13 #include "pkgmgr-info.h"
14 #include "pkgmgrinfo_debug.h"
15 #include "pkgmgrinfo_private.h"
16 #include "pkgmgr_parser.h"
18 typedef struct _pkgmgr_certinfo_x {
22 char *cert_info[MAX_CERT_TYPE]; /*certificate info*/
23 int cert_id[MAX_CERT_TYPE]; /*certificate ID in index table*/
26 typedef struct _pkgmgr_instcertinfo_x {
28 char *cert_info[MAX_CERT_TYPE]; /*certificate data*/
29 int is_new[MAX_CERT_TYPE]; /*whether already exist in table or not*/
30 int ref_count[MAX_CERT_TYPE]; /*reference count of certificate data*/
31 int cert_id[MAX_CERT_TYPE]; /*certificate ID in index table*/
32 } pkgmgr_instcertinfo_x;
34 typedef struct _pkgmgr_certindexinfo_x {
37 } pkgmgr_certindexinfo_x;
39 typedef struct _pkgmgr_cert_x {
44 API int pkgmgrinfo_pkginfo_create_certinfo(pkgmgrinfo_certinfo_h *handle)
46 retvm_if(handle == NULL, PMINFO_R_EINVAL, "Argument supplied to hold return value is NULL\n");
47 pkgmgr_certinfo_x *certinfo = NULL;
48 certinfo = calloc(1, sizeof(pkgmgr_certinfo_x));
50 retvm_if(certinfo == NULL, PMINFO_R_ERROR, "Malloc Failed\n");
51 *handle = (void *)certinfo;
55 static int _pkginfo_compare_certinfo(sqlite3 *db, const char *l_pkgid,
57 pkgmgrinfo_cert_compare_result_type_e *result)
59 static const char query[] =
60 "SELECT COALESCE(author_signer_cert, -1) FROM package_cert_info "
65 int certid[2] = {-1, -1};
71 ret = sqlite3_prepare_v2(db, query, strlen(query), &stmt, NULL);
72 if (ret != SQLITE_OK) {
73 _LOGE("prepare error: %s", sqlite3_errmsg(db));
74 return PMINFO_R_ERROR;
77 for (i = 0; i < 2; i++) {
78 ret = sqlite3_bind_text(stmt, 1, pkgid[i], -1, SQLITE_STATIC);
79 if (ret != SQLITE_OK) {
80 _LOGE("bind error: %s", sqlite3_errmsg(db));
81 sqlite3_finalize(stmt);
82 return PMINFO_R_ERROR;
85 ret = sqlite3_step(stmt);
86 if (ret == SQLITE_ROW) {
87 _save_column_int(stmt, 0, &certid[i]);
88 } else if (ret != SQLITE_DONE) {
89 _LOGE("step error: %s", sqlite3_errmsg(db));
90 sqlite3_finalize(stmt);
91 return PMINFO_R_ERROR;
95 sqlite3_clear_bindings(stmt);
98 if (certid[0] == -1 && certid[1] == -1)
99 *result = PMINFO_CERT_COMPARE_BOTH_NO_CERT;
100 else if (certid[0] == -1)
101 *result = PMINFO_CERT_COMPARE_LHS_NO_CERT;
102 else if (certid[1] == -1)
103 *result = PMINFO_CERT_COMPARE_RHS_NO_CERT;
104 else if (certid[0] == certid[1])
105 *result = PMINFO_CERT_COMPARE_MATCH;
107 *result = PMINFO_CERT_COMPARE_MISMATCH;
110 sqlite3_finalize(stmt);
115 API int pkgmgrinfo_pkginfo_compare_usr_pkg_cert_info(const char *lhs_package_id,
116 const char *rhs_package_id, uid_t uid,
117 pkgmgrinfo_cert_compare_result_type_e *compare_result)
123 if (lhs_package_id == NULL || rhs_package_id == NULL ||
124 compare_result == NULL) {
125 _LOGE("invalid parameter");
126 return PMINFO_R_EINVAL;
129 /* open unified global cert db */
130 dbpath = getUserPkgCertDBPathUID(GLOBAL_USER);
132 return PMINFO_R_ERROR;
134 ret = sqlite3_open_v2(dbpath, &db, SQLITE_OPEN_READONLY, NULL);
135 if (ret != SQLITE_OK) {
136 _LOGE("failed to open db: %d", ret);
137 return PMINFO_R_ERROR;
140 if (_pkginfo_compare_certinfo(db, lhs_package_id, rhs_package_id,
142 _LOGE("failed to compare certinfo");
143 sqlite3_close_v2(db);
144 return PMINFO_R_ERROR;
147 sqlite3_close_v2(db);
152 API int pkgmgrinfo_pkginfo_compare_pkg_cert_info(const char *lhs_package_id, const char *rhs_package_id, pkgmgrinfo_cert_compare_result_type_e *compare_result)
154 return pkgmgrinfo_pkginfo_compare_usr_pkg_cert_info(lhs_package_id, rhs_package_id, _getuid(), compare_result);
157 static int _pkginfo_get_pkgid_from_appid(uid_t uid, const char *appid,
160 static const char query[] =
161 "SELECT package FROM package_app_info WHERE app_id=?";
167 dbpath = getUserPkgParserDBPathUID(uid);
169 return PMINFO_R_ERROR;
171 ret = sqlite3_open_v2(dbpath, &db, SQLITE_OPEN_READONLY, NULL);
172 if (ret != SQLITE_OK) {
173 _LOGE("failed to open db: %d", ret);
174 return PMINFO_R_ERROR;
177 ret = sqlite3_prepare_v2(db, query, strlen(query), &stmt, NULL);
178 if (ret != SQLITE_OK) {
179 _LOGE("prepare error: %s", sqlite3_errmsg(db));
180 sqlite3_close_v2(db);
181 return PMINFO_R_ERROR;
184 ret = sqlite3_bind_text(stmt, 1, appid, -1, SQLITE_STATIC);
185 if (ret != SQLITE_OK) {
186 _LOGE("bind error: %s", sqlite3_errmsg(db));
187 sqlite3_finalize(stmt);
188 sqlite3_close_v2(db);
189 return PMINFO_R_ERROR;
192 ret = sqlite3_step(stmt);
193 if (ret == SQLITE_ROW) {
194 _save_column_str(stmt, 0, pkgid);
196 } else if (ret == SQLITE_DONE) {
197 _LOGI("cannot find pkgid of app %s for uid %d", appid);
198 ret = PMINFO_R_ENOENT;
200 _LOGE("step error: %s", sqlite3_errmsg(db));
201 ret = PMINFO_R_ERROR;
204 sqlite3_finalize(stmt);
205 sqlite3_close_v2(db);
210 API int pkgmgrinfo_pkginfo_compare_usr_app_cert_info(const char *lhs_app_id,
211 const char *rhs_app_id, uid_t uid,
212 pkgmgrinfo_cert_compare_result_type_e *compare_result)
215 char *l_pkgid = NULL;
216 char *r_pkgid = NULL;
218 if (lhs_app_id == NULL || rhs_app_id == NULL ||
219 compare_result == NULL) {
220 _LOGE("invalid parameter");
221 return PMINFO_R_EINVAL;
224 ret = _pkginfo_get_pkgid_from_appid(uid, lhs_app_id, &l_pkgid);
225 if (ret == PMINFO_R_ENOENT && uid != GLOBAL_USER)
226 ret = _pkginfo_get_pkgid_from_appid(GLOBAL_USER, lhs_app_id,
229 if (ret != PMINFO_R_OK)
232 ret = _pkginfo_get_pkgid_from_appid(uid, rhs_app_id, &r_pkgid);
233 if (ret == PMINFO_R_ENOENT && uid != GLOBAL_USER)
234 ret = _pkginfo_get_pkgid_from_appid(GLOBAL_USER, rhs_app_id,
237 if (ret != PMINFO_R_OK) {
242 ret = pkgmgrinfo_pkginfo_compare_usr_pkg_cert_info(l_pkgid, r_pkgid,
243 uid, compare_result);
251 API int pkgmgrinfo_pkginfo_compare_app_cert_info(const char *lhs_app_id,
252 const char *rhs_app_id,
253 pkgmgrinfo_cert_compare_result_type_e *compare_result)
255 return pkgmgrinfo_pkginfo_compare_usr_app_cert_info(lhs_app_id,
256 rhs_app_id, _getuid(), compare_result);
259 static int _pkginfo_get_cert(sqlite3 *db, int cert_id[],
262 static const char query[] =
263 "SELECT cert_info FROM package_cert_index_info WHERE cert_id=?";
268 ret = sqlite3_prepare_v2(db, query, strlen(query), &stmt, NULL);
269 if (ret != SQLITE_OK) {
270 _LOGE("prepare failed: %s", sqlite3_errmsg(db));
271 return PMINFO_R_ERROR;
274 for (i = 0; i < MAX_CERT_TYPE; i++) {
275 ret = sqlite3_bind_int(stmt, 1, cert_id[i]);
276 if (ret != SQLITE_OK) {
277 sqlite3_finalize(stmt);
278 _LOGE("bind failed: %s", sqlite3_errmsg(db));
279 return PMINFO_R_ERROR;
282 ret = sqlite3_step(stmt);
283 if (ret == SQLITE_DONE) {
285 sqlite3_clear_bindings(stmt);
287 } else if (ret != SQLITE_ROW) {
288 _LOGE("step failed: %s", sqlite3_errmsg(db));
289 sqlite3_finalize(stmt);
290 return PMINFO_R_ERROR;
293 _save_column_str(stmt, 0, &cert_info[i]);
295 sqlite3_clear_bindings(stmt);
298 sqlite3_finalize(stmt);
303 static int _pkginfo_get_certid(sqlite3 *db, const char *pkgid, int cert_id[])
305 static const char query[] =
306 "SELECT author_root_cert, author_im_cert, author_signer_cert, "
307 "dist_root_cert, dist_im_cert, dist_signer_cert, "
308 "dist2_root_cert, dist2_im_cert, dist2_signer_cert "
309 "FROM package_cert_info WHERE package=?";
314 ret = sqlite3_prepare_v2(db, query, strlen(query), &stmt, NULL);
315 if (ret != SQLITE_OK) {
316 _LOGE("prepare failed: %s", sqlite3_errmsg(db));
317 return PMINFO_R_ERROR;
320 ret = sqlite3_bind_text(stmt, 1, pkgid, -1, SQLITE_STATIC);
321 if (ret != SQLITE_OK) {
322 _LOGE("bind failed: %s", sqlite3_errmsg(db));
323 sqlite3_finalize(stmt);
324 return PMINFO_R_ERROR;
327 ret = sqlite3_step(stmt);
328 if (ret == SQLITE_DONE) {
329 sqlite3_finalize(stmt);
330 return PMINFO_R_ENOENT;
331 } else if (ret != SQLITE_ROW) {
332 _LOGE("step failed: %s", sqlite3_errmsg(db));
333 sqlite3_finalize(stmt);
334 return PMINFO_R_ERROR;
338 _save_column_int(stmt, idx++, &cert_id[PMINFO_AUTHOR_ROOT_CERT]);
339 _save_column_int(stmt, idx++,
340 &cert_id[PMINFO_AUTHOR_INTERMEDIATE_CERT]);
341 _save_column_int(stmt, idx++, &cert_id[PMINFO_AUTHOR_SIGNER_CERT]);
342 _save_column_int(stmt, idx++, &cert_id[PMINFO_DISTRIBUTOR_ROOT_CERT]);
343 _save_column_int(stmt, idx++,
344 &cert_id[PMINFO_DISTRIBUTOR_INTERMEDIATE_CERT]);
345 _save_column_int(stmt, idx++, &cert_id[PMINFO_DISTRIBUTOR_SIGNER_CERT]);
346 _save_column_int(stmt, idx++, &cert_id[PMINFO_DISTRIBUTOR2_ROOT_CERT]);
347 _save_column_int(stmt, idx++,
348 &cert_id[PMINFO_DISTRIBUTOR2_INTERMEDIATE_CERT]);
349 _save_column_int(stmt, idx++,
350 &cert_id[PMINFO_DISTRIBUTOR2_SIGNER_CERT]);
352 sqlite3_finalize(stmt);
357 static int _pkginfo_get_certinfo(const char *pkgid, pkgmgr_certinfo_x *info)
363 /* open unified global cert db */
364 dbpath = getUserPkgCertDBPathUID(GLOBAL_USER);
366 return PMINFO_R_ERROR;
368 ret = sqlite3_open_v2(dbpath, &db, SQLITE_OPEN_READONLY, NULL);
369 if (ret != SQLITE_OK) {
370 _LOGE("failed to open db: %d", ret);
371 return PMINFO_R_ERROR;
374 ret = _pkginfo_get_certid(db, pkgid, info->cert_id);
375 if (ret != PMINFO_R_OK) {
376 sqlite3_close_v2(db);
380 ret = _pkginfo_get_cert(db, info->cert_id, info->cert_info);
381 if (ret != PMINFO_R_OK) {
382 sqlite3_close_v2(db);
389 API int pkgmgrinfo_pkginfo_load_certinfo(const char *pkgid, pkgmgrinfo_certinfo_h handle, uid_t uid)
392 pkgmgr_certinfo_x *info = (pkgmgr_certinfo_x *)handle;
394 if (pkgid == NULL || handle == NULL) {
395 _LOGE("invalid parameter");
396 return PMINFO_R_EINVAL;
399 ret = _pkginfo_get_certinfo(pkgid, info);
400 if (ret != PMINFO_R_OK)
401 _LOGE("failed to get certinfo of %s ", pkgid);
406 API int pkgmgrinfo_pkginfo_get_cert_value(pkgmgrinfo_certinfo_h handle, pkgmgrinfo_cert_type cert_type, const char **cert_value)
408 retvm_if(handle == NULL, PMINFO_R_EINVAL, "Argument supplied is NULL\n");
409 retvm_if(cert_value == NULL, PMINFO_R_EINVAL, "Argument supplied is NULL\n");
410 retvm_if(cert_type < PMINFO_AUTHOR_ROOT_CERT, PMINFO_R_EINVAL, "Invalid certificate type\n");
411 retvm_if(cert_type > PMINFO_DISTRIBUTOR2_SIGNER_CERT, PMINFO_R_EINVAL, "Invalid certificate type\n");
412 pkgmgr_certinfo_x *certinfo = NULL;
413 certinfo = (pkgmgr_certinfo_x *)handle;
414 if ((certinfo->cert_info)[cert_type])
415 *cert_value = (certinfo->cert_info)[cert_type];
421 API int pkgmgrinfo_pkginfo_destroy_certinfo(pkgmgrinfo_certinfo_h handle)
423 retvm_if(handle == NULL, PMINFO_R_EINVAL, "Argument supplied is NULL\n");
425 pkgmgr_certinfo_x *certinfo = NULL;
426 certinfo = (pkgmgr_certinfo_x *)handle;
427 if (certinfo->pkgid) {
428 free(certinfo->pkgid);
429 certinfo->pkgid = NULL;
431 for (i = 0; i < MAX_CERT_TYPE; i++) {
432 if ((certinfo->cert_info)[i]) {
433 free((certinfo->cert_info)[i]);
434 (certinfo->cert_info)[i] = NULL;
442 API int pkgmgrinfo_create_certinfo_set_handle(pkgmgrinfo_instcertinfo_h *handle)
444 retvm_if(handle == NULL, PMINFO_R_EINVAL, "Argument supplied to hold return value is NULL\n");
445 pkgmgr_instcertinfo_x *certinfo = NULL;
447 certinfo = calloc(1, sizeof(pkgmgr_instcertinfo_x));
448 retvm_if(certinfo == NULL, PMINFO_R_ERROR, "Malloc Failed\n");
449 *handle = (void *)certinfo;
453 API int pkgmgrinfo_set_cert_value(pkgmgrinfo_instcertinfo_h handle, pkgmgrinfo_instcert_type cert_type, char *cert_value)
455 retvm_if(handle == NULL, PMINFO_R_EINVAL, "Argument supplied is NULL\n");
456 retvm_if(cert_value == NULL, PMINFO_R_EINVAL, "Argument supplied is NULL\n");
457 retvm_if(cert_type < PMINFO_SET_AUTHOR_ROOT_CERT, PMINFO_R_EINVAL, "Invalid certificate type\n");
458 retvm_if(cert_type > PMINFO_SET_DISTRIBUTOR2_SIGNER_CERT, PMINFO_R_EINVAL, "Invalid certificate type\n");
459 pkgmgr_instcertinfo_x *certinfo = NULL;
460 certinfo = (pkgmgr_instcertinfo_x *)handle;
461 (certinfo->cert_info)[cert_type] = strdup(cert_value);
465 static int _pkginfo_save_cert_info(sqlite3 *db, const char *pkgid,
468 static const char query_insert[] =
469 "INSERT INTO package_cert_info (package,"
470 " author_root_cert, author_im_cert, author_signer_cert,"
471 " dist_root_cert, dist_im_cert, dist_signer_cert,"
472 " dist2_root_cert, dist2_im_cert, dist2_signer_cert) "
474 " (SELECT cert_id FROM package_cert_index_info"
475 " WHERE cert_info=?),"
476 " (SELECT cert_id FROM package_cert_index_info"
477 " WHERE cert_info=?),"
478 " (SELECT cert_id FROM package_cert_index_info"
479 " WHERE cert_info=?),"
480 " (SELECT cert_id FROM package_cert_index_info"
481 " WHERE cert_info=?),"
482 " (SELECT cert_id FROM package_cert_index_info"
483 " WHERE cert_info=?),"
484 " (SELECT cert_id FROM package_cert_index_info"
485 " WHERE cert_info=?),"
486 " (SELECT cert_id FROM package_cert_index_info"
487 " WHERE cert_info=?),"
488 " (SELECT cert_id FROM package_cert_index_info"
489 " WHERE cert_info=?),"
490 " (SELECT cert_id FROM package_cert_index_info"
491 " WHERE cert_info=?))";
492 static const char query_update[] =
493 "UPDATE package_cert_info SET "
494 " author_root_cert= "
495 " (SELECT cert_id FROM package_cert_index_info"
496 " WHERE cert_info=?),"
498 " (SELECT cert_id FROM package_cert_index_info"
499 " WHERE cert_info=?),"
500 " author_signer_cert= "
501 " (SELECT cert_id FROM package_cert_index_info"
502 " WHERE cert_info=?),"
504 " (SELECT cert_id FROM package_cert_index_info"
505 " WHERE cert_info=?),"
507 " (SELECT cert_id FROM package_cert_index_info"
508 " WHERE cert_info=?),"
509 " dist_signer_cert= "
510 " (SELECT cert_id FROM package_cert_index_info"
511 " WHERE cert_info=?),"
513 " (SELECT cert_id FROM package_cert_index_info"
514 " WHERE cert_info=?),"
516 " (SELECT cert_id FROM package_cert_index_info"
517 " WHERE cert_info=?),"
518 "dist2_signer_cert= "
519 " (SELECT cert_id FROM package_cert_index_info"
520 " WHERE cert_info=?) "
527 ret = sqlite3_prepare_v2(db, query_insert, strlen(query_insert),
529 if (ret != SQLITE_OK) {
530 _LOGE("prepare error: %s", sqlite3_errmsg(db));
531 return PMINFO_R_ERROR;
535 sqlite3_bind_text(stmt, idx++, pkgid, -1, SQLITE_STATIC);
536 for (i = 0; i < MAX_CERT_TYPE; i++) {
537 if (sqlite3_bind_text(stmt, idx++, cert_info[i], -1,
539 _LOGE("bind error: %s", sqlite3_errmsg(db));
540 sqlite3_finalize(stmt);
541 return PMINFO_R_ERROR;
545 ret = sqlite3_step(stmt);
546 sqlite3_finalize(stmt);
547 if (ret == SQLITE_CONSTRAINT) {
548 ret = sqlite3_prepare_v2(db, query_update, strlen(query_update),
550 if (ret != SQLITE_OK) {
551 _LOGE("prepare error: %s", sqlite3_errmsg(db));
552 return PMINFO_R_ERROR;
555 for (i = 0; i < MAX_CERT_TYPE; i++) {
556 if (sqlite3_bind_text(stmt, idx++, cert_info[i], -1,
558 _LOGE("bind error: %s", sqlite3_errmsg(db));
559 sqlite3_finalize(stmt);
560 return PMINFO_R_ERROR;
563 sqlite3_bind_text(stmt, idx++, pkgid, -1, SQLITE_STATIC);
564 ret = sqlite3_step(stmt);
565 sqlite3_finalize(stmt);
568 if (ret != SQLITE_DONE) {
569 _LOGE("step error: %s", sqlite3_errmsg(db));
570 return PMINFO_R_ERROR;
576 static int _pkginfo_save_cert_index_info(sqlite3 *db, char *cert_info[])
578 static const char query[] =
579 "INSERT OR REPLACE INTO package_cert_index_info "
580 "(cert_info, cert_id, cert_ref_count) "
583 " (SELECT cert_id FROM package_cert_index_info "
584 " WHERE cert_info=?), "
586 " ((SELECT cert_ref_count FROM package_cert_index_info "
587 " WHERE cert_info=?) + 1), 1))";
593 ret = sqlite3_prepare_v2(db, query, strlen(query), &stmt, NULL);
594 if (ret != SQLITE_OK) {
595 _LOGE("prepare error: %s", sqlite3_errmsg(db));
596 return PMINFO_R_ERROR;
599 for (i = 0; i < MAX_CERT_TYPE; i++) {
600 if (cert_info[i] == NULL)
603 sqlite3_bind_text(stmt, idx++, cert_info[i], -1, SQLITE_STATIC);
604 sqlite3_bind_text(stmt, idx++, cert_info[i], -1, SQLITE_STATIC);
605 sqlite3_bind_text(stmt, idx++, cert_info[i], -1, SQLITE_STATIC);
607 ret = sqlite3_step(stmt);
608 if (ret != SQLITE_DONE) {
609 _LOGE("step failed: %s", sqlite3_errmsg(db));
610 sqlite3_finalize(stmt);
611 return PMINFO_R_ERROR;
615 sqlite3_clear_bindings(stmt);
618 sqlite3_finalize(stmt);
623 API int pkgmgrinfo_save_certinfo(const char *pkgid, pkgmgrinfo_instcertinfo_h handle, uid_t uid)
628 pkgmgr_instcertinfo_x *info = (pkgmgr_instcertinfo_x *)handle;
630 if (pkgid == NULL || handle == NULL) {
631 _LOGE("invalid parameter");
632 return PMINFO_R_EINVAL;
635 /* open unified global cert db */
636 dbpath = getUserPkgCertDBPathUID(GLOBAL_USER);
638 return PMINFO_R_ERROR;
640 ret = sqlite3_open_v2(dbpath, &db, SQLITE_OPEN_READWRITE, NULL);
641 if (ret != SQLITE_OK) {
642 _LOGE("failed to open db: %d", ret);
643 return PMINFO_R_ERROR;
646 ret = sqlite3_exec(db, "BEGIN EXCLUSIVE", NULL, NULL, NULL);
647 if (ret != SQLITE_OK) {
648 _LOGE("failed to begin transaction");
649 sqlite3_close_v2(db);
650 return PMINFO_R_ERROR;
653 _check_create_cert_db(db);
655 if (_pkginfo_save_cert_index_info(db, info->cert_info)) {
656 _LOGE("failed to save cert index info, rollback now");
657 sqlite3_exec(GET_DB(cert_db), "ROLLBACK", NULL, NULL, NULL);
658 sqlite3_close_v2(db);
659 return PMINFO_R_ERROR;
661 if (_pkginfo_save_cert_info(db, pkgid, info->cert_info)) {
662 _LOGE("failed to save cert info, rollback now");
663 sqlite3_exec(GET_DB(cert_db), "ROLLBACK", NULL, NULL, NULL);
664 sqlite3_close_v2(db);
665 return PMINFO_R_ERROR;
668 ret = sqlite3_exec(db, "COMMIT", NULL, NULL, NULL);
669 if (ret != SQLITE_OK) {
670 _LOGE("failed to commit transaction, rollback now");
671 sqlite3_exec(GET_DB(cert_db), "ROLLBACK", NULL, NULL, NULL);
672 sqlite3_close_v2(db);
673 return PMINFO_R_ERROR;
676 sqlite3_close_v2(db);
681 API int pkgmgrinfo_destroy_certinfo_set_handle(pkgmgrinfo_instcertinfo_h handle)
683 retvm_if(handle == NULL, PMINFO_R_EINVAL, "Argument supplied is NULL\n");
685 pkgmgr_instcertinfo_x *certinfo = NULL;
686 certinfo = (pkgmgr_instcertinfo_x *)handle;
687 if (certinfo->pkgid) {
688 free(certinfo->pkgid);
689 certinfo->pkgid = NULL;
691 for (i = 0; i < MAX_CERT_TYPE; i++) {
692 if ((certinfo->cert_info)[i]) {
693 free((certinfo->cert_info)[i]);
694 (certinfo->cert_info)[i] = NULL;
702 static int _pkginfo_delete_certinfo(sqlite3 *db, const char *pkgid)
704 static const char query[] =
705 "DELETE FROM package_cert_info WHERE package=?";
709 ret = sqlite3_prepare_v2(db, query, strlen(query), &stmt, NULL);
710 if (ret != SQLITE_OK) {
711 _LOGE("prepare error: %s", sqlite3_errmsg(db));
712 return PMINFO_R_ERROR;
715 ret = sqlite3_bind_text(stmt, 1, pkgid, -1, SQLITE_STATIC);
716 if (ret != SQLITE_OK) {
717 _LOGE("bind error: %s", sqlite3_errmsg(db));
718 sqlite3_finalize(stmt);
719 return PMINFO_R_ERROR;
722 ret = sqlite3_step(stmt);
723 sqlite3_finalize(stmt);
724 if (ret != SQLITE_DONE) {
725 _LOGE("step error: %s", sqlite3_errmsg(db));
726 return PMINFO_R_ERROR;
732 API int pkgmgrinfo_delete_usr_certinfo(const char *pkgid, uid_t uid)
739 _LOGE("invalid parameter");
740 return PMINFO_R_EINVAL;
743 /* open unified global cert db */
744 dbpath = getUserPkgCertDBPathUID(GLOBAL_USER);
746 return PMINFO_R_ERROR;
748 ret = sqlite3_open_v2(dbpath, &db, SQLITE_OPEN_READWRITE, NULL);
749 if (ret != SQLITE_OK) {
750 _LOGE("failed to open db: %d", ret);
751 return PMINFO_R_ERROR;
754 ret = sqlite3_exec(db, "BEGIN EXCLUSIVE", NULL, NULL, NULL);
755 if (ret != SQLITE_OK) {
756 _LOGE("failed to begin transaction");
757 sqlite3_close_v2(db);
758 return PMINFO_R_ERROR;
761 if (_pkginfo_delete_certinfo(db, pkgid)) {
762 _LOGE("failed to delete certinfo of %s, rollback now", pkgid);
763 sqlite3_exec(GET_DB(cert_db), "ROLLBACK", NULL, NULL, NULL);
764 sqlite3_close_v2(db);
765 return PMINFO_R_ERROR;
768 ret = sqlite3_exec(db, "COMMIT", NULL, NULL, NULL);
769 if (ret != SQLITE_OK) {
770 _LOGE("failed to commit transaction, rollback now");
771 sqlite3_exec(GET_DB(cert_db), "ROLLBACK", NULL, NULL, NULL);
772 sqlite3_close_v2(db);
773 return PMINFO_R_ERROR;
776 sqlite3_close_v2(db);
781 API int pkgmgrinfo_delete_certinfo(const char *pkgid)
783 return pkgmgrinfo_delete_usr_certinfo(pkgid, _getuid());