Lines Matching refs:assert
651 assert!(result.is_err(), "Permission check should have failed.");
675 assert!(check_keystore_permission(&system_server_ctx, KeystorePerm::add_auth()).is_ok()); in check_keystore_permission_test()
676 assert!(check_keystore_permission(&system_server_ctx, KeystorePerm::clear_ns()).is_ok()); in check_keystore_permission_test()
677 assert!(check_keystore_permission(&system_server_ctx, KeystorePerm::get_state()).is_ok()); in check_keystore_permission_test()
678 assert!(check_keystore_permission(&system_server_ctx, KeystorePerm::lock()).is_ok()); in check_keystore_permission_test()
679 assert!(check_keystore_permission(&system_server_ctx, KeystorePerm::reset()).is_ok()); in check_keystore_permission_test()
680 assert!(check_keystore_permission(&system_server_ctx, KeystorePerm::unlock()).is_ok()); in check_keystore_permission_test()
681 assert!(check_keystore_permission(&system_server_ctx, KeystorePerm::change_user()).is_ok()); in check_keystore_permission_test()
682 assert!( in check_keystore_permission_test()
685 assert!(check_keystore_permission(&system_server_ctx, KeystorePerm::clear_uid()).is_ok()); in check_keystore_permission_test()
689 assert!(check_keystore_permission(&shell_ctx, KeystorePerm::get_state()).is_ok()); in check_keystore_permission_test()
729 assert!(check_grant_permission(&sctx, NOT_GRANT_PERMS, &key).is_ok()); in check_grant_permission_selinux()
768 assert!(check_key_permission(0, &system_server_ctx, KeyPerm::use_(), &key, &None).is_ok()); in check_key_permission_domain_app()
769 … assert!(check_key_permission(0, &system_server_ctx, KeyPerm::delete(), &key, &None).is_ok()); in check_key_permission_domain_app()
770 assert!( in check_key_permission_domain_app()
773 … assert!(check_key_permission(0, &system_server_ctx, KeyPerm::rebind(), &key, &None).is_ok()); in check_key_permission_domain_app()
774 … assert!(check_key_permission(0, &system_server_ctx, KeyPerm::update(), &key, &None).is_ok()); in check_key_permission_domain_app()
775 assert!(check_key_permission(0, &system_server_ctx, KeyPerm::grant(), &key, &None).is_ok()); in check_key_permission_domain_app()
776 assert!( in check_key_permission_domain_app()
779 assert!( in check_key_permission_domain_app()
783 assert!(check_key_permission(0, &shell_ctx, KeyPerm::use_(), &key, &None).is_ok()); in check_key_permission_domain_app()
784 assert!(check_key_permission(0, &shell_ctx, KeyPerm::delete(), &key, &None).is_ok()); in check_key_permission_domain_app()
785 assert!(check_key_permission(0, &shell_ctx, KeyPerm::get_info(), &key, &None).is_ok()); in check_key_permission_domain_app()
786 assert!(check_key_permission(0, &shell_ctx, KeyPerm::rebind(), &key, &None).is_ok()); in check_key_permission_domain_app()
787 assert!(check_key_permission(0, &shell_ctx, KeyPerm::update(), &key, &None).is_ok()); in check_key_permission_domain_app()
827 assert!(check_key_permission( in check_key_permission_domain_app()
858 assert!(check_key_permission(0, &sctx, KeyPerm::use_(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
859 assert!(check_key_permission(0, &sctx, KeyPerm::delete(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
860 assert!(check_key_permission(0, &sctx, KeyPerm::get_info(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
861 assert!(check_key_permission(0, &sctx, KeyPerm::rebind(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
862 assert!(check_key_permission(0, &sctx, KeyPerm::update(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
863 assert!(check_key_permission(0, &sctx, KeyPerm::grant(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
864 assert!(check_key_permission(0, &sctx, KeyPerm::manage_blob(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
865 assert!(check_key_permission(0, &sctx, KeyPerm::use_dev_id(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
866 assert!(check_key_permission(0, &sctx, KeyPerm::gen_unique_id(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
867 assert!(check_key_permission(0, &sctx, KeyPerm::req_forced_op(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
869 assert!(check_key_permission(0, &sctx, KeyPerm::use_(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
870 assert!(check_key_permission(0, &sctx, KeyPerm::delete(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
871 assert!(check_key_permission(0, &sctx, KeyPerm::get_info(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
872 assert!(check_key_permission(0, &sctx, KeyPerm::rebind(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
873 assert!(check_key_permission(0, &sctx, KeyPerm::update(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
1011 assert!(v1.includes(v2)); in key_perm_set_include_subset_test()
1012 assert!(!v2.includes(v1)); in key_perm_set_include_subset_test()
1030 assert!(v1.includes(v2)); in key_perm_set_include_equal_test()
1031 assert!(v2.includes(v1)); in key_perm_set_include_equal_test()
1051 assert!(!v1.includes(v2)); in key_perm_set_include_overlap_test()
1052 assert!(!v2.includes(v1)); in key_perm_set_include_overlap_test()
1063 assert!(!v1.includes(v2)); in key_perm_set_include_no_overlap_test()
1064 assert!(!v2.includes(v1)); in key_perm_set_include_no_overlap_test()