gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[libmicrohttpd] branch master updated: sha*/md5: fixed implicit value co


From: gnunet
Subject: [libmicrohttpd] branch master updated: sha*/md5: fixed implicit value conversion
Date: Sun, 05 Sep 2021 16:39:32 +0200

This is an automated email from the git hooks/post-receive script.

karlson2k pushed a commit to branch master
in repository libmicrohttpd.

The following commit(s) were added to refs/heads/master by this push:
     new 2646f3a6 sha*/md5: fixed implicit value conversion
2646f3a6 is described below

commit 2646f3a681d993ebfff8eaa340615fd94c3d2738
Author: Evgeny Grin (Karlson2k) <k2k@narod.ru>
AuthorDate: Sun Sep 5 17:39:09 2021 +0300

    sha*/md5: fixed implicit value conversion
    
    Performance may be improved as a side effect
---
 src/microhttpd/md5.c    | 142 +++++++++++++++++------------------
 src/microhttpd/sha1.c   |  18 ++---
 src/microhttpd/sha256.c | 192 ++++++++++++++++++++++++++++++------------------
 3 files changed, 200 insertions(+), 152 deletions(-)

diff --git a/src/microhttpd/md5.c b/src/microhttpd/md5.c
index b4ca7af8..4de888a8 100644
--- a/src/microhttpd/md5.c
+++ b/src/microhttpd/md5.c
@@ -46,10 +46,10 @@ MHD_MD5Init (void *ctx_)
 
   mhd_assert (ctx != NULL);
   ctx->count = 0;
-  ctx->state[0] = 0x67452301;
-  ctx->state[1] = 0xefcdab89;
-  ctx->state[2] = 0x98badcfe;
-  ctx->state[3] = 0x10325476;
+  ctx->state[0] = UINT32_C (0x67452301);
+  ctx->state[1] = UINT32_C (0xefcdab89);
+  ctx->state[2] = UINT32_C (0x98badcfe);
+  ctx->state[3] = UINT32_C (0x10325476);
 }
 
 
@@ -186,73 +186,73 @@ MD5Transform (uint32_t state[4],
   c = state[2];
   d = state[3];
 
-  MD5STEP (F1, a, b, c, d, in[0]  + 0xd76aa478, 7);
-  MD5STEP (F1, d, a, b, c, in[1]  + 0xe8c7b756, 12);
-  MD5STEP (F1, c, d, a, b, in[2]  + 0x242070db, 17);
-  MD5STEP (F1, b, c, d, a, in[3]  + 0xc1bdceee, 22);
-  MD5STEP (F1, a, b, c, d, in[4]  + 0xf57c0faf, 7);
-  MD5STEP (F1, d, a, b, c, in[5]  + 0x4787c62a, 12);
-  MD5STEP (F1, c, d, a, b, in[6]  + 0xa8304613, 17);
-  MD5STEP (F1, b, c, d, a, in[7]  + 0xfd469501, 22);
-  MD5STEP (F1, a, b, c, d, in[8]  + 0x698098d8, 7);
-  MD5STEP (F1, d, a, b, c, in[9]  + 0x8b44f7af, 12);
-  MD5STEP (F1, c, d, a, b, in[10] + 0xffff5bb1, 17);
-  MD5STEP (F1, b, c, d, a, in[11] + 0x895cd7be, 22);
-  MD5STEP (F1, a, b, c, d, in[12] + 0x6b901122, 7);
-  MD5STEP (F1, d, a, b, c, in[13] + 0xfd987193, 12);
-  MD5STEP (F1, c, d, a, b, in[14] + 0xa679438e, 17);
-  MD5STEP (F1, b, c, d, a, in[15] + 0x49b40821, 22);
-
-  MD5STEP (F2, a, b, c, d, in[1]  + 0xf61e2562, 5);
-  MD5STEP (F2, d, a, b, c, in[6]  + 0xc040b340, 9);
-  MD5STEP (F2, c, d, a, b, in[11] + 0x265e5a51, 14);
-  MD5STEP (F2, b, c, d, a, in[0]  + 0xe9b6c7aa, 20);
-  MD5STEP (F2, a, b, c, d, in[5]  + 0xd62f105d, 5);
-  MD5STEP (F2, d, a, b, c, in[10] + 0x02441453, 9);
-  MD5STEP (F2, c, d, a, b, in[15] + 0xd8a1e681, 14);
-  MD5STEP (F2, b, c, d, a, in[4]  + 0xe7d3fbc8, 20);
-  MD5STEP (F2, a, b, c, d, in[9]  + 0x21e1cde6, 5);
-  MD5STEP (F2, d, a, b, c, in[14] + 0xc33707d6, 9);
-  MD5STEP (F2, c, d, a, b, in[3]  + 0xf4d50d87, 14);
-  MD5STEP (F2, b, c, d, a, in[8]  + 0x455a14ed, 20);
-  MD5STEP (F2, a, b, c, d, in[13] + 0xa9e3e905, 5);
-  MD5STEP (F2, d, a, b, c, in[2]  + 0xfcefa3f8, 9);
-  MD5STEP (F2, c, d, a, b, in[7]  + 0x676f02d9, 14);
-  MD5STEP (F2, b, c, d, a, in[12] + 0x8d2a4c8a, 20);
-
-  MD5STEP (F3, a, b, c, d, in[5]  + 0xfffa3942, 4);
-  MD5STEP (F3, d, a, b, c, in[8]  + 0x8771f681, 11);
-  MD5STEP (F3, c, d, a, b, in[11] + 0x6d9d6122, 16);
-  MD5STEP (F3, b, c, d, a, in[14] + 0xfde5380c, 23);
-  MD5STEP (F3, a, b, c, d, in[1]  + 0xa4beea44, 4);
-  MD5STEP (F3, d, a, b, c, in[4]  + 0x4bdecfa9, 11);
-  MD5STEP (F3, c, d, a, b, in[7]  + 0xf6bb4b60, 16);
-  MD5STEP (F3, b, c, d, a, in[10] + 0xbebfbc70, 23);
-  MD5STEP (F3, a, b, c, d, in[13] + 0x289b7ec6, 4);
-  MD5STEP (F3, d, a, b, c, in[0]  + 0xeaa127fa, 11);
-  MD5STEP (F3, c, d, a, b, in[3]  + 0xd4ef3085, 16);
-  MD5STEP (F3, b, c, d, a, in[6]  + 0x04881d05, 23);
-  MD5STEP (F3, a, b, c, d, in[9]  + 0xd9d4d039, 4);
-  MD5STEP (F3, d, a, b, c, in[12] + 0xe6db99e5, 11);
-  MD5STEP (F3, c, d, a, b, in[15] + 0x1fa27cf8, 16);
-  MD5STEP (F3, b, c, d, a, in[2]  + 0xc4ac5665, 23);
-
-  MD5STEP (F4, a, b, c, d, in[0]  + 0xf4292244, 6);
-  MD5STEP (F4, d, a, b, c, in[7]  + 0x432aff97, 10);
-  MD5STEP (F4, c, d, a, b, in[14] + 0xab9423a7, 15);
-  MD5STEP (F4, b, c, d, a, in[5]  + 0xfc93a039, 21);
-  MD5STEP (F4, a, b, c, d, in[12] + 0x655b59c3, 6);
-  MD5STEP (F4, d, a, b, c, in[3]  + 0x8f0ccc92, 10);
-  MD5STEP (F4, c, d, a, b, in[10] + 0xffeff47d, 15);
-  MD5STEP (F4, b, c, d, a, in[1]  + 0x85845dd1, 21);
-  MD5STEP (F4, a, b, c, d, in[8]  + 0x6fa87e4f, 6);
-  MD5STEP (F4, d, a, b, c, in[15] + 0xfe2ce6e0, 10);
-  MD5STEP (F4, c, d, a, b, in[6]  + 0xa3014314, 15);
-  MD5STEP (F4, b, c, d, a, in[13] + 0x4e0811a1, 21);
-  MD5STEP (F4, a, b, c, d, in[4]  + 0xf7537e82, 6);
-  MD5STEP (F4, d, a, b, c, in[11] + 0xbd3af235, 10);
-  MD5STEP (F4, c, d, a, b, in[2]  + 0x2ad7d2bb, 15);
-  MD5STEP (F4, b, c, d, a, in[9]  + 0xeb86d391, 21);
+  MD5STEP (F1, a, b, c, d, in[0]  + UINT32_C (0xd76aa478), 7);
+  MD5STEP (F1, d, a, b, c, in[1]  + UINT32_C (0xe8c7b756), 12);
+  MD5STEP (F1, c, d, a, b, in[2]  + UINT32_C (0x242070db), 17);
+  MD5STEP (F1, b, c, d, a, in[3]  + UINT32_C (0xc1bdceee), 22);
+  MD5STEP (F1, a, b, c, d, in[4]  + UINT32_C (0xf57c0faf), 7);
+  MD5STEP (F1, d, a, b, c, in[5]  + UINT32_C (0x4787c62a), 12);
+  MD5STEP (F1, c, d, a, b, in[6]  + UINT32_C (0xa8304613), 17);
+  MD5STEP (F1, b, c, d, a, in[7]  + UINT32_C (0xfd469501), 22);
+  MD5STEP (F1, a, b, c, d, in[8]  + UINT32_C (0x698098d8), 7);
+  MD5STEP (F1, d, a, b, c, in[9]  + UINT32_C (0x8b44f7af), 12);
+  MD5STEP (F1, c, d, a, b, in[10] + UINT32_C (0xffff5bb1), 17);
+  MD5STEP (F1, b, c, d, a, in[11] + UINT32_C (0x895cd7be), 22);
+  MD5STEP (F1, a, b, c, d, in[12] + UINT32_C (0x6b901122), 7);
+  MD5STEP (F1, d, a, b, c, in[13] + UINT32_C (0xfd987193), 12);
+  MD5STEP (F1, c, d, a, b, in[14] + UINT32_C (0xa679438e), 17);
+  MD5STEP (F1, b, c, d, a, in[15] + UINT32_C (0x49b40821), 22);
+
+  MD5STEP (F2, a, b, c, d, in[1]  + UINT32_C (0xf61e2562), 5);
+  MD5STEP (F2, d, a, b, c, in[6]  + UINT32_C (0xc040b340), 9);
+  MD5STEP (F2, c, d, a, b, in[11] + UINT32_C (0x265e5a51), 14);
+  MD5STEP (F2, b, c, d, a, in[0]  + UINT32_C (0xe9b6c7aa), 20);
+  MD5STEP (F2, a, b, c, d, in[5]  + UINT32_C (0xd62f105d), 5);
+  MD5STEP (F2, d, a, b, c, in[10] + UINT32_C (0x02441453), 9);
+  MD5STEP (F2, c, d, a, b, in[15] + UINT32_C (0xd8a1e681), 14);
+  MD5STEP (F2, b, c, d, a, in[4]  + UINT32_C (0xe7d3fbc8), 20);
+  MD5STEP (F2, a, b, c, d, in[9]  + UINT32_C (0x21e1cde6), 5);
+  MD5STEP (F2, d, a, b, c, in[14] + UINT32_C (0xc33707d6), 9);
+  MD5STEP (F2, c, d, a, b, in[3]  + UINT32_C (0xf4d50d87), 14);
+  MD5STEP (F2, b, c, d, a, in[8]  + UINT32_C (0x455a14ed), 20);
+  MD5STEP (F2, a, b, c, d, in[13] + UINT32_C (0xa9e3e905), 5);
+  MD5STEP (F2, d, a, b, c, in[2]  + UINT32_C (0xfcefa3f8), 9);
+  MD5STEP (F2, c, d, a, b, in[7]  + UINT32_C (0x676f02d9), 14);
+  MD5STEP (F2, b, c, d, a, in[12] + UINT32_C (0x8d2a4c8a), 20);
+
+  MD5STEP (F3, a, b, c, d, in[5]  + UINT32_C (0xfffa3942), 4);
+  MD5STEP (F3, d, a, b, c, in[8]  + UINT32_C (0x8771f681), 11);
+  MD5STEP (F3, c, d, a, b, in[11] + UINT32_C (0x6d9d6122), 16);
+  MD5STEP (F3, b, c, d, a, in[14] + UINT32_C (0xfde5380c), 23);
+  MD5STEP (F3, a, b, c, d, in[1]  + UINT32_C (0xa4beea44), 4);
+  MD5STEP (F3, d, a, b, c, in[4]  + UINT32_C (0x4bdecfa9), 11);
+  MD5STEP (F3, c, d, a, b, in[7]  + UINT32_C (0xf6bb4b60), 16);
+  MD5STEP (F3, b, c, d, a, in[10] + UINT32_C (0xbebfbc70), 23);
+  MD5STEP (F3, a, b, c, d, in[13] + UINT32_C (0x289b7ec6), 4);
+  MD5STEP (F3, d, a, b, c, in[0]  + UINT32_C (0xeaa127fa), 11);
+  MD5STEP (F3, c, d, a, b, in[3]  + UINT32_C (0xd4ef3085), 16);
+  MD5STEP (F3, b, c, d, a, in[6]  + UINT32_C (0x04881d05), 23);
+  MD5STEP (F3, a, b, c, d, in[9]  + UINT32_C (0xd9d4d039), 4);
+  MD5STEP (F3, d, a, b, c, in[12] + UINT32_C (0xe6db99e5), 11);
+  MD5STEP (F3, c, d, a, b, in[15] + UINT32_C (0x1fa27cf8), 16);
+  MD5STEP (F3, b, c, d, a, in[2]  + UINT32_C (0xc4ac5665), 23);
+
+  MD5STEP (F4, a, b, c, d, in[0]  + UINT32_C (0xf4292244), 6);
+  MD5STEP (F4, d, a, b, c, in[7]  + UINT32_C (0x432aff97), 10);
+  MD5STEP (F4, c, d, a, b, in[14] + UINT32_C (0xab9423a7), 15);
+  MD5STEP (F4, b, c, d, a, in[5]  + UINT32_C (0xfc93a039), 21);
+  MD5STEP (F4, a, b, c, d, in[12] + UINT32_C (0x655b59c3), 6);
+  MD5STEP (F4, d, a, b, c, in[3]  + UINT32_C (0x8f0ccc92), 10);
+  MD5STEP (F4, c, d, a, b, in[10] + UINT32_C (0xffeff47d), 15);
+  MD5STEP (F4, b, c, d, a, in[1]  + UINT32_C (0x85845dd1), 21);
+  MD5STEP (F4, a, b, c, d, in[8]  + UINT32_C (0x6fa87e4f), 6);
+  MD5STEP (F4, d, a, b, c, in[15] + UINT32_C (0xfe2ce6e0), 10);
+  MD5STEP (F4, c, d, a, b, in[6]  + UINT32_C (0xa3014314), 15);
+  MD5STEP (F4, b, c, d, a, in[13] + UINT32_C (0x4e0811a1), 21);
+  MD5STEP (F4, a, b, c, d, in[4]  + UINT32_C (0xf7537e82), 6);
+  MD5STEP (F4, d, a, b, c, in[11] + UINT32_C (0xbd3af235), 10);
+  MD5STEP (F4, c, d, a, b, in[2]  + UINT32_C (0x2ad7d2bb), 15);
+  MD5STEP (F4, b, c, d, a, in[9]  + UINT32_C (0xeb86d391), 21);
 
   state[0] += a;
   state[1] += b;
diff --git a/src/microhttpd/sha1.c b/src/microhttpd/sha1.c
index 5d4a5b93..9888cbfe 100644
--- a/src/microhttpd/sha1.c
+++ b/src/microhttpd/sha1.c
@@ -43,11 +43,11 @@ MHD_SHA1_init (void *ctx_)
   struct sha1_ctx *const ctx = ctx_;
   /* Initial hash values, see FIPS PUB 180-4 paragraph 5.3.1 */
   /* Just some "magic" numbers defined by standard */
-  ctx->H[0] = 0x67452301UL;
-  ctx->H[1] = 0xefcdab89UL;
-  ctx->H[2] = 0x98badcfeUL;
-  ctx->H[3] = 0x10325476UL;
-  ctx->H[4] = 0xc3d2e1f0UL;
+  ctx->H[0] = UINT32_C (0x67452301);
+  ctx->H[1] = UINT32_C (0xefcdab89);
+  ctx->H[2] = UINT32_C (0x98badcfe);
+  ctx->H[3] = UINT32_C (0x10325476);
+  ctx->H[4] = UINT32_C (0xc3d2e1f0);
 
   /* Initialise number of bytes. */
   ctx->count = 0;
@@ -121,13 +121,13 @@ sha1_transform (uint32_t H[_SHA1_DIGEST_LENGTH],
 #endif /* _MHD_GET_32BIT_BE_UNALIGNED */
 
 /* SHA-1 values of Kt for t=0..19, see FIPS PUB 180-4 paragraph 4.2.1. */
-#define K00      0x5a827999UL
+#define K00      UINT32_C(0x5a827999)
 /* SHA-1 values of Kt for t=20..39, see FIPS PUB 180-4 paragraph 4.2.1.*/
-#define K20      0x6ed9eba1UL
+#define K20      UINT32_C(0x6ed9eba1)
 /* SHA-1 values of Kt for t=40..59, see FIPS PUB 180-4 paragraph 4.2.1.*/
-#define K40      0x8f1bbcdcUL
+#define K40      UINT32_C(0x8f1bbcdc)
 /* SHA-1 values of Kt for t=60..79, see FIPS PUB 180-4 paragraph 4.2.1.*/
-#define K60      0xca62c1d6UL
+#define K60      UINT32_C(0xca62c1d6)
 
   /* During first 16 steps, before making any calculations on each step,
      the W element is read from input data buffer as big-endian value and
diff --git a/src/microhttpd/sha256.c b/src/microhttpd/sha256.c
index df6a1aa3..6f6700dc 100644
--- a/src/microhttpd/sha256.c
+++ b/src/microhttpd/sha256.c
@@ -45,14 +45,14 @@ MHD_SHA256_init (void *ctx_)
   /* First thirty-two bits of the fractional parts of the square
    * roots of the first eight prime numbers: 2, 3, 5, 7, 11, 13,
    * 17, 19." */
-  ctx->H[0] = 0x6a09e667UL;
-  ctx->H[1] = 0xbb67ae85UL;
-  ctx->H[2] = 0x3c6ef372UL;
-  ctx->H[3] = 0xa54ff53aUL;
-  ctx->H[4] = 0x510e527fUL;
-  ctx->H[5] = 0x9b05688cUL;
-  ctx->H[6] = 0x1f83d9abUL;
-  ctx->H[7] = 0x5be0cd19UL;
+  ctx->H[0] = UINT32_C (0x6a09e667);
+  ctx->H[1] = UINT32_C (0xbb67ae85);
+  ctx->H[2] = UINT32_C (0x3c6ef372);
+  ctx->H[3] = UINT32_C (0xa54ff53a);
+  ctx->H[4] = UINT32_C (0x510e527f);
+  ctx->H[5] = UINT32_C (0x9b05688c);
+  ctx->H[6] = UINT32_C (0x1f83d9ab);
+  ctx->H[7] = UINT32_C (0x5be0cd19);
 
   /* Initialise number of bytes. */
   ctx->count = 0;
@@ -144,37 +144,37 @@ sha256_transform (uint32_t H[_SHA256_DIGEST_LENGTH],
      stored in array of W elements. */
   /* Note: instead of using K constants as array, all K values are specified
      individually for each step, see FIPS PUB 180-4 paragraph 4.2.2 for K 
values. */
-  SHA2STEP32 (a, b, c, d, e, f, g, h, 0x428a2f98UL, W[0] = \
+  SHA2STEP32 (a, b, c, d, e, f, g, h, UINT32_C (0x428a2f98), W[0] = \
                 GET_W_FROM_DATA (data, 0));
-  SHA2STEP32 (h, a, b, c, d, e, f, g, 0x71374491UL, W[1] = \
+  SHA2STEP32 (h, a, b, c, d, e, f, g, UINT32_C (0x71374491), W[1] = \
                 GET_W_FROM_DATA (data, 1));
-  SHA2STEP32 (g, h, a, b, c, d, e, f, 0xb5c0fbcfUL, W[2] = \
+  SHA2STEP32 (g, h, a, b, c, d, e, f, UINT32_C (0xb5c0fbcf), W[2] = \
                 GET_W_FROM_DATA (data, 2));
-  SHA2STEP32 (f, g, h, a, b, c, d, e, 0xe9b5dba5UL, W[3] = \
+  SHA2STEP32 (f, g, h, a, b, c, d, e, UINT32_C (0xe9b5dba5), W[3] = \
                 GET_W_FROM_DATA (data, 3));
-  SHA2STEP32 (e, f, g, h, a, b, c, d, 0x3956c25bUL, W[4] = \
+  SHA2STEP32 (e, f, g, h, a, b, c, d, UINT32_C (0x3956c25b), W[4] = \
                 GET_W_FROM_DATA (data, 4));
-  SHA2STEP32 (d, e, f, g, h, a, b, c, 0x59f111f1UL, W[5] = \
+  SHA2STEP32 (d, e, f, g, h, a, b, c, UINT32_C (0x59f111f1), W[5] = \
                 GET_W_FROM_DATA (data, 5));
-  SHA2STEP32 (c, d, e, f, g, h, a, b, 0x923f82a4UL, W[6] = \
+  SHA2STEP32 (c, d, e, f, g, h, a, b, UINT32_C (0x923f82a4), W[6] = \
                 GET_W_FROM_DATA (data, 6));
-  SHA2STEP32 (b, c, d, e, f, g, h, a, 0xab1c5ed5UL, W[7] = \
+  SHA2STEP32 (b, c, d, e, f, g, h, a, UINT32_C (0xab1c5ed5), W[7] = \
                 GET_W_FROM_DATA (data, 7));
-  SHA2STEP32 (a, b, c, d, e, f, g, h, 0xd807aa98UL, W[8] = \
+  SHA2STEP32 (a, b, c, d, e, f, g, h, UINT32_C (0xd807aa98), W[8] = \
                 GET_W_FROM_DATA (data, 8));
-  SHA2STEP32 (h, a, b, c, d, e, f, g, 0x12835b01UL, W[9] = \
+  SHA2STEP32 (h, a, b, c, d, e, f, g, UINT32_C (0x12835b01), W[9] = \
                 GET_W_FROM_DATA (data, 9));
-  SHA2STEP32 (g, h, a, b, c, d, e, f, 0x243185beUL, W[10] = \
+  SHA2STEP32 (g, h, a, b, c, d, e, f, UINT32_C (0x243185be), W[10] = \
                 GET_W_FROM_DATA (data, 10));
-  SHA2STEP32 (f, g, h, a, b, c, d, e, 0x550c7dc3UL, W[11] = \
+  SHA2STEP32 (f, g, h, a, b, c, d, e, UINT32_C (0x550c7dc3), W[11] = \
                 GET_W_FROM_DATA (data, 11));
-  SHA2STEP32 (e, f, g, h, a, b, c, d, 0x72be5d74UL, W[12] = \
+  SHA2STEP32 (e, f, g, h, a, b, c, d, UINT32_C (0x72be5d74), W[12] = \
                 GET_W_FROM_DATA (data, 12));
-  SHA2STEP32 (d, e, f, g, h, a, b, c, 0x80deb1feUL, W[13] = \
+  SHA2STEP32 (d, e, f, g, h, a, b, c, UINT32_C (0x80deb1fe), W[13] = \
                 GET_W_FROM_DATA (data, 13));
-  SHA2STEP32 (c, d, e, f, g, h, a, b, 0x9bdc06a7UL, W[14] = \
+  SHA2STEP32 (c, d, e, f, g, h, a, b, UINT32_C (0x9bdc06a7), W[14] = \
                 GET_W_FROM_DATA (data, 14));
-  SHA2STEP32 (b, c, d, e, f, g, h, a, 0xc19bf174UL, W[15] = \
+  SHA2STEP32 (b, c, d, e, f, g, h, a, UINT32_C (0xc19bf174), W[15] = \
                 GET_W_FROM_DATA (data, 15));
 
   /* 'W' generation and assignment for 16 <= t <= 63.
@@ -190,54 +190,102 @@ sha256_transform (uint32_t H[_SHA256_DIGEST_LENGTH],
      stored back in cyclic buffer. */
   /* Note: instead of using K constants as array, all K values are specified
      individually for each step, see FIPS PUB 180-4 paragraph 4.2.2 for K 
values. */
-  SHA2STEP32 (a, b, c, d, e, f, g, h, 0xe49b69c1UL, W[16 & 0xf] = Wgen (W,16));
-  SHA2STEP32 (h, a, b, c, d, e, f, g, 0xefbe4786UL, W[17 & 0xf] = Wgen (W,17));
-  SHA2STEP32 (g, h, a, b, c, d, e, f, 0x0fc19dc6UL, W[18 & 0xf] = Wgen (W,18));
-  SHA2STEP32 (f, g, h, a, b, c, d, e, 0x240ca1ccUL, W[19 & 0xf] = Wgen (W,19));
-  SHA2STEP32 (e, f, g, h, a, b, c, d, 0x2de92c6fUL, W[20 & 0xf] = Wgen (W,20));
-  SHA2STEP32 (d, e, f, g, h, a, b, c, 0x4a7484aaUL, W[21 & 0xf] = Wgen (W,21));
-  SHA2STEP32 (c, d, e, f, g, h, a, b, 0x5cb0a9dcUL, W[22 & 0xf] = Wgen (W,22));
-  SHA2STEP32 (b, c, d, e, f, g, h, a, 0x76f988daUL, W[23 & 0xf] = Wgen (W,23));
-  SHA2STEP32 (a, b, c, d, e, f, g, h, 0x983e5152UL, W[24 & 0xf] = Wgen (W,24));
-  SHA2STEP32 (h, a, b, c, d, e, f, g, 0xa831c66dUL, W[25 & 0xf] = Wgen (W,25));
-  SHA2STEP32 (g, h, a, b, c, d, e, f, 0xb00327c8UL, W[26 & 0xf] = Wgen (W,26));
-  SHA2STEP32 (f, g, h, a, b, c, d, e, 0xbf597fc7UL, W[27 & 0xf] = Wgen (W,27));
-  SHA2STEP32 (e, f, g, h, a, b, c, d, 0xc6e00bf3UL, W[28 & 0xf] = Wgen (W,28));
-  SHA2STEP32 (d, e, f, g, h, a, b, c, 0xd5a79147UL, W[29 & 0xf] = Wgen (W,29));
-  SHA2STEP32 (c, d, e, f, g, h, a, b, 0x06ca6351UL, W[30 & 0xf] = Wgen (W,30));
-  SHA2STEP32 (b, c, d, e, f, g, h, a, 0x14292967UL, W[31 & 0xf] = Wgen (W,31));
-  SHA2STEP32 (a, b, c, d, e, f, g, h, 0x27b70a85UL, W[32 & 0xf] = Wgen (W,32));
-  SHA2STEP32 (h, a, b, c, d, e, f, g, 0x2e1b2138UL, W[33 & 0xf] = Wgen (W,33));
-  SHA2STEP32 (g, h, a, b, c, d, e, f, 0x4d2c6dfcUL, W[34 & 0xf] = Wgen (W,34));
-  SHA2STEP32 (f, g, h, a, b, c, d, e, 0x53380d13UL, W[35 & 0xf] = Wgen (W,35));
-  SHA2STEP32 (e, f, g, h, a, b, c, d, 0x650a7354UL, W[36 & 0xf] = Wgen (W,36));
-  SHA2STEP32 (d, e, f, g, h, a, b, c, 0x766a0abbUL, W[37 & 0xf] = Wgen (W,37));
-  SHA2STEP32 (c, d, e, f, g, h, a, b, 0x81c2c92eUL, W[38 & 0xf] = Wgen (W,38));
-  SHA2STEP32 (b, c, d, e, f, g, h, a, 0x92722c85UL, W[39 & 0xf] = Wgen (W,39));
-  SHA2STEP32 (a, b, c, d, e, f, g, h, 0xa2bfe8a1UL, W[40 & 0xf] = Wgen (W,40));
-  SHA2STEP32 (h, a, b, c, d, e, f, g, 0xa81a664bUL, W[41 & 0xf] = Wgen (W,41));
-  SHA2STEP32 (g, h, a, b, c, d, e, f, 0xc24b8b70UL, W[42 & 0xf] = Wgen (W,42));
-  SHA2STEP32 (f, g, h, a, b, c, d, e, 0xc76c51a3UL, W[43 & 0xf] = Wgen (W,43));
-  SHA2STEP32 (e, f, g, h, a, b, c, d, 0xd192e819UL, W[44 & 0xf] = Wgen (W,44));
-  SHA2STEP32 (d, e, f, g, h, a, b, c, 0xd6990624UL, W[45 & 0xf] = Wgen (W,45));
-  SHA2STEP32 (c, d, e, f, g, h, a, b, 0xf40e3585UL, W[46 & 0xf] = Wgen (W,46));
-  SHA2STEP32 (b, c, d, e, f, g, h, a, 0x106aa070UL, W[47 & 0xf] = Wgen (W,47));
-  SHA2STEP32 (a, b, c, d, e, f, g, h, 0x19a4c116UL, W[48 & 0xf] = Wgen (W,48));
-  SHA2STEP32 (h, a, b, c, d, e, f, g, 0x1e376c08UL, W[49 & 0xf] = Wgen (W,49));
-  SHA2STEP32 (g, h, a, b, c, d, e, f, 0x2748774cUL, W[50 & 0xf] = Wgen (W,50));
-  SHA2STEP32 (f, g, h, a, b, c, d, e, 0x34b0bcb5UL, W[51 & 0xf] = Wgen (W,51));
-  SHA2STEP32 (e, f, g, h, a, b, c, d, 0x391c0cb3UL, W[52 & 0xf] = Wgen (W,52));
-  SHA2STEP32 (d, e, f, g, h, a, b, c, 0x4ed8aa4aUL, W[53 & 0xf] = Wgen (W,53));
-  SHA2STEP32 (c, d, e, f, g, h, a, b, 0x5b9cca4fUL, W[54 & 0xf] = Wgen (W,54));
-  SHA2STEP32 (b, c, d, e, f, g, h, a, 0x682e6ff3UL, W[55 & 0xf] = Wgen (W,55));
-  SHA2STEP32 (a, b, c, d, e, f, g, h, 0x748f82eeUL, W[56 & 0xf] = Wgen (W,56));
-  SHA2STEP32 (h, a, b, c, d, e, f, g, 0x78a5636fUL, W[57 & 0xf] = Wgen (W,57));
-  SHA2STEP32 (g, h, a, b, c, d, e, f, 0x84c87814UL, W[58 & 0xf] = Wgen (W,58));
-  SHA2STEP32 (f, g, h, a, b, c, d, e, 0x8cc70208UL, W[59 & 0xf] = Wgen (W,59));
-  SHA2STEP32 (e, f, g, h, a, b, c, d, 0x90befffaUL, W[60 & 0xf] = Wgen (W,60));
-  SHA2STEP32 (d, e, f, g, h, a, b, c, 0xa4506cebUL, W[61 & 0xf] = Wgen (W,61));
-  SHA2STEP32 (c, d, e, f, g, h, a, b, 0xbef9a3f7UL, W[62 & 0xf] = Wgen (W,62));
-  SHA2STEP32 (b, c, d, e, f, g, h, a, 0xc67178f2UL, W[63 & 0xf] = Wgen (W,63));
+  SHA2STEP32 (a, b, c, d, e, f, g, h, UINT32_C (0xe49b69c1), W[16 & 0xf] = \
+                Wgen (W,16));
+  SHA2STEP32 (h, a, b, c, d, e, f, g, UINT32_C (0xefbe4786), W[17 & 0xf] = \
+                Wgen (W,17));
+  SHA2STEP32 (g, h, a, b, c, d, e, f, UINT32_C (0x0fc19dc6), W[18 & 0xf] = \
+                Wgen (W,18));
+  SHA2STEP32 (f, g, h, a, b, c, d, e, UINT32_C (0x240ca1cc), W[19 & 0xf] = \
+                Wgen (W,19));
+  SHA2STEP32 (e, f, g, h, a, b, c, d, UINT32_C (0x2de92c6f), W[20 & 0xf] = \
+                Wgen (W,20));
+  SHA2STEP32 (d, e, f, g, h, a, b, c, UINT32_C (0x4a7484aa), W[21 & 0xf] = \
+                Wgen (W,21));
+  SHA2STEP32 (c, d, e, f, g, h, a, b, UINT32_C (0x5cb0a9dc), W[22 & 0xf] = \
+                Wgen (W,22));
+  SHA2STEP32 (b, c, d, e, f, g, h, a, UINT32_C (0x76f988da), W[23 & 0xf] = \
+                Wgen (W,23));
+  SHA2STEP32 (a, b, c, d, e, f, g, h, UINT32_C (0x983e5152), W[24 & 0xf] = \
+                Wgen (W,24));
+  SHA2STEP32 (h, a, b, c, d, e, f, g, UINT32_C (0xa831c66d), W[25 & 0xf] = \
+                Wgen (W,25));
+  SHA2STEP32 (g, h, a, b, c, d, e, f, UINT32_C (0xb00327c8), W[26 & 0xf] = \
+                Wgen (W,26));
+  SHA2STEP32 (f, g, h, a, b, c, d, e, UINT32_C (0xbf597fc7), W[27 & 0xf] = \
+                Wgen (W,27));
+  SHA2STEP32 (e, f, g, h, a, b, c, d, UINT32_C (0xc6e00bf3), W[28 & 0xf] = \
+                Wgen (W,28));
+  SHA2STEP32 (d, e, f, g, h, a, b, c, UINT32_C (0xd5a79147), W[29 & 0xf] = \
+                Wgen (W,29));
+  SHA2STEP32 (c, d, e, f, g, h, a, b, UINT32_C (0x06ca6351), W[30 & 0xf] = \
+                Wgen (W,30));
+  SHA2STEP32 (b, c, d, e, f, g, h, a, UINT32_C (0x14292967), W[31 & 0xf] = \
+                Wgen (W,31));
+  SHA2STEP32 (a, b, c, d, e, f, g, h, UINT32_C (0x27b70a85), W[32 & 0xf] = \
+                Wgen (W,32));
+  SHA2STEP32 (h, a, b, c, d, e, f, g, UINT32_C (0x2e1b2138), W[33 & 0xf] = \
+                Wgen (W,33));
+  SHA2STEP32 (g, h, a, b, c, d, e, f, UINT32_C (0x4d2c6dfc), W[34 & 0xf] = \
+                Wgen (W,34));
+  SHA2STEP32 (f, g, h, a, b, c, d, e, UINT32_C (0x53380d13), W[35 & 0xf] = \
+                Wgen (W,35));
+  SHA2STEP32 (e, f, g, h, a, b, c, d, UINT32_C (0x650a7354), W[36 & 0xf] = \
+                Wgen (W,36));
+  SHA2STEP32 (d, e, f, g, h, a, b, c, UINT32_C (0x766a0abb), W[37 & 0xf] = \
+                Wgen (W,37));
+  SHA2STEP32 (c, d, e, f, g, h, a, b, UINT32_C (0x81c2c92e), W[38 & 0xf] = \
+                Wgen (W,38));
+  SHA2STEP32 (b, c, d, e, f, g, h, a, UINT32_C (0x92722c85), W[39 & 0xf] = \
+                Wgen (W,39));
+  SHA2STEP32 (a, b, c, d, e, f, g, h, UINT32_C (0xa2bfe8a1), W[40 & 0xf] = \
+                Wgen (W,40));
+  SHA2STEP32 (h, a, b, c, d, e, f, g, UINT32_C (0xa81a664b), W[41 & 0xf] = \
+                Wgen (W,41));
+  SHA2STEP32 (g, h, a, b, c, d, e, f, UINT32_C (0xc24b8b70), W[42 & 0xf] = \
+                Wgen (W,42));
+  SHA2STEP32 (f, g, h, a, b, c, d, e, UINT32_C (0xc76c51a3), W[43 & 0xf] = \
+                Wgen (W,43));
+  SHA2STEP32 (e, f, g, h, a, b, c, d, UINT32_C (0xd192e819), W[44 & 0xf] = \
+                Wgen (W,44));
+  SHA2STEP32 (d, e, f, g, h, a, b, c, UINT32_C (0xd6990624), W[45 & 0xf] = \
+                Wgen (W,45));
+  SHA2STEP32 (c, d, e, f, g, h, a, b, UINT32_C (0xf40e3585), W[46 & 0xf] = \
+                Wgen (W,46));
+  SHA2STEP32 (b, c, d, e, f, g, h, a, UINT32_C (0x106aa070), W[47 & 0xf] = \
+                Wgen (W,47));
+  SHA2STEP32 (a, b, c, d, e, f, g, h, UINT32_C (0x19a4c116), W[48 & 0xf] = \
+                Wgen (W,48));
+  SHA2STEP32 (h, a, b, c, d, e, f, g, UINT32_C (0x1e376c08), W[49 & 0xf] = \
+                Wgen (W,49));
+  SHA2STEP32 (g, h, a, b, c, d, e, f, UINT32_C (0x2748774c), W[50 & 0xf] = \
+                Wgen (W,50));
+  SHA2STEP32 (f, g, h, a, b, c, d, e, UINT32_C (0x34b0bcb5), W[51 & 0xf] = \
+                Wgen (W,51));
+  SHA2STEP32 (e, f, g, h, a, b, c, d, UINT32_C (0x391c0cb3), W[52 & 0xf] = \
+                Wgen (W,52));
+  SHA2STEP32 (d, e, f, g, h, a, b, c, UINT32_C (0x4ed8aa4a), W[53 & 0xf] = \
+                Wgen (W,53));
+  SHA2STEP32 (c, d, e, f, g, h, a, b, UINT32_C (0x5b9cca4f), W[54 & 0xf] = \
+                Wgen (W,54));
+  SHA2STEP32 (b, c, d, e, f, g, h, a, UINT32_C (0x682e6ff3), W[55 & 0xf] = \
+                Wgen (W,55));
+  SHA2STEP32 (a, b, c, d, e, f, g, h, UINT32_C (0x748f82ee), W[56 & 0xf] = \
+                Wgen (W,56));
+  SHA2STEP32 (h, a, b, c, d, e, f, g, UINT32_C (0x78a5636f), W[57 & 0xf] = \
+                Wgen (W,57));
+  SHA2STEP32 (g, h, a, b, c, d, e, f, UINT32_C (0x84c87814), W[58 & 0xf] = \
+                Wgen (W,58));
+  SHA2STEP32 (f, g, h, a, b, c, d, e, UINT32_C (0x8cc70208), W[59 & 0xf] = \
+                Wgen (W,59));
+  SHA2STEP32 (e, f, g, h, a, b, c, d, UINT32_C (0x90befffa), W[60 & 0xf] = \
+                Wgen (W,60));
+  SHA2STEP32 (d, e, f, g, h, a, b, c, UINT32_C (0xa4506ceb), W[61 & 0xf] = \
+                Wgen (W,61));
+  SHA2STEP32 (c, d, e, f, g, h, a, b, UINT32_C (0xbef9a3f7), W[62 & 0xf] = \
+                Wgen (W,62));
+  SHA2STEP32 (b, c, d, e, f, g, h, a, UINT32_C (0xc67178f2), W[63 & 0xf] = \
+                Wgen (W,63));
 
   /* Compute intermediate hash.
      See FIPS PUB 180-4 paragraph 6.2.2 step 4. */

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]