From: BogonKim Date: Tue, 26 Jul 2016 02:20:54 +0000 (+0900) Subject: featuring out tizen specific features using __TIZEN__ macro X-Git-Tag: submit/tizen/20160809.044605~2 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=d06ccbba5bf304fa90b0cf8dd9fd5b8afc36955e;p=platform%2Fcore%2Fsecurity%2Fprivilege-checker.git featuring out tizen specific features using __TIZEN__ macro Change-Id: I83e667cb952eac608ecbf140b217ed71861bb0db Signed-off-by: BogonKim --- diff --git a/capi/CMakeLists.txt b/capi/CMakeLists.txt index 7b89dbd..1c2deb4 100644 --- a/capi/CMakeLists.txt +++ b/capi/CMakeLists.txt @@ -20,7 +20,7 @@ FOREACH(flag ${${fw_name}_CFLAGS}) SET(EXTRA_CFLAGS "${EXTRA_CFLAGS} ${flag}") ENDFOREACH(flag) -SET(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} ${EXTRA_CFLAGS} -fPIC") +SET(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} ${EXTRA_CFLAGS} -fPIC -D__TIZEN__") SET(CMAKE_C_FLAGS_DEBUG "-O0 -g") IF("${ARCH}" STREQUAL "arm") diff --git a/capi/src/privilege_db_manager.c b/capi/src/privilege_db_manager.c index 924e5c8..0bb207a 100755 --- a/capi/src/privilege_db_manager.c +++ b/capi/src/privilege_db_manager.c @@ -1,13 +1,27 @@ #include "privilege_db_manager.h" #include -#include #include #include +#include + +#ifdef __TIZEN__ +#include #ifdef LOG_TAG #undef LOG_TAG #define LOG_TAG "PRIVILEGE_DB_MANAGER" +#define _LOGE(fmt, arg...) LOGE(fmt, ##arg) +#define _LOGD(fmt, arg...) LOGD(fmt, ##arg) +#define _LOGW(fmt, arg...) LOGW(fmt, ##arg) +#define _LOGI(fmt, arg...) LOGI(fmt, ##arg) +#endif +#else +#define _LOGE(fmt, arg...) +#define _LOGD(fmt, arg...) +#define _LOGW(fmt, arg...) +#define _LOGI(fmt, arg...) #endif + typedef enum { PRIVILEGE_DB_MANAGER_PROFILE_TYPE_COMMON = 0, PRIVILEGE_DB_MANAGER_PROFILE_TYPE_MOBILE = 1, @@ -27,7 +41,7 @@ static privilege_db_manager_profile_type_e g_privilege_db_manager_profile_type = #define TryReturn(condition, expr, returnValue, ...) \ if (!(condition)) { \ - LOGE(__VA_ARGS__); \ + _LOGE(__VA_ARGS__); \ expr; \ return returnValue; \ } @@ -56,13 +70,13 @@ int __initialize_db(char type, sqlite3 ** db, privilege_db_manager_package_type_ db_path = PRIVILEGE_POLICY_DB_PATH; break; default: - LOGE("Undefined db initialize mode!"); + _LOGE("Undefined db initialize mode!"); return PRIVILEGE_DB_MANAGER_ERR_INVALID_TYPE; } - LOGD("DB PATH = %s", db_path); + _LOGD("DB PATH = %s", db_path); int ret = sqlite3_open_v2(db_path, db, db_mode, NULL); if (ret != SQLITE_OK) { - LOGE("[DB_FAIL] Can't open database %s : %s", db_path, sqlite3_errmsg(*db)); + _LOGE("[DB_FAIL] Can't open database %s : %s", db_path, sqlite3_errmsg(*db)); sqlite3_close(*db); return PRIVILEGE_DB_MANAGER_ERR_CONNECTION_FAIL; } @@ -98,7 +112,7 @@ int __make_privilege_list_str(GList *privilege_list, char** privilege_list_str) int __get_db_error(int ret) { - LOGE("[PRIVILEGE_DB_MANAGER_ERR_DB_FAIL] %s", sqlite3_errstr(ret)); + _LOGE("[PRIVILEGE_DB_MANAGER_ERR_DB_FAIL] %s", sqlite3_errstr(ret)); switch (ret) { case SQLITE_BUSY: ret = PRIVILEGE_DB_MANAGER_ERR_DB_BUSY_FAIL; @@ -129,14 +143,14 @@ int privilege_db_manager_check_black_list(int uid, privilege_db_manager_package_ char *privilege_list_str = NULL; ret = __make_privilege_list_str(privilege_list, &privilege_list_str); - LOGD("check black list with uid = %d, package_type = %d, privilege_list = %s", uid, package_type, privilege_list_str); + _LOGD("check black list with uid = %d, package_type = %d, privilege_list = %s", uid, package_type, privilege_list_str); char *sql = sqlite3_mprintf("select distinct privilege_name from black_list where privilege_name in(%s)and uid=%d and package_type=%d", privilege_list_str, uid, package_type); sqlite3_free(privilege_list_str); TryReturn(sql != NULL, __finalize_db(db, stmt, sql), PRIVILEGE_DB_MANAGER_ERR_INVALID_QUERY, "[DB_FAIL] sqlite3_mprintf failed"); ret = sqlite3_prepare_v2(db, sql, strlen(sql), &stmt, NULL); if (ret != SQLITE_OK) { - LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); + _LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); __finalize_db(db, stmt, sql); return PRIVILEGE_DB_MANAGER_ERR_INVALID_QUERY; } @@ -147,9 +161,6 @@ int privilege_db_manager_check_black_list(int uid, privilege_db_manager_package_ ++count; } while (ret == SQLITE_ROW); - if (count > 0) - LOGE("Privilege list contains banned privileges!"); - __finalize_db(db, stmt, sql); return count; @@ -189,7 +200,7 @@ int privilege_db_manager_get_privilege_list(const char *api_version, privilege_d ret = sqlite3_prepare_v2(db, sql, strlen(sql), &stmt, NULL); if (ret != SQLITE_OK) { - LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); + _LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); __finalize_db(db, stmt, sql); return PRIVILEGE_DB_MANAGER_ERR_INVALID_QUERY; } @@ -273,7 +284,7 @@ int privilege_db_manager_get_mapped_privilege_list(const char *api_version, priv ret = sqlite3_prepare_v2(db, sql, strlen(sql), &stmt, NULL); if (ret != SQLITE_OK) { - LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); + _LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); __finalize_db(db, stmt, sql); return PRIVILEGE_DB_MANAGER_ERR_INVALID_QUERY; } @@ -311,7 +322,7 @@ int privilege_db_manager_get_privacy_display(const char *privacy, char **privacy ret = sqlite3_step(stmt); if (ret == SQLITE_ROW) { - LOGD("privacy display = %s", (char*) sqlite3_column_text(stmt, 0)); + _LOGD("privacy display = %s", (char*) sqlite3_column_text(stmt, 0)); *privacy_display = strdup((char*)sqlite3_column_text(stmt, 0)); TryReturn(*privacy_display != NULL, __finalize_db(db, stmt, sql), PRIVILEGE_DB_MANAGER_ERR_OUT_OF_MEMORY, "[PRIVILEGE_DB_MANAGER_ERR_OUT_OF_MEMORY] privilege_name's strdup is failed."); __finalize_db(db, stmt, sql); @@ -344,14 +355,14 @@ int privilege_db_manager_get_privilege_display(privilege_db_manager_package_type ret = sqlite3_prepare_v2(db, sql, strlen(sql), &stmt, NULL); if (ret != SQLITE_OK) { - LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); + _LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); __finalize_db(db, stmt, sql); return PRIVILEGE_DB_MANAGER_ERR_INVALID_QUERY; } ret = sqlite3_step(stmt); if (ret == SQLITE_ROW) { - LOGD("privilege_display = %s", (char *)sqlite3_column_text(stmt, 0)); + _LOGD("privilege_display = %s", (char *)sqlite3_column_text(stmt, 0)); *privilege_display = strdup((char *)sqlite3_column_text(stmt, 0)); TryReturn(*privilege_display != NULL, __finalize_db(db, stmt, sql), PRIVILEGE_DB_MANAGER_ERR_OUT_OF_MEMORY, "[PRIVILEGE_DB_MANAGER_ERR_OUT_OF_MEMORY] privilege_name's strdup is failed."); @@ -383,14 +394,14 @@ int privilege_db_manager_get_privilege_description(privilege_db_manager_package_ ret = sqlite3_prepare_v2(db, sql, strlen(sql), &stmt, NULL); if (ret != SQLITE_OK) { - LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); + _LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); __finalize_db(db, stmt, sql); return PRIVILEGE_DB_MANAGER_ERR_INVALID_QUERY; } ret = sqlite3_step(stmt); if (ret == SQLITE_ROW) { - LOGD("privilege_description = %s", (char *)sqlite3_column_text(stmt, 0)); + _LOGD("privilege_description = %s", (char *)sqlite3_column_text(stmt, 0)); *privilege_description = strdup((char *)sqlite3_column_text(stmt, 0)); TryReturn(*privilege_description != NULL, __finalize_db(db, stmt, sql), PRIVILEGE_DB_MANAGER_ERR_OUT_OF_MEMORY, "[PRIVILEGE_DB_MANAGER_ERR_OUT_OF_MEMORY] privilege_name's strdup is failed."); @@ -419,7 +430,7 @@ int privilege_db_manager_get_privilege_group_display(privilege_db_manager_packag TryReturn(sql != NULL, __finalize_db(db, stmt, sql), PRIVILEGE_DB_MANAGER_ERR_INVALID_QUERY, "[DB_FAIL] sqlite3_mprintf failed"); ret = sqlite3_prepare_v2(db, sql, strlen(sql), &stmt, NULL); if (ret != SQLITE_OK) { - LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); + _LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); __finalize_db(db, stmt, sql); return PRIVILEGE_DB_MANAGER_ERR_INVALID_QUERY; } @@ -427,7 +438,7 @@ int privilege_db_manager_get_privilege_group_display(privilege_db_manager_packag ret = sqlite3_step(stmt); if (ret == SQLITE_ROW) { *privilege_group_number = (int)sqlite3_column_int(stmt, 0); - LOGD("privilege_group_number = %d", *privilege_group_number); + _LOGD("privilege_group_number = %d", *privilege_group_number); __finalize_db(db, stmt, sql); return PRIVILEGE_DB_MANAGER_ERR_NONE; @@ -453,7 +464,7 @@ int privilege_db_manager_is(char type, const char* privilege) ret = sqlite3_step(stmt); if (ret == SQLITE_ROW) { - LOGD("privilege: %s, is-privacy : %d, is-internal : %d", (char*)sqlite3_column_text(stmt, 0), sqlite3_column_int(stmt, 1), sqlite3_column_int(stmt, 2)); + _LOGD("privilege: %s, is-privacy : %d, is-internal : %d", (char*)sqlite3_column_text(stmt, 0), sqlite3_column_int(stmt, 1), sqlite3_column_int(stmt, 2)); switch (type) { case 'v': res = 1; @@ -465,11 +476,11 @@ int privilege_db_manager_is(char type, const char* privilege) res = sqlite3_column_int(stmt, 2); break; default: - LOGE("Undefined type for privilege_db_manager_is()"); + _LOGE("Undefined type for privilege_db_manager_is()"); return PRIVILEGE_DB_MANAGER_ERR_INVALID_TYPE; } } else if (ret == SQLITE_DONE) { - LOGD("[PRIVILEGE_DB_MANAGER] NO DATA TO READ. %s is invalid privilege. ret = %d", privilege, ret); + _LOGD("[PRIVILEGE_DB_MANAGER] NO DATA TO READ. %s is invalid privilege. ret = %d", privilege, ret); } else { res = -1; } @@ -494,7 +505,7 @@ int __privilege_db_manager_get_privacy_list(GList **privacy_list) TryReturn(sql != NULL, __finalize_db(db, stmt, sql), PRIVILEGE_DB_MANAGER_ERR_INVALID_QUERY, "[DB_FAIL] sqlite3_mprintf failed"); ret = sqlite3_prepare_v2(db, sql, strlen(sql), &stmt, NULL); if (ret != SQLITE_OK) { - LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); + _LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); __finalize_db(db, stmt, sql); return PRIVILEGE_DB_MANAGER_ERR_INVALID_QUERY; } @@ -528,7 +539,7 @@ int __privilege_db_manager_get_privilege_list_by_privacy(const char* privacy, GL TryReturn(sql != NULL, __finalize_db(db, stmt, sql), PRIVILEGE_DB_MANAGER_ERR_INVALID_QUERY, "[DB_FAIL] sqlite3_mprintf failed"); ret = sqlite3_prepare_v2(db, sql, strlen(sql), &stmt, NULL); if (ret != SQLITE_OK) { - LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); + _LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); __finalize_db(db, stmt, sql); return PRIVILEGE_DB_MANAGER_ERR_INVALID_QUERY; } @@ -557,12 +568,12 @@ int privilege_db_manager_get_black_list(int uid, privilege_db_manager_package_ty int ret = __initialize_db('p', &db, package_type); if (ret != PRIVILEGE_DB_MANAGER_ERR_NONE) return ret; - LOGD("Get privilege_name from black_list where uid = %d, package_type = %d", uid, package_type); + _LOGD("Get privilege_name from black_list where uid = %d, package_type = %d", uid, package_type); char* sql = sqlite3_mprintf("select privilege_name from black_list where uid=%d and package_type=%d", uid, package_type); TryReturn(sql != NULL, __finalize_db(db, stmt, sql), PRIVILEGE_DB_MANAGER_ERR_INVALID_QUERY, "[DB_FAIL] sqlite3_mprintf failed"); ret = sqlite3_prepare_v2(db, sql, strlen(sql), &stmt, NULL); if (ret != SQLITE_OK) { - LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); + _LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); __finalize_db(db, stmt, sql); return PRIVILEGE_DB_MANAGER_ERR_INVALID_QUERY; } @@ -572,10 +583,10 @@ int privilege_db_manager_get_black_list(int uid, privilege_db_manager_package_ty ret = sqlite3_step(stmt); if (ret == SQLITE_ROW) { char *privilege_name = strdup((char *)sqlite3_column_text(stmt, 0)); - LOGE("privilege name: %s", privilege_name); + _LOGE("privilege name: %s", privilege_name); temp_privilege_list = g_list_append(temp_privilege_list, privilege_name); } else if (ret != SQLITE_DONE) { - LOGE("ret = %d", ret); + _LOGE("ret = %d", ret); } } while (ret == SQLITE_ROW); @@ -598,12 +609,12 @@ int privilege_db_manager_set_black_list(int uid, privilege_db_manager_package_ty GList *l = NULL; for (l = privilege_list; l != NULL; l = l->next) { char *privilege_name = (char *)l->data; - LOGD("insert uid = %d, package_type = %d, privilege_name = %s", uid, package_type, privilege_name); + _LOGD("insert uid = %d, package_type = %d, privilege_name = %s", uid, package_type, privilege_name); char* sql = sqlite3_mprintf("insert or ignore into black_list (uid, package_type, privilege_name) values (%d, %d, %Q)", uid, package_type, privilege_name); TryReturn(sql != NULL, sqlite3_exec(db, "ROLLBACK TRANSACTION", NULL, NULL, NULL); __finalize_db(db, stmt, sql), PRIVILEGE_DB_MANAGER_ERR_INVALID_QUERY, "[DB_FAIL] sqlite3_mprintf failed"); ret = sqlite3_prepare_v2(db, sql, strlen(sql), &stmt, NULL); if (ret != SQLITE_OK) { - LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); + _LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); sqlite3_exec(db, "ROLLBACK TRANSACTION", NULL, NULL, NULL); __finalize_db(db, stmt, sql); return PRIVILEGE_DB_MANAGER_ERR_INVALID_QUERY; @@ -635,12 +646,12 @@ int privilege_db_manager_unset_black_list(int uid, privilege_db_manager_package_ GList *l = NULL; for (l = privilege_list; l != NULL; l = l->next) { char *privilege_name = (char *)l->data; - LOGD("delete from black_list where uid = %d, package_type = %d, privilege_name = %s", uid, package_type, privilege_name); + _LOGD("delete from black_list where uid = %d, package_type = %d, privilege_name = %s", uid, package_type, privilege_name); char* sql = sqlite3_mprintf("delete from black_list where uid=%d and package_type=%d and privilege_name=%Q", uid, package_type, privilege_name); TryReturn(sql != NULL, sqlite3_exec(db, "ROLLBACK TRANSACTION", NULL, NULL, NULL); __finalize_db(db, stmt, sql), PRIVILEGE_DB_MANAGER_ERR_INVALID_QUERY, "[DB_FAIL] sqlite3_mprintf failed"); ret = sqlite3_prepare_v2(db, sql, strlen(sql), &stmt, NULL); if (ret != SQLITE_OK) { - LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); + _LOGE("[DB_FAIL] fail to prepare database : %s", sqlite3_errmsg(db)); sqlite3_exec(db, "ROLLBACK TRANSACTION", NULL, NULL, NULL); __finalize_db(db, stmt, sql); return PRIVILEGE_DB_MANAGER_ERR_INVALID_QUERY; diff --git a/capi/src/privilege_manager.c b/capi/src/privilege_manager.c index b7e1030..4c1188e 100755 --- a/capi/src/privilege_manager.c +++ b/capi/src/privilege_manager.c @@ -1,17 +1,29 @@ -#include #include #include #include #include +#include #include "privilege_db_manager.h" #include "privilege_manager.h" -#define MESSAGE_SIZE 512 - +#ifdef __TIZEN__ +#include #ifdef LOG_TAG #undef LOG_TAG #define LOG_TAG "PRIVILEGE_MANAGER" +#define _LOGE(fmt, arg...) LOGE(fmt, ##arg) +#define _LOGD(fmt, arg...) LOGD(fmt, ##arg) +#define _LOGW(fmt, arg...) LOGW(fmt, ##arg) +#define _LOGI(fmt, arg...) LOGI(fmt, ##arg) #endif +#else +#define _LOGE(fmt, arg...) +#define _LOGD(fmt, arg...) +#define _LOGW(fmt, arg...) +#define _LOGI(fmt, arg...) +#endif + +#define MESSAGE_SIZE 512 #define API_VERSION_PADDING ".0.0" #define API_VERSION_PADDING_LEN strlen(API_VERSION_PADDING) @@ -19,7 +31,7 @@ #define TryReturn(condition, expr, returnValue, ...)\ if (!(condition)) { \ - LOGE(__VA_ARGS__); \ + _LOGE(__VA_ARGS__); \ expr; \ return returnValue; \ } @@ -62,8 +74,8 @@ static int __privilege_manager_check_privilege_list(const char *api_version, con for (l = valid_privilege_list; l != NULL; l = l->next) { privilege_info_db_row_s *privilege_info_db_row = (privilege_info_db_row_s *)l->data; if (strcmp(privilege_info_db_row->privilege_name, privilege) == 0) { - LOGD("Matched privilege name exist"); - LOGD("Check api version"); + _LOGD("Matched privilege name exist"); + _LOGD("Check api version"); if (tmp_api_version != NULL) { free(tmp_api_version); @@ -118,15 +130,13 @@ static int __privilege_manager_check_privilege_list(const char *api_version, con break; } - if (is_valid_version > 0) - LOGD("%s is invalid in tizen version: %s", privilege_info_db_row->privilege_name, api_version); - if (is_valid_version == 0) { *privilege_level = privilege_info_db_row->privilege_level_id; ret_val = PRVMGR_ERR_NONE; goto FINISH; } else if (is_valid_version == 1) { - LOGD("privilege deprecated version is equal to or lower than api version"); + _LOGD("%s is invalid in tizen version: %s", privilege_info_db_row->privilege_name, api_version); + _LOGD("privilege deprecated version is equal to or lower than api version"); if (*valid_api_version != NULL) { free(*valid_api_version); *valid_api_version = NULL; @@ -139,14 +149,15 @@ static int __privilege_manager_check_privilege_list(const char *api_version, con free(*changed_to); *changed_to = NULL; } - LOGD("%s was changed to %s.", privilege, privilege_info_db_row->changed_to); + _LOGD("%s was changed to %s.", privilege, privilege_info_db_row->changed_to); *changed_to = strdup(privilege_info_db_row->changed_to); TryReturn(changed_to != NULL, ret_val = PRVMGR_ERR_OUT_OF_MEMORY; goto FINISH, PRVMGR_ERR_OUT_OF_MEMORY, "[PRVMGR_ERR_OUT_OF_MEMORY] changed_to's strdup is failed."); } ret_val = PRVMGR_ERR_DEPRECATED_PRIVILEGE; } else if (is_valid_version == 2) { - LOGD("privilege issued version is higher than api version"); + _LOGD("%s is invalid in tizen version: %s", privilege_info_db_row->privilege_name, api_version); + _LOGD("privilege issued version is higher than api version"); if (*valid_api_version != NULL) { free(*valid_api_version); *valid_api_version = NULL; @@ -206,7 +217,7 @@ int __check_api_version_validity(const char *api_version) int privilege_manager_verify_privilege(const char *api_version, privilege_manager_package_type_e package_type, GList * privilege_list, privilege_manager_visibility_e visibility, char **error_message) { - LOGD("privilege_manager_verify_privilege called"); + _LOGD("privilege_manager_verify_privilege called"); GList *l; int ret; int ret_val = PRVMGR_ERR_NONE; @@ -226,7 +237,7 @@ int privilege_manager_verify_privilege(const char *api_version, privilege_manage /* Check invalid parameters */ if (api_version == NULL) { - LOGE("[PRVMGR_ERR_INVALID_PARAMETER] api_version is NULL"); + _LOGE("[PRVMGR_ERR_INVALID_PARAMETER] api_version is NULL"); *error_message = strdup("[PRVMGR_ERR_INVALID_PARAMETER] api_version is NULL"); TryReturn(error_message != NULL, , PRVMGR_ERR_OUT_OF_MEMORY, "[PRVMGR_ERR_OUT_OF_MEMORY] error_message's strdup is failed."); @@ -234,7 +245,7 @@ int privilege_manager_verify_privilege(const char *api_version, privilege_manage } else { ret = __check_api_version_validity(api_version); if (ret != PRVMGR_ERR_NONE) { - LOGE("[PRVMGR_ERR_INVALID_PARAMETER] %s is in invalid form. api_version form should be X.X, X.X.X or X.X.X.X(X=integer)", api_version); + _LOGE("[PRVMGR_ERR_INVALID_PARAMETER] %s is in invalid form. api_version form should be X.X, X.X.X or X.X.X.X(X=integer)", api_version); *error_message = strdup("[PRVMGR_ERR_INVALID_PARAMETER] api_version form should be a X.X, X.X.X or X.X.X.X(X=integer)"); TryReturn(error_message != NULL, , PRVMGR_ERR_OUT_OF_MEMORY, "[PRVMGR_ERR_OUT_OF_MEMORY] error_message's strdup is failed"); return ret; @@ -242,8 +253,8 @@ int privilege_manager_verify_privilege(const char *api_version, privilege_manage } if (package_type != PRVMGR_PACKAGE_TYPE_WRT && package_type != PRVMGR_PACKAGE_TYPE_CORE) { - LOGD("checking package type = %d", package_type); - LOGE("[PRVMGR_ERR_INVALID_PARAMETER] package_type is not a PRVMGR_PACKAGE_TYPE_WRT or PRVMGR_PACKAGE_TYPE_CORE"); + _LOGD("checking package type = %d", package_type); + _LOGE("[PRVMGR_ERR_INVALID_PARAMETER] package_type is not a PRVMGR_PACKAGE_TYPE_WRT or PRVMGR_PACKAGE_TYPE_CORE"); *error_message = strdup("[PRVMGR_ERR_INVALID_PARAMETER] package_type is a unknown type. package_type must be a PRVMGR_PACKAGE_TYPE_WRT or PRVMGR_PACKAGE_TYPE_CORE"); TryReturn(error_message != NULL, , PRVMGR_ERR_OUT_OF_MEMORY, "[PRVMGR_ERR_OUT_OF_MEMORY] error_message's strdup is failed."); @@ -264,7 +275,7 @@ int privilege_manager_verify_privilege(const char *api_version, privilege_manage } pkg_type = strdup("WRT"); TryReturn(pkg_type != NULL, free(tmp_api_version), PRVMGR_ERR_OUT_OF_MEMORY, "[PRVMGR_ERR_OUT_OF_MEMORY] pkg_type's strdup is failed."); - LOGD("package type = %s, api version %s, is valid wrt version %d", pkg_type, api_version, is_valid_wrt_version); + _LOGD("package type = %s, api version %s, is valid wrt version %d", pkg_type, api_version, is_valid_wrt_version); snprintf(guide_message, MESSAGE_SIZE, "Check config.xml| - Current required_version(=api version) = %s, | ", api_version); free(tmp_api_version); } else if (package_type == PRVMGR_PACKAGE_TYPE_CORE) { @@ -275,7 +286,7 @@ int privilege_manager_verify_privilege(const char *api_version, privilege_manage if ((visibility & PRVMGR_PACKAGE_VISIBILITY_PUBLIC) != PRVMGR_PACKAGE_VISIBILITY_PUBLIC && (visibility & PRVMGR_PACKAGE_VISIBILITY_PARTNER) != PRVMGR_PACKAGE_VISIBILITY_PARTNER && (visibility & PRVMGR_PACKAGE_VISIBILITY_PLATFORM) != PRVMGR_PACKAGE_VISIBILITY_PLATFORM) { - LOGE("[PRVMGR_ERR_INVALID_PARAMETER] visibility don't include any public, partner, platform"); + _LOGE("[PRVMGR_ERR_INVALID_PARAMETER] visibility don't include any public, partner, platform"); *error_message = strdup("[INVALID_PARAMETER] Signature Level is invalid. Signature Level must be a public, partner or platform"); TryReturn(error_message != NULL, free(pkg_type), PRVMGR_ERR_OUT_OF_MEMORY, "[PRVMGR_ERR_OUT_OF_MEMORY] error_message's strdup is failed."); free(pkg_type); @@ -290,7 +301,7 @@ int privilege_manager_verify_privilege(const char *api_version, privilege_manage strncat(guide_message, "certificate signature level = platform||", strlen("certificate signature level = platform||")); if (privilege_list == NULL) { - LOGE("[PRVMGR_ERR_INVALID_PARAMETER] privilege_list is NULL"); + _LOGE("[PRVMGR_ERR_INVALID_PARAMETER] privilege_list is NULL"); *error_message = strdup("[PRVMGR_ERR_INVALID_PARAMETER] privilege_list is NULL"); TryReturn(error_message != NULL, free(pkg_type), PRVMGR_ERR_OUT_OF_MEMORY, "[PRVMGR_ERR_OUT_OF_MEMORY] error_message's strdup is failed."); @@ -302,7 +313,7 @@ int privilege_manager_verify_privilege(const char *api_version, privilege_manage int uid = getuid(); ret = privilege_db_manager_check_black_list(uid, package_type, privilege_list); if (ret > 0) { - LOGE("[PRVMGR_ERR_USING_BANNED_PRIVILEGE] Application manifest contains banned privilege(s) declared by DPM"); + _LOGE("[PRVMGR_ERR_USING_BANNED_PRIVILEGE] Application manifest contains banned privilege(s) declared by DPM"); *error_message = strdup("[PRVMGR_ERR_USING_BANNED_PRIVILEGE] Application manifest contains banned privilege(s) declared by the DPM"); return PRVMGR_ERR_USING_BANNED_PRIVILEGE; } @@ -310,7 +321,7 @@ int privilege_manager_verify_privilege(const char *api_version, privilege_manage /* Get valid privilege list */ ret = privilege_db_manager_get_privilege_list(api_version, package_type, &valid_privilege_list); if (ret != PRIVILEGE_DB_MANAGER_ERR_NONE) { - LOGE("[FAIL TO CALL FUNCTION] privilege_db_manager_get_privilege_list()"); + _LOGE("[FAIL TO CALL FUNCTION] privilege_db_manager_get_privilege_list()"); *error_message = strdup("[PRVMGR_ERR_INTERNAL_ERROR] failed to get privilege list from DB"); free(pkg_type); return PRVMGR_ERR_INTERNAL_ERROR; @@ -320,7 +331,7 @@ int privilege_manager_verify_privilege(const char *api_version, privilege_manage int privilege_level_id = PRIVILEGE_DB_MANAGER_PRIVILEGE_LEVEL_PUBLIC; char *privilege_name = (char *)l->data; - LOGD("Checking privilege = %s", privilege_name); + _LOGD("Checking privilege = %s", privilege_name); if (valid_api_version != NULL) { free(valid_api_version); valid_api_version = NULL; @@ -337,10 +348,10 @@ int privilege_manager_verify_privilege(const char *api_version, privilege_manage if (ret == PRVMGR_ERR_NO_EXIST_PRIVILEGE) { memset(message, 0, MESSAGE_SIZE); if (valid_api_version != NULL && strcmp(valid_api_version, "") != 0) { - LOGE("[PRVMGR_ERR_NO_EXIST_PRIVILEGE]%s %s privilege is valid from Tizen version %s and your api version is %s. Use at least api version %s or remove the privilege.", pkg_type, privilege_name, valid_api_version, api_version, valid_api_version); + _LOGE("[PRVMGR_ERR_NO_EXIST_PRIVILEGE]%s %s privilege is valid from Tizen version %s and your api version is %s. Use at least api version %s or remove the privilege.", pkg_type, privilege_name, valid_api_version, api_version, valid_api_version); snprintf(message, MESSAGE_SIZE, " - %s| >> Use at least api version %s or remove the privilege.|", privilege_name, valid_api_version); } else { - LOGE("[PRVMGR_ERR_NO_EXIST_PRIVILEGE]%s %s is an invalid privilege. Check spelling or remove the privilege.", pkg_type, privilege_name); + _LOGE("[PRVMGR_ERR_NO_EXIST_PRIVILEGE]%s %s is an invalid privilege. Check spelling or remove the privilege.", pkg_type, privilege_name); snprintf(message, MESSAGE_SIZE, " - %s| >> Check spelling or remove the privilege.|", privilege_name); } @@ -360,10 +371,10 @@ int privilege_manager_verify_privilege(const char *api_version, privilege_manage memset(message, 0, MESSAGE_SIZE); if (changed_to != NULL && strcmp(changed_to, "") != 0) { - LOGE("[PRVMGR_ERR_DEPRECATED_PRIVILEGE]%s %s is a deprecated since Tizen version %s and your api version is %s. Use %s instead or use api version lower than %s.", pkg_type, privilege_name, valid_api_version, api_version, changed_to, valid_api_version); + _LOGE("[PRVMGR_ERR_DEPRECATED_PRIVILEGE]%s %s is a deprecated since Tizen version %s and your api version is %s. Use %s instead or use api version lower than %s.", pkg_type, privilege_name, valid_api_version, api_version, changed_to, valid_api_version); snprintf(message, MESSAGE_SIZE, " - %s| >> Use %s instead of it or use api version lower than %s.|", privilege_name, changed_to, valid_api_version); } else { - LOGE("[PRVMGR_ERR_DEPRECATED_PRIVILEGE]%s %s is deprecated since Tizen version %s and your api version is %s. Remove the privilege.", pkg_type, privilege_name, valid_api_version, api_version); + _LOGE("[PRVMGR_ERR_DEPRECATED_PRIVILEGE]%s %s is deprecated since Tizen version %s and your api version is %s. Remove the privilege.", pkg_type, privilege_name, valid_api_version, api_version); snprintf(message, MESSAGE_SIZE, " - %s| >> Remove the privilege.|", privilege_name); } @@ -380,13 +391,13 @@ int privilege_manager_verify_privilege(const char *api_version, privilege_manage ret_val = PRVMGR_ERR_INVALID_PRIVILEGE; } else if (ret == PRVMGR_ERR_NONE) { - LOGD("visibility = %d", visibility); - LOGD("privilege level = %d", privilege_level_id); + _LOGD("visibility = %d", visibility); + _LOGD("privilege level = %d", privilege_level_id); if ((visibility & PRVMGR_PACKAGE_VISIBILITY_PUBLIC) == PRVMGR_PACKAGE_VISIBILITY_PUBLIC) { if (privilege_level_id == PRIVILEGE_DB_MANAGER_PRIVILEGE_LEVEL_PARTNER || privilege_level_id == PRIVILEGE_DB_MANAGER_PRIVILEGE_LEVEL_PLATFORM) { - LOGE("[PRVMGR_ERR_MISMATCHED_PRIVILEGE_LEVEL] Visibility and Privilege level are mismatched"); - LOGE("[PRVMGR_ERR_MISMATCHED_PRIVILEGE_LEVEL] Visibility = public, Privilege Level = %s", __get_privilege_level_string(privilege_level_id)); + _LOGE("[PRVMGR_ERR_MISMATCHED_PRIVILEGE_LEVEL] Visibility and Privilege level are mismatched"); + _LOGE("[PRVMGR_ERR_MISMATCHED_PRIVILEGE_LEVEL] Visibility = public, Privilege Level = %s", __get_privilege_level_string(privilege_level_id)); memset(message, 0, MESSAGE_SIZE); snprintf(message, MESSAGE_SIZE, " - %s| >> Use at least %s signatured certificate.|", privilege_name, __get_privilege_level_string(privilege_level_id)); @@ -404,8 +415,8 @@ int privilege_manager_verify_privilege(const char *api_version, privilege_manage } } else if ((visibility & PRVMGR_PACKAGE_VISIBILITY_PARTNER) == PRVMGR_PACKAGE_VISIBILITY_PARTNER) { if (privilege_level_id == PRIVILEGE_DB_MANAGER_PRIVILEGE_LEVEL_PLATFORM) { - LOGE("[PRVMGR_ERR_MISMATCHED_PRIVILEGE_LEVEL] Visibility and Privilege level are mismatched"); - LOGE("[PRVMGR_ERR_MISMATCHED_PRIVILEGE_LEVEL] Visibility = partner, Privilege Level = %s", __get_privilege_level_string(privilege_level_id)); + _LOGE("[PRVMGR_ERR_MISMATCHED_PRIVILEGE_LEVEL] Visibility and Privilege level are mismatched"); + _LOGE("[PRVMGR_ERR_MISMATCHED_PRIVILEGE_LEVEL] Visibility = partner, Privilege Level = %s", __get_privilege_level_string(privilege_level_id)); memset(message, 0, MESSAGE_SIZE); snprintf(message, MESSAGE_SIZE, " - %s| >> Use at least %s signatured certificate.|", privilege_name, __get_privilege_level_string(privilege_level_id)); @@ -422,14 +433,14 @@ int privilege_manager_verify_privilege(const char *api_version, privilege_manage } } } else if (ret == PRVMGR_ERR_INVALID_PARAMETER) { - LOGE("[PRVMGR_ERR_INVALID_PARAMETER] privilege_name is NULL"); + _LOGE("[PRVMGR_ERR_INVALID_PARAMETER] privilege_name is NULL"); *error_message = strdup("[INVALID_PARAMETER] Invalid parameter was passed.|"); TryReturn(error_message != NULL, ret_val = PRVMGR_ERR_OUT_OF_MEMORY; goto FINISH, PRVMGR_ERR_OUT_OF_MEMORY, "[PRVMGR_ERR_OUT_OF_MEMORY] error_message's strdup is failed."); ret_val = PRVMGR_ERR_INVALID_PARAMETER; goto FINISH; } else if (ret == PRVMGR_ERR_INTERNAL_ERROR) { - LOGE("[PRVMGR_ERR_INVALID_PARAMETER] Unknown Error occured."); + _LOGE("[PRVMGR_ERR_INVALID_PARAMETER] Unknown Error occured."); *error_message = strdup("[INTERNAL_ERROR] Unknown Error occured.|"); TryReturn(error_message != NULL, ret_val = PRVMGR_ERR_OUT_OF_MEMORY; goto FINISH, PRVMGR_ERR_OUT_OF_MEMORY, "[PRVMGR_ERR_OUT_OF_MEMORY] error_message's strdup is failed."); @@ -492,7 +503,7 @@ int privilege_manager_get_mapped_privilege_list(const char *api_version, privile TryReturn(ret == PRVMGR_ERR_NONE, , PRVMGR_ERR_INVALID_PARAMETER, "[PRVMGR_ERR_INVALID_PARAMETER] %s is in invalid form. api_version form should be X.X, X.X.X or X.X.X.X(X=integer)", api_version); if (package_type != PRVMGR_PACKAGE_TYPE_WRT && package_type != PRVMGR_PACKAGE_TYPE_CORE) { - LOGE("[PRVMGR_ERR_INVALID_PARAMETER] package_type is not a PRVMGR_PACKAGE_TYPE_WRT or PRVMGR_PACKAGE_TYPE_CORE"); + _LOGE("[PRVMGR_ERR_INVALID_PARAMETER] package_type is not a PRVMGR_PACKAGE_TYPE_WRT or PRVMGR_PACKAGE_TYPE_CORE"); return PRVMGR_ERR_INVALID_PARAMETER; }