1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000
1.2 +++ b/os/persistentdata/featuremgmt/featuremgr/src/serverexe/featmgrsecuritypolicy.h Fri Jun 15 03:10:57 2012 +0200
1.3 @@ -0,0 +1,115 @@
1.4 +/*
1.5 +* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
1.6 +* All rights reserved.
1.7 +* This component and the accompanying materials are made available
1.8 +* under the terms of "Eclipse Public License v1.0"
1.9 +* which accompanies this distribution, and is available
1.10 +* at the URL "http://www.eclipse.org/legal/epl-v10.html".
1.11 +*
1.12 +* Initial Contributors:
1.13 +* Nokia Corporation - initial contribution.
1.14 +*
1.15 +* Contributors:
1.16 +*
1.17 +* Description:
1.18 +*
1.19 +*/
1.20 +
1.21 +
1.22 +
1.23 +#ifndef FEATMGR_SECURITY_POLICY_H
1.24 +#define FEATMGR_SECURITY_POLICY_H
1.25 +
1.26 +
1.27 +/**
1.28 + * Number of different IPC ranges
1.29 + */
1.30 +const TUint KFeatMgrPlatSecRangeCount = 3;
1.31 +
1.32 +
1.33 +#ifndef EXTENDED_FEATURE_MANAGER_TEST
1.34 +//
1.35 +// NORMAL
1.36 +// The security ranges for messages in the framework.
1.37 +// See also featmgrclientserver.h for message enum TFeatMgrServRequest
1.38 +//
1.39 +
1.40 +/**
1.41 + * IPC ranges segmented into groups based on their capability requirements
1.42 + */
1.43 +const TInt KFeatMgrPlatSecRanges[KFeatMgrPlatSecRangeCount] =
1.44 + {
1.45 + 0, // IPC 0-7 Always passed
1.46 + 8, // IPC 8-19 WriteDeviceData
1.47 + 20 // IPC Not supported: 20 = 16 messages + 4 "resource check" messages
1.48 + };
1.49 +
1.50 +
1.51 +/**
1.52 + * IPC segments and their capability requirements
1.53 + */
1.54 +const TUint8 KFeatMgrPlatSecElementsIndex[KFeatMgrPlatSecRangeCount] =
1.55 + {
1.56 + CPolicyServer::EAlwaysPass, // IPC 0-3
1.57 + 0, // IPC 8-19
1.58 + CPolicyServer::ENotSupported // IPC 20 ->
1.59 + };
1.60 +
1.61 +#else
1.62 +//
1.63 +// CONFIGURED test server has debug only API(s) built into the framework.
1.64 +// e.g. EFeatMgrNumberOfNotifyFeatures which will return debug information about
1.65 +// the server for testing purposes. Consequently, the platform security setup
1.66 +// for the test server differs slightly to allow these specific debug only message(s).
1.67 +//
1.68 +
1.69 +/**
1.70 + * IPC ranges segmented into groups based on their capability requirements
1.71 + */
1.72 +const TInt KFeatMgrPlatSecRanges[KFeatMgrPlatSecRangeCount] =
1.73 + {
1.74 + 0, // IPC 0-9 Always passed
1.75 + 10, // IPC 10-21 WriteDeviceData
1.76 + 22 // IPC Not supported 22 ->
1.77 + };
1.78 +/**
1.79 + * IPC segments and their capability requirements
1.80 + */
1.81 +const TUint8 KFeatMgrPlatSecElementsIndex[KFeatMgrPlatSecRangeCount] =
1.82 + {
1.83 + CPolicyServer::EAlwaysPass, // IPC 0-3
1.84 + 0, // IPC 10-21
1.85 + CPolicyServer::ENotSupported // IPC 22 ->
1.86 + };
1.87 +
1.88 +#endif
1.89 +
1.90 +
1.91 +/**
1.92 + * Capability sets and the action performed in case of failure
1.93 + */
1.94 +const CPolicyServer::TPolicyElement KFeatMgrPlatSecElements[] =
1.95 + {
1.96 +
1.97 + {
1.98 + _INIT_SECURITY_POLICY_C1( ECapabilityWriteDeviceData ),
1.99 + CPolicyServer::EFailClient
1.100 + }
1.101 +
1.102 + };
1.103 +
1.104 +
1.105 +/**
1.106 + * Platform security policy that Feature Manager server uses.
1.107 + */
1.108 +const CPolicyServer::TPolicy KFeatMgrPlatSecPolicy =
1.109 + {
1.110 + CPolicyServer::EAlwaysPass, // Specifies all connect attempts should pass
1.111 + KFeatMgrPlatSecRangeCount, // Number of IPC ranges
1.112 + KFeatMgrPlatSecRanges, // IPC Ranges
1.113 + KFeatMgrPlatSecElementsIndex, // Policy to IPC mapping array
1.114 + KFeatMgrPlatSecElements // Policies used in Feature Manager Server
1.115 + };
1.116 +
1.117 +
1.118 +#endif