PermissionMask permissionMask = 0;
buffer.Deserialize(user, name, label, accessorLabel, permissionMask);
- Credentials cred = { user, label };
+
+ Credentials cred(user, label);
return m_logic->setPermission(
cred,
command,
buffer.Deserialize(command);
buffer.Deserialize(msgID);
- // This is a workaround solution for locktype=None in Tizen 2.2.1
- // When locktype is None, lockscreen app doesn't interfere with unlocking process.
- // Therefor lockscreen app cannot notify unlock events to key-manager when locktype is None.
- // So, to unlock user data when lock type is None, key-manager always try to unlock user data with null password.
- // Even if the result is fail, it will be ignored.
- Password nullPassword("");
- m_logic->unlockUserKey(cred.uid, nullPassword, false);
-
LogDebug("Process storage. Command: " << command);
switch(static_cast<LogicCommand>(command)) {
msgID,
DataType(tmpDataType));
}
- case LogicCommand::CREATE_KEY_PAIR_RSA:
- case LogicCommand::CREATE_KEY_PAIR_DSA:
- case LogicCommand::CREATE_KEY_PAIR_ECDSA:
+ case LogicCommand::CREATE_KEY_AES:
+ {
+ int size = 0;
+ Name keyName;
+ Label keyLabel;
+ PolicySerializable policyKey;
+ buffer.Deserialize(size,
+ policyKey,
+ keyName,
+ keyLabel);
+ return m_logic->createKeyAES(
+ cred,
+ msgID,
+ size,
+ keyName,
+ keyLabel,
+ policyKey);
+ }
+ case LogicCommand::CREATE_KEY_PAIR:
{
- int additional_param = 0;
+ CryptoAlgorithmSerializable keyGenAlgorithm;
Name privateKeyName;
Label privateKeyLabel;
Name publicKeyName;
Label publicKeyLabel;
PolicySerializable policyPrivateKey;
PolicySerializable policyPublicKey;
- buffer.Deserialize(additional_param,
+ buffer.Deserialize(keyGenAlgorithm,
policyPrivateKey,
policyPublicKey,
privateKeyName,
publicKeyLabel);
return m_logic->createKeyPair(
cred,
- static_cast<LogicCommand>(command),
msgID,
- additional_param,
+ keyGenAlgorithm,
privateKeyName,
privateKeyLabel,
publicKeyName,