+++ /dev/null
-Flora License
-
-Version 1.1, April, 2013
-
-http://floralicense.org/license/
-
-TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
-
-1. Definitions.
-
-"License" shall mean the terms and conditions for use, reproduction,
-and distribution as defined by Sections 1 through 9 of this document.
-
-"Licensor" shall mean the copyright owner or entity authorized by
-the copyright owner that is granting the License.
-
-"Legal Entity" shall mean the union of the acting entity and
-all other entities that control, are controlled by, or are
-under common control with that entity. For the purposes of
-this definition, "control" means (i) the power, direct or indirect,
-to cause the direction or management of such entity,
-whether by contract or otherwise, or (ii) ownership of fifty percent (50%)
-or more of the outstanding shares, or (iii) beneficial ownership of
-such entity.
-
-"You" (or "Your") shall mean an individual or Legal Entity
-exercising permissions granted by this License.
-
-"Source" form shall mean the preferred form for making modifications,
-including but not limited to software source code, documentation source,
-and configuration files.
-
-"Object" form shall mean any form resulting from mechanical
-transformation or translation of a Source form, including but
-not limited to compiled object code, generated documentation,
-and conversions to other media types.
-
-"Work" shall mean the work of authorship, whether in Source or Object form,
-made available under the License, as indicated by a copyright notice
-that is included in or attached to the work (an example is provided
-in the Appendix below).
-
-"Derivative Works" shall mean any work, whether in Source or Object form,
-that is based on (or derived from) the Work and for which the editorial
-revisions, annotations, elaborations, or other modifications represent,
-as a whole, an original work of authorship. For the purposes of this License,
-Derivative Works shall not include works that remain separable from,
-or merely link (or bind by name) to the interfaces of, the Work and
-Derivative Works thereof.
-
-"Contribution" shall mean any work of authorship, including the original
-version of the Work and any modifications or additions to that Work or
-Derivative Works thereof, that is intentionally submitted to Licensor
-for inclusion in the Work by the copyright owner or by an individual or
-Legal Entity authorized to submit on behalf of the copyright owner.
-For the purposes of this definition, "submitted" means any form of
-electronic, verbal, or written communication sent to the Licensor or
-its representatives, including but not limited to communication on
-electronic mailing lists, source code control systems, and issue
-tracking systems that are managed by, or on behalf of, the Licensor
-for the purpose of discussing and improving the Work, but excluding
-communication that is conspicuously marked or otherwise designated
-in writing by the copyright owner as "Not a Contribution."
-
-"Contributor" shall mean Licensor and any individual or Legal Entity
-on behalf of whom a Contribution has been received by Licensor and
-subsequently incorporated within the Work.
-
-"Tizen Certified Platform" shall mean a software platform that complies
-with the standards set forth in the Tizen Compliance Specification
-and passes the Tizen Compliance Tests as defined from time to time
-by the Tizen Technical Steering Group and certified by the Tizen
-Association or its designated agent.
-
-2. Grant of Copyright License. Subject to the terms and conditions of
-this License, each Contributor hereby grants to You a perpetual,
-worldwide, non-exclusive, no-charge, royalty-free, irrevocable
-copyright license to reproduce, prepare Derivative Works of,
-publicly display, publicly perform, sublicense, and distribute the
-Work and such Derivative Works in Source or Object form.
-
-3. Grant of Patent License. Subject to the terms and conditions of
-this License, each Contributor hereby grants to You a perpetual,
-worldwide, non-exclusive, no-charge, royalty-free, irrevocable
-(except as stated in this section) patent license to make, have made,
-use, offer to sell, sell, import, and otherwise transfer the Work
-solely as incorporated into a Tizen Certified Platform, where such
-license applies only to those patent claims licensable by such
-Contributor that are necessarily infringed by their Contribution(s)
-alone or by combination of their Contribution(s) with the Work solely
-as incorporated into a Tizen Certified Platform to which such
-Contribution(s) was submitted. If You institute patent litigation
-against any entity (including a cross-claim or counterclaim
-in a lawsuit) alleging that the Work or a Contribution incorporated
-within the Work constitutes direct or contributory patent infringement,
-then any patent licenses granted to You under this License for that
-Work shall terminate as of the date such litigation is filed.
-
-4. Redistribution. You may reproduce and distribute copies of the
-Work or Derivative Works thereof pursuant to the copyright license
-above, in any medium, with or without modifications, and in Source or
-Object form, provided that You meet the following conditions:
-
- 1. You must give any other recipients of the Work or Derivative Works
- a copy of this License; and
- 2. You must cause any modified files to carry prominent notices stating
- that You changed the files; and
- 3. You must retain, in the Source form of any Derivative Works that
- You distribute, all copyright, patent, trademark, and attribution
- notices from the Source form of the Work, excluding those notices
- that do not pertain to any part of the Derivative Works; and
- 4. If the Work includes a "NOTICE" text file as part of its distribution,
- then any Derivative Works that You distribute must include a readable
- copy of the attribution notices contained within such NOTICE file,
- excluding those notices that do not pertain to any part of
- the Derivative Works, in at least one of the following places:
- within a NOTICE text file distributed as part of the Derivative Works;
- within the Source form or documentation, if provided along with the
- Derivative Works; or, within a display generated by the Derivative Works,
- if and wherever such third-party notices normally appear.
- The contents of the NOTICE file are for informational purposes only
- and do not modify the License. You may add Your own attribution notices
- within Derivative Works that You distribute, alongside or as an addendum
- to the NOTICE text from the Work, provided that such additional attribution
- notices cannot be construed as modifying the License. You may add Your own
- copyright statement to Your modifications and may provide additional or
- different license terms and conditions for use, reproduction, or
- distribution of Your modifications, or for any such Derivative Works
- as a whole, provided Your use, reproduction, and distribution of
- the Work otherwise complies with the conditions stated in this License
- and your own copyright statement or terms and conditions do not conflict
- the conditions stated in the License including section 3.
-
-5. Submission of Contributions. Unless You explicitly state otherwise,
-any Contribution intentionally submitted for inclusion in the Work
-by You to the Licensor shall be under the terms and conditions of
-this License, without any additional terms or conditions.
-Notwithstanding the above, nothing herein shall supersede or modify
-the terms of any separate license agreement you may have executed
-with Licensor regarding such Contributions.
-
-6. Trademarks. This License does not grant permission to use the trade
-names, trademarks, service marks, or product names of the Licensor,
-except as required for reasonable and customary use in describing the
-origin of the Work and reproducing the content of the NOTICE file.
-
-7. Disclaimer of Warranty. Unless required by applicable law or
-agreed to in writing, Licensor provides the Work (and each
-Contributor provides its Contributions) on an "AS IS" BASIS,
-WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
-implied, including, without limitation, any warranties or conditions
-of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
-PARTICULAR PURPOSE. You are solely responsible for determining the
-appropriateness of using or redistributing the Work and assume any
-risks associated with Your exercise of permissions under this License.
-
-8. Limitation of Liability. In no event and under no legal theory,
-whether in tort (including negligence), contract, or otherwise,
-unless required by applicable law (such as deliberate and grossly
-negligent acts) or agreed to in writing, shall any Contributor be
-liable to You for damages, including any direct, indirect, special,
-incidental, or consequential damages of any character arising as a
-result of this License or out of the use or inability to use the
-Work (including but not limited to damages for loss of goodwill,
-work stoppage, computer failure or malfunction, or any and all
-other commercial damages or losses), even if such Contributor
-has been advised of the possibility of such damages.
-
-9. Accepting Warranty or Additional Liability. While redistributing
-the Work or Derivative Works thereof, You may choose to offer,
-and charge a fee for, acceptance of support, warranty, indemnity,
-or other liability obligations and/or rights consistent with this
-License. However, in accepting such obligations, You may act only
-on Your own behalf and on Your sole responsibility, not on behalf
-of any other Contributor, and only if You agree to indemnify,
-defend, and hold each Contributor harmless for any liability
-incurred by, or claims asserted against, such Contributor by reason
-of your accepting any such warranty or additional liability.
-
-END OF TERMS AND CONDITIONS
-
-APPENDIX: How to apply the Flora License to your work
-
-To apply the Flora License to your work, attach the following
-boilerplate notice, with the fields enclosed by brackets "[]"
-replaced with your own identifying information. (Don't include
-the brackets!) The text should be enclosed in the appropriate
-comment syntax for the file format. We also recommend that a
-file or class name and description of purpose be included on the
-same "printed page" as the copyright notice for easier
-identification within third-party archives.
-
- Copyright [yyyy] [name of copyright owner]
-
- Licensed under the Flora License, Version 1.1 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
-
- http://floralicense.org/license/
-
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
-
char info[] = {0xca, 0xfe, 0xbe, 0xbe, 0x78, 0x07, 0x02, 0x03};
bool result = true;
int keyLen = 20;
-
+ char *pKeyVersion = NULL;
+ const char *version = "1.0#";
/* if(argc != 2)
{
fprintf(stderr, "Invalid Input [%d]\n", argc);
PKCS5_PBKDF2_HMAC_SHA1(info, 8, (unsigned char*)pKey, keyLen, 1, keyLen, (unsigned char*)pDuid);
pId = Base64Encoding(pDuid, keyLen);
- printf("%s", pId);
+// printf("%s", pId);
+
+ pKeyVersion = (char*)calloc(strlen(pId)+strlen(version)+1, sizeof(char));
+ strncpy(pKeyVersion, version, strlen(version));
+ strncat(pKeyVersion, pId, strlen(pId));
+ printf("%s\n", pKeyVersion);
+ free(pKeyVersion);
free(pId);
free(pKey);
free(pDuid);
</request>
<assign>
<filesystem path="/usr/lib/*" label="_"/>
- <filesystem path="/opt/etc/duid-gadget*" label="_" exec_label="_"/>
+ <filesystem path="/opt/etc/duid-gadget" label="_" exec_label="none"/>
</assign>
</manifest>
+++ /dev/null
-CMAKE_MINIMUM_REQUIRED(VERSION 2.6)
-PROJECT(cryptsvc C)
-
-SET(PREFIX ${CMAKE_INSTALL_PREFIX})
-SET(EXEC_PREFIX "\${prefix}")
-SET(LIBDIR "\${prefix}/lib")
-SET(INCLUDEDIR "\${prefix}/include")
-
-INCLUDE_DIRECTORIES(${CMAKE_CURRENT_SOURCE_DIR}/include)
-
-SET(pc_requires " openssl dlog libcrypto ")
-
-INCLUDE(FindPkgConfig)
-pkg_check_modules(pkgs REQUIRED ${pc_requires})
-
-FOREACH(flag ${pkgs_CFLAGS})
- SET(EXTRA_CFLAGS "${EXTRA_CFLAGS} ${flag}")
-ENDFOREACH(flag)
-
-SET(source_dir "./srcs")
-SET(include_dir "./include")
-SET(test_dir "./test")
-
-SET(EXTRA_CFLAGS "${EXTRA_CFLAGS} -fvisibility=hidden")
-SET(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} ${EXTRA_CFLAGS}")
-SET(EXTRA_CXXFLAGS "${EXTRA_CXXFLAGS} ${EXTRA_CFLAGS}")
-
-#ADD_DEFINITIONS("-DCTR_SUPPORT") # for using CTR mode
-#ADD_DEFINITIONS("-DCRYPT_SVC_LOG") # for debug
-#ADD_DEFINITIONS("-DCRYPTOSVC_TARGET") # to get DUK from Target
-
-##################################################################################################################
-# for libcryptsvc.so
-SET(SRCS
- #${source_dir}/CryptoSvc-debug.c
- ${source_dir}/SecCryptoSvc.c
- #${source_dir}/SecKmBase64.c
-)
-
-SET(libcryptsvc_LDFLAGS "${pkgs_LDFLAGS}")
-SET(libcryptsvc_CFLAGS " ${CFLAGS} -fvisibility=hidden -g -fPIC -I${CMAKE_CURRENT_SOURCE_DIR}/include ")
-SET(libcryptsvc_CPPFLAGS " -DPIC ")
-
-ADD_LIBRARY(${PROJECT_NAME} SHARED ${SRCS})
-
-TARGET_LINK_LIBRARIES(${PROJECT_NAME} ${libcryptsvc_LDFLAGS})
-
-IF("${ARCH}" MATCHES "arm")
-TARGET_LINK_LIBRARIES(${PROJECT_NAME} -L./libs -lDeviceInfo)
-ENDIF("${ARCH}" MATCHES "arm")
-
-SET_TARGET_PROPERTIES(
- ${PROJECT_NAME}
- PROPERTIES
- VERSION ${FULLVER}
- SOVERSION ${MAJORVER}
-)
-##################################################################################################################
-
-##################################################################################################################
-# for libtzsvc.so
-SET(SRCS_TZ
- ${source_dir}/SecCryptoSvc.c
- ${source_dir}/SecTzSvc.c
-)
-
-SET(libtzsvc_LDFLAGS "${pkgs_LDFLAGS}")
-SET(libtzsvc_CFLAGS " ${CFLAGS} -fvisibility=hidden -g -fPIC -I${CMAKE_CURRENT_SOURCE_DIR}/include ")
-SET(libtzsvc_CPPFLAGS " -DPIC ")
-
-SET(LIBTZ_SO "tzsvc")
-ADD_LIBRARY(${LIBTZ_SO} SHARED ${SRCS_TZ})
-
-TARGET_LINK_LIBRARIES(${LIBTZ_SO} ${libtzsvc_LDFLAGS})
-
-IF("${ARCH}" MATCHES "arm")
-TARGET_LINK_LIBRARIES(${LIBTZ_SO} -L./libs -lDeviceInfo)
-ENDIF("${ARCH}" MATCHES "arm")
-
-SET_TARGET_PROPERTIES(
- ${LIBTZ_SO}
- PROPERTIES
- VERSION ${FULLVER}
- SOVERSION ${MAJORVER}
-)
-##################################################################################################################
-
-
-##################################################################################################################
-# for module_test
-#SET(module_test_SOURCES
- #${test_dir}/module_test.c
- #${source_dir}/CryptoSvc-debug.c
-#)
-
-#SET(module_test_CFLAGS " -fvisibility=hidden -I. -I${CMAKE_CURRENT_SOURCE_DIR}/include ")
-#SET(module_test_LDFALGS " -module -avoid-version ${pkgs_LDFLAGS} ")
-
-#ADD_EXECUTABLE(${test_dir}/module_test ${module_test_SOURCES})
-#TARGET_LINK_LIBRARIES(${test_dir}/module_test ${pkgs_LDFLAGS} cryptsvc)
-#SET_TARGET_PROPERTIES(${test_dir}/module_test PROPERTIES COMPILE_FLAGS "${module_test_CFLAGS} ")
-##################################################################################################################
-
-#FIND_PROGRAM(UNAME NAMES uname)
-#EXEC_PROGRAM("${UNAME}" ARGS "-m" OUTPUT_VARIABLE "ARCH")
-IF("${ARCH}" MATCHES "arm")
- #ADD_DEFINITIONS("-DTARGET")
- ADD_DEFINITIONS("-DCRYPTOSVC_TARGET")
- #MESSAGE("add -DTARGET")
-ENDIF("${ARCH}" MATCHES "arm")
-
-SET(PC_NAME ${PROJECT_NAME})
-SET(PC_DESCRIPTION ${DESCRIPTION})
-SET(PC_LDFLAGS " -l${PROJECT_NAME} -l${LIBTZ_SO} ")
-SET(PC_REQUIRED ${pc_requires})
-CONFIGURE_FILE(${PROJECT_NAME}.pc.in ${PROJECT_NAME}.pc @ONLY)
-
-INSTALL(FILES ${PROJECT_NAME}.pc DESTINATION lib/pkgconfig)
-INSTALL(TARGETS ${PROJECT_NAME} DESTINATION lib)
-INSTALL(TARGETS ${LIBTZ_SO} DESTINATION lib)
-INSTALL(DIRECTORY ${CMAKE_CURRENT_SOURCE_DIR}/include/ DESTINATION ${INCLUDEDIR})
-
-ADD_DEFINITIONS(-D_bool_cryptsvc)
+++ /dev/null
-Copyright (c) 2000 - 2011 Samsung Electronics Co., Ltd. All rights reserved.
-
- GNU LESSER GENERAL PUBLIC LICENSE
- Version 2.1, February 1999
-
- Copyright (C) 1991, 1999 Free Software Foundation, Inc.
- 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
- Everyone is permitted to copy and distribute verbatim copies
- of this license document, but changing it is not allowed.
-
-[This is the first released version of the Lesser GPL. It also counts
- as the successor of the GNU Library Public License, version 2, hence
- the version number 2.1.]
-
- Preamble
-
- The licenses for most software are designed to take away your
-freedom to share and change it. By contrast, the GNU General Public
-Licenses are intended to guarantee your freedom to share and change
-free software--to make sure the software is free for all its users.
-
- This license, the Lesser General Public License, applies to some
-specially designated software packages--typically libraries--of the
-Free Software Foundation and other authors who decide to use it. You
-can use it too, but we suggest you first think carefully about whether
-this license or the ordinary General Public License is the better
-strategy to use in any particular case, based on the explanations below.
-
- When we speak of free software, we are referring to freedom of use,
-not price. Our General Public Licenses are designed to make sure that
-you have the freedom to distribute copies of free software (and charge
-for this service if you wish); that you receive source code or can get
-it if you want it; that you can change the software and use pieces of
-it in new free programs; and that you are informed that you can do
-these things.
-
- To protect your rights, we need to make restrictions that forbid
-distributors to deny you these rights or to ask you to surrender these
-rights. These restrictions translate to certain responsibilities for
-you if you distribute copies of the library or if you modify it.
-
- For example, if you distribute copies of the library, whether gratis
-or for a fee, you must give the recipients all the rights that we gave
-you. You must make sure that they, too, receive or can get the source
-code. If you link other code with the library, you must provide
-complete object files to the recipients, so that they can relink them
-with the library after making changes to the library and recompiling
-it. And you must show them these terms so they know their rights.
-
- We protect your rights with a two-step method: (1) we copyright the
-library, and (2) we offer you this license, which gives you legal
-permission to copy, distribute and/or modify the library.
-
- To protect each distributor, we want to make it very clear that
-there is no warranty for the free library. Also, if the library is
-modified by someone else and passed on, the recipients should know
-that what they have is not the original version, so that the original
-author's reputation will not be affected by problems that might be
-introduced by others.
-
- Finally, software patents pose a constant threat to the existence of
-any free program. We wish to make sure that a company cannot
-effectively restrict the users of a free program by obtaining a
-restrictive license from a patent holder. Therefore, we insist that
-any patent license obtained for a version of the library must be
-consistent with the full freedom of use specified in this license.
-
- Most GNU software, including some libraries, is covered by the
-ordinary GNU General Public License. This license, the GNU Lesser
-General Public License, applies to certain designated libraries, and
-is quite different from the ordinary General Public License. We use
-this license for certain libraries in order to permit linking those
-libraries into non-free programs.
-
- When a program is linked with a library, whether statically or using
-a shared library, the combination of the two is legally speaking a
-combined work, a derivative of the original library. The ordinary
-General Public License therefore permits such linking only if the
-entire combination fits its criteria of freedom. The Lesser General
-Public License permits more lax criteria for linking other code with
-the library.
-
- We call this license the "Lesser" General Public License because it
-does Less to protect the user's freedom than the ordinary General
-Public License. It also provides other free software developers Less
-of an advantage over competing non-free programs. These disadvantages
-are the reason we use the ordinary General Public License for many
-libraries. However, the Lesser license provides advantages in certain
-special circumstances.
-
- For example, on rare occasions, there may be a special need to
-encourage the widest possible use of a certain library, so that it becomes
-a de-facto standard. To achieve this, non-free programs must be
-allowed to use the library. A more frequent case is that a free
-library does the same job as widely used non-free libraries. In this
-case, there is little to gain by limiting the free library to free
-software only, so we use the Lesser General Public License.
-
- In other cases, permission to use a particular library in non-free
-programs enables a greater number of people to use a large body of
-free software. For example, permission to use the GNU C Library in
-non-free programs enables many more people to use the whole GNU
-operating system, as well as its variant, the GNU/Linux operating
-system.
-
- Although the Lesser General Public License is Less protective of the
-users' freedom, it does ensure that the user of a program that is
-linked with the Library has the freedom and the wherewithal to run
-that program using a modified version of the Library.
-
- The precise terms and conditions for copying, distribution and
-modification follow. Pay close attention to the difference between a
-"work based on the library" and a "work that uses the library". The
-former contains code derived from the library, whereas the latter must
-be combined with the library in order to run.
-
- GNU LESSER GENERAL PUBLIC LICENSE
- TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
-
- 0. This License Agreement applies to any software library or other
-program which contains a notice placed by the copyright holder or
-other authorized party saying it may be distributed under the terms of
-this Lesser General Public License (also called "this License").
-Each licensee is addressed as "you".
-
- A "library" means a collection of software functions and/or data
-prepared so as to be conveniently linked with application programs
-(which use some of those functions and data) to form executables.
-
- The "Library", below, refers to any such software library or work
-which has been distributed under these terms. A "work based on the
-Library" means either the Library or any derivative work under
-copyright law: that is to say, a work containing the Library or a
-portion of it, either verbatim or with modifications and/or translated
-straightforwardly into another language. (Hereinafter, translation is
-included without limitation in the term "modification".)
-
- "Source code" for a work means the preferred form of the work for
-making modifications to it. For a library, complete source code means
-all the source code for all modules it contains, plus any associated
-interface definition files, plus the scripts used to control compilation
-and installation of the library.
-
- Activities other than copying, distribution and modification are not
-covered by this License; they are outside its scope. The act of
-running a program using the Library is not restricted, and output from
-such a program is covered only if its contents constitute a work based
-on the Library (independent of the use of the Library in a tool for
-writing it). Whether that is true depends on what the Library does
-and what the program that uses the Library does.
-
- 1. You may copy and distribute verbatim copies of the Library's
-complete source code as you receive it, in any medium, provided that
-you conspicuously and appropriately publish on each copy an
-appropriate copyright notice and disclaimer of warranty; keep intact
-all the notices that refer to this License and to the absence of any
-warranty; and distribute a copy of this License along with the
-Library.
-
- You may charge a fee for the physical act of transferring a copy,
-and you may at your option offer warranty protection in exchange for a
-fee.
-
- 2. You may modify your copy or copies of the Library or any portion
-of it, thus forming a work based on the Library, and copy and
-distribute such modifications or work under the terms of Section 1
-above, provided that you also meet all of these conditions:
-
- a) The modified work must itself be a software library.
-
- b) You must cause the files modified to carry prominent notices
- stating that you changed the files and the date of any change.
-
- c) You must cause the whole of the work to be licensed at no
- charge to all third parties under the terms of this License.
-
- d) If a facility in the modified Library refers to a function or a
- table of data to be supplied by an application program that uses
- the facility, other than as an argument passed when the facility
- is invoked, then you must make a good faith effort to ensure that,
- in the event an application does not supply such function or
- table, the facility still operates, and performs whatever part of
- its purpose remains meaningful.
-
- (For example, a function in a library to compute square roots has
- a purpose that is entirely well-defined independent of the
- application. Therefore, Subsection 2d requires that any
- application-supplied function or table used by this function must
- be optional: if the application does not supply it, the square
- root function must still compute square roots.)
-
-These requirements apply to the modified work as a whole. If
-identifiable sections of that work are not derived from the Library,
-and can be reasonably considered independent and separate works in
-themselves, then this License, and its terms, do not apply to those
-sections when you distribute them as separate works. But when you
-distribute the same sections as part of a whole which is a work based
-on the Library, the distribution of the whole must be on the terms of
-this License, whose permissions for other licensees extend to the
-entire whole, and thus to each and every part regardless of who wrote
-it.
-
-Thus, it is not the intent of this section to claim rights or contest
-your rights to work written entirely by you; rather, the intent is to
-exercise the right to control the distribution of derivative or
-collective works based on the Library.
-
-In addition, mere aggregation of another work not based on the Library
-with the Library (or with a work based on the Library) on a volume of
-a storage or distribution medium does not bring the other work under
-the scope of this License.
-
- 3. You may opt to apply the terms of the ordinary GNU General Public
-License instead of this License to a given copy of the Library. To do
-this, you must alter all the notices that refer to this License, so
-that they refer to the ordinary GNU General Public License, version 2,
-instead of to this License. (If a newer version than version 2 of the
-ordinary GNU General Public License has appeared, then you can specify
-that version instead if you wish.) Do not make any other change in
-these notices.
-
- Once this change is made in a given copy, it is irreversible for
-that copy, so the ordinary GNU General Public License applies to all
-subsequent copies and derivative works made from that copy.
-
- This option is useful when you wish to copy part of the code of
-the Library into a program that is not a library.
-
- 4. You may copy and distribute the Library (or a portion or
-derivative of it, under Section 2) in object code or executable form
-under the terms of Sections 1 and 2 above provided that you accompany
-it with the complete corresponding machine-readable source code, which
-must be distributed under the terms of Sections 1 and 2 above on a
-medium customarily used for software interchange.
-
- If distribution of object code is made by offering access to copy
-from a designated place, then offering equivalent access to copy the
-source code from the same place satisfies the requirement to
-distribute the source code, even though third parties are not
-compelled to copy the source along with the object code.
-
- 5. A program that contains no derivative of any portion of the
-Library, but is designed to work with the Library by being compiled or
-linked with it, is called a "work that uses the Library". Such a
-work, in isolation, is not a derivative work of the Library, and
-therefore falls outside the scope of this License.
-
- However, linking a "work that uses the Library" with the Library
-creates an executable that is a derivative of the Library (because it
-contains portions of the Library), rather than a "work that uses the
-library". The executable is therefore covered by this License.
-Section 6 states terms for distribution of such executables.
-
- When a "work that uses the Library" uses material from a header file
-that is part of the Library, the object code for the work may be a
-derivative work of the Library even though the source code is not.
-Whether this is true is especially significant if the work can be
-linked without the Library, or if the work is itself a library. The
-threshold for this to be true is not precisely defined by law.
-
- If such an object file uses only numerical parameters, data
-structure layouts and accessors, and small macros and small inline
-functions (ten lines or less in length), then the use of the object
-file is unrestricted, regardless of whether it is legally a derivative
-work. (Executables containing this object code plus portions of the
-Library will still fall under Section 6.)
-
- Otherwise, if the work is a derivative of the Library, you may
-distribute the object code for the work under the terms of Section 6.
-Any executables containing that work also fall under Section 6,
-whether or not they are linked directly with the Library itself.
-
- 6. As an exception to the Sections above, you may also combine or
-link a "work that uses the Library" with the Library to produce a
-work containing portions of the Library, and distribute that work
-under terms of your choice, provided that the terms permit
-modification of the work for the customer's own use and reverse
-engineering for debugging such modifications.
-
- You must give prominent notice with each copy of the work that the
-Library is used in it and that the Library and its use are covered by
-this License. You must supply a copy of this License. If the work
-during execution displays copyright notices, you must include the
-copyright notice for the Library among them, as well as a reference
-directing the user to the copy of this License. Also, you must do one
-of these things:
-
- a) Accompany the work with the complete corresponding
- machine-readable source code for the Library including whatever
- changes were used in the work (which must be distributed under
- Sections 1 and 2 above); and, if the work is an executable linked
- with the Library, with the complete machine-readable "work that
- uses the Library", as object code and/or source code, so that the
- user can modify the Library and then relink to produce a modified
- executable containing the modified Library. (It is understood
- that the user who changes the contents of definitions files in the
- Library will not necessarily be able to recompile the application
- to use the modified definitions.)
-
- b) Use a suitable shared library mechanism for linking with the
- Library. A suitable mechanism is one that (1) uses at run time a
- copy of the library already present on the user's computer system,
- rather than copying library functions into the executable, and (2)
- will operate properly with a modified version of the library, if
- the user installs one, as long as the modified version is
- interface-compatible with the version that the work was made with.
-
- c) Accompany the work with a written offer, valid for at
- least three years, to give the same user the materials
- specified in Subsection 6a, above, for a charge no more
- than the cost of performing this distribution.
-
- d) If distribution of the work is made by offering access to copy
- from a designated place, offer equivalent access to copy the above
- specified materials from the same place.
-
- e) Verify that the user has already received a copy of these
- materials or that you have already sent this user a copy.
-
- For an executable, the required form of the "work that uses the
-Library" must include any data and utility programs needed for
-reproducing the executable from it. However, as a special exception,
-the materials to be distributed need not include anything that is
-normally distributed (in either source or binary form) with the major
-components (compiler, kernel, and so on) of the operating system on
-which the executable runs, unless that component itself accompanies
-the executable.
-
- It may happen that this requirement contradicts the license
-restrictions of other proprietary libraries that do not normally
-accompany the operating system. Such a contradiction means you cannot
-use both them and the Library together in an executable that you
-distribute.
-
- 7. You may place library facilities that are a work based on the
-Library side-by-side in a single library together with other library
-facilities not covered by this License, and distribute such a combined
-library, provided that the separate distribution of the work based on
-the Library and of the other library facilities is otherwise
-permitted, and provided that you do these two things:
-
- a) Accompany the combined library with a copy of the same work
- based on the Library, uncombined with any other library
- facilities. This must be distributed under the terms of the
- Sections above.
-
- b) Give prominent notice with the combined library of the fact
- that part of it is a work based on the Library, and explaining
- where to find the accompanying uncombined form of the same work.
-
- 8. You may not copy, modify, sublicense, link with, or distribute
-the Library except as expressly provided under this License. Any
-attempt otherwise to copy, modify, sublicense, link with, or
-distribute the Library is void, and will automatically terminate your
-rights under this License. However, parties who have received copies,
-or rights, from you under this License will not have their licenses
-terminated so long as such parties remain in full compliance.
-
- 9. You are not required to accept this License, since you have not
-signed it. However, nothing else grants you permission to modify or
-distribute the Library or its derivative works. These actions are
-prohibited by law if you do not accept this License. Therefore, by
-modifying or distributing the Library (or any work based on the
-Library), you indicate your acceptance of this License to do so, and
-all its terms and conditions for copying, distributing or modifying
-the Library or works based on it.
-
- 10. Each time you redistribute the Library (or any work based on the
-Library), the recipient automatically receives a license from the
-original licensor to copy, distribute, link with or modify the Library
-subject to these terms and conditions. You may not impose any further
-restrictions on the recipients' exercise of the rights granted herein.
-You are not responsible for enforcing compliance by third parties with
-this License.
-
- 11. If, as a consequence of a court judgment or allegation of patent
-infringement or for any other reason (not limited to patent issues),
-conditions are imposed on you (whether by court order, agreement or
-otherwise) that contradict the conditions of this License, they do not
-excuse you from the conditions of this License. If you cannot
-distribute so as to satisfy simultaneously your obligations under this
-License and any other pertinent obligations, then as a consequence you
-may not distribute the Library at all. For example, if a patent
-license would not permit royalty-free redistribution of the Library by
-all those who receive copies directly or indirectly through you, then
-the only way you could satisfy both it and this License would be to
-refrain entirely from distribution of the Library.
-
-If any portion of this section is held invalid or unenforceable under any
-particular circumstance, the balance of the section is intended to apply,
-and the section as a whole is intended to apply in other circumstances.
-
-It is not the purpose of this section to induce you to infringe any
-patents or other property right claims or to contest validity of any
-such claims; this section has the sole purpose of protecting the
-integrity of the free software distribution system which is
-implemented by public license practices. Many people have made
-generous contributions to the wide range of software distributed
-through that system in reliance on consistent application of that
-system; it is up to the author/donor to decide if he or she is willing
-to distribute software through any other system and a licensee cannot
-impose that choice.
-
-This section is intended to make thoroughly clear what is believed to
-be a consequence of the rest of this License.
-
- 12. If the distribution and/or use of the Library is restricted in
-certain countries either by patents or by copyrighted interfaces, the
-original copyright holder who places the Library under this License may add
-an explicit geographical distribution limitation excluding those countries,
-so that distribution is permitted only in or among countries not thus
-excluded. In such case, this License incorporates the limitation as if
-written in the body of this License.
-
- 13. The Free Software Foundation may publish revised and/or new
-versions of the Lesser General Public License from time to time.
-Such new versions will be similar in spirit to the present version,
-but may differ in detail to address new problems or concerns.
-
-Each version is given a distinguishing version number. If the Library
-specifies a version number of this License which applies to it and
-"any later version", you have the option of following the terms and
-conditions either of that version or of any later version published by
-the Free Software Foundation. If the Library does not specify a
-license version number, you may choose any version ever published by
-the Free Software Foundation.
-
- 14. If you wish to incorporate parts of the Library into other free
-programs whose distribution conditions are incompatible with these,
-write to the author to ask for permission. For software which is
-copyrighted by the Free Software Foundation, write to the Free
-Software Foundation; we sometimes make exceptions for this. Our
-decision will be guided by the two goals of preserving the free status
-of all derivatives of our free software and of promoting the sharing
-and reuse of software generally.
-
- NO WARRANTY
-
- 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO
-WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW.
-EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR
-OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY
-KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE
-IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
-PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
-LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME
-THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
-
- 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
-WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY
-AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU
-FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
-CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE
-LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING
-RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
-FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF
-SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
-DAMAGES.
-
- END OF TERMS AND CONDITIONS
-
- How to Apply These Terms to Your New Libraries
-
- If you develop a new library, and you want it to be of the greatest
-possible use to the public, we recommend making it free software that
-everyone can redistribute and change. You can do so by permitting
-redistribution under these terms (or, alternatively, under the terms of the
-ordinary General Public License).
-
- To apply these terms, attach the following notices to the library. It is
-safest to attach them to the start of each source file to most effectively
-convey the exclusion of warranty; and each file should have at least the
-"copyright" line and a pointer to where the full notice is found.
-
- <one line to give the library's name and a brief idea of what it does.>
- Copyright (C) <year> <name of author>
-
- This library is free software; you can redistribute it and/or
- modify it under the terms of the GNU Lesser General Public
- License as published by the Free Software Foundation; either
- version 2.1 of the License, or (at your option) any later version.
-
- This library is distributed in the hope that it will be useful,
- but WITHOUT ANY WARRANTY; without even the implied warranty of
- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- Lesser General Public License for more details.
-
- You should have received a copy of the GNU Lesser General Public
- License along with this library; if not, write to the Free Software
- Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
-
-Also add information on how to contact you by electronic and paper mail.
-
-You should also get your employer (if you work as a programmer) or your
-school, if any, to sign a "copyright disclaimer" for the library, if
-necessary. Here is a sample; alter the names:
-
- Yoyodyne, Inc., hereby disclaims all copyright interest in the
- library `Frob' (a library for tweaking knobs) written by James Random Hacker.
-
- <signature of Ty Coon>, 1 April 1990
- Ty Coon, President of Vice
-
-That's all there is to it!
-
-
-
+++ /dev/null
-# Package Information for pkg-config
-
-prefix=@PREFIX@
-libdir=@PREFIX@/lib
-includedir=@PREFIX@/include
-
-Name: @PC_NAME@
-Description: @DESCRIPTION@
-Version: @FULLVER@
-Requires: @PC_REQUIRED@
-Libs: -L${libdir} @PC_LDFLAGS@
-Cflags: -I${includedir}
-
+++ /dev/null
-cryptsvc (0.0.1-8) unstable; urgency=low
-
- * Add SecFrameGenerateUniqueKey API
- * Modify define bool for C++
- * Git: bada/pkgs/l/libcryptsvc
- * Tag: cryptsvc_0.0.1-8
-
- -- Taeho Kim <taeho124.kim@samsung.com> Wed, 30 May 2012 10:17:11 +0900
-
-cryptsvc (0.0.1-7) unstable; urgency=low
-
- * Modify pkgconfig for using dlog
- * Git: bada/pkgs/l/libcryptsvc
- * Tag: cryptsvc_0.0.1-7
-
- -- Taeho Kim <taeho124.kim@samsung.com> Tue, 22 May 2012 15:38:31 +0900
-
-cryptsvc (0.0.1-6) unstable; urgency=low
-
- * Modify Log for Target
- * Modify Visibility for open API
- * Modify Test Module
- * Git: bada/pkgs/l/libcryptsvc
- * Tag: cryptsvc_0.0.1-6
-
- -- Taeho Kim <taeho124.kim@samsung.com> Tue, 22 May 2012 14:17:25 +0900
-
-cryptsvc (0.0.1-5) unstable; urgency=low
-
- * Modify debian package rules
- * Git: bada/pkgs/l/libcryptsvc
- * Tag: cryptsvc_0.0.1-5
-
- -- Taeho Kim <taeho124.kim@samsung.com> Mon, 07 May 2012 11:49:20 +0900
-
-cryptsvc (0.0.1-4) unstable; urgency=low
-
- * Modify Tag to upload Package server.
- * Git: bada/pkgs/l/libcryptsvc
- * Tag: cryptsvc_0.0.1-4
-
- -- Taeho Kim <taeho124.kim@samsung.com> Mon, 30 Apr 2012 10:29:50 +0900
-
-cryptsvc (0.0.1-3) unstable; urgency=low
-
- * Modify some log messages.
- * Modify feature. (CBC mode enable)
- * Git: bada/pkgs/l/libcryptsvc
- * Tag: cryptsvc_0.0.1-3
-
- -- Taeho Kim <taeho124.kim@samsung.com> Fri, 27 Apr 2012 15:54:53 +0900
-
-cryptsvc (0.0.1-2) unstable; urgency=low
-
- * Add log messages.
- * Add some features.
- * Modify test program.
- * Git: bada/pkgs/l/libcryptsvc
- * Tag: cryptsvc_0.0.1-2
-
- -- Taeho Kim <taeho124.kim@samsung.com> Thu, 26 Apr 2012 19:17:46 +0900
-
-cryptsvc (0.0.1-1) unstable; urgency=low
-
- * Initial Release.
- * Git: bada/pkgs/l/libcryptsvc
- * Tag: cryptsvc_0.0.1-1
-
- -- Taeho Kim <taeho124.kim@samsung.com> Thu, 26 Apr 2012 13:18:38 +0900
-
+++ /dev/null
-Source: cryptsvc
-Section: libs
-Priority: extra
-Maintainer: Jin-Hyung Kim <s11_jh.kim@samsung.com>
-Uploaders:
-Build-Depends: libssl-dev, debhelper (>=5), dlog-dev
-Standards-Version: 0.0.1
-Homepage: N/A
-
-Package: libcryptsvc-dev
-Section: debug
-Architecture: any
-Depends: ${misc:Depends}, libcryptsvc-0 (= ${Source-Version}), dlog-dev
-Description: dev
-
-Package: libcryptsvc-0
-Section: libs
-Architecture: any
-Depends: ${shlibs:Depends}, ${misc:Depends}, dlog-dev
-Description: library
-
+++ /dev/null
-Copyright (c) 2000 - 2010 Samsung Electronics Co., Ltd. All rights reserved.
-
-This program is free software; you can redistribute it and/or modify
-it under the terms of the GNU Lesser General Public License version 2.1.
-
-The full text of the LGPL 2.1 can be found in
-/usr/share/common-licenses.
+++ /dev/null
-usr/include/*
-usr/lib/*.so*
-usr/lib/pkgconfig/*.pc
-
+++ /dev/null
-#!/usr/bin/make -f
-# -*- makefile -*-
-# Sample debian/rules that uses debhelper.
-# This file was originally written by Joey Hess and Craig Small.
-# As a special exception, when this file is copied by dh-make into a
-# dh-make output file, you may use that output file without restriction.
-# This special exception was added by Craig Small in version 0.37 of dh-make.
-
-# Uncomment this to turn on verbose mode.
-#export DH_VERBOSE=1
-
-
-# These are used for cross-compiling and for saving the configure script
-# from having to guess our platform (since we know it already)
-DEB_HOST_GNU_TYPE ?= $(shell dpkg-architecture -qDEB_HOST_GNU_TYPE)
-DEB_BUILD_GNU_TYPE ?= $(shell dpkg-architecture -qDEB_BUILD_GNU_TYPE)
-
-CFLAGS ?= -Wall -g
-LDFLAGS ?=
-PREFIX ?= /usr
-DATADIR ?= /opt
-
-ifneq (,$(findstring noopt,$(DEB_BUILD_OPTIONS)))
- CFLAGS += -O0
-else
- CFLAGS += -O2
-endif
-
-LDFLAGS += -Wl,--rpath=$(PREFIX)/lib -Wl,--as-needed
-
-configure: configure-stamp
-configure-stamp:
- dh_testdir
- # Add here commands to configure the package.
- CFLAGS="$(CFLAGS)" CXXFLAGS="$(CXXFLAGS)" LDFLAGS="$(LDFLAGS)" cmake . -DCMAKE_INSTALL_PREFIX=$(PREFIX)
- touch configure-stamp
-
-build: build-stamp
-
-build-stamp: configure-stamp
- dh_testdir
-
- # Add here commands to compile the package.
- $(MAKE)
- #docbook-to-man debian/ncurses.sgml > ncurses.1
-
- for f in `find $(CURDIR)/debian/ -name "*.in"`; do \
- cat $$f > $${f%.in}; \
- sed -i -e "s#@PREFIX@#$(PREFIX)#g" $${f%.in}; \
- done
-
- touch $@
-
-clean:
- dh_testdir
- dh_testroot
- rm -f build-stamp configure-stamp
-
- # Add here commands to clean up after the build process.
- -$(MAKE) clean
- rm -rf CMakeCache.txt
- rm -rf CMakeFiles
- rm -rf cmake_install.cmake
- rm -rf Makefile
- rm -rf install_manifest.txt
- rm -rf *.pc
-
- for f in `find $(CURDIR)/debian/ -name "*.in"`; do \
- rm -f $${f%.in}; \
- done
- dh_clean
-
-install: build
- dh_testdir
- dh_testroot
- dh_clean -k
- dh_installdirs
-
- # Add here commands to install the package into debian/ncurses.
- $(MAKE) DESTDIR=$(CURDIR)/debian/tmp install
-
-# Build architecture-independent files here.
-binary-indep: build install
-# We have nothing to do by default.
-
-# Build architecture-dependent files here.
-binary-arch: build install
- dh_testdir
- dh_testroot
- dh_installexamples
- dh_install --sourcedir=debian/tmp
- dh_installman
- dh_link
-# dh_strip --dbg-package=libcryptsvc-dbg
- dh_compress
- dh_fixperms
- dh_makeshlibs
- dh_installdeb
- dh_shlibdeps
- dh_gencontrol
- dh_md5sums
- dh_builddeb
-
-binary: binary-indep binary-arch
-.PHONY: build clean binary-indep binary-arch binary install
+++ /dev/null
-/*
- * libcryptsvc - device unique key
- *
- * Copyright (c) 2000 - 2013 Samsung Electronics Co., Ltd All Rights Reserved
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- *
- */
-
-#ifndef _SEC_CRYPTO_SVC_H
-#define _SEC_CRYPTO_SVC_H
-
-#ifdef __cplusplus
-extern "C"
-{
-#endif
-
-//#ifdef OPENSSL_NO_ENGINE
-//#error Do not use define <OPENSSL_NO_ENGINE>
-//#else
-#include <openssl/engine.h>
-//#endif
-
-/*typedef enum
-{
- SEC_CRYPTO_CIPHER_NULL = 0,
- SEC_CRYPTO_CIPHER_AES_CBC_128,
- SEC_CRYPTO_CIPHER_SEED_CBC,
- SEC_CRYPTO_CIPHER_AES_CBC_192,
- SEC_CRYPTO_CIPHER_AES_CBC_256,
- SEC_CRYPTO_CIPHER_AES_CTR_128,
- SEC_CRYPTO_CIPHER_AES_ECB_128,
- SEC_CRYPTO_CIPHER_AES_ECB_192,
- SEC_CRYPTO_CIPHER_AES_ECB_256
-} SecCryptoCipherAlg;
-
-typedef enum
-{
- SEC_SUCCESS = 0,
- SEC_CRYPTO_ERROR_1, //algorithm error
- SEC_CRYPTO_ERROR_2, //init error
- SEC_CRYPTO_ERROR_3, //update error
- SEC_CRYPTO_ERROR_4, //final error
- SEC_CRYPTO_ERROR_5, //wrong param
- SEC_CRYPTO_ERROR_6, //Memory alloc
- SEC_CRYPTO_ERROR_7, //Internal error
-} SecError;
-*/
-//#ifndef bool
-#ifdef _bool_cryptsvc
-typedef enum {false, true} bool;
-#endif
-
-#ifndef IN
-#define IN
-#endif
-#ifndef OUT
-#define OUT
-#endif
-
-#ifndef NULL
-#define NULL 0
-#endif
-#ifndef BOOL
-#define BOOL bool
-#endif
-#ifndef ULONG
-#define ULONG unsigned int
-#endif
-#ifndef UINT8
-#define UINT8 unsigned char
-#endif
-#ifndef UINT32
-#define UINT32 unsigned int
-#endif
-
-//#define EVP_ERROR 0
-//#define SEC_CRYPTO_ENCRYPT 1
-//#define SEC_CRYPTO_DECRYPT 0
-#define SEC_DUK_SIZE 16
-//#define SEC_CRYPTO_KEY_LENGTH 16
-//#define SEC_CRYPTP_ARR_LENGTH 1024
-#define SEC_FRAME_OSP_KEY "uniqueKey"
-//#define SHA1_DIGEST_VALUE_LEN 20
-#define SHA256_DIGEST_VALUE_LEN 32
-//#define KDF_KEYLEN 16
-#define HASH_LEN 20
-//#define SEC_KEYMGR_FEK_SIZE 16
-
-
-/**
- * This function provides Device UniqueKey for crypto with Hash
- * @return This function returns TRUE on success
- * @param[in] uLen Length of Device UniqueKey
- * @param[in,out] pCek Device UniqueKey(Hashed)
-*/
-__attribute__((visibility("default")))
-bool SecFrameGeneratePlatformUniqueKey(IN UINT32 uLen,IN OUT UINT8 *pCek);
-
-#ifdef __cplusplus
-}
-#endif
-
-#endif // _SEC_CRYPTO_SVC_H
-
+++ /dev/null
-/*
- * libcryptsvc - device unique key
- *
- * Copyright (c) 2000 - 2013 Samsung Electronics Co., Ltd All Rights Reserved
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- *
- */
-
-#ifndef _SEC_TZ_SVC_H
-#define _SEC_TZ_SVC_H
-
-#ifdef __cplusplus
-extern "C"
-{
-#endif
-
-typedef unsigned int uint32_t;
-typedef unsigned char uint8_t;
-typedef unsigned int TZCRYPT_Result;
-typedef unsigned char TZCRYPT_UINT8;
-typedef unsigned int TZCRYPT_UINT32;
-typedef unsigned long TZCRYPT_UINT64;
-
-#define SHA256_DIGEST_VALUE_LEN 32
-
-/*
- * This function provides an encryption of user data.
- *
- * @param [in] Src : User data to be encrypted
- * @param [in] SrcLen : Length of user data to be encrypted (multiple by chunk size, SIZE_CHUNK)
- * @param [out] Dst : Encrypted data
- * @param [out] *DstLen : a pointer to length of encrypted data (multiple by secure object size, SIZE_SECUREOBJECT)
- * @param [in] AppInfo : Application information
- * @param [in] AppInfoLen : Length of Application information
- * @param [out] WrapAppInfo : Hashed and wrapped Application Information as an identifier
- * @param [out] *WrapAppInfo : a pointer to length of hashed and wraped Application Information as an identifier
- *
- * return SEC_CRYPTO_SUCCESS if operation has been succesfully completed. (Refer to the tlc error code)
- */
-__attribute__((visibility("default")))
-TZCRYPT_Result SecEncryptTZCrypt(TZCRYPT_UINT8 *Src, TZCRYPT_UINT32 SrcLen, TZCRYPT_UINT8 *Dst, TZCRYPT_UINT32 *DstLen, TZCRYPT_UINT8 *AppInfo, TZCRYPT_UINT32 AppInfoLen, TZCRYPT_UINT8 *WrapAppInfo, TZCRYPT_UINT32 *WrapAppInfoLen);
-
-/*
- * This function provides an decryption of user data.
- *
- * @param [in] Src : Cipher data to be decrypted
- * @param [in] SrcLen : Length of Cipher data to be decrypted (multiple by chunk size, SIZE_SECUREOBJECT)
- * @param [out] Dst : Encrypted data
- * @param [out] *DstLen : a pointer to length of encrypted data (multiple by secure object size, SIZE_CHUNK)
- * @param [in] AppInfo : Application information
- * @param [in] AppInfoLen : Length of Application information
- * @param [in] WrapAppInfo : Hashed and wrapped Application Information as an identifier
- * @param [in] WrapAppInfo : Length of hashed and wraped Application Information as an identifier
- *
- * return SEC_CRYPTO_SUCCESS if operation has been succesfully completed. (Refer to the tlc error code)
- * If a given application information (identifier) is wrong, then return UNIT_TEXT_HASH_ERROR
- */
-__attribute__((visibility("default")))
-TZCRYPT_Result SecDecryptTZCrypt(TZCRYPT_UINT8 *Src, TZCRYPT_UINT32 SrcLen, TZCRYPT_UINT8 *Dst, TZCRYPT_UINT32 *DstLen, TZCRYPT_UINT8 *AppInfo, TZCRYPT_UINT32 AppInfoLen, TZCRYPT_UINT8 *WrapAppInfo, TZCRYPT_UINT32 WrapAppInfoLen);
-
-/*
- * This function provides the length of a given src len
- *
- * @param [in] source length
- *
- * return length of cipher text
- */
-__attribute__((visibility("default")))
-TZCRYPT_UINT32 SecGetCipherLen(TZCRYPT_UINT32 srclen);
-
-#ifdef __cplusplus
-}
-#endif
-
-#endif
+++ /dev/null
-/*
- * tci.h
- *
- * Created on: 05.05.2010
- * Author: galkag
- * modified ckyu.han@samsung.com
- */
-
-#ifndef TCI_H_
-#define TCI_H_
-
-#ifdef __cplusplus
-extern "C"
-{
-#endif
-
-/*
-typedef unsigned int uint32_t;
-typedef unsigned char uint8_t;
-*/
-
-typedef uint32_t tciCommandId_t;
-typedef uint32_t tciResponseId_t;
-typedef uint32_t tciReturnCode_t;
-
-/* Responses have bit 31 set */
-#define RSP_ID_MASK (1U << 31)
-#define RSP_ID(cmdId) (((uint32_t)(cmdId)) | RSP_ID_MASK)
-#define IS_CMD(cmdId) ((((uint32_t)(cmdId)) & RSP_ID_MASK) == 0)
-#define IS_RSP(cmdId) ((((uint32_t)(cmdId)) & RSP_ID_MASK) == RSP_ID_MASK)
-
-/* Return codes of Trustlet commands. */
-#define RET_OK 0 /* Set, if processing is error free */
-#define RET_ERR_UNKNOWN_CMD 1 /* Unknown command */
-#define RET_CUSTOM_START 2
-#define RET_ERR_MAP 3
-#define RET_ERR_UNMAP 4
-
-/* TCI command header. */
-typedef struct {
- tciCommandId_t commandId; /* Command ID */
-} tciCommandHeader_t;
-
-/* TCI response header. */
-typedef struct {
- tciResponseId_t responseId; /* Response ID (must be command ID | RSP_ID_MASK )*/
- tciReturnCode_t returnCode; /* Return code of command */
-} tciResponseHeader_t;
-
-#ifdef __cplusplus
-}
-#endif
-
-#endif /* TCI_H_ */
+++ /dev/null
-/*
- * tlc_tzcrypto.h
- *
- */
-
-#ifndef TLC_TZCRYPT_H_
-#define TLC_TZCRYPT_H_
-
-#ifdef __cplusplus
-extern "C"
-{
-#endif
-/*
-typedef unsigned int TZCRYPT_Result;
-typedef unsigned char TZCRYPT_UINT8;
-typedef unsigned int TZCRYPT_UINT32;
-typedef unsigned long TZCRYPT_UINT64;
-*/
-
-/* TLC error code */
-#define TZCRYPT_SUCCESS 0x00000000
-#define TZCRYPT_ERROR_INIT_FAILED 0x20000001
-#define TZCRYPT_ERROR_TERMINATE_FAILED 0x20000002
-#define TZCRYPT_ERROR_ENCRYPT_FAILED 0x20000003
-#define TZCRYPT_ERROR_DECRYPT_FAILED 0x20000004
-#define TZCRYPT_ERROR_WRAPIDENTITY_FAILED 0x20000005
-#define TZCRYPT_ERROR_UNWRAPIDENTITY_FAILED 0x20000006
-#define TZCRYPT_ERROR_HASH_FAILED 0x20000007
-#define TZCRYPT_ERROR_INVALID_PARAMETER 0x20000008
-
-/* Sec Crypto error code */
-#define SEC_CRYPTO_SUCCESS 0x00000000
-#define SEC_CRYPTO_ENCRYPT_ERROR 0x30000001
-#define SEC_CRYPTO_DECRYPT_ERROR 0x30000002
-#define SEC_CRYPTO_WRAPIDENTITY_ERROR 0x30000003
-#define SEC_CRYPTO_UNWRAPIDENTITY_ERROR 0x30000004
-#define SEC_CRYPTO_HASH_ERROR 0x30000005
-
-/*
- * This function provides an encryption of user data.
- *
- * @param [in] Src : User data to be encrypted
- * @param [in] SrcLen : Length of user data to be encrypted (multiple by chunk size, SIZE_CHUNK)
- * @param [out] Dst : Encrypted data
- * @param [out] *DstLen : a pointer to length of encrypted data (multiple by secure object size, SIZE_SECUREOBJECT)
- *
- * return TZCRYPT_SUCCESS if operation has been succesfully completed. (Refer to the previous TLC error code)
- */
-TZCRYPT_Result TzCrypt_Encrypt(TZCRYPT_UINT8 *Src, TZCRYPT_UINT32 SrcLen, TZCRYPT_UINT8 *Dst, TZCRYPT_UINT32 *DstLen);
-
-/*
- * This function provides an decryption of user data.
- *
- * @param [in] Src : Cipher data to be decrypted
- * @param [in] SrcLen : Length of Cipher data to be decrypted (multiple by chunk size, SIZE_SECUREOBJECT)
- * @param [out] Dst : Encrypted data
- * @param [out] *DstLen : a pointer to length of encrypted data (multiple by secure object size, SIZE_CHUNK)
- *
- * return TZCRYPT_SUCCESS if operation has been succesfully completed. (Refer to the tlc error code)
- */
-TZCRYPT_Result TzCrypt_Decrypt(TZCRYPT_UINT8 *Src, TZCRYPT_UINT32 SrcLen, TZCRYPT_UINT8 *Dst, TZCRYPT_UINT32 *DstLen);
-
-/*
- * This function provides an hash of user data.
- *
- * @param [in] Src : Plain information
- * @param [in] SrcLen : Length of Plain information
- * @param [out] Dst : Hashed information
- * @param [out] *DstLen : a pointer to length of hashed information
-
- * return TZCRYPT_SUCCESS if operation has been succesfully completed. (Refer to the tlc error code)
- */
-TZCRYPT_Result TzCrypt_Hash(TZCRYPT_UINT8 *Src, TZCRYPT_UINT32 SrcLen, TZCRYPT_UINT8 *Dst, TZCRYPT_UINT32 *DstLen);
-
-/*
- * This function provides an wrapping of App data. (+ include hash operation)
- *
- * @param [in] Src : Plain information
- * @param [in] SrcLen : Length of Plain information
- * @param [out] Dst : Wrapped information
- * @param [out] *DstLen : a pointer to length of wrapped information
-
- * return TZCRYPT_SUCCESS if operation has been succesfully completed. (Refer to the tlc error code)
- */
-TZCRYPT_Result TzCrypt_WrapIdentity(TZCRYPT_UINT8 *Src, TZCRYPT_UINT32 SrcLen, TZCRYPT_UINT8 *Dst, TZCRYPT_UINT32 *DstLen);
-
-/*
- * This function provides an unwrapping of App data. (- exclude hash operation)
- *
- * @param [in] Src : Plain information
- * @param [in] SrcLen : Length of Plain information
- * @param [out] Dst : Wrapped information
- * @param [out] *DstLen : a pointer to length of wrapped information
-
- * return TZCRYPT_SUCCESS if operation has been succesfully completed. (Refer to the tlc error code)
- */
-TZCRYPT_Result TzCrypt_UnwrapIdentity(TZCRYPT_UINT8 *Src, TZCRYPT_UINT32 SrcLen, TZCRYPT_UINT8 *Dst, TZCRYPT_UINT32 *DstLen);
-
-/*
- * This function provides the length of secure object from a given length of source data
- *
- * @param [in] SrcLen : Length of Plain information
- *
- * return TZCRYPT_UINT32 (size) if operation has been succesfully completed.
- */
-TZCRYPT_UINT32 TzCrypt_GetSOLen(TZCRYPT_UINT32 SrcLen);
-
-#ifdef __cplusplus
-}
-#endif
-
-#endif
+++ /dev/null
-/*
- *
- */
-#ifndef TLTZCRYPT_API_H_
-#define TLTZCRYPT_API_H_
-
-#ifdef __cplusplus
-extern "C"
-{
-#endif
-
-#include "tci.h"
-
-/* Command ID's for communication Trustlet Connector -> Trustlet. */
-#define CMD_ENCRYPT_TZ_CRYPT 0x00000001
-#define CMD_DECRYPT_TZ_CRYPT 0x00000002
-#define CMD_WRAPIDENTITY_TZ_CRYPT 0x00000003
-#define CMD_UNWRAPIDENTITY_TZ_CRYPT 0x00000004
-#define CMD_HASH_TZ_CRYPT 0x00000005
-
-/* Return codes */
-#define RET_TL_OK 0x00000000
-
-/* Error codes */
-#define RET_ERR_ENCRYPT_TZ_CRYPT 0x10000001
-#define RET_ERR_DECRYPT_TZ_CRYPT 0x10000002
-#define RET_ERR_WRAPIDENTITY_TZ_CRYPT 0x10000003
-#define RET_ERR_UNWRAPIDENTITY_TZ_CRYPT 0x10000004
-#define RET_ERR_HASH_TZ_CRYPT 0x10000005
-
-/* Termination codes */
-#define EXIT_ERROR ((uint32_t)(-1))
-
-#define SIZE_CHUNK 1024
-#define SIZE_SECUREOBJECT 1116 // SO SIZE for 1024 byte (predefined)
-#define SIZE_HASHAPPIDENTITY 32
-#define SIZE_WRAPAPPIDENTITY 124
-
-/* TCI message data. */
-typedef struct {
- uint32_t id;
- //uint32_t data_len;
- //uint8_t *data_ptr;
- //uint8_t data[MAX_DATA_LEN];
-} tci_cmd_t;
-
-typedef struct {
- uint32_t id;
- uint32_t return_code;
- //uint32_t data_len;
- //uint8_t *data_ptr;
- //uint8_t data[MAX_DATA_LEN];
-} tci_resp_t;
-
-
-typedef union {
- uint8_t input_data[SIZE_CHUNK];
- uint8_t output_data[SIZE_SECUREOBJECT];
-} buffer_t;
-
-typedef union {
- uint8_t hash_identity[SIZE_HASHAPPIDENTITY];
- uint8_t wrap_identity[SIZE_WRAPAPPIDENTITY];
-} identity_t;
-
-typedef struct {
- union {
- tci_cmd_t cmd; /* Command message structure */
- tci_resp_t resp; /* Response message structure */
- };
- uint32_t pData;
- uint32_t pLen;
- uint32_t cData;
- uint32_t cLen;
-} tciMessage_t;
-
-/* Trustlet UUID. */
-#define TL_TZ_CRYPT_UUID { { 0xff, 0xff, 0xff, 0xff, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 7 } }
-
-#ifdef __cplusplus
-}
-#endif
-
-#endif /* TLTZCRYPT_API_H_ */
+++ /dev/null
-Name: libcryptsvc
-Summary: nothing
-Version: 0.0.1
-Release: 6
-Group: Osp/Security
-License: APLv2
-Source0: %{name}-%{version}.tar.gz
-BuildRequires: cmake
-
-BuildRequires: pkgconfig(dlog)
-BuildRequires: pkgconfig(openssl)
-
-%description
-
-%package devel
-Summary: nothing
-Group: Bada/Security
-Requires: %{name} = %{version}-%{release}
-
-%description devel
-
-%prep
-%setup -q
-
-%build
-MAJORVER=`echo %{version} | awk 'BEGIN {FS="."}{print $1}'`
-%ifarch %{ix86}
-cmake . -DCMAKE_INSTALL_PREFIX=%{_prefix} -DARCH=x86 -DFULLVER=%{version} -DMAJORVER=${MAJORVER} -DDESCRIPTION=%{summary}
-%else
-cmake . -DCMAKE_INSTALL_PREFIX=%{_prefix} -DARCH=arm -DFULLVER=%{version} -DMAJORVER=${MAJORVER} -DDESCRIPTION=%{summary}
-%endif
-make %{?jobs:-j%jobs}
-
-%install
-rm -rf %{buildroot}
-mkdir -p %{buildroot}/usr/share/license
-cat LICENSE.APLv2 > %{buildroot}/usr/share/license/%{name}
-cat LICENSE.Flora >> %{buildroot}/usr/share/license/%{name}
-
-%make_install
-
-%files
-%{_libdir}/*.so*
-%{_datadir}/license/%{name}
-
-%files devel
-%{_includedir}/*
-%{_libdir}/pkgconfig/cryptsvc.pc
+++ /dev/null
-/*
- * libcryptsvc - device unique key
- *
- * Copyright (c) 2000 - 2013 Samsung Electronics Co., Ltd All Rights Reserved
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- *
- */
-
-#include "SecCryptoSvc.h"
-//#include "SecKmBase64.h"
-//#include "CryptoSvc-debug.h"
-#include <string.h>
-#include <stdio.h>
-#include <openssl/evp.h>
-#include <openssl/err.h>
-#include <openssl/rand.h>
-#include <openssl/sha.h>
-#include <dlog.h>
-
-bool SecFrameGeneratePlatformUniqueKey(IN UINT32 uLen, IN OUT UINT8 *pCek)
-{
- bool bResult = true;
- unsigned int i = 0;
- unsigned char Key[73] = {0};
- unsigned char hashedValue[HASH_LEN] = {0};
- int nTempLen = SEC_DUK_SIZE;
- int nHashLen = 0;
- int remain = 0;
- unsigned char *result = NULL;
-
- SLOGD("[LOG][%s:L%d] Enter \n", __func__,__LINE__);
-#ifdef CRYPTOSVC_TARGET
- SysSecBootGetDeviceUniqueKey(Key);
-#else
- memset(Key, 0xFF, nTempLen);
-#endif
-
- /* for debugging */
- SLOGD("Device Unique Key Information \n");
-
- memcpy(Key+nTempLen, SEC_FRAME_OSP_KEY, 9);
- nTempLen += 9;
-
- remain = uLen;
-
- for( i = 0 ; i < uLen ; i += HASH_LEN )
- {
- result = SHA1(Key, nTempLen, hashedValue);
- nHashLen = HASH_LEN;
-
- if( result == NULL)
- {
- SLOGE("SecCryptoHash fail \n");
- bResult = false;
- goto ERR;
- }
-
- nTempLen = nHashLen;
-
- if( remain < HASH_LEN )
- {
- memcpy(pCek+i, hashedValue, remain);
- }
- else
- {
- memcpy(pCek+i, hashedValue, nHashLen);
- }
-
- remain -= HASH_LEN;
- memset(Key, 0, sizeof(Key));
- memcpy(Key, hashedValue, nHashLen);
- }
- SLOGD("[LOG][%s:L%d] End \n", __func__,__LINE__);
-ERR:
- SLOGD("[LOG][%s:L%d] End with ERROR \n", __func__,__LINE__);
- return bResult;
-}
-
-
+++ /dev/null
-/*
- * libTzSvc - encryption and decryption with the TZ-based HW key
- *
- * Copyright (c) 2000 - 2013 Samsung Electronics Co., Ltd All Rights Reserved
- *
- * Licensed under the Apache License, Version 2.0 (the "License");
- * you may not use this file except in compliance with the License.
- * You may obtain a copy of the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS,
- * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- * See the License for the specific language governing permissions and
- * limitations under the License.
- *
- */
-
-#include <string.h>
-#include <unistd.h>
-#include <fcntl.h>
-#include <dlog.h>
-
-#include <sys/ioctl.h>
-#include <sys/time.h>
-#include <sys/mman.h>
-#include <sys/stat.h>
-#include <openssl/sha.h>
-#include <openssl/evp.h>
-#include <openssl/aes.h>
-#include <openssl/crypto.h>
-
-#include "SecTzSvc.h"
-#include "SecCryptoSvc.h"
-#include "tlc_tzcrypt.h"
-#include "tltzcrypt_api.h"
-
-#define LOG_TAG "tlcTzCrypt"
-#ifndef CRYPTOSVC_TZ
-#define SIZE_CHUNK 1024
-#define SIZE_SECUREOBJECT 1116
-#define KEY_SIZE 16
-#endif
-
-unsigned char* AES_Crypto(unsigned char* p_text, unsigned char* c_text, unsigned char* aes_key, unsigned char* iv, int mode, unsigned long size)
-{
- AES_KEY e_key, d_key;
-
- AES_set_encrypt_key(aes_key, 128, &e_key);
- AES_set_decrypt_key(aes_key, 128, &d_key);
-
- if(mode == 1)
- {
- AES_cbc_encrypt(p_text, c_text, size, &e_key, iv, AES_ENCRYPT);
- return c_text;
- }
- else
- {
- AES_cbc_encrypt(c_text, p_text, size, &d_key, iv, AES_DECRYPT);
- return p_text;
- }
-}
-TZCRYPT_Result SecEncryptTZCrypt(TZCRYPT_UINT8 *Src, TZCRYPT_UINT32 SrcLen, TZCRYPT_UINT8 *Dst, TZCRYPT_UINT32 *DstLen, TZCRYPT_UINT8 *AppInfo, TZCRYPT_UINT32 AppInfoLen, TZCRYPT_UINT8 *WrapAppInfo, TZCRYPT_UINT32 *WrapAppInfoLen)
-{
-
- TZCRYPT_Result ret = SEC_CRYPTO_ENCRYPT_ERROR;
-#ifndef CRYPTOSVC_TZ
- int outLen = 0;
- unsigned char key[KEY_SIZE] = {0,};
- unsigned char hashOut[SHA_DIGEST_LENGTH] = {0,};
- unsigned char iv[] = {0x3E, 0xB5, 0x01, 0x45, 0xE4, 0xF8, 0x75, 0x3F, 0x08, 0x9D, 0x9F, 0x57, 0x3B, 0x63, 0xEF, 0x4B };
-#endif
-
-#ifdef CRYPTOSVC_TZ
- if(SrcLen % SIZE_CHUNK != 0 || *DstLen % SIZE_SECUREOBJECT != 0){
- LOGE("Plain chunk size :: Test for Encryption of TZ Crypt failed!!! [Return Value] = %.8x\n", ret);
- LOGE("source length = %d, destination length = %d\n", SrcLen, *DstLen);
- return ret;
- }
-#endif
-
- LOGI("Start Encryption of TZ Crypt!\n");
-
-#ifdef CRYPTOSVC_TZ
- ret = TzCrypt_WrapIdentity(AppInfo, AppInfoLen, WrapAppInfo, WrapAppInfoLen);
- if (ret) {
- LOGE("Failed to wrap AppInfo of TZ [Return Value] = %.8x\n", ret);
- return SEC_CRYPTO_WRAPIDENTITY_ERROR;
- }
- ret = TzCrypt_Encrypt(Src, SrcLen, Dst, DstLen);
- if (ret) {
- LOGE("Test for Encryption of TZ Crypt failed!!! [Return Value] = %.8x\n", ret);
- return SEC_CRYPTO_ENCRYPT_ERROR;
- }
-#else
- if(!SecFrameGeneratePlatformUniqueKey(KEY_SIZE, key))
- {
- LOGE("Failed to generate device unique key\n");
- return SEC_CRYPTO_ENCRYPT_ERROR;
- }
- if(AES_Crypto(Src, Dst, key, iv, 1, SrcLen) == NULL)
- {
- LOGE("Failed to encrypt data \n");
- return SEC_CRYPTO_ENCRYPT_ERROR;
- }
- *DstLen = SrcLen;
- EVP_Digest(AppInfo, AppInfoLen, hashOut, (unsigned int*)&outLen, EVP_sha1(), NULL);
- *WrapAppInfoLen = outLen;
- memcpy(WrapAppInfo, hashOut, *WrapAppInfoLen);
-#endif
- LOGI("Encryption of TZ Crypt is Success! [Return Value] = %.8x\n", ret);
-
- return SEC_CRYPTO_SUCCESS;
-}
-
-TZCRYPT_Result SecDecryptTZCrypt(TZCRYPT_UINT8 *Src, TZCRYPT_UINT32 SrcLen, TZCRYPT_UINT8 *Dst, TZCRYPT_UINT32 *DstLen, TZCRYPT_UINT8 *AppInfo, TZCRYPT_UINT32 AppInfoLen, TZCRYPT_UINT8 *WrapAppInfo, TZCRYPT_UINT32 WrapAppInfoLen)
-{
- TZCRYPT_Result ret = SEC_CRYPTO_DECRYPT_ERROR;
-#ifndef CRYPTOSVC_TZ
- int outLen = 0;
- unsigned char key[KEY_SIZE] = {0,};
- unsigned char hashOut[SHA_DIGEST_LENGTH] = {0,};
- unsigned char iv[] = {0x3E, 0xB5, 0x01, 0x45, 0xE4, 0xF8, 0x75, 0x3F, 0x08, 0x9D, 0x9F, 0x57, 0x3B, 0x63, 0xEF, 0x4B };
-#endif
-#ifdef CRYPTOSVC_TZ
- if(SrcLen % SIZE_SECUREOBJECT != 0 ){
- LOGE("Ciphertext chunk size :: Test for Encryption of TZ Crypt failed!!! [Return Value] = %.8x\n", ret);
- return ret;
- }
-
- if(WrapAppInfoLen != SIZE_WRAPAPPIDENTITY){
- LOGE("Wrapped App Identity Size :: failed!!! [Return Value] = %.8x\n", ret);
- return ret;
- }
-
- TZCRYPT_UINT8 *unwrapData = NULL;
- TZCRYPT_UINT32 unwrapDatalen = SIZE_HASHAPPIDENTITY;
- unwrapData = (TZCRYPT_UINT8 *)malloc(unwrapDatalen);
-
- ret = TzCrypt_UnwrapIdentity(WrapAppInfo, WrapAppInfoLen, unwrapData, &unwrapDatalen);
- if (ret) {
- LOGE("Test for Unwrap AppInfo of TZ Crypt failed!!! [Return Value] = %.8x\n", ret);
- return SEC_CRYPTO_UNWRAPIDENTITY_ERROR;
- }
- LOGI("Unwrap AppInfo of TZ Crypt is Success! [Return Value] = %.8x\n", ret);
-
- TZCRYPT_UINT8 *hashData = NULL;
- TZCRYPT_UINT32 hashDatalen = SIZE_HASHAPPIDENTITY;
- hashData = (TZCRYPT_UINT8 *)malloc(hashDatalen);
-
- ret = TzCrypt_Hash(AppInfo, AppInfoLen, hashData, &hashDatalen);
- if (ret) {
- LOGE("Test for Hash AppInfo of TZ Crypt failed!!! [Return Value] = %.8x\n", ret);
- return SEC_CRYPTO_HASH_ERROR;
- }
-
- if( 0 != memcmp(unwrapData, hashData, hashDatalen) || hashDatalen != unwrapDatalen){
- LOGE("App Info Identity is NOT same as hash Info of a given Identity\n");
- return SEC_CRYPTO_HASH_ERROR;
- }
-
- LOGI("Start Decryption of TZ Crypt!\n");
- ret = TzCrypt_Decrypt(Src, SrcLen, Dst, DstLen);
- if (ret) {
- LOGE("Test for Decryption of TZ Crypt failed!!! [Return Value] = %.8x\n", ret);
- return SEC_CRYPTO_DECRYPT_ERROR;
- }
-#else
- if(!SecFrameGeneratePlatformUniqueKey(KEY_SIZE, key))
- {
- LOGE("Failed to generate device unique key\n");
- return SEC_CRYPTO_DECRYPT_ERROR;
- }
-
- EVP_Digest(AppInfo, AppInfoLen, hashOut, (unsigned int*)&outLen, EVP_sha1(), NULL);
-
- if( 0 != memcmp(WrapAppInfo, hashOut, outLen) || outLen != WrapAppInfoLen){
- LOGE("AppInfo Identifier Information is wrong\n");
- return SEC_CRYPTO_HASH_ERROR;
- }
-
- if(AES_Crypto(Dst, Src, key, iv, 0, SrcLen) == NULL)
- {
- LOGE("Failed to decrypt data \n");
- return SEC_CRYPTO_DECRYPT_ERROR;
- }
- *DstLen = SrcLen;
-
-#endif
- LOGI("Test for Decryption of TZ Crypt is Success! [Return Value] = %.8x\n", ret);
-
- return SEC_CRYPTO_SUCCESS;
-}
-
-TZCRYPT_UINT32 SecGetCipherLen(TZCRYPT_UINT32 srclen)
-{
-#ifdef CRYPTOSVC_TZ
- TZCRYPT_UINT32 cipherLength = TzCrypt_GetSOLen(srclen);
-#else
- int cipherLength = (srclen / EVP_aes_128_cbc()->block_size + 1) * EVP_aes_128_cbc()->block_size;
-#endif
- return cipherLength;
-}
+++ /dev/null
-cryptsvc (0.0.1-8) unstable; urgency=low
-
- * Add SecFrameGenerateUniqueKey API
- * Modify define bool for C++
- * Git: bada/pkgs/l/libcryptsvc
- * Tag: cryptsvc_0.0.1-8
-
- -- Taeho Kim <taeho124.kim@samsung.com> Wed, 30 May 2012 10:17:11 +0900
-
-cryptsvc (0.0.1-7) unstable; urgency=low
-
- * Modify pkgconfig for using dlog
- * Git: bada/pkgs/l/libcryptsvc
- * Tag: cryptsvc_0.0.1-7
-
- -- Taeho Kim <taeho124.kim@samsung.com> Tue, 22 May 2012 15:38:31 +0900
-
-cryptsvc (0.0.1-6) unstable; urgency=low
-
- * Modify Log for Target
- * Modify Visibility for open API
- * Modify Test Module
- * Git: bada/pkgs/l/libcryptsvc
- * Tag: cryptsvc_0.0.1-6
-
- -- Taeho Kim <taeho124.kim@samsung.com> Tue, 22 May 2012 14:17:25 +0900
-
-cryptsvc (0.0.1-5) unstable; urgency=low
-
- * Modify debian package rules
- * Git: bada/pkgs/l/libcryptsvc
- * Tag: cryptsvc_0.0.1-5
-
- -- Taeho Kim <taeho124.kim@samsung.com> Mon, 07 May 2012 11:49:20 +0900
-
-cryptsvc (0.0.1-4) unstable; urgency=low
-
- * Modify Tag to upload Package server.
- * Git: bada/pkgs/l/libcryptsvc
- * Tag: cryptsvc_0.0.1-4
-
- -- Taeho Kim <taeho124.kim@samsung.com> Mon, 30 Apr 2012 10:29:50 +0900
-
-cryptsvc (0.0.1-3) unstable; urgency=low
-
- * Modify some log messages.
- * Modify feature. (CBC mode enable)
- * Git: bada/pkgs/l/libcryptsvc
- * Tag: cryptsvc_0.0.1-3
-
- -- Taeho Kim <taeho124.kim@samsung.com> Fri, 27 Apr 2012 15:54:53 +0900
-
-cryptsvc (0.0.1-2) unstable; urgency=low
-
- * Add log messages.
- * Add some features.
- * Modify test program.
- * Git: bada/pkgs/l/libcryptsvc
- * Tag: cryptsvc_0.0.1-2
-
- -- Taeho Kim <taeho124.kim@samsung.com> Thu, 26 Apr 2012 19:17:46 +0900
-
-cryptsvc (0.0.1-1) unstable; urgency=low
-
- * Initial Release.
- * Git: bada/pkgs/l/libcryptsvc
- * Tag: cryptsvc_0.0.1-1
-
- -- Taeho Kim <taeho124.kim@samsung.com> Thu, 26 Apr 2012 13:18:38 +0900
-
+++ /dev/null
-Source: cryptsvc
-Section: libs
-Priority: extra
-Maintainer: Jin-Hyung Kim <s11_jh.kim@samsung.com>
-Uploaders:
-Build-Depends: libssl-dev, debhelper (>=5), dlog-dev
-Standards-Version: 0.0.1
-Homepage: N/A
-
-Package: libcryptsvc-dev
-Section: debug
-Architecture: any
-Depends: ${misc:Depends}, libcryptsvc-0 (= ${Source-Version}), dlog-dev
-Description: dev
-
-Package: libcryptsvc-0
-Section: libs
-Architecture: any
-Depends: ${shlibs:Depends}, ${misc:Depends}, dlog-dev
-Description: library
-
+++ /dev/null
-Copyright (c) 2000 - 2010 Samsung Electronics Co., Ltd. All rights reserved.
-
-This program is free software; you can redistribute it and/or modify
-it under the terms of the GNU Lesser General Public License version 2.1.
-
-The full text of the LGPL 2.1 can be found in
-/usr/share/common-licenses.
+++ /dev/null
-usr/include/*
-usr/lib/*.so*
-usr/lib/pkgconfig/*.pc
-
+++ /dev/null
-#!/usr/bin/make -f
-# -*- makefile -*-
-# Sample debian/rules that uses debhelper.
-# This file was originally written by Joey Hess and Craig Small.
-# As a special exception, when this file is copied by dh-make into a
-# dh-make output file, you may use that output file without restriction.
-# This special exception was added by Craig Small in version 0.37 of dh-make.
-
-# Uncomment this to turn on verbose mode.
-#export DH_VERBOSE=1
-
-
-# These are used for cross-compiling and for saving the configure script
-# from having to guess our platform (since we know it already)
-DEB_HOST_GNU_TYPE ?= $(shell dpkg-architecture -qDEB_HOST_GNU_TYPE)
-DEB_BUILD_GNU_TYPE ?= $(shell dpkg-architecture -qDEB_BUILD_GNU_TYPE)
-
-CFLAGS ?= -Wall -g
-LDFLAGS ?=
-PREFIX ?= /usr
-DATADIR ?= /opt
-
-ifneq (,$(findstring noopt,$(DEB_BUILD_OPTIONS)))
- CFLAGS += -O0
-else
- CFLAGS += -O2
-endif
-
-LDFLAGS += -Wl,--rpath=$(PREFIX)/lib -Wl,--as-needed
-
-configure: configure-stamp
-configure-stamp:
- dh_testdir
- # Add here commands to configure the package.
- CFLAGS="$(CFLAGS)" CXXFLAGS="$(CXXFLAGS)" LDFLAGS="$(LDFLAGS)" cmake . -DCMAKE_INSTALL_PREFIX=$(PREFIX)
- touch configure-stamp
-
-build: build-stamp
-
-build-stamp: configure-stamp
- dh_testdir
-
- # Add here commands to compile the package.
- $(MAKE)
- #docbook-to-man debian/ncurses.sgml > ncurses.1
-
- for f in `find $(CURDIR)/debian/ -name "*.in"`; do \
- cat $$f > $${f%.in}; \
- sed -i -e "s#@PREFIX@#$(PREFIX)#g" $${f%.in}; \
- done
-
- touch $@
-
-clean:
- dh_testdir
- dh_testroot
- rm -f build-stamp configure-stamp
-
- # Add here commands to clean up after the build process.
- -$(MAKE) clean
- rm -rf CMakeCache.txt
- rm -rf CMakeFiles
- rm -rf cmake_install.cmake
- rm -rf Makefile
- rm -rf install_manifest.txt
- rm -rf *.pc
-
- for f in `find $(CURDIR)/debian/ -name "*.in"`; do \
- rm -f $${f%.in}; \
- done
- dh_clean
-
-install: build
- dh_testdir
- dh_testroot
- dh_clean -k
- dh_installdirs
-
- # Add here commands to install the package into debian/ncurses.
- $(MAKE) DESTDIR=$(CURDIR)/debian/tmp install
-
-# Build architecture-independent files here.
-binary-indep: build install
-# We have nothing to do by default.
-
-# Build architecture-dependent files here.
-binary-arch: build install
- dh_testdir
- dh_testroot
- dh_installexamples
- dh_install --sourcedir=debian/tmp
- dh_installman
- dh_link
-# dh_strip --dbg-package=libcryptsvc-dbg
- dh_compress
- dh_fixperms
- dh_makeshlibs
- dh_installdeb
- dh_shlibdeps
- dh_gencontrol
- dh_md5sums
- dh_builddeb
-
-binary: binary-indep binary-arch
-.PHONY: build clean binary-indep binary-arch binary install
+++ /dev/null
-Name: libcryptsvc
-Summary: nothing
-Version: 0.0.1
-Release: 6
-VCS: magnolia/framework/security/libcryptsvc#submit/master/20130306.011315-19-gac48e818bbb9d2187644955595f303887609bc64
-Group: Osp/Security
-License: APLv2
-Source0: %{name}-%{version}.tar.gz
-BuildRequires: cmake
-
-BuildRequires: pkgconfig(dlog)
-BuildRequires: pkgconfig(openssl)
-
-%description
-
-%package devel
-Summary: nothing
-Group: Bada/Security
-Requires: %{name} = %{version}-%{release}
-
-%description devel
-
-%prep
-%setup -q
-
-%build
-%if 0%{?tizen_build_binary_release_type_eng}
-export CFLAGS="$CFLAGS -DTIZEN_ENGINEER_MODE"
-export CXXFLAGS="$CXXFLAGS -DTIZEN_ENGINEER_MODE"
-export FFLAGS="$FFLAGS -DTIZEN_ENGINEER_MODE"
-%endif
-
-MAJORVER=`echo %{version} | awk 'BEGIN {FS="."}{print $1}'`
-%ifarch %{ix86}
-cmake . -DCMAKE_INSTALL_PREFIX=%{_prefix} -DARCH=x86 -DFULLVER=%{version} -DMAJORVER=${MAJORVER} -DDESCRIPTION=%{summary}
-%else
-cmake . -DCMAKE_INSTALL_PREFIX=%{_prefix} -DARCH=arm -DFULLVER=%{version} -DMAJORVER=${MAJORVER} -DDESCRIPTION=%{summary}
-%endif
-make %{?jobs:-j%jobs}
-
-%install
-rm -rf %{buildroot}
-mkdir -p %{buildroot}/usr/share/license
-cat LICENSE.APLv2 > %{buildroot}/usr/share/license/%{name}
-
-%make_install
-
-%files
-%manifest libcryptsvc.manifest
-%{_libdir}/*.so*
-%{_datadir}/license/%{name}
-%attr(755,root,app) /opt/etc/duid-gadget
-
-%files devel
-%{_includedir}/*
-%{_libdir}/pkgconfig/cryptsvc.pc
-Name: libcryptsvc
-Summary: nothing
+Name : libcryptsvc
+Summary: nothing
Version: 0.0.1
Release: 6
-VCS: magnolia/framework/security/libcryptsvc#submit/master/20130306.011315-19-gac48e818bbb9d2187644955595f303887609bc64
-Group: Osp/Security
-License: APLv2
+Group : Tizen/Security
+License: Apache-2.0
Source0: %{name}-%{version}.tar.gz
-
-
-%if "%{_repository}" == "wearable"
-
BuildRequires: cmake
-
BuildRequires: pkgconfig(dlog)
BuildRequires: pkgconfig(openssl)
%package devel
Summary: nothing
-Group: Bada/Security
+Group : Tizen/Security
Requires: %{name} = %{version}-%{release}
%description devel
%setup -q
%build
-
-echo "########################################"
-echo "TIZEN_PROFILE_WEARABLE"
-echo "########################################"
-cp -R modules_wearable/* .
-
-%if 0%{?tizen_build_binary_release_type_eng}
export CFLAGS="$CFLAGS -DTIZEN_ENGINEER_MODE"
export CXXFLAGS="$CXXFLAGS -DTIZEN_ENGINEER_MODE"
export FFLAGS="$FFLAGS -DTIZEN_ENGINEER_MODE"
-%endif
MAJORVER=`echo %{version} | awk 'BEGIN {FS="."}{print $1}'`
%ifarch %{ix86}
%files devel
%{_includedir}/*
%{_libdir}/pkgconfig/cryptsvc.pc
-
-%else
-
-BuildRequires: cmake
-
-BuildRequires: pkgconfig(dlog)
-BuildRequires: pkgconfig(openssl)
-
-%description
-
-%package devel
-Summary: nothing
-Group: Bada/Security
-Requires: %{name} = %{version}-%{release}
-
-%description devel
-
-%prep
-%setup -q
-
-%build
-
-echo "########################################"
-echo "TIZEN_PROFILE_MOBILE"
-echo "########################################"
-cp -R modules_mobile/* .
-
-MAJORVER=`echo %{version} | awk 'BEGIN {FS="."}{print $1}'`
-%ifarch %{ix86}
-cmake . -DCMAKE_INSTALL_PREFIX=%{_prefix} -DARCH=x86 -DFULLVER=%{version} -DMAJORVER=${MAJORVER} -DDESCRIPTION=%{summary}
-%else
-cmake . -DCMAKE_INSTALL_PREFIX=%{_prefix} -DARCH=arm -DFULLVER=%{version} -DMAJORVER=${MAJORVER} -DDESCRIPTION=%{summary}
-%endif
-make %{?jobs:-j%jobs}
-
-%install
-rm -rf %{buildroot}
-mkdir -p %{buildroot}/usr/share/license
-cat LICENSE.APLv2 > %{buildroot}/usr/share/license/%{name}
-cat LICENSE.Flora >> %{buildroot}/usr/share/license/%{name}
-
-%make_install
-
-%files
-%{_libdir}/*.so*
-%{_datadir}/license/%{name}
-
-%files devel
-%{_includedir}/*
-%{_libdir}/pkgconfig/cryptsvc.pc
-
-
-
-%endif
\ No newline at end of file
char* pId = NULL;
char* pDuid = NULL;
char info[] = {0xca, 0xfe, 0xbe, 0xbe, 0x78, 0x07, 0x02, 0x03};
+ char *pKeyVersion = NULL;
+ const char *version = "1.0#";
if(idSize <= 0)
{
pId = Base64Encoding(pDuid, idSize);
+ pKeyVersion = (char*)calloc(strlen(pId)+strlen(version)+1, sizeof(char));
+ strncpy(pKeyVersion, version, strlen(version));
+ strncat(pKeyVersion, pId, strlen(pId));
+
+ free(pId);
free(pKey);
free(pDuid);
- return pId;
+ return pKeyVersion;
}