History log of /haiku/src/servers/keystore/KeyStoreServer.h
Revision Date Author Comments
# d4d6d123 25-Jun-2012 Michael Lotz <mmlr@mlotz.ch>

Don't require a key when creating a new keyring.

There will be key setting/removal functions so the step of adding the
keyring and setting a key on it can be done individually.


# a59169de 24-Jun-2012 Michael Lotz <mmlr@mlotz.ch>

Add the access string to the app access request dialog.

This way the user can see what operation the application tries to do.


# a2f27987 24-Jun-2012 Michael Lotz <mmlr@mlotz.ch>

Add strings that explain an access operation.

May be used in the app access request dialog later on to show what
privilege is actually requested.


# a5a5f4ca 24-Jun-2012 Michael Lotz <mmlr@mlotz.ch>

Rename "default" to "master" keyring as that's what it is.

Also add a well defined name ("Master") for the master keyring so it is
easier to understand what this keyring does instead of displaying an
empty string.


# c8ae843f 24-Jun-2012 Michael Lotz <mmlr@mlotz.ch>

Rename keyring "access/revoke" to "unlock/lock".

The unlock/lock concept just seems easier to grasp and is used in
various similar tools as well.


# cfa81315 07-Feb-2012 Michael Lotz <mmlr@mlotz.ch>

Resolve/validate the calling application, request if needed.

The application is resolved and then looked up in the keyring. If the
keyring doesn't provide a matching entry, an application access request
is triggered. The mechanism doesn't yet do any actual checksums, but
has provisions for differentiating between new and changed/updated
applications.


# 76df966e 07-Feb-2012 Michael Lotz <mmlr@mlotz.ch>

Add a preliminary way to resolve the calling application.

This will have to be reworked though, as by using the roster only
BApplications can be resolved, as plain cli apps aren't registered with
the registrar.


# 97b3abf1 07-Feb-2012 Michael Lotz <mmlr@mlotz.ch>

Add access flags to fine tune application access.

Not sure if these will actually be used, as they might just be a little
overkill and not easily usable.


# 90013c82 07-Jan-2012 Michael Lotz <mmlr@mlotz.ch>

Let the KeyRequestWindow return a flattened BPasswordKey.

Also provide the keyring string separately instead of abusing the
output key message.


# ac9b28f0 06-Jan-2012 Michael Lotz <mmlr@mlotz.ch>

Implement basic keyring access logic and key request dialog.

* The keyring needs to be made accessible before allowing any
operation.
* Before executing commands the keyring is made accessible if
possible (the command is aborted as needed).
* Accessing a keyring opens up a preliminary key request dialog.
* If the default keyring is accessible and a keyring key for the
requested keyring is found, that key will be used to automatically
make the requested keyring accessible.


# 95eee1a3 04-Jan-2012 Michael Lotz <mmlr@mlotz.ch>

Make the keystore_server keyring aware.

* Move the *Key() functions into a Keyring class.
* Retrieve and select the right keyring for various commands.
* Implement adding/removing/enumerating keyrings.
* Rework the keystore database read/write to work with keyrings.
* Sync BKeyStore::IsKeyringAccessible() with the changed message.
* Remove leftover template code from registrar.


# 0dfaf59d 04-Jan-2012 Michael Lotz <mmlr@mlotz.ch>

Implement basic storage and lookup functions.

* Add reading/writing a yet unprotected flat BMessage as the storage
backend for the keys.
* Factor out the identifier based lookup logic into _FindKey() and use
that from _AddKey() to detect duplicates.
* Add _FindKey() variant that does the lookup based on given type and
purpose constraints.


# 8d9bc9e0 04-Jan-2012 Michael Lotz <mmlr@mlotz.ch>

Add a skeleton keystore_server.

It will handle the BKeyStore messages but is yet relatively empty. It
only returns an error to two messages right now.


# d4d6d1239322eeb4c100489eb76ed63afde449d6 25-Jun-2012 Michael Lotz <mmlr@mlotz.ch>

Don't require a key when creating a new keyring.

There will be key setting/removal functions so the step of adding the
keyring and setting a key on it can be done individually.


# a59169de6f5fd92ba06d5d3836a4223b22cb8b6e 24-Jun-2012 Michael Lotz <mmlr@mlotz.ch>

Add the access string to the app access request dialog.

This way the user can see what operation the application tries to do.


# a2f279870c158dd81005c29ade41dc976e2892f2 24-Jun-2012 Michael Lotz <mmlr@mlotz.ch>

Add strings that explain an access operation.

May be used in the app access request dialog later on to show what
privilege is actually requested.


# a5a5f4ca70b67a24c1a0666b8bde040748e0c3ae 24-Jun-2012 Michael Lotz <mmlr@mlotz.ch>

Rename "default" to "master" keyring as that's what it is.

Also add a well defined name ("Master") for the master keyring so it is
easier to understand what this keyring does instead of displaying an
empty string.


# c8ae843f3dcba6c16eda5d2b5db1f981ee69f448 24-Jun-2012 Michael Lotz <mmlr@mlotz.ch>

Rename keyring "access/revoke" to "unlock/lock".

The unlock/lock concept just seems easier to grasp and is used in
various similar tools as well.


# cfa813152623734173149bfb57c236d276729f67 07-Feb-2012 Michael Lotz <mmlr@mlotz.ch>

Resolve/validate the calling application, request if needed.

The application is resolved and then looked up in the keyring. If the
keyring doesn't provide a matching entry, an application access request
is triggered. The mechanism doesn't yet do any actual checksums, but
has provisions for differentiating between new and changed/updated
applications.


# 76df966ee6a656a9b51896653b3c411a53688fe4 07-Feb-2012 Michael Lotz <mmlr@mlotz.ch>

Add a preliminary way to resolve the calling application.

This will have to be reworked though, as by using the roster only
BApplications can be resolved, as plain cli apps aren't registered with
the registrar.


# 97b3abf1624641d7d6f14a7657ae572fa2a6ab2e 07-Feb-2012 Michael Lotz <mmlr@mlotz.ch>

Add access flags to fine tune application access.

Not sure if these will actually be used, as they might just be a little
overkill and not easily usable.


# 90013c82e83a7a25e5d012daff40e38db5d5f741 07-Jan-2012 Michael Lotz <mmlr@mlotz.ch>

Let the KeyRequestWindow return a flattened BPasswordKey.

Also provide the keyring string separately instead of abusing the
output key message.


# ac9b28f058fe4671b5034f6a3ed3f85091f53c5f 06-Jan-2012 Michael Lotz <mmlr@mlotz.ch>

Implement basic keyring access logic and key request dialog.

* The keyring needs to be made accessible before allowing any
operation.
* Before executing commands the keyring is made accessible if
possible (the command is aborted as needed).
* Accessing a keyring opens up a preliminary key request dialog.
* If the default keyring is accessible and a keyring key for the
requested keyring is found, that key will be used to automatically
make the requested keyring accessible.


# 95eee1a36302940cff0bcf81d943b9d59c60bac2 04-Jan-2012 Michael Lotz <mmlr@mlotz.ch>

Make the keystore_server keyring aware.

* Move the *Key() functions into a Keyring class.
* Retrieve and select the right keyring for various commands.
* Implement adding/removing/enumerating keyrings.
* Rework the keystore database read/write to work with keyrings.
* Sync BKeyStore::IsKeyringAccessible() with the changed message.
* Remove leftover template code from registrar.


# 0dfaf59dbbc5319b1a52ef4108ea3ab64f8d2729 04-Jan-2012 Michael Lotz <mmlr@mlotz.ch>

Implement basic storage and lookup functions.

* Add reading/writing a yet unprotected flat BMessage as the storage
backend for the keys.
* Factor out the identifier based lookup logic into _FindKey() and use
that from _AddKey() to detect duplicates.
* Add _FindKey() variant that does the lookup based on given type and
purpose constraints.


# 8d9bc9e0eea57d70aee87c11b82603c69ae3eb53 04-Jan-2012 Michael Lotz <mmlr@mlotz.ch>

Add a skeleton keystore_server.

It will handle the BKeyStore messages but is yet relatively empty. It
only returns an error to two messages right now.