Jim Meyering <[EMAIL PROTECTED]> writes:

> The bug strikes whenever ctx->buflen|64 != 0.

Btw, ctx->buflen|64 != 0 is always true because it is the same as
ctx->buflen|(64 != 0).

> -       sha256_process_block (ctx->buffer, ctx->buflen & ~63, ctx);
> -
>         ctx->buflen &= 63;
> +       sha256_process_block (ctx->buffer, ctx->buflen, ctx);

I hope you are aware of that a & 63 is different from a & ~63?

Andreas.

-- 
Andreas Schwab, SuSE Labs, [EMAIL PROTECTED]
SuSE Linux Products GmbH, Maxfeldstraße 5, 90409 Nürnberg, Germany
PGP key fingerprint = 58CA 54C7 6D53 942B 1756  01D3 44D5 214B 8276 4ED5
"And now for something completely different."


_______________________________________________
Bug-coreutils mailing list
[email protected]
http://lists.gnu.org/mailman/listinfo/bug-coreutils

Reply via email to