Lines Matching +full:6 +full:e +full:- +full:7

1 // SPDX-License-Identifier: GPL-2.0-or-later
3 * SHA-256, as specified in
4 * http://csrc.nist.gov/groups/STM/cavp/documents/shs/sha256-384-512.pdf
6 * SHA-256 code by Jean-Luc Cooke <jlcooke@certainkey.com>.
8 * Copyright (c) Jean-Luc Cooke <jlcooke@certainkey.com>
50 #define e1(x) (ror32(x, 6) ^ ror32(x, 11) ^ ror32(x, 25))
51 #define s0(x) (ror32(x, 7) ^ ror32(x, 18) ^ (x >> 3))
61 W[I] = s1(W[I-2]) + W[I-7] + s0(W[I-15]) + W[I-16]; in BLEND_OP()
64 #define SHA256_ROUND(i, a, b, c, d, e, f, g, h) do { \ argument
66 t1 = h + e1(e) + Ch(e, f, g) + SHA256_K[i] + W[i]; \
74 u32 a, b, c, d, e, f, g, h; in sha256_transform() local
85 LOAD_OP(i + 6, W, input); in sha256_transform()
86 LOAD_OP(i + 7, W, input); in sha256_transform()
97 BLEND_OP(i + 6, W); in sha256_transform()
98 BLEND_OP(i + 7, W); in sha256_transform()
103 e = state[4]; f = state[5]; g = state[6]; h = state[7]; in sha256_transform()
107 SHA256_ROUND(i + 0, a, b, c, d, e, f, g, h); in sha256_transform()
108 SHA256_ROUND(i + 1, h, a, b, c, d, e, f, g); in sha256_transform()
109 SHA256_ROUND(i + 2, g, h, a, b, c, d, e, f); in sha256_transform()
110 SHA256_ROUND(i + 3, f, g, h, a, b, c, d, e); in sha256_transform()
111 SHA256_ROUND(i + 4, e, f, g, h, a, b, c, d); in sha256_transform()
112 SHA256_ROUND(i + 5, d, e, f, g, h, a, b, c); in sha256_transform()
113 SHA256_ROUND(i + 6, c, d, e, f, g, h, a, b); in sha256_transform()
114 SHA256_ROUND(i + 7, b, c, d, e, f, g, h, a); in sha256_transform()
118 state[4] += e; state[5] += f; state[6] += g; state[7] += h; in sha256_transform()
127 sha256_transform(sctx->state, input, W); in sha256_transform_blocks()
129 } while (--blocks); in sha256_transform_blocks()