Searched refs:is_err (Results 1 – 13 of 13) sorted by relevance
/trusty/user/app/keymint/ |
D | keys.rs | 433 expect!(num.is_err(), "We need an array of exactly 4 bytes for a u32"); in deserializing_u32s() 435 expect!(num.is_err(), "We need an array of exactly 4 bytes for a u32"); in deserializing_u32s() 437 expect!(num.is_err(), "We need an array of exactly 4 bytes for a u32"); in deserializing_u32s() 469 expect!(ctx_1.is_err(), "deserializing an empty context should fail"); in deserializing_bad_kek_context_fails() 476 expect!(ctx_2.is_err(), "deserializing a bigger than expected context should fail"); in deserializing_bad_kek_context_fails() 482 expect!(ctx_4.is_err(), "deserializing a smaller than expected context should fail"); in deserializing_bad_kek_context_fails() 484 expect!(ctx_5.is_err(), "deserializing a smaller than expected context should fail"); in deserializing_bad_kek_context_fails() 507 non_legacy_ctx.is_err(), in test_kek_context_creation() 512 non_legacy_ctx.is_err(), in test_kek_context_creation() 528 legacy_ctx.is_err(), in test_kek_context_creation() [all …]
|
D | ipc_manager.rs | 898 expect!(km_error_code.is_err(), "Shouldn't be able to call SetBootParams a second time"); in send_setbootparams_configure_setbootparams_configure() 904 km_error_code.is_err(), in send_setbootparams_configure_setbootparams_configure() 933 km_error_code.is_err(), in send_configure_configure_setbootparams_setbootparams() 963 expect!(km_error_code.is_err(), "Shouldn't be able to call SetBootParams a second time"); in send_configure_configure_setbootparams_setbootparams() 1001 expect!(km_error_code.is_err(), "Shouldn't be able to call SetBootParams a second time"); in send_setbootparams_setbootparams_configure_configure() 1018 km_error_code.is_err(), in send_setbootparams_setbootparams_configure_configure() 1069 expect!(km_error_code.is_err(), "Shouldn't be able to call SetBootParams a second time"); in send_configure_setbootparams_setbootparams_configure() 1075 km_error_code.is_err(), in send_configure_setbootparams_setbootparams_configure()
|
D | secure_deletion_secret_manager.rs | 634 if sdsf_file.zero_entries(key_slot_start, key_slot_end).is_err() { in delete_secret() 755 expect!(secret.is_err(), "Read outside of initial range should fail"); in new_secret_data_file_is_clean() 806 expect!(size_failure.is_err(), "Shouldn't be able to increase secret file size any larger"); in new_secret_data_file_expands() 837 expect!(size_failure.is_err(), "Shouldn't be able to increase secret file size any larger"); in new_secret_data_file_expands()
|
D | secure_storage_manager.rs | 730 expect!(read_attestation_key(key_type).is_err(), "Shouldn't be able to read a key"); in unprovisioned_keys_certs_reads_produces_error() 733 expect!(read_attestation_key(key_type).is_err(), "Shouldn't be able to read a key"); in unprovisioned_keys_certs_reads_produces_error() 762 append_attestation_cert_chain(algorithm, cert3).is_err(), in provision_certs_test_impl() 815 expect!(get_cert_chain(key_type).is_err(), "Certificates were not deleted"); in clear_certificate_chain_works_impl()
|
/trusty/user/base/lib/tipc/rust/src/service/ |
D | handle_set.rs | 170 if cmd != sys::HSET_ADD as u32 || trusty_sys::Error::is_err(rc) { in do_set_ctrl() 185 && !trusty_sys::Error::is_err(rc) in do_set_ctrl()
|
/trusty/user/app/secretkeeper/ |
D | tests.rs | 36 result.is_err(), in port_connect()
|
D | store.rs | 118 if result.is_err() { in delete_all()
|
/trusty/user/base/lib/trusty-sys/src/ |
D | err.rs | 78 pub fn is_err(rc: c_long) -> bool { in is_err() method
|
/trusty/user/app/sample/hwcryptokey-test/ |
D | versioned_keys_explicit.rs | 389 expect!(derived_key.is_err(), "expected error on bad key size"); in invalid_key_sizes() 399 expect!(derived_key.is_err(), "expected error on bad key size"); in invalid_key_sizes()
|
/trusty/user/base/lib/hwkey/rust/src/ |
D | test.rs | 494 assert!(keyslot_res.is_err()); in test_get_keybox() 507 assert!(keyslot_res.is_err()); in test_get_derived_keybox() 524 assert!(keyslot_res.is_err()); in test_get_opaque_handle()
|
/trusty/user/base/lib/tipc/rust/src/ |
D | service.rs | 1631 expect!(bad_uuid_from_str.is_err(), "shouldn't be able to parse string"); in uuid_parsing() 1633 expect!(bad_uuid_from_str.is_err(), "shouldn't be able to parse string"); in uuid_parsing() 1635 expect!(bad_uuid_from_str.is_err(), "shouldn't be able to parse string"); in uuid_parsing() 1637 expect!(bad_uuid_from_str.is_err(), "shouldn't be able to parse string"); in uuid_parsing() 1639 expect!(bad_uuid_from_str.is_err(), "shouldn't be able to parse string"); in uuid_parsing()
|
/trusty/user/base/lib/storage/rust/src/ |
D | lib.rs | 716 if ErrorCode::is_err(code) { in check_return_code()
|
/trusty/user/app/sample/hwcryptohal/server/ |
D | hwcrypto_device_key.rs | 434 expect!(key.is_err(), "shouldn't be able to create a key of length 0"); in derived_clear_key()
|