rol 32 crypto/sha1.c #define blk0(i) (block->l[i] = (rol(block->l[i],24)&0xFF00FF00) \ rol 33 crypto/sha1.c |(rol(block->l[i],8)&0x00FF00FF)) rol 37 crypto/sha1.c #define blk(i) (block->l[i&15] = rol(block->l[(i+13)&15]^block->l[(i+8)&15] \ rol 41 crypto/sha1.c #define R0(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk0(i)+0x5A827999+rol(v,5);w=rol(w,30); rol 42 crypto/sha1.c #define R1(v,w,x,y,z,i) z+=((w&(x^y))^y)+blk(i)+0x5A827999+rol(v,5);w=rol(w,30); rol 43 crypto/sha1.c #define R2(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0x6ED9EBA1+rol(v,5);w=rol(w,30); rol 44 crypto/sha1.c #define R3(v,w,x,y,z,i) z+=(((w|x)&y)|(w&x))+blk(i)+0x8F1BBCDC+rol(v,5);w=rol(w,30); rol 45 crypto/sha1.c #define R4(v,w,x,y,z,i) z+=(w^x^y)+blk(i)+0xCA62C1D6+rol(v,5);w=rol(w,30);