dotnet TCT crash issue due to icon information missing fixed 13/214713/1 accepted/tizen_5.5_unified_mobile_hotfix tizen_5.5_mobile_hotfix accepted/tizen/5.5/unified/20191031.030018 accepted/tizen/5.5/unified/mobile/hotfix/20201027.081435 accepted/tizen/unified/20190926.065721 submit/tizen/20190925.123629 submit/tizen_5.5/20191031.000002 submit/tizen_5.5_mobile_hotfix/20201026.185101 tizen_5.5.m2_release
authorsrinivasa.m <srinivasa.m@samsung.com>
Wed, 25 Sep 2019 11:56:19 +0000 (17:26 +0530)
committersrinivasa.m <srinivasa.m@samsung.com>
Wed, 25 Sep 2019 11:56:19 +0000 (17:26 +0530)
Change-Id: I032246da139a0b346ec52325dce050af745e4537
Signed-off-by: srinivasa.m <srinivasa.m@samsung.com>
server/auth_discovery/src/BAuthStub.cpp
server/auth_discovery/src/BoundADProvider.cpp
silent_auth/silent_auth_entry.cpp

index c946b32..1722b6f 100755 (executable)
@@ -14,7 +14,7 @@
 #define BIG_SIZE 5000
 #define uid 5001
 #define DIGEST_LEN 32
-
+#define DUMMY_AUTH_ICON "data:image/png;base64,iVBORw0KGgoAAA"
 GetAuthInfoResp*
 BAuthStub::getInfo(void)
 {
@@ -27,28 +27,22 @@ BAuthStub::getInfo(void)
                RET_IF_FAIL(__pluginHandle->process != NULL, NULL);
                RET_IF_FAIL(__pluginHandle->process->process != NULL, NULL);
 
-               _INFO("");
 
                TlvEncodable<GetInfoReq> encodableReq;
                encodableReq.setEncoder(EID_UAFV1_GETINFO_REQ);
 
-               _INFO("");
                TlvEncodable<GetAuthInfoResp> encodableResp;
                encodableResp.setEncoder(EID_UAFV1_GETINFO_RESP);
 
-               _INFO("");
                Buffer *authReq = encodableReq.encode();
                unsigned char *authRespRaw = NULL;
 
-               _INFO("");
                __pluginHandle->process->process(authReq->data, &authRespRaw);
 
-               _INFO("");
                __cachedData = encodableResp.decode(authRespRaw);
                /*Map AuthIndex*/
                /*TODO: Find Device ID logic used by IoTCon*/
 
-               _INFO("");
                if (__cachedData->authList != NULL) {
                        _INFO("");
                        GList *authListIter = g_list_first(__cachedData->authList);
@@ -61,9 +55,9 @@ BAuthStub::getInfo(void)
                                                        AsmCrypto::getDeviceId(), std::string(authInfo->__aaid),
                                                        authInfo->__authenticatorIndex);
 
-                               _INFO("After calling getMappedIndex");
+
                                authInfo->__devId = strdup(AsmCrypto::getDeviceId().c_str());
-                               _INFO("");
+
                                authInfo->__isUserEnrolled = isEnrolled();
                                authInfo->__isRoamingAuthenticator = false;
                                _INFO("");
@@ -72,12 +66,14 @@ BAuthStub::getInfo(void)
                }
 
 
-               _INFO("");
+
                /*Fill-up additional data*/
                __cachedData->attach_hint = ATTACHMENT_HINT_INTERNAL;
                /*__cachedData->attach_hint = __pluginHandle->conn->attach_hint();*/
                __cachedData->title = __pluginHandle->conn->title();
                __cachedData->description = __pluginHandle->conn->description();
+               __cachedData->icon = strdup(DUMMY_AUTH_ICON);
+
        } else if (__cachedData->authList != NULL) {  /*Resetting fields altered during last RA operation*/
                _INFO("");
                GList *authListIter = g_list_first(__cachedData->authList);
@@ -320,7 +316,6 @@ BAuthStub::processRegister(const RegisterReq *regReq)
 
        Buffer *authReq = NULL;
        unsigned char *authRespRaw = NULL;
-
        /*Default handlers*/
        if (__pluginHandle->assrt == NULL) {
                TlvEncodable<RegisterReq> encodableReq(regReq);
@@ -343,7 +338,6 @@ BAuthStub::processRegister(const RegisterReq *regReq)
                                (__pluginHandle->assrt->decode(authRespRaw));
 
                RET_IF_FAIL(decodedResp != NULL, NULL);
-
                return decodedResp;
        }
 }
index 738f72c..6754b2d 100755 (executable)
@@ -166,7 +166,6 @@ BoundADProvider::createProcessHandle(void *mod)
 
        plugin_process_handle_s *handle = (plugin_process_handle_s*)
                        calloc(1, sizeof(plugin_process_handle_s));
-
        handle->process = (plugin_fido_command_process)dlsym(mod, "fido_auth_plugin_fido_command_process");
        CATCH_IF_FAIL(handle->process != NULL);
 
index ac77e87..fd6b58a 100755 (executable)
@@ -57,7 +57,9 @@
 /*#define FIDO_TIZEN_AUTH_KEY_PATH tzplatform_mkpath(TZ_SYS_DATA, "/gear_auth/fido_tizen_auth.key")*/
 /*#define FIDO_TIZEN_AUTH_DER_PATH tzplatform_mkpath(TZ_SYS_DATA, "/gear_auth/fido_tizen_auth.der")*/
 
-const char *AAID = "TEST#1111";
+//const char *AAID = "TEST#1111";
+const char *AAID = "53EC#9001";
+
 const char *tcDispConType = "text/plain";
 
 //#define KH_SYMM_KEY "tizen@123";
@@ -1371,7 +1373,7 @@ processGetInfo()
 
        authInfo->__meta->transactionConfirmationDisplay =
                        TRANSACTION_CONFIRMATION_DISPLAY_PRIVILEGED_SOFTWARE | TRANSACTION_CONFIRMATION_DISPLAY_ANY;//3;
-       authInfo->__meta->authenticationAlg = UAF_ALG_SIGN_RSASSA_PSS_SHA256_RAW;//3
+       authInfo->__meta->authenticationAlg = UAF_ALG_SIGN_SECP256R1_ECDSA_SHA256_RAW; // 1
 
        authInfo->__tcDispConType = strdup(tcDispConType);
 
@@ -1527,7 +1529,7 @@ EXPORT_API char *
 fido_auth_plugin_get_title(void)
 {
        char *title = (char *)calloc(128, sizeof(char));
-       snprintf(title, 128 - 1, "%s", "Tizen FIDO Authenticator");
+       snprintf(title, 128 - 1, "%s", "PIN Authenticator");
        return title;
 }
 
@@ -1535,7 +1537,7 @@ EXPORT_API char *
 fido_auth_plugin_get_description(void)
 {
        char *desc = (char *)calloc(128, sizeof(char));
-       snprintf(desc, 128 - 1, "%s", "Tizen FIDO PIN Authenticator");
+       snprintf(desc, 128 - 1, "%s", "Pretty long description");
        return desc;
 }