Searched refs:EL1_KEY (Results 1 - 6 of 6) sorted by relevance
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/key_manager_test/ |
H A D | key_manager_test.cpp | 279 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL1_KEY, token, secret), 0); in HWTEST_F() 292 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL1_KEY, token, secret), -ENOENT); in HWTEST_F() 302 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL1_KEY, token, secret), -EOPNOTSUPP); in HWTEST_F() 310 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL1_KEY, token, secret), -EFAULT); in HWTEST_F() 406 EXPECT_EQ(KeyManager::GetInstance()->ActiveElXUserKey(user, token, EL1_KEY, secret, elKey), -EFAULT); in HWTEST_F() 410 EXPECT_EQ(KeyManager::GetInstance()->ActiveElXUserKey(user, token, EL1_KEY, secret, elKey), -EFAULT); in HWTEST_F() 464 KeyType type = EL1_KEY; in HWTEST_F() 517 KeyType type = EL1_KEY; in HWTEST_F() 646 KeyType type = EL1_KEY; in HWTEST_F() 653 type = EL1_KEY; in HWTEST_F() [all...] |
H A D | key_manager_sup_test.cpp | 264 KeyManager::GetInstance()->SaveUserElKey(user, EL1_KEY, tmpKey); in HWTEST_F()
|
/foundation/filemanagement/storage_service/services/common/include/ |
H A D | storage_service_constant.h | 71 EL1_KEY = 1, enumerator 78 {EL1, EL1_KEY},
|
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/ |
H A D | key_manager.cpp | 201 if (type == EL1_KEY) { in GenerateAndInstallUserKey() 281 if (type == EL1_KEY) { in RestoreUserKey() 301 case EL1_KEY: in HasElkey() 385 if (RestoreUserKey(item.userId, item.path, NULL_KEY_AUTH, EL1_KEY) != 0) { in LoadAllUsersEl1Key() 463 ret = RestoreUserKey(GLOBAL_USER_ID, globalUserEl1Path, NULL_KEY_AUTH, EL1_KEY); in InitGlobalUserKeys() 469 ret = GenerateAndInstallUserKey(GLOBAL_USER_ID, globalUserEl1Path, NULL_KEY_AUTH, EL1_KEY); in InitGlobalUserKeys() 517 int ret = GenerateAndInstallUserKey(user, el1Path, NULL_KEY_AUTH, EL1_KEY); in GenerateElxAndInstallUserKey() 559 int ret = GenerateIntegrityDirs(user, EL1_KEY); in CheckAndFixUserKeyDirectory() 572 std::string dirType = (type == EL1_KEY) ? EL1 : EL2; in GenerateIntegrityDirs() 574 uint32_t flag_type = (type == EL1_KEY) in GenerateIntegrityDirs() [all...] |
/foundation/filemanagement/storage_service/services/storage_daemon/ipc/src/ |
H A D | storage_daemon.cpp | 242 case EL1_KEY: in GetCryptoFlag() 273 case EL1_KEY: in GetNeedRestoreFilePathByType() 308 if (type != EL1_KEY) { in RestoreOneUserKey() 313 LOGE("RestoreUserKey EL1_KEY failed, error = %{public}d, userId %{public}u", ret, userId); in RestoreOneUserKey() 326 if (type != EL1_KEY) { in RestoreOneUserKey() 346 std::vector<KeyType> keyTypes = {EL1_KEY, EL2_KEY, EL3_KEY, EL4_KEY, EL5_KEY}; in RestoreUserKey() 505 std::string elNeedRestorePath = GetNeedRestoreFilePathByType(userId, EL1_KEY); in CompleteAddUser()
|
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/ |
H A D | crypto_key_test.cpp | 903 EXPECT_EQ(0, KeyManager::GetInstance()->SetDirectoryElPolicy(userId, EL1_KEY, {{userId, USER_EL1_DIR}})); in HWTEST_F() 951 EXPECT_EQ(-ENOENT, KeyManager::GetInstance()->SetDirectoryElPolicy(userId, EL1_KEY, {{userId, USER_EL1_DIR}})); in HWTEST_F()
|
Completed in 9 milliseconds