Home
last modified time | relevance | path

Searched refs:ii (Results 1 – 25 of 108) sorted by relevance

12345

/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/
Dhks_crypto_hal_sm3_cipher.cpp94 for (uint32_t ii = 0; ii < dataLen; ii++) { variable
95 message.data[ii] = ReadHex((const uint8_t *)&hexData[HKS_COUNT_OF_HALF * ii]);
116 for (uint32_t ii = 0; ii < dataLen; ii++) { variable
117 message.data[ii] = ReadHex((const uint8_t *)&hexData[HKS_COUNT_OF_HALF * ii]);
138 for (uint32_t ii = 0; ii < dataLen; ii++) { variable
139 message.data[ii] = ReadHex((const uint8_t *)&hexData[HKS_COUNT_OF_HALF * ii]);
Dhks_crypto_hal_aes_decrypt.cpp334 for (uint32_t ii = 0; ii < keyLen; ii++) { in RunTestCase() local
335 … key.data[ii] = ReadHex((const uint8_t *)&testCaseParams.keyData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
346 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase() local
347 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
468 for (uint32_t ii = 0; ii < keyLen; ii++) { in GcmRunTestCase() local
469 … key.data[ii] = ReadHex((const uint8_t *)&testCaseParamsForGcm.keyData[HKS_COUNT_OF_HALF * ii]); in GcmRunTestCase()
475 for (uint32_t ii = 0; ii < inLen; ii++) { in GcmRunTestCase() local
476 …message.data[ii] = ReadHex((const uint8_t *)&testCaseParamsForGcm.hexData[HKS_COUNT_OF_HALF * ii]); in GcmRunTestCase()
483 for (uint32_t ii = 0; ii < tagDecSize; ii++) { in GcmRunTestCase() local
484 …tagDecBlob.data[ii] = ReadHex((const uint8_t *)&testCaseParamsForGcm.tagDec[HKS_COUNT_OF_HALF * ii in GcmRunTestCase()
Dhks_crypto_hal_rsa_decrypt.cpp483 for (uint32_t ii = 0; ii < keyLen; ii++) { in RunTestCase() local
484 … key.data[ii] = ReadHex((const uint8_t *)&testCaseParams.keyData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
492 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase() local
493 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
Dhks_crypto_hal_rsa_encrypt.cpp470 for (uint32_t ii = 0; ii < keyLen; ii++) { in RunTestCase() local
471 … key.data[ii] = ReadHex((const uint8_t *)&testCaseParams.keyData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
482 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase() local
483 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
Dhks_crypto_hal_dsa_sign.cpp106 for (uint32_t ii = 0; ii < dataLen; ii++) { in RunTestCase() local
107 message.data[ii] = ReadHex((const uint8_t *)&hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
Dhks_crypto_hal_hmac_hmac.cpp126 for (uint32_t ii = 0; ii < dataLen; ii++) { in RunTestCase() local
127 message.data[ii] = ReadHex((const uint8_t *)&hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
Dhks_crypto_hal_aes_encrypt.cpp408 for (uint32_t ii = 0; ii < keyLen; ii++) { in RunTestCase() local
409 … key.data[ii] = ReadHex((const uint8_t *)&testCaseParams.keyData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
419 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase() local
420 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
Dhks_crypto_hal_rsa_oaep_encrypt.cpp1161 for (uint32_t ii = 0; ii < keyLen; ii++) { in RunTestCase() local
1162 … key.data[ii] = ReadHex((const uint8_t *)&testCaseParams.keyData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
1170 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase() local
1171 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
Dhks_crypto_hal_rsa_oaep_decrypt.cpp1287 for (uint32_t ii = 0; ii < keyLen; ii++) { in RunTestCase() local
1288 … key.data[ii] = ReadHex((const uint8_t *)&testCaseParams.keyData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
1296 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase() local
1297 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
Dhks_crypto_hal_aes_cipher.cpp622 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCaseThreeStage() local
623 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCaseThreeStage()
717 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCaseThreeStageGCM() local
718 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCaseThreeStageGCM()
764 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase() local
765 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
Dhks_crypto_hal_ecdsa_sign.cpp525 for (uint32_t ii = 0; ii < dataLen; ii++) { in RunTestCase() local
526 message.data[ii] = ReadHex((const uint8_t *)&hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
Dhks_crypto_hal_api_mbedtls.cpp585 for (uint32_t ii = 0; ii < dataLen; ii++) { variable
586 message.data[ii] = ReadHex((const uint8_t *)&hexData[HKS_COUNT_OF_HALF * ii]);
Dhks_crypto_hal_rsa_cipher.cpp884 for (uint32_t ii = 0; ii < inLen; ii++) { in RunTestCase() local
885 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
Dhks_crypto_hal_rsa_sign.cpp1472 for (uint32_t ii = 0; ii < dataLen; ii++) { in RunTestCase() local
1473 … message.data[ii] = ReadHex((const uint8_t *)&testCaseParams.hexData[HKS_COUNT_OF_HALF * ii]); in RunTestCase()
/base/security/huks/test/reliability/src/
Dapi_pressure_test.cpp468 void DeleteKeyTest(uint32_t ii);
482 void CipherScene(uint32_t ii);
483 void SignScene(uint32_t ii);
484 void AgreeScene(uint32_t ii);
584 void ApiPressureTest::DeleteKeyTest(uint32_t ii) in DeleteKeyTest() argument
590 std::string key = "KeyForThread" + std::to_string(ii); in DeleteKeyTest()
803 void ApiPressureTest::CipherScene(uint32_t ii) in CipherScene() argument
805 std::string key = "KeyForThread" + std::to_string(ii); in CipherScene()
848 void ApiPressureTest::SignScene(uint32_t ii) in SignScene() argument
850 std::string key = "KeyForThread" + std::to_string(ii); in SignScene()
[all …]
Dpressure_test.cpp116 for (uint32_t ii = 0; ii < TEST_FREQUENCY; ii++) { variable
139 for (uint32_t ii = 0; ii < TEST_FREQUENCY; ii++) { variable
158 for (uint32_t ii = 0; ii < TEST_FREQUENCY; ii++) { variable
178 for (uint32_t ii = 0; ii < TEST_FREQUENCY; ii++) { variable
239 for (uint32_t ii = 0; ii < TEST_FREQUENCY; ii++) { variable
282 for (uint32_t ii = 0; ii < TEST_FREQUENCY; ii++) { variable
307 for (uint32_t ii = 0; ii < TEST_FREQUENCY; ii++) { variable
366 for (uint32_t ii = 0; ii < TEST_FREQUENCY; ii++) { variable
417 for (uint32_t ii = 0; ii < TEST_FREQUENCY; ii++) { variable
438 for (uint32_t ii = 0; ii < TEST_FREQUENCY; ii++) { variable
[all …]
/base/hiviewdfx/hiview/plugins/sysevent_source/
Devent_server.cpp372 for (int ii = 0; ii < eventCount; ii++) { in Start() local
373 auto it = devs_.find(chkPollEvents[ii].data.fd); in Start()
/base/hiviewdfx/hilog_lite/frameworks/featured/
Dhiview_log.c246 for (ii = 0; ii < txtLen; ++ii) { \
259 for (ii = 0; ii < txtLen; ++ii) { \
284 for (ii = 0; ii < padLen; ++ii) { \
548 int ii = 0; in HiLogSecOutputS() local
1232 for (ii = 0; ii < formatAttr.precision - textLen; ++ii) { in HiLogSecOutputS()
/base/hiviewdfx/hilog/frameworks/libhilog/vsnprintf/
Doutput_p.inl91 for (ii = 0; ii < txtLen; ++ii) { \
102 for (ii = 0; ii < txtLen; ++ii) { \
123 for (ii = 0; ii < padLen; ++ii) { \
156 int ii = 0; local
413 int ii = 0; local
1126 for (ii = 0; ii < formatAttr.precision - textLen; ++ii) {
/base/update/sys_installer_lite/
DLICENSE21 otherwise, or (ii) ownership of fifty percent (50%) or more of the
/base/powermgr/battery_lite/
DLICENSE21 otherwise, or (ii) ownership of fifty percent (50%) or more of the
/base/global/resource_management/
DLICENSE21 otherwise, or (ii) ownership of fifty percent (50%) or more of the
/base/hiviewdfx/hitrace/
DLICENSE21 otherwise, or (ii) ownership of fifty percent (50%) or more of the
/base/global/system_resources/
DLICENSE23 otherwise, or (ii) ownership of fifty percent (50%) or more of the
/base/telephony/state_registry/
DLICENSE21 otherwise, or (ii) ownership of fifty percent (50%) or more of the

12345