- Sort Score
- Result 10 results
- Languages All
Results 61 - 70 of 202 for Implementation (0.15 sec)
-
src/crypto/internal/mlkem768/mlkem768_test.go
return dk.EncapsulationKey(), dk } var millionFlag = flag.Bool("million", false, "run the million vector test") // TestPQCrystalsAccumulated accumulates the 10k vectors generated by the // reference implementation and checks the hash of the result, to avoid checking // in 150MB of test vectors. func TestPQCrystalsAccumulated(t *testing.T) { n := 10000 expected := "f7db260e1137a742e05fe0db9525012812b004d29040a5b606aad3d134b548d3"
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon May 06 15:27:18 UTC 2024 - 10.3K bytes - Viewed (0) -
src/crypto/internal/edwards25519/field/fe.go
// Add sets v = a + b, and returns v. func (v *Element) Add(a, b *Element) *Element { v.l0 = a.l0 + b.l0 v.l1 = a.l1 + b.l1 v.l2 = a.l2 + b.l2 v.l3 = a.l3 + b.l3 v.l4 = a.l4 + b.l4 // Using the generic implementation here is actually faster than the // assembly. Probably because the body of this function is so simple that // the compiler can figure out better optimizations by inlining the carry // propagation.
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon May 13 18:57:38 UTC 2024 - 11.8K bytes - Viewed (0) -
src/runtime/hash_test.go
"math" "math/rand" "os" . "runtime" "slices" "strings" "testing" "unsafe" ) func TestMemHash32Equality(t *testing.T) { if *UseAeshash { t.Skip("skipping since AES hash implementation is used") } var b [4]byte r := rand.New(rand.NewSource(1234)) seed := uintptr(r.Uint64()) for i := 0; i < 100; i++ { randBytes(r, b[:]) got := MemHash32(unsafe.Pointer(&b), seed)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon May 06 17:50:18 UTC 2024 - 18.4K bytes - Viewed (0) -
src/encoding/binary/binary.go
AppendUint32([]byte, uint32) []byte AppendUint64([]byte, uint64) []byte String() string } // LittleEndian is the little-endian implementation of [ByteOrder] and [AppendByteOrder]. var LittleEndian littleEndian // BigEndian is the big-endian implementation of [ByteOrder] and [AppendByteOrder]. var BigEndian bigEndian type littleEndian struct{} func (littleEndian) Uint16(b []byte) uint16 {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 17:29:31 UTC 2024 - 23.4K bytes - Viewed (0) -
src/net/net_fake.go
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Feb 27 19:24:21 UTC 2024 - 26.4K bytes - Viewed (0) -
src/crypto/aes/gcm_ppc64x.s
#define P8_STXVB16X(VS,RA,RB) \ STXVD2X VS, (RA+RB) #endif #define MASK_PTR R8 #define MASKV V0 #define INV V1 // The following macros are used for // the stitched implementation within // counterCryptASM. // Load the initial GCM counter value // in V30 and set up the counter increment // in V31 #define SETUP_COUNTER \ P8_LXVB16X(COUNTER, R0, V30); \ VSPLTISB $1, V28; \
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 27.1K bytes - Viewed (0) -
src/net/http/client.go
// or responses with a zero-length body.” Unfortunately, we didn't document // that same constraint for arbitrary RoundTripper implementations, and // RoundTripper implementations in the wild (mostly in tests) assume that // they can use a nil Body to mean an empty one (similar to Request.Body). // (See https://golang.org/issue/38095.) // // If the ContentLength allows the Body to be empty, fill in an empty one
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Mar 26 06:06:11 UTC 2024 - 33.7K bytes - Viewed (0) -
src/cmd/vendor/golang.org/x/tools/internal/analysisinternal/analysis.go
if lhs, ok := got.Underlying().(*types.Basic); ok { return rhs.Info()&types.IsConstType == lhs.Info()&types.IsConstType } } return types.AssignableTo(want, got) } // MakeReadFile returns a simple implementation of the Pass.ReadFile function. func MakeReadFile(pass *analysis.Pass) func(filename string) ([]byte, error) { return func(filename string) ([]byte, error) { if err := CheckReadable(pass, filename); err != nil {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Jun 04 16:19:04 UTC 2024 - 11.7K bytes - Viewed (0) -
src/crypto/ecdsa/ecdsa_test.go
f(t, curve) }) } } // genericParamsForCurve returns the dereferenced CurveParams for // the specified curve. This is used to avoid the logic for // upgrading a curve to its specific implementation, forcing // usage of the generic implementation. func genericParamsForCurve(c elliptic.Curve) *elliptic.CurveParams { d := *(c.Params()) return &d } func TestKeyGeneration(t *testing.T) { testAllCurves(t, testKeyGeneration) }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Feb 26 21:33:58 UTC 2024 - 13.5K bytes - Viewed (0) -
src/runtime/alg.go
return memhash(p, h, size) } // runtime variable to check if the processor we're running on // actually supports the instructions used by the AES-based // hash implementation. var useAeshash bool // in asm_*.s // memhash should be an internal detail, // but widely used packages access it using linkname. // Notable members of the hall of shame include:
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 29 17:58:53 UTC 2024 - 13.6K bytes - Viewed (0)