Symbol: ROL64
crypto/openssl/crypto/sha/keccak1600.c
139
D[0] = ROL64(C[1], 1) ^ C[4];
crypto/openssl/crypto/sha/keccak1600.c
140
D[1] = ROL64(C[2], 1) ^ C[0];
crypto/openssl/crypto/sha/keccak1600.c
141
D[2] = ROL64(C[3], 1) ^ C[1];
crypto/openssl/crypto/sha/keccak1600.c
142
D[3] = ROL64(C[4], 1) ^ C[2];
crypto/openssl/crypto/sha/keccak1600.c
143
D[4] = ROL64(C[0], 1) ^ C[3];
crypto/openssl/crypto/sha/keccak1600.c
159
A[y][0] = ROL64(A[y][0], rhotates[y][0]);
crypto/openssl/crypto/sha/keccak1600.c
160
A[y][1] = ROL64(A[y][1], rhotates[y][1]);
crypto/openssl/crypto/sha/keccak1600.c
161
A[y][2] = ROL64(A[y][2], rhotates[y][2]);
crypto/openssl/crypto/sha/keccak1600.c
162
A[y][3] = ROL64(A[y][3], rhotates[y][3]);
crypto/openssl/crypto/sha/keccak1600.c
163
A[y][4] = ROL64(A[y][4], rhotates[y][4]);
crypto/openssl/crypto/sha/keccak1600.c
272
D[1] = E[0] = ROL64(C[2], 1) ^ C[0];
crypto/openssl/crypto/sha/keccak1600.c
273
D[4] = E[1] = ROL64(C[0], 1) ^ C[3];
crypto/openssl/crypto/sha/keccak1600.c
274
D[0] = C[0] = ROL64(C[1], 1) ^ C[4];
crypto/openssl/crypto/sha/keccak1600.c
275
D[2] = C[1] = ROL64(C[3], 1) ^ C[1];
crypto/openssl/crypto/sha/keccak1600.c
276
D[3] = C[2] = ROL64(C[4], 1) ^ C[2];
crypto/openssl/crypto/sha/keccak1600.c
284
C[3] = ROL64(A[3][3] ^ C[2], rhotates[3][3]); /* D[3] */
crypto/openssl/crypto/sha/keccak1600.c
285
C[4] = ROL64(A[4][4] ^ E[1], rhotates[4][4]); /* D[4] */
crypto/openssl/crypto/sha/keccak1600.c
287
C[2] = ROL64(A[2][2] ^ C[1], rhotates[2][2]); /* D[2] */
crypto/openssl/crypto/sha/keccak1600.c
288
C[1] = ROL64(A[1][1] ^ E[0], rhotates[1][1]); /* D[1] */
crypto/openssl/crypto/sha/keccak1600.c
290
D[0] = ROL64(C[1], 1) ^ C[4];
crypto/openssl/crypto/sha/keccak1600.c
291
D[1] = ROL64(C[2], 1) ^ C[0];
crypto/openssl/crypto/sha/keccak1600.c
292
D[2] = ROL64(C[3], 1) ^ C[1];
crypto/openssl/crypto/sha/keccak1600.c
293
D[3] = ROL64(C[4], 1) ^ C[2];
crypto/openssl/crypto/sha/keccak1600.c
294
D[4] = ROL64(C[0], 1) ^ C[3];
crypto/openssl/crypto/sha/keccak1600.c
303
C[1] = ROL64(A[1][1] ^ D[1], rhotates[1][1]);
crypto/openssl/crypto/sha/keccak1600.c
304
C[2] = ROL64(A[2][2] ^ D[2], rhotates[2][2]);
crypto/openssl/crypto/sha/keccak1600.c
305
C[3] = ROL64(A[3][3] ^ D[3], rhotates[3][3]);
crypto/openssl/crypto/sha/keccak1600.c
306
C[4] = ROL64(A[4][4] ^ D[4], rhotates[4][4]);
crypto/openssl/crypto/sha/keccak1600.c
320
C[0] = ROL64(T[0][3], rhotates[0][3]);
crypto/openssl/crypto/sha/keccak1600.c
321
C[1] = ROL64(A[1][4] ^ C[2], rhotates[1][4]); /* D[4] */
crypto/openssl/crypto/sha/keccak1600.c
322
C[2] = ROL64(A[2][0] ^ C[3], rhotates[2][0]); /* D[0] */
crypto/openssl/crypto/sha/keccak1600.c
323
C[3] = ROL64(A[3][1] ^ C[4], rhotates[3][1]); /* D[1] */
crypto/openssl/crypto/sha/keccak1600.c
324
C[4] = ROL64(A[4][2] ^ E[0], rhotates[4][2]); /* D[2] */
crypto/openssl/crypto/sha/keccak1600.c
332
C[0] = ROL64(T[0][1], rhotates[0][1]);
crypto/openssl/crypto/sha/keccak1600.c
333
C[1] = ROL64(T[1][2], rhotates[1][2]);
crypto/openssl/crypto/sha/keccak1600.c
334
C[2] = ROL64(A[2][3] ^ D[3], rhotates[2][3]);
crypto/openssl/crypto/sha/keccak1600.c
335
C[3] = ROL64(A[3][4] ^ D[4], rhotates[3][4]);
crypto/openssl/crypto/sha/keccak1600.c
336
C[4] = ROL64(A[4][0] ^ D[0], rhotates[4][0]);
crypto/openssl/crypto/sha/keccak1600.c
344
C[0] = ROL64(T[0][4], rhotates[0][4]);
crypto/openssl/crypto/sha/keccak1600.c
345
C[1] = ROL64(T[1][0], rhotates[1][0]);
crypto/openssl/crypto/sha/keccak1600.c
346
C[2] = ROL64(T[1][1], rhotates[2][1]); /* originally A[2][1] */
crypto/openssl/crypto/sha/keccak1600.c
347
C[3] = ROL64(A[3][2] ^ D[2], rhotates[3][2]);
crypto/openssl/crypto/sha/keccak1600.c
348
C[4] = ROL64(A[4][3] ^ D[3], rhotates[4][3]);
crypto/openssl/crypto/sha/keccak1600.c
356
C[0] = ROL64(T[0][2], rhotates[0][2]);
crypto/openssl/crypto/sha/keccak1600.c
357
C[1] = ROL64(T[1][3], rhotates[1][3]);
crypto/openssl/crypto/sha/keccak1600.c
358
C[2] = ROL64(T[1][4], rhotates[2][4]); /* originally A[2][4] */
crypto/openssl/crypto/sha/keccak1600.c
359
C[3] = ROL64(T[0][0], rhotates[3][0]); /* originally A[3][0] */
crypto/openssl/crypto/sha/keccak1600.c
360
C[4] = ROL64(A[4][1] ^ D[1], rhotates[4][1]);
crypto/openssl/crypto/sha/keccak1600.c
398
D[1] = C[0] ^ ROL64(C[2], 1);
crypto/openssl/crypto/sha/keccak1600.c
399
D[2] = C[1] ^ ROL64(C[3], 1);
crypto/openssl/crypto/sha/keccak1600.c
400
D[3] = C[2] ^= ROL64(C[4], 1);
crypto/openssl/crypto/sha/keccak1600.c
401
D[4] = C[3] ^= ROL64(C[0], 1);
crypto/openssl/crypto/sha/keccak1600.c
402
D[0] = C[4] ^= ROL64(C[1], 1);
crypto/openssl/crypto/sha/keccak1600.c
439
A[0][1] = ROL64(A[1][1], rhotates[1][1]);
crypto/openssl/crypto/sha/keccak1600.c
440
A[0][2] = ROL64(A[2][2], rhotates[2][2]);
crypto/openssl/crypto/sha/keccak1600.c
441
A[0][3] = ROL64(A[3][3], rhotates[3][3]);
crypto/openssl/crypto/sha/keccak1600.c
442
A[0][4] = ROL64(A[4][4], rhotates[4][4]);
crypto/openssl/crypto/sha/keccak1600.c
444
A[1][1] = ROL64(A[1][4], rhotates[1][4]);
crypto/openssl/crypto/sha/keccak1600.c
445
A[2][2] = ROL64(A[2][3], rhotates[2][3]);
crypto/openssl/crypto/sha/keccak1600.c
446
A[3][3] = ROL64(A[3][2], rhotates[3][2]);
crypto/openssl/crypto/sha/keccak1600.c
447
A[4][4] = ROL64(A[4][1], rhotates[4][1]);
crypto/openssl/crypto/sha/keccak1600.c
449
A[1][4] = ROL64(A[4][2], rhotates[4][2]);
crypto/openssl/crypto/sha/keccak1600.c
450
A[2][3] = ROL64(A[3][4], rhotates[3][4]);
crypto/openssl/crypto/sha/keccak1600.c
451
A[3][2] = ROL64(A[2][1], rhotates[2][1]);
crypto/openssl/crypto/sha/keccak1600.c
452
A[4][1] = ROL64(A[1][3], rhotates[1][3]);
crypto/openssl/crypto/sha/keccak1600.c
454
A[4][2] = ROL64(A[2][4], rhotates[2][4]);
crypto/openssl/crypto/sha/keccak1600.c
455
A[3][4] = ROL64(A[4][3], rhotates[4][3]);
crypto/openssl/crypto/sha/keccak1600.c
456
A[2][1] = ROL64(A[1][2], rhotates[1][2]);
crypto/openssl/crypto/sha/keccak1600.c
457
A[1][3] = ROL64(A[3][1], rhotates[3][1]);
crypto/openssl/crypto/sha/keccak1600.c
459
A[2][4] = ROL64(A[4][0], rhotates[4][0]);
crypto/openssl/crypto/sha/keccak1600.c
460
A[4][3] = ROL64(A[3][0], rhotates[3][0]);
crypto/openssl/crypto/sha/keccak1600.c
461
A[1][2] = ROL64(A[2][0], rhotates[2][0]);
crypto/openssl/crypto/sha/keccak1600.c
462
A[3][1] = ROL64(A[1][0], rhotates[1][0]);
crypto/openssl/crypto/sha/keccak1600.c
464
A[1][0] = ROL64(C[3], rhotates[0][3]);
crypto/openssl/crypto/sha/keccak1600.c
465
A[2][0] = ROL64(C[1], rhotates[0][1]);
crypto/openssl/crypto/sha/keccak1600.c
466
A[3][0] = ROL64(C[4], rhotates[0][4]);
crypto/openssl/crypto/sha/keccak1600.c
467
A[4][0] = ROL64(C[2], rhotates[0][2]);
crypto/openssl/crypto/sha/keccak1600.c
543
D[0] = ROL64(C[1], 1) ^ C[4];
crypto/openssl/crypto/sha/keccak1600.c
544
D[1] = ROL64(C[2], 1) ^ C[0];
crypto/openssl/crypto/sha/keccak1600.c
545
D[2] = ROL64(C[3], 1) ^ C[1];
crypto/openssl/crypto/sha/keccak1600.c
546
D[3] = ROL64(C[4], 1) ^ C[2];
crypto/openssl/crypto/sha/keccak1600.c
547
D[4] = ROL64(C[0], 1) ^ C[3];
crypto/openssl/crypto/sha/keccak1600.c
550
C[1] = ROL64(A[1][1] ^ D[1], rhotates[1][1]);
crypto/openssl/crypto/sha/keccak1600.c
551
C[2] = ROL64(A[2][2] ^ D[2], rhotates[2][2]);
crypto/openssl/crypto/sha/keccak1600.c
552
C[3] = ROL64(A[3][3] ^ D[3], rhotates[3][3]);
crypto/openssl/crypto/sha/keccak1600.c
553
C[4] = ROL64(A[4][4] ^ D[4], rhotates[4][4]);
crypto/openssl/crypto/sha/keccak1600.c
569
C[0] = ROL64(A[0][3] ^ D[3], rhotates[0][3]);
crypto/openssl/crypto/sha/keccak1600.c
570
C[1] = ROL64(A[1][4] ^ D[4], rhotates[1][4]);
crypto/openssl/crypto/sha/keccak1600.c
571
C[2] = ROL64(A[2][0] ^ D[0], rhotates[2][0]);
crypto/openssl/crypto/sha/keccak1600.c
572
C[3] = ROL64(A[3][1] ^ D[1], rhotates[3][1]);
crypto/openssl/crypto/sha/keccak1600.c
573
C[4] = ROL64(A[4][2] ^ D[2], rhotates[4][2]);
crypto/openssl/crypto/sha/keccak1600.c
589
C[0] = ROL64(A[0][1] ^ D[1], rhotates[0][1]);
crypto/openssl/crypto/sha/keccak1600.c
590
C[1] = ROL64(A[1][2] ^ D[2], rhotates[1][2]);
crypto/openssl/crypto/sha/keccak1600.c
591
C[2] = ROL64(A[2][3] ^ D[3], rhotates[2][3]);
crypto/openssl/crypto/sha/keccak1600.c
592
C[3] = ROL64(A[3][4] ^ D[4], rhotates[3][4]);
crypto/openssl/crypto/sha/keccak1600.c
593
C[4] = ROL64(A[4][0] ^ D[0], rhotates[4][0]);
crypto/openssl/crypto/sha/keccak1600.c
609
C[0] = ROL64(A[0][4] ^ D[4], rhotates[0][4]);
crypto/openssl/crypto/sha/keccak1600.c
610
C[1] = ROL64(A[1][0] ^ D[0], rhotates[1][0]);
crypto/openssl/crypto/sha/keccak1600.c
611
C[2] = ROL64(A[2][1] ^ D[1], rhotates[2][1]);
crypto/openssl/crypto/sha/keccak1600.c
612
C[3] = ROL64(A[3][2] ^ D[2], rhotates[3][2]);
crypto/openssl/crypto/sha/keccak1600.c
613
C[4] = ROL64(A[4][3] ^ D[3], rhotates[4][3]);
crypto/openssl/crypto/sha/keccak1600.c
629
C[0] = ROL64(A[0][2] ^ D[2], rhotates[0][2]);
crypto/openssl/crypto/sha/keccak1600.c
630
C[1] = ROL64(A[1][3] ^ D[3], rhotates[1][3]);
crypto/openssl/crypto/sha/keccak1600.c
631
C[2] = ROL64(A[2][4] ^ D[4], rhotates[2][4]);
crypto/openssl/crypto/sha/keccak1600.c
632
C[3] = ROL64(A[3][0] ^ D[0], rhotates[3][0]);
crypto/openssl/crypto/sha/keccak1600.c
633
C[4] = ROL64(A[4][1] ^ D[1], rhotates[4][1]);
crypto/openssl/crypto/sha/keccak1600.c
702
D[0] = ROL64(C[1], 1) ^ C[4];
crypto/openssl/crypto/sha/keccak1600.c
703
D[1] = ROL64(C[2], 1) ^ C[0];
crypto/openssl/crypto/sha/keccak1600.c
704
D[2] = ROL64(C[3], 1) ^ C[1];
crypto/openssl/crypto/sha/keccak1600.c
705
D[3] = ROL64(C[4], 1) ^ C[2];
crypto/openssl/crypto/sha/keccak1600.c
706
D[4] = ROL64(C[0], 1) ^ C[3];
crypto/openssl/crypto/sha/keccak1600.c
709
B[1] = ROL64(A[1][1] ^ D[1], rhotates[1][1]);
crypto/openssl/crypto/sha/keccak1600.c
710
B[2] = ROL64(A[2][2] ^ D[2], rhotates[2][2]);
crypto/openssl/crypto/sha/keccak1600.c
711
B[3] = ROL64(A[3][3] ^ D[3], rhotates[3][3]);
crypto/openssl/crypto/sha/keccak1600.c
712
B[4] = ROL64(A[4][4] ^ D[4], rhotates[4][4]);
crypto/openssl/crypto/sha/keccak1600.c
720
B[0] = ROL64(A[0][3] ^ D[3], rhotates[0][3]);
crypto/openssl/crypto/sha/keccak1600.c
721
B[1] = ROL64(A[1][4] ^ D[4], rhotates[1][4]);
crypto/openssl/crypto/sha/keccak1600.c
722
B[2] = ROL64(A[2][0] ^ D[0], rhotates[2][0]);
crypto/openssl/crypto/sha/keccak1600.c
723
B[3] = ROL64(A[3][1] ^ D[1], rhotates[3][1]);
crypto/openssl/crypto/sha/keccak1600.c
724
B[4] = ROL64(A[4][2] ^ D[2], rhotates[4][2]);
crypto/openssl/crypto/sha/keccak1600.c
732
B[0] = ROL64(A[0][1] ^ D[1], rhotates[0][1]);
crypto/openssl/crypto/sha/keccak1600.c
733
B[1] = ROL64(A[1][2] ^ D[2], rhotates[1][2]);
crypto/openssl/crypto/sha/keccak1600.c
734
B[2] = ROL64(A[2][3] ^ D[3], rhotates[2][3]);
crypto/openssl/crypto/sha/keccak1600.c
735
B[3] = ROL64(A[3][4] ^ D[4], rhotates[3][4]);
crypto/openssl/crypto/sha/keccak1600.c
736
B[4] = ROL64(A[4][0] ^ D[0], rhotates[4][0]);
crypto/openssl/crypto/sha/keccak1600.c
744
B[0] = ROL64(A[0][4] ^ D[4], rhotates[0][4]);
crypto/openssl/crypto/sha/keccak1600.c
745
B[1] = ROL64(A[1][0] ^ D[0], rhotates[1][0]);
crypto/openssl/crypto/sha/keccak1600.c
746
B[2] = ROL64(A[2][1] ^ D[1], rhotates[2][1]);
crypto/openssl/crypto/sha/keccak1600.c
747
B[3] = ROL64(A[3][2] ^ D[2], rhotates[3][2]);
crypto/openssl/crypto/sha/keccak1600.c
748
B[4] = ROL64(A[4][3] ^ D[3], rhotates[4][3]);
crypto/openssl/crypto/sha/keccak1600.c
756
B[0] = ROL64(A[0][2] ^ D[2], rhotates[0][2]);
crypto/openssl/crypto/sha/keccak1600.c
757
B[1] = ROL64(A[1][3] ^ D[3], rhotates[1][3]);
crypto/openssl/crypto/sha/keccak1600.c
758
B[2] = ROL64(A[2][4] ^ D[4], rhotates[2][4]);
crypto/openssl/crypto/sha/keccak1600.c
759
B[3] = ROL64(A[3][0] ^ D[0], rhotates[3][0]);
crypto/openssl/crypto/sha/keccak1600.c
760
B[4] = ROL64(A[4][1] ^ D[1], rhotates[4][1]);
crypto/openssl/crypto/sha/keccak1600.c
769
D[0] = ROL64(C[1], 1) ^ C[4];
crypto/openssl/crypto/sha/keccak1600.c
770
D[1] = ROL64(C[2], 1) ^ C[0];
crypto/openssl/crypto/sha/keccak1600.c
771
D[2] = ROL64(C[3], 1) ^ C[1];
crypto/openssl/crypto/sha/keccak1600.c
772
D[3] = ROL64(C[4], 1) ^ C[2];
crypto/openssl/crypto/sha/keccak1600.c
773
D[4] = ROL64(C[0], 1) ^ C[3];
crypto/openssl/crypto/sha/keccak1600.c
776
B[1] = ROL64(A[3][1] ^ D[1], rhotates[1][1]);
crypto/openssl/crypto/sha/keccak1600.c
777
B[2] = ROL64(A[1][2] ^ D[2], rhotates[2][2]);
crypto/openssl/crypto/sha/keccak1600.c
778
B[3] = ROL64(A[4][3] ^ D[3], rhotates[3][3]);
crypto/openssl/crypto/sha/keccak1600.c
779
B[4] = ROL64(A[2][4] ^ D[4], rhotates[4][4]);
crypto/openssl/crypto/sha/keccak1600.c
787
B[0] = ROL64(A[3][3] ^ D[3], rhotates[0][3]);
crypto/openssl/crypto/sha/keccak1600.c
788
B[1] = ROL64(A[1][4] ^ D[4], rhotates[1][4]);
crypto/openssl/crypto/sha/keccak1600.c
789
B[2] = ROL64(A[4][0] ^ D[0], rhotates[2][0]);
crypto/openssl/crypto/sha/keccak1600.c
790
B[3] = ROL64(A[2][1] ^ D[1], rhotates[3][1]);
crypto/openssl/crypto/sha/keccak1600.c
791
B[4] = ROL64(A[0][2] ^ D[2], rhotates[4][2]);
crypto/openssl/crypto/sha/keccak1600.c
799
B[0] = ROL64(A[1][1] ^ D[1], rhotates[0][1]);
crypto/openssl/crypto/sha/keccak1600.c
800
B[1] = ROL64(A[4][2] ^ D[2], rhotates[1][2]);
crypto/openssl/crypto/sha/keccak1600.c
801
B[2] = ROL64(A[2][3] ^ D[3], rhotates[2][3]);
crypto/openssl/crypto/sha/keccak1600.c
802
B[3] = ROL64(A[0][4] ^ D[4], rhotates[3][4]);
crypto/openssl/crypto/sha/keccak1600.c
803
B[4] = ROL64(A[3][0] ^ D[0], rhotates[4][0]);
crypto/openssl/crypto/sha/keccak1600.c
811
B[0] = ROL64(A[4][4] ^ D[4], rhotates[0][4]);
crypto/openssl/crypto/sha/keccak1600.c
812
B[1] = ROL64(A[2][0] ^ D[0], rhotates[1][0]);
crypto/openssl/crypto/sha/keccak1600.c
813
B[2] = ROL64(A[0][1] ^ D[1], rhotates[2][1]);
crypto/openssl/crypto/sha/keccak1600.c
814
B[3] = ROL64(A[3][2] ^ D[2], rhotates[3][2]);
crypto/openssl/crypto/sha/keccak1600.c
815
B[4] = ROL64(A[1][3] ^ D[3], rhotates[4][3]);
crypto/openssl/crypto/sha/keccak1600.c
823
B[0] = ROL64(A[2][2] ^ D[2], rhotates[0][2]);
crypto/openssl/crypto/sha/keccak1600.c
824
B[1] = ROL64(A[0][3] ^ D[3], rhotates[1][3]);
crypto/openssl/crypto/sha/keccak1600.c
825
B[2] = ROL64(A[3][4] ^ D[4], rhotates[2][4]);
crypto/openssl/crypto/sha/keccak1600.c
826
B[3] = ROL64(A[1][0] ^ D[0], rhotates[3][0]);
crypto/openssl/crypto/sha/keccak1600.c
827
B[4] = ROL64(A[4][1] ^ D[1], rhotates[4][1]);
crypto/openssl/crypto/sha/keccak1600.c
836
D[0] = ROL64(C[1], 1) ^ C[4];
crypto/openssl/crypto/sha/keccak1600.c
837
D[1] = ROL64(C[2], 1) ^ C[0];
crypto/openssl/crypto/sha/keccak1600.c
838
D[2] = ROL64(C[3], 1) ^ C[1];
crypto/openssl/crypto/sha/keccak1600.c
839
D[3] = ROL64(C[4], 1) ^ C[2];
crypto/openssl/crypto/sha/keccak1600.c
840
D[4] = ROL64(C[0], 1) ^ C[3];
crypto/openssl/crypto/sha/keccak1600.c
843
B[1] = ROL64(A[2][1] ^ D[1], rhotates[1][1]);
crypto/openssl/crypto/sha/keccak1600.c
844
B[2] = ROL64(A[4][2] ^ D[2], rhotates[2][2]);
crypto/openssl/crypto/sha/keccak1600.c
845
B[3] = ROL64(A[1][3] ^ D[3], rhotates[3][3]);
crypto/openssl/crypto/sha/keccak1600.c
846
B[4] = ROL64(A[3][4] ^ D[4], rhotates[4][4]);
crypto/openssl/crypto/sha/keccak1600.c
854
B[0] = ROL64(A[4][3] ^ D[3], rhotates[0][3]);
crypto/openssl/crypto/sha/keccak1600.c
855
B[1] = ROL64(A[1][4] ^ D[4], rhotates[1][4]);
crypto/openssl/crypto/sha/keccak1600.c
856
B[2] = ROL64(A[3][0] ^ D[0], rhotates[2][0]);
crypto/openssl/crypto/sha/keccak1600.c
857
B[3] = ROL64(A[0][1] ^ D[1], rhotates[3][1]);
crypto/openssl/crypto/sha/keccak1600.c
858
B[4] = ROL64(A[2][2] ^ D[2], rhotates[4][2]);
crypto/openssl/crypto/sha/keccak1600.c
866
B[0] = ROL64(A[3][1] ^ D[1], rhotates[0][1]);
crypto/openssl/crypto/sha/keccak1600.c
867
B[1] = ROL64(A[0][2] ^ D[2], rhotates[1][2]);
crypto/openssl/crypto/sha/keccak1600.c
868
B[2] = ROL64(A[2][3] ^ D[3], rhotates[2][3]);
crypto/openssl/crypto/sha/keccak1600.c
869
B[3] = ROL64(A[4][4] ^ D[4], rhotates[3][4]);
crypto/openssl/crypto/sha/keccak1600.c
870
B[4] = ROL64(A[1][0] ^ D[0], rhotates[4][0]);
crypto/openssl/crypto/sha/keccak1600.c
878
B[0] = ROL64(A[2][4] ^ D[4], rhotates[0][4]);
crypto/openssl/crypto/sha/keccak1600.c
879
B[1] = ROL64(A[4][0] ^ D[0], rhotates[1][0]);
crypto/openssl/crypto/sha/keccak1600.c
880
B[2] = ROL64(A[1][1] ^ D[1], rhotates[2][1]);
crypto/openssl/crypto/sha/keccak1600.c
881
B[3] = ROL64(A[3][2] ^ D[2], rhotates[3][2]);
crypto/openssl/crypto/sha/keccak1600.c
882
B[4] = ROL64(A[0][3] ^ D[3], rhotates[4][3]);
crypto/openssl/crypto/sha/keccak1600.c
890
B[0] = ROL64(A[1][2] ^ D[2], rhotates[0][2]);
crypto/openssl/crypto/sha/keccak1600.c
891
B[1] = ROL64(A[3][3] ^ D[3], rhotates[1][3]);
crypto/openssl/crypto/sha/keccak1600.c
892
B[2] = ROL64(A[0][4] ^ D[4], rhotates[2][4]);
crypto/openssl/crypto/sha/keccak1600.c
893
B[3] = ROL64(A[2][0] ^ D[0], rhotates[3][0]);
crypto/openssl/crypto/sha/keccak1600.c
894
B[4] = ROL64(A[4][1] ^ D[1], rhotates[4][1]);
crypto/openssl/crypto/sha/keccak1600.c
903
D[0] = ROL64(C[1], 1) ^ C[4];
crypto/openssl/crypto/sha/keccak1600.c
904
D[1] = ROL64(C[2], 1) ^ C[0];
crypto/openssl/crypto/sha/keccak1600.c
905
D[2] = ROL64(C[3], 1) ^ C[1];
crypto/openssl/crypto/sha/keccak1600.c
906
D[3] = ROL64(C[4], 1) ^ C[2];
crypto/openssl/crypto/sha/keccak1600.c
907
D[4] = ROL64(C[0], 1) ^ C[3];
crypto/openssl/crypto/sha/keccak1600.c
910
B[1] = ROL64(A[0][1] ^ D[1], rhotates[1][1]);
crypto/openssl/crypto/sha/keccak1600.c
911
B[2] = ROL64(A[0][2] ^ D[2], rhotates[2][2]);
crypto/openssl/crypto/sha/keccak1600.c
912
B[3] = ROL64(A[0][3] ^ D[3], rhotates[3][3]);
crypto/openssl/crypto/sha/keccak1600.c
913
B[4] = ROL64(A[0][4] ^ D[4], rhotates[4][4]);
crypto/openssl/crypto/sha/keccak1600.c
921
B[0] = ROL64(A[1][3] ^ D[3], rhotates[0][3]);
crypto/openssl/crypto/sha/keccak1600.c
922
B[1] = ROL64(A[1][4] ^ D[4], rhotates[1][4]);
crypto/openssl/crypto/sha/keccak1600.c
923
B[2] = ROL64(A[1][0] ^ D[0], rhotates[2][0]);
crypto/openssl/crypto/sha/keccak1600.c
924
B[3] = ROL64(A[1][1] ^ D[1], rhotates[3][1]);
crypto/openssl/crypto/sha/keccak1600.c
925
B[4] = ROL64(A[1][2] ^ D[2], rhotates[4][2]);
crypto/openssl/crypto/sha/keccak1600.c
933
B[0] = ROL64(A[2][1] ^ D[1], rhotates[0][1]);
crypto/openssl/crypto/sha/keccak1600.c
934
B[1] = ROL64(A[2][2] ^ D[2], rhotates[1][2]);
crypto/openssl/crypto/sha/keccak1600.c
935
B[2] = ROL64(A[2][3] ^ D[3], rhotates[2][3]);
crypto/openssl/crypto/sha/keccak1600.c
936
B[3] = ROL64(A[2][4] ^ D[4], rhotates[3][4]);
crypto/openssl/crypto/sha/keccak1600.c
937
B[4] = ROL64(A[2][0] ^ D[0], rhotates[4][0]);
crypto/openssl/crypto/sha/keccak1600.c
945
B[0] = ROL64(A[3][4] ^ D[4], rhotates[0][4]);
crypto/openssl/crypto/sha/keccak1600.c
946
B[1] = ROL64(A[3][0] ^ D[0], rhotates[1][0]);
crypto/openssl/crypto/sha/keccak1600.c
947
B[2] = ROL64(A[3][1] ^ D[1], rhotates[2][1]);
crypto/openssl/crypto/sha/keccak1600.c
948
B[3] = ROL64(A[3][2] ^ D[2], rhotates[3][2]);
crypto/openssl/crypto/sha/keccak1600.c
949
B[4] = ROL64(A[3][3] ^ D[3], rhotates[4][3]);
crypto/openssl/crypto/sha/keccak1600.c
957
B[0] = ROL64(A[4][2] ^ D[2], rhotates[0][2]);
crypto/openssl/crypto/sha/keccak1600.c
958
B[1] = ROL64(A[4][3] ^ D[3], rhotates[1][3]);
crypto/openssl/crypto/sha/keccak1600.c
959
B[2] = ROL64(A[4][4] ^ D[4], rhotates[2][4]);
crypto/openssl/crypto/sha/keccak1600.c
960
B[3] = ROL64(A[4][0] ^ D[0], rhotates[3][0]);
crypto/openssl/crypto/sha/keccak1600.c
961
B[4] = ROL64(A[4][1] ^ D[1], rhotates[4][1]);