DECLSPEC void sha256_transform (const u32 *w0, const u32 *w1, const u32 *w2, const u32 *w3, u32 *digest)
{
u32 a = digest[];
u32 b = digest[];
u32 c = digest[];
u32 d = digest[];
u32 e = digest[];
u32 f = digest[];
u32 g = digest[];
u32 h = digest[]; u32 w0_t = w0[];
u32 w1_t = w0[];
u32 w2_t = w0[];
u32 w3_t = w0[];
u32 w4_t = w1[];
u32 w5_t = w1[];
u32 w6_t = w1[];
u32 w7_t = w1[];
u32 w8_t = w2[];
u32 w9_t = w2[];
u32 wa_t = w2[];
u32 wb_t = w2[];
u32 wc_t = w3[];
u32 wd_t = w3[];
u32 we_t = w3[];
u32 wf_t = w3[]; #define ROUND_EXPAND_S() \
{ \
w0_t = SHA256_EXPAND_S (we_t, w9_t, w1_t, w0_t); \
w1_t = SHA256_EXPAND_S (wf_t, wa_t, w2_t, w1_t); \
w2_t = SHA256_EXPAND_S (w0_t, wb_t, w3_t, w2_t); \
w3_t = SHA256_EXPAND_S (w1_t, wc_t, w4_t, w3_t); \
w4_t = SHA256_EXPAND_S (w2_t, wd_t, w5_t, w4_t); \
w5_t = SHA256_EXPAND_S (w3_t, we_t, w6_t, w5_t); \
w6_t = SHA256_EXPAND_S (w4_t, wf_t, w7_t, w6_t); \
w7_t = SHA256_EXPAND_S (w5_t, w0_t, w8_t, w7_t); \
w8_t = SHA256_EXPAND_S (w6_t, w1_t, w9_t, w8_t); \
w9_t = SHA256_EXPAND_S (w7_t, w2_t, wa_t, w9_t); \
wa_t = SHA256_EXPAND_S (w8_t, w3_t, wb_t, wa_t); \
wb_t = SHA256_EXPAND_S (w9_t, w4_t, wc_t, wb_t); \
wc_t = SHA256_EXPAND_S (wa_t, w5_t, wd_t, wc_t); \
wd_t = SHA256_EXPAND_S (wb_t, w6_t, we_t, wd_t); \
we_t = SHA256_EXPAND_S (wc_t, w7_t, wf_t, we_t); \
wf_t = SHA256_EXPAND_S (wd_t, w8_t, w0_t, wf_t); \
} #define ROUND_STEP_S(i) \
{ \
SHA256_STEP_S (SHA256_F0o, SHA256_F1o, a, b, c, d, e, f, g, h, w0_t, k_sha256[i + ]); \
SHA256_STEP_S (SHA256_F0o, SHA256_F1o, h, a, b, c, d, e, f, g, w1_t, k_sha256[i + ]); \
SHA256_STEP_S (SHA256_F0o, SHA256_F1o, g, h, a, b, c, d, e, f, w2_t, k_sha256[i + ]); \
SHA256_STEP_S (SHA256_F0o, SHA256_F1o, f, g, h, a, b, c, d, e, w3_t, k_sha256[i + ]); \
SHA256_STEP_S (SHA256_F0o, SHA256_F1o, e, f, g, h, a, b, c, d, w4_t, k_sha256[i + ]); \
SHA256_STEP_S (SHA256_F0o, SHA256_F1o, d, e, f, g, h, a, b, c, w5_t, k_sha256[i + ]); \
SHA256_STEP_S (SHA256_F0o, SHA256_F1o, c, d, e, f, g, h, a, b, w6_t, k_sha256[i + ]); \
SHA256_STEP_S (SHA256_F0o, SHA256_F1o, b, c, d, e, f, g, h, a, w7_t, k_sha256[i + ]); \
SHA256_STEP_S (SHA256_F0o, SHA256_F1o, a, b, c, d, e, f, g, h, w8_t, k_sha256[i + ]); \
SHA256_STEP_S (SHA256_F0o, SHA256_F1o, h, a, b, c, d, e, f, g, w9_t, k_sha256[i + ]); \
SHA256_STEP_S (SHA256_F0o, SHA256_F1o, g, h, a, b, c, d, e, f, wa_t, k_sha256[i + ]); \
SHA256_STEP_S (SHA256_F0o, SHA256_F1o, f, g, h, a, b, c, d, e, wb_t, k_sha256[i + ]); \
SHA256_STEP_S (SHA256_F0o, SHA256_F1o, e, f, g, h, a, b, c, d, wc_t, k_sha256[i + ]); \
SHA256_STEP_S (SHA256_F0o, SHA256_F1o, d, e, f, g, h, a, b, c, wd_t, k_sha256[i + ]); \
SHA256_STEP_S (SHA256_F0o, SHA256_F1o, c, d, e, f, g, h, a, b, we_t, k_sha256[i + ]); \
SHA256_STEP_S (SHA256_F0o, SHA256_F1o, b, c, d, e, f, g, h, a, wf_t, k_sha256[i + ]); \
} ROUND_STEP_S (); #ifdef _unroll
#pragma unroll
#endif
for (int i = ; i < ; i += )
{
ROUND_EXPAND_S (); ROUND_STEP_S (i);
} #undef ROUND_EXPAND_S
#undef ROUND_STEP_S digest[] += a;
digest[] += b;
digest[] += c;
digest[] += d;
digest[] += e;
digest[] += f;
digest[] += g;
digest[] += h;
}

sha256_transform的更多相关文章

  1. 【18/12/31】hashcat源码粗读 --- sha256部分

    还没有详细研究过sha256算法的详细原理,主要是移植cf10算法时,hashcat在cf10_parse_hash时并不是直接调用sha256_update和sha256_final, 而是为了pr ...

随机推荐

  1. 【转】Python高级知识点总结

    一.可迭代对象.迭代器对象和生成器 像list, tuple等这些序列是可以使用for...in ...语句来进行遍历输出的.这是为什么呢?这就需要知道可迭代对象(Iterable).迭代器对象(It ...

  2. Scaffold(Material库中提供的页面脚手架)知识点

    Scaffold 包含:appBar.body.floatingActionButton

  3. is_numeric — 检测变量是否为数字或数字字符串

    is_numeric — 检测变量是否为数字或数字字符串 bool is_numeric ( mixed $var ) 如果 var 是数字和数字字符串则返回 TRUE ,否则返回 FALSE . 参 ...

  4. Ubuntu安装ssh 与samba

    1.安装ssh服务 sudo apt-get install openssh-server 2.开启ssh(/etc/init.d文件夹) sudo service ssh start 2.安装sam ...

  5. JavaScript 版本的 RSA加密库文件

    <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/ ...

  6. PHP获取新插入的主键id

    近期在做订单系统开发的时候遇到了此类情景,A表内插入后返回新插入的主键ID,然后用于B表插入数据并携带此id. 目前有几个方法总结 No1.每次插入数据之后返回A表内的最大值,但是对于多用户以及高并发 ...

  7. MS SQL 数据库所在C盘变得很大解决办法

    C:\Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\LOG 一般是这个文件夹里的ERRORLOG变得很大.所以要清理. 执行一次EXEC sp_cy ...

  8. 学习笔记《Java多线程编程实战指南》二

    2.1线程属性 属性 属性类型及用途  只读属性  注意事项 编号(id) long型,标识不同线程  是  不适合用作唯一标识 名称(name) String型,区分不同线程  否  设置名称有助于 ...

  9. awk 正则匹配指定字段次数统计

    1. 文本数据 head 12315_industry_business.csv name,business,label,label_name 沧州光松房屋拆迁有限公司,旧房拆迁.改造:物业服务(依法 ...

  10. windows下的Redis主从集群搭建

    Redis官方不提供Windows版本,目前Windows下的版本是有微软开源团队(Microsoft Open Tech group)维护. http://redis.cn/ redis中文网 wi ...