@noir-lang/acvm_js 1.0.0-beta.15-1fce7ca.nightly → 1.0.0-beta.15-881acee.nightly

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/web/acvm_js.js CHANGED
@@ -197,63 +197,31 @@ function debugString(val) {
197
197
  // TODO we could test for more things here, like `Set`s and `Map`s.
198
198
  return className;
199
199
  }
200
- /**
201
- * Performs a bitwise AND operation between `lhs` and `rhs`
202
- * @param {string} lhs
203
- * @param {string} rhs
204
- * @returns {string}
205
- */
206
- export function and(lhs, rhs) {
207
- const ret = wasm.and(lhs, rhs);
208
- return ret;
209
- }
210
-
211
- /**
212
- * Performs a bitwise XOR operation between `lhs` and `rhs`
213
- * @param {string} lhs
214
- * @param {string} rhs
215
- * @returns {string}
216
- */
217
- export function xor(lhs, rhs) {
218
- const ret = wasm.xor(lhs, rhs);
219
- return ret;
220
- }
221
200
 
222
- let cachedUint32ArrayMemory0 = null;
223
-
224
- function getUint32ArrayMemory0() {
225
- if (cachedUint32ArrayMemory0 === null || cachedUint32ArrayMemory0.byteLength === 0) {
226
- cachedUint32ArrayMemory0 = new Uint32Array(wasm.memory.buffer);
227
- }
228
- return cachedUint32ArrayMemory0;
229
- }
230
-
231
- function passArray32ToWasm0(arg, malloc) {
232
- const ptr = malloc(arg.length * 4, 4) >>> 0;
233
- getUint32ArrayMemory0().set(arg, ptr / 4);
234
- WASM_VECTOR_LEN = arg.length;
235
- return ptr;
201
+ function takeFromExternrefTable0(idx) {
202
+ const value = wasm.__wbindgen_export_2.get(idx);
203
+ wasm.__externref_table_dealloc(idx);
204
+ return value;
236
205
  }
237
206
 
238
- function getArrayU32FromWasm0(ptr, len) {
207
+ function getArrayU8FromWasm0(ptr, len) {
239
208
  ptr = ptr >>> 0;
240
- return getUint32ArrayMemory0().subarray(ptr / 4, ptr / 4 + len);
209
+ return getUint8ArrayMemory0().subarray(ptr / 1, ptr / 1 + len);
241
210
  }
242
211
  /**
243
- * Sha256 compression function
244
- * @param {Uint32Array} inputs
245
- * @param {Uint32Array} state
246
- * @returns {Uint32Array}
212
+ * Compresses a `WitnessMap` into the binary format outputted by Nargo.
213
+ *
214
+ * @param {WitnessMap} witness_map - A witness map.
215
+ * @returns {Uint8Array} A compressed witness map
247
216
  */
248
- export function sha256_compression(inputs, state) {
249
- const ptr0 = passArray32ToWasm0(inputs, wasm.__wbindgen_malloc);
250
- const len0 = WASM_VECTOR_LEN;
251
- const ptr1 = passArray32ToWasm0(state, wasm.__wbindgen_malloc);
252
- const len1 = WASM_VECTOR_LEN;
253
- const ret = wasm.sha256_compression(ptr0, len0, ptr1, len1);
254
- var v3 = getArrayU32FromWasm0(ret[0], ret[1]).slice();
255
- wasm.__wbindgen_free(ret[0], ret[1] * 4, 4);
256
- return v3;
217
+ export function compressWitness(witness_map) {
218
+ const ret = wasm.compressWitness(witness_map);
219
+ if (ret[3]) {
220
+ throw takeFromExternrefTable0(ret[2]);
221
+ }
222
+ var v1 = getArrayU8FromWasm0(ret[0], ret[1]).slice();
223
+ wasm.__wbindgen_free(ret[0], ret[1] * 1, 1);
224
+ return v1;
257
225
  }
258
226
 
259
227
  function passArray8ToWasm0(arg, malloc) {
@@ -262,84 +230,99 @@ function passArray8ToWasm0(arg, malloc) {
262
230
  WASM_VECTOR_LEN = arg.length;
263
231
  return ptr;
264
232
  }
265
-
266
- function getArrayU8FromWasm0(ptr, len) {
267
- ptr = ptr >>> 0;
268
- return getUint8ArrayMemory0().subarray(ptr / 1, ptr / 1 + len);
269
- }
270
233
  /**
271
- * Calculates the Blake2s256 hash of the input bytes
272
- * @param {Uint8Array} inputs
273
- * @returns {Uint8Array}
234
+ * Decompresses a compressed witness as outputted by Nargo into a `WitnessMap`.
235
+ * This should be used to only fetch the witness map for the main function.
236
+ *
237
+ * @param {Uint8Array} compressed_witness - A compressed witness.
238
+ * @returns {WitnessMap} The decompressed witness map.
274
239
  */
275
- export function blake2s256(inputs) {
276
- const ptr0 = passArray8ToWasm0(inputs, wasm.__wbindgen_malloc);
240
+ export function decompressWitness(compressed_witness) {
241
+ const ptr0 = passArray8ToWasm0(compressed_witness, wasm.__wbindgen_malloc);
277
242
  const len0 = WASM_VECTOR_LEN;
278
- const ret = wasm.blake2s256(ptr0, len0);
279
- var v2 = getArrayU8FromWasm0(ret[0], ret[1]).slice();
243
+ const ret = wasm.decompressWitness(ptr0, len0);
244
+ if (ret[2]) {
245
+ throw takeFromExternrefTable0(ret[1]);
246
+ }
247
+ return takeFromExternrefTable0(ret[0]);
248
+ }
249
+
250
+ /**
251
+ * Compresses a `WitnessStack` into the binary format outputted by Nargo.
252
+ *
253
+ * @param {WitnessStack} witness_stack - A witness stack.
254
+ * @returns {Uint8Array} A compressed witness stack
255
+ */
256
+ export function compressWitnessStack(witness_stack) {
257
+ const ret = wasm.compressWitnessStack(witness_stack);
258
+ if (ret[3]) {
259
+ throw takeFromExternrefTable0(ret[2]);
260
+ }
261
+ var v1 = getArrayU8FromWasm0(ret[0], ret[1]).slice();
280
262
  wasm.__wbindgen_free(ret[0], ret[1] * 1, 1);
281
- return v2;
263
+ return v1;
282
264
  }
283
265
 
284
266
  /**
285
- * Verifies a ECDSA signature over the secp256k1 curve.
286
- * @param {Uint8Array} hashed_msg
287
- * @param {Uint8Array} public_key_x_bytes
288
- * @param {Uint8Array} public_key_y_bytes
289
- * @param {Uint8Array} signature
290
- * @returns {boolean}
267
+ * Decompresses a compressed witness stack as outputted by Nargo into a `WitnessStack`.
268
+ *
269
+ * @param {Uint8Array} compressed_witness - A compressed witness.
270
+ * @returns {WitnessStack} The decompressed witness stack.
291
271
  */
292
- export function ecdsa_secp256k1_verify(hashed_msg, public_key_x_bytes, public_key_y_bytes, signature) {
293
- const ptr0 = passArray8ToWasm0(hashed_msg, wasm.__wbindgen_malloc);
272
+ export function decompressWitnessStack(compressed_witness) {
273
+ const ptr0 = passArray8ToWasm0(compressed_witness, wasm.__wbindgen_malloc);
294
274
  const len0 = WASM_VECTOR_LEN;
295
- const ptr1 = passArray8ToWasm0(public_key_x_bytes, wasm.__wbindgen_malloc);
296
- const len1 = WASM_VECTOR_LEN;
297
- const ptr2 = passArray8ToWasm0(public_key_y_bytes, wasm.__wbindgen_malloc);
298
- const len2 = WASM_VECTOR_LEN;
299
- const ptr3 = passArray8ToWasm0(signature, wasm.__wbindgen_malloc);
300
- const len3 = WASM_VECTOR_LEN;
301
- const ret = wasm.ecdsa_secp256k1_verify(ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3);
302
- return ret !== 0;
275
+ const ret = wasm.decompressWitnessStack(ptr0, len0);
276
+ if (ret[2]) {
277
+ throw takeFromExternrefTable0(ret[1]);
278
+ }
279
+ return takeFromExternrefTable0(ret[0]);
303
280
  }
304
281
 
305
282
  /**
306
- * Verifies a ECDSA signature over the secp256r1 curve.
307
- * @param {Uint8Array} hashed_msg
308
- * @param {Uint8Array} public_key_x_bytes
309
- * @param {Uint8Array} public_key_y_bytes
310
- * @param {Uint8Array} signature
311
- * @returns {boolean}
283
+ * Executes an ACIR circuit to generate the solved witness from the initial witness.
284
+ *
285
+ * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
286
+ * @param {WitnessMap} initial_witness - The initial witness map defining all of the inputs to `circuit`..
287
+ * @param {ForeignCallHandler} foreign_call_handler - A callback to process any foreign calls from the circuit.
288
+ * @returns {WitnessMap} The solved witness calculated by executing the circuit on the provided inputs.
312
289
  */
313
- export function ecdsa_secp256r1_verify(hashed_msg, public_key_x_bytes, public_key_y_bytes, signature) {
314
- const ptr0 = passArray8ToWasm0(hashed_msg, wasm.__wbindgen_malloc);
290
+ export function executeCircuit(program, initial_witness, foreign_call_handler) {
291
+ const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
315
292
  const len0 = WASM_VECTOR_LEN;
316
- const ptr1 = passArray8ToWasm0(public_key_x_bytes, wasm.__wbindgen_malloc);
317
- const len1 = WASM_VECTOR_LEN;
318
- const ptr2 = passArray8ToWasm0(public_key_y_bytes, wasm.__wbindgen_malloc);
319
- const len2 = WASM_VECTOR_LEN;
320
- const ptr3 = passArray8ToWasm0(signature, wasm.__wbindgen_malloc);
321
- const len3 = WASM_VECTOR_LEN;
322
- const ret = wasm.ecdsa_secp256r1_verify(ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3);
323
- return ret !== 0;
293
+ const ret = wasm.executeCircuit(ptr0, len0, initial_witness, foreign_call_handler);
294
+ return ret;
324
295
  }
325
296
 
326
- function takeFromExternrefTable0(idx) {
327
- const value = wasm.__wbindgen_export_2.get(idx);
328
- wasm.__externref_table_dealloc(idx);
329
- return value;
297
+ /**
298
+ * Executes an ACIR circuit to generate the solved witness from the initial witness.
299
+ * This method also extracts the public return values from the solved witness into its own return witness.
300
+ *
301
+ * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
302
+ * @param {WitnessMap} initial_witness - The initial witness map defining all of the inputs to `circuit`..
303
+ * @param {ForeignCallHandler} foreign_call_handler - A callback to process any foreign calls from the circuit.
304
+ * @returns {SolvedAndReturnWitness} The solved witness calculated by executing the circuit on the provided inputs, as well as the return witness indices as specified by the circuit.
305
+ */
306
+ export function executeCircuitWithReturnWitness(program, initial_witness, foreign_call_handler) {
307
+ const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
308
+ const len0 = WASM_VECTOR_LEN;
309
+ const ret = wasm.executeCircuitWithReturnWitness(ptr0, len0, initial_witness, foreign_call_handler);
310
+ return ret;
330
311
  }
312
+
331
313
  /**
332
- * Sets the package's logging level.
314
+ * Executes an ACIR circuit to generate the solved witness from the initial witness.
333
315
  *
334
- * @param {LogLevel} level - The maximum level of logging to be emitted.
316
+ * @param {Uint8Array} program - A serialized representation of an ACIR program
317
+ * @param {WitnessMap} initial_witness - The initial witness map defining all of the inputs to `program`.
318
+ * @param {ForeignCallHandler} foreign_call_handler - A callback to process any foreign calls from the program.
319
+ * @returns {WitnessStack} The solved witness calculated by executing the program on the provided inputs.
335
320
  */
336
- export function initLogLevel(filter) {
337
- const ptr0 = passStringToWasm0(filter, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
321
+ export function executeProgram(program, initial_witness, foreign_call_handler) {
322
+ const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
338
323
  const len0 = WASM_VECTOR_LEN;
339
- const ret = wasm.initLogLevel(ptr0, len0);
340
- if (ret[1]) {
341
- throw takeFromExternrefTable0(ret[0]);
342
- }
324
+ const ret = wasm.executeProgram(ptr0, len0, initial_witness, foreign_call_handler);
325
+ return ret;
343
326
  }
344
327
 
345
328
  /**
@@ -412,126 +395,144 @@ export function getPublicWitness(program, solved_witness) {
412
395
  }
413
396
 
414
397
  /**
415
- * Compresses a `WitnessMap` into the binary format outputted by Nargo.
416
- *
417
- * @param {WitnessMap} witness_map - A witness map.
418
- * @returns {Uint8Array} A compressed witness map
398
+ * Performs a bitwise AND operation between `lhs` and `rhs`
399
+ * @param {string} lhs
400
+ * @param {string} rhs
401
+ * @returns {string}
419
402
  */
420
- export function compressWitness(witness_map) {
421
- const ret = wasm.compressWitness(witness_map);
422
- if (ret[3]) {
423
- throw takeFromExternrefTable0(ret[2]);
424
- }
425
- var v1 = getArrayU8FromWasm0(ret[0], ret[1]).slice();
426
- wasm.__wbindgen_free(ret[0], ret[1] * 1, 1);
427
- return v1;
403
+ export function and(lhs, rhs) {
404
+ const ret = wasm.and(lhs, rhs);
405
+ return ret;
428
406
  }
429
407
 
430
408
  /**
431
- * Decompresses a compressed witness as outputted by Nargo into a `WitnessMap`.
432
- * This should be used to only fetch the witness map for the main function.
433
- *
434
- * @param {Uint8Array} compressed_witness - A compressed witness.
435
- * @returns {WitnessMap} The decompressed witness map.
409
+ * Performs a bitwise XOR operation between `lhs` and `rhs`
410
+ * @param {string} lhs
411
+ * @param {string} rhs
412
+ * @returns {string}
436
413
  */
437
- export function decompressWitness(compressed_witness) {
438
- const ptr0 = passArray8ToWasm0(compressed_witness, wasm.__wbindgen_malloc);
439
- const len0 = WASM_VECTOR_LEN;
440
- const ret = wasm.decompressWitness(ptr0, len0);
441
- if (ret[2]) {
442
- throw takeFromExternrefTable0(ret[1]);
414
+ export function xor(lhs, rhs) {
415
+ const ret = wasm.xor(lhs, rhs);
416
+ return ret;
417
+ }
418
+
419
+ let cachedUint32ArrayMemory0 = null;
420
+
421
+ function getUint32ArrayMemory0() {
422
+ if (cachedUint32ArrayMemory0 === null || cachedUint32ArrayMemory0.byteLength === 0) {
423
+ cachedUint32ArrayMemory0 = new Uint32Array(wasm.memory.buffer);
443
424
  }
444
- return takeFromExternrefTable0(ret[0]);
425
+ return cachedUint32ArrayMemory0;
445
426
  }
446
427
 
428
+ function passArray32ToWasm0(arg, malloc) {
429
+ const ptr = malloc(arg.length * 4, 4) >>> 0;
430
+ getUint32ArrayMemory0().set(arg, ptr / 4);
431
+ WASM_VECTOR_LEN = arg.length;
432
+ return ptr;
433
+ }
434
+
435
+ function getArrayU32FromWasm0(ptr, len) {
436
+ ptr = ptr >>> 0;
437
+ return getUint32ArrayMemory0().subarray(ptr / 4, ptr / 4 + len);
438
+ }
447
439
  /**
448
- * Compresses a `WitnessStack` into the binary format outputted by Nargo.
449
- *
450
- * @param {WitnessStack} witness_stack - A witness stack.
451
- * @returns {Uint8Array} A compressed witness stack
440
+ * Sha256 compression function
441
+ * @param {Uint32Array} inputs
442
+ * @param {Uint32Array} state
443
+ * @returns {Uint32Array}
452
444
  */
453
- export function compressWitnessStack(witness_stack) {
454
- const ret = wasm.compressWitnessStack(witness_stack);
455
- if (ret[3]) {
456
- throw takeFromExternrefTable0(ret[2]);
457
- }
458
- var v1 = getArrayU8FromWasm0(ret[0], ret[1]).slice();
459
- wasm.__wbindgen_free(ret[0], ret[1] * 1, 1);
460
- return v1;
445
+ export function sha256_compression(inputs, state) {
446
+ const ptr0 = passArray32ToWasm0(inputs, wasm.__wbindgen_malloc);
447
+ const len0 = WASM_VECTOR_LEN;
448
+ const ptr1 = passArray32ToWasm0(state, wasm.__wbindgen_malloc);
449
+ const len1 = WASM_VECTOR_LEN;
450
+ const ret = wasm.sha256_compression(ptr0, len0, ptr1, len1);
451
+ var v3 = getArrayU32FromWasm0(ret[0], ret[1]).slice();
452
+ wasm.__wbindgen_free(ret[0], ret[1] * 4, 4);
453
+ return v3;
461
454
  }
462
455
 
463
456
  /**
464
- * Decompresses a compressed witness stack as outputted by Nargo into a `WitnessStack`.
465
- *
466
- * @param {Uint8Array} compressed_witness - A compressed witness.
467
- * @returns {WitnessStack} The decompressed witness stack.
457
+ * Calculates the Blake2s256 hash of the input bytes
458
+ * @param {Uint8Array} inputs
459
+ * @returns {Uint8Array}
468
460
  */
469
- export function decompressWitnessStack(compressed_witness) {
470
- const ptr0 = passArray8ToWasm0(compressed_witness, wasm.__wbindgen_malloc);
461
+ export function blake2s256(inputs) {
462
+ const ptr0 = passArray8ToWasm0(inputs, wasm.__wbindgen_malloc);
471
463
  const len0 = WASM_VECTOR_LEN;
472
- const ret = wasm.decompressWitnessStack(ptr0, len0);
473
- if (ret[2]) {
474
- throw takeFromExternrefTable0(ret[1]);
475
- }
476
- return takeFromExternrefTable0(ret[0]);
464
+ const ret = wasm.blake2s256(ptr0, len0);
465
+ var v2 = getArrayU8FromWasm0(ret[0], ret[1]).slice();
466
+ wasm.__wbindgen_free(ret[0], ret[1] * 1, 1);
467
+ return v2;
477
468
  }
478
469
 
479
470
  /**
480
- * Executes an ACIR circuit to generate the solved witness from the initial witness.
481
- *
482
- * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
483
- * @param {WitnessMap} initial_witness - The initial witness map defining all of the inputs to `circuit`..
484
- * @param {ForeignCallHandler} foreign_call_handler - A callback to process any foreign calls from the circuit.
485
- * @returns {WitnessMap} The solved witness calculated by executing the circuit on the provided inputs.
471
+ * Verifies a ECDSA signature over the secp256k1 curve.
472
+ * @param {Uint8Array} hashed_msg
473
+ * @param {Uint8Array} public_key_x_bytes
474
+ * @param {Uint8Array} public_key_y_bytes
475
+ * @param {Uint8Array} signature
476
+ * @returns {boolean}
486
477
  */
487
- export function executeCircuit(program, initial_witness, foreign_call_handler) {
488
- const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
478
+ export function ecdsa_secp256k1_verify(hashed_msg, public_key_x_bytes, public_key_y_bytes, signature) {
479
+ const ptr0 = passArray8ToWasm0(hashed_msg, wasm.__wbindgen_malloc);
489
480
  const len0 = WASM_VECTOR_LEN;
490
- const ret = wasm.executeCircuit(ptr0, len0, initial_witness, foreign_call_handler);
491
- return ret;
481
+ const ptr1 = passArray8ToWasm0(public_key_x_bytes, wasm.__wbindgen_malloc);
482
+ const len1 = WASM_VECTOR_LEN;
483
+ const ptr2 = passArray8ToWasm0(public_key_y_bytes, wasm.__wbindgen_malloc);
484
+ const len2 = WASM_VECTOR_LEN;
485
+ const ptr3 = passArray8ToWasm0(signature, wasm.__wbindgen_malloc);
486
+ const len3 = WASM_VECTOR_LEN;
487
+ const ret = wasm.ecdsa_secp256k1_verify(ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3);
488
+ return ret !== 0;
492
489
  }
493
490
 
494
491
  /**
495
- * Executes an ACIR circuit to generate the solved witness from the initial witness.
496
- * This method also extracts the public return values from the solved witness into its own return witness.
497
- *
498
- * @param {Uint8Array} circuit - A serialized representation of an ACIR circuit
499
- * @param {WitnessMap} initial_witness - The initial witness map defining all of the inputs to `circuit`..
500
- * @param {ForeignCallHandler} foreign_call_handler - A callback to process any foreign calls from the circuit.
501
- * @returns {SolvedAndReturnWitness} The solved witness calculated by executing the circuit on the provided inputs, as well as the return witness indices as specified by the circuit.
492
+ * Verifies a ECDSA signature over the secp256r1 curve.
493
+ * @param {Uint8Array} hashed_msg
494
+ * @param {Uint8Array} public_key_x_bytes
495
+ * @param {Uint8Array} public_key_y_bytes
496
+ * @param {Uint8Array} signature
497
+ * @returns {boolean}
502
498
  */
503
- export function executeCircuitWithReturnWitness(program, initial_witness, foreign_call_handler) {
504
- const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
499
+ export function ecdsa_secp256r1_verify(hashed_msg, public_key_x_bytes, public_key_y_bytes, signature) {
500
+ const ptr0 = passArray8ToWasm0(hashed_msg, wasm.__wbindgen_malloc);
505
501
  const len0 = WASM_VECTOR_LEN;
506
- const ret = wasm.executeCircuitWithReturnWitness(ptr0, len0, initial_witness, foreign_call_handler);
507
- return ret;
502
+ const ptr1 = passArray8ToWasm0(public_key_x_bytes, wasm.__wbindgen_malloc);
503
+ const len1 = WASM_VECTOR_LEN;
504
+ const ptr2 = passArray8ToWasm0(public_key_y_bytes, wasm.__wbindgen_malloc);
505
+ const len2 = WASM_VECTOR_LEN;
506
+ const ptr3 = passArray8ToWasm0(signature, wasm.__wbindgen_malloc);
507
+ const len3 = WASM_VECTOR_LEN;
508
+ const ret = wasm.ecdsa_secp256r1_verify(ptr0, len0, ptr1, len1, ptr2, len2, ptr3, len3);
509
+ return ret !== 0;
508
510
  }
509
511
 
510
512
  /**
511
- * Executes an ACIR circuit to generate the solved witness from the initial witness.
513
+ * Sets the package's logging level.
512
514
  *
513
- * @param {Uint8Array} program - A serialized representation of an ACIR program
514
- * @param {WitnessMap} initial_witness - The initial witness map defining all of the inputs to `program`.
515
- * @param {ForeignCallHandler} foreign_call_handler - A callback to process any foreign calls from the program.
516
- * @returns {WitnessStack} The solved witness calculated by executing the program on the provided inputs.
515
+ * @param {LogLevel} level - The maximum level of logging to be emitted.
517
516
  */
518
- export function executeProgram(program, initial_witness, foreign_call_handler) {
519
- const ptr0 = passArray8ToWasm0(program, wasm.__wbindgen_malloc);
517
+ export function initLogLevel(filter) {
518
+ const ptr0 = passStringToWasm0(filter, wasm.__wbindgen_malloc, wasm.__wbindgen_realloc);
520
519
  const len0 = WASM_VECTOR_LEN;
521
- const ret = wasm.executeProgram(ptr0, len0, initial_witness, foreign_call_handler);
522
- return ret;
520
+ const ret = wasm.initLogLevel(ptr0, len0);
521
+ if (ret[1]) {
522
+ throw takeFromExternrefTable0(ret[0]);
523
+ }
523
524
  }
524
525
 
525
526
  function __wbg_adapter_30(arg0, arg1, arg2) {
526
- wasm.closure583_externref_shim(arg0, arg1, arg2);
527
+ wasm.closure577_externref_shim(arg0, arg1, arg2);
527
528
  }
528
529
 
529
530
  function __wbg_adapter_89(arg0, arg1, arg2, arg3, arg4) {
530
- wasm.closure1178_externref_shim(arg0, arg1, arg2, arg3, arg4);
531
+ wasm.closure1172_externref_shim(arg0, arg1, arg2, arg3, arg4);
531
532
  }
532
533
 
533
534
  function __wbg_adapter_110(arg0, arg1, arg2, arg3) {
534
- wasm.closure1182_externref_shim(arg0, arg1, arg2, arg3);
535
+ wasm.closure1176_externref_shim(arg0, arg1, arg2, arg3);
535
536
  }
536
537
 
537
538
  async function __wbg_load(module, imports) {
@@ -797,8 +798,8 @@ function __wbg_get_imports() {
797
798
  const ret = false;
798
799
  return ret;
799
800
  };
800
- imports.wbg.__wbindgen_closure_wrapper1982 = function(arg0, arg1, arg2) {
801
- const ret = makeMutClosure(arg0, arg1, 584, __wbg_adapter_30);
801
+ imports.wbg.__wbindgen_closure_wrapper1979 = function(arg0, arg1, arg2) {
802
+ const ret = makeMutClosure(arg0, arg1, 578, __wbg_adapter_30);
802
803
  return ret;
803
804
  };
804
805
  imports.wbg.__wbindgen_debug_string = function(arg0, arg1) {
Binary file
@@ -1,17 +1,6 @@
1
1
  /* tslint:disable */
2
2
  /* eslint-disable */
3
3
  export const memory: WebAssembly.Memory;
4
- export const and: (a: any, b: any) => any;
5
- export const xor: (a: any, b: any) => any;
6
- export const sha256_compression: (a: number, b: number, c: number, d: number) => [number, number];
7
- export const blake2s256: (a: number, b: number) => [number, number];
8
- export const ecdsa_secp256k1_verify: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number) => number;
9
- export const ecdsa_secp256r1_verify: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number) => number;
10
- export const initLogLevel: (a: number, b: number) => [number, number];
11
- export const buildInfo: () => any;
12
- export const getReturnWitness: (a: number, b: number, c: any) => [number, number, number];
13
- export const getPublicParametersWitness: (a: number, b: number, c: any) => [number, number, number];
14
- export const getPublicWitness: (a: number, b: number, c: any) => [number, number, number];
15
4
  export const compressWitness: (a: any) => [number, number, number, number];
16
5
  export const decompressWitness: (a: number, b: number) => [number, number, number];
17
6
  export const compressWitnessStack: (a: any) => [number, number, number, number];
@@ -19,6 +8,17 @@ export const decompressWitnessStack: (a: number, b: number) => [number, number,
19
8
  export const executeCircuit: (a: number, b: number, c: any, d: any) => any;
20
9
  export const executeCircuitWithReturnWitness: (a: number, b: number, c: any, d: any) => any;
21
10
  export const executeProgram: (a: number, b: number, c: any, d: any) => any;
11
+ export const buildInfo: () => any;
12
+ export const getReturnWitness: (a: number, b: number, c: any) => [number, number, number];
13
+ export const getPublicParametersWitness: (a: number, b: number, c: any) => [number, number, number];
14
+ export const getPublicWitness: (a: number, b: number, c: any) => [number, number, number];
15
+ export const and: (a: any, b: any) => any;
16
+ export const xor: (a: any, b: any) => any;
17
+ export const sha256_compression: (a: number, b: number, c: number, d: number) => [number, number];
18
+ export const blake2s256: (a: number, b: number) => [number, number];
19
+ export const ecdsa_secp256k1_verify: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number) => number;
20
+ export const ecdsa_secp256r1_verify: (a: number, b: number, c: number, d: number, e: number, f: number, g: number, h: number) => number;
21
+ export const initLogLevel: (a: number, b: number) => [number, number];
22
22
  export const __wbindgen_exn_store: (a: number) => void;
23
23
  export const __externref_table_alloc: () => number;
24
24
  export const __wbindgen_export_2: WebAssembly.Table;
@@ -27,7 +27,7 @@ export const __wbindgen_malloc: (a: number, b: number) => number;
27
27
  export const __wbindgen_realloc: (a: number, b: number, c: number, d: number) => number;
28
28
  export const __wbindgen_export_6: WebAssembly.Table;
29
29
  export const __externref_table_dealloc: (a: number) => void;
30
- export const closure583_externref_shim: (a: number, b: number, c: any) => void;
31
- export const closure1178_externref_shim: (a: number, b: number, c: any, d: number, e: any) => void;
32
- export const closure1182_externref_shim: (a: number, b: number, c: any, d: any) => void;
30
+ export const closure577_externref_shim: (a: number, b: number, c: any) => void;
31
+ export const closure1172_externref_shim: (a: number, b: number, c: any, d: number, e: any) => void;
32
+ export const closure1176_externref_shim: (a: number, b: number, c: any, d: any) => void;
33
33
  export const __wbindgen_start: () => void;