/linux-master/tools/testing/selftests/net/netfilter/ |
H A D | nft_concat_range.sh | 1490 rounds=100 1491 [ "$KSFT_MACHINE_SLOW" = "yes" ] && rounds=10 1496 for i in $(seq 1 $rounds); do
|
/linux-master/tools/net/ynl/ |
H A D | ynl-gen-c.py | 1012 rounds = len(pns_key_list) ** 2 # it's basically bubble sort 1013 for _ in range(rounds):
|
/linux-master/arch/x86/crypto/ |
H A D | sha512-avx2-asm.S | 614 ## schedule 64 input dwords, by doing 12 rounds of 4 each
|
H A D | sha256-avx2-asm.S | 116 _XFER_SIZE = 2*64*4 # 2 blocks, 64 rounds, 4 bytes/round 587 ## schedule 48 input dwords, by doing 3 rounds of 12 each 617 ## Do last 16 rounds with no scheduling
|
H A D | aesni-intel_asm.S | 885 .irpc index, 1234 # do 4 rounds 892 .irpc index, 56789 # do next 5 rounds
|
H A D | sha1_ssse3_glue.c | 261 int rounds);
|
H A D | sha256_ssse3_glue.c | 334 const u8 *data, int rounds);
|
H A D | sha512-ssse3-asm.S | 152 # Compute rounds t-2 and t-1 155 # Two rounds are computed based on the values for K[t-2]+W[t-2] and 164 # The computation of the message schedule and the rounds are tightly 166 # For clarity, integer instructions (for the rounds calculation) are indented 261 movdqa %xmm0, WK_2(idx) # Store W[t]+K[t] for next rounds 310 # (80 rounds) / (2 rounds/iteration) + (1 iteration) 319 movdqa %xmm0, WK_2(t) # Store into WK for rounds
|
H A D | sha512-avx-asm.S | 157 # Compute rounds t-2 and t-1 160 # Two rounds are computed based on the values for K[t-2]+W[t-2] and 169 # The computation of the message schedule and the rounds are tightly 251 vmovdqa %xmm0, WK_2(idx) # Store W[t]+K[t] for next rounds 308 # (80 rounds) / (2 rounds/iteration) + (1 iteration) 317 vmovdqa %xmm0, WK_2(t) # Store into WK for rounds
|
H A D | aesni-intel_avx-x86_64.S | 1102 .rep \REP # do REP rounds 2052 .rep \REP # do REP rounds
|
/linux-master/arch/arm64/crypto/ |
H A D | aes-neon.S | 98 .macro do_block, enc, in, rounds, rk, rkp, i 101 mov \i, \rounds 114 .macro encrypt_block, in, rounds, rk, rkp, i 115 do_block 1, \in, \rounds, \rk, \rkp, \i 118 .macro decrypt_block, in, rounds, rk, rkp, i 119 do_block 0, \in, \rounds, \rk, \rkp, \i 205 .macro do_block_4x, enc, in0, in1, in2, in3, rounds, rk, rkp, i 208 mov \i, \rounds 231 .macro encrypt_block4x, in0, in1, in2, in3, rounds, rk, rkp, i 232 do_block_4x 1, \in0, \in1, \in2, \in3, \rounds, \r [all...] |
H A D | aes-ce.S | 38 .macro enc_prepare, rounds, rk, temp 39 load_round_keys \rk, \rounds, \temp 43 .macro enc_switch_key, rounds, rk, temp 44 load_round_keys \rk, \rounds, \temp 48 .macro dec_prepare, rounds, rk, temp 49 load_round_keys \rk, \rounds, \temp 71 /* up to 5 interleaved encryption rounds with the same round key */ 80 /* up to 5 interleaved final rounds */ 107 .macro do_block_Nx, enc, rounds, i0, i1, i2, i3, i4 108 tbz \rounds, # [all...] |
H A D | aes-glue.c | 78 int rounds, int blocks); 80 int rounds, int blocks); 83 int rounds, int blocks, u8 iv[]); 85 int rounds, int blocks, u8 iv[]); 88 int rounds, int bytes, u8 const iv[]); 90 int rounds, int bytes, u8 const iv[]); 93 int rounds, int bytes, u8 ctr[]); 96 int rounds, int bytes, u8 ctr[], int byte_ctr); 99 int rounds, int bytes, u32 const rk2[], u8 iv[], 102 int rounds, in 183 int err, rounds = 6 + ctx->key_length / 4; local 203 int err, rounds = 6 + ctx->key_length / 4; local 224 int err = 0, rounds = 6 + ctx->key_length / 4; local 253 int err = 0, rounds = 6 + ctx->key_length / 4; local 281 int err, rounds = 6 + ctx->key_length / 4; local 338 int err, rounds = 6 + ctx->key_length / 4; local 411 int err, rounds = 6 + ctx->key1.key_length / 4; local 433 int err, rounds = 6 + ctx->key1.key_length / 4; local 455 int err, rounds = 6 + ctx->key_length / 4; local 501 int err, rounds = 6 + ctx->key_length / 4; local 545 int err, first, rounds = 6 + ctx->key1.key_length / 4; local 617 int err, first, rounds = 6 + ctx->key1.key_length / 4; local 822 int rounds = 6 + key_len / 4; local 851 int rounds = 6 + key_len / 4; local 880 int rounds = 6 + ctx->key_length / 4; local [all...] |
H A D | aes-ce-ccm-glue.c | 26 * # of rounds specified by AES: 27 * 128 bit key 10 rounds 28 * 192 bit key 12 rounds 29 * 256 bit key 14 rounds 30 * => n byte key => 6 + (n/4) rounds 35 asmlinkage u32 ce_aes_mac_update(u8 const in[], u32 const rk[], int rounds, 40 u32 const rk[], u32 rounds, u8 mac[], 44 u32 const rk[], u32 rounds, u8 mac[], 101 u32 macp, u32 const rk[], u32 rounds) 109 u32 rem = ce_aes_mac_update(in, rk, rounds, block 100 ce_aes_ccm_auth_data(u8 mac[], u8 const in[], u32 abytes, u32 macp, u32 const rk[], u32 rounds) argument [all...] |
H A D | aes-neonbs-glue.c | 26 asmlinkage void aesbs_convert_key(u8 out[], u32 const rk[], int rounds); 29 int rounds, int blocks); 31 int rounds, int blocks); 34 int rounds, int blocks, u8 iv[]); 37 int rounds, int blocks, u8 iv[]); 40 int rounds, int blocks, u8 iv[]); 42 int rounds, int blocks, u8 iv[]); 46 int rounds, int blocks); 48 int rounds, int blocks, u8 iv[]); 50 int rounds, in 60 int rounds; member in struct:aesbs_ctx 94 __ecb_crypt(struct skcipher_request *req, void (*fn)(u8 out[], u8 const in[], u8 const rk[], int rounds, int blocks)) argument 276 __xts_crypt(struct skcipher_request *req, bool encrypt, void (*fn)(u8 out[], u8 const in[], u8 const rk[], int rounds, int blocks, u8 iv[])) argument [all...] |
/linux-master/arch/powerpc/crypto/ |
H A D | aesp8-ppc.pl | 120 my ($inp,$bits,$out,$ptr,$cnt,$rounds)=map("r$_",(3..8)); 262 li $rounds,10 336 li $rounds,12 344 li $rounds,14 398 stw $rounds,0($out) 418 slwi $cnt,$rounds,4 420 srwi $rounds,$rounds,1 422 mtctr $rounds 460 my ($inp,$out,$key,$rounds, [all...] |
H A D | aesp8-ppc.h | 7 int rounds; member in struct:aes_key
|
H A D | aes-gcm-p10-glue.c | 46 u64 rounds; member in struct:aes_key
|
H A D | chacha-p10le-8x.S | 13 # do rounds, 8 quarter rounds
|
/linux-master/mm/ |
H A D | mempolicy.c | 2390 unsigned long rounds; 2455 * Calculate rounds/partial rounds to minimize __alloc_pages_bulk calls. 2458 * if (rounds > 0) and (delta == 0), resume_node will always be 2461 rounds = rem_pages / weight_total; 2468 node_pages = weight * rounds; 2480 /* node_pages can be 0 if an allocation fails and rounds == 0 */ 2389 unsigned long rounds; local
|
/linux-master/drivers/md/ |
H A D | dm-verity-fec.c | 39 return offset + mod * (v->fec->rounds << v->data_dev_block_bits); 454 res = div64_u64(offset, v->fec->rounds << v->data_dev_block_bits); 460 rsb = offset - res * (v->fec->rounds << v->data_dev_block_bits); 725 f->rounds = f->blocks; 726 if (sector_div(f->rounds, f->rsn)) 727 f->rounds++; 733 if (f->blocks < v->data_blocks + hash_blocks || !f->rounds) { 764 fec_blocks = div64_u64(f->rounds * f->roots, v->fec->roots << SECTOR_SHIFT);
|
/linux-master/arch/x86/kernel/ |
H A D | asm-offsets.c | 120 OFFSET(ARIA_CTX_rounds, aria_ctx, rounds);
|
/linux-master/fs/bcachefs/ |
H A D | siphash.c | 35 * are the number of compression rounds and the number of finalization rounds. 54 static void SipHash_Rounds(SIPHASH_CTX *ctx, int rounds) argument 56 while (rounds--) { 77 static void SipHash_CRounds(SIPHASH_CTX *ctx, const void *ptr, int rounds) argument 82 SipHash_Rounds(ctx, rounds);
|
/linux-master/drivers/iio/chemical/ |
H A D | sgp40.c | 101 static u32 sgp40_exp(int exp, u32 power, u32 rounds) argument 122 for (i = 1; i <= rounds; i++) {
|
/linux-master/arch/arm/crypto/ |
H A D | sha1_neon_glue.c | 30 const u8 *data, int rounds);
|