Ch 289 crypto/sha2.c T1 = (h) + Sigma1_256((e)) + Ch((e), (f), (g)) + K256[j] + W256[j]; \ Ch 300 crypto/sha2.c T1 = (h) + Sigma1_256((e)) + Ch((e), (f), (g)) + K256[j] + \ Ch 392 crypto/sha2.c T1 = h + Sigma1_256(e) + Ch(e, f, g) + K256[j] + W256[j]; Ch 414 crypto/sha2.c T1 = h + Sigma1_256(e) + Ch(e, f, g) + K256[j] + Ch 575 crypto/sha2.c T1 = (h) + Sigma1_512((e)) + Ch((e), (f), (g)) + K512[j] + W512[j]; \ Ch 587 crypto/sha2.c T1 = (h) + Sigma1_512((e)) + Ch((e), (f), (g)) + K512[j] + \ Ch 676 crypto/sha2.c T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + W512[j]; Ch 698 crypto/sha2.c T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] +