const crypto/internal/fips140/mlkem.CiphertextSize768
14 uses
crypto/internal/fips140/mlkem (current package)
mlkem768.go#L59: CiphertextSize768 = k*encodingSize10 + encodingSize4
mlkem768.go#L342: var cc [CiphertextSize768]byte
mlkem768.go#L346: func (ek *EncapsulationKey768) encapsulate(cc *[CiphertextSize768]byte) (sharedKey, ciphertext []byte) {
mlkem768.go#L358: cc := &[CiphertextSize768]byte{}
mlkem768.go#L365: func kemEncaps(cc *[CiphertextSize768]byte, ek *EncapsulationKey768, m *[messageSize]byte) (K, c []byte) {
mlkem768.go#L419: func pkeEncrypt(cc *[CiphertextSize768]byte, ex *encryptionKey, m *[messageSize]byte, rnd []byte) []byte {
mlkem768.go#L463: if len(ciphertext) != CiphertextSize768 {
mlkem768.go#L466: c := (*[CiphertextSize768]byte)(ciphertext)
mlkem768.go#L476: func kemDecaps(dk *DecapsulationKey768, c *[CiphertextSize768]byte) (K []byte) {
mlkem768.go#L489: var cc [CiphertextSize768]byte
mlkem768.go#L500: func pkeDecrypt(dx *decryptionKey, c *[CiphertextSize768]byte) []byte {
crypto/tls
handshake_client_tls13.go#L479: if len(ecdhePeerData) != mlkem.CiphertextSize768+x25519PublicKeySize {
handshake_client_tls13.go#L483: ecdhePeerData = hs.serverHello.serverShare.data[mlkem.CiphertextSize768:]
handshake_client_tls13.go#L499: ciphertext := hs.serverHello.serverShare.data[:mlkem.CiphertextSize768]
The pages are generated with Golds v0.7.6. (GOOS=linux GOARCH=amd64)