os/security/authorisation/userpromptservice/policies/test/dumppolicy/resource/examplepolicy.rss
1.1 --- /dev/null Thu Jan 01 00:00:00 1970 +0000
1.2 +++ b/os/security/authorisation/userpromptservice/policies/test/dumppolicy/resource/examplepolicy.rss Fri Jun 15 03:10:57 2012 +0200
1.3 @@ -0,0 +1,74 @@
1.4 +/*
1.5 +* Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
1.6 +* All rights reserved.
1.7 +* This component and the accompanying materials are made available
1.8 +* under the terms of the License "Eclipse Public License v1.0"
1.9 +* which accompanies this distribution, and is available
1.10 +* at the URL "http://www.eclipse.org/legal/epl-v10.html".
1.11 +*
1.12 +* Initial Contributors:
1.13 +* Nokia Corporation - initial contribution.
1.14 +*
1.15 +* Contributors:
1.16 +*
1.17 +* Description:
1.18 +*
1.19 +*/
1.20 +
1.21 +
1.22 +#include <ups/policies.rh>
1.23 +
1.24 +UID2 KUidUpsPolicyResourceFile
1.25 +UID3 0x01100001
1.26 +
1.27 +RESOURCE POLICIES testpolicies
1.28 + {
1.29 + header = POLICY_HEADER
1.30 + {
1.31 + // Built-in (protected SID and loaded from Z drive) client applications
1.32 + // do not require authorisation from the UPS if the client has the correct
1.33 + // capabilities.
1.34 + authorisationpolicy = ECheckPostManufacture;
1.35 + dialogcreator = 0x10283694;
1.36 + policyevaluator = 0x10283698;
1.37 + };
1.38 + policies =
1.39 + {
1.40 + POLICY
1.41 + {
1.42 + // sid_list defined so this field will be ignored
1.43 + sid_classes = KSidClassF;
1.44 + // Silently accept this SID
1.45 + sid_list = {0x01000030};
1.46 + destination = "*";
1.47 + options = KYes;
1.48 + },
1.49 + POLICY
1.50 + {
1.51 + // Silently these SIDs for a specific destination
1.52 + sid_list = {0x01000031,0x01000032};
1.53 + destination = "*WLAN*";
1.54 + options = KYes;
1.55 + },
1.56 + POLICY
1.57 + {
1.58 + // For protected SIDs enable the Always and Never options
1.59 + // if the client has the correct capability.
1.60 + sid_classes = KProtectedSids;
1.61 + systemserversecurity = ESystemServerSecurityPassed;
1.62 + destination = "*";
1.63 + options = KYes|KNo|KAlways|KNever;
1.64 + policyevaluator = 0x01000020;
1.65 + dialogcreator = 0x01000021;
1.66 + },
1.67 + POLICY
1.68 + {
1.69 + // Unprotected SIDs may only get one-shot permissions
1.70 + sid_classes = KUnprotectedSids;
1.71 + destination = "*";
1.72 + options = KYes|KNo;
1.73 + flags = 42; // Flags specific to policy evaluator 0x10283698
1.74 + }
1.75 + };
1.76 + }
1.77 +