Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for Lsh (0.16 sec)

  1. src/cmd/asm/internal/asm/parse.go

    	ext := ""
    	if p.peek() == lex.LSH {
    		// (Rn)(Rm<<2), the shifted offset register.
    		ext = "LSL"
    	} else {
    		// (Rn)(Rm.UXTW<1), the extended offset register.
    		// Rm.UXTW<<3, the extended register.
    		p.get('.')
    		tok := p.next()
    		ext = tok.String()
    	}
    	if p.peek() == lex.LSH {
    		// parses left shift amount applied after extension: <<Amount
    		p.get(lex.LSH)
    		tok := p.get(scanner.Int)
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Fri Feb 14 15:13:11 UTC 2025
    - 37.3K bytes
    - Viewed (0)
  2. cmd/test-utils_test.go

    	if err != nil {
    		return nil, nil, fmt.Errorf("failed to generate private key: %w", err)
    	}
    
    	notBefore := time.Now()
    	notAfter := notBefore.Add(validFor)
    
    	serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 128)
    	serialNumber, err := crand.Int(crand.Reader, serialNumberLimit)
    	if err != nil {
    		return nil, nil, fmt.Errorf("failed to generate serial number: %w", err)
    	}
    
    	template := x509.Certificate{
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 77K bytes
    - Viewed (0)
  3. RELEASE.md

    *   Fixes an undefined behavior arising from null pointer dereference in TFLite
        MLIR optimizations
        ([CVE-2021-37689](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37689))
    *   Fixes a FPE in LSH in TFLite
        ([CVE-2021-37691](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37691))
    *   Fixes a segfault on strings tensors with mismatched dimensions, arising in
        Go code
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Mon Aug 18 20:54:38 UTC 2025
    - 740K bytes
    - Viewed (2)
  4. lib/fips140/v1.0.0.zip

    := new(big.Int).SetBytes([]byte{0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x7e}) nb.Lsh(nb, 128) expected := 129 for expected >= 0 { n := NewNat().setBig(nb) if n.TrailingZeroBitsVarT() != uint(expected) { t.Errorf("%d != %d", n.TrailingZeroBitsVarT(), expected) } nb.Rsh(nb, 1) expected-- } } func TestRightShift(t *testing.T) { nb, err := cryptorand.Int(cryptorand.Reader, new(big.Int).Lsh(big.NewInt(1), 1024)) if err != nil { t.Fatal(err) } for _, shift := range []uint{1, 32, 64, 128,...
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Wed Jan 29 15:10:35 UTC 2025
    - 635K bytes
    - Viewed (0)
Back to top