Searched refs:Session (Results 1 – 6 of 6) sorted by relevance
/trusty/user/base/lib/storage/rust/src/ |
D | test.rs | 1 use crate::{Error, ErrorCode, FileState, OpenMode, Port, Session}; 7 let session = Session::new(Port::TamperDetectEarlyAccess, true).unwrap(); in connect() 15 let session = Session::new(Port::TamperDetectEarlyAccess, false).unwrap(); in connect_no_wait() 24 let result = Session::new(Port::TestPortNonExistent, false); in connect_fail_no_wait() 31 let mut session = Session::new(Port::TamperDetectEarlyAccess, true).unwrap(); in read_write() 52 let mut session = Session::new(Port::TamperDetectEarlyAccess, true).unwrap(); in read_all_buf_too_small() 72 let mut session = Session::new(Port::TamperDetectEarlyAccess, true).unwrap(); in read_at() 104 let mut session = Session::new(Port::TamperDetectEarlyAccess, true).unwrap(); in write_at() 146 let mut session = Session::new(Port::TamperDetectEarlyAccess, true).unwrap(); in get_set_size() 180 let mut session = Session::new(Port::TamperDetectEarlyAccess, true).unwrap(); in rename_delete() [all …]
|
D | transaction.rs | 1 use crate::{sys, DirIter, Error, OpenMode, SecureFile, Session}; 15 pub(crate) session: &'s mut Session,
|
D | lib.rs | 170 pub struct Session { struct 174 impl Session { impl 630 impl Drop for Session { implementation 910 fn new(session: &mut Session) -> Result<Self, Error> { in new()
|
/trusty/user/app/secretkeeper/ |
D | store.rs | 26 use storage::{OpenMode, Port, Session}; 53 fn create_session() -> Result<Session, Error> { in create_session() 58 Session::new(Port::TamperDetect, /* wait_for_port= */ true) in create_session()
|
/trusty/user/app/keymint/ |
D | secure_storage_manager.rs | 32 use storage::{OpenMode, Port, SecureFile, Session}; 64 session: Option<Session>, 71 let mut session = Session::new(Port::TamperProof, true).map_err(|e| { in new() 283 let mut session = Session::new(Port::TamperProof, true).map_err(|e| { in delete_attestation_ids() 294 let mut session = Session::new(Port::TamperProof, true).map_err(|e| { in get_file_contents() 502 Session::new(Port::TamperProof, true).expect("Couldn't connect to storage"); in delete_key_file() 508 Session::new(Port::TamperProof, true).expect("Couldn't connect to storage"); in check_key_file_exists() 515 Session::new(Port::TamperProof, true).expect("Couldn't connect to storage"); in delete_attestation_id_file() 521 Session::new(Port::TamperProof, true).expect("Couldn't connect to storage"); in check_attestation_id_file_exists()
|
D | secure_deletion_secret_manager.rs | 26 use storage::{self as storage_session, OpenMode, Port, SecureFile, Session, Transaction}; 81 fn get_secure_deletion_secret_file_session(wait_on_port: bool) -> Result<Session, Error> { in get_secure_deletion_secret_file_session() argument 82 let session = Session::new(Port::TamperProof, wait_on_port).map_err(|e| { in get_secure_deletion_secret_file_session() 119 fn open_or_create(session: &'a mut Session) -> Result<SecureDeletionSecretFile<'a>, Error> { in open_or_create() 291 session: Option<&'a mut Session>, in get_factory_reset_secret_impl() argument 675 Session::new(Port::TamperProof, true).expect("Couldn't connect to storage"); in secret_manager_file_exists()
|