X-Git-Url: http://review.tizen.org/git/?a=blobdiff_plain;f=src%2Fpassword-verification.c;h=56902f175890300d8307d1a83cc11404266efb09;hb=47e6b039303c968ff2e65c903b3d4c6d4b59d332;hp=9e4093bf7e35dfb1ef23b7d9ff0b96c248413c1b;hpb=9e6c795edf487d264fa190c2c7fc560106fbca74;p=apps%2Fcore%2Fpreloaded%2Flockscreen.git diff --git a/src/password-verification.c b/src/password-verification.c index 9e4093b..56902f1 100755 --- a/src/password-verification.c +++ b/src/password-verification.c @@ -18,7 +18,6 @@ #include #include #include -#include #include #include @@ -36,43 +35,10 @@ typedef struct { unsigned int max_attempt; unsigned int expire_sec; int recoverable; - int mdm_quality; password_operation_cb callback; void *data; } lockscreen_password_policy; -static Eina_Bool __password_verification_check_pw_expired(void *data) -{ - lockscreen_password_policy *password_policy = (lockscreen_password_policy *)data; - if (!password_policy) { - return EINA_FALSE; - } - - LOCK_SCREEN_TRACE_DBG("Checking pw expired => valid_secs:%d:%d", password_policy->expire_sec); - - if (password_policy->expire_sec == 0) { - return EINA_TRUE; - } else - return EINA_FALSE; -} - -static Eina_Bool __password_verification_check_recovery(void *data) -{ - lockscreen_password_policy *password_policy = (lockscreen_password_policy *)data; - if (!password_policy) { - return EINA_FALSE; - } - - LOCK_SCREEN_TRACE_DBG("Checking recovery => current_attempt:%d max_attempt:%d", - password_policy->current_attempt, password_policy->max_attempt); - - if ((password_policy->max_attempt != 0) && (password_policy->max_attempt == password_policy->current_attempt)) { - password_policy->recoverable = 1; - return EINA_TRUE; - } else - return EINA_FALSE; -} - static Eina_Bool __password_verification_check_phone_password(void *data, const char *str) { LOCK_SCREEN_TRACE_DBG("%s : %s\n", __FUNCTION__, str); @@ -128,69 +94,6 @@ static lockscreen_password_type __password_verification_check_length(const char return NORMAL_PASSWORD; } -static void __password_verification_set_expired_password_by_mdm(void *data) -{ - lockscreen_password_policy *password_policy = (lockscreen_password_policy *)data; - - if(!password_policy) { - LOCK_SCREEN_TRACE_DBG("lock_policy is NULL"); - return; - } - - if(mdm_get_service() == MDM_RESULT_SUCCESS) { - LOCK_SCREEN_TRACE_DBG("success to connect mdm server..!!"); - if (mdm_enforce_password_change() == MDM_RESULT_SUCCESS) { - LOCK_SCREEN_TRACE_DBG("success to call mdm_enforce_password_change..!!"); - } else { - LOCK_SCREEN_TRACE_DBG("[ERROR] failed to call mdm_enforce_password_change..!!"); - } - - if (mdm_set_password_status(MDM_PASSWORD_EXPIRED) == MDM_RESULT_SUCCESS) { - LOCK_SCREEN_TRACE_DBG("success to set MDM_PASSWORD_EXPIRED..!!"); - } else { - LOCK_SCREEN_TRACE_DBG("[ERROR] failed to set MDM_PASSWORD_EXPIRED..!!"); - } - mdm_release_service(); - } else { - LOCK_SCREEN_TRACE_DBG("[ERROR] failed to connect mdm server"); - } -} - -static void __password_verification_recorver_password_by_mdm(void *data) -{ - lockscreen_password_policy *password_policy = (lockscreen_password_policy *)data; - - if(!password_policy) { - LOCK_SCREEN_TRACE_DBG("lock_policy is NULL"); - return; - } - - if(mdm_get_service() == MDM_RESULT_SUCCESS) { - LOCK_SCREEN_TRACE_DBG("success to connect mdm server..!!"); - mdm_data_t * lp_data = NULL; - mdm_password_policy_t *pwd_info = NULL; - lp_data = mdm_get_password_policy(); - if (lp_data != NULL) { - pwd_info = (mdm_password_policy_t *)lp_data->data; - password_policy->mdm_quality = pwd_info->quality; - LOCK_SCREEN_TRACE_DBG("mdm quality : %d", password_policy->mdm_quality); - lp_data->mem_header.free_func(lp_data); - } else { - LOCK_SCREEN_TRACE_DBG("set password policy fail"); - } - if (password_policy->mdm_quality != MDM_PASSWORD_QUALITY_UNSPECIFIED) { - if (mdm_set_password_status(MDM_PASSWORD_FAILED) == MDM_RESULT_SUCCESS) { - LOCK_SCREEN_TRACE_DBG("success to set MDM_PASSWORD_FAILED..!!"); - } else { - LOCK_SCREEN_TRACE_DBG("[ERROR] failed to set MDM_PASSWORD_FAILED..!!"); - } - } - mdm_release_service(); - }else { - LOCK_SCREEN_TRACE_DBG("[ERROR] failed to connect mdm server"); - } -} - void *password_verification_policy_create() { lockscreen_password_policy *password_policy = NULL; @@ -205,8 +108,6 @@ void *password_verification_policy_create() return NULL; } - password_policy->mdm_quality = MDM_PASSWORD_QUALITY_UNSPECIFIED; - ret = security_server_is_pwd_valid(&cur_attempt, &max_attempt, &expire_sec); LOCK_SCREEN_TRACE_DBG("policy status:%d, cur_attempt:%d, max_attempt:%d ", ret, cur_attempt, max_attempt); @@ -245,16 +146,9 @@ void password_verification_verify(void *data, const char *password) switch(password_type){ case NORMAL_PASSWORD: if (__password_verification_check_phone_password(password_policy, password)) { - if ( __password_verification_check_pw_expired(password_policy)) { - __password_verification_set_expired_password_by_mdm(password_policy); - } LOCK_SCREEN_TRACE_DBG("password is right!!!!"); elm_exit(); } else { - if (__password_verification_check_recovery (password_policy)) { - LOCK_SCREEN_TRACE_DBG("Recovery lock mode..!!"); - __password_verification_recorver_password_by_mdm(password_policy); - } if(password_policy->callback){ password_policy->callback("", password_policy->data); }