OpenCoverage

sha256.c

Absolute File Name:/home/opencoverage/opencoverage/guest-scripts/coreutils/src/gnulib/lib/sha256.c
Switch to Source codePreprocessed file
LineSourceCount
1-
2-
3-
4-
5-
6-
7-
8-
9-
10static const unsigned char fillbuf[64] = { 0x80, 0 };-
11-
12-
13-
14-
15-
16-
17-
18void-
19sha256_init_ctx (struct sha256_ctx *ctx)-
20{-
21 ctx->state[0] = 0x6a09e667UL;-
22 ctx->state[1] = 0xbb67ae85UL;-
23 ctx->state[2] = 0x3c6ef372UL;-
24 ctx->state[3] = 0xa54ff53aUL;-
25 ctx->state[4] = 0x510e527fUL;-
26 ctx->state[5] = 0x9b05688cUL;-
27 ctx->state[6] = 0x1f83d9abUL;-
28 ctx->state[7] = 0x5be0cd19UL;-
29-
30 ctx->total[0] = ctx->total[1] = 0;-
31 ctx->buflen = 0;-
32}
executed 7 times by 1 test: end of block
Executed by:
  • sha256sum
7
33-
34void-
35sha224_init_ctx (struct sha256_ctx *ctx)-
36{-
37 ctx->state[0] = 0xc1059ed8UL;-
38 ctx->state[1] = 0x367cd507UL;-
39 ctx->state[2] = 0x3070dd17UL;-
40 ctx->state[3] = 0xf70e5939UL;-
41 ctx->state[4] = 0xffc00b31UL;-
42 ctx->state[5] = 0x68581511UL;-
43 ctx->state[6] = 0x64f98fa7UL;-
44 ctx->state[7] = 0xbefa4fa4UL;-
45-
46 ctx->total[0] = ctx->total[1] = 0;-
47 ctx->buflen = 0;-
48}
executed 5 times by 1 test: end of block
Executed by:
  • sha224sum
5
49-
50-
51-
52-
53static void-
54set_uint32 (char *cp, uint32_t v)-
55{-
56 memcpy (cp, &v, sizeof v);-
57}
executed 115 times by 2 tests: end of block
Executed by:
  • sha224sum
  • sha256sum
115
58-
59-
60-
61void *-
62sha256_read_ctx (const struct sha256_ctx *ctx, void *resbuf)-
63{-
64 int i;-
65 char *r = resbuf;-
66-
67 for (i = 0; i < 8
i < 8Description
TRUEevaluated 56 times by 1 test
Evaluated by:
  • sha256sum
FALSEevaluated 7 times by 1 test
Evaluated by:
  • sha256sum
; i++)
7-56
68 set_uint32 (r + i * sizeof ctx->state[0], (((ctx->state[i]) << 24) | (((ctx->state[i]) & 0xff00) << 8) | (((ctx->state[i]) >> 8) & 0xff00) | ((ctx->state[i]) >> 24)));
executed 56 times by 1 test: set_uint32 (r + i * sizeof ctx->state[0], (((ctx->state[i]) << 24) | (((ctx->state[i]) & 0xff00) << 8) | (((ctx->state[i]) >> 8) & 0xff00) | ((ctx->state[i]) >> 24)));
Executed by:
  • sha256sum
56
69-
70 return
executed 7 times by 1 test: return resbuf;
Executed by:
  • sha256sum
resbuf;
executed 7 times by 1 test: return resbuf;
Executed by:
  • sha256sum
7
71}-
72-
73void *-
74sha224_read_ctx (const struct sha256_ctx *ctx, void *resbuf)-
75{-
76 int i;-
77 char *r = resbuf;-
78-
79 for (i = 0; i < 7
i < 7Description
TRUEevaluated 35 times by 1 test
Evaluated by:
  • sha224sum
FALSEevaluated 5 times by 1 test
Evaluated by:
  • sha224sum
; i++)
5-35
80 set_uint32 (r + i * sizeof ctx->state[0], (((ctx->state[i]) << 24) | (((ctx->state[i]) & 0xff00) << 8) | (((ctx->state[i]) >> 8) & 0xff00) | ((ctx->state[i]) >> 24)));
executed 35 times by 1 test: set_uint32 (r + i * sizeof ctx->state[0], (((ctx->state[i]) << 24) | (((ctx->state[i]) & 0xff00) << 8) | (((ctx->state[i]) >> 8) & 0xff00) | ((ctx->state[i]) >> 24)));
Executed by:
  • sha224sum
35
81-
82 return
executed 5 times by 1 test: return resbuf;
Executed by:
  • sha224sum
resbuf;
executed 5 times by 1 test: return resbuf;
Executed by:
  • sha224sum
5
83}-
84-
85-
86-
87static void-
88sha256_conclude_ctx (struct sha256_ctx *ctx)-
89{-
90-
91 size_t bytes = ctx->buflen;-
92 size_t size = (
(bytes < 56)Description
TRUEevaluated 10 times by 2 tests
Evaluated by:
  • sha224sum
  • sha256sum
FALSEevaluated 2 times by 2 tests
Evaluated by:
  • sha224sum
  • sha256sum
bytes < 56)
(bytes < 56)Description
TRUEevaluated 10 times by 2 tests
Evaluated by:
  • sha224sum
  • sha256sum
FALSEevaluated 2 times by 2 tests
Evaluated by:
  • sha224sum
  • sha256sum
? 64 / 4 : 64 * 2 / 4;
2-10
93-
94-
95 ctx->total[0] += bytes;-
96 if (ctx->total[0] < bytes
ctx->total[0] < bytesDescription
TRUEnever evaluated
FALSEevaluated 12 times by 2 tests
Evaluated by:
  • sha224sum
  • sha256sum
)
0-12
97 ++
never executed: ++ctx->total[1];
ctx->total[1];
never executed: ++ctx->total[1];
0
98-
99-
100-
101-
102 set_uint32 ((char *) &ctx->buffer[size - 2],-
103 ((((ctx->total[1] << 3) | (ctx->total[0] >> 29)) << 24) | ((((ctx->total[1] << 3) | (ctx->total[0] >> 29)) & 0xff00) << 8) | ((((ctx->total[1] << 3) | (ctx->total[0] >> 29)) >> 8) & 0xff00) | (((ctx->total[1] << 3) | (ctx->total[0] >> 29)) >> 24)));-
104 set_uint32 ((char *) &ctx->buffer[size - 1],-
105 (((ctx->total[0] << 3) << 24) | (((ctx->total[0] << 3) & 0xff00) << 8) | (((ctx->total[0] << 3) >> 8) & 0xff00) | ((ctx->total[0] << 3) >> 24)));-
106-
107 memcpy (&((char *) ctx->buffer)[bytes], fillbuf, (size - 2) * 4 - bytes);-
108-
109-
110 sha256_process_block (ctx->buffer, size * 4, ctx);-
111}
executed 12 times by 2 tests: end of block
Executed by:
  • sha224sum
  • sha256sum
12
112-
113void *-
114sha256_finish_ctx (struct sha256_ctx *ctx, void *resbuf)-
115{-
116 sha256_conclude_ctx (ctx);-
117 return
executed 7 times by 1 test: return sha256_read_ctx (ctx, resbuf);
Executed by:
  • sha256sum
sha256_read_ctx (ctx, resbuf);
executed 7 times by 1 test: return sha256_read_ctx (ctx, resbuf);
Executed by:
  • sha256sum
7
118}-
119-
120void *-
121sha224_finish_ctx (struct sha256_ctx *ctx, void *resbuf)-
122{-
123 sha256_conclude_ctx (ctx);-
124 return
executed 5 times by 1 test: return sha224_read_ctx (ctx, resbuf);
Executed by:
  • sha224sum
sha224_read_ctx (ctx, resbuf);
executed 5 times by 1 test: return sha224_read_ctx (ctx, resbuf);
Executed by:
  • sha224sum
5
125}-
126-
127-
128-
129-
130-
131int-
132sha256_stream (FILE *stream, void *resblock)-
133{-
134 struct sha256_ctx ctx;-
135 size_t sum;-
136-
137 char *buffer = malloc (32768 + 72);-
138 if (!buffer
!bufferDescription
TRUEnever evaluated
FALSEevaluated 7 times by 1 test
Evaluated by:
  • sha256sum
)
0-7
139 return
never executed: return 1;
1;
never executed: return 1;
0
140-
141-
142 sha256_init_ctx (&ctx);-
143-
144-
145 while (1)-
146 {-
147-
148-
149-
150 size_t n;-
151 sum = 0;-
152-
153-
154 while (1)-
155 {-
156 n = fread_unlocked (buffer + sum,1,32768 - sum,stream);-
157-
158 sum += n;-
159-
160 if (sum == 32768
sum == 32768Description
TRUEevaluated 30 times by 1 test
Evaluated by:
  • sha256sum
FALSEevaluated 7 times by 1 test
Evaluated by:
  • sha256sum
)
7-30
161 break;
executed 30 times by 1 test: break;
Executed by:
  • sha256sum
30
162-
163 if (n == 0
n == 0Description
TRUEevaluated 1 time by 1 test
Evaluated by:
  • sha256sum
FALSEevaluated 6 times by 1 test
Evaluated by:
  • sha256sum
)
1-6
164 {-
165-
166-
167-
168 if (ferror_unlocked (stream)
ferror_unlocked (stream)Description
TRUEnever evaluated
FALSEevaluated 1 time by 1 test
Evaluated by:
  • sha256sum
)
0-1
169 {-
170 free (buffer);-
171 return
never executed: return 1;
1;
never executed: return 1;
0
172 }-
173 goto
executed 1 time by 1 test: goto process_partial_block;
Executed by:
  • sha256sum
process_partial_block;
executed 1 time by 1 test: goto process_partial_block;
Executed by:
  • sha256sum
1
174 }-
175-
176-
177-
178-
179 if (feof_unlocked (stream)
feof_unlocked (stream)Description
TRUEevaluated 6 times by 1 test
Evaluated by:
  • sha256sum
FALSEnever evaluated
)
0-6
180 goto
executed 6 times by 1 test: goto process_partial_block;
Executed by:
  • sha256sum
process_partial_block;
executed 6 times by 1 test: goto process_partial_block;
Executed by:
  • sha256sum
6
181 }
never executed: end of block
0
182-
183-
184-
185-
186 sha256_process_block (buffer, 32768, &ctx);-
187 }
executed 30 times by 1 test: end of block
Executed by:
  • sha256sum
30
188-
189 process_partial_block:
code before this statement never executed: process_partial_block:
;
0
190-
191-
192 if (sum > 0
sum > 0Description
TRUEevaluated 6 times by 1 test
Evaluated by:
  • sha256sum
FALSEevaluated 1 time by 1 test
Evaluated by:
  • sha256sum
)
1-6
193 sha256_process_bytes (buffer, sum, &ctx);
executed 6 times by 1 test: sha256_process_bytes (buffer, sum, &ctx);
Executed by:
  • sha256sum
6
194-
195-
196 sha256_finish_ctx (&ctx, resblock);-
197 free (buffer);-
198 return
executed 7 times by 1 test: return 0;
Executed by:
  • sha256sum
0;
executed 7 times by 1 test: return 0;
Executed by:
  • sha256sum
7
199}-
200-
201-
202int-
203sha224_stream (FILE *stream, void *resblock)-
204{-
205 struct sha256_ctx ctx;-
206 size_t sum;-
207-
208 char *buffer = malloc (32768 + 72);-
209 if (!buffer
!bufferDescription
TRUEnever evaluated
FALSEevaluated 5 times by 1 test
Evaluated by:
  • sha224sum
)
0-5
210 return
never executed: return 1;
1;
never executed: return 1;
0
211-
212-
213 sha224_init_ctx (&ctx);-
214-
215-
216 while (1)-
217 {-
218-
219-
220-
221 size_t n;-
222 sum = 0;-
223-
224-
225 while (1)-
226 {-
227 n = fread_unlocked (buffer + sum,1,32768 - sum,stream);-
228-
229 sum += n;-
230-
231 if (sum == 32768
sum == 32768Description
TRUEevaluated 30 times by 1 test
Evaluated by:
  • sha224sum
FALSEevaluated 5 times by 1 test
Evaluated by:
  • sha224sum
)
5-30
232 break;
executed 30 times by 1 test: break;
Executed by:
  • sha224sum
30
233-
234 if (n == 0
n == 0Description
TRUEnever evaluated
FALSEevaluated 5 times by 1 test
Evaluated by:
  • sha224sum
)
0-5
235 {-
236-
237-
238-
239 if (ferror_unlocked (stream)
ferror_unlocked (stream)Description
TRUEnever evaluated
FALSEnever evaluated
)
0
240 {-
241 free (buffer);-
242 return
never executed: return 1;
1;
never executed: return 1;
0
243 }-
244 goto
never executed: goto process_partial_block;
process_partial_block;
never executed: goto process_partial_block;
0
245 }-
246-
247-
248-
249-
250 if (feof_unlocked (stream)
feof_unlocked (stream)Description
TRUEevaluated 5 times by 1 test
Evaluated by:
  • sha224sum
FALSEnever evaluated
)
0-5
251 goto
executed 5 times by 1 test: goto process_partial_block;
Executed by:
  • sha224sum
process_partial_block;
executed 5 times by 1 test: goto process_partial_block;
Executed by:
  • sha224sum
5
252 }
never executed: end of block
0
253-
254-
255-
256-
257 sha256_process_block (buffer, 32768, &ctx);-
258 }
executed 30 times by 1 test: end of block
Executed by:
  • sha224sum
30
259-
260 process_partial_block:
code before this statement never executed: process_partial_block:
;
0
261-
262-
263 if (sum > 0
sum > 0Description
TRUEevaluated 5 times by 1 test
Evaluated by:
  • sha224sum
FALSEnever evaluated
)
0-5
264 sha256_process_bytes (buffer, sum, &ctx);
executed 5 times by 1 test: sha256_process_bytes (buffer, sum, &ctx);
Executed by:
  • sha224sum
5
265-
266-
267 sha224_finish_ctx (&ctx, resblock);-
268 free (buffer);-
269 return
executed 5 times by 1 test: return 0;
Executed by:
  • sha224sum
0;
executed 5 times by 1 test: return 0;
Executed by:
  • sha224sum
5
270}-
271-
272-
273-
274-
275-
276-
277void *-
278sha256_buffer (const char *buffer, size_t len, void *resblock)-
279{-
280 struct sha256_ctx ctx;-
281-
282-
283 sha256_init_ctx (&ctx);-
284-
285-
286 sha256_process_bytes (buffer, len, &ctx);-
287-
288-
289 return
never executed: return sha256_finish_ctx (&ctx, resblock);
sha256_finish_ctx (&ctx, resblock);
never executed: return sha256_finish_ctx (&ctx, resblock);
0
290}-
291-
292void *-
293sha224_buffer (const char *buffer, size_t len, void *resblock)-
294{-
295 struct sha256_ctx ctx;-
296-
297-
298 sha224_init_ctx (&ctx);-
299-
300-
301 sha256_process_bytes (buffer, len, &ctx);-
302-
303-
304 return
never executed: return sha224_finish_ctx (&ctx, resblock);
sha224_finish_ctx (&ctx, resblock);
never executed: return sha224_finish_ctx (&ctx, resblock);
0
305}-
306-
307void-
308sha256_process_bytes (const void *buffer, size_t len, struct sha256_ctx *ctx)-
309{-
310-
311-
312 if (ctx->buflen != 0
ctx->buflen != 0Description
TRUEnever evaluated
FALSEevaluated 11 times by 2 tests
Evaluated by:
  • sha224sum
  • sha256sum
)
0-11
313 {-
314 size_t left_over = ctx->buflen;-
315 size_t add = 128 - left_over > len
128 - left_over > lenDescription
TRUEnever evaluated
FALSEnever evaluated
? len : 128 - left_over;
0
316-
317 memcpy (&((char *) ctx->buffer)[left_over], buffer, add);-
318 ctx->buflen += add;-
319-
320 if (ctx->buflen > 64
ctx->buflen > 64Description
TRUEnever evaluated
FALSEnever evaluated
)
0
321 {-
322 sha256_process_block (ctx->buffer, ctx->buflen & ~63, ctx);-
323-
324 ctx->buflen &= 63;-
325-
326-
327 memcpy (ctx->buffer,-
328 &((char *) ctx->buffer)[(left_over + add) & ~63],-
329 ctx->buflen);-
330 }
never executed: end of block
0
331-
332 buffer = (const char *) buffer + add;-
333 len -= add;-
334 }
never executed: end of block
0
335-
336-
337 if (len >= 64
len >= 64Description
TRUEevaluated 2 times by 2 tests
Evaluated by:
  • sha224sum
  • sha256sum
FALSEevaluated 9 times by 2 tests
Evaluated by:
  • sha224sum
  • sha256sum
)
2-9
338 {-
339 {-
340 sha256_process_block (buffer, len & ~63, ctx);-
341 buffer = (const char *) buffer + (len & ~63);-
342 len &= 63;-
343 }-
344 }
executed 2 times by 2 tests: end of block
Executed by:
  • sha224sum
  • sha256sum
2
345-
346-
347 if (len > 0
len > 0Description
TRUEevaluated 9 times by 2 tests
Evaluated by:
  • sha224sum
  • sha256sum
FALSEevaluated 2 times by 2 tests
Evaluated by:
  • sha224sum
  • sha256sum
)
2-9
348 {-
349 size_t left_over = ctx->buflen;-
350-
351 memcpy (&((char *) ctx->buffer)[left_over], buffer, len);-
352 left_over += len;-
353 if (left_over >= 64
left_over >= 64Description
TRUEnever evaluated
FALSEevaluated 9 times by 2 tests
Evaluated by:
  • sha224sum
  • sha256sum
)
0-9
354 {-
355 sha256_process_block (ctx->buffer, 64, ctx);-
356 left_over -= 64;-
357-
358-
359 memcpy (ctx->buffer, &ctx->buffer[16], left_over);-
360 }
never executed: end of block
0
361 ctx->buflen = left_over;-
362 }
executed 9 times by 2 tests: end of block
Executed by:
  • sha224sum
  • sha256sum
9
363}
executed 11 times by 2 tests: end of block
Executed by:
  • sha224sum
  • sha256sum
11
364-
365-
366-
367-
368-
369static const uint32_t sha256_round_constants[64] = {-
370 0x428a2f98UL, 0x71374491UL, 0xb5c0fbcfUL, 0xe9b5dba5UL,-
371 0x3956c25bUL, 0x59f111f1UL, 0x923f82a4UL, 0xab1c5ed5UL,-
372 0xd807aa98UL, 0x12835b01UL, 0x243185beUL, 0x550c7dc3UL,-
373 0x72be5d74UL, 0x80deb1feUL, 0x9bdc06a7UL, 0xc19bf174UL,-
374 0xe49b69c1UL, 0xefbe4786UL, 0x0fc19dc6UL, 0x240ca1ccUL,-
375 0x2de92c6fUL, 0x4a7484aaUL, 0x5cb0a9dcUL, 0x76f988daUL,-
376 0x983e5152UL, 0xa831c66dUL, 0xb00327c8UL, 0xbf597fc7UL,-
377 0xc6e00bf3UL, 0xd5a79147UL, 0x06ca6351UL, 0x14292967UL,-
378 0x27b70a85UL, 0x2e1b2138UL, 0x4d2c6dfcUL, 0x53380d13UL,-
379 0x650a7354UL, 0x766a0abbUL, 0x81c2c92eUL, 0x92722c85UL,-
380 0xa2bfe8a1UL, 0xa81a664bUL, 0xc24b8b70UL, 0xc76c51a3UL,-
381 0xd192e819UL, 0xd6990624UL, 0xf40e3585UL, 0x106aa070UL,-
382 0x19a4c116UL, 0x1e376c08UL, 0x2748774cUL, 0x34b0bcb5UL,-
383 0x391c0cb3UL, 0x4ed8aa4aUL, 0x5b9cca4fUL, 0x682e6ff3UL,-
384 0x748f82eeUL, 0x78a5636fUL, 0x84c87814UL, 0x8cc70208UL,-
385 0x90befffaUL, 0xa4506cebUL, 0xbef9a3f7UL, 0xc67178f2UL,-
386};-
387void-
388sha256_process_block (const void *buffer, size_t len, struct sha256_ctx *ctx)-
389{-
390 const uint32_t *words = buffer;-
391 size_t nwords = len / sizeof (uint32_t);-
392 const uint32_t *endp = words + nwords;-
393 uint32_t x[16];-
394 uint32_t a = ctx->state[0];-
395 uint32_t b = ctx->state[1];-
396 uint32_t c = ctx->state[2];-
397 uint32_t d = ctx->state[3];-
398 uint32_t e = ctx->state[4];-
399 uint32_t f = ctx->state[5];-
400 uint32_t g = ctx->state[6];-
401 uint32_t h = ctx->state[7];-
402 uint32_t lolen = len;-
403-
404-
405-
406-
407 ctx->total[0] += lolen;-
408 ctx->total[1] += (len >> 31 >> 1) + (ctx->total[0] < lolen);-
409 while (words < endp
words < endpDescription
TRUEevaluated 31264 times by 2 tests
Evaluated by:
  • sha224sum
  • sha256sum
FALSEevaluated 74 times by 2 tests
Evaluated by:
  • sha224sum
  • sha256sum
)
74-31264
410 {-
411 uint32_t tm;-
412 uint32_t t0, t1;-
413 int t;-
414-
415 for (t = 0; t < 16
t < 16Description
TRUEevaluated 500224 times by 2 tests
Evaluated by:
  • sha224sum
  • sha256sum
FALSEevaluated 31264 times by 2 tests
Evaluated by:
  • sha224sum
  • sha256sum
; t++)
31264-500224
416 {-
417 x[t] = (((*words) << 24) | (((*words) & 0xff00) << 8) | (((*words) >> 8) & 0xff00) | ((*words) >> 24));-
418 words++;-
419 }
executed 500224 times by 2 tests: end of block
Executed by:
  • sha224sum
  • sha256sum
500224
420-
421 do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[0] + x[ 0]; d += t1; h = t0 + t1; } while(0);-
422 do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[1] + x[ 1]; c += t1; g = t0 + t1; } while(0);-
423 do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[2] + x[ 2]; b += t1; f = t0 + t1; } while(0);-
424 do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[3] + x[ 3]; a += t1; e = t0 + t1; } while(0);-
425 do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[4] + x[ 4]; h += t1; d = t0 + t1; } while(0);-
426 do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[5] + x[ 5]; g += t1; c = t0 + t1; } while(0);-
427 do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[6] + x[ 6]; f += t1; b = t0 + t1; } while(0);-
428 do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[7] + x[ 7]; e += t1; a = t0 + t1; } while(0);-
429 do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[8] + x[ 8]; d += t1; h = t0 + t1; } while(0);-
430 do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[9] + x[ 9]; c += t1; g = t0 + t1; } while(0);-
431 do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[10] + x[10]; b += t1; f = t0 + t1; } while(0);-
432 do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[11] + x[11]; a += t1; e = t0 + t1; } while(0);-
433 do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[12] + x[12]; h += t1; d = t0 + t1; } while(0);-
434 do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[13] + x[13]; g += t1; c = t0 + t1; } while(0);-
435 do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[14] + x[14]; f += t1; b = t0 + t1; } while(0);-
436 do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[15] + x[15]; e += t1; a = t0 + t1; } while(0);-
437 do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[16] + ( tm = ((((x[(16 -2)&0x0f]) << (15)) | ((x[(16 -2)&0x0f]) >> (32 - (15))))^(((x[(16 -2)&0x0f]) << (13)) | ((x[(16 -2)&0x0f]) >> (32 - (13))))^(x[(16 -2)&0x0f]>>10)) + x[(16 -7)&0x0f] + ((((x[(16 -15)&0x0f]) << (25)) | ((x[(16 -15)&0x0f]) >> (32 - (25))))^(((x[(16 -15)&0x0f]) << (14)) | ((x[(16 -15)&0x0f]) >> (32 - (14))))^(x[(16 -15)&0x0f]>>3)) + x[16&0x0f] , x[16&0x0f] = tm ); d += t1; h = t0 + t1; } while(0);-
438 do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[17] + ( tm = ((((x[(17 -2)&0x0f]) << (15)) | ((x[(17 -2)&0x0f]) >> (32 - (15))))^(((x[(17 -2)&0x0f]) << (13)) | ((x[(17 -2)&0x0f]) >> (32 - (13))))^(x[(17 -2)&0x0f]>>10)) + x[(17 -7)&0x0f] + ((((x[(17 -15)&0x0f]) << (25)) | ((x[(17 -15)&0x0f]) >> (32 - (25))))^(((x[(17 -15)&0x0f]) << (14)) | ((x[(17 -15)&0x0f]) >> (32 - (14))))^(x[(17 -15)&0x0f]>>3)) + x[17&0x0f] , x[17&0x0f] = tm ); c += t1; g = t0 + t1; } while(0);-
439 do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[18] + ( tm = ((((x[(18 -2)&0x0f]) << (15)) | ((x[(18 -2)&0x0f]) >> (32 - (15))))^(((x[(18 -2)&0x0f]) << (13)) | ((x[(18 -2)&0x0f]) >> (32 - (13))))^(x[(18 -2)&0x0f]>>10)) + x[(18 -7)&0x0f] + ((((x[(18 -15)&0x0f]) << (25)) | ((x[(18 -15)&0x0f]) >> (32 - (25))))^(((x[(18 -15)&0x0f]) << (14)) | ((x[(18 -15)&0x0f]) >> (32 - (14))))^(x[(18 -15)&0x0f]>>3)) + x[18&0x0f] , x[18&0x0f] = tm ); b += t1; f = t0 + t1; } while(0);-
440 do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[19] + ( tm = ((((x[(19 -2)&0x0f]) << (15)) | ((x[(19 -2)&0x0f]) >> (32 - (15))))^(((x[(19 -2)&0x0f]) << (13)) | ((x[(19 -2)&0x0f]) >> (32 - (13))))^(x[(19 -2)&0x0f]>>10)) + x[(19 -7)&0x0f] + ((((x[(19 -15)&0x0f]) << (25)) | ((x[(19 -15)&0x0f]) >> (32 - (25))))^(((x[(19 -15)&0x0f]) << (14)) | ((x[(19 -15)&0x0f]) >> (32 - (14))))^(x[(19 -15)&0x0f]>>3)) + x[19&0x0f] , x[19&0x0f] = tm ); a += t1; e = t0 + t1; } while(0);-
441 do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[20] + ( tm = ((((x[(20 -2)&0x0f]) << (15)) | ((x[(20 -2)&0x0f]) >> (32 - (15))))^(((x[(20 -2)&0x0f]) << (13)) | ((x[(20 -2)&0x0f]) >> (32 - (13))))^(x[(20 -2)&0x0f]>>10)) + x[(20 -7)&0x0f] + ((((x[(20 -15)&0x0f]) << (25)) | ((x[(20 -15)&0x0f]) >> (32 - (25))))^(((x[(20 -15)&0x0f]) << (14)) | ((x[(20 -15)&0x0f]) >> (32 - (14))))^(x[(20 -15)&0x0f]>>3)) + x[20&0x0f] , x[20&0x0f] = tm ); h += t1; d = t0 + t1; } while(0);-
442 do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[21] + ( tm = ((((x[(21 -2)&0x0f]) << (15)) | ((x[(21 -2)&0x0f]) >> (32 - (15))))^(((x[(21 -2)&0x0f]) << (13)) | ((x[(21 -2)&0x0f]) >> (32 - (13))))^(x[(21 -2)&0x0f]>>10)) + x[(21 -7)&0x0f] + ((((x[(21 -15)&0x0f]) << (25)) | ((x[(21 -15)&0x0f]) >> (32 - (25))))^(((x[(21 -15)&0x0f]) << (14)) | ((x[(21 -15)&0x0f]) >> (32 - (14))))^(x[(21 -15)&0x0f]>>3)) + x[21&0x0f] , x[21&0x0f] = tm ); g += t1; c = t0 + t1; } while(0);-
443 do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[22] + ( tm = ((((x[(22 -2)&0x0f]) << (15)) | ((x[(22 -2)&0x0f]) >> (32 - (15))))^(((x[(22 -2)&0x0f]) << (13)) | ((x[(22 -2)&0x0f]) >> (32 - (13))))^(x[(22 -2)&0x0f]>>10)) + x[(22 -7)&0x0f] + ((((x[(22 -15)&0x0f]) << (25)) | ((x[(22 -15)&0x0f]) >> (32 - (25))))^(((x[(22 -15)&0x0f]) << (14)) | ((x[(22 -15)&0x0f]) >> (32 - (14))))^(x[(22 -15)&0x0f]>>3)) + x[22&0x0f] , x[22&0x0f] = tm ); f += t1; b = t0 + t1; } while(0);-
444 do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[23] + ( tm = ((((x[(23 -2)&0x0f]) << (15)) | ((x[(23 -2)&0x0f]) >> (32 - (15))))^(((x[(23 -2)&0x0f]) << (13)) | ((x[(23 -2)&0x0f]) >> (32 - (13))))^(x[(23 -2)&0x0f]>>10)) + x[(23 -7)&0x0f] + ((((x[(23 -15)&0x0f]) << (25)) | ((x[(23 -15)&0x0f]) >> (32 - (25))))^(((x[(23 -15)&0x0f]) << (14)) | ((x[(23 -15)&0x0f]) >> (32 - (14))))^(x[(23 -15)&0x0f]>>3)) + x[23&0x0f] , x[23&0x0f] = tm ); e += t1; a = t0 + t1; } while(0);-
445 do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[24] + ( tm = ((((x[(24 -2)&0x0f]) << (15)) | ((x[(24 -2)&0x0f]) >> (32 - (15))))^(((x[(24 -2)&0x0f]) << (13)) | ((x[(24 -2)&0x0f]) >> (32 - (13))))^(x[(24 -2)&0x0f]>>10)) + x[(24 -7)&0x0f] + ((((x[(24 -15)&0x0f]) << (25)) | ((x[(24 -15)&0x0f]) >> (32 - (25))))^(((x[(24 -15)&0x0f]) << (14)) | ((x[(24 -15)&0x0f]) >> (32 - (14))))^(x[(24 -15)&0x0f]>>3)) + x[24&0x0f] , x[24&0x0f] = tm ); d += t1; h = t0 + t1; } while(0);-
446 do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[25] + ( tm = ((((x[(25 -2)&0x0f]) << (15)) | ((x[(25 -2)&0x0f]) >> (32 - (15))))^(((x[(25 -2)&0x0f]) << (13)) | ((x[(25 -2)&0x0f]) >> (32 - (13))))^(x[(25 -2)&0x0f]>>10)) + x[(25 -7)&0x0f] + ((((x[(25 -15)&0x0f]) << (25)) | ((x[(25 -15)&0x0f]) >> (32 - (25))))^(((x[(25 -15)&0x0f]) << (14)) | ((x[(25 -15)&0x0f]) >> (32 - (14))))^(x[(25 -15)&0x0f]>>3)) + x[25&0x0f] , x[25&0x0f] = tm ); c += t1; g = t0 + t1; } while(0);-
447 do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[26] + ( tm = ((((x[(26 -2)&0x0f]) << (15)) | ((x[(26 -2)&0x0f]) >> (32 - (15))))^(((x[(26 -2)&0x0f]) << (13)) | ((x[(26 -2)&0x0f]) >> (32 - (13))))^(x[(26 -2)&0x0f]>>10)) + x[(26 -7)&0x0f] + ((((x[(26 -15)&0x0f]) << (25)) | ((x[(26 -15)&0x0f]) >> (32 - (25))))^(((x[(26 -15)&0x0f]) << (14)) | ((x[(26 -15)&0x0f]) >> (32 - (14))))^(x[(26 -15)&0x0f]>>3)) + x[26&0x0f] , x[26&0x0f] = tm ); b += t1; f = t0 + t1; } while(0);-
448 do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[27] + ( tm = ((((x[(27 -2)&0x0f]) << (15)) | ((x[(27 -2)&0x0f]) >> (32 - (15))))^(((x[(27 -2)&0x0f]) << (13)) | ((x[(27 -2)&0x0f]) >> (32 - (13))))^(x[(27 -2)&0x0f]>>10)) + x[(27 -7)&0x0f] + ((((x[(27 -15)&0x0f]) << (25)) | ((x[(27 -15)&0x0f]) >> (32 - (25))))^(((x[(27 -15)&0x0f]) << (14)) | ((x[(27 -15)&0x0f]) >> (32 - (14))))^(x[(27 -15)&0x0f]>>3)) + x[27&0x0f] , x[27&0x0f] = tm ); a += t1; e = t0 + t1; } while(0);-
449 do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[28] + ( tm = ((((x[(28 -2)&0x0f]) << (15)) | ((x[(28 -2)&0x0f]) >> (32 - (15))))^(((x[(28 -2)&0x0f]) << (13)) | ((x[(28 -2)&0x0f]) >> (32 - (13))))^(x[(28 -2)&0x0f]>>10)) + x[(28 -7)&0x0f] + ((((x[(28 -15)&0x0f]) << (25)) | ((x[(28 -15)&0x0f]) >> (32 - (25))))^(((x[(28 -15)&0x0f]) << (14)) | ((x[(28 -15)&0x0f]) >> (32 - (14))))^(x[(28 -15)&0x0f]>>3)) + x[28&0x0f] , x[28&0x0f] = tm ); h += t1; d = t0 + t1; } while(0);-
450 do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[29] + ( tm = ((((x[(29 -2)&0x0f]) << (15)) | ((x[(29 -2)&0x0f]) >> (32 - (15))))^(((x[(29 -2)&0x0f]) << (13)) | ((x[(29 -2)&0x0f]) >> (32 - (13))))^(x[(29 -2)&0x0f]>>10)) + x[(29 -7)&0x0f] + ((((x[(29 -15)&0x0f]) << (25)) | ((x[(29 -15)&0x0f]) >> (32 - (25))))^(((x[(29 -15)&0x0f]) << (14)) | ((x[(29 -15)&0x0f]) >> (32 - (14))))^(x[(29 -15)&0x0f]>>3)) + x[29&0x0f] , x[29&0x0f] = tm ); g += t1; c = t0 + t1; } while(0);-
451 do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[30] + ( tm = ((((x[(30 -2)&0x0f]) << (15)) | ((x[(30 -2)&0x0f]) >> (32 - (15))))^(((x[(30 -2)&0x0f]) << (13)) | ((x[(30 -2)&0x0f]) >> (32 - (13))))^(x[(30 -2)&0x0f]>>10)) + x[(30 -7)&0x0f] + ((((x[(30 -15)&0x0f]) << (25)) | ((x[(30 -15)&0x0f]) >> (32 - (25))))^(((x[(30 -15)&0x0f]) << (14)) | ((x[(30 -15)&0x0f]) >> (32 - (14))))^(x[(30 -15)&0x0f]>>3)) + x[30&0x0f] , x[30&0x0f] = tm ); f += t1; b = t0 + t1; } while(0);-
452 do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[31] + ( tm = ((((x[(31 -2)&0x0f]) << (15)) | ((x[(31 -2)&0x0f]) >> (32 - (15))))^(((x[(31 -2)&0x0f]) << (13)) | ((x[(31 -2)&0x0f]) >> (32 - (13))))^(x[(31 -2)&0x0f]>>10)) + x[(31 -7)&0x0f] + ((((x[(31 -15)&0x0f]) << (25)) | ((x[(31 -15)&0x0f]) >> (32 - (25))))^(((x[(31 -15)&0x0f]) << (14)) | ((x[(31 -15)&0x0f]) >> (32 - (14))))^(x[(31 -15)&0x0f]>>3)) + x[31&0x0f] , x[31&0x0f] = tm ); e += t1; a = t0 + t1; } while(0);-
453 do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[32] + ( tm = ((((x[(32 -2)&0x0f]) << (15)) | ((x[(32 -2)&0x0f]) >> (32 - (15))))^(((x[(32 -2)&0x0f]) << (13)) | ((x[(32 -2)&0x0f]) >> (32 - (13))))^(x[(32 -2)&0x0f]>>10)) + x[(32 -7)&0x0f] + ((((x[(32 -15)&0x0f]) << (25)) | ((x[(32 -15)&0x0f]) >> (32 - (25))))^(((x[(32 -15)&0x0f]) << (14)) | ((x[(32 -15)&0x0f]) >> (32 - (14))))^(x[(32 -15)&0x0f]>>3)) + x[32&0x0f] , x[32&0x0f] = tm ); d += t1; h = t0 + t1; } while(0);-
454 do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[33] + ( tm = ((((x[(33 -2)&0x0f]) << (15)) | ((x[(33 -2)&0x0f]) >> (32 - (15))))^(((x[(33 -2)&0x0f]) << (13)) | ((x[(33 -2)&0x0f]) >> (32 - (13))))^(x[(33 -2)&0x0f]>>10)) + x[(33 -7)&0x0f] + ((((x[(33 -15)&0x0f]) << (25)) | ((x[(33 -15)&0x0f]) >> (32 - (25))))^(((x[(33 -15)&0x0f]) << (14)) | ((x[(33 -15)&0x0f]) >> (32 - (14))))^(x[(33 -15)&0x0f]>>3)) + x[33&0x0f] , x[33&0x0f] = tm ); c += t1; g = t0 + t1; } while(0);-
455 do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[34] + ( tm = ((((x[(34 -2)&0x0f]) << (15)) | ((x[(34 -2)&0x0f]) >> (32 - (15))))^(((x[(34 -2)&0x0f]) << (13)) | ((x[(34 -2)&0x0f]) >> (32 - (13))))^(x[(34 -2)&0x0f]>>10)) + x[(34 -7)&0x0f] + ((((x[(34 -15)&0x0f]) << (25)) | ((x[(34 -15)&0x0f]) >> (32 - (25))))^(((x[(34 -15)&0x0f]) << (14)) | ((x[(34 -15)&0x0f]) >> (32 - (14))))^(x[(34 -15)&0x0f]>>3)) + x[34&0x0f] , x[34&0x0f] = tm ); b += t1; f = t0 + t1; } while(0);-
456 do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[35] + ( tm = ((((x[(35 -2)&0x0f]) << (15)) | ((x[(35 -2)&0x0f]) >> (32 - (15))))^(((x[(35 -2)&0x0f]) << (13)) | ((x[(35 -2)&0x0f]) >> (32 - (13))))^(x[(35 -2)&0x0f]>>10)) + x[(35 -7)&0x0f] + ((((x[(35 -15)&0x0f]) << (25)) | ((x[(35 -15)&0x0f]) >> (32 - (25))))^(((x[(35 -15)&0x0f]) << (14)) | ((x[(35 -15)&0x0f]) >> (32 - (14))))^(x[(35 -15)&0x0f]>>3)) + x[35&0x0f] , x[35&0x0f] = tm ); a += t1; e = t0 + t1; } while(0);-
457 do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[36] + ( tm = ((((x[(36 -2)&0x0f]) << (15)) | ((x[(36 -2)&0x0f]) >> (32 - (15))))^(((x[(36 -2)&0x0f]) << (13)) | ((x[(36 -2)&0x0f]) >> (32 - (13))))^(x[(36 -2)&0x0f]>>10)) + x[(36 -7)&0x0f] + ((((x[(36 -15)&0x0f]) << (25)) | ((x[(36 -15)&0x0f]) >> (32 - (25))))^(((x[(36 -15)&0x0f]) << (14)) | ((x[(36 -15)&0x0f]) >> (32 - (14))))^(x[(36 -15)&0x0f]>>3)) + x[36&0x0f] , x[36&0x0f] = tm ); h += t1; d = t0 + t1; } while(0);-
458 do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[37] + ( tm = ((((x[(37 -2)&0x0f]) << (15)) | ((x[(37 -2)&0x0f]) >> (32 - (15))))^(((x[(37 -2)&0x0f]) << (13)) | ((x[(37 -2)&0x0f]) >> (32 - (13))))^(x[(37 -2)&0x0f]>>10)) + x[(37 -7)&0x0f] + ((((x[(37 -15)&0x0f]) << (25)) | ((x[(37 -15)&0x0f]) >> (32 - (25))))^(((x[(37 -15)&0x0f]) << (14)) | ((x[(37 -15)&0x0f]) >> (32 - (14))))^(x[(37 -15)&0x0f]>>3)) + x[37&0x0f] , x[37&0x0f] = tm ); g += t1; c = t0 + t1; } while(0);-
459 do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[38] + ( tm = ((((x[(38 -2)&0x0f]) << (15)) | ((x[(38 -2)&0x0f]) >> (32 - (15))))^(((x[(38 -2)&0x0f]) << (13)) | ((x[(38 -2)&0x0f]) >> (32 - (13))))^(x[(38 -2)&0x0f]>>10)) + x[(38 -7)&0x0f] + ((((x[(38 -15)&0x0f]) << (25)) | ((x[(38 -15)&0x0f]) >> (32 - (25))))^(((x[(38 -15)&0x0f]) << (14)) | ((x[(38 -15)&0x0f]) >> (32 - (14))))^(x[(38 -15)&0x0f]>>3)) + x[38&0x0f] , x[38&0x0f] = tm ); f += t1; b = t0 + t1; } while(0);-
460 do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[39] + ( tm = ((((x[(39 -2)&0x0f]) << (15)) | ((x[(39 -2)&0x0f]) >> (32 - (15))))^(((x[(39 -2)&0x0f]) << (13)) | ((x[(39 -2)&0x0f]) >> (32 - (13))))^(x[(39 -2)&0x0f]>>10)) + x[(39 -7)&0x0f] + ((((x[(39 -15)&0x0f]) << (25)) | ((x[(39 -15)&0x0f]) >> (32 - (25))))^(((x[(39 -15)&0x0f]) << (14)) | ((x[(39 -15)&0x0f]) >> (32 - (14))))^(x[(39 -15)&0x0f]>>3)) + x[39&0x0f] , x[39&0x0f] = tm ); e += t1; a = t0 + t1; } while(0);-
461 do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[40] + ( tm = ((((x[(40 -2)&0x0f]) << (15)) | ((x[(40 -2)&0x0f]) >> (32 - (15))))^(((x[(40 -2)&0x0f]) << (13)) | ((x[(40 -2)&0x0f]) >> (32 - (13))))^(x[(40 -2)&0x0f]>>10)) + x[(40 -7)&0x0f] + ((((x[(40 -15)&0x0f]) << (25)) | ((x[(40 -15)&0x0f]) >> (32 - (25))))^(((x[(40 -15)&0x0f]) << (14)) | ((x[(40 -15)&0x0f]) >> (32 - (14))))^(x[(40 -15)&0x0f]>>3)) + x[40&0x0f] , x[40&0x0f] = tm ); d += t1; h = t0 + t1; } while(0);-
462 do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[41] + ( tm = ((((x[(41 -2)&0x0f]) << (15)) | ((x[(41 -2)&0x0f]) >> (32 - (15))))^(((x[(41 -2)&0x0f]) << (13)) | ((x[(41 -2)&0x0f]) >> (32 - (13))))^(x[(41 -2)&0x0f]>>10)) + x[(41 -7)&0x0f] + ((((x[(41 -15)&0x0f]) << (25)) | ((x[(41 -15)&0x0f]) >> (32 - (25))))^(((x[(41 -15)&0x0f]) << (14)) | ((x[(41 -15)&0x0f]) >> (32 - (14))))^(x[(41 -15)&0x0f]>>3)) + x[41&0x0f] , x[41&0x0f] = tm ); c += t1; g = t0 + t1; } while(0);-
463 do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[42] + ( tm = ((((x[(42 -2)&0x0f]) << (15)) | ((x[(42 -2)&0x0f]) >> (32 - (15))))^(((x[(42 -2)&0x0f]) << (13)) | ((x[(42 -2)&0x0f]) >> (32 - (13))))^(x[(42 -2)&0x0f]>>10)) + x[(42 -7)&0x0f] + ((((x[(42 -15)&0x0f]) << (25)) | ((x[(42 -15)&0x0f]) >> (32 - (25))))^(((x[(42 -15)&0x0f]) << (14)) | ((x[(42 -15)&0x0f]) >> (32 - (14))))^(x[(42 -15)&0x0f]>>3)) + x[42&0x0f] , x[42&0x0f] = tm ); b += t1; f = t0 + t1; } while(0);-
464 do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[43] + ( tm = ((((x[(43 -2)&0x0f]) << (15)) | ((x[(43 -2)&0x0f]) >> (32 - (15))))^(((x[(43 -2)&0x0f]) << (13)) | ((x[(43 -2)&0x0f]) >> (32 - (13))))^(x[(43 -2)&0x0f]>>10)) + x[(43 -7)&0x0f] + ((((x[(43 -15)&0x0f]) << (25)) | ((x[(43 -15)&0x0f]) >> (32 - (25))))^(((x[(43 -15)&0x0f]) << (14)) | ((x[(43 -15)&0x0f]) >> (32 - (14))))^(x[(43 -15)&0x0f]>>3)) + x[43&0x0f] , x[43&0x0f] = tm ); a += t1; e = t0 + t1; } while(0);-
465 do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[44] + ( tm = ((((x[(44 -2)&0x0f]) << (15)) | ((x[(44 -2)&0x0f]) >> (32 - (15))))^(((x[(44 -2)&0x0f]) << (13)) | ((x[(44 -2)&0x0f]) >> (32 - (13))))^(x[(44 -2)&0x0f]>>10)) + x[(44 -7)&0x0f] + ((((x[(44 -15)&0x0f]) << (25)) | ((x[(44 -15)&0x0f]) >> (32 - (25))))^(((x[(44 -15)&0x0f]) << (14)) | ((x[(44 -15)&0x0f]) >> (32 - (14))))^(x[(44 -15)&0x0f]>>3)) + x[44&0x0f] , x[44&0x0f] = tm ); h += t1; d = t0 + t1; } while(0);-
466 do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[45] + ( tm = ((((x[(45 -2)&0x0f]) << (15)) | ((x[(45 -2)&0x0f]) >> (32 - (15))))^(((x[(45 -2)&0x0f]) << (13)) | ((x[(45 -2)&0x0f]) >> (32 - (13))))^(x[(45 -2)&0x0f]>>10)) + x[(45 -7)&0x0f] + ((((x[(45 -15)&0x0f]) << (25)) | ((x[(45 -15)&0x0f]) >> (32 - (25))))^(((x[(45 -15)&0x0f]) << (14)) | ((x[(45 -15)&0x0f]) >> (32 - (14))))^(x[(45 -15)&0x0f]>>3)) + x[45&0x0f] , x[45&0x0f] = tm ); g += t1; c = t0 + t1; } while(0);-
467 do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[46] + ( tm = ((((x[(46 -2)&0x0f]) << (15)) | ((x[(46 -2)&0x0f]) >> (32 - (15))))^(((x[(46 -2)&0x0f]) << (13)) | ((x[(46 -2)&0x0f]) >> (32 - (13))))^(x[(46 -2)&0x0f]>>10)) + x[(46 -7)&0x0f] + ((((x[(46 -15)&0x0f]) << (25)) | ((x[(46 -15)&0x0f]) >> (32 - (25))))^(((x[(46 -15)&0x0f]) << (14)) | ((x[(46 -15)&0x0f]) >> (32 - (14))))^(x[(46 -15)&0x0f]>>3)) + x[46&0x0f] , x[46&0x0f] = tm ); f += t1; b = t0 + t1; } while(0);-
468 do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[47] + ( tm = ((((x[(47 -2)&0x0f]) << (15)) | ((x[(47 -2)&0x0f]) >> (32 - (15))))^(((x[(47 -2)&0x0f]) << (13)) | ((x[(47 -2)&0x0f]) >> (32 - (13))))^(x[(47 -2)&0x0f]>>10)) + x[(47 -7)&0x0f] + ((((x[(47 -15)&0x0f]) << (25)) | ((x[(47 -15)&0x0f]) >> (32 - (25))))^(((x[(47 -15)&0x0f]) << (14)) | ((x[(47 -15)&0x0f]) >> (32 - (14))))^(x[(47 -15)&0x0f]>>3)) + x[47&0x0f] , x[47&0x0f] = tm ); e += t1; a = t0 + t1; } while(0);-
469 do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[48] + ( tm = ((((x[(48 -2)&0x0f]) << (15)) | ((x[(48 -2)&0x0f]) >> (32 - (15))))^(((x[(48 -2)&0x0f]) << (13)) | ((x[(48 -2)&0x0f]) >> (32 - (13))))^(x[(48 -2)&0x0f]>>10)) + x[(48 -7)&0x0f] + ((((x[(48 -15)&0x0f]) << (25)) | ((x[(48 -15)&0x0f]) >> (32 - (25))))^(((x[(48 -15)&0x0f]) << (14)) | ((x[(48 -15)&0x0f]) >> (32 - (14))))^(x[(48 -15)&0x0f]>>3)) + x[48&0x0f] , x[48&0x0f] = tm ); d += t1; h = t0 + t1; } while(0);-
470 do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[49] + ( tm = ((((x[(49 -2)&0x0f]) << (15)) | ((x[(49 -2)&0x0f]) >> (32 - (15))))^(((x[(49 -2)&0x0f]) << (13)) | ((x[(49 -2)&0x0f]) >> (32 - (13))))^(x[(49 -2)&0x0f]>>10)) + x[(49 -7)&0x0f] + ((((x[(49 -15)&0x0f]) << (25)) | ((x[(49 -15)&0x0f]) >> (32 - (25))))^(((x[(49 -15)&0x0f]) << (14)) | ((x[(49 -15)&0x0f]) >> (32 - (14))))^(x[(49 -15)&0x0f]>>3)) + x[49&0x0f] , x[49&0x0f] = tm ); c += t1; g = t0 + t1; } while(0);-
471 do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[50] + ( tm = ((((x[(50 -2)&0x0f]) << (15)) | ((x[(50 -2)&0x0f]) >> (32 - (15))))^(((x[(50 -2)&0x0f]) << (13)) | ((x[(50 -2)&0x0f]) >> (32 - (13))))^(x[(50 -2)&0x0f]>>10)) + x[(50 -7)&0x0f] + ((((x[(50 -15)&0x0f]) << (25)) | ((x[(50 -15)&0x0f]) >> (32 - (25))))^(((x[(50 -15)&0x0f]) << (14)) | ((x[(50 -15)&0x0f]) >> (32 - (14))))^(x[(50 -15)&0x0f]>>3)) + x[50&0x0f] , x[50&0x0f] = tm ); b += t1; f = t0 + t1; } while(0);-
472 do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[51] + ( tm = ((((x[(51 -2)&0x0f]) << (15)) | ((x[(51 -2)&0x0f]) >> (32 - (15))))^(((x[(51 -2)&0x0f]) << (13)) | ((x[(51 -2)&0x0f]) >> (32 - (13))))^(x[(51 -2)&0x0f]>>10)) + x[(51 -7)&0x0f] + ((((x[(51 -15)&0x0f]) << (25)) | ((x[(51 -15)&0x0f]) >> (32 - (25))))^(((x[(51 -15)&0x0f]) << (14)) | ((x[(51 -15)&0x0f]) >> (32 - (14))))^(x[(51 -15)&0x0f]>>3)) + x[51&0x0f] , x[51&0x0f] = tm ); a += t1; e = t0 + t1; } while(0);-
473 do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[52] + ( tm = ((((x[(52 -2)&0x0f]) << (15)) | ((x[(52 -2)&0x0f]) >> (32 - (15))))^(((x[(52 -2)&0x0f]) << (13)) | ((x[(52 -2)&0x0f]) >> (32 - (13))))^(x[(52 -2)&0x0f]>>10)) + x[(52 -7)&0x0f] + ((((x[(52 -15)&0x0f]) << (25)) | ((x[(52 -15)&0x0f]) >> (32 - (25))))^(((x[(52 -15)&0x0f]) << (14)) | ((x[(52 -15)&0x0f]) >> (32 - (14))))^(x[(52 -15)&0x0f]>>3)) + x[52&0x0f] , x[52&0x0f] = tm ); h += t1; d = t0 + t1; } while(0);-
474 do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[53] + ( tm = ((((x[(53 -2)&0x0f]) << (15)) | ((x[(53 -2)&0x0f]) >> (32 - (15))))^(((x[(53 -2)&0x0f]) << (13)) | ((x[(53 -2)&0x0f]) >> (32 - (13))))^(x[(53 -2)&0x0f]>>10)) + x[(53 -7)&0x0f] + ((((x[(53 -15)&0x0f]) << (25)) | ((x[(53 -15)&0x0f]) >> (32 - (25))))^(((x[(53 -15)&0x0f]) << (14)) | ((x[(53 -15)&0x0f]) >> (32 - (14))))^(x[(53 -15)&0x0f]>>3)) + x[53&0x0f] , x[53&0x0f] = tm ); g += t1; c = t0 + t1; } while(0);-
475 do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[54] + ( tm = ((((x[(54 -2)&0x0f]) << (15)) | ((x[(54 -2)&0x0f]) >> (32 - (15))))^(((x[(54 -2)&0x0f]) << (13)) | ((x[(54 -2)&0x0f]) >> (32 - (13))))^(x[(54 -2)&0x0f]>>10)) + x[(54 -7)&0x0f] + ((((x[(54 -15)&0x0f]) << (25)) | ((x[(54 -15)&0x0f]) >> (32 - (25))))^(((x[(54 -15)&0x0f]) << (14)) | ((x[(54 -15)&0x0f]) >> (32 - (14))))^(x[(54 -15)&0x0f]>>3)) + x[54&0x0f] , x[54&0x0f] = tm ); f += t1; b = t0 + t1; } while(0);-
476 do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[55] + ( tm = ((((x[(55 -2)&0x0f]) << (15)) | ((x[(55 -2)&0x0f]) >> (32 - (15))))^(((x[(55 -2)&0x0f]) << (13)) | ((x[(55 -2)&0x0f]) >> (32 - (13))))^(x[(55 -2)&0x0f]>>10)) + x[(55 -7)&0x0f] + ((((x[(55 -15)&0x0f]) << (25)) | ((x[(55 -15)&0x0f]) >> (32 - (25))))^(((x[(55 -15)&0x0f]) << (14)) | ((x[(55 -15)&0x0f]) >> (32 - (14))))^(x[(55 -15)&0x0f]>>3)) + x[55&0x0f] , x[55&0x0f] = tm ); e += t1; a = t0 + t1; } while(0);-
477 do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[56] + ( tm = ((((x[(56 -2)&0x0f]) << (15)) | ((x[(56 -2)&0x0f]) >> (32 - (15))))^(((x[(56 -2)&0x0f]) << (13)) | ((x[(56 -2)&0x0f]) >> (32 - (13))))^(x[(56 -2)&0x0f]>>10)) + x[(56 -7)&0x0f] + ((((x[(56 -15)&0x0f]) << (25)) | ((x[(56 -15)&0x0f]) >> (32 - (25))))^(((x[(56 -15)&0x0f]) << (14)) | ((x[(56 -15)&0x0f]) >> (32 - (14))))^(x[(56 -15)&0x0f]>>3)) + x[56&0x0f] , x[56&0x0f] = tm ); d += t1; h = t0 + t1; } while(0);-
478 do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[57] + ( tm = ((((x[(57 -2)&0x0f]) << (15)) | ((x[(57 -2)&0x0f]) >> (32 - (15))))^(((x[(57 -2)&0x0f]) << (13)) | ((x[(57 -2)&0x0f]) >> (32 - (13))))^(x[(57 -2)&0x0f]>>10)) + x[(57 -7)&0x0f] + ((((x[(57 -15)&0x0f]) << (25)) | ((x[(57 -15)&0x0f]) >> (32 - (25))))^(((x[(57 -15)&0x0f]) << (14)) | ((x[(57 -15)&0x0f]) >> (32 - (14))))^(x[(57 -15)&0x0f]>>3)) + x[57&0x0f] , x[57&0x0f] = tm ); c += t1; g = t0 + t1; } while(0);-
479 do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[58] + ( tm = ((((x[(58 -2)&0x0f]) << (15)) | ((x[(58 -2)&0x0f]) >> (32 - (15))))^(((x[(58 -2)&0x0f]) << (13)) | ((x[(58 -2)&0x0f]) >> (32 - (13))))^(x[(58 -2)&0x0f]>>10)) + x[(58 -7)&0x0f] + ((((x[(58 -15)&0x0f]) << (25)) | ((x[(58 -15)&0x0f]) >> (32 - (25))))^(((x[(58 -15)&0x0f]) << (14)) | ((x[(58 -15)&0x0f]) >> (32 - (14))))^(x[(58 -15)&0x0f]>>3)) + x[58&0x0f] , x[58&0x0f] = tm ); b += t1; f = t0 + t1; } while(0);-
480 do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[59] + ( tm = ((((x[(59 -2)&0x0f]) << (15)) | ((x[(59 -2)&0x0f]) >> (32 - (15))))^(((x[(59 -2)&0x0f]) << (13)) | ((x[(59 -2)&0x0f]) >> (32 - (13))))^(x[(59 -2)&0x0f]>>10)) + x[(59 -7)&0x0f] + ((((x[(59 -15)&0x0f]) << (25)) | ((x[(59 -15)&0x0f]) >> (32 - (25))))^(((x[(59 -15)&0x0f]) << (14)) | ((x[(59 -15)&0x0f]) >> (32 - (14))))^(x[(59 -15)&0x0f]>>3)) + x[59&0x0f] , x[59&0x0f] = tm ); a += t1; e = t0 + t1; } while(0);-
481 do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[60] + ( tm = ((((x[(60 -2)&0x0f]) << (15)) | ((x[(60 -2)&0x0f]) >> (32 - (15))))^(((x[(60 -2)&0x0f]) << (13)) | ((x[(60 -2)&0x0f]) >> (32 - (13))))^(x[(60 -2)&0x0f]>>10)) + x[(60 -7)&0x0f] + ((((x[(60 -15)&0x0f]) << (25)) | ((x[(60 -15)&0x0f]) >> (32 - (25))))^(((x[(60 -15)&0x0f]) << (14)) | ((x[(60 -15)&0x0f]) >> (32 - (14))))^(x[(60 -15)&0x0f]>>3)) + x[60&0x0f] , x[60&0x0f] = tm ); h += t1; d = t0 + t1; } while(0);-
482 do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[61] + ( tm = ((((x[(61 -2)&0x0f]) << (15)) | ((x[(61 -2)&0x0f]) >> (32 - (15))))^(((x[(61 -2)&0x0f]) << (13)) | ((x[(61 -2)&0x0f]) >> (32 - (13))))^(x[(61 -2)&0x0f]>>10)) + x[(61 -7)&0x0f] + ((((x[(61 -15)&0x0f]) << (25)) | ((x[(61 -15)&0x0f]) >> (32 - (25))))^(((x[(61 -15)&0x0f]) << (14)) | ((x[(61 -15)&0x0f]) >> (32 - (14))))^(x[(61 -15)&0x0f]>>3)) + x[61&0x0f] , x[61&0x0f] = tm ); g += t1; c = t0 + t1; } while(0);-
483 do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[62] + ( tm = ((((x[(62 -2)&0x0f]) << (15)) | ((x[(62 -2)&0x0f]) >> (32 - (15))))^(((x[(62 -2)&0x0f]) << (13)) | ((x[(62 -2)&0x0f]) >> (32 - (13))))^(x[(62 -2)&0x0f]>>10)) + x[(62 -7)&0x0f] + ((((x[(62 -15)&0x0f]) << (25)) | ((x[(62 -15)&0x0f]) >> (32 - (25))))^(((x[(62 -15)&0x0f]) << (14)) | ((x[(62 -15)&0x0f]) >> (32 - (14))))^(x[(62 -15)&0x0f]>>3)) + x[62&0x0f] , x[62&0x0f] = tm ); f += t1; b = t0 + t1; } while(0);-
484 do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[63] + ( tm = ((((x[(63 -2)&0x0f]) << (15)) | ((x[(63 -2)&0x0f]) >> (32 - (15))))^(((x[(63 -2)&0x0f]) << (13)) | ((x[(63 -2)&0x0f]) >> (32 - (13))))^(x[(63 -2)&0x0f]>>10)) + x[(63 -7)&0x0f] + ((((x[(63 -15)&0x0f]) << (25)) | ((x[(63 -15)&0x0f]) >> (32 - (25))))^(((x[(63 -15)&0x0f]) << (14)) | ((x[(63 -15)&0x0f]) >> (32 - (14))))^(x[(63 -15)&0x0f]>>3)) + x[63&0x0f] , x[63&0x0f] = tm ); e += t1; a = t0 + t1; } while(0);-
485-
486 a = ctx->state[0] += a;-
487 b = ctx->state[1] += b;-
488 c = ctx->state[2] += c;-
489 d = ctx->state[3] += d;-
490 e = ctx->state[4] += e;-
491 f = ctx->state[5] += f;-
492 g = ctx->state[6] += g;-
493 h = ctx->state[7] += h;-
494 }
executed 31264 times by 2 tests: end of block
Executed by:
  • sha224sum
  • sha256sum
31264
495}
executed 74 times by 2 tests: end of block
Executed by:
  • sha224sum
  • sha256sum
74
Switch to Source codePreprocessed file

Generated by Squish Coco 4.1.2