|
| 1 | +pub fn poseidon2<let N: u32>(input: impl ArrayOrBoundedVec<Field, N>) -> Field { |
| 2 | + let input = input.as_bounded_vec(); |
| 3 | + std::hash::poseidon2::Poseidon2::hash(input.storage(), input.len()) |
| 4 | +} |
| 5 | + |
| 6 | +// TODO: is it possible for pedersen to accept BoundedVec? |
| 7 | +pub fn pedersen<let N: u32>(input: [Field; N]) -> Field { |
| 8 | + std::hash::pedersen_hash(input) |
| 9 | +} |
| 10 | + |
| 11 | +pub fn sha256<let N: u32>(input: impl ArrayOrBoundedVec<u8, N>) -> [u8; 32] { |
| 12 | + let input = input.as_bounded_vec(); |
| 13 | + dep::sha256::sha256_var(input.storage(), input.len() as u64) |
| 14 | +} |
| 15 | + |
| 16 | +pub fn keccak256<let N: u32>(input: impl ArrayOrBoundedVec<u8, N>) -> [u8; 32] { |
| 17 | + let input = input.as_bounded_vec(); |
| 18 | + std::hash::keccak256(input.storage(), input.len()) |
| 19 | +} |
| 20 | + |
| 21 | +/// Needed because of https://github.com/noir-lang/noir/issues/7054 |
| 22 | +trait ArrayOrBoundedVec<T, let N: u32> { |
| 23 | + fn as_bounded_vec(self) -> BoundedVec<T, N>; |
| 24 | +} |
| 25 | + |
| 26 | +impl<T, let N: u32> ArrayOrBoundedVec<T, N> for [T; N] { |
| 27 | + fn as_bounded_vec(self) -> BoundedVec<T, N> { |
| 28 | + BoundedVec::from(self) |
| 29 | + } |
| 30 | +} |
| 31 | + |
| 32 | +impl<T, let N: u32> ArrayOrBoundedVec<T, N> for BoundedVec<T, N> { |
| 33 | + fn as_bounded_vec(self) -> BoundedVec<T, N> { |
| 34 | + self |
| 35 | + } |
| 36 | +} |
| 37 | + |
| 38 | +mod tests { |
| 39 | + use crate::hash::{keccak256, pedersen, poseidon2, sha256}; |
| 40 | + |
| 41 | + global FIELD_INPUT_ARR: [Field; 2] = [1, 2]; |
| 42 | + global FIELD_INPUT_VEC: BoundedVec<Field, 2> = BoundedVec::from(FIELD_INPUT_ARR); |
| 43 | + global FIELD_INPUT_VEC_LONGER: BoundedVec<Field, 3> = BoundedVec::from(FIELD_INPUT_ARR); |
| 44 | + |
| 45 | + global U8_INPUT_ARR: [u8; 2] = [1, 2]; |
| 46 | + global U8_INPUT_VEC: BoundedVec<u8, 2> = BoundedVec::from(U8_INPUT_ARR); |
| 47 | + global U8_INPUT_VEC_LONGER: BoundedVec<u8, 3> = BoundedVec::from(U8_INPUT_ARR); |
| 48 | + |
| 49 | + #[test] |
| 50 | + fn test_equivalence() { |
| 51 | + assert( |
| 52 | + (poseidon2(FIELD_INPUT_ARR) == poseidon2(FIELD_INPUT_VEC)), |
| 53 | + // TODO: is this a bug? https://discord.com/channels/1113924620781883405/1333383938198212659 |
| 54 | + // & (poseidon2(FIELD_INPUT_ARR) == poseidon2(FIELD_INPUT_VEC_LONGER)), |
| 55 | + ); |
| 56 | + assert( |
| 57 | + (sha256(U8_INPUT_VEC) == sha256(U8_INPUT_ARR)) |
| 58 | + & (sha256(U8_INPUT_VEC_LONGER) == sha256(U8_INPUT_ARR)), |
| 59 | + ); |
| 60 | + assert( |
| 61 | + (keccak256(U8_INPUT_VEC) == keccak256(U8_INPUT_ARR)) |
| 62 | + & (keccak256(U8_INPUT_VEC_LONGER) == keccak256(U8_INPUT_ARR)), |
| 63 | + ); |
| 64 | + } |
| 65 | + |
| 66 | + #[test] |
| 67 | + fn test_against_std() { |
| 68 | + assert( |
| 69 | + poseidon2(FIELD_INPUT_ARR) |
| 70 | + == std::hash::poseidon2::Poseidon2::hash(FIELD_INPUT_ARR, FIELD_INPUT_ARR.len()), |
| 71 | + ); |
| 72 | + assert( |
| 73 | + poseidon2(FIELD_INPUT_VEC_LONGER) |
| 74 | + == std::hash::poseidon2::Poseidon2::hash( |
| 75 | + FIELD_INPUT_VEC_LONGER.storage(), |
| 76 | + FIELD_INPUT_VEC_LONGER.len(), |
| 77 | + ), |
| 78 | + ); |
| 79 | + assert(pedersen(FIELD_INPUT_ARR) == std::hash::pedersen_hash(FIELD_INPUT_ARR)); |
| 80 | + assert( |
| 81 | + sha256(U8_INPUT_ARR) |
| 82 | + == dep::sha256::sha256_var(U8_INPUT_ARR, U8_INPUT_ARR.len() as u64), |
| 83 | + ); |
| 84 | + assert(keccak256(U8_INPUT_ARR) == std::hash::keccak256(U8_INPUT_ARR, U8_INPUT_ARR.len())); |
| 85 | + } |
| 86 | +} |
0 commit comments