summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJaemin Ryu <jm77.ryu@samsung.com>2019-02-22 14:51:40 +0900
committerJaemin Ryu <jm77.ryu@samsung.com>2019-02-22 14:51:40 +0900
commit90a474045b13e69d9a6249f1d316809ec081ed87 (patch)
treee1088abaaadb5a90708453c4ffaaa3c7f3c4cbd8
parente64f0491052d24bc926f1b7d82b0169ae0cf77d9 (diff)
downloaddpm-auth-tizen_6.0.tar.gz
dpm-auth-tizen_6.0.tar.bz2
dpm-auth-tizen_6.0.zip
Change getters to use methodCallForcetizen_9.0_m2_releasetizen_8.0_m2_releasetizen_7.0_m2_releasetizen_6.5.m2_releasetizen_6.0.m2_releasetizen_5.5.m2_releasesubmit/tizen_6.5/20211028.162401submit/tizen_6.0_hotfix/20201103.114804submit/tizen_6.0_hotfix/20201102.192504submit/tizen_6.0/20201029.205104submit/tizen_5.5_wearable_hotfix/20201026.184304submit/tizen_5.5_mobile_hotfix/20201026.185104submit/tizen_5.5/20191031.000004submit/tizen_5.0/20190222.075859submit/tizen/20190225.022013submit/tizen/20190222.075321accepted/tizen/unified/20190307.230800accepted/tizen/9.0/unified/20241030.232756accepted/tizen/8.0/unified/20231005.093611accepted/tizen/7.0/unified/hotfix/20221116.105542accepted/tizen/7.0/unified/20221110.060929accepted/tizen/6.5/unified/20211028.121352accepted/tizen/6.0/unified/hotfix/20201103.002940accepted/tizen/6.0/unified/20201030.114945accepted/tizen/5.5/unified/wearable/hotfix/20201027.112525accepted/tizen/5.5/unified/mobile/hotfix/20201027.085847accepted/tizen/5.5/unified/20191031.021802accepted/tizen/5.0/unified/20190304.054832tizen_9.0tizen_8.0tizen_7.0_hotfixtizen_7.0tizen_6.5tizen_6.0_hotfixtizen_6.0tizen_5.5_wearable_hotfixtizen_5.5_tvtizen_5.5_mobile_hotfixtizen_5.5tizen_5.0tizenaccepted/tizen_unifiedaccepted/tizen_9.0_unifiedaccepted/tizen_8.0_unifiedaccepted/tizen_7.0_unified_hotfixaccepted/tizen_7.0_unifiedaccepted/tizen_6.5_unifiedaccepted/tizen_6.0_unified_hotfixaccepted/tizen_6.0_unifiedaccepted/tizen_5.5_unified_wearable_hotfixaccepted/tizen_5.5_unified_mobile_hotfixaccepted/tizen_5.5_unifiedaccepted/tizen_5.0_unified
All getters of password policy require password privilege. Thus privilege check should be performed in the every method call Change-Id: Ia0fabe1c8c42319105f4b8b16e81c51cbd52bad6 Signed-off-by: Jaemin Ryu <jm77.ryu@samsung.com>
-rw-r--r--api/password.cpp24
1 files changed, 12 insertions, 12 deletions
diff --git a/api/password.cpp b/api/password.cpp
index b890ab3..011bfbe 100644
--- a/api/password.cpp
+++ b/api/password.cpp
@@ -85,7 +85,7 @@ EXPORT_API int dpm_password_get_quality(void* handle, int *quality)
try {
Status<int> ret { 0 };
- ret = client.methodCall<int>("Password::getQuality");
+ ret = client.methodCallForce<int>("Password::getQuality");
if (ret.get() < 0) {
return -1;
}
@@ -123,7 +123,7 @@ EXPORT_API int dpm_password_get_minimum_length(void* handle, int *value)
try {
Status<int> ret { 0 };
- ret = client.methodCall<int>("Password::getMinimumLength");
+ ret = client.methodCallForce<int>("Password::getMinimumLength");
if (ret.get() < 0) {
return -1;
@@ -162,7 +162,7 @@ EXPORT_API int dpm_password_get_min_complex_chars(void* handle, int *value)
try {
Status<int> ret { 0 };
- ret = client.methodCall<int>("Password::getMinComplexChars");
+ ret = client.methodCallForce<int>("Password::getMinComplexChars");
if (ret.get() < 0) {
return -1;
}
@@ -200,7 +200,7 @@ EXPORT_API int dpm_password_get_maximum_failed_attempts_for_wipe(void* handle, i
try {
Status<int> ret { 0 };
- ret = client.methodCall<int>("Password::getMaximumFailedForWipe");
+ ret = client.methodCallForce<int>("Password::getMaximumFailedForWipe");
if (ret.get() < 0) {
return -1;
}
@@ -238,7 +238,7 @@ EXPORT_API int dpm_password_get_expires(void* handle, int *value)
try {
Status<int> ret { 0 };
- ret = client.methodCall<int>("Password::getExpires");
+ ret = client.methodCallForce<int>("Password::getExpires");
if (ret.get() < 0) {
return -1;
}
@@ -276,7 +276,7 @@ EXPORT_API int dpm_password_get_history(void* handle, int *value)
try {
Status<int> ret { 0 };
- ret = client.methodCall<int>("Password::getHistory");
+ ret = client.methodCallForce<int>("Password::getHistory");
if (ret.get() < 0) {
return -1;
}
@@ -361,7 +361,7 @@ EXPORT_API int dpm_password_get_max_inactivity_time_device_lock(void* handle, in
try {
Status<int> ret { 0 };
- ret = client.methodCall<int>("Password::getMaxInactivityTimeDeviceLock");;
+ ret = client.methodCallForce<int>("Password::getMaxInactivityTimeDeviceLock");;
if (ret.get() < 0) {
return -1;
}
@@ -401,7 +401,7 @@ EXPORT_API int dpm_password_get_ret(void* handle, dpm_password_status_e *status)
try {
Status<int> ret { 0 };
- ret = client.methodCall<int>("Password::getStatus");
+ ret = client.methodCallForce<int>("Password::getStatus");
if (ret.get() < 0) {
return -1;
}
@@ -438,7 +438,7 @@ EXPORT_API int dpm_password_get_pattern(void* handle, char **pattern)
try {
Status<std::string> ret { std::string() };
- ret = client.methodCall<std::string>("Password::getPattern");
+ ret = client.methodCallForce<std::string>("Password::getPattern");
*pattern = ::strdup(ret.get().c_str());
} catch (...) {
return -1;
@@ -472,7 +472,7 @@ EXPORT_API int dpm_password_get_maximum_character_occurrences(void* handle, int
try {
Status<int> ret { 0 };
- ret = client.methodCall<int>("Password::getMaximumCharacterOccurrences");
+ ret = client.methodCallForce<int>("Password::getMaximumCharacterOccurrences");
if (ret.get() < 0) {
return -1;
}
@@ -510,7 +510,7 @@ EXPORT_API int dpm_password_get_maximum_numeric_sequence_length(void* handle, in
try {
Status<int> ret { 0 };
- ret = client.methodCall<int>("Password::getMaximumNumericSequenceLength");
+ ret = client.methodCallForce<int>("Password::getMaximumNumericSequenceLength");
if (ret.get() < 0) {
return -1;
}
@@ -605,7 +605,7 @@ EXPORT_API int dpm_password_get_recovery(void* handle, int *enable)
try {
Status<int> ret { false };
- ret = client.methodCall<int>("Password::getRecovery");
+ ret = client.methodCallForce<int>("Password::getRecovery");
if (ret.get() < 0) {
return -1;
}