summaryrefslogtreecommitdiff
path: root/p11-kit/rpc-server.c
Commit message (Collapse)AuthorAgeFilesLines
* build: Fix typo spotted by codespellDaiki Ueno2018-12-291-2/+2
|
* rpc-server: Check calloc failureDaiki Ueno2018-10-171-0/+4
|
* rpc-server: p11_kit_remote_serve_tokens: Fix memleakDaiki Ueno2018-10-171-0/+5
|
* build: Check return value of p11_dict_setDaiki Ueno2018-10-171-1/+5
|
* rpc-server: p11_kit_remote_serve_tokens: Allow exporting all modulesDaiki Ueno2018-07-161-66/+143
| | | | | This patch removes the restriction of p11_kit_remote_serve_tokens() that were not capable of serving tokens across multiple modules.
* p11_kit_remote_serve_tokens: Read "write-protected" setting from URIDaiki Ueno2018-02-271-0/+12
|
* server: Make it work only when token URI is providedDaiki Ueno2017-09-271-47/+41
| | | | | | Previously, when "p11-kit server" started only with a token URI, it couldn't properly find and initialize the module which provides the token. This was because of the wrong order of cleanup of the modules.
* rpc: New p11_kit_remote_serve_tokens functionDaiki Ueno2017-05-251-0/+142
|
* rpc: Convert mechanism parameters for portabilityDaiki Ueno2017-05-241-10/+23
| | | | This is similar to commit ba49b85e, but for mechanism parameters.
* rpc: Add a comment why we call _get_attribute() twiceDaiki Ueno2017-05-241-0/+1
|
* rpc: Convert attribute value for portabilityDaiki Ueno2017-05-221-21/+14
| | | | | | | | | | | When using the RPC across multiple architectures, where data models are different, say LP64 vs ILP32, there can be unwanted truncation of attribute values. This patch converts the values into portable format for the known attributes. Co-authored-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
* remote: Fix typo when writing a credential byteDaiki Ueno2017-03-091-1/+1
| | | | | out_fd is not always 1 when p11_kit_remote_serve_module() is used for writing a custom server.
* remote: Add API to serve a tokenDaiki Ueno2017-02-171-0/+37
|
* rpc: Fix typo flagged by lintianAndreas Metzler2016-12-151-1/+1
|
* rpc: Send x-init-reserved to remote moduleDaiki Ueno2016-10-051-0/+13
| | | | | | | Signed-off-by: Stef Walter <stefw@redhat.com> * Fixed up indentation https://bugs.freedesktop.org/show_bug.cgi?id=80519
* Fix typos flagged by codespellDaiki Ueno2016-08-221-1/+1
|
* remote: Run separate executable binary for 'p11-kit remote'Stef Walter2014-10-021-0/+101
| | | | | This allows security frameworks like SELinux or AppArmor to target it specifically.
* p11-kit: Fix various noise/issues highlighted by clangStef Walter2014-08-111-8/+10
|
* rpc: Implement PKCS#11 messages/client/server codeStef Walter2014-07-081-0/+1901
* This enables passing around bytes which represent PKCS#11 RPC calls. * Caller is responsible for connecting/disconnecting and so on. * Client side caller gets a mixin from p11_rpc_client_init() to call into, which generates callbacks with byte arrays to be transported. * Server side calls p11_rpc_server_handle() with a CK_FUNCTION_LIST_PTR on which relevant methods get called. * Doesn't yet implement the actual daemon or clients etc... https://bugs.freedesktop.org/show_bug.cgi?id=54105