Ch                289 crypto/sha2.c  	T1 = (h) + Sigma1_256((e)) + Ch((e), (f), (g)) + K256[j] + W256[j]; \
Ch                300 crypto/sha2.c  	T1 = (h) + Sigma1_256((e)) + Ch((e), (f), (g)) + K256[j] +	    \
Ch                392 crypto/sha2.c  		T1 = h + Sigma1_256(e) + Ch(e, f, g) + K256[j] + W256[j];
Ch                414 crypto/sha2.c  		T1 = h + Sigma1_256(e) + Ch(e, f, g) + K256[j] + 
Ch                575 crypto/sha2.c  	T1 = (h) + Sigma1_512((e)) + Ch((e), (f), (g)) + K512[j] + W512[j]; \
Ch                587 crypto/sha2.c  	T1 = (h) + Sigma1_512((e)) + Ch((e), (f), (g)) + K512[j] +	    \
Ch                676 crypto/sha2.c  		T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] + W512[j];
Ch                698 crypto/sha2.c  		T1 = h + Sigma1_512(e) + Ch(e, f, g) + K512[j] +