Symbol: Eurydice_slice
usr.bin/ssh/libcrux_mlkem768_sha3.h
10160
Eurydice_slice key_generation_seed,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10168
Eurydice_slice seed_for_A = uu____0.fst;
usr.bin/ssh/libcrux_mlkem768_sha3.h
10169
Eurydice_slice seed_for_secret_and_error = uu____0.snd;
usr.bin/ssh/libcrux_mlkem768_sha3.h
10196
Eurydice_slice_to_array2(&dst, seed_for_A, Eurydice_slice, uint8_t[32U],
usr.bin/ssh/libcrux_mlkem768_sha3.h
10239
Eurydice_slice out) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
10249
Eurydice_slice uu____0 = Eurydice_slice_subslice3(
usr.bin/ssh/libcrux_mlkem768_sha3.h
10272
Eurydice_slice seed_for_a, uint8_t *serialized) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
10299
Eurydice_slice seed_for_a, uint8_t ret[1184U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
10358
libcrux_ml_kem_ind_cpa_generate_keypair_ea(Eurydice_slice key_generation_seed) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
10381
Eurydice_slice private_key, Eurydice_slice public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10382
Eurydice_slice implicit_rejection_value, uint8_t *serialized) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
10402
Eurydice_slice uu____6 = Eurydice_array_to_subslice3(
usr.bin/ssh/libcrux_mlkem768_sha3.h
10429
Eurydice_slice private_key, Eurydice_slice public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10430
Eurydice_slice implicit_rejection_value, uint8_t ret[2400U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
10459
Eurydice_slice ind_cpa_keypair_randomness = Eurydice_array_to_subslice3(
usr.bin/ssh/libcrux_mlkem768_sha3.h
10462
Eurydice_slice implicit_rejection_value = Eurydice_array_to_subslice_from(
usr.bin/ssh/libcrux_mlkem768_sha3.h
10540
Eurydice_slice expected = Eurydice_array_to_subslice3(
usr.bin/ssh/libcrux_mlkem768_sha3.h
10659
Eurydice_slice public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
10802
Eurydice_slice uu____0 = Eurydice_array_to_subslice_from(
usr.bin/ssh/libcrux_mlkem768_sha3.h
10817
Eurydice_slice shared_secret = uu____1.fst;
usr.bin/ssh/libcrux_mlkem768_sha3.h
10818
Eurydice_slice pseudorandomness = uu____1.snd;
usr.bin/ssh/libcrux_mlkem768_sha3.h
10824
Eurydice_slice uu____2 = Eurydice_array_to_subslice_from(
usr.bin/ssh/libcrux_mlkem768_sha3.h
10903
Eurydice_slice randomness, Eurydice_slice pk_hash, uint8_t ret[64U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
10949
Eurydice_slice shared_secret = uu____0.fst;
usr.bin/ssh/libcrux_mlkem768_sha3.h
10950
Eurydice_slice pseudorandomness = uu____0.snd;
usr.bin/ssh/libcrux_mlkem768_sha3.h
11137
Eurydice_slice ind_cpa_keypair_randomness = Eurydice_array_to_subslice3(
usr.bin/ssh/libcrux_mlkem768_sha3.h
11140
Eurydice_slice implicit_rejection_value = Eurydice_array_to_subslice_from(
usr.bin/ssh/libcrux_mlkem768_sha3.h
11173
Eurydice_slice_to_array2(&dst, implicit_rejection_value, Eurydice_slice,
usr.bin/ssh/libcrux_mlkem768_sha3.h
11313
Eurydice_slice ind_cpa_secret_key = uu____0.fst;
usr.bin/ssh/libcrux_mlkem768_sha3.h
11314
Eurydice_slice ind_cpa_public_key = uu____0.snd;
usr.bin/ssh/libcrux_mlkem768_sha3.h
11315
Eurydice_slice ind_cpa_public_key_hash = uu____0.thd;
usr.bin/ssh/libcrux_mlkem768_sha3.h
11316
Eurydice_slice implicit_rejection_value = uu____0.f3;
usr.bin/ssh/libcrux_mlkem768_sha3.h
11672
Eurydice_slice uu____0 =
usr.bin/ssh/libcrux_mlkem768_sha3.h
1190
Eurydice_slice slice, uint8_t ret[33U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
1209
Eurydice_slice slice, uint8_t ret[34U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
1228
static inline Eurydice_slice libcrux_ml_kem_types_as_ref_d3_80(
usr.bin/ssh/libcrux_mlkem768_sha3.h
1242
Eurydice_slice slice, uint8_t ret[1120U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
1261
Eurydice_slice slice, uint8_t ret[64U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
1272
Eurydice_slice fst;
usr.bin/ssh/libcrux_mlkem768_sha3.h
1273
Eurydice_slice snd;
usr.bin/ssh/libcrux_mlkem768_sha3.h
1274
Eurydice_slice thd;
usr.bin/ssh/libcrux_mlkem768_sha3.h
1275
Eurydice_slice f3;
usr.bin/ssh/libcrux_mlkem768_sha3.h
1279
Eurydice_slice fst;
usr.bin/ssh/libcrux_mlkem768_sha3.h
1280
Eurydice_slice snd;
usr.bin/ssh/libcrux_mlkem768_sha3.h
1295
libcrux_ml_kem_types_unpack_private_key_b4(Eurydice_slice private_key) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
1298
Eurydice_slice ind_cpa_secret_key = uu____0.fst;
usr.bin/ssh/libcrux_mlkem768_sha3.h
1299
Eurydice_slice secret_key0 = uu____0.snd;
usr.bin/ssh/libcrux_mlkem768_sha3.h
1302
Eurydice_slice ind_cpa_public_key = uu____1.fst;
usr.bin/ssh/libcrux_mlkem768_sha3.h
1303
Eurydice_slice secret_key = uu____1.snd;
usr.bin/ssh/libcrux_mlkem768_sha3.h
1307
Eurydice_slice ind_cpa_public_key_hash = uu____2.fst;
usr.bin/ssh/libcrux_mlkem768_sha3.h
1308
Eurydice_slice implicit_rejection_value = uu____2.snd;
usr.bin/ssh/libcrux_mlkem768_sha3.h
1394
static KRML_MUSTINLINE Eurydice_slice
usr.bin/ssh/libcrux_mlkem768_sha3.h
1395
libcrux_secrets_int_classify_public_classify_ref_9b_90(Eurydice_slice self) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
1408
static KRML_MUSTINLINE Eurydice_slice
usr.bin/ssh/libcrux_mlkem768_sha3.h
1409
libcrux_secrets_int_classify_public_classify_ref_9b_39(Eurydice_slice self) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
1532
Eurydice_slice lhs, Eurydice_slice rhs) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
1546
Eurydice_slice lhs, Eurydice_slice rhs) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
1555
Eurydice_slice lhs, Eurydice_slice rhs, uint8_t selector,
usr.bin/ssh/libcrux_mlkem768_sha3.h
1575
Eurydice_slice lhs, Eurydice_slice rhs, uint8_t selector,
usr.bin/ssh/libcrux_mlkem768_sha3.h
1582
Eurydice_slice lhs_c, Eurydice_slice rhs_c, Eurydice_slice lhs_s,
usr.bin/ssh/libcrux_mlkem768_sha3.h
1583
Eurydice_slice rhs_s, uint8_t ret[32U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
1795
uint64_t *state, Eurydice_slice blocks, size_t start) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
1806
Eurydice_slice, uint8_t[8U], TryFromSliceError);
usr.bin/ssh/libcrux_mlkem768_sha3.h
1832
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *input,
usr.bin/ssh/libcrux_mlkem768_sha3.h
188
(KRML_CLITERAL(Eurydice_slice){(void *)(x + start), end - start})
usr.bin/ssh/libcrux_mlkem768_sha3.h
251
KRML_CLITERAL(Eurydice_slice) { ptr_, len_ }
usr.bin/ssh/libcrux_mlkem768_sha3.h
283
KRML_CLITERAL(Eurydice_slice){EURYDICE_CFIELD(.ptr =)(slice.ptr), \
usr.bin/ssh/libcrux_mlkem768_sha3.h
285
EURYDICE_CFIELD(.snd =) KRML_CLITERAL(Eurydice_slice) { \
usr.bin/ssh/libcrux_mlkem768_sha3.h
300
Eurydice_slice src, size_t sz) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
3276
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *blocks,
usr.bin/ssh/libcrux_mlkem768_sha3.h
3289
uint64_t *state, Eurydice_slice blocks, size_t start, size_t len) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
331
((Eurydice_slice){.ptr = (void *)(fam_ptr), .len = len_})
usr.bin/ssh/libcrux_mlkem768_sha3.h
3314
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *input,
usr.bin/ssh/libcrux_mlkem768_sha3.h
3332
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *last,
usr.bin/ssh/libcrux_mlkem768_sha3.h
334
((Eurydice_slice){.ptr = (void *)(ptr_), .len = len_})
usr.bin/ssh/libcrux_mlkem768_sha3.h
3344
uint64_t *s, Eurydice_slice out, size_t start, size_t len) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
3348
Eurydice_slice uu____0 = Eurydice_slice_subslice3(
usr.bin/ssh/libcrux_mlkem768_sha3.h
3360
Eurydice_slice uu____1 = Eurydice_slice_subslice3(
usr.bin/ssh/libcrux_mlkem768_sha3.h
3386
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice out,
usr.bin/ssh/libcrux_mlkem768_sha3.h
3398
Eurydice_slice data, Eurydice_slice out) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
3404
Eurydice_slice buf[1U] = {data};
usr.bin/ssh/libcrux_mlkem768_sha3.h
3408
Eurydice_slice buf[1U] = {data};
usr.bin/ssh/libcrux_mlkem768_sha3.h
3433
static KRML_MUSTINLINE void libcrux_sha3_portable_sha512(Eurydice_slice digest,
usr.bin/ssh/libcrux_mlkem768_sha3.h
3434
Eurydice_slice data) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
3444
uint64_t *state, Eurydice_slice blocks, size_t start) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
3455
Eurydice_slice, uint8_t[8U], TryFromSliceError);
usr.bin/ssh/libcrux_mlkem768_sha3.h
3481
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *input,
usr.bin/ssh/libcrux_mlkem768_sha3.h
3498
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *blocks,
usr.bin/ssh/libcrux_mlkem768_sha3.h
3511
uint64_t *state, Eurydice_slice blocks, size_t start, size_t len) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
3537
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *input,
usr.bin/ssh/libcrux_mlkem768_sha3.h
3555
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *last,
usr.bin/ssh/libcrux_mlkem768_sha3.h
3567
uint64_t *s, Eurydice_slice out, size_t start, size_t len) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
3571
Eurydice_slice uu____0 = Eurydice_slice_subslice3(
usr.bin/ssh/libcrux_mlkem768_sha3.h
3583
Eurydice_slice uu____1 = Eurydice_slice_subslice3(
usr.bin/ssh/libcrux_mlkem768_sha3.h
3609
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice out,
usr.bin/ssh/libcrux_mlkem768_sha3.h
3621
Eurydice_slice data, Eurydice_slice out) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
3627
Eurydice_slice buf[1U] = {data};
usr.bin/ssh/libcrux_mlkem768_sha3.h
3631
Eurydice_slice buf[1U] = {data};
usr.bin/ssh/libcrux_mlkem768_sha3.h
3656
static KRML_MUSTINLINE void libcrux_sha3_portable_sha256(Eurydice_slice digest,
usr.bin/ssh/libcrux_mlkem768_sha3.h
3657
Eurydice_slice data) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
3668
uint64_t *state, Eurydice_slice blocks, size_t start, size_t len) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
3694
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *input,
usr.bin/ssh/libcrux_mlkem768_sha3.h
3712
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *last,
usr.bin/ssh/libcrux_mlkem768_sha3.h
3725
Eurydice_slice data, Eurydice_slice out) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
3731
Eurydice_slice buf[1U] = {data};
usr.bin/ssh/libcrux_mlkem768_sha3.h
3735
Eurydice_slice buf[1U] = {data};
usr.bin/ssh/libcrux_mlkem768_sha3.h
3761
Eurydice_slice digest, Eurydice_slice data) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
3782
uint64_t *state, Eurydice_slice blocks, size_t start) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
3793
Eurydice_slice, uint8_t[8U], TryFromSliceError);
usr.bin/ssh/libcrux_mlkem768_sha3.h
3814
uint64_t *state, Eurydice_slice blocks, size_t start, size_t len) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
3840
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *input,
usr.bin/ssh/libcrux_mlkem768_sha3.h
3858
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *last,
usr.bin/ssh/libcrux_mlkem768_sha3.h
3869
libcrux_sha3_generic_keccak_KeccakState_17 *s, Eurydice_slice data0) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
3871
Eurydice_slice uu____1[1U] = {data0};
usr.bin/ssh/libcrux_mlkem768_sha3.h
3882
uint64_t *s, Eurydice_slice out, size_t start, size_t len) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
3886
Eurydice_slice uu____0 = Eurydice_slice_subslice3(
usr.bin/ssh/libcrux_mlkem768_sha3.h
3898
Eurydice_slice uu____1 = Eurydice_slice_subslice3(
usr.bin/ssh/libcrux_mlkem768_sha3.h
3924
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice out,
usr.bin/ssh/libcrux_mlkem768_sha3.h
3943
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice out) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
3958
libcrux_sha3_generic_keccak_KeccakState_17 *s, Eurydice_slice out0) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
3976
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice out,
usr.bin/ssh/libcrux_mlkem768_sha3.h
3987
libcrux_sha3_generic_keccak_KeccakState_17 *s, Eurydice_slice out0) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4039
uint64_t *state, Eurydice_slice blocks, size_t start) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4050
Eurydice_slice, uint8_t[8U], TryFromSliceError);
usr.bin/ssh/libcrux_mlkem768_sha3.h
4076
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *input,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4093
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *blocks,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4106
uint64_t *state, Eurydice_slice blocks, size_t start, size_t len) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4132
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *input,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4150
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *last,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4162
uint64_t *s, Eurydice_slice out, size_t start, size_t len) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4166
Eurydice_slice uu____0 = Eurydice_slice_subslice3(
usr.bin/ssh/libcrux_mlkem768_sha3.h
4178
Eurydice_slice uu____1 = Eurydice_slice_subslice3(
usr.bin/ssh/libcrux_mlkem768_sha3.h
4204
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice out,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4216
Eurydice_slice data, Eurydice_slice out) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4222
Eurydice_slice buf[1U] = {data};
usr.bin/ssh/libcrux_mlkem768_sha3.h
4226
Eurydice_slice buf[1U] = {data};
usr.bin/ssh/libcrux_mlkem768_sha3.h
4251
static KRML_MUSTINLINE void libcrux_sha3_portable_sha224(Eurydice_slice digest,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4252
Eurydice_slice data) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4262
uint64_t *state, Eurydice_slice blocks, size_t start) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4273
Eurydice_slice, uint8_t[8U], TryFromSliceError);
usr.bin/ssh/libcrux_mlkem768_sha3.h
4299
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *input,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4316
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *blocks,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4329
uint64_t *state, Eurydice_slice blocks, size_t start, size_t len) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4355
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *input,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4373
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *last,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4385
uint64_t *s, Eurydice_slice out, size_t start, size_t len) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4389
Eurydice_slice uu____0 = Eurydice_slice_subslice3(
usr.bin/ssh/libcrux_mlkem768_sha3.h
4401
Eurydice_slice uu____1 = Eurydice_slice_subslice3(
usr.bin/ssh/libcrux_mlkem768_sha3.h
4427
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice out,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4439
Eurydice_slice data, Eurydice_slice out) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4445
Eurydice_slice buf[1U] = {data};
usr.bin/ssh/libcrux_mlkem768_sha3.h
4449
Eurydice_slice buf[1U] = {data};
usr.bin/ssh/libcrux_mlkem768_sha3.h
4474
static KRML_MUSTINLINE void libcrux_sha3_portable_sha384(Eurydice_slice digest,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4475
Eurydice_slice data) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4485
static inline void libcrux_sha3_sha224_ema(Eurydice_slice digest,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4486
Eurydice_slice payload) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4493
static inline void libcrux_sha3_sha224(Eurydice_slice data, uint8_t ret[28U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4503
static inline void libcrux_sha3_sha256_ema(Eurydice_slice digest,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4504
Eurydice_slice payload) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4511
static inline void libcrux_sha3_sha256(Eurydice_slice data, uint8_t ret[32U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4521
static inline void libcrux_sha3_sha384_ema(Eurydice_slice digest,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4522
Eurydice_slice payload) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4529
static inline void libcrux_sha3_sha384(Eurydice_slice data, uint8_t ret[48U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4539
static inline void libcrux_sha3_sha512_ema(Eurydice_slice digest,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4540
Eurydice_slice payload) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4547
static inline void libcrux_sha3_sha512(Eurydice_slice data, uint8_t ret[64U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4566
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *input,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4583
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice *blocks,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4596
Eurydice_slice data, Eurydice_slice out) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4602
Eurydice_slice buf[1U] = {data};
usr.bin/ssh/libcrux_mlkem768_sha3.h
4606
Eurydice_slice buf[1U] = {data};
usr.bin/ssh/libcrux_mlkem768_sha3.h
4632
Eurydice_slice digest, Eurydice_slice data) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4641
static inline void libcrux_sha3_shake128_ema(Eurydice_slice out,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4642
Eurydice_slice data) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4651
static inline void libcrux_sha3_shake256_ema(Eurydice_slice out,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4652
Eurydice_slice data) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4670
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice out) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4691
libcrux_sha3_generic_keccak_KeccakState_17 *s, Eurydice_slice out0) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4700
libcrux_sha3_generic_keccak_KeccakState_17 *s, Eurydice_slice data) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4702
Eurydice_slice uu____1[1U] = {data};
usr.bin/ssh/libcrux_mlkem768_sha3.h
4728
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice out) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4737
libcrux_sha3_generic_keccak_KeccakState_17 *s, Eurydice_slice out) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4754
libcrux_sha3_generic_keccak_KeccakState_17 *self, Eurydice_slice out,
usr.bin/ssh/libcrux_mlkem768_sha3.h
476
Eurydice_slice slice;
usr.bin/ssh/libcrux_mlkem768_sha3.h
4765
libcrux_sha3_generic_keccak_KeccakState_17 *s, Eurydice_slice out) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4801
Eurydice_slice *inputs) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4809
Eurydice_slice uu____0 = Eurydice_array_to_subslice_from(
usr.bin/ssh/libcrux_mlkem768_sha3.h
4838
Eurydice_slice *inputs) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
484
static inline Eurydice_slice chunk_next(Eurydice_chunks *chunks,
usr.bin/ssh/libcrux_mlkem768_sha3.h
4842
Eurydice_slice borrowed[1U];
usr.bin/ssh/libcrux_mlkem768_sha3.h
4846
uint8_t, Eurydice_slice);
usr.bin/ssh/libcrux_mlkem768_sha3.h
4885
Eurydice_slice *inputs) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
489
Eurydice_slice curr_chunk;
usr.bin/ssh/libcrux_mlkem768_sha3.h
4913
Eurydice_slice input) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4914
Eurydice_slice buf[1U] = {input};
usr.bin/ssh/libcrux_mlkem768_sha3.h
4933
Eurydice_slice *inputs) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4935
Eurydice_slice borrowed[1U];
usr.bin/ssh/libcrux_mlkem768_sha3.h
4939
Eurydice_slice);
usr.bin/ssh/libcrux_mlkem768_sha3.h
4960
Eurydice_slice input) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
4961
Eurydice_slice buf[1U] = {input};
usr.bin/ssh/libcrux_mlkem768_sha3.h
5036
Eurydice_slice out) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
5073
Eurydice_slice out) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
5108
Eurydice_slice *inputs) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
5116
Eurydice_slice uu____0 = Eurydice_array_to_subslice_from(
usr.bin/ssh/libcrux_mlkem768_sha3.h
5145
Eurydice_slice *inputs) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
5149
Eurydice_slice borrowed[1U];
usr.bin/ssh/libcrux_mlkem768_sha3.h
5153
uint8_t, Eurydice_slice);
usr.bin/ssh/libcrux_mlkem768_sha3.h
519
Eurydice_slice s;
usr.bin/ssh/libcrux_mlkem768_sha3.h
5192
Eurydice_slice *inputs) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
5217
Eurydice_slice input) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
5218
Eurydice_slice buf[1U] = {input};
usr.bin/ssh/libcrux_mlkem768_sha3.h
5237
Eurydice_slice *inputs) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
5239
Eurydice_slice borrowed[1U];
usr.bin/ssh/libcrux_mlkem768_sha3.h
5243
Eurydice_slice);
usr.bin/ssh/libcrux_mlkem768_sha3.h
5261
Eurydice_slice input) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
5262
Eurydice_slice buf[1U] = {input};
usr.bin/ssh/libcrux_mlkem768_sha3.h
5334
Eurydice_slice out) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
5371
Eurydice_slice out) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
5470
Eurydice_slice input, uint8_t ret[64U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
5478
Eurydice_slice input, uint8_t ret[32U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
5541
Eurydice_slice array) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
5547
Eurydice_slice, int16_t[16U], TryFromSliceError);
usr.bin/ssh/libcrux_mlkem768_sha3.h
5558
libcrux_ml_kem_vector_portable_from_i16_array_b8(Eurydice_slice array) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
6370
libcrux_ml_kem_vector_portable_serialize_deserialize_1(Eurydice_slice v) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
6425
libcrux_ml_kem_vector_portable_deserialize_1(Eurydice_slice a) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
6435
libcrux_ml_kem_vector_portable_deserialize_1_b8(Eurydice_slice a) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
6447
libcrux_ml_kem_vector_portable_serialize_serialize_4_int(Eurydice_slice v) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
6514
Eurydice_slice bytes) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
6554
libcrux_ml_kem_vector_portable_serialize_deserialize_4(Eurydice_slice bytes) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
6567
libcrux_ml_kem_vector_portable_deserialize_4(Eurydice_slice a) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
6577
libcrux_ml_kem_vector_portable_deserialize_4_b8(Eurydice_slice a) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
6590
libcrux_ml_kem_vector_portable_serialize_serialize_10_int(Eurydice_slice v) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
6679
Eurydice_slice bytes) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
6753
libcrux_ml_kem_vector_portable_serialize_deserialize_10(Eurydice_slice bytes) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
6767
libcrux_ml_kem_vector_portable_deserialize_10(Eurydice_slice a) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
6777
libcrux_ml_kem_vector_portable_deserialize_10_b8(Eurydice_slice a) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
6788
libcrux_ml_kem_vector_portable_serialize_serialize_12_int(Eurydice_slice v) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
6880
Eurydice_slice bytes) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
6893
libcrux_ml_kem_vector_portable_serialize_deserialize_12(Eurydice_slice bytes) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
6922
libcrux_ml_kem_vector_portable_deserialize_12(Eurydice_slice a) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
6932
libcrux_ml_kem_vector_portable_deserialize_12_b8(Eurydice_slice a) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
6937
libcrux_ml_kem_vector_portable_sampling_rej_sample(Eurydice_slice a,
usr.bin/ssh/libcrux_mlkem768_sha3.h
6938
Eurydice_slice result) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
6972
Eurydice_slice a, Eurydice_slice out) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
7113
Eurydice_slice serialized) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
7119
Eurydice_slice bytes =
usr.bin/ssh/libcrux_mlkem768_sha3.h
7139
Eurydice_slice secret_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
7225
Eurydice_slice serialized) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
7231
Eurydice_slice bytes =
usr.bin/ssh/libcrux_mlkem768_sha3.h
7252
Eurydice_slice serialized) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
7464
Eurydice_slice u_bytes = Eurydice_array_to_subslice3(
usr.bin/ssh/libcrux_mlkem768_sha3.h
7532
Eurydice_slice serialized) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
7538
Eurydice_slice bytes = Eurydice_slice_subslice3(
usr.bin/ssh/libcrux_mlkem768_sha3.h
7559
Eurydice_slice serialized) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
8021
Eurydice_slice secret_key, uint8_t *ciphertext, uint8_t ret[32U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
8051
Eurydice_slice input, uint8_t ret[64U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
8061
Eurydice_slice input, uint8_t ret[32U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
8079
Eurydice_slice input, uint8_t ret[32U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
8148
Eurydice_slice serialized) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
8154
Eurydice_slice bytes =
usr.bin/ssh/libcrux_mlkem768_sha3.h
8177
Eurydice_slice public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
8184
Eurydice_slice ring_element = Eurydice_slice_subslice3(
usr.bin/ssh/libcrux_mlkem768_sha3.h
8498
libcrux_ml_kem_polynomial_from_i16_array_ea(Eurydice_slice a) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
8526
libcrux_ml_kem_polynomial_from_i16_array_d6_ea(Eurydice_slice a) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
8650
Eurydice_slice public_key,
usr.bin/ssh/libcrux_mlkem768_sha3.h
8653
Eurydice_slice uu____0 = Eurydice_slice_subslice_to(
usr.bin/ssh/libcrux_mlkem768_sha3.h
8657
Eurydice_slice seed = Eurydice_slice_subslice_from(
usr.bin/ssh/libcrux_mlkem768_sha3.h
8677
Eurydice_slice public_key) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
8815
Eurydice_slice randomness) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
8820
Eurydice_slice byte_chunk = Eurydice_slice_subslice3(
usr.bin/ssh/libcrux_mlkem768_sha3.h
8861
Eurydice_slice randomness) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
9018
Eurydice_slice input, uint8_t ret[128U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
9036
Eurydice_slice input, uint8_t ret[128U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
9243
Eurydice_slice out) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
9253
Eurydice_slice uu____0 = Eurydice_slice_subslice3(
usr.bin/ssh/libcrux_mlkem768_sha3.h
9279
Eurydice_slice randomness,
usr.bin/ssh/libcrux_mlkem768_sha3.h
9281
Eurydice_slice ciphertext) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
9477
Eurydice_slice serialized) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
9504
libcrux_ml_kem_polynomial_PolynomialRingElement_1d re, Eurydice_slice out) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
9520
uint8_t *message, Eurydice_slice ciphertext) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
9591
uint8_t *message, Eurydice_slice randomness, uint8_t ret[1088U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
9633
Eurydice_slice public_key, uint8_t *message, Eurydice_slice randomness,
usr.bin/ssh/libcrux_mlkem768_sha3.h
9656
Eurydice_slice shared_secret, uint8_t *_, uint8_t ret[32U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
969
Eurydice_slice slice, uint8_t ret[32U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
9694
Eurydice_slice ind_cpa_secret_key = uu____0.fst;
usr.bin/ssh/libcrux_mlkem768_sha3.h
9695
Eurydice_slice ind_cpa_public_key = uu____0.snd;
usr.bin/ssh/libcrux_mlkem768_sha3.h
9696
Eurydice_slice ind_cpa_public_key_hash = uu____0.thd;
usr.bin/ssh/libcrux_mlkem768_sha3.h
9697
Eurydice_slice implicit_rejection_value = uu____0.f3;
usr.bin/ssh/libcrux_mlkem768_sha3.h
9716
Eurydice_slice shared_secret0 = uu____1.fst;
usr.bin/ssh/libcrux_mlkem768_sha3.h
9717
Eurydice_slice pseudorandomness = uu____1.snd;
usr.bin/ssh/libcrux_mlkem768_sha3.h
9720
Eurydice_slice uu____2 = Eurydice_array_to_subslice_from(
usr.bin/ssh/libcrux_mlkem768_sha3.h
9808
Eurydice_slice randomness, uint8_t ret[32U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
9825
Eurydice_slice input, uint8_t ret[32U]) {
usr.bin/ssh/libcrux_mlkem768_sha3.h
9856
Eurydice_slice uu____0 = Eurydice_array_to_subslice_from(
usr.bin/ssh/libcrux_mlkem768_sha3.h
9874
Eurydice_slice shared_secret = uu____1.fst;
usr.bin/ssh/libcrux_mlkem768_sha3.h
9875
Eurydice_slice pseudorandomness = uu____1.snd;
usr.bin/ssh/libcrux_mlkem768_sha3.h
9965
Eurydice_slice key_generation_seed, uint8_t ret[64U]) {