/base/security/huks/test/reliability/src/ |
D | api_pressure_test.cpp | 468 void DeleteKeyTest(uint32_t ii); 482 void CipherScene(uint32_t ii); 483 void SignScene(uint32_t ii); 484 void AgreeScene(uint32_t ii); 584 void ApiPressureTest::DeleteKeyTest(uint32_t ii) in DeleteKeyTest() argument 590 std::string key = "KeyForThread" + std::to_string(ii); in DeleteKeyTest() 803 void ApiPressureTest::CipherScene(uint32_t ii) in CipherScene() argument 805 std::string key = "KeyForThread" + std::to_string(ii); in CipherScene() 848 void ApiPressureTest::SignScene(uint32_t ii) in SignScene() argument 850 std::string key = "KeyForThread" + std::to_string(ii); in SignScene() [all …]
|
D | pressure_test.cpp | 116 for (uint32_t ii = 0; ii < TEST_FREQUENCY; ii++) { variable 139 for (uint32_t ii = 0; ii < TEST_FREQUENCY; ii++) { variable 158 for (uint32_t ii = 0; ii < TEST_FREQUENCY; ii++) { variable 178 for (uint32_t ii = 0; ii < TEST_FREQUENCY; ii++) { variable 239 for (uint32_t ii = 0; ii < TEST_FREQUENCY; ii++) { variable 282 for (uint32_t ii = 0; ii < TEST_FREQUENCY; ii++) { variable 307 for (uint32_t ii = 0; ii < TEST_FREQUENCY; ii++) { variable 366 for (uint32_t ii = 0; ii < TEST_FREQUENCY; ii++) { variable 417 for (uint32_t ii = 0; ii < TEST_FREQUENCY; ii++) { variable 438 for (uint32_t ii = 0; ii < TEST_FREQUENCY; ii++) { variable [all …]
|
/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/ |
D | hks_crypto_hal_aes_decrypt.cpp | 327 for (uint32_t ii = 0; ii < keyLen; ii++) { in RunTestCase() local 328 … key.data[ii] = ReadHex((const uint8_t *)&testCaseParams.keyData[HKS_COUNT_OF_HALF * ii]); in RunTestCase() 339 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase() local 340 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase() 461 for (uint32_t ii = 0; ii < keyLen; ii++) { in GcmRunTestCase() local 462 … key.data[ii] = ReadHex((const uint8_t *)&testCaseParamsForGcm.keyData[HKS_COUNT_OF_HALF * ii]); in GcmRunTestCase() 468 for (uint32_t ii = 0; ii < inLen; ii++) { in GcmRunTestCase() local 469 …message.data[ii] = ReadHex((const uint8_t *)&testCaseParamsForGcm.hexData[HKS_COUNT_OF_HALF * ii]); in GcmRunTestCase() 476 for (uint32_t ii = 0; ii < tagDecSize; ii++) { in GcmRunTestCase() local 477 …tagDecBlob.data[ii] = ReadHex((const uint8_t *)&testCaseParamsForGcm.tagDec[HKS_COUNT_OF_HALF * ii… in GcmRunTestCase()
|
D | hks_crypto_hal_rsa_decrypt.cpp | 478 for (uint32_t ii = 0; ii < keyLen; ii++) { in RunTestCase() local 479 … key.data[ii] = ReadHex((const uint8_t *)&testCaseParams.keyData[HKS_COUNT_OF_HALF * ii]); in RunTestCase() 487 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase() local 488 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
|
D | hks_crypto_hal_rsa_encrypt.cpp | 465 for (uint32_t ii = 0; ii < keyLen; ii++) { in RunTestCase() local 466 … key.data[ii] = ReadHex((const uint8_t *)&testCaseParams.keyData[HKS_COUNT_OF_HALF * ii]); in RunTestCase() 477 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase() local 478 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
|
D | hks_crypto_hal_dsa_sign.cpp | 105 for (uint32_t ii = 0; ii < dataLen; ii++) { in RunTestCase() local 106 message.data[ii] = ReadHex((const uint8_t *)&hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
|
D | hks_crypto_hal_hmac_hmac.cpp | 122 for (uint32_t ii = 0; ii < dataLen; ii++) { in RunTestCase() local 123 message.data[ii] = ReadHex((const uint8_t *)&hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
|
D | hks_crypto_hal_aes_encrypt.cpp | 401 for (uint32_t ii = 0; ii < keyLen; ii++) { in RunTestCase() local 402 … key.data[ii] = ReadHex((const uint8_t *)&testCaseParams.keyData[HKS_COUNT_OF_HALF * ii]); in RunTestCase() 412 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase() local 413 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
|
D | hks_crypto_hal_rsa_oaep_decrypt.cpp | 1276 for (uint32_t ii = 0; ii < keyLen; ii++) { in RunTestCase() local 1277 … key.data[ii] = ReadHex((const uint8_t *)&testCaseParams.keyData[HKS_COUNT_OF_HALF * ii]); in RunTestCase() 1285 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase() local 1286 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
|
D | hks_crypto_hal_rsa_oaep_encrypt.cpp | 1152 for (uint32_t ii = 0; ii < keyLen; ii++) { in RunTestCase() local 1153 … key.data[ii] = ReadHex((const uint8_t *)&testCaseParams.keyData[HKS_COUNT_OF_HALF * ii]); in RunTestCase() 1161 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase() local 1162 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
|
D | hks_crypto_hal_aes_cipher.cpp | 615 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCaseThreeStage() local 616 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCaseThreeStage() 710 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCaseThreeStageGCM() local 711 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCaseThreeStageGCM() 757 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase() local 758 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
|
D | hks_crypto_hal_ecdsa_sign.cpp | 519 for (uint32_t ii = 0; ii < dataLen; ii++) { in RunTestCase() local 520 message.data[ii] = ReadHex((const uint8_t *)&hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
|
D | hks_crypto_hal_api_mbedtls.cpp | 582 for (uint32_t ii = 0; ii < dataLen; ii++) { variable 583 message.data[ii] = ReadHex((const uint8_t *)&hexData[HKS_COUNT_OF_HALF * ii]);
|
D | hks_crypto_hal_rsa_cipher.cpp | 871 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase() local 872 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
|
D | hks_crypto_hal_rsa_sign.cpp | 1454 for (uint32_t ii = 0; ii < dataLen; ii++) { in RunTestCase() local 1455 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
|
/base/hiviewdfx/hiview/core/ |
D | event_server.cpp | 350 for (int ii = 0; ii < eventCount; ii++) { in Start() local 351 auto it = devs_.find(chkPollEvents[ii].data.fd); in Start()
|
/base/hiviewdfx/hilog_lite/frameworks/featured/ |
D | hiview_log.c | 246 for (ii = 0; ii < txtLen; ++ii) { \ 259 for (ii = 0; ii < txtLen; ++ii) { \ 284 for (ii = 0; ii < padLen; ++ii) { \ 548 int ii = 0; in HiLogSecOutputS() local 1232 for (ii = 0; ii < formatAttr.precision - textLen; ++ii) { in HiLogSecOutputS()
|
/base/hiviewdfx/hilog/frameworks/libhilog/vsnprintf/ |
D | output_p.inl | 91 for (ii = 0; ii < txtLen; ++ii) { \ 102 for (ii = 0; ii < txtLen; ++ii) { \ 123 for (ii = 0; ii < padLen; ++ii) { \ 156 int ii = 0; local 413 int ii = 0; local 1126 for (ii = 0; ii < formatAttr.precision - textLen; ++ii) {
|
/base/sensors/miscdevice/ |
D | LICENSE | 21 otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
/base/update/update_app/ |
D | LICENSE | 21 otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
/base/update/packaging_tools/ |
D | LICENSE | 20 otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
/base/useriam/pin_auth/ |
D | LICENSE | 21 otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
/base/security/huks/ |
D | LICENSE | 21 otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
/base/powermgr/power_manager/ |
D | LICENSE | 21 otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
/base/iothardware/peripheral/ |
D | LICENSE | 21 otherwise, or (ii) ownership of fifty percent (50%) or more of the
|