os/persistentdata/featuremgmt/featuremgr/src/serverexe/featmgrsecuritypolicy.h
changeset 0 bde4ae8d615e
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/os/persistentdata/featuremgmt/featuremgr/src/serverexe/featmgrsecuritypolicy.h	Fri Jun 15 03:10:57 2012 +0200
     1.3 @@ -0,0 +1,115 @@
     1.4 +/*
     1.5 +* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
     1.6 +* All rights reserved.
     1.7 +* This component and the accompanying materials are made available
     1.8 +* under the terms of "Eclipse Public License v1.0"
     1.9 +* which accompanies this distribution, and is available
    1.10 +* at the URL "http://www.eclipse.org/legal/epl-v10.html".
    1.11 +*
    1.12 +* Initial Contributors:
    1.13 +* Nokia Corporation - initial contribution.
    1.14 +*
    1.15 +* Contributors:
    1.16 +*
    1.17 +* Description:
    1.18 +*
    1.19 +*/
    1.20 +
    1.21 +
    1.22 +
    1.23 +#ifndef FEATMGR_SECURITY_POLICY_H
    1.24 +#define FEATMGR_SECURITY_POLICY_H
    1.25 +
    1.26 +
    1.27 +/**
    1.28 + * Number of different IPC ranges
    1.29 + */
    1.30 +const TUint KFeatMgrPlatSecRangeCount = 3;
    1.31 +
    1.32 +
    1.33 +#ifndef EXTENDED_FEATURE_MANAGER_TEST
    1.34 +//
    1.35 +// NORMAL
    1.36 +// The security ranges for messages in the framework.
    1.37 +// See also featmgrclientserver.h for message enum TFeatMgrServRequest
    1.38 +//
    1.39 +
    1.40 +/**
    1.41 + * IPC ranges segmented into groups based on their capability requirements
    1.42 + */
    1.43 +const TInt KFeatMgrPlatSecRanges[KFeatMgrPlatSecRangeCount] =
    1.44 +    {
    1.45 +    0,  // IPC 0-7 Always passed
    1.46 +    8,  // IPC 8-19 WriteDeviceData
    1.47 +    20  // IPC Not supported: 20 = 16 messages + 4 "resource check" messages
    1.48 +    };
    1.49 +
    1.50 +
    1.51 +/**
    1.52 + * IPC segments and their capability requirements
    1.53 + */
    1.54 +const TUint8 KFeatMgrPlatSecElementsIndex[KFeatMgrPlatSecRangeCount] =
    1.55 +    {
    1.56 +    CPolicyServer::EAlwaysPass,             // IPC 0-3
    1.57 +    0,                                      // IPC 8-19
    1.58 +    CPolicyServer::ENotSupported            // IPC 20 -> 
    1.59 +    };
    1.60 +
    1.61 +#else
    1.62 +//
    1.63 +// CONFIGURED test server has debug only API(s) built into the framework. 
    1.64 +// e.g. EFeatMgrNumberOfNotifyFeatures which will return debug information about 
    1.65 +// the server for testing purposes. Consequently, the platform security setup 
    1.66 +// for the test server differs slightly to allow these specific debug only message(s).
    1.67 +//
    1.68 +
    1.69 +/**
    1.70 + * IPC ranges segmented into groups based on their capability requirements
    1.71 + */
    1.72 +const TInt KFeatMgrPlatSecRanges[KFeatMgrPlatSecRangeCount] =
    1.73 +    {
    1.74 +    0,   // IPC 0-9 Always passed
    1.75 +    10,  // IPC 10-21 WriteDeviceData
    1.76 +    22   // IPC Not supported 22 ->
    1.77 +    };
    1.78 +/**
    1.79 + * IPC segments and their capability requirements
    1.80 + */
    1.81 +const TUint8 KFeatMgrPlatSecElementsIndex[KFeatMgrPlatSecRangeCount] =
    1.82 +    {
    1.83 +    CPolicyServer::EAlwaysPass,             // IPC 0-3
    1.84 +    0,                                      // IPC 10-21
    1.85 +    CPolicyServer::ENotSupported            // IPC 22 ->
    1.86 +    };
    1.87 +
    1.88 +#endif
    1.89 +
    1.90 +
    1.91 +/**
    1.92 + * Capability sets and the action performed in case of failure
    1.93 + */
    1.94 +const CPolicyServer::TPolicyElement KFeatMgrPlatSecElements[] =
    1.95 +    {
    1.96 +       
    1.97 +        {
    1.98 +        _INIT_SECURITY_POLICY_C1( ECapabilityWriteDeviceData ),
    1.99 +        CPolicyServer::EFailClient
   1.100 +        }
   1.101 +       
   1.102 +    };
   1.103 +
   1.104 +
   1.105 +/**
   1.106 + * Platform security policy that Feature Manager server uses.
   1.107 + */
   1.108 +const CPolicyServer::TPolicy KFeatMgrPlatSecPolicy =
   1.109 +    {
   1.110 +    CPolicyServer::EAlwaysPass,     // Specifies all connect attempts should pass
   1.111 +    KFeatMgrPlatSecRangeCount,      // Number of IPC ranges
   1.112 +    KFeatMgrPlatSecRanges,          // IPC Ranges
   1.113 +    KFeatMgrPlatSecElementsIndex,   // Policy to IPC mapping array
   1.114 +    KFeatMgrPlatSecElements         // Policies used in Feature Manager Server
   1.115 +    };
   1.116 +
   1.117 +
   1.118 +#endif