Lines Matching refs:i

1057     unsigned int  i;  in add_l()  local
1060 for (i = 0U; i < 32U; i++) { in add_l()
1061 s = S[i] + l[i] + c; in add_l()
1062 S[i] = (unsigned char) s; in add_l()
1084 unsigned int i; in main() local
1088 for (i = 0U; i < (sizeof test_data) / (sizeof test_data[0]); i++) { in main()
1090 if (i % 128U != 127U) { in main()
1094 memcpy(skpk, test_data[i].sk, crypto_sign_SEEDBYTES); in main()
1095 memcpy(skpk + crypto_sign_SEEDBYTES, test_data[i].pk, in main()
1097 if (crypto_sign(sm, &smlen, (const unsigned char *)test_data[i].m, i, in main()
1099 printf("crypto_sign() failure: [%u]\n", i); in main()
1102 if (memcmp(test_data[i].sig, sm, crypto_sign_BYTES) != 0) { in main()
1103 printf("signature failure: [%u]\n", i); in main()
1106 if (crypto_sign_open(m, NULL, sm, smlen, test_data[i].pk) != 0) { in main()
1107 printf("crypto_sign_open() failure: [%u]\n", i); in main()
1112 if (crypto_sign_open(m, &mlen, sm, smlen, test_data[i].pk) != -1) { in main()
1113 printf("crypto_sign_open(): signature [%u] is malleable\n", i); in main()
1117 if (crypto_sign_open(m, &mlen, sm, smlen, test_data[i].pk) != 0) { in main()
1118 printf("crypto_sign_open(): signature [%u] is not malleable\n", i); in main()
1122 if (memcmp(test_data[i].m, m, (size_t)mlen) != 0) { in main()
1123 printf("message verification failure: [%u]\n", i); in main()
1126 sm[i + crypto_sign_BYTES - 1U]++; in main()
1127 if (crypto_sign_open(m, &mlen, sm, smlen, test_data[i].pk) == 0) { in main()
1128 printf("message can be forged: [%u]\n", i); in main()
1131 if (crypto_sign_open(m, &mlen, sm, i % crypto_sign_BYTES, in main()
1132 test_data[i].pk) == 0) { in main()
1134 i % crypto_sign_BYTES); in main()
1138 (const unsigned char *)test_data[i].m, i, skpk) in main()
1140 printf("detached signature failed: [%u]\n", i); in main()
1144 printf("detached signature has an unexpected length: [%u]\n", i); in main()
1147 if (memcmp(test_data[i].sig, sig, crypto_sign_BYTES) != 0) { in main()
1148 printf("detached signature failure: [%u]\n", i); in main()
1152 (const unsigned char *)test_data[i].m, in main()
1153 i, test_data[i].pk) != 0) { in main()
1154 printf("detached signature verification failed: [%u]\n", i); in main()
1158 printf("%u tests\n", i); in main()
1160 i--; in main()
1162 memcpy(sm, test_data[i].m, i); in main()
1163 if (crypto_sign(sm, &smlen, sm, i, skpk) != 0) { in main()
1166 if (crypto_sign_open(sm, &mlen, sm, smlen, test_data[i].pk) != 0) { in main()
1169 if (memcmp(test_data[i].m, sm, (size_t)mlen) != 0) { in main()
1176 (const unsigned char *)test_data[i].m, in main()
1177 i, test_data[i].pk) != -1) { in main()
1186 (const unsigned char *)test_data[i].m, in main()
1187 i, non_canonical_p) != -1) { in main()
1193 (const unsigned char *)test_data[i].m, in main()
1194 i, pk) != -1) { in main()
1201 (const unsigned char *)test_data[i].m, in main()
1202 i, pk) != -1) { in main()
1206 (const unsigned char *)test_data[i].m, i, skpk) == 0); in main()
1212 (const unsigned char *)test_data[i].m, in main()
1213 i, pk) != -1) { in main()
1221 (const unsigned char *)test_data[i].m, in main()
1222 i, pk) != -1) { in main()
1230 (const unsigned char *)test_data[i].m, in main()
1231 i, pk) != -1) { in main()
1240 crypto_sign_update(&st, (const unsigned char *)test_data[i].m, i); in main()
1246 crypto_sign_update(&st, (const unsigned char *)test_data[i].m, i); in main()
1251 crypto_sign_update(&st, (const unsigned char *)test_data[i].m, 0); in main()
1252 crypto_sign_update(&st, (const unsigned char *)test_data[i].m, i / 2); in main()
1253 crypto_sign_update(&st, ((const unsigned char *)test_data[i].m) + i / 2, in main()
1254 i - i / 2); in main()