Searched refs:EL4_KEY (Results 1 - 6 of 6) sorted by relevance
/foundation/filemanagement/storage_service/services/common/include/ |
H A D | storage_service_constant.h | 74 EL4_KEY = 4, enumerator 81 {EL4, EL4_KEY},
|
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/ |
H A D | app_clone_key_manager.cpp | 48 if (KeyManager::GetInstance()->ActiveCeSceSeceUserKey(userId, EL4_KEY, {}, {}) != 0) { in ActiveAppCloneUserKey()
|
H A D | key_manager.cpp | 207 } else if (type == EL4_KEY) { in GenerateAndInstallUserKey() 287 } else if (type == EL4_KEY) { in RestoreUserKey() 319 case EL4_KEY: in HasElkey() 535 ret = GenerateAndInstallUserKey(user, el4Path, NULL_KEY_AUTH, EL4_KEY); in GenerateElxAndInstallUserKey() 754 ret = UpdateCeEceSeceUserAuth(user, userTokenSecret, EL4_KEY, needGenerateShield); in UpdateUserAuth() 770 ret = UpdateCeEceSeceUserAuth(user, userTokenSecret, EL4_KEY); in UpdateUserAuth() 949 if (ActiveCeSceSeceUserKey(user, EL4_KEY, token, secret) != 0) { in UpdateCeEceSeceUserAuth() 978 case EL4_KEY: in UpdateCeEceSeceUserAuth() 1004 case EL4_KEY: in UpdateCeEceSeceUserAuth() 1029 case EL4_KEY in UpdateCeEceSeceUserAuth() [all...] |
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/key_manager_test/ |
H A D | key_manager_test.cpp | 789 EXPECT_EQ(KeyManager::GetInstance()->GenerateAndInstallUserKey(800, "/data/test", auth, EL4_KEY), 0); in HWTEST_F() 790 EXPECT_EQ(KeyManager::GetInstance()->HasElkey(800, EL4_KEY), true); in HWTEST_F() 890 EXPECT_EQ(KeyManager::GetInstance()->RestoreUserKey(800, "/data/test", auth, EL4_KEY), 0); in HWTEST_F() 891 EXPECT_EQ(KeyManager::GetInstance()->HasElkey(800, EL4_KEY), true); in HWTEST_F() 919 EXPECT_EQ(KeyManager::GetInstance()->GetKeyDirByUserAndType(user, EL4_KEY), USER_EL4_DIR + "/" + to_string(user)); in HWTEST_F() 937 EXPECT_EQ(KeyManager::GetInstance()->GetKeyDirByType(EL4_KEY), USER_EL4_DIR); in HWTEST_F() 1045 EXPECT_EQ(KeyManager::GetInstance()->GetUserElKey(user, EL4_KEY), nullptr); in HWTEST_F() 1047 string keyDir = KeyManager::GetInstance()->GetKeyDirByUserAndType(user, EL4_KEY); in HWTEST_F() 1051 EXPECT_EQ(KeyManager::GetInstance()->GetUserElKey(user, EL4_KEY), nullptr); in HWTEST_F() 1055 EXPECT_NE(KeyManager::GetInstance()->GetUserElKey(user, EL4_KEY), nullpt in HWTEST_F() [all...] |
H A D | key_manager_sup_test.cpp | 164 string keyDir = KeyManager::GetInstance()->GetKeyDirByUserAndType(user, EL4_KEY); in HWTEST_F() 205 string keyDir = KeyManager::GetInstance()->GetKeyDirByUserAndType(user, EL4_KEY); in HWTEST_F() 273 KeyManager::GetInstance()->SaveUserElKey(user, EL4_KEY, tmpKey); in HWTEST_F() 389 string keyDir = KeyManager::GetInstance()->GetKeyDirByUserAndType(user, EL4_KEY); in HWTEST_F()
|
/foundation/filemanagement/storage_service/services/storage_daemon/ipc/src/ |
H A D | storage_daemon.cpp | 251 case EL4_KEY: in GetCryptoFlag() 279 case EL4_KEY: in GetNeedRestoreFilePathByType() 330 if (type == EL4_KEY) { in RestoreOneUserKey() 346 std::vector<KeyType> keyTypes = {EL1_KEY, EL2_KEY, EL3_KEY, EL4_KEY, EL5_KEY}; in RestoreUserKey() 876 ret = ActiveUserKeyAndPrepare(userId, EL4_KEY, token, secret); in ActiveUserKeyAndPrepareElX() 878 LOGE("ActiveUserKey fail, userId %{public}u, type %{public}u", userId, EL4_KEY); in ActiveUserKeyAndPrepareElX() 951 LOGE("ActiveUserKey fail, userId %{public}u, type %{public}u", userId, EL4_KEY); in ActiveUserKey()
|
Completed in 8 milliseconds