diff options
author | Jaemin Ryu <jm77.ryu@samsung.com> | 2019-02-22 14:51:40 +0900 |
---|---|---|
committer | Jaemin Ryu <jm77.ryu@samsung.com> | 2019-02-22 14:51:40 +0900 |
commit | 90a474045b13e69d9a6249f1d316809ec081ed87 (patch) | |
tree | e1088abaaadb5a90708453c4ffaaa3c7f3c4cbd8 | |
parent | e64f0491052d24bc926f1b7d82b0169ae0cf77d9 (diff) | |
download | dpm-auth-tizen_8.0.tar.gz dpm-auth-tizen_8.0.tar.bz2 dpm-auth-tizen_8.0.zip |
Change getters to use methodCallForcetizen_9.0_m2_releasetizen_8.0_m2_releasetizen_7.0_m2_releasetizen_6.5.m2_releasetizen_6.0.m2_releasetizen_5.5.m2_releasesubmit/tizen_6.5/20211028.162401submit/tizen_6.0_hotfix/20201103.114804submit/tizen_6.0_hotfix/20201102.192504submit/tizen_6.0/20201029.205104submit/tizen_5.5_wearable_hotfix/20201026.184304submit/tizen_5.5_mobile_hotfix/20201026.185104submit/tizen_5.5/20191031.000004submit/tizen_5.0/20190222.075859submit/tizen/20190225.022013submit/tizen/20190222.075321accepted/tizen/unified/20190307.230800accepted/tizen/9.0/unified/20241030.232756accepted/tizen/8.0/unified/20231005.093611accepted/tizen/7.0/unified/hotfix/20221116.105542accepted/tizen/7.0/unified/20221110.060929accepted/tizen/6.5/unified/20211028.121352accepted/tizen/6.0/unified/hotfix/20201103.002940accepted/tizen/6.0/unified/20201030.114945accepted/tizen/5.5/unified/wearable/hotfix/20201027.112525accepted/tizen/5.5/unified/mobile/hotfix/20201027.085847accepted/tizen/5.5/unified/20191031.021802accepted/tizen/5.0/unified/20190304.054832tizen_9.0tizen_8.0tizen_7.0_hotfixtizen_7.0tizen_6.5tizen_6.0_hotfixtizen_6.0tizen_5.5_wearable_hotfixtizen_5.5_tvtizen_5.5_mobile_hotfixtizen_5.5tizen_5.0tizenaccepted/tizen_unifiedaccepted/tizen_9.0_unifiedaccepted/tizen_8.0_unifiedaccepted/tizen_7.0_unified_hotfixaccepted/tizen_7.0_unifiedaccepted/tizen_6.5_unifiedaccepted/tizen_6.0_unified_hotfixaccepted/tizen_6.0_unifiedaccepted/tizen_5.5_unified_wearable_hotfixaccepted/tizen_5.5_unified_mobile_hotfixaccepted/tizen_5.5_unifiedaccepted/tizen_5.0_unified
All getters of password policy require password privilege.
Thus privilege check should be performed in the every method call
Change-Id: Ia0fabe1c8c42319105f4b8b16e81c51cbd52bad6
Signed-off-by: Jaemin Ryu <jm77.ryu@samsung.com>
-rw-r--r-- | api/password.cpp | 24 |
1 files changed, 12 insertions, 12 deletions
diff --git a/api/password.cpp b/api/password.cpp index b890ab3..011bfbe 100644 --- a/api/password.cpp +++ b/api/password.cpp @@ -85,7 +85,7 @@ EXPORT_API int dpm_password_get_quality(void* handle, int *quality) try { Status<int> ret { 0 }; - ret = client.methodCall<int>("Password::getQuality"); + ret = client.methodCallForce<int>("Password::getQuality"); if (ret.get() < 0) { return -1; } @@ -123,7 +123,7 @@ EXPORT_API int dpm_password_get_minimum_length(void* handle, int *value) try { Status<int> ret { 0 }; - ret = client.methodCall<int>("Password::getMinimumLength"); + ret = client.methodCallForce<int>("Password::getMinimumLength"); if (ret.get() < 0) { return -1; @@ -162,7 +162,7 @@ EXPORT_API int dpm_password_get_min_complex_chars(void* handle, int *value) try { Status<int> ret { 0 }; - ret = client.methodCall<int>("Password::getMinComplexChars"); + ret = client.methodCallForce<int>("Password::getMinComplexChars"); if (ret.get() < 0) { return -1; } @@ -200,7 +200,7 @@ EXPORT_API int dpm_password_get_maximum_failed_attempts_for_wipe(void* handle, i try { Status<int> ret { 0 }; - ret = client.methodCall<int>("Password::getMaximumFailedForWipe"); + ret = client.methodCallForce<int>("Password::getMaximumFailedForWipe"); if (ret.get() < 0) { return -1; } @@ -238,7 +238,7 @@ EXPORT_API int dpm_password_get_expires(void* handle, int *value) try { Status<int> ret { 0 }; - ret = client.methodCall<int>("Password::getExpires"); + ret = client.methodCallForce<int>("Password::getExpires"); if (ret.get() < 0) { return -1; } @@ -276,7 +276,7 @@ EXPORT_API int dpm_password_get_history(void* handle, int *value) try { Status<int> ret { 0 }; - ret = client.methodCall<int>("Password::getHistory"); + ret = client.methodCallForce<int>("Password::getHistory"); if (ret.get() < 0) { return -1; } @@ -361,7 +361,7 @@ EXPORT_API int dpm_password_get_max_inactivity_time_device_lock(void* handle, in try { Status<int> ret { 0 }; - ret = client.methodCall<int>("Password::getMaxInactivityTimeDeviceLock");; + ret = client.methodCallForce<int>("Password::getMaxInactivityTimeDeviceLock");; if (ret.get() < 0) { return -1; } @@ -401,7 +401,7 @@ EXPORT_API int dpm_password_get_ret(void* handle, dpm_password_status_e *status) try { Status<int> ret { 0 }; - ret = client.methodCall<int>("Password::getStatus"); + ret = client.methodCallForce<int>("Password::getStatus"); if (ret.get() < 0) { return -1; } @@ -438,7 +438,7 @@ EXPORT_API int dpm_password_get_pattern(void* handle, char **pattern) try { Status<std::string> ret { std::string() }; - ret = client.methodCall<std::string>("Password::getPattern"); + ret = client.methodCallForce<std::string>("Password::getPattern"); *pattern = ::strdup(ret.get().c_str()); } catch (...) { return -1; @@ -472,7 +472,7 @@ EXPORT_API int dpm_password_get_maximum_character_occurrences(void* handle, int try { Status<int> ret { 0 }; - ret = client.methodCall<int>("Password::getMaximumCharacterOccurrences"); + ret = client.methodCallForce<int>("Password::getMaximumCharacterOccurrences"); if (ret.get() < 0) { return -1; } @@ -510,7 +510,7 @@ EXPORT_API int dpm_password_get_maximum_numeric_sequence_length(void* handle, in try { Status<int> ret { 0 }; - ret = client.methodCall<int>("Password::getMaximumNumericSequenceLength"); + ret = client.methodCallForce<int>("Password::getMaximumNumericSequenceLength"); if (ret.get() < 0) { return -1; } @@ -605,7 +605,7 @@ EXPORT_API int dpm_password_get_recovery(void* handle, int *enable) try { Status<int> ret { false }; - ret = client.methodCall<int>("Password::getRecovery"); + ret = client.methodCallForce<int>("Password::getRecovery"); if (ret.get() < 0) { return -1; } |