PicnicEngine

Class files must be compiled with debug information to show line coverage.

Class files must be compiled with debug information to link with source files.

ElementMissed InstructionsCov.Missed BranchesCov.MissedCxtyMissedMethods
Total7,636 of 7,6360%448 of 4480%3113117676
verify_picnic3(Signature2, int[], int[], byte[])5880%360%191911
sign_picnic3(int[], int[], int[], byte[], Signature2)5560%200%111111
sign_picnic1(int[], int[], int[], byte[], Signature)5110%200%111111
PicnicEngine(int)4710%320%272711
deserializeSignature2(Signature2, byte[], int, int)4100%200%111111
verify(Signature, int[], int[], byte[])3110%80%5511
verifyProof(Signature.Proof, View, View, int, byte[], int, byte[], int[], Tape)2960%240%141411
deserializeSignature(Signature, byte[], int, int)2520%220%121211
serializeSignature2(Signature2, byte[], int)2520%140%8811
H3(int[], int[], int[][][], byte[][][], byte[], byte[], byte[], byte[][][])2220%300%161611
serializeSignature(Signature, byte[], int)2000%140%8811
mpc_substitution_verify(int[], Tape, View, View)1650%60%4411
prove(Signature.Proof, int, byte[], int, View[], byte[][], byte[][])1640%140%8811
mpc_LowMC(Tape, View[], int[], int[])1630%80%5511
mpc_substitution(int[], Tape, View[])1620%60%4411
mpc_LowMC_verify(View, View, Tape, int[], int[], int)1580%20%2211
picnic_sign(byte[], byte[], byte[])1580%100%6611
expandChallengeHash(byte[], int[], int[])1450%160%9911
mpc_AND(int[], int[], int[], Tape, View[])1060%20%2211
simulateOnline(int[], Tape, int[], Msg, int[], int[])1060%40%3311
matrix_mul_offset(int[], int, int[], int, int[], int)1050%60%4411
mpc_sbox(int[], int[], Tape, Msg)1040%20%2211
picnic_keygen(byte[], byte[], byte[], SecureRandom)1020%40%3311
LowMCEnc(int[], int[], int[])950%40%3311
computeSaltAndRootSeed(byte[], int[], int[], int[], byte[])870%n/a1111
picnic_verify(byte[], byte[], byte[], int)830%40%3311
mpc_AND_verify(int[], int[], int[], Tape, View, View)830%n/a1111
aux_mpc_sbox(int[], int[], Tape)790%20%2211
G(int, byte[], int, View, byte[])720%20%2211
HCP(byte[], int[], int[], byte[][], byte[], byte[], int[], int[], byte[])710%60%4411
computeSeeds(int[], int[], int[], byte[])690%n/a1111
createRandomTape(byte[], int, byte[], int, int, byte[], int)680%20%2211
Commit(byte[], int, View, byte[])650%n/a1111
substitution(int[])610%20%2211
createRandomTapes(Tape, byte[][], int, byte[], int)550%20%2211
mpc_AND(int, int, int, int, Tape, Msg)530%20%2211
picnic_write_private_key(byte[], byte[], byte[], byte[])530%20%2211
bitsToChunks(int, byte[], int, int[])480%60%4411
commit(byte[], byte[], byte[], byte[], int, int)450%20%2211
mpc_xor_constant_verify(int[], int[], int, int, int)440%60%4411
mpc_xor(int[], int[], int, int)440%40%3311
getAuxBits(byte[], Tape)440%40%3311
aux_mpc_AND(int, int, int, Tape)430%n/a1111
picnic_write_public_key(byte[], byte[], byte[])410%20%2211
commit_v(byte[], byte[], Msg)370%20%2211
crypto_sign_open(byte[], byte[], byte[])330%20%2211
getMissingLeavesList(int[])330%40%3311
appendUnique(int[], int, int)320%60%4411
wordToMsgs(int, Msg)310%20%2211
crypto_sign_keypair(byte[], byte[], SecureRandom)290%n/a1111
subarrayEquals(byte[], byte[], int)280%80%5511
subarrayEquals(int[], int[], int)280%80%5511
computeInputShareSize(byte[], int)270%60%4411
mpc_matrix_mul(int[], int, int[], int, int[], int, int)260%20%2211
commit_h(byte[], byte[][])260%20%2211
xor_three(int[], int[], int[], int[], int)250%20%2211
mpc_xor_constant(int[], int, int[], int, int)240%20%2211
setChallenge(byte[], int, int)230%n/a1111
arePaddingBitsZero(byte[], int)220%40%3311
isChallengeValid(byte[])200%40%3311
xor_array(int[], int[], int[], int, int)200%20%2211
picnic_read_public_key(byte[], byte[], byte[])190%n/a1111
crypto_sign(byte[], byte[], byte[])170%20%2211
zeroTrailingBits(byte[], int)170%20%2211
getChallenge(byte[], int)160%n/a1111
indexOf(int[], int, int)160%40%3311
contains(int[], int, int)160%40%3311
tapesToWords(int[], Tape)140%20%2211
is_picnic3(int)130%60%4411
matrix_mul(int[], int[], int[], int)90%n/a1111
extend(int)60%n/a1111
getSignatureSize(int)50%n/a1111
static {...}50%n/a1111
getSecretKeySize()0%n/a1111
getPublicKeySize()0%n/a1111
getTrueSignatureSize()0%n/a1111