ror32              97 arch/arm/crypto/aes-ce-glue.c 		rko[0] = ror32(ce_aes_sub(rki[kwords - 1]), 8);
ror32             292 arch/arm/net/bpf_jit_32.c 		if ((x & ~ror32(0xff, 2 * rot)) == 0)
ror32             102 arch/arm64/crypto/aes-ce-glue.c 		rko[0] = ror32(__aes_ce_sub(rki[kwords - 1]), 8) ^ rcon[i] ^ rki[0];
ror32             368 arch/x86/crypto/des3_ede_glue.c 		tmp = ror32(ctx->enc.expkey[i + 1], 4);
ror32             358 crypto/camellia_generic.c 	yr = ror32(yr, 8);					\
ror32             847 crypto/camellia_generic.c 	yr ^= ror32(il, 8) ^ ir;					\
ror32              42 crypto/michael_mic.c 	r ^= ror32(l, 2);	\
ror32              60 crypto/serpent_generic.c 	x3 ^= k[4*i+3];		x0 = ror32(x0, 5);	x2 = ror32(x2, 22);\
ror32              62 crypto/serpent_generic.c 	x4 <<= 7;		x0 ^= x1;		x1 = ror32(x1, 1); \
ror32              63 crypto/serpent_generic.c 	x2 ^= x4;		x3 = ror32(x3, 7);	x4 = x0 << 3;	   \
ror32              64 crypto/serpent_generic.c 	x1 ^= x0;		x3 ^= x4;		x0 = ror32(x0, 13);\
ror32              65 crypto/serpent_generic.c 	x1 ^= x2;		x3 ^= x2;		x2 = ror32(x2, 3); \
ror32              57 crypto/twofish_generic.c    (c) = ror32((c), 1); \
ror32              64 crypto/twofish_generic.c    (d) = ror32((d), 1); \
ror32             916 drivers/irqchip/irq-gic.c 			val |= ror32(active_mask, ror_val);
ror32              85 drivers/leds/leds-mlxreg.c 	nib = (ror32(data->mask, data->bit) == 0xf0) ? rol32(vset, data->bit) :
ror32             125 drivers/leds/leds-mlxreg.c 	regval = (ror32(data->mask, data->bit) == 0xf0) ? ror32(regval,
ror32             126 drivers/leds/leds-mlxreg.c 		 data->bit) : ror32(regval, data->bit + 4);
ror32             345 drivers/mmc/host/dw_mmc-k3.c 		v = ror32(sample_flag, i);
ror32              79 drivers/platform/mellanox/mlxreg-io.c 			*regval = ror32(*regval & data->mask, (data->bit - 1));
ror32              90 include/net/checksum.h 		sum = ror32(sum, 8);
ror32             120 lib/crypto/aes.c 	u32 y = mul_by_x(x) ^ ror32(x, 16);
ror32             122 lib/crypto/aes.c 	return y ^ ror32(x ^ y, 8);
ror32             144 lib/crypto/aes.c 	return mix_columns(x ^ y ^ ror32(y, 16));
ror32             205 lib/crypto/aes.c 		rko[0] = ror32(subw(rki[kwords - 1]), 8) ^ rc ^ rki[0];
ror32              26 lib/crypto/des.c #define ROR(x, r) ((x) = ror32((x), (r)))
ror32              31 lib/crypto/sha256.c #define e0(x)       (ror32(x, 2) ^ ror32(x, 13) ^ ror32(x, 22))
ror32              32 lib/crypto/sha256.c #define e1(x)       (ror32(x, 6) ^ ror32(x, 11) ^ ror32(x, 25))
ror32              33 lib/crypto/sha256.c #define s0(x)       (ror32(x, 7) ^ ror32(x, 18) ^ (x >> 3))
ror32              34 lib/crypto/sha256.c #define s1(x)       (ror32(x, 17) ^ ror32(x, 19) ^ (x >> 10))
ror32              58 lib/sha1.c     	B = ror32(B, 2); } while (0)
ror32              23 net/mac80211/michael.c 	mctx->r ^= ror32(mctx->l, 2);