- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 490 for rounds (0.09 sec)
-
src/crypto/sha1/sha1block_arm.s
loop2: ROUND2(Ra, Rb, Rc, Rd, Re) ROUND2(Re, Ra, Rb, Rc, Rd) ROUND2(Rd, Re, Ra, Rb, Rc) ROUND2(Rc, Rd, Re, Ra, Rb) ROUND2(Rb, Rc, Rd, Re, Ra) SUB.S $1, Rctr BNE loop2 MOVW $0x8F1BBCDC, Rconst MOVW $4, Rctr loop3: ROUND3(Ra, Rb, Rc, Rd, Re) ROUND3(Re, Ra, Rb, Rc, Rd) ROUND3(Rd, Re, Ra, Rb, Rc) ROUND3(Rc, Rd, Re, Ra, Rb) ROUND3(Rb, Rc, Rd, Re, Ra) SUB.S $1, Rctr BNE loop3
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 5.6K bytes - Viewed (0) -
src/crypto/sha1/sha1block_386.s
ROUND2(BX, CX, DX, BP, AX, 39) ROUND3(AX, BX, CX, DX, BP, 40) ROUND3(BP, AX, BX, CX, DX, 41) ROUND3(DX, BP, AX, BX, CX, 42) ROUND3(CX, DX, BP, AX, BX, 43) ROUND3(BX, CX, DX, BP, AX, 44) ROUND3(AX, BX, CX, DX, BP, 45) ROUND3(BP, AX, BX, CX, DX, 46) ROUND3(DX, BP, AX, BX, CX, 47) ROUND3(CX, DX, BP, AX, BX, 48) ROUND3(BX, CX, DX, BP, AX, 49) ROUND3(AX, BX, CX, DX, BP, 50) ROUND3(BP, AX, BX, CX, DX, 51)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/storage/feature/feature_support_checker_test.go
expectedResult bool expectedError error } tests := []struct { testName string rounds []testCase }{ { testName: "Disabled - default disabled", rounds: []testCase{{expectedResult: false}}, }, { testName: "Enabled - supported versions bound", rounds: []testCase{ {endpointsVersion: []mockEndpointVersion{ {Version: "3.4.31", Endpoint: "localhost:2390"}},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri May 10 11:56:42 UTC 2024 - 8.3K bytes - Viewed (0) -
src/crypto/aes/cipher_asm.go
c := aesCipherGCM{aesCipherAsm{aesCipher{l: uint8(len(key) + 28)}}} var rounds int switch len(key) { case 128 / 8: rounds = 10 case 192 / 8: rounds = 12 case 256 / 8: rounds = 14 default: return nil, KeySizeError(len(key)) } expandKeyAsm(rounds, &key[0], &c.enc[0], &c.dec[0]) if supportsAES && supportsGFMUL { return &c, nil }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 25 14:58:19 UTC 2024 - 3K bytes - Viewed (0) -
src/crypto/sha1/sha1block_amd64.s
ROUND2(BX, CX, DX, BP, AX, 39) ROUND3(AX, BX, CX, DX, BP, 40) ROUND3(BP, AX, BX, CX, DX, 41) ROUND3(DX, BP, AX, BX, CX, 42) ROUND3(CX, DX, BP, AX, BX, 43) ROUND3(BX, CX, DX, BP, AX, 44) ROUND3(AX, BX, CX, DX, BP, 45) ROUND3(BP, AX, BX, CX, DX, 46) ROUND3(DX, BP, AX, BX, CX, 47) ROUND3(CX, DX, BP, AX, BX, 48) ROUND3(BX, CX, DX, BP, AX, 49) ROUND3(AX, BX, CX, DX, BP, 50) ROUND3(BP, AX, BX, CX, DX, 51)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 31.5K bytes - Viewed (0) -
src/crypto/aes/block.go
_ = src[15] // early bounds check s0 := byteorder.BeUint32(src[0:4]) s1 := byteorder.BeUint32(src[4:8]) s2 := byteorder.BeUint32(src[8:12]) s3 := byteorder.BeUint32(src[12:16]) // First round just XORs input with key. s0 ^= xk[0] s1 ^= xk[1] s2 ^= xk[2] s3 ^= xk[3] // Middle rounds shuffle using tables. // Number of rounds is set by length of expanded key.
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon May 13 18:57:38 UTC 2024 - 6.4K bytes - Viewed (0) -
src/crypto/aes/asm_ppc64x.s
MOVD key+24(FP), KEYP MOVD iv+32(FP), IVP MOVD enc+40(FP), ENC MOVD nr+48(FP), ROUNDS #ifdef NEEDS_ESPERM MOVD $·rcon(SB), R11 LVX (R11), ESPERM // Permute value for P8_ macros. #endif // Assume len > 0 && len % blockSize == 0. CMPW ENC, $0 P8_LXVB16X(IVP, R0, IVEC) CMPU ROUNDS, $10, CR1 CMPU ROUNDS, $12, CR2 // Only sizes 10/12/14 are supported.
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon May 20 18:05:32 UTC 2024 - 18.6K bytes - Viewed (0) -
src/strconv/ctoa.go
// license that can be found in the LICENSE file. package strconv // FormatComplex converts the complex number c to a string of the // form (a+bi) where a and b are the real and imaginary parts, // formatted according to the format fmt and precision prec. // // The format fmt and precision prec have the same meaning as in [FormatFloat]. // It rounds the result assuming that the original was obtained from a complex
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu Apr 04 14:21:28 UTC 2024 - 1K bytes - Viewed (0) -
src/crypto/sha256/sha256block_amd64.s
#define nop(m,a) // nop instead of final SHA256MSG1 for first and last few rounds #define sha256msg1(m,a) \ // final SHA256MSG1 for middle rounds that require it SHA256MSG1 m, a #define vmov(a,b) \ // msg copy for all but rounds 12-15 VMOVDQA a, b #define vmovrev(a,b) \ // reverse copy for rounds 12-15 VMOVDQA b, a // sha rounds 0 to 11 // identical with the exception of the final msg op
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 47.3K bytes - Viewed (0) -
src/internal/chacha8rand/chacha8_generic.go
b9 := b[9][i] b10 := b[10][i] b11 := b[11][i] b12 := b[12][i] b13 := b[13][i] b14 := b[14][i] b15 := b[15][i] // 4 iterations of eight quarter-rounds each is 8 rounds for round := 0; round < 4; round++ { b0, b4, b8, b12 = qr(b0, b4, b8, b12) b1, b5, b9, b13 = qr(b1, b5, b9, b13) b2, b6, b10, b14 = qr(b2, b6, b10, b14) b3, b7, b11, b15 = qr(b3, b7, b11, b15)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Dec 05 20:32:54 UTC 2023 - 6.3K bytes - Viewed (0)