Maj               127 crypto/sha512_generic.c 		t2 = e0(a) + Maj(a,b,c);    d+=t1;    h=t1+t2;
Maj               129 crypto/sha512_generic.c 		t2 = e0(h) + Maj(h,a,b);    c+=t1;    g=t1+t2;
Maj               131 crypto/sha512_generic.c 		t2 = e0(g) + Maj(g,h,a);    b+=t1;    f=t1+t2;
Maj               133 crypto/sha512_generic.c 		t2 = e0(f) + Maj(f,g,h);    a+=t1;    e=t1+t2;
Maj               135 crypto/sha512_generic.c 		t2 = e0(e) + Maj(e,f,g);    h+=t1;    d=t1+t2;
Maj               137 crypto/sha512_generic.c 		t2 = e0(d) + Maj(d,e,f);    g+=t1;    c=t1+t2;
Maj               139 crypto/sha512_generic.c 		t2 = e0(c) + Maj(c,d,e);    f+=t1;    b=t1+t2;
Maj               141 crypto/sha512_generic.c 		t2 = e0(b) + Maj(b,c,d);    e+=t1;    a=t1+t2;
Maj                66 lib/crypto/sha256.c 	t2 = e0(a) + Maj(a, b, c);    d += t1;    h = t1 + t2;
Maj                68 lib/crypto/sha256.c 	t2 = e0(h) + Maj(h, a, b);    c += t1;    g = t1 + t2;
Maj                70 lib/crypto/sha256.c 	t2 = e0(g) + Maj(g, h, a);    b += t1;    f = t1 + t2;
Maj                72 lib/crypto/sha256.c 	t2 = e0(f) + Maj(f, g, h);    a += t1;    e = t1 + t2;
Maj                74 lib/crypto/sha256.c 	t2 = e0(e) + Maj(e, f, g);    h += t1;    d = t1 + t2;
Maj                76 lib/crypto/sha256.c 	t2 = e0(d) + Maj(d, e, f);    g += t1;    c = t1 + t2;
Maj                78 lib/crypto/sha256.c 	t2 = e0(c) + Maj(c, d, e);    f += t1;    b = t1 + t2;
Maj                80 lib/crypto/sha256.c 	t2 = e0(b) + Maj(b, c, d);    e += t1;    a = t1 + t2;
Maj                83 lib/crypto/sha256.c 	t2 = e0(a) + Maj(a, b, c);    d += t1;    h = t1 + t2;
Maj                85 lib/crypto/sha256.c 	t2 = e0(h) + Maj(h, a, b);    c += t1;    g = t1 + t2;
Maj                87 lib/crypto/sha256.c 	t2 = e0(g) + Maj(g, h, a);    b += t1;    f = t1 + t2;
Maj                89 lib/crypto/sha256.c 	t2 = e0(f) + Maj(f, g, h);    a += t1;    e = t1 + t2;
Maj                91 lib/crypto/sha256.c 	t2 = e0(e) + Maj(e, f, g);    h += t1;    d = t1 + t2;
Maj                93 lib/crypto/sha256.c 	t2 = e0(d) + Maj(d, e, f);    g += t1;    c = t1 + t2;
Maj                95 lib/crypto/sha256.c 	t2 = e0(c) + Maj(c, d, e);    f += t1;    b = t1 + t2;
Maj                97 lib/crypto/sha256.c 	t2 = e0(b) + Maj(b, c, d);    e += t1;    a = t1 + t2;
Maj               100 lib/crypto/sha256.c 	t2 = e0(a) + Maj(a, b, c);    d += t1;    h = t1 + t2;
Maj               102 lib/crypto/sha256.c 	t2 = e0(h) + Maj(h, a, b);    c += t1;    g = t1 + t2;
Maj               104 lib/crypto/sha256.c 	t2 = e0(g) + Maj(g, h, a);    b += t1;    f = t1 + t2;
Maj               106 lib/crypto/sha256.c 	t2 = e0(f) + Maj(f, g, h);    a += t1;    e = t1 + t2;
Maj               108 lib/crypto/sha256.c 	t2 = e0(e) + Maj(e, f, g);    h += t1;    d = t1 + t2;
Maj               110 lib/crypto/sha256.c 	t2 = e0(d) + Maj(d, e, f);    g += t1;    c = t1 + t2;
Maj               112 lib/crypto/sha256.c 	t2 = e0(c) + Maj(c, d, e);    f += t1;    b = t1 + t2;
Maj               114 lib/crypto/sha256.c 	t2 = e0(b) + Maj(b, c, d);    e += t1;    a = t1 + t2;
Maj               117 lib/crypto/sha256.c 	t2 = e0(a) + Maj(a, b, c);    d += t1;    h = t1 + t2;
Maj               119 lib/crypto/sha256.c 	t2 = e0(h) + Maj(h, a, b);    c += t1;    g = t1 + t2;
Maj               121 lib/crypto/sha256.c 	t2 = e0(g) + Maj(g, h, a);    b += t1;    f = t1 + t2;
Maj               123 lib/crypto/sha256.c 	t2 = e0(f) + Maj(f, g, h);    a += t1;    e = t1 + t2;
Maj               125 lib/crypto/sha256.c 	t2 = e0(e) + Maj(e, f, g);    h += t1;    d = t1 + t2;
Maj               127 lib/crypto/sha256.c 	t2 = e0(d) + Maj(d, e, f);    g += t1;    c = t1 + t2;
Maj               129 lib/crypto/sha256.c 	t2 = e0(c) + Maj(c, d, e);    f += t1;    b = t1 + t2;
Maj               131 lib/crypto/sha256.c 	t2 = e0(b) + Maj(b, c, d);    e += t1;    a = t1 + t2;
Maj               134 lib/crypto/sha256.c 	t2 = e0(a) + Maj(a, b, c);    d += t1;    h = t1 + t2;
Maj               136 lib/crypto/sha256.c 	t2 = e0(h) + Maj(h, a, b);    c += t1;    g = t1 + t2;
Maj               138 lib/crypto/sha256.c 	t2 = e0(g) + Maj(g, h, a);    b += t1;    f = t1 + t2;
Maj               140 lib/crypto/sha256.c 	t2 = e0(f) + Maj(f, g, h);    a += t1;    e = t1 + t2;
Maj               142 lib/crypto/sha256.c 	t2 = e0(e) + Maj(e, f, g);    h += t1;    d = t1 + t2;
Maj               144 lib/crypto/sha256.c 	t2 = e0(d) + Maj(d, e, f);    g += t1;    c = t1 + t2;
Maj               146 lib/crypto/sha256.c 	t2 = e0(c) + Maj(c, d, e);    f += t1;    b = t1 + t2;
Maj               148 lib/crypto/sha256.c 	t2 = e0(b) + Maj(b, c, d);    e += t1;    a = t1 + t2;
Maj               151 lib/crypto/sha256.c 	t2 = e0(a) + Maj(a, b, c);    d += t1;    h = t1 + t2;
Maj               153 lib/crypto/sha256.c 	t2 = e0(h) + Maj(h, a, b);    c += t1;    g = t1 + t2;
Maj               155 lib/crypto/sha256.c 	t2 = e0(g) + Maj(g, h, a);    b += t1;    f = t1 + t2;
Maj               157 lib/crypto/sha256.c 	t2 = e0(f) + Maj(f, g, h);    a += t1;    e = t1 + t2;
Maj               159 lib/crypto/sha256.c 	t2 = e0(e) + Maj(e, f, g);    h += t1;    d = t1 + t2;
Maj               161 lib/crypto/sha256.c 	t2 = e0(d) + Maj(d, e, f);    g += t1;    c = t1 + t2;
Maj               163 lib/crypto/sha256.c 	t2 = e0(c) + Maj(c, d, e);    f += t1;    b = t1 + t2;
Maj               165 lib/crypto/sha256.c 	t2 = e0(b) + Maj(b, c, d);    e += t1;    a = t1 + t2;
Maj               168 lib/crypto/sha256.c 	t2 = e0(a) + Maj(a, b, c);    d += t1;    h = t1 + t2;
Maj               170 lib/crypto/sha256.c 	t2 = e0(h) + Maj(h, a, b);    c += t1;    g = t1 + t2;
Maj               172 lib/crypto/sha256.c 	t2 = e0(g) + Maj(g, h, a);    b += t1;    f = t1 + t2;
Maj               174 lib/crypto/sha256.c 	t2 = e0(f) + Maj(f, g, h);    a += t1;    e = t1 + t2;
Maj               176 lib/crypto/sha256.c 	t2 = e0(e) + Maj(e, f, g);    h += t1;    d = t1 + t2;
Maj               178 lib/crypto/sha256.c 	t2 = e0(d) + Maj(d, e, f);    g += t1;    c = t1 + t2;
Maj               180 lib/crypto/sha256.c 	t2 = e0(c) + Maj(c, d, e);    f += t1;    b = t1 + t2;
Maj               182 lib/crypto/sha256.c 	t2 = e0(b) + Maj(b, c, d);    e += t1;    a = t1 + t2;
Maj               185 lib/crypto/sha256.c 	t2 = e0(a) + Maj(a, b, c);    d += t1;    h = t1 + t2;
Maj               187 lib/crypto/sha256.c 	t2 = e0(h) + Maj(h, a, b);    c += t1;    g = t1 + t2;
Maj               189 lib/crypto/sha256.c 	t2 = e0(g) + Maj(g, h, a);    b += t1;    f = t1 + t2;
Maj               191 lib/crypto/sha256.c 	t2 = e0(f) + Maj(f, g, h);    a += t1;    e = t1 + t2;
Maj               193 lib/crypto/sha256.c 	t2 = e0(e) + Maj(e, f, g);    h += t1;    d = t1 + t2;
Maj               195 lib/crypto/sha256.c 	t2 = e0(d) + Maj(d, e, f);    g += t1;    c = t1 + t2;
Maj               197 lib/crypto/sha256.c 	t2 = e0(c) + Maj(c, d, e);    f += t1;    b = t1 + t2;
Maj               199 lib/crypto/sha256.c 	t2 = e0(b) + Maj(b, c, d);    e += t1;    a = t1 + t2;