/foundation/filemanagement/storage_service/services/storage_daemon/include/crypto/ |
H A D | key_manager.h | 79 const std::vector<uint8_t> &secret); 81 const std::vector<uint8_t> &secret); 90 const std::vector<uint8_t> &secret); 97 const std::vector<uint8_t> &secret); 106 const std::vector<uint8_t> &secret); 109 const std::vector<uint8_t> &secret); 112 const std::vector<uint8_t> &secret); 141 const std::vector<uint8_t> &secret, std::shared_ptr<BaseKey> elKey); 144 const std::vector<uint8_t> &secret, std::shared_ptr<BaseKey> elKey); 151 bool UnlockEceSece(uint32_t user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret, in [all...] |
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/ |
H A D | key_manager.cpp | 235 saveESecretStatus[userId] = (!auth.secret.IsEmpty() && !auth.token.IsEmpty()); in GenerateAndInstallEl5Key() 237 if ((!auth.secret.IsEmpty() && !auth.token.IsEmpty()) && in GenerateAndInstallEl5Key() 618 const std::vector<uint8_t> &secret) in GenerateUserKeyByType() 638 if (!secret.empty() && !token.empty()) { in GenerateUserKeyByType() 642 UserAuth auth = { .token = token, .secret = secret, .secureUid = secureUid }; in GenerateUserKeyByType() 823 UserAuth userAuth = {.token = authToken, .secret = newSecret, .secureUid = secureUid}; in UpdateUseAuthWithRecoveryKey() 871 UserAuth auth = { .token = tokenSecret.token, .secret = tokenSecret.newSecret, .secureUid = tokenSecret.secureUid }; in UpdateESecret() 915 auth.secret = std::move(newSecret); in UpdateCeEceSeceUserAuth() 918 auth.secret in UpdateCeEceSeceUserAuth() 616 GenerateUserKeyByType(unsigned int user, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) GenerateUserKeyByType() argument 933 ActiveUserKey(unsigned int user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument 1092 ActiveCeSceSeceUserKey(unsigned int user, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument 1213 ActiveUeceUserKey(unsigned int user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret, std::shared_ptr<BaseKey> elKey) UpdateCeEceSeceUserAuth() argument 1237 ActiveElXUserKey(unsigned int user, const std::vector<uint8_t> &token, KeyType keyType, const std::vector<uint8_t> &secret, std::shared_ptr<BaseKey> elKey) UpdateCeEceSeceUserAuth() argument 1273 UnlockUserScreen(uint32_t user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument 1308 UnlockEceSece(uint32_t user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret, int &ret) UpdateCeEceSeceUserAuth() argument 1335 UnlockUece(uint32_t user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret, int &ret) UpdateCeEceSeceUserAuth() argument 1416 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument 1867 CheckUserPinProtect(unsigned int userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument 1880 TryToFixUserCeEceSeceKey(unsigned int userId, KeyType keyType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument 1915 TryToFixUeceKey(unsigned int userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UpdateCeEceSeceUserAuth() argument [all...] |
H A D | base_key.cpp | 246 if ((auth.token.IsEmpty() && auth.secret.IsEmpty()) || // OOBE首次开机 删除密码(ABC) in StoreKey() 461 if (auth.secret.IsEmpty()) { in StoreKey() 462 mUserAuth.secret = KeyBlob(NULL_SECRET); in StoreKey() 471 if (!OpensslCrypto::AESEncrypt(mUserAuth.secret, rndEnc, keyCtx)) { in StoreKey() 569 if (!auth.secret.IsEmpty() && FileExists(NEED_UPDATE_PATH)) { in StoreKey() 601 KeyContext ctxNone; // 1.设备级,用户el1 无token 无secret d in StoreKey() 628 if ((auth.secret.IsEmpty() && auth.token.IsEmpty()) || // 无密码Avtive 新增密码,用空密码解密(ABC) in StoreKey() 629 (!auth.secret.IsEmpty() && !auth.token.IsEmpty())) { // 有密码Avtive 修改密码,老密码解密(ABC) Pin码解锁(AB) in StoreKey() 652 // 人脸指纹场景 有token 无secret(AB) in StoreKey() 653 if (auth.secret in StoreKey() [all...] |
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/ |
H A D | key_manager_mock.cpp | 54 const std::vector<uint8_t> &secret) in ActiveUserKey() 70 const std::vector<uint8_t> &secret) in UnlockUserScreen() 96 const std::vector<uint8_t> &secret) in CreateRecoverKey() 119 const std::vector<uint8_t> &secret) in GenerateUserKeyByType() 126 const std::vector<uint8_t> &secret) in ActiveCeSceSeceUserKey() 53 ActiveUserKey(unsigned int user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 69 UnlockUserScreen(uint32_t user, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument 95 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument 117 GenerateUserKeyByType(unsigned int user, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) GenerateUserKeyByType() argument 124 ActiveCeSceSeceUserKey(unsigned int user, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveCeSceSeceUserKey() argument
|
/foundation/filemanagement/storage_service/services/storage_daemon/ipc/src/ |
H A D | storage_daemon.cpp | 708 const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) in PrepareUserDirsAndUpdateUserAuth() 729 UserTokenSecret userTokenSecret = { .token = token, .oldSecret = {'!'}, .newSecret = secret, in PrepareUserDirsAndUpdateUserAuth() 781 const std::vector<uint8_t> &secret) in GenerateKeyAndPrepareUserDirs() 788 ret = KeyManager::GetInstance()->GenerateUserKeyByType(userId, type, token, secret); in GenerateKeyAndPrepareUserDirs() 791 userId, type, secret.empty()); in GenerateKeyAndPrepareUserDirs() 807 userId, flags, secret.empty()); in GenerateKeyAndPrepareUserDirs() 818 const std::vector<uint8_t> &secret) in ActiveUserKeyAndPrepare() 822 int ret = KeyManager::GetInstance()->ActiveCeSceSeceUserKey(userId, type, token, secret); in ActiveUserKeyAndPrepare() 826 if ((!token.empty() || !secret.empty()) && std::filesystem::exists(elNeedRestorePath)) { in ActiveUserKeyAndPrepare() 828 ret = PrepareUserDirsAndUpdateUserAuth(userId, type, token, secret); in ActiveUserKeyAndPrepare() 707 PrepareUserDirsAndUpdateUserAuth(uint32_t userId, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) PrepareUserDirsAndUpdateUserAuth() argument 779 GenerateKeyAndPrepareUserDirs(uint32_t userId, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) GenerateKeyAndPrepareUserDirs() argument 816 ActiveUserKeyAndPrepare(uint32_t userId, KeyType type, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKeyAndPrepare() argument 853 ActiveUserKeyAndPrepareElX(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKeyAndPrepareElX() argument 916 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 1060 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument 1114 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument [all...] |
H A D | storage_daemon_stub.cpp | 499 std::vector<uint8_t> secret; in HandleActiveUserKey() local 501 data.ReadUInt8Vector(&secret); in HandleActiveUserKey() 503 int err = ActiveUserKey(userId, token, secret); in HandleActiveUserKey() 540 std::vector<uint8_t> secret; in HandleUnlockUserScreen() local 542 data.ReadUInt8Vector(&secret); in HandleUnlockUserScreen() 544 int err = UnlockUserScreen(userId, token, secret); in HandleUnlockUserScreen() 601 std::vector<uint8_t> secret; in HandleCreateRecoverKey() local 603 data.ReadUInt8Vector(&secret); in HandleCreateRecoverKey() 604 int err = CreateRecoverKey(userId, userType, token, secret); in HandleCreateRecoverKey()
|
/foundation/filemanagement/storage_service/test/fuzztest/storagemanagerproxy_fuzzer/ |
H A D | storagemanagerproxy_fuzzer.cpp | 41 std::vector<uint8_t> secret; in StorageManagerProxyFuzzTest() local 48 secret.push_back(*data); in StorageManagerProxyFuzzTest() 65 proxy->ActiveUserKey(metaData2, token, secret); in StorageManagerProxyFuzzTest() 67 proxy->UpdateUserAuth(metaData2, metaData4, token, secret, secret); in StorageManagerProxyFuzzTest()
|
/foundation/filemanagement/storage_service/services/storage_manager/include/crypto/ |
H A D | filesystem_crypto.h | 41 const std::vector<uint8_t> &secret); 47 const std::vector<uint8_t> &secret); 55 const std::vector<uint8_t> &secret);
|
/foundation/filemanagement/storage_service/services/storage_daemon/include/ipc/ |
H A D | storage_daemon.h | 69 const std::vector<uint8_t> &secret) override; 76 const std::vector<uint8_t> &secret) override; 83 const std::vector<uint8_t> &secret) override; 118 const std::vector<uint8_t> &secret); 127 const std::vector<uint8_t> &secret); 130 const std::vector<uint8_t> &secret); 133 const std::vector<uint8_t> &secret);
|
H A D | storage_daemon_proxy.h | 58 const std::vector<uint8_t> &secret) override; 65 const std::vector<uint8_t> &secret) override; 72 const std::vector<uint8_t> &secret) override;
|
H A D | istorage_daemon.h | 65 const std::vector<uint8_t> &secret) = 0; 72 const std::vector<uint8_t> &secret) = 0; 79 const std::vector<uint8_t> &secret) = 0;
|
/foundation/filemanagement/storage_service/services/storage_daemon/client/include/ |
H A D | storage_daemon_client.h | 54 const std::vector<uint8_t> &secret); 61 const std::vector<uint8_t> &secret); 73 const std::vector<uint8_t> &secret);
|
/foundation/filemanagement/storage_service/services/storage_manager/crypto/ |
H A D | filesystem_crypto.cpp | 112 const std::vector<uint8_t> &secret) in ActiveUserKey() 122 err = sdCommunication->ActiveUserKey(userId, token, secret); in ActiveUserKey() 155 const std::vector<uint8_t> &secret) in UnlockUserScreen() 165 return sdCommunication->UnlockUserScreen(userId, token, secret); in UnlockUserScreen() 230 const std::vector<uint8_t> &secret) in CreateRecoverKey() 240 return sdCommunication->CreateRecoverKey(userId, userType, token, secret); in CreateRecoverKey() 110 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 153 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument 227 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument
|
/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/key_manager_test/ |
H A D | key_manager_test.cpp | 260 const std::vector<uint8_t> secret = {1}; in HWTEST_F() local 262 EXPECT_EQ(KeyManager::GetInstance()->ActiveUserKey(user, token, secret), 0); in HWTEST_F() 277 std::vector<uint8_t> secret = {}; in HWTEST_F() local 279 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL1_KEY, token, secret), 0); in HWTEST_F() 284 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL2_KEY, token, secret), 0); in HWTEST_F() 289 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, type, token, secret), E_KEY_TYPE_INVAL); in HWTEST_F() 292 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL1_KEY, token, secret), -ENOENT); in HWTEST_F() 295 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL5_KEY, token, secret), -ENOENT); in HWTEST_F() 302 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL1_KEY, token, secret), -EOPNOTSUPP); in HWTEST_F() 310 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL1_KEY, token, secret), in HWTEST_F() 326 std::vector<uint8_t> secret = {}; HWTEST_F() local 402 const std::vector<uint8_t> secret = {}; HWTEST_F() local 425 const std::vector<uint8_t> secret = {}; HWTEST_F() local 1413 std::string secret = "bad_secret"; HWTEST_F() local 1455 std::string secret = "bad_secret"; HWTEST_F() local 1498 std::string secret = "bad_secret"; HWTEST_F() local 1689 std::string secret = "bad_secret"; HWTEST_F() local 1710 std::string secret = "bad_secret"; HWTEST_F() local [all...] |
H A D | key_manager_sup_test.cpp | 386 std::vector<uint8_t> secret; in HWTEST_F() local 391 EXPECT_EQ(KeyManager::GetInstance()->UnlockEceSece(user, token, secret, ret), false); in HWTEST_F() 398 EXPECT_EQ(KeyManager::GetInstance()->UnlockEceSece(user, token, secret, ret), false); in HWTEST_F() 404 EXPECT_EQ(KeyManager::GetInstance()->UnlockEceSece(user, token, secret, ret), false); in HWTEST_F() 410 EXPECT_EQ(KeyManager::GetInstance()->UnlockEceSece(user, token, secret, ret), true); in HWTEST_F() 416 EXPECT_EQ(KeyManager::GetInstance()->UnlockEceSece(user, token, secret, ret), false); in HWTEST_F() 526 std::vector<uint8_t> secret; in HWTEST_F() local 533 EXPECT_EQ(KeyManager::GetInstance()->UnlockUece(user, token, secret, ret), false); in HWTEST_F() 546 EXPECT_EQ(KeyManager::GetInstance()->UnlockUece(user, token, secret, ret), false); in HWTEST_F() 555 EXPECT_EQ(KeyManager::GetInstance()->UnlockUece(user, token, secret, re in HWTEST_F() [all...] |
/foundation/filemanagement/storage_service/services/storage_manager/client/ |
H A D | storage_manager_client.cpp | 117 const std::vector<uint8_t> &secret) in ActiveUserKey() 125 return client->ActiveUserKey(userId, token, secret); in ActiveUserKey() 163 const std::vector<uint8_t> &secret) in UnlockUserScreen() 171 return client->UnlockUserScreen(userId, token, secret); in UnlockUserScreen() 115 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 161 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument
|
/foundation/filemanagement/storage_service/services/storage_manager/include/client/ |
H A D | storage_manager_client.h | 42 const std::vector<uint8_t> &secret); 48 const std::vector<uint8_t> &secret);
|
/foundation/filemanagement/storage_service/services/storage_daemon/client/ |
H A D | storage_daemon_client.cpp | 296 const std::vector<uint8_t> &secret) in ActiveUserKey() 309 return client->ActiveUserKey(userId, token, secret); in ActiveUserKey() 345 const std::vector<uint8_t> &secret) in UnlockUserScreen() 358 return client->UnlockUserScreen(userId, token, secret); in UnlockUserScreen() 428 const std::vector<uint8_t> &secret) in CreateRecoverKey() 441 return client->CreateRecoverKey(userId, userType, token, secret); in CreateRecoverKey() 294 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 344 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument 425 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument
|
/foundation/filemanagement/storage_service/services/storage_daemon/ipc/test/ |
H A D | storage_daemon_service_mock.h | 147 const std::vector<uint8_t> &secret) override 164 const std::vector<uint8_t> &secret) override 187 const std::vector<uint8_t> &secret) override
|
/foundation/filemanagement/storage_service/services/storage_manager/include/mock/ |
H A D | storage_daemon_proxy_mock.h | 58 const std::vector<uint8_t> &secret) override; 65 const std::vector<uint8_t> &secret) override; 72 const std::vector<uint8_t> &secret) override;
|
/foundation/filemanagement/storage_service/services/storage_manager/include/storage_daemon_communication/ |
H A D | storage_daemon_communication.h | 59 const std::vector<uint8_t> &secret); 66 const std::vector<uint8_t> &secret); 74 const std::vector<uint8_t> &secret);
|
/foundation/filemanagement/storage_service/services/storage_manager/mock/ |
H A D | storage_daemon_proxy_mock.cpp | 123 const std::vector<uint8_t> &secret) in ActiveUserKey() 140 const std::vector<uint8_t> &secret) in UnlockUserScreen() 163 const std::vector<uint8_t> &secret) in CreateRecoverKey() 121 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 138 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument 160 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument
|
/foundation/filemanagement/storage_service/test/fuzztest/filesystemcrypto_fuzzer/ |
H A D | filesystemcrypto_fuzzer.cpp | 107 std::vector<uint8_t> secret; in ActiveUserKeyFuzzTest() local 109 secret.push_back(*data); in ActiveUserKeyFuzzTest() 111 int32_t result = fileSystem->ActiveUserKey(userId, token, secret); in ActiveUserKeyFuzzTest()
|
/foundation/filemanagement/storage_service/services/storage_manager/ipc/src/ |
H A D | storage_manager.cpp | 445 const std::vector<uint8_t> &secret) in ActiveUserKey() 450 int32_t err = fsCrypto->ActiveUserKey(userId, token, secret); in ActiveUserKey() 493 const std::vector<uint8_t> &secret) in UnlockUserScreen() 498 return fsCrypto->UnlockUserScreen(userId, token, secret); in UnlockUserScreen() 541 const std::vector<uint8_t> &secret) in CreateRecoverKey() 547 return fsCrypto->CreateRecoverKey(userId, userType, token, secret); in CreateRecoverKey() 443 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 491 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument 538 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument
|
/foundation/filemanagement/storage_service/services/storage_manager/storage_daemon_communication/src/ |
H A D | storage_daemon_communication.cpp | 310 const std::vector<uint8_t> &secret) in ActiveUserKey() 322 return storageDaemon_->ActiveUserKey(userId, token, secret); in ActiveUserKey() 372 const std::vector<uint8_t> &secret) in UnlockUserScreen() 384 return storageDaemon_->UnlockUserScreen(userId, token, secret); in UnlockUserScreen() 568 const std::vector<uint8_t> &secret) in CreateRecoverKey() 580 return storageDaemon_->CreateRecoverKey(userId, userType, token, secret); in CreateRecoverKey() 308 ActiveUserKey(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) ActiveUserKey() argument 370 UnlockUserScreen(uint32_t userId, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) UnlockUserScreen() argument 565 CreateRecoverKey(uint32_t userId, uint32_t userType, const std::vector<uint8_t> &token, const std::vector<uint8_t> &secret) CreateRecoverKey() argument
|