index
:
platform/core/security/security-manager
accepted/tizen_3.0.2014.q3_common
accepted/tizen_3.0.2015.q1_common
accepted/tizen_3.0.2015.q2_common
accepted/tizen_3.0.m14.3_ivi
accepted/tizen_3.0.m2_mobile
accepted/tizen_3.0.m2_tv
accepted/tizen_3.0.m2_wearable
accepted/tizen_3.0_common
accepted/tizen_3.0_ivi
accepted/tizen_3.0_mobile
accepted/tizen_3.0_tv
accepted/tizen_3.0_wearable
accepted/tizen_4.0_unified
accepted/tizen_5.0_unified
accepted/tizen_5.5_unified
accepted/tizen_5.5_unified_mobile_hotfix
accepted/tizen_5.5_unified_wearable_hotfix
accepted/tizen_6.0_unified
accepted/tizen_6.0_unified_hotfix
accepted/tizen_6.5_unified
accepted/tizen_7.0_unified
accepted/tizen_7.0_unified_hotfix
accepted/tizen_8.0_unified
accepted/tizen_9.0_unified
accepted/tizen_common
accepted/tizen_ivi
accepted/tizen_mobile
accepted/tizen_tv
accepted/tizen_unified
accepted/tizen_unified_dev
accepted/tizen_unified_riscv
accepted/tizen_unified_toolchain
accepted/tizen_unified_x
accepted/tizen_unified_x_asan
accepted/tizen_wearable
app_encryption
appdefined
master
privacy-popup-issue
sandbox/ade/profiling
sandbox/chanleebf/asan
sandbox/dkson95/build
sandbox/dnxowls/cmake_upgrade
sandbox/mkashkarov/tizen_6.0_build
sandbox/nmerinov/llvm
sandbox/rkrypa/dpl
sandbox/zabramowska/hybrid
tizen
tizen_3.0
tizen_3.0.2014.q3_common
tizen_3.0.2014.q4_common
tizen_3.0.2015.q1_common
tizen_3.0.2015.q2_common
tizen_3.0.m14.3_ivi
tizen_3.0.m1_mobile
tizen_3.0.m1_tv
tizen_3.0.m2
tizen_3.0_ivi
tizen_3.0_tv
tizen_4.0
tizen_4.0_tv
tizen_5.0
tizen_5.5
tizen_5.5_mobile_hotfix
tizen_5.5_tv
tizen_5.5_wearable_hotfix
tizen_6.0
tizen_6.0_hotfix
tizen_6.5
tizen_7.0
tizen_7.0_hotfix
tizen_7.0_unified
tizen_8.0
tizen_9.0
Domain: Security / Access Control;
Tomasz Swierczek <t.swierczek@samsung.com>
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
systemd
Age
Commit message (
Expand
)
Author
Files
Lines
2019-07-15
Prevent starting service without the socket
Dariusz Michaluk
2
-0
/
+2
2019-07-09
Remove unnecessary setting
INSUN PYO
2
-4
/
+0
2019-04-29
Remove dbus.service.wants dependency
INSUN PYO
1
-4
/
+0
2018-10-10
Replace smack rule storage with straight-from-db rule loader
Konrad Lipinski
1
-3
/
+3
2018-08-17
Fix: launch security-manager-cleanup after /opt/usr is mounted.
Dariusz Michaluk
1
-3
/
+3
2017-06-13
Change license-manager-agent uid/gid to security_fw
Dariusz Michaluk
1
-0
/
+3
2017-04-24
Merge remote-tracking branch 'origin/tizen' into appdefined
Bartlomiej Grzelewski
3
-6
/
+24
2017-03-28
Add "VALGRIND" build type
Rafal Krypa
2
-1
/
+21
2017-03-16
Simple implementation of License Manager Agent
Bartlomiej Grzelewski
2
-0
/
+12
2017-02-27
Remove dependency between SM and DBUS
Bartlomiej Grzelewski
1
-4
/
+0
2017-02-16
Make it possible to use out-of-the-source build dir
Lukasz Pawelczyk
1
-3
/
+3
2017-01-23
Remove default dependency in cleanup service
Sunmin Lee
1
-0
/
+1
2016-08-22
Implement libnss_securitymanager
Aleksander Zdyb
1
-0
/
+4
2016-07-22
Fix typo in service file SmackProcessLabel set
Yunjin Lee
1
-1
/
+1
2016-07-20
Set SmackProcessLabel to System::Privileged
Yunjin Lee
3
-0
/
+3
2016-07-11
Add systemd option - Restart
Kidong Kim
1
-0
/
+1
2016-04-21
Move smack files to new directory
Bartlomiej Grzelewski
2
-0
/
+15
2016-02-16
Remove master and slave mode.
Bartlomiej Grzelewski
7
-54
/
+0
2016-02-03
Add cleanup service for shared private paths
Zofia Abramowska
2
-0
/
+12
2015-03-31
Prepare security-manager for master-slave mode
Rafal Krypa
7
-0
/
+54
2015-03-11
Remove references to non-existing security-manager.target
Jacek Bukarewicz
1
-4
/
+0
2015-02-05
Don't start the service on system boot, rely on socket activation
Rafal Krypa
3
-9
/
+0
2014-08-29
Refactoring: there will be only one service
Rafal Krypa
3
-3
/
+3
2014-07-01
Fix buld break on x86_64, regression in 3e62e851
Rafal Krypa
1
-1
/
+1
2014-07-01
Use variables instead of hardcoded paths to /usr/bin and /usr/lib
Rafal Krypa
2
-6
/
+7
2014-06-17
Change package name to security-manager.
Jan Cybulski
6
-30
/
+20
2014-06-17
Remove unnecessary security-server files
Jan Cybulski
10
-135
/
+0
2014-05-15
Change socket paths from /tmp... to /run...
Lukasz Wojciechowski
10
-10
/
+10
2014-05-14
Fixed name mismatch in systemd socket
Pawel Polawski
2
-2
/
+4
2014-05-08
Implement installer service
Michal Witanowski
3
-0
/
+17
2014-03-06
Remove services open-for and app-permissions.
Bartlomiej Grzelewski
4
-32
/
+0
2014-02-12
Prepare release for tizen.org
Bartlomiej Grzelewski
10
-10
/
+10
2014-02-06
Removed temporary systemd socket
Pawel Polawski
3
-18
/
+0
2014-02-06
Add security-server.target unit.
Bartlomiej Grzelewski
14
-0
/
+53
2014-02-06
Secure all critical sockets with smack label.
Bartlomiej Grzelewski
7
-13
/
+6
2014-02-06
Fix incorrect security server service description.
Lukasz Kostyra
1
-2
/
+2
2014-02-06
Remove deprecated code related to sockets.
Bartlomiej Grzelewski
3
-12
/
+0
2014-02-06
Separate password_set and password_reset APIs on socket level.
Marcin Niesluchowski
3
-0
/
+13
2014-02-06
Update systemd configuration.
Bartlomiej Grzelewski
3
-10
/
+0
2014-02-06
Remove API function security_server_get_object_name.
Bartlomiej Grzelewski
3
-13
/
+0
2014-02-06
Rewrite security-server password service to security-server 2
Lukasz Kostyra
4
-0
/
+26
2014-02-06
New Security Server security_server_open_for function.
Zbigniew Jasinski
3
-0
/
+12
2014-02-06
Security-server new API for privilege checking
Marcin Lis
3
-0
/
+12
2014-02-06
Security-server documentation and manifest update
Pawel Polawski
3
-0
/
+3
2014-02-06
Implement new API for get GID and UID by cookie
Pawel Polawski
3
-0
/
+14
2014-02-06
Move security server cookie API to new framework
Pawel Polawski
4
-0
/
+26
2014-02-06
Fix bug in app-permissions module.
Bartlomiej Grzelewski
1
-0
/
+1
2014-02-06
Added API for APP enable and disable permissions
Pawel Polawski
2
-0
/
+11
2014-02-06
Add configuration for systemd.
Bartlomiej Grzelewski
4
-1
/
+13
2014-02-06
Rewriting client socket privilige part and adding exec path service
Zofia Abramowska
3
-0
/
+12
[next]