/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/key_manager_test/ |
H A D | key_manager_test.cpp | 1139 …EXPECT_TRUE(KeyManager::GetInstance()->userEl2Key_.find(user) == KeyManager::GetInstance()->userEl… 1146 …EXPECT_TRUE(KeyManager::GetInstance()->userEl2Key_.find(user) == KeyManager::GetInstance()->userEl… 1147 …EXPECT_TRUE(KeyManager::GetInstance()->userEl3Key_.find(user) == KeyManager::GetInstance()->userEl… 1172 …EXPECT_TRUE(KeyManager::GetInstance()->userEl2Key_.find(user) == KeyManager::GetInstance()->userEl… 1173 …EXPECT_TRUE(KeyManager::GetInstance()->userEl3Key_.find(user) == KeyManager::GetInstance()->userEl… 1174 …EXPECT_TRUE(KeyManager::GetInstance()->userEl4Key_.find(user) == KeyManager::GetInstance()->userEl… 1175 …EXPECT_TRUE(KeyManager::GetInstance()->userEl5Key_.find(user) == KeyManager::GetInstance()->userEl… 1186 …EXPECT_TRUE(KeyManager::GetInstance()->userEl2Key_.find(user) == KeyManager::GetInstance()->userEl… 1187 …EXPECT_TRUE(KeyManager::GetInstance()->userEl3Key_.find(user) == KeyManager::GetInstance()->userEl… 1188 …EXPECT_TRUE(KeyManager::GetInstance()->userEl4Key_.find(user) == KeyManager::GetInstance()->userEl… [all …]
|
H A D | key_manager_sup_test.cpp | 104 EXPECT_EQ(KeyManager::GetInstance()->GetFileEncryptStatus(userId, isEncrypted), E_OK); 110 EXPECT_EQ(KeyManager::GetInstance()->GetFileEncryptStatus(userId, isEncrypted), E_OK); 114 EXPECT_EQ(KeyManager::GetInstance()->GetFileEncryptStatus(userId, isEncrypted, true), E_OK); 118 EXPECT_EQ(KeyManager::GetInstance()->GetFileEncryptStatus(userId, isEncrypted, true), E_OK); 139 EXPECT_EQ(KeyManager::GetInstance()->GenerateAppkey(user, 100, keyId), -ENOTSUP); 149 EXPECT_EQ(KeyManager::GetInstance()->GenerateAppkey(user, 100, keyId), -ENOENT); 154 EXPECT_EQ(KeyManager::GetInstance()->GenerateAppkey(user, 100, keyId), -EFAULT); 159 EXPECT_EQ(KeyManager::GetInstance()->GenerateAppkey(user, 100, keyId), 0); 188 EXPECT_EQ(KeyManager::GetInstance()->GenerateAppkey(user, 100, keyId), -ENOENT); 193 EXPECT_EQ(KeyManager::GetInstance()->GenerateAppkey(user, 100, keyId), -EFAULT); [all …]
|
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/ |
H A D | key_manager_mock.cpp | 22 int32_t KeyManager::InitGlobalDeviceKey(void) in InitGlobalDeviceKey() 27 int32_t KeyManager::InitGlobalUserKeys(void) in InitGlobalUserKeys() 32 int32_t KeyManager::GenerateUserKeys(unsigned int user, uint32_t flags) in GenerateUserKeys() 37 int32_t KeyManager::DeleteUserKeys(unsigned int user) in DeleteUserKeys() 52 int32_t KeyManager::InActiveUserKey(unsigned int user) in InActiveUserKey() 57 int32_t KeyManager::LockUserScreen(uint32_t user) in LockUserScreen() 78 int32_t KeyManager::DeleteAppkey(uint32_t userId, const std::string keyId) in DeleteAppkey() 88 int32_t KeyManager::SetDirectoryElPolicy(unsigned int user, KeyType type, in SetDirectoryElPolicy() 94 int32_t KeyManager::UpdateKeyContext(uint32_t userId) in UpdateKeyContext() 99 int KeyManager::GenerateUserKeyByType(unsigned int user, KeyType type, in GenerateUserKeyByType() [all …]
|
H A D | crypto_key_test.cpp | 892 KeyManager::GetInstance()->InitGlobalDeviceKey(); 893 KeyManager::GetInstance()->InitGlobalUserKeys(); 906 EXPECT_EQ(0, KeyManager::GetInstance()->UpdateKeyContext(userId)); 912 EXPECT_EQ(0, KeyManager::GetInstance()->DeleteUserKeys(userId)); 916 KeyManager::GetInstance()->InitGlobalDeviceKey(); 917 KeyManager::GetInstance()->InitGlobalUserKeys(); 941 KeyManager::GetInstance()->InitGlobalDeviceKey(); 942 KeyManager::GetInstance()->InitGlobalUserKeys(); 948 KeyManager::GetInstance()->InitGlobalDeviceKey(); 949 KeyManager::GetInstance()->InitGlobalUserKeys(); [all …]
|
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/ |
H A D | key_manager.cpp | 149 int KeyManager::InitGlobalDeviceKey(void) in InitGlobalDeviceKey() 392 int KeyManager::LoadAllUsersEl1Key(void) in LoadAllUsersEl1Key() 423 int KeyManager::InitUserElkeyStorageDir(void) in InitUserElkeyStorageDir() 468 int KeyManager::InitGlobalUserKeys(void) in InitGlobalUserKeys() 753 int KeyManager::DeleteUserKeys(unsigned int user) in DeleteUserKeys() 1317 int32_t KeyManager::UnlockEceSece(uint32_t user, in UpdateCeEceSeceUserAuth() 1340 int32_t KeyManager::UnlockUece(uint32_t user, in UpdateCeEceSeceUserAuth() 1511 int KeyManager::LockUserScreen(uint32_t user) in UpdateCeEceSeceUserAuth() 1650 int KeyManager::UpdateKeyContext(uint32_t userId) in UpdateCeEceSeceUserAuth() 1684 bool KeyManager::IsUeceSupport() in UpdateCeEceSeceUserAuth() [all …]
|
H A D | app_clone_key_manager.cpp | 42 int ret = KeyManager::GetInstance()->ActiveCeSceSeceUserKey(userId, EL2_KEY, {}, {}); in ActiveAppCloneUserKey() 48 ret = KeyManager::GetInstance()->ActiveCeSceSeceUserKey(userId, EL3_KEY, {}, {}); in ActiveAppCloneUserKey() 54 ret = KeyManager::GetInstance()->ActiveCeSceSeceUserKey(userId, EL4_KEY, {}, {}); in ActiveAppCloneUserKey()
|
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/user/test/ |
H A D | user_manager_test.cpp | 176 auto ret = KeyManager::GetInstance()->GenerateUserKeys(StorageTest::USER_ID5, flags); 182 KeyManager::GetInstance()->DeleteUserKeys(StorageTest::USER_ID5); 201 auto ret = KeyManager::GetInstance()->GenerateUserKeys(StorageTest::USER_ID3, flags); 209 KeyManager::GetInstance()->DeleteUserKeys(StorageTest::USER_ID3); 246 auto ret = KeyManager::GetInstance()->GenerateUserKeys(StorageTest::USER_ID4, flags); 253 KeyManager::GetInstance()->DeleteUserKeys(StorageTest::USER_ID4); 290 auto ret = KeyManager::GetInstance()->GenerateUserKeys(StorageTest::USER_ID4, flags); 299 KeyManager::GetInstance()->DeleteUserKeys(StorageTest::USER_ID4); 317 auto ret = KeyManager::GetInstance()->GenerateUserKeys(StorageTest::USER_ID3, flags); 326 KeyManager::GetInstance()->DeleteUserKeys(StorageTest::USER_ID3);
|
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/ipc/src/ |
H A D | storage_daemon.cpp | 238 ret = KeyManager::GetInstance()->RestoreUserKey(userId, type); in RestoreOneUserKey() 299 int32_t ret = KeyManager::GetInstance()->GenerateUserKeys(userId, flags); in PrepareUserDirs() 330 destroyUserRet = KeyManager::GetInstance()->DeleteUserKeys(userId); in DestroyUserDirs() 381 int ret = KeyManager::GetInstance()->InitGlobalDeviceKey(); in InitGlobalKey() 420 int ret = KeyManager::GetInstance()->InitGlobalUserKeys(); in InitGlobalUserKeys() 472 int32_t ret = KeyManager::GetInstance()->DeleteUserKeys(userId); in DeleteUserKeys() 741 ret = KeyManager::GetInstance()->UnlockUserAppKeys(userId, true); in ActiveUserKey() 785 int32_t ret = KeyManager::GetInstance()->InActiveUserKey(userId); in InactiveUserKey() 808 int32_t ret = KeyManager::GetInstance()->LockUserScreen(userId); in LockUserScreen() 874 return KeyManager::GetInstance()->DeleteAppkey(userId, keyId); in DeleteAppkey() [all …]
|
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/include/crypto/ |
H A D | key_manager.h | 50 class KeyManager { 52 static KeyManager *GetInstance(void) in GetInstance() 54 static KeyManager instance; in GetInstance() 106 KeyManager() in KeyManager() function 110 ~KeyManager() {} in ~KeyManager()
|
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/user/src/ |
H A D | user_manager.cpp | 285 if (KeyManager::GetInstance()->SetDirectoryElPolicy(userId, EL_DIR_MAP[level], list)) { in SetElDirFscryptPolicy()
|
H A D | mount_manager.cpp | 991 int ret = KeyManager::GetInstance()->GetFileEncryptStatus(userId, isCeEncrypt); in MountByUser()
|