Home
last modified time | relevance | path

Searched refs:is_err (Results 1 – 13 of 13) sorted by relevance

/trusty/user/app/keymint/
Dkeys.rs433 expect!(num.is_err(), "We need an array of exactly 4 bytes for a u32"); in deserializing_u32s()
435 expect!(num.is_err(), "We need an array of exactly 4 bytes for a u32"); in deserializing_u32s()
437 expect!(num.is_err(), "We need an array of exactly 4 bytes for a u32"); in deserializing_u32s()
469 expect!(ctx_1.is_err(), "deserializing an empty context should fail"); in deserializing_bad_kek_context_fails()
476 expect!(ctx_2.is_err(), "deserializing a bigger than expected context should fail"); in deserializing_bad_kek_context_fails()
482 expect!(ctx_4.is_err(), "deserializing a smaller than expected context should fail"); in deserializing_bad_kek_context_fails()
484 expect!(ctx_5.is_err(), "deserializing a smaller than expected context should fail"); in deserializing_bad_kek_context_fails()
507 non_legacy_ctx.is_err(), in test_kek_context_creation()
512 non_legacy_ctx.is_err(), in test_kek_context_creation()
528 legacy_ctx.is_err(), in test_kek_context_creation()
[all …]
Dipc_manager.rs898 expect!(km_error_code.is_err(), "Shouldn't be able to call SetBootParams a second time"); in send_setbootparams_configure_setbootparams_configure()
904 km_error_code.is_err(), in send_setbootparams_configure_setbootparams_configure()
933 km_error_code.is_err(), in send_configure_configure_setbootparams_setbootparams()
963 expect!(km_error_code.is_err(), "Shouldn't be able to call SetBootParams a second time"); in send_configure_configure_setbootparams_setbootparams()
1001 expect!(km_error_code.is_err(), "Shouldn't be able to call SetBootParams a second time"); in send_setbootparams_setbootparams_configure_configure()
1018 km_error_code.is_err(), in send_setbootparams_setbootparams_configure_configure()
1069 expect!(km_error_code.is_err(), "Shouldn't be able to call SetBootParams a second time"); in send_configure_setbootparams_setbootparams_configure()
1075 km_error_code.is_err(), in send_configure_setbootparams_setbootparams_configure()
Dsecure_deletion_secret_manager.rs634 if sdsf_file.zero_entries(key_slot_start, key_slot_end).is_err() { in delete_secret()
755 expect!(secret.is_err(), "Read outside of initial range should fail"); in new_secret_data_file_is_clean()
806 expect!(size_failure.is_err(), "Shouldn't be able to increase secret file size any larger"); in new_secret_data_file_expands()
837 expect!(size_failure.is_err(), "Shouldn't be able to increase secret file size any larger"); in new_secret_data_file_expands()
Dsecure_storage_manager.rs730 expect!(read_attestation_key(key_type).is_err(), "Shouldn't be able to read a key"); in unprovisioned_keys_certs_reads_produces_error()
733 expect!(read_attestation_key(key_type).is_err(), "Shouldn't be able to read a key"); in unprovisioned_keys_certs_reads_produces_error()
762 append_attestation_cert_chain(algorithm, cert3).is_err(), in provision_certs_test_impl()
815 expect!(get_cert_chain(key_type).is_err(), "Certificates were not deleted"); in clear_certificate_chain_works_impl()
/trusty/user/base/lib/tipc/rust/src/service/
Dhandle_set.rs170 if cmd != sys::HSET_ADD as u32 || trusty_sys::Error::is_err(rc) { in do_set_ctrl()
185 && !trusty_sys::Error::is_err(rc) in do_set_ctrl()
/trusty/user/app/secretkeeper/
Dtests.rs36 result.is_err(), in port_connect()
Dstore.rs118 if result.is_err() { in delete_all()
/trusty/user/base/lib/trusty-sys/src/
Derr.rs78 pub fn is_err(rc: c_long) -> bool { in is_err() method
/trusty/user/app/sample/hwcryptokey-test/
Dversioned_keys_explicit.rs389 expect!(derived_key.is_err(), "expected error on bad key size"); in invalid_key_sizes()
399 expect!(derived_key.is_err(), "expected error on bad key size"); in invalid_key_sizes()
/trusty/user/base/lib/hwkey/rust/src/
Dtest.rs494 assert!(keyslot_res.is_err()); in test_get_keybox()
507 assert!(keyslot_res.is_err()); in test_get_derived_keybox()
524 assert!(keyslot_res.is_err()); in test_get_opaque_handle()
/trusty/user/base/lib/tipc/rust/src/
Dservice.rs1631 expect!(bad_uuid_from_str.is_err(), "shouldn't be able to parse string"); in uuid_parsing()
1633 expect!(bad_uuid_from_str.is_err(), "shouldn't be able to parse string"); in uuid_parsing()
1635 expect!(bad_uuid_from_str.is_err(), "shouldn't be able to parse string"); in uuid_parsing()
1637 expect!(bad_uuid_from_str.is_err(), "shouldn't be able to parse string"); in uuid_parsing()
1639 expect!(bad_uuid_from_str.is_err(), "shouldn't be able to parse string"); in uuid_parsing()
/trusty/user/base/lib/storage/rust/src/
Dlib.rs716 if ErrorCode::is_err(code) { in check_return_code()
/trusty/user/app/sample/hwcryptohal/server/
Dhwcrypto_device_key.rs434 expect!(key.is_err(), "shouldn't be able to create a key of length 0"); in derived_clear_key()