You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 

395 lines
5.9 KiB

  1. consistency_checks:
  2. - files:
  3. - aes256ctr.c
  4. - aes256ctr.h
  5. - controlbits.c
  6. - controlbits.h
  7. - crypto_hash.h
  8. - decrypt.h
  9. - encrypt.h
  10. - operations.c
  11. - pk_gen.h
  12. - sk_gen.c
  13. - sk_gen.h
  14. source:
  15. implementation: clean
  16. scheme: mceliece348864
  17. - files:
  18. - aes256ctr.c
  19. - aes256ctr.h
  20. - benes.h
  21. - controlbits.c
  22. - controlbits.h
  23. - crypto_hash.h
  24. - decrypt.h
  25. - encrypt.h
  26. - fft_tr.h
  27. - operations.c
  28. - pk_gen.h
  29. - sk_gen.c
  30. - sk_gen.h
  31. - transpose.c
  32. - transpose.h
  33. - vec.h
  34. source:
  35. implementation: vec
  36. scheme: mceliece348864
  37. - files:
  38. - aes256ctr.c
  39. - aes256ctr.h
  40. - controlbits.c
  41. - controlbits.h
  42. - crypto_hash.h
  43. - decrypt.h
  44. - encrypt.h
  45. - operations.c
  46. - pk_gen.h
  47. - sk_gen.c
  48. - sk_gen.h
  49. source:
  50. implementation: clean
  51. scheme: mceliece348864f
  52. - files:
  53. - aes256ctr.c
  54. - aes256ctr.h
  55. - benes.h
  56. - controlbits.c
  57. - controlbits.h
  58. - crypto_hash.h
  59. - decrypt.h
  60. - encrypt.h
  61. - fft_tr.h
  62. - operations.c
  63. - pk_gen.h
  64. - sk_gen.c
  65. - sk_gen.h
  66. - transpose.c
  67. - transpose.h
  68. - vec.h
  69. source:
  70. implementation: vec
  71. scheme: mceliece348864f
  72. - files:
  73. - aes256ctr.c
  74. - aes256ctr.h
  75. - benes.c
  76. - benes.h
  77. - bm.c
  78. - bm.h
  79. - consts.inc
  80. - controlbits.c
  81. - controlbits.h
  82. - crypto_hash.h
  83. - decrypt.c
  84. - decrypt.h
  85. - encrypt.c
  86. - encrypt.h
  87. - fft.c
  88. - fft.h
  89. - fft_tr.c
  90. - fft_tr.h
  91. - gf.c
  92. - gf.h
  93. - operations.c
  94. - params.h
  95. - pk_gen.h
  96. - scalars_2x.inc
  97. - scalars_4x.inc
  98. - sk_gen.c
  99. - sk_gen.h
  100. - transpose.c
  101. - transpose.h
  102. - util.c
  103. - vec.c
  104. - vec.h
  105. source:
  106. implementation: vec
  107. scheme: mceliece460896
  108. - files:
  109. - aes256ctr.c
  110. - aes256ctr.h
  111. - controlbits.c
  112. - controlbits.h
  113. - crypto_hash.h
  114. - decrypt.h
  115. - encrypt.h
  116. - operations.c
  117. - params.h
  118. - pk_gen.h
  119. - sk_gen.c
  120. - sk_gen.h
  121. source:
  122. implementation: clean
  123. scheme: mceliece460896
  124. - files:
  125. - aes256ctr.c
  126. - aes256ctr.h
  127. - api.h
  128. - controlbits.c
  129. - controlbits.h
  130. - crypto_hash.h
  131. - decrypt.h
  132. - encrypt.h
  133. - operations.c
  134. - params.h
  135. - pk_gen.h
  136. - sk_gen.c
  137. - sk_gen.h
  138. source:
  139. implementation: clean
  140. scheme: mceliece460896f
  141. - files:
  142. - aes256ctr.c
  143. - aes256ctr.h
  144. - benes.c
  145. - benes.h
  146. - bm.h
  147. - consts.inc
  148. - controlbits.c
  149. - controlbits.h
  150. - crypto_hash.h
  151. - decrypt.c
  152. - decrypt.h
  153. - encrypt.h
  154. - fft.h
  155. - fft_tr.h
  156. - gf.h
  157. - operations.c
  158. - pk_gen.h
  159. - scalars_2x.inc
  160. - scalars_4x.inc
  161. - sk_gen.c
  162. - sk_gen.h
  163. - transpose.c
  164. - transpose.h
  165. - util.c
  166. - util.h
  167. - vec.c
  168. - vec.h
  169. source:
  170. implementation: vec
  171. scheme: mceliece6688128
  172. - files:
  173. - aes256ctr.c
  174. - aes256ctr.h
  175. - controlbits.c
  176. - controlbits.h
  177. - crypto_hash.h
  178. - decrypt.h
  179. - encrypt.h
  180. - operations.c
  181. - pk_gen.h
  182. - sk_gen.c
  183. - sk_gen.h
  184. source:
  185. implementation: clean
  186. scheme: mceliece6688128
  187. - files:
  188. - aes256ctr.c
  189. - aes256ctr.h
  190. - benes.c
  191. - benes.h
  192. - bm.h
  193. - consts.inc
  194. - controlbits.c
  195. - controlbits.h
  196. - crypto_hash.h
  197. - decrypt.c
  198. - decrypt.h
  199. - encrypt.h
  200. - fft.h
  201. - fft_tr.h
  202. - gf.h
  203. - operations.c
  204. - pk_gen.h
  205. - scalars_2x.inc
  206. - scalars_4x.inc
  207. - sk_gen.c
  208. - sk_gen.h
  209. - transpose.c
  210. - transpose.h
  211. - util.c
  212. - util.h
  213. - vec.c
  214. - vec.h
  215. source:
  216. implementation: vec
  217. scheme: mceliece6688128f
  218. - files:
  219. - aes256ctr.c
  220. - aes256ctr.h
  221. - controlbits.c
  222. - controlbits.h
  223. - crypto_hash.h
  224. - decrypt.h
  225. - encrypt.h
  226. - operations.c
  227. - pk_gen.h
  228. - sk_gen.c
  229. - sk_gen.h
  230. source:
  231. implementation: clean
  232. scheme: mceliece6688128f
  233. - files:
  234. - aes256ctr.c
  235. - aes256ctr.h
  236. - benes.c
  237. - benes.h
  238. - bm.h
  239. - consts.inc
  240. - controlbits.c
  241. - controlbits.h
  242. - crypto_hash.h
  243. - decrypt.h
  244. - encrypt.h
  245. - fft.c
  246. - fft.h
  247. - fft_tr.h
  248. - operations.c
  249. - scalars_2x.inc
  250. - scalars_4x.inc
  251. - sk_gen.c
  252. - sk_gen.h
  253. - transpose.c
  254. - transpose.h
  255. - util.c
  256. - util.h
  257. - vec.h
  258. source:
  259. implementation: vec
  260. scheme: mceliece6960119
  261. - files:
  262. - aes256ctr.c
  263. - aes256ctr.h
  264. - controlbits.c
  265. - controlbits.h
  266. - crypto_hash.h
  267. - decrypt.h
  268. - encrypt.h
  269. - operations.c
  270. - pk_gen.h
  271. - sk_gen.c
  272. - sk_gen.h
  273. source:
  274. implementation: clean
  275. scheme: mceliece6960119
  276. - files:
  277. - aes256ctr.c
  278. - aes256ctr.h
  279. - benes.c
  280. - benes.h
  281. - bm.h
  282. - consts.inc
  283. - controlbits.c
  284. - controlbits.h
  285. - crypto_hash.h
  286. - decrypt.h
  287. - encrypt.h
  288. - fft.c
  289. - fft.h
  290. - fft_tr.h
  291. - operations.c
  292. - scalars_2x.inc
  293. - scalars_4x.inc
  294. - sk_gen.c
  295. - sk_gen.h
  296. - transpose.c
  297. - transpose.h
  298. - util.c
  299. - util.h
  300. - vec.h
  301. source:
  302. implementation: vec
  303. scheme: mceliece6960119f
  304. - files:
  305. - aes256ctr.c
  306. - aes256ctr.h
  307. - controlbits.c
  308. - controlbits.h
  309. - crypto_hash.h
  310. - decrypt.h
  311. - encrypt.h
  312. - operations.c
  313. - pk_gen.h
  314. - sk_gen.c
  315. - sk_gen.h
  316. source:
  317. implementation: clean
  318. scheme: mceliece6960119f
  319. - files:
  320. - aes256ctr.c
  321. - aes256ctr.h
  322. - benes.c
  323. - benes.h
  324. - bm.h
  325. - consts.inc
  326. - controlbits.c
  327. - controlbits.h
  328. - crypto_hash.h
  329. - decrypt.h
  330. - encrypt.h
  331. - operations.c
  332. - scalars_2x.inc
  333. - scalars_4x.inc
  334. - sk_gen.c
  335. - sk_gen.h
  336. - transpose.c
  337. - transpose.h
  338. - vec.h
  339. source:
  340. implementation: vec
  341. scheme: mceliece8192128
  342. - files:
  343. - aes256ctr.c
  344. - aes256ctr.h
  345. - controlbits.c
  346. - controlbits.h
  347. - crypto_hash.h
  348. - decrypt.h
  349. - encrypt.h
  350. - operations.c
  351. - pk_gen.h
  352. - sk_gen.c
  353. - sk_gen.h
  354. source:
  355. implementation: clean
  356. scheme: mceliece8192128
  357. - files:
  358. - aes256ctr.c
  359. - aes256ctr.h
  360. - benes.c
  361. - benes.h
  362. - bm.h
  363. - consts.inc
  364. - controlbits.c
  365. - controlbits.h
  366. - crypto_hash.h
  367. - decrypt.h
  368. - encrypt.h
  369. - operations.c
  370. - scalars_2x.inc
  371. - scalars_4x.inc
  372. - sk_gen.c
  373. - sk_gen.h
  374. - transpose.c
  375. - transpose.h
  376. - vec.h
  377. source:
  378. implementation: vec
  379. scheme: mceliece8192128f
  380. - files:
  381. - aes256ctr.c
  382. - aes256ctr.h
  383. - controlbits.c
  384. - controlbits.h
  385. - crypto_hash.h
  386. - decrypt.h
  387. - encrypt.h
  388. - operations.c
  389. - pk_gen.h
  390. - sk_gen.c
  391. - sk_gen.h
  392. source:
  393. implementation: clean
  394. scheme: mceliece8192128f