Searched refs:EL5_KEY (Results 1 - 5 of 5) sorted by relevance
/foundation/filemanagement/storage_service/services/common/include/ |
H A D | storage_service_constant.h | 75 EL5_KEY = 5, enumerator 82 {EL5, EL5_KEY},
|
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/ |
H A D | key_manager.cpp | 183 if (type == EL5_KEY) { in GenerateAndInstallUserKey() 228 std::string keyDir = GetKeyDirByUserAndType(userId, EL5_KEY); in GenerateAndInstallEl5Key() 289 } else if (type == EL5_KEY) { in RestoreUserKey() 325 case EL5_KEY: in HasElkey() 541 ret = GenerateAndInstallUserKey(user, el5Path, NULL_KEY_AUTH, EL5_KEY); in GenerateElxAndInstallUserKey() 839 std::shared_ptr<BaseKey> el5Key = GetUserElKey(user, EL5_KEY); in UpdateESecret() 847 el5Key = GetUserElKey(user, EL5_KEY); in UpdateESecret() 953 if (ActiveCeSceSeceUserKey(user, EL5_KEY, token, secret) != 0) { in UpdateCeEceSeceUserAuth() 981 case EL5_KEY: in UpdateCeEceSeceUserAuth() 1007 case EL5_KEY in UpdateCeEceSeceUserAuth() [all...] |
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/key_manager_test/ |
H A D | key_manager_test.cpp | 295 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL5_KEY, token, secret), -ENOENT); in HWTEST_F() 337 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL5_KEY, token, secret), -EFAULT); in HWTEST_F() 344 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL5_KEY, token, secret), -EFAULT); in HWTEST_F() 351 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL5_KEY, token, secret), 0); in HWTEST_F() 900 EXPECT_EQ(KeyManager::GetInstance()->RestoreUserKey(800, "/data/test", auth, EL5_KEY), 0); in HWTEST_F() 901 EXPECT_EQ(KeyManager::GetInstance()->HasElkey(800, EL5_KEY), true); in HWTEST_F() 920 EXPECT_EQ(KeyManager::GetInstance()->GetKeyDirByUserAndType(user, EL5_KEY), USER_EL5_DIR + "/" + to_string(user)); in HWTEST_F() 938 EXPECT_EQ(KeyManager::GetInstance()->GetKeyDirByType(EL5_KEY), USER_EL5_DIR); in HWTEST_F() 1075 EXPECT_EQ(KeyManager::GetInstance()->GetUserElKey(user, EL5_KEY), nullptr); in HWTEST_F() 1077 string keyDir = KeyManager::GetInstance()->GetKeyDirByUserAndType(user, EL5_KEY); in HWTEST_F() [all...] |
H A D | key_manager_sup_test.cpp | 276 KeyManager::GetInstance()->SaveUserElKey(user, EL5_KEY, tmpKey); in HWTEST_F() 528 string keyDir = KeyManager::GetInstance()->GetKeyDirByUserAndType(user, EL5_KEY); in HWTEST_F()
|
/foundation/filemanagement/storage_service/services/storage_daemon/ipc/src/ |
H A D | storage_daemon.cpp | 254 case EL5_KEY: in GetCryptoFlag() 281 case EL5_KEY: in GetNeedRestoreFilePathByType() 346 std::vector<KeyType> keyTypes = {EL1_KEY, EL2_KEY, EL3_KEY, EL4_KEY, EL5_KEY}; in RestoreUserKey() 894 ret = ActiveUserKeyAndPrepare(userId, EL5_KEY, token, secret); in ActiveUserKeyAndPrepareElX() 896 LOGE("ActiveUserKey fail, userId %{public}u, type %{public}u", userId, EL5_KEY); in ActiveUserKeyAndPrepareElX()
|
Completed in 8 milliseconds