~ubuntu-branches/ubuntu/karmic/openoffice.org-l10n/karmic

« back to all changes in this revision

Viewing changes to ooo-build/patches/src680/vosremoval-security.diff

  • Committer: Bazaar Package Importer
  • Author(s): Chris Cheney
  • Date: 2008-01-08 23:17:08 UTC
  • mfrom: (1.1.15 upstream)
  • Revision ID: james.westby@ubuntu.com-20080108231708-7f5yc4h021ikwgyz
Tags: 1:2.3.1-3ubuntu1
* Copy of the openoffice.org source.
  - debian/changelog: Change source name.
  - debian/control.in: Change source name.
  - debian/control: Regenerate control file.

* Resynchronise with Debian (r989). Remaining changes:
  - debian/broffice.org.postrm.in:
    . Change diversions to ubuntu bitmap filenames.
  - debian/broffice.org.preinst.in:
    . Change diversions to ubuntu bitmap filenames.
  - debian/control.2.in:
    . Add file for Ubuntu.
  - debian/control.in:
    . Change maintainer line.
    . Use imagemagick instead of graphicsmagick.
    . Change bzr repo location.
    . Use java-runtime-depends variable for java dependencies.
    . Make openoffice.org-core Depends on openoffice.org-hyphenation.
    . Add package openoffice.org-style-human.
    . Various other minor Ubuntu changes.
  - debian/control.l10n.in:
    . Add file for Ubuntu.
  - debian/control.lang.in:
    . Add L10N_COMMON to Depends.
  - debian/control.mozilla.in:
    . Add Xb-Npp-xxx tags according to "firefox distro add-on suport" spec.
  - debian/control.ubuntu.in:
    . Add file for Ubuntu.
  - debian/deppackage.postinst.in:
    . Add file for Ubuntu.
  - debian/module-po.map:
    . Add file for Ubuntu.
  - debian/ooo-build-ubuntu.diff:
    . Various Ubuntu specific changes to ooo-build.
  - debian/rules:
    . Add USE_LZMA_COMPRESS option.
    . Add USE_COMMON_DOCDIR option.
    . Add support to build on lpia.
    . Add support to build l10n as a separate source.
    . Add java-runtime-depends variable for java dependencies.
    . Add support to chmod +x programs in debian dir.
    . Add support to uuencode binary files in ubuntu dir.
    . Add support to Ubuntu specific bitmaps.
    . Use imagemagick instead of graphicsmagick.
    . Add support for openoffice.org-style-human package.
    . Add support for launchpad translations.
    . Various Ubuntu specific changes.
  - debian/scripts/convert2po:
    . Add file for Ubuntu.
  - debian/scripts/fix_image_rgb:
    . Use imagemagick instead of graphicsmagick.
  - debian/scripts/gsifilter.py:
    . Add file for Ubuntu.
  - debian/scripts/splitgsi:
    . Add file for Ubuntu.
  - debian/template.desktop.in:
    . Add NoDisplay=true.
  - ooo-build/configure.in:
    . Added support for Hardy.
  - ooo-build/distro-configs/UbuntuHardy.conf.in:
    . Added support for Hardy.
  - ooo-build/distro-configs/UbuntuHardy64.conf.in:
    . Added support for Hardy.
  - ooo-build/patches/src680/apply:
    . Added support for Hardy.
  - ooo-build/patches/src680/ubuntu-lpi.diff:
    . Updated patch.
  - ubuntu/*
    . Various Ubuntu specific changes.

Show diffs side-by-side

added added

removed removed

Lines of Context:
 
1
diff --git a/binfilter/bf_sfx2/source/appl/sfx2_appinit.cxx b/binfilter/bf_sfx2/source/appl/sfx2_appinit.cxx
 
2
index 6b50346..2a352b6 100644
 
3
--- binfilter/bf_sfx2/source/appl/sfx2_appinit.cxx
 
4
+++ binfilter/bf_sfx2/source/appl/sfx2_appinit.cxx
 
5
@@ -82,8 +82,8 @@
 
6
 #ifndef _RTL_USTRBUF_HXX_
 
7
 #include <rtl/ustrbuf.hxx>
 
8
 #endif
 
9
-#ifndef _VOS_SECURITY_HXX_
 
10
-#include <vos/security.hxx>
 
11
+#ifndef _OSL_SECURITY_HXX_
 
12
+#include <osl/security.hxx>
 
13
 #endif
 
14
 #ifndef _UCBHELPER_CONFIGURATIONKEYS_HXX_
 
15
 #include <ucbhelper/configurationkeys.hxx>
 
16
diff --git a/desktop/source/app/app.cxx b/desktop/source/app/app.cxx
 
17
index c78329f..b08b8de 100644
 
18
--- desktop/source/app/app.cxx
 
19
+++ desktop/source/app/app.cxx
 
20
@@ -199,8 +199,8 @@
 
21
 #ifndef _OSL_MUTEX_HXX_
 
22
 #include <osl/mutex.hxx>
 
23
 #endif
 
24
-#ifndef _VOS_SECURITY_HXX_
 
25
-#include <vos/security.hxx>
 
26
+#ifndef _OSL_SECURITY_HXX_
 
27
+#include <osl/security.hxx>
 
28
 #endif
 
29
 #ifndef _RTL_REF_HXX_
 
30
 #include <rtl/ref.hxx>
 
31
diff --git a/desktop/source/app/appinit.cxx b/desktop/source/app/appinit.cxx
 
32
index a9094f4..bef1689 100644
 
33
--- desktop/source/app/appinit.cxx
 
34
+++ desktop/source/app/appinit.cxx
 
35
@@ -136,7 +136,7 @@
 
36
 #include <svtools/internaloptions.hxx>
 
37
 #endif
 
38
 
 
39
-#include <vos/security.hxx>
 
40
+#include <osl/security.hxx>
 
41
 
 
42
 
 
43
 #define        DEFINE_CONST_OUSTRING(CONSTASCII)               OUString(RTL_CONSTASCII_USTRINGPARAM(CONSTASCII))
 
44
@@ -144,7 +144,6 @@
 
45
 #define DESKTOP_TEMPDIRNAME                                            "soffice.tmp"
 
46
 
 
47
 using namespace rtl;
 
48
-using namespace vos;
 
49
 using namespace desktop;
 
50
 using namespace ::com::sun::star::uno;
 
51
 using namespace ::com::sun::star::lang;
 
52
@@ -169,7 +168,7 @@ static bool configureUcb(bool bServer, rtl::OUString const & rPortalConnect)
 
53
        }
 
54
 
 
55
        rtl::OUString aPipe;
 
56
-       vos::OSecurity().getUserIdent(aPipe);
 
57
+       osl::Security().getUserIdent(aPipe);
 
58
 
 
59
        rtl::OUStringBuffer aPortal;
 
60
        if (rPortalConnect.getLength() != 0)
 
61
diff --git a/desktop/source/app/officeipcthread.cxx b/desktop/source/app/officeipcthread.cxx
 
62
index 95efc2c..e621e73 100644
 
63
--- desktop/source/app/officeipcthread.cxx
 
64
+++ desktop/source/app/officeipcthread.cxx
 
65
@@ -111,7 +111,7 @@ namespace desktop
 
66
 String GetURL_Impl( const String& rName );
 
67
 
 
68
 OfficeIPCThread*       OfficeIPCThread::pGlobalOfficeIPCThread = 0;
 
69
-namespace { struct Security : public rtl::Static<OSecurity, Security> {}; }
 
70
+namespace { struct Security : public rtl::Static<osl::Security, Security> {}; }
 
71
 ::osl::Mutex*          OfficeIPCThread::pOfficeIPCThreadMutex = 0;
 
72
 
 
73
 
 
74
@@ -375,7 +375,7 @@ OfficeIPCThread::Status OfficeIPCThread::EnableOfficeIPCThread()
 
75
        PipeMode nPipeMode = PIPEMODE_DONTKNOW;
 
76
        do
 
77
        {
 
78
-               OSecurity &rSecurity = Security::get();
 
79
+               osl::Security &rSecurity = Security::get();
 
80
                // Try to create pipe
 
81
                if ( pThread->maPipe.create( pThread->maPipeIdent.getStr(), OPipe::TOption_Create, rSecurity ))
 
82
                {
 
83
diff --git a/desktop/source/app/officeipcthread.hxx b/desktop/source/app/officeipcthread.hxx
 
84
index ec6ed08..65cc8b5 100644
 
85
--- desktop/source/app/officeipcthread.hxx
 
86
+++ desktop/source/app/officeipcthread.hxx
 
87
@@ -46,8 +46,8 @@
 
88
 #ifndef _VOS_PIPE_HXX_
 
89
 #include <vos/pipe.hxx>
 
90
 #endif
 
91
-#ifndef _VOS_SECURITY_HXX_
 
92
-#include <vos/security.hxx>
 
93
+#ifndef _OSL_SECURITY_HXX_
 
94
+#include <osl/security.hxx>
 
95
 #endif
 
96
 #ifndef _THREAD_HXX_
 
97
 #include <osl/thread.hxx>
 
98
diff --git a/desktop/source/app/userinstall.cxx b/desktop/source/app/userinstall.cxx
 
99
index fb952b1..54578f3 100644
 
100
--- desktop/source/app/userinstall.cxx
 
101
+++ desktop/source/app/userinstall.cxx
 
102
@@ -62,8 +62,8 @@
 
103
 #include <osl/diagnose.h>
 
104
 #endif
 
105
 
 
106
-#ifndef _VOS_SECURITY_HXX_
 
107
-#include <vos/security.hxx>
 
108
+#ifndef _OSL_SECURITY_HXX_
 
109
+#include <osl/security.hxx>
 
110
 #endif
 
111
 #ifndef _RTL_REF_HXX_
 
112
 #include <rtl/ref.hxx>
 
113
diff --git a/sal/typesconfig/core b/sal/typesconfig/core
 
114
index 97fe99e..e8e58ab 100644
 
115
Binary files a/sal/typesconfig/core and b/sal/typesconfig/core differ
 
116
diff --git a/sfx2/inc/pch/precompiled_sfx2.hxx b/sfx2/inc/pch/precompiled_sfx2.hxx
 
117
index 94de398..ed8e57f 100644
 
118
--- sfx2/inc/pch/precompiled_sfx2.hxx
 
119
+++ sfx2/inc/pch/precompiled_sfx2.hxx
 
120
@@ -673,7 +673,7 @@
 
121
 #include "osl/diagnose.h"
 
122
 #include "osl/module.hxx"
 
123
 #include "osl/mutex.hxx"
 
124
-#include "vos/security.hxx"
 
125
+#include "osl/security.hxx"
 
126
 #include "vos/socket.hxx"
 
127
 #include "osl/thread.hxx"
 
128
 //---MARKER---
 
129
diff --git a/sfx2/source/appl/appinit.cxx b/sfx2/source/appl/appinit.cxx
 
130
index 5f4455f..57231b3 100644
 
131
--- sfx2/source/appl/appinit.cxx
 
132
+++ sfx2/source/appl/appinit.cxx
 
133
@@ -90,8 +90,8 @@
 
134
 #ifndef _RTL_USTRBUF_HXX_
 
135
 #include <rtl/ustrbuf.hxx>
 
136
 #endif
 
137
-#ifndef _VOS_SECURITY_HXX_
 
138
-#include <vos/security.hxx>
 
139
+#ifndef _OSL_SECURITY_HXX_
 
140
+#include <osl/security.hxx>
 
141
 #endif
 
142
 #ifndef _UCBHELPER_CONFIGURATIONKEYS_HXX_
 
143
 #include <ucbhelper/configurationkeys.hxx>
 
144
diff --git a/sfx2/source/dialog/filedlghelper.cxx b/sfx2/source/dialog/filedlghelper.cxx
 
145
index 5b4f7cf..6974d12 100644
 
146
--- sfx2/source/dialog/filedlghelper.cxx
 
147
+++ sfx2/source/dialog/filedlghelper.cxx
 
148
@@ -144,8 +144,8 @@
 
149
 #ifndef _OSL_MUTEX_HXX_
 
150
 #include <osl/mutex.hxx>
 
151
 #endif
 
152
-#ifndef _VOS_SECURITY_HXX_
 
153
-#include <vos/security.hxx>
 
154
+#ifndef _OSL_SECURITY_HXX_
 
155
+#include <osl/security.hxx>
 
156
 #endif
 
157
 
 
158
 #ifndef _SV_CVTGRF_HXX
 
159
@@ -2568,7 +2568,7 @@ void FileDialogHelper::SetDisplayDirectory( const String& _rPath )
 
160
         if ( sFolder.getLength() == 0 )
 
161
         {
 
162
             // _rPath is not a valid path -> fallback to home directory
 
163
-            vos::OSecurity aSecurity;
 
164
+            osl::Security aSecurity;
 
165
             aSecurity.getHomeDir( sFolder );
 
166
         }
 
167
         mpImp->displayFolder( sFolder );
 
168
diff --git a/svtools/inc/pch/precompiled_svtools.hxx b/svtools/inc/pch/precompiled_svtools.hxx
 
169
index 8324445..f8e7c08 100644
 
170
--- svtools/inc/pch/precompiled_svtools.hxx
 
171
+++ svtools/inc/pch/precompiled_svtools.hxx
 
172
@@ -433,7 +433,7 @@
 
173
 #include <osl/mutex.hxx>
 
174
 #include <rtl/ref.hxx>
 
175
 #include <salhelper/simplereferenceobject.hxx>
 
176
-#include <vos/security.hxx>
 
177
+#include <osl/security.hxx>
 
178
 #include <osl/thread.hxx>
 
179
 #include <vos/timer.hxx>
 
180
 
 
181
diff --git a/svtools/source/dialogs/filedlg2.cxx b/svtools/source/dialogs/filedlg2.cxx
 
182
index d748d7b..002c782 100644
 
183
--- svtools/source/dialogs/filedlg2.cxx
 
184
+++ svtools/source/dialogs/filedlg2.cxx
 
185
@@ -61,8 +61,8 @@
 
186
 #include <vcl/msgbox.hxx>
 
187
 #endif
 
188
 
 
189
-#ifndef _VOS_SECURITY_HXX_
 
190
-#include <vos/security.hxx>
 
191
+#ifndef _OSL_SECURITY_HXX_
 
192
+#include <osl/security.hxx>
 
193
 #endif
 
194
 
 
195
 #ifndef _COM_SUN_STAR_I18N_XCOLLATOR_HPP_
 
196
@@ -373,7 +373,7 @@ IMPL_LINK( ImpPathDialog, ClickHdl, Button*, pBtn )
 
197
        if ( pBtn == pHomeBtn )
 
198
        {
 
199
                ::rtl::OUString aHomeDir;
 
200
-               vos::OSecurity aSecurity;
 
201
+               osl::Security aSecurity;
 
202
                if ( aSecurity.getHomeDir( aHomeDir ) )
 
203
                {
 
204
                        DirEntry aFile ( aHomeDir );
 
205
diff --git a/vos/inc/vos/pipe.hxx b/vos/inc/vos/pipe.hxx
 
206
index 7a1f8ac..3067a42 100644
 
207
--- vos/inc/vos/pipe.hxx
 
208
+++ vos/inc/vos/pipe.hxx
 
209
@@ -55,8 +55,8 @@
 
210
 #ifndef _VOS_REFOBJ_HXX_
 
211
 #   include <vos/refobj.hxx>
 
212
 #endif
 
213
-#ifndef _VOS_SECURITY_HXX_
 
214
-#   include <vos/security.hxx>
 
215
+#ifndef _OSL_SECURITY_HXX_
 
216
+#   include <osl/security.hxx>
 
217
 #endif
 
218
 #ifndef _RTL_USTRING_HXX_
 
219
 #   include <rtl/ustring.hxx>
 
220
@@ -123,7 +123,7 @@ public:
 
221
         @param Security
 
222
     */
 
223
     OPipe(const ::rtl::OUString& strName, TPipeOption Options,
 
224
-          const vos::OSecurity& rSecurity);
 
225
+          const osl::Security& rSecurity);
 
226
 
 
227
     /** Copy constructor.
 
228
     */
 
229
@@ -154,7 +154,7 @@ public:
 
230
         @return True if socket was successfully created.
 
231
     */
 
232
     sal_Bool SAL_CALL create(const ::rtl::OUString& strName, TPipeOption Options,
 
233
-                   const vos::OSecurity& rSecurity);
 
234
+                   const osl::Security& rSecurity);
 
235
 
 
236
     /** Assignment operator. If pipe was already created, the old one will
 
237
         be discarded.
 
238
diff --git a/vos/inc/vos/process.hxx b/vos/inc/vos/process.hxx
 
239
index d8db5b6..2440c5a 100644
 
240
--- vos/inc/vos/process.hxx
 
241
+++ vos/inc/vos/process.hxx
 
242
@@ -39,8 +39,8 @@
 
243
 #ifndef _RTL_USTRING_HXX_
 
244
 #   include <rtl/ustring.hxx>
 
245
 #endif
 
246
-#ifndef _VOS_SECURITY_HXX_
 
247
-#   include <vos/security.hxx>
 
248
+#ifndef _OSL_SECURITY_HXX_
 
249
+#   include <osl/security.hxx>
 
250
 #endif
 
251
 #ifndef _VOS_OBJECT_HXX_
 
252
 #   include <vos/object.hxx>
 
253
@@ -211,7 +211,7 @@ public:
 
254
         @see OStartupInfo::acceptIOResource
 
255
     */
 
256
     TProcessError SAL_CALL execute(TProcessOption Options,
 
257
-                          const OSecurity &Security,
 
258
+                          const osl::Security &Security,
 
259
                           const OArgumentList& aArgumentList = OArgumentList(),
 
260
                           const OEnvironment&  aEnvironment  = OEnvironment()
 
261
                          );
 
262
diff --git a/vos/inc/vos/security.hxx b/vos/inc/vos/security.hxx
 
263
deleted file mode 100644
 
264
index 8f41fd9..0000000
 
265
--- vos/inc/vos/security.hxx
 
266
+++ /dev/null
 
267
@@ -1,135 +0,0 @@
 
268
-/*************************************************************************
 
269
- *
 
270
- *  OpenOffice.org - a multi-platform office productivity suite
 
271
- *
 
272
- *  $RCSfile: security.hxx,v $
 
273
- *
 
274
- *  $Revision: 1.6 $
 
275
- *
 
276
- *  last change: $Author: vg $ $Date: 2006/06/02 12:39:33 $
 
277
- *
 
278
- *  The Contents of this file are made available subject to
 
279
- *  the terms of GNU Lesser General Public License Version 2.1.
 
280
- *
 
281
- *
 
282
- *    GNU Lesser General Public License Version 2.1
 
283
- *    =============================================
 
284
- *    Copyright 2005 by Sun Microsystems, Inc.
 
285
- *    901 San Antonio Road, Palo Alto, CA 94303, USA
 
286
- *
 
287
- *    This library is free software; you can redistribute it and/or
 
288
- *    modify it under the terms of the GNU Lesser General Public
 
289
- *    License version 2.1, as published by the Free Software Foundation.
 
290
- *
 
291
- *    This library is distributed in the hope that it will be useful,
 
292
- *    but WITHOUT ANY WARRANTY; without even the implied warranty of
 
293
- *    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 
294
- *    Lesser General Public License for more details.
 
295
- *
 
296
- *    You should have received a copy of the GNU Lesser General Public
 
297
- *    License along with this library; if not, write to the Free Software
 
298
- *    Foundation, Inc., 59 Temple Place, Suite 330, Boston,
 
299
- *    MA  02111-1307  USA
 
300
- *
 
301
- ************************************************************************/
 
302
-
 
303
-#ifndef _VOS_SECURITY_HXX_
 
304
-#define _VOS_SECURITY_HXX_
 
305
-
 
306
-#ifndef _VOS_OBJECT_HXX_
 
307
-#   include <vos/object.hxx>
 
308
-#endif
 
309
-#ifndef _RTL_USTRING_HXX_
 
310
-#   include <rtl/ustring.hxx>
 
311
-#endif
 
312
-#ifndef _OSL_SECURITY_H_
 
313
-#   include <osl/security.h>
 
314
-#endif
 
315
-
 
316
-namespace vos
 
317
-{
 
318
-
 
319
-/** capsulate security informations for one user.
 
320
-    A object of this class is used to execute a process with the rights an
 
321
-    security options of a scecified user.
 
322
-    @see OProcess::executeProcess
 
323
-    @author  Bernd Hofner
 
324
-    @version 1.0
 
325
-
 
326
-*/
 
327
-class OSecurity : public OObject
 
328
-{
 
329
-    VOS_DECLARE_CLASSINFO(VOS_NAMESPACE(OSecurity, vos));
 
330
-
 
331
-public:
 
332
-    /// constructor
 
333
-    OSecurity();
 
334
-    /// destructor
 
335
-    virtual ~OSecurity();
 
336
-    /** get the security information for one user.
 
337
-        The underlying operating system is asked for this information.
 
338
-        @param strName [in] denotes the name of the user
 
339
-        @param strPasswd [in] denotes the password of this user
 
340
-        @return True, if the specified user is known by the underlying operating system,
 
341
-        otherwise False
 
342
-    */
 
343
-    sal_Bool SAL_CALL logonUser(const ::rtl::OUString& strName,
 
344
-                                const ::rtl::OUString& strPasswd);
 
345
-    /** get the security information for one user.
 
346
-        This method will try to login the user at the denoted file server.
 
347
-        If a network resource named \\server\username exists and this resource
 
348
-        could be connected by this user, the methos will return true and getHomeDir
 
349
-        will return \\server\username.
 
350
-        @param strName [in] denotes the name of the user
 
351
-        @param strPasswd [in] denotes the password of this user
 
352
-        @return True, if the specified user is known by file server and the
 
353
-        could be connected, otherwise False
 
354
-    */
 
355
-    sal_Bool SAL_CALL logonUser(const ::rtl::OUString& strName,
 
356
-                                const ::rtl::OUString& strPasswd,
 
357
-                                const ::rtl::OUString& strFileServer);
 
358
-
 
359
-    /** get the ident of the logged in user.
 
360
-        @param strName [out] is the buffer which returns the name
 
361
-        @param max [in] is the size of this buffer
 
362
-        @return True, if any user is successfuly logged in, otherwise False
 
363
-    */
 
364
-    sal_Bool SAL_CALL getUserIdent(::rtl::OUString& strIdent) const;
 
365
-
 
366
-    /** get the name of the logged in user.
 
367
-        @param strName [out] is the buffer which returns the name
 
368
-        @param max [in] is the size of this buffer
 
369
-        @return True, if any user is successfuly logged in, otherwise False
 
370
-    */
 
371
-    sal_Bool SAL_CALL getUserName(::rtl::OUString& strName) const;
 
372
-
 
373
-    /** get the home directory of the logged in user.
 
374
-        @param strDirectory [out] is the buffer which returns the directory name
 
375
-        @param max [in] is the size of this buffer
 
376
-        @return True, if any user is successfuly logged in, otherwise False
 
377
-    */
 
378
-    sal_Bool SAL_CALL getHomeDir(::rtl::OUString& strDirectory) const;
 
379
-
 
380
-    /** get the directory for configuration data of the logged in user.
 
381
-        @param strDirectory [out] is the buffer which returns the directory name
 
382
-        @param max [in] is the size of this buffer
 
383
-        @return True, if any user is successfuly logged in, otherwise False
 
384
-    */
 
385
-    sal_Bool SAL_CALL getConfigDir(::rtl::OUString& strDirectory) const;
 
386
-
 
387
-    /** Query if the user who is logged inhas administrator rigths.
 
388
-        @return True, if the user has administrator rights, otherwise false.
 
389
-    */
 
390
-    sal_Bool SAL_CALL isAdministrator() const;
 
391
-
 
392
-    virtual SAL_CALL operator oslSecurity() const;
 
393
-
 
394
-protected:
 
395
-
 
396
-    oslSecurity m_oslSecurity;
 
397
-};
 
398
-
 
399
-}
 
400
-
 
401
-#endif  // _VOS_SECURITY_HXX_
 
402
-
 
403
diff --git a/vos/source/makefile.mk b/vos/source/makefile.mk
 
404
index 61584e7..0d2ae51 100644
 
405
--- vos/source/makefile.mk
 
406
+++ vos/source/makefile.mk
 
407
@@ -53,7 +53,6 @@ SLOFILES= \
 
408
                                $(SLO)$/stream.obj      \
 
409
                                $(SLO)$/timer.obj       \
 
410
                                $(SLO)$/process.obj     \
 
411
-                               $(SLO)$/security.obj    \
 
412
                                $(SLO)$/pipe.obj
 
413
 
 
414
 
 
415
@@ -66,7 +65,6 @@ OBJFILES= \
 
416
                                $(OBJ)$/stream.obj      \
 
417
                                $(OBJ)$/timer.obj       \
 
418
                                $(OBJ)$/process.obj     \
 
419
-                               $(OBJ)$/security.obj    \
 
420
                                $(OBJ)$/pipe.obj
 
421
 
 
422
 .ENDIF
 
423
diff --git a/vos/source/pipe.cxx b/vos/source/pipe.cxx
 
424
index d280fae..1669b80 100644
 
425
--- vos/source/pipe.cxx
 
426
+++ vos/source/pipe.cxx
 
427
@@ -76,12 +76,12 @@ OPipe::OPipe( const rtl::OUString& strName, TPipeOption Options)
 
428
 
 
429
 OPipe::OPipe( const rtl::OUString& strName,
 
430
                          TPipeOption Options,
 
431
-                         const OSecurity& rSecurity)
 
432
+                         const osl::Security& rSecurity)
 
433
 {
 
434
        m_pPipeRef= 
 
435
                new PipeRef(osl_createPipe(strName.pData, 
 
436
                                                                   (oslPipeOptions)Options, 
 
437
-                                                                  (oslSecurity)rSecurity));
 
438
+                                                                  rSecurity.getHandle()));
 
439
        
 
440
        OSL_POSTCOND(m_pPipeRef != 0, "OPipe(): new failed.\n");
 
441
        OSL_POSTCOND((*m_pPipeRef)(), "OPipe(): creation of pipe failed!\n");
 
442
@@ -146,7 +146,7 @@ sal_Bool OPipe::create( const rtl::OUString& strName, TPipeOption Options )
 
443
 /*****************************************************************************/
 
444
 sal_Bool OPipe::create( const rtl::OUString& strName,
 
445
                                                TPipeOption Options,
 
446
-                                               const vos::OSecurity& rSecurity ) 
 
447
+                                               const osl::Security& rSecurity ) 
 
448
 {
 
449
        // if this was a valid pipe, decrease reference
 
450
        if ((m_pPipeRef) && (m_pPipeRef->release() == 0))
 
451
@@ -159,7 +159,7 @@ sal_Bool OPipe::create( const rtl::OUString& strName,
 
452
        m_pPipeRef= 
 
453
                new PipeRef(osl_createPipe(strName.pData, 
 
454
                                                                   (oslPipeOptions)Options, 
 
455
-                                                                  (oslSecurity)rSecurity));
 
456
+                                                                  rSecurity.getHandle()));
 
457
 
 
458
        OSL_POSTCOND(m_pPipeRef != 0, "OPipe(): new failed.\n");
 
459
 
 
460
diff --git a/vos/source/process.cxx b/vos/source/process.cxx
 
461
index ac6a509..3872bbc 100644
 
462
--- vos/source/process.cxx
 
463
+++ vos/source/process.cxx
 
464
@@ -296,7 +296,7 @@ OProcess::TProcessError OProcess::execute(TProcessOption Options,
 
465
 
 
466
 
 
467
 OProcess::TProcessError OProcess::execute( TProcessOption Options,
 
468
-                                                                                  const OSecurity &Security,
 
469
+                                                                                  const osl::Security &Security,
 
470
                                                                                   const OArgumentList& aArgumentList,
 
471
                                                                                   const OEnvironment&  aEnvironment )
 
472
 {
 
473
@@ -304,7 +304,7 @@ OProcess::TProcessError OProcess::execute( TProcessOption Options,
 
474
                                                                              aArgumentList.m_aVec,
 
475
                                                                                          aArgumentList.n_Args,
 
476
                                                                                          Options, 
 
477
-                                                                             Security,
 
478
+                                                                             Security.getHandle(),
 
479
                                                                              m_strDirectory.pData,
 
480
                                                                              aEnvironment.m_aVec,
 
481
                                                                                          aEnvironment.n_Vars,
 
482
diff --git a/vos/source/security.cxx b/vos/source/security.cxx
 
483
deleted file mode 100644
 
484
index cb33330..0000000
 
485
--- vos/source/security.cxx
 
486
+++ /dev/null
 
487
@@ -1,124 +0,0 @@
 
488
-/*************************************************************************
 
489
- *
 
490
- *  OpenOffice.org - a multi-platform office productivity suite
 
491
- *
 
492
- *  $RCSfile: security.cxx,v $
 
493
- *
 
494
- *  $Revision: 1.3 $
 
495
- *
 
496
- *  last change: $Author: vg $ $Date: 2006/06/02 12:43:47 $
 
497
- *
 
498
- *  The Contents of this file are made available subject to
 
499
- *  the terms of GNU Lesser General Public License Version 2.1.
 
500
- *
 
501
- *
 
502
- *    GNU Lesser General Public License Version 2.1
 
503
- *    =============================================
 
504
- *    Copyright 2005 by Sun Microsystems, Inc.
 
505
- *    901 San Antonio Road, Palo Alto, CA 94303, USA
 
506
- *
 
507
- *    This library is free software; you can redistribute it and/or
 
508
- *    modify it under the terms of the GNU Lesser General Public
 
509
- *    License version 2.1, as published by the Free Software Foundation.
 
510
- *
 
511
- *    This library is distributed in the hope that it will be useful,
 
512
- *    but WITHOUT ANY WARRANTY; without even the implied warranty of
 
513
- *    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 
514
- *    Lesser General Public License for more details.
 
515
- *
 
516
- *    You should have received a copy of the GNU Lesser General Public
 
517
- *    License along with this library; if not, write to the Free Software
 
518
- *    Foundation, Inc., 59 Temple Place, Suite 330, Boston,
 
519
- *    MA  02111-1307  USA
 
520
- *
 
521
- ************************************************************************/
 
522
-
 
523
-
 
524
-#include <vos/security.hxx>
 
525
-#include <osl/diagnose.h>
 
526
-
 
527
-using namespace vos;
 
528
-
 
529
-/////////////////////////////////////////////////////////////////////////////
 
530
-// Object super class
 
531
-
 
532
-VOS_IMPLEMENT_CLASSINFO(VOS_CLASSNAME(OSecurity, vos), VOS_NAMESPACE(OSecurity, vos), VOS_NAMESPACE(OObject, vos), 0);
 
533
-
 
534
-OSecurity::OSecurity()
 
535
-{
 
536
-       m_oslSecurity = osl_getCurrentSecurity();
 
537
-}
 
538
-
 
539
-OSecurity::~OSecurity()
 
540
-{
 
541
-    osl_freeSecurityHandle(m_oslSecurity);
 
542
-}
 
543
-
 
544
-sal_Bool OSecurity::logonUser(const rtl::OUString& strName,
 
545
-                                                         const rtl::OUString& strPasswd)
 
546
-{
 
547
-    osl_freeSecurityHandle(m_oslSecurity);
 
548
-       
 
549
-    m_oslSecurity = NULL;
 
550
-    
 
551
-       return (osl_loginUser( strName.pData, strPasswd.pData, &m_oslSecurity) 
 
552
-               == osl_Security_E_None);
 
553
-}
 
554
-
 
555
-
 
556
-sal_Bool OSecurity::logonUser( const rtl::OUString& strName,
 
557
-                                                          const rtl::OUString& strPasswd,
 
558
-                                                          const rtl::OUString& strFileServer )
 
559
-{
 
560
-    osl_freeSecurityHandle(m_oslSecurity);
 
561
-       
 
562
-    m_oslSecurity = NULL;
 
563
-       
 
564
-    return (osl_loginUserOnFileServer(strName.pData, strPasswd.pData, strFileServer.pData, &m_oslSecurity) 
 
565
-               == osl_Security_E_None);
 
566
-}
 
567
-
 
568
-
 
569
-sal_Bool OSecurity::getUserIdent( rtl::OUString& strIdent) const
 
570
-{
 
571
-       OSL_ASSERT(m_oslSecurity);
 
572
-       
 
573
-    return osl_getUserIdent( m_oslSecurity, &strIdent.pData );
 
574
-}
 
575
-
 
576
-
 
577
-sal_Bool OSecurity::getUserName( rtl::OUString& strName ) const
 
578
-{
 
579
-       OSL_ASSERT(m_oslSecurity);
 
580
-
 
581
-    return osl_getUserName( m_oslSecurity, &strName.pData );
 
582
-}
 
583
-
 
584
-
 
585
-sal_Bool OSecurity::getHomeDir( rtl::OUString& strDirectory) const
 
586
-{
 
587
-       OSL_ASSERT(m_oslSecurity);
 
588
-       
 
589
-    return osl_getHomeDir(m_oslSecurity, &strDirectory.pData );
 
590
-}
 
591
-
 
592
-
 
593
-sal_Bool OSecurity::getConfigDir( rtl::OUString& strDirectory ) const
 
594
-{
 
595
-       OSL_ASSERT(m_oslSecurity);
 
596
-       
 
597
-    return osl_getConfigDir( m_oslSecurity, &strDirectory.pData );
 
598
-}
 
599
-
 
600
-sal_Bool OSecurity::isAdministrator() const
 
601
-{
 
602
-       OSL_ASSERT(m_oslSecurity);
 
603
-
 
604
-    return osl_isAdministrator(m_oslSecurity);
 
605
-}
 
606
-
 
607
-OSecurity::operator oslSecurity() const
 
608
-{
 
609
-    return m_oslSecurity;
 
610
-}
 
611
-