- Sort Score
- Num 10 results
- Language All
Results 1 - 4 of 4 for tempo (0.06 seconds)
-
docs/en/docs/release-notes.md
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Apr 03 12:07:04 GMT 2026 - 631K bytes - Click Count (0) -
lib/fips140/v1.0.0-c2097c7c.zip
nil { panic(err) } c := &Counter{} c.c = *aes.NewCTR(cipher, V) c.update(entropy) c.reseedCounter = 1 return c } func (c *Counter) update(seed *[SeedSize]byte) { // CTR_DRBG_Update, per Section 10.2.1.2. temp := make([]byte, SeedSize) c.c.XORKeyStream(temp, seed[:]) K := temp[:keySize] V := temp[keySize:] // Again, we pre-increment V, like in NewCounter. increment((*[aes.BlockSize]byte)(V)) cipher, err := aes.New(K) if err != nil { panic(err) } c.c = *aes.NewCTR(cipher, V) } func increment(v *[aes.BlockSize]byte)...Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Thu Sep 25 19:53:19 GMT 2025 - 642.7K bytes - Click Count (0) -
lib/fips140/v1.26.0.zip
nil { panic(err) } c := &Counter{} c.c = *aes.NewCTR(cipher, V) c.update(entropy) c.reseedCounter = 1 return c } func (c *Counter) update(seed *[SeedSize]byte) { // CTR_DRBG_Update, per Section 10.2.1.2. temp := make([]byte, SeedSize) c.c.XORKeyStream(temp, seed[:]) K := temp[:keySize] V := temp[keySize:] // Again, we pre-increment V, like in NewCounter. increment((*[aes.BlockSize]byte)(V)) cipher, err := aes.New(K) if err != nil { panic(err) } c.c = *aes.NewCTR(cipher, V) } func increment(v *[aes.BlockSize]byte)...Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Thu Jan 08 17:58:32 GMT 2026 - 660.3K bytes - Click Count (0) -
RELEASE.md
large_constant]`) into 32-bit arithmetic in SASS. As a result, these versions of `ptxas` miscompile most XLA programs which use more than 4GB of temp memory. This results in garbage results and/or `CUDA_ERROR_ILLEGAL_ADDRESS` failures. A fix in CUDA 9.1.121 is expected in late February 2018. We do not expect aCreated: Tue Apr 07 12:39:13 GMT 2026 - Last Modified: Mon Mar 30 18:31:38 GMT 2026 - 746.5K bytes - Click Count (3)