rol32 127 crypto/aes_generic.c crypto_fl_tab[1][i] = rol32(t, 8); rol32 128 crypto/aes_generic.c crypto_fl_tab[2][i] = rol32(t, 16); rol32 129 crypto/aes_generic.c crypto_fl_tab[3][i] = rol32(t, 24); rol32 136 crypto/aes_generic.c crypto_ft_tab[1][i] = rol32(t, 8); rol32 137 crypto/aes_generic.c crypto_ft_tab[2][i] = rol32(t, 16); rol32 138 crypto/aes_generic.c crypto_ft_tab[3][i] = rol32(t, 24); rol32 144 crypto/aes_generic.c crypto_il_tab[1][i] = rol32(t, 8); rol32 145 crypto/aes_generic.c crypto_il_tab[2][i] = rol32(t, 16); rol32 146 crypto/aes_generic.c crypto_il_tab[3][i] = rol32(t, 24); rol32 154 crypto/aes_generic.c crypto_it_tab[1][i] = rol32(t, 8); rol32 155 crypto/aes_generic.c crypto_it_tab[2][i] = rol32(t, 16); rol32 156 crypto/aes_generic.c crypto_it_tab[3][i] = rol32(t, 24); rol32 572 crypto/cast5.c #define F1(D,m,r) ( (I = ((m) + (D))), (I=rol32(I,(r))), \ rol32 574 crypto/cast5.c #define F2(D,m,r) ( (I = ((m) ^ (D))), (I=rol32(I,(r))), \ rol32 576 crypto/cast5.c #define F3(D,m,r) ( (I = ((m) - (D))), (I=rol32(I,(r))), \ rol32 38 crypto/cast6.c #define F1(D,r,m) ( (I = ((m) + (D))), (I=rol32(I,(r))), \ rol32 40 crypto/cast6.c #define F2(D,r,m) ( (I = ((m) ^ (D))), (I=rol32(I,(r))), \ rol32 42 crypto/cast6.c #define F3(D,r,m) ( (I = ((m) - (D))), (I=rol32(I,(r))), \ rol32 25 crypto/des_generic.c #define ROL(x, r) ((x) = rol32((x), (r))) rol32 37 crypto/michael_mic.c r ^= rol32(l, 17); \ rol32 41 crypto/michael_mic.c r ^= rol32(l, 3); \ rol32 48 crypto/rmd128.c (a) = rol32((a), (s)); \ rol32 51 crypto/rmd160.c (a) = rol32((a), (s)) + (e); \ rol32 52 crypto/rmd160.c (c) = rol32((c), 10); \ rol32 48 crypto/rmd256.c (a) = rol32((a), (s)); \ rol32 51 crypto/rmd320.c (a) = rol32((a), (s)) + (e); \ rol32 52 crypto/rmd320.c (c) = rol32((c), 10); \ rol32 37 crypto/serpent.c b ^= d; b ^= c; b ^= a; b ^= PHI ^ i; b = rol32(b,11); k[j] = b; rol32 50 crypto/serpent.c x0=rol32(x0,13);\ rol32 51 crypto/serpent.c x2=rol32(x2,3); x1 ^= x0; x4 = x0 << 3; \ rol32 53 crypto/serpent.c x1=rol32(x1,1); x3 ^= x4; \ rol32 54 crypto/serpent.c x3=rol32(x3,7); x4 = x1; \ rol32 57 crypto/serpent.c x1 ^= k[4*i+1]; x0=rol32(x0,5); x2=rol32(x2,22);\ rol32 72 crypto/twofish.c (d) = rol32((d), 1) ^ y rol32 79 crypto/twofish.c (c) = rol32((c), 1); \ rol32 552 crypto/twofish_common.c y = rol32(y, 8); \ rol32 554 crypto/twofish_common.c ctx->a[(j) + 1] = rol32(y, 9) rol32 565 crypto/twofish_common.c y = rol32(y, 8); \ rol32 567 crypto/twofish_common.c ctx->a[(j) + 1] = rol32(y, 9) rol32 578 crypto/twofish_common.c y = rol32(y, 8); \ rol32 580 crypto/twofish_common.c ctx->a[(j) + 1] = rol32(y, 9) rol32 69 fs/ncpfs/ncpsign_kernel.c w0=rol32(w0 + ((w1 & w2) | ((~w1) & w3)) + data2[i+0],3); rol32 70 fs/ncpfs/ncpsign_kernel.c w3=rol32(w3 + ((w0 & w1) | ((~w0) & w2)) + data2[i+1],7); rol32 71 fs/ncpfs/ncpsign_kernel.c w2=rol32(w2 + ((w3 & w0) | ((~w3) & w1)) + data2[i+2],11); rol32 72 fs/ncpfs/ncpsign_kernel.c w1=rol32(w1 + ((w2 & w3) | ((~w2) & w0)) + data2[i+3],19); rol32 75 fs/ncpfs/ncpsign_kernel.c w0=rol32(w0 + (((w2 | w3) & w1) | (w2 & w3)) + 0x5a827999 + data2[i+0],3); rol32 76 fs/ncpfs/ncpsign_kernel.c w3=rol32(w3 + (((w1 | w2) & w0) | (w1 & w2)) + 0x5a827999 + data2[i+4],5); rol32 77 fs/ncpfs/ncpsign_kernel.c w2=rol32(w2 + (((w0 | w1) & w3) | (w0 & w1)) + 0x5a827999 + data2[i+8],9); rol32 78 fs/ncpfs/ncpsign_kernel.c w1=rol32(w1 + (((w3 | w0) & w2) | (w3 & w0)) + 0x5a827999 + data2[i+12],13); rol32 81 fs/ncpfs/ncpsign_kernel.c w0=rol32(w0 + ((w1 ^ w2) ^ w3) + 0x6ed9eba1 + data2[rbit[i]+0],3); rol32 82 fs/ncpfs/ncpsign_kernel.c w3=rol32(w3 + ((w0 ^ w1) ^ w2) + 0x6ed9eba1 + data2[rbit[i]+8],9); rol32 83 fs/ncpfs/ncpsign_kernel.c w2=rol32(w2 + ((w3 ^ w0) ^ w1) + 0x6ed9eba1 + data2[rbit[i]+4],11); rol32 84 fs/ncpfs/ncpsign_kernel.c w1=rol32(w1 + ((w2 ^ w3) ^ w0) + 0x6ed9eba1 + data2[rbit[i]+12],15); rol32 1515 fs/xfs/xfs_da_btree.c (name[3] << 0) ^ rol32(hash, 7 * 4); rol32 1523 fs/xfs/xfs_da_btree.c rol32(hash, 7 * 3); rol32 1525 fs/xfs/xfs_da_btree.c return (name[0] << 7) ^ (name[1] << 0) ^ rol32(hash, 7 * 2); rol32 1527 fs/xfs/xfs_da_btree.c return (name[0] << 0) ^ rol32(hash, 7 * 1); rol32 63 fs/xfs/xfs_dir2.c hash = tolower(name->name[i]) ^ rol32(hash, 7); rol32 47 lib/sha1.c W[i+16] = rol32(W[i+13] ^ W[i+8] ^ W[i+2] ^ W[i], 1); rol32 56 lib/sha1.c t = f1(b, c, d) + K1 + rol32(a, 5) + e + W[i]; rol32 57 lib/sha1.c e = d; d = c; c = rol32(b, 30); b = a; a = t; rol32 61 lib/sha1.c t = f2(b, c, d) + K2 + rol32(a, 5) + e + W[i]; rol32 62 lib/sha1.c e = d; d = c; c = rol32(b, 30); b = a; a = t; rol32 66 lib/sha1.c t = f3(b, c, d) + K3 + rol32(a, 5) + e + W[i]; rol32 67 lib/sha1.c e = d; d = c; c = rol32(b, 30); b = a; a = t; rol32 71 lib/sha1.c t = f2(b, c, d) + K4 + rol32(a, 5) + e + W[i]; rol32 72 lib/sha1.c e = d; d = c; c = rol32(b, 30); b = a; a = t; rol32 19 net/mac80211/michael.c mctx->r ^= rol32(mctx->l, 17); rol32 24 net/mac80211/michael.c mctx->r ^= rol32(mctx->l, 3);