sl@0
|
1 |
/*
|
sl@0
|
2 |
* Copyright (c) 2001-2009 Nokia Corporation and/or its subsidiary(-ies).
|
sl@0
|
3 |
* All rights reserved.
|
sl@0
|
4 |
* This component and the accompanying materials are made available
|
sl@0
|
5 |
* under the terms of the License "Eclipse Public License v1.0"
|
sl@0
|
6 |
* which accompanies this distribution, and is available
|
sl@0
|
7 |
* at the URL "http://www.eclipse.org/legal/epl-v10.html".
|
sl@0
|
8 |
*
|
sl@0
|
9 |
* Initial Contributors:
|
sl@0
|
10 |
* Nokia Corporation - initial contribution.
|
sl@0
|
11 |
*
|
sl@0
|
12 |
* Contributors:
|
sl@0
|
13 |
*
|
sl@0
|
14 |
* Description:
|
sl@0
|
15 |
* e32\include\e32capability.h
|
sl@0
|
16 |
* Platform security capability definitions
|
sl@0
|
17 |
* Used by both source code and tools
|
sl@0
|
18 |
* This file can be directly included into C++ tools such as ROMBUILD to allow
|
sl@0
|
19 |
* capabilities to be specified by name. To do the same for MAKMAKE (in MMP
|
sl@0
|
20 |
* files) some perl code will be needed to parse this file and extract the
|
sl@0
|
21 |
* capability names and values.
|
sl@0
|
22 |
*
|
sl@0
|
23 |
*/
|
sl@0
|
24 |
|
sl@0
|
25 |
|
sl@0
|
26 |
#ifndef __E32CAPABILITY_H__
|
sl@0
|
27 |
#define __E32CAPABILITY_H__
|
sl@0
|
28 |
|
sl@0
|
29 |
/**
|
sl@0
|
30 |
* @file
|
sl@0
|
31 |
* @internalComponent
|
sl@0
|
32 |
*/
|
sl@0
|
33 |
|
sl@0
|
34 |
/**
|
sl@0
|
35 |
An enumeration that defines the set of all supported capabilities.
|
sl@0
|
36 |
|
sl@0
|
37 |
*/
|
sl@0
|
38 |
enum TCapability
|
sl@0
|
39 |
{
|
sl@0
|
40 |
/**
|
sl@0
|
41 |
Grants write access to executables and shared read-only resources.
|
sl@0
|
42 |
|
sl@0
|
43 |
This is the most critical capability as it grants access to executables and
|
sl@0
|
44 |
therefore to their capabilities. It also grants write access to
|
sl@0
|
45 |
the /sys and /resource directories.
|
sl@0
|
46 |
*/
|
sl@0
|
47 |
ECapabilityTCB = 0,
|
sl@0
|
48 |
|
sl@0
|
49 |
|
sl@0
|
50 |
/**
|
sl@0
|
51 |
Grants direct access to all communication device drivers. This includes:
|
sl@0
|
52 |
the EComm, Ethernet, USB device drivers etc.
|
sl@0
|
53 |
*/
|
sl@0
|
54 |
ECapabilityCommDD = 1,
|
sl@0
|
55 |
|
sl@0
|
56 |
|
sl@0
|
57 |
/**
|
sl@0
|
58 |
Grants the right:
|
sl@0
|
59 |
|
sl@0
|
60 |
- to kill any process in the system
|
sl@0
|
61 |
- to power off unused peripherals
|
sl@0
|
62 |
- to switch the machine into standby state
|
sl@0
|
63 |
- to wake the machine up
|
sl@0
|
64 |
- to power the machine down completely.
|
sl@0
|
65 |
|
sl@0
|
66 |
Note that this does not control access to anything and everything
|
sl@0
|
67 |
that might drain battery power.
|
sl@0
|
68 |
*/
|
sl@0
|
69 |
ECapabilityPowerMgmt = 2,
|
sl@0
|
70 |
|
sl@0
|
71 |
|
sl@0
|
72 |
/**
|
sl@0
|
73 |
Grants direct access to all multimedia device drivers.
|
sl@0
|
74 |
|
sl@0
|
75 |
This includes the sound, camera, video device drivers etc.
|
sl@0
|
76 |
*/
|
sl@0
|
77 |
ECapabilityMultimediaDD = 3,
|
sl@0
|
78 |
|
sl@0
|
79 |
|
sl@0
|
80 |
/**
|
sl@0
|
81 |
Grants read access to network operator, phone manufacturer and device
|
sl@0
|
82 |
confidential settings or data.
|
sl@0
|
83 |
|
sl@0
|
84 |
For example, the pin lock code, the list of applications that are installed.
|
sl@0
|
85 |
*/
|
sl@0
|
86 |
ECapabilityReadDeviceData = 4,
|
sl@0
|
87 |
|
sl@0
|
88 |
|
sl@0
|
89 |
/**
|
sl@0
|
90 |
Grants write access to settings that control the behaviour of the device.
|
sl@0
|
91 |
|
sl@0
|
92 |
For example, device lock settings, system time, time zone, alarms, etc.
|
sl@0
|
93 |
*/
|
sl@0
|
94 |
ECapabilityWriteDeviceData = 5,
|
sl@0
|
95 |
|
sl@0
|
96 |
|
sl@0
|
97 |
/**
|
sl@0
|
98 |
Grants access to protected content.
|
sl@0
|
99 |
|
sl@0
|
100 |
DRM (Digital Rights Management) agents use this capability to decide whether
|
sl@0
|
101 |
or not an application should have access to DRM content.
|
sl@0
|
102 |
Applications granted DRM are trusted to respect the rights associated
|
sl@0
|
103 |
with the content.
|
sl@0
|
104 |
*/
|
sl@0
|
105 |
ECapabilityDRM = 6,
|
sl@0
|
106 |
|
sl@0
|
107 |
|
sl@0
|
108 |
/**
|
sl@0
|
109 |
Grants the right to create a trusted UI session, and therefore to display
|
sl@0
|
110 |
dialogs in a secure UI environment.
|
sl@0
|
111 |
|
sl@0
|
112 |
Trusted UI dialogs are rare. They must be used only when confidentiality
|
sl@0
|
113 |
and security are critical; for example, for password dialogs.
|
sl@0
|
114 |
|
sl@0
|
115 |
Normal access to the user interface and the screen does not require
|
sl@0
|
116 |
this capability.
|
sl@0
|
117 |
*/
|
sl@0
|
118 |
ECapabilityTrustedUI = 7,
|
sl@0
|
119 |
|
sl@0
|
120 |
|
sl@0
|
121 |
/**
|
sl@0
|
122 |
Grants the right to a server to register with a protected name.
|
sl@0
|
123 |
|
sl@0
|
124 |
Currently, protected names start with a "!" character. The kernel prevents
|
sl@0
|
125 |
servers without this capability from using such a name, and therefore
|
sl@0
|
126 |
prevents protected servers from being impersonated.
|
sl@0
|
127 |
*/
|
sl@0
|
128 |
ECapabilityProtServ = 8,
|
sl@0
|
129 |
|
sl@0
|
130 |
|
sl@0
|
131 |
/**
|
sl@0
|
132 |
Grants access to disk administration operations that affect more than one
|
sl@0
|
133 |
file or one directory (or overall filesystem integrity/behaviour, etc).
|
sl@0
|
134 |
|
sl@0
|
135 |
For examples, reformatting a disk partition.
|
sl@0
|
136 |
*/
|
sl@0
|
137 |
ECapabilityDiskAdmin = 9,
|
sl@0
|
138 |
|
sl@0
|
139 |
|
sl@0
|
140 |
/**
|
sl@0
|
141 |
Grants the right to modify or access network protocol controls.
|
sl@0
|
142 |
|
sl@0
|
143 |
Typically when an action can change the behaviour of all existing and
|
sl@0
|
144 |
future connections, it should be protected by this capability.
|
sl@0
|
145 |
|
sl@0
|
146 |
For example, forcing all existing connections on a specific protocol
|
sl@0
|
147 |
to be dropped, or changing the priority of a call.
|
sl@0
|
148 |
*/
|
sl@0
|
149 |
ECapabilityNetworkControl = 10,
|
sl@0
|
150 |
|
sl@0
|
151 |
|
sl@0
|
152 |
/**
|
sl@0
|
153 |
Grants read access to the entire file system; grants write access to
|
sl@0
|
154 |
the private directories of other processes.
|
sl@0
|
155 |
|
sl@0
|
156 |
This capability is very strictly controlled and should rarely be granted.
|
sl@0
|
157 |
*/
|
sl@0
|
158 |
ECapabilityAllFiles = 11,
|
sl@0
|
159 |
|
sl@0
|
160 |
|
sl@0
|
161 |
/**
|
sl@0
|
162 |
Grants the right to generate software key & pen events, and to capture any
|
sl@0
|
163 |
of them regardless of the status of the application.
|
sl@0
|
164 |
|
sl@0
|
165 |
Note that after obtaining the focus, normal applications do not need this
|
sl@0
|
166 |
capability to be dispatched key and pen events.
|
sl@0
|
167 |
*/
|
sl@0
|
168 |
ECapabilitySwEvent = 12,
|
sl@0
|
169 |
|
sl@0
|
170 |
|
sl@0
|
171 |
/**
|
sl@0
|
172 |
A user capability that grants access to remote services without any
|
sl@0
|
173 |
restriction on its physical location.
|
sl@0
|
174 |
|
sl@0
|
175 |
Typically, such a location is unknown to the phone user, and such services
|
sl@0
|
176 |
may incur cost for the phone user.
|
sl@0
|
177 |
|
sl@0
|
178 |
Voice calls, SMS, and internet services are good examples of
|
sl@0
|
179 |
such network services. They are supported by GSM, CDMA and all IP transport
|
sl@0
|
180 |
protocols including Bluetooth profiles over IP.
|
sl@0
|
181 |
*/
|
sl@0
|
182 |
ECapabilityNetworkServices = 13,
|
sl@0
|
183 |
|
sl@0
|
184 |
|
sl@0
|
185 |
/**
|
sl@0
|
186 |
A user capability that grants access to remote services in the close
|
sl@0
|
187 |
vicinity of the phone.
|
sl@0
|
188 |
|
sl@0
|
189 |
The location of the remote service is well-known to the phone user, and in
|
sl@0
|
190 |
most cases, such services will not incur cost for the phone user.
|
sl@0
|
191 |
*/
|
sl@0
|
192 |
ECapabilityLocalServices = 14,
|
sl@0
|
193 |
|
sl@0
|
194 |
|
sl@0
|
195 |
/**
|
sl@0
|
196 |
A user capability that grants read access to data that is confidential to
|
sl@0
|
197 |
the phone user.
|
sl@0
|
198 |
|
sl@0
|
199 |
This capability supports the management of the user's privacy.
|
sl@0
|
200 |
|
sl@0
|
201 |
Typically, contacts, messages and appointments are always seen user
|
sl@0
|
202 |
confidential data.
|
sl@0
|
203 |
*/
|
sl@0
|
204 |
ECapabilityReadUserData = 15,
|
sl@0
|
205 |
|
sl@0
|
206 |
|
sl@0
|
207 |
/**
|
sl@0
|
208 |
A user capability that grants write access to user data.
|
sl@0
|
209 |
|
sl@0
|
210 |
This capability supports the management of the integrity of user data.
|
sl@0
|
211 |
|
sl@0
|
212 |
Note that this capability is not symmetric with the ECapabilityReadUserData
|
sl@0
|
213 |
capability. For example, you may want to prevent rogue applications from
|
sl@0
|
214 |
deleting music tracks but you may not want to restrict read access to them.
|
sl@0
|
215 |
*/
|
sl@0
|
216 |
ECapabilityWriteUserData = 16,
|
sl@0
|
217 |
|
sl@0
|
218 |
|
sl@0
|
219 |
/**
|
sl@0
|
220 |
A user capability that grants access to the location of the device.
|
sl@0
|
221 |
|
sl@0
|
222 |
This capability supports the management of the user's privacy with regard
|
sl@0
|
223 |
to the phone location.
|
sl@0
|
224 |
*/
|
sl@0
|
225 |
ECapabilityLocation = 17,
|
sl@0
|
226 |
|
sl@0
|
227 |
|
sl@0
|
228 |
/**
|
sl@0
|
229 |
Grants access to logical device drivers that provide input information about
|
sl@0
|
230 |
the surroundings of the device.
|
sl@0
|
231 |
|
sl@0
|
232 |
Good examples of drivers that require this capability would be GPS and biometrics
|
sl@0
|
233 |
device drivers. For complex multimedia logical device drivers that provide both
|
sl@0
|
234 |
input and output functions, such as Sound device driver, the MultimediaDD
|
sl@0
|
235 |
capability should be used if it is too difficult to separate the input from the
|
sl@0
|
236 |
output calls at its API level.
|
sl@0
|
237 |
*/
|
sl@0
|
238 |
ECapabilitySurroundingsDD = 18,
|
sl@0
|
239 |
|
sl@0
|
240 |
|
sl@0
|
241 |
/**
|
sl@0
|
242 |
Grants access to live confidential information about the user and his/her
|
sl@0
|
243 |
immediate environment. This capability protect the user's privacy.
|
sl@0
|
244 |
|
sl@0
|
245 |
Examples are audio, picture and video recording, biometrics (such as blood
|
sl@0
|
246 |
pressure) recording.
|
sl@0
|
247 |
|
sl@0
|
248 |
Please note that the location of the device is excluded from this capability.
|
sl@0
|
249 |
The protection of this is achieved by using the dedicated capability Location
|
sl@0
|
250 |
*/
|
sl@0
|
251 |
ECapabilityUserEnvironment = 19,
|
sl@0
|
252 |
|
sl@0
|
253 |
|
sl@0
|
254 |
ECapability_Limit, /**< @internalTechnology */
|
sl@0
|
255 |
|
sl@0
|
256 |
ECapability_HardLimit = 255, /**< @internalTechnology */
|
sl@0
|
257 |
|
sl@0
|
258 |
ECapability_None = -1, /**< Special value used to specify 'do not care' or 'no capability'.*/
|
sl@0
|
259 |
|
sl@0
|
260 |
ECapability_Denied = -2 /**< Special value used to indicate a capability that is never granted. */
|
sl@0
|
261 |
};
|
sl@0
|
262 |
|
sl@0
|
263 |
|
sl@0
|
264 |
/** Define this macro to reference the names of the capabilities. This is here so
|
sl@0
|
265 |
that ROMBUILD can accept capability names.
|
sl@0
|
266 |
*/
|
sl@0
|
267 |
#ifdef __REFERENCE_CAPABILITY_NAMES__
|
sl@0
|
268 |
|
sl@0
|
269 |
extern const char* const CapabilityNames[ECapability_Limit];
|
sl@0
|
270 |
|
sl@0
|
271 |
#endif // __REFERENCE_CAPABILITY_NAMES__
|
sl@0
|
272 |
|
sl@0
|
273 |
/** Define this macro to include the names of the capabilities. This is here so
|
sl@0
|
274 |
that ROMBUILD can accept capability names.
|
sl@0
|
275 |
*/
|
sl@0
|
276 |
#ifdef __INCLUDE_CAPABILITY_NAMES__
|
sl@0
|
277 |
|
sl@0
|
278 |
/** List of names of all supported capabilities
|
sl@0
|
279 |
Must be in the same order as the enumerators in TCapability
|
sl@0
|
280 |
|
sl@0
|
281 |
*/
|
sl@0
|
282 |
extern const char* const CapabilityNames[ECapability_Limit] =
|
sl@0
|
283 |
{
|
sl@0
|
284 |
"TCB",
|
sl@0
|
285 |
"CommDD",
|
sl@0
|
286 |
"PowerMgmt",
|
sl@0
|
287 |
"MultimediaDD",
|
sl@0
|
288 |
"ReadDeviceData",
|
sl@0
|
289 |
"WriteDeviceData",
|
sl@0
|
290 |
"DRM",
|
sl@0
|
291 |
"TrustedUI",
|
sl@0
|
292 |
"ProtServ",
|
sl@0
|
293 |
"DiskAdmin",
|
sl@0
|
294 |
"NetworkControl",
|
sl@0
|
295 |
"AllFiles",
|
sl@0
|
296 |
"SwEvent",
|
sl@0
|
297 |
"NetworkServices",
|
sl@0
|
298 |
"LocalServices",
|
sl@0
|
299 |
"ReadUserData",
|
sl@0
|
300 |
"WriteUserData",
|
sl@0
|
301 |
"Location",
|
sl@0
|
302 |
"SurroundingsDD",
|
sl@0
|
303 |
"UserEnvironment"
|
sl@0
|
304 |
};
|
sl@0
|
305 |
|
sl@0
|
306 |
#endif // __INCLUDE_CAPABILITY_NAMES__
|
sl@0
|
307 |
|
sl@0
|
308 |
#endif // __E32CAPABILITY_H__
|