@umbra-privacy/sdk 2.0.0 → 2.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/{addresses-B7HybtbJ.d.ts → addresses-BIzQplvu.d.ts} +1 -1
- package/dist/{addresses-CTVY1oi7.d.cts → addresses-Djkrs22V.d.cts} +1 -1
- package/dist/{chunk-MKNCBUFA.js → chunk-D5MWU3TV.js} +17 -17
- package/dist/chunk-D5MWU3TV.js.map +1 -0
- package/dist/{chunk-CFFLOE7D.cjs → chunk-DQ25W34A.cjs} +17 -17
- package/dist/chunk-DQ25W34A.cjs.map +1 -0
- package/dist/{chunk-YEZBTYCP.cjs → chunk-GXCRPFTT.cjs} +3 -3
- package/dist/{chunk-YEZBTYCP.cjs.map → chunk-GXCRPFTT.cjs.map} +1 -1
- package/dist/{chunk-OFDWNWCL.js → chunk-ZPSWMSXL.js} +3 -3
- package/dist/{chunk-OFDWNWCL.js.map → chunk-ZPSWMSXL.js.map} +1 -1
- package/dist/{client-DkVBHMWb.d.cts → client-BmzzZ8qS.d.cts} +5 -5
- package/dist/{client-V4AF6Bz9.d.ts → client-CQytBtEn.d.ts} +5 -5
- package/dist/common/pda/index.cjs +35 -35
- package/dist/common/pda/index.d.cts +7 -7
- package/dist/common/pda/index.d.ts +7 -7
- package/dist/common/pda/index.js +2 -2
- package/dist/constants/index.d.cts +3 -3
- package/dist/constants/index.d.ts +3 -3
- package/dist/crypto/index.cjs +2 -2
- package/dist/crypto/index.d.cts +13 -13
- package/dist/crypto/index.d.ts +13 -13
- package/dist/crypto/index.js +2 -2
- package/dist/{cryptography-D6tPDh-Y.d.cts → cryptography-BJ5sCytb.d.cts} +1 -1
- package/dist/{cryptography-BFSJcvi6.d.ts → cryptography-Dk1cBuym.d.ts} +1 -1
- package/dist/{index-BG0yjL7C.d.cts → index-Ckj9PfBk.d.cts} +8 -8
- package/dist/{index-ByynoyBO.d.ts → index-DAO_47xr.d.ts} +8 -8
- package/dist/index.cjs +252 -243
- package/dist/index.cjs.map +1 -1
- package/dist/index.d.cts +19 -19
- package/dist/index.d.ts +19 -19
- package/dist/index.js +22 -13
- package/dist/index.js.map +1 -1
- package/dist/interfaces/index.d.cts +12 -12
- package/dist/interfaces/index.d.ts +12 -12
- package/dist/{interfaces-D2NO6kDD.d.cts → interfaces-2b_ySL0r.d.cts} +2 -2
- package/dist/{interfaces-z_xYJlgV.d.ts → interfaces-C-N3oLgJ.d.ts} +4 -4
- package/dist/{interfaces-43cReBcS.d.cts → interfaces-CpZDActo.d.cts} +4 -4
- package/dist/{interfaces-B8xKNl_6.d.ts → interfaces-CxrUtnVG.d.ts} +2 -2
- package/dist/math/index.cjs +8 -8
- package/dist/math/index.d.cts +4 -4
- package/dist/math/index.d.ts +4 -4
- package/dist/math/index.js +2 -2
- package/dist/{networks-RMd3abPE.d.ts → networks-B3pArLLR.d.ts} +1 -1
- package/dist/{networks-yAoO8peQ.d.cts → networks-Bkl2oP0q.d.cts} +1 -1
- package/dist/solana/index.d.cts +7 -7
- package/dist/solana/index.d.ts +7 -7
- package/dist/{temporal-BbRaEPoO.d.ts → temporal-B3yk1YkA.d.ts} +1 -1
- package/dist/{temporal-oUj7iCaq.d.cts → temporal-BHMGDS-0.d.cts} +1 -1
- package/dist/{transaction-forwarder-5mAMTjw6.d.ts → transaction-forwarder-BODYfi-S.d.ts} +2 -2
- package/dist/{transaction-forwarder-C6gMUG7a.d.cts → transaction-forwarder-DwAK9whb.d.cts} +2 -2
- package/dist/types/index.d.cts +8 -8
- package/dist/types/index.d.ts +8 -8
- package/dist/{types-BohhvPth.d.cts → types-2UHG9wC-.d.cts} +1 -1
- package/dist/{types-CuKeoI19.d.cts → types-4rAlbodI.d.cts} +2 -2
- package/dist/{types-IMGYmlv-.d.cts → types-BYBfXNV_.d.cts} +1 -1
- package/dist/{types-Ca7frykr.d.ts → types-BrQv82ne.d.ts} +2 -2
- package/dist/{types-CW0oTT0j.d.ts → types-C42QtYXI.d.ts} +1 -1
- package/dist/{types-PwNLi_2k.d.cts → types-C8HrYlDv.d.cts} +2 -2
- package/dist/{types-C_V_CaKK.d.cts → types-CM3nVKl2.d.cts} +1 -1
- package/dist/{types-C_V_CaKK.d.ts → types-CM3nVKl2.d.ts} +1 -1
- package/dist/{types-D1jDUjfN.d.ts → types-DfmTaW3z.d.ts} +1 -1
- package/dist/{types-DKEDUlH9.d.ts → types-KMWXIyOY.d.ts} +2 -2
- package/dist/{types-CxfTIpN9.d.ts → types-gNnLmOsz.d.ts} +2 -2
- package/dist/{types-EKuIfxTz.d.cts → types-i26vVlXf.d.cts} +2 -2
- package/dist/utils/index.cjs +120 -120
- package/dist/utils/index.d.cts +5 -5
- package/dist/utils/index.d.ts +5 -5
- package/dist/utils/index.js +2 -2
- package/package.json +1 -1
- package/dist/chunk-CFFLOE7D.cjs.map +0 -1
- package/dist/chunk-MKNCBUFA.js.map +0 -1
package/dist/index.cjs
CHANGED
|
@@ -1,19 +1,19 @@
|
|
|
1
1
|
'use strict';
|
|
2
2
|
|
|
3
|
+
var chunkGXCRPFTT_cjs = require('./chunk-GXCRPFTT.cjs');
|
|
3
4
|
var chunkNKVMSABR_cjs = require('./chunk-NKVMSABR.cjs');
|
|
4
5
|
var chunkZQOIYCGA_cjs = require('./chunk-ZQOIYCGA.cjs');
|
|
5
|
-
var chunkJPDF7BIT_cjs = require('./chunk-JPDF7BIT.cjs');
|
|
6
6
|
var chunkBL6WXLPV_cjs = require('./chunk-BL6WXLPV.cjs');
|
|
7
|
-
var chunkYEZBTYCP_cjs = require('./chunk-YEZBTYCP.cjs');
|
|
8
|
-
var chunkY55PYKXH_cjs = require('./chunk-Y55PYKXH.cjs');
|
|
9
7
|
var chunkFSK2ICMB_cjs = require('./chunk-FSK2ICMB.cjs');
|
|
8
|
+
var chunkJPDF7BIT_cjs = require('./chunk-JPDF7BIT.cjs');
|
|
9
|
+
var chunkY55PYKXH_cjs = require('./chunk-Y55PYKXH.cjs');
|
|
10
|
+
var chunkAXD7LXYY_cjs = require('./chunk-AXD7LXYY.cjs');
|
|
10
11
|
var chunkZY3TSHMJ_cjs = require('./chunk-ZY3TSHMJ.cjs');
|
|
11
|
-
var chunkCFFLOE7D_cjs = require('./chunk-CFFLOE7D.cjs');
|
|
12
|
-
require('./chunk-TQQZGNOI.cjs');
|
|
13
12
|
require('./chunk-DMPMQ74B.cjs');
|
|
13
|
+
var chunkDQ25W34A_cjs = require('./chunk-DQ25W34A.cjs');
|
|
14
14
|
var chunk5GUSMQ74_cjs = require('./chunk-5GUSMQ74.cjs');
|
|
15
|
+
require('./chunk-TQQZGNOI.cjs');
|
|
15
16
|
require('./chunk-QJAUUYZU.cjs');
|
|
16
|
-
var chunkAXD7LXYY_cjs = require('./chunk-AXD7LXYY.cjs');
|
|
17
17
|
var chunkENVYYEM4_cjs = require('./chunk-ENVYYEM4.cjs');
|
|
18
18
|
var chunkFZYWLQAF_cjs = require('./chunk-FZYWLQAF.cjs');
|
|
19
19
|
var chunkLTCKPTZC_cjs = require('./chunk-LTCKPTZC.cjs');
|
|
@@ -804,11 +804,20 @@ async function getUmbraClient(args, deps) {
|
|
|
804
804
|
chunkPK6SKIKE_cjs.__name(getUmbraClient, "getUmbraClient");
|
|
805
805
|
|
|
806
806
|
// src/umbra/constants.ts
|
|
807
|
-
var UMBRA_MESSAGE_TO_SIGN = `
|
|
808
|
-
|
|
807
|
+
var UMBRA_MESSAGE_TO_SIGN = `Umbra Protocol – User Consent & Acknowledgement
|
|
808
|
+
|
|
809
|
+
Please read carefully before continuing. Umbra is a non-custodial, open-source protocol. Umbra does not hold, control, manage, or access your digital assets, private keys, viewing keys, transactions, or personal data. All interactions with the Umbra protocol occur through autonomous smart contracts and wallet-signed transactions executed directly on the blockchain.
|
|
809
810
|
|
|
810
|
-
|
|
811
|
-
|
|
811
|
+
By using the Umbra protocol, you acknowledge and agree that:
|
|
812
|
+
|
|
813
|
+
1. You are solely responsible for managing your wallet, private keys, privacy settings, viewing key disclosures, and any transactions or interactions you authorize.
|
|
814
|
+
2. Blockchain transactions are generally irreversible, and smart contracts may contain bugs, vulnerabilities, or unintended behavior.
|
|
815
|
+
3. Errors, misuse, misconfiguration, third-party tools, relayers, or loss of keys may result in permanent and unrecoverable loss of assets or privacy.
|
|
816
|
+
4. Privacy features are designed to enhance confidentiality but do not guarantee absolute or unconditional anonymity.
|
|
817
|
+
5. Transactions may involve independent relayers or third-party infrastructure that Umbra does not operate, control, or supervise.
|
|
818
|
+
6. By clicking "I Agree", you confirm that you have read, understood, and accepted all applicable terms, policies, risk disclosures, notices, and other documentation governing your access to and use of the Umbra protocol, as published or made available by Umbra from time to time.
|
|
819
|
+
|
|
820
|
+
You acknowledge that such documentation may be updated or modified, and that continued access to or use of the Umbra Protocol constitutes acceptance of the then-current versions. If you do not agree, do not proceed and discontinue use of the Umbra protocol.`;
|
|
812
821
|
var FEE_OFFSETS = {
|
|
813
822
|
/**
|
|
814
823
|
* Offset used in `FeeVault` PDA derivation for the unified protocol fees pool.
|
|
@@ -1962,51 +1971,51 @@ async function processUtxoInBatch(args, deps) {
|
|
|
1962
1971
|
const challengeCubedLimbs = chunkZY3TSHMJ_cjs.convertU256ToBase85Limbs(challengeCubed);
|
|
1963
1972
|
const challengeToFourthLimbs = chunkZY3TSHMJ_cjs.convertU256ToBase85Limbs(challengeToFourth);
|
|
1964
1973
|
const challengeToFifthLimbs = chunkZY3TSHMJ_cjs.convertU256ToBase85Limbs(challengeToFifth);
|
|
1965
|
-
const inverseForFinalAmountLimbs =
|
|
1974
|
+
const inverseForFinalAmountLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
1966
1975
|
limbsToTuple(finalAmountAsLimbs)
|
|
1967
1976
|
);
|
|
1968
|
-
const inverseForMvkLowLimbs =
|
|
1969
|
-
const inverseForMvkHighLimbs =
|
|
1970
|
-
const inverseForRandomFactorLowLimbs =
|
|
1977
|
+
const inverseForMvkLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(limbsToTuple(mvkLowAsLimbs));
|
|
1978
|
+
const inverseForMvkHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(limbsToTuple(mvkHighAsLimbs));
|
|
1979
|
+
const inverseForRandomFactorLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
1971
1980
|
limbsToTuple(randomFactorLowAsLimbs)
|
|
1972
1981
|
);
|
|
1973
|
-
const inverseForRandomFactorHighLimbs =
|
|
1982
|
+
const inverseForRandomFactorHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
1974
1983
|
limbsToTuple(randomFactorHighAsLimbs)
|
|
1975
1984
|
);
|
|
1976
|
-
const inverseForChallengeLimbs =
|
|
1985
|
+
const inverseForChallengeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
1977
1986
|
limbsToTuple(fiatShamirChallengeLimbs)
|
|
1978
1987
|
);
|
|
1979
|
-
const inverseForChallengeSquaredLimbs =
|
|
1988
|
+
const inverseForChallengeSquaredLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
1980
1989
|
limbsToTuple(challengeSquaredLimbs)
|
|
1981
1990
|
);
|
|
1982
|
-
const inverseForChallengeCubedLimbs =
|
|
1991
|
+
const inverseForChallengeCubedLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
1983
1992
|
limbsToTuple(challengeCubedLimbs)
|
|
1984
1993
|
);
|
|
1985
|
-
const inverseForChallengeToFourthLimbs =
|
|
1994
|
+
const inverseForChallengeToFourthLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
1986
1995
|
limbsToTuple(challengeToFourthLimbs)
|
|
1987
1996
|
);
|
|
1988
|
-
const inverseForChallengeToFifthLimbs =
|
|
1997
|
+
const inverseForChallengeToFifthLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
1989
1998
|
limbsToTuple(challengeToFifthLimbs)
|
|
1990
1999
|
);
|
|
1991
|
-
const inverseForKeysForFinalAmountLimbs =
|
|
2000
|
+
const inverseForKeysForFinalAmountLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
1992
2001
|
limbsToTuple(keysForFinalAmountLimbs)
|
|
1993
2002
|
);
|
|
1994
|
-
const inverseForKeysForProtocolFeeLimbs =
|
|
2003
|
+
const inverseForKeysForProtocolFeeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
1995
2004
|
limbsToTuple(keysForProtocolFeeLimbs)
|
|
1996
2005
|
);
|
|
1997
|
-
const inverseForKeysForRelayerFeeLimbs =
|
|
2006
|
+
const inverseForKeysForRelayerFeeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
1998
2007
|
limbsToTuple(keysForRelayerFeeLimbs)
|
|
1999
2008
|
);
|
|
2000
|
-
const inverseForKeysForMvkLowLimbs =
|
|
2009
|
+
const inverseForKeysForMvkLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
2001
2010
|
limbsToTuple(keysForMvkLowLimbs)
|
|
2002
2011
|
);
|
|
2003
|
-
const inverseForKeysForMvkHighLimbs =
|
|
2012
|
+
const inverseForKeysForMvkHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
2004
2013
|
limbsToTuple(keysForMvkHighLimbs)
|
|
2005
2014
|
);
|
|
2006
|
-
const inverseForKeysForRandomFactorLowLimbs =
|
|
2015
|
+
const inverseForKeysForRandomFactorLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
2007
2016
|
limbsToTuple(keysForRandomFactorLowLimbs)
|
|
2008
2017
|
);
|
|
2009
|
-
const inverseForKeysForRandomFactorHighLimbs =
|
|
2018
|
+
const inverseForKeysForRandomFactorHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
2010
2019
|
limbsToTuple(keysForRandomFactorHighLimbs)
|
|
2011
2020
|
);
|
|
2012
2021
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(inverseForFinalAmountLimbs, "inverseForFinalAmountLimbs");
|
|
@@ -2171,7 +2180,7 @@ async function processUtxoInBatch(args, deps) {
|
|
|
2171
2180
|
}
|
|
2172
2181
|
const publicAggregatedHash = await poseidonAggregator(aggregatedHashInputs);
|
|
2173
2182
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(publicAggregatedHash, "publicAggregatedHash");
|
|
2174
|
-
const bpsDivisorInverse =
|
|
2183
|
+
const bpsDivisorInverse = chunkGXCRPFTT_cjs.computeBn254ModularInverse(chunkZY3TSHMJ_cjs.createBn254FieldElement(BPS_DIVISOR2));
|
|
2175
2184
|
const zkCircuitInputs = {
|
|
2176
2185
|
// Per-UTXO H1 data
|
|
2177
2186
|
version: utxosBatch.map((u) => chunkZY3TSHMJ_cjs.createBn254FieldElement(u.version)),
|
|
@@ -3335,55 +3344,55 @@ async function processUtxoInBatch2(args, deps) {
|
|
|
3335
3344
|
const challengeCubedLimbs = chunkZY3TSHMJ_cjs.convertU256ToBase85Limbs(challengeCubed);
|
|
3336
3345
|
const challengeToFourthLimbs = chunkZY3TSHMJ_cjs.convertU256ToBase85Limbs(challengeToFourth);
|
|
3337
3346
|
const challengeToFifthLimbs = chunkZY3TSHMJ_cjs.convertU256ToBase85Limbs(challengeToFifth);
|
|
3338
|
-
const inverseForFinalAmountLimbs =
|
|
3347
|
+
const inverseForFinalAmountLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
3339
3348
|
limbsToTuple2(finalAmountAsLimbs)
|
|
3340
3349
|
);
|
|
3341
|
-
const inverseForMvkLowLimbs =
|
|
3350
|
+
const inverseForMvkLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
3342
3351
|
limbsToTuple2(ephemeralMvkLowAsLimbs)
|
|
3343
3352
|
);
|
|
3344
|
-
const inverseForMvkHighLimbs =
|
|
3353
|
+
const inverseForMvkHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
3345
3354
|
limbsToTuple2(ephemeralMvkHighAsLimbs)
|
|
3346
3355
|
);
|
|
3347
|
-
const inverseForRandomFactorLowLimbs =
|
|
3356
|
+
const inverseForRandomFactorLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
3348
3357
|
limbsToTuple2(randomFactorLowAsLimbs)
|
|
3349
3358
|
);
|
|
3350
|
-
const inverseForRandomFactorHighLimbs =
|
|
3359
|
+
const inverseForRandomFactorHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
3351
3360
|
limbsToTuple2(randomFactorHighAsLimbs)
|
|
3352
3361
|
);
|
|
3353
|
-
const inverseForChallengeLimbs =
|
|
3362
|
+
const inverseForChallengeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
3354
3363
|
limbsToTuple2(fiatShamirChallengeLimbs)
|
|
3355
3364
|
);
|
|
3356
|
-
const inverseForChallengeSquaredLimbs =
|
|
3365
|
+
const inverseForChallengeSquaredLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
3357
3366
|
limbsToTuple2(challengeSquaredLimbs)
|
|
3358
3367
|
);
|
|
3359
|
-
const inverseForChallengeCubedLimbs =
|
|
3368
|
+
const inverseForChallengeCubedLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
3360
3369
|
limbsToTuple2(challengeCubedLimbs)
|
|
3361
3370
|
);
|
|
3362
|
-
const inverseForChallengeToFourthLimbs =
|
|
3371
|
+
const inverseForChallengeToFourthLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
3363
3372
|
limbsToTuple2(challengeToFourthLimbs)
|
|
3364
3373
|
);
|
|
3365
|
-
const inverseForChallengeToFifthLimbs =
|
|
3374
|
+
const inverseForChallengeToFifthLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
3366
3375
|
limbsToTuple2(challengeToFifthLimbs)
|
|
3367
3376
|
);
|
|
3368
|
-
const inverseForKeysForFinalAmountLimbs =
|
|
3377
|
+
const inverseForKeysForFinalAmountLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
3369
3378
|
limbsToTuple2(keysForFinalAmountLimbs)
|
|
3370
3379
|
);
|
|
3371
|
-
const inverseForKeysForProtocolFeeLimbs =
|
|
3380
|
+
const inverseForKeysForProtocolFeeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
3372
3381
|
limbsToTuple2(keysForProtocolFeeLimbs)
|
|
3373
3382
|
);
|
|
3374
|
-
const inverseForKeysForRelayerFeeLimbs =
|
|
3383
|
+
const inverseForKeysForRelayerFeeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
3375
3384
|
limbsToTuple2(keysForRelayerFeeLimbs)
|
|
3376
3385
|
);
|
|
3377
|
-
const inverseForKeysForMvkLowLimbs =
|
|
3386
|
+
const inverseForKeysForMvkLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
3378
3387
|
limbsToTuple2(keysForMvkLowLimbs)
|
|
3379
3388
|
);
|
|
3380
|
-
const inverseForKeysForMvkHighLimbs =
|
|
3389
|
+
const inverseForKeysForMvkHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
3381
3390
|
limbsToTuple2(keysForMvkHighLimbs)
|
|
3382
3391
|
);
|
|
3383
|
-
const inverseForKeysForRandomFactorLowLimbs =
|
|
3392
|
+
const inverseForKeysForRandomFactorLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
3384
3393
|
limbsToTuple2(keysForRandomFactorLowLimbs)
|
|
3385
3394
|
);
|
|
3386
|
-
const inverseForKeysForRandomFactorHighLimbs =
|
|
3395
|
+
const inverseForKeysForRandomFactorHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
3387
3396
|
limbsToTuple2(keysForRandomFactorHighLimbs)
|
|
3388
3397
|
);
|
|
3389
3398
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(inverseForFinalAmountLimbs, "inverseForFinalAmountLimbs");
|
|
@@ -3548,7 +3557,7 @@ async function processUtxoInBatch2(args, deps) {
|
|
|
3548
3557
|
}
|
|
3549
3558
|
const publicAggregatedHash = await poseidonAggregator(aggregatedHashInputs);
|
|
3550
3559
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(publicAggregatedHash, "publicAggregatedHash");
|
|
3551
|
-
const bpsDivisorInverse =
|
|
3560
|
+
const bpsDivisorInverse = chunkGXCRPFTT_cjs.computeBn254ModularInverse(chunkZY3TSHMJ_cjs.createBn254FieldElement(BPS_DIVISOR3));
|
|
3552
3561
|
const zkCircuitInputs = {
|
|
3553
3562
|
// Per-UTXO H1 data
|
|
3554
3563
|
version: utxosBatch.map((u) => chunkZY3TSHMJ_cjs.createBn254FieldElement(u.version)),
|
|
@@ -4589,34 +4598,34 @@ async function processUtxoInBatch3(args, deps) {
|
|
|
4589
4598
|
const challengeSquared = modulePow(fiatShamirChallenge, 2n);
|
|
4590
4599
|
chunkLTCKPTZC_cjs.assertCurve25519FieldElement(challengeSquared, "challengeSquared");
|
|
4591
4600
|
const challengeSquaredLimbs = chunkZY3TSHMJ_cjs.convertU256ToBase85Limbs(challengeSquared);
|
|
4592
|
-
const inverseForMvkLowLimbs =
|
|
4601
|
+
const inverseForMvkLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
4593
4602
|
limbsToTuple3(ephemeralMvkLowAsLimbs)
|
|
4594
4603
|
);
|
|
4595
|
-
const inverseForMvkHighLimbs =
|
|
4604
|
+
const inverseForMvkHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
4596
4605
|
limbsToTuple3(ephemeralMvkHighAsLimbs)
|
|
4597
4606
|
);
|
|
4598
|
-
const inverseForRandomFactorLowLimbs =
|
|
4607
|
+
const inverseForRandomFactorLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
4599
4608
|
limbsToTuple3(randomFactorLowAsLimbs)
|
|
4600
4609
|
);
|
|
4601
|
-
const inverseForRandomFactorHighLimbs =
|
|
4610
|
+
const inverseForRandomFactorHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
4602
4611
|
limbsToTuple3(randomFactorHighAsLimbs)
|
|
4603
4612
|
);
|
|
4604
|
-
const inverseForChallengeLimbs =
|
|
4613
|
+
const inverseForChallengeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
4605
4614
|
limbsToTuple3(fiatShamirChallengeLimbs)
|
|
4606
4615
|
);
|
|
4607
|
-
const inverseForChallengeSquaredLimbs =
|
|
4616
|
+
const inverseForChallengeSquaredLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
4608
4617
|
limbsToTuple3(challengeSquaredLimbs)
|
|
4609
4618
|
);
|
|
4610
|
-
const inverseForKeysForMvkLowLimbs =
|
|
4619
|
+
const inverseForKeysForMvkLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
4611
4620
|
limbsToTuple3(keysForMvkLowLimbs)
|
|
4612
4621
|
);
|
|
4613
|
-
const inverseForKeysForMvkHighLimbs =
|
|
4622
|
+
const inverseForKeysForMvkHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
4614
4623
|
limbsToTuple3(keysForMvkHighLimbs)
|
|
4615
4624
|
);
|
|
4616
|
-
const inverseForKeysForRandomFactorLowLimbs =
|
|
4625
|
+
const inverseForKeysForRandomFactorLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
4617
4626
|
limbsToTuple3(keysForRandomFactorLowLimbs)
|
|
4618
4627
|
);
|
|
4619
|
-
const inverseForKeysForRandomFactorHighLimbs =
|
|
4628
|
+
const inverseForKeysForRandomFactorHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
4620
4629
|
limbsToTuple3(keysForRandomFactorHighLimbs)
|
|
4621
4630
|
);
|
|
4622
4631
|
chunkLTCKPTZC_cjs.assertBn254FieldElement(inverseForMvkLowLimbs, "inverseForMvkLowLimbs");
|
|
@@ -5117,7 +5126,7 @@ function getComplianceGrantIssuerFunction(args, deps) {
|
|
|
5117
5126
|
const mvkProvingSigner = await kit.createKeyPairSignerFromPrivateKeyBytes(
|
|
5118
5127
|
keypairResult.ed25519Keypair.seed
|
|
5119
5128
|
);
|
|
5120
|
-
await
|
|
5129
|
+
await chunkDQ25W34A_cjs.findEncryptedUserAccountPda(userAddress, programId);
|
|
5121
5130
|
const noopSigner = kit.createNoopSigner(userAddress);
|
|
5122
5131
|
const instruction = await umbraCodama.getCreateUserGrantInstructionAsync({
|
|
5123
5132
|
granterX25519ProvingSigner: mvkProvingSigner,
|
|
@@ -5161,7 +5170,7 @@ function getComplianceGrantRevokerFunction(args, deps) {
|
|
|
5161
5170
|
const mvkProvingSigner = await kit.createKeyPairSignerFromPrivateKeyBytes(
|
|
5162
5171
|
keypairResult.ed25519Keypair.seed
|
|
5163
5172
|
);
|
|
5164
|
-
await
|
|
5173
|
+
await chunkDQ25W34A_cjs.findEncryptedUserAccountPda(userAddress, programId);
|
|
5165
5174
|
const noopSigner = kit.createNoopSigner(userAddress);
|
|
5166
5175
|
const instruction = await umbraCodama.getDeleteUserGrantInstructionAsync({
|
|
5167
5176
|
feePayer: noopSigner,
|
|
@@ -5219,7 +5228,7 @@ function getSharedCiphertextReencryptorForUserGrantFunction(args, deps) {
|
|
|
5219
5228
|
);
|
|
5220
5229
|
const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
|
|
5221
5230
|
const mpcCallbackDataOffset = chunkZY3TSHMJ_cjs.generateRandomU128();
|
|
5222
|
-
const arciumAccounts = await
|
|
5231
|
+
const arciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
|
|
5223
5232
|
client.networkConfig.programId,
|
|
5224
5233
|
client.networkConfig.arciumProgramAddress,
|
|
5225
5234
|
clusterOffset,
|
|
@@ -5305,7 +5314,7 @@ function getNetworkCiphertextReencryptorForNetworkGrantFunction(args, deps) {
|
|
|
5305
5314
|
);
|
|
5306
5315
|
const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
|
|
5307
5316
|
const mpcCallbackDataOffset = chunkZY3TSHMJ_cjs.generateRandomU128();
|
|
5308
|
-
const arciumAccounts = await
|
|
5317
|
+
const arciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
|
|
5309
5318
|
client.networkConfig.programId,
|
|
5310
5319
|
client.networkConfig.arciumProgramAddress,
|
|
5311
5320
|
clusterOffset,
|
|
@@ -5390,7 +5399,7 @@ function getSharedCiphertextReencryptorForNetworkGrantFunction(args, deps) {
|
|
|
5390
5399
|
);
|
|
5391
5400
|
const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
|
|
5392
5401
|
const mpcCallbackDataOffset = chunkZY3TSHMJ_cjs.generateRandomU128();
|
|
5393
|
-
const arciumAccounts = await
|
|
5402
|
+
const arciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
|
|
5394
5403
|
client.networkConfig.programId,
|
|
5395
5404
|
client.networkConfig.arciumProgramAddress,
|
|
5396
5405
|
clusterOffset,
|
|
@@ -5454,7 +5463,7 @@ function getUserComplianceGrantQuerierFunction(args, deps) {
|
|
|
5454
5463
|
const umbraProgram = client.networkConfig.programId;
|
|
5455
5464
|
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function queryUserComplianceGrant(granterX25519, nonce, receiverX25519, options) {
|
|
5456
5465
|
const accountInfoCommitment = options?.accountInfoCommitment ?? "confirmed";
|
|
5457
|
-
const pda = await
|
|
5466
|
+
const pda = await chunkDQ25W34A_cjs.findUserComplianceGrantPda(
|
|
5458
5467
|
granterX25519,
|
|
5459
5468
|
nonce,
|
|
5460
5469
|
receiverX25519,
|
|
@@ -5475,7 +5484,7 @@ function getNetworkComplianceGrantQuerierFunction(args, deps) {
|
|
|
5475
5484
|
const umbraProgram = client.networkConfig.programId;
|
|
5476
5485
|
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function queryNetworkMxeComplianceGrant(nonce, receiverX25519, options) {
|
|
5477
5486
|
const accountInfoCommitment = options?.accountInfoCommitment ?? "confirmed";
|
|
5478
|
-
const pda = await
|
|
5487
|
+
const pda = await chunkDQ25W34A_cjs.findNetworkComplianceGrantPda(nonce, receiverX25519, umbraProgram);
|
|
5479
5488
|
const accountMap = await accountInfoProvider([pda], { commitment: accountInfoCommitment });
|
|
5480
5489
|
const maybeAccount = accountMap.get(pda);
|
|
5481
5490
|
if (maybeAccount?.exists !== true) {
|
|
@@ -5491,7 +5500,7 @@ function getSharedComplianceGrantQuerierFunction(args, deps) {
|
|
|
5491
5500
|
const umbraProgram = client.networkConfig.programId;
|
|
5492
5501
|
return /* @__PURE__ */ chunkPK6SKIKE_cjs.__name(async function queryNetworkSharedComplianceGrant(granterX25519, nonce, receiverX25519, options) {
|
|
5493
5502
|
const accountInfoCommitment = options?.accountInfoCommitment ?? "confirmed";
|
|
5494
|
-
const pda = await
|
|
5503
|
+
const pda = await chunkDQ25W34A_cjs.findSharedComplianceGrantPda(
|
|
5495
5504
|
granterX25519,
|
|
5496
5505
|
nonce,
|
|
5497
5506
|
receiverX25519,
|
|
@@ -5534,7 +5543,7 @@ function getNetworkEncryptionToSharedEncryptionConverterFunction(args, deps) {
|
|
|
5534
5543
|
const pdaDerivations = await Promise.all(
|
|
5535
5544
|
mints.map(async (mint) => ({
|
|
5536
5545
|
mint,
|
|
5537
|
-
pda: await
|
|
5546
|
+
pda: await chunkDQ25W34A_cjs.findEncryptedTokenAccountPda(
|
|
5538
5547
|
userAddress,
|
|
5539
5548
|
mint,
|
|
5540
5549
|
client.networkConfig.programId
|
|
@@ -5584,7 +5593,7 @@ function getNetworkEncryptionToSharedEncryptionConverterFunction(args, deps) {
|
|
|
5584
5593
|
const transactionPromises = eligibleMints.map(async (mint) => {
|
|
5585
5594
|
const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
|
|
5586
5595
|
const mpcCallbackDataOffset = chunkZY3TSHMJ_cjs.generateRandomU128();
|
|
5587
|
-
const arciumAccounts = await
|
|
5596
|
+
const arciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
|
|
5588
5597
|
client.networkConfig.programId,
|
|
5589
5598
|
client.networkConfig.arciumProgramAddress,
|
|
5590
5599
|
clusterOffset,
|
|
@@ -5695,7 +5704,7 @@ function getMintEncryptionKeyRotatorFunction(args, deps) {
|
|
|
5695
5704
|
const x25519ProvingSigner = await kit.createKeyPairSignerFromPrivateKeyBytes(
|
|
5696
5705
|
keypairResult.ed25519Keypair.seed
|
|
5697
5706
|
);
|
|
5698
|
-
const tokenAccountPda = await
|
|
5707
|
+
const tokenAccountPda = await chunkDQ25W34A_cjs.findEncryptedTokenAccountPda(
|
|
5699
5708
|
userAddress,
|
|
5700
5709
|
mint,
|
|
5701
5710
|
client.networkConfig.programId
|
|
@@ -5737,7 +5746,7 @@ function getMintEncryptionKeyRotatorFunction(args, deps) {
|
|
|
5737
5746
|
}
|
|
5738
5747
|
const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
|
|
5739
5748
|
const mpcCallbackDataOffset = chunkZY3TSHMJ_cjs.generateRandomU128();
|
|
5740
|
-
const arciumAccounts = await
|
|
5749
|
+
const arciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
|
|
5741
5750
|
client.networkConfig.programId,
|
|
5742
5751
|
client.networkConfig.arciumProgramAddress,
|
|
5743
5752
|
clusterOffset,
|
|
@@ -6048,8 +6057,8 @@ function getPublicBalanceToEncryptedBalanceDirectDepositorFunction(args, deps) {
|
|
|
6048
6057
|
let encryptedUserAccountPda;
|
|
6049
6058
|
try {
|
|
6050
6059
|
[encryptedTokenAccountPda, encryptedUserAccountPda] = await Promise.all([
|
|
6051
|
-
|
|
6052
|
-
|
|
6060
|
+
chunkDQ25W34A_cjs.findEncryptedTokenAccountPda(destinationAddress, mint, client.networkConfig.programId),
|
|
6061
|
+
chunkDQ25W34A_cjs.findEncryptedUserAccountPda(destinationAddress, client.networkConfig.programId)
|
|
6053
6062
|
]);
|
|
6054
6063
|
} catch (error) {
|
|
6055
6064
|
throw new chunkBL6WXLPV_cjs.EncryptedDepositError(
|
|
@@ -6118,7 +6127,7 @@ function getPublicBalanceToEncryptedBalanceDirectDepositorFunction(args, deps) {
|
|
|
6118
6127
|
const resetCompDefName = isSharedMode ? "reset_shared_eta_queue_v9" : "reset_mxe_eta_queue_v9";
|
|
6119
6128
|
const resetComputationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
|
|
6120
6129
|
const resetMpcCallbackDataOffset = chunkZY3TSHMJ_cjs.generateRandomU128();
|
|
6121
|
-
const resetArciumAccounts = await
|
|
6130
|
+
const resetArciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
|
|
6122
6131
|
client.networkConfig.programId,
|
|
6123
6132
|
client.networkConfig.arciumProgramAddress,
|
|
6124
6133
|
clusterOffset,
|
|
@@ -6187,7 +6196,7 @@ function getPublicBalanceToEncryptedBalanceDirectDepositorFunction(args, deps) {
|
|
|
6187
6196
|
[DepositInstructionVariant.ExistingSharedBalance]: "deposit_from_public_balance_into_existing_shared_balance_v11"
|
|
6188
6197
|
}[instructionVariant];
|
|
6189
6198
|
const altEntry = chunkAXD7LXYY_cjs.lookupAltEntry(client.networkConfig.addressLookupTables, clusterOffset, compDefInstructionName);
|
|
6190
|
-
const arciumAccounts = await
|
|
6199
|
+
const arciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
|
|
6191
6200
|
client.networkConfig.programId,
|
|
6192
6201
|
client.networkConfig.arciumProgramAddress,
|
|
6193
6202
|
clusterOffset,
|
|
@@ -6794,64 +6803,64 @@ function getEncryptedBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
6794
6803
|
toBn254FieldElement(protocolFeeConfig.merkleRoot)
|
|
6795
6804
|
];
|
|
6796
6805
|
const aggregatedPublicInputHash = await poseidonAggregator(aggregatedHashInputs);
|
|
6797
|
-
const inverseForSenderMvkBlindingFactor =
|
|
6798
|
-
const inverseForSenderPrivateKeyBlindingFactor =
|
|
6806
|
+
const inverseForSenderMvkBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderMvkBlindingFactor);
|
|
6807
|
+
const inverseForSenderPrivateKeyBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
|
|
6799
6808
|
senderPrivateKeyBlindingFactor
|
|
6800
6809
|
);
|
|
6801
|
-
const inverseForSenderPrivateKey =
|
|
6802
|
-
const inverseForSenderMasterViewingKey =
|
|
6803
|
-
const inverseForAmount =
|
|
6804
|
-
const protocolFeeDivisorInverse =
|
|
6805
|
-
const inverseForTotalAmountLimbs =
|
|
6810
|
+
const inverseForSenderPrivateKey = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderPrivateKey);
|
|
6811
|
+
const inverseForSenderMasterViewingKey = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderMasterViewingKey);
|
|
6812
|
+
const inverseForAmount = chunkGXCRPFTT_cjs.computeBn254ModularInverse(toBn254FieldElement(amount));
|
|
6813
|
+
const protocolFeeDivisorInverse = chunkGXCRPFTT_cjs.computeBn254ModularInverse(toBn254FieldElement(16384n));
|
|
6814
|
+
const inverseForTotalAmountLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
|
|
6806
6815
|
amountAsLimbs.low,
|
|
6807
6816
|
amountAsLimbs.middle,
|
|
6808
6817
|
amountAsLimbs.high
|
|
6809
6818
|
]);
|
|
6810
|
-
const inverseForKeysForTotalAmountLimbs =
|
|
6819
|
+
const inverseForKeysForTotalAmountLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
|
|
6811
6820
|
rcEncryptionKeyForAmountAsLimbs.low,
|
|
6812
6821
|
rcEncryptionKeyForAmountAsLimbs.middle,
|
|
6813
6822
|
rcEncryptionKeyForAmountAsLimbs.high
|
|
6814
6823
|
]);
|
|
6815
|
-
const inverseForKeysForProtocolFeeLimbs =
|
|
6824
|
+
const inverseForKeysForProtocolFeeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
|
|
6816
6825
|
rcEncryptionKeyForProtocolFeesAsLimbs.low,
|
|
6817
6826
|
rcEncryptionKeyForProtocolFeesAsLimbs.middle,
|
|
6818
6827
|
rcEncryptionKeyForProtocolFeesAsLimbs.high
|
|
6819
6828
|
]);
|
|
6820
|
-
const inverseForKeysForRandomFactorForPolynomialEvaluationLowLimbs =
|
|
6829
|
+
const inverseForKeysForRandomFactorForPolynomialEvaluationLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
|
|
6821
6830
|
rcEncryptionKeyForRandomFactorLowAsLimbs.low,
|
|
6822
6831
|
rcEncryptionKeyForRandomFactorLowAsLimbs.middle,
|
|
6823
6832
|
rcEncryptionKeyForRandomFactorLowAsLimbs.high
|
|
6824
6833
|
]);
|
|
6825
|
-
const inverseForKeysForRandomFactorForPolynomialEvaluationHighLimbs =
|
|
6834
|
+
const inverseForKeysForRandomFactorForPolynomialEvaluationHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
|
|
6826
6835
|
rcEncryptionKeyForRandomFactorHighAsLimbs.low,
|
|
6827
6836
|
rcEncryptionKeyForRandomFactorHighAsLimbs.middle,
|
|
6828
6837
|
rcEncryptionKeyForRandomFactorHighAsLimbs.high
|
|
6829
6838
|
]);
|
|
6830
|
-
const inverseForNullifier =
|
|
6831
|
-
const inverseForH2BlindingFactor =
|
|
6832
|
-
const inverseForFirstKeystreamBlindingFactor =
|
|
6839
|
+
const inverseForNullifier = chunkGXCRPFTT_cjs.computeBn254ModularInverse(nullifier);
|
|
6840
|
+
const inverseForH2BlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(randomSecret);
|
|
6841
|
+
const inverseForFirstKeystreamBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
|
|
6833
6842
|
firstKeystreamBlindingFactor
|
|
6834
6843
|
);
|
|
6835
|
-
const inverseForSecondKeystreamBlindingFactor =
|
|
6844
|
+
const inverseForSecondKeystreamBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
|
|
6836
6845
|
secondKeystreamBlindingFactor
|
|
6837
6846
|
);
|
|
6838
|
-
const inverseForThirdKeystreamBlindingFactor =
|
|
6847
|
+
const inverseForThirdKeystreamBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
|
|
6839
6848
|
thirdKeystreamBlindingFactor
|
|
6840
6849
|
);
|
|
6841
|
-
const inverseForRandomFactorForPolynomialEvaluationLowLimbs =
|
|
6850
|
+
const inverseForRandomFactorForPolynomialEvaluationLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
|
|
6842
6851
|
randomFactorLowAsLimbs.low,
|
|
6843
6852
|
randomFactorLowAsLimbs.middle,
|
|
6844
6853
|
randomFactorLowAsLimbs.high
|
|
6845
6854
|
]);
|
|
6846
|
-
const inverseForRandomFactorForPolynomialEvaluationHighLimbs =
|
|
6855
|
+
const inverseForRandomFactorForPolynomialEvaluationHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
6847
6856
|
[randomFactorHighAsLimbs.low, randomFactorHighAsLimbs.middle, randomFactorHighAsLimbs.high]
|
|
6848
6857
|
);
|
|
6849
|
-
const inverseForChallengeLimbs =
|
|
6858
|
+
const inverseForChallengeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
|
|
6850
6859
|
fiatShamirChallengeLimbs.low,
|
|
6851
6860
|
fiatShamirChallengeLimbs.middle,
|
|
6852
6861
|
fiatShamirChallengeLimbs.high
|
|
6853
6862
|
]);
|
|
6854
|
-
const inverseForChallengeSquaredLimbs =
|
|
6863
|
+
const inverseForChallengeSquaredLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
|
|
6855
6864
|
fiatShamirChallengeSquaredLimbs.low,
|
|
6856
6865
|
fiatShamirChallengeSquaredLimbs.middle,
|
|
6857
6866
|
fiatShamirChallengeSquaredLimbs.high
|
|
@@ -6995,11 +7004,11 @@ function getEncryptedBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
6995
7004
|
chunkLTCKPTZC_cjs.assertGroth16ProofB(proofB);
|
|
6996
7005
|
chunkLTCKPTZC_cjs.assertGroth16ProofC(proofC);
|
|
6997
7006
|
const stealthPoolIndex = 0n;
|
|
6998
|
-
const stealthPoolAddress = await
|
|
7007
|
+
const stealthPoolAddress = await chunkDQ25W34A_cjs.findStealthPoolPda(
|
|
6999
7008
|
stealthPoolIndex,
|
|
7000
7009
|
client.networkConfig.programId
|
|
7001
7010
|
);
|
|
7002
|
-
const arciumAccounts = await
|
|
7011
|
+
const arciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
|
|
7003
7012
|
client.networkConfig.programId,
|
|
7004
7013
|
client.networkConfig.arciumProgramAddress,
|
|
7005
7014
|
clusterOffset,
|
|
@@ -7086,7 +7095,7 @@ function getEncryptedBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
7086
7095
|
}
|
|
7087
7096
|
chunkPK6SKIKE_cjs.__name(executeTransaction, "executeTransaction");
|
|
7088
7097
|
async function checkAndCloseExistingProofAccount(offset) {
|
|
7089
|
-
const proofAccountPda = await
|
|
7098
|
+
const proofAccountPda = await chunkDQ25W34A_cjs.findUtxoInputBufferPda(
|
|
7090
7099
|
client.signer.address,
|
|
7091
7100
|
offset,
|
|
7092
7101
|
client.networkConfig.programId
|
|
@@ -7395,7 +7404,7 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
7395
7404
|
for (let index = 0; index < 16; index++) {
|
|
7396
7405
|
proofAccountOffset |= BigInt(proofAccountOffsetBytes[index]) << BigInt(index * 8);
|
|
7397
7406
|
}
|
|
7398
|
-
const receiverUserAccountPda = await
|
|
7407
|
+
const receiverUserAccountPda = await chunkDQ25W34A_cjs.findEncryptedUserAccountPda(
|
|
7399
7408
|
destinationAddress,
|
|
7400
7409
|
client.networkConfig.programId
|
|
7401
7410
|
);
|
|
@@ -7784,64 +7793,64 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
7784
7793
|
toBn254FieldElement2(protocolFeeConfig.merkleRoot)
|
|
7785
7794
|
];
|
|
7786
7795
|
const aggregatedPublicInputHash = await poseidonAggregator(aggregatedHashInputs);
|
|
7787
|
-
const inverseForSenderMvkBlindingFactor =
|
|
7788
|
-
const inverseForSenderPrivateKeyBlindingFactor =
|
|
7796
|
+
const inverseForSenderMvkBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderMvkBlindingFactor);
|
|
7797
|
+
const inverseForSenderPrivateKeyBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
|
|
7789
7798
|
senderPrivateKeyBlindingFactor
|
|
7790
7799
|
);
|
|
7791
|
-
const inverseForSenderPrivateKey =
|
|
7792
|
-
const inverseForSenderMasterViewingKey =
|
|
7793
|
-
const inverseForAmount =
|
|
7794
|
-
const protocolFeeDivisorInverse =
|
|
7795
|
-
const inverseForTotalAmountLimbs =
|
|
7800
|
+
const inverseForSenderPrivateKey = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderPrivateKey);
|
|
7801
|
+
const inverseForSenderMasterViewingKey = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderMasterViewingKey);
|
|
7802
|
+
const inverseForAmount = chunkGXCRPFTT_cjs.computeBn254ModularInverse(toBn254FieldElement2(amount));
|
|
7803
|
+
const protocolFeeDivisorInverse = chunkGXCRPFTT_cjs.computeBn254ModularInverse(toBn254FieldElement2(16384n));
|
|
7804
|
+
const inverseForTotalAmountLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
|
|
7796
7805
|
amountAsLimbs.low,
|
|
7797
7806
|
amountAsLimbs.middle,
|
|
7798
7807
|
amountAsLimbs.high
|
|
7799
7808
|
]);
|
|
7800
|
-
const inverseForKeysForTotalAmountLimbs =
|
|
7809
|
+
const inverseForKeysForTotalAmountLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
|
|
7801
7810
|
rcEncryptionKeyForAmountAsLimbs.low,
|
|
7802
7811
|
rcEncryptionKeyForAmountAsLimbs.middle,
|
|
7803
7812
|
rcEncryptionKeyForAmountAsLimbs.high
|
|
7804
7813
|
]);
|
|
7805
|
-
const inverseForKeysForProtocolFeeLimbs =
|
|
7814
|
+
const inverseForKeysForProtocolFeeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
|
|
7806
7815
|
rcEncryptionKeyForProtocolFeesAsLimbs.low,
|
|
7807
7816
|
rcEncryptionKeyForProtocolFeesAsLimbs.middle,
|
|
7808
7817
|
rcEncryptionKeyForProtocolFeesAsLimbs.high
|
|
7809
7818
|
]);
|
|
7810
|
-
const inverseForKeysForRandomFactorForPolynomialEvaluationLowLimbs =
|
|
7819
|
+
const inverseForKeysForRandomFactorForPolynomialEvaluationLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
|
|
7811
7820
|
rcEncryptionKeyForRandomFactorLowAsLimbs.low,
|
|
7812
7821
|
rcEncryptionKeyForRandomFactorLowAsLimbs.middle,
|
|
7813
7822
|
rcEncryptionKeyForRandomFactorLowAsLimbs.high
|
|
7814
7823
|
]);
|
|
7815
|
-
const inverseForKeysForRandomFactorForPolynomialEvaluationHighLimbs =
|
|
7824
|
+
const inverseForKeysForRandomFactorForPolynomialEvaluationHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
|
|
7816
7825
|
rcEncryptionKeyForRandomFactorHighAsLimbs.low,
|
|
7817
7826
|
rcEncryptionKeyForRandomFactorHighAsLimbs.middle,
|
|
7818
7827
|
rcEncryptionKeyForRandomFactorHighAsLimbs.high
|
|
7819
7828
|
]);
|
|
7820
|
-
const inverseForNullifier =
|
|
7821
|
-
const inverseForH2BlindingFactor =
|
|
7822
|
-
const inverseForFirstKeystreamBlindingFactor =
|
|
7829
|
+
const inverseForNullifier = chunkGXCRPFTT_cjs.computeBn254ModularInverse(nullifier);
|
|
7830
|
+
const inverseForH2BlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(randomSecret);
|
|
7831
|
+
const inverseForFirstKeystreamBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
|
|
7823
7832
|
firstKeystreamBlindingFactor
|
|
7824
7833
|
);
|
|
7825
|
-
const inverseForSecondKeystreamBlindingFactor =
|
|
7834
|
+
const inverseForSecondKeystreamBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
|
|
7826
7835
|
secondKeystreamBlindingFactor
|
|
7827
7836
|
);
|
|
7828
|
-
const inverseForThirdKeystreamBlindingFactor =
|
|
7837
|
+
const inverseForThirdKeystreamBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
|
|
7829
7838
|
thirdKeystreamBlindingFactor
|
|
7830
7839
|
);
|
|
7831
|
-
const inverseForRandomFactorForPolynomialEvaluationLowLimbs =
|
|
7840
|
+
const inverseForRandomFactorForPolynomialEvaluationLowLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
|
|
7832
7841
|
randomFactorLowAsLimbs.low,
|
|
7833
7842
|
randomFactorLowAsLimbs.middle,
|
|
7834
7843
|
randomFactorLowAsLimbs.high
|
|
7835
7844
|
]);
|
|
7836
|
-
const inverseForRandomFactorForPolynomialEvaluationHighLimbs =
|
|
7845
|
+
const inverseForRandomFactorForPolynomialEvaluationHighLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse(
|
|
7837
7846
|
[randomFactorHighAsLimbs.low, randomFactorHighAsLimbs.middle, randomFactorHighAsLimbs.high]
|
|
7838
7847
|
);
|
|
7839
|
-
const inverseForChallengeLimbs =
|
|
7848
|
+
const inverseForChallengeLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
|
|
7840
7849
|
fiatShamirChallengeLimbs.low,
|
|
7841
7850
|
fiatShamirChallengeLimbs.middle,
|
|
7842
7851
|
fiatShamirChallengeLimbs.high
|
|
7843
7852
|
]);
|
|
7844
|
-
const inverseForChallengeSquaredLimbs =
|
|
7853
|
+
const inverseForChallengeSquaredLimbs = chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse([
|
|
7845
7854
|
fiatShamirChallengeSquaredLimbs.low,
|
|
7846
7855
|
fiatShamirChallengeSquaredLimbs.middle,
|
|
7847
7856
|
fiatShamirChallengeSquaredLimbs.high
|
|
@@ -7985,11 +7994,11 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
7985
7994
|
chunkLTCKPTZC_cjs.assertGroth16ProofB(proofB);
|
|
7986
7995
|
chunkLTCKPTZC_cjs.assertGroth16ProofC(proofC);
|
|
7987
7996
|
const stealthPoolIndex = 0n;
|
|
7988
|
-
const stealthPoolAddress = await
|
|
7997
|
+
const stealthPoolAddress = await chunkDQ25W34A_cjs.findStealthPoolPda(
|
|
7989
7998
|
stealthPoolIndex,
|
|
7990
7999
|
client.networkConfig.programId
|
|
7991
8000
|
);
|
|
7992
|
-
const arciumAccounts = await
|
|
8001
|
+
const arciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
|
|
7993
8002
|
client.networkConfig.programId,
|
|
7994
8003
|
client.networkConfig.arciumProgramAddress,
|
|
7995
8004
|
clusterOffset,
|
|
@@ -8076,7 +8085,7 @@ function getEncryptedBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8076
8085
|
}
|
|
8077
8086
|
chunkPK6SKIKE_cjs.__name(executeTransaction, "executeTransaction");
|
|
8078
8087
|
async function checkAndCloseExistingProofAccount(offset) {
|
|
8079
|
-
const proofAccountPda = await
|
|
8088
|
+
const proofAccountPda = await chunkDQ25W34A_cjs.findUtxoInputBufferPda(
|
|
8080
8089
|
client.signer.address,
|
|
8081
8090
|
offset,
|
|
8082
8091
|
client.networkConfig.programId
|
|
@@ -8566,19 +8575,19 @@ function getPublicBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8566
8575
|
toBn254FieldElement3(protocolFeeConfig.merkleRoot)
|
|
8567
8576
|
];
|
|
8568
8577
|
const aggregatedPublicInputHash = await poseidonAggregator(aggregatedHashInputs);
|
|
8569
|
-
const inverseForSenderMvkBlindingFactor =
|
|
8570
|
-
const inverseForSenderPrivateKeyBlindingFactor =
|
|
8578
|
+
const inverseForSenderMvkBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderMvkBlindingFactor);
|
|
8579
|
+
const inverseForSenderPrivateKeyBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
|
|
8571
8580
|
senderPrivateKeyBlindingFactor
|
|
8572
8581
|
);
|
|
8573
|
-
const inverseForSenderPrivateKey =
|
|
8574
|
-
const inverseForSenderMasterViewingKey =
|
|
8575
|
-
const inverseForAmount =
|
|
8576
|
-
const inverseForNullifier =
|
|
8577
|
-
const inverseForH2BlindingFactor =
|
|
8578
|
-
const inverseForFirstKeystreamBlindingFactor =
|
|
8582
|
+
const inverseForSenderPrivateKey = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderPrivateKey);
|
|
8583
|
+
const inverseForSenderMasterViewingKey = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderMasterViewingKey);
|
|
8584
|
+
const inverseForAmount = chunkGXCRPFTT_cjs.computeBn254ModularInverse(toBn254FieldElement3(netDepositAmount));
|
|
8585
|
+
const inverseForNullifier = chunkGXCRPFTT_cjs.computeBn254ModularInverse(nullifier);
|
|
8586
|
+
const inverseForH2BlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(randomSecret);
|
|
8587
|
+
const inverseForFirstKeystreamBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
|
|
8579
8588
|
firstKeystreamBlindingFactor
|
|
8580
8589
|
);
|
|
8581
|
-
const inverseForSecondKeystreamBlindingFactor =
|
|
8590
|
+
const inverseForSecondKeystreamBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
|
|
8582
8591
|
secondKeystreamBlindingFactor
|
|
8583
8592
|
);
|
|
8584
8593
|
const zkCircuitInputs = {
|
|
@@ -8628,7 +8637,7 @@ function getPublicBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8628
8637
|
chunkLTCKPTZC_cjs.assertGroth16ProofB(proofB);
|
|
8629
8638
|
chunkLTCKPTZC_cjs.assertGroth16ProofC(proofC);
|
|
8630
8639
|
const stealthPoolIndex = 0n;
|
|
8631
|
-
const stealthPoolAddress = await
|
|
8640
|
+
const stealthPoolAddress = await chunkDQ25W34A_cjs.findStealthPoolPda(
|
|
8632
8641
|
stealthPoolIndex,
|
|
8633
8642
|
client.networkConfig.programId
|
|
8634
8643
|
);
|
|
@@ -8689,7 +8698,7 @@ function getPublicBalanceToSelfClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8689
8698
|
chunkPK6SKIKE_cjs.__name(buildAndSendTransaction, "buildAndSendTransaction");
|
|
8690
8699
|
chunkLTCKPTZC_cjs.assertU128(proofAccountOffset);
|
|
8691
8700
|
let closeProofAccountSignature;
|
|
8692
|
-
const proofAccountPda = await
|
|
8701
|
+
const proofAccountPda = await chunkDQ25W34A_cjs.findPublicUtxoInputBufferPda(
|
|
8693
8702
|
client.signer.address,
|
|
8694
8703
|
proofAccountOffset,
|
|
8695
8704
|
client.networkConfig.programId
|
|
@@ -8867,7 +8876,7 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
8867
8876
|
for (let index = 0; index < 16; index++) {
|
|
8868
8877
|
proofAccountOffset |= BigInt(proofAccountOffsetBytes[index]) << BigInt(index * 8);
|
|
8869
8878
|
}
|
|
8870
|
-
const receiverUserAccountPda = await
|
|
8879
|
+
const receiverUserAccountPda = await chunkDQ25W34A_cjs.findEncryptedUserAccountPda(
|
|
8871
8880
|
destinationAddress,
|
|
8872
8881
|
client.networkConfig.programId
|
|
8873
8882
|
);
|
|
@@ -9096,19 +9105,19 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
9096
9105
|
toBn254FieldElement4(protocolFeeConfig.merkleRoot)
|
|
9097
9106
|
];
|
|
9098
9107
|
const aggregatedPublicInputHash = await poseidonAggregator(aggregatedHashInputs);
|
|
9099
|
-
const inverseForSenderMvkBlindingFactor =
|
|
9100
|
-
const inverseForSenderPrivateKeyBlindingFactor =
|
|
9108
|
+
const inverseForSenderMvkBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderMvkBlindingFactor);
|
|
9109
|
+
const inverseForSenderPrivateKeyBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
|
|
9101
9110
|
senderPrivateKeyBlindingFactor
|
|
9102
9111
|
);
|
|
9103
|
-
const inverseForSenderPrivateKey =
|
|
9104
|
-
const inverseForSenderMasterViewingKey =
|
|
9105
|
-
const inverseForAmount =
|
|
9106
|
-
const inverseForNullifier =
|
|
9107
|
-
const inverseForH2BlindingFactor =
|
|
9108
|
-
const inverseForFirstKeystreamBlindingFactor =
|
|
9112
|
+
const inverseForSenderPrivateKey = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderPrivateKey);
|
|
9113
|
+
const inverseForSenderMasterViewingKey = chunkGXCRPFTT_cjs.computeBn254ModularInverse(senderMasterViewingKey);
|
|
9114
|
+
const inverseForAmount = chunkGXCRPFTT_cjs.computeBn254ModularInverse(toBn254FieldElement4(netDepositAmount));
|
|
9115
|
+
const inverseForNullifier = chunkGXCRPFTT_cjs.computeBn254ModularInverse(nullifier);
|
|
9116
|
+
const inverseForH2BlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(randomSecret);
|
|
9117
|
+
const inverseForFirstKeystreamBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
|
|
9109
9118
|
firstKeystreamBlindingFactor
|
|
9110
9119
|
);
|
|
9111
|
-
const inverseForSecondKeystreamBlindingFactor =
|
|
9120
|
+
const inverseForSecondKeystreamBlindingFactor = chunkGXCRPFTT_cjs.computeBn254ModularInverse(
|
|
9112
9121
|
secondKeystreamBlindingFactor
|
|
9113
9122
|
);
|
|
9114
9123
|
const zkCircuitInputs = {
|
|
@@ -9158,7 +9167,7 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
9158
9167
|
chunkLTCKPTZC_cjs.assertGroth16ProofB(proofB);
|
|
9159
9168
|
chunkLTCKPTZC_cjs.assertGroth16ProofC(proofC);
|
|
9160
9169
|
const stealthPoolIndex = 0n;
|
|
9161
|
-
const stealthPoolAddress = await
|
|
9170
|
+
const stealthPoolAddress = await chunkDQ25W34A_cjs.findStealthPoolPda(
|
|
9162
9171
|
stealthPoolIndex,
|
|
9163
9172
|
client.networkConfig.programId
|
|
9164
9173
|
);
|
|
@@ -9219,7 +9228,7 @@ function getPublicBalanceToReceiverClaimableUtxoCreatorFunction(args, deps) {
|
|
|
9219
9228
|
chunkPK6SKIKE_cjs.__name(buildAndSendTransaction, "buildAndSendTransaction");
|
|
9220
9229
|
chunkLTCKPTZC_cjs.assertU128(proofAccountOffset);
|
|
9221
9230
|
let closeProofAccountSignature;
|
|
9222
|
-
const proofAccountPda = await
|
|
9231
|
+
const proofAccountPda = await chunkDQ25W34A_cjs.findPublicUtxoInputBufferPda(
|
|
9223
9232
|
client.signer.address,
|
|
9224
9233
|
proofAccountOffset,
|
|
9225
9234
|
client.networkConfig.programId
|
|
@@ -9397,7 +9406,7 @@ function getEncryptedBalanceQuerierFunction(args, deps) {
|
|
|
9397
9406
|
pdaDerivations = await Promise.all(
|
|
9398
9407
|
mints.map(async (mint) => ({
|
|
9399
9408
|
mint,
|
|
9400
|
-
pda: await
|
|
9409
|
+
pda: await chunkDQ25W34A_cjs.findEncryptedTokenAccountPda(
|
|
9401
9410
|
userAddress,
|
|
9402
9411
|
mint,
|
|
9403
9412
|
client.networkConfig.programId
|
|
@@ -9525,7 +9534,7 @@ function getUserAccountQuerierFunction(args, deps) {
|
|
|
9525
9534
|
const accountInfoCommitment = options?.accountInfoCommitment ?? "confirmed";
|
|
9526
9535
|
let userAccountPda;
|
|
9527
9536
|
try {
|
|
9528
|
-
userAccountPda = await
|
|
9537
|
+
userAccountPda = await chunkDQ25W34A_cjs.findEncryptedUserAccountPda(userAddress, umbraProgram);
|
|
9529
9538
|
} catch (error) {
|
|
9530
9539
|
throw new chunkBL6WXLPV_cjs.QueryError(
|
|
9531
9540
|
"pda-derivation",
|
|
@@ -9712,7 +9721,7 @@ function getUserRegistrationFunction(args, deps) {
|
|
|
9712
9721
|
"ZK prover is required for anonymous mode registration. Provide zkProver in the deps argument."
|
|
9713
9722
|
);
|
|
9714
9723
|
}
|
|
9715
|
-
const userAccountPda = await
|
|
9724
|
+
const userAccountPda = await chunkDQ25W34A_cjs.findEncryptedUserAccountPda(
|
|
9716
9725
|
signer.address,
|
|
9717
9726
|
client.networkConfig.programId
|
|
9718
9727
|
);
|
|
@@ -10152,7 +10161,7 @@ function getUserRegistrationFunction(args, deps) {
|
|
|
10152
10161
|
}
|
|
10153
10162
|
const zkProof = await zkProver.prove(zkCircuitInputs);
|
|
10154
10163
|
const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
|
|
10155
|
-
const arciumAccounts = await
|
|
10164
|
+
const arciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
|
|
10156
10165
|
client.networkConfig.programId,
|
|
10157
10166
|
client.networkConfig.arciumProgramAddress,
|
|
10158
10167
|
clusterOffset,
|
|
@@ -10536,7 +10545,7 @@ function getEncryptedBalanceToPublicBalanceDirectWithdrawerFunction(args, deps)
|
|
|
10536
10545
|
const computationOffset = chunkZY3TSHMJ_cjs.generateRandomU64();
|
|
10537
10546
|
let arciumAccounts;
|
|
10538
10547
|
try {
|
|
10539
|
-
arciumAccounts = await
|
|
10548
|
+
arciumAccounts = await chunkDQ25W34A_cjs.findArciumInfrastructurePdas(
|
|
10540
10549
|
client.networkConfig.programId,
|
|
10541
10550
|
client.networkConfig.arciumProgramAddress,
|
|
10542
10551
|
clusterOffset,
|
|
@@ -10620,6 +10629,30 @@ function getEncryptedBalanceToPublicBalanceDirectWithdrawerFunction(args, deps)
|
|
|
10620
10629
|
}
|
|
10621
10630
|
chunkPK6SKIKE_cjs.__name(getEncryptedBalanceToPublicBalanceDirectWithdrawerFunction, "getEncryptedBalanceToPublicBalanceDirectWithdrawerFunction");
|
|
10622
10631
|
|
|
10632
|
+
Object.defineProperty(exports, "bn254Add", {
|
|
10633
|
+
enumerable: true,
|
|
10634
|
+
get: function () { return chunkGXCRPFTT_cjs.bn254Add; }
|
|
10635
|
+
});
|
|
10636
|
+
Object.defineProperty(exports, "bn254ModuloPow", {
|
|
10637
|
+
enumerable: true,
|
|
10638
|
+
get: function () { return chunkGXCRPFTT_cjs.bn254ModuloPow; }
|
|
10639
|
+
});
|
|
10640
|
+
Object.defineProperty(exports, "bn254Mul", {
|
|
10641
|
+
enumerable: true,
|
|
10642
|
+
get: function () { return chunkGXCRPFTT_cjs.bn254Mul; }
|
|
10643
|
+
});
|
|
10644
|
+
Object.defineProperty(exports, "bn254Sub", {
|
|
10645
|
+
enumerable: true,
|
|
10646
|
+
get: function () { return chunkGXCRPFTT_cjs.bn254Sub; }
|
|
10647
|
+
});
|
|
10648
|
+
Object.defineProperty(exports, "computeBn254LimbwiseSumInverse", {
|
|
10649
|
+
enumerable: true,
|
|
10650
|
+
get: function () { return chunkGXCRPFTT_cjs.computeBn254LimbwiseSumInverse; }
|
|
10651
|
+
});
|
|
10652
|
+
Object.defineProperty(exports, "computeBn254ModularInverse", {
|
|
10653
|
+
enumerable: true,
|
|
10654
|
+
get: function () { return chunkGXCRPFTT_cjs.computeBn254ModularInverse; }
|
|
10655
|
+
});
|
|
10623
10656
|
Object.defineProperty(exports, "RelayerError", {
|
|
10624
10657
|
enumerable: true,
|
|
10625
10658
|
get: function () { return chunkNKVMSABR_cjs.RelayerError; }
|
|
@@ -10632,6 +10665,78 @@ Object.defineProperty(exports, "pollClaimUntilTerminal", {
|
|
|
10632
10665
|
enumerable: true,
|
|
10633
10666
|
get: function () { return chunkNKVMSABR_cjs.pollClaimUntilTerminal; }
|
|
10634
10667
|
});
|
|
10668
|
+
Object.defineProperty(exports, "ClaimUtxoError", {
|
|
10669
|
+
enumerable: true,
|
|
10670
|
+
get: function () { return chunkBL6WXLPV_cjs.ClaimUtxoError; }
|
|
10671
|
+
});
|
|
10672
|
+
Object.defineProperty(exports, "ComputationMonitorError", {
|
|
10673
|
+
enumerable: true,
|
|
10674
|
+
get: function () { return chunkBL6WXLPV_cjs.ComputationMonitorError; }
|
|
10675
|
+
});
|
|
10676
|
+
Object.defineProperty(exports, "ConversionError", {
|
|
10677
|
+
enumerable: true,
|
|
10678
|
+
get: function () { return chunkBL6WXLPV_cjs.ConversionError; }
|
|
10679
|
+
});
|
|
10680
|
+
Object.defineProperty(exports, "CreateUtxoError", {
|
|
10681
|
+
enumerable: true,
|
|
10682
|
+
get: function () { return chunkBL6WXLPV_cjs.CreateUtxoError; }
|
|
10683
|
+
});
|
|
10684
|
+
Object.defineProperty(exports, "EncryptedDepositError", {
|
|
10685
|
+
enumerable: true,
|
|
10686
|
+
get: function () { return chunkBL6WXLPV_cjs.EncryptedDepositError; }
|
|
10687
|
+
});
|
|
10688
|
+
Object.defineProperty(exports, "EncryptedWithdrawalError", {
|
|
10689
|
+
enumerable: true,
|
|
10690
|
+
get: function () { return chunkBL6WXLPV_cjs.EncryptedWithdrawalError; }
|
|
10691
|
+
});
|
|
10692
|
+
Object.defineProperty(exports, "FetchUtxosError", {
|
|
10693
|
+
enumerable: true,
|
|
10694
|
+
get: function () { return chunkBL6WXLPV_cjs.FetchUtxosError; }
|
|
10695
|
+
});
|
|
10696
|
+
Object.defineProperty(exports, "QueryError", {
|
|
10697
|
+
enumerable: true,
|
|
10698
|
+
get: function () { return chunkBL6WXLPV_cjs.QueryError; }
|
|
10699
|
+
});
|
|
10700
|
+
Object.defineProperty(exports, "RegistrationError", {
|
|
10701
|
+
enumerable: true,
|
|
10702
|
+
get: function () { return chunkBL6WXLPV_cjs.RegistrationError; }
|
|
10703
|
+
});
|
|
10704
|
+
Object.defineProperty(exports, "isClaimUtxoError", {
|
|
10705
|
+
enumerable: true,
|
|
10706
|
+
get: function () { return chunkBL6WXLPV_cjs.isClaimUtxoError; }
|
|
10707
|
+
});
|
|
10708
|
+
Object.defineProperty(exports, "isComputationMonitorError", {
|
|
10709
|
+
enumerable: true,
|
|
10710
|
+
get: function () { return chunkBL6WXLPV_cjs.isComputationMonitorError; }
|
|
10711
|
+
});
|
|
10712
|
+
Object.defineProperty(exports, "isConversionError", {
|
|
10713
|
+
enumerable: true,
|
|
10714
|
+
get: function () { return chunkBL6WXLPV_cjs.isConversionError; }
|
|
10715
|
+
});
|
|
10716
|
+
Object.defineProperty(exports, "isCreateUtxoError", {
|
|
10717
|
+
enumerable: true,
|
|
10718
|
+
get: function () { return chunkBL6WXLPV_cjs.isCreateUtxoError; }
|
|
10719
|
+
});
|
|
10720
|
+
Object.defineProperty(exports, "isEncryptedDepositError", {
|
|
10721
|
+
enumerable: true,
|
|
10722
|
+
get: function () { return chunkBL6WXLPV_cjs.isEncryptedDepositError; }
|
|
10723
|
+
});
|
|
10724
|
+
Object.defineProperty(exports, "isEncryptedWithdrawalError", {
|
|
10725
|
+
enumerable: true,
|
|
10726
|
+
get: function () { return chunkBL6WXLPV_cjs.isEncryptedWithdrawalError; }
|
|
10727
|
+
});
|
|
10728
|
+
Object.defineProperty(exports, "isFetchUtxosError", {
|
|
10729
|
+
enumerable: true,
|
|
10730
|
+
get: function () { return chunkBL6WXLPV_cjs.isFetchUtxosError; }
|
|
10731
|
+
});
|
|
10732
|
+
Object.defineProperty(exports, "isQueryError", {
|
|
10733
|
+
enumerable: true,
|
|
10734
|
+
get: function () { return chunkBL6WXLPV_cjs.isQueryError; }
|
|
10735
|
+
});
|
|
10736
|
+
Object.defineProperty(exports, "isRegistrationError", {
|
|
10737
|
+
enumerable: true,
|
|
10738
|
+
get: function () { return chunkBL6WXLPV_cjs.isRegistrationError; }
|
|
10739
|
+
});
|
|
10635
10740
|
Object.defineProperty(exports, "AES_AUTH_TAG_LENGTH", {
|
|
10636
10741
|
enumerable: true,
|
|
10637
10742
|
get: function () { return chunkJPDF7BIT_cjs.AES_AUTH_TAG_LENGTH; }
|
|
@@ -11196,102 +11301,6 @@ Object.defineProperty(exports, "getYearlyViewingKeyDeriver", {
|
|
|
11196
11301
|
enumerable: true,
|
|
11197
11302
|
get: function () { return chunkJPDF7BIT_cjs.getYearlyViewingKeyDeriver; }
|
|
11198
11303
|
});
|
|
11199
|
-
Object.defineProperty(exports, "ClaimUtxoError", {
|
|
11200
|
-
enumerable: true,
|
|
11201
|
-
get: function () { return chunkBL6WXLPV_cjs.ClaimUtxoError; }
|
|
11202
|
-
});
|
|
11203
|
-
Object.defineProperty(exports, "ComputationMonitorError", {
|
|
11204
|
-
enumerable: true,
|
|
11205
|
-
get: function () { return chunkBL6WXLPV_cjs.ComputationMonitorError; }
|
|
11206
|
-
});
|
|
11207
|
-
Object.defineProperty(exports, "ConversionError", {
|
|
11208
|
-
enumerable: true,
|
|
11209
|
-
get: function () { return chunkBL6WXLPV_cjs.ConversionError; }
|
|
11210
|
-
});
|
|
11211
|
-
Object.defineProperty(exports, "CreateUtxoError", {
|
|
11212
|
-
enumerable: true,
|
|
11213
|
-
get: function () { return chunkBL6WXLPV_cjs.CreateUtxoError; }
|
|
11214
|
-
});
|
|
11215
|
-
Object.defineProperty(exports, "EncryptedDepositError", {
|
|
11216
|
-
enumerable: true,
|
|
11217
|
-
get: function () { return chunkBL6WXLPV_cjs.EncryptedDepositError; }
|
|
11218
|
-
});
|
|
11219
|
-
Object.defineProperty(exports, "EncryptedWithdrawalError", {
|
|
11220
|
-
enumerable: true,
|
|
11221
|
-
get: function () { return chunkBL6WXLPV_cjs.EncryptedWithdrawalError; }
|
|
11222
|
-
});
|
|
11223
|
-
Object.defineProperty(exports, "FetchUtxosError", {
|
|
11224
|
-
enumerable: true,
|
|
11225
|
-
get: function () { return chunkBL6WXLPV_cjs.FetchUtxosError; }
|
|
11226
|
-
});
|
|
11227
|
-
Object.defineProperty(exports, "QueryError", {
|
|
11228
|
-
enumerable: true,
|
|
11229
|
-
get: function () { return chunkBL6WXLPV_cjs.QueryError; }
|
|
11230
|
-
});
|
|
11231
|
-
Object.defineProperty(exports, "RegistrationError", {
|
|
11232
|
-
enumerable: true,
|
|
11233
|
-
get: function () { return chunkBL6WXLPV_cjs.RegistrationError; }
|
|
11234
|
-
});
|
|
11235
|
-
Object.defineProperty(exports, "isClaimUtxoError", {
|
|
11236
|
-
enumerable: true,
|
|
11237
|
-
get: function () { return chunkBL6WXLPV_cjs.isClaimUtxoError; }
|
|
11238
|
-
});
|
|
11239
|
-
Object.defineProperty(exports, "isComputationMonitorError", {
|
|
11240
|
-
enumerable: true,
|
|
11241
|
-
get: function () { return chunkBL6WXLPV_cjs.isComputationMonitorError; }
|
|
11242
|
-
});
|
|
11243
|
-
Object.defineProperty(exports, "isConversionError", {
|
|
11244
|
-
enumerable: true,
|
|
11245
|
-
get: function () { return chunkBL6WXLPV_cjs.isConversionError; }
|
|
11246
|
-
});
|
|
11247
|
-
Object.defineProperty(exports, "isCreateUtxoError", {
|
|
11248
|
-
enumerable: true,
|
|
11249
|
-
get: function () { return chunkBL6WXLPV_cjs.isCreateUtxoError; }
|
|
11250
|
-
});
|
|
11251
|
-
Object.defineProperty(exports, "isEncryptedDepositError", {
|
|
11252
|
-
enumerable: true,
|
|
11253
|
-
get: function () { return chunkBL6WXLPV_cjs.isEncryptedDepositError; }
|
|
11254
|
-
});
|
|
11255
|
-
Object.defineProperty(exports, "isEncryptedWithdrawalError", {
|
|
11256
|
-
enumerable: true,
|
|
11257
|
-
get: function () { return chunkBL6WXLPV_cjs.isEncryptedWithdrawalError; }
|
|
11258
|
-
});
|
|
11259
|
-
Object.defineProperty(exports, "isFetchUtxosError", {
|
|
11260
|
-
enumerable: true,
|
|
11261
|
-
get: function () { return chunkBL6WXLPV_cjs.isFetchUtxosError; }
|
|
11262
|
-
});
|
|
11263
|
-
Object.defineProperty(exports, "isQueryError", {
|
|
11264
|
-
enumerable: true,
|
|
11265
|
-
get: function () { return chunkBL6WXLPV_cjs.isQueryError; }
|
|
11266
|
-
});
|
|
11267
|
-
Object.defineProperty(exports, "isRegistrationError", {
|
|
11268
|
-
enumerable: true,
|
|
11269
|
-
get: function () { return chunkBL6WXLPV_cjs.isRegistrationError; }
|
|
11270
|
-
});
|
|
11271
|
-
Object.defineProperty(exports, "bn254Add", {
|
|
11272
|
-
enumerable: true,
|
|
11273
|
-
get: function () { return chunkYEZBTYCP_cjs.bn254Add; }
|
|
11274
|
-
});
|
|
11275
|
-
Object.defineProperty(exports, "bn254ModuloPow", {
|
|
11276
|
-
enumerable: true,
|
|
11277
|
-
get: function () { return chunkYEZBTYCP_cjs.bn254ModuloPow; }
|
|
11278
|
-
});
|
|
11279
|
-
Object.defineProperty(exports, "bn254Mul", {
|
|
11280
|
-
enumerable: true,
|
|
11281
|
-
get: function () { return chunkYEZBTYCP_cjs.bn254Mul; }
|
|
11282
|
-
});
|
|
11283
|
-
Object.defineProperty(exports, "bn254Sub", {
|
|
11284
|
-
enumerable: true,
|
|
11285
|
-
get: function () { return chunkYEZBTYCP_cjs.bn254Sub; }
|
|
11286
|
-
});
|
|
11287
|
-
Object.defineProperty(exports, "computeBn254LimbwiseSumInverse", {
|
|
11288
|
-
enumerable: true,
|
|
11289
|
-
get: function () { return chunkYEZBTYCP_cjs.computeBn254LimbwiseSumInverse; }
|
|
11290
|
-
});
|
|
11291
|
-
Object.defineProperty(exports, "computeBn254ModularInverse", {
|
|
11292
|
-
enumerable: true,
|
|
11293
|
-
get: function () { return chunkYEZBTYCP_cjs.computeBn254ModularInverse; }
|
|
11294
|
-
});
|
|
11295
11304
|
Object.defineProperty(exports, "bn254FieldElementSampler", {
|
|
11296
11305
|
enumerable: true,
|
|
11297
11306
|
get: function () { return chunkY55PYKXH_cjs.bn254FieldElementSampler; }
|