Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for sbox1 (0.04 sec)

  1. src/crypto/aes/block.go

    	s0 = uint32(sbox1[t0>>24])<<24 | uint32(sbox1[t3>>16&0xff])<<16 | uint32(sbox1[t2>>8&0xff])<<8 | uint32(sbox1[t1&0xff])
    	s1 = uint32(sbox1[t1>>24])<<24 | uint32(sbox1[t0>>16&0xff])<<16 | uint32(sbox1[t3>>8&0xff])<<8 | uint32(sbox1[t2&0xff])
    	s2 = uint32(sbox1[t2>>24])<<24 | uint32(sbox1[t1>>16&0xff])<<16 | uint32(sbox1[t0>>8&0xff])<<8 | uint32(sbox1[t3&0xff])
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 13 18:57:38 UTC 2024
    - 6.4K bytes
    - Viewed (0)
  2. test/escape_param.go

    	leakParam(box.pair)
    }
    
    func selfAssignmentAndUnrelated(box1, box2 *BoxedPair) { // ERROR "leaking param content: box2" "box1 does not escape"
    	box1.pair.p1 = box1.pair.p2 // ERROR "ignoring self-assignment in box1.pair.p1 = box1.pair.p2"
    	leakParam(box2.pair.p2)
    }
    
    func notSelfAssignment1(box1, box2 *BoxedPair) { // ERROR "leaking param content: box2" "box1 does not escape"
    	box1.pair.p1 = box2.pair.p1
    }
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 26 23:50:32 UTC 2021
    - 8.9K bytes
    - Viewed (0)
  3. test/codegen/bitfield.go

    }
    
    func sbfiz8(x int32) int64 {
    	return int64(x+1) << 40 // arm64:"SBFIZ\t[$]40, R[0-9]+, [$]24",-"LSL"
    }
    
    // sbfx
    // merge shifts into sbfx: (x << lc) >> rc && lc <= rc.
    func sbfx1(x int64) int64 {
    	return (x << 3) >> 4 // arm64:"SBFX\t[$]1, R[0-9]+, [$]60",-"LSL",-"ASR"
    }
    
    func sbfx2(x int64) int64 {
    	return (x << 60) >> 60 // arm64:"SBFX\t[$]0, R[0-9]+, [$]4",-"LSL",-"ASR"
    }
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Aug 23 06:11:32 UTC 2022
    - 9.6K bytes
    - Viewed (0)
  4. src/crypto/aes/asm_arm64.s

    	STPW.P	(R4, R5), 8(R10)
    	STPW.P	(R6, R7), 8(R10)
    	MOVW	$0x1b, R14
    ks128Loop:
    		VMOV	R7, V2.S[0]
    		WORD	$0x4E030042       // TBL V3.B16, [V2.B16], V2.B16
    		AESE	V0.B16, V2.B16    // Use AES to compute the SBOX
    		EORW	R13, R4
    		LSLW	$1, R13           // Compute next Rcon
    		ANDSW	$0x100, R13, ZR
    		CSELW	NE, R14, R13, R13 // Fake modulo
    		SUBS	$1, R8
    		VMOV	V2.S[0], R0
    		EORW	R0, R4
    		EORW	R4, R5
    		EORW	R5, R6
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 04 17:29:44 UTC 2024
    - 6.9K bytes
    - Viewed (0)
Back to top