static _match_criteria_t*
_uaf_parser_parse_match(JsonObject *match_obj)
{
- _INFO("_uaf_parser_parse_match");
if (match_obj != NULL) {
match_criteria->auth_version = __get_int_from_json_object(match_obj, _JSON_KEY_AUTH_VERSION);
- _INFO("_uaf_parser_parse_match is returning match_criteria");
-
return match_criteria;
}
- _INFO("_uaf_parser_parse_match is returning NULL");
return NULL;
}
__get_plte_list(JsonObject *png_json_obj)
{
- _INFO("");
-
GList *plte_list_priv = NULL;
JsonArray *plte_json_arr = json_object_get_array_member(png_json_obj, "plte");
plte_list_priv = g_list_first(plte_list_priv);
- _INFO("");
return plte_list_priv;
}
{
RET_IF_FAIL(png_json_obj != NULL, NULL);
- _INFO("");
-
fido_display_png_characteristics_descriptor_s *png_data = (fido_display_png_characteristics_descriptor_s*)
calloc(1, sizeof(fido_display_png_characteristics_descriptor_s));
png_data->plte = __get_plte_list(png_json_obj);
- _INFO("");
return png_data;
}
RET_IF_FAIL(accepted_array != NULL, NULL);
int accepted_len = json_array_get_length(accepted_array);
- _INFO("Parser accepted list count [%d]", accepted_len);
_policy_t *policy_info = (_policy_t *)calloc(1, sizeof(_policy_t));
policy_info->is_keyid_present = false;
JsonArray *accepted_arr_inner = json_array_get_array_element(accepted_array, i);
if (accepted_arr_inner) {
int accepted_len_inner = json_array_get_length(accepted_arr_inner);
- _INFO("Parser accepted list inner count [%d]", accepted_len_inner);
int j = 0;
for (j = 0; j < accepted_len_inner; j++) {
if (match_obj) {
_match_criteria_t *match_info = _uaf_parser_parse_match(match_obj);
if (match_info) {
- _INFO("Appending match_info");
if (policy_info->is_keyid_present == false) {
if (match_info->key_id_list != NULL)
policy_info->is_keyid_present = true;
}
if (j == (accepted_len_inner - 1)) {
if (allowed_list_inner) {
- _INFO("Appending accepted list");
allowed_list = g_list_append(allowed_list, allowed_list_inner);
}
}
policy_info->disallowed_list = g_list_first(disallowed_list);
}
- _INFO("returning policy [%p]", policy_info);
return policy_info;
}
JsonArray *tr_arr = json_object_get_array_member(uaf_obj, _JSON_KEY_TRANSACTION);
RET_IF_FAIL(tr_arr != NULL, NULL);
- _INFO("");
GList *trans_list = NULL;
_INFO("Transaction list count = [%d]", g_list_length(trans_list));
}
- _INFO("");
return trans_list;
}
gboolean is_parsed = json_parser_load_from_data(parser, get_reg_resp, -1, &parser_err);
RET_IF_FAIL(is_parsed == TRUE, NULL);
- _INFO("");
-
_asm_get_reg_out_t *reg_out = NULL;
JsonNode *root = json_parser_get_root(parser);
JsonObject *root_obj = json_node_get_object(root);
CATCH_IF_FAIL(root_obj != NULL);
- _INFO("");
-
/*responseData*/
JsonObject *res_obj = json_object_get_object_member(root_obj, _JSON_KEY_RESP_DATA);
CATCH_IF_FAIL(res_obj != NULL);
JsonArray *app_reg_json_arr = json_object_get_array_member(res_obj, _JSON_KEY_APP_REGS);
CATCH_IF_FAIL(app_reg_json_arr != NULL);
- _INFO("");
-
int app_reg_json_arr_len = json_array_get_length(app_reg_json_arr);
CATCH_IF_FAIL(app_reg_json_arr_len > 0);
/*appID*/
const char *app_id = json_object_get_string_member(app_reg_json_obj, _JSON_KEY_APPID);
- _INFO("");
-
/*keyIDs*/
JsonArray *key_id_json_arr = json_object_get_array_member(app_reg_json_obj, _JSON_KEY_KEY_IDS);
GList *key_id_list = __get_string_list_from_json_array(key_id_json_arr);
__print_string_list(key_id_list);
reg_out->app_reg_list = g_list_append(reg_out->app_reg_list, app_reg);
- _INFO("");
-
}
}
}
- _INFO("");
/*statusCode*/
reg_out->status_code = __get_int_from_json_object(root_obj, _JSON_KEY_STATUS_CODE);
void
_free_extension(_extension_t *data)
{
- _INFO("");
-
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->id);
SAFE_DELETE(data->data);
SAFE_DELETE(data);
- _INFO("");
}
static void
_free_extension_list_item(gpointer data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
_free_extension((_extension_t*)data);
- _INFO("");
}
void
_free_match_criteria(_match_criteria_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
if (data->aaid_list != NULL)
g_list_free_full(data->extension_list, _free_extension_list_item);
SAFE_DELETE(data);
- _INFO("");
}
static void
_free_uaf_accepted_list_inner_item(gpointer data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
_free_match_criteria((_match_criteria_t*)data);
- _INFO("");
}
static void
_free_uaf_accepted_list_outer_item(gpointer data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
GList *list = (GList*)data;
if (list != NULL)
g_list_free_full(list, _free_uaf_accepted_list_inner_item);
- _INFO("");
}
static void
_free_uaf_disallowed_list_item(gpointer data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
_free_match_criteria((_match_criteria_t*)data);
- _INFO("");
}
void
_free_policy(_policy_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
if (data->accepted_list != NULL)
g_list_free_full(data->disallowed_list, _free_uaf_disallowed_list_item);
SAFE_DELETE(data);
- _INFO("");
}
void
_free_op_header(_op_header_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->version);
g_list_free_full(data->ext_list, _free_extension_list_item);
SAFE_DELETE(data);
- _INFO("");
}
void
_free_message(_message_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->facet_id);
}
SAFE_DELETE(data);
- _INFO("");
}
void
_free_reg_request(_reg_request_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->challenge);
_free_policy(data->policy);
SAFE_DELETE(data);
- _INFO("");
}
void
_free_display_png_characteristics_descriptor(fido_display_png_characteristics_descriptor_s *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
if (data->plte != NULL)
g_list_free_full(data->plte, free);
SAFE_DELETE(data);
- _INFO("");
}
void
_free_auth_transaction(_auth_transaction_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->content);
_free_display_png_characteristics_descriptor(data->display_charac);
SAFE_DELETE(data);
- _INFO("");
}
static void
__free_auth_transaction_list_item(gpointer data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
_free_auth_transaction((_auth_transaction_t*)data);
- _INFO("");
}
void
_free_auth_request(_auth_request_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->challenge);
g_list_free_full(data->transaction_list, __free_auth_transaction_list_item);
SAFE_DELETE(data);
- _INFO("");
}
void
_free_dereg_auth_info(_dereg_auth_info_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->aaid);
SAFE_DELETE(data->key_id);
SAFE_DELETE(data);
- _INFO("");
}
static void
__free_dereg_auth_info_list_item(gpointer data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
_free_dereg_auth_info((_dereg_auth_info_t*)data);
- _INFO("");
}
void
_free_dereg_request(_dereg_request_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
if (data->auth_info_list != NULL)
g_list_free_full(data->auth_info_list, __free_dereg_auth_info_list_item);
SAFE_DELETE(data);
- _INFO("");
}
void
_free_asm_display_png_characteristics_descriptor_t(_fido_asm_display_png_characteristics_descriptor_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
if (data->plte != NULL)
g_list_free_full(data->plte, free);
SAFE_DELETE(data);
- _INFO("");
}
void
_free_fido_asm_proxy(void *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
_fido_asm_proxy_t *data_impl = (_fido_asm_proxy_t*)data;
g_object_unref(data_impl->dbus_proxy);
SAFE_DELETE(data_impl);
-
- _INFO("");
}
void
_free_asm_discover_response(_asm_discover_response_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->asm_id);
SAFE_DELETE(data->asm_response_json);
SAFE_DELETE(data);
- _INFO("");
}
void
_free_fido_asm_authenticator(fido_authenticator_s *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->asm_id);
- _INFO("");
-
SAFE_DELETE(data->auth_index);
- _INFO("");
-
if (data->key_ids != NULL)
g_list_free_full(data->key_ids, free);
- _INFO("");
/*TODO : asm_versions is not used anywhere*/
SAFE_DELETE(data->aaid);
- _INFO("");
SAFE_DELETE(data->assertion_scheme);
- _INFO("");
if (data->attestation_types != NULL)
g_list_free(data->attestation_types);
- _INFO("");
if (data->supported_extension_IDs != NULL)
g_list_free_full(data->supported_extension_IDs, free);
- _INFO("");
SAFE_DELETE(data->tc_display_content_type);
- _INFO("");
if (data->tc_display_png_characteristics != NULL)
g_list_free_full(data->tc_display_png_characteristics, _free_tc_disp_png_char);
- _INFO("");
SAFE_DELETE(data->title);
- _INFO("");
SAFE_DELETE(data->description);
- _INFO("");
SAFE_DELETE(data->icon);
- _INFO("");
if (data->supported_versions != NULL)
g_list_free_full(data->supported_versions, free);
SAFE_DELETE(data);
- _INFO("");
}
void
void
_free_fido_asm_reg_in(_fido_asm_reg_in_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->app_id);
SAFE_DELETE(data->user_name);
SAFE_DELETE(data->final_challenge);
SAFE_DELETE(data);
- _INFO("");
}
void
_free_fido_asm_transaction(_fido_asm_transaction_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->content);
SAFE_DELETE(data->content_type);
_free_asm_display_png_characteristics_descriptor_t(data->display_charac);
SAFE_DELETE(data);
- _INFO("");
}
static void
__free_fido_asm_transaction_list_item(gpointer data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
_free_fido_asm_transaction((_fido_asm_transaction_t *)data);
- _INFO("");
}
void
_free_fido_asm_auth_in(_fido_asm_auth_in_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->app_id);
g_list_free_full(data->trans_list, __free_fido_asm_transaction_list_item);
SAFE_DELETE(data);
- _INFO("");
}
void
_free_fido_asm_dereg_in(_fido_asm_dereg_in_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->app_id);
SAFE_DELETE(data->key_id);
SAFE_DELETE(data);
- _INFO("");
}
void
_free_ui_auth_data(_ui_auth_data_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->asm_id);
SAFE_DELETE(data->label);
SAFE_DELETE(data);
- _INFO("");
}
void
_free_auth_reg_assertion(_auth_reg_assertion_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->assertion_schm);
SAFE_DELETE(data->assertion);
SAFE_DELETE(data);
- _INFO("");
}
void
_free_auth_reg_assertion_list_item(gpointer data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
_free_auth_reg_assertion((_auth_reg_assertion_t*)data);
- _INFO("");
}
void
_free_asm_out(_asm_out_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
switch (data->type) {
if (data->ext_list != NULL) {
_INFO("Freeing ext list");
g_list_free_full(data->ext_list, free);
- _INFO("After Freeing ext list");
}
SAFE_DELETE(data);
- _INFO("");
}
void
_free_asm_reg_out(_asm_reg_out_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->assertion);
SAFE_DELETE(data->assertion_schm);
SAFE_DELETE(data);
- _INFO("");
}
void
_free_asm_auth_out(_asm_auth_out_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->assertion);
SAFE_DELETE(data->assertion_scheme);
SAFE_DELETE(data);
- _INFO("");
}
void
_free_tlv(_tlv_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->val);
SAFE_DELETE(data);
-
- _INFO("");
}
void
_free_tc_disp_png_char(gpointer data)
{
- _INFO("");
if (data == NULL)
return;
g_list_free_full(png->plte, free);
SAFE_DELETE(png);
- _INFO("");
}
void
_free_asm_auth_list(gpointer data)
{
- _INFO("_free_asm_auth_list start");
if (data == NULL)
return;
_free_fido_asm_authenticator((fido_authenticator_s*)data);
- _INFO("_free_asm_auth_list end");
-
}
void
_free_matched_auth_dereg(_matched_auth_dereg_t *data)
{
- _INFO("_free_matched_auth_dereg start");
if (data == NULL)
return;
SAFE_DELETE(data->key_id);
SAFE_DELETE(data);
- _INFO("_free_matched_auth_dereg end");
}
void
_free_asm_app_reg(_asm_app_reg_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->app_id);
g_list_free_full(data->key_id_list, free);
SAFE_DELETE(data);
- _INFO("");
}
static void
__free_asm_app_reg_list_item(gpointer data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
_free_asm_app_reg((_asm_app_reg_t*)data);
- _INFO("");
}
void
_free_asm_get_reg_out(_asm_get_reg_out_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
if (data->app_reg_list != NULL)
g_list_free_full(data->app_reg_list, __free_asm_app_reg_list_item);
SAFE_DELETE(data);
- _INFO("");
}
void
_free_auth_reg_assertion_tlv(_auth_reg_assertion_tlv_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->aaid);
SAFE_DELETE(data->key_id);
SAFE_DELETE(data);
- _INFO("");
}
void
_free_response(_response_t *data)
{
- _INFO("");
RET_IF_FAIL_VOID(data != NULL);
_free_op_header(data->header);
g_list_free_full(data->assertion_list, _free_auth_reg_assertion_list_item);
SAFE_DELETE(data);
- _INFO("");
}
void
_free_matched_auth_data(gpointer data)
{
- _INFO("_free_matched_auth_data start");
if (data == NULL)
return;
SAFE_DELETE(match_auth_data->auth_index);
SAFE_DELETE(match_auth_data->label);
SAFE_DELETE(match_auth_data);
-
- _INFO("_free_matched_auth_data end");
}
const char*
__get_pub_key(const char *json_id_str)
{
- _INFO("__get_pub_key starting");
-
RET_IF_FAIL(json_id_str != NULL, NULL);
char *pub_key = strtok_r(NULL, ":", &save_ptr);
RET_IF_FAIL(pub_key != NULL, NULL);
- _INFO("__get_pub_key end");
-
return pub_key;
}
static void
_free_app_id_cb_data(_app_id_cb_data_t* data)
{
- _INFO("");
-
RET_IF_FAIL_VOID(data != NULL);
SAFE_DELETE(data->real_app_id);
SAFE_DELETE(data->caller_app_id);
SAFE_DELETE(data);
-
- _INFO("");
}
static gboolean
__timer_expired(gpointer data)
{
- _INFO("__timer_expired");
_app_id_cb_data_t *cb_data = (_app_id_cb_data_t*)data;
(cb_data->cb)(FIDO_ERROR_NONE, cb_data->real_app_id, cb_data->user_data);
{
RET_IF_FAIL(encoded_data != NULL, -1);
- //_INFO("%s", encoded_data);
-
int len = 0;
*decoded_size = encoded_size;
bmem = BIO_push(bioCmd, bmem);
len = BIO_read(bmem, (void *) (*decoded_data), (*decoded_size));
- _INFO("%d", len);
*decoded_size = len;
BIO_free_all(bmem);
- _INFO("");
-
return 0;
}
return NULL;
}
- _INFO("");
-
/*char *pkgid = NULL;
ret = pkgmgrinfo_pkginfo_get_pkgid(handle, &pkgid);
if (ret != PMINFO_R_OK) {
return NULL;
}
- _INFO("");
-
#ifdef WITH_JSON_BUILDER
ret = pkgmgrinfo_pkginfo_load_certinfo(caller_pkg_id, cert_handle, uid);
#else
return NULL;
}
- _INFO("");
-
ret = pkgmgrinfo_pkginfo_get_cert_value(cert_handle, PMINFO_AUTHOR_SIGNER_CERT, &author_cert);
_INFO("pkgmgrinfo_pkginfo_get_cert_value = [%d]", ret);
if (ret != PMINFO_R_OK) {
_INFO("Author Signer Cert=%s", author_cert);
- _INFO("");
-
char *author_cert_hash = NULL;
char *tz_facet_id = NULL;
int tz_facet_id_max_len = -1;
author_cert_hash = __get_pub_key_from_cert(author_cert);
- _INFO("");
+
CATCH_IF_FAIL(author_cert_hash != NULL);
tz_facet_id_max_len = strlen(author_cert_hash) + 128;
tz_facet_id = (char*)(calloc(1, tz_facet_id_max_len));
snprintf(tz_facet_id, tz_facet_id_max_len, "%s:%s", "tizen:pkg-key-hash",
author_cert_hash);
- _INFO("");
-
CATCH:
- _INFO("Before return");
-
pkgmgrinfo_pkginfo_destroy_certinfo(cert_handle);
pkgmgrinfo_pkginfo_destroy_pkginfo(handle);
pkgmgrinfo_appinfo_destroy_appinfo(pkg_app_info);
- _INFO("");
+
return tz_facet_id;
}
int
_verify_and_get_facet_id(const char *uaf_app_id, GDBusMethodInvocation *invocation, _facet_id_cb cb, void *user_data)
{
- _INFO("_verify_and_get_facet_id");
-
char *app_id = __get_appid_of_dbus_caller(invocation);
if (app_id == NULL)
return FIDO_ERROR_PERMISSION_DENIED;
/*Case 1: UAF JSON does not have appID, so no check is required, put facetid*/
if (uaf_app_id == NULL) {
- _INFO("UAF msg does not have appID");
+ _DBG("UAF msg does not have appID");
cb_data->real_app_id = __get_tz_facet_id_of_caller(app_id, invocation);
g_timeout_add(2, __timer_expired, cb_data);
return FIDO_ERROR_NONE;
/*Case 2: Try assuming UAF JSON is not URL, so string comparison check is required*/
if (strcmp(cb_data->caller_app_id, uaf_app_id) == 0) {
- _INFO("UAF msg has direct appID");
+ _DBG("UAF msg has direct appID");
cb_data->real_app_id = strdup(uaf_app_id);
g_timeout_add(2, __timer_expired, cb_data);
gboolean
_auth_ui_selector_on_ui_response(Fido *object, GDBusMethodInvocation *invocation, int error, const char *ui_resp)
{
- _INFO("");
-
char *caller = __get_proc_path_of_dbus_caller(invocation);
if (caller == NULL) {
_ERR("__get_proc_path_of_dbus_caller failed");
static void
__handle_reg(_process_cb_data_t *cb_data, _matched_auth_data_t *matched_auth)
{
- _INFO("");
-
_message_t *uaf_req = (_message_t *)(cb_data->uaf_req);
_reg_request_t *uaf_reg_req = (_reg_request_t *)(cb_data->uaf_req->data);
if (uaf_reg_req->user_name != NULL)
reg_in->user_name = strdup(uaf_reg_req->user_name);
- _INFO("");
-
char *fc_json = _uaf_composer_compose_final_challenge(reg_in->app_id, uaf_reg_req->challenge,
uaf_req->facet_id, cb_data->uaf_req->channel_binding);
return;
}
- _INFO("");
/* Final challenge */
reg_in->final_challenge = fc_json;
cb_data->asm_in = reg_in;
- _INFO("");
int ret = _uaf_composer_compose_asm_reg_request(version, auth_idx_int, reg_in, &asm_req_json);
if (ret == 0 && asm_req_json != NULL)
_asm_ipc_send(matched_auth->asm_id,
static GList*
__copy_string_list(GList *src)
{
- _INFO("");
-
RET_IF_FAIL(src != NULL, NULL);
GList *dest = NULL;
dest = g_list_append(dest, strdup(str));
iter = iter->next;
- _INFO("");
}
- _INFO("");
return dest;
}
return;
}
- _INFO("");
allowed_auth_list = g_list_first(allowed_auth_list);
if (g_list_length(allowed_auth_list) > 1) {
- _INFO("");
GList *ui_data_list = NULL;
return;
}
} else {
- _INFO("");
GList *allowed_auth_list_iter = allowed_auth_list;
_matched_auth_data_t *match_data = (_matched_auth_data_t *)(allowed_auth_list_iter->data);
bool
_policy_checker_is_matched(_match_criteria_t *match_criteria, fido_authenticator_s *auth_info)
{
- _INFO("_policy_checker_is_matched::start");
/* -1 means the int value is not present, so we should ignore that. */
(strlen(auth_info->aaid) > 0)) {
aaid_list = g_list_first(aaid_list);
if (g_list_find_custom(aaid_list, auth_info->aaid, (GCompareFunc)strcmp) == NULL) {
- _ERR("AAID match failed");
return false;
}
}
(strlen(auth_vendor) > 0)) {
vendor_list = g_list_first(vendor_list);
if (g_list_find_custom(vendor_list, auth_vendor, (GCompareFunc)strcmp) == NULL) {
- _ERR("Vendor ID match failed");
-
SAFE_DELETE(auth_aaid);
return false;
}
SAFE_DELETE(auth_aaid);
}
- _INFO("keyid matching start");
-
/* 3. If any Key ID is mentioned in match_criteria, then atleast one Key ID should match */
GList *key_id_list = match_criteria->key_id_list;
if (key_id_list != NULL) {
if (auth_info->key_ids == NULL) {
- _ERR("keyID match failed");
return false;
}
char *key_id = (char*) (key_id_iter->data);
if (key_id) {
if (g_list_find_custom(auth_key_ids, key_id, (GCompareFunc)strcmp) != NULL) {
- _INFO("keyid matched [%s]", key_id);
common_key_id_list = g_list_append(common_key_id_list, strdup(key_id));
}
}
}
if (common_key_id_list == NULL) {
- _ERR("keyID match failed");
return false;
}
GList*
_policy_checker_get_matched_auth_list_dereg(const char *app_id, GList *input_auth_list, GList *available_auth_list)
{
- _INFO("");
-
RET_IF_FAIL(app_id, NULL);
RET_IF_FAIL(input_auth_list, NULL);
RET_IF_FAIL(available_auth_list, NULL);
- _INFO("");
-
GList *matched_auth_dereg_list = NULL;
GList *input_auth_list_iter = g_list_first(input_auth_list);
else
_ERR("Authenticator does not have any ASM ID!!");
- _INFO("");
matched_auth_dereg_list = g_list_append(matched_auth_dereg_list, matched_auth_dereg);
}
available_auth_list_iter = available_auth_list_iter->next;