Lines Matching refs:need
40 …-underlying-file-storage). We do not need to take any special precautions in the library design, a…
121 … if there was, it would not be practical). Therefore the transaction will need to modify some othe…
133 When the core starts, it needs to know about transaction(s) that need to be resumed. This informati…
157 …ction. It simplifies recovery in that the recovery process might not even need to know whether it'…
161 …attributes"` entry point, the driver design is easier: the driver doesn't need to protect the info…
180 For key destruction, we need to preserve the key file until after the key has been destroyed. There…
196 For key creation, we do not need to store the key's metadata until it has been created in the secur…
219 … the key exists in the secure element, then the transaction list does not need to include the driv…
221 For key creation, we need to store the key's metadata before creating in the secure element. Theref…
229 For key destruction, we need to contact the secure element before removing the key file. Therefore …
268 …tion on the secure element, storage modification (commit transaction). We need to test the followi…
283 …need to make some assumptions about the recovery step. For example, if we have confidence that rec…
295 …need to artificially construct a representative sample of system states that match the invariant. …
498 The storage invariant check cannot check all keys in storage, and does not need to (for example, it…