rounds             30 arch/arm/crypto/aes-ce-glue.c 				   int rounds, int blocks);
rounds             32 arch/arm/crypto/aes-ce-glue.c 				   int rounds, int blocks);
rounds             35 arch/arm/crypto/aes-ce-glue.c 				   int rounds, int blocks, u8 iv[]);
rounds             37 arch/arm/crypto/aes-ce-glue.c 				   int rounds, int blocks, u8 iv[]);
rounds             39 arch/arm/crypto/aes-ce-glue.c 				   int rounds, int bytes, u8 const iv[]);
rounds             41 arch/arm/crypto/aes-ce-glue.c 				   int rounds, int bytes, u8 const iv[]);
rounds             44 arch/arm/crypto/aes-ce-glue.c 				   int rounds, int blocks, u8 ctr[]);
rounds             47 arch/arm/crypto/aes-ce-glue.c 				   int rounds, int bytes, u8 iv[],
rounds             50 arch/arm/crypto/aes-ce-glue.c 				   int rounds, int bytes, u8 iv[],
rounds            458 arch/arm/crypto/aes-ce-glue.c 	int err, first, rounds = num_rounds(&ctx->key1);
rounds            497 arch/arm/crypto/aes-ce-glue.c 				   ctx->key1.key_enc, rounds, nbytes, walk.iv,
rounds            519 arch/arm/crypto/aes-ce-glue.c 			   ctx->key1.key_enc, rounds, walk.nbytes, walk.iv,
rounds            530 arch/arm/crypto/aes-ce-glue.c 	int err, first, rounds = num_rounds(&ctx->key1);
rounds            569 arch/arm/crypto/aes-ce-glue.c 				   ctx->key1.key_dec, rounds, nbytes, walk.iv,
rounds            591 arch/arm/crypto/aes-ce-glue.c 			   ctx->key1.key_dec, rounds, walk.nbytes, walk.iv,
rounds             13 arch/arm/crypto/aes-cipher-glue.c asmlinkage void __aes_arm_encrypt(u32 *rk, int rounds, const u8 *in, u8 *out);
rounds             14 arch/arm/crypto/aes-cipher-glue.c asmlinkage void __aes_arm_decrypt(u32 *rk, int rounds, const u8 *in, u8 *out);
rounds             19 arch/arm/crypto/aes-cipher-glue.c 	int rounds = 6 + ctx->key_length / 4;
rounds             21 arch/arm/crypto/aes-cipher-glue.c 	__aes_arm_encrypt(ctx->key_enc, rounds, in, out);
rounds             27 arch/arm/crypto/aes-cipher-glue.c 	int rounds = 6 + ctx->key_length / 4;
rounds             29 arch/arm/crypto/aes-cipher-glue.c 	__aes_arm_decrypt(ctx->key_dec, rounds, in, out);
rounds             27 arch/arm/crypto/aes-neonbs-glue.c asmlinkage void aesbs_convert_key(u8 out[], u32 const rk[], int rounds);
rounds             30 arch/arm/crypto/aes-neonbs-glue.c 				  int rounds, int blocks);
rounds             32 arch/arm/crypto/aes-neonbs-glue.c 				  int rounds, int blocks);
rounds             35 arch/arm/crypto/aes-neonbs-glue.c 				  int rounds, int blocks, u8 iv[]);
rounds             38 arch/arm/crypto/aes-neonbs-glue.c 				  int rounds, int blocks, u8 ctr[], u8 final[]);
rounds             41 arch/arm/crypto/aes-neonbs-glue.c 				  int rounds, int blocks, u8 iv[], int);
rounds             43 arch/arm/crypto/aes-neonbs-glue.c 				  int rounds, int blocks, u8 iv[], int);
rounds             46 arch/arm/crypto/aes-neonbs-glue.c 	int	rounds;
rounds             77 arch/arm/crypto/aes-neonbs-glue.c 	ctx->rounds = 6 + key_len / 4;
rounds             80 arch/arm/crypto/aes-neonbs-glue.c 	aesbs_convert_key(ctx->rk, rk.key_enc, ctx->rounds);
rounds             88 arch/arm/crypto/aes-neonbs-glue.c 				  int rounds, int blocks))
rounds            106 arch/arm/crypto/aes-neonbs-glue.c 		   ctx->rounds, blocks);
rounds            136 arch/arm/crypto/aes-neonbs-glue.c 	ctx->key.rounds = 6 + key_len / 4;
rounds            139 arch/arm/crypto/aes-neonbs-glue.c 	aesbs_convert_key(ctx->key.rk, rk.key_enc, ctx->key.rounds);
rounds            175 arch/arm/crypto/aes-neonbs-glue.c 				  ctx->key.rk, ctx->key.rounds, blocks,
rounds            211 arch/arm/crypto/aes-neonbs-glue.c 	ctx->key.rounds = 6 + key_len / 4;
rounds            214 arch/arm/crypto/aes-neonbs-glue.c 	aesbs_convert_key(ctx->key.rk, ctx->fallback.key_enc, ctx->key.rounds);
rounds            242 arch/arm/crypto/aes-neonbs-glue.c 				  ctx->rk, ctx->rounds, blocks, walk.iv, final);
rounds            331 arch/arm/crypto/aes-neonbs-glue.c 				  int rounds, int blocks, u8 iv[], int))
rounds            372 arch/arm/crypto/aes-neonbs-glue.c 		   ctx->key.rounds, blocks, walk.iv, reorder_last_tweak);
rounds             26 arch/arm/crypto/sha1_glue.c 		const unsigned char *data, unsigned int rounds);
rounds             31 arch/arm/crypto/sha1_neon_glue.c 				    unsigned int rounds);
rounds             33 arch/arm64/crypto/aes-ce-ccm-glue.c 				     u32 *macp, u32 const rk[], u32 rounds);
rounds             36 arch/arm64/crypto/aes-ce-ccm-glue.c 				   u32 const rk[], u32 rounds, u8 mac[],
rounds             40 arch/arm64/crypto/aes-ce-ccm-glue.c 				   u32 const rk[], u32 rounds, u8 mac[],
rounds             44 arch/arm64/crypto/aes-ce-ccm-glue.c 				 u32 rounds);
rounds             27 arch/arm64/crypto/aes-ce-glue.c asmlinkage void __aes_ce_encrypt(u32 *rk, u8 *out, const u8 *in, int rounds);
rounds             28 arch/arm64/crypto/aes-ce-glue.c asmlinkage void __aes_ce_decrypt(u32 *rk, u8 *out, const u8 *in, int rounds);
rounds             12 arch/arm64/crypto/aes-cipher-glue.c asmlinkage void __aes_arm64_encrypt(u32 *rk, u8 *out, const u8 *in, int rounds);
rounds             13 arch/arm64/crypto/aes-cipher-glue.c asmlinkage void __aes_arm64_decrypt(u32 *rk, u8 *out, const u8 *in, int rounds);
rounds             18 arch/arm64/crypto/aes-cipher-glue.c 	int rounds = 6 + ctx->key_length / 4;
rounds             20 arch/arm64/crypto/aes-cipher-glue.c 	__aes_arm64_encrypt(ctx->key_enc, out, in, rounds);
rounds             26 arch/arm64/crypto/aes-cipher-glue.c 	int rounds = 6 + ctx->key_length / 4;
rounds             28 arch/arm64/crypto/aes-cipher-glue.c 	__aes_arm64_decrypt(ctx->key_dec, out, in, rounds);
rounds             75 arch/arm64/crypto/aes-glue.c 				int rounds, int blocks);
rounds             77 arch/arm64/crypto/aes-glue.c 				int rounds, int blocks);
rounds             80 arch/arm64/crypto/aes-glue.c 				int rounds, int blocks, u8 iv[]);
rounds             82 arch/arm64/crypto/aes-glue.c 				int rounds, int blocks, u8 iv[]);
rounds             85 arch/arm64/crypto/aes-glue.c 				int rounds, int bytes, u8 const iv[]);
rounds             87 arch/arm64/crypto/aes-glue.c 				int rounds, int bytes, u8 const iv[]);
rounds             90 arch/arm64/crypto/aes-glue.c 				int rounds, int blocks, u8 ctr[]);
rounds             93 arch/arm64/crypto/aes-glue.c 				int rounds, int bytes, u32 const rk2[], u8 iv[],
rounds             96 arch/arm64/crypto/aes-glue.c 				int rounds, int bytes, u32 const rk2[], u8 iv[],
rounds            100 arch/arm64/crypto/aes-glue.c 				      int rounds, int blocks, u8 iv[],
rounds            103 arch/arm64/crypto/aes-glue.c 				      int rounds, int blocks, u8 iv[],
rounds            106 arch/arm64/crypto/aes-glue.c asmlinkage void aes_mac_update(u8 const in[], u32 const rk[], int rounds,
rounds            195 arch/arm64/crypto/aes-glue.c 	int err, rounds = 6 + ctx->key_length / 4;
rounds            204 arch/arm64/crypto/aes-glue.c 				ctx->key_enc, rounds, blocks);
rounds            215 arch/arm64/crypto/aes-glue.c 	int err, rounds = 6 + ctx->key_length / 4;
rounds            224 arch/arm64/crypto/aes-glue.c 				ctx->key_dec, rounds, blocks);
rounds            236 arch/arm64/crypto/aes-glue.c 	int err = 0, rounds = 6 + ctx->key_length / 4;
rounds            242 arch/arm64/crypto/aes-glue.c 				ctx->key_enc, rounds, blocks, walk->iv);
rounds            265 arch/arm64/crypto/aes-glue.c 	int err = 0, rounds = 6 + ctx->key_length / 4;
rounds            271 arch/arm64/crypto/aes-glue.c 				ctx->key_dec, rounds, blocks, walk->iv);
rounds            293 arch/arm64/crypto/aes-glue.c 	int err, rounds = 6 + ctx->key_length / 4;
rounds            340 arch/arm64/crypto/aes-glue.c 			    ctx->key_enc, rounds, walk.nbytes, walk.iv);
rounds            350 arch/arm64/crypto/aes-glue.c 	int err, rounds = 6 + ctx->key_length / 4;
rounds            397 arch/arm64/crypto/aes-glue.c 			    ctx->key_dec, rounds, walk.nbytes, walk.iv);
rounds            423 arch/arm64/crypto/aes-glue.c 	int err, rounds = 6 + ctx->key1.key_length / 4;
rounds            433 arch/arm64/crypto/aes-glue.c 				      ctx->key1.key_enc, rounds, blocks,
rounds            445 arch/arm64/crypto/aes-glue.c 	int err, rounds = 6 + ctx->key1.key_length / 4;
rounds            455 arch/arm64/crypto/aes-glue.c 				      ctx->key1.key_dec, rounds, blocks,
rounds            467 arch/arm64/crypto/aes-glue.c 	int err, rounds = 6 + ctx->key_length / 4;
rounds            476 arch/arm64/crypto/aes-glue.c 				ctx->key_enc, rounds, blocks, walk.iv);
rounds            492 arch/arm64/crypto/aes-glue.c 		aes_ctr_encrypt(tail, NULL, ctx->key_enc, rounds,
rounds            529 arch/arm64/crypto/aes-glue.c 	int err, first, rounds = 6 + ctx->key1.key_length / 4;
rounds            568 arch/arm64/crypto/aes-glue.c 				ctx->key1.key_enc, rounds, nbytes,
rounds            590 arch/arm64/crypto/aes-glue.c 			ctx->key1.key_enc, rounds, walk.nbytes,
rounds            601 arch/arm64/crypto/aes-glue.c 	int err, first, rounds = 6 + ctx->key1.key_length / 4;
rounds            640 arch/arm64/crypto/aes-glue.c 				ctx->key1.key_dec, rounds, nbytes,
rounds            663 arch/arm64/crypto/aes-glue.c 			ctx->key1.key_dec, rounds, walk.nbytes,
rounds            817 arch/arm64/crypto/aes-glue.c 	int rounds = 6 + key_len / 4;
rounds            827 arch/arm64/crypto/aes-glue.c 			rounds, 1);
rounds            846 arch/arm64/crypto/aes-glue.c 	int rounds = 6 + key_len / 4;
rounds            855 arch/arm64/crypto/aes-glue.c 	aes_ecb_encrypt(key, ks[0], ctx->key.key_enc, rounds, 1);
rounds            856 arch/arm64/crypto/aes-glue.c 	aes_ecb_encrypt(ctx->consts, ks[1], ctx->key.key_enc, rounds, 2);
rounds            875 arch/arm64/crypto/aes-glue.c 	int rounds = 6 + ctx->key_length / 4;
rounds            879 arch/arm64/crypto/aes-glue.c 		aes_mac_update(in, ctx->key_enc, rounds, blocks, dg, enc_before,
rounds             26 arch/arm64/crypto/aes-neonbs-glue.c asmlinkage void aesbs_convert_key(u8 out[], u32 const rk[], int rounds);
rounds             29 arch/arm64/crypto/aes-neonbs-glue.c 				  int rounds, int blocks);
rounds             31 arch/arm64/crypto/aes-neonbs-glue.c 				  int rounds, int blocks);
rounds             34 arch/arm64/crypto/aes-neonbs-glue.c 				  int rounds, int blocks, u8 iv[]);
rounds             37 arch/arm64/crypto/aes-neonbs-glue.c 				  int rounds, int blocks, u8 iv[], u8 final[]);
rounds             40 arch/arm64/crypto/aes-neonbs-glue.c 				  int rounds, int blocks, u8 iv[]);
rounds             42 arch/arm64/crypto/aes-neonbs-glue.c 				  int rounds, int blocks, u8 iv[]);
rounds             46 arch/arm64/crypto/aes-neonbs-glue.c 				     int rounds, int blocks);
rounds             48 arch/arm64/crypto/aes-neonbs-glue.c 				     int rounds, int blocks, u8 iv[]);
rounds             50 arch/arm64/crypto/aes-neonbs-glue.c 				     u32 const rk1[], int rounds, int bytes,
rounds             53 arch/arm64/crypto/aes-neonbs-glue.c 				     u32 const rk1[], int rounds, int bytes,
rounds             58 arch/arm64/crypto/aes-neonbs-glue.c 	int	rounds;
rounds             88 arch/arm64/crypto/aes-neonbs-glue.c 	ctx->rounds = 6 + key_len / 4;
rounds             91 arch/arm64/crypto/aes-neonbs-glue.c 	aesbs_convert_key(ctx->rk, rk.key_enc, ctx->rounds);
rounds             99 arch/arm64/crypto/aes-neonbs-glue.c 				  int rounds, int blocks))
rounds            117 arch/arm64/crypto/aes-neonbs-glue.c 		   ctx->rounds, blocks);
rounds            147 arch/arm64/crypto/aes-neonbs-glue.c 	ctx->key.rounds = 6 + key_len / 4;
rounds            152 arch/arm64/crypto/aes-neonbs-glue.c 	aesbs_convert_key(ctx->key.rk, rk.key_enc, ctx->key.rounds);
rounds            173 arch/arm64/crypto/aes-neonbs-glue.c 				     ctx->enc, ctx->key.rounds, blocks,
rounds            199 arch/arm64/crypto/aes-neonbs-glue.c 				  ctx->key.rk, ctx->key.rounds, blocks,
rounds            219 arch/arm64/crypto/aes-neonbs-glue.c 	ctx->key.rounds = 6 + key_len / 4;
rounds            222 arch/arm64/crypto/aes-neonbs-glue.c 	aesbs_convert_key(ctx->key.rk, ctx->fallback.key_enc, ctx->key.rounds);
rounds            250 arch/arm64/crypto/aes-neonbs-glue.c 				  ctx->rk, ctx->rounds, blocks, walk.iv, final);
rounds            319 arch/arm64/crypto/aes-neonbs-glue.c 				  int rounds, int blocks, u8 iv[]))
rounds            372 arch/arm64/crypto/aes-neonbs-glue.c 						     ctx->key.rounds, 1);
rounds            375 arch/arm64/crypto/aes-neonbs-glue.c 			fn(out, in, ctx->key.rk, ctx->key.rounds, blocks,
rounds            412 arch/arm64/crypto/aes-neonbs-glue.c 		neon_aes_xts_encrypt(out, in, ctx->cts.key_enc, ctx->key.rounds,
rounds            415 arch/arm64/crypto/aes-neonbs-glue.c 		neon_aes_xts_decrypt(out, in, ctx->cts.key_dec, ctx->key.rounds,
rounds             63 arch/arm64/crypto/ghash-ce-glue.c 				  u8 ctr[], u32 const rk[], int rounds,
rounds             68 arch/arm64/crypto/ghash-ce-glue.c 				  u8 ctr[], u32 const rk[], int rounds);
rounds             71 arch/arm64/crypto/ghash-ce-glue.c 					u32 const rk[], int rounds);
rounds             41 arch/powerpc/crypto/aes-spe-glue.c 	u32 rounds;
rounds             48 arch/powerpc/crypto/aes-spe-glue.c 	u32 rounds;
rounds             51 arch/powerpc/crypto/aes-spe-glue.c extern void ppc_encrypt_aes(u8 *out, const u8 *in, u32 *key_enc, u32 rounds);
rounds             52 arch/powerpc/crypto/aes-spe-glue.c extern void ppc_decrypt_aes(u8 *out, const u8 *in, u32 *key_dec, u32 rounds);
rounds             53 arch/powerpc/crypto/aes-spe-glue.c extern void ppc_encrypt_ecb(u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
rounds             55 arch/powerpc/crypto/aes-spe-glue.c extern void ppc_decrypt_ecb(u8 *out, const u8 *in, u32 *key_dec, u32 rounds,
rounds             57 arch/powerpc/crypto/aes-spe-glue.c extern void ppc_encrypt_cbc(u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
rounds             59 arch/powerpc/crypto/aes-spe-glue.c extern void ppc_decrypt_cbc(u8 *out, const u8 *in, u32 *key_dec, u32 rounds,
rounds             61 arch/powerpc/crypto/aes-spe-glue.c extern void ppc_crypt_ctr  (u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
rounds             63 arch/powerpc/crypto/aes-spe-glue.c extern void ppc_encrypt_xts(u8 *out, const u8 *in, u32 *key_enc, u32 rounds,
rounds             65 arch/powerpc/crypto/aes-spe-glue.c extern void ppc_decrypt_xts(u8 *out, const u8 *in, u32 *key_dec, u32 rounds,
rounds            103 arch/powerpc/crypto/aes-spe-glue.c 		ctx->rounds = 4;
rounds            107 arch/powerpc/crypto/aes-spe-glue.c 		ctx->rounds = 5;
rounds            111 arch/powerpc/crypto/aes-spe-glue.c 		ctx->rounds = 6;
rounds            142 arch/powerpc/crypto/aes-spe-glue.c 		ctx->rounds = 4;
rounds            147 arch/powerpc/crypto/aes-spe-glue.c 		ctx->rounds = 5;
rounds            152 arch/powerpc/crypto/aes-spe-glue.c 		ctx->rounds = 6;
rounds            168 arch/powerpc/crypto/aes-spe-glue.c 	ppc_encrypt_aes(out, in, ctx->key_enc, ctx->rounds);
rounds            177 arch/powerpc/crypto/aes-spe-glue.c 	ppc_decrypt_aes(out, in, ctx->key_dec, ctx->rounds);
rounds            200 arch/powerpc/crypto/aes-spe-glue.c 				ctx->key_enc, ctx->rounds, nbytes);
rounds            228 arch/powerpc/crypto/aes-spe-glue.c 				ctx->key_dec, ctx->rounds, nbytes);
rounds            256 arch/powerpc/crypto/aes-spe-glue.c 				ctx->key_enc, ctx->rounds, nbytes, walk.iv);
rounds            284 arch/powerpc/crypto/aes-spe-glue.c 				ctx->key_dec, ctx->rounds, nbytes, walk.iv);
rounds            313 arch/powerpc/crypto/aes-spe-glue.c 			      ctx->key_enc, ctx->rounds, pbytes , walk.iv);
rounds            344 arch/powerpc/crypto/aes-spe-glue.c 				ctx->key_enc, ctx->rounds, nbytes, walk.iv, twk);
rounds            375 arch/powerpc/crypto/aes-spe-glue.c 				ctx->key_dec, ctx->rounds, nbytes, walk.iv, twk);
rounds             31 arch/sparc/crypto/md5_glue.c 				      unsigned int rounds);
rounds             58 arch/sparc/crypto/md5_glue.c 		const unsigned int rounds = (len - done) / MD5_HMAC_BLOCK_SIZE;
rounds             60 arch/sparc/crypto/md5_glue.c 		md5_sparc64_transform(sctx->hash, data + done, rounds);
rounds             61 arch/sparc/crypto/md5_glue.c 		done += rounds * MD5_HMAC_BLOCK_SIZE;
rounds             28 arch/sparc/crypto/sha1_glue.c 				       unsigned int rounds);
rounds             53 arch/sparc/crypto/sha1_glue.c 		const unsigned int rounds = (len - done) / SHA1_BLOCK_SIZE;
rounds             55 arch/sparc/crypto/sha1_glue.c 		sha1_sparc64_transform(sctx->state, data + done, rounds);
rounds             56 arch/sparc/crypto/sha1_glue.c 		done += rounds * SHA1_BLOCK_SIZE;
rounds             28 arch/sparc/crypto/sha256_glue.c 					 unsigned int rounds);
rounds             74 arch/sparc/crypto/sha256_glue.c 		const unsigned int rounds = (len - done) / SHA256_BLOCK_SIZE;
rounds             76 arch/sparc/crypto/sha256_glue.c 		sha256_sparc64_transform(sctx->state, data + done, rounds);
rounds             77 arch/sparc/crypto/sha256_glue.c 		done += rounds * SHA256_BLOCK_SIZE;
rounds             27 arch/sparc/crypto/sha512_glue.c 					 unsigned int rounds);
rounds             74 arch/sparc/crypto/sha512_glue.c 		const unsigned int rounds = (len - done) / SHA512_BLOCK_SIZE;
rounds             76 arch/sparc/crypto/sha512_glue.c 		sha512_sparc64_transform(sctx->state, data + done, rounds);
rounds             77 arch/sparc/crypto/sha512_glue.c 		done += rounds * SHA512_BLOCK_SIZE;
rounds             31 arch/x86/crypto/sha1_ssse3_glue.c 				unsigned int rounds);
rounds             70 arch/x86/crypto/sha1_ssse3_glue.c 				     unsigned int rounds);
rounds            123 arch/x86/crypto/sha1_ssse3_glue.c 				   unsigned int rounds);
rounds            194 arch/x86/crypto/sha1_ssse3_glue.c 				    unsigned int rounds);
rounds            207 arch/x86/crypto/sha1_ssse3_glue.c 				unsigned int rounds)
rounds            210 arch/x86/crypto/sha1_ssse3_glue.c 	if (rounds >= SHA1_AVX2_BLOCK_OPTSIZE)
rounds            211 arch/x86/crypto/sha1_ssse3_glue.c 		sha1_transform_avx2(digest, data, rounds);
rounds            213 arch/x86/crypto/sha1_ssse3_glue.c 		sha1_transform_avx(digest, data, rounds);
rounds            271 arch/x86/crypto/sha1_ssse3_glue.c 				   unsigned int rounds);
rounds             45 arch/x86/crypto/sha256_ssse3_glue.c 				       u64 rounds);
rounds             46 arch/x86/crypto/sha256_ssse3_glue.c typedef void (sha256_transform_fn)(u32 *digest, const char *data, u64 rounds);
rounds            149 arch/x86/crypto/sha256_ssse3_glue.c 				     u64 rounds);
rounds            231 arch/x86/crypto/sha256_ssse3_glue.c 				      u64 rounds);
rounds            311 arch/x86/crypto/sha256_ssse3_glue.c 				   u64 rounds); /*unsigned int rounds);*/
rounds             43 arch/x86/crypto/sha512_ssse3_glue.c 				       u64 rounds);
rounds             45 arch/x86/crypto/sha512_ssse3_glue.c typedef void (sha512_transform_fn)(u64 *digest, const char *data, u64 rounds);
rounds            148 arch/x86/crypto/sha512_ssse3_glue.c 				     u64 rounds);
rounds            229 arch/x86/crypto/sha512_ssse3_glue.c 				      u64 rounds);
rounds             43 drivers/crypto/padlock-aes.c 		rounds:4,
rounds            135 drivers/crypto/padlock-aes.c 	ctx->cword.encrypt.rounds = 10 + (key_len - 16) / 4;
rounds            136 drivers/crypto/padlock-aes.c 	ctx->cword.decrypt.rounds = ctx->cword.encrypt.rounds;
rounds              7 drivers/crypto/vmx/aesp8-ppc.h 	int rounds;
rounds             38 drivers/md/dm-verity-fec.c 	return offset + mod * (v->fec->rounds << v->data_dev_block_bits);
rounds            451 drivers/md/dm-verity-fec.c 	res = div64_u64(offset, v->fec->rounds << v->data_dev_block_bits);
rounds            457 drivers/md/dm-verity-fec.c 	rsb = offset - res * (v->fec->rounds << v->data_dev_block_bits);
rounds            722 drivers/md/dm-verity-fec.c 	f->rounds = f->blocks;
rounds            723 drivers/md/dm-verity-fec.c 	if (sector_div(f->rounds, f->rsn))
rounds            724 drivers/md/dm-verity-fec.c 		f->rounds++;
rounds            730 drivers/md/dm-verity-fec.c 	if (f->blocks < v->data_blocks + hash_blocks || !f->rounds) {
rounds            755 drivers/md/dm-verity-fec.c 	    ((f->start + f->rounds * f->roots) >> v->data_dev_block_bits)) {
rounds             41 drivers/md/dm-verity-fec.h 	sector_t rounds;	/* number of interleaving rounds */
rounds             24 fs/reiserfs/hashes.c #define TEACORE(rounds)							\
rounds             27 fs/reiserfs/hashes.c 		int n = rounds;						\
rounds            261 lib/crypto/aes.c 	int rounds = 6 + ctx->key_length / 4;
rounds            287 lib/crypto/aes.c 		if (round == rounds - 2)
rounds            312 lib/crypto/aes.c 	int rounds = 6 + ctx->key_length / 4;
rounds            338 lib/crypto/aes.c 		if (round == rounds - 2)
rounds             37 tools/power/cpupower/bench/benchmark.c 	unsigned int rounds = 0;
rounds             53 tools/power/cpupower/bench/benchmark.c 		rounds = (unsigned int)(load * estimated / timed);
rounds             54 tools/power/cpupower/bench/benchmark.c 		dprintf("calibrating with %u rounds\n", rounds);
rounds             56 tools/power/cpupower/bench/benchmark.c 		ROUNDS(rounds);
rounds             60 tools/power/cpupower/bench/benchmark.c 		estimated = rounds;
rounds             91 tools/power/cpupower/bench/benchmark.c 	for (_round = 1; _round <= config->rounds; _round++)
rounds             95 tools/power/cpupower/bench/benchmark.c 	for (_round = 0; _round < config->rounds; _round++) {
rounds            126 tools/power/cpupower/bench/main.c 			sscanf(optarg, "%u", &config->rounds);
rounds            174 tools/power/cpupower/bench/main.c 		       config->rounds,
rounds            131 tools/power/cpupower/bench/parse.c 	config->rounds = 50;
rounds            199 tools/power/cpupower/bench/parse.c 			sscanf(val, "%u", &config->rounds);
rounds             17 tools/power/cpupower/bench/parse.h 	unsigned int rounds;	/* calculation rounds with iterated sleep/load time */
rounds            132 tools/power/cpupower/bench/system.c 	for (round = 0; round < config->rounds; round++) {