#include <cassert>
#include <cstring>
#include <iostream>
+#include <string>
#include "common/utils.h"
using Step::Step;
int process(ContextInstaller* context) override;
- int undo(ContextInstaller*) override { return 0; }
- int clean(ContextInstaller*) override { return 0; }
+ int undo(ContextInstaller* /*context*/) override { return 0; }
+ int clean(ContextInstaller* /*context*/) override { return 0; }
};
} // namespace signature
int clean(ContextInstaller* /*context*/) override { return 0; }
int undo(ContextInstaller* context) override;
- boost::filesystem::path GenerateTmpDir(const char*);
+ boost::filesystem::path GenerateTmpDir(const char* app_path);
int ExtractToTmpDir(const char* source_dir,
const boost::filesystem::path& tmp_dir);
};
#include <boost/filesystem/path.hpp>
#include <iostream>
+#include <string>
#define ERR(msg) std::cout << "[ERROR] " << msg << std::endl;
}
};
-}
+} // namespace detail
#define LOG(LEVEL) \
::detail::LogCatcher() & std::ostringstream() << "[" << #LEVEL << "] " \
namespace bf = boost::filesystem;
namespace {
-using namespace common_installer;
const int kXMLLogSize = 1024;
}
bool CheckObjectID(
- const signature::SignatureData& signature_data) {
+ const common_installer::signature::SignatureData& signature_data) {
std::string object_id = signature_data.object_id();
std::set<std::string> reference_set = signature_data.reference_set();
}
bool CheckRoleURI(
- const signature::SignatureData& signature_data) {
+ const common_installer::signature::SignatureData& signature_data) {
std::string role_uri = signature_data.role_uri();
if (role_uri.empty()) {
return true;
}
-bool CheckProfileURI(const signature::SignatureData& signature_data) {
+bool CheckProfileURI(
+ const common_installer::signature::SignatureData& signature_data) {
if (kTokenProfileURI != signature_data.profile_uri()) {
LOG(ERROR) << "Profile tag contains unsupported value in URI attribute.";
return false;
return path_str.substr(index);
}
-bool CheckReference(const signature::SignatureData& signature_data) {
+bool CheckReference(
+ const common_installer::signature::SignatureData& signature_data) {
const bf::path& widget_path = signature_data.GetExtractedWidgetPath();
const std::set<std::string>& reference_set = signature_data.reference_set();
namespace bf = boost::filesystem;
namespace {
-using namespace common_installer;
const bf::path cert_prefix_path = "/usr/share/ca-certificates/tizen/";
class XmlSecContext {
public:
- static void GetExtractedPath(const signature::SignatureData& data);
+ static void GetExtractedPath(
+ const common_installer::signature::SignatureData& data);
static xmlSecKeysMngrPtr LoadTrustedCerts(
- const signature::SignatureData& signature_data);
+ const common_installer::signature::SignatureData& signature_data);
static bool VerifyFile(
- xmlSecKeysMngrPtr mngr, const signature::SignatureData& data);
+ xmlSecKeysMngrPtr mngr,
+ const common_installer::signature::SignatureData& data);
private:
static int FileMatchCallback(const char* file_name);
std::pair<void*, bool> XmlSecContext::file_wrapper_;
void XmlSecContext::GetExtractedPath(
- const signature::SignatureData& data) {
+ const common_installer::signature::SignatureData& data) {
prefix_path_ = data.GetExtractedWidgetPath();
}
}
xmlSecKeysMngrPtr XmlSecContext::LoadTrustedCerts(
- const signature::SignatureData& signature_data) {
+ const common_installer::signature::SignatureData& signature_data) {
xmlSecKeysMngrPtr mngr = xmlSecKeysMngrCreate();
if (!mngr) {
LOG(ERROR) << "Error: failed to create keys manager.";
}
bool XmlSecContext::VerifyFile(xmlSecKeysMngrPtr mngr,
- const signature::SignatureData& data) {
+ const common_installer::signature::SignatureData& data) {
LOG(INFO) << "Verify " << data.signature_file_name();
xmlSecIOCleanupCallbacks();
XmlSecContext::GetExtractedPath(data);
+/* 2014, Copyright © Intel Coporation, license APACHE-2.0, see LICENSE file */
+
#include <iostream>
#include <cstdio>
#include <cstdlib>
namespace {
-API manifest_x *pkgmgr_parser_process_manifest_xml(const char *manifest)
-{
+API manifest_x *pkgmgr_parser_process_manifest_xml(const char *manifest) {
_LOGD("parsing start pkgmgr_parser_process_manifest_xml\n");
xmlTextReaderPtr reader;
manifest_x *mfx = NULL;
_LOGD("Parsing Failed\n");
pkgmgr_parser_free_manifest_xml(mfx);
mfx = NULL;
- } else
+ } else {
_LOGD("Parsing Success\n");
+ }
} else {
_LOGD("Memory allocation error\n");
}
namespace parse {
Class ConfigFileParser {
-ConfigFileParser(char * file)
-{
+ConfigFileParser(char * file) {
}
}
// undo
};
-} // namespace wgt
} // namespace parse
+} // namespace wgt