#
d4d6d123 |
|
25-Jun-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Don't require a key when creating a new keyring. There will be key setting/removal functions so the step of adding the keyring and setting a key on it can be done individually.
|
#
a59169de |
|
24-Jun-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Add the access string to the app access request dialog. This way the user can see what operation the application tries to do.
|
#
a2f27987 |
|
24-Jun-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Add strings that explain an access operation. May be used in the app access request dialog later on to show what privilege is actually requested.
|
#
a5a5f4ca |
|
24-Jun-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Rename "default" to "master" keyring as that's what it is. Also add a well defined name ("Master") for the master keyring so it is easier to understand what this keyring does instead of displaying an empty string.
|
#
c8ae843f |
|
24-Jun-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Rename keyring "access/revoke" to "unlock/lock". The unlock/lock concept just seems easier to grasp and is used in various similar tools as well.
|
#
cfa81315 |
|
07-Feb-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Resolve/validate the calling application, request if needed. The application is resolved and then looked up in the keyring. If the keyring doesn't provide a matching entry, an application access request is triggered. The mechanism doesn't yet do any actual checksums, but has provisions for differentiating between new and changed/updated applications.
|
#
76df966e |
|
07-Feb-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Add a preliminary way to resolve the calling application. This will have to be reworked though, as by using the roster only BApplications can be resolved, as plain cli apps aren't registered with the registrar.
|
#
97b3abf1 |
|
07-Feb-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Add access flags to fine tune application access. Not sure if these will actually be used, as they might just be a little overkill and not easily usable.
|
#
90013c82 |
|
07-Jan-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Let the KeyRequestWindow return a flattened BPasswordKey. Also provide the keyring string separately instead of abusing the output key message.
|
#
ac9b28f0 |
|
06-Jan-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Implement basic keyring access logic and key request dialog. * The keyring needs to be made accessible before allowing any operation. * Before executing commands the keyring is made accessible if possible (the command is aborted as needed). * Accessing a keyring opens up a preliminary key request dialog. * If the default keyring is accessible and a keyring key for the requested keyring is found, that key will be used to automatically make the requested keyring accessible.
|
#
95eee1a3 |
|
04-Jan-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Make the keystore_server keyring aware. * Move the *Key() functions into a Keyring class. * Retrieve and select the right keyring for various commands. * Implement adding/removing/enumerating keyrings. * Rework the keystore database read/write to work with keyrings. * Sync BKeyStore::IsKeyringAccessible() with the changed message. * Remove leftover template code from registrar.
|
#
0dfaf59d |
|
04-Jan-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Implement basic storage and lookup functions. * Add reading/writing a yet unprotected flat BMessage as the storage backend for the keys. * Factor out the identifier based lookup logic into _FindKey() and use that from _AddKey() to detect duplicates. * Add _FindKey() variant that does the lookup based on given type and purpose constraints.
|
#
8d9bc9e0 |
|
04-Jan-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Add a skeleton keystore_server. It will handle the BKeyStore messages but is yet relatively empty. It only returns an error to two messages right now.
|
#
d4d6d1239322eeb4c100489eb76ed63afde449d6 |
|
25-Jun-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Don't require a key when creating a new keyring. There will be key setting/removal functions so the step of adding the keyring and setting a key on it can be done individually.
|
#
a59169de6f5fd92ba06d5d3836a4223b22cb8b6e |
|
24-Jun-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Add the access string to the app access request dialog. This way the user can see what operation the application tries to do.
|
#
a2f279870c158dd81005c29ade41dc976e2892f2 |
|
24-Jun-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Add strings that explain an access operation. May be used in the app access request dialog later on to show what privilege is actually requested.
|
#
a5a5f4ca70b67a24c1a0666b8bde040748e0c3ae |
|
24-Jun-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Rename "default" to "master" keyring as that's what it is. Also add a well defined name ("Master") for the master keyring so it is easier to understand what this keyring does instead of displaying an empty string.
|
#
c8ae843f3dcba6c16eda5d2b5db1f981ee69f448 |
|
24-Jun-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Rename keyring "access/revoke" to "unlock/lock". The unlock/lock concept just seems easier to grasp and is used in various similar tools as well.
|
#
cfa813152623734173149bfb57c236d276729f67 |
|
07-Feb-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Resolve/validate the calling application, request if needed. The application is resolved and then looked up in the keyring. If the keyring doesn't provide a matching entry, an application access request is triggered. The mechanism doesn't yet do any actual checksums, but has provisions for differentiating between new and changed/updated applications.
|
#
76df966ee6a656a9b51896653b3c411a53688fe4 |
|
07-Feb-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Add a preliminary way to resolve the calling application. This will have to be reworked though, as by using the roster only BApplications can be resolved, as plain cli apps aren't registered with the registrar.
|
#
97b3abf1624641d7d6f14a7657ae572fa2a6ab2e |
|
07-Feb-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Add access flags to fine tune application access. Not sure if these will actually be used, as they might just be a little overkill and not easily usable.
|
#
90013c82e83a7a25e5d012daff40e38db5d5f741 |
|
07-Jan-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Let the KeyRequestWindow return a flattened BPasswordKey. Also provide the keyring string separately instead of abusing the output key message.
|
#
ac9b28f058fe4671b5034f6a3ed3f85091f53c5f |
|
06-Jan-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Implement basic keyring access logic and key request dialog. * The keyring needs to be made accessible before allowing any operation. * Before executing commands the keyring is made accessible if possible (the command is aborted as needed). * Accessing a keyring opens up a preliminary key request dialog. * If the default keyring is accessible and a keyring key for the requested keyring is found, that key will be used to automatically make the requested keyring accessible.
|
#
95eee1a36302940cff0bcf81d943b9d59c60bac2 |
|
04-Jan-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Make the keystore_server keyring aware. * Move the *Key() functions into a Keyring class. * Retrieve and select the right keyring for various commands. * Implement adding/removing/enumerating keyrings. * Rework the keystore database read/write to work with keyrings. * Sync BKeyStore::IsKeyringAccessible() with the changed message. * Remove leftover template code from registrar.
|
#
0dfaf59dbbc5319b1a52ef4108ea3ab64f8d2729 |
|
04-Jan-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Implement basic storage and lookup functions. * Add reading/writing a yet unprotected flat BMessage as the storage backend for the keys. * Factor out the identifier based lookup logic into _FindKey() and use that from _AddKey() to detect duplicates. * Add _FindKey() variant that does the lookup based on given type and purpose constraints.
|
#
8d9bc9e0eea57d70aee87c11b82603c69ae3eb53 |
|
04-Jan-2012 |
Michael Lotz <mmlr@mlotz.ch> |
Add a skeleton keystore_server. It will handle the BKeyStore messages but is yet relatively empty. It only returns an error to two messages right now.
|