@sip-protocol/sdk 0.7.2 → 0.7.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (262) hide show
  1. package/LICENSE +21 -0
  2. package/README.md +267 -0
  3. package/dist/{TransportWebUSB-TQ7WZ4LE.mjs → TransportWebUSB-YQMAGJAJ.mjs} +12 -9
  4. package/dist/browser.d.mts +10 -4
  5. package/dist/browser.d.ts +10 -4
  6. package/dist/browser.js +48874 -18336
  7. package/dist/browser.mjs +674 -48
  8. package/dist/chunk-4GRJ5MAW.mjs +152 -0
  9. package/dist/chunk-5D7A3L3W.mjs +717 -0
  10. package/dist/chunk-64AYA5F5.mjs +7834 -0
  11. package/dist/chunk-GMDGB22A.mjs +379 -0
  12. package/dist/chunk-I534WKN7.mjs +328 -0
  13. package/dist/chunk-IBZVA5Y7.mjs +1003 -0
  14. package/dist/chunk-PRRZAWJE.mjs +223 -0
  15. package/dist/{chunk-UJCSKKID.mjs → chunk-XGB3TDIC.mjs} +13 -1
  16. package/dist/chunk-YWGJ77A2.mjs +33806 -0
  17. package/dist/{chunk-6WGN57S2.mjs → chunk-Z3K7W5S3.mjs} +48 -0
  18. package/dist/constants-LHAAUC2T.mjs +51 -0
  19. package/dist/dist-2OGQ7FED.mjs +3957 -0
  20. package/dist/dist-IFHPYLDX.mjs +254 -0
  21. package/dist/fulfillment_proof-ANHVPKTB.mjs +21 -0
  22. package/dist/funding_proof-ICFZ5LHY.mjs +21 -0
  23. package/dist/index-DXh2IGkz.d.ts +24681 -0
  24. package/dist/index-DeE1ZzA4.d.mts +24681 -0
  25. package/dist/index.d.mts +9 -3
  26. package/dist/index.d.ts +9 -3
  27. package/dist/index.js +48676 -17318
  28. package/dist/index.mjs +583 -19
  29. package/dist/interface-Bf7w1PLW.d.mts +679 -0
  30. package/dist/interface-Bf7w1PLW.d.ts +679 -0
  31. package/dist/{noir-DKfEzWy9.d.mts → noir-kzbLVTei.d.mts} +31 -21
  32. package/dist/{noir-DKfEzWy9.d.ts → noir-kzbLVTei.d.ts} +31 -21
  33. package/dist/proofs/halo2.d.mts +151 -0
  34. package/dist/proofs/halo2.d.ts +151 -0
  35. package/dist/proofs/halo2.js +350 -0
  36. package/dist/proofs/halo2.mjs +11 -0
  37. package/dist/proofs/kimchi.d.mts +160 -0
  38. package/dist/proofs/kimchi.d.ts +160 -0
  39. package/dist/proofs/kimchi.js +431 -0
  40. package/dist/proofs/kimchi.mjs +13 -0
  41. package/dist/proofs/noir.d.mts +1 -1
  42. package/dist/proofs/noir.d.ts +1 -1
  43. package/dist/proofs/noir.js +74 -18
  44. package/dist/proofs/noir.mjs +84 -24
  45. package/dist/solana-U3MEGU7W.mjs +280 -0
  46. package/dist/validity_proof-3POXLPNY.mjs +21 -0
  47. package/package.json +54 -21
  48. package/src/adapters/index.ts +41 -0
  49. package/src/adapters/jupiter.ts +571 -0
  50. package/src/adapters/near-intents.ts +135 -0
  51. package/src/advisor/advisor.ts +653 -0
  52. package/src/advisor/index.ts +54 -0
  53. package/src/advisor/tools.ts +303 -0
  54. package/src/advisor/types.ts +164 -0
  55. package/src/chains/ethereum/announcement.ts +536 -0
  56. package/src/chains/ethereum/bnb-optimizations.ts +474 -0
  57. package/src/chains/ethereum/commitment.ts +522 -0
  58. package/src/chains/ethereum/constants.ts +462 -0
  59. package/src/chains/ethereum/deployment.ts +596 -0
  60. package/src/chains/ethereum/gas-estimation.ts +538 -0
  61. package/src/chains/ethereum/index.ts +268 -0
  62. package/src/chains/ethereum/optimizations.ts +614 -0
  63. package/src/chains/ethereum/privacy-adapter.ts +855 -0
  64. package/src/chains/ethereum/registry.ts +584 -0
  65. package/src/chains/ethereum/rpc.ts +905 -0
  66. package/src/chains/ethereum/stealth.ts +491 -0
  67. package/src/chains/ethereum/token.ts +790 -0
  68. package/src/chains/ethereum/transfer.ts +637 -0
  69. package/src/chains/ethereum/types.ts +456 -0
  70. package/src/chains/ethereum/viewing-key.ts +455 -0
  71. package/src/chains/near/commitment.ts +608 -0
  72. package/src/chains/near/constants.ts +284 -0
  73. package/src/chains/near/function-call.ts +871 -0
  74. package/src/chains/near/history.ts +654 -0
  75. package/src/chains/near/implicit-account.ts +840 -0
  76. package/src/chains/near/index.ts +393 -0
  77. package/src/chains/near/native-transfer.ts +658 -0
  78. package/src/chains/near/nep141.ts +775 -0
  79. package/src/chains/near/privacy-adapter.ts +889 -0
  80. package/src/chains/near/resolver.ts +971 -0
  81. package/src/chains/near/rpc.ts +1016 -0
  82. package/src/chains/near/stealth.ts +419 -0
  83. package/src/chains/near/types.ts +317 -0
  84. package/src/chains/near/viewing-key.ts +876 -0
  85. package/src/chains/solana/anchor-transfer.ts +386 -0
  86. package/src/chains/solana/commitment.ts +577 -0
  87. package/src/chains/solana/constants.ts +126 -12
  88. package/src/chains/solana/ephemeral-keys.ts +543 -0
  89. package/src/chains/solana/index.ts +276 -1
  90. package/src/chains/solana/key-derivation.ts +418 -0
  91. package/src/chains/solana/kit-compat.ts +334 -0
  92. package/src/chains/solana/optimizations.ts +560 -0
  93. package/src/chains/solana/privacy-adapter.ts +605 -0
  94. package/src/chains/solana/providers/generic.ts +201 -0
  95. package/src/chains/solana/providers/helius-enhanced-types.ts +336 -0
  96. package/src/chains/solana/providers/helius-enhanced.ts +623 -0
  97. package/src/chains/solana/providers/helius.ts +402 -0
  98. package/src/chains/solana/providers/index.ts +85 -0
  99. package/src/chains/solana/providers/interface.ts +221 -0
  100. package/src/chains/solana/providers/quicknode.ts +409 -0
  101. package/src/chains/solana/providers/triton.ts +426 -0
  102. package/src/chains/solana/providers/webhook.ts +790 -0
  103. package/src/chains/solana/rpc-client.ts +1150 -0
  104. package/src/chains/solana/scan.ts +170 -73
  105. package/src/chains/solana/sol-transfer.ts +732 -0
  106. package/src/chains/solana/spl-transfer.ts +886 -0
  107. package/src/chains/solana/stealth-scanner.ts +703 -0
  108. package/src/chains/solana/sunspot-verifier.ts +453 -0
  109. package/src/chains/solana/transaction-builder.ts +755 -0
  110. package/src/chains/solana/transfer.ts +74 -5
  111. package/src/chains/solana/types.ts +77 -7
  112. package/src/chains/solana/utils.ts +110 -0
  113. package/src/chains/solana/viewing-key.ts +807 -0
  114. package/src/compliance/fireblocks.ts +921 -0
  115. package/src/compliance/index.ts +37 -0
  116. package/src/compliance/range-sas.ts +956 -0
  117. package/src/config/endpoints.ts +100 -0
  118. package/src/crypto.ts +11 -8
  119. package/src/errors.ts +82 -0
  120. package/src/evm/erc4337-relayer.ts +830 -0
  121. package/src/evm/index.ts +47 -0
  122. package/src/fees/calculator.ts +396 -0
  123. package/src/fees/index.ts +87 -0
  124. package/src/fees/near-contract.ts +429 -0
  125. package/src/fees/types.ts +268 -0
  126. package/src/index.ts +785 -1
  127. package/src/intent.ts +6 -3
  128. package/src/logger.ts +324 -0
  129. package/src/network/index.ts +80 -0
  130. package/src/network/proxy.ts +691 -0
  131. package/src/optimizations/index.ts +541 -0
  132. package/src/oracle/types.ts +1 -0
  133. package/src/privacy-backends/arcium-types.ts +727 -0
  134. package/src/privacy-backends/arcium.ts +719 -0
  135. package/src/privacy-backends/combined-privacy.ts +866 -0
  136. package/src/privacy-backends/cspl-token.ts +595 -0
  137. package/src/privacy-backends/cspl-types.ts +512 -0
  138. package/src/privacy-backends/cspl.ts +907 -0
  139. package/src/privacy-backends/health.ts +488 -0
  140. package/src/privacy-backends/inco-types.ts +323 -0
  141. package/src/privacy-backends/inco.ts +616 -0
  142. package/src/privacy-backends/index.ts +336 -0
  143. package/src/privacy-backends/interface.ts +906 -0
  144. package/src/privacy-backends/lru-cache.ts +343 -0
  145. package/src/privacy-backends/magicblock.ts +458 -0
  146. package/src/privacy-backends/mock.ts +258 -0
  147. package/src/privacy-backends/privacycash-types.ts +278 -0
  148. package/src/privacy-backends/privacycash.ts +456 -0
  149. package/src/privacy-backends/private-swap.ts +570 -0
  150. package/src/privacy-backends/rate-limiter.ts +683 -0
  151. package/src/privacy-backends/registry.ts +690 -0
  152. package/src/privacy-backends/router.ts +626 -0
  153. package/src/privacy-backends/shadowwire.ts +449 -0
  154. package/src/privacy-backends/sip-native.ts +256 -0
  155. package/src/privacy-logger.ts +191 -0
  156. package/src/production-safety.ts +373 -0
  157. package/src/proofs/aggregator.ts +1029 -0
  158. package/src/proofs/browser-composer.ts +1150 -0
  159. package/src/proofs/browser.ts +113 -25
  160. package/src/proofs/cache/index.ts +127 -0
  161. package/src/proofs/cache/interface.ts +545 -0
  162. package/src/proofs/cache/key-generator.ts +188 -0
  163. package/src/proofs/cache/lru-cache.ts +481 -0
  164. package/src/proofs/cache/multi-tier-cache.ts +575 -0
  165. package/src/proofs/cache/persistent-cache.ts +788 -0
  166. package/src/proofs/compliance-proof.ts +872 -0
  167. package/src/proofs/composer/base.ts +923 -0
  168. package/src/proofs/composer/index.ts +25 -0
  169. package/src/proofs/composer/interface.ts +518 -0
  170. package/src/proofs/composer/types.ts +383 -0
  171. package/src/proofs/converters/halo2.ts +452 -0
  172. package/src/proofs/converters/index.ts +208 -0
  173. package/src/proofs/converters/interface.ts +363 -0
  174. package/src/proofs/converters/kimchi.ts +462 -0
  175. package/src/proofs/converters/noir.ts +451 -0
  176. package/src/proofs/fallback.ts +888 -0
  177. package/src/proofs/halo2.ts +42 -0
  178. package/src/proofs/index.ts +471 -0
  179. package/src/proofs/interface.ts +13 -0
  180. package/src/proofs/kimchi.ts +42 -0
  181. package/src/proofs/lazy.ts +1004 -0
  182. package/src/proofs/mock.ts +25 -1
  183. package/src/proofs/noir.ts +111 -30
  184. package/src/proofs/orchestrator.ts +960 -0
  185. package/src/proofs/parallel/concurrency.ts +297 -0
  186. package/src/proofs/parallel/dependency-graph.ts +602 -0
  187. package/src/proofs/parallel/executor.ts +420 -0
  188. package/src/proofs/parallel/index.ts +131 -0
  189. package/src/proofs/parallel/interface.ts +685 -0
  190. package/src/proofs/parallel/worker-pool.ts +644 -0
  191. package/src/proofs/providers/halo2.ts +560 -0
  192. package/src/proofs/providers/index.ts +34 -0
  193. package/src/proofs/providers/kimchi.ts +641 -0
  194. package/src/proofs/validator.ts +881 -0
  195. package/src/proofs/verifier.ts +867 -0
  196. package/src/quantum/index.ts +112 -0
  197. package/src/quantum/winternitz-vault.ts +639 -0
  198. package/src/quantum/wots.ts +611 -0
  199. package/src/settlement/backends/direct-chain.ts +1 -0
  200. package/src/settlement/index.ts +9 -0
  201. package/src/settlement/router.ts +732 -46
  202. package/src/solana/index.ts +72 -0
  203. package/src/solana/jito-relayer.ts +687 -0
  204. package/src/solana/noir-verifier-types.ts +430 -0
  205. package/src/solana/noir-verifier.ts +816 -0
  206. package/src/stealth/address-derivation.ts +193 -0
  207. package/src/stealth/ed25519.ts +431 -0
  208. package/src/stealth/index.ts +233 -0
  209. package/src/stealth/meta-address.ts +221 -0
  210. package/src/stealth/secp256k1.ts +368 -0
  211. package/src/stealth/utils.ts +194 -0
  212. package/src/stealth.ts +50 -1504
  213. package/src/surveillance/algorithms/address-reuse.ts +143 -0
  214. package/src/surveillance/algorithms/cluster.ts +247 -0
  215. package/src/surveillance/algorithms/exchange.ts +295 -0
  216. package/src/surveillance/algorithms/temporal.ts +337 -0
  217. package/src/surveillance/analyzer.ts +442 -0
  218. package/src/surveillance/index.ts +64 -0
  219. package/src/surveillance/scoring.ts +372 -0
  220. package/src/surveillance/types.ts +264 -0
  221. package/src/sync/index.ts +106 -0
  222. package/src/sync/manager.ts +504 -0
  223. package/src/sync/mock-provider.ts +318 -0
  224. package/src/sync/oblivious.ts +625 -0
  225. package/src/tokens/index.ts +15 -0
  226. package/src/tokens/registry.ts +301 -0
  227. package/src/utils/deprecation.ts +94 -0
  228. package/src/utils/index.ts +9 -0
  229. package/src/wallet/ethereum/index.ts +68 -0
  230. package/src/wallet/ethereum/metamask-privacy.ts +420 -0
  231. package/src/wallet/ethereum/multi-wallet.ts +646 -0
  232. package/src/wallet/ethereum/privacy-adapter.ts +700 -0
  233. package/src/wallet/ethereum/types.ts +3 -1
  234. package/src/wallet/ethereum/walletconnect-adapter.ts +675 -0
  235. package/src/wallet/hardware/index.ts +10 -0
  236. package/src/wallet/hardware/ledger-privacy.ts +414 -0
  237. package/src/wallet/index.ts +71 -0
  238. package/src/wallet/near/adapter.ts +626 -0
  239. package/src/wallet/near/index.ts +86 -0
  240. package/src/wallet/near/meteor-wallet.ts +1153 -0
  241. package/src/wallet/near/my-near-wallet.ts +790 -0
  242. package/src/wallet/near/wallet-selector.ts +702 -0
  243. package/src/wallet/solana/adapter.ts +6 -4
  244. package/src/wallet/solana/index.ts +13 -0
  245. package/src/wallet/solana/privacy-adapter.ts +567 -0
  246. package/src/wallet/sui/types.ts +6 -4
  247. package/src/zcash/rpc-client.ts +13 -6
  248. package/dist/chunk-3INS3PR5.mjs +0 -884
  249. package/dist/chunk-3OVABDRH.mjs +0 -17096
  250. package/dist/chunk-DLDWZFYC.mjs +0 -1495
  251. package/dist/chunk-E6SZWREQ.mjs +0 -57
  252. package/dist/chunk-G33LB27A.mjs +0 -16166
  253. package/dist/chunk-HGU6HZRC.mjs +0 -231
  254. package/dist/chunk-L2K34JCU.mjs +0 -1496
  255. package/dist/chunk-SN4ZDTVW.mjs +0 -16166
  256. package/dist/constants-VOI7BSLK.mjs +0 -27
  257. package/dist/index-BYZbDjal.d.ts +0 -11390
  258. package/dist/index-CHB3KuOB.d.mts +0 -11859
  259. package/dist/index-CzWPI6Le.d.ts +0 -11859
  260. package/dist/index-xbWjohNq.d.mts +0 -11390
  261. package/dist/solana-5EMCTPTS.mjs +0 -46
  262. package/dist/solana-Q4NAVBTS.mjs +0 -46
@@ -0,0 +1,223 @@
1
+ // src/proofs/circuits/funding_proof.json
2
+ var noir_version = "1.0.0-beta.15+83245db91dcf63420ef4bcbbd85b98f397fee663";
3
+ var hash = "3675851086238636874";
4
+ var abi = { parameters: [{ name: "minimum_required", type: { kind: "field" }, visibility: "public" }, { name: "asset_id", type: { kind: "field" }, visibility: "public" }, { name: "balance", type: { kind: "field" }, visibility: "private" }, { name: "blinding", type: { kind: "field" }, visibility: "private" }], return_type: { abi_type: { kind: "array", length: 32, type: { kind: "integer", sign: "unsigned", width: 8 } }, visibility: "public" }, error_types: { "2900908756532713827": { error_kind: "string", string: "Insufficient balance" }, "12469291177396340830": { error_kind: "string", string: "call to assert_max_bit_size" }, "15764276373176857197": { error_kind: "string", string: "Stack too deep" }, "15835548349546956319": { error_kind: "string", string: "Field failed to decompose into specified 32 limbs" } } };
5
+ var bytecode = "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";
6
+ var debug_symbols = "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";
7
+ var file_map = { "17": { source: `use crate::field::field_less_than;
8
+ use crate::runtime::is_unconstrained;
9
+
10
+ // The low and high decomposition of the field modulus
11
+ global PLO: Field = 53438638232309528389504892708671455233;
12
+ global PHI: Field = 64323764613183177041862057485226039389;
13
+
14
+ pub(crate) global TWO_POW_128: Field = 0x100000000000000000000000000000000;
15
+
16
+ // Decomposes a single field into two 16 byte fields.
17
+ fn compute_decomposition(x: Field) -> (Field, Field) {
18
+ // Here's we're taking advantage of truncating 128 bit limbs from the input field
19
+ // and then subtracting them from the input such the field division is equivalent to integer division.
20
+ let low = (x as u128) as Field;
21
+ let high = (x - low) / TWO_POW_128;
22
+
23
+ (low, high)
24
+ }
25
+
26
+ pub(crate) unconstrained fn decompose_hint(x: Field) -> (Field, Field) {
27
+ compute_decomposition(x)
28
+ }
29
+
30
+ unconstrained fn lte_hint(x: Field, y: Field) -> bool {
31
+ if x == y {
32
+ true
33
+ } else {
34
+ field_less_than(x, y)
35
+ }
36
+ }
37
+
38
+ // Assert that (alo > blo && ahi >= bhi) || (alo <= blo && ahi > bhi)
39
+ fn assert_gt_limbs(a: (Field, Field), b: (Field, Field)) {
40
+ let (alo, ahi) = a;
41
+ let (blo, bhi) = b;
42
+ // Safety: borrow is enforced to be boolean due to its type.
43
+ // if borrow is 0, it asserts that (alo > blo && ahi >= bhi)
44
+ // if borrow is 1, it asserts that (alo <= blo && ahi > bhi)
45
+ unsafe {
46
+ let borrow = lte_hint(alo, blo);
47
+
48
+ let rlo = alo - blo - 1 + (borrow as Field) * TWO_POW_128;
49
+ let rhi = ahi - bhi - (borrow as Field);
50
+
51
+ rlo.assert_max_bit_size::<128>();
52
+ rhi.assert_max_bit_size::<128>();
53
+ }
54
+ }
55
+
56
+ /// Decompose a single field into two 16 byte fields.
57
+ pub fn decompose(x: Field) -> (Field, Field) {
58
+ if is_unconstrained() {
59
+ compute_decomposition(x)
60
+ } else {
61
+ // Safety: decomposition is properly checked below
62
+ unsafe {
63
+ // Take hints of the decomposition
64
+ let (xlo, xhi) = decompose_hint(x);
65
+
66
+ // Range check the limbs
67
+ xlo.assert_max_bit_size::<128>();
68
+ xhi.assert_max_bit_size::<128>();
69
+
70
+ // Check that the decomposition is correct
71
+ assert_eq(x, xlo + TWO_POW_128 * xhi);
72
+
73
+ // Assert that the decomposition of P is greater than the decomposition of x
74
+ assert_gt_limbs((PLO, PHI), (xlo, xhi));
75
+ (xlo, xhi)
76
+ }
77
+ }
78
+ }
79
+
80
+ pub fn assert_gt(a: Field, b: Field) {
81
+ if is_unconstrained() {
82
+ assert(
83
+ // Safety: already unconstrained
84
+ unsafe { field_less_than(b, a) },
85
+ );
86
+ } else {
87
+ // Decompose a and b
88
+ let a_limbs = decompose(a);
89
+ let b_limbs = decompose(b);
90
+
91
+ // Assert that a_limbs is greater than b_limbs
92
+ assert_gt_limbs(a_limbs, b_limbs)
93
+ }
94
+ }
95
+
96
+ pub fn assert_lt(a: Field, b: Field) {
97
+ assert_gt(b, a);
98
+ }
99
+
100
+ pub fn gt(a: Field, b: Field) -> bool {
101
+ if is_unconstrained() {
102
+ // Safety: unsafe in unconstrained
103
+ unsafe {
104
+ field_less_than(b, a)
105
+ }
106
+ } else if a == b {
107
+ false
108
+ } else {
109
+ // Safety: Take a hint of the comparison and verify it
110
+ unsafe {
111
+ if field_less_than(a, b) {
112
+ assert_gt(b, a);
113
+ false
114
+ } else {
115
+ assert_gt(a, b);
116
+ true
117
+ }
118
+ }
119
+ }
120
+ }
121
+
122
+ pub fn lt(a: Field, b: Field) -> bool {
123
+ gt(b, a)
124
+ }
125
+
126
+ mod tests {
127
+ // TODO: Allow imports from "super"
128
+ use crate::field::bn254::{assert_gt, decompose, gt, lt, lte_hint, PHI, PLO, TWO_POW_128};
129
+
130
+ #[test]
131
+ fn check_decompose() {
132
+ assert_eq(decompose(TWO_POW_128), (0, 1));
133
+ assert_eq(decompose(TWO_POW_128 + 0x1234567890), (0x1234567890, 1));
134
+ assert_eq(decompose(0x1234567890), (0x1234567890, 0));
135
+ }
136
+
137
+ #[test]
138
+ unconstrained fn check_lte_hint() {
139
+ assert(lte_hint(0, 1));
140
+ assert(lte_hint(0, 0x100));
141
+ assert(lte_hint(0x100, TWO_POW_128 - 1));
142
+ assert(!lte_hint(0 - 1, 0));
143
+
144
+ assert(lte_hint(0, 0));
145
+ assert(lte_hint(0x100, 0x100));
146
+ assert(lte_hint(0 - 1, 0 - 1));
147
+ }
148
+
149
+ #[test]
150
+ fn check_gt() {
151
+ assert(gt(1, 0));
152
+ assert(gt(0x100, 0));
153
+ assert(gt((0 - 1), (0 - 2)));
154
+ assert(gt(TWO_POW_128, 0));
155
+ assert(!gt(0, 0));
156
+ assert(!gt(0, 0x100));
157
+ assert(gt(0 - 1, 0 - 2));
158
+ assert(!gt(0 - 2, 0 - 1));
159
+ assert_gt(0 - 1, 0);
160
+ }
161
+
162
+ #[test]
163
+ fn check_plo_phi() {
164
+ assert_eq(PLO + PHI * TWO_POW_128, 0);
165
+ let p_bytes = crate::field::modulus_le_bytes();
166
+ let mut p_low: Field = 0;
167
+ let mut p_high: Field = 0;
168
+
169
+ let mut offset = 1;
170
+ for i in 0..16 {
171
+ p_low += (p_bytes[i] as Field) * offset;
172
+ p_high += (p_bytes[i + 16] as Field) * offset;
173
+ offset *= 256;
174
+ }
175
+ assert_eq(p_low, PLO);
176
+ assert_eq(p_high, PHI);
177
+ }
178
+
179
+ #[test]
180
+ fn check_decompose_edge_cases() {
181
+ assert_eq(decompose(0), (0, 0));
182
+ assert_eq(decompose(TWO_POW_128 - 1), (TWO_POW_128 - 1, 0));
183
+ assert_eq(decompose(TWO_POW_128 + 1), (1, 1));
184
+ assert_eq(decompose(TWO_POW_128 * 2), (0, 2));
185
+ assert_eq(decompose(TWO_POW_128 * 2 + 0x1234567890), (0x1234567890, 2));
186
+ }
187
+
188
+ #[test]
189
+ fn check_decompose_large_values() {
190
+ let large_field = 0xffffffffffffffff;
191
+ let (lo, hi) = decompose(large_field);
192
+ assert_eq(large_field, lo + TWO_POW_128 * hi);
193
+
194
+ let large_value = large_field - TWO_POW_128;
195
+ let (lo2, hi2) = decompose(large_value);
196
+ assert_eq(large_value, lo2 + TWO_POW_128 * hi2);
197
+ }
198
+
199
+ #[test]
200
+ fn check_lt_comprehensive() {
201
+ assert(lt(0, 1));
202
+ assert(!lt(1, 0));
203
+ assert(!lt(0, 0));
204
+ assert(!lt(42, 42));
205
+
206
+ assert(lt(TWO_POW_128 - 1, TWO_POW_128));
207
+ assert(!lt(TWO_POW_128, TWO_POW_128 - 1));
208
+ }
209
+ }
210
+ `, path: "std/field/bn254.nr" }, "18": { source: 'pub mod bn254;\nuse crate::{runtime::is_unconstrained, static_assert};\nuse bn254::lt as bn254_lt;\n\nimpl Field {\n /// Asserts that `self` can be represented in `bit_size` bits.\n ///\n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^{bit_size}`.\n // docs:start:assert_max_bit_size\n pub fn assert_max_bit_size<let BIT_SIZE: u32>(self) {\n // docs:end:assert_max_bit_size\n static_assert(\n BIT_SIZE < modulus_num_bits() as u32,\n "BIT_SIZE must be less than modulus_num_bits",\n );\n __assert_max_bit_size(self, BIT_SIZE);\n }\n\n /// Decomposes `self` into its little endian bit decomposition as a `[u1; N]` array.\n /// This slice will be zero padded should not all bits be necessary to represent `self`.\n ///\n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^N` as the resulting slice will not\n /// be able to represent the original `Field`.\n ///\n /// # Safety\n /// The bit decomposition returned is canonical and is guaranteed to not overflow the modulus.\n // docs:start:to_le_bits\n pub fn to_le_bits<let N: u32>(self: Self) -> [u1; N] {\n // docs:end:to_le_bits\n let bits = __to_le_bits(self);\n\n if !is_unconstrained() {\n // Ensure that the byte decomposition does not overflow the modulus\n let p = modulus_le_bits();\n assert(bits.len() <= p.len());\n let mut ok = bits.len() != p.len();\n for i in 0..N {\n if !ok {\n if (bits[N - 1 - i] != p[N - 1 - i]) {\n assert(p[N - 1 - i] == 1);\n ok = true;\n }\n }\n }\n assert(ok);\n }\n bits\n }\n\n /// Decomposes `self` into its big endian bit decomposition as a `[u1; N]` array.\n /// This array will be zero padded should not all bits be necessary to represent `self`.\n ///\n /// # Failures\n /// Causes a constraint failure for `Field` values exceeding `2^N` as the resulting slice will not\n /// be able to represent the original `Field`.\n ///\n /// # Safety\n /// The bit decomposition returned is canonical and is guaranteed to not overflow the modulus.\n // docs:start:to_be_bits\n pub fn to_be_bits<let N: u32>(self: Self) -> [u1; N] {\n // docs:end:to_be_bits\n let bits = __to_be_bits(self);\n\n if !is_unconstrained() {\n // Ensure that the decomposition does not overflow the modulus\n let p = modulus_be_bits();\n assert(bits.len() <= p.len());\n let mut ok = bits.len() != p.len();\n for i in 0..N {\n if !ok {\n if (bits[i] != p[i]) {\n assert(p[i] == 1);\n ok = true;\n }\n }\n }\n assert(ok);\n }\n bits\n }\n\n /// Decomposes `self` into its little endian byte decomposition as a `[u8;N]` array\n /// This array will be zero padded should not all bytes be necessary to represent `self`.\n ///\n /// # Failures\n /// The length N of the array must be big enough to contain all the bytes of the \'self\',\n /// and no more than the number of bytes required to represent the field modulus\n ///\n /// # Safety\n /// The result is ensured to be the canonical decomposition of the field element\n // docs:start:to_le_bytes\n pub fn to_le_bytes<let N: u32>(self: Self) -> [u8; N] {\n // docs:end:to_le_bytes\n static_assert(\n N <= modulus_le_bytes().len(),\n "N must be less than or equal to modulus_le_bytes().len()",\n );\n // Compute the byte decomposition\n let bytes = self.to_le_radix(256);\n\n if !is_unconstrained() {\n // Ensure that the byte decomposition does not overflow the modulus\n let p = modulus_le_bytes();\n assert(bytes.len() <= p.len());\n let mut ok = bytes.len() != p.len();\n for i in 0..N {\n if !ok {\n if (bytes[N - 1 - i] != p[N - 1 - i]) {\n assert(bytes[N - 1 - i] < p[N - 1 - i]);\n ok = true;\n }\n }\n }\n assert(ok);\n }\n bytes\n }\n\n /// Decomposes `self` into its big endian byte decomposition as a `[u8;N]` array of length required to represent the field modulus\n /// This array will be zero padded should not all bytes be necessary to represent `self`.\n ///\n /// # Failures\n /// The length N of the array must be big enough to contain all the bytes of the \'self\',\n /// and no more than the number of bytes required to represent the field modulus\n ///\n /// # Safety\n /// The result is ensured to be the canonical decomposition of the field element\n // docs:start:to_be_bytes\n pub fn to_be_bytes<let N: u32>(self: Self) -> [u8; N] {\n // docs:end:to_be_bytes\n static_assert(\n N <= modulus_le_bytes().len(),\n "N must be less than or equal to modulus_le_bytes().len()",\n );\n // Compute the byte decomposition\n let bytes = self.to_be_radix(256);\n\n if !is_unconstrained() {\n // Ensure that the byte decomposition does not overflow the modulus\n let p = modulus_be_bytes();\n assert(bytes.len() <= p.len());\n let mut ok = bytes.len() != p.len();\n for i in 0..N {\n if !ok {\n if (bytes[i] != p[i]) {\n assert(bytes[i] < p[i]);\n ok = true;\n }\n }\n }\n assert(ok);\n }\n bytes\n }\n\n fn to_le_radix<let N: u32>(self: Self, radix: u32) -> [u8; N] {\n // Brillig does not need an immediate radix\n if !crate::runtime::is_unconstrained() {\n static_assert(1 < radix, "radix must be greater than 1");\n static_assert(radix <= 256, "radix must be less than or equal to 256");\n static_assert(radix & (radix - 1) == 0, "radix must be a power of 2");\n }\n __to_le_radix(self, radix)\n }\n\n fn to_be_radix<let N: u32>(self: Self, radix: u32) -> [u8; N] {\n // Brillig does not need an immediate radix\n if !crate::runtime::is_unconstrained() {\n static_assert(1 < radix, "radix must be greater than 1");\n static_assert(radix <= 256, "radix must be less than or equal to 256");\n static_assert(radix & (radix - 1) == 0, "radix must be a power of 2");\n }\n __to_be_radix(self, radix)\n }\n\n // Returns self to the power of the given exponent value.\n // Caution: we assume the exponent fits into 32 bits\n // using a bigger bit size impacts negatively the performance and should be done only if the exponent does not fit in 32 bits\n pub fn pow_32(self, exponent: Field) -> Field {\n let mut r: Field = 1;\n let b: [u1; 32] = exponent.to_le_bits();\n\n for i in 1..33 {\n r *= r;\n r = (b[32 - i] as Field) * (r * self) + (1 - b[32 - i] as Field) * r;\n }\n r\n }\n\n // Parity of (prime) Field element, i.e. sgn0(x mod p) = 0 if x `elem` {0, ..., p-1} is even, otherwise sgn0(x mod p) = 1.\n pub fn sgn0(self) -> u1 {\n self as u1\n }\n\n pub fn lt(self, another: Field) -> bool {\n if crate::compat::is_bn254() {\n bn254_lt(self, another)\n } else {\n lt_fallback(self, another)\n }\n }\n\n /// Convert a little endian byte array to a field element.\n /// If the provided byte array overflows the field modulus then the Field will silently wrap around.\n pub fn from_le_bytes<let N: u32>(bytes: [u8; N]) -> Field {\n static_assert(\n N <= modulus_le_bytes().len(),\n "N must be less than or equal to modulus_le_bytes().len()",\n );\n let mut v = 1;\n let mut result = 0;\n\n for i in 0..N {\n result += (bytes[i] as Field) * v;\n v = v * 256;\n }\n result\n }\n\n /// Convert a big endian byte array to a field element.\n /// If the provided byte array overflows the field modulus then the Field will silently wrap around.\n pub fn from_be_bytes<let N: u32>(bytes: [u8; N]) -> Field {\n let mut v = 1;\n let mut result = 0;\n\n for i in 0..N {\n result += (bytes[N - 1 - i] as Field) * v;\n v = v * 256;\n }\n result\n }\n}\n\n#[builtin(apply_range_constraint)]\nfn __assert_max_bit_size(value: Field, bit_size: u32) {}\n\n// `_radix` must be less than 256\n#[builtin(to_le_radix)]\nfn __to_le_radix<let N: u32>(value: Field, radix: u32) -> [u8; N] {}\n\n// `_radix` must be less than 256\n#[builtin(to_be_radix)]\nfn __to_be_radix<let N: u32>(value: Field, radix: u32) -> [u8; N] {}\n\n/// Decomposes `self` into its little endian bit decomposition as a `[u1; N]` array.\n/// This slice will be zero padded should not all bits be necessary to represent `self`.\n///\n/// # Failures\n/// Causes a constraint failure for `Field` values exceeding `2^N` as the resulting slice will not\n/// be able to represent the original `Field`.\n///\n/// # Safety\n/// Values of `N` equal to or greater than the number of bits necessary to represent the `Field` modulus\n/// (e.g. 254 for the BN254 field) allow for multiple bit decompositions. This is due to how the `Field` will\n/// wrap around due to overflow when verifying the decomposition.\n#[builtin(to_le_bits)]\nfn __to_le_bits<let N: u32>(value: Field) -> [u1; N] {}\n\n/// Decomposes `self` into its big endian bit decomposition as a `[u1; N]` array.\n/// This array will be zero padded should not all bits be necessary to represent `self`.\n///\n/// # Failures\n/// Causes a constraint failure for `Field` values exceeding `2^N` as the resulting slice will not\n/// be able to represent the original `Field`.\n///\n/// # Safety\n/// Values of `N` equal to or greater than the number of bits necessary to represent the `Field` modulus\n/// (e.g. 254 for the BN254 field) allow for multiple bit decompositions. This is due to how the `Field` will\n/// wrap around due to overflow when verifying the decomposition.\n#[builtin(to_be_bits)]\nfn __to_be_bits<let N: u32>(value: Field) -> [u1; N] {}\n\n#[builtin(modulus_num_bits)]\npub comptime fn modulus_num_bits() -> u64 {}\n\n#[builtin(modulus_be_bits)]\npub comptime fn modulus_be_bits() -> [u1] {}\n\n#[builtin(modulus_le_bits)]\npub comptime fn modulus_le_bits() -> [u1] {}\n\n#[builtin(modulus_be_bytes)]\npub comptime fn modulus_be_bytes() -> [u8] {}\n\n#[builtin(modulus_le_bytes)]\npub comptime fn modulus_le_bytes() -> [u8] {}\n\n/// An unconstrained only built in to efficiently compare fields.\n#[builtin(field_less_than)]\nunconstrained fn __field_less_than(x: Field, y: Field) -> bool {}\n\npub(crate) unconstrained fn field_less_than(x: Field, y: Field) -> bool {\n __field_less_than(x, y)\n}\n\n// Convert a 32 byte array to a field element by modding\npub fn bytes32_to_field(bytes32: [u8; 32]) -> Field {\n // Convert it to a field element\n let mut v = 1;\n let mut high = 0 as Field;\n let mut low = 0 as Field;\n\n for i in 0..16 {\n high = high + (bytes32[15 - i] as Field) * v;\n low = low + (bytes32[16 + 15 - i] as Field) * v;\n v = v * 256;\n }\n // Abuse that a % p + b % p = (a + b) % p and that low < p\n low + high * v\n}\n\nfn lt_fallback(x: Field, y: Field) -> bool {\n if is_unconstrained() {\n // Safety: unconstrained context\n unsafe {\n field_less_than(x, y)\n }\n } else {\n let x_bytes: [u8; 32] = x.to_le_bytes();\n let y_bytes: [u8; 32] = y.to_le_bytes();\n let mut x_is_lt = false;\n let mut done = false;\n for i in 0..32 {\n if (!done) {\n let x_byte = x_bytes[32 - 1 - i] as u8;\n let y_byte = y_bytes[32 - 1 - i] as u8;\n let bytes_match = x_byte == y_byte;\n if !bytes_match {\n x_is_lt = x_byte < y_byte;\n done = true;\n }\n }\n }\n x_is_lt\n }\n}\n\nmod tests {\n use crate::{panic::panic, runtime, static_assert};\n use super::{\n field_less_than, modulus_be_bits, modulus_be_bytes, modulus_le_bits, modulus_le_bytes,\n };\n\n #[test]\n // docs:start:to_be_bits_example\n fn test_to_be_bits() {\n let field = 2;\n let bits: [u1; 8] = field.to_be_bits();\n assert_eq(bits, [0, 0, 0, 0, 0, 0, 1, 0]);\n }\n // docs:end:to_be_bits_example\n\n #[test]\n // docs:start:to_le_bits_example\n fn test_to_le_bits() {\n let field = 2;\n let bits: [u1; 8] = field.to_le_bits();\n assert_eq(bits, [0, 1, 0, 0, 0, 0, 0, 0]);\n }\n // docs:end:to_le_bits_example\n\n #[test]\n // docs:start:to_be_bytes_example\n fn test_to_be_bytes() {\n let field = 2;\n let bytes: [u8; 8] = field.to_be_bytes();\n assert_eq(bytes, [0, 0, 0, 0, 0, 0, 0, 2]);\n assert_eq(Field::from_be_bytes::<8>(bytes), field);\n }\n // docs:end:to_be_bytes_example\n\n #[test]\n // docs:start:to_le_bytes_example\n fn test_to_le_bytes() {\n let field = 2;\n let bytes: [u8; 8] = field.to_le_bytes();\n assert_eq(bytes, [2, 0, 0, 0, 0, 0, 0, 0]);\n assert_eq(Field::from_le_bytes::<8>(bytes), field);\n }\n // docs:end:to_le_bytes_example\n\n #[test]\n // docs:start:to_be_radix_example\n fn test_to_be_radix() {\n // 259, in base 256, big endian, is [1, 3].\n // i.e. 3 * 256^0 + 1 * 256^1\n let field = 259;\n\n // The radix (in this example, 256) must be a power of 2.\n // The length of the returned byte array can be specified to be\n // >= the amount of space needed.\n let bytes: [u8; 8] = field.to_be_radix(256);\n assert_eq(bytes, [0, 0, 0, 0, 0, 0, 1, 3]);\n assert_eq(Field::from_be_bytes::<8>(bytes), field);\n }\n // docs:end:to_be_radix_example\n\n #[test]\n // docs:start:to_le_radix_example\n fn test_to_le_radix() {\n // 259, in base 256, little endian, is [3, 1].\n // i.e. 3 * 256^0 + 1 * 256^1\n let field = 259;\n\n // The radix (in this example, 256) must be a power of 2.\n // The length of the returned byte array can be specified to be\n // >= the amount of space needed.\n let bytes: [u8; 8] = field.to_le_radix(256);\n assert_eq(bytes, [3, 1, 0, 0, 0, 0, 0, 0]);\n assert_eq(Field::from_le_bytes::<8>(bytes), field);\n }\n // docs:end:to_le_radix_example\n\n #[test(should_fail_with = "radix must be greater than 1")]\n fn test_to_le_radix_1() {\n // this test should only fail in constrained mode\n if !runtime::is_unconstrained() {\n let field = 2;\n let _: [u8; 8] = field.to_le_radix(1);\n } else {\n panic(f"radix must be greater than 1");\n }\n }\n\n // Updated test to account for Brillig restriction that radix must be greater than 2\n #[test(should_fail_with = "radix must be greater than 1")]\n fn test_to_le_radix_brillig_1() {\n // this test should only fail in constrained mode\n if !runtime::is_unconstrained() {\n let field = 1;\n let _: [u8; 8] = field.to_le_radix(1);\n } else {\n panic(f"radix must be greater than 1");\n }\n }\n\n #[test(should_fail_with = "radix must be a power of 2")]\n fn test_to_le_radix_3() {\n // this test should only fail in constrained mode\n if !runtime::is_unconstrained() {\n let field = 2;\n let _: [u8; 8] = field.to_le_radix(3);\n } else {\n panic(f"radix must be a power of 2");\n }\n }\n\n #[test]\n fn test_to_le_radix_brillig_3() {\n // this test should only fail in constrained mode\n if runtime::is_unconstrained() {\n let field = 1;\n let out: [u8; 8] = field.to_le_radix(3);\n let mut expected = [0; 8];\n expected[0] = 1;\n assert(out == expected, "unexpected result");\n }\n }\n\n #[test(should_fail_with = "radix must be less than or equal to 256")]\n fn test_to_le_radix_512() {\n // this test should only fail in constrained mode\n if !runtime::is_unconstrained() {\n let field = 2;\n let _: [u8; 8] = field.to_le_radix(512);\n } else {\n panic(f"radix must be less than or equal to 256")\n }\n }\n\n #[test(should_fail_with = "Field failed to decompose into specified 16 limbs")]\n unconstrained fn not_enough_limbs_brillig() {\n let _: [u8; 16] = 0x100000000000000000000000000000000.to_le_bytes();\n }\n\n #[test(should_fail_with = "Field failed to decompose into specified 16 limbs")]\n fn not_enough_limbs() {\n let _: [u8; 16] = 0x100000000000000000000000000000000.to_le_bytes();\n }\n\n #[test]\n unconstrained fn test_field_less_than() {\n assert(field_less_than(0, 1));\n assert(field_less_than(0, 0x100));\n assert(field_less_than(0x100, 0 - 1));\n assert(!field_less_than(0 - 1, 0));\n }\n\n #[test]\n unconstrained fn test_large_field_values_unconstrained() {\n let large_field = 0xffffffffffffffff;\n\n let bits: [u1; 64] = large_field.to_le_bits();\n assert_eq(bits[0], 1);\n\n let bytes: [u8; 8] = large_field.to_le_bytes();\n assert_eq(Field::from_le_bytes::<8>(bytes), large_field);\n\n let radix_bytes: [u8; 8] = large_field.to_le_radix(256);\n assert_eq(Field::from_le_bytes::<8>(radix_bytes), large_field);\n }\n\n #[test]\n fn test_large_field_values() {\n let large_val = 0xffffffffffffffff;\n\n let bits: [u1; 64] = large_val.to_le_bits();\n assert_eq(bits[0], 1);\n\n let bytes: [u8; 8] = large_val.to_le_bytes();\n assert_eq(Field::from_le_bytes::<8>(bytes), large_val);\n\n let radix_bytes: [u8; 8] = large_val.to_le_radix(256);\n assert_eq(Field::from_le_bytes::<8>(radix_bytes), large_val);\n }\n\n #[test]\n fn test_decomposition_edge_cases() {\n let zero_bits: [u1; 8] = 0.to_le_bits();\n assert_eq(zero_bits, [0; 8]);\n\n let zero_bytes: [u8; 8] = 0.to_le_bytes();\n assert_eq(zero_bytes, [0; 8]);\n\n let one_bits: [u1; 8] = 1.to_le_bits();\n let expected: [u1; 8] = [1, 0, 0, 0, 0, 0, 0, 0];\n assert_eq(one_bits, expected);\n\n let pow2_bits: [u1; 8] = 4.to_le_bits();\n let expected: [u1; 8] = [0, 0, 1, 0, 0, 0, 0, 0];\n assert_eq(pow2_bits, expected);\n }\n\n #[test]\n fn test_pow_32() {\n assert_eq(2.pow_32(3), 8);\n assert_eq(3.pow_32(2), 9);\n assert_eq(5.pow_32(0), 1);\n assert_eq(7.pow_32(1), 7);\n\n assert_eq(2.pow_32(10), 1024);\n\n assert_eq(0.pow_32(5), 0);\n assert_eq(0.pow_32(0), 1);\n\n assert_eq(1.pow_32(100), 1);\n }\n\n #[test]\n fn test_sgn0() {\n assert_eq(0.sgn0(), 0);\n assert_eq(2.sgn0(), 0);\n assert_eq(4.sgn0(), 0);\n assert_eq(100.sgn0(), 0);\n\n assert_eq(1.sgn0(), 1);\n assert_eq(3.sgn0(), 1);\n assert_eq(5.sgn0(), 1);\n assert_eq(101.sgn0(), 1);\n }\n\n #[test(should_fail_with = "Field failed to decompose into specified 8 limbs")]\n fn test_bit_decomposition_overflow() {\n // 8 bits can\'t represent large field values\n let large_val = 0x1000000000000000;\n let _: [u1; 8] = large_val.to_le_bits();\n }\n\n #[test(should_fail_with = "Field failed to decompose into specified 4 limbs")]\n fn test_byte_decomposition_overflow() {\n // 4 bytes can\'t represent large field values\n let large_val = 0x1000000000000000;\n let _: [u8; 4] = large_val.to_le_bytes();\n }\n\n #[test]\n fn test_to_from_be_bytes_bn254_edge_cases() {\n if crate::compat::is_bn254() {\n // checking that decrementing this byte produces the expected 32 BE bytes for (modulus - 1)\n let mut p_minus_1_bytes: [u8; 32] = modulus_be_bytes().as_array();\n assert(p_minus_1_bytes[32 - 1] > 0);\n p_minus_1_bytes[32 - 1] -= 1;\n\n let p_minus_1 = Field::from_be_bytes::<32>(p_minus_1_bytes);\n assert_eq(p_minus_1 + 1, 0);\n\n // checking that converting (modulus - 1) from and then to 32 BE bytes produces the same bytes\n let p_minus_1_converted_bytes: [u8; 32] = p_minus_1.to_be_bytes();\n assert_eq(p_minus_1_converted_bytes, p_minus_1_bytes);\n\n // checking that incrementing this byte produces 32 BE bytes for (modulus + 1)\n let mut p_plus_1_bytes: [u8; 32] = modulus_be_bytes().as_array();\n assert(p_plus_1_bytes[32 - 1] < 255);\n p_plus_1_bytes[32 - 1] += 1;\n\n let p_plus_1 = Field::from_be_bytes::<32>(p_plus_1_bytes);\n assert_eq(p_plus_1, 1);\n\n // checking that converting p_plus_1 to 32 BE bytes produces the same\n // byte set to 1 as p_plus_1_bytes and otherwise zeroes\n let mut p_plus_1_converted_bytes: [u8; 32] = p_plus_1.to_be_bytes();\n assert_eq(p_plus_1_converted_bytes[32 - 1], 1);\n p_plus_1_converted_bytes[32 - 1] = 0;\n assert_eq(p_plus_1_converted_bytes, [0; 32]);\n\n // checking that Field::from_be_bytes::<32> on the Field modulus produces 0\n assert_eq(modulus_be_bytes().len(), 32);\n let p = Field::from_be_bytes::<32>(modulus_be_bytes().as_array());\n assert_eq(p, 0);\n\n // checking that converting 0 to 32 BE bytes produces 32 zeroes\n let p_bytes: [u8; 32] = 0.to_be_bytes();\n assert_eq(p_bytes, [0; 32]);\n }\n }\n\n #[test]\n fn test_to_from_le_bytes_bn254_edge_cases() {\n if crate::compat::is_bn254() {\n // checking that decrementing this byte produces the expected 32 LE bytes for (modulus - 1)\n let mut p_minus_1_bytes: [u8; 32] = modulus_le_bytes().as_array();\n assert(p_minus_1_bytes[0] > 0);\n p_minus_1_bytes[0] -= 1;\n\n let p_minus_1 = Field::from_le_bytes::<32>(p_minus_1_bytes);\n assert_eq(p_minus_1 + 1, 0);\n\n // checking that converting (modulus - 1) from and then to 32 BE bytes produces the same bytes\n let p_minus_1_converted_bytes: [u8; 32] = p_minus_1.to_le_bytes();\n assert_eq(p_minus_1_converted_bytes, p_minus_1_bytes);\n\n // checking that incrementing this byte produces 32 LE bytes for (modulus + 1)\n let mut p_plus_1_bytes: [u8; 32] = modulus_le_bytes().as_array();\n assert(p_plus_1_bytes[0] < 255);\n p_plus_1_bytes[0] += 1;\n\n let p_plus_1 = Field::from_le_bytes::<32>(p_plus_1_bytes);\n assert_eq(p_plus_1, 1);\n\n // checking that converting p_plus_1 to 32 LE bytes produces the same\n // byte set to 1 as p_plus_1_bytes and otherwise zeroes\n let mut p_plus_1_converted_bytes: [u8; 32] = p_plus_1.to_le_bytes();\n assert_eq(p_plus_1_converted_bytes[0], 1);\n p_plus_1_converted_bytes[0] = 0;\n assert_eq(p_plus_1_converted_bytes, [0; 32]);\n\n // checking that Field::from_le_bytes::<32> on the Field modulus produces 0\n assert_eq(modulus_le_bytes().len(), 32);\n let p = Field::from_le_bytes::<32>(modulus_le_bytes().as_array());\n assert_eq(p, 0);\n\n // checking that converting 0 to 32 LE bytes produces 32 zeroes\n let p_bytes: [u8; 32] = 0.to_le_bytes();\n assert_eq(p_bytes, [0; 32]);\n }\n }\n\n /// Convert a little endian bit array to a field element.\n /// If the provided bit array overflows the field modulus then the Field will silently wrap around.\n fn from_le_bits<let N: u32>(bits: [u1; N]) -> Field {\n static_assert(\n N <= modulus_le_bits().len(),\n "N must be less than or equal to modulus_le_bits().len()",\n );\n let mut v = 1;\n let mut result = 0;\n\n for i in 0..N {\n result += (bits[i] as Field) * v;\n v = v * 2;\n }\n result\n }\n\n /// Convert a big endian bit array to a field element.\n /// If the provided bit array overflows the field modulus then the Field will silently wrap around.\n fn from_be_bits<let N: u32>(bits: [u1; N]) -> Field {\n let mut v = 1;\n let mut result = 0;\n\n for i in 0..N {\n result += (bits[N - 1 - i] as Field) * v;\n v = v * 2;\n }\n result\n }\n\n #[test]\n fn test_to_from_be_bits_bn254_edge_cases() {\n if crate::compat::is_bn254() {\n // checking that decrementing this bit produces the expected 254 BE bits for (modulus - 1)\n let mut p_minus_1_bits: [u1; 254] = modulus_be_bits().as_array();\n assert(p_minus_1_bits[254 - 1] > 0);\n p_minus_1_bits[254 - 1] -= 1;\n\n let p_minus_1 = from_be_bits::<254>(p_minus_1_bits);\n assert_eq(p_minus_1 + 1, 0);\n\n // checking that converting (modulus - 1) from and then to 254 BE bits produces the same bits\n let p_minus_1_converted_bits: [u1; 254] = p_minus_1.to_be_bits();\n assert_eq(p_minus_1_converted_bits, p_minus_1_bits);\n\n // checking that incrementing this bit produces 254 BE bits for (modulus + 4)\n let mut p_plus_4_bits: [u1; 254] = modulus_be_bits().as_array();\n assert(p_plus_4_bits[254 - 3] < 1);\n p_plus_4_bits[254 - 3] += 1;\n\n let p_plus_4 = from_be_bits::<254>(p_plus_4_bits);\n assert_eq(p_plus_4, 4);\n\n // checking that converting p_plus_4 to 254 BE bits produces the same\n // bit set to 1 as p_plus_4_bits and otherwise zeroes\n let mut p_plus_4_converted_bits: [u1; 254] = p_plus_4.to_be_bits();\n assert_eq(p_plus_4_converted_bits[254 - 3], 1);\n p_plus_4_converted_bits[254 - 3] = 0;\n assert_eq(p_plus_4_converted_bits, [0; 254]);\n\n // checking that Field::from_be_bits::<254> on the Field modulus produces 0\n assert_eq(modulus_be_bits().len(), 254);\n let p = from_be_bits::<254>(modulus_be_bits().as_array());\n assert_eq(p, 0);\n\n // checking that converting 0 to 254 BE bytes produces 254 zeroes\n let p_bits: [u1; 254] = 0.to_be_bits();\n assert_eq(p_bits, [0; 254]);\n }\n }\n\n #[test]\n fn test_to_from_le_bits_bn254_edge_cases() {\n if crate::compat::is_bn254() {\n // checking that decrementing this bit produces the expected 254 LE bits for (modulus - 1)\n let mut p_minus_1_bits: [u1; 254] = modulus_le_bits().as_array();\n assert(p_minus_1_bits[0] > 0);\n p_minus_1_bits[0] -= 1;\n\n let p_minus_1 = from_le_bits::<254>(p_minus_1_bits);\n assert_eq(p_minus_1 + 1, 0);\n\n // checking that converting (modulus - 1) from and then to 254 BE bits produces the same bits\n let p_minus_1_converted_bits: [u1; 254] = p_minus_1.to_le_bits();\n assert_eq(p_minus_1_converted_bits, p_minus_1_bits);\n\n // checking that incrementing this bit produces 254 LE bits for (modulus + 4)\n let mut p_plus_4_bits: [u1; 254] = modulus_le_bits().as_array();\n assert(p_plus_4_bits[2] < 1);\n p_plus_4_bits[2] += 1;\n\n let p_plus_4 = from_le_bits::<254>(p_plus_4_bits);\n assert_eq(p_plus_4, 4);\n\n // checking that converting p_plus_4 to 254 LE bits produces the same\n // bit set to 1 as p_plus_4_bits and otherwise zeroes\n let mut p_plus_4_converted_bits: [u1; 254] = p_plus_4.to_le_bits();\n assert_eq(p_plus_4_converted_bits[2], 1);\n p_plus_4_converted_bits[2] = 0;\n assert_eq(p_plus_4_converted_bits, [0; 254]);\n\n // checking that Field::from_le_bits::<254> on the Field modulus produces 0\n assert_eq(modulus_le_bits().len(), 254);\n let p = from_le_bits::<254>(modulus_le_bits().as_array());\n assert_eq(p, 0);\n\n // checking that converting 0 to 254 LE bytes produces 254 zeroes\n let p_bits: [u1; 254] = 0.to_le_bits();\n assert_eq(p_bits, [0; 254]);\n }\n }\n}\n', path: "std/field/mod.nr" }, "19": { source: '// Exposed only for usage in `std::meta`\npub(crate) mod poseidon2;\n\nuse crate::default::Default;\nuse crate::embedded_curve_ops::{\n EmbeddedCurvePoint, EmbeddedCurveScalar, multi_scalar_mul, multi_scalar_mul_array_return,\n};\nuse crate::meta::derive_via;\n\n#[foreign(sha256_compression)]\n// docs:start:sha256_compression\npub fn sha256_compression(input: [u32; 16], state: [u32; 8]) -> [u32; 8] {}\n// docs:end:sha256_compression\n\n#[foreign(keccakf1600)]\n// docs:start:keccakf1600\npub fn keccakf1600(input: [u64; 25]) -> [u64; 25] {}\n// docs:end:keccakf1600\n\npub mod keccak {\n #[deprecated("This function has been moved to std::hash::keccakf1600")]\n pub fn keccakf1600(input: [u64; 25]) -> [u64; 25] {\n super::keccakf1600(input)\n }\n}\n\n#[foreign(blake2s)]\n// docs:start:blake2s\npub fn blake2s<let N: u32>(input: [u8; N]) -> [u8; 32]\n// docs:end:blake2s\n{}\n\n// docs:start:blake3\npub fn blake3<let N: u32>(input: [u8; N]) -> [u8; 32]\n// docs:end:blake3\n{\n if crate::runtime::is_unconstrained() {\n // Temporary measure while Barretenberg is main proving system.\n // Please open an issue if you\'re working on another proving system and running into problems due to this.\n crate::static_assert(\n N <= 1024,\n "Barretenberg cannot prove blake3 hashes with inputs larger than 1024 bytes",\n );\n }\n __blake3(input)\n}\n\n#[foreign(blake3)]\nfn __blake3<let N: u32>(input: [u8; N]) -> [u8; 32] {}\n\n// docs:start:pedersen_commitment\npub fn pedersen_commitment<let N: u32>(input: [Field; N]) -> EmbeddedCurvePoint {\n // docs:end:pedersen_commitment\n pedersen_commitment_with_separator(input, 0)\n}\n\n#[inline_always]\npub fn pedersen_commitment_with_separator<let N: u32>(\n input: [Field; N],\n separator: u32,\n) -> EmbeddedCurvePoint {\n let mut points = [EmbeddedCurveScalar { lo: 0, hi: 0 }; N];\n for i in 0..N {\n // we use the unsafe version because the multi_scalar_mul will constrain the scalars.\n points[i] = from_field_unsafe(input[i]);\n }\n let generators = derive_generators("DEFAULT_DOMAIN_SEPARATOR".as_bytes(), separator);\n multi_scalar_mul(generators, points)\n}\n\n// docs:start:pedersen_hash\npub fn pedersen_hash<let N: u32>(input: [Field; N]) -> Field\n// docs:end:pedersen_hash\n{\n pedersen_hash_with_separator(input, 0)\n}\n\n#[no_predicates]\npub fn pedersen_hash_with_separator<let N: u32>(input: [Field; N], separator: u32) -> Field {\n let mut scalars: [EmbeddedCurveScalar; N + 1] = [EmbeddedCurveScalar { lo: 0, hi: 0 }; N + 1];\n let mut generators: [EmbeddedCurvePoint; N + 1] =\n [EmbeddedCurvePoint::point_at_infinity(); N + 1];\n let domain_generators: [EmbeddedCurvePoint; N] =\n derive_generators("DEFAULT_DOMAIN_SEPARATOR".as_bytes(), separator);\n\n for i in 0..N {\n scalars[i] = from_field_unsafe(input[i]);\n generators[i] = domain_generators[i];\n }\n scalars[N] = EmbeddedCurveScalar { lo: N as Field, hi: 0 as Field };\n\n let length_generator: [EmbeddedCurvePoint; 1] =\n derive_generators("pedersen_hash_length".as_bytes(), 0);\n generators[N] = length_generator[0];\n multi_scalar_mul_array_return(generators, scalars, true)[0].x\n}\n\n#[field(bn254)]\n#[inline_always]\npub fn derive_generators<let N: u32, let M: u32>(\n domain_separator_bytes: [u8; M],\n starting_index: u32,\n) -> [EmbeddedCurvePoint; N] {\n crate::assert_constant(domain_separator_bytes);\n // TODO(https://github.com/noir-lang/noir/issues/5672): Add back assert_constant on starting_index\n __derive_generators(domain_separator_bytes, starting_index)\n}\n\n#[builtin(derive_pedersen_generators)]\n#[field(bn254)]\nfn __derive_generators<let N: u32, let M: u32>(\n domain_separator_bytes: [u8; M],\n starting_index: u32,\n) -> [EmbeddedCurvePoint; N] {}\n\n#[field(bn254)]\n// Same as from_field but:\n// does not assert the limbs are 128 bits\n// does not assert the decomposition does not overflow the EmbeddedCurveScalar\nfn from_field_unsafe(scalar: Field) -> EmbeddedCurveScalar {\n // Safety: xlo and xhi decomposition is checked below\n let (xlo, xhi) = unsafe { crate::field::bn254::decompose_hint(scalar) };\n // Check that the decomposition is correct\n assert_eq(scalar, xlo + crate::field::bn254::TWO_POW_128 * xhi);\n EmbeddedCurveScalar { lo: xlo, hi: xhi }\n}\n\npub fn poseidon2_permutation<let N: u32>(input: [Field; N], state_len: u32) -> [Field; N] {\n assert_eq(input.len(), state_len);\n poseidon2_permutation_internal(input)\n}\n\n#[foreign(poseidon2_permutation)]\nfn poseidon2_permutation_internal<let N: u32>(input: [Field; N]) -> [Field; N] {}\n\n// Generic hashing support.\n// Partially ported and impacted by rust.\n\n// Hash trait shall be implemented per type.\n#[derive_via(derive_hash)]\npub trait Hash {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher;\n}\n\n// docs:start:derive_hash\ncomptime fn derive_hash(s: TypeDefinition) -> Quoted {\n let name = quote { $crate::hash::Hash };\n let signature = quote { fn hash<H>(_self: Self, _state: &mut H) where H: $crate::hash::Hasher };\n let for_each_field = |name| quote { _self.$name.hash(_state); };\n crate::meta::make_trait_impl(\n s,\n name,\n signature,\n for_each_field,\n quote {},\n |fields| fields,\n )\n}\n// docs:end:derive_hash\n\n// Hasher trait shall be implemented by algorithms to provide hash-agnostic means.\n// TODO: consider making the types generic here ([u8], [Field], etc.)\npub trait Hasher {\n fn finish(self) -> Field;\n\n fn write(&mut self, input: Field);\n}\n\n// BuildHasher is a factory trait, responsible for production of specific Hasher.\npub trait BuildHasher {\n type H: Hasher;\n\n fn build_hasher(self) -> H;\n}\n\npub struct BuildHasherDefault<H>;\n\nimpl<H> BuildHasher for BuildHasherDefault<H>\nwhere\n H: Hasher + Default,\n{\n type H = H;\n\n fn build_hasher(_self: Self) -> H {\n H::default()\n }\n}\n\nimpl<H> Default for BuildHasherDefault<H>\nwhere\n H: Hasher + Default,\n{\n fn default() -> Self {\n BuildHasherDefault {}\n }\n}\n\nimpl Hash for Field {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self);\n }\n}\n\nimpl Hash for u1 {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for u8 {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for u16 {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for u32 {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for u64 {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for u128 {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for i8 {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as u8 as Field);\n }\n}\n\nimpl Hash for i16 {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as u16 as Field);\n }\n}\n\nimpl Hash for i32 {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as u32 as Field);\n }\n}\n\nimpl Hash for i64 {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as u64 as Field);\n }\n}\n\nimpl Hash for bool {\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n H::write(state, self as Field);\n }\n}\n\nimpl Hash for () {\n fn hash<H>(_self: Self, _state: &mut H)\n where\n H: Hasher,\n {}\n}\n\nimpl<T, let N: u32> Hash for [T; N]\nwhere\n T: Hash,\n{\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n for elem in self {\n elem.hash(state);\n }\n }\n}\n\nimpl<T> Hash for [T]\nwhere\n T: Hash,\n{\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n self.len().hash(state);\n for elem in self {\n elem.hash(state);\n }\n }\n}\n\nimpl<A, B> Hash for (A, B)\nwhere\n A: Hash,\n B: Hash,\n{\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n self.0.hash(state);\n self.1.hash(state);\n }\n}\n\nimpl<A, B, C> Hash for (A, B, C)\nwhere\n A: Hash,\n B: Hash,\n C: Hash,\n{\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n self.0.hash(state);\n self.1.hash(state);\n self.2.hash(state);\n }\n}\n\nimpl<A, B, C, D> Hash for (A, B, C, D)\nwhere\n A: Hash,\n B: Hash,\n C: Hash,\n D: Hash,\n{\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n self.0.hash(state);\n self.1.hash(state);\n self.2.hash(state);\n self.3.hash(state);\n }\n}\n\nimpl<A, B, C, D, E> Hash for (A, B, C, D, E)\nwhere\n A: Hash,\n B: Hash,\n C: Hash,\n D: Hash,\n E: Hash,\n{\n fn hash<H>(self, state: &mut H)\n where\n H: Hasher,\n {\n self.0.hash(state);\n self.1.hash(state);\n self.2.hash(state);\n self.3.hash(state);\n self.4.hash(state);\n }\n}\n\n// Some test vectors for Pedersen hash and Pedersen Commitment.\n// They have been generated using the same functions so the tests are for now useless\n// but they will be useful when we switch to Noir implementation.\n#[test]\nfn assert_pedersen() {\n assert_eq(\n pedersen_hash_with_separator([1], 1),\n 0x1b3f4b1a83092a13d8d1a59f7acb62aba15e7002f4440f2275edb99ebbc2305f,\n );\n assert_eq(\n pedersen_commitment_with_separator([1], 1),\n EmbeddedCurvePoint {\n x: 0x054aa86a73cb8a34525e5bbed6e43ba1198e860f5f3950268f71df4591bde402,\n y: 0x209dcfbf2cfb57f9f6046f44d71ac6faf87254afc7407c04eb621a6287cac126,\n is_infinite: false,\n },\n );\n\n assert_eq(\n pedersen_hash_with_separator([1, 2], 2),\n 0x26691c129448e9ace0c66d11f0a16d9014a9e8498ee78f4d69f0083168188255,\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2], 2),\n EmbeddedCurvePoint {\n x: 0x2e2b3b191e49541fe468ec6877721d445dcaffe41728df0a0eafeb15e87b0753,\n y: 0x2ff4482400ad3a6228be17a2af33e2bcdf41be04795f9782bd96efe7e24f8778,\n is_infinite: false,\n },\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3], 3),\n 0x0bc694b7a1f8d10d2d8987d07433f26bd616a2d351bc79a3c540d85b6206dbe4,\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3], 3),\n EmbeddedCurvePoint {\n x: 0x1fee4e8cf8d2f527caa2684236b07c4b1bad7342c01b0f75e9a877a71827dc85,\n y: 0x2f9fedb9a090697ab69bf04c8bc15f7385b3e4b68c849c1536e5ae15ff138fd1,\n is_infinite: false,\n },\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4], 4),\n 0xdae10fb32a8408521803905981a2b300d6a35e40e798743e9322b223a5eddc,\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4], 4),\n EmbeddedCurvePoint {\n x: 0x07ae3e202811e1fca39c2d81eabe6f79183978e6f12be0d3b8eda095b79bdbc9,\n y: 0x0afc6f892593db6fbba60f2da558517e279e0ae04f95758587760ba193145014,\n is_infinite: false,\n },\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5], 5),\n 0xfc375b062c4f4f0150f7100dfb8d9b72a6d28582dd9512390b0497cdad9c22,\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5], 5),\n EmbeddedCurvePoint {\n x: 0x1754b12bd475a6984a1094b5109eeca9838f4f81ac89c5f0a41dbce53189bb29,\n y: 0x2da030e3cfcdc7ddad80eaf2599df6692cae0717d4e9f7bfbee8d073d5d278f7,\n is_infinite: false,\n },\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5, 6], 6),\n 0x1696ed13dc2730062a98ac9d8f9de0661bb98829c7582f699d0273b18c86a572,\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6], 6),\n EmbeddedCurvePoint {\n x: 0x190f6c0e97ad83e1e28da22a98aae156da083c5a4100e929b77e750d3106a697,\n y: 0x1f4b60f34ef91221a0b49756fa0705da93311a61af73d37a0c458877706616fb,\n is_infinite: false,\n },\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5, 6, 7], 7),\n 0x128c0ff144fc66b6cb60eeac8a38e23da52992fc427b92397a7dffd71c45ede3,\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6, 7], 7),\n EmbeddedCurvePoint {\n x: 0x015441e9d29491b06563fac16fc76abf7a9534c715421d0de85d20dbe2965939,\n y: 0x1d2575b0276f4e9087e6e07c2cb75aa1baafad127af4be5918ef8a2ef2fea8fc,\n is_infinite: false,\n },\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5, 6, 7, 8], 8),\n 0x2f960e117482044dfc99d12fece2ef6862fba9242be4846c7c9a3e854325a55c,\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6, 7, 8], 8),\n EmbeddedCurvePoint {\n x: 0x1657737676968887fceb6dd516382ea13b3a2c557f509811cd86d5d1199bc443,\n y: 0x1f39f0cb569040105fa1e2f156521e8b8e08261e635a2b210bdc94e8d6d65f77,\n is_infinite: false,\n },\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5, 6, 7, 8, 9], 9),\n 0x0c96db0790602dcb166cc4699e2d306c479a76926b81c2cb2aaa92d249ec7be7,\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6, 7, 8, 9], 9),\n EmbeddedCurvePoint {\n x: 0x0a3ceae42d14914a432aa60ec7fded4af7dad7dd4acdbf2908452675ec67e06d,\n y: 0xfc19761eaaf621ad4aec9a8b2e84a4eceffdba78f60f8b9391b0bd9345a2f2,\n is_infinite: false,\n },\n );\n assert_eq(\n pedersen_hash_with_separator([1, 2, 3, 4, 5, 6, 7, 8, 9, 10], 10),\n 0x2cd37505871bc460a62ea1e63c7fe51149df5d0801302cf1cbc48beb8dff7e94,\n );\n assert_eq(\n pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6, 7, 8, 9, 10], 10),\n EmbeddedCurvePoint {\n x: 0x2fb3f8b3d41ddde007c8c3c62550f9a9380ee546fcc639ffbb3fd30c8d8de30c,\n y: 0x300783be23c446b11a4c0fabf6c91af148937cea15fcf5fb054abf7f752ee245,\n is_infinite: false,\n },\n );\n}\n', path: "std/hash/mod.nr" }, "50": { source: '/// Funding Proof Circuit\n///\n/// Proves that a user has sufficient balance to cover a transaction\n/// without revealing the actual balance.\n///\n/// Public inputs:\n/// - commitment_hash: Hash of the Pedersen commitment to balance\n/// - minimum_required: Minimum balance required\n/// - asset_id: Asset identifier\n///\n/// Private inputs (witness):\n/// - balance: Actual user balance\n/// - blinding: Blinding factor for commitment\n///\n/// Constraints:\n/// 1. balance >= minimum_required\n/// 2. commitment = pedersen([balance, blinding])\n/// 3. commitment_hash = hash(commitment, asset_id)\n\nuse std::hash::pedersen_hash;\nuse std::hash::blake3;\n\n/// Main entry point for the funding proof circuit\n///\n/// Returns the commitment hash as a public output rather than taking it as input.\n/// This allows the SDK to verify the proof without needing to compute Pedersen hashes.\nfn main(\n // Public inputs\n minimum_required: pub Field,\n asset_id: pub Field,\n\n // Private inputs (witness)\n balance: Field,\n blinding: Field,\n) -> pub [u8; 32] {\n // Constraint 1: Balance must be at least the minimum required\n // Using Field comparison - works for values up to ~2^254\n assert(balance.lt(minimum_required) == false, "Insufficient balance");\n\n // Constraint 2: Compute the Pedersen commitment to (balance, blinding)\n let commitment = pedersen_hash([balance, blinding]);\n\n // Constraint 3: Compute and return the commitment hash\n // We hash: commitment || asset_id to bind the commitment to the asset\n let commitment_hash = compute_commitment_hash(commitment, asset_id);\n\n commitment_hash\n}\n\n/// Compute the commitment hash from commitment and asset_id\n/// Uses BLAKE3 for efficiency (built-in to Noir)\nfn compute_commitment_hash(commitment: Field, asset_id: Field) -> [u8; 32] {\n // Convert commitment to bytes (32 bytes, big-endian)\n let commitment_bytes: [u8; 32] = commitment.to_be_bytes();\n\n // Convert asset_id to bytes (32 bytes, big-endian)\n let asset_bytes: [u8; 32] = asset_id.to_be_bytes();\n\n // Create preimage: commitment || asset_id (64 bytes)\n let mut preimage: [u8; 64] = [0; 64];\n for i in 0..32 {\n preimage[i] = commitment_bytes[i];\n preimage[i + 32] = asset_bytes[i];\n }\n\n // Hash with BLAKE3\n blake3(preimage)\n}\n\n// --- Tests ---\n\n#[test]\nfn test_valid_funding_proof() {\n // Test case: balance = 100, minimum = 50\n let balance: Field = 100;\n let minimum_required: Field = 50;\n let blinding: Field = 12345;\n let asset_id: Field = 1;\n\n // Execute the circuit - it should return the commitment hash\n let commitment_hash = main(minimum_required, asset_id, balance, blinding);\n\n // Verify it returned a hash (not all zeros)\n let mut has_nonzero = false;\n for i in 0..32 {\n if commitment_hash[i] != 0 {\n has_nonzero = true;\n }\n }\n assert(has_nonzero, "Commitment hash should not be all zeros");\n}\n\n#[test]\nfn test_exact_balance_passes() {\n // Test case: balance exactly equals minimum\n let balance: Field = 50;\n let minimum_required: Field = 50;\n let blinding: Field = 67890;\n let asset_id: Field = 2;\n\n // Should succeed and return a hash\n let _commitment_hash = main(minimum_required, asset_id, balance, blinding);\n}\n\n#[test(should_fail_with = "Insufficient balance")]\nfn test_insufficient_balance_fails() {\n // Test case: balance < minimum should fail\n let balance: Field = 40;\n let minimum_required: Field = 50;\n let blinding: Field = 11111;\n let asset_id: Field = 1;\n\n // Should fail because balance < minimum_required\n let _commitment_hash = main(minimum_required, asset_id, balance, blinding);\n}\n\n#[test]\nfn test_different_blinding_produces_different_hash() {\n // Test that different blinding factors produce different commitment hashes\n let balance: Field = 100;\n let minimum_required: Field = 50;\n let blinding1: Field = 12345;\n let blinding2: Field = 99999;\n let asset_id: Field = 1;\n\n let hash1 = main(minimum_required, asset_id, balance, blinding1);\n let hash2 = main(minimum_required, asset_id, balance, blinding2);\n\n // Hashes should be different\n let mut hashes_differ = false;\n for i in 0..32 {\n if hash1[i] != hash2[i] {\n hashes_differ = true;\n }\n }\n assert(hashes_differ, "Different blindings should produce different hashes");\n}\n\n#[test]\nfn test_large_values_near_scale() {\n // Test with NEAR-scale values (24 decimals)\n // 1.5 NEAR = 1500000000000000000000000 yoctoNEAR\n // This would overflow u64 but works with Field\n let balance: Field = 1500000000000000000000000;\n let minimum_required: Field = 1000000000000000000000000; // 1 NEAR\n let blinding: Field = 999999999;\n let asset_id: Field = 0x4e454152; // "NEAR" as hex\n\n // Should succeed - balance > minimum\n let commitment_hash = main(minimum_required, asset_id, balance, blinding);\n\n // Verify hash is valid\n let mut has_nonzero = false;\n for i in 0..32 {\n if commitment_hash[i] != 0 {\n has_nonzero = true;\n }\n }\n assert(has_nonzero, "Commitment hash should not be all zeros");\n}\n\n#[test(should_fail_with = "Insufficient balance")]\nfn test_large_values_insufficient() {\n // Test insufficient balance with NEAR-scale values\n let balance: Field = 500000000000000000000000; // 0.5 NEAR\n let minimum_required: Field = 1000000000000000000000000; // 1 NEAR\n let blinding: Field = 12345;\n let asset_id: Field = 0x4e454152;\n\n // Should fail - balance < minimum\n let _hash = main(minimum_required, asset_id, balance, blinding);\n}\n', path: "/Users/rz/local-dev/circuits/funding_proof/src/main.nr" } };
211
+ var expression_width = { Bounded: { width: 4 } };
212
+ var funding_proof_default = { noir_version, hash, abi, bytecode, debug_symbols, file_map, expression_width };
213
+
214
+ export {
215
+ noir_version,
216
+ hash,
217
+ abi,
218
+ bytecode,
219
+ debug_symbols,
220
+ file_map,
221
+ expression_width,
222
+ funding_proof_default
223
+ };
@@ -4,9 +4,19 @@ var __getOwnPropDesc = Object.getOwnPropertyDescriptor;
4
4
  var __getOwnPropNames = Object.getOwnPropertyNames;
5
5
  var __getProtoOf = Object.getPrototypeOf;
6
6
  var __hasOwnProp = Object.prototype.hasOwnProperty;
7
- var __commonJS = (cb, mod) => function __require() {
7
+ var __require = /* @__PURE__ */ ((x) => typeof require !== "undefined" ? require : typeof Proxy !== "undefined" ? new Proxy(x, {
8
+ get: (a, b) => (typeof require !== "undefined" ? require : a)[b]
9
+ }) : x)(function(x) {
10
+ if (typeof require !== "undefined") return require.apply(this, arguments);
11
+ throw Error('Dynamic require of "' + x + '" is not supported');
12
+ });
13
+ var __commonJS = (cb, mod) => function __require2() {
8
14
  return mod || (0, cb[__getOwnPropNames(cb)[0]])((mod = { exports: {} }).exports, mod), mod.exports;
9
15
  };
16
+ var __export = (target, all) => {
17
+ for (var name in all)
18
+ __defProp(target, name, { get: all[name], enumerable: true });
19
+ };
10
20
  var __copyProps = (to, from, except, desc) => {
11
21
  if (from && typeof from === "object" || typeof from === "function") {
12
22
  for (let key of __getOwnPropNames(from))
@@ -25,6 +35,8 @@ var __toESM = (mod, isNodeMode, target) => (target = mod != null ? __create(__ge
25
35
  ));
26
36
 
27
37
  export {
38
+ __require,
28
39
  __commonJS,
40
+ __export,
29
41
  __toESM
30
42
  };