Absolute File Name: | /home/opencoverage/opencoverage/guest-scripts/coreutils/src/gnulib/lib/sha256.c |
Switch to Source code | Preprocessed file |
Line | Source | Count | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | - | |||||||||||||
2 | - | |||||||||||||
3 | - | |||||||||||||
4 | - | |||||||||||||
5 | - | |||||||||||||
6 | - | |||||||||||||
7 | - | |||||||||||||
8 | - | |||||||||||||
9 | - | |||||||||||||
10 | static const unsigned char fillbuf[64] = { 0x80, 0 }; | - | ||||||||||||
11 | - | |||||||||||||
12 | - | |||||||||||||
13 | - | |||||||||||||
14 | - | |||||||||||||
15 | - | |||||||||||||
16 | - | |||||||||||||
17 | - | |||||||||||||
18 | void | - | ||||||||||||
19 | sha256_init_ctx (struct sha256_ctx *ctx) | - | ||||||||||||
20 | { | - | ||||||||||||
21 | ctx->state[0] = 0x6a09e667UL; | - | ||||||||||||
22 | ctx->state[1] = 0xbb67ae85UL; | - | ||||||||||||
23 | ctx->state[2] = 0x3c6ef372UL; | - | ||||||||||||
24 | ctx->state[3] = 0xa54ff53aUL; | - | ||||||||||||
25 | ctx->state[4] = 0x510e527fUL; | - | ||||||||||||
26 | ctx->state[5] = 0x9b05688cUL; | - | ||||||||||||
27 | ctx->state[6] = 0x1f83d9abUL; | - | ||||||||||||
28 | ctx->state[7] = 0x5be0cd19UL; | - | ||||||||||||
29 | - | |||||||||||||
30 | ctx->total[0] = ctx->total[1] = 0; | - | ||||||||||||
31 | ctx->buflen = 0; | - | ||||||||||||
32 | } executed 7 times by 1 test: end of block Executed by:
| 7 | ||||||||||||
33 | - | |||||||||||||
34 | void | - | ||||||||||||
35 | sha224_init_ctx (struct sha256_ctx *ctx) | - | ||||||||||||
36 | { | - | ||||||||||||
37 | ctx->state[0] = 0xc1059ed8UL; | - | ||||||||||||
38 | ctx->state[1] = 0x367cd507UL; | - | ||||||||||||
39 | ctx->state[2] = 0x3070dd17UL; | - | ||||||||||||
40 | ctx->state[3] = 0xf70e5939UL; | - | ||||||||||||
41 | ctx->state[4] = 0xffc00b31UL; | - | ||||||||||||
42 | ctx->state[5] = 0x68581511UL; | - | ||||||||||||
43 | ctx->state[6] = 0x64f98fa7UL; | - | ||||||||||||
44 | ctx->state[7] = 0xbefa4fa4UL; | - | ||||||||||||
45 | - | |||||||||||||
46 | ctx->total[0] = ctx->total[1] = 0; | - | ||||||||||||
47 | ctx->buflen = 0; | - | ||||||||||||
48 | } executed 5 times by 1 test: end of block Executed by:
| 5 | ||||||||||||
49 | - | |||||||||||||
50 | - | |||||||||||||
51 | - | |||||||||||||
52 | - | |||||||||||||
53 | static void | - | ||||||||||||
54 | set_uint32 (char *cp, uint32_t v) | - | ||||||||||||
55 | { | - | ||||||||||||
56 | memcpy (cp, &v, sizeof v); | - | ||||||||||||
57 | } executed 115 times by 2 tests: end of block Executed by:
| 115 | ||||||||||||
58 | - | |||||||||||||
59 | - | |||||||||||||
60 | - | |||||||||||||
61 | void * | - | ||||||||||||
62 | sha256_read_ctx (const struct sha256_ctx *ctx, void *resbuf) | - | ||||||||||||
63 | { | - | ||||||||||||
64 | int i; | - | ||||||||||||
65 | char *r = resbuf; | - | ||||||||||||
66 | - | |||||||||||||
67 | for (i = 0; i < 8
| 7-56 | ||||||||||||
68 | set_uint32 (r + i * sizeof ctx->state[0], (((ctx->state[i]) << 24) | (((ctx->state[i]) & 0xff00) << 8) | (((ctx->state[i]) >> 8) & 0xff00) | ((ctx->state[i]) >> 24))); executed 56 times by 1 test: set_uint32 (r + i * sizeof ctx->state[0], (((ctx->state[i]) << 24) | (((ctx->state[i]) & 0xff00) << 8) | (((ctx->state[i]) >> 8) & 0xff00) | ((ctx->state[i]) >> 24))); Executed by:
| 56 | ||||||||||||
69 | - | |||||||||||||
70 | return executed 7 times by 1 test: resbuf;return resbuf; Executed by:
executed 7 times by 1 test: return resbuf; Executed by:
| 7 | ||||||||||||
71 | } | - | ||||||||||||
72 | - | |||||||||||||
73 | void * | - | ||||||||||||
74 | sha224_read_ctx (const struct sha256_ctx *ctx, void *resbuf) | - | ||||||||||||
75 | { | - | ||||||||||||
76 | int i; | - | ||||||||||||
77 | char *r = resbuf; | - | ||||||||||||
78 | - | |||||||||||||
79 | for (i = 0; i < 7
| 5-35 | ||||||||||||
80 | set_uint32 (r + i * sizeof ctx->state[0], (((ctx->state[i]) << 24) | (((ctx->state[i]) & 0xff00) << 8) | (((ctx->state[i]) >> 8) & 0xff00) | ((ctx->state[i]) >> 24))); executed 35 times by 1 test: set_uint32 (r + i * sizeof ctx->state[0], (((ctx->state[i]) << 24) | (((ctx->state[i]) & 0xff00) << 8) | (((ctx->state[i]) >> 8) & 0xff00) | ((ctx->state[i]) >> 24))); Executed by:
| 35 | ||||||||||||
81 | - | |||||||||||||
82 | return executed 5 times by 1 test: resbuf;return resbuf; Executed by:
executed 5 times by 1 test: return resbuf; Executed by:
| 5 | ||||||||||||
83 | } | - | ||||||||||||
84 | - | |||||||||||||
85 | - | |||||||||||||
86 | - | |||||||||||||
87 | static void | - | ||||||||||||
88 | sha256_conclude_ctx (struct sha256_ctx *ctx) | - | ||||||||||||
89 | { | - | ||||||||||||
90 | - | |||||||||||||
91 | size_t bytes = ctx->buflen; | - | ||||||||||||
92 | size_t size = (
| 2-10 | ||||||||||||
93 | - | |||||||||||||
94 | - | |||||||||||||
95 | ctx->total[0] += bytes; | - | ||||||||||||
96 | if (ctx->total[0] < bytes
| 0-12 | ||||||||||||
97 | ++ never executed: ctx->total[1];++ctx->total[1]; never executed: ++ctx->total[1]; | 0 | ||||||||||||
98 | - | |||||||||||||
99 | - | |||||||||||||
100 | - | |||||||||||||
101 | - | |||||||||||||
102 | set_uint32 ((char *) &ctx->buffer[size - 2], | - | ||||||||||||
103 | ((((ctx->total[1] << 3) | (ctx->total[0] >> 29)) << 24) | ((((ctx->total[1] << 3) | (ctx->total[0] >> 29)) & 0xff00) << 8) | ((((ctx->total[1] << 3) | (ctx->total[0] >> 29)) >> 8) & 0xff00) | (((ctx->total[1] << 3) | (ctx->total[0] >> 29)) >> 24))); | - | ||||||||||||
104 | set_uint32 ((char *) &ctx->buffer[size - 1], | - | ||||||||||||
105 | (((ctx->total[0] << 3) << 24) | (((ctx->total[0] << 3) & 0xff00) << 8) | (((ctx->total[0] << 3) >> 8) & 0xff00) | ((ctx->total[0] << 3) >> 24))); | - | ||||||||||||
106 | - | |||||||||||||
107 | memcpy (&((char *) ctx->buffer)[bytes], fillbuf, (size - 2) * 4 - bytes); | - | ||||||||||||
108 | - | |||||||||||||
109 | - | |||||||||||||
110 | sha256_process_block (ctx->buffer, size * 4, ctx); | - | ||||||||||||
111 | } executed 12 times by 2 tests: end of block Executed by:
| 12 | ||||||||||||
112 | - | |||||||||||||
113 | void * | - | ||||||||||||
114 | sha256_finish_ctx (struct sha256_ctx *ctx, void *resbuf) | - | ||||||||||||
115 | { | - | ||||||||||||
116 | sha256_conclude_ctx (ctx); | - | ||||||||||||
117 | return executed 7 times by 1 test: sha256_read_ctx (ctx, resbuf);return sha256_read_ctx (ctx, resbuf); Executed by:
executed 7 times by 1 test: return sha256_read_ctx (ctx, resbuf); Executed by:
| 7 | ||||||||||||
118 | } | - | ||||||||||||
119 | - | |||||||||||||
120 | void * | - | ||||||||||||
121 | sha224_finish_ctx (struct sha256_ctx *ctx, void *resbuf) | - | ||||||||||||
122 | { | - | ||||||||||||
123 | sha256_conclude_ctx (ctx); | - | ||||||||||||
124 | return executed 5 times by 1 test: sha224_read_ctx (ctx, resbuf);return sha224_read_ctx (ctx, resbuf); Executed by:
executed 5 times by 1 test: return sha224_read_ctx (ctx, resbuf); Executed by:
| 5 | ||||||||||||
125 | } | - | ||||||||||||
126 | - | |||||||||||||
127 | - | |||||||||||||
128 | - | |||||||||||||
129 | - | |||||||||||||
130 | - | |||||||||||||
131 | int | - | ||||||||||||
132 | sha256_stream (FILE *stream, void *resblock) | - | ||||||||||||
133 | { | - | ||||||||||||
134 | struct sha256_ctx ctx; | - | ||||||||||||
135 | size_t sum; | - | ||||||||||||
136 | - | |||||||||||||
137 | char *buffer = malloc (32768 + 72); | - | ||||||||||||
138 | if (!buffer
| 0-7 | ||||||||||||
139 | return never executed: 1;return 1; never executed: return 1; | 0 | ||||||||||||
140 | - | |||||||||||||
141 | - | |||||||||||||
142 | sha256_init_ctx (&ctx); | - | ||||||||||||
143 | - | |||||||||||||
144 | - | |||||||||||||
145 | while (1) | - | ||||||||||||
146 | { | - | ||||||||||||
147 | - | |||||||||||||
148 | - | |||||||||||||
149 | - | |||||||||||||
150 | size_t n; | - | ||||||||||||
151 | sum = 0; | - | ||||||||||||
152 | - | |||||||||||||
153 | - | |||||||||||||
154 | while (1) | - | ||||||||||||
155 | { | - | ||||||||||||
156 | n = fread_unlocked (buffer + sum,1,32768 - sum,stream); | - | ||||||||||||
157 | - | |||||||||||||
158 | sum += n; | - | ||||||||||||
159 | - | |||||||||||||
160 | if (sum == 32768
| 7-30 | ||||||||||||
161 | break; executed 30 times by 1 test: break; Executed by:
| 30 | ||||||||||||
162 | - | |||||||||||||
163 | if (n == 0
| 1-6 | ||||||||||||
164 | { | - | ||||||||||||
165 | - | |||||||||||||
166 | - | |||||||||||||
167 | - | |||||||||||||
168 | if (ferror_unlocked (stream)
| 0-1 | ||||||||||||
169 | { | - | ||||||||||||
170 | free (buffer); | - | ||||||||||||
171 | return never executed: 1;return 1; never executed: return 1; | 0 | ||||||||||||
172 | } | - | ||||||||||||
173 | goto executed 1 time by 1 test: process_partial_block;goto process_partial_block; Executed by:
executed 1 time by 1 test: goto process_partial_block; Executed by:
| 1 | ||||||||||||
174 | } | - | ||||||||||||
175 | - | |||||||||||||
176 | - | |||||||||||||
177 | - | |||||||||||||
178 | - | |||||||||||||
179 | if (feof_unlocked (stream)
| 0-6 | ||||||||||||
180 | goto executed 6 times by 1 test: process_partial_block;goto process_partial_block; Executed by:
executed 6 times by 1 test: goto process_partial_block; Executed by:
| 6 | ||||||||||||
181 | } never executed: end of block | 0 | ||||||||||||
182 | - | |||||||||||||
183 | - | |||||||||||||
184 | - | |||||||||||||
185 | - | |||||||||||||
186 | sha256_process_block (buffer, 32768, &ctx); | - | ||||||||||||
187 | } executed 30 times by 1 test: end of block Executed by:
| 30 | ||||||||||||
188 | - | |||||||||||||
189 | process_partial_block: code before this statement never executed: ;process_partial_block: | 0 | ||||||||||||
190 | - | |||||||||||||
191 | - | |||||||||||||
192 | if (sum > 0
| 1-6 | ||||||||||||
193 | sha256_process_bytes (buffer, sum, &ctx); executed 6 times by 1 test: sha256_process_bytes (buffer, sum, &ctx); Executed by:
| 6 | ||||||||||||
194 | - | |||||||||||||
195 | - | |||||||||||||
196 | sha256_finish_ctx (&ctx, resblock); | - | ||||||||||||
197 | free (buffer); | - | ||||||||||||
198 | return executed 7 times by 1 test: 0;return 0; Executed by:
executed 7 times by 1 test: return 0; Executed by:
| 7 | ||||||||||||
199 | } | - | ||||||||||||
200 | - | |||||||||||||
201 | - | |||||||||||||
202 | int | - | ||||||||||||
203 | sha224_stream (FILE *stream, void *resblock) | - | ||||||||||||
204 | { | - | ||||||||||||
205 | struct sha256_ctx ctx; | - | ||||||||||||
206 | size_t sum; | - | ||||||||||||
207 | - | |||||||||||||
208 | char *buffer = malloc (32768 + 72); | - | ||||||||||||
209 | if (!buffer
| 0-5 | ||||||||||||
210 | return never executed: 1;return 1; never executed: return 1; | 0 | ||||||||||||
211 | - | |||||||||||||
212 | - | |||||||||||||
213 | sha224_init_ctx (&ctx); | - | ||||||||||||
214 | - | |||||||||||||
215 | - | |||||||||||||
216 | while (1) | - | ||||||||||||
217 | { | - | ||||||||||||
218 | - | |||||||||||||
219 | - | |||||||||||||
220 | - | |||||||||||||
221 | size_t n; | - | ||||||||||||
222 | sum = 0; | - | ||||||||||||
223 | - | |||||||||||||
224 | - | |||||||||||||
225 | while (1) | - | ||||||||||||
226 | { | - | ||||||||||||
227 | n = fread_unlocked (buffer + sum,1,32768 - sum,stream); | - | ||||||||||||
228 | - | |||||||||||||
229 | sum += n; | - | ||||||||||||
230 | - | |||||||||||||
231 | if (sum == 32768
| 5-30 | ||||||||||||
232 | break; executed 30 times by 1 test: break; Executed by:
| 30 | ||||||||||||
233 | - | |||||||||||||
234 | if (n == 0
| 0-5 | ||||||||||||
235 | { | - | ||||||||||||
236 | - | |||||||||||||
237 | - | |||||||||||||
238 | - | |||||||||||||
239 | if (ferror_unlocked (stream)
| 0 | ||||||||||||
240 | { | - | ||||||||||||
241 | free (buffer); | - | ||||||||||||
242 | return never executed: 1;return 1; never executed: return 1; | 0 | ||||||||||||
243 | } | - | ||||||||||||
244 | goto never executed: process_partial_block;goto process_partial_block; never executed: goto process_partial_block; | 0 | ||||||||||||
245 | } | - | ||||||||||||
246 | - | |||||||||||||
247 | - | |||||||||||||
248 | - | |||||||||||||
249 | - | |||||||||||||
250 | if (feof_unlocked (stream)
| 0-5 | ||||||||||||
251 | goto executed 5 times by 1 test: process_partial_block;goto process_partial_block; Executed by:
executed 5 times by 1 test: goto process_partial_block; Executed by:
| 5 | ||||||||||||
252 | } never executed: end of block | 0 | ||||||||||||
253 | - | |||||||||||||
254 | - | |||||||||||||
255 | - | |||||||||||||
256 | - | |||||||||||||
257 | sha256_process_block (buffer, 32768, &ctx); | - | ||||||||||||
258 | } executed 30 times by 1 test: end of block Executed by:
| 30 | ||||||||||||
259 | - | |||||||||||||
260 | process_partial_block: code before this statement never executed: ;process_partial_block: | 0 | ||||||||||||
261 | - | |||||||||||||
262 | - | |||||||||||||
263 | if (sum > 0
| 0-5 | ||||||||||||
264 | sha256_process_bytes (buffer, sum, &ctx); executed 5 times by 1 test: sha256_process_bytes (buffer, sum, &ctx); Executed by:
| 5 | ||||||||||||
265 | - | |||||||||||||
266 | - | |||||||||||||
267 | sha224_finish_ctx (&ctx, resblock); | - | ||||||||||||
268 | free (buffer); | - | ||||||||||||
269 | return executed 5 times by 1 test: 0;return 0; Executed by:
executed 5 times by 1 test: return 0; Executed by:
| 5 | ||||||||||||
270 | } | - | ||||||||||||
271 | - | |||||||||||||
272 | - | |||||||||||||
273 | - | |||||||||||||
274 | - | |||||||||||||
275 | - | |||||||||||||
276 | - | |||||||||||||
277 | void * | - | ||||||||||||
278 | sha256_buffer (const char *buffer, size_t len, void *resblock) | - | ||||||||||||
279 | { | - | ||||||||||||
280 | struct sha256_ctx ctx; | - | ||||||||||||
281 | - | |||||||||||||
282 | - | |||||||||||||
283 | sha256_init_ctx (&ctx); | - | ||||||||||||
284 | - | |||||||||||||
285 | - | |||||||||||||
286 | sha256_process_bytes (buffer, len, &ctx); | - | ||||||||||||
287 | - | |||||||||||||
288 | - | |||||||||||||
289 | return never executed: sha256_finish_ctx (&ctx, resblock);return sha256_finish_ctx (&ctx, resblock); never executed: return sha256_finish_ctx (&ctx, resblock); | 0 | ||||||||||||
290 | } | - | ||||||||||||
291 | - | |||||||||||||
292 | void * | - | ||||||||||||
293 | sha224_buffer (const char *buffer, size_t len, void *resblock) | - | ||||||||||||
294 | { | - | ||||||||||||
295 | struct sha256_ctx ctx; | - | ||||||||||||
296 | - | |||||||||||||
297 | - | |||||||||||||
298 | sha224_init_ctx (&ctx); | - | ||||||||||||
299 | - | |||||||||||||
300 | - | |||||||||||||
301 | sha256_process_bytes (buffer, len, &ctx); | - | ||||||||||||
302 | - | |||||||||||||
303 | - | |||||||||||||
304 | return never executed: sha224_finish_ctx (&ctx, resblock);return sha224_finish_ctx (&ctx, resblock); never executed: return sha224_finish_ctx (&ctx, resblock); | 0 | ||||||||||||
305 | } | - | ||||||||||||
306 | - | |||||||||||||
307 | void | - | ||||||||||||
308 | sha256_process_bytes (const void *buffer, size_t len, struct sha256_ctx *ctx) | - | ||||||||||||
309 | { | - | ||||||||||||
310 | - | |||||||||||||
311 | - | |||||||||||||
312 | if (ctx->buflen != 0
| 0-11 | ||||||||||||
313 | { | - | ||||||||||||
314 | size_t left_over = ctx->buflen; | - | ||||||||||||
315 | size_t add = 128 - left_over > len
| 0 | ||||||||||||
316 | - | |||||||||||||
317 | memcpy (&((char *) ctx->buffer)[left_over], buffer, add); | - | ||||||||||||
318 | ctx->buflen += add; | - | ||||||||||||
319 | - | |||||||||||||
320 | if (ctx->buflen > 64
| 0 | ||||||||||||
321 | { | - | ||||||||||||
322 | sha256_process_block (ctx->buffer, ctx->buflen & ~63, ctx); | - | ||||||||||||
323 | - | |||||||||||||
324 | ctx->buflen &= 63; | - | ||||||||||||
325 | - | |||||||||||||
326 | - | |||||||||||||
327 | memcpy (ctx->buffer, | - | ||||||||||||
328 | &((char *) ctx->buffer)[(left_over + add) & ~63], | - | ||||||||||||
329 | ctx->buflen); | - | ||||||||||||
330 | } never executed: end of block | 0 | ||||||||||||
331 | - | |||||||||||||
332 | buffer = (const char *) buffer + add; | - | ||||||||||||
333 | len -= add; | - | ||||||||||||
334 | } never executed: end of block | 0 | ||||||||||||
335 | - | |||||||||||||
336 | - | |||||||||||||
337 | if (len >= 64
| 2-9 | ||||||||||||
338 | { | - | ||||||||||||
339 | { | - | ||||||||||||
340 | sha256_process_block (buffer, len & ~63, ctx); | - | ||||||||||||
341 | buffer = (const char *) buffer + (len & ~63); | - | ||||||||||||
342 | len &= 63; | - | ||||||||||||
343 | } | - | ||||||||||||
344 | } executed 2 times by 2 tests: end of block Executed by:
| 2 | ||||||||||||
345 | - | |||||||||||||
346 | - | |||||||||||||
347 | if (len > 0
| 2-9 | ||||||||||||
348 | { | - | ||||||||||||
349 | size_t left_over = ctx->buflen; | - | ||||||||||||
350 | - | |||||||||||||
351 | memcpy (&((char *) ctx->buffer)[left_over], buffer, len); | - | ||||||||||||
352 | left_over += len; | - | ||||||||||||
353 | if (left_over >= 64
| 0-9 | ||||||||||||
354 | { | - | ||||||||||||
355 | sha256_process_block (ctx->buffer, 64, ctx); | - | ||||||||||||
356 | left_over -= 64; | - | ||||||||||||
357 | - | |||||||||||||
358 | - | |||||||||||||
359 | memcpy (ctx->buffer, &ctx->buffer[16], left_over); | - | ||||||||||||
360 | } never executed: end of block | 0 | ||||||||||||
361 | ctx->buflen = left_over; | - | ||||||||||||
362 | } executed 9 times by 2 tests: end of block Executed by:
| 9 | ||||||||||||
363 | } executed 11 times by 2 tests: end of block Executed by:
| 11 | ||||||||||||
364 | - | |||||||||||||
365 | - | |||||||||||||
366 | - | |||||||||||||
367 | - | |||||||||||||
368 | - | |||||||||||||
369 | static const uint32_t sha256_round_constants[64] = { | - | ||||||||||||
370 | 0x428a2f98UL, 0x71374491UL, 0xb5c0fbcfUL, 0xe9b5dba5UL, | - | ||||||||||||
371 | 0x3956c25bUL, 0x59f111f1UL, 0x923f82a4UL, 0xab1c5ed5UL, | - | ||||||||||||
372 | 0xd807aa98UL, 0x12835b01UL, 0x243185beUL, 0x550c7dc3UL, | - | ||||||||||||
373 | 0x72be5d74UL, 0x80deb1feUL, 0x9bdc06a7UL, 0xc19bf174UL, | - | ||||||||||||
374 | 0xe49b69c1UL, 0xefbe4786UL, 0x0fc19dc6UL, 0x240ca1ccUL, | - | ||||||||||||
375 | 0x2de92c6fUL, 0x4a7484aaUL, 0x5cb0a9dcUL, 0x76f988daUL, | - | ||||||||||||
376 | 0x983e5152UL, 0xa831c66dUL, 0xb00327c8UL, 0xbf597fc7UL, | - | ||||||||||||
377 | 0xc6e00bf3UL, 0xd5a79147UL, 0x06ca6351UL, 0x14292967UL, | - | ||||||||||||
378 | 0x27b70a85UL, 0x2e1b2138UL, 0x4d2c6dfcUL, 0x53380d13UL, | - | ||||||||||||
379 | 0x650a7354UL, 0x766a0abbUL, 0x81c2c92eUL, 0x92722c85UL, | - | ||||||||||||
380 | 0xa2bfe8a1UL, 0xa81a664bUL, 0xc24b8b70UL, 0xc76c51a3UL, | - | ||||||||||||
381 | 0xd192e819UL, 0xd6990624UL, 0xf40e3585UL, 0x106aa070UL, | - | ||||||||||||
382 | 0x19a4c116UL, 0x1e376c08UL, 0x2748774cUL, 0x34b0bcb5UL, | - | ||||||||||||
383 | 0x391c0cb3UL, 0x4ed8aa4aUL, 0x5b9cca4fUL, 0x682e6ff3UL, | - | ||||||||||||
384 | 0x748f82eeUL, 0x78a5636fUL, 0x84c87814UL, 0x8cc70208UL, | - | ||||||||||||
385 | 0x90befffaUL, 0xa4506cebUL, 0xbef9a3f7UL, 0xc67178f2UL, | - | ||||||||||||
386 | }; | - | ||||||||||||
387 | void | - | ||||||||||||
388 | sha256_process_block (const void *buffer, size_t len, struct sha256_ctx *ctx) | - | ||||||||||||
389 | { | - | ||||||||||||
390 | const uint32_t *words = buffer; | - | ||||||||||||
391 | size_t nwords = len / sizeof (uint32_t); | - | ||||||||||||
392 | const uint32_t *endp = words + nwords; | - | ||||||||||||
393 | uint32_t x[16]; | - | ||||||||||||
394 | uint32_t a = ctx->state[0]; | - | ||||||||||||
395 | uint32_t b = ctx->state[1]; | - | ||||||||||||
396 | uint32_t c = ctx->state[2]; | - | ||||||||||||
397 | uint32_t d = ctx->state[3]; | - | ||||||||||||
398 | uint32_t e = ctx->state[4]; | - | ||||||||||||
399 | uint32_t f = ctx->state[5]; | - | ||||||||||||
400 | uint32_t g = ctx->state[6]; | - | ||||||||||||
401 | uint32_t h = ctx->state[7]; | - | ||||||||||||
402 | uint32_t lolen = len; | - | ||||||||||||
403 | - | |||||||||||||
404 | - | |||||||||||||
405 | - | |||||||||||||
406 | - | |||||||||||||
407 | ctx->total[0] += lolen; | - | ||||||||||||
408 | ctx->total[1] += (len >> 31 >> 1) + (ctx->total[0] < lolen); | - | ||||||||||||
409 | while (words < endp
| 74-31264 | ||||||||||||
410 | { | - | ||||||||||||
411 | uint32_t tm; | - | ||||||||||||
412 | uint32_t t0, t1; | - | ||||||||||||
413 | int t; | - | ||||||||||||
414 | - | |||||||||||||
415 | for (t = 0; t < 16
| 31264-500224 | ||||||||||||
416 | { | - | ||||||||||||
417 | x[t] = (((*words) << 24) | (((*words) & 0xff00) << 8) | (((*words) >> 8) & 0xff00) | ((*words) >> 24)); | - | ||||||||||||
418 | words++; | - | ||||||||||||
419 | } executed 500224 times by 2 tests: end of block Executed by:
| 500224 | ||||||||||||
420 | - | |||||||||||||
421 | do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[0] + x[ 0]; d += t1; h = t0 + t1; } while(0); | - | ||||||||||||
422 | do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[1] + x[ 1]; c += t1; g = t0 + t1; } while(0); | - | ||||||||||||
423 | do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[2] + x[ 2]; b += t1; f = t0 + t1; } while(0); | - | ||||||||||||
424 | do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[3] + x[ 3]; a += t1; e = t0 + t1; } while(0); | - | ||||||||||||
425 | do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[4] + x[ 4]; h += t1; d = t0 + t1; } while(0); | - | ||||||||||||
426 | do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[5] + x[ 5]; g += t1; c = t0 + t1; } while(0); | - | ||||||||||||
427 | do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[6] + x[ 6]; f += t1; b = t0 + t1; } while(0); | - | ||||||||||||
428 | do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[7] + x[ 7]; e += t1; a = t0 + t1; } while(0); | - | ||||||||||||
429 | do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[8] + x[ 8]; d += t1; h = t0 + t1; } while(0); | - | ||||||||||||
430 | do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[9] + x[ 9]; c += t1; g = t0 + t1; } while(0); | - | ||||||||||||
431 | do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[10] + x[10]; b += t1; f = t0 + t1; } while(0); | - | ||||||||||||
432 | do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[11] + x[11]; a += t1; e = t0 + t1; } while(0); | - | ||||||||||||
433 | do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[12] + x[12]; h += t1; d = t0 + t1; } while(0); | - | ||||||||||||
434 | do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[13] + x[13]; g += t1; c = t0 + t1; } while(0); | - | ||||||||||||
435 | do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[14] + x[14]; f += t1; b = t0 + t1; } while(0); | - | ||||||||||||
436 | do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[15] + x[15]; e += t1; a = t0 + t1; } while(0); | - | ||||||||||||
437 | do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[16] + ( tm = ((((x[(16 -2)&0x0f]) << (15)) | ((x[(16 -2)&0x0f]) >> (32 - (15))))^(((x[(16 -2)&0x0f]) << (13)) | ((x[(16 -2)&0x0f]) >> (32 - (13))))^(x[(16 -2)&0x0f]>>10)) + x[(16 -7)&0x0f] + ((((x[(16 -15)&0x0f]) << (25)) | ((x[(16 -15)&0x0f]) >> (32 - (25))))^(((x[(16 -15)&0x0f]) << (14)) | ((x[(16 -15)&0x0f]) >> (32 - (14))))^(x[(16 -15)&0x0f]>>3)) + x[16&0x0f] , x[16&0x0f] = tm ); d += t1; h = t0 + t1; } while(0); | - | ||||||||||||
438 | do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[17] + ( tm = ((((x[(17 -2)&0x0f]) << (15)) | ((x[(17 -2)&0x0f]) >> (32 - (15))))^(((x[(17 -2)&0x0f]) << (13)) | ((x[(17 -2)&0x0f]) >> (32 - (13))))^(x[(17 -2)&0x0f]>>10)) + x[(17 -7)&0x0f] + ((((x[(17 -15)&0x0f]) << (25)) | ((x[(17 -15)&0x0f]) >> (32 - (25))))^(((x[(17 -15)&0x0f]) << (14)) | ((x[(17 -15)&0x0f]) >> (32 - (14))))^(x[(17 -15)&0x0f]>>3)) + x[17&0x0f] , x[17&0x0f] = tm ); c += t1; g = t0 + t1; } while(0); | - | ||||||||||||
439 | do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[18] + ( tm = ((((x[(18 -2)&0x0f]) << (15)) | ((x[(18 -2)&0x0f]) >> (32 - (15))))^(((x[(18 -2)&0x0f]) << (13)) | ((x[(18 -2)&0x0f]) >> (32 - (13))))^(x[(18 -2)&0x0f]>>10)) + x[(18 -7)&0x0f] + ((((x[(18 -15)&0x0f]) << (25)) | ((x[(18 -15)&0x0f]) >> (32 - (25))))^(((x[(18 -15)&0x0f]) << (14)) | ((x[(18 -15)&0x0f]) >> (32 - (14))))^(x[(18 -15)&0x0f]>>3)) + x[18&0x0f] , x[18&0x0f] = tm ); b += t1; f = t0 + t1; } while(0); | - | ||||||||||||
440 | do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[19] + ( tm = ((((x[(19 -2)&0x0f]) << (15)) | ((x[(19 -2)&0x0f]) >> (32 - (15))))^(((x[(19 -2)&0x0f]) << (13)) | ((x[(19 -2)&0x0f]) >> (32 - (13))))^(x[(19 -2)&0x0f]>>10)) + x[(19 -7)&0x0f] + ((((x[(19 -15)&0x0f]) << (25)) | ((x[(19 -15)&0x0f]) >> (32 - (25))))^(((x[(19 -15)&0x0f]) << (14)) | ((x[(19 -15)&0x0f]) >> (32 - (14))))^(x[(19 -15)&0x0f]>>3)) + x[19&0x0f] , x[19&0x0f] = tm ); a += t1; e = t0 + t1; } while(0); | - | ||||||||||||
441 | do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[20] + ( tm = ((((x[(20 -2)&0x0f]) << (15)) | ((x[(20 -2)&0x0f]) >> (32 - (15))))^(((x[(20 -2)&0x0f]) << (13)) | ((x[(20 -2)&0x0f]) >> (32 - (13))))^(x[(20 -2)&0x0f]>>10)) + x[(20 -7)&0x0f] + ((((x[(20 -15)&0x0f]) << (25)) | ((x[(20 -15)&0x0f]) >> (32 - (25))))^(((x[(20 -15)&0x0f]) << (14)) | ((x[(20 -15)&0x0f]) >> (32 - (14))))^(x[(20 -15)&0x0f]>>3)) + x[20&0x0f] , x[20&0x0f] = tm ); h += t1; d = t0 + t1; } while(0); | - | ||||||||||||
442 | do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[21] + ( tm = ((((x[(21 -2)&0x0f]) << (15)) | ((x[(21 -2)&0x0f]) >> (32 - (15))))^(((x[(21 -2)&0x0f]) << (13)) | ((x[(21 -2)&0x0f]) >> (32 - (13))))^(x[(21 -2)&0x0f]>>10)) + x[(21 -7)&0x0f] + ((((x[(21 -15)&0x0f]) << (25)) | ((x[(21 -15)&0x0f]) >> (32 - (25))))^(((x[(21 -15)&0x0f]) << (14)) | ((x[(21 -15)&0x0f]) >> (32 - (14))))^(x[(21 -15)&0x0f]>>3)) + x[21&0x0f] , x[21&0x0f] = tm ); g += t1; c = t0 + t1; } while(0); | - | ||||||||||||
443 | do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[22] + ( tm = ((((x[(22 -2)&0x0f]) << (15)) | ((x[(22 -2)&0x0f]) >> (32 - (15))))^(((x[(22 -2)&0x0f]) << (13)) | ((x[(22 -2)&0x0f]) >> (32 - (13))))^(x[(22 -2)&0x0f]>>10)) + x[(22 -7)&0x0f] + ((((x[(22 -15)&0x0f]) << (25)) | ((x[(22 -15)&0x0f]) >> (32 - (25))))^(((x[(22 -15)&0x0f]) << (14)) | ((x[(22 -15)&0x0f]) >> (32 - (14))))^(x[(22 -15)&0x0f]>>3)) + x[22&0x0f] , x[22&0x0f] = tm ); f += t1; b = t0 + t1; } while(0); | - | ||||||||||||
444 | do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[23] + ( tm = ((((x[(23 -2)&0x0f]) << (15)) | ((x[(23 -2)&0x0f]) >> (32 - (15))))^(((x[(23 -2)&0x0f]) << (13)) | ((x[(23 -2)&0x0f]) >> (32 - (13))))^(x[(23 -2)&0x0f]>>10)) + x[(23 -7)&0x0f] + ((((x[(23 -15)&0x0f]) << (25)) | ((x[(23 -15)&0x0f]) >> (32 - (25))))^(((x[(23 -15)&0x0f]) << (14)) | ((x[(23 -15)&0x0f]) >> (32 - (14))))^(x[(23 -15)&0x0f]>>3)) + x[23&0x0f] , x[23&0x0f] = tm ); e += t1; a = t0 + t1; } while(0); | - | ||||||||||||
445 | do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[24] + ( tm = ((((x[(24 -2)&0x0f]) << (15)) | ((x[(24 -2)&0x0f]) >> (32 - (15))))^(((x[(24 -2)&0x0f]) << (13)) | ((x[(24 -2)&0x0f]) >> (32 - (13))))^(x[(24 -2)&0x0f]>>10)) + x[(24 -7)&0x0f] + ((((x[(24 -15)&0x0f]) << (25)) | ((x[(24 -15)&0x0f]) >> (32 - (25))))^(((x[(24 -15)&0x0f]) << (14)) | ((x[(24 -15)&0x0f]) >> (32 - (14))))^(x[(24 -15)&0x0f]>>3)) + x[24&0x0f] , x[24&0x0f] = tm ); d += t1; h = t0 + t1; } while(0); | - | ||||||||||||
446 | do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[25] + ( tm = ((((x[(25 -2)&0x0f]) << (15)) | ((x[(25 -2)&0x0f]) >> (32 - (15))))^(((x[(25 -2)&0x0f]) << (13)) | ((x[(25 -2)&0x0f]) >> (32 - (13))))^(x[(25 -2)&0x0f]>>10)) + x[(25 -7)&0x0f] + ((((x[(25 -15)&0x0f]) << (25)) | ((x[(25 -15)&0x0f]) >> (32 - (25))))^(((x[(25 -15)&0x0f]) << (14)) | ((x[(25 -15)&0x0f]) >> (32 - (14))))^(x[(25 -15)&0x0f]>>3)) + x[25&0x0f] , x[25&0x0f] = tm ); c += t1; g = t0 + t1; } while(0); | - | ||||||||||||
447 | do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[26] + ( tm = ((((x[(26 -2)&0x0f]) << (15)) | ((x[(26 -2)&0x0f]) >> (32 - (15))))^(((x[(26 -2)&0x0f]) << (13)) | ((x[(26 -2)&0x0f]) >> (32 - (13))))^(x[(26 -2)&0x0f]>>10)) + x[(26 -7)&0x0f] + ((((x[(26 -15)&0x0f]) << (25)) | ((x[(26 -15)&0x0f]) >> (32 - (25))))^(((x[(26 -15)&0x0f]) << (14)) | ((x[(26 -15)&0x0f]) >> (32 - (14))))^(x[(26 -15)&0x0f]>>3)) + x[26&0x0f] , x[26&0x0f] = tm ); b += t1; f = t0 + t1; } while(0); | - | ||||||||||||
448 | do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[27] + ( tm = ((((x[(27 -2)&0x0f]) << (15)) | ((x[(27 -2)&0x0f]) >> (32 - (15))))^(((x[(27 -2)&0x0f]) << (13)) | ((x[(27 -2)&0x0f]) >> (32 - (13))))^(x[(27 -2)&0x0f]>>10)) + x[(27 -7)&0x0f] + ((((x[(27 -15)&0x0f]) << (25)) | ((x[(27 -15)&0x0f]) >> (32 - (25))))^(((x[(27 -15)&0x0f]) << (14)) | ((x[(27 -15)&0x0f]) >> (32 - (14))))^(x[(27 -15)&0x0f]>>3)) + x[27&0x0f] , x[27&0x0f] = tm ); a += t1; e = t0 + t1; } while(0); | - | ||||||||||||
449 | do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[28] + ( tm = ((((x[(28 -2)&0x0f]) << (15)) | ((x[(28 -2)&0x0f]) >> (32 - (15))))^(((x[(28 -2)&0x0f]) << (13)) | ((x[(28 -2)&0x0f]) >> (32 - (13))))^(x[(28 -2)&0x0f]>>10)) + x[(28 -7)&0x0f] + ((((x[(28 -15)&0x0f]) << (25)) | ((x[(28 -15)&0x0f]) >> (32 - (25))))^(((x[(28 -15)&0x0f]) << (14)) | ((x[(28 -15)&0x0f]) >> (32 - (14))))^(x[(28 -15)&0x0f]>>3)) + x[28&0x0f] , x[28&0x0f] = tm ); h += t1; d = t0 + t1; } while(0); | - | ||||||||||||
450 | do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[29] + ( tm = ((((x[(29 -2)&0x0f]) << (15)) | ((x[(29 -2)&0x0f]) >> (32 - (15))))^(((x[(29 -2)&0x0f]) << (13)) | ((x[(29 -2)&0x0f]) >> (32 - (13))))^(x[(29 -2)&0x0f]>>10)) + x[(29 -7)&0x0f] + ((((x[(29 -15)&0x0f]) << (25)) | ((x[(29 -15)&0x0f]) >> (32 - (25))))^(((x[(29 -15)&0x0f]) << (14)) | ((x[(29 -15)&0x0f]) >> (32 - (14))))^(x[(29 -15)&0x0f]>>3)) + x[29&0x0f] , x[29&0x0f] = tm ); g += t1; c = t0 + t1; } while(0); | - | ||||||||||||
451 | do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[30] + ( tm = ((((x[(30 -2)&0x0f]) << (15)) | ((x[(30 -2)&0x0f]) >> (32 - (15))))^(((x[(30 -2)&0x0f]) << (13)) | ((x[(30 -2)&0x0f]) >> (32 - (13))))^(x[(30 -2)&0x0f]>>10)) + x[(30 -7)&0x0f] + ((((x[(30 -15)&0x0f]) << (25)) | ((x[(30 -15)&0x0f]) >> (32 - (25))))^(((x[(30 -15)&0x0f]) << (14)) | ((x[(30 -15)&0x0f]) >> (32 - (14))))^(x[(30 -15)&0x0f]>>3)) + x[30&0x0f] , x[30&0x0f] = tm ); f += t1; b = t0 + t1; } while(0); | - | ||||||||||||
452 | do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[31] + ( tm = ((((x[(31 -2)&0x0f]) << (15)) | ((x[(31 -2)&0x0f]) >> (32 - (15))))^(((x[(31 -2)&0x0f]) << (13)) | ((x[(31 -2)&0x0f]) >> (32 - (13))))^(x[(31 -2)&0x0f]>>10)) + x[(31 -7)&0x0f] + ((((x[(31 -15)&0x0f]) << (25)) | ((x[(31 -15)&0x0f]) >> (32 - (25))))^(((x[(31 -15)&0x0f]) << (14)) | ((x[(31 -15)&0x0f]) >> (32 - (14))))^(x[(31 -15)&0x0f]>>3)) + x[31&0x0f] , x[31&0x0f] = tm ); e += t1; a = t0 + t1; } while(0); | - | ||||||||||||
453 | do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[32] + ( tm = ((((x[(32 -2)&0x0f]) << (15)) | ((x[(32 -2)&0x0f]) >> (32 - (15))))^(((x[(32 -2)&0x0f]) << (13)) | ((x[(32 -2)&0x0f]) >> (32 - (13))))^(x[(32 -2)&0x0f]>>10)) + x[(32 -7)&0x0f] + ((((x[(32 -15)&0x0f]) << (25)) | ((x[(32 -15)&0x0f]) >> (32 - (25))))^(((x[(32 -15)&0x0f]) << (14)) | ((x[(32 -15)&0x0f]) >> (32 - (14))))^(x[(32 -15)&0x0f]>>3)) + x[32&0x0f] , x[32&0x0f] = tm ); d += t1; h = t0 + t1; } while(0); | - | ||||||||||||
454 | do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[33] + ( tm = ((((x[(33 -2)&0x0f]) << (15)) | ((x[(33 -2)&0x0f]) >> (32 - (15))))^(((x[(33 -2)&0x0f]) << (13)) | ((x[(33 -2)&0x0f]) >> (32 - (13))))^(x[(33 -2)&0x0f]>>10)) + x[(33 -7)&0x0f] + ((((x[(33 -15)&0x0f]) << (25)) | ((x[(33 -15)&0x0f]) >> (32 - (25))))^(((x[(33 -15)&0x0f]) << (14)) | ((x[(33 -15)&0x0f]) >> (32 - (14))))^(x[(33 -15)&0x0f]>>3)) + x[33&0x0f] , x[33&0x0f] = tm ); c += t1; g = t0 + t1; } while(0); | - | ||||||||||||
455 | do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[34] + ( tm = ((((x[(34 -2)&0x0f]) << (15)) | ((x[(34 -2)&0x0f]) >> (32 - (15))))^(((x[(34 -2)&0x0f]) << (13)) | ((x[(34 -2)&0x0f]) >> (32 - (13))))^(x[(34 -2)&0x0f]>>10)) + x[(34 -7)&0x0f] + ((((x[(34 -15)&0x0f]) << (25)) | ((x[(34 -15)&0x0f]) >> (32 - (25))))^(((x[(34 -15)&0x0f]) << (14)) | ((x[(34 -15)&0x0f]) >> (32 - (14))))^(x[(34 -15)&0x0f]>>3)) + x[34&0x0f] , x[34&0x0f] = tm ); b += t1; f = t0 + t1; } while(0); | - | ||||||||||||
456 | do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[35] + ( tm = ((((x[(35 -2)&0x0f]) << (15)) | ((x[(35 -2)&0x0f]) >> (32 - (15))))^(((x[(35 -2)&0x0f]) << (13)) | ((x[(35 -2)&0x0f]) >> (32 - (13))))^(x[(35 -2)&0x0f]>>10)) + x[(35 -7)&0x0f] + ((((x[(35 -15)&0x0f]) << (25)) | ((x[(35 -15)&0x0f]) >> (32 - (25))))^(((x[(35 -15)&0x0f]) << (14)) | ((x[(35 -15)&0x0f]) >> (32 - (14))))^(x[(35 -15)&0x0f]>>3)) + x[35&0x0f] , x[35&0x0f] = tm ); a += t1; e = t0 + t1; } while(0); | - | ||||||||||||
457 | do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[36] + ( tm = ((((x[(36 -2)&0x0f]) << (15)) | ((x[(36 -2)&0x0f]) >> (32 - (15))))^(((x[(36 -2)&0x0f]) << (13)) | ((x[(36 -2)&0x0f]) >> (32 - (13))))^(x[(36 -2)&0x0f]>>10)) + x[(36 -7)&0x0f] + ((((x[(36 -15)&0x0f]) << (25)) | ((x[(36 -15)&0x0f]) >> (32 - (25))))^(((x[(36 -15)&0x0f]) << (14)) | ((x[(36 -15)&0x0f]) >> (32 - (14))))^(x[(36 -15)&0x0f]>>3)) + x[36&0x0f] , x[36&0x0f] = tm ); h += t1; d = t0 + t1; } while(0); | - | ||||||||||||
458 | do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[37] + ( tm = ((((x[(37 -2)&0x0f]) << (15)) | ((x[(37 -2)&0x0f]) >> (32 - (15))))^(((x[(37 -2)&0x0f]) << (13)) | ((x[(37 -2)&0x0f]) >> (32 - (13))))^(x[(37 -2)&0x0f]>>10)) + x[(37 -7)&0x0f] + ((((x[(37 -15)&0x0f]) << (25)) | ((x[(37 -15)&0x0f]) >> (32 - (25))))^(((x[(37 -15)&0x0f]) << (14)) | ((x[(37 -15)&0x0f]) >> (32 - (14))))^(x[(37 -15)&0x0f]>>3)) + x[37&0x0f] , x[37&0x0f] = tm ); g += t1; c = t0 + t1; } while(0); | - | ||||||||||||
459 | do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[38] + ( tm = ((((x[(38 -2)&0x0f]) << (15)) | ((x[(38 -2)&0x0f]) >> (32 - (15))))^(((x[(38 -2)&0x0f]) << (13)) | ((x[(38 -2)&0x0f]) >> (32 - (13))))^(x[(38 -2)&0x0f]>>10)) + x[(38 -7)&0x0f] + ((((x[(38 -15)&0x0f]) << (25)) | ((x[(38 -15)&0x0f]) >> (32 - (25))))^(((x[(38 -15)&0x0f]) << (14)) | ((x[(38 -15)&0x0f]) >> (32 - (14))))^(x[(38 -15)&0x0f]>>3)) + x[38&0x0f] , x[38&0x0f] = tm ); f += t1; b = t0 + t1; } while(0); | - | ||||||||||||
460 | do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[39] + ( tm = ((((x[(39 -2)&0x0f]) << (15)) | ((x[(39 -2)&0x0f]) >> (32 - (15))))^(((x[(39 -2)&0x0f]) << (13)) | ((x[(39 -2)&0x0f]) >> (32 - (13))))^(x[(39 -2)&0x0f]>>10)) + x[(39 -7)&0x0f] + ((((x[(39 -15)&0x0f]) << (25)) | ((x[(39 -15)&0x0f]) >> (32 - (25))))^(((x[(39 -15)&0x0f]) << (14)) | ((x[(39 -15)&0x0f]) >> (32 - (14))))^(x[(39 -15)&0x0f]>>3)) + x[39&0x0f] , x[39&0x0f] = tm ); e += t1; a = t0 + t1; } while(0); | - | ||||||||||||
461 | do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[40] + ( tm = ((((x[(40 -2)&0x0f]) << (15)) | ((x[(40 -2)&0x0f]) >> (32 - (15))))^(((x[(40 -2)&0x0f]) << (13)) | ((x[(40 -2)&0x0f]) >> (32 - (13))))^(x[(40 -2)&0x0f]>>10)) + x[(40 -7)&0x0f] + ((((x[(40 -15)&0x0f]) << (25)) | ((x[(40 -15)&0x0f]) >> (32 - (25))))^(((x[(40 -15)&0x0f]) << (14)) | ((x[(40 -15)&0x0f]) >> (32 - (14))))^(x[(40 -15)&0x0f]>>3)) + x[40&0x0f] , x[40&0x0f] = tm ); d += t1; h = t0 + t1; } while(0); | - | ||||||||||||
462 | do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[41] + ( tm = ((((x[(41 -2)&0x0f]) << (15)) | ((x[(41 -2)&0x0f]) >> (32 - (15))))^(((x[(41 -2)&0x0f]) << (13)) | ((x[(41 -2)&0x0f]) >> (32 - (13))))^(x[(41 -2)&0x0f]>>10)) + x[(41 -7)&0x0f] + ((((x[(41 -15)&0x0f]) << (25)) | ((x[(41 -15)&0x0f]) >> (32 - (25))))^(((x[(41 -15)&0x0f]) << (14)) | ((x[(41 -15)&0x0f]) >> (32 - (14))))^(x[(41 -15)&0x0f]>>3)) + x[41&0x0f] , x[41&0x0f] = tm ); c += t1; g = t0 + t1; } while(0); | - | ||||||||||||
463 | do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[42] + ( tm = ((((x[(42 -2)&0x0f]) << (15)) | ((x[(42 -2)&0x0f]) >> (32 - (15))))^(((x[(42 -2)&0x0f]) << (13)) | ((x[(42 -2)&0x0f]) >> (32 - (13))))^(x[(42 -2)&0x0f]>>10)) + x[(42 -7)&0x0f] + ((((x[(42 -15)&0x0f]) << (25)) | ((x[(42 -15)&0x0f]) >> (32 - (25))))^(((x[(42 -15)&0x0f]) << (14)) | ((x[(42 -15)&0x0f]) >> (32 - (14))))^(x[(42 -15)&0x0f]>>3)) + x[42&0x0f] , x[42&0x0f] = tm ); b += t1; f = t0 + t1; } while(0); | - | ||||||||||||
464 | do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[43] + ( tm = ((((x[(43 -2)&0x0f]) << (15)) | ((x[(43 -2)&0x0f]) >> (32 - (15))))^(((x[(43 -2)&0x0f]) << (13)) | ((x[(43 -2)&0x0f]) >> (32 - (13))))^(x[(43 -2)&0x0f]>>10)) + x[(43 -7)&0x0f] + ((((x[(43 -15)&0x0f]) << (25)) | ((x[(43 -15)&0x0f]) >> (32 - (25))))^(((x[(43 -15)&0x0f]) << (14)) | ((x[(43 -15)&0x0f]) >> (32 - (14))))^(x[(43 -15)&0x0f]>>3)) + x[43&0x0f] , x[43&0x0f] = tm ); a += t1; e = t0 + t1; } while(0); | - | ||||||||||||
465 | do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[44] + ( tm = ((((x[(44 -2)&0x0f]) << (15)) | ((x[(44 -2)&0x0f]) >> (32 - (15))))^(((x[(44 -2)&0x0f]) << (13)) | ((x[(44 -2)&0x0f]) >> (32 - (13))))^(x[(44 -2)&0x0f]>>10)) + x[(44 -7)&0x0f] + ((((x[(44 -15)&0x0f]) << (25)) | ((x[(44 -15)&0x0f]) >> (32 - (25))))^(((x[(44 -15)&0x0f]) << (14)) | ((x[(44 -15)&0x0f]) >> (32 - (14))))^(x[(44 -15)&0x0f]>>3)) + x[44&0x0f] , x[44&0x0f] = tm ); h += t1; d = t0 + t1; } while(0); | - | ||||||||||||
466 | do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[45] + ( tm = ((((x[(45 -2)&0x0f]) << (15)) | ((x[(45 -2)&0x0f]) >> (32 - (15))))^(((x[(45 -2)&0x0f]) << (13)) | ((x[(45 -2)&0x0f]) >> (32 - (13))))^(x[(45 -2)&0x0f]>>10)) + x[(45 -7)&0x0f] + ((((x[(45 -15)&0x0f]) << (25)) | ((x[(45 -15)&0x0f]) >> (32 - (25))))^(((x[(45 -15)&0x0f]) << (14)) | ((x[(45 -15)&0x0f]) >> (32 - (14))))^(x[(45 -15)&0x0f]>>3)) + x[45&0x0f] , x[45&0x0f] = tm ); g += t1; c = t0 + t1; } while(0); | - | ||||||||||||
467 | do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[46] + ( tm = ((((x[(46 -2)&0x0f]) << (15)) | ((x[(46 -2)&0x0f]) >> (32 - (15))))^(((x[(46 -2)&0x0f]) << (13)) | ((x[(46 -2)&0x0f]) >> (32 - (13))))^(x[(46 -2)&0x0f]>>10)) + x[(46 -7)&0x0f] + ((((x[(46 -15)&0x0f]) << (25)) | ((x[(46 -15)&0x0f]) >> (32 - (25))))^(((x[(46 -15)&0x0f]) << (14)) | ((x[(46 -15)&0x0f]) >> (32 - (14))))^(x[(46 -15)&0x0f]>>3)) + x[46&0x0f] , x[46&0x0f] = tm ); f += t1; b = t0 + t1; } while(0); | - | ||||||||||||
468 | do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[47] + ( tm = ((((x[(47 -2)&0x0f]) << (15)) | ((x[(47 -2)&0x0f]) >> (32 - (15))))^(((x[(47 -2)&0x0f]) << (13)) | ((x[(47 -2)&0x0f]) >> (32 - (13))))^(x[(47 -2)&0x0f]>>10)) + x[(47 -7)&0x0f] + ((((x[(47 -15)&0x0f]) << (25)) | ((x[(47 -15)&0x0f]) >> (32 - (25))))^(((x[(47 -15)&0x0f]) << (14)) | ((x[(47 -15)&0x0f]) >> (32 - (14))))^(x[(47 -15)&0x0f]>>3)) + x[47&0x0f] , x[47&0x0f] = tm ); e += t1; a = t0 + t1; } while(0); | - | ||||||||||||
469 | do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[48] + ( tm = ((((x[(48 -2)&0x0f]) << (15)) | ((x[(48 -2)&0x0f]) >> (32 - (15))))^(((x[(48 -2)&0x0f]) << (13)) | ((x[(48 -2)&0x0f]) >> (32 - (13))))^(x[(48 -2)&0x0f]>>10)) + x[(48 -7)&0x0f] + ((((x[(48 -15)&0x0f]) << (25)) | ((x[(48 -15)&0x0f]) >> (32 - (25))))^(((x[(48 -15)&0x0f]) << (14)) | ((x[(48 -15)&0x0f]) >> (32 - (14))))^(x[(48 -15)&0x0f]>>3)) + x[48&0x0f] , x[48&0x0f] = tm ); d += t1; h = t0 + t1; } while(0); | - | ||||||||||||
470 | do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[49] + ( tm = ((((x[(49 -2)&0x0f]) << (15)) | ((x[(49 -2)&0x0f]) >> (32 - (15))))^(((x[(49 -2)&0x0f]) << (13)) | ((x[(49 -2)&0x0f]) >> (32 - (13))))^(x[(49 -2)&0x0f]>>10)) + x[(49 -7)&0x0f] + ((((x[(49 -15)&0x0f]) << (25)) | ((x[(49 -15)&0x0f]) >> (32 - (25))))^(((x[(49 -15)&0x0f]) << (14)) | ((x[(49 -15)&0x0f]) >> (32 - (14))))^(x[(49 -15)&0x0f]>>3)) + x[49&0x0f] , x[49&0x0f] = tm ); c += t1; g = t0 + t1; } while(0); | - | ||||||||||||
471 | do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[50] + ( tm = ((((x[(50 -2)&0x0f]) << (15)) | ((x[(50 -2)&0x0f]) >> (32 - (15))))^(((x[(50 -2)&0x0f]) << (13)) | ((x[(50 -2)&0x0f]) >> (32 - (13))))^(x[(50 -2)&0x0f]>>10)) + x[(50 -7)&0x0f] + ((((x[(50 -15)&0x0f]) << (25)) | ((x[(50 -15)&0x0f]) >> (32 - (25))))^(((x[(50 -15)&0x0f]) << (14)) | ((x[(50 -15)&0x0f]) >> (32 - (14))))^(x[(50 -15)&0x0f]>>3)) + x[50&0x0f] , x[50&0x0f] = tm ); b += t1; f = t0 + t1; } while(0); | - | ||||||||||||
472 | do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[51] + ( tm = ((((x[(51 -2)&0x0f]) << (15)) | ((x[(51 -2)&0x0f]) >> (32 - (15))))^(((x[(51 -2)&0x0f]) << (13)) | ((x[(51 -2)&0x0f]) >> (32 - (13))))^(x[(51 -2)&0x0f]>>10)) + x[(51 -7)&0x0f] + ((((x[(51 -15)&0x0f]) << (25)) | ((x[(51 -15)&0x0f]) >> (32 - (25))))^(((x[(51 -15)&0x0f]) << (14)) | ((x[(51 -15)&0x0f]) >> (32 - (14))))^(x[(51 -15)&0x0f]>>3)) + x[51&0x0f] , x[51&0x0f] = tm ); a += t1; e = t0 + t1; } while(0); | - | ||||||||||||
473 | do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[52] + ( tm = ((((x[(52 -2)&0x0f]) << (15)) | ((x[(52 -2)&0x0f]) >> (32 - (15))))^(((x[(52 -2)&0x0f]) << (13)) | ((x[(52 -2)&0x0f]) >> (32 - (13))))^(x[(52 -2)&0x0f]>>10)) + x[(52 -7)&0x0f] + ((((x[(52 -15)&0x0f]) << (25)) | ((x[(52 -15)&0x0f]) >> (32 - (25))))^(((x[(52 -15)&0x0f]) << (14)) | ((x[(52 -15)&0x0f]) >> (32 - (14))))^(x[(52 -15)&0x0f]>>3)) + x[52&0x0f] , x[52&0x0f] = tm ); h += t1; d = t0 + t1; } while(0); | - | ||||||||||||
474 | do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[53] + ( tm = ((((x[(53 -2)&0x0f]) << (15)) | ((x[(53 -2)&0x0f]) >> (32 - (15))))^(((x[(53 -2)&0x0f]) << (13)) | ((x[(53 -2)&0x0f]) >> (32 - (13))))^(x[(53 -2)&0x0f]>>10)) + x[(53 -7)&0x0f] + ((((x[(53 -15)&0x0f]) << (25)) | ((x[(53 -15)&0x0f]) >> (32 - (25))))^(((x[(53 -15)&0x0f]) << (14)) | ((x[(53 -15)&0x0f]) >> (32 - (14))))^(x[(53 -15)&0x0f]>>3)) + x[53&0x0f] , x[53&0x0f] = tm ); g += t1; c = t0 + t1; } while(0); | - | ||||||||||||
475 | do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[54] + ( tm = ((((x[(54 -2)&0x0f]) << (15)) | ((x[(54 -2)&0x0f]) >> (32 - (15))))^(((x[(54 -2)&0x0f]) << (13)) | ((x[(54 -2)&0x0f]) >> (32 - (13))))^(x[(54 -2)&0x0f]>>10)) + x[(54 -7)&0x0f] + ((((x[(54 -15)&0x0f]) << (25)) | ((x[(54 -15)&0x0f]) >> (32 - (25))))^(((x[(54 -15)&0x0f]) << (14)) | ((x[(54 -15)&0x0f]) >> (32 - (14))))^(x[(54 -15)&0x0f]>>3)) + x[54&0x0f] , x[54&0x0f] = tm ); f += t1; b = t0 + t1; } while(0); | - | ||||||||||||
476 | do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[55] + ( tm = ((((x[(55 -2)&0x0f]) << (15)) | ((x[(55 -2)&0x0f]) >> (32 - (15))))^(((x[(55 -2)&0x0f]) << (13)) | ((x[(55 -2)&0x0f]) >> (32 - (13))))^(x[(55 -2)&0x0f]>>10)) + x[(55 -7)&0x0f] + ((((x[(55 -15)&0x0f]) << (25)) | ((x[(55 -15)&0x0f]) >> (32 - (25))))^(((x[(55 -15)&0x0f]) << (14)) | ((x[(55 -15)&0x0f]) >> (32 - (14))))^(x[(55 -15)&0x0f]>>3)) + x[55&0x0f] , x[55&0x0f] = tm ); e += t1; a = t0 + t1; } while(0); | - | ||||||||||||
477 | do { t0 = ((((a) << (30)) | ((a) >> (32 - (30))))^(((a) << (19)) | ((a) >> (32 - (19))))^(((a) << (10)) | ((a) >> (32 - (10))))) + ( ( a & b ) | ( c & ( a | b ) ) ); t1 = h + ((((e) << (26)) | ((e) >> (32 - (26))))^(((e) << (21)) | ((e) >> (32 - (21))))^(((e) << (7)) | ((e) >> (32 - (7))))) + ( g ^ ( e & ( f ^ g ) ) ) + sha256_round_constants[56] + ( tm = ((((x[(56 -2)&0x0f]) << (15)) | ((x[(56 -2)&0x0f]) >> (32 - (15))))^(((x[(56 -2)&0x0f]) << (13)) | ((x[(56 -2)&0x0f]) >> (32 - (13))))^(x[(56 -2)&0x0f]>>10)) + x[(56 -7)&0x0f] + ((((x[(56 -15)&0x0f]) << (25)) | ((x[(56 -15)&0x0f]) >> (32 - (25))))^(((x[(56 -15)&0x0f]) << (14)) | ((x[(56 -15)&0x0f]) >> (32 - (14))))^(x[(56 -15)&0x0f]>>3)) + x[56&0x0f] , x[56&0x0f] = tm ); d += t1; h = t0 + t1; } while(0); | - | ||||||||||||
478 | do { t0 = ((((h) << (30)) | ((h) >> (32 - (30))))^(((h) << (19)) | ((h) >> (32 - (19))))^(((h) << (10)) | ((h) >> (32 - (10))))) + ( ( h & a ) | ( b & ( h | a ) ) ); t1 = g + ((((d) << (26)) | ((d) >> (32 - (26))))^(((d) << (21)) | ((d) >> (32 - (21))))^(((d) << (7)) | ((d) >> (32 - (7))))) + ( f ^ ( d & ( e ^ f ) ) ) + sha256_round_constants[57] + ( tm = ((((x[(57 -2)&0x0f]) << (15)) | ((x[(57 -2)&0x0f]) >> (32 - (15))))^(((x[(57 -2)&0x0f]) << (13)) | ((x[(57 -2)&0x0f]) >> (32 - (13))))^(x[(57 -2)&0x0f]>>10)) + x[(57 -7)&0x0f] + ((((x[(57 -15)&0x0f]) << (25)) | ((x[(57 -15)&0x0f]) >> (32 - (25))))^(((x[(57 -15)&0x0f]) << (14)) | ((x[(57 -15)&0x0f]) >> (32 - (14))))^(x[(57 -15)&0x0f]>>3)) + x[57&0x0f] , x[57&0x0f] = tm ); c += t1; g = t0 + t1; } while(0); | - | ||||||||||||
479 | do { t0 = ((((g) << (30)) | ((g) >> (32 - (30))))^(((g) << (19)) | ((g) >> (32 - (19))))^(((g) << (10)) | ((g) >> (32 - (10))))) + ( ( g & h ) | ( a & ( g | h ) ) ); t1 = f + ((((c) << (26)) | ((c) >> (32 - (26))))^(((c) << (21)) | ((c) >> (32 - (21))))^(((c) << (7)) | ((c) >> (32 - (7))))) + ( e ^ ( c & ( d ^ e ) ) ) + sha256_round_constants[58] + ( tm = ((((x[(58 -2)&0x0f]) << (15)) | ((x[(58 -2)&0x0f]) >> (32 - (15))))^(((x[(58 -2)&0x0f]) << (13)) | ((x[(58 -2)&0x0f]) >> (32 - (13))))^(x[(58 -2)&0x0f]>>10)) + x[(58 -7)&0x0f] + ((((x[(58 -15)&0x0f]) << (25)) | ((x[(58 -15)&0x0f]) >> (32 - (25))))^(((x[(58 -15)&0x0f]) << (14)) | ((x[(58 -15)&0x0f]) >> (32 - (14))))^(x[(58 -15)&0x0f]>>3)) + x[58&0x0f] , x[58&0x0f] = tm ); b += t1; f = t0 + t1; } while(0); | - | ||||||||||||
480 | do { t0 = ((((f) << (30)) | ((f) >> (32 - (30))))^(((f) << (19)) | ((f) >> (32 - (19))))^(((f) << (10)) | ((f) >> (32 - (10))))) + ( ( f & g ) | ( h & ( f | g ) ) ); t1 = e + ((((b) << (26)) | ((b) >> (32 - (26))))^(((b) << (21)) | ((b) >> (32 - (21))))^(((b) << (7)) | ((b) >> (32 - (7))))) + ( d ^ ( b & ( c ^ d ) ) ) + sha256_round_constants[59] + ( tm = ((((x[(59 -2)&0x0f]) << (15)) | ((x[(59 -2)&0x0f]) >> (32 - (15))))^(((x[(59 -2)&0x0f]) << (13)) | ((x[(59 -2)&0x0f]) >> (32 - (13))))^(x[(59 -2)&0x0f]>>10)) + x[(59 -7)&0x0f] + ((((x[(59 -15)&0x0f]) << (25)) | ((x[(59 -15)&0x0f]) >> (32 - (25))))^(((x[(59 -15)&0x0f]) << (14)) | ((x[(59 -15)&0x0f]) >> (32 - (14))))^(x[(59 -15)&0x0f]>>3)) + x[59&0x0f] , x[59&0x0f] = tm ); a += t1; e = t0 + t1; } while(0); | - | ||||||||||||
481 | do { t0 = ((((e) << (30)) | ((e) >> (32 - (30))))^(((e) << (19)) | ((e) >> (32 - (19))))^(((e) << (10)) | ((e) >> (32 - (10))))) + ( ( e & f ) | ( g & ( e | f ) ) ); t1 = d + ((((a) << (26)) | ((a) >> (32 - (26))))^(((a) << (21)) | ((a) >> (32 - (21))))^(((a) << (7)) | ((a) >> (32 - (7))))) + ( c ^ ( a & ( b ^ c ) ) ) + sha256_round_constants[60] + ( tm = ((((x[(60 -2)&0x0f]) << (15)) | ((x[(60 -2)&0x0f]) >> (32 - (15))))^(((x[(60 -2)&0x0f]) << (13)) | ((x[(60 -2)&0x0f]) >> (32 - (13))))^(x[(60 -2)&0x0f]>>10)) + x[(60 -7)&0x0f] + ((((x[(60 -15)&0x0f]) << (25)) | ((x[(60 -15)&0x0f]) >> (32 - (25))))^(((x[(60 -15)&0x0f]) << (14)) | ((x[(60 -15)&0x0f]) >> (32 - (14))))^(x[(60 -15)&0x0f]>>3)) + x[60&0x0f] , x[60&0x0f] = tm ); h += t1; d = t0 + t1; } while(0); | - | ||||||||||||
482 | do { t0 = ((((d) << (30)) | ((d) >> (32 - (30))))^(((d) << (19)) | ((d) >> (32 - (19))))^(((d) << (10)) | ((d) >> (32 - (10))))) + ( ( d & e ) | ( f & ( d | e ) ) ); t1 = c + ((((h) << (26)) | ((h) >> (32 - (26))))^(((h) << (21)) | ((h) >> (32 - (21))))^(((h) << (7)) | ((h) >> (32 - (7))))) + ( b ^ ( h & ( a ^ b ) ) ) + sha256_round_constants[61] + ( tm = ((((x[(61 -2)&0x0f]) << (15)) | ((x[(61 -2)&0x0f]) >> (32 - (15))))^(((x[(61 -2)&0x0f]) << (13)) | ((x[(61 -2)&0x0f]) >> (32 - (13))))^(x[(61 -2)&0x0f]>>10)) + x[(61 -7)&0x0f] + ((((x[(61 -15)&0x0f]) << (25)) | ((x[(61 -15)&0x0f]) >> (32 - (25))))^(((x[(61 -15)&0x0f]) << (14)) | ((x[(61 -15)&0x0f]) >> (32 - (14))))^(x[(61 -15)&0x0f]>>3)) + x[61&0x0f] , x[61&0x0f] = tm ); g += t1; c = t0 + t1; } while(0); | - | ||||||||||||
483 | do { t0 = ((((c) << (30)) | ((c) >> (32 - (30))))^(((c) << (19)) | ((c) >> (32 - (19))))^(((c) << (10)) | ((c) >> (32 - (10))))) + ( ( c & d ) | ( e & ( c | d ) ) ); t1 = b + ((((g) << (26)) | ((g) >> (32 - (26))))^(((g) << (21)) | ((g) >> (32 - (21))))^(((g) << (7)) | ((g) >> (32 - (7))))) + ( a ^ ( g & ( h ^ a ) ) ) + sha256_round_constants[62] + ( tm = ((((x[(62 -2)&0x0f]) << (15)) | ((x[(62 -2)&0x0f]) >> (32 - (15))))^(((x[(62 -2)&0x0f]) << (13)) | ((x[(62 -2)&0x0f]) >> (32 - (13))))^(x[(62 -2)&0x0f]>>10)) + x[(62 -7)&0x0f] + ((((x[(62 -15)&0x0f]) << (25)) | ((x[(62 -15)&0x0f]) >> (32 - (25))))^(((x[(62 -15)&0x0f]) << (14)) | ((x[(62 -15)&0x0f]) >> (32 - (14))))^(x[(62 -15)&0x0f]>>3)) + x[62&0x0f] , x[62&0x0f] = tm ); f += t1; b = t0 + t1; } while(0); | - | ||||||||||||
484 | do { t0 = ((((b) << (30)) | ((b) >> (32 - (30))))^(((b) << (19)) | ((b) >> (32 - (19))))^(((b) << (10)) | ((b) >> (32 - (10))))) + ( ( b & c ) | ( d & ( b | c ) ) ); t1 = a + ((((f) << (26)) | ((f) >> (32 - (26))))^(((f) << (21)) | ((f) >> (32 - (21))))^(((f) << (7)) | ((f) >> (32 - (7))))) + ( h ^ ( f & ( g ^ h ) ) ) + sha256_round_constants[63] + ( tm = ((((x[(63 -2)&0x0f]) << (15)) | ((x[(63 -2)&0x0f]) >> (32 - (15))))^(((x[(63 -2)&0x0f]) << (13)) | ((x[(63 -2)&0x0f]) >> (32 - (13))))^(x[(63 -2)&0x0f]>>10)) + x[(63 -7)&0x0f] + ((((x[(63 -15)&0x0f]) << (25)) | ((x[(63 -15)&0x0f]) >> (32 - (25))))^(((x[(63 -15)&0x0f]) << (14)) | ((x[(63 -15)&0x0f]) >> (32 - (14))))^(x[(63 -15)&0x0f]>>3)) + x[63&0x0f] , x[63&0x0f] = tm ); e += t1; a = t0 + t1; } while(0); | - | ||||||||||||
485 | - | |||||||||||||
486 | a = ctx->state[0] += a; | - | ||||||||||||
487 | b = ctx->state[1] += b; | - | ||||||||||||
488 | c = ctx->state[2] += c; | - | ||||||||||||
489 | d = ctx->state[3] += d; | - | ||||||||||||
490 | e = ctx->state[4] += e; | - | ||||||||||||
491 | f = ctx->state[5] += f; | - | ||||||||||||
492 | g = ctx->state[6] += g; | - | ||||||||||||
493 | h = ctx->state[7] += h; | - | ||||||||||||
494 | } executed 31264 times by 2 tests: end of block Executed by:
| 31264 | ||||||||||||
495 | } executed 74 times by 2 tests: end of block Executed by:
| 74 | ||||||||||||
Switch to Source code | Preprocessed file |