rol                32 crypto/sha1.c  #define blk0(i) (block->l[i] = (rol(block->l[i],24)&0xFF00FF00) \
rol                33 crypto/sha1.c      |(rol(block->l[i],8)&0x00FF00FF))
rol                37 crypto/sha1.c  #define blk(i) (block->l[i&15] = rol(block->l[(i+13)&15]^block->l[(i+8)&15] \
rol                41 crypto/sha1.c  #define R0(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk0(i)+0x5A827999+rol(v,5);w=rol(w,30);
rol                42 crypto/sha1.c  #define R1(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk(i)+0x5A827999+rol(v,5);w=rol(w,30);
rol                43 crypto/sha1.c  #define R2(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0x6ED9EBA1+rol(v,5);w=rol(w,30);
rol                44 crypto/sha1.c  #define R3(v,w,x,y,z,i) z+=(((w|x)&y)|(w&x))+blk(i)+0x8F1BBCDC+rol(v,5);w=rol(w,30);
rol                45 crypto/sha1.c  #define R4(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0xCA62C1D6+rol(v,5);w=rol(w,30);