ADD_DEFINITIONS("-DCERTSVC_DIR=\"${TZ_SYS_SHARE}/cert-svc/certs/\"")
ADD_DEFINITIONS("-DCERTSVC_PKCS12_STORAGE_DIR=\"${TZ_SYS_SHARE}/cert-svc/pkcs12/\"")
ADD_DEFINITIONS("-DSYSTEM_CERT_DIR=\"${TZ_SYS_ETC}/ssl/certs/\"")
-ADD_DEFINITIONS("-DCERTSVC_SSL_CERTS_DIR=\"${TZ_SYS_SHARE}/cert-svc/certs/ssl/\"")
CONFIGURE_FILE(cert-svc.pc.in cert-svc.pc @ONLY)
CONFIGURE_FILE(cert-svc-vcore.pc.in cert-svc-vcore.pc @ONLY)
ln -s ../cert-server.service %{buildroot}%{_unitdir}/multi-user.target.wants/
ln -s ../cert-server.socket %{buildroot}%{_unitdir}/sockets.target.wants/
-ln -sf %{TZ_SYS_ETC}/ssl/certs %{buildroot}%{TZ_SYS_SHARE}/cert-svc/certs/ssl
-
%clean
rm -rf %{buildroot}
%{TZ_SYS_SHARE}/cert-svc/certs/trusteduser
%{TZ_SYS_SHARE}/cert-svc/pkcs12
%{TZ_SYS_SHARE}/cert-svc/dbspace
-%{TZ_SYS_SHARE}/cert-svc/certs/ssl
%files devel
continue;
len = strlen((const char *)(ftsent->fts_path));
- if (strcmp((ftsent->fts_path + len - strlen(".pem")), ".pem") != 0)
+ if (strcmp((ftsent->fts_path + len - strlen(".pem")), ".pem") != 0
+ && strcmp((ftsent->fts_path + len - strlen(".der")), ".der") != 0)
continue;
el = (cert_svc_filename_list*)malloc(sizeof(cert_svc_filename_list));
int get_all_certificates(cert_svc_filename_list** allCerts)
{
int ret;
- char *buffer[2];
+ char *buffer[3];
buffer[0] = ROOT_CA_CERTS_DIR;
- buffer[1] = NULL;
+ buffer[1] = CERTSVC_DIR;
+ buffer[2] = NULL;
if (!allCerts) {
SLOGE("[ERR][%s] Invalid argument.", __func__);
memset(pathLocation, 0x00, sizeof(pathLocation));
if(location == NULL) { // use default path
- strncpy(buf, CERTSVC_SSL_CERTS_DIR, sizeof(buf) - 1);
+ strncpy(buf, SYSTEM_CERT_DIR, sizeof(buf) - 1);
}
else {
int locSize = strlen(location) + strlen(CERTSVC_DIR);
goto free_memory;
}
- res = X509_STORE_load_locations(cert_store, NULL, CERTSVC_SSL_CERTS_DIR);
+ res = X509_STORE_load_locations(cert_store, NULL, SYSTEM_CERT_DIR);
if (res != 1) {
SLOGE("P12 load certificate store failed");
result = CERTSVC_FAIL;