Lines Matching refs:None
290 KeystorePerm with default (None = 0, none) {
371 return None; in next()
541 None => { in check_key_permission()
704 let key = KeyDescriptor { domain: Domain::APP, nspace: 0, alias: None, blob: None }; in check_grant_permission_app()
725 alias: None, in check_grant_permission_selinux()
726 blob: None, in check_grant_permission_selinux()
741 let key = KeyDescriptor { domain: Domain::GRANT, nspace: 0, alias: None, blob: None }; in check_key_permission_domain_grant()
766 let key = KeyDescriptor { domain: Domain::APP, nspace: 0, alias: None, blob: None }; in check_key_permission_domain_app()
768 assert!(check_key_permission(0, &system_server_ctx, KeyPerm::use_(), &key, &None).is_ok()); in check_key_permission_domain_app()
769 … assert!(check_key_permission(0, &system_server_ctx, KeyPerm::delete(), &key, &None).is_ok()); in check_key_permission_domain_app()
771 check_key_permission(0, &system_server_ctx, KeyPerm::get_info(), &key, &None).is_ok() in check_key_permission_domain_app()
773 … assert!(check_key_permission(0, &system_server_ctx, KeyPerm::rebind(), &key, &None).is_ok()); in check_key_permission_domain_app()
774 … assert!(check_key_permission(0, &system_server_ctx, KeyPerm::update(), &key, &None).is_ok()); in check_key_permission_domain_app()
775 assert!(check_key_permission(0, &system_server_ctx, KeyPerm::grant(), &key, &None).is_ok()); in check_key_permission_domain_app()
777 check_key_permission(0, &system_server_ctx, KeyPerm::use_dev_id(), &key, &None).is_ok() in check_key_permission_domain_app()
780 check_key_permission(0, &gmscore_app, KeyPerm::gen_unique_id(), &key, &None).is_ok() in check_key_permission_domain_app()
783 assert!(check_key_permission(0, &shell_ctx, KeyPerm::use_(), &key, &None).is_ok()); in check_key_permission_domain_app()
784 assert!(check_key_permission(0, &shell_ctx, KeyPerm::delete(), &key, &None).is_ok()); in check_key_permission_domain_app()
785 assert!(check_key_permission(0, &shell_ctx, KeyPerm::get_info(), &key, &None).is_ok()); in check_key_permission_domain_app()
786 assert!(check_key_permission(0, &shell_ctx, KeyPerm::rebind(), &key, &None).is_ok()); in check_key_permission_domain_app()
787 assert!(check_key_permission(0, &shell_ctx, KeyPerm::update(), &key, &None).is_ok()); in check_key_permission_domain_app()
788 assert_perm_failed!(check_key_permission(0, &shell_ctx, KeyPerm::grant(), &key, &None)); in check_key_permission_domain_app()
794 &None in check_key_permission_domain_app()
801 &None in check_key_permission_domain_app()
808 &None in check_key_permission_domain_app()
815 &None in check_key_permission_domain_app()
824 &None in check_key_permission_domain_app()
853 alias: None, in check_key_permission_domain_selinux()
854 blob: None, in check_key_permission_domain_selinux()
858 assert!(check_key_permission(0, &sctx, KeyPerm::use_(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
859 assert!(check_key_permission(0, &sctx, KeyPerm::delete(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
860 assert!(check_key_permission(0, &sctx, KeyPerm::get_info(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
861 assert!(check_key_permission(0, &sctx, KeyPerm::rebind(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
862 assert!(check_key_permission(0, &sctx, KeyPerm::update(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
863 assert!(check_key_permission(0, &sctx, KeyPerm::grant(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
864 assert!(check_key_permission(0, &sctx, KeyPerm::manage_blob(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
865 assert!(check_key_permission(0, &sctx, KeyPerm::use_dev_id(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
866 assert!(check_key_permission(0, &sctx, KeyPerm::gen_unique_id(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
867 assert!(check_key_permission(0, &sctx, KeyPerm::req_forced_op(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
869 assert!(check_key_permission(0, &sctx, KeyPerm::use_(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
870 assert!(check_key_permission(0, &sctx, KeyPerm::delete(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
871 assert!(check_key_permission(0, &sctx, KeyPerm::get_info(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
872 assert!(check_key_permission(0, &sctx, KeyPerm::rebind(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
873 assert!(check_key_permission(0, &sctx, KeyPerm::update(), &key, &None).is_ok()); in check_key_permission_domain_selinux()
874 assert_perm_failed!(check_key_permission(0, &sctx, KeyPerm::grant(), &key, &None)); in check_key_permission_domain_selinux()
880 &None in check_key_permission_domain_selinux()
887 &None in check_key_permission_domain_selinux()
889 assert_perm_failed!(check_key_permission(0, &sctx, KeyPerm::use_dev_id(), &key, &None)); in check_key_permission_domain_selinux()
895 &None in check_key_permission_domain_selinux()
907 alias: None, in check_key_permission_domain_blob()
908 blob: None, in check_key_permission_domain_blob()
912 check_key_permission(0, &sctx, KeyPerm::use_(), &key, &None) in check_key_permission_domain_blob()
914 assert_perm_failed!(check_key_permission(0, &sctx, KeyPerm::use_(), &key, &None)); in check_key_permission_domain_blob()
921 let key = KeyDescriptor { domain: Domain::KEY_ID, nspace: 0, alias: None, blob: None }; in check_key_permission_domain_key_id()
930 &None in check_key_permission_domain_key_id()
965 assert_eq!(None, i.next()); in key_perm_set_all_test()
982 assert_eq!(None, i.next()); in key_perm_set_sparse_test()
988 assert_eq!(None, i.next()); in key_perm_set_empty_test()