platform/upstream/dnsmasq.git
15 months agoMerge tag 'upstream/2.88' into tizen 72/288972/1 accepted/tizen_8.0_unified accepted/tizen_unified tizen tizen_8.0 accepted/tizen/8.0/unified/20231005.094758 accepted/tizen/unified/20230302.131053 tizen_8.0_m2_release
cheoleun moon [Mon, 27 Feb 2023 05:44:28 +0000 (14:44 +0900)]
Merge tag 'upstream/2.88' into tizen

Change-Id: I0bd9310f2be4823799acb0901eb09625b3cdf166

15 months agoImported Upstream version 2.88 61/288961/1 upstream upstream/2.88
cheoleun moon [Mon, 27 Feb 2023 03:23:19 +0000 (12:23 +0900)]
Imported Upstream version 2.88

Change-Id: I71efe884b7eb0d77b9804525cf3ac4f8eee40a30

2 years agoMerge tag 'upstream/2.86' into tizen 68/269268/1 accepted/tizen_7.0_unified accepted/tizen_7.0_unified_hotfix tizen_7.0 tizen_7.0_hotfix accepted/tizen/7.0/unified/20221110.061034 accepted/tizen/7.0/unified/hotfix/20221116.110714 accepted/tizen/unified/20220117.134951 submit/tizen/20220113.081517 tizen_7.0_m2_release
Seonah Moon [Wed, 12 Jan 2022 07:43:03 +0000 (16:43 +0900)]
Merge tag 'upstream/2.86' into tizen

Change-Id: I8c4bbd0b37b8789579fb2e3ac4cdfb7472a9a114

2 years agoImported Upstream version 2.86 65/269265/1 upstream/2.86
Seonah Moon [Wed, 12 Jan 2022 07:08:34 +0000 (16:08 +0900)]
Imported Upstream version 2.86

Change-Id: Ia335f0d8b027f8471c52e8dfdab59f3680422f10

3 years agoMerge tag 'upstream/2.83' into tizen 92/252392/3 accepted/tizen_6.5_unified tizen_6.5 accepted/tizen/6.5/unified/20211028.223204 accepted/tizen/unified/20210215.131008 submit/tizen/20210205.062739 submit/tizen_6.5/20211028.163301 tizen_6.5.m2_release
Seonah Moon [Wed, 27 Jan 2021 11:12:33 +0000 (20:12 +0900)]
Merge tag 'upstream/2.83' into tizen

Change-Id: Ib59076a278201769b7b309fc0aa320804c60bbbe

3 years agoImported Upstream version 2.83 69/252369/1 upstream/2.83
Seonah Moon [Wed, 27 Jan 2021 07:36:06 +0000 (16:36 +0900)]
Imported Upstream version 2.83

Change-Id: I906d516832a250a16fa9ac3e877fb10f42278c6e

3 years agoUpgrade upstream version to 2.82 33/251733/3 accepted/tizen/unified/20210120.120834 submit/tizen/20210119.104018
Seonah Moon [Tue, 19 Jan 2021 03:55:12 +0000 (12:55 +0900)]
Upgrade upstream version to 2.82

Change-Id: Ia73a4e8c6a2efff2c1d07b195d17529451ca6f95

3 years agoImported Upstream version 2.82 68/251668/1 upstream/2.82
Seonah Moon [Mon, 18 Jan 2021 09:17:41 +0000 (18:17 +0900)]
Imported Upstream version 2.82

Change-Id: If6c75c812a79ed39237a4cb4af71ce73d665de75

5 years agoFix crash issue 10/182210/1 accepted/tizen_5.0_unified accepted/tizen_5.5_unified accepted/tizen_5.5_unified_mobile_hotfix accepted/tizen_5.5_unified_wearable_hotfix accepted/tizen_6.0_unified_hotfix tizen_5.5_mobile_hotfix tizen_5.5_tv tizen_5.5_wearable_hotfix tizen_6.0_hotfix accepted/tizen/5.0/unified/20181102.024411 accepted/tizen/5.5/unified/20191031.005105 accepted/tizen/5.5/unified/mobile/hotfix/20201027.062024 accepted/tizen/5.5/unified/wearable/hotfix/20201027.102254 accepted/tizen/6.0/unified/20201030.104344 accepted/tizen/6.0/unified/hotfix/20201102.235526 accepted/tizen/unified/20180622.122621 submit/tizen/20180621.080823 submit/tizen_5.0/20181101.000006 submit/tizen_5.5/20191031.000006 submit/tizen_5.5_mobile_hotfix/20201026.185106 submit/tizen_5.5_wearable_hotfix/20201026.184306 submit/tizen_6.0/20201029.205501 submit/tizen_6.0_hotfix/20201102.192901 submit/tizen_6.0_hotfix/20201103.115101 tizen_5.5.m2_release tizen_6.0.m2_release
Seonah Moon [Fri, 15 Jun 2018 05:33:36 +0000 (14:33 +0900)]
Fix crash issue

SIGBUS crash has occured when ipv6 address is copied.

Change-Id: Ie58721f2f8aa909c61d97c7640f0897bfdb5383e

5 years agoUpdate to 2.79 05/182205/2
Seonah Moon [Thu, 21 Jun 2018 07:36:11 +0000 (16:36 +0900)]
Update to 2.79

Change-Id: I36382b896dd583a66872d458f1c3b55461a9e95d

5 years agoImported Upstream version 2.79 88/182188/1 upstream/2.79
Seonah Moon [Thu, 21 Jun 2018 06:44:41 +0000 (15:44 +0900)]
Imported Upstream version 2.79

Change-Id: I9a2f4c945e0481ab803bdf0c85921433f33a9256
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
6 years agoSecurity fix, CVE-2017-14496, Integer underflow in DNS response creation. 17/170417/1 accepted/tizen/unified/20180222.142138 submit/tizen/20180222.013450
Seonah Moon [Mon, 16 Oct 2017 07:48:06 +0000 (16:48 +0900)]
Security fix, CVE-2017-14496, Integer underflow in DNS response creation.

Fix DoS in DNS. Invalid boundary checks in the
add_pseudoheader function allows a memcpy call with negative
size An attacker which can send malicious DNS queries
to dnsmasq can trigger a DoS remotely.
dnsmasq is vulnerable only if one of the following option is
specified: --add-mac, --add-cpe-id or --add-subnet.

http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=897c113fda0886a28a986cc6ba17bb93bd6cb1c7

Change-Id: I4171560a179639755a115abfc381f03aa54f3bab
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
6 years agoSecurity fix, CVE-2017-14494, Infoleak handling DHCPv6 forwarded requests. 11/170411/1
Seonah Moon [Mon, 16 Oct 2017 07:00:26 +0000 (16:00 +0900)]
Security fix, CVE-2017-14494, Infoleak handling DHCPv6 forwarded requests.

Fix information leak in DHCPv6. A crafted DHCPv6 packet can
cause dnsmasq to forward memory from outside the packet
buffer to a DHCPv6 server when acting as a relay.

http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=33e3f1029c9ec6c63e430ff51063a6301d4b2262

Change-Id: Ia97bfc821fdb07ed599e4b4fa177280e0e52c8fa
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
6 years agoFix CVE-2017-13704, which resulted in a crash on a large DNS query. 09/170409/1
Seonah Moon [Mon, 16 Oct 2017 06:22:30 +0000 (15:22 +0900)]
Fix CVE-2017-13704, which resulted in a crash on a large DNS query.

A DNS query recieved by UDP which exceeds 512 bytes (or the EDNS0 packet size,
if different.) is enough to cause SIGSEGV.

http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=63437ffbb58837b214b4b92cb1c54bc5f3279928

Change-Id: I93a69c8e308479c0abcd64eea071473419d80946
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
6 years agoSecurity fix, CVE-2017-14493, DHCPv6 - Stack buffer overflow. 96/170296/1
Seonah Moon [Fri, 13 Oct 2017 05:54:17 +0000 (14:54 +0900)]
Security fix, CVE-2017-14493, DHCPv6 - Stack buffer overflow.

Fix stack overflow in DHCPv6 code. An attacker who can send
a DHCPv6 request to dnsmasq can overflow the stack frame and
crash or control dnsmasq.

Change-Id: I4474cd7d752e62c1251fedbc4f0f7c324bcca033
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
6 years agoSecurity fix, CVE-2017-14492, DHCPv6 RA heap overflow. 94/170294/1
Seonah Moon [Mon, 16 Oct 2017 06:41:41 +0000 (15:41 +0900)]
Security fix, CVE-2017-14492, DHCPv6 RA heap overflow.

Fix heap overflow in IPv6 router advertisement code.
This is a potentially serious security hole, as a
crafted RA request can overflow a buffer and crash or
control dnsmasq. Attacker must be on the local network.

http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=24036ea507862c7b7898b68289c8130f85599c10

Change-Id: I3218bd52bda0c540a1c52d378b8d1b6e9ed50455
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
6 years agoSecurity fix, CVE-2017-14491, DNS heap buffer overflow.(2) 76/168276/1 accepted/tizen/unified/20180126.042808 submit/tizen/20180125.231631
Seonah Moon [Mon, 16 Oct 2017 09:41:09 +0000 (18:41 +0900)]
Security fix, CVE-2017-14491, DNS heap buffer overflow.(2)

Further fix to 0549c73b7ea6b22a3c49beb4d432f185a81efcbc
Handles case when RR name is not a pointer to the question,
only occurs for some auth-mode replies, therefore not
detected by fuzzing (?)

http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=62cb936cb7ad5f219715515ae7d32dd281a5aa1f

Change-Id: I7f7fb931776dc3a9fa50a2811758c1da6dd44f0d
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
6 years agoSecurity fix, CVE-2017-14491, DNS heap buffer overflow.(1) 75/168275/1
Seonah Moon [Mon, 16 Oct 2017 09:27:03 +0000 (18:27 +0900)]
Security fix, CVE-2017-14491, DNS heap buffer overflow.(1)

Fix heap overflow in DNS code. This is a potentially serious
security hole. It allows an attacker who can make DNS
requests to dnsmasq, and who controls the contents of
a domain, which is thereby queried, to overflow
(by 2 bytes) a heap buffer and either crash, or
even take control of, dnsmasq.

http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=0549c73b7ea6b22a3c49beb4d432f185a81efcbc

Change-Id: I3cc432632f51e89b888f3a5d999ba422c134847a
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
6 years agoApply ASLR 28/143228/1 accepted/tizen/4.0/unified/20170828.222315 accepted/tizen/unified/20170814.060046 submit/tizen/20170811.040030 submit/tizen_4.0/20170828.100005 tizen_4.0.IoT.p1_release tizen_4.0.IoT.p2_release tizen_4.0.m2_release
Seonah Moon [Wed, 9 Aug 2017 06:33:29 +0000 (15:33 +0900)]
Apply ASLR

Change-Id: I736599d7bd407a52c6904f121971659cc73bd94d

6 years agoRemove unused license file (GPL-3.0+) 76/135376/1 accepted/tizen/4.0/unified/20170816.011440 accepted/tizen/unified/20170630.083334 submit/tizen/20170623.032609 submit/tizen_4.0/20170811.094300
Seonah Moon [Thu, 22 Jun 2017 06:21:39 +0000 (15:21 +0900)]
Remove unused license file (GPL-3.0+)

Change-Id: I37057ff71feaab207ef877db850402f8ecb449d2
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
7 years agoFix crash when empty address from DNS overlays A record from hosts 47/131947/1 accepted/tizen/unified/20170602.154229 submit/tizen/20170601.042236
Seonah Moon [Wed, 31 May 2017 09:29:46 +0000 (18:29 +0900)]
Fix crash when empty address from DNS overlays A record from hosts

Upstream patch is backported to resolve CVE-2015-8899
http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87

Change-Id: I1024adcb4b563130a1656edcb1e093c2e28e8cea
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
7 years agoAdded network_fw policy for dbus 42/122742/1 accepted/tizen/unified/20170410.155810 submit/tizen/20170410.045716 tizen_4.0.m1_release
Seonah Moon [Mon, 3 Apr 2017 08:30:31 +0000 (17:30 +0900)]
Added network_fw policy for dbus

Change-Id: Ia6b8562f51f3402fdec2ec090a7f28a308df95bc
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
7 years agoUsed %licesne macro for license file 70/121670/1 accepted/tizen_common accepted/tizen_ivi accepted/tizen_mobile accepted/tizen_tv accepted/tizen_wearable accepted/tizen/common/20170329.171913 accepted/tizen/ivi/20170329.034905 accepted/tizen/mobile/20170329.034824 accepted/tizen/tv/20170329.034843 accepted/tizen/unified/20170329.034931 accepted/tizen/wearable/20170329.034851 submit/tizen/20170328.111440
Seonah Moon [Tue, 28 Mar 2017 10:59:52 +0000 (19:59 +0900)]
Used %licesne macro for license file

Change-Id: I8abf444c343f504578fe0848b019ccc5f4b61c1b
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
7 years agoMerge tag 'upstream/2.74' into tizen 08/120708/1 accepted/tizen/common/20170324.122455 accepted/tizen/ivi/20170324.111255 accepted/tizen/mobile/20170324.110954 accepted/tizen/tv/20170324.111134 accepted/tizen/unified/20170324.111206 accepted/tizen/wearable/20170324.111216 submit/tizen/20170324.043430
Seonah Moon [Fri, 24 Mar 2017 01:33:05 +0000 (10:33 +0900)]
Merge tag 'upstream/2.74' into tizen

Imported Upstream version 2.74

Change-Id: I3dfe8f255eb72689fc45450c8651a5b778177cdb
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
7 years agoImported Upstream version 2.74 22/120322/1 upstream/2.74
taesub kim [Wed, 22 Mar 2017 09:13:18 +0000 (18:13 +0900)]
Imported Upstream version 2.74

Change-Id: I1ad6da6e04372b0e2f1b625ff1662d77616e603e

7 years agoRevert "Imported Upstream version 2.74" 14/120314/1
taesub kim [Wed, 22 Mar 2017 08:52:07 +0000 (01:52 -0700)]
Revert "Imported Upstream version 2.74"

This reverts commit 50d251b7504e58ac58abc184ee9fe4c5b74ec387.

Change-Id: Ib37a4bd14f141095f4c4b7432e1c923d283311bf

7 years agoImported Upstream version 2.74 81/120281/1
taesub kim [Wed, 22 Mar 2017 07:59:35 +0000 (16:59 +0900)]
Imported Upstream version 2.74

Change-Id: If275adb44c88ff3daee1397fb7ae8a22e0f5ddbc

7 years ago[CVE-2015-8899] Fix crash when empty address from DNS overlays A record from hosts 46/89046/1 accepted/tizen_3.0.m2_mobile accepted/tizen_3.0.m2_tv accepted/tizen_3.0.m2_wearable tizen_3.0.m2 tizen_3.0_tv accepted/tizen/3.0.m2/mobile/20170105.023648 accepted/tizen/3.0.m2/tv/20170105.024014 accepted/tizen/3.0.m2/wearable/20170105.024320 accepted/tizen/3.0/common/20161114.110523 accepted/tizen/3.0/ivi/20161011.043659 accepted/tizen/3.0/mobile/20161015.032533 accepted/tizen/3.0/tv/20161016.003723 accepted/tizen/3.0/wearable/20161015.081710 accepted/tizen/common/20160922.120630 accepted/tizen/ivi/20160922.233202 accepted/tizen/mobile/20160922.233153 accepted/tizen/tv/20160922.233159 accepted/tizen/unified/20170309.035232 accepted/tizen/wearable/20160922.233156 submit/tizen/20160922.020431 submit/tizen_3.0.m2/20170104.093752 submit/tizen_3.0_common/20161104.104000 submit/tizen_3.0_ivi/20161010.000001 submit/tizen_3.0_mobile/20161015.000001 submit/tizen_3.0_tv/20161015.000001 submit/tizen_3.0_wearable/20161015.000001 submit/tizen_unified/20170308.100412
Seonah Moon [Thu, 22 Sep 2016 01:22:33 +0000 (10:22 +0900)]
[CVE-2015-8899] Fix crash when empty address from DNS overlays A record from hosts

Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash)
via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.

- CVE: https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8899
- Patch: http://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=41a8d9e99be9f2cc8b02051dd322cb45e0faac87

Change-Id: If86a54c0696fea852bb9bc2f8aeece6bd6bb1598
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
7 years agoAdd dbus policy for network_fw 67/86567/1 accepted/tizen/common/20160907.154201 accepted/tizen/ivi/20160908.003634 accepted/tizen/mobile/20160908.003506 accepted/tizen/tv/20160908.003544 accepted/tizen/wearable/20160908.003608 submit/tizen/20160907.003226 submit/tizen/20160907.012754
Seonah Moon [Fri, 2 Sep 2016 02:12:15 +0000 (11:12 +0900)]
Add dbus policy for network_fw

Change-Id: I3ccc0dcd1a96299bcdc3c26a125c7cff4ee25231
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
7 years agoModify the license to GPLv2 only 78/74178/1 accepted/tizen/common/20160613.144924 accepted/tizen/ivi/20160613.123654 accepted/tizen/mobile/20160613.123811 accepted/tizen/tv/20160613.123639 accepted/tizen/wearable/20160613.123748 submit/tizen/20160613.080206
Seonah Moon [Mon, 13 Jun 2016 05:45:29 +0000 (14:45 +0900)]
Modify the license to GPLv2 only

Change-Id: I5e08f91c58ec8fc72c3cb61a3581ca4eb97c3298
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
7 years ago[TSAM-4139, TSAM-4233] Enable dbus option (HAVE_DBUS) 59/72959/2 accepted/tizen/common/20160603.151105 accepted/tizen/ivi/20160603.122713 accepted/tizen/mobile/20160603.122121 accepted/tizen/tv/20160603.122312 accepted/tizen/wearable/20160603.122556 submit/tizen/20160603.084726
Seonah Moon [Fri, 3 Jun 2016 08:34:29 +0000 (17:34 +0900)]
[TSAM-4139, TSAM-4233] Enable dbus option (HAVE_DBUS)

Change-Id: I6d0f0e43a365dc39d30d2e820a080412b396170c
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
8 years agoAdd libtzplatform-config to BuildRequires 16/66616/1 accepted/tizen/common/20160420.141622 accepted/tizen/ivi/20160421.010605 accepted/tizen/mobile/20160421.010617 accepted/tizen/tv/20160421.010548 accepted/tizen/wearable/20160421.010606 submit/tizen/20160420.044034
Seonah Moon [Wed, 20 Apr 2016 01:51:34 +0000 (10:51 +0900)]
Add libtzplatform-config to BuildRequires

Change-Id: Ib66f113c7d067c0dc38436719cf78969048560d9
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
8 years agoUpdate to 2.74 45/65045/1 accepted/tizen/common/20160407.132919 accepted/tizen/ivi/20160407.111623 accepted/tizen/mobile/20160407.111534 accepted/tizen/tv/20160407.111550 accepted/tizen/wearable/20160407.111603 submit/tizen/20160407.062043
Seonah Moon [Thu, 7 Apr 2016 05:01:07 +0000 (14:01 +0900)]
Update to 2.74

Change-Id: Ic7e94612466be7786c3d2b0724d745c7720e01c9
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
8 years agoModified hardcoded path to TZ_* 59/61859/1 accepted/tizen/common/20160311.201903 accepted/tizen/ivi/20160311.062104 accepted/tizen/mobile/20160311.062011 accepted/tizen/tv/20160311.062030 accepted/tizen/wearable/20160311.062040 submit/tizen/20160311.050645
Seonah Moon [Fri, 11 Mar 2016 04:27:56 +0000 (13:27 +0900)]
Modified hardcoded path to TZ_*

Change-Id: I4a9164181461e1adc76a6be7946be6a9f160c761
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
8 years agoBase code merged to SPIN 2.4 86/51886/1 accepted/tizen/ivi/20160218.024232 accepted/tizen/mobile/20151117.094145 accepted/tizen/tv/20151117.094204 accepted/tizen/wearable/20151117.094211 submit/tizen/20151117.062743 submit/tizen_common/20151229.142028 submit/tizen_common/20151229.144031 submit/tizen_common/20151229.154718 submit/tizen_ivi/20160217.000000 submit/tizen_ivi/20160217.000004
Seonah Moon [Tue, 17 Nov 2015 04:40:44 +0000 (13:40 +0900)]
Base code merged to SPIN 2.4

Change-Id: I41a02810399e793c4a2fcdd0a3acd7f11c5a222e
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
8 years agoApply Cynara privilege checks to dbus conf file 36/51536/1
Oskar Świtalski [Tue, 10 Nov 2015 10:14:46 +0000 (11:14 +0100)]
Apply Cynara privilege checks to dbus conf file

For SetServers and ClearCache methods check network.set privilege,
allow for everyone GetVersion method

Change-Id: Ic586d0947f8bdc1c6c96bdd40e22738a7dc63af8
Signed-off-by: Oskar Świtalski <o.switalski@samsung.com>
8 years agoInstall configure file to use d-bus on cynara policy 71/50871/2 accepted/tizen/mobile/20151103.075244 accepted/tizen/tv/20151103.075251 accepted/tizen/wearable/20151103.075254 submit/tizen/20151103.065656
Seonah Moon [Tue, 3 Nov 2015 06:00:23 +0000 (15:00 +0900)]
Install configure file to use d-bus on cynara policy

Change-Id: I4cda657d18f4e8788c7d9875adc34c9d4adae422
Signed-off-by: Seonah Moon <seonah1.moon@samsung.com>
9 years agocleaned spec file: added group and license fields 36/30336/4
Nicolas Zingilé [Fri, 14 Nov 2014 15:13:35 +0000 (16:13 +0100)]
cleaned spec file: added group and license fields

Change-Id: If3c4f77fc9b861a2978da0eee7293197c576f6fc
Bug-Tizen: TC-1230
Signed-off-by: Nicolas Zingilé <nicolas.zingile@open.eurogiciel.org>
10 years agoresetting manifest requested domain to floor 57/4757/1 accepted/tizen/ivi/genivi accepted/tizen/ivi/stable accepted/tizen_3.0.2014.q3_common accepted/tizen_3.0.m14.3_ivi accepted/tizen_generic tizen_3.0.2014.q3_common tizen_3.0.2014.q4_common tizen_3.0.2015.q1_common tizen_3.0.2015.q2_common tizen_3.0.m14.2_ivi tizen_3.0.m14.3_ivi tizen_3.0.m1_mobile tizen_3.0.m1_tv tizen_3.0_ivi tizen_ivi_genivi accepted/tizen/20130710.220917 accepted/tizen/20130912.083419 accepted/tizen/20130912.085839 accepted/tizen/20130912.093301 accepted/tizen/ivi/genivi/20140131.030646 ivi_oct_m2 submit/tizen/20130710.130249 submit/tizen/20130912.075709 submit/tizen_common/20151023.083358 submit/tizen_common/20151026.085049 submit/tizen_ivi_genivi/20140131.024518 submit/tizen_mobile/20141120.000000 tizen_3.0.2014.q3_common_release tizen_3.0.m14.2_ivi_release tizen_3.0.m14.3_ivi_release tizen_3.0.m1_mobile_release tizen_3.0.m1_tv_release tizen_3.0.m2.a1_mobile_release tizen_3.0.m2.a1_tv_release tizen_3.0_ivi_release
Alexandru Cornea [Fri, 28 Jun 2013 21:28:31 +0000 (00:28 +0300)]
resetting manifest requested domain to floor

11 years agomerge with master tizen_2.1 2.1b_release accepted/tizen/20130520.101726 accepted/tizen_2.1/20130425.035315 submit/tizen/20130517.045851 submit/tizen_2.1/20130424.231154
Jinkun Jang [Fri, 15 Mar 2013 16:13:16 +0000 (01:13 +0900)]
merge with master

11 years agoTizen 2.1 base
Jinkun Jang [Tue, 12 Mar 2013 16:47:15 +0000 (01:47 +0900)]
Tizen 2.1 base

11 years agoInitial empty repository
Jung Minsun [Tue, 21 Aug 2012 02:18:06 +0000 (11:18 +0900)]
Initial empty repository