- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 11 for PSHUFB (0.15 sec)
-
src/crypto/aes/gcm_amd64.s
MOVOU (16*4)(aut), X4 MOVOU (16*5)(aut), X5 MOVOU (16*6)(aut), X6 MOVOU (16*7)(aut), X7 LEAQ (16*8)(aut), aut PSHUFB BSWAP, X0 PSHUFB BSWAP, X1 PSHUFB BSWAP, X2 PSHUFB BSWAP, X3 PSHUFB BSWAP, X4 PSHUFB BSWAP, X5 PSHUFB BSWAP, X6 PSHUFB BSWAP, X7 PXOR ACC0, X0 MOVOU (16*0)(pTbl), ACC0 MOVOU (16*1)(pTbl), ACCM MOVOU ACC0, ACC1 PSHUFD $78, X0, T1
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 23.4K bytes - Viewed (0) -
src/internal/chacha8rand/chacha8_amd64.s
// ROL16 rotates the uint32s in register R left by 16, using temporary T if needed. #ifdef GOAMD64_v2 #define ROL16(R, T) PSHUFB ·rol16<>(SB), R #else #define ROL16(R, T) ROL(16, R, T) #endif // ROL8 rotates the uint32s in register R left by 8, using temporary T if needed. #ifdef GOAMD64_v2 #define ROL8(R, T) PSHUFB ·rol8<>(SB), R #else #define ROL8(R, T) ROL(8, R, T) #endif
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Dec 05 20:34:30 UTC 2023 - 4.6K bytes - Viewed (0) -
src/hash/crc32/crc32_amd64.s
MOVL AX, retA+96(FP) MOVL CX, retB+100(FP) MOVL DX, retC+104(FP) RET // CRC32 polynomial data // // These constants are lifted from the // Linux kernel, since they avoid the costly // PSHUFB 16 byte reversal proposed in the // original Intel paper. DATA r2r1<>+0(SB)/8, $0x154442bd4 DATA r2r1<>+8(SB)/8, $0x1c6e41596 DATA r4r3<>+0(SB)/8, $0x1751997d0 DATA r4r3<>+8(SB)/8, $0x0ccaa009e
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Jun 01 21:52:00 UTC 2018 - 5.4K bytes - Viewed (0) -
src/cmd/internal/obj/x86/anames.go
"POPCNTQ", "POPCNTW", "POPFL", "POPFQ", "POPFW", "POPL", "POPQ", "POPW", "POR", "PREFETCHNTA", "PREFETCHT0", "PREFETCHT1", "PREFETCHT2", "PSADBW", "PSHUFB", "PSHUFD", "PSHUFHW", "PSHUFL", "PSHUFLW", "PSHUFW", "PSIGNB", "PSIGND", "PSIGNW", "PSLLL", "PSLLO", "PSLLQ", "PSLLW", "PSRAL", "PSRAW", "PSRLL",
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Apr 11 18:32:50 UTC 2023 - 19.1K bytes - Viewed (0) -
src/runtime/asm_386.s
MOVL X1, (DX) RET endofpage: // address ends in 1111xxxx. Might be up against // a page boundary, so load ending at last byte. // Then shift bytes down using pshufb. MOVOU -32(AX)(BX*1), X1 ADDL BX, BX PSHUFB shifts<>(SB)(BX*8), X1 JMP final1 aes0: // Return scrambled input seed AESENC X0, X0 MOVL X0, (DX) RET aes16: MOVOU (AX), X1 JMP final1
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Mar 15 15:45:13 UTC 2024 - 43.1K bytes - Viewed (0) -
src/runtime/alg.go
var hashkey [4]uintptr func alginit() { // Install AES hash algorithms if the instructions needed are present. if (GOARCH == "386" || GOARCH == "amd64") && cpu.X86.HasAES && // AESENC cpu.X86.HasSSSE3 && // PSHUFB cpu.X86.HasSSE41 { // PINSR{D,Q} initAlgAES() return } if GOARCH == "arm64" && cpu.ARM64.HasAES { initAlgAES() return } for i := range hashkey {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 29 17:58:53 UTC 2024 - 13.6K bytes - Viewed (0) -
src/crypto/sha256/sha256block_amd64.s
// which is replaced with a nop for rounds where it is not needed // refer to Gulley, et al for more information #define rounds0to11(m,a,c,sha256Msg1) \ VMOVDQU c*16(dataPtr), msg \ PSHUFB shufMask, msg \ VMOVDQA msg, m \ PADDD (c*32)(sha256Constants), msg \ SHA256RNDS2 msg, state0, state1 \ PSHUFD $0x0e, msg, msg \ SHA256RNDS2 msg, state1, state0 \ sha256Msg1 (m,a)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 47.3K bytes - Viewed (0) -
src/cmd/asm/internal/asm/testdata/amd64enc.s
PSHUFB (BX), X2 // 660f380013 PSHUFB (R11), X2 // 66410f380013 PSHUFB X2, X2 // 660f3800d2 PSHUFB X11, X2 // 66410f3800d3 PSHUFB (BX), X11 // 66440f38001b PSHUFB (R11), X11 // 66450f38001b PSHUFB X2, X11 // 66440f3800da
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Oct 08 21:38:44 UTC 2021 - 581.9K bytes - Viewed (0) -
src/runtime/asm_amd64.s
RET endofpage: // address ends in 1111xxxx. Might be up against // a page boundary, so load ending at last byte. // Then shift bytes down using pshufb. MOVOU -32(AX)(CX*1), X1 ADDQ CX, CX MOVQ $shifts<>(SB), AX PSHUFB (AX)(CX*8), X1 JMP final1 aes0: // Return scrambled input seed AESENC X0, X0 MOVQ X0, AX // return X0 RET aes16: MOVOU (AX), X1
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Sat May 11 20:38:24 UTC 2024 - 60.4K bytes - Viewed (0) -
src/vendor/golang.org/x/crypto/chacha20poly1305/chacha20poly1305_amd64.s
DATA ·chacha20Constants<>+0x18(SB)/4, $0x79622d32 DATA ·chacha20Constants<>+0x1c(SB)/4, $0x6b206574 // <<< 16 with PSHUFB DATA ·rol16<>+0x00(SB)/8, $0x0504070601000302 DATA ·rol16<>+0x08(SB)/8, $0x0D0C0F0E09080B0A DATA ·rol16<>+0x10(SB)/8, $0x0504070601000302 DATA ·rol16<>+0x18(SB)/8, $0x0D0C0F0E09080B0A // <<< 8 with PSHUFB DATA ·rol8<>+0x00(SB)/8, $0x0605040702010003 DATA ·rol8<>+0x08(SB)/8, $0x0E0D0C0F0A09080B
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed Nov 29 21:28:33 UTC 2023 - 105.6K bytes - Viewed (0)