${INSTALLER_JOBS}/widget_install/task_encrypt_resource.cpp
${INSTALLER_JOBS}/widget_install/task_certificates.cpp
${INSTALLER_JOBS}/widget_install/task_prepare_reinstall.cpp
- ${INSTALLER_JOBS}/widget_install/wac_security.cpp
+ ${INSTALLER_JOBS}/widget_install/widget_security.cpp
${INSTALLER_JOBS}/widget_install/widget_update_info.cpp
${INSTALLER_JOBS}/widget_install/directory_api.cpp
${INSTALLER_JOBS}/widget_install/widget_unzip.cpp
{
LogDebug("Set CertiInfo to pkgmgr : " << source);
CertificateChainList certificateChainList;
- m_context.wacSecurity.getCertificateChainList(certificateChainList, source);
+ m_context.widgetSecurity.getCertificateChainList(certificateChainList, source);
FOREACH(it, certificateChainList)
{
{
// this signature is verified -
// no point in check domain WAC_ROOT and WAC_RECOGNIZED
- m_contextData.wacSecurity.setDistributorSigned(true);
+ m_contextData.widgetSecurity.setDistributorSigned(true);
CertificateCollection collection;
collection.load(data.getCertList());
"Certificate collection is not able to create chain. "
"It is not possible to verify this signature.");
- m_contextData.wacSecurity.getCertificateChainListRef().push_back(
+ m_contextData.widgetSecurity.getCertificateChainListRef().push_back(
collection);
if (data.getSignatureNumber() == 1) {
- m_contextData.wacSecurity.getCertificateListRef().push_back(
+ m_contextData.widgetSecurity.getCertificateListRef().push_back(
toWidgetCertificateData(data, true));
- m_contextData.wacSecurity.getCertificateListRef().push_back(
+ m_contextData.widgetSecurity.getCertificateListRef().push_back(
toWidgetCertificateData(data, false));
}
}
using namespace ValidationCore;
LogInfo("DNS Identity match!");
// this signature is verified or widget is distributor signed
- m_contextData.wacSecurity.setAuthorCertificatePtr(data.getEndEntityCertificatePtr());
- CertificatePtr test = m_contextData.wacSecurity.getAuthorCertificatePtr();
+ m_contextData.widgetSecurity.setAuthorCertificatePtr(data.getEndEntityCertificatePtr());
+ CertificatePtr test = m_contextData.widgetSecurity.getAuthorCertificatePtr();
- m_contextData.wacSecurity.getCertificateListRef().push_back(
+ m_contextData.widgetSecurity.getCertificateListRef().push_back(
toWidgetCertificateData(data, true));
- m_contextData.wacSecurity.getCertificateListRef().push_back(
+ m_contextData.widgetSecurity.getCertificateListRef().push_back(
toWidgetCertificateData(data, false));
// match widget_id with one from dns identity set
"Certificate collection is not able to create chain. "
"It is not possible to verify this signature.");
- m_contextData.wacSecurity.getAuthorsCertificateChainListRef().push_back(
+ m_contextData.widgetSecurity.getAuthorsCertificateChainListRef().push_back(
collection);
FOREACH(it, dnsIdentity){
if (widgetId.matchHost(*it)) {
- m_contextData.wacSecurity.setRecognized(true);
+ m_contextData.widgetSecurity.setRecognized(true);
return;
}
}
{
LogInfo("Step: <<Check Update>>");
CertificatePtr newCertificate =
- m_contextData.wacSecurity.getAuthorCertificatePtr();
+ m_contextData.widgetSecurity.getAuthorCertificatePtr();
CertificatePtr oldCertificate =
getOldAuthorSignerCertificate(m_contextData.widgetConfig.tzAppid);
m_backAppId,
m_context.widgetConfig.tzAppid,
m_context.widgetConfig,
- m_context.wacSecurity);
+ m_context.widgetSecurity);
m_handle = WidgetDAOReadOnly::getHandle(
m_context.widgetConfig.tzAppid);
} else { //new installation
WidgetDAO::registerWidget(
m_context.widgetConfig.tzAppid,
m_context.widgetConfig,
- m_context.wacSecurity);
+ m_context.widgetSecurity);
m_handle = WidgetDAOReadOnly::getHandle(
m_context.widgetConfig.tzAppid);
}
}
if (!AceApi::registerAceWidget(m_handle, m_context.widgetConfig,
- m_context.wacSecurity.getCertificateList()))
+ m_context.widgetSecurity.getCertificateList()))
{
LogError("ace database insert failed");
ThrowMsg(Exceptions::UpdateFailed,
}
/* /shared/trusted directory */
- CertificatePtr rootCert = m_context.wacSecurity.getAuthorCertificatePtr();
+ CertificatePtr rootCert = m_context.widgetSecurity.getAuthorCertificatePtr();
if (rootCert.Get() != NULL) {
ValidationCore::Crypto::Hash::SHA1 sha1;
sha1.Append(rootCert->getDER());
#include <string>
#include <dpl/string.h>
#include <dpl/wrt-dao-rw/widget_dao.h>
-#include <widget_install/wac_security.h>
+#include <widget_install/widget_security.h>
#include <feature_logic.h>
#include <widget_install/widget_update_info.h>
#include <widget_location.h>
// Installation state variables
WrtDB::WidgetRegisterInfo widgetConfig; ///< WidgetConfigInfo
DPL::Optional<WidgetLocation> locations;
- Jobs::WidgetInstall::WacSecurity wacSecurity; ///< Widget Domain
+ Jobs::WidgetInstall::WidgetSecurity widgetSecurity; ///< Widget Domain
// information.
InstallStep installStep; ///< current step of installation
Jobs::WidgetInstall::JobWidgetInstall *job;
* limitations under the License.
*/
/*
- * @file wac_security.cpp
+ * @file widget_security.cpp
* @author Krzysztof Jackiewicz(k.jackiewicz@samsung.com)
* @version 1.0
* @brief
*/
-#include "wac_security.h"
+#include "widget_security.h"
#include <dpl/foreach.h>
namespace Jobs {
namespace WidgetInstall {
-void WacSecurity::getCertificateChainList(
+void WidgetSecurity::getCertificateChainList(
WrtDB::CertificateChainList& list,
WrtDB::CertificateSource source) const
{
* limitations under the License.
*/
/*
- * @file wac_security.h
+ * @file widget_security.h
* @author Krzysztof Jackiewicz(k.jackiewicz@samsung.com)
* @version 1.0
* @brief
namespace Jobs {
namespace WidgetInstall {
-class WacSecurity : public WrtDB::IWacSecurity
+class WidgetSecurity : public WrtDB::IWidgetSecurity
{
public:
- WacSecurity() :
+ WidgetSecurity() :
mRecognized(false),
mDistributorSigned(false)
{}
- // from IWacSecurity
+ // from IWidgetSecurity
virtual const WrtDB::WidgetCertificateDataList& getCertificateList() const
{
return mCertificateList;
return mDistributorSigned;
}
- // TODO : remove after wrt-commons released
- virtual bool isWacSigned() const
- {
- return false;
- }
-
virtual void getCertificateChainList(
WrtDB::CertificateChainList& list,
WrtDB::CertificateSource source) const;