/trusty/user/base/lib/storage/rust/src/ |
D | test.rs | 2 use test::assert_eq; 25 assert_eq!(Err(Error::Code(ErrorCode::NotFound)), result); in connect_fail_no_wait() 44 assert_eq!(data.len(), file_contents.len(), "Incorrect number of bytes read"); in read_write() 45 assert_eq!(data, file_contents.as_bytes(), "Incorrect file contents returned"); in read_write() 65 assert_eq!(Err(Error::Code(ErrorCode::NotEnoughBuffer)), result); in read_all_buf_too_small() 87 assert_eq!(Ok(&file_contents[3..8]), result); in read_at() 95 assert_eq!(Ok(&file_contents[10..]), result); in read_at() 99 assert_eq!(expected, data, "Data buffer was not overwritten in expected way"); in read_at() 115 assert_eq!(Ok(()), result); in write_at() 121 assert_eq!(Ok(expected), result, "Incorrect bytes read"); in write_at() [all …]
|
D | lib.rs | 159 use test::assert_eq; 471 assert_eq!( in write_at_impl()
|
/trusty/user/base/lib/hwbcc/rust/src/ |
D | test.rs | 21 use ::test::assert_eq; 72 assert_eq!(artifacts.len(), bcc_handover_size); in test_get_dice_artifacts() 92 assert_eq!(EMULATOR_CDI_ATTEST, next_cdi_attest); in test_get_dice_artifacts() 93 assert_eq!(EMULATOR_CDI_SEAL, next_cdi_seal); in test_get_dice_artifacts() 190 assert_eq!(EMULATOR_PUB_KEY, dk_pub_key); in test_get_bcc() 191 assert_eq!(dk_pub_key, km_pub_key); in test_get_bcc()
|
/trusty/user/app/sample/memref-test/rust/ |
D | memref_test.rs | 80 assert_eq!(4096, remote_buf.len()); in test_read_write() 81 assert_eq!(0, unsafe { remote_buf.ptr().read() }); in test_read_write() 100 assert_eq!(7, resp.value); in test_read_write() 122 assert_eq!(7, unsafe { remote_buf.ptr().read() }); in test_read_write() 123 assert_eq!(123, unsafe { remote_buf.ptr().offset(1).read() }); in test_read_write() 163 assert_eq!(1, handles.len()); in deserialize()
|
/trusty/user/app/sample/hwcryptokey-test/ |
D | versioned_keys_explicit.rs | 111 assert_eq!(derived_key1.len() as i32, 256, "wrong key length"); in generate_new_policy_and_clear_key() 135 assert_eq!(derived_key2.len() as i32, 256, "wrong key length"); in generate_new_policy_and_clear_key() 138 assert_eq!(derived_key2, derived_key1, "key mismatch"); in generate_new_policy_and_clear_key() 169 assert_eq!(derived_key3.len() as i32, 256, "wrong key length"); in generate_new_policy_and_clear_key() 172 assert_eq!(derived_key3, derived_key1, "key mismatch"); in generate_new_policy_and_clear_key() 209 assert_eq!(derived_key.len() as i32, 256, "wrong key length"); in old_dice_generates_old_clear_key_and_new_policy() 212 assert_eq!(derived_key, VERSION_0_CLEAR_KEY.to_vec(), "Retrieved version 0 key mismatch"); in old_dice_generates_old_clear_key_and_new_policy() 286 assert_eq!(derived_key1, derived_key2, "key mismatch"); in dice_updates_are_unique() 352 assert_eq!(derived_key1.len() as i32, 256, "wrong key length"); in explicit_keys_unique_by_context() 353 assert_eq!(derived_key2.len() as i32, 256, "wrong key length"); in explicit_keys_unique_by_context() [all …]
|
/trusty/user/base/lib/hwkey/rust/src/ |
D | test.rs | 18 use ::test::{assert, assert_eq, assert_ne}; 74 assert_eq!(buf, buf2); in test_hwkey_derive_repeatable_versioned() 110 assert_eq!(buf, buf2); in test_hwkey_derive_repeatable_versioned() 305 assert_eq!(buf1, buf2); in test_hwkey_derive_different_version_source() 446 assert_eq!(err, HwkeyError::BadLen); in test_hwkey_derive_large_payload() 456 assert_eq!(err, HwkeyError::BadLen); in test_hwkey_derive_large_payload() 482 assert_eq!(err, HwkeyError::NotFound); in test_get_keyslot_storage_auth() 492 assert_eq!(UNITTEST_KEYSLOT, keyslot_res.expect("could not get keyslot data")) in test_get_keybox() 505 assert_eq!(UNITTEST_DERIVED_KEYSLOT, keyslot_res.expect("could not get keyslot data")) in test_get_derived_keybox() 542 assert_eq!(UNITTEST_KEYSLOT, keyslot_data) in test_get_opaque_key() [all …]
|
/trusty/user/app/keymint/unauthorized_test_app/ |
D | lib.rs | 38 assert_eq!(err1, TipcError::SystemError(trusty_sys::Error::ChannelClosed)); in test_access_policy_unauthorized()
|
/trusty/user/base/lib/trusty-std/src/ |
D | lib.rs | 63 assert_eq, assert_ne, debug_assert, debug_assert_eq, debug_assert_ne, matches, todo,
|
/trusty/user/base/lib/tipc/rust/src/service/ |
D | handle_set.rs | 133 assert_eq!(Rc::strong_count(&connection), 1); in close()
|
/trusty/user/base/lib/system_state/rust/src/ |
D | lib.rs | 125 assert_eq!(response.flag, flag); in get_flag()
|
/trusty/user/base/lib/unittest-rust/src/ |
D | macros.rs | 98 macro_rules! assert_eq { macro
|
/trusty/user/app/keymint/ |
D | ipc_manager.rs | 675 assert_eq!(err, TipcError::SystemError(trusty_sys::Error::NoMsg)); in test_access_policy()
|