Absolute File Name: | /home/opencoverage/opencoverage/guest-scripts/openssl/src/crypto/evp/m_sha3.c |
Source code | Switch to Preprocessed file |
Line | Source | Count | ||||||
---|---|---|---|---|---|---|---|---|
1 | /* | - | ||||||
2 | * Copyright 2017-2018 The OpenSSL Project Authors. All Rights Reserved. | - | ||||||
3 | * | - | ||||||
4 | * Licensed under the OpenSSL license (the "License"). You may not use | - | ||||||
5 | * this file except in compliance with the License. You can obtain a copy | - | ||||||
6 | * in the file LICENSE in the source distribution or at | - | ||||||
7 | * https://www.openssl.org/source/license.html | - | ||||||
8 | */ | - | ||||||
9 | - | |||||||
10 | #include <stdio.h> | - | ||||||
11 | #include <string.h> | - | ||||||
12 | - | |||||||
13 | #include <openssl/evp.h> | - | ||||||
14 | #include <openssl/objects.h> | - | ||||||
15 | #include "internal/evp_int.h" | - | ||||||
16 | #include "evp_locl.h" | - | ||||||
17 | - | |||||||
18 | size_t SHA3_absorb(uint64_t A[5][5], const unsigned char *inp, size_t len, | - | ||||||
19 | size_t r); | - | ||||||
20 | void SHA3_squeeze(uint64_t A[5][5], unsigned char *out, size_t len, size_t r); | - | ||||||
21 | - | |||||||
22 | #define KECCAK1600_WIDTH 1600 | - | ||||||
23 | - | |||||||
24 | typedef struct { | - | ||||||
25 | uint64_t A[5][5]; | - | ||||||
26 | size_t block_size; /* cached ctx->digest->block_size */ | - | ||||||
27 | size_t md_size; /* output length, variable in XOF */ | - | ||||||
28 | size_t num; /* used bytes in below buffer */ | - | ||||||
29 | unsigned char buf[KECCAK1600_WIDTH / 8 - 32]; | - | ||||||
30 | unsigned char pad; | - | ||||||
31 | } KECCAK1600_CTX; | - | ||||||
32 | - | |||||||
33 | static int init(EVP_MD_CTX *evp_ctx, unsigned char pad) | - | ||||||
34 | { | - | ||||||
35 | KECCAK1600_CTX *ctx = evp_ctx->md_data; | - | ||||||
36 | size_t bsz = evp_ctx->digest->block_size; | - | ||||||
37 | - | |||||||
38 | if (bsz <= sizeof(ctx->buf)) {
| 0-181 | ||||||
39 | memset(ctx->A, 0, sizeof(ctx->A)); | - | ||||||
40 | - | |||||||
41 | ctx->num = 0; | - | ||||||
42 | ctx->block_size = bsz; | - | ||||||
43 | ctx->md_size = evp_ctx->digest->md_size; | - | ||||||
44 | ctx->pad = pad; | - | ||||||
45 | - | |||||||
46 | return 1; executed 181 times by 2 tests: return 1; Executed by:
| 181 | ||||||
47 | } | - | ||||||
48 | - | |||||||
49 | return 0; never executed: return 0; | 0 | ||||||
50 | } | - | ||||||
51 | - | |||||||
52 | static int sha3_init(EVP_MD_CTX *evp_ctx) | - | ||||||
53 | { | - | ||||||
54 | return init(evp_ctx, '\x06'); executed 45 times by 1 test: return init(evp_ctx, '\x06'); Executed by:
| 45 | ||||||
55 | } | - | ||||||
56 | - | |||||||
57 | static int shake_init(EVP_MD_CTX *evp_ctx) | - | ||||||
58 | { | - | ||||||
59 | return init(evp_ctx, '\x1f'); executed 136 times by 2 tests: return init(evp_ctx, '\x1f'); Executed by:
| 136 | ||||||
60 | } | - | ||||||
61 | - | |||||||
62 | static int sha3_update(EVP_MD_CTX *evp_ctx, const void *_inp, size_t len) | - | ||||||
63 | { | - | ||||||
64 | KECCAK1600_CTX *ctx = evp_ctx->md_data; | - | ||||||
65 | const unsigned char *inp = _inp; | - | ||||||
66 | size_t bsz = ctx->block_size; | - | ||||||
67 | size_t num, rem; | - | ||||||
68 | - | |||||||
69 | if (len == 0)
| 71-1598 | ||||||
70 | return 1; executed 71 times by 2 tests: return 1; Executed by:
| 71 | ||||||
71 | - | |||||||
72 | if ((num = ctx->num) != 0) { /* process intermediate buffer? */
| 205-1393 | ||||||
73 | rem = bsz - num; | - | ||||||
74 | - | |||||||
75 | if (len < rem) {
| 38-1355 | ||||||
76 | memcpy(ctx->buf + num, inp, len); | - | ||||||
77 | ctx->num += len; | - | ||||||
78 | return 1; executed 1355 times by 2 tests: return 1; Executed by:
| 1355 | ||||||
79 | } | - | ||||||
80 | /* | - | ||||||
81 | * We have enough data to fill or overflow the intermediate | - | ||||||
82 | * buffer. So we append |rem| bytes and process the block, | - | ||||||
83 | * leaving the rest for later processing... | - | ||||||
84 | */ | - | ||||||
85 | memcpy(ctx->buf + num, inp, rem); | - | ||||||
86 | inp += rem, len -= rem; | - | ||||||
87 | (void)SHA3_absorb(ctx->A, ctx->buf, bsz, bsz); | - | ||||||
88 | ctx->num = 0; | - | ||||||
89 | /* ctx->buf is processed, ctx->num is guaranteed to be zero */ | - | ||||||
90 | } executed 38 times by 2 tests: end of block Executed by:
| 38 | ||||||
91 | - | |||||||
92 | if (len >= bsz)
| 51-192 | ||||||
93 | rem = SHA3_absorb(ctx->A, inp, len, bsz); executed 51 times by 2 tests: rem = SHA3_absorb(ctx->A, inp, len, bsz); Executed by:
| 51 | ||||||
94 | else | - | ||||||
95 | rem = len; executed 192 times by 2 tests: rem = len; Executed by:
| 192 | ||||||
96 | - | |||||||
97 | if (rem) {
| 33-210 | ||||||
98 | memcpy(ctx->buf, inp + len - rem, rem); | - | ||||||
99 | ctx->num = rem; | - | ||||||
100 | } executed 210 times by 2 tests: end of block Executed by:
| 210 | ||||||
101 | - | |||||||
102 | return 1; executed 243 times by 2 tests: return 1; Executed by:
| 243 | ||||||
103 | } | - | ||||||
104 | - | |||||||
105 | static int sha3_final(EVP_MD_CTX *evp_ctx, unsigned char *md) | - | ||||||
106 | { | - | ||||||
107 | KECCAK1600_CTX *ctx = evp_ctx->md_data; | - | ||||||
108 | size_t bsz = ctx->block_size; | - | ||||||
109 | size_t num = ctx->num; | - | ||||||
110 | - | |||||||
111 | /* | - | ||||||
112 | * Pad the data with 10*1. Note that |num| can be |bsz - 1| | - | ||||||
113 | * in which case both byte operations below are performed on | - | ||||||
114 | * same byte... | - | ||||||
115 | */ | - | ||||||
116 | memset(ctx->buf + num, 0, bsz - num); | - | ||||||
117 | ctx->buf[num] = ctx->pad; | - | ||||||
118 | ctx->buf[bsz - 1] |= 0x80; | - | ||||||
119 | - | |||||||
120 | (void)SHA3_absorb(ctx->A, ctx->buf, bsz, bsz); | - | ||||||
121 | - | |||||||
122 | SHA3_squeeze(ctx->A, md, ctx->md_size, bsz); | - | ||||||
123 | - | |||||||
124 | return 1; executed 181 times by 2 tests: return 1; Executed by:
| 181 | ||||||
125 | } | - | ||||||
126 | - | |||||||
127 | static int shake_ctrl(EVP_MD_CTX *evp_ctx, int cmd, int p1, void *p2) | - | ||||||
128 | { | - | ||||||
129 | KECCAK1600_CTX *ctx = evp_ctx->md_data; | - | ||||||
130 | - | |||||||
131 | switch (cmd) { | - | ||||||
132 | case EVP_MD_CTRL_XOF_LEN: executed 136 times by 2 tests: case 0x3: Executed by:
| 136 | ||||||
133 | ctx->md_size = p1; | - | ||||||
134 | return 1; executed 136 times by 2 tests: return 1; Executed by:
| 136 | ||||||
135 | default: never executed: default: | 0 | ||||||
136 | return 0; never executed: return 0; | 0 | ||||||
137 | } | - | ||||||
138 | } | - | ||||||
139 | - | |||||||
140 | #if defined(OPENSSL_CPUID_OBJ) && defined(__s390__) && defined(KECCAK1600_ASM) | - | ||||||
141 | /* | - | ||||||
142 | * IBM S390X support | - | ||||||
143 | */ | - | ||||||
144 | # include "s390x_arch.h" | - | ||||||
145 | - | |||||||
146 | # define S390X_SHA3_FC(ctx) ((ctx)->pad) | - | ||||||
147 | - | |||||||
148 | # define S390X_sha3_224_CAPABLE ((OPENSSL_s390xcap_P.kimd[0] & \ | - | ||||||
149 | S390X_CAPBIT(S390X_SHA3_224)) && \ | - | ||||||
150 | (OPENSSL_s390xcap_P.klmd[0] & \ | - | ||||||
151 | S390X_CAPBIT(S390X_SHA3_224))) | - | ||||||
152 | # define S390X_sha3_256_CAPABLE ((OPENSSL_s390xcap_P.kimd[0] & \ | - | ||||||
153 | S390X_CAPBIT(S390X_SHA3_256)) && \ | - | ||||||
154 | (OPENSSL_s390xcap_P.klmd[0] & \ | - | ||||||
155 | S390X_CAPBIT(S390X_SHA3_256))) | - | ||||||
156 | # define S390X_sha3_384_CAPABLE ((OPENSSL_s390xcap_P.kimd[0] & \ | - | ||||||
157 | S390X_CAPBIT(S390X_SHA3_384)) && \ | - | ||||||
158 | (OPENSSL_s390xcap_P.klmd[0] & \ | - | ||||||
159 | S390X_CAPBIT(S390X_SHA3_384))) | - | ||||||
160 | # define S390X_sha3_512_CAPABLE ((OPENSSL_s390xcap_P.kimd[0] & \ | - | ||||||
161 | S390X_CAPBIT(S390X_SHA3_512)) && \ | - | ||||||
162 | (OPENSSL_s390xcap_P.klmd[0] & \ | - | ||||||
163 | S390X_CAPBIT(S390X_SHA3_512))) | - | ||||||
164 | # define S390X_shake128_CAPABLE ((OPENSSL_s390xcap_P.kimd[0] & \ | - | ||||||
165 | S390X_CAPBIT(S390X_SHAKE_128)) && \ | - | ||||||
166 | (OPENSSL_s390xcap_P.klmd[0] & \ | - | ||||||
167 | S390X_CAPBIT(S390X_SHAKE_128))) | - | ||||||
168 | # define S390X_shake256_CAPABLE ((OPENSSL_s390xcap_P.kimd[0] & \ | - | ||||||
169 | S390X_CAPBIT(S390X_SHAKE_256)) && \ | - | ||||||
170 | (OPENSSL_s390xcap_P.klmd[0] & \ | - | ||||||
171 | S390X_CAPBIT(S390X_SHAKE_256))) | - | ||||||
172 | - | |||||||
173 | /* Convert md-size to block-size. */ | - | ||||||
174 | # define S390X_KECCAK1600_BSZ(n) ((KECCAK1600_WIDTH - ((n) << 1)) >> 3) | - | ||||||
175 | - | |||||||
176 | static int s390x_sha3_init(EVP_MD_CTX *evp_ctx) | - | ||||||
177 | { | - | ||||||
178 | KECCAK1600_CTX *ctx = evp_ctx->md_data; | - | ||||||
179 | const size_t bsz = evp_ctx->digest->block_size; | - | ||||||
180 | - | |||||||
181 | /*- | - | ||||||
182 | * KECCAK1600_CTX structure's pad field is used to store the KIMD/KLMD | - | ||||||
183 | * function code. | - | ||||||
184 | */ | - | ||||||
185 | switch (bsz) { | - | ||||||
186 | case S390X_KECCAK1600_BSZ(224): | - | ||||||
187 | ctx->pad = S390X_SHA3_224; | - | ||||||
188 | break; | - | ||||||
189 | case S390X_KECCAK1600_BSZ(256): | - | ||||||
190 | ctx->pad = S390X_SHA3_256; | - | ||||||
191 | break; | - | ||||||
192 | case S390X_KECCAK1600_BSZ(384): | - | ||||||
193 | ctx->pad = S390X_SHA3_384; | - | ||||||
194 | break; | - | ||||||
195 | case S390X_KECCAK1600_BSZ(512): | - | ||||||
196 | ctx->pad = S390X_SHA3_512; | - | ||||||
197 | break; | - | ||||||
198 | default: | - | ||||||
199 | return 0; | - | ||||||
200 | } | - | ||||||
201 | - | |||||||
202 | memset(ctx->A, 0, sizeof(ctx->A)); | - | ||||||
203 | ctx->num = 0; | - | ||||||
204 | ctx->block_size = bsz; | - | ||||||
205 | ctx->md_size = evp_ctx->digest->md_size; | - | ||||||
206 | return 1; | - | ||||||
207 | } | - | ||||||
208 | - | |||||||
209 | static int s390x_shake_init(EVP_MD_CTX *evp_ctx) | - | ||||||
210 | { | - | ||||||
211 | KECCAK1600_CTX *ctx = evp_ctx->md_data; | - | ||||||
212 | const size_t bsz = evp_ctx->digest->block_size; | - | ||||||
213 | - | |||||||
214 | /*- | - | ||||||
215 | * KECCAK1600_CTX structure's pad field is used to store the KIMD/KLMD | - | ||||||
216 | * function code. | - | ||||||
217 | */ | - | ||||||
218 | switch (bsz) { | - | ||||||
219 | case S390X_KECCAK1600_BSZ(128): | - | ||||||
220 | ctx->pad = S390X_SHAKE_128; | - | ||||||
221 | break; | - | ||||||
222 | case S390X_KECCAK1600_BSZ(256): | - | ||||||
223 | ctx->pad = S390X_SHAKE_256; | - | ||||||
224 | break; | - | ||||||
225 | default: | - | ||||||
226 | return 0; | - | ||||||
227 | } | - | ||||||
228 | - | |||||||
229 | memset(ctx->A, 0, sizeof(ctx->A)); | - | ||||||
230 | ctx->num = 0; | - | ||||||
231 | ctx->block_size = bsz; | - | ||||||
232 | ctx->md_size = evp_ctx->digest->md_size; | - | ||||||
233 | return 1; | - | ||||||
234 | } | - | ||||||
235 | - | |||||||
236 | static int s390x_sha3_update(EVP_MD_CTX *evp_ctx, const void *_inp, size_t len) | - | ||||||
237 | { | - | ||||||
238 | KECCAK1600_CTX *ctx = evp_ctx->md_data; | - | ||||||
239 | const unsigned char *inp = _inp; | - | ||||||
240 | const size_t bsz = ctx->block_size; | - | ||||||
241 | size_t num, rem; | - | ||||||
242 | - | |||||||
243 | if (len == 0) | - | ||||||
244 | return 1; | - | ||||||
245 | - | |||||||
246 | if ((num = ctx->num) != 0) { | - | ||||||
247 | rem = bsz - num; | - | ||||||
248 | - | |||||||
249 | if (len < rem) { | - | ||||||
250 | memcpy(ctx->buf + num, inp, len); | - | ||||||
251 | ctx->num += len; | - | ||||||
252 | return 1; | - | ||||||
253 | } | - | ||||||
254 | memcpy(ctx->buf + num, inp, rem); | - | ||||||
255 | inp += rem; | - | ||||||
256 | len -= rem; | - | ||||||
257 | s390x_kimd(ctx->buf, bsz, ctx->pad, ctx->A); | - | ||||||
258 | ctx->num = 0; | - | ||||||
259 | } | - | ||||||
260 | rem = len % bsz; | - | ||||||
261 | - | |||||||
262 | s390x_kimd(inp, len - rem, ctx->pad, ctx->A); | - | ||||||
263 | - | |||||||
264 | if (rem) { | - | ||||||
265 | memcpy(ctx->buf, inp + len - rem, rem); | - | ||||||
266 | ctx->num = rem; | - | ||||||
267 | } | - | ||||||
268 | return 1; | - | ||||||
269 | } | - | ||||||
270 | - | |||||||
271 | static int s390x_sha3_final(EVP_MD_CTX *evp_ctx, unsigned char *md) | - | ||||||
272 | { | - | ||||||
273 | KECCAK1600_CTX *ctx = evp_ctx->md_data; | - | ||||||
274 | - | |||||||
275 | s390x_klmd(ctx->buf, ctx->num, NULL, 0, ctx->pad, ctx->A); | - | ||||||
276 | memcpy(md, ctx->A, ctx->md_size); | - | ||||||
277 | return 1; | - | ||||||
278 | } | - | ||||||
279 | - | |||||||
280 | static int s390x_shake_final(EVP_MD_CTX *evp_ctx, unsigned char *md) | - | ||||||
281 | { | - | ||||||
282 | KECCAK1600_CTX *ctx = evp_ctx->md_data; | - | ||||||
283 | - | |||||||
284 | s390x_klmd(ctx->buf, ctx->num, md, ctx->md_size, ctx->pad, ctx->A); | - | ||||||
285 | return 1; | - | ||||||
286 | } | - | ||||||
287 | - | |||||||
288 | # define EVP_MD_SHA3(bitlen) \ | - | ||||||
289 | const EVP_MD *EVP_sha3_##bitlen(void) \ | - | ||||||
290 | { \ | - | ||||||
291 | static const EVP_MD s390x_sha3_##bitlen##_md = { \ | - | ||||||
292 | NID_sha3_##bitlen, \ | - | ||||||
293 | NID_RSA_SHA3_##bitlen, \ | - | ||||||
294 | bitlen / 8, \ | - | ||||||
295 | EVP_MD_FLAG_DIGALGID_ABSENT, \ | - | ||||||
296 | s390x_sha3_init, \ | - | ||||||
297 | s390x_sha3_update, \ | - | ||||||
298 | s390x_sha3_final, \ | - | ||||||
299 | NULL, \ | - | ||||||
300 | NULL, \ | - | ||||||
301 | (KECCAK1600_WIDTH - bitlen * 2) / 8, \ | - | ||||||
302 | sizeof(KECCAK1600_CTX), \ | - | ||||||
303 | }; \ | - | ||||||
304 | static const EVP_MD sha3_##bitlen##_md = { \ | - | ||||||
305 | NID_sha3_##bitlen, \ | - | ||||||
306 | NID_RSA_SHA3_##bitlen, \ | - | ||||||
307 | bitlen / 8, \ | - | ||||||
308 | EVP_MD_FLAG_DIGALGID_ABSENT, \ | - | ||||||
309 | sha3_init, \ | - | ||||||
310 | sha3_update, \ | - | ||||||
311 | sha3_final, \ | - | ||||||
312 | NULL, \ | - | ||||||
313 | NULL, \ | - | ||||||
314 | (KECCAK1600_WIDTH - bitlen * 2) / 8, \ | - | ||||||
315 | sizeof(KECCAK1600_CTX), \ | - | ||||||
316 | }; \ | - | ||||||
317 | return S390X_sha3_##bitlen##_CAPABLE ? \ | - | ||||||
318 | &s390x_sha3_##bitlen##_md : \ | - | ||||||
319 | &sha3_##bitlen##_md; \ | - | ||||||
320 | } | - | ||||||
321 | - | |||||||
322 | # define EVP_MD_SHAKE(bitlen) \ | - | ||||||
323 | const EVP_MD *EVP_shake##bitlen(void) \ | - | ||||||
324 | { \ | - | ||||||
325 | static const EVP_MD s390x_shake##bitlen##_md = { \ | - | ||||||
326 | NID_shake##bitlen, \ | - | ||||||
327 | 0, \ | - | ||||||
328 | bitlen / 8, \ | - | ||||||
329 | EVP_MD_FLAG_XOF, \ | - | ||||||
330 | s390x_shake_init, \ | - | ||||||
331 | s390x_sha3_update, \ | - | ||||||
332 | s390x_shake_final, \ | - | ||||||
333 | NULL, \ | - | ||||||
334 | NULL, \ | - | ||||||
335 | (KECCAK1600_WIDTH - bitlen * 2) / 8, \ | - | ||||||
336 | sizeof(KECCAK1600_CTX), \ | - | ||||||
337 | shake_ctrl \ | - | ||||||
338 | }; \ | - | ||||||
339 | static const EVP_MD shake##bitlen##_md = { \ | - | ||||||
340 | NID_shake##bitlen, \ | - | ||||||
341 | 0, \ | - | ||||||
342 | bitlen / 8, \ | - | ||||||
343 | EVP_MD_FLAG_XOF, \ | - | ||||||
344 | shake_init, \ | - | ||||||
345 | sha3_update, \ | - | ||||||
346 | sha3_final, \ | - | ||||||
347 | NULL, \ | - | ||||||
348 | NULL, \ | - | ||||||
349 | (KECCAK1600_WIDTH - bitlen * 2) / 8, \ | - | ||||||
350 | sizeof(KECCAK1600_CTX), \ | - | ||||||
351 | shake_ctrl \ | - | ||||||
352 | }; \ | - | ||||||
353 | return S390X_shake##bitlen##_CAPABLE ? \ | - | ||||||
354 | &s390x_shake##bitlen##_md : \ | - | ||||||
355 | &shake##bitlen##_md; \ | - | ||||||
356 | } | - | ||||||
357 | - | |||||||
358 | #else | - | ||||||
359 | - | |||||||
360 | # define EVP_MD_SHA3(bitlen) \ | - | ||||||
361 | const EVP_MD *EVP_sha3_##bitlen(void) \ | - | ||||||
362 | { \ | - | ||||||
363 | static const EVP_MD sha3_##bitlen##_md = { \ | - | ||||||
364 | NID_sha3_##bitlen, \ | - | ||||||
365 | NID_RSA_SHA3_##bitlen, \ | - | ||||||
366 | bitlen / 8, \ | - | ||||||
367 | EVP_MD_FLAG_DIGALGID_ABSENT, \ | - | ||||||
368 | sha3_init, \ | - | ||||||
369 | sha3_update, \ | - | ||||||
370 | sha3_final, \ | - | ||||||
371 | NULL, \ | - | ||||||
372 | NULL, \ | - | ||||||
373 | (KECCAK1600_WIDTH - bitlen * 2) / 8, \ | - | ||||||
374 | sizeof(KECCAK1600_CTX), \ | - | ||||||
375 | }; \ | - | ||||||
376 | return &sha3_##bitlen##_md; \ | - | ||||||
377 | } | - | ||||||
378 | - | |||||||
379 | # define EVP_MD_SHAKE(bitlen) \ | - | ||||||
380 | const EVP_MD *EVP_shake##bitlen(void) \ | - | ||||||
381 | { \ | - | ||||||
382 | static const EVP_MD shake##bitlen##_md = { \ | - | ||||||
383 | NID_shake##bitlen, \ | - | ||||||
384 | 0, \ | - | ||||||
385 | bitlen / 8, \ | - | ||||||
386 | EVP_MD_FLAG_XOF, \ | - | ||||||
387 | shake_init, \ | - | ||||||
388 | sha3_update, \ | - | ||||||
389 | sha3_final, \ | - | ||||||
390 | NULL, \ | - | ||||||
391 | NULL, \ | - | ||||||
392 | (KECCAK1600_WIDTH - bitlen * 2) / 8, \ | - | ||||||
393 | sizeof(KECCAK1600_CTX), \ | - | ||||||
394 | shake_ctrl \ | - | ||||||
395 | }; \ | - | ||||||
396 | return &shake##bitlen##_md; \ | - | ||||||
397 | } | - | ||||||
398 | #endif | - | ||||||
399 | - | |||||||
400 | EVP_MD_SHA3(224) executed 1969 times by 1 test: return &sha3_224_md; Executed by:
| 1969 | ||||||
401 | EVP_MD_SHA3(256) executed 1969 times by 1 test: return &sha3_256_md; Executed by:
| 1969 | ||||||
402 | EVP_MD_SHA3(384) executed 1969 times by 1 test: return &sha3_384_md; Executed by:
| 1969 | ||||||
403 | EVP_MD_SHA3(512) executed 1969 times by 1 test: return &sha3_512_md; Executed by:
| 1969 | ||||||
404 | - | |||||||
405 | EVP_MD_SHAKE(128) executed 1969 times by 1 test: return &shake128_md; Executed by:
| 1969 | ||||||
406 | EVP_MD_SHAKE(256) executed 2093 times by 2 tests: return &shake256_md; Executed by:
| 2093 | ||||||
Source code | Switch to Preprocessed file |