Lines Matching refs:expect
29 use test::{expect, assert_ok};
68 CString::try_new(RUST_DEVICE_KEY_SERVICE_PORT).expect("Failed to allocate port name"); in connect()
80 let hw_device_key = connect().expect("couldn't connect to HW Crypto service"); in generate_new_policy_and_clear_key()
93 expect!(derivation_key1.is_some(), "should have received a key"); in generate_new_policy_and_clear_key()
94 expect!(dice_policy.len() > 0, "should have received a DICE policy"); in generate_new_policy_and_clear_key()
121 expect!(derivation_key2.is_some(), "should have received a key"); in generate_new_policy_and_clear_key()
122 expect!(dice_policy_current, "policy should have been current"); in generate_new_policy_and_clear_key()
177 let hw_device_key = connect().expect("couldn't connect to HW Crypto service"); in old_dice_generates_old_clear_key_and_new_policy()
192 expect!(!dice_policy_current, "policy not expected to be current"); in old_dice_generates_old_clear_key_and_new_policy()
217 let hw_device_key = connect().expect("couldn't connect to HW Crypto service"); in dice_updates_are_unique()
232 expect!(!dice_policy_current, "policy not expected to be current"); in dice_updates_are_unique()
250 expect!(dice_policy1.len() > 0, "should have received a DICE policy"); in dice_updates_are_unique()
251 expect!(dice_policy2.len() > 0, "should have received a DICE policy"); in dice_updates_are_unique()
254 expect!(derivation_key1.is_some(), "should have received a key"); in dice_updates_are_unique()
255 expect!(derivation_key2.is_some(), "should have received a key"); in dice_updates_are_unique()
294 expect!(dice_policy1_current, "policy expected to be current"); in dice_updates_are_unique()
301 expect!(dice_policy2_current, "policy expected to be current"); in dice_updates_are_unique()
306 let hw_device_key = connect().expect("couldn't connect to HW Crypto service"); in explicit_keys_unique_by_context()
319 expect!(derivation_key.is_some(), "should have received a key"); in explicit_keys_unique_by_context()
320 expect!(dice_policy.len() > 0, "should have received a DICE policy"); in explicit_keys_unique_by_context()
365 let hw_device_key = connect().expect("couldn't connect to HW Crypto service"); in invalid_key_sizes()
378 expect!(derivation_key.is_some(), "should have received a key"); in invalid_key_sizes()
379 expect!(dice_policy.len() > 0, "should have received a DICE policy"); in invalid_key_sizes()
389 expect!(derived_key.is_err(), "expected error on bad key size"); in invalid_key_sizes()
399 expect!(derived_key.is_err(), "expected error on bad key size"); in invalid_key_sizes()
404 let hw_device_key = connect().expect("couldn't connect to HW Crypto service"); in large_context()
417 expect!(derivation_key.is_some(), "should have received a key"); in large_context()
418 expect!(dice_policy.len() > 0, "should have received a DICE policy"); in large_context()