bool OnGetCertificateCount(int type, int* pCertCount, result* pRet);
- bool OnGetNextCertificate(int type, int curPos, int length, Tizen::Io::_IpcBuffer* pCertBufferIpc, int* pNewPos, result* pRet);
+ bool OnGetNextCertificate(int type, int curPos, int length, Tizen::Base::ByteBuffer* pCertBufferIpc, int* pNewPos, result* pRet);
bool OnUpdateRootCa(int type, Tizen::Io::_IpcBuffer certOldBufferIpc, Tizen::Io::_IpcBuffer certNewBufferIpc, result* pRet);
}
bool
-_CertServiceStub::OnGetNextCertificate(int type, int curPos, int length, Tizen::Io::_IpcBuffer* pCertBufferIpc, int* pNewPos, result* pRet)
+_CertServiceStub::OnGetNextCertificate(int type, int curPos, int length, Tizen::Base::ByteBuffer* pCertBufferIpc, int* pNewPos, result* pRet)
{
char* pBuffer = null;
CATCH:
if (!IsFailed(*pRet))
{
- pCertBufferIpc->size = length;
- pCertBufferIpc->pBuffer = pBuffer;
+ pCertBufferIpc->Construct(length);
+ pCertBufferIpc->SetArray(reinterpret_cast<const byte*>(pBuffer), 0, length);
+ pCertBufferIpc->Flip();
}
else
{
- pCertBufferIpc->size = 0;
- pCertBufferIpc->pBuffer = null;
+ SysLog(NID_SEC_CERT, "GetNextCertificate failed");
}
+ delete pBuffer;
return true;
}