os/security/authorisation/userpromptservice/policies/test/dumppolicy/resource/examplepolicy.rss
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
sl@0
     1
/*
sl@0
     2
* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
sl@0
     3
* All rights reserved.
sl@0
     4
* This component and the accompanying materials are made available
sl@0
     5
* under the terms of the License "Eclipse Public License v1.0"
sl@0
     6
* which accompanies this distribution, and is available
sl@0
     7
* at the URL "http://www.eclipse.org/legal/epl-v10.html".
sl@0
     8
*
sl@0
     9
* Initial Contributors:
sl@0
    10
* Nokia Corporation - initial contribution.
sl@0
    11
*
sl@0
    12
* Contributors:
sl@0
    13
*
sl@0
    14
* Description: 
sl@0
    15
*
sl@0
    16
*/
sl@0
    17
sl@0
    18
sl@0
    19
#include <ups/policies.rh>
sl@0
    20
sl@0
    21
UID2 KUidUpsPolicyResourceFile
sl@0
    22
UID3 0x01100001					
sl@0
    23
sl@0
    24
RESOURCE POLICIES testpolicies
sl@0
    25
	{
sl@0
    26
	header = POLICY_HEADER
sl@0
    27
		{
sl@0
    28
		// Built-in (protected SID and loaded from Z drive) client applications
sl@0
    29
		// do not require authorisation from the UPS if the client has the correct
sl@0
    30
		// capabilities.
sl@0
    31
		authorisationpolicy = ECheckPostManufacture;
sl@0
    32
		dialogcreator = 0x10283694;
sl@0
    33
		policyevaluator = 0x10283698;
sl@0
    34
		};
sl@0
    35
	policies = 
sl@0
    36
		{
sl@0
    37
		POLICY
sl@0
    38
			{
sl@0
    39
			// sid_list defined so this field will be ignored
sl@0
    40
			sid_classes = KSidClassF;				
sl@0
    41
			// Silently accept this SID
sl@0
    42
			sid_list = {0x01000030};
sl@0
    43
			destination = "*";
sl@0
    44
			options = KYes;
sl@0
    45
			},			
sl@0
    46
		POLICY
sl@0
    47
			{
sl@0
    48
			// Silently these SIDs for a specific destination
sl@0
    49
			sid_list = {0x01000031,0x01000032};
sl@0
    50
			destination = "*WLAN*";
sl@0
    51
			options = KYes;
sl@0
    52
			},			
sl@0
    53
		POLICY
sl@0
    54
			{
sl@0
    55
			// For protected SIDs enable the Always and Never options
sl@0
    56
            // if the client has the correct capability.
sl@0
    57
			sid_classes = KProtectedSids;
sl@0
    58
			systemserversecurity = ESystemServerSecurityPassed;
sl@0
    59
			destination = "*";
sl@0
    60
			options = KYes|KNo|KAlways|KNever;
sl@0
    61
			policyevaluator = 0x01000020;
sl@0
    62
			dialogcreator = 0x01000021;
sl@0
    63
			},
sl@0
    64
		POLICY
sl@0
    65
			{
sl@0
    66
			// Unprotected SIDs may only get one-shot permissions            
sl@0
    67
			sid_classes = KUnprotectedSids;
sl@0
    68
			destination = "*";
sl@0
    69
			options = KYes|KNo;
sl@0
    70
			flags = 42; 		// Flags specific to policy evaluator 0x10283698
sl@0
    71
			}
sl@0
    72
		};
sl@0
    73
	}
sl@0
    74