| /src/crypto/external/apache2/openssl/dist/crypto/ml_dsa/ |
| ml_dsa_matrix.h | 40 matrix_expand_A(EVP_MD_CTX *g_ctx, const EVP_MD *md, const uint8_t *rho, 43 return ossl_ml_dsa_matrix_expand_A(g_ctx, md, rho, out);
|
| ml_dsa_key.h | 22 uint8_t rho[ML_DSA_RHO_BYTES]; /* public random seed */ member in struct:ml_dsa_key_st
|
| ml_dsa_key.c | 199 memcpy(ret->rho, src->rho, sizeof(src->rho)); 304 * @brief Given a key containing private key values for rho, s1 & s2 334 /* Using rho generate A' = A in NTT form */ 335 if (!matrix_expand_A(md_ctx, key->shake128_md, key->rho, &a_ntt)) 421 const uint8_t *const rho = expanded_seed; /* p = Public Random Seed */ local 442 memcpy(out->rho, rho, sizeof(out->rho)); [all...] |
| ml_dsa_encoders.c | 636 || !WPACKET_memcpy(&pkt, key->rho, sizeof(key->rho))) 682 || !PACKET_copy_bytes(&pkt, key->rho, sizeof(key->rho))) 728 || !WPACKET_memcpy(&pkt, key->rho, sizeof(key->rho)) 792 || !PACKET_copy_bytes(&pkt, key->rho, sizeof(key->rho))
|
| ml_dsa_sample.c | 193 * seed values generated from the seed rho. 195 * @param rho A 32 byte seed to generated the matrix from. 201 const uint8_t *rho, MATRIX *out) 208 /* The seed used for each matrix element is rho + column_index + row_index */ 209 memcpy(derived_seed, rho, ML_DSA_RHO_BYTES);
|
| ml_dsa_local.h | 64 const uint8_t *rho, MATRIX *out);
|
| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/libtommath/ |
| bn_mp_montgomery_setup.c | 22 mp_montgomery_setup (mp_int * n, mp_digit * rho) 52 /* rho = -1/m mod b */ 53 *rho = (unsigned long)(((mp_word)1 << ((mp_word) DIGIT_BIT)) - x) & MP_MASK;
|
| bn_mp_montgomery_reduce.c | 22 mp_montgomery_reduce (mp_int * x, mp_int * n, mp_digit rho) 37 return fast_mp_montgomery_reduce (x, n, rho); 49 /* mu = ai * rho mod b 51 * The value of rho must be precalculated via 57 mu = (mp_digit) (((mp_word)x->dp[ix]) * ((mp_word)rho) & MP_MASK);
|
| bn_fast_mp_montgomery_reduce.c | 28 int fast_mp_montgomery_reduce (mp_int * x, mp_int * n, mp_digit rho) 78 mu = (mp_digit) (((W[ix] & MP_MASK) * rho) & MP_MASK);
|
| /src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_issuer/ |
| keypair_generator.c | 118 bi_ptr rho = NULL; local 240 rho = bi_new_ptr(); 244 bi_generate_prime(rho, DAA_PARAM_SIZE_RHO); 245 if (bi_length(rho) != DAA_PARAM_SIZE_RHO) { 246 LogError("rho bit length=%ld", bi_length(rho)); 255 } while(bi_length(r) != length || bi_equals_si(bi_mod(bi_tmp, r, rho), 0)); 257 // rho is not a dividor of r 258 bi_mul( capital_gamma, rho, r); 273 bi_mod(bi_tmp1, bi_mul(bi_tmp2, rho, r), n)) == 0) [all...] |
| key_correctness_proof.c | 210 if( !bi_is_probable_prime( public_key->rho)) { 211 LogError( "pk->rho not prime\nrho=\n%s", 212 bi_2_hex_char( public_key->rho)); 216 // (capitalGamma - 1) % rho should be equal to 0 218 public_key->rho), 220 LogError( "(capitalGamma - 1) %% rho != 0\nActual value:\n%s", 224 // (gamma ^ rho) % capitalGamma should be equals to 1 226 public_key->rho, 229 LogError( "(gamma ^ rho) %% capitalGamma != 1\nActual value:\n%s", 234 // (gamma ^ rho) % capitalGamma should be equal to [all...] |
| /src/external/gpl2/groff/dist/font/devps/generate/ |
| lgreekmap | 23 rho *r
|
| symbolchars | 30 Rho *R 57 rho *r
|
| /src/crypto/external/cpl/trousers/dist/src/tspi/ |
| tsp_daa.c | 56 Trspi_LoadBlob(offset, pk->rhoLength, blob, pk->rho); 148 if ((pk->rho = malloc(pk->rhoLength)) == NULL) 151 Trspi_UnloadBlob(offset, pk->rhoLength, blob, pk->rho); 153 pk->rho = NULL; 195 free(pk->rho);
|
| /src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_anonymityrevocation/ |
| csencryption_result.c | 156 // exp = exp % daa_key->rho 157 bi_mod( exp, exp, daa_key->rho); 196 if( bi_cmp( randomness, daa_key->rho) >=0 || bi_cmp_si( randomness, 0) < 0) { 197 LogError("randomness >= rho || randomness < 0 \n\trandomness:%s\n\trho:%s\n", 198 bi_2_dec_char( randomness), bi_2_dec_char( daa_key->rho));
|
| /src/crypto/external/cpl/trousers/dist/src/include/daa/ |
| daa_structs.h | 137 bi_ptr rho; member in struct:tdTSS_DAA_PK_internal 156 const bi_ptr rho,
|
| /src/crypto/external/cpl/trousers/dist/src/tspi/daa/daa_verifier/ |
| verifier_transaction.c | 101 bi_ptr rho = issuer_pk->rho; local 105 rho == NULL || 109 // exponent = exponent / rho 110 bi_div( exponent, exponent, rho); 112 LogDebug("project_into_group_gamma: rho [%ld]:%s", 113 bi_nbin_size( rho), bi_2_hex_char( rho)); 372 // ( ( capital_nv ^ issuer_pk->rho ) % issuer_pk->capitalGamma ) == 1 375 issuer_pk->rho, [all...] |
| /src/crypto/external/cpl/trousers/dist/src/tspi/daa/ |
| daa_structs.c | 449 const bi_ptr rho, 466 pk_internal->rho = rho; 498 BI_SAVE( pk_internal->rho, file); 534 pk_internal->rho = bi_new_ptr(); 535 BI_LOAD( pk_internal->rho, file); 563 DUMP_BI( pk_internal->rho); 627 // rho 632 bi_2_byte_array( &result[index], length, pk->rho); 679 STORE_DAA_PK_BI( rho, daa_alloc, param_alloc) [all...] |
| daa_debug.c | 45 BI_SAVE( pk_internal->rho, file); 81 pk_internal->rho = bi_new_ptr(); 82 BI_LOAD( pk_internal->rho, file);
|
| /src/crypto/external/apache2/openssl/dist/crypto/ml_kem/ |
| ml_kem.c | 124 * vector |t|, followed by the public seed |rho|. 715 if (!EVP_DigestUpdate(mdctx, key->rho, ML_KEM_RANDOM_BYTES)) 1313 memcpy(input, key->rho, ML_KEM_RANDOM_BYTES); 1559 const uint8_t *rho = key->rho; local 1563 memcpy(out + vinfo->vector_bytes, rho, ML_KEM_RANDOM_BYTES); 1604 /* Save the matrix |m| recovery seed |rho| */ 1605 memcpy(key->rho, in + vinfo->vector_bytes, ML_KEM_RANDOM_BYTES); 1666 * into the provided |pubenc| buffer, and generates the content of the |rho|, 1672 * 32-byte seeds public "rho", used to generate the matrix, and private "sigma" [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/bn/ |
| bn_gf2m.c | 987 BIGNUM *a, *z, *rho, *w, *w2, *tmp; local 1028 rho = BN_CTX_get(ctx); 1034 if (!BN_priv_rand(rho, p[0], BN_RAND_TOP_ONE, BN_RAND_BOTTOM_ANY)) 1036 if (!BN_GF2m_mod_arr(rho, rho, p)) 1039 if (!BN_copy(w, rho)) 1050 if (!BN_GF2m_add(w, w2, rho))
|
| /src/crypto/external/apache2/openssl/dist/include/crypto/ |
| ml_kem.h | 31 * separation) further expanded to two derived seeds "rho" and "sigma", with 32 * "rho" used to generate the public matrix "A", and sigma to generate the 41 * The seed "rho" is appended to the public key and allows the recipient of the 47 #define ML_KEM_RANDOM_BYTES 32 /* rho, sigma, ... */ 178 uint8_t *rho; /* Public matrix seed */ member in struct:ossl_ml_kem_key_st 188 * Fixed-size built-in buffer, which holds the |rho| and the public key 193 uint8_t seedbuf[64]; /* |rho| + |pkhash| / |z| + |d| */
|
| /src/external/gpl2/groff/dist/src/preproc/pic/ |
| common.cpp | 105 double rho = sqrt(temp / a_4 / b_4 * temp / a_4 / b_4 * temp); local 112 position M0 = position(rho * cos(phi0), rho * sin(phi0)) + M; 113 position M1 = position(rho * cos(phi1), rho * sin(phi1)) + M; 117 solid_arc(M + cent, rho, phi0, phi1, lt);
|
| /src/crypto/external/apache2/openssl/dist/crypto/bn/ |
| bn_gf2m.c | 995 BIGNUM *a, *z, *rho, *w, *w2, *tmp; local 1036 rho = BN_CTX_get(ctx); 1042 if (!BN_priv_rand_ex(rho, p[0], BN_RAND_TOP_ONE, BN_RAND_BOTTOM_ANY, 1045 if (!BN_GF2m_mod_arr(rho, rho, p)) 1048 if (!BN_copy(w, rho)) 1059 if (!BN_GF2m_add(w, w2, rho))
|
| /src/crypto/external/bsd/openssl/dist/crypto/bn/ |
| bn_gf2m.c | 1013 BIGNUM *a, *z, *rho, *w, *w2, *tmp; local 1054 rho = BN_CTX_get(ctx); 1060 if (!BN_priv_rand_ex(rho, p[0], BN_RAND_TOP_ONE, BN_RAND_BOTTOM_ANY, 1063 if (!BN_GF2m_mod_arr(rho, rho, p)) 1066 if (!BN_copy(w, rho)) 1077 if (!BN_GF2m_add(w, w2, rho))
|