Home
last modified time | relevance | path

Searched refs:Session (Results 1 – 6 of 6) sorted by relevance

/trusty/user/base/lib/storage/rust/src/
Dtest.rs1 use crate::{Error, ErrorCode, FileState, OpenMode, Port, Session};
7 let session = Session::new(Port::TamperDetectEarlyAccess, true).unwrap(); in connect()
15 let session = Session::new(Port::TamperDetectEarlyAccess, false).unwrap(); in connect_no_wait()
24 let result = Session::new(Port::TestPortNonExistent, false); in connect_fail_no_wait()
31 let mut session = Session::new(Port::TamperDetectEarlyAccess, true).unwrap(); in read_write()
52 let mut session = Session::new(Port::TamperDetectEarlyAccess, true).unwrap(); in read_all_buf_too_small()
72 let mut session = Session::new(Port::TamperDetectEarlyAccess, true).unwrap(); in read_at()
104 let mut session = Session::new(Port::TamperDetectEarlyAccess, true).unwrap(); in write_at()
146 let mut session = Session::new(Port::TamperDetectEarlyAccess, true).unwrap(); in get_set_size()
180 let mut session = Session::new(Port::TamperDetectEarlyAccess, true).unwrap(); in rename_delete()
[all …]
Dtransaction.rs1 use crate::{sys, DirIter, Error, OpenMode, SecureFile, Session};
15 pub(crate) session: &'s mut Session,
Dlib.rs170 pub struct Session { struct
174 impl Session { impl
630 impl Drop for Session { implementation
910 fn new(session: &mut Session) -> Result<Self, Error> { in new()
/trusty/user/app/secretkeeper/
Dstore.rs26 use storage::{OpenMode, Port, Session};
53 fn create_session() -> Result<Session, Error> { in create_session()
58 Session::new(Port::TamperDetect, /* wait_for_port= */ true) in create_session()
/trusty/user/app/keymint/
Dsecure_storage_manager.rs32 use storage::{OpenMode, Port, SecureFile, Session};
64 session: Option<Session>,
71 let mut session = Session::new(Port::TamperProof, true).map_err(|e| { in new()
283 let mut session = Session::new(Port::TamperProof, true).map_err(|e| { in delete_attestation_ids()
294 let mut session = Session::new(Port::TamperProof, true).map_err(|e| { in get_file_contents()
502 Session::new(Port::TamperProof, true).expect("Couldn't connect to storage"); in delete_key_file()
508 Session::new(Port::TamperProof, true).expect("Couldn't connect to storage"); in check_key_file_exists()
515 Session::new(Port::TamperProof, true).expect("Couldn't connect to storage"); in delete_attestation_id_file()
521 Session::new(Port::TamperProof, true).expect("Couldn't connect to storage"); in check_attestation_id_file_exists()
Dsecure_deletion_secret_manager.rs26 use storage::{self as storage_session, OpenMode, Port, SecureFile, Session, Transaction};
81 fn get_secure_deletion_secret_file_session(wait_on_port: bool) -> Result<Session, Error> { in get_secure_deletion_secret_file_session() argument
82 let session = Session::new(Port::TamperProof, wait_on_port).map_err(|e| { in get_secure_deletion_secret_file_session()
119 fn open_or_create(session: &'a mut Session) -> Result<SecureDeletionSecretFile<'a>, Error> { in open_or_create()
291 session: Option<&'a mut Session>, in get_factory_reset_secret_impl() argument
675 Session::new(Port::TamperProof, true).expect("Couldn't connect to storage"); in secret_manager_file_exists()