os/kernelhwsrv/kernel/eka/include/e32capability.h
author sl@SLION-WIN7.fritz.box
Fri, 15 Jun 2012 03:10:57 +0200
changeset 0 bde4ae8d615e
permissions -rw-r--r--
First public contribution.
sl@0
     1
// Copyright (c) 2001-2009 Nokia Corporation and/or its subsidiary(-ies).
sl@0
     2
// All rights reserved.
sl@0
     3
// This component and the accompanying materials are made available
sl@0
     4
// under the terms of the License "Eclipse Public License v1.0"
sl@0
     5
// which accompanies this distribution, and is available
sl@0
     6
// at the URL "http://www.eclipse.org/legal/epl-v10.html".
sl@0
     7
//
sl@0
     8
// Initial Contributors:
sl@0
     9
// Nokia Corporation - initial contribution.
sl@0
    10
//
sl@0
    11
// Contributors:
sl@0
    12
//
sl@0
    13
// Description:
sl@0
    14
// e32\include\e32capability.h
sl@0
    15
// Platform security capability definitions
sl@0
    16
// Used by both source code and tools
sl@0
    17
// This file can be directly included into C++ tools such as ROMBUILD to allow
sl@0
    18
// capabilities to be specified by name. To do the same for MAKMAKE (in MMP
sl@0
    19
// files) some perl code will be needed to parse this file and extract the
sl@0
    20
// capability names and values.
sl@0
    21
// 
sl@0
    22
//
sl@0
    23
sl@0
    24
#ifndef __E32CAPABILITY_H__
sl@0
    25
#define __E32CAPABILITY_H__
sl@0
    26
sl@0
    27
/**
sl@0
    28
An enumeration that defines the set of all supported capabilities.
sl@0
    29
sl@0
    30
@publishedAll
sl@0
    31
@released
sl@0
    32
*/
sl@0
    33
enum TCapability
sl@0
    34
	{
sl@0
    35
	/**
sl@0
    36
	Grants write access to executables and shared read-only resources.
sl@0
    37
	
sl@0
    38
	This is the most critical capability as it grants access to executables and
sl@0
    39
	therefore to their capabilities. It also grants write access to
sl@0
    40
	the /sys and /resource directories.
sl@0
    41
	*/
sl@0
    42
	ECapabilityTCB				= 0,
sl@0
    43
	
sl@0
    44
	
sl@0
    45
	/**
sl@0
    46
	Grants direct access to all communication device drivers. This includes:
sl@0
    47
	the EComm, Ethernet, USB device drivers etc.
sl@0
    48
	*/
sl@0
    49
	ECapabilityCommDD			= 1,
sl@0
    50
	
sl@0
    51
	
sl@0
    52
	/**
sl@0
    53
	Grants the right:
sl@0
    54
	
sl@0
    55
	- to kill any process in the system
sl@0
    56
	- to power off unused peripherals
sl@0
    57
	- to switch the machine into standby state
sl@0
    58
	- to wake the machine up
sl@0
    59
	- to power the machine down completely.
sl@0
    60
	
sl@0
    61
	Note that this does not control access to anything and everything
sl@0
    62
	that might drain battery power.
sl@0
    63
	*/
sl@0
    64
	ECapabilityPowerMgmt		= 2,
sl@0
    65
sl@0
    66
sl@0
    67
    /**
sl@0
    68
    Grants direct access to all multimedia device drivers.
sl@0
    69
    
sl@0
    70
    This includes the sound, camera, video device drivers etc.
sl@0
    71
    */
sl@0
    72
	ECapabilityMultimediaDD		= 3,
sl@0
    73
sl@0
    74
sl@0
    75
    /**
sl@0
    76
    Grants read access to network operator, phone manufacturer and device
sl@0
    77
    confidential settings or data.
sl@0
    78
    
sl@0
    79
    For example, the pin lock code, the list of applications that are installed.
sl@0
    80
    */
sl@0
    81
	ECapabilityReadDeviceData	= 4,
sl@0
    82
	
sl@0
    83
	
sl@0
    84
    /**
sl@0
    85
    Grants write access to settings that control the behaviour of the device.
sl@0
    86
    
sl@0
    87
    For example, device lock settings, system time, time zone, alarms, etc.
sl@0
    88
    */	
sl@0
    89
	ECapabilityWriteDeviceData	= 5,
sl@0
    90
sl@0
    91
sl@0
    92
    /**
sl@0
    93
    Grants access to protected content.
sl@0
    94
    
sl@0
    95
    DRM (Digital Rights Management) agents use this capability to decide whether
sl@0
    96
    or not an application should have access to DRM content. 
sl@0
    97
    Applications granted DRM are trusted to respect the rights associated
sl@0
    98
    with the content.
sl@0
    99
    */	
sl@0
   100
	ECapabilityDRM				= 6,
sl@0
   101
sl@0
   102
sl@0
   103
    /**
sl@0
   104
    Grants the right to create a trusted UI session, and therefore to display
sl@0
   105
    dialogs in a secure UI environment.
sl@0
   106
    
sl@0
   107
    Trusted UI dialogs are rare. They must be used only when confidentiality
sl@0
   108
    and security are critical; for example, for password dialogs. 
sl@0
   109
    
sl@0
   110
    Normal access to the user interface and the screen does not require
sl@0
   111
    this capability.
sl@0
   112
    */	
sl@0
   113
	ECapabilityTrustedUI		= 7,
sl@0
   114
sl@0
   115
sl@0
   116
    /**
sl@0
   117
    Grants the right to a server to register with a protected name.
sl@0
   118
    
sl@0
   119
    Currently, protected names start with a "!" character. The kernel prevents
sl@0
   120
    servers without this capability from using such a name, and therefore
sl@0
   121
    prevents protected servers from being impersonated.
sl@0
   122
    */	
sl@0
   123
	ECapabilityProtServ			= 8,
sl@0
   124
sl@0
   125
sl@0
   126
    /**
sl@0
   127
    Grants access to disk administration operations that affect more than one
sl@0
   128
    file or one directory (or overall filesystem integrity/behaviour, etc).
sl@0
   129
    
sl@0
   130
    For examples, reformatting a disk partition.
sl@0
   131
    */	
sl@0
   132
	ECapabilityDiskAdmin		= 9,
sl@0
   133
sl@0
   134
sl@0
   135
    /**
sl@0
   136
    Grants the right to modify or access network protocol controls.
sl@0
   137
    
sl@0
   138
    Typically when an action can change the behaviour of all existing and
sl@0
   139
    future connections, it should be protected by this capability.
sl@0
   140
    
sl@0
   141
    For example, forcing all existing connections on a specific protocol
sl@0
   142
    to be dropped, or changing the priority of a call.
sl@0
   143
    */	
sl@0
   144
	ECapabilityNetworkControl	= 10,
sl@0
   145
sl@0
   146
sl@0
   147
    /**
sl@0
   148
    Grants read access to the entire file system; grants write access to
sl@0
   149
    the private directories of other processes.
sl@0
   150
    
sl@0
   151
    This capability is very strictly controlled and should rarely be granted.
sl@0
   152
    */	
sl@0
   153
	ECapabilityAllFiles			= 11,
sl@0
   154
sl@0
   155
sl@0
   156
    /**
sl@0
   157
    Grants the right to generate software key & pen events, and to capture any
sl@0
   158
    of them regardless of the status of the application.
sl@0
   159
    
sl@0
   160
    Note that after obtaining the focus, normal applications do not need this
sl@0
   161
    capability to be dispatched key and pen events.
sl@0
   162
    */	
sl@0
   163
	ECapabilitySwEvent			= 12,
sl@0
   164
sl@0
   165
sl@0
   166
    /**
sl@0
   167
    A user capability that grants access to remote services without any
sl@0
   168
    restriction on its physical location.
sl@0
   169
    
sl@0
   170
    Typically, such a location is unknown to the phone user, and such services
sl@0
   171
    may incur cost for the phone user.
sl@0
   172
    
sl@0
   173
    Voice calls, SMS, and internet services are good examples of
sl@0
   174
    such network services. They are supported by GSM, CDMA and all IP transport
sl@0
   175
    protocols including Bluetooth profiles over IP.
sl@0
   176
    */	
sl@0
   177
	ECapabilityNetworkServices	= 13,
sl@0
   178
sl@0
   179
sl@0
   180
    /**
sl@0
   181
    A user capability that grants access to remote services in the close
sl@0
   182
    vicinity of the phone.
sl@0
   183
    
sl@0
   184
    The location of the remote service is well-known to the phone user, and in
sl@0
   185
    most cases, such services will not incur cost for the phone user.
sl@0
   186
    */	
sl@0
   187
	ECapabilityLocalServices	= 14,
sl@0
   188
sl@0
   189
sl@0
   190
    /**
sl@0
   191
    A user capability that grants read access to data that is confidential to
sl@0
   192
    the phone user. 
sl@0
   193
    
sl@0
   194
    This capability supports the management of the user's privacy.
sl@0
   195
    
sl@0
   196
    Typically, contacts, messages and appointments are always seen user
sl@0
   197
    confidential data.
sl@0
   198
    */	
sl@0
   199
	ECapabilityReadUserData		= 15,
sl@0
   200
sl@0
   201
sl@0
   202
    /**
sl@0
   203
    A user capability that grants write access to user data. 
sl@0
   204
    
sl@0
   205
    This capability supports the management of the integrity of user data.
sl@0
   206
    
sl@0
   207
    Note that this capability is not symmetric with the ECapabilityReadUserData
sl@0
   208
    capability. For example, you may want to prevent rogue applications from
sl@0
   209
    deleting music tracks but you may not want to restrict read access to them.
sl@0
   210
    */	
sl@0
   211
    ECapabilityWriteUserData	= 16,
sl@0
   212
    
sl@0
   213
    
sl@0
   214
    /**
sl@0
   215
    A user capability that grants access to the location of the device.
sl@0
   216
    
sl@0
   217
    This capability supports the management of the user's privacy with regard
sl@0
   218
    to the phone location.
sl@0
   219
    */
sl@0
   220
	ECapabilityLocation			= 17,
sl@0
   221
sl@0
   222
sl@0
   223
	/**
sl@0
   224
	Grants access to logical device drivers that provide input information about
sl@0
   225
	the surroundings of the device. 
sl@0
   226
sl@0
   227
	Good examples of drivers that require this capability would be GPS and biometrics
sl@0
   228
	device drivers. For complex multimedia logical device drivers that provide both
sl@0
   229
	input and output functions, such as Sound device driver, the  MultimediaDD
sl@0
   230
	capability should be used if it is too difficult to separate the input from the
sl@0
   231
	output calls at its API level.
sl@0
   232
	*/
sl@0
   233
	ECapabilitySurroundingsDD	= 18,
sl@0
   234
sl@0
   235
sl@0
   236
	/**
sl@0
   237
	Grants access to live confidential information about the user and his/her
sl@0
   238
	immediate environment. This capability protect the user's privacy.
sl@0
   239
sl@0
   240
	Examples are audio, picture and video recording, biometrics (such as blood
sl@0
   241
	pressure) recording.
sl@0
   242
sl@0
   243
	Please note that the location of the device is excluded from this capability.
sl@0
   244
	The protection of this is achieved by using the dedicated capability Location
sl@0
   245
	*/
sl@0
   246
	ECapabilityUserEnvironment	= 19,
sl@0
   247
sl@0
   248
sl@0
   249
	ECapability_Limit,					/**< @internalTechnology */
sl@0
   250
sl@0
   251
	ECapability_HardLimit		= 255,	/**< @internalTechnology */
sl@0
   252
sl@0
   253
	ECapability_None			= -1,	/**< Special value used to specify 'do not care' or 'no capability'.*/
sl@0
   254
sl@0
   255
	ECapability_Denied			= -2	/**< Special value used to indicate a capability that is never granted. */	
sl@0
   256
	};
sl@0
   257
sl@0
   258
sl@0
   259
/** Define this macro to reference the names of the capabilities. This is here so
sl@0
   260
	that ROMBUILD can accept capability names.
sl@0
   261
*/
sl@0
   262
#ifdef __REFERENCE_CAPABILITY_NAMES__
sl@0
   263
sl@0
   264
extern const char* const CapabilityNames[ECapability_Limit];
sl@0
   265
sl@0
   266
#endif	// __REFERENCE_CAPABILITY_NAMES__
sl@0
   267
sl@0
   268
/** Define this macro to include the names of the capabilities. This is here so
sl@0
   269
	that ROMBUILD can accept capability names.
sl@0
   270
*/
sl@0
   271
#ifdef __INCLUDE_CAPABILITY_NAMES__
sl@0
   272
sl@0
   273
/** List of names of all supported capabilities
sl@0
   274
	Must be in the same order as the enumerators in TCapability
sl@0
   275
sl@0
   276
@publishedAll
sl@0
   277
@released
sl@0
   278
*/
sl@0
   279
extern const char* const CapabilityNames[ECapability_Limit] =
sl@0
   280
	{
sl@0
   281
	"TCB",
sl@0
   282
	"CommDD",
sl@0
   283
	"PowerMgmt",
sl@0
   284
	"MultimediaDD",
sl@0
   285
	"ReadDeviceData",
sl@0
   286
	"WriteDeviceData",
sl@0
   287
	"DRM",
sl@0
   288
	"TrustedUI",
sl@0
   289
	"ProtServ",
sl@0
   290
	"DiskAdmin",
sl@0
   291
	"NetworkControl",
sl@0
   292
	"AllFiles",
sl@0
   293
	"SwEvent",
sl@0
   294
	"NetworkServices",
sl@0
   295
	"LocalServices",
sl@0
   296
	"ReadUserData",
sl@0
   297
	"WriteUserData",
sl@0
   298
	"Location",
sl@0
   299
	"SurroundingsDD",
sl@0
   300
	"UserEnvironment"
sl@0
   301
	};
sl@0
   302
sl@0
   303
#endif	// __INCLUDE_CAPABILITY_NAMES__
sl@0
   304
sl@0
   305
#endif	// __E32CAPABILITY_H__