os/security/securityanddataprivacytools/securitytools/certapp/store--/e32capability.h
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
sl@0
     1
/*
sl@0
     2
* Copyright (c) 2001-2009 Nokia Corporation and/or its subsidiary(-ies).
sl@0
     3
* All rights reserved.
sl@0
     4
* This component and the accompanying materials are made available
sl@0
     5
* under the terms of the License "Eclipse Public License v1.0"
sl@0
     6
* which accompanies this distribution, and is available
sl@0
     7
* at the URL "http://www.eclipse.org/legal/epl-v10.html".
sl@0
     8
*
sl@0
     9
* Initial Contributors:
sl@0
    10
* Nokia Corporation - initial contribution.
sl@0
    11
*
sl@0
    12
* Contributors:
sl@0
    13
*
sl@0
    14
* Description: 
sl@0
    15
* e32\include\e32capability.h
sl@0
    16
* Platform security capability definitions
sl@0
    17
* Used by both source code and tools
sl@0
    18
* This file can be directly included into C++ tools such as ROMBUILD to allow
sl@0
    19
* capabilities to be specified by name. To do the same for MAKMAKE (in MMP
sl@0
    20
* files) some perl code will be needed to parse this file and extract the
sl@0
    21
* capability names and values.
sl@0
    22
*
sl@0
    23
*/
sl@0
    24
sl@0
    25
sl@0
    26
#ifndef __E32CAPABILITY_H__
sl@0
    27
#define __E32CAPABILITY_H__
sl@0
    28
sl@0
    29
/**
sl@0
    30
 * @file
sl@0
    31
 * @internalComponent
sl@0
    32
 */
sl@0
    33
sl@0
    34
/**
sl@0
    35
An enumeration that defines the set of all supported capabilities.
sl@0
    36
sl@0
    37
*/
sl@0
    38
enum TCapability
sl@0
    39
	{
sl@0
    40
	/**
sl@0
    41
	Grants write access to executables and shared read-only resources.
sl@0
    42
	
sl@0
    43
	This is the most critical capability as it grants access to executables and
sl@0
    44
	therefore to their capabilities. It also grants write access to
sl@0
    45
	the /sys and /resource directories.
sl@0
    46
	*/
sl@0
    47
	ECapabilityTCB				= 0,
sl@0
    48
	
sl@0
    49
	
sl@0
    50
	/**
sl@0
    51
	Grants direct access to all communication device drivers. This includes:
sl@0
    52
	the EComm, Ethernet, USB device drivers etc.
sl@0
    53
	*/
sl@0
    54
	ECapabilityCommDD			= 1,
sl@0
    55
	
sl@0
    56
	
sl@0
    57
	/**
sl@0
    58
	Grants the right:
sl@0
    59
	
sl@0
    60
	- to kill any process in the system
sl@0
    61
	- to power off unused peripherals
sl@0
    62
	- to switch the machine into standby state
sl@0
    63
	- to wake the machine up
sl@0
    64
	- to power the machine down completely.
sl@0
    65
	
sl@0
    66
	Note that this does not control access to anything and everything
sl@0
    67
	that might drain battery power.
sl@0
    68
	*/
sl@0
    69
	ECapabilityPowerMgmt		= 2,
sl@0
    70
sl@0
    71
sl@0
    72
    /**
sl@0
    73
    Grants direct access to all multimedia device drivers.
sl@0
    74
    
sl@0
    75
    This includes the sound, camera, video device drivers etc.
sl@0
    76
    */
sl@0
    77
	ECapabilityMultimediaDD		= 3,
sl@0
    78
sl@0
    79
sl@0
    80
    /**
sl@0
    81
    Grants read access to network operator, phone manufacturer and device
sl@0
    82
    confidential settings or data.
sl@0
    83
    
sl@0
    84
    For example, the pin lock code, the list of applications that are installed.
sl@0
    85
    */
sl@0
    86
	ECapabilityReadDeviceData	= 4,
sl@0
    87
	
sl@0
    88
	
sl@0
    89
    /**
sl@0
    90
    Grants write access to settings that control the behaviour of the device.
sl@0
    91
    
sl@0
    92
    For example, device lock settings, system time, time zone, alarms, etc.
sl@0
    93
    */	
sl@0
    94
	ECapabilityWriteDeviceData	= 5,
sl@0
    95
sl@0
    96
sl@0
    97
    /**
sl@0
    98
    Grants access to protected content.
sl@0
    99
    
sl@0
   100
    DRM (Digital Rights Management) agents use this capability to decide whether
sl@0
   101
    or not an application should have access to DRM content. 
sl@0
   102
    Applications granted DRM are trusted to respect the rights associated
sl@0
   103
    with the content.
sl@0
   104
    */	
sl@0
   105
	ECapabilityDRM				= 6,
sl@0
   106
sl@0
   107
sl@0
   108
    /**
sl@0
   109
    Grants the right to create a trusted UI session, and therefore to display
sl@0
   110
    dialogs in a secure UI environment.
sl@0
   111
    
sl@0
   112
    Trusted UI dialogs are rare. They must be used only when confidentiality
sl@0
   113
    and security are critical; for example, for password dialogs. 
sl@0
   114
    
sl@0
   115
    Normal access to the user interface and the screen does not require
sl@0
   116
    this capability.
sl@0
   117
    */	
sl@0
   118
	ECapabilityTrustedUI		= 7,
sl@0
   119
sl@0
   120
sl@0
   121
    /**
sl@0
   122
    Grants the right to a server to register with a protected name.
sl@0
   123
    
sl@0
   124
    Currently, protected names start with a "!" character. The kernel prevents
sl@0
   125
    servers without this capability from using such a name, and therefore
sl@0
   126
    prevents protected servers from being impersonated.
sl@0
   127
    */	
sl@0
   128
	ECapabilityProtServ			= 8,
sl@0
   129
sl@0
   130
sl@0
   131
    /**
sl@0
   132
    Grants access to disk administration operations that affect more than one
sl@0
   133
    file or one directory (or overall filesystem integrity/behaviour, etc).
sl@0
   134
    
sl@0
   135
    For examples, reformatting a disk partition.
sl@0
   136
    */	
sl@0
   137
	ECapabilityDiskAdmin		= 9,
sl@0
   138
sl@0
   139
sl@0
   140
    /**
sl@0
   141
    Grants the right to modify or access network protocol controls.
sl@0
   142
    
sl@0
   143
    Typically when an action can change the behaviour of all existing and
sl@0
   144
    future connections, it should be protected by this capability.
sl@0
   145
    
sl@0
   146
    For example, forcing all existing connections on a specific protocol
sl@0
   147
    to be dropped, or changing the priority of a call.
sl@0
   148
    */	
sl@0
   149
	ECapabilityNetworkControl	= 10,
sl@0
   150
sl@0
   151
sl@0
   152
    /**
sl@0
   153
    Grants read access to the entire file system; grants write access to
sl@0
   154
    the private directories of other processes.
sl@0
   155
    
sl@0
   156
    This capability is very strictly controlled and should rarely be granted.
sl@0
   157
    */	
sl@0
   158
	ECapabilityAllFiles			= 11,
sl@0
   159
sl@0
   160
sl@0
   161
    /**
sl@0
   162
    Grants the right to generate software key & pen events, and to capture any
sl@0
   163
    of them regardless of the status of the application.
sl@0
   164
    
sl@0
   165
    Note that after obtaining the focus, normal applications do not need this
sl@0
   166
    capability to be dispatched key and pen events.
sl@0
   167
    */	
sl@0
   168
	ECapabilitySwEvent			= 12,
sl@0
   169
sl@0
   170
sl@0
   171
    /**
sl@0
   172
    A user capability that grants access to remote services without any
sl@0
   173
    restriction on its physical location.
sl@0
   174
    
sl@0
   175
    Typically, such a location is unknown to the phone user, and such services
sl@0
   176
    may incur cost for the phone user.
sl@0
   177
    
sl@0
   178
    Voice calls, SMS, and internet services are good examples of
sl@0
   179
    such network services. They are supported by GSM, CDMA and all IP transport
sl@0
   180
    protocols including Bluetooth profiles over IP.
sl@0
   181
    */	
sl@0
   182
	ECapabilityNetworkServices	= 13,
sl@0
   183
sl@0
   184
sl@0
   185
    /**
sl@0
   186
    A user capability that grants access to remote services in the close
sl@0
   187
    vicinity of the phone.
sl@0
   188
    
sl@0
   189
    The location of the remote service is well-known to the phone user, and in
sl@0
   190
    most cases, such services will not incur cost for the phone user.
sl@0
   191
    */	
sl@0
   192
	ECapabilityLocalServices	= 14,
sl@0
   193
sl@0
   194
sl@0
   195
    /**
sl@0
   196
    A user capability that grants read access to data that is confidential to
sl@0
   197
    the phone user. 
sl@0
   198
    
sl@0
   199
    This capability supports the management of the user's privacy.
sl@0
   200
    
sl@0
   201
    Typically, contacts, messages and appointments are always seen user
sl@0
   202
    confidential data.
sl@0
   203
    */	
sl@0
   204
	ECapabilityReadUserData		= 15,
sl@0
   205
sl@0
   206
sl@0
   207
    /**
sl@0
   208
    A user capability that grants write access to user data. 
sl@0
   209
    
sl@0
   210
    This capability supports the management of the integrity of user data.
sl@0
   211
    
sl@0
   212
    Note that this capability is not symmetric with the ECapabilityReadUserData
sl@0
   213
    capability. For example, you may want to prevent rogue applications from
sl@0
   214
    deleting music tracks but you may not want to restrict read access to them.
sl@0
   215
    */	
sl@0
   216
    ECapabilityWriteUserData	= 16,
sl@0
   217
    
sl@0
   218
    
sl@0
   219
    /**
sl@0
   220
    A user capability that grants access to the location of the device.
sl@0
   221
    
sl@0
   222
    This capability supports the management of the user's privacy with regard
sl@0
   223
    to the phone location.
sl@0
   224
    */
sl@0
   225
	ECapabilityLocation			= 17,
sl@0
   226
sl@0
   227
sl@0
   228
	/**
sl@0
   229
	Grants access to logical device drivers that provide input information about
sl@0
   230
	the surroundings of the device. 
sl@0
   231
sl@0
   232
	Good examples of drivers that require this capability would be GPS and biometrics
sl@0
   233
	device drivers. For complex multimedia logical device drivers that provide both
sl@0
   234
	input and output functions, such as Sound device driver, the  MultimediaDD
sl@0
   235
	capability should be used if it is too difficult to separate the input from the
sl@0
   236
	output calls at its API level.
sl@0
   237
	*/
sl@0
   238
	ECapabilitySurroundingsDD	= 18,
sl@0
   239
sl@0
   240
sl@0
   241
	/**
sl@0
   242
	Grants access to live confidential information about the user and his/her
sl@0
   243
	immediate environment. This capability protect the user's privacy.
sl@0
   244
sl@0
   245
	Examples are audio, picture and video recording, biometrics (such as blood
sl@0
   246
	pressure) recording.
sl@0
   247
sl@0
   248
	Please note that the location of the device is excluded from this capability.
sl@0
   249
	The protection of this is achieved by using the dedicated capability Location
sl@0
   250
	*/
sl@0
   251
	ECapabilityUserEnvironment	= 19,
sl@0
   252
sl@0
   253
sl@0
   254
	ECapability_Limit,					/**< @internalTechnology */
sl@0
   255
sl@0
   256
	ECapability_HardLimit		= 255,	/**< @internalTechnology */
sl@0
   257
sl@0
   258
	ECapability_None			= -1,	/**< Special value used to specify 'do not care' or 'no capability'.*/
sl@0
   259
sl@0
   260
	ECapability_Denied			= -2	/**< Special value used to indicate a capability that is never granted. */	
sl@0
   261
	};
sl@0
   262
sl@0
   263
sl@0
   264
/** Define this macro to reference the names of the capabilities. This is here so
sl@0
   265
	that ROMBUILD can accept capability names.
sl@0
   266
*/
sl@0
   267
#ifdef __REFERENCE_CAPABILITY_NAMES__
sl@0
   268
sl@0
   269
extern const char* const CapabilityNames[ECapability_Limit];
sl@0
   270
sl@0
   271
#endif	// __REFERENCE_CAPABILITY_NAMES__
sl@0
   272
sl@0
   273
/** Define this macro to include the names of the capabilities. This is here so
sl@0
   274
	that ROMBUILD can accept capability names.
sl@0
   275
*/
sl@0
   276
#ifdef __INCLUDE_CAPABILITY_NAMES__
sl@0
   277
sl@0
   278
/** List of names of all supported capabilities
sl@0
   279
	Must be in the same order as the enumerators in TCapability
sl@0
   280
sl@0
   281
*/
sl@0
   282
extern const char* const CapabilityNames[ECapability_Limit] =
sl@0
   283
	{
sl@0
   284
	"TCB",
sl@0
   285
	"CommDD",
sl@0
   286
	"PowerMgmt",
sl@0
   287
	"MultimediaDD",
sl@0
   288
	"ReadDeviceData",
sl@0
   289
	"WriteDeviceData",
sl@0
   290
	"DRM",
sl@0
   291
	"TrustedUI",
sl@0
   292
	"ProtServ",
sl@0
   293
	"DiskAdmin",
sl@0
   294
	"NetworkControl",
sl@0
   295
	"AllFiles",
sl@0
   296
	"SwEvent",
sl@0
   297
	"NetworkServices",
sl@0
   298
	"LocalServices",
sl@0
   299
	"ReadUserData",
sl@0
   300
	"WriteUserData",
sl@0
   301
	"Location",
sl@0
   302
	"SurroundingsDD",
sl@0
   303
	"UserEnvironment"
sl@0
   304
	};
sl@0
   305
sl@0
   306
#endif	// __INCLUDE_CAPABILITY_NAMES__
sl@0
   307
sl@0
   308
#endif	// __E32CAPABILITY_H__