rol32             127 crypto/aes_generic.c 		crypto_fl_tab[1][i] = rol32(t, 8);
rol32             128 crypto/aes_generic.c 		crypto_fl_tab[2][i] = rol32(t, 16);
rol32             129 crypto/aes_generic.c 		crypto_fl_tab[3][i] = rol32(t, 24);
rol32             136 crypto/aes_generic.c 		crypto_ft_tab[1][i] = rol32(t, 8);
rol32             137 crypto/aes_generic.c 		crypto_ft_tab[2][i] = rol32(t, 16);
rol32             138 crypto/aes_generic.c 		crypto_ft_tab[3][i] = rol32(t, 24);
rol32             144 crypto/aes_generic.c 		crypto_il_tab[1][i] = rol32(t, 8);
rol32             145 crypto/aes_generic.c 		crypto_il_tab[2][i] = rol32(t, 16);
rol32             146 crypto/aes_generic.c 		crypto_il_tab[3][i] = rol32(t, 24);
rol32             154 crypto/aes_generic.c 		crypto_it_tab[1][i] = rol32(t, 8);
rol32             155 crypto/aes_generic.c 		crypto_it_tab[2][i] = rol32(t, 16);
rol32             156 crypto/aes_generic.c 		crypto_it_tab[3][i] = rol32(t, 24);
rol32             572 crypto/cast5.c #define F1(D,m,r)  (  (I = ((m) + (D))), (I=rol32(I,(r))),   \
rol32             574 crypto/cast5.c #define F2(D,m,r)  (  (I = ((m) ^ (D))), (I=rol32(I,(r))),   \
rol32             576 crypto/cast5.c #define F3(D,m,r)  (  (I = ((m) - (D))), (I=rol32(I,(r))),   \
rol32              38 crypto/cast6.c #define F1(D,r,m)  (  (I = ((m) + (D))), (I=rol32(I,(r))),   \
rol32              40 crypto/cast6.c #define F2(D,r,m)  (  (I = ((m) ^ (D))), (I=rol32(I,(r))),   \
rol32              42 crypto/cast6.c #define F3(D,r,m)  (  (I = ((m) - (D))), (I=rol32(I,(r))),   \
rol32              25 crypto/des_generic.c #define ROL(x, r) ((x) = rol32((x), (r)))
rol32              37 crypto/michael_mic.c 	r ^= rol32(l, 17);	\
rol32              41 crypto/michael_mic.c 	r ^= rol32(l, 3);	\
rol32              48 crypto/rmd128.c 	(a) = rol32((a), (s)); \
rol32              51 crypto/rmd160.c 	(a) = rol32((a), (s)) + (e); \
rol32              52 crypto/rmd160.c 	(c) = rol32((c), 10); \
rol32              48 crypto/rmd256.c 	(a) = rol32((a), (s)); \
rol32              51 crypto/rmd320.c 	(a) = rol32((a), (s)) + (e); \
rol32              52 crypto/rmd320.c 	(c) = rol32((c), 10); \
rol32              37 crypto/serpent.c         b ^= d; b ^= c; b ^= a; b ^= PHI ^ i; b = rol32(b,11); k[j] = b;
rol32              50 crypto/serpent.c 					x0=rol32(x0,13);\
rol32              51 crypto/serpent.c 	x2=rol32(x2,3);	x1 ^= x0;	x4  = x0 << 3;	\
rol32              53 crypto/serpent.c 	x1=rol32(x1,1);	x3 ^= x4;			\
rol32              54 crypto/serpent.c 	x3=rol32(x3,7);	x4  = x1;			\
rol32              57 crypto/serpent.c 	x1 ^= k[4*i+1];	x0=rol32(x0,5);	x2=rol32(x2,22);\
rol32              72 crypto/twofish.c    (d) = rol32((d), 1) ^ y
rol32              79 crypto/twofish.c    (c) = rol32((c), 1); \
rol32             552 crypto/twofish_common.c    y = rol32(y, 8); \
rol32             554 crypto/twofish_common.c    ctx->a[(j) + 1] = rol32(y, 9)
rol32             565 crypto/twofish_common.c    y = rol32(y, 8); \
rol32             567 crypto/twofish_common.c    ctx->a[(j) + 1] = rol32(y, 9)
rol32             578 crypto/twofish_common.c    y = rol32(y, 8); \
rol32             580 crypto/twofish_common.c    ctx->a[(j) + 1] = rol32(y, 9)
rol32              69 fs/ncpfs/ncpsign_kernel.c   w0=rol32(w0 + ((w1 & w2) | ((~w1) & w3)) + data2[i+0],3);
rol32              70 fs/ncpfs/ncpsign_kernel.c   w3=rol32(w3 + ((w0 & w1) | ((~w0) & w2)) + data2[i+1],7);
rol32              71 fs/ncpfs/ncpsign_kernel.c   w2=rol32(w2 + ((w3 & w0) | ((~w3) & w1)) + data2[i+2],11);
rol32              72 fs/ncpfs/ncpsign_kernel.c   w1=rol32(w1 + ((w2 & w3) | ((~w2) & w0)) + data2[i+3],19);
rol32              75 fs/ncpfs/ncpsign_kernel.c   w0=rol32(w0 + (((w2 | w3) & w1) | (w2 & w3)) + 0x5a827999 + data2[i+0],3);
rol32              76 fs/ncpfs/ncpsign_kernel.c   w3=rol32(w3 + (((w1 | w2) & w0) | (w1 & w2)) + 0x5a827999 + data2[i+4],5);
rol32              77 fs/ncpfs/ncpsign_kernel.c   w2=rol32(w2 + (((w0 | w1) & w3) | (w0 & w1)) + 0x5a827999 + data2[i+8],9);
rol32              78 fs/ncpfs/ncpsign_kernel.c   w1=rol32(w1 + (((w3 | w0) & w2) | (w3 & w0)) + 0x5a827999 + data2[i+12],13);
rol32              81 fs/ncpfs/ncpsign_kernel.c   w0=rol32(w0 + ((w1 ^ w2) ^ w3) + 0x6ed9eba1 + data2[rbit[i]+0],3);
rol32              82 fs/ncpfs/ncpsign_kernel.c   w3=rol32(w3 + ((w0 ^ w1) ^ w2) + 0x6ed9eba1 + data2[rbit[i]+8],9);
rol32              83 fs/ncpfs/ncpsign_kernel.c   w2=rol32(w2 + ((w3 ^ w0) ^ w1) + 0x6ed9eba1 + data2[rbit[i]+4],11);
rol32              84 fs/ncpfs/ncpsign_kernel.c   w1=rol32(w1 + ((w2 ^ w3) ^ w0) + 0x6ed9eba1 + data2[rbit[i]+12],15);
rol32            1515 fs/xfs/xfs_da_btree.c 		       (name[3] << 0) ^ rol32(hash, 7 * 4);
rol32            1523 fs/xfs/xfs_da_btree.c 		       rol32(hash, 7 * 3);
rol32            1525 fs/xfs/xfs_da_btree.c 		return (name[0] << 7) ^ (name[1] << 0) ^ rol32(hash, 7 * 2);
rol32            1527 fs/xfs/xfs_da_btree.c 		return (name[0] << 0) ^ rol32(hash, 7 * 1);
rol32              63 fs/xfs/xfs_dir2.c 		hash = tolower(name->name[i]) ^ rol32(hash, 7);
rol32              47 lib/sha1.c     		W[i+16] = rol32(W[i+13] ^ W[i+8] ^ W[i+2] ^ W[i], 1);
rol32              56 lib/sha1.c     		t = f1(b, c, d) + K1 + rol32(a, 5) + e + W[i];
rol32              57 lib/sha1.c     		e = d; d = c; c = rol32(b, 30); b = a; a = t;
rol32              61 lib/sha1.c     		t = f2(b, c, d) + K2 + rol32(a, 5) + e + W[i];
rol32              62 lib/sha1.c     		e = d; d = c; c = rol32(b, 30); b = a; a = t;
rol32              66 lib/sha1.c     		t = f3(b, c, d) + K3 + rol32(a, 5) + e + W[i];
rol32              67 lib/sha1.c     		e = d; d = c; c = rol32(b, 30); b = a; a = t;
rol32              71 lib/sha1.c     		t = f2(b, c, d) + K4 + rol32(a, 5) + e + W[i];
rol32              72 lib/sha1.c     		e = d; d = c; c = rol32(b, 30); b = a; a = t;
rol32              19 net/mac80211/michael.c 	mctx->r ^= rol32(mctx->l, 17);
rol32              24 net/mac80211/michael.c 	mctx->r ^= rol32(mctx->l, 3);