call.\n /// See also: https://docs.aztec.network/developers/resources/considerations/privacy_considerations\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args` - Array of arguments to pass to the public function\n /// * `hide_msg_sender` - the called function will see a \"null\" value for\n /// `msg_sender` if set to `true`\n ///\n pub fn call_public_function<let ArgsCount: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ArgsCount],\n hide_msg_sender: bool,\n ) {\n let calldata = [function_selector.to_field()].concat(args);\n let calldata_hash = hash_calldata_array(calldata);\n execution_cache::store(calldata, calldata_hash);\n self.call_public_function_with_calldata_hash(\n contract_address,\n calldata_hash,\n false,\n hide_msg_sender,\n )\n }\n\n /// Enqueues a read-only call to a public function.\n ///\n /// This is similar to Solidity's `staticcall`. The called function\n /// cannot modify state or emit events. Any nested calls are constrained to\n /// also be staticcalls.\n ///\n /// See also `call_public_function` for more important information about\n /// making private -> public function calls.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args` - Array of arguments to pass to the public function\n /// * `hide_msg_sender` - the called function will see a \"null\" value for\n /// `msg_sender` if set to `true`\n ///\n pub fn static_call_public_function<let ArgsCount: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ArgsCount],\n hide_msg_sender: bool,\n ) {\n let calldata = [function_selector.to_field()].concat(args);\n let calldata_hash = hash_calldata_array(calldata);\n execution_cache::store(calldata, calldata_hash);\n self.call_public_function_with_calldata_hash(\n contract_address,\n calldata_hash,\n true,\n hide_msg_sender,\n )\n }\n\n /// Enqueues a call to a public function that takes no arguments.\n ///\n /// This is an optimisation for calling public functions that don't\n /// take any input parameters. It's otherwise equivalent to\n /// `call_public_function`.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `hide_msg_sender` - the called function will see a \"null\" value for\n /// `msg_sender` if set to `true`\n ///\n pub fn call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n hide_msg_sender: bool,\n ) {\n let calldata_hash = hash_calldata_array([function_selector.to_field()]);\n self.call_public_function_with_calldata_hash(\n contract_address,\n calldata_hash,\n false,\n hide_msg_sender,\n )\n }\n\n /// Enqueues a read-only call to a public function with no arguments.\n ///\n /// This combines the optimisation of `call_public_function_no_args` with\n /// the safety of `static_call_public_function`.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `hide_msg_sender` - the called function will see a \"null\" value for\n /// `msg_sender` if set to `true`\n ///\n pub fn static_call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n hide_msg_sender: bool,\n ) {\n let calldata_hash = hash_calldata_array([function_selector.to_field()]);\n self.call_public_function_with_calldata_hash(\n contract_address,\n calldata_hash,\n true,\n hide_msg_sender,\n )\n }\n\n /// Low-level public function call.\n ///\n /// This is the underlying implementation used by all other public function\n /// call methods. Instead of taking raw arguments, it accepts a\n /// hash of the arguments.\n ///\n /// Advanced function: Most developers should use `call_public_function`\n /// or `static_call_public_function` instead. This function is exposed for\n /// performance optimization and advanced use cases.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `calldata_hash` - Hash of the function calldata\n /// * `is_static_call` - Whether this should be a read-only call\n /// * `hide_msg_sender` - the called function will see a \"null\" value for\n /// `msg_sender` if set to `true`\n ///\n pub fn call_public_function_with_calldata_hash(\n &mut self,\n contract_address: AztecAddress,\n calldata_hash: Field,\n is_static_call: bool,\n hide_msg_sender: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n\n notify_enqueued_public_function_call(\n contract_address,\n calldata_hash,\n counter,\n is_static_call,\n );\n\n let msg_sender = if hide_msg_sender {\n NULL_MSG_SENDER_CONTRACT_ADDRESS\n } else {\n self.this_address()\n };\n\n let call_request =\n PublicCallRequest { msg_sender, contract_address, is_static_call, calldata_hash };\n\n self.public_call_requests.push(Counted::new(call_request, counter));\n }\n\n /// Enqueues a public function call, and designates it to be the teardown\n /// function for this tx. Only one teardown function call can be made by a\n /// tx.\n ///\n /// Niche function: Only wallet developers and paymaster contract developers\n /// (aka Fee-payment contracts) will need to make use of this function.\n ///\n /// Aztec supports a three-phase execution model: setup, app logic, teardown.\n /// The phases exist to enable a fee payer to take on the risk of paying\n /// a transaction fee, safe in the knowledge that their payment (in whatever\n /// token or method the user chooses) will succeed, regardless of whether\n /// the app logic will succeed. The \"setup\" phase ensures the fee payer\n /// has sufficient balance to pay the proposer their fees.\n /// The teardown phase is primarily intended to: calculate exactly\n /// how much the user owes, based on gas consumption, and refund the user\n /// any change.\n ///\n /// Note: in some cases, the cost of refunding the user (i.e. DA costs of\n /// tx side-effects) might exceed the refund amount. For app logic with\n /// fairly stable and predictable gas consumption, a material refund amount\n /// is unlikely. For app logic with unpredictable gas consumption, a\n /// refund might be important to the user (e.g. if a hefty function reverts\n /// very early). Wallet/FPC/Paymaster developers should be mindful of this.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the teardown\n /// function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args` - An array of fields to pass to the function.\n /// * `hide_msg_sender` - the called function will see a \"null\" value for\n /// `msg_sender` if set to `true`\n pub fn set_public_teardown_function<let ArgsCount: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ArgsCount],\n hide_msg_sender: bool,\n ) {\n let calldata = [function_selector.to_field()].concat(args);\n let calldata_hash = hash_calldata_array(calldata);\n execution_cache::store(calldata, calldata_hash);\n self.set_public_teardown_function_with_calldata_hash(\n contract_address,\n calldata_hash,\n false,\n hide_msg_sender,\n )\n }\n\n /// Low-level function to set the public teardown function.\n ///\n /// This is the underlying implementation for setting the teardown function\n /// call that will execute at the end of the transaction. Instead of taking\n /// raw arguments, it accepts a hash of the arguments.\n ///\n /// Advanced function: Most developers should use\n /// `set_public_teardown_function` instead.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the teardown\n /// function\n /// * `calldata_hash` - Hash of the function calldata\n /// * `is_static_call` - Whether this should be a read-only call\n /// * `hide_msg_sender` - the called function will see a \"null\" value for\n /// `msg_sender` if set to `true`\n ///\n pub fn set_public_teardown_function_with_calldata_hash(\n &mut self,\n contract_address: AztecAddress,\n calldata_hash: Field,\n is_static_call: bool,\n hide_msg_sender: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n\n notify_set_public_teardown_function_call(\n contract_address,\n calldata_hash,\n counter,\n is_static_call,\n );\n\n let msg_sender = if hide_msg_sender {\n NULL_MSG_SENDER_CONTRACT_ADDRESS\n } else {\n self.this_address()\n };\n\n self.public_teardown_call_request =\n PublicCallRequest { msg_sender, contract_address, is_static_call, calldata_hash };\n }\n\n /// Increments the side-effect counter.\n ///\n /// Very low-level function.\n ///\n /// # Advanced\n ///\n /// Every side-effect of a private function is given a \"side-effect counter\",\n /// based on when it is created. This PrivateContext is in charge of\n /// assigning the counters.\n ///\n /// The reason we have side-effect counters is complicated. Consider this\n /// illustrative pseudocode of inter-contract function calls:\n /// ```\n /// contract A {\n /// let x = 5; // pseudocode for storage var x.\n /// fn a1 {\n /// read x; // value: 5, counter: 1.\n /// x = x + 1;\n /// write x; // value: 6, counter: 2.\n ///\n /// B.b(); // start_counter: 2, end_counter: 4\n ///\n /// read x; // value: 36, counter: 5.\n /// x = x + 1;\n /// write x; // value: 37, counter: 6.\n /// }\n ///\n /// fn a2 {\n /// read x; // value: 6, counter: 3.\n /// x = x * x;\n /// write x; // value: 36, counter: 4.\n /// }\n /// }\n ///\n /// contract B {\n /// fn b() {\n /// A.a2();\n /// }\n /// }\n /// ```\n ///\n /// Suppose a1 is the first function called. The comments show the execution\n /// counter of each side-effect, and what the new value of `x` is.\n ///\n /// These (private) functions are processed by Aztec's kernel circuits in an\n /// order that is different from execution order:\n /// All of A.a1 is proven before B.b is proven, before A.a2 is proven.\n /// So when we're in the 2nd execution frame of A.a1 (after the call to\n /// B.b), the circuit needs to justify why x went from being `6` to `36`.\n /// But the circuit doesn't know why, and given the order of proving, the\n /// kernel hasn't _seen_ a value of 36 get written yet.\n /// The kernel needs to track big arrays of all side-effects of all\n /// private functions in a tx. Then, as it recurses and processes B.b(), it\n /// will eventually see a value of 36 get written.\n ///\n /// Suppose side-effect counters weren't exposed:\n /// The kernel would only see this ordering (in order of proof verification):\n /// [ A.a1.read, A.a1.write, A.a1.read, A.a1.write, A.a2.read, A.a2.write ]\n /// [ 5, 6, 36, 37, 6, 36 ]\n /// The kernel wouldn't know _when_ B.b() was called within A.a1(), because\n /// it can't see what's going on within an app circuit. So the kernel\n /// wouldn't know that the ordering of reads and writes should actually be:\n /// [ A.a1.read, A.a1.write, A.a2.read, A.a2.write, A.a1.read, A.a1.write ]\n /// [ 5, 6, 6, 36, 36, 37 ]\n ///\n /// And so, we introduced side-effect counters: every private function must\n /// assign side-effect counters alongside every side-effect that it emits,\n /// and also expose to the kernel the counters that it started and ended\n /// with.\n /// This gives the kernel enough information to arrange all side-effects in\n /// the correct order.\n /// It can then catch (for example) if a function tries to read state\n /// before it has been written (e.g. if A.a2() maliciously tried to read\n /// a value of x=37) (e.g. if A.a1() maliciously tried to read x=6).\n ///\n /// If a malicious app contract _lies_ and does not count correctly:\n /// - It cannot lie about its start and end counters because the kernel\n /// will catch this.\n /// - It _could_ lie about its intermediate counters:\n /// - 1. It could not increment its side-effects correctly\n /// - 2. It could label its side-effects with counters outside of its\n /// start and end counters' range.\n /// The kernel will catch 2.\n /// The kernel will not catch 1., but this would only cause corruption\n /// to the private state of the malicious contract, and not any other\n /// contracts (because a contract can only modify its own state). If\n /// a \"good\" contract is given _read access_ to a maliciously-counting\n /// contract (via an external getter function, or by reading historic\n /// state from the archive tree directly), and they then make state\n /// changes to their _own_ state accordingly, that could be dangerous.\n /// Developers should be mindful not to trust the claimed innards of\n /// external contracts unless they have audited/vetted the contracts\n /// including vetting the side-effect counter incrementation.\n /// This is a similar paradigm to Ethereum smart contract development:\n /// you must vet external contracts that your contract relies upon, and\n /// you must not make any presumptions about their claimed behaviour.\n /// (Hopefully if a contract imports a version of aztec-nr, we will get\n /// contract verification tooling that can validate the authenticity\n /// of the imported aztec-nr package, and hence infer that the side-\n /// effect counting will be correct, without having to re-audit such logic\n /// for every contract).\n ///\n fn next_counter(&mut self) -> u32 {\n let counter = self.side_effect_counter;\n self.side_effect_counter += 1;\n counter\n }\n}\n\nimpl Empty for PrivateContext {\n fn empty() -> Self {\n PrivateContext {\n inputs: PrivateContextInputs::empty(),\n side_effect_counter: 0 as u32,\n min_revertible_side_effect_counter: 0 as u32,\n is_fee_payer: false,\n args_hash: 0,\n return_hash: 0,\n include_by_timestamp: 0,\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n anchor_block_header: BlockHeader::empty(),\n private_logs: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n expected_non_revertible_side_effect_counter: 0,\n expected_revertible_side_effect_counter: 0,\n }\n }\n}\n"
|
|
3473
|
+
"source": "use crate::{\n context::{\n inputs::PrivateContextInputs, note_existence_request::NoteExistenceRequest,\n returns_hash::ReturnsHash,\n },\n hash::{hash_args, hash_calldata_array},\n keys::constants::{NULLIFIER_INDEX, NUM_KEY_TYPES, OUTGOING_INDEX, sk_generators},\n messaging::process_l1_to_l2_message,\n oracle::{\n block_header::get_block_header_at,\n call_private_function::call_private_function_internal,\n enqueue_public_function_call::{\n is_side_effect_counter_revertible_oracle_wrapper, notify_enqueued_public_function_call,\n notify_set_min_revertible_side_effect_counter, notify_set_public_teardown_function_call,\n },\n execution_cache,\n key_validation_request::get_key_validation_request,\n logs::notify_created_contract_class_log,\n notes::{notify_created_nullifier, notify_nullified_note},\n },\n};\nuse dep::protocol_types::{\n abis::{\n block_header::BlockHeader,\n call_context::CallContext,\n function_selector::FunctionSelector,\n gas_settings::GasSettings,\n log_hash::LogHash,\n note_hash::NoteHash,\n nullifier::Nullifier,\n private_call_request::PrivateCallRequest,\n private_circuit_public_inputs::PrivateCircuitPublicInputs,\n private_log::{PrivateLog, PrivateLogData},\n public_call_request::PublicCallRequest,\n validation_requests::{KeyValidationRequest, KeyValidationRequestAndGenerator},\n },\n address::{AztecAddress, EthAddress},\n constants::{\n CONTRACT_CLASS_LOG_SIZE_IN_FIELDS, MAX_CONTRACT_CLASS_LOGS_PER_CALL,\n MAX_ENQUEUED_CALLS_PER_CALL, MAX_INCLUDE_BY_TIMESTAMP_DURATION,\n MAX_KEY_VALIDATION_REQUESTS_PER_CALL, MAX_L2_TO_L1_MSGS_PER_CALL,\n MAX_NOTE_HASH_READ_REQUESTS_PER_CALL, MAX_NOTE_HASHES_PER_CALL,\n MAX_NULLIFIER_READ_REQUESTS_PER_CALL, MAX_NULLIFIERS_PER_CALL,\n MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL, MAX_PRIVATE_LOGS_PER_CALL,\n NULL_MSG_SENDER_CONTRACT_ADDRESS, PRIVATE_LOG_SIZE_IN_FIELDS,\n },\n hash::poseidon2_hash,\n messaging::l2_to_l1_message::L2ToL1Message,\n side_effect::{Counted, scoped::Scoped},\n traits::{Empty, Hash, ToField},\n utils::arrays::{ClaimedLengthArray, trimmed_array_length_hint},\n};\n\n/// # PrivateContext\n///\n/// The **main interface** between an #[external(\"private\")] function and the Aztec blockchain.\n///\n/// An instance of the PrivateContext is initialized automatically at the outset\n/// of every private function, within the #[external(\"private\")] macro, so you'll never\n/// need to consciously instantiate this yourself.\n///\n/// The instance is always named `context`, and it is always be available within\n/// the body of every #[external(\"private\")] function in your smart contract.\n///\n/// > For those used to \"vanilla\" Noir, it might be jarring to have access to\n/// > `context` without seeing a declaration `let context = PrivateContext::new(...)`\n/// > within the body of your function. This is just a consequence of using\n/// > macros to tidy-up verbose boilerplate. You can use `nargo expand` to\n/// > expand all macros, if you dare.\n///\n/// Typical usage for a smart contract developer will be to call getter\n/// methods of the PrivateContext.\n///\n/// _Pushing_ data and requests to the context is mostly handled within\n/// aztec-nr's own functions, so typically a smart contract developer won't\n/// need to call any setter methods directly.\n///\n/// > Advanced users might occasionally wish to push data to the context\n/// > directly for lower-level control. If you find yourself doing this, please\n/// > open an issue on GitHub to describe your use case: it might be that\n/// > new functionality should be added to aztec-nr.\n///\n/// ## Responsibilities\n/// - Exposes contextual data to a private function:\n/// - Data relating to how this private function was called.\n/// - msg_sender\n/// - this_address - (the contract address of the private function being\n/// executed)\n/// - See `CallContext` for more data.\n/// - Data relating to the transaction in which this private function is\n/// being executed.\n/// - chain_id\n/// - version\n/// - gas_settings\n/// - Provides state access:\n/// - Access to the \"Anchor block\" header.\n/// Recall, a private function cannot read from the \"current\" block header,\n/// but must read from some historical block header, because as soon as\n/// private function execution begins (asynchronously, on a user's device),\n/// the public state of the chain (the \"current state\") will have progressed\n/// forward. We call this reference the \"Anchor block\".\n/// See `BlockHeader`.\n/// - Enables consumption of L1->L2 messages.\n/// - Enables calls to functions of other smart contracts:\n/// - Private function calls\n/// - Enqueueing of public function call requests\n/// (Since public functions are executed at a later time, by a block\n/// proposer, we say they are \"enqueued\").\n/// - Writes data to the blockchain:\n/// - New notes\n/// - New nullifiers\n/// - Private logs (for sending encrypted note contents or encrypted events)\n/// - New L2->L1 messages.\n/// - Provides args to the private function (handled by the #[external(\"private\")] macro).\n/// - Returns the return values of this private function (handled by the\n/// #[external(\"private\")] macro).\n/// - Makes Key Validation Requests.\n/// - Private functions are not allowed to see master secret keys, because we\n/// do not trust them. They are instead given \"app-siloed\" secret keys with\n/// a claim that they relate to a master public key. They can then request\n/// validation of this claim, by making a \"key validation request\" to the\n/// protocol's kernel circuits (which _are_ allowed to see certain master\n/// secret keys).\n///\n/// ## Advanced Responsibilities\n///\n/// - Ultimately, the PrivateContext is responsible for constructing the\n/// PrivateCircuitPublicInputs of the private function being executed.\n/// All private functions on Aztec must have public inputs which adhere\n/// to the rigid layout of the PrivateCircuitPublicInputs, in order to be\n/// compatible with the protocol's kernel circuits.\n/// A well-known misnomer:\n/// - \"public inputs\" contain both inputs and outputs of this function.\n/// - By \"outputs\" we mean a lot more side-effects than just the\n/// \"return values\" of the function.\n/// - Most of the so-called \"public inputs\" are kept _private_, and never leak\n/// to the outside world, because they are 'swallowed' by the protocol's\n/// kernel circuits before the tx is sent to the network. Only the\n/// following are exposed to the outside world:\n/// - New note_hashes\n/// - New nullifiers\n/// - New private logs\n/// - New L2->L1 messages\n/// - New enqueued public function call requests\n/// All the above-listed arrays of side-effects can be padded by the\n/// user's wallet (through instructions to the kernel circuits, via the\n/// PXE) to obscure their true lengths.\n///\n/// ## Syntax Justification\n///\n/// Both user-defined functions _and_ most functions in aztec-nr need access to\n/// the PrivateContext instance to read/write data. This is why you'll see the\n/// arguably-ugly pervasiveness of the \"context\" throughout your smart contract\n/// and the aztec-nr library.\n/// For example, `&mut context` is prevalent. In some languages, you can access\n/// and mutate a global variable (such as a PrivateContext instance) from a\n/// function without polluting the function's parameters. With Noir, a function\n/// must explicitly pass control of a mutable variable to another function, by\n/// reference. Since many functions in aztec-nr need to be able to push new data\n/// to the PrivateContext, they need to be handed a mutable reference _to_ the\n/// context as a parameter.\n/// For example, `Context` is prevalent as a generic parameter, to give better\n/// type safety at compile time. Many `aztec-nr` functions don't make sense if\n/// they're called in a particular runtime (private, public or utility), and so\n/// are intentionally only implemented over certain\n/// [Private|Public|Utility]Context structs. This gives smart contract\n/// developers a much faster feedback loop if they're making a mistake, as an\n/// error will be thrown by the LSP or when they compile their contract.\n///\n#[derive(Eq)]\npub struct PrivateContext {\n // docs:start:private-context\n pub inputs: PrivateContextInputs,\n pub side_effect_counter: u32,\n\n pub min_revertible_side_effect_counter: u32,\n pub is_fee_payer: bool,\n\n pub args_hash: Field,\n pub return_hash: Field,\n\n pub include_by_timestamp: u64,\n\n pub(crate) note_hash_read_requests: BoundedVec<Scoped<Counted<Field>>, MAX_NOTE_HASH_READ_REQUESTS_PER_CALL>,\n pub(crate) nullifier_read_requests: BoundedVec<Scoped<Counted<Field>>, MAX_NULLIFIER_READ_REQUESTS_PER_CALL>,\n key_validation_requests_and_generators: BoundedVec<KeyValidationRequestAndGenerator, MAX_KEY_VALIDATION_REQUESTS_PER_CALL>,\n\n pub note_hashes: BoundedVec<Counted<NoteHash>, MAX_NOTE_HASHES_PER_CALL>,\n pub nullifiers: BoundedVec<Counted<Nullifier>, MAX_NULLIFIERS_PER_CALL>,\n\n pub private_call_requests: BoundedVec<PrivateCallRequest, MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL>,\n pub public_call_requests: BoundedVec<Counted<PublicCallRequest>, MAX_ENQUEUED_CALLS_PER_CALL>,\n pub public_teardown_call_request: PublicCallRequest,\n pub l2_to_l1_msgs: BoundedVec<Counted<L2ToL1Message>, MAX_L2_TO_L1_MSGS_PER_CALL>,\n // docs:end:private-context\n\n // Header of a block whose state is used during private execution (not the block the transaction is included in).\n pub anchor_block_header: BlockHeader,\n\n pub private_logs: BoundedVec<Counted<PrivateLogData>, MAX_PRIVATE_LOGS_PER_CALL>,\n pub contract_class_logs_hashes: BoundedVec<Counted<LogHash>, MAX_CONTRACT_CLASS_LOGS_PER_CALL>,\n\n // Contains the last key validation request for each key type. This is used to cache the last request and avoid\n // fetching the same request multiple times.\n // The index of the array corresponds to the key type (0 nullifier, 1 incoming, 2 outgoing, 3 tagging).\n pub last_key_validation_requests: [Option<KeyValidationRequest>; NUM_KEY_TYPES],\n\n pub expected_non_revertible_side_effect_counter: u32,\n pub expected_revertible_side_effect_counter: u32,\n}\n\nimpl PrivateContext {\n pub fn new(inputs: PrivateContextInputs, args_hash: Field) -> PrivateContext {\n let max_allowed_include_by_timestamp = inputs.anchor_block_header.global_variables.timestamp\n + MAX_INCLUDE_BY_TIMESTAMP_DURATION;\n PrivateContext {\n inputs,\n side_effect_counter: inputs.start_side_effect_counter + 1,\n min_revertible_side_effect_counter: 0,\n is_fee_payer: false,\n args_hash,\n return_hash: 0,\n include_by_timestamp: max_allowed_include_by_timestamp,\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n anchor_block_header: inputs.anchor_block_header,\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n private_logs: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n expected_non_revertible_side_effect_counter: 0,\n expected_revertible_side_effect_counter: 0,\n }\n }\n\n /// Returns the contract address that initiated this function call.\n ///\n /// This is similar to `msg.sender` in Solidity (hence the name).\n ///\n /// Important Note: Since Aztec doesn't have a concept of an EoA (Externally-owned Account), the msg_sender is\n /// \"none\" for the first function call of every transaction. The first function call of a tx is likely to be a call\n /// to the user's account contract, so this quirk will most often be handled by account contract developers.\n ///\n /// # Returns\n /// * `Option<AztecAddress>` - The address of the smart contract that called this function (be it an app contract\n /// or a user's account contract). Returns `Option<AztecAddress>::none` for the first function call of the tx. No\n /// other _private_ function calls in the tx will have a `none` msg_sender, but _public_ function calls might\n /// (see the PublicContext).\n pub fn maybe_msg_sender(self) -> Option<AztecAddress> {\n let maybe_msg_sender = self.inputs.call_context.msg_sender;\n if maybe_msg_sender == NULL_MSG_SENDER_CONTRACT_ADDRESS {\n Option::none()\n } else {\n Option::some(maybe_msg_sender)\n }\n }\n\n /// Returns the contract address of the current function being executed.\n ///\n /// This is equivalent to `address(this)` in Solidity (hence the name).\n /// Use this to identify the current contract's address, commonly needed for\n /// access control or when interacting with other contracts.\n ///\n /// # Returns\n /// * `AztecAddress` - The contract address of the current function being\n /// executed.\n ///\n pub fn this_address(self) -> AztecAddress {\n self.inputs.call_context.contract_address\n }\n\n /// Returns the chain ID of the current network.\n ///\n /// This is similar to `block.chainid` in Solidity. Returns the unique\n /// identifier for the blockchain network this transaction is executing on.\n ///\n /// Helps prevent cross-chain replay attacks. Useful if implementing\n /// multi-chain contract logic.\n ///\n /// # Returns\n /// * `Field` - The chain ID as a field element\n ///\n pub fn chain_id(self) -> Field {\n self.inputs.tx_context.chain_id\n }\n\n /// Returns the Aztec protocol version that this transaction is executing\n /// under. Different versions may have different rules, opcodes, or\n /// cryptographic primitives.\n ///\n /// This is similar to how Ethereum has different EVM versions.\n ///\n /// Useful for forward/backward compatibility checks\n ///\n /// Not to be confused with contract versions; this is the protocol version.\n ///\n /// # Returns\n /// * `Field` - The protocol version as a field element\n ///\n pub fn version(self) -> Field {\n self.inputs.tx_context.version\n }\n\n /// Returns the gas settings for the current transaction.\n ///\n /// This provides information about gas limits and pricing for the\n /// transaction, similar to `tx.gasprice` and gas limits in Ethereum.\n /// However, Aztec has a more sophisticated gas model with separate\n /// accounting for L2 computation and data availability (DA) costs.\n ///\n /// # Returns\n /// * `GasSettings` - Struct containing gas limits and fee information\n ///\n pub fn gas_settings(self) -> GasSettings {\n self.inputs.tx_context.gas_settings\n }\n\n /// Returns the function selector of the currently executing function.\n ///\n /// Low-level function: Ordinarily, smart contract developers will not need\n /// to access this.\n ///\n /// This is similar to `msg.sig` in Solidity, which returns the first 4\n /// bytes of the function signature. In Aztec, the selector uniquely\n /// identifies which function within the contract is being called.\n ///\n /// # Returns\n /// * `FunctionSelector` - The 4-byte function identifier\n ///\n /// # Advanced\n /// Only #[external(\"private\")] functions have a function selector as a protocol-\n /// enshrined concept. The function selectors of private functions are\n /// baked into the preimage of the contract address, and are used by the\n /// protocol's kernel circuits to identify each private function and ensure\n /// the correct one is being executed.\n ///\n /// Used internally for function dispatch and call verification.\n ///\n pub fn selector(self) -> FunctionSelector {\n self.inputs.call_context.function_selector\n }\n\n /// Returns the hash of the arguments passed to the current function.\n ///\n /// Very low-level function: You shouldn't need to call this. The #[external(\"private\")]\n /// macro calls this, and it makes the arguments neatly available to the\n /// body of your private function.\n ///\n /// # Returns\n /// * `Field` - Hash of the function arguments\n ///\n /// # Advanced\n /// * Arguments are hashed to reduce proof size and verification time\n /// * Enables efficient argument passing in recursive function calls\n /// * The hash can be used to retrieve the original arguments from the PXE.\n ///\n pub fn get_args_hash(self) -> Field {\n self.args_hash\n }\n\n /// Pushes a new note_hash to the Aztec blockchain's global Note Hash Tree\n /// (a state tree).\n ///\n /// A note_hash is a commitment to a piece of private state.\n ///\n /// Low-level function: Ordinarily, smart contract developers will not need\n /// to manually call this. Aztec-nr's state variables (see `../state_vars/`)\n /// are designed to understand when to create and push new note hashes.\n ///\n /// # Arguments\n /// * `note_hash` - The new note_hash.\n ///\n /// # Advanced\n /// From here, the protocol's kernel circuits will take over and insert the\n /// note_hash into the protocol's \"note hash tree\" (in the Base Rollup\n /// circuit).\n /// Before insertion, the protocol will:\n /// - \"Silo\" the `note_hash` with the contract address of this function,\n /// to yield a `siloed_note_hash`. This prevents state collisions\n /// between different smart contracts.\n /// - Ensure uniqueness of the `siloed_note_hash`, to prevent Faerie-Gold\n /// attacks, by hashing the `siloed_note_hash` with a unique value, to\n /// yield a `unique_siloed_note_hash` (see the protocol spec for more).\n ///\n /// In addition to calling this function, aztec-nr provides the contents\n /// of the newly-created note to the PXE, via the `notify_created_note`\n /// oracle.\n ///\n /// > Advanced users might occasionally wish to push data to the context\n /// > directly for lower-level control. If you find yourself doing this,\n /// > please open an issue on GitHub to describe your use case: it might be\n /// > that new functionality should be added to aztec-nr.\n ///\n pub fn push_note_hash(&mut self, note_hash: Field) {\n self.note_hashes.push(Counted::new(note_hash, self.next_counter()));\n }\n\n /// Pushes a new nullifier to the Aztec blockchain's global Nullifier Tree\n /// (a state tree).\n ///\n /// See also: `push_nullifier_for_note_hash`.\n ///\n /// Low-level function: Ordinarily, smart contract developers will not need\n /// to manually call this. Aztec-nr's state variables (see `../state_vars/`)\n /// are designed to understand when to create and push new nullifiers.\n ///\n /// A nullifier can only be emitted once. Duplicate nullifier insertions are\n /// rejected by the protocol.\n ///\n /// Generally, a nullifier is emitted to prevent an action from happening\n /// more than once, in such a way that the action cannot be linked (by an\n /// observer of the blockchain) to any earlier transactions.\n ///\n /// I.e. a nullifier is a random-looking, but deterministic record of a\n /// private, one-time action, which does not leak what action has been\n /// taken, and which preserves the property of \"tx unlinkability\".\n ///\n /// Usually, a nullifier will be emitted to \"spend\" a note (a piece of\n /// private state), without revealing which specific note is being spent.\n ///\n /// (Important: in such cases, use the below `push_nullifier_for_note_hash`).\n ///\n /// Sometimes, a nullifier might be emitted completely unrelated to any\n /// notes. Examples include initialization of a new contract; initialization\n /// of a PrivateMutable, or signalling in Semaphore-like applications.\n /// This `push_nullifier` function serves such use cases.\n ///\n /// # Arguments\n /// * `nullifier`\n ///\n /// # Advanced\n /// From here, the protocol's kernel circuits will take over and insert the\n /// nullifier into the protocol's \"nullifier tree\" (in the Base Rollup\n /// circuit).\n /// Before insertion, the protocol will:\n /// - \"Silo\" the `nullifier` with the contract address of this function,\n /// to yield a `siloed_nullifier`. This prevents state collisions\n /// between different smart contracts.\n /// - Ensure the `siloed_nullifier` is unique (the nullifier tree is an\n /// indexed merkle tree which supports efficient non-membership proofs).\n ///\n pub fn push_nullifier(&mut self, nullifier: Field) {\n notify_created_nullifier(nullifier);\n self.nullifiers.push(Nullifier { value: nullifier, note_hash: 0 }.count(self.next_counter()));\n }\n\n /// Pushes a nullifier that corresponds to a specific note hash.\n ///\n /// Low-level function: Ordinarily, smart contract developers will not need\n /// to manually call this. Aztec-nr's state variables (see `../state_vars/`)\n /// are designed to understand when to create and push new nullifiers.\n ///\n /// This is a specialized version of `push_nullifier` that links a nullifier\n /// to the specific note hash it's nullifying. This is the most common\n /// usage pattern for nullifiers.\n /// See `push_nullifier` for more explanation on nullifiers.\n ///\n /// # Arguments\n /// * `nullifier`\n /// * `nullified_note_hash` - The note hash of the note being nullified\n ///\n /// # Advanced\n /// Important: usage of this function doesn't mean that the world will _see_\n /// that this nullifier relates to the given nullified_note_hash (as that\n /// would violate \"tx unlinkability\"); it simply informs the user's PXE\n /// about the relationship (via `notify_nullified_note`). The PXE can then\n /// use this information to feed hints to the kernel circuits for\n /// \"squashing\" purposes: If a note is nullified during the same tx which\n /// created it, we can \"squash\" (delete) the note and nullifier (and any\n /// private logs associated with the note), to save on data emission costs.\n ///\n pub fn push_nullifier_for_note_hash(&mut self, nullifier: Field, nullified_note_hash: Field) {\n let nullifier_counter = self.next_counter();\n notify_nullified_note(nullifier, nullified_note_hash, nullifier_counter);\n self.nullifiers.push(Nullifier { value: nullifier, note_hash: nullified_note_hash }.count(\n nullifier_counter,\n ));\n }\n\n /// Returns the anchor block header - the historical block header that this\n /// private function is reading from.\n ///\n /// A private function CANNOT read from the \"current\" block header,\n /// but must read from some older block header, because as soon as\n /// private function execution begins (asynchronously, on a user's device),\n /// the public state of the chain (the \"current state\") will have progressed\n /// forward.\n ///\n /// # Returns\n /// * `BlockHeader` - The anchor block header.\n ///\n /// # Advanced\n /// * All private functions of a tx read from the same anchor block header.\n /// * The protocol asserts that the `include_by_timestamp` of every tx\n /// is at most 24 hours beyond the timestamp of the tx's chosen anchor\n /// block header. This enables the network's nodes to safely prune old txs\n /// from the mempool. Therefore, the chosen block header _must_ be one\n /// from within the last 24 hours.\n ///\n pub fn get_anchor_block_header(self) -> BlockHeader {\n self.anchor_block_header\n }\n\n /// Returns the header of any historical block at or before the anchor\n /// block.\n ///\n /// This enables private contracts to access information from even older\n /// blocks than the anchor block header.\n ///\n /// Useful for time-based contract logic that needs to compare against\n /// multiple historical points.\n ///\n /// # Arguments\n /// * `block_number` - The block number to retrieve (must be <= anchor\n /// block number)\n ///\n /// # Returns\n /// * `BlockHeader` - The header of the requested historical block\n ///\n /// # Advanced\n /// This function uses an oracle to fetch block header data from the user's\n /// PXE. Depending on how much blockchain data the user's PXE has been set\n /// up to store, this might require a query from the PXE to another Aztec\n /// node to get the data.\n /// > This is generally true of all oracle getters (see `../oracle`).\n ///\n /// Each block header gets hashed and stored as a leaf in the protocol's\n /// Archive Tree. In fact, the i-th block header gets stored at the i-th\n /// leaf index of the Archive Tree. Behind the scenes, this\n /// `get_block_header_at` function will add Archive Tree merkle-membership\n /// constraints (~3k) to your smart contract function's circuit, to prove\n /// existence of the block header in the Archive Tree.\n ///\n /// Note: we don't do any caching, so avoid making duplicate calls for the\n /// same block header, because each call will add duplicate constraints.\n ///\n /// Calling this function is more expensive (constraint-wise) than getting\n /// the anchor block header (via `get_block_header`). This is because the\n /// anchor block's merkle membership proof is handled by Aztec's protocol\n /// circuits, and is only performed once for the entire tx because all\n /// private functions of a tx share a common anchor block header. Therefore,\n /// the cost (constraint-wise) of calling `get_block_header` is effectively\n /// free.\n ///\n pub fn get_block_header_at(self, block_number: u32) -> BlockHeader {\n get_block_header_at(block_number, self)\n }\n\n /// Sets the hash of the return values for this private function.\n ///\n /// Very low-level function: this is called by the #[external(\"private\")] macro.\n ///\n /// # Arguments\n /// * `serialized_return_values` - The serialized return values as a field array\n ///\n pub fn set_return_hash<let N: u32>(&mut self, serialized_return_values: [Field; N]) {\n let return_hash = hash_args(serialized_return_values);\n self.return_hash = return_hash;\n execution_cache::store(serialized_return_values, return_hash);\n }\n\n /// Builds the PrivateCircuitPublicInputs for this private function, to\n /// ensure compatibility with the protocol's kernel circuits.\n ///\n /// Very low-level function: This function is automatically called by the\n /// #[external(\"private\")] macro.\n pub fn finish(self) -> PrivateCircuitPublicInputs {\n PrivateCircuitPublicInputs {\n call_context: self.inputs.call_context,\n args_hash: self.args_hash,\n returns_hash: self.return_hash,\n min_revertible_side_effect_counter: self.min_revertible_side_effect_counter,\n is_fee_payer: self.is_fee_payer,\n include_by_timestamp: self.include_by_timestamp,\n note_hash_read_requests: ClaimedLengthArray::from_bounded_vec(\n self.note_hash_read_requests,\n ),\n nullifier_read_requests: ClaimedLengthArray::from_bounded_vec(\n self.nullifier_read_requests,\n ),\n key_validation_requests_and_generators: ClaimedLengthArray::from_bounded_vec(\n self.key_validation_requests_and_generators,\n ),\n note_hashes: ClaimedLengthArray::from_bounded_vec(self.note_hashes),\n nullifiers: ClaimedLengthArray::from_bounded_vec(self.nullifiers),\n private_call_requests: ClaimedLengthArray::from_bounded_vec(self.private_call_requests),\n public_call_requests: ClaimedLengthArray::from_bounded_vec(self.public_call_requests),\n public_teardown_call_request: self.public_teardown_call_request,\n l2_to_l1_msgs: ClaimedLengthArray::from_bounded_vec(self.l2_to_l1_msgs),\n start_side_effect_counter: self.inputs.start_side_effect_counter,\n end_side_effect_counter: self.side_effect_counter,\n private_logs: ClaimedLengthArray::from_bounded_vec(self.private_logs),\n contract_class_logs_hashes: ClaimedLengthArray::from_bounded_vec(\n self.contract_class_logs_hashes,\n ),\n anchor_block_header: self.anchor_block_header,\n tx_context: self.inputs.tx_context,\n expected_non_revertible_side_effect_counter: self\n .expected_non_revertible_side_effect_counter,\n expected_revertible_side_effect_counter: self.expected_revertible_side_effect_counter,\n }\n }\n\n /// Designates this contract as the fee payer for the transaction.\n ///\n /// Unlike Ethereum, where the transaction sender always pays fees, Aztec\n /// allows any contract to voluntarily pay transaction fees. This enables\n /// patterns like sponsored transactions or fee abstraction where users\n /// don't need to hold fee-juice themselves. (Fee juice is a fee-paying\n /// asset for Aztec).\n ///\n /// Only one contract per transaction can declare itself as the fee payer,\n /// and it must have sufficient fee-juice balance (>= the gas limits\n /// specified in the TxContext) by the time we reach the public setup phase\n /// of the tx.\n ///\n pub fn set_as_fee_payer(&mut self) {\n dep::protocol_types::debug_log::debug_log_format(\n \"Setting {0} as fee payer\",\n [self.this_address().to_field()],\n );\n self.is_fee_payer = true;\n }\n\n pub fn in_revertible_phase(&mut self) -> bool {\n let current_counter = self.side_effect_counter;\n\n // Safety: Kernel will validate that the claim is correct by validating the expected counters.\n let is_revertible =\n unsafe { is_side_effect_counter_revertible_oracle_wrapper(current_counter) };\n\n if is_revertible {\n if (self.expected_revertible_side_effect_counter == 0)\n | (current_counter < self.expected_revertible_side_effect_counter) {\n self.expected_revertible_side_effect_counter = current_counter;\n }\n } else if current_counter > self.expected_non_revertible_side_effect_counter {\n self.expected_non_revertible_side_effect_counter = current_counter;\n }\n\n is_revertible\n }\n\n /// Declares the end of the \"setup phase\" of this tx.\n ///\n /// Only one function per tx can declare the end of the setup phase.\n ///\n /// Niche function: Only wallet developers and paymaster contract developers\n /// (aka Fee-payment contracts) will need to make use of this function.\n ///\n /// Aztec supports a three-phase execution model: setup, app logic, teardown.\n /// The phases exist to enable a fee payer to take on the risk of paying\n /// a transaction fee, safe in the knowledge that their payment (in whatever\n /// token or method the user chooses) will succeed, regardless of whether\n /// the app logic will succeed. The \"setup\" phase enables such a payment to\n /// be made, because the setup phase _cannot revert_: a reverting function\n /// within the setup phase would result in an invalid block which cannot\n /// be proven. Any side-effects generated during that phase are guaranteed\n /// to be inserted into Aztec's state trees (except for squashed notes &\n /// nullifiers, of course).\n ///\n /// Even though the end of the setup phase is declared within a private\n /// function, you might have noticed that _public_ functions can also\n /// execute within the setup phase. This is because any public function\n /// calls which were enqueued _within the setup phase_ by a private\n /// function are considered part of the setup phase.\n ///\n /// # Advanced\n /// * Sets the minimum revertible side effect counter of this tx to be the\n /// PrivateContext's _current_ side effect counter.\n ///\n pub fn end_setup(&mut self) {\n // Incrementing the side effect counter when ending setup ensures non\n // ambiguity for the counter where we change phases.\n self.side_effect_counter += 1;\n // dep::protocol_types::debug_log::debug_log_format(\n // \"Ending setup at counter {0}\",\n // [self.side_effect_counter as Field]\n // );\n self.min_revertible_side_effect_counter = self.next_counter();\n notify_set_min_revertible_side_effect_counter(self.min_revertible_side_effect_counter);\n }\n\n /// Sets a deadline (an \"include-by timestamp\") for when this transaction\n /// must be included in a block.\n ///\n /// Other functions in this tx might call this setter with differing\n /// values for the include-by timestamp. To ensure that all functions'\n /// deadlines are met, the _minimum_ of all these include-by timestamps will\n /// be exposed when this tx is submitted to the network.\n ///\n /// If the transaction is not included in a block by its include-by\n /// timestamp, it becomes invalid and it will never be included.\n ///\n /// This expiry timestamp is publicly visible. See the \"Advanced\" section\n /// for privacy concerns.\n ///\n /// # Arguments\n /// * `include_by_timestamp` - Unix timestamp (seconds) deadline for inclusion.\n /// The include-by timestamp of this tx will be\n /// _at most_ the timestamp specified.\n ///\n /// # Advanced\n /// * If multiple functions set differing `include_by_timestamp`s, the\n /// kernel circuits will set it to be the _minimum_ of the two. This\n /// ensures the tx expiry requirements of all functions in the tx are met.\n /// * Rollup circuits will reject expired txs.\n /// * The protocol enforces that all transactions must be included within\n /// 24 hours of their chosen anchor block's timestamp, to enable safe\n /// mempool pruning.\n /// * The DelayedPublicMutable design makes heavy use of this functionality,\n /// to enable private functions to read public state.\n /// * A sophisticated Wallet should cleverly set an include-by timestamp\n /// to improve the privacy of the user and the network as a whole.\n /// For example, if a contract interaction sets include-by to some\n /// publicly-known value (e.g. the time when a contract upgrades), then\n /// the wallet might wish to set an even lower one to avoid revealing that\n /// this tx is interacting with said contract.\n /// Ideally, all wallets should standardize on an approach in order to\n /// provide users with a large anonymity set -- although the exact approach\n /// will need to be discussed. Wallets that deviate from a standard might\n /// accidentally reveal which wallet each transaction originates from.\n ///\n // docs:start:include-by-timestamp\n pub fn set_include_by_timestamp(&mut self, include_by_timestamp: u64) {\n // docs:end:include-by-timestamp\n self.include_by_timestamp = std::cmp::min(self.include_by_timestamp, include_by_timestamp);\n }\n\n /// Asserts that a note has been created.\n ///\n /// This function will cause the transaction to fail unless the requested note exists. This is the preferred\n /// mechanism for performing this check, and the only one that works for pending notes.\n ///\n /// ## Pending Notes\n ///\n /// Both settled notes (created in prior transactions) and pending notes (created in the current transaction) will\n /// be considered by this function. Pending notes must have been created **before** this call is made for the check\n /// to pass.\n ///\n /// ## Historical Notes\n ///\n /// If you need to assert that a note existed _at some specific time in the past_, instead of simply proving that it\n /// exists in the current anchor block, use\n /// [crate::history::note_inclusion::ProveNoteInclusion::prove_note_inclusion] instead.\n ///\n /// ## Cost\n ///\n /// This uses up one of the call's kernel note hash read requests, which are limited. Like all kernel requests,\n /// proving time costs are only incurred when the total number of requests exceeds the kernel's capacity, requiring\n /// an additional invocation of the kernel reset circuit.\n pub fn assert_note_exists(&mut self, note_existence_request: NoteExistenceRequest) {\n // Note that the `note_hash_read_requests` array does not hold `NoteExistenceRequest` objects, but rather a\n // custom kernel type. We convert from the aztec-nr type into it.\n\n let note_hash = note_existence_request.note_hash();\n let contract_address =\n note_existence_request.maybe_contract_address().unwrap_or(AztecAddress::zero());\n\n let side_effect = Scoped::new(\n Counted::new(note_hash, self.next_counter()),\n contract_address,\n );\n\n self.note_hash_read_requests.push(side_effect);\n }\n\n /// Asserts that a nullifier has been emitted.\n ///\n /// This function will cause the transaction to fail unless the requested nullifier exists. This is the preferred\n /// mechanism for performing this check, and the only one that works for pending nullifiers.\n ///\n /// ## Pending Nullifiers\n ///\n /// Both settled nullifiers (emitted in prior transactions) and pending nullifiers (emitted in the current\n /// transaction) will be considered by this function. Pending nullifiers must have been emitted **before** this call\n /// is made for the check to pass.\n ///\n /// ## Historical Nullifiers\n ///\n /// If you need to assert that a nullifier existed _at some specific time in the past_, instead of simply proving\n /// that it exists in the current anchor block, use\n /// [crate::history::nullifier_inclusion::ProveNullifierInclusion::prove_nullifier_inclusion] instead.\n ///\n /// ## Public vs Private\n ///\n /// In general, it is unsafe to check for nullifier non-existence in private, as that will not consider the\n /// possibility of the nullifier having been emitted in any transaction between the anchor block and the inclusion\n /// block. Private functions instead prove existence via this function and 'prove' non-existence by _emitting_ the\n /// nullifer, which would cause the transaction to fail if the nullifier existed.\n ///\n /// This is not the case in public functions, which do have access to the tip of the blockchain and so can reliably\n /// prove whether a nullifier exists or not via\n /// [crate::context::public_context::PublicContext::nullifier_exists_unsafe].\n ///\n /// ## Cost\n ///\n /// This uses up one of the call's kernel nullifier read requests, which are limited. Like all kernel requests,\n /// proving time costs are only incurred when the total number of requests exceeds the kernel's capacity, requiring\n /// an additional invocation of the kernel reset circuit.\n pub fn assert_nullifier_exists(\n &mut self,\n unsiloed_nullifier: Field,\n contract_address: AztecAddress,\n ) {\n let request = Scoped::new(\n Counted::new(unsiloed_nullifier, self.next_counter()),\n contract_address,\n );\n self.nullifier_read_requests.push(request);\n }\n\n /// Requests the app-siloed nullifier secret key (nsk_app) for the given\n /// (hashed) master nullifier public key (npk_m), from the user's PXE.\n ///\n /// Advanced function: Only needed if you're designing your own notes and/or\n /// nullifiers.\n ///\n /// Contracts are not allowed to compute nullifiers for other contracts, as\n /// that would let them read parts of their private state. Because of this,\n /// a contract is only given an \"app-siloed secret key\", which is\n /// constructed by hashing the user's master nullifier secret key with the\n /// contract's address.\n /// However, because contracts cannot be trusted with a user's master\n /// nullifier secret key (because we don't know which contracts are honest\n /// or malicious), the PXE refuses to provide any master secret keys to\n /// any app smart contract function. This means app functions are unable to\n /// prove that the derivation of an app-siloed nullifier secret key has been\n /// computed correctly. Instead, an app function can request to the kernel\n /// (via `request_nsk_app`) that it validates the siloed derivation, since\n /// the kernel has been vetted to not leak any master secret keys.\n ///\n /// A common nullification scheme is to inject a nullifier secret key into\n /// the preimage of a nullifier, to make the nullifier deterministic but\n /// random-looking. This function enables that flow.\n ///\n /// # Arguments\n /// * `npk_m_hash` - A hash of the master nullifier public key of the user\n /// whose PXE is executing this function.\n ///\n /// # Returns\n /// * The app-siloed nullifier secret key that corresponds to the given\n /// `npk_m_hash`.\n ///\n pub fn request_nsk_app(&mut self, npk_m_hash: Field) -> Field {\n self.request_sk_app(npk_m_hash, NULLIFIER_INDEX)\n }\n\n /// Requests the app-siloed nullifier secret key (nsk_app) for the given\n /// (hashed) master nullifier public key (npk_m), from the user's PXE.\n ///\n /// See `request_nsk_app` and `request_sk_app` for more info.\n ///\n /// The intention of the \"outgoing\" keypair is to provide a second secret\n /// key for all of a user's outgoing activity (i.e. for notes that a user\n /// creates, as opposed to notes that a user receives from others). The\n /// separation of incoming and outgoing data was a distinction made by\n /// zcash, with the intention of enabling a user to optionally share with a\n /// 3rd party a controlled view of only incoming or outgoing notes.\n /// Similar functionality of sharing select data can be achieved with\n /// offchain zero-knowledge proofs. It is up to an app developer whether\n /// they choose to make use of a user's outgoing keypair within their\n /// application logic, or instead simply use the same keypair (the address\n /// keypair (which is effectively the same as the \"incoming\" keypair)) for\n /// all incoming & outgoing messages to a user.\n ///\n /// Currently, all of the exposed encryption functions in aztec-nr ignore\n /// the outgoing viewing keys, and instead encrypt all note logs and event\n /// logs to a user's address public key.\n ///\n /// # Arguments\n /// * `ovpk_m_hash` - Hash of the outgoing viewing public key master\n ///\n /// # Returns\n /// * The application-specific outgoing viewing secret key\n ///\n pub fn request_ovsk_app(&mut self, ovpk_m_hash: Field) -> Field {\n self.request_sk_app(ovpk_m_hash, OUTGOING_INDEX)\n }\n\n /// Pushes a Key Validation Request to the kernel.\n ///\n /// Private functions are not allowed to see a user's master secret keys,\n /// because we do not trust them. They are instead given \"app-siloed\" secret\n /// keys with a claim that they relate to a master public key.\n /// They can then request validation of this claim, by making a \"key\n /// validation request\" to the protocol's kernel circuits (which _are_\n /// allowed to see certain master secret keys).\n ///\n /// When a Key Validation Request tuple of (sk_app, Pk_m, app_address) is\n /// submitted to the kernel, it will perform the following derivations\n /// to validate the relationship between the claimed sk_app and the user's\n /// Pk_m:\n ///\n /// (sk_m) ----> * G ----> Pk_m\n /// | |\n /// v We use the kernel to prove this\n /// h(sk_m, app_address) | sk_app-Pk_m relationship, because app\n /// | circuits must not be trusted to see sk_m.\n /// v |\n /// sk_app - - - - - - - - -\n ///\n /// The function is named \"request_\" instead of \"get_\" to remind the user\n /// that a Key Validation Request will be emitted to the kernel.\n ///\n fn request_sk_app(&mut self, pk_m_hash: Field, key_index: Field) -> Field {\n let cached_request = self.last_key_validation_requests[key_index as u32].unwrap_or(\n KeyValidationRequest::empty(),\n );\n\n if cached_request.pk_m.hash() == pk_m_hash {\n // We get a match so the cached request is the latest one\n cached_request.sk_app\n } else {\n // We didn't get a match meaning the cached result is stale\n // Typically we'd validate keys by showing that they are the preimage of `pk_m_hash`, but that'd require\n // the oracle returning the master secret keys, which could cause malicious contracts to leak it or learn\n // about secrets from other contracts. We therefore silo secret keys, and rely on the private kernel to\n // validate that we siloed secret key corresponds to correct siloing of the master secret key that hashes\n // to `pk_m_hash`.\n\n // Safety: Kernels verify that the key validation request is valid and below we verify that a request\n // for the correct public key has been received.\n let request = unsafe { get_key_validation_request(pk_m_hash, key_index) };\n assert_eq(request.pk_m.hash(), pk_m_hash, \"Obtained invalid key validation request\");\n\n self.key_validation_requests_and_generators.push(\n KeyValidationRequestAndGenerator {\n request,\n sk_app_generator: sk_generators[key_index as u32],\n },\n );\n self.last_key_validation_requests[key_index as u32] = Option::some(request);\n request.sk_app\n }\n }\n\n /// Sends an \"L2 -> L1 message\" from this function (Aztec, L2) to a smart\n /// contract on Ethereum (L1). L1 contracts which are designed to\n /// send/receive messages to/from Aztec are called \"Portal Contracts\".\n ///\n /// Common use cases include withdrawals, cross-chain asset transfers, and\n /// triggering L1 actions based on L2 state changes.\n ///\n /// The message will be inserted into an Aztec \"Outbox\" contract on L1,\n /// when this transaction's block is proposed to L1.\n /// Sending the message will not result in any immediate state changes in\n /// the target portal contract. The message will need to be manually\n /// consumed from the Outbox through a separate Ethereum transaction: a user\n /// will need to call a function of the portal contract -- a function\n /// specifically designed to make a call to the Outbox to consume the\n /// message.\n /// The message will only be available for consumption once the _epoch_\n /// proof has been submitted. Given that there are multiple Aztec blocks\n /// within an epoch, it might take some time for this epoch proof to be\n /// submitted -- especially if the block was near the start of an epoch.\n ///\n /// # Arguments\n /// * `recipient` - Ethereum address that will receive the message\n /// * `content` - Message content (32 bytes as a Field element).\n /// This content has a very specific layout.\n /// docs:start:context_message_portal\n pub fn message_portal(&mut self, recipient: EthAddress, content: Field) {\n let message = L2ToL1Message { recipient, content };\n self.l2_to_l1_msgs.push(message.count(self.next_counter()));\n }\n\n /// Consumes a message sent from Ethereum (L1) to Aztec (L2).\n ///\n /// Common use cases include token bridging, cross-chain governance, and\n /// triggering L2 actions based on L1 events.\n ///\n /// Use this function if you only want the message to ever be \"referred to\"\n /// once. Once consumed using this method, the message cannot be consumed\n /// again, because a nullifier is emitted.\n /// If your use case wants for the message to be read unlimited times, then\n /// you can always read any historic message from the L1-to-L2 messages tree;\n /// messages never technically get deleted from that tree.\n ///\n /// The message will first be inserted into an Aztec \"Inbox\" smart contract\n /// on L1.\n /// Sending the message will not result in any immediate state changes in\n /// the target L2 contract. The message will need to be manually\n /// consumed by the target contract through a separate Aztec transaction.\n /// The message will not be available for consumption immediately. Messages\n /// get copied over from the L1 Inbox to L2 by the next Proposer in batches.\n /// So you will need to wait until the messages are copied before you can\n /// consume them.\n ///\n /// # Arguments\n /// * `content` - The message content that was sent from L1\n /// * `secret` - Secret value used for message privacy (if needed)\n /// * `sender` - Ethereum address that sent the message\n /// * `leaf_index` - Index of the message in the L1-to-L2 message tree\n ///\n /// # Advanced\n /// Validates message existence in the L1-to-L2 message tree and nullifies\n /// the message to prevent double-consumption.\n ///\n pub fn consume_l1_to_l2_message(\n &mut self,\n content: Field,\n secret: Field,\n sender: EthAddress,\n leaf_index: Field,\n ) {\n let nullifier = process_l1_to_l2_message(\n self.anchor_block_header.state.l1_to_l2_message_tree.root,\n self.this_address(),\n sender,\n self.chain_id(),\n self.version(),\n content,\n secret,\n leaf_index,\n );\n\n // Push nullifier (and the \"commitment\" corresponding to this can be \"empty\")\n self.push_nullifier(nullifier)\n }\n\n /// Emits a private log (an array of Fields) that will be published to an\n /// Ethereum blob.\n ///\n /// Private logs are intended for the broadcasting of ciphertexts: that is,\n /// encrypted events or encrypted note contents.\n /// Since the data in the logs is meant to be _encrypted_, private_logs are\n /// broadcast to publicly-visible Ethereum blobs.\n /// The intended recipients of such encrypted messages can then discover and\n /// decrypt these encrypted logs using their viewing secret key.\n /// (See `../messages/discovery` for more details).\n ///\n /// Important note: This function DOES NOT _do_ any encryption of the input\n /// `log` fields. This function blindly publishes whatever input `log` data\n /// is fed into it, so the caller of this function should have already\n /// performed the encryption, and the `log` should be the result of that\n /// encryption.\n ///\n /// The protocol does not dictate what encryption scheme should be used:\n /// a smart contract developer can choose whatever encryption scheme they\n /// like.\n /// Aztec-nr includes some off-the-shelf encryption libraries that\n /// developers might wish to use, for convenience. These libraries not only\n /// encrypt a plaintext (to produce a ciphertext); they also prepend the\n /// ciphertext with a `tag` and `ephemeral public key` for easier message\n /// discovery. This is a very dense topic, and we will be writing more\n /// libraries and docs soon.\n ///\n /// > Currently, AES128 CBC encryption is the main scheme included in\n /// > aztec.nr.\n /// > We are currently making significant changes to the interfaces of the\n /// > encryption library.\n ///\n /// In some niche use cases, an app might be tempted to publish\n /// _un-encrypted_ data via a private log, because _public logs_ are not\n /// available to private functions. Be warned that emitting public data via\n /// private logs is strongly discouraged, and is considered a \"privacy\n /// anti-pattern\", because it reveals identifiable information about _which_\n /// function has been executed. A tx which leaks such information does not\n /// contribute to the privacy set of the network.\n ///\n /// * Unlike `emit_raw_note_log`, this log is not tied to any specific note\n ///\n /// # Arguments\n /// * `log` - The log data that will be publicly broadcast (so make sure\n /// it's already been encrypted before you call this function).\n /// Private logs are bounded in size (PRIVATE_LOG_SIZE_IN_FIELDS), to\n /// encourage all logs from all smart contracts look identical.\n /// * `length` - The actual length of the `log` (measured in number of\n /// Fields). Although the input log has a max size of\n /// PRIVATE_LOG_SIZE_IN_FIELDS, the latter values of the array might all\n /// be 0's for small logs. This `length` should reflect the trimmed length\n /// of the array. The protocol's kernel circuits can then append random\n /// fields as \"padding\" after the `length`, so that the logs of this\n /// smart contract look indistinguishable from (the same length as) the\n /// logs of all other applications. It's up to wallets how much padding\n /// to apply, so ideally all wallets should agree on standards for this.\n ///\n /// # Advanced\n ///\n pub fn emit_private_log(&mut self, log: [Field; PRIVATE_LOG_SIZE_IN_FIELDS], length: u32) {\n let counter = self.next_counter();\n let private_log = PrivateLogData { log: PrivateLog::new(log, length), note_hash_counter: 0 }\n .count(counter);\n self.private_logs.push(private_log);\n }\n\n // TODO: rename.\n /// Emits a private log that is explicitly tied to a newly-emitted note_hash,\n /// to convey to the kernel: \"this log relates to this note\".\n ///\n /// This linkage is important in case the note gets squashed (due to being\n /// read later in this same tx), since we can then squash the log as well.\n ///\n /// See `emit_private_log` for more info about private log emission.\n ///\n /// # Arguments\n /// * `log` - The log data as an array of Field elements\n /// * `length` - The actual length of the `log` (measured in number of\n /// Fields).\n /// * `note_hash_counter` - The side-effect counter that was assigned to the\n /// new note_hash when it was pushed to this\n // `PrivateContext`.\n ///\n /// Important: If your application logic requires the log to always be\n /// emitted regardless of note squashing, consider using `emit_private_log`\n /// instead, or emitting additional events.\n ///\n pub fn emit_raw_note_log(\n &mut self,\n log: [Field; PRIVATE_LOG_SIZE_IN_FIELDS],\n length: u32,\n note_hash_counter: u32,\n ) {\n let counter = self.next_counter();\n let private_log = PrivateLogData { log: PrivateLog::new(log, length), note_hash_counter };\n self.private_logs.push(private_log.count(counter));\n }\n\n pub fn emit_contract_class_log<let N: u32>(&mut self, log: [Field; N]) {\n let contract_address = self.this_address();\n let counter = self.next_counter();\n\n let log_to_emit: [Field; CONTRACT_CLASS_LOG_SIZE_IN_FIELDS] =\n log.concat([0; CONTRACT_CLASS_LOG_SIZE_IN_FIELDS - N]);\n // Note: the length is not always N, it is the number of fields we want to broadcast, omitting trailing zeros to save blob space.\n // Safety: The below length is constrained in the base rollup, which will make sure that all the fields beyond length are zero.\n // However, it won't be able to check that we didn't add extra padding (trailing zeroes) or that we cut trailing zeroes from the end.\n let length = unsafe { trimmed_array_length_hint(log_to_emit) };\n // We hash the entire padded log to ensure a user cannot pass a shorter length and so emit incorrect shorter bytecode.\n let log_hash = poseidon2_hash(log_to_emit);\n // Safety: the below only exists to broadcast the raw log, so we can provide it to the base rollup later to be constrained.\n unsafe {\n notify_created_contract_class_log(contract_address, log_to_emit, length, counter);\n }\n\n self.contract_class_logs_hashes.push(LogHash { value: log_hash, length: length }.count(\n counter,\n ));\n }\n\n /// Calls a private function on another contract (or the same contract).\n ///\n /// Very low-level function.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args` - Array of arguments to pass to the called function\n ///\n /// # Returns\n /// * `ReturnsHash` - Hash of the called function's return values. Use\n /// `.get_preimage()` to extract the actual return values.\n ///\n /// This enables contracts to interact with each other while maintaining\n /// privacy. This \"composability\" of private contract functions is a key\n /// feature of the Aztec network.\n ///\n /// If a user's transaction includes multiple private function calls, then\n /// by the design of Aztec, the following information will remain private[1]:\n /// - The function selectors and contract addresses of all private function\n /// calls will remain private, so an observer of the public mempool will\n /// not be able to look at a tx and deduce which private functions have\n /// been executed.\n /// - The arguments and return values of all private function calls will\n /// remain private.\n /// - The person who initiated the tx will remain private.\n /// - The notes and nullifiers and private logs that are emitted by all\n /// private function calls will (if designed well) not leak any user\n /// secrets, nor leak which functions have been executed.\n ///\n /// [1] Caveats: Some of these privacy guarantees depend on how app\n /// developers design their smart contracts. Some actions _can_ leak\n /// information, such as:\n /// - Calling an internal public function.\n /// - Calling a public function and not setting msg_sender to Option::none\n /// (feature not built yet - see github).\n /// - Calling any public function will always leak details about the nature\n /// of the transaction, so devs should be careful in their contract\n /// designs. If it can be done in a private function, then that will give\n /// the best privacy.\n /// - Not padding the side-effects of a tx to some standardized, uniform\n /// size. The kernel circuits can take hints to pad side-effects, so a\n /// wallet should be able to request for a particular amount of padding.\n /// Wallets should ideally agree on some standard.\n /// - Padding should include:\n /// - Padding the lengths of note & nullifier arrays\n /// - Padding private logs with random fields, up to some standardized\n /// size.\n /// See also: https://docs.aztec.network/developers/resources/considerations/privacy_considerations\n ///\n /// # Advanced\n /// * The call is added to the private call stack and executed by kernel\n /// circuits after this function completes\n /// * The called function can modify its own contract's private state\n /// * Side effects from the called function are included in this transaction\n /// * The call inherits the current transaction's context and gas limits\n ///\n pub fn call_private_function<let ArgsCount: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ArgsCount],\n ) -> ReturnsHash {\n let args_hash = hash_args(args);\n execution_cache::store(args, args_hash);\n self.call_private_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n false,\n )\n }\n\n /// Makes a read-only call to a private function on another contract.\n ///\n /// This is similar to Solidity's `staticcall`. The called function\n /// cannot modify state, emit L2->L2 messages, nor emit events. Any nested\n /// calls are constrained to also be staticcalls.\n ///\n /// See `call_private_function` for more general info on private function\n /// calls.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract to call\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args` - Array of arguments to pass to the called function\n ///\n /// # Returns\n /// * `ReturnsHash` - Hash of the called function's return values. Use\n /// `.get_preimage()` to extract the actual return values.\n ///\n pub fn static_call_private_function<let ArgsCount: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ArgsCount],\n ) -> ReturnsHash {\n let args_hash = hash_args(args);\n execution_cache::store(args, args_hash);\n self.call_private_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n true,\n )\n }\n\n /// Calls a private function that takes no arguments.\n ///\n /// This is a convenience function for calling private functions that don't\n /// require any input parameters. It's equivalent to `call_private_function`\n /// but slightly more efficient to use when no arguments are needed.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n ///\n /// # Returns\n /// * `ReturnsHash` - Hash of the called function's return values. Use\n /// `.get_preimage()` to extract the actual return values.\n ///\n pub fn call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> ReturnsHash {\n self.call_private_function_with_args_hash(contract_address, function_selector, 0, false)\n }\n\n /// Makes a read-only call to a private function which takes no arguments.\n ///\n /// This combines the optimisation of `call_private_function_no_args` with\n /// the safety of `static_call_private_function`.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n ///\n /// # Returns\n /// * `ReturnsHash` - Hash of the called function's return values. Use\n /// `.get_preimage()` to extract the actual return values.\n ///\n pub fn static_call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> ReturnsHash {\n self.call_private_function_with_args_hash(contract_address, function_selector, 0, true)\n }\n\n /// Low-level private function call.\n ///\n /// This is the underlying implementation used by all other private function\n /// call methods. Instead of taking raw arguments, it accepts a\n /// hash of the arguments.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args_hash` - Pre-computed hash of the function arguments\n /// * `is_static_call` - Whether this should be a read-only call\n ///\n /// # Returns\n /// * `ReturnsHash` - Hash of the called function's return values\n ///\n pub fn call_private_function_with_args_hash(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) -> ReturnsHash {\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n let start_side_effect_counter = self.side_effect_counter;\n\n // Safety: The oracle simulates the private call and returns the value of the side effects counter after\n // execution of the call (which means that end_side_effect_counter - start_side_effect_counter is\n // the number of side effects that took place), along with the hash of the return values. We validate these\n // by requesting a private kernel iteration in which the return values are constrained to hash\n // to `returns_hash` and the side effects counter to increment from start to end.\n let (end_side_effect_counter, returns_hash) = unsafe {\n call_private_function_internal(\n contract_address,\n function_selector,\n args_hash,\n start_side_effect_counter,\n is_static_call,\n )\n };\n\n self.private_call_requests.push(\n PrivateCallRequest {\n call_context: CallContext {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n },\n args_hash,\n returns_hash,\n start_side_effect_counter,\n end_side_effect_counter,\n },\n );\n\n // TODO (fees) figure out why this crashes the prover and enable it\n // we need this in order to pay fees inside child call contexts\n // assert(\n // (item.public_inputs.min_revertible_side_effect_counter == 0 as u32)\n // | (item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter)\n // );\n // if item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter {\n // self.min_revertible_side_effect_counter = item.public_inputs.min_revertible_side_effect_counter;\n // }\n self.side_effect_counter = end_side_effect_counter + 1; // TODO: call `next_counter` instead, for consistency\n ReturnsHash::new(returns_hash)\n }\n\n /// Enqueues a call to a public function to be executed later.\n ///\n /// Unlike private functions which execute immediately on the user's device,\n /// public function calls are \"enqueued\" and executed some time later by a\n /// block proposer.\n ///\n /// This means a public function cannot return any values back to a private\n /// function, because by the time the public function is being executed,\n /// the private function which called it has already completed execution.\n /// (In fact, the private function has been executed and proven, along with\n /// all other private function calls of the user's tx. A single proof of the\n /// tx has been submitted to the Aztec network, and some time later a\n /// proposer has picked the tx up from the mempool and begun executing all\n /// of the enqueued public functions).\n ///\n /// # Privacy warning\n /// Enqueueing a public function call is an inherently leaky action.\n /// Many interesting applications will require some interaction with public\n /// state, but smart contract developers should try to use public function\n /// calls sparingly, and carefully.\n /// _Internal_ public function calls are especially leaky, because they\n /// completely leak which private contract made the call.\n /// See also: https://docs.aztec.network/developers/resources/considerations/privacy_considerations\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args` - Array of arguments to pass to the public function\n /// * `hide_msg_sender` - the called function will see a \"null\" value for\n /// `msg_sender` if set to `true`\n ///\n pub fn call_public_function<let ArgsCount: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ArgsCount],\n hide_msg_sender: bool,\n ) {\n let calldata = [function_selector.to_field()].concat(args);\n let calldata_hash = hash_calldata_array(calldata);\n execution_cache::store(calldata, calldata_hash);\n self.call_public_function_with_calldata_hash(\n contract_address,\n calldata_hash,\n false,\n hide_msg_sender,\n )\n }\n\n /// Enqueues a read-only call to a public function.\n ///\n /// This is similar to Solidity's `staticcall`. The called function\n /// cannot modify state or emit events. Any nested calls are constrained to\n /// also be staticcalls.\n ///\n /// See also `call_public_function` for more important information about\n /// making private -> public function calls.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args` - Array of arguments to pass to the public function\n /// * `hide_msg_sender` - the called function will see a \"null\" value for\n /// `msg_sender` if set to `true`\n ///\n pub fn static_call_public_function<let ArgsCount: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ArgsCount],\n hide_msg_sender: bool,\n ) {\n let calldata = [function_selector.to_field()].concat(args);\n let calldata_hash = hash_calldata_array(calldata);\n execution_cache::store(calldata, calldata_hash);\n self.call_public_function_with_calldata_hash(\n contract_address,\n calldata_hash,\n true,\n hide_msg_sender,\n )\n }\n\n /// Enqueues a call to a public function that takes no arguments.\n ///\n /// This is an optimisation for calling public functions that don't\n /// take any input parameters. It's otherwise equivalent to\n /// `call_public_function`.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `hide_msg_sender` - the called function will see a \"null\" value for\n /// `msg_sender` if set to `true`\n ///\n pub fn call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n hide_msg_sender: bool,\n ) {\n let calldata_hash = hash_calldata_array([function_selector.to_field()]);\n self.call_public_function_with_calldata_hash(\n contract_address,\n calldata_hash,\n false,\n hide_msg_sender,\n )\n }\n\n /// Enqueues a read-only call to a public function with no arguments.\n ///\n /// This combines the optimisation of `call_public_function_no_args` with\n /// the safety of `static_call_public_function`.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `hide_msg_sender` - the called function will see a \"null\" value for\n /// `msg_sender` if set to `true`\n ///\n pub fn static_call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n hide_msg_sender: bool,\n ) {\n let calldata_hash = hash_calldata_array([function_selector.to_field()]);\n self.call_public_function_with_calldata_hash(\n contract_address,\n calldata_hash,\n true,\n hide_msg_sender,\n )\n }\n\n /// Low-level public function call.\n ///\n /// This is the underlying implementation used by all other public function\n /// call methods. Instead of taking raw arguments, it accepts a\n /// hash of the arguments.\n ///\n /// Advanced function: Most developers should use `call_public_function`\n /// or `static_call_public_function` instead. This function is exposed for\n /// performance optimization and advanced use cases.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `calldata_hash` - Hash of the function calldata\n /// * `is_static_call` - Whether this should be a read-only call\n /// * `hide_msg_sender` - the called function will see a \"null\" value for\n /// `msg_sender` if set to `true`\n ///\n pub fn call_public_function_with_calldata_hash(\n &mut self,\n contract_address: AztecAddress,\n calldata_hash: Field,\n is_static_call: bool,\n hide_msg_sender: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n\n notify_enqueued_public_function_call(\n contract_address,\n calldata_hash,\n counter,\n is_static_call,\n );\n\n let msg_sender = if hide_msg_sender {\n NULL_MSG_SENDER_CONTRACT_ADDRESS\n } else {\n self.this_address()\n };\n\n let call_request =\n PublicCallRequest { msg_sender, contract_address, is_static_call, calldata_hash };\n\n self.public_call_requests.push(Counted::new(call_request, counter));\n }\n\n /// Enqueues a public function call, and designates it to be the teardown\n /// function for this tx. Only one teardown function call can be made by a\n /// tx.\n ///\n /// Niche function: Only wallet developers and paymaster contract developers\n /// (aka Fee-payment contracts) will need to make use of this function.\n ///\n /// Aztec supports a three-phase execution model: setup, app logic, teardown.\n /// The phases exist to enable a fee payer to take on the risk of paying\n /// a transaction fee, safe in the knowledge that their payment (in whatever\n /// token or method the user chooses) will succeed, regardless of whether\n /// the app logic will succeed. The \"setup\" phase ensures the fee payer\n /// has sufficient balance to pay the proposer their fees.\n /// The teardown phase is primarily intended to: calculate exactly\n /// how much the user owes, based on gas consumption, and refund the user\n /// any change.\n ///\n /// Note: in some cases, the cost of refunding the user (i.e. DA costs of\n /// tx side-effects) might exceed the refund amount. For app logic with\n /// fairly stable and predictable gas consumption, a material refund amount\n /// is unlikely. For app logic with unpredictable gas consumption, a\n /// refund might be important to the user (e.g. if a hefty function reverts\n /// very early). Wallet/FPC/Paymaster developers should be mindful of this.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the teardown\n /// function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args` - An array of fields to pass to the function.\n /// * `hide_msg_sender` - the called function will see a \"null\" value for\n /// `msg_sender` if set to `true`\n pub fn set_public_teardown_function<let ArgsCount: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ArgsCount],\n hide_msg_sender: bool,\n ) {\n let calldata = [function_selector.to_field()].concat(args);\n let calldata_hash = hash_calldata_array(calldata);\n execution_cache::store(calldata, calldata_hash);\n self.set_public_teardown_function_with_calldata_hash(\n contract_address,\n calldata_hash,\n false,\n hide_msg_sender,\n )\n }\n\n /// Low-level function to set the public teardown function.\n ///\n /// This is the underlying implementation for setting the teardown function\n /// call that will execute at the end of the transaction. Instead of taking\n /// raw arguments, it accepts a hash of the arguments.\n ///\n /// Advanced function: Most developers should use\n /// `set_public_teardown_function` instead.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the teardown\n /// function\n /// * `calldata_hash` - Hash of the function calldata\n /// * `is_static_call` - Whether this should be a read-only call\n /// * `hide_msg_sender` - the called function will see a \"null\" value for\n /// `msg_sender` if set to `true`\n ///\n pub fn set_public_teardown_function_with_calldata_hash(\n &mut self,\n contract_address: AztecAddress,\n calldata_hash: Field,\n is_static_call: bool,\n hide_msg_sender: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n\n notify_set_public_teardown_function_call(\n contract_address,\n calldata_hash,\n counter,\n is_static_call,\n );\n\n let msg_sender = if hide_msg_sender {\n NULL_MSG_SENDER_CONTRACT_ADDRESS\n } else {\n self.this_address()\n };\n\n self.public_teardown_call_request =\n PublicCallRequest { msg_sender, contract_address, is_static_call, calldata_hash };\n }\n\n /// Increments the side-effect counter.\n ///\n /// Very low-level function.\n ///\n /// # Advanced\n ///\n /// Every side-effect of a private function is given a \"side-effect counter\",\n /// based on when it is created. This PrivateContext is in charge of\n /// assigning the counters.\n ///\n /// The reason we have side-effect counters is complicated. Consider this\n /// illustrative pseudocode of inter-contract function calls:\n /// ```\n /// contract A {\n /// let x = 5; // pseudocode for storage var x.\n /// fn a1 {\n /// read x; // value: 5, counter: 1.\n /// x = x + 1;\n /// write x; // value: 6, counter: 2.\n ///\n /// B.b(); // start_counter: 2, end_counter: 4\n ///\n /// read x; // value: 36, counter: 5.\n /// x = x + 1;\n /// write x; // value: 37, counter: 6.\n /// }\n ///\n /// fn a2 {\n /// read x; // value: 6, counter: 3.\n /// x = x * x;\n /// write x; // value: 36, counter: 4.\n /// }\n /// }\n ///\n /// contract B {\n /// fn b() {\n /// A.a2();\n /// }\n /// }\n /// ```\n ///\n /// Suppose a1 is the first function called. The comments show the execution\n /// counter of each side-effect, and what the new value of `x` is.\n ///\n /// These (private) functions are processed by Aztec's kernel circuits in an\n /// order that is different from execution order:\n /// All of A.a1 is proven before B.b is proven, before A.a2 is proven.\n /// So when we're in the 2nd execution frame of A.a1 (after the call to\n /// B.b), the circuit needs to justify why x went from being `6` to `36`.\n /// But the circuit doesn't know why, and given the order of proving, the\n /// kernel hasn't _seen_ a value of 36 get written yet.\n /// The kernel needs to track big arrays of all side-effects of all\n /// private functions in a tx. Then, as it recurses and processes B.b(), it\n /// will eventually see a value of 36 get written.\n ///\n /// Suppose side-effect counters weren't exposed:\n /// The kernel would only see this ordering (in order of proof verification):\n /// [ A.a1.read, A.a1.write, A.a1.read, A.a1.write, A.a2.read, A.a2.write ]\n /// [ 5, 6, 36, 37, 6, 36 ]\n /// The kernel wouldn't know _when_ B.b() was called within A.a1(), because\n /// it can't see what's going on within an app circuit. So the kernel\n /// wouldn't know that the ordering of reads and writes should actually be:\n /// [ A.a1.read, A.a1.write, A.a2.read, A.a2.write, A.a1.read, A.a1.write ]\n /// [ 5, 6, 6, 36, 36, 37 ]\n ///\n /// And so, we introduced side-effect counters: every private function must\n /// assign side-effect counters alongside every side-effect that it emits,\n /// and also expose to the kernel the counters that it started and ended\n /// with.\n /// This gives the kernel enough information to arrange all side-effects in\n /// the correct order.\n /// It can then catch (for example) if a function tries to read state\n /// before it has been written (e.g. if A.a2() maliciously tried to read\n /// a value of x=37) (e.g. if A.a1() maliciously tried to read x=6).\n ///\n /// If a malicious app contract _lies_ and does not count correctly:\n /// - It cannot lie about its start and end counters because the kernel\n /// will catch this.\n /// - It _could_ lie about its intermediate counters:\n /// - 1. It could not increment its side-effects correctly\n /// - 2. It could label its side-effects with counters outside of its\n /// start and end counters' range.\n /// The kernel will catch 2.\n /// The kernel will not catch 1., but this would only cause corruption\n /// to the private state of the malicious contract, and not any other\n /// contracts (because a contract can only modify its own state). If\n /// a \"good\" contract is given _read access_ to a maliciously-counting\n /// contract (via an external getter function, or by reading historic\n /// state from the archive tree directly), and they then make state\n /// changes to their _own_ state accordingly, that could be dangerous.\n /// Developers should be mindful not to trust the claimed innards of\n /// external contracts unless they have audited/vetted the contracts\n /// including vetting the side-effect counter incrementation.\n /// This is a similar paradigm to Ethereum smart contract development:\n /// you must vet external contracts that your contract relies upon, and\n /// you must not make any presumptions about their claimed behaviour.\n /// (Hopefully if a contract imports a version of aztec-nr, we will get\n /// contract verification tooling that can validate the authenticity\n /// of the imported aztec-nr package, and hence infer that the side-\n /// effect counting will be correct, without having to re-audit such logic\n /// for every contract).\n ///\n fn next_counter(&mut self) -> u32 {\n let counter = self.side_effect_counter;\n self.side_effect_counter += 1;\n counter\n }\n}\n\nimpl Empty for PrivateContext {\n fn empty() -> Self {\n PrivateContext {\n inputs: PrivateContextInputs::empty(),\n side_effect_counter: 0 as u32,\n min_revertible_side_effect_counter: 0 as u32,\n is_fee_payer: false,\n args_hash: 0,\n return_hash: 0,\n include_by_timestamp: 0,\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n anchor_block_header: BlockHeader::empty(),\n private_logs: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n expected_non_revertible_side_effect_counter: 0,\n expected_revertible_side_effect_counter: 0,\n }\n }\n}\n"
|
|
3474
3474
|
},
|
|
3475
3475
|
"70": {
|
|
3476
3476
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/context/public_context.nr",
|
|
3477
|
-
"source": "use crate::context::gas::GasOpts;\nuse crate::hash::{\n compute_l1_to_l2_message_hash, compute_l1_to_l2_message_nullifier, compute_secret_hash,\n};\nuse dep::protocol_types::abis::function_selector::FunctionSelector;\nuse dep::protocol_types::address::{AztecAddress, EthAddress};\nuse dep::protocol_types::constants::{MAX_U32_VALUE, NULL_MSG_SENDER_CONTRACT_ADDRESS};\nuse dep::protocol_types::traits::{Empty, FromField, Packable, Serialize, ToField};\n\n/// # PublicContext\n///\n/// The **main interface** between an #[external(\"public\")] function and the Aztec blockchain.\n///\n/// An instance of the PublicContext is initialized automatically at the outset\n/// of every public function, within the #[external(\"public\")] macro, so you'll never\n/// need to consciously instantiate this yourself.\n///\n/// The instance is always named `context`, and it will always be available\n/// within the body of every #[external(\"public\")] function in your smart contract.\n///\n/// Typical usage for a smart contract developer will be to call getter\n/// methods of the PublicContext.\n///\n/// _Pushing_ data and requests to the context is mostly handled within\n/// aztec-nr's own functions, so typically a smart contract developer won't\n/// need to call any setter methods directly.\n///\n/// ## Responsibilities\n/// - Exposes contextual data to a public function:\n/// - Data relating to how this public function was called:\n/// - msg_sender, this_address\n/// - Data relating to the current blockchain state:\n/// - timestamp, block_number, chain_id, version\n/// - Gas and fee information\n/// - Provides state access:\n/// - Read/write public storage (key-value mapping)\n/// - Check existence of notes and nullifiers\n/// (Some patterns use notes & nullifiers to store public (not private)\n/// information)\n/// - Enables consumption of L1->L2 messages.\n/// - Enables calls to other public smart contract functions:\n/// - Writes data to the blockchain:\n/// - Updates to public state variables\n/// - New public logs (for events)\n/// - New L2->L1 messages\n/// - New notes & nullifiers\n/// (E.g. pushing public info to notes/nullifiers, or for completing\n/// \"partial notes\")\n///\n/// ## Key Differences from Private Execution\n///\n/// Unlike private functions -- which are executed on the user's device and which\n/// can only reference historic state -- public functions are executed by a block\n/// proposer and are executed \"live\" on the _current_ tip of the chain.\n/// This means public functions can:\n/// - Read and write _current_ public state\n/// - Immediately see the effects of earlier transactions in the same block\n///\n/// Also, public functions are executed within a zkVM (the \"AVM\"), so that they\n/// can _revert_ whilst still ensuring payment to the proposer and prover.\n/// (Private functions cannot revert: they either succeed, or they cannot be\n/// included).\n///\n/// ## Optimising Public Functions\n///\n/// Using the AVM to execute public functions means they compile down to \"AVM\n/// bytecode\" instead of the ACIR that private functions (standalone circuits)\n/// compile to. Therefore the approach to optimising a public function is\n/// fundamentally different from optimising a public function.\n///\npub struct PublicContext {\n pub args_hash: Option<Field>,\n pub compute_args_hash: fn() -> Field,\n}\n\nimpl Eq for PublicContext {\n fn eq(self, other: Self) -> bool {\n (self.args_hash == other.args_hash)\n // Can't compare the function compute_args_hash\n }\n}\n\nimpl PublicContext {\n /// Creates a new PublicContext instance.\n ///\n /// Low-level function: This is called automatically by the #[external(\"public\")]\n /// macro, so you shouldn't need to be called directly by smart contract\n /// developers.\n ///\n /// # Arguments\n /// * `compute_args_hash` - Function to compute the args_hash\n ///\n /// # Returns\n /// * A new PublicContext instance\n ///\n pub fn new(compute_args_hash: fn() -> Field) -> Self {\n PublicContext { args_hash: Option::none(), compute_args_hash }\n }\n\n /// Emits a _public_ log that will be visible onchain to everyone.\n ///\n /// # Arguments\n /// * `log` - The data to log, must implement Serialize trait\n ///\n pub fn emit_public_log<T>(_self: Self, log: T)\n where\n T: Serialize,\n {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { emit_public_log(Serialize::serialize(log).as_vector()) };\n }\n\n /// Checks if a given note hash exists in the note hash tree at a particular\n /// leaf_index.\n ///\n /// # Arguments\n /// * `note_hash` - The note hash to check for existence\n /// * `leaf_index` - The index where the note hash should be located\n ///\n /// # Returns\n /// * `bool` - True if the note hash exists at the specified index\n ///\n pub fn note_hash_exists(_self: Self, note_hash: Field, leaf_index: u64) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { note_hash_exists(note_hash, leaf_index) } == 1\n }\n\n /// Checks if a specific L1-to-L2 message exists in the L1-to-L2 message\n /// tree at a particular leaf index.\n ///\n /// Common use cases include token bridging, cross-chain governance, and\n /// triggering L2 actions based on L1 events.\n ///\n /// This function should be called before attempting to consume an L1-to-L2\n /// message.\n ///\n /// # Arguments\n /// * `msg_hash` - Hash of the L1-to-L2 message to check\n /// * `msg_leaf_index` - The index where the message should be located\n ///\n /// # Returns\n /// * `bool` - True if the message exists at the specified index\n ///\n /// # Advanced\n /// * Uses the AVM l1_to_l2_msg_exists opcode for tree lookup\n /// * Messages are copied from L1 Inbox to L2 by block proposers\n ///\n pub fn l1_to_l2_msg_exists(_self: Self, msg_hash: Field, msg_leaf_index: Field) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself\n // TODO(alvaro): Make l1l2msg leaf index a u64 upstream\n unsafe { l1_to_l2_msg_exists(msg_hash, msg_leaf_index as u64) } == 1\n }\n\n /// Returns `true` if an `unsiloed_nullifier` has been emitted by `contract_address`.\n ///\n /// Note that unsiloed nullifiers are not the actual values stored in the nullifier tree: they are first siloed via\n /// [crate::hash::compute_siloed_nullifier] with the emitting contract's address.\n ///\n /// ## Use Cases\n ///\n /// Nullifiers are typically used as a _privacy-preserving_ record of a one-time action, but they can also be used\n /// to efficiently record _public_ one-time actions as well. This is cheaper than using public storage, and has the\n /// added benefit of the nullifier being emittable from a private function.\n ///\n /// An example is to check whether a contract has been published: we emit a nullifier that is deterministic and\n /// which has a _public_ preimage.\n ///\n /// ## Public vs Private\n ///\n /// In general, it is unsafe to check for nullifier non-existence in private, as that will not consider the\n /// possibility of the nullifier having been emitted in any transaction between the anchor block and the inclusion\n /// block. Private functions instead prove existence via\n /// [crate::context::private_context::PrivateContext::push_nullifier_read_request] and 'prove' non-existence by\n /// _emitting_ the nullifer, which would cause the transaction to fail if the nullifier existed.\n ///\n /// This is not the case in public functions, which do have access to the tip of the blockchain and so can reliably\n /// prove whether a nullifier exists or not.\n ///\n /// ## Safety\n ///\n /// While it is safe to rely on this function's return value to determine if a nullifier exists or not, it is often\n /// **not** safe to infer additional information from that. In particular, it is **unsafe** to infer that the\n /// existence of a nullifier emitted from a private function implies that all other side-effects of said private\n /// execution have been completed, more concretely that any enqueued public calls have been executed.\n ///\n /// This is because all private transaction effects are committed _before_ enqueued public functions are run (in\n /// order to not reveal detailed timing information about the transaction), so it is possible to observe a nullifier\n /// that was emitted alongside the enqueuing of a public call **before** said call has been completed.\n ///\n /// ## Cost\n ///\n /// This emits the `CHECKNULLIFIEREXISTS` opcode, which conceptually performs a merkle inclusion proof on the\n /// nullifier tree (both when the nullifier exists and when it doesn't).\n pub fn nullifier_exists_unsafe(\n _self: Self,\n unsiloed_nullifier: Field,\n contract_address: AztecAddress,\n ) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { nullifier_exists(unsiloed_nullifier, contract_address.to_field()) } == 1\n }\n\n /// Consumes a message sent from Ethereum (L1) to Aztec (L2) -- effectively\n /// marking it as \"read\".\n ///\n /// Use this function if you only want the message to ever be \"referred to\"\n /// once. Once consumed using this method, the message cannot be consumed\n /// again, because a nullifier is emitted.\n /// If your use case wants for the message to be read unlimited times, then\n /// you can always read any historic message from the L1-to-L2 messages tree,\n /// using the `l1_to_l2_msg_exists` method. Messages never technically get\n /// deleted from that tree.\n ///\n /// The message will first be inserted into an Aztec \"Inbox\" smart contract\n /// on L1. It will not be available for consumption immediately. Messages\n /// get copied-over from the L1 Inbox to L2 by the next Proposer in batches.\n /// So you will need to wait until the messages are copied before you can\n /// consume them.\n ///\n /// # Arguments\n /// * `content` - The message content that was sent from L1\n /// * `secret` - Secret value used for message privacy (if needed)\n /// * `sender` - Ethereum address that sent the message\n /// * `leaf_index` - Index of the message in the L1-to-L2 message tree\n ///\n /// # Advanced\n /// * Validates message existence in the L1-to-L2 message tree\n /// * Prevents double-consumption by emitting a nullifier\n /// * Message hash is computed from all parameters + chain context\n /// * Will revert if message doesn't exist or was already consumed\n ///\n pub fn consume_l1_to_l2_message(\n self: Self,\n content: Field,\n secret: Field,\n sender: EthAddress,\n leaf_index: Field,\n ) {\n let secret_hash = compute_secret_hash(secret);\n let message_hash = compute_l1_to_l2_message_hash(\n sender,\n self.chain_id(),\n /*recipient=*/\n self.this_address(),\n self.version(),\n content,\n secret_hash,\n leaf_index,\n );\n let nullifier = compute_l1_to_l2_message_nullifier(message_hash, secret);\n\n assert(\n !self.nullifier_exists_unsafe(nullifier, self.this_address()),\n \"L1-to-L2 message is already nullified\",\n );\n assert(\n self.l1_to_l2_msg_exists(message_hash, leaf_index),\n \"Tried to consume nonexistent L1-to-L2 message\",\n );\n\n self.push_nullifier(nullifier);\n }\n\n /// Sends an \"L2 -> L1 message\" from this function (Aztec, L2) to a smart\n /// contract on Ethereum (L1). L1 contracts which are designed to\n /// send/receive messages to/from Aztec are called \"Portal Contracts\".\n ///\n /// Common use cases include withdrawals, cross-chain asset transfers, and\n /// triggering L1 actions based on L2 state changes.\n ///\n /// The message will be inserted into an Aztec \"Outbox\" contract on L1,\n /// when this transaction's block is proposed to L1.\n /// Sending the message will not result in any immediate state changes in\n /// the target portal contract. The message will need to be manually\n /// consumed from the Outbox through a separate Ethereum transaction: a user\n /// will need to call a function of the portal contract -- a function\n /// specifically designed to make a call to the Outbox to consume the\n /// message.\n /// The message will only be available for consumption once the _epoch_\n /// proof has been submitted. Given that there are multiple Aztec blocks\n /// within an epoch, it might take some time for this epoch proof to be\n /// submitted -- especially if the block was near the start of an epoch.\n ///\n /// # Arguments\n /// * `recipient` - Ethereum address that will receive the message\n /// * `content` - Message content (32 bytes as a Field element)\n ///\n pub fn message_portal(_self: Self, recipient: EthAddress, content: Field) {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { send_l2_to_l1_msg(recipient, content) };\n }\n\n /// Calls a public function on another contract.\n ///\n /// Will revert if the called function reverts or runs out of gas.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract to call\n /// * `function_selector` - Function to call on the target contract\n /// * `args` - Arguments to pass to the function\n /// * `gas_opts` - An optional allocation of gas to the called function.\n ///\n /// # Returns\n /// * `[Field]` - Return data from the called function\n ///\n pub unconstrained fn call_public_function<let N: u32>(\n _self: Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; N],\n gas_opts: GasOpts,\n ) -> [Field] {\n let calldata = [function_selector.to_field()].concat(args);\n\n call(\n gas_opts.l2_gas.unwrap_or(MAX_U32_VALUE),\n gas_opts.da_gas.unwrap_or(MAX_U32_VALUE),\n contract_address,\n calldata,\n );\n // Use success_copy to determine whether the call succeeded\n let success = success_copy();\n\n let result_data = returndata_copy(0, returndata_size());\n if !success {\n // Rethrow the revert data.\n avm_revert(result_data);\n }\n result_data\n }\n\n /// Makes a read-only call to a public function on another contract.\n ///\n /// This is similar to Solidity's `staticcall`. The called function\n /// cannot modify state or emit events. Any nested calls are constrained to\n /// also be staticcalls.\n ///\n /// Useful for querying data from other contracts safely.\n ///\n /// Will revert if the called function reverts or runs out of gas.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract to call\n /// * `function_selector` - Function to call on the target contract\n /// * `args` - Array of arguments to pass to the called function\n /// * `gas_opts` - An optional allocation of gas to the called function.\n ///\n /// # Returns\n /// * `[Field]` - Return data from the called function\n ///\n pub unconstrained fn static_call_public_function<let N: u32>(\n _self: Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; N],\n gas_opts: GasOpts,\n ) -> [Field] {\n let calldata = [function_selector.to_field()].concat(args);\n\n call_static(\n gas_opts.l2_gas.unwrap_or(MAX_U32_VALUE),\n gas_opts.da_gas.unwrap_or(MAX_U32_VALUE),\n contract_address,\n calldata,\n );\n // Use success_copy to determine whether the call succeeded\n let success = success_copy();\n\n let result_data = returndata_copy(0, returndata_size());\n if !success {\n // Rethrow the revert data.\n avm_revert(result_data);\n }\n result_data\n }\n\n /// Adds a new note hash to the Aztec blockchain's global Note Hash Tree.\n ///\n /// Notes are ordinarily constructed and emitted by _private_ functions, to\n /// ensure that both the content of the note, and the contract that emitted\n /// the note, stay private.\n ///\n /// There are however some useful patterns whereby a note needs to contain\n /// _public_ data. The ability to push a new note_hash from a _public_\n /// function means that notes can be injected with public data immediately\n /// -- as soon as the public value is known. The slower alternative would\n /// be to submit a follow-up transaction so that a private function can\n /// inject the data. Both are possible on Aztec.\n ///\n /// Search \"Partial Note\" for a very common pattern which enables a note\n /// to be \"partially\" populated with some data in a _private_ function, and\n /// then later \"completed\" with some data in a public function.\n ///\n /// # Arguments\n /// * `note_hash` - The hash of the note to add to the tree\n ///\n /// # Advanced\n /// * The note hash will be siloed with the contract address by the protocol\n ///\n pub fn push_note_hash(_self: Self, note_hash: Field) {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { emit_note_hash(note_hash) };\n }\n\n /// Adds a new nullifier to the Aztec blockchain's global Nullifier Tree.\n ///\n /// Whilst nullifiers are primarily intended as a _privacy-preserving_\n /// record of a one-time action, they can also be used to efficiently\n /// record _public_ one-time actions too. Hence why you're seeing this\n /// function within the PublicContext.\n /// An example is to check whether a contract has been published: we emit\n /// a nullifier that is deterministic, but whose preimage is _not_ private.\n ///\n /// # Arguments\n /// * `nullifier` - A unique field element that represents the consumed\n /// state\n ///\n /// # Advanced\n /// * Nullifier is immediately added to the global nullifier tree\n /// * Emitted nullifiers are immediately visible to all\n /// subsequent transactions in the same block\n /// * Automatically siloed with the contract address by the protocol\n /// * Used for preventing double-spending and ensuring one-time actions\n ///\n pub fn push_nullifier(_self: Self, nullifier: Field) {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { emit_nullifier(nullifier) };\n }\n\n /// Returns the address of the current contract being executed.\n ///\n /// This is equivalent to `address(this)` in Solidity (hence the name).\n /// Use this to identify the current contract's address, commonly needed for\n /// access control or when interacting with other contracts.\n ///\n /// # Returns\n /// * `AztecAddress` - The contract address of the current function being\n /// executed.\n ///\n pub fn this_address(_self: Self) -> AztecAddress {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n address()\n }\n }\n\n /// Returns the contract address that initiated this function call.\n ///\n /// This is similar to `msg.sender` in Solidity (hence the name).\n ///\n /// Important Note: If the calling function is a _private_ function, then it had the option of hiding its address\n /// when enqueuing this public function call. In such cases, this method will return `Option<AztecAddress>::none`.\n /// If the calling function is a _public_ function, it will always return an `Option<AztecAddress>::some` (i.e.\n /// a non-null value).\n ///\n /// # Returns\n /// * `Option<AztecAddress>` - The address of the smart contract that called this function (be it an app contract\n /// or a user's account contract).\n ///\n /// # Advanced\n /// * Value is provided by the AVM sender opcode\n /// * In nested calls, this is the immediate caller, not the original transaction sender\n ///\n pub fn maybe_msg_sender(_self: Self) -> Option<AztecAddress> {\n // Safety: AVM opcodes are constrained by the AVM itself\n let maybe_msg_sender = unsafe { sender() };\n if maybe_msg_sender == NULL_MSG_SENDER_CONTRACT_ADDRESS {\n Option::none()\n } else {\n Option::some(maybe_msg_sender)\n }\n }\n\n /// Returns the function selector of the currently-executing function.\n ///\n /// This is similar to `msg.sig` in Solidity, returning the first 4\n /// bytes of the function signature.\n ///\n /// # Returns\n /// * `FunctionSelector` - The 4-byte function identifier\n ///\n /// # Advanced\n /// * Extracted from the first element of calldata\n /// * Used internally for function dispatch in the AVM\n ///\n pub fn selector(_self: Self) -> FunctionSelector {\n // The selector is the first element of the calldata when calling a public function through dispatch.\n // Safety: AVM opcodes are constrained by the AVM itself\n let raw_selector: [Field; 1] = unsafe { calldata_copy(0, 1) };\n FunctionSelector::from_field(raw_selector[0])\n }\n\n /// Returns the hash of the arguments passed to the current function.\n ///\n /// Very low-level function: The #[external(\"public\")] macro uses this internally.\n /// Smart contract developers typically won't need to access this\n /// directly as arguments are automatically made available.\n ///\n /// # Returns\n /// * `Field` - Hash of the function arguments\n ///\n pub fn get_args_hash(mut self) -> Field {\n if !self.args_hash.is_some() {\n self.args_hash = Option::some((self.compute_args_hash)());\n }\n\n self.args_hash.unwrap_unchecked()\n }\n\n /// Returns the \"transaction fee\" for the current transaction.\n /// This is the final tx fee that will be deducted from the fee_payer's\n /// \"fee-juice\" balance (in the protocol's Base Rollup circuit).\n ///\n /// # Returns\n /// * `Field` - The actual, final cost of the transaction, taking into account:\n /// the actual gas used during the setup and app-logic phases,\n /// and the fixed amount of gas that's been allocated by the user\n /// for the teardown phase.\n /// I.e. effectiveL2FeePerGas * l2GasUsed + effectiveDAFeePerGas * daGasUsed\n ///\n /// This will return `0` during the \"setup\" and \"app-logic\" phases of\n /// tx execution (because the final tx fee is not known at that time).\n /// This will only return a nonzero value during the \"teardown\" phase of\n /// execution, where the final tx fee can actually be computed.\n ///\n /// Regardless of _when_ this function is called during the teardown phase,\n /// it will always return the same final tx fee value. The teardown phase\n /// does not consume a variable amount of gas: it always consumes a\n /// pre-allocated amount of gas, as specified by the user when they generate\n /// their tx.\n ///\n pub fn transaction_fee(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n transaction_fee()\n }\n }\n\n /// Returns the chain ID of the current network.\n ///\n /// This is similar to `block.chainid` in Solidity. Returns the unique\n /// identifier for the blockchain network this transaction is executing on.\n ///\n /// Helps prevent cross-chain replay attacks. Useful if implementing\n /// multi-chain contract logic.\n ///\n /// # Returns\n /// * `Field` - The chain ID as a field element\n ///\n pub fn chain_id(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n chain_id()\n }\n }\n\n /// Returns the Aztec protocol version that this transaction is executing\n /// under. Different versions may have different rules, opcodes, or\n /// cryptographic primitives.\n ///\n /// This is similar to how Ethereum has different EVM versions.\n ///\n /// Useful for forward/backward compatibility checks\n ///\n /// Not to be confused with contract versions; this is the protocol version.\n ///\n /// # Returns\n /// * `Field` - The protocol version as a field element\n ///\n pub fn version(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n version()\n }\n }\n /// Returns the current block number.\n ///\n /// This is similar to `block.number` in Solidity.\n ///\n /// Note: the current block number is only available within a public function\n /// (as opposed to a private function).\n ///\n /// Note: the time intervals between blocks should not be relied upon as\n /// being consistent:\n /// - Timestamps of blocks fall within a range, rather than at exact regular\n /// intervals.\n /// - Slots can be missed.\n /// - Protocol upgrades can completely change the intervals between blocks\n /// (and indeed the current roadmap plans to reduce the time between\n /// blocks, eventually).\n /// Use `context.timestamp()` for more-reliable time-based logic.\n ///\n /// # Returns\n /// * `u32` - The current block number\n ///\n pub fn block_number(_self: Self) -> u32 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n block_number()\n }\n }\n\n /// Returns the timestamp of the current block.\n ///\n /// This is similar to `block.timestamp` in Solidity.\n ///\n /// All functions of all transactions in a block share the exact same\n /// timestamp (even though technically each transaction is executed\n /// one-after-the-other).\n ///\n /// Important note: Timestamps of Aztec blocks are not at reliably-fixed\n /// intervals. The proposer of the block has some flexibility to choose a\n /// timestamp which is in a valid _range_: Obviously the timestamp of this\n /// block must be strictly greater than that of the previous block, and must\n /// must be less than the timestamp of whichever ethereum block the aztec\n /// block is proposed to. Furthermore, if the timestamp is not deemed close\n /// enough to the actual current time, the committee of validators will not\n /// attest to the block.\n ///\n /// # Returns\n /// * `u64` - Unix timestamp in seconds\n ///\n pub fn timestamp(_self: Self) -> u64 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n timestamp()\n }\n }\n\n /// Returns the fee per unit of L2 gas for this transaction (aka the \"L2 gas\n /// price\"), as chosen by the user.\n ///\n /// L2 gas covers the cost of executing public functions and handling\n /// side-effects within the AVM.\n ///\n /// # Returns\n /// * `u128` - Fee per unit of L2 gas\n ///\n /// Wallet developers should be mindful that the choice of gas price (which\n /// is publicly visible) can leak information about the user, e.g.:\n /// - which wallet software the user is using;\n /// - the amount of time which has elapsed from the time the user's wallet\n /// chose a gas price (at the going rate), to the time of tx submission.\n /// This can give clues about the proving time, and hence the nature of\n /// the tx.\n /// - the urgency of the transaction (which is kind of unavoidable, if the\n /// tx is indeed urgent).\n /// - the wealth of the user.\n /// - the exact user (if the gas price is explicitly chosen by the user to\n /// be some unique number like 0.123456789, or their favorite number).\n /// Wallet devs might wish to consider fuzzing the choice of gas price.\n ///\n pub fn min_fee_per_l2_gas(_self: Self) -> u128 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n min_fee_per_l2_gas()\n }\n }\n\n /// Returns the fee per unit of DA (Data Availability) gas (aka the \"DA gas\n /// price\").\n ///\n /// DA gas covers the cost of making transaction data available on L1.\n ///\n /// See the warning in `min_fee_per_l2_gas` for how gas prices can be leaky.\n ///\n /// # Returns\n /// * `u128` - Fee per unit of DA gas\n ///\n pub fn min_fee_per_da_gas(_self: Self) -> u128 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n min_fee_per_da_gas()\n }\n }\n\n /// Returns the remaining L2 gas available for this transaction.\n ///\n /// Different AVM opcodes consume different amounts of gas.\n ///\n /// # Returns\n /// * `u32` - Remaining L2 gas units\n ///\n pub fn l2_gas_left(_self: Self) -> u32 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n l2_gas_left()\n }\n }\n\n /// Returns the remaining DA (Data Availability) gas available for this\n /// transaction.\n ///\n /// DA gas is consumed when emitting data that needs to be made available\n /// on L1, such as public logs or state updates.\n /// All of the side-effects from the private part of the tx also consume\n /// DA gas before execution of any public functions even begins.\n ///\n /// # Returns\n /// * `u32` - Remaining DA gas units\n ///\n pub fn da_gas_left(_self: Self) -> u32 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n da_gas_left()\n }\n }\n\n /// Checks if the current execution is within a staticcall context, where\n /// no state changes or logs are allowed to be emitted (by this function\n /// or any nested function calls).\n ///\n /// # Returns\n /// * `bool` - True if in staticcall context, false otherwise\n ///\n pub fn is_static_call(_self: Self) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { is_static_call() } == 1\n }\n\n /// Reads raw field values from public storage.\n /// Reads N consecutive storage slots starting from the given slot.\n ///\n /// Very low-level function. Users should typically use the public state\n /// variable abstractions to perform reads: PublicMutable & PublicImmutable.\n ///\n /// # Arguments\n /// * `storage_slot` - The starting storage slot to read from\n ///\n /// # Returns\n /// * `[Field; N]` - Array of N field values from consecutive storage slots\n ///\n /// # Generic Parameters\n /// * `N` - the number of consecutive slots to return, starting from the\n /// `storage_slot`.\n ///\n pub fn raw_storage_read<let N: u32>(_self: Self, storage_slot: Field) -> [Field; N] {\n let mut out = [0; N];\n for i in 0..N {\n // Safety: AVM opcodes are constrained by the AVM itself\n out[i] = unsafe { storage_read(storage_slot + i as Field) };\n }\n out\n }\n\n /// Reads a typed value from public storage.\n ///\n /// Low-level function. Users should typically use the public state\n /// variable abstractions to perform reads: PublicMutable & PublicImmutable.\n ///\n /// # Arguments\n /// * `storage_slot` - The storage slot to read from\n ///\n /// # Returns\n /// * `T` - The deserialized value from storage\n ///\n /// # Generic Parameters\n /// * `T` - The type that the caller expects to read from the `storage_slot`.\n ///\n pub fn storage_read<T>(self, storage_slot: Field) -> T\n where\n T: Packable,\n {\n T::unpack(self.raw_storage_read(storage_slot))\n }\n\n /// Writes raw field values to public storage.\n /// Writes to N consecutive storage slots starting from the given slot.\n ///\n /// Very low-level function. Users should typically use the public state\n /// variable abstractions to perform writes: PublicMutable & PublicImmutable.\n ///\n /// Public storage writes take effect immediately.\n ///\n /// # Arguments\n /// * `storage_slot` - The starting storage slot to write to\n /// * `values` - Array of N Fields to write to storage\n ///\n pub fn raw_storage_write<let N: u32>(_self: Self, storage_slot: Field, values: [Field; N]) {\n for i in 0..N {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { storage_write(storage_slot + i as Field, values[i]) };\n }\n }\n\n /// Writes a typed value to public storage.\n ///\n /// Low-level function. Users should typically use the public state\n /// variable abstractions to perform writes: PublicMutable & PublicImmutable.\n ///\n /// # Arguments\n /// * `storage_slot` - The storage slot to write to\n /// * `value` - The typed value to write to storage\n ///\n /// # Generic Parameters\n /// * `T` - The type to write to storage.\n ///\n pub fn storage_write<T>(self, storage_slot: Field, value: T)\n where\n T: Packable,\n {\n self.raw_storage_write(storage_slot, value.pack());\n }\n}\n\n// TODO: consider putting this oracle code in its own file.\n// Unconstrained opcode wrappers (do not use directly).\nunconstrained fn address() -> AztecAddress {\n address_opcode()\n}\nunconstrained fn sender() -> AztecAddress {\n sender_opcode()\n}\nunconstrained fn transaction_fee() -> Field {\n transaction_fee_opcode()\n}\nunconstrained fn chain_id() -> Field {\n chain_id_opcode()\n}\nunconstrained fn version() -> Field {\n version_opcode()\n}\nunconstrained fn block_number() -> u32 {\n block_number_opcode()\n}\nunconstrained fn timestamp() -> u64 {\n timestamp_opcode()\n}\nunconstrained fn min_fee_per_l2_gas() -> u128 {\n min_fee_per_l2_gas_opcode()\n}\nunconstrained fn min_fee_per_da_gas() -> u128 {\n min_fee_per_da_gas_opcode()\n}\nunconstrained fn l2_gas_left() -> u32 {\n l2_gas_left_opcode()\n}\nunconstrained fn da_gas_left() -> u32 {\n da_gas_left_opcode()\n}\nunconstrained fn is_static_call() -> u1 {\n is_static_call_opcode()\n}\nunconstrained fn note_hash_exists(note_hash: Field, leaf_index: u64) -> u1 {\n note_hash_exists_opcode(note_hash, leaf_index)\n}\nunconstrained fn emit_note_hash(note_hash: Field) {\n emit_note_hash_opcode(note_hash)\n}\nunconstrained fn nullifier_exists(nullifier: Field, address: Field) -> u1 {\n nullifier_exists_opcode(nullifier, address)\n}\nunconstrained fn emit_nullifier(nullifier: Field) {\n emit_nullifier_opcode(nullifier)\n}\nunconstrained fn emit_public_log(message: [Field]) {\n emit_public_log_opcode(message)\n}\nunconstrained fn l1_to_l2_msg_exists(msg_hash: Field, msg_leaf_index: u64) -> u1 {\n l1_to_l2_msg_exists_opcode(msg_hash, msg_leaf_index)\n}\nunconstrained fn send_l2_to_l1_msg(recipient: EthAddress, content: Field) {\n send_l2_to_l1_msg_opcode(recipient, content)\n}\n\nunconstrained fn call<let N: u32>(\n l2_gas_allocation: u32,\n da_gas_allocation: u32,\n address: AztecAddress,\n args: [Field; N],\n) {\n call_opcode(l2_gas_allocation, da_gas_allocation, address, N, args)\n}\n\nunconstrained fn call_static<let N: u32>(\n l2_gas_allocation: u32,\n da_gas_allocation: u32,\n address: AztecAddress,\n args: [Field; N],\n) {\n call_static_opcode(l2_gas_allocation, da_gas_allocation, address, N, args)\n}\n\npub unconstrained fn calldata_copy<let N: u32>(cdoffset: u32, copy_size: u32) -> [Field; N] {\n calldata_copy_opcode(cdoffset, copy_size)\n}\n\n// `success_copy` is placed immediately after the CALL opcode to get the success value\nunconstrained fn success_copy() -> bool {\n success_copy_opcode()\n}\n\nunconstrained fn returndata_size() -> u32 {\n returndata_size_opcode()\n}\n\nunconstrained fn returndata_copy(rdoffset: u32, copy_size: u32) -> [Field] {\n returndata_copy_opcode(rdoffset, copy_size)\n}\n\npub unconstrained fn avm_return(returndata: [Field]) {\n return_opcode(returndata)\n}\n\n// This opcode reverts using the exact data given. In general it should only be used\n// to do rethrows, where the revert data is the same as the original revert data.\n// For normal reverts, use Noir's `assert` which, on top of reverting, will also add\n// an error selector to the revert data.\nunconstrained fn avm_revert(revertdata: [Field]) {\n revert_opcode(revertdata)\n}\n\nunconstrained fn storage_read(storage_slot: Field) -> Field {\n storage_read_opcode(storage_slot)\n}\n\nunconstrained fn storage_write(storage_slot: Field, value: Field) {\n storage_write_opcode(storage_slot, value);\n}\n\nimpl Empty for PublicContext {\n fn empty() -> Self {\n PublicContext::new(|| 0)\n }\n}\n\n// TODO: consider putting this oracle code in its own file.\n// AVM oracles (opcodes) follow, do not use directly.\n#[oracle(avmOpcodeAddress)]\nunconstrained fn address_opcode() -> AztecAddress {}\n\n#[oracle(avmOpcodeSender)]\nunconstrained fn sender_opcode() -> AztecAddress {}\n\n#[oracle(avmOpcodeTransactionFee)]\nunconstrained fn transaction_fee_opcode() -> Field {}\n\n#[oracle(avmOpcodeChainId)]\nunconstrained fn chain_id_opcode() -> Field {}\n\n#[oracle(avmOpcodeVersion)]\nunconstrained fn version_opcode() -> Field {}\n\n#[oracle(avmOpcodeBlockNumber)]\nunconstrained fn block_number_opcode() -> u32 {}\n\n#[oracle(avmOpcodeTimestamp)]\nunconstrained fn timestamp_opcode() -> u64 {}\n\n#[oracle(avmOpcodeMinFeePerL2Gas)]\nunconstrained fn min_fee_per_l2_gas_opcode() -> u128 {}\n\n#[oracle(avmOpcodeMinFeePerDaGas)]\nunconstrained fn min_fee_per_da_gas_opcode() -> u128 {}\n\n#[oracle(avmOpcodeL2GasLeft)]\nunconstrained fn l2_gas_left_opcode() -> u32 {}\n\n#[oracle(avmOpcodeDaGasLeft)]\nunconstrained fn da_gas_left_opcode() -> u32 {}\n\n#[oracle(avmOpcodeIsStaticCall)]\nunconstrained fn is_static_call_opcode() -> u1 {}\n\n#[oracle(avmOpcodeNoteHashExists)]\nunconstrained fn note_hash_exists_opcode(note_hash: Field, leaf_index: u64) -> u1 {}\n\n#[oracle(avmOpcodeEmitNoteHash)]\nunconstrained fn emit_note_hash_opcode(note_hash: Field) {}\n\n#[oracle(avmOpcodeNullifierExists)]\nunconstrained fn nullifier_exists_opcode(nullifier: Field, address: Field) -> u1 {}\n\n#[oracle(avmOpcodeEmitNullifier)]\nunconstrained fn emit_nullifier_opcode(nullifier: Field) {}\n\n// TODO(#11124): rename unencrypted to public in avm\n#[oracle(avmOpcodeEmitUnencryptedLog)]\nunconstrained fn emit_public_log_opcode(message: [Field]) {}\n\n#[oracle(avmOpcodeL1ToL2MsgExists)]\nunconstrained fn l1_to_l2_msg_exists_opcode(msg_hash: Field, msg_leaf_index: u64) -> u1 {}\n\n#[oracle(avmOpcodeSendL2ToL1Msg)]\nunconstrained fn send_l2_to_l1_msg_opcode(recipient: EthAddress, content: Field) {}\n\n#[oracle(avmOpcodeCalldataCopy)]\nunconstrained fn calldata_copy_opcode<let N: u32>(cdoffset: u32, copy_size: u32) -> [Field; N] {}\n\n#[oracle(avmOpcodeReturndataSize)]\nunconstrained fn returndata_size_opcode() -> u32 {}\n\n#[oracle(avmOpcodeReturndataCopy)]\nunconstrained fn returndata_copy_opcode(rdoffset: u32, copy_size: u32) -> [Field] {}\n\n#[oracle(avmOpcodeReturn)]\nunconstrained fn return_opcode(returndata: [Field]) {}\n\n// This opcode reverts using the exact data given. In general it should only be used\n// to do rethrows, where the revert data is the same as the original revert data.\n// For normal reverts, use Noir's `assert` which, on top of reverting, will also add\n// an error selector to the revert data.\n#[oracle(avmOpcodeRevert)]\nunconstrained fn revert_opcode(revertdata: [Field]) {}\n\n// While the length parameter might seem unnecessary given that we have N we keep it around because at the AVM bytecode\n// level, we want to support non-comptime-known lengths for such opcodes, even if Noir code will not generally take that\n// route.\n#[oracle(avmOpcodeCall)]\nunconstrained fn call_opcode<let N: u32>(\n l2_gas_allocation: u32,\n da_gas_allocation: u32,\n address: AztecAddress,\n length: u32,\n args: [Field; N],\n) {}\n\n// While the length parameter might seem unnecessary given that we have N we keep it around because at the AVM bytecode\n// level, we want to support non-comptime-known lengths for such opcodes, even if Noir code will not generally take that\n// route.\n#[oracle(avmOpcodeStaticCall)]\nunconstrained fn call_static_opcode<let N: u32>(\n l2_gas_allocation: u32,\n da_gas_allocation: u32,\n address: AztecAddress,\n length: u32,\n args: [Field; N],\n) {}\n\n#[oracle(avmOpcodeSuccessCopy)]\nunconstrained fn success_copy_opcode() -> bool {}\n\n#[oracle(avmOpcodeStorageRead)]\nunconstrained fn storage_read_opcode(storage_slot: Field) -> Field {}\n\n#[oracle(avmOpcodeStorageWrite)]\nunconstrained fn storage_write_opcode(storage_slot: Field, value: Field) {}\n"
|
|
3477
|
+
"source": "use crate::context::gas::GasOpts;\nuse crate::hash::{\n compute_l1_to_l2_message_hash, compute_l1_to_l2_message_nullifier, compute_secret_hash,\n};\nuse dep::protocol_types::abis::function_selector::FunctionSelector;\nuse dep::protocol_types::address::{AztecAddress, EthAddress};\nuse dep::protocol_types::constants::{MAX_U32_VALUE, NULL_MSG_SENDER_CONTRACT_ADDRESS};\nuse dep::protocol_types::traits::{Empty, FromField, Packable, Serialize, ToField};\n\n/// # PublicContext\n///\n/// The **main interface** between an #[external(\"public\")] function and the Aztec blockchain.\n///\n/// An instance of the PublicContext is initialized automatically at the outset\n/// of every public function, within the #[external(\"public\")] macro, so you'll never\n/// need to consciously instantiate this yourself.\n///\n/// The instance is always named `context`, and it will always be available\n/// within the body of every #[external(\"public\")] function in your smart contract.\n///\n/// Typical usage for a smart contract developer will be to call getter\n/// methods of the PublicContext.\n///\n/// _Pushing_ data and requests to the context is mostly handled within\n/// aztec-nr's own functions, so typically a smart contract developer won't\n/// need to call any setter methods directly.\n///\n/// ## Responsibilities\n/// - Exposes contextual data to a public function:\n/// - Data relating to how this public function was called:\n/// - msg_sender, this_address\n/// - Data relating to the current blockchain state:\n/// - timestamp, block_number, chain_id, version\n/// - Gas and fee information\n/// - Provides state access:\n/// - Read/write public storage (key-value mapping)\n/// - Check existence of notes and nullifiers\n/// (Some patterns use notes & nullifiers to store public (not private)\n/// information)\n/// - Enables consumption of L1->L2 messages.\n/// - Enables calls to other public smart contract functions:\n/// - Writes data to the blockchain:\n/// - Updates to public state variables\n/// - New public logs (for events)\n/// - New L2->L1 messages\n/// - New notes & nullifiers\n/// (E.g. pushing public info to notes/nullifiers, or for completing\n/// \"partial notes\")\n///\n/// ## Key Differences from Private Execution\n///\n/// Unlike private functions -- which are executed on the user's device and which\n/// can only reference historic state -- public functions are executed by a block\n/// proposer and are executed \"live\" on the _current_ tip of the chain.\n/// This means public functions can:\n/// - Read and write _current_ public state\n/// - Immediately see the effects of earlier transactions in the same block\n///\n/// Also, public functions are executed within a zkVM (the \"AVM\"), so that they\n/// can _revert_ whilst still ensuring payment to the proposer and prover.\n/// (Private functions cannot revert: they either succeed, or they cannot be\n/// included).\n///\n/// ## Optimising Public Functions\n///\n/// Using the AVM to execute public functions means they compile down to \"AVM\n/// bytecode\" instead of the ACIR that private functions (standalone circuits)\n/// compile to. Therefore the approach to optimising a public function is\n/// fundamentally different from optimising a public function.\n///\npub struct PublicContext {\n pub args_hash: Option<Field>,\n pub compute_args_hash: fn() -> Field,\n}\n\nimpl Eq for PublicContext {\n fn eq(self, other: Self) -> bool {\n (self.args_hash == other.args_hash)\n // Can't compare the function compute_args_hash\n }\n}\n\nimpl PublicContext {\n /// Creates a new PublicContext instance.\n ///\n /// Low-level function: This is called automatically by the #[external(\"public\")]\n /// macro, so you shouldn't need to be called directly by smart contract\n /// developers.\n ///\n /// # Arguments\n /// * `compute_args_hash` - Function to compute the args_hash\n ///\n /// # Returns\n /// * A new PublicContext instance\n ///\n pub fn new(compute_args_hash: fn() -> Field) -> Self {\n PublicContext { args_hash: Option::none(), compute_args_hash }\n }\n\n /// Emits a _public_ log that will be visible onchain to everyone.\n ///\n /// # Arguments\n /// * `log` - The data to log, must implement Serialize trait\n ///\n pub fn emit_public_log<T>(_self: Self, log: T)\n where\n T: Serialize,\n {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { emit_public_log(Serialize::serialize(log).as_vector()) };\n }\n\n /// Checks if a given note hash exists in the note hash tree at a particular\n /// leaf_index.\n ///\n /// # Arguments\n /// * `note_hash` - The note hash to check for existence\n /// * `leaf_index` - The index where the note hash should be located\n ///\n /// # Returns\n /// * `bool` - True if the note hash exists at the specified index\n ///\n pub fn note_hash_exists(_self: Self, note_hash: Field, leaf_index: u64) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { note_hash_exists(note_hash, leaf_index) } == 1\n }\n\n /// Checks if a specific L1-to-L2 message exists in the L1-to-L2 message\n /// tree at a particular leaf index.\n ///\n /// Common use cases include token bridging, cross-chain governance, and\n /// triggering L2 actions based on L1 events.\n ///\n /// This function should be called before attempting to consume an L1-to-L2\n /// message.\n ///\n /// # Arguments\n /// * `msg_hash` - Hash of the L1-to-L2 message to check\n /// * `msg_leaf_index` - The index where the message should be located\n ///\n /// # Returns\n /// * `bool` - True if the message exists at the specified index\n ///\n /// # Advanced\n /// * Uses the AVM l1_to_l2_msg_exists opcode for tree lookup\n /// * Messages are copied from L1 Inbox to L2 by block proposers\n ///\n pub fn l1_to_l2_msg_exists(_self: Self, msg_hash: Field, msg_leaf_index: Field) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself\n // TODO(alvaro): Make l1l2msg leaf index a u64 upstream\n unsafe { l1_to_l2_msg_exists(msg_hash, msg_leaf_index as u64) } == 1\n }\n\n /// Returns `true` if an `unsiloed_nullifier` has been emitted by `contract_address`.\n ///\n /// Note that unsiloed nullifiers are not the actual values stored in the nullifier tree: they are first siloed via\n /// [crate::hash::compute_siloed_nullifier] with the emitting contract's address.\n ///\n /// ## Use Cases\n ///\n /// Nullifiers are typically used as a _privacy-preserving_ record of a one-time action, but they can also be used\n /// to efficiently record _public_ one-time actions as well. This is cheaper than using public storage, and has the\n /// added benefit of the nullifier being emittable from a private function.\n ///\n /// An example is to check whether a contract has been published: we emit a nullifier that is deterministic and\n /// which has a _public_ preimage.\n ///\n /// ## Public vs Private\n ///\n /// In general, it is unsafe to check for nullifier non-existence in private, as that will not consider the\n /// possibility of the nullifier having been emitted in any transaction between the anchor block and the inclusion\n /// block. Private functions instead prove existence via\n /// [crate::context::private_context::PrivateContext::assert_nullifier_exists] and 'prove' non-existence by\n /// _emitting_ the nullifer, which would cause the transaction to fail if the nullifier existed.\n ///\n /// This is not the case in public functions, which do have access to the tip of the blockchain and so can reliably\n /// prove whether a nullifier exists or not.\n ///\n /// ## Safety\n ///\n /// While it is safe to rely on this function's return value to determine if a nullifier exists or not, it is often\n /// **not** safe to infer additional information from that. In particular, it is **unsafe** to infer that the\n /// existence of a nullifier emitted from a private function implies that all other side-effects of said private\n /// execution have been completed, more concretely that any enqueued public calls have been executed.\n ///\n /// This is because all private transaction effects are committed _before_ enqueued public functions are run (in\n /// order to not reveal detailed timing information about the transaction), so it is possible to observe a nullifier\n /// that was emitted alongside the enqueuing of a public call **before** said call has been completed.\n ///\n /// ## Cost\n ///\n /// This emits the `CHECKNULLIFIEREXISTS` opcode, which conceptually performs a merkle inclusion proof on the\n /// nullifier tree (both when the nullifier exists and when it doesn't).\n pub fn nullifier_exists_unsafe(\n _self: Self,\n unsiloed_nullifier: Field,\n contract_address: AztecAddress,\n ) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { nullifier_exists(unsiloed_nullifier, contract_address.to_field()) } == 1\n }\n\n /// Consumes a message sent from Ethereum (L1) to Aztec (L2) -- effectively\n /// marking it as \"read\".\n ///\n /// Use this function if you only want the message to ever be \"referred to\"\n /// once. Once consumed using this method, the message cannot be consumed\n /// again, because a nullifier is emitted.\n /// If your use case wants for the message to be read unlimited times, then\n /// you can always read any historic message from the L1-to-L2 messages tree,\n /// using the `l1_to_l2_msg_exists` method. Messages never technically get\n /// deleted from that tree.\n ///\n /// The message will first be inserted into an Aztec \"Inbox\" smart contract\n /// on L1. It will not be available for consumption immediately. Messages\n /// get copied-over from the L1 Inbox to L2 by the next Proposer in batches.\n /// So you will need to wait until the messages are copied before you can\n /// consume them.\n ///\n /// # Arguments\n /// * `content` - The message content that was sent from L1\n /// * `secret` - Secret value used for message privacy (if needed)\n /// * `sender` - Ethereum address that sent the message\n /// * `leaf_index` - Index of the message in the L1-to-L2 message tree\n ///\n /// # Advanced\n /// * Validates message existence in the L1-to-L2 message tree\n /// * Prevents double-consumption by emitting a nullifier\n /// * Message hash is computed from all parameters + chain context\n /// * Will revert if message doesn't exist or was already consumed\n ///\n pub fn consume_l1_to_l2_message(\n self: Self,\n content: Field,\n secret: Field,\n sender: EthAddress,\n leaf_index: Field,\n ) {\n let secret_hash = compute_secret_hash(secret);\n let message_hash = compute_l1_to_l2_message_hash(\n sender,\n self.chain_id(),\n /*recipient=*/\n self.this_address(),\n self.version(),\n content,\n secret_hash,\n leaf_index,\n );\n let nullifier = compute_l1_to_l2_message_nullifier(message_hash, secret);\n\n assert(\n !self.nullifier_exists_unsafe(nullifier, self.this_address()),\n \"L1-to-L2 message is already nullified\",\n );\n assert(\n self.l1_to_l2_msg_exists(message_hash, leaf_index),\n \"Tried to consume nonexistent L1-to-L2 message\",\n );\n\n self.push_nullifier(nullifier);\n }\n\n /// Sends an \"L2 -> L1 message\" from this function (Aztec, L2) to a smart\n /// contract on Ethereum (L1). L1 contracts which are designed to\n /// send/receive messages to/from Aztec are called \"Portal Contracts\".\n ///\n /// Common use cases include withdrawals, cross-chain asset transfers, and\n /// triggering L1 actions based on L2 state changes.\n ///\n /// The message will be inserted into an Aztec \"Outbox\" contract on L1,\n /// when this transaction's block is proposed to L1.\n /// Sending the message will not result in any immediate state changes in\n /// the target portal contract. The message will need to be manually\n /// consumed from the Outbox through a separate Ethereum transaction: a user\n /// will need to call a function of the portal contract -- a function\n /// specifically designed to make a call to the Outbox to consume the\n /// message.\n /// The message will only be available for consumption once the _epoch_\n /// proof has been submitted. Given that there are multiple Aztec blocks\n /// within an epoch, it might take some time for this epoch proof to be\n /// submitted -- especially if the block was near the start of an epoch.\n ///\n /// # Arguments\n /// * `recipient` - Ethereum address that will receive the message\n /// * `content` - Message content (32 bytes as a Field element)\n ///\n pub fn message_portal(_self: Self, recipient: EthAddress, content: Field) {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { send_l2_to_l1_msg(recipient, content) };\n }\n\n /// Calls a public function on another contract.\n ///\n /// Will revert if the called function reverts or runs out of gas.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract to call\n /// * `function_selector` - Function to call on the target contract\n /// * `args` - Arguments to pass to the function\n /// * `gas_opts` - An optional allocation of gas to the called function.\n ///\n /// # Returns\n /// * `[Field]` - Return data from the called function\n ///\n pub unconstrained fn call_public_function<let N: u32>(\n _self: Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; N],\n gas_opts: GasOpts,\n ) -> [Field] {\n let calldata = [function_selector.to_field()].concat(args);\n\n call(\n gas_opts.l2_gas.unwrap_or(MAX_U32_VALUE),\n gas_opts.da_gas.unwrap_or(MAX_U32_VALUE),\n contract_address,\n calldata,\n );\n // Use success_copy to determine whether the call succeeded\n let success = success_copy();\n\n let result_data = returndata_copy(0, returndata_size());\n if !success {\n // Rethrow the revert data.\n avm_revert(result_data);\n }\n result_data\n }\n\n /// Makes a read-only call to a public function on another contract.\n ///\n /// This is similar to Solidity's `staticcall`. The called function\n /// cannot modify state or emit events. Any nested calls are constrained to\n /// also be staticcalls.\n ///\n /// Useful for querying data from other contracts safely.\n ///\n /// Will revert if the called function reverts or runs out of gas.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract to call\n /// * `function_selector` - Function to call on the target contract\n /// * `args` - Array of arguments to pass to the called function\n /// * `gas_opts` - An optional allocation of gas to the called function.\n ///\n /// # Returns\n /// * `[Field]` - Return data from the called function\n ///\n pub unconstrained fn static_call_public_function<let N: u32>(\n _self: Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; N],\n gas_opts: GasOpts,\n ) -> [Field] {\n let calldata = [function_selector.to_field()].concat(args);\n\n call_static(\n gas_opts.l2_gas.unwrap_or(MAX_U32_VALUE),\n gas_opts.da_gas.unwrap_or(MAX_U32_VALUE),\n contract_address,\n calldata,\n );\n // Use success_copy to determine whether the call succeeded\n let success = success_copy();\n\n let result_data = returndata_copy(0, returndata_size());\n if !success {\n // Rethrow the revert data.\n avm_revert(result_data);\n }\n result_data\n }\n\n /// Adds a new note hash to the Aztec blockchain's global Note Hash Tree.\n ///\n /// Notes are ordinarily constructed and emitted by _private_ functions, to\n /// ensure that both the content of the note, and the contract that emitted\n /// the note, stay private.\n ///\n /// There are however some useful patterns whereby a note needs to contain\n /// _public_ data. The ability to push a new note_hash from a _public_\n /// function means that notes can be injected with public data immediately\n /// -- as soon as the public value is known. The slower alternative would\n /// be to submit a follow-up transaction so that a private function can\n /// inject the data. Both are possible on Aztec.\n ///\n /// Search \"Partial Note\" for a very common pattern which enables a note\n /// to be \"partially\" populated with some data in a _private_ function, and\n /// then later \"completed\" with some data in a public function.\n ///\n /// # Arguments\n /// * `note_hash` - The hash of the note to add to the tree\n ///\n /// # Advanced\n /// * The note hash will be siloed with the contract address by the protocol\n ///\n pub fn push_note_hash(_self: Self, note_hash: Field) {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { emit_note_hash(note_hash) };\n }\n\n /// Adds a new nullifier to the Aztec blockchain's global Nullifier Tree.\n ///\n /// Whilst nullifiers are primarily intended as a _privacy-preserving_\n /// record of a one-time action, they can also be used to efficiently\n /// record _public_ one-time actions too. Hence why you're seeing this\n /// function within the PublicContext.\n /// An example is to check whether a contract has been published: we emit\n /// a nullifier that is deterministic, but whose preimage is _not_ private.\n ///\n /// # Arguments\n /// * `nullifier` - A unique field element that represents the consumed\n /// state\n ///\n /// # Advanced\n /// * Nullifier is immediately added to the global nullifier tree\n /// * Emitted nullifiers are immediately visible to all\n /// subsequent transactions in the same block\n /// * Automatically siloed with the contract address by the protocol\n /// * Used for preventing double-spending and ensuring one-time actions\n ///\n pub fn push_nullifier(_self: Self, nullifier: Field) {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { emit_nullifier(nullifier) };\n }\n\n /// Returns the address of the current contract being executed.\n ///\n /// This is equivalent to `address(this)` in Solidity (hence the name).\n /// Use this to identify the current contract's address, commonly needed for\n /// access control or when interacting with other contracts.\n ///\n /// # Returns\n /// * `AztecAddress` - The contract address of the current function being\n /// executed.\n ///\n pub fn this_address(_self: Self) -> AztecAddress {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n address()\n }\n }\n\n /// Returns the contract address that initiated this function call.\n ///\n /// This is similar to `msg.sender` in Solidity (hence the name).\n ///\n /// Important Note: If the calling function is a _private_ function, then it had the option of hiding its address\n /// when enqueuing this public function call. In such cases, this method will return `Option<AztecAddress>::none`.\n /// If the calling function is a _public_ function, it will always return an `Option<AztecAddress>::some` (i.e.\n /// a non-null value).\n ///\n /// # Returns\n /// * `Option<AztecAddress>` - The address of the smart contract that called this function (be it an app contract\n /// or a user's account contract).\n ///\n /// # Advanced\n /// * Value is provided by the AVM sender opcode\n /// * In nested calls, this is the immediate caller, not the original transaction sender\n ///\n pub fn maybe_msg_sender(_self: Self) -> Option<AztecAddress> {\n // Safety: AVM opcodes are constrained by the AVM itself\n let maybe_msg_sender = unsafe { sender() };\n if maybe_msg_sender == NULL_MSG_SENDER_CONTRACT_ADDRESS {\n Option::none()\n } else {\n Option::some(maybe_msg_sender)\n }\n }\n\n /// Returns the function selector of the currently-executing function.\n ///\n /// This is similar to `msg.sig` in Solidity, returning the first 4\n /// bytes of the function signature.\n ///\n /// # Returns\n /// * `FunctionSelector` - The 4-byte function identifier\n ///\n /// # Advanced\n /// * Extracted from the first element of calldata\n /// * Used internally for function dispatch in the AVM\n ///\n pub fn selector(_self: Self) -> FunctionSelector {\n // The selector is the first element of the calldata when calling a public function through dispatch.\n // Safety: AVM opcodes are constrained by the AVM itself\n let raw_selector: [Field; 1] = unsafe { calldata_copy(0, 1) };\n FunctionSelector::from_field(raw_selector[0])\n }\n\n /// Returns the hash of the arguments passed to the current function.\n ///\n /// Very low-level function: The #[external(\"public\")] macro uses this internally.\n /// Smart contract developers typically won't need to access this\n /// directly as arguments are automatically made available.\n ///\n /// # Returns\n /// * `Field` - Hash of the function arguments\n ///\n pub fn get_args_hash(mut self) -> Field {\n if !self.args_hash.is_some() {\n self.args_hash = Option::some((self.compute_args_hash)());\n }\n\n self.args_hash.unwrap_unchecked()\n }\n\n /// Returns the \"transaction fee\" for the current transaction.\n /// This is the final tx fee that will be deducted from the fee_payer's\n /// \"fee-juice\" balance (in the protocol's Base Rollup circuit).\n ///\n /// # Returns\n /// * `Field` - The actual, final cost of the transaction, taking into account:\n /// the actual gas used during the setup and app-logic phases,\n /// and the fixed amount of gas that's been allocated by the user\n /// for the teardown phase.\n /// I.e. effectiveL2FeePerGas * l2GasUsed + effectiveDAFeePerGas * daGasUsed\n ///\n /// This will return `0` during the \"setup\" and \"app-logic\" phases of\n /// tx execution (because the final tx fee is not known at that time).\n /// This will only return a nonzero value during the \"teardown\" phase of\n /// execution, where the final tx fee can actually be computed.\n ///\n /// Regardless of _when_ this function is called during the teardown phase,\n /// it will always return the same final tx fee value. The teardown phase\n /// does not consume a variable amount of gas: it always consumes a\n /// pre-allocated amount of gas, as specified by the user when they generate\n /// their tx.\n ///\n pub fn transaction_fee(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n transaction_fee()\n }\n }\n\n /// Returns the chain ID of the current network.\n ///\n /// This is similar to `block.chainid` in Solidity. Returns the unique\n /// identifier for the blockchain network this transaction is executing on.\n ///\n /// Helps prevent cross-chain replay attacks. Useful if implementing\n /// multi-chain contract logic.\n ///\n /// # Returns\n /// * `Field` - The chain ID as a field element\n ///\n pub fn chain_id(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n chain_id()\n }\n }\n\n /// Returns the Aztec protocol version that this transaction is executing\n /// under. Different versions may have different rules, opcodes, or\n /// cryptographic primitives.\n ///\n /// This is similar to how Ethereum has different EVM versions.\n ///\n /// Useful for forward/backward compatibility checks\n ///\n /// Not to be confused with contract versions; this is the protocol version.\n ///\n /// # Returns\n /// * `Field` - The protocol version as a field element\n ///\n pub fn version(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n version()\n }\n }\n /// Returns the current block number.\n ///\n /// This is similar to `block.number` in Solidity.\n ///\n /// Note: the current block number is only available within a public function\n /// (as opposed to a private function).\n ///\n /// Note: the time intervals between blocks should not be relied upon as\n /// being consistent:\n /// - Timestamps of blocks fall within a range, rather than at exact regular\n /// intervals.\n /// - Slots can be missed.\n /// - Protocol upgrades can completely change the intervals between blocks\n /// (and indeed the current roadmap plans to reduce the time between\n /// blocks, eventually).\n /// Use `context.timestamp()` for more-reliable time-based logic.\n ///\n /// # Returns\n /// * `u32` - The current block number\n ///\n pub fn block_number(_self: Self) -> u32 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n block_number()\n }\n }\n\n /// Returns the timestamp of the current block.\n ///\n /// This is similar to `block.timestamp` in Solidity.\n ///\n /// All functions of all transactions in a block share the exact same\n /// timestamp (even though technically each transaction is executed\n /// one-after-the-other).\n ///\n /// Important note: Timestamps of Aztec blocks are not at reliably-fixed\n /// intervals. The proposer of the block has some flexibility to choose a\n /// timestamp which is in a valid _range_: Obviously the timestamp of this\n /// block must be strictly greater than that of the previous block, and must\n /// must be less than the timestamp of whichever ethereum block the aztec\n /// block is proposed to. Furthermore, if the timestamp is not deemed close\n /// enough to the actual current time, the committee of validators will not\n /// attest to the block.\n ///\n /// # Returns\n /// * `u64` - Unix timestamp in seconds\n ///\n pub fn timestamp(_self: Self) -> u64 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n timestamp()\n }\n }\n\n /// Returns the fee per unit of L2 gas for this transaction (aka the \"L2 gas\n /// price\"), as chosen by the user.\n ///\n /// L2 gas covers the cost of executing public functions and handling\n /// side-effects within the AVM.\n ///\n /// # Returns\n /// * `u128` - Fee per unit of L2 gas\n ///\n /// Wallet developers should be mindful that the choice of gas price (which\n /// is publicly visible) can leak information about the user, e.g.:\n /// - which wallet software the user is using;\n /// - the amount of time which has elapsed from the time the user's wallet\n /// chose a gas price (at the going rate), to the time of tx submission.\n /// This can give clues about the proving time, and hence the nature of\n /// the tx.\n /// - the urgency of the transaction (which is kind of unavoidable, if the\n /// tx is indeed urgent).\n /// - the wealth of the user.\n /// - the exact user (if the gas price is explicitly chosen by the user to\n /// be some unique number like 0.123456789, or their favorite number).\n /// Wallet devs might wish to consider fuzzing the choice of gas price.\n ///\n pub fn min_fee_per_l2_gas(_self: Self) -> u128 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n min_fee_per_l2_gas()\n }\n }\n\n /// Returns the fee per unit of DA (Data Availability) gas (aka the \"DA gas\n /// price\").\n ///\n /// DA gas covers the cost of making transaction data available on L1.\n ///\n /// See the warning in `min_fee_per_l2_gas` for how gas prices can be leaky.\n ///\n /// # Returns\n /// * `u128` - Fee per unit of DA gas\n ///\n pub fn min_fee_per_da_gas(_self: Self) -> u128 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n min_fee_per_da_gas()\n }\n }\n\n /// Returns the remaining L2 gas available for this transaction.\n ///\n /// Different AVM opcodes consume different amounts of gas.\n ///\n /// # Returns\n /// * `u32` - Remaining L2 gas units\n ///\n pub fn l2_gas_left(_self: Self) -> u32 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n l2_gas_left()\n }\n }\n\n /// Returns the remaining DA (Data Availability) gas available for this\n /// transaction.\n ///\n /// DA gas is consumed when emitting data that needs to be made available\n /// on L1, such as public logs or state updates.\n /// All of the side-effects from the private part of the tx also consume\n /// DA gas before execution of any public functions even begins.\n ///\n /// # Returns\n /// * `u32` - Remaining DA gas units\n ///\n pub fn da_gas_left(_self: Self) -> u32 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n da_gas_left()\n }\n }\n\n /// Checks if the current execution is within a staticcall context, where\n /// no state changes or logs are allowed to be emitted (by this function\n /// or any nested function calls).\n ///\n /// # Returns\n /// * `bool` - True if in staticcall context, false otherwise\n ///\n pub fn is_static_call(_self: Self) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { is_static_call() } == 1\n }\n\n /// Reads raw field values from public storage.\n /// Reads N consecutive storage slots starting from the given slot.\n ///\n /// Very low-level function. Users should typically use the public state\n /// variable abstractions to perform reads: PublicMutable & PublicImmutable.\n ///\n /// # Arguments\n /// * `storage_slot` - The starting storage slot to read from\n ///\n /// # Returns\n /// * `[Field; N]` - Array of N field values from consecutive storage slots\n ///\n /// # Generic Parameters\n /// * `N` - the number of consecutive slots to return, starting from the\n /// `storage_slot`.\n ///\n pub fn raw_storage_read<let N: u32>(_self: Self, storage_slot: Field) -> [Field; N] {\n let mut out = [0; N];\n for i in 0..N {\n // Safety: AVM opcodes are constrained by the AVM itself\n out[i] = unsafe { storage_read(storage_slot + i as Field) };\n }\n out\n }\n\n /// Reads a typed value from public storage.\n ///\n /// Low-level function. Users should typically use the public state\n /// variable abstractions to perform reads: PublicMutable & PublicImmutable.\n ///\n /// # Arguments\n /// * `storage_slot` - The storage slot to read from\n ///\n /// # Returns\n /// * `T` - The deserialized value from storage\n ///\n /// # Generic Parameters\n /// * `T` - The type that the caller expects to read from the `storage_slot`.\n ///\n pub fn storage_read<T>(self, storage_slot: Field) -> T\n where\n T: Packable,\n {\n T::unpack(self.raw_storage_read(storage_slot))\n }\n\n /// Writes raw field values to public storage.\n /// Writes to N consecutive storage slots starting from the given slot.\n ///\n /// Very low-level function. Users should typically use the public state\n /// variable abstractions to perform writes: PublicMutable & PublicImmutable.\n ///\n /// Public storage writes take effect immediately.\n ///\n /// # Arguments\n /// * `storage_slot` - The starting storage slot to write to\n /// * `values` - Array of N Fields to write to storage\n ///\n pub fn raw_storage_write<let N: u32>(_self: Self, storage_slot: Field, values: [Field; N]) {\n for i in 0..N {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { storage_write(storage_slot + i as Field, values[i]) };\n }\n }\n\n /// Writes a typed value to public storage.\n ///\n /// Low-level function. Users should typically use the public state\n /// variable abstractions to perform writes: PublicMutable & PublicImmutable.\n ///\n /// # Arguments\n /// * `storage_slot` - The storage slot to write to\n /// * `value` - The typed value to write to storage\n ///\n /// # Generic Parameters\n /// * `T` - The type to write to storage.\n ///\n pub fn storage_write<T>(self, storage_slot: Field, value: T)\n where\n T: Packable,\n {\n self.raw_storage_write(storage_slot, value.pack());\n }\n}\n\n// TODO: consider putting this oracle code in its own file.\n// Unconstrained opcode wrappers (do not use directly).\nunconstrained fn address() -> AztecAddress {\n address_opcode()\n}\nunconstrained fn sender() -> AztecAddress {\n sender_opcode()\n}\nunconstrained fn transaction_fee() -> Field {\n transaction_fee_opcode()\n}\nunconstrained fn chain_id() -> Field {\n chain_id_opcode()\n}\nunconstrained fn version() -> Field {\n version_opcode()\n}\nunconstrained fn block_number() -> u32 {\n block_number_opcode()\n}\nunconstrained fn timestamp() -> u64 {\n timestamp_opcode()\n}\nunconstrained fn min_fee_per_l2_gas() -> u128 {\n min_fee_per_l2_gas_opcode()\n}\nunconstrained fn min_fee_per_da_gas() -> u128 {\n min_fee_per_da_gas_opcode()\n}\nunconstrained fn l2_gas_left() -> u32 {\n l2_gas_left_opcode()\n}\nunconstrained fn da_gas_left() -> u32 {\n da_gas_left_opcode()\n}\nunconstrained fn is_static_call() -> u1 {\n is_static_call_opcode()\n}\nunconstrained fn note_hash_exists(note_hash: Field, leaf_index: u64) -> u1 {\n note_hash_exists_opcode(note_hash, leaf_index)\n}\nunconstrained fn emit_note_hash(note_hash: Field) {\n emit_note_hash_opcode(note_hash)\n}\nunconstrained fn nullifier_exists(nullifier: Field, address: Field) -> u1 {\n nullifier_exists_opcode(nullifier, address)\n}\nunconstrained fn emit_nullifier(nullifier: Field) {\n emit_nullifier_opcode(nullifier)\n}\nunconstrained fn emit_public_log(message: [Field]) {\n emit_public_log_opcode(message)\n}\nunconstrained fn l1_to_l2_msg_exists(msg_hash: Field, msg_leaf_index: u64) -> u1 {\n l1_to_l2_msg_exists_opcode(msg_hash, msg_leaf_index)\n}\nunconstrained fn send_l2_to_l1_msg(recipient: EthAddress, content: Field) {\n send_l2_to_l1_msg_opcode(recipient, content)\n}\n\nunconstrained fn call<let N: u32>(\n l2_gas_allocation: u32,\n da_gas_allocation: u32,\n address: AztecAddress,\n args: [Field; N],\n) {\n call_opcode(l2_gas_allocation, da_gas_allocation, address, N, args)\n}\n\nunconstrained fn call_static<let N: u32>(\n l2_gas_allocation: u32,\n da_gas_allocation: u32,\n address: AztecAddress,\n args: [Field; N],\n) {\n call_static_opcode(l2_gas_allocation, da_gas_allocation, address, N, args)\n}\n\npub unconstrained fn calldata_copy<let N: u32>(cdoffset: u32, copy_size: u32) -> [Field; N] {\n calldata_copy_opcode(cdoffset, copy_size)\n}\n\n// `success_copy` is placed immediately after the CALL opcode to get the success value\nunconstrained fn success_copy() -> bool {\n success_copy_opcode()\n}\n\nunconstrained fn returndata_size() -> u32 {\n returndata_size_opcode()\n}\n\nunconstrained fn returndata_copy(rdoffset: u32, copy_size: u32) -> [Field] {\n returndata_copy_opcode(rdoffset, copy_size)\n}\n\npub unconstrained fn avm_return(returndata: [Field]) {\n return_opcode(returndata)\n}\n\n// This opcode reverts using the exact data given. In general it should only be used\n// to do rethrows, where the revert data is the same as the original revert data.\n// For normal reverts, use Noir's `assert` which, on top of reverting, will also add\n// an error selector to the revert data.\nunconstrained fn avm_revert(revertdata: [Field]) {\n revert_opcode(revertdata)\n}\n\nunconstrained fn storage_read(storage_slot: Field) -> Field {\n storage_read_opcode(storage_slot)\n}\n\nunconstrained fn storage_write(storage_slot: Field, value: Field) {\n storage_write_opcode(storage_slot, value);\n}\n\nimpl Empty for PublicContext {\n fn empty() -> Self {\n PublicContext::new(|| 0)\n }\n}\n\n// TODO: consider putting this oracle code in its own file.\n// AVM oracles (opcodes) follow, do not use directly.\n#[oracle(avmOpcodeAddress)]\nunconstrained fn address_opcode() -> AztecAddress {}\n\n#[oracle(avmOpcodeSender)]\nunconstrained fn sender_opcode() -> AztecAddress {}\n\n#[oracle(avmOpcodeTransactionFee)]\nunconstrained fn transaction_fee_opcode() -> Field {}\n\n#[oracle(avmOpcodeChainId)]\nunconstrained fn chain_id_opcode() -> Field {}\n\n#[oracle(avmOpcodeVersion)]\nunconstrained fn version_opcode() -> Field {}\n\n#[oracle(avmOpcodeBlockNumber)]\nunconstrained fn block_number_opcode() -> u32 {}\n\n#[oracle(avmOpcodeTimestamp)]\nunconstrained fn timestamp_opcode() -> u64 {}\n\n#[oracle(avmOpcodeMinFeePerL2Gas)]\nunconstrained fn min_fee_per_l2_gas_opcode() -> u128 {}\n\n#[oracle(avmOpcodeMinFeePerDaGas)]\nunconstrained fn min_fee_per_da_gas_opcode() -> u128 {}\n\n#[oracle(avmOpcodeL2GasLeft)]\nunconstrained fn l2_gas_left_opcode() -> u32 {}\n\n#[oracle(avmOpcodeDaGasLeft)]\nunconstrained fn da_gas_left_opcode() -> u32 {}\n\n#[oracle(avmOpcodeIsStaticCall)]\nunconstrained fn is_static_call_opcode() -> u1 {}\n\n#[oracle(avmOpcodeNoteHashExists)]\nunconstrained fn note_hash_exists_opcode(note_hash: Field, leaf_index: u64) -> u1 {}\n\n#[oracle(avmOpcodeEmitNoteHash)]\nunconstrained fn emit_note_hash_opcode(note_hash: Field) {}\n\n#[oracle(avmOpcodeNullifierExists)]\nunconstrained fn nullifier_exists_opcode(nullifier: Field, address: Field) -> u1 {}\n\n#[oracle(avmOpcodeEmitNullifier)]\nunconstrained fn emit_nullifier_opcode(nullifier: Field) {}\n\n// TODO(#11124): rename unencrypted to public in avm\n#[oracle(avmOpcodeEmitUnencryptedLog)]\nunconstrained fn emit_public_log_opcode(message: [Field]) {}\n\n#[oracle(avmOpcodeL1ToL2MsgExists)]\nunconstrained fn l1_to_l2_msg_exists_opcode(msg_hash: Field, msg_leaf_index: u64) -> u1 {}\n\n#[oracle(avmOpcodeSendL2ToL1Msg)]\nunconstrained fn send_l2_to_l1_msg_opcode(recipient: EthAddress, content: Field) {}\n\n#[oracle(avmOpcodeCalldataCopy)]\nunconstrained fn calldata_copy_opcode<let N: u32>(cdoffset: u32, copy_size: u32) -> [Field; N] {}\n\n#[oracle(avmOpcodeReturndataSize)]\nunconstrained fn returndata_size_opcode() -> u32 {}\n\n#[oracle(avmOpcodeReturndataCopy)]\nunconstrained fn returndata_copy_opcode(rdoffset: u32, copy_size: u32) -> [Field] {}\n\n#[oracle(avmOpcodeReturn)]\nunconstrained fn return_opcode(returndata: [Field]) {}\n\n// This opcode reverts using the exact data given. In general it should only be used\n// to do rethrows, where the revert data is the same as the original revert data.\n// For normal reverts, use Noir's `assert` which, on top of reverting, will also add\n// an error selector to the revert data.\n#[oracle(avmOpcodeRevert)]\nunconstrained fn revert_opcode(revertdata: [Field]) {}\n\n// While the length parameter might seem unnecessary given that we have N we keep it around because at the AVM bytecode\n// level, we want to support non-comptime-known lengths for such opcodes, even if Noir code will not generally take that\n// route.\n#[oracle(avmOpcodeCall)]\nunconstrained fn call_opcode<let N: u32>(\n l2_gas_allocation: u32,\n da_gas_allocation: u32,\n address: AztecAddress,\n length: u32,\n args: [Field; N],\n) {}\n\n// While the length parameter might seem unnecessary given that we have N we keep it around because at the AVM bytecode\n// level, we want to support non-comptime-known lengths for such opcodes, even if Noir code will not generally take that\n// route.\n#[oracle(avmOpcodeStaticCall)]\nunconstrained fn call_static_opcode<let N: u32>(\n l2_gas_allocation: u32,\n da_gas_allocation: u32,\n address: AztecAddress,\n length: u32,\n args: [Field; N],\n) {}\n\n#[oracle(avmOpcodeSuccessCopy)]\nunconstrained fn success_copy_opcode() -> bool {}\n\n#[oracle(avmOpcodeStorageRead)]\nunconstrained fn storage_read_opcode(storage_slot: Field) -> Field {}\n\n#[oracle(avmOpcodeStorageWrite)]\nunconstrained fn storage_write_opcode(storage_slot: Field, value: Field) {}\n"
|
|
3478
3478
|
},
|
|
3479
3479
|
"71": {
|
|
3480
3480
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/context/returns_hash.nr",
|