From: Przemyslaw Ciezkowski Date: Mon, 11 May 2015 10:09:37 +0000 (+0200) Subject: [KeyManager] Added permission checks X-Git-Tag: submit/tizen_tv/20150603.064601~1^2~38 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=83d94e7ce125535715470b49a69216587a736845;p=platform%2Fcore%2Fapi%2Fwebapi-plugins.git [KeyManager] Added permission checks Change-Id: Icc7fd601fb43e3ee1c38766bf7d51e0f256242bd Signed-off-by: Przemyslaw Ciezkowski --- diff --git a/src/keymanager/keymanager_api.js b/src/keymanager/keymanager_api.js index 87390da4..45a0deee 100644 --- a/src/keymanager/keymanager_api.js +++ b/src/keymanager/keymanager_api.js @@ -80,6 +80,7 @@ function Key(name, password, extractable, keyType, rawKey) { } Key.prototype.save = function() { + xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER); var args = validator.validateArgs(arguments, [ { name: 'rawKey', @@ -114,6 +115,7 @@ Key.prototype.save = function() { }; Key.prototype.remove = function() { + xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER); var ret = native.callSync('KeyManager_removeKey', { key: this }); @@ -144,6 +146,7 @@ function Certificate(name, password, extractable, rawCert) { } Certificate.prototype.save = function() { + xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER); var args = validator.validateArgs(arguments, [ { name: 'rawCert', @@ -177,6 +180,7 @@ Certificate.prototype.save = function() { }; Certificate.prototype.loadFromFile = function() { + xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER); var args = validator.validateArgs(arguments, [ { name: 'fileURI', @@ -216,6 +220,7 @@ Certificate.prototype.loadFromFile = function() { }; Certificate.prototype.remove = function() { + xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER); var ret = native.callSync('KeyManager_removeCertificate', { certificate: this }); @@ -246,6 +251,7 @@ function Data(name, password, extractable, rawData) { } Data.prototype.save = function() { + xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER); var args = validator.validateArgs(arguments, [ { name: 'rawData', @@ -279,6 +285,7 @@ Data.prototype.save = function() { }; Data.prototype.remove = function() { + xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER); var ret = native.callSync('KeyManager_removeData', { data: this }); @@ -292,6 +299,7 @@ function KeyManager() { } KeyManager.prototype.generateKeyPair = function() { + xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER); var args = validator.validateArgs(arguments, [ { name: "privKeyName", @@ -352,6 +360,7 @@ KeyManager.prototype.generateKeyPair = function() { }; KeyManager.prototype.loadFromPKCS12File = function() { + xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER); var args = validator.validateArgs(arguments, [ { name: 'fileURI', @@ -398,6 +407,7 @@ KeyManager.prototype.loadFromPKCS12File = function() { }; KeyManager.prototype.getKey = function() { + xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER); var args = validator.validateArgs(arguments, [ { name: "name", @@ -422,6 +432,7 @@ KeyManager.prototype.getKey = function() { }; KeyManager.prototype.getKeyAliasList = function() { + xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER); var ret = native.callSync('KeyManager_getKeyAliasList', {}); if (native.isFailure(ret)) { throw native.getErrorObject(ret); @@ -430,6 +441,7 @@ KeyManager.prototype.getKeyAliasList = function() { }; KeyManager.prototype.getCertificate = function() { + xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER); var args = validator.validateArgs(arguments, [ { name: "name", @@ -453,6 +465,7 @@ KeyManager.prototype.getCertificate = function() { }; KeyManager.prototype.getCertificatesAliasList = function() { + xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER); var ret = native.callSync('KeyManager_getCertificatesAliasList', {}); if (native.isFailure(ret)) { throw native.getErrorObject(ret); @@ -461,6 +474,7 @@ KeyManager.prototype.getCertificatesAliasList = function() { }; KeyManager.prototype.getData = function() { + xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER); var args = validator.validateArgs(arguments, [ { name: "name", @@ -484,6 +498,7 @@ KeyManager.prototype.getData = function() { }; KeyManager.prototype.getDataAliasList = function() { + xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER); var ret = native.callSync('KeyManager_getDataAliasList', {}); if (native.isFailure(ret)) { throw native.getErrorObject(ret); @@ -492,6 +507,7 @@ KeyManager.prototype.getDataAliasList = function() { }; KeyManager.prototype.allowAccessControl = function() { + xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER); var args = validator.validateArgs(arguments, [ { name: "dataName", @@ -532,6 +548,7 @@ KeyManager.prototype.allowAccessControl = function() { }; KeyManager.prototype.denyAccessControl = function() { + xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER); var args = validator.validateArgs(arguments, [ { name: "dataName", @@ -566,6 +583,7 @@ KeyManager.prototype.denyAccessControl = function() { }; KeyManager.prototype.createSignature = function() { + xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER); var args = validator.validateArgs(arguments, [ { name: "message", @@ -621,6 +639,7 @@ KeyManager.prototype.createSignature = function() { }; KeyManager.prototype.verifySignature = function() { + xwalk.utils.checkPrivilegeAccess(xwalk.utils.privilege.KEYMANAGER); var args = validator.validateArgs(arguments, [ { name: "signature", diff --git a/src/utils/utils_api.js b/src/utils/utils_api.js index 239e7d32..f28571d6 100644 --- a/src/utils/utils_api.js +++ b/src/utils/utils_api.js @@ -93,6 +93,7 @@ function Utils() { FILESYSTEM_WRITE: 'http://tizen.org/privilege/filesystem.write', HEALTHINFO: 'http://tizen.org/privilege/healthinfo', INTERNET: 'http://tizen.org/privilege/internet', + KEYMANAGER: 'http://tizen.org/privilege/keymanager', LED: 'http://tizen.org/privilege/led', LOCATION: 'http://tizen.org/privilege/location', MEDIACONTROLLER_READ: 'http://tizen.org/privilege/mediacontroller.read',