PA_ERR_FORKED, /**< The caller forked without calling execve() and tried to reuse the context. \since 0.9.15 */
PA_ERR_IO, /**< An IO error happened. \since 0.9.16 */
PA_ERR_BUSY, /**< Device or resource busy. \since 0.9.17 */
-#ifdef __TIZEN__
- PA_ERR_ACCESS_BY_SECURITY, /**< Access failure by security */
-#endif
PA_ERR_MAX /**< Not really an error but the first invalid error code */
} pa_error_code_t;
#define PA_ERR_OBSOLETE PA_ERR_OBSOLETE
#define PA_ERR_NOTIMPLEMENTED PA_ERR_NOTIMPLEMENTED
#define PA_ERR_FORKED PA_ERR_FORKED
-#ifdef __TIZEN__
-#define PA_ERR_ACCESS_BY_SECURITY PA_ERR_ACCESS_BY_SECURITY
-#endif
#define PA_ERR_MAX PA_ERR_MAX
/** \endcond */
[PA_ERR_FORKED] = N_("Client forked"),
[PA_ERR_IO] = N_("Input/Output error"),
[PA_ERR_BUSY] = N_("Device or resource busy")
-#ifdef __TIZEN__
- ,[PA_ERR_ACCESS_BY_SECURITY] = N_("Access denied by security check")
-#endif
};
pa_init_i18n();
pa_log_info("is virtual stream : %s", pa_yes_no(is_virtual_stream));
if (!is_virtual_stream) {
CHECK_VALIDITY(c->pstream, cynara_check_privilege(_get_connection_out_fd(c), RECORDER_PRIVILEGE),
- tag, PA_ERR_ACCESS_BY_SECURITY);
+ tag, PA_ERR_ACCESS);
}
#endif /* USE_SECURITY */
#ifdef USE_SECURITY
CHECK_VALIDITY(c->pstream, cynara_check_privilege(_get_connection_out_fd(c), VOLUME_SET_PRIVILEGE),
- tag, PA_ERR_ACCESS_BY_SECURITY);
+ tag, PA_ERR_ACCESS);
#endif /* USE_SECURITY */
switch (command) {
CHECK_VALIDITY(c->pstream, !name || idx == PA_INVALID_INDEX, tag, PA_ERR_INVALID);
#ifdef USE_SECURITY
CHECK_VALIDITY(c->pstream, cynara_check_privilege(_get_connection_out_fd(c), VOLUME_SET_PRIVILEGE),
- tag, PA_ERR_ACCESS_BY_SECURITY);
+ tag, PA_ERR_ACCESS);
#endif /* USE_SECURITY */
switch (command) {
CHECK_VALIDITY(c->pstream, (idx != PA_INVALID_INDEX) ^ (name != NULL), tag, PA_ERR_INVALID);
#ifdef USE_SECURITY
CHECK_VALIDITY(c->pstream, cynara_check_privilege(_get_connection_out_fd(c), VOLUME_SET_PRIVILEGE),
- tag, PA_ERR_ACCESS_BY_SECURITY);
+ tag, PA_ERR_ACCESS);
#endif /* USE_SECURITY */
switch (command) {