os/security/authorisation/userpromptservice/policies/test/dumppolicy/resource/examplepolicy.rss
changeset 0 bde4ae8d615e
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/os/security/authorisation/userpromptservice/policies/test/dumppolicy/resource/examplepolicy.rss	Fri Jun 15 03:10:57 2012 +0200
     1.3 @@ -0,0 +1,74 @@
     1.4 +/*
     1.5 +* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
     1.6 +* All rights reserved.
     1.7 +* This component and the accompanying materials are made available
     1.8 +* under the terms of the License "Eclipse Public License v1.0"
     1.9 +* which accompanies this distribution, and is available
    1.10 +* at the URL "http://www.eclipse.org/legal/epl-v10.html".
    1.11 +*
    1.12 +* Initial Contributors:
    1.13 +* Nokia Corporation - initial contribution.
    1.14 +*
    1.15 +* Contributors:
    1.16 +*
    1.17 +* Description: 
    1.18 +*
    1.19 +*/
    1.20 +
    1.21 +
    1.22 +#include <ups/policies.rh>
    1.23 +
    1.24 +UID2 KUidUpsPolicyResourceFile
    1.25 +UID3 0x01100001					
    1.26 +
    1.27 +RESOURCE POLICIES testpolicies
    1.28 +	{
    1.29 +	header = POLICY_HEADER
    1.30 +		{
    1.31 +		// Built-in (protected SID and loaded from Z drive) client applications
    1.32 +		// do not require authorisation from the UPS if the client has the correct
    1.33 +		// capabilities.
    1.34 +		authorisationpolicy = ECheckPostManufacture;
    1.35 +		dialogcreator = 0x10283694;
    1.36 +		policyevaluator = 0x10283698;
    1.37 +		};
    1.38 +	policies = 
    1.39 +		{
    1.40 +		POLICY
    1.41 +			{
    1.42 +			// sid_list defined so this field will be ignored
    1.43 +			sid_classes = KSidClassF;				
    1.44 +			// Silently accept this SID
    1.45 +			sid_list = {0x01000030};
    1.46 +			destination = "*";
    1.47 +			options = KYes;
    1.48 +			},			
    1.49 +		POLICY
    1.50 +			{
    1.51 +			// Silently these SIDs for a specific destination
    1.52 +			sid_list = {0x01000031,0x01000032};
    1.53 +			destination = "*WLAN*";
    1.54 +			options = KYes;
    1.55 +			},			
    1.56 +		POLICY
    1.57 +			{
    1.58 +			// For protected SIDs enable the Always and Never options
    1.59 +            // if the client has the correct capability.
    1.60 +			sid_classes = KProtectedSids;
    1.61 +			systemserversecurity = ESystemServerSecurityPassed;
    1.62 +			destination = "*";
    1.63 +			options = KYes|KNo|KAlways|KNever;
    1.64 +			policyevaluator = 0x01000020;
    1.65 +			dialogcreator = 0x01000021;
    1.66 +			},
    1.67 +		POLICY
    1.68 +			{
    1.69 +			// Unprotected SIDs may only get one-shot permissions            
    1.70 +			sid_classes = KUnprotectedSids;
    1.71 +			destination = "*";
    1.72 +			options = KYes|KNo;
    1.73 +			flags = 42; 		// Flags specific to policy evaluator 0x10283698
    1.74 +			}
    1.75 +		};
    1.76 +	}
    1.77 +