os/persistentdata/featuremgmt/featuremgr/src/serverexe/featmgrsecuritypolicy.h
author sl
Tue, 10 Jun 2014 14:32:02 +0200
changeset 1 260cb5ec6c19
permissions -rw-r--r--
Update contrib.
     1 /*
     2 * Copyright (c) 2007-2009 Nokia Corporation and/or its subsidiary(-ies).
     3 * All rights reserved.
     4 * This component and the accompanying materials are made available
     5 * under the terms of "Eclipse Public License v1.0"
     6 * which accompanies this distribution, and is available
     7 * at the URL "http://www.eclipse.org/legal/epl-v10.html".
     8 *
     9 * Initial Contributors:
    10 * Nokia Corporation - initial contribution.
    11 *
    12 * Contributors:
    13 *
    14 * Description:
    15 *
    16 */
    17 
    18 
    19 
    20 #ifndef FEATMGR_SECURITY_POLICY_H
    21 #define FEATMGR_SECURITY_POLICY_H
    22 
    23 
    24 /**
    25  * Number of different IPC ranges
    26  */
    27 const TUint KFeatMgrPlatSecRangeCount = 3;
    28 
    29 
    30 #ifndef EXTENDED_FEATURE_MANAGER_TEST
    31 //
    32 // NORMAL
    33 // The security ranges for messages in the framework.
    34 // See also featmgrclientserver.h for message enum TFeatMgrServRequest
    35 //
    36 
    37 /**
    38  * IPC ranges segmented into groups based on their capability requirements
    39  */
    40 const TInt KFeatMgrPlatSecRanges[KFeatMgrPlatSecRangeCount] =
    41     {
    42     0,  // IPC 0-7 Always passed
    43     8,  // IPC 8-19 WriteDeviceData
    44     20  // IPC Not supported: 20 = 16 messages + 4 "resource check" messages
    45     };
    46 
    47 
    48 /**
    49  * IPC segments and their capability requirements
    50  */
    51 const TUint8 KFeatMgrPlatSecElementsIndex[KFeatMgrPlatSecRangeCount] =
    52     {
    53     CPolicyServer::EAlwaysPass,             // IPC 0-3
    54     0,                                      // IPC 8-19
    55     CPolicyServer::ENotSupported            // IPC 20 -> 
    56     };
    57 
    58 #else
    59 //
    60 // CONFIGURED test server has debug only API(s) built into the framework. 
    61 // e.g. EFeatMgrNumberOfNotifyFeatures which will return debug information about 
    62 // the server for testing purposes. Consequently, the platform security setup 
    63 // for the test server differs slightly to allow these specific debug only message(s).
    64 //
    65 
    66 /**
    67  * IPC ranges segmented into groups based on their capability requirements
    68  */
    69 const TInt KFeatMgrPlatSecRanges[KFeatMgrPlatSecRangeCount] =
    70     {
    71     0,   // IPC 0-9 Always passed
    72     10,  // IPC 10-21 WriteDeviceData
    73     22   // IPC Not supported 22 ->
    74     };
    75 /**
    76  * IPC segments and their capability requirements
    77  */
    78 const TUint8 KFeatMgrPlatSecElementsIndex[KFeatMgrPlatSecRangeCount] =
    79     {
    80     CPolicyServer::EAlwaysPass,             // IPC 0-3
    81     0,                                      // IPC 10-21
    82     CPolicyServer::ENotSupported            // IPC 22 ->
    83     };
    84 
    85 #endif
    86 
    87 
    88 /**
    89  * Capability sets and the action performed in case of failure
    90  */
    91 const CPolicyServer::TPolicyElement KFeatMgrPlatSecElements[] =
    92     {
    93        
    94         {
    95         _INIT_SECURITY_POLICY_C1( ECapabilityWriteDeviceData ),
    96         CPolicyServer::EFailClient
    97         }
    98        
    99     };
   100 
   101 
   102 /**
   103  * Platform security policy that Feature Manager server uses.
   104  */
   105 const CPolicyServer::TPolicy KFeatMgrPlatSecPolicy =
   106     {
   107     CPolicyServer::EAlwaysPass,     // Specifies all connect attempts should pass
   108     KFeatMgrPlatSecRangeCount,      // Number of IPC ranges
   109     KFeatMgrPlatSecRanges,          // IPC Ranges
   110     KFeatMgrPlatSecElementsIndex,   // Policy to IPC mapping array
   111     KFeatMgrPlatSecElements         // Policies used in Feature Manager Server
   112     };
   113 
   114 
   115 #endif