Maj 127 crypto/sha512_generic.c t2 = e0(a) + Maj(a,b,c); d+=t1; h=t1+t2; Maj 129 crypto/sha512_generic.c t2 = e0(h) + Maj(h,a,b); c+=t1; g=t1+t2; Maj 131 crypto/sha512_generic.c t2 = e0(g) + Maj(g,h,a); b+=t1; f=t1+t2; Maj 133 crypto/sha512_generic.c t2 = e0(f) + Maj(f,g,h); a+=t1; e=t1+t2; Maj 135 crypto/sha512_generic.c t2 = e0(e) + Maj(e,f,g); h+=t1; d=t1+t2; Maj 137 crypto/sha512_generic.c t2 = e0(d) + Maj(d,e,f); g+=t1; c=t1+t2; Maj 139 crypto/sha512_generic.c t2 = e0(c) + Maj(c,d,e); f+=t1; b=t1+t2; Maj 141 crypto/sha512_generic.c t2 = e0(b) + Maj(b,c,d); e+=t1; a=t1+t2; Maj 66 lib/crypto/sha256.c t2 = e0(a) + Maj(a, b, c); d += t1; h = t1 + t2; Maj 68 lib/crypto/sha256.c t2 = e0(h) + Maj(h, a, b); c += t1; g = t1 + t2; Maj 70 lib/crypto/sha256.c t2 = e0(g) + Maj(g, h, a); b += t1; f = t1 + t2; Maj 72 lib/crypto/sha256.c t2 = e0(f) + Maj(f, g, h); a += t1; e = t1 + t2; Maj 74 lib/crypto/sha256.c t2 = e0(e) + Maj(e, f, g); h += t1; d = t1 + t2; Maj 76 lib/crypto/sha256.c t2 = e0(d) + Maj(d, e, f); g += t1; c = t1 + t2; Maj 78 lib/crypto/sha256.c t2 = e0(c) + Maj(c, d, e); f += t1; b = t1 + t2; Maj 80 lib/crypto/sha256.c t2 = e0(b) + Maj(b, c, d); e += t1; a = t1 + t2; Maj 83 lib/crypto/sha256.c t2 = e0(a) + Maj(a, b, c); d += t1; h = t1 + t2; Maj 85 lib/crypto/sha256.c t2 = e0(h) + Maj(h, a, b); c += t1; g = t1 + t2; Maj 87 lib/crypto/sha256.c t2 = e0(g) + Maj(g, h, a); b += t1; f = t1 + t2; Maj 89 lib/crypto/sha256.c t2 = e0(f) + Maj(f, g, h); a += t1; e = t1 + t2; Maj 91 lib/crypto/sha256.c t2 = e0(e) + Maj(e, f, g); h += t1; d = t1 + t2; Maj 93 lib/crypto/sha256.c t2 = e0(d) + Maj(d, e, f); g += t1; c = t1 + t2; Maj 95 lib/crypto/sha256.c t2 = e0(c) + Maj(c, d, e); f += t1; b = t1 + t2; Maj 97 lib/crypto/sha256.c t2 = e0(b) + Maj(b, c, d); e += t1; a = t1 + t2; Maj 100 lib/crypto/sha256.c t2 = e0(a) + Maj(a, b, c); d += t1; h = t1 + t2; Maj 102 lib/crypto/sha256.c t2 = e0(h) + Maj(h, a, b); c += t1; g = t1 + t2; Maj 104 lib/crypto/sha256.c t2 = e0(g) + Maj(g, h, a); b += t1; f = t1 + t2; Maj 106 lib/crypto/sha256.c t2 = e0(f) + Maj(f, g, h); a += t1; e = t1 + t2; Maj 108 lib/crypto/sha256.c t2 = e0(e) + Maj(e, f, g); h += t1; d = t1 + t2; Maj 110 lib/crypto/sha256.c t2 = e0(d) + Maj(d, e, f); g += t1; c = t1 + t2; Maj 112 lib/crypto/sha256.c t2 = e0(c) + Maj(c, d, e); f += t1; b = t1 + t2; Maj 114 lib/crypto/sha256.c t2 = e0(b) + Maj(b, c, d); e += t1; a = t1 + t2; Maj 117 lib/crypto/sha256.c t2 = e0(a) + Maj(a, b, c); d += t1; h = t1 + t2; Maj 119 lib/crypto/sha256.c t2 = e0(h) + Maj(h, a, b); c += t1; g = t1 + t2; Maj 121 lib/crypto/sha256.c t2 = e0(g) + Maj(g, h, a); b += t1; f = t1 + t2; Maj 123 lib/crypto/sha256.c t2 = e0(f) + Maj(f, g, h); a += t1; e = t1 + t2; Maj 125 lib/crypto/sha256.c t2 = e0(e) + Maj(e, f, g); h += t1; d = t1 + t2; Maj 127 lib/crypto/sha256.c t2 = e0(d) + Maj(d, e, f); g += t1; c = t1 + t2; Maj 129 lib/crypto/sha256.c t2 = e0(c) + Maj(c, d, e); f += t1; b = t1 + t2; Maj 131 lib/crypto/sha256.c t2 = e0(b) + Maj(b, c, d); e += t1; a = t1 + t2; Maj 134 lib/crypto/sha256.c t2 = e0(a) + Maj(a, b, c); d += t1; h = t1 + t2; Maj 136 lib/crypto/sha256.c t2 = e0(h) + Maj(h, a, b); c += t1; g = t1 + t2; Maj 138 lib/crypto/sha256.c t2 = e0(g) + Maj(g, h, a); b += t1; f = t1 + t2; Maj 140 lib/crypto/sha256.c t2 = e0(f) + Maj(f, g, h); a += t1; e = t1 + t2; Maj 142 lib/crypto/sha256.c t2 = e0(e) + Maj(e, f, g); h += t1; d = t1 + t2; Maj 144 lib/crypto/sha256.c t2 = e0(d) + Maj(d, e, f); g += t1; c = t1 + t2; Maj 146 lib/crypto/sha256.c t2 = e0(c) + Maj(c, d, e); f += t1; b = t1 + t2; Maj 148 lib/crypto/sha256.c t2 = e0(b) + Maj(b, c, d); e += t1; a = t1 + t2; Maj 151 lib/crypto/sha256.c t2 = e0(a) + Maj(a, b, c); d += t1; h = t1 + t2; Maj 153 lib/crypto/sha256.c t2 = e0(h) + Maj(h, a, b); c += t1; g = t1 + t2; Maj 155 lib/crypto/sha256.c t2 = e0(g) + Maj(g, h, a); b += t1; f = t1 + t2; Maj 157 lib/crypto/sha256.c t2 = e0(f) + Maj(f, g, h); a += t1; e = t1 + t2; Maj 159 lib/crypto/sha256.c t2 = e0(e) + Maj(e, f, g); h += t1; d = t1 + t2; Maj 161 lib/crypto/sha256.c t2 = e0(d) + Maj(d, e, f); g += t1; c = t1 + t2; Maj 163 lib/crypto/sha256.c t2 = e0(c) + Maj(c, d, e); f += t1; b = t1 + t2; Maj 165 lib/crypto/sha256.c t2 = e0(b) + Maj(b, c, d); e += t1; a = t1 + t2; Maj 168 lib/crypto/sha256.c t2 = e0(a) + Maj(a, b, c); d += t1; h = t1 + t2; Maj 170 lib/crypto/sha256.c t2 = e0(h) + Maj(h, a, b); c += t1; g = t1 + t2; Maj 172 lib/crypto/sha256.c t2 = e0(g) + Maj(g, h, a); b += t1; f = t1 + t2; Maj 174 lib/crypto/sha256.c t2 = e0(f) + Maj(f, g, h); a += t1; e = t1 + t2; Maj 176 lib/crypto/sha256.c t2 = e0(e) + Maj(e, f, g); h += t1; d = t1 + t2; Maj 178 lib/crypto/sha256.c t2 = e0(d) + Maj(d, e, f); g += t1; c = t1 + t2; Maj 180 lib/crypto/sha256.c t2 = e0(c) + Maj(c, d, e); f += t1; b = t1 + t2; Maj 182 lib/crypto/sha256.c t2 = e0(b) + Maj(b, c, d); e += t1; a = t1 + t2; Maj 185 lib/crypto/sha256.c t2 = e0(a) + Maj(a, b, c); d += t1; h = t1 + t2; Maj 187 lib/crypto/sha256.c t2 = e0(h) + Maj(h, a, b); c += t1; g = t1 + t2; Maj 189 lib/crypto/sha256.c t2 = e0(g) + Maj(g, h, a); b += t1; f = t1 + t2; Maj 191 lib/crypto/sha256.c t2 = e0(f) + Maj(f, g, h); a += t1; e = t1 + t2; Maj 193 lib/crypto/sha256.c t2 = e0(e) + Maj(e, f, g); h += t1; d = t1 + t2; Maj 195 lib/crypto/sha256.c t2 = e0(d) + Maj(d, e, f); g += t1; c = t1 + t2; Maj 197 lib/crypto/sha256.c t2 = e0(c) + Maj(c, d, e); f += t1; b = t1 + t2; Maj 199 lib/crypto/sha256.c t2 = e0(b) + Maj(b, c, d); e += t1; a = t1 + t2;