Jim Meyering <[EMAIL PROTECTED]> writes: > The bug strikes whenever ctx->buflen|64 != 0.
Btw, ctx->buflen|64 != 0 is always true because it is the same as ctx->buflen|(64 != 0). > - sha256_process_block (ctx->buffer, ctx->buflen & ~63, ctx); > - > ctx->buflen &= 63; > + sha256_process_block (ctx->buffer, ctx->buflen, ctx); I hope you are aware of that a & 63 is different from a & ~63? Andreas. -- Andreas Schwab, SuSE Labs, [EMAIL PROTECTED] SuSE Linux Products GmbH, Maxfeldstraße 5, 90409 Nürnberg, Germany PGP key fingerprint = 58CA 54C7 6D53 942B 1756 01D3 44D5 214B 8276 4ED5 "And now for something completely different." _______________________________________________ Bug-coreutils mailing list [email protected] http://lists.gnu.org/mailman/listinfo/bug-coreutils
