Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 7 of 7 for Lsh (0.03 sec)

  1. misc/cgo/gmp/pi.go

    func extractDigit() int64 {
    	if big.CmpInt(numer, accum) > 0 {
    		return -1
    	}
    	tmp1.Lsh(numer, 1).Add(tmp1, numer).Add(tmp1, accum)
    	big.DivModInt(tmp1, tmp2, tmp1, denom)
    	tmp2.Add(tmp2, numer)
    	if big.CmpInt(tmp2, denom) >= 0 {
    		return -1
    	}
    	return tmp1.Int64()
    }
    
    func nextTerm(k int64) {
    	y2 := k*2 + 1
    	accum.Add(accum, tmp1.Lsh(numer, 1))
    	accum.Mul(accum, tmp1.SetInt64(y2))
    	numer.Mul(numer, tmp1.SetInt64(k))
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Mon Apr 10 22:32:35 UTC 2023
    - 1.3K bytes
    - Viewed (0)
  2. src/cmd/asm/internal/lex/tokenizer.go

    			t.tok = ARR
    			return ARR
    		}
    	case '@':
    		if s.Peek() == '>' {
    			s.Next()
    			t.tok = ROT
    			return ROT
    		}
    	case '<':
    		if s.Peek() == '<' {
    			s.Next()
    			t.tok = LSH
    			return LSH
    		}
    	case '>':
    		if s.Peek() == '>' {
    			s.Next()
    			t.tok = RSH
    			return RSH
    		}
    	}
    	return t.tok
    }
    
    func (t *Tokenizer) Close() {
    	if t.file != nil {
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Thu Aug 04 20:35:21 UTC 2022
    - 3K bytes
    - Viewed (0)
  3. src/cmd/asm/internal/lex/lex.go

    // returned by text/scanner.Scanner, plus a couple of extra values.
    type ScanToken rune
    
    const (
    	// Asm defines some two-character lexemes. We make up
    	// a rune/ScanToken value for them - ugly but simple.
    	LSH          ScanToken = -1000 - iota // << Left shift.
    	RSH                                   // >> Logical right shift.
    	ARR                                   // -> Used on ARM for shift type 3, arithmetic right shift.
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Tue Aug 29 18:31:05 UTC 2023
    - 4.1K bytes
    - Viewed (0)
  4. misc/cgo/gmp/gmp.go

    func (z *Int) Mod(x, y *Int) *Int {
    	x.doinit()
    	y.doinit()
    	z.doinit()
    	C.mpz_tdiv_r(&z.i[0], &x.i[0], &y.i[0])
    	return z
    }
    
    // Lsh sets z = x << s and returns z.
    func (z *Int) Lsh(x *Int, s uint) *Int {
    	x.doinit()
    	z.doinit()
    	C._mpz_mul_2exp(&z.i[0], &x.i[0], C.ulong(s))
    	return z
    }
    
    // Rsh sets z = x >> s and returns z.
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Mon Apr 11 16:34:30 UTC 2022
    - 9.5K bytes
    - Viewed (0)
  5. src/cmd/asm/internal/asm/parse.go

    	ext := ""
    	if p.peek() == lex.LSH {
    		// (Rn)(Rm<<2), the shifted offset register.
    		ext = "LSL"
    	} else {
    		// (Rn)(Rm.UXTW<1), the extended offset register.
    		// Rm.UXTW<<3, the extended register.
    		p.get('.')
    		tok := p.next()
    		ext = tok.String()
    	}
    	if p.peek() == lex.LSH {
    		// parses left shift amount applied after extension: <<Amount
    		p.get(lex.LSH)
    		tok := p.get(scanner.Int)
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Wed Sep 04 18:16:59 UTC 2024
    - 36.9K bytes
    - Viewed (0)
  6. cmd/test-utils_test.go

    	if err != nil {
    		return nil, nil, fmt.Errorf("failed to generate private key: %w", err)
    	}
    
    	notBefore := time.Now()
    	notAfter := notBefore.Add(validFor)
    
    	serialNumberLimit := new(big.Int).Lsh(big.NewInt(1), 128)
    	serialNumber, err := crand.Int(crand.Reader, serialNumberLimit)
    	if err != nil {
    		return nil, nil, fmt.Errorf("failed to generate serial number: %w", err)
    	}
    
    	template := x509.Certificate{
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Oct 01 22:13:18 UTC 2024
    - 77K bytes
    - Viewed (0)
  7. RELEASE.md

    *   Fixes an undefined behavior arising from null pointer dereference in TFLite
        MLIR optimizations
        ([CVE-2021-37689](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37689))
    *   Fixes a FPE in LSH in TFLite
        ([CVE-2021-37691](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37691))
    *   Fixes a segfault on strings tensors with mismatched dimensions, arising in
        Go code
    Registered: Tue Nov 05 12:39:12 UTC 2024
    - Last Modified: Tue Oct 22 14:33:53 UTC 2024
    - 735.3K bytes
    - Viewed (0)
Back to top