You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 

396 regels
5.8 KiB

  1. consistency_checks:
  2. - files:
  3. - aes256ctr.c
  4. - aes256ctr.h
  5. - benes.c
  6. - benes.h
  7. - bm.c
  8. - bm.h
  9. - controlbits.c
  10. - controlbits.h
  11. - crypto_hash.h
  12. - decrypt.c
  13. - decrypt.h
  14. - encrypt.c
  15. - encrypt.h
  16. - gf.c
  17. - gf.h
  18. - operations.c
  19. - params.h
  20. - pk_gen.h
  21. - root.c
  22. - root.h
  23. - sk_gen.c
  24. - sk_gen.h
  25. - synd.c
  26. - synd.h
  27. - transpose.c
  28. - transpose.h
  29. - util.c
  30. - util.h
  31. source:
  32. implementation: clean
  33. scheme: mceliece348864
  34. - files:
  35. - aes256ctr.c
  36. - aes256ctr.h
  37. - controlbits.c
  38. - controlbits.h
  39. - crypto_hash.h
  40. - decrypt.h
  41. - encrypt.h
  42. - operations.c
  43. - params.h
  44. - pk_gen.h
  45. - sk_gen.c
  46. - sk_gen.h
  47. source:
  48. implementation: vec
  49. scheme: mceliece348864
  50. - files:
  51. - aes256ctr.c
  52. - aes256ctr.h
  53. - api.h
  54. - controlbits.c
  55. - controlbits.h
  56. - crypto_hash.h
  57. - decrypt.h
  58. - encrypt.h
  59. - operations.c
  60. - params.h
  61. - pk_gen.h
  62. - sk_gen.c
  63. - sk_gen.h
  64. source:
  65. implementation: vec
  66. scheme: mceliece348864f
  67. - files:
  68. - aes256ctr.c
  69. - aes256ctr.h
  70. - bm.c
  71. - bm.h
  72. - controlbits.c
  73. - controlbits.h
  74. - crypto_hash.h
  75. - decrypt.c
  76. - decrypt.h
  77. - encrypt.c
  78. - encrypt.h
  79. - gf.h
  80. - operations.c
  81. - pk_gen.h
  82. - root.c
  83. - root.h
  84. - sk_gen.c
  85. - sk_gen.h
  86. - synd.c
  87. - synd.h
  88. - transpose.c
  89. - transpose.h
  90. - util.h
  91. source:
  92. implementation: clean
  93. scheme: mceliece460896
  94. - files:
  95. - aes256ctr.c
  96. - aes256ctr.h
  97. - controlbits.c
  98. - controlbits.h
  99. - crypto_hash.h
  100. - decrypt.h
  101. - encrypt.h
  102. - operations.c
  103. - pk_gen.h
  104. - sk_gen.c
  105. - sk_gen.h
  106. source:
  107. implementation: vec
  108. scheme: mceliece460896
  109. - files:
  110. - aes256ctr.c
  111. - aes256ctr.h
  112. - bm.c
  113. - bm.h
  114. - controlbits.c
  115. - controlbits.h
  116. - crypto_hash.h
  117. - decrypt.c
  118. - decrypt.h
  119. - encrypt.c
  120. - encrypt.h
  121. - gf.h
  122. - operations.c
  123. - pk_gen.c
  124. - pk_gen.h
  125. - root.c
  126. - root.h
  127. - sk_gen.c
  128. - sk_gen.h
  129. - synd.c
  130. - synd.h
  131. - transpose.c
  132. - transpose.h
  133. - util.h
  134. source:
  135. implementation: clean
  136. scheme: mceliece460896f
  137. - files:
  138. - aes256ctr.c
  139. - aes256ctr.h
  140. - controlbits.c
  141. - controlbits.h
  142. - crypto_hash.h
  143. - decrypt.h
  144. - encrypt.h
  145. - operations.c
  146. - pk_gen.h
  147. - sk_gen.c
  148. - sk_gen.h
  149. source:
  150. implementation: vec
  151. scheme: mceliece460896f
  152. - files:
  153. - aes256ctr.c
  154. - aes256ctr.h
  155. - bm.c
  156. - bm.h
  157. - controlbits.c
  158. - controlbits.h
  159. - crypto_hash.h
  160. - decrypt.c
  161. - decrypt.h
  162. - encrypt.c
  163. - encrypt.h
  164. - gf.h
  165. - operations.c
  166. - pk_gen.h
  167. - root.c
  168. - root.h
  169. - sk_gen.c
  170. - sk_gen.h
  171. - synd.c
  172. - synd.h
  173. - transpose.c
  174. - transpose.h
  175. - util.h
  176. source:
  177. implementation: clean
  178. scheme: mceliece6688128
  179. - files:
  180. - aes256ctr.c
  181. - aes256ctr.h
  182. - controlbits.c
  183. - controlbits.h
  184. - crypto_hash.h
  185. - decrypt.h
  186. - encrypt.h
  187. - operations.c
  188. - pk_gen.h
  189. - sk_gen.c
  190. - sk_gen.h
  191. source:
  192. implementation: vec
  193. scheme: mceliece6688128
  194. - files:
  195. - aes256ctr.c
  196. - aes256ctr.h
  197. - bm.c
  198. - bm.h
  199. - controlbits.c
  200. - controlbits.h
  201. - crypto_hash.h
  202. - decrypt.c
  203. - decrypt.h
  204. - encrypt.c
  205. - encrypt.h
  206. - gf.h
  207. - operations.c
  208. - pk_gen.c
  209. - pk_gen.h
  210. - root.c
  211. - root.h
  212. - sk_gen.c
  213. - sk_gen.h
  214. - synd.c
  215. - synd.h
  216. - transpose.c
  217. - transpose.h
  218. - util.h
  219. source:
  220. implementation: clean
  221. scheme: mceliece6688128f
  222. - files:
  223. - aes256ctr.c
  224. - aes256ctr.h
  225. - controlbits.c
  226. - controlbits.h
  227. - crypto_hash.h
  228. - decrypt.h
  229. - encrypt.h
  230. - operations.c
  231. - pk_gen.h
  232. - sk_gen.c
  233. - sk_gen.h
  234. source:
  235. implementation: vec
  236. scheme: mceliece6688128f
  237. - files:
  238. - aes256ctr.c
  239. - aes256ctr.h
  240. - bm.c
  241. - bm.h
  242. - controlbits.c
  243. - controlbits.h
  244. - crypto_hash.h
  245. - decrypt.h
  246. - encrypt.h
  247. - gf.h
  248. - operations.c
  249. - pk_gen.h
  250. - root.c
  251. - root.h
  252. - sk_gen.c
  253. - sk_gen.h
  254. - synd.c
  255. - synd.h
  256. - transpose.c
  257. - transpose.h
  258. - util.h
  259. source:
  260. implementation: clean
  261. scheme: mceliece6960119
  262. - files:
  263. - aes256ctr.c
  264. - aes256ctr.h
  265. - controlbits.c
  266. - controlbits.h
  267. - crypto_hash.h
  268. - decrypt.h
  269. - encrypt.h
  270. - operations.c
  271. - sk_gen.c
  272. - sk_gen.h
  273. source:
  274. implementation: vec
  275. scheme: mceliece6960119
  276. - files:
  277. - aes256ctr.c
  278. - aes256ctr.h
  279. - bm.c
  280. - bm.h
  281. - controlbits.c
  282. - controlbits.h
  283. - crypto_hash.h
  284. - decrypt.h
  285. - encrypt.h
  286. - gf.h
  287. - operations.c
  288. - pk_gen.h
  289. - root.c
  290. - root.h
  291. - sk_gen.c
  292. - sk_gen.h
  293. - synd.c
  294. - synd.h
  295. - transpose.c
  296. - transpose.h
  297. - util.h
  298. source:
  299. implementation: clean
  300. scheme: mceliece6960119f
  301. - files:
  302. - aes256ctr.c
  303. - aes256ctr.h
  304. - controlbits.c
  305. - controlbits.h
  306. - crypto_hash.h
  307. - decrypt.h
  308. - encrypt.h
  309. - operations.c
  310. - sk_gen.c
  311. - sk_gen.h
  312. source:
  313. implementation: vec
  314. scheme: mceliece6960119f
  315. - files:
  316. - aes256ctr.c
  317. - aes256ctr.h
  318. - bm.c
  319. - bm.h
  320. - controlbits.c
  321. - controlbits.h
  322. - crypto_hash.h
  323. - decrypt.c
  324. - decrypt.h
  325. - encrypt.h
  326. - gf.h
  327. - operations.c
  328. - pk_gen.h
  329. - root.c
  330. - root.h
  331. - sk_gen.c
  332. - sk_gen.h
  333. - synd.c
  334. - synd.h
  335. - transpose.c
  336. - transpose.h
  337. - util.h
  338. source:
  339. implementation: clean
  340. scheme: mceliece8192128
  341. - files:
  342. - aes256ctr.c
  343. - aes256ctr.h
  344. - controlbits.c
  345. - controlbits.h
  346. - crypto_hash.h
  347. - decrypt.h
  348. - encrypt.h
  349. - operations.c
  350. - sk_gen.c
  351. - sk_gen.h
  352. source:
  353. implementation: vec
  354. scheme: mceliece8192128
  355. - files:
  356. - aes256ctr.c
  357. - aes256ctr.h
  358. - bm.c
  359. - bm.h
  360. - controlbits.c
  361. - controlbits.h
  362. - crypto_hash.h
  363. - decrypt.c
  364. - decrypt.h
  365. - encrypt.h
  366. - gf.h
  367. - operations.c
  368. - pk_gen.c
  369. - pk_gen.h
  370. - root.c
  371. - root.h
  372. - sk_gen.c
  373. - sk_gen.h
  374. - synd.c
  375. - synd.h
  376. - transpose.c
  377. - transpose.h
  378. - util.h
  379. source:
  380. implementation: clean
  381. scheme: mceliece8192128f
  382. - files:
  383. - aes256ctr.c
  384. - aes256ctr.h
  385. - controlbits.c
  386. - controlbits.h
  387. - crypto_hash.h
  388. - decrypt.h
  389. - encrypt.h
  390. - operations.c
  391. - sk_gen.c
  392. - sk_gen.h
  393. source:
  394. implementation: vec
  395. scheme: mceliece8192128f