| Absolute File Name: | /home/opencoverage/opencoverage/guest-scripts/coreutils/src/gnulib/lib/sha256.c |
| Switch to Source code | Preprocessed file |
| Line | Source | Count | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1 | - | |||||||||||||
| 2 | - | |||||||||||||
| 3 | - | |||||||||||||
| 4 | - | |||||||||||||
| 5 | - | |||||||||||||
| 6 | - | |||||||||||||
| 7 | - | |||||||||||||
| 8 | - | |||||||||||||
| 9 | - | |||||||||||||
| 10 | static const unsigned char fillbuf[64] = { 0x80, 0 }; | - | ||||||||||||
| 11 | - | |||||||||||||
| 12 | - | |||||||||||||
| 13 | - | |||||||||||||
| 14 | - | |||||||||||||
| 15 | - | |||||||||||||
| 16 | - | |||||||||||||
| 17 | - | |||||||||||||
| 18 | void | - | ||||||||||||
| 19 | sha256_init_ctx (struct sha256_ctx *ctx) | - | ||||||||||||
| 20 | { | - | ||||||||||||
| 21 | ctx->state[0] = 0x6a09e667UL; | - | ||||||||||||
| 22 | ctx->state[1] = 0xbb67ae85UL; | - | ||||||||||||
| 23 | ctx->state[2] = 0x3c6ef372UL; | - | ||||||||||||
| 24 | ctx->state[3] = 0xa54ff53aUL; | - | ||||||||||||
| 25 | ctx->state[4] = 0x510e527fUL; | - | ||||||||||||
| 26 | ctx->state[5] = 0x9b05688cUL; | - | ||||||||||||
| 27 | ctx->state[6] = 0x1f83d9abUL; | - | ||||||||||||
| 28 | ctx->state[7] = 0x5be0cd19UL; | - | ||||||||||||
| 29 | - | |||||||||||||
| 30 | ctx->total[0] = ctx->total[1] = 0; | - | ||||||||||||
| 31 | ctx->buflen = 0; | - | ||||||||||||
| 32 | } executed 7 times by 1 test: end of blockExecuted by:
| 7 | ||||||||||||
| 33 | - | |||||||||||||
| 34 | void | - | ||||||||||||
| 35 | sha224_init_ctx (struct sha256_ctx *ctx) | - | ||||||||||||
| 36 | { | - | ||||||||||||
| 37 | ctx->state[0] = 0xc1059ed8UL; | - | ||||||||||||
| 38 | ctx->state[1] = 0x367cd507UL; | - | ||||||||||||
| 39 | ctx->state[2] = 0x3070dd17UL; | - | ||||||||||||
| 40 | ctx->state[3] = 0xf70e5939UL; | - | ||||||||||||
| 41 | ctx->state[4] = 0xffc00b31UL; | - | ||||||||||||
| 42 | ctx->state[5] = 0x68581511UL; | - | ||||||||||||
| 43 | ctx->state[6] = 0x64f98fa7UL; | - | ||||||||||||
| 44 | ctx->state[7] = 0xbefa4fa4UL; | - | ||||||||||||
| 45 | - | |||||||||||||
| 46 | ctx->total[0] = ctx->total[1] = 0; | - | ||||||||||||
| 47 | ctx->buflen = 0; | - | ||||||||||||
| 48 | } executed 5 times by 1 test: end of blockExecuted by:
| 5 | ||||||||||||
| 49 | - | |||||||||||||
| 50 | - | |||||||||||||
| 51 | - | |||||||||||||
| 52 | - | |||||||||||||
| 53 | static void | - | ||||||||||||
| 54 | set_uint32 (char *cp, uint32_t v) | - | ||||||||||||
| 55 | { | - | ||||||||||||
| 56 | memcpy (cp, &v, sizeof v); | - | ||||||||||||
| 57 | } executed 115 times by 2 tests: end of blockExecuted by:
| 115 | ||||||||||||
| 58 | - | |||||||||||||
| 59 | - | |||||||||||||
| 60 | - | |||||||||||||
| 61 | void * | - | ||||||||||||
| 62 | sha256_read_ctx (const struct sha256_ctx *ctx, void *resbuf) | - | ||||||||||||
| 63 | { | - | ||||||||||||
| 64 | int i; | - | ||||||||||||
| 65 | char *r = resbuf; | - | ||||||||||||
| 66 | - | |||||||||||||
| 67 | for (i = 0; i < 8
| 7-56 | ||||||||||||
| 68 | set_uint32 (r + i * sizeof ctx->state[0], (((ctx->state[i]) << 24) | (((ctx->state[i]) & 0xff00) << 8) | (((ctx->state[i]) >> 8) & 0xff00) | ((ctx->state[i]) >> 24))); executed 56 times by 1 test: set_uint32 (r + i * sizeof ctx->state[0], (((ctx->state[i]) << 24) | (((ctx->state[i]) & 0xff00) << 8) | (((ctx->state[i]) >> 8) & 0xff00) | ((ctx->state[i]) >> 24)));Executed by:
| 56 | ||||||||||||
| 69 | - | |||||||||||||
| 70 | return executed 7 times by 1 test: resbuf;return resbuf;Executed by:
executed 7 times by 1 test: return resbuf;Executed by:
| 7 | ||||||||||||
| 71 | } | - | ||||||||||||
| 72 | - | |||||||||||||
| 73 | void * | - | ||||||||||||
| 74 | sha224_read_ctx (const struct sha256_ctx *ctx, void *resbuf) | - | ||||||||||||
| 75 | { | - | ||||||||||||
| 76 | int i; | - | ||||||||||||
| 77 | char *r = resbuf; | - | ||||||||||||
| 78 | - | |||||||||||||
| 79 | for (i = 0; i < 7
| 5-35 | ||||||||||||
| 80 | set_uint32 (r + i * sizeof ctx->state[0], (((ctx->state[i]) << 24) | (((ctx->state[i]) & 0xff00) << 8) | (((ctx->state[i]) >> 8) & 0xff00) | ((ctx->state[i]) >> 24))); executed 35 times by 1 test: set_uint32 (r + i * sizeof ctx->state[0], (((ctx->state[i]) << 24) | (((ctx->state[i]) & 0xff00) << 8) | (((ctx->state[i]) >> 8) & 0xff00) | ((ctx->state[i]) >> 24)));Executed by:
| 35 | ||||||||||||
| 81 | - | |||||||||||||
| 82 | return executed 5 times by 1 test: resbuf;return resbuf;Executed by:
executed 5 times by 1 test: return resbuf;Executed by:
| 5 | ||||||||||||
| 83 | } | - | ||||||||||||
| 84 | - | |||||||||||||
| 85 | - | |||||||||||||
| 86 | - | |||||||||||||
| 87 | static void | - | ||||||||||||
| 88 | sha256_conclude_ctx (struct sha256_ctx *ctx) | - | ||||||||||||
| 89 | { | - | ||||||||||||
| 90 | - | |||||||||||||
| 91 | size_t bytes = ctx->buflen; | - | ||||||||||||
| 92 | size_t size = (
| 2-10 | ||||||||||||
| 93 | - | |||||||||||||
| 94 | - | |||||||||||||
| 95 | ctx->total[0] += bytes; | - | ||||||||||||
| 96 | if (ctx->total[0] < bytes
| 0-12 | ||||||||||||
| 97 | ++ never executed: ctx->total[1];++ctx->total[1];never executed: ++ctx->total[1]; | 0 | ||||||||||||
| 98 | - | |||||||||||||
| 99 | - | |||||||||||||
| 100 | - | |||||||||||||
| 101 | - | |||||||||||||
| 102 | set_uint32 ((char *) &ctx->buffer[size - 2], | - | ||||||||||||
| 103 | ((((ctx->total[1] << 3) | (ctx->total[0] >> 29)) << 24) | ((((ctx->total[1] << 3) | (ctx->total[0] >> 29)) & 0xff00) << 8) | ((((ctx->total[1] << 3) | (ctx->total[0] >> 29)) >> 8) & 0xff00) | (((ctx->total[1] << 3) | (ctx->total[0] >> 29)) >> 24))); | - | ||||||||||||
| 104 | set_uint32 ((char *) &ctx->buffer[size - 1], | - | ||||||||||||
| 105 | (((ctx->total[0] << 3) << 24) | (((ctx->total[0] << 3) & 0xff00) << 8) | (((ctx->total[0] << 3) >> 8) & 0xff00) | ((ctx->total[0] << 3) >> 24))); | - | ||||||||||||
| 106 | - | |||||||||||||
| 107 | memcpy (&((char *) ctx->buffer)[bytes], fillbuf, (size - 2) * 4 - bytes); | - | ||||||||||||
| 108 | - | |||||||||||||
| 109 | - | |||||||||||||
| 110 | sha256_process_block (ctx->buffer, size * 4, ctx); | - | ||||||||||||
| 111 | } executed 12 times by 2 tests: end of blockExecuted by:
| 12 | ||||||||||||
| 112 | - | |||||||||||||
| 113 | void * | - | ||||||||||||
| 114 | sha256_finish_ctx (struct sha256_ctx *ctx, void *resbuf) | - | ||||||||||||
| 115 | { | - | ||||||||||||
| 116 | sha256_conclude_ctx (ctx); | - | ||||||||||||
| 117 | return executed 7 times by 1 test: sha256_read_ctx (ctx, resbuf);return sha256_read_ctx (ctx, resbuf);Executed by:
executed 7 times by 1 test: return sha256_read_ctx (ctx, resbuf);Executed by:
| 7 | ||||||||||||
| 118 | } | - | ||||||||||||
| 119 | - | |||||||||||||
| 120 | void * | - | ||||||||||||
| 121 | sha224_finish_ctx (struct sha256_ctx *ctx, void *resbuf) | - | ||||||||||||
| 122 | { | - | ||||||||||||
| 123 | sha256_conclude_ctx (ctx); | - | ||||||||||||
| 124 | return executed 5 times by 1 test: sha224_read_ctx (ctx, resbuf);return sha224_read_ctx (ctx, resbuf);Executed by:
executed 5 times by 1 test: return sha224_read_ctx (ctx, resbuf);Executed by:
| 5 | ||||||||||||
| 125 | } | - | ||||||||||||
| 126 | - | |||||||||||||
| 127 | - | |||||||||||||
| 128 | - | |||||||||||||
| 129 | - | |||||||||||||
| 130 | - | |||||||||||||
| 131 | int | - | ||||||||||||
| 132 | sha256_stream (FILE *stream, void *resblock) | - | ||||||||||||
| 133 | { | - | ||||||||||||
| 134 | struct sha256_ctx ctx; | - | ||||||||||||
| 135 | size_t sum; | - | ||||||||||||
| 136 | - | |||||||||||||
| 137 | char *buffer = malloc (32768 + 72); | - | ||||||||||||
| 138 | if (!buffer
| 0-7 | ||||||||||||
| 139 | return never executed: 1;return 1;never executed: return 1; | 0 | ||||||||||||
| 140 | - | |||||||||||||
| 141 | - | |||||||||||||
| 142 | sha256_init_ctx (&ctx); | - | ||||||||||||
| 143 | - | |||||||||||||
| 144 | - | |||||||||||||
| 145 | while (1) | - | ||||||||||||
| 146 | { | - | ||||||||||||
| 147 | - | |||||||||||||
| 148 | - | |||||||||||||
| 149 | - | |||||||||||||
| 150 | size_t n; | - | ||||||||||||
| 151 | sum = 0; | - | ||||||||||||
| 152 | - | |||||||||||||
| 153 | - | |||||||||||||
| 154 | while (1) | - | ||||||||||||
| 155 | { | - | ||||||||||||
| 156 | n = fread_unlocked (buffer + sum,1,32768 - sum,stream); | - | ||||||||||||
| 157 | - | |||||||||||||
| 158 | sum += n; | - | ||||||||||||
| 159 | - | |||||||||||||
| 160 | if (sum == 32768
| 7-30 | ||||||||||||
| 161 | break; executed 30 times by 1 test: break;Executed by:
| 30 | ||||||||||||
| 162 | - | |||||||||||||
| 163 | if (n == 0
| 1-6 | ||||||||||||
| 164 | { | - | ||||||||||||
| 165 | - | |||||||||||||
| 166 | - | |||||||||||||
| 167 | - | |||||||||||||
| 168 | if (ferror_unlocked (stream)
| 0-1 | ||||||||||||
| 169 | { | - | ||||||||||||
| 170 | free (buffer); | - | ||||||||||||
| 171 | return never executed: 1;return 1;never executed: return 1; | 0 | ||||||||||||
| 172 | } | - | ||||||||||||
| 173 | goto executed 1 time by 1 test: process_partial_block;goto process_partial_block;Executed by:
executed 1 time by 1 test: goto process_partial_block;Executed by:
| 1 | ||||||||||||
| 174 | } | - | ||||||||||||
| 175 | - | |||||||||||||
| 176 | - | |||||||||||||
| 177 | - | |||||||||||||
| 178 | - | |||||||||||||
| 179 | if (feof_unlocked (stream)
| 0-6 | ||||||||||||
| 180 | goto executed 6 times by 1 test: process_partial_block;goto process_partial_block;Executed by:
executed 6 times by 1 test: goto process_partial_block;Executed by:
| 6 | ||||||||||||
| 181 | } never executed: end of block | 0 | ||||||||||||
| 182 | - | |||||||||||||
| 183 | - | |||||||||||||
| 184 | - | |||||||||||||
| 185 | - | |||||||||||||
| 186 | sha256_process_block (buffer, 32768, &ctx); | - | ||||||||||||
| 187 | } executed 30 times by 1 test: end of blockExecuted by:
| 30 | ||||||||||||
| 188 | - | |||||||||||||
| 189 | process_partial_block: code before this statement never executed: ;process_partial_block: | 0 | ||||||||||||
| 190 | - | |||||||||||||
| 191 | - | |||||||||||||
| 192 | if (sum > 0
| 1-6 | ||||||||||||
| 193 | sha256_process_bytes (buffer, sum, &ctx); executed 6 times by 1 test: sha256_process_bytes (buffer, sum, &ctx);Executed by:
| 6 | ||||||||||||
| 194 | - | |||||||||||||
| 195 | - | |||||||||||||
| 196 | sha256_finish_ctx (&ctx, resblock); | - | ||||||||||||
| 197 | free (buffer); | - | ||||||||||||
| 198 | return executed 7 times by 1 test: 0;return 0;Executed by:
executed 7 times by 1 test: return 0;Executed by:
| 7 | ||||||||||||
| 199 | } | - | ||||||||||||
| 200 | - | |||||||||||||
| 201 | - | |||||||||||||
| 202 | int | - | ||||||||||||
| 203 | sha224_stream (FILE *stream, void *resblock) | - | ||||||||||||
| 204 | { | - | ||||||||||||
| 205 | struct sha256_ctx ctx; | - | ||||||||||||
| 206 | size_t sum; | - | ||||||||||||
| 207 | - | |||||||||||||
| 208 | char *buffer = malloc (32768 + 72); | - | ||||||||||||
| 209 | if (!buffer
| 0-5 | ||||||||||||
| 210 | return never executed: 1;return 1;never executed: return 1; | 0 | ||||||||||||
| 211 | - | |||||||||||||
| 212 | - | |||||||||||||
| 213 | sha224_init_ctx (&ctx); | - | ||||||||||||
| 214 | - | |||||||||||||
| 215 | - | |||||||||||||
| 216 | while (1) | - | ||||||||||||
| 217 | { | - | ||||||||||||
| 218 | - | |||||||||||||
| 219 | - | |||||||||||||
| 220 | - | |||||||||||||
| 221 | size_t n; | - | ||||||||||||
| 222 | sum = 0; | - | ||||||||||||
| 223 | - | |||||||||||||
| 224 | - | |||||||||||||
| 225 | while (1) | - | ||||||||||||
| 226 | { | - | ||||||||||||
| 227 | n = fread_unlocked (buffer + sum,1,32768 - sum,stream); | - | ||||||||||||
| 228 | - | |||||||||||||
| 229 | sum += n; | - | ||||||||||||
| 230 | - | |||||||||||||
| 231 | if (sum == 32768
| 5-30 | ||||||||||||
| 232 | break; executed 30 times by 1 test: break;Executed by:
| 30 | ||||||||||||
| 233 | - | |||||||||||||
| 234 | if (n == 0
| 0-5 | ||||||||||||
| 235 | { | - | ||||||||||||
| 236 | - | |||||||||||||
| 237 | - | |||||||||||||
| 238 | - | |||||||||||||
| 239 | if (ferror_unlocked (stream)
| 0 | ||||||||||||
| 240 | { | - | ||||||||||||
| 241 | free (buffer); | - | ||||||||||||
| 242 | return never executed: 1;return 1;never executed: return 1; | 0 | ||||||||||||
| 243 | } | - | ||||||||||||
| 244 | goto never executed: process_partial_block;goto process_partial_block;never executed: goto process_partial_block; | 0 | ||||||||||||
| 245 | } | - | ||||||||||||
| 246 | - | |||||||||||||
| 247 | - | |||||||||||||
| 248 | - | |||||||||||||
| 249 | - | |||||||||||||
| 250 | if (feof_unlocked (stream)
| 0-5 | ||||||||||||
| 251 | goto executed 5 times by 1 test: process_partial_block;goto process_partial_block;Executed by:
executed 5 times by 1 test: goto process_partial_block;Executed by:
| 5 | ||||||||||||
| 252 | } never executed: end of block | 0 | ||||||||||||
| 253 | - | |||||||||||||
| 254 | - | |||||||||||||
| 255 | - | |||||||||||||
| 256 | - | |||||||||||||
| 257 | sha256_process_block (buffer, 32768, &ctx); | - | ||||||||||||
| 258 | } executed 30 times by 1 test: end of blockExecuted by:
| 30 | ||||||||||||
| 259 | - | |||||||||||||
| 260 | process_partial_block: code before this statement never executed: ;process_partial_block: | 0 | ||||||||||||
| 261 | - | |||||||||||||
| 262 | - | |||||||||||||
| 263 | if (sum > 0
| 0-5 | ||||||||||||
| 264 | sha256_process_bytes (buffer, sum, &ctx); executed 5 times by 1 test: sha256_process_bytes (buffer, sum, &ctx);Executed by:
| 5 | ||||||||||||
| 265 | - | |||||||||||||
| 266 | - | |||||||||||||
| 267 | sha224_finish_ctx (&ctx, resblock); | - | ||||||||||||
| 268 | free (buffer); | - | ||||||||||||
| 269 | return executed 5 times by 1 test: 0;return 0;Executed by:
executed 5 times by 1 test: return 0;Executed by:
| 5 | ||||||||||||
| 270 | } | - | ||||||||||||
| 271 | - | |||||||||||||
| 272 | - | |||||||||||||
| 273 | - | |||||||||||||
| 274 | - | |||||||||||||
| 275 | - | |||||||||||||
| 276 | - | |||||||||||||
| 277 | void * | - | ||||||||||||
| 278 | sha256_buffer (const char *buffer, size_t len, void *resblock) | - | ||||||||||||
| 279 | { | - | ||||||||||||
| 280 | struct sha256_ctx ctx; | - | ||||||||||||
| 281 | - | |||||||||||||
| 282 | - | |||||||||||||
| 283 | sha256_init_ctx (&ctx); | - | ||||||||||||
| 284 | - | |||||||||||||
| 285 | - | |||||||||||||
| 286 | sha256_process_bytes (buffer, len, &ctx); | - | ||||||||||||
| 287 | - | |||||||||||||
| 288 | - | |||||||||||||
| 289 | return never executed: sha256_finish_ctx (&ctx, resblock);return sha256_finish_ctx (&ctx, resblock);never executed: return sha256_finish_ctx (&ctx, resblock); | 0 | ||||||||||||
| 290 | } | - | ||||||||||||
| 291 | - | |||||||||||||
| 292 | void * | - | ||||||||||||
| 293 | sha224_buffer (const char *buffer, size_t len, void *resblock) | - | ||||||||||||
| 294 | { | - | ||||||||||||
| 295 | struct sha256_ctx ctx; | - | ||||||||||||
| 296 | - | |||||||||||||
| 297 | - | |||||||||||||
| 298 | sha224_init_ctx (&ctx); | - | ||||||||||||
| 299 | - | |||||||||||||
| 300 | - | |||||||||||||
| 301 | sha256_process_bytes (buffer, len, &ctx); | - | ||||||||||||
| 302 | - | |||||||||||||
| 303 | - | |||||||||||||
| 304 | return never executed: sha224_finish_ctx (&ctx, resblock);return sha224_finish_ctx (&ctx, resblock);never executed: return sha224_finish_ctx (&ctx, resblock); | 0 | ||||||||||||
| 305 | } | - | ||||||||||||
| 306 | - | |||||||||||||
| 307 | void | - | ||||||||||||
| 308 | sha256_process_bytes (const void *buffer, size_t len, struct sha256_ctx *ctx) | - | ||||||||||||
| 309 | { | - | ||||||||||||
| 310 | - | |||||||||||||
| 311 | - | |||||||||||||
| 312 | if (ctx->buflen != 0
| 0-11 | ||||||||||||
| 313 | { | - | ||||||||||||
| 314 | size_t left_over = ctx->buflen; | - | ||||||||||||
| 315 | size_t add = 128 - left_over > len
| 0 | ||||||||||||
| 316 | - | |||||||||||||
| 317 | memcpy (&((char *) ctx->buffer)[left_over], buffer, add); | - | ||||||||||||
| 318 | ctx->buflen += add; | - | ||||||||||||
| 319 | - | |||||||||||||
| 320 | if (ctx->buflen > 64
| 0 | ||||||||||||
| 321 | { | - | ||||||||||||
| 322 | sha256_process_block (ctx->buffer, ctx->buflen & ~63, ctx); | - | ||||||||||||
| 323 | - | |||||||||||||
| 324 | ctx->buflen &= 63; | - | ||||||||||||
| 325 | - | |||||||||||||
| 326 | - | |||||||||||||
| 327 | memcpy (ctx->buffer, | - | ||||||||||||
| 328 | &((char *) ctx->buffer)[(left_over + add) & ~63], | - | ||||||||||||
| 329 | ctx->buflen); | - | ||||||||||||
| 330 | } never executed: end of block | 0 | ||||||||||||
| 331 | - | |||||||||||||
| 332 | buffer = (const char *) buffer + add; | - | ||||||||||||
| 333 | len -= add; | - | ||||||||||||
| 334 | } never executed: end of block | 0 | ||||||||||||
| 335 | - | |||||||||||||
| 336 | - | |||||||||||||
| 337 | if (len >= 64
| 2-9 | ||||||||||||
| 338 | { | - | ||||||||||||
| 339 | { | - | ||||||||||||
| 340 | sha256_process_block (buffer, len & ~63, ctx); | - | ||||||||||||
| 341 | buffer = (const char *) buffer + (len & ~63); | - | ||||||||||||
| 342 | len &= 63; | - | ||||||||||||
| 343 | } | - | ||||||||||||
| 344 | } executed 2 times by 2 tests: end of blockExecuted by:
| 2 | ||||||||||||
| 345 | - | |||||||||||||
| 346 | - | |||||||||||||
| 347 | if (len > 0
| 2-9 | ||||||||||||
| 348 | { | - | ||||||||||||
| 349 | size_t left_over = ctx->buflen; | - | ||||||||||||
| 350 | - | |||||||||||||
| 351 | memcpy (&((char *) ctx->buffer)[left_over], buffer, len); | - | ||||||||||||
| 352 | left_over += len; | - | ||||||||||||
| 353 | if (left_over >= 64
| 0-9 | ||||||||||||
| 354 | { | - | ||||||||||||
| 355 | sha256_process_block (ctx->buffer, 64, ctx); | - | ||||||||||||
| 356 | left_over -= 64; | - | ||||||||||||
| 357 | - | |||||||||||||
| 358 | - | |||||||||||||
| 359 | memcpy (ctx->buffer, &ctx->buffer[16], left_over); | - | ||||||||||||
| 360 | } never executed: end of block | 0 | ||||||||||||
| 361 | ctx->buflen = left_over; | - | ||||||||||||
| 362 | } executed 9 times by 2 tests: end of blockExecuted by:
| 9 | ||||||||||||
| 363 | } executed 11 times by 2 tests: end of blockExecuted by:
| 11 | ||||||||||||
| 364 | - | |||||||||||||
| 365 | - | |||||||||||||
| 366 | - | |||||||||||||
| 367 | - | |||||||||||||
| 368 | - | |||||||||||||
| 369 | static const uint32_t sha256_round_constants[64] = { | - | ||||||||||||
| 370 | 0x428a2f98UL, 0x71374491UL, 0xb5c0fbcfUL, 0xe9b5dba5UL, | - | ||||||||||||
| 371 | 0x3956c25bUL, 0x59f111f1UL, 0x923f82a4UL, 0xab1c5ed5UL, | - | ||||||||||||
| 372 | 0xd807aa98UL, 0x12835b01UL, 0x243185beUL, 0x550c7dc3UL, | - | ||||||||||||
| 373 | 0x72be5d74UL, 0x80deb1feUL, 0x9bdc06a7UL, 0xc19bf174UL, | - | ||||||||||||
| 374 | 0xe49b69c1UL, 0xefbe4786UL, 0x0fc19dc6UL, 0x240ca1ccUL, | - | ||||||||||||
| 375 | 0x2de92c6fUL, 0x4a7484aaUL, 0x5cb0a9dcUL, 0x76f988daUL, | - | ||||||||||||
| 376 | 0x983e5152UL, 0xa831c66dUL, 0xb00327c8UL, 0xbf597fc7UL, | - | ||||||||||||
| 377 | 0xc6e00bf3UL, 0xd5a79147UL, 0x06ca6351UL, 0x14292967UL, | - | ||||||||||||
| 378 | 0x27b70a85UL, 0x2e1b2138UL, 0x4d2c6dfcUL, 0x53380d13UL, | - | ||||||||||||
| 379 | 0x650a7354UL, 0x766a0abbUL, 0x81c2c92eUL, 0x92722c85UL, | - | ||||||||||||
| 380 | 0xa2bfe8a1UL, 0xa81a664bUL, 0xc24b8b70UL, 0xc76c51a3UL, | - | ||||||||||||
| 381 | 0xd192e819UL, 0xd6990624UL, 0xf40e3585UL, 0x106aa070UL, | - | ||||||||||||
| 382 | 0x19a4c116UL, 0x1e376c08UL, 0x2748774cUL, 0x34b0bcb5UL, | - | ||||||||||||
| 383 | 0x391c0cb3UL, 0x4ed8aa4aUL, 0x5b9cca4fUL, 0x682e6ff3UL, | - | ||||||||||||
| 384 | 0x748f82eeUL, 0x78a5636fUL, 0x84c87814UL, 0x8cc70208UL, | - | ||||||||||||
| 385 | 0x90befffaUL, 0xa4506cebUL, 0xbef9a3f7UL, 0xc67178f2UL, | - | ||||||||||||
| 386 | }; | - | ||||||||||||
| 387 | void | - | ||||||||||||
| 388 | sha256_process_block (const void *buffer, size_t len, struct sha256_ctx *ctx) | - | ||||||||||||
| 389 | { | - | ||||||||||||
| 390 | const uint32_t *words = buffer; | - | ||||||||||||
| 391 | size_t nwords = len / sizeof (uint32_t); | - | ||||||||||||
| 392 | const uint32_t *endp = words + nwords; | - | ||||||||||||
| 393 | uint32_t x[16]; | - | ||||||||||||
| 394 | uint32_t a = ctx->state[0]; | - | ||||||||||||
| 395 | uint32_t b = ctx->state[1]; | - | ||||||||||||
| 396 | uint32_t c = ctx->state[2]; | - | ||||||||||||
| 397 | uint32_t d = ctx->state[3]; | - | ||||||||||||
| 398 | uint32_t e = ctx->state[4]; | - | ||||||||||||
| 399 | uint32_t f = ctx->state[5]; | - | ||||||||||||
| 400 | uint32_t g = ctx->state[6]; | - | ||||||||||||
| 401 | uint32_t h = ctx->state[7]; | - | ||||||||||||
| 402 | uint32_t lolen = len; | - | ||||||||||||
| 403 | - | |||||||||||||
| 404 | - | |||||||||||||
| 405 | - | |||||||||||||
| 406 | - | |||||||||||||
| 407 | ctx->total[0] += lolen; | - | ||||||||||||
| 408 | ctx->total[1] += (len >> 31 >> 1) + (ctx->total[0] < lolen); | - | ||||||||||||
| 409 | while (words < endp
| 74-31264 | ||||||||||||
| 410 | { | - | ||||||||||||
| 411 | uint32_t tm; | - | ||||||||||||
| 412 | uint32_t t0, t1; | - | ||||||||||||
| 413 | int t; | - | ||||||||||||
| 414 | - | |||||||||||||
| 415 | for (t = 0; t < 16
| 31264-500224 | ||||||||||||
| 416 | { | - | ||||||||||||
| 417 | x[t] = (((*words) << 24) | (((*words) & 0xff00) << 8) | (((*words) >> 8) & 0xff00) | ((*words) >> 24)); | - | ||||||||||||
| 418 | words++; | - | ||||||||||||
| 419 | } executed 500224 times by 2 tests: end of blockExecuted by:
| 500224 | ||||||||||||
| 420 | - | |||||||||||||
| 421 | do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[0] + x[ 0]; d += t1; h = t0 + t1; } while(0); | - | ||||||||||||
| 422 | do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[1] + x[ 1]; c += t1; g = t0 + t1; } while(0); | - | ||||||||||||
| 423 | do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[2] + x[ 2]; b += t1; f = t0 + t1; } while(0); | - | ||||||||||||
| 424 | do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[3] + x[ 3]; a += t1; e = t0 + t1; } while(0); | - | ||||||||||||
| 425 | do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[4] + x[ 4]; h += t1; d = t0 + t1; } while(0); | - | ||||||||||||
| 426 | do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[5] + x[ 5]; g += t1; c = t0 + t1; } while(0); | - | ||||||||||||
| 427 | do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[6] + x[ 6]; f += t1; b = t0 + t1; } while(0); | - | ||||||||||||
| 428 | do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[7] + x[ 7]; e += t1; a = t0 + t1; } while(0); | - | ||||||||||||
| 429 | do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[8] + x[ 8]; d += t1; h = t0 + t1; } while(0); | - | ||||||||||||
| 430 | do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[9] + x[ 9]; c += t1; g = t0 + t1; } while(0); | - | ||||||||||||
| 431 | do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[10] + x[10]; b += t1; f = t0 + t1; } while(0); | - | ||||||||||||
| 432 | do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[11] + x[11]; a += t1; e = t0 + t1; } while(0); | - | ||||||||||||
| 433 | do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[12] + x[12]; h += t1; d = t0 + t1; } while(0); | - | ||||||||||||
| 434 | do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[13] + x[13]; g += t1; c = t0 + t1; } while(0); | - | ||||||||||||
| 435 | do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[14] + x[14]; f += t1; b = t0 + t1; } while(0); | - | ||||||||||||
| 436 | do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[15] + x[15]; e += t1; a = t0 + t1; } while(0); | - | ||||||||||||
| 437 | do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[16] + ( tm = ((((x[(16 -2)&0x0f]) << (15)) | ((x[(16 -2)&0x0f]) >> (32 - (15))))^(((x[(16 -2)&0x0f]) << (13)) | ((x[(16 -2)&0x0f]) >> (32 - (13))))^(x[(16 -2)&0x0f]>>10)) + x[(16 -7)&0x0f] + ((((x[(16 -15)&0x0f]) << (25)) | ((x[(16 -15)&0x0f]) >> (32 - (25))))^(((x[(16 -15)&0x0f]) << (14)) | ((x[(16 -15)&0x0f]) >> (32 - (14))))^(x[(16 -15)&0x0f]>>3)) + x[16&0x0f] , x[16&0x0f] = tm ); d += t1; h = t0 + t1; } while(0); | - | ||||||||||||
| 438 | do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[17] + ( tm = ((((x[(17 -2)&0x0f]) << (15)) | ((x[(17 -2)&0x0f]) >> (32 - (15))))^(((x[(17 -2)&0x0f]) << (13)) | ((x[(17 -2)&0x0f]) >> (32 - (13))))^(x[(17 -2)&0x0f]>>10)) + x[(17 -7)&0x0f] + ((((x[(17 -15)&0x0f]) << (25)) | ((x[(17 -15)&0x0f]) >> (32 - (25))))^(((x[(17 -15)&0x0f]) << (14)) | ((x[(17 -15)&0x0f]) >> (32 - (14))))^(x[(17 -15)&0x0f]>>3)) + x[17&0x0f] , x[17&0x0f] = tm ); c += t1; g = t0 + t1; } while(0); | - | ||||||||||||
| 439 | do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[18] + ( tm = ((((x[(18 -2)&0x0f]) << (15)) | ((x[(18 -2)&0x0f]) >> (32 - (15))))^(((x[(18 -2)&0x0f]) << (13)) | ((x[(18 -2)&0x0f]) >> (32 - (13))))^(x[(18 -2)&0x0f]>>10)) + x[(18 -7)&0x0f] + ((((x[(18 -15)&0x0f]) << (25)) | ((x[(18 -15)&0x0f]) >> (32 - (25))))^(((x[(18 -15)&0x0f]) << (14)) | ((x[(18 -15)&0x0f]) >> (32 - (14))))^(x[(18 -15)&0x0f]>>3)) + x[18&0x0f] , x[18&0x0f] = tm ); b += t1; f = t0 + t1; } while(0); | - | ||||||||||||
| 440 | do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[19] + ( tm = ((((x[(19 -2)&0x0f]) << (15)) | ((x[(19 -2)&0x0f]) >> (32 - (15))))^(((x[(19 -2)&0x0f]) << (13)) | ((x[(19 -2)&0x0f]) >> (32 - (13))))^(x[(19 -2)&0x0f]>>10)) + x[(19 -7)&0x0f] + ((((x[(19 -15)&0x0f]) << (25)) | ((x[(19 -15)&0x0f]) >> (32 - (25))))^(((x[(19 -15)&0x0f]) << (14)) | ((x[(19 -15)&0x0f]) >> (32 - (14))))^(x[(19 -15)&0x0f]>>3)) + x[19&0x0f] , x[19&0x0f] = tm ); a += t1; e = t0 + t1; } while(0); | - | ||||||||||||
| 441 | do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[20] + ( tm = ((((x[(20 -2)&0x0f]) << (15)) | ((x[(20 -2)&0x0f]) >> (32 - (15))))^(((x[(20 -2)&0x0f]) << (13)) | ((x[(20 -2)&0x0f]) >> (32 - (13))))^(x[(20 -2)&0x0f]>>10)) + x[(20 -7)&0x0f] + ((((x[(20 -15)&0x0f]) << (25)) | ((x[(20 -15)&0x0f]) >> (32 - (25))))^(((x[(20 -15)&0x0f]) << (14)) | ((x[(20 -15)&0x0f]) >> (32 - (14))))^(x[(20 -15)&0x0f]>>3)) + x[20&0x0f] , x[20&0x0f] = tm ); h += t1; d = t0 + t1; } while(0); | - | ||||||||||||
| 442 | do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[21] + ( tm = ((((x[(21 -2)&0x0f]) << (15)) | ((x[(21 -2)&0x0f]) >> (32 - (15))))^(((x[(21 -2)&0x0f]) << (13)) | ((x[(21 -2)&0x0f]) >> (32 - (13))))^(x[(21 -2)&0x0f]>>10)) + x[(21 -7)&0x0f] + ((((x[(21 -15)&0x0f]) << (25)) | ((x[(21 -15)&0x0f]) >> (32 - (25))))^(((x[(21 -15)&0x0f]) << (14)) | ((x[(21 -15)&0x0f]) >> (32 - (14))))^(x[(21 -15)&0x0f]>>3)) + x[21&0x0f] , x[21&0x0f] = tm ); g += t1; c = t0 + t1; } while(0); | - | ||||||||||||
| 443 | do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[22] + ( tm = ((((x[(22 -2)&0x0f]) << (15)) | ((x[(22 -2)&0x0f]) >> (32 - (15))))^(((x[(22 -2)&0x0f]) << (13)) | ((x[(22 -2)&0x0f]) >> (32 - (13))))^(x[(22 -2)&0x0f]>>10)) + x[(22 -7)&0x0f] + ((((x[(22 -15)&0x0f]) << (25)) | ((x[(22 -15)&0x0f]) >> (32 - (25))))^(((x[(22 -15)&0x0f]) << (14)) | ((x[(22 -15)&0x0f]) >> (32 - (14))))^(x[(22 -15)&0x0f]>>3)) + x[22&0x0f] , x[22&0x0f] = tm ); f += t1; b = t0 + t1; } while(0); | - | ||||||||||||
| 444 | do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[23] + ( tm = ((((x[(23 -2)&0x0f]) << (15)) | ((x[(23 -2)&0x0f]) >> (32 - (15))))^(((x[(23 -2)&0x0f]) << (13)) | ((x[(23 -2)&0x0f]) >> (32 - (13))))^(x[(23 -2)&0x0f]>>10)) + x[(23 -7)&0x0f] + ((((x[(23 -15)&0x0f]) << (25)) | ((x[(23 -15)&0x0f]) >> (32 - (25))))^(((x[(23 -15)&0x0f]) << (14)) | ((x[(23 -15)&0x0f]) >> (32 - (14))))^(x[(23 -15)&0x0f]>>3)) + x[23&0x0f] , x[23&0x0f] = tm ); e += t1; a = t0 + t1; } while(0); | - | ||||||||||||
| 445 | do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[24] + ( tm = ((((x[(24 -2)&0x0f]) << (15)) | ((x[(24 -2)&0x0f]) >> (32 - (15))))^(((x[(24 -2)&0x0f]) << (13)) | ((x[(24 -2)&0x0f]) >> (32 - (13))))^(x[(24 -2)&0x0f]>>10)) + x[(24 -7)&0x0f] + ((((x[(24 -15)&0x0f]) << (25)) | ((x[(24 -15)&0x0f]) >> (32 - (25))))^(((x[(24 -15)&0x0f]) << (14)) | ((x[(24 -15)&0x0f]) >> (32 - (14))))^(x[(24 -15)&0x0f]>>3)) + x[24&0x0f] , x[24&0x0f] = tm ); d += t1; h = t0 + t1; } while(0); | - | ||||||||||||
| 446 | do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[25] + ( tm = ((((x[(25 -2)&0x0f]) << (15)) | ((x[(25 -2)&0x0f]) >> (32 - (15))))^(((x[(25 -2)&0x0f]) << (13)) | ((x[(25 -2)&0x0f]) >> (32 - (13))))^(x[(25 -2)&0x0f]>>10)) + x[(25 -7)&0x0f] + ((((x[(25 -15)&0x0f]) << (25)) | ((x[(25 -15)&0x0f]) >> (32 - (25))))^(((x[(25 -15)&0x0f]) << (14)) | ((x[(25 -15)&0x0f]) >> (32 - (14))))^(x[(25 -15)&0x0f]>>3)) + x[25&0x0f] , x[25&0x0f] = tm ); c += t1; g = t0 + t1; } while(0); | - | ||||||||||||
| 447 | do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[26] + ( tm = ((((x[(26 -2)&0x0f]) << (15)) | ((x[(26 -2)&0x0f]) >> (32 - (15))))^(((x[(26 -2)&0x0f]) << (13)) | ((x[(26 -2)&0x0f]) >> (32 - (13))))^(x[(26 -2)&0x0f]>>10)) + x[(26 -7)&0x0f] + ((((x[(26 -15)&0x0f]) << (25)) | ((x[(26 -15)&0x0f]) >> (32 - (25))))^(((x[(26 -15)&0x0f]) << (14)) | ((x[(26 -15)&0x0f]) >> (32 - (14))))^(x[(26 -15)&0x0f]>>3)) + x[26&0x0f] , x[26&0x0f] = tm ); b += t1; f = t0 + t1; } while(0); | - | ||||||||||||
| 448 | do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[27] + ( tm = ((((x[(27 -2)&0x0f]) << (15)) | ((x[(27 -2)&0x0f]) >> (32 - (15))))^(((x[(27 -2)&0x0f]) << (13)) | ((x[(27 -2)&0x0f]) >> (32 - (13))))^(x[(27 -2)&0x0f]>>10)) + x[(27 -7)&0x0f] + ((((x[(27 -15)&0x0f]) << (25)) | ((x[(27 -15)&0x0f]) >> (32 - (25))))^(((x[(27 -15)&0x0f]) << (14)) | ((x[(27 -15)&0x0f]) >> (32 - (14))))^(x[(27 -15)&0x0f]>>3)) + x[27&0x0f] , x[27&0x0f] = tm ); a += t1; e = t0 + t1; } while(0); | - | ||||||||||||
| 449 | do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[28] + ( tm = ((((x[(28 -2)&0x0f]) << (15)) | ((x[(28 -2)&0x0f]) >> (32 - (15))))^(((x[(28 -2)&0x0f]) << (13)) | ((x[(28 -2)&0x0f]) >> (32 - (13))))^(x[(28 -2)&0x0f]>>10)) + x[(28 -7)&0x0f] + ((((x[(28 -15)&0x0f]) << (25)) | ((x[(28 -15)&0x0f]) >> (32 - (25))))^(((x[(28 -15)&0x0f]) << (14)) | ((x[(28 -15)&0x0f]) >> (32 - (14))))^(x[(28 -15)&0x0f]>>3)) + x[28&0x0f] , x[28&0x0f] = tm ); h += t1; d = t0 + t1; } while(0); | - | ||||||||||||
| 450 | do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[29] + ( tm = ((((x[(29 -2)&0x0f]) << (15)) | ((x[(29 -2)&0x0f]) >> (32 - (15))))^(((x[(29 -2)&0x0f]) << (13)) | ((x[(29 -2)&0x0f]) >> (32 - (13))))^(x[(29 -2)&0x0f]>>10)) + x[(29 -7)&0x0f] + ((((x[(29 -15)&0x0f]) << (25)) | ((x[(29 -15)&0x0f]) >> (32 - (25))))^(((x[(29 -15)&0x0f]) << (14)) | ((x[(29 -15)&0x0f]) >> (32 - (14))))^(x[(29 -15)&0x0f]>>3)) + x[29&0x0f] , x[29&0x0f] = tm ); g += t1; c = t0 + t1; } while(0); | - | ||||||||||||
| 451 | do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[30] + ( tm = ((((x[(30 -2)&0x0f]) << (15)) | ((x[(30 -2)&0x0f]) >> (32 - (15))))^(((x[(30 -2)&0x0f]) << (13)) | ((x[(30 -2)&0x0f]) >> (32 - (13))))^(x[(30 -2)&0x0f]>>10)) + x[(30 -7)&0x0f] + ((((x[(30 -15)&0x0f]) << (25)) | ((x[(30 -15)&0x0f]) >> (32 - (25))))^(((x[(30 -15)&0x0f]) << (14)) | ((x[(30 -15)&0x0f]) >> (32 - (14))))^(x[(30 -15)&0x0f]>>3)) + x[30&0x0f] , x[30&0x0f] = tm ); f += t1; b = t0 + t1; } while(0); | - | ||||||||||||
| 452 | do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[31] + ( tm = ((((x[(31 -2)&0x0f]) << (15)) | ((x[(31 -2)&0x0f]) >> (32 - (15))))^(((x[(31 -2)&0x0f]) << (13)) | ((x[(31 -2)&0x0f]) >> (32 - (13))))^(x[(31 -2)&0x0f]>>10)) + x[(31 -7)&0x0f] + ((((x[(31 -15)&0x0f]) << (25)) | ((x[(31 -15)&0x0f]) >> (32 - (25))))^(((x[(31 -15)&0x0f]) << (14)) | ((x[(31 -15)&0x0f]) >> (32 - (14))))^(x[(31 -15)&0x0f]>>3)) + x[31&0x0f] , x[31&0x0f] = tm ); e += t1; a = t0 + t1; } while(0); | - | ||||||||||||
| 453 | do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[32] + ( tm = ((((x[(32 -2)&0x0f]) << (15)) | ((x[(32 -2)&0x0f]) >> (32 - (15))))^(((x[(32 -2)&0x0f]) << (13)) | ((x[(32 -2)&0x0f]) >> (32 - (13))))^(x[(32 -2)&0x0f]>>10)) + x[(32 -7)&0x0f] + ((((x[(32 -15)&0x0f]) << (25)) | ((x[(32 -15)&0x0f]) >> (32 - (25))))^(((x[(32 -15)&0x0f]) << (14)) | ((x[(32 -15)&0x0f]) >> (32 - (14))))^(x[(32 -15)&0x0f]>>3)) + x[32&0x0f] , x[32&0x0f] = tm ); d += t1; h = t0 + t1; } while(0); | - | ||||||||||||
| 454 | do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[33] + ( tm = ((((x[(33 -2)&0x0f]) << (15)) | ((x[(33 -2)&0x0f]) >> (32 - (15))))^(((x[(33 -2)&0x0f]) << (13)) | ((x[(33 -2)&0x0f]) >> (32 - (13))))^(x[(33 -2)&0x0f]>>10)) + x[(33 -7)&0x0f] + ((((x[(33 -15)&0x0f]) << (25)) | ((x[(33 -15)&0x0f]) >> (32 - (25))))^(((x[(33 -15)&0x0f]) << (14)) | ((x[(33 -15)&0x0f]) >> (32 - (14))))^(x[(33 -15)&0x0f]>>3)) + x[33&0x0f] , x[33&0x0f] = tm ); c += t1; g = t0 + t1; } while(0); | - | ||||||||||||
| 455 | do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[34] + ( tm = ((((x[(34 -2)&0x0f]) << (15)) | ((x[(34 -2)&0x0f]) >> (32 - (15))))^(((x[(34 -2)&0x0f]) << (13)) | ((x[(34 -2)&0x0f]) >> (32 - (13))))^(x[(34 -2)&0x0f]>>10)) + x[(34 -7)&0x0f] + ((((x[(34 -15)&0x0f]) << (25)) | ((x[(34 -15)&0x0f]) >> (32 - (25))))^(((x[(34 -15)&0x0f]) << (14)) | ((x[(34 -15)&0x0f]) >> (32 - (14))))^(x[(34 -15)&0x0f]>>3)) + x[34&0x0f] , x[34&0x0f] = tm ); b += t1; f = t0 + t1; } while(0); | - | ||||||||||||
| 456 | do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[35] + ( tm = ((((x[(35 -2)&0x0f]) << (15)) | ((x[(35 -2)&0x0f]) >> (32 - (15))))^(((x[(35 -2)&0x0f]) << (13)) | ((x[(35 -2)&0x0f]) >> (32 - (13))))^(x[(35 -2)&0x0f]>>10)) + x[(35 -7)&0x0f] + ((((x[(35 -15)&0x0f]) << (25)) | ((x[(35 -15)&0x0f]) >> (32 - (25))))^(((x[(35 -15)&0x0f]) << (14)) | ((x[(35 -15)&0x0f]) >> (32 - (14))))^(x[(35 -15)&0x0f]>>3)) + x[35&0x0f] , x[35&0x0f] = tm ); a += t1; e = t0 + t1; } while(0); | - | ||||||||||||
| 457 | do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[36] + ( tm = ((((x[(36 -2)&0x0f]) << (15)) | ((x[(36 -2)&0x0f]) >> (32 - (15))))^(((x[(36 -2)&0x0f]) << (13)) | ((x[(36 -2)&0x0f]) >> (32 - (13))))^(x[(36 -2)&0x0f]>>10)) + x[(36 -7)&0x0f] + ((((x[(36 -15)&0x0f]) << (25)) | ((x[(36 -15)&0x0f]) >> (32 - (25))))^(((x[(36 -15)&0x0f]) << (14)) | ((x[(36 -15)&0x0f]) >> (32 - (14))))^(x[(36 -15)&0x0f]>>3)) + x[36&0x0f] , x[36&0x0f] = tm ); h += t1; d = t0 + t1; } while(0); | - | ||||||||||||
| 458 | do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[37] + ( tm = ((((x[(37 -2)&0x0f]) << (15)) | ((x[(37 -2)&0x0f]) >> (32 - (15))))^(((x[(37 -2)&0x0f]) << (13)) | ((x[(37 -2)&0x0f]) >> (32 - (13))))^(x[(37 -2)&0x0f]>>10)) + x[(37 -7)&0x0f] + ((((x[(37 -15)&0x0f]) << (25)) | ((x[(37 -15)&0x0f]) >> (32 - (25))))^(((x[(37 -15)&0x0f]) << (14)) | ((x[(37 -15)&0x0f]) >> (32 - (14))))^(x[(37 -15)&0x0f]>>3)) + x[37&0x0f] , x[37&0x0f] = tm ); g += t1; c = t0 + t1; } while(0); | - | ||||||||||||
| 459 | do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[38] + ( tm = ((((x[(38 -2)&0x0f]) << (15)) | ((x[(38 -2)&0x0f]) >> (32 - (15))))^(((x[(38 -2)&0x0f]) << (13)) | ((x[(38 -2)&0x0f]) >> (32 - (13))))^(x[(38 -2)&0x0f]>>10)) + x[(38 -7)&0x0f] + ((((x[(38 -15)&0x0f]) << (25)) | ((x[(38 -15)&0x0f]) >> (32 - (25))))^(((x[(38 -15)&0x0f]) << (14)) | ((x[(38 -15)&0x0f]) >> (32 - (14))))^(x[(38 -15)&0x0f]>>3)) + x[38&0x0f] , x[38&0x0f] = tm ); f += t1; b = t0 + t1; } while(0); | - | ||||||||||||
| 460 | do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[39] + ( tm = ((((x[(39 -2)&0x0f]) << (15)) | ((x[(39 -2)&0x0f]) >> (32 - (15))))^(((x[(39 -2)&0x0f]) << (13)) | ((x[(39 -2)&0x0f]) >> (32 - (13))))^(x[(39 -2)&0x0f]>>10)) + x[(39 -7)&0x0f] + ((((x[(39 -15)&0x0f]) << (25)) | ((x[(39 -15)&0x0f]) >> (32 - (25))))^(((x[(39 -15)&0x0f]) << (14)) | ((x[(39 -15)&0x0f]) >> (32 - (14))))^(x[(39 -15)&0x0f]>>3)) + x[39&0x0f] , x[39&0x0f] = tm ); e += t1; a = t0 + t1; } while(0); | - | ||||||||||||
| 461 | do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[40] + ( tm = ((((x[(40 -2)&0x0f]) << (15)) | ((x[(40 -2)&0x0f]) >> (32 - (15))))^(((x[(40 -2)&0x0f]) << (13)) | ((x[(40 -2)&0x0f]) >> (32 - (13))))^(x[(40 -2)&0x0f]>>10)) + x[(40 -7)&0x0f] + ((((x[(40 -15)&0x0f]) << (25)) | ((x[(40 -15)&0x0f]) >> (32 - (25))))^(((x[(40 -15)&0x0f]) << (14)) | ((x[(40 -15)&0x0f]) >> (32 - (14))))^(x[(40 -15)&0x0f]>>3)) + x[40&0x0f] , x[40&0x0f] = tm ); d += t1; h = t0 + t1; } while(0); | - | ||||||||||||
| 462 | do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[41] + ( tm = ((((x[(41 -2)&0x0f]) << (15)) | ((x[(41 -2)&0x0f]) >> (32 - (15))))^(((x[(41 -2)&0x0f]) << (13)) | ((x[(41 -2)&0x0f]) >> (32 - (13))))^(x[(41 -2)&0x0f]>>10)) + x[(41 -7)&0x0f] + ((((x[(41 -15)&0x0f]) << (25)) | ((x[(41 -15)&0x0f]) >> (32 - (25))))^(((x[(41 -15)&0x0f]) << (14)) | ((x[(41 -15)&0x0f]) >> (32 - (14))))^(x[(41 -15)&0x0f]>>3)) + x[41&0x0f] , x[41&0x0f] = tm ); c += t1; g = t0 + t1; } while(0); | - | ||||||||||||
| 463 | do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[42] + ( tm = ((((x[(42 -2)&0x0f]) << (15)) | ((x[(42 -2)&0x0f]) >> (32 - (15))))^(((x[(42 -2)&0x0f]) << (13)) | ((x[(42 -2)&0x0f]) >> (32 - (13))))^(x[(42 -2)&0x0f]>>10)) + x[(42 -7)&0x0f] + ((((x[(42 -15)&0x0f]) << (25)) | ((x[(42 -15)&0x0f]) >> (32 - (25))))^(((x[(42 -15)&0x0f]) << (14)) | ((x[(42 -15)&0x0f]) >> (32 - (14))))^(x[(42 -15)&0x0f]>>3)) + x[42&0x0f] , x[42&0x0f] = tm ); b += t1; f = t0 + t1; } while(0); | - | ||||||||||||
| 464 | do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[43] + ( tm = ((((x[(43 -2)&0x0f]) << (15)) | ((x[(43 -2)&0x0f]) >> (32 - (15))))^(((x[(43 -2)&0x0f]) << (13)) | ((x[(43 -2)&0x0f]) >> (32 - (13))))^(x[(43 -2)&0x0f]>>10)) + x[(43 -7)&0x0f] + ((((x[(43 -15)&0x0f]) << (25)) | ((x[(43 -15)&0x0f]) >> (32 - (25))))^(((x[(43 -15)&0x0f]) << (14)) | ((x[(43 -15)&0x0f]) >> (32 - (14))))^(x[(43 -15)&0x0f]>>3)) + x[43&0x0f] , x[43&0x0f] = tm ); a += t1; e = t0 + t1; } while(0); | - | ||||||||||||
| 465 | do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[44] + ( tm = ((((x[(44 -2)&0x0f]) << (15)) | ((x[(44 -2)&0x0f]) >> (32 - (15))))^(((x[(44 -2)&0x0f]) << (13)) | ((x[(44 -2)&0x0f]) >> (32 - (13))))^(x[(44 -2)&0x0f]>>10)) + x[(44 -7)&0x0f] + ((((x[(44 -15)&0x0f]) << (25)) | ((x[(44 -15)&0x0f]) >> (32 - (25))))^(((x[(44 -15)&0x0f]) << (14)) | ((x[(44 -15)&0x0f]) >> (32 - (14))))^(x[(44 -15)&0x0f]>>3)) + x[44&0x0f] , x[44&0x0f] = tm ); h += t1; d = t0 + t1; } while(0); | - | ||||||||||||
| 466 | do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[45] + ( tm = ((((x[(45 -2)&0x0f]) << (15)) | ((x[(45 -2)&0x0f]) >> (32 - (15))))^(((x[(45 -2)&0x0f]) << (13)) | ((x[(45 -2)&0x0f]) >> (32 - (13))))^(x[(45 -2)&0x0f]>>10)) + x[(45 -7)&0x0f] + ((((x[(45 -15)&0x0f]) << (25)) | ((x[(45 -15)&0x0f]) >> (32 - (25))))^(((x[(45 -15)&0x0f]) << (14)) | ((x[(45 -15)&0x0f]) >> (32 - (14))))^(x[(45 -15)&0x0f]>>3)) + x[45&0x0f] , x[45&0x0f] = tm ); g += t1; c = t0 + t1; } while(0); | - | ||||||||||||
| 467 | do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[46] + ( tm = ((((x[(46 -2)&0x0f]) << (15)) | ((x[(46 -2)&0x0f]) >> (32 - (15))))^(((x[(46 -2)&0x0f]) << (13)) | ((x[(46 -2)&0x0f]) >> (32 - (13))))^(x[(46 -2)&0x0f]>>10)) + x[(46 -7)&0x0f] + ((((x[(46 -15)&0x0f]) << (25)) | ((x[(46 -15)&0x0f]) >> (32 - (25))))^(((x[(46 -15)&0x0f]) << (14)) | ((x[(46 -15)&0x0f]) >> (32 - (14))))^(x[(46 -15)&0x0f]>>3)) + x[46&0x0f] , x[46&0x0f] = tm ); f += t1; b = t0 + t1; } while(0); | - | ||||||||||||
| 468 | do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[47] + ( tm = ((((x[(47 -2)&0x0f]) << (15)) | ((x[(47 -2)&0x0f]) >> (32 - (15))))^(((x[(47 -2)&0x0f]) << (13)) | ((x[(47 -2)&0x0f]) >> (32 - (13))))^(x[(47 -2)&0x0f]>>10)) + x[(47 -7)&0x0f] + ((((x[(47 -15)&0x0f]) << (25)) | ((x[(47 -15)&0x0f]) >> (32 - (25))))^(((x[(47 -15)&0x0f]) << (14)) | ((x[(47 -15)&0x0f]) >> (32 - (14))))^(x[(47 -15)&0x0f]>>3)) + x[47&0x0f] , x[47&0x0f] = tm ); e += t1; a = t0 + t1; } while(0); | - | ||||||||||||
| 469 | do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[48] + ( tm = ((((x[(48 -2)&0x0f]) << (15)) | ((x[(48 -2)&0x0f]) >> (32 - (15))))^(((x[(48 -2)&0x0f]) << (13)) | ((x[(48 -2)&0x0f]) >> (32 - (13))))^(x[(48 -2)&0x0f]>>10)) + x[(48 -7)&0x0f] + ((((x[(48 -15)&0x0f]) << (25)) | ((x[(48 -15)&0x0f]) >> (32 - (25))))^(((x[(48 -15)&0x0f]) << (14)) | ((x[(48 -15)&0x0f]) >> (32 - (14))))^(x[(48 -15)&0x0f]>>3)) + x[48&0x0f] , x[48&0x0f] = tm ); d += t1; h = t0 + t1; } while(0); | - | ||||||||||||
| 470 | do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[49] + ( tm = ((((x[(49 -2)&0x0f]) << (15)) | ((x[(49 -2)&0x0f]) >> (32 - (15))))^(((x[(49 -2)&0x0f]) << (13)) | ((x[(49 -2)&0x0f]) >> (32 - (13))))^(x[(49 -2)&0x0f]>>10)) + x[(49 -7)&0x0f] + ((((x[(49 -15)&0x0f]) << (25)) | ((x[(49 -15)&0x0f]) >> (32 - (25))))^(((x[(49 -15)&0x0f]) << (14)) | ((x[(49 -15)&0x0f]) >> (32 - (14))))^(x[(49 -15)&0x0f]>>3)) + x[49&0x0f] , x[49&0x0f] = tm ); c += t1; g = t0 + t1; } while(0); | - | ||||||||||||
| 471 | do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[50] + ( tm = ((((x[(50 -2)&0x0f]) << (15)) | ((x[(50 -2)&0x0f]) >> (32 - (15))))^(((x[(50 -2)&0x0f]) << (13)) | ((x[(50 -2)&0x0f]) >> (32 - (13))))^(x[(50 -2)&0x0f]>>10)) + x[(50 -7)&0x0f] + ((((x[(50 -15)&0x0f]) << (25)) | ((x[(50 -15)&0x0f]) >> (32 - (25))))^(((x[(50 -15)&0x0f]) << (14)) | ((x[(50 -15)&0x0f]) >> (32 - (14))))^(x[(50 -15)&0x0f]>>3)) + x[50&0x0f] , x[50&0x0f] = tm ); b += t1; f = t0 + t1; } while(0); | - | ||||||||||||
| 472 | do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[51] + ( tm = ((((x[(51 -2)&0x0f]) << (15)) | ((x[(51 -2)&0x0f]) >> (32 - (15))))^(((x[(51 -2)&0x0f]) << (13)) | ((x[(51 -2)&0x0f]) >> (32 - (13))))^(x[(51 -2)&0x0f]>>10)) + x[(51 -7)&0x0f] + ((((x[(51 -15)&0x0f]) << (25)) | ((x[(51 -15)&0x0f]) >> (32 - (25))))^(((x[(51 -15)&0x0f]) << (14)) | ((x[(51 -15)&0x0f]) >> (32 - (14))))^(x[(51 -15)&0x0f]>>3)) + x[51&0x0f] , x[51&0x0f] = tm ); a += t1; e = t0 + t1; } while(0); | - | ||||||||||||
| 473 | do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[52] + ( tm = ((((x[(52 -2)&0x0f]) << (15)) | ((x[(52 -2)&0x0f]) >> (32 - (15))))^(((x[(52 -2)&0x0f]) << (13)) | ((x[(52 -2)&0x0f]) >> (32 - (13))))^(x[(52 -2)&0x0f]>>10)) + x[(52 -7)&0x0f] + ((((x[(52 -15)&0x0f]) << (25)) | ((x[(52 -15)&0x0f]) >> (32 - (25))))^(((x[(52 -15)&0x0f]) << (14)) | ((x[(52 -15)&0x0f]) >> (32 - (14))))^(x[(52 -15)&0x0f]>>3)) + x[52&0x0f] , x[52&0x0f] = tm ); h += t1; d = t0 + t1; } while(0); | - | ||||||||||||
| 474 | do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[53] + ( tm = ((((x[(53 -2)&0x0f]) << (15)) | ((x[(53 -2)&0x0f]) >> (32 - (15))))^(((x[(53 -2)&0x0f]) << (13)) | ((x[(53 -2)&0x0f]) >> (32 - (13))))^(x[(53 -2)&0x0f]>>10)) + x[(53 -7)&0x0f] + ((((x[(53 -15)&0x0f]) << (25)) | ((x[(53 -15)&0x0f]) >> (32 - (25))))^(((x[(53 -15)&0x0f]) << (14)) | ((x[(53 -15)&0x0f]) >> (32 - (14))))^(x[(53 -15)&0x0f]>>3)) + x[53&0x0f] , x[53&0x0f] = tm ); g += t1; c = t0 + t1; } while(0); | - | ||||||||||||
| 475 | do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[54] + ( tm = ((((x[(54 -2)&0x0f]) << (15)) | ((x[(54 -2)&0x0f]) >> (32 - (15))))^(((x[(54 -2)&0x0f]) << (13)) | ((x[(54 -2)&0x0f]) >> (32 - (13))))^(x[(54 -2)&0x0f]>>10)) + x[(54 -7)&0x0f] + ((((x[(54 -15)&0x0f]) << (25)) | ((x[(54 -15)&0x0f]) >> (32 - (25))))^(((x[(54 -15)&0x0f]) << (14)) | ((x[(54 -15)&0x0f]) >> (32 - (14))))^(x[(54 -15)&0x0f]>>3)) + x[54&0x0f] , x[54&0x0f] = tm ); f += t1; b = t0 + t1; } while(0); | - | ||||||||||||
| 476 | do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[55] + ( tm = ((((x[(55 -2)&0x0f]) << (15)) | ((x[(55 -2)&0x0f]) >> (32 - (15))))^(((x[(55 -2)&0x0f]) << (13)) | ((x[(55 -2)&0x0f]) >> (32 - (13))))^(x[(55 -2)&0x0f]>>10)) + x[(55 -7)&0x0f] + ((((x[(55 -15)&0x0f]) << (25)) | ((x[(55 -15)&0x0f]) >> (32 - (25))))^(((x[(55 -15)&0x0f]) << (14)) | ((x[(55 -15)&0x0f]) >> (32 - (14))))^(x[(55 -15)&0x0f]>>3)) + x[55&0x0f] , x[55&0x0f] = tm ); e += t1; a = t0 + t1; } while(0); | - | ||||||||||||
| 477 | do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[56] + ( tm = ((((x[(56 -2)&0x0f]) << (15)) | ((x[(56 -2)&0x0f]) >> (32 - (15))))^(((x[(56 -2)&0x0f]) << (13)) | ((x[(56 -2)&0x0f]) >> (32 - (13))))^(x[(56 -2)&0x0f]>>10)) + x[(56 -7)&0x0f] + ((((x[(56 -15)&0x0f]) << (25)) | ((x[(56 -15)&0x0f]) >> (32 - (25))))^(((x[(56 -15)&0x0f]) << (14)) | ((x[(56 -15)&0x0f]) >> (32 - (14))))^(x[(56 -15)&0x0f]>>3)) + x[56&0x0f] , x[56&0x0f] = tm ); d += t1; h = t0 + t1; } while(0); | - | ||||||||||||
| 478 | do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[57] + ( tm = ((((x[(57 -2)&0x0f]) << (15)) | ((x[(57 -2)&0x0f]) >> (32 - (15))))^(((x[(57 -2)&0x0f]) << (13)) | ((x[(57 -2)&0x0f]) >> (32 - (13))))^(x[(57 -2)&0x0f]>>10)) + x[(57 -7)&0x0f] + ((((x[(57 -15)&0x0f]) << (25)) | ((x[(57 -15)&0x0f]) >> (32 - (25))))^(((x[(57 -15)&0x0f]) << (14)) | ((x[(57 -15)&0x0f]) >> (32 - (14))))^(x[(57 -15)&0x0f]>>3)) + x[57&0x0f] , x[57&0x0f] = tm ); c += t1; g = t0 + t1; } while(0); | - | ||||||||||||
| 479 | do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[58] + ( tm = ((((x[(58 -2)&0x0f]) << (15)) | ((x[(58 -2)&0x0f]) >> (32 - (15))))^(((x[(58 -2)&0x0f]) << (13)) | ((x[(58 -2)&0x0f]) >> (32 - (13))))^(x[(58 -2)&0x0f]>>10)) + x[(58 -7)&0x0f] + ((((x[(58 -15)&0x0f]) << (25)) | ((x[(58 -15)&0x0f]) >> (32 - (25))))^(((x[(58 -15)&0x0f]) << (14)) | ((x[(58 -15)&0x0f]) >> (32 - (14))))^(x[(58 -15)&0x0f]>>3)) + x[58&0x0f] , x[58&0x0f] = tm ); b += t1; f = t0 + t1; } while(0); | - | ||||||||||||
| 480 | do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[59] + ( tm = ((((x[(59 -2)&0x0f]) << (15)) | ((x[(59 -2)&0x0f]) >> (32 - (15))))^(((x[(59 -2)&0x0f]) << (13)) | ((x[(59 -2)&0x0f]) >> (32 - (13))))^(x[(59 -2)&0x0f]>>10)) + x[(59 -7)&0x0f] + ((((x[(59 -15)&0x0f]) << (25)) | ((x[(59 -15)&0x0f]) >> (32 - (25))))^(((x[(59 -15)&0x0f]) << (14)) | ((x[(59 -15)&0x0f]) >> (32 - (14))))^(x[(59 -15)&0x0f]>>3)) + x[59&0x0f] , x[59&0x0f] = tm ); a += t1; e = t0 + t1; } while(0); | - | ||||||||||||
| 481 | do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[60] + ( tm = ((((x[(60 -2)&0x0f]) << (15)) | ((x[(60 -2)&0x0f]) >> (32 - (15))))^(((x[(60 -2)&0x0f]) << (13)) | ((x[(60 -2)&0x0f]) >> (32 - (13))))^(x[(60 -2)&0x0f]>>10)) + x[(60 -7)&0x0f] + ((((x[(60 -15)&0x0f]) << (25)) | ((x[(60 -15)&0x0f]) >> (32 - (25))))^(((x[(60 -15)&0x0f]) << (14)) | ((x[(60 -15)&0x0f]) >> (32 - (14))))^(x[(60 -15)&0x0f]>>3)) + x[60&0x0f] , x[60&0x0f] = tm ); h += t1; d = t0 + t1; } while(0); | - | ||||||||||||
| 482 | do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[61] + ( tm = ((((x[(61 -2)&0x0f]) << (15)) | ((x[(61 -2)&0x0f]) >> (32 - (15))))^(((x[(61 -2)&0x0f]) << (13)) | ((x[(61 -2)&0x0f]) >> (32 - (13))))^(x[(61 -2)&0x0f]>>10)) + x[(61 -7)&0x0f] + ((((x[(61 -15)&0x0f]) << (25)) | ((x[(61 -15)&0x0f]) >> (32 - (25))))^(((x[(61 -15)&0x0f]) << (14)) | ((x[(61 -15)&0x0f]) >> (32 - (14))))^(x[(61 -15)&0x0f]>>3)) + x[61&0x0f] , x[61&0x0f] = tm ); g += t1; c = t0 + t1; } while(0); | - | ||||||||||||
| 483 | do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[62] + ( tm = ((((x[(62 -2)&0x0f]) << (15)) | ((x[(62 -2)&0x0f]) >> (32 - (15))))^(((x[(62 -2)&0x0f]) << (13)) | ((x[(62 -2)&0x0f]) >> (32 - (13))))^(x[(62 -2)&0x0f]>>10)) + x[(62 -7)&0x0f] + ((((x[(62 -15)&0x0f]) << (25)) | ((x[(62 -15)&0x0f]) >> (32 - (25))))^(((x[(62 -15)&0x0f]) << (14)) | ((x[(62 -15)&0x0f]) >> (32 - (14))))^(x[(62 -15)&0x0f]>>3)) + x[62&0x0f] , x[62&0x0f] = tm ); f += t1; b = t0 + t1; } while(0); | - | ||||||||||||
| 484 | do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[63] + ( tm = ((((x[(63 -2)&0x0f]) << (15)) | ((x[(63 -2)&0x0f]) >> (32 - (15))))^(((x[(63 -2)&0x0f]) << (13)) | ((x[(63 -2)&0x0f]) >> (32 - (13))))^(x[(63 -2)&0x0f]>>10)) + x[(63 -7)&0x0f] + ((((x[(63 -15)&0x0f]) << (25)) | ((x[(63 -15)&0x0f]) >> (32 - (25))))^(((x[(63 -15)&0x0f]) << (14)) | ((x[(63 -15)&0x0f]) >> (32 - (14))))^(x[(63 -15)&0x0f]>>3)) + x[63&0x0f] , x[63&0x0f] = tm ); e += t1; a = t0 + t1; } while(0); | - | ||||||||||||
| 485 | - | |||||||||||||
| 486 | a = ctx->state[0] += a; | - | ||||||||||||
| 487 | b = ctx->state[1] += b; | - | ||||||||||||
| 488 | c = ctx->state[2] += c; | - | ||||||||||||
| 489 | d = ctx->state[3] += d; | - | ||||||||||||
| 490 | e = ctx->state[4] += e; | - | ||||||||||||
| 491 | f = ctx->state[5] += f; | - | ||||||||||||
| 492 | g = ctx->state[6] += g; | - | ||||||||||||
| 493 | h = ctx->state[7] += h; | - | ||||||||||||
| 494 | } executed 31264 times by 2 tests: end of blockExecuted by:
| 31264 | ||||||||||||
| 495 | } executed 74 times by 2 tests: end of blockExecuted by:
| 74 | ||||||||||||
| Switch to Source code | Preprocessed file |