@umbra-privacy/sdk 2.0.0 → 2.0.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (71) hide show
  1. package/dist/{addresses-B7HybtbJ.d.ts → addresses-BIzQplvu.d.ts} +1 -1
  2. package/dist/{addresses-CTVY1oi7.d.cts → addresses-Djkrs22V.d.cts} +1 -1
  3. package/dist/{chunk-MKNCBUFA.js → chunk-D5MWU3TV.js} +17 -17
  4. package/dist/chunk-D5MWU3TV.js.map +1 -0
  5. package/dist/{chunk-CFFLOE7D.cjs → chunk-DQ25W34A.cjs} +17 -17
  6. package/dist/chunk-DQ25W34A.cjs.map +1 -0
  7. package/dist/{chunk-YEZBTYCP.cjs → chunk-GXCRPFTT.cjs} +3 -3
  8. package/dist/{chunk-YEZBTYCP.cjs.map → chunk-GXCRPFTT.cjs.map} +1 -1
  9. package/dist/{chunk-OFDWNWCL.js → chunk-ZPSWMSXL.js} +3 -3
  10. package/dist/{chunk-OFDWNWCL.js.map → chunk-ZPSWMSXL.js.map} +1 -1
  11. package/dist/{client-DkVBHMWb.d.cts → client-BmzzZ8qS.d.cts} +5 -5
  12. package/dist/{client-V4AF6Bz9.d.ts → client-CQytBtEn.d.ts} +5 -5
  13. package/dist/common/pda/index.cjs +35 -35
  14. package/dist/common/pda/index.d.cts +7 -7
  15. package/dist/common/pda/index.d.ts +7 -7
  16. package/dist/common/pda/index.js +2 -2
  17. package/dist/constants/index.d.cts +3 -3
  18. package/dist/constants/index.d.ts +3 -3
  19. package/dist/crypto/index.cjs +2 -2
  20. package/dist/crypto/index.d.cts +13 -13
  21. package/dist/crypto/index.d.ts +13 -13
  22. package/dist/crypto/index.js +2 -2
  23. package/dist/{cryptography-D6tPDh-Y.d.cts → cryptography-BJ5sCytb.d.cts} +1 -1
  24. package/dist/{cryptography-BFSJcvi6.d.ts → cryptography-Dk1cBuym.d.ts} +1 -1
  25. package/dist/{index-BG0yjL7C.d.cts → index-Ckj9PfBk.d.cts} +8 -8
  26. package/dist/{index-ByynoyBO.d.ts → index-DAO_47xr.d.ts} +8 -8
  27. package/dist/index.cjs +252 -243
  28. package/dist/index.cjs.map +1 -1
  29. package/dist/index.d.cts +19 -19
  30. package/dist/index.d.ts +19 -19
  31. package/dist/index.js +22 -13
  32. package/dist/index.js.map +1 -1
  33. package/dist/interfaces/index.d.cts +12 -12
  34. package/dist/interfaces/index.d.ts +12 -12
  35. package/dist/{interfaces-D2NO6kDD.d.cts → interfaces-2b_ySL0r.d.cts} +2 -2
  36. package/dist/{interfaces-z_xYJlgV.d.ts → interfaces-C-N3oLgJ.d.ts} +4 -4
  37. package/dist/{interfaces-43cReBcS.d.cts → interfaces-CpZDActo.d.cts} +4 -4
  38. package/dist/{interfaces-B8xKNl_6.d.ts → interfaces-CxrUtnVG.d.ts} +2 -2
  39. package/dist/math/index.cjs +8 -8
  40. package/dist/math/index.d.cts +4 -4
  41. package/dist/math/index.d.ts +4 -4
  42. package/dist/math/index.js +2 -2
  43. package/dist/{networks-RMd3abPE.d.ts → networks-B3pArLLR.d.ts} +1 -1
  44. package/dist/{networks-yAoO8peQ.d.cts → networks-Bkl2oP0q.d.cts} +1 -1
  45. package/dist/solana/index.d.cts +7 -7
  46. package/dist/solana/index.d.ts +7 -7
  47. package/dist/{temporal-BbRaEPoO.d.ts → temporal-B3yk1YkA.d.ts} +1 -1
  48. package/dist/{temporal-oUj7iCaq.d.cts → temporal-BHMGDS-0.d.cts} +1 -1
  49. package/dist/{transaction-forwarder-5mAMTjw6.d.ts → transaction-forwarder-BODYfi-S.d.ts} +2 -2
  50. package/dist/{transaction-forwarder-C6gMUG7a.d.cts → transaction-forwarder-DwAK9whb.d.cts} +2 -2
  51. package/dist/types/index.d.cts +8 -8
  52. package/dist/types/index.d.ts +8 -8
  53. package/dist/{types-BohhvPth.d.cts → types-2UHG9wC-.d.cts} +1 -1
  54. package/dist/{types-CuKeoI19.d.cts → types-4rAlbodI.d.cts} +2 -2
  55. package/dist/{types-IMGYmlv-.d.cts → types-BYBfXNV_.d.cts} +1 -1
  56. package/dist/{types-Ca7frykr.d.ts → types-BrQv82ne.d.ts} +2 -2
  57. package/dist/{types-CW0oTT0j.d.ts → types-C42QtYXI.d.ts} +1 -1
  58. package/dist/{types-PwNLi_2k.d.cts → types-C8HrYlDv.d.cts} +2 -2
  59. package/dist/{types-C_V_CaKK.d.cts → types-CM3nVKl2.d.cts} +1 -1
  60. package/dist/{types-C_V_CaKK.d.ts → types-CM3nVKl2.d.ts} +1 -1
  61. package/dist/{types-D1jDUjfN.d.ts → types-DfmTaW3z.d.ts} +1 -1
  62. package/dist/{types-DKEDUlH9.d.ts → types-KMWXIyOY.d.ts} +2 -2
  63. package/dist/{types-CxfTIpN9.d.ts → types-gNnLmOsz.d.ts} +2 -2
  64. package/dist/{types-EKuIfxTz.d.cts → types-i26vVlXf.d.cts} +2 -2
  65. package/dist/utils/index.cjs +120 -120
  66. package/dist/utils/index.d.cts +5 -5
  67. package/dist/utils/index.d.ts +5 -5
  68. package/dist/utils/index.js +2 -2
  69. package/package.json +1 -1
  70. package/dist/chunk-CFFLOE7D.cjs.map +0 -1
  71. package/dist/chunk-MKNCBUFA.js.map +0 -1
package/dist/index.cjs CHANGED
@@ -1,19 +1,19 @@
1
1
  'use strict';
2
2
 
3
+ var chunkGXCRPFTT_cjs = require('./chunk-GXCRPFTT.cjs');
3
4
  var chunkNKVMSABR_cjs = require('./chunk-NKVMSABR.cjs');
4
5
  var chunkZQOIYCGA_cjs = require('./chunk-ZQOIYCGA.cjs');
5
- var chunkJPDF7BIT_cjs = require('./chunk-JPDF7BIT.cjs');
6
6
  var chunkBL6WXLPV_cjs = require('./chunk-BL6WXLPV.cjs');
7
- var chunkYEZBTYCP_cjs = require('./chunk-YEZBTYCP.cjs');
8
- var chunkY55PYKXH_cjs = require('./chunk-Y55PYKXH.cjs');
9
7
  var chunkFSK2ICMB_cjs = require('./chunk-FSK2ICMB.cjs');
8
+ var chunkJPDF7BIT_cjs = require('./chunk-JPDF7BIT.cjs');
9
+ var chunkY55PYKXH_cjs = require('./chunk-Y55PYKXH.cjs');
10
+ var chunkAXD7LXYY_cjs = require('./chunk-AXD7LXYY.cjs');
10
11
  var chunkZY3TSHMJ_cjs = require('./chunk-ZY3TSHMJ.cjs');
11
- var chunkCFFLOE7D_cjs = require('./chunk-CFFLOE7D.cjs');
12
- require('./chunk-TQQZGNOI.cjs');
13
12
  require('./chunk-DMPMQ74B.cjs');
13
+ var chunkDQ25W34A_cjs = require('./chunk-DQ25W34A.cjs');
14
14
  var chunk5GUSMQ74_cjs = require('./chunk-5GUSMQ74.cjs');
15
+ require('./chunk-TQQZGNOI.cjs');
15
16
  require('./chunk-QJAUUYZU.cjs');
16
- var chunkAXD7LXYY_cjs = require('./chunk-AXD7LXYY.cjs');
17
17
  var chunkENVYYEM4_cjs = require('./chunk-ENVYYEM4.cjs');
18
18
  var chunkFZYWLQAF_cjs = require('./chunk-FZYWLQAF.cjs');
19
19
  var chunkLTCKPTZC_cjs = require('./chunk-LTCKPTZC.cjs');
@@ -804,11 +804,20 @@ async function getUmbraClient(args, deps) {
804
804
  chunkPK6SKIKE_cjs.__name(getUmbraClient, "getUmbraClient");
805
805
 
806
806
  // src/umbra/constants.ts
807
- var UMBRA_MESSAGE_TO_SIGN = `
808
- Signing this message is a sensitive cryptographic operation that generates the master key used to derive your private spending keys and decrypt your account balances. This signature acts as the root of your privacy and financial security within the Umbra ecosystem.
807
+ var UMBRA_MESSAGE_TO_SIGN = `Umbra Protocol – User Consent & Acknowledgement
808
+
809
+ Please read carefully before continuing. Umbra is a non-custodial, open-source protocol. Umbra does not hold, control, manage, or access your digital assets, private keys, viewing keys, transactions, or personal data. All interactions with the Umbra protocol occur through autonomous smart contracts and wallet-signed transactions executed directly on the blockchain.
809
810
 
810
- You must ensure that you are interacting with the official Umbra Privacy application or a verified integration. Signing this message on an unverified or malicious site could allow an attacker to gain full control over your funds and expose your entire transaction history.
811
- `;
811
+ By using the Umbra protocol, you acknowledge and agree that:
812
+
813
+ 1. You are solely responsible for managing your wallet, private keys, privacy settings, viewing key disclosures, and any transactions or interactions you authorize.
814
+ 2. Blockchain transactions are generally irreversible, and smart contracts may contain bugs, vulnerabilities, or unintended behavior.
815
+ 3. Errors, misuse, misconfiguration, third-party tools, relayers, or loss of keys may result in permanent and unrecoverable loss of assets or privacy.
816
+ 4. Privacy features are designed to enhance confidentiality but do not guarantee absolute or unconditional anonymity.
817
+ 5. Transactions may involve independent relayers or third-party infrastructure that Umbra does not operate, control, or supervise.
818
+ 6. By clicking "I Agree", you confirm that you have read, understood, and accepted all applicable terms, policies, risk disclosures, notices, and other documentation governing your access to and use of the Umbra protocol, as published or made available by Umbra from time to time.
819
+
820
+ You acknowledge that such documentation may be updated or modified, and that continued access to or use of the Umbra Protocol constitutes acceptance of the then-current versions. If you do not agree, do not proceed and discontinue use of the Umbra protocol.`;
812
821
  var FEE_OFFSETS = {
813
822
  /**
814
823
  * Offset used in `FeeVault` PDA derivation for the unified protocol fees pool.
@@ -1962,51 +1971,51 @@ async function processUtxoInBatch(args, deps) {
1962
1971
  const challengeCubedLimbs = chunkZY3TSHMJ_cjs.convertU256ToBase85Limbs(challengeCubed);
1963
1972
  const challengeToFourthLimbs = chunkZY3TSHMJ_cjs.convertU256ToBase85Limbs(challengeToFourth);
1964
1973
  const challengeToFifthLimbs = chunkZY3TSHMJ_cjs.convertU256ToBase85Limbs(challengeToFifth);
1965
- const inverseForFinalAmountLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
1974
+ const inverseForFinalAmountLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
1966
1975
  limbsToTuple(finalAmountAsLimbs)
1967
1976
  );
1968
- const inverseForMvkLowLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(limbsToTuple(mvkLowAsLimbs));
1969
- const inverseForMvkHighLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(limbsToTuple(mvkHighAsLimbs));
1970
- const inverseForRandomFactorLowLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
1977
+ const inverseForMvkLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(limbsToTuple(mvkLowAsLimbs));
1978
+ const inverseForMvkHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(limbsToTuple(mvkHighAsLimbs));
1979
+ const inverseForRandomFactorLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
1971
1980
  limbsToTuple(randomFactorLowAsLimbs)
1972
1981
  );
1973
- const inverseForRandomFactorHighLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
1982
+ const inverseForRandomFactorHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
1974
1983
  limbsToTuple(randomFactorHighAsLimbs)
1975
1984
  );
1976
- const inverseForChallengeLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
1985
+ const inverseForChallengeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
1977
1986
  limbsToTuple(fiatShamirChallengeLimbs)
1978
1987
  );
1979
- const inverseForChallengeSquaredLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
1988
+ const inverseForChallengeSquaredLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
1980
1989
  limbsToTuple(challengeSquaredLimbs)
1981
1990
  );
1982
- const inverseForChallengeCubedLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
1991
+ const inverseForChallengeCubedLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
1983
1992
  limbsToTuple(challengeCubedLimbs)
1984
1993
  );
1985
- const inverseForChallengeToFourthLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
1994
+ const inverseForChallengeToFourthLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
1986
1995
  limbsToTuple(challengeToFourthLimbs)
1987
1996
  );
1988
- const inverseForChallengeToFifthLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
1997
+ const inverseForChallengeToFifthLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
1989
1998
  limbsToTuple(challengeToFifthLimbs)
1990
1999
  );
1991
- const inverseForKeysForFinalAmountLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
2000
+ const inverseForKeysForFinalAmountLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
1992
2001
  limbsToTuple(keysForFinalAmountLimbs)
1993
2002
  );
1994
- const inverseForKeysForProtocolFeeLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
2003
+ const inverseForKeysForProtocolFeeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
1995
2004
  limbsToTuple(keysForProtocolFeeLimbs)
1996
2005
  );
1997
- const inverseForKeysForRelayerFeeLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
2006
+ const inverseForKeysForRelayerFeeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
1998
2007
  limbsToTuple(keysForRelayerFeeLimbs)
1999
2008
  );
2000
- const inverseForKeysForMvkLowLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
2009
+ const inverseForKeysForMvkLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
2001
2010
  limbsToTuple(keysForMvkLowLimbs)
2002
2011
  );
2003
- const inverseForKeysForMvkHighLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
2012
+ const inverseForKeysForMvkHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
2004
2013
  limbsToTuple(keysForMvkHighLimbs)
2005
2014
  );
2006
- const inverseForKeysForRandomFactorLowLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
2015
+ const inverseForKeysForRandomFactorLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
2007
2016
  limbsToTuple(keysForRandomFactorLowLimbs)
2008
2017
  );
2009
- const inverseForKeysForRandomFactorHighLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
2018
+ const inverseForKeysForRandomFactorHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
2010
2019
  limbsToTuple(keysForRandomFactorHighLimbs)
2011
2020
  );
2012
2021
  chunkLTCKPTZC_cjs.assertBn254FieldElement(inverseForFinalAmountLimbs, "inverseForFinalAmountLimbs");
@@ -2171,7 +2180,7 @@ async function processUtxoInBatch(args, deps) {
2171
2180
  }
2172
2181
  const publicAggregatedHash = await poseidonAggregator(aggregatedHashInputs);
2173
2182
  chunkLTCKPTZC_cjs.assertBn254FieldElement(publicAggregatedHash, "publicAggregatedHash");
2174
- const bpsDivisorInverse = chunkYEZBTYCP_cjs.computeBn254ModularInverse(chunkZY3TSHMJ_cjs.createBn254FieldElement(BPS_DIVISOR2));
2183
+ const bpsDivisorInverse = chunkGXCRPFTT_cjs.computeBn254ModularInverse(chunkZY3TSHMJ_cjs.createBn254FieldElement(BPS_DIVISOR2));
2175
2184
  const zkCircuitInputs = {
2176
2185
  // Per-UTXO H1 data
2177
2186
  version: utxosBatch.map((u) => chunkZY3TSHMJ_cjs.createBn254FieldElement(u.version)),
@@ -3335,55 +3344,55 @@ async function processUtxoInBatch2(args, deps) {
3335
3344
  const challengeCubedLimbs = chunkZY3TSHMJ_cjs.convertU256ToBase85Limbs(challengeCubed);
3336
3345
  const challengeToFourthLimbs = chunkZY3TSHMJ_cjs.convertU256ToBase85Limbs(challengeToFourth);
3337
3346
  const challengeToFifthLimbs = chunkZY3TSHMJ_cjs.convertU256ToBase85Limbs(challengeToFifth);
3338
- const inverseForFinalAmountLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
3347
+ const inverseForFinalAmountLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
3339
3348
  limbsToTuple2(finalAmountAsLimbs)
3340
3349
  );
3341
- const inverseForMvkLowLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
3350
+ const inverseForMvkLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
3342
3351
  limbsToTuple2(ephemeralMvkLowAsLimbs)
3343
3352
  );
3344
- const inverseForMvkHighLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
3353
+ const inverseForMvkHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
3345
3354
  limbsToTuple2(ephemeralMvkHighAsLimbs)
3346
3355
  );
3347
- const inverseForRandomFactorLowLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
3356
+ const inverseForRandomFactorLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
3348
3357
  limbsToTuple2(randomFactorLowAsLimbs)
3349
3358
  );
3350
- const inverseForRandomFactorHighLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
3359
+ const inverseForRandomFactorHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
3351
3360
  limbsToTuple2(randomFactorHighAsLimbs)
3352
3361
  );
3353
- const inverseForChallengeLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
3362
+ const inverseForChallengeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
3354
3363
  limbsToTuple2(fiatShamirChallengeLimbs)
3355
3364
  );
3356
- const inverseForChallengeSquaredLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
3365
+ const inverseForChallengeSquaredLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
3357
3366
  limbsToTuple2(challengeSquaredLimbs)
3358
3367
  );
3359
- const inverseForChallengeCubedLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
3368
+ const inverseForChallengeCubedLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
3360
3369
  limbsToTuple2(challengeCubedLimbs)
3361
3370
  );
3362
- const inverseForChallengeToFourthLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
3371
+ const inverseForChallengeToFourthLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
3363
3372
  limbsToTuple2(challengeToFourthLimbs)
3364
3373
  );
3365
- const inverseForChallengeToFifthLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
3374
+ const inverseForChallengeToFifthLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
3366
3375
  limbsToTuple2(challengeToFifthLimbs)
3367
3376
  );
3368
- const inverseForKeysForFinalAmountLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
3377
+ const inverseForKeysForFinalAmountLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
3369
3378
  limbsToTuple2(keysForFinalAmountLimbs)
3370
3379
  );
3371
- const inverseForKeysForProtocolFeeLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
3380
+ const inverseForKeysForProtocolFeeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
3372
3381
  limbsToTuple2(keysForProtocolFeeLimbs)
3373
3382
  );
3374
- const inverseForKeysForRelayerFeeLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
3383
+ const inverseForKeysForRelayerFeeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
3375
3384
  limbsToTuple2(keysForRelayerFeeLimbs)
3376
3385
  );
3377
- const inverseForKeysForMvkLowLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
3386
+ const inverseForKeysForMvkLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
3378
3387
  limbsToTuple2(keysForMvkLowLimbs)
3379
3388
  );
3380
- const inverseForKeysForMvkHighLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
3389
+ const inverseForKeysForMvkHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
3381
3390
  limbsToTuple2(keysForMvkHighLimbs)
3382
3391
  );
3383
- const inverseForKeysForRandomFactorLowLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
3392
+ const inverseForKeysForRandomFactorLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
3384
3393
  limbsToTuple2(keysForRandomFactorLowLimbs)
3385
3394
  );
3386
- const inverseForKeysForRandomFactorHighLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
3395
+ const inverseForKeysForRandomFactorHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
3387
3396
  limbsToTuple2(keysForRandomFactorHighLimbs)
3388
3397
  );
3389
3398
  chunkLTCKPTZC_cjs.assertBn254FieldElement(inverseForFinalAmountLimbs, "inverseForFinalAmountLimbs");
@@ -3548,7 +3557,7 @@ async function processUtxoInBatch2(args, deps) {
3548
3557
  }
3549
3558
  const publicAggregatedHash = await poseidonAggregator(aggregatedHashInputs);
3550
3559
  chunkLTCKPTZC_cjs.assertBn254FieldElement(publicAggregatedHash, "publicAggregatedHash");
3551
- const bpsDivisorInverse = chunkYEZBTYCP_cjs.computeBn254ModularInverse(chunkZY3TSHMJ_cjs.createBn254FieldElement(BPS_DIVISOR3));
3560
+ const bpsDivisorInverse = chunkGXCRPFTT_cjs.computeBn254ModularInverse(chunkZY3TSHMJ_cjs.createBn254FieldElement(BPS_DIVISOR3));
3552
3561
  const zkCircuitInputs = {
3553
3562
  // Per-UTXO H1 data
3554
3563
  version: utxosBatch.map((u) => chunkZY3TSHMJ_cjs.createBn254FieldElement(u.version)),
@@ -4589,34 +4598,34 @@ async function processUtxoInBatch3(args, deps) {
4589
4598
  const challengeSquared = modulePow(fiatShamirChallenge, 2n);
4590
4599
  chunkLTCKPTZC_cjs.assertCurve25519FieldElement(challengeSquared, "challengeSquared");
4591
4600
  const challengeSquaredLimbs = chunkZY3TSHMJ_cjs.convertU256ToBase85Limbs(challengeSquared);
4592
- const inverseForMvkLowLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
4601
+ const inverseForMvkLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
4593
4602
  limbsToTuple3(ephemeralMvkLowAsLimbs)
4594
4603
  );
4595
- const inverseForMvkHighLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
4604
+ const inverseForMvkHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
4596
4605
  limbsToTuple3(ephemeralMvkHighAsLimbs)
4597
4606
  );
4598
- const inverseForRandomFactorLowLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
4607
+ const inverseForRandomFactorLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
4599
4608
  limbsToTuple3(randomFactorLowAsLimbs)
4600
4609
  );
4601
- const inverseForRandomFactorHighLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
4610
+ const inverseForRandomFactorHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
4602
4611
  limbsToTuple3(randomFactorHighAsLimbs)
4603
4612
  );
4604
- const inverseForChallengeLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
4613
+ const inverseForChallengeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
4605
4614
  limbsToTuple3(fiatShamirChallengeLimbs)
4606
4615
  );
4607
- const inverseForChallengeSquaredLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
4616
+ const inverseForChallengeSquaredLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
4608
4617
  limbsToTuple3(challengeSquaredLimbs)
4609
4618
  );
4610
- const inverseForKeysForMvkLowLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
4619
+ const inverseForKeysForMvkLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
4611
4620
  limbsToTuple3(keysForMvkLowLimbs)
4612
4621
  );
4613
- const inverseForKeysForMvkHighLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
4622
+ const inverseForKeysForMvkHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
4614
4623
  limbsToTuple3(keysForMvkHighLimbs)
4615
4624
  );
4616
- const inverseForKeysForRandomFactorLowLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
4625
+ const inverseForKeysForRandomFactorLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
4617
4626
  limbsToTuple3(keysForRandomFactorLowLimbs)
4618
4627
  );
4619
- const inverseForKeysForRandomFactorHighLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
4628
+ const inverseForKeysForRandomFactorHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
4620
4629
  limbsToTuple3(keysForRandomFactorHighLimbs)
4621
4630
  );
4622
4631
  chunkLTCKPTZC_cjs.assertBn254FieldElement(inverseForMvkLowLimbs, "inverseForMvkLowLimbs");
@@ -5117,7 +5126,7 @@ function getComplianceGrantIssuerFunction(args, deps) {
5117
5126
  const mvkProvingSigner = await kit.createKeyPairSignerFromPrivateKeyBytes(
5118
5127
  keypairResult.ed25519Keypair.seed
5119
5128
  );
5120
- await chunkCFFLOE7D_cjs.findEncryptedUserAccountPda(userAddress, programId);
5129
+ await chunkDQ25W34A_cjs.findEncryptedUserAccountPda(userAddress, programId);
5121
5130
  const noopSigner = kit.createNoopSigner(userAddress);
5122
5131
  const instruction = await umbraCodama.getCreateUserGrantInstructionAsync({
5123
5132
  granterX25519ProvingSigner: mvkProvingSigner,
@@ -5161,7 +5170,7 @@ function getComplianceGrantRevokerFunction(args, deps) {
5161
5170
  const mvkProvingSigner = await kit.createKeyPairSignerFromPrivateKeyBytes(
5162
5171
  keypairResult.ed25519Keypair.seed
5163
5172
  );
5164
- await chunkCFFLOE7D_cjs.findEncryptedUserAccountPda(userAddress, programId);
5173
+ await chunkDQ25W34A_cjs.findEncryptedUserAccountPda(userAddress, programId);
5165
5174
  const noopSigner = kit.createNoopSigner(userAddress);
5166
5175
  const instruction = await umbraCodama.getDeleteUserGrantInstructionAsync({
5167
5176
  feePayer: noopSigner,
@@ -5219,7 +5228,7 @@ function getSharedCiphertextReencryptorForUserGrantFunction(args, deps) {
5219
5228
  );
5220
5229
  const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
5221
5230
  const mpcCallbackDataOffset = chunkZY3TSHMJ_cjs.generateRandomU128();
5222
- const arciumAccounts = await chunkCFFLOE7D_cjs.findArciumInfrastructurePdas(
5231
+ const arciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
5223
5232
  client.networkConfig.programId,
5224
5233
  client.networkConfig.arciumProgramAddress,
5225
5234
  clusterOffset,
@@ -5305,7 +5314,7 @@ function getNetworkCiphertextReencryptorForNetworkGrantFunction(args, deps) {
5305
5314
  );
5306
5315
  const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
5307
5316
  const mpcCallbackDataOffset = chunkZY3TSHMJ_cjs.generateRandomU128();
5308
- const arciumAccounts = await chunkCFFLOE7D_cjs.findArciumInfrastructurePdas(
5317
+ const arciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
5309
5318
  client.networkConfig.programId,
5310
5319
  client.networkConfig.arciumProgramAddress,
5311
5320
  clusterOffset,
@@ -5390,7 +5399,7 @@ function getSharedCiphertextReencryptorForNetworkGrantFunction(args, deps) {
5390
5399
  );
5391
5400
  const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
5392
5401
  const mpcCallbackDataOffset = chunkZY3TSHMJ_cjs.generateRandomU128();
5393
- const arciumAccounts = await chunkCFFLOE7D_cjs.findArciumInfrastructurePdas(
5402
+ const arciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
5394
5403
  client.networkConfig.programId,
5395
5404
  client.networkConfig.arciumProgramAddress,
5396
5405
  clusterOffset,
@@ -5454,7 +5463,7 @@ function getUserComplianceGrantQuerierFunction(args, deps) {
5454
5463
  const umbraProgram = client.networkConfig.programId;
5455
5464
  return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function queryUserComplianceGrant(granterX25519, nonce, receiverX25519, options) {
5456
5465
  const accountInfoCommitment = options?.accountInfoCommitment ?? "confirmed";
5457
- const pda = await chunkCFFLOE7D_cjs.findUserComplianceGrantPda(
5466
+ const pda = await chunkDQ25W34A_cjs.findUserComplianceGrantPda(
5458
5467
  granterX25519,
5459
5468
  nonce,
5460
5469
  receiverX25519,
@@ -5475,7 +5484,7 @@ function getNetworkComplianceGrantQuerierFunction(args, deps) {
5475
5484
  const umbraProgram = client.networkConfig.programId;
5476
5485
  return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function queryNetworkMxeComplianceGrant(nonce, receiverX25519, options) {
5477
5486
  const accountInfoCommitment = options?.accountInfoCommitment ?? "confirmed";
5478
- const pda = await chunkCFFLOE7D_cjs.findNetworkComplianceGrantPda(nonce, receiverX25519, umbraProgram);
5487
+ const pda = await chunkDQ25W34A_cjs.findNetworkComplianceGrantPda(nonce, receiverX25519, umbraProgram);
5479
5488
  const accountMap = await accountInfoProvider([pda], { commitment: accountInfoCommitment });
5480
5489
  const maybeAccount = accountMap.get(pda);
5481
5490
  if (maybeAccount?.exists !== true) {
@@ -5491,7 +5500,7 @@ function getSharedComplianceGrantQuerierFunction(args, deps) {
5491
5500
  const umbraProgram = client.networkConfig.programId;
5492
5501
  return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function queryNetworkSharedComplianceGrant(granterX25519, nonce, receiverX25519, options) {
5493
5502
  const accountInfoCommitment = options?.accountInfoCommitment ?? "confirmed";
5494
- const pda = await chunkCFFLOE7D_cjs.findSharedComplianceGrantPda(
5503
+ const pda = await chunkDQ25W34A_cjs.findSharedComplianceGrantPda(
5495
5504
  granterX25519,
5496
5505
  nonce,
5497
5506
  receiverX25519,
@@ -5534,7 +5543,7 @@ function getNetworkEncryptionToSharedEncryptionConverterFunction(args, deps) {
5534
5543
  const pdaDerivations = await Promise.all(
5535
5544
  mints.map(async (mint) => ({
5536
5545
  mint,
5537
- pda: await chunkCFFLOE7D_cjs.findEncryptedTokenAccountPda(
5546
+ pda: await chunkDQ25W34A_cjs.findEncryptedTokenAccountPda(
5538
5547
  userAddress,
5539
5548
  mint,
5540
5549
  client.networkConfig.programId
@@ -5584,7 +5593,7 @@ function getNetworkEncryptionToSharedEncryptionConverterFunction(args, deps) {
5584
5593
  const transactionPromises = eligibleMints.map(async (mint) => {
5585
5594
  const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
5586
5595
  const mpcCallbackDataOffset = chunkZY3TSHMJ_cjs.generateRandomU128();
5587
- const arciumAccounts = await chunkCFFLOE7D_cjs.findArciumInfrastructurePdas(
5596
+ const arciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
5588
5597
  client.networkConfig.programId,
5589
5598
  client.networkConfig.arciumProgramAddress,
5590
5599
  clusterOffset,
@@ -5695,7 +5704,7 @@ function getMintEncryptionKeyRotatorFunction(args, deps) {
5695
5704
  const x25519ProvingSigner = await kit.createKeyPairSignerFromPrivateKeyBytes(
5696
5705
  keypairResult.ed25519Keypair.seed
5697
5706
  );
5698
- const tokenAccountPda = await chunkCFFLOE7D_cjs.findEncryptedTokenAccountPda(
5707
+ const tokenAccountPda = await chunkDQ25W34A_cjs.findEncryptedTokenAccountPda(
5699
5708
  userAddress,
5700
5709
  mint,
5701
5710
  client.networkConfig.programId
@@ -5737,7 +5746,7 @@ function getMintEncryptionKeyRotatorFunction(args, deps) {
5737
5746
  }
5738
5747
  const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
5739
5748
  const mpcCallbackDataOffset = chunkZY3TSHMJ_cjs.generateRandomU128();
5740
- const arciumAccounts = await chunkCFFLOE7D_cjs.findArciumInfrastructurePdas(
5749
+ const arciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
5741
5750
  client.networkConfig.programId,
5742
5751
  client.networkConfig.arciumProgramAddress,
5743
5752
  clusterOffset,
@@ -6048,8 +6057,8 @@ function getPublicBalanceToEncryptedBalanceDirectDepositorFunction(args, deps) {
6048
6057
  let encryptedUserAccountPda;
6049
6058
  try {
6050
6059
  [encryptedTokenAccountPda, encryptedUserAccountPda] = await Promise.all([
6051
- chunkCFFLOE7D_cjs.findEncryptedTokenAccountPda(destinationAddress, mint, client.networkConfig.programId),
6052
- chunkCFFLOE7D_cjs.findEncryptedUserAccountPda(destinationAddress, client.networkConfig.programId)
6060
+ chunkDQ25W34A_cjs.findEncryptedTokenAccountPda(destinationAddress, mint, client.networkConfig.programId),
6061
+ chunkDQ25W34A_cjs.findEncryptedUserAccountPda(destinationAddress, client.networkConfig.programId)
6053
6062
  ]);
6054
6063
  } catch (error) {
6055
6064
  throw new chunkBL6WXLPV_cjs.EncryptedDepositError(
@@ -6118,7 +6127,7 @@ function getPublicBalanceToEncryptedBalanceDirectDepositorFunction(args, deps) {
6118
6127
  const resetCompDefName = isSharedMode ? "reset_shared_eta_queue_v9" : "reset_mxe_eta_queue_v9";
6119
6128
  const resetComputationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
6120
6129
  const resetMpcCallbackDataOffset = chunkZY3TSHMJ_cjs.generateRandomU128();
6121
- const resetArciumAccounts = await chunkCFFLOE7D_cjs.findArciumInfrastructurePdas(
6130
+ const resetArciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
6122
6131
  client.networkConfig.programId,
6123
6132
  client.networkConfig.arciumProgramAddress,
6124
6133
  clusterOffset,
@@ -6187,7 +6196,7 @@ function getPublicBalanceToEncryptedBalanceDirectDepositorFunction(args, deps) {
6187
6196
  [DepositInstructionVariant.ExistingSharedBalance]: "deposit_from_public_balance_into_existing_shared_balance_v11"
6188
6197
  }[instructionVariant];
6189
6198
  const altEntry = chunkAXD7LXYY_cjs.lookupAltEntry(client.networkConfig.addressLookupTables, clusterOffset, compDefInstructionName);
6190
- const arciumAccounts = await chunkCFFLOE7D_cjs.findArciumInfrastructurePdas(
6199
+ const arciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
6191
6200
  client.networkConfig.programId,
6192
6201
  client.networkConfig.arciumProgramAddress,
6193
6202
  clusterOffset,
@@ -6794,64 +6803,64 @@ function getEncryptedBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
6794
6803
  toBn254FieldElement(protocolFeeConfig.merkleRoot)
6795
6804
  ];
6796
6805
  const aggregatedPublicInputHash = await poseidonAggregator(aggregatedHashInputs);
6797
- const inverseForSenderMvkBlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(senderMvkBlindingFactor);
6798
- const inverseForSenderPrivateKeyBlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(
6806
+ const inverseForSenderMvkBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderMvkBlindingFactor);
6807
+ const inverseForSenderPrivateKeyBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
6799
6808
  senderPrivateKeyBlindingFactor
6800
6809
  );
6801
- const inverseForSenderPrivateKey = chunkYEZBTYCP_cjs.computeBn254ModularInverse(senderPrivateKey);
6802
- const inverseForSenderMasterViewingKey = chunkYEZBTYCP_cjs.computeBn254ModularInverse(senderMasterViewingKey);
6803
- const inverseForAmount = chunkYEZBTYCP_cjs.computeBn254ModularInverse(toBn254FieldElement(amount));
6804
- const protocolFeeDivisorInverse = chunkYEZBTYCP_cjs.computeBn254ModularInverse(toBn254FieldElement(16384n));
6805
- const inverseForTotalAmountLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse([
6810
+ const inverseForSenderPrivateKey = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderPrivateKey);
6811
+ const inverseForSenderMasterViewingKey = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderMasterViewingKey);
6812
+ const inverseForAmount = chunkGXCRPFTT_cjs.computeBn254ModularInverse(toBn254FieldElement(amount));
6813
+ const protocolFeeDivisorInverse = chunkGXCRPFTT_cjs.computeBn254ModularInverse(toBn254FieldElement(16384n));
6814
+ const inverseForTotalAmountLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
6806
6815
  amountAsLimbs.low,
6807
6816
  amountAsLimbs.middle,
6808
6817
  amountAsLimbs.high
6809
6818
  ]);
6810
- const inverseForKeysForTotalAmountLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse([
6819
+ const inverseForKeysForTotalAmountLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
6811
6820
  rcEncryptionKeyForAmountAsLimbs.low,
6812
6821
  rcEncryptionKeyForAmountAsLimbs.middle,
6813
6822
  rcEncryptionKeyForAmountAsLimbs.high
6814
6823
  ]);
6815
- const inverseForKeysForProtocolFeeLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse([
6824
+ const inverseForKeysForProtocolFeeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
6816
6825
  rcEncryptionKeyForProtocolFeesAsLimbs.low,
6817
6826
  rcEncryptionKeyForProtocolFeesAsLimbs.middle,
6818
6827
  rcEncryptionKeyForProtocolFeesAsLimbs.high
6819
6828
  ]);
6820
- const inverseForKeysForRandomFactorForPolynomialEvaluationLowLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse([
6829
+ const inverseForKeysForRandomFactorForPolynomialEvaluationLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
6821
6830
  rcEncryptionKeyForRandomFactorLowAsLimbs.low,
6822
6831
  rcEncryptionKeyForRandomFactorLowAsLimbs.middle,
6823
6832
  rcEncryptionKeyForRandomFactorLowAsLimbs.high
6824
6833
  ]);
6825
- const inverseForKeysForRandomFactorForPolynomialEvaluationHighLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse([
6834
+ const inverseForKeysForRandomFactorForPolynomialEvaluationHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
6826
6835
  rcEncryptionKeyForRandomFactorHighAsLimbs.low,
6827
6836
  rcEncryptionKeyForRandomFactorHighAsLimbs.middle,
6828
6837
  rcEncryptionKeyForRandomFactorHighAsLimbs.high
6829
6838
  ]);
6830
- const inverseForNullifier = chunkYEZBTYCP_cjs.computeBn254ModularInverse(nullifier);
6831
- const inverseForH2BlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(randomSecret);
6832
- const inverseForFirstKeystreamBlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(
6839
+ const inverseForNullifier = chunkGXCRPFTT_cjs.computeBn254ModularInverse(nullifier);
6840
+ const inverseForH2BlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(randomSecret);
6841
+ const inverseForFirstKeystreamBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
6833
6842
  firstKeystreamBlindingFactor
6834
6843
  );
6835
- const inverseForSecondKeystreamBlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(
6844
+ const inverseForSecondKeystreamBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
6836
6845
  secondKeystreamBlindingFactor
6837
6846
  );
6838
- const inverseForThirdKeystreamBlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(
6847
+ const inverseForThirdKeystreamBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
6839
6848
  thirdKeystreamBlindingFactor
6840
6849
  );
6841
- const inverseForRandomFactorForPolynomialEvaluationLowLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse([
6850
+ const inverseForRandomFactorForPolynomialEvaluationLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
6842
6851
  randomFactorLowAsLimbs.low,
6843
6852
  randomFactorLowAsLimbs.middle,
6844
6853
  randomFactorLowAsLimbs.high
6845
6854
  ]);
6846
- const inverseForRandomFactorForPolynomialEvaluationHighLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
6855
+ const inverseForRandomFactorForPolynomialEvaluationHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
6847
6856
  [randomFactorHighAsLimbs.low, randomFactorHighAsLimbs.middle, randomFactorHighAsLimbs.high]
6848
6857
  );
6849
- const inverseForChallengeLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse([
6858
+ const inverseForChallengeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
6850
6859
  fiatShamirChallengeLimbs.low,
6851
6860
  fiatShamirChallengeLimbs.middle,
6852
6861
  fiatShamirChallengeLimbs.high
6853
6862
  ]);
6854
- const inverseForChallengeSquaredLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse([
6863
+ const inverseForChallengeSquaredLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
6855
6864
  fiatShamirChallengeSquaredLimbs.low,
6856
6865
  fiatShamirChallengeSquaredLimbs.middle,
6857
6866
  fiatShamirChallengeSquaredLimbs.high
@@ -6995,11 +7004,11 @@ function getEncryptedBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
6995
7004
  chunkLTCKPTZC_cjs.assertGroth16ProofB(proofB);
6996
7005
  chunkLTCKPTZC_cjs.assertGroth16ProofC(proofC);
6997
7006
  const stealthPoolIndex = 0n;
6998
- const stealthPoolAddress = await chunkCFFLOE7D_cjs.findStealthPoolPda(
7007
+ const stealthPoolAddress = await chunkDQ25W34A_cjs.findStealthPoolPda(
6999
7008
  stealthPoolIndex,
7000
7009
  client.networkConfig.programId
7001
7010
  );
7002
- const arciumAccounts = await chunkCFFLOE7D_cjs.findArciumInfrastructurePdas(
7011
+ const arciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
7003
7012
  client.networkConfig.programId,
7004
7013
  client.networkConfig.arciumProgramAddress,
7005
7014
  clusterOffset,
@@ -7086,7 +7095,7 @@ function getEncryptedBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
7086
7095
  }
7087
7096
  chunkPK6SKIKE_cjs.__name(executeTransaction, "executeTransaction");
7088
7097
  async function checkAndCloseExistingProofAccount(offset) {
7089
- const proofAccountPda = await chunkCFFLOE7D_cjs.findUtxoInputBufferPda(
7098
+ const proofAccountPda = await chunkDQ25W34A_cjs.findUtxoInputBufferPda(
7090
7099
  client.signer.address,
7091
7100
  offset,
7092
7101
  client.networkConfig.programId
@@ -7395,7 +7404,7 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
7395
7404
  for (let index = 0; index < 16; index++) {
7396
7405
  proofAccountOffset |= BigInt(proofAccountOffsetBytes[index]) << BigInt(index * 8);
7397
7406
  }
7398
- const receiverUserAccountPda = await chunkCFFLOE7D_cjs.findEncryptedUserAccountPda(
7407
+ const receiverUserAccountPda = await chunkDQ25W34A_cjs.findEncryptedUserAccountPda(
7399
7408
  destinationAddress,
7400
7409
  client.networkConfig.programId
7401
7410
  );
@@ -7784,64 +7793,64 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
7784
7793
  toBn254FieldElement2(protocolFeeConfig.merkleRoot)
7785
7794
  ];
7786
7795
  const aggregatedPublicInputHash = await poseidonAggregator(aggregatedHashInputs);
7787
- const inverseForSenderMvkBlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(senderMvkBlindingFactor);
7788
- const inverseForSenderPrivateKeyBlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(
7796
+ const inverseForSenderMvkBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderMvkBlindingFactor);
7797
+ const inverseForSenderPrivateKeyBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
7789
7798
  senderPrivateKeyBlindingFactor
7790
7799
  );
7791
- const inverseForSenderPrivateKey = chunkYEZBTYCP_cjs.computeBn254ModularInverse(senderPrivateKey);
7792
- const inverseForSenderMasterViewingKey = chunkYEZBTYCP_cjs.computeBn254ModularInverse(senderMasterViewingKey);
7793
- const inverseForAmount = chunkYEZBTYCP_cjs.computeBn254ModularInverse(toBn254FieldElement2(amount));
7794
- const protocolFeeDivisorInverse = chunkYEZBTYCP_cjs.computeBn254ModularInverse(toBn254FieldElement2(16384n));
7795
- const inverseForTotalAmountLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse([
7800
+ const inverseForSenderPrivateKey = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderPrivateKey);
7801
+ const inverseForSenderMasterViewingKey = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderMasterViewingKey);
7802
+ const inverseForAmount = chunkGXCRPFTT_cjs.computeBn254ModularInverse(toBn254FieldElement2(amount));
7803
+ const protocolFeeDivisorInverse = chunkGXCRPFTT_cjs.computeBn254ModularInverse(toBn254FieldElement2(16384n));
7804
+ const inverseForTotalAmountLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
7796
7805
  amountAsLimbs.low,
7797
7806
  amountAsLimbs.middle,
7798
7807
  amountAsLimbs.high
7799
7808
  ]);
7800
- const inverseForKeysForTotalAmountLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse([
7809
+ const inverseForKeysForTotalAmountLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
7801
7810
  rcEncryptionKeyForAmountAsLimbs.low,
7802
7811
  rcEncryptionKeyForAmountAsLimbs.middle,
7803
7812
  rcEncryptionKeyForAmountAsLimbs.high
7804
7813
  ]);
7805
- const inverseForKeysForProtocolFeeLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse([
7814
+ const inverseForKeysForProtocolFeeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
7806
7815
  rcEncryptionKeyForProtocolFeesAsLimbs.low,
7807
7816
  rcEncryptionKeyForProtocolFeesAsLimbs.middle,
7808
7817
  rcEncryptionKeyForProtocolFeesAsLimbs.high
7809
7818
  ]);
7810
- const inverseForKeysForRandomFactorForPolynomialEvaluationLowLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse([
7819
+ const inverseForKeysForRandomFactorForPolynomialEvaluationLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
7811
7820
  rcEncryptionKeyForRandomFactorLowAsLimbs.low,
7812
7821
  rcEncryptionKeyForRandomFactorLowAsLimbs.middle,
7813
7822
  rcEncryptionKeyForRandomFactorLowAsLimbs.high
7814
7823
  ]);
7815
- const inverseForKeysForRandomFactorForPolynomialEvaluationHighLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse([
7824
+ const inverseForKeysForRandomFactorForPolynomialEvaluationHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
7816
7825
  rcEncryptionKeyForRandomFactorHighAsLimbs.low,
7817
7826
  rcEncryptionKeyForRandomFactorHighAsLimbs.middle,
7818
7827
  rcEncryptionKeyForRandomFactorHighAsLimbs.high
7819
7828
  ]);
7820
- const inverseForNullifier = chunkYEZBTYCP_cjs.computeBn254ModularInverse(nullifier);
7821
- const inverseForH2BlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(randomSecret);
7822
- const inverseForFirstKeystreamBlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(
7829
+ const inverseForNullifier = chunkGXCRPFTT_cjs.computeBn254ModularInverse(nullifier);
7830
+ const inverseForH2BlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(randomSecret);
7831
+ const inverseForFirstKeystreamBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
7823
7832
  firstKeystreamBlindingFactor
7824
7833
  );
7825
- const inverseForSecondKeystreamBlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(
7834
+ const inverseForSecondKeystreamBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
7826
7835
  secondKeystreamBlindingFactor
7827
7836
  );
7828
- const inverseForThirdKeystreamBlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(
7837
+ const inverseForThirdKeystreamBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
7829
7838
  thirdKeystreamBlindingFactor
7830
7839
  );
7831
- const inverseForRandomFactorForPolynomialEvaluationLowLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse([
7840
+ const inverseForRandomFactorForPolynomialEvaluationLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
7832
7841
  randomFactorLowAsLimbs.low,
7833
7842
  randomFactorLowAsLimbs.middle,
7834
7843
  randomFactorLowAsLimbs.high
7835
7844
  ]);
7836
- const inverseForRandomFactorForPolynomialEvaluationHighLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse(
7845
+ const inverseForRandomFactorForPolynomialEvaluationHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
7837
7846
  [randomFactorHighAsLimbs.low, randomFactorHighAsLimbs.middle, randomFactorHighAsLimbs.high]
7838
7847
  );
7839
- const inverseForChallengeLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse([
7848
+ const inverseForChallengeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
7840
7849
  fiatShamirChallengeLimbs.low,
7841
7850
  fiatShamirChallengeLimbs.middle,
7842
7851
  fiatShamirChallengeLimbs.high
7843
7852
  ]);
7844
- const inverseForChallengeSquaredLimbs = chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse([
7853
+ const inverseForChallengeSquaredLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
7845
7854
  fiatShamirChallengeSquaredLimbs.low,
7846
7855
  fiatShamirChallengeSquaredLimbs.middle,
7847
7856
  fiatShamirChallengeSquaredLimbs.high
@@ -7985,11 +7994,11 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
7985
7994
  chunkLTCKPTZC_cjs.assertGroth16ProofB(proofB);
7986
7995
  chunkLTCKPTZC_cjs.assertGroth16ProofC(proofC);
7987
7996
  const stealthPoolIndex = 0n;
7988
- const stealthPoolAddress = await chunkCFFLOE7D_cjs.findStealthPoolPda(
7997
+ const stealthPoolAddress = await chunkDQ25W34A_cjs.findStealthPoolPda(
7989
7998
  stealthPoolIndex,
7990
7999
  client.networkConfig.programId
7991
8000
  );
7992
- const arciumAccounts = await chunkCFFLOE7D_cjs.findArciumInfrastructurePdas(
8001
+ const arciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
7993
8002
  client.networkConfig.programId,
7994
8003
  client.networkConfig.arciumProgramAddress,
7995
8004
  clusterOffset,
@@ -8076,7 +8085,7 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
8076
8085
  }
8077
8086
  chunkPK6SKIKE_cjs.__name(executeTransaction, "executeTransaction");
8078
8087
  async function checkAndCloseExistingProofAccount(offset) {
8079
- const proofAccountPda = await chunkCFFLOE7D_cjs.findUtxoInputBufferPda(
8088
+ const proofAccountPda = await chunkDQ25W34A_cjs.findUtxoInputBufferPda(
8080
8089
  client.signer.address,
8081
8090
  offset,
8082
8091
  client.networkConfig.programId
@@ -8566,19 +8575,19 @@ function getPublicBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
8566
8575
  toBn254FieldElement3(protocolFeeConfig.merkleRoot)
8567
8576
  ];
8568
8577
  const aggregatedPublicInputHash = await poseidonAggregator(aggregatedHashInputs);
8569
- const inverseForSenderMvkBlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(senderMvkBlindingFactor);
8570
- const inverseForSenderPrivateKeyBlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(
8578
+ const inverseForSenderMvkBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderMvkBlindingFactor);
8579
+ const inverseForSenderPrivateKeyBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
8571
8580
  senderPrivateKeyBlindingFactor
8572
8581
  );
8573
- const inverseForSenderPrivateKey = chunkYEZBTYCP_cjs.computeBn254ModularInverse(senderPrivateKey);
8574
- const inverseForSenderMasterViewingKey = chunkYEZBTYCP_cjs.computeBn254ModularInverse(senderMasterViewingKey);
8575
- const inverseForAmount = chunkYEZBTYCP_cjs.computeBn254ModularInverse(toBn254FieldElement3(netDepositAmount));
8576
- const inverseForNullifier = chunkYEZBTYCP_cjs.computeBn254ModularInverse(nullifier);
8577
- const inverseForH2BlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(randomSecret);
8578
- const inverseForFirstKeystreamBlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(
8582
+ const inverseForSenderPrivateKey = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderPrivateKey);
8583
+ const inverseForSenderMasterViewingKey = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderMasterViewingKey);
8584
+ const inverseForAmount = chunkGXCRPFTT_cjs.computeBn254ModularInverse(toBn254FieldElement3(netDepositAmount));
8585
+ const inverseForNullifier = chunkGXCRPFTT_cjs.computeBn254ModularInverse(nullifier);
8586
+ const inverseForH2BlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(randomSecret);
8587
+ const inverseForFirstKeystreamBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
8579
8588
  firstKeystreamBlindingFactor
8580
8589
  );
8581
- const inverseForSecondKeystreamBlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(
8590
+ const inverseForSecondKeystreamBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
8582
8591
  secondKeystreamBlindingFactor
8583
8592
  );
8584
8593
  const zkCircuitInputs = {
@@ -8628,7 +8637,7 @@ function getPublicBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
8628
8637
  chunkLTCKPTZC_cjs.assertGroth16ProofB(proofB);
8629
8638
  chunkLTCKPTZC_cjs.assertGroth16ProofC(proofC);
8630
8639
  const stealthPoolIndex = 0n;
8631
- const stealthPoolAddress = await chunkCFFLOE7D_cjs.findStealthPoolPda(
8640
+ const stealthPoolAddress = await chunkDQ25W34A_cjs.findStealthPoolPda(
8632
8641
  stealthPoolIndex,
8633
8642
  client.networkConfig.programId
8634
8643
  );
@@ -8689,7 +8698,7 @@ function getPublicBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
8689
8698
  chunkPK6SKIKE_cjs.__name(buildAndSendTransaction, "buildAndSendTransaction");
8690
8699
  chunkLTCKPTZC_cjs.assertU128(proofAccountOffset);
8691
8700
  let closeProofAccountSignature;
8692
- const proofAccountPda = await chunkCFFLOE7D_cjs.findPublicUtxoInputBufferPda(
8701
+ const proofAccountPda = await chunkDQ25W34A_cjs.findPublicUtxoInputBufferPda(
8693
8702
  client.signer.address,
8694
8703
  proofAccountOffset,
8695
8704
  client.networkConfig.programId
@@ -8867,7 +8876,7 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
8867
8876
  for (let index = 0; index < 16; index++) {
8868
8877
  proofAccountOffset |= BigInt(proofAccountOffsetBytes[index]) << BigInt(index * 8);
8869
8878
  }
8870
- const receiverUserAccountPda = await chunkCFFLOE7D_cjs.findEncryptedUserAccountPda(
8879
+ const receiverUserAccountPda = await chunkDQ25W34A_cjs.findEncryptedUserAccountPda(
8871
8880
  destinationAddress,
8872
8881
  client.networkConfig.programId
8873
8882
  );
@@ -9096,19 +9105,19 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
9096
9105
  toBn254FieldElement4(protocolFeeConfig.merkleRoot)
9097
9106
  ];
9098
9107
  const aggregatedPublicInputHash = await poseidonAggregator(aggregatedHashInputs);
9099
- const inverseForSenderMvkBlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(senderMvkBlindingFactor);
9100
- const inverseForSenderPrivateKeyBlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(
9108
+ const inverseForSenderMvkBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderMvkBlindingFactor);
9109
+ const inverseForSenderPrivateKeyBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
9101
9110
  senderPrivateKeyBlindingFactor
9102
9111
  );
9103
- const inverseForSenderPrivateKey = chunkYEZBTYCP_cjs.computeBn254ModularInverse(senderPrivateKey);
9104
- const inverseForSenderMasterViewingKey = chunkYEZBTYCP_cjs.computeBn254ModularInverse(senderMasterViewingKey);
9105
- const inverseForAmount = chunkYEZBTYCP_cjs.computeBn254ModularInverse(toBn254FieldElement4(netDepositAmount));
9106
- const inverseForNullifier = chunkYEZBTYCP_cjs.computeBn254ModularInverse(nullifier);
9107
- const inverseForH2BlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(randomSecret);
9108
- const inverseForFirstKeystreamBlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(
9112
+ const inverseForSenderPrivateKey = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderPrivateKey);
9113
+ const inverseForSenderMasterViewingKey = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderMasterViewingKey);
9114
+ const inverseForAmount = chunkGXCRPFTT_cjs.computeBn254ModularInverse(toBn254FieldElement4(netDepositAmount));
9115
+ const inverseForNullifier = chunkGXCRPFTT_cjs.computeBn254ModularInverse(nullifier);
9116
+ const inverseForH2BlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(randomSecret);
9117
+ const inverseForFirstKeystreamBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
9109
9118
  firstKeystreamBlindingFactor
9110
9119
  );
9111
- const inverseForSecondKeystreamBlindingFactor = chunkYEZBTYCP_cjs.computeBn254ModularInverse(
9120
+ const inverseForSecondKeystreamBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
9112
9121
  secondKeystreamBlindingFactor
9113
9122
  );
9114
9123
  const zkCircuitInputs = {
@@ -9158,7 +9167,7 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
9158
9167
  chunkLTCKPTZC_cjs.assertGroth16ProofB(proofB);
9159
9168
  chunkLTCKPTZC_cjs.assertGroth16ProofC(proofC);
9160
9169
  const stealthPoolIndex = 0n;
9161
- const stealthPoolAddress = await chunkCFFLOE7D_cjs.findStealthPoolPda(
9170
+ const stealthPoolAddress = await chunkDQ25W34A_cjs.findStealthPoolPda(
9162
9171
  stealthPoolIndex,
9163
9172
  client.networkConfig.programId
9164
9173
  );
@@ -9219,7 +9228,7 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
9219
9228
  chunkPK6SKIKE_cjs.__name(buildAndSendTransaction, "buildAndSendTransaction");
9220
9229
  chunkLTCKPTZC_cjs.assertU128(proofAccountOffset);
9221
9230
  let closeProofAccountSignature;
9222
- const proofAccountPda = await chunkCFFLOE7D_cjs.findPublicUtxoInputBufferPda(
9231
+ const proofAccountPda = await chunkDQ25W34A_cjs.findPublicUtxoInputBufferPda(
9223
9232
  client.signer.address,
9224
9233
  proofAccountOffset,
9225
9234
  client.networkConfig.programId
@@ -9397,7 +9406,7 @@ function getEncryptedBalanceQuerierFunction(args, deps) {
9397
9406
  pdaDerivations = await Promise.all(
9398
9407
  mints.map(async (mint) => ({
9399
9408
  mint,
9400
- pda: await chunkCFFLOE7D_cjs.findEncryptedTokenAccountPda(
9409
+ pda: await chunkDQ25W34A_cjs.findEncryptedTokenAccountPda(
9401
9410
  userAddress,
9402
9411
  mint,
9403
9412
  client.networkConfig.programId
@@ -9525,7 +9534,7 @@ function getUserAccountQuerierFunction(args, deps) {
9525
9534
  const accountInfoCommitment = options?.accountInfoCommitment ?? "confirmed";
9526
9535
  let userAccountPda;
9527
9536
  try {
9528
- userAccountPda = await chunkCFFLOE7D_cjs.findEncryptedUserAccountPda(userAddress, umbraProgram);
9537
+ userAccountPda = await chunkDQ25W34A_cjs.findEncryptedUserAccountPda(userAddress, umbraProgram);
9529
9538
  } catch (error) {
9530
9539
  throw new chunkBL6WXLPV_cjs.QueryError(
9531
9540
  "pda-derivation",
@@ -9712,7 +9721,7 @@ function getUserRegistrationFunction(args, deps) {
9712
9721
  "ZK prover is required for anonymous mode registration. Provide zkProver in the deps argument."
9713
9722
  );
9714
9723
  }
9715
- const userAccountPda = await chunkCFFLOE7D_cjs.findEncryptedUserAccountPda(
9724
+ const userAccountPda = await chunkDQ25W34A_cjs.findEncryptedUserAccountPda(
9716
9725
  signer.address,
9717
9726
  client.networkConfig.programId
9718
9727
  );
@@ -10152,7 +10161,7 @@ function getUserRegistrationFunction(args, deps) {
10152
10161
  }
10153
10162
  const zkProof = await zkProver.prove(zkCircuitInputs);
10154
10163
  const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
10155
- const arciumAccounts = await chunkCFFLOE7D_cjs.findArciumInfrastructurePdas(
10164
+ const arciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
10156
10165
  client.networkConfig.programId,
10157
10166
  client.networkConfig.arciumProgramAddress,
10158
10167
  clusterOffset,
@@ -10536,7 +10545,7 @@ function getEncryptedBalanceToPublicBalanceDirectWithdrawerFunction(args, deps)
10536
10545
  const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
10537
10546
  let arciumAccounts;
10538
10547
  try {
10539
- arciumAccounts = await chunkCFFLOE7D_cjs.findArciumInfrastructurePdas(
10548
+ arciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
10540
10549
  client.networkConfig.programId,
10541
10550
  client.networkConfig.arciumProgramAddress,
10542
10551
  clusterOffset,
@@ -10620,6 +10629,30 @@ function getEncryptedBalanceToPublicBalanceDirectWithdrawerFunction(args, deps)
10620
10629
  }
10621
10630
  chunkPK6SKIKE_cjs.__name(getEncryptedBalanceToPublicBalanceDirectWithdrawerFunction, "getEncryptedBalanceToPublicBalanceDirectWithdrawerFunction");
10622
10631
 
10632
+ Object.defineProperty(exports, "bn254Add", {
10633
+ enumerable: true,
10634
+ get: function () { return chunkGXCRPFTT_cjs.bn254Add; }
10635
+ });
10636
+ Object.defineProperty(exports, "bn254ModuloPow", {
10637
+ enumerable: true,
10638
+ get: function () { return chunkGXCRPFTT_cjs.bn254ModuloPow; }
10639
+ });
10640
+ Object.defineProperty(exports, "bn254Mul", {
10641
+ enumerable: true,
10642
+ get: function () { return chunkGXCRPFTT_cjs.bn254Mul; }
10643
+ });
10644
+ Object.defineProperty(exports, "bn254Sub", {
10645
+ enumerable: true,
10646
+ get: function () { return chunkGXCRPFTT_cjs.bn254Sub; }
10647
+ });
10648
+ Object.defineProperty(exports, "computeBn254LimbwiseSumInverse", {
10649
+ enumerable: true,
10650
+ get: function () { return chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse; }
10651
+ });
10652
+ Object.defineProperty(exports, "computeBn254ModularInverse", {
10653
+ enumerable: true,
10654
+ get: function () { return chunkGXCRPFTT_cjs.computeBn254ModularInverse; }
10655
+ });
10623
10656
  Object.defineProperty(exports, "RelayerError", {
10624
10657
  enumerable: true,
10625
10658
  get: function () { return chunkNKVMSABR_cjs.RelayerError; }
@@ -10632,6 +10665,78 @@ Object.defineProperty(exports, "pollClaimUntilTerminal", {
10632
10665
  enumerable: true,
10633
10666
  get: function () { return chunkNKVMSABR_cjs.pollClaimUntilTerminal; }
10634
10667
  });
10668
+ Object.defineProperty(exports, "ClaimUtxoError", {
10669
+ enumerable: true,
10670
+ get: function () { return chunkBL6WXLPV_cjs.ClaimUtxoError; }
10671
+ });
10672
+ Object.defineProperty(exports, "ComputationMonitorError", {
10673
+ enumerable: true,
10674
+ get: function () { return chunkBL6WXLPV_cjs.ComputationMonitorError; }
10675
+ });
10676
+ Object.defineProperty(exports, "ConversionError", {
10677
+ enumerable: true,
10678
+ get: function () { return chunkBL6WXLPV_cjs.ConversionError; }
10679
+ });
10680
+ Object.defineProperty(exports, "CreateUtxoError", {
10681
+ enumerable: true,
10682
+ get: function () { return chunkBL6WXLPV_cjs.CreateUtxoError; }
10683
+ });
10684
+ Object.defineProperty(exports, "EncryptedDepositError", {
10685
+ enumerable: true,
10686
+ get: function () { return chunkBL6WXLPV_cjs.EncryptedDepositError; }
10687
+ });
10688
+ Object.defineProperty(exports, "EncryptedWithdrawalError", {
10689
+ enumerable: true,
10690
+ get: function () { return chunkBL6WXLPV_cjs.EncryptedWithdrawalError; }
10691
+ });
10692
+ Object.defineProperty(exports, "FetchUtxosError", {
10693
+ enumerable: true,
10694
+ get: function () { return chunkBL6WXLPV_cjs.FetchUtxosError; }
10695
+ });
10696
+ Object.defineProperty(exports, "QueryError", {
10697
+ enumerable: true,
10698
+ get: function () { return chunkBL6WXLPV_cjs.QueryError; }
10699
+ });
10700
+ Object.defineProperty(exports, "RegistrationError", {
10701
+ enumerable: true,
10702
+ get: function () { return chunkBL6WXLPV_cjs.RegistrationError; }
10703
+ });
10704
+ Object.defineProperty(exports, "isClaimUtxoError", {
10705
+ enumerable: true,
10706
+ get: function () { return chunkBL6WXLPV_cjs.isClaimUtxoError; }
10707
+ });
10708
+ Object.defineProperty(exports, "isComputationMonitorError", {
10709
+ enumerable: true,
10710
+ get: function () { return chunkBL6WXLPV_cjs.isComputationMonitorError; }
10711
+ });
10712
+ Object.defineProperty(exports, "isConversionError", {
10713
+ enumerable: true,
10714
+ get: function () { return chunkBL6WXLPV_cjs.isConversionError; }
10715
+ });
10716
+ Object.defineProperty(exports, "isCreateUtxoError", {
10717
+ enumerable: true,
10718
+ get: function () { return chunkBL6WXLPV_cjs.isCreateUtxoError; }
10719
+ });
10720
+ Object.defineProperty(exports, "isEncryptedDepositError", {
10721
+ enumerable: true,
10722
+ get: function () { return chunkBL6WXLPV_cjs.isEncryptedDepositError; }
10723
+ });
10724
+ Object.defineProperty(exports, "isEncryptedWithdrawalError", {
10725
+ enumerable: true,
10726
+ get: function () { return chunkBL6WXLPV_cjs.isEncryptedWithdrawalError; }
10727
+ });
10728
+ Object.defineProperty(exports, "isFetchUtxosError", {
10729
+ enumerable: true,
10730
+ get: function () { return chunkBL6WXLPV_cjs.isFetchUtxosError; }
10731
+ });
10732
+ Object.defineProperty(exports, "isQueryError", {
10733
+ enumerable: true,
10734
+ get: function () { return chunkBL6WXLPV_cjs.isQueryError; }
10735
+ });
10736
+ Object.defineProperty(exports, "isRegistrationError", {
10737
+ enumerable: true,
10738
+ get: function () { return chunkBL6WXLPV_cjs.isRegistrationError; }
10739
+ });
10635
10740
  Object.defineProperty(exports, "AES_AUTH_TAG_LENGTH", {
10636
10741
  enumerable: true,
10637
10742
  get: function () { return chunkJPDF7BIT_cjs.AES_AUTH_TAG_LENGTH; }
@@ -11196,102 +11301,6 @@ Object.defineProperty(exports, "getYearlyViewingKeyDeriver", {
11196
11301
  enumerable: true,
11197
11302
  get: function () { return chunkJPDF7BIT_cjs.getYearlyViewingKeyDeriver; }
11198
11303
  });
11199
- Object.defineProperty(exports, "ClaimUtxoError", {
11200
- enumerable: true,
11201
- get: function () { return chunkBL6WXLPV_cjs.ClaimUtxoError; }
11202
- });
11203
- Object.defineProperty(exports, "ComputationMonitorError", {
11204
- enumerable: true,
11205
- get: function () { return chunkBL6WXLPV_cjs.ComputationMonitorError; }
11206
- });
11207
- Object.defineProperty(exports, "ConversionError", {
11208
- enumerable: true,
11209
- get: function () { return chunkBL6WXLPV_cjs.ConversionError; }
11210
- });
11211
- Object.defineProperty(exports, "CreateUtxoError", {
11212
- enumerable: true,
11213
- get: function () { return chunkBL6WXLPV_cjs.CreateUtxoError; }
11214
- });
11215
- Object.defineProperty(exports, "EncryptedDepositError", {
11216
- enumerable: true,
11217
- get: function () { return chunkBL6WXLPV_cjs.EncryptedDepositError; }
11218
- });
11219
- Object.defineProperty(exports, "EncryptedWithdrawalError", {
11220
- enumerable: true,
11221
- get: function () { return chunkBL6WXLPV_cjs.EncryptedWithdrawalError; }
11222
- });
11223
- Object.defineProperty(exports, "FetchUtxosError", {
11224
- enumerable: true,
11225
- get: function () { return chunkBL6WXLPV_cjs.FetchUtxosError; }
11226
- });
11227
- Object.defineProperty(exports, "QueryError", {
11228
- enumerable: true,
11229
- get: function () { return chunkBL6WXLPV_cjs.QueryError; }
11230
- });
11231
- Object.defineProperty(exports, "RegistrationError", {
11232
- enumerable: true,
11233
- get: function () { return chunkBL6WXLPV_cjs.RegistrationError; }
11234
- });
11235
- Object.defineProperty(exports, "isClaimUtxoError", {
11236
- enumerable: true,
11237
- get: function () { return chunkBL6WXLPV_cjs.isClaimUtxoError; }
11238
- });
11239
- Object.defineProperty(exports, "isComputationMonitorError", {
11240
- enumerable: true,
11241
- get: function () { return chunkBL6WXLPV_cjs.isComputationMonitorError; }
11242
- });
11243
- Object.defineProperty(exports, "isConversionError", {
11244
- enumerable: true,
11245
- get: function () { return chunkBL6WXLPV_cjs.isConversionError; }
11246
- });
11247
- Object.defineProperty(exports, "isCreateUtxoError", {
11248
- enumerable: true,
11249
- get: function () { return chunkBL6WXLPV_cjs.isCreateUtxoError; }
11250
- });
11251
- Object.defineProperty(exports, "isEncryptedDepositError", {
11252
- enumerable: true,
11253
- get: function () { return chunkBL6WXLPV_cjs.isEncryptedDepositError; }
11254
- });
11255
- Object.defineProperty(exports, "isEncryptedWithdrawalError", {
11256
- enumerable: true,
11257
- get: function () { return chunkBL6WXLPV_cjs.isEncryptedWithdrawalError; }
11258
- });
11259
- Object.defineProperty(exports, "isFetchUtxosError", {
11260
- enumerable: true,
11261
- get: function () { return chunkBL6WXLPV_cjs.isFetchUtxosError; }
11262
- });
11263
- Object.defineProperty(exports, "isQueryError", {
11264
- enumerable: true,
11265
- get: function () { return chunkBL6WXLPV_cjs.isQueryError; }
11266
- });
11267
- Object.defineProperty(exports, "isRegistrationError", {
11268
- enumerable: true,
11269
- get: function () { return chunkBL6WXLPV_cjs.isRegistrationError; }
11270
- });
11271
- Object.defineProperty(exports, "bn254Add", {
11272
- enumerable: true,
11273
- get: function () { return chunkYEZBTYCP_cjs.bn254Add; }
11274
- });
11275
- Object.defineProperty(exports, "bn254ModuloPow", {
11276
- enumerable: true,
11277
- get: function () { return chunkYEZBTYCP_cjs.bn254ModuloPow; }
11278
- });
11279
- Object.defineProperty(exports, "bn254Mul", {
11280
- enumerable: true,
11281
- get: function () { return chunkYEZBTYCP_cjs.bn254Mul; }
11282
- });
11283
- Object.defineProperty(exports, "bn254Sub", {
11284
- enumerable: true,
11285
- get: function () { return chunkYEZBTYCP_cjs.bn254Sub; }
11286
- });
11287
- Object.defineProperty(exports, "computeBn254LimbwiseSumInverse", {
11288
- enumerable: true,
11289
- get: function () { return chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse; }
11290
- });
11291
- Object.defineProperty(exports, "computeBn254ModularInverse", {
11292
- enumerable: true,
11293
- get: function () { return chunkYEZBTYCP_cjs.computeBn254ModularInverse; }
11294
- });
11295
11304
  Object.defineProperty(exports, "bn254FieldElementSampler", {
11296
11305
  enumerable: true,
11297
11306
  get: function () { return chunkY55PYKXH_cjs.bn254FieldElementSampler; }