const crypto/internal/fips140/mlkem.CiphertextSize768
14 uses
crypto/internal/fips140/mlkem (current package)
mlkem768.go#L59: CiphertextSize768 = k*encodingSize10 + encodingSize4
mlkem768.go#L335: var cc [CiphertextSize768]byte
mlkem768.go#L339: func (ek *EncapsulationKey768) encapsulate(cc *[CiphertextSize768]byte) (sharedKey, ciphertext []byte) {
mlkem768.go#L351: cc := &[CiphertextSize768]byte{}
mlkem768.go#L358: func kemEncaps(cc *[CiphertextSize768]byte, ek *EncapsulationKey768, m *[messageSize]byte) (K, c []byte) {
mlkem768.go#L412: func pkeEncrypt(cc *[CiphertextSize768]byte, ex *encryptionKey, m *[messageSize]byte, rnd []byte) []byte {
mlkem768.go#L456: if len(ciphertext) != CiphertextSize768 {
mlkem768.go#L459: c := (*[CiphertextSize768]byte)(ciphertext)
mlkem768.go#L469: func kemDecaps(dk *DecapsulationKey768, c *[CiphertextSize768]byte) (K []byte) {
mlkem768.go#L482: var cc [CiphertextSize768]byte
mlkem768.go#L493: func pkeDecrypt(dx *decryptionKey, c *[CiphertextSize768]byte) []byte {
crypto/tls
handshake_client_tls13.go#L480: if len(ecdhePeerData) != mlkem.CiphertextSize768+x25519PublicKeySize {
handshake_client_tls13.go#L484: ecdhePeerData = hs.serverHello.serverShare.data[mlkem.CiphertextSize768:]
handshake_client_tls13.go#L500: ciphertext := hs.serverHello.serverShare.data[:mlkem.CiphertextSize768]
The pages are generated with Golds v0.7.6. (GOOS=linux GOARCH=amd64)