#define USE_TIMER_UPDATE_TIME_IN_TIME_VIEW
+#define SECURITY_SERVER 1
+
/* launching */
#ifdef LAUNCHING_DEBUG_LOG
#define LAUNCH_SETTING_IN(fmt, arg...) LOG(LOG_DEBUG, "LAUNCH", "[setting:Application:%s:IN]" fmt, __FUNCTION__, ##arg)
BuildRequires: pkgconfig(callmgr_client)
BuildRequires: pkgconfig(privilege-info)
#BuildRequires: pkgconfig(capi-location-manager)
+BuildRequires: pkgconfig(auth-fw)
BuildRequires: libcap-devel
BuildRequires: cmake
BuildRequires: edje-tools
INCLUDE(FindPkgConfig)
pkg_check_modules(pkgs_locktype REQUIRED ecore evas elementary dlog efl-extension json-glib-1.0
-ui-gadget-1 capi-appfw-application appcore-common
+ui-gadget-1 capi-appfw-application appcore-common auth-fw
deviced pkgmgr-info libtzplatform-config
)
#include <ode.h>
#endif
+#include <auth-passwd.h>
+
#define TBD 0
static int setting_locktype_main_create(void *cb);
if (old_type == SETTING_SCREEN_LOCK_TYPE_PASSWORD
|| old_type == SETTING_SCREEN_LOCK_TYPE_SIMPLE_PASSWORD) {
#if SECURITY_SERVER
- int result = security_server_set_pwd(ad->input_pwd, "0000", 0, 0);
+ //int result = security_server_set_pwd(ad->input_pwd, "0000", 0, 0);
+ int result = auth_passwd_set_passwd(AUTH_PWD_NORMAL,ad->input_pwd, "0000");
SETTING_TRACE_DEBUG("set_pwd result : %d", result);
#endif
if (old_type == SETTING_SCREEN_LOCK_TYPE_PASSWORD
|| old_type == SETTING_SCREEN_LOCK_TYPE_SIMPLE_PASSWORD) {
#if SECURITY_SERVER
- int result = security_server_set_pwd(ad->input_pwd, "0000", 0, 0);
+ //int result = security_server_set_pwd(ad->input_pwd, "0000", 0, 0);
+ int result = auth_passwd_set_passwd(AUTH_PWD_NORMAL,ad->input_pwd, "0000");
SETTING_TRACE_DEBUG("set_pwd result : %d", result);
#endif
#if 0
if (old_type == SETTING_SCREEN_LOCK_TYPE_PASSWORD
|| old_type == SETTING_SCREEN_LOCK_TYPE_SIMPLE_PASSWORD) {
#if SECURITY_SERVER
- int result = security_server_set_pwd(ad->input_pwd, "0000", 0, 0);
+// int result = security_server_set_pwd(ad->input_pwd, "0000", 0, 0);
+ int result = auth_passwd_set_passwd(AUTH_PWD_NORMAL,ad->input_pwd, "0000");
SETTING_TRACE_DEBUG("set_pwd result : %d", result);
#endif
#if 0
if (old_type == SETTING_SCREEN_LOCK_TYPE_PASSWORD
|| old_type == SETTING_SCREEN_LOCK_TYPE_SIMPLE_PASSWORD) {
#if SECURITY_SERVER
- int result = security_server_set_pwd(ad->input_pwd, "0000", 0, 0);
+// int result = security_server_set_pwd(ad->input_pwd, "0000", 0, 0);
+ int result = auth_passwd_set_passwd(AUTH_PWD_NORMAL,ad->input_pwd, "0000");
SETTING_TRACE_DEBUG("set_pwd result : %d", result);
#endif
#if 0
#include <setting-locktype.h>
#include <efl_extension.h>
+#include <auth-passwd.h>
+
#define Max_Passwd_View_Type_Len 64
#ifndef UG_MODULE_API
#define UG_MODULE_API __attribute__ ((visibility("default")))
locktypeUG->viewtype = SETTING_LOCKTYPE_VIEWTYPE_RECOVERY;
vconf_set_int(VCONFKEY_SETAPPL_SCREEN_LOCK_TYPE_INT, SETTING_SCREEN_LOCK_TYPE_SWIPE);
#if SECURITY_SERVER
- int result = security_server_reset_pwd("0000", 0, 0);
- SETTING_TRACE_DEBUG("reset_pwd result : %d", result);
+// int result = security_server_reset_pwd("0000", 0, 0);
+//?? int result = auth_passwd_reset_passwd(AUTH_PWD_NORMAL,uid, "0000");
+// SETTING_TRACE_DEBUG("reset_pwd result : %d", result);
#endif
} else {
locktypeUG->viewtype = SETTING_LOCKTYPE_VIEWTYPE_MAIN;
pkg_check_modules(pkgs_password REQUIRED evas ecore edje elementary appcore-common
appcore-efl deviced ecore-imf
-ui-gadget-1 capi-appfw-application tapi dlog
+ui-gadget-1 capi-appfw-application tapi dlog auth-fw
notification json-glib-1.0
libtzplatform-config)
#include <setting-password.h>
#include <setting-password-main.h>
+#include <auth-passwd.h>
+
extern void setting_get_pin_lock_info_cb(TapiHandle *handle, int result, void *data, void *user_data);
#ifndef UG_MODULE_API
ad->pw_status = SETTING_PW_STATUS_DEFAULT;
#if SECURITY_SERVER
- ret = security_server_is_pwd_valid(&attempt, &max_attempt, &expire_sec);
+ ret = auth_passwd_check_passwd_state(AUTH_PWD_NORMAL,&attempt, &max_attempt, &expire_sec);
SETTING_TRACE_DEBUG("status of password : %d (cur attempt %d, max %d, expire %d", ret, attempt, max_attempt, expire_sec);
- if (ret == SECURITY_SERVER_API_ERROR_NO_PASSWORD) {
- SETTING_TRACE("security-server has no password!");
+ if (ret == AUTH_PASSWD_API_ERROR_NO_PASSWORD) {
+ SETTING_TRACE("auth fw has no password!");
ad->pw_status = SETTING_PW_STATUS_EMPTY;
}
#endif
SETTING_TRACE_DEBUG("check pwd : %s", challenge);
#if SECURITY_SERVER
- inner_ret = security_server_chk_pwd(challenge, ¤t_attempt, &max_attempt, &valid_secs);
+ inner_ret = auth_passwd_check_passwd(AUTH_PWD_NORMAL,challenge, ¤t_attempt, &max_attempt, &valid_secs);
SETTING_TRACE_DEBUG("chk password : %d", inner_ret);
SETTING_TRACE_SECURE_DEBUG("current_attempt : %d, max_attempt : %d, valid_secs : %d secs", current_attempt, max_attempt, valid_secs);
if (valid_sec != NULL)
*valid_sec = valid_secs;
- if (inner_ret == SECURITY_SERVER_API_SUCCESS) {
+ if (inner_ret == AUTH_PASSWD_API_SUCCESS) {
ret = SETTING_RETURN_SUCCESS;
} else {
if (remain_attempt != NULL) {
/* max attempt count will be handled in passwordug for a while. */
if (ad->pw_status == SETTING_PW_STATUS_EMPTY) {
- ret = security_server_set_pwd(NULL, new_pwd, 0, 0);
- SETTING_TRACE_DEBUG("[security_server_set_pwd() + empty current] returns %d, INFINITE", ret);
- if (ret == SECURITY_SERVER_API_SUCCESS) {
+ ret = auth_passwd_set_passwd(AUTH_PWD_NORMAL,NULL, new_pwd);
+ SETTING_TRACE_DEBUG("[auth_passwd_set_passwd() + empty current] returns %d, INFINITE", ret);
+ if (ret == AUTH_PASSWD_API_SUCCESS) {
#if 0
/* To support key manager */
uid_t user = 5000;
}
- ret = security_server_set_pwd(cur_pwd, new_pwd, 0, 0);
- SETTING_TRACE_DEBUG("[security_server_set_pwd()] returns %d, INFINITE", ret);
- if (ret == SECURITY_SERVER_API_SUCCESS) {
+ ret = auth_passwd_set_passwd(AUTH_PWD_NORMAL,cur_pwd, new_pwd);
+ SETTING_TRACE_DEBUG("[auth_passwd_set_passwd()] returns %d, INFINITE", ret);
+ if (ret == AUTH_PASSWD_API_SUCCESS) {
#if 0
ckmc_ret = ckmc_change_user_password(user, cur_pwd, new_pwd);
SETTING_TRACE("ckmc_change_user_password() returns %d", ckmc_ret);