Lines Matching +full:3 +full:g
18 * 3. Neither the name of the copyright holder nor the names of contributors
111 (dst) = (u_int32_t)(cp)[3] | ((u_int32_t)(cp)[2] << 8) | \
118 ((u_int64_t)(cp)[3] << 32) | ((u_int64_t)(cp)[2] << 40) | \
126 (cp)[3] = (src) >> 32; \
137 (cp)[3] = (src); \
175 #define sigma0_256(x) (S32(7, (x)) ^ S32(18, (x)) ^ R(3 , (x)))
367 #define ROUND256_0_TO_15(a,b,c,d,e,f,g,h) do { \ argument
370 T1 = (h) + Sigma1_256((e)) + Ch((e), (f), (g)) + K256[j] + W256[j]; \
376 #define ROUND256(a,b,c,d,e,f,g,h) do { \ argument
381 T1 = (h) + Sigma1_256((e)) + Ch((e), (f), (g)) + K256[j] + \
391 u_int32_t a, b, c, d, e, f, g, h, s0, s1; in SHA256Transform() local
399 d = state[3]; in SHA256Transform()
402 g = state[6]; in SHA256Transform()
408 ROUND256_0_TO_15(a,b,c,d,e,f,g,h); in SHA256Transform()
409 ROUND256_0_TO_15(h,a,b,c,d,e,f,g); in SHA256Transform()
410 ROUND256_0_TO_15(g,h,a,b,c,d,e,f); in SHA256Transform()
411 ROUND256_0_TO_15(f,g,h,a,b,c,d,e); in SHA256Transform()
412 ROUND256_0_TO_15(e,f,g,h,a,b,c,d); in SHA256Transform()
413 ROUND256_0_TO_15(d,e,f,g,h,a,b,c); in SHA256Transform()
414 ROUND256_0_TO_15(c,d,e,f,g,h,a,b); in SHA256Transform()
415 ROUND256_0_TO_15(b,c,d,e,f,g,h,a); in SHA256Transform()
420 ROUND256(a,b,c,d,e,f,g,h); in SHA256Transform()
421 ROUND256(h,a,b,c,d,e,f,g); in SHA256Transform()
422 ROUND256(g,h,a,b,c,d,e,f); in SHA256Transform()
423 ROUND256(f,g,h,a,b,c,d,e); in SHA256Transform()
424 ROUND256(e,f,g,h,a,b,c,d); in SHA256Transform()
425 ROUND256(d,e,f,g,h,a,b,c); in SHA256Transform()
426 ROUND256(c,d,e,f,g,h,a,b); in SHA256Transform()
427 ROUND256(b,c,d,e,f,g,h,a); in SHA256Transform()
434 state[3] += d; in SHA256Transform()
437 state[6] += g; in SHA256Transform()
441 a = b = c = d = e = f = g = h = T1 = 0; in SHA256Transform()
449 u_int32_t a, b, c, d, e, f, g, h, s0, s1; in SHA256Transform() local
457 d = state[3]; in SHA256Transform()
460 g = state[6]; in SHA256Transform()
468 T1 = h + Sigma1_256(e) + Ch(e, f, g) + K256[j] + W256[j]; in SHA256Transform()
470 h = g; in SHA256Transform()
471 g = f; in SHA256Transform()
490 T1 = h + Sigma1_256(e) + Ch(e, f, g) + K256[j] + in SHA256Transform()
493 h = g; in SHA256Transform()
494 g = f; in SHA256Transform()
509 state[3] += d; in SHA256Transform()
512 state[6] += g; in SHA256Transform()
516 a = b = c = d = e = f = g = h = T1 = T2 = 0; in SHA256Transform()
531 usedspace = (context->bitcount[0] >> 3) % SHA256_BLOCK_LENGTH; in SHA256Update()
539 context->bitcount[0] += freespace << 3; in SHA256Update()
546 context->bitcount[0] += (u_int64_t)len << 3; in SHA256Update()
555 context->bitcount[0] += SHA256_BLOCK_LENGTH << 3; in SHA256Update()
562 context->bitcount[0] += len << 3; in SHA256Update()
574 usedspace = (context->bitcount[0] >> 3) % SHA256_BLOCK_LENGTH; in SHA256Pad()
647 #define ROUND512_0_TO_15(a,b,c,d,e,f,g,h) do { \ argument
650 T1 = (h) + Sigma1_512((e)) + Ch((e), (f), (g)) + K512[j] + W512[j]; \
657 #define ROUND512(a,b,c,d,e,f,g,h) do { \ argument
662 T1 = (h) + Sigma1_512((e)) + Ch((e), (f), (g)) + K512[j] + \
672 u_int64_t a, b, c, d, e, f, g, h, s0, s1; in SHA512Transform() local
680 d = state[3]; in SHA512Transform()
683 g = state[6]; in SHA512Transform()
689 ROUND512_0_TO_15(a,b,c,d,e,f,g,h); in SHA512Transform()
690 ROUND512_0_TO_15(h,a,b,c,d,e,f,g); in SHA512Transform()
691 ROUND512_0_TO_15(g,h,a,b,c,d,e,f); in SHA512Transform()
692 ROUND512_0_TO_15(f,g,h,a,b,c,d,e); in SHA512Transform()
693 ROUND512_0_TO_15(e,f,g,h,a,b,c,d); in SHA512Transform()
694 ROUND512_0_TO_15(d,e,f,g,h,a,b,c); in SHA512Transform()
695 ROUND512_0_TO_15(c,d,e,f,g,h,a,b); in SHA512Transform()
696 ROUND512_0_TO_15(b,c,d,e,f,g,h,a); in SHA512Transform()
701 ROUND512(a,b,c,d,e,f,g,h); in SHA512Transform()
702 ROUND512(h,a,b,c,d,e,f,g); in SHA512Transform()
703 ROUND512(g,h,a,b,c,d,e,f); in SHA512Transform()
704 ROUND512(f,g,h,a,b,c,d,e); in SHA512Transform()
705 ROUND512(e,f,g,h,a,b,c,d); in SHA512Transform()
706 ROUND512(d,e,f,g,h,a,b,c); in SHA512Transform()
707 ROUND512(c,d,e,f,g,h,a,b); in SHA512Transform()
708 ROUND512(b,c,d,e,f,g,h,a); in SHA512Transform()
715 state[3] += d; in SHA512Transform()
718 state[6] += g; in SHA512Transform()
722 a = b = c = d = e = f = g = h = T1 = 0; in SHA512Transform()
730 u_int64_t a, b, c, d, e, f, g, h, s0, s1; in SHA512Transform() local
738 d = state[3]; in SHA512Transform()
741 g = state[6]; in SHA512Transform()
749 T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + W512[j]; in SHA512Transform()
751 h = g; in SHA512Transform()
752 g = f; in SHA512Transform()
771 T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + in SHA512Transform()
774 h = g; in SHA512Transform()
775 g = f; in SHA512Transform()
790 state[3] += d; in SHA512Transform()
793 state[6] += g; in SHA512Transform()
797 a = b = c = d = e = f = g = h = T1 = T2 = 0; in SHA512Transform()
812 usedspace = (context->bitcount[0] >> 3) % SHA512_BLOCK_LENGTH; in SHA512Update()
820 ADDINC128(context->bitcount, freespace << 3); in SHA512Update()
827 ADDINC128(context->bitcount, len << 3); in SHA512Update()
836 ADDINC128(context->bitcount, SHA512_BLOCK_LENGTH << 3); in SHA512Update()
843 ADDINC128(context->bitcount, len << 3); in SHA512Update()
855 usedspace = (context->bitcount[0] >> 3) % SHA512_BLOCK_LENGTH; in SHA512Pad()