diff --git a/authwit/src/auth.nr b/authwit/src/auth.nr index 9e240682..a533bd58 100644 --- a/authwit/src/auth.nr +++ b/authwit/src/auth.nr @@ -215,7 +215,11 @@ pub fn assert_current_call_valid_authwit(context: &mut PrivateContext, on_behalf * @param on_behalf_of The address that have authorized the current call * @param inner_hash The hash of the message to authorize */ -pub fn assert_inner_hash_valid_authwit(context: &mut PrivateContext, on_behalf_of: AztecAddress, inner_hash: Field) { +pub fn assert_inner_hash_valid_authwit( + context: &mut PrivateContext, + on_behalf_of: AztecAddress, + inner_hash: Field +) { // We perform a static call here and not a standard one to ensure that the account contract cannot re-enter. let result: Field = context.static_call_private_function( on_behalf_of, @@ -262,7 +266,11 @@ pub fn assert_current_call_valid_authwit_public(context: &mut PublicContext, on_ * * @param on_behalf_of The address that have authorized the `inner_hash` */ -pub fn assert_inner_hash_valid_authwit_public(context: &mut PublicContext, on_behalf_of: AztecAddress, inner_hash: Field) { +pub fn assert_inner_hash_valid_authwit_public( + context: &mut PublicContext, + on_behalf_of: AztecAddress, + inner_hash: Field +) { let result: Field = context.call_public_function( CANONICAL_AUTH_REGISTRY_ADDRESS, comptime { @@ -338,7 +346,12 @@ pub fn compute_authwit_nullifier(on_behalf_of: AztecAddress, inner_hash: Field) * @param version The version of the chain that the message is being consumed on * @param inner_hash The hash of the "inner" message that is being consumed */ -pub fn compute_authwit_message_hash(consumer: AztecAddress, chain_id: Field, version: Field, inner_hash: Field) -> Field { +pub fn compute_authwit_message_hash( + consumer: AztecAddress, + chain_id: Field, + version: Field, + inner_hash: Field +) -> Field { poseidon2_hash_with_separator( [ consumer.to_field(), diff --git a/aztec/src/encrypted_logs/incoming_body.nr b/aztec/src/encrypted_logs/incoming_body.nr index 39af0fba..eaa14377 100644 --- a/aztec/src/encrypted_logs/incoming_body.nr +++ b/aztec/src/encrypted_logs/incoming_body.nr @@ -137,12 +137,12 @@ mod test { } }; - /// 1. `EncryptedLogIncomingBody::from_note` calls `note.to_be_bytes(storage_slot)` function which serializes - /// the note to bytes - note that in the case of `AddressNote` the `to_be_bytes` function was automatically - /// implemented by Aztec macros. + // 1. `EncryptedLogIncomingBody::from_note` calls `note.to_be_bytes(storage_slot)` function which serializes + // the note to bytes - note that in the case of `AddressNote` the `to_be_bytes` function was automatically + // implemented by Aztec macros. let body = EncryptedLogIncomingBody::from_note(note, storage_slot); - /// 2. `body.compute_ciphertext(...)` function then derives symmetric key from `eph_sk` and `ivpk` and encrypts + // 2. `body.compute_ciphertext(...)` function then derives symmetric key from `eph_sk` and `ivpk` and encrypts // the note plaintext using AES-128. let ciphertext = body.compute_ciphertext(eph_sk, ivpk);