HomeSort by: relevance | last modified time | path
    Searched refs:rho (Results 1 - 25 of 38) sorted by relevancy

1 2

  /src/crypto/external/apache2/openssl/dist/crypto/ml_dsa/
ml_dsa_matrix.h 40 matrix_expand_A(EVP_MD_CTX *g_ctx, const EVP_MD *md, const uint8_t *rho,
43 return ossl_ml_dsa_matrix_expand_A(g_ctx, md, rho, out);
ml_dsa_key.h 22 uint8_t rho[ML_DSA_RHO_BYTES]; /* public random seed */ member in struct:ml_dsa_key_st
ml_dsa_key.c 199 memcpy(ret->rho, src->rho, sizeof(src->rho));
304 * @brief Given a key containing private key values for rho, s1 & s2
334 /* Using rho generate A' = A in NTT form */
335 if (!matrix_expand_A(md_ctx, key->shake128_md, key->rho, &a_ntt))
421 const uint8_t *const rho = expanded_seed; /* p = Public Random Seed */ local
442 memcpy(out->rho, rho, sizeof(out->rho));
    [all...]
ml_dsa_encoders.c 636 || !WPACKET_memcpy(&pkt, key->rho, sizeof(key->rho)))
682 || !PACKET_copy_bytes(&pkt, key->rho, sizeof(key->rho)))
728 || !WPACKET_memcpy(&pkt, key->rho, sizeof(key->rho))
792 || !PACKET_copy_bytes(&pkt, key->rho, sizeof(key->rho))
ml_dsa_sample.c 193 * seed values generated from the seed rho.
195 * @param rho A 32 byte seed to generated the matrix from.
201 const uint8_t *rho, MATRIX *out)
208 /* The seed used for each matrix element is rho + column_index + row_index */
209 memcpy(derived_seed, rho, ML_DSA_RHO_BYTES);
ml_dsa_local.h 64 const uint8_t *rho, MATRIX *out);
  /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/libtommath/
bn_mp_montgomery_setup.c 22 mp_montgomery_setup (mp_int * n, mp_digit * rho)
52 /* rho = -1/m mod b */
53 *rho = (unsigned long)(((mp_word)1 << ((mp_word) DIGIT_BIT)) - x) & MP_MASK;
bn_mp_montgomery_reduce.c 22 mp_montgomery_reduce (mp_int * x, mp_int * n, mp_digit rho)
37 return fast_mp_montgomery_reduce (x, n, rho);
49 /* mu = ai * rho mod b
51 * The value of rho must be precalculated via
57 mu = (mp_digit) (((mp_word)x->dp[ix]) * ((mp_word)rho) & MP_MASK);
bn_fast_mp_montgomery_reduce.c 28 int fast_mp_montgomery_reduce (mp_int * x, mp_int * n, mp_digit rho)
78 mu = (mp_digit) (((W[ix] & MP_MASK) * rho) & MP_MASK);
  /src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_issuer/
keypair_generator.c 118 bi_ptr rho = NULL; local
240 rho = bi_new_ptr();
244 bi_generate_prime(rho, DAA_PARAM_SIZE_RHO);
245 if (bi_length(rho) != DAA_PARAM_SIZE_RHO) {
246 LogError("rho bit length=%ld", bi_length(rho));
255 } while(bi_length(r) != length || bi_equals_si(bi_mod(bi_tmp, r, rho), 0));
257 // rho is not a dividor of r
258 bi_mul( capital_gamma, rho, r);
273 bi_mod(bi_tmp1, bi_mul(bi_tmp2, rho, r), n)) == 0)
    [all...]
key_correctness_proof.c 210 if( !bi_is_probable_prime( public_key->rho)) {
211 LogError( "pk->rho not prime\nrho=\n%s",
212 bi_2_hex_char( public_key->rho));
216 // (capitalGamma - 1) % rho should be equal to 0
218 public_key->rho),
220 LogError( "(capitalGamma - 1) %% rho != 0\nActual value:\n%s",
224 // (gamma ^ rho) % capitalGamma should be equals to 1
226 public_key->rho,
229 LogError( "(gamma ^ rho) %% capitalGamma != 1\nActual value:\n%s",
234 // (gamma ^ rho) % capitalGamma should be equal to
    [all...]
  /src/external/gpl2/groff/dist/font/devps/generate/
lgreekmap 23 rho *r
symbolchars 30 Rho *R
57 rho *r
  /src/crypto/external/cpl/trousers/dist/src/tspi/
tsp_daa.c 56 Trspi_LoadBlob(offset, pk->rhoLength, blob, pk->rho);
148 if ((pk->rho = malloc(pk->rhoLength)) == NULL)
151 Trspi_UnloadBlob(offset, pk->rhoLength, blob, pk->rho);
153 pk->rho = NULL;
195 free(pk->rho);
  /src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_anonymityrevocation/
csencryption_result.c 156 // exp = exp % daa_key->rho
157 bi_mod( exp, exp, daa_key->rho);
196 if( bi_cmp( randomness, daa_key->rho) >=0 || bi_cmp_si( randomness, 0) < 0) {
197 LogError("randomness >= rho || randomness < 0 \n\trandomness:%s\n\trho:%s\n",
198 bi_2_dec_char( randomness), bi_2_dec_char( daa_key->rho));
  /src/crypto/external/cpl/trousers/dist/src/include/daa/
daa_structs.h 137 bi_ptr rho; member in struct:tdTSS_DAA_PK_internal
156 const bi_ptr rho,
  /src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_verifier/
verifier_transaction.c 101 bi_ptr rho = issuer_pk->rho; local
105 rho == NULL ||
109 // exponent = exponent / rho
110 bi_div( exponent, exponent, rho);
112 LogDebug("project_into_group_gamma: rho [%ld]:%s",
113 bi_nbin_size( rho), bi_2_hex_char( rho));
372 // ( ( capital_nv ^ issuer_pk->rho ) % issuer_pk->capitalGamma ) == 1
375 issuer_pk->rho,
    [all...]
  /src/crypto/external/cpl/trousers/dist/src/tspi/daa/
daa_structs.c 449 const bi_ptr rho,
466 pk_internal->rho = rho;
498 BI_SAVE( pk_internal->rho, file);
534 pk_internal->rho = bi_new_ptr();
535 BI_LOAD( pk_internal->rho, file);
563 DUMP_BI( pk_internal->rho);
627 // rho
632 bi_2_byte_array( &result[index], length, pk->rho);
679 STORE_DAA_PK_BI( rho, daa_alloc, param_alloc)
    [all...]
daa_debug.c 45 BI_SAVE( pk_internal->rho, file);
81 pk_internal->rho = bi_new_ptr();
82 BI_LOAD( pk_internal->rho, file);
  /src/crypto/external/apache2/openssl/dist/crypto/ml_kem/
ml_kem.c 124 * vector |t|, followed by the public seed |rho|.
715 if (!EVP_DigestUpdate(mdctx, key->rho, ML_KEM_RANDOM_BYTES))
1313 memcpy(input, key->rho, ML_KEM_RANDOM_BYTES);
1559 const uint8_t *rho = key->rho; local
1563 memcpy(out + vinfo->vector_bytes, rho, ML_KEM_RANDOM_BYTES);
1604 /* Save the matrix |m| recovery seed |rho| */
1605 memcpy(key->rho, in + vinfo->vector_bytes, ML_KEM_RANDOM_BYTES);
1666 * into the provided |pubenc| buffer, and generates the content of the |rho|,
1672 * 32-byte seeds public "rho", used to generate the matrix, and private "sigma"
    [all...]
  /src/crypto/external/bsd/openssl.old/dist/crypto/bn/
bn_gf2m.c 987 BIGNUM *a, *z, *rho, *w, *w2, *tmp; local
1028 rho = BN_CTX_get(ctx);
1034 if (!BN_priv_rand(rho, p[0], BN_RAND_TOP_ONE, BN_RAND_BOTTOM_ANY))
1036 if (!BN_GF2m_mod_arr(rho, rho, p))
1039 if (!BN_copy(w, rho))
1050 if (!BN_GF2m_add(w, w2, rho))
  /src/crypto/external/apache2/openssl/dist/include/crypto/
ml_kem.h 31 * separation) further expanded to two derived seeds "rho" and "sigma", with
32 * "rho" used to generate the public matrix "A", and sigma to generate the
41 * The seed "rho" is appended to the public key and allows the recipient of the
47 #define ML_KEM_RANDOM_BYTES 32 /* rho, sigma, ... */
178 uint8_t *rho; /* Public matrix seed */ member in struct:ossl_ml_kem_key_st
188 * Fixed-size built-in buffer, which holds the |rho| and the public key
193 uint8_t seedbuf[64]; /* |rho| + |pkhash| / |z| + |d| */
  /src/external/gpl2/groff/dist/src/preproc/pic/
common.cpp 105 double rho = sqrt(temp / a_4 / b_4 * temp / a_4 / b_4 * temp); local
112 position M0 = position(rho * cos(phi0), rho * sin(phi0)) + M;
113 position M1 = position(rho * cos(phi1), rho * sin(phi1)) + M;
117 solid_arc(M + cent, rho, phi0, phi1, lt);
  /src/crypto/external/apache2/openssl/dist/crypto/bn/
bn_gf2m.c 995 BIGNUM *a, *z, *rho, *w, *w2, *tmp; local
1036 rho = BN_CTX_get(ctx);
1042 if (!BN_priv_rand_ex(rho, p[0], BN_RAND_TOP_ONE, BN_RAND_BOTTOM_ANY,
1045 if (!BN_GF2m_mod_arr(rho, rho, p))
1048 if (!BN_copy(w, rho))
1059 if (!BN_GF2m_add(w, w2, rho))
  /src/crypto/external/bsd/openssl/dist/crypto/bn/
bn_gf2m.c 1013 BIGNUM *a, *z, *rho, *w, *w2, *tmp; local
1054 rho = BN_CTX_get(ctx);
1060 if (!BN_priv_rand_ex(rho, p[0], BN_RAND_TOP_ONE, BN_RAND_BOTTOM_ANY,
1063 if (!BN_GF2m_mod_arr(rho, rho, p))
1066 if (!BN_copy(w, rho))
1077 if (!BN_GF2m_add(w, w2, rho))

Completed in 122 milliseconds

1 2