framework/security/security-server.git
11 years agoMiddleware list check fixed.
Krzysztof Jackiewicz [Tue, 2 Apr 2013 08:55:26 +0000 (10:55 +0200)]
Middleware list check fixed.

[Issue#] N/A
[Feature/Bug] N/A
[Problem] Empty line in mw-lists matches everything.
[Cause] N/A
[Solution] Commandline replaced by executable name. Fixed comparison of
executable name with mw-list entries. Empty line removed from mw-list. 50 chars
limit removed

[Verification] Run all security server tests

Change-Id: I872ad45a4089b484a30fc4caa1759ce9d6a584e4

11 years agoFix for 64 bit compatibility.
Junfeng [Thu, 21 Mar 2013 13:31:23 +0000 (21:31 +0800)]
Fix for 64 bit compatibility.

- Fix hardcoding path.
- Use %cmake to set default paths.

Change-Id: I102e9d18662ec001eafc48c9826405bf427f6910

11 years agoMerge remote-tracking branch 'rsa/tizen_2.1' into rsa_master
Krzysztof Jackiewicz [Fri, 29 Mar 2013 10:17:37 +0000 (11:17 +0100)]
Merge remote-tracking branch 'rsa/tizen_2.1' into rsa_master

11 years ago[Release] security-server_0.0.70
Krzysztof Jackiewicz [Thu, 28 Mar 2013 14:36:01 +0000 (15:36 +0100)]
[Release] security-server_0.0.70

* Prevent bugfixes from private repo

Change-Id: I52ea4353e5f4092672135323b30f5ae8e295f1d1

11 years agoRead or write may be interrupt.
Bartlomiej Grzelewski [Fri, 8 Mar 2013 16:38:57 +0000 (17:38 +0100)]
Read or write may be interrupt.

This commits add suport for interruption of read or write. Please note
that we still need to add support for sitation when read or write
returns less that we expect.

[Issue#]    N/A
[Bug]       N/A
[Cause]     N/A
[Solution]  N/A

[Verification] Run all security-server tests.

Change-Id: I799fd41245cce004582458f98f49511a2860ff0e

11 years agoReemove compilation warrnings.
Bartlomiej Grzelewski [Thu, 7 Mar 2013 17:32:28 +0000 (18:32 +0100)]
Reemove compilation warrnings.

[Issue#]    N/A
[Bug]       N/A
[Cause]     N/A
[Solution]  N/A

[Verification] Run all security-server tests.

Change-Id: Icedbece62623b2393eb16c3776a909db8443c073

11 years agoFix defects reported by prevent.
Bartlomiej Grzelewski [Thu, 7 Mar 2013 16:21:12 +0000 (17:21 +0100)]
Fix defects reported by prevent.

[Issue#]        SSDWSSP-115
[Bug]           N/A
[Cause]         N/A
[Soultion]      N/A

[Verification]  Run all security-server tests.

Change-Id: I61a437f604e94b6897d1b2b76aca8217893a307e

11 years ago[Release] security-server_0.0.69
Krzysztof Jackiewicz [Thu, 21 Mar 2013 15:37:04 +0000 (16:37 +0100)]
[Release] security-server_0.0.69

* Table allocation bug fixed
* Password timeout changed
* Merged master into tizen_2.1

Change-Id: I85d41e0f8c1e10491a1fab07586058c1ef5f7271

11 years ago[Release] security-server_0.0.69
Krzysztof Jackiewicz [Thu, 21 Mar 2013 10:07:11 +0000 (11:07 +0100)]
[Release] security-server_0.0.69

* Table allocation bug fixed
* Password timeout changed

Change-Id: I70b81639a80600fa83cf93ae08ebced1fa83fe84

11 years agoChange password timeout from 1 seconds to 500000 microseconds.
Janusz Kozerski [Wed, 20 Mar 2013 10:27:28 +0000 (11:27 +0100)]
Change password timeout from 1 seconds to 500000 microseconds.

[Issue#]    N/A
[Bug]       N/A
[Cause]     N/A
[Solution]  N/A

[Verification] Run all security-server tests.

11 years agomerge with master
Jinkun Jang [Fri, 15 Mar 2013 16:17:58 +0000 (01:17 +0900)]
merge with master

11 years agoTizen 2.1 base
Jinkun Jang [Tue, 12 Mar 2013 16:51:34 +0000 (01:51 +0900)]
Tizen 2.1 base

11 years agoFix bug in table allocation.
Pawel Polawski [Tue, 5 Mar 2013 10:28:38 +0000 (11:28 +0100)]
Fix bug in table allocation.

[Issue#]        N/A
[Bug]           Wrong pointer passed to allocating fuinction
[Cause]         N/A
[Soultion]      Changed to correct pointer
[Verification]  No warnings while compilation

Change-Id: I54d00e11862f1986b0518009bdb30a5942f127b7

11 years ago[Release] security-server_0.0.67
Bartlomiej Grzelewski [Mon, 4 Mar 2013 16:37:03 +0000 (17:37 +0100)]
[Release] security-server_0.0.67

* Fix bug with searching cookie with no privileges.

Change-Id: I46ab72148143df3f1a76956aa8f4474147ef3338

11 years agoFix bug with searching cookie with no privileges.
Pawel Polawski [Tue, 26 Feb 2013 07:51:09 +0000 (08:51 +0100)]
Fix bug with searching cookie with no privileges.

[Issue#]        SSDWSSP-102
[Bug]           Bug with get_smack_label in security-server
[Cause]         Error in searching cookie with no privileges set
[Soulution]     Special trading cookies with no privileges set
[Verification]  Code compiles with success

Change-Id: I25debbc88315f316ed08b1cda2895bd3d9d90116

11 years ago[Release] security-server_0.0.65
Mariusz Domanski [Wed, 27 Feb 2013 10:46:25 +0000 (11:46 +0100)]
[Release] security-server_0.0.65

* Proper %post and %postun scripts in spec file
* Removing unused code and separating deprecated files
* Fix for several issues detected by Prevent

Change-Id: I494fba79e6c11e9c298a4972a99a4847e9caffe6

11 years agoMerge "Proper %post and %postun scripts in spec file"
Rafal Krypa [Mon, 25 Feb 2013 14:45:51 +0000 (23:45 +0900)]
Merge "Proper %post and %postun scripts in spec file"

11 years agoRemoving unused code and separating deprecated files
Zofia Abramowska [Mon, 18 Feb 2013 12:44:57 +0000 (13:44 +0100)]
Removing unused code and separating deprecated files

[Issue#] SSDWSSP-98
[Feature] N/A
[Cause] Removal of unwanted files from security-server
[Solution] N/A
[Verification] Successful build

Change-Id: I27fbd9ca4d597c71b65400c4ed71458b406f557b

11 years agoFix for several issues detected by Prevent
Mariusz Domanski [Tue, 19 Feb 2013 15:43:15 +0000 (16:43 +0100)]
Fix for several issues detected by Prevent

[Issue#] SSDWSSP-106
[Problem] Issues detected by Prevent
[Cause] N/A
[Solution] N/A
[Verification] Build and run tests

Change-Id: Ie0d469e73685fd518da2a374cf0c0e5dea5829eb

11 years agoProper %post and %postun scripts in spec file
Mariusz Domanski [Wed, 20 Feb 2013 14:43:36 +0000 (15:43 +0100)]
Proper %post and %postun scripts in spec file

[Issue#]   N/A
[Bug]      errors when upgrading rpm package via rpm -U command
[Cause]    bugged %post and %postun scripts in spec file
[Solution] fixed %post and %postun scripts to handle upgrades properly

[Verification] Build and install rpm files, then increment version
               number in spec file and build and install with rpm -U.
               No security-server related errors should appear after
               second installation, S10security-server symlinks in
               /etc/rc.d/rc3.d/ and /etc/rc.d/rc5.d/ should exist.
               After package uninstallation symlinks should be gone.

Change-Id: I5f0ec6e640f14c12335de0338d3e75d883d1a79e

11 years agoFix for several issues detected by Prevent
Janusz Majnert [Mon, 18 Feb 2013 12:39:30 +0000 (13:39 +0100)]
Fix for several issues detected by Prevent

[Issue#] SSDWSSP-107
[Problem] Issues detected by Prevent
[Cause] N/A
[Solution] Please see comments below
[Verification] Build and run

Changes:
* Added a sanity check for new_pwd_len in (prevent #42100)
* Added a check for result of setuid in security server test case
  (prevent #42102)
* Fixed a bug in one of the test cases (comparing smack labels)
  (prevent #43435)
* Fixed a bug where one error condition was not handled properly, which in turn
  led to double free.

Change-Id: I54562981cf5e1201f8f62852da5cb6b3473df138

11 years ago[Release] security-server_0.0.64
Tomasz Swierczek [Tue, 5 Feb 2013 08:40:00 +0000 (09:40 +0100)]
[Release] security-server_0.0.64

* Fixed bug with searching cookie for root process in security-server

Change-Id: Ic499ef20918e791351d1a3acdf30697532481618

11 years agoFixing bug with searching cookie and privileges in security-server.
Pawel Polawski [Mon, 4 Feb 2013 16:50:45 +0000 (17:50 +0100)]
Fixing bug with searching cookie and privileges in security-server.

[Issue#]        SSDWSSP-71
[Cause]         Fix bug with access to security-server API
                by some root processes.
[Problem]       Access to security server API returns error
                for alarm service.
[Solution]      Removed special treating root processes when searching
                cookies for caller.
[Verification]  Security-serwer should return no error while
                calling security_server_check_privilege()
                with correct parameters. Setting clock alarm should
                return no errors in DLOGUTIL.

Change-Id: I86a950afedd326c021ab00d7ba6a868034d647f9

11 years ago[Release] security-server_0.0.63
Mariusz Domanski [Fri, 1 Feb 2013 16:22:50 +0000 (17:22 +0100)]
[Release] security-server_0.0.63

* Add new functions to security-server API

Change-Id: I05ca7e3356db323123a026b02875a7a30d6e3f32

11 years agoAdd new functions to security-server API.
Pawel Polawski [Fri, 25 Jan 2013 10:52:21 +0000 (11:52 +0100)]
Add new functions to security-server API.

[Issue#]        SSDWSSP-45
[Cause]         Implement new APIs for getting SMACK label
                of peer in security-server
[Problem]       Two new function needed in API. Both returns
                SMACK labels but ttaking another parameters.
                First uses cookie, second socked descriptor.
[Solution]      New functions added
[Verification]  Tests should not fail

Change-Id: I4ca044230f1cba1174b61abae6b7641e1bbfcdbc

11 years agoCherry-pick release: security-server_0.0.62
Tomasz Swierczek [Fri, 18 Jan 2013 08:09:05 +0000 (09:09 +0100)]
Cherry-pick release: security-server_0.0.62

* Separated security-server and wrt-security-daemon
* This repository holds security-server now

Conflicts:

CMakeLists.txt
packaging/security-server.spec
socket_connection/connection/SocketStream.cpp
tests/CMakeLists.txt
tests/security_server_tests/CMakeLists.txt

Change-Id: I1185bb69f8517da9f5fa5299335e8cc856ba402f

11 years agoFixing communication problem with security-server
Zofia Abramowska [Wed, 16 Jan 2013 13:44:23 +0000 (14:44 +0100)]
Fixing communication problem with security-server

[Issue#] LINUXSWAP-454
[Bug] Security-server crashes
[Cause] No handling of SIGPIPE signal when writing to closed socket
[Solution] blocking SIGPIPE signal in all threads created by socket
service and handling error returned by write
[Verification] Build, run tests and check  JIRA bug(N_SE-20154)

Change-Id: Id6d15922bb9b94cb9ee565e9e90ed0e46a27e25c

11 years agoPrevent related bugfixes.
Mariusz Domanski [Tue, 15 Jan 2013 13:58:55 +0000 (14:58 +0100)]
Prevent related bugfixes.

[Issue] N/A
[Bug] Bugs found by Coverity.
[Cause] N/A
[Solution] Checking varibale values, catching exception.
[Verification] Build security-server, run all tests.

Change-Id: Ide143746a4a4ccc4cc575f14cfb3529d3b32d088

11 years agoAdd NOTICE file
Hyunwoo Kim [Tue, 15 Jan 2013 12:44:39 +0000 (21:44 +0900)]
Add NOTICE file

Change-Id: Icb39ceba4aaefb880d949f213cdf25bb47a34e5c

11 years ago[Prevent] Multiple minor bugfixes.
Jan Olszak [Mon, 14 Jan 2013 09:55:31 +0000 (10:55 +0100)]
[Prevent] Multiple minor bugfixes.

[Issue] Bugs found by Coverity.
[Bug] N/A
[Cause] N/A
[Solution] Fixed bugs.
[Verification] Build security-server.

Change-Id: I33df2ee3d0c8a6a1abbe6ff89063603c604bb2aa

11 years agoRe-enabling systemd configuration.
baik [Thu, 13 Dec 2012 00:51:07 +0000 (09:51 +0900)]
Re-enabling systemd configuration.

Change-Id: I7eb6c073b1614482331dff6d885c63848c47c7f9

11 years agoMerge "Invoke initiate_try to init variable"
Chengwei Yang [Fri, 11 Jan 2013 04:13:30 +0000 (13:13 +0900)]
Merge "Invoke initiate_try to init variable"

11 years agoRelease of changes from Samsung private repository.
Mariusz Domanski [Tue, 8 Jan 2013 17:01:54 +0000 (18:01 +0100)]
Release of changes from Samsung private repository.

* Fixed Prevent defects

Change-Id: I3468cf2754656c7f0b4a3cc619fcfdd1c758d2e6

11 years agoInvoke initiate_try to init variable
Chengwei Yang [Tue, 8 Jan 2013 07:49:29 +0000 (15:49 +0800)]
Invoke initiate_try to init variable

Change-Id: I382d1ad805dec133051f098ceb62a42559e0ab38
Signed-off-by: Chengwei Yang <chengwei.yang@intel.com>
11 years agoRelease of changes from Samsung private repository.
Pawel Polawski [Mon, 7 Jan 2013 14:00:27 +0000 (15:00 +0100)]
Release of changes from Samsung private repository.

* Fixed possible thread synchronization issue

Change-Id: I434ff4bf5c539dfe845d52369dc51d7bddc29081

11 years agoRelease of changes from Samsung private repository.
Tomasz Swierczek [Thu, 3 Jan 2013 13:58:33 +0000 (14:58 +0100)]
Release of changes from Samsung private repository.

* Enabled sockets in security server
* Removed old popup implementation

Change-Id: Iceb91878e48bd0cad819aa07e3de147a7befd1c8

11 years agoRelease of changes from Samsung private repository.
Tomasz Swierczek [Tue, 18 Dec 2012 09:08:10 +0000 (10:08 +0100)]
Release of changes from Samsung private repository.

* Adjusted TizenPolicy.xml - added missing "deny" clause for Untrusted widgets

Change-Id: Ic0bc673b1ed856bbd008dcc3e64202d6456fe529

11 years agoRelease of changes from Samsung private repository.
Tomasz Swierczek [Thu, 13 Dec 2012 09:50:43 +0000 (10:50 +0100)]
Release of changes from Samsung private repository.

* Adjusted TizenPolicy.xml according to Device API HQ team request

Change-Id: I399896954b5462119e365220b9f39a23956f6ae2

11 years ago[systemd] systemd boot script for security-server
baik [Thu, 13 Dec 2012 00:51:07 +0000 (09:51 +0900)]
[systemd] systemd boot script for security-server
          in addtion, add to verify middleware user.

11 years agoRelease of changes from Samsung private repository.
Tomasz Swierczek [Tue, 11 Dec 2012 17:50:09 +0000 (18:50 +0100)]
Release of changes from Samsung private repository.

* Fixed problem with leaving zombie after SIGTERM
* Turned on logs in "old security server".
* Added new TizenPolicy as per HQ WRT team request

Change-Id: I170af48d89407ff9dc770563bb3ab4aa47cabc6d

11 years agoRelease changes from Samsung private repository.
Tomasz Swierczek [Fri, 7 Dec 2012 15:06:00 +0000 (16:06 +0100)]
Release changes from Samsung private repository.

* Prepared headers for abstract communication client
* Added implementation of security socket server
* Added ace_is_private_api function in ace_settings
* Fixed klocwork bugs
* Added Partner API section in Tizen Policy
* Added build type required for code coverage analysis
* Removed deprecated headers from dev package

Change-Id: I57bf5912e45c6b6f5c514f45e52b60490404d244

11 years agorelease 0.0.48
Kidong Kim [Wed, 5 Dec 2012 10:01:42 +0000 (19:01 +0900)]
release 0.0.48

Change-Id: I8cb402cb786e55e5b6894c0b8fc4e5a0112900ac

11 years agoMerge branch 'for-rsa-systemd'
Jacek Migacz [Fri, 23 Nov 2012 15:36:12 +0000 (16:36 +0100)]
Merge branch 'for-rsa-systemd'

Change-Id: If23f809e103988990930032eafadf9c7b8ccb958

11 years agoinclude types.h header file
Kidong Kim [Tue, 27 Nov 2012 04:29:07 +0000 (13:29 +0900)]
include types.h header file

11 years agoSeparation of wrt.db and ace.db #1
Andrzej Surdej [Wed, 10 Oct 2012 15:06:45 +0000 (17:06 +0200)]
Separation of wrt.db and ace.db #1
Prepare AceDB to handle all necessary information.

[Issue#] LINUXSWAP-211
[Problem] Separation ACE and WrtDB
[Cause] N/A
[Solution] AceDB extended
[Verification] To verify successfuly build repository

Change-Id: I5b55ae522dcdd944022a4ff1e23155b593b77632

12 years agofix manifest
Kidong Kim [Wed, 7 Nov 2012 10:32:55 +0000 (19:32 +0900)]
fix manifest

12 years agoRelease changes from Samsung private repository.
Tomasz Swierczek [Mon, 29 Oct 2012 11:15:01 +0000 (12:15 +0100)]
Release changes from Samsung private repository.

* merge of security-server and wrt-security-daemon
* added wrt-ocsp API
* added support for Orange certficates

Change-Id: I0d498b7070876c77d45ce18226f35c08f67c13bb

12 years agosource code open - security-server 2.0alpha master 2.0_alpha submit/master/20120920.151108
Kidong Kim [Wed, 22 Aug 2012 04:48:10 +0000 (13:48 +0900)]
source code open - security-server

12 years agoupload tizen1.0 source
Kim Kibum [Sun, 29 Apr 2012 08:01:52 +0000 (17:01 +0900)]
upload tizen1.0 source

12 years agoInitial empty repository
eunmee moon [Fri, 27 Apr 2012 12:36:08 +0000 (21:36 +0900)]
Initial empty repository