/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/ |
H A D | app_clone_key_manager.cpp | 42 int ret = KeyManager::GetInstance()->ActiveCeSceSeceUserKey(userId, EL2_KEY, {}, {}); in ActiveAppCloneUserKey() 48 ret = KeyManager::GetInstance()->ActiveCeSceSeceUserKey(userId, EL3_KEY, {}, {}); in ActiveAppCloneUserKey() 54 ret = KeyManager::GetInstance()->ActiveCeSceSeceUserKey(userId, EL4_KEY, {}, {}); in ActiveAppCloneUserKey()
|
H A D | key_manager.cpp | 938 if (ActiveCeSceSeceUserKey(user, EL2_KEY, token, secret) != 0) { in UpdateCeEceSeceUserAuth() 942 if (ActiveCeSceSeceUserKey(user, EL3_KEY, token, secret) != 0) { in UpdateCeEceSeceUserAuth() 946 if (ActiveCeSceSeceUserKey(user, EL4_KEY, token, secret) != 0) { in UpdateCeEceSeceUserAuth() 950 if (ActiveCeSceSeceUserKey(user, EL5_KEY, token, secret) != 0) { in UpdateCeEceSeceUserAuth() 1089 int KeyManager::ActiveCeSceSeceUserKey(unsigned int user, in UpdateCeEceSeceUserAuth() function in OHOS::StorageDaemon::KeyManager
|
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/ |
H A D | key_manager_mock.cpp | 106 int KeyManager::ActiveCeSceSeceUserKey(unsigned int user, KeyType type, in ActiveCeSceSeceUserKey() function in OHOS::StorageDaemon::KeyManager
|
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/key_manager_test/ |
H A D | key_manager_test.cpp | 279 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL1_KEY, token, secret), 0); 284 EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL2_KEY, token, secret), 0); 289 …EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, type, token, secret), E_KEY_TYPE… 292 …EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL1_KEY, token, secret), -ENOENT… 295 …EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL5_KEY, token, secret), -ENOENT… 302 …EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL1_KEY, token, secret), -EOPNOT… 310 …EXPECT_EQ(KeyManager::GetInstance()->ActiveCeSceSeceUserKey(user, EL1_KEY, token, secret), -EFAULT…
|
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/include/crypto/ |
H A D | key_manager.h | 75 int ActiveCeSceSeceUserKey(unsigned int user, KeyType type, const std::vector<uint8_t> &token,
|
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/ipc/src/ |
H A D | storage_daemon.cpp | 533 ret = KeyManager::GetInstance()->ActiveCeSceSeceUserKey(userId, type, token, {'!'}); in PrepareUserDirsAndUpdateUserAuth() 644 int ret = KeyManager::GetInstance()->ActiveCeSceSeceUserKey(userId, type, token, secret); in ActiveUserKeyAndPrepare() 711 ret = KeyManager::GetInstance()->ActiveCeSceSeceUserKey(userId, EL2_KEY, token, secret); in ActiveUserKey()
|