Search Options

Results per page
Sort
Preferred Languages
Advance

Results 61 - 70 of 202 for Implementation (0.29 sec)

  1. src/crypto/internal/mlkem768/mlkem768_test.go

    	return dk.EncapsulationKey(), dk
    }
    
    var millionFlag = flag.Bool("million", false, "run the million vector test")
    
    // TestPQCrystalsAccumulated accumulates the 10k vectors generated by the
    // reference implementation and checks the hash of the result, to avoid checking
    // in 150MB of test vectors.
    func TestPQCrystalsAccumulated(t *testing.T) {
    	n := 10000
    	expected := "f7db260e1137a742e05fe0db9525012812b004d29040a5b606aad3d134b548d3"
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 06 15:27:18 UTC 2024
    - 10.3K bytes
    - Viewed (0)
  2. src/crypto/internal/edwards25519/field/fe.go

    // Add sets v = a + b, and returns v.
    func (v *Element) Add(a, b *Element) *Element {
    	v.l0 = a.l0 + b.l0
    	v.l1 = a.l1 + b.l1
    	v.l2 = a.l2 + b.l2
    	v.l3 = a.l3 + b.l3
    	v.l4 = a.l4 + b.l4
    	// Using the generic implementation here is actually faster than the
    	// assembly. Probably because the body of this function is so simple that
    	// the compiler can figure out better optimizations by inlining the carry
    	// propagation.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 13 18:57:38 UTC 2024
    - 11.8K bytes
    - Viewed (0)
  3. src/runtime/hash_test.go

    	"math"
    	"math/rand"
    	"os"
    	. "runtime"
    	"slices"
    	"strings"
    	"testing"
    	"unsafe"
    )
    
    func TestMemHash32Equality(t *testing.T) {
    	if *UseAeshash {
    		t.Skip("skipping since AES hash implementation is used")
    	}
    	var b [4]byte
    	r := rand.New(rand.NewSource(1234))
    	seed := uintptr(r.Uint64())
    	for i := 0; i < 100; i++ {
    		randBytes(r, b[:])
    		got := MemHash32(unsafe.Pointer(&b), seed)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 06 17:50:18 UTC 2024
    - 18.4K bytes
    - Viewed (0)
  4. src/encoding/binary/binary.go

    	AppendUint32([]byte, uint32) []byte
    	AppendUint64([]byte, uint64) []byte
    	String() string
    }
    
    // LittleEndian is the little-endian implementation of [ByteOrder] and [AppendByteOrder].
    var LittleEndian littleEndian
    
    // BigEndian is the big-endian implementation of [ByteOrder] and [AppendByteOrder].
    var BigEndian bigEndian
    
    type littleEndian struct{}
    
    func (littleEndian) Uint16(b []byte) uint16 {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 17:29:31 UTC 2024
    - 23.4K bytes
    - Viewed (0)
  5. src/net/net_fake.go

    	var q packetQueueState
    	var empty chan packetQueueState
    	if len(b) == 0 {
    		// For consistency with the implementation on Unix platforms,
    		// allow a zero-length Read to proceed if the queue is empty.
    		// (Without this, TestZeroByteRead deadlocks.)
    		empty = pq.empty
    	}
    
    	select {
    	case <-dt.expired:
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Feb 27 19:24:21 UTC 2024
    - 26.4K bytes
    - Viewed (0)
  6. src/crypto/aes/gcm_ppc64x.s

    #define P8_STXVB16X(VS,RA,RB) \
    	STXVD2X VS, (RA+RB)
    
    #endif
    
    #define MASK_PTR   R8
    
    #define MASKV   V0
    #define INV     V1
    
    // The following macros are used for
    // the stitched implementation within
    // counterCryptASM.
    
    // Load the initial GCM counter value
    // in V30 and set up the counter increment
    // in V31
    #define SETUP_COUNTER \
    	P8_LXVB16X(COUNTER, R0, V30); \
    	VSPLTISB $1, V28; \
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 04 17:29:44 UTC 2024
    - 27.1K bytes
    - Viewed (0)
  7. src/net/http/client.go

    		// or responses with a zero-length body.” Unfortunately, we didn't document
    		// that same constraint for arbitrary RoundTripper implementations, and
    		// RoundTripper implementations in the wild (mostly in tests) assume that
    		// they can use a nil Body to mean an empty one (similar to Request.Body).
    		// (See https://golang.org/issue/38095.)
    		//
    		// If the ContentLength allows the Body to be empty, fill in an empty one
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Mar 26 06:06:11 UTC 2024
    - 33.7K bytes
    - Viewed (0)
  8. src/cmd/vendor/golang.org/x/tools/internal/analysisinternal/analysis.go

    		if lhs, ok := got.Underlying().(*types.Basic); ok {
    			return rhs.Info()&types.IsConstType == lhs.Info()&types.IsConstType
    		}
    	}
    	return types.AssignableTo(want, got)
    }
    
    // MakeReadFile returns a simple implementation of the Pass.ReadFile function.
    func MakeReadFile(pass *analysis.Pass) func(filename string) ([]byte, error) {
    	return func(filename string) ([]byte, error) {
    		if err := CheckReadable(pass, filename); err != nil {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Jun 04 16:19:04 UTC 2024
    - 11.7K bytes
    - Viewed (0)
  9. src/crypto/ecdsa/ecdsa_test.go

    			f(t, curve)
    		})
    	}
    }
    
    // genericParamsForCurve returns the dereferenced CurveParams for
    // the specified curve. This is used to avoid the logic for
    // upgrading a curve to its specific implementation, forcing
    // usage of the generic implementation.
    func genericParamsForCurve(c elliptic.Curve) *elliptic.CurveParams {
    	d := *(c.Params())
    	return &d
    }
    
    func TestKeyGeneration(t *testing.T) {
    	testAllCurves(t, testKeyGeneration)
    }
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Feb 26 21:33:58 UTC 2024
    - 13.5K bytes
    - Viewed (0)
  10. src/runtime/alg.go

    	return memhash(p, h, size)
    }
    
    // runtime variable to check if the processor we're running on
    // actually supports the instructions used by the AES-based
    // hash implementation.
    var useAeshash bool
    
    // in asm_*.s
    
    // memhash should be an internal detail,
    // but widely used packages access it using linkname.
    // Notable members of the hall of shame include:
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 29 17:58:53 UTC 2024
    - 13.6K bytes
    - Viewed (0)
Back to top