repo
stringlengths
5
67
sha
stringlengths
40
40
path
stringlengths
4
234
url
stringlengths
85
339
language
stringclasses
6 values
split
stringclasses
3 values
doc
stringlengths
3
51.2k
sign
stringlengths
5
8.01k
problem
stringlengths
13
51.2k
output
stringlengths
0
3.87M
mijinc0/ed25519_keccak
7eb8e2ef1395f104429a7ad6285c33d401744900
lib/ed25519_keccak/ed25519base.rb
https://github.com/mijinc0/ed25519_keccak/blob/7eb8e2ef1395f104429a7ad6285c33d401744900/lib/ed25519_keccak/ed25519base.rb#L206-L219
ruby
test
# decompress point that is compressed into 32bytes
def point_decompress(s) # check argument
# decompress point that is compressed into 32bytes def point_decompress(s) # check argument
raise ArgumentError , "Invalid input length for decompression" unless s.length.equal? 32 y = int_form_bytes(s) sign = y >> 255 y &= (1 << 255) - 1 x = recover_x(y, sign) if x.nil? then return nil else return [x, y, 1, x*y % @@p] end end
mijinc0/ed25519_keccak
7eb8e2ef1395f104429a7ad6285c33d401744900
lib/ed25519_keccak/ed25519base.rb
https://github.com/mijinc0/ed25519_keccak/blob/7eb8e2ef1395f104429a7ad6285c33d401744900/lib/ed25519_keccak/ed25519base.rb#L229-L237
ruby
test
# region key manipulation # hash512(secret) # => HASH(512bit) # => [LH(256bit)] / [RH(256bit)] # => LH -> (set some bits) -> a # return ( a , RH )
def secret_expand(secret)
# region key manipulation # hash512(secret) # => HASH(512bit) # => [LH(256bit)] / [RH(256bit)] # => LH -> (set some bits) -> a # return ( a , RH ) def secret_expand(secret)
raise "Bad size of private key" unless secret.length.equal? 32 h = hash512(secret) a = int_form_bytes(h[0,32]) a &= (1 << 254) - 8 a |= (1 << 254) return [a, h[32,32]] end
mijinc0/ed25519_keccak
7eb8e2ef1395f104429a7ad6285c33d401744900
lib/ed25519_keccak/ed25519base.rb
https://github.com/mijinc0/ed25519_keccak/blob/7eb8e2ef1395f104429a7ad6285c33d401744900/lib/ed25519_keccak/ed25519base.rb#L244-L253
ruby
test
# region sign and verify # [ signature format ] # | compressed data of _R | s | <- concatnate
def p_sign(secret, message)
# region sign and verify # [ signature format ] # | compressed data of _R | s | <- concatnate def p_sign(secret, message)
a, prefix = secret_expand(secret) _A = point_compress(point_mul(a, @@G)) r = hash512_modq(prefix + message) _R = point_mul(r, @@G) _Rs = point_compress(_R) h = hash512_modq(_Rs + _A + message) s = (r + h * a) % @@q return _Rs + int_to_bytes(s,32) end
mijinc0/ed25519_keccak
7eb8e2ef1395f104429a7ad6285c33d401744900
lib/ed25519_keccak/ed25519base.rb
https://github.com/mijinc0/ed25519_keccak/blob/7eb8e2ef1395f104429a7ad6285c33d401744900/lib/ed25519_keccak/ed25519base.rb#L278-L282
ruby
test
# public_keyKey = aG # "a" is generated form a secret
def p_secret_to_public(secret)
# public_keyKey = aG # "a" is generated form a secret def p_secret_to_public(secret)
expanded = secret_expand(secret) a = expanded.first return point_compress(point_mul(a, @@G)) end
mjacobus/semistatic
ea750ef2b91028226f4da67b0d74738fbf311dd1
app/models/semistatic/page.rb
https://github.com/mjacobus/semistatic/blob/ea750ef2b91028226f4da67b0d74738fbf311dd1/app/models/semistatic/page.rb#L14-L16
ruby
test
# get part by its name # param # @return Part
def part(name)
# get part by its name # param # @return Part def part(name)
parts.select {|p| p.name.downcase == name.to_s.downcase }.first end