rol64              58 crypto/sha3_generic.c 	t[0] = bc[4] ^ rol64(bc[1], 1);
rol64              59 crypto/sha3_generic.c 	t[1] = bc[0] ^ rol64(bc[2], 1);
rol64              60 crypto/sha3_generic.c 	t[2] = bc[1] ^ rol64(bc[3], 1);
rol64              61 crypto/sha3_generic.c 	t[3] = bc[2] ^ rol64(bc[4], 1);
rol64              62 crypto/sha3_generic.c 	t[4] = bc[3] ^ rol64(bc[0], 1);
rol64              68 crypto/sha3_generic.c 	st[ 1] = rol64(st[ 6] ^ t[1], 44);
rol64              69 crypto/sha3_generic.c 	st[ 6] = rol64(st[ 9] ^ t[4], 20);
rol64              70 crypto/sha3_generic.c 	st[ 9] = rol64(st[22] ^ t[2], 61);
rol64              71 crypto/sha3_generic.c 	st[22] = rol64(st[14] ^ t[4], 39);
rol64              72 crypto/sha3_generic.c 	st[14] = rol64(st[20] ^ t[0], 18);
rol64              73 crypto/sha3_generic.c 	st[20] = rol64(st[ 2] ^ t[2], 62);
rol64              74 crypto/sha3_generic.c 	st[ 2] = rol64(st[12] ^ t[2], 43);
rol64              75 crypto/sha3_generic.c 	st[12] = rol64(st[13] ^ t[3], 25);
rol64              76 crypto/sha3_generic.c 	st[13] = rol64(st[19] ^ t[4],  8);
rol64              77 crypto/sha3_generic.c 	st[19] = rol64(st[23] ^ t[3], 56);
rol64              78 crypto/sha3_generic.c 	st[23] = rol64(st[15] ^ t[0], 41);
rol64              79 crypto/sha3_generic.c 	st[15] = rol64(st[ 4] ^ t[4], 27);
rol64              80 crypto/sha3_generic.c 	st[ 4] = rol64(st[24] ^ t[4], 14);
rol64              81 crypto/sha3_generic.c 	st[24] = rol64(st[21] ^ t[1],  2);
rol64              82 crypto/sha3_generic.c 	st[21] = rol64(st[ 8] ^ t[3], 55);
rol64              83 crypto/sha3_generic.c 	st[ 8] = rol64(st[16] ^ t[1], 45);
rol64              84 crypto/sha3_generic.c 	st[16] = rol64(st[ 5] ^ t[0], 36);
rol64              85 crypto/sha3_generic.c 	st[ 5] = rol64(st[ 3] ^ t[3], 28);
rol64              86 crypto/sha3_generic.c 	st[ 3] = rol64(st[18] ^ t[3], 21);
rol64              87 crypto/sha3_generic.c 	st[18] = rol64(st[17] ^ t[2], 15);
rol64              88 crypto/sha3_generic.c 	st[17] = rol64(st[11] ^ t[1], 10);
rol64              89 crypto/sha3_generic.c 	st[11] = rol64(st[ 7] ^ t[2],  6);
rol64              90 crypto/sha3_generic.c 	st[ 7] = rol64(st[10] ^ t[0],  3);
rol64              91 crypto/sha3_generic.c 	st[10] = rol64(    tt ^ t[1],  1);
rol64            4221 drivers/scsi/lpfc/lpfc_init.c 		return rol64(wwn, 32);
rol64            1880 fs/namei.c     	y ^= x,	x = rol64(x,12),\
rol64            1881 fs/namei.c     	x += y,	y = rol64(y,45),\
rol64              23 lib/siphash.c  	v0 += v1; v1 = rol64(v1, 13); v1 ^= v0; v0 = rol64(v0, 32); \
rol64              24 lib/siphash.c  	v2 += v3; v3 = rol64(v3, 16); v3 ^= v2; \
rol64              25 lib/siphash.c  	v0 += v3; v3 = rol64(v3, 21); v3 ^= v0; \
rol64              26 lib/siphash.c  	v2 += v1; v1 = rol64(v1, 17); v1 ^= v2; v2 = rol64(v2, 32); \