os/persistentdata/featuremgmt/featuremgr/src/serverexe/featmgrsecuritypolicy.h
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
sl@0
     1
/*
sl@0
     2
* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
sl@0
     3
* All rights reserved.
sl@0
     4
* This component and the accompanying materials are made available
sl@0
     5
* under the terms of "Eclipse Public License v1.0"
sl@0
     6
* which accompanies this distribution, and is available
sl@0
     7
* at the URL "http://www.eclipse.org/legal/epl-v10.html".
sl@0
     8
*
sl@0
     9
* Initial Contributors:
sl@0
    10
* Nokia Corporation - initial contribution.
sl@0
    11
*
sl@0
    12
* Contributors:
sl@0
    13
*
sl@0
    14
* Description:
sl@0
    15
*
sl@0
    16
*/
sl@0
    17
sl@0
    18
sl@0
    19
sl@0
    20
#ifndef FEATMGR_SECURITY_POLICY_H
sl@0
    21
#define FEATMGR_SECURITY_POLICY_H
sl@0
    22
sl@0
    23
sl@0
    24
/**
sl@0
    25
 * Number of different IPC ranges
sl@0
    26
 */
sl@0
    27
const TUint KFeatMgrPlatSecRangeCount = 3;
sl@0
    28
sl@0
    29
sl@0
    30
#ifndef EXTENDED_FEATURE_MANAGER_TEST
sl@0
    31
//
sl@0
    32
// NORMAL
sl@0
    33
// The security ranges for messages in the framework.
sl@0
    34
// See also featmgrclientserver.h for message enum TFeatMgrServRequest
sl@0
    35
//
sl@0
    36
sl@0
    37
/**
sl@0
    38
 * IPC ranges segmented into groups based on their capability requirements
sl@0
    39
 */
sl@0
    40
const TInt KFeatMgrPlatSecRanges[KFeatMgrPlatSecRangeCount] =
sl@0
    41
    {
sl@0
    42
    0,  // IPC 0-7 Always passed
sl@0
    43
    8,  // IPC 8-19 WriteDeviceData
sl@0
    44
    20  // IPC Not supported: 20 = 16 messages + 4 "resource check" messages
sl@0
    45
    };
sl@0
    46
sl@0
    47
sl@0
    48
/**
sl@0
    49
 * IPC segments and their capability requirements
sl@0
    50
 */
sl@0
    51
const TUint8 KFeatMgrPlatSecElementsIndex[KFeatMgrPlatSecRangeCount] =
sl@0
    52
    {
sl@0
    53
    CPolicyServer::EAlwaysPass,             // IPC 0-3
sl@0
    54
    0,                                      // IPC 8-19
sl@0
    55
    CPolicyServer::ENotSupported            // IPC 20 -> 
sl@0
    56
    };
sl@0
    57
sl@0
    58
#else
sl@0
    59
//
sl@0
    60
// CONFIGURED test server has debug only API(s) built into the framework. 
sl@0
    61
// e.g. EFeatMgrNumberOfNotifyFeatures which will return debug information about 
sl@0
    62
// the server for testing purposes. Consequently, the platform security setup 
sl@0
    63
// for the test server differs slightly to allow these specific debug only message(s).
sl@0
    64
//
sl@0
    65
sl@0
    66
/**
sl@0
    67
 * IPC ranges segmented into groups based on their capability requirements
sl@0
    68
 */
sl@0
    69
const TInt KFeatMgrPlatSecRanges[KFeatMgrPlatSecRangeCount] =
sl@0
    70
    {
sl@0
    71
    0,   // IPC 0-9 Always passed
sl@0
    72
    10,  // IPC 10-21 WriteDeviceData
sl@0
    73
    22   // IPC Not supported 22 ->
sl@0
    74
    };
sl@0
    75
/**
sl@0
    76
 * IPC segments and their capability requirements
sl@0
    77
 */
sl@0
    78
const TUint8 KFeatMgrPlatSecElementsIndex[KFeatMgrPlatSecRangeCount] =
sl@0
    79
    {
sl@0
    80
    CPolicyServer::EAlwaysPass,             // IPC 0-3
sl@0
    81
    0,                                      // IPC 10-21
sl@0
    82
    CPolicyServer::ENotSupported            // IPC 22 ->
sl@0
    83
    };
sl@0
    84
sl@0
    85
#endif
sl@0
    86
sl@0
    87
sl@0
    88
/**
sl@0
    89
 * Capability sets and the action performed in case of failure
sl@0
    90
 */
sl@0
    91
const CPolicyServer::TPolicyElement KFeatMgrPlatSecElements[] =
sl@0
    92
    {
sl@0
    93
       
sl@0
    94
        {
sl@0
    95
        _INIT_SECURITY_POLICY_C1( ECapabilityWriteDeviceData ),
sl@0
    96
        CPolicyServer::EFailClient
sl@0
    97
        }
sl@0
    98
       
sl@0
    99
    };
sl@0
   100
sl@0
   101
sl@0
   102
/**
sl@0
   103
 * Platform security policy that Feature Manager server uses.
sl@0
   104
 */
sl@0
   105
const CPolicyServer::TPolicy KFeatMgrPlatSecPolicy =
sl@0
   106
    {
sl@0
   107
    CPolicyServer::EAlwaysPass,     // Specifies all connect attempts should pass
sl@0
   108
    KFeatMgrPlatSecRangeCount,      // Number of IPC ranges
sl@0
   109
    KFeatMgrPlatSecRanges,          // IPC Ranges
sl@0
   110
    KFeatMgrPlatSecElementsIndex,   // Policy to IPC mapping array
sl@0
   111
    KFeatMgrPlatSecElements         // Policies used in Feature Manager Server
sl@0
   112
    };
sl@0
   113
sl@0
   114
sl@0
   115
#endif