use alloc::vec::Vec;
use miden_crypto::Word;
#[cfg(feature = "serde")]
use serde::{Deserialize, Serialize};
use crate::{
errors::KernelError,
utils::{ByteReader, ByteWriter, Deserializable, DeserializationError, Serializable},
};
#[derive(Debug, Clone, Default, PartialEq, Eq)]
#[cfg_attr(feature = "serde", derive(Serialize, Deserialize))]
#[cfg_attr(feature = "serde", serde(transparent))]
pub struct Kernel(Vec<Word>);
impl Kernel {
pub const MAX_NUM_PROCEDURES: usize = u8::MAX as usize;
pub fn new(proc_hashes: &[Word]) -> Result<Self, KernelError> {
if proc_hashes.len() > Self::MAX_NUM_PROCEDURES {
Err(KernelError::TooManyProcedures(Self::MAX_NUM_PROCEDURES, proc_hashes.len()))
} else {
let mut hashes = proc_hashes.to_vec();
hashes.sort_by_key(|v| v.as_bytes());
let duplicated = hashes.windows(2).any(|data| data[0] == data[1]);
if duplicated {
Err(KernelError::DuplicatedProcedures)
} else {
Ok(Self(hashes))
}
}
}
pub fn is_empty(&self) -> bool {
self.0.is_empty()
}
pub fn contains_proc(&self, proc_hash: Word) -> bool {
self.0.contains(&proc_hash)
}
pub fn proc_hashes(&self) -> &[Word] {
&self.0
}
}
impl Serializable for Kernel {
fn write_into<W: ByteWriter>(&self, target: &mut W) {
target.write_u8(self.0.len().try_into().expect("too many kernel procedures"));
target.write_many(&self.0)
}
}
impl Deserializable for Kernel {
fn read_from<R: ByteReader>(source: &mut R) -> Result<Self, DeserializationError> {
let len = source.read_u8()? as usize;
let kernel = source.read_many::<Word>(len)?;
Ok(Self(kernel))
}
}