/system/security/keystore/ |
D | test-keystore | 34 function expect() { function 72 expect "1 No error" 80 expect "6 Permission denied" 84 expect "3 Uninitialized" 89 expect "1 No error" 91 expect "-rw------- keystore keystore 84 .masterkey" 95 expect "1 No error" 99 expect "5 Protocol error" 103 expect "1 No error" 107 expect "1 No error" [all …]
|
/system/security/keystore2/legacykeystore/ |
D | lib.rs | 418 let state = shelf.get_downcast_mut::<AsyncState>().expect("Failed to get shelf."); in do_serialized() 419 sender.send(f(state)).expect("Failed to send result."); in do_serialized() 569 let test_dir = TempDir::new("entrydb_test_").expect("Failed to create temp dir."); in test_entry_db() 571 .expect("Failed to open database."); in test_entry_db() 574 db.put(2, "test1", TEST_BLOB1).expect("Failed to insert test1."); in test_entry_db() 575 db.put(2, "test2", TEST_BLOB2).expect("Failed to insert test2."); in test_entry_db() 576 db.put(2, "test3", TEST_BLOB3).expect("Failed to insert test3."); in test_entry_db() 581 db.list(2).expect("Failed to list entries.") in test_entry_db() 585 assert_eq!(Vec::<String>::new(), db.list(1).expect("Failed to list entries.")); in test_entry_db() 588 assert_eq!(Some(TEST_BLOB1), db.get(2, "test1").expect("Failed to get entry.").as_deref()); in test_entry_db() [all …]
|
/system/keymint/ta/src/ |
D | tests.rs | 219 let result = split_rsp(&rsp, 20).expect("result should not be error"); in test_split_rsp_smaller_input() 221 let inner_msg = result.get(0).expect("single message is expected").as_slice(); in test_split_rsp_smaller_input() 233 let result = split_rsp(&rsp, 6).expect("result should not be error"); in test_split_rsp_allowed_size_input() 235 let inner_msg = result.get(0).expect("single message is expected").as_slice(); in test_split_rsp_allowed_size_input() 247 let result = split_rsp(&rsp, 6).expect("result should not be error"); in test_split_rsp_max_size_input() 250 let inner_msg1 = result.get(0).expect("a message is expected at index 0").as_slice(); in test_split_rsp_max_size_input() 256 let inner_msg2 = result.get(1).expect("a message is expected at index 1").as_slice(); in test_split_rsp_max_size_input() 273 let result = split_rsp(&rsp, 6).expect("result should not be error"); in test_split_rsp_larger_input_perfect_split() 276 let inner_msg1 = result.get(0).expect("a message is expected at index 0").as_slice(); in test_split_rsp_larger_input_perfect_split() 283 let inner_msg2 = result.get(1).expect("a message is expected at index 1").as_slice(); in test_split_rsp_larger_input_perfect_split() [all …]
|
/system/unwinding/libunwindstack/tests/ |
D | MemoryCacheTest.cpp | 83 std::vector<uint8_t> expect(16, 0xab); in TEST_F() local 84 expect.resize(32, 0xde); in TEST_F() 88 ASSERT_EQ(expect, buffer); in TEST_F() 94 ASSERT_EQ(expect, buffer); in TEST_F() 127 std::vector<uint8_t> expect(16, 0xde); in TEST_F() local 128 expect.resize(32, 0x50); in TEST_F() 132 ASSERT_EQ(expect, buffer); in TEST_F() 137 expect.resize(16); in TEST_F() 138 expect.resize(32, 0xff); in TEST_F() 139 ASSERT_EQ(expect, buffer); in TEST_F()
|
D | MemoryThreadCacheTest.cpp | 84 std::vector<uint8_t> expect(16, 0xab); in TEST_F() local 85 expect.resize(32, 0xde); in TEST_F() 89 ASSERT_EQ(expect, buffer); in TEST_F() 95 ASSERT_EQ(expect, buffer); in TEST_F() 128 std::vector<uint8_t> expect(16, 0xde); in TEST_F() local 129 expect.resize(32, 0x50); in TEST_F() 133 ASSERT_EQ(expect, buffer); in TEST_F() 138 expect.resize(16); in TEST_F() 139 expect.resize(32, 0xff); in TEST_F() 140 ASSERT_EQ(expect, buffer); in TEST_F()
|
/system/security/keystore2/test_utils/ |
D | run_as.rs | 41 setgid(gid).expect("Failed to set GID. This test might need more privileges."); in transition() 42 setuid(uid).expect("Failed to set UID. This test might need more privileges."); in transition() 45 .expect("Failed to set SELinux context. This test might need more privileges."); in transition() 62 close(self.0).expect("Failed to close reader pipe fd."); in drop() 73 close(self.0).expect("Failed to close writer pipe fd."); in drop() 97 .expect("In ChannelWriter::send: Failed to serialize to vector."); in send() 99 match self.0.write(&size).expect("In ChannelWriter::send: Failed to write serialized size.") in send() 112 .expect("In ChannelWriter::send: Failed to write serialized data.") in send() 134 match self.0.read(&mut size_buffer).expect("In ChannelReader::recv: Failed to read size.") { in recv() 145 .expect("In ChannelReader::recv: Failed to read serialized data.") in recv() [all …]
|
/system/security/keystore2/tests/ |
D | keystore2_client_key_id_domain_tests.rs | 68 .expect("Failed to generate a EC key."); in keystore2_find_key_with_key_id_as_domain() 78 .expect("Error in getKeyEntry to load a key with domain KEY_ID."); in keystore2_find_key_with_key_id_as_domain() 96 .expect("Error in creation of operation."); in keystore2_find_key_with_key_id_as_domain() 125 .expect("Failed to generate a EC key."); in keystore2_key_id_alias_rebind_verify_by_alias() 137 .expect("Failed to generate a rebound EC key."); in keystore2_key_id_alias_rebind_verify_by_alias() 163 .expect("Error in creation of operation using rebound key."); in keystore2_key_id_alias_rebind_verify_by_alias() 192 .expect("Failed to generate a EC key."); in keystore2_key_id_alias_rebind_verify_by_key_id() 202 .expect("Error in getKeyEntry to load a key with domain KEY_ID."); in keystore2_key_id_alias_rebind_verify_by_key_id() 220 .expect("Failed to generate a rebound EC key."); in keystore2_key_id_alias_rebind_verify_by_key_id() 248 .expect("Error in creation of operation using rebound key."); in keystore2_key_id_alias_rebind_verify_by_key_id()
|
D | keystore2_client_attest_key_tests.rs | 55 validate_certchain(&cert_chain).expect("Error while validating cert chain."); in keystore2_attest_rsa_signing_key_success() 81 validate_certchain(&cert_chain).expect("Error while validating cert chain"); in keystore2_attest_rsa_signing_key_success() 103 validate_certchain(&cert_chain).expect("Error while validating cert chain."); in keystore2_attest_rsa_encrypt_key_success() 130 validate_certchain(&cert_chain).expect("Error while validating cert chain."); in keystore2_attest_rsa_encrypt_key_success() 152 validate_certchain(&cert_chain).expect("Error while validating cert chain."); in keystore2_attest_ec_key_success() 169 validate_certchain(&cert_chain).expect("Error while validating cert chain."); in keystore2_attest_ec_key_success() 196 validate_certchain(&cert_chain).expect("Error while validating cert chain."); in keystore2_attest_rsa_signing_key_with_ec_25519_key_success() 222 validate_certchain(&cert_chain).expect("Error while validating cert chain"); in keystore2_attest_rsa_signing_key_with_ec_25519_key_success() 323 validate_certchain(&cert_chain).expect("Error while validating cert chain."); in keystore2_attest_key_fails_missing_challenge() 453 validate_certchain(&cert_chain).expect("Error while validating cert chain."); in keystore2_attest_symmetric_key_fail_sys_error()
|
D | keystore2_client_update_subcomponent_tests.rs | 51 .expect("updateSubcomponent should have succeeded."); in keystore2_update_subcomponent_success() 122 .expect("updateSubcomponent should have succeeded."); in keystore2_update_subcomponent_no_key_entry_cert_chain_success() 259 .expect("updateSubcomponent should have succeeded."); in keystore2_update_subcomponent_fails_permission_denied()
|
/system/core/trusty/libtrusty-rs/tests/ |
D | test.rs | 8 .expect("Failed to connect to Trusty service"); in recv_no_alloc() 32 .expect("Failed to connect to Trusty service"); in recv_small_buf() 55 .expect("Failed to connect to Trusty service"); in recv_empty_vec() 72 .expect("Failed to connect to Trusty service"); in recv_vec_existing_capacity()
|
/system/core/debuggerd/rust/tombstoned_client/src/ |
D | lib.rs | 139 .expect("Failed to connect to tombstoned."); in test() 145 .expect("No text output FD returned.") in test() 147 .expect("Failed to write to text output FD."); in test() 151 .expect("Failed to notify completion."); in test()
|
/system/tools/aidl/tests/rust/ |
D | test_client.rs | 62 .expect("did not get binder service") in get_test_service() 197 String::from_utf16(&[0xD801, 0xDC37, 0x20AC]).expect("error converting string"), in test_repeat_string() 281 .expect("error converting string") 290 let got = service.GetOtherTestService(NAME).expect("error calling GetOtherTestService"); in test_binder_exchange() 299 let got = service.GetInterfaceArray(&names).expect("error calling GetInterfaceArray"); in test_binder_array_exchange() 310 .expect("error calling GetNullableInterfaceArray"); in test_binder_nullable_array_exchange() 314 .map(|opt_s| opt_s.as_ref().map(|s| s.GetName().expect("error calling GetName"))) in test_binder_nullable_array_exchange() 328 let got = service.GetInterfaceList(Some(&names)).expect("error calling GetInterfaceList"); in test_interface_list_exchange() 332 .map(|opt_s| opt_s.as_ref().map(|s| s.GetName().expect("error calling GetName"))) in test_interface_list_exchange() 364 .expect("error calling RepeatParcelFileDescriptor"); in test_parcel_file_descriptor() [all …]
|
/system/core/fastboot/fuzzy_fastboot/ |
D | extensions.cpp | 170 const std::string expect = XMLAttribute(test, "expect", "okay"); in ExtractPacked() local 174 XMLAssert(CMD_EXPECTS.find(expect) != CMD_EXPECTS.end(), test, in ExtractPacked() 178 packed_test.expect = CMD_EXPECTS.at(expect); in ExtractPacked() 180 if (packed_test.expect == OKAY && in ExtractPacked() 239 const std::string expect = XMLAttribute(test, "expect"); in ExtractOem() local 241 if (XMLAssert(CMD_EXPECTS.find(expect) != CMD_EXPECTS.end(), test, in ExtractOem() 244 ctest.expect = CMD_EXPECTS.at(expect); in ExtractOem() 246 if (expect == "okay" && ctest.regex_str.size()) { in ExtractOem()
|
D | extensions.h | 79 Expect expect; // Does it have slots member 86 << "expect=" << EXPECTS_STR.at(pinfo.expect) 102 Expect expect; member
|
D | README.md | 118 <!-- We list tests, expect defaults to 'okay' --> 120 <test packed="bootloader_garbage.img" expect="fail"/> 138 … images should be the name of the real partition it is flashed to. | Required if expect != "fail" | 139 | expect | "okay" or "fail" | If uploading a invalid or garbage image the bootloader should reject … 161 <test value="now" expect="okay"/> 163 <test value="yesterday" expect="fail" /> 168 <test value="use_staged" expect="okay" input="test_image.img" /> 170 <test value="send_response" expect="fail" validate="python validator.py"/> 182 | expect | "okay" or "fail" | Whether the bootloader should acce… 233 <!-- We list tests, expect defaults to 'okay' --> [all …]
|
/system/core/libutils/ |
D | Unicode_test.cpp | 42 std::initializer_list<char16_t> expect, in TestUTF8toUTF16() argument 48 const size_t inlen = input.size(), outlen = expect.size(); in TestUTF8toUTF16() 57 EXPECT_EQ(std::data(expect)[i], output[i]); in TestUTF8toUTF16() 63 std::initializer_list<char> expect, in TestUTF16toUTF8() argument 69 const size_t inlen = input.size(), outlen = expect.size(); in TestUTF16toUTF8() 78 EXPECT_EQ(std::data(expect)[i], output[i]); in TestUTF16toUTF8()
|
/system/security/keystore2/src/ |
D | keystore2_main.rs | 64 args.next().expect("That's odd. How is there not even a first argument?"); in main() 72 .expect("Error setting sqlite log callback."); in main() 83 *keystore2::globals::DB_PATH.write().expect("Could not lock DB_PATH.") = in main() 124 &keystore2::globals::DB_PATH.read().expect("Could not get DB_PATH."), in main()
|
D | operation.rs | 255 last_usage: *self.last_usage.lock().expect("In get_pruning_info."), in get_pruning_info() 281 if *self.last_usage.lock().expect("In Operation::prune()") != last_usage { in prune() 321 let guard = self.outcome.lock().expect("In check_active."); in check_active() 345 *self.last_usage.lock().expect("In touch.") = Instant::now(); in touch() 456 let guard = self.outcome.lock().expect("In drop."); in drop() 502 let mut operations = self.operations.lock().expect("In create_operation."); in create_operation() 539 self.operations.lock().expect("In OperationDb::get.").get(index).and_then(|op| op.upgrade()) in get() 626 .expect("In OperationDb::prune: Trying to lock self.operations.") in prune() 681 *owners.get(&owner).expect( in prune()
|
D | entropy.rs | 84 let data = get_entropy(*size).expect("failed to get entropy"); in test_entropy_size() 93 let data = get_entropy(16).expect("failed to get entropy"); in test_entropy_uniqueness()
|
D | globals.rs | 61 let db_path = DB_PATH.read().expect("Could not get the database directory."); in create_thread_local_db() 63 let mut db = KeystoreDB::new(&db_path, Some(GC.clone())).expect("Failed to open database."); in create_thread_local_db() 69 let n = db.cleanup_leftovers().expect("Failed to cleanup database on startup."); in create_thread_local_db() 154 &DB_PATH.read().expect("Could not get the database path for legacy blob loader."))); 169 KeystoreDB::new(&DB_PATH.read().expect("Could not get the database directory."), None) 170 .expect("Failed to open database."),
|
D | id_rotation.rs | 87 .expect("Failed to create temp dir."); in test_had_factory_reset_since_id_rotation() 110 mtime.checked_sub(ID_ROTATION_PERIOD).expect("Failed to subtract id rotation period"); in test_had_factory_reset_since_id_rotation()
|
/system/keymint/tests/src/bin/ |
D | auth-keyblob-parse.rs | 89 .expect("characteristics missing algorithm"); in process() 104 des::Key(raw_key.try_into().expect("Incorrect length for 3DES key")).into(), in process() 108 let curve_val = tag::get_ec_curve(&combined).expect("characteristics missing EC curve"); in process() 131 let key = raw_key.try_into().expect("curve25519 key of wrong size"); in process()
|
/system/core/libstats/pull_rust/ |
D | stats_pull.rs | 77 additive_fields.len().try_into().expect("Cannot convert length to i32"), in set_additive_fields() 89 .expect("Cannot convert num additive fields to usize"); in get_additive_fields()
|
/system/update_engine/init/ |
D | update-engine.conf | 31 expect fork
|
/system/tools/aidl/tests/java/src/android/aidl/tests/ |
D | TestVersionedInterface.java | 63 expectedException.expect(RemoteException.class); in testUnimplementedMethodTriggersException() 76 expectedException.expect(IllegalArgumentException.class); in testUnknownUnionFieldTriggersException()
|