Home
last modified time | relevance | path

Searched refs:EL3_KEY (Results 1 – 5 of 5) sorted by relevance

/ohos5.0/foundation/filemanagement/storage_service/services/common/include/
H A Dstorage_service_constant.h74 EL3_KEY = 3, enumerator
81 {EL3, EL3_KEY},
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/crypto/src/
H A Dkey_manager.cpp221 } else if (type == EL3_KEY) { in GenerateAndInstallUserKey()
301 } else if (type == EL3_KEY) { in RestoreUserKey()
329 case EL3_KEY: in HasElkey()
972 case EL3_KEY: in UpdateCeEceSeceUserAuth()
998 case EL3_KEY: in UpdateCeEceSeceUserAuth()
1023 case EL3_KEY: in UpdateCeEceSeceUserAuth()
1068 case EL3_KEY: in UpdateCeEceSeceUserAuth()
1153 case EL3_KEY: in UpdateCeEceSeceUserAuth()
1596 if (type == EL3_KEY || type == EL4_KEY) { in UpdateCeEceSeceUserAuth()
1610 if (type == EL3_KEY) { in UpdateCeEceSeceUserAuth()
[all …]
H A Dapp_clone_key_manager.cpp48 ret = KeyManager::GetInstance()->ActiveCeSceSeceUserKey(userId, EL3_KEY, {}, {}); in ActiveAppCloneUserKey()
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/crypto/test/key_manager_test/
H A Dkey_manager_test.cpp444 type = EL3_KEY;
730 EXPECT_EQ(KeyManager::GetInstance()->HasElkey(800, EL3_KEY), true);
824 EXPECT_EQ(KeyManager::GetInstance()->HasElkey(800, EL3_KEY), true);
953 string keyDir = KeyManager::GetInstance()->GetKeyDirByUserAndType(user, EL3_KEY);
958 EXPECT_EQ(KeyManager::GetInstance()->GetUserElKey(user, EL3_KEY), nullptr);
963 EXPECT_EQ(KeyManager::GetInstance()->GetUserElKey(user, EL3_KEY), nullptr);
967 EXPECT_NE(KeyManager::GetInstance()->GetUserElKey(user, EL3_KEY), nullptr);
968 EXPECT_NE(KeyManager::GetInstance()->GetUserElKey(user, EL3_KEY), nullptr);
1299 EXPECT_EQ(KeyManager::GetInstance()->SetDirectoryElPolicy(user, EL3_KEY, vec), -ENOENT);
1305 EXPECT_EQ(KeyManager::GetInstance()->SetDirectoryElPolicy(user, EL3_KEY, vec), -EFAULT);
[all …]
/ohos5.0/foundation/filemanagement/storage_service/services/storage_daemon/ipc/src/
H A Dstorage_daemon.cpp179 case EL3_KEY: in GetCryptoFlag()
208 case EL3_KEY: in GetNeedRestoreFilePathByType()
278 std::vector<KeyType> keyTypes = {EL1_KEY, EL2_KEY, EL3_KEY, EL4_KEY, EL5_KEY}; in RestoreUserKey()
681 int ret = ActiveUserKeyAndPrepare(userId, EL3_KEY, token, secret); in ActiveUserKeyAndPrepareElX()
683 LOGE("ActiveUserKeyAndPrepare failed, userId %{public}u, type %{public}u", userId, EL3_KEY); in ActiveUserKeyAndPrepareElX()