{
    "file_map": {
        "3": {
            "path": "std/array/mod.nr",
            "source": "use crate::cmp::{Eq, Ord};\nuse crate::convert::From;\nuse crate::runtime::is_unconstrained;\n\nmod check_shuffle;\nmod quicksort;\n\nimpl<T, let N: u32> [T; N] {\n    /// Returns the length of this array.\n    ///\n    /// ```noir\n    /// fn len(self) -> Field\n    /// ```\n    ///\n    /// example\n    ///\n    /// ```noir\n    /// fn main() {\n    ///     let array = [42, 42];\n    ///     assert(array.len() == 2);\n    /// }\n    /// ```\n    #[builtin(array_len)]\n    pub fn len(self) -> u32 {}\n\n    /// Returns this array as a vector.\n    ///\n    /// ```noir\n    /// let array = [1, 2];\n    /// let vector = array.as_vector();\n    /// assert_eq(vector, [1, 2].as_vector());\n    /// ```\n    #[builtin(as_vector)]\n    pub fn as_vector(self) -> [T] {}\n\n    /// Returns this array as a vector.\n    /// This method is deprecated in favor of `as_vector`.\n    ///\n    /// ```noir\n    /// let array = [1, 2];\n    /// let vector = array.as_slice();\n    /// assert_eq(vector, [1, 2].as_vector());\n    /// ```\n    #[builtin(as_vector)]\n    #[deprecated(\"This method has been renamed to `as_vector`\")]\n    pub fn as_slice(self) -> [T] {}\n\n    /// Applies a function to each element of this array, returning a new array containing the mapped elements.\n    ///\n    /// Example:\n    ///\n    /// ```rust\n    /// let a = [1, 2, 3];\n    /// let b = a.map(|a| a * 2);\n    /// assert_eq(b, [2, 4, 6]);\n    /// ```\n    pub fn map<U, Env>(self, f: fn[Env](T) -> U) -> [U; N] {\n        let uninitialized = crate::mem::zeroed();\n        let mut ret = [uninitialized; N];\n\n        for i in 0..self.len() {\n            ret[i] = f(self[i]);\n        }\n\n        ret\n    }\n\n    /// Applies a function to each element of this array along with its index,\n    /// returning a new array containing the mapped elements.\n    ///\n    /// Example:\n    ///\n    /// ```rust\n    /// let a = [1, 2, 3];\n    /// let b = a.mapi(|i, a| i + a * 2);\n    /// assert_eq(b, [2, 5, 8]);\n    /// ```\n    pub fn mapi<U, Env>(self, f: fn[Env](u32, T) -> U) -> [U; N] {\n        let uninitialized = crate::mem::zeroed();\n        let mut ret = [uninitialized; N];\n\n        for i in 0..self.len() {\n            ret[i] = f(i, self[i]);\n        }\n\n        ret\n    }\n\n    /// Applies a function to each element of this array.\n    ///\n    /// Example:\n    ///\n    /// ```rust\n    /// let a = [1, 2, 3];\n    /// let mut b = [0; 3];\n    /// let mut i = 0;\n    /// a.for_each(|x| {\n    ///     b[i] = x;\n    ///     i += 1;\n    /// });\n    /// assert_eq(a, b);\n    /// ```\n    pub fn for_each<Env>(self, f: fn[Env](T) -> ()) {\n        for i in 0..self.len() {\n            f(self[i]);\n        }\n    }\n\n    /// Applies a function to each element of this array along with its index.\n    ///\n    /// Example:\n    ///\n    /// ```rust\n    /// let a = [1, 2, 3];\n    /// let mut b = [0; 3];\n    /// a.for_eachi(|i, x| {\n    ///     b[i] = x;\n    /// });\n    /// assert_eq(a, b);\n    /// ```\n    pub fn for_eachi<Env>(self, f: fn[Env](u32, T) -> ()) {\n        for i in 0..self.len() {\n            f(i, self[i]);\n        }\n    }\n\n    /// Applies a function to each element of the array, returning the final accumulated value. The first\n    /// parameter is the initial value.\n    ///\n    /// This is a left fold, so the given function will be applied to the accumulator and first element of\n    /// the array, then the second, and so on. For a given call the expected result would be equivalent to:\n    ///\n    /// ```rust\n    /// let a1 = [1];\n    /// let a2 = [1, 2];\n    /// let a3 = [1, 2, 3];\n    ///\n    /// let f = |a, b| a - b;\n    /// a1.fold(10, f); //=> f(10, 1)\n    /// a2.fold(10, f); //=> f(f(10, 1), 2)\n    /// a3.fold(10, f); //=> f(f(f(10, 1), 2), 3)\n    ///\n    /// assert_eq(a3.fold(10, f), 10 - 1 - 2 - 3);\n    /// ```\n    pub fn fold<U, Env>(self, mut accumulator: U, f: fn[Env](U, T) -> U) -> U {\n        for elem in self {\n            accumulator = f(accumulator, elem);\n        }\n        accumulator\n    }\n\n    /// Same as fold, but uses the first element as the starting element.\n    ///\n    /// Requires the input array to be non-empty.\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// fn main() {\n    ///     let arr = [1, 2, 3, 4];\n    ///     let reduced = arr.reduce(|a, b| a + b);\n    ///     assert(reduced == 10);\n    /// }\n    /// ```\n    pub fn reduce<Env>(self, f: fn[Env](T, T) -> T) -> T {\n        let mut accumulator = self[0];\n        for i in 1..self.len() {\n            accumulator = f(accumulator, self[i]);\n        }\n        accumulator\n    }\n\n    /// Returns true if all the elements in this array satisfy the given predicate.\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// fn main() {\n    ///     let arr = [2, 2, 2, 2, 2];\n    ///     let all = arr.all(|a| a == 2);\n    ///     assert(all);\n    /// }\n    /// ```\n    pub fn all<Env>(self, predicate: fn[Env](T) -> bool) -> bool {\n        let mut ret = true;\n        for elem in self {\n            ret &= predicate(elem);\n        }\n        ret\n    }\n\n    /// Returns true if any of the elements in this array satisfy the given predicate.\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// fn main() {\n    ///     let arr = [2, 2, 2, 2, 5];\n    ///     let any = arr.any(|a| a == 5);\n    ///     assert(any);\n    /// }\n    /// ```\n    pub fn any<Env>(self, predicate: fn[Env](T) -> bool) -> bool {\n        let mut ret = false;\n        for elem in self {\n            ret |= predicate(elem);\n        }\n        ret\n    }\n\n    /// Concatenates this array with another array.\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// fn main() {\n    ///     let arr1 = [1, 2, 3, 4];\n    ///     let arr2 = [6, 7, 8, 9, 10, 11];\n    ///     let concatenated_arr = arr1.concat(arr2);\n    ///     assert(concatenated_arr == [1, 2, 3, 4, 6, 7, 8, 9, 10, 11]);\n    /// }\n    /// ```\n    pub fn concat<let M: u32>(self, array2: [T; M]) -> [T; N + M] {\n        let mut result = [crate::mem::zeroed(); N + M];\n        for i in 0..N {\n            result[i] = self[i];\n        }\n        for i in 0..M {\n            result[i + N] = array2[i];\n        }\n        result\n    }\n}\n\nimpl<T, let N: u32> [T; N]\nwhere\n    T: Ord + Eq,\n{\n    /// Returns a new sorted array. The original array remains untouched. Notice that this function will\n    /// only work for arrays of fields or integers, not for any arbitrary type. This is because the sorting\n    /// logic it uses internally is optimized specifically for these values. If you need a sort function to\n    /// sort any type, you should use the [`Self::sort_via`] function.\n    ///\n    /// Example:\n    ///\n    /// ```rust\n    /// fn main() {\n    ///     let arr = [42, 32];\n    ///     let sorted = arr.sort();\n    ///     assert(sorted == [32, 42]);\n    /// }\n    /// ```\n    pub fn sort(self) -> Self {\n        self.sort_via(|a, b| a <= b)\n    }\n}\n\nimpl<T, let N: u32> [T; N]\nwhere\n    T: Eq,\n{\n    /// Returns a new sorted array by sorting it with a custom comparison function.\n    /// The original array remains untouched.\n    /// The ordering function must return true if the first argument should be sorted to be before the second argument or is equal to the second argument.\n    ///\n    /// Using this method with an operator like `<` that does not return `true` for equal values will result in an assertion failure for arrays with equal elements.\n    ///\n    /// Example:\n    ///\n    /// ```rust\n    /// fn main() {\n    ///     let arr = [42, 32]\n    ///     let sorted_ascending = arr.sort_via(|a, b| a <= b);\n    ///     assert(sorted_ascending == [32, 42]); // verifies\n    ///\n    ///     let sorted_descending = arr.sort_via(|a, b| a >= b);\n    ///     assert(sorted_descending == [32, 42]); // does not verify\n    /// }\n    /// ```\n    pub fn sort_via<Env>(self, ordering: fn[Env](T, T) -> bool) -> Self {\n        // Safety: `sorted` array is checked to be:\n        // a. a permutation of `input`'s elements\n        // b. satisfying the predicate `ordering`\n        let sorted = unsafe { quicksort::quicksort(self, ordering) };\n\n        if !is_unconstrained() {\n            for i in 0..N - 1 {\n                assert(\n                    ordering(sorted[i], sorted[i + 1]),\n                    \"Array has not been sorted correctly according to `ordering`.\",\n                );\n            }\n            check_shuffle::check_shuffle(self, sorted);\n        }\n        sorted\n    }\n}\n\nimpl<let N: u32> [u8; N] {\n    /// Converts a byte array of type `[u8; N]` to a string. Note that this performs no UTF-8 validation -\n    /// the given array is interpreted as-is as a string.\n    ///\n    /// Example:\n    ///\n    /// ```rust\n    /// fn main() {\n    ///     let hi = [104, 105].as_str_unchecked();\n    ///     assert_eq(hi, \"hi\");\n    /// }\n    /// ```\n    #[builtin(array_as_str_unchecked)]\n    pub fn as_str_unchecked(self) -> str<N> {}\n}\n\nimpl<let N: u32> From<str<N>> for [u8; N] {\n    /// Returns an array of the string bytes.\n    fn from(s: str<N>) -> Self {\n        s.as_bytes()\n    }\n}\n\nmod test {\n    #[test]\n    fn map_empty() {\n        assert_eq([].map(|x| x + 1), []);\n    }\n\n    global arr_with_100_values: [u32; 100] = [\n        42, 123, 87, 93, 48, 80, 50, 5, 104, 84, 70, 47, 119, 66, 71, 121, 3, 29, 42, 118, 2, 54,\n        89, 44, 81, 0, 26, 106, 68, 96, 84, 48, 95, 54, 45, 32, 89, 100, 109, 19, 37, 41, 19, 98,\n        53, 114, 107, 66, 6, 74, 13, 19, 105, 64, 123, 28, 44, 50, 89, 58, 123, 126, 21, 43, 86, 35,\n        21, 62, 82, 0, 108, 120, 72, 72, 62, 80, 12, 71, 70, 86, 116, 73, 38, 15, 127, 81, 30, 8,\n        125, 28, 26, 69, 114, 63, 27, 28, 61, 42, 13, 32,\n    ];\n    global expected_with_100_values: [u32; 100] = [\n        0, 0, 2, 3, 5, 6, 8, 12, 13, 13, 15, 19, 19, 19, 21, 21, 26, 26, 27, 28, 28, 28, 29, 30, 32,\n        32, 35, 37, 38, 41, 42, 42, 42, 43, 44, 44, 45, 47, 48, 48, 50, 50, 53, 54, 54, 58, 61, 62,\n        62, 63, 64, 66, 66, 68, 69, 70, 70, 71, 71, 72, 72, 73, 74, 80, 80, 81, 81, 82, 84, 84, 86,\n        86, 87, 89, 89, 89, 93, 95, 96, 98, 100, 104, 105, 106, 107, 108, 109, 114, 114, 116, 118,\n        119, 120, 121, 123, 123, 123, 125, 126, 127,\n    ];\n    fn sort_u32(a: u32, b: u32) -> bool {\n        a <= b\n    }\n\n    #[test]\n    fn test_sort() {\n        let mut arr: [u32; 7] = [3, 6, 8, 10, 1, 2, 1];\n\n        let sorted = arr.sort();\n\n        let expected: [u32; 7] = [1, 1, 2, 3, 6, 8, 10];\n        assert(sorted == expected);\n    }\n\n    #[test]\n    fn test_sort_100_values() {\n        let mut arr: [u32; 100] = [\n            42, 123, 87, 93, 48, 80, 50, 5, 104, 84, 70, 47, 119, 66, 71, 121, 3, 29, 42, 118, 2,\n            54, 89, 44, 81, 0, 26, 106, 68, 96, 84, 48, 95, 54, 45, 32, 89, 100, 109, 19, 37, 41,\n            19, 98, 53, 114, 107, 66, 6, 74, 13, 19, 105, 64, 123, 28, 44, 50, 89, 58, 123, 126, 21,\n            43, 86, 35, 21, 62, 82, 0, 108, 120, 72, 72, 62, 80, 12, 71, 70, 86, 116, 73, 38, 15,\n            127, 81, 30, 8, 125, 28, 26, 69, 114, 63, 27, 28, 61, 42, 13, 32,\n        ];\n\n        let sorted = arr.sort();\n\n        let expected: [u32; 100] = [\n            0, 0, 2, 3, 5, 6, 8, 12, 13, 13, 15, 19, 19, 19, 21, 21, 26, 26, 27, 28, 28, 28, 29, 30,\n            32, 32, 35, 37, 38, 41, 42, 42, 42, 43, 44, 44, 45, 47, 48, 48, 50, 50, 53, 54, 54, 58,\n            61, 62, 62, 63, 64, 66, 66, 68, 69, 70, 70, 71, 71, 72, 72, 73, 74, 80, 80, 81, 81, 82,\n            84, 84, 86, 86, 87, 89, 89, 89, 93, 95, 96, 98, 100, 104, 105, 106, 107, 108, 109, 114,\n            114, 116, 118, 119, 120, 121, 123, 123, 123, 125, 126, 127,\n        ];\n        assert(sorted == expected);\n    }\n\n    #[test]\n    fn test_sort_100_values_comptime() {\n        let sorted = arr_with_100_values.sort();\n        assert(sorted == expected_with_100_values);\n    }\n\n    #[test]\n    fn test_sort_via() {\n        let mut arr: [u32; 7] = [3, 6, 8, 10, 1, 2, 1];\n\n        let sorted = arr.sort_via(sort_u32);\n\n        let expected: [u32; 7] = [1, 1, 2, 3, 6, 8, 10];\n        assert(sorted == expected);\n    }\n\n    #[test]\n    fn test_sort_via_100_values() {\n        let mut arr: [u32; 100] = [\n            42, 123, 87, 93, 48, 80, 50, 5, 104, 84, 70, 47, 119, 66, 71, 121, 3, 29, 42, 118, 2,\n            54, 89, 44, 81, 0, 26, 106, 68, 96, 84, 48, 95, 54, 45, 32, 89, 100, 109, 19, 37, 41,\n            19, 98, 53, 114, 107, 66, 6, 74, 13, 19, 105, 64, 123, 28, 44, 50, 89, 58, 123, 126, 21,\n            43, 86, 35, 21, 62, 82, 0, 108, 120, 72, 72, 62, 80, 12, 71, 70, 86, 116, 73, 38, 15,\n            127, 81, 30, 8, 125, 28, 26, 69, 114, 63, 27, 28, 61, 42, 13, 32,\n        ];\n\n        let sorted = arr.sort_via(sort_u32);\n\n        let expected: [u32; 100] = [\n            0, 0, 2, 3, 5, 6, 8, 12, 13, 13, 15, 19, 19, 19, 21, 21, 26, 26, 27, 28, 28, 28, 29, 30,\n            32, 32, 35, 37, 38, 41, 42, 42, 42, 43, 44, 44, 45, 47, 48, 48, 50, 50, 53, 54, 54, 58,\n            61, 62, 62, 63, 64, 66, 66, 68, 69, 70, 70, 71, 71, 72, 72, 73, 74, 80, 80, 81, 81, 82,\n            84, 84, 86, 86, 87, 89, 89, 89, 93, 95, 96, 98, 100, 104, 105, 106, 107, 108, 109, 114,\n            114, 116, 118, 119, 120, 121, 123, 123, 123, 125, 126, 127,\n        ];\n        assert(sorted == expected);\n    }\n\n    #[test]\n    fn mapi_empty() {\n        assert_eq([].mapi(|i, x| i * x + 1), []);\n    }\n\n    #[test]\n    fn for_each_empty() {\n        let empty_array: [Field; 0] = [];\n        empty_array.for_each(|_x| assert(false));\n    }\n\n    #[test]\n    fn for_eachi_empty() {\n        let empty_array: [Field; 0] = [];\n        empty_array.for_eachi(|_i, _x| assert(false));\n    }\n\n    #[test]\n    fn map_example() {\n        let a = [1, 2, 3];\n        let b = a.map(|a| a * 2);\n        assert_eq(b, [2, 4, 6]);\n    }\n\n    #[test]\n    fn mapi_example() {\n        let a = [1, 2, 3];\n        let b = a.mapi(|i, a| i + a * 2);\n        assert_eq(b, [2, 5, 8]);\n    }\n\n    #[test]\n    fn for_each_example() {\n        let a = [1, 2, 3];\n        let mut b = [0, 0, 0];\n        let b_ref = &mut b;\n        let mut i = 0;\n        let i_ref = &mut i;\n        a.for_each(|x| {\n            b_ref[*i_ref] = x * 2;\n            *i_ref += 1;\n        });\n        assert_eq(b, [2, 4, 6]);\n        assert_eq(i, 3);\n    }\n\n    #[test]\n    fn for_eachi_example() {\n        let a = [1, 2, 3];\n        let mut b = [0, 0, 0];\n        let b_ref = &mut b;\n        a.for_eachi(|i, a| { b_ref[i] = i + a * 2; });\n        assert_eq(b, [2, 5, 8]);\n    }\n\n    #[test]\n    fn concat() {\n        let arr1 = [1, 2, 3, 4];\n        let arr2 = [6, 7, 8, 9, 10, 11];\n        let concatenated_arr = arr1.concat(arr2);\n        assert_eq(concatenated_arr, [1, 2, 3, 4, 6, 7, 8, 9, 10, 11]);\n    }\n\n    #[test]\n    fn concat_zero_length_with_something() {\n        let arr1 = [];\n        let arr2 = [1];\n        let concatenated_arr = arr1.concat(arr2);\n        assert_eq(concatenated_arr, [1]);\n    }\n\n    #[test]\n    fn concat_something_with_zero_length() {\n        let arr1 = [1];\n        let arr2 = [];\n        let concatenated_arr = arr1.concat(arr2);\n        assert_eq(concatenated_arr, [1]);\n    }\n\n    #[test]\n    fn concat_zero_lengths() {\n        let arr1: [Field; 0] = [];\n        let arr2: [Field; 0] = [];\n        let concatenated_arr = arr1.concat(arr2);\n        assert_eq(concatenated_arr, []);\n    }\n}\n"
        },
        "5": {
            "path": "std/cmp.nr",
            "source": "use crate::meta::derive_via;\n\n#[derive_via(derive_eq)]\n// docs:start:eq-trait\npub trait Eq {\n    fn eq(self, other: Self) -> bool;\n}\n// docs:end:eq-trait\n\n// docs:start:derive_eq\ncomptime fn derive_eq(s: TypeDefinition) -> Quoted {\n    let signature = quote { fn eq(_self: Self, _other: Self) -> bool };\n    let for_each_field = |name| quote { (_self.$name == _other.$name) };\n    let body = |fields| {\n        if s.fields_as_written().len() == 0 {\n            quote { true }\n        } else {\n            fields\n        }\n    };\n    crate::meta::make_trait_impl(\n        s,\n        quote { $crate::cmp::Eq },\n        signature,\n        for_each_field,\n        quote { & },\n        body,\n    )\n}\n// docs:end:derive_eq\n\nimpl Eq for Field {\n    fn eq(self, other: Field) -> bool {\n        self == other\n    }\n}\n\nimpl Eq for u128 {\n    fn eq(self, other: u128) -> bool {\n        self == other\n    }\n}\nimpl Eq for u64 {\n    fn eq(self, other: u64) -> bool {\n        self == other\n    }\n}\nimpl Eq for u32 {\n    fn eq(self, other: u32) -> bool {\n        self == other\n    }\n}\nimpl Eq for u16 {\n    fn eq(self, other: u16) -> bool {\n        self == other\n    }\n}\nimpl Eq for u8 {\n    fn eq(self, other: u8) -> bool {\n        self == other\n    }\n}\nimpl Eq for u1 {\n    fn eq(self, other: u1) -> bool {\n        self == other\n    }\n}\n\nimpl Eq for i8 {\n    fn eq(self, other: i8) -> bool {\n        self == other\n    }\n}\nimpl Eq for i16 {\n    fn eq(self, other: i16) -> bool {\n        self == other\n    }\n}\nimpl Eq for i32 {\n    fn eq(self, other: i32) -> bool {\n        self == other\n    }\n}\nimpl Eq for i64 {\n    fn eq(self, other: i64) -> bool {\n        self == other\n    }\n}\n\nimpl Eq for () {\n    fn eq(_self: Self, _other: ()) -> bool {\n        true\n    }\n}\nimpl Eq for bool {\n    fn eq(self, other: bool) -> bool {\n        self == other\n    }\n}\n\nimpl<T, let N: u32> Eq for [T; N]\nwhere\n    T: Eq,\n{\n    fn eq(self, other: [T; N]) -> bool {\n        let mut result = true;\n        for i in 0..self.len() {\n            result &= self[i].eq(other[i]);\n        }\n        result\n    }\n}\n\nimpl<T> Eq for [T]\nwhere\n    T: Eq,\n{\n    fn eq(self, other: [T]) -> bool {\n        let mut result = self.len() == other.len();\n        if result {\n            for i in 0..self.len() {\n                result &= self[i].eq(other[i]);\n            }\n        }\n        result\n    }\n}\n\nimpl<let N: u32> Eq for str<N> {\n    fn eq(self, other: str<N>) -> bool {\n        let self_bytes = self.as_bytes();\n        let other_bytes = other.as_bytes();\n        self_bytes == other_bytes\n    }\n}\n\nimpl<A, B> Eq for (A, B)\nwhere\n    A: Eq,\n    B: Eq,\n{\n    fn eq(self, other: (A, B)) -> bool {\n        self.0.eq(other.0) & self.1.eq(other.1)\n    }\n}\n\nimpl<A, B, C> Eq for (A, B, C)\nwhere\n    A: Eq,\n    B: Eq,\n    C: Eq,\n{\n    fn eq(self, other: (A, B, C)) -> bool {\n        self.0.eq(other.0) & self.1.eq(other.1) & self.2.eq(other.2)\n    }\n}\n\nimpl<A, B, C, D> Eq for (A, B, C, D)\nwhere\n    A: Eq,\n    B: Eq,\n    C: Eq,\n    D: Eq,\n{\n    fn eq(self, other: (A, B, C, D)) -> bool {\n        self.0.eq(other.0) & self.1.eq(other.1) & self.2.eq(other.2) & self.3.eq(other.3)\n    }\n}\n\nimpl<A, B, C, D, E> Eq for (A, B, C, D, E)\nwhere\n    A: Eq,\n    B: Eq,\n    C: Eq,\n    D: Eq,\n    E: Eq,\n{\n    fn eq(self, other: (A, B, C, D, E)) -> bool {\n        self.0.eq(other.0)\n            & self.1.eq(other.1)\n            & self.2.eq(other.2)\n            & self.3.eq(other.3)\n            & self.4.eq(other.4)\n    }\n}\n\nimpl Eq for Ordering {\n    fn eq(self, other: Ordering) -> bool {\n        self.result == other.result\n    }\n}\n\n// Noir doesn't have enums yet so we emulate (Lt | Eq | Gt) with a struct\n// that has 3 public functions for constructing the struct.\npub struct Ordering {\n    result: Field,\n}\n\nimpl Ordering {\n    // Implementation note: 0, 1, and 2 for Lt, Eq, and Gt are built\n    // into the compiler, do not change these without also updating\n    // the compiler itself!\n    pub fn less() -> Ordering {\n        Ordering { result: 0 }\n    }\n\n    pub fn equal() -> Ordering {\n        Ordering { result: 1 }\n    }\n\n    pub fn greater() -> Ordering {\n        Ordering { result: 2 }\n    }\n}\n\n#[derive_via(derive_ord)]\n// docs:start:ord-trait\npub trait Ord {\n    fn cmp(self, other: Self) -> Ordering;\n}\n// docs:end:ord-trait\n\n// docs:start:derive_ord\ncomptime fn derive_ord(s: TypeDefinition) -> Quoted {\n    let name = quote { $crate::cmp::Ord };\n    let signature = quote { fn cmp(_self: Self, _other: Self) -> $crate::cmp::Ordering };\n    let for_each_field = |name| quote {\n        if result == $crate::cmp::Ordering::equal() {\n            result = _self.$name.cmp(_other.$name);\n        }\n    };\n    let body = |fields| quote {\n        let mut result = $crate::cmp::Ordering::equal();\n        $fields\n        result\n    };\n    crate::meta::make_trait_impl(s, name, signature, for_each_field, quote {}, body)\n}\n// docs:end:derive_ord\n\n// Note: Field deliberately does not implement Ord\n\nimpl Ord for u128 {\n    fn cmp(self, other: u128) -> Ordering {\n        if self < other {\n            Ordering::less()\n        } else if self > other {\n            Ordering::greater()\n        } else {\n            Ordering::equal()\n        }\n    }\n}\nimpl Ord for u64 {\n    fn cmp(self, other: u64) -> Ordering {\n        if self < other {\n            Ordering::less()\n        } else if self > other {\n            Ordering::greater()\n        } else {\n            Ordering::equal()\n        }\n    }\n}\n\nimpl Ord for u32 {\n    fn cmp(self, other: u32) -> Ordering {\n        if self < other {\n            Ordering::less()\n        } else if self > other {\n            Ordering::greater()\n        } else {\n            Ordering::equal()\n        }\n    }\n}\n\nimpl Ord for u16 {\n    fn cmp(self, other: u16) -> Ordering {\n        if self < other {\n            Ordering::less()\n        } else if self > other {\n            Ordering::greater()\n        } else {\n            Ordering::equal()\n        }\n    }\n}\n\nimpl Ord for u8 {\n    fn cmp(self, other: u8) -> Ordering {\n        if self < other {\n            Ordering::less()\n        } else if self > other {\n            Ordering::greater()\n        } else {\n            Ordering::equal()\n        }\n    }\n}\n\nimpl Ord for i8 {\n    fn cmp(self, other: i8) -> Ordering {\n        if self < other {\n            Ordering::less()\n        } else if self > other {\n            Ordering::greater()\n        } else {\n            Ordering::equal()\n        }\n    }\n}\n\nimpl Ord for i16 {\n    fn cmp(self, other: i16) -> Ordering {\n        if self < other {\n            Ordering::less()\n        } else if self > other {\n            Ordering::greater()\n        } else {\n            Ordering::equal()\n        }\n    }\n}\n\nimpl Ord for i32 {\n    fn cmp(self, other: i32) -> Ordering {\n        if self < other {\n            Ordering::less()\n        } else if self > other {\n            Ordering::greater()\n        } else {\n            Ordering::equal()\n        }\n    }\n}\n\nimpl Ord for i64 {\n    fn cmp(self, other: i64) -> Ordering {\n        if self < other {\n            Ordering::less()\n        } else if self > other {\n            Ordering::greater()\n        } else {\n            Ordering::equal()\n        }\n    }\n}\n\nimpl Ord for () {\n    fn cmp(_self: Self, _other: ()) -> Ordering {\n        Ordering::equal()\n    }\n}\n\nimpl Ord for bool {\n    fn cmp(self, other: bool) -> Ordering {\n        if self {\n            if other {\n                Ordering::equal()\n            } else {\n                Ordering::greater()\n            }\n        } else if other {\n            Ordering::less()\n        } else {\n            Ordering::equal()\n        }\n    }\n}\n\nimpl<T, let N: u32> Ord for [T; N]\nwhere\n    T: Ord,\n{\n    // The first non-equal element of both arrays determines\n    // the ordering for the whole array.\n    fn cmp(self, other: [T; N]) -> Ordering {\n        let mut result = Ordering::equal();\n        for i in 0..self.len() {\n            if result == Ordering::equal() {\n                result = self[i].cmp(other[i]);\n            }\n        }\n        result\n    }\n}\n\nimpl<T> Ord for [T]\nwhere\n    T: Ord,\n{\n    // The first non-equal element of both arrays determines\n    // the ordering for the whole array.\n    fn cmp(self, other: [T]) -> Ordering {\n        let self_len = self.len();\n        let other_len = other.len();\n        let min_len = if self_len < other_len {\n            self_len\n        } else {\n            other_len\n        };\n\n        let mut result = Ordering::equal();\n        for i in 0..min_len {\n            if result == Ordering::equal() {\n                result = self[i].cmp(other[i]);\n            }\n        }\n\n        if result != Ordering::equal() {\n            result\n        } else {\n            self_len.cmp(other_len)\n        }\n    }\n}\n\nimpl<A, B> Ord for (A, B)\nwhere\n    A: Ord,\n    B: Ord,\n{\n    fn cmp(self, other: (A, B)) -> Ordering {\n        let result = self.0.cmp(other.0);\n\n        if result != Ordering::equal() {\n            result\n        } else {\n            self.1.cmp(other.1)\n        }\n    }\n}\n\nimpl<A, B, C> Ord for (A, B, C)\nwhere\n    A: Ord,\n    B: Ord,\n    C: Ord,\n{\n    fn cmp(self, other: (A, B, C)) -> Ordering {\n        let mut result = self.0.cmp(other.0);\n\n        if result == Ordering::equal() {\n            result = self.1.cmp(other.1);\n        }\n\n        if result == Ordering::equal() {\n            result = self.2.cmp(other.2);\n        }\n\n        result\n    }\n}\n\nimpl<A, B, C, D> Ord for (A, B, C, D)\nwhere\n    A: Ord,\n    B: Ord,\n    C: Ord,\n    D: Ord,\n{\n    fn cmp(self, other: (A, B, C, D)) -> Ordering {\n        let mut result = self.0.cmp(other.0);\n\n        if result == Ordering::equal() {\n            result = self.1.cmp(other.1);\n        }\n\n        if result == Ordering::equal() {\n            result = self.2.cmp(other.2);\n        }\n\n        if result == Ordering::equal() {\n            result = self.3.cmp(other.3);\n        }\n\n        result\n    }\n}\n\nimpl<A, B, C, D, E> Ord for (A, B, C, D, E)\nwhere\n    A: Ord,\n    B: Ord,\n    C: Ord,\n    D: Ord,\n    E: Ord,\n{\n    fn cmp(self, other: (A, B, C, D, E)) -> Ordering {\n        let mut result = self.0.cmp(other.0);\n\n        if result == Ordering::equal() {\n            result = self.1.cmp(other.1);\n        }\n\n        if result == Ordering::equal() {\n            result = self.2.cmp(other.2);\n        }\n\n        if result == Ordering::equal() {\n            result = self.3.cmp(other.3);\n        }\n\n        if result == Ordering::equal() {\n            result = self.4.cmp(other.4);\n        }\n\n        result\n    }\n}\n\n// Compares and returns the maximum of two values.\n//\n// Returns the second argument if the comparison determines them to be equal.\n//\n// # Examples\n//\n// ```\n// use std::cmp;\n//\n// assert_eq(cmp::max(1, 2), 2);\n// assert_eq(cmp::max(2, 2), 2);\n// ```\npub fn max<T>(v1: T, v2: T) -> T\nwhere\n    T: Ord,\n{\n    if v1 > v2 {\n        v1\n    } else {\n        v2\n    }\n}\n\n// Compares and returns the minimum of two values.\n//\n// Returns the first argument if the comparison determines them to be equal.\n//\n// # Examples\n//\n// ```\n// use std::cmp;\n//\n// assert_eq(cmp::min(1, 2), 1);\n// assert_eq(cmp::min(2, 2), 2);\n// ```\npub fn min<T>(v1: T, v2: T) -> T\nwhere\n    T: Ord,\n{\n    if v1 > v2 {\n        v2\n    } else {\n        v1\n    }\n}\n\nmod cmp_tests {\n    use super::{Eq, max, min, Ord};\n\n    #[test]\n    fn sanity_check_min() {\n        assert_eq(min(0_u64, 1), 0);\n        assert_eq(min(0_u64, 0), 0);\n        assert_eq(min(1_u64, 1), 1);\n        assert_eq(min(255_u8, 0), 0);\n    }\n\n    #[test]\n    fn sanity_check_max() {\n        assert_eq(max(0_u64, 1), 1);\n        assert_eq(max(0_u64, 0), 0);\n        assert_eq(max(1_u64, 1), 1);\n        assert_eq(max(255_u8, 0), 255);\n    }\n\n    #[test]\n    fn correctly_handles_unequal_length_vectors() {\n        let vector_1 = [0, 1, 2, 3].as_vector();\n        let vector_2 = [0, 1, 2].as_vector();\n        assert(!vector_1.eq(vector_2));\n    }\n\n    #[test]\n    fn lexicographic_ordering_for_vectors() {\n        assert(\n            [2_u32].as_vector().cmp([1_u32, 1_u32, 1_u32].as_vector())\n                == super::Ordering::greater(),\n        );\n        assert(\n            [1_u32, 2_u32].as_vector().cmp([1_u32, 2_u32, 3_u32].as_vector())\n                == super::Ordering::less(),\n        );\n    }\n}\n"
        },
        "6": {
            "path": "std/collections/bounded_vec.nr",
            "source": "use crate::{cmp::Eq, convert::From, runtime::is_unconstrained, static_assert};\n\n/// A `BoundedVec<T, MaxLen>` is a growable storage similar to a built-in vector except that it\n/// is bounded with a maximum possible length. `BoundedVec` is also not\n/// subject to the same restrictions vectors are (notably, nested vectors are disallowed).\n///\n/// Since a BoundedVec is backed by a normal array under the hood, growing the BoundedVec by\n/// pushing an additional element is also more efficient - the length only needs to be increased\n/// by one.\n///\n/// For these reasons `BoundedVec<T, N>` should generally be preferred over vectors when there\n/// is a reasonable maximum bound that can be placed on the vector.\n///\n/// Example:\n///\n/// ```noir\n/// let mut vector: BoundedVec<Field, 10> = BoundedVec::new();\n/// for i in 0..5 {\n///     vector.push(i);\n/// }\n/// assert(vector.len() == 5);\n/// assert(vector.max_len() == 10);\n/// ```\npub struct BoundedVec<T, let MaxLen: u32> {\n    storage: [T; MaxLen],\n    len: u32,\n}\n\nimpl<T, let MaxLen: u32> BoundedVec<T, MaxLen> {\n    /// Creates a new, empty vector of length zero.\n    ///\n    /// Since this container is backed by an array internally, it still needs an initial value\n    /// to give each element. To resolve this, each element is zeroed internally. This value\n    /// is guaranteed to be inaccessible unless `get_unchecked` is used.\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// let empty_vector: BoundedVec<Field, 10> = BoundedVec::new();\n    /// assert(empty_vector.len() == 0);\n    /// ```\n    ///\n    /// Note that whenever calling `new` the maximum length of the vector should always be specified\n    /// via a type signature:\n    ///\n    /// ```noir\n    /// fn good() -> BoundedVec<Field, 10> {\n    ///     // Ok! MaxLen is specified with a type annotation\n    ///     let v1: BoundedVec<Field, 3> = BoundedVec::new();\n    ///     let v2 = BoundedVec::new();\n    ///\n    ///     // Ok! MaxLen is known from the type of `good`'s return value\n    ///     v2\n    /// }\n    ///\n    /// fn bad() {\n    ///     // Error: Type annotation needed\n    ///     // The compiler can't infer `MaxLen` from the following code:\n    ///     let mut v3 = BoundedVec::new();\n    ///     v3.push(5);\n    /// }\n    /// ```\n    ///\n    /// This defaulting of `MaxLen` (and numeric generics in general) to zero may change in future noir versions\n    /// but for now make sure to use type annotations when using bounded vectors. Otherwise, you will receive a\n    /// constraint failure at runtime when the vec is pushed to.\n    pub fn new() -> Self {\n        let zeroed = crate::mem::zeroed();\n        BoundedVec { storage: [zeroed; MaxLen], len: 0 }\n    }\n\n    /// Retrieves an element from the vector at the given index, starting from zero.\n    ///\n    /// If the given index is equal to or greater than the length of the vector, this\n    /// will issue a constraint failure.\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// fn foo<let N: u32>(v: BoundedVec<u32, N>) {\n    ///     let first = v.get(0);\n    ///     let last = v.get(v.len() - 1);\n    ///     assert(first != last);\n    /// }\n    /// ```\n    pub fn get(self, index: u32) -> T {\n        assert(index < self.len, \"Attempted to read past end of BoundedVec\");\n        self.get_unchecked(index)\n    }\n\n    /// Retrieves an element from the vector at the given index, starting from zero, without\n    /// performing a bounds check.\n    ///\n    /// Since this function does not perform a bounds check on length before accessing the element,\n    /// it is unsafe! Use at your own risk!\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// fn sum_of_first_three<let N: u32>(v: BoundedVec<u32, N>) -> u32 {\n    ///     // Always ensure the length is larger than the largest\n    ///     // index passed to get_unchecked\n    ///     assert(v.len() > 2);\n    ///     let first = v.get_unchecked(0);\n    ///     let second = v.get_unchecked(1);\n    ///     let third = v.get_unchecked(2);\n    ///     first + second + third\n    /// }\n    /// ```\n    pub fn get_unchecked(self, index: u32) -> T {\n        self.storage[index]\n    }\n\n    /// Writes an element to the vector at the given index, starting from zero.\n    ///\n    /// If the given index is equal to or greater than the length of the vector, this will issue a constraint failure.\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// fn foo<let N: u32>(v: BoundedVec<u32, N>) {\n    ///     let first = v.get(0);\n    ///     assert(first != 42);\n    ///     v.set(0, 42);\n    ///     let new_first = v.get(0);\n    ///     assert(new_first == 42);\n    /// }\n    /// ```\n    pub fn set(&mut self, index: u32, value: T) {\n        assert(index < self.len, \"Attempted to write past end of BoundedVec\");\n        self.set_unchecked(index, value)\n    }\n\n    /// Writes an element to the vector at the given index, starting from zero, without performing a bounds check.\n    ///\n    /// Since this function does not perform a bounds check on length before accessing the element, it is unsafe! Use at your own risk!\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// fn set_unchecked_example() {\n    ///     let mut vec: BoundedVec<u32, 5> = BoundedVec::new();\n    ///     vec.extend_from_array([1, 2]);\n    ///\n    ///     // Here we're safely writing within the valid range of `vec`\n    ///     // `vec` now has the value [42, 2]\n    ///     vec.set_unchecked(0, 42);\n    ///\n    ///     // We can then safely read this value back out of `vec`.\n    ///     // Notice that we use the checked version of `get` which would prevent reading unsafe values.\n    ///     assert_eq(vec.get(0), 42);\n    ///\n    ///     // We've now written past the end of `vec`.\n    ///     // As this index is still within the maximum potential length of `v`,\n    ///     // it won't cause a constraint failure.\n    ///     vec.set_unchecked(2, 42);\n    ///     println(vec);\n    ///\n    ///     // This will write past the end of the maximum potential length of `vec`,\n    ///     // it will then trigger a constraint failure.\n    ///     vec.set_unchecked(5, 42);\n    ///     println(vec);\n    /// }\n    /// ```\n    pub fn set_unchecked(&mut self, index: u32, value: T) {\n        self.storage[index] = value;\n    }\n\n    /// Pushes an element to the end of the vector. This increases the length\n    /// of the vector by one.\n    ///\n    /// Panics if the new length of the vector will be greater than the max length.\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// let mut v: BoundedVec<Field, 2> = BoundedVec::new();\n    ///\n    /// v.push(1);\n    /// v.push(2);\n    ///\n    /// // Panics with failed assertion \"push out of bounds\"\n    /// v.push(3);\n    /// ```\n    pub fn push(&mut self, elem: T) {\n        assert(self.len < MaxLen, \"push out of bounds\");\n\n        self.storage[self.len] = elem;\n        self.len += 1;\n    }\n\n    /// Returns the current length of this vector\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// let mut v: BoundedVec<Field, 4> = BoundedVec::new();\n    /// assert(v.len() == 0);\n    ///\n    /// v.push(100);\n    /// assert(v.len() == 1);\n    ///\n    /// v.push(200);\n    /// v.push(300);\n    /// v.push(400);\n    /// assert(v.len() == 4);\n    ///\n    /// let _ = v.pop();\n    /// let _ = v.pop();\n    /// assert(v.len() == 2);\n    /// ```\n    pub fn len(self) -> u32 {\n        self.len\n    }\n\n    /// Returns the maximum length of this vector. This is always\n    /// equal to the `MaxLen` parameter this vector was initialized with.\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// let mut v: BoundedVec<Field, 5> = BoundedVec::new();\n    ///\n    /// assert(v.max_len() == 5);\n    /// v.push(10);\n    /// assert(v.max_len() == 5);\n    /// ```\n    pub fn max_len(_self: BoundedVec<T, MaxLen>) -> u32 {\n        MaxLen\n    }\n\n    /// Returns the internal array within this vector.\n    ///\n    /// Since arrays in Noir are immutable, mutating the returned storage array will not mutate\n    /// the storage held internally by this vector.\n    ///\n    /// Note that uninitialized elements may be zeroed out!\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// let mut v: BoundedVec<Field, 5> = BoundedVec::new();\n    ///\n    /// assert(v.storage() == [0, 0, 0, 0, 0]);\n    ///\n    /// v.push(57);\n    /// assert(v.storage() == [57, 0, 0, 0, 0]);\n    /// ```\n    pub fn storage(self) -> [T; MaxLen] {\n        self.storage\n    }\n\n    /// Pushes each element from the given array to this vector.\n    ///\n    /// Panics if pushing each element would cause the length of this vector\n    /// to exceed the maximum length.\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// let mut vec: BoundedVec<Field, 3> = BoundedVec::new();\n    /// vec.extend_from_array([2, 4]);\n    ///\n    /// assert(vec.len == 2);\n    /// assert(vec.get(0) == 2);\n    /// assert(vec.get(1) == 4);\n    /// ```\n    pub fn extend_from_array<let Len: u32>(&mut self, array: [T; Len]) {\n        let new_len = self.len + array.len();\n        assert(new_len <= MaxLen, \"extend_from_array out of bounds\");\n        for i in 0..array.len() {\n            self.storage[self.len + i] = array[i];\n        }\n        self.len = new_len;\n    }\n\n    /// Pushes each element from the given vector to this vector.\n    ///\n    /// Panics if pushing each element would cause the length of this vector\n    /// to exceed the maximum length.\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// let mut vec: BoundedVec<Field, 3> = BoundedVec::new();\n    /// vec.extend_from_vector([2, 4].as_vector());\n    ///\n    /// assert(vec.len == 2);\n    /// assert(vec.get(0) == 2);\n    /// assert(vec.get(1) == 4);\n    /// ```\n    pub fn extend_from_vector(&mut self, vector: [T]) {\n        let new_len = self.len + vector.len();\n        assert(new_len <= MaxLen, \"extend_from_vector out of bounds\");\n        for i in 0..vector.len() {\n            self.storage[self.len + i] = vector[i];\n        }\n        self.len = new_len;\n    }\n\n    /// Pushes each element from the other vector to this vector. The length of\n    /// the other vector is left unchanged.\n    ///\n    /// Panics if pushing each element would cause the length of this vector\n    /// to exceed the maximum length.\n    ///\n    /// ```noir\n    /// let mut v1: BoundedVec<Field, 5> = BoundedVec::new();\n    /// let mut v2: BoundedVec<Field, 7> = BoundedVec::new();\n    ///\n    /// v2.extend_from_array([1, 2, 3]);\n    /// v1.extend_from_bounded_vec(v2);\n    ///\n    /// assert(v1.storage() == [1, 2, 3, 0, 0]);\n    /// assert(v2.storage() == [1, 2, 3, 0, 0, 0, 0]);\n    /// ```\n    pub fn extend_from_bounded_vec<let Len: u32>(&mut self, vec: BoundedVec<T, Len>) {\n        let append_len = vec.len();\n        let new_len = self.len + append_len;\n        assert(new_len <= MaxLen, \"extend_from_bounded_vec out of bounds\");\n\n        if is_unconstrained() {\n            for i in 0..append_len {\n                self.storage[self.len + i] = vec.get_unchecked(i);\n            }\n        } else {\n            for i in 0..Len {\n                if i < append_len {\n                    self.storage[self.len + i] = vec.get_unchecked(i);\n                }\n            }\n        }\n        self.len = new_len;\n    }\n\n    /// Creates a new vector, populating it with values derived from an array input.\n    /// The maximum length of the vector is determined based on the type signature.\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// let bounded_vec: BoundedVec<Field, 10> = BoundedVec::from_array([1, 2, 3])\n    /// ```\n    pub fn from_array<let Len: u32>(array: [T; Len]) -> Self {\n        static_assert(Len <= MaxLen, \"from array out of bounds\");\n        let mut vec: BoundedVec<T, MaxLen> = BoundedVec::new();\n        vec.extend_from_array(array);\n        vec\n    }\n\n    /// Pops the element at the end of the vector. This will decrease the length\n    /// of the vector by one.\n    ///\n    /// Panics if the vector is empty.\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// let mut v: BoundedVec<Field, 2> = BoundedVec::new();\n    /// v.push(1);\n    /// v.push(2);\n    ///\n    /// let two = v.pop();\n    /// let one = v.pop();\n    ///\n    /// assert(two == 2);\n    /// assert(one == 1);\n    ///\n    /// // error: cannot pop from an empty vector\n    /// let _ = v.pop();\n    /// ```\n    pub fn pop(&mut self) -> T {\n        assert(self.len > 0, \"cannot pop from an empty vector\");\n        self.len -= 1;\n\n        let elem = self.storage[self.len];\n        self.storage[self.len] = crate::mem::zeroed();\n        elem\n    }\n\n    /// Returns true if the given predicate returns true for any element\n    /// in this vector.\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// let mut v: BoundedVec<u32, 3> = BoundedVec::new();\n    /// v.extend_from_array([2, 4, 6]);\n    ///\n    /// let all_even = !v.any(|elem: u32| elem % 2 != 0);\n    /// assert(all_even);\n    /// ```\n    pub fn any<Env>(self, predicate: fn[Env](T) -> bool) -> bool {\n        let mut ret = false;\n        if is_unconstrained() {\n            for i in 0..self.len {\n                ret |= predicate(self.storage[i]);\n            }\n        } else {\n            let mut exceeded_len = false;\n            for i in 0..MaxLen {\n                exceeded_len |= i == self.len;\n                if !exceeded_len {\n                    ret |= predicate(self.storage[i]);\n                }\n            }\n        }\n        ret\n    }\n\n    /// Creates a new vector of equal size by calling a closure on each element in this vector.\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n    /// let result = vec.map(|value| value * 2);\n    ///\n    /// let expected = BoundedVec::from_array([2, 4, 6, 8]);\n    /// assert_eq(result, expected);\n    /// ```\n    pub fn map<U, Env>(self, f: fn[Env](T) -> U) -> BoundedVec<U, MaxLen> {\n        let mut ret = BoundedVec::new();\n        ret.len = self.len();\n\n        if is_unconstrained() {\n            for i in 0..self.len() {\n                ret.storage[i] = f(self.get_unchecked(i));\n            }\n        } else {\n            for i in 0..MaxLen {\n                if i < self.len() {\n                    ret.storage[i] = f(self.get_unchecked(i));\n                }\n            }\n        }\n\n        ret\n    }\n\n    /// Creates a new vector of equal size by calling a closure on each element\n    /// in this vector, along with its index.\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n    /// let result = vec.mapi(|i, value| i + value * 2);\n    ///\n    /// let expected = BoundedVec::from_array([2, 5, 8, 11]);\n    /// assert_eq(result, expected);\n    /// ```\n    pub fn mapi<U, Env>(self, f: fn[Env](u32, T) -> U) -> BoundedVec<U, MaxLen> {\n        let mut ret = BoundedVec::new();\n        ret.len = self.len();\n\n        if is_unconstrained() {\n            for i in 0..self.len() {\n                ret.storage[i] = f(i, self.get_unchecked(i));\n            }\n        } else {\n            for i in 0..MaxLen {\n                if i < self.len() {\n                    ret.storage[i] = f(i, self.get_unchecked(i));\n                }\n            }\n        }\n\n        ret\n    }\n\n    /// Calls a closure on each element in this vector.\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n    /// let mut result = BoundedVec::<u32, 4>::new();\n    /// vec.for_each(|value| result.push(value * 2));\n    ///\n    /// let expected = BoundedVec::from_array([2, 4, 6, 8]);\n    /// assert_eq(result, expected);\n    /// ```\n    pub fn for_each<Env>(self, f: fn[Env](T) -> ()) {\n        if is_unconstrained() {\n            for i in 0..self.len() {\n                f(self.get_unchecked(i));\n            }\n        } else {\n            for i in 0..MaxLen {\n                if i < self.len() {\n                    f(self.get_unchecked(i));\n                }\n            }\n        }\n    }\n\n    /// Calls a closure on each element in this vector, along with its index.\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n    /// let mut result = BoundedVec::<u32, 4>::new();\n    /// vec.for_eachi(|i, value| result.push(i + value * 2));\n    ///\n    /// let expected = BoundedVec::from_array([2, 5, 8, 11]);\n    /// assert_eq(result, expected);\n    /// ```\n    pub fn for_eachi<Env>(self, f: fn[Env](u32, T) -> ()) {\n        if is_unconstrained() {\n            for i in 0..self.len() {\n                f(i, self.get_unchecked(i));\n            }\n        } else {\n            for i in 0..MaxLen {\n                if i < self.len() {\n                    f(i, self.get_unchecked(i));\n                }\n            }\n        }\n    }\n\n    /// Creates a new BoundedVec from the given array and length.\n    /// The given length must be less than or equal to the length of the array.\n    ///\n    /// This function will zero out any elements at or past index `len` of `array`.\n    /// This incurs an extra runtime cost of O(MaxLen). If you are sure your array is\n    /// zeroed after that index, you can use [`from_parts_unchecked`][Self::from_parts_unchecked] to remove the extra loop.\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// let vec: BoundedVec<u32, 4> = BoundedVec::from_parts([1, 2, 3, 0], 3);\n    /// assert_eq(vec.len(), 3);\n    /// ```\n    pub fn from_parts(mut array: [T; MaxLen], len: u32) -> Self {\n        assert(len <= MaxLen);\n        let zeroed = crate::mem::zeroed();\n\n        if is_unconstrained() {\n            for i in len..MaxLen {\n                array[i] = zeroed;\n            }\n        } else {\n            for i in 0..MaxLen {\n                if i >= len {\n                    array[i] = zeroed;\n                }\n            }\n        }\n\n        BoundedVec { storage: array, len }\n    }\n\n    /// Creates a new BoundedVec from the given array and length.\n    /// The given length must be less than or equal to the length of the array.\n    ///\n    /// This function is unsafe because it expects all elements past the `len` index\n    /// of `array` to be zeroed, but does not check for this internally. Use `from_parts`\n    /// for a safe version of this function which does zero out any indices past the\n    /// given length. Invalidating this assumption can notably cause `BoundedVec::eq`\n    /// to give incorrect results since it will check even elements past `len`.\n    ///\n    /// Example:\n    ///\n    /// ```noir\n    /// let vec: BoundedVec<u32, 4> = BoundedVec::from_parts_unchecked([1, 2, 3, 0], 3);\n    /// assert_eq(vec.len(), 3);\n    ///\n    /// // invalid use!\n    /// let vec1: BoundedVec<u32, 4> = BoundedVec::from_parts_unchecked([1, 2, 3, 1], 3);\n    /// let vec2: BoundedVec<u32, 4> = BoundedVec::from_parts_unchecked([1, 2, 3, 2], 3);\n    ///\n    /// // both vecs have length 3 so we'd expect them to be equal, but this\n    /// // fails because elements past the length are still checked in eq\n    /// assert_eq(vec1, vec2); // fails\n    /// ```\n    pub fn from_parts_unchecked(array: [T; MaxLen], len: u32) -> Self {\n        assert(len <= MaxLen);\n        BoundedVec { storage: array, len }\n    }\n}\n\nimpl<T, let MaxLen: u32> Eq for BoundedVec<T, MaxLen>\nwhere\n    T: Eq,\n{\n    fn eq(self, other: BoundedVec<T, MaxLen>) -> bool {\n        // TODO: https://github.com/noir-lang/noir/issues/4837\n        //\n        // We make the assumption that the user has used the proper interface for working with `BoundedVec`s\n        // rather than directly manipulating the internal fields as this can result in an inconsistent internal state.\n        if self.len == other.len {\n            self.storage == other.storage\n        } else {\n            false\n        }\n    }\n}\n\nimpl<T, let MaxLen: u32, let Len: u32> From<[T; Len]> for BoundedVec<T, MaxLen> {\n    fn from(array: [T; Len]) -> BoundedVec<T, MaxLen> {\n        BoundedVec::from_array(array)\n    }\n}\n\nmod bounded_vec_tests {\n\n    mod get {\n        use crate::collections::bounded_vec::BoundedVec;\n\n        #[test(should_fail_with = \"Attempted to read past end of BoundedVec\")]\n        fn panics_when_reading_elements_past_end_of_vec() {\n            let vec: BoundedVec<Field, 5> = BoundedVec::new();\n\n            let _ = vec.get(0);\n        }\n\n        #[test(should_fail_with = \"Attempted to read past end of BoundedVec\")]\n        fn panics_when_reading_beyond_length() {\n            let vec: BoundedVec<u32, 5> = BoundedVec::from_array([1, 2, 3]);\n            let _ = vec.get(3);\n        }\n\n        #[test]\n        fn get_works_within_bounds() {\n            let vec: BoundedVec<u32, 5> = BoundedVec::from_array([1, 2, 3, 4, 5]);\n            assert_eq(vec.get(0), 1);\n            assert_eq(vec.get(2), 3);\n            assert_eq(vec.get(4), 5);\n        }\n\n        #[test]\n        fn get_unchecked_works() {\n            let vec: BoundedVec<u32, 5> = BoundedVec::from_array([1, 2, 3]);\n            assert_eq(vec.get_unchecked(0), 1);\n            assert_eq(vec.get_unchecked(2), 3);\n        }\n\n        #[test]\n        fn get_unchecked_works_past_len() {\n            let vec: BoundedVec<u32, 5> = BoundedVec::from_array([1, 2, 3]);\n            assert_eq(vec.get_unchecked(4), 0);\n        }\n    }\n\n    mod set {\n        use crate::collections::bounded_vec::BoundedVec;\n\n        #[test]\n        fn set_updates_values_properly() {\n            let mut vec = BoundedVec::from_array([0, 0, 0, 0, 0]);\n\n            vec.set(0, 42);\n            assert_eq(vec.storage, [42, 0, 0, 0, 0]);\n\n            vec.set(1, 43);\n            assert_eq(vec.storage, [42, 43, 0, 0, 0]);\n\n            vec.set(2, 44);\n            assert_eq(vec.storage, [42, 43, 44, 0, 0]);\n\n            vec.set(1, 10);\n            assert_eq(vec.storage, [42, 10, 44, 0, 0]);\n\n            vec.set(0, 0);\n            assert_eq(vec.storage, [0, 10, 44, 0, 0]);\n        }\n\n        #[test(should_fail_with = \"Attempted to write past end of BoundedVec\")]\n        fn panics_when_writing_elements_past_end_of_vec() {\n            let mut vec: BoundedVec<Field, 5> = BoundedVec::new();\n            vec.set(0, 42);\n        }\n\n        #[test(should_fail_with = \"Attempted to write past end of BoundedVec\")]\n        fn panics_when_setting_beyond_length() {\n            let mut vec: BoundedVec<u32, 5> = BoundedVec::from_array([1, 2, 3]);\n            vec.set(3, 4);\n        }\n\n        #[test]\n        fn set_unchecked_operations() {\n            let mut vec: BoundedVec<u32, 5> = BoundedVec::new();\n            vec.push(1);\n            vec.push(2);\n\n            vec.set_unchecked(0, 10);\n            assert_eq(vec.get(0), 10);\n        }\n\n        #[test(should_fail_with = \"Attempted to read past end of BoundedVec\")]\n        fn set_unchecked_operations_past_len() {\n            let mut vec: BoundedVec<u32, 5> = BoundedVec::new();\n            vec.push(1);\n            vec.push(2);\n\n            vec.set_unchecked(3, 40);\n            assert_eq(vec.get(3), 40);\n        }\n\n        #[test]\n        fn set_preserves_other_elements() {\n            let mut vec: BoundedVec<u32, 5> = BoundedVec::from_array([1, 2, 3, 4, 5]);\n\n            vec.set(2, 30);\n            assert_eq(vec.get(0), 1);\n            assert_eq(vec.get(1), 2);\n            assert_eq(vec.get(2), 30);\n            assert_eq(vec.get(3), 4);\n            assert_eq(vec.get(4), 5);\n        }\n    }\n\n    mod any {\n        use crate::collections::bounded_vec::BoundedVec;\n\n        #[test]\n        fn returns_false_if_predicate_not_satisfied() {\n            let vec: BoundedVec<bool, 4> = BoundedVec::from_array([false, false, false, false]);\n            let result = vec.any(|value| value);\n\n            assert(!result);\n        }\n\n        #[test]\n        fn returns_true_if_predicate_satisfied() {\n            let vec: BoundedVec<bool, 4> = BoundedVec::from_array([false, false, true, true]);\n            let result = vec.any(|value| value);\n\n            assert(result);\n        }\n\n        #[test]\n        fn returns_false_on_empty_boundedvec() {\n            let vec: BoundedVec<bool, 0> = BoundedVec::new();\n            let result = vec.any(|value| value);\n\n            assert(!result);\n        }\n\n        #[test]\n        fn any_with_complex_predicates() {\n            let vec: BoundedVec<u32, 5> = BoundedVec::from_array([1, 2, 3, 4, 5]);\n\n            assert(vec.any(|x| x > 3));\n            assert(!vec.any(|x| x > 10));\n            assert(vec.any(|x| x % 2 == 0)); // has a even number\n            assert(vec.any(|x| x == 3)); // has a specific value\n        }\n\n        #[test]\n        fn any_with_partial_vector() {\n            let mut vec: BoundedVec<u32, 5> = BoundedVec::new();\n            vec.push(1);\n            vec.push(2);\n\n            assert(vec.any(|x| x == 1));\n            assert(vec.any(|x| x == 2));\n            assert(!vec.any(|x| x == 3));\n        }\n    }\n\n    mod map {\n        use crate::collections::bounded_vec::BoundedVec;\n\n        #[test]\n        fn applies_function_correctly() {\n            // docs:start:bounded-vec-map-example\n            let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n            let result = vec.map(|value| value * 2);\n            // docs:end:bounded-vec-map-example\n            let expected = BoundedVec::from_array([2, 4, 6, 8]);\n\n            assert_eq(result, expected);\n        }\n\n        #[test]\n        fn applies_function_that_changes_return_type() {\n            let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n            let result = vec.map(|value| (value * 2) as Field);\n            let expected: BoundedVec<Field, 4> = BoundedVec::from_array([2, 4, 6, 8]);\n\n            assert_eq(result, expected);\n        }\n\n        #[test]\n        fn does_not_apply_function_past_len() {\n            let vec: BoundedVec<u32, 3> = BoundedVec::from_array([0, 1]);\n            let result = vec.map(|value| if value == 0 { 5 } else { value });\n            let expected = BoundedVec::from_array([5, 1]);\n\n            assert_eq(result, expected);\n            assert_eq(result.get_unchecked(2), 0);\n        }\n\n        #[test]\n        fn map_with_conditional_logic() {\n            let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n\n            let result = vec.map(|x| if x % 2 == 0 { x * 2 } else { x });\n            let expected = BoundedVec::from_array([1, 4, 3, 8]);\n            assert_eq(result, expected);\n        }\n\n        #[test]\n        fn map_preserves_length() {\n            let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n            let result = vec.map(|x| x * 2);\n\n            assert_eq(result.len(), vec.len());\n            assert_eq(result.max_len(), vec.max_len());\n        }\n\n        #[test]\n        fn map_on_empty_vector() {\n            let vec: BoundedVec<u32, 5> = BoundedVec::new();\n            let result = vec.map(|x| x * 2);\n            assert_eq(result, vec);\n            assert_eq(result.len(), 0);\n            assert_eq(result.max_len(), 5);\n        }\n    }\n\n    mod mapi {\n        use crate::collections::bounded_vec::BoundedVec;\n\n        #[test]\n        fn applies_function_correctly() {\n            // docs:start:bounded-vec-mapi-example\n            let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n            let result = vec.mapi(|i, value| i + value * 2);\n            // docs:end:bounded-vec-mapi-example\n            let expected = BoundedVec::from_array([2, 5, 8, 11]);\n\n            assert_eq(result, expected);\n        }\n\n        #[test]\n        fn applies_function_that_changes_return_type() {\n            let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n            let result = vec.mapi(|i, value| (i + value * 2) as Field);\n            let expected: BoundedVec<Field, 4> = BoundedVec::from_array([2, 5, 8, 11]);\n\n            assert_eq(result, expected);\n        }\n\n        #[test]\n        fn does_not_apply_function_past_len() {\n            let vec: BoundedVec<u32, 3> = BoundedVec::from_array([0, 1]);\n            let result = vec.mapi(|_, value| if value == 0 { 5 } else { value });\n            let expected = BoundedVec::from_array([5, 1]);\n\n            assert_eq(result, expected);\n            assert_eq(result.get_unchecked(2), 0);\n        }\n\n        #[test]\n        fn mapi_with_index_branching_logic() {\n            let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n\n            let result = vec.mapi(|i, x| if i % 2 == 0 { x * 2 } else { x });\n            let expected = BoundedVec::from_array([2, 2, 6, 4]);\n            assert_eq(result, expected);\n        }\n    }\n\n    mod for_each {\n        use crate::collections::bounded_vec::BoundedVec;\n\n        // map in terms of for_each\n        fn for_each_map<T, U, Env, let MaxLen: u32>(\n            input: BoundedVec<T, MaxLen>,\n            f: fn[Env](T) -> U,\n        ) -> BoundedVec<U, MaxLen> {\n            let mut output = BoundedVec::<U, MaxLen>::new();\n            let output_ref = &mut output;\n            input.for_each(|x| output_ref.push(f(x)));\n            output\n        }\n\n        #[test]\n        fn smoke_test() {\n            let mut acc = 0;\n            let acc_ref = &mut acc;\n            // docs:start:bounded-vec-for-each-example\n            let vec: BoundedVec<u32, 3> = BoundedVec::from_array([1, 2, 3]);\n            vec.for_each(|value| { *acc_ref += value; });\n            // docs:end:bounded-vec-for-each-example\n            assert_eq(acc, 6);\n        }\n\n        #[test]\n        fn applies_function_correctly() {\n            let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n            let result = for_each_map(vec, |value| value * 2);\n            let expected = BoundedVec::from_array([2, 4, 6, 8]);\n\n            assert_eq(result, expected);\n        }\n\n        #[test]\n        fn applies_function_that_changes_return_type() {\n            let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n            let result = for_each_map(vec, |value| (value * 2) as Field);\n            let expected: BoundedVec<Field, 4> = BoundedVec::from_array([2, 4, 6, 8]);\n\n            assert_eq(result, expected);\n        }\n\n        #[test]\n        fn does_not_apply_function_past_len() {\n            let vec: BoundedVec<u32, 3> = BoundedVec::from_array([0, 1]);\n            let result = for_each_map(vec, |value| if value == 0 { 5 } else { value });\n            let expected = BoundedVec::from_array([5, 1]);\n\n            assert_eq(result, expected);\n            assert_eq(result.get_unchecked(2), 0);\n        }\n\n        #[test]\n        fn for_each_on_empty_vector() {\n            let vec: BoundedVec<u32, 5> = BoundedVec::new();\n            let mut count = 0;\n            let count_ref = &mut count;\n            vec.for_each(|_| { *count_ref += 1; });\n            assert_eq(count, 0);\n        }\n\n        #[test]\n        fn for_each_with_side_effects() {\n            let vec: BoundedVec<u32, 3> = BoundedVec::from_array([1, 2, 3]);\n            let mut seen = BoundedVec::<u32, 3>::new();\n            let seen_ref = &mut seen;\n            vec.for_each(|x| seen_ref.push(x));\n            assert_eq(seen, vec);\n        }\n    }\n\n    mod for_eachi {\n        use crate::collections::bounded_vec::BoundedVec;\n\n        // mapi in terms of for_eachi\n        fn for_eachi_mapi<T, U, Env, let MaxLen: u32>(\n            input: BoundedVec<T, MaxLen>,\n            f: fn[Env](u32, T) -> U,\n        ) -> BoundedVec<U, MaxLen> {\n            let mut output = BoundedVec::<U, MaxLen>::new();\n            let output_ref = &mut output;\n            input.for_eachi(|i, x| output_ref.push(f(i, x)));\n            output\n        }\n\n        #[test]\n        fn smoke_test() {\n            let mut acc = 0;\n            let acc_ref = &mut acc;\n            // docs:start:bounded-vec-for-eachi-example\n            let vec: BoundedVec<u32, 3> = BoundedVec::from_array([1, 2, 3]);\n            vec.for_eachi(|i, value| { *acc_ref += i * value; });\n            // docs:end:bounded-vec-for-eachi-example\n\n            // 0 * 1 + 1 * 2 + 2 * 3\n            assert_eq(acc, 8);\n        }\n\n        #[test]\n        fn applies_function_correctly() {\n            let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n            let result = for_eachi_mapi(vec, |i, value| i + value * 2);\n            let expected = BoundedVec::from_array([2, 5, 8, 11]);\n\n            assert_eq(result, expected);\n        }\n\n        #[test]\n        fn applies_function_that_changes_return_type() {\n            let vec: BoundedVec<u32, 4> = BoundedVec::from_array([1, 2, 3, 4]);\n            let result = for_eachi_mapi(vec, |i, value| (i + value * 2) as Field);\n            let expected: BoundedVec<Field, 4> = BoundedVec::from_array([2, 5, 8, 11]);\n\n            assert_eq(result, expected);\n        }\n\n        #[test]\n        fn does_not_apply_function_past_len() {\n            let vec: BoundedVec<u32, 3> = BoundedVec::from_array([0, 1]);\n            let result = for_eachi_mapi(vec, |_, value| if value == 0 { 5 } else { value });\n            let expected = BoundedVec::from_array([5, 1]);\n\n            assert_eq(result, expected);\n            assert_eq(result.get_unchecked(2), 0);\n        }\n\n        #[test]\n        fn for_eachi_on_empty_vector() {\n            let vec: BoundedVec<u32, 5> = BoundedVec::new();\n            let mut count = 0;\n            let count_ref = &mut count;\n            vec.for_eachi(|_, _| { *count_ref += 1; });\n            assert_eq(count, 0);\n        }\n\n        #[test]\n        fn for_eachi_with_index_tracking() {\n            let vec: BoundedVec<u32, 3> = BoundedVec::from_array([10, 20, 30]);\n            let mut indices = BoundedVec::<u32, 3>::new();\n            let indices_ref = &mut indices;\n            vec.for_eachi(|i, _| indices_ref.push(i));\n\n            let expected = BoundedVec::from_array([0, 1, 2]);\n            assert_eq(indices, expected);\n        }\n\n    }\n\n    mod from_array {\n        use crate::collections::bounded_vec::BoundedVec;\n\n        #[test]\n        fn empty() {\n            let empty_array: [Field; 0] = [];\n            let bounded_vec = BoundedVec::from_array([]);\n\n            assert_eq(bounded_vec.max_len(), 0);\n            assert_eq(bounded_vec.len(), 0);\n            assert_eq(bounded_vec.storage(), empty_array);\n        }\n\n        #[test]\n        fn equal_len() {\n            let array = [1, 2, 3];\n            let bounded_vec = BoundedVec::from_array(array);\n\n            assert_eq(bounded_vec.max_len(), 3);\n            assert_eq(bounded_vec.len(), 3);\n            assert_eq(bounded_vec.storage(), array);\n        }\n\n        #[test]\n        fn max_len_greater_then_array_len() {\n            let array = [1, 2, 3];\n            let bounded_vec: BoundedVec<Field, 10> = BoundedVec::from_array(array);\n\n            assert_eq(bounded_vec.max_len(), 10);\n            assert_eq(bounded_vec.len(), 3);\n            assert_eq(bounded_vec.get(0), 1);\n            assert_eq(bounded_vec.get(1), 2);\n            assert_eq(bounded_vec.get(2), 3);\n        }\n\n        #[test(should_fail_with = \"from array out of bounds\")]\n        fn max_len_lower_then_array_len() {\n            let _: BoundedVec<Field, 2> = BoundedVec::from_array([0; 3]);\n        }\n\n        #[test]\n        fn from_array_preserves_order() {\n            let array = [5, 3, 1, 4, 2];\n            let vec: BoundedVec<u32, 5> = BoundedVec::from_array(array);\n            for i in 0..array.len() {\n                assert_eq(vec.get(i), array[i]);\n            }\n        }\n\n        #[test]\n        fn from_array_with_different_types() {\n            let bool_array = [true, false, true];\n            let bool_vec: BoundedVec<bool, 3> = BoundedVec::from_array(bool_array);\n            assert_eq(bool_vec.len(), 3);\n            assert_eq(bool_vec.get(0), true);\n            assert_eq(bool_vec.get(1), false);\n        }\n    }\n\n    mod trait_from {\n        use crate::collections::bounded_vec::BoundedVec;\n        use crate::convert::From;\n\n        #[test]\n        fn simple() {\n            let array = [1, 2];\n            let bounded_vec: BoundedVec<Field, 10> = BoundedVec::from(array);\n\n            assert_eq(bounded_vec.max_len(), 10);\n            assert_eq(bounded_vec.len(), 2);\n            assert_eq(bounded_vec.get(0), 1);\n            assert_eq(bounded_vec.get(1), 2);\n        }\n    }\n\n    mod trait_eq {\n        use crate::collections::bounded_vec::BoundedVec;\n\n        #[test]\n        fn empty_equality() {\n            let mut bounded_vec1: BoundedVec<Field, 3> = BoundedVec::new();\n            let mut bounded_vec2: BoundedVec<Field, 3> = BoundedVec::new();\n\n            assert_eq(bounded_vec1, bounded_vec2);\n        }\n\n        #[test]\n        fn inequality() {\n            let mut bounded_vec1: BoundedVec<Field, 3> = BoundedVec::new();\n            let mut bounded_vec2: BoundedVec<Field, 3> = BoundedVec::new();\n            bounded_vec1.push(1);\n            bounded_vec2.push(2);\n\n            assert(bounded_vec1 != bounded_vec2);\n        }\n    }\n\n    mod from_parts {\n        use crate::collections::bounded_vec::BoundedVec;\n\n        #[test]\n        fn from_parts() {\n            // docs:start:from-parts\n            let vec: BoundedVec<u32, 4> = BoundedVec::from_parts([1, 2, 3, 0], 3);\n            assert_eq(vec.len(), 3);\n\n            // Any elements past the given length are zeroed out, so these\n            // two BoundedVecs will be completely equal\n            let vec1: BoundedVec<u32, 4> = BoundedVec::from_parts([1, 2, 3, 1], 3);\n            let vec2: BoundedVec<u32, 4> = BoundedVec::from_parts([1, 2, 3, 2], 3);\n            assert_eq(vec1, vec2);\n            // docs:end:from-parts\n        }\n\n        #[test]\n        fn from_parts_unchecked() {\n            // docs:start:from-parts-unchecked\n            let vec: BoundedVec<u32, 4> = BoundedVec::from_parts_unchecked([1, 2, 3, 0], 3);\n            assert_eq(vec.len(), 3);\n\n            // invalid use!\n            let vec1: BoundedVec<u32, 4> = BoundedVec::from_parts_unchecked([1, 2, 3, 1], 3);\n            let vec2: BoundedVec<u32, 4> = BoundedVec::from_parts_unchecked([1, 2, 3, 2], 3);\n\n            // both vecs have length 3 so we'd expect them to be equal, but this\n            // fails because elements past the length are still checked in eq\n            assert(vec1 != vec2);\n            // docs:end:from-parts-unchecked\n        }\n    }\n\n    mod push_pop {\n        use crate::collections::bounded_vec::BoundedVec;\n\n        #[test]\n        fn push_and_pop_operations() {\n            let mut vec: BoundedVec<u32, 5> = BoundedVec::new();\n\n            assert_eq(vec.len(), 0);\n\n            vec.push(1);\n            assert_eq(vec.len(), 1);\n            assert_eq(vec.get(0), 1);\n\n            vec.push(2);\n            assert_eq(vec.len(), 2);\n            assert_eq(vec.get(1), 2);\n\n            let popped = vec.pop();\n            assert_eq(popped, 2);\n            assert_eq(vec.len(), 1);\n\n            let popped2 = vec.pop();\n            assert_eq(popped2, 1);\n            assert_eq(vec.len(), 0);\n        }\n\n        #[test(should_fail_with = \"push out of bounds\")]\n        fn push_to_full_vector() {\n            let mut vec: BoundedVec<u32, 2> = BoundedVec::new();\n            vec.push(1);\n            vec.push(2);\n            vec.push(3); // should panic\n        }\n\n        #[test(should_fail_with = \"cannot pop from an empty vector\")]\n        fn pop_from_empty_vector() {\n            let mut vec: BoundedVec<u32, 5> = BoundedVec::new();\n            let _ = vec.pop(); // should panic\n        }\n\n        #[test]\n        fn push_pop_cycle() {\n            let mut vec: BoundedVec<u32, 3> = BoundedVec::new();\n\n            // push to full\n            vec.push(1);\n            vec.push(2);\n            vec.push(3);\n            assert_eq(vec.len(), 3);\n\n            // pop all\n            assert_eq(vec.pop(), 3);\n            assert_eq(vec.pop(), 2);\n            assert_eq(vec.pop(), 1);\n            assert_eq(vec.len(), 0);\n\n            // push again\n            vec.push(4);\n            assert_eq(vec.len(), 1);\n            assert_eq(vec.get(0), 4);\n        }\n    }\n\n    mod extend {\n        use crate::collections::bounded_vec::BoundedVec;\n\n        #[test]\n        fn extend_from_array() {\n            let mut vec: BoundedVec<u32, 5> = BoundedVec::new();\n            vec.push(1);\n            vec.extend_from_array([2, 3]);\n\n            assert_eq(vec.len(), 3);\n            assert_eq(vec.get(0), 1);\n            assert_eq(vec.get(1), 2);\n            assert_eq(vec.get(2), 3);\n        }\n\n        #[test]\n        fn extend_from_vector() {\n            let mut vec: BoundedVec<u32, 5> = BoundedVec::new();\n            vec.push(1);\n            vec.extend_from_vector([2, 3].as_vector());\n\n            assert_eq(vec.len(), 3);\n            assert_eq(vec.get(0), 1);\n            assert_eq(vec.get(1), 2);\n            assert_eq(vec.get(2), 3);\n        }\n\n        #[test]\n        fn extend_from_bounded_vec() {\n            let mut vec1: BoundedVec<u32, 5> = BoundedVec::new();\n            let mut vec2: BoundedVec<u32, 3> = BoundedVec::new();\n\n            vec1.push(1);\n            vec2.push(2);\n            vec2.push(3);\n\n            vec1.extend_from_bounded_vec(vec2);\n\n            assert_eq(vec1.len(), 3);\n            assert_eq(vec1.get(0), 1);\n            assert_eq(vec1.get(1), 2);\n            assert_eq(vec1.get(2), 3);\n        }\n\n        #[test(should_fail_with = \"extend_from_array out of bounds\")]\n        fn extend_array_beyond_max_len() {\n            let mut vec: BoundedVec<u32, 3> = BoundedVec::new();\n            vec.push(1);\n            vec.extend_from_array([2, 3, 4]); // should panic\n        }\n\n        #[test(should_fail_with = \"extend_from_vector out of bounds\")]\n        fn extend_vector_beyond_max_len() {\n            let mut vec: BoundedVec<u32, 3> = BoundedVec::new();\n            vec.push(1);\n            vec.extend_from_vector([2, 3, 4].as_vector()); // S]should panic\n        }\n\n        #[test(should_fail_with = \"extend_from_bounded_vec out of bounds\")]\n        fn extend_bounded_vec_beyond_max_len() {\n            let mut vec: BoundedVec<u32, 3> = BoundedVec::new();\n            let other: BoundedVec<u32, 5> = BoundedVec::from_array([1, 2, 3, 4, 5]);\n            vec.extend_from_bounded_vec(other); // should panic\n        }\n\n        #[test]\n        fn extend_with_empty_collections() {\n            let mut vec: BoundedVec<u32, 5> = BoundedVec::new();\n            let original_len = vec.len();\n\n            vec.extend_from_array([]);\n            assert_eq(vec.len(), original_len);\n\n            vec.extend_from_vector([].as_vector());\n            assert_eq(vec.len(), original_len);\n\n            let empty: BoundedVec<u32, 3> = BoundedVec::new();\n            vec.extend_from_bounded_vec(empty);\n            assert_eq(vec.len(), original_len);\n        }\n    }\n\n    mod storage {\n        use crate::collections::bounded_vec::BoundedVec;\n\n        #[test]\n        fn storage_consistency() {\n            let mut vec: BoundedVec<u32, 5> = BoundedVec::new();\n\n            // test initial storage state\n            assert_eq(vec.storage(), [0, 0, 0, 0, 0]);\n\n            vec.push(1);\n            vec.push(2);\n\n            // test storage after modifications\n            assert_eq(vec.storage(), [1, 2, 0, 0, 0]);\n\n            // storage doesn't change length\n            assert_eq(vec.len(), 2);\n            assert_eq(vec.max_len(), 5);\n        }\n\n        #[test]\n        fn storage_after_pop() {\n            let mut vec: BoundedVec<u32, 3> = BoundedVec::from_array([1, 2, 3]);\n\n            let _ = vec.pop();\n            // after pop, the last element should be zeroed\n            assert_eq(vec.storage(), [1, 2, 0]);\n            assert_eq(vec.len(), 2);\n        }\n\n        #[test]\n        fn vector_immutable() {\n            let vec: BoundedVec<u32, 3> = BoundedVec::from_array([1, 2, 3]);\n            let storage = vec.storage();\n\n            assert_eq(storage, [1, 2, 3]);\n\n            // Verify that the original vector is unchanged\n            assert_eq(vec.len(), 3);\n            assert_eq(vec.get(0), 1);\n            assert_eq(vec.get(1), 2);\n            assert_eq(vec.get(2), 3);\n        }\n    }\n}\n"
        },
        "16": {
            "path": "std/embedded_curve_ops.nr",
            "source": "use crate::cmp::Eq;\nuse crate::hash::Hash;\nuse crate::ops::arith::{Add, Neg, Sub};\n\n/// A point on the embedded elliptic curve\n/// By definition, the base field of the embedded curve is the scalar field of the proof system curve, i.e the Noir Field.\n/// x and y denotes the Weierstrass coordinates of the point, if is_infinite is false.\npub struct EmbeddedCurvePoint {\n    pub x: Field,\n    pub y: Field,\n    pub is_infinite: bool,\n}\n\nimpl EmbeddedCurvePoint {\n    /// Elliptic curve point doubling operation\n    /// returns the doubled point of a point P, i.e P+P\n    pub fn double(self) -> EmbeddedCurvePoint {\n        embedded_curve_add(self, self)\n    }\n\n    /// Returns the null element of the curve; 'the point at infinity'\n    pub fn point_at_infinity() -> EmbeddedCurvePoint {\n        EmbeddedCurvePoint { x: 0, y: 0, is_infinite: true }\n    }\n\n    /// Returns the curve's generator point.\n    pub fn generator() -> EmbeddedCurvePoint {\n        // Generator point for the grumpkin curve (y^2 = x^3 - 17)\n        EmbeddedCurvePoint {\n            x: 1,\n            y: 17631683881184975370165255887551781615748388533673675138860, // sqrt(-16)\n            is_infinite: false,\n        }\n    }\n}\n\nimpl Add for EmbeddedCurvePoint {\n    /// Adds two points P+Q, using the curve addition formula, and also handles point at infinity\n    fn add(self, other: EmbeddedCurvePoint) -> EmbeddedCurvePoint {\n        embedded_curve_add(self, other)\n    }\n}\n\nimpl Sub for EmbeddedCurvePoint {\n    /// Points subtraction operation, using addition and negation\n    fn sub(self, other: EmbeddedCurvePoint) -> EmbeddedCurvePoint {\n        self + other.neg()\n    }\n}\n\nimpl Neg for EmbeddedCurvePoint {\n    /// Negates a point P, i.e returns -P, by negating the y coordinate.\n    /// If the point is at infinity, then the result is also at infinity.\n    fn neg(self) -> EmbeddedCurvePoint {\n        EmbeddedCurvePoint { x: self.x, y: -self.y, is_infinite: self.is_infinite }\n    }\n}\n\nimpl Eq for EmbeddedCurvePoint {\n    /// Checks whether two points are equal\n    fn eq(self: Self, b: EmbeddedCurvePoint) -> bool {\n        (self.is_infinite & b.is_infinite)\n            | ((self.is_infinite == b.is_infinite) & (self.x == b.x) & (self.y == b.y))\n    }\n}\n\nimpl Hash for EmbeddedCurvePoint {\n    fn hash<H>(self, state: &mut H)\n    where\n        H: crate::hash::Hasher,\n    {\n        if self.is_infinite {\n            self.is_infinite.hash(state);\n        } else {\n            self.x.hash(state);\n            self.y.hash(state);\n        }\n    }\n}\n\n/// Scalar for the embedded curve represented as low and high limbs\n/// By definition, the scalar field of the embedded curve is base field of the proving system curve.\n/// It may not fit into a Field element, so it is represented with two Field elements; its low and high limbs.\npub struct EmbeddedCurveScalar {\n    pub lo: Field,\n    pub hi: Field,\n}\n\nimpl EmbeddedCurveScalar {\n    pub fn new(lo: Field, hi: Field) -> Self {\n        EmbeddedCurveScalar { lo, hi }\n    }\n\n    #[field(bn254)]\n    pub fn from_field(scalar: Field) -> EmbeddedCurveScalar {\n        let (a, b) = crate::field::bn254::decompose(scalar);\n        EmbeddedCurveScalar { lo: a, hi: b }\n    }\n\n    //Bytes to scalar: take the first (after the specified offset) 16 bytes of the input as the lo value, and the next 16 bytes as the hi value\n    #[field(bn254)]\n    pub(crate) fn from_bytes(bytes: [u8; 64], offset: u32) -> EmbeddedCurveScalar {\n        let mut v = 1;\n        let mut lo = 0 as Field;\n        let mut hi = 0 as Field;\n        for i in 0..16 {\n            lo = lo + (bytes[offset + 31 - i] as Field) * v;\n            hi = hi + (bytes[offset + 15 - i] as Field) * v;\n            v = v * 256;\n        }\n        let sig_s = crate::embedded_curve_ops::EmbeddedCurveScalar { lo, hi };\n        sig_s\n    }\n}\n\nimpl Eq for EmbeddedCurveScalar {\n    fn eq(self, other: Self) -> bool {\n        (other.hi == self.hi) & (other.lo == self.lo)\n    }\n}\n\nimpl Hash for EmbeddedCurveScalar {\n    fn hash<H>(self, state: &mut H)\n    where\n        H: crate::hash::Hasher,\n    {\n        self.hi.hash(state);\n        self.lo.hash(state);\n    }\n}\n\n// Computes a multi scalar multiplication over the embedded curve.\n// For bn254, We have Grumpkin and Baby JubJub.\n// For bls12-381, we have JubJub and Bandersnatch.\n//\n// The embedded curve being used is decided by the\n// underlying proof system.\n//\n// IMPORTANT: Prefer `multi_scalar_mul()` over repeated `embedded_curve_add()`\n// for adding multiple points. This is significantly more efficient.\n// For adding exactly 2 points, use `embedded_curve_add()` directly.\n// docs:start:multi_scalar_mul\npub fn multi_scalar_mul<let N: u32>(\n    points: [EmbeddedCurvePoint; N],\n    scalars: [EmbeddedCurveScalar; N],\n) -> EmbeddedCurvePoint\n// docs:end:multi_scalar_mul\n{\n    multi_scalar_mul_array_return(points, scalars, true)[0]\n}\n\n#[foreign(multi_scalar_mul)]\npub(crate) fn multi_scalar_mul_array_return<let N: u32>(\n    points: [EmbeddedCurvePoint; N],\n    scalars: [EmbeddedCurveScalar; N],\n    predicate: bool,\n) -> [EmbeddedCurvePoint; 1] {}\n\n// docs:start:fixed_base_scalar_mul\npub fn fixed_base_scalar_mul(scalar: EmbeddedCurveScalar) -> EmbeddedCurvePoint\n// docs:end:fixed_base_scalar_mul\n{\n    multi_scalar_mul([EmbeddedCurvePoint::generator()], [scalar])\n}\n\n/// Elliptic curve addition\n/// IMPORTANT: this function is expected to perform a full addition in order to handle all corner cases:\n/// - points on the curve\n/// - point doubling\n/// - point at infinity\n/// As a result, you may not get optimal performance, depending on the assumptions of your inputs.\n// docs:start:embedded_curve_add\npub fn embedded_curve_add(\n    point1: EmbeddedCurvePoint,\n    point2: EmbeddedCurvePoint,\n) -> EmbeddedCurvePoint {\n    // docs:end:embedded_curve_add\n    if crate::runtime::is_unconstrained() {\n        // avoid calling the black box function for trivial cases\n        if point1.is_infinite {\n            point2\n        } else if point2.is_infinite {\n            point1\n        } else {\n            embedded_curve_add_inner(point1, point2)\n        }\n    } else {\n        embedded_curve_add_inner(point1, point2)\n    }\n}\n\n#[foreign(embedded_curve_add)]\nfn embedded_curve_add_array_return(\n    _point1: EmbeddedCurvePoint,\n    _point2: EmbeddedCurvePoint,\n    _predicate: bool,\n) -> [EmbeddedCurvePoint; 1] {}\n\n/// EC addition wrapper for the foreign function\nfn embedded_curve_add_inner(\n    point1: EmbeddedCurvePoint,\n    point2: EmbeddedCurvePoint,\n) -> EmbeddedCurvePoint {\n    embedded_curve_add_array_return(point1, point2, true)[0]\n}\n"
        },
        "17": {
            "path": "std/field/bn254.nr",
            "source": "use crate::field::field_less_than;\nuse crate::runtime::is_unconstrained;\n\n// The low and high decomposition of the field modulus\npub(crate) global PLO: Field = 53438638232309528389504892708671455233;\npub(crate) global PHI: Field = 64323764613183177041862057485226039389;\n\npub(crate) global TWO_POW_128: Field = 0x100000000000000000000000000000000;\n\n// Decomposes a single field into two 16 byte fields.\nfn compute_decomposition(x: Field) -> (Field, Field) {\n    // Here's we're taking advantage of truncating 128 bit limbs from the input field\n    // and then subtracting them from the input such the field division is equivalent to integer division.\n    let low = (x as u128) as Field;\n    let high = (x - low) / TWO_POW_128;\n\n    (low, high)\n}\n\npub(crate) unconstrained fn decompose_hint(x: Field) -> (Field, Field) {\n    compute_decomposition(x)\n}\n\nunconstrained fn lte_hint(x: Field, y: Field) -> bool {\n    if x == y {\n        true\n    } else {\n        field_less_than(x, y)\n    }\n}\n\n// Assert that (alo > blo && ahi >= bhi) || (alo <= blo && ahi > bhi)\nfn assert_gt_limbs(a: (Field, Field), b: (Field, Field)) {\n    let (alo, ahi) = a;\n    let (blo, bhi) = b;\n    // Safety: borrow is enforced to be boolean due to its type.\n    // if borrow is 0, it asserts that (alo > blo && ahi >= bhi)\n    // if borrow is 1, it asserts that (alo <= blo && ahi > bhi)\n    unsafe {\n        let borrow = lte_hint(alo, blo);\n\n        let rlo = alo - blo - 1 + (borrow as Field) * TWO_POW_128;\n        let rhi = ahi - bhi - (borrow as Field);\n\n        rlo.assert_max_bit_size::<128>();\n        rhi.assert_max_bit_size::<128>();\n    }\n}\n\n/// Decompose a single field into two 16 byte fields.\npub fn decompose(x: Field) -> (Field, Field) {\n    if is_unconstrained() {\n        compute_decomposition(x)\n    } else {\n        // Safety: decomposition is properly checked below\n        unsafe {\n            // Take hints of the decomposition\n            let (xlo, xhi) = decompose_hint(x);\n\n            // Range check the limbs\n            xlo.assert_max_bit_size::<128>();\n            xhi.assert_max_bit_size::<128>();\n\n            // Check that the decomposition is correct\n            assert_eq(x, xlo + TWO_POW_128 * xhi);\n\n            // Assert that the decomposition of P is greater than the decomposition of x\n            assert_gt_limbs((PLO, PHI), (xlo, xhi));\n            (xlo, xhi)\n        }\n    }\n}\n\npub fn assert_gt(a: Field, b: Field) {\n    if is_unconstrained() {\n        assert(\n            // Safety: already unconstrained\n            unsafe { field_less_than(b, a) },\n        );\n    } else {\n        // Decompose a and b\n        let a_limbs = decompose(a);\n        let b_limbs = decompose(b);\n\n        // Assert that a_limbs is greater than b_limbs\n        assert_gt_limbs(a_limbs, b_limbs)\n    }\n}\n\npub fn assert_lt(a: Field, b: Field) {\n    assert_gt(b, a);\n}\n\npub fn gt(a: Field, b: Field) -> bool {\n    if is_unconstrained() {\n        // Safety: unsafe in unconstrained\n        unsafe {\n            field_less_than(b, a)\n        }\n    } else if a == b {\n        false\n    } else {\n        // Safety: Take a hint of the comparison and verify it\n        unsafe {\n            if field_less_than(a, b) {\n                assert_gt(b, a);\n                false\n            } else {\n                assert_gt(a, b);\n                true\n            }\n        }\n    }\n}\n\npub fn lt(a: Field, b: Field) -> bool {\n    gt(b, a)\n}\n\nmod tests {\n    // TODO: Allow imports from \"super\"\n    use crate::field::bn254::{assert_gt, decompose, gt, lt, lte_hint, PHI, PLO, TWO_POW_128};\n\n    #[test]\n    fn check_decompose() {\n        assert_eq(decompose(TWO_POW_128), (0, 1));\n        assert_eq(decompose(TWO_POW_128 + 0x1234567890), (0x1234567890, 1));\n        assert_eq(decompose(0x1234567890), (0x1234567890, 0));\n    }\n\n    #[test]\n    unconstrained fn check_lte_hint() {\n        assert(lte_hint(0, 1));\n        assert(lte_hint(0, 0x100));\n        assert(lte_hint(0x100, TWO_POW_128 - 1));\n        assert(!lte_hint(0 - 1, 0));\n\n        assert(lte_hint(0, 0));\n        assert(lte_hint(0x100, 0x100));\n        assert(lte_hint(0 - 1, 0 - 1));\n    }\n\n    #[test]\n    fn check_gt() {\n        assert(gt(1, 0));\n        assert(gt(0x100, 0));\n        assert(gt((0 - 1), (0 - 2)));\n        assert(gt(TWO_POW_128, 0));\n        assert(!gt(0, 0));\n        assert(!gt(0, 0x100));\n        assert(gt(0 - 1, 0 - 2));\n        assert(!gt(0 - 2, 0 - 1));\n        assert_gt(0 - 1, 0);\n    }\n\n    #[test]\n    fn check_plo_phi() {\n        assert_eq(PLO + PHI * TWO_POW_128, 0);\n        let p_bytes = crate::field::modulus_le_bytes();\n        let mut p_low: Field = 0;\n        let mut p_high: Field = 0;\n\n        let mut offset = 1;\n        for i in 0..16 {\n            p_low += (p_bytes[i] as Field) * offset;\n            p_high += (p_bytes[i + 16] as Field) * offset;\n            offset *= 256;\n        }\n        assert_eq(p_low, PLO);\n        assert_eq(p_high, PHI);\n    }\n\n    #[test]\n    fn check_decompose_edge_cases() {\n        assert_eq(decompose(0), (0, 0));\n        assert_eq(decompose(TWO_POW_128 - 1), (TWO_POW_128 - 1, 0));\n        assert_eq(decompose(TWO_POW_128 + 1), (1, 1));\n        assert_eq(decompose(TWO_POW_128 * 2), (0, 2));\n        assert_eq(decompose(TWO_POW_128 * 2 + 0x1234567890), (0x1234567890, 2));\n    }\n\n    #[test]\n    fn check_decompose_large_values() {\n        let large_field = 0xffffffffffffffff;\n        let (lo, hi) = decompose(large_field);\n        assert_eq(large_field, lo + TWO_POW_128 * hi);\n\n        let large_value = large_field - TWO_POW_128;\n        let (lo2, hi2) = decompose(large_value);\n        assert_eq(large_value, lo2 + TWO_POW_128 * hi2);\n    }\n\n    #[test]\n    fn check_lt_comprehensive() {\n        assert(lt(0, 1));\n        assert(!lt(1, 0));\n        assert(!lt(0, 0));\n        assert(!lt(42, 42));\n\n        assert(lt(TWO_POW_128 - 1, TWO_POW_128));\n        assert(!lt(TWO_POW_128, TWO_POW_128 - 1));\n    }\n}\n"
        },
        "18": {
            "path": "std/field/mod.nr",
            "source": "pub mod bn254;\nuse crate::{runtime::is_unconstrained, static_assert};\nuse bn254::lt as bn254_lt;\n\nimpl Field {\n    /// Asserts that `self` can be represented in `bit_size` bits.\n    ///\n    /// # Failures\n    /// Causes a constraint failure for `Field` values exceeding `2^{bit_size}`.\n    // docs:start:assert_max_bit_size\n    pub fn assert_max_bit_size<let BIT_SIZE: u32>(self) {\n        // docs:end:assert_max_bit_size\n        static_assert(\n            BIT_SIZE < modulus_num_bits() as u32,\n            \"BIT_SIZE must be less than modulus_num_bits\",\n        );\n        __assert_max_bit_size(self, BIT_SIZE);\n    }\n\n    /// Decomposes `self` into its little endian bit decomposition as a `[u1; N]` array.\n    /// This array will be zero padded should not all bits be necessary to represent `self`.\n    ///\n    /// # Failures\n    /// Causes a constraint failure for `Field` values exceeding `2^N` as the resulting array will not\n    /// be able to represent the original `Field`.\n    ///\n    /// # Safety\n    /// The bit decomposition returned is canonical and is guaranteed to not overflow the modulus.\n    // docs:start:to_le_bits\n    pub fn to_le_bits<let N: u32>(self: Self) -> [u1; N] {\n        // docs:end:to_le_bits\n        let bits = __to_le_bits(self);\n\n        if !is_unconstrained() {\n            // Ensure that the byte decomposition does not overflow the modulus\n            let p = modulus_le_bits();\n            assert(bits.len() <= p.len());\n            let mut ok = bits.len() != p.len();\n            for i in 0..N {\n                if !ok {\n                    if (bits[N - 1 - i] != p[N - 1 - i]) {\n                        assert(p[N - 1 - i] == 1);\n                        ok = true;\n                    }\n                }\n            }\n            assert(ok);\n        }\n        bits\n    }\n\n    /// Decomposes `self` into its big endian bit decomposition as a `[u1; N]` array.\n    /// This array will be zero padded should not all bits be necessary to represent `self`.\n    ///\n    /// # Failures\n    /// Causes a constraint failure for `Field` values exceeding `2^N` as the resulting array will not\n    /// be able to represent the original `Field`.\n    ///\n    /// # Safety\n    /// The bit decomposition returned is canonical and is guaranteed to not overflow the modulus.\n    // docs:start:to_be_bits\n    pub fn to_be_bits<let N: u32>(self: Self) -> [u1; N] {\n        // docs:end:to_be_bits\n        let bits = __to_be_bits(self);\n\n        if !is_unconstrained() {\n            // Ensure that the decomposition does not overflow the modulus\n            let p = modulus_be_bits();\n            assert(bits.len() <= p.len());\n            let mut ok = bits.len() != p.len();\n            for i in 0..N {\n                if !ok {\n                    if (bits[i] != p[i]) {\n                        assert(p[i] == 1);\n                        ok = true;\n                    }\n                }\n            }\n            assert(ok);\n        }\n        bits\n    }\n\n    /// Decomposes `self` into its little endian byte decomposition as a `[u8;N]` array\n    /// This array will be zero padded should not all bytes be necessary to represent `self`.\n    ///\n    /// # Failures\n    ///  The length N of the array must be big enough to contain all the bytes of the 'self',\n    ///  and no more than the number of bytes required to represent the field modulus\n    ///\n    /// # Safety\n    /// The result is ensured to be the canonical decomposition of the field element\n    // docs:start:to_le_bytes\n    pub fn to_le_bytes<let N: u32>(self: Self) -> [u8; N] {\n        // docs:end:to_le_bytes\n        static_assert(\n            N <= modulus_le_bytes().len(),\n            \"N must be less than or equal to modulus_le_bytes().len()\",\n        );\n        // Compute the byte decomposition\n        let bytes = self.to_le_radix(256);\n\n        if !is_unconstrained() {\n            // Ensure that the byte decomposition does not overflow the modulus\n            let p = modulus_le_bytes();\n            assert(bytes.len() <= p.len());\n            let mut ok = bytes.len() != p.len();\n            for i in 0..N {\n                if !ok {\n                    if (bytes[N - 1 - i] != p[N - 1 - i]) {\n                        assert(bytes[N - 1 - i] < p[N - 1 - i]);\n                        ok = true;\n                    }\n                }\n            }\n            assert(ok);\n        }\n        bytes\n    }\n\n    /// Decomposes `self` into its big endian byte decomposition as a `[u8;N]` array of length required to represent the field modulus\n    /// This array will be zero padded should not all bytes be necessary to represent `self`.\n    ///\n    /// # Failures\n    ///  The length N of the array must be big enough to contain all the bytes of the 'self',\n    ///  and no more than the number of bytes required to represent the field modulus\n    ///\n    /// # Safety\n    /// The result is ensured to be the canonical decomposition of the field element\n    // docs:start:to_be_bytes\n    pub fn to_be_bytes<let N: u32>(self: Self) -> [u8; N] {\n        // docs:end:to_be_bytes\n        static_assert(\n            N <= modulus_le_bytes().len(),\n            \"N must be less than or equal to modulus_le_bytes().len()\",\n        );\n        // Compute the byte decomposition\n        let bytes = self.to_be_radix(256);\n\n        if !is_unconstrained() {\n            // Ensure that the byte decomposition does not overflow the modulus\n            let p = modulus_be_bytes();\n            assert(bytes.len() <= p.len());\n            let mut ok = bytes.len() != p.len();\n            for i in 0..N {\n                if !ok {\n                    if (bytes[i] != p[i]) {\n                        assert(bytes[i] < p[i]);\n                        ok = true;\n                    }\n                }\n            }\n            assert(ok);\n        }\n        bytes\n    }\n\n    fn to_le_radix<let N: u32>(self: Self, radix: u32) -> [u8; N] {\n        // Brillig does not need an immediate radix\n        if !crate::runtime::is_unconstrained() {\n            static_assert(1 < radix, \"radix must be greater than 1\");\n            static_assert(radix <= 256, \"radix must be less than or equal to 256\");\n            static_assert(radix & (radix - 1) == 0, \"radix must be a power of 2\");\n        }\n        __to_le_radix(self, radix)\n    }\n\n    fn to_be_radix<let N: u32>(self: Self, radix: u32) -> [u8; N] {\n        // Brillig does not need an immediate radix\n        if !crate::runtime::is_unconstrained() {\n            static_assert(1 < radix, \"radix must be greater than 1\");\n            static_assert(radix <= 256, \"radix must be less than or equal to 256\");\n            static_assert(radix & (radix - 1) == 0, \"radix must be a power of 2\");\n        }\n        __to_be_radix(self, radix)\n    }\n\n    // Returns self to the power of the given exponent value.\n    // Caution: we assume the exponent fits into 32 bits\n    // using a bigger bit size impacts negatively the performance and should be done only if the exponent does not fit in 32 bits\n    pub fn pow_32(self, exponent: Field) -> Field {\n        let mut r: Field = 1;\n        let b: [u1; 32] = exponent.to_le_bits();\n\n        for i in 1..33 {\n            r *= r;\n            r = (b[32 - i] as Field) * (r * self) + (1 - b[32 - i] as Field) * r;\n        }\n        r\n    }\n\n    // Parity of (prime) Field element, i.e. sgn0(x mod p) = 0 if x `elem` {0, ..., p-1} is even, otherwise sgn0(x mod p) = 1.\n    pub fn sgn0(self) -> u1 {\n        self as u1\n    }\n\n    pub fn lt(self, another: Field) -> bool {\n        if crate::compat::is_bn254() {\n            bn254_lt(self, another)\n        } else {\n            lt_fallback(self, another)\n        }\n    }\n\n    /// Convert a little endian byte array to a field element.\n    /// If the provided byte array overflows the field modulus then the Field will silently wrap around.\n    pub fn from_le_bytes<let N: u32>(bytes: [u8; N]) -> Field {\n        static_assert(\n            N <= modulus_le_bytes().len(),\n            \"N must be less than or equal to modulus_le_bytes().len()\",\n        );\n        let mut v = 1;\n        let mut result = 0;\n\n        for i in 0..N {\n            result += (bytes[i] as Field) * v;\n            v = v * 256;\n        }\n        result\n    }\n\n    /// Convert a big endian byte array to a field element.\n    /// If the provided byte array overflows the field modulus then the Field will silently wrap around.\n    pub fn from_be_bytes<let N: u32>(bytes: [u8; N]) -> Field {\n        let mut v = 1;\n        let mut result = 0;\n\n        for i in 0..N {\n            result += (bytes[N - 1 - i] as Field) * v;\n            v = v * 256;\n        }\n        result\n    }\n}\n\n#[builtin(apply_range_constraint)]\nfn __assert_max_bit_size(value: Field, bit_size: u32) {}\n\n// `_radix` must be less than 256\n#[builtin(to_le_radix)]\nfn __to_le_radix<let N: u32>(value: Field, radix: u32) -> [u8; N] {}\n\n// `_radix` must be less than 256\n#[builtin(to_be_radix)]\nfn __to_be_radix<let N: u32>(value: Field, radix: u32) -> [u8; N] {}\n\n/// Decomposes `self` into its little endian bit decomposition as a `[u1; N]` array.\n/// This array will be zero padded should not all bits be necessary to represent `self`.\n///\n/// # Failures\n/// Causes a constraint failure for `Field` values exceeding `2^N` as the resulting array will not\n/// be able to represent the original `Field`.\n///\n/// # Safety\n/// Values of `N` equal to or greater than the number of bits necessary to represent the `Field` modulus\n/// (e.g. 254 for the BN254 field) allow for multiple bit decompositions. This is due to how the `Field` will\n/// wrap around due to overflow when verifying the decomposition.\n#[builtin(to_le_bits)]\nfn __to_le_bits<let N: u32>(value: Field) -> [u1; N] {}\n\n/// Decomposes `self` into its big endian bit decomposition as a `[u1; N]` array.\n/// This array will be zero padded should not all bits be necessary to represent `self`.\n///\n/// # Failures\n/// Causes a constraint failure for `Field` values exceeding `2^N` as the resulting array will not\n/// be able to represent the original `Field`.\n///\n/// # Safety\n/// Values of `N` equal to or greater than the number of bits necessary to represent the `Field` modulus\n/// (e.g. 254 for the BN254 field) allow for multiple bit decompositions. This is due to how the `Field` will\n/// wrap around due to overflow when verifying the decomposition.\n#[builtin(to_be_bits)]\nfn __to_be_bits<let N: u32>(value: Field) -> [u1; N] {}\n\n#[builtin(modulus_num_bits)]\npub comptime fn modulus_num_bits() -> u64 {}\n\n#[builtin(modulus_be_bits)]\npub comptime fn modulus_be_bits() -> [u1] {}\n\n#[builtin(modulus_le_bits)]\npub comptime fn modulus_le_bits() -> [u1] {}\n\n#[builtin(modulus_be_bytes)]\npub comptime fn modulus_be_bytes() -> [u8] {}\n\n#[builtin(modulus_le_bytes)]\npub comptime fn modulus_le_bytes() -> [u8] {}\n\n/// An unconstrained only built in to efficiently compare fields.\n#[builtin(field_less_than)]\nunconstrained fn __field_less_than(x: Field, y: Field) -> bool {}\n\npub(crate) unconstrained fn field_less_than(x: Field, y: Field) -> bool {\n    __field_less_than(x, y)\n}\n\n// Convert a 32 byte array to a field element by modding\npub fn bytes32_to_field(bytes32: [u8; 32]) -> Field {\n    // Convert it to a field element\n    let mut v = 1;\n    let mut high = 0 as Field;\n    let mut low = 0 as Field;\n\n    for i in 0..16 {\n        high = high + (bytes32[15 - i] as Field) * v;\n        low = low + (bytes32[16 + 15 - i] as Field) * v;\n        v = v * 256;\n    }\n    // Abuse that a % p + b % p = (a + b) % p and that low < p\n    low + high * v\n}\n\nfn lt_fallback(x: Field, y: Field) -> bool {\n    if is_unconstrained() {\n        // Safety: unconstrained context\n        unsafe {\n            field_less_than(x, y)\n        }\n    } else {\n        let x_bytes: [u8; 32] = x.to_le_bytes();\n        let y_bytes: [u8; 32] = y.to_le_bytes();\n        let mut x_is_lt = false;\n        let mut done = false;\n        for i in 0..32 {\n            if (!done) {\n                let x_byte = x_bytes[32 - 1 - i] as u8;\n                let y_byte = y_bytes[32 - 1 - i] as u8;\n                let bytes_match = x_byte == y_byte;\n                if !bytes_match {\n                    x_is_lt = x_byte < y_byte;\n                    done = true;\n                }\n            }\n        }\n        x_is_lt\n    }\n}\n\nmod tests {\n    use crate::{panic::panic, runtime, static_assert};\n    use super::{\n        field_less_than, modulus_be_bits, modulus_be_bytes, modulus_le_bits, modulus_le_bytes,\n    };\n\n    #[test]\n    // docs:start:to_be_bits_example\n    fn test_to_be_bits() {\n        let field = 2;\n        let bits: [u1; 8] = field.to_be_bits();\n        assert_eq(bits, [0, 0, 0, 0, 0, 0, 1, 0]);\n    }\n    // docs:end:to_be_bits_example\n\n    #[test]\n    // docs:start:to_le_bits_example\n    fn test_to_le_bits() {\n        let field = 2;\n        let bits: [u1; 8] = field.to_le_bits();\n        assert_eq(bits, [0, 1, 0, 0, 0, 0, 0, 0]);\n    }\n    // docs:end:to_le_bits_example\n\n    #[test]\n    // docs:start:to_be_bytes_example\n    fn test_to_be_bytes() {\n        let field = 2;\n        let bytes: [u8; 8] = field.to_be_bytes();\n        assert_eq(bytes, [0, 0, 0, 0, 0, 0, 0, 2]);\n        assert_eq(Field::from_be_bytes::<8>(bytes), field);\n    }\n    // docs:end:to_be_bytes_example\n\n    #[test]\n    // docs:start:to_le_bytes_example\n    fn test_to_le_bytes() {\n        let field = 2;\n        let bytes: [u8; 8] = field.to_le_bytes();\n        assert_eq(bytes, [2, 0, 0, 0, 0, 0, 0, 0]);\n        assert_eq(Field::from_le_bytes::<8>(bytes), field);\n    }\n    // docs:end:to_le_bytes_example\n\n    #[test]\n    // docs:start:to_be_radix_example\n    fn test_to_be_radix() {\n        // 259, in base 256, big endian, is [1, 3].\n        // i.e. 3 * 256^0 + 1 * 256^1\n        let field = 259;\n\n        // The radix (in this example, 256) must be a power of 2.\n        // The length of the returned byte array can be specified to be\n        // >= the amount of space needed.\n        let bytes: [u8; 8] = field.to_be_radix(256);\n        assert_eq(bytes, [0, 0, 0, 0, 0, 0, 1, 3]);\n        assert_eq(Field::from_be_bytes::<8>(bytes), field);\n    }\n    // docs:end:to_be_radix_example\n\n    #[test]\n    // docs:start:to_le_radix_example\n    fn test_to_le_radix() {\n        // 259, in base 256, little endian, is [3, 1].\n        // i.e. 3 * 256^0 + 1 * 256^1\n        let field = 259;\n\n        // The radix (in this example, 256) must be a power of 2.\n        // The length of the returned byte array can be specified to be\n        // >= the amount of space needed.\n        let bytes: [u8; 8] = field.to_le_radix(256);\n        assert_eq(bytes, [3, 1, 0, 0, 0, 0, 0, 0]);\n        assert_eq(Field::from_le_bytes::<8>(bytes), field);\n    }\n    // docs:end:to_le_radix_example\n\n    #[test(should_fail_with = \"radix must be greater than 1\")]\n    fn test_to_le_radix_1() {\n        // this test should only fail in constrained mode\n        if !runtime::is_unconstrained() {\n            let field = 2;\n            let _: [u8; 8] = field.to_le_radix(1);\n        } else {\n            panic(\"radix must be greater than 1\");\n        }\n    }\n\n    // Updated test to account for Brillig restriction that radix must be greater than 2\n    #[test(should_fail_with = \"radix must be greater than 1\")]\n    fn test_to_le_radix_brillig_1() {\n        // this test should only fail in constrained mode\n        if !runtime::is_unconstrained() {\n            let field = 1;\n            let _: [u8; 8] = field.to_le_radix(1);\n        } else {\n            panic(\"radix must be greater than 1\");\n        }\n    }\n\n    #[test(should_fail_with = \"radix must be a power of 2\")]\n    fn test_to_le_radix_3() {\n        // this test should only fail in constrained mode\n        if !runtime::is_unconstrained() {\n            let field = 2;\n            let _: [u8; 8] = field.to_le_radix(3);\n        } else {\n            panic(\"radix must be a power of 2\");\n        }\n    }\n\n    #[test]\n    fn test_to_le_radix_brillig_3() {\n        // this test should only fail in constrained mode\n        if runtime::is_unconstrained() {\n            let field = 1;\n            let out: [u8; 8] = field.to_le_radix(3);\n            let mut expected = [0; 8];\n            expected[0] = 1;\n            assert(out == expected, \"unexpected result\");\n        }\n    }\n\n    #[test(should_fail_with = \"radix must be less than or equal to 256\")]\n    fn test_to_le_radix_512() {\n        // this test should only fail in constrained mode\n        if !runtime::is_unconstrained() {\n            let field = 2;\n            let _: [u8; 8] = field.to_le_radix(512);\n        } else {\n            panic(\"radix must be less than or equal to 256\")\n        }\n    }\n\n    #[test(should_fail_with = \"Field failed to decompose into specified 16 limbs\")]\n    unconstrained fn not_enough_limbs_brillig() {\n        let _: [u8; 16] = 0x100000000000000000000000000000000.to_le_bytes();\n    }\n\n    #[test(should_fail_with = \"Field failed to decompose into specified 16 limbs\")]\n    fn not_enough_limbs() {\n        let _: [u8; 16] = 0x100000000000000000000000000000000.to_le_bytes();\n    }\n\n    #[test]\n    unconstrained fn test_field_less_than() {\n        assert(field_less_than(0, 1));\n        assert(field_less_than(0, 0x100));\n        assert(field_less_than(0x100, 0 - 1));\n        assert(!field_less_than(0 - 1, 0));\n    }\n\n    #[test]\n    unconstrained fn test_large_field_values_unconstrained() {\n        let large_field = 0xffffffffffffffff;\n\n        let bits: [u1; 64] = large_field.to_le_bits();\n        assert_eq(bits[0], 1);\n\n        let bytes: [u8; 8] = large_field.to_le_bytes();\n        assert_eq(Field::from_le_bytes::<8>(bytes), large_field);\n\n        let radix_bytes: [u8; 8] = large_field.to_le_radix(256);\n        assert_eq(Field::from_le_bytes::<8>(radix_bytes), large_field);\n    }\n\n    #[test]\n    fn test_large_field_values() {\n        let large_val = 0xffffffffffffffff;\n\n        let bits: [u1; 64] = large_val.to_le_bits();\n        assert_eq(bits[0], 1);\n\n        let bytes: [u8; 8] = large_val.to_le_bytes();\n        assert_eq(Field::from_le_bytes::<8>(bytes), large_val);\n\n        let radix_bytes: [u8; 8] = large_val.to_le_radix(256);\n        assert_eq(Field::from_le_bytes::<8>(radix_bytes), large_val);\n    }\n\n    #[test]\n    fn test_decomposition_edge_cases() {\n        let zero_bits: [u1; 8] = 0.to_le_bits();\n        assert_eq(zero_bits, [0; 8]);\n\n        let zero_bytes: [u8; 8] = 0.to_le_bytes();\n        assert_eq(zero_bytes, [0; 8]);\n\n        let one_bits: [u1; 8] = 1.to_le_bits();\n        let expected: [u1; 8] = [1, 0, 0, 0, 0, 0, 0, 0];\n        assert_eq(one_bits, expected);\n\n        let pow2_bits: [u1; 8] = 4.to_le_bits();\n        let expected: [u1; 8] = [0, 0, 1, 0, 0, 0, 0, 0];\n        assert_eq(pow2_bits, expected);\n    }\n\n    #[test]\n    fn test_pow_32() {\n        assert_eq(2.pow_32(3), 8);\n        assert_eq(3.pow_32(2), 9);\n        assert_eq(5.pow_32(0), 1);\n        assert_eq(7.pow_32(1), 7);\n\n        assert_eq(2.pow_32(10), 1024);\n\n        assert_eq(0.pow_32(5), 0);\n        assert_eq(0.pow_32(0), 1);\n\n        assert_eq(1.pow_32(100), 1);\n    }\n\n    #[test]\n    fn test_sgn0() {\n        assert_eq(0.sgn0(), 0);\n        assert_eq(2.sgn0(), 0);\n        assert_eq(4.sgn0(), 0);\n        assert_eq(100.sgn0(), 0);\n\n        assert_eq(1.sgn0(), 1);\n        assert_eq(3.sgn0(), 1);\n        assert_eq(5.sgn0(), 1);\n        assert_eq(101.sgn0(), 1);\n    }\n\n    #[test(should_fail_with = \"Field failed to decompose into specified 8 limbs\")]\n    fn test_bit_decomposition_overflow() {\n        // 8 bits can't represent large field values\n        let large_val = 0x1000000000000000;\n        let _: [u1; 8] = large_val.to_le_bits();\n    }\n\n    #[test(should_fail_with = \"Field failed to decompose into specified 4 limbs\")]\n    fn test_byte_decomposition_overflow() {\n        // 4 bytes can't represent large field values\n        let large_val = 0x1000000000000000;\n        let _: [u8; 4] = large_val.to_le_bytes();\n    }\n\n    #[test]\n    fn test_to_from_be_bytes_bn254_edge_cases() {\n        if crate::compat::is_bn254() {\n            // checking that decrementing this byte produces the expected 32 BE bytes for (modulus - 1)\n            let mut p_minus_1_bytes: [u8; 32] = modulus_be_bytes().as_array();\n            assert(p_minus_1_bytes[32 - 1] > 0);\n            p_minus_1_bytes[32 - 1] -= 1;\n\n            let p_minus_1 = Field::from_be_bytes::<32>(p_minus_1_bytes);\n            assert_eq(p_minus_1 + 1, 0);\n\n            // checking that converting (modulus - 1) from and then to 32 BE bytes produces the same bytes\n            let p_minus_1_converted_bytes: [u8; 32] = p_minus_1.to_be_bytes();\n            assert_eq(p_minus_1_converted_bytes, p_minus_1_bytes);\n\n            // checking that incrementing this byte produces 32 BE bytes for (modulus + 1)\n            let mut p_plus_1_bytes: [u8; 32] = modulus_be_bytes().as_array();\n            assert(p_plus_1_bytes[32 - 1] < 255);\n            p_plus_1_bytes[32 - 1] += 1;\n\n            let p_plus_1 = Field::from_be_bytes::<32>(p_plus_1_bytes);\n            assert_eq(p_plus_1, 1);\n\n            // checking that converting p_plus_1 to 32 BE bytes produces the same\n            // byte set to 1 as p_plus_1_bytes and otherwise zeroes\n            let mut p_plus_1_converted_bytes: [u8; 32] = p_plus_1.to_be_bytes();\n            assert_eq(p_plus_1_converted_bytes[32 - 1], 1);\n            p_plus_1_converted_bytes[32 - 1] = 0;\n            assert_eq(p_plus_1_converted_bytes, [0; 32]);\n\n            // checking that Field::from_be_bytes::<32> on the Field modulus produces 0\n            assert_eq(modulus_be_bytes().len(), 32);\n            let p = Field::from_be_bytes::<32>(modulus_be_bytes().as_array());\n            assert_eq(p, 0);\n\n            // checking that converting 0 to 32 BE bytes produces 32 zeroes\n            let p_bytes: [u8; 32] = 0.to_be_bytes();\n            assert_eq(p_bytes, [0; 32]);\n        }\n    }\n\n    #[test]\n    fn test_to_from_le_bytes_bn254_edge_cases() {\n        if crate::compat::is_bn254() {\n            // checking that decrementing this byte produces the expected 32 LE bytes for (modulus - 1)\n            let mut p_minus_1_bytes: [u8; 32] = modulus_le_bytes().as_array();\n            assert(p_minus_1_bytes[0] > 0);\n            p_minus_1_bytes[0] -= 1;\n\n            let p_minus_1 = Field::from_le_bytes::<32>(p_minus_1_bytes);\n            assert_eq(p_minus_1 + 1, 0);\n\n            // checking that converting (modulus - 1) from and then to 32 BE bytes produces the same bytes\n            let p_minus_1_converted_bytes: [u8; 32] = p_minus_1.to_le_bytes();\n            assert_eq(p_minus_1_converted_bytes, p_minus_1_bytes);\n\n            // checking that incrementing this byte produces 32 LE bytes for (modulus + 1)\n            let mut p_plus_1_bytes: [u8; 32] = modulus_le_bytes().as_array();\n            assert(p_plus_1_bytes[0] < 255);\n            p_plus_1_bytes[0] += 1;\n\n            let p_plus_1 = Field::from_le_bytes::<32>(p_plus_1_bytes);\n            assert_eq(p_plus_1, 1);\n\n            // checking that converting p_plus_1 to 32 LE bytes produces the same\n            // byte set to 1 as p_plus_1_bytes and otherwise zeroes\n            let mut p_plus_1_converted_bytes: [u8; 32] = p_plus_1.to_le_bytes();\n            assert_eq(p_plus_1_converted_bytes[0], 1);\n            p_plus_1_converted_bytes[0] = 0;\n            assert_eq(p_plus_1_converted_bytes, [0; 32]);\n\n            // checking that Field::from_le_bytes::<32> on the Field modulus produces 0\n            assert_eq(modulus_le_bytes().len(), 32);\n            let p = Field::from_le_bytes::<32>(modulus_le_bytes().as_array());\n            assert_eq(p, 0);\n\n            // checking that converting 0 to 32 LE bytes produces 32 zeroes\n            let p_bytes: [u8; 32] = 0.to_le_bytes();\n            assert_eq(p_bytes, [0; 32]);\n        }\n    }\n\n    /// Convert a little endian bit array to a field element.\n    /// If the provided bit array overflows the field modulus then the Field will silently wrap around.\n    fn from_le_bits<let N: u32>(bits: [u1; N]) -> Field {\n        static_assert(\n            N <= modulus_le_bits().len(),\n            \"N must be less than or equal to modulus_le_bits().len()\",\n        );\n        let mut v = 1;\n        let mut result = 0;\n\n        for i in 0..N {\n            result += (bits[i] as Field) * v;\n            v = v * 2;\n        }\n        result\n    }\n\n    /// Convert a big endian bit array to a field element.\n    /// If the provided bit array overflows the field modulus then the Field will silently wrap around.\n    fn from_be_bits<let N: u32>(bits: [u1; N]) -> Field {\n        let mut v = 1;\n        let mut result = 0;\n\n        for i in 0..N {\n            result += (bits[N - 1 - i] as Field) * v;\n            v = v * 2;\n        }\n        result\n    }\n\n    #[test]\n    fn test_to_from_be_bits_bn254_edge_cases() {\n        if crate::compat::is_bn254() {\n            // checking that decrementing this bit produces the expected 254 BE bits for (modulus - 1)\n            let mut p_minus_1_bits: [u1; 254] = modulus_be_bits().as_array();\n            assert(p_minus_1_bits[254 - 1] > 0);\n            p_minus_1_bits[254 - 1] -= 1;\n\n            let p_minus_1 = from_be_bits::<254>(p_minus_1_bits);\n            assert_eq(p_minus_1 + 1, 0);\n\n            // checking that converting (modulus - 1) from and then to 254 BE bits produces the same bits\n            let p_minus_1_converted_bits: [u1; 254] = p_minus_1.to_be_bits();\n            assert_eq(p_minus_1_converted_bits, p_minus_1_bits);\n\n            // checking that incrementing this bit produces 254 BE bits for (modulus + 4)\n            let mut p_plus_4_bits: [u1; 254] = modulus_be_bits().as_array();\n            assert(p_plus_4_bits[254 - 3] < 1);\n            p_plus_4_bits[254 - 3] += 1;\n\n            let p_plus_4 = from_be_bits::<254>(p_plus_4_bits);\n            assert_eq(p_plus_4, 4);\n\n            // checking that converting p_plus_4 to 254 BE bits produces the same\n            // bit set to 1 as p_plus_4_bits and otherwise zeroes\n            let mut p_plus_4_converted_bits: [u1; 254] = p_plus_4.to_be_bits();\n            assert_eq(p_plus_4_converted_bits[254 - 3], 1);\n            p_plus_4_converted_bits[254 - 3] = 0;\n            assert_eq(p_plus_4_converted_bits, [0; 254]);\n\n            // checking that Field::from_be_bits::<254> on the Field modulus produces 0\n            assert_eq(modulus_be_bits().len(), 254);\n            let p = from_be_bits::<254>(modulus_be_bits().as_array());\n            assert_eq(p, 0);\n\n            // checking that converting 0 to 254 BE bytes produces 254 zeroes\n            let p_bits: [u1; 254] = 0.to_be_bits();\n            assert_eq(p_bits, [0; 254]);\n        }\n    }\n\n    #[test]\n    fn test_to_from_le_bits_bn254_edge_cases() {\n        if crate::compat::is_bn254() {\n            // checking that decrementing this bit produces the expected 254 LE bits for (modulus - 1)\n            let mut p_minus_1_bits: [u1; 254] = modulus_le_bits().as_array();\n            assert(p_minus_1_bits[0] > 0);\n            p_minus_1_bits[0] -= 1;\n\n            let p_minus_1 = from_le_bits::<254>(p_minus_1_bits);\n            assert_eq(p_minus_1 + 1, 0);\n\n            // checking that converting (modulus - 1) from and then to 254 BE bits produces the same bits\n            let p_minus_1_converted_bits: [u1; 254] = p_minus_1.to_le_bits();\n            assert_eq(p_minus_1_converted_bits, p_minus_1_bits);\n\n            // checking that incrementing this bit produces 254 LE bits for (modulus + 4)\n            let mut p_plus_4_bits: [u1; 254] = modulus_le_bits().as_array();\n            assert(p_plus_4_bits[2] < 1);\n            p_plus_4_bits[2] += 1;\n\n            let p_plus_4 = from_le_bits::<254>(p_plus_4_bits);\n            assert_eq(p_plus_4, 4);\n\n            // checking that converting p_plus_4 to 254 LE bits produces the same\n            // bit set to 1 as p_plus_4_bits and otherwise zeroes\n            let mut p_plus_4_converted_bits: [u1; 254] = p_plus_4.to_le_bits();\n            assert_eq(p_plus_4_converted_bits[2], 1);\n            p_plus_4_converted_bits[2] = 0;\n            assert_eq(p_plus_4_converted_bits, [0; 254]);\n\n            // checking that Field::from_le_bits::<254> on the Field modulus produces 0\n            assert_eq(modulus_le_bits().len(), 254);\n            let p = from_le_bits::<254>(modulus_le_bits().as_array());\n            assert_eq(p, 0);\n\n            // checking that converting 0 to 254 LE bytes produces 254 zeroes\n            let p_bits: [u1; 254] = 0.to_le_bits();\n            assert_eq(p_bits, [0; 254]);\n        }\n    }\n}\n"
        },
        "19": {
            "path": "std/hash/mod.nr",
            "source": "// Exposed only for usage in `std::meta`\npub(crate) mod poseidon2;\n\nuse crate::default::Default;\nuse crate::embedded_curve_ops::{\n    EmbeddedCurvePoint, EmbeddedCurveScalar, multi_scalar_mul, multi_scalar_mul_array_return,\n};\nuse crate::meta::derive_via;\n\n#[foreign(sha256_compression)]\n// docs:start:sha256_compression\npub fn sha256_compression(input: [u32; 16], state: [u32; 8]) -> [u32; 8] {}\n// docs:end:sha256_compression\n\n#[foreign(keccakf1600)]\n// docs:start:keccakf1600\npub fn keccakf1600(input: [u64; 25]) -> [u64; 25] {}\n// docs:end:keccakf1600\n\npub mod keccak {\n    #[deprecated(\"This function has been moved to std::hash::keccakf1600\")]\n    pub fn keccakf1600(input: [u64; 25]) -> [u64; 25] {\n        super::keccakf1600(input)\n    }\n}\n\n#[foreign(blake2s)]\n// docs:start:blake2s\npub fn blake2s<let N: u32>(input: [u8; N]) -> [u8; 32]\n// docs:end:blake2s\n{}\n\n// docs:start:blake3\npub fn blake3<let N: u32>(input: [u8; N]) -> [u8; 32]\n// docs:end:blake3\n{\n    if crate::runtime::is_unconstrained() {\n        // Temporary measure while Barretenberg is main proving system.\n        // Please open an issue if you're working on another proving system and running into problems due to this.\n        crate::static_assert(\n            N <= 1024,\n            \"Barretenberg cannot prove blake3 hashes with inputs larger than 1024 bytes\",\n        );\n    }\n    __blake3(input)\n}\n\n#[foreign(blake3)]\nfn __blake3<let N: u32>(input: [u8; N]) -> [u8; 32] {}\n\n// docs:start:pedersen_commitment\npub fn pedersen_commitment<let N: u32>(input: [Field; N]) -> EmbeddedCurvePoint {\n    // docs:end:pedersen_commitment\n    pedersen_commitment_with_separator(input, 0)\n}\n\n#[inline_always]\npub fn pedersen_commitment_with_separator<let N: u32>(\n    input: [Field; N],\n    separator: u32,\n) -> EmbeddedCurvePoint {\n    let mut points = [EmbeddedCurveScalar { lo: 0, hi: 0 }; N];\n    for i in 0..N {\n        // we use the unsafe version because the multi_scalar_mul will constrain the scalars.\n        points[i] = from_field_unsafe(input[i]);\n    }\n    let generators = derive_generators(\"DEFAULT_DOMAIN_SEPARATOR\".as_bytes(), separator);\n    multi_scalar_mul(generators, points)\n}\n\n// docs:start:pedersen_hash\npub fn pedersen_hash<let N: u32>(input: [Field; N]) -> Field\n// docs:end:pedersen_hash\n{\n    pedersen_hash_with_separator(input, 0)\n}\n\n#[no_predicates]\npub fn pedersen_hash_with_separator<let N: u32>(input: [Field; N], separator: u32) -> Field {\n    let mut scalars: [EmbeddedCurveScalar; N + 1] = [EmbeddedCurveScalar { lo: 0, hi: 0 }; N + 1];\n    let mut generators: [EmbeddedCurvePoint; N + 1] =\n        [EmbeddedCurvePoint::point_at_infinity(); N + 1];\n    crate::assert_constant(separator);\n    let domain_generators: [EmbeddedCurvePoint; N] =\n        derive_generators(\"DEFAULT_DOMAIN_SEPARATOR\".as_bytes(), separator);\n\n    for i in 0..N {\n        scalars[i] = from_field_unsafe(input[i]);\n        generators[i] = domain_generators[i];\n    }\n    scalars[N] = EmbeddedCurveScalar { lo: N as Field, hi: 0 as Field };\n\n    let length_generator: [EmbeddedCurvePoint; 1] =\n        derive_generators(\"pedersen_hash_length\".as_bytes(), 0);\n    generators[N] = length_generator[0];\n    multi_scalar_mul_array_return(generators, scalars, true)[0].x\n}\n\n#[field(bn254)]\n#[inline_always]\npub fn derive_generators<let N: u32, let M: u32>(\n    domain_separator_bytes: [u8; M],\n    starting_index: u32,\n) -> [EmbeddedCurvePoint; N] {\n    crate::assert_constant(domain_separator_bytes);\n    crate::assert_constant(starting_index);\n    __derive_generators(domain_separator_bytes, starting_index)\n}\n\n#[builtin(derive_pedersen_generators)]\n#[field(bn254)]\nfn __derive_generators<let N: u32, let M: u32>(\n    domain_separator_bytes: [u8; M],\n    starting_index: u32,\n) -> [EmbeddedCurvePoint; N] {}\n\n#[field(bn254)]\n// Decompose the input 'bn254 scalar' into two 128 bits limbs.\n// It is called 'unsafe' because it does not assert the limbs are 128 bits\n// Assuming the limbs are 128 bits:\n// Assert the decomposition does not overflow the field size.\nfn from_field_unsafe(scalar: Field) -> EmbeddedCurveScalar {\n    // Safety: xlo and xhi decomposition is checked below\n    let (xlo, xhi) = unsafe { crate::field::bn254::decompose_hint(scalar) };\n    // Check that the decomposition is correct\n    assert_eq(scalar, xlo + crate::field::bn254::TWO_POW_128 * xhi);\n    // Check that the decomposition does not overflow the field size\n    let (a, b) = if xhi == crate::field::bn254::PHI {\n        (xlo, crate::field::bn254::PLO)\n    } else {\n        (xhi, crate::field::bn254::PHI)\n    };\n    crate::field::bn254::assert_lt(a, b);\n\n    EmbeddedCurveScalar { lo: xlo, hi: xhi }\n}\n\npub fn poseidon2_permutation<let N: u32>(input: [Field; N], state_len: u32) -> [Field; N] {\n    assert_eq(input.len(), state_len);\n    poseidon2_permutation_internal(input)\n}\n\n#[foreign(poseidon2_permutation)]\nfn poseidon2_permutation_internal<let N: u32>(input: [Field; N]) -> [Field; N] {}\n\n// Generic hashing support.\n// Partially ported and impacted by rust.\n\n// Hash trait shall be implemented per type.\n#[derive_via(derive_hash)]\npub trait Hash {\n    fn hash<H>(self, state: &mut H)\n    where\n        H: Hasher;\n}\n\n// docs:start:derive_hash\ncomptime fn derive_hash(s: TypeDefinition) -> Quoted {\n    let name = quote { $crate::hash::Hash };\n    let signature = quote { fn hash<H>(_self: Self, _state: &mut H) where H: $crate::hash::Hasher };\n    let for_each_field = |name| quote { _self.$name.hash(_state); };\n    crate::meta::make_trait_impl(\n        s,\n        name,\n        signature,\n        for_each_field,\n        quote {},\n        |fields| fields,\n    )\n}\n// docs:end:derive_hash\n\n// Hasher trait shall be implemented by algorithms to provide hash-agnostic means.\n// TODO: consider making the types generic here ([u8], [Field], etc.)\npub trait Hasher {\n    fn finish(self) -> Field;\n\n    fn write(&mut self, input: Field);\n}\n\n// BuildHasher is a factory trait, responsible for production of specific Hasher.\npub trait BuildHasher {\n    type H: Hasher;\n\n    fn build_hasher(self) -> H;\n}\n\npub struct BuildHasherDefault<H>;\n\nimpl<H> BuildHasher for BuildHasherDefault<H>\nwhere\n    H: Hasher + Default,\n{\n    type H = H;\n\n    fn build_hasher(_self: Self) -> H {\n        H::default()\n    }\n}\n\nimpl<H> Default for BuildHasherDefault<H>\nwhere\n    H: Hasher + Default,\n{\n    fn default() -> Self {\n        BuildHasherDefault {}\n    }\n}\n\nimpl Hash for Field {\n    fn hash<H>(self, state: &mut H)\n    where\n        H: Hasher,\n    {\n        H::write(state, self);\n    }\n}\n\nimpl Hash for u1 {\n    fn hash<H>(self, state: &mut H)\n    where\n        H: Hasher,\n    {\n        H::write(state, self as Field);\n    }\n}\n\nimpl Hash for u8 {\n    fn hash<H>(self, state: &mut H)\n    where\n        H: Hasher,\n    {\n        H::write(state, self as Field);\n    }\n}\n\nimpl Hash for u16 {\n    fn hash<H>(self, state: &mut H)\n    where\n        H: Hasher,\n    {\n        H::write(state, self as Field);\n    }\n}\n\nimpl Hash for u32 {\n    fn hash<H>(self, state: &mut H)\n    where\n        H: Hasher,\n    {\n        H::write(state, self as Field);\n    }\n}\n\nimpl Hash for u64 {\n    fn hash<H>(self, state: &mut H)\n    where\n        H: Hasher,\n    {\n        H::write(state, self as Field);\n    }\n}\n\nimpl Hash for u128 {\n    fn hash<H>(self, state: &mut H)\n    where\n        H: Hasher,\n    {\n        H::write(state, self as Field);\n    }\n}\n\nimpl Hash for i8 {\n    fn hash<H>(self, state: &mut H)\n    where\n        H: Hasher,\n    {\n        H::write(state, self as u8 as Field);\n    }\n}\n\nimpl Hash for i16 {\n    fn hash<H>(self, state: &mut H)\n    where\n        H: Hasher,\n    {\n        H::write(state, self as u16 as Field);\n    }\n}\n\nimpl Hash for i32 {\n    fn hash<H>(self, state: &mut H)\n    where\n        H: Hasher,\n    {\n        H::write(state, self as u32 as Field);\n    }\n}\n\nimpl Hash for i64 {\n    fn hash<H>(self, state: &mut H)\n    where\n        H: Hasher,\n    {\n        H::write(state, self as u64 as Field);\n    }\n}\n\nimpl Hash for bool {\n    fn hash<H>(self, state: &mut H)\n    where\n        H: Hasher,\n    {\n        H::write(state, self as Field);\n    }\n}\n\nimpl Hash for () {\n    fn hash<H>(_self: Self, _state: &mut H)\n    where\n        H: Hasher,\n    {}\n}\n\nimpl<T, let N: u32> Hash for [T; N]\nwhere\n    T: Hash,\n{\n    fn hash<H>(self, state: &mut H)\n    where\n        H: Hasher,\n    {\n        for elem in self {\n            elem.hash(state);\n        }\n    }\n}\n\nimpl<T> Hash for [T]\nwhere\n    T: Hash,\n{\n    fn hash<H>(self, state: &mut H)\n    where\n        H: Hasher,\n    {\n        self.len().hash(state);\n        for elem in self {\n            elem.hash(state);\n        }\n    }\n}\n\nimpl<A, B> Hash for (A, B)\nwhere\n    A: Hash,\n    B: Hash,\n{\n    fn hash<H>(self, state: &mut H)\n    where\n        H: Hasher,\n    {\n        self.0.hash(state);\n        self.1.hash(state);\n    }\n}\n\nimpl<A, B, C> Hash for (A, B, C)\nwhere\n    A: Hash,\n    B: Hash,\n    C: Hash,\n{\n    fn hash<H>(self, state: &mut H)\n    where\n        H: Hasher,\n    {\n        self.0.hash(state);\n        self.1.hash(state);\n        self.2.hash(state);\n    }\n}\n\nimpl<A, B, C, D> Hash for (A, B, C, D)\nwhere\n    A: Hash,\n    B: Hash,\n    C: Hash,\n    D: Hash,\n{\n    fn hash<H>(self, state: &mut H)\n    where\n        H: Hasher,\n    {\n        self.0.hash(state);\n        self.1.hash(state);\n        self.2.hash(state);\n        self.3.hash(state);\n    }\n}\n\nimpl<A, B, C, D, E> Hash for (A, B, C, D, E)\nwhere\n    A: Hash,\n    B: Hash,\n    C: Hash,\n    D: Hash,\n    E: Hash,\n{\n    fn hash<H>(self, state: &mut H)\n    where\n        H: Hasher,\n    {\n        self.0.hash(state);\n        self.1.hash(state);\n        self.2.hash(state);\n        self.3.hash(state);\n        self.4.hash(state);\n    }\n}\n\n// Some test vectors for Pedersen hash and Pedersen Commitment.\n// They have been generated using the same functions so the tests are for now useless\n// but they will be useful when we switch to Noir implementation.\n#[test]\nfn assert_pedersen() {\n    assert_eq(\n        pedersen_hash_with_separator([1], 1),\n        0x1b3f4b1a83092a13d8d1a59f7acb62aba15e7002f4440f2275edb99ebbc2305f,\n    );\n    assert_eq(\n        pedersen_commitment_with_separator([1], 1),\n        EmbeddedCurvePoint {\n            x: 0x054aa86a73cb8a34525e5bbed6e43ba1198e860f5f3950268f71df4591bde402,\n            y: 0x209dcfbf2cfb57f9f6046f44d71ac6faf87254afc7407c04eb621a6287cac126,\n            is_infinite: false,\n        },\n    );\n\n    assert_eq(\n        pedersen_hash_with_separator([1, 2], 2),\n        0x26691c129448e9ace0c66d11f0a16d9014a9e8498ee78f4d69f0083168188255,\n    );\n    assert_eq(\n        pedersen_commitment_with_separator([1, 2], 2),\n        EmbeddedCurvePoint {\n            x: 0x2e2b3b191e49541fe468ec6877721d445dcaffe41728df0a0eafeb15e87b0753,\n            y: 0x2ff4482400ad3a6228be17a2af33e2bcdf41be04795f9782bd96efe7e24f8778,\n            is_infinite: false,\n        },\n    );\n    assert_eq(\n        pedersen_hash_with_separator([1, 2, 3], 3),\n        0x0bc694b7a1f8d10d2d8987d07433f26bd616a2d351bc79a3c540d85b6206dbe4,\n    );\n    assert_eq(\n        pedersen_commitment_with_separator([1, 2, 3], 3),\n        EmbeddedCurvePoint {\n            x: 0x1fee4e8cf8d2f527caa2684236b07c4b1bad7342c01b0f75e9a877a71827dc85,\n            y: 0x2f9fedb9a090697ab69bf04c8bc15f7385b3e4b68c849c1536e5ae15ff138fd1,\n            is_infinite: false,\n        },\n    );\n    assert_eq(\n        pedersen_hash_with_separator([1, 2, 3, 4], 4),\n        0xdae10fb32a8408521803905981a2b300d6a35e40e798743e9322b223a5eddc,\n    );\n    assert_eq(\n        pedersen_commitment_with_separator([1, 2, 3, 4], 4),\n        EmbeddedCurvePoint {\n            x: 0x07ae3e202811e1fca39c2d81eabe6f79183978e6f12be0d3b8eda095b79bdbc9,\n            y: 0x0afc6f892593db6fbba60f2da558517e279e0ae04f95758587760ba193145014,\n            is_infinite: false,\n        },\n    );\n    assert_eq(\n        pedersen_hash_with_separator([1, 2, 3, 4, 5], 5),\n        0xfc375b062c4f4f0150f7100dfb8d9b72a6d28582dd9512390b0497cdad9c22,\n    );\n    assert_eq(\n        pedersen_commitment_with_separator([1, 2, 3, 4, 5], 5),\n        EmbeddedCurvePoint {\n            x: 0x1754b12bd475a6984a1094b5109eeca9838f4f81ac89c5f0a41dbce53189bb29,\n            y: 0x2da030e3cfcdc7ddad80eaf2599df6692cae0717d4e9f7bfbee8d073d5d278f7,\n            is_infinite: false,\n        },\n    );\n    assert_eq(\n        pedersen_hash_with_separator([1, 2, 3, 4, 5, 6], 6),\n        0x1696ed13dc2730062a98ac9d8f9de0661bb98829c7582f699d0273b18c86a572,\n    );\n    assert_eq(\n        pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6], 6),\n        EmbeddedCurvePoint {\n            x: 0x190f6c0e97ad83e1e28da22a98aae156da083c5a4100e929b77e750d3106a697,\n            y: 0x1f4b60f34ef91221a0b49756fa0705da93311a61af73d37a0c458877706616fb,\n            is_infinite: false,\n        },\n    );\n    assert_eq(\n        pedersen_hash_with_separator([1, 2, 3, 4, 5, 6, 7], 7),\n        0x128c0ff144fc66b6cb60eeac8a38e23da52992fc427b92397a7dffd71c45ede3,\n    );\n    assert_eq(\n        pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6, 7], 7),\n        EmbeddedCurvePoint {\n            x: 0x015441e9d29491b06563fac16fc76abf7a9534c715421d0de85d20dbe2965939,\n            y: 0x1d2575b0276f4e9087e6e07c2cb75aa1baafad127af4be5918ef8a2ef2fea8fc,\n            is_infinite: false,\n        },\n    );\n    assert_eq(\n        pedersen_hash_with_separator([1, 2, 3, 4, 5, 6, 7, 8], 8),\n        0x2f960e117482044dfc99d12fece2ef6862fba9242be4846c7c9a3e854325a55c,\n    );\n    assert_eq(\n        pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6, 7, 8], 8),\n        EmbeddedCurvePoint {\n            x: 0x1657737676968887fceb6dd516382ea13b3a2c557f509811cd86d5d1199bc443,\n            y: 0x1f39f0cb569040105fa1e2f156521e8b8e08261e635a2b210bdc94e8d6d65f77,\n            is_infinite: false,\n        },\n    );\n    assert_eq(\n        pedersen_hash_with_separator([1, 2, 3, 4, 5, 6, 7, 8, 9], 9),\n        0x0c96db0790602dcb166cc4699e2d306c479a76926b81c2cb2aaa92d249ec7be7,\n    );\n    assert_eq(\n        pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6, 7, 8, 9], 9),\n        EmbeddedCurvePoint {\n            x: 0x0a3ceae42d14914a432aa60ec7fded4af7dad7dd4acdbf2908452675ec67e06d,\n            y: 0xfc19761eaaf621ad4aec9a8b2e84a4eceffdba78f60f8b9391b0bd9345a2f2,\n            is_infinite: false,\n        },\n    );\n    assert_eq(\n        pedersen_hash_with_separator([1, 2, 3, 4, 5, 6, 7, 8, 9, 10], 10),\n        0x2cd37505871bc460a62ea1e63c7fe51149df5d0801302cf1cbc48beb8dff7e94,\n    );\n    assert_eq(\n        pedersen_commitment_with_separator([1, 2, 3, 4, 5, 6, 7, 8, 9, 10], 10),\n        EmbeddedCurvePoint {\n            x: 0x2fb3f8b3d41ddde007c8c3c62550f9a9380ee546fcc639ffbb3fd30c8d8de30c,\n            y: 0x300783be23c446b11a4c0fabf6c91af148937cea15fcf5fb054abf7f752ee245,\n            is_infinite: false,\n        },\n    );\n}\n"
        },
        "42": {
            "path": "std/option.nr",
            "source": "use crate::cmp::{Eq, Ord, Ordering};\nuse crate::default::Default;\nuse crate::hash::{Hash, Hasher};\n\npub struct Option<T> {\n    _is_some: bool,\n    _value: T,\n}\n\nimpl<T> Option<T> {\n    /// Constructs a None value\n    pub fn none() -> Self {\n        Self { _is_some: false, _value: crate::mem::zeroed() }\n    }\n\n    /// Constructs a Some wrapper around the given value\n    pub fn some(_value: T) -> Self {\n        Self { _is_some: true, _value }\n    }\n\n    /// True if this Option is None\n    pub fn is_none(self) -> bool {\n        !self._is_some\n    }\n\n    /// True if this Option is Some\n    pub fn is_some(self) -> bool {\n        self._is_some\n    }\n\n    /// Asserts `self.is_some()` and returns the wrapped value.\n    pub fn unwrap(self) -> T {\n        assert(self._is_some);\n        self._value\n    }\n\n    /// Returns the inner value without asserting `self.is_some()`\n    /// Note that if `self` is `None`, there is no guarantee what value will be returned,\n    /// only that it will be of type `T`.\n    pub fn unwrap_unchecked(self) -> T {\n        self._value\n    }\n\n    /// Returns the wrapped value if `self.is_some()`. Otherwise, returns the given default value.\n    pub fn unwrap_or(self, default: T) -> T {\n        if self._is_some {\n            self._value\n        } else {\n            default\n        }\n    }\n\n    /// Returns the wrapped value if `self.is_some()`. Otherwise, calls the given function to return\n    /// a default value.\n    pub fn unwrap_or_else<Env>(self, default: fn[Env]() -> T) -> T {\n        if self._is_some {\n            self._value\n        } else {\n            default()\n        }\n    }\n\n    /// Asserts `self.is_some()` with a provided custom message and returns the contained `Some` value\n    pub fn expect<let N: u32, MessageTypes>(self, message: fmtstr<N, MessageTypes>) -> T {\n        assert(self.is_some(), message);\n        self._value\n    }\n\n    /// If self is `Some(x)`, this returns `Some(f(x))`. Otherwise, this returns `None`.\n    pub fn map<U, Env>(self, f: fn[Env](T) -> U) -> Option<U> {\n        if self._is_some {\n            Option::some(f(self._value))\n        } else {\n            Option::none()\n        }\n    }\n\n    /// If self is `Some(x)`, this returns `f(x)`. Otherwise, this returns the given default value.\n    pub fn map_or<U, Env>(self, default: U, f: fn[Env](T) -> U) -> U {\n        if self._is_some {\n            f(self._value)\n        } else {\n            default\n        }\n    }\n\n    /// If self is `Some(x)`, this returns `f(x)`. Otherwise, this returns `default()`.\n    pub fn map_or_else<U, Env1, Env2>(self, default: fn[Env1]() -> U, f: fn[Env2](T) -> U) -> U {\n        if self._is_some {\n            f(self._value)\n        } else {\n            default()\n        }\n    }\n\n    /// Returns None if self is None. Otherwise, this returns `other`.\n    pub fn and(self, other: Self) -> Self {\n        if self.is_none() {\n            Option::none()\n        } else {\n            other\n        }\n    }\n\n    /// If self is None, this returns None. Otherwise, this calls the given function\n    /// with the Some value contained within self, and returns the result of that call.\n    ///\n    /// In some languages this function is called `flat_map` or `bind`.\n    pub fn and_then<U, Env>(self, f: fn[Env](T) -> Option<U>) -> Option<U> {\n        if self._is_some {\n            f(self._value)\n        } else {\n            Option::none()\n        }\n    }\n\n    /// If self is Some, return self. Otherwise, return `other`.\n    pub fn or(self, other: Self) -> Self {\n        if self._is_some {\n            self\n        } else {\n            other\n        }\n    }\n\n    /// If self is Some, return self. Otherwise, return `default()`.\n    pub fn or_else<Env>(self, default: fn[Env]() -> Self) -> Self {\n        if self._is_some {\n            self\n        } else {\n            default()\n        }\n    }\n\n    // If only one of the two Options is Some, return that option.\n    // Otherwise, if both options are Some or both are None, None is returned.\n    pub fn xor(self, other: Self) -> Self {\n        if self._is_some {\n            if other._is_some {\n                Option::none()\n            } else {\n                self\n            }\n        } else if other._is_some {\n            other\n        } else {\n            Option::none()\n        }\n    }\n\n    /// Returns `Some(x)` if self is `Some(x)` and `predicate(x)` is true.\n    /// Otherwise, this returns `None`\n    pub fn filter<Env>(self, predicate: fn[Env](T) -> bool) -> Self {\n        if self._is_some {\n            if predicate(self._value) {\n                self\n            } else {\n                Option::none()\n            }\n        } else {\n            Option::none()\n        }\n    }\n\n    /// Flattens an Option<Option<T>> into a Option<T>.\n    /// This returns None if the outer Option is None. Otherwise, this returns the inner Option.\n    pub fn flatten(option: Option<Option<T>>) -> Option<T> {\n        if option._is_some {\n            option._value\n        } else {\n            Option::none()\n        }\n    }\n}\n\nimpl<T> Default for Option<T> {\n    fn default() -> Self {\n        Option::none()\n    }\n}\n\nimpl<T> Eq for Option<T>\nwhere\n    T: Eq,\n{\n    fn eq(self, other: Self) -> bool {\n        if self._is_some == other._is_some {\n            if self._is_some {\n                self._value == other._value\n            } else {\n                true\n            }\n        } else {\n            false\n        }\n    }\n}\n\nimpl<T> Hash for Option<T>\nwhere\n    T: Hash,\n{\n    fn hash<H>(self, state: &mut H)\n    where\n        H: Hasher,\n    {\n        self._is_some.hash(state);\n        if self._is_some {\n            self._value.hash(state);\n        }\n    }\n}\n\n// For this impl we're declaring Option::none < Option::some\nimpl<T> Ord for Option<T>\nwhere\n    T: Ord,\n{\n    fn cmp(self, other: Self) -> Ordering {\n        if self._is_some {\n            if other._is_some {\n                self._value.cmp(other._value)\n            } else {\n                Ordering::greater()\n            }\n        } else if other._is_some {\n            Ordering::less()\n        } else {\n            Ordering::equal()\n        }\n    }\n}\n"
        },
        "43": {
            "path": "std/panic.nr",
            "source": "pub fn panic<T, U>(message: T) -> U\nwhere\n    T: StringLike,\n{\n    assert(false, message);\n    crate::mem::zeroed()\n}\n\ntrait StringLike {}\n\nimpl<let N: u32> StringLike for str<N> {}\nimpl<let N: u32, T> StringLike for fmtstr<N, T> {}\n"
        },
        "49": {
            "path": "std/vector.nr",
            "source": "use crate::append::Append;\n\nimpl<T> [T] {\n    /// Returns the length of the vector.\n    #[builtin(array_len)]\n    pub fn len(self) -> u32 {}\n\n    /// Push a new element to the end of the vector, returning a\n    /// new vector with a length one greater than the\n    /// original unmodified vector.\n    #[builtin(vector_push_back)]\n    pub fn push_back(self, elem: T) -> Self {}\n\n    /// Push a new element to the front of the vector, returning a\n    /// new vector with a length one greater than the\n    /// original unmodified vector.\n    #[builtin(vector_push_front)]\n    pub fn push_front(self, elem: T) -> Self {}\n\n    /// Remove the last element of the vector, returning the\n    /// popped vector and the element in a tuple\n    #[builtin(vector_pop_back)]\n    pub fn pop_back(self) -> (Self, T) {}\n\n    /// Remove the first element of the vector, returning the\n    /// element and the popped vector in a tuple\n    #[builtin(vector_pop_front)]\n    pub fn pop_front(self) -> (T, Self) {}\n\n    /// Insert an element at a specified index, shifting all elements\n    /// after it to the right\n    #[builtin(vector_insert)]\n    pub fn insert(self, index: u32, elem: T) -> Self {}\n\n    /// Remove an element at a specified index, shifting all elements\n    /// after it to the left, returning the altered vector and\n    /// the removed element\n    #[builtin(vector_remove)]\n    pub fn remove(self, index: u32) -> (Self, T) {}\n\n    /// Append each element of the `other` vector to the end of `self`.\n    /// This returns a new vector and leaves both input vectors unchanged.\n    pub fn append(mut self, other: Self) -> Self {\n        for elem in other {\n            self = self.push_back(elem);\n        }\n        self\n    }\n\n    pub fn as_array<let N: u32>(self) -> [T; N] {\n        assert(self.len() == N);\n\n        let mut array = [crate::mem::zeroed(); N];\n        for i in 0..N {\n            array[i] = self[i];\n        }\n        array\n    }\n\n    // Apply a function to each element of the vector, returning a new vector\n    // containing the mapped elements.\n    pub fn map<U, Env>(self, f: fn[Env](T) -> U) -> [U] {\n        let mut ret = [].as_vector();\n        for elem in self {\n            ret = ret.push_back(f(elem));\n        }\n        ret\n    }\n\n    // Apply a function to each element of the vector with its index, returning a\n    // new vector containing the mapped elements.\n    pub fn mapi<U, Env>(self, f: fn[Env](u32, T) -> U) -> [U] {\n        let mut ret = [].as_vector();\n        let mut index = 0;\n        for elem in self {\n            ret = ret.push_back(f(index, elem));\n            index += 1;\n        }\n        ret\n    }\n\n    // Apply a function to each element of the vector\n    pub fn for_each<Env>(self, f: fn[Env](T) -> ()) {\n        for elem in self {\n            f(elem);\n        }\n    }\n\n    // Apply a function to each element of the vector with its index\n    pub fn for_eachi<Env>(self, f: fn[Env](u32, T) -> ()) {\n        let mut index = 0;\n        for elem in self {\n            f(index, elem);\n            index += 1;\n        }\n    }\n\n    // Apply a function to each element of the vector and an accumulator value,\n    // returning the final accumulated value. This function is also sometimes\n    // called `foldl`, `fold_left`, `reduce`, or `inject`.\n    pub fn fold<U, Env>(self, mut accumulator: U, f: fn[Env](U, T) -> U) -> U {\n        for elem in self {\n            accumulator = f(accumulator, elem);\n        }\n        accumulator\n    }\n\n    // Apply a function to each element of the vector and an accumulator value,\n    // returning the final accumulated value. Unlike fold, reduce uses the first\n    // element of the given vector as its starting accumulator value.\n    pub fn reduce<Env>(self, f: fn[Env](T, T) -> T) -> T {\n        let mut accumulator = self[0];\n        for i in 1..self.len() {\n            accumulator = f(accumulator, self[i]);\n        }\n        accumulator\n    }\n\n    // Returns a new vector containing only elements for which the given predicate\n    // returns true.\n    pub fn filter<Env>(self, predicate: fn[Env](T) -> bool) -> Self {\n        let mut ret = [].as_vector();\n        for elem in self {\n            if predicate(elem) {\n                ret = ret.push_back(elem);\n            }\n        }\n        ret\n    }\n\n    // Flatten each element in the vector into one value, separated by `separator`.\n    pub fn join(self, separator: T) -> T\n    where\n        T: Append,\n    {\n        let mut ret = T::empty();\n\n        if self.len() != 0 {\n            ret = self[0];\n\n            for i in 1..self.len() {\n                ret = ret.append(separator).append(self[i]);\n            }\n        }\n\n        ret\n    }\n\n    // Returns true if all elements in the vector satisfy the predicate\n    pub fn all<Env>(self, predicate: fn[Env](T) -> bool) -> bool {\n        let mut ret = true;\n        for elem in self {\n            ret &= predicate(elem);\n        }\n        ret\n    }\n\n    // Returns true if any element in the vector satisfies the predicate\n    pub fn any<Env>(self, predicate: fn[Env](T) -> bool) -> bool {\n        let mut ret = false;\n        for elem in self {\n            ret |= predicate(elem);\n        }\n        ret\n    }\n}\n\nmod test {\n    #[test]\n    fn map_empty() {\n        assert_eq([].as_vector().map(|x| x + 1), [].as_vector());\n    }\n\n    #[test]\n    fn mapi_empty() {\n        assert_eq([].as_vector().mapi(|i, x| i * x + 1), [].as_vector());\n    }\n\n    #[test]\n    fn for_each_empty() {\n        let empty_vector: [Field] = [].as_vector();\n        empty_vector.for_each(|_x| assert(false));\n        assert(empty_vector == [].as_vector());\n    }\n\n    #[test]\n    fn for_eachi_empty() {\n        let empty_vector: [Field] = [].as_vector();\n        empty_vector.for_eachi(|_i, _x| assert(false));\n        assert(empty_vector == [].as_vector());\n    }\n\n    #[test]\n    fn map_example() {\n        let a = [1, 2, 3].as_vector();\n        let b = a.map(|a| a * 2);\n        assert_eq(b, [2, 4, 6].as_vector());\n        assert_eq(a, [1, 2, 3].as_vector());\n    }\n\n    #[test]\n    fn mapi_example() {\n        let a = [1, 2, 3].as_vector();\n        let b = a.mapi(|i, a| i + a * 2);\n        assert_eq(b, [2, 5, 8].as_vector());\n        assert_eq(a, [1, 2, 3].as_vector());\n    }\n\n    #[test]\n    fn for_each_example() {\n        let a = [1, 2, 3].as_vector();\n        let mut b = [].as_vector();\n        let b_ref = &mut b;\n        a.for_each(|a| { *b_ref = b_ref.push_back(a * 2); });\n        assert_eq(b, [2, 4, 6].as_vector());\n    }\n\n    #[test]\n    fn for_eachi_example() {\n        let a = [1, 2, 3].as_vector();\n        let mut b = [].as_vector();\n        let b_ref = &mut b;\n        a.for_eachi(|i, a| { *b_ref = b_ref.push_back(i + a * 2); });\n        assert_eq(b, [2, 5, 8].as_vector());\n    }\n\n    #[test]\n    fn len_empty() {\n        let empty: [Field] = [].as_vector();\n        assert_eq(empty.len(), 0);\n    }\n\n    #[test]\n    fn len_single() {\n        assert_eq([42].as_vector().len(), 1);\n    }\n\n    #[test]\n    fn len_multiple() {\n        assert_eq([1, 2, 3, 4, 5].as_vector().len(), 5);\n    }\n\n    #[test]\n    fn push_back_empty() {\n        let empty: [Field] = [].as_vector();\n        let result = empty.push_back(42);\n        assert_eq(result.len(), 1);\n        assert_eq(result[0], 42);\n    }\n\n    #[test]\n    fn push_back_non_empty() {\n        let vector = [1, 2, 3].as_vector();\n        let result = vector.push_back(4);\n        assert_eq(result.len(), 4);\n        assert_eq(result, [1, 2, 3, 4].as_vector());\n    }\n\n    #[test]\n    fn push_front_empty() {\n        let empty = [].as_vector();\n        let result = empty.push_front(42);\n        assert_eq(result.len(), 1);\n        assert_eq(result[0], 42);\n    }\n\n    #[test]\n    fn push_front_non_empty() {\n        let vector = [1, 2, 3].as_vector();\n        let result = vector.push_front(0);\n        assert_eq(result.len(), 4);\n        assert_eq(result, [0, 1, 2, 3].as_vector());\n    }\n\n    #[test(should_fail_with = \"Index out of bounds\")]\n    fn pop_back_empty() {\n        let vector: [Field] = [].as_vector();\n        let (_, _) = vector.pop_back();\n    }\n\n    #[test]\n    fn pop_back_one() {\n        let vector = [42].as_vector();\n        let (result, elem) = vector.pop_back();\n        assert_eq(result.len(), 0);\n        assert_eq(elem, 42);\n    }\n\n    #[test]\n    fn pop_back_multiple() {\n        let vector = [1, 2, 3].as_vector();\n        let (result, elem) = vector.pop_back();\n        assert_eq(result.len(), 2);\n        assert_eq(result, [1, 2].as_vector());\n        assert_eq(elem, 3);\n    }\n\n    #[test(should_fail_with = \"Index out of bounds\")]\n    fn pop_front_empty() {\n        let vector: [Field] = [].as_vector();\n        let (_, _) = vector.pop_front();\n    }\n\n    #[test]\n    fn pop_front_one() {\n        let vector = [42].as_vector();\n        let (elem, result) = vector.pop_front();\n        assert_eq(result.len(), 0);\n        assert_eq(elem, 42);\n    }\n\n    #[test]\n    fn pop_front_multiple() {\n        let vector = [1, 2, 3].as_vector();\n        let (elem, result) = vector.pop_front();\n        assert_eq(result.len(), 2);\n        assert_eq(result, [2, 3].as_vector());\n        assert_eq(elem, 1);\n    }\n\n    #[test]\n    fn insert_beginning() {\n        let vector = [1, 2, 3].as_vector();\n        let result = vector.insert(0, 0);\n        assert_eq(result.len(), 4);\n        assert_eq(result, [0, 1, 2, 3].as_vector());\n    }\n\n    #[test]\n    fn insert_middle() {\n        let vector = [1, 2, 3].as_vector();\n        let result = vector.insert(1, 99);\n        assert_eq(result.len(), 4);\n        assert_eq(result, [1, 99, 2, 3].as_vector());\n    }\n\n    #[test]\n    fn insert_end() {\n        let vector = [1, 2, 3].as_vector();\n        let result = vector.insert(3, 4);\n        assert_eq(result.len(), 4);\n        assert_eq(result, [1, 2, 3, 4].as_vector());\n    }\n\n    #[test(should_fail_with = \"Index out of bounds\")]\n    fn insert_end_out_of_bounds() {\n        let vector = [1, 2].as_vector();\n        let _ = vector.insert(3, 4);\n    }\n\n    #[test(should_fail_with = \"Index out of bounds\")]\n    fn remove_empty() {\n        let vector: [Field] = [].as_vector();\n        let (_, _) = vector.remove(0);\n    }\n\n    #[test]\n    fn remove_beginning() {\n        let vector = [1, 2, 3].as_vector();\n        let (result, elem) = vector.remove(0);\n        assert_eq(result.len(), 2);\n        assert_eq(result, [2, 3].as_vector());\n        assert_eq(elem, 1);\n    }\n\n    #[test]\n    fn remove_middle() {\n        let vector = [1, 2, 3].as_vector();\n        let (result, elem) = vector.remove(1);\n        assert_eq(result.len(), 2);\n        assert_eq(result, [1, 3].as_vector());\n        assert_eq(elem, 2);\n    }\n\n    #[test]\n    fn remove_end() {\n        let vector = [1, 2, 3].as_vector();\n        let (result, elem) = vector.remove(2);\n        assert_eq(result.len(), 2);\n        assert_eq(result, [1, 2].as_vector());\n        assert_eq(elem, 3);\n    }\n\n    #[test(should_fail_with = \"Index out of bounds\")]\n    fn remove_end_out_of_bounds() {\n        let vector = [1, 2].as_vector();\n        let (_, _) = vector.remove(2);\n    }\n\n    #[test]\n    fn fold_empty() {\n        let empty = [].as_vector();\n        let result = empty.fold(10, |acc, x| acc + x);\n        assert_eq(result, 10);\n    }\n\n    #[test]\n    fn fold_single() {\n        let vector = [5].as_vector();\n        let result = vector.fold(10, |acc, x| acc + x);\n        assert_eq(result, 15);\n    }\n\n    #[test]\n    fn fold_multiple() {\n        let vector = [1, 2, 3, 4].as_vector();\n        let result = vector.fold(0, |acc, x| acc + x);\n        assert_eq(result, 10);\n    }\n\n    #[test(should_fail_with = \"Index out of bounds\")]\n    fn reduce_empty() {\n        let empty: [Field] = [].as_vector();\n        let _ = empty.reduce(|a, b| a + b);\n    }\n\n    #[test]\n    fn reduce_single() {\n        let vector = [42].as_vector();\n        let result = vector.reduce(|a, b| a + b);\n        assert_eq(result, 42);\n    }\n\n    #[test]\n    fn reduce_multiple() {\n        let vector = [1, 2, 3, 4].as_vector();\n        let result = vector.reduce(|a, b| a + b);\n        assert_eq(result, 10);\n    }\n\n    #[test]\n    fn filter_empty() {\n        let empty = [].as_vector();\n        let result = empty.filter(|x| x > 0);\n        assert_eq(result.len(), 0);\n    }\n\n    #[test]\n    fn filter_all_true() {\n        let vector = [1, 2, 3, 4].as_vector();\n        let result = vector.filter(|x| x > 0);\n        assert_eq(result, vector);\n    }\n\n    #[test]\n    fn filter_all_false() {\n        let vector = [1, 2, 3, 4].as_vector();\n        let result = vector.filter(|x| x > 10);\n        assert_eq(result.len(), 0);\n    }\n\n    #[test]\n    fn filter_some() {\n        let vector = [1, 2, 3, 4, 5].as_vector();\n        let result = vector.filter(|x| x % 2 == 0);\n        assert_eq(result, [2, 4].as_vector());\n    }\n\n    #[test]\n    fn all_empty() {\n        let empty = [].as_vector();\n        let result = empty.all(|x| x > 0);\n        assert_eq(result, true);\n    }\n\n    #[test]\n    fn all_true() {\n        let vector = [1, 2, 3, 4].as_vector();\n        let result = vector.all(|x| x > 0);\n        assert_eq(result, true);\n    }\n\n    #[test]\n    fn all_false() {\n        let vector = [1, 2, 3, 4].as_vector();\n        let result = vector.all(|x| x > 2);\n        assert_eq(result, false);\n    }\n\n    #[test]\n    fn any_empty() {\n        let empty = [].as_vector();\n        let result = empty.any(|x| x > 0);\n        assert_eq(result, false);\n    }\n\n    #[test]\n    fn any_true() {\n        let vector = [1, 2, 3, 4].as_vector();\n        let result = vector.any(|x| x > 3);\n        assert_eq(result, true);\n    }\n\n    #[test]\n    fn any_false() {\n        let vector = [1, 2, 3, 4].as_vector();\n        let result = vector.any(|x| x > 10);\n        assert_eq(result, false);\n    }\n\n    // utility method tests\n    #[test]\n    fn append_empty_to_empty() {\n        let empty1: [Field] = [].as_vector();\n        let empty2: [Field] = [].as_vector();\n        let result = empty1.append(empty2);\n        assert_eq(result.len(), 0);\n    }\n\n    #[test]\n    fn append_empty_to_non_empty() {\n        let vector = [1, 2, 3].as_vector();\n        let empty = [].as_vector();\n        let result = vector.append(empty);\n        assert_eq(result, vector);\n    }\n\n    #[test]\n    fn append_non_empty_to_empty() {\n        let empty = [].as_vector();\n        let vector = [1, 2, 3].as_vector();\n        let result = empty.append(vector);\n        assert_eq(result, vector);\n    }\n\n    #[test]\n    fn append_two_non_empty() {\n        let vector1 = [1, 2].as_vector();\n        let vector2 = [3, 4, 5].as_vector();\n        let result = vector1.append(vector2);\n        assert_eq(result, [1, 2, 3, 4, 5].as_vector());\n    }\n\n    #[test]\n    fn as_array_single() {\n        let vector = [42].as_vector();\n        let array: [Field; 1] = vector.as_array();\n        assert_eq(array[0], 42);\n    }\n\n    #[test]\n    fn as_array_multiple() {\n        let vector = [1, 2, 3].as_vector();\n        let array: [Field; 3] = vector.as_array();\n        assert_eq(array[0], 1);\n        assert_eq(array[1], 2);\n        assert_eq(array[2], 3);\n    }\n\n    // complex scenarios\n    #[test]\n    fn chain_operations() {\n        let vector = [1, 2, 3, 4, 5].as_vector();\n        let result = vector.filter(|x| x % 2 == 0).map(|x| x * 2).fold(0, |acc, x| acc + x);\n        assert_eq(result, 12); // (2*2) + (4*2) = 4 + 8 = 12\n    }\n\n    #[test]\n    fn nested_operations() {\n        let vector = [1, 2, 3, 4].as_vector();\n        let filtered = vector.filter(|x| x > 1);\n        let mapped = filtered.map(|x| x * x);\n        let sum = mapped.fold(0, |acc, x| acc + x);\n        assert_eq(sum, 29); // 2^2 + 3^2 + 4^2 = 4 + 9 + 16 = 29\n    }\n\n    #[test]\n    fn single_element_operations() {\n        let single = [42].as_vector();\n\n        // Test all operations on single element\n        assert_eq(single.len(), 1);\n\n        let pushed_back = single.push_back(99);\n        assert_eq(pushed_back, [42, 99].as_vector());\n\n        let pushed_front = single.push_front(0);\n        assert_eq(pushed_front, [0, 42].as_vector());\n\n        let (popped_back_vector, popped_back_elem) = single.pop_back();\n        assert_eq(popped_back_vector.len(), 0);\n        assert_eq(popped_back_elem, 42);\n\n        let (popped_front_elem, popped_front_vector) = single.pop_front();\n        assert_eq(popped_front_vector.len(), 0);\n        assert_eq(popped_front_elem, 42);\n\n        let inserted = single.insert(0, 0);\n        assert_eq(inserted, [0, 42].as_vector());\n\n        let (removed_vector, removed_elem) = single.remove(0);\n        assert_eq(removed_vector.len(), 0);\n        assert_eq(removed_elem, 42);\n    }\n\n    #[test]\n    fn boundary_conditions() {\n        let vector = [1, 2, 3].as_vector();\n\n        // insert at boundaries\n        let at_start = vector.insert(0, 0);\n        assert_eq(at_start, [0, 1, 2, 3].as_vector());\n\n        let at_end = vector.insert(3, 4);\n        assert_eq(at_end, [1, 2, 3, 4].as_vector());\n\n        // remove at boundaries\n        let (removed_start, elem_start) = vector.remove(0);\n        assert_eq(removed_start, [2, 3].as_vector());\n        assert_eq(elem_start, 1);\n\n        let (removed_end, elem_end) = vector.remove(2);\n        assert_eq(removed_end, [1, 2].as_vector());\n        assert_eq(elem_end, 3);\n    }\n\n    #[test]\n    fn complex_predicates() {\n        let vector = [1, 2, 3, 4, 5, 6, 7, 8, 9, 10].as_vector();\n\n        let even_greater_than_5 = vector.filter(|x| (x % 2 == 0) & (x > 5));\n        assert_eq(even_greater_than_5, [6, 8, 10].as_vector());\n\n        let all_positive_and_less_than_20 = vector.all(|x| (x > 0) & (x < 20));\n        assert_eq(all_positive_and_less_than_20, true);\n\n        let any_divisible_by_7 = vector.any(|x| x % 7 == 0);\n        assert_eq(any_divisible_by_7, true);\n    }\n\n    #[test]\n    fn identity_operations() {\n        let vector = [1, 2, 3, 4, 5].as_vector();\n\n        let mapped_identity = vector.map(|x| x);\n        assert_eq(mapped_identity, vector);\n\n        let filtered_all = vector.filter(|_| true);\n        assert_eq(filtered_all, vector);\n\n        let filtered_none = vector.filter(|_| false);\n        assert_eq(filtered_none.len(), 0);\n    }\n\n    #[test(should_fail)]\n    fn as_array_size_mismatch() {\n        let vector = [1, 2, 3].as_vector();\n        let _: [Field; 5] = vector.as_array(); // size doesn't match\n    }\n}\n"
        },
        "75": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/capsules/mod.nr",
            "source": "use crate::oracle::capsules;\nuse crate::protocol::{address::AztecAddress, traits::{Deserialize, Serialize}};\n\n/// A dynamically sized array backed by PXE's non-volatile database (called capsules). Values are persisted until\n/// deleted, so they can be e.g. stored during simulation of a transaction and later retrieved during witness\n/// generation. All values are scoped per contract address, so external contracts cannot access them.\npub struct CapsuleArray<T> {\n    contract_address: AztecAddress,\n    /// The base slot is where the array length is stored in capsules. Array elements are stored in consecutive slots\n    /// after the base slot. For example, with base slot 5: the length is at slot 5, the first element (index 0) is at\n    /// slot 6, the second element (index 1) is at slot 7, and so on.\n    base_slot: Field,\n    /// Scope for capsule isolation. Capsule operations are scoped to the given address, allowing multiple independent\n    /// namespaces within the same contract.\n    scope: AztecAddress,\n}\n\nimpl<T> CapsuleArray<T> {\n    /// Returns a CapsuleArray scoped to a specific address.\n    ///\n    /// Array elements are stored in contiguous slots\n    /// following the base slot, so there should be sufficient space between array base slots to accommodate elements.\n    /// A reasonable strategy is to make the base slot a hash of a unique value.\n    pub unconstrained fn at(contract_address: AztecAddress, base_slot: Field, scope: AztecAddress) -> Self {\n        Self { contract_address, base_slot, scope }\n    }\n\n    /// Returns the number of elements stored in the array.\n    pub unconstrained fn len(self) -> u32 {\n        // An uninitialized array defaults to a length of 0.\n        capsules::load(self.contract_address, self.base_slot, self.scope).unwrap_or(0) as u32\n    }\n\n    /// Stores a value at the end of the array.\n    pub unconstrained fn push(self, value: T)\n    where\n        T: Serialize,\n    {\n        let current_length = self.len();\n\n        // The slot corresponding to the index `current_length` is the first slot immediately after the end of the\n        // array, which is where we want to place the new value.\n        capsules::store(\n            self.contract_address,\n            self.slot_at(current_length),\n            value,\n            self.scope,\n        );\n\n        // Then we simply update the length.\n        let new_length = current_length + 1;\n        capsules::store(\n            self.contract_address,\n            self.base_slot,\n            new_length,\n            self.scope,\n        );\n    }\n\n    /// Retrieves the value stored in the array at `index`. Throws if the index is out of bounds.\n    pub unconstrained fn get(self, index: u32) -> T\n    where\n        T: Deserialize,\n    {\n        assert(index < self.len(), \"Attempted to read past the length of a CapsuleArray\");\n\n        capsules::load(self.contract_address, self.slot_at(index), self.scope).unwrap()\n    }\n\n    /// Deletes the value stored in the array at `index`. Throws if the index is out of bounds.\n    pub unconstrained fn remove(self, index: u32) {\n        let current_length = self.len();\n        assert(index < current_length, \"Attempted to delete past the length of a CapsuleArray\");\n\n        // In order to be able to remove elements at arbitrary indices, we need to shift the entire contents of the\n        // array past the removed element one slot backward so that we don't end up with a gap and preserve the\n        // contiguous slots. We can skip this when deleting the last element however.\n        if index != current_length - 1 {\n            // The source and destination regions overlap, but `copy` supports this.\n            capsules::copy(\n                self.contract_address,\n                self.slot_at(index + 1),\n                self.slot_at(index),\n                current_length - index - 1,\n                self.scope,\n            );\n        }\n\n        // We can now delete the last element (which has either been copied to the slot immediately before it, or was\n        // the element we meant to delete in the first place) and update the length.\n        capsules::delete(\n            self.contract_address,\n            self.slot_at(current_length - 1),\n            self.scope,\n        );\n        capsules::store(\n            self.contract_address,\n            self.base_slot,\n            current_length - 1,\n            self.scope,\n        );\n    }\n\n    /// Calls a function on each element of the array.\n    ///\n    /// The function `f` is called once with each array value and its corresponding index. The order in which values\n    /// are processed is arbitrary.\n    ///\n    /// ## Array Mutation\n    ///\n    /// It is safe to delete the current element (and only the current element) from inside the callback via `remove`:\n    /// ```noir\n    /// array.for_each(|index, value| {\n    ///   if some_condition(value) {\n    ///     array.remove(index); // safe only for this index\n    ///   }\n    /// }\n    /// ```\n    ///\n    /// If all elements in the array need to iterated over and then removed, then using `for_each` results in optimal\n    /// efficiency.\n    ///\n    /// It is **not** safe to push new elements into the array from inside the callback.\n    pub unconstrained fn for_each<Env>(self, f: unconstrained fn[Env](u32, T) -> ())\n    where\n        T: Deserialize,\n    {\n        // Iterating over all elements is simple, but we want to do it in such a way that a) deleting the current\n        // element is safe to do, and b) deleting *all* elements is optimally efficient. This is because CapsuleArrays\n        // are typically used to hold pending tasks, so iterating them while clearing completed tasks (sometimes\n        // unconditionally, resulting in a full clear) is a very common access pattern.\n        //\n        // The way we achieve this is by iterating backwards: each element can always be deleted since it won't change\n        // any preceding (lower) indices, and if every element is deleted then every element will (in turn) be the last\n        // element. This results in an optimal full clear since `remove` will be able to skip the `capsules::copy` call\n        // to shift any elements past the deleted one (because there will be none).\n        let mut i = self.len();\n        while i > 0 {\n            i -= 1;\n            f(i, self.get(i));\n        }\n    }\n\n    unconstrained fn slot_at(self, index: u32) -> Field {\n        // Elements are stored immediately after the base slot, so we add 1 to it to compute the slot for the first\n        // element.\n        self.base_slot + 1 + index as Field\n    }\n}\n\nmod test {\n    use crate::protocol::address::AztecAddress;\n    use crate::test::helpers::test_environment::TestEnvironment;\n    use super::CapsuleArray;\n\n    global SLOT: Field = 1230;\n    global SCOPE: AztecAddress = AztecAddress { inner: 0xface };\n\n    #[test]\n    unconstrained fn empty_array() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n\n            let array: CapsuleArray<Field> = CapsuleArray::at(contract_address, SLOT, SCOPE);\n            assert_eq(array.len(), 0);\n        });\n    }\n\n    #[test(should_fail_with = \"Attempted to read past the length of a CapsuleArray\")]\n    unconstrained fn empty_array_read() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n\n            let array = CapsuleArray::at(contract_address, SLOT, SCOPE);\n            let _: Field = array.get(0);\n        });\n    }\n\n    #[test]\n    unconstrained fn array_push() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n\n            let array = CapsuleArray::at(contract_address, SLOT, SCOPE);\n            array.push(5);\n\n            assert_eq(array.len(), 1);\n            assert_eq(array.get(0), 5);\n        });\n    }\n\n    #[test(should_fail_with = \"Attempted to read past the length of a CapsuleArray\")]\n    unconstrained fn read_past_len() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n\n            let array = CapsuleArray::at(contract_address, SLOT, SCOPE);\n            array.push(5);\n\n            let _ = array.get(1);\n        });\n    }\n\n    #[test]\n    unconstrained fn array_remove_last() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n\n            let array = CapsuleArray::at(contract_address, SLOT, SCOPE);\n\n            array.push(5);\n            array.remove(0);\n\n            assert_eq(array.len(), 0);\n        });\n    }\n\n    #[test]\n    unconstrained fn array_remove_some() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n\n            let array = CapsuleArray::at(contract_address, SLOT, SCOPE);\n\n            array.push(7);\n            array.push(8);\n            array.push(9);\n\n            assert_eq(array.len(), 3);\n            assert_eq(array.get(0), 7);\n            assert_eq(array.get(1), 8);\n            assert_eq(array.get(2), 9);\n\n            array.remove(1);\n\n            assert_eq(array.len(), 2);\n            assert_eq(array.get(0), 7);\n            assert_eq(array.get(1), 9);\n        });\n    }\n\n    #[test]\n    unconstrained fn array_remove_all() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n\n            let array = CapsuleArray::at(contract_address, SLOT, SCOPE);\n\n            array.push(7);\n            array.push(8);\n            array.push(9);\n\n            array.remove(1);\n            array.remove(1);\n            array.remove(0);\n\n            assert_eq(array.len(), 0);\n        });\n    }\n\n    #[test]\n    unconstrained fn for_each_called_with_all_elements() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n            let array = CapsuleArray::at(contract_address, SLOT, SCOPE);\n\n            array.push(4);\n            array.push(5);\n            array.push(6);\n\n            // We store all values that we were called with and check that all (value, index) tuples are present. Note\n            // that we do not care about the order in which each tuple was passed to the closure.\n            let called_with = &mut BoundedVec::<(u32, Field), 3>::new();\n            array.for_each(|index, value| { called_with.push((index, value)); });\n\n            assert_eq(called_with.len(), 3);\n            assert(called_with.any(|(index, value)| (index == 0) & (value == 4)));\n            assert(called_with.any(|(index, value)| (index == 1) & (value == 5)));\n            assert(called_with.any(|(index, value)| (index == 2) & (value == 6)));\n        });\n    }\n\n    #[test]\n    unconstrained fn for_each_remove_some() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n            let array = CapsuleArray::at(contract_address, SLOT, SCOPE);\n\n            array.push(4);\n            array.push(5);\n            array.push(6);\n\n            array.for_each(|index, _| {\n                if index == 1 {\n                    array.remove(index);\n                }\n            });\n\n            assert_eq(array.len(), 2);\n            assert_eq(array.get(0), 4);\n            assert_eq(array.get(1), 6);\n        });\n    }\n\n    #[test]\n    unconstrained fn for_each_remove_all() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n            let array = CapsuleArray::at(contract_address, SLOT, SCOPE);\n\n            array.push(4);\n            array.push(5);\n            array.push(6);\n\n            array.for_each(|index, _| { array.remove(index); });\n\n            assert_eq(array.len(), 0);\n        });\n    }\n\n    #[test]\n    unconstrained fn for_each_remove_all_no_copy() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n            let array = CapsuleArray::at(contract_address, SLOT, SCOPE);\n\n            array.push(4);\n            array.push(5);\n            array.push(6);\n\n            // We test that the aztec_utl_copyCapsule was never called, which is the expensive operation we want to\n            // avoid.\n            let mock = std::test::OracleMock::mock(\"aztec_utl_copyCapsule\");\n\n            array.for_each(|index, _| { array.remove(index); });\n\n            assert_eq(mock.times_called(), 0);\n        });\n    }\n\n    #[test]\n    unconstrained fn different_scopes_are_isolated() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n            let scope_a = AztecAddress { inner: 0xaaa };\n            let scope_b = AztecAddress { inner: 0xbbb };\n\n            let array_a = CapsuleArray::at(contract_address, SLOT, scope_a);\n            let array_b = CapsuleArray::at(contract_address, SLOT, scope_b);\n\n            array_a.push(10);\n            array_a.push(20);\n            array_b.push(99);\n\n            assert_eq(array_a.len(), 2);\n            assert_eq(array_a.get(0), 10);\n            assert_eq(array_a.get(1), 20);\n\n            assert_eq(array_b.len(), 1);\n            assert_eq(array_b.get(0), 99);\n        });\n    }\n}\n"
        },
        "76": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/context/calls.nr",
            "source": "use crate::protocol::{abis::function_selector::FunctionSelector, address::AztecAddress, traits::{Deserialize, ToField}};\n\nuse crate::context::{gas::GasOpts, PrivateContext, PublicContext};\nuse crate::hash::{hash_args, hash_calldata_array};\nuse crate::oracle::execution_cache;\n\n// Having T associated on the structs and then instantiating it with `std::mem::zeroed()` is ugly but we need to do it\n// like this to avoid forcing users to specify the return type when calling functions on the structs (that's the only\n// way how we can specify the type when we generate the call stubs. The return types are specified in the\n// `external_functions_stubs.nr` file.)\n\n// PrivateCall\n\n#[must_use = \"Your private call needs to be passed into the `self.call(...)` method to be executed (e.g. `self.call(MyContract::at(address).my_private_function(...args))`\"]\npub struct PrivateCall<let M: u32, let N: u32, T> {\n    pub target_contract: AztecAddress,\n    pub selector: FunctionSelector,\n    pub name: str<M>,\n    args_hash: Field,\n    pub args: [Field; N],\n    return_type: T,\n}\n\nimpl<let M: u32, let N: u32, T> PrivateCall<M, N, T> {\n    pub fn new(target_contract: AztecAddress, selector: FunctionSelector, name: str<M>, args: [Field; N]) -> Self {\n        let args_hash = hash_args(args);\n        Self { target_contract, selector, name, args_hash, args, return_type: std::mem::zeroed() }\n    }\n}\n\nimpl<let M: u32, let N: u32, T> PrivateCall<M, N, T>\nwhere\n    T: Deserialize,\n{\n    /// **DEPRECATED**.\n    ///\n    /// Please use the new contract API: `self.call(MyContract::at(address).my_private_function(...args))` instead of\n    /// manually constructing and calling `PrivateCall`.\n    pub fn call(self, context: &mut PrivateContext) -> T {\n        execution_cache::store(self.args, self.args_hash);\n        let returns_hash =\n            context.call_private_function_with_args_hash(self.target_contract, self.selector, self.args_hash, false);\n\n        // If T is () (i.e. if the function does not return anything) then `get_preimage` will constrain that the\n        // returns hash is empty as per the protocol rules.\n        returns_hash.get_preimage()\n    }\n}\n\n// PrivateStaticCall\n\n#[must_use = \"Your private static call needs to be passed into the `self.view(...)` method to be executed (e.g. `self.view(MyContract::at(address).my_private_static_function(...args))`\"]\npub struct PrivateStaticCall<let M: u32, let N: u32, T> {\n    pub target_contract: AztecAddress,\n    pub selector: FunctionSelector,\n    pub name: str<M>,\n    args_hash: Field,\n    pub args: [Field; N],\n    return_type: T,\n}\n\nimpl<let M: u32, let N: u32, T> PrivateStaticCall<M, N, T> {\n    pub fn new(target_contract: AztecAddress, selector: FunctionSelector, name: str<M>, args: [Field; N]) -> Self {\n        let args_hash = hash_args(args);\n        Self { target_contract, selector, name, args_hash, args, return_type: std::mem::zeroed() }\n    }\n\n    /// **DEPRECATED**.\n    ///\n    /// Please use the new contract API: `self.view(MyContract::at(address).my_private_static_function(...args))`\n    /// instead of manually constructing and calling `PrivateCall`.\n    pub fn view(self, context: &mut PrivateContext) -> T\n    where\n        T: Deserialize,\n    {\n        execution_cache::store(self.args, self.args_hash);\n        let returns =\n            context.call_private_function_with_args_hash(self.target_contract, self.selector, self.args_hash, true);\n        returns.get_preimage()\n    }\n}\n\n// PublicCall\n\n#[must_use = \"Your public call needs to be passed into the `self.call(...)`, `self.enqueue(...)` or `self.enqueue_incognito(...)` method to be executed (e.g. `self.call(MyContract::at(address).my_public_function(...args))`\"]\npub struct PublicCall<let M: u32, let N: u32, T> {\n    pub target_contract: AztecAddress,\n    pub selector: FunctionSelector,\n    pub name: str<M>,\n    pub args: [Field; N],\n    gas_opts: GasOpts,\n    return_type: T,\n}\n\nimpl<let M: u32, let N: u32, T> PublicCall<M, N, T> {\n    pub fn new(target_contract: AztecAddress, selector: FunctionSelector, name: str<M>, args: [Field; N]) -> Self {\n        Self { target_contract, selector, name, args, gas_opts: GasOpts::default(), return_type: std::mem::zeroed() }\n    }\n\n    pub fn with_gas(mut self, gas_opts: GasOpts) -> Self {\n        self.gas_opts = gas_opts;\n        self\n    }\n\n    /// **DEPRECATED**.\n    ///\n    /// Please use the new contract API: `self.call(MyContract::at(address).my_public_function(...args))` instead of\n    /// manually constructing and calling `PublicCall`.\n    pub unconstrained fn call(self, context: PublicContext) -> T\n    where\n        T: Deserialize,\n    {\n        let returns = context.call_public_function(self.target_contract, self.selector, self.args, self.gas_opts);\n        // If T is () (i.e. if the function does not return anything) then `as_array` will constrain that `returns` has\n        // a length of 0 (since that is ()'s deserialization length).\n        Deserialize::deserialize(returns.as_array())\n    }\n\n    /// **DEPRECATED**.\n    ///\n    /// Please use the new contract API: `self.enqueue(MyContract::at(address).my_public_function(...args))` instead of\n    /// manually constructing and calling `PublicCall`.\n    pub fn enqueue(self, context: &mut PrivateContext) {\n        self.enqueue_impl(context, false, false)\n    }\n\n    /// **DEPRECATED**.\n    ///\n    /// Please use the new contract API: `self.enqueue_incognito(MyContract::at(address).my_public_function(...args))`\n    /// instead of manually constructing and calling `PublicCall`.\n    pub fn enqueue_incognito(self, context: &mut PrivateContext) {\n        self.enqueue_impl(context, false, true)\n    }\n\n    fn enqueue_impl(self, context: &mut PrivateContext, is_static_call: bool, hide_msg_sender: bool) {\n        let calldata = [self.selector.to_field()].concat(self.args);\n        let calldata_hash = hash_calldata_array(calldata);\n        execution_cache::store(calldata, calldata_hash);\n        context.call_public_function_with_calldata_hash(\n            self.target_contract,\n            calldata_hash,\n            is_static_call,\n            hide_msg_sender,\n        )\n    }\n\n    /// **DEPRECATED**.\n    ///\n    /// Please use the new contract API: `self.set_as_teardown(MyContract::at(address).my_public_function(...args))`\n    /// instead of manually constructing and setting the teardown function `PublicCall`.\n    pub fn set_as_teardown(self, context: &mut PrivateContext) {\n        self.set_as_teardown_impl(context, false);\n    }\n\n    /// **DEPRECATED**.\n    ///\n    /// Please use the new contract API:\n    /// `self.set_as_teardown_incognito(MyContract::at(address).my_public_function(...args))` instead of manually\n    /// constructing and setting the teardown function `PublicCall`.\n    pub fn set_as_teardown_incognito(self, context: &mut PrivateContext) {\n        self.set_as_teardown_impl(context, true);\n    }\n\n    fn set_as_teardown_impl(self, context: &mut PrivateContext, hide_msg_sender: bool) {\n        let calldata = [self.selector.to_field()].concat(self.args);\n        let calldata_hash = hash_calldata_array(calldata);\n        execution_cache::store(calldata, calldata_hash);\n        context.set_public_teardown_function_with_calldata_hash(\n            self.target_contract,\n            calldata_hash,\n            false,\n            hide_msg_sender,\n        )\n    }\n}\n\n// PublicStaticCall\n\n#[must_use = \"Your public static call needs to be passed into the `self.view(...)`, `self.enqueue_view(...)` or `self.enqueue_view_incognito(...)` method to be executed (e.g. `self.view(MyContract::at(address).my_public_static_function(...args))`\"]\npub struct PublicStaticCall<let M: u32, let N: u32, T> {\n    pub target_contract: AztecAddress,\n    pub selector: FunctionSelector,\n    pub name: str<M>,\n    pub args: [Field; N],\n    return_type: T,\n    gas_opts: GasOpts,\n}\n\nimpl<let M: u32, let N: u32, T> PublicStaticCall<M, N, T> {\n    pub fn new(target_contract: AztecAddress, selector: FunctionSelector, name: str<M>, args: [Field; N]) -> Self {\n        Self { target_contract, selector, name, args, return_type: std::mem::zeroed(), gas_opts: GasOpts::default() }\n    }\n\n    pub fn with_gas(mut self, gas_opts: GasOpts) -> Self {\n        self.gas_opts = gas_opts;\n        self\n    }\n\n    /// **DEPRECATED**.\n    ///\n    /// Please use the new contract API: `self.view(MyContract::at(address).my_public_static_function(...args))`\n    /// instead of manually constructing and calling `PublicStaticCall`.\n    pub unconstrained fn view(self, context: PublicContext) -> T\n    where\n        T: Deserialize,\n    {\n        let returns =\n            context.static_call_public_function(self.target_contract, self.selector, self.args, self.gas_opts);\n        Deserialize::deserialize(returns.as_array())\n    }\n\n    /// **DEPRECATED**.\n    ///\n    /// Please use the new contract API:\n    /// `self.enqueue_view(MyContract::at(address).my_public_static_function(...args))` instead of manually\n    /// constructing and calling `PublicStaticCall`.\n    pub fn enqueue_view(self, context: &mut PrivateContext) {\n        let calldata = [self.selector.to_field()].concat(self.args);\n        let calldata_hash = hash_calldata_array(calldata);\n        execution_cache::store(calldata, calldata_hash);\n        context\n            .call_public_function_with_calldata_hash(\n                self.target_contract,\n                calldata_hash,\n                /*static=*/\n                true,\n                false,\n            )\n    }\n\n    /// **DEPRECATED**.\n    ///\n    /// Please use the new contract API:\n    /// `self.enqueue_view_incognito(MyContract::at(address).my_public_static_function(...args))` instead of manually\n    /// constructing and calling `PublicStaticCall`.\n    pub fn enqueue_view_incognito(self, context: &mut PrivateContext) {\n        let calldata = [self.selector.to_field()].concat(self.args);\n        let calldata_hash = hash_calldata_array(calldata);\n        execution_cache::store(calldata, calldata_hash);\n        context\n            .call_public_function_with_calldata_hash(\n                self.target_contract,\n                calldata_hash,\n                /*static=*/\n                true,\n                true,\n            )\n    }\n}\n\n// UtilityCall\n\npub struct UtilityCall<let M: u32, let N: u32, T> {\n    pub target_contract: AztecAddress,\n    pub selector: FunctionSelector,\n    pub name: str<M>,\n    args_hash: Field,\n    pub args: [Field; N],\n    return_type: T,\n}\n\nimpl<let M: u32, let N: u32, T> UtilityCall<M, N, T> {\n    pub fn new(target_contract: AztecAddress, selector: FunctionSelector, name: str<M>, args: [Field; N]) -> Self {\n        let args_hash = hash_args(args);\n        Self { target_contract, selector, name, args_hash, args, return_type: std::mem::zeroed() }\n    }\n}\n"
        },
        "84": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/context/nullifier_existence_request.nr",
            "source": "use crate::protocol::address::aztec_address::AztecAddress;\n\n/// A request to assert the existence of a nullifier.\n///\n/// Used by [`crate::context::private_context::PrivateContext::assert_nullifier_exists`].\npub struct NullifierExistenceRequest {\n    nullifier: Field,\n    maybe_contract_address: Option<AztecAddress>,\n}\n\nimpl NullifierExistenceRequest {\n    /// Creates an existence request for a pending nullifier.\n    ///\n    /// Pending nullifiers have not been siloed with the contract address. These requests are created using the\n    /// unsiloed value and address of the contract that emitted the nullifier.\n    pub fn for_pending(unsiloed_nullifier: Field, contract_address: AztecAddress) -> Self {\n        // The kernel doesn't take options; it takes a nullifier and an address, and infers whether the request is\n        // siloed based on whether the address is zero or non-zero. When passing the value to the kernel, we use\n        // `maybe_addr.unwrap_or(Address::ZERO)`. Therefore, passing a zero address to `for_pending` is not allowed\n        // since it would be interpreted by the kernel as a settled request.\n        assert(!contract_address.is_zero(), \"Can't read a pending nullifier with a zero contract address\");\n        Self { nullifier: unsiloed_nullifier, maybe_contract_address: Option::some(contract_address) }\n    }\n\n    /// Creates an existence request for a settled nullifier.\n    ///\n    /// Unlike pending nullifiers, settled nullifiers have been siloed with their contract addresses before adding to\n    /// the nullifier tree, and their existence request is created using the siloed value.\n    pub fn for_settled(siloed_nullifier: Field) -> Self {\n        Self { nullifier: siloed_nullifier, maybe_contract_address: Option::none() }\n    }\n\n    pub(crate) fn nullifier(self) -> Field {\n        self.nullifier\n    }\n\n    pub(crate) fn maybe_contract_address(self) -> Option<AztecAddress> {\n        self.maybe_contract_address\n    }\n}\n"
        },
        "85": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/context/private_context.nr",
            "source": "use crate::{\n    context::{inputs::PrivateContextInputs, NoteExistenceRequest, NullifierExistenceRequest, ReturnsHash},\n    hash::{hash_args, hash_calldata_array},\n    keys::constants::{NULLIFIER_INDEX, NUM_KEY_TYPES, OUTGOING_INDEX, public_key_domain_separators},\n    messaging::process_l1_to_l2_message,\n    oracle::{\n        block_header::get_block_header_at,\n        call_private_function::call_private_function_internal,\n        execution_cache,\n        key_validation_request::get_key_validation_request,\n        logs::notify_created_contract_class_log,\n        notes::notify_nullified_note,\n        nullifiers::notify_created_nullifier,\n        public_call::assert_valid_public_call_data,\n        tx_phase::{is_execution_in_revertible_phase, notify_revertible_phase_start},\n    },\n};\nuse crate::logging::aztecnr_trace_log_format;\nuse crate::protocol::{\n    abis::{\n        block_header::BlockHeader,\n        call_context::CallContext,\n        function_selector::FunctionSelector,\n        gas_settings::GasSettings,\n        log_hash::LogHash,\n        note_hash::NoteHash,\n        nullifier::Nullifier,\n        private_call_request::PrivateCallRequest,\n        private_circuit_public_inputs::PrivateCircuitPublicInputs,\n        private_log::{PrivateLog, PrivateLogData},\n        public_call_request::PublicCallRequest,\n        validation_requests::{KeyValidationRequest, KeyValidationRequestAndSeparator},\n    },\n    address::{AztecAddress, EthAddress},\n    constants::{\n        CONTRACT_CLASS_LOG_SIZE_IN_FIELDS, MAX_CONTRACT_CLASS_LOGS_PER_CALL, MAX_ENQUEUED_CALLS_PER_CALL,\n        MAX_KEY_VALIDATION_REQUESTS_PER_CALL, MAX_L2_TO_L1_MSGS_PER_CALL, MAX_NOTE_HASH_READ_REQUESTS_PER_CALL,\n        MAX_NOTE_HASHES_PER_CALL, MAX_NULLIFIER_READ_REQUESTS_PER_CALL, MAX_NULLIFIERS_PER_CALL,\n        MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL, MAX_PRIVATE_LOGS_PER_CALL, MAX_TX_LIFETIME,\n        NULL_MSG_SENDER_CONTRACT_ADDRESS, PRIVATE_LOG_CIPHERTEXT_LEN,\n    },\n    hash::poseidon2_hash,\n    messaging::l2_to_l1_message::L2ToL1Message,\n    side_effect::{Counted, scoped::Scoped},\n    traits::{Empty, Hash, ToField},\n    utils::arrays::{ClaimedLengthArray, trimmed_array_length_hint},\n};\n\n/// # PrivateContext\n///\n/// The **main interface** between an #[external(\"private\")] function and the Aztec blockchain.\n///\n/// An instance of the PrivateContext is initialized automatically at the outset of every private function, within the\n/// #[external(\"private\")] macro, so you'll never need to consciously instantiate this yourself.\n///\n/// The instance is always named `context`, and it is always be available within the body of every\n/// #[external(\"private\")] function in your smart contract.\n///\n/// > For those used to \"vanilla\" Noir, it might be jarring to have access to > `context` without seeing a declaration\n/// `let context = PrivateContext::new(...)` > within the body of your function. This is just a consequence of using >\n/// macros to tidy-up verbose boilerplate. You can use `nargo expand` to > expand all macros, if you dare.\n///\n/// Typical usage for a smart contract developer will be to call getter methods of the PrivateContext.\n///\n/// _Pushing_ data and requests to the context is mostly handled within aztec-nr's own functions, so typically a smart\n/// contract developer won't need to call any setter methods directly.\n///\n/// > Advanced users might occasionally wish to push data to the context > directly for lower-level control. If you\n/// find yourself doing this, please > open an issue on GitHub to describe your use case: it might be that > new\n/// functionality should be added to aztec-nr.\n///\n/// ## Responsibilities\n/// - Exposes contextual data to a private function:\n/// - Data relating to how this private function was called.\n/// - msg_sender\n/// - this_address - (the contract address of the private function being executed)\n/// - See `CallContext` for more data.\n/// - Data relating to the transaction in which this private function is being executed.\n/// - chain_id\n/// - version\n/// - gas_settings\n/// - Provides state access:\n/// - Access to the \"Anchor block\" header. Recall, a private function cannot read from the \"current\" block header, but\n/// must read from some historical block header, because as soon as private function execution begins (asynchronously,\n/// on a user's device), the public state of the chain (the \"current state\") will have progressed forward. We call this\n/// reference the \"Anchor block\". See `BlockHeader`.\n///   - Enables consumption of L1->L2 messages.\n/// - Enables calls to functions of other smart contracts:\n/// - Private function calls\n/// - Enqueueing of public function call requests (Since public functions are executed at a later time, by a block\n/// proposer, we say they are \"enqueued\").\n/// - Writes data to the blockchain:\n/// - New notes\n/// - New nullifiers\n/// - Private logs (for sending encrypted note contents or encrypted events)\n///   - New L2->L1 messages.\n/// - Provides args to the private function (handled by the #[external(\"private\")] macro).\n/// - Returns the return values of this private function (handled by the\n///   #[external(\"private\")] macro).\n/// - Makes Key Validation Requests.\n/// - Private functions are not allowed to see master secret keys, because we do not trust them. They are instead given\n/// \"app-siloed\" secret keys with a claim that they relate to a master public key. They can then request validation of\n/// this claim, by making a \"key validation request\" to the protocol's kernel circuits (which _are_ allowed to see\n/// certain master secret keys).\n///\n/// ## Advanced Responsibilities\n///\n/// - Ultimately, the PrivateContext is responsible for constructing the PrivateCircuitPublicInputs of the private\n/// function being executed. All private functions on Aztec must have public inputs which adhere to the rigid layout of\n/// the PrivateCircuitPublicInputs, in order to be compatible with the protocol's kernel circuits. A well-known\n/// misnomer:\n/// - \"public inputs\" contain both inputs and outputs of this function.\n/// - By \"outputs\" we mean a lot more side-effects than just the \"return values\" of the function.\n/// - Most of the so-called \"public inputs\" are kept _private_, and never leak to the outside world, because they are\n/// 'swallowed' by the protocol's kernel circuits before the tx is sent to the network. Only the following are exposed\n/// to the outside world:\n/// - New note_hashes\n/// - New nullifiers\n/// - New private logs\n///     - New L2->L1 messages\n/// - New enqueued public function call requests All the above-listed arrays of side-effects can be padded by the\n/// user's wallet (through instructions to the kernel circuits, via the PXE) to obscure their true lengths.\n///\n/// ## Syntax Justification\n///\n/// Both user-defined functions _and_ most functions in aztec-nr need access to the PrivateContext instance to\n/// read/write data. This is why you'll see the arguably-ugly pervasiveness of the \"context\" throughout your smart\n/// contract and the aztec-nr library. For example, `&mut context` is prevalent. In some languages, you can access and\n/// mutate a global variable (such as a PrivateContext instance) from a function without polluting the function's\n/// parameters. With Noir, a function must explicitly pass control of a mutable variable to another function, by\n/// reference. Since many functions in aztec-nr need to be able to push new data to the PrivateContext, they need to be\n/// handed a mutable reference _to_ the context as a parameter. For example, `Context` is prevalent as a generic\n/// parameter, to give better type safety at compile time. Many `aztec-nr` functions don't make sense if they're called\n/// in a particular runtime (private, public or utility), and so are intentionally only implemented over certain\n/// [Private|Public|Utility]Context structs. This gives smart contract developers a much faster feedback loop if\n/// they're making a mistake, as an error will be thrown by the LSP or when they compile their contract.\n///\n#[derive(Eq)]\npub struct PrivateContext {\n    // docs:start:private-context\n    pub inputs: PrivateContextInputs,\n    pub side_effect_counter: u32,\n\n    pub min_revertible_side_effect_counter: u32,\n    pub is_fee_payer: bool,\n\n    pub args_hash: Field,\n    pub return_hash: Field,\n\n    pub expiration_timestamp: u64,\n\n    pub(crate) note_hash_read_requests: BoundedVec<Scoped<Counted<Field>>, MAX_NOTE_HASH_READ_REQUESTS_PER_CALL>,\n    pub(crate) nullifier_read_requests: BoundedVec<Scoped<Counted<Field>>, MAX_NULLIFIER_READ_REQUESTS_PER_CALL>,\n    key_validation_requests_and_separators: BoundedVec<KeyValidationRequestAndSeparator, MAX_KEY_VALIDATION_REQUESTS_PER_CALL>,\n\n    pub note_hashes: BoundedVec<Counted<NoteHash>, MAX_NOTE_HASHES_PER_CALL>,\n    pub nullifiers: BoundedVec<Counted<Nullifier>, MAX_NULLIFIERS_PER_CALL>,\n\n    pub private_call_requests: BoundedVec<PrivateCallRequest, MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL>,\n    pub public_call_requests: BoundedVec<Counted<PublicCallRequest>, MAX_ENQUEUED_CALLS_PER_CALL>,\n    pub public_teardown_call_request: PublicCallRequest,\n    pub l2_to_l1_msgs: BoundedVec<Counted<L2ToL1Message>, MAX_L2_TO_L1_MSGS_PER_CALL>,\n    // docs:end:private-context\n\n    // Header of a block whose state is used during private execution (not the block the transaction is included in).\n    pub anchor_block_header: BlockHeader,\n\n    pub private_logs: BoundedVec<Counted<PrivateLogData>, MAX_PRIVATE_LOGS_PER_CALL>,\n    pub contract_class_logs_hashes: BoundedVec<Counted<LogHash>, MAX_CONTRACT_CLASS_LOGS_PER_CALL>,\n\n    // Contains the last key validation request for each key type. This is used to cache the last request and avoid\n    // fetching the same request multiple times. The index of the array corresponds to the key type (0 nullifier, 1\n    // incoming, 2 outgoing, 3 tagging).\n    pub last_key_validation_requests: [Option<KeyValidationRequest>; NUM_KEY_TYPES],\n\n    pub expected_non_revertible_side_effect_counter: u32,\n    pub expected_revertible_side_effect_counter: u32,\n}\n\nimpl PrivateContext {\n    pub fn new(inputs: PrivateContextInputs, args_hash: Field) -> PrivateContext {\n        PrivateContext {\n            inputs,\n            side_effect_counter: inputs.start_side_effect_counter + 1,\n            min_revertible_side_effect_counter: 0,\n            is_fee_payer: false,\n            args_hash,\n            return_hash: 0,\n            expiration_timestamp: inputs.anchor_block_header.timestamp() + MAX_TX_LIFETIME,\n            note_hash_read_requests: BoundedVec::new(),\n            nullifier_read_requests: BoundedVec::new(),\n            key_validation_requests_and_separators: BoundedVec::new(),\n            note_hashes: BoundedVec::new(),\n            nullifiers: BoundedVec::new(),\n            anchor_block_header: inputs.anchor_block_header,\n            private_call_requests: BoundedVec::new(),\n            public_call_requests: BoundedVec::new(),\n            public_teardown_call_request: PublicCallRequest::empty(),\n            l2_to_l1_msgs: BoundedVec::new(),\n            private_logs: BoundedVec::new(),\n            contract_class_logs_hashes: BoundedVec::new(),\n            last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n            expected_non_revertible_side_effect_counter: 0,\n            expected_revertible_side_effect_counter: 0,\n        }\n    }\n\n    /// Returns the contract address that initiated this function call.\n    ///\n    /// This is similar to `msg.sender` in Solidity (hence the name).\n    ///\n    /// Important Note: Since Aztec doesn't have a concept of an EoA (Externally-owned Account), the msg_sender is\n    /// \"none\" for the first function call of every transaction. The first function call of a tx is likely to be a call\n    /// to the user's account contract, so this quirk will most often be handled by account contract developers.\n    ///\n    /// # Returns\n    /// * `Option<AztecAddress>` - The address of the smart contract that called this function (be it an app contract\n    /// or a user's account contract). Returns `Option<AztecAddress>::none` for the first function call of the tx. No\n    /// other _private_ function calls in the tx will have a `none` msg_sender, but _public_ function calls might (see\n    /// the PublicContext).\n    pub fn maybe_msg_sender(self) -> Option<AztecAddress> {\n        let maybe_msg_sender = self.inputs.call_context.msg_sender;\n        if maybe_msg_sender == NULL_MSG_SENDER_CONTRACT_ADDRESS {\n            Option::none()\n        } else {\n            Option::some(maybe_msg_sender)\n        }\n    }\n\n    /// Returns the contract address of the current function being executed.\n    ///\n    /// This is equivalent to `address(this)` in Solidity (hence the name). Use this to identify the current contract's\n    /// address, commonly needed for access control or when interacting with other contracts.\n    ///\n    /// # Returns\n    /// * `AztecAddress` - The contract address of the current function being executed.\n    ///\n    pub fn this_address(self) -> AztecAddress {\n        self.inputs.call_context.contract_address\n    }\n\n    /// Returns the chain ID of the current network.\n    ///\n    /// This is similar to `block.chainid` in Solidity. Returns the unique identifier for the blockchain network this\n    /// transaction is executing on.\n    ///\n    /// Helps prevent cross-chain replay attacks. Useful if implementing multi-chain contract logic.\n    ///\n    /// # Returns\n    /// * `Field` - The chain ID as a field element\n    ///\n    pub fn chain_id(self) -> Field {\n        self.inputs.tx_context.chain_id\n    }\n\n    /// Returns the Aztec protocol version that this transaction is executing under. Different versions may have\n    /// different rules, opcodes, or cryptographic primitives.\n    ///\n    /// This is similar to how Ethereum has different EVM versions.\n    ///\n    /// Useful for forward/backward compatibility checks\n    ///\n    /// Not to be confused with contract versions; this is the protocol version.\n    ///\n    /// # Returns\n    /// * `Field` - The protocol version as a field element\n    ///\n    pub fn version(self) -> Field {\n        self.inputs.tx_context.version\n    }\n\n    /// Returns the gas settings for the current transaction.\n    ///\n    /// This provides information about gas limits and pricing for the transaction, similar to `tx.gasprice` and gas\n    /// limits in Ethereum. However, Aztec has a more sophisticated gas model with separate accounting for L2\n    /// computation and data availability (DA) costs.\n    ///\n    /// # Returns\n    /// * `GasSettings` - Struct containing gas limits and fee information\n    ///\n    pub fn gas_settings(self) -> GasSettings {\n        self.inputs.tx_context.gas_settings\n    }\n\n    /// Returns the function selector of the currently executing function.\n    ///\n    /// Low-level function: Ordinarily, smart contract developers will not need to access this.\n    ///\n    /// This is similar to `msg.sig` in Solidity, which returns the first 4 bytes of the function signature. In Aztec,\n    /// the selector uniquely identifies which function within the contract is being called.\n    ///\n    /// # Returns\n    /// * `FunctionSelector` - The 4-byte function identifier\n    ///\n    /// # Advanced\n    /// Only #[external(\"private\")] functions have a function selector as a protocol- enshrined concept. The function\n    /// selectors of private functions are baked into the preimage of the contract address, and are used by the\n    /// protocol's kernel circuits to identify each private function and ensure the correct one is being executed.\n    ///\n    /// Used internally for function dispatch and call verification.\n    ///\n    pub fn selector(self) -> FunctionSelector {\n        self.inputs.call_context.function_selector\n    }\n\n    /// Returns the hash of the arguments passed to the current function.\n    ///\n    /// Very low-level function: You shouldn't need to call this. The #[external(\"private\")] macro calls this, and it\n    /// makes the arguments neatly available to the body of your private function.\n    ///\n    /// # Returns\n    /// * `Field` - Hash of the function arguments\n    ///\n    /// # Advanced\n    /// * Arguments are hashed to reduce proof size and verification time\n    /// * Enables efficient argument passing in recursive function calls\n    /// * The hash can be used to retrieve the original arguments from the PXE.\n    ///\n    pub fn get_args_hash(self) -> Field {\n        self.args_hash\n    }\n\n    /// Pushes a new note_hash to the Aztec blockchain's global Note Hash Tree (a state tree).\n    ///\n    /// A note_hash is a commitment to a piece of private state.\n    ///\n    /// Low-level function: Ordinarily, smart contract developers will not need to manually call this. Aztec-nr's state\n    /// variables (see `../state_vars/`) are designed to understand when to create and push new note hashes.\n    ///\n    /// # Arguments\n    /// * `note_hash` - The new note_hash.\n    ///\n    /// # Advanced\n    /// From here, the protocol's kernel circuits will take over and insert the note_hash into the protocol's \"note\n    /// hash tree\" (in the Base Rollup circuit). Before insertion, the protocol will:\n    /// - \"Silo\" the `note_hash` with the contract address of this function, to yield a `siloed_note_hash`. This\n    /// prevents state collisions between different smart contracts.\n    /// - Ensure uniqueness of the `siloed_note_hash`, to prevent Faerie-Gold attacks, by hashing the\n    /// `siloed_note_hash` with a unique value, to yield a `unique_siloed_note_hash` (see the protocol spec for more).\n    ///\n    /// In addition to calling this function, aztec-nr provides the contents of the newly-created note to the PXE, via\n    /// the `notify_created_note` oracle.\n    ///\n    /// > Advanced users might occasionally wish to push data to the context > directly for lower-level control. If you\n    /// find yourself doing this, > please open an issue on GitHub to describe your use case: it might be > that new\n    /// functionality should be added to aztec-nr.\n    ///\n    pub fn push_note_hash(&mut self, note_hash: Field) {\n        self.note_hashes.push(Counted::new(note_hash, self.next_counter()));\n    }\n\n    /// Creates a new [nullifier](crate::nullifier).\n    ///\n    /// ## Safety\n    ///\n    /// This is a low-level function that must be used with great care to avoid subtle corruption of contract state.\n    /// Instead of calling this function, consider using the higher-level [`crate::state_vars::SingleUseClaim`].\n    ///\n    /// In particular, callers must ensure all nullifiers created by a contract are properly domain-separated, so that\n    /// unrelated components don't interfere with one another (e.g. a transaction nullifier accidentally marking a\n    /// variable as initialized). Only [`PrivateContext::push_nullifier_for_note_hash`] should be used for note\n    /// nullifiers, never this one.\n    ///\n    /// ## Advanced\n    ///\n    /// The raw `nullifier` is not what is inserted into the Aztec state tree: it will be first siloed by contract\n    /// address via [`crate::protocol::hash::compute_siloed_nullifier`] in order to prevent accidental or malicious\n    /// interference of nullifiers from different contracts.\n    pub fn push_nullifier(&mut self, nullifier: Field) {\n        notify_created_nullifier(nullifier);\n        self.nullifiers.push(Nullifier { value: nullifier, note_hash: 0 }.count(self.next_counter()));\n    }\n\n    /// Creates a new [nullifier](crate::nullifier) associated with a note.\n    ///\n    /// This is a variant of [`PrivateContext::push_nullifier`] that is used for note nullifiers, i.e. nullifiers that\n    /// correspond to a note. If a note and its nullifier are created in the same transaction, then the private kernels\n    /// will 'squash' these values, deleting them both as if they never existed and reducing transaction fees.\n    ///\n    /// The `nullification_note_hash` must be the result of calling\n    /// [`crate::note::utils::compute_confirmed_note_hash_for_nullification`] for pending notes, and `0` for settled\n    /// notes (which cannot be squashed).\n    ///\n    /// ## Safety\n    ///\n    /// This is a low-level function that must be used with great care to avoid subtle corruption of contract state.\n    /// Instead of calling this function, consider using the higher-level [`crate::note::lifecycle::destroy_note`].\n    ///\n    /// The precautions listed for [`PrivateContext::push_nullifier`] apply here as well, and callers should\n    /// additionally ensure `nullification_note_hash` corresponds to a note emitted by this contract, with its hash\n    /// computed in the same transaction execution phase as the call to this function. Finally, only this function\n    /// should be used for note nullifiers, never [`PrivateContext::push_nullifier`].\n    ///\n    /// Failure to do these things can result in unprovable contexts, accidental deletion of notes, or double-spend\n    /// attacks.\n    pub fn push_nullifier_for_note_hash(&mut self, nullifier: Field, nullification_note_hash: Field) {\n        let nullifier_counter = self.next_counter();\n        notify_nullified_note(nullifier, nullification_note_hash, nullifier_counter);\n        self.nullifiers.push(Nullifier { value: nullifier, note_hash: nullification_note_hash }.count(\n            nullifier_counter,\n        ));\n    }\n\n    /// Returns the anchor block header - the historical block header that this private function is reading from.\n    ///\n    /// A private function CANNOT read from the \"current\" block header, but must read from some older block header,\n    /// because as soon as private function execution begins (asynchronously, on a user's device), the public state of\n    /// the chain (the \"current state\") will have progressed forward.\n    ///\n    /// # Returns\n    /// * `BlockHeader` - The anchor block header.\n    ///\n    /// # Advanced\n    /// * All private functions of a tx read from the same anchor block header.\n    /// * The protocol asserts that the `expiration_timestamp` of every tx is at most 24 hours beyond the timestamp of\n    /// the tx's chosen anchor block header. This enables the network's nodes to safely prune old txs from the mempool.\n    /// Therefore, the chosen block header _must_ be one from within the last 24 hours.\n    ///\n    pub fn get_anchor_block_header(self) -> BlockHeader {\n        self.anchor_block_header\n    }\n\n    /// Returns the header of any historical block at or before the anchor block.\n    ///\n    /// This enables private contracts to access information from even older blocks than the anchor block header.\n    ///\n    /// Useful for time-based contract logic that needs to compare against multiple historical points.\n    ///\n    /// # Arguments\n    /// * `block_number` - The block number to retrieve (must be <= anchor block number)\n    ///\n    /// # Returns\n    /// * `BlockHeader` - The header of the requested historical block\n    ///\n    /// # Advanced\n    /// This function uses an oracle to fetch block header data from the user's PXE. Depending on how much blockchain\n    /// data the user's PXE has been set up to store, this might require a query from the PXE to another Aztec node to\n    /// get the data. > This is generally true of all oracle getters (see `../oracle`).\n    ///\n    /// Each block header gets hashed and stored as a leaf in the protocol's Archive Tree. In fact, the i-th block\n    /// header gets stored at the i-th leaf index of the Archive Tree. Behind the scenes, this `get_block_header_at`\n    /// function will add Archive Tree merkle-membership constraints (~3k) to your smart contract function's circuit,\n    /// to prove existence of the block header in the Archive Tree.\n    ///\n    /// Note: we don't do any caching, so avoid making duplicate calls for the same block header, because each call\n    /// will add duplicate constraints.\n    ///\n    /// Calling this function is more expensive (constraint-wise) than getting the anchor block header (via\n    /// `get_block_header`). This is because the anchor block's merkle membership proof is handled by Aztec's protocol\n    /// circuits, and is only performed once for the entire tx because all private functions of a tx share a common\n    /// anchor block header. Therefore, the cost (constraint-wise) of calling `get_block_header` is effectively free.\n    ///\n    pub fn get_block_header_at(self, block_number: u32) -> BlockHeader {\n        get_block_header_at(block_number, self)\n    }\n\n    /// Sets the hash of the return values for this private function.\n    ///\n    /// Very low-level function: this is called by the #[external(\"private\")] macro.\n    ///\n    /// # Arguments\n    /// * `serialized_return_values` - The serialized return values as a field array\n    ///\n    pub fn set_return_hash<let N: u32>(&mut self, serialized_return_values: [Field; N]) {\n        let return_hash = hash_args(serialized_return_values);\n        self.return_hash = return_hash;\n        execution_cache::store(serialized_return_values, return_hash);\n    }\n\n    /// Builds the PrivateCircuitPublicInputs for this private function, to ensure compatibility with the protocol's\n    /// kernel circuits.\n    ///\n    /// Very low-level function: This function is automatically called by the #[external(\"private\")] macro.\n    pub fn finish(self) -> PrivateCircuitPublicInputs {\n        PrivateCircuitPublicInputs {\n            call_context: self.inputs.call_context,\n            args_hash: self.args_hash,\n            returns_hash: self.return_hash,\n            min_revertible_side_effect_counter: self.min_revertible_side_effect_counter,\n            is_fee_payer: self.is_fee_payer,\n            expiration_timestamp: self.expiration_timestamp,\n            note_hash_read_requests: ClaimedLengthArray::from_bounded_vec(self.note_hash_read_requests),\n            nullifier_read_requests: ClaimedLengthArray::from_bounded_vec(self.nullifier_read_requests),\n            key_validation_requests_and_separators: ClaimedLengthArray::from_bounded_vec(\n                self.key_validation_requests_and_separators,\n            ),\n            note_hashes: ClaimedLengthArray::from_bounded_vec(self.note_hashes),\n            nullifiers: ClaimedLengthArray::from_bounded_vec(self.nullifiers),\n            private_call_requests: ClaimedLengthArray::from_bounded_vec(self.private_call_requests),\n            public_call_requests: ClaimedLengthArray::from_bounded_vec(self.public_call_requests),\n            public_teardown_call_request: self.public_teardown_call_request,\n            l2_to_l1_msgs: ClaimedLengthArray::from_bounded_vec(self.l2_to_l1_msgs),\n            start_side_effect_counter: self.inputs.start_side_effect_counter,\n            end_side_effect_counter: self.side_effect_counter,\n            private_logs: ClaimedLengthArray::from_bounded_vec(self.private_logs),\n            contract_class_logs_hashes: ClaimedLengthArray::from_bounded_vec(self.contract_class_logs_hashes),\n            anchor_block_header: self.anchor_block_header,\n            tx_context: self.inputs.tx_context,\n            expected_non_revertible_side_effect_counter: self.expected_non_revertible_side_effect_counter,\n            expected_revertible_side_effect_counter: self.expected_revertible_side_effect_counter,\n        }\n    }\n\n    /// Designates this contract as the fee payer for the transaction.\n    ///\n    /// Unlike Ethereum, where the transaction sender always pays fees, Aztec allows any contract to voluntarily pay\n    /// transaction fees. This enables patterns like sponsored transactions or fee abstraction where users don't need\n    /// to hold fee-juice themselves. (Fee juice is a fee-paying asset for Aztec).\n    ///\n    /// Only one contract per transaction can declare itself as the fee payer, and it must have sufficient fee-juice\n    /// balance (>= the gas limits specified in the TxContext) by the time we reach the public setup phase of the tx.\n    ///\n    pub fn set_as_fee_payer(&mut self) {\n        aztecnr_trace_log_format!(\"Setting {0} as fee payer\")([self.this_address().to_field()]);\n        self.is_fee_payer = true;\n    }\n\n    pub fn in_revertible_phase(&mut self) -> bool {\n        let current_counter = self.side_effect_counter;\n\n        // Safety: Kernel will validate that the claim is correct by validating the expected counters.\n        let is_revertible = unsafe { is_execution_in_revertible_phase(current_counter) };\n\n        if is_revertible {\n            if (self.expected_revertible_side_effect_counter == 0)\n                | (current_counter < self.expected_revertible_side_effect_counter) {\n                self.expected_revertible_side_effect_counter = current_counter;\n            }\n        } else if current_counter > self.expected_non_revertible_side_effect_counter {\n            self.expected_non_revertible_side_effect_counter = current_counter;\n        }\n\n        is_revertible\n    }\n\n    /// Declares the end of the \"setup phase\" of this tx.\n    ///\n    /// Only one function per tx can declare the end of the setup phase.\n    ///\n    /// Niche function: Only wallet developers and paymaster contract developers (aka Fee-payment contracts) will need\n    /// to make use of this function.\n    ///\n    /// Aztec supports a three-phase execution model: setup, app logic, teardown. The phases exist to enable a fee\n    /// payer to take on the risk of paying a transaction fee, safe in the knowledge that their payment (in whatever\n    /// token or method the user chooses) will succeed, regardless of whether the app logic will succeed. The \"setup\"\n    /// phase enables such a payment to be made, because the setup phase _cannot revert_: a reverting function within\n    /// the setup phase would result in an invalid block which cannot be proven. Any side-effects generated during that\n    /// phase are guaranteed to be inserted into Aztec's state trees (except for squashed notes & nullifiers, of\n    /// course).\n    ///\n    /// Even though the end of the setup phase is declared within a private function, you might have noticed that\n    /// _public_ functions can also execute within the setup phase. This is because any public function calls which\n    /// were enqueued _within the setup phase_ by a private function are considered part of the setup phase.\n    ///\n    /// # Advanced\n    /// * Sets the minimum revertible side effect counter of this tx to be the PrivateContext's _current_ side effect\n    /// counter.\n    ///\n    pub fn end_setup(&mut self) {\n        // Incrementing the side effect counter when ending setup ensures non ambiguity for the counter where we change\n        // phases.\n        self.side_effect_counter += 1;\n        aztecnr_trace_log_format!(\"Ending setup at counter {0}\")([self.side_effect_counter as Field]);\n        self.min_revertible_side_effect_counter = self.next_counter();\n        notify_revertible_phase_start(self.min_revertible_side_effect_counter);\n    }\n\n    /// Sets a deadline (an \"include-by timestamp\") for when this transaction must be included in a block.\n    ///\n    /// Other functions in this tx might call this setter with differing values for the include-by timestamp. To ensure\n    /// that all functions' deadlines are met, the _minimum_ of all these include-by timestamps will be exposed when\n    /// this tx is submitted to the network.\n    ///\n    /// If the transaction is not included in a block by its include-by timestamp, it becomes invalid and it will never\n    /// be included.\n    ///\n    /// This expiry timestamp is publicly visible. See the \"Advanced\" section for privacy concerns.\n    ///\n    /// # Arguments\n    /// * `expiration_timestamp` - Unix timestamp (seconds) deadline for inclusion. The include-by timestamp of this tx\n    /// will be _at most_ the timestamp specified.\n    ///\n    /// # Advanced\n    /// * If multiple functions set differing `expiration_timestamp`s, the kernel circuits will set it to be the\n    /// _minimum_ of the two. This ensures the tx expiry requirements of all functions in the tx are met.\n    /// * Rollup circuits will reject expired txs.\n    /// * The protocol enforces that all transactions must be included within 24 hours of their chosen anchor block's\n    /// timestamp, to enable safe mempool pruning.\n    /// * The DelayedPublicMutable design makes heavy use of this functionality, to enable private functions to read\n    /// public state.\n    /// * A sophisticated Wallet should cleverly set an include-by timestamp to improve the privacy of the user and the\n    /// network as a whole. For example, if a contract interaction sets include-by to some publicly-known value (e.g.\n    /// the time when a contract upgrades), then the wallet might wish to set an even lower one to avoid revealing that\n    /// this tx is interacting with said contract. Ideally, all wallets should standardize on an approach in order to\n    ///   provide users with a large privacy set -- although the exact approach\n    /// will need to be discussed. Wallets that deviate from a standard might accidentally reveal which wallet each\n    /// transaction originates from.\n    ///\n    // docs:start:expiration-timestamp\n    pub fn set_expiration_timestamp(&mut self, expiration_timestamp: u64) {\n        // docs:end:expiration-timestamp\n        self.expiration_timestamp = std::cmp::min(self.expiration_timestamp, expiration_timestamp);\n    }\n\n    /// Asserts that a note has been created.\n    ///\n    /// This function will cause the transaction to fail unless the requested note exists. This is the preferred\n    /// mechanism for performing this check, and the only one that works for pending notes.\n    ///\n    /// ## Pending Notes\n    ///\n    /// Both settled notes (created in prior transactions) and pending notes (created in the current transaction) will\n    /// be considered by this function. Pending notes must have been created **before** this call is made for the check\n    /// to pass.\n    ///\n    /// ## Historical Notes\n    ///\n    /// If you need to assert that a note existed _by some specific block in the past_, instead of simply proving that\n    /// it exists by the current anchor block, use [`crate::history::note::assert_note_existed_by`] instead.\n    ///\n    /// ## Cost\n    ///\n    /// This uses up one of the call's kernel note hash read requests, which are limited. Like all kernel requests,\n    /// proving time costs are only incurred when the total number of requests exceeds the kernel's capacity, requiring\n    /// an additional invocation of the kernel reset circuit.\n    pub fn assert_note_exists(&mut self, note_existence_request: NoteExistenceRequest) {\n        // Note that the `note_hash_read_requests` array does not hold `NoteExistenceRequest` objects, but rather a\n        // custom kernel type. We convert from the aztec-nr type into it.\n\n        let note_hash = note_existence_request.note_hash();\n        let contract_address = note_existence_request.maybe_contract_address().unwrap_or(AztecAddress::zero());\n\n        let side_effect = Scoped::new(\n            Counted::new(note_hash, self.next_counter()),\n            contract_address,\n        );\n\n        self.note_hash_read_requests.push(side_effect);\n    }\n\n    /// Asserts that a nullifier has been emitted.\n    ///\n    /// This function will cause the transaction to fail unless the requested nullifier exists. This is the preferred\n    /// mechanism for performing this check, and the only one that works for pending nullifiers.\n    ///\n    /// ## Pending Nullifiers\n    ///\n    /// Both settled nullifiers (emitted in prior transactions) and pending nullifiers (emitted in the current\n    /// transaction) will be considered by this function. Pending nullifiers must have been emitted **before** this\n    /// call is made for the check to pass.\n    ///\n    /// ## Historical Nullifiers\n    ///\n    /// If you need to assert that a nullifier existed _by some specific block in the past_, instead of simply proving\n    /// that it exists by the current anchor block, use [`crate::history::nullifier::assert_nullifier_existed_by`]\n    /// instead.\n    ///\n    /// ## Public vs Private\n    ///\n    /// In general, it is unsafe to check for nullifier non-existence in private, as that will not consider the\n    /// possibility of the nullifier having been emitted in any transaction between the anchor block and the inclusion\n    /// block. Private functions instead prove existence via this function and 'prove' non-existence by _emitting_ the\n    /// nullifer, which would cause the transaction to fail if the nullifier existed.\n    ///\n    /// This is not the case in public functions, which do have access to the tip of the blockchain and so can reliably\n    /// prove whether a nullifier exists or not via\n    /// [`crate::context::public_context::PublicContext::nullifier_exists_unsafe`].\n    ///\n    /// ## Cost\n    ///\n    /// This uses up one of the call's kernel nullifier read requests, which are limited. Like all kernel requests,\n    /// proving time costs are only incurred when the total number of requests exceeds the kernel's capacity, requiring\n    /// an additional invocation of the kernel reset circuit.\n    pub fn assert_nullifier_exists(&mut self, nullifier_existence_request: NullifierExistenceRequest) {\n        let nullifier = nullifier_existence_request.nullifier();\n        let contract_address = nullifier_existence_request.maybe_contract_address().unwrap_or(AztecAddress::zero());\n\n        let request = Scoped::new(\n            Counted::new(nullifier, self.next_counter()),\n            contract_address,\n        );\n\n        self.nullifier_read_requests.push(request);\n    }\n\n    /// Requests the app-siloed nullifier hiding key (nhk_app) for the given (hashed) master nullifier public key\n    /// (npk_m), from the user's PXE.\n    ///\n    /// Advanced function: Only needed if you're designing your own notes and/or nullifiers.\n    ///\n    /// Contracts are not allowed to compute nullifiers for other contracts, as that would let them read parts of their\n    /// private state. Because of this, a contract is only given an \"app-siloed key\", which is constructed by\n    /// hashing the user's master nullifier hiding key with the contract's address. However, because contracts cannot\n    /// be trusted with a user's master nullifier hiding key (because we don't know which contracts are honest or\n    /// malicious), the PXE refuses to provide any master secret keys to any app smart contract function. This means\n    /// app functions are unable to prove that the derivation of an app-siloed nullifier hiding key has been computed\n    /// correctly. Instead, an app function can request to the kernel (via `request_nhk_app`) that it validates the\n    /// siloed derivation, since the kernel has been vetted to not leak any master secret keys.\n    ///\n    /// A common nullification scheme is to inject a nullifier hiding key into the preimage of a nullifier, to make the\n    /// nullifier deterministic but random-looking. This function enables that flow.\n    ///\n    /// # Arguments\n    /// * `npk_m_hash` - A hash of the master nullifier public key of the user whose PXE is executing this function.\n    ///\n    /// # Returns\n    /// * The app-siloed nullifier hiding key that corresponds to the given `npk_m_hash`.\n    ///\n    pub fn request_nhk_app(&mut self, npk_m_hash: Field) -> Field {\n        self.request_sk_app(npk_m_hash, NULLIFIER_INDEX)\n    }\n\n    /// Requests the app-siloed nullifier secret key (nsk_app) for the given (hashed) master nullifier public key\n    /// (npk_m), from the user's PXE.\n    ///\n    /// See `request_nsk_app` and `request_sk_app` for more info.\n    ///\n    /// The intention of the \"outgoing\" keypair is to provide a second secret key for all of a user's outgoing activity\n    /// (i.e. for notes that a user creates, as opposed to notes that a user receives from others). The separation of\n    /// incoming and outgoing data was a distinction made by zcash, with the intention of enabling a user to optionally\n    /// share with a 3rd party a controlled view of only incoming or outgoing notes. Similar functionality of sharing\n    /// select data can be achieved with offchain zero-knowledge proofs. It is up to an app developer whether they\n    /// choose to make use of a user's outgoing keypair within their application logic, or instead simply use the same\n    /// keypair (the address keypair (which is effectively the same as the \"incoming\" keypair)) for all incoming &\n    /// outgoing messages to a user.\n    ///\n    /// Currently, all of the exposed encryption functions in aztec-nr ignore the outgoing viewing keys, and instead\n    /// encrypt all note logs and event logs to a user's address public key.\n    ///\n    /// # Arguments\n    /// * `ovpk_m_hash` - Hash of the outgoing viewing public key master\n    ///\n    /// # Returns\n    /// * The application-specific outgoing viewing secret key\n    ///\n    pub fn request_ovsk_app(&mut self, ovpk_m_hash: Field) -> Field {\n        self.request_sk_app(ovpk_m_hash, OUTGOING_INDEX)\n    }\n\n    /// Pushes a Key Validation Request to the kernel.\n    ///\n    /// Private functions are not allowed to see a user's master secret keys, because we do not trust them. They are\n    /// instead given \"app-siloed\" secret keys with a claim that they relate to a master public key. They can then\n    /// request validation of this claim, by making a \"key validation request\" to the protocol's kernel circuits (which\n    /// _are_ allowed to see certain master secret keys).\n    ///\n    /// When a Key Validation Request tuple of (sk_app, Pk_m, app_address) is submitted to the kernel, it will perform\n    /// the following derivations to validate the relationship between the claimed sk_app and the user's Pk_m:\n    ///\n    ///       (sk_m) ----> * G ----> Pk_m\n    ///         |                     |\n    ///         v                       We use the kernel to prove this\n    ///  h(sk_m, app_address)         | sk_app-Pk_m relationship, because app\n    ///         |                       circuits must not be trusted to see sk_m.\n    ///         v                     |\n    /// sk_app - -  - - - - - - -\n    ///\n    /// The function is named \"request_\" instead of \"get_\" to remind the user that a Key Validation Request will be\n    /// emitted to the kernel.\n    ///\n    fn request_sk_app(&mut self, pk_m_hash: Field, key_index: Field) -> Field {\n        let cached_request =\n            self.last_key_validation_requests[key_index as u32].unwrap_or(KeyValidationRequest::empty());\n\n        if cached_request.pk_m.hash() == pk_m_hash {\n            // We get a match so the cached request is the latest one\n            cached_request.sk_app\n        } else {\n            // We didn't get a match meaning the cached result is stale Typically we'd validate keys by showing that\n            // they are the preimage of `pk_m_hash`, but that'd require the oracle returning the master secret keys,\n            // which could cause malicious contracts to leak it or learn about secrets from other contracts. We\n            // therefore silo secret keys, and rely on the private kernel to validate that we siloed secret key\n            // corresponds to correct siloing of the master secret key that hashes to `pk_m_hash`.\n\n            // Safety: Kernels verify that the key validation request is valid and below we verify that a request for\n            // the correct public key has been received.\n            let request = unsafe { get_key_validation_request(pk_m_hash, key_index) };\n            assert(!request.pk_m.is_infinite, \"Infinite public key points are not allowed\");\n            assert_eq(request.pk_m.hash(), pk_m_hash, \"Obtained invalid key validation request\");\n\n            self.key_validation_requests_and_separators.push(\n                KeyValidationRequestAndSeparator {\n                    request,\n                    key_type_domain_separator: public_key_domain_separators[key_index as u32],\n                },\n            );\n            self.last_key_validation_requests[key_index as u32] = Option::some(request);\n            request.sk_app\n        }\n    }\n\n    /// Sends an \"L2 -> L1 message\" from this function (Aztec, L2) to a smart contract on Ethereum (L1). L1 contracts\n    /// which are designed to send/receive messages to/from Aztec are called \"Portal Contracts\".\n    ///\n    /// Common use cases include withdrawals, cross-chain asset transfers, and triggering L1 actions based on L2 state\n    /// changes.\n    ///\n    /// The message will be inserted into an Aztec \"Outbox\" contract on L1, when this transaction's block is proposed\n    /// to L1. Sending the message will not result in any immediate state changes in the target portal contract. The\n    /// message will need to be manually consumed from the Outbox through a separate Ethereum transaction: a user will\n    /// need to call a function of the portal contract -- a function specifically designed to make a call to the Outbox\n    /// to consume the message. The message will only be available for consumption once the _epoch_ proof has been\n    /// submitted. Given that there are multiple Aztec blocks within an epoch, it might take some time for this epoch\n    /// proof to be submitted -- especially if the block was near the start of an epoch.\n    ///\n    /// # Arguments\n    /// * `recipient` - Ethereum address that will receive the message\n    /// * `content` - Message content (32 bytes as a Field element). This content has a very\n    /// specific layout. docs:start:context_message_portal\n    pub fn message_portal(&mut self, recipient: EthAddress, content: Field) {\n        let message = L2ToL1Message { recipient, content };\n        self.l2_to_l1_msgs.push(message.count(self.next_counter()));\n    }\n\n    /// Consumes a message sent from Ethereum (L1) to Aztec (L2).\n    ///\n    /// Common use cases include token bridging, cross-chain governance, and triggering L2 actions based on L1 events.\n    ///\n    /// Use this function if you only want the message to ever be \"referred to\" once. Once consumed using this method,\n    /// the message cannot be consumed again, because a nullifier is emitted. If your use case wants for the message to\n    /// be read unlimited times, then you can always read any historic message from the L1-to-L2 messages tree;\n    /// messages never technically get deleted from that tree.\n    ///\n    /// The message will first be inserted into an Aztec \"Inbox\" smart contract on L1. Sending the message will not\n    /// result in any immediate state changes in the target L2 contract. The message will need to be manually consumed\n    /// by the target contract through a separate Aztec transaction. The message will not be available for consumption\n    /// immediately. Messages get copied over from the L1 Inbox to L2 by the next Proposer in batches. So you will need\n    /// to wait until the messages are copied before you can consume them.\n    ///\n    /// # Arguments\n    /// * `content` - The message content that was sent from L1\n    /// * `secret` - Secret value used for message privacy (if needed)\n    /// * `sender` - Ethereum address that sent the message\n    /// * `leaf_index` - Index of the message in the L1-to-L2 message tree\n    ///\n    /// # Advanced\n    /// Validates message existence in the L1-to-L2 message tree and nullifies the message to prevent\n    /// double-consumption.\n    pub fn consume_l1_to_l2_message(&mut self, content: Field, secret: Field, sender: EthAddress, leaf_index: Field) {\n        let nullifier = process_l1_to_l2_message(\n            self.anchor_block_header.state.l1_to_l2_message_tree.root,\n            self.this_address(),\n            sender,\n            self.chain_id(),\n            self.version(),\n            content,\n            secret,\n            leaf_index,\n        );\n\n        // Push nullifier (and the \"commitment\" corresponding to this can be \"empty\")\n        self.push_nullifier(nullifier)\n    }\n\n    /// Emits a private log (an array of Fields) that will be published to an Ethereum blob.\n    ///\n    /// Private logs are intended for the broadcasting of ciphertexts: that is, encrypted events or encrypted note\n    /// contents. Since the data in the logs is meant to be _encrypted_, private_logs are broadcast to publicly-visible\n    /// Ethereum blobs. The intended recipients of such encrypted messages can then discover and decrypt these\n    /// encrypted logs using their viewing secret key. (See `../messages/discovery` for more details).\n    ///\n    /// Important note: This function DOES NOT _do_ any encryption of the input `log` fields. This function blindly\n    /// publishes whatever input `log` data is fed into it, so the caller of this function should have already\n    /// performed the encryption, and the `log` should be the result of that encryption.\n    ///\n    /// The protocol does not dictate what encryption scheme should be used: a smart contract developer can choose\n    /// whatever encryption scheme they like. Aztec-nr includes some off-the-shelf encryption libraries that developers\n    /// might wish to use, for convenience. These libraries not only encrypt a plaintext (to produce a ciphertext);\n    /// they also prepend the ciphertext with a `tag` and `ephemeral public key` for easier message discovery. This is\n    /// a very dense topic, and we will be writing more libraries and docs soon.\n    ///\n    /// > Currently, AES128 CBC encryption is the main scheme included in > aztec.nr. > We are currently making\n    /// significant changes to the interfaces of the > encryption library.\n    ///\n    /// In some niche use cases, an app might be tempted to publish _un-encrypted_ data via a private log, because\n    /// _public logs_ are not available to private functions. Be warned that emitting public data via private logs is\n    /// strongly discouraged, and is considered a \"privacy anti-pattern\", because it reveals identifiable information\n    /// about _which_ function has been executed. A tx which leaks such information does not contribute to the privacy\n    /// set of the network.\n    ///\n    /// * Unlike `emit_raw_note_log_unsafe`, this log is not tied to any specific note\n    ///\n    /// # Arguments\n    /// * `tag` - A tag placed at `fields[0]` of the emitted log. Used by recipients and nodes to identify and\n    /// filter for relevant logs without scanning all of them.\n    /// * `log` - The log data that will be publicly broadcast (so make sure it's already been encrypted before you\n    /// call this function). Private logs are bounded in size (`PRIVATE_LOG_CIPHERTEXT_LEN`), to encourage all logs\n    /// from all smart contracts look identical.\n    /// * `length` - The actual length of `log` (measured in number of Fields). Although the input log has a max\n    /// size of `PRIVATE_LOG_CIPHERTEXT_LEN`, the latter values of the array might all be 0's for small logs. This\n    /// `length` should reflect the trimmed length of the array. The protocol's kernel circuits can then append\n    /// random fields as \"padding\" after the `length`, so that the logs of this smart contract look\n    /// indistinguishable from (the same length as) the logs of all other applications. It's up to wallets how much\n    /// padding to apply, so ideally all wallets should agree on standards for this.\n    ///\n    /// ## Safety\n    ///\n    /// The `tag` should be domain-separated (e.g. via [`crate::protocol::hash::compute_log_tag`]) to prevent\n    /// collisions between logs from different sources. Without domain separation, two unrelated log types that\n    /// happen to share a raw tag value become indistinguishable. Prefer the higher-level APIs\n    /// ([`crate::messages::message_delivery::MessageDelivery`] for messages, `self.emit(event)` for events) which\n    /// handle tagging automatically.\n    pub fn emit_private_log_unsafe(&mut self, tag: Field, log: [Field; PRIVATE_LOG_CIPHERTEXT_LEN], length: u32) {\n        let counter = self.next_counter();\n        let full_log = [tag].concat(log);\n        self.private_logs.push(PrivateLogData { log: PrivateLog::new(full_log, length + 1), note_hash_counter: 0 }\n            .count(counter));\n    }\n\n    // TODO: rename.\n    /// Emits a private log that is explicitly tied to a newly-emitted note_hash, to convey to the kernel: \"this log\n    /// relates to this note\".\n    ///\n    /// This linkage is important in case the note gets squashed (due to being read later in this same tx), since we\n    /// can then squash the log as well.\n    ///\n    /// See `emit_private_log_unsafe` for more info about private log emission.\n    ///\n    /// # Arguments\n    /// * `tag` - A tag placed at `fields[0]`. See `emit_private_log_unsafe`.\n    /// * `log` - The log data as an array of Field elements\n    /// * `length` - The actual length of the `log` (measured in number of Fields).\n    /// * `note_hash_counter` - The side-effect counter that was assigned to the new note_hash when it was pushed to\n    /// this `PrivateContext`.\n    ///\n    /// Important: If your application logic requires the log to always be emitted regardless of note squashing,\n    /// consider using `emit_private_log_unsafe` instead, or emitting additional events.\n    ///\n    /// ## Safety\n    ///\n    /// Same as [`PrivateContext::emit_private_log_unsafe`]: the `tag` should be domain-separated.\n    pub fn emit_raw_note_log_unsafe(\n        &mut self,\n        tag: Field,\n        log: [Field; PRIVATE_LOG_CIPHERTEXT_LEN],\n        length: u32,\n        note_hash_counter: u32,\n    ) {\n        let counter = self.next_counter();\n        let full_log = [tag].concat(log);\n        let private_log = PrivateLogData { log: PrivateLog::new(full_log, length + 1), note_hash_counter };\n        self.private_logs.push(private_log.count(counter));\n    }\n\n    pub fn emit_contract_class_log<let N: u32>(&mut self, log: [Field; N]) {\n        let contract_address = self.this_address();\n        let counter = self.next_counter();\n\n        let log_to_emit: [Field; CONTRACT_CLASS_LOG_SIZE_IN_FIELDS] =\n            log.concat([0; CONTRACT_CLASS_LOG_SIZE_IN_FIELDS - N]);\n        // Note: the length is not always N, it is the number of fields we want to broadcast, omitting trailing zeros\n        // to save blob space.\n        // Safety: The below length is constrained in the base rollup, which will make sure that all the fields beyond\n        // length are zero. However, it won't be able to check that we didn't add extra padding (trailing zeroes) or\n        // that we cut trailing zeroes from the end.\n        let length = unsafe { trimmed_array_length_hint(log_to_emit) };\n        // We hash the entire padded log to ensure a user cannot pass a shorter length and so emit incorrect shorter\n        // bytecode.\n        let log_hash = poseidon2_hash(log_to_emit);\n        // Safety: the below only exists to broadcast the raw log, so we can provide it to the base rollup later to be\n        // constrained.\n        unsafe {\n            notify_created_contract_class_log(contract_address, log_to_emit, length, counter);\n        }\n\n        self.contract_class_logs_hashes.push(LogHash { value: log_hash, length: length }.count(counter));\n    }\n\n    /// Calls a private function on another contract (or the same contract).\n    ///\n    /// Very low-level function.\n    ///\n    /// # Arguments\n    /// * `contract_address` - Address of the contract containing the function\n    /// * `function_selector` - 4-byte identifier of the function to call\n    /// * `args` - Array of arguments to pass to the called function\n    ///\n    /// # Returns\n    /// * `ReturnsHash` - Hash of the called function's return values. Use `.get_preimage()` to extract the actual\n    /// return values.\n    ///\n    /// This enables contracts to interact with each other while maintaining privacy. This \"composability\" of private\n    /// contract functions is a key feature of the Aztec network.\n    ///\n    /// If a user's transaction includes multiple private function calls, then by the design of Aztec, the following\n    /// information will remain private[1]:\n    /// - The function selectors and contract addresses of all private function calls will remain private, so an\n    /// observer of the public mempool will not be able to look at a tx and deduce which private functions have been\n    /// executed.\n    /// - The arguments and return values of all private function calls will remain private.\n    /// - The person who initiated the tx will remain private.\n    /// - The notes and nullifiers and private logs that are emitted by all private function calls will (if designed\n    /// well) not leak any user secrets, nor leak which functions have been executed.\n    ///\n    /// [1] Caveats: Some of these privacy guarantees depend on how app developers design their smart contracts. Some\n    /// actions _can_ leak information, such as:\n    /// - Calling an internal public function.\n    /// - Calling a public function and not setting msg_sender to Option::none (feature not built yet - see github).\n    /// - Calling any public function will always leak details about the nature of the transaction, so devs should be\n    /// careful in their contract designs. If it can be done in a private function, then that will give the best\n    /// privacy.\n    /// - Not padding the side-effects of a tx to some standardized, uniform size. The kernel circuits can take hints\n    /// to pad side-effects, so a wallet should be able to request for a particular amount of padding. Wallets should\n    /// ideally agree on some standard.\n    /// - Padding should include:\n    /// - Padding the lengths of note & nullifier arrays\n    /// - Padding private logs with random fields, up to some standardized size. See also:\n    /// https://docs.aztec.network/developers/resources/considerations/privacy_considerations\n    ///\n    /// # Advanced\n    /// * The call is added to the private call stack and executed by kernel circuits after this function completes\n    /// * The called function can modify its own contract's private state\n    /// * Side effects from the called function are included in this transaction\n    /// * The call inherits the current transaction's context and gas limits\n    ///\n    pub fn call_private_function<let ArgsCount: u32>(\n        &mut self,\n        contract_address: AztecAddress,\n        function_selector: FunctionSelector,\n        args: [Field; ArgsCount],\n    ) -> ReturnsHash {\n        let args_hash = hash_args(args);\n        execution_cache::store(args, args_hash);\n        self.call_private_function_with_args_hash(contract_address, function_selector, args_hash, false)\n    }\n\n    /// Makes a read-only call to a private function on another contract.\n    ///\n    /// This is similar to Solidity's `staticcall`. The called function cannot modify state, emit L2->L2 messages, nor\n    /// emit events. Any nested calls are constrained to also be staticcalls.\n    ///\n    /// See `call_private_function` for more general info on private function calls.\n    ///\n    /// # Arguments\n    /// * `contract_address` - Address of the contract to call\n    /// * `function_selector` - 4-byte identifier of the function to call\n    /// * `args` - Array of arguments to pass to the called function\n    ///\n    /// # Returns\n    /// * `ReturnsHash` - Hash of the called function's return values. Use `.get_preimage()` to extract the actual\n    /// return values.\n    ///\n    pub fn static_call_private_function<let ArgsCount: u32>(\n        &mut self,\n        contract_address: AztecAddress,\n        function_selector: FunctionSelector,\n        args: [Field; ArgsCount],\n    ) -> ReturnsHash {\n        let args_hash = hash_args(args);\n        execution_cache::store(args, args_hash);\n        self.call_private_function_with_args_hash(contract_address, function_selector, args_hash, true)\n    }\n\n    /// Calls a private function that takes no arguments.\n    ///\n    /// This is a convenience function for calling private functions that don't require any input parameters. It's\n    /// equivalent to `call_private_function` but slightly more efficient to use when no arguments are needed.\n    ///\n    /// # Arguments\n    /// * `contract_address` - Address of the contract containing the function\n    /// * `function_selector` - 4-byte identifier of the function to call\n    ///\n    /// # Returns\n    /// * `ReturnsHash` - Hash of the called function's return values. Use `.get_preimage()` to extract the actual\n    /// return values.\n    ///\n    pub fn call_private_function_no_args(\n        &mut self,\n        contract_address: AztecAddress,\n        function_selector: FunctionSelector,\n    ) -> ReturnsHash {\n        self.call_private_function_with_args_hash(contract_address, function_selector, 0, false)\n    }\n\n    /// Makes a read-only call to a private function which takes no arguments.\n    ///\n    /// This combines the optimisation of `call_private_function_no_args` with the safety of\n    /// `static_call_private_function`.\n    ///\n    /// # Arguments\n    /// * `contract_address` - Address of the contract containing the function\n    /// * `function_selector` - 4-byte identifier of the function to call\n    ///\n    /// # Returns\n    /// * `ReturnsHash` - Hash of the called function's return values. Use `.get_preimage()` to extract the actual\n    /// return values.\n    ///\n    pub fn static_call_private_function_no_args(\n        &mut self,\n        contract_address: AztecAddress,\n        function_selector: FunctionSelector,\n    ) -> ReturnsHash {\n        self.call_private_function_with_args_hash(contract_address, function_selector, 0, true)\n    }\n\n    /// Low-level private function call.\n    ///\n    /// This is the underlying implementation used by all other private function call methods. Instead of taking raw\n    /// arguments, it accepts a hash of the arguments.\n    ///\n    /// # Arguments\n    /// * `contract_address` - Address of the contract containing the function\n    /// * `function_selector` - 4-byte identifier of the function to call\n    /// * `args_hash` - Pre-computed hash of the function arguments\n    /// * `is_static_call` - Whether this should be a read-only call\n    ///\n    /// # Returns\n    /// * `ReturnsHash` - Hash of the called function's return values\n    ///\n    pub fn call_private_function_with_args_hash(\n        &mut self,\n        contract_address: AztecAddress,\n        function_selector: FunctionSelector,\n        args_hash: Field,\n        is_static_call: bool,\n    ) -> ReturnsHash {\n        let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n        let start_side_effect_counter = self.side_effect_counter;\n\n        // Safety: The oracle simulates the private call and returns the value of the side effects counter after\n        // execution of the call (which means that end_side_effect_counter - start_side_effect_counter is the number of\n        // side effects that took place), along with the hash of the return values. We validate these by requesting a\n        // private kernel iteration in which the return values are constrained to hash to `returns_hash` and the side\n        // effects counter to increment from start to end.\n        let (end_side_effect_counter, returns_hash) = unsafe {\n            call_private_function_internal(\n                contract_address,\n                function_selector,\n                args_hash,\n                start_side_effect_counter,\n                is_static_call,\n            )\n        };\n\n        self.private_call_requests.push(\n            PrivateCallRequest {\n                call_context: CallContext {\n                    msg_sender: self.this_address(),\n                    contract_address,\n                    function_selector,\n                    is_static_call,\n                },\n                args_hash,\n                returns_hash,\n                start_side_effect_counter,\n                end_side_effect_counter,\n            },\n        );\n\n        // TODO (fees) figure out why this crashes the prover and enable it we need this in order to pay fees inside\n        // child call contexts assert(\n        //     (item.public_inputs.min_revertible_side_effect_counter == 0 as u32)\n        //     | (item.public_inputs.min_revertible_side_effect_counter\n        //         > self.min_revertible_side_effect_counter)\n        // ); if item.public_inputs.min_revertible_side_effect_counter\n        //     > self.min_revertible_side_effect_counter { self.min_revertible_side_effect_counter =\n        // item.public_inputs.min_revertible_side_effect_counter; }\n        self.side_effect_counter = end_side_effect_counter + 1; // TODO: call `next_counter`\n        // instead, for consistency\n        ReturnsHash::new(returns_hash)\n    }\n\n    /// Enqueues a call to a public function to be executed later.\n    ///\n    /// Unlike private functions which execute immediately on the user's device, public function calls are \"enqueued\"\n    /// and executed some time later by a block proposer.\n    ///\n    /// This means a public function cannot return any values back to a private function, because by the time the\n    /// public function is being executed, the private function which called it has already completed execution. (In\n    /// fact, the private function has been executed and proven, along with all other private function calls of the\n    /// user's tx. A single proof of the tx has been submitted to the Aztec network, and some time later a proposer has\n    /// picked the tx up from the mempool and begun executing all of the enqueued public functions).\n    ///\n    /// # Privacy warning Enqueueing a public function call is an inherently leaky action. Many interesting applications will require some interaction with public state, but smart contract developers should try to use public function calls sparingly, and carefully. _Internal_ public function calls are especially leaky, because they completely leak which private contract made the call. See also: https://docs.aztec.network/developers/resources/considerations/privacy_considerations\n    ///\n    /// # Arguments\n    /// * `contract_address` - Address of the contract containing the function\n    /// * `function_selector` - 4-byte identifier of the function to call\n    /// * `args` - Array of arguments to pass to the public function\n    /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n    ///\n    pub fn call_public_function<let ArgsCount: u32>(\n        &mut self,\n        contract_address: AztecAddress,\n        function_selector: FunctionSelector,\n        args: [Field; ArgsCount],\n        hide_msg_sender: bool,\n    ) {\n        let calldata = [function_selector.to_field()].concat(args);\n        let calldata_hash = hash_calldata_array(calldata);\n        execution_cache::store(calldata, calldata_hash);\n        self.call_public_function_with_calldata_hash(contract_address, calldata_hash, false, hide_msg_sender)\n    }\n\n    /// Enqueues a read-only call to a public function.\n    ///\n    /// This is similar to Solidity's `staticcall`. The called function cannot modify state or emit events. Any nested\n    /// calls are constrained to also be staticcalls.\n    ///\n    /// See also `call_public_function` for more important information about making private -> public function calls.\n    ///\n    /// # Arguments\n    /// * `contract_address` - Address of the contract containing the function\n    /// * `function_selector` - 4-byte identifier of the function to call\n    /// * `args` - Array of arguments to pass to the public function\n    /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n    ///\n    pub fn static_call_public_function<let ArgsCount: u32>(\n        &mut self,\n        contract_address: AztecAddress,\n        function_selector: FunctionSelector,\n        args: [Field; ArgsCount],\n        hide_msg_sender: bool,\n    ) {\n        let calldata = [function_selector.to_field()].concat(args);\n        let calldata_hash = hash_calldata_array(calldata);\n        execution_cache::store(calldata, calldata_hash);\n        self.call_public_function_with_calldata_hash(contract_address, calldata_hash, true, hide_msg_sender)\n    }\n\n    /// Enqueues a call to a public function that takes no arguments.\n    ///\n    /// This is an optimisation for calling public functions that don't take any input parameters. It's otherwise\n    /// equivalent to `call_public_function`.\n    ///\n    /// # Arguments\n    /// * `contract_address` - Address of the contract containing the function\n    /// * `function_selector` - 4-byte identifier of the function to call\n    /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n    ///\n    pub fn call_public_function_no_args(\n        &mut self,\n        contract_address: AztecAddress,\n        function_selector: FunctionSelector,\n        hide_msg_sender: bool,\n    ) {\n        let calldata_hash = hash_calldata_array([function_selector.to_field()]);\n        self.call_public_function_with_calldata_hash(contract_address, calldata_hash, false, hide_msg_sender)\n    }\n\n    /// Enqueues a read-only call to a public function with no arguments.\n    ///\n    /// This combines the optimisation of `call_public_function_no_args` with the safety of\n    /// `static_call_public_function`.\n    ///\n    /// # Arguments\n    /// * `contract_address` - Address of the contract containing the function\n    /// * `function_selector` - 4-byte identifier of the function to call\n    /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n    ///\n    pub fn static_call_public_function_no_args(\n        &mut self,\n        contract_address: AztecAddress,\n        function_selector: FunctionSelector,\n        hide_msg_sender: bool,\n    ) {\n        let calldata_hash = hash_calldata_array([function_selector.to_field()]);\n        self.call_public_function_with_calldata_hash(contract_address, calldata_hash, true, hide_msg_sender)\n    }\n\n    /// Low-level public function call.\n    ///\n    /// This is the underlying implementation used by all other public function call methods. Instead of taking raw\n    /// arguments, it accepts a hash of the arguments.\n    ///\n    /// Advanced function: Most developers should use `call_public_function` or `static_call_public_function` instead.\n    /// This function is exposed for performance optimization and advanced use cases.\n    ///\n    /// # Arguments\n    /// * `contract_address` - Address of the contract containing the function\n    /// * `calldata_hash` - Hash of the function calldata\n    /// * `is_static_call` - Whether this should be a read-only call\n    /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n    ///\n    pub fn call_public_function_with_calldata_hash(\n        &mut self,\n        contract_address: AztecAddress,\n        calldata_hash: Field,\n        is_static_call: bool,\n        hide_msg_sender: bool,\n    ) {\n        let counter = self.next_counter();\n\n        let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n\n        assert_valid_public_call_data(calldata_hash);\n\n        let msg_sender = if hide_msg_sender {\n            NULL_MSG_SENDER_CONTRACT_ADDRESS\n        } else {\n            self.this_address()\n        };\n\n        let call_request = PublicCallRequest { msg_sender, contract_address, is_static_call, calldata_hash };\n\n        self.public_call_requests.push(Counted::new(call_request, counter));\n    }\n\n    /// Enqueues a public function call, and designates it to be the teardown function for this tx. Only one teardown\n    /// function call can be made by a tx.\n    ///\n    /// Niche function: Only wallet developers and paymaster contract developers (aka Fee-payment contracts) will need\n    /// to make use of this function.\n    ///\n    /// Aztec supports a three-phase execution model: setup, app logic, teardown. The phases exist to enable a fee\n    /// payer to take on the risk of paying a transaction fee, safe in the knowledge that their payment (in whatever\n    /// token or method the user chooses) will succeed, regardless of whether the app logic will succeed. The \"setup\"\n    /// phase ensures the fee payer has sufficient balance to pay the proposer their fees. The teardown phase is\n    /// primarily intended to: calculate exactly how much the user owes, based on gas consumption, and refund the user\n    /// any change.\n    ///\n    /// Note: in some cases, the cost of refunding the user (i.e. DA costs of tx side-effects) might exceed the refund\n    /// amount. For app logic with fairly stable and predictable gas consumption, a material refund amount is unlikely.\n    /// For app logic with unpredictable gas consumption, a refund might be important to the user (e.g. if a hefty\n    /// function reverts very early). Wallet/FPC/Paymaster developers should be mindful of this.\n    ///\n    /// # Arguments\n    /// * `contract_address` - Address of the contract containing the teardown function\n    /// * `function_selector` - 4-byte identifier of the function to call\n    /// * `args` - An array of fields to pass to the function.\n    /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n    pub fn set_public_teardown_function<let ArgsCount: u32>(\n        &mut self,\n        contract_address: AztecAddress,\n        function_selector: FunctionSelector,\n        args: [Field; ArgsCount],\n        hide_msg_sender: bool,\n    ) {\n        let calldata = [function_selector.to_field()].concat(args);\n        let calldata_hash = hash_calldata_array(calldata);\n        execution_cache::store(calldata, calldata_hash);\n        self.set_public_teardown_function_with_calldata_hash(contract_address, calldata_hash, false, hide_msg_sender)\n    }\n\n    /// Low-level function to set the public teardown function.\n    ///\n    /// This is the underlying implementation for setting the teardown function call that will execute at the end of\n    /// the transaction. Instead of taking raw arguments, it accepts a hash of the arguments.\n    ///\n    /// Advanced function: Most developers should use `set_public_teardown_function` instead.\n    ///\n    /// # Arguments\n    /// * `contract_address` - Address of the contract containing the teardown function\n    /// * `calldata_hash` - Hash of the function calldata\n    /// * `is_static_call` - Whether this should be a read-only call\n    /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n    ///\n    pub fn set_public_teardown_function_with_calldata_hash(\n        &mut self,\n        contract_address: AztecAddress,\n        calldata_hash: Field,\n        is_static_call: bool,\n        hide_msg_sender: bool,\n    ) {\n        let is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n\n        assert_valid_public_call_data(calldata_hash);\n\n        let msg_sender = if hide_msg_sender {\n            NULL_MSG_SENDER_CONTRACT_ADDRESS\n        } else {\n            self.this_address()\n        };\n\n        self.public_teardown_call_request =\n            PublicCallRequest { msg_sender, contract_address, is_static_call, calldata_hash };\n    }\n\n    /// Increments the side-effect counter.\n    ///\n    /// Very low-level function.\n    ///\n    /// # Advanced\n    ///\n    /// Every side-effect of a private function is given a \"side-effect counter\", based on when it is created. This\n    /// PrivateContext is in charge of assigning the counters.\n    ///\n    /// The reason we have side-effect counters is complicated. Consider this illustrative pseudocode of inter-contract\n    /// function calls:\n    /// ```\n    /// contract A {\n    ///    let x = 5; // pseudocode for storage var x.\n    ///    fn a1 {\n    ///        read x; // value: 5, counter: 1.\n    ///        x = x + 1;\n    ///        write x; // value: 6, counter: 2.\n    ///\n    ///        B.b(); // start_counter: 2, end_counter: 4\n    ///\n    ///        read x; // value: 36, counter: 5.\n    ///        x = x + 1;\n    ///        write x; // value: 37, counter: 6.\n    ///    }\n    ///\n    ///    fn a2 {\n    ///        read x; // value: 6, counter: 3.\n    ///        x = x * x;\n    ///        write x; // value: 36, counter: 4.\n    ///    }\n    /// }\n    ///\n    /// contract B {\n    ///     fn b() {\n    ///         A.a2();\n    ///     }\n    /// }\n    /// ```\n    ///\n    /// Suppose a1 is the first function called. The comments show the execution counter of each side-effect, and what\n    /// the new value of `x` is.\n    ///\n    /// These (private) functions are processed by Aztec's kernel circuits in an order that is different from execution\n    /// order: All of A.a1 is proven before B.b is proven, before A.a2 is proven. So when we're in the 2nd execution\n    /// frame of A.a1 (after the call to B.b), the circuit needs to justify why x went from being `6` to `36`. But the\n    /// circuit doesn't know why, and given the order of proving, the kernel hasn't _seen_ a value of 36 get written\n    /// yet. The kernel needs to track big arrays of all side-effects of all private functions in a tx. Then, as it\n    /// recurses and processes B.b(), it will eventually see a value of 36 get written.\n    ///\n    /// Suppose side-effect counters weren't exposed: The kernel would only see this ordering (in order of proof\n    /// verification): [ A.a1.read, A.a1.write, A.a1.read, A.a1.write, A.a2.read, A.a2.write ]\n    /// [         5,          6,        36,         37,         6,         36 ]\n    /// The kernel wouldn't know _when_ B.b() was called within A.a1(), because it can't see what's going on within an\n    /// app circuit. So the kernel wouldn't know that the ordering of reads and writes should actually be: [ A.a1.read,\n    /// A.a1.write, A.a2.read, A.a2.write, A.a1.read, A.a1.write ]\n    /// [         5,          6,        6,         36,         36,         37 ]\n    ///\n    /// And so, we introduced side-effect counters: every private function must assign side-effect counters alongside\n    /// every side-effect that it emits, and also expose to the kernel the counters that it started and ended with.\n    /// This gives the kernel enough information to arrange all side-effects in the correct order. It can then catch\n    /// (for example) if a function tries to read state before it has been written (e.g. if A.a2() maliciously tried to\n    /// read a value of x=37) (e.g. if A.a1() maliciously tried to read x=6).\n    ///\n    /// If a malicious app contract _lies_ and does not count correctly:\n    /// - It cannot lie about its start and end counters because the kernel will catch this.\n    /// - It _could_ lie about its intermediate counters:\n    /// - 1. It could not increment its side-effects correctly\n    /// - 2. It could label its side-effects with counters outside of its start and end counters' range. The kernel\n    /// will catch 2. The kernel will not catch 1., but this would only cause corruption to the private state of the\n    /// malicious contract, and not any other contracts (because a contract can only modify its own state). If a \"good\"\n    /// contract is given _read access_ to a maliciously-counting contract (via an external getter function, or by\n    /// reading historic state from the archive tree directly), and they then make state changes to their _own_ state\n    /// accordingly, that could be dangerous. Developers should be mindful not to trust the claimed innards of external\n    /// contracts unless they have audited/vetted the contracts including vetting the side-effect counter\n    /// incrementation. This is a similar paradigm to Ethereum smart contract development: you must vet external\n    /// contracts that your contract relies upon, and you must not make any presumptions about their claimed behaviour.\n    /// (Hopefully if a contract imports a version of aztec-nr, we will get contract verification tooling that can\n    /// validate the authenticity of the imported aztec-nr package, and hence infer that the side- effect counting will\n    /// be correct, without having to re-audit such logic for every contract).\n    ///\n    fn next_counter(&mut self) -> u32 {\n        let counter = self.side_effect_counter;\n        self.side_effect_counter += 1;\n        counter\n    }\n}\n\nimpl Empty for PrivateContext {\n    fn empty() -> Self {\n        PrivateContext {\n            inputs: PrivateContextInputs::empty(),\n            side_effect_counter: 0 as u32,\n            min_revertible_side_effect_counter: 0 as u32,\n            is_fee_payer: false,\n            args_hash: 0,\n            return_hash: 0,\n            expiration_timestamp: 0,\n            note_hash_read_requests: BoundedVec::new(),\n            nullifier_read_requests: BoundedVec::new(),\n            key_validation_requests_and_separators: BoundedVec::new(),\n            note_hashes: BoundedVec::new(),\n            nullifiers: BoundedVec::new(),\n            private_call_requests: BoundedVec::new(),\n            public_call_requests: BoundedVec::new(),\n            public_teardown_call_request: PublicCallRequest::empty(),\n            l2_to_l1_msgs: BoundedVec::new(),\n            anchor_block_header: BlockHeader::empty(),\n            private_logs: BoundedVec::new(),\n            contract_class_logs_hashes: BoundedVec::new(),\n            last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n            expected_non_revertible_side_effect_counter: 0,\n            expected_revertible_side_effect_counter: 0,\n        }\n    }\n}\n"
        },
        "86": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/context/public_context.nr",
            "source": "use crate::{\n    context::gas::GasOpts,\n    hash::{\n        compute_l1_to_l2_message_hash, compute_l1_to_l2_message_nullifier, compute_secret_hash,\n        compute_siloed_nullifier,\n    },\n    oracle::avm,\n};\nuse crate::protocol::{\n    abis::function_selector::FunctionSelector,\n    address::{AztecAddress, EthAddress},\n    constants::{MAX_U32_VALUE, NULL_MSG_SENDER_CONTRACT_ADDRESS},\n    traits::{Empty, FromField, Packable, Serialize, ToField},\n    utils::writer::Writer,\n};\n\n/// # PublicContext\n///\n/// The **main interface** between an #[external(\"public\")] function and the Aztec blockchain.\n///\n/// An instance of the PublicContext is initialized automatically at the outset of every public function, within the\n/// #[external(\"public\")] macro, so you'll never need to consciously instantiate this yourself.\n///\n/// The instance is always named `context`, and it will always be available within the body of every\n/// #[external(\"public\")] function in your smart contract.\n///\n/// Typical usage for a smart contract developer will be to call getter methods of the PublicContext.\n///\n/// _Pushing_ data and requests to the context is mostly handled within aztec-nr's own functions, so typically a smart\n/// contract developer won't need to call any setter methods directly.\n///\n/// ## Responsibilities\n/// - Exposes contextual data to a public function:\n/// - Data relating to how this public function was called:\n/// - msg_sender, this_address\n/// - Data relating to the current blockchain state:\n/// - timestamp, block_number, chain_id, version\n/// - Gas and fee information\n/// - Provides state access:\n/// - Read/write public storage (key-value mapping)\n/// - Check existence of notes and nullifiers (Some patterns use notes & nullifiers to store public (not private)\n/// information)\n///   - Enables consumption of L1->L2 messages.\n/// - Enables calls to other public smart contract functions:\n/// - Writes data to the blockchain:\n/// - Updates to public state variables\n/// - New public logs (for events)\n///   - New L2->L1 messages\n/// - New notes & nullifiers (E.g. pushing public info to notes/nullifiers, or for completing \"partial notes\")\n///\n/// ## Key Differences from Private Execution\n///\n/// Unlike private functions -- which are executed on the user's device and which can only reference historic state --\n/// public functions are executed by a block proposer and are executed \"live\" on the _current_ tip of the chain. This\n/// means public functions can:\n/// - Read and write _current_ public state\n/// - Immediately see the effects of earlier transactions in the same block\n///\n/// Also, public functions are executed within a zkVM (the \"AVM\"), so that they can _revert_ whilst still ensuring\n/// payment to the proposer and prover. (Private functions cannot revert: they either succeed, or they cannot be\n/// included).\n///\n/// ## Optimising Public Functions\n///\n/// Using the AVM to execute public functions means they compile down to \"AVM bytecode\" instead of the ACIR that\n/// private functions (standalone circuits) compile to. Therefore the approach to optimising a public function is\n/// fundamentally different from optimising a public function.\n///\npub struct PublicContext {\n    pub args_hash: Option<Field>,\n    pub compute_args_hash: fn() -> Field,\n}\n\nimpl Eq for PublicContext {\n    fn eq(self, other: Self) -> bool {\n        (self.args_hash == other.args_hash)\n        // Can't compare the function compute_args_hash\n    }\n}\n\nimpl PublicContext {\n    /// Creates a new PublicContext instance.\n    ///\n    /// Low-level function: This is called automatically by the #[external(\"public\")] macro, so you shouldn't need to\n    /// be called directly by smart contract developers.\n    ///\n    /// # Arguments\n    /// * `compute_args_hash` - Function to compute the args_hash\n    ///\n    /// # Returns\n    /// * A new PublicContext instance\n    ///\n    pub fn new(compute_args_hash: fn() -> Field) -> Self {\n        PublicContext { args_hash: Option::none(), compute_args_hash }\n    }\n\n    /// Emits a _public_ log that will be visible onchain to everyone.\n    ///\n    /// # Arguments\n    /// * `tag` - A tag placed at `fields[0]` of the emitted log. Nodes index logs by this value, allowing\n    /// clients to efficiently query for matching logs without scanning all of them.\n    /// * `log` - The data to log, must implement Serialize trait.\n    ///\n    /// ## Safety\n    ///\n    /// The `tag` should be domain-separated (e.g. via [`crate::protocol::hash::compute_log_tag`]) to prevent\n    /// collisions between logs from different sources. Without domain separation, two unrelated log types that\n    /// happen to share a raw tag value become indistinguishable. Prefer `self.emit(event)` for events, which\n    /// handles tagging automatically.\n    pub fn emit_public_log_unsafe<T>(_self: Self, tag: Field, log: T)\n    where\n        T: Serialize,\n    {\n        // We use a Writer to serialize the log directly after the tag, avoiding an extra O(n) copy that would\n        // result from serializing first and then prepending the tag.\n        let mut writer: Writer<1 + <T as Serialize>::N> = Writer::new();\n        writer.write(tag);\n        Serialize::stream_serialize(log, &mut writer);\n        // Safety: AVM opcodes are constrained by the AVM itself\n        unsafe { avm::emit_public_log(writer.finish().as_vector()) };\n    }\n\n    /// Checks if a given note hash exists in the note hash tree at a particular leaf_index.\n    ///\n    /// # Arguments\n    /// * `note_hash` - The note hash to check for existence\n    /// * `leaf_index` - The index where the note hash should be located\n    ///\n    /// # Returns\n    /// * `bool` - True if the note hash exists at the specified index\n    ///\n    pub fn note_hash_exists(_self: Self, note_hash: Field, leaf_index: u64) -> bool {\n        // Safety: AVM opcodes are constrained by the AVM itself\n        unsafe { avm::note_hash_exists(note_hash, leaf_index) } == 1\n    }\n\n    /// Checks if a specific L1-to-L2 message exists in the L1-to-L2 message tree at a particular leaf index.\n    ///\n    /// Common use cases include token bridging, cross-chain governance, and triggering L2 actions based on L1 events.\n    ///\n    /// This function should be called before attempting to consume an L1-to-L2 message.\n    ///\n    /// # Arguments\n    /// * `msg_hash` - Hash of the L1-to-L2 message to check\n    /// * `msg_leaf_index` - The index where the message should be located\n    ///\n    /// # Returns\n    /// * `bool` - True if the message exists at the specified index\n    ///\n    /// # Advanced\n    /// * Uses the AVM l1_to_l2_msg_exists opcode for tree lookup\n    /// * Messages are copied from L1 Inbox to L2 by block proposers\n    ///\n    pub fn l1_to_l2_msg_exists(_self: Self, msg_hash: Field, msg_leaf_index: Field) -> bool {\n        // Safety: AVM opcodes are constrained by the AVM itself TODO(alvaro): Make l1l2msg leaf index a u64 upstream\n        unsafe { avm::l1_to_l2_msg_exists(msg_hash, msg_leaf_index as u64) } == 1\n    }\n\n    /// Returns `true` if an `unsiloed_nullifier` has been emitted by `contract_address`.\n    ///\n    /// Note that unsiloed nullifiers are not the actual values stored in the nullifier tree: they are first siloed via\n    /// [`crate::hash::compute_siloed_nullifier`] with the emitting contract's address.\n    ///\n    /// ## Use Cases\n    ///\n    /// Nullifiers are typically used as a _privacy-preserving_ record of a one-time action, but they can also be used\n    /// to efficiently record _public_ one-time actions as well. This is cheaper than using public storage, and has the\n    /// added benefit of the nullifier being emittable from a private function.\n    ///\n    /// An example is to check whether a contract has been published: we emit a nullifier that is deterministic and\n    /// which has a _public_ preimage.\n    ///\n    /// ## Public vs Private\n    ///\n    /// In general, one should not attempt to prove nullifier non-existence in private, as that will not consider the\n    /// possibility of the nullifier having been emitted in any transaction between the anchor block and the inclusion\n    /// block. Private functions instead prove existence via\n    /// [`crate::context::PrivateContext::assert_nullifier_exists`]\n    /// and 'prove' non-existence by _emitting_ the nullifer, which would cause the transaction to fail if the\n    /// nullifier existed.\n    ///\n    /// This is not the case in public functions, which **do** have access to the tip of the blockchain and so can\n    /// reliably prove whether a nullifier exists or not.\n    ///\n    /// ## Safety\n    ///\n    /// While it is safe to rely on this function's return value to determine if a nullifier exists or not, it is often\n    /// **not** safe to infer additional information from that. In particular, it is **unsafe** to infer that the\n    /// existence of a nullifier emitted from a private function implies that all other side-effects of said private\n    /// execution have been completed, more concretely that any enqueued public calls have been executed.\n    ///\n    /// For example, if a function in contract `A` privately emits nullifier `X` and then enqueues public function `Y`,\n    /// then it is **unsafe** for a contract `B` to infer that `Y` has alredy executed simply because `X` exists.\n    ///\n    /// This is because **all** private transaction effects are committed _before_ enqueued public functions are run\n    /// (in\n    /// order to not reveal detailed timing information about the transaction), so it is possible to observe a\n    /// nullifier that was emitted alongside the enqueuing of a public call **before** said call has been completed.\n    ///\n    /// ## Cost\n    ///\n    /// This emits the `CHECKNULLIFIEREXISTS` opcode, which conceptually performs a merkle inclusion proof on the\n    /// nullifier tree (both when the nullifier exists and when it doesn't).\n    pub fn nullifier_exists_unsafe(_self: Self, unsiloed_nullifier: Field, contract_address: AztecAddress) -> bool {\n        let siloed_nullifier = compute_siloed_nullifier(contract_address, unsiloed_nullifier);\n        // Safety: AVM opcodes are constrained by the AVM itself\n        unsafe { avm::nullifier_exists(siloed_nullifier) } == 1\n    }\n\n    /// Consumes a message sent from Ethereum (L1) to Aztec (L2) -- effectively marking it as \"read\".\n    ///\n    /// Use this function if you only want the message to ever be \"referred to\" once. Once consumed using this method,\n    /// the message cannot be consumed again, because a nullifier is emitted. If your use case wants for the message to\n    /// be read unlimited times, then you can always read any historic message from the L1-to-L2 messages tree, using\n    /// the `l1_to_l2_msg_exists` method. Messages never technically get deleted from that tree.\n    ///\n    /// The message will first be inserted into an Aztec \"Inbox\" smart contract on L1. It will not be available for\n    /// consumption immediately. Messages get copied-over from the L1 Inbox to L2 by the next Proposer in batches. So\n    /// you will need to wait until the messages are copied before you can consume them.\n    ///\n    /// # Arguments\n    /// * `content` - The message content that was sent from L1\n    /// * `secret` - Secret value used for message privacy (if needed)\n    /// * `sender` - Ethereum address that sent the message\n    /// * `leaf_index` - Index of the message in the L1-to-L2 message tree\n    ///\n    /// # Advanced\n    /// * Validates message existence in the L1-to-L2 message tree\n    /// * Prevents double-consumption by emitting a nullifier\n    /// * Message hash is computed from all parameters + chain context\n    /// * Will revert if message doesn't exist or was already consumed\n    ///\n    pub fn consume_l1_to_l2_message(self: Self, content: Field, secret: Field, sender: EthAddress, leaf_index: Field) {\n        let secret_hash = compute_secret_hash(secret);\n        let message_hash = compute_l1_to_l2_message_hash(\n            sender,\n            self.chain_id(),\n            /*recipient=*/\n            self.this_address(),\n            self.version(),\n            content,\n            secret_hash,\n            leaf_index,\n        );\n        let nullifier = compute_l1_to_l2_message_nullifier(message_hash, secret);\n\n        assert(!self.nullifier_exists_unsafe(nullifier, self.this_address()), \"L1-to-L2 message is already nullified\");\n        assert(self.l1_to_l2_msg_exists(message_hash, leaf_index), \"Tried to consume nonexistent L1-to-L2 message\");\n\n        self.push_nullifier(nullifier);\n    }\n\n    /// Sends an \"L2 -> L1 message\" from this function (Aztec, L2) to a smart contract on Ethereum (L1). L1 contracts\n    /// which are designed to send/receive messages to/from Aztec are called \"Portal Contracts\".\n    ///\n    /// Common use cases include withdrawals, cross-chain asset transfers, and triggering L1 actions based on L2 state\n    /// changes.\n    ///\n    /// The message will be inserted into an Aztec \"Outbox\" contract on L1, when this transaction's block is proposed\n    /// to L1. Sending the message will not result in any immediate state changes in the target portal contract. The\n    /// message will need to be manually consumed from the Outbox through a separate Ethereum transaction: a user will\n    /// need to call a function of the portal contract -- a function specifically designed to make a call to the Outbox\n    /// to consume the message. The message will only be available for consumption once the _epoch_ proof has been\n    /// submitted. Given that there are multiple Aztec blocks within an epoch, it might take some time for this epoch\n    /// proof to be submitted -- especially if the block was near the start of an epoch.\n    ///\n    /// # Arguments\n    /// * `recipient` - Ethereum address that will receive the message\n    /// * `content` - Message content (32 bytes as a Field element)\n    ///\n    pub fn message_portal(_self: Self, recipient: EthAddress, content: Field) {\n        // Safety: AVM opcodes are constrained by the AVM itself\n        unsafe { avm::send_l2_to_l1_msg(recipient, content) };\n    }\n\n    /// Calls a public function on another contract.\n    ///\n    /// Will revert if the called function reverts or runs out of gas.\n    ///\n    /// # Arguments\n    /// * `contract_address` - Address of the contract to call\n    /// * `function_selector` - Function to call on the target contract\n    /// * `args` - Arguments to pass to the function\n    /// * `gas_opts` - An optional allocation of gas to the called function.\n    ///\n    /// # Returns\n    /// * `[Field]` - Return data from the called function\n    ///\n    pub unconstrained fn call_public_function<let N: u32>(\n        _self: Self,\n        contract_address: AztecAddress,\n        function_selector: FunctionSelector,\n        args: [Field; N],\n        gas_opts: GasOpts,\n    ) -> [Field] {\n        let calldata = [function_selector.to_field()].concat(args);\n\n        avm::call(\n            gas_opts.l2_gas.unwrap_or(MAX_U32_VALUE),\n            gas_opts.da_gas.unwrap_or(MAX_U32_VALUE),\n            contract_address,\n            calldata,\n        );\n        // Use success_copy to determine whether the call succeeded\n        let success = avm::success_copy();\n\n        let result_data = avm::returndata_copy(0, avm::returndata_size());\n        if !success {\n            // Rethrow the revert data.\n            avm::revert(result_data);\n        }\n        result_data\n    }\n\n    /// Makes a read-only call to a public function on another contract.\n    ///\n    /// This is similar to Solidity's `staticcall`. The called function cannot modify state or emit events. Any nested\n    /// calls are constrained to also be staticcalls.\n    ///\n    /// Useful for querying data from other contracts safely.\n    ///\n    /// Will revert if the called function reverts or runs out of gas.\n    ///\n    /// # Arguments\n    /// * `contract_address` - Address of the contract to call\n    /// * `function_selector` - Function to call on the target contract\n    /// * `args` - Array of arguments to pass to the called function\n    /// * `gas_opts` - An optional allocation of gas to the called function.\n    ///\n    /// # Returns\n    /// * `[Field]` - Return data from the called function\n    ///\n    pub unconstrained fn static_call_public_function<let N: u32>(\n        _self: Self,\n        contract_address: AztecAddress,\n        function_selector: FunctionSelector,\n        args: [Field; N],\n        gas_opts: GasOpts,\n    ) -> [Field] {\n        let calldata = [function_selector.to_field()].concat(args);\n\n        avm::call_static(\n            gas_opts.l2_gas.unwrap_or(MAX_U32_VALUE),\n            gas_opts.da_gas.unwrap_or(MAX_U32_VALUE),\n            contract_address,\n            calldata,\n        );\n        // Use success_copy to determine whether the call succeeded\n        let success = avm::success_copy();\n\n        let result_data = avm::returndata_copy(0, avm::returndata_size());\n        if !success {\n            // Rethrow the revert data.\n            avm::revert(result_data);\n        }\n        result_data\n    }\n\n    /// Adds a new note hash to the Aztec blockchain's global Note Hash Tree.\n    ///\n    /// Notes are ordinarily constructed and emitted by _private_ functions, to ensure that both the content of the\n    /// note, and the contract that emitted the note, stay private.\n    ///\n    /// There are however some useful patterns whereby a note needs to contain _public_ data. The ability to push a new\n    /// note_hash from a _public_ function means that notes can be injected with public data immediately -- as soon as\n    /// the public value is known. The slower alternative would be to submit a follow-up transaction so that a private\n    /// function can inject the data. Both are possible on Aztec.\n    ///\n    /// Search \"Partial Note\" for a very common pattern which enables a note to be \"partially\" populated with some data\n    /// in a _private_ function, and then later \"completed\" with some data in a public function.\n    ///\n    /// # Arguments\n    /// * `note_hash` - The hash of the note to add to the tree\n    ///\n    /// # Advanced\n    /// * The note hash will be siloed with the contract address by the protocol\n    ///\n    pub fn push_note_hash(_self: Self, note_hash: Field) {\n        // Safety: AVM opcodes are constrained by the AVM itself\n        unsafe { avm::emit_note_hash(note_hash) };\n    }\n\n    /// Creates a new [nullifier](crate::nullifier).\n    ///\n    /// While nullifiers are primarily intended as a _privacy-preserving_ record of a one-time action, they can also\n    /// be used to efficiently record _public_ one-time actions. This function allows creating nullifiers from public\n    /// contract functions, which behave just like those created from private functions.\n    ///\n    /// ## Safety\n    ///\n    /// This is a low-level function that must be used with great care to avoid subtle corruption of contract state.\n    ///\n    /// In particular, callers must ensure all nullifiers created by a contract are properly domain-separated, so that\n    /// unrelated components don't interfere with one another (e.g. a transaction nullifier accidentally marking a\n    /// variable as initialized). Note nullifiers should only be created via\n    /// [`crate::context::PrivateContext::push_nullifier_for_note_hash`].\n    ///\n    /// ## Advanced\n    ///\n    /// The raw `nullifier` is not what is inserted into the Aztec state tree: it will be first siloed by contract\n    /// address via [`crate::protocol::hash::compute_siloed_nullifier`] in order to prevent accidental or malicious\n    /// interference of nullifiers from different contracts.\n    pub fn push_nullifier(_self: Self, nullifier: Field) {\n        // Safety: AVM opcodes are constrained by the AVM itself\n        unsafe { avm::emit_nullifier(nullifier) };\n    }\n\n    /// Returns the address of the current contract being executed.\n    ///\n    /// This is equivalent to `address(this)` in Solidity (hence the name). Use this to identify the current contract's\n    /// address, commonly needed for access control or when interacting with other contracts.\n    ///\n    /// # Returns\n    /// * `AztecAddress` - The contract address of the current function being executed.\n    ///\n    pub fn this_address(_self: Self) -> AztecAddress {\n        // Safety: AVM opcodes are constrained by the AVM itself\n        unsafe {\n            avm::address()\n        }\n    }\n\n    /// Returns the contract address that initiated this function call.\n    ///\n    /// This is similar to `msg.sender` in Solidity (hence the name).\n    ///\n    /// Important Note: If the calling function is a _private_ function, then it had the option of hiding its address\n    /// when enqueuing this public function call. In such cases, this method will return `Option<AztecAddress>::none`.\n    /// If the calling function is a _public_ function, it will always return an `Option<AztecAddress>::some` (i.e. a\n    /// non-null value).\n    ///\n    /// # Returns\n    /// * `Option<AztecAddress>` - The address of the smart contract that called this function (be it an app contract\n    /// or a user's account contract).\n    ///\n    /// # Advanced\n    /// * Value is provided by the AVM sender opcode\n    /// * In nested calls, this is the immediate caller, not the original transaction sender\n    ///\n    pub fn maybe_msg_sender(_self: Self) -> Option<AztecAddress> {\n        // Safety: AVM opcodes are constrained by the AVM itself\n        let maybe_msg_sender = unsafe { avm::sender() };\n        if maybe_msg_sender == NULL_MSG_SENDER_CONTRACT_ADDRESS {\n            Option::none()\n        } else {\n            Option::some(maybe_msg_sender)\n        }\n    }\n\n    /// Returns the function selector of the currently-executing function.\n    ///\n    /// This is similar to `msg.sig` in Solidity, returning the first 4 bytes of the function signature.\n    ///\n    /// # Returns\n    /// * `FunctionSelector` - The 4-byte function identifier\n    ///\n    /// # Advanced\n    /// * Extracted from the first element of calldata\n    /// * Used internally for function dispatch in the AVM\n    ///\n    pub fn selector(_self: Self) -> FunctionSelector {\n        // The selector is the first element of the calldata when calling a public function through dispatch.\n        // Safety: AVM opcodes are constrained by the AVM itself.\n        let raw_selector: [Field; 1] = unsafe { avm::calldata_copy(0, 1) };\n        FunctionSelector::from_field(raw_selector[0])\n    }\n\n    /// Returns the hash of the arguments passed to the current function.\n    ///\n    /// Very low-level function: The #[external(\"public\")] macro uses this internally. Smart contract developers\n    /// typically won't need to access this directly as arguments are automatically made available.\n    ///\n    /// # Returns\n    /// * `Field` - Hash of the function arguments\n    ///\n    pub fn get_args_hash(mut self) -> Field {\n        if !self.args_hash.is_some() {\n            self.args_hash = Option::some((self.compute_args_hash)());\n        }\n\n        self.args_hash.unwrap_unchecked()\n    }\n\n    /// Returns the \"transaction fee\" for the current transaction. This is the final tx fee that will be deducted from\n    /// the fee_payer's \"fee-juice\" balance (in the protocol's Base Rollup circuit).\n    ///\n    /// # Returns\n    /// * `Field` - The actual, final cost of the transaction, taking into account: the actual gas used during the\n    /// setup and app-logic phases, and the fixed amount of gas that's been allocated by the user for the teardown\n    /// phase. I.e. effectiveL2FeePerGas * l2GasUsed + effectiveDAFeePerGas * daGasUsed\n    ///\n    /// This will return `0` during the \"setup\" and \"app-logic\" phases of tx execution (because the final tx fee is not\n    /// known at that time). This will only return a nonzero value during the \"teardown\" phase of execution, where the\n    /// final tx fee can actually be computed.\n    ///\n    /// Regardless of _when_ this function is called during the teardown phase, it will always return the same final tx\n    /// fee value. The teardown phase does not consume a variable amount of gas: it always consumes a pre-allocated\n    /// amount of gas, as specified by the user when they generate their tx.\n    ///\n    pub fn transaction_fee(_self: Self) -> Field {\n        // Safety: AVM opcodes are constrained by the AVM itself\n        unsafe {\n            avm::transaction_fee()\n        }\n    }\n\n    /// Returns the chain ID of the current network.\n    ///\n    /// This is similar to `block.chainid` in Solidity. Returns the unique identifier for the blockchain network this\n    /// transaction is executing on.\n    ///\n    /// Helps prevent cross-chain replay attacks. Useful if implementing multi-chain contract logic.\n    ///\n    /// # Returns\n    /// * `Field` - The chain ID as a field element\n    ///\n    pub fn chain_id(_self: Self) -> Field {\n        // Safety: AVM opcodes are constrained by the AVM itself\n        unsafe {\n            avm::chain_id()\n        }\n    }\n\n    /// Returns the Aztec protocol version that this transaction is executing under. Different versions may have\n    /// different rules, opcodes, or cryptographic primitives.\n    ///\n    /// This is similar to how Ethereum has different EVM versions.\n    ///\n    /// Useful for forward/backward compatibility checks\n    ///\n    /// Not to be confused with contract versions; this is the protocol version.\n    ///\n    /// # Returns\n    /// * `Field` - The protocol version as a field element\n    ///\n    pub fn version(_self: Self) -> Field {\n        // Safety: AVM opcodes are constrained by the AVM itself\n        unsafe {\n            avm::version()\n        }\n    }\n    /// Returns the current block number.\n    ///\n    /// This is similar to `block.number` in Solidity.\n    ///\n    /// Note: the current block number is only available within a public function (as opposed to a private function).\n    ///\n    /// Note: the time intervals between blocks should not be relied upon as being consistent:\n    /// - Timestamps of blocks fall within a range, rather than at exact regular intervals.\n    /// - Slots can be missed.\n    /// - Protocol upgrades can completely change the intervals between blocks (and indeed the current roadmap plans to\n    /// reduce the time between blocks, eventually). Use `context.timestamp()` for more-reliable time-based logic.\n    ///\n    /// # Returns\n    /// * `u32` - The current block number\n    ///\n    pub fn block_number(_self: Self) -> u32 {\n        // Safety: AVM opcodes are constrained by the AVM itself\n        unsafe {\n            avm::block_number()\n        }\n    }\n\n    /// Returns the timestamp of the current block.\n    ///\n    /// This is similar to `block.timestamp` in Solidity.\n    ///\n    /// All functions of all transactions in a block share the exact same timestamp (even though technically each\n    /// transaction is executed one-after-the-other).\n    ///\n    /// Important note: Timestamps of Aztec blocks are not at reliably-fixed intervals. The proposer of the block has\n    /// some flexibility to choose a timestamp which is in a valid _range_: Obviously the timestamp of this block must\n    /// be strictly greater than that of the previous block, and must must be less than the timestamp of whichever\n    /// ethereum block the aztec block is proposed to. Furthermore, if the timestamp is not deemed close enough to the\n    /// actual current time, the committee of validators will not attest to the block.\n    ///\n    /// # Returns\n    /// * `u64` - Unix timestamp in seconds\n    ///\n    pub fn timestamp(_self: Self) -> u64 {\n        // Safety: AVM opcodes are constrained by the AVM itself\n        unsafe {\n            avm::timestamp()\n        }\n    }\n\n    /// Returns the fee per unit of L2 gas for this transaction (aka the \"L2 gas price\"), as chosen by the user.\n    ///\n    /// L2 gas covers the cost of executing public functions and handling side-effects within the AVM.\n    ///\n    /// # Returns\n    /// * `u128` - Fee per unit of L2 gas\n    ///\n    /// Wallet developers should be mindful that the choice of gas price (which is publicly visible) can leak\n    /// information about the user, e.g.:\n    /// - which wallet software the user is using;\n    /// - the amount of time which has elapsed from the time the user's wallet chose a gas price (at the going rate),\n    /// to the time of tx submission. This can give clues about the proving time, and hence the nature of the tx.\n    /// - the urgency of the transaction (which is kind of unavoidable, if the tx is indeed urgent).\n    /// - the wealth of the user.\n    /// - the exact user (if the gas price is explicitly chosen by the user to be some unique number like 0.123456789,\n    /// or their favorite number). Wallet devs might wish to consider fuzzing the choice of gas price.\n    ///\n    pub fn min_fee_per_l2_gas(_self: Self) -> u128 {\n        // Safety: AVM opcodes are constrained by the AVM itself\n        unsafe {\n            avm::min_fee_per_l2_gas()\n        }\n    }\n\n    /// Returns the fee per unit of DA (Data Availability) gas (aka the \"DA gas price\").\n    ///\n    /// DA gas covers the cost of making transaction data available on L1.\n    ///\n    /// See the warning in `min_fee_per_l2_gas` for how gas prices can be leaky.\n    ///\n    /// # Returns\n    /// * `u128` - Fee per unit of DA gas\n    ///\n    pub fn min_fee_per_da_gas(_self: Self) -> u128 {\n        // Safety: AVM opcodes are constrained by the AVM itself\n        unsafe {\n            avm::min_fee_per_da_gas()\n        }\n    }\n\n    /// Returns the remaining L2 gas available for this transaction.\n    ///\n    /// Different AVM opcodes consume different amounts of gas.\n    ///\n    /// # Returns\n    /// * `u32` - Remaining L2 gas units\n    ///\n    pub fn l2_gas_left(_self: Self) -> u32 {\n        // Safety: AVM opcodes are constrained by the AVM itself\n        unsafe {\n            avm::l2_gas_left()\n        }\n    }\n\n    /// Returns the remaining DA (Data Availability) gas available for this transaction.\n    ///\n    /// DA gas is consumed when emitting data that needs to be made available on L1, such as public logs or state\n    /// updates. All of the side-effects from the private part of the tx also consume DA gas before execution of any\n    /// public functions even begins.\n    ///\n    /// # Returns\n    /// * `u32` - Remaining DA gas units\n    ///\n    pub fn da_gas_left(_self: Self) -> u32 {\n        // Safety: AVM opcodes are constrained by the AVM itself\n        unsafe {\n            avm::da_gas_left()\n        }\n    }\n\n    /// Checks if the current execution is within a staticcall context, where no state changes or logs are allowed to\n    /// be emitted (by this function or any nested function calls).\n    ///\n    /// # Returns\n    /// * `bool` - True if in staticcall context, false otherwise\n    ///\n    pub fn is_static_call(_self: Self) -> bool {\n        // Safety: AVM opcodes are constrained by the AVM itself\n        unsafe { avm::is_static_call() } == 1\n    }\n\n    /// Reads raw field values from public storage. Reads N consecutive storage slots starting from the given slot.\n    ///\n    /// Very low-level function. Users should typically use the public state variable abstractions to perform reads:\n    /// PublicMutable & PublicImmutable.\n    ///\n    /// # Arguments\n    /// * `storage_slot` - The starting storage slot to read from\n    ///\n    /// # Returns\n    /// * `[Field; N]` - Array of N field values from consecutive storage slots\n    ///\n    /// # Generic Parameters\n    /// * `N` - the number of consecutive slots to return, starting from the `storage_slot`.\n    ///\n    pub fn raw_storage_read<let N: u32>(self: Self, storage_slot: Field) -> [Field; N] {\n        let mut out = [0; N];\n        for i in 0..N {\n            // Safety: AVM opcodes are constrained by the AVM itself\n            out[i] = unsafe { avm::storage_read(storage_slot + i as Field, self.this_address().to_field()) };\n        }\n        out\n    }\n\n    /// Reads a typed value from public storage.\n    ///\n    /// Low-level function. Users should typically use the public state variable abstractions to perform reads:\n    /// PublicMutable & PublicImmutable.\n    ///\n    /// # Arguments\n    /// * `storage_slot` - The storage slot to read from\n    ///\n    /// # Returns\n    /// * `T` - The deserialized value from storage\n    ///\n    /// # Generic Parameters\n    /// * `T` - The type that the caller expects to read from the `storage_slot`.\n    ///\n    pub fn storage_read<T>(self, storage_slot: Field) -> T\n    where\n        T: Packable,\n    {\n        T::unpack(self.raw_storage_read(storage_slot))\n    }\n\n    /// Writes raw field values to public storage. Writes to N consecutive storage slots starting from the given slot.\n    ///\n    /// Very low-level function. Users should typically use the public state variable abstractions to perform writes:\n    /// PublicMutable & PublicImmutable.\n    ///\n    /// Public storage writes take effect immediately.\n    ///\n    /// # Arguments\n    /// * `storage_slot` - The starting storage slot to write to\n    /// * `values` - Array of N Fields to write to storage\n    ///\n    pub fn raw_storage_write<let N: u32>(_self: Self, storage_slot: Field, values: [Field; N]) {\n        for i in 0..N {\n            // Safety: AVM opcodes are constrained by the AVM itself\n            unsafe { avm::storage_write(storage_slot + i as Field, values[i]) };\n        }\n    }\n\n    /// Writes a typed value to public storage.\n    ///\n    /// Low-level function. Users should typically use the public state variable abstractions to perform writes:\n    /// PublicMutable & PublicImmutable.\n    ///\n    /// # Arguments\n    /// * `storage_slot` - The storage slot to write to\n    /// * `value` - The typed value to write to storage\n    ///\n    /// # Generic Parameters\n    /// * `T` - The type to write to storage.\n    ///\n    pub fn storage_write<T>(self, storage_slot: Field, value: T)\n    where\n        T: Packable,\n    {\n        self.raw_storage_write(storage_slot, value.pack());\n    }\n}\n\nimpl Empty for PublicContext {\n    fn empty() -> Self {\n        PublicContext::new(|| 0)\n    }\n}\n"
        },
        "87": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/context/returns_hash.nr",
            "source": "use crate::{hash::hash_args, oracle::execution_cache};\nuse crate::protocol::traits::Deserialize;\n\n/// The hash of a private contract function call's return value.\n///\n/// Use [`ReturnsHash::get_preimage`] to get the underlying value.\n///\n/// The kernels don't process the actual return values but instead their hashes, so it is up to contracts to populate\n/// oracles with the preimages of these hashes on return to make them available to their callers.\n///\n/// Public calls don't utilize this mechanism since the AVM does process the full return values.\npub struct ReturnsHash {\n    hash: Field,\n}\n\nimpl ReturnsHash {\n    pub fn new(hash: Field) -> Self {\n        ReturnsHash { hash }\n    }\n\n    /// Fetches the underlying return value from an oracle, constraining that it corresponds to the return data hash.\n    pub fn get_preimage<T>(self) -> T\n    where\n        T: Deserialize,\n    {\n        // Safety: We verify that the value returned by `load` is the preimage of `hash`, fully constraining it. If `T`\n        // is `()`, then `preimage` must be an array of length 0 (since that is `()`'s deserialization length).\n        // `hash_args` handles empty arrays following the protocol rules (i.e. an empty args array is signaled with a\n        // zero hash), correctly constraining `self.hash`.\n        let preimage = unsafe { execution_cache::load(self.hash) };\n        assert_eq(self.hash, hash_args(preimage), \"Preimage mismatch\");\n\n        Deserialize::deserialize(preimage)\n    }\n}\n\nmod test {\n    use crate::{\n        hash::hash_args,\n        oracle::execution_cache,\n        test::{helpers::test_environment::TestEnvironment, mocks::MockStruct},\n    };\n    use crate::protocol::traits::Serialize;\n    use super::ReturnsHash;\n    use std::test::OracleMock;\n\n    #[test]\n    unconstrained fn retrieves_preimage() {\n        let env = TestEnvironment::new();\n        env.private_context(|_| {\n            let value = MockStruct::new(4, 7);\n            let serialized = value.serialize();\n\n            let hash = hash_args(serialized);\n            execution_cache::store(serialized, hash);\n\n            assert_eq(ReturnsHash::new(hash).get_preimage(), value);\n        });\n    }\n\n    #[test]\n    unconstrained fn retrieves_empty_preimage() {\n        let env = TestEnvironment::new();\n        env.private_context(|_| {\n            let value = ();\n            let serialized = [];\n\n            let hash = hash_args(serialized);\n            execution_cache::store(serialized, hash);\n\n            assert_eq(ReturnsHash::new(hash).get_preimage(), value);\n        });\n    }\n\n    #[test(should_fail_with = \"Preimage mismatch\")]\n    unconstrained fn rejects_bad_preimage() {\n        let value = MockStruct::new(4, 7);\n        let serialized = value.serialize();\n\n        let mut bad_serialized = serialized;\n        bad_serialized[0] += 1;\n\n        let hash = hash_args(serialized);\n\n        let _ = OracleMock::mock(\"aztec_prv_getHashPreimage\").returns(bad_serialized);\n        assert_eq(ReturnsHash::new(hash).get_preimage(), value);\n    }\n}\n"
        },
        "88": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/context/utility_context.nr",
            "source": "use crate::oracle::{execution::get_utility_context, storage::storage_read};\nuse crate::protocol::{abis::block_header::BlockHeader, address::AztecAddress, traits::Packable};\n\n// If you'll modify this struct don't forget to update utility_context.ts as well.\npub struct UtilityContext {\n    block_header: BlockHeader,\n    contract_address: AztecAddress,\n}\n\nimpl UtilityContext {\n    pub unconstrained fn new() -> Self {\n        get_utility_context()\n    }\n\n    pub unconstrained fn at(contract_address: AztecAddress) -> Self {\n        // We get a context with default contract address, and then we construct the final context with the provided\n        // contract address.\n        let default_context = get_utility_context();\n\n        Self { block_header: default_context.block_header, contract_address }\n    }\n\n    pub fn block_header(self) -> BlockHeader {\n        self.block_header\n    }\n\n    pub fn block_number(self) -> u32 {\n        self.block_header.block_number()\n    }\n\n    pub fn timestamp(self) -> u64 {\n        self.block_header.timestamp()\n    }\n\n    pub fn this_address(self) -> AztecAddress {\n        self.contract_address\n    }\n\n    pub fn version(self) -> Field {\n        self.block_header.version()\n    }\n\n    pub fn chain_id(self) -> Field {\n        self.block_header.chain_id()\n    }\n\n    pub unconstrained fn raw_storage_read<let N: u32>(self: Self, storage_slot: Field) -> [Field; N] {\n        storage_read(self.block_header, self.this_address(), storage_slot)\n    }\n\n    pub unconstrained fn storage_read<T>(self, storage_slot: Field) -> T\n    where\n        T: Packable,\n    {\n        T::unpack(self.raw_storage_read(storage_slot))\n    }\n}\n"
        },
        "89": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/contract_self/contract_self_private.nr",
            "source": "//! The `self` contract value for private execution contexts.\n\nuse crate::{\n    context::{calls::{PrivateCall, PrivateStaticCall, PublicCall, PublicStaticCall}, PrivateContext},\n    event::{event_emission::emit_event_in_private, event_interface::EventInterface, EventMessage},\n};\nuse crate::protocol::{address::AztecAddress, traits::{Deserialize, Serialize}};\n\n/// Core interface for interacting with aztec-nr contract features in private execution contexts.\n///\n/// This struct is automatically injected into every [`external`](crate::macros::functions::external) and\n/// [`internal`](crate::macros::functions::internal) contract function marked with `\"private\"` by the Aztec macro\n/// system and is accessible through the `self` variable.\n///\n/// ## Usage in Contract Functions\n///\n/// Once injected, you can use `self` to:\n/// - Access storage: `self.storage.balances.at(owner).read()`\n/// - Call contracts: `self.call(Token::at(address).transfer(recipient, amount))`\n/// - Emit events: `self.emit(event).deliver_to(recipient, delivery_mode)`\n/// - Get the contract address: `self.address`\n/// - Get the caller: `self.msg_sender()`\n/// - Access low-level Aztec.nr APIs through the context: `self.context`\n///\n/// ## Example\n///\n/// ```noir\n/// #[external(\"private\")]\n/// fn withdraw(amount: u128, recipient: AztecAddress) {\n///     // Get the caller of this function\n///     let sender = self.msg_sender();\n///\n///     // Access storage\n///     let token = self.storage.donation_token.get_note().get_address();\n///\n///     // Call contracts\n///     self.call(Token::at(token).transfer(recipient, amount));\n/// }\n/// ```\n///\n/// ## Type Parameters\n///\n/// - `Storage`: The contract's storage struct (defined with [`storage`](crate::macros::storage::storage), or `()` if\n/// the contract has no storage\n/// - `CallSelf`: Macro-generated type for calling contract's own non-view functions\n/// - `EnqueueSelf`: Macro-generated type for enqueuing calls to the contract's own non-view functions\n/// - `CallSelfStatic`: Macro-generated type for calling contract's own view functions\n/// - `EnqueueSelfStatic`: Macro-generated type for enqueuing calls to the contract's own view functions\n/// - `CallInternal`: Macro-generated type for calling internal functions\npub struct ContractSelfPrivate<Storage, CallSelf, EnqueueSelf, CallSelfStatic, EnqueueSelfStatic, CallInternal> {\n    /// The address of this contract\n    pub address: AztecAddress,\n\n    /// The contract's storage instance, representing the struct to which the\n    /// [`storage`](crate::macros::storage::storage) macro was applied in your contract. If the contract has no\n    /// storage, the type of this will be `()`.\n    ///\n    /// This storage instance is specialized for the current execution context (private) and\n    /// provides access to the contract's state variables.\n    ///\n    /// ## Developer Note\n    ///\n    /// If you've arrived here while trying to access your contract's storage while the `Storage` generic type is set\n    /// to unit type `()`, it means you haven't yet defined a Storage struct using the\n    /// [`storage`](crate::macros::storage::storage) macro in your contract. For guidance on setting this up, please\n    /// refer to our docs: https://docs.aztec.network/developers/docs/guides/smart_contracts/storage\n    pub storage: Storage,\n\n    /// The private execution context.\n    pub context: &mut PrivateContext,\n\n    /// Provides type-safe methods for calling this contract's own non-view functions.\n    ///\n    /// Example API:\n    /// ```noir\n    /// self.call_self.some_private_function(args)\n    /// ```\n    pub call_self: CallSelf,\n\n    /// Provides type-safe methods for enqueuing calls to this contract's own non-view functions.\n    ///\n    /// Example API:\n    /// ```noir\n    /// self.enqueue_self.some_public_function(args)\n    /// ```\n    pub enqueue_self: EnqueueSelf,\n\n    /// Provides type-safe methods for calling this contract's own view functions.\n    ///\n    /// Example API:\n    /// ```noir\n    /// self.call_self_static.some_view_function(args)\n    /// ```\n    pub call_self_static: CallSelfStatic,\n\n    /// Provides type-safe methods for enqueuing calls to the contract's own view functions.\n    ///\n    /// Example API:\n    /// ```noir\n    /// self.enqueue_self_static.some_public_view_function(args)\n    /// ```\n    pub enqueue_self_static: EnqueueSelfStatic,\n\n    /// Provides type-safe methods for calling internal functions.\n    ///\n    /// Example API:\n    /// ```noir\n    /// self.internal.some_internal_function(args)\n    /// ```\n    pub internal: CallInternal,\n}\n\nimpl<Storage, CallSelf, EnqueueSelf, CallSelfStatic, EnqueueSelfStatic, CallInternal> ContractSelfPrivate<Storage, CallSelf, EnqueueSelf, CallSelfStatic, EnqueueSelfStatic, CallInternal> {\n    /// Creates a new `ContractSelfPrivate` instance for a private function.\n    ///\n    /// This constructor is called automatically by the macro system and should not be called directly.\n    pub fn new(\n        context: &mut PrivateContext,\n        storage: Storage,\n        call_self: CallSelf,\n        enqueue_self: EnqueueSelf,\n        call_self_static: CallSelfStatic,\n        enqueue_self_static: EnqueueSelfStatic,\n        internal: CallInternal,\n    ) -> Self {\n        Self {\n            context,\n            storage,\n            address: context.this_address(),\n            call_self,\n            enqueue_self,\n            call_self_static,\n            enqueue_self_static,\n            internal,\n        }\n    }\n\n    /// The address of the contract address that made this function call.\n    ///\n    /// This is similar to Solidity's `msg.sender` value.\n    ///\n    /// ## Transaction Entrypoints\n    ///\n    /// As there are no EOAs (externally owned accounts) in Aztec, unlike on Ethereum, the first contract function\n    /// executed in a transaction (i.e. transaction entrypoint) does **not** have a caller. This function panics when\n    /// executed in such a context.\n    ///\n    /// If you need to handle these cases, use [`PrivateContext::maybe_msg_sender`].\n    pub fn msg_sender(self) -> AztecAddress {\n        self.context.maybe_msg_sender().unwrap()\n    }\n\n    /// Emits an event privately.\n    ///\n    /// Unlike public events, private events do not reveal their contents publicly. They instead create an\n    /// [`EventMessage`] containing the private event information, which **MUST** be delivered to a recipient via\n    /// [`EventMessage::deliver_to`] in order for them to learn about the event. Multiple recipients can have the same\n    /// message be delivered to them.\n    ///\n    /// # Example\n    /// ```noir\n    /// #[event]\n    /// struct Transfer { from: AztecAddress, to: AztecAddress, amount: u128 }\n    ///\n    /// #[external(\"private\")]\n    /// fn transfer(to: AztecAddress, amount: u128) {\n    ///     let from = self.msg_sender();\n    ///\n    ///     let message: EventMessage = self.emit(Transfer { from, to, amount });\n    ///     message.deliver_to(from, MessageDelivery.OFFCHAIN);\n    ///     message.deliver_to(to, MessageDelivery.ONCHAIN_CONSTRAINED);\n    /// }\n    /// ```\n    ///\n    /// # Cost\n    ///\n    /// Private event emission always results in the creation of a nullifer, which acts as a commitment to the event\n    /// and is used by third parties to verify its authenticity. See [`EventMessage::deliver_to`] for the costs\n    /// associated to delivery.\n    ///\n    /// # Privacy\n    ///\n    /// The nullifier created when emitting a private event leaks nothing about the content of the event - it's a\n    /// commitment that includes a random value, so even with full knowledge of the event preimage determining if an\n    /// event was emitted or not requires brute-forcing the entire `Field` space.\n    pub fn emit<Event>(&mut self, event: Event) -> EventMessage<Event>\n    where\n        Event: EventInterface + Serialize,\n    {\n        emit_event_in_private(self.context, event)\n    }\n\n    /// Makes a private contract call.\n    ///\n    /// # Arguments\n    /// * `call` - The object representing the private function to invoke.\n    ///\n    /// # Returns\n    /// * `T` - Whatever data the called function has returned.\n    ///\n    /// # Example\n    /// ```noir\n    /// self.call(Token::at(address).transfer_in_private(recipient, amount));\n    /// ```\n    ///\n    /// This enables contracts to interact with each other while maintaining privacy. This \"composability\" of private\n    /// contract functions is a key feature of the Aztec network.\n    ///\n    /// If a user's transaction includes multiple private function calls, then by the design of Aztec, the following\n    /// information will remain private[1]:\n    /// - The function selectors and contract addresses of all private function calls will remain private, so an\n    /// observer of the public mempool will not be able to look at a tx and deduce which private functions have been\n    /// executed.\n    /// - The arguments and return values of all private function calls will remain private.\n    /// - The person who initiated the tx will remain private.\n    /// - The notes and nullifiers and private logs that are emitted by all private function calls will (if designed\n    /// well) not leak any user secrets, nor leak which functions have been executed.\n    ///\n    /// [1] Caveats: Some of these privacy guarantees depend on how app developers design their smart contracts. Some\n    /// actions _can_ leak information, such as:\n    /// - Calling an internal public function.\n    /// - Calling a public function and not setting msg_sender to Option::none (see\n    /// https://github.com/AztecProtocol/aztec-packages/pull/16433)\n    /// - Calling any public function will always leak details about the nature of the transaction, so devs should be\n    /// careful in their contract designs. If it can be done in a private function, then that will give the best\n    /// privacy.\n    /// - Not padding the side-effects of a tx to some standardized, uniform size. The kernel circuits can take hints\n    /// to pad side-effects, so a wallet should be able to request for a particular amount of padding. Wallets should\n    /// ideally agree on some standard.\n    /// - Padding should include:\n    /// - Padding the lengths of note & nullifier arrays\n    /// - Padding private logs with random fields, up to some standardized size. See also:\n    /// https://docs.aztec.network/developers/resources/considerations/privacy_considerations\n    ///\n    /// # Advanced\n    /// * The call is added to the private call stack and executed by kernel circuits after this function completes\n    /// * The called function can modify its own contract's private state\n    /// * Side effects from the called function are included in this transaction\n    /// * The call inherits the current transaction's context and gas limits\n    ///\n    pub fn call<let M: u32, let N: u32, T>(&mut self, call: PrivateCall<M, N, T>) -> T\n    where\n        T: Deserialize,\n    {\n        call.call(self.context)\n    }\n\n    /// Makes a read-only private contract call.\n    ///\n    /// This is similar to Solidity's `staticcall`. The called function cannot modify state, emit L2->L1 messages, nor\n    /// emit events. Any nested calls are constrained to also be static calls.\n    ///\n    /// # Arguments\n    /// * `call` - The object representing the read-only private function to invoke.\n    ///\n    /// # Returns\n    /// * `T` - Whatever data the called function has returned.\n    ///\n    /// # Example\n    /// ```noir\n    /// self.view(Token::at(address).balance_of_private(recipient));\n    /// ```\n    pub fn view<let M: u32, let N: u32, T>(&mut self, call: PrivateStaticCall<M, N, T>) -> T\n    where\n        T: Deserialize,\n    {\n        call.view(self.context)\n    }\n\n    /// Enqueues a public contract call function.\n    ///\n    /// Unlike private functions which execute immediately on the user's device, public function calls are \"enqueued\"\n    /// and executed some time later by a block proposer.\n    ///\n    /// This means a public function cannot return any values back to a private function, because by the time the\n    /// public function is being executed, the private function which called it has already completed execution. (In\n    /// fact, the private function has been executed and proven, along with all other private function calls of the\n    /// user's tx. A single proof of the tx has been submitted to the Aztec network, and some time later a proposer has\n    /// picked the tx up from the mempool and begun executing all of the enqueued public functions).\n    ///\n    /// # Privacy warning Enqueueing a public function call is an inherently leaky action. Many interesting applications will require some interaction with public state, but smart contract developers should try to use public function calls sparingly, and carefully. _Internal_ public function calls are especially leaky, because they completely leak which private contract made the call. See also: https://docs.aztec.network/developers/resources/considerations/privacy_considerations\n    ///\n    /// # Arguments\n    /// * `call` - The interface representing the public function to enqueue.\n    pub fn enqueue<let M: u32, let N: u32, T>(&mut self, call: PublicCall<M, N, T>) {\n        call.enqueue(self.context)\n    }\n\n    /// Enqueues a read-only public contract call function.\n    ///\n    /// This is similar to Solidity's `staticcall`. The called function cannot modify state, emit L2->L1 messages, nor\n    /// emit events. Any nested calls are constrained to also be static calls.\n    ///\n    /// # Arguments\n    /// * `call` - The object representing the read-only public function to enqueue.\n    ///\n    /// # Example\n    /// ```noir\n    /// self.enqueue_view(MyContract::at(address).assert_timestamp_less_than(timestamp));\n    /// ```\n    pub fn enqueue_view<let M: u32, let N: u32, T>(&mut self, call: PublicStaticCall<M, N, T>) {\n        call.enqueue_view(self.context)\n    }\n\n    /// Enqueues a privacy-preserving public contract call function.\n    ///\n    /// This is the same as [`ContractSelfPrivate::enqueue`], except it hides this calling contract's address from the\n    /// target public function (i.e. [`ContractSelfPrivate::msg_sender`] will panic).\n    ///\n    /// This means the origin of the call (msg_sender) will not be publicly visible to any blockchain observers, nor to\n    /// the target public function. If the target public function reads `self.msg_sender()` the call will revert.\n    ///\n    /// NOTES:\n    /// - Not all public functions will accept a msg_sender of \"none\". Many public functions will require that\n    /// msg_sender is \"some\" and will revert otherwise. Therefore, if using `enqueue_incognito`, you must understand\n    /// whether the function you're calling will accept a msg_sender of \"none\". Lots of public bookkeeping patterns\n    /// rely on knowing which address made the call, so as to ascribe state against the caller's address. (There are\n    /// patterns whereby bookkeeping could instead be done in private-land).\n    /// - If you are enqueueing a call to an _internal_ public function (i.e. a public function that will only accept\n    /// calls from other functions of its own contract), then by definition a call to it cannot possibly be\n    /// \"incognito\": the msg_sender must be its own address, and indeed the called public function will assert this.\n    /// Tl;dr this is not usable for enqueued internal public calls.\n    ///\n    /// # Arguments\n    /// * `call` - The object representing the public function to enqueue.\n    ///\n    /// # Example\n    /// ```noir\n    /// self.enqueue_incognito(Token::at(address).increase_total_supply_by(amount));\n    /// ```\n    ///\n    /// Advanced:\n    /// - The kernel circuits will permit _any_ private function to set the msg_sender field of any enqueued public\n    /// function call to NULL_MSG_SENDER_CONTRACT_ADDRESS.\n    /// - When the called public function calls `PublicContext::msg_sender()`, aztec-nr will translate\n    /// NULL_MSG_SENDER_CONTRACT_ADDRESS into `Option<AztecAddress>::none` for familiarity to devs.\n    ///\n    pub fn enqueue_incognito<let M: u32, let N: u32, T>(&mut self, call: PublicCall<M, N, T>) {\n        call.enqueue_incognito(self.context)\n    }\n\n    /// Enqueues a privacy-preserving read-only public contract call function.\n    ///\n    /// As per `enqueue_view`, but hides this calling contract's address from the target public function.\n    ///\n    /// See `enqueue_incognito` for more details relating to hiding msg_sender.\n    ///\n    /// # Arguments\n    /// * `call` - The object representing the read-only public function to enqueue.\n    ///\n    /// # Example\n    /// ```noir\n    /// self.enqueue_view_incognito(MyContract::at(address).assert_timestamp_less_than(timestamp));\n    /// ```\n    ///\n    pub fn enqueue_view_incognito<let M: u32, let N: u32, T>(&mut self, call: PublicStaticCall<M, N, T>) {\n        call.enqueue_view_incognito(self.context)\n    }\n\n    /// Enqueues a call to the public function defined by the `call` parameter, and designates it to be the teardown\n    /// function for this tx. Only one teardown function call can be made by a tx.\n    ///\n    /// Niche function: Only wallet developers and paymaster contract developers (aka Fee-payment contracts) will need\n    /// to make use of this function.\n    ///\n    /// Aztec supports a three-phase execution model: setup, app logic, teardown. The phases exist to enable a fee\n    /// payer to take on the risk of paying a transaction fee, safe in the knowledge that their payment (in whatever\n    /// token or method the user chooses) will succeed, regardless of whether the app logic will succeed. The \"setup\"\n    /// phase ensures the fee payer has sufficient balance to pay the proposer their fees. The teardown phase is\n    /// primarily intended to: calculate exactly how much the user owes, based on gas consumption, and refund the user\n    /// any change.\n    ///\n    /// Note: in some cases, the cost of refunding the user (i.e. DA costs of tx side-effects) might exceed the refund\n    /// amount. For app logic with fairly stable and predictable gas consumption, a material refund amount is unlikely.\n    /// For app logic with unpredictable gas consumption, a refund might be important to the user (e.g. if a hefty\n    /// function reverts very early). Wallet/FPC/Paymaster developers should be mindful of this.\n    ///\n    /// See `enqueue` for more information about enqueuing public function calls.\n    ///\n    /// # Arguments\n    /// * `call` - The object representing the public function to designate as teardown.\n    ///\n    pub fn set_as_teardown<let M: u32, let N: u32, T>(&mut self, call: PublicCall<M, N, T>) {\n        call.set_as_teardown(self.context)\n    }\n\n    /// Enqueues a call to the public function defined by the `call` parameter, and designates it to be the teardown\n    /// function for this tx. Only one teardown function call can be made by a tx.\n    ///\n    /// As per `set_as_teardown`, but hides this calling contract's address from the target public function.\n    ///\n    /// See `enqueue_incognito` for more details relating to hiding msg_sender.\n    ///\n    pub fn set_as_teardown_incognito<let M: u32, let N: u32, T>(&mut self, call: PublicCall<M, N, T>) {\n        call.set_as_teardown_incognito(self.context)\n    }\n}\n"
        },
        "90": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/contract_self/contract_self_public.nr",
            "source": "//! The `self` contract value for public execution contexts.\n\nuse crate::{\n    context::{calls::{PublicCall, PublicStaticCall}, PublicContext},\n    event::{event_emission::emit_event_in_public, event_interface::EventInterface},\n};\nuse crate::protocol::{address::AztecAddress, traits::{Deserialize, Serialize}};\n\n/// Core interface for interacting with aztec-nr contract features in public execution contexts.\n///\n/// This struct is automatically injected into every [`external`](crate::macros::functions::external) and\n/// [`internal`](crate::macros::functions::internal) contract function marked with `\"public\"` by the Aztec macro\n/// system and is accessible through the `self` variable.\n///\n/// ## Type Parameters\n///\n/// - `Storage`: The contract's storage struct (defined with [`storage`](crate::macros::storage::storage), or `()` if\n/// the contract has no storage\n/// - `CallSelf`: Macro-generated type for calling contract's own non-view functions\n/// - `CallSelfStatic`: Macro-generated type for calling contract's own view functions\n/// - `CallInternal`: Macro-generated type for calling internal functions\npub struct ContractSelfPublic<Storage, CallSelf, CallSelfStatic, CallInternal> {\n    /// The address of this contract\n    pub address: AztecAddress,\n\n    /// The contract's storage instance, representing the struct to which the\n    /// [`storage`](crate::macros::storage::storage) macro was applied in your contract. If the contract has no\n    /// storage, the type of this will be `()`.\n    ///\n    /// This storage instance is specialized for the current execution context (public) and\n    /// provides access to the contract's state variables.\n    ///\n    /// ## Developer Note\n    ///\n    /// If you've arrived here while trying to access your contract's storage while the `Storage` generic type is set\n    /// to unit type `()`, it means you haven't yet defined a Storage struct using the\n    /// [`storage`](crate::macros::storage::storage) macro in your contract. For guidance on setting this up, please\n    /// refer to our docs: https://docs.aztec.network/developers/docs/guides/smart_contracts/storage\n    pub storage: Storage,\n\n    /// The public execution context.\n    pub context: PublicContext,\n\n    /// Provides type-safe methods for calling this contract's own non-view functions.\n    ///\n    /// Example API:\n    /// ```noir\n    /// self.call_self.some_public_function(args)\n    /// ```\n    pub call_self: CallSelf,\n\n    /// Provides type-safe methods for calling this contract's own view functions.\n    ///\n    /// Example API:\n    /// ```noir\n    /// self.call_self_static.some_view_function(args)\n    /// ```\n    pub call_self_static: CallSelfStatic,\n\n    /// Provides type-safe methods for calling internal functions.\n    ///\n    /// Example API:\n    /// ```noir\n    /// self.internal.some_internal_function(args)\n    /// ```\n    pub internal: CallInternal,\n}\n\nimpl<Storage, CallSelf, CallSelfStatic, CallInternal> ContractSelfPublic<Storage, CallSelf, CallSelfStatic, CallInternal> {\n    /// Creates a new `ContractSelfPublic` instance for a public function.\n    ///\n    /// This constructor is called automatically by the macro system and should not be called directly.\n    pub fn new(\n        context: PublicContext,\n        storage: Storage,\n        call_self: CallSelf,\n        call_self_static: CallSelfStatic,\n        internal: CallInternal,\n    ) -> Self {\n        Self { context, storage, address: context.this_address(), call_self, call_self_static, internal }\n    }\n\n    /// The address of the contract address that made this function call.\n    ///\n    /// This is similar to Solidity's `msg.sender` value.\n    ///\n    /// ## Incognito Calls\n    ///\n    /// Contracts can call public functions from private ones hiding their identity (see\n    ///\n    /// [`ContractSelfPrivate::enqueue_incognito`](crate::contract_self::ContractSelfPrivate::enqueue_incognito)).\n    /// This function reverts when executed in such a context.\n    ///\n    /// If you need to handle these cases, use [`PublicContext::maybe_msg_sender`].\n    pub fn msg_sender(self: Self) -> AztecAddress {\n        self.context.maybe_msg_sender().unwrap()\n    }\n\n    /// Emits an event publicly.\n    ///\n    /// Public events are emitted as plaintext and are therefore visible to everyone. This is is the same as Solidity\n    /// events on EVM chains.\n    ///\n    /// Unlike private events, they don't require delivery of an event message.\n    ///\n    /// # Example\n    /// ```noir\n    /// #[event]\n    /// struct Update { value: Field }\n    ///\n    /// #[external(\"public\")]\n    /// fn publish_update(value: Field) {\n    ///     self.emit(Update { value });\n    /// }\n    /// ```\n    ///\n    /// # Cost\n    ///\n    /// Public event emission is achieved by emitting public transaction logs. A total of `N+1` fields are emitted,\n    /// where `N` is the serialization length of the event.\n    pub fn emit<Event>(&mut self, event: Event)\n    where\n        Event: EventInterface + Serialize,\n    {\n        emit_event_in_public(self.context, event);\n    }\n\n    /// Makes a public contract call.\n    ///\n    /// Will revert if the called function reverts or runs out of gas.\n    ///\n    /// # Arguments\n    /// * `call` - The object representing the public function to invoke.\n    ///\n    /// # Returns\n    /// * `T` - Whatever data the called function has returned.\n    ///\n    /// # Example\n    /// ```noir\n    /// self.call(Token::at(address).transfer_in_public(recipient, amount));\n    /// ```\n    ///\n    pub unconstrained fn call<let M: u32, let N: u32, T>(self, call: PublicCall<M, N, T>) -> T\n    where\n        T: Deserialize,\n    {\n        call.call(self.context)\n    }\n\n    /// Makes a public read-only contract call.\n    ///\n    /// This is similar to Solidity's `staticcall`. The called function cannot modify state or emit events. Any nested\n    /// calls are constrained to also be static calls.\n    ///\n    /// Will revert if the called function reverts or runs out of gas.\n    ///\n    /// # Arguments\n    /// * `call` - The object representing the read-only public function to invoke.\n    ///\n    /// # Returns\n    /// * `T` - Whatever data the called function has returned.\n    ///\n    /// # Example\n    /// ```noir\n    /// self.view(Token::at(address).balance_of_public(recipient));\n    /// ```\n    ///\n    pub unconstrained fn view<let M: u32, let N: u32, T>(self, call: PublicStaticCall<M, N, T>) -> T\n    where\n        T: Deserialize,\n    {\n        call.view(self.context)\n    }\n}\n"
        },
        "94": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/event/event_interface.nr",
            "source": "use crate::{event::EventSelector, messages::logs::event::MAX_EVENT_SERIALIZED_LEN};\nuse crate::protocol::{\n    constants::DOM_SEP__EVENT_COMMITMENT,\n    hash::{poseidon2_hash_with_separator, poseidon2_hash_with_separator_bounded_vec},\n    traits::{Serialize, ToField},\n};\n\npub trait EventInterface {\n    fn get_event_type_id() -> EventSelector;\n}\n\n/// A private event's commitment is a value stored on-chain which is used to verify that the event was indeed emitted.\n///\n/// It requires a `randomness` value that must be produced alongside the event in order to perform said validation.\n/// This random value prevents attacks in which someone guesses plausible events (e.g. 'Alice transfers to Bob an\n/// amount of 10'), since they will not be able to test for existence of their guessed events without brute-forcing the\n/// entire `Field` space by guessing `randomness` values.\npub fn compute_private_event_commitment<Event>(event: Event, randomness: Field) -> Field\nwhere\n    Event: EventInterface + Serialize,\n{\n    poseidon2_hash_with_separator(\n        [randomness, Event::get_event_type_id().to_field()].concat(event.serialize()),\n        DOM_SEP__EVENT_COMMITMENT,\n    )\n}\n\n/// Unconstrained variant of [`compute_private_event_commitment`] which takes the event in serialized form.\n///\n/// This function is unconstrained as the mechanism it uses to compute the commitment would be very inefficient in a\n/// constrained environment (due to the hashing of a dynamically sized array). This is not an issue as it is typically\n/// invoked when processing event messages, which is an unconstrained operation.\npub unconstrained fn compute_private_serialized_event_commitment(\n    serialized_event: BoundedVec<Field, MAX_EVENT_SERIALIZED_LEN>,\n    randomness: Field,\n    event_type_id: Field,\n) -> Field {\n    let mut commitment_preimage =\n        BoundedVec::<_, 2 + MAX_EVENT_SERIALIZED_LEN>::from_array([randomness, event_type_id]);\n    commitment_preimage.extend_from_bounded_vec(serialized_event);\n\n    poseidon2_hash_with_separator_bounded_vec(commitment_preimage, DOM_SEP__EVENT_COMMITMENT)\n}\n\nmod test {\n    use crate::event::event_interface::{\n        compute_private_event_commitment, compute_private_serialized_event_commitment, EventInterface,\n    };\n    use crate::messages::logs::event::MAX_EVENT_SERIALIZED_LEN;\n    use crate::protocol::traits::{Serialize, ToField};\n    use crate::test::mocks::mock_event::MockEvent;\n\n    global VALUE: Field = 7;\n    global RANDOMNESS: Field = 10;\n\n    #[test]\n    unconstrained fn max_size_serialized_event_commitment() {\n        let serialized_event = BoundedVec::from_array([0; MAX_EVENT_SERIALIZED_LEN]);\n        let _ = compute_private_serialized_event_commitment(serialized_event, 0, 0);\n    }\n\n    #[test]\n    unconstrained fn event_commitment_equivalence() {\n        let event = MockEvent::new(VALUE).build_event();\n\n        assert_eq(\n            compute_private_event_commitment(event, RANDOMNESS),\n            compute_private_serialized_event_commitment(\n                BoundedVec::from_array(event.serialize()),\n                RANDOMNESS,\n                MockEvent::get_event_type_id().to_field(),\n            ),\n        );\n    }\n}\n"
        },
        "96": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/event/event_selector.nr",
            "source": "use crate::protocol::{hash::poseidon2_hash_bytes, traits::{Deserialize, Empty, FromField, Serialize, ToField}};\n\n#[derive(Deserialize, Eq, Serialize)]\npub struct EventSelector {\n    // 1st 4-bytes (big-endian leftmost) of abi-encoding of an event.\n    inner: u32,\n}\n\nimpl FromField for EventSelector {\n    fn from_field(field: Field) -> Self {\n        Self { inner: field as u32 }\n    }\n}\n\nimpl ToField for EventSelector {\n    fn to_field(self) -> Field {\n        self.inner as Field\n    }\n}\n\nimpl Empty for EventSelector {\n    fn empty() -> Self {\n        Self { inner: 0 as u32 }\n    }\n}\n\nimpl EventSelector {\n    pub fn from_u32(value: u32) -> Self {\n        Self { inner: value }\n    }\n\n    pub fn from_signature<let N: u32>(signature: str<N>) -> Self {\n        let bytes = signature.as_bytes();\n        let hash = poseidon2_hash_bytes(bytes);\n\n        // `hash` is automatically truncated to fit within 32 bits.\n        EventSelector::from_field(hash)\n    }\n\n    pub fn zero() -> Self {\n        Self { inner: 0 }\n    }\n}\n"
        },
        "98": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/hash.nr",
            "source": "//! Aztec hash functions.\n\nuse crate::protocol::{\n    address::{AztecAddress, EthAddress},\n    constants::{\n        DOM_SEP__FUNCTION_ARGS, DOM_SEP__MESSAGE_NULLIFIER, DOM_SEP__PUBLIC_BYTECODE, DOM_SEP__PUBLIC_CALLDATA,\n        DOM_SEP__SECRET_HASH, MAX_PACKED_PUBLIC_BYTECODE_SIZE_IN_FIELDS,\n    },\n    hash::{poseidon2_hash_subarray, poseidon2_hash_with_separator, sha256_to_field},\n    traits::ToField,\n};\n\npub use crate::protocol::hash::compute_siloed_nullifier;\n\npub fn compute_secret_hash(secret: Field) -> Field {\n    poseidon2_hash_with_separator([secret], DOM_SEP__SECRET_HASH)\n}\n\npub fn compute_l1_to_l2_message_hash(\n    sender: EthAddress,\n    chain_id: Field,\n    recipient: AztecAddress,\n    version: Field,\n    content: Field,\n    secret_hash: Field,\n    leaf_index: Field,\n) -> Field {\n    let mut hash_bytes = [0 as u8; 224];\n    let sender_bytes: [u8; 32] = sender.to_field().to_be_bytes();\n    let chain_id_bytes: [u8; 32] = chain_id.to_be_bytes();\n    let recipient_bytes: [u8; 32] = recipient.to_field().to_be_bytes();\n    let version_bytes: [u8; 32] = version.to_be_bytes();\n    let content_bytes: [u8; 32] = content.to_be_bytes();\n    let secret_hash_bytes: [u8; 32] = secret_hash.to_be_bytes();\n    let leaf_index_bytes: [u8; 32] = leaf_index.to_be_bytes();\n\n    for i in 0..32 {\n        hash_bytes[i] = sender_bytes[i];\n        hash_bytes[i + 32] = chain_id_bytes[i];\n        hash_bytes[i + 64] = recipient_bytes[i];\n        hash_bytes[i + 96] = version_bytes[i];\n        hash_bytes[i + 128] = content_bytes[i];\n        hash_bytes[i + 160] = secret_hash_bytes[i];\n        hash_bytes[i + 192] = leaf_index_bytes[i];\n    }\n\n    sha256_to_field(hash_bytes)\n}\n\n// The nullifier of a l1 to l2 message is the hash of the message salted with the secret\npub fn compute_l1_to_l2_message_nullifier(message_hash: Field, secret: Field) -> Field {\n    poseidon2_hash_with_separator([message_hash, secret], DOM_SEP__MESSAGE_NULLIFIER)\n}\n\n// Computes the hash of input arguments or return values for private functions, or for authwit creation.\npub fn hash_args<let N: u32>(args: [Field; N]) -> Field {\n    if args.len() == 0 {\n        0\n    } else {\n        poseidon2_hash_with_separator(args, DOM_SEP__FUNCTION_ARGS)\n    }\n}\n\n// Computes the hash of calldata for public functions.\npub fn hash_calldata_array<let N: u32>(calldata: [Field; N]) -> Field {\n    poseidon2_hash_with_separator(calldata, DOM_SEP__PUBLIC_CALLDATA)\n}\n\n/// Computes the public bytecode commitment for a contract class. The commitment is `hash([(length | separator),\n/// ...bytecode])`.\n///\n/// @param packed_bytecode - The packed bytecode of the contract class. 0th word is the length in bytes.\n/// packed_bytecode is mutable so that we can avoid copying the array to construct one starting with first_field\n/// instead of length. @returns The public bytecode commitment.\npub fn compute_public_bytecode_commitment(\n    mut packed_public_bytecode: [Field; MAX_PACKED_PUBLIC_BYTECODE_SIZE_IN_FIELDS],\n) -> Field {\n    // First field element contains the length of the bytecode\n    let bytecode_length_in_bytes: u32 = packed_public_bytecode[0] as u32;\n    let bytecode_length_in_fields: u32 = (bytecode_length_in_bytes / 31) + (bytecode_length_in_bytes % 31 != 0) as u32;\n    // Don't allow empty public bytecode. AVM doesn't handle execution of contracts that exist with empty bytecode.\n    assert(bytecode_length_in_fields != 0);\n    assert(bytecode_length_in_fields < MAX_PACKED_PUBLIC_BYTECODE_SIZE_IN_FIELDS);\n\n    // Packed_bytecode's 0th entry is the length. Append it to the separator before hashing.\n    let first_field = DOM_SEP__PUBLIC_BYTECODE.to_field() + (packed_public_bytecode[0] as u64 << 32) as Field;\n    packed_public_bytecode[0] = first_field;\n\n    // `fields_to_hash` is the number of fields from the start of `packed_public_bytecode` that should be included in\n    // the hash. Fields after this length are ignored. +1 to account for the prepended field.\n    let num_fields_to_hash = bytecode_length_in_fields + 1;\n\n    poseidon2_hash_subarray(packed_public_bytecode, num_fields_to_hash)\n}\n\n#[test]\nunconstrained fn secret_hash_matches_typescript() {\n    let secret = 8;\n    let hash = compute_secret_hash(secret);\n\n    // The following value was generated by `yarn-project/stdlib/src/hash/hash.test.ts`\n    let secret_hash_from_ts = 0x1848b066724ab0ffb50ecb0ee3398eb839f162823d262bad959721a9c13d1e96;\n\n    assert_eq(hash, secret_hash_from_ts);\n}\n\n#[test]\nunconstrained fn var_args_hash_matches_typescript() {\n    let mut input = [0; 100];\n    for i in 0..100 {\n        input[i] = i as Field;\n    }\n    let hash = hash_args(input);\n\n    // The following value was generated by `yarn-project/stdlib/src/hash/hash.test.ts`\n    let var_args_hash_from_ts = 0x262e5e121a8efc0382566ab42f0ae2a78bd85db88484f83018fe07fc2552ba0c;\n\n    assert_eq(hash, var_args_hash_from_ts);\n}\n\n#[test]\nunconstrained fn compute_calldata_hash() {\n    let mut input = [0; 100];\n    for i in 0..input.len() {\n        input[i] = i as Field;\n    }\n    let hash = hash_calldata_array(input);\n\n    // The following value was generated by `yarn-project/stdlib/src/hash/hash.test.ts`\n    let calldata_hash_from_ts = 0x14a1539bdb1d26e03097cf4d40c87e02ca03f0bb50a3e617ace5a7bfd3943944;\n\n    // Used in cpp vm2 tests:\n    assert_eq(hash, calldata_hash_from_ts);\n}\n\n#[test]\nunconstrained fn public_bytecode_commitment() {\n    let mut input = [0; MAX_PACKED_PUBLIC_BYTECODE_SIZE_IN_FIELDS];\n    let len = 99;\n    for i in 1..len + 1 {\n        input[i] = i as Field;\n    }\n    input[0] = (len as Field) * 31;\n    let hash = compute_public_bytecode_commitment(input);\n    // Used in cpp vm2 tests:\n    assert_eq(hash, 0x09348974e76c3602893d7a4b4bb52c2ec746f1ade5004ac471d0fbb4587a81a6);\n}\n"
        },
        "109": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/keys/ecdh_shared_secret.nr",
            "source": "use crate::protocol::{\n    address::aztec_address::AztecAddress,\n    constants::{DOM_SEP__APP_SILOED_ECDH_SHARED_SECRET, DOM_SEP__ECDH_FIELD_MASK, DOM_SEP__ECDH_SUBKEY},\n    hash::poseidon2_hash_with_separator,\n    point::Point,\n    scalar::Scalar,\n    traits::{FromField, ToField},\n};\nuse std::{embedded_curve_ops::multi_scalar_mul, ops::Neg};\n\n/// Computes a standard ECDH shared secret: secret * public_key = shared_secret.\n///\n/// The input secret is known only to one party. The output shared secret can be derived given knowledge of\n/// `public_key`'s key-pair and the public ephemeral secret, using this same function (with reversed inputs).\n///\n/// E.g.: Epk = esk * G // ephemeral key-pair\n///       Pk = sk * G // recipient key-pair\n///       Shared secret S = esk * Pk = sk * Epk\n///\n/// See also: https://en.wikipedia.org/wiki/Elliptic-curve_Diffie%E2%80%93Hellman\npub fn derive_ecdh_shared_secret(secret: Scalar, public_key: Point) -> Point {\n    multi_scalar_mul([public_key], [secret])\n}\n\n/// Computes an app-siloed shared secret from a raw ECDH shared secret point and a contract address.\n///\n/// `s_app = h(DOM_SEP__APP_SILOED_ECDH_SHARED_SECRET, S.x, S.y, contract_address)`\npub(crate) fn compute_app_siloed_shared_secret(shared_secret: Point, contract_address: AztecAddress) -> Field {\n    poseidon2_hash_with_separator(\n        [shared_secret.x, shared_secret.y, contract_address.to_field()],\n        DOM_SEP__APP_SILOED_ECDH_SHARED_SECRET,\n    )\n}\n\n/// Derives an indexed subkey from an app-siloed shared secret, used for AES key/IV derivation.\n///\n/// `s_i = h(DOM_SEP__ECDH_SUBKEY + i, s_app)`\npub(crate) fn derive_shared_secret_subkey(s_app: Field, index: u32) -> Field {\n    poseidon2_hash_with_separator([s_app], DOM_SEP__ECDH_SUBKEY + index)\n}\n\n/// Derives an indexed field mask from an app-siloed shared secret, used for masking ciphertext fields.\n///\n/// `m_i = h(DOM_SEP__ECDH_FIELD_MASK + i, s_app)`\npub(crate) fn derive_shared_secret_field_mask(s_app: Field, index: u32) -> Field {\n    poseidon2_hash_with_separator([s_app], DOM_SEP__ECDH_FIELD_MASK + index)\n}\n\n#[test]\nunconstrained fn test_consistency_with_typescript() {\n    let secret = Scalar {\n        lo: 0x00000000000000000000000000000000649e7ca01d9de27b21624098b897babd,\n        hi: 0x0000000000000000000000000000000023b3127c127b1f29a7adff5cccf8fb06,\n    };\n    let point = Point {\n        x: 0x2688431c705a5ff3e6c6f2573c9e3ba1c1026d2251d0dbbf2d810aa53fd1d186,\n        y: 0x1e96887b117afca01c00468264f4f80b5bb16d94c1808a448595f115556e5c8e,\n        is_infinite: false,\n    };\n\n    let shared_secret = derive_ecdh_shared_secret(secret, point);\n\n    // This is just pasted from a test run. The original typescript code from which this could be generated seems to\n    // have been deleted by someone, and soon the typescript code for encryption and decryption won't be needed, so\n    // this will have to do.\n    let hard_coded_shared_secret = Point {\n        x: 0x15d55a5b3b2caa6a6207f313f05c5113deba5da9927d6421bcaa164822b911bc,\n        y: 0x0974c3d0825031ae933243d653ebb1a0b08b90ee7f228f94c5c74739ea3c871e,\n        is_infinite: false,\n    };\n    assert_eq(shared_secret, hard_coded_shared_secret);\n}\n\n#[test]\nunconstrained fn test_shared_secret_computation_in_both_directions() {\n    let secret_a = Scalar { lo: 0x1234, hi: 0x2345 };\n    let secret_b = Scalar { lo: 0x3456, hi: 0x4567 };\n\n    let pk_a = std::embedded_curve_ops::fixed_base_scalar_mul(secret_a);\n    let pk_b = std::embedded_curve_ops::fixed_base_scalar_mul(secret_b);\n\n    let shared_secret = derive_ecdh_shared_secret(secret_a, pk_b);\n    let shared_secret_alt = derive_ecdh_shared_secret(secret_b, pk_a);\n\n    assert_eq(shared_secret, shared_secret_alt);\n}\n\n#[test]\nunconstrained fn test_shared_secret_computation_from_address_in_both_directions() {\n    let secret_a = Scalar { lo: 0x1234, hi: 0x2345 };\n    let secret_b = Scalar { lo: 0x3456, hi: 0x4567 };\n\n    let mut pk_a = std::embedded_curve_ops::fixed_base_scalar_mul(secret_a);\n    let mut pk_b = std::embedded_curve_ops::fixed_base_scalar_mul(secret_b);\n\n    let address_b = AztecAddress::from_field(pk_b.x);\n\n    // We were lazy in deriving the secret keys, and didn't check the resulting y-coordinates of the pk_a or pk_b to be\n    // less than half the field modulus. If needed, we negate the pk's so that they yield valid address points. (We\n    // could also have negated the secrets, but there's no negate method for EmbeddedCurvesScalar).\n    pk_a = if (AztecAddress::from_field(pk_a.x).to_address_point().unwrap().inner == pk_a) {\n        pk_a\n    } else {\n        pk_a.neg()\n    };\n    pk_b = if (address_b.to_address_point().unwrap().inner == pk_b) {\n        pk_b\n    } else {\n        pk_b.neg()\n    };\n\n    let shared_secret = derive_ecdh_shared_secret(secret_a, address_b.to_address_point().unwrap().inner);\n    let shared_secret_alt = derive_ecdh_shared_secret(secret_b, pk_a);\n\n    assert_eq(shared_secret, shared_secret_alt);\n}\n\n#[test]\nunconstrained fn test_app_siloed_shared_secret_differs_per_contract() {\n    let secret_a = Scalar { lo: 0x1234, hi: 0x2345 };\n    let pk_b = std::embedded_curve_ops::fixed_base_scalar_mul(Scalar { lo: 0x3456, hi: 0x4567 });\n\n    let shared_secret = derive_ecdh_shared_secret(secret_a, pk_b);\n\n    let contract_a = AztecAddress::from_field(0xAAAA);\n    let contract_b = AztecAddress::from_field(0xBBBB);\n\n    let s_app_a = compute_app_siloed_shared_secret(shared_secret, contract_a);\n    let s_app_b = compute_app_siloed_shared_secret(shared_secret, contract_b);\n\n    assert(s_app_a != s_app_b, \"app-siloed secrets must differ for different contracts\");\n}\n"
        },
        "111": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/keys/getters/mod.nr",
            "source": "use crate::{\n    keys::constants::{NULLIFIER_INDEX, OUTGOING_INDEX},\n    oracle::{\n        key_validation_request::get_key_validation_request,\n        keys::{get_public_keys_and_partial_address, try_get_public_keys_and_partial_address},\n    },\n};\nuse crate::protocol::{address::AztecAddress, public_keys::PublicKeys};\n\npub unconstrained fn get_nhk_app(npk_m_hash: Field) -> Field {\n    get_key_validation_request(npk_m_hash, NULLIFIER_INDEX).sk_app\n}\n\n// A helper function that gets app-siloed outgoing viewing key for a given `ovpk_m_hash`. This function is used in\n// unconstrained contexts only - when computing unconstrained note logs. The safe alternative is `request_ovsk_app`\n// function defined on `PrivateContext`.\npub unconstrained fn get_ovsk_app(ovpk_m_hash: Field) -> Field {\n    get_key_validation_request(ovpk_m_hash, OUTGOING_INDEX).sk_app\n}\n\n// Returns all public keys for a given account, applying proper constraints to the context. We read all keys at once\n// since the constraints for reading them all are actually fewer than if we read them one at a time - any read keys\n// that are not required by the caller can simply be discarded.\n// Fails if the public keys are not registered\npub fn get_public_keys(account: AztecAddress) -> PublicKeys {\n    // Safety: Public keys are constrained by showing their inclusion in the address's preimage.\n    let (public_keys, partial_address) = unsafe { get_public_keys_and_partial_address(account) };\n    assert_eq(account, AztecAddress::compute(public_keys, partial_address), \"Invalid public keys hint for address\");\n\n    public_keys\n}\n\n/// Returns all public keys for a given account, or `None` if the public keys are not registered in the PXE.\npub unconstrained fn try_get_public_keys(account: AztecAddress) -> Option<PublicKeys> {\n    try_get_public_keys_and_partial_address(account).map(|(public_keys, _)| public_keys)\n}\n\nmod test {\n    use super::get_public_keys;\n\n    use crate::test::helpers::test_environment::TestEnvironment;\n    use std::test::OracleMock;\n\n    global KEY_ORACLE_RESPONSE_LENGTH: u32 = 13; // 12 fields for the keys, one field for the partial address\n\n    #[test(should_fail_with = \"Invalid public keys hint for address\")]\n    unconstrained fn get_public_keys_fails_with_bad_hint() {\n        let mut env = TestEnvironment::new();\n        let account = env.create_light_account();\n\n        // Instead of querying for some unknown account, which would result in the oracle erroring out, we mock a bad\n        // oracle response to check that the circuit properly checks the address derivation.\n        let mut random_keys_and_partial_address = [0; KEY_ORACLE_RESPONSE_LENGTH];\n        // We use randomly generated points on the curve, and a random partial address to ensure that this combination\n        // does not derive the address and we should see the assertion fail. npk_m\n        random_keys_and_partial_address[0] = 0x292364b852c6c6f01472951e76a39cbcf074591fd0e063a81965e7b51ad868a5;\n        random_keys_and_partial_address[1] = 0x0a687b46cdc9238f1c311f126aaaa4acbd7a737bff2efd7aeabdb8d805843a27;\n        random_keys_and_partial_address[2] = 0x0000000000000000000000000000000000000000000000000000000000000000;\n        // ivpk_m\n        random_keys_and_partial_address[3] = 0x173c5229a00c5425255680dd6edc27e278c48883991f348fe6985de43b4ec25f;\n        random_keys_and_partial_address[4] = 0x1698608e23b5f6c2f43c49a559108bb64e2247b8fc2da842296a416817f40b7f;\n        random_keys_and_partial_address[5] = 0x0000000000000000000000000000000000000000000000000000000000000000;\n        // ovpk_m\n        random_keys_and_partial_address[6] = 0x1bad2f7d1ad960a1bd0fe4d2c8d17f5ab4a86ef8b103e0a9e7f67ec0d3b4795e;\n        random_keys_and_partial_address[7] = 0x206db87110abbecc9fbaef2c865189d94ef2c106202f734ee4eba9257fd28bf1;\n        random_keys_and_partial_address[8] = 0x0000000000000000000000000000000000000000000000000000000000000000;\n        // tpk_m\n        random_keys_and_partial_address[9] = 0x05e3bd9cfe6b47daa139613619cf7d7fd8bb0112b6f2908caa6d9b536ed948ed;\n        random_keys_and_partial_address[10] = 0x051066f877c9df47552d02e7dc32127ff4edefc8498e813bca1cbd3f5d1be429;\n        random_keys_and_partial_address[11] = 0x0000000000000000000000000000000000000000000000000000000000000000;\n        // partial address\n        random_keys_and_partial_address[12] = 0x236703e2cb00a182e024e98e9f759231b556d25ff19f98896cebb69e9e678cc9;\n\n        let _ = OracleMock::mock(\"aztec_utl_getPublicKeysAndPartialAddress\").returns(Option::some(\n            random_keys_and_partial_address,\n        ));\n        let _ = get_public_keys(account);\n    }\n}\n"
        },
        "114": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/logging.nr",
            "source": "// Not all log levels are currently used, but we provide the full set so that new call sites can use any level. Because\n// of that we tag all with `#[allow(dead_code)]` to prevent warnings.\n//\n// All wrappers resolve function paths at comptime via `resolve_fn` so that the emitted `Quoted` code works both inside\n// aztec-nr (where `crate::` = aztec) and inside macro-generated contract code (where `crate::` = the contract).\n\nuse std::meta::ctstring::AsCtString;\n\ncomptime fn log_prefix<let N: u32>(msg: str<N>) -> CtString {\n    \"[aztec-nr] \".as_ctstring().append_str(msg)\n}\n\n// --- No-args variants (direct call) ---\n\n#[allow(dead_code)]\npub(crate) comptime fn aztecnr_fatal_log<let N: u32>(msg: str<N>) -> Quoted {\n    let msg = log_prefix(msg);\n    let f = resolve_fn(quote { crate::protocol::logging::fatal_log });\n    quote { $f($msg) }\n}\n\n#[allow(dead_code)]\npub(crate) comptime fn aztecnr_error_log<let N: u32>(msg: str<N>) -> Quoted {\n    let msg = log_prefix(msg);\n    let f = resolve_fn(quote { crate::protocol::logging::error_log });\n    quote { $f($msg) }\n}\n\n#[allow(dead_code)]\npub(crate) comptime fn aztecnr_warn_log<let N: u32>(msg: str<N>) -> Quoted {\n    let msg = log_prefix(msg);\n    let f = resolve_fn(quote { crate::protocol::logging::warn_log });\n    quote { $f($msg) }\n}\n\n#[allow(dead_code)]\npub(crate) comptime fn aztecnr_info_log<let N: u32>(msg: str<N>) -> Quoted {\n    let msg = log_prefix(msg);\n    let f = resolve_fn(quote { crate::protocol::logging::info_log });\n    quote { $f($msg) }\n}\n\n#[allow(dead_code)]\npub(crate) comptime fn aztecnr_verbose_log<let N: u32>(msg: str<N>) -> Quoted {\n    let msg = log_prefix(msg);\n    let f = resolve_fn(quote { crate::protocol::logging::verbose_log });\n    quote { $f($msg) }\n}\n\n#[allow(dead_code)]\npub(crate) comptime fn aztecnr_debug_log<let N: u32>(msg: str<N>) -> Quoted {\n    let msg = log_prefix(msg);\n    let f = resolve_fn(quote { crate::protocol::logging::debug_log });\n    quote { $f($msg) }\n}\n\n#[allow(dead_code)]\npub(crate) comptime fn aztecnr_trace_log<let N: u32>(msg: str<N>) -> Quoted {\n    let msg = log_prefix(msg);\n    let f = resolve_fn(quote { crate::protocol::logging::trace_log });\n    quote { $f($msg) }\n}\n\n// --- Format variants (return lambda for runtime args) ---\n\n#[allow(dead_code)]\npub(crate) comptime fn aztecnr_fatal_log_format<let N: u32>(msg: str<N>) -> Quoted {\n    let msg = log_prefix(msg);\n    let f = resolve_fn(quote { crate::protocol::logging::fatal_log_format });\n    quote { (|args| $f($msg, args)) }\n}\n\n#[allow(dead_code)]\npub(crate) comptime fn aztecnr_error_log_format<let N: u32>(msg: str<N>) -> Quoted {\n    let msg = log_prefix(msg);\n    let f = resolve_fn(quote { crate::protocol::logging::error_log_format });\n    quote { (|args| $f($msg, args)) }\n}\n\n#[allow(dead_code)]\npub(crate) comptime fn aztecnr_warn_log_format<let N: u32>(msg: str<N>) -> Quoted {\n    let msg = log_prefix(msg);\n    let f = resolve_fn(quote { crate::protocol::logging::warn_log_format });\n    quote { (|args| $f($msg, args)) }\n}\n\n#[allow(dead_code)]\npub(crate) comptime fn aztecnr_info_log_format<let N: u32>(msg: str<N>) -> Quoted {\n    let msg = log_prefix(msg);\n    let f = resolve_fn(quote { crate::protocol::logging::info_log_format });\n    quote { (|args| $f($msg, args)) }\n}\n\n#[allow(dead_code)]\npub(crate) comptime fn aztecnr_verbose_log_format<let N: u32>(msg: str<N>) -> Quoted {\n    let msg = log_prefix(msg);\n    let f = resolve_fn(quote { crate::protocol::logging::verbose_log_format });\n    quote { (|args| $f($msg, args)) }\n}\n\n#[allow(dead_code)]\npub(crate) comptime fn aztecnr_debug_log_format<let N: u32>(msg: str<N>) -> Quoted {\n    let msg = log_prefix(msg);\n    let f = resolve_fn(quote { crate::protocol::logging::debug_log_format });\n    quote { (|args| $f($msg, args)) }\n}\n\n#[allow(dead_code)]\npub(crate) comptime fn aztecnr_trace_log_format<let N: u32>(msg: str<N>) -> Quoted {\n    let msg = log_prefix(msg);\n    let f = resolve_fn(quote { crate::protocol::logging::trace_log_format });\n    quote { (|args| $f($msg, args)) }\n}\n\n// See module-level comment for why this is needed.\ncomptime fn resolve_fn(path: Quoted) -> TypedExpr {\n    path.as_expr().unwrap().resolve(Option::none())\n}\n"
        },
        "116": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/macros/aztec/compute_note_hash_and_nullifier.nr",
            "source": "use crate::logging;\nuse crate::macros::{notes::NOTES, utils::get_trait_impl_method};\n\n/// Generates two contract library methods called `_compute_note_hash` and `_compute_note_nullifier`, plus a\n/// (deprecated) wrapper called `_compute_note_hash_and_nullifier`, which are used for note discovery (i.e. these are\n/// of the `aztec::messages::discovery::ComputeNoteHash` and `aztec::messages::discovery::ComputeNoteNullifier` types).\npub(crate) comptime fn generate_contract_library_methods_compute_note_hash_and_nullifier() -> Quoted {\n    let compute_note_hash = generate_contract_library_method_compute_note_hash();\n    let compute_note_nullifier = generate_contract_library_method_compute_note_nullifier();\n\n    quote {\n        $compute_note_hash\n        $compute_note_nullifier\n\n        /// Unpacks an array into a note corresponding to `note_type_id` and then computes its note hash (non-siloed) and inner nullifier (non-siloed) assuming the note has been inserted into the note hash tree with `note_nonce`.\n        ///\n        /// This function is automatically injected by the `#[aztec]` macro.\n        #[contract_library_method]\n        #[allow(dead_code)]\n        unconstrained fn _compute_note_hash_and_nullifier(\n            packed_note: BoundedVec<Field, aztec::messages::logs::note::MAX_NOTE_PACKED_LEN>,\n            owner: aztec::protocol::address::AztecAddress,\n            storage_slot: Field,\n            note_type_id: Field,\n            contract_address: aztec::protocol::address::AztecAddress,\n            randomness: Field,\n            note_nonce: Field,\n        ) -> Option<aztec::messages::discovery::NoteHashAndNullifier> {\n            _compute_note_hash(packed_note, owner, storage_slot, note_type_id, contract_address, randomness).map(|note_hash| {\n\n                let siloed_note_hash = aztec::protocol::hash::compute_siloed_note_hash(contract_address, note_hash);\n                let unique_note_hash = aztec::protocol::hash::compute_unique_note_hash(note_nonce, siloed_note_hash);\n                \n                let inner_nullifier = _compute_note_nullifier(unique_note_hash, packed_note, owner, storage_slot, note_type_id, contract_address, randomness);\n\n                aztec::messages::discovery::NoteHashAndNullifier {\n                    note_hash,\n                    inner_nullifier,\n                }\n            })\n        }\n    }\n}\n\ncomptime fn generate_contract_library_method_compute_note_hash() -> Quoted {\n    if NOTES.len() == 0 {\n        // Contracts with no notes still implement this function to avoid having special-casing, the implementation\n        // simply throws immediately.\n        quote {\n            /// This contract does not use private notes, so this function should never be called as it will unconditionally fail.\n            ///\n            /// This function is automatically injected by the `#[aztec]` macro.\n            #[contract_library_method]\n            unconstrained fn _compute_note_hash(\n                _packed_note: BoundedVec<Field, aztec::messages::logs::note::MAX_NOTE_PACKED_LEN>,\n                _owner: aztec::protocol::address::AztecAddress,\n                _storage_slot: Field,\n                _note_type_id: Field,\n                _contract_address: aztec::protocol::address::AztecAddress,\n                _randomness: Field,\n            ) -> Option<Field> {\n                panic(f\"This contract does not use private notes\")\n            }\n        }\n    } else {\n        // Contracts that do define notes produce an if-else chain where `note_type_id` is matched against the\n        // `get_note_type_id()` function of each note type that we know of, in order to identify the note type. Once we\n        // know it we call the correct `unpack` method from the `Packable` trait to obtain the underlying note type,\n        // and\n        // compute the note hash (non-siloed).\n\n        // We resolve the log format calls here so that the resulting Quoted values can be spliced into the quote\n        // block below.\n        let warn_length_mismatch = logging::aztecnr_warn_log_format(\n            \"Packed note length mismatch for note type id {0}: expected {1} fields, got {2}. Skipping note.\",\n        );\n        let warn_unknown_note_type = logging::aztecnr_warn_log_format(\"Unknown note type id {0}. Skipping note.\");\n\n        let mut if_note_type_id_match_statements_list = @[];\n        for i in 0..NOTES.len() {\n            let typ = NOTES.get(i);\n\n            let get_note_type_id = get_trait_impl_method(\n                typ,\n                quote { crate::note::note_interface::NoteType },\n                quote { get_id },\n            );\n            let unpack = get_trait_impl_method(\n                typ,\n                quote { crate::protocol::traits::Packable },\n                quote { unpack },\n            );\n\n            let compute_note_hash = get_trait_impl_method(\n                typ,\n                quote { crate::note::note_interface::NoteHash },\n                quote { compute_note_hash },\n            );\n\n            let if_or_else_if = if i == 0 {\n                quote { if }\n            } else {\n                quote { else if }\n            };\n\n            if_note_type_id_match_statements_list = if_note_type_id_match_statements_list.push_back(\n                quote {\n                    $if_or_else_if note_type_id == $get_note_type_id() {\n                        // As an extra safety check we make sure that the packed_note BoundedVec has the expected\n                        // length, since we're about to interpret its raw storage as a fixed-size array by calling the\n                        // unpack function on it.\n                        let expected_len = <$typ as $crate::protocol::traits::Packable>::N;\n                        let actual_len = packed_note.len();\n                        if actual_len != expected_len {\n                            $warn_length_mismatch([note_type_id, expected_len as Field, actual_len as Field]);\n                            Option::none()\n                        } else {\n                            let note = $unpack(aztec::utils::array::subarray(packed_note.storage(), 0));\n\n                            Option::some($compute_note_hash(note, owner, storage_slot, randomness))\n                        }\n                    }\n                },\n            );\n        }\n\n        let if_note_type_id_match_statements = if_note_type_id_match_statements_list.join(quote {});\n\n        quote {\n            /// Unpacks an array into a note corresponding to `note_type_id` and then computes its note hash (non-siloed).\n            ///\n            /// The signature of this function notably matches the `aztec::messages::discovery::ComputeNoteHash` type, and so it can be used to call functions from that module such as `do_sync_state` and `attempt_note_discovery`.\n            ///\n            /// This function is automatically injected by the `#[aztec]` macro.\n            #[contract_library_method]\n            unconstrained fn _compute_note_hash(\n                packed_note: BoundedVec<Field, aztec::messages::logs::note::MAX_NOTE_PACKED_LEN>,\n                owner: aztec::protocol::address::AztecAddress,\n                storage_slot: Field,\n                note_type_id: Field,\n                _contract_address: aztec::protocol::address::AztecAddress,\n                randomness: Field,\n            ) -> Option<Field> {\n                $if_note_type_id_match_statements\n                else {\n                    $warn_unknown_note_type([note_type_id]);\n                    Option::none()\n                }\n            }\n        }\n    }\n}\n\ncomptime fn generate_contract_library_method_compute_note_nullifier() -> Quoted {\n    if NOTES.len() == 0 {\n        // Contracts with no notes still implement this function to avoid having special-casing, the implementation\n        // simply throws immediately.\n        quote {\n            /// This contract does not use private notes, so this function should never be called as it will unconditionally fail.\n            ///\n            /// This function is automatically injected by the `#[aztec]` macro.\n            #[contract_library_method]\n            unconstrained fn _compute_note_nullifier(\n                _unique_note_hash: Field,\n                _packed_note: BoundedVec<Field, aztec::messages::logs::note::MAX_NOTE_PACKED_LEN>,\n                _owner: aztec::protocol::address::AztecAddress,\n                _storage_slot: Field,\n                _note_type_id: Field,\n                _contract_address: aztec::protocol::address::AztecAddress,\n                _randomness: Field,\n            ) -> Option<Field> {\n                panic(f\"This contract does not use private notes\")\n            }\n        }\n    } else {\n        // Contracts that do define notes produce an if-else chain where `note_type_id` is matched against the\n        // `get_note_type_id()` function of each note type that we know of, in order to identify the note type. Once we\n        // know it we call the correct `unpack` method from the `Packable` trait to obtain the underlying note type,\n        // and\n        // compute the inner nullifier (non-siloed).\n\n        // We resolve the log format calls here so that the resulting Quoted values can be spliced into the quote\n        // block below.\n        let warn_length_mismatch = logging::aztecnr_warn_log_format(\n            \"Packed note length mismatch for note type id {0}: expected {1} fields, got {2}. Skipping note.\",\n        );\n        let warn_unknown_note_type = logging::aztecnr_warn_log_format(\"Unknown note type id {0}. Skipping note.\");\n\n        let mut if_note_type_id_match_statements_list = @[];\n        for i in 0..NOTES.len() {\n            let typ = NOTES.get(i);\n\n            let get_note_type_id = get_trait_impl_method(\n                typ,\n                quote { crate::note::note_interface::NoteType },\n                quote { get_id },\n            );\n            let unpack = get_trait_impl_method(\n                typ,\n                quote { crate::protocol::traits::Packable },\n                quote { unpack },\n            );\n\n            let compute_nullifier_unconstrained = get_trait_impl_method(\n                typ,\n                quote { crate::note::note_interface::NoteHash },\n                quote { compute_nullifier_unconstrained },\n            );\n\n            let if_or_else_if = if i == 0 {\n                quote { if }\n            } else {\n                quote { else if }\n            };\n\n            if_note_type_id_match_statements_list = if_note_type_id_match_statements_list.push_back(\n                quote {\n                    $if_or_else_if note_type_id == $get_note_type_id() {\n                        // As an extra safety check we make sure that the packed_note BoundedVec has the expected\n                        // length, since we're about to interpret its raw storage as a fixed-size array by calling the\n                        // unpack function on it.\n                        let expected_len = <$typ as $crate::protocol::traits::Packable>::N;\n                        let actual_len = packed_note.len();\n                        if actual_len != expected_len {\n                            $warn_length_mismatch([note_type_id, expected_len as Field, actual_len as Field]);\n                            Option::none()\n                        } else {\n                            let note = $unpack(aztec::utils::array::subarray(packed_note.storage(), 0));\n\n                            // The message discovery process finds settled notes, that is, notes that were created in\n                            // prior transactions and are therefore already part of the note hash tree. The note hash\n                            // for nullification is hence the unique note hash.\n                            $compute_nullifier_unconstrained(note, owner, unique_note_hash)\n                        }\n                    }\n                },\n            );\n        }\n\n        let if_note_type_id_match_statements = if_note_type_id_match_statements_list.join(quote {});\n\n        quote {\n            /// Computes a note's inner nullifier (non-siloed) given its unique note hash, preimage and extra data.\n            ///\n            /// The signature of this function notably matches the `aztec::messages::discovery::ComputeNoteNullifier` type, and so it can be used to call functions from that module such as `do_sync_state` and `attempt_note_discovery`.\n            ///\n            /// This function is automatically injected by the `#[aztec]` macro.\n            #[contract_library_method]\n            unconstrained fn _compute_note_nullifier(\n                unique_note_hash: Field,\n                packed_note: BoundedVec<Field, aztec::messages::logs::note::MAX_NOTE_PACKED_LEN>,\n                owner: aztec::protocol::address::AztecAddress,\n                _storage_slot: Field,\n                note_type_id: Field,\n                _contract_address: aztec::protocol::address::AztecAddress,\n                _randomness: Field,\n            ) -> Option<Field> {\n                $if_note_type_id_match_statements\n                else {\n                    $warn_unknown_note_type([note_type_id]);\n                    Option::none()\n                }\n            }\n        }\n    }\n}\n"
        },
        "117": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/macros/aztec.nr",
            "source": "mod compute_note_hash_and_nullifier;\n\nuse crate::{\n    macros::{\n        calls_generation::{\n            external_functions::{generate_external_function_calls, generate_external_function_self_calls_structs},\n            internal_functions::generate_call_internal_struct,\n        },\n        dispatch::generate_public_dispatch,\n        emit_public_init_nullifier::generate_emit_public_init_nullifier,\n        internals_functions_generation::{create_fn_abi_exports, process_functions},\n        storage::STORAGE_LAYOUT_NAME,\n        utils::{is_fn_contract_library_method, is_fn_external, is_fn_internal, is_fn_test, module_has_storage},\n    },\n    messages::discovery::CustomMessageHandler,\n};\n\nuse compute_note_hash_and_nullifier::generate_contract_library_methods_compute_note_hash_and_nullifier;\n\n/// Configuration for the [`aztec`] macro.\n///\n/// This type lets users override different parts of the default aztec-nr contract behavior, such\n/// as message handling. These are advanced features that require careful understanding of\n/// the behavior of these systems.\n///\n/// ## Examples\n///\n/// ```noir\n/// #[aztec(aztec::macros::AztecConfig::new().custom_message_handler(my_handler))]\n/// contract MyContract { ... }\n/// ```\npub struct AztecConfig {\n    custom_message_handler: Option<CustomMessageHandler<()>>,\n}\n\nimpl AztecConfig {\n    /// Creates a new `AztecConfig` with default values.\n    ///\n    /// Calling `new` is equivalent to invoking the [`aztec`] macro with no parameters. The different methods\n    /// (e.g. [`AztecConfig::custom_message_handler`]) can then be used to change the default behavior.\n    pub comptime fn new() -> Self {\n        Self { custom_message_handler: Option::none() }\n    }\n\n    /// Sets a handler for custom messages.\n    ///\n    /// This enables contracts to process non-standard messages (i.e. any with a message type that is not in\n    /// [`crate::messages::msg_type`]).\n    ///\n    /// `handler` must be a `#[contract_library_method]` function that conforms to the\n    /// [`crate::messages::discovery::CustomMessageHandler`] type signature.\n    pub comptime fn custom_message_handler(_self: Self, handler: CustomMessageHandler<()>) -> Self {\n        Self { custom_message_handler: Option::some(handler) }\n    }\n}\n\n/// Enables aztec-nr features on a `contract`.\n///\n/// All aztec-nr contracts should have this macro invoked on them, as it is the one that processes all contract\n/// functions, notes, storage, generates interfaces for external calls, and creates the message processing\n/// boilerplate.\n///\n/// ## Examples\n///\n/// Most contracts can simply invoke the macro with no parameters, resulting in default aztec-nr behavior:\n/// ```noir\n/// #[aztec]\n/// contract MyContract { ... }\n/// ```\n///\n/// Advanced contracts can use [`AztecConfig`] to customize parts of its behavior, such as message\n/// processing.\n/// ```noir\n/// #[aztec(aztec::macros::AztecConfig::new().custom_message_handler(my_handler))]\n/// contract MyAdvancedContract { ... }\n/// ```\n#[varargs]\npub comptime fn aztec(m: Module, args: [AztecConfig]) -> Quoted {\n    let num_args = args.len();\n    let config = if num_args == 0 {\n        AztecConfig::new()\n    } else if num_args == 1 {\n        args[0]\n    } else {\n        panic(f\"#[aztec] expects 0 or 1 arguments, got {num_args}\")\n    };\n\n    // Functions that don't have #[external(...)], #[contract_library_method], or #[test] are not allowed in contracts.\n    check_each_fn_macroified(m);\n\n    // We generate new functions prefixed with `__aztec_nr_internals__` and we replace the original functions' bodies\n    // with `static_assert(false, ...)` to prevent them from being called directly from within the contract.\n    let functions = process_functions(m);\n\n    // We generate structs and their implementations necessary for convenient functions calls.\n    let interface = generate_contract_interface(m);\n    let self_call_structs = generate_external_function_self_calls_structs(m);\n    let call_internal_struct = generate_call_internal_struct(m);\n\n    // We generate ABI exports for all the external functions in the contract.\n    let fn_abi_exports = create_fn_abi_exports(m);\n\n    // We generate `_compute_note_hash`, `_compute_note_nullifier` (and the deprecated\n    // `_compute_note_hash_and_nullifier` wrapper) and `sync_state` functions only if they are not already implemented.\n    // If they are implemented we just insert empty quotes.\n    let contract_library_method_compute_note_hash_and_nullifier = if !m.functions().any(|f| {\n        // Note that we don't test for `_compute_note_hash` or `_compute_note_nullifier` in order to make this simpler\n        // - users must either implement all three or none.\n        // Down the line we'll remove this check and use `AztecConfig`.\n        f.name() == quote { _compute_note_hash_and_nullifier }\n    }) {\n        generate_contract_library_methods_compute_note_hash_and_nullifier()\n    } else {\n        quote {}\n    };\n    let process_custom_message_option = if config.custom_message_handler.is_some() {\n        let handler = config.custom_message_handler.unwrap();\n        quote { Option::some($handler) }\n    } else {\n        quote { Option::<aztec::messages::discovery::CustomMessageHandler<()>>::none() }\n    };\n\n    let offchain_inbox_sync_option = quote {\n        Option::some(aztec::messages::processing::offchain::sync_inbox)\n    };\n\n    let sync_state_fn_and_abi_export = if !m.functions().any(|f| f.name() == quote { sync_state }) {\n        generate_sync_state(process_custom_message_option, offchain_inbox_sync_option)\n    } else {\n        quote {}\n    };\n\n    if m.functions().any(|f| f.name() == quote { offchain_receive }) {\n        panic(\n            \"User-defined 'offchain_receive' is not allowed. The function is auto-injected by the #[aztec] macro. See https://docs.aztec.network/errors/7\",\n        );\n    }\n    let offchain_receive_fn_and_abi_export = generate_offchain_receive();\n\n    let (has_public_init_nullifier_fn, emit_public_init_nullifier_fn_body) = generate_emit_public_init_nullifier(m);\n    let public_dispatch = generate_public_dispatch(m, has_public_init_nullifier_fn);\n\n    quote {\n        $interface\n        $self_call_structs\n        $call_internal_struct\n        $functions\n        $fn_abi_exports\n        $contract_library_method_compute_note_hash_and_nullifier\n        $public_dispatch\n        $sync_state_fn_and_abi_export\n        $emit_public_init_nullifier_fn_body\n        $offchain_receive_fn_and_abi_export\n    }\n}\n\ncomptime fn generate_contract_interface(m: Module) -> Quoted {\n    let calls = generate_external_function_calls(m);\n\n    let module_name = m.name();\n\n    let has_storage_layout = module_has_storage(m) & STORAGE_LAYOUT_NAME.get(m).is_some();\n    let storage_layout_getter = if has_storage_layout {\n        let storage_layout_name = STORAGE_LAYOUT_NAME.get(m).unwrap();\n        quote {\n            pub fn storage_layout() -> StorageLayoutFields {\n                $storage_layout_name.fields\n            }\n        }\n    } else {\n        quote {}\n    };\n\n    let library_storage_layout_getter = if has_storage_layout {\n        quote {\n            #[contract_library_method]\n            $storage_layout_getter\n        }\n    } else {\n        quote {}\n    };\n\n    quote {\n        pub struct $module_name {\n            pub target_contract: aztec::protocol::address::AztecAddress\n        }\n\n        impl $module_name {\n            $calls\n\n            pub fn at(\n                addr: aztec::protocol::address::AztecAddress\n            ) -> Self {\n                Self { target_contract: addr }\n            }\n\n            pub fn interface() -> Self {\n                Self { target_contract: aztec::protocol::address::AztecAddress::zero() }\n            }\n\n            $storage_layout_getter\n        }\n\n        #[contract_library_method]\n        pub fn at(\n            addr: aztec::protocol::address::AztecAddress\n        ) -> $module_name {\n            $module_name { target_contract: addr }\n        }\n\n        #[contract_library_method]\n        pub fn interface() -> $module_name {\n            $module_name { target_contract: aztec::protocol::address::AztecAddress::zero() }\n        }\n\n        $library_storage_layout_getter\n\n    }\n}\n\n/// Generates the `sync_state` utility function that performs message discovery.\ncomptime fn generate_sync_state(process_custom_message_option: Quoted, offchain_inbox_sync_option: Quoted) -> Quoted {\n    quote {\n        pub struct sync_state_parameters {\n            pub scope: aztec::protocol::address::AztecAddress,\n        }\n\n        #[abi(functions)]\n        pub struct sync_state_abi {\n            parameters: sync_state_parameters,\n        }\n\n        #[aztec::macros::internals_functions_generation::abi_attributes::abi_utility]\n        unconstrained fn sync_state(scope: aztec::protocol::address::AztecAddress) {\n            let address = aztec::context::UtilityContext::new().this_address();\n            aztec::messages::discovery::do_sync_state(\n                address,\n                _compute_note_hash,\n                _compute_note_nullifier,\n                $process_custom_message_option,\n                $offchain_inbox_sync_option,\n                scope,\n            );\n        }\n    }\n}\n\n/// Generates an `offchain_receive` utility function that lets callers add messages to the offchain message inbox.\n///\n/// For more details, see `aztec::messages::processing::offchain::receive`.\ncomptime fn generate_offchain_receive() -> Quoted {\n    quote {\n        pub struct offchain_receive_parameters {\n            pub messages: BoundedVec<\n                aztec::messages::processing::offchain::OffchainMessage,\n                aztec::messages::processing::offchain::MAX_OFFCHAIN_MESSAGES_PER_RECEIVE_CALL,\n            >,\n        }\n\n        #[abi(functions)]\n        pub struct offchain_receive_abi {\n            parameters: offchain_receive_parameters,\n        }\n\n        /// Receives offchain messages into this contract's offchain inbox for subsequent processing.\n        ///\n        /// Each message is routed to the inbox scoped to its `recipient` field.\n        ///\n        /// For more details, see `aztec::messages::processing::offchain::receive`.\n        ///\n        /// This function is automatically injected by the `#[aztec]` macro.\n        #[aztec::macros::internals_functions_generation::abi_attributes::abi_utility]\n        unconstrained fn offchain_receive(\n            messages: BoundedVec<\n                aztec::messages::processing::offchain::OffchainMessage,\n                aztec::messages::processing::offchain::MAX_OFFCHAIN_MESSAGES_PER_RECEIVE_CALL,\n            >,\n        ) {\n            let address = aztec::context::UtilityContext::new().this_address();\n            aztec::messages::processing::offchain::receive(address, messages);\n        }\n    }\n}\n\n/// Checks that all functions in the module have a context macro applied.\n///\n/// Non-macroified functions are not allowed in contracts. They must all be one of\n/// [`crate::macros::functions::external`], [`crate::macros::functions::internal`] or `test`.\ncomptime fn check_each_fn_macroified(m: Module) {\n    for f in m.functions() {\n        let name = f.name();\n        if !is_fn_external(f) & !is_fn_contract_library_method(f) & !is_fn_internal(f) & !is_fn_test(f) {\n            // We  don't suggest that #[contract_library_method] is allowed because we don't want to introduce another\n            // concept\n            panic(\n                f\"Function {name} must be marked as either #[external(...)], #[internal(...)], or #[test]\",\n            );\n        }\n    }\n}\n"
        },
        "119": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/macros/calls_generation/external_functions_stubs.nr",
            "source": "//! Stubs are auto-generated wrapper functions that provide an ergonomic interface for cross-contract calls. ! Instead\n// of manually serializing arguments and creating call interfaces, stubs allow natural syntax, e.g. for ! enqueuing\n// calls to public functions: ! !   ExternalContract.at(address).some_method(arg1, arg2).enqueue()\n\nuse crate::macros::utils::compute_fn_selector;\nuse crate::protocol::meta::utils::derive_serialization_quotes;\nuse std::meta::unquote;\n\ncomptime global FROM_FIELD: TypedExpr = {\n    let from_field_trait = quote { crate::protocol::traits::FromField }.as_trait_constraint();\n    let function_selector_typ = quote { crate::protocol::abis::function_selector::FunctionSelector }.as_type();\n    function_selector_typ.get_trait_impl(from_field_trait).unwrap().methods().filter(|m| {\n        m.name() == quote { from_field }\n    })[0]\n        .as_typed_expr()\n};\n\n/// Utility function creating stubs used by all the stub functions in this file.\ncomptime fn create_stub_base(f: FunctionDefinition) -> (Quoted, Quoted, Quoted, Quoted, u32, Quoted, u32, Field) {\n    // Dear privacy adventurer, chances are, you've command+clicked on the name of an external function call -- seeking\n    // to view that function -- only to end up here. Here's an explanation: The external contract that you're calling\n    // was likely annotated with the `#[aztec]` annotation -- as all good aztec contracts are. This triggers a macro\n    // which generates a \"contract interface\" for that contract, which is effectively a pretty interface that gives\n    // natural contract calling semantics:\n    //\n    // `MyImportedContract.at(some_address).my_method(arg1, arg2).enqueue();\n    //\n    // Unfortunately, the usage of macros makes it a bit of a black box. To actually view the target function, you\n    // could instead command+click on `MyImportedContract`, or you can just manually search it. If you want to view the\n    // noir code that gets generated by this macro, you can use `nargo expand` on your contract.\n    let fn_name = f.name();\n    let fn_parameters = f.parameters();\n    let fn_parameters_list = fn_parameters.map(|(name, typ): (Quoted, Type)| quote { $name: $typ }).join(quote {,});\n\n    let (serialized_args_array_construction, serialized_args_array_len_quote, serialized_args_array_name) =\n        derive_serialization_quotes(fn_parameters, false);\n    let serialized_args_array_len: u32 = unquote!(quote { ($serialized_args_array_len_quote) as u32 });\n\n    let fn_name_str = f\"\\\"{fn_name}\\\"\".quoted_contents();\n    let fn_name_len: u32 = unquote!(quote { $fn_name_str.as_bytes().len()});\n    let fn_selector: Field = compute_fn_selector(f.name(), f.parameters());\n\n    (\n        fn_name, fn_parameters_list, serialized_args_array_construction, serialized_args_array_name,\n        serialized_args_array_len, fn_name_str, fn_name_len, fn_selector,\n    )\n}\n\npub(crate) comptime fn create_private_stub(f: FunctionDefinition) -> Quoted {\n    let (fn_name, fn_parameters_list, serialized_args_array_construction, serialized_args_array_name, serialized_args_array_len, fn_name_str, fn_name_len, fn_selector) =\n        create_stub_base(f);\n    let fn_return_type = f.return_type();\n\n    quote {\n        pub fn $fn_name(self, $fn_parameters_list) -> aztec::context::calls::PrivateCall<$fn_name_len, $serialized_args_array_len, $fn_return_type> {\n            $serialized_args_array_construction\n            let selector = $FROM_FIELD($fn_selector);\n            aztec::context::calls::PrivateCall::new(\n                self.target_contract,\n                selector,\n                $fn_name_str,\n                $serialized_args_array_name,\n            )\n        }\n    }\n}\n\npub(crate) comptime fn create_private_static_stub(f: FunctionDefinition) -> Quoted {\n    let (fn_name, fn_parameters_list, serialized_args_array_construction, serialized_args_array_name, serialized_args_array_len, fn_name_str, fn_name_len, fn_selector) =\n        create_stub_base(f);\n    let fn_return_type = f.return_type();\n\n    quote {\n        pub fn $fn_name(self, $fn_parameters_list) -> aztec::context::calls::PrivateStaticCall<$fn_name_len, $serialized_args_array_len, $fn_return_type> {\n            $serialized_args_array_construction\n            let selector = $FROM_FIELD($fn_selector);\n            aztec::context::calls::PrivateStaticCall::new(\n                self.target_contract,\n                selector,\n                $fn_name_str,\n                $serialized_args_array_name,\n            )\n        }\n    }\n}\n\npub(crate) comptime fn create_public_stub(f: FunctionDefinition) -> Quoted {\n    let (fn_name, fn_parameters_list, serialized_args_array_construction, serialized_args_array_name, serialized_args_array_len, fn_name_str, fn_name_len, fn_selector) =\n        create_stub_base(f);\n    let fn_return_type = f.return_type();\n\n    quote {\n        pub fn $fn_name(self, $fn_parameters_list) -> aztec::context::calls::PublicCall<$fn_name_len, $serialized_args_array_len, $fn_return_type> {\n            $serialized_args_array_construction\n            let selector = $FROM_FIELD($fn_selector);\n            aztec::context::calls::PublicCall::new(\n                self.target_contract,\n                selector,\n                $fn_name_str,\n                $serialized_args_array_name,\n            )\n        }\n    }\n}\n\npub(crate) comptime fn create_public_static_stub(f: FunctionDefinition) -> Quoted {\n    let (fn_name, fn_parameters_list, serialized_args_array_construction, serialized_args_array_name, serialized_args_array_len, fn_name_str, fn_name_len, fn_selector) =\n        create_stub_base(f);\n    let fn_return_type = f.return_type();\n\n    quote {\n        pub fn $fn_name(self, $fn_parameters_list) -> aztec::context::calls::PublicStaticCall<$fn_name_len, $serialized_args_array_len, $fn_return_type> {\n            $serialized_args_array_construction\n            let selector = $FROM_FIELD($fn_selector);\n            aztec::context::calls::PublicStaticCall::new(\n                self.target_contract,\n                selector,\n                $fn_name_str,\n                $serialized_args_array_name,\n            )\n        }\n    }\n}\n\npub(crate) comptime fn create_utility_stub(f: FunctionDefinition) -> Quoted {\n    let (fn_name, fn_parameters_list, serialized_args_array_construction, serialized_args_array_name, serialized_args_array_len, fn_name_str, fn_name_len, fn_selector) =\n        create_stub_base(f);\n    let fn_return_type = f.return_type();\n\n    quote {\n        pub fn $fn_name(self, $fn_parameters_list) -> aztec::context::calls::UtilityCall<$fn_name_len, $serialized_args_array_len, $fn_return_type> {\n            $serialized_args_array_construction\n            let selector = $FROM_FIELD($fn_selector);\n            aztec::context::calls::UtilityCall::new(\n                self.target_contract,\n                selector,\n                $fn_name_str,\n                $serialized_args_array_name,\n            )\n        }\n    }\n}\n\n// Self-call stub generation functions for CallSelf, CallSelfStatic, EnqueueSelf, and EnqueueSelfStatic structs. Unlike\n// the stubs above, the self-call stubs directly perform the call instead of returning a struct that can be later used\n// to perform the call.\n\n/// Creates a stub for calling a private function (or static private function if `is_static` is true) from private\n/// context (for CallSelf<&mut PrivateContext> and CallSelfStatic<&mut PrivateContext>).\npub comptime fn create_private_self_call_stub(f: FunctionDefinition, is_static: bool) -> Quoted {\n    let (fn_name, fn_parameters_list, serialized_args_array_construction, serialized_args_array_name, _, _, _, fn_selector) =\n        create_stub_base(f);\n    let fn_return_type = f.return_type();\n\n    quote {\n        pub fn $fn_name(self, $fn_parameters_list) -> $fn_return_type {\n            $serialized_args_array_construction\n            let selector = $FROM_FIELD($fn_selector);\n            let args_hash = aztec::hash::hash_args($serialized_args_array_name);\n            aztec::oracle::execution_cache::store($serialized_args_array_name, args_hash);\n            let returns_hash = self.context.call_private_function_with_args_hash(\n                self.address,\n                selector,\n                args_hash,\n                $is_static\n            );\n            returns_hash.get_preimage()\n        }\n    }\n}\n\n/// Creates a stub for calling a public function from public context (for CallSelf<PublicContext>)\npub comptime fn create_public_self_call_stub(f: FunctionDefinition) -> Quoted {\n    let (fn_name, fn_parameters_list, serialized_args_array_construction, serialized_args_array_name, _, fn_name_str, _, fn_selector) =\n        create_stub_base(f);\n    let fn_return_type = f.return_type();\n\n    // TODO: It makes sense to drop the use of PublicStaticCall struct here and just perform the call directly but\n    // before doing that we need to drop the use of slices from return values because we cannot return slices from an\n    // unconstrained function. This is not a priority right now.\n    quote {\n        pub fn $fn_name(self, $fn_parameters_list) -> $fn_return_type {\n            $serialized_args_array_construction\n            let selector = $FROM_FIELD($fn_selector);\n            unsafe {\n                aztec::context::calls::PublicCall::new(\n                    self.address,\n                    selector,\n                    $fn_name_str,\n                    $serialized_args_array_name,\n                ).call(self.context)\n            }\n        }\n    }\n}\n\n/// Creates a static stub for calling a public view function from public context (for CallSelfStatic<PublicContext>)\npub comptime fn create_public_self_call_static_stub(f: FunctionDefinition) -> Quoted {\n    let (fn_name, fn_parameters_list, serialized_args_array_construction, serialized_args_array_name, _, fn_name_str, _, fn_selector) =\n        create_stub_base(f);\n    let fn_return_type = f.return_type();\n\n    // TODO: It makes sense to drop the use of PublicStaticCall struct here and just perform the call directly but\n    // before doing that we need to drop the use of slices from return values because we cannot return slices from an\n    // unconstrained function. This is not a priority right now.\n    quote {\n        pub fn $fn_name(self, $fn_parameters_list) -> $fn_return_type {\n            $serialized_args_array_construction\n            let selector = $FROM_FIELD($fn_selector);\n            unsafe {\n                aztec::context::calls::PublicStaticCall::new(\n                    self.address,\n                    selector,\n                    $fn_name_str,\n                    $serialized_args_array_name,\n                ).view(self.context)\n            }\n        }\n    }\n}\n\n/// Creates a static stub for enqueuing a public view function from private context (for EnqueueSelfStatic<&mut\n/// PrivateContext>)\npub comptime fn create_public_self_enqueue_static_stub(f: FunctionDefinition) -> Quoted {\n    let (fn_name, fn_parameters_list, serialized_args_array_construction, serialized_args_array_name, _serialized_args_array_len, _fn_name_str, _fn_name_len, fn_selector) =\n        create_stub_base(f);\n\n    quote {\n        pub fn $fn_name(self, $fn_parameters_list) {\n            $serialized_args_array_construction\n            let selector = $FROM_FIELD($fn_selector);\n            let calldata = [aztec::protocol::traits::ToField::to_field(selector)].concat($serialized_args_array_name);\n            let calldata_hash = aztec::hash::hash_calldata_array(calldata);\n            aztec::oracle::execution_cache::store(calldata, calldata_hash);\n            self.context.call_public_function_with_calldata_hash(\n                self.address,\n                calldata_hash,\n                /*is_static_call=*/ true,\n                /*hide_msg_sender=*/ false,\n            );\n        }\n    }\n}\n\n/// Creates a stub for enqueuing a public function from private context (for EnqueueSelf<&mut PrivateContext>)\npub comptime fn create_public_self_enqueue_stub(f: FunctionDefinition) -> Quoted {\n    let (fn_name, fn_parameters_list, serialized_args_array_construction, serialized_args_array_name, _serialized_args_array_len, _fn_name_str, _fn_name_len, fn_selector) =\n        create_stub_base(f);\n\n    quote {\n        pub fn $fn_name(self, $fn_parameters_list) {\n            $serialized_args_array_construction\n            let selector = $FROM_FIELD($fn_selector);\n            let calldata = [aztec::protocol::traits::ToField::to_field(selector)].concat($serialized_args_array_name);\n            let calldata_hash = aztec::hash::hash_calldata_array(calldata);\n            aztec::oracle::execution_cache::store(calldata, calldata_hash);\n            self.context.call_public_function_with_calldata_hash(\n                self.address,\n                calldata_hash,\n                /*is_static_call=*/ false,\n                /*hide_msg_sender=*/ false,\n            );\n        }\n    }\n}\n"
        },
        "122": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/macros/dispatch.nr",
            "source": "use crate::macros::internals_functions_generation::external_functions_registry::get_public_functions;\nuse crate::protocol::meta::utils::get_params_len_quote;\nuse crate::utils::cmap::CHashMap;\nuse super::functions::initialization_utils::EMIT_PUBLIC_INIT_NULLIFIER_FN_NAME;\nuse super::utils::compute_fn_selector;\nuse std::panic;\n\n/// Generates a `public_dispatch` function for an Aztec contract module `m`.\n///\n/// The generated function dispatches public calls based on selector to the appropriate contract function. If\n/// `generate_emit_public_init_nullifier` is true, it also handles dispatch to the macro-generated\n/// `__emit_public_init_nullifier` function.\npub comptime fn generate_public_dispatch(m: Module, generate_emit_public_init_nullifier: bool) -> Quoted {\n    let functions = get_public_functions(m);\n\n    let unit = get_type::<()>();\n\n    let seen_selectors = &mut CHashMap::<Field, Quoted>::new();\n\n    let mut ifs = functions.map(|function: FunctionDefinition| {\n        let parameters = function.parameters();\n        let return_type = function.return_type();\n\n        let fn_name = function.name();\n        let selector: Field = compute_fn_selector(fn_name, parameters);\n\n        // Since function selectors are computed as the first 4 bytes of the hash of the function signature, it's\n        // possible to have collisions. With the following check, we ensure it doesn't happen within the same contract.\n        let existing_fn = seen_selectors.get(selector);\n        if existing_fn.is_some() {\n            let existing_fn = existing_fn.unwrap();\n            panic(\n                f\"Public function selector collision detected between functions '{fn_name}' and '{existing_fn}'\",\n            );\n        }\n        seen_selectors.insert(selector, fn_name);\n\n        let params_len_quote = get_params_len_quote(parameters);\n\n        let initial_read = if parameters.len() == 0 {\n            quote {}\n        } else {\n            // The initial calldata_copy offset is 1 to skip the Field selector The expected calldata is the\n            // serialization of\n            // - FunctionSelector: the selector of the function intended to dispatch\n            // - Parameters: the parameters of the function intended to dispatch That is, exactly what is expected for\n            // a call to the target function, but with a selector added at the beginning.\n            quote {\n                let input_calldata: [Field; $params_len_quote] = aztec::oracle::avm::calldata_copy(1, $params_len_quote);\n                let mut reader = aztec::protocol::utils::reader::Reader::new(input_calldata);\n            }\n        };\n\n        let parameter_index: &mut u32 = &mut 0;\n        let reads = parameters.map(|param: (Quoted, Type)| {\n            let parameter_index_value = *parameter_index;\n            let param_name = f\"arg{parameter_index_value}\".quoted_contents();\n            let param_type = param.1;\n            let read = quote {\n                let $param_name: $param_type = aztec::protocol::traits::Deserialize::stream_deserialize(&mut reader);\n            };\n            *parameter_index += 1;\n            quote { $read }\n        });\n        let read = reads.join(quote { });\n\n        let mut args = @[];\n        for parameter_index in 0..parameters.len() {\n            let param_name = f\"arg{parameter_index}\".quoted_contents();\n            args = args.push_back(quote { $param_name });\n        }\n\n        // We call a function whose name is prefixed with `__aztec_nr_internals__`. This is necessary because the\n        // original function is intentionally made uncallable, preventing direct invocation within the contract.\n        // Instead, a new function with the same name, but prefixed by `__aztec_nr_internals__`, has been generated to\n        // be called here. For more details see the `process_functions` function.\n        let name = f\"__aztec_nr_internals__{fn_name}\".quoted_contents();\n        let args = args.join(quote { , });\n        let call = quote { $name($args) };\n\n        let return_code = if return_type == unit {\n            quote {\n                $call;\n                // Force early return.\n                aztec::oracle::avm::avm_return([]);\n            }\n        } else {\n            quote {\n                let return_value = aztec::protocol::traits::Serialize::serialize($call);\n                aztec::oracle::avm::avm_return(return_value.as_vector());\n            }\n        };\n\n        let if_ = quote {\n            if selector == $selector {\n                $initial_read\n                $read\n                $return_code\n            }\n        };\n        if_\n    });\n\n    // If we injected the auto-generated public function to emit the public initialization nullifier, then\n    // we'll also need to handle its dispatch.\n    if generate_emit_public_init_nullifier {\n        let name = EMIT_PUBLIC_INIT_NULLIFIER_FN_NAME;\n        let init_nullifier_selector: Field = compute_fn_selector(name, @[]);\n\n        ifs = ifs.push_back(\n            quote {\n            if selector == $init_nullifier_selector {\n                $name();\n                aztec::oracle::avm::avm_return([]);\n            }\n        },\n        );\n    }\n\n    if ifs.len() == 0 {\n        // No dispatch function if there are no public functions\n        quote {}\n    } else {\n        let ifs = ifs.push_back(quote { panic(f\"Unknown selector {selector}\") });\n        let dispatch = ifs.join(quote {  });\n\n        let body = quote {\n            // We mark this as public because our whole system depends on public functions having this attribute.\n            #[aztec::macros::internals_functions_generation::abi_attributes::abi_public]\n            pub unconstrained fn public_dispatch(selector: Field) {\n                $dispatch\n            }\n        };\n\n        body\n    }\n}\n\ncomptime fn get_type<T>() -> Type {\n    let t: T = std::mem::zeroed();\n    std::meta::type_of(t)\n}\n"
        },
        "126": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/macros/functions/initialization_utils.nr",
            "source": "use crate::protocol::{\n    abis::function_selector::FunctionSelector,\n    address::AztecAddress,\n    constants::{\n        DOM_SEP__INITIALIZER, DOM_SEP__PRIVATE_INITIALIZATION_NULLIFIER, DOM_SEP__PUBLIC_INITIALIZATION_NULLIFIER,\n    },\n    hash::poseidon2_hash_with_separator,\n    traits::ToField,\n};\nuse std::meta::{ctstring::AsCtString, unquote};\n\nuse crate::{\n    context::{PrivateContext, PublicContext, UtilityContext},\n    macros::{\n        internals_functions_generation::external_functions_registry::get_public_functions, utils::fn_has_noinitcheck,\n    },\n    nullifier::utils::compute_nullifier_existence_request,\n    oracle::{\n        get_contract_instance::{\n            get_contract_instance, get_contract_instance_deployer_avm, get_contract_instance_initialization_hash_avm,\n        },\n        nullifiers::check_nullifier_exists,\n    },\n};\n\n/// The name of the auto-generated function that emits the public initialization nullifier.\n///\n/// This function is injected into the public dispatch table for contracts with initializers.\npub(crate) comptime global EMIT_PUBLIC_INIT_NULLIFIER_FN_NAME: Quoted = quote { __emit_public_init_nullifier };\n\n/// Returns `true` if the module has any public functions that require initialization checks (i.e. that don't have\n/// `#[noinitcheck]`). If all public functions skip initialization checks, there's no point emitting the public\n/// initialization nullifier since nothing will check it.\npub(crate) comptime fn has_public_init_checked_functions(m: Module) -> bool {\n    get_public_functions(m).any(|f: FunctionDefinition| !fn_has_noinitcheck(f))\n}\n\n/// Selector for `EMIT_PUBLIC_INIT_NULLIFIER_FN_NAME`, derived at comptime so it stays in sync.\nglobal EMIT_PUBLIC_INIT_NULLIFIER_SELECTOR: FunctionSelector = comptime {\n    let name = EMIT_PUBLIC_INIT_NULLIFIER_FN_NAME;\n    let sig = f\"{name}()\".as_ctstring();\n    unquote!(quote { FunctionSelector::from_signature($sig) })\n};\n\n/// Emits (only) the public initialization nullifier.\n///\n/// This function is called by the aztec-nr auto-generated external public contract function (enqueued by private\n/// [`initializer`](crate::macros::functions::initializer) functions), and also by\n/// [`mark_as_initialized_from_public_initializer`] for public initializers.\n///\n/// # Warning\n///\n/// This should not be called manually. Incorrect use can leave the contract in a broken initialization state (e.g.\n/// emitting the public nullifier without the private one). The macro-generated code handles this automatically.\npub fn mark_as_initialized_public(context: PublicContext) {\n    let init_nullifier = compute_public_initialization_nullifier(context.this_address());\n    context.push_nullifier(init_nullifier);\n}\n\nfn mark_as_initialized_private(context: &mut PrivateContext) {\n    let address = (*context).this_address();\n    let instance = get_contract_instance(address);\n    let init_nullifier = compute_private_initialization_nullifier(address, instance.initialization_hash);\n    context.push_nullifier(init_nullifier);\n}\n\n/// Emits the private initialization nullifier and, if relevant, enqueues the emission of the public one.\n///\n/// If the contract has public functions that perform initialization checks (i.e. that don't have `#[noinitcheck]`),\n/// this also enqueues a call to the auto-generated `__emit_public_init_nullifier` function so the public\n/// initialization nullifier is emitted in public. Called by private\n/// [`initializer`](crate::macros::functions::initializer) macros.\npub fn mark_as_initialized_from_private_initializer(context: &mut PrivateContext, emit_public_init_nullifier: bool) {\n    mark_as_initialized_private(context);\n    if emit_public_init_nullifier {\n        context.call_public_function((*context).this_address(), EMIT_PUBLIC_INIT_NULLIFIER_SELECTOR, [], false);\n    }\n}\n\n/// Emits both initialization nullifiers (private and public).\n///\n/// Called by public [`initializer`](crate::macros::functions::initializer) macros, since public initializers must set\n/// both so that both private and public functions see the contract as initialized.\npub fn mark_as_initialized_from_public_initializer(context: PublicContext) {\n    let address = context.this_address();\n    // `get_contract_instance_initialization_hash_avm` returns None when there is no deployed contract instance at the\n    // given address. This cannot happen here because we're querying `this_address()`, i.e. the contract that is\n    // currently executing, which by definition must have been deployed.\n    let init_hash = get_contract_instance_initialization_hash_avm(address).unwrap();\n    let private_nullifier = compute_private_initialization_nullifier(address, init_hash);\n    context.push_nullifier(private_nullifier);\n    mark_as_initialized_public(context);\n}\n\n/// Asserts that the contract has been initialized, from public's perspective.\n///\n/// Checks that the public initialization nullifier exists.\npub fn assert_is_initialized_public(context: PublicContext) {\n    let init_nullifier = compute_public_initialization_nullifier(context.this_address());\n    // Safety: the public initialization nullifier is only ever emitted by public functions, and so the timing\n    // concerns from nullifier_exists_unsafe do not apply. Additionally, it is emitted after all initializer\n    // functions have run, so initialization is guaranteed to be complete by the time it exists.\n    assert(context.nullifier_exists_unsafe(init_nullifier, context.this_address()), \"Not initialized\");\n}\n\n/// Asserts that the contract has been initialized, from private's perspective.\n///\n/// Checks that the private initialization nullifier exists.\npub fn assert_is_initialized_private(context: &mut PrivateContext) {\n    let address = context.this_address();\n    let instance = get_contract_instance(address);\n    let init_nullifier = compute_private_initialization_nullifier(address, instance.initialization_hash);\n    let nullifier_existence_request = compute_nullifier_existence_request(init_nullifier, address);\n    context.assert_nullifier_exists(nullifier_existence_request);\n}\n\n/// Asserts that the contract has been initialized, from a utility function's perspective.\n///\n/// Only checks the private initialization nullifier in the settled nullifier tree. Since both nullifiers are emitted\n/// in the same transaction, the private nullifier's presence in settled state guarantees the public one is also\n/// settled.\npub unconstrained fn assert_is_initialized_utility(context: UtilityContext) {\n    let address = context.this_address();\n    let instance = get_contract_instance(address);\n    let initialization_nullifier = compute_private_initialization_nullifier(address, instance.initialization_hash);\n    assert(check_nullifier_exists(initialization_nullifier), \"Not initialized\");\n}\n\n/// Computes the private initialization nullifier for a contract.\n///\n/// Including `init_hash` ensures that an observer who knows only the contract address cannot reconstruct this value\n/// and scan the nullifier tree to determine initialization status. `init_hash` is only known to parties that hold\n/// the contract instance.\npub fn compute_private_initialization_nullifier(address: AztecAddress, init_hash: Field) -> Field {\n    poseidon2_hash_with_separator(\n        [address.to_field(), init_hash],\n        DOM_SEP__PRIVATE_INITIALIZATION_NULLIFIER,\n    )\n}\n\nfn compute_public_initialization_nullifier(address: AztecAddress) -> Field {\n    poseidon2_hash_with_separator(\n        [address.to_field()],\n        DOM_SEP__PUBLIC_INITIALIZATION_NULLIFIER,\n    )\n}\n\n// Used by `create_assert_correct_initializer_args` (you won't find it through searching)\npub fn assert_initialization_matches_address_preimage_public(context: PublicContext) {\n    let address = context.this_address();\n    let deployer = get_contract_instance_deployer_avm(address).unwrap();\n    let initialization_hash = get_contract_instance_initialization_hash_avm(address).unwrap();\n    let expected_init = compute_initialization_hash(context.selector(), context.get_args_hash());\n    assert(initialization_hash == expected_init, \"Initialization hash does not match\");\n    assert(\n        (deployer.is_zero()) | (deployer == context.maybe_msg_sender().unwrap()),\n        \"Initializer address is not the contract deployer\",\n    );\n}\n\n// Used by `create_assert_correct_initializer_args` (you won't find it through searching)\npub fn assert_initialization_matches_address_preimage_private(context: PrivateContext) {\n    let address = context.this_address();\n    let instance = get_contract_instance(address);\n    let expected_init = compute_initialization_hash(context.selector(), context.get_args_hash());\n    assert(instance.initialization_hash == expected_init, \"Initialization hash does not match\");\n    assert(\n        (instance.deployer.is_zero()) | (instance.deployer == context.maybe_msg_sender().unwrap()),\n        \"Initializer address is not the contract deployer\",\n    );\n}\n\n/// This function is not only used in macros but it's also used by external people to check that an instance has been\n/// initialized with the correct constructor arguments. Don't hide this unless you implement factory functionality.\npub fn compute_initialization_hash(init_selector: FunctionSelector, init_args_hash: Field) -> Field {\n    poseidon2_hash_with_separator(\n        [init_selector.to_field(), init_args_hash],\n        DOM_SEP__INITIALIZER,\n    )\n}\n"
        },
        "132": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/macros/internals_functions_generation/external/private.nr",
            "source": "use crate::macros::{\n    functions::initialization_utils::has_public_init_checked_functions,\n    internals_functions_generation::external::helpers::{create_authorize_once_check, get_abi_relevant_attributes},\n    utils::{\n        fn_has_allow_phase_change, fn_has_authorize_once, fn_has_noinitcheck, is_fn_initializer, is_fn_only_self,\n        is_fn_view, module_has_initializer, module_has_storage,\n    },\n};\nuse crate::protocol::meta::utils::derive_serialization_quotes;\nuse std::meta::type_of;\n\npub(crate) comptime fn generate_private_external(f: FunctionDefinition) -> Quoted {\n    let module_has_initializer = module_has_initializer(f.module());\n    let module_has_storage = module_has_storage(f.module());\n\n    // Private functions undergo a lot of transformations from their Aztec.nr form into a circuit that can be fed to\n    // the Private Kernel Circuit. First we change the function signature so that it also receives\n    // `PrivateContextInputs`, which contain information about the execution context (e.g. the caller).\n    let original_params = f.parameters();\n\n    let original_params_quotes =\n        original_params.map(|(param_name, param_type)| quote { $param_name: $param_type }).join(quote {, });\n\n    let params = quote { inputs: aztec::context::inputs::PrivateContextInputs, $original_params_quotes };\n\n    let mut body = f.body().as_block().unwrap();\n\n    // The original params are hashed and passed to the `context` object, so that the kernel can verify we've received\n    // the correct values.\n    let (args_serialization, _, serialized_args_name) = derive_serialization_quotes(original_params, false);\n\n    let storage_init = if module_has_storage {\n        // Contract has Storage defined so we initialize it.\n        quote {\n            let storage = Storage::init(&mut context);\n        }\n    } else {\n        // Contract does not have Storage defined, so we set storage to the unit type `()`. ContractSelfPrivate\n        // requires a storage struct in its constructor. Using an Option type would lead to worse developer experience\n        // and higher constraint counts so we use the unit type `()` instead.\n        quote {\n            let storage = ();\n        }\n    };\n\n    let contract_self_creation = quote {\n        #[allow(unused_variables)]\n        let mut self = {\n            $args_serialization\n            let args_hash = aztec::hash::hash_args($serialized_args_name);\n            let mut context = aztec::context::PrivateContext::new(inputs, args_hash);\n            $storage_init\n            let self_address = context.this_address();\n            let call_self: CallSelf<&mut aztec::context::PrivateContext> = CallSelf { address: self_address, context: &mut context };\n            let enqueue_self: EnqueueSelf<&mut aztec::context::PrivateContext> = EnqueueSelf { address: self_address, context: &mut context };\n            let call_self_static: CallSelfStatic<&mut aztec::context::PrivateContext> = CallSelfStatic { address: self_address, context: &mut context };\n            let enqueue_self_static: EnqueueSelfStatic<&mut aztec::context::PrivateContext> = EnqueueSelfStatic { address: self_address, context: &mut context };\n            let internal: CallInternal<&mut aztec::context::PrivateContext> = CallInternal { context: &mut context };\n            aztec::contract_self::ContractSelfPrivate::new(&mut context, storage, call_self, enqueue_self, call_self_static, enqueue_self_static, internal)\n        };\n    };\n\n    let original_function_name = f.name();\n\n    // Modifications introduced by the different marker attributes.\n    let internal_check = if is_fn_only_self(f) {\n        let assertion_message = f\"Function {original_function_name} can only be called by the same contract\";\n        quote { assert(self.msg_sender() == self.address, $assertion_message); }\n    } else {\n        quote {}\n    };\n\n    let view_check = if is_fn_view(f) {\n        let assertion_message = f\"Function {original_function_name} can only be called statically\".as_quoted_str();\n        quote { assert(self.context.inputs.call_context.is_static_call, $assertion_message); }\n    } else {\n        quote {}\n    };\n\n    let (assert_initializer, mark_as_initialized) = if is_fn_initializer(f) {\n        let has_public_fns_with_init_check = has_public_init_checked_functions(f.module());\n        (\n            quote { aztec::macros::functions::initialization_utils::assert_initialization_matches_address_preimage_private(*self.context); },\n            quote { aztec::macros::functions::initialization_utils::mark_as_initialized_from_private_initializer(self.context, $has_public_fns_with_init_check); },\n        )\n    } else {\n        (quote {}, quote {})\n    };\n\n    // Initialization checks are not included in contracts that don't have initializers.\n    let init_check = if module_has_initializer & !is_fn_initializer(f) & !fn_has_noinitcheck(f) {\n        quote { aztec::macros::functions::initialization_utils::assert_is_initialized_private(self.context); }\n    } else {\n        quote {}\n    };\n\n    // Phase checks are skipped in functions that request to manually handle phases\n    let initial_phase_store = if fn_has_allow_phase_change(f) {\n        quote {}\n    } else {\n        quote { let within_revertible_phase: bool = self.context.in_revertible_phase(); }\n    };\n\n    let no_phase_change_check = if fn_has_allow_phase_change(f) {\n        quote {}\n    } else {\n        quote {   \n            assert_eq(\n                within_revertible_phase,\n                self.context.in_revertible_phase(),\n                f\"Phase change detected on function with phase check. If this is expected, use #[allow_phase_change]\",\n            ); \n        }\n    };\n\n    // Inject the authwit check if the function is marked with #[authorize_once].\n    let authorize_once_check = if fn_has_authorize_once(f) {\n        create_authorize_once_check(f, true)\n    } else {\n        quote {}\n    };\n\n    // Finally, we need to change the return type to be `PrivateCircuitPublicInputs`, which is what the Private Kernel\n    // circuit expects.\n    let return_value_var_name = quote { macro__returned__values };\n\n    let return_value_type = f.return_type();\n    let return_value = if body.len() == 0 {\n        quote {}\n    } else if return_value_type != type_of(()) {\n        // The original return value is serialized and hashed before being passed to the context.\n        let (body_without_return, last_body_expr) = body.pop_back();\n        let return_value = last_body_expr.quoted();\n        let return_value_assignment = quote { let $return_value_var_name: $return_value_type = $return_value; };\n\n        let (return_serialization, _, serialized_return_name) =\n            derive_serialization_quotes([(return_value_var_name, return_value_type)], false);\n\n        body = body_without_return;\n\n        quote {\n            $return_value_assignment\n            $return_serialization\n            self.context.set_return_hash($serialized_return_name);\n        }\n    } else {\n        let (body_without_return, last_body_expr) = body.pop_back();\n        if !last_body_expr.has_semicolon()\n            & last_body_expr.as_for().is_none()\n            & last_body_expr.as_assert().is_none()\n            & last_body_expr.as_for_range().is_none()\n            & last_body_expr.as_assert_eq().is_none()\n            & last_body_expr.as_let().is_none() {\n            let unused_return_value_name = f\"_{return_value_var_name}\".quoted_contents();\n            body = body_without_return.push_back(quote { let $unused_return_value_name = $last_body_expr; }\n                .as_expr()\n                .unwrap());\n        }\n        quote {}\n    };\n\n    let context_finish = quote { self.context.finish() };\n\n    // Preserve all attributes that are relevant to the function's ABI.\n    let abi_relevant_attributes = get_abi_relevant_attributes(f);\n\n    let fn_name = f\"__aztec_nr_internals__{original_function_name}\".quoted_contents();\n\n    let to_prepend = quote {\n        aztec::oracle::version::assert_compatible_oracle_version();\n        $contract_self_creation\n        $initial_phase_store\n        $assert_initializer\n        $init_check\n        $internal_check\n        $view_check\n        $authorize_once_check\n    };\n\n    let body_quote = body.map(|expr| expr.quoted()).join(quote { });\n\n    // `mark_as_initialized` is placed after the user's function body. If it ran at the beginning, the contract\n    // would appear initialized while the initializer is still running, allowing contracts called by the initializer\n    // to re-enter into a half-initialized contract.\n    let to_append = quote {\n        $return_value\n        $mark_as_initialized\n        $no_phase_change_check\n        $context_finish\n    };\n\n    quote {\n        #[aztec::macros::internals_functions_generation::abi_attributes::abi_private]\n        $abi_relevant_attributes\n        fn $fn_name($params) -> return_data aztec::protocol::abis::private_circuit_public_inputs::PrivateCircuitPublicInputs {\n            $to_prepend\n            $body_quote\n            $to_append\n        }\n    }\n}\n"
        },
        "133": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/macros/internals_functions_generation/external/public.nr",
            "source": "use crate::macros::{\n    internals_functions_generation::external::helpers::{create_authorize_once_check, get_abi_relevant_attributes},\n    utils::{\n        fn_has_authorize_once, fn_has_noinitcheck, is_fn_initializer, is_fn_only_self, is_fn_view,\n        module_has_initializer, module_has_storage,\n    },\n};\n\npub(crate) comptime fn generate_public_external(f: FunctionDefinition) -> Quoted {\n    let module_has_initializer = module_has_initializer(f.module());\n    let module_has_storage = module_has_storage(f.module());\n\n    // Public functions undergo a lot of transformations from their Aztec.nr form.\n    let original_params = f.parameters();\n\n    let args_len_quote = if original_params.len() == 0 {\n        // If the function has no parameters, we set the args_len to 0.\n        quote { 0 }\n    } else {\n        // The following will give us <type_of_struct_member_1 as Serialize>::N + <type_of_struct_member_2 as\n        // Serialize>::N + ...\n        original_params\n            .map(|(_, param_type): (Quoted, Type)| {\n                quote {\n            <$param_type as $crate::protocol::traits::Serialize>::N\n        }\n            })\n            .join(quote {+})\n    };\n\n    let storage_init = if module_has_storage {\n        quote {\n            let storage = Storage::init(context);\n        }\n    } else {\n        // Contract does not have Storage defined, so we set storage to the unit type `()`. ContractSelfPublic requires\n        // a storage struct in its constructor. Using an Option type would lead to worse developer experience and\n        // higher constraint counts so we use the unit type `()` instead.\n        quote {\n            let storage = ();\n        }\n    };\n\n    // Unlike in the private case, in public the `context` does not need to receive the hash of the original params.\n    let contract_self_creation = quote {\n        #[allow(unused_variables)]\n        let mut self = {\n            let context = aztec::context::PublicContext::new(|| {\n            // We start from 1 because we skip the selector for the dispatch function.\n            let serialized_args : [Field; $args_len_quote] = aztec::oracle::avm::calldata_copy(1, $args_len_quote);\n            aztec::hash::hash_args(serialized_args)\n            });\n            $storage_init\n            let self_address = context.this_address();\n            let call_self: CallSelf<aztec::context::PublicContext> = CallSelf { address: self_address, context };\n            let call_self_static: CallSelfStatic<aztec::context::PublicContext> = CallSelfStatic { address: self_address, context };\n            let internal: CallInternal<aztec::context::PublicContext> = CallInternal { context };\n            aztec::contract_self::ContractSelfPublic::new(context, storage, call_self, call_self_static, internal)\n        };\n    };\n\n    let original_function_name = f.name();\n\n    // Modifications introduced by the different marker attributes.\n    let internal_check = if is_fn_only_self(f) {\n        let assertion_message = f\"Function {original_function_name} can only be called by the same contract\";\n        quote { assert(self.msg_sender() == self.address, $assertion_message); }\n    } else {\n        quote {}\n    };\n\n    let view_check = if is_fn_view(f) {\n        let assertion_message = f\"Function {original_function_name} can only be called statically\".as_quoted_str();\n        quote { assert(self.context.is_static_call(), $assertion_message); }\n    } else {\n        quote {}\n    };\n\n    let (assert_initializer, mark_as_initialized) = if is_fn_initializer(f) {\n        (\n            quote { aztec::macros::functions::initialization_utils::assert_initialization_matches_address_preimage_public(self.context); },\n            quote { aztec::macros::functions::initialization_utils::mark_as_initialized_from_public_initializer(self.context); },\n        )\n    } else {\n        (quote {}, quote {})\n    };\n\n    // Initialization checks are not included in contracts that don't have initializers.\n    let init_check = if module_has_initializer & !fn_has_noinitcheck(f) & !is_fn_initializer(f) {\n        quote { aztec::macros::functions::initialization_utils::assert_is_initialized_public(self.context); }\n    } else {\n        quote {}\n    };\n\n    // Inject the authwit check if the function is marked with #[authorize_once].\n    let authorize_once_check = if fn_has_authorize_once(f) {\n        create_authorize_once_check(f, false)\n    } else {\n        quote {}\n    };\n\n    let to_prepend = quote {\n        $contract_self_creation\n        $assert_initializer\n        $init_check\n        $internal_check\n        $view_check\n        $authorize_once_check\n    };\n\n    // `mark_as_initialized` is placed after the user's function body. If it ran at the beginning, the contract\n    // would appear initialized while the initializer is still running, allowing contracts called by the initializer\n    // to re-enter into a half-initialized contract.\n    let to_append = quote {\n        $mark_as_initialized\n    };\n\n    let fn_name = f\"__aztec_nr_internals__{original_function_name}\".quoted_contents();\n    let body = f.body();\n    let return_type = f.return_type();\n\n    // New function parameters are the same as the original function's ones.\n    let params = original_params.map(|(param_name, param_type)| quote { $param_name: $param_type }).join(quote {, });\n\n    // Preserve all attributes that are relevant to the function's ABI.\n    let abi_relevant_attributes = get_abi_relevant_attributes(f);\n\n    // All public functions are automatically made unconstrained, even if they were not marked as such. This is because\n    // instead of compiling into a circuit, they will compile to bytecode that will be later transpiled into AVM\n    // bytecode.\n    quote {\n        #[aztec::macros::internals_functions_generation::abi_attributes::abi_public]\n        $abi_relevant_attributes\n        unconstrained fn $fn_name($params) -> pub $return_type {\n            $to_prepend\n            $body\n            $to_append\n        }\n    }\n}\n"
        },
        "143": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/messages/discovery/mod.nr",
            "source": "use crate::logging::{aztecnr_debug_log, aztecnr_debug_log_format, aztecnr_warn_log_format};\nuse crate::protocol::address::AztecAddress;\n\npub(crate) mod nonce_discovery;\npub(crate) mod partial_notes;\npub(crate) mod private_events;\npub mod private_notes;\npub mod process_message;\n\nuse crate::{\n    capsules::CapsuleArray,\n    messages::{\n        discovery::process_message::process_message_ciphertext,\n        encoding::MAX_MESSAGE_CONTENT_LEN,\n        logs::note::MAX_NOTE_PACKED_LEN,\n        processing::{\n            get_private_logs, MessageContext, offchain::OffchainInboxSync, OffchainMessageWithContext,\n            pending_tagged_log::PendingTaggedLog, validate_and_store_enqueued_notes_and_events,\n        },\n    },\n    utils::array,\n};\n\npub struct NoteHashAndNullifier {\n    /// The result of [`crate::note::note_interface::NoteHash::compute_note_hash`].\n    pub note_hash: Field,\n    /// The result of [`crate::note::note_interface::NoteHash::compute_nullifier_unconstrained`].\n    ///\n    /// This value is unconstrained, as all of message discovery is unconstrained. It is `None` if the nullifier\n    /// cannot be computed (e.g. because the nullifier hiding key is not available).\n    pub inner_nullifier: Option<Field>,\n}\n\n/// A contract's way of computing note hashes.\n///\n/// Each contract in the network is free to compute their note's hash as they see fit - the hash function itself is not\n/// enshrined or standardized. Some aztec-nr functions however do need to know the details of this computation (e.g.\n/// when finding new notes), which is what this type represents.\n///\n/// This function takes a note's packed content, storage slot, note type ID, address of the emitting contract and\n/// randomness, and attempts to compute its inner note hash (not siloed by address nor uniqued by nonce).\n///\n/// ## Transient Notes\n///\n/// This function is meant to always be used on **settled** notes, i.e. those that have been inserted into the trees\n/// and for which the nonce is known. It is never invoked in the context of a transient note, as those are not involved\n/// in message processing.\n///\n/// ## Automatic Implementation\n///\n/// The [`[#aztec]`](crate::macros::aztec::aztec) macro automatically creates a correct implementation of this function\n/// for each contract by inspecting all note types in use and the storage layout. This injected function is a\n/// `#[contract_library_method]` called `_compute_note_hash`, and it looks something like this:\n///\n/// ```noir\n/// |packed_note, owner, storage_slot, note_type_id, _contract_address, randomness| {\n///     if note_type_id == MyNoteType::get_id() {\n///         if packed_note.len() != MY_NOTE_TYPE_SERIALIZATION_LENGTH {\n///             Option::none()\n///         } else {\n///             let note = MyNoteType::unpack(aztec::utils::array::subarray(packed_note.storage(), 0));\n///             Option::some(note.compute_note_hash(owner, storage_slot, randomness))\n///         }\n///     } else if note_type_id == MyOtherNoteType::get_id() {\n///           ... // Similar to above but calling MyOtherNoteType::unpack\n///     } else {\n///         Option::none() // Unknown note type ID\n///     };\n/// }\n/// ```\npub type ComputeNoteHash = unconstrained fn(/* packed_note */BoundedVec<Field, MAX_NOTE_PACKED_LEN>, /*\n owner */ AztecAddress, /* storage_slot */ Field, /* note_type_id */ Field, /* contract_address */ AztecAddress, /*\nrandomness */ Field) -> Option<Field>;\n\n/// A contract's way of computing note nullifiers.\n///\n/// Like [`ComputeNoteHash`], each contract is free to derive nullifiers as they see fit. This function takes the\n/// unique note hash (used as the note hash for nullification for settled notes), plus the note's packed content and\n/// metadata, and attempts to compute the inner nullifier (not siloed by address).\n///\n/// ## Automatic Implementation\n///\n/// The [`[#aztec]`](crate::macros::aztec::aztec) macro automatically creates a correct implementation of this function\n/// for each contract called `_compute_note_nullifier`. It dispatches on `note_type_id` similarly to\n/// [`ComputeNoteHash`], then calls the note's\n/// [`compute_nullifier_unconstrained`](crate::note::note_interface::NoteHash::compute_nullifier_unconstrained) method.\npub type ComputeNoteNullifier = unconstrained fn(/* unique_note_hash */Field, /* packed_note */ BoundedVec<Field, MAX_NOTE_PACKED_LEN>,\n/* owner */ AztecAddress, /* storage_slot */ Field, /* note_type_id */ Field, /* contract_address */ AztecAddress,\n/* randomness */ Field) -> Option<Field>;\n\n/// Deprecated: use [`ComputeNoteHash`] and [`ComputeNoteNullifier`] instead.\npub type ComputeNoteHashAndNullifier<Env> = unconstrained fn[Env](/* packed_note */BoundedVec<Field, MAX_NOTE_PACKED_LEN>,\n/* owner */ AztecAddress, /* storage_slot */ Field, /* note_type_id */ Field, /* contract_address */ AztecAddress,\n/*randomness */ Field, /* note nonce */ Field) -> Option<NoteHashAndNullifier>;\n\n/// A handler for custom messages.\n///\n/// Contracts that emit custom messages (i.e. any with a message type that is not in [`crate::messages::msg_type`])\n/// need to use [`crate::macros::AztecConfig::custom_message_handler`] with a function of this type in order to\n/// process them. They will otherwise be **silently ignored**.\npub type CustomMessageHandler<Env> = unconstrained fn[Env](\n/* contract_address */AztecAddress,\n/* msg_type_id */ u64,\n/* msg_metadata */ u64,\n/* msg_content */ BoundedVec<Field, MAX_MESSAGE_CONTENT_LEN>,\n/* message_context */ MessageContext,\n/* scope */ AztecAddress);\n\n/// Synchronizes the contract's private state with the network.\n///\n/// As blocks are mined, it is possible for a contract's private state to change (e.g. with new notes being created),\n/// but because these changes are private they will be invisible to most actors. This is the function that processes\n/// new transactions in order to discover new notes, events, and other kinds of private state changes.\n///\n/// The private state will be synchronized up to the block that will be used for private transactions (i.e. the anchor\n/// block. This will typically be close to the tip of the chain.\npub unconstrained fn do_sync_state<CustomMessageHandlerEnv>(\n    contract_address: AztecAddress,\n    compute_note_hash: ComputeNoteHash,\n    compute_note_nullifier: ComputeNoteNullifier,\n    process_custom_message: Option<CustomMessageHandler<CustomMessageHandlerEnv>>,\n    offchain_inbox_sync: Option<OffchainInboxSync<()>>,\n    scope: AztecAddress,\n) {\n    aztecnr_debug_log!(\"Performing state synchronization\");\n\n    // First we process all private logs, which can contain different kinds of messages e.g. private notes, partial\n    // notes, private events, etc.\n    let logs = get_private_logs(contract_address, scope);\n    logs.for_each(|i, pending_tagged_log: PendingTaggedLog| {\n        if pending_tagged_log.log.len() == 0 {\n            aztecnr_warn_log_format!(\"Skipping empty log from tx {0}\")([pending_tagged_log.context.tx_hash]);\n        } else {\n            aztecnr_debug_log_format!(\"Processing log with tag {0}\")([pending_tagged_log.log.get(0)]);\n\n            // We remove the tag from the pending tagged log and process the message ciphertext contained in it.\n            let message_ciphertext = array::subbvec(pending_tagged_log.log, 1);\n\n            process_message_ciphertext(\n                contract_address,\n                compute_note_hash,\n                compute_note_nullifier,\n                process_custom_message,\n                message_ciphertext,\n                pending_tagged_log.context,\n                scope,\n            );\n        }\n\n        // We need to delete each log from the array so that we won't process them again. `CapsuleArray::for_each`\n        // allows deletion of the current element during iteration, so this is safe.\n        // Note that this (and all other database changes) will only be committed if contract execution succeeds,\n        // including any enqueued validation requests.\n        logs.remove(i);\n    });\n\n    if offchain_inbox_sync.is_some() {\n        let msgs: CapsuleArray<OffchainMessageWithContext> = offchain_inbox_sync.unwrap()(contract_address, scope);\n        msgs.for_each(|i, msg| {\n            process_message_ciphertext(\n                contract_address,\n                compute_note_hash,\n                compute_note_nullifier,\n                process_custom_message,\n                msg.message_ciphertext,\n                msg.message_context,\n                scope,\n            );\n            // The inbox sync returns _a copy_ of messages to process, so we clear them as we do so. This is a\n            // volatile array with the to-process message, not the actual persistent storage of them.\n            msgs.remove(i);\n        });\n    }\n\n    // Then we process all pending partial notes, regardless of whether they were found in the current or previous\n    // executions.\n    partial_notes::fetch_and_process_partial_note_completion_logs(\n        contract_address,\n        compute_note_hash,\n        compute_note_nullifier,\n        scope,\n    );\n\n    // Finally we validate all notes and events that were found as part of the previous processes, resulting in them\n    // being added to PXE's database and retrievable via oracles (get_notes) and our TS API (PXE::getPrivateEvents).\n    validate_and_store_enqueued_notes_and_events(contract_address, scope);\n}\n\nmod test {\n    use crate::{\n        capsules::CapsuleArray,\n        messages::{\n            discovery::{CustomMessageHandler, do_sync_state},\n            logs::note::MAX_NOTE_PACKED_LEN,\n            processing::{\n                offchain::OffchainInboxSync, pending_tagged_log::PendingTaggedLog, PENDING_TAGGED_LOG_ARRAY_BASE_SLOT,\n            },\n        },\n        test::helpers::test_environment::TestEnvironment,\n    };\n    use crate::protocol::address::AztecAddress;\n\n    global SCOPE: AztecAddress = AztecAddress { inner: 0xcafe };\n\n    #[test]\n    unconstrained fn do_sync_state_does_not_panic_on_empty_logs() {\n        let env = TestEnvironment::new();\n\n        let contract_address = AztecAddress { inner: 0xdeadbeef };\n\n        env.utility_context_at(contract_address, |_| {\n            let base_slot = PENDING_TAGGED_LOG_ARRAY_BASE_SLOT;\n\n            let logs: CapsuleArray<PendingTaggedLog> = CapsuleArray::at(contract_address, base_slot, SCOPE);\n            logs.push(PendingTaggedLog { log: BoundedVec::new(), context: std::mem::zeroed() });\n            assert_eq(logs.len(), 1);\n\n            let no_inbox_sync: Option<OffchainInboxSync<()>> = Option::none();\n            let no_handler: Option<CustomMessageHandler<()>> = Option::none();\n            do_sync_state(\n                contract_address,\n                dummy_compute_note_hash,\n                dummy_compute_note_nullifier,\n                no_handler,\n                no_inbox_sync,\n                SCOPE,\n            );\n\n            assert_eq(logs.len(), 0);\n        });\n    }\n\n    unconstrained fn dummy_compute_note_hash(\n        _packed_note: BoundedVec<Field, MAX_NOTE_PACKED_LEN>,\n        _owner: AztecAddress,\n        _storage_slot: Field,\n        _note_type_id: Field,\n        _contract_address: AztecAddress,\n        _randomness: Field,\n    ) -> Option<Field> {\n        Option::none()\n    }\n\n    unconstrained fn dummy_compute_note_nullifier(\n        _unique_note_hash: Field,\n        _packed_note: BoundedVec<Field, MAX_NOTE_PACKED_LEN>,\n        _owner: AztecAddress,\n        _storage_slot: Field,\n        _note_type_id: Field,\n        _contract_address: AztecAddress,\n        _randomness: Field,\n    ) -> Option<Field> {\n        Option::none()\n    }\n}\n"
        },
        "144": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/messages/discovery/nonce_discovery.nr",
            "source": "use crate::messages::{discovery::{ComputeNoteHash, ComputeNoteNullifier}, logs::note::MAX_NOTE_PACKED_LEN};\n\nuse crate::logging::{aztecnr_debug_log_format, aztecnr_warn_log_format};\nuse crate::protocol::{\n    address::AztecAddress,\n    constants::MAX_NOTE_HASHES_PER_TX,\n    hash::{compute_note_hash_nonce, compute_siloed_note_hash, compute_unique_note_hash},\n    traits::ToField,\n};\n\n/// A struct with the discovered information of a complete note, required for delivery to PXE. Note that this is *not*\n/// the complete note information, since it does not include content, storage slot, etc.\npub(crate) struct DiscoveredNoteInfo {\n    pub(crate) note_nonce: Field,\n    pub(crate) note_hash: Field,\n    pub(crate) inner_nullifier: Field,\n}\n\n/// Searches for note nonces that will result in a note that was emitted in a transaction. While rare, it is possible\n/// for multiple notes to have the exact same packed content and storage slot but different nonces, resulting in\n/// different unique note hashes. Because of this this function returns a *vector* of discovered notes, though in most\n/// cases it will contain a single element.\n///\n/// Due to how nonces are computed, this function requires knowledge of the transaction in which the note was created,\n/// more specifically the list of all unique note hashes in it plus the value of its first nullifier.\npub(crate) unconstrained fn attempt_note_nonce_discovery(\n    unique_note_hashes_in_tx: BoundedVec<Field, MAX_NOTE_HASHES_PER_TX>,\n    first_nullifier_in_tx: Field,\n    compute_note_hash: ComputeNoteHash,\n    compute_note_nullifier: ComputeNoteNullifier,\n    contract_address: AztecAddress,\n    owner: AztecAddress,\n    storage_slot: Field,\n    randomness: Field,\n    note_type_id: Field,\n    packed_note: BoundedVec<Field, MAX_NOTE_PACKED_LEN>,\n) -> BoundedVec<DiscoveredNoteInfo, MAX_NOTE_HASHES_PER_TX> {\n    let discovered_notes = &mut BoundedVec::new();\n\n    aztecnr_debug_log_format!(\n        \"Attempting nonce discovery on {0} potential notes on contract {1} for storage slot {2}\",\n    )(\n        [unique_note_hashes_in_tx.len() as Field, contract_address.to_field(), storage_slot],\n    );\n\n    let maybe_note_hash = compute_note_hash(\n        packed_note,\n        owner,\n        storage_slot,\n        note_type_id,\n        contract_address,\n        randomness,\n    );\n\n    if maybe_note_hash.is_none() {\n        aztecnr_warn_log_format!(\n            \"Unable to compute note hash for note of id {0} with packed length {1}, skipping nonce discovery\",\n        )(\n            [note_type_id, packed_note.len() as Field],\n        );\n    } else {\n        let note_hash = maybe_note_hash.unwrap();\n        let siloed_note_hash = compute_siloed_note_hash(contract_address, note_hash);\n\n        // We need to find nonces (typically just one) that result in the siloed note hash that being uniqued into one\n        // of the transaction's effects.\n        // The nonce is meant to be derived from the index of the note hash in the transaction effects array. However,\n        // due to an issue in the kernels the nonce might actually use any of the possible note hash indices - not\n        // necessarily the one that corresponds to the note hash. Hence, we need to try them all.\n        for i in 0..MAX_NOTE_HASHES_PER_TX {\n            let nonce_for_i = compute_note_hash_nonce(first_nullifier_in_tx, i);\n            let unique_note_hash_for_i = compute_unique_note_hash(nonce_for_i, siloed_note_hash);\n\n            let matching_notes = bvec_filter(\n                unique_note_hashes_in_tx,\n                |unique_note_hash_in_tx| unique_note_hash_in_tx == unique_note_hash_for_i,\n            );\n            if matching_notes.len() > 1 {\n                let identical_note_hashes = matching_notes.len();\n                // Note that we don't actually check that the note hashes array contains unique values, only that the\n                // note we found is unique. We don't expect for this to ever happen (it'd indicate a malicious node or\n                // PXE, which are both assumed to be cooperative) so testing for it just in case is unnecessary, but we\n                // _do_ need to handle it if we find a duplicate.\n                panic(\n                    f\"Received {identical_note_hashes} identical note hashes for a transaction - these should all be unique\",\n                )\n            } else if matching_notes.len() == 1 {\n                let maybe_inner_nullifier_for_i = compute_note_nullifier(\n                    unique_note_hash_for_i,\n                    packed_note,\n                    owner,\n                    storage_slot,\n                    note_type_id,\n                    contract_address,\n                    randomness,\n                );\n\n                if maybe_inner_nullifier_for_i.is_none() {\n                    // TODO: down the line we want to be able to store notes for which we don't know their nullifier,\n                    // e.g. notes that belong to someone that is not us (and for which we therefore don't know their\n                    // associated app-siloed nullifer hiding secret key).\n                    // https://linear.app/aztec-labs/issue/F-265/store-external-notes\n                    aztecnr_warn_log_format!(\n                        \"Unable to compute nullifier of unique note {0} with note type id {1} and owner {2}, skipping PXE insertion\",\n                    )(\n                        [unique_note_hash_for_i, note_type_id, owner.to_field()],\n                    );\n                } else {\n                    // Note that while we did check that the note hash is the preimage of a unique note hash, we\n                    // perform no validations on the nullifier - we fundamentally cannot, since only the application\n                    // knows how to compute nullifiers. We simply trust it to have provided the correct one: if it\n                    // hasn't, then PXE may fail to realize that a given note has been nullified already, and calls to\n                    // the application could result in invalid transactions (with duplicate nullifiers). This is not a\n                    // concern because an application already has more direct means of making a call to it fail the\n                    // transaction.\n                    discovered_notes.push(\n                        DiscoveredNoteInfo {\n                            note_nonce: nonce_for_i,\n                            note_hash,\n                            inner_nullifier: maybe_inner_nullifier_for_i.unwrap(),\n                        },\n                    );\n                }\n                // We don't exit the loop - it is possible (though rare) for the exact same note content to be present\n                // multiple times in the same transaction with different nonces. This typically doesn't happen due to\n                // notes containing random values in order to hide their contents.\n            }\n        }\n    }\n\n    *discovered_notes\n}\n\n// There is no BoundedVec::filter in the stdlib, so we use this until that is implemented.\nunconstrained fn bvec_filter<Env, T, let MAX_LEN: u32>(\n    bvec: BoundedVec<T, MAX_LEN>,\n    filter: fn[Env](T) -> bool,\n) -> BoundedVec<T, MAX_LEN> {\n    let filtered = &mut BoundedVec::new();\n\n    bvec.for_each(|value| {\n        if filter(value) {\n            filtered.push(value);\n        }\n    });\n\n    *filtered\n}\n\nmod test {\n    use crate::{\n        messages::logs::note::MAX_NOTE_PACKED_LEN,\n        note::{\n            note_interface::{NoteHash, NoteType},\n            note_metadata::SettledNoteMetadata,\n            utils::compute_note_hash_for_nullification,\n        },\n        oracle::random::random,\n        test::mocks::mock_note::MockNote,\n        utils::array,\n    };\n\n    use crate::protocol::{\n        address::AztecAddress,\n        hash::{compute_note_hash_nonce, compute_siloed_note_hash, compute_unique_note_hash},\n        traits::{FromField, Packable},\n    };\n\n    use super::attempt_note_nonce_discovery;\n\n    // This implementation could be simpler, but this serves as a nice example of the expected flow in a real\n    // implementation, and as a sanity check that the interface is sufficient.\n\n    unconstrained fn compute_note_hash(\n        packed_note: BoundedVec<Field, MAX_NOTE_PACKED_LEN>,\n        owner: AztecAddress,\n        storage_slot: Field,\n        note_type_id: Field,\n        _contract_address: AztecAddress,\n        randomness: Field,\n    ) -> Option<Field> {\n        if (note_type_id == MockNote::get_id()) & (packed_note.len() == <MockNote as Packable>::N) {\n            let note = MockNote::unpack(array::subarray(packed_note.storage(), 0));\n            Option::some(note.compute_note_hash(owner, storage_slot, randomness))\n        } else {\n            Option::none()\n        }\n    }\n\n    unconstrained fn compute_note_nullifier(\n        unique_note_hash: Field,\n        packed_note: BoundedVec<Field, MAX_NOTE_PACKED_LEN>,\n        owner: AztecAddress,\n        _storage_slot: Field,\n        note_type_id: Field,\n        _contract_address: AztecAddress,\n        _randomness: Field,\n    ) -> Option<Field> {\n        if (note_type_id == MockNote::get_id()) & (packed_note.len() == <MockNote as Packable>::N) {\n            let note = MockNote::unpack(array::subarray(packed_note.storage(), 0));\n            note.compute_nullifier_unconstrained(owner, unique_note_hash)\n        } else {\n            Option::none()\n        }\n    }\n\n    global VALUE: Field = 7;\n    global FIRST_NULLIFIER_IN_TX: Field = 47;\n    global CONTRACT_ADDRESS: AztecAddress = AztecAddress::from_field(13);\n    global OWNER: AztecAddress = AztecAddress::from_field(14);\n    global STORAGE_SLOT: Field = 99;\n    global RANDOMNESS: Field = 99;\n\n    #[test]\n    unconstrained fn no_note_hashes() {\n        let unique_note_hashes_in_tx = BoundedVec::new();\n        let packed_note = BoundedVec::new();\n\n        let discovered_notes = attempt_note_nonce_discovery(\n            unique_note_hashes_in_tx,\n            FIRST_NULLIFIER_IN_TX,\n            compute_note_hash,\n            compute_note_nullifier,\n            CONTRACT_ADDRESS,\n            OWNER,\n            STORAGE_SLOT,\n            RANDOMNESS,\n            MockNote::get_id(),\n            packed_note,\n        );\n\n        assert_eq(discovered_notes.len(), 0);\n    }\n\n    #[test]\n    unconstrained fn failed_hash_computation_is_ignored() {\n        let unique_note_hashes_in_tx = BoundedVec::from_array([random()]);\n\n        let discovered_notes = attempt_note_nonce_discovery(\n            unique_note_hashes_in_tx,\n            FIRST_NULLIFIER_IN_TX,\n            |_, _, _, _, _, _| Option::none(),\n            compute_note_nullifier,\n            CONTRACT_ADDRESS,\n            OWNER,\n            STORAGE_SLOT,\n            RANDOMNESS,\n            MockNote::get_id(),\n            BoundedVec::new(),\n        );\n\n        assert_eq(discovered_notes.len(), 0);\n    }\n\n    #[test]\n    unconstrained fn failed_nullifier_computation_is_ignored() {\n        let note_index_in_tx = 2;\n        let note_and_data = construct_note(VALUE, note_index_in_tx);\n\n        let mut unique_note_hashes_in_tx = BoundedVec::from_array([\n            random(), random(), random(), random(), random(), random(), random(),\n        ]);\n        unique_note_hashes_in_tx.set(note_index_in_tx, note_and_data.unique_note_hash);\n\n        let discovered_notes = attempt_note_nonce_discovery(\n            unique_note_hashes_in_tx,\n            FIRST_NULLIFIER_IN_TX,\n            compute_note_hash,\n            |_, _, _, _, _, _, _| Option::none(),\n            CONTRACT_ADDRESS,\n            OWNER,\n            STORAGE_SLOT,\n            RANDOMNESS,\n            MockNote::get_id(),\n            BoundedVec::from_array(note_and_data.note.pack()),\n        );\n\n        assert_eq(discovered_notes.len(), 0);\n    }\n\n    struct NoteAndData {\n        note: MockNote,\n        note_nonce: Field,\n        note_hash: Field,\n        unique_note_hash: Field,\n        inner_nullifier: Field,\n    }\n\n    unconstrained fn construct_note(value: Field, note_index_in_tx: u32) -> NoteAndData {\n        let note_nonce = compute_note_hash_nonce(FIRST_NULLIFIER_IN_TX, note_index_in_tx);\n\n        let hinted_note = MockNote::new(value)\n            .contract_address(CONTRACT_ADDRESS)\n            .owner(OWNER)\n            .randomness(RANDOMNESS)\n            .storage_slot(STORAGE_SLOT)\n            .note_metadata(SettledNoteMetadata::new(note_nonce).into())\n            .build_hinted_note();\n        let note = hinted_note.note;\n\n        let note_hash = note.compute_note_hash(OWNER, STORAGE_SLOT, RANDOMNESS);\n        let unique_note_hash = compute_unique_note_hash(\n            note_nonce,\n            compute_siloed_note_hash(CONTRACT_ADDRESS, note_hash),\n        );\n        let inner_nullifier = note\n            .compute_nullifier_unconstrained(OWNER, compute_note_hash_for_nullification(hinted_note))\n            .expect(f\"Could not compute nullifier for note owned by {OWNER}\");\n\n        NoteAndData { note, note_nonce, note_hash, unique_note_hash, inner_nullifier }\n    }\n\n    #[test]\n    unconstrained fn single_note() {\n        let note_index_in_tx = 2;\n        let note_and_data = construct_note(VALUE, note_index_in_tx);\n\n        let mut unique_note_hashes_in_tx = BoundedVec::from_array([\n            random(), random(), random(), random(), random(), random(), random(),\n        ]);\n        unique_note_hashes_in_tx.set(note_index_in_tx, note_and_data.unique_note_hash);\n\n        let discovered_notes = attempt_note_nonce_discovery(\n            unique_note_hashes_in_tx,\n            FIRST_NULLIFIER_IN_TX,\n            compute_note_hash,\n            compute_note_nullifier,\n            CONTRACT_ADDRESS,\n            OWNER,\n            STORAGE_SLOT,\n            RANDOMNESS,\n            MockNote::get_id(),\n            BoundedVec::from_array(note_and_data.note.pack()),\n        );\n\n        assert_eq(discovered_notes.len(), 1);\n        let discovered_note = discovered_notes.get(0);\n\n        assert_eq(discovered_note.note_nonce, note_and_data.note_nonce);\n        assert_eq(discovered_note.note_hash, note_and_data.note_hash);\n        assert_eq(discovered_note.inner_nullifier, note_and_data.inner_nullifier);\n    }\n\n    #[test]\n    unconstrained fn multiple_notes_same_preimage() {\n        let first_note_index_in_tx = 3;\n        let first_note_and_data = construct_note(VALUE, first_note_index_in_tx);\n\n        let second_note_index_in_tx = 5;\n        let second_note_and_data = construct_note(VALUE, second_note_index_in_tx);\n\n        // Both notes have the same preimage (and therefore packed representation), so both should be found in the same\n        // call.\n        assert_eq(first_note_and_data.note, second_note_and_data.note);\n        let packed_note = first_note_and_data.note.pack();\n\n        let mut unique_note_hashes_in_tx = BoundedVec::from_array([\n            random(), random(), random(), random(), random(), random(), random(),\n        ]);\n        unique_note_hashes_in_tx.set(first_note_index_in_tx, first_note_and_data.unique_note_hash);\n        unique_note_hashes_in_tx.set(second_note_index_in_tx, second_note_and_data.unique_note_hash);\n\n        let discovered_notes = attempt_note_nonce_discovery(\n            unique_note_hashes_in_tx,\n            FIRST_NULLIFIER_IN_TX,\n            compute_note_hash,\n            compute_note_nullifier,\n            CONTRACT_ADDRESS,\n            OWNER,\n            STORAGE_SLOT,\n            RANDOMNESS,\n            MockNote::get_id(),\n            BoundedVec::from_array(packed_note),\n        );\n\n        assert_eq(discovered_notes.len(), 2);\n\n        assert(discovered_notes.any(|discovered_note| {\n            (discovered_note.note_nonce == first_note_and_data.note_nonce)\n                & (discovered_note.note_hash == first_note_and_data.note_hash)\n                & (discovered_note.inner_nullifier == first_note_and_data.inner_nullifier)\n        }));\n\n        assert(discovered_notes.any(|discovered_note| {\n            (discovered_note.note_nonce == second_note_and_data.note_nonce)\n                & (discovered_note.note_hash == second_note_and_data.note_hash)\n                & (discovered_note.inner_nullifier == second_note_and_data.inner_nullifier)\n        }));\n    }\n\n    #[test]\n    unconstrained fn single_note_misaligned_nonce() {\n        let note_index_in_tx = 2;\n        let note_and_data = construct_note(VALUE, note_index_in_tx);\n\n        let mut unique_note_hashes_in_tx = BoundedVec::from_array([\n            random(), random(), random(), random(), random(), random(), random(),\n        ]);\n\n        // The note is not at the correct index\n        unique_note_hashes_in_tx.set(note_index_in_tx + 1, note_and_data.unique_note_hash);\n\n        let discovered_notes = attempt_note_nonce_discovery(\n            unique_note_hashes_in_tx,\n            FIRST_NULLIFIER_IN_TX,\n            compute_note_hash,\n            compute_note_nullifier,\n            CONTRACT_ADDRESS,\n            OWNER,\n            STORAGE_SLOT,\n            RANDOMNESS,\n            MockNote::get_id(),\n            BoundedVec::from_array(note_and_data.note.pack()),\n        );\n\n        assert_eq(discovered_notes.len(), 1);\n        let discovered_note = discovered_notes.get(0);\n\n        assert_eq(discovered_note.note_nonce, note_and_data.note_nonce);\n        assert_eq(discovered_note.note_hash, note_and_data.note_hash);\n        assert_eq(discovered_note.inner_nullifier, note_and_data.inner_nullifier);\n    }\n\n    #[test]\n    unconstrained fn single_note_nonce_with_index_past_note_hashes_in_tx() {\n        let mut unique_note_hashes_in_tx = BoundedVec::from_array([\n            random(), random(), random(), random(), random(), random(), random(),\n        ]);\n\n        // The nonce is computed with an index that does not exist in the tx\n        let note_index_in_tx = unique_note_hashes_in_tx.len() + 5;\n        let note_and_data = construct_note(VALUE, note_index_in_tx);\n\n        // The note is inserted at an arbitrary index - its true index is out of the array's bounds\n        unique_note_hashes_in_tx.set(2, note_and_data.unique_note_hash);\n\n        let discovered_notes = attempt_note_nonce_discovery(\n            unique_note_hashes_in_tx,\n            FIRST_NULLIFIER_IN_TX,\n            compute_note_hash,\n            compute_note_nullifier,\n            CONTRACT_ADDRESS,\n            OWNER,\n            STORAGE_SLOT,\n            RANDOMNESS,\n            MockNote::get_id(),\n            BoundedVec::from_array(note_and_data.note.pack()),\n        );\n\n        assert_eq(discovered_notes.len(), 1);\n        let discovered_note = discovered_notes.get(0);\n\n        assert_eq(discovered_note.note_nonce, note_and_data.note_nonce);\n        assert_eq(discovered_note.note_hash, note_and_data.note_hash);\n        assert_eq(discovered_note.inner_nullifier, note_and_data.inner_nullifier);\n    }\n\n    #[test(should_fail_with = \"identical note hashes for a transaction\")]\n    unconstrained fn duplicate_unique_note_hashes() {\n        let note_index_in_tx = 2;\n        let note_and_data = construct_note(VALUE, note_index_in_tx);\n\n        let mut unique_note_hashes_in_tx = BoundedVec::from_array([\n            random(), random(), random(), random(), random(), random(), random(),\n        ]);\n\n        // The same unique note hash is present in two indices in the array, which is not allowed. Note that we don't\n        // test all note hashes for uniqueness, only those that we actually find.\n        unique_note_hashes_in_tx.set(note_index_in_tx, note_and_data.unique_note_hash);\n        unique_note_hashes_in_tx.set(note_index_in_tx + 1, note_and_data.unique_note_hash);\n\n        let _ = attempt_note_nonce_discovery(\n            unique_note_hashes_in_tx,\n            FIRST_NULLIFIER_IN_TX,\n            compute_note_hash,\n            compute_note_nullifier,\n            CONTRACT_ADDRESS,\n            OWNER,\n            STORAGE_SLOT,\n            RANDOMNESS,\n            MockNote::get_id(),\n            BoundedVec::from_array(note_and_data.note.pack()),\n        );\n    }\n}\n"
        },
        "145": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/messages/discovery/partial_notes.nr",
            "source": "use crate::{\n    capsules::CapsuleArray,\n    messages::{\n        discovery::{ComputeNoteHash, ComputeNoteNullifier, nonce_discovery::attempt_note_nonce_discovery},\n        encoding::MAX_MESSAGE_CONTENT_LEN,\n        logs::partial_note::{decode_partial_note_private_message, MAX_PARTIAL_NOTE_PRIVATE_PACKED_LEN},\n        processing::{\n            enqueue_note_for_validation,\n            get_pending_partial_notes_completion_logs,\n            log_retrieval_response::{LogRetrievalResponse, MAX_LOG_CONTENT_LEN},\n        },\n    },\n    utils::array,\n};\n\nuse crate::logging::aztecnr_debug_log_format;\nuse crate::protocol::{address::AztecAddress, hash::sha256_to_field, traits::{Deserialize, Serialize}};\n\n/// The slot in the PXE capsules where we store a `CapsuleArray` of `DeliveredPendingPartialNote`.\npub(crate) global DELIVERED_PENDING_PARTIAL_NOTE_ARRAY_LENGTH_CAPSULES_SLOT: Field = sha256_to_field(\n    \"AZTEC_NR::DELIVERED_PENDING_PARTIAL_NOTE_ARRAY_LENGTH_CAPSULES_SLOT\".as_bytes(),\n);\n\n/// A partial note that was delivered but is still pending completion. Contains the information necessary to find the\n/// log that will complete it and lead to a note being discovered and delivered.\n#[derive(Serialize, Deserialize)]\npub(crate) struct DeliveredPendingPartialNote {\n    pub(crate) owner: AztecAddress,\n    pub(crate) randomness: Field,\n    pub(crate) note_completion_log_tag: Field,\n    pub(crate) note_type_id: Field,\n    pub(crate) packed_private_note_content: BoundedVec<Field, MAX_PARTIAL_NOTE_PRIVATE_PACKED_LEN>,\n}\n\npub(crate) unconstrained fn process_partial_note_private_msg(\n    contract_address: AztecAddress,\n    msg_metadata: u64,\n    msg_content: BoundedVec<Field, MAX_MESSAGE_CONTENT_LEN>,\n    tx_hash: Field,\n    scope: AztecAddress,\n) {\n    let decoded = decode_partial_note_private_message(msg_metadata, msg_content);\n\n    if decoded.is_some() {\n        // We store the information of the partial note we found in a persistent capsule in PXE, so that we can later\n        // search for the public log that will complete it.\n        let (owner, randomness, note_completion_log_tag, note_type_id, packed_private_note_content) = decoded.unwrap();\n\n        let pending = DeliveredPendingPartialNote {\n            owner,\n            randomness,\n            note_completion_log_tag,\n            note_type_id,\n            packed_private_note_content,\n        };\n\n        CapsuleArray::at(\n            contract_address,\n            DELIVERED_PENDING_PARTIAL_NOTE_ARRAY_LENGTH_CAPSULES_SLOT,\n            scope,\n        )\n            .push(pending);\n    } else {\n        aztecnr_debug_log_format!(\n            \"Could not decode partial note private message from tx {0}, ignoring\",\n        )(\n            [tx_hash],\n        );\n    }\n}\n\n/// Searches for logs that would result in the completion of pending partial notes, ultimately resulting in the notes\n/// being delivered to PXE if completed.\npub(crate) unconstrained fn fetch_and_process_partial_note_completion_logs(\n    contract_address: AztecAddress,\n    compute_note_hash: ComputeNoteHash,\n    compute_note_nullifier: ComputeNoteNullifier,\n    scope: AztecAddress,\n) {\n    let pending_partial_notes = CapsuleArray::at(\n        contract_address,\n        DELIVERED_PENDING_PARTIAL_NOTE_ARRAY_LENGTH_CAPSULES_SLOT,\n        scope,\n    );\n\n    aztecnr_debug_log_format!(\"{} pending partial notes\")([pending_partial_notes.len() as Field]);\n\n    // Each of the pending partial notes might get completed by a log containing its public values. For performance\n    // reasons, we fetch all of these logs concurrently and then process them one by one, minimizing the amount of time\n    // waiting for the node roundtrip.\n    let maybe_completion_logs =\n        get_pending_partial_notes_completion_logs(contract_address, pending_partial_notes, scope);\n\n    // Each entry in the maybe completion logs array corresponds to the entry in the pending partial notes array at the\n    // same index. This means we can use the same index as we iterate through the responses to get both the partial\n    // note and the log that might complete it.\n    assert_eq(maybe_completion_logs.len(), pending_partial_notes.len());\n\n    maybe_completion_logs.for_each(|i, maybe_log: Option<LogRetrievalResponse>| {\n        // We clear the completion logs as we read them so that the array is empty by the time we next query it.\n        // TODO(#14943): use volatile arrays to avoid having to manually clear this.\n        maybe_completion_logs.remove(i);\n\n        let pending_partial_note = pending_partial_notes.get(i);\n\n        if maybe_log.is_none() {\n            aztecnr_debug_log_format!(\"Found no completion logs for partial note with tag {}\")(\n                [pending_partial_note.note_completion_log_tag],\n            );\n\n            // Note that we're not removing the pending partial note from the capsule array, so we will continue\n            // searching for this tagged log when performing message discovery in the future until we either find it or\n            // the entry is somehow removed from the array.\n        } else {\n            aztecnr_debug_log_format!(\"Completion log found for partial note with tag {}\")([\n                pending_partial_note.note_completion_log_tag,\n            ]);\n            let log = maybe_log.unwrap();\n\n            // The first field in the completion log payload is the storage slot, followed by the public note\n            // content fields.\n            let storage_slot = log.log_payload.get(0);\n            let public_note_content: BoundedVec<Field, MAX_LOG_CONTENT_LEN - 1> = array::subbvec(log.log_payload, 1);\n\n            // Public fields are assumed to all be placed at the end of the packed representation, so we combine\n            // the private and public packed fields (i.e. the contents of the private message and public log\n            // plaintext) to get the complete packed content.\n            let complete_packed_note = array::append(\n                pending_partial_note.packed_private_note_content,\n                public_note_content,\n            );\n\n            let discovered_notes = attempt_note_nonce_discovery(\n                log.unique_note_hashes_in_tx,\n                log.first_nullifier_in_tx,\n                compute_note_hash,\n                compute_note_nullifier,\n                contract_address,\n                pending_partial_note.owner,\n                storage_slot,\n                pending_partial_note.randomness,\n                pending_partial_note.note_type_id,\n                complete_packed_note,\n            );\n\n            // TODO(#11627): is there anything reasonable we can do if we get a log but it doesn't result in a note\n            // being found?\n            if discovered_notes.len() == 0 {\n                panic(\n                    f\"A partial note's completion log did not result in any notes being found - this should never happen\",\n                );\n            }\n\n            aztecnr_debug_log_format!(\"Discovered {0} notes for partial note with tag {1}\")([\n                discovered_notes.len() as Field,\n                pending_partial_note.note_completion_log_tag,\n            ]);\n\n            discovered_notes.for_each(|discovered_note| {\n                enqueue_note_for_validation(\n                    contract_address,\n                    pending_partial_note.owner,\n                    storage_slot,\n                    pending_partial_note.randomness,\n                    discovered_note.note_nonce,\n                    complete_packed_note,\n                    discovered_note.note_hash,\n                    discovered_note.inner_nullifier,\n                    log.tx_hash,\n                    scope,\n                );\n            });\n\n            // Because there is only a single log for a given tag, once we've processed the tagged log then we simply\n            // delete the pending work entry, regardless of whether it was actually completed or not.\n            pending_partial_notes.remove(i);\n        }\n    });\n}\n"
        },
        "146": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/messages/discovery/private_events.nr",
            "source": "use crate::{\n    event::event_interface::compute_private_serialized_event_commitment,\n    messages::{\n        encoding::MAX_MESSAGE_CONTENT_LEN, logs::event::decode_private_event_message,\n        processing::enqueue_event_for_validation,\n    },\n};\nuse crate::protocol::{address::AztecAddress, logging::debug_log_format, traits::ToField};\n\npub(crate) unconstrained fn process_private_event_msg(\n    contract_address: AztecAddress,\n    msg_metadata: u64,\n    msg_content: BoundedVec<Field, MAX_MESSAGE_CONTENT_LEN>,\n    tx_hash: Field,\n    recipient: AztecAddress,\n) {\n    let decoded = decode_private_event_message(msg_metadata, msg_content);\n\n    if decoded.is_some() {\n        let (event_type_id, randomness, serialized_event) = decoded.unwrap();\n\n        let event_commitment =\n            compute_private_serialized_event_commitment(serialized_event, randomness, event_type_id.to_field());\n\n        enqueue_event_for_validation(\n            contract_address,\n            event_type_id,\n            randomness,\n            serialized_event,\n            event_commitment,\n            tx_hash,\n            recipient,\n        );\n    } else {\n        debug_log_format(\n            \"Could not decode private event message from tx {0}, ignoring\",\n            [tx_hash],\n        );\n    }\n}\n"
        },
        "147": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/messages/discovery/private_notes.nr",
            "source": "use crate::{\n    logging::{aztecnr_debug_log_format, aztecnr_warn_log_format},\n    messages::{\n        discovery::{ComputeNoteHash, ComputeNoteNullifier, nonce_discovery::attempt_note_nonce_discovery},\n        encoding::MAX_MESSAGE_CONTENT_LEN,\n        logs::note::{decode_private_note_message, MAX_NOTE_PACKED_LEN},\n        processing::enqueue_note_for_validation,\n    },\n    protocol::{address::AztecAddress, constants::MAX_NOTE_HASHES_PER_TX, traits::ToField},\n};\n\npub(crate) unconstrained fn process_private_note_msg(\n    contract_address: AztecAddress,\n    tx_hash: Field,\n    unique_note_hashes_in_tx: BoundedVec<Field, MAX_NOTE_HASHES_PER_TX>,\n    first_nullifier_in_tx: Field,\n    compute_note_hash: ComputeNoteHash,\n    compute_note_nullifier: ComputeNoteNullifier,\n    msg_metadata: u64,\n    msg_content: BoundedVec<Field, MAX_MESSAGE_CONTENT_LEN>,\n    recipient: AztecAddress,\n) {\n    let decoded = decode_private_note_message(msg_metadata, msg_content);\n\n    if decoded.is_some() {\n        let (note_type_id, owner, storage_slot, randomness, packed_note) = decoded.unwrap();\n\n        attempt_note_discovery(\n            contract_address,\n            tx_hash,\n            unique_note_hashes_in_tx,\n            first_nullifier_in_tx,\n            compute_note_hash,\n            compute_note_nullifier,\n            owner,\n            storage_slot,\n            randomness,\n            note_type_id,\n            packed_note,\n            recipient,\n        );\n    } else {\n        aztecnr_debug_log_format!(\n            \"Could not decode private note message from tx {0}, ignoring\",\n        )(\n            [tx_hash],\n        );\n    }\n}\n\n/// Attempts discovery of a note given information about its contents and the transaction in which it is suspected the\n/// note was created.\npub unconstrained fn attempt_note_discovery(\n    contract_address: AztecAddress,\n    tx_hash: Field,\n    unique_note_hashes_in_tx: BoundedVec<Field, MAX_NOTE_HASHES_PER_TX>,\n    first_nullifier_in_tx: Field,\n    compute_note_hash: ComputeNoteHash,\n    compute_note_nullifier: ComputeNoteNullifier,\n    owner: AztecAddress,\n    storage_slot: Field,\n    randomness: Field,\n    note_type_id: Field,\n    packed_note: BoundedVec<Field, MAX_NOTE_PACKED_LEN>,\n    recipient: AztecAddress,\n) {\n    let discovered_notes = attempt_note_nonce_discovery(\n        unique_note_hashes_in_tx,\n        first_nullifier_in_tx,\n        compute_note_hash,\n        compute_note_nullifier,\n        contract_address,\n        owner,\n        storage_slot,\n        randomness,\n        note_type_id,\n        packed_note,\n    );\n\n    if discovered_notes.len() == 0 {\n        // A private note message that results in no discovered notes means none of the computed note hashes matched\n        // any unique note hash in the transaction. This could indicate a malformed or malicious message (e.g. a sender\n        // providing bogus note content).\n        aztecnr_warn_log_format!(\n            \"Discarding private note message from tx {0} for contract {1}: no matching note hash found in the tx\",\n        )(\n            [tx_hash, contract_address.to_field()],\n        );\n    } else {\n        aztecnr_debug_log_format!(\n            \"Discovered {0} notes from a private message for contract {1}\",\n        )(\n            [discovered_notes.len() as Field, contract_address.to_field()],\n        );\n    }\n\n    discovered_notes.for_each(|discovered_note| {\n        enqueue_note_for_validation(\n            contract_address,\n            owner,\n            storage_slot,\n            randomness,\n            discovered_note.note_nonce,\n            packed_note,\n            discovered_note.note_hash,\n            discovered_note.inner_nullifier,\n            tx_hash,\n            recipient,\n        );\n    });\n}\n"
        },
        "148": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/messages/discovery/process_message.nr",
            "source": "use crate::messages::{\n    discovery::{\n        ComputeNoteHash, ComputeNoteNullifier, CustomMessageHandler, partial_notes::process_partial_note_private_msg,\n        private_events::process_private_event_msg, private_notes::process_private_note_msg,\n    },\n    encoding::{decode_message, MESSAGE_CIPHERTEXT_LEN, MESSAGE_PLAINTEXT_LEN},\n    encryption::{aes128::AES128, message_encryption::MessageEncryption},\n    msg_type::{\n        MIN_CUSTOM_MSG_TYPE_ID, PARTIAL_NOTE_PRIVATE_MSG_TYPE_ID, PRIVATE_EVENT_MSG_TYPE_ID, PRIVATE_NOTE_MSG_TYPE_ID,\n    },\n    processing::MessageContext,\n};\n\nuse crate::logging::{aztecnr_debug_log, aztecnr_warn_log_format};\nuse crate::protocol::address::AztecAddress;\n\n/// Processes a message that can contain notes, partial notes, or events.\n///\n/// Notes result in nonce discovery being performed prior to delivery, which requires knowledge of the transaction hash\n/// in which the notes would've been created (typically the same transaction in which the log was emitted), along with\n/// the list of unique note hashes in said transaction and the `compute_note_hash` and `compute_note_nullifier`\n/// functions. Once discovered, the notes are enqueued for validation.\n///\n/// Partial notes result in a pending partial note entry being stored in a PXE capsule, which will later be retrieved\n/// to search for the note's completion public log.\n///\n/// Events are processed by computing an event commitment from the serialized event data and its randomness field, then\n/// enqueueing the event data and commitment for validation.\npub unconstrained fn process_message_ciphertext<CustomMessageHandlerEnv>(\n    contract_address: AztecAddress,\n    compute_note_hash: ComputeNoteHash,\n    compute_note_nullifier: ComputeNoteNullifier,\n    process_custom_message: Option<CustomMessageHandler<CustomMessageHandlerEnv>>,\n    message_ciphertext: BoundedVec<Field, MESSAGE_CIPHERTEXT_LEN>,\n    message_context: MessageContext,\n    recipient: AztecAddress,\n) {\n    let message_plaintext_option = AES128::decrypt(message_ciphertext, recipient, contract_address);\n\n    if message_plaintext_option.is_some() {\n        process_message_plaintext(\n            contract_address,\n            compute_note_hash,\n            compute_note_nullifier,\n            process_custom_message,\n            message_plaintext_option.unwrap(),\n            message_context,\n            recipient,\n        );\n    } else {\n        aztecnr_warn_log_format!(\"Could not decrypt message ciphertext from tx {0}, ignoring\")([message_context.tx_hash]);\n    }\n}\n\npub(crate) unconstrained fn process_message_plaintext<CustomMessageHandlerEnv>(\n    contract_address: AztecAddress,\n    compute_note_hash: ComputeNoteHash,\n    compute_note_nullifier: ComputeNoteNullifier,\n    process_custom_message: Option<CustomMessageHandler<CustomMessageHandlerEnv>>,\n    message_plaintext: BoundedVec<Field, MESSAGE_PLAINTEXT_LEN>,\n    message_context: MessageContext,\n    recipient: AztecAddress,\n) {\n    // The first thing to do after decrypting the message is to determine what type of message we're processing. We\n    // have 3 message types: private notes, partial notes and events.\n\n    // We decode the message to obtain the message type id, metadata and content.\n    let decoded = decode_message(message_plaintext);\n\n    if decoded.is_some() {\n        let (msg_type_id, msg_metadata, msg_content) = decoded.unwrap();\n\n        if msg_type_id == PRIVATE_NOTE_MSG_TYPE_ID {\n            aztecnr_debug_log!(\"Processing private note msg\");\n\n            process_private_note_msg(\n                contract_address,\n                message_context.tx_hash,\n                message_context.unique_note_hashes_in_tx,\n                message_context.first_nullifier_in_tx,\n                compute_note_hash,\n                compute_note_nullifier,\n                msg_metadata,\n                msg_content,\n                recipient,\n            );\n        } else if msg_type_id == PARTIAL_NOTE_PRIVATE_MSG_TYPE_ID {\n            aztecnr_debug_log!(\"Processing partial note private msg\");\n\n            process_partial_note_private_msg(\n                contract_address,\n                msg_metadata,\n                msg_content,\n                message_context.tx_hash,\n                recipient,\n            );\n        } else if msg_type_id == PRIVATE_EVENT_MSG_TYPE_ID {\n            aztecnr_debug_log!(\"Processing private event msg\");\n\n            process_private_event_msg(\n                contract_address,\n                msg_metadata,\n                msg_content,\n                message_context.tx_hash,\n                recipient,\n            );\n        } else if msg_type_id < MIN_CUSTOM_MSG_TYPE_ID {\n            // The message type ID falls in the range reserved for aztec.nr built-in types but wasn't matched above.\n            // This most likely means the message is malformed or a custom message was incorrectly assigned a reserved\n            // ID. Custom message types must use IDs allocated via `custom_msg_type_id`.\n            aztecnr_warn_log_format!(\n                \"Message type ID {0} is in the reserved range but is not recognized, ignoring. See https://docs.aztec.network/errors/3\",\n            )(\n                [msg_type_id as Field],\n            );\n        } else if process_custom_message.is_some() {\n            process_custom_message.unwrap()(\n                contract_address,\n                msg_type_id,\n                msg_metadata,\n                msg_content,\n                message_context,\n                recipient,\n            );\n        } else {\n            // A custom message was received but no handler is configured. This likely means the contract emits custom\n            // messages but forgot to register a handler via `AztecConfig::custom_message_handler`.\n            aztecnr_warn_log_format!(\n                \"Received custom message with type id {0} but no handler is configured, ignoring. See https://docs.aztec.network/errors/2\",\n            )(\n                [msg_type_id as Field],\n            );\n        }\n    } else {\n        aztecnr_warn_log_format!(\"Could not decode message plaintext from tx {0}, ignoring\")([message_context.tx_hash]);\n    }\n}\n"
        },
        "149": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/messages/encoding.nr",
            "source": "// TODO(#12750): don't make these values assume we're using AES.\nuse crate::protocol::constants::PRIVATE_LOG_CIPHERTEXT_LEN;\nuse crate::utils::array;\n\n// We reassign to the constant here to communicate the distinction between a log and a message. In Aztec.nr, unlike in\n// protocol circuits, we have a concept of a message that can be emitted either as a private log or as an offchain\n// message. Message is a piece of data that is to be eventually delivered to a contract via the `process_message(...)`\n// utility function function that is injected by the #[aztec] macro. Note: PRIVATE_LOG_CIPHERTEXT_LEN is an amount of\n// fields, so MESSAGE_CIPHERTEXT_LEN is the size of the message in fields.\npub global MESSAGE_CIPHERTEXT_LEN: u32 = PRIVATE_LOG_CIPHERTEXT_LEN;\n\n// TODO(#12750): The global variables below should not be here as they are AES128 specific.\n// The header plaintext is 2 bytes (ciphertext length), padded to the 16-byte AES block size by PKCS#7.\npub(crate) global HEADER_CIPHERTEXT_SIZE_IN_BYTES: u32 = 16;\n// AES PKCS#7 always adds at least one byte of padding. Since each plaintext field is 32 bytes (a multiple of the\n// 16-byte AES block size), a full 16-byte padding block is always appended.\npub(crate) global AES128_PKCS7_EXPANSION_IN_BYTES: u32 = 16;\n\npub global EPH_PK_X_SIZE_IN_FIELDS: u32 = 1;\n\n// (15 - 1) * 31 - 16 - 16 = 402. Note: We multiply by 31 because ciphertext bytes are stored in fields using\n// bytes_to_fields, which packs 31 bytes per field (since a Field is ~254 bits and can safely store 31 whole bytes).\npub(crate) global MESSAGE_PLAINTEXT_SIZE_IN_BYTES: u32 = (MESSAGE_CIPHERTEXT_LEN - EPH_PK_X_SIZE_IN_FIELDS) * 31\n    - HEADER_CIPHERTEXT_SIZE_IN_BYTES\n    - AES128_PKCS7_EXPANSION_IN_BYTES;\n// The plaintext bytes represent Field values that were originally serialized using fields_to_bytes, which converts\n// each Field to 32 bytes. To convert the plaintext bytes back to fields, we divide by 32. 402 / 32 = 12\npub global MESSAGE_PLAINTEXT_LEN: u32 = MESSAGE_PLAINTEXT_SIZE_IN_BYTES / 32;\n\npub global MESSAGE_EXPANDED_METADATA_LEN: u32 = 1;\n\n// The standard message layout is composed of:\n//  - an initial field called the 'expanded metadata'\n//  - an arbitrary number of fields following that called the 'message content'\n//\n// ```\n// message: [ msg_expanded_metadata, ...msg_content ]\n// ```\n//\n// The expanded metadata itself is interpreted as a u128, of which:\n//  - the upper 64 bits are the message type id\n//  - the lower 64 bits are called the 'message metadata'\n//\n// ```\n// msg_expanded_metadata: [  msg_type_id    |  msg_metadata  ]\n//                        <---  64 bits --->|<--- 64 bits --->\n// ```\n//\n// The meaning of the message metadata and message content depend on the value of the message type id. Note that there\n// is nothing special about the message metadata, it _can_ be considered part of the content. It just has a different\n// name to make it distinct from the message content given that it is not a full field.\n\n/// The maximum length of a message's content, i.e. not including the expanded message metadata.\npub global MAX_MESSAGE_CONTENT_LEN: u32 = MESSAGE_PLAINTEXT_LEN - MESSAGE_EXPANDED_METADATA_LEN;\n\n/// Encodes a message following aztec-nr's standard message encoding. This message can later be decoded with\n/// `decode_message` to retrieve the original values.\n///\n/// - The `msg_type` is an identifier that groups types of messages that are all processed the same way, e.g. private\n/// notes or events. Possible values are defined in `aztec::messages::msg_type`.\n/// - The `msg_metadata` and `msg_content` are the values stored in the message, whose meaning depends on the\n/// `msg_type`. The only special thing about `msg_metadata` that separates it from `msg_content` is that it is a u64\n/// instead of a full Field (due to details of how messages are encoded), allowing applications that can fit values\n/// into this smaller variable to achieve higher data efficiency.\npub fn encode_message<let N: u32>(\n    msg_type: u64,\n    msg_metadata: u64,\n    msg_content: [Field; N],\n) -> [Field; (N + MESSAGE_EXPANDED_METADATA_LEN)] {\n    std::static_assert(\n        msg_content.len() <= MAX_MESSAGE_CONTENT_LEN,\n        \"Invalid message content: it must have a length of at most MAX_MESSAGE_CONTENT_LEN\",\n    );\n\n    // If MESSAGE_EXPANDED_METADATA_LEN is changed, causing the assertion below to fail, then the destructuring of the\n    // message encoding below must be updated as well.\n    std::static_assert(\n        MESSAGE_EXPANDED_METADATA_LEN == 1,\n        \"unexpected value for MESSAGE_EXPANDED_METADATA_LEN\",\n    );\n    let mut message: [Field; (N + MESSAGE_EXPANDED_METADATA_LEN)] = std::mem::zeroed();\n\n    message[0] = to_expanded_metadata(msg_type, msg_metadata);\n    for i in 0..msg_content.len() {\n        message[MESSAGE_EXPANDED_METADATA_LEN + i] = msg_content[i];\n    }\n\n    message\n}\n\n/// Decodes a standard aztec-nr message, i.e. one created via `encode_message`, returning the original encoded values.\n///\n/// Returns `None` if the message is empty or has invalid (>128 bit) expanded metadata.\n///\n/// Note that `encode_message` returns a fixed size array while this function takes a `BoundedVec`: this is because\n/// prior to decoding the message type is unknown, and consequentially not known at compile time. If working with\n/// fixed-size messages, consider using `BoundedVec::from_array` to convert them.\npub unconstrained fn decode_message(\n    message: BoundedVec<Field, MESSAGE_PLAINTEXT_LEN>,\n) -> Option<(u64, u64, BoundedVec<Field, MAX_MESSAGE_CONTENT_LEN>)> {\n    Option::some(message)\n        .and_then(|message| {\n            // If MESSAGE_EXPANDED_METADATA_LEN is changed, causing the assertion below to fail, then the destructuring\n            // of the\n            // message encoding below must be updated as well.\n            std::static_assert(\n                MESSAGE_EXPANDED_METADATA_LEN == 1,\n                \"unexpected value for MESSAGE_EXPANDED_METADATA_LEN\",\n            );\n            if message.len() < MESSAGE_EXPANDED_METADATA_LEN {\n                Option::none()\n            } else {\n                Option::some(message.get(0))\n            }\n        })\n        .and_then(|msg_expanded_metadata| from_expanded_metadata(msg_expanded_metadata))\n        .map(|(msg_type_id, msg_metadata)| {\n            let msg_content = array::subbvec(message, MESSAGE_EXPANDED_METADATA_LEN);\n            (msg_type_id, msg_metadata, msg_content)\n        })\n}\n\nglobal U64_SHIFT_MULTIPLIER: Field = 2.pow_32(64);\n\nfn to_expanded_metadata(msg_type: u64, msg_metadata: u64) -> Field {\n    // We use multiplication instead of bit shifting operations to shift the type bits as bit shift operations are\n    // expensive in circuits.\n    let type_field: Field = (msg_type as Field) * U64_SHIFT_MULTIPLIER;\n    let msg_metadata_field = msg_metadata as Field;\n\n    type_field + msg_metadata_field\n}\n\nglobal TWO_POW_128: Field = 2.pow_32(128);\n\n/// Unpacks expanded metadata into (msg_type, msg_metadata). Returns `None` if `input >= 2^128`.\nfn from_expanded_metadata(input: Field) -> Option<(u64, u64)> {\n    if input.lt(TWO_POW_128) {\n        let msg_metadata = (input as u64);\n        let msg_type = ((input - (msg_metadata as Field)) / U64_SHIFT_MULTIPLIER) as u64;\n        // Use division instead of bit shift since bit shifts are expensive in circuits\n        Option::some((msg_type, msg_metadata))\n    } else {\n        Option::none()\n    }\n}\n\nmod tests {\n    use crate::utils::array::subarray::subarray;\n    use super::{\n        decode_message, encode_message, from_expanded_metadata, MAX_MESSAGE_CONTENT_LEN, to_expanded_metadata,\n        TWO_POW_128,\n    };\n\n    global U64_MAX: u64 = (2.pow_32(64) - 1) as u64;\n    global U128_MAX: Field = (2.pow_32(128) - 1);\n\n    #[test]\n    unconstrained fn encode_decode_empty_message(msg_type: u64, msg_metadata: u64) {\n        let encoded = encode_message(msg_type, msg_metadata, []);\n        let (decoded_msg_type, decoded_msg_metadata, decoded_msg_content) =\n            decode_message(BoundedVec::from_array(encoded)).unwrap();\n\n        assert_eq(decoded_msg_type, msg_type);\n        assert_eq(decoded_msg_metadata, msg_metadata);\n        assert_eq(decoded_msg_content.len(), 0);\n    }\n\n    #[test]\n    unconstrained fn encode_decode_short_message(\n        msg_type: u64,\n        msg_metadata: u64,\n        msg_content: [Field; MAX_MESSAGE_CONTENT_LEN / 2],\n    ) {\n        let encoded = encode_message(msg_type, msg_metadata, msg_content);\n        let (decoded_msg_type, decoded_msg_metadata, decoded_msg_content) =\n            decode_message(BoundedVec::from_array(encoded)).unwrap();\n\n        assert_eq(decoded_msg_type, msg_type);\n        assert_eq(decoded_msg_metadata, msg_metadata);\n        assert_eq(decoded_msg_content.len(), msg_content.len());\n        assert_eq(subarray(decoded_msg_content.storage(), 0), msg_content);\n    }\n\n    #[test]\n    unconstrained fn encode_decode_full_message(\n        msg_type: u64,\n        msg_metadata: u64,\n        msg_content: [Field; MAX_MESSAGE_CONTENT_LEN],\n    ) {\n        let encoded = encode_message(msg_type, msg_metadata, msg_content);\n        let (decoded_msg_type, decoded_msg_metadata, decoded_msg_content) =\n            decode_message(BoundedVec::from_array(encoded)).unwrap();\n\n        assert_eq(decoded_msg_type, msg_type);\n        assert_eq(decoded_msg_metadata, msg_metadata);\n        assert_eq(decoded_msg_content.len(), msg_content.len());\n        assert_eq(subarray(decoded_msg_content.storage(), 0), msg_content);\n    }\n\n    #[test]\n    unconstrained fn to_expanded_metadata_packing() {\n        // Test case 1: All bits set\n        let packed = to_expanded_metadata(U64_MAX, U64_MAX);\n        let (msg_type, msg_metadata) = from_expanded_metadata(packed).unwrap();\n        assert_eq(msg_type, U64_MAX);\n        assert_eq(msg_metadata, U64_MAX);\n\n        // Test case 2: Only log type bits set\n        let packed = to_expanded_metadata(U64_MAX, 0);\n        let (msg_type, msg_metadata) = from_expanded_metadata(packed).unwrap();\n        assert_eq(msg_type, U64_MAX);\n        assert_eq(msg_metadata, 0);\n\n        // Test case 3: Only msg_metadata bits set\n        let packed = to_expanded_metadata(0, U64_MAX);\n        let (msg_type, msg_metadata) = from_expanded_metadata(packed).unwrap();\n        assert_eq(msg_type, 0);\n        assert_eq(msg_metadata, U64_MAX);\n\n        // Test case 4: No bits set\n        let packed = to_expanded_metadata(0, 0);\n        let (msg_type, msg_metadata) = from_expanded_metadata(packed).unwrap();\n        assert_eq(msg_type, 0);\n        assert_eq(msg_metadata, 0);\n    }\n\n    #[test]\n    unconstrained fn from_expanded_metadata_packing() {\n        // Test case 1: All bits set\n        let input = U128_MAX as Field;\n        let (msg_type, msg_metadata) = from_expanded_metadata(input).unwrap();\n        assert_eq(msg_type, U64_MAX);\n        assert_eq(msg_metadata, U64_MAX);\n\n        // Test case 2: Only log type bits set\n        let input = (U128_MAX - U64_MAX as Field);\n        let (msg_type, msg_metadata) = from_expanded_metadata(input).unwrap();\n        assert_eq(msg_type, U64_MAX);\n        assert_eq(msg_metadata, 0);\n\n        // Test case 3: Only msg_metadata bits set\n        let input = U64_MAX as Field;\n        let (msg_type, msg_metadata) = from_expanded_metadata(input).unwrap();\n        assert_eq(msg_type, 0);\n        assert_eq(msg_metadata, U64_MAX);\n\n        // Test case 4: No bits set\n        let input = 0;\n        let (msg_type, msg_metadata) = from_expanded_metadata(input).unwrap();\n        assert_eq(msg_type, 0);\n        assert_eq(msg_metadata, 0);\n    }\n\n    #[test]\n    unconstrained fn to_from_expanded_metadata(original_msg_type: u64, original_msg_metadata: u64) {\n        let packed = to_expanded_metadata(original_msg_type, original_msg_metadata);\n        let (unpacked_msg_type, unpacked_msg_metadata) = from_expanded_metadata(packed).unwrap();\n\n        assert_eq(original_msg_type, unpacked_msg_type);\n        assert_eq(original_msg_metadata, unpacked_msg_metadata);\n    }\n\n    #[test]\n    unconstrained fn encode_decode_max_size_message() {\n        let msg_type_id: u64 = 42;\n        let msg_metadata: u64 = 99;\n        let mut msg_content = [0; MAX_MESSAGE_CONTENT_LEN];\n        for i in 0..MAX_MESSAGE_CONTENT_LEN {\n            msg_content[i] = i as Field;\n        }\n\n        let encoded = encode_message(msg_type_id, msg_metadata, msg_content);\n        let (decoded_type_id, decoded_metadata, decoded_content) =\n            decode_message(BoundedVec::from_array(encoded)).unwrap();\n\n        assert_eq(decoded_type_id, msg_type_id);\n        assert_eq(decoded_metadata, msg_metadata);\n        assert_eq(decoded_content, BoundedVec::from_array(msg_content));\n    }\n\n    #[test(should_fail_with = \"Invalid message content: it must have a length of at most MAX_MESSAGE_CONTENT_LEN\")]\n    fn encode_oversized_message_fails() {\n        let msg_content = [0; MAX_MESSAGE_CONTENT_LEN + 1];\n        let _ = encode_message(0, 0, msg_content);\n    }\n\n    #[test]\n    unconstrained fn decode_empty_message_returns_none() {\n        assert(decode_message(BoundedVec::new()).is_none());\n    }\n\n    #[test]\n    unconstrained fn decode_message_with_oversized_metadata_returns_none() {\n        let message = BoundedVec::from_array([TWO_POW_128]);\n        assert(decode_message(message).is_none());\n    }\n}\n"
        },
        "150": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/messages/encryption/aes128.nr",
            "source": "use crate::protocol::{address::AztecAddress, public_keys::AddressPoint, traits::ToField};\n\nuse crate::{\n    keys::{\n        ecdh_shared_secret::{\n            compute_app_siloed_shared_secret, derive_ecdh_shared_secret, derive_shared_secret_field_mask,\n            derive_shared_secret_subkey,\n        },\n        ephemeral::generate_positive_ephemeral_key_pair,\n    },\n    logging::aztecnr_warn_log_format,\n    messages::{\n        encoding::{\n            EPH_PK_X_SIZE_IN_FIELDS, HEADER_CIPHERTEXT_SIZE_IN_BYTES, MESSAGE_CIPHERTEXT_LEN, MESSAGE_PLAINTEXT_LEN,\n            MESSAGE_PLAINTEXT_SIZE_IN_BYTES,\n        },\n        encryption::message_encryption::MessageEncryption,\n        logs::arithmetic_generics_utils::{\n            get_arr_of_size__message_bytes__from_PT, get_arr_of_size__message_bytes_padding__from_PT,\n        },\n    },\n    oracle::{aes128_decrypt::try_aes128_decrypt, random::random, shared_secret::get_shared_secret},\n    utils::{\n        array,\n        conversion::{\n            bytes_to_fields::{bytes_from_fields, bytes_to_fields},\n            fields_to_bytes::{fields_to_bytes, try_fields_from_bytes},\n        },\n        point::point_from_x_coord_and_sign,\n    },\n};\n\nuse std::aes128::aes128_encrypt;\n\n/// Computes N close-to-uniformly-random 256 bits from a given app-siloed shared secret.\n///\n/// NEVER re-use the same iv and sym_key. DO NOT call this function more than once with the same s_app.\n///\n/// This function is only known to be safe if s_app is derived from combining a random ephemeral key with an\n/// address point and a contract address. See big comment within the body of the function.\nfn extract_many_close_to_uniformly_random_256_bits_using_poseidon2<let N: u32>(s_app: Field) -> [[u8; 32]; N] {\n    /*\n     * Unsafe because of https://eprint.iacr.org/2010/264.pdf Page 13, Lemma 2 (and the two paragraphs below it).\n    *\n    * If you call this function, you need to be careful and aware of how the arg `s_app` has been derived.\n    *\n    * The paper says that the way you derive aes keys and IVs should be fine with poseidon2 (modelled as a RO),\n    * as long as you _don't_ use Poseidon2 as a PRG to generate the two exponents x & y which multiply to the\n    * shared secret S:\n    *\n    * S = [x*y]*G.\n    *\n    * (Otherwise, you would have to \"key\" poseidon2, i.e. generate a uniformly string K which can be public and\n    * compute Hash(x) as poseidon(K,x)).\n    * In that lemma, k would be 2*254=508, and m would be the number of points on the grumpkin curve (which is\n    * close to r according to the Hasse bound).\n    *\n    * Our shared secret S is [esk * address_sk] * G, and the question is: Can we compute hash(S) using poseidon2\n    * instead of sha256?\n    *\n    * Well, esk is random and not generated with poseidon2, so that's good.\n    * What about address_sk?\n    * Well, address_sk = poseidon2(stuff) + ivsk, so there was some discussion about whether address_sk is\n    * independent of poseidon2. Given that ivsk is random and independent of poseidon2, the address_sk is also\n    * independent of poseidon2.\n    *\n    * Tl;dr: we believe it's safe to hash S = [esk * address_sk] * G using poseidon2, in order to derive a\n    * symmetric key.\n    *\n    * If you're calling this function for a differently-derived `s_app`, be careful.\n    */\n    \n\n    /* The output of this function needs to be 32 random bytes.\n     * A single field won't give us 32 bytes of entropy. So we compute two \"random\" fields, by poseidon-hashing\n    * with two different indices. We then extract the last 16 (big endian) bytes of each \"random\" field.\n    * Note: we use to_be_bytes because it's slightly more efficient. But we have to be careful not to take bytes\n    * from the \"big end\", because the \"big\" byte is not uniformly random over the byte: it only has < 6 bits of\n    * randomness, because it's the big end of a 254-bit field element.\n    */\n\n    let mut all_bytes: [[u8; 32]; N] = std::mem::zeroed();\n    std::static_assert(N < 256, \"N too large\");\n    for k in 0..N {\n        let rand1: Field = derive_shared_secret_subkey(s_app, 2 * k);\n        let rand2: Field = derive_shared_secret_subkey(s_app, 2 * k + 1);\n\n        let rand1_bytes: [u8; 32] = rand1.to_be_bytes();\n        let rand2_bytes: [u8; 32] = rand2.to_be_bytes();\n\n        let mut bytes: [u8; 32] = [0; 32];\n        for i in 0..16 {\n            // We take bytes from the \"little end\" of the be-bytes arrays:\n            let j = 32 - i - 1;\n            bytes[i] = rand1_bytes[j];\n            bytes[16 + i] = rand2_bytes[j];\n        }\n\n        all_bytes[k] = bytes;\n    }\n\n    all_bytes\n}\n\nfn derive_aes_symmetric_key_and_iv_from_uniformly_random_256_bits<let N: u32>(\n    many_random_256_bits: [[u8; 32]; N],\n) -> [([u8; 16], [u8; 16]); N] {\n    // Many (sym_key, iv) pairs:\n    let mut many_pairs: [([u8; 16], [u8; 16]); N] = std::mem::zeroed();\n    for k in 0..N {\n        let random_256_bits = many_random_256_bits[k];\n        let mut sym_key = [0; 16];\n        let mut iv = [0; 16];\n        for i in 0..16 {\n            sym_key[i] = random_256_bits[i];\n            iv[i] = random_256_bits[i + 16];\n        }\n        many_pairs[k] = (sym_key, iv);\n    }\n\n    many_pairs\n}\n\npub fn derive_aes_symmetric_key_and_iv_from_shared_secret<let N: u32>(s_app: Field) -> [([u8; 16], [u8; 16]); N] {\n    let many_random_256_bits: [[u8; 32]; N] = extract_many_close_to_uniformly_random_256_bits_using_poseidon2(s_app);\n\n    derive_aes_symmetric_key_and_iv_from_uniformly_random_256_bits(many_random_256_bits)\n}\n\npub struct AES128 {}\n\nimpl MessageEncryption for AES128 {\n\n    /// AES128-CBC encryption for Aztec protocol messages.\n    ///\n    /// ## Overview\n    ///\n    /// The plaintext is an array of up to `MESSAGE_PLAINTEXT_LEN` (12) fields. The output is always exactly\n    /// `MESSAGE_CIPHERTEXT_LEN` (15) fields, regardless of plaintext size. All output fields except the\n    /// ephemeral public key are uniformly random `Field` values to any observer without knowledge of the\n    /// shared secret, making all encrypted messages indistinguishable by size or content.\n    ///\n    /// ## PKCS#7 Padding\n    ///\n    /// AES operates on 16-byte blocks, so the plaintext must be padded to a multiple of 16. PKCS#7 padding always\n    /// adds at least 1 byte (so the receiver can always detect and strip it), which means:\n    /// - 1 B plaintext  -> 15 B padding -> 16 B total\n    /// - 15 B plaintext ->  1 B padding -> 16 B total\n    /// - 16 B plaintext -> 16 B padding -> 32 B total (full extra block)\n    ///\n    /// In general: if the plaintext is already a multiple of 16, a full 16-byte padding block is appended.\n    ///\n    /// ## Encryption Steps\n    ///\n    /// **1. Body encryption.** The plaintext fields are serialized to bytes (32 bytes per field) and AES-128-CBC\n    /// encrypted. Since 32 is a multiple of 16, PKCS#7 always adds a full 16-byte padding block (see above):\n    ///\n    /// ```text\n    /// +---------------------------------------------+\n    /// |                   body ct                    |\n    /// |            PlaintextLen*32 + 16 B            |\n    /// +-------------------------------+--------------+\n    /// | encrypted plaintext fields    | PKCS#7 (16B) |\n    /// | (serialized at 32 B each)     |              |\n    /// +-------------------------------+--------------+\n    /// ```\n    ///\n    /// **2. Header encryption.** The byte length of `body_ct` is stored as a 2-byte big-endian integer. This 2-byte\n    /// header plaintext is then AES-encrypted; PKCS#7 pads the remaining 14 bytes to fill one 16-byte AES block,\n    /// producing a 16-byte header ciphertext:\n    ///\n    /// ```text\n    /// +---------------------------+\n    /// |         header ct         |\n    /// |            16 B           |\n    /// +--------+------------------+\n    /// | body ct| PKCS#7 (14B)     |\n    /// | length |                  |\n    /// | (2 B)  |                  |\n    /// +--------+------------------+\n    /// ```\n    ///\n    /// ## Wire Format\n    ///\n    /// Messages are transmitted as fields, not bytes. A field is ~254 bits and can safely store 31 whole bytes, so\n    /// we need to pack our byte data into 31-byte chunks. This packing drives the wire format.\n    ///\n    /// **Step 1 -- Assemble bytes.** The ciphertexts are laid out in a byte array, padded with zero bytes to a\n    /// multiple of 31 so it divides evenly into fields:\n    ///\n    /// ```text\n    /// +------------+-------------------------+---------+\n    /// | header ct  |        body ct          | byte pad|\n    /// |   16 B     | PlaintextLen*32 + 16 B  | (zeros) |\n    /// +------------+-------------------------+---------+\n    /// |<-------- padded to a multiple of 31 B -------->|\n    /// ```\n    ///\n    /// **Step 2 -- Pack and mask.** The byte array is split into 31-byte chunks, each stored in one field. A\n    /// Poseidon2-derived mask (see `derive_shared_secret_field_mask`) is added to each so that the resulting\n    /// fields appear as uniformly random `Field` values to any observer without knowledge of the shared secret,\n    /// hiding the fact that the underlying ciphertext consists of 128-bit AES blocks.\n    ///\n    /// **Step 3 -- Assemble ciphertext.** The ephemeral public key x-coordinate is prepended and random field padding\n    /// is appended to fill to 15 fields:\n    ///\n    /// ```text\n    /// +----------+-------------------------+-------------------+\n    /// | eph_pk.x |  masked message fields   | random field pad  |\n    /// |          | (packed 31 B per field)  |  (fills to 15)    |\n    /// +----------+-------------------------+-------------------+\n    /// |<---------- MESSAGE_CIPHERTEXT_LEN = 15 fields -------->|\n    /// ```\n    ///\n    /// ## Key Derivation\n    ///\n    /// The raw ECDH shared secret point is first app-siloed into a scalar `s_app` by hashing with the contract\n    /// address (see\n    /// [`compute_app_siloed_shared_secret`](crate::keys::ecdh_shared_secret::compute_app_siloed_shared_secret)).\n    /// Two (key, IV) pairs are then derived from `s_app` via indexed Poseidon2 hashing: one pair for the body\n    /// ciphertext and one for the header ciphertext.\n    fn encrypt<let PlaintextLen: u32>(\n        plaintext: [Field; PlaintextLen],\n        recipient: AztecAddress,\n        contract_address: AztecAddress,\n    ) -> [Field; MESSAGE_CIPHERTEXT_LEN] {\n        std::static_assert(\n            PlaintextLen <= MESSAGE_PLAINTEXT_LEN,\n            \"Plaintext length exceeds MESSAGE_PLAINTEXT_LEN\",\n        );\n\n        // AES 128 operates on bytes, not fields, so we need to convert the fields to bytes. (This process is then\n        // reversed when processing the message in `process_message_ciphertext`)\n        let plaintext_bytes = fields_to_bytes(plaintext);\n\n        // Derive ECDH shared secret with recipient using a fresh ephemeral keypair.\n        let (eph_sk, eph_pk) = generate_positive_ephemeral_key_pair();\n\n        let raw_shared_secret = derive_ecdh_shared_secret(\n            eph_sk,\n            recipient\n                .to_address_point()\n                .unwrap_or_else(|| {\n                    aztecnr_warn_log_format!(\n                        \"Attempted to encrypt message for an invalid recipient ({0})\",\n                    )(\n                        [recipient.to_field()],\n                    );\n\n                    // Safety: if the recipient is an invalid address, then it is not possible to encrypt a message for\n                    // them because we cannot establish a shared secret. This is never expected to occur during normal\n                    // operation. However, it is technically possible for us to receive an invalid address, and we must\n                    // therefore handle it. We could simply fail, but that'd introduce a potential security issue in\n                    // which an attacker forces a contract to encrypt a message for an invalid address, resulting in an\n                    // impossible transaction - this is sometimes called a 'king of the hill' attack. We choose instead\n                    // to not fail and encrypt the plaintext regardless using the shared secret that results from a\n                    // random valid address. The sender is free to choose this address and hence shared secret, but\n                    // this has no security implications as they already know not only the full plaintext but also the\n                    // ephemeral private key anyway.\n                    unsafe {\n                        random_address_point()\n                    }\n                })\n                .inner,\n        );\n\n        let s_app = compute_app_siloed_shared_secret(raw_shared_secret, contract_address);\n\n        // It is safe to derive AES keys from `s_app` using Poseidon2 because `s_app` was derived from an ECDH shared\n        // secret using an AztecAddress (the recipient). See the block comment in\n        // `extract_many_close_to_uniformly_random_256_bits_using_poseidon2` for more info.\n        let pairs = derive_aes_symmetric_key_and_iv_from_shared_secret::<2>(s_app);\n        let (body_sym_key, body_iv) = pairs[0];\n        let (header_sym_key, header_iv) = pairs[1];\n\n        let ciphertext_bytes = aes128_encrypt(plaintext_bytes, body_iv, body_sym_key);\n\n        // Each plaintext field is 32 bytes (a multiple of the 16-byte AES block\n        // size), so PKCS#7 always appends a full 16-byte padding block:\n        //   |ciphertext| = PlaintextLen*32 + 16 = 16 * (1 + PlaintextLen*32 / 16)\n        std::static_assert(\n            ciphertext_bytes.len() == 16 * (1 + (PlaintextLen * 32) / 16),\n            \"unexpected ciphertext length\",\n        );\n\n        // Encrypt a 2-byte header containing the body ciphertext length.\n        let header_plaintext = encode_header(ciphertext_bytes.len());\n\n        // Note: the aes128_encrypt builtin fn automatically appends bytes to the input, according to pkcs#7; hence why\n        // the output `header_ciphertext_bytes` is 16 bytes larger than the input in this case.\n        let header_ciphertext_bytes = aes128_encrypt(header_plaintext, header_iv, header_sym_key);\n        // Verify expected header ciphertext size at compile time.\n        std::static_assert(\n            header_ciphertext_bytes.len() == HEADER_CIPHERTEXT_SIZE_IN_BYTES,\n            \"unexpected ciphertext header length\",\n        );\n\n        // Assemble the message byte array:\n        //  [header_ct (16B)] [body_ct] [padding to mult of 31]\n        let message_bytes_padding_to_mult_31 = get_arr_of_size__message_bytes_padding__from_PT::<PlaintextLen * 32>();\n\n        let mut message_bytes = get_arr_of_size__message_bytes__from_PT::<PlaintextLen * 32>();\n\n        std::static_assert(\n            message_bytes.len() % 31 == 0,\n            \"Unexpected error: message_bytes.len() should be divisible by 31, by construction.\",\n        );\n\n        let mut offset = 0;\n        for i in 0..header_ciphertext_bytes.len() {\n            message_bytes[offset + i] = header_ciphertext_bytes[i];\n        }\n        offset += header_ciphertext_bytes.len();\n\n        for i in 0..ciphertext_bytes.len() {\n            message_bytes[offset + i] = ciphertext_bytes[i];\n        }\n        offset += ciphertext_bytes.len();\n\n        for i in 0..message_bytes_padding_to_mult_31.len() {\n            message_bytes[offset + i] = message_bytes_padding_to_mult_31[i];\n        }\n        offset += message_bytes_padding_to_mult_31.len();\n\n        // Ideally we would be able to have a static assert where we check that the offset would be such that we've\n        // written to the entire log_bytes array, but we cannot since Noir does not treat the offset as a comptime\n        // value (despite the values that it goes through being known at each stage). We instead check that the\n        // computation used to obtain the offset computes the expected value (which we _can_ do in a static check), and\n        // then add a cheap runtime check to also validate that the offset matches this.\n        std::static_assert(\n            header_ciphertext_bytes.len() + ciphertext_bytes.len() + message_bytes_padding_to_mult_31.len()\n                == message_bytes.len(),\n            \"unexpected message length\",\n        );\n        assert(offset == message_bytes.len(), \"unexpected encrypted message length\");\n\n        // Pack message bytes into fields (31 bytes per field) and prepend eph_pk.x.\n        let message_bytes_as_fields = bytes_to_fields(message_bytes);\n\n        let mut ciphertext: [Field; MESSAGE_CIPHERTEXT_LEN] = [0; MESSAGE_CIPHERTEXT_LEN];\n\n        ciphertext[0] = eph_pk.x;\n\n        // Mask each content field with a Poseidon2-derived value, so that they appear as uniformly random `Field`\n        // values\n        let mut offset = 1;\n        for i in 0..message_bytes_as_fields.len() {\n            let mask = derive_shared_secret_field_mask(s_app, i as u32);\n            ciphertext[offset + i] = message_bytes_as_fields[i] + mask;\n        }\n        offset += message_bytes_as_fields.len();\n\n        // Pad with random fields so that padding is indistinguishable from masked data fields.\n        for i in offset..MESSAGE_CIPHERTEXT_LEN {\n            // Safety: we assume that the sender wants for the message to be private - a malicious one could simply\n            // reveal its contents publicly. It is therefore fine to trust the sender to provide random padding.\n            ciphertext[i] = unsafe { random() };\n        }\n\n        ciphertext\n    }\n\n    unconstrained fn decrypt(\n        ciphertext: BoundedVec<Field, MESSAGE_CIPHERTEXT_LEN>,\n        recipient: AztecAddress,\n        contract_address: AztecAddress,\n    ) -> Option<BoundedVec<Field, MESSAGE_PLAINTEXT_LEN>> {\n        // Extract the ephemeral public key x-coordinate and masked fields, returning None for empty ciphertext.\n        if ciphertext.len() > 0 {\n            let masked_fields: BoundedVec<Field, MESSAGE_CIPHERTEXT_LEN - EPH_PK_X_SIZE_IN_FIELDS> =\n                array::subbvec(ciphertext, EPH_PK_X_SIZE_IN_FIELDS);\n            Option::some((ciphertext.get(0), masked_fields))\n        } else {\n            Option::none()\n        }\n            .and_then(|(eph_pk_x, masked_fields)| {\n                // With the x-coordinate of the ephemeral public key we can reconstruct the point as we know that the\n                // y-coordinate must be positive. This may fail however, as not all x-coordinates are on the curve. In\n                // that case, we simply return `Option::none`.\n                point_from_x_coord_and_sign(eph_pk_x, true).and_then(|eph_pk| {\n                    let s_app = get_shared_secret(recipient, eph_pk, contract_address);\n\n                    let unmasked_fields = masked_fields.mapi(|i, field| {\n                        let unmasked = unmask_field(s_app, i, field);\n                        // If we failed to unmask the field, we are dealing with the random padding. We'll ignore it\n                        // later, so we can simply set it to 0\n                        unmasked.unwrap_or(0)\n                    });\n                    let ciphertext_without_eph_pk_x = bytes_from_fields(unmasked_fields);\n\n                    // Derive symmetric keys:\n                    let pairs = derive_aes_symmetric_key_and_iv_from_shared_secret::<2>(s_app);\n                    let (body_sym_key, body_iv) = pairs[0];\n                    let (header_sym_key, header_iv) = pairs[1];\n\n                    // Extract the header ciphertext\n                    let header_start = 0;\n                    let header_ciphertext: [u8; HEADER_CIPHERTEXT_SIZE_IN_BYTES] =\n                        array::subarray(ciphertext_without_eph_pk_x.storage(), header_start);\n                    // We need to convert the array to a BoundedVec because the oracle expects a BoundedVec as it's\n                    // designed to work with messages with unknown length at compile time. This would not be necessary\n                    // here as the header ciphertext length is fixed. But we do it anyway to not have to have duplicate\n                    // oracles.\n                    let header_ciphertext_bvec =\n                        BoundedVec::<u8, HEADER_CIPHERTEXT_SIZE_IN_BYTES>::from_array(header_ciphertext);\n\n                    try_aes128_decrypt(header_ciphertext_bvec, header_iv, header_sym_key)\n                    // Extract ciphertext length from header (2 bytes, big-endian)\n                    .and_then(|header_plaintext| extract_ciphertext_length(header_plaintext))\n                        .filter(|ciphertext_length| ciphertext_length <= MESSAGE_PLAINTEXT_SIZE_IN_BYTES)\n                        .map(|ciphertext_length| {\n                            // Extract and decrypt main ciphertext\n                            let ciphertext_start = header_start + HEADER_CIPHERTEXT_SIZE_IN_BYTES;\n                            let ciphertext_with_padding: [u8; MESSAGE_PLAINTEXT_SIZE_IN_BYTES] =\n                                array::subarray(ciphertext_without_eph_pk_x.storage(), ciphertext_start);\n                            BoundedVec::from_parts(ciphertext_with_padding, ciphertext_length)\n                        })\n                        // Decrypt main ciphertext and return it\n                        .and_then(|ciphertext| try_aes128_decrypt(ciphertext, body_iv, body_sym_key))\n                        // Convert bytes back to fields (32 bytes per field). Returns None if the actual bytes are\n                        // not valid.\n                        .and_then(|plaintext_bytes| try_fields_from_bytes(plaintext_bytes))\n                })\n            })\n    }\n}\n\n/// Encodes the body ciphertext length into a 2-byte big-endian header.\nfn encode_header(ciphertext_length: u32) -> [u8; 2] {\n    [(ciphertext_length >> 8) as u8, ciphertext_length as u8]\n}\n\n/// Extracts the body ciphertext length from a decrypted header as a 2-byte big-endian integer.\n///\n/// Returns `Option::none()` if the header has fewer than 2 bytes.\nunconstrained fn extract_ciphertext_length<let N: u32>(header: BoundedVec<u8, N>) -> Option<u32> {\n    if header.len() >= 2 {\n        Option::some(((header.get(0) as u32) << 8) | (header.get(1) as u32))\n    } else {\n        Option::none()\n    }\n}\n\n/// 2^248: upper bound for values that fit in 31 bytes\nglobal TWO_POW_248: Field = 2.pow_32(248);\n\n/// Removes the Poseidon2-derived mask from a ciphertext field. Returns the unmasked value if it fits in 31 bytes\n/// (a content field), or `None` if it doesn't (random padding). Unconstrained to prevent accidental use in\n/// constrained context.\nunconstrained fn unmask_field(s_app: Field, index: u32, masked: Field) -> Option<Field> {\n    let unmasked = masked - derive_shared_secret_field_mask(s_app, index);\n    if unmasked.lt(TWO_POW_248) {\n        Option::some(unmasked)\n    } else {\n        Option::none()\n    }\n}\n\n/// Produces a random valid address point, i.e. one that is on the curve. This is equivalent to calling\n/// [`AztecAddress::to_address_point`] on a random valid address.\nunconstrained fn random_address_point() -> AddressPoint {\n    let mut result = std::mem::zeroed();\n\n    loop {\n        // We simply produce random x coordinates until we find one that is on the curve. About half of the x\n        // coordinates fulfill this condition, so this should only take a few iterations at most.\n        let x_coord = random();\n        let point = point_from_x_coord_and_sign(x_coord, true);\n        if point.is_some() {\n            result = AddressPoint { inner: point.unwrap() };\n            break;\n        }\n    }\n\n    result\n}\n\nmod test {\n    use crate::{\n        keys::ecdh_shared_secret::{compute_app_siloed_shared_secret, derive_ecdh_shared_secret},\n        messages::{\n            encoding::{HEADER_CIPHERTEXT_SIZE_IN_BYTES, MESSAGE_PLAINTEXT_LEN, MESSAGE_PLAINTEXT_SIZE_IN_BYTES},\n            encryption::message_encryption::MessageEncryption,\n        },\n        test::helpers::test_environment::TestEnvironment,\n    };\n    use crate::protocol::{address::AztecAddress, traits::FromField};\n    use super::{AES128, encode_header, random_address_point};\n    use std::{embedded_curve_ops::EmbeddedCurveScalar, test::OracleMock};\n\n    #[test]\n    unconstrained fn encrypt_decrypt_deterministic() {\n        let env = TestEnvironment::new();\n\n        // Message decryption requires oracles that are only available during private execution\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n            let plaintext = [1, 2, 3];\n\n            let recipient = AztecAddress::from_field(\n                0x25afb798ea6d0b8c1618e50fdeafa463059415013d3b7c75d46abf5e242be70c,\n            );\n\n            // Mock random values for deterministic test\n            let eph_sk = 0x1358d15019d4639393d62b97e1588c095957ce74a1c32d6ec7d62fe6705d9538;\n            let _ = OracleMock::mock(\"aztec_utl_getRandomField\").returns(eph_sk).times(1);\n\n            let randomness = 0x0101010101010101010101010101010101010101010101010101010101010101;\n            let _ = OracleMock::mock(\"aztec_utl_getRandomField\").returns(randomness).times(1000000);\n\n            let _ = OracleMock::mock(\"aztec_prv_getNextAppTagAsSender\").returns(42);\n\n            // Encrypt the message\n            let encrypted_message = BoundedVec::from_array(AES128::encrypt(plaintext, recipient, contract_address));\n\n            // Compute the same app-siloed shared secret that the oracle would return\n            let raw_shared_secret = derive_ecdh_shared_secret(\n                EmbeddedCurveScalar::from_field(eph_sk),\n                recipient.to_address_point().unwrap().inner,\n            );\n            let s_app = compute_app_siloed_shared_secret(raw_shared_secret, contract_address);\n\n            let _ = OracleMock::mock(\"aztec_utl_getSharedSecret\").returns(s_app);\n\n            // Decrypt the message\n            let decrypted = AES128::decrypt(encrypted_message, recipient, contract_address).unwrap();\n\n            // The decryption function spits out a BoundedVec because it's designed to work with messages with unknown\n            // length at compile time. For this reason we need to convert the original input to a BoundedVec.\n            let plaintext_bvec = BoundedVec::<Field, MESSAGE_PLAINTEXT_LEN>::from_array(plaintext);\n\n            // Verify decryption matches original plaintext\n            assert_eq(decrypted, plaintext_bvec, \"Decrypted bytes should match original plaintext\");\n\n            // The following is a workaround of \"struct is never constructed\" Noir compilation error (we only ever use\n            // static methods of the struct).\n            let _ = AES128 {};\n        });\n    }\n\n    #[test]\n    unconstrained fn encrypt_decrypt_random() {\n        // Same as `encrypt_decrypt_deterministic`, except we don't mock any of the oracles and rely on\n        // `TestEnvironment` instead.\n        let mut env = TestEnvironment::new();\n\n        let recipient = env.create_light_account();\n\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n            let plaintext = [1, 2, 3];\n            let ciphertext = AES128::encrypt(plaintext, recipient, contract_address);\n\n            assert_eq(\n                AES128::decrypt(\n                    BoundedVec::from_array(ciphertext),\n                    recipient,\n                    contract_address,\n                )\n                    .unwrap(),\n                BoundedVec::from_array(plaintext),\n            );\n        });\n    }\n\n    #[test]\n    unconstrained fn encrypt_to_invalid_address() {\n        // x = 3 is a non-residue for this curve, resulting in an invalid address\n        let invalid_address = AztecAddress { inner: 3 };\n        let contract_address = AztecAddress { inner: 42 };\n\n        let _ = AES128::encrypt([1, 2, 3, 4], invalid_address, contract_address);\n    }\n\n    // Documents the PKCS#7 padding behavior that `encrypt` relies on (see its static_assert).\n    #[test]\n    fn pkcs7_padding_always_adds_at_least_one_byte() {\n        let key = [0 as u8; 16];\n        let iv = [0 as u8; 16];\n\n        // 1 byte input + 15 bytes padding = 16 bytes\n        assert_eq(std::aes128::aes128_encrypt([0; 1], iv, key).len(), 16);\n\n        // 15 bytes input + 1 byte padding = 16 bytes\n        assert_eq(std::aes128::aes128_encrypt([0; 15], iv, key).len(), 16);\n\n        // 16 bytes input (block-aligned) + full 16-byte padding block = 32 bytes\n        assert_eq(std::aes128::aes128_encrypt([0; 16], iv, key).len(), 32);\n    }\n\n    #[test]\n    unconstrained fn encrypt_decrypt_max_size_plaintext() {\n        let mut env = TestEnvironment::new();\n        let recipient = env.create_light_account();\n\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n            let mut plaintext = [0; MESSAGE_PLAINTEXT_LEN];\n            for i in 0..MESSAGE_PLAINTEXT_LEN {\n                plaintext[i] = i as Field;\n            }\n            let ciphertext = AES128::encrypt(plaintext, recipient, contract_address);\n\n            assert_eq(\n                AES128::decrypt(\n                    BoundedVec::from_array(ciphertext),\n                    recipient,\n                    contract_address,\n                )\n                    .unwrap(),\n                BoundedVec::from_array(plaintext),\n            );\n        });\n    }\n\n    #[test(should_fail_with = \"Plaintext length exceeds MESSAGE_PLAINTEXT_LEN\")]\n    unconstrained fn encrypt_oversized_plaintext() {\n        let address = AztecAddress { inner: 3 };\n        let contract_address = AztecAddress { inner: 42 };\n        let plaintext: [Field; MESSAGE_PLAINTEXT_LEN + 1] = [0; MESSAGE_PLAINTEXT_LEN + 1];\n        let _ = AES128::encrypt(plaintext, address, contract_address);\n    }\n\n    #[test]\n    unconstrained fn random_address_point_produces_valid_points() {\n        // About half of random addresses are invalid, so testing just a couple gives us high confidence that\n        // `random_address_point` is indeed producing valid addresses.\n        for _ in 0..10 {\n            let random_address = AztecAddress { inner: random_address_point().inner.x };\n            assert(random_address.to_address_point().is_some());\n        }\n    }\n\n    #[test]\n    unconstrained fn decrypt_invalid_ephemeral_public_key() {\n        let mut env = TestEnvironment::new();\n\n        let recipient = env.create_light_account();\n\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n            let plaintext = [1, 2, 3, 4];\n            let ciphertext = AES128::encrypt(plaintext, recipient, contract_address);\n\n            // The first field of the ciphertext is the x-coordinate of the ephemeral public key. We set it to a known\n            // non-residue (3), causing `decrypt` to fail to produce a decryption shared secret.\n            let mut bad_ciphertext = BoundedVec::from_array(ciphertext);\n            bad_ciphertext.set(0, 3);\n\n            assert(AES128::decrypt(bad_ciphertext, recipient, contract_address).is_none());\n        });\n    }\n\n    #[test]\n    unconstrained fn decrypt_returns_none_on_empty_ciphertext() {\n        let mut env = TestEnvironment::new();\n        let recipient = env.create_light_account();\n\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n            assert(AES128::decrypt(BoundedVec::new(), recipient, contract_address).is_none());\n        });\n    }\n\n    // Mocks the header AES decrypt oracle to return an empty result. The TS oracle never throws on invalid\n    // input: it decrypts to garbage bytes or returns empty\n    #[test]\n    unconstrained fn decrypt_returns_none_on_empty_header() {\n        let mut env = TestEnvironment::new();\n        let recipient = env.create_light_account();\n\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n            let plaintext = [1, 2, 3];\n            let ciphertext = BoundedVec::from_array(AES128::encrypt(plaintext, recipient, contract_address));\n\n            let empty_header = BoundedVec::<u8, HEADER_CIPHERTEXT_SIZE_IN_BYTES>::new();\n            let _ = OracleMock::mock(\"aztec_utl_decryptAes128\").returns(Option::some(empty_header)).times(1);\n\n            assert(AES128::decrypt(ciphertext, recipient, contract_address).is_none());\n        });\n    }\n\n    // Mocks the header oracle to return a 2-byte header that decodes to a ciphertext_length one past the maximum\n    // allowed value, verifying the edge case is handled correctly.\n    #[test]\n    unconstrained fn decrypt_returns_none_on_oversized_ciphertext_length() {\n        let mut env = TestEnvironment::new();\n        let recipient = env.create_light_account();\n\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n            let plaintext = [1, 2, 3];\n            let ciphertext = BoundedVec::from_array(AES128::encrypt(plaintext, recipient, contract_address));\n\n            let bad_header = BoundedVec::<u8, HEADER_CIPHERTEXT_SIZE_IN_BYTES>::from_array(encode_header(\n                MESSAGE_PLAINTEXT_SIZE_IN_BYTES + 1,\n            ));\n            let _ = OracleMock::mock(\"aztec_utl_decryptAes128\").returns(Option::some(bad_header)).times(1);\n\n            assert(AES128::decrypt(ciphertext, recipient, contract_address).is_none());\n        });\n    }\n\n}\n"
        },
        "155": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/messages/logs/event.nr",
            "source": "use crate::{\n    event::{event_interface::EventInterface, EventSelector},\n    messages::{\n        encoding::{encode_message, MAX_MESSAGE_CONTENT_LEN, MESSAGE_EXPANDED_METADATA_LEN},\n        msg_type::PRIVATE_EVENT_MSG_TYPE_ID,\n    },\n    utils::array,\n};\nuse crate::protocol::traits::{FromField, Serialize, ToField};\n\n/// The number of fields in a private event message content that are not the event's serialized representation (1 field\n/// for randomness).\npub(crate) global PRIVATE_EVENT_MSG_PLAINTEXT_RESERVED_FIELDS_LEN: u32 = 1;\npub(crate) global PRIVATE_EVENT_MSG_PLAINTEXT_RANDOMNESS_INDEX: u32 = 0;\n\n/// The maximum length of the packed representation of an event's contents. This is limited by private log size,\n/// encryption overhead and extra fields in the message (e.g. message type id, randomness, etc.).\npub global MAX_EVENT_SERIALIZED_LEN: u32 = MAX_MESSAGE_CONTENT_LEN - PRIVATE_EVENT_MSG_PLAINTEXT_RESERVED_FIELDS_LEN;\n\n/// Creates the plaintext for a private event message (i.e. one of type [`PRIVATE_EVENT_MSG_TYPE_ID`]).\n///\n/// This plaintext is meant to be decoded via [`decode_private_event_message`].\npub fn encode_private_event_message<Event>(\n    event: Event,\n    randomness: Field,\n) -> [Field; PRIVATE_EVENT_MSG_PLAINTEXT_RESERVED_FIELDS_LEN + <Event as Serialize>::N + MESSAGE_EXPANDED_METADATA_LEN]\nwhere\n    Event: EventInterface + Serialize,\n{\n    // We use `Serialize` because we want for events to be processable by off-chain actors, e.g. block explorers,\n    // wallets and apps, without having to rely on contract invocation. If we used `Packable` we'd need to call utility\n    // functions in order to unpack events, which would introduce a level of complexity we don't currently think is\n    // worth the savings in DA (for public events) and proving time (when encrypting private event messages).\n    let serialized_event = event.serialize();\n\n    // If PRIVATE_EVENT_MSG_PLAINTEXT_RESERVED_FIELDS_LEN is changed, causing the assertion below to fail, then the\n    // encoding below must be updated as well.\n    std::static_assert(\n        PRIVATE_EVENT_MSG_PLAINTEXT_RESERVED_FIELDS_LEN == 1,\n        \"unexpected value for PRIVATE_EVENT_MSG_PLAINTEXT_RESERVED_FIELDS_LEN\",\n    );\n\n    let mut msg_plaintext = [0; PRIVATE_EVENT_MSG_PLAINTEXT_RESERVED_FIELDS_LEN + <Event as Serialize>::N];\n    msg_plaintext[PRIVATE_EVENT_MSG_PLAINTEXT_RANDOMNESS_INDEX] = randomness;\n\n    for i in 0..serialized_event.len() {\n        msg_plaintext[PRIVATE_EVENT_MSG_PLAINTEXT_RESERVED_FIELDS_LEN + i] = serialized_event[i];\n    }\n\n    // The event type id is stored in the message metadata\n    encode_message(\n        PRIVATE_EVENT_MSG_TYPE_ID,\n        Event::get_event_type_id().to_field() as u64,\n        msg_plaintext,\n    )\n}\n\n/// Decodes the plaintext from a private event message (i.e. one of type [`PRIVATE_EVENT_MSG_TYPE_ID`]).\n///\n/// Returns `None` if `msg_content` has too few fields. This plaintext is meant to have originated\n/// from [`encode_private_event_message`].\n///\n/// Note that while [`encode_private_event_message`] returns a fixed-size array, this function takes a [`BoundedVec`]\n/// instead. This is because when decoding we're typically processing runtime-sized plaintexts, more specifically,\n/// those that originate from [`crate::messages::encryption::message_encryption::MessageEncryption::decrypt`].\npub(crate) unconstrained fn decode_private_event_message(\n    msg_metadata: u64,\n    msg_content: BoundedVec<Field, MAX_MESSAGE_CONTENT_LEN>,\n) -> Option<(EventSelector, Field, BoundedVec<Field, MAX_EVENT_SERIALIZED_LEN>)> {\n    if msg_content.len() <= PRIVATE_EVENT_MSG_PLAINTEXT_RESERVED_FIELDS_LEN {\n        Option::none()\n    } else {\n        let event_type_id = EventSelector::from_field(msg_metadata as Field);\n\n        // If PRIVATE_EVENT_MSG_PLAINTEXT_RESERVED_FIELDS_LEN is changed, causing the assertion below to fail, then the\n        // destructuring of the private event message encoding below must be updated as well.\n        std::static_assert(\n            PRIVATE_EVENT_MSG_PLAINTEXT_RESERVED_FIELDS_LEN == 1,\n            \"unexpected value for PRIVATE_EVENT_MSG_PLAINTEXT_RESERVED_FIELDS_LEN\",\n        );\n\n        let randomness = msg_content.get(PRIVATE_EVENT_MSG_PLAINTEXT_RANDOMNESS_INDEX);\n        let serialized_event = array::subbvec(msg_content, PRIVATE_EVENT_MSG_PLAINTEXT_RESERVED_FIELDS_LEN);\n\n        Option::some((event_type_id, randomness, serialized_event))\n    }\n}\n\nmod test {\n    use crate::{\n        event::event_interface::EventInterface,\n        messages::{\n            encoding::decode_message,\n            logs::event::{decode_private_event_message, encode_private_event_message},\n            msg_type::PRIVATE_EVENT_MSG_TYPE_ID,\n        },\n    };\n    use crate::protocol::traits::Serialize;\n    use crate::test::mocks::mock_event::MockEvent;\n\n    global VALUE: Field = 7;\n    global RANDOMNESS: Field = 10;\n\n    #[test]\n    unconstrained fn encode_decode() {\n        let event = MockEvent::new(VALUE).build_event();\n\n        let message_plaintext = encode_private_event_message(event, RANDOMNESS);\n\n        let (msg_type_id, msg_metadata, msg_content) =\n            decode_message(BoundedVec::from_array(message_plaintext)).unwrap();\n\n        assert_eq(msg_type_id, PRIVATE_EVENT_MSG_TYPE_ID);\n\n        let (event_type_id, randomness, serialized_event) =\n            decode_private_event_message(msg_metadata, msg_content).unwrap();\n\n        assert_eq(event_type_id, MockEvent::get_event_type_id());\n        assert_eq(randomness, RANDOMNESS);\n        assert_eq(serialized_event, BoundedVec::from_array(event.serialize()));\n    }\n\n    #[test]\n    unconstrained fn decode_empty_content_returns_none() {\n        let empty = BoundedVec::new();\n        assert(decode_private_event_message(0, empty).is_none());\n    }\n\n    #[test]\n    unconstrained fn decode_with_only_reserved_fields_returns_none() {\n        let content = BoundedVec::from_array([0]);\n        assert(decode_private_event_message(0, content).is_none());\n    }\n}\n"
        },
        "157": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/messages/logs/note.nr",
            "source": "use crate::{\n    messages::{\n        encoding::{encode_message, MAX_MESSAGE_CONTENT_LEN, MESSAGE_EXPANDED_METADATA_LEN},\n        msg_type::PRIVATE_NOTE_MSG_TYPE_ID,\n    },\n    note::note_interface::NoteType,\n    utils::array,\n};\nuse crate::protocol::{address::AztecAddress, traits::{FromField, Packable, ToField}};\n\n/// The number of fields in a private note message content that are not the note's packed representation.\npub(crate) global PRIVATE_NOTE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN: u32 = 3;\n\npub(crate) global PRIVATE_NOTE_MSG_PLAINTEXT_OWNER_INDEX: u32 = 0;\npub(crate) global PRIVATE_NOTE_MSG_PLAINTEXT_STORAGE_SLOT_INDEX: u32 = 1;\npub(crate) global PRIVATE_NOTE_MSG_PLAINTEXT_RANDOMNESS_INDEX: u32 = 2;\n\n/// The maximum length of the packed representation of a note's contents. This is limited by private log size,\n/// encryption overhead and extra fields in the message (e.g. message type id, storage slot, randomness, etc.).\npub global MAX_NOTE_PACKED_LEN: u32 = MAX_MESSAGE_CONTENT_LEN - PRIVATE_NOTE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN;\n\n/// Creates the plaintext for a private note message (i.e. one of type [`PRIVATE_NOTE_MSG_TYPE_ID`]).\n///\n/// This plaintext is meant to be decoded via [`decode_private_note_message`].\npub fn encode_private_note_message<Note>(\n    note: Note,\n    owner: AztecAddress,\n    storage_slot: Field,\n    randomness: Field,\n) -> [Field; PRIVATE_NOTE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN + <Note as Packable>::N + MESSAGE_EXPANDED_METADATA_LEN]\nwhere\n    Note: NoteType + Packable,\n{\n    let packed_note = note.pack();\n\n    // If PRIVATE_NOTE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN is changed, causing the assertion below to fail, then the\n    // encoding below must be updated as well.\n    std::static_assert(\n        PRIVATE_NOTE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN == 3,\n        \"unexpected value for PRIVATE_NOTE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN\",\n    );\n\n    let mut msg_content = [0; PRIVATE_NOTE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN + <Note as Packable>::N];\n    msg_content[PRIVATE_NOTE_MSG_PLAINTEXT_OWNER_INDEX] = owner.to_field();\n    msg_content[PRIVATE_NOTE_MSG_PLAINTEXT_STORAGE_SLOT_INDEX] = storage_slot;\n    msg_content[PRIVATE_NOTE_MSG_PLAINTEXT_RANDOMNESS_INDEX] = randomness;\n    for i in 0..packed_note.len() {\n        msg_content[PRIVATE_NOTE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN + i] = packed_note[i];\n    }\n\n    // Notes use the note type id for metadata\n    encode_message(PRIVATE_NOTE_MSG_TYPE_ID, Note::get_id() as u64, msg_content)\n}\n\n/// Decodes the plaintext from a private note message (i.e. one of type [`PRIVATE_NOTE_MSG_TYPE_ID`]).\n///\n/// Returns `None` if `msg_content` has too few fields. This plaintext is meant to have originated\n/// from [`encode_private_note_message`].\n///\n/// Note that while [`encode_private_note_message`] returns a fixed-size array, this function takes a [`BoundedVec`]\n/// instead. This is because when decoding we're typically processing runtime-sized plaintexts, more specifically,\n/// those that originate from [`crate::messages::encryption::message_encryption::MessageEncryption::decrypt`].\npub(crate) unconstrained fn decode_private_note_message(\n    msg_metadata: u64,\n    msg_content: BoundedVec<Field, MAX_MESSAGE_CONTENT_LEN>,\n) -> Option<(Field, AztecAddress, Field, Field, BoundedVec<Field, MAX_NOTE_PACKED_LEN>)> {\n    if msg_content.len() <= PRIVATE_NOTE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN {\n        Option::none()\n    } else {\n        let note_type_id = msg_metadata as Field; // TODO: make note type id not be a full field\n\n        // If PRIVATE_NOTE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN is changed, causing the assertion below to fail, then the\n        // decoding below must be updated as well.\n        std::static_assert(\n            PRIVATE_NOTE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN == 3,\n            \"unexpected value for PRIVATE_NOTE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN\",\n        );\n\n        let owner = AztecAddress::from_field(msg_content.get(PRIVATE_NOTE_MSG_PLAINTEXT_OWNER_INDEX));\n        let storage_slot = msg_content.get(PRIVATE_NOTE_MSG_PLAINTEXT_STORAGE_SLOT_INDEX);\n        let randomness = msg_content.get(PRIVATE_NOTE_MSG_PLAINTEXT_RANDOMNESS_INDEX);\n        let packed_note = array::subbvec(msg_content, PRIVATE_NOTE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN);\n\n        Option::some((note_type_id, owner, storage_slot, randomness, packed_note))\n    }\n}\n\nmod test {\n    use crate::{\n        messages::{\n            encoding::decode_message,\n            logs::note::{decode_private_note_message, encode_private_note_message, MAX_NOTE_PACKED_LEN},\n            msg_type::PRIVATE_NOTE_MSG_TYPE_ID,\n        },\n        note::note_interface::NoteType,\n    };\n    use crate::protocol::{address::AztecAddress, traits::{FromField, Packable}};\n    use crate::test::mocks::mock_note::MockNote;\n\n    global VALUE: Field = 7;\n    global OWNER: AztecAddress = AztecAddress::from_field(8);\n    global STORAGE_SLOT: Field = 9;\n    global RANDOMNESS: Field = 10;\n\n    #[test]\n    unconstrained fn encode_decode() {\n        let note = MockNote::new(VALUE).build_note();\n\n        let message_plaintext = encode_private_note_message(note, OWNER, STORAGE_SLOT, RANDOMNESS);\n\n        let (msg_type_id, msg_metadata, msg_content) =\n            decode_message(BoundedVec::from_array(message_plaintext)).unwrap();\n\n        assert_eq(msg_type_id, PRIVATE_NOTE_MSG_TYPE_ID);\n\n        let (note_type_id, owner, storage_slot, randomness, packed_note) =\n            decode_private_note_message(msg_metadata, msg_content).unwrap();\n\n        assert_eq(note_type_id, MockNote::get_id());\n        assert_eq(owner, OWNER);\n        assert_eq(storage_slot, STORAGE_SLOT);\n        assert_eq(randomness, RANDOMNESS);\n        assert_eq(packed_note, BoundedVec::from_array(note.pack()));\n    }\n\n    #[derive(Packable)]\n    struct MaxSizeNote {\n        data: [Field; MAX_NOTE_PACKED_LEN],\n    }\n\n    impl NoteType for MaxSizeNote {\n        fn get_id() -> Field {\n            0\n        }\n    }\n\n    #[test]\n    unconstrained fn encode_decode_max_size_note() {\n        let mut data = [0; MAX_NOTE_PACKED_LEN];\n        for i in 0..MAX_NOTE_PACKED_LEN {\n            data[i] = i as Field;\n        }\n        let note = MaxSizeNote { data };\n\n        let encoded = encode_private_note_message(note, OWNER, STORAGE_SLOT, RANDOMNESS);\n        let (msg_type_id, msg_metadata, msg_content) = decode_message(BoundedVec::from_array(encoded)).unwrap();\n\n        assert_eq(msg_type_id, PRIVATE_NOTE_MSG_TYPE_ID);\n\n        let (note_type_id, owner, storage_slot, randomness, packed_note) =\n            decode_private_note_message(msg_metadata, msg_content).unwrap();\n\n        assert_eq(note_type_id, MaxSizeNote::get_id());\n        assert_eq(owner, OWNER);\n        assert_eq(storage_slot, STORAGE_SLOT);\n        assert_eq(randomness, RANDOMNESS);\n        assert_eq(packed_note, BoundedVec::from_array(data));\n    }\n\n    #[derive(Packable)]\n    struct OversizedNote {\n        data: [Field; MAX_NOTE_PACKED_LEN + 1],\n    }\n\n    impl NoteType for OversizedNote {\n        fn get_id() -> Field {\n            0\n        }\n    }\n\n    #[test(should_fail_with = \"Invalid message content: it must have a length of at most MAX_MESSAGE_CONTENT_LEN\")]\n    fn encode_oversized_note_fails() {\n        let note = OversizedNote { data: [0; MAX_NOTE_PACKED_LEN + 1] };\n        let _ = encode_private_note_message(note, OWNER, STORAGE_SLOT, RANDOMNESS);\n    }\n\n    #[test]\n    unconstrained fn decode_empty_content_returns_none() {\n        let empty = BoundedVec::new();\n        assert(decode_private_note_message(0, empty).is_none());\n    }\n\n    #[test]\n    unconstrained fn decode_with_only_reserved_fields_returns_none() {\n        let content = BoundedVec::from_array([0, 0, 0]);\n        assert(decode_private_note_message(0, content).is_none());\n    }\n}\n"
        },
        "158": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/messages/logs/partial_note.nr",
            "source": "use crate::{\n    messages::{\n        encoding::{encode_message, MAX_MESSAGE_CONTENT_LEN, MESSAGE_EXPANDED_METADATA_LEN},\n        msg_type::PARTIAL_NOTE_PRIVATE_MSG_TYPE_ID,\n    },\n    note::note_interface::NoteType,\n    utils::array,\n};\nuse crate::protocol::{address::AztecAddress, traits::{FromField, Packable, ToField}};\n\n/// The number of fields in a private note message content that are not the note's packed representation.\npub(crate) global PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN: u32 = 3;\npub(crate) global PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_OWNER_INDEX: u32 = 0;\npub(crate) global PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_RANDOMNESS_INDEX: u32 = 1;\npub(crate) global PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_NOTE_COMPLETION_LOG_TAG_INDEX: u32 = 2;\n\n/// Partial notes have a maximum packed length of their private fields bound by extra content in their private message\n/// (e.g. the storage slot, note completion log tag, etc.).\npub global MAX_PARTIAL_NOTE_PRIVATE_PACKED_LEN: u32 =\n    MAX_MESSAGE_CONTENT_LEN - PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN;\n\n/// Creates the plaintext for a partial note private message (i.e. one of type [`PARTIAL_NOTE_PRIVATE_MSG_TYPE_ID`]).\n///\n/// This plaintext is meant to be decoded via [`decode_partial_note_private_message`].\npub fn encode_partial_note_private_message<PartialNotePrivateContent>(\n    partial_note_private_content: PartialNotePrivateContent,\n    owner: AztecAddress,\n    randomness: Field,\n    note_completion_log_tag: Field,\n    ) -> [Field; PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN + <PartialNotePrivateContent as Packable>::N + MESSAGE_EXPANDED_METADATA_LEN]\nwhere\n    PartialNotePrivateContent: NoteType + Packable,\n{\n    let packed_private_content = partial_note_private_content.pack();\n\n    // If PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_NON_NOTE_FIELDS_LEN is changed, causing the assertion below to fail, then\n    // the encoding below must be updated as well.\n    std::static_assert(\n        PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN == 3,\n        \"unexpected value for PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_NON_NOTE_FIELDS_LEN\",\n    );\n\n    let mut msg_content =\n        [0; PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN + <PartialNotePrivateContent as Packable>::N];\n    msg_content[PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_OWNER_INDEX] = owner.to_field();\n    msg_content[PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_RANDOMNESS_INDEX] = randomness;\n    msg_content[PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_NOTE_COMPLETION_LOG_TAG_INDEX] = note_completion_log_tag;\n\n    for i in 0..packed_private_content.len() {\n        msg_content[PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN + i] = packed_private_content[i];\n    }\n\n    encode_message(\n        PARTIAL_NOTE_PRIVATE_MSG_TYPE_ID,\n        // Notes use the note type id for metadata\n        PartialNotePrivateContent::get_id() as u64,\n        msg_content,\n    )\n}\n\n/// Decodes the plaintext from a partial note private message (i.e. one of type\n/// [`PARTIAL_NOTE_PRIVATE_MSG_TYPE_ID`]).\n///\n/// Returns `None` if `msg_content` has too few fields. This plaintext is meant to have originated\n/// from [`encode_partial_note_private_message`].\n///\n/// Note that while [`encode_partial_note_private_message`] returns a fixed-size array, this function takes a\n/// [`BoundedVec`] instead. This is because when decoding we're typically processing runtime-sized plaintexts, more\n/// specifically, those that originate from\n/// [`crate::messages::encryption::message_encryption::MessageEncryption::decrypt`].\npub(crate) unconstrained fn decode_partial_note_private_message(\n    msg_metadata: u64,\n    msg_content: BoundedVec<Field, MAX_MESSAGE_CONTENT_LEN>,\n) -> Option<(AztecAddress, Field, Field, Field, BoundedVec<Field, MAX_PARTIAL_NOTE_PRIVATE_PACKED_LEN>)> {\n    if msg_content.len() < PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN {\n        Option::none()\n    } else {\n        let note_type_id: Field = msg_metadata as Field; // TODO: make note type id not be a full field\n\n        // If PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_NON_NOTE_FIELDS_LEN is changed, causing the assertion below to fail,\n        // then the destructuring of the partial note private message encoding below must be updated as well.\n        std::static_assert(\n            PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN == 3,\n            \"unexpected value for PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_NON_NOTE_FIELDS_LEN\",\n        );\n\n        // We currently have three fields that are not the partial note's packed representation, which are the owner,\n        // the randomness, and the note completion log tag.\n        let owner = AztecAddress::from_field(\n            msg_content.get(PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_OWNER_INDEX),\n        );\n        let randomness = msg_content.get(PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_RANDOMNESS_INDEX);\n        let note_completion_log_tag = msg_content.get(PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_NOTE_COMPLETION_LOG_TAG_INDEX);\n\n        let packed_private_note_content: BoundedVec<Field, MAX_PARTIAL_NOTE_PRIVATE_PACKED_LEN> = array::subbvec(\n            msg_content,\n            PARTIAL_NOTE_PRIVATE_MSG_PLAINTEXT_RESERVED_FIELDS_LEN,\n        );\n\n        Option::some(\n            (owner, randomness, note_completion_log_tag, note_type_id, packed_private_note_content),\n        )\n    }\n}\n\nmod test {\n    use crate::{\n        messages::{\n            encoding::decode_message,\n            logs::partial_note::{decode_partial_note_private_message, encode_partial_note_private_message},\n            msg_type::PARTIAL_NOTE_PRIVATE_MSG_TYPE_ID,\n        },\n        note::note_interface::NoteType,\n    };\n    use crate::protocol::{address::AztecAddress, traits::{FromField, Packable}};\n    use crate::test::mocks::mock_note::MockNote;\n\n    global VALUE: Field = 7;\n    global OWNER: AztecAddress = AztecAddress::from_field(8);\n    global RANDOMNESS: Field = 10;\n    global NOTE_COMPLETION_LOG_TAG: Field = 11;\n\n    #[test]\n    unconstrained fn encode_decode() {\n        // Note that here we use MockNote as the private fields of a partial note\n        let note = MockNote::new(VALUE).build_note();\n\n        let message_plaintext = encode_partial_note_private_message(note, OWNER, RANDOMNESS, NOTE_COMPLETION_LOG_TAG);\n\n        let (msg_type_id, msg_metadata, msg_content) =\n            decode_message(BoundedVec::from_array(message_plaintext)).unwrap();\n\n        assert_eq(msg_type_id, PARTIAL_NOTE_PRIVATE_MSG_TYPE_ID);\n\n        let (owner, randomness, note_completion_log_tag, note_type_id, packed_note) =\n            decode_partial_note_private_message(msg_metadata, msg_content).unwrap();\n\n        assert_eq(note_type_id, MockNote::get_id());\n        assert_eq(owner, OWNER);\n        assert_eq(randomness, RANDOMNESS);\n        assert_eq(note_completion_log_tag, NOTE_COMPLETION_LOG_TAG);\n        assert_eq(packed_note, BoundedVec::from_array(note.pack()));\n    }\n\n    #[test]\n    unconstrained fn decode_empty_content_returns_none() {\n        let empty = BoundedVec::new();\n        assert(decode_partial_note_private_message(0, empty).is_none());\n    }\n\n    #[test]\n    unconstrained fn decode_succeeds_with_only_reserved_fields() {\n        let content = BoundedVec::from_array([0, 0, 0]);\n        let (_, _, _, _, packed_note) = decode_partial_note_private_message(0, content).unwrap();\n        assert_eq(packed_note.len(), 0);\n    }\n}\n"
        },
        "168": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/messages/processing/mod.nr",
            "source": "pub(crate) mod event_validation_request;\npub mod offchain;\n\nmod message_context;\npub use message_context::MessageContext;\n\npub(crate) mod note_validation_request;\npub(crate) mod log_retrieval_request;\npub(crate) mod log_retrieval_response;\npub(crate) mod pending_tagged_log;\n\nuse crate::{\n    capsules::CapsuleArray,\n    event::EventSelector,\n    messages::{\n        discovery::partial_notes::DeliveredPendingPartialNote,\n        encoding::MESSAGE_CIPHERTEXT_LEN,\n        logs::{event::MAX_EVENT_SERIALIZED_LEN, note::MAX_NOTE_PACKED_LEN},\n        processing::{\n            log_retrieval_request::LogRetrievalRequest, log_retrieval_response::LogRetrievalResponse,\n            note_validation_request::NoteValidationRequest, pending_tagged_log::PendingTaggedLog,\n        },\n    },\n    oracle,\n};\nuse crate::protocol::{\n    address::AztecAddress,\n    constants::DOM_SEP__NOTE_COMPLETION_LOG_TAG,\n    hash::{compute_log_tag, sha256_to_field},\n    traits::{Deserialize, Serialize},\n};\nuse event_validation_request::EventValidationRequest;\n\n// Base slot for the pending tagged log array to which the fetch_tagged_logs oracle inserts found private logs.\npub(crate) global PENDING_TAGGED_LOG_ARRAY_BASE_SLOT: Field =\n    sha256_to_field(\"AZTEC_NR::PENDING_TAGGED_LOG_ARRAY_BASE_SLOT\".as_bytes());\n\nglobal NOTE_VALIDATION_REQUESTS_ARRAY_BASE_SLOT: Field = sha256_to_field(\n    \"AZTEC_NR::NOTE_VALIDATION_REQUESTS_ARRAY_BASE_SLOT\".as_bytes(),\n);\n\nglobal EVENT_VALIDATION_REQUESTS_ARRAY_BASE_SLOT: Field = sha256_to_field(\n    \"AZTEC_NR::EVENT_VALIDATION_REQUESTS_ARRAY_BASE_SLOT\".as_bytes(),\n);\n\nglobal LOG_RETRIEVAL_REQUESTS_ARRAY_BASE_SLOT: Field = sha256_to_field(\n    \"AZTEC_NR::LOG_RETRIEVAL_REQUESTS_ARRAY_BASE_SLOT\".as_bytes(),\n);\n\nglobal LOG_RETRIEVAL_RESPONSES_ARRAY_BASE_SLOT: Field = sha256_to_field(\n    \"AZTEC_NR::LOG_RETRIEVAL_RESPONSES_ARRAY_BASE_SLOT\".as_bytes(),\n);\n\n/// An offchain-delivered message with resolved context, ready for processing during sync.\n#[derive(Serialize, Deserialize)]\npub struct OffchainMessageWithContext {\n    pub message_ciphertext: BoundedVec<Field, MESSAGE_CIPHERTEXT_LEN>,\n    pub message_context: MessageContext,\n}\n\n/// Searches for private logs emitted by `contract_address` that might contain messages for the given `scope`.\npub(crate) unconstrained fn get_private_logs(\n    contract_address: AztecAddress,\n    scope: AztecAddress,\n) -> CapsuleArray<PendingTaggedLog> {\n    // We will eventually perform log discovery via tagging here, but for now we simply call the `fetchTaggedLogs`\n    // oracle. This makes PXE synchronize tags, download logs and store the pending tagged logs in a capsule array.\n    oracle::message_processing::fetch_tagged_logs(PENDING_TAGGED_LOG_ARRAY_BASE_SLOT, scope);\n\n    CapsuleArray::at(contract_address, PENDING_TAGGED_LOG_ARRAY_BASE_SLOT, scope)\n}\n\n/// Enqueues a note for validation and storage by PXE.\n///\n/// Once validated, the note becomes retrievable via the `get_notes` oracle. The note will be scoped to\n/// `contract_address`, meaning other contracts will not be able to access it unless authorized.\n///\n/// In order for the note validation and insertion to occur, `validate_and_store_enqueued_notes_and_events` must be\n/// later called. For optimal performance, accumulate as many note validation requests as possible and then validate\n/// them all at the end (which results in PXE minimizing the number of network round-trips).\n///\n/// The `packed_note` is what `getNotes` will later return. PXE indexes notes by `storage_slot`, so this value is\n/// typically used to filter notes that correspond to different state variables. `note_hash` and `nullifier` are the\n/// inner hashes, i.e. the raw hashes returned by `NoteHash::compute_note_hash` and `NoteHash::compute_nullifier`. PXE\n/// will verify that the siloed unique note hash was inserted into the tree at `tx_hash`, and will store the nullifier\n/// to later check for nullification.\n///\n/// `owner` is the address used in note hash and nullifier computation, often requiring knowledge of their nullifier\n/// secret key.\n///\n/// `scope` is the account to which the note message was delivered (i.e. the address the message was encrypted to).\n/// This determines which PXE account can see the note - other accounts will not be able to access it (e.g. other\n/// accounts will not be able to see one another's token balance notes, even in the same PXE) unless authorized. In\n/// most cases `recipient` equals `owner`, but they can differ in scenarios like delegated discovery.\npub unconstrained fn enqueue_note_for_validation(\n    contract_address: AztecAddress,\n    owner: AztecAddress,\n    storage_slot: Field,\n    randomness: Field,\n    note_nonce: Field,\n    packed_note: BoundedVec<Field, MAX_NOTE_PACKED_LEN>,\n    note_hash: Field,\n    nullifier: Field,\n    tx_hash: Field,\n    scope: AztecAddress,\n) {\n    // We store requests in a `CapsuleArray`, which PXE will later read from and deserialize into its version of the\n    // Noir `NoteValidationRequest`\n    CapsuleArray::at(\n        contract_address,\n        NOTE_VALIDATION_REQUESTS_ARRAY_BASE_SLOT,\n        scope,\n    )\n        .push(\n            NoteValidationRequest {\n                contract_address,\n                owner,\n                storage_slot,\n                randomness,\n                note_nonce,\n                packed_note,\n                note_hash,\n                nullifier,\n                tx_hash,\n            },\n        )\n}\n\n/// Enqueues an event for validation and storage by PXE.\n///\n/// This is the primary way for custom message handlers (registered via\n/// [`crate::macros::AztecConfig::custom_message_handler`]) to deliver reassembled events back to PXE after processing\n/// application-specific message formats.\n///\n/// In order for the event validation and insertion to occur, `validate_and_store_enqueued_notes_and_events` must be\n/// later called. For optimal performance, accumulate as many event validation requests as possible and then validate\n/// them all at the end (which results in PXE minimizing the number of network round-trips).\n///\n/// Note that `validate_and_store_enqueued_notes_and_events` is called by Aztec.nr after processing messages, so custom\n/// message processors do not need to be concerned with this.\npub unconstrained fn enqueue_event_for_validation(\n    contract_address: AztecAddress,\n    event_type_id: EventSelector,\n    randomness: Field,\n    serialized_event: BoundedVec<Field, MAX_EVENT_SERIALIZED_LEN>,\n    event_commitment: Field,\n    tx_hash: Field,\n    scope: AztecAddress,\n) {\n    // We store requests in a `CapsuleArray`, which PXE will later read from and deserialize into its version of the\n    // Noir `EventValidationRequest`\n    CapsuleArray::at(\n        contract_address,\n        EVENT_VALIDATION_REQUESTS_ARRAY_BASE_SLOT,\n        scope,\n    )\n        .push(\n            EventValidationRequest {\n                contract_address,\n                event_type_id,\n                randomness,\n                serialized_event,\n                event_commitment,\n                tx_hash,\n            },\n        )\n}\n\n/// Validates and stores all enqueued notes and events.\n///\n/// Processes all requests enqueued via [`enqueue_note_for_validation`] and [`enqueue_event_for_validation`], inserting\n/// them into the note database and event store respectively, making them queryable via `get_notes` oracle and our TS\n/// API (PXE::getPrivateEvents).\n///\n/// This automatically clears both validation request queues, so no further work needs to be done by the caller.\npub unconstrained fn validate_and_store_enqueued_notes_and_events(contract_address: AztecAddress, scope: AztecAddress) {\n    oracle::message_processing::validate_and_store_enqueued_notes_and_events(\n        contract_address,\n        NOTE_VALIDATION_REQUESTS_ARRAY_BASE_SLOT,\n        EVENT_VALIDATION_REQUESTS_ARRAY_BASE_SLOT,\n        MAX_NOTE_PACKED_LEN as Field,\n        MAX_EVENT_SERIALIZED_LEN as Field,\n        scope,\n    );\n}\n\n/// Resolves message contexts for a list of tx hashes stored in a CapsuleArray.\n///\n/// The `message_context_requests_array_base_slot` must point to a CapsuleArray<Field> containing tx hashes.\n/// PXE will store `Option<MessageContextResponse>` values into the responses array at\n/// `message_context_responses_array_base_slot`.\npub unconstrained fn get_message_contexts_by_tx_hash(\n    contract_address: AztecAddress,\n    message_context_requests_array_base_slot: Field,\n    message_context_responses_array_base_slot: Field,\n    scope: AztecAddress,\n) {\n    oracle::message_processing::get_message_contexts_by_tx_hash(\n        contract_address,\n        message_context_requests_array_base_slot,\n        message_context_responses_array_base_slot,\n        scope,\n    );\n}\n\n/// Efficiently queries the node for logs that result in the completion of all `DeliveredPendingPartialNote`s stored in\n/// a `CapsuleArray` by performing all node communication concurrently. Returns a second `CapsuleArray` with Options\n/// for the responses that correspond to the pending partial notes at the same index.\n///\n/// For example, given an array with pending partial notes `[ p1, p2, p3 ]`, where `p1` and `p3` have corresponding\n/// completion logs but `p2` does not, the returned `CapsuleArray` will have contents `[some(p1_log), none(),\n/// some(p3_log)]`.\npub(crate) unconstrained fn get_pending_partial_notes_completion_logs(\n    contract_address: AztecAddress,\n    pending_partial_notes: CapsuleArray<DeliveredPendingPartialNote>,\n    scope: AztecAddress,\n) -> CapsuleArray<Option<LogRetrievalResponse>> {\n    let log_retrieval_requests = CapsuleArray::at(\n        contract_address,\n        LOG_RETRIEVAL_REQUESTS_ARRAY_BASE_SLOT,\n        scope,\n    );\n\n    // We create a LogRetrievalRequest for each PendingPartialNote in the CapsuleArray. Because we need the indices in\n    // the request array to match the indices in the partial note array, we can't use CapsuleArray::for_each, as that\n    // function has arbitrary iteration order. Instead, we manually iterate the array from the beginning and push into\n    // the requests array, which we expect to be empty.\n    let mut i = 0;\n    let pending_partial_notes_count = pending_partial_notes.len();\n    while i < pending_partial_notes_count {\n        let pending_partial_note = pending_partial_notes.get(i);\n        // Partial note completion logs are emitted with a domain-separated tag. To find matching logs, we apply the\n        // same domain separation to the stored raw tag.\n        let log_tag = compute_log_tag(\n            pending_partial_note.note_completion_log_tag,\n            DOM_SEP__NOTE_COMPLETION_LOG_TAG,\n        );\n        log_retrieval_requests.push(LogRetrievalRequest { contract_address, unsiloed_tag: log_tag });\n        i += 1;\n    }\n\n    oracle::message_processing::get_logs_by_tag(\n        contract_address,\n        LOG_RETRIEVAL_REQUESTS_ARRAY_BASE_SLOT,\n        LOG_RETRIEVAL_RESPONSES_ARRAY_BASE_SLOT,\n        scope,\n    );\n\n    CapsuleArray::at(\n        contract_address,\n        LOG_RETRIEVAL_RESPONSES_ARRAY_BASE_SLOT,\n        scope,\n    )\n}\n"
        },
        "170": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/messages/processing/offchain.nr",
            "source": "use crate::{\n    capsules::CapsuleArray,\n    context::UtilityContext,\n    messages::{\n        encoding::MESSAGE_CIPHERTEXT_LEN,\n        processing::{get_message_contexts_by_tx_hash, MessageContext, OffchainMessageWithContext},\n    },\n    oracle::contract_sync::set_contract_sync_cache_invalid,\n    protocol::{\n        address::AztecAddress,\n        constants::MAX_TX_LIFETIME,\n        hash::sha256_to_field,\n        traits::{Deserialize, Serialize},\n    },\n};\n\n/// Base capsule slot for the persistent inbox of [`PendingOffchainMsg`] entries.\n///\n/// This is the slot where we accumulate messages received through [`receive`].\nglobal OFFCHAIN_INBOX_SLOT: Field = sha256_to_field(\"AZTEC_NR::OFFCHAIN_INBOX_SLOT\".as_bytes());\n\n/// Capsule array slot used by [`sync_inbox`] to pass tx hash resolution requests to PXE.\nglobal OFFCHAIN_CONTEXT_REQUESTS_SLOT: Field = sha256_to_field(\"AZTEC_NR::OFFCHAIN_CONTEXT_REQUESTS_SLOT\".as_bytes());\n\n/// Capsule array slot used by [`sync_inbox`] to read tx context responses from PXE.\nglobal OFFCHAIN_CONTEXT_RESPONSES_SLOT: Field = sha256_to_field(\"AZTEC_NR::OFFCHAIN_CONTEXT_RESPONSES_SLOT\".as_bytes());\n\n/// Capsule array slot used by [`sync_inbox`] to collect messages ready for processing.\nglobal OFFCHAIN_READY_MESSAGES_SLOT: Field = sha256_to_field(\"AZTEC_NR::OFFCHAIN_READY_MESSAGES_SLOT\".as_bytes());\n\n/// Maximum number of offchain messages accepted by `offchain_receive` in a single call.\npub global MAX_OFFCHAIN_MESSAGES_PER_RECEIVE_CALL: u32 = 16;\n\n/// Tolerance added to the `MAX_TX_LIFETIME` cap for message expiration.\nglobal TX_EXPIRATION_TOLERANCE: u64 = 7200; // 2 hours\n\n/// Maximum time-to-live for a tx-bound offchain message.\n///\n/// After `anchor_block_timestamp + MAX_MSG_TTL`, the message is evicted from the inbox.\nglobal MAX_MSG_TTL: u64 = MAX_TX_LIFETIME + TX_EXPIRATION_TOLERANCE;\n\n/// A function that manages offchain-delivered messages for processing during sync.\n///\n/// Offchain messages are messages that are not broadcasted via onchain logs. They are instead delivered to the\n/// recipient by calling the `offchain_receive` utility function (injected by the `#[aztec]` macro). Message transport\n/// is the app's responsibility. Typical examples of transport methods are: messaging apps, email, QR codes, etc.\n///\n/// Once offchain messages are delivered to the recipient's private environment via `offchain_receive`, messages are\n/// locally stored in a persistent inbox.\n///\n/// This function determines when each message in said inbox is ready for processing, when it can be safely disposed\n/// of, etc.\n///\n/// The only current implementation of an `OffchainInboxSync` is [`sync_inbox`], which manages an inbox with expiration\n/// based eviction and automatic transaction context resolution.\npub(crate) type OffchainInboxSync<Env> = unconstrained fn[Env](\n/* contract_address */AztecAddress, /* scope */ AztecAddress) -> CapsuleArray<OffchainMessageWithContext>;\n\n/// A message delivered via the `offchain_receive` utility function.\npub struct OffchainMessage {\n    /// The encrypted message payload.\n    pub ciphertext: BoundedVec<Field, MESSAGE_CIPHERTEXT_LEN>,\n    /// The intended recipient of the message.\n    pub recipient: AztecAddress,\n    /// The hash of the transaction that produced this message. `Option::none` indicates a tx-less message.\n    pub tx_hash: Option<Field>,\n    /// Anchor block timestamp at message emission.\n    pub anchor_block_timestamp: u64,\n}\n\n/// An offchain message awaiting processing (or re-processing) in the inbox.\n///\n/// Messages remain in the inbox until they expire, even if they have already been processed. This is necessary to\n/// handle reorgs: a processed message may need to be re-processed if the transaction that provided its context is\n/// reverted. On each sync, resolved messages are promoted to [`OffchainMessageWithContext`] for processing.\n#[derive(Serialize, Deserialize)]\nstruct PendingOffchainMsg {\n    /// The encrypted message payload.\n    ciphertext: BoundedVec<Field, MESSAGE_CIPHERTEXT_LEN>,\n    /// The intended recipient of the message.\n    recipient: AztecAddress,\n    /// The hash of the transaction that produced this message. A value of 0 indicates a tx-less message.\n    tx_hash: Field,\n    /// Anchor block timestamp at message emission. Used to compute the effective expiration: messages are evicted\n    /// after `anchor_block_timestamp + MAX_MSG_TTL`.\n    anchor_block_timestamp: u64,\n}\n\n/// Delivers offchain messages to the given contract's offchain inbox for subsequent processing.\n///\n/// Offchain messages are transaction effects that are not broadcasted via onchain logs. Instead, the sender shares the\n/// message to the recipient through an external channel (e.g. a URL accessible by the recipient). The recipient then\n/// calls this function to hand the messages to the contract so they can be processed through the same mechanisms as\n/// onchain messages.\n///\n/// Each message is routed to the inbox scoped to its `recipient` field, so messages for different accounts are\n/// automatically isolated.\n///\n/// Messages are processed when their originating transaction is found onchain (providing the context needed to\n/// validate resulting notes and events).\n///\n/// Messages are kept in the inbox until they expire. The effective expiration is\n/// `anchor_block_timestamp + MAX_MSG_TTL`.\n///\n/// Processing order is not guaranteed.\npub unconstrained fn receive(\n    contract_address: AztecAddress,\n    messages: BoundedVec<OffchainMessage, MAX_OFFCHAIN_MESSAGES_PER_RECEIVE_CALL>,\n) {\n    // May contain duplicates if multiple messages target the same recipient. This is harmless since\n    // cache invalidation on the TS side is idempotent (deleting an already-deleted key is a no-op).\n    let mut scopes: BoundedVec<AztecAddress, MAX_OFFCHAIN_MESSAGES_PER_RECEIVE_CALL> = BoundedVec::new();\n    let mut i = 0;\n    let messages_len = messages.len();\n    while i < messages_len {\n        let msg = messages.get(i);\n        let tx_hash = if msg.tx_hash.is_some() {\n            msg.tx_hash.unwrap()\n        } else {\n            0\n        };\n        let inbox: CapsuleArray<PendingOffchainMsg> =\n            CapsuleArray::at(contract_address, OFFCHAIN_INBOX_SLOT, msg.recipient);\n        inbox.push(\n            PendingOffchainMsg {\n                ciphertext: msg.ciphertext,\n                recipient: msg.recipient,\n                tx_hash,\n                anchor_block_timestamp: msg.anchor_block_timestamp,\n            },\n        );\n        scopes.push(msg.recipient);\n        i += 1;\n    }\n\n    set_contract_sync_cache_invalid(contract_address, scopes);\n}\n\n/// Returns offchain-delivered messages to process during sync.\n///\n/// Messages remain in the inbox and are reprocessed on each sync until their originating transaction is no longer at\n/// risk of being dropped by a reorg.\npub unconstrained fn sync_inbox(\n    contract_address: AztecAddress,\n    scope: AztecAddress,\n) -> CapsuleArray<OffchainMessageWithContext> {\n    let inbox: CapsuleArray<PendingOffchainMsg> = CapsuleArray::at(contract_address, OFFCHAIN_INBOX_SLOT, scope);\n    let context_resolution_requests: CapsuleArray<Field> =\n        CapsuleArray::at(contract_address, OFFCHAIN_CONTEXT_REQUESTS_SLOT, scope);\n    let resolved_contexts: CapsuleArray<Option<MessageContext>> =\n        CapsuleArray::at(contract_address, OFFCHAIN_CONTEXT_RESPONSES_SLOT, scope);\n    let ready_to_process: CapsuleArray<OffchainMessageWithContext> =\n        CapsuleArray::at(contract_address, OFFCHAIN_READY_MESSAGES_SLOT, scope);\n\n    // Clear any stale ready messages from a previous run.\n    ready_to_process.for_each(|i, _| { ready_to_process.remove(i); });\n\n    // Clear any stale context resolution requests/responses from a previous run.\n    context_resolution_requests.for_each(|i, _| { context_resolution_requests.remove(i); });\n    resolved_contexts.for_each(|i, _| { resolved_contexts.remove(i); });\n\n    // Build a request list aligned with the inbox indices.\n    let mut i = 0;\n    let inbox_len = inbox.len();\n    while i < inbox_len {\n        let msg = inbox.get(i);\n        context_resolution_requests.push(msg.tx_hash);\n        i += 1;\n    }\n\n    // Ask PXE to resolve contexts for all requested tx hashes.\n    get_message_contexts_by_tx_hash(\n        contract_address,\n        OFFCHAIN_CONTEXT_REQUESTS_SLOT,\n        OFFCHAIN_CONTEXT_RESPONSES_SLOT,\n        scope,\n    );\n\n    assert_eq(resolved_contexts.len(), inbox_len);\n\n    let now = UtilityContext::new().timestamp();\n\n    let mut j = inbox_len;\n    while j > 0 {\n        // This loop decides what to do with each message in the offchain message inbox. We need to handle 3\n        // different scenarios for each message.\n        //\n        // 1. The TX that emitted this message is still not known to PXE: in this case we can't yet process this\n        // message, as any notes or events discovered will fail to be validated. So we leave the message in the inbox,\n        // awaiting for future syncs to detect that the TX became available.\n        //\n        // 2. The message is not associated to a TX to begin with. The current version of offchain message processing\n        // does not support this case, but in the future it will. Right now, a message without an associated TX will\n        // sit in the inbox until it expires.\n        //\n        // 3. The TX that emitted this message has been found by PXE. That gives us all the information needed to\n        // process the message. We add the message to the `ready_to_process` CapsuleArray so that the `sync_state` loop\n        // processes it.\n        //\n        // In all cases, if the message has expired (i.e. `now > anchor_block_timestamp + MAX_MSG_TTL`), we remove it\n        // from the inbox.\n        //\n        // Note: the loop runs backwards because it might call `inbox.remove(j)` to purge expired messages and we also\n        // need to align it with `resolved_contexts.get(j)`. Going from last to first simplifies the algorithm as\n        // not yet visited element indexes remain stable.\n        j -= 1;\n        let maybe_ctx = resolved_contexts.get(j);\n        let msg = inbox.get(j);\n\n        // Compute the message's effective expiration timestamp to determine if we can purge it from the inbox.\n        let effective_expiration = msg.anchor_block_timestamp + MAX_MSG_TTL;\n\n        // Message expired. We remove it from the inbox.\n        if now > effective_expiration {\n            inbox.remove(j);\n        }\n\n        // Scenario 1: associated TX not yet available. We keep the message in the inbox, as it might become\n        // processable as new blocks get mined.\n        // Scenario 2: no TX associated to message. The message will sit in the inbox until it expires.\n        if maybe_ctx.is_none() {\n            continue;\n        }\n\n        // Scenario 3: Message is ready to process, add to result array. Note we still keep it in the inbox unless we\n        // consider it has expired: this is because we need to account for reorgs. If reorg occurs after we processed\n        // a message, the effects of processing the message get rewind. However, the associated TX can be included in\n        // a subsequent block. Should that happen, the message must be re-processed to ensure consistency.\n        let message_context = maybe_ctx.unwrap();\n        ready_to_process.push(OffchainMessageWithContext { message_ciphertext: msg.ciphertext, message_context });\n    }\n\n    ready_to_process\n}\n\nmod test {\n    use crate::{\n        capsules::CapsuleArray, oracle::random::random, protocol::address::AztecAddress,\n        test::helpers::test_environment::TestEnvironment,\n    };\n    use super::{\n        MAX_MSG_TTL, MAX_OFFCHAIN_MESSAGES_PER_RECEIVE_CALL, OFFCHAIN_INBOX_SLOT, OffchainMessage, PendingOffchainMsg,\n        receive, sync_inbox,\n    };\n\n    global SCOPE: AztecAddress = AztecAddress { inner: 0xcafe };\n\n    /// Creates an `OffchainMessage` with dummy ciphertext and `SCOPE` as recipient.\n    fn make_msg(tx_hash: Option<Field>, anchor_block_timestamp: u64) -> OffchainMessage {\n        OffchainMessage { ciphertext: BoundedVec::new(), recipient: SCOPE, tx_hash, anchor_block_timestamp }\n    }\n\n    /// Advances the TXE block timestamp by `offset` seconds and returns the resulting timestamp.\n    unconstrained fn advance_by(env: TestEnvironment, offset: u64) -> u64 {\n        env.advance_next_block_timestamp_by(offset);\n        env.mine_block();\n        env.last_block_timestamp()\n    }\n\n    #[test]\n    unconstrained fn empty_inbox_returns_empty_result() {\n        let env = TestEnvironment::new();\n        env.utility_context(|context| {\n            let result = sync_inbox(context.this_address(), SCOPE);\n            let inbox: CapsuleArray<PendingOffchainMsg> =\n                CapsuleArray::at(context.this_address(), OFFCHAIN_INBOX_SLOT, SCOPE);\n\n            assert_eq(result.len(), 0);\n            assert_eq(inbox.len(), 0);\n        });\n    }\n\n    #[test]\n    unconstrained fn tx_bound_msg_expires_after_max_msg_ttl() {\n        let env = TestEnvironment::new();\n        let anchor_ts = advance_by(env, 10);\n\n        env.utility_context(|context| {\n            let mut msgs: BoundedVec<OffchainMessage, MAX_OFFCHAIN_MESSAGES_PER_RECEIVE_CALL> = BoundedVec::new();\n            msgs.push(make_msg(Option::some(random()), anchor_ts));\n            receive(context.this_address(), msgs);\n        });\n\n        // Advance past anchor_ts + MAX_MSG_TTL.\n        let _now = advance_by(env, MAX_MSG_TTL + 1);\n\n        env.utility_context(|context| {\n            let address = context.this_address();\n            let result = sync_inbox(address, SCOPE);\n            let inbox: CapsuleArray<PendingOffchainMsg> = CapsuleArray::at(address, OFFCHAIN_INBOX_SLOT, SCOPE);\n\n            assert_eq(result.len(), 0); // context is None, not ready\n            assert_eq(inbox.len(), 0); // expired, removed\n        });\n    }\n\n    #[test]\n    unconstrained fn tx_bound_msg_not_expired_before_max_msg_ttl() {\n        let env = TestEnvironment::new();\n        let anchor_ts = advance_by(env, 10);\n\n        env.utility_context(|context| {\n            let mut msgs: BoundedVec<OffchainMessage, MAX_OFFCHAIN_MESSAGES_PER_RECEIVE_CALL> = BoundedVec::new();\n            msgs.push(make_msg(Option::some(random()), anchor_ts));\n            receive(context.this_address(), msgs);\n        });\n\n        // Advance, but not past anchor_ts + MAX_MSG_TTL.\n        let _now = advance_by(env, 100);\n\n        env.utility_context(|context| {\n            let address = context.this_address();\n            let result = sync_inbox(address, SCOPE);\n            let inbox: CapsuleArray<PendingOffchainMsg> = CapsuleArray::at(address, OFFCHAIN_INBOX_SLOT, SCOPE);\n\n            assert_eq(result.len(), 0); // context is None, not ready\n            assert_eq(inbox.len(), 1); // not expired, stays\n        });\n    }\n\n    #[test]\n    unconstrained fn tx_less_msg_expires_after_max_msg_ttl() {\n        let env = TestEnvironment::new();\n        let anchor_ts = advance_by(env, 10);\n\n        env.utility_context(|context| {\n            let mut msgs: BoundedVec<OffchainMessage, MAX_OFFCHAIN_MESSAGES_PER_RECEIVE_CALL> = BoundedVec::new();\n            msgs.push(make_msg(Option::none(), anchor_ts));\n            receive(context.this_address(), msgs);\n        });\n\n        // Advance past anchor_ts + MAX_MSG_TTL.\n        let _now = advance_by(env, MAX_MSG_TTL + 1);\n\n        env.utility_context(|context| {\n            let address = context.this_address();\n            let result = sync_inbox(address, SCOPE);\n            let inbox: CapsuleArray<PendingOffchainMsg> = CapsuleArray::at(address, OFFCHAIN_INBOX_SLOT, SCOPE);\n\n            assert_eq(result.len(), 0); // context is None, not ready\n            assert_eq(inbox.len(), 0); // expired, removed\n        });\n    }\n\n    #[test]\n    unconstrained fn unresolved_tx_stays_in_inbox() {\n        let env = TestEnvironment::new();\n        let anchor_ts = advance_by(env, 10);\n\n        env.utility_context(|context| {\n            let mut msgs: BoundedVec<OffchainMessage, MAX_OFFCHAIN_MESSAGES_PER_RECEIVE_CALL> = BoundedVec::new();\n            msgs.push(make_msg(Option::some(random()), anchor_ts));\n            receive(context.this_address(), msgs);\n        });\n\n        let _now = advance_by(env, 100);\n\n        env.utility_context(|context| {\n            let address = context.this_address();\n            let result = sync_inbox(address, SCOPE);\n            let inbox: CapsuleArray<PendingOffchainMsg> = CapsuleArray::at(address, OFFCHAIN_INBOX_SLOT, SCOPE);\n\n            assert_eq(result.len(), 0); // not resolved, not ready\n            assert_eq(inbox.len(), 1); // not expired, stays\n        });\n    }\n\n    #[test]\n    unconstrained fn multiple_messages_mixed_expiration() {\n        let env = TestEnvironment::new();\n        let anchor_ts = advance_by(env, 10);\n\n        let survivor_tx_hash = random();\n\n        env.utility_context(|context| {\n            let address = context.this_address();\n            let mut msgs: BoundedVec<OffchainMessage, MAX_OFFCHAIN_MESSAGES_PER_RECEIVE_CALL> = BoundedVec::new();\n            // Message 0: tx-bound, anchor_ts in the past so it expires at\n            // anchor_ts + MAX_MSG_TTL. We set anchor to 0 so it expires quickly.\n            msgs.push(make_msg(Option::some(random()), 0));\n            // Message 1: tx-bound, anchor_ts is recent so it survives.\n            msgs.push(make_msg(Option::some(survivor_tx_hash), anchor_ts));\n            // Message 2: tx-less, anchor_ts=0 so it also expires.\n            msgs.push(make_msg(Option::none(), 0));\n            receive(address, msgs);\n        });\n\n        // Advance past MAX_MSG_TTL for anchor_ts=0, but not for anchor_ts=anchor_ts.\n        let _now = advance_by(env, MAX_MSG_TTL);\n\n        env.utility_context(|context| {\n            let address = context.this_address();\n            let result = sync_inbox(address, SCOPE);\n            let inbox: CapsuleArray<PendingOffchainMsg> = CapsuleArray::at(address, OFFCHAIN_INBOX_SLOT, SCOPE);\n\n            assert_eq(result.len(), 0); // all contexts are None\n            // Message 0 expired (anchor=0), message 1 survived (anchor=anchor_ts),\n            // Message 2 expired (anchor=0).\n            assert_eq(inbox.len(), 1);\n            assert_eq(inbox.get(0).tx_hash, survivor_tx_hash);\n        });\n    }\n\n    // -- Resolved context (ready to process) ------------------------------\n\n    #[test]\n    unconstrained fn resolved_msg_is_ready_to_process() {\n        let env = TestEnvironment::new();\n        // TestEnvironment::new() deploys protocol contracts, creating blocks with tx effects.\n        // In TXE, tx hashes equal Fr(blockNumber), so Fr(1) is the tx effect from block 1.\n        // We use this as a \"known resolvable\" tx hash.\n        let known_tx_hash: Field = 1;\n        let anchor_ts = advance_by(env, 10);\n\n        env.utility_context(|context| {\n            let mut msgs: BoundedVec<OffchainMessage, MAX_OFFCHAIN_MESSAGES_PER_RECEIVE_CALL> = BoundedVec::new();\n            msgs.push(make_msg(Option::some(known_tx_hash), anchor_ts));\n            receive(context.this_address(), msgs);\n        });\n\n        let _now = advance_by(env, 100);\n\n        env.utility_context(|context| {\n            let address = context.this_address();\n            let result = sync_inbox(address, SCOPE);\n            let inbox: CapsuleArray<PendingOffchainMsg> = CapsuleArray::at(address, OFFCHAIN_INBOX_SLOT, SCOPE);\n\n            // The message should be ready to process since its tx context was resolved.\n            assert_eq(result.len(), 1);\n\n            let ctx = result.get(0).message_context;\n            assert_eq(ctx.tx_hash, known_tx_hash);\n            assert(ctx.first_nullifier_in_tx != 0, \"resolved context must have a first nullifier\");\n\n            // Message stays in inbox (not expired) for potential reorg reprocessing.\n            assert_eq(inbox.len(), 1);\n        });\n    }\n}\n"
        },
        "185": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/note/utils.nr",
            "source": "use crate::{context::NoteExistenceRequest, note::{ConfirmedNote, HintedNote, note_interface::NoteHash}};\n\nuse crate::protocol::{\n    constants::{DOM_SEP__NOTE_HASH, DOM_SEP__NOTE_NULLIFIER},\n    hash::{compute_siloed_note_hash, compute_unique_note_hash, poseidon2_hash_with_separator},\n};\n\n/// Computes a domain-separated note hash.\n///\n/// Receives the `storage_slot` of the [`crate::state_vars::StateVariable`] that holds the note, plus any arbitrary\n/// note `data`. This typically includes randomness, owner, and domain specific values (e.g. numeric amount, address,\n/// id, etc.).\n///\n/// Usage of this function guarantees that different state variables will never produce colliding note hashes, even if\n/// their underlying notes have different implementations.\npub fn compute_note_hash<let N: u32>(storage_slot: Field, data: [Field; N]) -> Field {\n    // All state variables have different storage slots, so by placing this at a fixed first position in the preimage\n    // we prevent collisions.\n    poseidon2_hash_with_separator([storage_slot].concat(data), DOM_SEP__NOTE_HASH)\n}\n\n/// Computes a domain-separated note nullifier.\n///\n/// Receives the `note_hash_for_nullification` of the note (usually returned by\n/// [`compute_confirmed_note_hash_for_nullification`]), plus any arbitrary note `data`. This typically includes\n/// secrets, such as the app-siloed nullifier hiding key of the note's owner.\n///\n/// Usage of this function guarantees that different state variables will never produce colliding note nullifiers, even\n/// if their underlying notes have different implementations.\npub fn compute_note_nullifier<let N: u32>(note_hash_for_nullification: Field, data: [Field; N]) -> Field {\n    // All notes have different note hashes for nullification (i.e. transient or settled), so by placing this at a\n    // fixed first position in the preimage we prevent collisions.\n    poseidon2_hash_with_separator(\n        [note_hash_for_nullification].concat(data),\n        DOM_SEP__NOTE_NULLIFIER,\n    )\n}\n\n/// Returns the [`NoteExistenceRequest`] used to prove a note exists.\npub fn compute_note_existence_request<Note>(hinted_note: HintedNote<Note>) -> NoteExistenceRequest\nwhere\n    Note: NoteHash,\n{\n    let note_hash =\n        hinted_note.note.compute_note_hash(hinted_note.owner, hinted_note.storage_slot, hinted_note.randomness);\n\n    if hinted_note.metadata.is_settled() {\n        // Settled notes are read by siloing with contract address and nonce (resulting in the final unique note hash,\n        // which is already in the note hash tree).\n        let siloed_note_hash = compute_siloed_note_hash(hinted_note.contract_address, note_hash);\n        NoteExistenceRequest::for_settled(compute_unique_note_hash(\n            hinted_note.metadata.to_settled().note_nonce(),\n            siloed_note_hash,\n        ))\n    } else {\n        // Pending notes (both same phase and previous phase ones) are read by their non-siloed hash (not even by\n        // contract address), which is what is stored in the new note hashes array (at the position hinted by note hash\n        // counter).\n        NoteExistenceRequest::for_pending(note_hash, hinted_note.contract_address)\n    }\n}\n\n/// Unconstrained variant of [`compute_confirmed_note_hash_for_nullification`].\npub unconstrained fn compute_note_hash_for_nullification<Note>(hinted_note: HintedNote<Note>) -> Field\nwhere\n    Note: NoteHash,\n{\n    // Creating a ConfirmedNote like we do here is typically unsafe, as we've not confirmed existence. We can do it\n    // here because this is an unconstrained function, so the returned value should not make its way to a constrained\n    // function. This lets us reuse the `compute_confirmed_note_hash_for_nullification` implementation.\n    compute_confirmed_note_hash_for_nullification(ConfirmedNote::new(\n        hinted_note,\n        compute_note_existence_request(hinted_note).note_hash(),\n    ))\n}\n\n/// Returns the note hash to use when computing its nullifier.\n///\n/// The `note_hash_for_nullification` parameter [`NoteHash::compute_nullifier`] takes depends on the note's stage, e.g.\n/// settled notes use the unique note hash, but pending notes cannot as they have no nonce. This function returns the\n/// correct note hash to use.\n///\n/// Use [`compute_note_hash_for_nullification`] when computing this value in unconstrained functions.\npub fn compute_confirmed_note_hash_for_nullification<Note>(confirmed_note: ConfirmedNote<Note>) -> Field {\n    // There is just one instance in which the note hash for nullification does not match the note hash used for a read\n    // request, which is when dealing with pending previous phase notes. These had their existence proven using their\n    // non-siloed note hash along with the note hash counter (like all pending notes), but since they will be\n    // unconditionally inserted in the note hash tree (since they cannot be squashed) they must be nullified using the\n    // *unique* note hash. If we didn't, it'd be possible to emit a second different nullifier for the same note in a\n    // follow up transaction, once the note is settled, resulting in a double spend.\n\n    if confirmed_note.metadata.is_pending_previous_phase() {\n        let siloed_note_hash = compute_siloed_note_hash(\n            confirmed_note.contract_address,\n            confirmed_note.proven_note_hash,\n        );\n        let note_nonce = confirmed_note.metadata.to_pending_previous_phase().note_nonce();\n\n        compute_unique_note_hash(note_nonce, siloed_note_hash)\n    } else {\n        confirmed_note.proven_note_hash\n    }\n}\n"
        },
        "187": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/nullifier/utils.nr",
            "source": "use crate::{context::NullifierExistenceRequest, oracle::nullifiers::is_nullifier_pending};\n\nuse crate::protocol::{address::aztec_address::AztecAddress, hash::compute_siloed_nullifier};\n\n/// Returns the [`NullifierExistenceRequest`] used to prove a nullifier exists.\npub fn compute_nullifier_existence_request(\n    unsiloed_nullifier: Field,\n    contract_address: AztecAddress,\n) -> NullifierExistenceRequest {\n    let pending_read_request = NullifierExistenceRequest::for_pending(unsiloed_nullifier, contract_address);\n\n    let siloed_nullifier = compute_siloed_nullifier(contract_address, unsiloed_nullifier);\n    let settled_read_request = NullifierExistenceRequest::for_settled(siloed_nullifier);\n\n    // Safety: This is a hint to check whether we are reading a pending or settled nullifier. The chosen read request\n    // will be validated by the kernel. Failure to provide a correct hint will cause the read request validation to\n    // fail.\n    let should_use_pending_read_request = unsafe { is_nullifier_pending(unsiloed_nullifier, contract_address) };\n\n    if should_use_pending_read_request {\n        pending_read_request\n    } else {\n        settled_read_request\n    }\n}\n"
        },
        "188": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/oracle/aes128_decrypt.nr",
            "source": "#[oracle(aztec_utl_decryptAes128)]\nunconstrained fn aes128_decrypt_oracle<let N: u32>(\n    ciphertext: BoundedVec<u8, N>,\n    iv: [u8; 16],\n    sym_key: [u8; 16],\n) -> Option<BoundedVec<u8, N>> {}\n\n/// Attempts to decrypt a ciphertext using AES128.\n///\n/// Returns `Option::some(plaintext)` on success, or `Option::none()` if decryption fails (e.g. due to malformed\n/// ciphertext). Note that decryption with the wrong key will still return `Some` with garbage data, it's up to\n/// the calling function to verify correctness (e.g. via a MAC check).\n///\n/// Note that we accept ciphertext as a BoundedVec, not as an array. This is because this function is typically used\n/// when processing logs and at that point we don't have comptime information about the length of the ciphertext as\n/// the log is not specific to any individual note.\n// TODO(F-498): review naming consistency\npub unconstrained fn try_aes128_decrypt<let N: u32>(\n    ciphertext: BoundedVec<u8, N>,\n    iv: [u8; 16],\n    sym_key: [u8; 16],\n) -> Option<BoundedVec<u8, N>> {\n    aes128_decrypt_oracle(ciphertext, iv, sym_key)\n}\n\nmod test {\n    use crate::{\n        keys::ecdh_shared_secret::compute_app_siloed_shared_secret,\n        messages::encryption::aes128::derive_aes_symmetric_key_and_iv_from_shared_secret,\n        utils::{array::subarray::subarray, point::point_from_x_coord},\n    };\n    use crate::protocol::address::AztecAddress;\n    use crate::test::helpers::test_environment::TestEnvironment;\n    use super::try_aes128_decrypt;\n    use poseidon::poseidon2::Poseidon2;\n    use std::aes128::aes128_encrypt;\n\n    global CONTRACT_ADDRESS: AztecAddress = AztecAddress { inner: 42 };\n    global TEST_PLAINTEXT_LENGTH: u32 = 10;\n    global TEST_CIPHERTEXT_LENGTH: u32 = 16;\n    global TEST_PADDING_LENGTH: u32 = TEST_CIPHERTEXT_LENGTH - TEST_PLAINTEXT_LENGTH;\n\n    #[test]\n    unconstrained fn aes_encrypt_then_decrypt() {\n        let env = TestEnvironment::new();\n\n        env.utility_context(|_| {\n            let shared_secret_point = point_from_x_coord(1).unwrap();\n            let s_app = compute_app_siloed_shared_secret(shared_secret_point, CONTRACT_ADDRESS);\n\n            let (sym_key, iv) = derive_aes_symmetric_key_and_iv_from_shared_secret::<1>(s_app)[0];\n\n            let plaintext: [u8; TEST_PLAINTEXT_LENGTH] = [0, 1, 2, 3, 4, 5, 6, 7, 8, 9];\n\n            let ciphertext: [u8; TEST_CIPHERTEXT_LENGTH] = aes128_encrypt(plaintext, iv, sym_key);\n\n            let ciphertext_bvec = BoundedVec::<u8, TEST_CIPHERTEXT_LENGTH>::from_array(ciphertext);\n\n            let received_plaintext = try_aes128_decrypt(ciphertext_bvec, iv, sym_key).unwrap();\n            assert_eq(received_plaintext.len(), TEST_PLAINTEXT_LENGTH);\n            assert_eq(received_plaintext.max_len(), TEST_CIPHERTEXT_LENGTH);\n            assert_eq(subarray::<_, _, TEST_PLAINTEXT_LENGTH>(received_plaintext.storage(), 0), plaintext);\n            assert_eq(\n                subarray::<_, _, TEST_PADDING_LENGTH>(received_plaintext.storage(), TEST_PLAINTEXT_LENGTH),\n                [0 as u8; TEST_PADDING_LENGTH],\n            );\n        })\n    }\n\n    global TEST_MAC_LENGTH: u32 = 32;\n\n    #[test(should_fail_with = \"mac does not match\")]\n    unconstrained fn aes_encrypt_then_decrypt_with_bad_sym_key_is_caught() {\n        let env = TestEnvironment::new();\n\n        env.utility_context(|_| {\n            // The AES decryption oracle will not fail for any valid ciphertext; it will always return\n            // `Some` with some data. Whether the decryption was successful is up to the app to check in a\n            // custom way.\n            //\n            // E.g. if it's a note that's been encrypted, upon decryption the app can check whether the\n            // note hash exists onchain. If it doesn't, that's a strong indicator that decryption failed.\n            //\n            // E.g. for non-note messages, the plaintext could include a MAC\n            // (https://en.wikipedia.org/wiki/Message_authentication_code). We demonstrate this approach in\n            // this test: we compute a MAC, include it in the plaintext, encrypt, and then verify that\n            // decryption with a bad key produces a MAC mismatch.\n            let shared_secret_point = point_from_x_coord(1).unwrap();\n            let s_app = compute_app_siloed_shared_secret(shared_secret_point, CONTRACT_ADDRESS);\n\n            let (sym_key, iv) = derive_aes_symmetric_key_and_iv_from_shared_secret::<1>(s_app)[0];\n\n            let mac_preimage = 0x42;\n            let mac = Poseidon2::hash([mac_preimage], 1);\n            let mac_as_bytes = mac.to_be_bytes::<TEST_MAC_LENGTH>();\n\n            let plaintext: [u8; TEST_PLAINTEXT_LENGTH] = [0, 1, 2, 3, 4, 5, 6, 7, 8, 9];\n\n            // We append the mac to the plaintext. It doesn't necessarily have to be 32 bytes; that's quite an extreme\n            // length. 16 bytes or 8 bytes might be sufficient, and would save on data broadcasting costs. The shorter\n            // the mac, the more possibility of false positive decryptions (decryption seemingly succeeding, but the\n            // decrypted plaintext being garbage). Some projects use the `iv` (all 16 bytes or the first 8 bytes) as a\n            // mac.\n            let mut plaintext_with_mac = [0 as u8; TEST_PLAINTEXT_LENGTH + TEST_MAC_LENGTH];\n            for i in 0..TEST_PLAINTEXT_LENGTH {\n                plaintext_with_mac[i] = plaintext[i];\n            }\n            for i in 0..TEST_MAC_LENGTH {\n                plaintext_with_mac[TEST_PLAINTEXT_LENGTH + i] = mac_as_bytes[i];\n            }\n\n            let ciphertext = aes128_encrypt(plaintext_with_mac, iv, sym_key);\n\n            // We now would broadcast the tuple [ciphertext, mac] to the network. The recipient will then decrypt the\n            // ciphertext, and if the mac inside the received plaintext matches the mac that was broadcast, then the\n            // recipient knows that decryption was successful.\n\n            // For this test, we intentionally mutate the sym_key to a bad one, so that decryption fails. This allows\n            // us to explore how the recipient can detect failed decryption by checking the decrypted mac against the\n            // broadcasted mac.\n            let mut bad_sym_key = sym_key;\n            bad_sym_key[0] = 0;\n\n            // We need to convert the array to a BoundedVec because the oracle expects a BoundedVec as it's designed to\n            // work with logs of unknown length.\n            let ciphertext_bvec = BoundedVec::<u8, 48>::from_array(ciphertext);\n            // Decryption with wrong key still returns Some (with garbage).\n            let received_plaintext = try_aes128_decrypt(ciphertext_bvec, iv, bad_sym_key).unwrap();\n\n            let extracted_mac_as_bytes: [u8; TEST_MAC_LENGTH] =\n                subarray(received_plaintext.storage(), TEST_PLAINTEXT_LENGTH);\n\n            assert_eq(mac_as_bytes, extracted_mac_as_bytes, \"mac does not match\");\n        });\n    }\n}\n"
        },
        "190": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/oracle/avm.nr",
            "source": "//! AVM oracles.\n//!\n//! There are only available during public execution. Calling any of them from a private or utility function will\n//! result in runtime errors.\n\nuse crate::protocol::address::{AztecAddress, EthAddress};\n\npub unconstrained fn address() -> AztecAddress {\n    address_opcode()\n}\npub unconstrained fn sender() -> AztecAddress {\n    sender_opcode()\n}\npub unconstrained fn transaction_fee() -> Field {\n    transaction_fee_opcode()\n}\npub unconstrained fn chain_id() -> Field {\n    chain_id_opcode()\n}\npub unconstrained fn version() -> Field {\n    version_opcode()\n}\npub unconstrained fn block_number() -> u32 {\n    block_number_opcode()\n}\npub unconstrained fn timestamp() -> u64 {\n    timestamp_opcode()\n}\npub unconstrained fn min_fee_per_l2_gas() -> u128 {\n    min_fee_per_l2_gas_opcode()\n}\npub unconstrained fn min_fee_per_da_gas() -> u128 {\n    min_fee_per_da_gas_opcode()\n}\npub unconstrained fn l2_gas_left() -> u32 {\n    l2_gas_left_opcode()\n}\npub unconstrained fn da_gas_left() -> u32 {\n    da_gas_left_opcode()\n}\npub unconstrained fn is_static_call() -> u1 {\n    is_static_call_opcode()\n}\npub unconstrained fn note_hash_exists(note_hash: Field, leaf_index: u64) -> u1 {\n    note_hash_exists_opcode(note_hash, leaf_index)\n}\npub unconstrained fn emit_note_hash(note_hash: Field) {\n    emit_note_hash_opcode(note_hash)\n}\npub unconstrained fn nullifier_exists(siloed_nullifier: Field) -> u1 {\n    nullifier_exists_opcode(siloed_nullifier)\n}\npub unconstrained fn emit_nullifier(nullifier: Field) {\n    emit_nullifier_opcode(nullifier)\n}\npub unconstrained fn emit_public_log(message: [Field]) {\n    emit_public_log_opcode(message)\n}\npub unconstrained fn l1_to_l2_msg_exists(msg_hash: Field, msg_leaf_index: u64) -> u1 {\n    l1_to_l2_msg_exists_opcode(msg_hash, msg_leaf_index)\n}\npub unconstrained fn send_l2_to_l1_msg(recipient: EthAddress, content: Field) {\n    send_l2_to_l1_msg_opcode(recipient, content)\n}\n\npub unconstrained fn call<let N: u32>(\n    l2_gas_allocation: u32,\n    da_gas_allocation: u32,\n    address: AztecAddress,\n    args: [Field; N],\n) {\n    call_opcode(l2_gas_allocation, da_gas_allocation, address, N, args)\n}\n\npub unconstrained fn call_static<let N: u32>(\n    l2_gas_allocation: u32,\n    da_gas_allocation: u32,\n    address: AztecAddress,\n    args: [Field; N],\n) {\n    call_static_opcode(l2_gas_allocation, da_gas_allocation, address, N, args)\n}\n\npub unconstrained fn calldata_copy<let N: u32>(cdoffset: u32, copy_size: u32) -> [Field; N] {\n    calldata_copy_opcode(cdoffset, copy_size)\n}\n\n/// `success_copy` is placed immediately after the CALL opcode to get the success value\npub unconstrained fn success_copy() -> bool {\n    success_copy_opcode()\n}\n\npub unconstrained fn returndata_size() -> u32 {\n    returndata_size_opcode()\n}\n\npub unconstrained fn returndata_copy(rdoffset: u32, copy_size: u32) -> [Field] {\n    returndata_copy_opcode(rdoffset, copy_size)\n}\n\n/// The additional prefix is to avoid clashing with the `return` Noir keyword.\npub unconstrained fn avm_return(returndata: [Field]) {\n    return_opcode(returndata)\n}\n\n/// This opcode reverts using the exact data given. In general it should only be used to do rethrows, where the revert\n/// data is the same as the original revert data. For normal reverts, use Noir's `assert` which, on top of reverting,\n/// will also add an error selector to the revert data.\npub unconstrained fn revert(revertdata: [Field]) {\n    revert_opcode(revertdata)\n}\n\npub unconstrained fn storage_read(storage_slot: Field, contract_address: Field) -> Field {\n    storage_read_opcode(storage_slot, contract_address)\n}\n\npub unconstrained fn storage_write(storage_slot: Field, value: Field) {\n    storage_write_opcode(storage_slot, value);\n}\n\n#[oracle(aztec_avm_address)]\nunconstrained fn address_opcode() -> AztecAddress {}\n\n#[oracle(aztec_avm_sender)]\nunconstrained fn sender_opcode() -> AztecAddress {}\n\n#[oracle(aztec_avm_transactionFee)]\nunconstrained fn transaction_fee_opcode() -> Field {}\n\n#[oracle(aztec_avm_chainId)]\nunconstrained fn chain_id_opcode() -> Field {}\n\n#[oracle(aztec_avm_version)]\nunconstrained fn version_opcode() -> Field {}\n\n#[oracle(aztec_avm_blockNumber)]\nunconstrained fn block_number_opcode() -> u32 {}\n\n#[oracle(aztec_avm_timestamp)]\nunconstrained fn timestamp_opcode() -> u64 {}\n\n#[oracle(aztec_avm_minFeePerL2Gas)]\nunconstrained fn min_fee_per_l2_gas_opcode() -> u128 {}\n\n#[oracle(aztec_avm_minFeePerDaGas)]\nunconstrained fn min_fee_per_da_gas_opcode() -> u128 {}\n\n#[oracle(aztec_avm_l2GasLeft)]\nunconstrained fn l2_gas_left_opcode() -> u32 {}\n\n#[oracle(aztec_avm_daGasLeft)]\nunconstrained fn da_gas_left_opcode() -> u32 {}\n\n#[oracle(aztec_avm_isStaticCall)]\nunconstrained fn is_static_call_opcode() -> u1 {}\n\n#[oracle(aztec_avm_noteHashExists)]\nunconstrained fn note_hash_exists_opcode(note_hash: Field, leaf_index: u64) -> u1 {}\n\n#[oracle(aztec_avm_emitNoteHash)]\nunconstrained fn emit_note_hash_opcode(note_hash: Field) {}\n\n#[oracle(aztec_avm_nullifierExists)]\nunconstrained fn nullifier_exists_opcode(siloed_nullifier: Field) -> u1 {}\n\n#[oracle(aztec_avm_emitNullifier)]\nunconstrained fn emit_nullifier_opcode(nullifier: Field) {}\n\n#[oracle(aztec_avm_emitPublicLog)]\nunconstrained fn emit_public_log_opcode(message: [Field]) {}\n\n#[oracle(aztec_avm_l1ToL2MsgExists)]\nunconstrained fn l1_to_l2_msg_exists_opcode(msg_hash: Field, msg_leaf_index: u64) -> u1 {}\n\n#[oracle(aztec_avm_sendL2ToL1Msg)]\nunconstrained fn send_l2_to_l1_msg_opcode(recipient: EthAddress, content: Field) {}\n\n#[oracle(aztec_avm_calldataCopy)]\nunconstrained fn calldata_copy_opcode<let N: u32>(cdoffset: u32, copy_size: u32) -> [Field; N] {}\n\n#[oracle(aztec_avm_returndataSize)]\nunconstrained fn returndata_size_opcode() -> u32 {}\n\n#[oracle(aztec_avm_returndataCopy)]\nunconstrained fn returndata_copy_opcode(rdoffset: u32, copy_size: u32) -> [Field] {}\n\n#[oracle(aztec_avm_return)]\nunconstrained fn return_opcode(returndata: [Field]) {}\n\n#[oracle(aztec_avm_revert)]\nunconstrained fn revert_opcode(revertdata: [Field]) {}\n\n// While the length parameter might seem unnecessary given that we have N we keep it around because at the AVM bytecode\n// level, we want to support non-comptime-known lengths for such opcodes, even if Noir code will not generally take\n// that route.\n#[oracle(aztec_avm_call)]\nunconstrained fn call_opcode<let N: u32>(\n    l2_gas_allocation: u32,\n    da_gas_allocation: u32,\n    address: AztecAddress,\n    length: u32,\n    args: [Field; N],\n) {}\n\n// While the length parameter might seem unnecessary given that we have N we keep it around because at the AVM bytecode\n// level, we want to support non-comptime-known lengths for such opcodes, even if Noir code will not generally take\n// that route.\n#[oracle(aztec_avm_staticCall)]\nunconstrained fn call_static_opcode<let N: u32>(\n    l2_gas_allocation: u32,\n    da_gas_allocation: u32,\n    address: AztecAddress,\n    length: u32,\n    args: [Field; N],\n) {}\n\n#[oracle(aztec_avm_successCopy)]\nunconstrained fn success_copy_opcode() -> bool {}\n\n#[oracle(aztec_avm_storageRead)]\nunconstrained fn storage_read_opcode(storage_slot: Field, contract_address: Field) -> Field {}\n\n#[oracle(aztec_avm_storageWrite)]\nunconstrained fn storage_write_opcode(storage_slot: Field, value: Field) {}\n"
        },
        "192": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/oracle/call_private_function.nr",
            "source": "use crate::protocol::{abis::function_selector::FunctionSelector, address::AztecAddress, utils::reader::Reader};\n\n#[oracle(aztec_prv_callPrivateFunction)]\nunconstrained fn call_private_function_oracle(\n    _contract_address: AztecAddress,\n    _function_selector: FunctionSelector,\n    _args_hash: Field,\n    _start_side_effect_counter: u32,\n    _is_static_call: bool,\n) -> [Field; 2] {}\n\npub unconstrained fn call_private_function_internal(\n    contract_address: AztecAddress,\n    function_selector: FunctionSelector,\n    args_hash: Field,\n    start_side_effect_counter: u32,\n    is_static_call: bool,\n) -> (u32, Field) {\n    let fields = call_private_function_oracle(\n        contract_address,\n        function_selector,\n        args_hash,\n        start_side_effect_counter,\n        is_static_call,\n    );\n\n    let mut reader = Reader::new(fields);\n    let end_side_effect_counter = reader.read_u32();\n    let returns_hash = reader.read();\n\n    (end_side_effect_counter, returns_hash)\n}\n"
        },
        "193": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/oracle/capsules.nr",
            "source": "use crate::protocol::{address::AztecAddress, traits::{Deserialize, Serialize}};\n\n/// Stores arbitrary information in a per-contract non-volatile database, which can later be retrieved with `load`. If\n/// data was already stored at this slot, it is overwritten.\n// TODO(F-498): review naming consistency\npub unconstrained fn store<T>(contract_address: AztecAddress, slot: Field, value: T, scope: AztecAddress)\nwhere\n    T: Serialize,\n{\n    let serialized = value.serialize();\n    set_capsule_oracle(contract_address, slot, serialized, scope);\n}\n\n/// Returns data previously stored via `storeCapsule` in the per-contract non-volatile database. Returns\n/// Option::none() if nothing was stored at the given slot.\n// TODO(F-498): review naming consistency\npub unconstrained fn load<T>(contract_address: AztecAddress, slot: Field, scope: AztecAddress) -> Option<T>\nwhere\n    T: Deserialize,\n{\n    let serialized_option = get_capsule_oracle(contract_address, slot, <T as Deserialize>::N, scope);\n    serialized_option.map(|arr| Deserialize::deserialize(arr))\n}\n\n/// Deletes data in the per-contract non-volatile database. Does nothing if no data was present.\npub unconstrained fn delete(contract_address: AztecAddress, slot: Field, scope: AztecAddress) {\n    delete_oracle(contract_address, slot, scope);\n}\n\n/// Copies a number of contiguous entries in the per-contract non-volatile database. This allows for efficient data\n/// structures by avoiding repeated calls to `loadCapsule` and `storeCapsule`. Supports overlapping source and\n/// destination regions (which will result in the overlapped source values being overwritten). All copied slots must\n/// exist in the database (i.e. have been stored and not deleted)\npub unconstrained fn copy(\n    contract_address: AztecAddress,\n    src_slot: Field,\n    dst_slot: Field,\n    num_entries: u32,\n    scope: AztecAddress,\n) {\n    copy_oracle(contract_address, src_slot, dst_slot, num_entries, scope);\n}\n\n#[oracle(aztec_utl_setCapsule)]\nunconstrained fn set_capsule_oracle<let N: u32>(\n    contract_address: AztecAddress,\n    slot: Field,\n    values: [Field; N],\n    scope: AztecAddress,\n) {}\n\n/// We need to pass in `array_len` (the value of N) as a parameter to tell the oracle how many fields the response must\n/// have.\n///\n/// Note that the oracle returns an Option<[Field; N]> because we cannot return an Option<T> directly. That would\n/// require for the oracle resolver to know the shape of T (e.g. if T were a struct of 3 u32 values then the expected\n/// response shape would be 3 single items, whereas it were a struct containing `u32, [Field;10], u32` then the\n/// expected shape would be single, array, single.). Instead, we return the serialization and deserialize in Noir.\n#[oracle(aztec_utl_getCapsule)]\nunconstrained fn get_capsule_oracle<let N: u32>(\n    contract_address: AztecAddress,\n    slot: Field,\n    array_len: u32,\n    scope: AztecAddress,\n) -> Option<[Field; N]> {}\n\n#[oracle(aztec_utl_deleteCapsule)]\nunconstrained fn delete_oracle(contract_address: AztecAddress, slot: Field, scope: AztecAddress) {}\n\n#[oracle(aztec_utl_copyCapsule)]\nunconstrained fn copy_oracle(\n    contract_address: AztecAddress,\n    src_slot: Field,\n    dst_slot: Field,\n    num_entries: u32,\n    scope: AztecAddress,\n) {}\n\nmod test {\n    // These tests are sort of redundant since we already test the oracle implementation directly in TypeScript, but\n    // they are cheap regardless and help ensure both that the TXE implementation works accordingly and that the Noir\n    // oracles are hooked up correctly.\n\n    use crate::{\n        oracle::capsules::{copy, delete, load, store},\n        test::{helpers::test_environment::TestEnvironment, mocks::MockStruct},\n    };\n    use crate::protocol::{address::AztecAddress, traits::{FromField, ToField}};\n\n    global SLOT: Field = 1;\n    global SCOPE: AztecAddress = AztecAddress { inner: 0xcafe };\n\n    #[test]\n    unconstrained fn stores_and_loads() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n\n            let value = MockStruct::new(5, 6);\n            store(contract_address, SLOT, value, SCOPE);\n\n            assert_eq(load(contract_address, SLOT, SCOPE).unwrap(), value);\n        });\n    }\n\n    #[test]\n    unconstrained fn store_overwrites() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n\n            let value = MockStruct::new(5, 6);\n            store(contract_address, SLOT, value, SCOPE);\n\n            let new_value = MockStruct::new(7, 8);\n            store(contract_address, SLOT, new_value, SCOPE);\n\n            assert_eq(load(contract_address, SLOT, SCOPE).unwrap(), new_value);\n        });\n    }\n\n    #[test]\n    unconstrained fn loads_empty_slot() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n\n            let loaded_value: Option<MockStruct> = load(contract_address, SLOT, SCOPE);\n            assert_eq(loaded_value, Option::none());\n        });\n    }\n\n    #[test]\n    unconstrained fn deletes_stored_value() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n\n            let value = MockStruct::new(5, 6);\n            store(contract_address, SLOT, value, SCOPE);\n            delete(contract_address, SLOT, SCOPE);\n\n            let loaded_value: Option<MockStruct> = load(contract_address, SLOT, SCOPE);\n            assert_eq(loaded_value, Option::none());\n        });\n    }\n\n    #[test]\n    unconstrained fn deletes_empty_slot() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n\n            delete(contract_address, SLOT, SCOPE);\n            let loaded_value: Option<MockStruct> = load(contract_address, SLOT, SCOPE);\n            assert_eq(loaded_value, Option::none());\n        });\n    }\n\n    #[test]\n    unconstrained fn copies_non_overlapping_values() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n\n            let src = 5;\n\n            let values = [MockStruct::new(5, 6), MockStruct::new(7, 8), MockStruct::new(9, 10)];\n            store(contract_address, src, values[0], SCOPE);\n            store(contract_address, src + 1, values[1], SCOPE);\n            store(contract_address, src + 2, values[2], SCOPE);\n\n            let dst = 10;\n            copy(contract_address, src, dst, 3, SCOPE);\n\n            assert_eq(load(contract_address, dst, SCOPE).unwrap(), values[0]);\n            assert_eq(load(contract_address, dst + 1, SCOPE).unwrap(), values[1]);\n            assert_eq(load(contract_address, dst + 2, SCOPE).unwrap(), values[2]);\n        });\n    }\n\n    #[test]\n    unconstrained fn copies_overlapping_values_with_src_ahead() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n\n            let src = 1;\n\n            let values = [MockStruct::new(5, 6), MockStruct::new(7, 8), MockStruct::new(9, 10)];\n            store(contract_address, src, values[0], SCOPE);\n            store(contract_address, src + 1, values[1], SCOPE);\n            store(contract_address, src + 2, values[2], SCOPE);\n\n            let dst = 2;\n            copy(contract_address, src, dst, 3, SCOPE);\n\n            assert_eq(load(contract_address, dst, SCOPE).unwrap(), values[0]);\n            assert_eq(load(contract_address, dst + 1, SCOPE).unwrap(), values[1]);\n            assert_eq(load(contract_address, dst + 2, SCOPE).unwrap(), values[2]);\n\n            // src[1] and src[2] should have been overwritten since they are also dst[0] and dst[1]\n            assert_eq(load(contract_address, src, SCOPE).unwrap(), values[0]); // src[0] (unchanged)\n            assert_eq(load(contract_address, src + 1, SCOPE).unwrap(), values[0]); // dst[0]\n            assert_eq(load(contract_address, src + 2, SCOPE).unwrap(), values[1]); // dst[1]\n        });\n    }\n\n    #[test]\n    unconstrained fn copies_overlapping_values_with_dst_ahead() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n\n            let src = 2;\n\n            let values = [MockStruct::new(5, 6), MockStruct::new(7, 8), MockStruct::new(9, 10)];\n            store(contract_address, src, values[0], SCOPE);\n            store(contract_address, src + 1, values[1], SCOPE);\n            store(contract_address, src + 2, values[2], SCOPE);\n\n            let dst = 1;\n            copy(contract_address, src, dst, 3, SCOPE);\n\n            assert_eq(load(contract_address, dst, SCOPE).unwrap(), values[0]);\n            assert_eq(load(contract_address, dst + 1, SCOPE).unwrap(), values[1]);\n            assert_eq(load(contract_address, dst + 2, SCOPE).unwrap(), values[2]);\n\n            // src[0] and src[1] should have been overwritten since they are also dst[1] and dst[2]\n            assert_eq(load(contract_address, src, SCOPE).unwrap(), values[1]); // dst[1]\n            assert_eq(load(contract_address, src + 1, SCOPE).unwrap(), values[2]); // dst[2]\n            assert_eq(load(contract_address, src + 2, SCOPE).unwrap(), values[2]); // src[2] (unchanged)\n        });\n    }\n\n    #[test(should_fail_with = \"copy empty slot\")]\n    unconstrained fn cannot_copy_empty_values() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n\n            copy(contract_address, SLOT, SLOT, 1, SCOPE);\n        });\n    }\n\n    #[test(should_fail_with = \"not allowed to access\")]\n    unconstrained fn cannot_store_other_contract() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n            let other_contract_address = AztecAddress::from_field(contract_address.to_field() + 1);\n\n            let value = MockStruct::new(5, 6);\n            store(other_contract_address, SLOT, value, SCOPE);\n        });\n    }\n\n    #[test(should_fail_with = \"not allowed to access\")]\n    unconstrained fn cannot_load_other_contract() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n            let other_contract_address = AztecAddress::from_field(contract_address.to_field() + 1);\n\n            let _: Option<MockStruct> = load(other_contract_address, SLOT, SCOPE);\n        });\n    }\n\n    #[test(should_fail_with = \"not allowed to access\")]\n    unconstrained fn cannot_delete_other_contract() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n            let other_contract_address = AztecAddress::from_field(contract_address.to_field() + 1);\n\n            delete(other_contract_address, SLOT, SCOPE);\n        });\n    }\n\n    #[test(should_fail_with = \"not allowed to access\")]\n    unconstrained fn cannot_copy_other_contract() {\n        let env = TestEnvironment::new();\n        env.private_context(|context| {\n            let contract_address = context.this_address();\n            let other_contract_address = AztecAddress::from_field(contract_address.to_field() + 1);\n\n            copy(other_contract_address, SLOT, SLOT, 0, SCOPE);\n        });\n    }\n}\n"
        },
        "194": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/oracle/contract_sync.nr",
            "source": "use crate::protocol::address::AztecAddress;\n\n#[oracle(aztec_utl_setContractSyncCacheInvalid)]\nunconstrained fn set_contract_sync_cache_invalid_oracle<let N: u32>(\n    contract_address: AztecAddress,\n    scopes: BoundedVec<AztecAddress, N>,\n) {}\n\n/// Forces the PXE to re-sync the given contract for a set of scopes on the next query.\n///\n/// Call this after writing data (e.g. offchain messages) that the contract's `sync_state` function needs to discover.\n/// Without invalidation, the sync cache would skip re-running `sync_state` until the next block.\npub unconstrained fn set_contract_sync_cache_invalid<let N: u32>(\n    contract_address: AztecAddress,\n    scopes: BoundedVec<AztecAddress, N>,\n) {\n    set_contract_sync_cache_invalid_oracle(contract_address, scopes);\n}\n"
        },
        "195": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/oracle/execution.nr",
            "source": "use crate::context::UtilityContext;\n\n#[oracle(aztec_utl_getUtilityContext)]\nunconstrained fn get_utility_context_oracle() -> UtilityContext {}\n\n/// Returns a utility context built from the global variables of anchor block and the contract address of the function\n/// being executed.\npub unconstrained fn get_utility_context() -> UtilityContext {\n    get_utility_context_oracle()\n}\n"
        },
        "196": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/oracle/execution_cache.nr",
            "source": "/// Stores values represented as slice in execution cache to be later obtained by its hash.\n// TODO(F-498): review naming consistency\npub fn store<let N: u32>(values: [Field; N], hash: Field) {\n    // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe to\n    // call. When loading the values, however, the caller must check that the values are indeed the preimage.\n    unsafe { set_hash_preimage_oracle_wrapper(values, hash) };\n}\n\nunconstrained fn set_hash_preimage_oracle_wrapper<let N: u32>(values: [Field; N], hash: Field) {\n    set_hash_preimage_oracle(values, hash);\n}\n\n// TODO(F-498): review naming consistency\npub unconstrained fn load<let N: u32>(hash: Field) -> [Field; N] {\n    get_hash_preimage_oracle(hash)\n}\n\n#[oracle(aztec_prv_setHashPreimage)]\nunconstrained fn set_hash_preimage_oracle<let N: u32>(_values: [Field; N], _hash: Field) {}\n\n#[oracle(aztec_prv_getHashPreimage)]\nunconstrained fn get_hash_preimage_oracle<let N: u32>(_hash: Field) -> [Field; N] {}\n"
        },
        "197": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/oracle/get_contract_instance.nr",
            "source": "use crate::protocol::{\n    address::AztecAddress, contract_class_id::ContractClassId, contract_instance::ContractInstance, traits::FromField,\n};\n\n// NOTE: this is for use in private only\n#[oracle(aztec_utl_getContractInstance)]\nunconstrained fn get_contract_instance_oracle(_address: AztecAddress) -> ContractInstance {}\n\n// NOTE: this is for use in private only\nunconstrained fn get_contract_instance_internal(address: AztecAddress) -> ContractInstance {\n    get_contract_instance_oracle(address)\n}\n\n// NOTE: this is for use in private only\npub fn get_contract_instance(address: AztecAddress) -> ContractInstance {\n    // Safety: The to_address function combines all values in the instance object to produce an address, so by checking\n    // that we get the expected address we validate the entire struct.\n    let instance = unsafe { get_contract_instance_internal(address) };\n    assert_eq(instance.to_address(), address);\n\n    instance\n}\n\nstruct GetContractInstanceResult {\n    exists: bool,\n    member: Field,\n}\n\n// These oracles each return a ContractInstance member plus a boolean indicating whether the instance was found.\n#[oracle(aztec_avm_getContractInstanceDeployer)]\nunconstrained fn get_contract_instance_deployer_oracle_avm(_address: AztecAddress) -> [GetContractInstanceResult; 1] {}\n#[oracle(aztec_avm_getContractInstanceClassId)]\nunconstrained fn get_contract_instance_class_id_oracle_avm(_address: AztecAddress) -> [GetContractInstanceResult; 1] {}\n#[oracle(aztec_avm_getContractInstanceInitializationHash)]\nunconstrained fn get_contract_instance_initialization_hash_oracle_avm(\n    _address: AztecAddress,\n) -> [GetContractInstanceResult; 1] {}\n\nunconstrained fn get_contract_instance_deployer_internal_avm(address: AztecAddress) -> [GetContractInstanceResult; 1] {\n    get_contract_instance_deployer_oracle_avm(address)\n}\nunconstrained fn get_contract_instance_class_id_internal_avm(address: AztecAddress) -> [GetContractInstanceResult; 1] {\n    get_contract_instance_class_id_oracle_avm(address)\n}\nunconstrained fn get_contract_instance_initialization_hash_internal_avm(\n    address: AztecAddress,\n) -> [GetContractInstanceResult; 1] {\n    get_contract_instance_initialization_hash_oracle_avm(address)\n}\n\npub fn get_contract_instance_deployer_avm(address: AztecAddress) -> Option<AztecAddress> {\n    // Safety: AVM opcodes are constrained by the AVM itself\n    let GetContractInstanceResult { exists, member } =\n        unsafe { get_contract_instance_deployer_internal_avm(address)[0] };\n    if exists {\n        Option::some(AztecAddress::from_field(member))\n    } else {\n        Option::none()\n    }\n}\npub fn get_contract_instance_class_id_avm(address: AztecAddress) -> Option<ContractClassId> {\n    // Safety: AVM opcodes are constrained by the AVM itself\n    let GetContractInstanceResult { exists, member } =\n        unsafe { get_contract_instance_class_id_internal_avm(address)[0] };\n    if exists {\n        Option::some(ContractClassId::from_field(member))\n    } else {\n        Option::none()\n    }\n}\npub fn get_contract_instance_initialization_hash_avm(address: AztecAddress) -> Option<Field> {\n    // Safety: AVM opcodes are constrained by the AVM itself\n    let GetContractInstanceResult { exists, member } =\n        unsafe { get_contract_instance_initialization_hash_internal_avm(address)[0] };\n    if exists {\n        Option::some(member)\n    } else {\n        Option::none()\n    }\n}\n"
        },
        "202": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/oracle/key_validation_request.nr",
            "source": "use crate::protocol::abis::validation_requests::KeyValidationRequest;\n\n#[oracle(aztec_utl_getKeyValidationRequest)]\nunconstrained fn get_key_validation_request_oracle(_pk_m_hash: Field, _key_index: Field) -> KeyValidationRequest {}\n\npub unconstrained fn get_key_validation_request(pk_m_hash: Field, key_index: Field) -> KeyValidationRequest {\n    get_key_validation_request_oracle(pk_m_hash, key_index)\n}\n"
        },
        "203": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/oracle/keys.nr",
            "source": "use crate::protocol::{\n    address::{AztecAddress, PartialAddress},\n    point::Point,\n    public_keys::{IvpkM, NpkM, OvpkM, PublicKeys, TpkM},\n};\n\n// TODO(F-498): review naming consistency\npub unconstrained fn get_public_keys_and_partial_address(address: AztecAddress) -> (PublicKeys, PartialAddress) {\n    try_get_public_keys_and_partial_address(address).expect(f\"Public keys not registered for account {address}\")\n}\n\n#[oracle(aztec_utl_getPublicKeysAndPartialAddress)]\nunconstrained fn get_public_keys_and_partial_address_oracle(_address: AztecAddress) -> Option<[Field; 13]> {}\n\n// TODO(F-498): review naming consistency\npub unconstrained fn try_get_public_keys_and_partial_address(\n    address: AztecAddress,\n) -> Option<(PublicKeys, PartialAddress)> {\n    get_public_keys_and_partial_address_oracle(address).map(|result: [Field; 13]| {\n        let keys = PublicKeys {\n            npk_m: NpkM { inner: Point { x: result[0], y: result[1], is_infinite: result[2] != 0 } },\n            ivpk_m: IvpkM { inner: Point { x: result[3], y: result[4], is_infinite: result[5] != 0 } },\n            ovpk_m: OvpkM { inner: Point { x: result[6], y: result[7], is_infinite: result[8] != 0 } },\n            tpk_m: TpkM { inner: Point { x: result[9], y: result[10], is_infinite: result[11] != 0 } },\n        };\n\n        let partial_address = PartialAddress::from_field(result[12]);\n\n        (keys, partial_address)\n    })\n}\n"
        },
        "205": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/oracle/message_processing.nr",
            "source": "use crate::protocol::address::AztecAddress;\n\n/// Finds new private logs that may have been sent to all registered accounts in PXE in the current contract and makes\n/// them available for later processing in Noir by storing them in a capsule array.\n// TODO(F-498): review naming consistency\npub unconstrained fn fetch_tagged_logs(pending_tagged_log_array_base_slot: Field, scope: AztecAddress) {\n    get_pending_tagged_logs_oracle(pending_tagged_log_array_base_slot, scope);\n}\n\n#[oracle(aztec_utl_getPendingTaggedLogs)]\nunconstrained fn get_pending_tagged_logs_oracle(pending_tagged_log_array_base_slot: Field, scope: AztecAddress) {}\n\n// This must be a single oracle and not one for notes and one for events because the entire point is to validate all\n// notes and events in one go, minimizing node round-trips.\npub(crate) unconstrained fn validate_and_store_enqueued_notes_and_events(\n    contract_address: AztecAddress,\n    note_validation_requests_array_base_slot: Field,\n    event_validation_requests_array_base_slot: Field,\n    max_note_packed_len: Field,\n    max_event_serialized_len: Field,\n    scope: AztecAddress,\n) {\n    validate_and_store_enqueued_notes_and_events_oracle(\n        contract_address,\n        note_validation_requests_array_base_slot,\n        event_validation_requests_array_base_slot,\n        max_note_packed_len,\n        max_event_serialized_len,\n        scope,\n    );\n}\n\n#[oracle(aztec_utl_validateAndStoreEnqueuedNotesAndEvents)]\nunconstrained fn validate_and_store_enqueued_notes_and_events_oracle(\n    contract_address: AztecAddress,\n    note_validation_requests_array_base_slot: Field,\n    event_validation_requests_array_base_slot: Field,\n    max_note_packed_len: Field,\n    max_event_serialized_len: Field,\n    scope: AztecAddress,\n) {}\n\npub(crate) unconstrained fn get_logs_by_tag(\n    contract_address: AztecAddress,\n    log_retrieval_requests_array_base_slot: Field,\n    log_retrieval_responses_array_base_slot: Field,\n    scope: AztecAddress,\n) {\n    get_logs_by_tag_oracle(\n        contract_address,\n        log_retrieval_requests_array_base_slot,\n        log_retrieval_responses_array_base_slot,\n        scope,\n    );\n}\n\n#[oracle(aztec_utl_getLogsByTag)]\nunconstrained fn get_logs_by_tag_oracle(\n    contract_address: AztecAddress,\n    log_retrieval_requests_array_base_slot: Field,\n    log_retrieval_responses_array_base_slot: Field,\n    scope: AztecAddress,\n) {}\n\npub(crate) unconstrained fn get_message_contexts_by_tx_hash(\n    contract_address: AztecAddress,\n    message_context_requests_array_base_slot: Field,\n    message_context_responses_array_base_slot: Field,\n    scope: AztecAddress,\n) {\n    get_message_contexts_by_tx_hash_oracle(\n        contract_address,\n        message_context_requests_array_base_slot,\n        message_context_responses_array_base_slot,\n        scope,\n    );\n}\n\n#[oracle(aztec_utl_getMessageContextsByTxHash)]\nunconstrained fn get_message_contexts_by_tx_hash_oracle(\n    contract_address: AztecAddress,\n    message_context_requests_array_base_slot: Field,\n    message_context_responses_array_base_slot: Field,\n    scope: AztecAddress,\n) {}\n"
        },
        "208": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/oracle/nullifiers.nr",
            "source": "//! Nullifier creation, existence checks, etc.\n\nuse crate::protocol::address::aztec_address::AztecAddress;\n\n/// Notifies the simulator that a nullifier has been created, so that its correct status (pending or settled) can be\n/// determined when reading nullifiers in subsequent private function calls. The first non-revertible nullifier emitted\n/// is also used to compute note nonces.\npub fn notify_created_nullifier(inner_nullifier: Field) {\n    // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe to\n    // call.\n    unsafe { notify_created_nullifier_oracle(inner_nullifier) };\n}\n\n#[oracle(aztec_prv_notifyCreatedNullifier)]\nunconstrained fn notify_created_nullifier_oracle(_inner_nullifier: Field) {}\n\n/// Returns `true` if the nullifier has been emitted in the same transaction, i.e. if [`notify_created_nullifier`] has\n/// been\n/// called for this inner nullifier from the contract with the specified address.\n///\n/// Note that despite sharing pending transaction information with the app, this is not a privacy leak: anyone in the\n/// network can always determine in which transaction a inner nullifier was emitted by a given contract by simply\n/// inspecting transaction effects. What _would_ constitute a leak would be to share the list of inner pending\n/// nullifiers, as that would reveal their preimages.\npub unconstrained fn is_nullifier_pending(inner_nullifier: Field, contract_address: AztecAddress) -> bool {\n    is_nullifier_pending_oracle(inner_nullifier, contract_address)\n}\n\n#[oracle(aztec_prv_isNullifierPending)]\nunconstrained fn is_nullifier_pending_oracle(_inner_nullifier: Field, _contract_address: AztecAddress) -> bool {}\n\n/// Returns `true` if the nullifier exists. Note that a `true` value can be constrained by proving existence of the\n/// nullifier, but a `false` value should not be relied upon since other transactions may emit this nullifier before\n/// the current transaction is included in a block. While this might seem of little use at first, certain design\n/// patterns benefit from this abstraction (see e.g. `PrivateMutable`).\n// TODO(F-498): review naming consistency\npub unconstrained fn check_nullifier_exists(inner_nullifier: Field) -> bool {\n    does_nullifier_exist_oracle(inner_nullifier)\n}\n\n#[oracle(aztec_utl_doesNullifierExist)]\nunconstrained fn does_nullifier_exist_oracle(_inner_nullifier: Field) -> bool {}\n"
        },
        "212": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/oracle/shared_secret.nr",
            "source": "use crate::protocol::address::aztec_address::AztecAddress;\nuse crate::protocol::point::Point;\n\n#[oracle(aztec_utl_getSharedSecret)]\nunconstrained fn get_shared_secret_oracle(\n    address: AztecAddress,\n    ephPk: Point,\n    contract_address: AztecAddress,\n) -> Field {}\n\n/// Returns an app-siloed shared secret between `address` and someone who knows the secret key behind an ephemeral\n/// public key `ephPk`.\n///\n/// The returned value is a Field `s_app`, computed as:\n///\n/// ```text\n/// S     = address_secret * ephPk          (raw ECDH point)\n/// s_app = h(DOM_SEP, S.x, S.y, contract)  (app-siloed scalar)\n/// ```\n///\n/// where `contract` is the address of the calling contract. The oracle host validates this matches its execution\n/// context.\n///\n/// Without app-siloing, a malicious contract could call this oracle with public information (address, ephPk) and\n/// obtain the same raw secret as the legitimate contract, enabling cross-contract decryption. By including the\n/// contract address in the hash, each contract receives a different `s_app`, preventing this attack.\n///\n/// Callers derive indexed subkeys from `s_app` via\n/// [`derive_shared_secret_subkey`](crate::keys::ecdh_shared_secret::derive_shared_secret_subkey).\npub unconstrained fn get_shared_secret(address: AztecAddress, ephPk: Point, contract_address: AztecAddress) -> Field {\n    get_shared_secret_oracle(address, ephPk, contract_address)\n}\n"
        },
        "214": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/oracle/tx_phase.nr",
            "source": "/// Notifies PXE of the side effect counter at which the revertible phase begins.\n///\n/// PXE uses it to classify notes and nullifiers as revertible or non-revertible in its note cache. This information is\n/// then fed to kernels as hints.\npub(crate) fn notify_revertible_phase_start(counter: u32) {\n    // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe to\n    // call.\n    unsafe { notify_revertible_phase_start_oracle_wrapper(counter) };\n}\n\n/// Returns whether a side effect counter falls in the revertible phase of the transaction.\npub(crate) unconstrained fn is_execution_in_revertible_phase(current_counter: u32) -> bool {\n    is_execution_in_revertible_phase_oracle(current_counter)\n}\n\nunconstrained fn notify_revertible_phase_start_oracle_wrapper(counter: u32) {\n    notify_revertible_phase_start_oracle(counter);\n}\n\n#[oracle(aztec_prv_notifyRevertiblePhaseStart)]\nunconstrained fn notify_revertible_phase_start_oracle(_counter: u32) {}\n\n#[oracle(aztec_prv_isExecutionInRevertiblePhase)]\nunconstrained fn is_execution_in_revertible_phase_oracle(current_counter: u32) -> bool {}\n"
        },
        "215": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/oracle/version.nr",
            "source": "/// The ORACLE_VERSION constant is used to check that the oracle interface is in sync between PXE and Aztec.nr. We need\n/// to version the oracle interface to ensure that developers get a reasonable error message if they use incompatible\n/// versions of Aztec.nr and PXE. The TypeScript counterpart is in `oracle_version.ts`.\n///\n/// @dev Whenever a contract function or Noir test is run, the `aztec_utl_assertCompatibleOracleVersion` oracle is\n/// called and if the oracle version is incompatible an error is thrown.\npub global ORACLE_VERSION: Field = 22;\n\n/// Asserts that the version of the oracle is compatible with the version expected by the contract.\npub fn assert_compatible_oracle_version() {\n    // Safety: This oracle call returns nothing: we only call it to check Aztec.nr and Oracle interface versions are\n    // compatible. It is therefore always safe to call.\n    unsafe {\n        assert_compatible_oracle_version_wrapper();\n    }\n}\n\nunconstrained fn assert_compatible_oracle_version_wrapper() {\n    assert_compatible_oracle_version_oracle(ORACLE_VERSION);\n}\n\n#[oracle(aztec_utl_assertCompatibleOracleVersion)]\nunconstrained fn assert_compatible_oracle_version_oracle(version: Field) {}\n\nmod test {\n    use super::{assert_compatible_oracle_version_oracle, ORACLE_VERSION};\n\n    #[test]\n    unconstrained fn compatible_oracle_version() {\n        assert_compatible_oracle_version_oracle(ORACLE_VERSION);\n    }\n\n    #[test(should_fail_with = \"Incompatible aztec cli version:\")]\n    unconstrained fn incompatible_oracle_version() {\n        let arbitrary_incorrect_version = 318183437;\n        assert_compatible_oracle_version_oracle(arbitrary_incorrect_version);\n    }\n}\n"
        },
        "261": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/utils/array/append.nr",
            "source": "/// Appends the elements of the second `BoundedVec` to the end of the first one. The resulting `BoundedVec` can have\n/// any arbitrary maximum length, but it must be large enough to fit all of the elements of both the first and second\n/// vectors.\npub fn append<T, let ALen: u32, let BLen: u32, let DstLen: u32>(\n    a: BoundedVec<T, ALen>,\n    b: BoundedVec<T, BLen>,\n) -> BoundedVec<T, DstLen> {\n    let mut dst = BoundedVec::new();\n\n    dst.extend_from_bounded_vec(a);\n    dst.extend_from_bounded_vec(b);\n\n    dst\n}\n\nmod test {\n    use super::append;\n\n    #[test]\n    unconstrained fn append_empty_vecs() {\n        let a: BoundedVec<_, 3> = BoundedVec::new();\n        let b: BoundedVec<_, 14> = BoundedVec::new();\n\n        let result: BoundedVec<Field, 5> = append(a, b);\n\n        assert_eq(result.len(), 0);\n        assert_eq(result.storage(), std::mem::zeroed());\n    }\n\n    #[test]\n    unconstrained fn append_non_empty_vecs() {\n        let a: BoundedVec<_, 3> = BoundedVec::from_array([1, 2, 3]);\n        let b: BoundedVec<_, 14> = BoundedVec::from_array([4, 5, 6]);\n\n        let result: BoundedVec<Field, 8> = append(a, b);\n\n        assert_eq(result.len(), 6);\n        assert_eq(result.storage(), [1, 2, 3, 4, 5, 6, std::mem::zeroed(), std::mem::zeroed()]);\n    }\n\n    #[test(should_fail_with = \"out of bounds\")]\n    unconstrained fn append_non_empty_vecs_insufficient_max_len() {\n        let a: BoundedVec<_, 3> = BoundedVec::from_array([1, 2, 3]);\n        let b: BoundedVec<_, 14> = BoundedVec::from_array([4, 5, 6]);\n\n        let _: BoundedVec<Field, 5> = append(a, b);\n    }\n}\n"
        },
        "264": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/utils/array/subarray.nr",
            "source": "/// Returns `DstLen` elements from a source array, starting at `offset`. `DstLen` must not be larger than the number of\n/// elements past `offset`.\n///\n/// Examples:\n/// ```\n/// let foo: [Field; 2] = subarray([1, 2, 3, 4, 5], 2);\n/// assert_eq(foo, [3, 4]);\n///\n/// let bar: [Field; 5] = subarray([1, 2, 3, 4, 5], 2); // fails - we can't return 5 elements since only 3 remain\n/// ```\npub fn subarray<T, let SrcLen: u32, let DstLen: u32>(src: [T; SrcLen], offset: u32) -> [T; DstLen] {\n    assert(offset + DstLen <= SrcLen, \"DstLen too large for offset\");\n\n    let mut dst: [T; DstLen] = std::mem::zeroed();\n    for i in 0..DstLen {\n        dst[i] = src[i + offset];\n    }\n\n    dst\n}\n\nmod test {\n    use super::subarray;\n\n    #[test]\n    unconstrained fn subarray_into_empty() {\n        // In all of these cases we're setting DstLen to be 0, so we always get back an empty array.\n        assert_eq(subarray::<Field, _, _>([], 0), []);\n        assert_eq(subarray([1, 2, 3, 4, 5], 0), []);\n        assert_eq(subarray([1, 2, 3, 4, 5], 2), []);\n    }\n\n    #[test]\n    unconstrained fn subarray_complete() {\n        assert_eq(subarray::<Field, _, _>([], 0), []);\n        assert_eq(subarray([1, 2, 3, 4, 5], 0), [1, 2, 3, 4, 5]);\n    }\n\n    #[test]\n    unconstrained fn subarray_different_end_sizes() {\n        // We implicitly select how many values to read in the size of the return array\n        assert_eq(subarray([1, 2, 3, 4, 5], 1), [2, 3, 4, 5]);\n        assert_eq(subarray([1, 2, 3, 4, 5], 1), [2, 3, 4]);\n        assert_eq(subarray([1, 2, 3, 4, 5], 1), [2, 3]);\n        assert_eq(subarray([1, 2, 3, 4, 5], 1), [2]);\n    }\n\n    #[test(should_fail_with = \"DstLen too large for offset\")]\n    unconstrained fn subarray_offset_too_large() {\n        // With an offset of 1 we can only request up to 4 elements\n        let _: [_; 5] = subarray([1, 2, 3, 4, 5], 1);\n    }\n\n    #[test(should_fail)]\n    unconstrained fn subarray_bad_return_value() {\n        assert_eq(subarray([1, 2, 3, 4, 5], 1), [3, 3, 4, 5]);\n    }\n}\n"
        },
        "265": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/utils/array/subbvec.nr",
            "source": "use crate::utils::array;\n\n/// Returns `DstMaxLen` elements from a source BoundedVec, starting at `offset`. `offset` must not be larger than the\n/// original length, and `DstLen` must not be larger than the total number of elements past `offset` (including the\n/// zeroed elements past `len()`).\n///\n/// Only elements at the beginning of the vector can be removed: it is not possible to also remove elements at the end\n/// of the vector by passing a value for `DstLen` that is smaller than `len() - offset`.\n///\n/// Examples:\n/// ```\n/// let foo = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n/// assert_eq(subbvec(foo, 2), BoundedVec::<_, 8>::from_array([3, 4, 5]));\n///\n/// let bar: BoundedVec<_, 1> = subbvec(foo, 2); // fails - we can't return just 1 element since 3 remain\n/// let baz: BoundedVec<_, 10> = subbvec(foo, 3); // fails - we can't return 10 elements since only 7 remain\n/// ```\npub fn subbvec<T, let SrcMaxLen: u32, let DstMaxLen: u32>(\n    bvec: BoundedVec<T, SrcMaxLen>,\n    offset: u32,\n) -> BoundedVec<T, DstMaxLen> {\n    // from_parts_unchecked does not verify that the elements past len are zeroed, but that is not an issue in our case\n    // because we're constructing the new storage array as a subarray of the original one (which should have zeroed\n    // storage past len), guaranteeing correctness. This is because `subarray` does not allow extending arrays past\n    // their original length.\n    BoundedVec::from_parts_unchecked(array::subarray(bvec.storage(), offset), bvec.len() - offset)\n}\n\nmod test {\n    use super::subbvec;\n\n    #[test]\n    unconstrained fn subbvec_empty() {\n        let bvec = BoundedVec::<Field, 0>::from_array([]);\n        assert_eq(subbvec(bvec, 0), bvec);\n    }\n\n    #[test]\n    unconstrained fn subbvec_complete() {\n        let bvec = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n        assert_eq(subbvec(bvec, 0), bvec);\n\n        let smaller_capacity = BoundedVec::<_, 5>::from_array([1, 2, 3, 4, 5]);\n        assert_eq(subbvec(bvec, 0), smaller_capacity);\n    }\n\n    #[test]\n    unconstrained fn subbvec_partial() {\n        let bvec = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n\n        assert_eq(subbvec(bvec, 2), BoundedVec::<_, 8>::from_array([3, 4, 5]));\n        assert_eq(subbvec(bvec, 2), BoundedVec::<_, 3>::from_array([3, 4, 5]));\n    }\n\n    #[test]\n    unconstrained fn subbvec_into_empty() {\n        let bvec: BoundedVec<_, 10> = BoundedVec::from_array([1, 2, 3, 4, 5]);\n        assert_eq(subbvec(bvec, 5), BoundedVec::<_, 5>::from_array([]));\n    }\n\n    #[test(should_fail)]\n    unconstrained fn subbvec_offset_past_len() {\n        let bvec = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n        let _: BoundedVec<_, 1> = subbvec(bvec, 6);\n    }\n\n    #[test(should_fail)]\n    unconstrained fn subbvec_insufficient_dst_len() {\n        let bvec = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n\n        // We're not providing enough space to hold all of the items inside the original BoundedVec. subbvec can cause\n        // for the capacity to reduce, but not the length (other than by len - offset).\n        let _: BoundedVec<_, 1> = subbvec(bvec, 2);\n    }\n\n    #[test(should_fail_with = \"DstLen too large for offset\")]\n    unconstrained fn subbvec_dst_len_causes_enlarge() {\n        let bvec = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n\n        // subbvec does not support capacity increases\n        let _: BoundedVec<_, 11> = subbvec(bvec, 0);\n    }\n\n    #[test(should_fail_with = \"DstLen too large for offset\")]\n    unconstrained fn subbvec_dst_len_too_large_for_offset() {\n        let bvec = BoundedVec::<_, 10>::from_array([1, 2, 3, 4, 5]);\n\n        // This effectively requests a capacity increase, since there'd be just one element plus the 5 empty slots,\n        // which is less than 7.\n        let _: BoundedVec<_, 7> = subbvec(bvec, 4);\n    }\n}\n"
        },
        "268": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/utils/conversion/bytes_to_fields.nr",
            "source": "use std::static_assert;\n\n// These functions are used to facilitate the conversion of log ciphertext between byte and field representations.\n//\n// `bytes_to_fields` uses fixed-size arrays since encryption contexts have compile-time size information.\n// `bytes_from_fields` uses BoundedVec for flexibility in unconstrained contexts where sizes are dynamic.\n//\n// Together they provide bidirectional conversion between bytes and fields when processing encrypted logs.\n\n/// Converts the input bytes into an array of fields. A Field is ~254 bits meaning that each field can store 31 whole\n/// bytes. Use `bytes_from_fields` to obtain the original bytes array.\n///\n/// The input bytes are chunked into chunks of 31 bytes. Each 31-byte chunk is viewed as big-endian, and is converted\n/// into a Field. For example, [1, 10, 3, ..., 0] (31 bytes) is encoded as [1 * 256^30 + 10 * 256^29 + 3 * 256^28 + ...\n/// + 0] Note: N must be a multiple of 31 bytes\npub fn bytes_to_fields<let N: u32>(bytes: [u8; N]) -> [Field; N / 31] {\n    // Assert that N is a multiple of 31\n    static_assert(N % 31 == 0, \"N must be a multiple of 31\");\n\n    let mut fields = [0; N / 31];\n\n    // Since N is a multiple of 31, we can simply process all chunks fully\n    for i in 0..N / 31 {\n        let mut field = 0;\n        for j in 0..31 {\n            // Shift the existing value left by 8 bits and add the new byte\n            field = field * 256 + bytes[i * 31 + j] as Field;\n        }\n        fields[i] = field;\n    }\n\n    fields\n}\n\n/// Converts an input BoundedVec of fields into a BoundedVec of bytes in big-endian order. Arbitrary Field arrays are\n/// not allowed: this is assumed to be an array obtained via `bytes_to_fields`, i.e. one that actually represents\n/// bytes. To convert a Field array into bytes, use `fields_to_bytes`.\n///\n/// Each input field must contain at most 31 bytes (this is constrained to be so). Each field is converted into 31\n/// big-endian bytes, and the resulting 31-byte chunks are concatenated back together in the order of the original\n/// fields.\npub fn bytes_from_fields<let N: u32>(fields: BoundedVec<Field, N>) -> BoundedVec<u8, N * 31> {\n    let mut bytes = BoundedVec::new();\n\n    for i in 0..fields.len() {\n        let field = fields.get(i);\n\n        // We expect that the field contains at most 31 bytes of information.\n        field.assert_max_bit_size::<248>();\n\n        // Now we can safely convert the field to 31 bytes.\n        let field_as_bytes: [u8; 31] = field.to_be_bytes();\n\n        for j in 0..31 {\n            bytes.push(field_as_bytes[j]);\n        }\n    }\n\n    bytes\n}\n\nmod tests {\n    use crate::utils::array::subarray;\n    use super::{bytes_from_fields, bytes_to_fields};\n\n    #[test]\n    unconstrained fn random_bytes_to_fields_and_back(input: [u8; 93]) {\n        let fields = bytes_to_fields(input);\n\n        // At this point in production, the log flies through the system and we get a BoundedVec on the other end. So\n        // we need to convert the field array to a BoundedVec to be able to feed it to the `bytes_from_fields`\n        // function.\n        let fields_as_bounded_vec = BoundedVec::<_, 6>::from_array(fields);\n\n        let bytes_back = bytes_from_fields(fields_as_bounded_vec);\n\n        // Compare the original input with the round-tripped result\n        assert_eq(bytes_back.len(), input.len());\n        assert_eq(subarray(bytes_back.storage(), 0), input);\n    }\n\n    #[test(should_fail_with = \"N must be a multiple of 31\")]\n    unconstrained fn bytes_to_fields_input_length_not_multiple_of_31() {\n        // Try to convert 32 bytes (not a multiple of 31) to fields\n        let _fields = bytes_to_fields([0; 32]);\n    }\n\n}\n"
        },
        "269": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/utils/conversion/fields_to_bytes.nr",
            "source": "// These functions are used to facilitate the conversion of log plaintext represented as fields into bytes and back.\n//\n// `fields_to_bytes` uses fixed-size arrays since encryption contexts have compile-time size information.\n// `fields_from_bytes` uses BoundedVec for flexibility in unconstrained contexts where sizes are dynamic.\n//\n// Together they provide bidirectional conversion between fields and bytes.\n\n/// Converts an input array of fields into a single array of bytes. Use `fields_from_bytes` to obtain the original\n/// field array. Each field is converted to a 32-byte big-endian array.\n///\n/// For example, if you have a field array [123, 456], it will be converted to a 64-byte array:\n/// [0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,123,  // First field (32 bytes)\n/// 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,200]  // Second field (32 bytes)\n///\n/// Since a field is ~254 bits, you'll end up with a subtle 2-bit \"gap\" at the big end, every 32 bytes. Be careful that\n/// such a gap doesn't leak information! This could happen if you for example expected the output to be\n/// indistinguishable from random bytes.\npub fn fields_to_bytes<let N: u32>(fields: [Field; N]) -> [u8; 32 * N] {\n    let mut bytes = [0; 32 * N];\n\n    for i in 0..N {\n        let field_as_bytes: [u8; 32] = fields[i].to_be_bytes();\n\n        for j in 0..32 {\n            bytes[i * 32 + j] = field_as_bytes[j];\n        }\n    }\n\n    bytes\n}\n\n/// Converts an input BoundedVec of bytes into a BoundedVec of fields. Arbitrary byte arrays are not allowed: this is\n/// assumed to be an array obtained via `fields_to_bytes`, i.e. one that actually represents fields. To convert a byte\n/// array into Fields, use `bytes_to_fields`.\n///\n/// The input bytes are chunked into chunks of 32 bytes. Each 32-byte chunk is viewed as big-endian, and is converted\n/// into a Field. For example, [1, 10, 3, ..., 0] (32 bytes) is encoded as [1 * 256^31 + 10 * 256^30 + 3 * 256^29 + ...\n/// + 0] Note 1: N must be a multiple of 32 bytes Note 2: The max value check code was taken from\n/// std::field::to_be_bytes function.\npub fn fields_from_bytes<let N: u32>(bytes: BoundedVec<u8, N>) -> BoundedVec<Field, N / 32> {\n    // Assert that input length is a multiple of 32\n    assert(bytes.len() % 32 == 0, \"Input length must be a multiple of 32\");\n\n    try_fields_from_bytes(bytes).expect(f\"Value does not fit in field\")\n}\n\n/// Converts a single 32-byte big-endian chunk (starting at `offset`) into a Field, returning\n/// `Option::none()` if the chunk's value is >= the field modulus.\nfn try_field_from_be_bytes<let N: u32>(bytes: BoundedVec<u8, N>, offset: u32) -> Option<Field> {\n    let p = std::field::modulus_be_bytes();\n    let mut field = 0;\n    // Field arithmetic silently wraps values >= the modulus, so we compare each 32-byte chunk against\n    // the modulus byte-by-byte (big-endian, most significant first). The first byte that differs\n    // determines the result: if our byte is smaller we're valid, if larger we've overflowed.\n    // cmp tracks the result: 0 = equal so far, 1 = less than modulus, 2 = exceeds modulus.\n    let mut cmp: u8 = 0;\n    for j in 0..32 {\n        let byte = bytes.get(offset + j);\n        field = field * 256 + byte as Field;\n\n        if cmp == 0 {\n            if byte < p[j] {\n                cmp = 1;\n            } else if byte > p[j] {\n                cmp = 2;\n            }\n        }\n    }\n    if cmp == 1 {\n        Option::some(field)\n    } else {\n        Option::none()\n    }\n}\n\n/// Non-panicking version of `fields_from_bytes`. Returns `Option::none()` if the input\n/// length is not a multiple of 32 or if any 32-byte chunk exceeds the field modulus.\npub(crate) fn try_fields_from_bytes<let N: u32>(bytes: BoundedVec<u8, N>) -> Option<BoundedVec<Field, N / 32>> {\n    if bytes.len() % 32 == 0 {\n        let mut fields = BoundedVec::new();\n        let num_chunks = bytes.len() / 32;\n        for i in 0..num_chunks {\n            let field = try_field_from_be_bytes(bytes, i * 32);\n            if field.is_some() {\n                fields.push(field.unwrap());\n            }\n        }\n        if fields.len() as u32 == num_chunks {\n            Option::some(fields)\n        } else {\n            Option::none()\n        }\n    } else {\n        Option::none()\n    }\n}\n\nmod tests {\n    use crate::utils::array::subarray;\n    use super::{fields_from_bytes, fields_to_bytes, try_fields_from_bytes};\n\n    #[test]\n    unconstrained fn random_fields_to_bytes_and_back(input: [Field; 3]) {\n        // Convert to bytes\n        let bytes = fields_to_bytes(input);\n\n        // At this point in production, the log flies through the system and we get a BoundedVec on the other end. So\n        // we need to convert the field array to a BoundedVec to be able to feed it to the `fields_from_bytes`\n        // function. 113 is an arbitrary max length that is larger than the input length of 96.\n        let bytes_as_bounded_vec = BoundedVec::<_, 113>::from_array(bytes);\n\n        // Convert back to fields\n        let fields_back = fields_from_bytes(bytes_as_bounded_vec);\n\n        // Compare the original input with the round-tripped result\n        assert_eq(fields_back.len(), input.len());\n        assert_eq(subarray(fields_back.storage(), 0), input);\n    }\n\n    #[test(should_fail_with = \"Input length must be a multiple of 32\")]\n    unconstrained fn to_fields_assert() {\n        // 143 is an arbitrary max length that is larger than 33\n        let input = BoundedVec::<_, 143>::from_array([\n            1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29,\n            30, 31, 32, 33,\n        ]);\n\n        // This should fail since 33 is not a multiple of 32\n        let _fields = fields_from_bytes(input);\n    }\n\n    #[test]\n    unconstrained fn fields_from_bytes_max_value() {\n        let max_field_as_bytes: [u8; 32] = (-1).to_be_bytes();\n        let input = BoundedVec::<_, 32>::from_array(max_field_as_bytes);\n\n        let fields = fields_from_bytes(input);\n\n        // The result should be a largest value storable in a field (-1 since we are modulo-ing)\n        assert_eq(fields.get(0), -1);\n    }\n\n    // In this test we verify that overflow check works by taking the max allowed value, bumping a random byte and then\n    // feeding it to `fields_from_bytes` as input.\n    #[test(should_fail_with = \"Value does not fit in field\")]\n    unconstrained fn fields_from_bytes_overflow(random_value: u8) {\n        let index_of_byte_to_bump = random_value % 32;\n\n        // Obtain the byte representation of the maximum field value\n        let max_field_value_as_bytes: [u8; 32] = (-1).to_be_bytes();\n\n        let byte_to_bump = max_field_value_as_bytes[index_of_byte_to_bump as u32];\n\n        // Skip test execution if the selected byte is already at maximum value (255). This is acceptable since we are\n        // using fuzz testing to generate many test cases.\n        if byte_to_bump != 255 {\n            let mut input = BoundedVec::<_, 32>::from_array(max_field_value_as_bytes);\n\n            // Increment the selected byte to exceed the field's maximum value\n            input.set(index_of_byte_to_bump as u32, byte_to_bump + 1);\n\n            // Attempt the conversion, which should fail due to the value exceeding the field's capacity\n            let _fields = fields_from_bytes(input);\n        }\n    }\n\n    #[test]\n    unconstrained fn try_fields_from_bytes_returns_none_on_unaligned_length() {\n        let input = BoundedVec::<_, 64>::from_parts([0 as u8; 64], 33);\n        assert(try_fields_from_bytes(input).is_none());\n    }\n\n    #[test]\n    unconstrained fn try_fields_from_bytes_returns_none_on_field_modulus() {\n        // The field modulus itself is not a valid field value (it wraps to 0).\n        let p: [u8; 32] = std::field::modulus_be_bytes().as_array();\n        let input = BoundedVec::<u8, 32>::from_array(p);\n        assert(try_fields_from_bytes(input).is_none());\n    }\n\n    #[test]\n    unconstrained fn try_fields_from_bytes_round_trips(input: [Field; 3]) {\n        let bytes = BoundedVec::<_, 113>::from_array(fields_to_bytes(input));\n        let fields = try_fields_from_bytes(bytes).unwrap();\n\n        assert_eq(fields.len(), input.len());\n        assert_eq(subarray(fields.storage(), 0), input);\n    }\n}\n"
        },
        "272": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/aztec/src/utils/point.nr",
            "source": "use crate::protocol::{point::Point, utils::field::sqrt};\n\n// I am storing the modulus minus 1 divided by 2 here because full modulus would throw \"String literal too large\" error\n// Full modulus is 21888242871839275222246405745257275088548364400416034343698204186575808495617\nglobal BN254_FR_MODULUS_DIV_2: Field = 10944121435919637611123202872628637544274182200208017171849102093287904247808;\n\n/// Returns: true if p.y <= MOD_DIV_2, else false.\npub fn get_sign_of_point(p: Point) -> bool {\n    // We store only a \"sign\" of the y coordinate because the rest can be derived from the x coordinate. To get the\n    // sign we check if the y coordinate is less or equal than the field's modulus minus 1 divided by 2. Ideally we'd\n    // do `y <= MOD_DIV_2`, but there's no `lte` function, so instead we do `!(y > MOD_DIV_2)`, which is equivalent,\n    // and then rewrite that as `!(MOD_DIV_2 < y)`, since we also have no `gt` function.\n    !BN254_FR_MODULUS_DIV_2.lt(p.y)\n}\n\n/// Returns a `Point` in the Grumpkin curve given its x coordinate.\n///\n/// Because not all values in the field are valid x coordinates of points in the curve (i.e. there is no corresponding\n/// y value in the field that satisfies the curve equation), it may not be possible to reconstruct a `Point`.\n/// `Option::none()` is returned in such cases.\npub fn point_from_x_coord(x: Field) -> Option<Point> {\n    // y ^ 2 = x ^ 3 - 17\n    let rhs = x * x * x - 17;\n    sqrt(rhs).map(|y| Point { x, y, is_infinite: false })\n}\n\n/// Returns a `Point` in the Grumpkin curve given its x coordinate and sign for the y coordinate.\n///\n/// Because not all values in the field are valid x coordinates of points in the curve (i.e. there is no corresponding\n/// y value in the field that satisfies the curve equation), it may not be possible to reconstruct a `Point`.\n/// `Option::none()` is returned in such cases.\n///\n/// @param x - The x coordinate of the point @param sign - The \"sign\" of the y coordinate - determines whether y <=\n/// (Fr.MODULUS - 1) / 2\npub fn point_from_x_coord_and_sign(x: Field, sign: bool) -> Option<Point> {\n    // y ^ 2 = x ^ 3 - 17\n    let rhs = x * x * x - 17;\n\n    sqrt(rhs).map(|y| {\n        // If there is a square root, we need to ensure it has the correct \"sign\"\n        let y_is_positive = !BN254_FR_MODULUS_DIV_2.lt(y);\n        let final_y = if y_is_positive == sign { y } else { -y };\n        Point { x, y: final_y, is_infinite: false }\n    })\n}\n\nmod test {\n    use crate::protocol::point::Point;\n    use crate::utils::point::{\n        BN254_FR_MODULUS_DIV_2, get_sign_of_point, point_from_x_coord, point_from_x_coord_and_sign,\n    };\n\n    #[test]\n    unconstrained fn test_point_from_x_coord_and_sign() {\n        // Test positive y coordinate\n        let x = 0x1af41f5de96446dc3776a1eb2d98bb956b7acd9979a67854bec6fa7c2973bd73;\n        let sign = true;\n        let p = point_from_x_coord_and_sign(x, sign).unwrap();\n\n        assert_eq(p.x, x);\n        assert_eq(p.y, 0x07fc22c7f2c7057571f137fe46ea9c95114282bc95d37d71ec4bfb88de457d4a);\n        assert_eq(p.is_infinite, false);\n\n        // Test negative y coordinate\n        let x2 = 0x247371652e55dd74c9af8dbe9fb44931ba29a9229994384bd7077796c14ee2b5;\n        let sign2 = false;\n        let p2 = point_from_x_coord_and_sign(x2, sign2).unwrap();\n\n        assert_eq(p2.x, x2);\n        assert_eq(p2.y, 0x26441aec112e1ae4cee374f42556932001507ad46e255ffb27369c7e3766e5c0);\n        assert_eq(p2.is_infinite, false);\n    }\n\n    #[test]\n    unconstrained fn test_point_from_x_coord_valid() {\n        // x = 8 is a known quadratic residue - should give a valid point\n        let result = point_from_x_coord(Field::from(8));\n        assert(result.is_some());\n\n        let point = result.unwrap();\n        assert_eq(point.x, Field::from(8));\n        // Check curve equation y^2 = x^3 - 17\n        assert_eq(point.y * point.y, point.x * point.x * point.x - 17);\n    }\n\n    #[test]\n    unconstrained fn test_point_from_x_coord_invalid() {\n        // x = 3 is a non-residue for this curve - should give None\n        let x = Field::from(3);\n        let maybe_point = point_from_x_coord(x);\n        assert(maybe_point.is_none());\n    }\n\n    #[test]\n    unconstrained fn test_both_roots_satisfy_curve() {\n        // Derive a point from x = 8 (known to be valid from test_point_from_x_coord_valid)\n        let x: Field = 8;\n        let point = point_from_x_coord(x).unwrap();\n\n        // Check y satisfies curve equation\n        assert_eq(point.y * point.y, x * x * x - 17);\n\n        // Check -y also satisfies curve equation\n        let neg_y = 0 - point.y;\n        assert_eq(neg_y * neg_y, x * x * x - 17);\n\n        // Verify they are different (unless y = 0)\n        assert(point.y != neg_y);\n    }\n\n    #[test]\n    unconstrained fn test_point_from_x_coord_and_sign_invalid() {\n        // x = 3 has no valid point on the curve (from test_point_from_x_coord_invalid)\n        let x = Field::from(3);\n        let result_positive = point_from_x_coord_and_sign(x, true);\n        let result_negative = point_from_x_coord_and_sign(x, false);\n\n        assert(result_positive.is_none());\n        assert(result_negative.is_none());\n    }\n\n    #[test]\n    unconstrained fn test_get_sign_of_point() {\n        // Derive a point from x = 8, then test both possible y values\n        let point = point_from_x_coord(8).unwrap();\n        let neg_point = Point { x: point.x, y: 0 - point.y, is_infinite: false };\n\n        // One should be \"positive\" (y <= MOD_DIV_2) and one \"negative\"\n        let sign1 = get_sign_of_point(point);\n        let sign2 = get_sign_of_point(neg_point);\n        assert(sign1 != sign2);\n\n        // y = 0 should return true (0 <= MOD_DIV_2)\n        let zero_y_point = Point { x: 0, y: 0, is_infinite: false };\n        assert(get_sign_of_point(zero_y_point) == true);\n\n        // y = MOD_DIV_2 should return true (exactly at boundary)\n        let boundary_point = Point { x: 0, y: BN254_FR_MODULUS_DIV_2, is_infinite: false };\n        assert(get_sign_of_point(boundary_point) == true);\n\n        // y = MOD_DIV_2 + 1 should return false (just over boundary)\n        let over_boundary_point = Point { x: 0, y: BN254_FR_MODULUS_DIV_2 + 1, is_infinite: false };\n        assert(get_sign_of_point(over_boundary_point) == false);\n    }\n\n    #[test]\n    unconstrained fn test_point_from_x_coord_zero() {\n        // x = 0: y^2 = 0^3 - 17 = -17, which is not a quadratic residue in BN254 scalar field\n        let result = point_from_x_coord(0);\n        assert(result.is_none());\n    }\n\n    #[test]\n    unconstrained fn test_bn254_fr_modulus_div_2() {\n        // Verify that BN254_FR_MODULUS_DIV_2 == (p - 1) / 2 This means: 2 * BN254_FR_MODULUS_DIV_2 + 1 == p == 0 (in\n        // the field)\n        assert_eq(2 * BN254_FR_MODULUS_DIV_2 + 1, 0);\n    }\n\n}\n"
        },
        "282": {
            "path": "/home/runner/nargo/github.com/noir-lang/poseidon/v0.2.3/src/poseidon2.nr",
            "source": "use std::default::Default;\nuse std::hash::Hasher;\n\ncomptime global RATE: u32 = 3;\n\npub struct Poseidon2 {\n    cache: [Field; 3],\n    state: [Field; 4],\n    cache_size: u32,\n    squeeze_mode: bool, // 0 => absorb, 1 => squeeze\n}\n\nimpl Poseidon2 {\n    #[no_predicates]\n    pub fn hash<let N: u32>(input: [Field; N], message_size: u32) -> Field {\n        Poseidon2::hash_internal(input, message_size)\n    }\n\n    pub(crate) fn new(iv: Field) -> Poseidon2 {\n        let mut result =\n            Poseidon2 { cache: [0; 3], state: [0; 4], cache_size: 0, squeeze_mode: false };\n        result.state[RATE] = iv;\n        result\n    }\n\n    fn perform_duplex(&mut self) {\n        // add the cache into sponge state\n        self.state[0] += self.cache[0];\n        self.state[1] += self.cache[1];\n        self.state[2] += self.cache[2];\n        self.state = crate::poseidon2_permutation(self.state, 4);\n    }\n\n    fn absorb(&mut self, input: Field) {\n        assert(!self.squeeze_mode);\n        if self.cache_size == RATE {\n            // If we're absorbing, and the cache is full, apply the sponge permutation to compress the cache\n            self.perform_duplex();\n            self.cache[0] = input;\n            self.cache_size = 1;\n        } else {\n            // If we're absorbing, and the cache is not full, add the input into the cache\n            self.cache[self.cache_size] = input;\n            self.cache_size += 1;\n        }\n    }\n\n    fn squeeze(&mut self) -> Field {\n        assert(!self.squeeze_mode);\n        // If we're in absorb mode, apply sponge permutation to compress the cache.\n        self.perform_duplex();\n        self.squeeze_mode = true;\n\n        // Pop one item off the top of the permutation and return it.\n        self.state[0]\n    }\n\n    fn hash_internal<let N: u32>(input: [Field; N], in_len: u32) -> Field {\n        let two_pow_64 = 18446744073709551616;\n        let iv: Field = (in_len as Field) * two_pow_64;\n        let mut state = [0; 4];\n        state[RATE] = iv;\n\n        if std::runtime::is_unconstrained() {\n            for i in 0..(in_len / RATE) {\n                state[0] += input[i * RATE];\n                state[1] += input[i * RATE + 1];\n                state[2] += input[i * RATE + 2];\n                state = crate::poseidon2_permutation(state, 4);\n            }\n\n            // handle remaining elements after last full RATE-sized chunk\n            let num_extra_fields = in_len % RATE;\n            if num_extra_fields != 0 {\n                let remainder_start = in_len - num_extra_fields;\n                state[0] += input[remainder_start];\n                if num_extra_fields > 1 {\n                    state[1] += input[remainder_start + 1]\n                }\n            }\n        } else {\n            let mut states: [[Field; 4]; N / RATE + 1] = [[0; 4]; N / RATE + 1];\n            states[0] = state;\n\n            // process all full RATE-sized chunks, storing state after each permutation\n            for chunk_idx in 0..(N / RATE) {\n                for i in 0..RATE {\n                    state[i] += input[chunk_idx * RATE + i];\n                }\n                state = crate::poseidon2_permutation(state, 4);\n                states[chunk_idx + 1] = state;\n            }\n\n            // get state at the last full block before in_len\n            let first_partially_filled_chunk = in_len / RATE;\n            state = states[first_partially_filled_chunk];\n\n            // handle remaining elements after last full RATE-sized chunk\n            let remainder_start = (in_len / RATE) * RATE;\n            for j in 0..RATE {\n                let idx = remainder_start + j;\n                if idx < in_len {\n                    state[j] += input[idx];\n                }\n            }\n        }\n\n        // always run final permutation unless we just completed a full chunk\n        // still need to permute once if in_len is 0\n        if (in_len == 0) | (in_len % RATE != 0) {\n            state = crate::poseidon2_permutation(state, 4)\n        };\n\n        state[0]\n    }\n}\n\npub struct Poseidon2Hasher {\n    _state: [Field],\n}\n\nimpl Hasher for Poseidon2Hasher {\n    fn finish(self) -> Field {\n        let iv: Field = (self._state.len() as Field) * 18446744073709551616; // iv = (self._state.len() << 64)\n        let mut sponge = Poseidon2::new(iv);\n        for i in 0..self._state.len() {\n            sponge.absorb(self._state[i]);\n        }\n        sponge.squeeze()\n    }\n\n    fn write(&mut self, input: Field) {\n        self._state = self._state.push_back(input);\n    }\n}\n\nimpl Default for Poseidon2Hasher {\n    fn default() -> Self {\n        Poseidon2Hasher { _state: &[] }\n    }\n}\n"
        },
        "302": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/noir-protocol-circuits/crates/types/src/abis/function_selector.nr",
            "source": "use crate::traits::{Deserialize, Empty, FromField, Serialize, ToField};\nuse std::meta::derive;\n\n#[derive(Deserialize, Eq, Serialize)]\npub struct FunctionSelector {\n    // 1st 4-bytes (big-endian leftmost) of abi-encoding of an event.\n    pub inner: u32,\n}\n\nimpl FromField for FunctionSelector {\n    fn from_field(field: Field) -> Self {\n        Self { inner: field as u32 }\n    }\n}\n\nimpl ToField for FunctionSelector {\n    fn to_field(self) -> Field {\n        self.inner as Field\n    }\n}\n\nimpl Empty for FunctionSelector {\n    fn empty() -> Self {\n        Self { inner: 0 as u32 }\n    }\n}\n\nimpl FunctionSelector {\n    pub fn from_u32(value: u32) -> Self {\n        Self { inner: value }\n    }\n\n    pub fn from_signature<let N: u32>(signature: str<N>) -> Self {\n        let bytes = signature.as_bytes();\n        let hash = crate::hash::poseidon2_hash_bytes(bytes);\n\n        // `hash` is automatically truncated to fit within 32 bits.\n        FunctionSelector::from_field(hash)\n    }\n\n    pub fn zero() -> Self {\n        Self { inner: 0 }\n    }\n}\n\n#[test]\nfn test_is_valid_selector() {\n    let selector = FunctionSelector::from_signature(\"IS_VALID()\");\n    assert_eq(selector.to_field(), 0x73cdda47);\n}\n\n#[test]\nfn test_long_selector() {\n    let selector =\n        FunctionSelector::from_signature(\"foo_and_bar_and_baz_and_foo_bar_baz_and_bar_foo\");\n    assert_eq(selector.to_field(), 0x7590a997);\n}\n"
        },
        "340": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/noir-protocol-circuits/crates/types/src/address/aztec_address.nr",
            "source": "use crate::{\n    address::{\n        partial_address::PartialAddress, salted_initialization_hash::SaltedInitializationHash,\n    },\n    constants::{AZTEC_ADDRESS_LENGTH, DOM_SEP__CONTRACT_ADDRESS_V1, MAX_FIELD_VALUE},\n    contract_class_id::ContractClassId,\n    hash::poseidon2_hash_with_separator,\n    public_keys::{IvpkM, NpkM, OvpkM, PublicKeys, ToPoint, TpkM},\n    traits::{Deserialize, Empty, FromField, Packable, Serialize, ToField},\n    utils::field::sqrt,\n};\n\n// We do below because `use crate::point::Point;` does not work\nuse std::embedded_curve_ops::EmbeddedCurvePoint as Point;\n\nuse crate::public_keys::AddressPoint;\nuse std::{\n    embedded_curve_ops::{EmbeddedCurveScalar, fixed_base_scalar_mul as derive_public_key},\n    ops::Add,\n};\nuse std::meta::derive;\n\n// Aztec address\n#[derive(Deserialize, Eq, Packable, Serialize)]\npub struct AztecAddress {\n    pub inner: Field,\n}\n\nimpl Empty for AztecAddress {\n    fn empty() -> Self {\n        Self { inner: 0 }\n    }\n}\n\nimpl ToField for AztecAddress {\n    fn to_field(self) -> Field {\n        self.inner\n    }\n}\n\nimpl FromField for AztecAddress {\n    fn from_field(value: Field) -> AztecAddress {\n        AztecAddress { inner: value }\n    }\n}\n\nimpl AztecAddress {\n    pub fn zero() -> Self {\n        Self { inner: 0 }\n    }\n\n    /// Returns `true` if the address is valid.\n    ///\n    /// An invalid address is one that can be proven to not be correctly derived, meaning it contains no contract code,\n    /// public keys, etc., and can therefore not receive messages nor execute calls.\n    pub fn is_valid(self) -> bool {\n        self.get_y().is_some()\n    }\n\n    /// Returns an address's [`AddressPoint`].\n    ///\n    /// This can be used to create shared secrets with the owner of the address. If the address is invalid (see\n    /// [`AztecAddress::is_valid`]) then this returns `Option::none()`, and no shared secrets can be created.\n    pub fn to_address_point(self) -> Option<AddressPoint> {\n        self.get_y().map(|y| {\n            // If we get a negative y coordinate (y > (r - 1) / 2), we swap it to the\n            // positive one (where y <= (r - 1) / 2) by negating it.\n            let final_y = if Self::is_positive(y) { y } else { -y };\n\n            AddressPoint { inner: Point { x: self.inner, y: final_y, is_infinite: false } }\n        })\n    }\n\n    /// Determines whether a y-coordinate is in the lower (positive) or upper (negative) \"half\" of the field.\n    /// I.e.\n    /// y <= (r - 1)/2 => positive.\n    /// y > (r - 1)/2 => negative.\n    /// An AddressPoint always uses the \"positive\" y.\n    fn is_positive(y: Field) -> bool {\n        // Note: The field modulus r is MAX_FIELD_VALUE + 1.\n        let MID = MAX_FIELD_VALUE / 2; // (r - 1) / 2\n        let MID_PLUS_1 = MID + 1; // (r - 1)/2 + 1\n        // Note: y <= m implies y < m + 1.\n        y.lt(MID_PLUS_1)\n    }\n\n    /// Returns one of the two possible y-coordinates.\n    ///\n    /// Not all `AztecAddresses` are valid, in which case there is no corresponding y-coordinate. This returns\n    /// `Option::none()` for invalid addresses.\n    ///\n    /// An `AztecAddress` is defined by an x-coordinate, for which two y-coordinates exist as solutions to the curve\n    /// equation. This function returns either of them. Note that an [`AddressPoint`] must **always** have a positive\n    /// y-coordinate - if trying to obtain the underlying point use [`AztecAddress::to_address_point`] instead.\n    fn get_y(self) -> Option<Field> {\n        // We compute the address point by taking our address as x, and then solving for y in the\n        // equation which defines the grumpkin curve:\n        // y^2 = x^3 - 17; x = address\n        let x = self.inner;\n        let y_squared = x * x * x - 17;\n\n        sqrt(y_squared)\n    }\n\n    pub fn compute(public_keys: PublicKeys, partial_address: PartialAddress) -> AztecAddress {\n        //\n        //                          address = address_point.x\n        //                                          |\n        //                                    address_point = pre_address * G + Ivpk_m (always choose \"positive\" y-coord)\n        //                                                        |               ^\n        //                                                        |               |.....................\n        //                                                    pre_address                              .\n        //                                               /                   \\                         .\n        //                                             /                       \\                       .\n        //                               partial_address                        public_keys_hash       .\n        //                           /                    \\                     /   /    \\    \\        .\n        //                         /                        \\              Npk_m Ivpk_m Ovpk_m Tpk_m   .\n        //          contract_class_id                         \\                     |...................\n        //             /   |    \\                               \\\n        // artifact_hash   |    public_bytecode_commitment       salted_initialization_hash\n        //                 |                                         /     /        \\\n        //     private_function_tree_root              deployer_address  salt   initialization_hash\n        //             /       \\                                                /              \\\n        //          ...          ...                              constructor_fn_selector   constructor_args_hash\n        //         /                \\\n        //     /     \\            /      \\\n        //   leaf   leaf        leaf    leaf\n        //           ^\n        //           |\n        //           |---h(function_selector, vk_hash)\n        //               ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^\n        //               Each of these represents a private function of the contract.\n\n        let public_keys_hash = public_keys.hash();\n\n        let pre_address = poseidon2_hash_with_separator(\n            [public_keys_hash.to_field(), partial_address.to_field()],\n            DOM_SEP__CONTRACT_ADDRESS_V1,\n        );\n\n        // Note: `.add()` will fail within the blackbox fn if either of the points are not on the curve. (See tests below).\n        let address_point = derive_public_key(EmbeddedCurveScalar::from_field(pre_address)).add(\n            public_keys.ivpk_m.to_point(),\n        );\n\n        // Note that our address is only the x-coordinate of the full address_point. This is okay because when people want to encrypt something and send it to us\n        // they can recover our full point using the x-coordinate (our address itself). To do this, they recompute the y-coordinate according to the equation y^2 = x^3 - 17.\n        // When they do this, they may get a positive y-coordinate (a value that is less than or equal to MAX_FIELD_VALUE / 2) or\n        // a negative y-coordinate (a value that is more than MAX_FIELD_VALUE), and we cannot dictate which one they get and hence the recovered point may sometimes be different than the one\n        // our secret can decrypt. Regardless though, they should and will always encrypt using point with the positive y-coordinate by convention.\n        // This ensures that everyone encrypts to the same point given an arbitrary x-coordinate (address). This is allowed because even though our original point may not have a positive y-coordinate,\n        // with our original secret, we will be able to derive the secret to the point with the flipped (and now positive) y-coordinate that everyone encrypts to.\n        AztecAddress::from_field(address_point.x)\n    }\n\n    pub fn compute_from_class_id(\n        contract_class_id: ContractClassId,\n        salted_initialization_hash: SaltedInitializationHash,\n        public_keys: PublicKeys,\n    ) -> Self {\n        let partial_address = PartialAddress::compute_from_salted_initialization_hash(\n            contract_class_id,\n            salted_initialization_hash,\n        );\n\n        AztecAddress::compute(public_keys, partial_address)\n    }\n\n    pub fn is_zero(self) -> bool {\n        self.inner == 0\n    }\n\n    pub fn assert_is_zero(self) {\n        assert(self.to_field() == 0);\n    }\n}\n\n#[test]\nfn check_max_field_value() {\n    // Check that it is indeed r-1.\n    assert_eq(MAX_FIELD_VALUE + 1, 0);\n}\n\n#[test]\nfn check_is_positive() {\n    assert(AztecAddress::is_positive(0));\n    assert(AztecAddress::is_positive(1));\n    assert(!AztecAddress::is_positive(-1));\n    assert(AztecAddress::is_positive(MAX_FIELD_VALUE / 2));\n    assert(!AztecAddress::is_positive((MAX_FIELD_VALUE / 2) + 1));\n}\n\n// Gives us confidence that we don't need to manually check that the input public keys need to be on the curve for `add`,\n// because the blackbox function does this check for us.\n#[test(should_fail_with = \"is not on curve\")]\nfn check_embedded_curve_point_add() {\n    // Choose a point not on the curve:\n    let p1 = Point { x: 1, y: 1, is_infinite: false };\n    let p2 = Point::generator();\n    let _ = p1 + p2;\n}\n\n// Gives us confidence that we don't need to manually check that the input public keys need to be on the curve for `add`,\n// because the blackbox function does this check for us.\n#[test(should_fail_with = \"is not on curve\")]\nfn check_embedded_curve_point_add_2() {\n    // Choose a point not on the curve in the 2nd position.\n    let p1 = Point::generator();\n    let p2 = Point { x: 1, y: 1, is_infinite: false };\n    let _ = p1 + p2;\n}\n\n#[test]\nfn compute_address_from_partial_and_pub_keys() {\n    let public_keys = PublicKeys {\n        npk_m: NpkM {\n            inner: Point {\n                x: 0x22f7fcddfa3ce3e8f0cc8e82d7b94cdd740afa3e77f8e4a63ea78a239432dcab,\n                y: 0x0471657de2b6216ade6c506d28fbc22ba8b8ed95c871ad9f3e3984e90d9723a7,\n                is_infinite: false,\n            },\n        },\n        ivpk_m: IvpkM {\n            inner: Point {\n                x: 0x111223493147f6785514b1c195bb37a2589f22a6596d30bb2bb145fdc9ca8f1e,\n                y: 0x273bbffd678edce8fe30e0deafc4f66d58357c06fd4a820285294b9746c3be95,\n                is_infinite: false,\n            },\n        },\n        ovpk_m: OvpkM {\n            inner: Point {\n                x: 0x09115c96e962322ffed6522f57194627136b8d03ac7469109707f5e44190c484,\n                y: 0x0c49773308a13d740a7f0d4f0e6163b02c5a408b6f965856b6a491002d073d5b,\n                is_infinite: false,\n            },\n        },\n        tpk_m: TpkM {\n            inner: Point {\n                x: 0x00d3d81beb009873eb7116327cf47c612d5758ef083d4fda78e9b63980b2a762,\n                y: 0x2f567d22d2b02fe1f4ad42db9d58a36afd1983e7e2909d1cab61cafedad6193a,\n                is_infinite: false,\n            },\n        },\n    };\n\n    let partial_address = PartialAddress::from_field(\n        0x0a7c585381b10f4666044266a02405bf6e01fa564c8517d4ad5823493abd31de,\n    );\n\n    let address = AztecAddress::compute(public_keys, partial_address);\n\n    // The following value was generated by `derivation.test.ts`.\n    // --> Run the test with AZTEC_GENERATE_TEST_DATA=1 flag to update test data.\n    let expected_computed_address_from_partial_and_pubkeys =\n        0x2f66081d4bb077fbe8e8abe96a3516a713a3d7e34360b4e985da0da95092b37d;\n    assert(address.to_field() == expected_computed_address_from_partial_and_pubkeys);\n}\n\n#[test]\nfn compute_preaddress_from_partial_and_pub_keys() {\n    let pre_address = poseidon2_hash_with_separator([1, 2], DOM_SEP__CONTRACT_ADDRESS_V1);\n    let expected_computed_preaddress_from_partial_and_pubkey =\n        0x286c7755f2924b1e53b00bcaf1adaffe7287bd74bba7a02f4ab867e3892d28da;\n    assert(pre_address == expected_computed_preaddress_from_partial_and_pubkey);\n}\n\n#[test]\nfn from_field_to_field() {\n    let address = AztecAddress { inner: 37 };\n    assert_eq(FromField::from_field(address.to_field()), address);\n}\n\n#[test]\nfn serde() {\n    let address = AztecAddress { inner: 37 };\n    // We use the AZTEC_ADDRESS_LENGTH constant to ensure that there is a match between the derived trait\n    // implementation and the constant.\n    let serialized: [Field; AZTEC_ADDRESS_LENGTH] = address.serialize();\n    let deserialized = AztecAddress::deserialize(serialized);\n    assert_eq(address, deserialized);\n}\n\n#[test]\nfn to_address_point_valid() {\n    // x = 8 where x^3 - 17 = 512 - 17 = 495, which is a residue in this field\n    let address = AztecAddress { inner: 8 };\n\n    assert(address.get_y().is_some()); // We don't bother checking the result of get_y as it is only used internally\n    assert(address.is_valid());\n\n    let maybe_point = address.to_address_point();\n    assert(maybe_point.is_some());\n\n    let point = maybe_point.unwrap().inner;\n    // check that x is preserved\n    assert_eq(point.x, Field::from(8));\n\n    // check that the curve equation holds: y^2 == x^3 - 17\n    assert_eq(point.y * point.y, point.x * point.x * point.x - 17);\n}\n\n#[test]\nunconstrained fn to_address_point_invalid() {\n    // x = 3 where x^3 - 17 = 27 - 17 = 10, which is a non-residue in this field\n    let address = AztecAddress { inner: 3 };\n\n    assert(address.get_y().is_none());\n    assert(!address.is_valid());\n\n    assert(address.to_address_point().is_none());\n}\n"
        },
        "343": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/noir-protocol-circuits/crates/types/src/address/partial_address.nr",
            "source": "use crate::{\n    address::{aztec_address::AztecAddress, salted_initialization_hash::SaltedInitializationHash},\n    constants::DOM_SEP__PARTIAL_ADDRESS,\n    contract_class_id::ContractClassId,\n    hash::poseidon2_hash_with_separator,\n    traits::{Deserialize, Empty, Serialize, ToField},\n};\nuse std::meta::derive;\n\n// Partial address\n#[derive(Deserialize, Eq, Serialize)]\npub struct PartialAddress {\n    pub inner: Field,\n}\n\nimpl ToField for PartialAddress {\n    fn to_field(self) -> Field {\n        self.inner\n    }\n}\n\nimpl Empty for PartialAddress {\n    fn empty() -> Self {\n        Self { inner: 0 }\n    }\n}\n\nimpl PartialAddress {\n    pub fn from_field(field: Field) -> Self {\n        Self { inner: field }\n    }\n\n    pub fn compute(\n        contract_class_id: ContractClassId,\n        salt: Field,\n        initialization_hash: Field,\n        deployer: AztecAddress,\n    ) -> Self {\n        PartialAddress::compute_from_salted_initialization_hash(\n            contract_class_id,\n            SaltedInitializationHash::compute(salt, initialization_hash, deployer),\n        )\n    }\n\n    pub fn compute_from_salted_initialization_hash(\n        contract_class_id: ContractClassId,\n        salted_initialization_hash: SaltedInitializationHash,\n    ) -> Self {\n        PartialAddress::from_field(poseidon2_hash_with_separator(\n            [contract_class_id.to_field(), salted_initialization_hash.to_field()],\n            DOM_SEP__PARTIAL_ADDRESS,\n        ))\n    }\n\n    pub fn to_field(self) -> Field {\n        self.inner\n    }\n\n    pub fn is_zero(self) -> bool {\n        self.to_field() == 0\n    }\n\n    pub fn assert_is_zero(self) {\n        assert(self.to_field() == 0);\n    }\n}\n\nmod test {\n    use crate::{address::partial_address::PartialAddress, traits::{Deserialize, Serialize}};\n\n    #[test]\n    fn serialization_of_partial_address() {\n        let item = PartialAddress::from_field(1);\n        let serialized: [Field; 1] = item.serialize();\n        let deserialized = PartialAddress::deserialize(serialized);\n        assert_eq(item, deserialized);\n    }\n}\n"
        },
        "345": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/noir-protocol-circuits/crates/types/src/address/salted_initialization_hash.nr",
            "source": "use crate::{\n    address::aztec_address::AztecAddress, constants::DOM_SEP__PARTIAL_ADDRESS,\n    hash::poseidon2_hash_with_separator, traits::ToField,\n};\n\n// Salted initialization hash. Used in the computation of a partial address.\n#[derive(Eq)]\npub struct SaltedInitializationHash {\n    pub inner: Field,\n}\n\nimpl ToField for SaltedInitializationHash {\n    fn to_field(self) -> Field {\n        self.inner\n    }\n}\n\nimpl SaltedInitializationHash {\n    pub fn from_field(field: Field) -> Self {\n        Self { inner: field }\n    }\n\n    pub fn compute(salt: Field, initialization_hash: Field, deployer: AztecAddress) -> Self {\n        SaltedInitializationHash::from_field(poseidon2_hash_with_separator(\n            [salt, initialization_hash, deployer.to_field()],\n            DOM_SEP__PARTIAL_ADDRESS,\n        ))\n    }\n\n    pub fn assert_is_zero(self) {\n        assert(self.to_field() == 0);\n    }\n}\n"
        },
        "355": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/noir-protocol-circuits/crates/types/src/contract_instance.nr",
            "source": "use crate::{\n    address::{aztec_address::AztecAddress, partial_address::PartialAddress},\n    contract_class_id::ContractClassId,\n    public_keys::PublicKeys,\n    traits::{Deserialize, Hash, Serialize, ToField},\n};\nuse std::meta::derive;\n\n#[derive(Deserialize, Eq, Serialize)]\npub struct ContractInstance {\n    pub salt: Field,\n    pub deployer: AztecAddress,\n    pub contract_class_id: ContractClassId,\n    pub initialization_hash: Field,\n    pub public_keys: PublicKeys,\n}\n\nimpl Hash for ContractInstance {\n    fn hash(self) -> Field {\n        self.to_address().to_field()\n    }\n}\n\nimpl ContractInstance {\n    pub fn to_address(self) -> AztecAddress {\n        AztecAddress::compute(\n            self.public_keys,\n            PartialAddress::compute(\n                self.contract_class_id,\n                self.salt,\n                self.initialization_hash,\n                self.deployer,\n            ),\n        )\n    }\n}\n\nmod test {\n    use crate::{\n        address::AztecAddress,\n        constants::CONTRACT_INSTANCE_LENGTH,\n        contract_class_id::ContractClassId,\n        contract_instance::ContractInstance,\n        public_keys::PublicKeys,\n        traits::{Deserialize, FromField, Serialize},\n    };\n\n    #[test]\n    fn serde() {\n        let instance = ContractInstance {\n            salt: 6,\n            deployer: AztecAddress::from_field(12),\n            contract_class_id: ContractClassId::from_field(13),\n            initialization_hash: 156,\n            public_keys: PublicKeys::default(),\n        };\n\n        // We use the CONTRACT_INSTANCE_LENGTH constant to ensure that there is a match between the derived trait\n        // implementation and the constant.\n        let serialized: [Field; CONTRACT_INSTANCE_LENGTH] = instance.serialize();\n\n        let deserialized = ContractInstance::deserialize(serialized);\n\n        assert(instance.eq(deserialized));\n    }\n\n}\n"
        },
        "371": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/noir-protocol-circuits/crates/types/src/hash.nr",
            "source": "mod poseidon2_chunks;\n\nuse crate::{\n    abis::{\n        contract_class_function_leaf_preimage::ContractClassFunctionLeafPreimage,\n        function_selector::FunctionSelector, nullifier::Nullifier, private_log::PrivateLog,\n        transaction::tx_request::TxRequest,\n    },\n    address::{AztecAddress, EthAddress},\n    constants::{\n        CONTRACT_CLASS_LOG_SIZE_IN_FIELDS, DOM_SEP__NOTE_HASH_NONCE,\n        DOM_SEP__PRIVATE_LOG_FIRST_FIELD, DOM_SEP__SILOED_NOTE_HASH, DOM_SEP__SILOED_NULLIFIER,\n        DOM_SEP__UNIQUE_NOTE_HASH, FUNCTION_TREE_HEIGHT, NULL_MSG_SENDER_CONTRACT_ADDRESS,\n        TWO_POW_64,\n    },\n    merkle_tree::root_from_sibling_path,\n    messaging::l2_to_l1_message::L2ToL1Message,\n    poseidon2::Poseidon2Sponge,\n    side_effect::{Counted, Scoped},\n    traits::{FromField, Hash, ToField},\n    utils::field::{field_from_bytes, field_from_bytes_32_trunc},\n};\n\npub use poseidon2_chunks::poseidon2_absorb_in_chunks_existing_sponge;\nuse poseidon2_chunks::poseidon2_absorb_in_chunks;\nuse std::embedded_curve_ops::EmbeddedCurveScalar;\n\n// TODO: refactor these into their own files: sha256, poseidon2, some protocol-specific hash computations, some merkle computations.\n\npub fn sha256_to_field<let N: u32>(bytes_to_hash: [u8; N]) -> Field {\n    let sha256_hashed = sha256::digest(bytes_to_hash);\n    let hash_in_a_field = field_from_bytes_32_trunc(sha256_hashed);\n\n    hash_in_a_field\n}\n\npub fn private_functions_root_from_siblings(\n    selector: FunctionSelector,\n    vk_hash: Field,\n    function_leaf_index: Field,\n    function_leaf_sibling_path: [Field; FUNCTION_TREE_HEIGHT],\n) -> Field {\n    let function_leaf_preimage = ContractClassFunctionLeafPreimage { selector, vk_hash };\n    let function_leaf = function_leaf_preimage.hash();\n    root_from_sibling_path(\n        function_leaf,\n        function_leaf_index,\n        function_leaf_sibling_path,\n    )\n}\n\n/// Siloing in the context of Aztec refers to the process of hashing a note hash with a contract address (this way\n/// the note hash is scoped to a specific contract). This is used to prevent intermingling of notes between contracts.\npub fn compute_siloed_note_hash(contract_address: AztecAddress, note_hash: Field) -> Field {\n    poseidon2_hash_with_separator(\n        [contract_address.to_field(), note_hash],\n        DOM_SEP__SILOED_NOTE_HASH,\n    )\n}\n\n/// Computes unique, siloed note hashes from siloed note hashes.\n///\n/// The protocol injects uniqueness into every note_hash, so that every single note_hash in the\n/// tree is unique. This prevents faerie gold attacks, where a malicious sender could create\n/// two identical note_hashes for a recipient (meaning only one would be nullifiable in future).\n///\n/// Most privacy protocols will inject the note's leaf_index (its position in the Note Hashes Tree)\n/// into the note, but this requires the creator of a note to wait until their tx is included in\n/// a block to know the note's final note hash (the unique, siloed note hash), because inserting\n/// leaves into trees is the job of a block producer.\n///\n/// We took a different approach so that the creator of a note will know each note's unique, siloed\n/// note hash before broadcasting their tx to the network.\n/// (There was also a historical requirement relating to \"chained transactions\" -- a feature that\n/// Aztec Connect had to enable notes to be spent from distinct txs earlier in the same block,\n/// and hence before an archive block root had been established for that block -- but that feature\n/// was abandoned for the Aztec Network for having too many bad tradeoffs).\n///\n/// (\n///   Edit: it is no longer true that all final note_hashes will be known by the creator of a tx\n///   before they send it to the network. If a tx makes public function calls, then _revertible_\n///   note_hashes that are created in private will not be made unique in private by the Reset circuit,\n///   but will instead be made unique by the AVM, because the `note_index_in_tx` will not be known\n///   until the AVM has executed the public functions of the tx. (See an explanation in\n///   reset_output_composer.nr for why).\n///   For some such txs, the `note_index_in_tx` might still be predictable through simulation, but\n///   for txs whose public functions create a varying number of non-revertible notes (determined at\n///   runtime), the `note_index_in_tx` will not be deterministically derivable before submitting the\n///   tx to the network.\n/// )\n///\n/// We use the `first_nullifier` of a tx as a seed of uniqueness. We have a guarantee that there will\n/// always be at least one nullifier per tx, because the init circuit will create one if one isn't\n/// created naturally by any functions of the tx. (Search \"protocol_nullifier\").\n/// We combine the `first_nullifier` with the note's index (its position within this tx's new\n/// note_hashes array) (`note_index_in_tx`) to get a truly unique value to inject into a note, which\n/// we call a `note_nonce`.\npub fn compute_unique_note_hash(note_nonce: Field, siloed_note_hash: Field) -> Field {\n    let inputs = [note_nonce, siloed_note_hash];\n    poseidon2_hash_with_separator(inputs, DOM_SEP__UNIQUE_NOTE_HASH)\n}\n\npub fn compute_note_hash_nonce(first_nullifier_in_tx: Field, note_index_in_tx: u32) -> Field {\n    // Hashing the first nullifier with note index in tx is guaranteed to be unique (because all nullifiers are also\n    // unique).\n    poseidon2_hash_with_separator(\n        [first_nullifier_in_tx, note_index_in_tx as Field],\n        DOM_SEP__NOTE_HASH_NONCE,\n    )\n}\n\npub fn compute_note_nonce_and_unique_note_hash(\n    siloed_note_hash: Field,\n    first_nullifier: Field,\n    note_index_in_tx: u32,\n) -> Field {\n    let note_nonce = compute_note_hash_nonce(first_nullifier, note_index_in_tx);\n    compute_unique_note_hash(note_nonce, siloed_note_hash)\n}\n\npub fn compute_siloed_nullifier(contract_address: AztecAddress, nullifier: Field) -> Field {\n    poseidon2_hash_with_separator(\n        [contract_address.to_field(), nullifier],\n        DOM_SEP__SILOED_NULLIFIER,\n    )\n}\n\npub fn create_protocol_nullifier(tx_request: TxRequest) -> Scoped<Counted<Nullifier>> {\n    // The protocol nullifier is ascribed a special side-effect counter of 1. No other side-effect\n    // can have counter 1 (see `validate_as_first_call` for that assertion).\n    Nullifier { value: tx_request.hash(), note_hash: 0 }.count(1).scope(\n        NULL_MSG_SENDER_CONTRACT_ADDRESS,\n    )\n}\n\npub fn compute_log_tag(raw_tag: Field, dom_sep: u32) -> Field {\n    poseidon2_hash_with_separator([raw_tag], dom_sep)\n}\n\npub fn compute_siloed_private_log_first_field(\n    contract_address: AztecAddress,\n    field: Field,\n) -> Field {\n    poseidon2_hash_with_separator(\n        [contract_address.to_field(), field],\n        DOM_SEP__PRIVATE_LOG_FIRST_FIELD,\n    )\n}\n\npub fn compute_siloed_private_log(contract_address: AztecAddress, log: PrivateLog) -> PrivateLog {\n    let mut fields = log.fields;\n    fields[0] = compute_siloed_private_log_first_field(contract_address, fields[0]);\n    PrivateLog::new(fields, log.length)\n}\n\npub fn compute_contract_class_log_hash(log: [Field; CONTRACT_CLASS_LOG_SIZE_IN_FIELDS]) -> Field {\n    poseidon2_hash(log)\n}\n\npub fn compute_app_siloed_secret_key(\n    master_secret_key: EmbeddedCurveScalar,\n    app_address: AztecAddress,\n    key_type_domain_separator: Field,\n) -> Field {\n    poseidon2_hash_with_separator(\n        [master_secret_key.hi, master_secret_key.lo, app_address.to_field()],\n        key_type_domain_separator,\n    )\n}\n\npub fn compute_l2_to_l1_message_hash(\n    message: Scoped<L2ToL1Message>,\n    rollup_version_id: Field,\n    chain_id: Field,\n) -> Field {\n    let contract_address_bytes: [u8; 32] = message.contract_address.to_field().to_be_bytes();\n    let recipient_bytes: [u8; 20] = message.inner.recipient.to_be_bytes();\n    let content_bytes: [u8; 32] = message.inner.content.to_be_bytes();\n    let rollup_version_id_bytes: [u8; 32] = rollup_version_id.to_be_bytes();\n    let chain_id_bytes: [u8; 32] = chain_id.to_be_bytes();\n\n    let mut bytes: [u8; 148] = std::mem::zeroed();\n    for i in 0..32 {\n        bytes[i] = contract_address_bytes[i];\n        bytes[i + 32] = rollup_version_id_bytes[i];\n        // 64 - 84 are for recipient.\n        bytes[i + 84] = chain_id_bytes[i];\n        bytes[i + 116] = content_bytes[i];\n    }\n\n    for i in 0..20 {\n        bytes[64 + i] = recipient_bytes[i];\n    }\n\n    sha256_to_field(bytes)\n}\n\n// TODO: consider a variant that enables domain separation with a u32 (we seem to have standardised u32s for domain separators)\n/// Computes sha256 hash of 2 input fields.\n///\n/// @returns A truncated field (i.e., the first byte is always 0).\npub fn accumulate_sha256(v0: Field, v1: Field) -> Field {\n    // Concatenate two fields into 32 x 2 = 64 bytes\n    let v0_as_bytes: [u8; 32] = v0.to_be_bytes();\n    let v1_as_bytes: [u8; 32] = v1.to_be_bytes();\n    let hash_input_flattened = v0_as_bytes.concat(v1_as_bytes);\n\n    sha256_to_field(hash_input_flattened)\n}\n\npub fn poseidon2_hash<let N: u32>(inputs: [Field; N]) -> Field {\n    poseidon::poseidon2::Poseidon2::hash(inputs, N)\n}\n\n#[no_predicates]\npub fn poseidon2_hash_with_separator<let N: u32, T>(inputs: [Field; N], separator: T) -> Field\nwhere\n    T: ToField,\n{\n    let inputs_with_separator = [separator.to_field()].concat(inputs);\n    poseidon2_hash(inputs_with_separator)\n}\n\n/// Computes a Poseidon2 hash over a dynamic-length subarray of the given input.\n/// Only the first `in_len` fields of `input` are absorbed; any remaining fields are ignored.\n/// The caller is responsible for ensuring that the input is padded with zeros if required.\n#[no_predicates]\npub fn poseidon2_hash_subarray<let N: u32>(input: [Field; N], in_len: u32) -> Field {\n    let mut sponge = poseidon2_absorb_in_chunks(input, in_len);\n    sponge.squeeze()\n}\n\n// This function is  unconstrained because it is intended to be used in unconstrained context only as\n// in constrained contexts it would be too inefficient.\npub unconstrained fn poseidon2_hash_with_separator_bounded_vec<let N: u32, T>(\n    inputs: BoundedVec<Field, N>,\n    separator: T,\n) -> Field\nwhere\n    T: ToField,\n{\n    let in_len = inputs.len() + 1;\n    let iv: Field = (in_len as Field) * TWO_POW_64;\n    let mut sponge = Poseidon2Sponge::new(iv);\n    sponge.absorb(separator.to_field());\n\n    for i in 0..inputs.len() {\n        sponge.absorb(inputs.get(i));\n    }\n\n    sponge.squeeze()\n}\n\n#[no_predicates]\npub fn poseidon2_hash_bytes<let N: u32>(inputs: [u8; N]) -> Field {\n    let mut fields = [0; (N + 30) / 31];\n    let mut field_index = 0;\n    let mut current_field = [0; 31];\n    for i in 0..inputs.len() {\n        let index = i % 31;\n        current_field[index] = inputs[i];\n        if index == 30 {\n            fields[field_index] = field_from_bytes(current_field, false);\n            current_field = [0; 31];\n            field_index += 1;\n        }\n    }\n    if field_index != fields.len() {\n        fields[field_index] = field_from_bytes(current_field, false);\n    }\n    poseidon2_hash(fields)\n}\n\n#[test]\nfn subarray_hash_matches_fixed() {\n    let mut values_to_hash = [3; 17];\n    let mut padded = values_to_hash.concat([0; 11]);\n    let subarray_hash = poseidon2_hash_subarray(padded, values_to_hash.len());\n\n    // Hash the entire values_to_hash.\n    let fixed_len_hash = poseidon::poseidon2::Poseidon2::hash(values_to_hash, values_to_hash.len());\n\n    assert_eq(subarray_hash, fixed_len_hash);\n}\n\n#[test]\nfn subarray_hash_matches_variable() {\n    let mut values_to_hash = [3; 17];\n    let mut padded = values_to_hash.concat([0; 11]);\n    let subarray_hash = poseidon2_hash_subarray(padded, values_to_hash.len());\n\n    // Hash up to values_to_hash.len() fields of the padded array.\n    let variable_len_hash = poseidon::poseidon2::Poseidon2::hash(padded, values_to_hash.len());\n\n    assert_eq(subarray_hash, variable_len_hash);\n}\n\n#[test]\nfn smoke_sha256_to_field() {\n    let full_buffer = [\n        0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24,\n        25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47,\n        48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70,\n        71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93,\n        94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112,\n        113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130,\n        131, 132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145, 146, 147, 148,\n        149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159,\n    ];\n    let result = sha256_to_field(full_buffer);\n\n    assert(result == 0x448ebbc9e1a31220a2f3830c18eef61b9bd070e5084b7fa2a359fe729184c7);\n\n    // to show correctness of the current ver (truncate one byte) vs old ver (mod full bytes):\n    let result_bytes = sha256::digest(full_buffer);\n    let truncated_field = crate::utils::field::field_from_bytes_32_trunc(result_bytes);\n    assert(truncated_field == result);\n    let mod_res = result + (result_bytes[31] as Field);\n    assert(mod_res == 0x448ebbc9e1a31220a2f3830c18eef61b9bd070e5084b7fa2a359fe729184e0);\n}\n\n#[test]\nfn unique_siloed_note_hash_matches_typescript() {\n    let inner_note_hash = 1;\n    let contract_address = AztecAddress::from_field(2);\n    let first_nullifier = 3;\n    let note_index_in_tx = 4;\n\n    let siloed_note_hash = compute_siloed_note_hash(contract_address, inner_note_hash);\n    let siloed_note_hash_from_ts =\n        0x1986a4bea3eddb1fff917d629a13e10f63f514f401bdd61838c6b475db949169;\n    assert_eq(siloed_note_hash, siloed_note_hash_from_ts);\n\n    let nonce: Field = compute_note_hash_nonce(first_nullifier, note_index_in_tx);\n    let note_hash_nonce_from_ts =\n        0x28e7799791bf066a57bb51fdd0fbcaf3f0926414314c7db515ea343f44f5d58b;\n    assert_eq(nonce, note_hash_nonce_from_ts);\n\n    let unique_siloed_note_hash_from_nonce = compute_unique_note_hash(nonce, siloed_note_hash);\n    let unique_siloed_note_hash = compute_note_nonce_and_unique_note_hash(\n        siloed_note_hash,\n        first_nullifier,\n        note_index_in_tx,\n    );\n    assert_eq(unique_siloed_note_hash_from_nonce, unique_siloed_note_hash);\n\n    let unique_siloed_note_hash_from_ts =\n        0x29949aef207b715303b24639737c17fbfeb375c1d965ecfa85c7e4f0febb7d16;\n    assert_eq(unique_siloed_note_hash, unique_siloed_note_hash_from_ts);\n}\n\n#[test]\nfn siloed_nullifier_matches_typescript() {\n    let contract_address = AztecAddress::from_field(123);\n    let nullifier = 456;\n\n    let res = compute_siloed_nullifier(contract_address, nullifier);\n\n    let siloed_nullifier_from_ts =\n        0x169b50336c1f29afdb8a03d955a81e485f5ac7d5f0b8065673d1e407e5877813;\n\n    assert_eq(res, siloed_nullifier_from_ts);\n}\n\n#[test]\nfn siloed_private_log_first_field_matches_typescript() {\n    let contract_address = AztecAddress::from_field(123);\n    let field = 456;\n    let res = compute_siloed_private_log_first_field(contract_address, field);\n\n    let siloed_private_log_first_field_from_ts =\n        0x29480984f7b9257fded523d50addbcfc8d1d33adcf2db73ef3390a8fd5cdffaa;\n\n    assert_eq(res, siloed_private_log_first_field_from_ts);\n}\n\n#[test]\nfn empty_l2_to_l1_message_hash_matches_typescript() {\n    // All zeroes\n    let res = compute_l2_to_l1_message_hash(\n        L2ToL1Message { recipient: EthAddress::zero(), content: 0 }.scope(AztecAddress::from_field(\n            0,\n        )),\n        0,\n        0,\n    );\n\n    let empty_l2_to_l1_msg_hash_from_ts =\n        0x003b18c58c739716e76429634a61375c45b3b5cd470c22ab6d3e14cee23dd992;\n\n    assert_eq(res, empty_l2_to_l1_msg_hash_from_ts);\n}\n\n#[test]\nfn l2_to_l1_message_hash_matches_typescript() {\n    let message = L2ToL1Message { recipient: EthAddress::from_field(1), content: 2 }.scope(\n        AztecAddress::from_field(3),\n    );\n    let version = 4;\n    let chainId = 5;\n\n    let hash = compute_l2_to_l1_message_hash(message, version, chainId);\n\n    // The following value was generated by `yarn-project/stdlib/src/hash/hash.test.ts`\n    let l2_to_l1_message_hash_from_ts =\n        0x0081edf209e087ad31b3fd24263698723d57190bd1d6e9fe056fc0c0a68ee661;\n\n    assert_eq(hash, l2_to_l1_message_hash_from_ts);\n}\n\n#[test]\nunconstrained fn poseidon2_hash_with_separator_bounded_vec_matches_non_bounded_vec_version() {\n    let inputs = BoundedVec::<Field, 4>::from_array([1, 2, 3]);\n    let separator = 42;\n\n    // Hash using bounded vec version\n    let bounded_result = poseidon2_hash_with_separator_bounded_vec(inputs, separator);\n\n    // Hash using regular version\n    let regular_result = poseidon2_hash_with_separator([1, 2, 3], separator);\n\n    // Results should match\n    assert_eq(bounded_result, regular_result);\n}\n"
        },
        "373": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/noir-protocol-circuits/crates/types/src/logging.nr",
            "source": "// Log levels matching the JS logger:\n\n// global SILENT_LOG_LEVEL: u8 = 0;\nglobal FATAL_LOG_LEVEL: u8 = 1;\nglobal ERROR_LOG_LEVEL: u8 = 2;\nglobal WARN_LOG_LEVEL: u8 = 3;\nglobal INFO_LOG_LEVEL: u8 = 4;\nglobal VERBOSE_LOG_LEVEL: u8 = 5;\nglobal DEBUG_LOG_LEVEL: u8 = 6;\nglobal TRACE_LOG_LEVEL: u8 = 7;\n\n// --- Per-level log functions (no format args) ---\n\npub fn fatal_log<let N: u32>(msg: str<N>) {\n    fatal_log_format(msg, []);\n}\n\npub fn error_log<let N: u32>(msg: str<N>) {\n    error_log_format(msg, []);\n}\n\npub fn warn_log<let N: u32>(msg: str<N>) {\n    warn_log_format(msg, []);\n}\n\npub fn info_log<let N: u32>(msg: str<N>) {\n    info_log_format(msg, []);\n}\n\npub fn verbose_log<let N: u32>(msg: str<N>) {\n    verbose_log_format(msg, []);\n}\n\npub fn debug_log<let N: u32>(msg: str<N>) {\n    debug_log_format(msg, []);\n}\n\npub fn trace_log<let N: u32>(msg: str<N>) {\n    trace_log_format(msg, []);\n}\n\n// --- Per-level log functions (with format args) ---\n\npub fn fatal_log_format<let M: u32, let N: u32>(msg: str<M>, args: [Field; N]) {\n    log_format(FATAL_LOG_LEVEL, msg, args);\n}\n\npub fn error_log_format<let M: u32, let N: u32>(msg: str<M>, args: [Field; N]) {\n    log_format(ERROR_LOG_LEVEL, msg, args);\n}\n\npub fn warn_log_format<let M: u32, let N: u32>(msg: str<M>, args: [Field; N]) {\n    log_format(WARN_LOG_LEVEL, msg, args);\n}\n\npub fn info_log_format<let M: u32, let N: u32>(msg: str<M>, args: [Field; N]) {\n    log_format(INFO_LOG_LEVEL, msg, args);\n}\n\npub fn verbose_log_format<let M: u32, let N: u32>(msg: str<M>, args: [Field; N]) {\n    log_format(VERBOSE_LOG_LEVEL, msg, args);\n}\n\npub fn debug_log_format<let M: u32, let N: u32>(msg: str<M>, args: [Field; N]) {\n    log_format(DEBUG_LOG_LEVEL, msg, args);\n}\n\npub fn trace_log_format<let M: u32, let N: u32>(msg: str<M>, args: [Field; N]) {\n    log_format(TRACE_LOG_LEVEL, msg, args);\n}\n\nfn log_format<let M: u32, let N: u32>(log_level: u8, msg: str<M>, args: [Field; N]) {\n    // Safety: This oracle call returns nothing: we only call it for its side effects. It is therefore always safe\n    // to call.\n    unsafe { log_oracle_wrapper(log_level, msg, args) };\n}\n\nunconstrained fn log_oracle_wrapper<let M: u32, let N: u32>(\n    log_level: u8,\n    msg: str<M>,\n    args: [Field; N],\n) {\n    log_oracle(log_level, msg, N, args);\n}\n\n// While the length parameter might seem unnecessary given that we have N, we keep it around because at the AVM\n// bytecode level we want to support non-comptime-known lengths for such opcodes, even if Noir code will not generally\n// take that route. The AVM transpiler maps this oracle to the DEBUGLOG opcode, which reads the fields size from memory.\n#[oracle(aztec_utl_log)]\nunconstrained fn log_oracle<let M: u32, let N: u32>(\n    log_level: u8,\n    msg: str<M>,\n    length: u32,\n    args: [Field; N],\n) {}\n"
        },
        "389": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/noir-protocol-circuits/crates/types/src/meta/mod.nr",
            "source": "pub use serde::serialization::{derive_deserialize, derive_serialize};\n\npub mod utils;\n\n/// Generates the generic parameter declarations for a struct's trait implementation.\n///\n/// This function takes a struct type definition and generates the generic parameter declarations\n/// that go after the `impl` keyword. For example, given a struct with generics `N: u32` and `T`,\n/// it generates `<let N: u32, T>`.\n///\n/// # Parameters\n/// - `s`: The struct type definition to generate generic declarations for\n///\n/// # Returns\n/// A quoted code block containing the generic parameter declarations, or an empty quote if the struct\n/// has no generic parameters\n///\n/// # Example\n/// For a struct defined as:\n/// ```\n/// struct Container<T, let N: u32> {\n///     items: [T; N],\n///     count: u32\n/// }\n/// ```\n///\n/// This function generates:\n/// ```\n/// <let N: u32, T>\n/// ```\ncomptime fn get_generics_declarations(s: TypeDefinition) -> Quoted {\n    let generics = s.generics();\n\n    if generics.len() > 0 {\n        let generics_declarations_items = generics\n            .map(|(name, maybe_integer_typ)| {\n                // The second item in the generics tuple is an Option of an integer type that is Some only if\n                // the generic is numeric.\n                if maybe_integer_typ.is_some() {\n                    // The generic is numeric, so we return a quote defined as e.g. \"let N: u32\"\n                    let integer_type = maybe_integer_typ.unwrap();\n                    quote {let $name: $integer_type}\n                } else {\n                    // The generic is not numeric, so we return a quote containing the name of the generic (e.g. \"T\")\n                    quote {$name}\n                }\n            })\n            .join(quote {,});\n        quote {<$generics_declarations_items>}\n    } else {\n        // The struct doesn't have any generics defined, so we just return an empty quote.\n        quote {}\n    }\n}\n\n/// Generates the `where` clause for a trait implementation that constrains non-numeric generic type parameters.\n///\n/// This function takes a struct type definition and a trait name, and generates a `where` clause that\n/// requires all non-numeric generic type parameters to implement the specified trait.\n///\n/// # Parameters\n/// - `s`: The struct type definition to generate the where clause for\n/// - `trait_name`: The name of the trait that non-numeric generic parameters must implement\n///\n/// # Returns\n/// A quoted code block containing the where clause, or an empty quote if the struct has no non-numeric\n/// generic parameters\n///\n/// # Example\n/// For a struct defined as:\n/// ```\n/// struct Container<T, let N: u32> {\n///     items: [T; N],\n///     count: u32\n/// }\n/// ```\n///\n/// And trait name \"Serialize\", this function generates:\n/// ```\n/// where T: Serialize\n/// ```\ncomptime fn get_where_trait_clause(s: TypeDefinition, trait_name: Quoted) -> Quoted {\n    let generics = s.generics();\n\n    // The second item in the generics tuple is an Option of an integer type that is Some only if the generic is\n    // numeric.\n    let non_numeric_generics =\n        generics.filter(|(_, maybe_integer_typ)| maybe_integer_typ.is_none());\n\n    if non_numeric_generics.len() > 0 {\n        let non_numeric_generics_declarations =\n            non_numeric_generics.map(|(name, _)| quote {$name: $trait_name}).join(quote {,});\n        quote {where $non_numeric_generics_declarations}\n    } else {\n        // There are no non-numeric generics, so we return an empty quote.\n        quote {}\n    }\n}\n\n/// Generates a [`Packable`](crate::traits::Packable) trait implementation for a given struct `s`.\n///\n/// # Arguments\n/// * `s` - The struct type definition to generate the implementation for\n///\n/// # Returns\n/// A `Quoted` block containing the generated trait implementation\n///\n/// # Requirements\n/// Each struct member type must implement the `Packable` trait (it gets used in the generated code).\n///\n/// # Example\n/// For a struct like:\n/// ```\n/// struct MyStruct {\n///     x: AztecAddress,\n///     y: Field,\n/// }\n/// ```\n///\n/// This generates:\n/// ```\n/// impl Packable for MyStruct {\n///     let N: u32 = 2;\n///\n///     fn pack(self) -> [Field; 2] {\n///         let mut result: [Field; 2] = [0_Field; 2];\n///         let mut offset: u32 = 0_u32;\n///         let packed_member: [Field; 1] = self.x.pack();\n///         let packed_member_len: u32 = <Field as Packable>::N;\n///         for i in 0_u32..packed_member_len {\n///             {\n///                 result[i + offset] = packed_member[i];\n///             }\n///         }\n///         offset = offset + packed_member_len;\n///         let packed_member: [Field; 1] = self.y.pack();\n///         let packed_member_len: u32 = <Field as Packable>::N;\n///         for i in 0_u32..packed_member_len {\n///             {\n///                 result[i + offset] = packed_member[i];\n///             }\n///         }\n///         offset = offset + packed_member_len;\n///         result\n///     }\n///\n///     fn unpack(packed: [Field; 2]) -> Self {\n///         let mut offset: u32 = 0_u32;\n///         let mut member_fields: [Field; 1] = [0_Field; 1];\n///         for i in 0_u32..<AztecAddress as Packable>::N {\n///             member_fields[i] = packed[i + offset];\n///         }\n///         let x: AztecAddress = <AztecAddress as Packable>::unpack(member_fields);\n///         offset = offset + <AztecAddress as Packable>::N;\n///         let mut member_fields: [Field; 1] = [0_Field; 1];\n///         for i in 0_u32..<Field as Packable>::N {\n///             member_fields[i] = packed[i + offset];\n///         }\n///         let y: Field = <Field as Packable>::unpack(member_fields);\n///         offset = offset + <Field as Packable>::N;\n///         Self { x: x, y: y }\n///     }\n/// }\n/// ```\npub comptime fn derive_packable(s: TypeDefinition) -> Quoted {\n    let typ = s.as_type();\n    let nested_struct = typ.as_data_type().unwrap();\n    let params = nested_struct.0.fields(nested_struct.1);\n\n    // Generates the generic parameter declarations (to be placed after the `impl` keyword) and the `where` clause\n    // for the `Packable` trait.\n    let generics_declarations = get_generics_declarations(s);\n    let where_packable_clause = get_where_trait_clause(s, quote {Packable});\n\n    // The following will give us:\n    // <type_of_struct_member_1 as Packable>::N + <type_of_struct_member_2 as Packable>::N + ...\n    // (or 0 if the struct has no members)\n    let right_hand_side_of_definition_of_n = if params.len() > 0 {\n        params\n            .map(|(_, param_type, _): (Quoted, Type, Quoted)| {\n                quote {\n            <$param_type as $crate::traits::Packable>::N\n        }\n            })\n            .join(quote {+})\n    } else {\n        quote {0}\n    };\n\n    // For structs containing a single member, we can enhance performance by directly returning the packed member,\n    // bypassing the need for loop-based array construction. While this optimization yields significant benefits in\n    // Brillig where the loops are expected to not be optimized, it is not relevant in ACIR where the loops are\n    // expected to be optimized away.\n    let pack_function_body = if params.len() > 1 {\n        // For multiple struct members, generate packing code that:\n        // 1. Packs each member\n        // 2. Copies the packed fields into the result array at the correct offset\n        // 3. Updates the offset for the next member\n        let packing_of_struct_members = params\n            .map(|(param_name, param_type, _): (Quoted, Type, Quoted)| {\n                quote {\n                    let packed_member = $crate::traits::Packable::pack(self.$param_name);\n                    let packed_member_len = <$param_type as $crate::traits::Packable>::N;\n                    for i in 0..packed_member_len {\n                        result[i + offset] = packed_member[i];\n                    }\n                    offset += packed_member_len;\n                }\n            })\n            .join(quote {});\n\n        quote {\n            let mut result = [0; Self::N];\n            let mut offset = 0;\n\n            $packing_of_struct_members\n\n            result\n        }\n    } else if params.len() == 1 {\n        let param_name = params[0].0;\n        quote {\n            $crate::traits::Packable::pack(self.$param_name)\n        }\n    } else {\n        quote {\n            [0; Self::N]\n        }\n    };\n\n    // For structs containing a single member, we can enhance performance by directly unpacking the input array,\n    // bypassing the need for loop-based array construction. While this optimization yields significant benefits in\n    // Brillig where the loops are expected to not be optimized, it is not relevant in ACIR where the loops are\n    // expected to be optimized away.\n    let unpack_function_body = if params.len() > 1 {\n        // For multiple struct members, generate unpacking code that:\n        // 1. Unpacks each member\n        // 2. Copies packed fields into member array at correct offset\n        // 3. Updates offset for next member\n        let unpacking_of_struct_members = params\n            .map(|(param_name, param_type, _): (Quoted, Type, Quoted)| {\n                quote {\n                    let mut member_fields = [0; <$param_type as $crate::traits::Packable>::N];\n                    for i in 0..<$param_type as $crate::traits::Packable>::N {\n                        member_fields[i] = packed[i + offset];\n                    }\n                    let $param_name = <$param_type as $crate::traits::Packable>::unpack(member_fields);\n                    offset += <$param_type as $crate::traits::Packable>::N;\n                }\n            })\n            .join(quote {});\n\n        // We join the struct member names with a comma to be used in the `Self { ... }` syntax\n        let struct_members = params\n            .map(|(param_name, _, _): (Quoted, Type, Quoted)| quote { $param_name })\n            .join(quote {,});\n\n        quote {\n            let mut offset = 0;\n            $unpacking_of_struct_members\n            Self { $struct_members }\n        }\n    } else if params.len() == 1 {\n        let param_name = params[0].0;\n        quote {\n            Self { $param_name: $crate::traits::Packable::unpack(packed) }\n        }\n    } else {\n        quote {\n            Self {}\n        }\n    };\n\n    quote {\n        impl$generics_declarations $crate::traits::Packable for $typ\n            $where_packable_clause\n        {\n            let N: u32 = $right_hand_side_of_definition_of_n;\n\n            #[inline_always]\n            fn pack(self) -> [Field; Self::N] {\n                $pack_function_body\n            }\n\n            #[inline_always]\n            fn unpack(packed: [Field; Self::N]) -> Self {\n                $unpack_function_body\n            }\n        }\n    }\n}\n\nmod test {\n    use crate::traits::{Deserialize, Packable, Serialize};\n\n    #[derive(Deserialize, Eq, Packable, Serialize)]\n    pub struct Empty {}\n\n    #[derive(Deserialize, Eq, Packable, Serialize)]\n    pub struct Smol {\n        a: Field,\n        b: Field,\n    }\n\n    #[derive(Deserialize, Eq, Serialize)]\n    pub struct HasArray {\n        a: [Field; 2],\n        b: bool,\n    }\n\n    #[derive(Deserialize, Eq, Serialize)]\n    pub struct Fancier {\n        a: Smol,\n        b: [Field; 2],\n        c: [u8; 3],\n        d: str<16>,\n    }\n\n    #[derive(Deserialize, Eq, Packable, Serialize)]\n    pub struct HasArrayWithGenerics<T, let N: u32> {\n        pub fields: [T; N],\n        pub length: u32,\n    }\n\n    #[test]\n    fn packable_on_empty() {\n        let original = Empty {};\n        let packed = original.pack();\n        assert_eq(packed, [], \"Packed does not match empty array\");\n        let unpacked = Empty::unpack(packed);\n        assert_eq(unpacked, original, \"Unpacked does not match original\");\n    }\n\n    #[test]\n    fn packable_on_smol() {\n        let smol = Smol { a: 1, b: 2 };\n        let serialized = smol.serialize();\n        assert(serialized == [1, 2], serialized);\n\n        // None of the struct members implements the `Packable` trait so the packed and serialized data should be the same\n        let packed = smol.pack();\n        assert_eq(packed, serialized, \"Packed does not match serialized\");\n    }\n\n    #[test]\n    fn packable_on_contains_array_with_generics() {\n        let struct_with_array_of_generics = HasArrayWithGenerics { fields: [1, 2, 3], length: 3 };\n        let packed = struct_with_array_of_generics.pack();\n        assert(packed == [1, 2, 3, 3], packed);\n\n        let unpacked = HasArrayWithGenerics::unpack(packed);\n        assert(unpacked == struct_with_array_of_generics);\n    }\n\n}\n"
        },
        "390": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/noir-protocol-circuits/crates/types/src/meta/utils.nr",
            "source": "/// Generates serialization code for a list of parameters and the total length of the serialized array\n///\n/// # Parameters\n/// - `params`: A list of (name, type) tuples to serialize\n/// - `use_self_prefix`: If true, parameters are accessed as `self.$param_name` (for struct members).\n///                      If false, parameters are accessed directly as `$param_name` (for function parameters).\n///\n/// # Returns\n/// A tuple containing:\n/// - Quoted code that serializes the parameters into an array named `serialized_params`\n/// - Quoted code that evaluates to the total length of the serialized array\n/// - Quoted code containing the name of the serialized array\npub comptime fn derive_serialization_quotes(\n    params: [(Quoted, Type)],\n    use_self_prefix: bool,\n) -> (Quoted, Quoted, Quoted) {\n    let prefix_quote = if use_self_prefix {\n        quote { self. }\n    } else {\n        quote {}\n    };\n\n    let params_len_quote = get_params_len_quote(params);\n    let serialized_params_name = quote { serialized_params };\n\n    let body = if params.len() == 0 {\n        quote {\n            let $serialized_params_name: [Field; 0] = [];\n        }\n    } else if params.len() == 1 {\n        // When we have only a single parameter on the input, we can enhance performance by directly returning\n        // the serialized member, bypassing the need for loop-based array construction. While this optimization yields\n        // significant benefits in Brillig where the loops are expected to not be optimized, it is not relevant in ACIR\n        // where the loops are expected to be optimized away.\n\n        let param_name = params[0].0;\n        quote {\n            let $serialized_params_name = $crate::traits::Serialize::serialize($prefix_quote$param_name);\n        }\n    } else {\n        // For multiple struct members, generate serialization code that:\n        // 1. Serializes each member\n        // 2. Copies the serialized fields into the serialize array at the correct offset\n        // 3. Updates the offset for the next member\n        let serialization_of_struct_members = params\n            .map(|(param_name, param_type): (Quoted, Type)| {\n                quote {\n                let serialized_member = $crate::traits::Serialize::serialize($prefix_quote$param_name);\n                let serialized_member_len = <$param_type as $crate::traits::Serialize>::N;\n                for i in 0..serialized_member_len {\n                    $serialized_params_name[i + offset] = serialized_member[i];\n                }\n                offset += serialized_member_len;\n            }\n            })\n            .join(quote {});\n\n        quote {\n            let mut $serialized_params_name = [0; $params_len_quote];\n            let mut offset = 0;\n\n            $serialization_of_struct_members\n        }\n    };\n\n    (body, params_len_quote, serialized_params_name)\n}\n\n/// Generates a quoted expression that computes the total serialized length of function parameters.\n///\n/// # Parameters\n/// * `params` - An array of tuples where each tuple contains a quoted parameter name and its Type. The type needs\n///              to implement the Serialize trait.\n///\n/// # Returns\n/// A quoted expression that evaluates to:\n/// * `0` if there are no parameters\n/// * `(<type1 as Serialize>::N + <type2 as Serialize>::N + ...)` for one or more parameters\npub comptime fn get_params_len_quote(params: [(Quoted, Type)]) -> Quoted {\n    if params.len() == 0 {\n        quote { 0 }\n    } else {\n        let params_quote_without_parentheses = params\n            .map(|(_, param_type): (Quoted, Type)| {\n                quote {\n                    <$param_type as $crate::traits::Serialize>::N\n                }\n            })\n            .join(quote {+});\n        quote { ($params_quote_without_parentheses) }\n    }\n}\n"
        },
        "391": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/noir-protocol-circuits/crates/types/src/point.nr",
            "source": "pub use std::embedded_curve_ops::EmbeddedCurvePoint as Point;\nuse crate::{hash::poseidon2_hash, traits::{Deserialize, Empty, Hash, Packable, Serialize}};\n\npub global POINT_LENGTH: u32 = 3;\n\nimpl Hash for Point {\n    fn hash(self) -> Field {\n        poseidon2_hash(self.serialize())\n    }\n}\n\nimpl Empty for Point {\n    /// Note: Does not return a valid point on curve - instead represents an empty/\"unpopulated\" point struct (e.g.\n    /// empty/unpopulated value in an array of points).\n    fn empty() -> Self {\n        Point { x: 0, y: 0, is_infinite: false }\n    }\n}\n\npub fn validate_on_curve(p: Point) {\n    // y^2 == x^3 - 17\n    let x = p.x;\n    let y = p.y;\n    if p.is_infinite {\n        // Assert the canonical representation of infinity\n        assert_eq(x, 0, \"Point at infinity should have canonical representation (0 0)\");\n        assert_eq(y, 0, \"Point at infinity should have canonical representation (0 0)\");\n    } else {\n        assert_eq(y * y, x * x * x - 17, \"Point not on curve\");\n    }\n}\n\n// TODO(#11356): use compact representation here.\nimpl Packable for Point {\n    let N: u32 = POINT_LENGTH;\n\n    fn pack(self) -> [Field; Self::N] {\n        self.serialize()\n    }\n\n    fn unpack(packed: [Field; Self::N]) -> Self {\n        Self::deserialize(packed)\n    }\n}\n\nmod tests {\n    use super::validate_on_curve;\n    use std::embedded_curve_ops::EmbeddedCurvePoint as Point;\n\n    #[test]\n    unconstrained fn test_validate_on_curve_generator() {\n        // The generator point should be on the curve\n        let generator = Point::generator();\n        validate_on_curve(generator);\n    }\n\n    #[test]\n    unconstrained fn test_validate_on_curve_infinity() {\n        // Canonical infinite point (x=0, y=0) should pass\n        let infinity = Point { x: 0, y: 0, is_infinite: true };\n        validate_on_curve(infinity);\n    }\n\n    #[test(should_fail_with = \"Point not on curve\")]\n    unconstrained fn test_validate_on_curve_invalid_point() {\n        // A point not on the curve should fail\n        let invalid = Point { x: 1, y: 1, is_infinite: false };\n        validate_on_curve(invalid);\n    }\n\n    #[test(should_fail_with = \"Point at infinity should have canonical representation (0 0)\")]\n    unconstrained fn test_validate_on_curve_infinity_non_canonical_x() {\n        // Infinite point with non-zero x should fail\n        let invalid_infinity = Point { x: 1, y: 0, is_infinite: true };\n        validate_on_curve(invalid_infinity);\n    }\n\n    #[test(should_fail_with = \"Point at infinity should have canonical representation (0 0)\")]\n    unconstrained fn test_validate_on_curve_infinity_non_canonical_y() {\n        // Infinite point with non-zero y should fail\n        let invalid_infinity = Point { x: 0, y: 1, is_infinite: true };\n        validate_on_curve(invalid_infinity);\n    }\n}\n"
        },
        "392": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/noir-protocol-circuits/crates/types/src/poseidon2.nr",
            "source": "use crate::constants::TWO_POW_64;\nuse crate::traits::{Deserialize, Serialize};\nuse std::meta::derive;\n// NB: This is a clone of noir/noir-repo/noir_stdlib/src/hash/poseidon2.nr\n// It exists as we sometimes need to perform custom absorption, but the stdlib version\n// has a private absorb() method (it's also designed to just be a hasher)\n// Can be removed when standalone noir poseidon lib exists: See noir#6679\n\ncomptime global RATE: u32 = 3;\n\n#[derive(Deserialize, Eq, Serialize)]\npub struct Poseidon2Sponge {\n    pub cache: [Field; 3],\n    pub state: [Field; 4],\n    pub cache_size: u32,\n    pub squeeze_mode: bool, // 0 => absorb, 1 => squeeze\n}\n\nimpl Poseidon2Sponge {\n    #[no_predicates]\n    pub fn hash<let N: u32>(input: [Field; N], message_size: u32) -> Field {\n        Poseidon2Sponge::hash_internal(input, message_size, message_size != N)\n    }\n\n    pub(crate) fn new(iv: Field) -> Poseidon2Sponge {\n        let mut result =\n            Poseidon2Sponge { cache: [0; 3], state: [0; 4], cache_size: 0, squeeze_mode: false };\n        result.state[RATE] = iv;\n        result\n    }\n\n    fn perform_duplex(&mut self) {\n        // add the cache into sponge state\n        for i in 0..RATE {\n            // We effectively zero-pad the cache by only adding to the state\n            // cache that is less than the specified `cache_size`\n            if i < self.cache_size {\n                self.state[i] += self.cache[i];\n            }\n        }\n        self.state = std::hash::poseidon2_permutation(self.state, 4);\n    }\n\n    pub fn absorb(&mut self, input: Field) {\n        assert(!self.squeeze_mode);\n        if self.cache_size == RATE {\n            // If we're absorbing, and the cache is full, apply the sponge permutation to compress the cache\n            self.perform_duplex();\n            self.cache[0] = input;\n            self.cache_size = 1;\n        } else {\n            // If we're absorbing, and the cache is not full, add the input into the cache\n            self.cache[self.cache_size] = input;\n            self.cache_size += 1;\n        }\n    }\n\n    pub fn squeeze(&mut self) -> Field {\n        assert(!self.squeeze_mode);\n        // If we're in absorb mode, apply sponge permutation to compress the cache.\n        self.perform_duplex();\n        self.squeeze_mode = true;\n\n        // Pop one item off the top of the permutation and return it.\n        self.state[0]\n    }\n\n    fn hash_internal<let N: u32>(\n        input: [Field; N],\n        in_len: u32,\n        is_variable_length: bool,\n    ) -> Field {\n        let iv: Field = (in_len as Field) * TWO_POW_64;\n        let mut sponge = Poseidon2Sponge::new(iv);\n        for i in 0..input.len() {\n            if i < in_len {\n                sponge.absorb(input[i]);\n            }\n        }\n\n        sponge.squeeze()\n    }\n}\n"
        },
        "399": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/noir-protocol-circuits/crates/types/src/public_keys.nr",
            "source": "use crate::{\n    address::public_keys_hash::PublicKeysHash,\n    constants::{\n        DEFAULT_IVPK_M_X, DEFAULT_IVPK_M_Y, DEFAULT_NPK_M_X, DEFAULT_NPK_M_Y, DEFAULT_OVPK_M_X,\n        DEFAULT_OVPK_M_Y, DEFAULT_TPK_M_X, DEFAULT_TPK_M_Y, DOM_SEP__PUBLIC_KEYS_HASH,\n    },\n    hash::poseidon2_hash_with_separator,\n    point::validate_on_curve,\n    traits::{Deserialize, Hash, Serialize},\n};\n\nuse std::{default::Default, meta::derive};\nuse std::embedded_curve_ops::EmbeddedCurvePoint as Point;\n\npub trait ToPoint {\n    fn to_point(self) -> Point;\n}\n\n#[derive(Deserialize, Eq, Serialize)]\npub struct NpkM {\n    pub inner: Point,\n}\n\nimpl ToPoint for NpkM {\n    fn to_point(self) -> Point {\n        self.inner\n    }\n}\n\n// Note: If we store npk_m_hash directly we can remove this trait implementation. See #8091\nimpl Hash for NpkM {\n    fn hash(self) -> Field {\n        self.inner.hash()\n    }\n}\n\n#[derive(Deserialize, Eq, Serialize)]\npub struct IvpkM {\n    pub inner: Point,\n}\n\nimpl ToPoint for IvpkM {\n    fn to_point(self) -> Point {\n        self.inner\n    }\n}\n\n#[derive(Deserialize, Eq, Serialize)]\npub struct OvpkM {\n    pub inner: Point,\n}\n\nimpl Hash for OvpkM {\n    fn hash(self) -> Field {\n        self.inner.hash()\n    }\n}\n\nimpl ToPoint for OvpkM {\n    fn to_point(self) -> Point {\n        self.inner\n    }\n}\n\n#[derive(Deserialize, Eq, Serialize)]\npub struct TpkM {\n    pub inner: Point,\n}\n\nimpl ToPoint for TpkM {\n    fn to_point(self) -> Point {\n        self.inner\n    }\n}\n\n#[derive(Deserialize, Eq, Serialize)]\npub struct PublicKeys {\n    pub npk_m: NpkM,\n    pub ivpk_m: IvpkM,\n    pub ovpk_m: OvpkM,\n    pub tpk_m: TpkM,\n}\n\nimpl Default for PublicKeys {\n    fn default() -> Self {\n        PublicKeys {\n            npk_m: NpkM {\n                inner: Point { x: DEFAULT_NPK_M_X, y: DEFAULT_NPK_M_Y, is_infinite: false },\n            },\n            ivpk_m: IvpkM {\n                inner: Point { x: DEFAULT_IVPK_M_X, y: DEFAULT_IVPK_M_Y, is_infinite: false },\n            },\n            ovpk_m: OvpkM {\n                inner: Point { x: DEFAULT_OVPK_M_X, y: DEFAULT_OVPK_M_Y, is_infinite: false },\n            },\n            tpk_m: TpkM {\n                inner: Point { x: DEFAULT_TPK_M_X, y: DEFAULT_TPK_M_Y, is_infinite: false },\n            },\n        }\n    }\n}\n\nimpl PublicKeys {\n    pub fn hash(self) -> PublicKeysHash {\n        PublicKeysHash::from_field(poseidon2_hash_with_separator(\n            self.serialize(),\n            DOM_SEP__PUBLIC_KEYS_HASH as Field,\n        ))\n    }\n\n    pub fn validate_on_curve(self) {\n        validate_on_curve(self.npk_m.inner);\n        validate_on_curve(self.ivpk_m.inner);\n        validate_on_curve(self.ovpk_m.inner);\n        validate_on_curve(self.tpk_m.inner);\n    }\n}\n\npub struct AddressPoint {\n    pub inner: Point,\n}\n\nimpl ToPoint for AddressPoint {\n    fn to_point(self) -> Point {\n        self.inner\n    }\n}\n\nmod test {\n    use crate::{\n        point::POINT_LENGTH,\n        public_keys::{IvpkM, NpkM, OvpkM, PublicKeys, TpkM},\n        traits::{Deserialize, Serialize},\n    };\n    use std::embedded_curve_ops::EmbeddedCurvePoint as Point;\n\n    #[test]\n    unconstrained fn compute_public_keys_hash() {\n        let keys = PublicKeys {\n            npk_m: NpkM { inner: Point { x: 1, y: 2, is_infinite: false } },\n            ivpk_m: IvpkM { inner: Point { x: 3, y: 4, is_infinite: false } },\n            ovpk_m: OvpkM { inner: Point { x: 5, y: 6, is_infinite: false } },\n            tpk_m: TpkM { inner: Point { x: 7, y: 8, is_infinite: false } },\n        };\n\n        let actual = keys.hash();\n\n        // The following value was generated by `public_keys.test.ts`.\n        let expected_public_keys_hash =\n            0x056998309f6c119e4d753e404f94fef859dddfa530a9379634ceb0854b29bf7a;\n\n        assert(actual.to_field() == expected_public_keys_hash);\n    }\n\n    #[test]\n    unconstrained fn compute_default_hash() {\n        let keys = PublicKeys::default();\n\n        let actual = keys.hash();\n\n        // The following value was generated by `public_keys.test.ts`.\n        let test_data_default_hash =\n            0x023547e676dba19784188825b901a0e70d8ad978300d21d6185a54281b734da0;\n\n        assert(actual.to_field() == test_data_default_hash);\n    }\n\n    #[test]\n    unconstrained fn serde() {\n        let keys = PublicKeys {\n            npk_m: NpkM { inner: Point { x: 1, y: 2, is_infinite: false } },\n            ivpk_m: IvpkM { inner: Point { x: 3, y: 4, is_infinite: false } },\n            ovpk_m: OvpkM { inner: Point { x: 5, y: 6, is_infinite: false } },\n            tpk_m: TpkM { inner: Point { x: 7, y: 8, is_infinite: false } },\n        };\n\n        // We use the PUBLIC_KEYS_LENGTH constant to ensure that there is a match between the derived trait\n        let serialized: [Field; POINT_LENGTH * 4] = keys.serialize();\n        let deserialized = PublicKeys::deserialize(serialized);\n\n        assert_eq(keys, deserialized);\n    }\n}\n"
        },
        "411": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/noir-protocol-circuits/crates/types/src/traits/to_field.nr",
            "source": "use crate::utils::field::field_from_bytes;\n\npub trait ToField {\n    fn to_field(self) -> Field;\n}\n\nimpl ToField for Field {\n    #[inline_always]\n    fn to_field(self) -> Field {\n        self\n    }\n}\n\nimpl ToField for bool {\n    #[inline_always]\n    fn to_field(self) -> Field {\n        self as Field\n    }\n}\nimpl ToField for u1 {\n    #[inline_always]\n    fn to_field(self) -> Field {\n        self as Field\n    }\n}\nimpl ToField for u8 {\n    #[inline_always]\n    fn to_field(self) -> Field {\n        self as Field\n    }\n}\nimpl ToField for u16 {\n    fn to_field(self) -> Field {\n        self as Field\n    }\n}\nimpl ToField for u32 {\n    #[inline_always]\n    fn to_field(self) -> Field {\n        self as Field\n    }\n}\nimpl ToField for u64 {\n    #[inline_always]\n    fn to_field(self) -> Field {\n        self as Field\n    }\n}\nimpl ToField for u128 {\n    #[inline_always]\n    fn to_field(self) -> Field {\n        self as Field\n    }\n}\nimpl<let N: u32> ToField for str<N> {\n    #[inline_always]\n    fn to_field(self) -> Field {\n        assert(N < 32, \"String doesn't fit in a field, consider using Serialize instead\");\n        field_from_bytes(self.as_bytes(), true)\n    }\n}\n"
        },
        "412": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/noir-protocol-circuits/crates/types/src/type_packing.nr",
            "source": "use crate::traits::Packable;\n\nglobal BOOL_PACKED_LEN: u32 = 1;\nglobal U8_PACKED_LEN: u32 = 1;\nglobal U16_PACKED_LEN: u32 = 1;\nglobal U32_PACKED_LEN: u32 = 1;\nglobal U64_PACKED_LEN: u32 = 1;\nglobal U128_PACKED_LEN: u32 = 1;\nglobal FIELD_PACKED_LEN: u32 = 1;\nglobal I8_PACKED_LEN: u32 = 1;\nglobal I16_PACKED_LEN: u32 = 1;\nglobal I32_PACKED_LEN: u32 = 1;\nglobal I64_PACKED_LEN: u32 = 1;\n\nimpl Packable for bool {\n    let N: u32 = BOOL_PACKED_LEN;\n\n    #[inline_always]\n    fn pack(self) -> [Field; Self::N] {\n        [self as Field]\n    }\n\n    #[inline_always]\n    fn unpack(fields: [Field; Self::N]) -> bool {\n        (fields[0] as u1) != 0\n    }\n}\n\nimpl Packable for u8 {\n    let N: u32 = U8_PACKED_LEN;\n\n    #[inline_always]\n    fn pack(self) -> [Field; Self::N] {\n        [self as Field]\n    }\n\n    #[inline_always]\n    fn unpack(fields: [Field; Self::N]) -> Self {\n        fields[0] as u8\n    }\n}\n\nimpl Packable for u16 {\n    let N: u32 = U16_PACKED_LEN;\n\n    #[inline_always]\n    fn pack(self) -> [Field; Self::N] {\n        [self as Field]\n    }\n\n    #[inline_always]\n    fn unpack(fields: [Field; Self::N]) -> Self {\n        fields[0] as u16\n    }\n}\n\nimpl Packable for u32 {\n    let N: u32 = U32_PACKED_LEN;\n\n    #[inline_always]\n    fn pack(self) -> [Field; Self::N] {\n        [self as Field]\n    }\n\n    #[inline_always]\n    fn unpack(fields: [Field; Self::N]) -> Self {\n        fields[0] as u32\n    }\n}\n\nimpl Packable for u64 {\n    let N: u32 = U64_PACKED_LEN;\n\n    #[inline_always]\n    fn pack(self) -> [Field; Self::N] {\n        [self as Field]\n    }\n\n    #[inline_always]\n    fn unpack(fields: [Field; Self::N]) -> Self {\n        fields[0] as u64\n    }\n}\n\nimpl Packable for u128 {\n    let N: u32 = U128_PACKED_LEN;\n\n    #[inline_always]\n    fn pack(self) -> [Field; Self::N] {\n        [self as Field]\n    }\n\n    #[inline_always]\n    fn unpack(fields: [Field; Self::N]) -> Self {\n        fields[0] as u128\n    }\n}\n\nimpl Packable for Field {\n    let N: u32 = FIELD_PACKED_LEN;\n\n    #[inline_always]\n    fn pack(self) -> [Field; Self::N] {\n        [self]\n    }\n\n    #[inline_always]\n    fn unpack(fields: [Field; Self::N]) -> Self {\n        fields[0]\n    }\n}\n\nimpl Packable for i8 {\n    let N: u32 = I8_PACKED_LEN;\n\n    #[inline_always]\n    fn pack(self) -> [Field; Self::N] {\n        [self as u8 as Field]\n    }\n\n    #[inline_always]\n    fn unpack(fields: [Field; Self::N]) -> Self {\n        fields[0] as u8 as i8\n    }\n}\n\nimpl Packable for i16 {\n    let N: u32 = I16_PACKED_LEN;\n\n    #[inline_always]\n    fn pack(self) -> [Field; Self::N] {\n        [self as u16 as Field]\n    }\n\n    #[inline_always]\n    fn unpack(fields: [Field; Self::N]) -> Self {\n        fields[0] as u16 as i16\n    }\n}\n\nimpl Packable for i32 {\n    let N: u32 = I32_PACKED_LEN;\n\n    #[inline_always]\n    fn pack(self) -> [Field; Self::N] {\n        [self as u32 as Field]\n    }\n\n    #[inline_always]\n    fn unpack(fields: [Field; Self::N]) -> Self {\n        fields[0] as u32 as i32\n    }\n}\n\nimpl Packable for i64 {\n    let N: u32 = I64_PACKED_LEN;\n\n    #[inline_always]\n    fn pack(self) -> [Field; Self::N] {\n        [self as u64 as Field]\n    }\n\n    #[inline_always]\n    fn unpack(fields: [Field; Self::N]) -> Self {\n        fields[0] as u64 as i64\n    }\n}\n\nimpl<T, let M: u32> Packable for [T; M]\nwhere\n    T: Packable,\n{\n    let N: u32 = M * <T as Packable>::N;\n\n    #[inline_always]\n    fn pack(self) -> [Field; Self::N] {\n        let mut result: [Field; Self::N] = std::mem::zeroed();\n        for i in 0..M {\n            let serialized = self[i].pack();\n            for j in 0..<T as Packable>::N {\n                result[i * <T as Packable>::N + j] = serialized[j];\n            }\n        }\n        result\n    }\n\n    #[inline_always]\n    fn unpack(fields: [Field; Self::N]) -> Self {\n        let mut reader = crate::utils::reader::Reader::new(fields);\n        let mut result: [T; M] = std::mem::zeroed();\n        reader.read_struct_array::<T, <T as Packable>::N, M>(Packable::unpack, result)\n    }\n}\n\n#[test]\nfn test_u16_packing() {\n    let a: u16 = 10;\n    assert_eq(a, u16::unpack(a.pack()));\n}\n\n#[test]\nfn test_i8_packing() {\n    let a: i8 = -10;\n    assert_eq(a, i8::unpack(a.pack()));\n}\n\n#[test]\nfn test_i16_packing() {\n    let a: i16 = -10;\n    assert_eq(a, i16::unpack(a.pack()));\n}\n\n#[test]\nfn test_i32_packing() {\n    let a: i32 = -10;\n    assert_eq(a, i32::unpack(a.pack()));\n}\n\n#[test]\nfn test_i64_packing() {\n    let a: i64 = -10;\n    assert_eq(a, i64::unpack(a.pack()));\n}\n"
        },
        "419": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/noir-protocol-circuits/crates/types/src/utils/field.nr",
            "source": "pub fn field_from_bytes<let N: u32>(bytes: [u8; N], big_endian: bool) -> Field {\n    assert(bytes.len() < 32, \"field_from_bytes: N must be less than 32\");\n    let mut as_field = 0;\n    let mut offset = 1;\n    for i in 0..N {\n        let mut index = i;\n        if big_endian {\n            index = N - i - 1;\n        }\n        as_field += (bytes[index] as Field) * offset;\n        offset *= 256;\n    }\n\n    as_field\n}\n\n// Convert a 32 byte array to a field element by truncating the final byte\npub fn field_from_bytes_32_trunc(bytes32: [u8; 32]) -> Field {\n    // Convert it to a field element\n    let mut v = 1;\n    let mut high = 0 as Field;\n    let mut low = 0 as Field;\n\n    for i in 0..15 {\n        // covers bytes 16..30 (31 is truncated and ignored)\n        low = low + (bytes32[15 + 15 - i] as Field) * v;\n        v = v * 256;\n        // covers bytes 0..14\n        high = high + (bytes32[14 - i] as Field) * v;\n    }\n    // covers byte 15\n    low = low + (bytes32[15] as Field) * v;\n\n    low + high * v\n}\n\n// TODO to radix returns u8, so we cannot use bigger radixes. It'd be ideal to use a radix of the maximum range-constrained integer noir supports\npub fn full_field_less_than(lhs: Field, rhs: Field) -> bool {\n    lhs.lt(rhs)\n}\n\npub fn full_field_greater_than(lhs: Field, rhs: Field) -> bool {\n    rhs.lt(lhs)\n}\n\npub fn min(f1: Field, f2: Field) -> Field {\n    if f1.lt(f2) {\n        f1\n    } else {\n        f2\n    }\n}\n\n// TODO: write doc-comments and tests for these magic constants.\n\nglobal KNOWN_NON_RESIDUE: Field = 5; // This is a non-residue in Noir's native Field.\nglobal C1: u32 = 28;\nglobal C3: Field = 40770029410420498293352137776570907027550720424234931066070132305055;\nglobal C5: Field = 19103219067921713944291392827692070036145651957329286315305642004821462161904;\n\n// @dev: only use this for _huge_ exponents y, when writing a constrained function.\n// If you're only exponentiating by a small value, first consider writing-out the multiplications by hand.\n// Only after you've measured the gates of that approach, consider using the native Field::pow_32 function.\n// Only if your exponent is larger than 32 bits, resort to using this function.\npub fn pow(x: Field, y: Field) -> Field {\n    let mut r = 1 as Field;\n    let b: [u1; 254] = y.to_le_bits();\n\n    for i in 0..254 {\n        r *= r;\n        r *= (b[254 - 1 - i] as Field) * x + (1 - b[254 - 1 - i] as Field);\n    }\n\n    r\n}\n\n/// Returns Option::some(sqrt) if there is a square root, and Option::none() if there isn't.\npub fn sqrt(x: Field) -> Option<Field> {\n    // Safety: if the hint returns the square root of x, then we simply square it\n    // check the result equals x. If x is not square, we return a value that\n    // enables us to prove that fact (see the `else` clause below).\n    let (is_sq, maybe_sqrt) = unsafe { __sqrt(x) };\n\n    if is_sq {\n        let sqrt = maybe_sqrt;\n        validate_sqrt_hint(x, sqrt);\n        Option::some(sqrt)\n    } else {\n        let not_sqrt_hint = maybe_sqrt;\n        validate_not_sqrt_hint(x, not_sqrt_hint);\n        Option::none()\n    }\n}\n\n// Boolean indicating whether Field element is a square, i.e. whether there exists a y in Field s.t. x = y*y.\nunconstrained fn is_square(x: Field) -> bool {\n    let v = pow(x, -1 / 2);\n    v * (v - 1) == 0\n}\n\n// Tonelli-Shanks algorithm for computing the square root of a Field element.\n// Requires C1 = max{c: 2^c divides (p-1)}, where p is the order of Field\n// as well as C3 = (C2 - 1)/2, where C2 = (p-1)/(2^c1),\n// and C5 = ZETA^C2, where ZETA is a non-square element of Field.\n// These are pre-computed above as globals.\nunconstrained fn tonelli_shanks_sqrt(x: Field) -> Field {\n    let mut z = pow(x, C3);\n    let mut t = z * z * x;\n    z *= x;\n    let mut b = t;\n    let mut c = C5;\n\n    for i in 0..(C1 - 1) {\n        for _j in 1..(C1 - i - 1) {\n            b *= b;\n        }\n\n        z *= if b == 1 { 1 } else { c };\n\n        c *= c;\n\n        t *= if b == 1 { 1 } else { c };\n\n        b = t;\n    }\n\n    z\n}\n\n// NB: this doesn't return an option, because in the case of there _not_ being a square root, we still want to return a field element that allows us to then assert in the _constrained_ sqrt function that there is no sqrt.\nunconstrained fn __sqrt(x: Field) -> (bool, Field) {\n    let is_sq = is_square(x);\n    if is_sq {\n        let sqrt = tonelli_shanks_sqrt(x);\n        (true, sqrt)\n    } else {\n        // Demonstrate that x is not a square (a.k.a. a \"quadratic non-residue\").\n        // Facts:\n        // The Legendre symbol (\"LS\") of x, is x^((p-1)/2) (mod p).\n        // - If x is a square, LS(x) = 1\n        // - If x is not a square, LS(x) = -1\n        // - If x = 0, LS(x) = 0.\n        //\n        // Hence:\n        // sq * sq = sq // 1 * 1 = 1\n        // non-sq * non-sq = sq // -1 * -1 = 1\n        // sq * non-sq = non-sq // -1 * 1 = -1\n        //\n        // See: https://en.wikipedia.org/wiki/Legendre_symbol\n        let demo_x_not_square = x * KNOWN_NON_RESIDUE;\n        let not_sqrt = tonelli_shanks_sqrt(demo_x_not_square);\n        (false, not_sqrt)\n    }\n}\n\nfn validate_sqrt_hint(x: Field, hint: Field) {\n    assert(hint * hint == x, f\"The claimed_sqrt {hint} is not the sqrt of x {x}\");\n}\n\nfn validate_not_sqrt_hint(x: Field, hint: Field) {\n    // We need this assertion, because x = 0 would pass the other assertions in this\n    // function, and we don't want people to be able to prove that 0 is not square!\n    assert(x != 0, \"0 has a square root; you cannot claim it is not square\");\n    // Demonstrate that x is not a square (a.k.a. a \"quadratic non-residue\").\n    //\n    // Facts:\n    // The Legendre symbol (\"LS\") of x, is x^((p-1)/2) (mod p).\n    // - If x is a square, LS(x) = 1\n    // - If x is not a square, LS(x) = -1\n    // - If x = 0, LS(x) = 0.\n    //\n    // Hence:\n    // 1. sq * sq = sq // 1 * 1 = 1\n    // 2. non-sq * non-sq = sq // -1 * -1 = 1\n    // 3. sq * non-sq = non-sq // -1 * 1 = -1\n    //\n    // See: https://en.wikipedia.org/wiki/Legendre_symbol\n    //\n    // We want to demonstrate that this below multiplication falls under bullet-point (2):\n    let demo_x_not_square = x * KNOWN_NON_RESIDUE;\n    // I.e. we want to demonstrate that `demo_x_not_square` has Legendre symbol 1\n    // (i.e. that it is a square), so we prove that it is square below.\n    // Why do we want to prove that it has LS 1?\n    // Well, since it was computed with a known-non-residue, its squareness implies we're\n    // in case 2 (something multiplied by a known-non-residue yielding a result which\n    // has a LS of 1), which implies that x must be a non-square. The unconstrained\n    // function gave us the sqrt of demo_x_not_square, so all we need to do is\n    // assert its squareness:\n    assert(\n        hint * hint == demo_x_not_square,\n        f\"The hint {hint} does not demonstrate that {x} is not a square\",\n    );\n}\n\n#[test]\nunconstrained fn bytes_field_test() {\n    // Tests correctness of field_from_bytes_32_trunc against existing methods\n    // Bytes representing 0x543e0a6642ffeb8039296861765a53407bba62bd1c97ca43374de950bbe0a7\n    let inputs = [\n        84, 62, 10, 102, 66, 255, 235, 128, 57, 41, 104, 97, 118, 90, 83, 64, 123, 186, 98, 189, 28,\n        151, 202, 67, 55, 77, 233, 80, 187, 224, 167,\n    ];\n    let field = field_from_bytes(inputs, true);\n    let return_bytes: [u8; 31] = field.to_be_bytes();\n    assert_eq(inputs, return_bytes);\n    // 32 bytes - we remove the final byte, and check it matches the field\n    let inputs2 = [\n        84, 62, 10, 102, 66, 255, 235, 128, 57, 41, 104, 97, 118, 90, 83, 64, 123, 186, 98, 189, 28,\n        151, 202, 67, 55, 77, 233, 80, 187, 224, 167, 158,\n    ];\n    let field2 = field_from_bytes_32_trunc(inputs2);\n    let return_bytes2: [u8; 31] = field2.to_be_bytes();\n\n    assert_eq(return_bytes2, return_bytes);\n    assert_eq(field2, field);\n}\n\n#[test]\nunconstrained fn max_field_test() {\n    // Tests the hardcoded value in constants.nr vs underlying modulus\n    // NB: We can't use 0-1 in constants.nr as it will be transpiled incorrectly to ts and sol constants files\n    let max_value = crate::constants::MAX_FIELD_VALUE;\n    assert_eq(max_value, 0 - 1);\n    // modulus == 0 is tested elsewhere, so below is more of a sanity check\n    let max_bytes: [u8; 32] = max_value.to_be_bytes();\n    let mod_bytes = std::field::modulus_be_bytes();\n    for i in 0..31 {\n        assert_eq(max_bytes[i], mod_bytes[i]);\n    }\n    assert_eq(max_bytes[31], mod_bytes[31] - 1);\n}\n\n#[test]\nunconstrained fn sqrt_valid_test() {\n    let x = 16; // examples: 16, 9, 25, 81\n    let result = sqrt(x);\n    assert(result.is_some());\n    assert_eq(result.unwrap() * result.unwrap(), x);\n}\n\n#[test]\nunconstrained fn sqrt_invalid_test() {\n    let x = KNOWN_NON_RESIDUE; // has no square root in the field\n    let result = sqrt(x);\n    assert(result.is_none());\n}\n\n#[test]\nunconstrained fn sqrt_zero_test() {\n    let result = sqrt(0);\n    assert(result.is_some());\n    assert_eq(result.unwrap(), 0);\n}\n\n#[test]\nunconstrained fn sqrt_one_test() {\n    let result = sqrt(1);\n    assert(result.is_some());\n    assert_eq(result.unwrap() * result.unwrap(), 1);\n}\n\n#[test]\nunconstrained fn field_from_bytes_empty_test() {\n    let empty: [u8; 0] = [];\n    let result = field_from_bytes(empty, true);\n    assert_eq(result, 0);\n\n    let result_le = field_from_bytes(empty, false);\n    assert_eq(result_le, 0);\n}\n\n#[test]\nunconstrained fn field_from_bytes_little_endian_test() {\n    // Test little-endian conversion: [0x01, 0x02] should be 0x0201 = 513\n    let bytes = [0x01, 0x02];\n    let result_le = field_from_bytes(bytes, false);\n    assert_eq(result_le, 0x0201);\n\n    // Compare with big-endian: [0x01, 0x02] should be 0x0102 = 258\n    let result_be = field_from_bytes(bytes, true);\n    assert_eq(result_be, 0x0102);\n}\n\n#[test]\nunconstrained fn pow_test() {\n    assert_eq(pow(2, 0), 1);\n    assert_eq(pow(2, 1), 2);\n    assert_eq(pow(2, 10), 1024);\n    assert_eq(pow(3, 5), 243);\n    assert_eq(pow(0, 5), 0);\n    assert_eq(pow(1, 100), 1);\n}\n\n#[test]\nunconstrained fn min_test() {\n    assert_eq(min(5, 10), 5);\n    assert_eq(min(10, 5), 5);\n    assert_eq(min(7, 7), 7);\n    assert_eq(min(0, 1), 0);\n}\n\n#[test]\nunconstrained fn full_field_comparison_test() {\n    assert(full_field_less_than(5, 10));\n    assert(!full_field_less_than(10, 5));\n    assert(!full_field_less_than(5, 5));\n\n    assert(full_field_greater_than(10, 5));\n    assert(!full_field_greater_than(5, 10));\n    assert(!full_field_greater_than(5, 5));\n}\n\n#[test]\nunconstrained fn sqrt_has_two_roots_test() {\n    // Every square has two roots: r and -r (i.e., p - r)\n    // sqrt(16) can return 4 or -4\n    let x = 16;\n    let result = sqrt(x).unwrap();\n    assert(result * result == x);\n    // The other root is -result\n    let other_root = 0 - result;\n    assert(other_root * other_root == x);\n    // Verify they are different (unless x = 0)\n    assert(result != other_root);\n\n    // Same for 9: roots are 3 and -3\n    let y = 9;\n    let result_y = sqrt(y).unwrap();\n    assert(result_y * result_y == y);\n    let other_root_y = 0 - result_y;\n    assert(other_root_y * other_root_y == y);\n    assert(result_y != other_root_y);\n}\n\n#[test]\nunconstrained fn sqrt_negative_one_test() {\n    let x = 0 - 1;\n    let result = sqrt(x);\n    assert(result.unwrap() == 0x30644e72e131a029048b6e193fd841045cea24f6fd736bec231204708f703636);\n}\n\n#[test]\nunconstrained fn validate_sqrt_hint_valid_test() {\n    // 4 is a valid sqrt of 16\n    validate_sqrt_hint(16, 4);\n    // -4 is also a valid sqrt of 16\n    validate_sqrt_hint(16, 0 - 4);\n    // 0 is a valid sqrt of 0\n    validate_sqrt_hint(0, 0);\n    // 1 is a valid sqrt of 1\n    validate_sqrt_hint(1, 1);\n    // -1 is also a valid sqrt of 1\n    validate_sqrt_hint(1, 0 - 1);\n}\n\n#[test(should_fail_with = \"is not the sqrt of x\")]\nunconstrained fn validate_sqrt_hint_invalid_test() {\n    // 5 is not a valid sqrt of 16\n    validate_sqrt_hint(16, 5);\n}\n\n#[test]\nunconstrained fn validate_not_sqrt_hint_valid_test() {\n    // 5 (KNOWN_NON_RESIDUE) is not a square.\n    let x = KNOWN_NON_RESIDUE;\n    let hint = tonelli_shanks_sqrt(x * KNOWN_NON_RESIDUE);\n    validate_not_sqrt_hint(x, hint);\n}\n\n#[test(should_fail_with = \"0 has a square root\")]\nunconstrained fn validate_not_sqrt_hint_zero_test() {\n    // 0 has a square root, so we cannot claim it is not square\n    validate_not_sqrt_hint(0, 0);\n}\n\n#[test(should_fail_with = \"does not demonstrate that\")]\nunconstrained fn validate_not_sqrt_hint_wrong_hint_test() {\n    // Provide a wrong hint for a non-square\n    let x = KNOWN_NON_RESIDUE;\n    validate_not_sqrt_hint(x, 123);\n}\n"
        },
        "425": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/noir-protocol-circuits/crates/serde/src/reader.nr",
            "source": "pub struct Reader<let N: u32> {\n    data: [Field; N],\n    offset: u32,\n}\n\nimpl<let N: u32> Reader<N> {\n    pub fn new(data: [Field; N]) -> Self {\n        Self { data, offset: 0 }\n    }\n\n    pub fn read(&mut self) -> Field {\n        let result = self.data[self.offset];\n        self.offset += 1;\n        result\n    }\n\n    pub fn read_u32(&mut self) -> u32 {\n        self.read() as u32\n    }\n\n    pub fn read_u64(&mut self) -> u64 {\n        self.read() as u64\n    }\n\n    pub fn read_bool(&mut self) -> bool {\n        self.read() != 0\n    }\n\n    pub fn read_array<let K: u32>(&mut self) -> [Field; K] {\n        let mut result = [0; K];\n        for i in 0..K {\n            result[i] = self.data[self.offset + i];\n        }\n        self.offset += K;\n        result\n    }\n\n    pub fn read_struct<T, let K: u32>(&mut self, deserialise: fn([Field; K]) -> T) -> T {\n        let result = deserialise(self.read_array());\n        result\n    }\n\n    pub fn read_struct_array<T, let K: u32, let C: u32>(\n        &mut self,\n        deserialise: fn([Field; K]) -> T,\n        mut result: [T; C],\n    ) -> [T; C] {\n        for i in 0..C {\n            result[i] = self.read_struct(deserialise);\n        }\n        result\n    }\n\n    pub fn peek_offset(&mut self, offset: u32) -> Field {\n        self.data[self.offset + offset]\n    }\n\n    pub fn advance_offset(&mut self, offset: u32) {\n        self.offset += offset;\n    }\n\n    pub fn finish(self) {\n        assert_eq(self.offset, self.data.len(), \"Reader did not read all data\");\n    }\n}\n"
        },
        "426": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/noir-protocol-circuits/crates/serde/src/serialization.nr",
            "source": "use crate::{reader::Reader, writer::Writer};\n\n// docs:start:serialize\n/// Trait for serializing Noir types into arrays of Fields.\n///\n/// An implementation of the Serialize trait has to follow Noir's intrinsic serialization (each member of a struct\n/// converted directly into one or more Fields without any packing or compression). This trait (and Deserialize) are\n/// typically used to communicate between Noir and TypeScript (via oracles and function arguments).\n///\n/// # On Following Noir's Intrinsic Serialization\n/// When calling a Noir function from TypeScript (TS), first the function arguments are serialized into an array\n/// of fields. This array is then included in the initial witness. Noir's intrinsic serialization is then used\n/// to deserialize the arguments from the witness. When the same Noir function is called from Noir this Serialize trait\n/// is used instead of the serialization in TS. For this reason we need to have a match between TS serialization,\n/// Noir's intrinsic serialization and the implementation of this trait. If there is a mismatch, the function calls\n/// fail with an arguments hash mismatch error message.\n///\n/// # Associated Constants\n/// * `N` - The length of the output Field array, known at compile time\n///\n/// # Example\n/// ```\n/// impl<let N: u32> Serialize for str<N> {\n///     let N: u32 = N;\n///\n///     fn serialize(self) -> [Field; Self::N] {\n///         let mut writer: Writer<Self::N> = Writer::new();\n///         self.stream_serialize(&mut writer);\n///         writer.finish()\n///     }\n///\n///     fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n///         let bytes = self.as_bytes();\n///         for i in 0..bytes.len() {\n///             writer.write(bytes[i] as Field);\n///         }\n///     }\n/// }\n/// ```\n#[derive_via(derive_serialize)]\npub trait Serialize {\n    let N: u32;\n\n    fn serialize(self) -> [Field; Self::N];\n\n    fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>);\n}\n\n/// Generates a `Serialize` trait implementation for a struct type.\n///\n/// # Parameters\n/// - `s`: The struct type definition to generate the implementation for\n///\n/// # Returns\n/// A quoted code block containing the trait implementation\n///\n/// # Example\n/// For a struct defined as:\n/// ```\n/// struct Log<N> {\n///     fields: [Field; N],\n///     length: u32\n/// }\n/// ```\n///\n/// This function generates code equivalent to:\n/// ```\n/// impl<let N: u32> Serialize for Log<N> {\n///     let N: u32 = <[Field; N] as Serialize>::N + <u32 as Serialize>::N;\n///\n///     fn serialize(self) -> [Field; Self::N] {\n///         let mut writer: Writer<Self::N> = Writer::new();\n///         self.stream_serialize(&mut writer);\n///         writer.finish()\n///     }\n///\n///     #[inline_always]\n///     fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n///         Serialize::stream_serialize(self.fields, writer);\n///         Serialize::stream_serialize(self.length, writer);\n///     }\n/// }\n/// ```\npub comptime fn derive_serialize(s: TypeDefinition) -> Quoted {\n    let typ = s.as_type();\n    let nested_struct = typ.as_data_type().unwrap();\n\n    // We care only about the name and type so we drop the last item of the tuple\n    let params = nested_struct.0.fields(nested_struct.1).map(|(name, typ, _)| (name, typ));\n\n    // Generates the generic parameter declarations (to be placed after the `impl` keyword) and the `where` clause\n    // for the `Serialize` trait.\n    let generics_declarations = get_generics_declarations(s);\n    let where_serialize_clause = get_where_trait_clause(s, quote {Serialize});\n\n    let params_len_quote = get_params_len_quote(params);\n\n    let function_body = params\n        .map(|(name, _typ): (Quoted, Type)| {\n            quote {\n                $crate::serialization::Serialize::stream_serialize(self.$name, writer);\n            }\n        })\n        .join(quote {});\n\n    quote {\n        impl$generics_declarations $crate::serialization::Serialize for $typ\n            $where_serialize_clause\n        {\n            let N: u32 = $params_len_quote;\n\n\n            fn serialize(self) -> [Field; Self::N] {\n                let mut writer: $crate::writer::Writer<Self::N> = $crate::writer::Writer::new();\n                $crate::serialization::Serialize::stream_serialize(self, &mut writer);\n                writer.finish()\n            }\n\n\n            #[inline_always]\n             fn stream_serialize<let K: u32>(self, writer: &mut $crate::writer::Writer<K>) {\n                $function_body\n            }\n        }\n    }\n}\n\n// docs:start:deserialize\n/// Trait for deserializing Noir types from arrays of Fields.\n///\n/// An implementation of the Deserialize trait has to follow Noir's intrinsic serialization (each member of a struct\n/// converted directly into one or more Fields without any packing or compression). This trait is typically used when\n/// deserializing return values from function calls in Noir. Since the same function could be called from TypeScript\n/// (TS), in which case the TS deserialization would get used, we need to have a match between the 2.\n///\n/// # Associated Constants\n/// * `N` - The length of the input Field array, known at compile time\n///\n/// # Example\n/// ```\n/// impl<let M: u32> Deserialize for str<M> {\n///     let N: u32 = M;\n///\n///     fn deserialize(fields: [Field; Self::N]) -> Self {\n///         let mut reader = Reader::new(fields);\n///         let result = Self::stream_deserialize(&mut reader);\n///         reader.finish();\n///         result\n///     }\n///\n///     fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self {\n///         let mut bytes = [0 as u8; M];\n///         for i in 0..M {\n///             bytes[i] = reader.read() as u8;\n///         }\n///         str::<M>::from(bytes)\n///     }\n/// }\n/// ```\n#[derive_via(derive_deserialize)]\npub trait Deserialize {\n    let N: u32;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self;\n\n    fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self;\n}\n\n/// Generates a `Deserialize` trait implementation for a given struct `s`.\n///\n/// # Arguments\n/// * `s` - The struct type definition to generate the implementation for\n///\n/// # Returns\n/// A `Quoted` block containing the generated trait implementation\n///\n/// # Requirements\n/// Each struct member type must implement the `Deserialize` trait (it gets used in the generated code).\n///\n/// # Example\n/// For a struct like:\n/// ```\n/// struct MyStruct {\n///     x: AztecAddress,\n///     y: Field,\n/// }\n/// ```\n///\n/// This generates:\n/// ```\n/// impl Deserialize for MyStruct {\n///     let N: u32 = <AztecAddress as Deserialize>::N + <Field as Deserialize>::N;\n///\n///     fn deserialize(fields: [Field; Self::N]) -> Self {\n///         let mut reader = Reader::new(fields);\n///         let result = Self::stream_deserialize(&mut reader);\n///         reader.finish();\n///         result\n///     }\n///\n///     #[inline_always]\n///     fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self {\n///         let x = <AztecAddress as Deserialize>::stream_deserialize(reader);\n///         let y = <Field as Deserialize>::stream_deserialize(reader);\n///         Self { x, y }\n///     }\n/// }\n/// ```\npub comptime fn derive_deserialize(s: TypeDefinition) -> Quoted {\n    let typ = s.as_type();\n    let nested_struct = typ.as_data_type().unwrap();\n    let params = nested_struct.0.fields(nested_struct.1);\n\n    // Generates the generic parameter declarations (to be placed after the `impl` keyword) and the `where` clause\n    // for the `Deserialize` trait.\n    let generics_declarations = get_generics_declarations(s);\n    let where_deserialize_clause = get_where_trait_clause(s, quote {Deserialize});\n\n    // The following will give us:\n    // <type_of_struct_member_1 as Deserialize>::N + <type_of_struct_member_2 as Deserialize>::N + ...\n    // (or 0 if the struct has no members)\n    let right_hand_side_of_definition_of_n = if params.len() > 0 {\n        params\n            .map(|(_, param_type, _): (Quoted, Type, Quoted)| {\n                quote {\n            <$param_type as $crate::serialization::Deserialize>::N\n        }\n            })\n            .join(quote {+})\n    } else {\n        quote {0}\n    };\n\n    // For structs containing a single member, we can enhance performance by directly deserializing the input array,\n    // bypassing the need for loop-based array construction. While this optimization yields significant benefits in\n    // Brillig where the loops are expected to not be optimized, it is not relevant in ACIR where the loops are\n    // expected to be optimized away.\n    let function_body = if params.len() > 1 {\n        // This generates deserialization code for each struct member and concatenates them together.\n        let deserialization_of_struct_members = params\n            .map(|(param_name, param_type, _): (Quoted, Type, Quoted)| {\n                quote {\n                    let $param_name = <$param_type as Deserialize>::stream_deserialize(reader);\n                }\n            })\n            .join(quote {});\n\n        // We join the struct member names with a comma to be used in the `Self { ... }` syntax\n        // This will give us e.g. `a, b, c` for a struct with three fields named `a`, `b`, and `c`.\n        let struct_members = params\n            .map(|(param_name, _, _): (Quoted, Type, Quoted)| quote { $param_name })\n            .join(quote {,});\n\n        quote {\n            $deserialization_of_struct_members\n\n            Self { $struct_members }\n        }\n    } else if params.len() == 1 {\n        let param_name = params[0].0;\n        quote {\n            Self { $param_name: $crate::serialization::Deserialize::stream_deserialize(reader) }\n        }\n    } else {\n        quote {\n            Self {}\n        }\n    };\n\n    quote {\n        impl$generics_declarations $crate::serialization::Deserialize for $typ\n            $where_deserialize_clause\n        {\n            let N: u32 = $right_hand_side_of_definition_of_n;\n\n            fn deserialize(fields: [Field; Self::N]) -> Self {\n                let mut reader = $crate::reader::Reader::new(fields);\n                let result = Self::stream_deserialize(&mut reader);\n                reader.finish();\n                result\n            }\n\n            #[inline_always]\n            fn stream_deserialize<let K: u32>(reader: &mut $crate::reader::Reader<K>) -> Self {\n                $function_body\n            }\n        }\n    }\n}\n\n/// Generates a quoted expression that computes the total serialized length of function parameters.\n///\n/// # Parameters\n/// * `params` - An array of tuples where each tuple contains a quoted parameter name and its Type. The type needs\n///              to implement the Serialize trait.\n///\n/// # Returns\n/// A quoted expression that evaluates to:\n/// * `0` if there are no parameters\n/// * `(<type1 as Serialize>::N + <type2 as Serialize>::N + ...)` for one or more parameters\ncomptime fn get_params_len_quote(params: [(Quoted, Type)]) -> Quoted {\n    if params.len() == 0 {\n        quote { 0 }\n    } else {\n        let params_quote_without_parentheses = params\n            .map(|(_, param_type): (Quoted, Type)| {\n                quote {\n                    <$param_type as $crate::serialization::Serialize>::N\n                }\n            })\n            .join(quote {+});\n        quote { ($params_quote_without_parentheses) }\n    }\n}\n\ncomptime fn get_generics_declarations(s: TypeDefinition) -> Quoted {\n    let generics = s.generics();\n\n    if generics.len() > 0 {\n        let generics_declarations_items = generics\n            .map(|(name, maybe_integer_typ)| {\n                // The second item in the generics tuple is an Option of an integer type that is Some only if\n                // the generic is numeric.\n                if maybe_integer_typ.is_some() {\n                    // The generic is numeric, so we return a quote defined as e.g. \"let N: u32\"\n                    let integer_type = maybe_integer_typ.unwrap();\n                    quote {let $name: $integer_type}\n                } else {\n                    // The generic is not numeric, so we return a quote containing the name of the generic (e.g. \"T\")\n                    quote {$name}\n                }\n            })\n            .join(quote {,});\n        quote {<$generics_declarations_items>}\n    } else {\n        // The struct doesn't have any generics defined, so we just return an empty quote.\n        quote {}\n    }\n}\n\ncomptime fn get_where_trait_clause(s: TypeDefinition, trait_name: Quoted) -> Quoted {\n    let generics = s.generics();\n\n    // The second item in the generics tuple is an Option of an integer type that is Some only if the generic is\n    // numeric.\n    let non_numeric_generics =\n        generics.filter(|(_, maybe_integer_typ)| maybe_integer_typ.is_none());\n\n    if non_numeric_generics.len() > 0 {\n        let non_numeric_generics_declarations =\n            non_numeric_generics.map(|(name, _)| quote {$name: $trait_name}).join(quote {,});\n        quote {where $non_numeric_generics_declarations}\n    } else {\n        // There are no non-numeric generics, so we return an empty quote.\n        quote {}\n    }\n}\n"
        },
        "428": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/noir-protocol-circuits/crates/serde/src/type_impls.nr",
            "source": "use crate::{reader::Reader, serialization::{Deserialize, Serialize}, writer::Writer};\nuse std::embedded_curve_ops::EmbeddedCurvePoint;\nuse std::embedded_curve_ops::EmbeddedCurveScalar;\n\nglobal U1_SERIALIZED_LEN: u32 = 1;\nglobal BOOL_SERIALIZED_LEN: u32 = 1;\nglobal U8_SERIALIZED_LEN: u32 = 1;\nglobal U16_SERIALIZED_LEN: u32 = 1;\nglobal U32_SERIALIZED_LEN: u32 = 1;\nglobal U64_SERIALIZED_LEN: u32 = 1;\nglobal U128_SERIALIZED_LEN: u32 = 1;\nglobal FIELD_SERIALIZED_LEN: u32 = 1;\nglobal I8_SERIALIZED_LEN: u32 = 1;\nglobal I16_SERIALIZED_LEN: u32 = 1;\nglobal I32_SERIALIZED_LEN: u32 = 1;\nglobal I64_SERIALIZED_LEN: u32 = 1;\n\nimpl Serialize for bool {\n    let N: u32 = BOOL_SERIALIZED_LEN;\n\n    fn serialize(self) -> [Field; Self::N] {\n        let mut writer: Writer<Self::N> = Writer::new();\n        self.stream_serialize(&mut writer);\n        writer.finish()\n    }\n\n    #[inline_always]\n    fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n        writer.write(self as Field);\n    }\n}\n\nimpl Deserialize for bool {\n    let N: u32 = BOOL_SERIALIZED_LEN;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self {\n        let mut reader = Reader::new(fields);\n        let result = Self::stream_deserialize(&mut reader);\n        reader.finish();\n        result\n    }\n\n    #[inline_always]\n    fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> bool {\n        reader.read() != 0\n    }\n}\n\nimpl Serialize for u1 {\n    let N: u32 = U1_SERIALIZED_LEN;\n\n    fn serialize(self) -> [Field; Self::N] {\n        let mut writer: Writer<Self::N> = Writer::new();\n        self.stream_serialize(&mut writer);\n        writer.finish()\n    }\n\n    #[inline_always]\n    fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n        writer.write(self as Field);\n    }\n}\n\nimpl Deserialize for u1 {\n    let N: u32 = U1_SERIALIZED_LEN;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self {\n        let mut reader = Reader::new(fields);\n        let result = Self::stream_deserialize(&mut reader);\n        reader.finish();\n        result\n    }\n\n    #[inline_always]\n    fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self {\n        reader.read() as u1\n    }\n}\n\nimpl Serialize for u8 {\n    let N: u32 = U8_SERIALIZED_LEN;\n\n    fn serialize(self) -> [Field; Self::N] {\n        let mut writer: Writer<Self::N> = Writer::new();\n        self.stream_serialize(&mut writer);\n        writer.finish()\n    }\n\n    #[inline_always]\n    fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n        writer.write(self as Field);\n    }\n}\n\nimpl Deserialize for u8 {\n    let N: u32 = U8_SERIALIZED_LEN;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self {\n        let mut reader = Reader::new(fields);\n        let result = Self::stream_deserialize(&mut reader);\n        reader.finish();\n        result\n    }\n\n    #[inline_always]\n    fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self {\n        reader.read() as u8\n    }\n}\n\nimpl Serialize for u16 {\n    let N: u32 = U16_SERIALIZED_LEN;\n\n    fn serialize(self) -> [Field; Self::N] {\n        let mut writer: Writer<Self::N> = Writer::new();\n        self.stream_serialize(&mut writer);\n        writer.finish()\n    }\n\n    #[inline_always]\n    fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n        writer.write(self as Field);\n    }\n}\n\nimpl Deserialize for u16 {\n    let N: u32 = U16_SERIALIZED_LEN;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self {\n        let mut reader = Reader::new(fields);\n        let result = Self::stream_deserialize(&mut reader);\n        reader.finish();\n        result\n    }\n\n    #[inline_always]\n    fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self {\n        reader.read() as u16\n    }\n}\n\nimpl Serialize for u32 {\n    let N: u32 = U32_SERIALIZED_LEN;\n\n    fn serialize(self) -> [Field; Self::N] {\n        let mut writer: Writer<Self::N> = Writer::new();\n        self.stream_serialize(&mut writer);\n        writer.finish()\n    }\n\n    #[inline_always]\n    fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n        writer.write(self as Field);\n    }\n}\n\nimpl Deserialize for u32 {\n    let N: u32 = U32_SERIALIZED_LEN;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self {\n        let mut reader = Reader::new(fields);\n        let result = Self::stream_deserialize(&mut reader);\n        reader.finish();\n        result\n    }\n\n    #[inline_always]\n    fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self {\n        reader.read() as u32\n    }\n}\n\nimpl Serialize for u64 {\n    let N: u32 = U64_SERIALIZED_LEN;\n\n    fn serialize(self) -> [Field; Self::N] {\n        let mut writer: Writer<Self::N> = Writer::new();\n        self.stream_serialize(&mut writer);\n        writer.finish()\n    }\n\n    #[inline_always]\n    fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n        writer.write(self as Field);\n    }\n}\n\nimpl Deserialize for u64 {\n    let N: u32 = U64_SERIALIZED_LEN;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self {\n        let mut reader = Reader::new(fields);\n        let result = Self::stream_deserialize(&mut reader);\n        reader.finish();\n        result\n    }\n\n    #[inline_always]\n    fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self {\n        reader.read() as u64\n    }\n}\n\nimpl Serialize for u128 {\n    let N: u32 = U128_SERIALIZED_LEN;\n\n    fn serialize(self) -> [Field; Self::N] {\n        let mut writer: Writer<Self::N> = Writer::new();\n        self.stream_serialize(&mut writer);\n        writer.finish()\n    }\n\n    #[inline_always]\n    fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n        writer.write(self as Field);\n    }\n}\n\nimpl Deserialize for u128 {\n    let N: u32 = U128_SERIALIZED_LEN;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self {\n        let mut reader = Reader::new(fields);\n        let result = Self::stream_deserialize(&mut reader);\n        reader.finish();\n        result\n    }\n\n    #[inline_always]\n    fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self {\n        reader.read() as u128\n    }\n}\n\nimpl Serialize for Field {\n    let N: u32 = FIELD_SERIALIZED_LEN;\n\n    fn serialize(self) -> [Field; Self::N] {\n        let mut writer: Writer<Self::N> = Writer::new();\n        self.stream_serialize(&mut writer);\n        writer.finish()\n    }\n\n    #[inline_always]\n    fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n        writer.write(self);\n    }\n}\n\nimpl Deserialize for Field {\n    let N: u32 = FIELD_SERIALIZED_LEN;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self {\n        let mut reader = Reader::new(fields);\n        let result = Self::stream_deserialize(&mut reader);\n        reader.finish();\n        result\n    }\n\n    #[inline_always]\n    fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self {\n        reader.read()\n    }\n}\n\nimpl Serialize for i8 {\n    let N: u32 = I8_SERIALIZED_LEN;\n\n    fn serialize(self) -> [Field; Self::N] {\n        let mut writer: Writer<Self::N> = Writer::new();\n        self.stream_serialize(&mut writer);\n        writer.finish()\n    }\n\n    #[inline_always]\n    fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n        writer.write(self as u8 as Field);\n    }\n}\n\nimpl Deserialize for i8 {\n    let N: u32 = I8_SERIALIZED_LEN;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self {\n        let mut reader = Reader::new(fields);\n        let result = Self::stream_deserialize(&mut reader);\n        reader.finish();\n        result\n    }\n\n    #[inline_always]\n    fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self {\n        reader.read() as u8 as i8\n    }\n}\n\nimpl Serialize for i16 {\n    let N: u32 = I16_SERIALIZED_LEN;\n\n    fn serialize(self) -> [Field; Self::N] {\n        let mut writer: Writer<Self::N> = Writer::new();\n        self.stream_serialize(&mut writer);\n        writer.finish()\n    }\n\n    #[inline_always]\n    fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n        writer.write(self as u16 as Field);\n    }\n}\n\nimpl Deserialize for i16 {\n    let N: u32 = I16_SERIALIZED_LEN;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self {\n        let mut reader = Reader::new(fields);\n        let result = Self::stream_deserialize(&mut reader);\n        reader.finish();\n        result\n    }\n\n    #[inline_always]\n    fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self {\n        reader.read() as u16 as i16\n    }\n}\n\nimpl Serialize for i32 {\n    let N: u32 = I32_SERIALIZED_LEN;\n\n    fn serialize(self) -> [Field; Self::N] {\n        let mut writer: Writer<Self::N> = Writer::new();\n        self.stream_serialize(&mut writer);\n        writer.finish()\n    }\n\n    #[inline_always]\n    fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n        writer.write(self as u32 as Field);\n    }\n}\n\nimpl Deserialize for i32 {\n    let N: u32 = I32_SERIALIZED_LEN;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self {\n        let mut reader = Reader::new(fields);\n        let result = Self::stream_deserialize(&mut reader);\n        reader.finish();\n        result\n    }\n\n    #[inline_always]\n    fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self {\n        reader.read() as u32 as i32\n    }\n}\n\nimpl Serialize for i64 {\n    let N: u32 = I64_SERIALIZED_LEN;\n\n    fn serialize(self) -> [Field; Self::N] {\n        let mut writer: Writer<Self::N> = Writer::new();\n        self.stream_serialize(&mut writer);\n        writer.finish()\n    }\n\n    #[inline_always]\n    fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n        writer.write(self as u64 as Field);\n    }\n}\n\nimpl Deserialize for i64 {\n    let N: u32 = I64_SERIALIZED_LEN;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self {\n        let mut reader = Reader::new(fields);\n        let result = Self::stream_deserialize(&mut reader);\n        reader.finish();\n        result\n    }\n\n    #[inline_always]\n    fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self {\n        reader.read() as u64 as i64\n    }\n}\n\nimpl<T, let M: u32> Serialize for [T; M]\nwhere\n    T: Serialize,\n{\n    let N: u32 = <T as Serialize>::N * M;\n\n    fn serialize(self) -> [Field; Self::N] {\n        let mut writer: Writer<Self::N> = Writer::new();\n        self.stream_serialize(&mut writer);\n        writer.finish()\n    }\n\n    #[inline_always]\n    fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n        for i in 0..M {\n            self[i].stream_serialize(writer);\n        }\n    }\n}\n\nimpl<T, let M: u32> Deserialize for [T; M]\nwhere\n    T: Deserialize,\n{\n    let N: u32 = <T as Deserialize>::N * M;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self {\n        let mut reader = Reader::new(fields);\n        let result = Self::stream_deserialize(&mut reader);\n        reader.finish();\n        result\n    }\n\n    #[inline_always]\n    fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self {\n        let mut result: [T; M] = std::mem::zeroed();\n        for i in 0..M {\n            result[i] = T::stream_deserialize(reader);\n        }\n        result\n    }\n}\n\nimpl<T> Serialize for Option<T>\nwhere\n    T: Serialize,\n{\n    let N: u32 = <T as Serialize>::N + 1;\n\n    fn serialize(self) -> [Field; Self::N] {\n        let mut writer: Writer<Self::N> = Writer::new();\n        self.stream_serialize(&mut writer);\n        writer.finish()\n    }\n\n    #[inline_always]\n    fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n        writer.write_bool(self.is_some());\n        if self.is_some() {\n            self.unwrap_unchecked().stream_serialize(writer);\n        } else {\n            writer.advance_offset(<T as Serialize>::N);\n        }\n    }\n}\n\nimpl<T> Deserialize for Option<T>\nwhere\n    T: Deserialize,\n{\n    let N: u32 = <T as Deserialize>::N + 1;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self {\n        let mut reader = Reader::new(fields);\n        let result = Self::stream_deserialize(&mut reader);\n        reader.finish();\n        result\n    }\n\n    #[inline_always]\n    fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self {\n        if reader.read_bool() {\n            Option::some(<T as Deserialize>::stream_deserialize(reader))\n        } else {\n            reader.advance_offset(<T as Deserialize>::N);\n            Option::none()\n        }\n    }\n}\n\nglobal SCALAR_SIZE: u32 = 2;\n\nimpl Serialize for EmbeddedCurveScalar {\n\n    let N: u32 = SCALAR_SIZE;\n\n    fn serialize(self) -> [Field; SCALAR_SIZE] {\n        [self.lo, self.hi]\n    }\n\n    #[inline_always]\n    fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n        writer.write(self.lo);\n        writer.write(self.hi);\n    }\n}\n\nimpl Deserialize for EmbeddedCurveScalar {\n    let N: u32 = SCALAR_SIZE;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self {\n        Self { lo: fields[0], hi: fields[1] }\n    }\n\n    #[inline_always]\n    fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self {\n        Self { lo: reader.read(), hi: reader.read() }\n    }\n}\n\nglobal POINT_SIZE: u32 = 3;\n\nimpl Serialize for EmbeddedCurvePoint {\n    let N: u32 = POINT_SIZE;\n\n    fn serialize(self) -> [Field; Self::N] {\n        [self.x, self.y, self.is_infinite as Field]\n    }\n\n    fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n        writer.write(self.x);\n        writer.write(self.y);\n        writer.write(self.is_infinite as Field);\n    }\n}\n\nimpl Deserialize for EmbeddedCurvePoint {\n    let N: u32 = POINT_SIZE;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self {\n        Self { x: fields[0], y: fields[1], is_infinite: fields[2] != 0 }\n    }\n\n    #[inline_always]\n    fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self {\n        Self { x: reader.read(), y: reader.read(), is_infinite: reader.read_bool() }\n    }\n}\n\nimpl<let M: u32> Deserialize for str<M> {\n    let N: u32 = M;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self {\n        let mut reader = Reader::new(fields);\n        let result = Self::stream_deserialize(&mut reader);\n        reader.finish();\n        result\n    }\n\n    #[inline_always]\n    fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self {\n        let u8_arr = <[u8; Self::N] as Deserialize>::stream_deserialize(reader);\n        str::<Self::N>::from(u8_arr)\n    }\n}\n\nimpl<let M: u32> Serialize for str<M> {\n    let N: u32 = M;\n\n    fn serialize(self) -> [Field; Self::N] {\n        let mut writer: Writer<Self::N> = Writer::new();\n        self.stream_serialize(&mut writer);\n        writer.finish()\n    }\n\n    #[inline_always]\n    fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n        self.as_bytes().stream_serialize(writer);\n    }\n}\n\n// Note: Not deriving this because it's not supported to call derive_serialize on a \"remote\" struct (and it will never\n// be supported).\nimpl<T, let M: u32> Deserialize for BoundedVec<T, M>\nwhere\n    T: Deserialize,\n{\n    let N: u32 = <T as Deserialize>::N * M + 1;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self {\n        let mut reader = Reader::new(fields);\n        let result = Self::stream_deserialize(&mut reader);\n        reader.finish();\n        result\n    }\n\n    #[inline_always]\n    fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self {\n        let mut new_bounded_vec: BoundedVec<T, M> = BoundedVec::new();\n        let payload_len = Self::N - 1;\n\n        // Length is stored in the last field as we need to match intrinsic Noir serialization and the `len` struct\n        // field is after `storage` struct field (see `bounded_vec.nr` in noir-stdlib)\n        let len = reader.peek_offset(payload_len) as u32;\n\n        for i in 0..M {\n            if i < len {\n                new_bounded_vec.push(<T as Deserialize>::stream_deserialize(reader));\n            }\n        }\n\n        // +1 for the length of the BoundedVec\n        reader.advance_offset((M - len) * <T as Deserialize>::N + 1);\n\n        new_bounded_vec\n    }\n}\n\n// This may cause issues if used as program input, because noir disallows empty arrays for program input.\n// I think this is okay because I don't foresee a unit type being used as input. But leaving this comment as a hint\n// if someone does run into this in the future.\nimpl Deserialize for () {\n    let N: u32 = 0;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self {\n        let mut reader = Reader::new(fields);\n        let result = Self::stream_deserialize(&mut reader);\n        reader.finish();\n        result\n    }\n\n    #[inline_always]\n    fn stream_deserialize<let K: u32>(_reader: &mut Reader<K>) -> Self {\n        ()\n    }\n}\n\n// Note: Not deriving this because it's not supported to call derive_serialize on a \"remote\" struct (and it will never\n// be supported).\nimpl<T, let M: u32> Serialize for BoundedVec<T, M>\nwhere\n    T: Serialize,\n{\n    let N: u32 = <T as Serialize>::N * M + 1; // +1 for the length of the BoundedVec\n\n    fn serialize(self) -> [Field; Self::N] {\n        let mut writer: Writer<Self::N> = Writer::new();\n        self.stream_serialize(&mut writer);\n        writer.finish()\n    }\n\n    #[inline_always]\n    fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n        self.storage().stream_serialize(writer);\n        // Length is stored in the last field as we need to match intrinsic Noir serialization and the `len` struct\n        // field is after `storage` struct field (see `bounded_vec.nr` in noir-stdlib)\n        writer.write_u32(self.len() as u32);\n    }\n}\n\n// Create a slice of the given length with each element made from `f(i)` where `i` is the current index\ncomptime fn make_slice<Env, T>(length: u32, f: fn[Env](u32) -> T) -> [T] {\n    let mut slice = @[];\n    for i in 0..length {\n        slice = slice.push_back(f(i));\n    }\n    slice\n}\n\n// Implements Serialize and Deserialize for an arbitrary tuple type\ncomptime fn impl_serialize_for_tuple(_m: Module, length: u32) -> Quoted {\n    // `T0`, `T1`, `T2`\n    let type_names = make_slice(length, |i| f\"T{i}\".quoted_contents());\n\n    // `result0`, `result1`, `result2`\n    let result_names = make_slice(length, |i| f\"result{i}\".quoted_contents());\n\n    // `T0, T1, T2`\n    let field_generics = type_names.join(quote [,]);\n\n    // `<T0 as Serialize>::N + <T1 as Serialize>::N + <T2 as Serialize>::N`\n    let full_size_serialize = type_names\n        .map(|type_name| quote {\n        <$type_name as Serialize>::N\n    })\n        .join(quote [+]);\n\n    // `<T0 as Deserialize>::N + <T1 as Deserialize>::N + <T2 as Deserialize>::N`\n    let full_size_deserialize = type_names\n        .map(|type_name| quote {\n        <$type_name as Deserialize>::N\n    })\n        .join(quote [+]);\n\n    // `T0: Serialize, T1: Serialize, T2: Serialize,`\n    let serialize_constraints = type_names\n        .map(|field_name| quote {\n        $field_name: Serialize,\n    })\n        .join(quote []);\n\n    // `T0: Deserialize, T1: Deserialize, T2: Deserialize,`\n    let deserialize_constraints = type_names\n        .map(|field_name| quote {\n        $field_name: Deserialize,\n    })\n        .join(quote []);\n\n    // Statements to serialize each field\n    let serialized_fields = type_names\n        .mapi(|i, _type_name| quote {\n            $crate::serialization::Serialize::stream_serialize(self.$i, writer);\n    })\n        .join(quote []);\n\n    // Statements to deserialize each field\n    let deserialized_fields = type_names\n        .mapi(|i, type_name| {\n            let result_name = result_names[i];\n            quote {\n            let $result_name = <$type_name as $crate::serialization::Deserialize>::stream_deserialize(reader);\n        }\n        })\n        .join(quote []);\n    let deserialize_results = result_names.join(quote [,]);\n\n    quote {\n        impl<$field_generics> Serialize for ($field_generics) where $serialize_constraints {\n            let N: u32 = $full_size_serialize;\n\n            fn serialize(self) -> [Field; Self::N] {\n                let mut writer: $crate::writer::Writer<Self::N> = $crate::writer::Writer::new();\n                self.stream_serialize(&mut writer);\n                writer.finish()\n            }\n\n            #[inline_always]\n            fn stream_serialize<let K: u32>(self, writer: &mut $crate::writer::Writer<K>) {\n\n                $serialized_fields\n            }\n        }\n\n        impl<$field_generics> Deserialize for ($field_generics) where $deserialize_constraints {\n            let N: u32 = $full_size_deserialize;\n\n            fn deserialize(fields: [Field; Self::N]) -> Self {\n                let mut reader = $crate::reader::Reader::new(fields);\n                let result = Self::stream_deserialize(&mut reader);\n                reader.finish();\n                result\n            }\n    \n            #[inline_always]\n            fn stream_deserialize<let K: u32>(reader: &mut $crate::reader::Reader<K>) -> Self {\n                $deserialized_fields\n                ($deserialize_results)\n            }\n        }\n    }\n}\n\n// Keeping these manual impls. They are more efficient since they do not\n// require copying sub-arrays from any serialized arrays.\nimpl<T1> Serialize for (T1,)\nwhere\n    T1: Serialize,\n{\n    let N: u32 = <T1 as Serialize>::N;\n\n    fn serialize(self) -> [Field; Self::N] {\n        let mut writer: crate::writer::Writer<Self::N> = crate::writer::Writer::new();\n        self.stream_serialize(&mut writer);\n        writer.finish()\n    }\n\n    #[inline_always]\n    fn stream_serialize<let K: u32>(self, writer: &mut Writer<K>) {\n        self.0.stream_serialize(writer);\n    }\n}\n\nimpl<T1> Deserialize for (T1,)\nwhere\n    T1: Deserialize,\n{\n    let N: u32 = <T1 as Deserialize>::N;\n\n    fn deserialize(fields: [Field; Self::N]) -> Self {\n        let mut reader = crate::reader::Reader::new(fields);\n        let result = Self::stream_deserialize(&mut reader);\n        reader.finish();\n        result\n    }\n\n    #[inline_always]\n    fn stream_deserialize<let K: u32>(reader: &mut Reader<K>) -> Self {\n        (<T1 as Deserialize>::stream_deserialize(reader),)\n    }\n}\n\n#[impl_serialize_for_tuple(2)]\n#[impl_serialize_for_tuple(3)]\n#[impl_serialize_for_tuple(4)]\n#[impl_serialize_for_tuple(5)]\n#[impl_serialize_for_tuple(6)]\nmod impls {\n    use crate::serialization::{Deserialize, Serialize};\n}\n\n#[test]\nunconstrained fn bounded_vec_serialization() {\n    // Test empty BoundedVec\n    let empty_vec: BoundedVec<Field, 3> = BoundedVec::from_array([]);\n    let serialized = empty_vec.serialize();\n    let deserialized = BoundedVec::<Field, 3>::deserialize(serialized);\n    assert_eq(empty_vec, deserialized);\n    assert_eq(deserialized.len(), 0);\n\n    // Test partially filled BoundedVec\n    let partial_vec: BoundedVec<[u32; 2], 3> = BoundedVec::from_array([[1, 2]]);\n    let serialized = partial_vec.serialize();\n    let deserialized = BoundedVec::<[u32; 2], 3>::deserialize(serialized);\n    assert_eq(partial_vec, deserialized);\n    assert_eq(deserialized.len(), 1);\n    assert_eq(deserialized.get(0), [1, 2]);\n\n    // Test full BoundedVec\n    let full_vec: BoundedVec<[u32; 2], 3> = BoundedVec::from_array([[1, 2], [3, 4], [5, 6]]);\n    let serialized = full_vec.serialize();\n    let deserialized = BoundedVec::<[u32; 2], 3>::deserialize(serialized);\n    assert_eq(full_vec, deserialized);\n    assert_eq(deserialized.len(), 3);\n    assert_eq(deserialized.get(0), [1, 2]);\n    assert_eq(deserialized.get(1), [3, 4]);\n    assert_eq(deserialized.get(2), [5, 6]);\n}\n"
        },
        "429": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/noir-protocol-circuits/crates/serde/src/writer.nr",
            "source": "pub struct Writer<let N: u32> {\n    data: [Field; N],\n    offset: u32,\n}\n\nimpl<let N: u32> Writer<N> {\n    pub fn new() -> Self {\n        Self { data: [0; N], offset: 0 }\n    }\n\n    pub fn write(&mut self, value: Field) {\n        self.data[self.offset] = value;\n        self.offset += 1;\n    }\n\n    pub fn write_u32(&mut self, value: u32) {\n        self.write(value as Field);\n    }\n\n    pub fn write_u64(&mut self, value: u64) {\n        self.write(value as Field);\n    }\n\n    pub fn write_bool(&mut self, value: bool) {\n        self.write(value as Field);\n    }\n\n    pub fn write_array<let K: u32>(&mut self, value: [Field; K]) {\n        for i in 0..K {\n            self.data[i + self.offset] = value[i];\n        }\n        self.offset += K;\n    }\n\n    pub fn write_struct<T, let K: u32>(&mut self, value: T, serialize: fn(T) -> [Field; K]) {\n        self.write_array(serialize(value));\n    }\n\n    pub fn write_struct_array<T, let K: u32, let C: u32>(\n        &mut self,\n        value: [T; C],\n        serialize: fn(T) -> [Field; K],\n    ) {\n        for i in 0..C {\n            self.write_struct(value[i], serialize);\n        }\n    }\n\n    pub fn advance_offset(&mut self, offset: u32) {\n        self.offset += offset;\n    }\n\n    pub fn finish(self) -> [Field; N] {\n        assert_eq(self.offset, self.data.len(), \"Writer did not write all data\");\n        self.data\n    }\n}\n"
        },
        "442": {
            "path": "/home/runner/nargo/github.com/AztecProtocol/aztec-packages/v4.2.0-aztecnr-rc.2/noir-projects/aztec-nr/uint-note/src/uint_note.nr",
            "source": "use aztec::{\n    context::{PrivateContext, PublicContext},\n    history::nullifier::assert_nullifier_existed_by,\n    keys::getters::{get_nhk_app, get_public_keys, try_get_public_keys},\n    macros::notes::custom_note,\n    messages::{\n        logs::partial_note::encode_partial_note_private_message,\n        message_delivery::{do_private_message_delivery, MessageDelivery},\n    },\n    note::{note_interface::{NoteHash, NoteType}, utils::compute_note_nullifier},\n    oracle::random::random,\n    protocol::{\n        address::AztecAddress,\n        constants::{\n            DOM_SEP__NOTE_COMPLETION_LOG_TAG, DOM_SEP__NOTE_HASH, DOM_SEP__PARTIAL_NOTE_VALIDITY_COMMITMENT,\n            PRIVATE_LOG_CIPHERTEXT_LEN,\n        },\n        hash::{compute_log_tag, compute_siloed_nullifier, poseidon2_hash_with_separator},\n        traits::{Deserialize, FromField, Hash, Packable, Serialize, ToField},\n    },\n};\n\n// UintNote supports partial notes, i.e. the ability to create an incomplete note in private, hiding certain values\n// (the owner and randomness), and then completing the note in public with the ones missing (the storage slot and\n// amount). Partial notes are being actively developed and are not currently fully supported via macros, and so we\n// rely on the #[custom_note] macro to implement it manually, resulting in some boilerplate. This is expected to be\n// unnecessary once macro support is expanded.\n\n/// A private note representing a numeric value associated to an account (e.g. a token balance).\n// docs:start:uint_note_def\n#[derive(Deserialize, Eq, Serialize, Packable)]\n#[custom_note]\npub struct UintNote {\n    /// The number stored in the note.\n    pub value: u128,\n}\n// docs:end:uint_note_def\n\nimpl NoteHash for UintNote {\n    // docs:start:compute_note_hash\n    fn compute_note_hash(self, owner: AztecAddress, storage_slot: Field, randomness: Field) -> Field {\n        // Partial notes can be implemented by having the note hash be either the result of multiscalar multiplication\n        // (MSM), or two rounds of poseidon. MSM results in more constraints and is only required when multiple\n        // variants of partial notes are supported. Because UintNote has just one variant (where the value is public),\n        // we use poseidon instead.\n\n        // We must compute the same note hash as would be produced by a partial note created and completed with the\n        // same values, so that notes all behave the same way regardless of how they were created. To achieve this, we\n        // perform both steps of the partial note computation.\n\n        // First we create the partial note from a commitment to the private content.\n        let partial_note = PartialUintNote { commitment: compute_partial_commitment(owner, randomness) };\n\n        // Then compute the completion note hash. In a real partial note this step would be performed in public.\n        partial_note.compute_complete_note_hash(storage_slot, self.value)\n    }\n    // docs:end:compute_note_hash\n\n    // The nullifiers are nothing special - this is just the canonical implementation that would be injected by the\n    // #[note] macro.\n\n    fn compute_nullifier(\n        self,\n        context: &mut PrivateContext,\n        owner: AztecAddress,\n        note_hash_for_nullification: Field,\n    ) -> Field {\n        let owner_npk_m = get_public_keys(owner).npk_m;\n        let owner_npk_m_hash = owner_npk_m.hash();\n        let secret = context.request_nhk_app(owner_npk_m_hash);\n        compute_note_nullifier(note_hash_for_nullification, [secret])\n    }\n\n    unconstrained fn compute_nullifier_unconstrained(\n        self,\n        owner: AztecAddress,\n        note_hash_for_nullification: Field,\n    ) -> Option<Field> {\n        try_get_public_keys(owner).map(|public_keys| {\n            let owner_npk_m = public_keys.npk_m;\n            let owner_npk_m_hash = owner_npk_m.hash();\n            let secret = get_nhk_app(owner_npk_m_hash);\n            compute_note_nullifier(note_hash_for_nullification, [secret])\n        })\n    }\n}\n\nimpl UintNote {\n    /// Creates a partial note that will hide the owner but not the value or storage slot, since the note will be\n    /// later completed in public. This is a powerful technique for scenarios in which the value cannot be known in\n    /// private (e.g. because it depends on some public state, such as a DEX).\n    ///\n    /// This function inserts a partial note validity commitment into the nullifier tree to be later on able to verify\n    /// that the partial note and completer are legitimate. See function docs of `compute_validity_commitment` for more\n    /// details.\n    ///\n    /// Each partial note should only be used once, since otherwise multiple notes would be linked together and known\n    /// to belong to the same owner.\n    ///\n    /// As part of the partial note creation process, a log will be sent to `recipient` so that they can discover the\n    /// note. `recipient` will typically be the same as `owner`.\n    pub fn partial(\n        owner: AztecAddress,\n        context: &mut PrivateContext,\n        recipient: AztecAddress,\n        completer: AztecAddress,\n    ) -> PartialUintNote {\n        // Safety: We use the randomness to preserve the privacy of the note recipient by preventing brute-forcing, so\n        // a malicious sender could use non-random values to make the note less private. But they already know the full\n        // note pre-image anyway, and so the recipient already trusts them to not disclose this information. We can\n        // therefore assume that the sender will cooperate in the random value generation.\n        let randomness = unsafe { random() };\n\n        // We create a commitment to the private data, which we then use to construct the log we send to the recipient.\n        let commitment = compute_partial_commitment(owner, randomness);\n\n        // Our partial note log encoding scheme includes a field with the tag of the public completion log, and we use\n        // the commitment as the tag. This is good for multiple reasons:\n        //  - the commitment is uniquely tied to this partial note\n        //  - the commitment is already public information, so we're not revealing anything else\n        //  - we don't need to create any additional information, private or public, for the tag\n        //  - other contracts cannot impersonate us and emit logs with the same tag due to public log siloing\n        let private_log_content = UintPartialNotePrivateLogContent {};\n\n        do_private_message_delivery(\n            context,\n            || encode_partial_note_private_message(private_log_content, owner, randomness, commitment),\n            Option::none(),\n            recipient,\n            MessageDelivery.ONCHAIN_UNCONSTRAINED,\n        );\n\n        let partial_note = PartialUintNote { commitment };\n\n        // Now we compute the validity commitment and push it to the nullifier tree. It can be safely pushed to the\n        // nullifier tree since it uses its own separator, making collisions with actual note nullifiers practically\n        // impossible.\n        let validity_commitment = partial_note.compute_validity_commitment(completer);\n        context.push_nullifier(validity_commitment);\n\n        partial_note\n    }\n}\n\n/// Computes a commitment to the private content of a partial UintNote, i.e. the fields that will remain private. All\n/// other note fields will be made public.\n// docs:start:compute_partial_commitment\nfn compute_partial_commitment(owner: AztecAddress, randomness: Field) -> Field {\n    poseidon2_hash_with_separator([owner.to_field(), randomness], DOM_SEP__NOTE_HASH)\n}\n// docs:end:compute_partial_commitment\n\n#[derive(Packable)]\n// This note does not have any non-metadata (i.e. storage slot, owner, randomness) private content, as the only field\n// (value) will be public in the partial note.\nstruct UintPartialNotePrivateLogContent {}\n\nimpl NoteType for UintPartialNotePrivateLogContent {\n    fn get_id() -> Field {\n        UintNote::get_id()\n    }\n}\n\n/// A partial instance of a UintNote. This value represents a private commitment to the owner and randomness, but the\n/// storage slot and value fields have not yet been set. A partial note can be completed in public with the `complete`\n/// function (revealing the storage slot and value to the public), resulting in a UintNote that can be used like any\n/// other one (except of course that its value is known).\n// docs:start:partial_uint_note_def\n#[derive(Packable, Serialize, Deserialize, Eq)]\npub struct PartialUintNote {\n    commitment: Field,\n}\n// docs:end:partial_uint_note_def\n\nglobal NOTE_COMPLETION_PAYLOAD_LENGTH: u32 = 2;\n\nimpl PartialUintNote {\n    /// Completes the partial note, creating a new note that can be used like any other UintNote.\n    pub fn complete(self, context: PublicContext, completer: AztecAddress, storage_slot: Field, value: u128) {\n        // A note with a value of zero is valid, but we cannot currently complete a partial note with such a value\n        // because this will result in the completion log having its last field set to 0. Public logs currently do not\n        // track their length, and so trailing zeros are simply trimmed. This results in the completion log missing its\n        // last field (the value), and note discovery failing. TODO(#11636): remove this\n        assert(value != 0, \"Cannot complete a PartialUintNote with a value of 0\");\n\n        // We verify that the partial note we're completing is valid (i.e. completer is correct, it uses the correct\n        // state variable's storage slot, and it is internally consistent).\n        let validity_commitment = self.compute_validity_commitment(completer);\n        // Safety: we're using the existence of the nullifier as proof of the contract having validated the partial\n        // note's preimage, which is safe.\n        assert(\n            context.nullifier_exists_unsafe(validity_commitment, context.this_address()),\n            \"Invalid partial note or completer\",\n        );\n\n        // We need to do two things:\n        //  - emit a public log containing the public fields (the storage slot and value). The contract will later find\n        // it by searching for the domain-separated commitment as the tag.\n        //  - insert the completion note hash (i.e. the hash of the note) into the note hash tree. This is typically\n        // only done in private to hide the preimage of the hash that is inserted, but completed partial notes are\n        // inserted in public as the public values are provided and the note hash computed.\n        let log_tag = compute_log_tag(self.commitment, DOM_SEP__NOTE_COMPLETION_LOG_TAG);\n        context.emit_public_log_unsafe(log_tag, [storage_slot, value.to_field()]);\n        context.push_note_hash(self.compute_complete_note_hash(storage_slot, value));\n    }\n\n    /// Completes the partial note, creating a new note that can be used like any other UintNote. Same as `complete`\n    /// function but works from private context.\n    pub fn complete_from_private(\n        self,\n        context: &mut PrivateContext,\n        completer: AztecAddress,\n        storage_slot: Field,\n        value: u128,\n    ) {\n        // We verify that the partial note we're completing is valid (i.e. completer is correct, it uses the correct\n        // state variable's storage slot, and it is internally consistent).\n        let validity_commitment = self.compute_validity_commitment(completer);\n        // `assert_nullifier_existed_by` function expects the nullifier to be siloed (hashed with the address of the\n        // contract that emitted the nullifier) as it checks the value directly against the nullifier tree and all the\n        // nullifiers in the tree are siloed by the protocol.\n        let siloed_validity_commitment = compute_siloed_nullifier(context.this_address(), validity_commitment);\n        assert_nullifier_existed_by(\n            context.get_anchor_block_header(),\n            siloed_validity_commitment,\n        );\n\n        // We need to do two things:\n        //  - emit an unencrypted log containing the public fields (the storage slot and value) via the private log\n        // channel. The contract will later find it by searching for the domain-separated commitment as the tag.\n        //  - insert the completion note hash (i.e. the hash of the note) into the note hash tree. This is typically\n        // only done in private to hide the preimage of the hash that is inserted, but completed partial notes are\n        // inserted in public as the public values are provided and the note hash computed.\n        let log_tag = compute_log_tag(self.commitment, DOM_SEP__NOTE_COMPLETION_LOG_TAG);\n        let padded_payload = self.compute_note_completion_payload_padded_for_private_log(storage_slot, value);\n        context.emit_private_log_unsafe(log_tag, padded_payload, NOTE_COMPLETION_PAYLOAD_LENGTH);\n        context.push_note_hash(self.compute_complete_note_hash(storage_slot, value));\n    }\n\n    /// Computes a validity commitment for this partial note. The commitment cryptographically binds the note's private\n    /// data with the designated completer address. When the note is later completed in public execution, we can load\n    /// this commitment from the nullifier tree and verify that both the partial note (e.g. that the storage slot\n    /// corresponds to the correct owner, and that we're using the correct state variable) and completer are\n    /// legitimate.\n    pub fn compute_validity_commitment(self, completer: AztecAddress) -> Field {\n        poseidon2_hash_with_separator(\n            [self.commitment, completer.to_field()],\n            DOM_SEP__PARTIAL_NOTE_VALIDITY_COMMITMENT,\n        )\n    }\n\n    fn compute_note_completion_payload_padded_for_private_log(\n        _self: Self,\n        storage_slot: Field,\n        value: u128,\n    ) -> [Field; PRIVATE_LOG_CIPHERTEXT_LEN] {\n        let payload = [storage_slot, value.to_field()];\n        payload.concat([0; PRIVATE_LOG_CIPHERTEXT_LEN - NOTE_COMPLETION_PAYLOAD_LENGTH])\n    }\n\n    // docs:start:compute_complete_note_hash\n    fn compute_complete_note_hash(self, storage_slot: Field, value: u128) -> Field {\n        // Here we finalize the note hash by including the (public) storage slot and value into the partial note\n        // commitment. Note that we use the same separator as we used for the first round of poseidon - this is not\n        // an issue.\n        poseidon2_hash_with_separator(\n            [self.commitment, storage_slot, value.to_field()],\n            DOM_SEP__NOTE_HASH,\n        )\n    }\n    // docs:end:compute_complete_note_hash\n}\n\nimpl ToField for PartialUintNote {\n    fn to_field(self) -> Field {\n        self.commitment\n    }\n}\n\nimpl FromField for PartialUintNote {\n    fn from_field(field: Field) -> Self {\n        Self { commitment: field }\n    }\n}\n\nmod test {\n    use super::{compute_partial_commitment, PartialUintNote, UintNote};\n    use aztec::{note::note_interface::NoteHash, protocol::{address::AztecAddress, traits::FromField}};\n\n    global value: u128 = 17;\n    global randomness: Field = 42;\n    global owner: AztecAddress = AztecAddress::from_field(50);\n    global storage_slot: Field = 13;\n\n    #[test]\n    fn note_hash_matches_completed_partial_note_hash() {\n        // Tests that a UintNote has the same note hash as a PartialUintNote created and then completed with the same\n        // private values. This requires for the same hash function to be used in both flows, with the fields in the\n        // same order.\n        let note = UintNote { value };\n        let note_hash = note.compute_note_hash(owner, storage_slot, randomness);\n\n        let partial_note = PartialUintNote { commitment: compute_partial_commitment(owner, randomness) };\n        let completed_partial_note_hash = partial_note.compute_complete_note_hash(storage_slot, value);\n\n        assert_eq(note_hash, completed_partial_note_hash);\n    }\n}\n"
        },
        "482": {
            "path": "/home/runner/work/aztec-standards/aztec-standards/src/dripper/src/main.nr",
            "source": "use aztec::macros::aztec;\n\n#[aztec]\npub contract Dripper {\n    use aztec::macros::functions::{external, initializer};\n    use aztec::protocol::address::AztecAddress;\n    use token::Token;\n\n    #[external(\"public\")]\n    #[initializer]\n    fn constructor() {}\n\n    /// @notice Mints tokens into the public balance of the caller\n    /// @dev Caller obtains `amount` tokens in their public balance\n    /// @param token_address The address of the token contract\n    /// @param amount The amount of tokens to mint (u64, converted to u128 internally)\n    #[external(\"public\")]\n    fn drip_to_public(token_address: AztecAddress, amount: u64) {\n        let token = Token::at(token_address);\n        let msg_sender = self.msg_sender();\n        self.call(token.mint_to_public(msg_sender, amount as u128));\n    }\n\n    /// @notice Mints tokens into the private balance of the caller\n    /// @dev Caller obtains `amount` tokens in their private balance\n    /// @param token_address The address of the token contract\n    /// @param amount The amount of tokens to mint (u64, converted to u128 internally)\n    #[external(\"private\")]\n    fn drip_to_private(token_address: AztecAddress, amount: u64) {\n        let token = Token::at(token_address);\n        let msg_sender = self.msg_sender();\n        self.call(token.mint_to_private(msg_sender, amount as u128));\n    }\n\n}\n"
        }
    },
    "functions": [
        {
            "abi": {
                "error_types": {
                    "14415304921900233953": {
                        "error_kind": "string",
                        "string": "Initializer address is not the contract deployer"
                    },
                    "15764276373176857197": {
                        "error_kind": "string",
                        "string": "Stack too deep"
                    },
                    "9967937311635654895": {
                        "error_kind": "string",
                        "string": "Initialization hash does not match"
                    }
                },
                "parameters": [],
                "return_type": null
            },
            "bytecode": "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",
            "custom_attributes": [
                "abi_public",
                "abi_initializer"
            ],
            "debug_symbols": "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",
            "is_unconstrained": true,
            "name": "constructor"
        },
        {
            "abi": {
                "error_types": {
                    "12327971061804302172": {
                        "error_kind": "fmtstring",
                        "item_types": [],
                        "length": 98
                    },
                    "12469291177396340830": {
                        "error_kind": "string",
                        "string": "call to assert_max_bit_size"
                    },
                    "14990209321349310352": {
                        "error_kind": "string",
                        "string": "attempt to add with overflow"
                    },
                    "15764276373176857197": {
                        "error_kind": "string",
                        "string": "Stack too deep"
                    },
                    "7555607922535724711": {
                        "error_kind": "string",
                        "string": "Preimage mismatch"
                    },
                    "9703767922216001139": {
                        "error_kind": "string",
                        "string": "Can't read a pending nullifier with a zero contract address"
                    }
                },
                "parameters": [
                    {
                        "name": "inputs",
                        "type": {
                            "fields": [
                                {
                                    "name": "call_context",
                                    "type": {
                                        "fields": [
                                            {
                                                "name": "msg_sender",
                                                "type": {
                                                    "fields": [
                                                        {
                                                            "name": "inner",
                                                            "type": {
                                                                "kind": "field"
                                                            }
                                                        }
                                                    ],
                                                    "kind": "struct",
                                                    "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                                                }
                                            },
                                            {
                                                "name": "contract_address",
                                                "type": {
                                                    "fields": [
                                                        {
                                                            "name": "inner",
                                                            "type": {
                                                                "kind": "field"
                                                            }
                                                        }
                                                    ],
                                                    "kind": "struct",
                                                    "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                                                }
                                            },
                                            {
                                                "name": "function_selector",
                                                "type": {
                                                    "fields": [
                                                        {
                                                            "name": "inner",
                                                            "type": {
                                                                "kind": "integer",
                                                                "sign": "unsigned",
                                                                "width": 32
                                                            }
                                                        }
                                                    ],
                                                    "kind": "struct",
                                                    "path": "aztec::protocol_types::abis::function_selector::FunctionSelector"
                                                }
                                            },
                                            {
                                                "name": "is_static_call",
                                                "type": {
                                                    "kind": "boolean"
                                                }
                                            }
                                        ],
                                        "kind": "struct",
                                        "path": "aztec::protocol_types::abis::call_context::CallContext"
                                    }
                                },
                                {
                                    "name": "anchor_block_header",
                                    "type": {
                                        "fields": [
                                            {
                                                "name": "last_archive",
                                                "type": {
                                                    "fields": [
                                                        {
                                                            "name": "root",
                                                            "type": {
                                                                "kind": "field"
                                                            }
                                                        },
                                                        {
                                                            "name": "next_available_leaf_index",
                                                            "type": {
                                                                "kind": "field"
                                                            }
                                                        }
                                                    ],
                                                    "kind": "struct",
                                                    "path": "aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"
                                                }
                                            },
                                            {
                                                "name": "state",
                                                "type": {
                                                    "fields": [
                                                        {
                                                            "name": "l1_to_l2_message_tree",
                                                            "type": {
                                                                "fields": [
                                                                    {
                                                                        "name": "root",
                                                                        "type": {
                                                                            "kind": "field"
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "next_available_leaf_index",
                                                                        "type": {
                                                                            "kind": "field"
                                                                        }
                                                                    }
                                                                ],
                                                                "kind": "struct",
                                                                "path": "aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"
                                                            }
                                                        },
                                                        {
                                                            "name": "partial",
                                                            "type": {
                                                                "fields": [
                                                                    {
                                                                        "name": "note_hash_tree",
                                                                        "type": {
                                                                            "fields": [
                                                                                {
                                                                                    "name": "root",
                                                                                    "type": {
                                                                                        "kind": "field"
                                                                                    }
                                                                                },
                                                                                {
                                                                                    "name": "next_available_leaf_index",
                                                                                    "type": {
                                                                                        "kind": "field"
                                                                                    }
                                                                                }
                                                                            ],
                                                                            "kind": "struct",
                                                                            "path": "aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "nullifier_tree",
                                                                        "type": {
                                                                            "fields": [
                                                                                {
                                                                                    "name": "root",
                                                                                    "type": {
                                                                                        "kind": "field"
                                                                                    }
                                                                                },
                                                                                {
                                                                                    "name": "next_available_leaf_index",
                                                                                    "type": {
                                                                                        "kind": "field"
                                                                                    }
                                                                                }
                                                                            ],
                                                                            "kind": "struct",
                                                                            "path": "aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "public_data_tree",
                                                                        "type": {
                                                                            "fields": [
                                                                                {
                                                                                    "name": "root",
                                                                                    "type": {
                                                                                        "kind": "field"
                                                                                    }
                                                                                },
                                                                                {
                                                                                    "name": "next_available_leaf_index",
                                                                                    "type": {
                                                                                        "kind": "field"
                                                                                    }
                                                                                }
                                                                            ],
                                                                            "kind": "struct",
                                                                            "path": "aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"
                                                                        }
                                                                    }
                                                                ],
                                                                "kind": "struct",
                                                                "path": "aztec::protocol_types::abis::partial_state_reference::PartialStateReference"
                                                            }
                                                        }
                                                    ],
                                                    "kind": "struct",
                                                    "path": "aztec::protocol_types::abis::state_reference::StateReference"
                                                }
                                            },
                                            {
                                                "name": "sponge_blob_hash",
                                                "type": {
                                                    "kind": "field"
                                                }
                                            },
                                            {
                                                "name": "global_variables",
                                                "type": {
                                                    "fields": [
                                                        {
                                                            "name": "chain_id",
                                                            "type": {
                                                                "kind": "field"
                                                            }
                                                        },
                                                        {
                                                            "name": "version",
                                                            "type": {
                                                                "kind": "field"
                                                            }
                                                        },
                                                        {
                                                            "name": "block_number",
                                                            "type": {
                                                                "kind": "integer",
                                                                "sign": "unsigned",
                                                                "width": 32
                                                            }
                                                        },
                                                        {
                                                            "name": "slot_number",
                                                            "type": {
                                                                "kind": "field"
                                                            }
                                                        },
                                                        {
                                                            "name": "timestamp",
                                                            "type": {
                                                                "kind": "integer",
                                                                "sign": "unsigned",
                                                                "width": 64
                                                            }
                                                        },
                                                        {
                                                            "name": "coinbase",
                                                            "type": {
                                                                "fields": [
                                                                    {
                                                                        "name": "inner",
                                                                        "type": {
                                                                            "kind": "field"
                                                                        }
                                                                    }
                                                                ],
                                                                "kind": "struct",
                                                                "path": "aztec::protocol_types::address::eth_address::EthAddress"
                                                            }
                                                        },
                                                        {
                                                            "name": "fee_recipient",
                                                            "type": {
                                                                "fields": [
                                                                    {
                                                                        "name": "inner",
                                                                        "type": {
                                                                            "kind": "field"
                                                                        }
                                                                    }
                                                                ],
                                                                "kind": "struct",
                                                                "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                                                            }
                                                        },
                                                        {
                                                            "name": "gas_fees",
                                                            "type": {
                                                                "fields": [
                                                                    {
                                                                        "name": "fee_per_da_gas",
                                                                        "type": {
                                                                            "kind": "integer",
                                                                            "sign": "unsigned",
                                                                            "width": 128
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "fee_per_l2_gas",
                                                                        "type": {
                                                                            "kind": "integer",
                                                                            "sign": "unsigned",
                                                                            "width": 128
                                                                        }
                                                                    }
                                                                ],
                                                                "kind": "struct",
                                                                "path": "aztec::protocol_types::abis::gas_fees::GasFees"
                                                            }
                                                        }
                                                    ],
                                                    "kind": "struct",
                                                    "path": "aztec::protocol_types::abis::global_variables::GlobalVariables"
                                                }
                                            },
                                            {
                                                "name": "total_fees",
                                                "type": {
                                                    "kind": "field"
                                                }
                                            },
                                            {
                                                "name": "total_mana_used",
                                                "type": {
                                                    "kind": "field"
                                                }
                                            }
                                        ],
                                        "kind": "struct",
                                        "path": "aztec::protocol_types::abis::block_header::BlockHeader"
                                    }
                                },
                                {
                                    "name": "tx_context",
                                    "type": {
                                        "fields": [
                                            {
                                                "name": "chain_id",
                                                "type": {
                                                    "kind": "field"
                                                }
                                            },
                                            {
                                                "name": "version",
                                                "type": {
                                                    "kind": "field"
                                                }
                                            },
                                            {
                                                "name": "gas_settings",
                                                "type": {
                                                    "fields": [
                                                        {
                                                            "name": "gas_limits",
                                                            "type": {
                                                                "fields": [
                                                                    {
                                                                        "name": "da_gas",
                                                                        "type": {
                                                                            "kind": "integer",
                                                                            "sign": "unsigned",
                                                                            "width": 32
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "l2_gas",
                                                                        "type": {
                                                                            "kind": "integer",
                                                                            "sign": "unsigned",
                                                                            "width": 32
                                                                        }
                                                                    }
                                                                ],
                                                                "kind": "struct",
                                                                "path": "aztec::protocol_types::abis::gas::Gas"
                                                            }
                                                        },
                                                        {
                                                            "name": "teardown_gas_limits",
                                                            "type": {
                                                                "fields": [
                                                                    {
                                                                        "name": "da_gas",
                                                                        "type": {
                                                                            "kind": "integer",
                                                                            "sign": "unsigned",
                                                                            "width": 32
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "l2_gas",
                                                                        "type": {
                                                                            "kind": "integer",
                                                                            "sign": "unsigned",
                                                                            "width": 32
                                                                        }
                                                                    }
                                                                ],
                                                                "kind": "struct",
                                                                "path": "aztec::protocol_types::abis::gas::Gas"
                                                            }
                                                        },
                                                        {
                                                            "name": "max_fees_per_gas",
                                                            "type": {
                                                                "fields": [
                                                                    {
                                                                        "name": "fee_per_da_gas",
                                                                        "type": {
                                                                            "kind": "integer",
                                                                            "sign": "unsigned",
                                                                            "width": 128
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "fee_per_l2_gas",
                                                                        "type": {
                                                                            "kind": "integer",
                                                                            "sign": "unsigned",
                                                                            "width": 128
                                                                        }
                                                                    }
                                                                ],
                                                                "kind": "struct",
                                                                "path": "aztec::protocol_types::abis::gas_fees::GasFees"
                                                            }
                                                        },
                                                        {
                                                            "name": "max_priority_fees_per_gas",
                                                            "type": {
                                                                "fields": [
                                                                    {
                                                                        "name": "fee_per_da_gas",
                                                                        "type": {
                                                                            "kind": "integer",
                                                                            "sign": "unsigned",
                                                                            "width": 128
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "fee_per_l2_gas",
                                                                        "type": {
                                                                            "kind": "integer",
                                                                            "sign": "unsigned",
                                                                            "width": 128
                                                                        }
                                                                    }
                                                                ],
                                                                "kind": "struct",
                                                                "path": "aztec::protocol_types::abis::gas_fees::GasFees"
                                                            }
                                                        }
                                                    ],
                                                    "kind": "struct",
                                                    "path": "aztec::protocol_types::abis::gas_settings::GasSettings"
                                                }
                                            }
                                        ],
                                        "kind": "struct",
                                        "path": "aztec::protocol_types::abis::transaction::tx_context::TxContext"
                                    }
                                },
                                {
                                    "name": "start_side_effect_counter",
                                    "type": {
                                        "kind": "integer",
                                        "sign": "unsigned",
                                        "width": 32
                                    }
                                }
                            ],
                            "kind": "struct",
                            "path": "aztec::context::inputs::private_context_inputs::PrivateContextInputs"
                        },
                        "visibility": "private"
                    },
                    {
                        "name": "token_address",
                        "type": {
                            "fields": [
                                {
                                    "name": "inner",
                                    "type": {
                                        "kind": "field"
                                    }
                                }
                            ],
                            "kind": "struct",
                            "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                        },
                        "visibility": "private"
                    },
                    {
                        "name": "amount",
                        "type": {
                            "kind": "integer",
                            "sign": "unsigned",
                            "width": 64
                        },
                        "visibility": "private"
                    }
                ],
                "return_type": {
                    "abi_type": {
                        "fields": [
                            {
                                "name": "call_context",
                                "type": {
                                    "fields": [
                                        {
                                            "name": "msg_sender",
                                            "type": {
                                                "fields": [
                                                    {
                                                        "name": "inner",
                                                        "type": {
                                                            "kind": "field"
                                                        }
                                                    }
                                                ],
                                                "kind": "struct",
                                                "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                                            }
                                        },
                                        {
                                            "name": "contract_address",
                                            "type": {
                                                "fields": [
                                                    {
                                                        "name": "inner",
                                                        "type": {
                                                            "kind": "field"
                                                        }
                                                    }
                                                ],
                                                "kind": "struct",
                                                "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                                            }
                                        },
                                        {
                                            "name": "function_selector",
                                            "type": {
                                                "fields": [
                                                    {
                                                        "name": "inner",
                                                        "type": {
                                                            "kind": "integer",
                                                            "sign": "unsigned",
                                                            "width": 32
                                                        }
                                                    }
                                                ],
                                                "kind": "struct",
                                                "path": "aztec::protocol_types::abis::function_selector::FunctionSelector"
                                            }
                                        },
                                        {
                                            "name": "is_static_call",
                                            "type": {
                                                "kind": "boolean"
                                            }
                                        }
                                    ],
                                    "kind": "struct",
                                    "path": "aztec::protocol_types::abis::call_context::CallContext"
                                }
                            },
                            {
                                "name": "args_hash",
                                "type": {
                                    "kind": "field"
                                }
                            },
                            {
                                "name": "returns_hash",
                                "type": {
                                    "kind": "field"
                                }
                            },
                            {
                                "name": "anchor_block_header",
                                "type": {
                                    "fields": [
                                        {
                                            "name": "last_archive",
                                            "type": {
                                                "fields": [
                                                    {
                                                        "name": "root",
                                                        "type": {
                                                            "kind": "field"
                                                        }
                                                    },
                                                    {
                                                        "name": "next_available_leaf_index",
                                                        "type": {
                                                            "kind": "field"
                                                        }
                                                    }
                                                ],
                                                "kind": "struct",
                                                "path": "aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"
                                            }
                                        },
                                        {
                                            "name": "state",
                                            "type": {
                                                "fields": [
                                                    {
                                                        "name": "l1_to_l2_message_tree",
                                                        "type": {
                                                            "fields": [
                                                                {
                                                                    "name": "root",
                                                                    "type": {
                                                                        "kind": "field"
                                                                    }
                                                                },
                                                                {
                                                                    "name": "next_available_leaf_index",
                                                                    "type": {
                                                                        "kind": "field"
                                                                    }
                                                                }
                                                            ],
                                                            "kind": "struct",
                                                            "path": "aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"
                                                        }
                                                    },
                                                    {
                                                        "name": "partial",
                                                        "type": {
                                                            "fields": [
                                                                {
                                                                    "name": "note_hash_tree",
                                                                    "type": {
                                                                        "fields": [
                                                                            {
                                                                                "name": "root",
                                                                                "type": {
                                                                                    "kind": "field"
                                                                                }
                                                                            },
                                                                            {
                                                                                "name": "next_available_leaf_index",
                                                                                "type": {
                                                                                    "kind": "field"
                                                                                }
                                                                            }
                                                                        ],
                                                                        "kind": "struct",
                                                                        "path": "aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"
                                                                    }
                                                                },
                                                                {
                                                                    "name": "nullifier_tree",
                                                                    "type": {
                                                                        "fields": [
                                                                            {
                                                                                "name": "root",
                                                                                "type": {
                                                                                    "kind": "field"
                                                                                }
                                                                            },
                                                                            {
                                                                                "name": "next_available_leaf_index",
                                                                                "type": {
                                                                                    "kind": "field"
                                                                                }
                                                                            }
                                                                        ],
                                                                        "kind": "struct",
                                                                        "path": "aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"
                                                                    }
                                                                },
                                                                {
                                                                    "name": "public_data_tree",
                                                                    "type": {
                                                                        "fields": [
                                                                            {
                                                                                "name": "root",
                                                                                "type": {
                                                                                    "kind": "field"
                                                                                }
                                                                            },
                                                                            {
                                                                                "name": "next_available_leaf_index",
                                                                                "type": {
                                                                                    "kind": "field"
                                                                                }
                                                                            }
                                                                        ],
                                                                        "kind": "struct",
                                                                        "path": "aztec::protocol_types::abis::append_only_tree_snapshot::AppendOnlyTreeSnapshot"
                                                                    }
                                                                }
                                                            ],
                                                            "kind": "struct",
                                                            "path": "aztec::protocol_types::abis::partial_state_reference::PartialStateReference"
                                                        }
                                                    }
                                                ],
                                                "kind": "struct",
                                                "path": "aztec::protocol_types::abis::state_reference::StateReference"
                                            }
                                        },
                                        {
                                            "name": "sponge_blob_hash",
                                            "type": {
                                                "kind": "field"
                                            }
                                        },
                                        {
                                            "name": "global_variables",
                                            "type": {
                                                "fields": [
                                                    {
                                                        "name": "chain_id",
                                                        "type": {
                                                            "kind": "field"
                                                        }
                                                    },
                                                    {
                                                        "name": "version",
                                                        "type": {
                                                            "kind": "field"
                                                        }
                                                    },
                                                    {
                                                        "name": "block_number",
                                                        "type": {
                                                            "kind": "integer",
                                                            "sign": "unsigned",
                                                            "width": 32
                                                        }
                                                    },
                                                    {
                                                        "name": "slot_number",
                                                        "type": {
                                                            "kind": "field"
                                                        }
                                                    },
                                                    {
                                                        "name": "timestamp",
                                                        "type": {
                                                            "kind": "integer",
                                                            "sign": "unsigned",
                                                            "width": 64
                                                        }
                                                    },
                                                    {
                                                        "name": "coinbase",
                                                        "type": {
                                                            "fields": [
                                                                {
                                                                    "name": "inner",
                                                                    "type": {
                                                                        "kind": "field"
                                                                    }
                                                                }
                                                            ],
                                                            "kind": "struct",
                                                            "path": "aztec::protocol_types::address::eth_address::EthAddress"
                                                        }
                                                    },
                                                    {
                                                        "name": "fee_recipient",
                                                        "type": {
                                                            "fields": [
                                                                {
                                                                    "name": "inner",
                                                                    "type": {
                                                                        "kind": "field"
                                                                    }
                                                                }
                                                            ],
                                                            "kind": "struct",
                                                            "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                                                        }
                                                    },
                                                    {
                                                        "name": "gas_fees",
                                                        "type": {
                                                            "fields": [
                                                                {
                                                                    "name": "fee_per_da_gas",
                                                                    "type": {
                                                                        "kind": "integer",
                                                                        "sign": "unsigned",
                                                                        "width": 128
                                                                    }
                                                                },
                                                                {
                                                                    "name": "fee_per_l2_gas",
                                                                    "type": {
                                                                        "kind": "integer",
                                                                        "sign": "unsigned",
                                                                        "width": 128
                                                                    }
                                                                }
                                                            ],
                                                            "kind": "struct",
                                                            "path": "aztec::protocol_types::abis::gas_fees::GasFees"
                                                        }
                                                    }
                                                ],
                                                "kind": "struct",
                                                "path": "aztec::protocol_types::abis::global_variables::GlobalVariables"
                                            }
                                        },
                                        {
                                            "name": "total_fees",
                                            "type": {
                                                "kind": "field"
                                            }
                                        },
                                        {
                                            "name": "total_mana_used",
                                            "type": {
                                                "kind": "field"
                                            }
                                        }
                                    ],
                                    "kind": "struct",
                                    "path": "aztec::protocol_types::abis::block_header::BlockHeader"
                                }
                            },
                            {
                                "name": "tx_context",
                                "type": {
                                    "fields": [
                                        {
                                            "name": "chain_id",
                                            "type": {
                                                "kind": "field"
                                            }
                                        },
                                        {
                                            "name": "version",
                                            "type": {
                                                "kind": "field"
                                            }
                                        },
                                        {
                                            "name": "gas_settings",
                                            "type": {
                                                "fields": [
                                                    {
                                                        "name": "gas_limits",
                                                        "type": {
                                                            "fields": [
                                                                {
                                                                    "name": "da_gas",
                                                                    "type": {
                                                                        "kind": "integer",
                                                                        "sign": "unsigned",
                                                                        "width": 32
                                                                    }
                                                                },
                                                                {
                                                                    "name": "l2_gas",
                                                                    "type": {
                                                                        "kind": "integer",
                                                                        "sign": "unsigned",
                                                                        "width": 32
                                                                    }
                                                                }
                                                            ],
                                                            "kind": "struct",
                                                            "path": "aztec::protocol_types::abis::gas::Gas"
                                                        }
                                                    },
                                                    {
                                                        "name": "teardown_gas_limits",
                                                        "type": {
                                                            "fields": [
                                                                {
                                                                    "name": "da_gas",
                                                                    "type": {
                                                                        "kind": "integer",
                                                                        "sign": "unsigned",
                                                                        "width": 32
                                                                    }
                                                                },
                                                                {
                                                                    "name": "l2_gas",
                                                                    "type": {
                                                                        "kind": "integer",
                                                                        "sign": "unsigned",
                                                                        "width": 32
                                                                    }
                                                                }
                                                            ],
                                                            "kind": "struct",
                                                            "path": "aztec::protocol_types::abis::gas::Gas"
                                                        }
                                                    },
                                                    {
                                                        "name": "max_fees_per_gas",
                                                        "type": {
                                                            "fields": [
                                                                {
                                                                    "name": "fee_per_da_gas",
                                                                    "type": {
                                                                        "kind": "integer",
                                                                        "sign": "unsigned",
                                                                        "width": 128
                                                                    }
                                                                },
                                                                {
                                                                    "name": "fee_per_l2_gas",
                                                                    "type": {
                                                                        "kind": "integer",
                                                                        "sign": "unsigned",
                                                                        "width": 128
                                                                    }
                                                                }
                                                            ],
                                                            "kind": "struct",
                                                            "path": "aztec::protocol_types::abis::gas_fees::GasFees"
                                                        }
                                                    },
                                                    {
                                                        "name": "max_priority_fees_per_gas",
                                                        "type": {
                                                            "fields": [
                                                                {
                                                                    "name": "fee_per_da_gas",
                                                                    "type": {
                                                                        "kind": "integer",
                                                                        "sign": "unsigned",
                                                                        "width": 128
                                                                    }
                                                                },
                                                                {
                                                                    "name": "fee_per_l2_gas",
                                                                    "type": {
                                                                        "kind": "integer",
                                                                        "sign": "unsigned",
                                                                        "width": 128
                                                                    }
                                                                }
                                                            ],
                                                            "kind": "struct",
                                                            "path": "aztec::protocol_types::abis::gas_fees::GasFees"
                                                        }
                                                    }
                                                ],
                                                "kind": "struct",
                                                "path": "aztec::protocol_types::abis::gas_settings::GasSettings"
                                            }
                                        }
                                    ],
                                    "kind": "struct",
                                    "path": "aztec::protocol_types::abis::transaction::tx_context::TxContext"
                                }
                            },
                            {
                                "name": "min_revertible_side_effect_counter",
                                "type": {
                                    "kind": "integer",
                                    "sign": "unsigned",
                                    "width": 32
                                }
                            },
                            {
                                "name": "is_fee_payer",
                                "type": {
                                    "kind": "boolean"
                                }
                            },
                            {
                                "name": "expiration_timestamp",
                                "type": {
                                    "kind": "integer",
                                    "sign": "unsigned",
                                    "width": 64
                                }
                            },
                            {
                                "name": "start_side_effect_counter",
                                "type": {
                                    "kind": "integer",
                                    "sign": "unsigned",
                                    "width": 32
                                }
                            },
                            {
                                "name": "end_side_effect_counter",
                                "type": {
                                    "kind": "integer",
                                    "sign": "unsigned",
                                    "width": 32
                                }
                            },
                            {
                                "name": "expected_non_revertible_side_effect_counter",
                                "type": {
                                    "kind": "integer",
                                    "sign": "unsigned",
                                    "width": 32
                                }
                            },
                            {
                                "name": "expected_revertible_side_effect_counter",
                                "type": {
                                    "kind": "integer",
                                    "sign": "unsigned",
                                    "width": 32
                                }
                            },
                            {
                                "name": "note_hash_read_requests",
                                "type": {
                                    "fields": [
                                        {
                                            "name": "array",
                                            "type": {
                                                "kind": "array",
                                                "length": 16,
                                                "type": {
                                                    "fields": [
                                                        {
                                                            "name": "inner",
                                                            "type": {
                                                                "fields": [
                                                                    {
                                                                        "name": "inner",
                                                                        "type": {
                                                                            "kind": "field"
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "counter",
                                                                        "type": {
                                                                            "kind": "integer",
                                                                            "sign": "unsigned",
                                                                            "width": 32
                                                                        }
                                                                    }
                                                                ],
                                                                "kind": "struct",
                                                                "path": "aztec::protocol_types::side_effect::counted::Counted"
                                                            }
                                                        },
                                                        {
                                                            "name": "contract_address",
                                                            "type": {
                                                                "fields": [
                                                                    {
                                                                        "name": "inner",
                                                                        "type": {
                                                                            "kind": "field"
                                                                        }
                                                                    }
                                                                ],
                                                                "kind": "struct",
                                                                "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                                                            }
                                                        }
                                                    ],
                                                    "kind": "struct",
                                                    "path": "aztec::protocol_types::side_effect::scoped::Scoped"
                                                }
                                            }
                                        },
                                        {
                                            "name": "length",
                                            "type": {
                                                "kind": "integer",
                                                "sign": "unsigned",
                                                "width": 32
                                            }
                                        }
                                    ],
                                    "kind": "struct",
                                    "path": "aztec::protocol_types::utils::arrays::claimed_length_array::ClaimedLengthArray"
                                }
                            },
                            {
                                "name": "nullifier_read_requests",
                                "type": {
                                    "fields": [
                                        {
                                            "name": "array",
                                            "type": {
                                                "kind": "array",
                                                "length": 16,
                                                "type": {
                                                    "fields": [
                                                        {
                                                            "name": "inner",
                                                            "type": {
                                                                "fields": [
                                                                    {
                                                                        "name": "inner",
                                                                        "type": {
                                                                            "kind": "field"
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "counter",
                                                                        "type": {
                                                                            "kind": "integer",
                                                                            "sign": "unsigned",
                                                                            "width": 32
                                                                        }
                                                                    }
                                                                ],
                                                                "kind": "struct",
                                                                "path": "aztec::protocol_types::side_effect::counted::Counted"
                                                            }
                                                        },
                                                        {
                                                            "name": "contract_address",
                                                            "type": {
                                                                "fields": [
                                                                    {
                                                                        "name": "inner",
                                                                        "type": {
                                                                            "kind": "field"
                                                                        }
                                                                    }
                                                                ],
                                                                "kind": "struct",
                                                                "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                                                            }
                                                        }
                                                    ],
                                                    "kind": "struct",
                                                    "path": "aztec::protocol_types::side_effect::scoped::Scoped"
                                                }
                                            }
                                        },
                                        {
                                            "name": "length",
                                            "type": {
                                                "kind": "integer",
                                                "sign": "unsigned",
                                                "width": 32
                                            }
                                        }
                                    ],
                                    "kind": "struct",
                                    "path": "aztec::protocol_types::utils::arrays::claimed_length_array::ClaimedLengthArray"
                                }
                            },
                            {
                                "name": "key_validation_requests_and_separators",
                                "type": {
                                    "fields": [
                                        {
                                            "name": "array",
                                            "type": {
                                                "kind": "array",
                                                "length": 16,
                                                "type": {
                                                    "fields": [
                                                        {
                                                            "name": "request",
                                                            "type": {
                                                                "fields": [
                                                                    {
                                                                        "name": "pk_m",
                                                                        "type": {
                                                                            "fields": [
                                                                                {
                                                                                    "name": "x",
                                                                                    "type": {
                                                                                        "kind": "field"
                                                                                    }
                                                                                },
                                                                                {
                                                                                    "name": "y",
                                                                                    "type": {
                                                                                        "kind": "field"
                                                                                    }
                                                                                },
                                                                                {
                                                                                    "name": "is_infinite",
                                                                                    "type": {
                                                                                        "kind": "boolean"
                                                                                    }
                                                                                }
                                                                            ],
                                                                            "kind": "struct",
                                                                            "path": "std::embedded_curve_ops::EmbeddedCurvePoint"
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "sk_app",
                                                                        "type": {
                                                                            "kind": "field"
                                                                        }
                                                                    }
                                                                ],
                                                                "kind": "struct",
                                                                "path": "aztec::protocol_types::abis::validation_requests::key_validation_request::KeyValidationRequest"
                                                            }
                                                        },
                                                        {
                                                            "name": "key_type_domain_separator",
                                                            "type": {
                                                                "kind": "field"
                                                            }
                                                        }
                                                    ],
                                                    "kind": "struct",
                                                    "path": "aztec::protocol_types::abis::validation_requests::key_validation_request_and_separator::KeyValidationRequestAndSeparator"
                                                }
                                            }
                                        },
                                        {
                                            "name": "length",
                                            "type": {
                                                "kind": "integer",
                                                "sign": "unsigned",
                                                "width": 32
                                            }
                                        }
                                    ],
                                    "kind": "struct",
                                    "path": "aztec::protocol_types::utils::arrays::claimed_length_array::ClaimedLengthArray"
                                }
                            },
                            {
                                "name": "private_call_requests",
                                "type": {
                                    "fields": [
                                        {
                                            "name": "array",
                                            "type": {
                                                "kind": "array",
                                                "length": 8,
                                                "type": {
                                                    "fields": [
                                                        {
                                                            "name": "call_context",
                                                            "type": {
                                                                "fields": [
                                                                    {
                                                                        "name": "msg_sender",
                                                                        "type": {
                                                                            "fields": [
                                                                                {
                                                                                    "name": "inner",
                                                                                    "type": {
                                                                                        "kind": "field"
                                                                                    }
                                                                                }
                                                                            ],
                                                                            "kind": "struct",
                                                                            "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "contract_address",
                                                                        "type": {
                                                                            "fields": [
                                                                                {
                                                                                    "name": "inner",
                                                                                    "type": {
                                                                                        "kind": "field"
                                                                                    }
                                                                                }
                                                                            ],
                                                                            "kind": "struct",
                                                                            "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "function_selector",
                                                                        "type": {
                                                                            "fields": [
                                                                                {
                                                                                    "name": "inner",
                                                                                    "type": {
                                                                                        "kind": "integer",
                                                                                        "sign": "unsigned",
                                                                                        "width": 32
                                                                                    }
                                                                                }
                                                                            ],
                                                                            "kind": "struct",
                                                                            "path": "aztec::protocol_types::abis::function_selector::FunctionSelector"
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "is_static_call",
                                                                        "type": {
                                                                            "kind": "boolean"
                                                                        }
                                                                    }
                                                                ],
                                                                "kind": "struct",
                                                                "path": "aztec::protocol_types::abis::call_context::CallContext"
                                                            }
                                                        },
                                                        {
                                                            "name": "args_hash",
                                                            "type": {
                                                                "kind": "field"
                                                            }
                                                        },
                                                        {
                                                            "name": "returns_hash",
                                                            "type": {
                                                                "kind": "field"
                                                            }
                                                        },
                                                        {
                                                            "name": "start_side_effect_counter",
                                                            "type": {
                                                                "kind": "integer",
                                                                "sign": "unsigned",
                                                                "width": 32
                                                            }
                                                        },
                                                        {
                                                            "name": "end_side_effect_counter",
                                                            "type": {
                                                                "kind": "integer",
                                                                "sign": "unsigned",
                                                                "width": 32
                                                            }
                                                        }
                                                    ],
                                                    "kind": "struct",
                                                    "path": "aztec::protocol_types::abis::private_call_request::PrivateCallRequest"
                                                }
                                            }
                                        },
                                        {
                                            "name": "length",
                                            "type": {
                                                "kind": "integer",
                                                "sign": "unsigned",
                                                "width": 32
                                            }
                                        }
                                    ],
                                    "kind": "struct",
                                    "path": "aztec::protocol_types::utils::arrays::claimed_length_array::ClaimedLengthArray"
                                }
                            },
                            {
                                "name": "public_call_requests",
                                "type": {
                                    "fields": [
                                        {
                                            "name": "array",
                                            "type": {
                                                "kind": "array",
                                                "length": 32,
                                                "type": {
                                                    "fields": [
                                                        {
                                                            "name": "inner",
                                                            "type": {
                                                                "fields": [
                                                                    {
                                                                        "name": "msg_sender",
                                                                        "type": {
                                                                            "fields": [
                                                                                {
                                                                                    "name": "inner",
                                                                                    "type": {
                                                                                        "kind": "field"
                                                                                    }
                                                                                }
                                                                            ],
                                                                            "kind": "struct",
                                                                            "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "contract_address",
                                                                        "type": {
                                                                            "fields": [
                                                                                {
                                                                                    "name": "inner",
                                                                                    "type": {
                                                                                        "kind": "field"
                                                                                    }
                                                                                }
                                                                            ],
                                                                            "kind": "struct",
                                                                            "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "is_static_call",
                                                                        "type": {
                                                                            "kind": "boolean"
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "calldata_hash",
                                                                        "type": {
                                                                            "kind": "field"
                                                                        }
                                                                    }
                                                                ],
                                                                "kind": "struct",
                                                                "path": "aztec::protocol_types::abis::public_call_request::PublicCallRequest"
                                                            }
                                                        },
                                                        {
                                                            "name": "counter",
                                                            "type": {
                                                                "kind": "integer",
                                                                "sign": "unsigned",
                                                                "width": 32
                                                            }
                                                        }
                                                    ],
                                                    "kind": "struct",
                                                    "path": "aztec::protocol_types::side_effect::counted::Counted"
                                                }
                                            }
                                        },
                                        {
                                            "name": "length",
                                            "type": {
                                                "kind": "integer",
                                                "sign": "unsigned",
                                                "width": 32
                                            }
                                        }
                                    ],
                                    "kind": "struct",
                                    "path": "aztec::protocol_types::utils::arrays::claimed_length_array::ClaimedLengthArray"
                                }
                            },
                            {
                                "name": "public_teardown_call_request",
                                "type": {
                                    "fields": [
                                        {
                                            "name": "msg_sender",
                                            "type": {
                                                "fields": [
                                                    {
                                                        "name": "inner",
                                                        "type": {
                                                            "kind": "field"
                                                        }
                                                    }
                                                ],
                                                "kind": "struct",
                                                "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                                            }
                                        },
                                        {
                                            "name": "contract_address",
                                            "type": {
                                                "fields": [
                                                    {
                                                        "name": "inner",
                                                        "type": {
                                                            "kind": "field"
                                                        }
                                                    }
                                                ],
                                                "kind": "struct",
                                                "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                                            }
                                        },
                                        {
                                            "name": "is_static_call",
                                            "type": {
                                                "kind": "boolean"
                                            }
                                        },
                                        {
                                            "name": "calldata_hash",
                                            "type": {
                                                "kind": "field"
                                            }
                                        }
                                    ],
                                    "kind": "struct",
                                    "path": "aztec::protocol_types::abis::public_call_request::PublicCallRequest"
                                }
                            },
                            {
                                "name": "note_hashes",
                                "type": {
                                    "fields": [
                                        {
                                            "name": "array",
                                            "type": {
                                                "kind": "array",
                                                "length": 16,
                                                "type": {
                                                    "fields": [
                                                        {
                                                            "name": "inner",
                                                            "type": {
                                                                "kind": "field"
                                                            }
                                                        },
                                                        {
                                                            "name": "counter",
                                                            "type": {
                                                                "kind": "integer",
                                                                "sign": "unsigned",
                                                                "width": 32
                                                            }
                                                        }
                                                    ],
                                                    "kind": "struct",
                                                    "path": "aztec::protocol_types::side_effect::counted::Counted"
                                                }
                                            }
                                        },
                                        {
                                            "name": "length",
                                            "type": {
                                                "kind": "integer",
                                                "sign": "unsigned",
                                                "width": 32
                                            }
                                        }
                                    ],
                                    "kind": "struct",
                                    "path": "aztec::protocol_types::utils::arrays::claimed_length_array::ClaimedLengthArray"
                                }
                            },
                            {
                                "name": "nullifiers",
                                "type": {
                                    "fields": [
                                        {
                                            "name": "array",
                                            "type": {
                                                "kind": "array",
                                                "length": 16,
                                                "type": {
                                                    "fields": [
                                                        {
                                                            "name": "inner",
                                                            "type": {
                                                                "fields": [
                                                                    {
                                                                        "name": "value",
                                                                        "type": {
                                                                            "kind": "field"
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "note_hash",
                                                                        "type": {
                                                                            "kind": "field"
                                                                        }
                                                                    }
                                                                ],
                                                                "kind": "struct",
                                                                "path": "aztec::protocol_types::abis::nullifier::Nullifier"
                                                            }
                                                        },
                                                        {
                                                            "name": "counter",
                                                            "type": {
                                                                "kind": "integer",
                                                                "sign": "unsigned",
                                                                "width": 32
                                                            }
                                                        }
                                                    ],
                                                    "kind": "struct",
                                                    "path": "aztec::protocol_types::side_effect::counted::Counted"
                                                }
                                            }
                                        },
                                        {
                                            "name": "length",
                                            "type": {
                                                "kind": "integer",
                                                "sign": "unsigned",
                                                "width": 32
                                            }
                                        }
                                    ],
                                    "kind": "struct",
                                    "path": "aztec::protocol_types::utils::arrays::claimed_length_array::ClaimedLengthArray"
                                }
                            },
                            {
                                "name": "l2_to_l1_msgs",
                                "type": {
                                    "fields": [
                                        {
                                            "name": "array",
                                            "type": {
                                                "kind": "array",
                                                "length": 8,
                                                "type": {
                                                    "fields": [
                                                        {
                                                            "name": "inner",
                                                            "type": {
                                                                "fields": [
                                                                    {
                                                                        "name": "recipient",
                                                                        "type": {
                                                                            "fields": [
                                                                                {
                                                                                    "name": "inner",
                                                                                    "type": {
                                                                                        "kind": "field"
                                                                                    }
                                                                                }
                                                                            ],
                                                                            "kind": "struct",
                                                                            "path": "aztec::protocol_types::address::eth_address::EthAddress"
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "content",
                                                                        "type": {
                                                                            "kind": "field"
                                                                        }
                                                                    }
                                                                ],
                                                                "kind": "struct",
                                                                "path": "aztec::protocol_types::messaging::l2_to_l1_message::L2ToL1Message"
                                                            }
                                                        },
                                                        {
                                                            "name": "counter",
                                                            "type": {
                                                                "kind": "integer",
                                                                "sign": "unsigned",
                                                                "width": 32
                                                            }
                                                        }
                                                    ],
                                                    "kind": "struct",
                                                    "path": "aztec::protocol_types::side_effect::counted::Counted"
                                                }
                                            }
                                        },
                                        {
                                            "name": "length",
                                            "type": {
                                                "kind": "integer",
                                                "sign": "unsigned",
                                                "width": 32
                                            }
                                        }
                                    ],
                                    "kind": "struct",
                                    "path": "aztec::protocol_types::utils::arrays::claimed_length_array::ClaimedLengthArray"
                                }
                            },
                            {
                                "name": "private_logs",
                                "type": {
                                    "fields": [
                                        {
                                            "name": "array",
                                            "type": {
                                                "kind": "array",
                                                "length": 16,
                                                "type": {
                                                    "fields": [
                                                        {
                                                            "name": "inner",
                                                            "type": {
                                                                "fields": [
                                                                    {
                                                                        "name": "log",
                                                                        "type": {
                                                                            "fields": [
                                                                                {
                                                                                    "name": "fields",
                                                                                    "type": {
                                                                                        "kind": "array",
                                                                                        "length": 16,
                                                                                        "type": {
                                                                                            "kind": "field"
                                                                                        }
                                                                                    }
                                                                                },
                                                                                {
                                                                                    "name": "length",
                                                                                    "type": {
                                                                                        "kind": "integer",
                                                                                        "sign": "unsigned",
                                                                                        "width": 32
                                                                                    }
                                                                                }
                                                                            ],
                                                                            "kind": "struct",
                                                                            "path": "aztec::protocol_types::abis::log::Log"
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "note_hash_counter",
                                                                        "type": {
                                                                            "kind": "integer",
                                                                            "sign": "unsigned",
                                                                            "width": 32
                                                                        }
                                                                    }
                                                                ],
                                                                "kind": "struct",
                                                                "path": "aztec::protocol_types::abis::private_log::PrivateLogData"
                                                            }
                                                        },
                                                        {
                                                            "name": "counter",
                                                            "type": {
                                                                "kind": "integer",
                                                                "sign": "unsigned",
                                                                "width": 32
                                                            }
                                                        }
                                                    ],
                                                    "kind": "struct",
                                                    "path": "aztec::protocol_types::side_effect::counted::Counted"
                                                }
                                            }
                                        },
                                        {
                                            "name": "length",
                                            "type": {
                                                "kind": "integer",
                                                "sign": "unsigned",
                                                "width": 32
                                            }
                                        }
                                    ],
                                    "kind": "struct",
                                    "path": "aztec::protocol_types::utils::arrays::claimed_length_array::ClaimedLengthArray"
                                }
                            },
                            {
                                "name": "contract_class_logs_hashes",
                                "type": {
                                    "fields": [
                                        {
                                            "name": "array",
                                            "type": {
                                                "kind": "array",
                                                "length": 1,
                                                "type": {
                                                    "fields": [
                                                        {
                                                            "name": "inner",
                                                            "type": {
                                                                "fields": [
                                                                    {
                                                                        "name": "value",
                                                                        "type": {
                                                                            "kind": "field"
                                                                        }
                                                                    },
                                                                    {
                                                                        "name": "length",
                                                                        "type": {
                                                                            "kind": "integer",
                                                                            "sign": "unsigned",
                                                                            "width": 32
                                                                        }
                                                                    }
                                                                ],
                                                                "kind": "struct",
                                                                "path": "aztec::protocol_types::abis::log_hash::LogHash"
                                                            }
                                                        },
                                                        {
                                                            "name": "counter",
                                                            "type": {
                                                                "kind": "integer",
                                                                "sign": "unsigned",
                                                                "width": 32
                                                            }
                                                        }
                                                    ],
                                                    "kind": "struct",
                                                    "path": "aztec::protocol_types::side_effect::counted::Counted"
                                                }
                                            }
                                        },
                                        {
                                            "name": "length",
                                            "type": {
                                                "kind": "integer",
                                                "sign": "unsigned",
                                                "width": 32
                                            }
                                        }
                                    ],
                                    "kind": "struct",
                                    "path": "aztec::protocol_types::utils::arrays::claimed_length_array::ClaimedLengthArray"
                                }
                            }
                        ],
                        "kind": "struct",
                        "path": "aztec::protocol_types::abis::private_circuit_public_inputs::PrivateCircuitPublicInputs"
                    },
                    "visibility": "databus"
                }
            },
            "bytecode": "H4sIAAAAAAAA/+2dd2AURfvH8zwTEnoVxIJE6QooqNgLJfQmxY4xJAdEQxIvFwR77N0kgIBduiCIil2wYd+vKFYQBeyKDZVm/W1Iub1cLplL8kVff77/vMPt7OeZnZmdnZ3ZfDQF+TPWtktKSr4g4EtJyvAnpWUEfP6M5PTspKRUf1pWUiAzKcufNik54ENs0/VmY+6yXunJKef2ypzcNycjpXdyenruvBE9h/ZLLMhdcEpaIMOXna0JFpmMWGRqYkNqdqJFphbOZRa59rTKta9NqVrZZNrPJlNrm0wJViXf3yrXAVa52ljlamtT+PYn5i7u5U9LT08bX3h8Wkxe3tS8vFUJMRX/T3IX9czO9vkDp/v8mVPz8gtWJRySOtS/qds9nR4fnvhobu6pYzoe+lX/KU9k5ffetHXqj+4pMDdVjH23y6fnVgV7c0SsKUmUUxHLh2dm+9JSMzO6D/f5J+YEkgNpmRkF00orxi1uabpdsLo8x2+eBnMLTB5MPkxBaMkLCiqvwrZWVzfVoi0qb2aXkxB9CZtZlXBaJSA56TKrEk4r0xUlP3f+yLSM8em+op5QWWlt6ipmF3NiVroPZrpdR7cp+nQJLXodctFvjf4ezZ9qVQyXbVfgGZV3jarFn1H5lVWFPN0lT7Xqz9Otcs2wyjWzCq1kUcLia7G4aru2tLqWWZR2cVt8ut04f5tF/JC7UKO8C6XyAOtjGgfvwtuDyTuCyTuDybuCybuDyXuCyXuDydnB5Jxgcm4wOS+YnB9MLggmFwaT9wWTi2pulLvXLttcu2wL7LItqtJUY3HFl3zx2M8uqAr2/ojY2JJElaYaiz3p2z3puzzp+93pxhKYpTAPwCwLLb3dYHCHVa4lVjXxoMXNWJWaeNCTXupJP+BJL3Nr4iGYh2GWwzxS7Qq/05N+qMz87lGYx2Aeh3miKt3lyYorqespDQdWBftURGyDatX9k5703Z70PZ70U26lPA2zAmYlzDNV6YX3WuV62qomno3ykWRZxNlWuVZYFfE5ThHnWOVaaVXE50n38rOe9HOe9POe9DNuf3oBZhXMizAvVaUm5lrlesGqJl7mNNY8q1yrrIr4CqeI861yvWhVxFdJ/ellT/oVT/pVT/oltz+9BvM6jAODqtTEAqtcr1nVxBucxlpolet1qyKu5hTxPqtcjlUR3yT1pzc86dWe9JueNNz+9BbMGpi3Yd6pSk0sssr1llVNvEuqiXc96TWe9Nue9DtuTbwH8z7MBzBrqzJvWVdx6c+ZORBVKv06T/o9T/rRMpO5D2HWw3wE83Hoe6KJerXmw8rboSD4CrYhmNxYhcVVu272oVUTbAjPdWaZXC5rY7Rv2rEFwRos5/rKRoi2ujdEtTi2qebeeDeV0xR2lVw2XNn4LtuK9UmltRljdSWfuFsGVbiUjVa57C7l0/BLKXuS1aV8Wu7ux9IhOemBtJEpyenJfjc5bWruwt6ZGdmB5IyARWcIz6urm52VEzd3TEqXDg0St7RsOu2KE1bddPkJHTpHwY3xFnuDJ70xmsJNhfkM5nOYL8q57GWJE8f6UlN9qb1z/JN8PVNT3QsPxvnMk/7ck/7Cm2m2Jz3Hu44TZSG/hPkK5uvwbYbKuoZYDQJfRjtRsXsofVMx9ruNB0yq0kPpm9K0RFjQKXwkbYb5FuY7mO+rt4EgUY2QP3C2D9xG+iEvym0By1b6seLoZuKIS6vUSj+W20qby7TSFpifYH6G+SW0lWoVRPsk22zRiYkNv7XmHo1bJfr9RHe136q1t9VQGbclVO+uiqk8i6dyt3PuKrc+tttV7narXDsIG3duGXfk20avJFPM7myznbQ222lXHzur0BqVnVDYGjY9JsbqZvyV9M55kyf9a8QPLH6D+R3mD5g/Q7tFXEHuvJ5+f/KUAtuh1+I67FDta3oMd6+ycqTlZzkhlRQ/PbqCtIvmyiopzY4dPfciVEO0yG01jTRRvfr/VZqMjam5Z+9fCVV59v5lc7vHSs2UMVbKPHtrR7vIElv5SO5ObYoGgap+s1bZGVaFqOZXS7FRTeFitca6UaxW5QuhWTC3Wc3ZY020VRf1V1M2ITxVF0v6airWuGy7AtdifDVVGL9WXrS1XTf48mL31VFJy1denop79K61MNvnyK7MwQE1Ni6YjK+5OyHOLlt8QhU+1iqstql21VbxbVWwa3E2Ns7q5ou3aILoO1qtwvBW8e1KWZtyO6oLthui6kS5pmT9SdtMu/h1qxC/cqr99ddj1H8Uj4j61Ri08uw6otXiYiUNUa0Rq0Ew2bDmRqwGdtkalpkpTqvJOrMarhpYRWxIGa7cG6GB1YpTrFrlsruWRlW4qaxu6gZ2jxG1ymV3LY2jHKAKrNqljtt5rDLWdYcou5GkCaWghWW1yljPHcvsCto02m0Mu5e76XbdvCrBK11usihgB0Zgm2GqIyOwzR3WiRHYWAQ+kNHBDrJaKrylKlt0lYXuzKjIWIvAXRiBa1kE7soIHGcR+GBG4HiLwIcwAte2CNyNEbiOReDujMB1LQIfyghczyLwYYzA9S0CH84I3MAicA9G4IYWgY9gBG5kEfhIRuDGFoGPYgRuYhH4aEbgphaBj2EEbmYR+FhG4D0sAh/HCNzcIvDxjMAtLAKfwAi8p0XgExmBW1oE7skIvJdF4F6MwHtbBO7NCLyPReA+jMD7WgROZARuZRG4LyPwfhaB+zECt7YI3J8ROMEi8ABG4P0tAg9kBD7AIvAgRuA2FoEHM166hzCgQxkrE8OsViamMVqnrUXxhjOu+aQa+pIjfEnUguoucFtlbOwuytr0ihGUYtaPophNbYo5knFHjGJARzOgJzOgpzCgpzKgpzGgpzOgZzCgZzKgYxjQsxjQJAb0bAY0mQEdy4CmMKCpDKiPAR3HgI5nQCcwoGkM6DkM6LkMaDoDOpEBzWBAMxnQLAb0PAbUz4BmM6ABBjSHAZ3EgJ7PgE5mQKcwoBcwoBcyoBcxoBczoJcwoJcyoM5lFGouhXo5hXoFhXolY8Gj8C/Jt1p9nbvFzWizyORcZbWytoWxwOVcbRV7apSxbb60dGtoq1UzXkPpHNdSqNdRqNdTqDdQqDdSqDdRqDdTqJSP85w8CjWfQi2gUKdSqNMo1OkU6q0U6gwKdSaFOotCvY1CvZ1CvYNCvZNCvYtCvZtCvYdCvZdCnU2hzqFQ51Ko8yjU+RTqAgp1IYV6H4W6iEJdTKHeT6EuoVCXUqgPUKjLKNQHKdSHKNSHKdTlFOojVbHLVUp9lFLWxyjUxynUJyjUJynUpyjUpynUFRTqSgr1GQr1WQr1OQr1eQr1BQp1FYX6IoX6EoX6MoX6CoX6KoX6GoX6OoXqUKigUN+gUFdTqG9SqG9RqGso1Lcp1Hco1Hcp1Pco1Pcp1A8o1LUU6joK9UMKdT2F+hGF+jGFuoFC3UihbqJQP6FQP6VQP6NQP6dQv6BQv6RQv6JQv6ZQv6FQN1Oo31Ko31Go31OoP1CoP1KoWyjUnyjUnynUXyjUrRTqNgp1O4W6g0LdSaH+SqH+RqH+TqH+QaH+SaH+xaBCYjhY4WCVgzUcbCwHW4uDjYsWW2P/7S6JZ4RuZxW6Nqcy61Tsvt0ev/Kr6K/IWIWuW5XKrBxbr8Dmk+vfONVZn3NNVpJbs40TvKFVcNKw34iDbczBNuFgm3KwzTjYPTjY5hxsCw52Tw62JQe7Fwe7Nwe7Dwe7LwfbioPdj4NtzcEmcLD7c7AHcLBtONi2HGw7DrY9B9uBg+3IwXbiYA/kYA/iYDtzsF042K4c7MEc7CEcbDcOtjsHeygHexgHezgH24ODPYKDPZKDPYqDPZqDPYaDPZaDPY6DPZ6DPYGDPZGD7cnB9uJge3OwfTjYRA62Lwfbj/EXI4herGyHHcDBDuRgB3GwgznYIRzsUA52GAc7nIM9iYMdwcGO5GBHcbCjOdiTOdhTONhTOdjTONjTOdgzONgzOdgxHOxZHGwSB3s2B5vMwY7lYFM42FQO1sfBjuNgx3OwEzjYNA72HA72XA42nYOdyMFmcLCZHGwWB3seB+vnYLM52AAHm8PBTuJgz+dgJ3OwUzjYCzjYCznYizjYiznYSzjYSznYyzjYXA72cg72Cg72Sg72Kg72ag72Gg72Wg72Og72eg72Bg72Rg72Jg72Zg72Fg42j4PN52ALONipHOw0DnY6B3srBzuDg53Jwc7iYG/jYG/nYO/gYO/kYO/iYO/mYO/hYO/lYGdzsHM42Lkc7DwOdj4Hu4CDXcjB3sfBLuJgF3Ow93OwSzjYpRzsAxzsMg72QQ72IQ72YQ52OQf7CAf7KAf7GAf7OAf7BAf7JAf7FAf7NAe7goNdycE+w8E+y8E+x8E+z8G+wMGu4mBf5GBf4mBf5mBf4WBf5WBf42Bf52AdDhYc7Bsc7GoO9k0O9i0Odg0H+zYH+w4H+y4H+x4H+z4H+wEHu5aDXcfBfsjBrudgP+JgP+ZgN3CwGznYTRzsJxzspxzsZxzs5xzsFxzslxzsVxzs1xzsNxzsZg72Ww72Ow72ew72Bw72Rw52Cwf7Ewf7Mwf7Cwe7lYPdxsFu52B3cLA7OdhfOViS2/F3DvYPDvZPDpajeVSO3Vc5dl/l2H2VY/dVjt1XOXZfjeNg4zlYjpVX63CwdTnYehxsfQ62AQfbkIPl+G+V479Vjv9Wm3KwHP+tcvy3yvHfKsd/qxz/rXL8t8rx3yrHf6sc/61y/LfK8d8qx3+rHP+tcvy3yvHfKsd/qxz/rXL8t8rx3yrHf6sc/61y/LfK8d8qx3+rHP+tcvy3yvHfKsd/qxz/rXL8t8rx32p3Dpbjv1WO/1Y5/lvl+G+V479Vjv9WOf5b5fhvleO/VY7/Vjn+W+X4b5Xjv1WO/1Y5/lvl+G+V479Vjv9WOf5b5fhvtR8Hy/HfKsd/qxz/rXL8t8rx3yrHf6sc/61y/LfK8d8qx3+rIzhYjv9WOf5b5fhvleO/VY7/Vjn+W+X4b5Xjv1WO/1Y5/lvl+G+V479Vjv9WOf5b5fhvleO/VY7/Vjn+W+X4b5Xjv1WO/1Y5/lvl+G+V479Vjv9WOf5b5fhvleO/VY7/Vjn+W+X4b9XPwXL8t8rx3yrHf6sc/61y/LfK8d8qx3+rHP+tcvy3yvHfKsd/qxz/rXL8t8rx3yrHf6sc/61y/LfK8d8qx3+rHP+tcvy3yvHfKsd/qxz/rXL8t8rx3yrHf6sc/61y/LfK8d8qx3+rBRwsx3+rHP+tcvy3yvHfKsd/qxz/rXL8t8rx3yrHf6sc/61y/LfK8d8qx3+rHP+tcvy3yvHfKsd/qxz/rXL8t8rx3yrHf6sc/61y/LfK8d8qx3+rHP+tcvy3yvHfKsd/qxz/rXL8t/oQB8vx3yrHf6sc/61y/LfK8d8qx3+rHP+tcvy3yvHfKsd/qxz/rXL8t8rx3yrHf6sc/61y/LfK8d8qx3+rHP+tcvy3yvHfKsd/qxz/rXL8t8rx3yrHf6sc/61y/LfK8d8qx3+rHP+truFgOf5b5fhvleO/VY7/Vjn+W+X4b5Xjv1WO/1Y5/lvl+G+V479Vjv9WOf5b5fhvleO/VY7/Vjn+W+X4b5Xjv1WO/1Y5/lvl+G+V479Vjv9WOf5b5fhvleO/VY7/Vjn+W+X4b5Xjv9WfOFiO/1Y5/lvl+G+V479Vjv9WOf5b5fhvleO/VY7/Vjn+W+X4b5Xjv1WO/9Zw/LeG4781HP+t4fhvDcd/azj+W8Px3xqO/9Zw/LeG4781HP+t4fhvDcd/azj+W8Px3xqO/9Zw/LeG4781TTlYjv/WcPy3huO/NRz/reH4bw3Hf2s4/lvD8d8ajv/WcPy3huO/NRz/reH4bw3Hf2s4/lvD8d8ajv/WcPy3huO/NRz/reH4bw3Hf2s4/lvD8d8ajv/WcPy3huO/NRz/reH4bw3Hf2s4/lvTnYPl+G8Nx39rOP5bw/HfGo7/1nD8t4bjvzUc/63h+G8Nx39rOP5bw/HfGo7/1nD8t4bjvzUc/63h+G8Nx39rOP5bw/HfGo7/1nD8t4bjvzUc/63h+G8Nx39rOP5bw/HfGo7/1nD8t4bjvzUjOFiO/9Zw/LeG4781HP+t4fhvDcd/azj+W8Px3xqO/9Zw/LeG4781HP+t4fhvDcd/azj+W8Px3xqO/9Zw/LeG4781HP+t4fhvDcd/azj+W8Px3xqO/9Zw/LeG4781HP+t4fhvDcd/azj+W+PnYDn+W8Px3xqO/9Zw/LeG4781HP+t4fhvDcd/azj+W8Px3xqO/9Zw/LeG4781HP+t4fhvDcd/azj+W8Px3xqO/9Zw/LeG4781HP+t4fhvDcd/azj+W2Plvx3im5jpnzIgIy0wtfF6M65Dx04HHtS5S9eDD+nW/dDDDu9xxJFHHX3Msccdf8KJPXv17pPYt1//AQMHDR4ydNjwk0aMHDX65FNOPe30M84cc1bS2cljU1J948ZPSDvn3PSJGZlZ5/mzAzmTzp885YILL7r4kkudy5xc53LnCudK5yrnauca51rnOud65wbnRucm52bnFifPyXcKnKnONGe6c6szw5npzHJuc2537nDudO5y7nbuce51ZjtznLnOPGe+s8BZ6NznLHIWO/c7S5ylzgPOMudB5yHnYWe584jzqPOY87jzhPOk85TztLPCWek84zzrPOc877zgrHJedF5yXnZecV51XnNedxwHzhvOaudN5y1njfO2847zrvOe877zgbPWWed86Kx3PnI+djY4G51NzifOp85nzufOF86XzlfO1843zmbnW+c753vnB+dHZ4vzk/Oz84uz1dnmbHd2ODudX53fnN+dP5w/nb8gMRCBKMRAYiG1IHGQeEhtSB1IXUg9SH1IA0hDSCNIY0gTSFNIM8gekOaQFpA9IS0he0H2huwD2RfSCrIfpDUkAbI/5ABIG0hbSDtIe0gHSEdIJ8iBkIMgnSFdIF0hB0MOgXSDdIccCjkMcjikB+QIyJGQoyBHQ46BHAs5DnI85ATIiZCekF6Q3pA+kERIX0g/SH/IAMhAyCDIYMgQyFDIMMhwyEmQEZCRkFGQ0ZCTIadAToWcBjkdcgbkTMgYyFmQJMjZkGTIWEgKJBXig4yDjIdMgKRBzoGcC0mHTIRkQDIhWZDzIH5INiQAyYFMgpwPmQyZArkAciHkIsjFkEsgl0Iug+RCLodcAbkSchXkasg1kGsh10Guh9wAuRFyE+RmyC2QPEg+pAAyFTINMh1yK2QGZCZkFuQ2yO2QOyB3Qu6C3A25B3IvZDZkDmQuZB5kPmQBZCHkPsgiyGLI/ZAlkKWQByDLIA9CHoI8DFkOeQTyKOQxyOOQJyBPQp6CPA1ZAVkJeQbyLOQ5yPOQFyCrIC9CXoK8DHkF8irkNcjrEAcCyBuQ1ZA3IW9B1kDehrwDeRfyHuR9yAeQtZB1kA8h6yEfQT6GbIBshGyCfAL5FPIZ5HPIF5AvIV9BvoZ8A9kM+RbyHeR7yA+QHyFbID9Bfob8AtkK2QbZDtkB2Qn5FfIb5HfIH5A/IX9BY6ACVaiBxkJrQeOg8dDa0DrQutB60PrQBtCG0EbQxtAm0KbQZtA9oM2hLaB7QltC94LuDd0Hui+0FXQ/aGtoAnR/6AHQNtC20HbQ9tAO0I7QTtADoQdBO0O7QLtCD4YeAu0G7Q49FHoY9HBoD+gR0COhR0GPhh4DPRZ6HPR46AnQE6E9ob2gvaF9oInQvtB+0P7QAdCB0EHQwdAh0KHQYdDh0JOgI6AjoaOgo6EnQ0+Bngo9DXo69AzomdAx0LOgSdCzocnQsdAUaCrUBx0HHQ+dAE2DngM9F5oOnQjNgGZCs6DnQf3QbGgAmgOdBD0fOhk6BXoB9ELoRdCLoZdAL4VeBs2FXg69Anol9Cro1dBroNdCr4NeD70BeiP0JujN0FugedB8aAF0KnQadDr0VugM6EzoLOht0Nuhd0DvhN4FvRt6D/Re6GzoHOhc6DzofOgC6ELofdBF0MXQ+6FLoEuhD0CXQR+EPgR9GLoc+gj0Uehj0MehT0CfhD4FfRq6AroS+gz0Wehz0OehL0BXQV+EvgR9GfoK9FXoa9DXoQ4U0Degq6FvQt+CroG+DX0H+i70Pej70A+ga6HroB9C10M/gn4M3QDdCN0E/QT6KfQz6OfQL6BfQr+Cfg39BroZ+i30O+j30B+gP0K3QH+C/gz9BboVug26HboDuhP6K/Q36O/QP6B/Qv+CiYFxH8oKY2BiYWrBxMHEw9SGqQNTF6YeTH2YBjANYRrBNIZpAtMUphnMHjDNYVrA7AnTEmYvmL1h9oHZF6YVzH4wrWESYPaHOQCmDUxbmHYw7WE6wHSE6QRzIMxBMJ1husB0hTkY5hCYbjDdYQ6FOQzmcJgeMEfAHAlzFMzRMMfAHAtzHMzxMCfAnAjTE6YXTG+YPjCJMH3dbX13C97dLne3tt1taHfL2N3edbdi3W1Td4vT3Y50tw7dbT53S87dPnO3utxtKXcLyd3ucbdm3G0Ud8vD3Z5wtxLcZX93id5dTneXvt1landJ2V3+dZdq3WVVdwnUXa50lxbdZUB3yc5dXnOXwtxlK3eJyV0Ocpdu3GUWd0nEXb5wlxrcZQH3Fd593XZfjd3XWPeV0309dF/l3Ncu9xXJfZ1xXz3c1wR3Su9Ov92psjutdaeg7nTRndq50zB3yrRohC+Q48/okxxIXh/TIUbUxNaKi69dp269+g0aNmrcpGmzPZq32LPlXnvvs2+r/Von7H9Am7bt2uflzSrIndszJc3fvGD1m/Gbf3n9pfF5ecU/7Rn+U++C1Uvqrem14u7aZ5X8lBj+0+CC1VcveuSK7ld8nF3y04hw1lnhP51dsHrCuq+TnI8nLSj5aXLB6sXNnx3Tp81fZ66PScldlDg5y+/Lzk7LzJiaV7nKf3i0J0yI9oTkaE/IjvYEX7QnJER7Qso/r5Yyoj1h/D+vWlPpRQrQI6T884qUSm+4THpvjbpI46I9IYd+DfyukfYvaLjz6RcdoI/eUV901n+P3X/EY5c/3J8b7Qld6dU6gD62JvzzbtE0+v2Q8C8oUtT3w2T6yPf/ckbWmd7SOfTOx38+tIn2hDPoT9F0+glRT+GinmAl/TebYdTSf4sINieMifaEmNsL1nZM3rWDmpSSOTErOZA2Nt2XlOlPTnH/b5LPXwhKOt+fnJXl86+PaZE7r3dmRnZgau78Pml+X0pAcxcMyAj4xvv8c0Yf2r3yzdey50tU51/Wp+z5MdHF75M7t3dyenp+vVLOwhG+dPeiJ/miK4m7QxxG0GgJ9xeWJdVdUe2dmTWl9JL6eMvkgReVvEG1S96nBko+d2QgMyu/IEJJy7RR73l903zplX8M3WJ+0Rpz8ZU2zl3cN9PvSxufUfjP6Ws7JF8Q8KUk5QTSk4o6bO/S/jpsV3c9uai35uXl5y4p2r3vmZpaeC+UFiQ/d/7ItIlZ6b6iEpXEK1Pe2KhqY3Kf3MW90jKSC78VCAzLml5CMQsHu6FHTUjOKKQE+2tpkPkDcyZmDRhXUHpC89wlAzJSi0oa8SbpUcEfqa97cet7ywd2n5g7d5R7w+YXBM8vuVuLr7hgbUJadpJvsi8lJ1B4f6dlJPl97s1edPNnTUjO9q2P2etvvtf7VvNe71vcjxpWu79LOMHU+L2uXrhbcs+F9wkmvFFz5wzJnBRyD5ZmK7ryRsU5in9O9Gatbp0kVrtOJHwU8dZB6GDQrMxg0L5oMMjyT0pKy04s6cgDMkaUduPhhb04bCQIhiodC0pLPXt0t8j5JTx/+W0QjFAzw0vfmhpeWu6+4WXleF/hdCIj4I7LAXd0yQ4kZ6T43ETA589ITl8f0+NvHltGV3NsGV3cLff9HxxbKhs1WlUwaoQc6esNEHKkX3i84iP9g0diQ48MCB6pFXpkYPBIXOiRQcEj8aFHBgeP1A49MiR4pE7okaHBI3VDjwwLHqkXemR48Ej90CMnBY80CD0yInikYeiRkcEjZcbuUcEjjcN7TJNqj91NoyM0Dh+7m3hgoWP3IaFj94rgPM4dJnoXjxIDigeJ9S474pgd8YiJeCQ24pFaEY/ERTwSH/FI7YhH6kQ8UjfikXoRj9SPeKRBxCMNIx5pFPFI5FZoUthEIfPomv2X93n8T8tvMz8oPruCiUHZYxUNzyZ8wPT8EDZken4IGzQ9P4QNm54fwgZOzw9hQ6fnh7DB0/ND2PDp+SFsAPX8EDaEen4IG0Q9P4QNo54fPF28zLHGnk5eM5O30TU1eTt8903elqb6CleCMrN9SRPcGdv6mP3+5slav2pO1vr9D78IVucVL/JkrbpXUc4EIrobI0bDJxDekS50AtGy5H24vLzBzjR3dLfuR4Zl9VZn8dC8pOie3PWPYVnTPBnmjMwZG2HMDl92K1nWatYt5v3WGw6fclCLHpnDJl25YdSSS/aY0+nLRi2/zzl20s71mZHjxc4ZkpMe4aqq9vyIrZlxq19NjVutdt+4tTA9UDJi7f/vHbFMtPdZde9UixGrojmKZ8QK67Wlg1a5Y1nfmlyu6rt7l6v2qeCen594Xk5yenaEW7v0Dgqe0CJ3buGP7hpYZGjpjWk3YoS0WBF9r4o2Ftypr0UFRQ4ipUEiD2vmHzZ0Jey+oWu5uxqfkZOenjYuzedPyvK5YTPG//0r8P8NY//Ph7Eyq+5Pexfdh5b01+FF3TXyq7Epd6m9IPKrdOQFoIIKX9j/d8aWlrtzqy/bXYx3N0MmuA3nS5uYPL50e790W7/rv2SgaVnt28Ps9oGGsJ0f9btY2IO7tBnD2LWirc9y7xiZ497b3ptFvBHK3htVH+tCgwdDlIYPv+YyWxkm4ht1OatvxUdqhcyudvXMCic+ER8pJVvYbavdS/qxP/ooGWDLbe74ss1tglUVUnO1gxlCfq8TrPRyA9QtnlR7Y5Sy4sPG37ptcucOzkxOLf0hLnjSPPcq/b7wyHHlR65d9tJqBztSuSfUKXtCneAJRZPkfUMfwh0j9WIT3ovFE9z75H4i+OR2nwb93YfB8OJnQeEfR97X35ec1dPvT57iHQS0osfwvKLsZRa9lfF9TY09dLvsxg3wFLfW3epOm5TsLkqMy8lIKf7OpmQD/OC/+Yk7qJpP3EHFnbN5+LgSFx2pVjghvsafuCE7HqEf1yQGEyEfdoTm6hdMVJCrfzDh3WSqyrtEpEdy3/BNoNKShW0BlZamqLFaRNxxl4g77tVfLB6wexeLO4XvdkWezcTTZzPxkWczcTU0m4kPfw7ERXgOrAg+BwpHqOFFA1Tf4vEpv/wnQbzmRxrvp1flJa5md/GnV7JrW9Qu1llCbtzqzrokikd3XMhqWdHsZGF5r+gVbYZouaNTuZPO4rqoYLsk9GKrXRkaqTJio6yMitdpFtpsk9TQesCgmpqadN19U5O56W5tro/p8jdPQBKrOQFJLF2i+vdt6u4R6U7RCmf8f/+ubkzEd2eN+O5sKn13rv5Hlok10MRRLJt2iDivE+sJRGmrRpw+KO9ZpJW/Ro4PfY2MMHUwMZGmDjE18ynV/9ayQ/t/8rJD65p5JibW1DOx8+57Ji4rCuN2KPcVvfAPCGaVrYTm1Xw67lEzT5SYYHlKwWWf45Z/bRUTtptcUvElG9RlY2p4G9UOmwVYRpdI0WPm9EmbFNZSweG39LJLKqLgSW/j7aripPNyMgNpvozAzLLFq1vVbcfi8+vVcDPWDYIj1IcuKg7oqZaYYP1EOEt2fVgUbLdKsxd+9xRODxkMPf2gTGPUK72c/wNUQa64MrwBAA==",
            "custom_attributes": [
                "abi_private"
            ],
            "debug_symbols": "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",
            "is_unconstrained": false,
            "name": "drip_to_private",
            "verification_key": "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"
        },
        {
            "abi": {
                "error_types": {
                    "15764276373176857197": {
                        "error_kind": "string",
                        "string": "Stack too deep"
                    },
                    "459713770342432051": {
                        "error_kind": "string",
                        "string": "Not initialized"
                    }
                },
                "parameters": [
                    {
                        "name": "token_address",
                        "type": {
                            "fields": [
                                {
                                    "name": "inner",
                                    "type": {
                                        "kind": "field"
                                    }
                                }
                            ],
                            "kind": "struct",
                            "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                        },
                        "visibility": "private"
                    },
                    {
                        "name": "amount",
                        "type": {
                            "kind": "integer",
                            "sign": "unsigned",
                            "width": 64
                        },
                        "visibility": "private"
                    }
                ],
                "return_type": null
            },
            "bytecode": "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",
            "custom_attributes": [
                "abi_public"
            ],
            "debug_symbols": "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",
            "is_unconstrained": true,
            "name": "drip_to_public"
        },
        {
            "abi": {
                "error_types": {
                    "12913276134398371456": {
                        "error_kind": "string",
                        "string": "push out of bounds"
                    },
                    "14990209321349310352": {
                        "error_kind": "string",
                        "string": "attempt to add with overflow"
                    },
                    "15764276373176857197": {
                        "error_kind": "string",
                        "string": "Stack too deep"
                    },
                    "16431471497789672479": {
                        "error_kind": "string",
                        "string": "Index out of bounds"
                    },
                    "9530675838293881722": {
                        "error_kind": "string",
                        "string": "Writer did not write all data"
                    },
                    "992401946138144806": {
                        "error_kind": "string",
                        "string": "Attempted to read past end of BoundedVec"
                    }
                },
                "parameters": [
                    {
                        "name": "messages",
                        "type": {
                            "fields": [
                                {
                                    "name": "storage",
                                    "type": {
                                        "kind": "array",
                                        "length": 16,
                                        "type": {
                                            "fields": [
                                                {
                                                    "name": "ciphertext",
                                                    "type": {
                                                        "fields": [
                                                            {
                                                                "name": "storage",
                                                                "type": {
                                                                    "kind": "array",
                                                                    "length": 15,
                                                                    "type": {
                                                                        "kind": "field"
                                                                    }
                                                                }
                                                            },
                                                            {
                                                                "name": "len",
                                                                "type": {
                                                                    "kind": "integer",
                                                                    "sign": "unsigned",
                                                                    "width": 32
                                                                }
                                                            }
                                                        ],
                                                        "kind": "struct",
                                                        "path": "std::collections::bounded_vec::BoundedVec"
                                                    }
                                                },
                                                {
                                                    "name": "recipient",
                                                    "type": {
                                                        "fields": [
                                                            {
                                                                "name": "inner",
                                                                "type": {
                                                                    "kind": "field"
                                                                }
                                                            }
                                                        ],
                                                        "kind": "struct",
                                                        "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                                                    }
                                                },
                                                {
                                                    "name": "tx_hash",
                                                    "type": {
                                                        "fields": [
                                                            {
                                                                "name": "_is_some",
                                                                "type": {
                                                                    "kind": "boolean"
                                                                }
                                                            },
                                                            {
                                                                "name": "_value",
                                                                "type": {
                                                                    "kind": "field"
                                                                }
                                                            }
                                                        ],
                                                        "kind": "struct",
                                                        "path": "std::option::Option"
                                                    }
                                                },
                                                {
                                                    "name": "anchor_block_timestamp",
                                                    "type": {
                                                        "kind": "integer",
                                                        "sign": "unsigned",
                                                        "width": 64
                                                    }
                                                }
                                            ],
                                            "kind": "struct",
                                            "path": "aztec::messages::processing::offchain::OffchainMessage"
                                        }
                                    }
                                },
                                {
                                    "name": "len",
                                    "type": {
                                        "kind": "integer",
                                        "sign": "unsigned",
                                        "width": 32
                                    }
                                }
                            ],
                            "kind": "struct",
                            "path": "std::collections::bounded_vec::BoundedVec"
                        },
                        "visibility": "private"
                    }
                ],
                "return_type": null
            },
            "bytecode": "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",
            "custom_attributes": [
                "abi_utility"
            ],
            "debug_symbols": "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",
            "is_unconstrained": true,
            "name": "offchain_receive"
        },
        {
            "abi": {
                "error_types": {
                    "12511970388699677811": {
                        "error_kind": "fmtstring",
                        "item_types": [
                            {
                                "kind": "field"
                            }
                        ],
                        "length": 27
                    },
                    "14415304921900233953": {
                        "error_kind": "string",
                        "string": "Initializer address is not the contract deployer"
                    },
                    "14990209321349310352": {
                        "error_kind": "string",
                        "string": "attempt to add with overflow"
                    },
                    "15764276373176857197": {
                        "error_kind": "string",
                        "string": "Stack too deep"
                    },
                    "16431471497789672479": {
                        "error_kind": "string",
                        "string": "Index out of bounds"
                    },
                    "1998584279744703196": {
                        "error_kind": "string",
                        "string": "attempt to subtract with overflow"
                    },
                    "361444214588792908": {
                        "error_kind": "string",
                        "string": "attempt to multiply with overflow"
                    },
                    "459713770342432051": {
                        "error_kind": "string",
                        "string": "Not initialized"
                    },
                    "9967937311635654895": {
                        "error_kind": "string",
                        "string": "Initialization hash does not match"
                    }
                },
                "parameters": [
                    {
                        "name": "selector",
                        "type": {
                            "kind": "field"
                        },
                        "visibility": "private"
                    }
                ],
                "return_type": null
            },
            "bytecode": "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",
            "custom_attributes": [
                "abi_public"
            ],
            "debug_symbols": "vZztjha3DoDvZX/zI59OzK1UVUXptkJCgCgc6aji3o/t+GN2qwkv8y7nD/OM2XHsxImdZOGfhz8ef//612/vPvz58e+H17/88/D753fv37/767f3H9+++fLu4weS/vOQ+I88y8Pr/OohY9YnPLwurx5KyvrU96zvua9nSfrU96rvtekT17NVfc71BNJX6TmyPvt6zqRPe9fvUb/H9X1NZG/n51hPtkuefT3ZLnnqewXxq7a+nkD6Bj/Heo6iT32f+j71Hfk7+rClZEAe5sqACpl05sYwFQpLBgObzV9V9qMzsAQJWjEYCt0k3SRgEu42gZEMugGZUalr2mwGUwGLASzoPKwLTJKTAX/eGUhhSwRsvEAtBkOhmaSZpJukgwIkg25gmkcz4CaoD/usBkOBI3JBXwA8BAtcggo8BK0zsAQIylBg43ti4JAhT4GNXwD6Vz0bsIRGECAboALbvIBs7tTzwKYKsKkLYMFI2cAk2SQSqQKoUJqBah4cLQuoCaD4GWyzQKfPoTLQ50AuDw5pGAxDgYN6ASjw9FrQFVAlMxUD/Xxmk2T9fJZsoJ/Pap9XkzSTtKbA0QvAAAo86xfwV+TgFMMEmsFU4Km/QCXIFg7qBGQLBXi6L+gGa+HAWvW5Fg5sa+HAthYO7Fmfa6FASPrUd+46Gm2cWZ/6jvqO6z2nlA1Mkk2STVJMUkxSTVJN0kzSTNKTQVcAk4BJhklkSglMBZlSAkOB14MF2kQ243NShTkng2aACqUaaBO5FgNtIpsX2bzI5kU2L3I3hWBNgCkc1sQwhdOamKYQrQlUhSUlg2agTZRcDbSJUoqBNlFsLIqNRWmmsFkTzRR2a6KbQrAmwBQOa2KYwmlNTFOI1gSaQtQmaqoG2kSVeK9Cw6i4jOeiUndCI56OSi7r1Yin5iKem0oumy6brnm6FnQtPEOFWqpOLnPrm1vfSnay1hoP/gAh+nYmJg7i2YRYNpg4jJWGUk/FyWXZZRzCczLxWqs0jXipUBpGvFwokQzZls4BvIjnoRLpwyyERuyH0jDiMFZyGQeyUndiLdwbwH4sYj+UqK+Qewh44VPqRtVl1WXNZVyBIfcG8OgrcRvIxGu1EsloWWLkkDAExxnSGVIOY1p8CAfHgOFwZC8MQ1pCWkJac2B3ZF8MozWOasUeDfdQBtEERzutcIzim2IPREeOPMPpiCHl4Fs4kyjLguDIK6ih6OWOmkWkIChSjrJZW+D0H2g1kKVFWhM3F3KZYgiOnBRofRNk34o0PFPgdBSHyhAUKduAMoSKwzHnQHAsIS09EB15ftFixsjpwRAcOUXQ8iSIjlADp+MI6QjpDCnPL0XZ1CiCIiWLFNgDpeEhW58WOB0lUhXBUSJVMaQSqYqsjGtdQtkeSGsyhG0KDkeJVMWQjpCOkMosVOyOnFUMueGeBdEwy8AqDkcZWEVwLCGVgVUUZexFroKdUdzsICjSIZvFGsjOd7Ysi5uKw3GEdIR0hlQWm4XipmIPREMpBAy9YSkGDL2JstxERllsForpkASnI4RUYpJLciokqqNYBrIzFstgbY5T4HQUc7iWL5LWaYlmlDhTBEeJM0V0lF7nTUCR5K7YQ7pM52Gpy3T5DKK1Ea2NkM5obYYNy7eF0gQPrGR3ygSCw1E6lYv20pYXgjWkywvB5cXCkMq8WCgBM5LgcBwhlezE5T+dM2S3QebFwmX6woMUDbsEjOJ0FIcGD1aXYeE6hSrAFNgCp6PEjqJo4LHoslYrguMI6QjpDOkMKYoNPAAgGYeLpSK7YZoyjDkFsm+DvYB1GoGC05Fr98xFVpGdsWILaQspVz6KXPoYhlRmgCI3MXksQFZlxZCKF1MOgySFijljObQQHHNIc3csKZAHYMpJkixMCyXjcNlIOB1bSHn3ZwiOEFJAxyFNdEF0nCFdvvFYrPJg2SC+zXW2VQJDKr4pgqP4xlVrkc22oTTMo7kqBcWQrsES7CUwpGuwBKU8mCjYHWdIxTeubwnRbVi+LZyGq1JQHI6yKCiCY/iG4duqFHAd9tXA6dhC2kLaQ9pDCmJ6FpyOUhNIokKJPklUKCPE2anKJt7Q0kxNOQV2xxLSEtIa0toCp2OrgcOxl8BoWAJRMZqQmOTsVGVvv1C28JKSCMExh1QGgLNTXRl9YbU8VLNYphhSMWehmMOJilBWz8Y4UmALRMc5HKXXQQ5qpddhndWWQGkNGLMlnyqnzYolBR6k3pqcPBtOR1nPOFFRMrUcQNgDLePUMlpgSOdwXF4sdGmV9XfhWn+TYHcsIZXlihMVoSWfWiXsFadjC2kbjr0EgqM4xImq1mHZiXRNRyyBYNjWortQNHRBdJRSWDGkJaQlpDWkK0M2QfkBkCN4yUNDcDqujM5etGGrfdWMLjgt49SV0RdiSNGlPdXA6ZhDKjNAURYmHosudYliSMULTlSElnwI0VEKLcWQQg2cjsNyQJVTAcVpGaeuPL8QQ4qWhypIiaIYUilRFkqJwimpyum3Yg3p8o3HApolH8LuKBsxxYMUHaEFWg6omv0XWsapMEtgSNHyEAVqCgzpGqyF0gR335AaRjGk4hsnqjqqJZ86lm8LwbGHtHdHSIEt0H0b4dsQ3zjN1CHjpgiOGFJ06TocUAypZEjOTnVlf8GVTbEJDsf1swtDWkJaQiqzELsgOq4UunA6ylqiKBr6t2+vHuyW8Lcvnx8f+ZLwcG1Il4mf3nx+/PDl4fWHr+/fv3r4z5v3X+WH/v705oM8v7z5TH9LY/L44Q96ksI/371/ZPr2Kr5O55/ShVjVr2n1aK6ATjRuViEjtlRQqFxRQRsfMBUplWtWdFdBUXqqom2sSK2oCsr/I1Tgzd1JO6muKmhDc24F7FTwAqMqSr9kBWINR867c56rQCg2qFTbTVdBG8wnKvBcBZ1dTlVByxMeVMwnKvK+P60vDgPSSr/VD+pBC4v+VMUzI8r/y4gBp0bUjQ1U+ZgR9RgVtT71o2900FGZDSpxya5lPh3UvAvPYYNajsvFs+DceQLTOoN3c+eebDqUKh3rDappojeeWZHxBTqjpJ/YGVT+pVg702lnlE140nFKtuiizcxhtj9zpL5Eb7R7e2PvSjq40s5d2QQo3d6bGYOOjM51jM3qV8AyAe2YozOoSnqqYxOjkKotwlRNxqSvt1sRc54qjXJqRd1EKKZmVmA6pMV/6cib2dY9LWKsf3ROcvu4Ns+svT1JSE/HpL5EiNafG6IVm7tyXIifu7IJ0Zyi0qAjhdROXdlER0ePDqBLkvORnffHecV743xrxY1x3vL9cd7KvXG+H1jZTOnA0l3F2cC2TYzSzb1FWKZy8v4ohU2UbtZRn210bxwly7PeaGNXkpcoyftplm6b0KBDqWzjSnwI8+cdirtqAW1c4XzSf8cMz7HEWM/M6Ltl1GsW6o2I0H6tPw+ePHOk7wYVrDfHkzr05qCoFlZ0wH8aFH1ThHbwHRLdzJw7sZllDcAGtMFhpo5nYzF2c2xi9kmGZZ4O6N0Zfm8GelDwr9D0MzNgV4SmSGq0YJwG+NYQOqsbbghdWp4astsnAXiCPu4Zf9CQiW4InaefGrLN8s230HS8dNUQ6AdDyqkhu83S7N4jmNJFQ2rkFFqGzg3Zbpiyr4GtnS+C22mH02cu1eln025sQpWOnj21DTwcCeCtRxu9VuuMTmeLp0cbo+x2CLaGHSyoNx+u3LgTH+0FatnR761l0/078THu3omP+RKdgT+xM/imwKsELKedMTcZnm6vD+m1nlZds7xAb8x6b2/sXfHYGMfDu3+50rfnZslPMo+nupSzn+iA7Yrh6YCu4M913GxHP9dxa38c0uO/+gPvLL62RsyRfOkq50cbN+uo56dFWH6mI+hXBjOl84mCuzW0tORZvrTzEg77/Yft3zHE69HCCk8N2Stp6aDktBLEXZbvnuTHYTOfbh8YGo0YmEOXPh8YOsHYZsjkvtR0vmnLKe/2XMXzLK0C5+fEqdw/vvtg9W6daTNjcmq7kxavOuiqsGyU9PuPa3KCe3cteztuPLDJad5/YpMT3ntks4943yvMdDyB/4E1dWY/zpu5b2bN7paJvkyu5FBJ1ZZ+wBAvYmZJm1DN7QXOXPLusum2Q5fvGXLbqUvO485jl5s7NadNp/7M3D+zb0fJis0CUvJP7QsfEbLiPHHvCu3hJw11lvNCO++umpr8lpPd9sOmN17kPrTcfSG696Z7qmt94MabW5XMXZfcG6Z7M8Bv/RuMzVq4u3EaJZsvdOJYN0rKC2TL3a3Tjdlya8et2bL2F8iWu+uJ27Lld4bXC6o20ibKdhc+Gad3Cf9zotNiN+8unihNxblYTxen3qjZ/YGNP7vLpwJRuwNsMkR7iY1/bnfv/L/jTTp4s5l8rd9/C58bvMAM3t2a3DiDt3bcOoN3t1A3z+Ce7p7B++GN3Srgpkbs5SVm8O426tYZvDtRRg/WjLmfdslOxUQ/YsLDUdePqED/BS/CcU3FyNGh5YqKksDL5TTaJRUteXC0cs2KVkPFYTH8ERXdfw2oHPcfP6TicObX8zUVcYvUe7lohZ+w90MxdNWKqyowZny+FOD8b9VcRb82qACRVsZFK3qLC8Z0tyPXVNTpvzJNN3PtoopYx9OlQa3ohUtFOO/OPLbVD/qeYdbjCf3tZiC4GTiueeK/A0l4LcJzlCw5XZvtyX9jhlRcm+1yvqMqSrroCISK+x25qCLHEk611TUVcfOdAS+qiNOfke525KqKGb9dgddyUYlBJXUXVcTtwMUl/ODIVRWH34Qvs56vOZh/6poTv05faz6/E8y42yjlKJZKOb+cvNWO5yp+pdc3b999fvL/AH5jZZ/fvfn9/aO+/vn1w9vD33757yf7G/t/BD99/vj28Y+vnx9ZU/xngvTHL5OKtVnmr68eKr0NKiDHzPTG/zLylzLTqzI7v2b52fqKavZfv7Fp/wM=",
            "is_unconstrained": true,
            "name": "public_dispatch"
        },
        {
            "abi": {
                "error_types": {
                    "10791800398362570014": {
                        "error_kind": "string",
                        "string": "extend_from_bounded_vec out of bounds"
                    },
                    "11021520179822076911": {
                        "error_kind": "string",
                        "string": "Attempted to delete past the length of a CapsuleArray"
                    },
                    "12327971061804302172": {
                        "error_kind": "fmtstring",
                        "item_types": [],
                        "length": 98
                    },
                    "12469291177396340830": {
                        "error_kind": "string",
                        "string": "call to assert_max_bit_size"
                    },
                    "12913276134398371456": {
                        "error_kind": "string",
                        "string": "push out of bounds"
                    },
                    "14990209321349310352": {
                        "error_kind": "string",
                        "string": "attempt to add with overflow"
                    },
                    "15764276373176857197": {
                        "error_kind": "string",
                        "string": "Stack too deep"
                    },
                    "16431471497789672479": {
                        "error_kind": "string",
                        "string": "Index out of bounds"
                    },
                    "17655676068928457687": {
                        "error_kind": "string",
                        "string": "Reader did not read all data"
                    },
                    "1998584279744703196": {
                        "error_kind": "string",
                        "string": "attempt to subtract with overflow"
                    },
                    "2967937905572420042": {
                        "error_kind": "fmtstring",
                        "item_types": [
                            {
                                "kind": "field"
                            },
                            {
                                "kind": "field"
                            }
                        ],
                        "length": 61
                    },
                    "3330370348214585450": {
                        "error_kind": "fmtstring",
                        "item_types": [
                            {
                                "kind": "field"
                            },
                            {
                                "kind": "field"
                            }
                        ],
                        "length": 48
                    },
                    "361444214588792908": {
                        "error_kind": "string",
                        "string": "attempt to multiply with overflow"
                    },
                    "7158692485152407286": {
                        "error_kind": "fmtstring",
                        "item_types": [
                            {
                                "kind": "integer",
                                "sign": "unsigned",
                                "width": 32
                            }
                        ],
                        "length": 101
                    },
                    "9530675838293881722": {
                        "error_kind": "string",
                        "string": "Writer did not write all data"
                    },
                    "9791669845391776238": {
                        "error_kind": "string",
                        "string": "0 has a square root; you cannot claim it is not square"
                    },
                    "9885968605480832328": {
                        "error_kind": "string",
                        "string": "Attempted to read past the length of a CapsuleArray"
                    },
                    "992401946138144806": {
                        "error_kind": "string",
                        "string": "Attempted to read past end of BoundedVec"
                    }
                },
                "parameters": [
                    {
                        "name": "scope",
                        "type": {
                            "fields": [
                                {
                                    "name": "inner",
                                    "type": {
                                        "kind": "field"
                                    }
                                }
                            ],
                            "kind": "struct",
                            "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                        },
                        "visibility": "private"
                    }
                ],
                "return_type": null
            },
            "bytecode": "H4sIAAAAAAAA/+29d2Acx3U/TuLugANwh+t3EitIip1HFBIUIbAAYu8QiwpVQRIiIUIkRYKyJDfRtuzEBYUg1RwnLpKsxHFJLJckTnOc2IlxcX7xN3GJHcclxf46sZPYceKvHf+OFrD3Zmfem5m9WeDWWP51xO5+prwyb9689yZweeSp37jw6Jnj914Y6BnonTFy6X03n+/r7+87uaWnv/9K8f8vHOo7c7K/d3R45PKnGmfQ/2bOkL4yY3h0eFgONDJjeLjYIujaV7qWXHp+y9kzFwZGL72wte987/GBqkvv3XVmoPdk7/n3HFnTKge1fz9T6/vHT9m/n6HX/qlLz12b1JGIhfPiwd7+noG+h3sdj8RCCOghzLj0m9f6cqJnoGfL2XOPWkM6CfsEwN+z7+zDl0t/mFl6/+UxtfA9mqk7O+XOyoxLzx0aOHtuhOknALNRb8vz2/t6+08UYb96vPnsm672/s+Ld94y/MhbTxX2/sah6u9+vu3Hz5/65p9/4hP/Yf9wq/XhcPxbTV9t+c7/fPSza9v//vKhP7z3H7fszsy4/eMf2vHMc+96xV/aP9xmfTh2YtE3v3hl876/eVu6+7GVf/uHr/u78JbkR5/+wYFvdrx44rFL9g+3Wx/GP7jrzPGOD7Y3X7nymqUHP/3UX/zhf3/y4t0j5y7/ydt/7aX9P7V/uAPM4Lq1khmc+eA77d/vtBr+wYUvvPDZt334Uy8OvPf5JxNfjj5Tv6rutU888b3Z/zbn2e8/8R77h7usht99ZL2UcgH757u1Pq+2f77H6vamjwWOnvqtH5+t3/H6D77iy1/afzE6p+eT83/p+aN/OjL/2/e+0f7hXuvDf3nr218b++DldzauLPywesfQd+/9z12h9V8uvOr6P3ndT779/VH7h/usD//66E+++lJs9LFH3vY7r1y/LNXzm6Nf+PfvfPqzH4j959ff/9AX2uwf7tfj8bD9+wN639fZv+8uU4feovX9zMv27w/qtR+3f39Ih8OL/+zfH9b7nhv/Eb3vOS10q5aE8v2/zWK8S8+9+NWutxWav/mTujfv63nDI2ve8vnb/vWx6967+B8feP+c30zYP7zd+vAbA1tGBnIPrvvX8Ofe1vKu2XO/9oP3vvTP//Vo7/rv/vO/fHTBf9o/vEOPYp32749aDUv+2T+8c+LD61qXtp97+q/SX1m28O86/+g3V1+5/gc3bPjKx3e+6/s//vP/Fnx418SHMzVbvFtjqPV37t1r//4eZKgzZQ3fK5mjmdiH9+kRh1O8PbpLru37Y3rfc+JwXJE5QvYPT2g0/L8/+shS+/e9Ew2v2FD7/eff/JonZvzDe//v4H+t+ERnPjGvK7H6/7z9b2efOX/n9d+3f3i/3ojnvHCwd+Di+TPjdlOh88uX3rf97PnevpNnrv3h6u/1PDbQe/zeiwP9957sHTgy0NffN/BoscWB3kcGvjIjd+n9+3ofPHv+0a4TJ873XrgAzRvsSQB9EkSfhNAn1eiTGvRJGH1Siz6pQ5/Uo08i6JMo+qQBfRJDn8TRJwn0SRJ9kkKfpNEnGfRJFn2C88511xiruM978Fz/uBh47X+MDEpfWbdWC/O5Iy2t6+m/yns6PMzvb67XsnLv5AFmaQH08ACztQAe4wHmaAEM8ABztQB6eYB5WgDHeYD5WgB5HqBRC+AMD7BAC+A8D7BQC+BuHmCRFkAjD3CDFkA3D7BYC+B+HmCJFsBZHmCpFsCDPMAyLYA+HmC5FsBJHmCFFsAFHmClFsCjPMAqLYBTdr9SvuSa46BX6xlaq4qezL4zPecfLX504NxVC/g9xeXv5VVioiXQwvt3nTnxsnPI1nhed5vMNl5qwmqeH3OVfTaaYNeeL/q2zveKn16PNdfEN9dUao6CnGUecrZ5yDnmIeeah5xnHnK+echG85ALzEMuNA+5yDzkDZ7gSxfIs9g85BJPDHypechlnpDx5Z4QyBWeWHtmTdcV0hsUX+kJgXTB2ljlCRW8xBPkcUGrz56ummiZR5jItq9bXdp7qu5RrYbQHepqQztUwThXl5pX/ygv/aiZbgmeiry/dCrSf/bk8PAVuy/bihv49Z29Pee6zp/veRQSYyXyfo/4/eYZVzh/b9Gfcen5l18cET1cKfZF2z952Rs8gx3eHzCHPt29RRKfOXm45+TJ3hN7z568MDx8Gen/TtSnXzxpp3zTnKfhBdTv0qx7pKftd2nGubrJEFc3k9LLEOMlhhhbes5duNjfexmd6DzCQiUCAC5pQfhh5hX8cEaV9FZAB8oSV8o9SkEmt4WY3O5Lz+0923MCzgz48NopqI3epYkdb/T9Lzf68/8cOHcFvPCefRf7hZ82c7jNkGDMCIkeNI/3wP5KHuNPQqy0FT21ouR1/Kaa8pswKr959+QXLDDcmFt0o4rUObsFjttGhlb4DIFc84G9Rak8fKrnzLaHLvb0X0DRizO9++KD53bdDxpYM/ZpnjEskhzF2mzlh9Famr3nrjUzMvZJSlLzGoRpJpg4T8xeM8HEmgTt0mfiFpyJmw0xcQs9V/ZmW3UDrXSoD8ZtI8Ma+AyBXEsycSsE45l47dgXeMZYI2XiNfww1nBM/NcU66gcSR2i6KACcJoHWKMFcI4HWKsF0M8DtGkBPMIDrNMCeCUPcKMWQDMPsF4L4NV2rm4nlMtNeoK2Ql+53IQrl3ZDyuUmXjza0ZPFDtg1ThbBU/RksYNvroPQ+x0KrgXnkLPNQ84xDznXPOQ885DzzUM2modcYB5yoXnIReYhW8xDtpqHXGYeco0nIJd5QnqWe4LVXdCXSz3BRC6sPSs9QfG15iGXTFfpWeyJRXeJJ2R8kSdkvM0TA19nHvJG85DrqV2iygb0FfyWC9+AbtDbAy7V34BuwDegHYY2oBvIybbNxkbYNY4Q4Cm6Ad3IN7eRoC2AnGUecrZ5yDnmIeeah5xnHnK+echG85ALzEMuNA+5yDzkDZ6YyyWeYHUXBHKFJyCXeULGl3tCINd6Qnq8MZc3eYLVXTANVnmCPHM8YQx6g9XXmYe80TzkevvGYQOxjdpYXtSHwjZqI76N2mBoGyWYqw1EkMAmvWZjWLOb+GY3wXHbyLAZPkMgO8kggU0QjA8S6CzMvMpzxmZplMBmfhyb7VEChZnDXKwL4LlmQ2zcTMzfRoKNyySpAhtvwtl4oyE23kTPlb3ZzXrNNmiRH4zbRoZO+AyB7CLZeDME49m4qzDzeZ4zOqVs3MmPo5Nn43dybLxJQS6Foq6kjTdRzPruIy0K7EJQXgVgBk9BXJC69JjqZ/qC1IULUqchQeoiOcE2GzfDrnGUvBnOOtLczXxzNxPM4UP6kD6kD+lD+pA+pA85aZCbfMhpBjlt+dIXSJ/ivtrw+dKH9JnIZ3Uf0l97fIr7A/eZyF90fX3pM5HPRP7A/bn0Ke7zpT9wn4l88vgq2F8ofCbyNZGvL32+9MnjKzef1X2B9PnS76UP6cu4Tx4f0lfB/sD9gfsD95WbP5c+pC/jPuR0WXv8ddznS7+XPqQP6UuPL5A+efy59PWlbwX7rO4zkU8enzw+efzlzJ9LXyB9yGnFRLYCkl0T3wnKad6sV9EyauvuBLDVWasl0AJaTrPLUDlNwVx1gbmyN7tFr9kI1uwWvtktcNw2MmyFzxDIbWRd2i0QjK9Lu60Q+DjPGVsnZgKtS7uVH8fW0vSN16UNfJhiHpXbk7ZQlFABuMgDbNUCOMEDbNMCWGWn6XZCtHbosdl2fdHagYvWdkOitYPnje0l3rDNxk7YNY4RwVP0AqidfHM7Ca0HIGeZh5xtHnKOeci55iHnmYecbx6y0TzkAvOQC81DLjIPebN5yCXmIbeYh1xrHnKrJyje6AmKz/HEXG6drlrdBX250jzkmunKl0s9wZcrPAHpgn253BPkWeQJTbTME2pjlScovsAT+tKFgbdN14VisSeYaIknVshFnmCiNk8MfJ15yBvNQ643D7nNE+RZ5gmbyBs73QWeIE+jGxS3eZF3ED71na7f/rYT96nvMORTF8zVDtSnvgt2jZtH8BQ9SdzFN7eLII0P6QrkZk9A+gOfbnM5bXvpQ043Gfc1kQ/p86W/9vhM5M+lP3Af0l/OfFb3mcifS58vfUh/hfQXCn/gPqS/QvqQPqv7c+lD+vrSJ4+vify59PWlz5d+L31W9yF9Gfchfb70pccfuD9wX6v7c+lD+hT3+dJnIn858wfuKzdfE/mQPl/6+tJnIp88/sB98kxn6fFl3Gcinzw+efyB+3Ppy7jPlz4T+UzkQ/qQPqQP6UP6kD6kD+ka5HN7z/acAA+ZW5mQ9jTLd+6ArxFFOlXu1DrMA+zSAriXB9itBfCQvebmnomhCyqQ7tUrAtpim/EJYGu+rZZAC2gF0j2GKpDu5cm9p0Ru22zsg13jWGEfpDvS3D6+uX0EdwHIVeYh55qHXGQecp55yLXmIWeZh1xmHnKpJ5hoq3nIXeYhV5iH3G0ecoF5yDmeUBvrPKGCXZDxRk9QfL0nmGiZJ9TGIk8w0ZLpqonmeEITecMY9BfdiiaPCzK+2BMDb5uuNlGbG6aBbdu9l3BC7NPzA2zSd0Lsw50Qew05IQRztRd1QuyHXePmETxFnRD7+eb2E6TZr7DuOIecax5ykScGvsw8ZKN5yDmeIM86n+KVTPH1nmCireYhl3hCX67wBHkaPUEeb+jLrZ7gy6WeoHijJwTSBb5cYB5ylicG7g2TdY4nbCJvUNwbJmvbdLXclvk2kW8TVaAmWuQJvtxtHnKLJ8izwA3TwOat22nOdxkx6rvc6Z7vEsbL2Zvdr9dsvRaJwLhtZDgAnyGQ3R/Y23vhwuFTPWe2PXSxp/8Cin7g0gu7Lz54btf9oIHuQs0WnjMOTMzEUazRA/w4DpSm77lr7YwUajZxoYwuBJvthK8R7W001N5Gxfa6DLXXRfDHPkJMNVl2q76Y7sfFdJ8hMd1PzhUuLftFTG39vN4ZW1OQs8xDzjYPOcc85FzzkPPMQ843D9loHnKBeciF5iEXmYe82TzkEvOQW8xDrjUPudUTFG/0BMXneGIut05Xrb5kus6lC0y01BMDX+EJSBeMweXTlS/XeGLRdYHiyzyx6HpjR9E2XU2DxZ7YpCzxxHK2yBNM1OaJga8zD3mjecj15iG3eYI8yzxhwHhjD7lgupoGyymftEpa/8O8gxd3d3freZyX6ru7u3F39wFD7u5ucrJts3EL7BpHCPAUdXffwjd3C0HbWxTsXeeQs81DzjEPOdc85DzzkPPNQzaah1xgHnKhechF5iFv8MRcLvEEq7sgkCs8AbnMEzK+3BMCucYTAukCxfd7wjTwxjq+yBMCucQnjzHIpZ5YKJZzUUrdpZ+rNbYi3UR7q+FrxOZMZd83g9/p4Pu+g1pbr5kf1t/3HcT3fbcY2vcdpIlrb/aQ3ph/G2v2EN/sIThuGxkOw2cI5BEyGvEQBOOjEY8UwjfxrHUY8hHS7GF+JIe5eMRwm31EBwnG0pvkGbX6jHUIZ6yDhhhLQOGDqEPhMOyagAyyoFCaCD7gdAe0sdshQvgO6/F/k77wHcaF75Ah4TssUq+Y8B2BXeNmETxFvXlH+OaOEIQ5omCyO4ecbR5yjnnIueYh55mHnG8estE85ALzkAvNQy4yD3mDJ+ZyiSdY3QWBXOEJyGWekPHlnhDINZ5YIRd4YoVc5om5XOsJvmz0hFb3hpnlDbWxwBMCud8TMj5t+XKpJwwY3ssM3EmrDTkTVsPXiPYOGmrvIHyN85bh7osjeh6EZfruiyO4++KwIffFEXKubLNxK+waN4/gKeq+uJVv7laCNLcqKBvnkLPNQ84xDznXPOQ885DzzUM2modcYB5yoXnIReYhb/DEXC7xBKu7IJArPAG5zBMyvtwTArnGEwLpAsX3e8I08MY6vsgTvdzviV42eoKJXKD4Uk+sPfzOE2xLVxva6a6Gr3FHt/hO8Fa9zdgC/Z3grfhO8IihneCt9FzZm71Nr1lUvG7jm70NjttGhtvhMwTyDjI86TYIxocn3VGovZ7nDNAsGp50Oz+S27nwpNo0x8jMrtqM4BwhZvBWgpE1iRrQZ+TbcEa+1RAj30bOFc5Pt5FkP+KM7DSknRVuU2hPKDBKrHCbffC3Eaxwux41/lifFW7HWeE2Q6xwOz1X9mbv0Gv2j1AFxDd7Bxw31/BRXbmzEfIuiI506m5SK94BwXiteHehtsPe6J3wE47v7pTGmN3Jz9KdBCNPAeBdPOBdkGgTOr2FEh+VYOguihdVAFoonlIBaOWpi+uGu/TY9Zi+brgL1w13GtINd5HcYpuNu0leB09Rz/fdfHN3E8wJIGeZh5xtHnKOeci55iHnmYecbx6y0TzkAvOQC81DLjIPebsnWN0b0rPUPOQaT8zlMk/I+HJPCKQLA1/iiV7O84SMu0DxrZ4QyBWeoLgLrL7fE3zpggGz0hPS4w3l5sLA15mHvNE85HpPzOUaT/ClN6zgRk8M3IUV0gVHxFrfZJ1m0rPCX3QreeDeMFm9oYIXeEIFz/PEXHrDvrxjutqXiz2hNhZ4Yi5XeEIgvUEeF/Tlck+YWd7gy7We4Mtpu5wddWM540JX8DiDu/WO+nfoxxncjccZ3GUozuBuURAJFmdwD+waN4/gKRpncA/f3D0Eae5R0JXOIWebh5xjHnKuech55iHnm4dsNA+5wDzkQvOQi8xD3mwecol5yC3mIdeah9zqCYo3eoLiczwxl1unq1ZfMl3n0gUmWuOJ5WyZecj9njAGvWG5+QvFdCPPUk8MfIUnIF1QG8unK18u9sRytsQTArnIE/qyzRMDX2ce8kbzkOvNQ27zBHmWeUIFe8Mm8ob53+gGxbkEONxNf4+ep7xe301/D+6mv9uQm/4e8kjDNhv3wq5x83jvxHfo+cm9fGP3EoTxAX3ACgO0Vy5gDq7MqKO7GSHDlY5KevM+HuBeLYBdPMB9WgBbeYAeLYBjPMAxLYDVPMBxLYCbeIATWgBNPECvFsAauyK+n1iWTuqtDJf0l6WT+LJ0v6Fl6SQvM/ejy9Ip2DVOnsBT9PT4FN/cKUJEAeQs85CzzUPOMQ851zzkPPOQ881DNpqHXGAecqF5yEXmIe/xBF+u8ASkC5pouSfIs8gT+nKlecg105U895qHvM8TA19nHvJG85DrPTGXyzyh1b0x8MbpqtVXTVcVvGC6Wm5zPTGX+z0x8K3TldVneUIFT1vzv8c85BZPLGe+mVXRArlkujKRN6yNeZ6g+HJPsLoLamP2dLWJtk3XhcIbrL7EE/rSG14DFyh+zBPS0+IJ5eYN83+VJ8wsFyBdOFBwwVY/bh7yhCcgt3pi7ZnnCSZyQav7oSAVzUTHPGHAzPUExW+arlZwqycWCm+cUSyYrky0whNM1Ftu8PFBPn1gvOHyo1bfcMlk1Oq97kWtgrhyP2rVN1XUIP2o1Yr2D3gjanWeJ3rpglvRj32oaCba4gmDao4njNOlnmCipZ4QSD/Kf7r5+W/yxHLmjahVPwljuknPsulqE/lJGOYg/UjL6Raa4o3zem8EaLugL9dO19MIP/S5or0GSzwhkIuna1jkFk/IuB+uO9340g/Xrei59MN1K1q5+eG6FQ3ph+tWNKQfrlvRWt2PgaloJvLDdSv6oMsP151uDjI/XLeimehouVVqj9gDVE9ONCwI1z2lFzFr9ypPAFujtVoCLaDhuicNhesKJvtkabJts9EHu8YRAjxFw3X7+Ob6CNr2KZgqziFnm4ecYx5yrnnIeeYh55uHbDQPucA85ELzkIvMQ57wBHlaPdHLJeYhb/LEwBdNV/J4Q6sv8sTAV5qHXDNdybPMPORWTwx8nXnIG81DrjcPecwT5GnxhGmwzBOaaI0nBu7COr7cN2CmmQFzjE8Pxr0vfXoOkAP63pc+3PtyypD3pY90ddlm4wHYNW4ewVPU+/IA39wDBGkA5CzzkLPNQ84xDznXPOQ885DzzUM2modcYB5yoXnIReYhbzYPucQ85BbzkGvNQ271BMUbPUHxOZ6Yy63TVasvma5z6QITrfGETbTAEzK+zBNzudZfKKaZYe0NtbHAEwK53xMyPm35cqknBr7CE5Au8OXy6cqXiz2hL5d4QiAXeUJftnli4OvMQ95oHnK9echtniDPMk+oYG/Y6t6wLxvdoDgXroofHz2gd4KT0D8+egA/PuozdHz0AH3UZm/2tF6zcazZ03yzp+G4bWToh88QyAc/sLf3woXDp3rObHvoYk//BRS9/9ILuy8+eG7X/aCBBwvRf+Q5AzTbjTXbz4+kvzSBz11raaQQ/YdLz+0923NCzHV9hhi5D772i94ed7KJC6om04b0BfU0LqgPGBLU0+Rc4fJymmTrPmds/YsAaWfY0wrtCdWWEsOenvT2bCxxmhCQfj0efUBfQPpxATltSED6ybmyzcaDsGvcPIKnaCDEg3xzDxKkAZCzzEPONg85xzzkXPOQ88xDzjcP2WgecoF5yIXmIReZh7zBEwLpAl+2ekIgt3qCiVwQyCXTVQW7QJ61nhi4C0y03BNMtMoTTLTUPOQy85ArPDHwWZ7gy3nTldUXe2I5W+CbBr5pUIEDX2kecs10JY8LK6Q3dhTrzEPeaB5yvXnI454gjwvS0zZd1ca86bqcTVtNdIcnNJE3DOtlnmD1tZ6QHhc2z9s8wZcu+Im8sUnxhr486gl9ecwT5GnxxEnKMk8Yg2s8MXBv+NV911NFGzBcIZAWIv7lmF4Iykb9+JdjePxLi6H4l2P8XLWoBIgdI+OkbjYferXEPOQW85BrzUNuNQ+5yDxkoycoPscTc+kCxeeah5znCYp7Yy5dYKI15iEXmIdcZh5yv3nIWZ7QRN7gy7meoPhcT6yQ3ljOlnqCPCs8AemCJlo+XTXRYk+skEs8IZCLPKHc2jwx8HXmIW80D7nePOQ2T5BnmSdUsDf2497YUTS6QXGba+0Y4WjUTLQ7re9oJBLtjrmXaHcMdTT6iXa/GP50P9HOHKQ3Eu1OeII8Lsh4jyfCaaZtuPYSTwx8nicG7kKqkAsxBlum66LrxxhMN/Ks8sQKucITA/cT7XxN5GuiCprLxZ4YuJ/CZg7SGylsLszlTZ7gy2lbG2KNJ8wsv4hQRTORX6XG10SVuOh6I1vTG4l2Kzyhgv3so+mmL6ftfrzRE2aWN7b4Wz0hkCs8QXEXWH2/J/jSBWfjSq5Wtgu1wPvga3ygzvPb+3r7T9BBMk9GPrmPj3fBo3/O6AXgBPWjf87g0T8PGor+OUOS1TYbZ2HXOBKchSRAmjvLN3eWoKr17Kh5QC6F0hilzxqldL97lO4vn9LXGyOM9XOWecjZ5iHnmIecax5ynnnI+eYhG81DLjAPudA85CLzkPeZh1xmHnKFJ1h9lif4cqsnKO6CjC/3hECu8QQTuUDx/Z4QSG+s44s8IZBLfPIYg1zqiYGv8ATkLE+sPd7gy8WeWM6WeEIgF3lCX7Z5YuDrzEPeaB5y/XSV8SWeUBsuzOU8T8xloyc00QJPmAbzPDGX3lDBd3hCBR/3N3zTbCvlDUeEC5pole9s9GW8AlndG5vnVZ7QRCs8MfBpu+/Z4gm1sdUTFPfG2uMNP9Gq6arVXfG52QJy2ojwpON6EUI79cOTjuPhSW2GwpOO83PVhoYnnYFd4+YRPL1eIxrqDEGaMwoLrnPI2eYh55iHnGsecp55yPnmIRvNQy4wD7nQPOQi85D3mYdcZh5yhSdYfYl5yP2eUBsLPNHLrZ4QyHXmIW80D7neE3PZ6AkZ94ZpsMITFF/sCeXmAhMt9QR5Znmil2s8wUTLPGFtzJqu+nKRJ2TcGwvFCk/w5fLpypeLPbFCLvDEXHpjW9roCa2+wBNqY54n5tIbO9073Njp2rPlj5d+9ml4z48T7fXB12y+9ePESYNeIvTMUf2TBiIR+rh7idBwruzNntUb82WtwyAwbhsZzsFnCORDH9jbe+HC4VM9Z7Y9dLGn/wKKfu7SC7svPnhu1/2ggYcKiT/mOQM02401e44fybnSBD53raWRQuITHCMzpzZmBOc4fK2C2ms21F6zYntdhtrrmsr2CHXz7iPrpQK/n5JdFYCv8wDntADeyQM8pAWwnAc4rwXwcR7gghbANh5gQAvgozzARS2ASzzAw1oAt/MAr9ACWMYDPKIF8C88wKNaADt5gMe0AH6HB3ilFsAID/AqLYAf8gCv1gIY5QFeowXwfR7gtVoAAgNo7JKeEdIogHi9HkQAU7Vjr+N1bbF/sCGbTTH2eMni0rbMxl6Hm2ZFYDO2mXBMjxMLSLFXcPA6sK9Th+WJ+DpTRLwkHDBsyE5EW9eort/oyoRsdQX1jCuoC1xBPesK6h2uoJ5zBfUhV1DPu4J6gyuoF1xBHXAF9aKHUB92BXWhK6ivcAW11xXUR1xBfdQV1JWuoD7mCuoaV1Bf6QrqzR5aDV/lCuqrXUF9jSuo3R5CfS3nLeot/US9Rb18i71q3qJeu1nca8xtPeN+o27rXvfc1r1ogLxy/c57tNzVOGk8V8bShV56o4aaCwP3Rq7XOk9QfKsnKO6NeiHLPKGJXMjgXWsecpcnmGjaJqu7QB4/Wb2iKe7CwL1RncxfdP1Fd5osun6FmIoWSL9CjL/oViIT+fU7K1p6vFGCxBvFNhs9IePTtsroMk9oIm+UbJo/XTXRtDUNvGGyesMY9EYhPhf2kN44nPHGftwbW/ye6aqJvFEZ0wWbaLcn5nIuFyOyq/QTjRHZxbe3Sy1GZBfV3klD7Z1UbO+0ofZOw9dsUR+7iBiYe/TCUB7Wj4G5B4+B2WUoBuYecq7wIpH38PPoF4n0i0SahPSLRJqDPOEJ8rgg4z3mIdd6QsYXeUK5LfHEwL1R0sWF4lIu1FHbMl0XXW9Ux9ziCX3pAqQLxfgWe6KX3qgmvMgTKnixJwa+xROayAVW3+2JuZy2a8+0rczsFyGv6Lm8yRPKzQVWX+VrIl8TVeDAV3pip+sN8rigiabtNR2uFC/1wlzO8oRW9wZfLvGEAdPoCX3pDUeEC5roqCc00TZPkMeFuwtaPbGOr/EE5DJPKLflnmD1G8xDPmwe8sJ0NawbPaHcvLGOz/EExV25+YOLZLvh+e19vf0n0CiywMQP/tNW69MfXPjCC59924c/9eLAe59/MvHl6DP1q+pe+8QT35v9b3Oe/f4Tz/GfbtMLYTvMI+zWQ4jxCEf1EBoEUYCSuZv4l+A/PaH4afn1t/633EsYZvyUquSuhDBbUMp9YgJu+NvfrfnRbwwFf/uL3z/7ih+uGP2LHW/7g/dtuFzIb3r80Def/Ld9VBF3pcbrBVXcFWe/iqrfrtR4hCrgroQQpCq4KyGEqBLuSgjVVA13JYQaqoi7EkKtoIq7hIxVEz8E9dtVOKD6339DwLmvknwaxFt9tUqrnznWcoWq1q4yWzNnlF9tfb6oULfKAO5/58dOiCq1q3wbfeLhVwu+fYP17aaPBY6e+q0fn63f8foPvuLLX9p/MTqn55Pzf+n5o386Mv/b975J8O0TejP32wKIN+rNXFQA8abyS93/kjUJ//LWt7829sHL72xcWfhh9Y6h7977n7tC679ceNX1f/K6n3z7+wLuGftl69u/PvqTr74UG33skbf9zivXL0v1/OboF/79O5/+7Adi//n19z/0hXWCb9+s13XBajf2FhXaB6r/398Lvn2rmrIWsvzbtK4osK7bSc/jkg+qSj+bMMMs8OLEDUI/t87GTbIeCMLfHBQotP6q1e5Ce9h9gEhCCOrRpUo/CSGIJyEEDCUhBHljNlAyZt+3vWjL9p08s6Wnv//qSz2PDfQev/fiQP+9J3sHtvScu3Cxv2jovn9f74Nnzz9ahDlfnH042b++s7fnXNf58z2PghkNzrx86YVDfQ+e6+8FzNFy6fmXXxyZePgy1828guJfZ38y3uvtyN+7UaRiI0yj4v8xE257BZncEDG53RyLB8GHl57b0mOjd2lixxt9/8uN/vw/B85dAS+8Z9/FfuGnQQ43CAnGjJDoQXC8B/ZXqjD+JMRKVSjwDRacGkpvbMDIVMWTqYpob4Nie82G2muGr3FaqMpSz/EP7jpzvOOD7c1Xrrxm6cFPP/UXf/jfn7x498i5y3/y9l97af//lq3ADllqsoMbdgiSAxl2tUw9hwTqubrQMmK1u9nORyFCPVe7rp6rcfUcMqSeq3lWCZlRzwGxeq52Wz1vrRz1XENMLq+eq8GHnOaD/C9TzwFWPYdgE3bcalSjEj2oRtRzAONPQqzKV8+MauCkNGCpr+H4t5q+2vKd//noZ9e2//3lQ3947z9u2Z2ZcfvHP7Tjmefe9YrPWUrgFooyIZTWMuVTLVA+NYWWjVa7R+yzVE0onxrXlU8NrnyqDSkfgXxUm1E+IbHyqXFb+WyrHOUTJiaXVz414ENKSYRkyifEKh9SqdWg+oLoQQ2ifEIYfxJiVb7yYVQDYbQ0a5jwITVbTeD2C1nKbuzEom9+8crmfX/ztnT3Yyv/9g9f93fhLcmPPv2DA9/sePHEY68rW6Fs5RHCeghbLMXXz01cLZxgZOLqZAq3VqBw6wrNr7baPecyZ1hdsjVTR+j1etf1ej2u1+sM6fV6nqfrzOj1WrFer3dbr2+pHL0eISaX1+v14ENOZdaBiZXp9VpWr9fBJuy49ZBgpF6HMIher8X4kxrrBg3WrFfbiguOmeotdfvV481n33S1939evPOW4Ufeeqqw9zcOVX/3820/fv7UN//8E5/4T/7TiJ6opSyl9UZu2FEFZdnAKkvRtyJ12VBo+pTV8ptZyf3SDYzo7ivi95zsLY5zoPeRgQs3P3r4kZ09F04ND5vbwW0rU9iE/9OwuaOu6+ao+zZ31DWbG9nwR6eRzd2gZXMD4WsgN+aaG/5q2IQdNwoJpmpzR6U9eGHbQxd7+i8Iv64Tnoqk3162hM249Nzh8z3nRi4LRYnh5d9jePnIQF9/38Cj48rqKzNyBFNjT6rRJ3Xokyj6pAF9EkOfxNEnCfRJEn2SQp+k0ScZ9EkWfYLPdR590oQ+aUWftKNPOtAnY4P4oyH80TD+aOQaczldmyrif5Qa5F9Zt1YL87kjLa3r6b/Kezo8zN36fdnkTm6M2ZlOmEPv5PR5gPnE6SFFQHhIkb/Davg5/5DC84cUFXSG7B9STPohBaE40I1rgIyjoDauFdVes6H2mhXb22iovY0V2t5kz2enofY6FdvrMtRel2J72w21t12xvR2G2ttRoe3tMdTeHsX29hpqb69iezsNtbezQtubbH022fK+z1B7+xTbO2CovQOK7a021N5qxfZuMdTeLYrtHTTU3kHF9g4Zau9QhdJvsufzsKH2DlfofB4x1N6RCm3vVkPt3Vqh47vNUHu3KbZ3p6H27lRs7y5D7d2l2N7dhtq7u0Lbu99Qe/crtnevofbuVWzvpKH2Tiq2d8pQe6cU2+sz1F6f396UtPeAofYe8Ofz5z9PG2rvtGJ7LYbaa1Fs75ih9o5VKP0eNNTeg4rt9Rtqr1+xvTZD7bVVKP2OG2rvuN/ez39Otr98sv1Zk93e2OOGGiwCVeYIew2111uh45tsi36yLYpdhtrbxbT3cixG5hLVcshwDMj8s1a7T/h1BBhqebGOwB6/jsBk1RGwCUtVpQpLlXvCAgoAcHEuoGt04Ip7SucGDyodp/N4vaFcQAA5yzzkbPOQc8xDzjUPOc885HzzkI3mIReYh1xoHnKRech15iHXe2LgazwhkC6w+lbzkMs8MfDl05UvZ3lCX87xBF+6MJdrPcGXLgjkkulqZq1wuNNX7kcV4h54f8k90H/2pCBBefyz3YhfYBG6bxe+Hyrt2mGxSs6PAB8uEu/lEdcDsb0tP3GhquSesjUTJHZ/Idd30SF89xc0tPsT8FTQjMspgLHK9HE5VROT201V0qmmXEO6aUekK4txfZAuJwgjTzsK0mUsANhBDR0ZVIvGFJQbD6oU4P3z6r/7I6rg0KXnXvxq19sKzd/8Sd2b9/W84ZE1b/n8bf/62HXvXfyPD7x/zm8mLc/1T6iUMlS91yD1K5jMMFF9tXm/NdFydgYrsh9lRHbv2ZPXalb0nHRSsOI25O+3T0LBCt/x7znH/+2+43+KHP++yWJaWHyTpVyTRVdYVE2WKm2TBe8BV92FkVh+3a0qZOeWLWEziOouIX8Z9JdBfxlUXQYrsI4+UWf+GwNbRgZyD6771/Dn3tbyrtlzv/aD9770z//1aO/67/7zv3x0wQ8oAVe5BWS7tSNonswy89n1VrtrqdHT/8JUhWv6X52tfl9zSU083NPfd6JnoLfrzImfE23bmYcu9l7sPbH/7EDvheIftz3ce2bgwvDwk9pCvhf5+z5CHenX4pr5pBsVkF442Dtw8fwZjA8a3nPo4jHE9dmNfRT7wATzvLykQhbqplkoVshuuCbJ/f0jhc5/IMWrwS7HMWJ5jLu+PMbx5TFmaHmM8xo8ZmZ5REqJx6fR8pggJpdfHuPgQ27liWmYnbZS4jHYhB03jpmZVA/i8lLiLH+iUo24pxqkEr3PkuhvUt1okM1V7BqJhAs8ZyonCF2Q1BPHI/q6IInrgoQhXZDk2TVhRhfExbogeVhHFxzW0AWAD7En21zUB3bRTpZ+NmvMflItkSIpEJF4Idtn2U1HKV2zQWNpiBMd2sCoGby9ZkPtNcPXuGrE1k/uaqIa4lkYDsf2rBY90LPKiB+1P6mH3bU9i6B40RLeOAVz3Dv5MjYYNqjVZUAhpGwhNAm/8DWBD3k65yGGoJ5EaXnHdHwL54ZpKs0wLzothVyzJToDXG9bFERHMP4WNdFpsVOnxeROsoXg71aTDYHtHTJF7SIWsX6OvZmb9zbwLbfkt8P3SDMGNNKOmDFt2NJqn7Km0ign+OUNqC2ImDqA+XcLmDFRyFmlU7NvwsCb+C3VbjgejAaiTZVoGkQ9ay9k3wK2VUgTbTyZm6SbPbpfTbCLwn4NWf36J0rZ5LmH7VCxIJ3r4EfUrjDXneSYAEKHYEydhexVYkxtUMIJfYXa4a0Ic3ZAc4nvVmsh+6zVrW9rSHqTdAXpJGeZv+cQvNep0ZEOKS/SdOuA3RPS7V2AbtTa1iRa26DGsw24Q8Gi6iAGTFtUHXZV12FydeggzKJOkw11SpehLhGfjX90B/bRdlVZ7hLwxPZC9kOAJzBeRSSyi5bIovL7sFwitzuRyB38R9thvwhduoNbYrvge+R6DfR1F7Jet8O3qfU6wa/Xv4cuqQgBEiXu4Ke/qZD9hgX9B7hbaGK1tqDAWLD+SHiO7tUn5St1E2mzO1qpEwx/iZj1z4hVLVHuSt1FriFNbkn3mJr10UGNCV3DOpzphY5C9v+T64VO2gGkrEw6Kb3QAfWHeke6pLxI062LWRVEdPui4kqdIFfqTrvSAa6PTfZnSWjD2Z6loAlne5aGho/tWQZym+1ZFjKb7VmOYc1xv8NhffX4ImUQFVXRP1rg1XrGeZeCyG93Jh5F6n9HLh47nCybO/mPdlDiAdbUnRodkYvHTlXx2CGYoJ2F7L8bMWR36KnELgWVuAOlObEm7ihk/9sa0HfHZWH8/QAzmHFv+/gzzZiYLquN79nlbccEZEiLdWT8tof/aCecE6pC+HYN28CgPm4SSmQuQDFcB5wTgd0PwEvqxpHlw9mQPDRuRSp4fdrEXp+I1e+8ecsIsyLaZVZELuGSFdFFWhHk9rdLy4cg49ouVetPZEV0FXLXGbIiCJq3UDRHfTydcprvFrowcvMVFGWiTEUZxxVlp1RRCpnHgd3K7Eqpqyk6NE785SzXocpyCbFMrqBYrgXOicBPD8BLCkd9dE2oomwSQBfd485lYpvOgXxel/20D+Tz7h/I50lNyo25Sa/ZmMZ6yBjm3AkVeIY5mFU9+i1CN3Nus4ixrTM8R6dwE9x+E3G0Wu4Ud+mzVRPOVnlDbCWgb55gqxa9Zju1yAHGzZ1HgmfY6RLJVszJB89WbYXcXuLkEmWrVn4crTxb7SD8AJsJP0CC9wNgcQJpNO4gQ4hrFsXL8XEHhyk7BDUv8y9IvIEi4zJfyN0+sZB1BYiIjk1EREeciOhI8hEdYJK5mA4wzXhUR4aP6gATzcV1gKkuRXaIgp5zJ8qON6XSQOI8c+I6L+F6nGsC13lxQzovQQYXlRPbVi2ObUtMozjXJDG53ZQGSVLxqNWy2M1qNs6VjJ9NQIKRB04QBjlwqsb4Ew1tk8e5VguD+HIDlkqsxuPmuOCPaumeI6EWT18tdk48Ij9OSgjXgAaGQ0TQb7E04ys1ZLlBOuAkaSo0MBY2169kIfdaeKpj44ckzzIo0ybQgOMkLl4CAoOuI5+lVEcsInKqkHtCTuRqvmdJKSVSaqyXFPfql2GvoNr+SEltHz977tFxvT08fNVB1HDCQTwxfq/9zKtmbw+fEJC3cIwIznfiMkaMo4yYZSf2Y6WJPdHb3zvQa03tqIOpjePTNOq8mgNlv+Rct19y7tsvOdJ+4XawoGuUwyWLNZd1ZC5dsMwlJ9VAbhcbUtmZTg0arOwTyUnZSuWkrHuclHU1yyM3jUod5InJ5S3hHBTK8nQ5YwlnmY2mDTeHGq9ED3KIJRzH+BNVLHJLWGQYZgu594KML9VFbewNpd8hFyW9YZpJOpLbmYvqSHr0ilHzYeyNLoo7z5GhQu73LEvsQ1RC/EFDNSAPErxMJTzFUDdhAn2SRJ+k0Cdp2FXOIWmPvMz9zyXM/Vh+SlM52VHqTnNCs4NjqyYNf7iFeIxOklL3TFuI9zlKDGgTIVo/L1Jh+G08B+cgCmWXXqRSHA5qdLZNTZ644Ls2k1HobYRgtJtsqL0kZeohEVlGhRJxFp3c6t8J31M1JToRU6IDNSW4+yI4XfIlXXPDwtgvNDbmvdmC/gquvW1R3PvhWLD+SLJJyF7l/kHukckSa4rDAIQQo01EAQjfIiKeQ4wtinNXXoNlGVZxFMfDsLUwjuc7VFBFDo6PUmSd1Hy0cQ+Z+FzMqhM6VjsZKeZHlCvk/t3Z6VoMrmpUMBx+ptlyCY9tbiXMiNAl/FwzCwwJ4QnaT1wupEYQNmzI4gsrtldvqL16YupDxG6p2nW/SDW+WwoZ2i1Vk3OFB9JX8/OYhVIgqq573VMT3HtdPVXXN6TR2WqCsExNRU72ccLWuB7uUoMTttoQYWvIucLjBWpIgUQvowrzzYXVZHyWecjZ5iHnmIecax5ynnnI+eYhG81DLjAPudA85CLzkEHzkEvMQ27xBBNt9QTFGz1B8UWeUG4uDHypecg15iHXemI5c2HRXeYJJmr0hECu9cRcLjcPucIT5FnsCfIs8MRcuqCCZ3liLr2hgmd5QrlNW2PQG5tnF8hzkyekxwXyrPIEeeZ4QhMt98RcrjMPud6Zb1O9HyEkLqjMOz9rOvXu/Aw7uPOzU+/OT/wOiyycDvXj1aya3z17yb3ws40eDD9zGrJ8vUboZZ4gTV5BUzmHnG0eco55yLnmIeeZh5xvHrLRPOQC85ALzUMuMg95s3nIJeYhl5qHXGMecq0nZNwFTbTME0zU6AmBXOuJuVzuiblc7Im53OIJVt/qU7ySrY1FnlghZ3liLr2xQs7yxNqzyBPKbYknmGiuJ8hzkyekxwXyrPIEeeZ4QhN5w75cZx5yvTN/nHo/XPIV5zbo+YrzDnzFG/R8xaLQ7evn/oLlFWCQstuaa4VJsdcvsrJMajUOLcIlYhPjr+Ee1ihMjqC5GrXJqaj2NhpqbyN8jaukZ3Gk6okC3hDTdyzpwMrhux7dLGA5fCBP4qg4i+8RC3wdddpTg88sV96otsSomJpVK29UK0zSur5DnuJXi8zHUYURTSSPXcvKB12xfm4W96qz7AK7lM7ja5iDHqXRaeDZvpbgxjR8Dbvas/yjuFqjR3G17h3F1To+ihv/7qgx08UHnFaABss+cM3k1KS8/IbAbcB25ZVXUF6as5eGr2GQQoMNJKVnsC9XixaFPL0orC5c32tZehGF5f2kYr9Fy3tGWC54nlWm+PoHKCLkSDbJi2gLWiaAs4aom1WhLg+ZUVjvV5NZ8BmmfyIaD8hvKszI+C6vxXcZKd89osV3jyn2W8R3NYIOZArzNljgr+bYI6PKdxmS70iTqN6QSVQPXyPayxhqL6PY3m2G2rtt8hYD0CYe5lV+Q1l81ckp8IfADMyp8QdZRi4irqS4mrCqNe9RCOpb1cQ9Cqvdu0dhNWpVM1cdcFPdAicWaU7zUnkAeZ15yBDFgHcaYsA7FWZFAHmn1KtJU86oV7MHef8+8ftNAX2vZo+OVzNAES5jiHDMKogWa5xwRpT+AorL2fUNqKiWp2twNgkL5ORLPhiN+15aXK9s0uL+fS8tpDmKX7vSwhO2FdKK03D4PLa6ru9b8XlsMTSPraS25CrIga5x89gG5xFpTrOcHYA8YR5ytdgx+BeWKfwHVC3AvMaUtqodc7VS7Z001N5J+Jo65EnpAtRGiqSjBWiXeEFpXaN3rNbm4Fhtjd6xmkbt0hqwILzMaLNWULcfogtYOz/h7WoLmPga4+v/zuL8z1EdajHUoRb4GtHeaUPtnYavqUOelnJ+B6lETXJ+e5+e6dXhwPTq0zO98LV2M1qBtMT5SzXmNIMfqAJu6aBKerZbY3ruSEvreqpgZ6d4B9hOWASdeotySN8i6MQtgnZDFkEnKVS22WDusuYEDjxFL74R3HPaRcgwgIyZh0yYh7yB49VOBTUkIEIn0R5zhS921ayAYbtcZ9gunGE7DTFsF8mwyEfbyQl+8eb+nuOnbz77yKWXus9e6O07cfZMa3fv+QcvDhTfPHvmMiR1EPxne1Cjk51K6qzLpydDGttsbIdd4+Riu4ICEnDCdkLUtitIr3PIkHnIV1Hc1WnItGJ0msaKOaUM2z4pDKtO0PZJVkDtuALqZCYQc3b9HFP4Uccl7FL19jIvVQ/hl6pbpcZDGstqR2kSKK7uok1OM1LU4VCKflHtzg6pFHWZkqLOICNSTozjbvqiAXyftInws3WAnRLuY2i9hF8f3Aa8DKKi4rM2Wy+souo2o24IzbrNGfiae3WbA/pMXml1myOwa9w8gqeouzXCNxchSAMgV1Nhu8cMhe0eg6+pQx6TqoUIOc0mHTI1DyDvHxO/H6nSd8g8oOOQsW5rn/WwWNxv5kWrzVzca5uOSLe5vm61uS/SbToi3Q67Rm3jX23IpACQ15mHrDEPeQN1TVK1oUOgaoJh2wiGbXedYdtxhm0zxLDttHJUdse2OTK02qGh1RHU6GQbbmhVwwkk+KfZEP80M+YV3l6vofZ6FdvLG2ovr9jeSUPtnVRsr8VQey2K7Z021N5pxfZ2GWpvF6HfWrl40lnn0WaReFIL4w6BjdFWmPPfFvRFYI4QUltLmZtZKrCy2lBgJdkZt9vDIIVRPzUlAvKTX1uYM8ua8kvcQCIKA9HcNFTD1+znaXALIz5PixLLbcr1LV8KX26jhpbbFD+dUdQ+zMKuUUH1ETSzkMyIpiCT/P4TJ01Sb3Y26ZMmiZMmYog0SZLT8fvdkvw8gqfXa3BCiiANgJxlHnK2ecg55iHnmoecZx5yvnnIRvOQC8xDLjQPucg85H3mIZeZh1zhCVZfYh5yvyfUxgJP9HKrJwRynXnIG81DrvfEXDZ6Qsa9YRqs8ATFF3uC4gs8MZdrPGGrL/CEQC7zxFyu9bX6NNPqLpDnJk9IjwvkWeUJ8szxhCZaPl1t9Tsm0VanXXyOXLYmU6mTG/XCR1IOwkc2aoaPTPKRAVbEwjqemo1GnkWQ4ylwXCMqdxIpzN5rgV/nYgyag9TpKY9BY7j7pRJ3n+wd2NJz7sLF/iIhbSxrwYSQGKmZlwV82YLlUl5B8a9DhGUPmg6KIZUSQsdPpYT/YwWGfQWZ3DAxud106U372RmQktB4o2gkdug9+y72Cz+t4XBrIMGYERI9mDi9s78SwvgTjRZFZLYBYooC12Yvs2okVeOhqFxxy1Bp9jF5UCtuGRKWzp29Sl7cskZ4jNvAcIgI2grMnd2kIcsN0gGHyQJaDbTyDBdmrwEFtOz8EOZZBmXaGjZ9YOwNEAaVLwGFQd+xk3TVIYeEZ+qz2+VUDvE9C0tJUavGe2FxrzbCXkG9/ZGS3j5+9tyj44p7ePiqumqFKxLyJE4sBKjivaqieNXV8ISEbCY1k4wTq3FODLEz+7HSzJ7o7e8d6LXmdtTB3Fbj8zSqMU++BUOE3DK1qDlTVKlsuCOD6YJlMAl2BQomjdCUCs10atKg9eBF4iS4STRa+olWAI2S+yaqAmiUai9jqL2MYnthQ+2FFdurN9RevWJ71Ybaq4avYZDoFo2IIIwWZt9jLW3fxntbtHkRVJ0jf3nwc1bklyDmOgk+deJjwOuwO+m9oMxqDg6EqCKfd9L7Y1Pa+yjsPV6Wudza7w4Wxjy+MOYMLYzCyTKytU9hF5a4vLXfWzlb+yZicrupmspNVKHRlMw2TbFbe6bMsx03DwlGbu0hDLK1T2H8ifc1b7OjfwlCGKyRboNqMgdlsOBfUl9FeLbg33WGEhcAZMw8ZMg8ZMI8ZNIY5Pizoz6gD+gDTg0g9ywHFS/3tKn082FqX5HROPBMqu2Jk5PeHpZvUjr6ez/aLLKvtDD2C/aVycIcKz1+9oeok84cNReoN74F6RT4duzNgn61FGZ/BOx3sdI5kTJL5yTx0jmWCRByZjeoiw0zLc+T1XnVD5uT0p1zK3kAkGQYiKNPa2H2H8kvDcFZkqZ+sjD7TxSo3+Ie9ZNOqJ8sk/oRkvpZDV9MREr9FpL6EdisUDr/Uk59LBYhK6F+pDD7/1OgftI96kek1G9xEkQjVBhgWjjqM74kdQ9lVkr9JEn9LGxWKJ1fcS77Ubnsf21qNb9c9rNOZL9FRCgwLVRKfp2G5pf7TLMk9aO05s8WZn8HUJ8y5pKkMYfm60ZfkKgkId8UPeTfs8IhYk5WSuMHV9aTPFL5KGH26Cqh5rWLEDGFKM9ESZ5J0TxTpM0PiQgJyHHi81uDedcO3NSezbvWWTQibp/f7hULQdTl81t1IQCX/nIRmGCapDGYAkWfKdM2iFCbL/6ODOaeKeICDXTbhlc5oZVwW2FO3dQa7m3SxbuddFwgHwmKPbXDaaEKlyY1hL61TMOdXdcEhvucjOLi3UYu3kkniqybKOeYBA4OTsXPhMHbUu7gyoJWEatHQI/zjuuvHgF89agytHoE+EmvQlePIOwaR2Pw9HasuSDfXJBwcAHIReYh15iHnGUecoF5yDnmIZd5Yi7XeoIvG81DLvEEE801DznTPOQKTzDRPE8w0VJPaPW1nmB1b2j1JZ7Ql4s8wUQuzOVyT8zlVk+w+lbf2qhk5ebCXC7wxELhggGzxRP60htMtGy6rpCzPDHwlb5Wn2Z7SG9s+Ho8MZfeUG7esIIXe0LGt3iC4t6w1ed7opcuaPVVntBE3lgoVniCPN7QRGunqyZq9IS1sd8TvVzgCYq7IOMubPjWeAJy7iQK5MzxmMhrmcTWHzeXfm4SBHvMvHbrULkBDyf48AE8mCKki60dTBGydycEe4YGWsCOrVuLd+x9mT+6e+uin92FkUFQ9yQkjR2qJqMzyq1HcwyNsqpmnwT5WbRCpUDjEyG0Sb5n1bo905lF0AonIdYcH3VGmInLOUUiF+DCUWFglzgctYOQgSm9ebpjUm6ets1GF+waRzvwdOx1WHuCS6u7CI0JMKPmIdvNQ97g35Xu35Vu8q706UjPdgMa6PXmZbvDPGT1ZGigTgWNJ6BCJ9FeO8GxnQTHdrnOsV04x3Ya4lhamSAfbScnWEMDdUENtD2o0clOXAO1wwkk+KfeEP/Uw9eI9poNtdesxq+q3IY3xPSdU14GG7LAerj5265ALwE7blej13Y0EcMqXTB3A9oskm7SVvopSivbXphn3ew6dzN1izDJTTxrd0EQM6q4bSrbQyBtWT6WGoAyIEjxmTfTmvTdKLQwhxOoGhHw3H0W8P9Sc5QxNEcZ5jWuQ7nC3HusDh2kOpQ31KG8IpOcNNTeSQUmEUCedLKs5cFHTq6L2CVOH+xag5bDE76/fab+dRFrdK6LmElUDNuMLjJHLUb7E47wOxQ4fwc/4TvUOH+HgPObCnPPWh06TnWoxVCHWuBrRHunDbV3Gr6mDnlayvk7+Y9a3OH8HX3I+/eJ398Z0Of8Ph3ODxDbMo7zt/Oc/0f2d/YSW4Z9elZ7g/6WYR++ZdhraMuwj2eWvQizfGkZU520++Kx/r7je3ofvdB15kR3z/mBvp7+cTbAK5YiFbT3RXUqlkZHUPzYiFru9QFi2PwmZB/4EEPsJhCPcYgHwIcY4i0E4n0cIrCZbsFrge4dN4rgd5YUvGf/WchiAHHvNWLYndR7AVll9VJvYeul7mV4HPtoH/oRSoW91z5hTqj2MEPl1pk9hblvtMT/9Xbx30Goj528+vh9bo5A63vFjnxKwxxw3SlxwH0Nc4DUMLbZ6IZd45ZMhsfV5bCbWIW7IScah9xjHpL3okEew9rbw7e3h2gPiradRHvMLYkho0vinslZEpW5fI8jL9o+6EU7ENTo5B58AWP0LbuoL2AW9eJyfmtPf9+Jn3frYO9DF3svDFwhVnPsyT70yQH0SbdejfBrWp55A7c6sHrlRy/r3OBCaepbXGf8W9zX1LfoaOpDsGucAgFPx96CtXeIb+8QoZQAZrt5yG7zkDdQRtpeQ0vDXvgat5pWKMd2TwrHqhO025GqvgWq6kNBjU52K6nqWwhzdBNvjgKIkkGK74d38PthAIbuiBmvLudLAmAlb5LQ0foF64U/Rf32ArbVDC8J6rNtB862bYbYVlDKqQ1VtJ2wa9SxjqkjVACZMg8Zo474dhmKQ9mlMCsCyF1S3UFTzqRvrf2inm+tw4Fv7aKeb610MiKU6C/z0qoZijHDCpPjxbKdOlyrpZgKrVrchZz5WZwlugarqzC3VBz2u/iRBXcNVnuJgFi4ZFuZRen+GC9Kt70Uaanua97uxNe8Ay4QnGTuhNoMO7kjjpC60cnb7t7kdUgnr8tJ7NcO0TghM9gnD0xtjUZP2uST1+He5MnLIW6nlaoGu1KctwMuR+rqHUTHYWshWQ6RibLk1UlnYe7/o8oh1pIMkYXgJfWsLletdtYAT0DD49CzznN6FmjoXjRzgG+XCiDpha8ZTUaYN4tfojQLIJ6yz1OAMFaDutjaxmqQLK2IGrJBxWSE47d/5pu1n3rNfzlLM1EPlO8F7FBmyH8vquNCaDJCEE1GqKaSEUK6PdOZRdAKla5zwhlpKMhOZ5BchkMACtlkh4Jph3kRJt/2wrxG+c2nggWpvkz7qY2atp34wdkO7pRvO7OgcSPcUZi3ZELJz2unoh/4MLadcNXFjh+Qad9JTfuewryVwNLGxHpHmaZLF2667JGaLntJt7/OAQOYE46z96lwNg+6U2q67CBNl52M3ImYZh1lunTCOaECw7cD1nNgInYTLqrtIPLTzriZ0k++RPlqaIIhnRLcPboaLh3IZ3T5bIDQJCyfPe9meI8BXnYd3fa2kPFBlI2Jhlphd2yBy6iPigezU65YBXXps1IZo685qqYmDo1/bUVGad10ul94TdW8/Qr16DNlarFaXIu1SrUYtTGo0vCftcE5oVIzBHfs5WDb1DYIvYIsw3eoGtUR1XDqx3XE9Y9RFwZ7Skfcp6Yj0oZ0RLosHUFIT3Eo9zvSEGlPaYh+BQ2R9zVEuRoi71BD5C0NgYa9Z0lo5KOc/Hq63cKsgHmvkguFYLBhKclWi6LmQb/sQpGDs04ozxrX2DqGs/VqKVsLtbNsjgS6sQlSnYosz/FPa2DbOA9mLR5E64hkEXYC/owO4XVq895mWeAf4KiYpZbATkhIzWMW8O3YG4UnLfMuy9l8uxPrkHYed1KJLzuc5FE63IAx5+nCDdgzilfpZMlMn+0U0dscpe1uR4lOrIRFR8s7FXb8WfdWwik5Juskj8m6NJYcOcN1qTJcViyR76MYjtl4U6t7Fugb9dGF0LU6JIDOfcn+Vh3hqq93/Qq/etwdX2corqSen7M6JDrhJSbsc/xOPTyCslYcdFA/UydvY6b+jX170NQ6hzf2CQMenF7XV4eHcQFndITLCqgDEyvLnKhlkyDqYBN23HpIMGaERA/qx3tgf6UW409sgurkTqBagVKpK8wrnR5/k+pGtWyu6q6RCFgVb4AwNmVQTygDzSs1HWR2RXBlUG9IGUTo8wjzyiCil8Tl5BbbOvRJ0YJ0TyPwTFtbmPeX1hr2WTtvAZOeSxuy9mBW2tC8nxELlXY9BvzaWm0ohLEaCMa6j1OE4GbdBt4mYNQZ9xRczniRA24o/Tyo0dUGwo11EL5mm8iGMiaSa4jpu62hmMmGLDC0qntCRE0oVvZ5j4NvOW2dgO+RKxBoJIGsQHFMKfKX41qjnJAp9FL4emSVqqU2JvWF+VZI9Dx0K1r7nkMXj0HK7IdjwfpDGuRxulfz/tVaOf9BwyislW4TGshe1TKSz/WroTDv3wn/M2NYEFKN3s4eE0k16BHyWZwcUwMjNNyY4oV5P6K2PtCkIxUZei98rbBeSYyRReFC9BMrRiVALESb+IUI6OjSUsQ3UVOYLwjLqTUX2lvLdxu3zTTbdZC3UovbZjWGbLNanoNr0CWcZi3wFM1AqSP3hRRk2BikZfUY7yN/aheG04q0Fybd45SXNoyadJXGruFJYVd1goIJ1kizqoVpVnVBjU6G8f15DaF+agl61rnuJ6rD6VlriJ51hElQ3tYwLN4a1rntJ7qtcvxEtL1l50PSnwMspbDM9xFm/USskYV7f8K0lQ5hECs9jPGnsp8m5FAWNT0lAaM+21r3fLa1xG4edI2yMq/T8ApFiGUvorCS1jjSJhcsbSJIjcPlHfCwUNPUVDmVeLEuqlIT+hpy8cFWLHJDwhgxIsN//nq4ycKlskZczsCgkV01jYzssIZBWeOaGFjLnlAIwjPNCsFMx0Igj4EJk0JQTQtBuDB/O7Urr4Kfj+9xMz/Rdw1ZP+Ni59CeCfD5/dRJEO/uSEBVi3QriXQLfCt0DSQL87vl8RMpJ2kLaf6jFOyYfZhJ8KlGRxJS7kmT3JOA3eMnKF2Yf5uiT4debVMU0RsooqPeoBRKdMIhmCrMv0chfqLevfiJlDR+Qsg6Mn7LiAI8wZxQ1UWTGpaXnOGSqgxXL5bIPorhGuCcCHz5ALykbxxtQzgrm4fGXehRy89t/SngzKNsfQSBBP7k+ReAn1twN0+pa8SxDWflxFy3cmK4ldNgyMqJkUdc5ezlA2LjIub2Xn575ezl48Tk8nv5GLQT7AY5kO2AbC8fYPfyzNGEHTcGCUbu5SEMspcPYPyJSjWyTEWlEv0GIuYDdCMqm6sG1pdQBVHwk1VOF8T1xPGwvi6I47ogZkgXCNg15qouiB/S0QWHnOzzG9AnwUmN+AgU5v+KteoOcrIPWBa9YyLAkydA+F42wNeI9poNtddMiA7Yh20mDhk3oEcjPahj7yixFW9Go7Z60EAXK66mMWV/J24ytCIOhczWUMJkQwkQ3YDvq1CuS/JckFTjuqR9WEmTw0oSbJMy2VBKGgOTIfQmf+tGGm4z7EtXBr5HLsdg4c4gy3EaWyLQIiRWAMz830YNRmTJBhpFlHQUK+RbLfCP4NYotzXYDceDEYDcVaXpnmUK839HHgaTJmjc7axfMdhFYb9+nwiDYa1FPDc9oREhn1GY6xw5JoCQFaaezf8TYkxpKN6Eskrpuj2ycNkXOj4+I3d1ZWjzCJkucpb5jDjgB8tpdCQr5UWablnYPSHdPkd5HpjFTLACQY2Hpwo1a7BqVs0SydpVXdbk0pAlTI2cyYZy0jUoL+Kz8Y/uQPMXVWU5L7xiZ/7fA57AeBWRyDwtkUXl93W5RDY5kchWMv8yT+lSfhXOw/dU1+s8sl5nylivv62/XlvcIVytSz7C7+IbBFvA6h1wLFh/JDxH9mr+9+UrdYzYtjhcqQMMf4mY9QfEqhYod6XOk2tIzC3p/rGa9ZGlK+NoJhtL9EK2MP9ncr2QI3eu6sokR+mFLNQf6h3JS3mRphtTUkREt8ZqxZU6QK7UKOUCwkDjHE23QKGxHo8zBu6BTYR7IE3EICeJM4kU4SKI8S4CwMd4/EwWuAn44VYXGrO8kzBpLuaZN4+Zo26EdNXECTsdtFo96e1hkMIbP3sgTwjJsdSi13xqKBsNDWUjfI1bva2fm1Ef81He+QTAMX+RZQ807qF2FjUah+gpNYKlKqm9jYba20joEMM+Jpy4SZ64aAGhNLKqJks/jwojGVb9jwW+3tnOm/fcyCPY0mqHumFhlxs3ym3BMDIfRxVGlBbVCA5D2RX26mZe72fM6f2MWLtttdbWWifxZd2USgwT+msTr79wvRcnVmsm1Kakw4SGxGHrhX2Urd1l6FyjC77m7FyjizjXGB/Lwv+Ln1Em2fPcGPyJfpRiP0oqfZS8JsVCtXTPZOm/E5RXsFPDPZsm2uuEr0k314336upbwIZnxPr2Wxb4MWr/lKIIzNAqA6cQ/SjLcoViS1w94GzJTEG/ytgZcPyT40IHbGPBmpC+yfLZnaDqke3Q2NPliPZ2wNcwGSqx2kNoswirpWhWyxUaP26BD1ADNuoqRbkiz3JFDv5EP2piP2KcbrZO503yCmioCe9dKzqkDMl+rS67jEHfbQ01mWzIAutVYO83ol5ZOXufExa/bLSKzzX+MrUnyOpsw9Iic+Tfsb632/2g9yuYlx28wSy/K2RsUM1iFhVpHxssNF4GJjNWxLPbGvAVdMAIscBPUaXA9kLjb1vgT9F3LtkfdigpirFBbqnqgPpePCu/ZnXqV6h2m/gpA69NQLyLeOsEeAsdQwerTtohkuQGF1vfW5XUVzvbXivZXhPsGNFe3n4beAecctF14GND8A3khGRsECDKQvtsEwm/baemgy0CNQTHoNoWI9TUstJBKu4OjTOs1CUsOjsF+1VSxIT4kRKGsmc7OZbi9KPqswstDkzdK9QOFBVp1zgyRlDrj1PbZxW0Pe3TT0EwoU//D+S+jiZEKedoA7EI/seOSmTvkJ6otJMlsvlqsKxysYk+tGdkkt9EWGSEGcfsp04oiUOO1RZNcKQOzNkcqeF1jpmU1EEObDum8Z7rb4zvuVZ9zgL/4i/cnitZ0XuupL/nsrH3d4zvuVY9Z4H/q9M91ybFPRehehkWSMOfIr/xgtKR7Q+I3BluA5Es+bqw+AzRSQGzveT7ky80/rfltJ9L+bH3GvJj74WvaYyfWT2FE5vijzzyupdo4dLCYbfqYmvn2rQSVmcTnofTqngt4vLmjrGvx575Cw1jy9FtGeAu+3IvQt+IZgO3o9citqLXInZQ1yK26/ZMZxZBK5yAgKcXnJGGgkybh0w6g+RuWmTCH3FrcTNqrFg5MwvWUppsjyFNtqd8TZYUa7KWsg9v1xLGEYfdpIutrckEZgjoGarJmhQ12eobv9z06c+HH9CIqWtyEqC7h9BkmvqiGdVkragma0I1WTulyVp1e6Yzi6AVykt3wRlpKMi0ecikM0hOk1EnQynC9szC0ZV0meigcoHl6l2wTudIIYlGdqXRJxmIN9EqcXFrab86AXkno60FO9UFnRbwJmLGLNt5wRbKIr/mQbEGAz5WcEEUgTU2C8nSzxi5kVCbUeFicIv1wu6pjjOJEYyVghDYCl2KM/lnNpH7d5hE7kOnes73njjUe/x878AImh+dsyVmX8UzqdEnSfRJGn2SwfO/r6pkbCP529e2bewbRADcRkN5shvhawbzZDHd4gCKCEuJa6SmZYhZiMPXqBTfjeSlkYlJ76s0ZmjBcd2MqAAcjyjJZNVpC/x+qqx+kqoYlaaY+xZDzH2LS8xNccgtJllfwGwlAlccqz1sntXWWOCPOma1I1i3EkTlLMFsHKEEfQrbu9VQe7fC19ytBAHaJNTAEUNq4AihBgRs/Ba0WVkK4zFhsbSVz1vQg9RwSSL3GSJyn9/elLT3gKH2HpgCIX2ACoXuMxQK3UfZBm63J1cKv64fek0ohXRh5e0W9G/SSkF9uEkQOkdZXurGQbI0CLp8jINsYk1bJKHYXtpQe1M6PvXwA4tC9zlKf86LEK2fF6mYgTzFthlDS3cGvka0lzPUXk6xvckeX9xQe3HF9voMtdcHX1PnwTiuyZKQA9W9tXFckzGRHupnAXFc8hivuPo5aZySPPBeOx7LTWE+TIVaduCh3iToK6hIZTzWcmyIRH2EQ4VRs2NDKOwwQaf9PCiM9R1GQUfIvvIb0yIU+BiFvUz09QAPOgI/RUFHyb6e52Hh71EU9goJy+fzjMFgaTR+f+wqCSu4tXEMhgBfRXGfJHGP8rDMxyjsUyQs750vQoGPUdinCUbg6/YVgcCndtO1+Bf8nHfsGb2TwIT+QW+xCfQ0t9g3MwVix57hZ6w0cM75PPYs0z9ukYLP0VVq7FlBm88SSx9EzbuC2uQKaqsrqO2uoHa4gkosW2XBDrkDO+wO7Ig7sJfdgR11B/aKO7BX3YF90h3YpyZ9pzBJZzV9LkeQW14kqX9p4VzddJpAyUIQJdOstOIpFjZSe4kkOUGtxKgOahBeHjaaJzMr1PdQGdwKGKQsoyH3LaMhwjIaNGUZCTZApYHbiud/rBRzcaL3+PlHzw109V5oaV0/isY3dIjr548Nx9FPxoZGlWrrg4fr48La9lfEjSfjyEUbB8Xv5+Piv7fHrzjolOQTCSAnuB2FhS2W4K7Wietq4nXKLZT7DjdyNJOc4M48p5vBVBQKwk2eKyy0riRbeGPFjsaaeGZYotFslNdHylMC3C1xyOJVYXNK96Dk3nPoVD/beL7kPsF6LJyNbsls5AsLFapFtVKzQbry+Mq3zKBUZiP/7gPn7ZwD0PBQwE1EuF/eYuj9BMJmHoET7/2EekgS8dYZoCBEAYcLb7VeOFRmF+/Rk6BbYH9tifuQl6+tHygH77vYzyRA5eEEEVf0KPLENXw0iqWJmK+cElPcIwwhWHjSeuE+Kg4GDfaKEy4mgRY8Dl/TWIRyEAKzrUvs8QTlOT9uKLz7OEEew8mQ+OD54okLz+qmQyZLYiJKhlxZYqLz1IZt0iYhqRhHwws/errWKspwZHSSaGYWvrLsbI0ZRC3EdqLAYEnXvlo3qihOkTtZWDnfgn6cUglNOuHsOULu86JRPSFeQQatF95EhawfNxSyfhy+hhNjM6GdjyusZm/X6K5889pExquo20MJdMfbQW149XacM0cdbHgH8Q1vh6n9ruAcscPYdrcd2e4OFWbid8yNDepveAuCyyiJLW+Aaj8v/qYJ2fa2Sra9WNfK2vjiMtpOyGgHYUGNDQIx5XVSvLDQqhWw8B2UvuwyZEJ1OTShEhACCyUv6aRvUiZU0pAJxVgP5aYXNuLevK19D9u9eaAVNOiBs8jbFT5r4gsoZSCrSSwQZPJ6xAbIRyx6fYAyzboM+dK74Gsa62GO4D2B+f41yrHc5SwpnBqLoByCQcu1lRh8u8mG2sFM4rEzSY0gnw412e3AISnJG3sTHY3zuE7oEHRG8863x5kX5R7OT+NNI1Z1EzNrojKMK37Hgv8LSlhbqYDL9klXyxjkC5JLdzrsjhbY+M8LJOJBY10aBzPtajLefukDxfXlRN9A39kzPf1FBriCSIfo4yY0p77DWrbGnwX1Fq2oVZrue6huCHHeJYZAKt6lVn4tS0Kq4bq8idDl7cRWrhVoc9xKiRNWSo7Ie84DOwVPJQ4QqcQJlRT5hf9MFMSPEQXxU3xBfNBQqSQ+sYetMbSHrSHmI0Bs5DQv3a7S38fF8G1cwNA2LkbOFc71MTLCuVZ4ScWimRZhf0TdNxHAOqt5BU8Avka0t91Qe9vha+qQ26W+hxqSSMxW+/2lrXb/2ZPDw1eQI9pd4j1p9Tbk/W7x+zWlm9LhPpPchG5T29W+nIlvscyyB8Q8FeQFM2HOw5iYtrdsCa2XMLXbKhLDck8uiqLAzq7vWhSXH1kKEvrULrhJEEvkJkIJVlvDvU6nXoflvDgKvhdddrlonvXCLGKd3YymIx5CT0MOWchtxAUepWoyfOfvEeaNL1psAS/Qq2GCdTnNd5mvHZ6FHYSVq6grVrNIjXHmKmQGTFL4RsQjRL3hOFrC9CGq+LH6AHPIAOPoADXkIAXxcEM0C6imYSomCFMxKTBEi2wsVBtWMN6iGykNsNOQat0JX3OiEg7pCAZoVnqGsuge6v5SdGnRvHi7hiE83t5OQ+3thK9x+xWDrqMsMdnV/GTv0Q3HArx4XhjBtOK9Fvh+ipOzuBHp4H6+rPP7+bKFRYec3893XoU3HdzPV+zV7bzFmDNnMeYc2hIJQr8mCdGvJo5magjhr4ZoZpQf0yuhPfOg1aHjlbQB3GeovX3wNXXIfZW0Adzi/gZwi7kNYJGnzvHiXG1OnBU2SEWzSbSO240u6Pwat8vUdCK/Rcpo7IDS+A4oBrUPhigLMUX7kiL6cszZDbPCvhxT6EuO6Mt9lJ2iU74BqD9J+QaduBTr58Om0ucB5itMJdADzEdMJdCnS/HPptLnQTcfNZc+b3X0gMHk+TS0hSTp8/Z8m2Eq/GhETznWOgg/GiHybYZNxR8JagOUBs7nIF1m+scfgF5WEHpR4YCxy9Sx6mUFsS8LtckV1FZXUNtdQe1wBZXQAGXBDgndFEusy9cXvduhwXFYDGydAy563iHwEbFj5dMW8IvoORxYr4XQt3JGEjDK4+NGEneGiOu2sOsncmFcs9UYUmzUNe2cWquFXeM4rxZOrChceNHvW1T88KQftRLt3WuovXvha+qQ90o3ZNUkkUxuyAJjr9fbkVU72JEV23C4JasgprnfUHv3O2Oa+yuKaR6fBKZ53BTTJEs/DxsKxDwMXyPaW22ovdXwNXXIw1KmEWyjV5fJNLuRdO6lyPs94vdTM/R5ZqkOy8ygCJc2RLg08xq3RiYKi/7eWiP/husQ0E13azjvaogO3Q1f0zj0rSuRy/akvnTebHsSgc1iR1LWqcYNQc5eS2H2DxWRl0KOJWvg2yzYlPNBuLDon0AEgr1DYYUOCQy7sFqHwlR7dxtq7274GhecZ/AoLUwwXYI/Svt33fS9RMkdI0rfWzLbgv4BVa03jM+rIH9BdpCWVDtIywi7vOh/5Adp4tTOAwrjSTlI7UwVFv0vv/9Km/O7pwnVt4lXfbjKrC/9jBHqL0EczYWhAsQXgIihBSDCvCbYe99g3Y56Qy11rNVi6FirBb422cd26pAtU3GMhthS1RvcP0bbYDKO8oYsL8415sS5huKbiCG+iTB8inuW6lz3LEW971mqg13jproOKlikuTq+uTqCenUKUq8NaRm+PqAP+AsJOEmWeg2hLctvqAYPDKhTWCc0Zy8CX5NC8mEG6JUAMcLIP8b0TRDIcoNVlKvzn9AGkC3PgMKIEiIzP0ab+YnCDTutXW9EXkzzht26PWdS3UTTsvinFvg+KoIlTLJvjHQr11FmfcyQWR+Dr6lD1km3lmER14nkp0bo17jhNsB3dqsJaoBxqwkNZ69hw9ktTXQvoaPKzd0J6RtaCdzQChsytBKk5wWPZk+IMo1lS4emn8sLgO6sOpirqXwog9e1psqAIi6KehCjjebdXQ/C1yiV+iB5z1KYYKNu/lkKrlKEKzRmyBXKLCvyRe8x3eD2AG0LhAuLH7HAX00fsRKzkaBsqSS1lqIRmGkHNkS6cMMTvJ7PmPMtZBRtDotuL0oMsV+yJv9pDbEByRTE1OpckhbAEZk70vD8vWuYSDeweg3hMus1hPB6DbEJyJDGtMYIvcDMAh03QGmjGLkG1cn0kcUrlSSosrDtOrGk/po1nA9qMGoY376lFeQ0S7D+MarWSxZn/SzL+kw3poD101LWz5Dh8tT1ddkyWD9dBuvHAK9UPOsfk7L+R63h/JkT1r/POOvf57P+tUmobNb/M4q7ayjuTlDcnaS4qc6QMV/H2wP8dzPLtt0c7NEz+B49bWiPniF9huriCib4xZv7e46fvvnsI5de6j57obfvxNkzrd295x+8ONBzrajWZcjDQfCfbJBk43AZbBwj2XiTxn6JyCNj+opFJVVaAaU69woo1SFnyi+VzpRP9g5s6Tl34WJ/L15ONiw+Ko4JysKKqtyOn/teQfGvQ46o96FH1xhS6fB63Eco/B97TM2+ou5Iq1PaZiU4TyY8z5R5MsOsJ7OOUfw2XMZXQEbAQRgkAi6M8Sfe1xi72o/9MoTAhbEyvWeciki5fjlUClcRSUMqIkX6P/HU/hS5473OkBXAZO0bh6w3BinzMvuAPqAP6DFAak+SFNm96N7Y9XiySW5PeuyweBbarOziygPCEMDF91nQc6nrmiYSM4kZ4Q/U6yERkX5HkH5b+QsHBf2OFBYvspwP30YdHNVlOjgSuIMjInVwCC4wiEj3moJT0zicE2rbp5O3Vl8yqDF+IgMM6hkGE/HVanlgS7WTu1aL0C0KpI+4R/pqKenrSRWgzi/MLFOld3ViSwJS0teTpGe8vDx96guLN8hJH0BIX0ORPlBYvHlqpT7ghPQBKekjJOlryEWj1kniKUr6WpL0TA1Znj61hcW7AempZZ720qJbkhphgdpqimlqCosPWNFsMY3JCsgdOhcsh44gV8ACug59EkPyCOJOnS5id1Bcze8SII+3HS0TYekycYSIQ4NZJuLofapSe43rjsYa9yu108kreDX9GjIwsroixMDyPCLJ6WaFYKbtrVJmjLomd2S/MYs4YT4nKfO5jsqGRW3rlOxqy4PCLL/FpxRW2Xr3VtmUk5CRlJQ2GbLeVpI8c9SRmGSZBlaSXmWLBtYFxVU25WyVrSaNRk4FA8DSLpU4yYwZ8igwkU3CgLpXy8vHK0TrDYjBHwdC4iCyySGbBqij5ww17TVUZEGCqoeYpAoboiEZeVHYIPhws/CW8sVv4VfyJnNhg2jltJzQssyWXE+i8syL32VxPFo5DKv9LIMeUdDB6TJ1cBDXwTmpDhYUw3R0C2sezsnzxAXHRG4+B5qV6uA0qYOzjA0siBxa/CuUDq6Bc0Lp4Azp0QmrRSEu/rEi81neRDhPIuazLu9c/JIG+TP4Ka3jSqgoIlMHFT0obWIPSpluYFKVcS8sqjypEgTDMrNAsWGaZMMcyYZZRTZ8qaKWH1kwbFa8/vyeNZzPajBqphRySDIqgthKxoGS5XpR1m9lWZ/pxhSwfl7K+sK1wZoEamVoLYP182Wwfg7wSsWz/jEp6/+1NZxvOGH9+4yz/n0+6wuDYSuK9b/hDuunKNbXqfmeI7aQGfgatlYLfIt514Nh87hvMWfIt0hZcDoGPJhgjWDYPAyGbQpOxR4n48Qay6hZY2FSLjP61hjeagrKj3RLEHbo3AmDzEcyI5+orlaj4TZNwF5g/k1yD5dgpk/g51wSgIcPtm6DWY1oxPil1EI9VK+74Gl0QDyUWkfeKLlDW9cblVJQ0mnULW39HBBuupfEFJwiMffuni4vq0UnwSADZ4VjJGaZpA566HTthEZ4u5KOiMlLggglXearSckZ5rxYLObLxSLrhGQ5kcsJ9IsQixxl9YRRts6Wydb1FebrS5BmLc3WOeLiyCSoIUrsRw5pDDVP6PRD8DWivdWG2lsNX1OHPOSEWi6VnM6v1is53eSg5PTq8kpO56EuMEO4tArhED2Xoc4K8oUlxyZ4fsmGSR+K6GxsSdcUVk0WFbRasr2iOlRcmPZUZl3psWFDDRaBwHsoJl5U+T40PYyot3YfAyRihCPyosri2+/2K4xHWFQZrE3iospLjlZOUeVaaMzhxUGTRMHlLFFwuYYouMxfaZZjmHZcwz1IZaIe1Iijosq2HSS6TJXjry0lOWBZeEd1CvVjT+Kwq5g116M2Z3FDc8aEIwuvpXqV1aHzlXQR7ClD7Z2Cr6lDnpKaZpNYwXq/+xWs95usYL3ktS5XsPYvIkOvK9LMbK8Ws1DY7cz2PZWT2R4jQ/LJGnfEtSnVssz2ajaznancQCSjV9OZ7RAGyWyvxviTysJnM9vfoCaM5aajx8xBJQgVoZlc3qCvIpK4ikgYUhGUC6+KvNCeOrqoNeRkT0GbyzhkvXnIiDFIy1r0AX3ASgCkDx+ogG7+LvVahR1LLd/TWrUdS6089XrJx9BmZWd2+4XJcku+bkH/LpV6nUNSr2vhvBI1x9B4+3qk3+DbsTcKMxCW/JHCQVxtmScWDfiJRb30xEKYUinbaAlTtsG0UBykk30tL+9eq1rePSBmrc8qRifXk1IY0MvDDEj4pqaw5K/kqZgBmnIupWIidbcCUbNZaFHHqZjVUp6pIXmmmuaZIm3+1k/FnDG9UzH3VGgqZp2oKoZMmdeL9C6YS2I5raeW0xoqTxPVaniZE1pnRgpLvq2w1ta5t9bKK50knAQW0SFfdKWTWg0DUF7ppE610kmtgD51hSU/UFxrI+RaqzMmpWCcWmC42jm2o/TzANZuB99uB2FMH4CvEe2tNtTeaviaOuQBKWOODU5aJETHEr1IiLFBB6EQS8oLheiASsYM6eoUWSVtqL20CqsID30l58kdhaVWxO3S+ko+mIyjR4k59EkefdKEPmmFXbU9a+e21Es3TDr5ReEqS2dXWLjK0sYKC1dZutgPV5mKcJWlTZUXrrJ0beWEq8QJdZiDZhan2l4smZWccrN+Zgn1xoertDNMi2q4GghnZlVgXxMcky/dY3Woq5JCL+4y1N5d8DV1yLsqKfRiu/uhF9tNhl4s3V92CASlB8IU37Qa4ptWRT69zVB7t8HXsLKSJu7WZfrO+aYMNhQGRh2eFVanERERU9s5kEX568U+SoNH88FpdDQfM3/ofZ15yDzFgHcaYsA7FWZFAHmnM3eYKwtNrAd5/z7x+8mA/kLTo7PQBCjCtRoiHPMafq/GuEUMLUxrq2vXN8BSbqePc5LC47J21IuXIvRU2vWzlDSup1KG9BRdv49L0wZdo1L44y7eZ+VA30/NfVZpdB6zsGtUTmlcI1UyS8gcgDxhHjIhvMd16VVrp/PLVO2JlMaUZtQWoAzV3klD7Z2Er6lDnpQuQFlSJB0tQLvEC0pmjd5OJ+tgp7NGb6eDn6JsRoNOj1qM9kOO8O0KC1g7P+HtagtYu4Dzk4WlL1gdepbqUNpQh9LwNaK904baOw1fU4c8LeX8DjoB3CDnt/fpmV4dDkyvPj3TC19rN/PrB8f5/6Exp6AGG8EtHZyZNTYIX5wY1HNHWlrXc+92wM/Ee8B2wiYoNuV2XZ9iE6hV0G7IKhCdYLajZsHYENM73jUOnr8SbXKIb7L4IeFwB6g5V1CbXEG9gWNelj81SFL8EG+znXnPTrJBiomH3GfiIZyJdWVopg6Z2uWn98P0RGtUqBobCjInREEthhpUUnfFmfRpy1PJPifDTP/I07tXanHGsOKZYLsrqHlXUF9FMtygIXOMVXs6i+zU8nD7JLGwBmXbJ189tePaCRL22kRivrKXYcXfdaCBiu3uldnskAYqilbhjtJMkDxenArSbDUjVR1OheoX13LtkMvUkDGZGgyyEubIxO6mopp4aw7suTYRPrsOsOvC/RUZ3l8BwEoeC9HtasvqrBd+xA0BtNGqkbYQUHNpBFxMJwh4P52ACT+nTkXjGiH0dWoHrQkqguWYoQiWY/A1dchjUt1QZz6AA3Hu1DyAvH9M/H5dlb5z5wEd506VFcDRKhb3KC9aWXMBHFkdkc66vnxl3RfprI5It8OuUdv/VxsyLQDkdeYha8xD3kAVygwYOlAKEAybJRi23XWGbccZNmuIYdtp5ajs2s06Mrbaoa3VEdToZBa3tJitBlle3gz/sMW38fbShtpLE/yaAbFY45ofzbbJykpN3iFYM7KF5cct6BawvBBUIOPqwpRtETBkWzAXFk92e1oJ1NUlAooydJfdYk35xsmfOHkBIjzOkFOfda6b8HW4+gwbUp91ZI4BXiFRUEigXoFn6snEeAryOopb2gxxS5szE77NiQkfdic0rmaH+yb8DmcmfI+LlegcSNeUV6LDN8hhcjdba36DfB2VodRvKEGpH76mDtnvRLpq3Nkgh8+4L11nnEoXQcKAIRIyl6lg0lwy3e5Hm0VMtxrGkBDkOS77VQu8DyR34HkIlVXIo9o9z1s1wvGaJS4DWKqOyyUut1dOicswMbndlBkSVqk5gx5GBdgSl9WKlmuALnEJYZASlwGMP9GMIUR6oxBTlG+17DErB5fIceMyVEGtCEweiAzVbrpXxT3Ja+QZquLNTpRWV0XoEUtJXdKQ5ah0wGGy4EeU0coiNfoEUSgpzLMMyrQ17AFqldISLyAw6DpWQ0R1xOJyYsveIidygO9ZWEqJWjXWC4t7NQR7BdX2R0pq+/jZc49aFZGuOigMVoM+aSDWAVTvXlXRu+paeEJARkjFJC8QjDFigJ3Yj5Um9kRvf+9ArzW1ow6mthqfplGNafLtF2i/OC1EplO/UMFcKq8Q2XakGt/kFCLLXKLqf7Ua2kEyrxHtBQy1x1QLwyDRrQXhFa4rLHuv/Jq1umsWGoKKFs+IODmgiInKkRFzrVS+jZhrdHWLO+l9UlTrDgyEyJVMOun9sSntPXWnTJxQ5EnXFTmRrR13L1s7bmYjGkFSed3eiO6tnI1oiphcfiOaBB9yphTkYJkpFWE3onHYhB03CQlGbkQhDLIRjWD8ifc1aQvg/CUIgQujdtEIPLu5XCiDCb7JaZTge535bNyceci8ecgm85D1xiDHnx31AX1AH3BqAKkK/2ky+udhal/RauhMn3ltstvDwjtKR1b/hTaL7CstjP3CayaWW2Xrlv0PdUIXp+YCjfRKK5TkfrPwHvpl/6tQkjtcZqZLssLuoa+XVONQPxCSl+TOqJbkFnmGM4XltcBDr82SNPWLXBlRoH7aPerXO6F+fZnUD5PU16mFJT8VSJPUZ67FE0nn8pyc+tgZekxC/XBh+SwF6te7R/2wlPppOl5KQ2GAaaHqLtVpeChjUurXk9RnigoKpXOxc9mvk8v+sqnV/HLZjzmR/bSIUGBaqDDkWg3NL/eZxlQvPgoLyz8tX0NdxhAnV7MUBMc4+gWJShLyTV1h+Xr5xUdhmnIuXXyURIK1EmaPWhKOw0ciUp6hL/CI0DxTpM0m4jwfcpx+mHO9627qevfDnOt1wpwjpIhFnC0aYbfPG/ciEYgunzc6iHztJvJ7w/LYwTRRl8mhbRCmNl98Tbw0VMdOCvThmSu0Es4Wlh+aWsM9K12820nHhXpCVjucFqrIQL2G0GfKNNyZvaTQcL9HcfHOOrujt57cjOCBE/XAwWFfH+BMi9eHDmJ9mOKyDR2TU7ahjIJjY69D2yynilfEFdR2V1Bv8OuO+HVHqI46rTviV0IsRzG93hVh73AFNTBJiskvheiXQqTalJVCpPipzhg/1THvUW02G2uzWZWHtSNiyKJlzQIVZ7KpIXAGaJ/HYRXa6dY5rGPew/ZX1onk8vfiLSPbyCy9SxkbLqx4woL/Darkg4S5RPw+BIFM6ezslLeptpO3lAQjGIJ9/Ip+iwAfQbGFjlqoioQego9PIK/oI2eq1dhM2d4T+bT/3Bru75OdShnrVEqZZU4aa/OkCsuIUE86WgldutxgbEjzdoOx4Um/3gAI52Z8LbKqvK9YzXPAiIoojAg4YERRFEaEdxws/7IlCn9JdiptrFNp5j2qzdPG2jzNvKeBKr/sYOwyHRliUhRGNK87GLs86fcdQFW2WVB2mpOFldxLV6gNyFW9HUCDgw3IVWIDcsXUBuSqgIOvIGzzpWVMskL3xWP9fcf39D56oevMie6e8wN9Pf3j/IAnMIyNIixyNaqTwhAdQVvIjagdxow9SQ1dUD6Z+RZFfYpCPcajPgm/RVGfplDv41Gfgt8SpZ6vcPeiFT+1ZOM9+88yXAdRr1wjDnelB8QelaVUFEfF5FQwX18lvrtKfIdT5sq1r5grkcfYwQk2BaOF5f9urUz/xqmIEUrJXOaVzDJ+xpjZEx800JroSfddIU9OhiZ6ktZE9jl5iukfv4NlJUBHWp+iNsZPMSzqCuyoK7ACpx5LRqzRUUGjo1SjjA7g6DZqcFUNGV5VRydrVdUQgVFnfr2rjF/vyaBWV0eJVZDV0ax9sICxD4qWwa09/X0nft65g70PXey9MHCFMgzQR3h5h2uqCXv0lF4G4rWVgXmDMGIwg/noZZ2CBrRef9p9WXh6MvT603p6/Rmmf7x2gc/fgjb6jKDRZyilBWDbXUEljLtyYG+gbb8r5taSK8yL/HJcuaz81CSxsg59n3Km1p9m1PozQa2uPqWo1p+m7NxNAjsXwpRMXeoQdoS8Ceoyvitn/c+8jwsCltxcQmfzzdYLzToFwjVjaxzcL9zhfoFwutY3Ma0dsgujTB2sQdS4K6g56tByl6H4m10KcyOA3OUkODDrjruv/aL7l5te1LxX3jrLEUr2trLL+s8g7r8gy89XU0wVxk8/kENLi7VE9XnGhgordluRld8ljla4Cj3tJRpi8bLZMuNl/xiPly35X0NarvVhR15wuHoJLxmEvKuRRFc69OpGJ7HYZddmUeFatCFH0W8jwrFCxuCmEExxjU5vsvIp7HBvBuVx26IDxqyzGZRddTnCrFI6IeHWFKKrJBm+zUSdCrTMYGHF/VT8djXJGmGIXtLbOrmqNhYBT0DDpYsx7AoYqO5erN2ZfLtUfEwvfA2DHHetMx7nzdCQ5ud65rUYFG7tqtJj+FM69zMFdbG1rdmgvTtB2DPU0oUdW7cW79jx2z/zzdpPvQatUBDkKRuUCnCI/6gXsEOZBSB7UV0XYp8E+Vm0FBa0OMYTEJN8z0K6PdOZRdAKJyHg6QlnpKEgcQVJY04YdYABgZRNRaSbfhQbZRAOF1a8RV6xUbQ81ZVtWmXJ+SsaWfh53gh/Cslc0SwYaXERsapIr3iODN8Qheuxfgn06AMhQulo7w7xoeGKJ4FZjtqGI2VaNl2EhT0qN22u0KcNemcbcG542+aqGs8LkC/LrZsR0roZs+07hKz0Lsq+YbxKo5LsgWHAlE5sym7K4TUsD3/N8djV0inMI3yeK/0cEMxcvrDifXJt00QkvaJc1sp/1AT7ZRfoPPiUe9gEZxOTxqYyhTGCC2OrVBbbnWTv0umh1WQuWJ6M7G3lS2/DuX+ZBxftIeNHk8biR5NKulrg5AB0H3sTsRhu7XsY3+0SXw6LQ5FHYA/Ei7S1J+1qpFfNx42ZHUUo+CLqkTGSPgDi6/ijBJMNgbnuxiNerbSBFWO4dYOt9YMMLwjoebmw4odWA5+jbQ0i6NPaLq4Xf/taZO36W6vtz1OO+814xkgpPunLtCE1TDWwSXLgU2pD7GP4ivXGfyBvfE1wtDhszq97bXkl0jpaSUnFDz5GMMYaplfXa7T9looZOVjmyhUlzMgRuRl5mY6B1gkrYueWl/ZRpZVgkNKMuBk5RJuRw6xiETrjv0eZkez8SJIhS6KgMcom1IhsEoEv/DSpq5JaFL+suIBf1kJl83ZRVqIpN8R2U7hf+4m8thi1G7R+ZxD8n1kLfm0Zu81bxOgrqxT2/ILdXtLEZo+MKrxKr4bDVGSyLcYXfvdWPoyW6YE08Pjnw0KHJLJnlMeEr/BXZCu8KHVt7EphZcOExK6cU37MZEDLH/A405BTLpE4YHDgK5ZIsJM2KhPp4qzNsmYto41v86QI8a+DVCFPc96m+uZrwYs6anIQVfyM9XoZmMF2grDLiCBDa+VChRpLreWZIjNHcVMk6WQTnSxzEx0nN9Hd/NMmhfWTuh2km7+eAQBOLNyv1nCbWFNwEJ03ZN2BHPaEgCfaCytb5AtPBzHaKh3rpgP2jCo3MEgz9xTwrsJJvbE6NVDik7KyRhT/djhhsm5ebCHVxvn3LOWiS1Lky2t50Kyf6KLXQZqOjFLgBaCjsHK7gt0o2o88XTZtA2RNIGJ3JIs0Oijefa/cq6D/y3WiJoit6KCjcBcYDajjSqPFBBqEHfSGR1BuiHFWq3vNA6iQMRSYELK5GkcE8nUyz3+Uo5gxA4drf5iD76n3MkfsMTPwNaK9PkPt9cHXbOTImXRxMn0njj36NCiXVxtY3j6wvMmBMX3H7kGwPLcr+1FJQRRamlJoTYWVb7Sgz1K1THOOWTuBU4Q7qrBk+xiqW3Nl6tYQrlubpKq1lfA2VTlbk/OkDwyt85Am2LnbtYWJmLycdPLypGpRn/E8nB7KvygoDZuAbatPrdKak56QpAW/rjGaTJn8k6aMyHbKiMy5tQeg7Jd2KZt0kJkFznZKaTqcoYlcb9o1jJO0dJvZiuhp9pSWV9WthZVPyreZ7U4YjN78N1E81EFxX34qDOSKZLBWct13xGDdvLHwImf94uZC2lp8rRUX6DTko4zdsDmhsFLlRXtL/vuMMLJm5W8QdxeAKURqU2eIkN8m17Mxm/Cw3oyhBLYmUt65ABxK46m4F1rJAB0KMmcM0jqtN97Hx6iNRcbQxiKjtrGoLHbNTwq76piA1kcaacNNMGu4NajRSWBaE9ugJg0WSUtP4ptIn1ya6ZxoY/cZuU8uTejzvFa/ROuBsFdjavo8Ldbn6UoVkLR7ApL29bkb+jxtSJ+nfX2Osasn9XlatEsRUO3dR1oUwuw0GKJVjyYL9Bmi1X2GoGlbbjp6I+CO9x4+e7DnRN8jV4VL8WuECqHdTdpmKpW2Gfdom5k02qa1aEsI9RENt1+a0PtH4Gu4mVL+AQHTdywapHRA8L+6BwRJ+oBglRV2tWomN69J2E1i0hOuXUcWwD1BGSceafl2pIn0SAckwTCURzqjESqj5JG2QmUWvAUfzaGLx2yHvm+CCKgy4L5rkm5p2omtQzcDJIiyWZWySP0PujzOjk7I5llHztV8mc5VMkurg4rvSaMi1V6mSC3wXARPk1xWLR0nZ23REDJlD6FVcjeM8eOCVSpXOXe4xyutjnilteyJbtKO9krD5tW1vlK0VxNYmAlRj2u020QYC3Fai2YKq9bLQ/AzCM8BvjkqBu9wlAcrD4Sk82DJsJtWzs0Evpw4NuAN9pcfFPn/Z/Q/PLrevtgJO9AqXuq2WERaRG0mHO1Tmoh9irbNrr1Pacf3KU2G9inttMiUWchwvpM9KFNbCBAScw9Y5vyqfbpCCmzRsUtiKT1koXfLT/pe1LI4M5bF+bCWLJcbQ0MoADIGIkmbWJhNhwaPlub+CWGk7Ko7FVIZyw3B/nDlGXDt9KKc0eBDeaGvVtU6Xxmx4USW+UoyxhNhSuiMKY/KVl4gW0WlQPB7XKPdjJopkTFvKTwktxTyTiwF2e68vOO78dbvhogOjsnuZigv2o0+QhyTwQgb8TGZQTezg3OHKXczcxFBULMSwZZNGqsPVewWQOaMQcqOyZz38TE6hsvMxiQPX9OwSKeUXZsmhV0dmbEax2St8JisPejELuumKw2he6CfexeFyjaPf1RaVAQ9uUslCgyHZrOpGaYkRpikJAR3xOXLdK7EKqyWUoBMA82QtlIraSs1ubcPOY5P0IQHexzv/tKzFD5BnNvbaeFZ3u/dLk45W/XrwPGN8UG3ZRy+Dx2w3DneIXZHWBe0rvoAtV/KUrl4OaIOwSBX+BB8eAKZlY9anfow1W4TETVjVeJd9XHirRPgLXQMHaxmoW2OLNMFKksX9y6x7bWS7almBOTtV93BXMpB4U13TGmScfXLvQQvTpCpaNtEsptIYjrYShZDcAyqbTFCTVkwHWS+gE7GcApVZinYr3EGbPwOJX6khKHs2U6OBS83Q60v3YQ0tQNFRWSNZfHB5Nmx5OBPNKuRU9tnFbQ9HYKZgmDCXdzfOD+xBKM6Iwb/onwHLWC4HWW62nKSdCOb6INhNMkkvwmlaxL/qJW1ME8oiUOO1RaMP161e3nYEqXhm3CmdKYOrNKTjX9DxVyklM3gNPyJRsdQEoR6QbKkBAVoCcoWVn1HLkFZNPGVlKAi+L/KJUhAo06pBNFJ4mnq3pQ8J0FgGFmZBGVRuiYpYcAkKI1/lGYlKKskdrbuZWBLnASlIDrKlGVmajbeqwGdlBr6GTkr7ha7Q38qZ0XBnRDyAsIC/s1SrJihNH0WUset+3Jik55iTLuMk6Q5nSEZN0cEBpR4sA3rWEzuXRedYMQKeStmL8/7NWKln3HK6ZHQNVnAt0GhyZJPOTJZYsZPBxmTxYHPTi/ATTRB4nP//Czq5CkOp4SKI2ylaJ6laJ7TDUOypuQO4VFafoHCcWfMvfr/U+Imy5NuMtQcjDlhuCZVhouJJXIVxXBMKXRqlxgD6kZ9dEpLtQU9/9tlqMm0WE22Wf2+VU9NZhTUJGaXZmg1mS3kb3Jkl8bKtEsztF2q3pGMlGvzJNcyNogoKTzfZURN5iiaJymaow6DnJzmIgMwV8jvnARFGa8w0ypDmlZZDVUiZ7msKsvFxDJ5SDEmJEcahDGgcFxTlL+NQcf5PXxAOnEJtbOLgGDaEoX83WD/Tt44GbcPLUEcCif1+L5K/1A4iR8KJwwdCguSOhJAoODNtS+Vbq492TuwpefchYv9xYm0XUcLaCG8kDY587LgztkW5HbZmVdQ/OuQi3C3IX/vRpFmXmEbFf+PvQyXfQWZ3BQxud1UGlOKc8CAFSMgc8AEWA9HgllPbLhJSDBmhEQPksgRSwDjT1SskZUqLhXpM5ZIf5PqRlw2VwnWhRSCKJzzE9cFmpn32/R1QRrXBSlDuiBNuILL0wVJsS5Ib9XRBVs1dAHgQ+xJjYv6QGMVSetuM01yTsI9zkkQwe6aucCdWrGkYNz47W3oCUNO1ULLii3o14s2sLKouazIP2pN34Sx9hphKfj8kPXCE9SSktCwAJJECB2zmuA3k3E3HNUSz+pKM2R7EoUN2541lPIUbE9iJbzxuVk9y2T5VMy/4wBK3beTwi0HJrGDChlIEaVPuokIBS4yBkSCihIM8j+2mPJZnRB/a4zHyILag44HeYy8VSqh01dYzJqSkuJ7aPVsI9euDRIykjDZUqIkcNg8DYtoav0Mk5cUXrvyyx6zw97TTtqnKfgZFgM0hFlNaAFHKwkq/wHUzJdVcRe5pVOF/Oct6N/CdxC28MA7mME4OgAo3TV3h9j//xH5cXc7qZ/Q9BzVSJZ28Z1e+d+BCQk2VkpBZUDxWasO97JJu9iHI+qXXiG33ub/kBgafaGGkgZLKFx8VyPean1K4UKrIXrrgE0bPd+COwChXh3RSgNTuHRuRP3SuSGEip+lHHSyNQrC40e2m4iSqx189RHARMRlxoO8KxbM+YQRFdPXgPSUFZWgdWNm/keaIj2sItIjDvn+GjH/ToHxRx0xvvi2b4rxmTusruh0R4Xzr6hzPnIDV/4bZjh/lGICkfIbVjHfRnEuIJbCsdFC/tsKJyKpX8ir44clV8ePaHg9zWrfFCKvPyjn4vgExC+pJPUxtqPnI+0i6A+UISU1Og6mlOsOppT7DqaUnoMpb8jBlCdPDlMkobGdvWqshPiSq9W15tMyJ5b3IGF1bEaryx0lbI4Eb3NgPpsc77OJUeYfuuSnhBfBJ+jlPlVYbYWFdQUIv9Ymwq+V5P1aYLpwz1aG92yBCeN8W2DKSt4tfkjVhdVzy3a9ziCu6M7o1J7Mun5YmnW/9mSWrF1QzgFJtfiAJOv2YemWyjkspWN4iKigHOfmARqoWnYAWI2Gg2c53CwkGOmMgjCIL6oa40/duO44xBTFda/Og8NSYiKYk9D60s+Ai4KenmaCjkRFZFM6gp5ychJajT6JTN5JaJbgnJxuHJk25+Rwzska4pwceZRXrqEac2ao5ohMyJxLUeSru8yX2Z8wdzYIWgwUVu+xXtjCrRdMbgjSeIAIeqsiA5MD/IYMt5yThHWXQu1jy9626qatfga1oQ3fdZlx+e7J0lELnhWedcYydDi5wYNcar+eJdRg+Q1lpcdyHcRydpA+TbZbLR3wPVUTqAMxgdpRE4iLMLWfxq3u0TWTgAYQp781vcMCP4GrCC54dTccD9Yn1Vpw4p6tPiU/kaNrlDjS8ZIMr6KO7ycOrZjbUgkeyzvLb8no1TkRc7ewpsfq88SoMlDAnagrLCGjA9pjouDv1a9wlJ3ZUSYTdDCKRsQEr5Rf8YQVfcnSgy6Cv8ZRQfSsdNC0Gy4L+UXohnudfNBZ+aEYQukn5IPuIG0VjTAWRqETu2y8BkcH6Qt3TUrfSnn7mevQ6SIqRLEIuClYt5aKM84hKxxjIzJg2ALzgkQII2Lb9wruvQS26CbCFs2QtV/wM+cssEdF8QOrf4Xf9gTMeSEDEmu+ONWg1+Pf71DPM2G/h8ImGus75WoBRmJAcOZiWiH4e6yZ/oKLEcYOXK9THmHsgkcmPY1crxmtPBWmurA7eSppqgCJep5KesrzVFZbVbC7qlFwJwlxaecJcenC6o/J9xNp4UIUZzhEBP0XlpL6XQ1ZjksHTG+h4oySF22h/oCoZZzhWUa15kw9REHFS0Bg0HVHyaIS1itakZ+SE1mwnZUnscbVWE+0ZYwXVn8G9gqq7Y+U1Pbxs+ceHdfbw8NXHfi60w684AFc715V0bvqWnhCQP6CVEzygyv8vIaZ2I+VJvZEb3/vQK81taNGjxFmjmpME3fCjtsvcdftlzhuv1Qbsl/ivM6rRhNKErBrVKSSzPhFmsPMpQuWuTQ87MSgERpSgZlODRrE1EKk6QuUBypqyOcfpbVubWH1V60OfWXiV/qd4lf/gef1anMbo2o+UqVCZazWPRmrdTU8I+72HmF75ewREsTk8nsExk60r3IgZEo3PKMWNmHHjWNyRPUgLg/PYPkT72ucXZGrIIKGLGpumQ/ry2LCfVlMkLJYro/ikMbWQnABrMjwTzgzw9O0wVs0w/8fv4pkpOfg9C05EyvMf7mc7qfEv+U3VIsfADPFQ3VojreWhK9NdnvSc80m9D7EtLNzzXSh6QkLPELV/0hNaEI8ASNBTZj2TY7g26D4RDapcHloudkXh8u5u1kSKKYRIwRmhTrNSGqk8aelW/mUqm5LCmOmm+bK3d0p9MJvkvhF8EYF4mfcI35KSvy0k9yvLLlCJcmAlToMtM5JneA0SfwkbFaoVlZSB3BMOo1A4wNwu0qpU9i2CQZcp7Ztm/z25Dofrb1bh+p8Im2trtD0oAW9nvIxNSAav47S+FEFjd+A9DtKC31DoWmTgtDXuSf0DVKhF+jZBqnQp0TyCWaFqtan4+OJSoW+jhR6iXujyFm75Bq/Tm6oBMXgexWI3+Ae8eukxI+SakCdY5h5pizGmEZP5IdGDarhXlGxcN6mqPHrSI0f1Yt9kOiMQKHpLuuMLaYhK3Wu+UOtJ3HEI3rIrEf0kJoHh/IJoyxTS7JMNa0vagtNx4hjN/i1+FggQLhJal13WdbibpKAITdJLel+xtMJBVmgdXBikeaq6agxV44FtouFoHpyjgWKvncdtVzeQh6gLKkUXZ2N2HVruwRStMos2u4XFVbapHsrbVq60mZIJ4vObvxFYh/icG8lL3WUVK10VCcs6tf0uOJKm5bsrdTHpFTeuU6+ZckQW1GHhAtQXqcsXRafiGhFxSonj1YOCqs/Nr1tal0WLtVPbyWTy7Jk6ktaw3kij9rOqEZti4OAmp5WFKscKVY6Y9K7CapJ24cKUNrFY36nBf7HehctdUByo2HcztIZxgYLTc87qysm96/K6rh1kCXUxoZ1eiNPrxgbVs2vEFcVGy40/aZiqHuGDHUvwmtlszCZH+iUyOm/W1zMr+nDCqWVMu5dNlEqgxjSZCQp/40IKyCBueGrE40wzKi+tirw36Aq/2UQQf0Div3YqaEsrAxQRI6S2BQu2l7d49/gYCwyPj5FNzhUUGS8Ozc4SG8liDu7wSFe9g0OcYw/dSPjoxBTFBnf9H+IGxxAN6KaNzjUQxQu2wnXBZpl0hzULSHKpCUN6YIUvfkyrwtS7tctSUxJ3RJR7HrT160V7O+Jkl2b5eXom5dNVuROkrjFpPyGUkqROxsMRdJsgK9hHiUTw2L6jtc+Kr+hTGn+1GNFLIk+qFcVC0lsFSwUYElRSGxNkqUb4vxxN1pVMylPs9ot9Jc132qB/xiPDqZKN2SdefKysp41/a88CyfpJB8qrZodlBR6gJuriCIHbPQudbm7jvcW9MidUMvmsPxwOim/GzEiZrF6ubsiSZawc0TIjJSQMfmg0/IYrIgYPCkfdIbgXocO3yTt8HXgeXZ4I2NSynLXu8lyc1xiuWw5LFccdKOiGzVOBragaiD+goQWEaF51rwYr4EAzLNNREXVNDDQRBEQzSvLTp2hUnbi6OJZfpqAA+cFkSYQdy9NIG5mw9Ig3rAk3HZebK0c5wVtVxC1lZPUhrxBtiFvYJ0XZCpQAhKMtEkhDGKTNmD8qew8CDiUxSl1JMbdcyTG0VgURo/Tlw0jzcUciX65IVkJsVqIuRyNoj4HDdLVO06u3g1w6oXL5HYiJAt+LQ7JihFiMKVZpDH3skhjqBgoZ2o3oDGZZHPuhGRtFQtBw9QIQYOTOOaYahxzg0AIYoXmw5QJWw0/nwgke2MZXous2L6/wzI3H9MLDstBVYuFeiDdytF2dL7QfI9829HkJMpHEEfSBPtlHyVTY1i9Izkp87SSzJOD3eMnqLXQ3Ku4/6FXxiaK5mmK5milmSY5zUVuqqZCc7/CYXzSvcP4JulZvJB5ZBzXLqoNDGZFcJUK4D51O0nOcnlVlkuKZfIVFMul4ZwInMwAvKRwHG0aOJuYh8bdu/W8B7ZWOnERtWpDtYJpixSaLwHvK6Xm6+0jixBmTtR1MyeKmzkRQ2aOIIEkYmbnXSu2LqJu77y3Vc7Ou4GY3G4qo66Bs8gjYGJlO+9aducdgU3YcZk0PnLnDWGQnXctxp+oVCMLVb1Uoi8TYQOgG/WyuYqwO/8QROGuasJ1QYOeOG7T1wUNuC6IGtIFDXQqhHld0LBVRxdsdbLRx4MDaiY1bKC20Pyr1qr7K0RKz+aJt1qqTVbbwBJczd1VHyf3b3ZlF4PWA50myD0FvhE8dIq7qx6EXwj9IT+1yPPrjjt0jDpDbdaYuTgRLdAMX8O9k+WHJTB9n9ob5VNk8mxYLwSPcVqSax5oI4WseUlMD6MeMysCovn3UKsMWRctDFHCf7TQbN2i3PwHuMGHXyWfdOZmSVK9KjpZPimPfYg5cf7EVZ0/iAf0z4jYB8YuIoS6QetIC/TIUZyJpO5u0Zc0Jj+IjiHMJbkbs0jIz8k9QjEyUtYRIRNSQn6e2hXLVDcAn1h5Z+jLJRQGkWR+yZLMH+vxWkqB1xQSQGvEgR1/7yiwQ54gK0vBNBTYIc/AzKpmYCKBHf9ohLUyFM3jdKktzUywFKWMM4Xm7yp4+KLu3WQ+JbW0UmS6VFrDNyJnuLQqw0XFEvkjiuHicE4ol3MUqBv10cVQD19MBP17ZUhEDVC2dvavVVB5UWFwUC2t8KKFliAeHAQ2YZvAJkxUoqaltuxCFFQAUC1akqbS3JB17rkhFQqz+G5Ip27IOoduSFh7RNMNydRXc+6GhDByN2SdkhuyzpkbsqgHrpff61Hn5Lgj6vy4o6jk5so3XGL9Wc9wiAi62dKMjRqyXC8dMF2Tqp5eNhsKLTeoRbNI08iiqD+YCN0QEBh03dGeWsJ6sULLCjmRa/meyeOK6tVYTxRQUV9oWT0Z93pEHbh7ayf7Xo9rokIoJhkj1hEHEy7e61Hnyr0elP1S77r9Uu++/VJP2i/coTLoGmckRxhKY4LtxFwqL1psm9iQqp2kAl792FzU8EpOXs8urKbkRNZ/uNDSRYUThOAexEb5MCEHU1rILuxeIbuwGTu+GmO/6RPIX0dMbje1i67jVqIwmFjNuzfCsAnqTg/ajg/zOwmiMGRYyY4PI3Z8jVSiDxLhBKAbNbK5CqOJBFr38NS5rgvq3L/7o26y7+Gpc00XAD6cfG3AM2x1oeXuspmGckDV+QacMQcUwqz102jhimg5oOqhLUy4f3QXrjrYhB23XnnhgjDyhas8B5Rk4So6oB505ICqNuUFqBZ7AR6S+ybqhQ6oGoZDRNBvsPbXAxpGaI2zAYv6VSvu1yOEA6qet3UIrylmQdRrBFRDm0UrpFqV9SKFltfIiVzN90zuCqxRY716Qa9qCi2vmwwHVK26gQBmcbIdUG8gFZOMEWsIU9ZFB1SNKw6oGsJ+Cbtuv4Rx+6XGkP0SJnReFb/1AF2jznB1KsjXTFG64mRVkL9FwwEVMuWACom3q1cpB1QA0sR3QJlyQIWmyAFVQZe/uuOACslWopAzB1SobAdUCOPPMhxQiES/QDigoEdZ0wFVBVHcc0AdnmYOKEQX1B3S0QWHjDigrCfBSXVBhQotv20Zmh+ysxawM618ltbrCadS+TkEzK04tobqTTZUD+L4bRoPHN1t0PCFRIjWNsDX8OTU8ofF9B3PfCu/oWhp/tRjyC255YtdshHcNtUZg++p3gUekxcWqiVTPUJcqkfLZ1CDBVkygNLfLcwna32FBf5ZjQCQ3XA8jjwDDXTPip6Bz8k9AxGCxnpRUSIKRsTBS58nEj7Iu0ijUPx1sidBj9ypYNLyJXnCB5Zl2wAXDyEhvyJPD4g4qV0UVWUwhJD/QAVJ0/ejsd5lnM7NGuFtUbVsvajLehW0aTDdE8921FHgkVJagqMkoAjU6aIkoJbvOReEmFQQ/kMuCHHa2nSWJUZYGAlqsYuUvdhFyljsfqy/2L2AJ60Ul7puC/qnGHSIyGtElW+thOfoXs1UicDk6Cv3DdHLLxMJKGLW1hCxzIWoZS6isMwJC4aAHjmK72VKVIjie1vr5dJd6+y26SIhG+TSXeskQTWiurYjhEwqLnMhcplDaRKS5dAEhRu/1hyeQwM2fpvAxk8UwtA6h3c7hMyFMIT4rlWo67PaPddnte/6dM/1We3Q9QlkRNf1WQ2bcO76hDBy12e1kuuz2pnrs6gHVslDGKqdHLHUOj9iKa4JzQqL+wsODs6L0FsszbjGaAhDXTkhDHWF1huJEAa9xC/MB12nEaPCxFGXG7QREgZttG6UEznE96zOVAhDnTCEobWrUkMYQpMdwnBNVAjFJA8Aww9DXAxhqHYlhIGyX2pct19q3Ldfakj7hTvIBl3jrN8wQ2lMsJ2YS+WFMGwXG1KhSQph6CjDCR0Rr2WHLFEd0HOpxhT2mnFn/pp4ofV2+Y4u4cRfI7xlE/SLqBSU1OhITLrC0HWCYrB7ojpBrfca8aAmKJpHKZrjdZOclL5KFFrvV6hrUuteXROryFFIi3Vk/Ca8yRHMCVVYOq5hXMoZLq7KcLViiXyIYrgonBOqbEgtUDeOXG6c85KHduK+BH0VqsnHrH6/vZLU5Gt9NUmryTe6ryYjFM2j+mrS+rlbrCjfNgmKMu4rSseK8mmK5SKkooyKFOXb3VOUn9HYzleZSjmpEm/l302FxDZBocWDg54vs8q6g31VBN9X1RvaV0WIeizl+YWrxNuZiNt+4Z2V4xemi90QB2xRKkuoSubZqGL9wmTKXAQSjPQLQxjEL1yF8Scq1chCVSeV6A8TIbHQpyibq3rWC8ToJPeueziirws8fd0Doguih3V0wWEnIbH16JNtkxoSW1Vo/ay16v4+J/uAZdE7Zap48lQRkTh5+BrRXrOh9poJ0QHWI3fzfRB2GQ8fwRyeR/lsLtAlLMOlB413PzpBpTU3T1ZEVmSyIrKIvUReI1wrpsZ1MeJawPKHFSPYxnChe1lEW5KMehl7s941qkn4nuqlK0lkRU5gq4R9yqq4QK3Wr+tGylWV4rBFESudH7agv4Wbo7ZArYNwLI728QmqV8Vd/L/Ij/kSxMLo0LvA7NWE/fouEajFmor49QYNznbE6EynVW9CTwnrF7f+BzEm0gfE3Aii6elKwTVfuKv+kaM71CNSv0OanOUU5elKa3TEYN3ppJhu/6von42Q/tkkVcu8WYNVU2pmSIq/kNjgupAi7Iy0yYbS0gUoI+IzWUh1VlWWxcXv10TlQZfYracZWiKThTVxuURmnUgkXQo+Q+nSHLe4ZuB7qit1Rn5VjO5KveY6xyv1HeKV+q0W9Gx8d+DgqpiI86tiIoU18x1lDlWVuVJXMfwlYtZFxKpWVe5KnSHXkIhb0r1czfpI0ffTYirdmV5IFdasluuFNLltVVcmaUovpKD+UO9IRsqLNN0yzKogolub4kpdRa7UKOWqhFGNaZpuVYU1N+FR4cA3sInwDSSIQ4cYEWkeJ/wDESJwKEnURUkBHwE/3EBhzTbeQ1hlLnqddOcEDblzgvA1LW7AnTaBSj1NCbh3mhJAo9RouzkKuVkkU537LS48SKnooEZnI2oMEVG0Nyw+gLwhWtmtiKyuWg3ndFDxLMW9q1odcOGUX9WKX97TQHrZItQkdxhisg4VJuMhO6QLvMb1te8vnW30nz0piOQc/2w3csC5BD2AFN9zWzpuAIcg67lDEPhwifgQAgv4nGztUEHt/UKV2hBs/S6i+hLd+lk/dwvz5zs3WOCPUH64iNyHy5sEeoExLyjl48QLa16tkKqBzMduhRFN3Bd87WwSdMX6uVncq9fx60vCnBWYoNJ3YxqB7SG1U5aQ4szyi35EmCm6Ztjis1+ihrLR0FA2wtc4wQK05PYg2EljFIJjR3glUX2Jdnmrnz0k1AiWqKT2NhpqbyN8zd1rp3Hixnni/qquDxT4+o8K3UqdKyzwd1EnBQl8Zjk97PDUitfDiCfsBQUPHTIfRxVGlBTp4Qith4u9eh+vh1Pm9HBKrN3eL9/SRMgIUkIlRgj9RflQQoQGi/MaDEq2pcOE7p3ft174KOWb6DLkm+iCr+Fuoc3E3Upd8hvY1x3Gw8bibIhdEP5EP0qwH8WVPopfk2KhWrpnsvTfCcrJ26lxUJkk2uuEr8nt3s/o6lvAhmfE+jZjgX+WvnSZIDBDqxScQvSjNMsVii2Na0IAUzJT0K9SdgYc/+S4MBlg7TprQv7a5QNOgtWAy3uHxhlJhmhvB3wNk6ESq30ZbRZhtQTNapnC2gUW+FepAadNTjvKFVmWKzLwJ/pRjv2IuU/b1umsSV4BDeXw3o0NomNKkfw3NojeSW6i9xnYe1tDOZMNWWC9Cgz+PYzBxwblHH5OwOFjg4U1/2XB/we1L0jrbMWSApNk7VG090P2I+r7FWzMsWHebB4bktrNYyNqhvM1KH6+irP0/4DpbBt2kSlLVuH4pP4UHzVCsyIKGKSoF0OFtbOtaZ3BUa3YdUA27umwkt4YG+FWLvjlCfHsrA1b/QqRLecEcwdfnECpo947AV7DBzLMqhg4O0UwUskM82MYVNNrQ7ZGB+lGc0z/qEazl96z/yzcIcFZHRu5tuOyR6yMMTRCwlrGRiCkLBuDm9QRZgDUvDBpHGMse6i3N8i0R60+RVhKvRcfo0qV8Hh08+oadq6ksSnhJMWP4NohekQjhKLlRgR1FiWSQ0CjkZaQI/MFtRc5FX9WYWnISeKMARivxXKFtUvl3pGcPDLmjBh8hTwyRsR5O6QnZwh1QdfsdLNpHTxqLifTBznCjKOMP2YbdkJJMjKsBskxg3VgBmfIJSCnsZVRUg4ZsF2Zvnu1tZuM79U6Z1jgXb9we7V4Ze/V4v5ezc7gh1zYq23+Gwv+Vqd7tU2KezVC/zJckIQ/RT7nta+1UO8mUqG53Ua85CfDQjBFpwzMtlQUebm2x3L4z6V84HsN+cD3wtc0xs+socKJfRV/XJLVLYWEywuHXRRjTXDtmCteU9j2W1hEFtO3dWvxvi1v7hj7euyZv9AxvUomspbttRcwBdffYb253IgWeSkabsyjoGA2xx+FmPYnhCAp6N2Qbu/0ZhM2xMkLfH7BKZlI1KQrqHGnqBMnli8KTNosYUluRg0ZKzV67TsoDbfHkIbbU76Gi4s13LNlHwivJQwnDjuni62t4AQGCugZqt5yitpt9Y1fbvr058MPaGRV5eS6TcC/eyjdpqk9mnHdNojqthyu2oZI1Tao2zmdqYTNUD6+C84IREEmzUPGnUFy+ow6c0oQlmkajq6k0YRHoM9ZL/yazkFFHI0ZS6JPUhBvotXfIgxmy96fgLyT0dmic8dft4DfS8xY2nrrNyl7/ZqTxRoM+FjBSVEE1thKMIES1DZDbUaFS8LvWi98eKojWIIEYyUgBLZOlyJYutnI9t9hqvYcOtVzvvfEod7j53sHRtBiOBlbNDleThyvUxxHnyTRJym82E855cSvbeps9Y/x0DrUAI2LbmZSClqMm6xVgukWB1BEwEvUUGZ+FL4mKLMCpot7CsS8YdL7Ko1GWjumm+laBccjynTd/CsW+Oeom+ji1JWXSYq5bzHE3Le4xNwUh9xikvUFzFYicMWx2tfMs1rpvPsbjlntiEbiVQMxG0coQZ/C9m411N6t8DV3y36BNgk1cMSQGjhCqAEBG/9At4qPhXFMmGyz6W8t6B9RwyWJ3GeIyH1+e1PS3gOG2ntgCoT0ASrIus9QkHUfZRu43Z5UKbQl9YO6CaWQLGz6ZQs6QysF9eHGQSweZXmpGwfx0iAIkqQoW6TBkC3SoNhe0lB7Uzo+9QAFi0L3UZ3MaBSXAcx3kYoqyFJsmzK0dKcoGy+uMEDN9jKK7U32+KKG2osqttdnqL0++Jo6D0ZxTRaHHKjurY3imoyJBdE4EYjiosf6xTVOUKOU8NnOEfEocQr2YTI+k4gNHSFhX0HGPhMBmpdJWD7Nn4m7vYzCjhL02s+Dwt+jKOgVsq+P8rDwGOYKCnuV6OsBHhQGKF1FQZ8k+3qeh2U+RmGfImH5u9SKUOBjFPZpEnbsjTzuU/BrFPcZEvcoD/s0/BiFfZaE3c3DPgM/RmHfTjACX0ipCAQ+5cJI3k4c+479it6ZYMJBYMuvELErbzdUTmjsVwSBBm9HvdBj72D6xwc3vENhuRp7h6DNd1AhE+9QWLLKQs25gkqsXGXBDrkDO+wO7Ig7sJfdgR11B/aKO7BX3YF90h3Yp9yBfdod2GfcgX120ncNk3Ru0+dyvLnlUZL7mt6om4JD3m6QK2x6yIL+ZXJTESdnSBThky21rE56hejSLJmKobGhSuHGwAhlIF1230C6TBhII6YMJME+qDTwKuI28ePnHz030NV7oaV1PX6XeHHRFRYOHBvF4yrGLo8q3awEiwrGhUUFr4gbj8eRKocHxe9n48gghuJXHPRK8okEkE+CGC60PWvJ71M6oV45XrX8LuXRw20dzcwouEfP6KY9jV2mPOeZQttL1mjeWbGjsSaeGZZoNC/IizFlKRnulvhobSmOTBqgyj14mfccOtXPNp4tOVKwHgtno1syG9lCm0JpKmFw+YiSe+9amrI9CZxJNFeZkOy7D5y3Mw+EwyMENxFRgFmLqT9GIGzmETgR/xihIuJEMHYKKAlRHGLbH1ovfKLMLn5aT4pugf211QKA/HxtFUG5eN/FfiZrKgsniLimUZEpruGjwS05Yr4ySkzxaWFkQdtfWS/8ORUecxzrdpRwOAk04XH4msZClIEQmJldYo9/o/zpxw1FfR8nyGM4hxIfPF+tse2L2lmU8ZKcCHMoN91jgf8dtXubtGlQvSaLF/8UPjmizEhGLQnnpu1b5WdzzCAqMFq5aiKxLGncf9INOYpSNI8XNlnVeNq+TSmGnE6se4aQ/qxoVP8mXkd+ZL3wfSqe/bihePbj8DWcGJsJHX1cvqat07ncQr6VzZHBLBqWUQO+/x2m9r96G9CZow72vyPE/nfY1P5XcLxYGnj5+98hZOt4uTATv3J4bER/B1wQ3E1O7IGrqPaz4m9y2D54ULIPxvpW1k4Yl1Rep8YZ4uL2VJHlSuIqKjC/Lmq9UE3pzS5DBlWXQ4OqAUJg8eYl3bSXMqjihgwqxpIoOwuxkXDybe172O7kg+3gcRGcjW6rjIZOBFeTKcVwnMwoQSaxR2yTrJtnES5H2WtdhrztXfA1jQUyQzAhb9Wv20m6nruc5pJTwxEWVzBo07IDsDc1ZLSpITCjRKRNnGB/ciUkPf/DBCopjW+i43ce14k2gn5rfn4eZ16UekLXNeNNIzZ3jp04UTHIjd+x8NdQonvNEYVHawrqIbqtrzHIFySX8l5bbm3FGWH5kp/XZiTCzbp0jnJKIiCR+qFLHyguPyf6BvrOnunpL3LCFUxWRJ/n8OT8YWtdG38Y1FvUSvfSfg/XFiHOG8VQSsUb9XLdKvsKAOiHa/kcoeV5w8vmW7U0PW7KRAlTJkNkUGeBMYMnJVcRSckNKsn267qJov1Bomh/gi/aDxoqle0nNrwRQxveCHyNaC9gqL0A85rgwol191sTcNekd4hob7uh9rbD19Qht0s39EH+owCyd1W9GW4Xsl/cpnczXNDBzXDbNG+Ge5llOm8X81Qfv8eImvPbRek7ThB6aV77FIGvTXZ7GKRwxY9RW5YiMR6zBPw8Ciw7II2JoS86un8zgh+PhojFSPmymonhvlpn1w6u6yp9L3KRrnu99cJrifVoM7+OjzdwCE0NPGQhP4sXUCnltAk6f48wn23dmy3gNzoqR3OIX7q5Lj/JmUYp2EFYMYq6xD6FFARnssgYMOKGFKaebxAioB8F2XqSwA55iOtT2skA08gAg+gADZW8ScDJLFENZ2HKI6907VORjYVq43nrhV+hNMBOQ6p1J3zNiUo4pCMYoFm58+9PqK1mxFD2YoQhPN7eTkPt7YSvYYczJvwuKWKyQ/xkfwgbXxpxKgBePC/g5HRh4xct8A9TnIwejQruPAVXuWHkULsyJCas2rHu4/Jq8jFkPs6r8KborDcGpUzYq9/nLca0OYsx7dCWiBL6tYEQ/RCxWY4Qwh+CaGaUH9MroT3z11aHPlNJG8B9htrbB19Th9xXSRvALe5vALeY2wAWeepveHEOmRNndINUZW2QimaTaB23G11A4OLjdhmmqWVbJLS2gaCISALfAUWhhsEQZRGcSY3TpwQenRmDik8rLOiYQl/SRF/uo+yUtEbsMFB/fM42sN91ijAAzIfpAF/1wwCA+QpjSfAA9BFzafCJUoSxuSR40NVHDSbBW309YDAFPgEtIkkKvP0k4TIV1zOqpyJrHcT1jBJxPZdNxfWI8lou47FOV5j+8aeHVxREX5T+X/yQOJO8oiD8ZaFmXUHNuYJKaICyYIfcgR12B3ZEaMzcZIXo3ljj0PA4LARuv2wB1zkEPiIEvnGVBYzWpqkC67YQ+lbOWAKWe3DcWMI8JjPLtv+q9JVbCNdtQUOqTbD5CqKKrRp2jeO8ambbIKLiQouK11EbpaChjRJzVEu0d6+h9u6Fr6lD3ivdmAVIIhndmI29Xm9nFnCwMyu24XBrVkFMc7+h9u53xjT3VxTTPD4JTPO4KaYBm8DDqMOQn7wYQcTD8DWivdWG2lsNX1OHPCxlGsF2enWZTLNbzAOxpcj7PUie9Qx9nlmqwzIzKMIlDBEuwbzGrZENhRu3WGvkTZQ39W5D3tS74WtOjpK4EhM1pXNn25MwbNb2rJY73bixjwpNY40v7k3o6EGOJ0PwbRZsyvkgUrhxD4hEsHcootChCBGmQHcoQrV3t6H27oavcYFuBo/UIgTTNfBMd6vuEVJDySHD0zFWaH/cgr6DqpMb0ThQS0oP1GJqB2pJYZdvvEf7QM2aAvl44g6O0+KFG4/z+6+EOf97wnFoDqf8rJ9RQv018OoPil9JAeILQNjQAhBmXhPt2h6xOnSGMohbDBnELYoGuCvHd+qQLVNxnIbYUlUb3D9O22DyOO3GV7p8nEbwTdgQ34QZPsVLOrjvWYp637PEBItSa3iNIfsjoiD12pCW4esD+oC/kIBYTJoJS53KfQmabCiIBwhEFNYJzdkLKxn5tu4fg6YhFohOGPnHmL4Jcs9v/HXLyEfLgUSRLc+AwogaRGZ+lDbzi96PUkUublcY4DdrH9TteQBOq2ha2o9Z4L9NRbKESPaNkm5lfn/NBOipW5NBguui8DV1yIh0axkScZ1IfoLCUOkbPwH4jnDJTFhNqmHtlia6l9BRnKHVoGfrhPQNrQbc0AoZMrQayA0fnijYwHNNTLp0aPq5vADozqpj8LYsjoTGoMopb2xXYsCD+CBGmwQR0CSgzYPwNUqlPkjecBQi2KibTFXfTOdzmfHAMMuKfNH7mmLOm2jRiwh18vqvWuD8vZcwRoKajQbKlorR12li3OLAhkgUbvwOr+eT5nwLSUWbw6LbixJD7F+tyf+phtiESgxMTC16OpAkfFPdlGgTiWY/x0S6gRU5CJVZ4yCE1ziw0hNDGtMaJfQCMwuUNgqQ2ihKrkERmT6yeKWSBFUWvh0RSur64MRw1qc1GDWEb98SCnKaIlhfcvEgyvoplvWZbkwB6yekrJ8kw+bp6wmds36iDNaPAl6peNY/JmX92dZwVjph/fuMs/59Putfm4TKZv2VFHcHKe5uoLg7RnFTxJAxT5WvSRB79KTre/QkvkdPGNqjJ0mfobq4ggl+8eb+nuOnbz77yKWXus9e6O07cfZMa3fv+QcvDvRcK0V1GfJwEPwnFSTZOFQGG0dJNt6ksV8i8smo4/cIwUdR18O1ozgfRQzxUZTmI3im/FLpTPlk78CWnnMXLvb34mVaQ+Kj4qig2qqoeuz4ue8VFP865Ih6H3p0jSGVDq/HfYTC/7HH1Owr6o60iNI2q4HzZMLzTJknM8R6MiOM4rfhMr4CMgIOwsgj4Fj+xPsaZVf7sV+GEAbDuCbFe8apiLjr1zDFcRURM6Qi4qT/E0/xj5M73usMWQEAsso8ZI0xSJmX2Qf0AX1AjwFSe5KYyO5F98aux5NNcnvSY4f1r1XJuxR6Fg4IQwDX/6kF/ToqfK52wnjBfT78gXoNJCLS7zDSbyt/4aCg3+HC+l+ynA/fRh0cgTIdHAncwRGWOjhqeT4IS/eaglPTWjgn1LZPJ2y2pmRQY3lrZIBBDcPcHH0ChfWj8sCWgJObTYvQTyqQPuwe6QNS0tfQIcfK/MLMMkd6wBg6sSVVUtLXkKRnkj15+tQU1r9LTnpMWwUp0he11XNTK/VVTkhfJSV9mCR9kFw0qp0knqKkryZJz7hZefpUF9Z/EJCeDval3FtoTkFQWKg2QDFNsLD+JSuaLaYxWVVyh84Fy6EjyBWwgK5Dn0SRvNy4U6eL2B0UV/O7VJHH246WiZB0mfhdIg4NpoSIo/erCC9C0HVHYxD3IlQZ8iIESb6kqtZTgZGBihADy/OIJKebFYKZtrdKmTHqmtyR/VYD553YUMQo8zlCZcOitjV2kWCMUpjxwvqCwipb494qG3cSMhKX0iZJVtyKkWeOOrZ1rEwDK0YrzaKB9UXFVTZOrrI6YwJRSZw1DABLu1TiJDNqyKPARDYJA+q+IS8jrxCtNyAG/0cgJA4imxyyaYA6ek5S0x6kIgsaqLqIMarAIRqSkRGFDYIPNwuvRl//fX4lz5oLG0Rrp6WRS48s15OoTHN7tcXx/4kCIwwmgV7/Xwo6OFGmDg7iOjgt1cGCophpKXMLql5m4JxwQp6FjK5+cJ2S6uAEqYNTjA0siBxqn0np4CCcE0oHJ0mPTkgtCrH9XkXms7yJcJ5EfF1rQV+vQf4kfkrruCIqipiBPIIelGbZg1KmG5hUJd0LiypPqgTBsMwsUGyYINkwTbJhSpENr6+o5UcWDJsSrj/tjdZwmjUYNVkKOSQZFUHMkXGgZNlelPVzLOsz3ZgC1s9IWV+4NliTQK0MuTJYP1MG66cBr1Q86x+Tsv6N1nB2OGH9+4yz/n0+6wuDYSuK9Xe4w/pxivV1ar+niS1kEr6GrdUC32LG9WDYDO5bTBvyLVIWnI4BDyZYIxg2A4Nhs8Gp2OMknVhjSTVrLETKZVLfGsNbZS55lW4JQg6dOyGQ+Uhm5BPV1YIablOV46A4uYdrYKZP4OdsPwUPH/CLm8MaMX5xtVAP1WsveBodEA/ljCNvlNyhreuNiiso6QTqlrZ+Dog33QMKTpGoe/c1l5fVopNgkISzwjESs0xSBz10unaDRni7ko6IykuCCCVd5quJyxnmvFgs3iAXi5QTkqVFLifQL0Is0vTVfBhbp8pk6/oK8/U1kGZtnDzXSBOXRMZADVFiP3JIY6gZQqcfgq8R7a021N5q+Jo65CEn1HKp5HRmtV7J6ayDktOryys5nYG6wAzhEiqEQ/RckjorKG7cP22Zfe+a9KGIqia3vzCFVZNFBa3a31dRHSouTB+qzLrSY5cNNTjG4KOYeFHl+9D0MKLe2n0MkIgRfldeVFl8C95+hfEIiyqDtUlcVLn9DyuyqHKUuHYmRhRcThEFl0NEwWX+UrM0w7TjGu6vqQPwgxq7XqoW0EGiy4qXvXOThz2hCvVjT2phVzFrrkdtzmoNzVkt85roWqqvWx36QiVdCHvKUHun4GvqkKekptkkVrDe734F6/0mK1i3f8vlCtYaVQwjrgecRtyvYhghhb6czPYqMQtF3M5s31M5me1RMsKaMMuiVNJ4lSyzvcpeoxMuq3i+ehWd2Q5hkMz2Kow/8b5GbJntb1ATxnLT0aPmoBoIFaGZXN6gryJiuIpoMKQiKBdeFXGxfYw8uggacrLHoc1lHLLGPGTYGKRlLfqAPmAlAFJHEw1kQPdFqt5QrYahHFTbsQTlqdc3zUGblZ3Z7Rfmpd203YKeT+U+pZHUa6YCk/1hNZxWLA0B6Tf4duyNwgyEmxYrHMQFyzyxaMBPLGqkJxbClErZRkuYsg2mheIgnZyqaumJV5A82ZZc8VtkrWYqOjkE54SSQu08TJpviv1qc5SKWSPfgZSbihlBstCiZrPQomobhYCTtO2gato2wjMdRCom/FqcihkgzN4pTcUMuJeKGUDNXuVUTEdJWG6lYu5BvEJTnYpZLaqKIVPmNSK9C+aSWE5rqOU0ROVpomstXuaE1pnhwk37FdbaavfWWnmlkwYngUV0yFeN5IYIdRmVVzqpVq10EhTWPLjpDsW1NkyutUEneocKxgkCw9XOsWNDpd8HsIbHhviWix/i9vQB5j2qzdXG2lzNvKeBekDKoWPDkxYSMTa0RC8mYmzYQVDEkvKCIiABa4wRsEaZaRLG2kyoMY3wHFhyxDw2VLjplZbknfPmYWUafZJBn2TRJznYVduzsUF+n/2uKeECURzLTY9XWBzLTU9UWBzLTW/241imIo7lpiuVF8dy0zPeuBw8De0vTr+9WLI3OQ1n/UwROo6PYykqOci1qJoLQTwza0OOeU1wgH7Th6wOvVBJQRl3GWrvLviaOuRdlRSUsd39oIztJoMybvpw2cERlCKIUHyTM8Q3OUU+vc1Qe7fB1/AqZ9qH01xDTN8NlooXxOuXLDs8X6xGI1YiqraNIMv1h8XeS4OH9sFpdGgfNX8cfp15yAzFgHcaYsA7FWZFAHmnM0eZKwtNtAd5/z7x+7GA/kLTo7PQBCjC5QwRLgdfw2/cGDeJoYlpbXjt+qYB2n70SU9MeJJW2hZ3X8Lvii3X2nZwzpLANVXckKaia/txKdyga1R6f9DFu64caPypuesqgc5jCnaNyjcNaqRRpgipA5AnzEM2CO94venH1l7n36i6FHGNKU2qLUFJqr2Thto7CV9ThzwpXYJSpEg6WoJ2iZeU5Bq9vU7KwV5njd5eBz9h2YwGpB6dYLSOo7wzc1BhDRsbFDgzB9VWsWvvcdwfK3TUW9z/M7JTCWOdSjDvUW2eNtbmaeY9DdTT8gOhITpV3KAcjA326dliY0MOjLE+PWMMX3s38+sJJwm36UxrriT3FNtcOzGy2V5jw8yrEwN77khL63r+5SH4oXhrWOI2gaVQbM3tSkDFJlBbAQywPGNBdNYJxcw+JyNM/3ivOXj+SrTNEUGbI5QvHqCmXUHNuoJ6A8/Dw0paSkSUYarRQeZFO9GGKUYecZ+RRwhGHjbFyCM0I2OfXaanWqOw1dhIkDk/Cmp1dVhR8Y341BWQyT4nrECSh3uv1GKNy4pHhoRwlwObcQX1VTTLDRuz0WzqT2vBnWJOHpwkTtah7+AU6KlBQk8Ns3OJudRexkW+G0JDHYtNu1apsxQvEtJalIdKs0Ez+4jMnDUmYkPORewX2aYdkovYiDkRGw6yAufM/O4mA6J4Qy9Z+rmJcPRd2zxZezPcy5EkYttTwM8hut6p46z1wl3U1ZE5jUSIgJoXJKCToKCZPR/Q5/iQ+wkKIZ0EhRrYNeo0NagRX1+jdkDbQMXeHzOU3HdMYQgCyGNS/RAyH/iBOIGCDyDvHxO/H6rSdwE9oOMCsi746XhKLO7nedFKmQv8SOmIdMr1RSzlvkindEQaWhIp2jnwanN2BkC9zhXUkCuoN1BVOAOGTqQCBO+mKAts0H0LbBDn3pQpA2yQVpXq7uCUM/NrkDG/hoI6HU3h1he7GSFr2JvhI7bCN95ewlB7CYJvkyCsa3wxGEWbldWzvEOwjKQKG65Y0E+CFYcgAxmiF6HMjYAhc4NNvJrk9rSytKtKBBSlAXd81Jryd0/+xNnOZ0B7yA2wVEGuGtet+hr3C3LVkAHfeKnFGrL+fFCjbkKYoF4Yrv4Et7QZ4pY2Z1Z9m3TVoafZZJRdcIeeVV/jwKrf4cyq/zM0RazS9sxB9/bMwfL3zNXm98zXUdki/YayRfoVrG4BZL8T6Qq6s2cOnXFfus44lS6ChAFDJGRubMGkuWS6fRZtFjHdgowhIbgXt+NzFvhfgjwRomZCzpC05OBrRHsBQ+0xl2FjkOg0EhZwTaHji/J7K2quVXVEUNGkw1onO7KIqPwGMddhaHurd0ReqSHqpPcxUTg4GAiRRRpz0vtjU9r7Gth7vMhluUkuDkLHiSSXqHtJLlFkmdEsXluLZEC4Xbx2b+UUr40Tk8v7SEC1ljiVj1UrK15byxavjcIm7LgxSDCyeC2EQYrX1mL8ifc1ZjvQ/iUI4V7F2bg5KINZEclplBVxnfkUhrR5yIx5yKx5yLAxyPFnR31AH9AHnBpAquRZgjzpeJjaV+QM+S9z8LXJbg9zZVvb8w1L0WaRfaWFsV9YS3DDqyzoFZQ3IkrNBXqqhd3rCb4de7PwYs8NTQo1DkNlxv0lK+xiz7AkhVHdIRSW7pyTZI1D5oYmnj7JwoabQI1DbZakqV/kyo0K1E+4R/2wE+qHy6R+iKR+RMMXE5JSP0FSn7kPRCidO+XUx/yFEQn1Q4UNexSoH3aP+iEp9RP02ZCGwgDTQiWr12h4KCNS6odJ6kdgs0LpvNW57NfIZf+OqdX8ctmPOJH9hIhQYFqokItqDc0v95lGVKvbhoQlEDecoKrbRsnVLA7BMY5+QaKShHxTU9jQJ68kH6Ip51Il+RhyMJUwW0Q7oea1C4l89zKeqSF5RnLRX5E2Z4lK8pDj9EM6wq67qcPuh3SEdUI6akkRq3W2aIRcEwPLby0+bXW5kryDU/5usnSk9Jw0QeSuO7QNQtTmiy8kkoDq2ElVEzxKj1bCqcKGN0yt4Z6SLt5kZKdWCCoMHk7S+VZhDcFPlmm8M/tJofE+pLiAp5zdUhYmNyR46lAYODm4sgxwrpGqDEPEKjHVGWxDk5TBVkZVhrHXaeW/qZY6qHUFlciiNlyXwU/G9JMxzSZj+uVjylRUr3dHpQy5AhuYLEXlF5DxC8iUWUCG4qkaYyxVw7xHtdlsrM1mVS7WDpchqzs0C/ScyaZGwAGhfR4vq9BOtzhMDfMetvkqHVd+EW8Z2WOm6O3L2OXCRisfacPfUblvEuYS8fsIBDKlt1NT3qbaNt/SEoxgCDb5G99hEQD1/6fEVYyBLhK6D749gbzxWXKmcsZmKse+JygSu8EqErvh38hOxY11Kq7MMieNtXlShWVEqCcdLYUulYsdG9GsFzt2edILxgLh3IyvRVadzI338hwwqiIKowIOGFUUhVFhxdiNVsXYDT8jO5Uw1qkE8x7V5mljbZ5m3tNAVagYe4UOGzEpCqO6FWOvTHrFWKjKNguK9XGycBf30pPUFuQp3UtP9bcgTxFbkCdNbUGeEnDwkwjbfGkZk8nQffFYf9/xPb2PXug6c6K75/xAX0//OD/g2Q1jVxEWeSqqk98QHUFbSI+ondSMPU0NXbCleQp+i6I+Q6Ee41Gfht+iqM9SqPfxqM/Ab4m6eE9yd00UP7Vk4z37zzJcB1GfvEYczpv+JKS0LN+iOCom4YL5+iniu6eI73DKPHntK+aeubGr7Lj5TcHVwsaFloqYz6mIUUrJXOGVzB38jDE9RA4gSE30tPvOkKcnQxM9TWsi+5w8w/SP38GyEqAjrc9QG+NnGBZ1BfaqK7ACxx7DemijVwWNXqUaZXQAR7erBlfVkOFV9epkraoaInDVmWPvKcax93RQq6tXiVWQ1dGsfbCAsQ+KlsGtPf19J37euYO9D13svTBwhTIM0EdP4Y+exh89o5eeeG1lYN4gjJgnEfv36GWySS29/qz7svDsZOj1Z/X0+tuZ/vHaBT5/C9ro2wWNvp1SWhB20B3YZ1yBvYE2/p40t5g8ybzIr8eVy8vPTBIv69D3GWd6/VlGr789qNXVZxT1+rOUobtJYOhCmJKtSx3FjpIF9K/g23LWAc07uSBgyc8l9DZfsF7o0SqZqBlz4+DOtmIT7pdMpIsfUjM7JK2zb+yUGMAGXUFNk2eXu4wF5uxSmh8B6i5HMYQpl1x/gxcn4bKoi5o3d1onO0Ixf7j8qqcziFLBdF3OKpK9IvhxCHKKWeIxUTmfseIsvNIKwvwucdjCFfQpAd+Hxtemyoyv/WPiOoTL8gDbUfpMWcMxPsZGk/AK4gqj7dSz7koHYd34rRKXXZxGhVslRpyFx40KRwt5g5tFJqFBozsphUkccm8SFWK9LzuK9RYzMM2JbOCRxgoA4wjRhZMM+LaFqArUzXBh41NUzHcVyR8RBr6kxXWSXG2MAp6AlkvVg+3KGOjxXqzdmXy7VOxML3wNgxx3uzPe6M3QxuYne+a1+BRuJavS4/pTOnXtg7rY2nZukMiICaiV5Fy3Fu/Y8ds/883aT73mvzAy0BVh1TN8egE72PtarTeJvURmKvMkyM+ipbVA4xOZi8myq6r2as0iaIWTEPD0hDPSUJC4lqQxJyw8wICUFQd+uxUFpx/hRpmGlwsbPyEv9Shao2rKtrFS5PwVrS38rG+UP6FkjWnBUEcLGz9prSd/Q8Z2iGL5mIvD8HMRzEK/QpKheKL4aWCho/bNaJn2TRdhJF6VGzhP0kcRegcfcG54C+cpNaYXIF+RWzijtIVzhRVMISv9NWXhMH6Pq5JEgMuAKZ1Ylt2UM+yyPDY27aSiRwbh83Tp54Bg5jKFjV+Rq5ssUWUC5bIc/1EW9ssu0BnwKfcwC2cTk8ZsmcIYwYUxJ5fFQSeJv7LE0hCdO5YhQ39zRLZleoIP132I1PpxY6tmXFGBcD4PGJf4JmJt29r3MLFrw78cfUGmdHKIzvkPy3BrpJevx43FJhah4Iv8CYBlvhvILxgFQUZY2IyRhsBcd+M5E1Zewcaf6q/3IwwvCJf8TUsmGtg0g47DuIKzobVnXC/+9rWitq8UNtVYbQfLjZLcVE9bS6NUA5vUjnyKbQgdm5ui1huLkDfiAk/vqEFP7ygZMS9wBI+xx0YoaTHWGqXX2GvUzagYkyNlrl9Rwpi8Il/ArlK2W5WmDQpnhz6kvqzlAh2VG5OXaWOSdSoLt2CbGkljclBiKg8xLZTEQWOcOdSYzInA1zWT+ipuLGwszryng8qKI8pMNO1s2yOedk8WNuXl1cnGnsREGToyEfxma9GvdYI/Pre3IOhrFDb/T9HpNBpha08xXSOjDZ6mV8RRjUBg+N1b1WJtcfCfDwsdEu2pf9rpKv+UbJUX5beNPVXYtNlSB/vKDxIOaG3wH2cacsolI/SU4cBPWSLBTtqTMpEuztoea9a2a+Oz4bNi/F2QKuQp49tU33wteFFHTY6gip8xYq4CU5g6uhbtXOKFTYcUyjQVYcoyR2aO4uZIXG6NDDlScuKiItbvKO0a6iaT4tBVlL4Ig7vmAQCOE7Htn3S8CtY0HMQnD49LKP1+QiQNQ4VNxxSWoGFiyHq1W9iIJLKUyoiE1aeCk0sRTCHNYUtn6zJ9lB8X8DI7c2SG57AjluvmJZkh3zg/f5GjFCNHFBmzTl1lVS6en296hYJROULHBzskcxVdxeCyfmzSUEl/iDfor1ZYHXJl7lUThEiNOIrsgNntTkM7hqShHZJcfe5xlmE0dVd5FSpxVZAIEwL3RvRcwMkyKvD3ZyiOZO5/Ifz6KY1eZohdKHOFDdFen6H2+uBrNnJkTDpCmb4TZyB9GpTLqg0sax9Y1uTAmL5LLxDf9A5UUmQXiIt0Wq6w6WMW9DupkqgZx6zdgFOEO9CwZPsYql4zZarXUOUdZWVpT1kSw00SLN3t2vpETGBGOoFZUr1ozHoWzg/piBQE7jXA1tUnV2nlSVorT1JnPCYq7RKW5bX4RMK0zLi2QyDNGYVgX4O1MIdplmGKKFHrD34QkiMiPPEt6SCiudnTXYFBOljY9GmFHemQI26T+AtydMm8YYoZs1NiO1cqs12TMMo2dsRtVDxxTm5MJK2l2VqPga6TxjePf3RCYQ3Linag/PeiI4dsYdPfEbcnwMAYcf4ylSSXcz3jM+d+ilxOK0NukFSAap4I7XLPgwpLsRNU6+TfjZ4+RkdhmdmBpNR2IJXFudlJ4VwtO9H6SiNNOcdkKQ8GtSL5LBVM7JhyGkwiv/cgp3rvQVa8B/wfuQ8vSSj3rFa/RIuDsFc/VVPuyK0HyUoVkaR7IpL0lbvLyj1pSLknfeWOca5HlXtStIsR0O3dR1oUgvg0WEI3F3yBPk8Um3CdKST0LbuKRSNgkfcePnuw50TfI1eFa/NrxHqB3f2apnCqcimccpHCqcmjcFKTwoSAH9FwGiaJVeAIfA23X8o/ZGD6jkWcWIcMm5t0Dxni9CHDZiu4a3MrN69x2E1i0htQr1GyTK9RoJxU+qyTnQqdAVQlCbah/NkpjVAcJX+2FYqz9gf4aA5dPGaztt4EEXCFwH2Yk252xoaIXUU3gyQK4tm81aL2P+iyOaMs3iRm9R3OPLLZsj2yghghNqqFiiBKuleoYoEHQ4RycsG1FJ4Cn4848mZIhiCLCbvsxoHDZpU7qK8Fg7jGMoPOWGaw7PnO6UeVJZkOqK8FSkFlObBcE4If1Wg3R5gQUVqzpgqb++Th/9j9qWC9OSoG75er1ZyjyEvhiT7oGHWPziDnlwKfThw6CMz5l58UxeBn9D8iuN++CIqleBBZAwcsUi0itxuOtjI5aiujbdPrb2WI2oM5U1uZIVp4yr1ybb6jzSp7uSKkJ+ZOKJn8r9EVWXhEeUkss2+w0C/Jzwxf1LJKrZpIa7822bE6lEKgoyziEhMMNfzweNXS7yfE8bmb36qSX1luGPiHK9HGE8asMoRTZ8pSGAC+Lxmkg6mHGONPaFyRtcjirIFF2Bo6A8ui0pYVSFtRTRDsH9VoN6VmaqTMWxLvdlTVI1r2nr6808Dx1u+GiA5O3e5mKC/av/46ceoGY3jEp24mHdVOqmhPvaOaDzti1CwV6JnTWpSGqPMsphKKQVTpyVs5PX2MDhozs4/Jwtd0LNep5d7c5HCvM3tXpwD8IHP6NhR0ZL51U2e016YR2zf93FUp1MFZ/KPSWiPoyl0qgWc4NJsAzjAnMcQ4JSlJ18pAxcrzyww588tI/J6S+ugp2pIaJC2pnHv7ljFimia84uOA95ceJohZ4p3wCkbriJozXZz+VzQIvwy86ShLdFv241fwUav43IcRf4Z1Ee3mr5F7rDSZMpgh/C0jfBlH8OUJZHb+2erXt8iWc1S8zjXX/TjKt6n3ToDX8IEM20pOSOyTNNsPMsuY8FbZGh2kG1VPXMhyd/wxF1kL7/hjaDSuoLmX4D5yWFpqwz6p7C6Umhe2RAfLHurtsYfYZDj5MJ3boJX8nEBVXoLp3ITOO0QKJyl+BNcO0SMacbYedZMiOQQ0GpH7lsaHlGVHlIE/0dxMTsWfVVga6OjQBAQT7Qg7q50fmIJRnRGD1yoclwo4b0fZjryMLF3KphHAUHIyfZBDaRsneHyQtU1PKElGhtUgrPNftYNZ2BS1BORw1nSmHDKWbthExX4klC3oJPyJRulQcoRyVJqUoypajtKFztlyOUqjSbykHBXB58nlSECjTqkY0QnvfMBOGnKVXYbAMNIyGUqjdI1T0oCJUBL/KMmKUFpJ7mzdS8GWqKva0xqhY3r5pms+owEdl+4MUnJW3C10sHaulrOioJBzTMqKAv5NU6xI1kJIQ+pg++W0e/tll1KlaSd0nDS1UyTjZohQhBIP/irWsSjJ3shHDQgPRqlww4ZCZ6ecA2N8f+RXZ8RFbAt6ZWeyBjhb9ofgywjKgbEyOTBeTqWxBKE3qjSUTQLSnHK3NJB37MQJLWjV1l1zkZto8BpaF7CKYE9Bn8mrNUB77Ybaa1cwTwSQ7VJqCa4UCYCPDN68V7Uceb9b/H5wpv69e8t17t2bOcEynbe7eKlQlf4xQBA/BQgYOgXQIPtLzJ3YW3rOXbjY34tfLV2FUfOy8MJqhDT4NdvXIVy0E+UuDGmm3vXaLxOLeQWZ3BAxufzBBXPVkN1ghnpGZjBXsRZpADZhxw1CgjEjJHoQRHxlVRh/YhMUQJb1OkYZcgt7oNB5yopbq0bB+c2d3NAIqnnBRb0KFjr75Ru7oPAmhTqGQ0TQVrHUzrMaslwnHXCI3MvWMUYR169QofMCESUQ4lkGZdogu/dqhSioeAkIDLqOfFatOmIRkasLnY/KiVzF90x+PU21GuuFxL16NewVVNsfKant42fPPTqut4eHr6prVrggIU/qiXUA1btXVfSuuhaeEJDXkopJxogBlBFt6+HHShN7ore/d6DXmtpRB1MbwKdpVGOafPsF2i/43T5B3rQOOTOtFcylC5a5JDCWFQwasRk906lBg1nBQmlKz8PmIiIPvBPVc4gUOq0zk07+YqUIs5VzUkxQfgKxTVhDqPOKo8wC+S1fksyCjCSERb0rmXJDU+HRhjgytfPtVGRqFE4LlZyYo+ieog/StE+exiflDvG507sVwqIj7l1hOFWlJjN0BB4aZBdxwnZZVa6LiCXz/RTTMeGz1JlVBKgd9dEp+d4t6DXXlaEuE2J1+VGr31/QU5dJBXWp4N3fJvbu/54j775cXZbl3VfviLyYUka1mFJaeGtk5yeNqMo0RfMYRfO4/uEi4U0vHi3++SSoSqJwY1qqKoWsU+7BJhVEk9JQJHKGS6kyXEQskf+HYrgYnBMqEjIC1I1barL16+WxySPIFe02h9L4X2eUGrHmbeKDQufXuF2KtZNRu5z9y3/6w799aXfrg/yFexOs98LB3oGL58+U29DsT/T+1eavfOcrrjf0y63BxOAd+3a63tBf1fzfH3z2z04Ou97Qt8Ld26o+8tb5rjf04bZVN0VvX/K4vKFxzT3+5+qSLhVyds0LvFeouqTb7HxdU+j8T0uOf8hq61CpqfE3uqqQN7RLzgTFH9TaPwiUPmBariu9wPy9HtP943+OCKbHwqrlpidS6JppI0C49NmEdrS3HRa3XWcfXB225kwA2j+oL30wQbMfY4wY0vScGOLrH4aGvrDti2/5gusC9PQP9re9/rpF33O9oeiffvzA1//73BLXG7r6qfzO793yr/Ncb+gNW/4k/41//vBj8obEKgYV0hArjGFESGslWqBOIKQWVg0npHWFrjmYlgzbhbS29Iqw7bB9cGGJkHIqq5YT0q6MIcK96Rs/++JbX3n9v7nOIaHg7GcaP3jfXtcben/9X9/8+78Wvkfa0P8PHONjw6aCCgA=",
            "custom_attributes": [
                "abi_utility"
            ],
            "debug_symbols": "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",
            "is_unconstrained": true,
            "name": "sync_state"
        }
    ],
    "name": "Dripper",
    "noir_version": "1.0.0-beta.18+190931435915a6ef908d9be090036d98356237b3",
    "outputs": {
        "globals": {
            "storage": [
                {
                    "fields": [
                        {
                            "name": "contract_name",
                            "value": {
                                "kind": "string",
                                "value": "Token"
                            }
                        },
                        {
                            "name": "fields",
                            "value": {
                                "fields": [
                                    {
                                        "name": "name",
                                        "value": {
                                            "fields": [
                                                {
                                                    "name": "slot",
                                                    "value": {
                                                        "kind": "integer",
                                                        "sign": false,
                                                        "value": "0000000000000000000000000000000000000000000000000000000000000001"
                                                    }
                                                }
                                            ],
                                            "kind": "struct"
                                        }
                                    },
                                    {
                                        "name": "symbol",
                                        "value": {
                                            "fields": [
                                                {
                                                    "name": "slot",
                                                    "value": {
                                                        "kind": "integer",
                                                        "sign": false,
                                                        "value": "0000000000000000000000000000000000000000000000000000000000000003"
                                                    }
                                                }
                                            ],
                                            "kind": "struct"
                                        }
                                    },
                                    {
                                        "name": "decimals",
                                        "value": {
                                            "fields": [
                                                {
                                                    "name": "slot",
                                                    "value": {
                                                        "kind": "integer",
                                                        "sign": false,
                                                        "value": "0000000000000000000000000000000000000000000000000000000000000005"
                                                    }
                                                }
                                            ],
                                            "kind": "struct"
                                        }
                                    },
                                    {
                                        "name": "private_balances",
                                        "value": {
                                            "fields": [
                                                {
                                                    "name": "slot",
                                                    "value": {
                                                        "kind": "integer",
                                                        "sign": false,
                                                        "value": "0000000000000000000000000000000000000000000000000000000000000007"
                                                    }
                                                }
                                            ],
                                            "kind": "struct"
                                        }
                                    },
                                    {
                                        "name": "total_supply",
                                        "value": {
                                            "fields": [
                                                {
                                                    "name": "slot",
                                                    "value": {
                                                        "kind": "integer",
                                                        "sign": false,
                                                        "value": "0000000000000000000000000000000000000000000000000000000000000008"
                                                    }
                                                }
                                            ],
                                            "kind": "struct"
                                        }
                                    },
                                    {
                                        "name": "public_balances",
                                        "value": {
                                            "fields": [
                                                {
                                                    "name": "slot",
                                                    "value": {
                                                        "kind": "integer",
                                                        "sign": false,
                                                        "value": "0000000000000000000000000000000000000000000000000000000000000009"
                                                    }
                                                }
                                            ],
                                            "kind": "struct"
                                        }
                                    },
                                    {
                                        "name": "minter",
                                        "value": {
                                            "fields": [
                                                {
                                                    "name": "slot",
                                                    "value": {
                                                        "kind": "integer",
                                                        "sign": false,
                                                        "value": "000000000000000000000000000000000000000000000000000000000000000a"
                                                    }
                                                }
                                            ],
                                            "kind": "struct"
                                        }
                                    }
                                ],
                                "kind": "struct"
                            }
                        }
                    ],
                    "kind": "struct"
                }
            ]
        },
        "structs": {
            "functions": [
                {
                    "fields": [
                        {
                            "name": "parameters",
                            "type": {
                                "fields": [],
                                "kind": "struct",
                                "path": "Dripper::constructor_parameters"
                            }
                        }
                    ],
                    "kind": "struct",
                    "path": "Dripper::constructor_abi"
                },
                {
                    "fields": [
                        {
                            "name": "parameters",
                            "type": {
                                "fields": [
                                    {
                                        "name": "_token_address",
                                        "type": {
                                            "fields": [
                                                {
                                                    "name": "inner",
                                                    "type": {
                                                        "kind": "field"
                                                    }
                                                }
                                            ],
                                            "kind": "struct",
                                            "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                                        }
                                    },
                                    {
                                        "name": "_amount",
                                        "type": {
                                            "kind": "integer",
                                            "sign": "unsigned",
                                            "width": 64
                                        }
                                    }
                                ],
                                "kind": "struct",
                                "path": "Dripper::drip_to_private_parameters"
                            }
                        }
                    ],
                    "kind": "struct",
                    "path": "Dripper::drip_to_private_abi"
                },
                {
                    "fields": [
                        {
                            "name": "parameters",
                            "type": {
                                "fields": [
                                    {
                                        "name": "_token_address",
                                        "type": {
                                            "fields": [
                                                {
                                                    "name": "inner",
                                                    "type": {
                                                        "kind": "field"
                                                    }
                                                }
                                            ],
                                            "kind": "struct",
                                            "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                                        }
                                    },
                                    {
                                        "name": "_amount",
                                        "type": {
                                            "kind": "integer",
                                            "sign": "unsigned",
                                            "width": 64
                                        }
                                    }
                                ],
                                "kind": "struct",
                                "path": "Dripper::drip_to_public_parameters"
                            }
                        }
                    ],
                    "kind": "struct",
                    "path": "Dripper::drip_to_public_abi"
                },
                {
                    "fields": [
                        {
                            "name": "parameters",
                            "type": {
                                "fields": [
                                    {
                                        "name": "messages",
                                        "type": {
                                            "fields": [
                                                {
                                                    "name": "storage",
                                                    "type": {
                                                        "kind": "array",
                                                        "length": 16,
                                                        "type": {
                                                            "fields": [
                                                                {
                                                                    "name": "ciphertext",
                                                                    "type": {
                                                                        "fields": [
                                                                            {
                                                                                "name": "storage",
                                                                                "type": {
                                                                                    "kind": "array",
                                                                                    "length": 15,
                                                                                    "type": {
                                                                                        "kind": "field"
                                                                                    }
                                                                                }
                                                                            },
                                                                            {
                                                                                "name": "len",
                                                                                "type": {
                                                                                    "kind": "integer",
                                                                                    "sign": "unsigned",
                                                                                    "width": 32
                                                                                }
                                                                            }
                                                                        ],
                                                                        "kind": "struct",
                                                                        "path": "std::collections::bounded_vec::BoundedVec"
                                                                    }
                                                                },
                                                                {
                                                                    "name": "recipient",
                                                                    "type": {
                                                                        "fields": [
                                                                            {
                                                                                "name": "inner",
                                                                                "type": {
                                                                                    "kind": "field"
                                                                                }
                                                                            }
                                                                        ],
                                                                        "kind": "struct",
                                                                        "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                                                                    }
                                                                },
                                                                {
                                                                    "name": "tx_hash",
                                                                    "type": {
                                                                        "fields": [
                                                                            {
                                                                                "name": "_is_some",
                                                                                "type": {
                                                                                    "kind": "boolean"
                                                                                }
                                                                            },
                                                                            {
                                                                                "name": "_value",
                                                                                "type": {
                                                                                    "kind": "field"
                                                                                }
                                                                            }
                                                                        ],
                                                                        "kind": "struct",
                                                                        "path": "std::option::Option"
                                                                    }
                                                                },
                                                                {
                                                                    "name": "anchor_block_timestamp",
                                                                    "type": {
                                                                        "kind": "integer",
                                                                        "sign": "unsigned",
                                                                        "width": 64
                                                                    }
                                                                }
                                                            ],
                                                            "kind": "struct",
                                                            "path": "aztec::messages::processing::offchain::OffchainMessage"
                                                        }
                                                    }
                                                },
                                                {
                                                    "name": "len",
                                                    "type": {
                                                        "kind": "integer",
                                                        "sign": "unsigned",
                                                        "width": 32
                                                    }
                                                }
                                            ],
                                            "kind": "struct",
                                            "path": "std::collections::bounded_vec::BoundedVec"
                                        }
                                    }
                                ],
                                "kind": "struct",
                                "path": "Dripper::offchain_receive_parameters"
                            }
                        }
                    ],
                    "kind": "struct",
                    "path": "Dripper::offchain_receive_abi"
                },
                {
                    "fields": [
                        {
                            "name": "parameters",
                            "type": {
                                "fields": [
                                    {
                                        "name": "scope",
                                        "type": {
                                            "fields": [
                                                {
                                                    "name": "inner",
                                                    "type": {
                                                        "kind": "field"
                                                    }
                                                }
                                            ],
                                            "kind": "struct",
                                            "path": "aztec::protocol_types::address::aztec_address::AztecAddress"
                                        }
                                    }
                                ],
                                "kind": "struct",
                                "path": "Dripper::sync_state_parameters"
                            }
                        }
                    ],
                    "kind": "struct",
                    "path": "Dripper::sync_state_abi"
                }
            ]
        }
    },
    "transpiled": true
}
