Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 11 for PSHUFB (0.15 sec)

  1. src/crypto/aes/gcm_amd64.s

    		MOVOU (16*4)(aut), X4
    		MOVOU (16*5)(aut), X5
    		MOVOU (16*6)(aut), X6
    		MOVOU (16*7)(aut), X7
    		LEAQ (16*8)(aut), aut
    		PSHUFB BSWAP, X0
    		PSHUFB BSWAP, X1
    		PSHUFB BSWAP, X2
    		PSHUFB BSWAP, X3
    		PSHUFB BSWAP, X4
    		PSHUFB BSWAP, X5
    		PSHUFB BSWAP, X6
    		PSHUFB BSWAP, X7
    		PXOR ACC0, X0
    
    		MOVOU (16*0)(pTbl), ACC0
    		MOVOU (16*1)(pTbl), ACCM
    		MOVOU ACC0, ACC1
    		PSHUFD $78, X0, T1
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 04 17:29:44 UTC 2024
    - 23.4K bytes
    - Viewed (0)
  2. src/internal/chacha8rand/chacha8_amd64.s

    // ROL16 rotates the uint32s in register R left by 16, using temporary T if needed.
    #ifdef GOAMD64_v2
    #define ROL16(R, T) PSHUFB ·rol16<>(SB), R
    #else
    #define ROL16(R, T) ROL(16, R, T)
    #endif
    
    // ROL8 rotates the uint32s in register R left by 8, using temporary T if needed.
    #ifdef GOAMD64_v2
    #define ROL8(R, T) PSHUFB ·rol8<>(SB), R
    #else
    #define ROL8(R, T) ROL(8, R, T)
    #endif
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Dec 05 20:34:30 UTC 2023
    - 4.6K bytes
    - Viewed (0)
  3. src/hash/crc32/crc32_amd64.s

    	MOVL AX, retA+96(FP)
    	MOVL CX, retB+100(FP)
    	MOVL DX, retC+104(FP)
    	RET
    
    // CRC32 polynomial data
    //
    // These constants are lifted from the
    // Linux kernel, since they avoid the costly
    // PSHUFB 16 byte reversal proposed in the
    // original Intel paper.
    DATA r2r1<>+0(SB)/8, $0x154442bd4
    DATA r2r1<>+8(SB)/8, $0x1c6e41596
    DATA r4r3<>+0(SB)/8, $0x1751997d0
    DATA r4r3<>+8(SB)/8, $0x0ccaa009e
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Jun 01 21:52:00 UTC 2018
    - 5.4K bytes
    - Viewed (0)
  4. src/cmd/internal/obj/x86/anames.go

    	"POPCNTQ",
    	"POPCNTW",
    	"POPFL",
    	"POPFQ",
    	"POPFW",
    	"POPL",
    	"POPQ",
    	"POPW",
    	"POR",
    	"PREFETCHNTA",
    	"PREFETCHT0",
    	"PREFETCHT1",
    	"PREFETCHT2",
    	"PSADBW",
    	"PSHUFB",
    	"PSHUFD",
    	"PSHUFHW",
    	"PSHUFL",
    	"PSHUFLW",
    	"PSHUFW",
    	"PSIGNB",
    	"PSIGND",
    	"PSIGNW",
    	"PSLLL",
    	"PSLLO",
    	"PSLLQ",
    	"PSLLW",
    	"PSRAL",
    	"PSRAW",
    	"PSRLL",
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Apr 11 18:32:50 UTC 2023
    - 19.1K bytes
    - Viewed (0)
  5. src/runtime/asm_386.s

    	MOVL	X1, (DX)
    	RET
    
    endofpage:
    	// address ends in 1111xxxx. Might be up against
    	// a page boundary, so load ending at last byte.
    	// Then shift bytes down using pshufb.
    	MOVOU	-32(AX)(BX*1), X1
    	ADDL	BX, BX
    	PSHUFB	shifts<>(SB)(BX*8), X1
    	JMP	final1
    
    aes0:
    	// Return scrambled input seed
    	AESENC	X0, X0
    	MOVL	X0, (DX)
    	RET
    
    aes16:
    	MOVOU	(AX), X1
    	JMP	final1
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Mar 15 15:45:13 UTC 2024
    - 43.1K bytes
    - Viewed (0)
  6. src/runtime/alg.go

    var hashkey [4]uintptr
    
    func alginit() {
    	// Install AES hash algorithms if the instructions needed are present.
    	if (GOARCH == "386" || GOARCH == "amd64") &&
    		cpu.X86.HasAES && // AESENC
    		cpu.X86.HasSSSE3 && // PSHUFB
    		cpu.X86.HasSSE41 { // PINSR{D,Q}
    		initAlgAES()
    		return
    	}
    	if GOARCH == "arm64" && cpu.ARM64.HasAES {
    		initAlgAES()
    		return
    	}
    	for i := range hashkey {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 29 17:58:53 UTC 2024
    - 13.6K bytes
    - Viewed (0)
  7. src/crypto/sha256/sha256block_amd64.s

    // which is replaced with a nop for rounds where it is not needed
    // refer to Gulley, et al for more information
    #define rounds0to11(m,a,c,sha256Msg1)				\
    	VMOVDQU			c*16(dataPtr), msg		\
    	PSHUFB			shufMask, msg			\
    	VMOVDQA			msg, m				\
    	PADDD			(c*32)(sha256Constants), msg	\
    	SHA256RNDS2		msg, state0, state1		\
    	PSHUFD			$0x0e, msg, msg			\
    	SHA256RNDS2		msg, state1, state0		\
    	sha256Msg1		(m,a)
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 04 17:29:44 UTC 2024
    - 47.3K bytes
    - Viewed (0)
  8. src/cmd/asm/internal/asm/testdata/amd64enc.s

    	PSHUFB (BX), X2                         // 660f380013
    	PSHUFB (R11), X2                        // 66410f380013
    	PSHUFB X2, X2                           // 660f3800d2
    	PSHUFB X11, X2                          // 66410f3800d3
    	PSHUFB (BX), X11                        // 66440f38001b
    	PSHUFB (R11), X11                       // 66450f38001b
    	PSHUFB X2, X11                          // 66440f3800da
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Oct 08 21:38:44 UTC 2021
    - 581.9K bytes
    - Viewed (0)
  9. src/runtime/asm_amd64.s

    	RET
    
    endofpage:
    	// address ends in 1111xxxx. Might be up against
    	// a page boundary, so load ending at last byte.
    	// Then shift bytes down using pshufb.
    	MOVOU	-32(AX)(CX*1), X1
    	ADDQ	CX, CX
    	MOVQ	$shifts<>(SB), AX
    	PSHUFB	(AX)(CX*8), X1
    	JMP	final1
    
    aes0:
    	// Return scrambled input seed
    	AESENC	X0, X0
    	MOVQ	X0, AX	// return X0
    	RET
    
    aes16:
    	MOVOU	(AX), X1
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Sat May 11 20:38:24 UTC 2024
    - 60.4K bytes
    - Viewed (0)
  10. src/vendor/golang.org/x/crypto/chacha20poly1305/chacha20poly1305_amd64.s

    DATA ·chacha20Constants<>+0x18(SB)/4, $0x79622d32
    DATA ·chacha20Constants<>+0x1c(SB)/4, $0x6b206574
    // <<< 16 with PSHUFB
    DATA ·rol16<>+0x00(SB)/8, $0x0504070601000302
    DATA ·rol16<>+0x08(SB)/8, $0x0D0C0F0E09080B0A
    DATA ·rol16<>+0x10(SB)/8, $0x0504070601000302
    DATA ·rol16<>+0x18(SB)/8, $0x0D0C0F0E09080B0A
    // <<< 8 with PSHUFB
    DATA ·rol8<>+0x00(SB)/8, $0x0605040702010003
    DATA ·rol8<>+0x08(SB)/8, $0x0E0D0C0F0A09080B
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed Nov 29 21:28:33 UTC 2023
    - 105.6K bytes
    - Viewed (0)
Back to top