summary |
shortlog | log |
commit |
commitdiff |
tree
first ⋅ prev ⋅ next
Janusz Kozerski [Wed, 20 Mar 2013 10:27:28 +0000 (11:27 +0100)]
Change password timeout from 1 seconds to 500000 microseconds.
[Issue#] N/A
[Bug] N/A
[Cause] N/A
[Solution] N/A
[Verification] Run all security-server tests.
Pawel Polawski [Tue, 5 Mar 2013 10:28:38 +0000 (11:28 +0100)]
Fix bug in table allocation.
[Issue#] N/A
[Bug] Wrong pointer passed to allocating fuinction
[Cause] N/A
[Soultion] Changed to correct pointer
[Verification] No warnings while compilation
Change-Id: I54d00e11862f1986b0518009bdb30a5942f127b7
Bartlomiej Grzelewski [Mon, 4 Mar 2013 16:37:03 +0000 (17:37 +0100)]
[Release] security-server_0.0.67
* Fix bug with searching cookie with no privileges.
Change-Id: I46ab72148143df3f1a76956aa8f4474147ef3338
Pawel Polawski [Tue, 26 Feb 2013 07:51:09 +0000 (08:51 +0100)]
Fix bug with searching cookie with no privileges.
[Issue#] SSDWSSP-102
[Bug] Bug with get_smack_label in security-server
[Cause] Error in searching cookie with no privileges set
[Soulution] Special trading cookies with no privileges set
[Verification] Code compiles with success
Change-Id: I25debbc88315f316ed08b1cda2895bd3d9d90116
Mariusz Domanski [Wed, 27 Feb 2013 10:46:25 +0000 (11:46 +0100)]
[Release] security-server_0.0.65
* Proper %post and %postun scripts in spec file
* Removing unused code and separating deprecated files
* Fix for several issues detected by Prevent
Change-Id: I494fba79e6c11e9c298a4972a99a4847e9caffe6
Rafal Krypa [Mon, 25 Feb 2013 14:45:51 +0000 (23:45 +0900)]
Merge "Proper %post and %postun scripts in spec file"
Zofia Abramowska [Mon, 18 Feb 2013 12:44:57 +0000 (13:44 +0100)]
Removing unused code and separating deprecated files
[Issue#] SSDWSSP-98
[Feature] N/A
[Cause] Removal of unwanted files from security-server
[Solution] N/A
[Verification] Successful build
Change-Id: I27fbd9ca4d597c71b65400c4ed71458b406f557b
Mariusz Domanski [Tue, 19 Feb 2013 15:43:15 +0000 (16:43 +0100)]
Fix for several issues detected by Prevent
[Issue#] SSDWSSP-106
[Problem] Issues detected by Prevent
[Cause] N/A
[Solution] N/A
[Verification] Build and run tests
Change-Id: Ie0d469e73685fd518da2a374cf0c0e5dea5829eb
Mariusz Domanski [Wed, 20 Feb 2013 14:43:36 +0000 (15:43 +0100)]
Proper %post and %postun scripts in spec file
[Issue#] N/A
[Bug] errors when upgrading rpm package via rpm -U command
[Cause] bugged %post and %postun scripts in spec file
[Solution] fixed %post and %postun scripts to handle upgrades properly
[Verification] Build and install rpm files, then increment version
number in spec file and build and install with rpm -U.
No security-server related errors should appear after
second installation, S10security-server symlinks in
/etc/rc.d/rc3.d/ and /etc/rc.d/rc5.d/ should exist.
After package uninstallation symlinks should be gone.
Change-Id: I5f0ec6e640f14c12335de0338d3e75d883d1a79e
Janusz Majnert [Mon, 18 Feb 2013 12:39:30 +0000 (13:39 +0100)]
Fix for several issues detected by Prevent
[Issue#] SSDWSSP-107
[Problem] Issues detected by Prevent
[Cause] N/A
[Solution] Please see comments below
[Verification] Build and run
Changes:
* Added a sanity check for new_pwd_len in (prevent #42100)
* Added a check for result of setuid in security server test case
(prevent #42102)
* Fixed a bug in one of the test cases (comparing smack labels)
(prevent #43435)
* Fixed a bug where one error condition was not handled properly, which in turn
led to double free.
Change-Id: I54562981cf5e1201f8f62852da5cb6b3473df138
Tomasz Swierczek [Tue, 5 Feb 2013 08:40:00 +0000 (09:40 +0100)]
[Release] security-server_0.0.64
* Fixed bug with searching cookie for root process in security-server
Change-Id: Ic499ef20918e791351d1a3acdf30697532481618
Pawel Polawski [Mon, 4 Feb 2013 16:50:45 +0000 (17:50 +0100)]
Fixing bug with searching cookie and privileges in security-server.
[Issue#] SSDWSSP-71
[Cause] Fix bug with access to security-server API
by some root processes.
[Problem] Access to security server API returns error
for alarm service.
[Solution] Removed special treating root processes when searching
cookies for caller.
[Verification] Security-serwer should return no error while
calling security_server_check_privilege()
with correct parameters. Setting clock alarm should
return no errors in DLOGUTIL.
Change-Id: I86a950afedd326c021ab00d7ba6a868034d647f9
Mariusz Domanski [Fri, 1 Feb 2013 16:22:50 +0000 (17:22 +0100)]
[Release] security-server_0.0.63
* Add new functions to security-server API
Change-Id: I05ca7e3356db323123a026b02875a7a30d6e3f32
Pawel Polawski [Fri, 25 Jan 2013 10:52:21 +0000 (11:52 +0100)]
Add new functions to security-server API.
[Issue#] SSDWSSP-45
[Cause] Implement new APIs for getting SMACK label
of peer in security-server
[Problem] Two new function needed in API. Both returns
SMACK labels but ttaking another parameters.
First uses cookie, second socked descriptor.
[Solution] New functions added
[Verification] Tests should not fail
Change-Id: I4ca044230f1cba1174b61abae6b7641e1bbfcdbc
Tomasz Swierczek [Fri, 18 Jan 2013 08:09:05 +0000 (09:09 +0100)]
Cherry-pick release: security-server_0.0.62
* Separated security-server and wrt-security-daemon
* This repository holds security-server now
Conflicts:
CMakeLists.txt
packaging/security-server.spec
socket_connection/connection/SocketStream.cpp
tests/CMakeLists.txt
tests/security_server_tests/CMakeLists.txt
Change-Id: I1185bb69f8517da9f5fa5299335e8cc856ba402f
Zofia Abramowska [Wed, 16 Jan 2013 13:44:23 +0000 (14:44 +0100)]
Fixing communication problem with security-server
[Issue#] LINUXSWAP-454
[Bug] Security-server crashes
[Cause] No handling of SIGPIPE signal when writing to closed socket
[Solution] blocking SIGPIPE signal in all threads created by socket
service and handling error returned by write
[Verification] Build, run tests and check JIRA bug(N_SE-20154)
Change-Id: Id6d15922bb9b94cb9ee565e9e90ed0e46a27e25c
Mariusz Domanski [Tue, 15 Jan 2013 13:58:55 +0000 (14:58 +0100)]
Prevent related bugfixes.
[Issue] N/A
[Bug] Bugs found by Coverity.
[Cause] N/A
[Solution] Checking varibale values, catching exception.
[Verification] Build security-server, run all tests.
Change-Id: Ide143746a4a4ccc4cc575f14cfb3529d3b32d088
Hyunwoo Kim [Tue, 15 Jan 2013 12:44:39 +0000 (21:44 +0900)]
Add NOTICE file
Change-Id: Icb39ceba4aaefb880d949f213cdf25bb47a34e5c
Jan Olszak [Mon, 14 Jan 2013 09:55:31 +0000 (10:55 +0100)]
[Prevent] Multiple minor bugfixes.
[Issue] Bugs found by Coverity.
[Bug] N/A
[Cause] N/A
[Solution] Fixed bugs.
[Verification] Build security-server.
Change-Id: I33df2ee3d0c8a6a1abbe6ff89063603c604bb2aa
baik [Thu, 13 Dec 2012 00:51:07 +0000 (09:51 +0900)]
Re-enabling systemd configuration.
Change-Id: I7eb6c073b1614482331dff6d885c63848c47c7f9
Chengwei Yang [Fri, 11 Jan 2013 04:13:30 +0000 (13:13 +0900)]
Merge "Invoke initiate_try to init variable"
Mariusz Domanski [Tue, 8 Jan 2013 17:01:54 +0000 (18:01 +0100)]
Release of changes from Samsung private repository.
* Fixed Prevent defects
Change-Id: I3468cf2754656c7f0b4a3cc619fcfdd1c758d2e6
Chengwei Yang [Tue, 8 Jan 2013 07:49:29 +0000 (15:49 +0800)]
Invoke initiate_try to init variable
Change-Id: I382d1ad805dec133051f098ceb62a42559e0ab38
Signed-off-by: Chengwei Yang <chengwei.yang@intel.com>
Pawel Polawski [Mon, 7 Jan 2013 14:00:27 +0000 (15:00 +0100)]
Release of changes from Samsung private repository.
* Fixed possible thread synchronization issue
Change-Id: I434ff4bf5c539dfe845d52369dc51d7bddc29081
Tomasz Swierczek [Thu, 3 Jan 2013 13:58:33 +0000 (14:58 +0100)]
Release of changes from Samsung private repository.
* Enabled sockets in security server
* Removed old popup implementation
Change-Id: Iceb91878e48bd0cad819aa07e3de147a7befd1c8
Tomasz Swierczek [Tue, 18 Dec 2012 09:08:10 +0000 (10:08 +0100)]
Release of changes from Samsung private repository.
* Adjusted TizenPolicy.xml - added missing "deny" clause for Untrusted widgets
Change-Id: Ic0bc673b1ed856bbd008dcc3e64202d6456fe529
Tomasz Swierczek [Thu, 13 Dec 2012 09:50:43 +0000 (10:50 +0100)]
Release of changes from Samsung private repository.
* Adjusted TizenPolicy.xml according to Device API HQ team request
Change-Id: I399896954b5462119e365220b9f39a23956f6ae2
baik [Thu, 13 Dec 2012 00:51:07 +0000 (09:51 +0900)]
[systemd] systemd boot script for security-server
in addtion, add to verify middleware user.
Tomasz Swierczek [Tue, 11 Dec 2012 17:50:09 +0000 (18:50 +0100)]
Release of changes from Samsung private repository.
* Fixed problem with leaving zombie after SIGTERM
* Turned on logs in "old security server".
* Added new TizenPolicy as per HQ WRT team request
Change-Id: I170af48d89407ff9dc770563bb3ab4aa47cabc6d
Tomasz Swierczek [Fri, 7 Dec 2012 15:06:00 +0000 (16:06 +0100)]
Release changes from Samsung private repository.
* Prepared headers for abstract communication client
* Added implementation of security socket server
* Added ace_is_private_api function in ace_settings
* Fixed klocwork bugs
* Added Partner API section in Tizen Policy
* Added build type required for code coverage analysis
* Removed deprecated headers from dev package
Change-Id: I57bf5912e45c6b6f5c514f45e52b60490404d244
Kidong Kim [Wed, 5 Dec 2012 10:01:42 +0000 (19:01 +0900)]
release 0.0.48
Change-Id: I8cb402cb786e55e5b6894c0b8fc4e5a0112900ac
Jacek Migacz [Fri, 23 Nov 2012 15:36:12 +0000 (16:36 +0100)]
Merge branch 'for-rsa-systemd'
Change-Id: If23f809e103988990930032eafadf9c7b8ccb958
Kidong Kim [Tue, 27 Nov 2012 04:29:07 +0000 (13:29 +0900)]
include types.h header file
Andrzej Surdej [Wed, 10 Oct 2012 15:06:45 +0000 (17:06 +0200)]
Separation of wrt.db and ace.db #1
Prepare AceDB to handle all necessary information.
[Issue#] LINUXSWAP-211
[Problem] Separation ACE and WrtDB
[Cause] N/A
[Solution] AceDB extended
[Verification] To verify successfuly build repository
Change-Id: I5b55ae522dcdd944022a4ff1e23155b593b77632
Kidong Kim [Wed, 7 Nov 2012 10:32:55 +0000 (19:32 +0900)]
fix manifest
Tomasz Swierczek [Mon, 29 Oct 2012 11:15:01 +0000 (12:15 +0100)]
Release changes from Samsung private repository.
* merge of security-server and wrt-security-daemon
* added wrt-ocsp API
* added support for Orange certficates
Change-Id: I0d498b7070876c77d45ce18226f35c08f67c13bb
Kidong Kim [Wed, 22 Aug 2012 04:48:10 +0000 (13:48 +0900)]
source code open - security-server
Kim Kibum [Sun, 29 Apr 2012 08:01:52 +0000 (17:01 +0900)]
upload tizen1.0 source
eunmee moon [Fri, 27 Apr 2012 12:36:08 +0000 (21:36 +0900)]
Initial empty repository