framework/security/security-server.git
11 years agoChange password timeout from 1 seconds to 500000 microseconds.
Janusz Kozerski [Wed, 20 Mar 2013 10:27:28 +0000 (11:27 +0100)]
Change password timeout from 1 seconds to 500000 microseconds.

[Issue#]    N/A
[Bug]       N/A
[Cause]     N/A
[Solution]  N/A

[Verification] Run all security-server tests.

11 years agoFix bug in table allocation.
Pawel Polawski [Tue, 5 Mar 2013 10:28:38 +0000 (11:28 +0100)]
Fix bug in table allocation.

[Issue#]        N/A
[Bug]           Wrong pointer passed to allocating fuinction
[Cause]         N/A
[Soultion]      Changed to correct pointer
[Verification]  No warnings while compilation

Change-Id: I54d00e11862f1986b0518009bdb30a5942f127b7

11 years ago[Release] security-server_0.0.67
Bartlomiej Grzelewski [Mon, 4 Mar 2013 16:37:03 +0000 (17:37 +0100)]
[Release] security-server_0.0.67

* Fix bug with searching cookie with no privileges.

Change-Id: I46ab72148143df3f1a76956aa8f4474147ef3338

11 years agoFix bug with searching cookie with no privileges.
Pawel Polawski [Tue, 26 Feb 2013 07:51:09 +0000 (08:51 +0100)]
Fix bug with searching cookie with no privileges.

[Issue#]        SSDWSSP-102
[Bug]           Bug with get_smack_label in security-server
[Cause]         Error in searching cookie with no privileges set
[Soulution]     Special trading cookies with no privileges set
[Verification]  Code compiles with success

Change-Id: I25debbc88315f316ed08b1cda2895bd3d9d90116

11 years ago[Release] security-server_0.0.65
Mariusz Domanski [Wed, 27 Feb 2013 10:46:25 +0000 (11:46 +0100)]
[Release] security-server_0.0.65

* Proper %post and %postun scripts in spec file
* Removing unused code and separating deprecated files
* Fix for several issues detected by Prevent

Change-Id: I494fba79e6c11e9c298a4972a99a4847e9caffe6

11 years agoMerge "Proper %post and %postun scripts in spec file"
Rafal Krypa [Mon, 25 Feb 2013 14:45:51 +0000 (23:45 +0900)]
Merge "Proper %post and %postun scripts in spec file"

11 years agoRemoving unused code and separating deprecated files
Zofia Abramowska [Mon, 18 Feb 2013 12:44:57 +0000 (13:44 +0100)]
Removing unused code and separating deprecated files

[Issue#] SSDWSSP-98
[Feature] N/A
[Cause] Removal of unwanted files from security-server
[Solution] N/A
[Verification] Successful build

Change-Id: I27fbd9ca4d597c71b65400c4ed71458b406f557b

11 years agoFix for several issues detected by Prevent
Mariusz Domanski [Tue, 19 Feb 2013 15:43:15 +0000 (16:43 +0100)]
Fix for several issues detected by Prevent

[Issue#] SSDWSSP-106
[Problem] Issues detected by Prevent
[Cause] N/A
[Solution] N/A
[Verification] Build and run tests

Change-Id: Ie0d469e73685fd518da2a374cf0c0e5dea5829eb

11 years agoProper %post and %postun scripts in spec file
Mariusz Domanski [Wed, 20 Feb 2013 14:43:36 +0000 (15:43 +0100)]
Proper %post and %postun scripts in spec file

[Issue#]   N/A
[Bug]      errors when upgrading rpm package via rpm -U command
[Cause]    bugged %post and %postun scripts in spec file
[Solution] fixed %post and %postun scripts to handle upgrades properly

[Verification] Build and install rpm files, then increment version
               number in spec file and build and install with rpm -U.
               No security-server related errors should appear after
               second installation, S10security-server symlinks in
               /etc/rc.d/rc3.d/ and /etc/rc.d/rc5.d/ should exist.
               After package uninstallation symlinks should be gone.

Change-Id: I5f0ec6e640f14c12335de0338d3e75d883d1a79e

11 years agoFix for several issues detected by Prevent
Janusz Majnert [Mon, 18 Feb 2013 12:39:30 +0000 (13:39 +0100)]
Fix for several issues detected by Prevent

[Issue#] SSDWSSP-107
[Problem] Issues detected by Prevent
[Cause] N/A
[Solution] Please see comments below
[Verification] Build and run

Changes:
* Added a sanity check for new_pwd_len in (prevent #42100)
* Added a check for result of setuid in security server test case
  (prevent #42102)
* Fixed a bug in one of the test cases (comparing smack labels)
  (prevent #43435)
* Fixed a bug where one error condition was not handled properly, which in turn
  led to double free.

Change-Id: I54562981cf5e1201f8f62852da5cb6b3473df138

11 years ago[Release] security-server_0.0.64
Tomasz Swierczek [Tue, 5 Feb 2013 08:40:00 +0000 (09:40 +0100)]
[Release] security-server_0.0.64

* Fixed bug with searching cookie for root process in security-server

Change-Id: Ic499ef20918e791351d1a3acdf30697532481618

11 years agoFixing bug with searching cookie and privileges in security-server.
Pawel Polawski [Mon, 4 Feb 2013 16:50:45 +0000 (17:50 +0100)]
Fixing bug with searching cookie and privileges in security-server.

[Issue#]        SSDWSSP-71
[Cause]         Fix bug with access to security-server API
                by some root processes.
[Problem]       Access to security server API returns error
                for alarm service.
[Solution]      Removed special treating root processes when searching
                cookies for caller.
[Verification]  Security-serwer should return no error while
                calling security_server_check_privilege()
                with correct parameters. Setting clock alarm should
                return no errors in DLOGUTIL.

Change-Id: I86a950afedd326c021ab00d7ba6a868034d647f9

11 years ago[Release] security-server_0.0.63
Mariusz Domanski [Fri, 1 Feb 2013 16:22:50 +0000 (17:22 +0100)]
[Release] security-server_0.0.63

* Add new functions to security-server API

Change-Id: I05ca7e3356db323123a026b02875a7a30d6e3f32

11 years agoAdd new functions to security-server API.
Pawel Polawski [Fri, 25 Jan 2013 10:52:21 +0000 (11:52 +0100)]
Add new functions to security-server API.

[Issue#]        SSDWSSP-45
[Cause]         Implement new APIs for getting SMACK label
                of peer in security-server
[Problem]       Two new function needed in API. Both returns
                SMACK labels but ttaking another parameters.
                First uses cookie, second socked descriptor.
[Solution]      New functions added
[Verification]  Tests should not fail

Change-Id: I4ca044230f1cba1174b61abae6b7641e1bbfcdbc

11 years agoCherry-pick release: security-server_0.0.62
Tomasz Swierczek [Fri, 18 Jan 2013 08:09:05 +0000 (09:09 +0100)]
Cherry-pick release: security-server_0.0.62

* Separated security-server and wrt-security-daemon
* This repository holds security-server now

Conflicts:

CMakeLists.txt
packaging/security-server.spec
socket_connection/connection/SocketStream.cpp
tests/CMakeLists.txt
tests/security_server_tests/CMakeLists.txt

Change-Id: I1185bb69f8517da9f5fa5299335e8cc856ba402f

11 years agoFixing communication problem with security-server
Zofia Abramowska [Wed, 16 Jan 2013 13:44:23 +0000 (14:44 +0100)]
Fixing communication problem with security-server

[Issue#] LINUXSWAP-454
[Bug] Security-server crashes
[Cause] No handling of SIGPIPE signal when writing to closed socket
[Solution] blocking SIGPIPE signal in all threads created by socket
service and handling error returned by write
[Verification] Build, run tests and check  JIRA bug(N_SE-20154)

Change-Id: Id6d15922bb9b94cb9ee565e9e90ed0e46a27e25c

11 years agoPrevent related bugfixes.
Mariusz Domanski [Tue, 15 Jan 2013 13:58:55 +0000 (14:58 +0100)]
Prevent related bugfixes.

[Issue] N/A
[Bug] Bugs found by Coverity.
[Cause] N/A
[Solution] Checking varibale values, catching exception.
[Verification] Build security-server, run all tests.

Change-Id: Ide143746a4a4ccc4cc575f14cfb3529d3b32d088

11 years agoAdd NOTICE file
Hyunwoo Kim [Tue, 15 Jan 2013 12:44:39 +0000 (21:44 +0900)]
Add NOTICE file

Change-Id: Icb39ceba4aaefb880d949f213cdf25bb47a34e5c

11 years ago[Prevent] Multiple minor bugfixes.
Jan Olszak [Mon, 14 Jan 2013 09:55:31 +0000 (10:55 +0100)]
[Prevent] Multiple minor bugfixes.

[Issue] Bugs found by Coverity.
[Bug] N/A
[Cause] N/A
[Solution] Fixed bugs.
[Verification] Build security-server.

Change-Id: I33df2ee3d0c8a6a1abbe6ff89063603c604bb2aa

11 years agoRe-enabling systemd configuration.
baik [Thu, 13 Dec 2012 00:51:07 +0000 (09:51 +0900)]
Re-enabling systemd configuration.

Change-Id: I7eb6c073b1614482331dff6d885c63848c47c7f9

11 years agoMerge "Invoke initiate_try to init variable"
Chengwei Yang [Fri, 11 Jan 2013 04:13:30 +0000 (13:13 +0900)]
Merge "Invoke initiate_try to init variable"

11 years agoRelease of changes from Samsung private repository.
Mariusz Domanski [Tue, 8 Jan 2013 17:01:54 +0000 (18:01 +0100)]
Release of changes from Samsung private repository.

* Fixed Prevent defects

Change-Id: I3468cf2754656c7f0b4a3cc619fcfdd1c758d2e6

11 years agoInvoke initiate_try to init variable
Chengwei Yang [Tue, 8 Jan 2013 07:49:29 +0000 (15:49 +0800)]
Invoke initiate_try to init variable

Change-Id: I382d1ad805dec133051f098ceb62a42559e0ab38
Signed-off-by: Chengwei Yang <chengwei.yang@intel.com>
11 years agoRelease of changes from Samsung private repository.
Pawel Polawski [Mon, 7 Jan 2013 14:00:27 +0000 (15:00 +0100)]
Release of changes from Samsung private repository.

* Fixed possible thread synchronization issue

Change-Id: I434ff4bf5c539dfe845d52369dc51d7bddc29081

11 years agoRelease of changes from Samsung private repository.
Tomasz Swierczek [Thu, 3 Jan 2013 13:58:33 +0000 (14:58 +0100)]
Release of changes from Samsung private repository.

* Enabled sockets in security server
* Removed old popup implementation

Change-Id: Iceb91878e48bd0cad819aa07e3de147a7befd1c8

11 years agoRelease of changes from Samsung private repository.
Tomasz Swierczek [Tue, 18 Dec 2012 09:08:10 +0000 (10:08 +0100)]
Release of changes from Samsung private repository.

* Adjusted TizenPolicy.xml - added missing "deny" clause for Untrusted widgets

Change-Id: Ic0bc673b1ed856bbd008dcc3e64202d6456fe529

11 years agoRelease of changes from Samsung private repository.
Tomasz Swierczek [Thu, 13 Dec 2012 09:50:43 +0000 (10:50 +0100)]
Release of changes from Samsung private repository.

* Adjusted TizenPolicy.xml according to Device API HQ team request

Change-Id: I399896954b5462119e365220b9f39a23956f6ae2

11 years ago[systemd] systemd boot script for security-server
baik [Thu, 13 Dec 2012 00:51:07 +0000 (09:51 +0900)]
[systemd] systemd boot script for security-server
          in addtion, add to verify middleware user.

11 years agoRelease of changes from Samsung private repository.
Tomasz Swierczek [Tue, 11 Dec 2012 17:50:09 +0000 (18:50 +0100)]
Release of changes from Samsung private repository.

* Fixed problem with leaving zombie after SIGTERM
* Turned on logs in "old security server".
* Added new TizenPolicy as per HQ WRT team request

Change-Id: I170af48d89407ff9dc770563bb3ab4aa47cabc6d

11 years agoRelease changes from Samsung private repository.
Tomasz Swierczek [Fri, 7 Dec 2012 15:06:00 +0000 (16:06 +0100)]
Release changes from Samsung private repository.

* Prepared headers for abstract communication client
* Added implementation of security socket server
* Added ace_is_private_api function in ace_settings
* Fixed klocwork bugs
* Added Partner API section in Tizen Policy
* Added build type required for code coverage analysis
* Removed deprecated headers from dev package

Change-Id: I57bf5912e45c6b6f5c514f45e52b60490404d244

11 years agorelease 0.0.48
Kidong Kim [Wed, 5 Dec 2012 10:01:42 +0000 (19:01 +0900)]
release 0.0.48

Change-Id: I8cb402cb786e55e5b6894c0b8fc4e5a0112900ac

11 years agoMerge branch 'for-rsa-systemd'
Jacek Migacz [Fri, 23 Nov 2012 15:36:12 +0000 (16:36 +0100)]
Merge branch 'for-rsa-systemd'

Change-Id: If23f809e103988990930032eafadf9c7b8ccb958

11 years agoinclude types.h header file
Kidong Kim [Tue, 27 Nov 2012 04:29:07 +0000 (13:29 +0900)]
include types.h header file

11 years agoSeparation of wrt.db and ace.db #1
Andrzej Surdej [Wed, 10 Oct 2012 15:06:45 +0000 (17:06 +0200)]
Separation of wrt.db and ace.db #1
Prepare AceDB to handle all necessary information.

[Issue#] LINUXSWAP-211
[Problem] Separation ACE and WrtDB
[Cause] N/A
[Solution] AceDB extended
[Verification] To verify successfuly build repository

Change-Id: I5b55ae522dcdd944022a4ff1e23155b593b77632

12 years agofix manifest
Kidong Kim [Wed, 7 Nov 2012 10:32:55 +0000 (19:32 +0900)]
fix manifest

12 years agoRelease changes from Samsung private repository.
Tomasz Swierczek [Mon, 29 Oct 2012 11:15:01 +0000 (12:15 +0100)]
Release changes from Samsung private repository.

* merge of security-server and wrt-security-daemon
* added wrt-ocsp API
* added support for Orange certficates

Change-Id: I0d498b7070876c77d45ce18226f35c08f67c13bb

12 years agosource code open - security-server 2.0alpha master 2.0_alpha submit/master/20120920.151108
Kidong Kim [Wed, 22 Aug 2012 04:48:10 +0000 (13:48 +0900)]
source code open - security-server

12 years agoupload tizen1.0 source
Kim Kibum [Sun, 29 Apr 2012 08:01:52 +0000 (17:01 +0900)]
upload tizen1.0 source

12 years agoInitial empty repository
eunmee moon [Fri, 27 Apr 2012 12:36:08 +0000 (21:36 +0900)]
Initial empty repository